Thursday, May 21, 2020
Many Ways Of Malware Persistence (That You Were Always Afraid To Ask)
Autoruns
![]() |
| Zeus "hiding" in the usual random directory - check the faked timestamp |
Logon
Explorer
Internet explorer
![]() |
Scheduled tasks
![]() |
| Scheduler in the old days |
![]() |
| Scheduler in the new days |
Services
Drivers
Codecs
Boot execute
Image hijacks
![]() |
| If you see this, you are in trouble |
AppInit
Known DLLs
Winlogon
Winsock providers
Print monitors
LSA providers
Network providers
WMI filters
Sidebar gadgets
Common ways - not in autoruns
Backdoor an executable/DLL
![]() |
![]() |
![]() |
Hijack DLL load order
![]() |
Here you can see how PlugX works in action, by dropping a legitimate Kaspersky executable, and hijacking the DLL calls with their DLL.
Hijack a shortcut from the desktop/start menu
![]() |
| IE hijacked to start with http://tinyurl.com/2fcpre6 |
File association hijack
COM object hijack
Windows Application Compatibility - SHIM
![]() |
| Every time IE starts, inject a DLL into IE |
Bootkits
MBR - Master boot record
![]() |
| There is a slight difference when MBR is viewed from infected OS vs clean OS |
VBR - Volume boot record
BIOS/UEFI malware
Hypervisor - Ring -1 rootkit
SMM (System Management Mode) malware - Ring -2 rootkit
Intel® Active Management Technology - Ring -3 rootkit
- Independent of the main CPU
- Can access host memory via DMA (with restrictions)
- Dedicated link to NIC, and its filtering capabilities
- Can force host OS to reboot at any time (and boot the system from the emulated CDROM)
- Active even in S3 sleep!
Other stuff
Create new user, update existing user, hidden admins
Esoteric firmware malware
Hidden boot device
Network-level backdoor
Software vulnerability
Hardware malware, built into the chipset
More links
Update 2017-04-29: A very nice list of Office persistence: https://labs.mwrinfosecurity.com/blog/add-in-opportunities-for-office-persistence/
Update 2017-10-23: Persistence via Security Descriptors and ACLs: https://www.youtube.com/watch?v=SeR4QJbaNRg
Update 2018-07-25: Backdooring LAPS https://rastamouse.me/2018/03/laps---part-1/
https://rastamouse.me/2018/03/laps---part-2/
I would like to thank to Gabor Pek from CrySyS Lab for reviewing and completing this post.
CEH Practical: Gathering Target Information: Reconnaissance And Competitive Intelligence
CEH Exam Objectives:
Describe Reconnaissance.
Describe aggressive/competitive intelligence.
Reconnaissance
Reconnaissance is the process of gathering informative data about a particular target of a malicious hack by exploring the targeted system. Basically two types of Reconnaissance exist i.e. Active and Passive. Active reconnaissance typically related to port scanning and observing the vulnerabilities about the targeted system (i.e., which ports are left vulnerable and/or if there are ways around the firewall and routers). Passive reconnaissance typically you will not be directly connected to a computer system. This process is used to gather essential information without ever interacting with the target systems.Understand Aggressive Intelligence
Competitive intelligence means information gathering about competitors' products, marketing, and technologies. Most competitive intelligence is non intrusive to the company being investigated and is benign in nature. It's used for product comparison or as a sales and marketing tactic to better understand how competitors are positioning their products or services.Online tools to gather competitive intelligence
Exercise 1.1
Using KeywordSpy
To use the KeywordSpy online tool to gather competitive intelligence information:- Go to the www.keywordspy.com website and enter the website address of the target in the search field
- Review the report and determine valuable keywords, links, or other information.
Exercise 1.2
Using spyfu
- Go to your browser and type www.spyfu.com and enter the website address of the target in the search field.
Exercise 1.3
Using the EDGAR Database to Gather Information
2. Open a web browser to www.sec.gov.
3. On the right side of the page, click the link EDGAR Filers.
5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.
More information
Wednesday, May 20, 2020
CEH: Gathering Network And Host Information, Types Of Scan
In Hacking the main focus is over gathering the information about victim or victim's machine. Which will help to find out which type of exploit will works according to the given circumstances. Gathering the network and host information means to find out by which network, the which victim's machine is connected and communicating over the network. Moreover, scanning is also performed for gathering information about open and closed ports. After that they'll able to find the vulnerabilities in the target system and try to get access to the system.
Types Of Scan
As a CEH you should know the scan types and uses:SYN
SYN scan doesn't complete the TCP three way handshake that is why it is known as a half-open scan. An attacker send a SYN packet to the victim machine if SYN/ACK packet is received back to attacker, then it clarify that the port is listening due to the acknowledgment by the victim that it has completed the connection. While if the attacker is received the RST/ACK packet then it assumed that the port is closed or open.XMAS
