Article: Kubernetes: List of ports - published almost 6 years ago. Content: Other Kubernetes portsWhat are some of the visible ports used in Kubernetes?44134/tcp - Helmtiller, weave, calico10250/tcp - kubelet (kublet exploit)No authN, completely open/pods/runningpods/containerLogs10255/tcp - kublet port (read-only)/stats/metrics/pods4194/tcp - cAdvisor2379/tcp - etcd (see it on other ports though)Etcd holds all the configsConfig sto... https://blog.carnal0wnage.com/2019/01/kubernetes-list-of-ports.html Published: 2019 01 14 21:31:00 Received: 2021 06 06 09:05:30 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
Article: Kubernetes: unauth kublet API 10250 basic code exec - published almost 6 years ago. Content: Unauth API access (10250)Most Kubernetes deployments provide authentication for this port. But it’s still possible to expose it inadvertently and it's still pretty common to find it exposed via the "insecure API service" option.Everybody who has access to the service kubelet port (10250), even without a certificate, can execute any command inside the contain... https://blog.carnal0wnage.com/2019/01/kubernetes-unauth-kublet-api-10250.html Published: 2019 01 16 14:00:00 Received: 2021 06 06 09:05:30 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
|
Article: Kubernetes: unauth kublet API 10250 token theft & kubectl - published almost 6 years ago. Content: Kubernetes: unauthenticated kublet API (10250) token theft & kubectl access & execkube-hunter output to get us started: do a curl -s https://k8-node:10250/runningpods/ to get a list of running podsWith that data, you can craft your post request to exec within a pod so we can poke around. Example request:curl -k -XPOST "https://k8-node:10250/run/kube-... https://blog.carnal0wnage.com/2019/01/kubernetes-unauth-kublet-api-10250_16.html Published: 2019 01 16 14:00:00 Received: 2021 06 06 09:05:30 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
|
Article: Kubernetes: Kube-Hunter 10255 - published almost 6 years ago. Content: Below is some sample output that mainly is here to see what open 10255 will give you and look like. What probably of most interest is the /pods endpointor the /metrics endpointor the /stats endpoint $ ./kube-hunter.pyChoose one of the options below:1. Remote scanning (scans one or more specific IPs or DNS names)2. Subnet scanning (scans subnets ... https://blog.carnal0wnage.com/2019/01/kubernetes-kube-hunter-10255.html Published: 2019 01 16 14:00:00 Received: 2021 06 06 09:05:30 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
Article: Abusing Docker API | Socket - published almost 6 years ago. Content: Notes on abusing open Docker socketsThis wont cover breaking out of docker containersPorts: usually 2375 & 2376 but can be anythingRefs:https://blog.sourcerer.io/a-crash-course-on-docker-learn-to-swim-with-the-big-fish-6ff25e8958b0https://www.slideshare.net/BorgHan/hacking-docker-the-easy-wayhttps://blog.secureideas.com/2018/05/escaping-the-whale-things-... https://blog.carnal0wnage.com/2019/02/abusing-docker-api-socket.html Published: 2019 02 01 13:32:00 Received: 2021 06 06 09:05:30 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
|
Article: Jenkins - messing with new exploits pt1 - published over 5 years ago. Content: Jenkins notes for:https://blog.orange.tw/2019/01/hacking-jenkins-part-1-play-with-dynamic-routing.htmlhttp://blog.orange.tw/2019/02/abusing-meta-programming-for-unauthenticated-rce.htmlto download old jenkins WAR fileshttp://updates.jenkins-ci.org/download/war/1st bug in the blog is a username enumeration bug inJenkins weekly up to and including 2.145Jenkins... https://blog.carnal0wnage.com/2019/02/jenkins-messing-with-new-exploits-pt1.html Published: 2019 02 26 18:46:00 Received: 2021 06 06 09:05:30 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
|
Article: Jenkins - messing with exploits pt2 - CVE-2019-1003000 - published over 5 years ago. Content: After the release of Orange Tsai's exploit for Jenkins. I've been doing some poking. PreAuth RCE against Jenkins is something everyone wants.While not totally related to the blog post and tweet the following exploit came up while searching.What I have figured out that is important is the plug versions as it relates to these latest round of Jenkins exploits. ... https://blog.carnal0wnage.com/2019/02/jenkins-messing-with-exploits-pt2-cve.html Published: 2019 02 27 20:23:00 Received: 2021 06 06 09:05:30 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
Article: Jenkins Master Post - published over 5 years ago. Content: A collection of posts on attacking Jenkinshttp://www.labofapenetrationtester.com/2014/08/script-execution-and-privilege-esc-jenkins.htmlManipulating build steps to get RCEhttps://medium.com/@uranium238/shodan-jenkins-to-get-rces-on-servers-6b6ec7c960e2Using the terminal plugin to get RCEhttps://sharadchhetri.com/2018/12/02/managing-jenkins-plugins/Getting st... https://blog.carnal0wnage.com/2019/02/jenkins-master-post.html Published: 2019 02 27 21:46:00 Received: 2021 06 06 09:05:30 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
