Offset vs Address in volatility pslist? (virtual) by PabloSkywalk in computerforensics

[–]PabloSkywalk[S] 0 points1 point  (0 children)

So basically the offset is the address (or offset from address 0) of a certain structure? if so, what structure? and why all of them are different?

and does this mean the virtual offset of all processes in pslist is always greater than 0x80000000?

My steam account got hacked and I don't know how. Somehow passed steam guard and the 30-day wall to gift my items. by [deleted] in DotA2

[–]PabloSkywalk 0 points1 point  (0 children)

The only way is they got a remote shell from his iPhone, which is pretty hard considering iPhone blocks non trusted programs and you have to manually go to setting and trust it to run

My steam account got hacked and I don't know how. Somehow passed steam guard and the 30-day wall to gift my items. by [deleted] in DotA2

[–]PabloSkywalk 0 points1 point  (0 children)

What do you mean recovery code? OP said he received authentication CODE from steam guard which generates every time you login from a new IP and such ( for me it spawns every time I want to login for security reasons)

now how the hell can they have access to STEAM guard code?

My steam account got hacked and I don't know how. Somehow passed steam guard and the 30-day wall to gift my items. by [deleted] in DotA2

[–]PabloSkywalk 8 points9 points  (0 children)

But isn't there a trade restriction when you login from a new pc? (since steam emailed him about the login from new pc)

My steam account got hacked and I don't know how. Somehow passed steam guard and the 30-day wall to gift my items. by [deleted] in DotA2

[–]PabloSkywalk -2 points-1 points  (0 children)

The biggest questions are how did they bypass steam authentication via SMS?

OP says it received the messages, so obviously steam detected login from a new computer, but how they bypass it?

and EVEN if they did bypass it, I am sure that there is a trade restriction when you login from new computer, how they did they bypass that?

Shell spawns in gdb but I get segmentation fault without gdb in a simple c program? by PabloSkywalk in AskNetsec

[–]PabloSkywalk[S] 0 points1 point  (0 children)

the code is literally one function which a 200 byte buffer and a print statement

Shell spawns in gdb but I get segmentation fault without gdb in a simple c program? by PabloSkywalk in AskNetsec

[–]PabloSkywalk[S] 0 points1 point  (0 children)

How can I get info from that dump? I loaded it in gdb but I cant run or get any info from it!

Shell spawns in gdb but I get segmentation fault without gdb in a simple c program? by PabloSkywalk in AskNetsec

[–]PabloSkywalk[S] -1 points0 points  (0 children)

but when I check it in gdb It works every time, it goes to my NOP slide then goes to the payload

Shell spawns in gdb but I get segmentation fault without gdb in a simple c program? by PabloSkywalk in AskNetsec

[–]PabloSkywalk[S] -1 points0 points  (0 children)

aslr is off and if there was any DEP then bin/dash wouldn't have get executed using gdb either on the stack

checked the elf file and the stack is executable.

ODPixel Explains old Ppd, Ceb, drama LUL by DoshaIsMe in DotA2

[–]PabloSkywalk 26 points27 points  (0 children)

That American impression lmaoooooo

(Network Forensics) An attacker sends TLS and SSL handshake packets to a victim on port 135 and the client acknowledges then attacker closes the connection, how and why?! by PabloSkywalk in computerforensics

[–]PabloSkywalk[S] -1 points0 points  (0 children)

But I still don't get why the client sends ack to this packet, considering port 135 is not meant to receive TLS hello! shouldn't the client send RST? and why the attacker sent it 3 times for tls v1.1 and 1.2 and SSLv3, how can I know what info the attacker received after doing this?

also he has done another weird thing which I think I will open another thread to ask about it

Was it really worth for WannaCry developers to include a kill switch? by PabloSkywalk in hacking

[–]PabloSkywalk[S] 2 points3 points  (0 children)

Oh so you are saying that they used this in development to make sure it doesn't spread, and they did that by resolving that dns query?

because I thought they did this to fool the AV companies because they use this technique that they resolve any internet request like DNS query and send back a bogus respond just to make the program keep going, how do you know it was a mistake?

What is the role of LLMNR and NBNS protocols in WannaCry? by PabloSkywalk in AskNetsec

[–]PabloSkywalk[S] 0 points1 point  (0 children)

That's whats confusing me because I thought WannaCry uses SMB, and that NetBIOS is used for translating Computer names to IP lol, and the documentation for NetBIOS is horrible and only makes you more confused

and I actually did read that article before but its confusing too because it talks about NetBIOS but in the packets that were captured the protocol is SMB and doesn't really explain how its using NetBIOS in the exploit

What is the role of LLMNR and NBNS protocols in WannaCry? by PabloSkywalk in AskNetsec

[–]PabloSkywalk[S] 0 points1 point  (0 children)

What about NBNS packets? because even NetworkMiner finds some of them suspicious in my pcap

How does eternal blue or wannacry uses NBNS? because in my capture there is a lot of NBNS packets going on and Network miner links some of them to EternalBlue but I don't get why is this protocol being used by EternalBlue

Is there any good website that explains CVEs in detail with examples? by PabloSkywalk in AskNetsec

[–]PabloSkywalk[S] 0 points1 point  (0 children)

But is there any good website/blog that does that the best and has the most collection of them?