HERMES
As a follow up to yesterday's post I would like to talk a bit more about HERMES and how it works.INITIAL KNOWLEDGE - First there there is some form of information that comes in indicating a potential...
View ArticleMore on APTSim
Today I wanted to talk a bit more about APTSim. We all know by now that the bad guys always get in. Especially determined, well funded and well equipped attackers. We know roughly HOW they are getting...
View ArticleAntibiotic Resistant security
I was reading an article recently about how some of the sterilization requirements in factory farms actually encourage more damaging infections which then led me to think about antibiotic resistant...
View ArticleDerbyCon Media
mubix and I's talk:DIRTY LITTLE SECRETS THEY DIDN'T TEACH YOU IN PENTEST CLASS - PART 2 (VIDEO) infosecmafia and I's talkPentesting from a Hot Tub Time MachineAlso did an interview with Darren of...
View ArticleMetasploit and PowerShell payloads
Quick post, since i mentioned it in the DerbyCon talk, to mention that Metasploit generates PowerShell and PowerShell .net (looks related to this) payloads.msf > use...
View ArticleRun a PowerShell module in Meterpreter
I don't know why but powershell and meterpeter just dont play nice.Part of it is the whole interactive shell-ness of powershell. so if you just type "powershell" once you drop to a cmd.exe you wont...
View ArticleBasics of Rails Part 1
In this series, I would like to demonstrate some of the basics of building a Ruby on Rails application and how MVC (Model-View-Controller) works. We will discuss some of the security pitfalls as well....
View ArticleBasics of Rails Part 2
In the last post, Basics of Rails Part 1, we created and ran the Rails application "attackresearch". Next, we will change the Web Server to Unicorn as well as introduce the concept of Rake.Something...
View ArticleMore with Mimikatz (Crypto Module)
So we all know that mimikatz dumps hashes and passwords!!! from memory which is the shiznazzle.But, now that its working in memory, you can do lots more with it. Below are the various...
View ArticleBasics of Rails Part 3
If you've been following along in this series you've already created a Rails application called "attackresearch, configured your Ruby/gem environment with RVM, and created a Rake task to start the...
View ArticleWigle Wifi Wardriving meets Google Earth for Neat Wifi Maps
I needed to make a map the access points for a client. Since i cant show that map, i made another using the same technique.First take your handy dandy Android device and install Wigle Wifi...
View ArticleGroup Policy Preferences and Getting Your Domain 0wned
So i put this link out on twitter but forgot to put it on the blog.I did a talk at the Oct 20012 NovaHackers meeting on exploiting 2008 Group Policy Preferences (GPP) and how they can be used to set...
View Article.git you some with DVCS-Pillage
Ron over at SkullSecurity put out a post on Using "Git Clone" to get Pwn3DWorth a read if you havent. Unfortunately the key to his post relied on wget and directory listings making it possible to...
View ArticleBasics of Rails Part 4
In this portion of the series, we will create the foundation for a login page and deal a little bit more with the Model portion of MVC.We need to be able to assign the following information to a...
View ArticleThe Biggest Problem in Computer Security
People tend to focus on various areas as being important for computer security such as memory corruption vulnerabilities, malware, anomaly detection, etc. However the lurking and most critical issue in...
View ArticleAttack Research and Trail Of Bits Partnership
Earlier this week Trail Of Bits announced our partnership with them, offering trainings in New York City. We are very excited to team up with a great company, but also to start delivering practical...
View ArticleGeo-stalking with Bing Maps and the Twitter Maps App
Geo/Social stalking is fun. Bing maps has the ability to add various "apps" to the map to enhance your bind maps experience. One of the cooler ones is the Twitter Map app which lets you map geotagged...
View ArticleAttack Research Training Release
All too often, we at Attack Research have found that students are not being taught, or are not allowed, to properly perform real-world scenarios. For example, they want to run vulnerability scanners on...
View ArticleWindows 7 and SMB Relay
Lately we have had a number of posts about our training classes, and I said I would put something technical up on the blog. In one of our classes, we teach students how to think like real bad guys and...
View ArticleOn Sophistication
Having played both the attacker and defender role for many years something I have often seen and even done myself is make statements and assumptions about the "sophistication" of my adversary.Often...
View Article