|
Article: Jenkins - SECURITY-200 / CVE-2015-5323 PoC - published over 5 years ago. Content: API tokens of other users available to adminsSECURITY-200 / CVE-2015-5323API tokens of other users were exposed to admins by default. On instances that don’t implicitly grant RunScripts permission to admins, this allowed admins to run scripts with another user’s credentials.Affected versionsAll Jenkins main line releases up to and including 1.637All Jenkins ... https://blog.carnal0wnage.com/2019/02/jenkins-security-200-cve-2015-5323-poc.html Published: 2019 02 28 00:14:00 Received: 2021 06 06 09:05:30 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
|
Article: Jenkins - SECURITY-180/CVE-2015-1814 PoC - published over 5 years ago. Content: Forced API token changeSECURITY-180/CVE-2015-1814https://jenkins.io/security/advisory/2015-03-23/#security-180cve-2015-1814-forced-api-token-changeAffected VersionsAll Jenkins releases <= 1.605All LTS releases <= 1.596.1PoCTested against Jenkins 1.605Burp outputValidate new token works... https://blog.carnal0wnage.com/2019/02/jenkins-security-180cve-2015-1814-poc.html Published: 2019 02 28 00:51:00 Received: 2021 06 06 09:05:30 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
Article: Jenkins - decrypting credentials.xml - published over 5 years ago. Content: If you find yourself on a Jenkins box with script console access you can decrypt the saved passwords in credentials.xml in the following way:hashed_pw='$PASSWORDHASH'passwd = hudson.util.Secret.decrypt(hashed_pw)println(passwd)You need to perform this on the the Jenkins system itself as it's using the local master.key and hudson.util.SecretScreenshot belowCo... https://blog.carnal0wnage.com/2019/02/jenkins-decrypting-credentialsxml.html Published: 2019 02 28 15:22:00 Received: 2021 06 06 09:05:30 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
|
Article: Jenkins - Identify IP Addresses of nodes - published over 5 years ago. Content: While doing some research I found several posts on stackoverflow asking how to identify the IP address of nodes. You might want to know this if you read the decrypting credentials post and managed to get yourself some ssh keys for nodes but you cant actually see the node's IP in the Jenkins UI.Stackoverflow link: https://stackoverflow.com/questions/14930329... https://blog.carnal0wnage.com/2019/03/jenkins-identify-ip-addresses-of-nodes.html Published: 2019 03 05 02:16:00 Received: 2021 06 06 09:05:30 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
|
Article: Jenkins - messing with exploits pt3 - CVE-2019-1003000 - published over 5 years ago. Content: References:https://www.exploit-db.com/exploits/46453http://blog.orange.tw/2019/02/abusing-meta-programming-for-unauthenticated-rce.htmlThis post covers the Orange Tsai Jenkins pre-auth exploitVuln versions: Jenkins < 2.137 (preauth)Pipeline: Declarative Plugin up to and including 1.3.4Pipeline: Groovy Plugin up to and including 2.61Script Security Plugin ... https://blog.carnal0wnage.com/2019/03/jenkins-messing-with-exploits-pt3-cve.html Published: 2019 03 05 03:26:00 Received: 2021 06 06 09:05:30 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
Article: Jenkins - CVE-2018-1000600 PoC - published over 5 years ago. Content: second exploit from the blog posthttps://blog.orange.tw/2019/01/hacking-jenkins-part-1-play-with-dynamic-routing.htmlChained with CVE-2018-1000600 to a Pre-auth Fully-responded SSRFhttps://jenkins.io/security/advisory/2018-06-25/#SECURITY-915This affects the GitHub plugin that is installed by default. However, I learned that when you spin up a new jenkins in... https://blog.carnal0wnage.com/2019/03/jenkins-cve-2018-1000600-poc.html Published: 2019 03 05 19:01:00 Received: 2021 06 06 09:05:30 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
|
Article: Minecraft Mod, Mother's Day, and A Hacker Dad - published over 5 years ago. Content: Over the weekend my wife was feeling under the weather. This meant we were stuck indoors and since she is sick and it's Mother's day weekend - less than ideal situation - I needed to keep my son as occupied as possible so she could rest and recuperate.When I asked my son what he wanted to do, he responded with a new Minecraft mod he'd seen on one of these Yo... https://blog.carnal0wnage.com/2019/05/minecraft-mod-mothers-day-and-hacker-dad.html Published: 2019 05 13 15:59:00 Received: 2021 06 06 09:05:30 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
|
