NETMUX NETMUX is engineering next-generation security practices by protecting organizations through penetration testing, vulnerability management, compliance, and risk assessment analysis. https://www.netmux.com/ Operator Notes Wed, 04 Jan 2023 19:40:07 -0800 https://www.netmux.com/blog/operator-notes-1 https://www.netmux.com/blog/operator-notes-1 <p><strong>Welcome to Operator Notes</strong>: the periodic newsletter that delivers the latest techniques, tools, detections, and resources for the cybersecurity operator distilled into copyable cheat sheets.</p><p style="text-align: center; font-size: 18px;"><span style="color: #444444;">👇 </span><span style="color: #444444;"><strong>Subscribe to Operator Notes newsletter and updates</strong></span><span style="color: #444444;"> 👇</span></p><h2 style="text-align: center; font-size: 25px;"><span style="color: #000000;"><strong>RED</strong></span></h2><p><span style="color: #000000;"><strong>Nuclei by Project Discovery</strong></span>&nbsp;</p><p style="text-align: start; font-size: 100%;"><span style="color: #160404;">Nuclei is a tool that allows users to send requests to targets based on a template, in order to perform fast scans on a large number of hosts. It supports a range of protocols, including TCP, DNS, HTTP, SSL, and Whois, as well as specialized protocols like Websockets and Headless. Its templating system allows it to be used for a wide variety of security checks, and it is designed to produce zero false positives.</span></p><p>INSTALL</p><p><span style="color: #160404;">#git clone https://github.com/projectdiscovery/nuclei.git</span></p><p><span style="color: #160404;">#brew install nuclei</span></p><p><span style="color: #160404;">#git clone https://github.com/projectdiscovery/nuclei-templates.git</span></p><p><span style="color: #160404;">#git clone https://github.com/projectdiscovery/uncover</span></p><p><span style="color: #160404;">#git clone https://github.com/projectdiscovery/httpx</span></p><p><span style="color: #160404;">#git clone https://github.com/projectdiscovery/subfinder</span></p><p>>Scan single target</p><p><strong>#nuclei -u https://netmux.com</strong></p><p>>Scanning multiple targets contained with a URL text file</p><p><strong>#nuclei -l urls.txt</strong></p><p>>Cat out targets list from file into nuclei and use the templates in...<a href=https://www.netmux.com/blog/operator-notes-1>Read More</a> Beacon and the Recipe Bamboozle Sun, 05 Jun 2022 19:14:37 -0700 https://www.netmux.com/blog/beacon-and-the-recipe-bamboozle https://www.netmux.com/blog/beacon-and-the-recipe-bamboozle <p style="font-size: 24px;"><strong>TL;DR</strong></p><ul><li style="font-size: inherit;"><a href="https://amazon.com/dp/B0B2TVLWWD" data-type="web" target="_blank"><strong>Beacon and the Recipe Bamboozle: Available on Amazon now</strong></a><strong> :)</strong></li><li style="font-size: inherit;"><strong>Beacon (unicorn) and Bot (sidekick)</strong> are good hackers. When someone steals a secret cupcake recipe from their favorite bakery, the duo decides to help the baker get the recipe back.</li><li style="font-size: inherit;"><strong>All launch proceeds going to charity to support Rural Tech Fund (</strong><a href="https://twitter.com/RuralTechFund" data-type="web" target="_blank"><strong>@</strong></a><a href="https://twitter.com/RuralTechFund" data-type="web" target="_blank">RuralTechFund</a> & <a href="https://ruraltechfund.org/" data-type="web" target="_blank">WWW</a>)</li></ul><p style="font-size: 24px;"><strong>Why a kid's book?