So, I have had my trusty little pocket tester for almost 3 years now. During that time it has exposed my dodgy crimps more than I would like to admit. It is an invaluable tool to any IT/Networking technician who has to troubleshoot many issues in a short amount of time.
Before I do get into the details, a Raspberry Pi behind NAT and use of the scapy library is capable of achieving a similar result… but is very hacky and to maintain ethics I wont cover how to setup such a device.
So, the LinkSprinter 300 comes in around the £350/$400 mark and is the first in a line of network testers from NetAlly who now own the rights to the design. Offering a low power WiFi access point to review results on the go, or once setup it can send reports to the Link-Live cloud service.
The main tests this unit performs are as follows: PoE, link to switch, DHCP, link to gateway and finally link to internet. These options can be tinkered with a little, such as customizing the domain to try to reach when checking internet (Default is Google.com).
Once you connect to the access point or use the cloud service, the reports are more detailed. Such as showing link speed, link type, switch model and interface, VLAN and more. Whenever I create a new cable and it passes a continuity check, I always opt for this as a second test tool… sometimes identifying a poor crimp on a certain pin can be problematic. But if I don’t see 10/100/1000 then I know the cable wont work on certain NICs. Don’t get me started…
That’s it, there isn’t much to this little device. But it packs a punch and makes a technicians life much easier.
“One ought to design systems under the assumption that the enemy will immediately gain full familiarity with them.” – Claude Shannon
So, this is going to be a fun one. Lots to cover as we jump into what social engineering is and why it works.
Let us get started by listing the names that we give to these types of attacks. There are many terms used somewhat interchangeably, they include but are not limited to:
Business email compromise (BEC)
Now, these terms don’t mean the same thing. However, they are important for understanding what exactly social engineering is. We can get a good idea what social engineering is from peering at these terms, other than con games which is an alternate name. The terms are all under social engineering, social engineering is the method by which these techniques succeed.
This does fall under the category of “hacking” however it involves very little technical know-how in some cases. Even phishing which we have discussed previously can be automated with tools, recently we have even seen new phishing chatbots.
So now we have gone over quickly what social engineering involves, lets try to understand why it seems to work for the attacker so much. Humans are humans, we simply have a subconscious desire to trust others. This is a massive vulnerability in human psychology, simply put it’s the reason we get conned, scammed, and deceived.
But it’s not as simple as someone blindly believing what they are told, again there’s a lot of victim-shaming when it comes to these things… the victim is never to blame, attackers are sophisticated. Let’s go even deeper in understanding the mechanisms used by these con artists.
If you want a quick guide to spotting phishing attempts, then check out my post here. But its example time… I would love to break down these techniques more, but this is a blog post, its supposed to be enjoyable to read and not feel like a report.
Authority is one of the most common methods, this could be something like pretending to be your nations tax authority (IRS, HMRC etc.). Threatening you with fines or even prison time. We can even look at example of an authority driven attack, whilst this isn’t the most sophisticated attack it allows us to understand the idea.
Consensus is another common one, particularly common amongst cryptocurrency scams. Social media has become a cesspit full of these… to name names, its mostly Instagram. An example you can do is to make a tweet saying, “I’m locked out of my bitcoin wallet!” You will get a bunch of bots commenting how they had the same thing but @no1metamaskhackerbitcoinrecovery was able to help. I will include a typical Instagram scam so you can see what consensus looks like in action.
Scarcity is probably the simplest method to use, but the easiest to spot. Think about visiting a website and getting a pop-up saying “You are the 1,000,000th customer, congratulations” which tells you that there’s a “free gift” you can select. Now a gift should be a red flag, sadly nothing comes free in life. But let us again look at an example. It’s not always out to hack you either, think about the scalpers that have been buying up devices like Playstations and re-selling, that’s the same type of idea.
Urgency is often used in conjunction with other methods, in our example for authority we can see that an arrest warrant has supposedly been issued. Firstly, the tax authorities don’t want you to go to prison… how would you pay your tax? But more importantly this is using the technique of urgency. Its difficult to find an explicit example of urgency, I would argue that urgency needs to piggyback off another technique to be effective. However, we will look at this later. Often multiple of these methods are chained in a single attack.
Finally familiarity and trust both complement each other more than anything else. No example for this but let’s have some fun and theorize our own attack. So, a family member has their account breached (Think about how bad Facebook used to be for this.) and they send you message about a class that you have together… let’s say you both do karate on Friday evenings!
