Thomas was alone

Well, not him. In fact it was me, alone in my boredom. (But check the game about Thomas, it’s a life changing experience).

Then I realized, that it was more than a year that I haven’t studied anything new or even remotely exciting. How come? Good old routine. And a lack of practice doesn’t make anyone better. Plus I have a lot of CPE to grab and blogging is an easy way.

In the following articles I’ll get a random machine from vulnhub.com and describe a process of hacking it. I’ll start from easy ones to see how things are going and then will get to more advanced boxes.

Shark on a wire

One of my favorite game trailers starts with something like this: “Once upon a time Aztecs believed that the gods did not just gave life to the people, but it had to be stolen. Prometheus stole the eternal flame, and Alberich stole the ring”.

I’m not implying anything, but the story is as old as the world itself and we’ll talk about stealing today. We’re going to steal some network traffic. And, of course, it’s not stealing it’s intercepting =)

wire_01

Continue reading “Shark on a wire”

On your trail

This post is also available in Russian

My dad always says that there are two types of malfunction in any electronic device – presence of contact where it should not be and absence where it must be. I think it summarizes pretty much all the cybersec in the first place because it also applies to privileges. Our goal in general is to make sure that people with right privileges were able to access data and others were not.

Privileges management is not an easy task, although it may look straight forward at first. You start with list of resources and list of accounts, you match them and get some sort of access matrix. When it grows, and grows, and changes and in a couple of years no one remembers what privileges were given and why. Sad but true, no one documents anything. And it’s no surprise that fired employee still has access to some resource, and group for remote access is filled with accounts no one knows where came from.

6fe

Continue reading “On your trail”

So you want to be a pentester

In previous article we’ve learned about owasp 10, basic attack techniques and overall idea of penetration testing. And you might ask, what should I do next? Am I a pentester now? Well, you’re not. But it’s only a matter of time when you will.jedi
Continue reading “So you want to be a pentester”

Yet another NES Project

It’s not a big secret that I’m a big fan of retrogaming. I don’t think that all the best games are already made, but still it was a big part of my experience as a kid. One day I decided to make my own gaming console with look and feel of a real retro console. My childhood gaming memories are mostly from ZX Spectrum (damn I’m old, but we’ll get to that), but the 8-bit console also takes its place in my heart. Here we go.

WP_20160609_19_19_40_Pro

Continue reading “Yet another NES Project”

A10 2017 – Insufficient Logging and Monitoring

How do you know that your site works as it supposed to? How do you know if it’s down? I was thrilled to realize that most of admins say – well, if nobody calls me on the phone, then it’s fine. But what if you’re in charge of a web hosting platform with thousands of web sites? And let’s say one-minute downtime costs a million? You’d better start planning some monitoring solution before it’s too late.

a1

Continue reading “A10 2017 – Insufficient Logging and Monitoring”