Edge-security blog about Penetration testing, OSINT, security tools, and other interesting stuff.
Wednesday, December 31, 2008
Flash movie analyzers
Secure deleting a Macbook (pro) with OSX
Zero Out Data:
35 pass erase:
Well after checking the options, i went with the 7 pass erase method, and for a 150GB partition it took 7 hours to complete, now i had to do the same for the 100GB partition :(
Reference: http://danbenjamin.com/articles/2008/05/secure-erase-osx
-CMM
Tuesday, December 30, 2008
25C3 Chaos Communication Congress videos
Usename check!
Friday, December 19, 2008
Netifera - Network security Analysis
A new framework is being cooked at Netifera.com, it is coded over Eclipse framework, so the application will be able to run in all platforms, right now there is only two packages Linux and OsX.
A description taken from their website:
"At netifera we are building a next generation platform for network security analysis.
Our architecture is a radically innovative approach to managing high volumes of network information.
Our free and open source platform provides the framework for creating and integrating security tools with a flexibility that has never been possible before."
The team is made of people who has worked in CORE, Sebastian Muñiz and Luciano Notarfrancesco, were the ones that presented the tool at XCON in china.
You can download the beta and get more information HERE
-CMM
Wednesday, December 17, 2008
Malware Hash registry
The service is free for non-commercial use.
The results of the query, will output the date the sample was first seen, and the detection rate of 30 AV engines.
Also you can cross check with the www.virustotal.com engine hash check option
More information HERE
-CMM
Metasploit Decloak V2
Tuesday, December 9, 2008
Oracle Forensics
Thursday, December 4, 2008
Panda Security advertisement
The guys from Panda Security made a great advertisement with a concept very far from the information security but very funny and effective, at least the main idea is very well transmitted.
-CMM
Python Regexp tester
Give a try here
-CMM
Jsky - a free Web Application Scanner
- SQL Injection
- XSS
- Unsecure object using
- Local path disclosure
- Unsecure directory permissions
- Server vulnerabilities like buffer overflow and configure error
- Possible sensitive directories and files scan
- Backup files scan
- Source code disclosure
- Command Execute
- File Include
- Web backdoor
- Sensitive information
- And so much more......
Tuesday, December 2, 2008
Shellcode2Exe
Shellcode2Exe
Just paste the shellcode and click submit, right now supports 3 types of shellcode:
1) %u urlencoded IE shellcode payloads
2) \x style C strings
3) raw hex strings with no spaces ex. 9090EB15
It's based on a tool that you can find in the Malcode Analyzing Pack from Idefense
Thanks Vicente for the tip
-CMM
Monday, December 1, 2008
Windows Prefetcher and forensic analysis
The Prefetcher:
"It is a component of the Memory manager that speeds up the Windows boot process, and shortens the amount of time it takes to start up programs."
"Windows XP monitors the files that are used when the computer starts and when you start applications. By monitoring these files, Windows XP can prefetch them. Prefetching data is the process whereby data that is expected to be requested is read ahead into the cache. Prefetching boot files and applications decreases the time needed to start Windows XP and start applications."
This feature was introduced with XP, and it's available in VISTA.
In short when you launch an application windows will create .pf file in the prefetch directory (%SYSTEMROOT%\Prefetch\), this file will contain information to speed up future application startups.
This file contains different information about the application, but at the end of the file we can find the path of the file image.
The name of the file is FILE-HASH.pf, the HASH is calculated with the path of the file image, so if the same binary is run from two different location, we will have two different prefetch files.
So now you can find if an application was run on the Windows system and you can have the MAC times of the prefetch file and the image file to add to the timeline analysis, also there is a counter of how many times the application was used. (You can use Windows File Analyzer to get all this information)
This could be helpful when analyzing Malware on infected machines, the malware maybe is deleted but the prefetch entry is still available, or to find the executable of the malware analyzing all the prefetch files.
Maybe you are wondering how many files Windows will save? It's supposed to maintain 128 entries, any entry over 128 will be flushed, most frequently used applications will be preserved.
Do you know more places to find information about applications runs?
More info on Prefetch
Thursday, November 27, 2008
Explico - Network forensics
The goal of Xplico is extract from an internet traffic capture the applications data contained.
