Initial commit: HPR Knowledge Base MCP Server
- MCP server with stdio transport for local use - Search episodes, transcripts, hosts, and series - 4,511 episodes with metadata and transcripts - Data loader with in-memory JSON storage 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
This commit is contained in:
213
hpr_transcripts/hpr3425.txt
Normal file
213
hpr_transcripts/hpr3425.txt
Normal file
@@ -0,0 +1,213 @@
|
||||
Episode: 3425
|
||||
Title: HPR3425: Hacking Stories with Reacted: part 4
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr3425/hpr3425.mp3
|
||||
Transcribed: 2025-10-24 23:09:17
|
||||
|
||||
---
|
||||
|
||||
This is Hacker Public Radio Episode 3425 for Friday, the 17th of September 2021.
|
||||
Today's show is entitled Hacking Stories with Reupted.
|
||||
Part 4. It is hosted by Operator and is about 18 minutes long and carries a clean flag.
|
||||
The summary is, I talk about some old, old, old, pen-testing stories from days old.
|
||||
This episode of HBR is brought to you by an honesthost.com.
|
||||
Get 15% discount on all shared hosting with the offer code HBR15.
|
||||
That's HBR15.
|
||||
Better web hosting that's honest and fair at An Honesthost.com.
|
||||
This is another episode of Hacker Public Radio.
|
||||
This is another episode of Hacker Public Radio with Redacted.
|
||||
I'm going to tell you another Hacker story here.
|
||||
This should be sort of one.
|
||||
This one starts out pretty standard.
|
||||
Had some folks shadowing with me, which is not usually normal to have more than one person
|
||||
with me.
|
||||
But we had two people with me.
|
||||
One was a technical in nature, which he was pretty green.
|
||||
I'll say that he didn't have any technical knowledge hardly at all.
|
||||
But the other guy was kind of the manager of the project, and he was kind of hanging out
|
||||
for the first couple of days establishing relationships with a client and having some stuff,
|
||||
usually a little talk to him and all that.
|
||||
So that went down.
|
||||
We'd started with the normal stuff.
|
||||
This was the internet kind of a small internet service provider.
|
||||
We're talking like dial up DSL type of stuff.
|
||||
So these guys were pretty small outfit.
|
||||
I won't say that they were huge, but I would say that they would like a regional
|
||||
internet service provider or something.
|
||||
They might have been bigger than that, I don't remember.
|
||||
But they were pretty small, small, small beans.
|
||||
It's a pretty small shop.
|
||||
So I do the standard stuff.
|
||||
Do the discovery phase, recon.
|
||||
Kind of have the guy shadowing.
|
||||
We're taking our time because I think we had like two weeks on site.
|
||||
Or maybe it just felt like I was taking my time because everything kind of fell over when we
|
||||
tried to do great stuff.
|
||||
So we started discovery things.
|
||||
I've got the guy with me shadowing.
|
||||
I don't run a clock across a whole lot of low-heating fruit.
|
||||
I do find one vulnerability with a semantic server or a semantic endpoint where you can execute
|
||||
arbitrary code.
|
||||
And generally when it comes to like buffer overflows or any kind of exploiting stuff
|
||||
that can be potentially sensitive or potentially damaging to the service or server,
|
||||
I'll generally try to get permission from the client before we do it.
|
||||
So I had already scoped out some of the Unix Linux stuff and I had gotten this was before
|
||||
HashKat had support for the hash type that Unix Linux uses.
|
||||
There are several different hash types, but default Unix Linux uses whatever it is.
|
||||
I don't know, something and then fault it or whatever it was.
|
||||
So anyways HashKat or OCL HashKat didn't have the support for that.
|
||||
So there was the only thing around was called extreme brute-forcer and that was the only one
|
||||
that supported that that hash type.
|
||||
And I will say not even six months after that.
|
||||
OCL, I think at least HashKat had support.
|
||||
OCL did OCL HashKat had support for later, but anyways we had this extreme brute-forcer
|
||||
and we were using it with a cheap video card, maybe $150, $150, maybe even a $200 video card.
