Quantcast
Channel: Carnal0wnage & Attack Research Blog
Browsing all 163 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

HERMES

As a follow up to yesterday's post I would like to talk a bit more about HERMES and how it works.INITIAL KNOWLEDGE - First there there is some form of information that comes in indicating a potential...

View Article


Image may be NSFW.
Clik here to view.

More on APTSim

Today I wanted to talk a bit more about APTSim.  We all know by now that the bad guys always get in. Especially determined, well funded and well equipped attackers. We know roughly HOW they are getting...

View Article


Image may be NSFW.
Clik here to view.

Antibiotic Resistant security

I was reading an article recently about how some of the sterilization requirements in factory farms actually encourage more damaging infections which then led me to think about antibiotic resistant...

View Article

Image may be NSFW.
Clik here to view.

DerbyCon Media

mubix and I's talk:DIRTY LITTLE SECRETS THEY DIDN'T TEACH YOU IN PENTEST CLASS - PART 2 (VIDEO) infosecmafia and I's talkPentesting from a Hot Tub Time MachineAlso did an interview with Darren of...

View Article

Image may be NSFW.
Clik here to view.

Metasploit and PowerShell payloads

Quick post, since i mentioned it in the DerbyCon talk, to mention that Metasploit generates PowerShell and PowerShell .net (looks related to this) payloads.msf > use...

View Article


Image may be NSFW.
Clik here to view.

Run a PowerShell module in Meterpreter

I don't know why but powershell and meterpeter just dont play nice.Part of it is the whole interactive shell-ness of powershell. so if you just type "powershell" once you drop to a cmd.exe you wont...

View Article

Image may be NSFW.
Clik here to view.

Basics of Rails Part 1

In this series, I would like to demonstrate some of the basics of building a Ruby on Rails application and how MVC (Model-View-Controller) works. We will discuss some of the security pitfalls as well....

View Article

Image may be NSFW.
Clik here to view.

Basics of Rails Part 2

In the last post, Basics of Rails Part 1, we created and ran the Rails application "attackresearch". Next,  we will change the Web Server to Unicorn as well as introduce the concept of Rake.Something...

View Article


Image may be NSFW.
Clik here to view.

More with Mimikatz (Crypto Module)

So we all know that mimikatz dumps hashes and passwords!!! from memory which is the shiznazzle.But, now that its working in memory, you can do lots more with it. Below are the various...

View Article


Image may be NSFW.
Clik here to view.

Basics of Rails Part 3

If you've been following along in this series you've already created a Rails application called "attackresearch, configured your Ruby/gem environment with RVM, and created a Rake task to start the...

View Article

Image may be NSFW.
Clik here to view.

Wigle Wifi Wardriving meets Google Earth for Neat Wifi Maps

I needed to make a map the access points for a client.  Since i cant show that map, i made another using the same technique.First take your handy dandy Android device and install  Wigle Wifi...

View Article

Image may be NSFW.
Clik here to view.

Group Policy Preferences and Getting Your Domain 0wned

So i put this link out on twitter but forgot to put it on the blog.I did a talk at the Oct 20012 NovaHackers meeting on exploiting 2008 Group Policy Preferences (GPP) and how they can be used to set...

View Article

Image may be NSFW.
Clik here to view.

.git you some with DVCS-Pillage

Ron over at SkullSecurity put out a post on  Using "Git Clone" to get Pwn3DWorth a read if you havent.  Unfortunately the key to his post relied on wget and directory listings making it possible to...

View Article


Image may be NSFW.
Clik here to view.

Basics of Rails Part 4

In this portion of the series, we will create the foundation for a login page and deal a little bit more with the Model portion of MVC.We need to be able to assign the following information to a...

View Article

Image may be NSFW.
Clik here to view.

The Biggest Problem in Computer Security

People tend to focus on various areas as being important for computer security such as memory corruption vulnerabilities, malware, anomaly detection, etc. However the lurking and most critical issue in...

View Article


Image may be NSFW.
Clik here to view.

Attack Research and Trail Of Bits Partnership

Earlier this week Trail Of Bits announced our partnership with them, offering trainings in New York City. We are very excited to team up with a great company, but also to start delivering practical...

View Article

Image may be NSFW.
Clik here to view.

Geo-stalking with Bing Maps and the Twitter Maps App

Geo/Social stalking is fun.  Bing maps has the ability to add various "apps" to the map to enhance your bind maps experience. One of the cooler ones is the Twitter Map app which lets you map geotagged...

View Article


Image may be NSFW.
Clik here to view.

Attack Research Training Release

All too often, we at Attack Research have found that students are not being taught, or are not allowed, to properly perform real-world scenarios. For example, they want to run vulnerability scanners on...

View Article

Image may be NSFW.
Clik here to view.

Windows 7 and SMB Relay

Lately we have had a number of posts about our training classes, and I said I would put something technical up on the blog. In one of our classes, we teach students how to think like real bad guys and...

View Article

Image may be NSFW.
Clik here to view.

On Sophistication

Having played both the attacker and defender role for many years something I have often seen and even done myself is make statements and assumptions about the "sophistication" of my adversary.Often...

View Article
Browsing all 163 articles
Browse latest View live