- MCP server with stdio transport for local use - Search episodes, transcripts, hosts, and series - 4,511 episodes with metadata and transcripts - Data loader with in-memory JSON storage 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
204 lines
18 KiB
Plaintext
204 lines
18 KiB
Plaintext
Episode: 3435
|
|
Title: HPR3435: Hacking Stories with Reacted: part 5
|
|
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr3435/hpr3435.mp3
|
|
Transcribed: 2025-10-24 23:22:59
|
|
|
|
---
|
|
|
|
This is Hacker Public Radio Episode 3435 for Friday, the 1st of October 2021.
|
|
Today's show is entitled Hacking Stories with Reupted, Part 5.
|
|
It is hosted by Operator and is about 18 minutes long and carries an explicit flag.
|
|
The summary is, I talk about some old, old, old, pen-testing stories from days old.
|
|
This episode of HPR is brought to you by an honesthost.com.
|
|
Get 15% discount on all shared hosting with the offer code HPR15.
|
|
That's HPR15.
|
|
Better web hosting that's honest and fair at An Honesthost.com.
|
|
Hi, this is another episode of Hacker Public Radio.
|
|
We got a host with your host, Redacted.
|
|
Today I'm going to do two short ones and I'm not sure if they're related,
|
|
if they're on the same day. Again, they kind of all start mixing together.
|
|
So the first one I'll tell you about was, well, it's the combination of the things.
|
|
The first time I'm free sure this is the same client. So this is a big bank, whatever.
|
|
I get there. They're all worried about my system. All worried about me getting
|
|
put in viruses on their network. So I sign this letter saying I'm not going to do all this stuff.
|
|
I'm not going to install security software and basically it's like a generic IT violation thing.
|
|
And you're forced to sign these sometimes.
|
|
Which I'm thinking and assuming that the over arcing agreement that you set up with the actual
|
|
client and my employer trumps any of these stupid little things I sign up. But I try to let the
|
|
client know that hey, I'm essentially going to be violating all these things because that's my job.
|
|
So you're telling me not to do xyz and that's what exactly I'm being paid to do unless it's out
|
|
of scope and it's specifically stated in the thing that I won't do xyz. So you know, usually it's
|
|
kind of like a just a formality thing in some cases. But these guys were very adamant about like,
|
|
they were scared that I was going to put malware on their network and some kind of worm.
|
|
And they were also scared that I was going to do some kind of tethering with my phone and
|
|
or some other internet device wireless device and connect to networks together through
|
|
well needs to switch back to the phone here. Connect two networks together via some tethering
|
|
stuff which it's not really the biggest of risks but hey, go crazy if this is what you're going
|
|
to worry about. I do think that they had, I don't know if they had had pen tests in the past where
|
|
they had gotten bit by that before a very specific thing to tell someone not to do. So I feel like
|
|
maybe someone at some point in time had done an assessment for them and they got a piece of malware
|
|
from the internet while they were on site and they got owned or some portion of getting compromised
|
|
through vendor third party. So they were very adamant about me not being getting on the internet.
