Hacking in the movies happens at breakneck speed. Someone needs access to some database or internal system hosting confidential data and the “genius coder” will fly their fingers across the keyboard before seconds later dropping the painfully trite and clichéd line “I’m in”. Hacking in real-life, whether performed during a sanctioned penetration test or genuine […]
Tag: infrastructure
Brother MFC-J4410DW Printer Administration XSS
The administration service web pages on the Brother MFC-J4410DW model printer are vulnerable to reflected cross-site scripting through the “url” querystring parameter. This allows a user’s session to be hijacked or allows an attacker to take control of the user’s browser. For cross-site scripting to be exploited by an attacker, a victim needs to visit […]
Review of purposefully vulnerable applications to practice hacking
This post will be on the topic of exploitable testing platforms for learning how to conduct a penetration test. I will take you through a few programs I have used and give a bit of information about each and explain how they will help you increase your penetration testing skills. Before you get started There […]
Experience as a Dionach Intern: How I Was Taught
Four months ago I knew very little when it came to hacking – I had tried to look into it a little before, but had fallen into the traps of just reading about topics and not using the knowledge I had gained, or just knowing the basics about certain vulnerabilities and not properly understanding them. […]
Disabling McAfee On-Access Scanning
In a recent internal penetration test I came across in a situation where although I was local administrator on a Windows server and I could not run Windows Credentials Editor (WCE) because it was detected as a malicious threat in the McAfee on-access scan, as you can see below: The first thought was to disable […]
How to Protect Against Ransomware Like CryptoLocker
How Ransomware Works Ransomware such as CryptoLocker typically gets onto your PC either through a phishing email or a web site hosting malware. Ransomware will either encrypt files, make the computer unusable or make threats, all to extort money to fix the problem. CryptoLocker encrypts documents on the computer, shared network drives and connected devices, […]
Easily Remove Unwanted HTTP Headers in IIS 7.0 to 8.5
The StripHeaders module is a Native-Code module for IIS 7.0 and above, designed to easily remove unnecessary response headers and prevent information leakage of software and version information, which can be useful to an attacker. See the installation section for information regarding deploying StripHeaders within your organisation. See the configuration section for information regarding removing […]
Dealing with “Service Accounts”
Most systems administrators will be familiar with the concept of a “service account” in a Microsoft Windows network infrastructure. What many do not realise is that this concept is a purely human one. Neither Active Directory, nor any individual
Common Internal Vulnerabilities
There is a perception by many organisations that their internal network is a relatively safe haven from attackers. The thought is that well configured firewall rules and regular external penetration testing of internet connections provide adequate
An Effective Internal Penetration Test
An effective internal Penetration Test – There is a difference between a vulnerability scan and a penetration test, where security is an on-going process. “My servers are all fully patched, and we’ve fixed the weak administrator password that the last guys found. So I don’t really expect you to find anything!” The previous statement, paraphrased […]