On a pentest with a massive internal network, we managed to
get access to 22k machines as local admin using a local account (verified with ncrack).
Obvious domain priv esc routes were shut down, so it was time to extend our control and information. I wanted hashes, cached domain creds and available tokens from
each of these. So I put together the following metasploit massploitation
script. The main difference between this and the other solutions posted, is that my box fell over with several thousand meterpreter sessions open, so I wanted a way to automate connecting & pulling the info without needed all the sessions to be open at once.
Continue reading "OSX Local Network Broadcasts & Privacy"
In July last year, Toolness, released a cool Firefox add-on, named Collusion, that draws a pretty visualisation of who's tracking you as you visit different sites. It gained some popularity after Gary Kovacs, Mozilla CEO, showed it off in his TED talk yesterday.
It's a great little add-on for making something quite hard to explain to people quite visible. However, I didn't like the fact that it only showed trackers that set a cookie. For example, the requests to Facebook to fetch Like button JS, or calls to Google Analytics were being missed. There are lots of ways to track people other than cookies. So I edited the add-on to include third-parties to whom a request was made, but where a cookie wasn't set.
Continue reading "Tracking the Trackers (my mods to the Collusion AddOn)"
Continue reading "A Response to Seth Godin's "The Illusion of Privacy""
Continue reading "Internet Banking, 22seven & Security Fallacies"
Thanks to Simon Dingle, I'm going to be getting into the world of Android. One of the things that shocked me over the first few days, was the large number of applications that came bundled with the phone that could not be uninstalled, and had persistent background processes. In the "direct consequences" camp, the Motorola News and Gallery application simultaneously chewed my bandwidth and flattened by battery, in the more worrying "shady unknown consequences" camp, an app call "Arabware [1]" offered to "localize" my services, and also could not be uninstalled or stopped. I decided it was time I got root.
The official guides for how to root a Motorola Atrix 4G on the latest update (2.3.4 at the time of writing) are laughably naive. In 5 minutes I could easily find 50 sites all parroting the same process involving complex and dangerous flashing of firmware. The first bit of mis-information that needs clarification, is that despite the Motorola 2.3.3 developer preview having an unlocked bootloader, the official 2.3.4 Gingerbread update from Motorola DOES NOT HAVE AN UNLOCKED BOOTLOADER. No problem they say, just flash this firmware in this ZIP file, supposedly extracted from a Chinese leaked version of 2.3.3. What?! You want me to flash fimware passed around as a zip file from random locations? Not a chance. To make it worse, after a quick squiz at the .sbf file, I found this comment embedded in it:
"The2dCour, known troll in your phone."Awesome. Not a chance I'm touching that.
Here's a much safer, simpler way to root your device, which involves no warranty-voiding, security-spine-chilling hoop jumping.
Continue reading "How to root a Motorola Atrix 4G on 2.3.4"
In light of past and recent posts from mubix (one, two) and jcran, I thought I'd post the hack I used to connect to then run Metasploit post-exploitation modules across several thousand machines. I still need to go through them all and merge them, but I thought I'd throw my hat in the ring. Thank to mubix for his help on the job with some of it.
Continue reading "Metasploit Massploitation"
When managing teams of "information workers", I believe the use of time sheets is indicative of a management failure. Here's why:
- If you have to rely on a timesheet to know what your staff are doing - you're doing it wrong
- If you can't trust your staff to work hard - you have problems a timesheet won't fix
- If you believe you have too many staff to manage - get more managers
- If you think anyone completes them accurately - you drank the kool aid
- If you think the time it takes to actually complete them accurately is worth it - you hate your staff
- If you manage your business from these inaccurate stats - you're making bad decisions
- If your senior people have PAs complete their timesheets for them - you're a hypocrite
- If you spent millions on a new timesheet system, but didn't make it any easier for the staff using the system - you just suck
Continue reading "Dropping Privileges in Python (pattern)"
Continue reading "Mobile Privacy-Enhancing Proxies"
Originally published on SensePost's blog.
