Posts

Steghide: An introduction

Image
 JOLT, a hacking CTF located in Little Rock, Arkansas. JOLT 2022 was where I first was introduced to steghide. Steghide is a tool associated with Steganography which according to wikipedia is: ""the practice of representing information within another message or physical object, in such a manner that the presence of the information is not evident to human inspection". So basically hiding information within a picture. And of course if you can hide information in there you can extract information, and hide information that is dangerous." On the kali linux steghide page it says: "Steghide is steganography program which hides bits of a data file in some of the least significant bits of another file in such a way that the existence of the data file is not visible and cannot be proven. Steghide is designed to be portable and configurable and features hiding data in bmp, jpeg, wav and au files, blowfish encryption, MD5 hashing of passphrases to blowfish keys, and pseud

Vulnerability Spotlight: Type confusion

What is type confusion exactly? And how can it be used to exploit programs? According to the CWE (Common Weakness Enumeration) "Type confusion is when: the program allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type. When the program accesses the resource using an incompatible type, this could trigger logical errors because the resource does not have expected properties. In languages without memory safety, such as C and C++, type confusion can lead to out-of-bounds memory access." C and C++ are common examples used because these languages do not have type checking. This allows attackers to potentially exploit type confusion within C/C++ programs, which can lead to code execution. Of course C and C++ are not the only examples, languages with dynamic typing generally (like Perl) have this issue. C++ has 3 main Cast

Post SOTB and Happy New Year :)

Image
 If you missed out on SOTB that really stinks, but also I understand. Shell on the Border happened during new years and man was it an amazing experience. I couldn't attend the speaker part but the ctf was fun. It was at an arcade that had major Mr. Robot vibes. A truly different and awesome experience in the unlikely city of Fort Smith, Arkansas. Want to make a huge shout out Shyft, MoonKaptain, Fie, FractumSeraph, Allee, Fort Smith Arcade, and HackNWA (if I forgot you I am sorry it's not on purpose). All of y'all made this an amazing experience and the work we put it in was definitely seen. I am proud to be apart of FS2600 and I am grateful for the opportunity to be able to help, and to even do some of my first challenges.  I wanted to go over my challenges that I did, just 3, for those that are curious. First of all this being my first time making CTF challenges there were some mistakes on my part. I had made these challenges with a huge assumption of prerequisite knowled

Lessons from help desk part 1

 I love ethical hacking, Cybersecurity, and finding a tasty and juicy vulnerability. However, I think people underestimate the lessons from a very important job: help desk. Help desk is one of those almost "put you through the ringer" type of jobs. It can be soul-sucking, it can be filled with frustration, endless tickets, anxiety, and so on. I think one of the most important things about help desk because of this is to take some lessons in order to understand not only Cybersecurity, IT, and even society as a whole. Let's dig in. The weakest link: the human brain Help desk is basically this: ticket comes in, a user is having an issue that you may or may not know how to fix off the top of your head. You do your best to assist them as urgently and best as possible. This can go a myriad of ways, the user doesn't answer, the user is frustrated and just "wants you to fix it" but is not describing the issue so you have to figure it out, and so on.  One of the thin

An open redirect??? In THIS economy???

 Within the world wide web you have what are called redirections, or forwarding. Redirection is as simple as it sounds: You are browsing to a website and redirects your (or sends you) to a different site. This could be an old URL redirecting you to the new one, a url of a company directing you to the main page, or a malicious redirect. The 3rd one is what we will be discussing today.  Generally, redirects are in the 300 HTTP status code (reference here: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/300) and are either 301, 302, or 308. Depending on the website, it will require some action from the user (like logging in).  Within the bug bounty platform open redirects are generally P4 on severity level, and so generally don't offer much in way of bounty or severity. Generally, you want to combine this with something like an XSS, SSRF, CSRF, etc to make it much higher impact, and higher bounty. But open redirects are easy to teach and understand and so they are hunted quit

Being honest with hacking

You're scrolling twitter (or x now) or on a discord, or just on youtube, google, what have you and you see multiple posts "$10,000 bug bounty!!! $50,000!! $100,000". And it seems like an auction of bug bounties. Or maybe you hear about pwn2own and see that some teams get awarded up to $250,000 and you think to yourself "wow, hacking seems like a big money maker, I think I'll take a crack at it."  So you spend the next 6 months, or 12 to get into bug bounty hunting. You read the books like bug bounty bootcamp, the tangled web, etc. you watch the youtube videos like insiderPhd, codingo, and so on. And you spend a lot of time learning about the web, you find a bounty platform like bugcrowd and you dive into a platform after 6 months. At the end of 12 months, you've found nothing. Nata. Zilch. So what do you do? Do you continue another 12 months? Or give up? I want to preface this with saying that I am not trying to discourage *anyone* from getting into ethi

Arkansas Hackers: More than meets the eye

      What do you think of when you think of Arkansas? Walmart? Bill Clinton? Barefooted hillbillies? Now, what do you think of when you think of a hacker? I am willing to bet that most of you reading this probably don't think the two go together at all. But you'll be surprised to find out that there is a large group of Cybersecurity experts and hobbyists with all kinds of interests. And so hopefully by the end of this post you will see just how expansive Arkansas Hackers is!  Last week from Friday the 6th to Sunday the 8th I had the privilege of being able to attend a popular hacking CTF that goes by the name of JOLT. For those that may not know, a hacking CTF is basically where teams of hackers come together to try and get flags that are behind challenges. These challenges are wide-ranging and cover all types of hacking areas. Other than the bragging rights there are generally rewards for the top 3 winners. JOLT is located in Little Rock, Arkansas and is headed by members of