Tilde Enumeration

The Vulnerability A while ago I found a bunch of web servers that had the Microsoft IIS Tilde Enumeration vulnerability on them. You can read more about the vuln http://soroush.secproject.com/downloadable/microsoft_iis_tilde_character_vulnerability_feature.pdf or http://www.acunetix.com/blog/web-security-zone/windows-short-8-3-filenames-web-security-problem/. Essentially, you can brute force file names that are on IIS web servers and possibly retrieve them using the ye olde style Windows 8.3 naming... Continue Reading →

Top 5 CTF Tips from a CTF Virgin

My Virgin CTF At DerbyCon (derbycon.com) 2014, I participated in my first conference CTF (Capture the Flag) event. For those that haven't yet done one, you take your laptop configured with your attack tools and join a network of hundreds of other conference-goers. All of you are tasked with exploiting information security weaknesses in the... Continue Reading →

"Cracking" Hashes with recon-ng and bozocrack

The other day I came across a database dump that had user login names and hashed passwords. I had over 1,000 of them and they were SHA256 hashes. I remembered that there was some tool that could perform Google look-ups for hashes and asked the Twitter-verse for help. Wouldn't you know that the first person... Continue Reading →

Setting up an OpenVPN server in Amazon’s EC2

Amazon Instance ConfigCreate account in Amazon.com if you don't have one alreadyGo to Amazon http://aws.amazon.com/console/ and log inCreate a new instanceChoose the Ubuntu 64bit system (free tier 2 is fine)Don't need to change any of the defaults for storage and such.Launch the instance (create or use a predefined key; set the security group (firewall))Ensure that... Continue Reading →

Hearing the feedback?

Those of you that read my blog and maybe know me in person/on Twitter know that I love teaching. I think it mostly stems from not getting enough attention as a kid. 😉 [Just kidding Ma.] This past year I had the honor of presenting to both of my kids' schools about my work and... Continue Reading →

Hello. This is Bob from Microsoft

So last night "Bob from Microsoft" called me because my computer was infected and "he was there to help me". Yeah right. Background Because the Internet is such a wonderful, sharing place, I'd been alerted to these types of cold-call, social engineering attacks a while ago. One of my neighbors had received one of these... Continue Reading →

Proudly powered by WordPress | Theme: Baskerville 2 by Anders Noren.

Up ↑