Article: Minecraft Mod, Follow up, and Java Reflection - published over 5 years ago. Content: After yesterday's post, I received a ton of interesting and creative responses regarding how to get around the mod's restrictions which is what I love about our community. Mubix was the first person to reach out and suggest hijacking calls to Pastebin using /etc/hosts (which I did try but was having some wonky behavior with OSX) and there were other suggesti... https://blog.carnal0wnage.com/2019/05/minecraft-mod-follow-up-and-java.html Published: 2019 05 14 19:17:00 Received: 2021 06 06 09:05:30 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
Article: Devoops: Nomad with raw_exec enabled - published almost 5 years ago. Content: "Nomad is a flexible container orchestration tool that enables an organization to easily deploy and manage any containerized or legacy application using a single, unified workflow. Nomad can run a diverse workload of Docker, non-containerized, microservice, and batch applications, and generally offers the following benefits to developers and operators...... https://blog.carnal0wnage.com/2019/12/devoops-nomad-with-rawexec-enabled.html Published: 2019 12 16 16:43:00 Received: 2021 06 06 09:05:30 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
|
Article: What is your GCP infra worth?...about ~$700 [Bugbounty] - published over 4 years ago. Content: BugBounty story #bugbountytipsA fixed but they didn't pay the bugbounty story...Timeline:reported 21 Oct 2019validated at Critical 23 Oct 2019validated as fixed 30 Oct 2019Bounty amount stated (IDR 10.000.000 = ~700 USD) 12 Nov 2019Information provided for payment 16 Nov 201913 March 2020 - Never paid - blog post posted19 March 2020 - received bounty of $5... https://blog.carnal0wnage.com/2020/03/what-is-your-gcp-infra-worthabout-700.html Published: 2020 03 14 02:10:00 Received: 2021 06 06 09:05:30 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
|
Article: The Duality of Attackers - Or Why Bad Guys are a Good Thing™ - published over 4 years ago. Content: The Duality of Attackers - Or Why Bad Guys are a Good Thing™It’s no secret I've been on a spiritual journey the last few years. I tell most people it’s fundamentally changed my life and how I look at the world. I’m also a hacker and I’m constantly thinking about how to apply metaphysical or spiritual concepts into my daily life. Because if they are true they... https://blog.carnal0wnage.com/2020/04/the-duality-of-attackers-or-why-bad.html Published: 2020 04 27 16:36:00 Received: 2021 06 06 09:05:30 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
Article: WeirdAAL update - get EC2 snapshots - published over 4 years ago. Content: I watched a good DEF CON video on abusing public AWS Snapshotshttps://www.youtube.com/watch?v=-LGR63yCTtsI, of course, wanted to check this out. There are tens of thousands of public snapshots in the various regions. The talk outlines what you can do with these and Bishop Fox released a tool to do it https://github.com/BishopFox/dufflebag. I wanted to scrip... https://blog.carnal0wnage.com/2020/05/weirdaal-update-get-ec2-snapshots.html Published: 2020 05 18 00:01:00 Received: 2021 06 06 09:05:30 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
|
Article: Episode #159: Portalogical Exam - published about 13 years ago. Content: Tim finally has an ideaSadly, we've been away for two weeks due to lack of new, original ideas for posts. BUT! I came up with and idea. Yep, all by myself too. (By the way, if you have an idea for an episode send it in)During my day job pen testing, I regularly look at nmap results to see what services are available. I like to get a high level look at the op... http://blog.commandlinekungfu.com/2011/10/episode-159-portalogical-exam.html Published: 2011 10 04 09:00:00 Received: 2021 06 06 09:05:29 Feed: Command Line Kung Fu Source: Command Line Kung Fu Category: News Topic: Security Tooling |
|
Article: Episode #160: Plotting to Take Over the World - published about 13 years ago. Content: Hal's been teachingWhew! Just got done with another week of teaching, this time at SANS Baltimore. I even got a chance to give my "Return of Command Line Kung Fu" talk, so I got a bunch of shell questions.One of my students had a very interesting challenge. To help analyze malicious PDF documents, he was trying to parse the output of Didier Stevens' pdf-p... http://blog.commandlinekungfu.com/2011/10/episode-160-plotting-to-take-over-world.html Published: 2011 10 18 09:00:00 Received: 2021 06 06 09:05:29 Feed: Command Line Kung Fu Source: Command Line Kung Fu Category: News Topic: Security Tooling |
Article: Episode #161: Cleaning up the Joint - published about 13 years ago. Content: Hal's got emailApparently tired of emailing me after we post an Episode, Davide Brini decided to write us with a challenge based on a problem he had to solve recently. Davide had a directory full of software tarballs with names like:package-foo-10006.tar.gzpackage-foo-10009.tar.gzpackage-foo-8899.tar.gzpackage-foo-9998.tar.gzpackage-bar-3235.tar.gzpackage-b... http://blog.commandlinekungfu.com/2011/11/episode-161-cleaning-up-joint.html Published: 2011 11 08 10:00:00 Received: 2021 06 06 09:05:29 Feed: Command Line Kung Fu Source: Command Line Kung Fu Category: News Topic: Security Tooling |
