Graphically Plotting Wifi Traffic

This is going to be a down and dirty post about about using neo4j to graphically plot and analyze the relationships between Wi-fi nodes using the air around us. This is not anything new or novel. Sensepost released their Snoopy platform back in ~2012 that does largely the same thing using Patvera’s Maltego. This shows some of the powerful insights that you can create by using a few lines of code, and a graphing database.

[Read More]

Post-exploitation using Python Standard Libraries

Introduction

Mike LaRoe

Email: mlaroe.bitrot@gmail.com

Let’s go over some fundamental Python standard libraries and how, with those libraries alone, your toolbox during a CTF or red team (or blue!) situation will have many of the answers needed to point you on the path to success. These modules are important because they come naturally with Python installations and do not require any additional installations (which require privilege).

[Read More]

Python Flask NordVPN Map Interface

While exploring some additional VPN options for work, I decided to give NordVPN a try. They have a plethora of exit nodes, and have generally decent user feedback and claims that they do not log traffic. NordVPN’s Linux client is essentially a zip file full of OpenVPN configuration files. There are some other projects for managing NordVPN connections, but I decided to have a quick go at creating a graphical bare bones interface using Python and Flask.

[Read More]

Python Phone Push Notification Scheduler

Recently, I’ve been looking at solutions for pushing messages to my phone for work related activities. I work remotely, and often run jobs that take hours to run in the background. Simply having a notification that pushes to my phone to check a job’s results will suffice. I’m generally paranoid, so I’m particular about what information I trust to various providers. Part of this paranoia drives me to segregate my home and work traffic. Work (but non-corporate… think research) traffic takes place over a VPN, and often hits rate-limits with APIs due to other users. This project will setup a push notification system that will reschedule messages at a set time in the future if we hit an API limit.

[Read More]

Securing Your Home Network Part 1: PI Hole

Hackers are opportunists. You’re likely not a target but your banking information might be or you might have an IoT device that has a known vulnerability that can be used to launch a DDOS attack. Welcome to a multi part series of locking down your home network. Part 1 will be adding Pi Hole to our arsenal.

[Read More]

Obligatory OSCP Review

There may be an overwhelming amount of information available to those considering or attempting to pass the Offensive Security Certified Professional exam, but it is still a very common question among our readers and Twitter followers. Due to the continued interest, here are my 2 cents on the Penetration Testing with Kali course and subsequent OSCP exam. I’ll try to keep this as brief and as informative as possible.

[Read More]

Expand Storage With Free Google Shell

As many of you may have discovered, you are given access to your own Debian Linux shell account with 5GB of persistent storage when you sign up for Google’s GMail service, . You can access the console by visiting the Google Cloud Platform. The Debian systems are generated on the fly, and your 5GB of persistent storage is loaded into your home directory on startup. This article will walk you through expanding the 5GB or storage to 20GB by mounting Google Drive.

[Read More]

Breaking Into a Security Career

Breaking Into Information Security Career Intro Recently someone posted on /r/netsecstudents asking how to land a job in infosec but he wasn’t sure what the specific field was. He asked about incident response without knowing the specific name. Of course me being someone that works on an Incident Response team I chimed in with the names of the career path. Security Incident Response Team Cyber Incident Response Team Blue Team Forensics I started thinking about how I finally got a career into information security and my journey. [Read More]

Password Spraying ADFS with Burp

As many organizations are moving aggressively towards cloud based platforms, we as Red Teamers are coming more into contact with Federation services. Federations essentially extend authentication mechanisms from one system to another. These systems may be part of the same organization or completely separate. One of the most common implementations of this is Microsoft’s Active Directory Federation Servers (ADFS). For a good overview of securing ADFS, check out adsecurity’s article here. As these services are becoming more popular,

[Read More]

Attacking Network Protocols Review

Chapters 1 and 2 go over basic networking concepts and various ways to capture traffic. The author goes into pretty deep detail about everything. Chapter two focuses on MITM proxies, SOCK proxies, HTTP/Reverse HTTP proxies, etc. Great read for those new to offensive and defensive security, and good refresher for those of us that are not so new. The Author uses a C# Library he created called Canape which I found annoying since not everyone is a software dev in high level languages and he could have easily used Scapy which “hackers” as the title infers are more familiar with.

[Read More]