- MCP server with stdio transport for local use - Search episodes, transcripts, hosts, and series - 4,511 episodes with metadata and transcripts - Data loader with in-memory JSON storage 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
468 lines
32 KiB
Plaintext
468 lines
32 KiB
Plaintext
Episode: 3395
|
|
Title: HPR3395: Hacking Stories with Reacted: part 1
|
|
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr3395/hpr3395.mp3
|
|
Transcribed: 2025-10-24 22:41:00
|
|
|
|
---
|
|
|
|
This is Hacker Public Radio Episode 3395 for Friday, the 6th of August 2021.
|
|
Today's show is entitled Hacking Stories with Reupted.
|
|
Part 1. It is hosted by Operator and is about 33 minutes long and carries an explicit flag.
|
|
The summary is, I talk about some old old, old pen-testing stories, from days old.
|
|
This episode of HBR is brought to you by an Honesthost.com.
|
|
Get 15% discount on all shared hosting with the offer code HBR15.
|
|
That's HBR15.
|
|
Better web hosting that's Honest and Fair at An Honesthost.com.
|
|
This is a episode of Hacker Public Radio with your host Redacted.
|
|
Today I'm going to be going over a series called Hacker Stories.
|
|
I will be using some voice modulation and protecting the clients and users that I've worked with.
|
|
But I wanted to go over a couple of stories, or at least one, here on the drive that I'm doing.
|
|
So this first one was a school, a technical school that was fairly popular with younger generations.
|
|
And I would say they're pretty big school, I think, to head several campuses in the city.
|
|
But anyways, these guys wanted a physical assessment.
|
|
We had done some remote stuff with them before in the past.
|
|
It was pretty high level.
|
|
But they wanted a full bone, physical, you know, fishing, and all that good stuff.
|
|
So I had been on my own for a while and this was, I think, an on my own assessment.
|
|
And they had two kind of buildings or two targets.
|
|
One was like a corporate or a home office or a school office thing where all their technical
|
|
information and accounting and all the administration and all that stuff was out of.
|
|
Which had a few floors and about five floors or so of this tall water building.
|
|
And the other campus was an actual school where they had the equipment.
|
|
I don't want to say what kind of equipment it was, but it was fairly high in the equipment
|
|
for these kids to work on.
|
|
Really cool, creative environment for people to test out and work on these different types of equipment.
|
|
So we're talking about some pretty high dollar stuff.
|
|
You had goons wearing various colors depending on what type of goon they were.
|
|
The students had particular colors.
|
|
And myself, I was supposed to get a shirt.
|
|
But I never got a shirt for the school so that I would blend in with the other other students.
|
|
So did my, you know, recon about the building, did a couple of drive rounds.
|
|
You know, they had physical cameras and physical everything.
|
|
You have your get out of jail card, all that stuff.
|
|
The general approach is that you're given kind of some scope of what you can do,
|
|
what you can't do.
|
|
And then more importantly, what the contacts are for your get out of jailness.
|
|
And you have that with the document and printed information.
|
|
And you take that once you do get caught or if you do get caught.
|
|
I haven't done a whole lot of them, but when I have, they're quite exciting stories because
|
|
the physical stuff can be quite entertaining sometimes.
|
|
So I just want to try to bring a couple of these to you guys.
|
|
So what ended up happening is did some recon.
|
|
And the first time around, I think this was a two year engagement actually.
|
|
We hit him first and then we hit him a second time.
|
|
So I'll go over the first time.
|
|
The first time we hit him, I want to say, yeah.
|
|
So the first time we hit him was at the regular office.
|
|
It wasn't actually at the school, it was at the administration office.
|
|
So the contact there was probably two cubes away or two offices away from where I sat.
|
|
So it was behind two layers of bad access.
|
|
So if I wanted to go to the restroom, I kind of had to do it during lunch rush because
|
|
I had to kind of piggyback two layers deep into to get back to my cube where my system was and
|
|
all that stuff. So that was a bit of a predicament.
