Sunday 27 November 2016

Kali Linux installation - VM

For a while I had struggled with installing Linux on Oracle VM and it always fails at some point during the installation.

What I did
I updated my VM and downloaded the Kali light version, then installed it and followed the steps carefully. It worked!!

What went wrong
After installation, login failed. I had to create another VHD to install a fresh version of Kali, only to find out that the username is simply "root" without the quotes and use the password you setup, capische!,..

Let pen testing practice begin!!

Monday 14 November 2016

My First with ARM programming

What you need to know before learning the assembly language: any knowledge of programming will help, even better with prior knowledge of BASIC

My Experience

So I found resources online that will get me started in programming the microcontroller. I was excited initially but my excitement wore off when I realised I'd be programming in ARM on an x86, okay... not as planned.
Well, I found this tool online that gives you an IDE in programming in ARM. It gets you started and you can find more examples on the website (see link below). This IDE is uVision by Keil. I found it pretty cool tbh but I couldn't go further and this is it after couple of hours playing around, it's off my computer!




Unfortunately I didn't take a snapshot of the IDE when it was open, I realised that when I was uninstalling it. I'll be moving on to x86, and I'll keep you posted as I go along. For those who'd like to learn ARM, I'll post my resources below. Please share with us as you get along programming your architecture.

Resources to get you started

ARM IDE (Keil uVision description and visual representation) ¦ http://www2.keil.com/mdk5/uvision/
ARM programming examples from Keil ¦ http://www.keil.com/support/man/docs/armasm/armasm_dom1359731145503.html
ARM IDE (Download - you may need to register) ¦ https://www.keil.com/demo/eval/arm.htm#/DOWNLOAD

Tutorials about ARM Assembler and the language

1. http://www.heyrick.co.uk/assembler/
2. http://www.peter-cockerell.net/aalp/html/frames.html
3. http://www.rigwit.co.uk/ARMBook/ARMBook.pdf (free online book, I believe)


Saturday 12 November 2016

My note from Recorded future using Splunk

Splunk is the security nerve centre:
found in SOC/ SIEM and Command centres
Splunk is at the heart of web proxy, firewall, app, network, threat intelligence servers, endpoints, identity, internal network security
It is used to correlate your information from your Recorded future resources or your OSINT.

Adaptive response
Enterprise security (information, permission) is built on Splunk. With Adaptive response you can run a command on an ad-hoc bases.
You can specify the domains and vulnerability type, you can use information from a log file as well. You can run it and find the information Recorded future may have pulled around that vulnerability or IP, you find the rule that was used to pull the information. References could be non traditional from twitter and blogs.

With recorded future, quick response is integrated into Splunk. There's enrichment i.e. adding content to what you are monitoring or to your information. Recorded future data is pulled in in real-time and reduces traffic for analysis.
For example: monitoring an IP, finding it malicious but it may be related to hashes and other IPs, it gives you more locations to investigate.



Seminar from Splunk and Recorded Future

Thursday 10 November 2016

D-link routers - Buffer overflow vulnerability

As reported on US-cert, D-link routers have the buffer overflow vulnerability. Specifically it was mentioned that it is the stack-based buffer overflow vulnerability (the buffer overwritten is located on the stack), this is due to  SOAP malfunction. It has to do with the action of login (username, password, login action and the captcha).

How this may have worked:
An attacker can leverage this vulnerability by injecting a shellcode through the login function and this can cause a stack overrun, which will the return address in the stack to be overwritten and the attacker can gain root privileges. Basically, in the shellcode, the attacker specifies where its own return address, this gives the attacker the upper hand and an elevated privilege.

Solution to D-link users: Update your firmware, there's a new update available

If you have a better explanation, I will appreciate it very much.

Schneier's thought on the Internet of Things - Security

This is just a quote on Schneier's online article:
"On the Internet of Things, integrity and availability threats are much worse than confidentiality threats. It's one thing if your smart door lock can be eavesdropped upon to know who is home. It's another thing entirely if it can be hacked to allow a burglar to open the door -- or prevent you from opening your door. A hacker who can deny you control of your car, or take over control, is much more dangerous than one who can eavesdrop on your conversations or track your car's location"

 the complete article can be found on: The real world security and the Internet of Things
This article makes it clear what we need to focus on in securing that great technology from a DOS or tampering. If you disagree, please share your thoughts.

Thursday 3 November 2016

The language of the Computer and its significance in IT Security

Reverse Engineering
While at University I didn't know the intricate details of reEngineering or why it was so important, till I took a course that detailed RE and I played with x86 assembly language.

Afterwards
I remember speaking to someone over the phone and saying I hadn't done RE and after that conversation I told myself "hold on a sec, didn't you play with the gnu debugger and all those assembly language codes you played with to reverse a program?"

In the Industry
It has been huge for years but only almost recently did Security analyst begin looking into RE for safety. There is the battle, some call it "the battle of the Titans": ARM vs x86

My interest
Between these two, I'm still confused. However, I read on a blog by a Cambridge research student that the x86 is a safer route to take than the ARM. So I am still contemplating which will be fastest for me to learn and grasp quickly. I need to get into this technology so that I can understand what hackers think in the process of RE.

Having said all, I'll keep you posted when I start learning one of these assembly languages.

Next up: the differences between ARM and x86 (Intel).

Tuesday 1 November 2016

Who says buffer overflow attack is old school?

I remember while studying this at University and later researching about this attack, some people said this was old and doesn't exist any more. Well, if you are one of those, it means you don't have an HP to reveal this attack Not exactly..

HP system management homepage has been recently exploited due to some vulnerabilities and buffer overflow attacks were performed on it.