Running OSX 10.8.2 in QEMU-KVM
It is always nice to have a possibility to run a virtual system to test various software designed for different platforms. Recently I have moved completely off from VirtualBox and started to use...
View ArticleVirtio in KVM-QEMU IO
A note to myself, always use virtio drivers for Windows guests in KVM-QEMU, it will improve disk IO greatly. Here is a quick summary: - Download ISO from here...
View ArticleWargames part 1 Delivering payloads by Email
For the demonstration purposes lets presume the target is using Windows 8.1 64bit, MS Office 2010 + Outlook and some form of Antivirus protection – in this case Avast NOD32 ver.7 Metasploit tools...
View ArticleSome KVM-Qemu hints and tips
A short summary of useful KVM-Qemu commands and tricks. disk images in qcow2 format tend to grow after while if one installs more and more stuff in the VMs. In order to free up space and shrink the...
View ArticleWargames part 2 delivering payloads through PDFs
In another example, let us focus on popular PDF documents. The exploit used in this demo was originally written by WebDEVil and can be downloaded from here ExploitAdobeReader This is nothing new, but...
View ArticleCustom Meterpreter loader DLL
This was actually discovered by a pure chance as I have wanted to try something with GCC and accidentally compiled a windows C source code as a dll using the -shared option in MinGW. Here is another...
View ArticleCustomising Meterpreter Loader DLL part. 2
Today I will show you an interesting example how to search for vulnerable Dll functions that we can compile into our custom Meterpreter DLL loader and let a signed executable execute it. I have taken...
View Article64bit OSX hacking with Metasploit
In the previous articles I was describing how to install and run 64bit OSX in KVM (in this example it is Mountain Lion 10.8.2), now lest focus on some simple exercise in creating an installer via...
View ArticleRunning Tru64 UNIX inside a VM for Metasploit testing
With Virtual technology nowadays it is possible to emulate almost anything, and for those that wish to play around with not-so-common operation systems for the Alpha processor family there exists a...
View ArticleSetting up X11 on Tru64 VM via VNC
Ok, so we have the Tru64 up and running inside the alphavm and now we want to have a fancy X11 desktop with CDE window manager. Here is a quick howto for setting up vncserver and CDE on the Tru64. You...
View ArticleSolaris 11 and Metasplolit
Just to follow up on the different OS scenarios from the previous posts, here is a test done on Solaris 11.1 x86 in Qemu KVM. Setup is nothing special, standard way of creating hdd qcow2 image, and...
View ArticleOld tRusty Thinkpad X23
Just a note to myself here, I have dug up my old laptop from 2002 and tried to put it to some use again as I have managed to get the battery replaced. It is an old Pentium 3 CPU with a stunning 8MB ATI...
View ArticleAnnoying Skype forced upgrade on Linux
Skype forces you to upgrade…. fortunately there is a quick “fix” ver=$(echo “4.2.0.11” | xxd -p | sed ‘s/.\{2\}/&\\x/g;s/^/\\x/;s/\\x0a\\x//’); echo “sudo sed -i...
View ArticleWindows 10 preview
Honestly when somebody said recently “hey did you know that Windows 10 was released…” I thought he was joking. It was released, the guy was not joking, and I suddenly had this thought if I have jumped...
View ArticleYet another Windows 10 post after some time
I had not much time lately to post anything, as too many sad thing are happening around the world. Unfortunately these have kept me busy for these past few months as I have tried hard to analyze the...
View ArticleWindows 10 UAC bypass with custom Meterpreter payloads
I have promised myself to try this exercise to show how this is done. We have the following scenario : ——————————— Windows 10 Local/Domain user with Admin privileges Malicious link to “BeEF website”...
View ArticleWindows 2012 R2 AD controller / Windows 10 client / Metasploit / Mimikatz
This is an experiment that I wanted to share. But before that I wanted to introduce my collection of WTF screenshots from movies that I have started recently. Mission Impossible 5 Data Transfer Relay...
View ArticleJohn Connor vs. ESET (Hey Eset choose some other mascot, not a cyborg)
Those people that saw the old Terminator movies probably agree that today’s Security companies are becoming more and more like Skynet :) I like the Slovak ESET, it is great, unfortunately they have...
View ArticleLuckyStrike and custom Metasploit loader
Lucky Strike is awesome. So I wanted to share my findings from experiments I have made. LUCKY STRIKE, GIRL IN RED TL:DR – LuckyStrike is an Excel file generator that will create an Excel file with a...
View ArticleSoviet UNIX clone – DEMOS
This is something that I think should be shared exactly now as the anti-russian craziness peaks once again. When the cold war between USA and USSR reached its climax in the early 1980’s, technological...
View Article