|
Article: Episode #162: Et Tu Bruteforce - published about 13 years ago. Content: Tim is looking for a way inA few weeks ago I got a call from a Mr 53, of LaNMaSteR53 fame from the pauldotcom blog. Mister, Tim "I have a very cool first name" Tomes was working on a way to brute force passwords. The scenario is hundreds (or more) accounts were created all (presumably) using the same initial password. He noticed all the accounts were created... http://blog.commandlinekungfu.com/2011/11/episode-162-et-tu-bruteforce.html Published: 2011 11 15 10:00:00 Received: 2021 06 06 09:05:29 Feed: Command Line Kung Fu Source: Command Line Kung Fu Category: News Topic: Security Tooling |
|
Article: Episode #163: Pilgrim's Progress - published almost 13 years ago. Content: Tim checks the metamail:I hope everyone had a good Thanksgiving. I know I did, and I sure have a lot to be thankful for.Today we receive mail about mail. Ed writes in about Rob VandenBrink writing in:Gents,Rob VandenBrink sent me a cool idea this morning. It's for printing out a text-based progress indicator in cmd.exe. The idea is that if you have a loop ... http://blog.commandlinekungfu.com/2011/11/episode-163-pilgrims-progress.html Published: 2011 11 29 10:00:00 Received: 2021 06 06 09:05:29 Feed: Command Line Kung Fu Source: Command Line Kung Fu Category: News Topic: Security Tooling |
Article: Episode #164: Exfiltration Nation - published almost 13 years ago. Content: Hal pillages the mailboxHappy 2012 everybody!In the days and weeks to come, the industry press will no doubt be filled with stories of all the high-profile companies whose data was "liberated" during the past couple of weeks. It may be a holiday for most of us, but it's the perfect time for the black hats to be putting in a little overtime with their data e... http://blog.commandlinekungfu.com/2012/01/episode-164-exfiltration-nation.html Published: 2012 01 10 10:00:00 Received: 2021 06 06 09:05:29 Feed: Command Line Kung Fu Source: Command Line Kung Fu Category: News Topic: Security Tooling |
|
Article: Episode #165: What's the Frequency Kenneth? - published almost 13 years ago. Content: Tim helps Tim crack the codeLong time reader, second time caller emailer writes in:I've always been interested in mystery and codes (going back to 'Mystery Club' in 7th Grade), and today I discovered a cool show on History Channel called Decoded. They were talking about cryptography, specifically frequency analysis. I'm not an educator here but just to make ... http://blog.commandlinekungfu.com/2012/01/episode-165-whats-frequency-kenneth.html Published: 2012 01 24 10:00:00 Received: 2021 06 06 09:05:29 Feed: Command Line Kung Fu Source: Command Line Kung Fu Category: News Topic: Security Tooling |
|
Article: AWK-ward! - published almost 12 years ago. Content: Yesterday I got an email friend who complained that "awk is still a mystery". Not being one to ignore a cry for help with the command line, I was motivated to write up a simple introduction to the basics of awk. But where to post it? I know! We've got this little blog we're not doing anything with at the moment (er, yeah, sorry about that folks-- life's ... http://blog.commandlinekungfu.com/2012/12/awk-ward.html Published: 2012 12 20 05:01:00 Received: 2021 06 06 09:05:29 Feed: Command Line Kung Fu Source: Command Line Kung Fu Category: News Topic: Security Tooling |
Article: An AWK-ward Response - published almost 12 years ago. Content: A couple of weeks ago I promised some answers to the exercises I proposed at the end of my last post. What we have here is a case of, "Better late than never!" 1. If you go back and look at the example where I counted the number of processes per user, you'll notice that the "UID" header from the ps command ends up being counted. How would you suppress this?... http://blog.commandlinekungfu.com/2013/01/an-awk-ward-response.html Published: 2013 01 07 00:29:00 Received: 2021 06 06 09:05:29 Feed: Command Line Kung Fu Source: Command Line Kung Fu Category: News Topic: Security Tooling |
|
Article: Episode #166: Ping A Little Log For Me - published over 11 years ago. Content: We've been away for a while because, frankly, we ran out of material. In the meantime we tried to come up with some new ideas and there have had a few requests, but sadly they were all redundant, became scripts, or both. We've been looking long and hard for Fu that works in this format, and we've finally found it! Nathan Sweaney wrote in with a great idea! I... http://blog.commandlinekungfu.com/2013/03/episode-166-ping-little-log-for-me.html Published: 2013 03 12 09:00:00 Received: 2021 06 06 09:05:29 Feed: Command Line Kung Fu Source: Command Line Kung Fu Category: News Topic: Security Tooling |
