I grabbed a batch of files from Vulnhub but a few of them did not work with Virtualbox.  Could be me or it could be the file.  Alas, you can't expect much when you're not paying so I just moved on to the next until I found one that worked.  My File Server did work but it does not have a description.  I would call this box on the easy side but there are a lot of moving parts which can cause you to follow some different directions.  I don't want to say to much so let's get at it...


    Not unlike the previous post, PowerShell Data Exfil, this is another example of how we would move data outside the network using email.  This time, we're using a simple Bash script that base64 encodes the data, calls Sendmail, and exfiltrates the data to a Gmail account.  By default, Gmail will not allow what it considers "less secure apps" to send data but a simple flip of the switch will solve that issue.  As a final point, we're obviously not confined to using Gmail, I would suggest using a provider that supports TLS rather than sending this over port 25. 


    It's been a while since I've written up a box and Vulnhub just dumped a fresh batch so here we go...

    The box description states:  "Sar is an OSCP-Like VM with the intent of gaining experience in the world of penetration testing." 

    This is a solid entry level box.  Nothing complicated and going through standard enumeration should lead to a low privilege shell and root. 


    In my talk at BSides,I brought up "attacker motivation" and I gave some possible factors such as:  political, financial, revenge, etc.  Hacking isn't necessarily for the sake of just hacking and there could be some sort of underlying motivation.  It could be that an attacker is attempting to steal data.  And in the context of showing small businesses the impact of a breach, I want to lean more towards showing the simplicity of an attack which was the point of the talk and this post.  In my talk, I didn't go through data exfiltration but I'm giving another talk this week and I will go through it with them.


    In a previous post, I wrote about GoPhish.  Since then, I've been working quite a bit with GoPhish and there are some tricks to an effective campaign that I'd like to share.  First, I'd like to point out, this is not a game where you try to win but it's also not something you want to approach like a fake Nigerian Prince.  You want to fall somewhere in the middle.  With respect to the actual campaigns, rather than come at the company all at once, I want to break the company into groups.  In this campaign, we're targeting the sales group.


    I think the idea of an Evil Captive Portal has been done to death but I heard someone talking about near-field communication (NFC) tags in the tables at a McDonald's.  The idea is that you put your phone on the table, the phone picks up the tag, and performs some action.  I honestly can't remember if it was taking them to their Twitter account or the web site but it gave me an idea.  The idea is similar to dropping a handful of malicious thumb drives in the parking lot but instead, printing business cards with some text and attaching a pre-programmed NFC tag.  You touch the phone to the card, the tag configures your phone to the Evil WiFi, and the captive portal steals your credentials or whatever.


    Page 2 of 49

    © 2020 sevenlayers.com