Sunday, December 18, 2016

RAM File System in Python

One of the first things you are taught when studying Computer Forensic Investigation is the concept of evidence volatility. Simply put, some pieces of evidence will be available for collection for a much shorter amount of time than other pieces. You must always collect evidence from the most to least volatile. For a concrete example of "why" this practice must be applied you can consider the bot I have developed below.

Sunday, December 4, 2016

Incident Response Reading Material



The SANS institute has been nice enough to collect a list of checklist and procedural documentation to aid the Computer Forensic Examiner in the possible tasks they may be faced with. https://www.sans.org/score/checklists

Sunday, September 11, 2016

Escalate Plowman – Linux FW Privilege Escalated Download and Execute


The Escalte Plowman tool (https://github.com/dreilly369/EQGRP-Auction-Files/tree/master/Firewall/EXPLOITS/ESPL) is a parameterized dropper (or a privelege escalation exploit) against WatchGuard firewalls (and likely a few others) of unknown versions. It injects code via the ifconfig command. It uses FTP, TFTP, or HTTP (via wget) for the download portions. The code makes some assumptions about the environment. For instance, when using the TFTP protocol it assumes the existence of a custom tftp client located at the hard-coded location /usr/rapidstream/bin/tftp. The sample also makes the assumption of the interface being eth0.

Saturday, September 10, 2016

Extrabacon's Sploit Framework 1: Static Analysis


Sploit is the modular core that runs the EXTRABACON exploit in the (supposed) Equation group tool dump. While everyone is focused on the news of the 0-days, the recent porting of this old exploit to newer ASA versions (http://www.securityweek.com/leaked-cisco-asa-exploit-adapted-newer-versions) I chose to look at the underlying structure. First because there are already a number of talented researchers covering every angle of each exploit in greater detail than I could.

Saturday, August 20, 2016

RFIDler revisited: RFIDling with Proximity card UID collection


My first few projects scripting for the RFIDler were an exploratory effort. As you can see from my integration post and my first auto-capture script there were a number of features I breezed passed. The main one I want to discuss now is the RFIDler python class.

Sunday, July 10, 2016

Cracking a OTP Cipher: Python Unit Testing by Example - Part 2 Unit Testing with Python

Now that we have defined the steps for our algorithm (if you have not read part 1 go do that first) we can begin to describe what features we want the core of our OTP reuse cracker to have. This is where Unit Tests fit in. They describe explicitly what the System needs to do to pass and be considered

Cracking a OTP Cipher: Python Unit Testing by Example - Part 1 Encryption Motivation

This article is special to me because it combines 3 things I love dearly in one project. Today I am going to talk about how someone (namely me) can use The Python language to automate an attack on an implementation of the One Time Pad Encryption Scheme that ignored the "One-Time" portion of the name. Python, Unit Testing, and Attacking Crypto...does it get any better?


Sunday, June 5, 2016

Second Order Buffer OverFlow Attacks (SOBOF): Attacking underlying components


The C programming language is still prevalent in computing today. It may be tempting to think that interpreted languages like Java and Ruby have taken over, but this belief is unfounded or at least limited in scope. Even interpreted, Type-safe (in the sense of defining 'undefined' behavior as Exceptions), languages have had their applications ripped open by a buffer overflow. Not in a buffer they contained directly. No these errors exist in the core of the system. In the Kernel hooks and Drivers that every program reliant on features of the Operating System use.

Saturday, May 14, 2016

Attacker's Tool Chest: Anatomy of tools and tactics from the field on network security


When you start trying to talk to people about Security topics you may come to find that not everyone has a clear understanding what different terminology actually means. I don't think it is their fault really. We as a culture tend to under-explain topics to outsiders. For ease of explaining something to a non-technical person we will often overload a term (like Virus), or switch to an improper term (Like Trojan) that they are more likely to know...even if they don't understand what it means.
To combat that I think it is a good idea to get a running list of terms I have had to explain or clarify to people. These are my own explanations, meant to capture the unique qualities of each type of Tool or Technique.