Using this compromised (Or spoofed account) an attacker could send you a “new class schedule” in a Microsoft office document. Because you trust them and you do karate together you are incredibly likely to open this document. You can be compromised by an exploit like the recent Follina exploit that was found in Microsoft Windows Support Diagnostic Tool to run remote code on a target system with just a handful of clicks.
So, that was lots to cover. If this is something that interests you, or you want to strengthen your protection from such things… check out Hacking Humans, a free podcast provided by The CyberWire. Over there they expose scams and talk about how you can defend yourself or your family against the methods listed and more!
Remember, you are your own strongest password. If something doesn’t seem right, pause, and stop to have a think. Tell the person on the phone you will call them back, if they try to keep you on the phone… Red Flag!
If you’re still not sure after taking a moment, speak to a relative you can trust… even if they aren’t a tech pro.
On June 14th 2022, a new family of side-channel attacks, frequency based, were disclosed to the public. The method is quite technical and above my level of understanding in places, additionally there isn’t anything the majority of people need to do. BUT! There is a way this has potential to affect many people due to mitigation techniques.
As some of you may notice, the name is rather similar to another vulnerability… Heartbleed. This other vulnerability came about just as I was getting into IT and security as a child and caused a headache for the professionals in my life at the time. From what I can tell other than both being cryptographic in nature… the similarities stop there.
So without being technical, what does this mean for us? Well, this vulnerability affects all Intel x86 CPUs and many AMD x86 CPUs. However, the attack would only serve a purpose on a server that handles cryptographic keys.
But hold on… you said it could affect many of us! How is that so if it’s carried out on cryptographic servers?
Well, these CPUs use something called Dynamic Voltage and Frequency Scaling. This is something that can greatly boost efficiency of a computers CPU and help control excess temperatures. This is the primary technology that is taken advantage of in these frequency side-channel attacks, a potential mitigation would be turning off the frequency scaling however… this would have a grave impact on performance.
Whilst it is ultimately up to organizations and individuals how they mitigate, in some areas there may be a drop in performance whilst software mitigations are hurried into production code, this has a chance of affecting some hosting providers. As it stands there will be no patches from Intel and AMD, but their guidance can be found via the hyperlinks.
I would encourage anyone who is interested in the topic, or works in cryptography to review the full paper found here, additionally I will be listing sources I read through to understand (what I am able to) about this vulnerability at the bottom of this page.
Lastly, a reminder about a rule of encryption. If an attacker can read the private key or the plaintext then the encryption technique, its technology and processing power are completely useless.
List of websites to look at regarding this topic (As well as the full paper linked above):
This is an easy room on TryHackMe, consisting of an analysis of a simple attack and using the attackers’ own methods to break back into the machine.
You won’t find any flags here, or in any of my posts. If you already know what to do and are using this for easy answers, then you need to find more difficult boxes.
For those who are stuck and need help, I hope this is about the right mixture of pointing you in the right direction while holding back enough to make you do the work. Remember that google is indeed your friend, but while there are easy answers out there… you aren’t learning much.
We begin with a .pcap file. This is a packet capture file, commonly captured with a tool such as Wireshark or Tshark.
Syntax to capture this traffic in tshark would be as follows:
sudo tshark -i eth0 -w /filename.pcap -F pcap
This runs tshark as root (sudo), capturing on interface eth0. We are then writing the file to a file called filename.pcap and finally setting the file type to pcap.
However, we have been given a file from a previous capture, so let’s download that and open it with Wireshark (Graphical alternative to tshark).
So going into this blindly, take a scroll down the file and try to see what you can spot in the first 200 lines or so. While scrolling we can see a service being used by line 50, scrolling further you can see a wordlist attack being carried out against that service.
In those first 200 lines of the packet capture and a simple google search you can find the answers to the first three questions on TryHackMe.
Now… depending how much work you like creating for yourself, you can filter Wireshark in multiple different ways. I’m going to be going with the display filter:
tcp.port == 21 || tcp.port == 20
This gives you a view of not only the FTP and FTP-DATA traffic, but also the TCP communications to those port numbers that established the connections. Transmission control protocol is a step down in the TCP/IP model and gives us slightly more information about the connection being made. Luckily for us, we don’t need to do much digging on the connection, only the application layer service File Transfer Protocol.
To further filter these results we can instead use the display filter:
ftp || ftp-data
This removes the TCP traffic and leaves us only with the communications of the FTP server and client.
So, now we can answer questions 4-7 from the information in those FTP and FTP-DATA packets.