|
Article: Episode #167: Big MAC - published over 11 years ago. Content: Hal checks into Twitter: So there I was, browsing my Twitter timeline and a friend forwarded a link to Jeremy Ashkenas' github site. Jeremy created an alias for changing your MAC address to a random value. This is useful when you're on a public WiFi network that only gives you a small amount of free minutes. Since most of these services keep track by noti... http://blog.commandlinekungfu.com/2013/06/episode-167-big-mac.html Published: 2013 06 18 09:00:00 Received: 2021 06 06 09:05:29 Feed: Command Line Kung Fu Source: Command Line Kung Fu Category: News Topic: Security Tooling |
Article: Episode #168: Scan On, You Crazy Command Line - published over 11 years ago. Content: Hal gets back to our roots With one ear carefully tuned to cries of desperation from the Internet, it's no wonder I picked up on this plea from David Nides on Twitter: Request today, we need 2 scan XX terabytes of data across 3k file shares 4any files that have not been MAC since 2012. Then move files to x.— David Nides (@DAVNADS) March 13, 2013 Whenever I s... http://blog.commandlinekungfu.com/2013/07/episode-168-scan-on-you-crazy-command.html Published: 2013 07 02 09:00:00 Received: 2021 06 06 09:05:29 Feed: Command Line Kung Fu Source: Command Line Kung Fu Category: News Topic: Security Tooling |
|
Article: Episode #169: Move Me Maybe - published over 11 years ago. Content: Tim checks the mailbag Carlos IHaveNoLastName writes in asking for a way to move a directory to a new destination. That's easy, but the directory should only be moved if the the directory (at any depth) does NOT contain a file with a specific extenstion. Here is an example of a sample directory structure: SomeTopDir1|-OtherDir1| |-File1| |-File2| |-File2|... http://blog.commandlinekungfu.com/2013/08/episode-169-move-me-maybe.html Published: 2013 08 06 09:00:00 Received: 2021 06 06 09:05:29 Feed: Command Line Kung Fu Source: Command Line Kung Fu Category: News Topic: Security Tooling |
|
Article: Episode #170: Fearless Forensic File Fu - published about 11 years ago. Content: Hal receives a cry for help Fellow forensicator Craig was in a bit of a quandary. He had a forensic image in "split raw" format-- a complete forensic image broken up into small pieces. Unfortunately for him, the pieces were named "fileaa", "fileab", "fileac", and so on while his preferred tool wanted the files to be named "file.001", "file.002", "file.003"... http://blog.commandlinekungfu.com/2013/09/episode-170-fearless-forensic-file-fu.html Published: 2013 09 27 09:00:00 Received: 2021 06 06 09:05:29 Feed: Command Line Kung Fu Source: Command Line Kung Fu Category: News Topic: Security Tooling |
Article: Episode #171: Flexibly Finding Firewall Phrases - published about 11 years ago. Content: Old Tim answers an old email Patrick Hoerter writes in:I have a large firewall configuration file that I am working with. It comes from that vendor that likes to prepend each product they sell with the same "well defended" name. Each configuration item inside it is multiple lines starting with "edit" and ending with "next". I'm trying to extract only the ... http://blog.commandlinekungfu.com/2013/10/episode-171-flexibly-finding-firewall.html Published: 2013 10 08 09:00:00 Received: 2021 06 06 09:05:29 Feed: Command Line Kung Fu Source: Command Line Kung Fu Category: News Topic: Security Tooling |
|
Article: Episode #172: Who said bigger is better? - published about 11 years ago. Content: Tim sweats the small stuff Ted S. writes in: "I have a number of batch scripts which turn a given input file into a configurable amount of versions, all of which will contain identical data content, but none of which, ideally, contain the same byte content. My problem is, how do I, using *only* XP+ cmd (no other scripting - PowerShell, jsh, wsh, &c), r... http://blog.commandlinekungfu.com/2013/11/episode-172-who-said-bigger-is-better.html Published: 2013 11 26 09:18:00 Received: 2021 06 06 09:05:29 Feed: Command Line Kung Fu Source: Command Line Kung Fu Category: News Topic: Security Tooling |
|
Article: Episode #173: Tis the Season - published almost 11 years ago. Content: Hal finds some cheer From somewhere near the borders of scriptistan, we send you:function t { for ((i=0; $i < $1; i++)); do s=$((8-$i)); e=$((8+$i)); for ((j=0; j <= $e; j++)); do [ $j -ge $s ] && echo -n '^' || echo -n ' '; done; echo; done}function T { for ((i=0; $i < $1; i++)); do for ((j=0; j < 10... http://blog.commandlinekungfu.com/2013/12/episode-173-tis-season.html Published: 2013 12 31 10:00:00 Received: 2021 06 06 09:05:29 Feed: Command Line Kung Fu Source: Command Line Kung Fu Category: News Topic: Security Tooling |