|
||||
We were using that to crack on these hashers because we had found some default
|
||||
log-in system Unix boxes, Unix Linux boxes that were used, which appeared to be for some
|
||||
level of services. So you could default credentials to a Linux box, usually that's how you get
|
||||
access to a Linux box or some kind of issue with a PHP script or Apache.
|
||||
Those are the low-hanging route for creating an Linux stuff.
|
||||
Default log-ins, back-and-figs, route-root, route-link password, whatever.
|
||||
So get access to that, dump the hashes of users that are not essentially blank or
|
||||
route-root users that already have the password too.
|
||||
Literally, I'll just dump all the passwords in there because it will crack
|
||||
wing passwords instantly. So I got all these hashes, these Unix boxes, I said they're their ISPA,
|
||||
and I started rumbising around the Unix Linux stuff, starting getting some fruit,
|
||||
started getting some of the beans and potatoes and all that of the structure
|
||||
and understanding how the users are connected and I essentially had access to all the Unix Linux
|
||||
environment, which where a lot of your important stuff sits is actually in the Unix Linux
|
||||
environment. If you really dig into most companies and infrastructures, they're sitting in a
|
||||
database somewhere and usually that database is hopefully not Windows SQL or Microsoft SQL.
|
||||
Hopefully, it's a postgres database or something like that, if they're big scale enough.
|
||||
So these guys had some stuff running, but you know, it was ugly enough to where we had
|
||||
basically owned all their Unix Linux environment with a couple of Default log-ins and then dumping
|
||||
those hashes, cracking them, and they were some pretty weak passwords that went to all the other
|
||||
boxes and they were flown across the enterprise. Trying to pay attention, make sure I'm not missing my
|
||||
exits here. So anyways, we got Unix Linux stuff, but we hadn't gotten no money in admin yet,
|
||||
which is that's kind of a holy grail where you can kind of show that impact log-in to the
|
||||
exchange controller. What people will do is back in the day when everybody ran exchange,
|
||||
you can log-in to the exchange server and run something like maybecats and dump every single user,
|
||||
like we're talking phones, everything that was authenticated through Outlook.
|
||||
Any user, it would dump their plain text credentials. So we would use that and then do like a
|
||||
password audit and say, okay, here's all your weak passwords. They're like company name,
|
||||
winter 27, or whatever, winter 2015, or whatever the year was. So we had Unix Linux, we had
|
||||
some windows, but not like domain admin, and there was one particular box that we wanted to
|
||||
run on x-way against, but I didn't have a whole lot of experience with this particular
|
||||
x-way, and it involved that buffer overflow or some type of memory used after free, whatever
|
||||
type of attachment. So generally, what I'll say is if I'm not 100% sure if it's going to crash
|
||||
it or not, crash the box or blue screen in or maybe crash the service, I'll say, you know what,
|
||||
I want to get approval for this x-way before I run it against this box. I'm not 100% sure
|
||||
the confidence level in this x-way to damage or crash the box, whatever I haven't reviewed.
|
||||
So as I'm waiting for that to go through for management and the management are and they're
|
||||
talking to the client and they're trying to get the okay. As I'm doing that, I stumble across
|
||||
a misconfiguration somewhere. I want to say I want to say it had to do with, it wasn't an exploit,
|
||||
it was like a misconfiguration of either a default user, again, it's always default user,
|
||||
default configuration, some kind of weird app somewhere it was or like a default login of
|
||||
some kind of something that had code execution. So I get code execution and then I get kind of
|
||||
domain admin and by the time I do that, this is probably day three, day four. By the time I do
|
||||
that, I get wordbacked from the client saying yes, you can run the exploit. Tee hee hee hee,
|
||||
Unix Linux guys said that, you know, huh, Windows sucks, you know, blah, blah, blah, we don't have
|
||||
to worry about our stuff because our stuff was a jid. This guy's been testing Windows and we're
|
||||
all good because we're Linux and we're locked down and they didn't know that I actually had access
|
||||
to all or most of their Unix Linux boxes. I think that's the sage keys, which essentially is
|
||||
like a password or a key to get in what people will do is install the same key on all their servers.