</strong></p><p style="font-size: 100%;"> I have two little girls (maybe one-day future digital warriors;) and I read A LOT of books to them. I was searching for fun picture books that could lightly introduce them to cybersecurity topics and thinking about the digital world they will inherit. I also personally wanted them to relate to Daddy's job in cybersecurity. As my 4 year old described my job to someone recently, "He types on a computer and eats snacks all day." The thought of sitting with them reading a fun cybersecurity caper before bed, then looking at me affirming that is Daddy's job, had me hooked.</p><p style="font-size: 100%;"><span style="display: inline-block">&nbsp;</span></p><p style="text-align: center; font-size: 100%;"><em>**Actual imitation by my daughter of me working :)</em></p><p style="text-align: left; font-size: 100%;">I scoured Amazon and the local bookstores for weeks, and honestly could not find any that touched on current topics, such as daily E-Crime & APT readings. Cybersecurity can be a pretty dull...<a href=https://www.netmux.com/blog/beacon-and-the-recipe-bamboozle>Read More</a> OPERATOR HANDBOOK Thu, 19 Mar 2020 18:05:35 -0700 https://www.netmux.com/blog/operator-handbook https://www.netmux.com/blog/operator-handbook <h3><p><strong>TL;DR</strong></p></h3><p>+ Red Team, OSINT, Blue Team Reference most common tools & techniques.</p><p>+ 100+ Cheat Sheets & References ranging all three disciplines.</p><p>+ All launch proceeds go directly to charity.</p><p>+ References are in A-Z alphabetical order for ease of use/recall.</p><p>+ Operator = Red Team, OSINT, & Blue Team practitioners.</p><p>+ Available on Amazon Paperback <a target="_blank" href="https://smile.amazon.com/dp/B085RR67H5"><HERE></a> </p><h3><p><strong>Intro</strong></p></h3><p>The <a target="_blank" href="https://smile.amazon.com/dp/B085RR67H5">Operator Handbook</a> has been an ongoing project for me for over two years of nights and weekends when I get 3 hours to myself from 9pm - 12am. It came about because I saw the age some manuals had begun to show, the lack of coverage for macOS, and folks are still carrying various other manuals. Additionally, the burgeoning discipline of OSINT became critical to everyday workflow and various curiosities.</p><p>Why should the three disciplines (Red Team, OSINT, Blue Team) always be divided? As team members we are pushed further to explore and apply more skills to perform our jobs with increased lethality. This "Operator" culture should mean a well-rounded team member, no matter the "Team" you represent. <strong><u>We are ALL Operators</u></strong>. Blue should see and understand Red tactics, Red should foster the collaborative nature with Blue, and OSINT should continually work to peel back identities of evil doers spread across the digital landscape. This is a big <strong>reason the book is Yellow</strong>. I didn't want this book to look like "<em>Oh it's only for Red/Blue Team because it has a red/blue logo with black background</em>". Knowing this is a field where we should all share in success and lessons learned without the artificial separation. Black & Yellow is that perfect neutral between all the sides.</p><h3><p><strong>What's Inside?</strong></p></h3><p>In the...<a href=https://www.netmux.com/blog/operator-handbook>Read More</a> GreyNoise Cheat Sheet Tue, 31 Dec 2019 17:43:42 -0800 https://www.netmux.com/blog/greynoise-cheat-sheet https://www.netmux.com/blog/greynoise-cheat-sheet <p><a target="_blank" href="https://greynoise.io/"><strong>GreyNoise</strong></a> - collects and analyzes untargeted, widespread, and opportunistic scan and attack activity that reaches every server directly connected to the Internet. Mass scanners (such as Shodan and Censys), search engines, bots, worms, and crawlers generate logs and events omnidirectionally on every IP address in the IPv4 space. GreyNoise gives you the ability to filter this useless noise out. GreyNoise Query Language (GNQL) provides a structure syntax language to methodically query and refine your search parameters. Lastly, <a target="_blank" href="https://viz.greynoise.io/signup/">accounts for GreyNoise are FREE</a> for personal use and offers amazing data possibilities at your disposal. Consider upgrading to the Enterprise license for large bulk queries.