|
|
So the first thing I do of course is try to get on the internet. They tell me that I'm not
|
|
allowed to plug any other device networking devices into the thing. All I can do, they actually had
|
|
me, this is funny, they actually had me install a av client that they had on my actual windows
|
|
image and then I told them that I run Linux for most of my assessments and they said okay well
|
|
blah blah blah and I'm like well I can install some claim maybe here or whatever garbage and show you
|
|
a clean bill of health for that and I can also sell you a clean bill of health for the av but again
|
|
that's what I effing do for a living that's that's my game like I'm supposed to make stuff
|
|
beep and look benign and then potentially be malicious. So if you want to see a green checkbox
|
|
I can make you see a green checkbox that's what my job is I'm supposed to do that. So anyways
|
|
I show them this green checkbox of my windows they're doing their due diligence to try to make
|
|
sure some effing clown is not gonna connect their network and make a big mess. So I get I see that
|
|
side of it but to make me jump through a bunch of hoops and do these silly shenanigans doesn't
|
|
really make a whole lot of sense when you know the voodoo witch doctors you're you're you're you're
|
|
you have to trust the voodoo witch doctor at the end of the day at some point. So I get all my stuff
|
|
set up I show them the green checkbox and whatever av garbage they have me installing claim maybe
|
|
the Linux av so I show them that and then I proceed to try to tunnel out through various methods
|
|
so there's lots of ways to tunnel out through the internet at the very minimum what always works
|
|
is DNS tunneling now basically DNS telling is like 53 by your 150 by somebody correct me
|
|
it's this very small amount of traffic you can maximum size you can pack in a DNS request
|
|
or a DNS request in a response but DNS works everywhere I've seen DNS working on skate
|
|
and networks that are quote unquote air gaps I've seen DNS work where where places it's not
|
|
supposed to be working where there is no internet and there's no DHCP you set yourself a static
|
|
IP of somebody around you make up a gateway find a gateway and tell ask that gateway if you can do
|
|
DNS request and boom you're on the internet they'll tell you oh it's not on the internet but if
|
|
DNS works you can actually tunnel your traffic over DNS albeit slow and not ideal to exfil data
|
|
but it's also it's it's a way to gain an initial foothold into the environment if you have to do
|
|
crazy DNS tellings I never have to go that crazy my assessments everything pretty much falls over
|
|
with the touch of a touch of a pinky right so I'm looking at the traffic I'm looking at what
|
|
all is allowed outbound back then you can you can actually scan AOL's login servers believe it
|
|
or not AOL would open have every port open on every service open on every port to try to get
|
|
allow you to get out to to AOL servers so you're there client I don't know if they're client would
|
|
actually check all those ports but it would check and craft on a port and you could specify
|
|
whatever random port that allowed outbound to use over AOL because it would accept requests on
|
|
every single port it was beautiful it's a beautiful idea and that's how some of this stuff like
|
|
Skype works it tries the traverse back in the day I don't know if they still do it now but they
|
|
try to do all kinds of crazy tactics to traverse firewalls stuff like the Cisco VPN does all kinds
|
|
of crazy ninja stuff to you can tell it to get out to tunnel out of the environment but you got
|
|
DNS and kind of order of simplicity and idealness I like to use s tunnel which is a ssl tunnel
|
|
there's some newer hotness tunnels out there there's ICMP tunnel there's DNS tunnel again
|
|
those are two pretty small packet size protocols there you got ssh tunnels your standard ssh tunnel
|
|
their htps kind of s tunnel thing there's other ways to do s tunnel and have it be set up
|
|
under different types you can have a proper regular proxy or whatever you can tunnel up all
|
|
mannerisms of ways there's people telling you all over kinds of different protocols and in some
|
|
cases you can tunnel over IPp6 so anyways I had already tested this prior because I've had
|
|
certain instances where you're on a client site and you want to do some security research but you
|
|
can't because you're on the network that you're testing and the network that you're testing has a
|
|
proxy so first things first is you want to get a server on the internet that can you can
|
|
proxy your traffic through hopefully securely and be able to do security research pull down binaries
|
|
pull down source code you know do to do your normal research right so first thing first is
|
|
I get on the network can't do anything you can see the internal services you can do discovery
|
|
I'm doing in mapping all that stuff and this is running my standard standard checks and I start
|
|
poking around with a firewall and you scan AOLs now there's a couple of if you message me your
|
|
message chat I can send you some servers that listen on all ports and we'll help you identify
|
|
