heading for a new destiny?

📆
🏷

Lately I started thinking about my future and whether I should keep my self employed or if I should finally start working on being either self-employed or start my own company. Yeah, interesting timing in such uncertain economic times but I guess they’ll stay uncertain no matter what. As I am starting a new day job mid September I’m going to explore the situation most probably by starting working on public engagements on yeswehack.

This means a slight change in direction, heading more for the redteam but my dayjob hopefully gives me enough blueteam and I hope and I can make a lasting impression there increasing their security stance.

But first I need some organizational stuff cleared like tax, insurance and also I need all of that greenlit by my current and future employer.

Why the change of pace? Mostly due to the experience at my current day job which has been for years now, pretty unpleasant. Also a lot of guys kept asking all those years why I didn’t quit and start a business of my own. Seems like others deem me to be fit for the task.

Another piece of the puzzle has been the OSCP and virtual hacking lab and chit chat with other redteamers and it seems that I am holding myself up ok. Sure enough, I am by no means standing out of the crowd but at the very least this means I am also not standing out in a bad way.

My family also plays a part in this. I hope to be an inspiration for my brother who’s lately been struggling with life. I hope to be an idol to my son showing him not to be afraid of taking matters into your own hand and hopefully laying a foundation for him.

But one step at a time. One step at a time.

Not much going on

📆
🏷

Wasn’t much going on lately. First work kept me busy, then COVID19 came along and with it homeschooling next to having to work. So for me, COVID19 kept me even more busy. Which feels strange because a lot of people seem to have a lot of spare time at their hands. Still I managed to migrate my stuff to a new ESXi machine, upgraded my systems, fiddled with prometheus, telegraf, grafana and rabbitmq, bought myself a new switch and moved from bitbucket to sourcehut.

Oh, and I got myself a nice treat and bought a Huwaei Matebook X which also triggered a move from Xmonad to sdorfehs and a locally patched version of sdorfehs-bar

VHL Certified! \o/

📆
🏷

Finally certified. Too bad I haven’t found the time to tackle the Advanced+ certification but there are enough machines left in the lab and I am pretty sure that I will revisit the lab for the Advanced+ certification, too.

I had a lot of fun in the lab and the guys were quick to respond whenever problems with or questions arised (mind you: not to the individual machines).

I can warm heartedly recommend them. Can’t say too much about the Courseware though as I didn’t have to rely on it. But the few things I saw seemed to be ok.

Virtual Hacking Labs Certificate of Completion

Virtual Hacking Lab

📆
🏷

I will use this post to publish my progress while working on virtual hacking lab. It does not have the same reputation as OSCP but I do enjoy the lab and am very pleased with the lab material and dashboard. Also support is quick and nice if you need it (not for clues, of course!). The lab is also regularily expanded. All of this for a fraction of the price tag called for OSCP.

Without any further ado here are the machines I have rooted so far:

Basic:
  • steven
  • android
  • mantis
  • james
  • anthony
  • john
  • as45
  • breeze
  • cms01
Advanced
  • lucky
  • techblog
  • backupadmin
  • web01-dev
  • web01-prd
  • helpdesk
  • pbx
  • vps1723
  • dolphin
  • natural
  • nas (2020-03-17)

CVE-2019-19781 poor man's ktrace(1) driven analysis

📆
🏷
, , ,

Recently I had the chance to get myself a copy of a malicious httpd executable used by an unknown party while exploiting CVE-2019-19781. Even though I do not have anything else but a layman’s understanding of forensics I still wanted to dig into it. This is my journal about a journey into looking into a malware as a noob. While I hope to encourage others to also try to look behind the curtain I also want to stress that this is all potentially dangerous and you should not do this from within a sensitive network.

As far as I understand the situation, CVE-2019-19781 is a path traversal vulnerability at it’s core. I don’t want to reiterate information that is already readily available via google and such. Especially as the best I can do is to replicate the information without changing even minor details. If you want to learn more about CVE-2019-19781 I have to ask you to use a search engine of your choice.

Lab setup

As mentioned above I wasn’t to eager about drilling into a malicious binary inside a production environment so I started to setup a lab for analysing it.

Lab Setup

The setup itself is pretty basic and is running on an ESXi host. While firewall is a piece of infrastructure in order to give me easy access to my target, freebi is the machine I am running the httpd on. In order to stop the malware from phoning home I setup a blocking rule on firewall which blocks and logs all outgoing traffic coming from freebi. Also I specifically chose 198.51.100.0/24 because it is reserved for documentation and it should not being routed on the internet. So even if the box phones home I am safe as long as I won’t accidentally NAT the traffic of the box. freebi itself is running a stock FreeBSD 8.4-RELEASE which gives me enough an environment to run httpd without fiddling with libraries and extra software:

root@freebi:~ # uname -a
FreeBSD freebi.my.domain 8.4-RELEASE FreeBSD 8.4-RELEASE #0 r251259: Sun Jun  2 21:26:57 UTC 2013 …