Skip to content

Latest commit

 

History

History
551 lines (431 loc) · 43.7 KB

july.md

File metadata and controls

551 lines (431 loc) · 43.7 KB

Update** 2020 blog continues here

Captain's Log, stardate 3E2252

For few years I have been interested in cybersecurity, but lately I decided to go more into the reverse engineering and malware analysis. I am trying to follow how to learn anything of Josh Kaufman. During my late night youtube zapping, I found this video from the DEFCON18 with the title My life as spyware developer.

The journal is based on the idea of gamification, the contenent is serious, but I am not. At the end of each day I have a treasure chest where I add all the links I do believe interesting like when you play MMORPG.(for the horde!!) The content of the chest is usually related to security, but not fit in the scope of this journal. But beware that this journal or any other of my journals should be considered as a guide of any sort (maybe spiritual if you really need it) .

Fast links to my notes:

07/04/2018 - THE BEGINNING

07/05/2018 - SEEMS A SLOW DAY

07/06/2018 - DOUBLING DOWN ON THINGS DONE FOR THE DAY

Some extra fun for the day:

07/07/2018 - VERY THEORETICAL DAY INIT

Currently watching more videos about the foundamentals rather than straight into the malware analysis courses. I want to become pretty good with gdb.

NEW material found!

07/08/2018 - VM PROBLEMS ARE IN THE AIR

The biggest problem now is the VM and the computer, I don't have a computer capable of running a VM in a smooth way and still having problem with virtualbox.

small project of the day

07/09/2018 - JUMPING THE FENCE, C HERE I COME

Today I focus more on programming in C after watching couple of videos that inspired me. I am currently working on a small crack.me program to give to my good friend to test him and test me.

07/10/2018 - THEORY DAY 02 STRIKE BACK

Yesterday I finished the crackme program, with some finishing touch.

07/11/2018 - MADNESS FROM THE CABLES(LESS)

Start with the CYBRARY videos about malware analysis.

notes:

  • autoconfig VM to automatize installing of softwares and config

07/12/2018 - NO SERIOUSLY WHAT I DID TODAY?!?

Keep going with malware analysis course. And setting up the 2 VM.

  • Thinking about to opening a hackLab on my boat, it is the most Dutch thing i can think of.
    • Retrieve my old computer
    • Find people to join it

07/13/2018 - WHOOO PRODUCTIVE DAY I FEEL IT!

The issue are not resolved yet, seems quite hard to find clear material how to do it. Even if it is pretty simple in theory seems not so much in practice, I assume the number of multiple configuration provide a certain degree of variability among all the possible solutions to this challenge. So, currently I did not have time to continue with the microcontroller CTF game or anything else. :(


Now I need to simulate the internet services with Inetsim a current problem is inetsim does not render any page, so I am not sure it is working properly.

Line added to the config file:

  service_bind_address <ip linux machine>
  dns_default_ip <ip linux machine>

treasures of the day aaar!

7/14/2018 - Saturday be like!

treasures of the day aaar!

7/15/2018 - Sunday!

fpsense is up and running in the VM, I used these videos:

Time for an IDS .... Setting up Snort On pfsense

treasures of the day aaar!

Keyword of the day: OSINT.

7/16/2018 - Monday back to MWA.

After a small deviation in networking and VM, today I back on MWA, I am going to rewatch watch what I think so are the 2 most important series of videos I found in this journey so far:

In this week I wondered around the topic, setup the VM and got to know the tools now, It's time to take some serious notes about reversing engineering too. So, here my reverse engineering notes.

This video is in my x86_64 journal, but I do believe I really need to watch it again.

Today I have lootted so many links!!!

treasures of the day aaar!

7/17/2018 - Tuesday chill.

Keep working on the basics reverse engineering notes.

Basic linux tools:

  • gdb
  • objdump objdump -d -M intel <input file name> > dump.asm
  • file file a.out
  • strings strings | grep somethng

P.e.d.a

Installation

git clone https://github.com/longld/peda.git ~/peda
echo "source ~/peda/peda.py" >> ~/.gdbinit

treasures of the day aaar!

7/17/2018 - Into the byte.

treasures of the day aaar!

7/18/2018 - ELFs are dorky, Elves are cool

It's 1:21 in the morning and my cup is filled with warm coffee. Let's start the day with Boxstarter, that it is actually something I was looking for and I randomly found it, because I checked the an address on the page of Flare VM. This is what is actually is:
Repeatable, reboot resilient windows environment installations made easy using Chocolatey packages. When its time to repave either bare metal or virtualized instances, locally or on a remote machine, Boxstarter can automate both trivial and highly complex installations. You can use Boxstarter to install a complete environment or install a small set of tools and windows settings with absolutely no software pre installed and configuration scripts stored in a gist.

Sometime later on tonight ... I found this book "PoC or GTFO By Manul Laphroaig", it is a strange book, it is technical, but feel different from the rest, I felt more like I found a dusty book forgotten in a corner of some library. hackaday.com calls it a bible. "For the last few years, Pastor Manul Laphroaig and friends have been publishing the International Journal of PoC || GTFO. This is a collection of papers and exploits, submitted to the Tract Association of PoC || GTFO, each of which demonstrates an interesting exploit, technique, or software toy in the field of electronics. Imagine, if 2600 or Dr. Dobb’s Journal were a professional academic publication. Add some whiskey and you have PoC || GTFO."
But if you do not want to spend 30$ the journal entries are publically available to be read online here: International Journal of Proof-of-Concept or Get The Fuck Out (PoC||GTFO or PoC or GTFO) or buy the bible
But let's rollback a second,before I found that book because I was watching Finding a Parser Differential in loading ELF. Basically the idea is flipping a bit you might confuse the debugger/disassembler to not recognize the file,but it does not always work.

