Friday, 24 May 2013
Linux commands for computer forensics
Here are some of linux basic command that used in computer forensics :
1. dd - command used to copy from an input file or device to an output file or device.
syntax : dd if=[source] of=[destination] bs=(optional)
2. hdparm - command to get evidence harddisk information.
syntax : hdparm [ flags ] [device]
3. sfdisk...
Thursday, 23 May 2013
Computer Forensic : unallocated space and slack space
Unalocated
space : Unallocated space, sometimes called “free space”, is logical space on a
hard drive that the operating system, e.g Windows, can write to. To put it
another way it is the opposite of “allocated” space, which is where the
operating system has already written files to. Unallocated space can contain deleted
files or partially deleted...
Computer Forensic : Introduction
Hello again, today my blog post is about Computer Forensic, one of my favourite subject in computer security world. What is Computer Forensic? Computer forensics is the application of
investigation and analysis techniques to gather and preserve evidence from a
particular computing device in a way that is suitable for presentation in a
court of law....
Monday, 20 May 2013
From web application to ID 0
How to gaining access to local system from web application? in this post i will simulate the process of gaining access using DVWA installed on Metasploitable OS as a target. i will use the one of several vulnerabilities of DVWA to penetrate the system, put the backdoor shell command, gaining root access, and doing some post exploitation activities.
--on...
Sunday, 19 May 2013
Client side attack combination using BeEF and Metasploit

Hello again, in this post i will simulate the client side attack using Beef and metasploit. client side attack is the attack performed by the client. in this simulation i am using windows xp in virtualbox and firefox browser as a target.
Here's the gameplay :
1. attacker send the link of youtube...
Wednesday, 24 April 2013
Buffer Overflow : SEH based exploit on Elecard MPEG Player

in this post i will write my steps to exploit media player application (Elecard MPEG Player) with SEH protection, and here's the steps :
1. install application in windows XP machine
2. do the information gathering about supported filetype
3. From IG i got the information : the target support...
Tuesday, 23 April 2013
Introducing SEH
SEH (Structured Exception Handling) is the protection integrated on a system of a software to handle the abnormal flow of the program that can caused the program to act abnormal too (crash, hang, etc). SEH will prevent the EIP to be overwritten directly by the excess data sent by the fuzzer. SEH will fully control the memory used by the software....
Friday, 19 April 2013
Buffer overflow : direct return exploit BisonWare FTP Server V3.5

1. open application bisonWare FTP
2. test connection with nc
3. create fuzzer script with python
import socket
import sys
import time
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
buffer = "\x41"*100
buffer+= "\r\n"
s.connect(('192.168.56.101',21))
print "Connecting...."
data = s.recv(1024)
time.sleep(3)
print...
Tuesday, 16 April 2013
Buffer overflow : find bad characters

Bad character is the characters that will make a payload failed to run because in register they change into a random character (usually become byte 20)
now I will try to find bad characters
in WarFTP application
1 run OllyDbg and attach WarFTP
application
2 generate a byte characters with
generatecode.pl...
Monday, 15 April 2013
Buffer overflow : direct return exploit warFTP application

Open and start warFTP application
test connection to warFTP
nc
192.168.56.101 21
Create fuzzer script with python :
import
sockets
= socket.socket (socket.AF_INET, socket.SOCK_STREAM)buffer
= "\x41"*1000s
. connect (('192.168.56.101',21))data
= s.recv(1024)print
("Sendingevildatavia USER...
Subscribe to:
Posts (Atom)