For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP contents, each VoIP call (SIP), and so on. Xplico isn’t a network protocol analyzer. Xplico is an open source Network Forensic Analisys Tool (NFAT).
Website and more info: http://www.xplico.org/about
-CMM
Incident Handling Cheatsheets
Monday, November 24, 2008
IV OWASP SPAIN presentation
The room was full, even my talk started at 19:15, after 3 other talks, that's was very cool because it means that the people was interested in the topic.
It's curious how there are a lot of people not aware of this issue (Information Gathering, information leak, etc), but at least i felt good about doing some awareness.
You can get the presentation here
-CMM
Nessus - Alternative Feeds
So if you want to use this plugins, go to this page
The plugins also work on OpenVAS
Do you know any other free feed?
Enjoy
-CMM
Sunday, November 23, 2008
Desktop setup - Unity power
First i want to make clear why i use Windows Vista instead of Linux? Well because i'm working a lot with Office Documents, and i couldn't find a good solution on Linux (i tried almost everything), also the different problems i have with Linux that are time consuming to fix (Multiple screens, is a difficult task for a linux, i don't know why they do not create a easy config tool like Windows)
So where is Linux? i run linux on both machines in a Vmware machine, in the Fujitsu Machine is blazing fast, so fast that i had to try it native and compare, and to my perception it was faster in the Virtual Machine, not so sure why, but is good for me :)
And in my personal computer linux runs in Vmware Fusion, a great piece of software. You might be wondering, "it's the same as the others vmwares out there", well NO, it has a feature called Unity, that allows you to run the Guest operative applications, on the HOST desktop, as if they were a native application, i talked of a feature like this in Parallels called Coherence, both Vmware and Parallels supported Windows Guest system for this feature, but recently Vmware Fusion added support to Linux guest systems.
Here is my OSX desktop, running my Ubuntu linux applications (the ones with black windows):
You can see the ProxyStrike running on OSX and Linux, and a Ubuntu Terminal and a OSX Terminal, also a Ubuntu file manager windows.
For OSX to be perfect, i would like to have windows management options like WMII, not all of them, but basic ones, like WinSplit Revolution on Windows.
(After writing this post I found a way of doing some of the tricks, but you have to use AppleScript and Quicksilver, i will post later a customized version)
In future post i will show the software i usually use on both machines for my pentesting tasks and for productivity also..
What is your desktop setup?
-CMM
WebSlayer at Pauldotcom podcast
Last week Matt Tesauro from OWASP, pointed me that "WebSlayer" was reviewed in the show "PaulDotCom" a Security weekly podcast.
The MP3 of the show can be downloaded here
Also you can find the episode notes here
I recommend this podcast, is very interesting and they talk a lot about penetration testing topics, really useful and very entertainment.
They liked the tool, so it's a good signal and good feedback.
I'm waiting for the next episode :)
-CMM
Wednesday, November 19, 2008
Clickjacking Demo
"The basic idea is that an attacker loads the content of an external site into the site you’re visiting, sets the external content to be invisible and then overlays the page you’re looking at. When you click a link you see on the current page, you are in fact clicking on the externally loaded page and about to load pretty much whatever the attacker wants."
Well it seems pretty easy and clear, but if you want to see an attack in action, you have to check this GUYA.NET, where an attacker controls the camera of the victim, through a ClickJacking attack.
Some of you might be wondering how can you protect against it? The last version of NoScript (a Firefox Plugin that provides protection against XSS) adds protection to ClickJacking.
Be careful where you click ;)
CMM-
Tuesday, November 11, 2008
Memoryze - Memory forensic tool
Sunday, November 9, 2008
OWASP EU SUMMIT is over
Thursday morning, i gave my presentation about WebSlayer, i started 4 talks before schedule, so they catch me a little off guard. Everything went smooth after i managed to make the microphone works :P
There were 2 other guys from Argentina, Arturo "Buanzo" Busleiman a very well known security expert, and Fabio Cerrullo a great person.
The place was very beautiful, but i hadn't enough time to visit the city, we were working from 8:00hs to 20:00hs , really very exhausting, but was fruitful.
Giorgio Fedon pulled a good working group about Web Malware, the idea was to start working in a document to splash the different kind of web attacks the malware use, and how a company can protect from them.
The thursday night the OWASP Band played some great tunes, it was incredible how good they were, taking into account that they never played together!