Now this is where this information no longer becomes useful, we have identified the user account and the password the attacker has used to gain access. But the attacker has uploaded a backdoor…
Few ways of going about this, you can go through the .pcap and look for interesting traffic, if you look closely. Immediately after the attacker does a HTTP GET on the shell.php, we have a whole bunch of traffic between the attacker’s port of 53734 and our port of 80 (HTTP). Some of this traffic is particularly large and contains PSH,ACK packets. Not all of this is cause for concern, but let’s have a further look by following the TCP stream of this traffic.
Due to the way this type of shell works, we can see the commands run by the attacker and the output from the server, use the information gathered from the TCP stream to answer questions 7-12.
Finally for question 13, if you need to, google the GitHub project and it should tell you what it is.
I’m going to leave out the second task, if you have followed the steps then you can use the same tools against the server to break back in.
But I will not leave you in the dark and give you the missing pieces of information… use the tool netcat (to spawn a listener, socat if you’re feeling fruity). To upload the file there are a few methods that can be used, depending on the target system and preference. The ways this takes place are plentiful, but you can use FTP commands to place the file on the target system in this scenario. To gain root, it’s much simpler than you may think, ensure you read the TCP stream thoroughly… the rest you need is all there in the information we gathered about the attacker’s actions.
It’s been over a month since my last post, it’s been busy. A constant desire to learn new things is something that can be hard to manage. Without a main goal it can be hard to choose the path you want to take, and this industry is truly endless.
Off the back of CYBERUK. I will be working on the guide to identifying phishing/social engineering tactics. According to the most recent Crime Survey for England and Wales fraud makes up almost 40% of crime reported. Whilst the past two years has indeed seen a decrease in conventional crime and rise in cyber-crime, things like burglaries will rise again as we move out of the pandemic… It is not expected the number of cyber-crimes will see a decline any time soon.
I’ve hit a wall recently… having not done any maths since high school. I’m having to teach myself graph theory, calculus and improve my understanding of things like algebra. My goal? I want to understand the mathematics of signals and systems. The posts might trickle in here, but I have not forgotten about it.
Finally, a section for write-ups of things like TryHackMe and HackTheBox will be coming soon. There are loads on the internet for TryHackMe that hands out answers with no explanation why… Something that doesn’t benefit reader, nor writer. HackTheBox is something I need to use to challenge my skills and plan to document all the things I learn. I particularly want to develop these communication skills, teaching non-technical people technical things. Something I struggle with very much given my neurodiversity.
Thank you everyone for reading what I have to say over this first year, it’s been a tough one for me. This has been a huge outlet for me to speak about what I enjoy, helping me get through some difficult times. I really appreciate you all, even if my posts only get high double digits… It puts a smile on my face.
A very brief post, over the last couple days I attended ATT&CKcon 3.0. It was full of brilliant talks and interesting people. A talk from educators in the social sciences sector and their students from high school to postgrads. Demonstrating a social engineering attack and mapping it to the matrix, that was one I couldn’t take my eyes off.
There were 24 talks. Something in there for everyone… Red teamers, blue teamers, threat intel or someone who enjoys cyber-security. Some good open-source tool drops to the community which everyone is thankful for. The people at Recorded Future dropped this awesome tool to identify controls for TTPs: https://controlcompass.github.io/resources. There was also the release of SnapAttack community edition. Lots more I can’t list such as a honeypot container, that talk was interesting but a little too much for me to take in all at once. Can’t wait to re-watch some of the talks and view the slides again.
I’m excited for what’s to come with the platform. There is lots of work going on over at MITRE in improving the matrix, expanding that common language between all areas and all teams.
It was good to see at least two Brits involved in giving talks. Travelling across the pond to give a 15–20-minute talk shows serious dedication… and I look forward to seeing those same speakers on home soil soon, CYBERUK is just around the corner now.
Ive updated this to include, they did manage to get swag out to some virtual participants. Lastly, I think the best quote from the conference for me was along the lines of “Is it IoT or is it just Linux?”.
I’m going to be taking a brief break from writing a new piece, I spent some time last night trying to look into the Spring Framework RCE. Which has since been assigned the CVE number of CVE-2022-22965. A tool created by hillu on GitHub will allow for local vulnerability scanning for this issue.
The things these security keys can do in the way of certificates and biometrics are evolving with increasing pace. They will very likely become a primary authentication method soon.
But that’s not now… I’ll start by giving the details on what Multi-Factor Authentication (MFA) is. In the past we have used a username and password to authenticate (For simplicity we can call this a login.) ourselves into our accounts. As phishing has become more advanced, the ability to automate has become easier and tools now exist that automate much of the procedure. Our reliance upon passwords has been frequently questioned over the last few years.
So then… MFA or xFA where x is number of factors. Hold up! What exactly is a factor?