|
|
Physical access is usually pretty easy.
|
|
What I like to do is pretend like that I'm on my phone.
|
|
A lot of people don't want to bother you.
|
|
You're on your phone and people let you open the door.
|
|
Nobody's going to interrupt your phone call.
|
|
And you're talking about a guy with a black backpack and spiky hair and a green
|
|
line green phone, like suspect on all levels, right?
|
|
And I never really got stopped that much.
|
|
And if it was, it was because I was kind of turning up the knob too much.
|
|
So physical is actually kind of cheating.
|
|
It's a little too easy.
|
|
And I don't have a whole lot of experience in that space anyways.
|
|
But I'll go more along the story.
|
|
The first thing we got there, I got there, did some recon with the round,
|
|
figured out what the floors were.
|
|
The first floor was where I was told that I would try to sit.
|
|
And again, that was behind two layers at Badge Access.
|
|
So I got past the two layers.
|
|
You kind of, what you want to do is kind of go in one room.
|
|
And there's millions of books out there.
|
|
But what I had success in is that kind of go into a common area
|
|
and then come out of the common area and follow someone else to a second staging area,
|
|
a second area, or hang out in front of the door with your phone
|
|
and until you can get into that second area.
|
|
So I actually kind of piggybacked to get into the facility.
|
|
And then I went to the break room and kind of would follow people around
|
|
from the break room to the second area to where I could get to a cube.
|
|
Ended up at a cube.
|
|
And this guy across from me was, you know, Bob, whatever his name was.
|
|
This guy Bob coded applications for the support of the company.
|
|
I don't know what he coded in, but he was a coder.
|
|
And you know, I talked to him and said, you know,
|
|
how long he's been there and what he's been up to.
|
|
And he asked me, you know, he asked me what I was here for.
|
|
And I said, yeah, I'm here to do some consulting for you guys,
|
|
which wasn't a lie.
|
|
I wasn't lying to anyone.
|
|
And I try not to lie to him, to people in general.
|
|
I just tell them what I'm there for and what I do.
|
|
And I said, yeah, I'm hearing you know,
|
|
I'm just consulting to do some security stuff.
|
|
And, you know, he figured I had a badge and all that good stuff.
|
|
I don't even think I wore a badge.
|
|
And it's during this assessment.
|
|
So I plug in setup.
|
|
Of course, I can jump straight on the network.
|
|
So I kind of start my discovery efforts and go through that mess.
|
|
You know, kind of the quiet, tell-out approach is what,
|
|
is what generally you all end up doing.
|
|
So I start doing my testing.
|
|
I get through access default credentials, of course,
|
|
to a box or a SO8067, which is an XP vulnerability
|
|
that's been around since the ages.
|
|
So it started out with kind of, I think,
|
|
a vulnerable service or default credential.
|
|
Usually that's what it is.
|
|
Passwords, brain, things like that.
|
|
So I got access to that.
|
|
Started looking around to get access to their Citrix environment,
|
|
which was where the meeting potatoes was.
|
|
Everything they had was in Citrix.
|
|
Every app they had was inside of a Citrix app.
|
|
And I have very little knowledge with Citrix
|
|
to that it's basically the kiosk that you remote into.
|
|
And you can kind of do stuff and it's sort of a kiosk
|
|
to where you can't really do much of anything
|
|
except run that application.
|
|
And that's the intention.
|
|
But it's not often explained that you can break out of a kiosk
|
|
and how easy that is.
|
|
So I knew that stuff was inside of this virtual,
|
|
whatever you call it, the Citrix garbage.
|
|
So I went around, started hunting around to see which users
|
|
were using the application.
|
|
And I kind of got lazy, right?
|
|
So what I ended up doing was adding myself
|
|
to, I had domain admin at this point
|
|
by what usually happens is you take credentials
|
|
and spray them across the network.
|
|
So if I have valid credentials or valid hash
|
|
for a particular system and SMB signing is not enabled,
|
|
which is very rare even today, SMB signing is not enabled.
