Chaotic Security Blog

Chaotic Security Blog

  • Picked up some details on a tool that can be used for SQL injection attacks in the module SQLmap. SQLmap is a tool that allows you to take a URL and run it through to see if it can be exploited for various types of SQL injection attacks. So if…

    Picked up some details on a tool that can be used for SQL injection attacks in the module SQLmap. SQLmap is a tool that allows you to take a URL and run it through to see if it can be exploited for various types of SQL injection attacks. So if the web portal does not properly sanitize the web inputs or form inputs. You can exploit the vulnerability in them which can cause the system tor grant access to an unauthorized party. 

    +
  • Working on the Shell Overview, as this section got into the different types of shells that can be used for exploitation. It works its way through reverse shell, bind shells, web shells, and how to set up a shell listener. It shows how you can use applications like b374k shell…

    Working on the Shell Overview, as this section got into the different types of shells that can be used for exploitation. It works its way through reverse shell, bind shells, web shells, and how to set up a shell listener. It shows how you can use applications like b374k shell to set up a reverse shell that can gain you access to a web application. From there you can attempt privilege escalation to gain more access to the web system for exploitation.

    +
  • Finished up learning a little about Hydra via the TryHackme.com site. An interesting password cracking tool. I would say I am more blue team than red but it was good to see it in action so if you see those items pop up in a web log you know that…

    Finished up learning a little about Hydra via the TryHackme.com site. An interesting password cracking tool. I would say I am more blue team than red but it was good to see it in action so if you see those items pop up in a web log you know that is being attempted.

    +
  • Working through some of the offensive tools rooms on Tryhackme.com Today learned about some the basics of the file enumeration tool Gobuster. It allow you to sus out online file repositories and even try to find exposed hidden files and folders online. Another good tool if you are doing penetration…

    Working through some of the offensive tools rooms on Tryhackme.com

    Today learned about some the basics of the file enumeration tool Gobuster. It allow you to sus out online file repositories and even try to find exposed hidden files and folders online. Another good tool if you are doing penetration testings to file out if any resource are exposed and can be exploited.

    +
  • Learned a bit about Yara today in the the Yara room on Tryhackme.com. Yara is a language that is used quite a bit in the creation of rules and data related to cyber threats. Many networking appliances such a firewalls and endpoint detection system can be configured with Yara rules…

    Learned a bit about Yara today in the the Yara room on Tryhackme.com. Yara is a language that is used quite a bit in the creation of rules and data related to cyber threats. Many networking appliances such a firewalls and endpoint detection system can be configured with Yara rules to help detect threats based on certain types of actions or changes. This make detecting attacks even faster as these rules are pre-written and can just be added to an existing setup to start detecting and blocking threat right away.

    +
  • Working through my SOC Level 1 training, I reviewed some different Threat Intelligence tools. This covered some of the Open-Source Intelligence Tools (OSINT) available on the internet, of which there are tons. You would use things like VirusTotal or AbuseIPBD to track malicious files and IP addresses daily in triage…

    Working through my SOC Level 1 training, I reviewed some different Threat Intelligence tools. This covered some of the Open-Source Intelligence Tools (OSINT) available on the internet, of which there are tons. You would use things like VirusTotal or AbuseIPBD to track malicious files and IP addresses daily in triage alerts to determine whether they are related to a malicious party. 

    +
  • Learning more about exploitation with the Web Hacking modules! These items cover more about how websites and web requests work, so they cover web request methods and response codes. They also cover how JavaScript and SQL queries work and can be exploited.  It then explains how to use Burp Suite’s…

    Learning more about exploitation with the Web Hacking modules!

    These items cover more about how websites and web requests work, so they cover web request methods and response codes. They also cover how JavaScript and SQL queries work and can be exploited. 

    It then explains how to use Burp Suite’s basic features for web request intercepts and redirects that an attacker could perform.

     

    Lastly, it goes through the OWASP TOP 10, and while this course is older (for 2021), many of the vulnerabilities are still in the top ten, like command injections and server-side request forgery. So, it’s still good to review OWASP to learn the latest exploits for web applications. 

    +
  • Working my way down, I learned about Exploitation today. This is a bit more Red Team stuff, but it is still great information as it gives you insight into tools and techniques that an attack may use.  So in this module, I learned about a well-known exploration tool, Metasploit.  Metaspolit…

    Working my way down, I learned about Exploitation today. This is a bit more Red Team stuff, but it is still great information as it gives you insight into tools and techniques that an attack may use. 

    So in this module, I learned about a well-known exploration tool, Metasploit. 

    Metaspolit is a suite of tools that allows you to explore a system in almost all types. You can use it for discovery, enumeration, built-in exploits and payloads, and more. It is a tool that is designed to allow you to penetrate systems. The tools are easy to search for, but depending on the system you are attempting to exploit, they may not always be easy to use. So it takes a bit of finesse to learn the tool, but if you do, it opens a world of possibilities.

    +
  • Continuing down the Cybersecurity 101 path, I worked on the Cryptography module over the last few days. This module discussed different types of cryptography at a basic level. It includes information about hashing and also teaches the basics of using John the Ripper to run a dictionary attack on a…

    Continuing down the Cybersecurity 101 path, I worked on the Cryptography module over the last few days. This module discussed different types of cryptography at a basic level. It includes information about hashing and also teaches the basics of using John the Ripper to run a dictionary attack on a weak password.

    +
  • After working through the many modules, I finished the Networking module for the Cybersecurity 101 learning path. There were many different things here, such as going over basic TCP/IP and the OSI model. Then it got into network traffic and network protocols like TLS and SSH. From there, it moves…

    After working through the many modules, I finished the Networking module for the Cybersecurity 101 learning path. There were many different things here, such as going over basic TCP/IP and the OSI model. Then it got into network traffic and network protocols like TLS and SSH. From there, it moves into network monitoring tools like Wireshark, which can analyze packets going across a network. It also provides the basics of using NMAP for port enumeration, service discovery, and more. It was a good review of networking items, as it has been a while since I looked at them. 

    +