Router exploitation with Metasploit
Watching https://youtu.be/PdCQChYrxXg?t=1770 again after my first time a a few months after that video came out. Pointing to this section of the video in particular because while a lot is being said about the steps to detection nothing much in terms of the lead up to the first 'smell' of an attack.
Imagine seeing that graph as an alert fatigued analyst. This is where security automation comes in. And yes, I'm going to add a buzzword in it, ML via risk classification engines rather than handmade scoring.
I also plan to write an abbreviated version on vagn.es next week if you're not up to reading almost 80 pages :p
hence, this is what I wrote my thesis about: rubberduckies in a forensic environment
if you wanna read it, it's freely available here:
So it's actually not that cut and dry, because I looked at p4wnp1 and other existing solutions to be used in a forensic setting, but they never seem to really fit my specs.
tired: use existing rubberducky solutions
wired: create a new one in circuitpy 👀
Oh, my new address is https://social.qore.no/users/vagnes
See you there))
I think my instance is stable enough to move to, so I think I will do just that.
Thanks for hosting me this long time @jerry , all the best!
Thank you and My #infosec Hopes For 2019
Also, it does not seem to federate properly
So I'm moving to a pleroma instance I set up at social.qore.no , but I have some problems. Often it logs "Signature missing or not from author, relayed Create message, fetching object from source"
To people actually understanding pleroma, is this normal? I'm not sure if web push keys are correctly configured...