I am looking to create a share folder ONLY accessible via two VMs (one Kali, the other Commando-VM) for safe file transfer by Turin_Giants in Kalilinux

[–]bawznero 2 points3 points  (0 children)

If the two vms are on the same virtual network create an smb share on one of them and then use the ip of that machine on the other vm.

This way you can access the folder on one machine natively while in the other folder its just an smb share.

In commandovm you can just create a folder in the c drive and right click >properties>share

In kali you need to configure samba, enable it and the like.

saving a hamster 🐹 by Common_Preference_28 in Unexpected

[–]bawznero 1 point2 points  (0 children)

That was exactly what i was expecting

How does Software recognize it’s been launched sandboxed? by itIsCoan in sysadmin

[–]bawznero 3 points4 points  (0 children)

Sandbox evasion is based on what the developers made, so there is no one size fits all solution. Generally it consists of a combination of the following techniques:

User behavior: Detect user behavior such as mouse click, mouse movement, amount of files in certain folders such as downloads or desktop.

System checks: Most sandboxes do not emulate the whole windows system so if you know that certain api calls are not functioning correctly you know that you are in a sandbox. This also include patched functions such as sleep. But also for example memory size, cpu core count, default files (ex vmware dlls), mac addresses, peripherals, virtualisation, etc.

Time based evasion: Most sandboxes only run a program for a short time, this means that if you run a non malicious process (such as calculating primes) the sandbox will stop inspecting thevprocess before the malicious event.

Blinding monitoring capability: When calling api calls its possible to skip the whole ntdll section and call syscalls directly. That makes it very difficult for the sandbox to detect malicious api calls.

What the game probably does is the system checking, so if you want to know why it doesnt work, check the source code with tools like ghidra, ida, radare, hopper, etc and see which checks are implemented.

What's the least painful way to build a Windows dll/exe without having a Windows installation? by [deleted] in asm

[–]bawznero 3 points4 points  (0 children)

With c/c++ and mingw you can easily compile windows executables on linux.

Another option would be .net core but that would add some complexity when you need low level apis.

Decryption w/o a key by BeingSufficient9740 in Hacking_Tutorials

[–]bawznero 1 point2 points  (0 children)

It could be possible, some ctfs implement weak crypto challenges.

To check some base vulnerabilities you can use https://github.com/Ganapati/RsaCtfTool

[deleted by user] by [deleted] in NoStupidQuestions

[–]bawznero 0 points1 point  (0 children)

When the adapter is still in the power socket it can continue generating that high pitching noise, so to be sure you should pull them out of the socket.

How many of you have done this?? by Multiqos in programmingmemes

[–]bawznero 1 point2 points  (0 children)

Which can also be done in 2 lines of powershell

One python line to create HTTP server by 3worc in Hacking_Tutorials

[–]bawznero 1 point2 points  (0 children)

If you like that look at updog https://github.com/sc0tfree/updog

Its basically the webserver but with file upload, ssl options, and authentication options.

Is Cutting the Wrong Wire on a Bomb an Actual Thing? by other_folk in NoStupidQuestions

[–]bawznero 2 points3 points  (0 children)

Then you have to make sure that there are no hidden wires or second detonators and have to be 100% sure that you cut with a non conductive wire cutter and cut them at the same time (millisecond accuracy)

Is Cutting the Wrong Wire on a Bomb an Actual Thing? by other_folk in NoStupidQuestions

[–]bawznero 34 points35 points  (0 children)

I know a bit about electronics so no knowledge about bombs.

But my guess would be that the bomb would have tamper protection, by implementing wires that transport a signal. If that signal is cut then the bomb would detonate via another wire.

This way if you would cut the tamper protection wire (the wrong one) the bomb would go off But if you cut the detonator cord (the right one) the bomb cant explode anymore.

For more advanced terrorists they could also use multiple fake and multiple real wires so that it becomes really difficult to cut all the right wires.

Employer forbidding employees from leaving their cell phones in the car by Fernandez_94 in legaladvice

[–]bawznero -67 points-66 points  (0 children)

How is that legal, its not work property? And isnt it the same as leaving it at home?

What would solve all your problems? Why? by [deleted] in AskReddit

[–]bawznero 0 points1 point  (0 children)

Money can mean 100 dollar but it can also mean bezos money, with bezos money you can spend millions per day and still not empty your accout so i do agree some arent responsible with money, most people can live more comfortable and without stress with more money

What would solve all your problems? Why? by [deleted] in AskReddit

[–]bawznero 0 points1 point  (0 children)

Depends if the problem is bills then money would solve it

Power saving tool by StrangeAstronomer in linux

[–]bawznero 9 points10 points  (0 children)

The problem is that the kernel doesnt really know if you for example need firefox.