potential exit exit places to get out of the network to listen on all ports I can I can tell you
|
|
wondered at least one of those but the idea is you can set up your own to listen on all ports with
|
|
just a simple like Python script or something ridiculous but anyways so I scan AOL servers I find
|
|
some ports to get out through I think standard 22 but it was blocking as a sage so what they'll have
|
|
is I don't know what they call it like identifying tagging your deep packet inspection or whatever
|
|
it was being termed you want to call it it's essentially if you're trying to run SSH over if
|
|
you're trying to like SSH over 444443 and it's not web traffic it'll say you know why that's
|
|
not cool or for example if you're trying to SSH over 421 and it's not actual FTP traffic it'll
|
|
say no not gonna let you do that you're trying to tunnel FTP you're trying to set up an FTP
|
|
or talk to an ITP over 480 no 480 has to be web or 443 has to be this you'll see that more and
|
|
more nowadays that they do this deep packet inspection or whatever they kind of check the
|
|
the kind of headers and all that for the valid traffic and say okay this is this is just
|
|
somebody trying to run an ITP server over 480 no I'm not gonna allow that
|
|
um in this case I can't remember what exactly you set it up but anyways so I'm sitting there
|
|
I got my tunnel to work I'm telling all my traffic it's pretty damn fast um it's pretty slick
|
|
I'm doing my research listen to my music when I'm while I'm working doing my thing and you know
|
|
I thought it relevant to tell the client this because they told me I didn't have internet when
|
|
I got there and that's kind of a then possible thing um you know they didn't have DHCP but they
|
|
were offering an IP and they were offering connectivity to other internal services all that good
|
|
stuff so I get ready to kind of build up a little quick note about how I got access to
|
|
what I got access to and how I tunneled out so given that information um and then maybe a
|
|
couple of days goes by and I realized that it sounds like a Thursday or something I realized
|
|
that I told my wife that I was going to be able to do some kind of corporate event for work and do
|
|
some kind of fancy to do for uh for like an office party so we had this little office party going on
|
|
and I completely forgot about it so it's like Thursday and noon and I realized that I told my
|
|
wife that I'm gonna be home early on Thursday so that we can go to this thing Thursday night
|
|
and I might have even been Friday Friday during the day or Friday night I'm pretty sure it was
|
|
actually Thursday anyways despite the despite what day it was I I told my wife that I made plans to
|
|
come home early and and uh and whatever so here I am I've got some access to some boxes I think I
|
|
had like admin credentials or something like that and I was starting to spray them around but I
|
|
wasn't you know I was kind of taking my time I generally kind of took my time and and kind of
|
|
gave myself plenty of time to to to work up to that I knew it would have fallen over within the day
|
|
or the next couple days so um I was letting that thing do and then when I found out that I didn't
|
|
have a whole lot of time I had to kick it into height gear so I essentially set up my scripts to do
|
|
the automatic kind of once I had valid credentials or valid hatches I had some scripts set up to
|
|
automatically check the um check the servers to see if there's any other you know donate admins
|
|
logged into those and all that stuff dump out the users dump out the services dump out the
|
|
the shared um the shared resources that are logged into it and so I get out the phone teller
|
|
you know what um I might be able to do it I might not it just depends I'd really like to get
|
|
donate admins first and kind of you know own them sideways before I leave so um I'm sitting there
|
|
and I kind of get whatever and I'm like spraying my credentials all over the place going nuts
|
|
and eventually I um I come across something I don't remember what it was but I eventually get it
|
|
I'm like oh it's crap so I know I'm get there I know I'm close enough to where I can book the flight
|
|
so I go ahead and I book a flight for like basically for me to leave in like 20 minutes or like
|
|
30 minutes so I book a flight for me that for me that where I'd have to leave in like 30 minutes
|
|
to catch the flight or outside be late so here I go I buy my ticket and I'm like all right I got
|
|
close to donate admins I'm I really just have to pivot around and and get that escalation
|
|
and then dump the garage and then show them that I have donate admins and that and use it whatever
|
|
so at this time I'm kind of like kicking in the high gear I'm spraying my crud's everywhere
|
|
I'm trying to escalate and I'm just going nuts so just to try to just to try to get
|
|
donate admins before I leave um so the client uh oh maps is just crashed for me
|
|
one second
|
|
so I kind of kick it up tiger get all noisy and finally I end up getting donate
|
|
domain admin I you know kind of a little bit more lee but I'm rushing to like wrap all this up
|
|
get all my evidence capture all my evidence so that I don't have to like reverse engineer myself when I
