Blog

Breaking into the cyber security industry

In this blog, our newest addition to the team, Rehan Bari, discusses his experiences breaking into the industry… I’m going to discuss one of the most debated topics on social media with regard to cybersecurity: Breaking into the cybersecurity industry. “There is a shortage of people in this field”. You must have heard that everywhere too, right?… Read More

Using Kibana and Packetbeat to map DNS queries

Overview: In this short post we’re going to show one visual method of mapping, and potentially identifying malicious DNS traffic within a network. We’re not going to walk through the configuration of Elastic, beats agents or Kibana and there is an assumption that UDP 53 traffic is being logged by Packetbeat on the endpoint(s). Visualisations:… Read More

An intro into abusing and identifying WMI Event Subscriptions for persistence

Overview: Windows Management Instrumentation (WMI) Event Subscriptions are one of many ways to establish persistence on a network. The technique, IDT1084 on Mitre ATT&CK, can be fairly discreet and has been used by APT29 to establish backdoors. We’re not going to dig into too much detail about WMI Event Subscriptions themselves, as some good material… Read More

Using Auditbeat and ELK to monitor GTFOBins binaries

At in.security our training courses are developed not only to provide the theory and hands-on understanding of a multitude of offensive techniques,  but with the added extra of being able to see, study and understand the attacks from a blue team perspective by viewing self-generated artefacts left within our in-LAB ELK stack. This type of… Read More

Lin.security – walkthrough

Lin.security was released a little over a month ago so as promised we have now published this detailed walkthrough. As such, this article does include spoilers! The idea of the challenge was to find and practise getting root on the host using many different methods – some are easier than others ???? If you want… Read More

Analysing CVE-2018-13417 for files, hashes and shells

CVE-2018-13417 was released this August that disclosed an out-of-band XXE vulnerability in the SSDP/UPnP functionality of the XML parsing engine in the popular Vuze Bittorrent client. The latest version, 5.7.6.0 was found to be vulnerable however it’s likely earlier versions are also affected. Exploitation of this vulnerability allows unauthenticated attackers on the same network to read arbitrary files… Read More

A cr4cking g00d time – walkthrough

Warning: This post contains spoilers! It’s been a few weeks since we released A cr4cking g00d time and we’d first like to thank everyone who gave it a go. We’ve received great feedback and are very pleased to hear that people have attained new levels of password cracking-fu in the process. Well done to @hops_ch… Read More

A cr4cking g00d time – 12 challenges. 1 cryptocurrency prize!

Edit: Well done to @hops_ch for being the first to complete and win the prize! The reason we offer a Password Audit service is because we’re passionate about ensuring our clients are adequately protecting their accounts from compromise. The varied methods that can be used to attack passwords inspired us to create a challenge, comprising multiple levels… Read More

Lin.security – practise your Linux privilege escalation foo

Here at in.security we wanted to develop a Linux virtual machine that is based, at the time of writing, on an up-to-date Ubuntu distro (18.04 LTS), but suffers from a number of vulnerabilities that allow a user to escalate to root on the box. This has been designed to help understand how certain built-in applications… Read More

In.security has landed!

It’s official, we’re live! As this is our first post under the guise of in.security let’s make some introductions. Both Will (@stealthsploit) and I (@rebootuser) have been working in IT and information security over the past decade or so and have been in a number of different roles, including systems administration, digital forensics, penetration testing,… Read More