Seven committees were created to face different projects and issues, this is very interesting because a layer of middle management was needed, to handle all the heavy work and organization.
Regards to everyone that made this possible, in special Paulo Coimbra and Dinis Cruz, because without their effort this wouldn't happened.
The full results of the summit will be captured and released as a report from OWASP in the next few weeks.
Now there is a lot of work to do :)
-CMM
Kiosk hacking
Some of the tricks:
Invoking a command line, without executing cmd.exe:
-command.com
-loadfix.com start.exe
-win.com
-start loadfix.com cmd.exe
-%COMPSEC%
-sc create testsvc binpath "cmd /K start" type= own type interact
Another cool trick is embedding a cmd.exe inside an Office document (doc,docx, xls, xlsb, xlsm, xlsx), and then when you open the file the "Open package Contents" will popup.
Most of the bypasses are because the use of Black lists, the people still doesn't get it that black lists are dangerous...
I recommend to check the Ikat site and Paul Craig presentation to get all the tricks:
HITB presentation
I-KAT website
Portable tool
-CMM
Wednesday, November 5, 2008
Defcon 16 videos and HITB 2008 presentations
http://conference.hitb.org/hitbsecconf2008kl/materials/
And here are some Defcon 16 videos:
Sunday, November 2, 2008
WebSlayer released
Sunday, October 26, 2008
OWASP European Summit 2008
With the theme ‘Setting the AppSec agenda for 2009′, the OWASP Summit will be a worldwide gathering of OWASP leaders and key industry players to present and discuss the latest OWASP tools, documentation projects, and web application security trends.
I will be participating in the summit presenting the project WebSlayer, the web application brute forcer. Here you can find the WebSlayer site at OWASP. Also i will participate in some working sessions about OWASP Top Ten 2009, Tools Projects, OWASP Certification and OWASP Live CD.
The summit will be held at Algarve Portugal, i never been there but it seems a beautiful place.
It will be a huge event, with a lot of interesting talks and sessions to attend, i hope to meet some interesting people to exchange ideas.
If you will be there and want to have a beer, drop me a line.
Tuesday, October 21, 2008
EnDe - Complete web Encoder Decoder
"Encoder, Decoder, Converter, Transformer, Calculator, for various codings used in the wild wide web"
Cheat sheets
- Protocols: Spanning Tree, Ipv6, Ipv5, OSPF, EIGRP, BGP
- Applications: Tcpdump, Wireshark
- Reference: Common ports, IP access lists, Subnetting
- Technologies: MPLS, QoS, Vlans, IOS version
- Regular expressions
- Subversion
- CSS
- PHP
- Mod_rewrite
- SQL SERVER
- HTML
- Ruby on rails
- ASP/VBScript
- Mysql
- Etc
- Jquery
- JSP
- Java
- Firefox
- Coldfusion
- htacces
- Gimp
- Django
- mod_rewrite
- Mysql
- Oracle
- Perl
- Python
- Ruby
- Sendmail
- Solaris
- SSI
- Sybase
- UML
- Vim
- XML
- XSS
- etc.
Thursday, October 9, 2008
Setting Vmware to trick Malware
OWASP Spain Chapter Meeting
If you want to join us, remember the 21 of November, place IL3 - Institute for LifeLong Learning (Universitat de Barcelona)
Wednesday, October 8, 2008
Metagoofil in Toorcon
The last week Chris Gates from carnalOwnage gave a talk in Toorcon about Information Gathering called "New School Information Gathering" in his talk he speak about Metagoofil, and how you can use it on getting information from the metadata of public documents.
I liked the presentation, and i think that Chris did a good job putting everything together
If you want to get the presentation get it here: http://www.carnal0wnage.com/research/Carnal-NewSchool-ToorconX.pdf
CMM
Tuesday, October 7, 2008
Displaying Windows cached DNS entries
c:>ipconfig /displaydns
slashdot.org
----------------------------------------
Nombre de registro . : slashdot.org
Tipo de registro . . : 1
Período de vida . . . : 2117
Longitud de datos . . : 4
Sección . . . . . . . : respuesta
Un registro (host). . : 216.34.181.45
This could be useful when analyzing malware or doing forensic analysis
CMM
Yaptest - Automating Pentesting tasks
- Run nikto on anything nmap thinks is an HTTP service
- Run hydra on every host with TCP port 21 open
- Attempt upload a file to any TFTP servers found
- Run onesixtyone on all hosts that are up
- Try metasploit's solaris_kcms_readfile exploit against any hosts running kcmsd
Monday, October 6, 2008
Ecrime - New mafias
It's a very interesting talk for everybody, because it's not a topic that you can find much information about..