|
||||
In that key, they'll put on one server and they'll install on all their servers so they can
|
||||
SSH straight into all their servers. By not having multiple keys or protecting those keys with
|
||||
strong passwords, once you pop one box, you can SSH into all the other boxes that have that same
|
||||
key without a password. So the idea there is that gives you kind of lateral movement across
|
||||
that whole space. So I had access to like 300, 500 boxes, something like that of all Unix stuff.
|
||||
So the Unix guys are sitting there laughing in the corner. Meanwhile, I've already owned the
|
||||
domain. I don't need that silly exploit anymore. I've already found something we can figure
|
||||
somewhere and we're ready to go off to the races. We're off to the races, pulling everything down
|
||||
and I had had a coworker that said, you know what, he took a screenshot of like the CFO's email
|
||||
and to show the impact. And usually what I would do was kind of show the, just show the impact
|
||||
from its rating at the audio there. Just show the impact from a standpoint of making
|
||||
it real. I usually I would just do, so okay, I had that domain admin. I draw a little picture
|
||||
in Visio and show that escalation path. The kill chain to domain admin. And that would
|
||||
scare the pants off of most good IT people, but anybody in the business doesn't really know the
|
||||
impact of that. They don't understand that that gives you access to everything eventually, right?
|
||||
That's how AD is kind of configured and most people wrap around AD around everything and don't
|
||||
use password vaulting and all that stuff. So what I did was I wanted to kind of step up my game
|
||||
on the impact and show the impact to the client and make it real. And the client had actually told
|
||||
us that you know what, this report is going to be massaged on this way up. I'm not really comfortable,
|
||||
you know, I'm not really confident in the value that it's going to provide. I said, you know what,
|
||||
I think we can do something about that. We can give you some real impact and show you some real,
|
||||
you know, real world scenarios of what this would look like on the front page of the newspaper,
|
||||
right? So first thing I do is dump all the credits. I find out who is logging to the,
|
||||
logging to exchange, run mini-cats, dump all the passwords, figure out which of those users is
|
||||
like the CFO or COO or somebody super important. Login 2 is OWA, of course it's externally facing
|
||||
like every OWA back then. And the logs straight into that their OWA. And I just took a screenshot
|
||||
of the title pages. Like it was the titles of the emails and that was pretty much it, right? I left
|
||||
it at that and then I scrubbed, I don't even think I scrubbed anything. I just left the titles
|
||||
and then it had the person's name, which is like the CFO of the company in the screenshot.
|
||||
And then the course I might have taken some other screenshots of like authentication cookies,
|
||||
but it's nobody's going to understand any of that crap that I had authentication cookies for all
|
||||
of his like social media and anything that was in his browser for stored cashed credentials and
|
||||
stored cookies. I had access to all that and all the internal apps that he had access to. He was
|
||||
accessing internal or resources and I had all the cookies to log in and authenticate to those,
|
||||
which nobody understands. They they they see email somebody else's email and that that hits
|
||||
closer to home right as far as it back goes. So do my standard report, get it all out and
|
||||
the manager on the project, I don't think he's actually worked with me before. I don't think he's
|
||||
actually done a real pen testing full-blown pen testing agent before. So given the report
|
||||
he decides to tell the client like 20 minutes before the meeting that he's just going to drop the
|
||||
bomb on him and let him know. Generally what happens is when you tell him hey you know this guy
|
||||
he got he got access to this machine and now we have Dominant and how do you want to approach
|
||||
this? How do you want to sew this message? Do we want to do we want to have a quick chat?
