Resources

People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!

Stopping Olympic Destroyer: New Process Injection Insights- 25

End Game    Reference →Posted 6 Years Ago
  • This malware injects itself into Notepad++, making it look like a safe process to run :)
  • Other than that, it is a very typically piece of malware; code injection in order to avoid detection is really cool though!

MTIRE Attack Main Page- 24

MITRE    Reference →Posted 6 Years Ago
  • This is a huge list for all things attacking!
  • From defense evasion to persistence techniques... This is a very large list!
  • Mitre is a non-profit that is really focused on making the world a more secure place :)

Wordpress DOS- 23

TheHackerNews    Reference →Posted 6 Years Ago
  • The request is simply a php request that grabs all 181 scripts...
  • Eventually, this can overload the server and take it down, if done enough times.
  • DOS attacks that take a very little amount of resources are really interesting.
  • So, the take-away should be turning a small request into an immense amount of data being sent back could cause a DOS!

Hackers Can Now Steal Data Even From Faraday Cage Air-Gapped Computers- 22

TheHackerNews    Reference →Posted 6 Years Ago
  • This is really cool, although not that practical.
  • If there is malware on a computer, then data can sent by generating a pattern of magnetic field frequencies by regulating CPU's workloads... That's pretty insane!

Bounty leftover Part #3- 21

Into the Symmetry     Reference →Posted 6 Years Ago
  • Was there a vulnerability in something? Then go check this same feature out again! Bugs tend to be in places where 1) The page is less visited/people do not look 2) things that are old 3) in pairs. If there is one bug, there is likely to be another!
  • This vulnerability was interesting because it was a leakage via different error messages. That is all! This can be very helpful :)

BeeToken’s ICO Hit by Phishing Scam- 20

HackRead    Reference →Posted 6 Years Ago
  • At the ICO (initial coin offering) the BeeToken got WRECKED by a phishing scam. Although these phishing scams are not very technical, it is quite smart!
  • They had fake emails for the company. Instead of name@beetoken.com they were from name@thebeetoken.com! This slight change might it believable.
  • The scammers then said to send their coins for a better return on their investment to some address... Which is where the money was kept, as part of the scam.

CryptoCurrency Minning Malware Infected Over a Half Million Machines- 19

TheHackerNews    Reference →Posted 6 Years Ago
  • The issue for black hat hackers was 'How do I make money?'. However, with the rise of cryptocurrenies, a GIANT avenue was created to financially take advantage of this.
  • This also uses Eternal Blue; the vulnerability that was discovered by the NSA and used a weapon.
  • Proofpoint found the miner too? Proofpoint is really well known for their email; thought this was a weird crossover.
  • Also... When people talked about hackernews, I thought this was the site haha. But, I was sadly wrong :(

How Containers & Serverless Computing Transform Attacker Methodologies- 17

Dark Reading    Reference →Posted 6 Years Ago
  • Technology is changing from static web apps to serverless and cloud technologies. Not just the technology is changing, but only the methodology. Instead of code being pushed twice a year, the Agile development is pushing for the DevOps team to push several times a day!
  • What does all of this do for attackers? From the serverless and cloud perspective, it takes away persistence in some server room. However, it opens up the attack surface for exploited poorly configured cloud configuration and serverless architecture.
  • Because of the constant change within a system, attackers are starting to use more automated methods to check out what is going on.

My First Article about DNS Hijacking- 16

Dark Reading    Reference →Posted 6 Years Ago
  • DNS (Domain Name System) is essentially a look up for a domain name to the actual IP address of the server that is trying to be connected to.
  • By a DNS server sending a wrong IP for a domain, it misleads the user into visiting a site that is not actually the right site!
  • Most malware will change the DNS server configurations on a computer to a malicious one. But why though? That is the interesting part of the article!
  • This has been used for people going to a bank to submit credentials. However, most malware just wants to make money from ads... So, the DNS server returns wrong IPs from ads on websites, then insert their own adds. SO interesting!

Malware Reversing - Burpsuite Keygen- 15

lkw    Reference →Posted 6 Years Ago
  • Malware can be really confusing to read through... In particular, things try to stay hidden and are purposely made hard to analyze (obfuscate).
  • The remote access tool (RAT) even used encryption and decryption tools to communicate.
  • Although, the crypto was not very secure! lkw goes through the process of cracking the encryption, for the data being transferred (some n for RSA).