218 Followers
461 Following
381 Posts
IT security. Linux & network protocols. Pentesting web applications, networks & AD infrastructures. Mostly technical stuff here.
Bloghttps://emanuelduss.ch
GitHubhttps://github.com/emanuelduss

This is probably the easiest way to perform reverse DNS lookups over IP address ranges using the built-in tool getent and bash brace expansion:

getent hosts 130.59.{20,31}.{0..255}

Useful if you are on a system/container with limited tools.

#pentest #dns #linux

Cool #38c3 talk about bypassing #BitLocker in TPM only mode. A downgrade attack allows you to exploit "bitpixie" again.

https://media.ccc.de/v/38c3-windows-bitlocker-screwed-without-a-screwdriver

PXE Boot → boot downgraded/vulnerable #Windows boot loader → decrypt disk using TPM → reboot → key stays in memory → boot Linux → read key

#pentest

Windows BitLocker: Screwed without a Screwdriver

Ever wondered how Cellebrite and law enforcement gain access to encrypted devices without knowing the password? In this talk, we’ll demon...

media.ccc.de
Very cool new Wireshark @wireshark feature "TLS Keylog Launcher" (1) can automatically set the SSLKEYLOGFILE environment variable (2), start an application/browser (3) and directly decrypt the data (4) so you can see the cleartext (5) of TLS connections. No need to manually configure the environment/file anymore. #wireshark #tls #encryption #network #security
Simple and easy lateral movement technique targeting SSH: If you are root on a system, you can read the username and password when someone performs a login and use these credentials on other systems (when the same password for local accounts is reused or when LDAP/AD authentication is used). 😀​ #infosec #pentest #ssh #openssh #redteam

Easy way to find SSH agent sockets on a system:

$ sudo cat /proc/*/environ | grep -Ehaoz "SSH_AUTH_SOCK=.+" 2>/dev/null | tr '\0' '\n' | sort -u

BTW this is one of the rare cases where the useless usage of cat | grep is legit ;-)

Nice: ssh-keyscan from OpenSSH 9.1 now supports CIDR network ranges:

Interesting: socat can listen on two ports (1). First, it listens on the first provided port (2), where you can connect to (3). Then it listens on the second provided port (4), where you also can connect to (5). You can then send data between these clients, e.g.from the first client (6) to the second client (7) or vice versa.

The same works via TLS, UDP, IPv6, Unix Sockets, etc.

This can be useful if you want to connect two clients which can't talk to each other directly via another external accessible system.

#socat #networking #pentesting