Saturday, December 12, 2009
ASCII Chart
Thursday, December 10, 2009
Meterpreter Post Exploitation -> Setting up a Netcat backdoor.
Comments & feedback are Welcome.
Best Regards.
Installing Meterpreter as a Service VoD
Comments & feedback are Welcome.
Best Regards.
Meterpreter Post Exploitation -> Using ESPIA for Screen Capture
Comments and feedback are Welcome.
Best Regards.
Metasploit Meterpreter Pivot VoD
Comments and feedback are Welcome.
Best Regards.
Monday, December 7, 2009
Meterpreter Pass the Hash VoD
Comments and feedback are Welcome.
Best Regards.
Meterpreter Client-Side Exploitation VoD
Comments and feedback are Welcome.
Best Regards.
Indiscipline in Policy Enforcement -> Incidents.
http://blog.dojosec.com/2009/11/marcus-mailbag-policy-enforcement-and.html
For those who are not aware of DojoSec, I request you to know about them here -> DojoSec.
Marcus has shared his views n an email he received on the subject of Policy, Enforcement and Monitoring.
The email hits the right spot. But the observations are not really new. I believe the issue is more due to sheer Indiscipline & laxity in Top -> Down hierarchy.
The focus of mgmt & the IT in *most* (but not all orgn) is to bring in a brand product, get it configured n let it wave its magic wand to ward off attempts of all evil entities from their corporate network.
The management likes to talk a lot about how much they have sanctioned for this new f/w or that IDS and that these devices better do their jobs. But they are the same mgmt guys who ask (and get) unrestricted access for research purposes (whatever!) from the IT guys, ~off the record~,
(we know what you've been researching bout, pervs).
And it came as no surprise to me when I managed Enterprise Anti Virus solution, that I'd see frequent calls about their laptops showing errand behaviors or that li'l pop up on the corner coming up every third day in the week.
So policy planning is one thing & enforcing it from top -> down is totally different. This must get worked up from the policy makers to the ground.
This does not imply in any case, that IT admins are flawless. Minus the mgmt adherence to policy, things take shape accordingly in IT dept as well. Seldom will you ~not~ find that one system in the corner under the desk, which has its LAN port LED continuously blinking 24/7. I personally had come to know of one *large* orgn where dedicated ~research~ boxes were kept & maintained in the datacenter having a SAN storage with a direct Internet conn without any restriction (not my orgn, though).
I feel that at IT team levels, if the direction and adherence does not seep down from the mgmt, bypassing protocols in place n overlooking policies becomes a thrill n adventure. Not to mention the pride that comes with having control of the set up and being able to ~manage~ stuff. This can get *really* nasty, if you've been there, you'll know what I mean. I've been.
Hence, monitoring, rotation of duties, periodic auditing becomes essential to identify & rectify the broken processes. Which again should come as a result of osmosis from the management.
The issue is such violations continue to occur within organizations generally in the knowledge of managers, mgmt fellows etc. It is when an incident happens that everyone comes out of their trance and there the blame game starts. Of course, the information assets are hit, the damage is made & someone, usually at the IT team is going to bear its brunt, which sucks in its own way.
Not too far back, one *major* org, was breached, and the network set up for that project was all 'wr mem'd. It was not a pentest, by any chance, you'd agree. It'd been a 'getting back at ya' moment which I can't share much about. This never came to light given the whole network security team for that project was using pcAnywhere with weak passwords - from home, without any VPN!
Only when the blind, inherent belief in products - both commercial n open source - is shifted to the mentality of enforcing the policies first, it's going to make a difference & control scope of incidents n asset loss.
Best Regards.
Thursday, November 5, 2009
Change is the only constant.
Saturday, October 31, 2009
Tuesday, August 18, 2009
SandCat v3.8 Released
Sunday, August 9, 2009
MonkeyFist v0.4 Released
Hexagon Security Group releases MonkeyFist, a dynamic Request Forgery attack tool. (http://hexsec.com/)
About
MonkeyFist is a tool that creates dynamic request forgeries based on cross-domain data leakage. The tool then constructs a payload based on data in the payloads.xml file and sends it to the user's browser. This may include session data bypassing protection mechanisms for Cross-Site Request Forgery.
Written in
It is written in Python which means it is cross platform. Many operating systems already come with Python installed. The only dependency as of now is that lxml be installed. Currently this is just being used for the fixation payload type.
Read the Dynamic CSRF paper here
http://hexsec.com/docs/Dynamic_CSRF_rev1.pdf/view
More Information
For usage or practical examples, check out the Neohaxor blog.
Best Regards.
