Files
hpr-knowledge-base/hpr_transcripts/hpr3435.txt
Lee Hanken 7c8efd2228 Initial commit: HPR Knowledge Base MCP Server
- MCP server with stdio transport for local use
- Search episodes, transcripts, hosts, and series
- 4,511 episodes with metadata and transcripts
- Data loader with in-memory JSON storage

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-10-26 10:54:13 +00:00

204 lines
18 KiB
Plaintext

Episode: 3435
Title: HPR3435: Hacking Stories with Reacted: part 5
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr3435/hpr3435.mp3
Transcribed: 2025-10-24 23:22:59
---
This is Hacker Public Radio Episode 3435 for Friday, the 1st of October 2021.
Today's show is entitled Hacking Stories with Reupted, Part 5.
It is hosted by Operator and is about 18 minutes long and carries an explicit flag.
The summary is, I talk about some old, old, old, pen-testing stories from days old.
This episode of HPR is brought to you by an honesthost.com.
Get 15% discount on all shared hosting with the offer code HPR15.
That's HPR15.
Better web hosting that's honest and fair at An Honesthost.com.
Hi, this is another episode of Hacker Public Radio.
We got a host with your host, Redacted.
Today I'm going to do two short ones and I'm not sure if they're related,
if they're on the same day. Again, they kind of all start mixing together.
So the first one I'll tell you about was, well, it's the combination of the things.
The first time I'm free sure this is the same client. So this is a big bank, whatever.
I get there. They're all worried about my system. All worried about me getting
put in viruses on their network. So I sign this letter saying I'm not going to do all this stuff.
I'm not going to install security software and basically it's like a generic IT violation thing.
And you're forced to sign these sometimes.
Which I'm thinking and assuming that the over arcing agreement that you set up with the actual
client and my employer trumps any of these stupid little things I sign up. But I try to let the
client know that hey, I'm essentially going to be violating all these things because that's my job.
So you're telling me not to do xyz and that's what exactly I'm being paid to do unless it's out
of scope and it's specifically stated in the thing that I won't do xyz. So you know, usually it's
kind of like a just a formality thing in some cases. But these guys were very adamant about like,
they were scared that I was going to put malware on their network and some kind of worm.
And they were also scared that I was going to do some kind of tethering with my phone and
or some other internet device wireless device and connect to networks together through
well needs to switch back to the phone here. Connect two networks together via some tethering
stuff which it's not really the biggest of risks but hey, go crazy if this is what you're going
to worry about. I do think that they had, I don't know if they had had pen tests in the past where
they had gotten bit by that before a very specific thing to tell someone not to do. So I feel like
maybe someone at some point in time had done an assessment for them and they got a piece of malware
from the internet while they were on site and they got owned or some portion of getting compromised
through vendor third party. So they were very adamant about me not being getting on the internet.
So the first thing I do of course is try to get on the internet. They tell me that I'm not
allowed to plug any other device networking devices into the thing. All I can do, they actually had
me, this is funny, they actually had me install a av client that they had on my actual windows
image and then I told them that I run Linux for most of my assessments and they said okay well
blah blah blah and I'm like well I can install some claim maybe here or whatever garbage and show you
a clean bill of health for that and I can also sell you a clean bill of health for the av but again
that's what I effing do for a living that's that's my game like I'm supposed to make stuff
beep and look benign and then potentially be malicious. So if you want to see a green checkbox
I can make you see a green checkbox that's what my job is I'm supposed to do that. So anyways
I show them this green checkbox of my windows they're doing their due diligence to try to make
sure some effing clown is not gonna connect their network and make a big mess. So I get I see that
side of it but to make me jump through a bunch of hoops and do these silly shenanigans doesn't
really make a whole lot of sense when you know the voodoo witch doctors you're you're you're you're
you have to trust the voodoo witch doctor at the end of the day at some point. So I get all my stuff
set up I show them the green checkbox and whatever av garbage they have me installing claim maybe
the Linux av so I show them that and then I proceed to try to tunnel out through various methods
so there's lots of ways to tunnel out through the internet at the very minimum what always works
is DNS tunneling now basically DNS telling is like 53 by your 150 by somebody correct me
it's this very small amount of traffic you can maximum size you can pack in a DNS request
or a DNS request in a response but DNS works everywhere I've seen DNS working on skate
and networks that are quote unquote air gaps I've seen DNS work where where places it's not
supposed to be working where there is no internet and there's no DHCP you set yourself a static
IP of somebody around you make up a gateway find a gateway and tell ask that gateway if you can do
DNS request and boom you're on the internet they'll tell you oh it's not on the internet but if
DNS works you can actually tunnel your traffic over DNS albeit slow and not ideal to exfil data
but it's also it's it's a way to gain an initial foothold into the environment if you have to do
crazy DNS tellings I never have to go that crazy my assessments everything pretty much falls over
with the touch of a touch of a pinky right so I'm looking at the traffic I'm looking at what
all is allowed outbound back then you can you can actually scan AOL's login servers believe it
