2009 Geek Christmas List
What’s on your list? Here is mine (in no particular order): Number 1: iPhone compatible alarm clock with good sound Number 2: iPhone car mount that charges and is compatible with aux cables 32GB...
View ArticleMetasploit with Ruby 1.9.1
UPDATE: if you don’t make some additional steps, the ‘rvm 1.9.1’ command only is active for the current console session. See the site for details: http://rvm.beginrescueend.com/ This short tutorial is...
View ArticleMeterpreter tunneling and VNC revamped
So yesterday (December 14th, 2009) HD Moore posted a tweet with a pic of the new VNC meterpreter script that he wrote: Looking at the script I noticed that it created a new connection (two connections...
View ArticleLinked in to Twitter
If you hadn’t noticed, LinkedIn has started allowing you to link your Twitter account to your LinkedIn account. So, I didn’t know this (since I opted out), but apparently LinkedIn will kick your status...
View Articlegrmn00bs podcast
I was recently on the grmn00bs podcast, I had a great time, and I can’t wait to see who they pick up next on their series: grmn00bs podcast: episode 9 Update Archive.org Link“When they were n00bs...
View ArticleSecurity (CAN BE) an ART not a SCIENCE
This is far from a new idea, however it’s not something that is easily provable. So I had an idea this morning. I posed the following question on Twitter: You know what I got in return? a resounding...
View Article@RSnake ’s RFI List in Burp Suite
First of all, get Robert @RSnake Hansen’s RFI list here: http://ha.ckers.org/blog/20100129/large-list-of-rfis-1000/ it’s a great list, but as soon as I saw it, I was like.. hmm.. how can I use that?...
View ArticlePractical Exploitation
Practical Exploitation is going to be me, explaining things in the way that I see the world on the best medium for what I’m explaining, be it a short blog blurb, a video of me, a video of a desktop, or...
View ArticleMetasploit Cyberwarfare
I’m not sure I will want to svn up tomorrow. This Cyberwarfare version has advanced powers:
View ArticleVuln Disclosure Summarized
I have an admittedly limited view of the exploit dev world. However, from what I’ve seen devs have very few options: (Please correct me if I’m wrong) Responsible Disclosure Direct Contact =>...
View Article0Exploit Privilege Escalation
The other day Chris Gates posted an excellent blog post about the WebDAV hotness that Chris Sullo (author of Nikto) cooked up (DAVTest) which Ryan Linn popped out a Metasploit module for. Anyways, the...
View ArticleA very important link...
Normally I save links for my “Mubix Links” blog to keep the clutter down on this one, but I think this is one that I would like to highlight as important. The NFO, credits and summary to this...
View ArticleAV bypass made stupid
*WARNING* if you use fgdump like I did, it extracts pwdump to %TEMP% at run time, which is detected by AV. First of all, I was floored when this worked. Really AV? It’s that easy? Really? So here is...
View ArticleGet off my lawn! iPhone Geo Blocking
I was recently approached by savant, who told me that a bunch of my Twitpics had geo location in them. Larry Pesce from PaulDotCom has been doing research in this field for a while and each time he...
View ArticleSet Wallpaper Meterpreter Script
Certainly nothing to fuss over, but I’ve had a fascination with setting my target’s wallpaper as sort of a calling card for years now. I’ve been able to set the registry key (HKCUControl...
View ArticleIntro to RailGun: WIN API for Meterpreter
Back on June 13th, “Patrick HVE” released RAILGUN: http://mail.metasploit.com/pipermail/framework/2010-June/006382.html And it was merged into the the Metasploit trunk with 9709, 9710, 9711 and 9712:...
View ArticleResources for railgun development
Metasploit’s Railgun is awesome, but getting things to work correctly can be a pain. Here are some of the resources that have helped me out: System Error Codes.aspx”) - This is hands down the best...
View ArticleAV Tracker
Ever set up a multi/handler and get an odd IP hitting it? Probably forgot about it as internet chatter? Think again, you might have just been caught AV Tracker - http://avtracker.info/ is a site that...
View ArticleJailbreak SSH horrors strike back
Back in 2009 the “ikee” rick-rolling worm went around the iPhone world via the password of ‘alpine’ on the root account. You are now warned to change your root password when you pop into Cydia and Rock...
View ArticleMetasploit turns 10,000
Ask any developer and they will tell you that the age of a project is not calculated in calendar time, but in worker hours or “commits” to a project. The Metasploit Framework hit 10,000 today. With the...
View Article