Cybersecurity Solutions and Support Services

    "Gophish is a powerful, open-source phishing framework that makes it easy to test your organization's exposure to phishing."

    Depending on where you look, and what they are trying to sell you, the percentage of attacks from phishing range from 30% - 90%.  The Verizon Data Breach Investigations Report shows the percentage dropped in 2019 from 2018 by about 40%.  Regardless, phishing is still an easy and viable attack vector.  I can send phishing emails over and over again and the recipient only needs to make a mistake once.  It's simple and it's effective.

    For phishing awareness training, there are pay services, there are services that offer phishing as a secondary feature -- like Duo, and there are free products like GoPhish.  Not only can you use phishing awareness tools test phishing, you can also use them as a tripwire of sorts -- more on that at the end of this post. 

    I gave a talk at a local hacker meetup this past weekend.  My talk was a combination of LLMNR and NetBIOS Poisoning, Responder, and the Responder Monitor decoy in Mazerunner.  A lot of what is in the presentation is already posted here but I think it would be helpful to have an aggregate, in the form of a presentation, to put it all together.  The key points are:  What is Responder?  How the attack works.  Possible defensive measures.  Reality.  And finally, How Mazerunner can help identify the attacker.

    Disclosure date: 10/24/19


    Restaurant Management System 1.0 is affected by a cross site scripting vulnerability that can be leveraged for session hijacking.  An attacker can exploit the XSS vulnerability, retrieve the session cookie from the administrator login, and take over the administrator account.  This vulnerability can be exploited with an authenticated and an unauthenticated account.

    While performing registry queries for something not exactly related, I saw an application on my personal machine with an unquoted service path.  Since this is a commonly used application, I've contacted the developer and I've submitted the CVE to secure an ID -- that whole "responsible disclosure" thing.  Seriously though, this isn't an obscure application and I would go so far as to say it's heavily used.  The mitigation technique would be to quote the path but that's something the average user wouldn't be capable of doing.  So while we wait, I'll explain the problem in detail.

    © 2020