About Administrador

This author has not yet filled in any details.
So far Administrador has created 188 blog entries.

SIM swapping, when your phone, and your money, are out in the open

By |20 Dec. 2022|

SIM swapping fraud, the lawless duplication of a cell phone card to impersonate a person's identity, is growing. As a result, operators and banks are already reinforcing their cybersecurity structures to contain the problem Can you imagine getting out of bed one fine morning, opening your online banking app, and discovering that your bank account balance has blown up? You may not know it at the time, but you may have fallen victim to SIM swapping. Unfortunately, one of the many digital frauds that prevail in this age is frauds that cyber intelligence services work every day to contain. Furthermore, SIM swapping is a simple fraud. It consists, in short, in illegitimately obtaining a duplicate of a person's cell phone ...

Comments Off on SIM swapping, when your phone, and your money, are out in the open

IoT Security assessment

By |16 Dec. 2022|

Discover the IoT security assessment with best practice guides on each of the different stages of an IoT security audir that we have discussed in previous OWASP FSTM methodology articles The Internet of Things (IoT) sector has experienced exponential growth over the last few years. The launch of 4G networks provided the impetus this sector needed to deploy communications effectively and cheaply. The current deployment of 5G networks will be another turning point in this highly competitive market, making IoT security assessment a must in the years to come. On the other hand, the proliferation of wearable devices (wearables) has not only generated a new market but has also created a new data-centric business model. Thus, the business paradigm has ...

Comments Off on IoT Security assessment

OWASP FSTM, Stage 9: Exploitation of executables

By |7 Dec. 2022|

Exploitation of executables is the final step in a firmware analysis, in which an exploit is developed for a vulnerability discovered in earlier phases Vulnerability exploitation of executables techniques vary greatly depending on the type of vulnerability and the component they affect, although the most serious and damaging ones usually come from executables without the relevant security measures or that make use of vulnerable functions. If the previous analysis phases have been successful, at this point a vulnerability or hints of a vulnerability will have been discovered in one of the firmware components of an OT or IoT device. Sometimes that vulnerability is found in an executable, for which a proof-of-concept (PoC) or exploit can be written. PoCs and exploits ...

Comments Off on OWASP FSTM, Stage 9: Exploitation of executables

OWASP FSTM, step 8: Runtime analysis

By |29 Nov. 2022|

Static analysis of the firmware and its executables provides only a limited amount of information about its operation and performing further analysis at that stage is inefficient in time and effort. Because of this, it is often necessary to continue the analysis in a dynamic environment, where the firmware and its components can be observed and manipulated in execution. Runtime analysis builds on the previous phases to gain access to the system's executables and internal processes, either in a real environment through administrator access or in a virtualized environment, built specifically for the executables of this firmware and where there is much more control over execution. In case of running the system on the original hardware, without emulation, it is ...

Comments Off on OWASP FSTM, step 8: Runtime analysis

OWASP FSTM, step 7: Dynamic analysis

By |22 Nov. 2022|

The dynamic analysis phase is defined as the study of the running device in a real or emulated environment. For this purpose, the device is analyzed, trying to delve into possible vulnerabilities found in previous phases (essential for hacking IoT devices). For this phase, an emulation environment can be used that allows the firmware to be run without the need for the original hardware, as shown in the previous article. This method allows a more in-depth analysis of the system in case no debug hardware port has been found, since, in many cases, emulation frameworks allow to connect a debugger such as GDB to control the execution flow. Alternatively, when no hardware ports are available, the original hardware can be ...

Comments Off on OWASP FSTM, step 7: Dynamic analysis

Hacking of social network accounts and creation of fake profiles: No one is safe

By |10 Nov. 2022|

Social networks are fully incorporated into our lives. Currently, 85% of the Spanish population uses a social network, both on a purely personal and professional level. Likewise, 67% of Spanish companies used social networks as communication and business tools in 2021. Given their level of penetration in society and their economic impact, numerous malicious actors are increasing the frequency and ways of hacking social network accounts for spurious purposes, from impersonation to account hijacking and transformation. Just as technology has evolved rapidly in recent years, criminals have also innovated when it comes to designing tactics and implementing techniques to make their attacks successful. Professionals who provide cyber intelligence services have found that social networks have become an attack vector for ...

Comments Off on Hacking of social network accounts and creation of fake profiles: No one is safe

Stolen accounts, IPTV apps and pirate platforms: how audiovisual fraud work

By |3 Nov. 2022|

You get home after a long day at work. You open a bottle of wine and sit down in front of the TV to watch an episode of a series that helps you relax and disconnect. But when you try to log in to your account on a well-known streaming platform, the system tells you that the user limit has been exceeded. How is this possible if you can have four connected devices and you only have one? You have probably been a victim of one of the most popular audiovisual fraud: the theft of streaming portal accounts. This hypothetical situation allows us to shed light on one of the biggest challenges faced by companies dedicated to the production, distribution, ...

Comments Off on Stolen accounts, IPTV apps and pirate platforms: how audiovisual fraud work

Wi-Fi Sniffer for Windows and 802.11 packet viewer

By |29 Oct. 2022|

Acrylic Suite is a software developed by Tarlogic team that provides a powerful WiFi sniffer to analyse communications and WiFi security on Windows 11 and Windows 10 computers. To quickly turn any Windows computer into a powerful Wi-Fi network sniffer, we only need two things: A WiFi card. Install the Acrylic Wi-Fi Sniffer software. WiFi network signal sniffer In this article we will explain how to carry out this task on Windows and access to all the WiFi information and to the 802.11 communication frames in the 2.4Ghz, 5Ghz and 6Ghz frequency bands. WiFi card with monitor mode support The first step to detect WiFi signals with our sniffer is to have an USB card or an integrated ...

Comments Off on Wi-Fi Sniffer for Windows and 802.11 packet viewer

One shell to HANDLE them all

By |26 Oct. 2022|

Introduction During a Red Team engagement, the exploitation of vulnerabilities in web apps usually offers a good chance of establishing a foothold into the target’s infrastructure or compromising an internal asset for lateral movement. From there on, a common approach is to upload a web shell and start looking for privilege escalation opportunities. When we talk about Windows environments, this privilege escalation from a web shell often relies in the abuse of the SeImpersonate and/or SeAssignPrimaryToken privileges using any of the various “Potato” exploits available in public repositories.  However, since these are very well-known techniques, sometimes it may not be the best approach, especially when dealing with highly monitored environments. In these scenarios, as well as in general, it is important ...

Comments Off on One shell to HANDLE them all

We are using cookies to give you the best experience on our website. You can find out more about which cookies we are using or switch them off in Cookies Settings

Necessary

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

3rd Party Cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages. Keeping this cookie enabled helps us to improve our website.

Cookies policy