Gamma Group Writeup
by Phineas Fisher, 2014
Remark |
---|
31337 |
Gamma Group |
FOIA |
FOIA request |
“demystifying hacking and inspire others to hack shit” |
Truecrypt 7.1a |
Whonix |
Tor |
cantenna |
aircrack |
reaver |
general OPSEC recommendations |
shut up! |
v& (vanned) |
hacking over Tor is slow |
nmap |
sqlmap |
nikto |
public IP for catching reverse shells |
use hacked servers or VPS paid with bitcoin |
fierce.pl |
reconnaissance |
whois |
CIDR |
reverse whois lookups |
whois lookups |
Google -inurl directive |
DomainTools |
SNMP scanning is underrated |
git, GitHub |
FTP |
weak credentials, default passwords |
stratfor |
VOIP |
IP camera |
router |
webserver |
.svn directory |
backups |
phpinfo |
WhatWeb |
wpscan |
CMS-Explorer |
Joomscan |
custom apps tend to have more bugs |
get copies of target’s web software to test and observe locally |
pirate software |
ZAP |
view source to find strings to identify software |
hack adjacent/similar sites to see how they work |
SQL injection |
url parameter |
Apache mod_security |
sqlmap –tamper=‘tamper/modsecurityversioned.py’ |
php shell |
JavaScript |
bypassing client-side verifications |
Weevely |
Damn Vulnerable Web App |
LFI |
file upload checks done client-side |
403 Forbidden |
/BackOffice |
MySQL |
intercepting proxy |
magic quotes |
sqlmap –file-read |
source code |
“root over 50% of Linux servers you encounter in the wild with two easy scripts: Linux Exploit Suggester and unix-privesc-check |
Debian |
cron privilege escalation |
webalyzer |
cron timezone restart bug |
/etc/localtime |
pivoting, lateral movement |
firewall |
tarball of static-linked binaries |
NSE scripts: nfs-x, smb-x |
whistleblower |
FinSpy |
command and control |
DDoS |
GPU |
scan, find vulns, exploit methodology |
exploiting web browsers |
Java |
Flash |
Microsoft Office |
phishing |
Metasploit browser autopwn |
fake Flash updater |
social engineering |
apache access log is readable root only, but can be accessed as /proc/self/fd/x |
socat |
static linking |
guerilla warfare |
Book Recommendations |
---|
The Web Application Hacker’s Handbook |
Hacking: The Art of Exploitation |
The Database Hacker’s Handbook |
The Art of Software Security Assessment |
A Bug Hunter’s Diary |
Underground: Tales of Hacking, Madness, and Obsession on the Electronic Frontier |
TCP/IP Illustrated |