Sunday, April 24, 2016

Knowing the Enemy: Advanced Persistent Threat report analysis Pt. 2



I am back for part 2 of the analysis breakdown of the ICIT APT briefing. After an excellent discussion on the topic of Malware Evolution with someone from the Malware Bytes team, I think it is time to finish what I started several weeks ago. Here is the second half of my analysis or the APT report.

Tuesday, April 19, 2016

The Jolly Roger Flies Again: BSides Tampa


This past Saturday I had the pleasure of presenting my Rellik Project once again. This time at the Security Bsides event in Tampa FL. Hosted by the (ISC)2. The topic of Botnets has been very popular and my audience was very involved. It was a fantastic day all around.

Sunday, April 10, 2016

Knowing the Enemy: Advanced Persistent Threat report analysis Pt. 1



Advanced Persistent Threats or APTs has become a well known term over the last 5 years. In terms on Network security an attack is considered

Tuesday, April 5, 2016

Be careful what you wish for: Information Leaks in Job Searches

Your company is leaking data. That is not a question. It simply is a fact. The reason is: job postings. The amount of information companies give out freely about their organization, network technology, infrastructure, etc., is amazing. It is also a potential gold mine for a would be attacker. Consider the real (but edited for privacy) job description found on a very popular classified site:

Saturday, March 19, 2016

Foretelling the future: Estimatig Software Project Lifespans

In my professional career as  Technologist I have evolved through many stages. Why it seems like just yesterday I was scanning for broken HREFs. Now, I am in charge of task management for one of the most talented development teams I have ever gotten the privilege of coding with. Like every major paradigm shift though, this one has come with a whole new set of challenges and skills. One of the most important ones is accurately estimating project timelines. As a manager, I wanted an easy way to come up with realistic project. This is the result of that research.

Thursday, March 10, 2016

Pick a card: Playing Cards as Trust Tokens


While preparing for my Bsides: Seattle presentation I met a guy who showed me an idea for the coolest 2nd factor of authentication I think I have ever seen. Anyone who knows me even a little bit knows I have a love of close up magic, sleight of hand, and anything generally dealing with card and coin magic. So when the guy pulled out a deck of cards I was instantly intrigued. When he told me it was his password I had to see it to believe it.

Sunday, February 21, 2016

BSides Seattle

First, let me say: to the organizers, supporters, participants, and my fellow presenters, Thank you for having me out. I had an excellent time and I learned tons. To the guys from TOOOL and Locksport, a special thank you. You sparked a love of locks and picking in my son. He spent well over half his time learning from you, and he hasn't been able to stop since.

If you are coming here after my presentation for slides and code they will be up by the end of this week. The code will be on my github https://github.com/dreilly369 . The issue with the demo was local (and due solely to my pre-talk jitters). The code is thankfully in good working order still. I will post my examples for:

HTTPS w/ STS
DNS Tunneling
Stegonagraphic embedding
CherryPy Server
Several Example bots to show possible uses

Thank you for you patience. I know a talk is always more fun with a live demo and I truly wish I had delivered on that front. Still, aside from the Demos above not happening, I hope you enjoyed yourself and learned something about Botnet Architecture!

EDIT: Slides have been given to the organizers and the code has been posted to the GitHub as promised. Please feel free to leave any comments below

Friday, January 22, 2016

Another speaking date announced

I have added another presentation to my schedule of upcoming events. If you will be attending the BSides Seattle Event February 20th, 2016

Sunday, January 10, 2016

Coding the Vigenère Square Cipher

Since I was a young boy, one of my favorite things to play around with has always been ciphers. Although they have largely fallen out of use I still enjoy studying different ciphers and trying to break them down into python algorithms. Today  I will share one such project. The Advanced Vigenère Square Cipher.

Friday, January 1, 2016

Speaking date announced


I have recently confirmed my acceptance to speak at the Security BSides: Tampa Bay event later this year. I am excited to be presenting a topic on Bot Net Architectures.