phillips321

Penetration Tester and Linux fanboy!

The other day i had to perform some brief and remote social engineering tasks. (1 day and telephone only)

I was attempting to trick a target into downloading a malicious executable by calling up, pretending to be BT (British Telecom) and then requesting that the user downloads a Speed Test in order for me to perform some “diagnostics”.

I provided the link to the customer as btsupport.com.phillips321.co.uk, unfortunately the phillips321.co.uk… Continue reading

I know how we all have our own way of copy/paste from console windows but metasploit has just introduced a new feature as of r13028.

You can now save all of the output of metasploit (including meterpreter) to a file using the spool command:

123spool /root/msf3_output.txt [OWNAGE GOES HERE] spool off

Or to ensure you always have a log of what you are doing add to the ~/.msf3/msfconsole.rc file… Continue reading

So you’ve owned a box and now you want to exploit others using the first as a pivot. First thing to do is background your current meterpreter session:

1234567meterpreter > background msf exploit(multi_handler) > sessions -l Active sessions =============== Id  Type                   Information         … Continue reading

So your Linux box has locked up and you can’t get a response… step in SysRq!

This wonderful key is on most keyboards and i bet you’ve hit it a low more times than you realise as it’s usually paired up with the PrtSc (PrintScreen) key. What does it do?

Well it allows you to send system requests to a linux kernel, effectively allowing you to bypass the usual GUI/CLI… Continue reading

So, you’ve been given a cisco config from a pix firewall using

1'show run'

and you’ve looked through it and it seems a ballache to understand. We know we could use nipper but you either have to pay a wedge for the professional version of suffer with the free version.

After a little googling I found a few tools to help along the way. fwbuilder looks good but doesn’t… Continue reading