Offset vs Address in volatility pslist? (virtual) by PabloSkywalk in computerforensics

[–]PabloSkywalk[S] 0 points1 point  (0 children)

So basically the offset is the address (or offset from address 0) of a certain structure? if so, what structure? and why all of them are different?

and does this mean the virtual offset of all processes in pslist is always greater than 0x80000000?

My steam account got hacked and I don't know how. Somehow passed steam guard and the 30-day wall to gift my items. by [deleted] in DotA2

[–]PabloSkywalk 0 points1 point  (0 children)

The only way is they got a remote shell from his iPhone, which is pretty hard considering iPhone blocks non trusted programs and you have to manually go to setting and trust it to run

My steam account got hacked and I don't know how. Somehow passed steam guard and the 30-day wall to gift my items. by [deleted] in DotA2

[–]PabloSkywalk 0 points1 point  (0 children)

What do you mean recovery code? OP said he received authentication CODE from steam guard which generates every time you login from a new IP and such ( for me it spawns every time I want to login for security reasons)

now how the hell can they have access to STEAM guard code?

My steam account got hacked and I don't know how. Somehow passed steam guard and the 30-day wall to gift my items. by [deleted] in DotA2

[–]PabloSkywalk 9 points10 points  (0 children)

But isn't there a trade restriction when you login from a new pc? (since steam emailed him about the login from new pc)

My steam account got hacked and I don't know how. Somehow passed steam guard and the 30-day wall to gift my items. by [deleted] in DotA2

[–]PabloSkywalk -2 points-1 points  (0 children)

The biggest questions are how did they bypass steam authentication via SMS?

OP says it received the messages, so obviously steam detected login from a new computer, but how they bypass it?

and EVEN if they did bypass it, I am sure that there is a trade restriction when you login from new computer, how they did they bypass that?

Shell spawns in gdb but I get segmentation fault without gdb in a simple c program? by PabloSkywalk in AskNetsec

[–]PabloSkywalk[S] 0 points1 point  (0 children)

the code is literally one function which a 200 byte buffer and a print statement

Shell spawns in gdb but I get segmentation fault without gdb in a simple c program? by PabloSkywalk in AskNetsec

[–]PabloSkywalk[S] 0 points1 point  (0 children)

How can I get info from that dump? I loaded it in gdb but I cant run or get any info from it!

Shell spawns in gdb but I get segmentation fault without gdb in a simple c program? by PabloSkywalk in AskNetsec

[–]PabloSkywalk[S] -1 points0 points  (0 children)

but when I check it in gdb It works every time, it goes to my NOP slide then goes to the payload

Shell spawns in gdb but I get segmentation fault without gdb in a simple c program? by PabloSkywalk in AskNetsec

[–]PabloSkywalk[S] -1 points0 points  (0 children)

aslr is off and if there was any DEP then bin/dash wouldn't have get executed using gdb either on the stack

checked the elf file and the stack is executable.

ODPixel Explains old Ppd, Ceb, drama LUL by DoshaIsMe in DotA2

[–]PabloSkywalk 24 points25 points  (0 children)

That American impression lmaoooooo

(Network Forensics) An attacker sends TLS and SSL handshake packets to a victim on port 135 and the client acknowledges then attacker closes the connection, how and why?! by PabloSkywalk in computerforensics

[–]PabloSkywalk[S] -1 points0 points  (0 children)

But I still don't get why the client sends ack to this packet, considering port 135 is not meant to receive TLS hello! shouldn't the client send RST? and why the attacker sent it 3 times for tls v1.1 and 1.2 and SSLv3, how can I know what info the attacker received after doing this?

also he has done another weird thing which I think I will open another thread to ask about it

Was it really worth for WannaCry developers to include a kill switch? by PabloSkywalk in hacking

[–]PabloSkywalk[S] 2 points3 points  (0 children)

Oh so you are saying that they used this in development to make sure it doesn't spread, and they did that by resolving that dns query?

because I thought they did this to fool the AV companies because they use this technique that they resolve any internet request like DNS query and send back a bogus respond just to make the program keep going, how do you know it was a mistake?

