Quantcast
Channel: Carnal0wnage & Attack Research Blog
Browsing all 163 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

DevOoops: Client Provisioning (Kickstart Files)

Notes from the 2015 Devoops talk. Posting it so i can remove it from the slide deck but still refer to it.  Also relevant from a common problems with devops theme.Kickstart Files3 ways to set root...

View Article


Image may be NSFW.
Clik here to view.

DevOoops: Client Provisioning (Vagrant)

Notes from the 2015 Devoops TalkVagrant used to ship with a default keypair and was difficult to rotate.**fixed with new versions of Vagrant. Finding hosts using the default key still pretty likely.Did...

View Article


Image may be NSFW.
Clik here to view.

DevOoops: In-Memory Databases (Redis) Part 2

Doing part 2 first as the altcoin mining stuff is interesting with the mongoDB/elasticsearch ransomware stuff currently going on.A redis developer dropped an interesting piece of info...

View Article

Image may be NSFW.
Clik here to view.

Kano review

Below is a quick review of the Kano computer.WTF is it?The kano computer is a raspberry pi based computer that is meant for kids to put together and build themselves.  Looks a bit like this:propaganda...

View Article

Image may be NSFW.
Clik here to view.

InsomniaHack Trip Report

Insomni'Hack Info:https://insomnihack.ch/Favorite talksBridging the gap between ICS(IoT?) and corporate IT securityStefan LüdersI really enjoyed this talk hearing how an organization defends in a BYOD...

View Article


Image may be NSFW.
Clik here to view.

Raspbian/Kano OS in QEMU

Quick notesI wanted to be able to boot the Kano OS in a virtual machine so i could play hack minecraft with the kids and play along with the Kano OS desktop/games.  I was trying to avoid plugging a...

View Article

Image may be NSFW.
Clik here to view.

DevOoops: Hadoop

What is Hadoop?"The Apache Hadoop software library is a framework that allows for the distributed processing of large data sets across clusters of computers using simple programming models. It is...

View Article

Image may be NSFW.
Clik here to view.

Mentoring: On meeting your **Heroes**

Mentoring: On meeting your  **Heroes**I put heroes in asterisks because none of us have paparazzi following us around. I regularly use Val Smith's quote about even the most popular infosec person is...

View Article


Image may be NSFW.
Clik here to view.

NTP/SNMP amplification attacks

I needed to verify a SNMP and NTP amplification vulnerability was actually working. Metasploit  has a few scanners for ntp vulns in the auxiliary/scanner/ntp/ntp_* and it will report hosts as being...

View Article


Vulnerability Disclosure, Free Bug Reports & Being a Greedy Bastard

Backstory:Most of my life I've been frustrated/intrigued that my Dad was constantly upset that he would "do the right thing" by people and in return people wouldn't show him gratitude... up to straight...

View Article

Image may be NSFW.
Clik here to view.

Follow up to the vuln disclosure post

Summary of responses from this post: http://carnal0wnage.attackresearch.com/2017/06/vulnerability-disclosure-free-bug.htmlI wanted to document/summarize some of the responses I received and some of the...

View Article

Image may be NSFW.
Clik here to view.

Certutil for delivery of files

Quick post putting together some twitter...

View Article

Mentoring: On Blogging

Received the question about blogging. More specifically:How and WhyHow to benefit from bloggingHow to be consistent with postingIn my mind, the key to success and blogging is to be totally selfish in...

View Article


Books I'd give to my 30yr old self

A good friend/co-worker recently turned 30.  In preparation for his birthday party I gave some thought to my 30th birthday and the things I now know or have an idea about and what I wish I had known at...

View Article

Image may be NSFW.
Clik here to view.

Dark Side Ops I & 2 Review

Dark Side Ops I https://silentbreaksecurity.com/training/dark-side-ops/https://www.blackhat.com/us-17/training/dark-side-ops-custom-penetration-testing.html  A really good overview of the class is here...

View Article


Image may be NSFW.
Clik here to view.

AWS EC2 instance userData

In the effort to get me blogging again I'll be doing a few short posts to get the juices flowing (hopefully).Today I learned about the userData instance attribute for AWS...

View Article

Image may be NSFW.
Clik here to view.

I found a GCP service account token...now what?

Google Cloud Platform (GCP) is rapidly growing in popularity and i haven't seen too many posts on  f**king it up so I'm going to do at least one :-)Google has several ways to do authentication but most...

View Article


Kubernetes: kube-hunter.py etcd

I mentioned in the master post one a few auditing tools that exist. Kube-Hunter is one that is pretty ok.  You can use this to quickly scan for multiple kubernetes issues.Example run:$...

View Article

Image may be NSFW.
Clik here to view.

Kubernetes: open etcd

Quick post on Kubernetes and open etcd (port 2379)"etcd is a distributed key-value store. In fact, etcd is the primary datastore of Kubernetes; storing and replicating all Kubernetes cluster state. As...

View Article

Image may be NSFW.
Clik here to view.

Kubernetes: cAdvisor

"cAdvisor (Container Advisor) provides container users an understanding of the resource usage and performance characteristics of their running containers. It is a running daemon that collects,...

View Article
Browsing all 163 articles
Browse latest View live


Latest Images