Something you know. (PIN number, Username and Password etc.)
Something you have. (Bank card, Mobile phone, Security key etc.)
Something you are. (Biometrics: Fingerprint, Eye, Bone, Gait etc.)
Somewhere you are. (This is a little more complex, often behind other high confidence security measures.)
So, let’s use a common example. You enter your password for work or school, it asks you to either… press yes or confirm a number on the Microsoft authenticator app. What factors are here? Well, our password is something we know, our tapping yes on our phone is something we have, our mobile device.
Now my email provider (You can do a whois so this is public information.) Zoho, uses the same idea. However, I login with my password, from my KeePass database… Get a push notification on my phone and then must input my biometrics. If I wanted even more security, I could whitelist IP addresses, but I don’t have the infrastructure to set that up . This was set-up with a Yubikey but as the model I have doesn’t support biometrics this method is more secure for the time being. As mentioned before, I’m trying to get my hands on Feitan security keys. The K43 FIDO2 Biometric key, One Time Password (OTP) keyring and smart card + programming equipment. The keys may need different programming for the service that is going to use them… such as Azure Active Directory.
These Multi-Factor Authentication methods throw a spanner in the works for an adversary. But let’s talk about a common method that is not secure. Short Message Service or SMS, which is a text message. These messages are vulnerable to interception and spoofing. For example here’s a lab on it from the awesome guys over at Immersive Labs, check out some of the other cool labs over there too. But for those less technical here’s an explanation of what is being done.
So we are going to conclude our MFA talk by talking about our mobile phones, they are the most used computers in our lives… Yes, they are a computer too. Apple users as always enjoy more security than Android users but we’re talking about the SIM cards and not your devices. Thus, authenticator apps like Google Authenticator, Yubico Authenticator are a more secure choice. An attacker would need a certain level of access to your device to view those codes. Doesn’t mean they are secure… In fact, nothing is to ever be assumed as completely secure. One thing I see day to day is that people don’t recognise the importance of their phones. While they have antivirus and VPNs on their laptops. A neglect for their mobile devices is all too common. These devices by the nature of their use, hold far more personal information.
Take your mobile device seriously! All that information is very valuable no matter who you are… Take the same precautions you would take when using another device such as work laptop. Hopefully this help some viewers understand what exactly this MFA stuff is… and of course don’t forget to set-up your backup codes for accounts with MFA turned on.
Building on my misconfiguration of security keys, I had to use a backup code for the first time ever today. I cannot stress enough the importance of these codes for your accounts that have multi-factor authentication. Write them down and keep them in a safe place, they could really save your skin.
Especially when we think that people could have phones stolen, having those backup codes gives you peace of mind that no matter what, you have a way of getting back into your accounts. I just wanted to mention this, as it’s my first experience of getting locked out an account. Well… getting locked out and it being of my own doing.
I’m currently attending MITRE ATT&CKcon and enjoying the speakers very much, I might write about some stuff I have learned. However my priority right now is sticking to my plan for the content here on my site and meeting deadlines, so I’m really not keen to add much stuff to my to-do list right now.
Hello World! I’ve successfully broken a YubiKey and locked myself from the accounts, it’s not completely broken it just needs to be reset but what a pain in the backside.
This is why I have my backup key, meaning this is nothing but an inconvenience to me. I was trying to setup my YubiKey with KeePass so id be able demonstrate but didn’t pay enough attention to what I was doing. Oopsie, there is documentation for it setting it up as a master key but I don’t know how viable it is. In the meantime, I disabled the NFC on the key as I don’t currently use it. Well, this won’t be a major issue… I can take all the things I’ve learnt over the last few months from using my key and have an even better configuration this time. Maybe even upgrade my keys.
However, I do want to do two things for people here on AACyber. Demonstrate YubiKeys (Also properly discuss Multi factor authentication) and using keepass2john and hashcat to attack (a poorly configured.) KeePass database.
Lastly, it’s only right I disclose https://ubuntu.com/security/CVE-2022-0725. This is a recent vulnerability found within KeePass; however, it only affects Linux systems. If I can reproduce it on one of my machines then I’ll write about it, but I don’t think I will have much luck. So that’s what is coming, this format I feel is much more engaging with the audience as we aren’t just discussing some app stealing passwords or a google chrome patch, but much more exciting things that we’re all capable of doing.
We also have more to elaborate on KeePass and its abilities, but one step at a time… I’m also looking at getting additional biometric security keys from Feitian for personal use, however I will only talk about YubiKeys as they are the easiest and most accessible security keys currently in the market.
This post caused me some issues for some reason but it should be fixed now.