|
|
You can take those credentials and spray them across the network.
|
|
So you can try to get administrator level access
|
|
and then dump those credentials to playing text
|
|
if there's no AV on there, whatever.
|
|
So I get domain admin by getting access to several boxes
|
|
and escalating from there straight to domain admin.
|
|
I started to add myself to, I think, I had a script
|
|
that would add me to every single domain user.
|
|
And don't ever do that because if you think about it,
|
|
if you've ever been technology,
|
|
sometimes people create scripts based on what group you're in.
|
|
So if you're in a group or if you trigger a specific thing
|
|
or script, it kicks off something, some kind of process.
|
|
So if I put myself in all of the groups
|
|
in all of the active directory,
|
|
that's usually not going to go well
|
|
because in some cases there's groups in there
|
|
that are like disabled groups.
|
|
Like does it disable users group or something like that?
|
|
I essentially kind of got lazy and I wanted to see
|
|
what would happen if I could just add myself to all the groups
|
|
and then see what happened if I had, if I could actually
|
|
do this with all these pieces.
|
|
So the idea is that I let this script run
|
|
and it kind of got wonky and I killed it.
|
|
And this was about two days in the assessment.
|
|
Generally speaking, under about 3,000 hosts or so,
|
|
it starts to get pretty easy to compromise an entire network.
|
|
If it's Windows-based and you've got no singular point
|
|
of segmentation and you've got about 3,000 or more hosts,
|
|
it starts to get pretty easy.
|
|
Things kind of go down pretty quickly.
|
|
Not so much today.
|
|
This was probably, you know, eight years ago or so.
|
|
So things go down and hit quickly.
|
|
After about the first day you get your recon,
|
|
you get your target boxes, you get your shells
|
|
and then maybe after the second day or by the end of the first day,
|
|
you're pivoting around in your and or I have domain
|
|
I've been by the second or third day.
|
|
Usually I usually get domain I'm in about the third day
|
|
because that leaves me the rest of the week to
|
|
kind of do some pilfering, right?
|
|
If you go too hot and heavy, you might get caught, right?
|
|
So we're trying to compress an attacker's
|
|
what an attacker would do over the course of a week.
|
|
Maybe sometimes if you're lucky, you get two weeks.
|
|
So you're taking what an attacker would do slow and steady and stealthy
|
|
and you're trying to spread that over the course of four days sometimes
|
|
and if you're lucky a couple of weeks.
|
|
So what I thought was that I had myself to these domain groups
|
|
and see what happened.
|
|
Maybe I can get access to the Citrix crap.
|
|
Do that.
|
|
Don't have a whole lot of success.
|
|
And then all of a sudden I noticed that my account
|
|
is been disabled or something like that.
|
|
And I used legitimate credentials from a different user
|
|
to actually give myself domain admin.
|
|
So I said, okay, that's funny.
|
|
Hilarious.
|
|
Let me just give myself, reactivate my account or
|
|
re-add my account as domain admin.
|
|
So at this point, I realized that somebody had realized what I was doing
|
|
and that they were, they had visibility into what was going on.
|
|
After the engagement, what I realized is that they were,
|
|
they had alert scripts set up for active directory
|
|
but they didn't have alert script for domain admin.
|
|
So essentially when I add myself to, you know,
|
|
Sally or accounting manager's group or whatever,
|
|
that is actually what triggered the alert
|
|
because they weren't watching for new domain admins.
|
|
Which was kind of funny because they,
|
|
they're like, oh, we got rid of it and we killed them the first day.
|
|
And it was like, well, I had domain admin for like three days before,
|
|
two or three days before you guys actually detected me.
|
|
So that was kind of interesting and fun.
|
|
What actually happened in the client was,
|
|
what she said she would walk by my cube and just be an utter awe and dismay
|
|
that I was sitting there for, you know, two or three or four days
|
|
and not being caught or asked questions or escorted or whatever.