</p><p>**Python CLI & WEB UI Available</p><p>REFERENCE:</p><p><a target="_blank" href="https://viz.greynoise.io/cheat-sheet/queries">https://viz.greynoise.io/cheat-sheet/queries</a></p><p><a target="_blank" href="https://viz.greynoise.io/cheat-sheet/examples">https://viz.greynoise.io/cheat-sheet/examples</a></p><p><a target="_blank" href="https://github.com/GreyNoise-Intelligence/pygreynoise">https://github.com/GreyNoise-Intelligence/pygreynoise</a></p><h3><p style="text-align: center;"><strong>GREYNOISE CLI</strong></p></h3><p><a target="_blank" href="https://github.com/GreyNoise-Intelligence/pygreynoise">https://github.com/GreyNoise-Intelligence/pygreynoise</a></p><p>Install the library:</p><p><strong>pip install greynoise </strong></p><p>or</p><p><strong>python setup.py install</strong></p><p>Save your configuration:</p><p><strong>greynoise setup --api-key <your-API-key></strong></p><p>Upgrade current install:</p><p><strong>pip3 install greynoise --upgrade</strong></p><p>#CLI COMMAND OPTIONS</p><p><strong>query</strong> - Run a GNQL structured query.</p><p><strong>account</strong> - View information about your GreyNoise...<a href=https://www.netmux.com/blog/greynoise-cheat-sheet>Read More</a> Th3 L@s7 0f u$ Wed, 28 Aug 2019 14:29:29 -0700 https://www.netmux.com/blog/survivor-password-hashes https://www.netmux.com/blog/survivor-password-hashes <h3><p>Survivor hashes</p></h3><p>What makes a password hash survive for years after a leak and remain uncracked? Despite some website breaches happening nearly 4 years ago, and scores of cracking hobbyist working the <a target="_blank" href="https://hashes.org/">Hashes.org</a> dataset, <strong><em>1,708,665 MD5</em></strong> hashes across many sources remained uncracked. I thought there must be something new to discover that could yield additional knowledge of what makes a strong user-generated password. So i fired up the "<a target="_blank" href="https://www.netmux.com/blog/how-to-build-a-password-cracking-rig">budget cracking rig</a>" and "<a target="_blank" href="https://www.netmux.com/blog/portable-cracking-rig">pentester rig</a>" for a little over two months to find out. They would both run continuously for this time period iterating over different attacks, sifting the found passwords, and begin the process again. All told <em><strong>75,971 were cracked</strong></em> from the original 1,708,665 MD5 hashes hosted on Hashes.org. It's worth noting some analysis of the results may be skewed due to regional language of the dataset and the site from which they originated. FYI, I didn't find the equivalent of the lost city of Atlantis in the newly cracked passwords ;)</p><p>TL;DR</p><ul><li>Github with masks and statistics <a target="_blank" href="https://github.com/netmux/survivor-hashes"><HERE></a></li><li>Unique words, letter combinations, and length contributed to password resilience  </li><li>Results indicated Eastern country origin</li></ul><h3><p>Methodology</p></h3><p>The cracking methodology used for this experiment was to modify Larry Spohn's <a target="_blank" href="https://github.com/trustedsec/hate_crack">Hate Crack</a> (pretty awesome check it out) Hashcat wrapper script. Modifications allowed for Hashcat to perform a series of attacks, each series lasting for 24 hours.