Capture The Flag CTF 2 Jaymon Security – Pentesting
1. Introduction and Objectives In this article, we will provide a solution to the second CTF (2.0) proposed by JAYMON SECURITY, which you can download from their website through the following link: This article simulates the execution of an ethical hacking audit, also known as a Pentest, on a Windows operating system machine belonging to the education department of a university (hereinafter referred to as the “business organization”), where an exam platform is located. To carry out the tasks of ethical hacking, we are situated with our attacking machine in the internal network segment of the business organization. Within this …
Remote Desktop Attacks – Ransomware Entry
1. Introduction and Objectives In this article, we will briefly explain the methodology employed by certain criminal groups to gain access to computer systems by exploiting their Remote Desktop Services (RDP). This methodology for installing various types of malware has been observed in a large number of forensic analyses of ransomware attacks, and it’s not surprising considering the ease and nature of exploitation, as we will see throughout this article. To follow along, you will need to have at least basic knowledge of brute force tools and exploit launching. We will be using Kali Linux as the attacking machine. 2. …
SPLUNK: The Ultimate SIEM for Control
1. Introduction and Objectives In this article, we will step into the shoes of a security analyst whose task involves detecting intrusions by analyzing the various log files generated by machines and devices, searching for abnormal behaviors. This is done to respond to potential incidents, establish appropriate policies and rules, and ensure their compliance. Additionally, this role includes the implementation of Security Information and Event Management (SIEM) systems. For this exercise, we will use the tool “Splunk Enterprise.” In the following sections, we will define this tool and its functionality, as well as briefly explore some use cases that can …
REVERSING: Study and programming of a KEYGEN.
1. Introduction and Objectives In this article, we are going to superficially explain how certain software licenses are generated. To do this, we will study a particular code, with the aim of subsequently programming a key generator that can generate a correct key from any text string. For this, we will need to have at least basic knowledge in assembler programming (ASM), and in reverse engineering. As tools, we will use the OllyDbg debugger and the DevCpp compiler to program the key generator (Keygen) in C/C++. If you are interested in conducting a cybersecurity audit of your applications, you can …
Analysis of Malware in Android
1. Introduction and Objectives In this article, we will conduct the analysis of a well-known malware targeting Android. Specifically, we will examine a “Meterpreter” originated using the “Msfvenom” tool belonging to the Metasploit framework. For those unfamiliar with a “Meterpreter” application, it’s a command interpreter that allows interaction with the victim machine, offering high flexibility and reliability. In other words, it’s malware that provides the attacker with complete control over the infected machine, enabling command execution, webcam viewing, microphone listening, and numerous other fascinating functions. We will define what a “Meterpreter session” is later on. I recommend reading the book …
Vulnerability Analysis in Android Applications (2)
1. Introduction and Objectives In this article, we will continue with the analysis of Android applications. The objectives and the laboratory setup remain the same as in the first part. For more information about setting up the analysis laboratory, you can refer to the first part: “Vulnerability Analysis in Android Applications (1)“. In the following sections, we will conduct a brief analysis of “InsecureBankV2“. As the name suggests, it is a banking app that has certain vulnerabilities that we need to identify. As seen in its official repository, this application has a significant number of vulnerabilities. However, in this article, …
Vulnerability Analysis in Android Applications (1)
1. Introduction and Objectives According to “OWASP Mobile Security Testing,” the phases for conducting a pentest on a mobile application are as follows: In this article, we will learn the basics and methodology of manual static analysis of Android applications. We will not use automated vulnerability detection tools for this purpose. Instead, we will demonstrate this process using a specific example. 2. Setting Up the Analysis Environment The first step is to create and set up a secure and suitable analysis environment. The tools you’ll need to set up are as follows: By setting up this environment, you’ll have access …
Covering Tracks After an Intrusion
1. Introduction and Objectives This phase, not covered in the cycle of “professional ethical hacking” but indeed in “Red Team Operations,” is necessary to gain a deeper understanding of the MITRE methodology used by many black/grey hats. Furthermore, it’s also valuable for those tasked with performing forensic analysis on the victim system. After the attacker has completed their intrusion into the victim system, they should erase their tracks by deleting system event log files, as well as other specific programs and services that were used for exploitation. This action makes detection and forensic analysis more challenging. During a “Red Team …