Publishing a website or files on the Deep Web using a Raspberry Pi anonymously (OnionShare).
1. Introduction and Objectives In this article, we will demonstrate how one can publish a website or a file-sharing space on the Deep Web (TOR network) using a Raspberry Pi, ensuring both security and anonymity. Throughout the project, we will encounter challenges that we must mitigate to the best of our ability while upholding the principles of security and anonymity. The main objective is to show readers how straightforward it is today for someone with basic systems knowledge to set up their own anonymous infrastructure for sharing information. Additionally, we will outline the measures to be taken in order to …
Analysis and Reverse Engineering of a Banking Trojan Malware from the Zeus Family
1. Introduction and Objectives In this article, we will demonstrate how to conduct a reverse engineering analysis of a banking trojan from the Zeus family. For our study, we have been provided with a single binary file named “fichero.bin.” You can download it from the JMSec GitHub repository: To undertake a study of this nature, you’ll need some basic knowledge of reverse engineering. 2. Setting Up the Laboratory and Description of Materials To begin the exercise, it should be noted that the analysis of the binary is conducted under the Windows 10 operating system. The following list enumerates the tools …
Attack Using BadUSB Devices or Rubber Ducky
1. Introduction and Objectives In this article, we will conduct a practical study on how an organization can be compromised using a BadUSB device, whether it’s inserted into a computer by an attacker with physical access to the victim’s system or by an unsuspecting user who falls victim to deception. We will get straight to the point without spending time on explanations about the technical features of these types of hardware or preparing Arduino IDE, as this information is readily available in numerous articles from other cybersecurity companies. In this article, our focus will be on programming a BadUSB using …
Capture The Flag CTF 2 Jaymon Security – Pentesting
1. Introduction and Objectives In this article, we will provide a solution to the second CTF (2.0) proposed by JAYMON SECURITY, which you can download from their website through the following link: This article simulates the execution of an ethical hacking audit, also known as a Pentest, on a Windows operating system machine belonging to the education department of a university (hereinafter referred to as the “business organization”), where an exam platform is located. To carry out the tasks of ethical hacking, we are situated with our attacking machine in the internal network segment of the business organization. Within this …
Remote Desktop Attacks – Ransomware Entry
1. Introduction and Objectives In this article, we will briefly explain the methodology employed by certain criminal groups to gain access to computer systems by exploiting their Remote Desktop Services (RDP). This methodology for installing various types of malware has been observed in a large number of forensic analyses of ransomware attacks, and it’s not surprising considering the ease and nature of exploitation, as we will see throughout this article. To follow along, you will need to have at least basic knowledge of brute force tools and exploit launching. We will be using Kali Linux as the attacking machine. 2. …
REVERSING: Study and programming of a KEYGEN.
1. Introduction and Objectives In this article, we are going to superficially explain how certain software licenses are generated. To do this, we will study a particular code, with the aim of subsequently programming a key generator that can generate a correct key from any text string. For this, we will need to have at least basic knowledge in assembler programming (ASM), and in reverse engineering. As tools, we will use the OllyDbg debugger and the DevCpp compiler to program the key generator (Keygen) in C/C++. If you are interested in conducting a cybersecurity audit of your applications, you can …
Analysis of Malware in Android
1. Introduction and Objectives In this article, we will conduct the analysis of a well-known malware targeting Android. Specifically, we will examine a “Meterpreter” originated using the “Msfvenom” tool belonging to the Metasploit framework. For those unfamiliar with a “Meterpreter” application, it’s a command interpreter that allows interaction with the victim machine, offering high flexibility and reliability. In other words, it’s malware that provides the attacker with complete control over the infected machine, enabling command execution, webcam viewing, microphone listening, and numerous other fascinating functions. We will define what a “Meterpreter session” is later on. I recommend reading the book …