The presentation is more interesting with Vicente's speech and comments, but you can download the presentation from the FIST Conference page, or from here Edge-Security site.
Enjoy
Monday, September 15, 2008
Metagoofil - Metadata Extractor Update
The problem was that Google changed the source code of the results page, so the parser failed to catch the files. I guess that the structure of the HTML is changed often, to render useless the tools that use google in an automated way outside the API (all the tools right now).
Recently Roelof talked about the problems he had in Maltego using google as an input and core part of a tool, i want to confirm what he said, it's really a mess to maintain a tool that uses google as input :(
Enough for today.
Thanks to Chris Gates for pointing out the problem.
Monday, July 7, 2008
VAPWN - Web application Visualization - Crawler
You can view a video with an example of a crawling, different colors means different kind of files (dinamic, javascript, directory, hmtl, etc):
http://www.edge-security.com/vapwn-edge.mov
Hope you like, we are going the release this alpha version asap.
Enjoy!
Tuesday, May 27, 2008
Windows Vista - Easy hack
Just boot with a live CD, move utilman.exe to utilman.old, and copy cmd.exe to utilman.exe.
Then in the login window, just press CTRL-U, and a console with administrative rights will pop up.
It's the same as the old Windows XP Sticky-keys trick.
Video here
Enjoy
Tuesday, May 20, 2008
PCI Requirement 666, sorry 6.6
- Manual review of application source code
- Proper use of automated source code analyzer (scanning) tools
- Manual web application security vulnerability assessments
- Proper use of automated web application security vulnerability assessment (scanning) tools.
Metagoofil 1.4 - Metadata exposed
Wednesday, May 7, 2008
PhishMe - Phishing awareness
It's not a bad idea, with this you can have a sense of how your company employees deal with phishing scams. What is curious is that interface seems like a real professional Phisher interface, at least it will give ideas to the Phishers on how to organize and present the data of the attacks launched to get an idea of the success rate of the campaign.
Check Phishme.com
Dancho's post
Tuesday, May 6, 2008
Information Security Workforce Study
(ISC)2 bring us the new study about the Information Security Workforce, here you can find a lot of information about our profession for compare your position in different countries, which positions are best paid, etc. As stated in the (ISC)2 website:
"... the Study reflects the opinions of the dynamic information security workforce. It is the largest study of its kind and provides detailed insight into important trends and opportunities within the information security profession. It aims to provide a clear understanding of pay scales, skills gaps, training requirements, corporate hiring practices, security budgets, career progression and corporate attitude toward information security that is of use to companies, hiring managers and information security professionals"
A very interesting reading: Download Study
Monday, May 5, 2008
Book - Zero Day Threat
Mysql - SQL Injection
Let's get to work, first we need to get the schemas (Databases):
"SELECT table_schema FROM information_schema.tables WHERE table_schema != 'mysql' AND table_schema != 'information_schema' limit 1,1"
Once we know which database we want to extract data, we proceed to list the tables:
"SELECT table_name FROM information_schema.tables where table_schema = 'MYSCHEMA' limit 1,1"
MYSCHEMA = obtained schema from query 1
Now that we have the tables, we will go for the columns:
"SELECT column_name FROM information_schema.columns WHERE table_schema ="MYSCHEMA" and table_name = 'MYTABLE' Limit 1,1"
MYTABLE = obtained from query 2
And after this process you know the Schema (Database), the tables and the columns, so you can create the query to extract the data you want or think it will be interesting for the penetration test.
Another interesting query for penetration testing, is the one that can create a bruteforce attack
to find which table has a column named X.
"SELECT table_name FROM information_schema.columns WHERE column_name like '%MYWORD%' limit 1,1"
MYWORD= a word taken from a dictionary
Now is all about of putting this together in a script for automation. You can check www.edge-security.com Pblind for a SQL Injector script, the next release will have this feature included.
If you have another idea, please let me know.