|
|
It ended up being, I don't think I ever got caught that first time.
|
|
Um, and I don't know how much time we're on here.
|
|
You look, about 12 minutes, so maybe go over another 15 minutes.
|
|
So I don't think I ever got caught when I went the first time around.
|
|
I got that domain admin.
|
|
I kind of filtered a little bit.
|
|
I never got access to the data that I wanted to get access to student records
|
|
and all that stuff.
|
|
I did find some websites and had some database access to some of that information
|
|
that I never could pilfer and get kind of proof of concept going for
|
|
or what that was.
|
|
But generally speaking, usually you can log into the CFO's email or somebody
|
|
important's email and show their email and that actually shows more impact than
|
|
actually getting to the data that will scare most people.
|
|
So between those two things, generally if you go straight domain admin,
|
|
people aren't really going to understand that.
|
|
They're not going to understand the impact unless they see like,
|
|
you know, Bob's email and like, oh, Bob's super important.
|
|
It's, you know, this email is important where that's not really what's important.
|
|
What's important is the access that you have through domain admin.
|
|
But that's how you can easily show impact.
|
|
So anyways, I've got domain admin.
|
|
I've got access to everything and I think that pretty much ended that engagement.
|
|
I did my normal right up and pretty standard access to one box
|
|
to pivot to another and move the ladder over here on the network and then go over there.
|
|
So pretty, pretty cut dry.
|
|
So fast forward a year later, excuse me trying not to get hit here in the car.
|
|
Fast forward a year later, I have the same engagement set.
|
|
They want me to do the same thing.
|
|
And I don't know, yep, I remember this one and they all kind of blend together after a while.
|
|
So the second time around, I ended up not in a meeting room, but I ended up somewhere else.
|
|
They had, they had like full disk encryption, I think, with a smanteck or some other piece of software.
|
|
And I tried to, it wasn't full disk encryption.
|
|
It was like signing of particular binaries through some antect, some kind of some antectal.
|
|
So if you modified any of the binaries in a, it wasn't encrypted, this wasn't encrypted.
|
|
But if you've modified any of the binaries inside of like the system folder or something like that.
|
|
So if you did these to keep these bypass, to get a command prompt shell,
|
|
it would say, oh, I can't boot no more, no, no bad, bad, bad doggy, you know, donut.
|
|
And you would get like blue screen basically and you would get screwed.
|
|
And yeah, eventually that computer ended up fixing itself.
|
|
But I think I found a workstation in like a meeting room to, to hijack,
|
|
potentially try to hijack credentials off of it.
|
|
And that's when I discovered this smanteck, piece of smanteck technology that was kind of like
|
|
signed binary checking thing that would check from the boot from boot to see if it had,
|
|
you know, been mangled with. I don't really understand why you would do that,
|
|
not just go full disk encryption and be done with it. But,
|
|
anyways, we had that set up. So I was able to get past the batch system like again before, same building.
|
|
And I was able to get access to a system, but I wasn't able to get
|
|
root to it or anything because of that signing stuff.
|
|
I may have gotten access to it in a different way, but I don't think I did.
|
|
Hey, I left that conference room. I trolled in there for a while, I think until I got kicked out.
|
|
So I trolled in there for a while, and eventually I system ended up fixing itself.
|
|
The client told me that somehow I didn't fix it self or maybe somebody else fixed it.
|
|
So I get kicked out that conference room, I think, and I end up in one of the,
|
|
something called pods, which is essentially a little, you know, if the contractor is working,
|
|
they'll sit in these little pods. And it's usually like a really tiny cube,
|
|
like a third of a cube with a phone, a network jack, and then like some level of privacy where you
|
|
can close a door, slide a slide or whatever. I ended up in one of these, and it was actually
|
|
fairly close to the, I remember it was fairly close to the front entrance of the
|
|
administration building of the technical school this was. And I don't know if she ever came by
|
|
or anything like that, but the lady, I think I talked to her and said I was there for security
|
|
and stuff, and had pointed out that, you know, I would be sitting over in this pod of, and she,
|
|
you know, asked me if I ever need anything or whatever, nobody bothered to check my credentials,
|
|
at least at this time. So this is the second time around. Sit on site, doing my thing, kind of
|
|
pilfering around, kind of running neccess and about mid day, day one, day two.
