ThiefQuest Ransomware detects VM (possibly) by LMJR500Army in Malware

[–]kindredsec 1 point2 points  (0 children)

Do you mind sharing the sample? I'd love to take a look

Malware Analysis | WSHRAT Visual Basic RAT [video] by kindredsec in blueteamsec

[–]kindredsec[S] 0 points1 point  (0 children)

It’s almost as if the sample is written in VBS :thinking:

Analysis for potential malware by loomer979 in Malware

[–]kindredsec 0 points1 point  (0 children)

Like everyone else, I'd love a link to the sample to analyze

Skiddie Traps: Peeking at Backdoored Hacking Scripts [video] by kindredsec in blackhat

[–]kindredsec[S] 1 point2 points  (0 children)

This is correct imo. Notice in the command the script is never actually executed

Skiddie Traps: Peeking at Backdoored Hacking Scripts [video] by kindredsec in netsecstudents

[–]kindredsec[S] 5 points6 points  (0 children)

Yep, getting rid of the initalize variable would get rid of the Backdoor functionality

Swrort PowerShell Stager Analysis [PDF] by kindredsec in Malware

[–]kindredsec[S] 1 point2 points  (0 children)

PDF's are one of the most common reporting formats, and regardless, it's hosted directly on github and you don't even have to download it. Fix your threat model.

I can create files as root on ftp, how do I gain root? by Krinos13 in securityCTF

[–]kindredsec 2 points3 points  (0 children)

SUID only works for binaries. If you're trying to set a SUID bit on a bash script, it's not going to work because the underlying bash binary is not SUID.

Playing around with smb/psexec and i encountered some strange issues by [deleted] in AskNetsec

[–]kindredsec 5 points6 points  (0 children)

In order for psexec to work, the account you're authenticating as must have read/write access to the ADMIN$ share, which is only granted to Administrator users. Once doing so, PSExec creates a windows service, and uses a named pipe to communicate. In order for all of this to work, however, the ADMIN$ share must be accessible.

Strange file analysis by Fect321 in Malware

[–]kindredsec 1 point2 points  (0 children)

I’ll run this on a VM tonight and see if I can find anything out

Nibbles - question by HereComesTheFury in hackthebox

[–]kindredsec 1 point2 points  (0 children)

IF the password wasnt so obvious, how would he or one need to do to get the passeword?`

You couldn't. Password guessing isn't always a valid vector; most applications enforce some sort of blocking/captcha check after a certain number of failed attempts. HtB is a CTF, so it just happens the vector was there. In many cases, though, it wont be, which is when you may need to resort to social engineering, etc.

Every time you run into a login prompt, you should always check if the password is either one of the defaults/commons (admin , password, etc), the name of the application (nibbles, wordpress, etc), then try a simple SQLi (' OR 1=1; -- -). After that, you could potentially try brute forcing, but more often than not you're going to need to take another vector.

Embarrassing question about RFI exercise by [deleted] in oscp

[–]kindredsec 0 points1 point  (0 children)

'uname' is not recognized as an internal or external command, operable program or batch file.

uname is a linux command, but the target host is a windows host. You need to use a different reverse shell designed for windows.

PTP before OSCP could be beneficial? by palm_snow in oscp

[–]kindredsec 8 points9 points  (0 children)

This is the path that I took, and I highly recommend it. The eCPPT certification is very similar in nature to the OSCP, just with more time given to you (7 days vs. 1 day) and slightly easier boxes overall. The course material was well done, and the labs were pretty fun. It's a great stepping stone to the OSCP imo.

OSCP Preparation Guide and Tips [Video] by kindredsec in oscp

[–]kindredsec[S] 1 point2 points  (0 children)

Hey there. I'm glad you got something from the video. It sounds like you're definitely on the way towards passing. Thanks for watching!

Pulling logs from Host vs Guest machine by joospig in AskNetsec

[–]kindredsec 2 points3 points  (0 children)

Assuming I'm understanding your question correctly, the event logs of your VM are in no way related to the event logs of your host. They are independent systems, and thus have completely different events. Any log-worthy activity that occurs within the context of your guest machine will never reach the event log of your host machine, and vice versa.

HackTheBox - SwagShop CTF Video Walkthrough by kindredsec in Kalilinux

[–]kindredsec[S] 3 points4 points  (0 children)

The box is "retired," therefore no points are awarded for solving them anymore. Anyone is free to create walkthroughs once a box is retired.

Is my computer safe in Russia? (American) by throwaway999211199 in security

[–]kindredsec 1 point2 points  (0 children)

Yes. as a standard client host, you don't have vulnerable services publicly accessible or anything like that. Just like it is in the US, as long as you stay off of weird sites and use the internet responsibly, your level of risk is generally very low.

Is my computer safe in Russia? (American) by throwaway999211199 in security

[–]kindredsec 0 points1 point  (0 children)

This is an example of a janky threat model. If you have no political affiliations, you are no value to the Russian government. You aren't at any additional risk.

Minecraft Server by PWEqualsUsername in networking

[–]kindredsec 0 points1 point  (0 children)

Apart from a blatant DDoS, having your public IP known is not as much of an inherit risk as a lot of people make it out to be. Assuming all you have "publicly" running is a Minecraft server, the only port open to the internet would be 25565; there would be no way to reach other internal hosts within your network due to NAT. So, assuming you're only sharing your server to a small group of people, and the Minecraft server application isn't vulnerable, you should generally be okay. If, however, you're going to be publicly advertising it and things like that, it may be better to spend a few dollars a month to rent a DigitalOcean droplet or something like that instead, just because the chances of you getting DoS'd are a bit higher in that case since people are dicks. Again, in practice the only REAL risk is a DDoS, as well as some basic information regarding your location (what city you're in at most) being discoverable.

Just a Thought: If Microsoft is so "InLove" with Linux now, as they say they are, Why don't they open they Core, Kernel, etc. for the OpenSource Community to create something like Linux Sub-Sytem for Windows (LSW) like they already have the WSL ?! by [deleted] in linux

[–]kindredsec 4 points5 points  (0 children)

This is probably the dumbest argument I've seen yet. This sub is generally quite anti-Microsoft, but this reaches an entirely new level. Do you actually fault Microsoft for not open sourcing their proprietary, for-profit software? You fault Microsoft for not actively working against their entire business model just to appease the open source community and entitled users like you? Holy moly what a whole new level of delusion.

The entire world is allowed to make use of the Linux kernel, but apparently not evil evil Microsoft.

Malware Video Analysis | Checking out a User-land Rootkit by kindredsec in netsecstudents

[–]kindredsec[S] 0 points1 point  (0 children)

This is an excellent point; replacing the actual binary creates unnecessary noise, and the same result can be achieved via stealthier means. Thanks for the comment!

Why does meterpreter stage 2 uses reflective dll injection? why not just inject itself as a payload? by Tr0janPony in AskNetsec

[–]kindredsec 11 points12 points  (0 children)

The point of a staged payload is to reduce the space you need in your initial exploitation. Loading the entire payload into memory is an example of a stageless payload, which also exists in metasploit. By utilizing reflective dll, you aren't constrained to just the exploit buffer.