Article: Episode #174: Lightning Lockdown - published almost 11 years ago. Content: Hal firewalls fast Recently a client needed me to quickly set up an IP Tables firewall on a production server that was effectively open on the Internet. I knew very little about the machine, and we couldn't afford to break any of the production traffic to and from the box. It occurred to me that a decent first approximation would be to simply look at the net... http://blog.commandlinekungfu.com/2014/01/episode-174-lightning-lockdown.html Published: 2014 01 28 10:00:00 Received: 2021 06 06 09:05:29 Feed: Command Line Kung Fu Source: Command Line Kung Fu Category: News Topic: Security Tooling |
|
Article: Episode #175: More Time! We Need More Time! - published over 10 years ago. Content: Tim leaps in Every four years (or so) we get an extra day in February, leap year. When I was a kid this term confused me. Frogs leap, they leap over things. A leap year should be shorter! Obviously, I was wrong. This extra day can give us extra time to complete tasks (e.g. write blog post), so we are going to use our shells to check if the current year is a ... http://blog.commandlinekungfu.com/2014/02/episode-175-more-time-we-need-more-time.html Published: 2014 02 28 10:00:00 Received: 2021 06 06 09:05:29 Feed: Command Line Kung Fu Source: Command Line Kung Fu Category: News Topic: Security Tooling |
|
Article: Episode #176: Step Up to the WMIC - published over 10 years ago. Content: Tim grabs the mic: Michael Behan writes in: Perhaps you guys can make this one better. Haven’t put a ton of thought into it: C:\> (echo HTTP/1.0 200 OK & wmic process list full /format:htable) | nc -l -p 3000 Then visit http://127.0.0.1:3000 This could of course be used to generate a lot more HTML reports via wmic that are quick to save from the brows... http://blog.commandlinekungfu.com/2014/03/episode-176-step-up-to-wmic.html Published: 2014 03 31 09:00:00 Received: 2021 06 06 09:05:29 Feed: Command Line Kung Fu Source: Command Line Kung Fu Category: News Topic: Security Tooling |
Article: Episode #177: There and Back Again - published over 10 years ago. Content: Hal finds some old mail Way, way back after Episode #170 Tony Reusser sent us a follow-up query. If you recall, Episode #170 showed how to change files named "fileaa", "fileab", "fileac", etc to files named "file.001", "file.002", "file.003". Tony's question was how to go back the other way-- from "file.001" to "fileaa", "file.002" to "fileab", and so on. ... http://blog.commandlinekungfu.com/2014/04/episode-177-there-and-back-again.html Published: 2014 05 01 01:01:00 Received: 2021 06 06 09:05:29 Feed: Command Line Kung Fu Source: Command Line Kung Fu Category: News Topic: Security Tooling |
|
Article: Episode #178: Luhn-acy - published over 10 years ago. Content: Hal limbers up in the dojo To maintain our fighting trim here in the Command Line Kung Fu dojo, we like to set little challenges for ourselves from time to time. Of course, we prefer it when our loyal readers send us ideas, so keep those emails coming! Really... please oh please oh please keep those emails coming... please, please, please... ahem, but I di... http://blog.commandlinekungfu.com/2014/05/not-ready-yet-episode-178-luhn-acy.html Published: 2014 05 26 09:00:00 Received: 2021 06 06 09:05:29 Feed: Command Line Kung Fu Source: Command Line Kung Fu Category: News Topic: Security Tooling |
|
Article: Episode #179: The Check is in the Mail - published over 10 years ago. Content: Tim mails one in: Bob Meckle writes in: I have recently come across a situation where it would be greatly beneficial to build a script to check revocation dates on certificates issued using a certain template, and send an email to our certificate staff letting them know which certificates will expire within the next 6 weeks. I am wondering if you guys have ... http://blog.commandlinekungfu.com/2014/06/episode-179-check-is-in-mail.html Published: 2014 06 30 21:51:00 Received: 2021 06 06 09:05:29 Feed: Command Line Kung Fu Source: Command Line Kung Fu Category: News Topic: Security Tooling |
Article: Episode #180: Open for the Holidays! - published almost 10 years ago. Content: Not-so-Tiny Tim checks in with the ghost of Christmas present: I know many of you have been sitting on Santa's lap wishing for more Command Line Kung Fu. Well, we've heard your pleas and are pushing one last Episode out before the New Year! We come bearing a solution for a problem we've all encountered. Ever try to delete or modify a file and receive an err... http://blog.commandlinekungfu.com/2014/12/episode-180-open-for-holidays.html Published: 2014 12 31 12:00:00 Received: 2021 06 06 09:05:29 Feed: Command Line Kung Fu Source: Command Line Kung Fu Category: News Topic: Security Tooling |
|