|
|
I had a gentleman stop by and just kind of peek his head in, and he's like blah, blah, blah.
|
|
And that was when I got caught. And talking with him, I realized that he's basically the reason
|
|
he got hired because of the assessment we did the year prior. So I was wondering why I didn't have
|
|
all this low-hanging fruit sitting out there, you know, usually there was a, you know, if you run
|
|
in map on someone that's not really taking security or neccess or any vulnerability scanner on
|
|
somebody that's not really taking security seriously, you'll get this low-hanging fruit and it will
|
|
always be there and it'll always be one system on the network that has that low-hanging fruit,
|
|
unless you've got somebody that's confident and that has the skills and tool sits and support
|
|
they need to squash out and they need that low-hanging fruit stuff. So I noticed none of this low-hanging
|
|
fruit that was there before. You know, I had like two or three AMC with a six sevens, I had probably
|
|
some default logins here and there. And none of my old stuff worked, you know, the old passwords I
|
|
probably didn't work and I was like, this is weird. Like, why did they fixed all this stuff?
|
|
Which is not normal for most people to actually fix things with an environment.
|
|
So what I did was is after he stopped by, I said, yeah, you got me, you know, blah, blah, blah.
|
|
I'm here to his security assessment, you know, here's the get out of jail card and he's like, well,
|
|
I don't know what to do, like, yeah, blah, blah, blah. And I'm like, I don't know what to do.
|
|
It's your job, like, what's your process. So he has cursed me out and I still have a copy of the
|
|
get out of jail card and I do whatever. And I think at some point in time, the actual campus,
|
|
school campus with students was the secondary target or a secondary target. But I actually ended
|
|
up going back in to try to get a t-shirt from the client. And I essentially, of course, I still
|
|
still engineer my way back in and I'm walking down the hallway and they're like, here he is again,
|
|
here's that guy again. And they go and like escort me out of the building again that the same
|
|
client asked me back out of the building after being caught the second time trying to get a shirt.
|
|
And that was my excuse is that I was like, yeah, I'm trying to get a shirt. So when I go to the thing,
|
|
and of course, I was met with some a little bit of hostility given that they had already escorted me
|
|
out of the building once. But I tried to get a shirt. I never did get a shirt. So here I am trying
|
|
to go to the school campus with the, for the second time, well, for the third time, essentially,
|
|
this will be the third time that they've been attacked by a third party consulting firm. So
|
|
I recon during the day and then I eventually, this might have been the second week I was there.
|
|
I might have not done this all in one week. It might have been one week. But I go to the school,
|
|
I walk around my book bag. I can't find anywhere set up. There's a little tech lab. I walk in the tech
|
|
lab. I try to, you know, there's a computer lab with a guy literally a guy walking around.
|
|
I call him a goon. Anybody that's going to try to catch you with a goon. So the goon's walking around
|
|
kind of watching his students and kind of creeping me out. So I bail out of there. I didn't really
|
|
see anything super interesting. I think they were logged in with some kind of default login. But
|
|
they didn't have admin and it was kind of like a kiosk. There wasn't a whole lot of fruit there.
|
|
The guy just honestly weirded me out. So I didn't like, I don't like anybody of authority sitting
|
|
around me. I wanted to be a bunch of, a bunch of people that aren't, that aren't going to ask me any
|
|
questions or why I'm there. So I wanted a while, I wanted a while, and eventually finding a room
|
|
that was kind of off into the corner that had a desktop, that had a desktop that was plugged into
|
|
the wall. And now this desktop, I think, if I remember correctly, they had more monitoring on. And
|
|
what you can't do with more monitoring is what most people do is they'll do a MAC address
|
|
based. They won't use certificates, as the cell certificates, they'll do like MAC address base. So
|
|
they'll assign, you know, a MAC address to, they'll assign a port on a switch to a MAC address.