XMAS scan works only on target system that has the RFC 793 development of TCP/IP and it doesn't works against any version of windows.XMAS scan send a packet with by setting up the FIN, URG and PSH flags of the TCP header. The function of this scan is if the port is active there will be no response but if the port is closed the target responds with a RST/ACK packet.
FIN
A FIN scan send a packet by setting up only the FIN flag of the TCP. This scan is similar to XMAS scan. FIN scan receives no response if the port is active while if the port is closed it receives the RST/ACK packet.NULL
NULL scan is also similar to the XMAS scan. But the only difference is that it sends a packet without setting up the any flag of TCP header. NULL scan receives no response if the port is open but if the port is closed it receives the RST/ACK packet.IDLE
It is just like spoofing an IP address by sending a SYN packet to the victim's machine to find out which services are available over the system. This scan is completed with the help of another system called as "Zombie" (that is not receiving or transmitting any information).More info
5 BEST HACKING BOOKS 2018
BEST HACKING BOOKS OF 2018
1. THE HACKER'S PLAYBOOK PRACTICAL GUIDE TO PENETRATION
CONTENTS
- Introduction
- Pregame – The Setup
- Setting Up a Penetration Testing Box
- Before the Snap – Scanning the Network
- The Drive – Exploiting Scanner Findings
- The Throw – Manual Web Application Findings
- The Lateral Pass – Moving Through the Network
- The Screen – Social Engineering
- The Onside Kick – Attacks that Require Physical Access
- The Quarterback Sneak – Evading AV
- Special Teams – Cracking, Exploits, Tricks
- Post Game Analysis – Reporting
2. ANDROID HACKER'S HANDBOOK
CONTENTS
- Chapter 1 Looking at the Ecosystem
- Chapter 2 Android Security Design and Architecture
- Chapter 3 Rooting Your Device
- Chapter 4 Reviewing Application Security
- Chapter 5 Understanding Android's Attack Surface
- Chapter 6 Finding Vulnerabilities with Fuzz Testing
- Chapter 7 Debugging and Analyzing Vulnerabilities
- Chapter 8 Exploiting User Space Software
- Chapter 9 Return Oriented Programming
- Chapter 10 Hacking and Attacking the Kernel
- Chapter 11 Attacking the Radio Interface Layer
- Chapter 12 Exploit Mitigations
- Chapter 13 Hardware Attacks
3. PENETRATION TESTING: A HANDS-ON INTRODUCTION TO HACKING
CONTENTS
- Chapter 1: Setting Up Your Virtual Lab
- Chapter 2: Using Kali Linux
- Chapter 3: Programming
- Chapter 4: Using the Metasploit Framework
- Chapter 5: Information Gathering
- Chapter 6: Finding Vulnerabilities
- Chapter 7: Capturing Traffic
- Chapter 8: Exploitation
- Chapter 9: Password Attacks
- Chapter 10: Client-Side Exploitation
- Chapter 11: Social Engineering
- Chapter 12: Bypassing Antivirus Applications
- Chapter 13: Post Exploitation
- Chapter 14: Web Application Testing
- Chapter 15: Wireless Attacks
- Chapter 16: A Stack-Based Buffer Overflow in Linux
- Chapter 17: A Stack-Based Buffer Overflow in Windows
- Chapter 18: Structured Exception Handler Overwrites
- Chapter 19: Fuzzing, Porting Exploits, and Metasploit Modules
- Chapter 20: Using the Smartphone Pentesting Framework
4. THE SHELLCODER'S HANDBOOK
CONTENTS
- Stack Overflows
- Shellcode
- Introduction to Format String Bugs
- Windows Shellcode
- Windows Overflows
- Overcoming Filters
- Introduction to Solaris Exploitation
- OS X Shellcode
- Cisco IOS Exploitation
- Protection Mechanisms
- Establishing a Working Environment
- Fault Injection
- The Art of Fuzzing
- Beyond Recognition: A Real Vulnerability versus a Bug
- Instrumented Investigation: A Manual Approach
- Tracing for Vulnerabilities
- Binary Auditing: Hacking Closed Source Software
- Alternative Payload Strategies
- Writing Exploits that Work in the Wild
- Attacking Database Software
- Unix Kernel Overflows
- Exploiting Unix Kernel Vulnerabilities
- Hacking the Windows Kernel
5. THE HACKER'S HANDBOOK WEB APPLICATION SECURITY FLAWS
CONTENTS
- Chapter 1 Web Application (In)security
- Chapter 2 Core Defense Mechanisms
- Chapter 3 Web Application Technologies
- Chapter 4 Mapping the Application
- Chapter 5 Bypassing Client-Side Controls
- Chapter 6 Attacking Authentication
- Chapter 7 Attacking Session Management
- Chapter 8 Attacking Access Controls
- Chapter 9 Attacking Data Stores
- Chapter 10 Attacking Back-End Components
- Chapter 11 Attacking Application Logic
- Chapter 12 Attacking Users: Cross-Site Scripting
- Chapter 13 Attacking Users: Other Techniques
- Chapter 14 Automating Customized Attacks
- Chapter 15 Exploiting Information Disclosure
- Chapter 16 Attacking Native Compiled Applications
- Chapter 17 Attacking Application Architecture
- Chapter 18 Attacking the Application Server
- Chapter 19 Finding Vulnerabilities in Source Code
- Chapter 20 A Web Application Hacker's Toolkit
- Chapter 21 A Web Application Hacker's Methodology
Related word
Top10 Java Script Blogs To Improve Coding Skills

