Open Source Intelligence Through Messaging Apps

During red team engagements, we try to gather information about our targets as quietly as possible. One piece of information that can be difficult to find is employee cell phone numbers. While researching a different subject, I stumbled across a way to correlate cell...

On Purple

The "Purple Team" term has been flying around for a while now and it is an important development in our growth as an industry. If you haven’t heard the term before, it is a sharing and collaboration between the Red Team (offense) and the Blue Team (defense) with the...

Logging Passwords on Linux

Hal Pomeranz tipped me off to a nasty little trick of using Linux's own auditing features and PAM to grab clear text passwords from users as they use sudo/su on the command line. Linux PAM (Pluggable Authentication Modules) are a flexible method of implementing...

Breaking into Infosec

tl/dr; There are a lot of ways to get into infosec. I’ll try to outline some of the things that have helped me along the way and provide some resources to help you. We recently had the pleasure of sponsoring BSides Kansas City. Side note: if you haven’t been, you...

SQLi Data Exfiltration via DNS

Lots of pen test and red team blogs follow the same model: we came, we saw, we conquered, blue team tears flowed. This is not one of those blogs. TL/DR; Pen testing isn't about finding vulnerabilities. It's about finding opportunities for your client to improve, even...

Maintaining Session States in .NET Apps With Burp

Did you know you can use DNS queries to exfiltrate data from a database via SQLi? No? Then continue reading! I'll walk through some techniques you can use to enumerate and exfiltrate data from a DB server via blind SQLi. On a recent web app test, I encountered a...

Capturing SQL Server User Hash with SQLi

During a recent web app test, I encountered a situation when I would be randomly logged out of the application when running sqlmap. I wasn't manipulating any of the session cookies and the logouts happened at random times. I needed a way to detect when I got logged...

Getting a Handle on Large Parameter Sets

On a recent external web app pen test, I found a possible SQL injection vulnerability using the Burp Scanner. One of the tests triggered an A record lookup for the Burp Collaborator server. In the screenshot below, we can see the test that triggered the finding....

Getting to the (Actual) Goal

During a recent web app engagement, I wanted to run some of the Burp Scanner automated checks, but I was confronted with several issues. First, this particular application did not respond kindly to manipulation of the session cookies. The application and its single...

FOLLOW US
Looking for something?
SUBSCRIBE TO BLOG AND WEBCASTS.
No spam. No junk. Just notifications on new content.