Jump to content

digininja

Global Moderators
  • Posts

    4,005
  • Joined

  • Last visited

  • Days Won

    210

Everything posted by digininja

  1. If that is the crux then I'd just use csh or tcsh if I wanted a shell.
  2. I'm curious, why would the NSA target you? Could it have been the Israeli 8200 or British GCHQ? Australian SIGINT? Be careful sharing too much, it might not be just cyber that they attack you through next time. And if you are really paranoid, don't post stuff like this from your Comcast IP, it tells them where you are!
  3. Your initial idea was about segmentation, you are now talking about controlling admin creds and monitoring logs, I'm missing the bit that is novel.
  4. So is your idea the same as wireless client isolation or something different? And you could argue that locking down a workstation is easier than a server as a server by definition has to have open services while a workstation can have all listening services disabled. The most common way to do lateral migration is through SMB which should never be needed on workstations as they don't need to offer network shares. It is very rarely disabled though.
  5. Drop wireshark or tcpdump on both machines and watch for traffic. If you see it going out then the victim is calling home but being ignored or not being seen, if you don't see the call out, the victim is broken, if you don't see the receipt on the attacker machine, the routing is broken, if you see traffic on the attacker then the listener is broken.
  6. Generate your exe on the command line and make sure you pass the right parameters. https://www.veil-framework.com/veil-command-line-usage/ Also make sure your listener is using the correct handler. As an extra check, fire up Wireshark on both machines to watch for network traffic.
  7. Can you ping victim to attacker, that is the important route for a reverse connection. What command are you using to build the exe?
  8. Did you build the executable properly and is it pointing at your correct IP and port? Can the two machines see each other?
  9. If you are able to lock the network servers down to a point you are sure they can't be compromised, why not do the same to the clients. That should probably be easier as servers generally have to expose more services than clients to do their job. Segmentation is the base of a lot of hardening guides, is a good idea and is nothing new. I think the concept you are going for is the same as client isolation on a wireless network where devices are not allowed to talk to each other, only the AP and devices on the other side of it. If you subnet down to small groups or teams then that helps isolate them in the event of a compromise but as a lot of compromises bounce from workstation to server and the servers would need to have access to other groups, the network could still be traversed it would just be harder. More choke points introduce more chance of detection so that is a positive.
  10. digininja

    WPA3

    Backward compatibility will keep WPA2 around for a while. Better security that stops tools from working is a good thing, means things are getting better.
  11. Why did you title did BurpSuite Pro then ask about the free version? If you are getting certificate warnings then you need to import the CA certificate into your browser. Browse to http://burp and follow the instructions.
  12. What you are asking is illegal so you won't get any help from here. Talk to the Instagram team. Before you come back with "but it's my account" or anything like that, it doesn't matter, Instagram isn't yours and that is what you'd be trying to hack. And attribution is a bitch, just because they have a .ru email account, doesn't mean they are Russian, I could sign up for one if I wanted, the only challenge may be to read the registration form.
  13. digininja

    XSS Help

    Unfortunately, without a lot more info, your question is too vague to give any specific help. How good are your HTML and JavaScript skills? I'd suggest looking at the SecurityTube web app testing videos, they cover stuff like this and should give you a good idea of what is going on. And if you are following a course, I'd look for a more up-to-date one, anything still using XP as a victim is very out of date.
  14. It all depends what you want to do, are you interested in looking at layer 2 protocols, digging through shellcode or testing web apps? And don't forget, Kali is just a Linux install with tools preinstalled, just because they are in there doesn't make them good, not being in there doesn't make them bad.
  15. Kali is just Linux with a lot of security packages so it won't get in the way of Kali but it may affect some of the tools but that would be the case whatever distro they were installed on. Pick the tools you think you'll be using, install them in a vanilla Kali and in your pimped up version and compare results. My guess would be things like nmap which do special things at layer two with packets might not be happy but something like Nikto pointed at a web app wouldn't care less as long as it's layer seven packets get through.
  16. I know nothing about Qubes but in my opinion, the answer depends on what you want to do with Kali. If you are doing any kind of client based pen testing with it then you'll probably want to come from a fixed, static IP so that the client can identify you If you are doing things where you want to be anonymous, go through Tor Normal browsing and computing, it depends on your paranoia level
  17. digininja

    SANS Book

    There was a discussion on one of the mailing lists about it recently and I thought the conclusion was that you go them when you challenged, maybe not.
  18. digininja

    SANS Book

    Based on various data points, I have a feeling SANS is available in your country, and is indeed based out of your country. The cheapest option to get the books is to take the challenge exam, with that you get a copy of the books and an exam entry. The next step up is On Demand which doesn't have 617 but does have 560 and 660. As you can't program yet, 760 would be way above your level so I'd recommend starting with one of those and working up. https://www.sans.org/ondemand/courses/all/
  19. Short answer, it doesn't matter, pick one and learn it, once you have the concepts you'll be able to move into other languages much easier. Longer answer, it depends what you want to write scripts to do. Research that area and see what other tools are written in and that is probably the best language. Other option, find out what languages your friends know and learn those, with friends to help it is much easier to pick up something new.
  20. digininja

    SANS Book

    Go on the course, any other way of acquiring the digital books is piracy. As a SANS instructor, I frown on this type of thing.
  21. digininja

    BlueBrone

    First off, learn how to ask proper questions: https://digi.ninja/blog/asking_for_help.php
  22. digininja

    KRACK Attack

    Google this, it might help: krack proof of concept github Remember, only use this on your own devices, if you ask questions about how to use any scripts and we don't think you are using them in areas you have permission to be using them, then you will get told off.
  23. If you are running chrome this is supposed to be a good option: https://chrome.google.com/webstore/detail/parental-controls-web-fil/dpfbddcgbimoafpgmbbjiliegkfcjkmn?hl=en I don't know if any off hand but I bet there are some good lists for Squid3 that will also block undesirable stuff. But if all you want is YouTube then you could probably lock the browser down to just that URL, you can definitely do it at Squid3 level or do it at DNS level.
  24. Install the older browser then use a proxy to drop all requests to the update server so that it doesn't know that it is out of date.
×
×
  • Create New...