Sunday, November 29, 2015
Here Hold This: Loading malware with legitimate Win32 applications
I do not often talk about OS specific topics. Even more rarely is that OS Windows. I am, after all, an OS agnostic with a "slight" lean towards Linux. Sometimes though, there is a method that is just too good to pass up writing about. "Here, Hold This" is the name I gave to a tactic for Windows post-exploitation persistence in which you cause a legitimate program run at boot to call your Malware startup routine. The exact method has been around pretty much since the inception of the Windows NT model. It takes advantage of the Windows DLL location search order to trick the program into loading a malicious DLL it believes to be legitimate.
Friday, November 6, 2015
Station to Station Encryption in Python
Alice and Bob are looking for a more secure way to communicate than HTTPS. Sure, HTTPS is good for securing their messages against basic eavesdroppers. However, they want to secure their communication, even if someone steals their server's private key. Furthermore, Alice and Bob want to make sure that if an encryption key for any communication is broken it does not compromise the rest. The method they settle on is called the "Station To Station Protocol".
Saturday, October 10, 2015
DarkDuino Payload 1: Powershell DnE
The first payload I came up with for the DarkDuino was a simple powershell payload to download a given file off the network and then to execute it. I will co over the code in detail below. This is the main loop in a sketch uploaded to an Arduino Micro Microcontroller. At a high level what happens is, when connected to a target system and pinButton is pressed (brought to GND) the DarkDuino fires off a powershell command to download a python file and execute it. It does assume the network allows local area network traffic on port 80 or 443 if you're using HTTPS (and you should be!). It also assumes that the system has the python executable in it's PATH. here is the commented code:
Sunday, October 4, 2015
SSHCommander Use Case 0: Example MITM Network Build
SSHCommander is a tool I am working on to help manage large clusters of systems using the SSH protocol. It is currently setup to use Public/Private key encryption to protect against eavesdropping, brute force password cracking, and repetitive stress injuries from typing commands across 50+ nodes.
Saturday, September 26, 2015
Pyzano for Data Backup
Pyzano (https://github.com/dreilly369/PyzanoFSIC) is a tool I use for a lot for file system tasks. From monitoring for unauthorized changes, to creating malware signatures for Host-based Intrusion Detection Systems (HIDS). Today though, I want to write about Pyzano's ability to be used as a lightweight data backup and file sharing system.
Wednesday, September 16, 2015
Session Hijacking
Session Hijacking allows an attacker to masquerade as the victim on websites where the session has been successfully exploited.
To accomplish this I will put a redirection proxy in-between the victims web browser and the website. An aptly named “man-in-the-Middle” attack. The goal is to trap an authentication cookie and use it on the attack machine to impersonate the victim on the website later
Sunday, September 13, 2015
Building a DarkDuino Tool
This tool is what can be referred to as a “Force
Multiplier”. It is not itself an exploit. Nor does it take
advantage of any security flaw which is likely to go away. In fact,
it is really just a programmable keyboard. Computers trust keyboards,
so by default computers trust the DarkDuino tool. The only security
lapse needed is for someone to walk away, leaving their system
unlocked for a minute.
Scripted RFIDler Proximity Card Grabber
Using the RFIDler to clone a card manually was relatively easy to get a grasp on. Still, to understand how to automate the process of capturing different cards, the examples from the RFIDler site will help. Take a look at https://github.com/ApertureLabsLtd/RFIDler/wiki/plotting
The steps there describe how to use the plotting library to discern tag modulation types. The key takeaway (for now) is that all the tag modulation raw data can be captured as ASKRAW. It goes on to describe the method of looking at the data plot and figuring out what the modulation scheme is. We will use this method later to determine what types of cards we captured data for and to reprint them onto clones.
The steps there describe how to use the plotting library to discern tag modulation types. The key takeaway (for now) is that all the tag modulation raw data can be captured as ASKRAW. It goes on to describe the method of looking at the data plot and figuring out what the modulation scheme is. We will use this method later to determine what types of cards we captured data for and to reprint them onto clones.
Saturday, August 22, 2015
RFIDler is better than your fiddler
As promised here is my in-depth write up on integrating the RFIDler into my setup. It has not been hard, but there are some definite lessons I have learned.
First let me start by describing what the tool is. The RFIDler is a Software Defined (SD) Low Frequency Only(LFO) Radio (R) (SDLFOR). It is from Aperature Labs. Mine came as an exposed circuit board with n exposed coil antenna.
First let me start by describing what the tool is. The RFIDler is a Software Defined (SD) Low Frequency Only(LFO) Radio (R) (SDLFOR). It is from Aperature Labs. Mine came as an exposed circuit board with n exposed coil antenna.
Thursday, August 20, 2015
Roll your own Pwnie On a Samsung Galaxy Tab 3
If you have ever researched a Pwnie Express device for penetration tests you may have been floored, like I was, by the price/performance ratio. On my recent trip to Defcon23 I stopped at the Pwnie Express table to play with the Pwn Pad https://www.pwnieexpress.com/product/pwn-pad-2014-penetration-testing-tablet/ . Let me start by saying they have taken the idea and put a fit and finish I will never be able to achieve on my own. they have a slick interface and tie all the apps together in a logical and attractive (to me) manner.
However, I do not need slick, I break fit, and I scuff finishes. So rather than pay a lot more than I felt comfortable with I set out to build my own version. Total investment was $100.00 and about 3 hours of my time. Here is how you can make your own:
However, I do not need slick, I break fit, and I scuff finishes. So rather than pay a lot more than I felt comfortable with I set out to build my own version. Total investment was $100.00 and about 3 hours of my time. Here is how you can make your own:
Sunday, August 16, 2015
DEFCON 23 in the books
Defcon 23 was last week in Las Vegas, NV. It was my first year going, but certainly will not be my last. There is no adequate way to describe the number of things brought together in one (actually two) place(s). Not knowing anyone at the convention, I was worried I would spend most of my time on my own searching for things to keep myself entertained. I was wrong. So so wrong. A huge thank you to the folks from DEFCON for keeping an amazing event going.
Now let me go over some of the things I picked up while I was there:
Now let me go over some of the things I picked up while I was there:
Subscribe to:
Posts (Atom)