Article: Episode #181: Making Contact - published about 7 years ago. Content: Hal wanders back on stage Whew! Sure is dusty in here!Man, those were the days! It started with Ed jamming on Twitter and me heckling from the audience. Then Ed invited me up on stage (once we built the stage), and that was some pretty sweet kung fu. Then Tim joined the band, Ed left, and the miles, and the booze, and the groupies got to be too much.But we s... http://blog.commandlinekungfu.com/2017/10/episode-181-making-contact.html Published: 2017 10 03 13:00:00 Received: 2021 06 06 09:05:29 Feed: Command Line Kung Fu Source: Command Line Kung Fu Category: News Topic: Security Tooling |
|
Article: GrabCON Content: https://ctftime.org/event/1353 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
Article: Balsn CTF 2021 Content: https://ctftime.org/event/1376 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
|
Article: SPbCTF's Student CTF 2021 Finals Content: https://ctftime.org/event/1379 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
|
Article: CSAW CTF Final Round 2021 Content: https://ctftime.org/event/1316 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
Article: CyberSecurityRumble CTF Content: https://ctftime.org/event/1429 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
|
Article: N1CTF 2021 Content: https://ctftime.org/event/1367 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
|
Article: iCTF Content: https://ctftime.org/event/1339 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
Article: SPbCTF's Student CTF 2021 Quals Content: https://ctftime.org/event/1378 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
|
Article: pbctf 2021 Content: https://ctftime.org/event/1371 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
|
Article: TastelessCTF 2021 Content: https://ctftime.org/event/1326 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
Article: 0CTF/TCTF 2021 Finals Content: https://ctftime.org/event/1357 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
|
Article: DownUnderCTF Content: https://ctftime.org/event/1312 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
|
Article: Hack-A-Sat 2 Finals Content: https://ctftime.org/event/1433 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
Article: VolgaCTF 2021 Final Content: https://ctftime.org/event/1335 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
|
Article: COMPFEST CTF 2021 Content: https://ctftime.org/event/1358 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
|
Article: CSAW CTF Qualification Round 2021 Content: https://ctftime.org/event/1315 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
Article: ALLES! CTF 2021 Content: https://ctftime.org/event/1313 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
|
Article: Midnight Sun CTF 2021 Finals Content: https://ctftime.org/event/1268 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
|
Article: corCTF 2021 Content: https://ctftime.org/event/1364 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
Article: Really Awesome CTF 2021 Content: https://ctftime.org/event/1354 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
|
Article: InCTF 2021 Content: https://ctftime.org/event/1370 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
|
Article: TSG CTF 2021 Content: https://ctftime.org/event/1431 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
Article: RaRCTF 2021 Content: https://ctftime.org/event/1342 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
|
Article: UIUCTF 2021 Content: https://ctftime.org/event/1372 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
|
Article: Crypto CTF 2021 Content: https://ctftime.org/event/1258 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
Article: CyBRICS CTF 2021 Content: https://ctftime.org/event/1306 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
|
Article: RuCTF 2021 Content: https://ctftime.org/event/1297 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
|
Article: Google Capture The Flag 2021 Content: https://ctftime.org/event/1318 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
Article: ENOWARS 5 Content: https://ctftime.org/event/1340 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
|
Article: redpwnCTF 2021 Content: https://ctftime.org/event/1327 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
|
Article: 0CTF/TCTF 2021 Quals Content: https://ctftime.org/event/1356 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
Article: CyberThreatForce CTF | 2021 Content: https://ctftime.org/event/1380 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
|
Article: Hack-A-Sat 2 Qualifiers Content: https://ctftime.org/event/1365 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
|
Article: CTFZone 2021 Content: https://ctftime.org/event/1328 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
Article: WeCTF 2021 Content: https://ctftime.org/event/1231 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
|