</p><p><strong>ATTACK #1 - Purple Rain Attack</strong><br>In an attempt to find...<a href=https://www.netmux.com/blog/survivor-password-hashes>Read More</a> Blue Team Planner Thu, 30 May 2019 07:19:58 -0700 https://www.netmux.com/blog/blue-team-planner https://www.netmux.com/blog/blue-team-planner <h3><p>TL;DR</p></h3><ul><li><a target="_blank" href="https://www.amazon.com/Blue-Team-Planner-Black/dp/1098940180"><b>Blue Team Planner</b></a> aids in threat hunt and incident tracking & documentation.</li><li>Six-page custom, concise Investigation Templates for each event.</li><li>Bullet & Graph paper provided for freeform note taking. </li><li>Available in two colors <a target="_blank" href="https://www.amazon.com/dp/1098940180">(Black & Blue)</a> or coming soon <a target="_blank" href="https://www.amazon.com/dp/1098940180">(Blue & Black)</a> .</li><li>186 total pages contained within the planner.</li><li>Send feedback or enhancements to <strong><a target="_blank" href="https://twitter.com/netmux">@netmux</a></strong> on Twitter.</li></ul><h3><p><b>Incident Tracking</b></p></h3><p>When responding to a breach, or formalizing a threat hunt strategy, note taking is of crucial importance when coordinating with other responders. Whether the meetings are in-person or over a conference call, its vital to record concise, accurate notes about the incident or TTPs. What I kept noticing was my notebooks would constantly fill up with the same bullet points and feedback needlessly recording the same responses: IR, Data Leak, WebApp, Details Points of Contact (POCs), Status, Logs, Indicators, Systems, Objectives, Tasks... it was killing my time to focus during a meeting, not to mention all the dead whitespace. So I challenged myself to condense this recordkeeping into manageable sections that also allowed flexibility for recording investigation requirements and track the progress of the various objectives and tasks. This iterative process morphed into the <a target="_blank" href="https://www.amazon.com/Blue-Team-Planner-Black/dp/1098940180"><b>Blue Team Planner</b></a> and it's simplistic style can very nearly record an entire investigations lifecycle in only six small pages.</p><h3><p><strong>Investigation Template</strong></p></h3><p>The six-page, structured...<a href=https://www.netmux.com/blog/blue-team-planner>Read More</a> Hash Crack v3 Fri, 01 Feb 2019 11:36:03 -0800 https://www.netmux.com/blog/hash-crack-v3 https://www.netmux.com/blog/hash-crack-v3 <h3><p><a target="_blank" href="https://www.amazon.com/gp/product/1793458618"><strong>Hash Crack v3</strong></a></p></h3><p>It's been over a year since Hash Crack v2 came out and a refresh with some additions were needed. Previous versions of Hash Crack have all tried to build on the foundation of password analysis and cracking tools functionality, but the recent feedback has been on <em><strong>"How do you obtain hashes to crack in the first place?"</strong></em>. In the latest <a target="_blank" href="https://www.amazon.com/gp/product/1793458618">Hash Crack v3</a> the "Extract Hashes" chapter has seen a extensive additions to capturing, extracting, and enumerating hashes from all manner of targets. There is a section devoted toward DevOps tools, Cloud Infrastructure, Virtual Machines, Network Hashes, Hash Leakage, and many more topics (full list below). Many of these techniques have been used extensively in Red Team engagements with near flawless success, and has made the difference between Low-level access turned into Domain Admin in less than a couple of hours. This latest addition adds <strong>28% new material</strong> and updates all of the cracking tools to the most recent versions as of its release date.