With two decades of improvement, JavaScript has become one of the most popular programming languages of all time. The journey started in 1995 when Brendan Eich created JavaScript in just 10 days. From there, it has seen multiple revisions, drafts, and growth in the form of frameworks, API's, modules, etc. Today, we will go forward and list the top JavaScript blogs from the internet so that you can enjoy the lastest development in the field of JavaScript.
According to RedMonk programming language rankings and GitHut.info, JavaScript is leading the pack in the terms of repositories and the most discussed programming language on StackOverFlow. The numbers itself speaks about the future of JavaScript as it has grown beyond the initial capabilities of simple DOM manipulations.
Learning JavaScript, on the other hand, can be a tricky proposition. New libraries, features, API's or Style Guide, pop up almost every day. The speed of iteration is beyond imagination, and that is why reading leading JavaScript blogs are the best approach to keep up with new changes.
JavaScript is blessed with experts that regularly contribute to the community using live streams, videos, blogs, podcasts, conferences and open source projects. An example of a cool experienced Javascript programmer is evilsoft who broadcasts awesome Javascript projects weekly on LiveEdu..
Some blogs are just gold even when they are not updated frequently. To help you reach the best content on JavaScript, let's list the best JavaScript blogs on the internet. The following blogs have a huge fan following and contain epic JavaScript content.
10 Top JavaScript Blogs to Improve Coding Skills
1. David Walsh Blog
David Walsh is a renowned name in the JavaScript world. He started his career with DZone, but his first real break came while working for SitePen as a Software Engineer. His blog composes of topics related to JavaScript, personal thoughts, guides and much more. The blog design is captivating and is going to hook you up on the first visit. Currently, he is working as a Senior Web Developer at Mozilla.

