.

Improvised Cyber Exploitation Devices

<<

sil

User avatar

Hero Member
Hero Member

Posts: 551

Joined: Thu Mar 20, 2008 8:01 am

Location: ::1

Post Fri May 27, 2011 10:31 am

Improvised Cyber Exploitation Devices

Was bored so I figured I'd do a write up on how to use ModSecurity as an offensive pentesting testing (huh!?) ;)

http://www.infiltrated.net/index.php?op ... &Itemid=39
<<

hayabusa

User avatar

Hero Member
Hero Member

Posts: 1662

Joined: Mon Jan 29, 2007 2:59 pm

Post Fri May 27, 2011 11:26 am

Re: Improvised Cyber Exploitation Devices

As always (and expected)... yet ANOTHER great writeup, sil.

Thanks (these are useful, not only for OUR learning, but for easily proving points, to those whom we're trying to persuade, regarding security practices and postures.  ;)
~ hayabusa ~ 

"All men can see these tactics whereby I conquer, but what none can see is the strategy out of which victory is evolved." - Sun Tzu, 'The Art of War'


OSCE, OSCP , GPEN, C|EH
<<

sil

User avatar

Hero Member
Hero Member

Posts: 551

Joined: Thu Mar 20, 2008 8:01 am

Location: ::1

Post Fri May 27, 2011 11:43 am

Re: Improvised Cyber Exploitation Devices

I was going to use Canvas client side attacks but not everyone has Canvas so I did the next best thing with Metasploit on a 2008 server. I may or may not re-do the article, kind of short :\
<<

R3B005t

Newbie
Newbie

Posts: 43

Joined: Wed Mar 09, 2011 9:03 am

Location: NVA/D.C.

Post Mon May 30, 2011 7:41 pm

Re: Improvised Cyber Exploitation Devices

Sil you are a mad genius, if this is what you get into when your bored I can only imagine what your capable of when properly motivated  ;)
<<

maxpeck

User avatar

Newbie
Newbie

Posts: 21

Joined: Mon Sep 28, 2009 11:27 am

Post Tue May 31, 2011 10:45 am

Re: Improvised Cyber Exploitation Devices

Screw Data & Neo...SIL!

S = Sentient
I = Info-Security
L= Lifeform




Max
Max
<<

alucian

User avatar

Full Member
Full Member

Posts: 228

Joined: Mon Dec 29, 2008 2:01 pm

Location: Montreal, Canada

Post Tue May 31, 2011 12:02 pm

Re: Improvised Cyber Exploitation Devices

Very interesting article.

I would like to see more like this one on the net. Also, I would be curious whom are you following (blogs, twitter...)
CISSP ISSAP, CISM/A, GWAPT, GCIH, GREM, GMOB, OSWP
<<

sil

User avatar

Hero Member
Hero Member

Posts: 551

Joined: Thu Mar 20, 2008 8:01 am

Location: ::1

Post Tue May 31, 2011 2:32 pm

Re: Improvised Cyber Exploitation Devices

These are the only blogs I follow mind you, almost all are forensic incident response:

http://taosecurity.blogspot.com/
http://console-cowboys.blogspot.com/
http://windowsir.blogspot.com/
http://blog.didierstevens.com/
http://blog.mandiant.com/
http://dvlabs.tippingpoint.com/blog/

As for twitter, I don't really follow anyone nor do I use it anymore. Most of what I learned its come via tinkering. I read a lot of books - and I mean a lot. Everything from crypto, to systems, to networking.
<<

alucian

User avatar

Full Member
Full Member

Posts: 228

Joined: Mon Dec 29, 2008 2:01 pm

Location: Montreal, Canada

Post Tue May 31, 2011 3:10 pm

Re: Improvised Cyber Exploitation Devices

YES!

I was following the first one, but had no ideea about the others. I put them on my list and I will try to read them as much as possible.

About twitter... well, I tried it once to use it, didn't get the idea and I decided that it is not for me. So... no twitter for me. Actually, lately I only follow security related websites and news (I know I am not paranoic, and I enjoy doing this).

Besides security I read a couple of books about nutrition (I recommend all of you Can We Live 150 Years?: Your Body Maintenance Handbook by Mikhail Tombak ), and other books about motivation and psychology (in order to keep myself sane :) )

Thanks agains, and I really like your posts.
CISSP ISSAP, CISM/A, GWAPT, GCIH, GREM, GMOB, OSWP
<<

AndyB67

User avatar

Full Member
Full Member

Posts: 100

Joined: Fri Jan 14, 2011 7:13 am

Location: UK

Post Tue May 31, 2011 4:48 pm

Re: Improvised Cyber Exploitation Devices

Sil, your mind is like a perpetual motion machine set to produce cyberstuff.  How do you do it??
Net+ Sec+ More to come
<<

sil

User avatar

Hero Member
Hero Member

Posts: 551

Joined: Thu Mar 20, 2008 8:01 am

Location: ::1

Post Tue May 31, 2011 5:04 pm

Re: Improvised Cyber Exploitation Devices

There is nothing special that I can do that no one else can't. I know systems really well and I know networking very well... Security is the hobby part of the equation. I tend to think in the following terms:

1) I am in a game that I need to win
2) I need to NEVER get caught
3) I need to be aware that the admin is better than me
4) How would I DEFEND this trget system on an impenetrable scale if possible?
5) Now how do I break those defenses?
6) How do I do so with as little noise as possible.

Offense believe it or not is somewhat easy. It's delivery that becomes tough. I can almost guarantee you that even in the most compartmentalized networks and systems, there is always error. Its understanding the errors, knowing what to look for.

When I do things I almost always lab things up for my sanity and do my best to understand what my opponent can possibly see. I then try to figure out ways to minimize that. Here is a kicker for you... Tiger... Tiger is a Unix auditing tool. In the early mid 90's I would love finding it on clients' machines... Because Tiger was almost often misconfigured, I would gladly run Tiger on a machine I compromised ;) This enabled me to see the flaws I needed to find. The admins? They thought all was gravy, after all, Tiger was auditing their system.

Return to Cyber Warfare

Who is online

Users browsing this forum: No registered users and 0 guests

cron
.
Powered by phpBB® Forum Software © phpBB Group.
Designed by ST Software