While doing some thinking on threat modelling I started examining what the usual drivers of security spend and controls are in an organisation. I've spent some time on multiple fronts, security management (been audited, had CIOs push for priorities), security auditing (followed workpapers and audit plans), pentesting (broke in however we could) and security consulting (tried to help people fix stuff) and even dabbled with trying to sell some security hardware. This has given me some insight (or at least an opinion) into how people have tried to justify security budgets, changes, and findings or how I tried to. This is a write up of what I believe these to be (caveat: this is my opinion). This is certainly not universalisable, i.e. it's possible to find unbiased highly experienced people, but they will still have to fight the tendencies their position puts on them. What I'd want you to take away from this is that we need to move away from using these drivers in isolation, and towards more holistic risk management techniques, of which I feel threat modelling is one (although this entry isn't about threat modelling).
Continue reading "Squinting at Security Drivers & Perspective-based Biases"
I moved back to the world of civilized e-mail, i.e. mutt. It's been wonderful, and I particularly enjoy hacking my mailcap to display things just how I like them (no PDF sploits for me). However, OSX's handling of calendar files is very irritating in that iCal tries to send responses via Mail.app without giving you much of a chance to do anything. I'd rather handle it in mutt and the cli. This is also generally useful for people using mutt who want to handle calendar files.
Continue reading "mutt & iCal (some OSX specific)"
Inspired by the work of Richard Thieme, and in light of the Anonymous/LulzSec activity, coupled with the Protection of State Information Bill our government is attempting to push through and numerous corruption scandals, I've been doing much thinking on the role of hacktavism in a democracy.
To be clear, hacktavism, as I see it, would be the use of illegal hacking (penetrating computer or other systems) to bring to light crimes by either the government or private entities. I'm not claiming that to be the sole definition, just the one I'd like to discuss. In this piece, I'd like to speak about the pre-conditions necessary for such vigilantism, the risks associated with it, and some approaches that could be used.
To be clear, I have neither engaged in hactavism, nor do I speak for any group, or control any group. These are my opinions, and, as with most things in life, people tend to do what they like, whether I feel strongly about it or not :)
Continue reading "Hacktavism & The 5th Estate"
TBOY - The Best One Yet
ZaCon III has come and gone this last weekend. It was a blast, solid content including some exciting first timers and more than doubling the original research output, an extension to include a Fri night, and the first time we ran with volunteers. The fact that the con seems to be getting better each year is important for me.
"It looks a bit eclectic"
Friday night kicked off around 7 at an uber-chilled venue, described by Roelof as "what I always imagined ZaCon should be" which was pretty great. Despite a projector failure, and nowhere to put the backup one, Roelof and Marco both presented some really entertaining talks. It was a nice mix of entertaining (and freaky) OSint followed by some hardcore vuln research. The time on either side to meet and talk to people was fun as a change to the usual brain-bending long day that is ZaCon.
Continue reading "ZaCon III - TBOY"
This is re-published, from the original on the SensePost blog.
Security policies are necessary, but their focus is to the detriment of more important security tasks. If auditors had looked for trivial SQL injection on a companies front-page as hard as they have checked for security polices, then maybe our industry would be in a better place. I want to make this go away, I want to help you tick the box so you can focus on the real work. If you just want the "tool" skip to the end.
Continue reading "Security Policies - Go Away"
This was originally posted on the SensePost blog.
Over the last few years there has been a popular meme talking about information centric security as a new paradigm over vulnerability centric security. I've long struggled with the idea of information-centricity being successful, and in replying to a post by Rob Bainbridge, quickly jotted some of those problems down.
In pre-summary, I'm still sceptical of information-classification approaches (or information-led control implementations) as I feel they target a theoretically sensible idea, but not a practically sensible one.
Continue reading "Threat Modeling vs Information Classification"