|
|
And maybe only two devices can be on that switch. So your phone and your computer. So if you go to
|
|
Walmart by a new computer or plug into the port, it's going to kick you off because that, or not
|
|
allow you on the network at a minimum, because that MAC address is not why listed. So there's two
|
|
methods you can do this. You can actually plug in that exact computer to your computer.
|
|
And instantly, the computer will try to talk to your computer over a link table or nowadays,
|
|
you only have to do a link cable. You can just plug in a regular ethernet cable into your laptop,
|
|
fire up a wire shark, and you'll see the MAC address of the computer that's trying to access the
|
|
internet. And so you can look on the back of the computer. Sometimes they'll have the MAC address
|
|
on there. But for simplicity's sake, I always just plug it directly into the back of my computer.
|
|
And then when it tries to get DHCP, if it tries to get an IP address for me, I can see the MAC address
|
|
that it's requesting and all that good stuff. So what I'll do is I will unplug, keep that
|
|
cable unplugged from the desktop. And I will take that MAC address and use it to get on the network.
|
|
So I've essentially hijacked the identity that's not signed or encrypted or whatever of that system
|
|
to masquerade as that interface. So I'll plug in. I think I actually ended up using the desktop itself.
|
|
And I have a bootable USB stick. Now I've got a solid state 120 gig bootable
|
|
Ubuntu or Debian, a Debian build with portable PTF-pintesting framework. It's kind of like
|
|
Cali, but you can build it yourself and you don't have to worry about repose getting all jack up.
|
|
So that's what I use now with this. At the time I had like a portable backtrack or maybe it was
|
|
Cali or whatever it is at that time. So I boot up to that with all my tools and all my VMs.
|
|
And I was using the, I was thinking I was using the actual workstation itself.
|
|
And I think I pulled off, I pulled the credentials off of it and cracked them.
|
|
Or somehow I was able to, I think because of the disk wasn't encrypted, I was able to somehow
|
|
run binaries on that system. I want to say I did invent some necessary stuff through there
|
|
or some basic scans. What I wanted to do is get credentials. So I think I was trying to crack
|
|
the credentials of that workstation through Windows and booting it off of a third party.
|
|
Application and dumping the registry and then trying to crack those, that registry or kind of
|
|
crack the hash for that user name offline. If I remember correctly and again this is years and years
|
|
ago. The funny part is, let me get the funny part of the story. I was sitting in there kind of
|
|
by myself and I just kind of got lazy. I had logged in as I had out of myself as a local administrator.
|
|
And what you can find in some instances is you can find that other processes run
|
|
when the computer is started. So for example, there might be a user that run the local admin user
|
|
that's running some kind of process where maybe some other process is jacked into your,
|
|
maybe it's a monitoring service that runs as system, you know, some kind of system administrator
|
|
user. And I think I was using trying to use dump credentials, plain text credentials for some reason,
|
|
into the system to try to either pass some, pass the hash to somewhere or something like that.
|
|
So I ended up copying the binary from the Windows system for Windows Credential Editor,
|
|
which is kind of nemicats, but same thing.
