Securing Your Home Network Part 1: PI Hole

Hackers are opportunists. You’re likely not a target but your banking information might be or you might have an IoT device that has a known vulnerability that can be used to launch a DDOS attack. Welcome to a multi part series of locking down your home network. Part 1 will be adding Pi Hole to our arsenal.

[Read More]

Obligatory OSCP Review

There may be an overwhelming amount of information available to those considering or attempting to pass the Offensive Security Certified Professional exam, but it is still a very common question among our readers and Twitter followers. Due to the continued interest, here are my 2 cents on the Penetration Testing with Kali course and subsequent OSCP exam. I’ll try to keep this as brief and as informative as possible.

[Read More]

Expand Storage With Free Google Shell

As many of you may have discovered, you are given access to your own Debian Linux shell account with 5GB of persistent storage when you sign up for Google’s GMail service, . You can access the console by visiting the Google Cloud Platform. The Debian systems are generated on the fly, and your 5GB of persistent storage is loaded into your home directory on startup. This article will walk you through expanding the 5GB or storage to 20GB by mounting Google Drive.

[Read More]

Breaking Into a Security Career

Breaking Into Information Security Career Intro Recently someone posted on /r/netsecstudents asking how to land a job in infosec but he wasn’t sure what the specific field was. He asked about incident response without knowing the specific name. Of course me being someone that works on an Incident Response team I chimed in with the names of the career path. Security Incident Response Team Cyber Incident Response Team Blue Team Forensics I started thinking about how I finally got a career into information security and my journey. [Read More]

Password Spraying ADFS with Burp

As many organizations are moving aggressively towards cloud based platforms, we as Red Teamers are coming more into contact with Federation services. Federations essentially extend authentication mechanisms from one system to another. These systems may be part of the same organization or completely separate. One of the most common implementations of this is Microsoft’s Active Directory Federation Servers (ADFS). For a good overview of securing ADFS, check out adsecurity’s article here. As these services are becoming more popular,

[Read More]

Attacking Network Protocols Review

Chapters 1 and 2 go over basic networking concepts and various ways to capture traffic. The author goes into pretty deep detail about everything. Chapter two focuses on MITM proxies, SOCK proxies, HTTP/Reverse HTTP proxies, etc. Great read for those new to offensive and defensive security, and good refresher for those of us that are not so new. The Author uses a C# Library he created called Canape which I found annoying since not everyone is a software dev in high level languages and he could have easily used Scapy which “hackers” as the title infers are more familiar with.

[Read More]

Bug Hunting with Mercurial

In this article, we will take a look at a technique for bug hunting in Open Source projects by using version tracking information. In this particular case, we will look at Firefox and their Mercurial setup. By identifying patches that are connected to bugs with public reading turned off, we are able to identify specific fixes for potential security issues in a major web browser, often before releases are pushed. This is also an excellent way of coming up with Proof of Concept code for N-day bugs.

[Read More]

Breaching the Perimeter with OpenConnect and ocproxy

As Red Teamers, we often encounter engagements with targets that may allow remote workers, but require all connections to pass through a central VPN for access to the Corporate assets. These VPNs typically authenticate with two factor authentication or other mechanisms. We will use OpenConnect and ocproxy to automatically log in to a VPN once credentials are acquired from a phishing page.

[Read More]

Openfuck Troubleshooting

In a previous post I had went over a walk through for Kioptrix Level 1. I had some issues and wanted to document them for anyone else that may run into those issues. I’ll admit that my first problem was getting ahead of myself and trying to compile the source code before doing anything else. Finally googling gave the answer that was right smack dab in front of my face which is looking at the first 8 lines of the source

[Read More]