|
||||
Talk about it first before we drop the bomb on everybody and say you know this guy completely
|
||||
owned the sideways. But what he decided to do was to just drop the bomb like right before the
|
||||
meeting and he sent out the attachment. And we get on the bridge, I dial in, I'm doing my
|
||||
thing, running through it. When we get through like this until like the second slide of the email
|
||||
and people flip it, they lose it. They see the CFOs, they say the CFOs email and they're like how
|
||||
do you get to this? It's like well I don't mean I'm in and I dump the credentials, blah blah blah
|
||||
and they're like okay well let's just let's just you know they either breeze through the rest of
|
||||
the report. But they say let's just let's just put this on hold. Let's you know we're trying to
|
||||
try to figure out what's going on and that night or later that next day I think it was that night
|
||||
what after the call we had in them earlier in the morning, that night my boss calls up and says
|
||||
look man these guys are flipping out, don't touch anything, don't touch your computer, lawyers
|
||||
are getting might get involved, these guys are going crazy, they're flipping out because of
|
||||
this email. Supposedly a title of the email has supposedly scared people about some kind of
|
||||
acquisition or some BS which is all total. I have to assume that's just total BS. What happened
|
||||
is that this went up rolled up to the business. The business saw that I could someone you know
|
||||
a malicious actor could actually access someone's email. That came that was a little too real
|
||||
for for the client in the business and they said they just kind of like aims and pitch works
|
||||
torches right. So I get this call and I'm kind of half scared but at the same time I'm
|
||||
hilariously laughing internally because he just dropped it. He's like you know this guy came in
|
||||
on his sideways, here's your CFO's email like mic drop and I thought I was a little aggressive
|
||||
and it did turn out to be a cluster. So after that that night I'm kind of concerned a little bit
|
||||
but I'm still more amused than anything because we did our debilitance, we had our get out of jail,
|
||||
we followed all the processes, we didn't break out of scope, we did everything we were supposed to do.
|
||||
So they come back, finally a day or two later the manager finally calls me and says yeah you know
|
||||
cooler heads have prevailed and this engagement is kind of as whatever we're good, right?
|
||||
You can go ahead and whatever and I think he actually told me to delete everything
|
||||
from the from the actual engagement and he told me to like send him an email saying that I
|
||||
deleted it which is kind of like proving a negative I don't really understand the point of that but
|
||||
anyways I was actually told to delete all the evidence from the from the report which I wasn't too
|
||||
concerned about it was all the standard crap you know debilitantials, week, week, hashes all that
|
||||
stuff. There wasn't anything super ninja that I would need to keep notes on and sanitize
|
||||
but in general he told me to delete all that stuff so the next day or two goes by and finally
|
||||
he calls me back and it's you know cooler heads have prevailed you know don't worry about it we're
|
||||
taking care of it blah, blah, blah, blah and we had some laughs and it was kind of funny and
|
||||
that was the whole game for a while it's like you know this it just got real for these guys it was
|
||||
kind of hilarious. The cooler story is maybe a year or two later Steve client says oh yeah we
|
||||
wanted to we don't want to do another pin test but you know that guy you sent the first time
|
||||
do not send that guy and when I heard that and when the manager told me that the same manager that
|
||||
did the whole mic drop thing when he told me that I just that was the the most best validation you
|
||||
could possibly get because I did everything I was supposed to do I was the guy on the field I was
|
||||
the guy on the ground I didn't really have to communicate to the client that much I just had to
|
||||
do my job and execute effectively and show that impact and when I showed that impact I think
|
||||
it got too real for the client right and they they they they they went a little bit a little bit crazy
|
||||
based on that. So it's pretty good validation that's another example of like you know if you know
|
||||
stuff got real and you know that when you hear that someone you know you did a pin test and they
|
||||
don't want you back because of how fucking sideways you owned them that's a pretty good sign
|
||||
that you're doing your job right unfortunately at the time and even now people can can meet
|
||||
that type of impact and showing that type of level of scare tactics for lack of a better term
|
||||
um can can can can kind of go sideways if if you're not careful but anyways that was a quick one
|
||||
might do another one would see how long this ended up being 17 so I'll probably end this one up
|
||||
and then do maybe another one you've been listening to hecka public radio at hecka public radio
|
||||
we are a community podcast network that release the shows every weekday Monday through Friday
|
||||
today's show like all our shows was contributed by an hbr listener like yourself if you ever
|
||||
thought of recording a podcast and click on our contributing to find out how easy it really is
|
||||
hecka public radio was founded by the digital dog pound and the infonomicon computer club and
|
||||
it's part of the binary revolution at binrev.com if you have comments on today's show please email
|
||||
the host directly leave a comment on the website or record a follow-up episode yourself
|
||||
unless otherwise stated today's show is released on the creative comments
|
||||
attribution share a light 3.0 license
|
||||
Reference in New Issue
Block a user