Peru


Website

All posts by Peru

Rougue Access Point using Kali Linux

A Rougue Access Point (RAP) is a fake wifi connection that can be used to sniff information. Basically you have a PC (Kali Linux live in this case) with 2 interfaces: a wired one (eth0) connected to a working network and a wireless one (wlan0). The wireless card will be configured as AccessPoint (AP) and… (read more)

Penetration Test – Ghatering Phase. [Part 2]

This is a part of my article “Sharpen your axe with BackTrack – Gathering phase” published on PenTest Magazine and Hakin9 magazine. I have the right to do up to 100 downloads of these magazines, so If you are interested on it you can download PenTest Extra BackTrack Compendium 03_20132 or Hakin9 starter kit 03_20131… (read more)

Penetration Test – Ghatering Phase. [Part 1]

This is a part of my article “Sharpen your axe with BackTrack – Gathering phase” published on PenTest Magazine and Hakin9 magazine. I have the right to do up to 100 downloads of these magazines, so If you are interested on it you can download PenTest Extra BackTrack Compendium 03_20132 or Hakin9 starter kit 03_20131… (read more)

EMETv4 – Part 2

[begin of phase 2] Take a look at the [phase 1] I continue my tests about EMETv4. This time I’ve installed EMETv4 on the same machine HP-CLI01 and HP-SRV01 (note that framework 4 is required ). The only configuration I set is the “recommended” one. Test4 Target: Windows Server 2003 SP2 eng; Host Name: HP-SRV01;… (read more)

EMETv4 – Part 1

The theory Microsoft has relased the full edition of the free software EMETv4 “Enhanced Mitigation Experience Toolkit”. The Company puts together some tecnologies such ASLR and DEP to mitigate the risk of system hacking; first of all the “Zero day” attacks. This, thanks to DEP and ASLR, will not only patch Microsoft software, but all… (read more)

SAM dump and Windows password decrypt.

The Windows passwords are stored and crypted in the SAM file (c:\windows\system32\config\). In the same folder you can find the key to decrypt it: the file SYSTEM. This two files are locked by the kernel when the operating system is up, so to backup it and decrypt you have to use some bootable linux distro,… (read more)

From a non interactive shell to an interactive one

As you can read at the end of this post a remote shell using command execution (-e cmd.exe or /bin/bash) isn’t a full interactive command prompt. These are solutions I found to have a more stable shell. Note that I don’t talk about a web remote shell as c99, c100, weevely or other php/asp code… (read more)

Some tricks using Netcat

If you are here, I suppose you know that Netcat (NC) is an utility which reads and writes data across network connections, using TCP or UDP transport. Nothing more, nothing less. Let’s see some exemples of use. First of all let’s read the help output: C:\>nc.exe -h [v1.11 NT www.vulnwatch.org/netcat/] connect to somewhere:   nc… (read more)