Jump to content


Dedicated Members
  • Content Count

  • Joined

  • Last visited

  • Days Won


1 Follower

About overwraith

  • Rank
    Hak5 Ninja
  • Birthday 10/30/1990

Profile Information

  • Gender

Recent Profile Visitors

7,182 profile views
  1. I have come up with another USB vector attack. This involves a flash drive which has had it's firmware tampered with in such a way that it allows the user to copy files to it, but after a number of plug in's the flash drive becomes unresponsive. I am not sure if this would require special firmware, or multiple sd cards to accomplish this. Another alternative is the same idea except with a remote wifi shut-off switch. The idea is that somebody stops by with promotional flash drives, which work, then they shut off all of a sudden and end up in the user's trash bin. Such a device would require a
  2. The reason for this tool is to simulate someone exfiltrating data off a corporate network. The dial-able pot switch makes the signal lesser to a degree that you get a personal area network around your wifi nic. The wifi nic i have in mind is actually usb based, and only about the size of my thumbnail. People war-driving around the building to test security wouldn't even be able to see your network/ssid unless they were feet from you. I am surprised no-body has thought this up before. Your phone becomes the endpoint which communicates with the wifi NIC. Furthermore I may have seen o
  3. Another aspect of this could be if somebody was not supposed to be looking in your desk drawer as per company policy, and you happened to acquire a fake grenade (Training Grenade Blue, no explosives already spent fuse). You stick the fake trainer in the desk drawer, and some point later in the day the bomb squad gets called and you know exactly who is snooping. Probably give the bomb squad and police a courtesy call first along with your address etc.
  4. A while back I discovered that elicitation could be used in order to protect the company from intrusions from unscrupulous employees. I do believe that one of Mitnick's books or someone else's describes how a savvy net admin discovered a chat box on his computer and used elicitation to make the hacker believe he was one too. On doing this the hacker revealed how he had broken into the company using some sort of VPN vulnerability. One method in a pharmaceutical company is to have a Vikodin trap. Essentially people are informed as to the whereabouts of unsecured vikodin, for example using an enc
  5. RSA is the only asymmetric algorithim available to the .NET C# API. It is useful for moving data from one computer to another without malicious Mallory intercepting or changing the transmission. The RSA part is actually ideal for transmitting keys to the destination computer. Use the key transmission and apply it to a separate symmetric transmission for large files for increased performance. Big files or transmissions get symmetricly encrypted. Doing a lot of C# development and research lately. I could probably make $50 per company by tooling around my city, and trading the printouts for mone
  6. I just had a cool new idea for a pen testing tool. If hak 5 thinks it is a good idea they can build it. Would recommend creation of new WIFI NIC with a pot-switch to modulate the power going to the antenna on the circuit board. Is an exfiltration tool, utilized for creating a personal area network around one's desk, phone can connect. Would require vid/pid changing utility. If thought to be a good idea can build. Try to make it small like those thumbnail sized ones, or at least fairly trimmed down. obviously the pot switch changes the dimensions. I only condone white hat pen testing only. Than
  7. Right, I misread the question. Perhaps next time emphasize "moving to another drive" in the title more than phone. The phone has to have mass storage you can send the data to. If it mounts like a removable drive you can send data to it. You just have to figure out how the path fits into the payload.
  8. Are you sure, do you remember what OS it was? Android, IPhone/IOS, Windows Phone? On most phone OSes it is pretty difficult to get keystrokes to do anything.
  9. If I could I would implement some sort of VLAN'ing on my network, it probably would have fixed a few things. Allowing everybody to see everybody else's traffic isn't necessarily a good thing if one host is compromised. Depends on your interoperability needs. Actually home routers and such are fairly well set up out of the box these days. NAT and Firewalls are pretty good at keeping threats out. What most worries me about my home net is more physical security related, however my situation is probably a bit more unique than yours. I would like to get some padlocks, and change out the door locks
  10. I guess the problem is the book I picked up liked to express the "stealthiness" of algorithms in terms of calculus equations. You know, summations and all that jazz. Steganography in digital media by Fridrich. Even as somebody who has taken calculus, I have no desire to return death's ground. You would think that "Oh, programming is just the implementation of math..." no, not all programming is. Much of it is more of a vocabulary, documentation, and best practices thing. Sure I am betting I will be exposed to more and more math, but there's only so much you can expect from entry coders. There
  11. Sounds good in theory digip, but I have seen projects which were literally the culmination of literally years of coding. When faced with an ocean of code it is almost impossible to locate every possible place for grey ware to reside. I am guessing that the only way to cover one's self is to put in the version control system who, and where you got code from, especially in description fields. It seems to me that it is the entire organization's responsibility to put together some kind of a code verification process, but I am betting that the majority of companies don't have sufficient safeguards.
  12. So how would one detect if there were shenanigans going on in a VB/C# project? I am basically an entry level developer, and unfortunately I have met people who have axes to grind. How would I detect something like this if I "inherited" a project with malware in it? How would one begin building a paper trail if one has little experience with such things.
  13. Ctrl + P, I'm going to read this one. Thanks for the share. Just curious, doesn't minification of JS and now that I think of it combined with obfuscation do the same thing? Basically minification is a process whereby all whitespace is removed from JS code. So occassionally you'll see some libraries in JS used on certain pages, like Angular or JQuery which has actually been minified so it is essentially unlegible. I am assuming that the lack of whitespace would also create problems for AV parsers due to the fact that JS is interpreted, not compiled, but I'm not sure. I wish there was a "Practi
  14. That's a good one digip. The problem I see is that I am mostly a Windows guy. I would have to essentially make the VM a Windows box. I do confess, I have always had problems with live disks. Sure they are absolutely great to get from a Linux distributer, but is it possible to make one's own without resorting to neuro surgery? Are there any layman's tutorials for creating custom live disks, or is it not possible without in depth knowledge?
  15. Those are all good points cooper. Luckily there wasn't anything on the laptop of importance. I was in the process of installing Visual Studio, but I don't think they can do anything with that. Probably... I do know how to download java docs, that's one of the first things my high school java teacher taught us years ago (when I was in high school, now I am a college grad). You're right about the mis-configuration thing, however it could be really useful if it was configured correctly. It seems that something on the laptop was probably faulty in order to let them in. You would think Microsoft wo
  • Create New...