or not AOL would open have every port open on every service open on every port to try to get
allow you to get out to to AOL servers so you're there client I don't know if they're client would
actually check all those ports but it would check and craft on a port and you could specify
whatever random port that allowed outbound to use over AOL because it would accept requests on
every single port it was beautiful it's a beautiful idea and that's how some of this stuff like
Skype works it tries the traverse back in the day I don't know if they still do it now but they
try to do all kinds of crazy tactics to traverse firewalls stuff like the Cisco VPN does all kinds
of crazy ninja stuff to you can tell it to get out to tunnel out of the environment but you got
DNS and kind of order of simplicity and idealness I like to use s tunnel which is a ssl tunnel
there's some newer hotness tunnels out there there's ICMP tunnel there's DNS tunnel again
those are two pretty small packet size protocols there you got ssh tunnels your standard ssh tunnel
their htps kind of s tunnel thing there's other ways to do s tunnel and have it be set up
under different types you can have a proper regular proxy or whatever you can tunnel up all
mannerisms of ways there's people telling you all over kinds of different protocols and in some
cases you can tunnel over IPp6 so anyways I had already tested this prior because I've had
certain instances where you're on a client site and you want to do some security research but you
can't because you're on the network that you're testing and the network that you're testing has a
proxy so first things first is you want to get a server on the internet that can you can
proxy your traffic through hopefully securely and be able to do security research pull down binaries
pull down source code you know do to do your normal research right so first thing first is
I get on the network can't do anything you can see the internal services you can do discovery
I'm doing in mapping all that stuff and this is running my standard standard checks and I start
poking around with a firewall and you scan AOLs now there's a couple of if you message me your
message chat I can send you some servers that listen on all ports and we'll help you identify
potential exit exit places to get out of the network to listen on all ports I can I can tell you
wondered at least one of those but the idea is you can set up your own to listen on all ports with
just a simple like Python script or something ridiculous but anyways so I scan AOL servers I find
some ports to get out through I think standard 22 but it was blocking as a sage so what they'll have
is I don't know what they call it like identifying tagging your deep packet inspection or whatever
it was being termed you want to call it it's essentially if you're trying to run SSH over if
you're trying to like SSH over 444443 and it's not web traffic it'll say you know why that's
not cool or for example if you're trying to SSH over 421 and it's not actual FTP traffic it'll
say no not gonna let you do that you're trying to tunnel FTP you're trying to set up an FTP
or talk to an ITP over 480 no 480 has to be web or 443 has to be this you'll see that more and
more nowadays that they do this deep packet inspection or whatever they kind of check the
the kind of headers and all that for the valid traffic and say okay this is this is just
somebody trying to run an ITP server over 480 no I'm not gonna allow that
um in this case I can't remember what exactly you set it up but anyways so I'm sitting there
I got my tunnel to work I'm telling all my traffic it's pretty damn fast um it's pretty slick
I'm doing my research listen to my music when I'm while I'm working doing my thing and you know
I thought it relevant to tell the client this because they told me I didn't have internet when
I got there and that's kind of a then possible thing um you know they didn't have DHCP but they
were offering an IP and they were offering connectivity to other internal services all that good
stuff so I get ready to kind of build up a little quick note about how I got access to
what I got access to and how I tunneled out so given that information um and then maybe a
couple of days goes by and I realized that it sounds like a Thursday or something I realized
that I told my wife that I was going to be able to do some kind of corporate event for work and do
some kind of fancy to do for uh for like an office party so we had this little office party going on
and I completely forgot about it so it's like Thursday and noon and I realized that I told my
wife that I'm gonna be home early on Thursday so that we can go to this thing Thursday night
and I might have even been Friday Friday during the day or Friday night I'm pretty sure it was
actually Thursday anyways despite the despite what day it was I I told my wife that I made plans to
come home early and and uh and whatever so here I am I've got some access to some boxes I think I
had like admin credentials or something like that and I was starting to spray them around but I
wasn't you know I was kind of taking my time I generally kind of took my time and and kind of
gave myself plenty of time to to to work up to that I knew it would have fallen over within the day
or the next couple days so um I was letting that thing do and then when I found out that I didn't
have a whole lot of time I had to kick it into height gear so I essentially set up my scripts to do
the automatic kind of once I had valid credentials or valid hatches I had some scripts set up to
automatically check the um check the servers to see if there's any other you know donate admins
logged into those and all that stuff dump out the users dump out the services dump out the
the shared um the shared resources that are logged into it and so I get out the phone teller
you know what um I might be able to do it I might not it just depends I'd really like to get
donate admins first and kind of you know own them sideways before I leave so um I'm sitting there
and I kind of get whatever and I'm like spraying my credentials all over the place going nuts
and eventually I um I come across something I don't remember what it was but I eventually get it
