Password attacks against http web forms

Web applications have become important assets in a company infrastructure. If you need to do a penetration test then it is essential that you have a basic understanding of how to analyse and test these web applications.

Many, if not all, require some form of authentication. Sometimes this happens via Basic Authentication where the user needs to enter credentials in some form of popup in the web browser. More often though the authentication happens viaRead more.

Top 20 Free Digital Forensic Investigation Tools for SysAdmins

A list of 20 different digital forensic investigation tools. The list is taken from http://www.gfi.com/blog/top-20-free-digital-forensic-investigation-tools-for-sysadmins/.

Added this post as a reminder-to-self.

SANS SIFT ProDiscover Basic Volatility The Sleuth Kit (+Autopsy) FTK Imager Linux ‘dd’ CAINE Oxygen Forensic Suite 2013 Standard Free Hex Editor Neo Bulk Extractor DEFT Xplico LastActivityView Digital Forensic Framework Mandiant RedLine PlainSight HxD HELIX3 Free NetSleuth P2 eXplorer Free

Remote shell via SSH for remote pentesting

SSH is a powerful remote access tool. It has an often overlooked feature -R : (from the man pages) Specifies that the given port on the remote (server) host is to be forwarded to the given host and port on the local side..

In essence this means that you can have a remote host A connecting to a host B that is controlled by you. Then from that host B you can connect trough hostRead more.

NetTraveler, cyber-espionage campaign

Kaspersky recently released a paper on a cyber-espionage campaign that used NetTraveler, a malicious program used for covert computer surveillance.

The document is an interesting read. Below is a summary of some of the attack vectors used with this malware. You can use this information to detect the presence of the NetTraveler malware.

Nettraveler uses a couple of C&C scripts

Two of the C&C domains are sinkholed, pkspring.net and yangdex.org byRead more.

Manually crafted HTTP requests

If you want to mangle HTTP requests you are better of with tools like Paros or the Burp Suite. Have a look at the OWASP page for further info. However, if you would like to send them manually with telnet you can use the template below.

Warning! This template worked for me, you should adjust it for your case.

I created a small python script, http-py, available on Github do the manually queries.

PwnPi, The Pen Test Drop Box Distro for the Raspberry Pi

I recently discovered a new penetration testing distribution called PwnPi, “The Pen Test Drop Box Distro for the Raspberry Pi”.

Although the distribution itself is already very interesting, the list of tools provided by the distro is even more interesting. It is the ideal starting point if you want to build your own toolset.

6tunnel – TCP proxy for non-IPv6 applications aircrack-ng – WEP/WPA cracking program amap – a powerful application mapper arp-scan – arpRead more.

The Linux password file, /etc/passwd

The /etc/passwd file stores crucial information which is required during login on Linux systems.

A line in /etc/passwd is one entry for a user account. The fields are separated by a colon (:).

The format is as follows (note that for the purpose of formatting the display, the line is split. A real /etc/passwd file would have all the data on one line).

If the password field (2) contains an X then the encryptedRead more.

Nmap scan through TOR

TOR (https://www.torproject.org/) is a great project if you want to take care of your privacy. You can use TOR to proxy your nmap scans making it very difficult for the scanned network to find the source.

First check that you have TOR installed. It should be listening on a local network port tcp/9050.

You also need to install a package called proxychains that will proxy all the traffic through TOR. Proxychains has its configuration fileRead more.

Use Dropbox with encrypted volume for backups

I use Dropbox to have online backups of my files. Dropbox already provides a good set of protection mechanisms (Two-step verification, …). If you need an additional level then Boxcryptor is worth having a look.

Unfortunately Boxcryptor is not available on Linux but it is compatible with encfs. The blog of Boxcryptor has a post describing in details how you can setup encfs on Ubuntu.

The blog post lacks some useful additional details.

Read more.

Red October – Indicators of compromise

“Red October” is a high-level cyber-espionage campaign that has been active for over 5 years and the discovery was announced on January 14, 2013 by Kaspersky Lab.

Below is a list of domains and IPs used in the attack. These lists can help system administrators spot infections on their network. The information is taken from the PDF at http://www.securelist.com/en/blog/208194092/Red_October_Indicators_of_compromise.