text stringlengths 0 1.99k |
|---|
For use as pivots to hide the IP addresses of the stable servers. And for |
when I want a fast connection without pivoting, for example to scan ports, |
scan the whole internet, download a database with sqli, etc. |
Obviously, you have to use an anonymous payment method, like bitcoin (if it's |
used carefully). |
----[ 3.2 - Attribution ]------------------------------------------------------- |
In the news we often see attacks traced back to government-backed hacking |
groups ("APTs"), because they repeatedly use the same tools, leave the same |
footprints, and even use the same infrastructure (domains, emails, etc). |
They're negligent because they can hack without legal consequences. |
I didn't want to make the police's work any easier by relating my hack of |
Hacking Team with other hacks I've done or with names I use in my day-to-day |
work as a blackhat hacker. So, I used new servers and domain names, registered |
with new emails, and payed for with new bitcoin addresses. Also, I only used |
tools that are publicly available, or things that I wrote specifically for |
this attack, and I changed my way of doing some things to not leave my usual |
forensic footprint. |
--[ 4 - Information Gathering ]------------------------------------------------- |
Although it can be tedious, this stage is very important, since the larger the |
attack surface, the easier it is to find a hole somewhere in it. |
----[ 4.1 - Technical Information ]--------------------------------------------- |
Some tools and techniques are: |
1) Google |
A lot of interesting things can be found with a few well-chosen search |
queries. For example, the identity of DPR [1]. The bible of Google hacking |
is the book "Google Hacking for Penetration Testers". You can find a short |
summary in Spanish at [2]. |
2) Subdomain Enumeration |
Often, a company's main website is hosted by a third party, and you'll find |
the company's actual IP range thanks to subdomains like mx.company.com or |
ns1.company.com. Also, sometimes there are things that shouldn't be exposed |
in "hidden" subdomains. Useful tools for discovering domains and subdomains |
are fierce [3], theHarvester [4], and recon-ng [5]. |
3) Whois lookups and reverse lookups |
With a reverse lookup using the whois information from a domain or IP range |
of a company, you can find other domains and IP ranges. As far as I know, |
there's no free way to do reverse lookups aside from a google "hack": |
"via della moscova 13" site:www.findip-address.com |
"via della moscova 13" site:domaintools.com |
4) Port scanning and fingerprinting |
Unlike the other techniques, this talks to the company's servers. I |
include it in this section because it's not an attack, it's just |
information gathering. The company's IDS might generate an alert, but you |
don't have to worry since the whole internet is being scanned constantly. |
For scanning, nmap [6] is precise, and can fingerprint the majority of |
services discovered. For companies with very large IP ranges, zmap [7] or |
masscan [8] are fast. WhatWeb [9] or BlindElephant [10] can fingerprint web |
sites. |
[1] http://www.nytimes.com/2015/12/27/business/dealbook/the-unsung-tax-agent-who-put-a-face-on-the-silk-road.html |
[2] http://web.archive.org/web/20140610083726/http://www.soulblack.com.ar/repo/papers/hackeando_con_google.pdf |
[3] http://ha.ckers.org/fierce/ |
[4] https://github.com/laramies/theHarvester |
[5] https://bitbucket.org/LaNMaSteR53/recon-ng |
[6] https://nmap.org/ |
[7] https://zmap.io/ |
[8] https://github.com/robertdavidgraham/masscan |
[9] http://www.morningstarsecurity.com/research/whatweb |
[10] http://blindelephant.sourceforge.net/ |
----[ 4.2 - Social Information ]------------------------------------------------ |
For social engineering, it's useful to have information about the employees, |
their roles, contact information, operating system, browser, plugins, |
software, etc. Some resources are: |
1) Google |
Here as well, it's the most useful tool. |
2) theHarvester and recon-ng |
I already mentioned them in the previous section, but they have a lot more |
functionality. They can find a lot of information quickly and |
automatically. It's worth reading all their documentation. |
3) LinkedIn |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.