</p><h3><p><strong>Updated Material</strong></p></h3><p><strong>EXTRACT HASHES</strong></p><ul><li><p>WINDOWS LOCAL PASSWORD HASHES</p></li><li><p>WINDOWS DOMAIN PASSWORD HASHES</p></li><li><p>*NIX PASSWORD HASHES</p></li><li><p>MacOS / OSX LOCAL PASSWORD HASHES</p></li><li><p>FREEIPA LDAP HASHES</p></li><li><p>PCAP & WIRELESS</p></li><li><p>NETWORK HASHES</p></li><li><p>FULL DISC ENCRYPTION</p></li><li><p>VIRTUAL MACHINES</p></li><li><p>DEVOPS</p></li><li><p>CLOUD SERVICES</p></li><li><p>NetNTLMv1/v2 HASH LEAKS</p></li><li><p>DATABASE HASH EXTRACTION</p></li><li><p>LOCKED WINDOWS MACHINE</p></li><li><p>MISCELLANEOUS HASH EXTRACTION</p></li></ul><p><b>OTHER UPDATES & ADDITIONS</b></p><ul><li>Hashcat 5.1 with more BRAIN</li><li>Historical GPU Cracking...<a href=https://www.netmux.com/blog/hash-crack-v3>Read More</a> Random Password Cheat Sheet Tue, 29 Jan 2019 15:17:59 -0800 https://www.netmux.com/blog/random-password-cheat-sheet https://www.netmux.com/blog/random-password-cheat-sheet <h3><p style="text-align: center; font-size: 130%;"><u><strong>ONE-LINER</strong></u></p></h3><h3><p style="text-align: center;">LINUX/MacOS</p></h3><p style="font-size: 130%;"># <strong>openssl rand -base64 20</strong><br>Example) YnKFUmVPYzQDrK3QT5NZ0Wh51kMBaXw=</p><p style="font-size: 130%;"># <strong>pwgen 10</strong><br>Example) giepahl3Oy</p><p style="font-size: 130%;"># <strong>gpg --gen-random --armor 1 14</strong> </p><p style="font-size: 130%;">Example) 1Hs0a5BYKlcRY0wvPy8=</p><p style="font-size: 130%;">#<strong> uuidgen | tr -d '\n'</strong></p><p style="font-size: 130%;">Example) 9C3CF72D-175D-41D6-ADC1-173D784CFBD7</p><h3><p style="text-align: center;">WINDOWS</p></h3><p style="font-size: 130%;">PS> <strong>$Password = ([char[]]([char]33..[char]95) + ([char[]]([char]97..[char]126)) + 0..9 | sort {Get- Random})[0..8] -join ''</strong><br>Example) Fj-Rs!4p2z</p><p style="font-size: 130%;">PS><strong> dir C:\Windows\*.* | Get-Random | Get-FileHash -Algorithm SHA1</strong></p><p style="font-size: 130%;">Example) 819AABA1653415766D4A6B0F5F89833F4E40AA27</p><h3><p style="text-align: center; font-size: 130%;"><u><strong>SCRIPTABLE</strong></u></p></h3><h3><p style="text-align: center;">LINUX/MacOS</p></h3><p>@Echo Off<br>Set /A Rnd=%Random%<br>Set PassLenght=10<br>SetLocal EnableDelayedExpansion EnableExtensions<br>Set TotalChars=72<br>Set CharSet=0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWQYZ()_+-*!@#$<br>:Loop<br>Set /A Rnd=%TotalChars%*%Random%/32768<br>Set Pswd=!CharSet:~%Rnd%,1!%Pswd%<br>Set /A PassLenght-=1<br>If %PassLenght% GTR 0 GoTo Loop<br>@echo %Pswd%<br>pause</p><h3><p style="text-align: center;">WINDOWS</p></h3><p>........</p><p style="font-size: 130%;"><strong>Online Password Generation Resources</strong></p><ul><li><a target="_blank" href="https://ae7.st/g/"><strong>Passphrase and Password Generator</strong></a></li><li><a target="_blank" href="https://www.grc.com/passwords.htm"><strong>GRC's Ultra High Security Password...<a href=https://www.netmux.com/blog/random-password-cheat-sheet>Read More</a> Hash Crack Challenge Sun, 26 Aug 2018 06:17:35 -0700 https://www.netmux.com/blog/hash-crack-challenge https://www.netmux.com/blog/hash-crack-challenge <h3><p style="font-size: 130%; text-align: center;">CHALLENGE OVER</p></h3><h3><p>The Challenge</p></h3><p>Two plain SHA1 password hashes have been generated using separate techniques from a single "Random-Grid" <a target="_blank" href="http://a.co/d/8WoO3BY">One-Time Grid</a> (see One-Time Grid write-up <a target="_blank" href="http://www.netmux.com/blog/one-time-grid"><HERE></a>). This password cracking challenge will last one week, which starts <strong>Aug 27th, 2018 1200PM EST</strong> and ends <strong>September 3rd, 2018 at 1200PM EST</strong>.