  • find more material on Parser Differential (Me the next morning: check for fuzzing old me)

After few (interstellar) jumps I came to the conclusion that I need to understand better what is fuzzing.
What is fuzzing? Acrroding to Urban dictionary ... I am confused ...
  • Fuzzing verb. Fuzzing is caused by the lack of blood flow in a particular area thereby producing a vibrating sensation. Fuzzing is most common on the face and hands and may cause light-headiness. Common causes of Fuzzing may be alcohol, a weed-induced high or a rush of adrenaline.

mmm, Urban dictionary might be not a techinical source of information ... , noted.
So, I searched a little bit more, and I found this explanation

  • Fuzzing is a powerful strategy to find bugs in software. The idea is quite simple: Generate a large number of randomly malformed inputs for a software to parse and see what happens. If the program crashes then something is likely wrong. While fuzzing is a well-known strategy, it is surprisingly easy to find bugs, often with security implications, in widely used software. Memory access errors are the errors most likely to be exposed when fuzzing software that is written in C/C++. While they differ in the details (stack overflow, heap overflow, use after free, ...), the core problem is often the same: A software reads or writes to wrong memory locations.

Then, I found this tutorial Tutorial - Beginner's Guide to Fuzzing and of course could not miss the awesome fuzzy list, there is an awesome list for anything. The material is really a lot online, even a nice coursera video. But, because I do prefer short guide here a 15 minute guide to fuzzing

But the best part of tonight was here to come, while I was searching fuzzing a totally random journal came to my attention.
So, I digged a little bit and here is what I found out:
The Gentleman's Magazine was founded in London, England, by Edward Cave in January 1731. It ran uninterrupted for almost 200 years, until 1922.
And the piece of that journal that came to my attention date Dec 31, 1737 Publisher F. Jefferies. This is what I call net-treasure hunting.

Almost 3:00 AM, time almost to go to bed after reading the 15 min guide to fuzzing. ( I hope it takes less)
4:30 in the afternoon, my brain is still tired from last night, today I am going to focus on reading the first article


  Who said: Two vast and handwritten parsers
  Live in the wild. Near them, in the dark
  Half sunk, a shattering exploit lies, whose frown,
  And wrinkled lip, and sneer of cold command,
  Tell that its sculptor well those papers read
  Which yet survive, stamped on these lifeless things,
  The hand that mocked them and the student that fed:
  And on the terminal these words appear:
  "My name is Turing, wrecker of proofs:
  Parse this unambigously, ye machine, and despair!"
  Nothing besides is possible. Round the decay
  Of that colossal wreck, boundless and bare
  The lone and level root shells fork away.
    -- Inspired by Edward Shelley 

treasures of the day aaar!

7-20-2018 Friday


In these two days I focused on fuzzing and the theory of differential debugging. Few points that I want to focus on is static analysis and to do that I want to read the assembly64 book.

  • need to find some project to play with the syscall in python and in C

TODO: - start to read this[this book ](http://www.egr.unlv.edu/~ed/assembly64.pdf) this evening - read [this tutorial about fuzzing](https://fuzzing-project.org/tutorial1.html) this afternoon - watch the next video of the serie of liveoverflow

Extra material:


Because my license of Vmware pro is about to end, I need to migrate to virtualBox, so today I had to watch [this video](https://www.youtube.com/watch?v=D2wjR3pCwrU) to configure virtualBox with pfsense and windows. Another important point is that I want to have a solid configuration, and know how to move around installing and reinstalling at will without problems. So, I am focusing on what I is the basics of having a malwarelab and it is to have an enviroment that you can mess up millions times and in few click start again.

7-21-2018 Saturaday

I just realized I wrote three differen guides on pfsense:

7-23-2018 After the accident

Unfortunately I had a minor accident and I could standup from the bed, but today I am back.


I am currently exploring new technologies and opensource projects: I am very excited about XIA, because it was something I was thinking about the importance of developing a new network protocol to replace TCP/IP. And then at 3AM in a total random search on google I found this:
Finding the successor of TCP/IP is the ultimate goal of our project. To do so, we have developed a new protocol stack, XIA. To reach this destination, we are both refining our codebase and working to meet unfulfilled demands of real-world networks. For example, our current short-term goal is to develop a DDoS protection system.

I am really want to try to cooperate or to play with XIA and see what is it, what can be done, and what I can help with.

XIA-Linux

Because I was already there I checked other opensource projects and I was super excited to find this projects too, very close to my interests as well.

The Honeynet Project

Other interesting projects found there to follow up.

Other Opensource projects

The Captain's treasure chest "Arrr!"

7/24/2018 - Tuesday chill.

The Captain's treasure chest "Arrr!"

7/25/2018 - Carbon Black Training - CB Response Advanced Analyst

Today I will be busy almost all day long due to an online training.

08/11/2018

Few new links, Complete Ethical Hacking Course on youtube and Metasploit For Beginners and How to Create Your First Exploi

11/11/2018

There is this awesome guide about Poweliks is an evasive click-fraud trojan that uses several interesting evasion techniques. It contains both multiple stages and programming languages, and heavily influenced other evasive malware families, such as kovter

16/11/2018

Amazing video Malware Analysis VM Setup Tutorial and amazing channel OALabs.

20/11/2018 Winter is coming

To see the memory layout of a process in linux:

ps -aux | grep <name of program> 
cat /proc/<pid>/maps

21/11/2018



The Captain's treasure chest "Arrr!"

Tools:

Disassembler

Debugger

Scanners

Frameworks

VMs:

Malware analysis/Reverse engineering courses:

From Napier university few courses of the professor Bill Buchanan

Pluralsight courses

Webpage:

Repositories:

Blogs:

Youtube channels:

Dump:

Papers:

Articles:

Guides: