This forum is in archive mode. You will not be able to post new content.

Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - ZiLOG

Pages: [1]
1
Hacking and Security / Re: How do you practise hacking?
« on: March 13, 2015, 06:03:27 AM »
If you want real life hands-on practice, sign up for one of the bug hunting programs and start hacking actual web sites for fame and profit.

Bugcrowd

2
Quote
I am curious to know how a computer could be uniquely  identified by some one (ISP, FBI, NSA etc) other than the computers MAC address.

Law enforcement will track you by IP address. What comes next, assuming they have a warrant, is people knocking on your door to collect the evidence - your computer and all related electronics (hard drives, USB flash, etc.)

Quote
Would it be possible to access the unique processor id or Hard disk id online?

Law enforcement (in US) is known to plant malware to identify bad actors behind TOR/proxies. As far as I know it is primarily meant to get the originating IP address. Can malware get processor and HD id? On physical system, yes. This is why you should be using a VM.

Quote
What is the best way to hide OS and System information online. Any other tools other than OSFuscate?
- Virtual machines (preferably use a live CD, such as Tails, without persistence)
- Don't use Windows as the guest OS
- Don’t use same proxies/vpn all the time
- Proxy chain
- Assume all proxies/VPN services have logs
- If someone is tracking you down, do not connect from home
- Use common sense

3
Hacking and Security / Re: DEF CON 23
« on: March 10, 2015, 05:23:03 AM »
DEF CON is going to be as fun as you make it yourself. If you decide to sit on the sidelines, like most attendees, and don’t engage with others, your experience may not be great.

There are many contests throughout the con that require a group to succeed, many people gather ad-hoc to solve the challenges together. So yes, being social and friendly makes a big difference. You talk to a stranger in an elevator one moment, next thing you know you get invited to a penthouse party with DJ and free booze. Anything can happen!

If you have not yet seen the DEF CON documentary (filmed during DEF CON 20), check it out:
https://www.youtube.com/watch?v=3ctQOmjQyYg

4
Hacking and Security / DEF CON 23
« on: March 09, 2015, 08:49:00 PM »
DEF CON 23 hacking conference will take place August 6-9, 2015 at Paris/Bally's hotels in Las Vegas. If you plan to attend, it's time to book the rooms as the DEF CON block will sell out quick. Average price for room now is $105-120 per night. Prices usually skyrocket to as much as $500 if you try to book just a few weeks in advance.

Hotel room reservation link (from DEF CON site):

https://resweb.passkey.com/go/SBDEF5

I am already booked with hotel/flight, anyone else going?

5
Creative Arts / Re: The Music Thread
« on: March 09, 2015, 06:36:54 AM »

6
Beginner's Corner / Re: How does Hydra work?
« on: March 07, 2015, 03:58:56 AM »
Hydra is an online brute force password attack tool that can be utilized against many services, including ftp, http/https, ssh, teamspeak, telnet and vnc. In a pentest you would use an online password attack as a last resort (if ever) because such attack is extremely noisy to intrusion detection systems.

You can practice hydra in a home lab easily against any Linux distro running service such as OpenSSH daemon, which you need to install (Google it).

Basic syntax for running Hydra against ssh would look something like this (case sensitive):

Code: [Select]
hydra –l<user name> –P <name of the file containing word list> <host name or IP of the target> <name of service>
An actual example:
Code: [Select]
hydra -l root -P dict.txt 192.168.1.2 ssh
dict.txt is your word (dictionary) file. Ultimately you would want to create your own, but there are many already premade wordlists, look for them. Example: http://www.openwall.com/passwords/wordlists/

Let me know if you run into any issues testing hydra or have additional questions.

Z

7
Beginner's Corner / Re: Vulnerabilities / Exploitation
« on: March 06, 2015, 05:17:08 PM »
Top tier security researchers definitely specialize in particular technologies, for example ARM platform running Android OS.
 
If you like to travel and want to be part of red team testing corporate security, then more general knowledge (“jack of all trades, master of none”) would be applicable as you don’t know what technology/platforms you are going up against. If you prefer more stability, desk job, then specialize.

One reason researches do not publish details of vulnerabilities right away is so called “responsible disclosure”, which in essence is a recommended model for steps researcher should take before making full public disclosure. This is not a law by the way.

It is somewhat frowned upon in the infosec community, but there are ways of making money by selling research to 3rd parties, both shady underground markets and legitimate companies. Of course nation states are always interested (usually buy the intelligence by setting up fake private companies).

My personal preference is engaging in private bughunting programs, such as Bugcrowd and HackerOne. Each program has responsible disclosure rules + you can earn cash. It’s a good way to legitimately test your skills and get some “street credit”.

Hope this helps.

Z

8
Hacking and Security / Re: CVE-2015-0057
« on: March 05, 2015, 07:16:21 AM »
Udi Yavo from enSilo has been credited with disclosing the vulnerability. I've found the blog post below to contain the most useful technical information regarding the vulnerability, including a proof-of-concept video, which uses a standalone executable. As of today there is no public release of it for Metasploit.

http://breakingmalware.com/vulnerabilities/one-bit-rule-bypassing-windows-10-protections-using-single-bit/

9
Beginner's Corner / Re: how to download java lecture
« on: March 04, 2015, 07:58:50 AM »

I just watched the video, it is horrible, but it can be captured for future playback. For my proof of concept I used TechSmith Snagit. Snagit has a video capture with audio mode, just highlight area of your screen and hit record. Flash, java, html5, whatever protection is in place, it does not matter, you will get your content. Frame rates are not great, but it will work for an educational video. Good luck.

lame_video.mp4

10
Beginner's Corner / Re: how to download java lecture
« on: March 03, 2015, 07:27:03 AM »
Try 'Video Downloader professional' Chrome browser plugin.

11
Anonymity and Privacy / VPN Services Review for 2015 (TorrentFreak)
« on: March 03, 2015, 06:49:27 AM »
Few days ago TorrentFreak published their 2015 guide to VPN services.

Questions providers were asked include:

- Do you keep any logs which would allow you to match an IP-address and a time stamp to a user of your service?
- Under what jurisdiction(s) does your company operate?
- Do you have physical control over your VPN servers and network or are they outsourced and hosted by a third party (if so, which ones)? Where are your servers located?

It's a decent guide, but as a good practice, do your own research as well before selecting the VPN provider.

Source

Pages: [1]


Want to be here? Contact Ande, Factionwars or Kulverstukas on the forum or at IRC.