Anyone got link(s) to current articles on wifi pentesting? In particular, why can I get handshakes from known ssids, but the handshakes for hidden ssids don't seem to be usable to tooling used to extract hashes. Is there a newer tool I'm not in the loop on? I also tried out mdk4 to work out the name of a hidden ssid. Is that old and busted? I there new hotness?

: day 80 : This post (cyberplace.social/@GossiTheDog) crossed my feeds. is on. Did some digging in Defender ATH and it looks like some linux commands get logged in Defender--I searched for sudo. The install will show up as a wsl.exe command with the image passed as a parameter. So, it looks like there are some detective controls available if you weren't expecting the user population to be utilizing WSL. Gonna poke at it some more tomorrow.

: day 77 : Pollen season, rainy day, and coding hang-over triple-whammy. Got caught up on @thegrugq newsletters, had a bourbon, and I'm off to read another chapter on .

: day 76 : In baseball, bat .333 and you're in the hall of fame. Got some done. My comfort with it is increasing. ChatGPT is working well as a "debug buddy". Hunting will wait until tomorrow, along w/CRTO.

: day 75 : Yesterday and today were vacation days. Got a new MacBook yesterday, so part of yesterday and today was setting it up. Giving UTM a shot. Spun up a MacOS vm and a Kali vm. The MacOS locks up now and again, so that's no bueno. I'd like that to be be my ctf attacking host. Off to read another chapter on Rust before sleep and back to work tomorrow. Tomorrow shall be some hunting, PowerShell, and time on CRTO lab.

: day 74 : (D'oh. Yesterday was actually day 73.) Restarted the CRTO modules. Signed up for the lab. Working through the material and building out notes for the exam.

: day 72 : CRTO today. Eighty percent through first pass. Goal is to get through it over the weekend and start hitting the lab next week.

: day 70 : Today was a day of json and powershell. Took a different approach than I usually do. Started with laying out a json schema for all the data elements I want. Then backed into into functions and code. I've coded in ksh and bash for so long, I'm more used to doing the functions first. This is more interesting, because now I hunt for LOLBAS to get the data.

: day 69 : Forgot to post last night. Watched @[email protected] @[email protected] "Newbie Tuesday" stream. Biggest take-away was older Logitech wireless devices speak wifi. So, "BadUSB"/RubberDucky is in-play during physical tests: github.com/insecurityofthings/

: day 68 : Watched some videos by @valhalla_dev@twitter/@[email protected] Watched him go over some chapters out of the Rust Book and a couple of videos on malware dev.

: day 66 : Took a crack at new release, Inject. I've gotten rusty.

: day 64 : read another chapter of _Rust_Programming_… Site visit today, learning and relearning about processes and tech used to make the firm money. Thinking hard about attack paths and drafting possibles exercises.

: day 63 : Lots of context switching today, articles, newsletters, and such. Going to unplug and finish another chapter of _Rust_Programming_Language_.

: day 62 : Wasn't up for it yesterday, took a sick day. Did some poking around at a recent CVE. This led to another thread, though. Something that could lead to finding weird... Look for instances of the Windows process WerFault.exe starting. What was the parent process? What was the user id for the process? You may find something that is well broken and needs fixing--that cleans up log files--or something that needs further research.

: day 60 : Another section of CRTO done. Learned more about MSFT's Data Protection API, which was new to me. Otherwise, it was light today.

: day 59 : Two more sections of CRTO down. Tuned the registry run key search in Defender ATH. Noisy bugger, going to take some work to sort out "normal". Seems like a good place to hide for long-haul persistence.

: day 58 : Spent some time poking around log sources. Checked for logging and events matching oppsec warnings from CRTO. Created and tuned some queries for Defender ATH. There's signal in there about Registry run key creation and scheduled task creation. Good to know for and !

: day 57 : Finished the next section of CRTO. Juuust shy of half-way. Checked out a couple of presos at the Antisyphon "Most Offensive Con That Ever Offensived" on-line conference. I like the personalities and some of the dialogue in the panel discussion at the beginning. However, it was a little too "let's be controversial for the sake of controversy" for my taste. (I hope to get a pizza delivered to me, one day.)

Show more

ath0

CounterSocial is the first Social Network Platform to take a zero-tolerance stance to hostile nations, bot accounts and trolls who are weaponizing OUR social media platforms and freedoms to engage in influence operations against us. And we're here to counter it.