May 3, 2010 at 2:37 pm #5000
Offensive Security recently posted a 20 minute video at their blog in which they reconstructed a pentest they performed. It’s an excellent video IMHO. Muts has again done a fantastic job and tried to explain every single step he took.
Penetration Testing in the real world. If you are tired of “Hacking with Netcat” webcasts or “Penetration Testing with RPC DCOM”, then this movie is for you. It’s a quick reconstruction of a Security Audit we preformed over a year ago, replicated in our labs. The video is under 20 minutes long, and highly edited – attacks rarely go as quickly and smoothly as this !
Check the video here:-
May 3, 2010 at 5:57 pm #31604morpheus063Participant
Muts strikes back with another great network scenario. Great find Equix3n- – Nice and comprehensive video.
May 3, 2010 at 9:26 pm #31605kriscamaro68Participant
That was a great video thanks for sharing.
May 4, 2010 at 3:40 am #31606KetchupParticipant
Thanks for sharing. That was a great video!
May 4, 2010 at 4:48 am #31607rattisParticipant
I still need to find 20 minutes where I can sit down and watch it. :-
May 4, 2010 at 11:29 am #31608
I think EHNet members can post similar videos constructing scenarios from their actual pentests. That would be an awesome resource as almost everyone has his own little tricks and we can learn from each other. Even writing articles explaining how they approached a pentest would be very useful.
May 4, 2010 at 1:34 pm #31609What90Participant
Excellent demo and explanation for how they did it and the mindset they used to work into the environment. Some great work and clever thinking.
What I take from it, from the defense side, is that some simple, good practices would have stopped the attack in its tracks.
As an example, if the servers weren’t allow outbound access to any locations, the tunneling would have failed. Simple controlled egress filters would have successful “saved” the target from being exploited in this way.
May 4, 2010 at 2:59 pm #31610KetchupParticipant
I think EHNet members can post similar videos constructing scenarios from their actual pentests. That would be an awesome resource as almost everyone has his own little tricks and we can learn from each other.
The OffSec folks built a replica lab environment of the actual pen test. You can’t really include the results of a live pentest in a training video. Most clients wouldn’t go for that. I am wondering how many hours were spent on recreating the environment and creating the video.
May 4, 2010 at 3:54 pm #31611hayabusaParticipant
I dunno, but based on the detail that I’ve heard they have in the OSCP lab (I signed up, today, for the 60-day OSCP v3,) I’d bet they did it pretty quickly. After all, if you KNOW what you exploited, it shouldn’t be too hard to recreate, right? 😉
May 4, 2010 at 7:18 pm #31612mtgardenParticipant
I showed this video to my developers. I used it to interest them in the actual threats posed by “minor holes.” It was an attempt to help them understand how a bad guy leverages various holes to gain control of the entire network.
I also showed a sanitized screenshot of sqlmap dumping a HR DB through a simple website. This was an effort to show them the danger of reusing accounts repeatedly.
I think that the combination worked well. I immediately received email questions and comments.
Anyone else try this?
May 9, 2010 at 8:14 am #31613
Thanks for sharing! downloading now and i will check it later. If it is a DCOM exploit it should be that hard to build it in a replica environment?
May 11, 2010 at 7:13 pm #31614jonasParticipant
Great movie! Keep em coming if anyone have more such videos. Kinda great when it’s not just a tut on a single method, but when its all put together its awesome =)
May 11, 2010 at 7:34 pm #31615zeroflawParticipant
Sweet video! Thanks!
May 12, 2010 at 8:44 am #31616
watched the video the other day and i must say i’m impressed! this truely shows the hacker mindset you need to thourougly scan a complete network, finding the right puzzle pieces to finish and to think out of the box. this one goes into my collection!
May 12, 2010 at 12:08 pm #31617caissydParticipant
@mtgarden: I have showed the video to the developers, managers and even a director where I work. I paused the video every minute or so and explained in simple words what he was doing. It was very, very well received!!!
I will probably start demos and presentations during lunch time on topics such as “How to secure a wireless router”, “SQL Injection”, “How to code securely”, etc…
Even if it wasn’t my goal at all, it kind of put me on the map! ;D
I encourage you guys to do the same.
May 12, 2010 at 2:46 pm #31618
I found more articles by muts explaining how he conducted some pentests. There’s no video this time, still the articles will help a lot of people.
These clearly demonstrate the hacker approach and give you a ‘virtual’ experience of a pentest. Excellent stuff for beginners! Furthermore, I suggest going through sample pentest reports available to you. The methodology section in these reports is nothing more than how the tester approached the pentest. I enjoy going through them, if nothing more than just to see different approaches taken by different pentesters. Moreover, they always give you little tips/tricks.
May 14, 2010 at 8:18 am #31619
man, i cant get enough of those pentest stories! thanks for the find!
the 15min pentest vids are on EH.net also, remember these is more then just a forum 😉
May 14, 2010 at 8:52 am #31620
May 16, 2010 at 10:06 pm #31621rattisParticipant
Finally got around to watching this. Wow is there so much that I don’t know.
May 18, 2010 at 12:18 pm #31622
June 9, 2010 at 8:05 pm #31623UNIXParticipant
Nice video, thanks for sharing.
- You must be logged in to reply to this topic.