Thursday, July 30, 2009
Presentation: Botnets
Friday, July 24, 2009
RainbowCrack 1.4
RainbowCrack 1.4 is released
http://project-rainbowcrack.com/
This version focus on more effective rainbow table file format. New features:
- New compact rainbow table file format (.rtc) reduce rainbow table size by 50% to 56.25%
- New rt2rtc utility convert rainbow table from raw file format (.rt) to compact file format (.rtc)
- New rtc2rt utility convert rainbow table from compact file format (.rtc) to raw file format (.rt)
- The rcrack/rcrack_cuda program support both .rt and .rtc rainbow table file format
- Conversion from non-perfect to perfect rainbow table is supported by rt2rtc utility
Smaller rainbow table significantly improve table lookup performance!
Best Regards..
Thursday, July 23, 2009
Hacking CSRF Tokens using CSS History Hack
Detailed write up on new CSRF Token hack using CSS History:
http://securethoughts.com/2009/07/hacking-csrf-tokens-using-css-history-hack/
Proof of Concept here:
http://www.securethoughts.com/security/csrfcsshistory/csrfscan.html
Best Regards.
Anatomy of a Twitter Attack.
A Good write up on the recent Twitter attack:
http://www.techcrunch.com/2009/07/19/the-anatomy-of-the-twitter-attack/
Best Regards.
Sunday, July 12, 2009
Quick update: Botnet lab test
Saturday, July 11, 2009
Back...
Tuesday, June 30, 2009
SPAM Template...
%SI_rnd10 the most %SI_rnd11 %SI_rnd12 of all men?
Does your %SI_rnd13 make it %SI_rnd14 for you to %SI_rnd15 yourself in %SI_rnd16?
Monday, June 8, 2009
Botnets: The Silent Threat - Part II

Wednesday, June 3, 2009
Botnets - The Silent Threat
Topics I will cover here:
+ What is a Botnet
+ Top Botnets
+ Why Botnet?
+ Elements
+ Features
+ Elements of an Attack
+ Stages of an Attack
+ Detecting a Bot
+ Defending against Botnets
What is a Botnet
Botnet - bot-net - is a network of bots. A bot is a program which can perform autonomous actions in response to instructions. The bots reside on the systems which have certain vulnerabilities that are successfully exploited by an attacker. The objective of the bot is primarily to report to a central server controlled by the attacker & wait for further instructions.
The infected system is also known as a zombie. Why? Because these exploited systems work normally & the users / owners do not see any changes in the activity or performance of the systems. The Zombie rises only when commanded by its Control server. As soon as it receives the command(s), it springs into action & starts serving his master dutifully.
Top Botnets
With every passing year, there have been several botnets that were identified as the Top contenders of their times. The severity & efficiency of these botnets is usually measured by the bot's defending controls against reverse-engineering and/or prevention & the rate of increase of their bot network.
These are only a few botnets that have shown the power of the human mind & the efficiency of a smart botnet:
Sl. No. Name Botnet Size Spam CapacityIt would be interesting to realize that these are just a very, very small tip of the iceberg. Conficker had been on hunting spree for so long even after it was identified. There are many which haven't even yet been found, and remember with each passing moment that a system is on the Internet, the possibility of it being successfully hit increases.
1. Conficker 10,000,000+ 10 billion/day
2. Kraken 495,000 9 billion/day
3. Srizbi 450,000 60 billion/day
4. Bobax 185,000 9 billion/day
5. Rustock 150,000 30 billion/day
Why Botnet?
So why would someone use a Botnet if systems can be exploited remotely, with new & old attack vectors improving with technology - viruses, worms, trojans, client-side exploitation, web attacks and what not?
True, the attack vectors are present & they can do their job neatly. But in order to fully utilize the individual systems exploited via these vectors, these systems must be under some sort of centralized or intelligent control. The botnet is a consistenly increasing network of infected systems that is under direct control of the attacker. With one command from anywhere in the world, for example, an enterprise can be brought down to its knees.
That's the true power of botnet.
Elements of Botnet
+Bot herder
A bot herder is the creator of the botnet. The bot herder controls the bot remotely usually using IRC or HTTP. The bot herder ensures security over his bots, tracks progress & maintaines the CnC.
+Command n Control (CnC)
Command n Control usually runs on an IRC or HTTP server. This is primarily responsible for tracking & updating bots and sending attack launch instructions to bots.
+Bots
A bot or a bot code is the program / malicious payload which resides on & controls the host and performs the instructions sent by the CnC.
Features of A Bot
Just like any other executable, a bot has a source code. The source code defines the structure & the function(s) that a bot can perform.
Some of the functions integrated in a bot are:
1. Hidden presence - hidden from task manager, process explorer, anti-virus, IDS, host firewalls.
2. Killing Anti-Virus processes.
3. Killing rival bots - yes, the war is all around!!
4. Covert communications - using http or irc or IM protocols to communicate with the CnC.
5. Auto Run
6. Automatic Update
The bot usually have a modular structure. It enabled the bot writer or the bot herder to dynamically add or update or remove the functions or exploit codes to the bot source code. After this modification, the bot source code is compiled & built to generate the new version. And with a single command through CnC, all the bots can update the changes immediately.
Part II: coming up...
CISSP: My Study Plan
My Study Resources:
+ Clement's CISSP introductory video (www.cccure.org/flash/intro/player.html/)
+ Shon Harris All-in-One (AIO) 4th Edition
+ ISC2 Official CBK Guide (www.amazon.com/Official-ISC-Guide-CISSP-Press/dp/0849382319)
+ Shon Harris CISSP CBT/DVD (www.cccure.com/cissp/shon-harris-cissp-dvd-tutorial/prod_2.html)
+ www.cccure.org CISSP forum
+ www.freepracticetests.org CISSP Quizzer
+ Notes/Aide Memoire available on cccure.org CISSP forum
+ CISSP Gold Edition Questions & Answers
+ Shon Harris AIO Quiz (in the CD)
Time Duration for Preparation:
January last week - March end 2009 -> 3-5 hours after work. Weekends -> 5-6 hours - slowly tasting the subject matter & letting it seep in.
April 2009 - May 15, 2009 - > 7-9 hours every day - Time to pace up & complete the preparation.
During this time, I completed 2 other certifications & 1 training that definitely helped me be comfortable with the domain content.
My Study Plan (in that order):
+ Finished Shon Harris CBT/DVD
+ Completed one 100-question quiz for each domain as I completed the domain from SH CBT
+ Read Shon Harris AIO 4th edition
+ Complete Q&A at the end of each AIO Chapter.+ Revise each domain through Notes/Aide Memoire available at www.cccure.org CISSP forum.
+ Read cccure.org forum posts, questions & responses, the reasoning behind the solution!
+ Complete Full Length quizzes for individual domain(s)
+ Read OIG
+ Complete Gold Edition Advanced Sample Q&A
+ Complete 10 Full Length quizzes (group of 3 & 4 domains)
+ Read my notes
Important points that will help you:
+++Pre-Booking+++
+ Be mentally prepared before you begin preparation.
+ Complete all domains. No matter how many years you have been in the industry, you should always complete all the domains.
+ Do quizzes from different sources. And know the reason why the correct answer is correct & the incorrect answer is incorrect.
+++Day before the Exam+++
+ Organize all the documents required for the exam day & keep it in your bag - Admission Ticket, ID cards - Driving Licence / Passport, Company ID etc.
+ First Rule of tackling this Exam - Attempt All Questions.
+ Mark the questions you are unsure of, or finding tough to answer or taking too long to answer. Come back to them once you are done with all other questions.
+ By this time, after review, you will have most certainly changed some of your answers. Do a review now of your answer sheet to make sure that you filled 'correct answers in the correct bubble.'
+++Post Exam+++
+ Catch up with your family, friends.
+ Relax & enjoy coz you have done your part.
+ The most important of all: Think Positive.
Congratulations!! You passed the CISSP examination.
Suddenly, the excitement turned to nervousness & the mouse pointer stopped before it could click on the label. It was there & I wouldn't click on it. I stopped there for a moment. Unsure if I must open it now that it's here. So I chanted on the higher energy & opened the email. Many successful candidates had shared that the Pass mail has a word 'Congratulations' in the subject line. Well, my mail didn't had one! So, a bit anguished, I decided to look for the 'Areas of Improvement' in the mail body. And what did I find:
Dear Karn Ganeshen:
Congratulations! We are pleased to inform you that you have passed the Certified Information Systems Security Professional (CISSP®) examination - the first step in becoming certified as a CISSP.
:)
So there I sat on my bed, Joyous & all smiles. This has been THE most exhaustive preparation AND the most exhaustive exam I've taken till now. The 5 months preparation had been demanding, & took consistent efforts & hard work. And today, I love every moment of all the nights spent since January 2009.
I will be sharing my study plan & resources used for preparation in my next post. I hope it will be useful for you.
Best Regards.
Monday, May 25, 2009
sslstrip: HTTP session hijack
Sunday, May 24, 2009
Friday, May 22, 2009
SQL Injection: A primer II
select uname from employees where deptID = 'a500' AND 1=1;
select uname from employees where deptID ='a500' AND 1=0;
select 1/0 from employees where uname='Victor';
PreparedStatement prep = conn.prepareStatement("SELECT * FROM USERS WHERE USERNAME=? AND PASSWORD=?");prep.setString(1, username);prep.setString(2, password);
SQL Injection: A primer
' OR ''='
' or 1=1--" or 1=1--or 1=1--' or 'a'='a" or "a"="a') or ('a'='a
select * from secureTable where recordNumber = (userInput)
recordNumber = a' or '1'='1
select * from secureTable where recordNumber = 'a' OR '1'='1';
recordNumber = a';DROP table secureTable ; select * from data where uname like '%
select * from secureTable where recordNumber = 'a'; DROP table secureTable ; select * from data where uname like '%';