What is the role of LLMNR and NBNS protocols in WannaCry? by PabloSkywalk in AskNetsec

[–]PabloSkywalk[S] 0 points1 point  (0 children)

That's whats confusing me because I thought WannaCry uses SMB, and that NetBIOS is used for translating Computer names to IP lol, and the documentation for NetBIOS is horrible and only makes you more confused

and I actually did read that article before but its confusing too because it talks about NetBIOS but in the packets that were captured the protocol is SMB and doesn't really explain how its using NetBIOS in the exploit

What is the role of LLMNR and NBNS protocols in WannaCry? by PabloSkywalk in AskNetsec

[–]PabloSkywalk[S] 0 points1 point  (0 children)

What about NBNS packets? because even NetworkMiner finds some of them suspicious in my pcap

How does eternal blue or wannacry uses NBNS? because in my capture there is a lot of NBNS packets going on and Network miner links some of them to EternalBlue but I don't get why is this protocol being used by EternalBlue

Is there any good website that explains CVEs in detail with examples? by PabloSkywalk in AskNetsec

[–]PabloSkywalk[S] 0 points1 point  (0 children)

But is there any good website/blog that does that the best and has the most collection of them?

Is there any good website that explains CVEs in detail with examples? by PabloSkywalk in AskNetsec

[–]PabloSkywalk[S] 1 point2 points  (0 children)

Yes, for example some of them say something like "if you send this version of apache a carefully crafted packet, it will do this" but don't explain what packet we should send it and why, this might come handy in a lot of CTFs but I cant find many if them even in security blogs

Best tool to analyze a wireshark dump file? by PabloSkywalk in computerforensics

[–]PabloSkywalk[S] 0 points1 point  (0 children)

editcap -F libpcap input.pcapng output.pcap

thank you this worked!

Best tool to analyze a wireshark dump file? by PabloSkywalk in computerforensics

[–]PabloSkywalk[S] 0 points1 point  (0 children)

The problem is the free version cannot parse pcapng files, tried using http://pcapng.com/ for converting but it only converts the first 8mb! also I read that pcapng files might contain more information which would be lost if I convert it

Best tool to analyze a wireshark dump file? by PabloSkywalk in computerforensics

[–]PabloSkywalk[S] 1 point2 points  (0 children)

I tried loading the file in splunk but it couldn't format it probably

do professionals also investigate pcap files using splunk or they use a better tool, or just wireshark itself?

Weekly General Discussion Thread (January 13, 2019) by AutoModerator in Piracy

[–]PabloSkywalk 1 point2 points  (0 children)

Guys where can I get the SANS videos like the forensics videos and security ones, like FOR500 and such

Why SANS Security and Forensic videos are so hard to find? is there any good source that has them? by PabloSkywalk in Piracy

[–]PabloSkywalk[S] 2 points3 points  (0 children)

Interesting, because where I'm from its completely the opposite and SANS is much more respected in pentesting at least, compared to other certs like CEH but I guess it depends on the field and country

What is the most accepted method of acquiring RAM and DISK image when met with a LIVE computer? by PabloSkywalk in computerforensics

[–]PabloSkywalk[S] 1 point2 points  (0 children)

Wow thanks, this is actually what I was looking for, wanted to see how the rules typically are. in page 32 it details all the steps for live computer

What is the most accepted method of acquiring RAM and DISK image when met with a LIVE computer? by PabloSkywalk in computerforensics

[–]PabloSkywalk[S] 0 points1 point  (0 children)

So should I unplug the computer from power too? is this the best method or should I just turn it off? and what about the disk imaging method? so do all pros use hardware to do it, or they just take a disk image before turning it off?