Article: CTF InterIUT 2021 Content: https://ctftime.org/event/1337 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
|
Article: The Threat Interceptors Challenge Content: https://ctftime.org/event/1345 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
Article: HSCTF 8 Content: https://ctftime.org/event/1264 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
|
Article: FAUST CTF 2021 Content: https://ctftime.org/event/1292 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
|
Article: THC CTF 2021 Content: https://ctftime.org/event/1381 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
Article: Circle City Con CTF 2021 Content: https://ctftime.org/event/1350 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
|
Article: BCACTF 2.0 Content: https://ctftime.org/event/1369 Published: : Received: 2021 06 06 09:05:27 Feed: CTFtime.org: upcoming CTF events Source: CTFtime.org Category: Events Topic: Cyber Security |
|
Article: The State of Malware Analysis: Advice from the Trenches - published about 5 years ago. Content: What malware analysis approaches work well? Which don't? How are the tools and methodologies evolving? The following discussion--captured as an MP3 audio file--offers friendly advice from 5 malware analysts. These are some of the practitioners who teach the reverse-engineering malware course (FOR610) at SANS Institute: Jim Clausing: Security Architect at... https://zeltser.com/state-of-malware-analysis/ Published: 2019 09 26 13:45:48 Received: 2021 06 06 09:05:26 Feed: Lenny Zeltser Source: Lenny Zeltser Category: Cyber Security Topic: Cyber Security |
Article: Top 10 Cybersecurity Writing Mistakes - published about 5 years ago. Content: Want to strengthen your writing in under an hour? Watch the video I recorded to help you avoid the top 10 writing mistakes I've encountered when working as a cybersecurity professional. The mistakes you'll see in this video—and the practical tips for avoiding them—span the key aspects of technical writing: structure, look, words, tone, and informat... https://zeltser.com/cybersecurity-writing-mistakes/ Published: 2019 10 05 01:00:36 Received: 2021 06 06 09:05:26 Feed: Lenny Zeltser Source: Lenny Zeltser Category: Cyber Security Topic: Cyber Security |
|
Article: What’s It Like for a New CISO? - published almost 5 years ago. Content: As of this writing, I've spent six months in the role of Chief Information Security Officer (CISO) at Axonius, a rapidly growing technology company. Though I've held a variety of leadership positions over the years, working in this capacity and setting is new for me. I've been capturing aspects of my journey in talks and articles so that others might learn ... https://zeltser.com/new-ciso-impressions/ Published: 2020 02 13 16:38:59 Received: 2021 06 06 09:05:26 Feed: Lenny Zeltser Source: Lenny Zeltser Category: Cyber Security Topic: Cyber Security |
|
Article: How to Set Up a SpiderFoot Server for OSINT Research - published over 4 years ago. Content: SpiderFoot is a tool for gathering Open Source Intelligence (OSINT) and threat intelligence about IPs, domains, e-mail addresses, and other research targets from many data sources, including services such as Shodan and Have I Been Pwned. Steve Micallef, the tool's author, offers a free, open source version of SpiderFoot. His team also provides an affordable... https://zeltser.com/spiderfoot-server-setup/ Published: 2020 04 17 01:10:28 Received: 2021 06 06 09:05:26 Feed: Lenny Zeltser Source: Lenny Zeltser Category: Cyber Security Topic: Cyber Security |
Article: Learning Malware Analysis and Cybersecurity Writing Online - published over 4 years ago. Content: You can now take my malware analysis and cybersecurity writing courses online in two formats at SANS Institute, depending on how you prefer to learn: OnDemand: Self-paced, recorded training with four months of access to course materials and labs. You'll like this if you prefer to start, stop, or speed up training any time they want or who need the flexib... https://zeltser.com/malware-analysis-and-writing-online-training/ Published: 2020 04 20 03:31:40 Received: 2021 06 06 09:05:26 Feed: Lenny Zeltser Source: Lenny Zeltser Category: Cyber Security Topic: Cyber Security |
|
Article: How You Can Write Better Threat Reports - published over 4 years ago. Content: Writing about cybersecurity threats, such as phishing campaigns, malware infections, and attack groups, is challenging for many reasons. How should you decide what details to include? How can you persuade the readers that your analysis is sound? How might you address the needs of multiple audiences? I'm happy to share what I've learned over the years abo... https://zeltser.com/write-better-threat-reports/ Published: 2020 07 01 13:42:51 Received: 2021 06 06 09:05:26 Feed: Lenny Zeltser Source: Lenny Zeltser Category: Cyber Security Topic: Cyber Security |
|
Click to Open Code Editor