|
|
Um, it was, uh, excuse me, triggering the AV. So how about I would say 30 minutes after I triggered
|
|
the AV, some cat comes in there. I think it's an older guy and he was like the owner, the runner of
|
|
that class. So he was the, the teacher that taught in that class or that workout room or whatever,
|
|
breakout room. Um, and he came in and he was like, hey, you know, what are you doing here in my room
|
|
on my workstation and I gave him some BS that I was, you know, I was just, I was the IT guy and then
|
|
I was installing some kind of something wrong with his AV, giving him some BS. So he disappears
|
|
for a minute and I'm not feeling super warm and fuzzy. I should have bugged out in hindsight
|
|
when I, when I, whatever, but I'm not the biggest fan of like, you know, kind of run around and
|
|
make everybody crazy. Um, generally, if I get caught, I'll just kind of slowly just kind of let
|
|
people know and say, hey, try to make people feel comfortable and I don't want to run around circles
|
|
and hide in bathrooms and make people crazy to try to find me. Um, but he came back shortly after
|
|
and said, look, you know, I'm talking to my IT guy. He says you're not supposed to be here. Um,
|
|
you know, blah, blah, blah. And he stays with me and is asking me all these questions and I let
|
|
him know it basically what I'm, who I'm way that I'm trying to, I think I'm still at this point.
|
|
No, I haven't really used my get out of jail card yet. So at this point, I, uh, I'm kind of,
|
|
I've kind of given up or, or realized the assessments isn't really going anywhere. I think I had
|
|
credentials, hash credentials from the actual machine itself and then I don't even think I'd
|
|
gotten access to anything really. Um, I went a little bit too noisy too quickly because there was
|
|
actually a kid on the other end that was responding to the AV alerts which nobody really does. Um,
|
|
usually there's dashboards or AV, but nobody actually responds to like someone downloading it.
|
|
Maybe this was years ago, but someone downloading a virus or something. Um, not a whole lot of people
|
|
do that, especially larger, uh, infrastructures as clients. So kid comes in, you know, is, you know,
|
|
probably can't be more than 20 years old comes in and it's like, you know, trying to figure out
|
|
what's going on. I let him know and give him the get out of jail card and all that stuff and,
|
|
you know, he's like, I don't know what to do. So if you follow the process, escort me out of the
|
|
building, all that. I bail, take a quick break, get grab some dinner, whatever. And then I decide
|
|
that I'm going to go back to try to try to find, either go back to that same place or try to find
|
|
a better place to hang out with and try and try and get some, some, some better, some better fruit.
|
|
So this is late. I mean, the lights are out, the sun's down. So I park in the parking lot,
|
|
I had no problems. Uh, start walking into the building and I make it like two turns into the
|
|
building and this dude, it's like six feet tall, um, six or seven feet, just massive dude, just
|
|
wide and tall, um, is wearing the goons shirt. It's like a black goons shirt and he walks up
|
|
and he's like, he says something, whatever to the point where it is, he's like looking at me
|
|
and like pointing towards the door and telling me to like, that I need, you know, a vinyl
|
|
have a shirt or a vinyl have an IT, I need to get out. Um, they had, they had, I guess they had
|
|
identified me and told people to look out for me and had goons patrolling always because I did not
|
|
make it very far at all. Um, and I was not met with friendly, uh, friendly, uh, anything.
|
|
So anyways, um, that one was pretty fun because I felt like, uh, I felt like I got, I got, I made
|
|
a change, I made a difference in people, people cared enough to fix the problems that I, that we
|
|
had articulated during our assessment. So, um, you know, that was one example, one of many examples
|
|
where we did some assessments for clients and they actually fixed things and that, that kind of
|
|
makes, makes you feel good at the end of the day that you made, or you made a real change
|
|
somewhere, um, because they hired the security guy who's like super, in security. Um, so I think
|
|
that's pretty much it. I think I ended up going that same day or the day before. I ended up
|
|
trying to go to the accounting level of the administration building and that might have been before,
|
|
I completely got escorted out, I think. Um, so I go to this, this level with all the accounting
|
|
people are on and they're all neat, they're all like close knit, apparently. So I go in there
|
|
and I do my full, my whole phone trick and somebody asked me if I need anything, I said no,
|
|
I'm just waiting for somebody else, you know, who you with, and they go with the consulting company
|
|
and KPMG. So she disappears. I don't have the warm fuzzies. Um, I kind of, I think I'm okay at that
|
|
point. Um, so then I'm sitting in the room and she comes back and she's like, you know, you need to
|
|
like figure out what's going on, you know, what you can't really be here. This is like the accounting
|
|
floor. Super important. So I said, I okay, you know, I'm on the phone with a now, let me, let me figure
|
|
out what's that. Maybe he's on the other side of the building. I don't know, he says he's here.
