In my last 2 posts we discussed recovering passwords in a penetration test, first by using password spraying and then by using LLMNR (using the responder tool). In both cases we discussed that it’s pretty likely that you’ll recover domain admin credentials in these steps.
I found an easier way to retrieve malware over Tor on Windows, using free open-source software.
A coworker told me a few weeks ago that he started using Pi-hole to block all advertising and that got me curious. I checked the hardware requirements and already had a server I could install this on. I used CentOS 7.4 as my platform but before starting, make sure selinux isn't running because it isn't supported (It is one of the checks the installation script does). To check execute:
The Center for Internet Security (CIS) has been working diligently to update the CIS Controls (formerly known as the Critical Security Controls). A compelling feature of the CIS Controls is their regular updates that reflect the current cyber threats that face organizations, both small and large. The CIS Controls are the product of a truly global collaboration effort. “The CIS Controls have always been the product of a global community of adopters, vendors, and supporters, and V7 will be no exception,” said Tony Sager, CIS Senior Vice President and Chief Evangelist for the CIS Controls.
Troy Hunt has just updated his list of "pwndpasswords" to over half a billion! Download is here for anyone doing password cracking: https://www.troyhunt.com/ive-just-launched-pwned-passwords-version-2/, (Thu, Feb 22nd)
=============== Rob VandenBrink Metafore
We ended yesterday’s story with what we hope was a successful password spray. Let’s assume that we can then use one of the accounts we harvested in that exercise to VPN in and RDP to a host on the inside network.
&#xa;Hashcat 4.1.0 is released today. Some algo's added, but primary for me is a 10-20&#x25; performance boost for common hashes. https://hashcat.net/forum/thread-7317-post-39390.html#pid39390 , (Wed, Feb 21st)
=============== Rob VandenBrink Compugen
Should We Call it Quits for Passwords? Or, "Password Spraying for the Win!", (Wed, Feb 21st)
Ok, maybe that's a bit dramatic. But for most companies with web services, the answer is a serious "yes" for ditching passwords for those services. Why is that? Let's talk about how the typical external pentest might go.
After going through an almost endless amount of encoded droppers and loader scripts while analyzing a Brazilian banker, I finally managed to reach the actual payload, an interestingly packed/encrypted banking malware. How I statically unpacked this payload is the subject of today’s diary and I hope it will help you in your future analysis.
Xavier wrote a diary entry about an interesting malware sample: MSI files.
Last week I researched how to detect signed VBA code in Word .doc files.
For some days, I collected a few samples of malicious MSI files. MSI files are Windows installer files that users can execute to install software on a Microsoft Windows system. Of course, you can replace “software” with “malware”. MSI files look less suspicious and they could bypass simple filters based on file extensions like “(com|exe|dll|js|vbs|…)”. They also look less dangerous because they are Composite Document Files: