Sunday, October 30, 2011
The Game
If you want the recipes for any of the components of that dish let me know.
Till then ta my darlings,
Magenta
Thursday, October 27, 2011
Chapter 7
Wednesday, October 26, 2011
Tuesday, October 25, 2011
Access to a restricted area.
I originally posted this as a comment, so this is the cut and paste. I accomplished it immediately following last Thursdays class. My task was, basically, to gain access to a restricted area.
I immediately figured I would use the fact that all summer I have been a regular fixture at some of the the behavioral labs at MIT, taking part in various studies as a subject. The last one I did ended in September. I had no specific plan of where to end up. Yet, the door was locked today. I lurked a bit and was rewarded - out came an academic, and in I went. Nobody was in the locked lab. A janitor was wheeling down the hall, talking on the phone. I followed him through a locked door and....found myself in the basement! I wandered a bit. It went under several buildings. I passed a number of grad students walking through with data that they were pouring over, wearing badges, so I took out my badge holder (with my T pass and bank card and BHCC ID in it), and let it dangle from my necklace. Professor types passed me as well, and this time I was acknowledged - but not questioned. Various janitors walked past me. They even saw me taking pictures, but said nothing. I wandered into the front area of an occupied mail room, and snapped some pics (mind you, packages in reach that I could easily have taken or messed with if I had been malicious)...I wandered out to the shipping and receiving bay, and there was the ONLY place that I was stopped and sent back...I claimed I couldn't find the mailroom and was shown the way. I took pics of various piles of junk, like stripped computers, in a few side areas, and some creepy basement corners. Eventually I wandered out of a totally different building than I entered, apparently one of the clinical research areas. I also wandered out WITH someone...I had started a conversation with a random person walking by when it seemed I was spotted by security after all, about the book he was carrying (The Chomsky-Foucault Debate: On Human Nature, for the curious)...and made a show of gestures that might be mistaken for familiarity from a distance, and it worked. I walked out with the gentleman.
One thing that seemed very, very common - many, many people were on phones. Mostly using it visually - texts and data - only two people chatting (shipping dock guy and janitor). This made it VERY EASY to do this task.
https://plus.google.com/photos/115946097789758291346/albums/5665928144813762033
Ultimate Failure
Midnight Lover you have successfully avoided an evil hyper complex and specific plot to give to you an item of sure death and destruction, AN M&M COOKIE GIVEN TO YOU BY SOMEONE OTHER THAN ME.
My first adventure
That's all for me for today I still have papers to write, software to code, and maybe a cake to bake.
Ta Darlings!
Find out the name (first & last) of a person (fellow player) lives with.
A**x Rock
The Game
Monday, October 24, 2011
Thursday, October 20, 2011
Wednesday, October 19, 2011
Tuesday, October 18, 2011
Chapter 6 Homework
Sunday, October 16, 2011
Hacking and Voting Machines
A friend sent me this link. He threw this at me as an idea for a potential "group project" (I'm not sure in what manner this could be explored, exactly, but I'm intrigued), and to check out the embedded blue links in the texts. Also, he sent the fixed URL for the video link on the page that was broken -
http://www.youtube.com/embed/6ClrHPShljM
Saturday, October 15, 2011
Security researcher sued for disclosing flaw
http://www.scmagazine.com.au/News/276780,security-researcher-threatened-with-vulnerability-repair-bill.aspx
Illustrates the need for security professionals to not only know their laws, but to ask before doing any testing and have a contract in writing. Although I think the company should be grateful that he found it and not a malicious hacker...the actual 'test' didn't involve anything particularly complex.
Cell Phone Hack Technique
a fairly simple way to bypass the need for passwords with some cell phone voicemail accounts.
...mostly, I posted this because this shows something fairly invasive and that might lead to more data. This can be done if anyone managed a simple social engineering feat that results in a phone number. I showed this video to a friend who was having a chuckle when I was telling her of our Social Engineering assignments, and she commented "Seriously, how much damage can be done if you just get a phone number? People give those out everyday."
Well, there you go.
Friday, October 14, 2011
SEAN? Anyone?
Thanks. :/
Wednesday, October 12, 2011
Tuesday's challenges!
More social engineering fun (post-Thursday)
Social Engineering tactics homework
Tuesday, October 11, 2011
Hypnosis and Social Engineering
http://www.ethicalhacker.net/content/view/366/24/
Project 8 - Decoy Scan
Decoy Scan Using nmap
Exercise 1: in this exercise, you’ll use nmap to perform a decoy scan, which mixes
your IP address with bogus IP addresses (using the -D option):
1. From a BackTrack shell, type the following (only type what's in bold, on one line):
user1@pentest:~#nmap -n -D192.168.1.5,10.5.1.2,me,172.1.2.4 target_IP_address > /root/ceh/decoy_scan
Syntax breakdown:
nmap: program name
-n: program option to never resolve DNS names
-D192.168.1.5,10.5.1.2,me,172.1.2.4: program option to cloak your scan with the supplied bogus and real IP addresses target_IP_address: the IP address of the target system
> /root/ceh/decoy_scan: redirect the output to a file called decoy_scan in the /root/ceh directory
2. Examine your results:
user1@pentest:~#cat /root/ceh/decoy_scan | less
3. Email your results to proflheureux@gmail.com.
Project 7 - Port Scanning Using TCP
Let's build on this common port scan so that your actions are stealthier.
