Skip to content

Cabling Colors and CIS Controls

The first of the CIS Controls is called “Inventory and Control of Hardware Assets”. One of my friends is an organizer of a big European IT conference and during a recent lunch he brought up a topic which is interesting. The color coding of your network cables and security. Huh? I hear you think. Well, my friend is correct. It is one of the common issues. Imagine that I show you a pack of 20 cables running through your building. You can not peak at the labels attached at the… Read more Cabling Colors and CIS Controls

Making a bootable USB thumb drive from an ISO in Linux

I recently had to download an ISO image for an operating system and make a bootable copy of that ISO image on a USB thumb drive. My memory failed me so I had a bit of lookup work to do in my notes and therefore a little howto. syslinux First of all you will need syslinux to be installed. $ sudo apt-get install syslinux isohybrid the image The main thing to remember is that the ISO file you use to burn to a CD/DVD is not the same as the… Read more Making a bootable USB thumb drive from an ISO in Linux

Botconf 2018 – Day 3 Wrap Up

The last day of Botconf. HTTP and botnets There was one talk I will remember by Piotr BIAƁCZAK who looked at the HTTP protocol to figure out if we could use certain features to look at the HTTP traffic in our network and distinguish botnet traffic from other traffic. The conclusion for me was “No, you can’t distinguish it based on a feature”. It depends to much on being lucky the author made a mistake. Then again it must be said if you know that you have a limited set… Read more Botconf 2018 – Day 3 Wrap Up

Botconf 2018 – Day 2 Wrap Up

The second day of botconf was an interesting day. The presentations were on the quite diverse topics. Here is the write up of what I will remember. Malicious Documents From a social engineering point of view the presentation on the topic of malicious documents by Dr. Nimal Singh and Deepen Desai was very interesting. We all know it is a classic in the malicious arsenal but malicious documents have been an issue since the second half of the 1990’s and thus an update view on the issue was welcome. Sysmon… Read more Botconf 2018 – Day 2 Wrap Up

Botconf 2018 – Day 1 Wrap Up

I will not talk about the individual talks because I suppose you will read other blogs like Xavier Mertens his blog. During the whole day researchers presented their research and although I barely know reverse engineering compared to them, I noticed a couple of reoccurring themes. Monero If you follow the news you will have noticed that the ransomware craze is over and the new thing to do is doing cryptocoin mining on your victim’s machine. I must say I have never really looked into the whole cryptominer issue, but… Read more Botconf 2018 – Day 1 Wrap Up

Social Engineering Attack Execution

In a previous blog post I told you about the two approaches for social engineering attacks. The structured approach has the following steps. The OSINT Process The target selection Profiling the target Target specific OSINT The attack preparation The attack execution Today in our final blog post on the structured social engineering process we dive into the attack execution. Patience, young grasshopper One of the hardest things in social engineering is that it is a patience game. You can not make somebody do something. You game is to influence the… Read more Social Engineering Attack Execution