• Aditya Singh

    Fingerprinting

    • Mobile
    • Browser via Favicon and Cookies, Cross Browser
      • Cross Browser - Scheme Flooding Vulnerability
      • Allows for Targeted Advertising without User consent
    • CPU/GPU via Mathematical Operations
    • Network via TLS
    • Side Channel Attacks
      • Information leakage from LL CPU behavior.
      • Access information via Sweep Counting.
    • Clock Deviation
      • Inherits inaccuracies leading to small changes in frequency
    • Prevention from Browser FP
      • Farbling used by Brave (with some drawbacks)
  • Kaushik Pal

    TTPs

    • Tactics, Techniques and Procedures
      • via MITRE ATT&CK Framework
    • Hunt for OPSEC mistakes in APTs and TAs.
    • Phishing Cluster by Sidecopy PAK
      • Check Passive DNS or IP Resolution
      • search via fofa
      • Chinese APTs (EPFO Attack)
      • Large scale phishing + Social engineering campaigns
  • Abhijit Singh

    Binaries

    • Searching with Shodan
      • “220” “230 Login Successful” FTP: 21
      • “Android Debug Bridge” “Device” port: 5555
    • Immunity Debugger
      • Search for text strings in executables (Under text slab)
      • Stack Architecture and Buffer Overflow Condition
      • Registers (EBP, ESP, EIP)
        • Extended Base Pointer
        • Extended Stack Pointer
        • Extended Instruction Pointer (called at Termination Pointer)
      • nmap scan for syncbreeze application
      • wireshark scan and python script for vuln ip request for buffer overflow condition
      • check max values to be stored with debugger and python script
      • generate pattern with msf and send it to cause an overflow.
      • buffer overflow max value is stored in EIP register value.
      • check the EIP value match with msf offset.
      • use !mona modules for safe and unsafe DLLs
      • !mona -find “fileaddress”
      • use msfconsole to extract shellcode and convert it to readable format.
      • start a netcat listener at the same port
      • gain a reverse shell in msf through overflow condition
    • Resolution
      • ASLR Bypassing

IMG_3448.jpeg

IMG_3455.jpeg

IMG_3456.jpeg

IMG_3457.jpeg