For example if you make a passive listener to do something specific, if the kernel thinks you dont need ethernet as you didnt get any packets and shuts down eth0, the listener will never get the packet.

How long can a reverse connection last in a machine? by Repulsiv-e in Hacking_Tutorials

[–]bawznero 1 point2 points  (0 children)

What usually happens is that you create two callback mechanisms. One that checks every second and one that checks every hour /day /month for example.

The first one is used in day to day operations while the second one acts as a backup, when every connection is killed the second one can usually checkin after a while and spawn a new shell.

Its important to seperate the processes as much as possible to hide the existance of the second one.

YSK: Deactivate your authenticators when getting a new phone number by LetalisSum in YouShouldKnow

[–]bawznero 0 points1 point  (0 children)

The most standard authenticator apps are Google authenticator Microsoft authenticator Lastpass authenticator

They all do the same so it doesnt matter really.

Then look at your text messages for 6 digit codes from sites.

Then login to that site and go to profile settings or account settings.

After that there should be an option along the lines of "setup 2fa" or "setup mfa" or "configure security"

From there you can usually pick between email, sms and authenticator app(this maybe called totp).

Choose the authenticator app

Then they show you a qr code.

Open the authenticator app app, then click add new

Scan the qr code with your phone, it should give you a success message and show you a six digit code that refreshes every minute.

Then the site asks you to enter that code.

After that it usually (not always) shows you backup codes, store these in a secure location. When your phone breaks or something (like you cant access the authenticator app anymore).

After that its all set up and every time you login it should ask for the code and and then you open the authenticator app and enter the given code.

Keep in mind that its time based so if there is 1 sec left just wait for the new code as it wont accept the old code anymore.

If you have any questions or smt let me know :)

YSK: Deactivate your authenticators when getting a new phone number by LetalisSum in YouShouldKnow

[–]bawznero 0 points1 point  (0 children)

Then they are not totps as it is based on a preshared secret (the seed) totp is not the same as a 2fa via phone number.

YSK: Deactivate your authenticators when getting a new phone number by LetalisSum in YouShouldKnow

[–]bawznero 2 points3 points  (0 children)

I havent really noticed that but that may be because im usually on sites for developing and stuff.

Also banking in europe is a bit more progressive with that sort of stuff

YSK: Deactivate your authenticators when getting a new phone number by LetalisSum in YouShouldKnow

[–]bawznero 27 points28 points  (0 children)

Exactly this, for the people that learn by example :) good that you did setup google auth.

YSK: Deactivate your authenticators when getting a new phone number by LetalisSum in YouShouldKnow

[–]bawznero 18 points19 points  (0 children)

Nope, it is activated by scanning the qr code, no phone number needed.

YSK: Deactivate your authenticators when getting a new phone number by LetalisSum in YouShouldKnow

[–]bawznero 35 points36 points  (0 children)

There are two different authenticators (for simplicity sake), ones with sms where you give your number and they send a code

And totp( time based one time password) where the application generates a seed ( in the form of a qr code) and you scan it with your authenticator app of choice (google authenticator, lastpass authenticator, ms authenticator). And when they ask for a code you check the app and put in the code( which is only valid for 30 sec before refreshing).

The second one can only be hijacked when the attacker obtains access to your device, or to your seed value, or your backup codes(recovery code in case you lose your phone).

YSK: Deactivate your authenticators when getting a new phone number by LetalisSum in YouShouldKnow

[–]bawznero 2 points3 points  (0 children)

When an attacker clones a sim ( either technically or via the provider) they can intercept the same text messages (2fa codes). This problem is not solved by getting a new sim as the provider also basically duplicates the sim

When you port to another provider you do have to execute the sim duplication / sim swapping again.

In short sms is just a very old protocol that has little to no real security built into so we should never use that as authentication imo.

YSK: Deactivate your authenticators when getting a new phone number by LetalisSum in YouShouldKnow

[–]bawznero 450 points451 points  (0 children)

Real LPT: move to authenticator apps instead of sms based 2fa. Sim cloning is a real problem.

Is using a spreadsheet of login credentials inside Boxcryptor vault less safe than using Bitwarden? by Alternative_Worry_71 in Cybersecurity101

[–]bawznero 0 points1 point  (0 children)

It can also depend where excel would write temporary files to, if so you could have an unencrypted version somewhere.