Blue team
- Use knockd to hide SSH
- List the arp cache and check if multiple IPs routes to the same physical adress. Maybe a MitM attack is in progress.
More secure development
- If an attacker can write files but not directories, it could be a good idea to store sensitive files in another subdir. If this subdir doesn’t exist normally, exploit like MySQL INTO OUTFILE exploits doesn’t work.
Samba misusage
Detect current running samba session (e.g. from rpclient)
C:\net session
A session can be removed with
C:\net session \<attacker_ip> /del
Play with the attacker (source): Kill attacker sessions each second
C:\> FOR /L %i in (1,0,2) do @net session \[LinuxIPaddr] /del /y & ping -n 2 127.0.0.1>nul
Red Team
- Use alias or create a function (see bash notes) to so something if a user executes something with his permissions.
Leave a Reply
You must be logged in to post a comment.