People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!
Stopping Olympic Destroyer: New Process Injection Insights- 25
If there is malware on a computer, then data can sent by generating a pattern of magnetic field frequencies by regulating CPU's workloads... That's pretty insane!
Was there a vulnerability in something? Then go check this same feature out again! Bugs tend to be in places where 1) The page is less visited/people do not look 2) things that are old 3) in pairs. If there is one bug, there is likely to be another!
This vulnerability was interesting because it was a leakage via different error messages. That is all! This can be very helpful :)
At the ICO (initial coin offering) the BeeToken got WRECKED by a phishing scam. Although these phishing scams are not very technical, it is quite smart!
They had fake emails for the company. Instead of name@beetoken.com they were from name@thebeetoken.com! This slight change might it believable.
The scammers then said to send their coins for a better return on their investment to some address... Which is where the money was kept, as part of the scam.
CryptoCurrency Minning Malware Infected Over a Half Million Machines- 19
The issue for black hat hackers was 'How do I make money?'. However, with the rise of cryptocurrenies, a GIANT avenue was created to financially take advantage of this.
This also uses Eternal Blue; the vulnerability that was discovered by the NSA and used a weapon.
Proofpoint found the miner too? Proofpoint is really well known for their email; thought this was a weird crossover.
Also... When people talked about hackernews, I thought this was the site haha. But, I was sadly wrong :(
How Containers & Serverless Computing Transform Attacker Methodologies- 17
Technology is changing from static web apps to serverless and cloud technologies. Not just the technology is changing, but only the methodology. Instead of code being pushed twice a year, the Agile development is pushing for the DevOps team to push several times a day!
What does all of this do for attackers? From the serverless and cloud perspective, it takes away persistence in some server room. However, it opens up the attack surface for exploited poorly configured cloud configuration and serverless architecture.
Because of the constant change within a system, attackers are starting to use more automated methods to check out what is going on.
DNS (Domain Name System) is essentially a look up for a domain name to the actual IP address of the server that is trying to be connected to.
By a DNS server sending a wrong IP for a domain, it misleads the user into visiting a site that is not actually the right site!
Most malware will change the DNS server configurations on a computer to a malicious one. But why though? That is the interesting part of the article!
This has been used for people going to a bank to submit credentials. However, most malware just wants to make money from ads... So, the DNS server returns wrong IPs from ads on websites, then insert their own adds. SO interesting!