-
Q: What specific tools did the author use for post-exploitation?A: Busybox, nmap, Responder.py, Python, tcpdump, dsniff, socat, screen, a SOCKS proxy server, and tgcd.
-
Q: How did the attacker initially gain access to Hacking Team?A: By exploiting a 0day vulnerability in an embedded device (spam filtering appliance/VPN) after finding it via port scanning.
-
Q: What is 'Responder.py' used for?A: Attacking Windows networks to capture credentials/hashes via LLMNR/NBT-NS poisoning when you have internal access but no domain user.
-
Q: How did the attacker access the 'Rete Sviluppo' (Development Network)?A: By finding a text file with passwords in Christian Pozzi's Truecrypt volume, which gave access to a Nagios server bridging the networks.
-
Q: What advice does the author give regarding attribution/OPSEC?A: Use new servers/domains, paid for with new bitcoin addresses, and avoid reusing tools or techniques linked to previous identities.
-
Q: What vulnerability opened the door to the Exchange server?A: Insecure backups found on iSCSI devices that were supposed to be on a separate network but were accessible from the main network.
-
Q: What is the purpose of the 'backdoored firmware' mentioned?A: To maintain persistent access to the embedded device after using the initial exploit, protecting the exploit from discovery.
-
Q: Why did the author use a virtual machine routed through Tor?A: To anonymize traffic and keep personal life separate from hacking activities.
-
Q: What does the author say about 'NoSQL' databases?A: They often lack authentication by default, making them easy targets ('NoAuthentication').
-
Q: How did the attacker download the email data?A: Using PowerShell's 'New-MailboxExportRequest' cmdlets after gaining Domain Admin access.
Ask a question
Have a doubt or need clarification?
I’m here to help. Share your question, and I’ll get back to you with the guidance you need regarding the course.
Thank you!
I have received your message and I shall get back to you shortly.