|
|
So I go to the other side of the building and I camp out, um, I actually end up grabbing credentials
|
|
from somebody that didn't like their workstation. So, um, using a USB Ducky, um, I think I launched
|
|
the payload on that system and I had that interpreter shell on that, uh, on that box,
|
|
particular system. If I remember correctly. Um, so I'm sitting there trying to, you know,
|
|
escalate privileges and move laterally and like, don't make it drop creds and all that stuff,
|
|
trying to figure out what he's on there. Um, so I'm, I've got an active shell and then out of the
|
|
corner of my eye, I see this woman like just hauling ads down, uh, down the cubes and she's like
|
|
running and I noticed that it's the same woman that had asked me if I needed anything in this,
|
|
she was getting kind of refuffled. So I think what happens is she came around the corner or something
|
|
and saw me and somebody's cube or saw me in the different cube, um, and like banging on the
|
|
keyboard. She's like, who the heck is this guy? So she finally, she runs down the hallway and
|
|
grabs her manager by the way. And none of this is the actual client contact. They're on the first floor
|
|
and I'm on like the fourth floor where all the accounting people are. So none of these people have
|
|
any clue what's going on. So they finally come over like two girls, uh, two ladies come over. They
|
|
they kind of ask me what's going on and why am I here? And that's when I said, okay, I'm here for
|
|
an assessment. Here's my get a jail car blah blah blah blah. Um, I think that was kind of funny
|
|
because it's just to watch her like hauling it down the hallway trying to figure out who the heck
|
|
have I am and why I'm there and what to what to do. Um, what's kind of interesting. Um, but that's
|
|
pretty much the story there. I might, uh, depending on the feedback and if you guys find it interesting
|
|
or you find that I can't tell stories very well because I have ADD, um, let me know. And uh, I've got
|
|
probably three or four more decent ones, pretty pretty good ones that are that can be pretty funny.
|
|
And as I, as I do these, if the, if it comes out to be whatever, I can think of the ones that are,
|
|
that can be quite hilarious with back stories and all that stuff too. Um, so let me know if you, uh,
|
|
if you, if you're into it, yeah, if you're not, or if you have any constructive criticism of
|
|
about the storyline, I know what's kind of all over the place. Um, it kind of comes to me as I,
|
|
as I talk about it because I haven't talked about it or thought about some of these engagements
|
|
in probably eight years or so. So anyways, let me know if you have any input and, um,
|
|
put some comments in the show notes if you want to see more of this or if you want some constructive
|
|
criticism or if you think this is just the horrible idea that, um, this is not fun at all. But I heard
|
|
the Dark Knight Diaries and some really funny stories about that and obviously this one's not as
|
|
funny as, as interesting, but it's still an interesting story, uh, nevertheless. Anyways, uh,
|
|
hope you guys enjoy it and, uh, I'll probably do a couple more of these before. Um, I'll, I'll,
|
|
I'll stop and let you guys give me, give us some feedback.
|
|
You've been listening to Hacker Public Radio at HackerPublicRadio.org.
|
|
We are a community podcast network that releases shows every weekday, Monday through Friday.
|
|
Today's show, like all our shows, was contributed by an HPR listener like yourself.
|
|
If you ever thought of recording a podcast and click on our contributing,
|
|
to find out how easy it really is. Hacker Public Radio was founded by the Digital Dog
|
|
Pound and the Infonomicon Computer Club and is part of the binary revolution at binrev.com.
|
|
If you have comments on today's show, please email the host directly, leave a comment on the
|
|
website or record a follow-up episode yourself. Unless otherwise status, today's show is released
|
|
under Creative Commons, Attribution, ShareLife, 3.0 license.
|