I'm like oh it's crap so I know I'm get there I know I'm close enough to where I can book the flight
so I go ahead and I book a flight for like basically for me to leave in like 20 minutes or like
30 minutes so I book a flight for me that for me that where I'd have to leave in like 30 minutes
to catch the flight or outside be late so here I go I buy my ticket and I'm like all right I got
close to donate admins I'm I really just have to pivot around and and get that escalation
and then dump the garage and then show them that I have donate admins and that and use it whatever
so at this time I'm kind of like kicking in the high gear I'm spraying my crud's everywhere
I'm trying to escalate and I'm just going nuts so just to try to just to try to get
donate admins before I leave um so the client uh oh maps is just crashed for me
one second
so I kind of kick it up tiger get all noisy and finally I end up getting donate
domain admin I you know kind of a little bit more lee but I'm rushing to like wrap all this up
get all my evidence capture all my evidence so that I don't have to like reverse engineer myself when I
get home um yeah gonna make this so I get all my crud get all my stuff get all my notes
come out it all together make sure that I've got legit whatever and then I start to head to the
airport get a new bird uh this is when the bird was still good um so I got a new bird and I think
I called a client and let them know I said hey you know um you know I'm I found some stuff I
I've got domain admin and you know I've got most of the most of what I was going after and I've
got some and some impact and some reports and we've got got everything pretty much done I'm
pretty finished up and he says oh when you when you look at the leave I was like wow I'm
actually in the car on the way to the airport because I'm trying to get head home for uh for
a like uh for uh for a corporate company a bit and he he was pretty legit about it he was okay
whenever um the funny thing is as I get on the plane I whatever and then I land back at home
and when I land back at home I got a phone call from the client and they wanted to ask me some
questions where they're pretty generic in nature but I call them up and this this guy's like yeah
you like took out our our AV like they are it was Bane AB thing our uh malware analysis thing
they had like fire I or something I don't know what it was so what had happened is when I was
spraying my credentials around and dumping my um when on the ones that had a had a AB um I was
triggering AV on hundreds of systems and that was getting sent those packets or whatever or alerts
or whatever were being sent by some central server to be analyzed or whatever it was and this
supposed security server um found that I was like malware or intrusion um which was kind of
mostly true but anyways um so he thinks that I've like completely done what they told me not to do
in the first place and he's kind of sort of half flipping out and I'm like no I can assure you
that this is this that was me and that I wasn't that was intentional and that signature is probably
just a generic signature for like the mature putter payload or whatever like PS exec or like
mini cancer whatever it was I was running at mass scale um so uh he he began to tell me that like
his his security software is like taking a crap just because I spray in all the place um
needs to say I kind of brought him down took a bottom down took him off the ledge and
brought him down for the ledge and you know kind of cooler heads and he didn't seem too upset he
just wanted to make sure that I wasn't actually uh sending a worm out to the to his company I said no
nope that's legit that's me trying not to be in like mr you know taking out the whole network
type of uh type of guy um kind of trying to take everything over once anyway so it was a quick
story um ran a little bit longer than I wanted to but uh that was pretty fun um because they told
me I didn't have internet and I actually ended up coming back uh and when I came back uh you know
I had my internet and I was doing whatever and then um these three guys rolled up and they're like
like the Istanbul they rolled up and they they kind of taught me to say hey you think I
like yeah I can't really do that you know you can't really be on the internet wait you know it's
kind of cheating you know we don't you know we already know about that issue so you know you
whatever and I'm like well if you want me to get off the internet I can you know but
not I'm just gonna keep using it for research until you fix it you clowns so um they kind of
tell me that you know I shouldn't be doing it and then I'm like fuck off I'll do what I want
until you fix it because I'm here to test whatever it is did what's wrong with your security and
that's part of the scope um if you allow me to get on the internet that I'm gonna get on the internet
unless you say no specifically you didn't say that I couldn't get on the internet you just said
that I couldn't tether other devices so that was kind of a kind of a fun experience to go through
anyways hope somebody enjoys some of this random babbling um I probably won't want to do one of
these for a while unless I end up driving a whole bunch again which is um not super fun but it
makes it makes it go by a little bit quicker anyways have a good one take it to you
you've been listening to Hacker Public Radio at Hacker Public Radio dot org
we are a community podcast network that releases shows every weekday Monday through Friday
today's show like all our shows was contributed by an hbr listener like yourself if you ever
thought of recording a podcast then click on our contributing to find out how easy it really is
Hacker Public Radio was founded by the digital dog pound and the infonomican computer club
and it's part of the binary revolution at binrev.com if you have comments on today's show
please email the host directly leave a comment on the website or record a follow-up episode yourself
unless otherwise stated today's show is released on the earth creative comments
attribution share a light 3.0 license