2. DailyJS
DailyJS is one of the best JavaScript blogs on the internet. The blog was started by Alex R. Young, an entrepreneur and Node.js expert in 2009. However, there are recent changes that don't sound great. Currently, the blog is no longer updated, but that does not make the content useless at all. The blog covers diverse content on JavaScript including frameworks, API's, libraries, etc.

3. SitePoint
SitePoint is one of the leading web development portals since 2000. The main attraction of SitePoint is the collection of highly detailed articles. They are aimed at teaching something new to the readers. JavaScript, on the other hand, is one of the leading topics on the website where experts around the world contribute regularly. The rate of the new blog post is high, and you won't find a blog post that doesn't teach you something new. Truly, a great learning place for any JavaScript developer.

4. JavaScript.com
Not technically a blog, but if you love JavaScript, then you need to follow the website's offerings. JavaScript.com news section is an aggregator for excellent JavaScript news, tutorials, guides, and much more. All you need to do is move to their news section and discover tons of new content surrounding JavaScript. The domain is owned by CodeSchool and is mainly utilized to contribute to the community and a landing page to their courses.

5. Brendan Eich
What's the best place to find JavaScript knowledge? The inventor? Well, you are right. Brendan Eich, the creator of JavaScript, keeps his blog with filled with his musings and other excellent thought processes about JavaScript. You can also find videos on the blog. Virtually, the blog is the mind of JavaScript where you understand it in an entirely different manner.

6. JavaScript Playground
JavaScript Playground is yet another great place to get started with all the different JavaScript frameworks, API, and libraries. The focus is to work with the JavaScript ecosystem and provide high quality blog articles, screencast, and podcast for the audience. They also blog about different JavaScript guidelines, tips, and tricks.

7. Superhero.js
If you are looking for a superhero to fetch you the best resources on JavaScript, then you have finally found one. Superhero.js is a simple website that aims to collect everything related to JavaScript including videos, articles, presentations, etc. The content is divided into meaningful sections such as "Understanding JavaScript", "Organize Your Code", etc. Also, the page is regularly updated with new information.

8. JavaScript Jabber
Another "not a blog entry" into the list — JavaScript Jabber is a weekly podcast on JavaScript. Each podcast is around 1 hour of jabber and will sure have something for you to learn. They keep their tab on everything related to JavaScript, including core concepts to popular Framework discussions.

9. Medium JavaScript Collection
Is medium a blog? Technically, not, but it contains high quality JavaScript articles. Medium is a way to connect to the audience so be ready to read many opinions on how JavaScript should have been, and what's wrong with JavaScript. Other than the ramblings, it hosts amazing JavaScript content such as Speed Up Web Apps.

10. Smashing Magazine
Smashing Magazine is one of the oldest websites covering web designing and development. They have a dedicated section for JavaScript, which is constantly updated with tutorials of high caliber. The tutorials surround other web development ideas such as UX, Productivity, etc.

Conclusion
Here are the ten best JavaScript blogs to improve your coding skills. The blogs and mix of other content types will help you to keep up with new changes in JavaScript field, and improve yourself accordingly.
If you are new to JavaScript and want to get started as soon as possible, check out the JavaScript learn section on LiveEdu.tv. And, yes, it is the most popular programming language on LiveEdu.tv which can benefit from your attention! Also, don't forget to leave a comment on how the JavaScript category page can be improved. We are listening!
About Author Dr. Michael Jurgen Garbade is the founder of LiveEdu.TV, Kyuda, Education Ecosystem. He is future Venture Capitalist, Future Politician and always on the lookout for the Next Big Challenge. Obtained Masters in business administration and physics, and a Ph.D. in finance with professional work experience in high-paced environments at Fortune 500 companies like Amazon and General Electric. Expertize: Python, PHP, Sencha Touch & C++, SEO, Finance, Strategy & E-commerce. He speaks English and German and has worked in the US, Europe, and Asia. At Education Ecosystem he is the CEO and runs business operations.


























