Fuzzing Vulnserver: Discovering Vulnerable Commands: Part 1
Introduction Vulnserver is a Windows TCP server running on port 9999. It was written by Stephen Bradshaw whose blog is located here. The server was intentionally written to be vulnerable, for the purpose of learning how to fuzz a real target. The problem is that when we're learning, we ...
Linux TPM Encryption: Initializing and Using the TPM
1. Initializing the TPM To secure our data we must first initialize the TPM. What we're actually doing is changing the settings of the hardware TPM chip module on the computer motherboard itself. First we must initialize the TPM physical chip with the tpm_clear command, which returns the TPM ...
Packet Filtering
1. Packet Filtering Introduction This tutorial will talk about packet filtering. First we must define what packet filtering is. Packet filtering is a process of allowing or blocking packets at an arbitrary layer of OSI: physical, data-link, network, transport, session, presentation or application layer. More about OSI can be read ...
Security Categories
1. Introduction I've been a security enthusiast for years now, and currently I'm working as a security penetration tester. Over the years it has happened that I've heard about a new security method I've never encountered before. When I started doing research about the topic, it ...
Linux TPM Encryption: Enabling TPM in BIOS and Kernel
1. Introduction The TPM stands for the Trusted Platform Module, which is a secure microprocessor that can store cryptographic keys that are further used to encrypt/decrypt data. The following picture is taken from Wikipedia [1]: We can read more about the picture in [1]. We should just say that ...
How to Use Iptables
1. Introduction First we must mention that iptables is a Linux kernel firewall, which is why we can categorize it with the picture below: The picture is presented so we can better imagine how firewalls and iptables firewall are connected with information security in general. I've also written an ...
The Browser Exploitation Framework (BeEF) – Part 2
The first article in this series can be found here: The Browser Exploitation Framework (BeEF) – Part 1. 1. Using the Modules In this section we'll describe all the available modules in the current version of the BeEF exploitation framework. We'll describe the most interesting modules available. All the ...
The Browser Exploitation Framework (BeEF) – Part 1
1. Introduction We can categorize the BeEF social engineering framework as shown in the picture below: We can read more about the mentioned frameworks, namely: SET (Social Engineering Framework), BeEF, Honeyd and Cree.py, on the Infosec Institute website, where they are briefly described. . We can use BeEF to host ...
Crack Me Challenge: Final Edition
You can find the rest of the Crackme Challenge series here. Part 6 The code for logical segment 6 is as follows: 0040181F |. B9 10000000 mov ecx,10 00401824 |. 8DB424 C0000000 lea esi,dword ptr ss:[esp+C0]sta 0040182B |. 8D7C24 10 lea edi,dword ptr ss:[esp+10] 0040182F ...
CrackMe Challenge Part 5: Logical Code Segments Continued
CrackMe Part 5: Logical Code Segments Continued The code in logical code segment 4 additionally changes the stack at address [esp+70]. The code is presented here: 004017E5 |. B8 3F000000 mov eax,3F 004017EA |. 8D4C24 70 lea ecx,dword ptr ss:[esp+70] 004017EE |. 8BFF mov edi,edi 004017F0 |> 8B55 ...