In the next example, you will add two additional options: the -g and the –p options:
The -g option specifies the source port on the scanning machine (your system).
The most common option to use here is port 80 (because it's allowed through most
border network devices). The -p option sets the ports on the target system to scan.
Exercise 1: TCP SYN scan:
1. Using the -sS flag option, you will send the target system a SYN packet, but upon receiving the SYN/ACK from the target system, your system will not respond with an ACK packet (thus, completing the 3-way handshake). Instead, your system will respond with a RST packet (the port is then considered open). If you receive an RST/ACK packet from the target system, it indicates that there is not a running process on that port, or the process running on the port is not listening for connections.
user1@pentest:~#nmap -sS -vv -g 80 -p 80,88,135,139,389,445 target_IP_address > /root/ceh/syn_scan
nmap: program name
-sS: program option for TCP SYN scan
-vv: program option for double verbose output
-g 80: program option that specifies the source port on the scanning machine
(your system)
-p 80,88,135,139,389,445: specifies the ports on the target system to scan
target_IP_address: the IP address of the target system
> /root/ceh/syn_scan: redirect the output to a file called syn_scan in the /root/ceh directory
3. Examine your results:
user1@pentest:~#cat /root/ceh/syn_scan | less
5. Repeat steps #2-3 using a different target IP address and different destination port numbers
6. Email your results to proflheureux@gmail.com.
Project 6 - Port Scanning Using UDP
In this lab, you will use the nmap -sU option to perform a UDP scan.
With this scan type, nmap sends 0-byte UDP packets to each port on the target system. Receipt of an ICMPv4 Destination Unreachable/Port Unreachable (Type 3, Code 3) message signifies the port is closed; otherwise it is assumed open.
One major problem with this technique is that when a firewall blocks outgoing ICMPv4 Type 3, Code 3 messages, the port will appear open. These false-positives are hard to distinguish from real open ports.
Another disadvantage with UDP scanning is the speed at which it can be performed. Most OSes limit the number of ICMPv4 Type 3, Code 3 messages which can be generated in a certain time period, thus slowing the speed of a UDP scan. nmap adjusts its scan speed accordingly to avoid flooding a network with useless packets.
NOTE: Microsoft OSes do not limit the ICMPv4 Type 3, Code 3 error generation frequency, thus, making it is easier to scan a Windows machine's 65,535 UDP ports in very little time.
user1@pentest:~# nmap -sU -v target_IP_address > /root/ceh/udpscan
Syntax breakdown:
nmap: program name
-sU: program option for UDP scan
-v: verbose mode
target_IP_address: the IP address of the target system
> /root/ceh/udpscan: redirect the output to a file called udpscan in the /root/ceh directory
2. Examine your results:
user1@pentest:~#cat /root/ceh/udpscan | less
3. Repeat steps #1-2 using different target IP addresses. Compare your results.
4. Email your results to proflheureux@gmail.com.
Project 5 - Ping Sweeps
Network Ping Sweeps Using nmap
Nmap ("Network Mapper") is a free and open source utility for network exploration and/or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.
Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.
It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and both console and graphical versions are available.
Exercise 1:
1. From a BackTrack shell, type the following (only type what's in bold):
user1@pentest:~# nmap -sP -v class_IP_range/24 > /root/ceh/ps1
Syntax breakdown:
nmap: program name
-sP: program option for ping sweep
-v: verbose mode
class_IP_range/24: replace class_IP_range with the network block to scan (e.g., 10.10.10.0/24)
> /root/ceh/ps1: redirect the output to a file called ps1 in the /root/ceh directory
2. Examine your results:
user1@pentest:~#cat /root/ceh/ps1 | less
3. In the output, look for the text “Host is up” and record these systems’ IP addresses
4. Email your results to proflheureux@gmail.com.
hi guys....this is Marie
I won't be in today, so if I missed anything huge, let me know? I fell on my front stairs last night and spent 12 hours in the hospital getting repeated cat scans, because I had a VERY nasty concussion and a head wound. If it is needed for any reason, I have the hospital paperwork. They have me on a week of anti seizure meds so I'm not feeling so hot. anti-seizure med. They suggested I spend most of today resting, so...I will be. Thanks! Sorry for the unusual approach of communication, but at least I know the message will get to the right people.
Thursday, October 6, 2011
micro expression
In case you are not familiar with this, it is being able to detect minute, FAST expression and hints in body language that help you to read a person, and the intent they have, as well as recognize trust, and lying. Works well with NLP if you have the knack.
Chapter 4 and 5 Homework
1. Get someone's workplace.
2. Get someone to stay on the train or get off the train at a different stop than they planned.
3. Get someone to buy you something. It can be a drink or food item but doesn't have to be. Try really hard not to just ASK them outright to buy you something.
4. Find out someone's commute--times, trains, car route, etc.
5. Get someone's phone number. Pretexts are helpful here.
6. Get someone's schedule tomorrow, down to the hours.
7. Follow a target for at least ten blocks in downtown Boston without the target's noticing.
8. Get someone to ask for YOUR phone number. Don't just give it to them; make them ASK.
9. Get someone to go somewhere with you where THEY WEREN'T PLANNING TO GO.
Post a comment to this post. Find a YouTube/Vimeo/etc. clip from a movie or TV show illustrating social engineering, defined as gathering information or manipulating people IN FACE-TO-FACE situations or on the phone. (No porn, please.) Identify the techniques of social engineering you see in the clip. What makes them effective? How would you use those techniques in your life?