</p><h3><p style="font-size: 100%;">HASH #1</p></h3><p style="font-size: 130%;">[CRACKED by <a target="_blank" href="https://twitter.com/BoursierEtienne">@BoursierEtienne</a>] fe0c9f335b35c45e92d5e7d07c5933b6c4c0a522</p><h3><p>HASH #2</p></h3><p style="font-size: 130%;">[CRACKED by <a target="_blank" href="https://twitter.com/lakiw">@lakiw</a>]</p><p style="font-size: 130%;">120c249bc0f301ef3cba7a0fcbff463aaaded486</p><h3><p>Prizes</p></h3><p><strong>Claim your prizes by posting on Twitter to <a target="_blank" href="https://twitter.com/netmux">@netmux</a> with the cracked password. All valid submissions must be received before Sept 3rd at 1200PM EST.</strong></p><ul><li style="font-size: 100%;">Crack HASH #1 gets your name in the next <a target="_blank" href="https://www.amazon.com/dp/1793458618"><strong>Hash Crack: Password Cracking Manual</strong></a></li><li style="font-size: 100%;">Crack HASH #2 first person gets a free <strong><a target="_blank" href="http://www.netmux.com/blog/portable-cracking-rig">Pentester's Portable Cracking Rig</a></strong> with a GTX 1070 (~$1,100 value) ***</li></ul><p><em>***Limit=1. Sorry only United States contestants are eligible to receive the password cracking rig. A $500 Amazon gift card will be awarded for an international winner that cracks HASH #2.</em></p><p><i>**To receive your final prizes contestants must submit a write-up of your strategy for cracking the password hash....<a href=https://www.netmux.com/blog/hash-crack-challenge>Read More</a> Red Team Planner Tue, 01 May 2018 17:24:08 -0700 https://www.netmux.com/blog/red-team-planner https://www.netmux.com/blog/red-team-planner <h3><p style="text-align: center;"><a target="_blank" href="http://a.co/171OVKW"><span class="s-text-color-red">Available on Amazon</span></a></p></h3><h3><p style="font-size: 80%;">TL;DR</p></h3><ul><li><a target="_blank" href="http://a.co/44OITMX"><span class="s-text-color-red"><strong>Red Team Planner</strong></span></a> aids in customer engagement requirements & tracking.</li><li>Six-page custom, concise Engagement Templates for each customer.</li><li>Bullet & Graph paper provided for freeform note taking. </li><li>Available in two colors <a target="_blank" href="http://a.co/44OITMX"><span class="s-text-color-red">(Black & Red)</span></a> or <a target="_blank" href="http://a.co/81Ce8PG"><span class="s-text-color-red">(Red & Black)</span></a> .</li><li>186 total pages contained within the planner.</li><li>Send feedback or enhancements to <strong><a target="_blank" href="https://twitter.com/netmux"><span class="s-text-color-red">@netmux</span></a></strong> on Twitter.</li></ul><h3><p><strong>Repetitive Records</strong></p></h3><p>If you've been in the Red Team/Pentest game for a while you know note taking is very important when meeting with customers. Whether the meetings are in-person or over a conference call, its vital to record concise, accurate notes about their needs for a network security assessment. What I kept noticing was my notebooks would constantly fill up with the same bullet points and feedback needlessly recording the same responses: Grey Box, Full-Spectrum, WebApp, Details Points of Contact (POCs), Infrastructure to test, IP's, Limitiations, test accounts, Red Team data, Tasks... it was killing my time to focus during a meeting, not to mention all the dead whitespace. So I challenged myself to condense this recordkeeping into manageable sections that also allowed flexibility for recording customer requirements and track the progress of the various engagement milestones and tasks. This iterative process morphed into the <a target="_blank"...<a href=https://www.netmux.com/blog/red-team-planner>Read More</a>