Regards
Tuesday, April 15, 2008
SQLZoo - Your one stop for SQL
Wednesday, April 2, 2008
Pwn to own
Well now the contest is over and the results are this:
1- MacBook Air running OSX 10.5.2 - Charlie Miller - Exploited a Safari bug
2- Fujitsu U810 running Vista Ultimate SP1 - Shane Macaulay (Security Objetives) -
Ubuntu standed strong in the contest and nobody managed to own it. The question is, someone went after the Ubuntu? or everybody concentrated their efforts on the more deployed OS's?
Now everyone will start saying that Linux is stronger than the others, but i don't think that one
contest like this could be used in the war of "Which OS is more secure?"
Also is interesting seeing how in a little time (48hs) when money is put in the game new vulnerabilities are founded.
Charlie in action:
More information here
Video of Charlie Miller after pwning OS X
Thursday, March 20, 2008
RedIris Conference
Hi all, the thursday 27 i will be talking on the "VI Foro de Seguridad RedIris", the topic of this Forum will be Web Application security. My talk is about "Common application security vulnerabilities" aka "The Usual Suspects". I will make an overview of the most common vulnerabilities, based on the OWASP Top 10.
If you want to have a good time and learn more about Web Application Security this could be a good oportunity.
The conference program can be checked here
See you there!
Thursday, March 6, 2008
MSRPC Auditing
The following toolset is recommended by them:
- PyMSRPC consists of the following components
- Lexer and Parse
- A library of NDR objects
- Utilizes Impacket from CORE for transport
- Tie-ins for the Sulley Fuzzing Framework
Wednesday, February 20, 2008
Fuzzing - Brute force Vulnerability discover
This time i will talk about another great book. In this book Michael Sutton, Adam Greene and Pedram Amini expose everything you want to know about Fuzzing.
We can find a information about all the different types of Fuzzing: Network protocol Fuzzing, Web application Fuzzing, File format Fuzzing, in memory Fuzzing, etc. The book also cover the best fuzzing frameworks available like Spike, Peach, Sulley, and many more.
I enjoyed very much this book, it was easy to read and follow, very clear the concepts and well organized the contents.
If you want to learn all about Fuzzing, this is your book.
You can check the book web page: Fuzzing
See you soon!
Sunday, January 27, 2008
Ajax security
Are you interested in learning about Ajax security? I did, so i got the book "Ajax Security" by Hoffman and Sullivan (2007, Addison Wesley, 470 pages), and it is really useful. The book is well organized, the explanations are very clear and the examples well chosen.
I learned a lot about Ajax and the security implications of this technology with this book, i highly recommend it.
Ajax Security, Addison Wesley
Check the content table
Metasploit 3.1
This project is growing and improving in every release :)
I downloaded the RC for windows and i liked a lot, here are some screenshots:
Wanna try the GUI in the new release?
https://metasploit.com/framework-3.1-rc1.exe
https://metasploit.com/framework-3.1-rc1.tar.gz
Enjoy :)
Friday, January 11, 2008
Portbunny - Port scanning improvement
A new port scanner has been released by the Recurity Labs guys (FX), it has some improvements over the well known scanners (Nmap). It's was developed for the security professionals, with performance in mind. As stated in Portbunny webpage:
"PortBunny is a Linux-kernel-based port-scanner created by Recurity Labs. Its aim is to provide a reliable and fast TCP-SYN-port-scanner which performs sophisticated timing based on the use of so called "trigger"-packets. The port-scan is performed in 2 steps: First the scanner tries to find packets, to which the target responds ("triggers"). Second, the actual port-scan is performed. During the scan, the triggers, which were found in the first scanning-phase, are used to determine the optimal speed at which the target may be scanned."
Portbunny webpage
Enjoy.
Wfuzz 2.2.0 released
I'm pleased to announce a new version of WFuzz! Wfuzz has been created to facilitate the task in web applications assessments and it...
-
In the last few weeks everyone has been talking about Shellshock, the vulnerability affecting bash and having security ramifications everyw...
-
I'm pleased to announce a new version of WFuzz! Wfuzz is a tool designed for bruteforcing Web Applications, it can be used for findi...
-
In one of the latest penetration tests we faced a SSH server that was based in Maverick SSHTOOLS. The funny thing is that this server was ...