|
|
get home um yeah gonna make this so I get all my crud get all my stuff get all my notes
|
|
come out it all together make sure that I've got legit whatever and then I start to head to the
|
|
airport get a new bird uh this is when the bird was still good um so I got a new bird and I think
|
|
I called a client and let them know I said hey you know um you know I'm I found some stuff I
|
|
I've got domain admin and you know I've got most of the most of what I was going after and I've
|
|
got some and some impact and some reports and we've got got everything pretty much done I'm
|
|
pretty finished up and he says oh when you when you look at the leave I was like wow I'm
|
|
actually in the car on the way to the airport because I'm trying to get head home for uh for
|
|
a like uh for uh for a corporate company a bit and he he was pretty legit about it he was okay
|
|
whenever um the funny thing is as I get on the plane I whatever and then I land back at home
|
|
and when I land back at home I got a phone call from the client and they wanted to ask me some
|
|
questions where they're pretty generic in nature but I call them up and this this guy's like yeah
|
|
you like took out our our AV like they are it was Bane AB thing our uh malware analysis thing
|
|
they had like fire I or something I don't know what it was so what had happened is when I was
|
|
spraying my credentials around and dumping my um when on the ones that had a had a AB um I was
|
|
triggering AV on hundreds of systems and that was getting sent those packets or whatever or alerts
|
|
or whatever were being sent by some central server to be analyzed or whatever it was and this
|
|
supposed security server um found that I was like malware or intrusion um which was kind of
|
|
mostly true but anyways um so he thinks that I've like completely done what they told me not to do
|
|
in the first place and he's kind of sort of half flipping out and I'm like no I can assure you
|
|
that this is this that was me and that I wasn't that was intentional and that signature is probably
|
|
just a generic signature for like the mature putter payload or whatever like PS exec or like
|
|
mini cancer whatever it was I was running at mass scale um so uh he he began to tell me that like
|
|
his his security software is like taking a crap just because I spray in all the place um
|
|
needs to say I kind of brought him down took a bottom down took him off the ledge and
|
|
brought him down for the ledge and you know kind of cooler heads and he didn't seem too upset he
|
|
just wanted to make sure that I wasn't actually uh sending a worm out to the to his company I said no
|
|
nope that's legit that's me trying not to be in like mr you know taking out the whole network
|
|
type of uh type of guy um kind of trying to take everything over once anyway so it was a quick
|
|
story um ran a little bit longer than I wanted to but uh that was pretty fun um because they told
|
|
me I didn't have internet and I actually ended up coming back uh and when I came back uh you know
|
|
I had my internet and I was doing whatever and then um these three guys rolled up and they're like
|
|
like the Istanbul they rolled up and they they kind of taught me to say hey you think I
|
|
like yeah I can't really do that you know you can't really be on the internet wait you know it's
|
|
kind of cheating you know we don't you know we already know about that issue so you know you
|
|
whatever and I'm like well if you want me to get off the internet I can you know but
|
|
not I'm just gonna keep using it for research until you fix it you clowns so um they kind of
|
|
tell me that you know I shouldn't be doing it and then I'm like fuck off I'll do what I want
|
|
until you fix it because I'm here to test whatever it is did what's wrong with your security and
|
|
that's part of the scope um if you allow me to get on the internet that I'm gonna get on the internet
|
|
unless you say no specifically you didn't say that I couldn't get on the internet you just said
|
|
that I couldn't tether other devices so that was kind of a kind of a fun experience to go through
|
|
anyways hope somebody enjoys some of this random babbling um I probably won't want to do one of
|
|
these for a while unless I end up driving a whole bunch again which is um not super fun but it
|
|
makes it makes it go by a little bit quicker anyways have a good one take it to you
|
|
you've been listening to Hacker Public Radio at Hacker Public Radio dot org
|
|
we are a community podcast network that releases shows every weekday Monday through Friday
|
|
today's show like all our shows was contributed by an hbr listener like yourself if you ever
|
|
thought of recording a podcast then click on our contributing to find out how easy it really is
|
|
Hacker Public Radio was founded by the digital dog pound and the infonomican computer club
|
|
and it's part of the binary revolution at binrev.com if you have comments on today's show
|
|
please email the host directly leave a comment on the website or record a follow-up episode yourself
|
|
unless otherwise stated today's show is released on the earth creative comments
|
|
attribution share a light 3.0 license
|