Another quick video to show just how quickly a server can be compromised and taken over completely by an attacker. In this video we have a server running an out of date and un-patched application, which gives the attacker a way onto the server. Then the attacker dumps and cracks the password hashes, which gives …
Bypass Client Side Validation in a website. Getting Admin.
https://www.youtube.com/watch?v=KTpy0nsOFm0 A quick video showing why you need both server and client side input validation. Here we bypass client side validation using Burp Suite browser proxy to change our input from our valid credentials for the site to get logged in as admin with a simple SQL injection statement. Server side validation would prevent this …
Continue reading "Bypass Client Side Validation in a website. Getting Admin."
Deploying Ransomware (Hacking RDP Servers Part 4)
https://www.youtube.com/watch?v=52c83yBgc78 I hope you have enjoyed this short series of RDP hacking. The aim was to show how quickly things can snow ball when just one user becomes compromised on a shared resource like an RDP server. Anyway, back to this last video in the series. If you haven’t watched the previous videos and you …
Continue reading "Deploying Ransomware (Hacking RDP Servers Part 4)"
Cracking password hashes (Hacking RDP Servers Part 3)
https://www.youtube.com/watch?v=u2Yze5UC8tU In the 2 previous videos we have shown how by compromising just one user on an RDP server we can steal the hashed passwords of all logged in users. In part 3 we show how to crack those hashes to reveal the plain text passwords. If you haven’t watched the previous videos and you …
Continue reading "Cracking password hashes (Hacking RDP Servers Part 3)"
Stealing credentials of all logged in users. (Hacking RDP Servers Part 2)
In the previous video we got a foot hold on the victim machine and managed to elevate ourselves to SYSTEM. At this point though a restart of the server, or a simple glitch will see us booted off the server losing our connection, and putting us back to square one. What if we can get …
Continue reading "Stealing credentials of all logged in users. (Hacking RDP Servers Part 2)"
Why “Least Privilege” is important. (Hacking RDP Servers Part 1)
https://www.youtube.com/watch?v=zyaoWcQvnGM Welcome back, this is a simple demo to show why you don't use administrator rights with normal everyday accounts you use for email and web browsing. It's something you may hear all the time, but it's not easy to understand what the big deal is if you don't know. In the video we have …
Continue reading "Why “Least Privilege” is important. (Hacking RDP Servers Part 1)"
Creating a Cyber Attack – Part 9 (Making a malicious Word document using DDE and Powershell)
In part one of this series we looked at making a malicious Word document using DDE, which connected to our malicious site and automatically ran malicious code to give us access to the victim, but also gives us a fall back where the user is also prompted to install a secure file viewer should our …
Creating a Cyber Attack – Part 8 (Post Exploitation – Gaining Persistence 2)
In the final video of this series we continue with post exploitation using metasploit and meterpreter, using Windows commands to gain persistence. We have created our new user and have remote desktop access. Now we ensure our backdoor is always running and even if it crashes or loses connection we have ways to restart it …
Continue reading "Creating a Cyber Attack – Part 8 (Post Exploitation – Gaining Persistence 2)"
Creating a Cyber Attack – Part 7 (Post Exploitation – Gaining Persistence )
In this part we continue with post exploitation using metasploit and meterpreter, but this time using Windows commands to gain persistence. We start with our meterpreter shell, then use the Windows cmd prompt to run native commands to enumerate shares and users. We will also enable RDP, and create a new user adding the account …
Continue reading "Creating a Cyber Attack – Part 7 (Post Exploitation – Gaining Persistence )"
Creating a Cyber Attack – Part 6 (Post Exploitation – With Msf console and mimikatz )
In this part we continue with post exploitation, this time using metasploit and meterpreter. We have socially engineered the victim to visit our malicious webpage which has provided us with an initial connection to our victim machine, and our meterpreter shell. Now we will show a few simple commands you can use to escalate your …
