<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Portslug's Terminal]]></title><description><![CDATA[🤹‍♂️ Entrepreneur 🧙‍♂️ Cybersecurity Consultant 🎯 AI Security 🗝️ Locksport Practitioner 🐙𝗣𝗼𝘀𝘁𝘀 𝗮𝗿𝗲 𝗺𝘆 𝗼𝘄𝗻! 🇺🇸🍍🍕]]></description><link>https://blog.portslug.com</link><image><url>https://cdn.hashnode.com/uploads/logos/69d32adb40c9cabf448de22f/a646bb29-9bcc-4027-85fb-0bbc6fc55cb8.png</url><title>Portslug&apos;s Terminal</title><link>https://blog.portslug.com</link></image><generator>RSS for Node</generator><lastBuildDate>Thu, 21 May 2026 17:12:44 GMT</lastBuildDate><atom:link href="https://blog.portslug.com/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[Prt.1 – Hak5 Cloud C2 Setup on AWS]]></title><description><![CDATA[What is Cloud C2?
Cloud C2 makes it easy for penetration testers and IT security teams to deploy and manage Hak5 gear from a simple self-hosted cloud managed platform. Cloud C2 allows you to maintain ]]></description><link>https://blog.portslug.com/prt-1-hak5-cloud-c2-setup-on-aws</link><guid isPermaLink="true">https://blog.portslug.com/prt-1-hak5-cloud-c2-setup-on-aws</guid><dc:creator><![CDATA[Portslug's Terminal]]></dc:creator><pubDate>Sun, 22 Nov 2020 15:00:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/uploads/covers/69d32adb40c9cabf448de22f/37c14ac2-8935-4e9a-84f2-22f807b3696f.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3><strong>What is Cloud C2?</strong></h3>
<p>Cloud C2 makes it easy for penetration testers and IT security teams to deploy and manage Hak5 gear from a simple self-hosted cloud managed platform. Cloud C2 allows you to maintain access for engagements, continually monitor and assess environments with Hak5 gear implants.</p>
<p>Cloud C2 currently supports several Hak5 devices including the WiFi Pineapple, LAN Turtle, Packet Squirrel, Signal Owl, ScreenCrab, Shark Jack and the KeyCroc.</p>
<h2><strong>Self-Hosting Cloud C2 in AWS – Step by Step Guide</strong></h2>
<h3><strong>Step 1 – Signup for AWS</strong></h3>
<p>Sign-up and Create your AWS hosting account.</p>
<blockquote>
<p><a href="https://portal.aws.amazon.com/billing/signup?refid=em_127222&amp;redirect_url=https%3A%2F%2Faws.amazon.com%2Fregistration-confirmation#/start"><strong>https://portal.aws.amazon.com/billing/signup?refid=em_127222&amp;redirect_url=https%3A%2F%2Faws.amazon.com%2Fregistration-confirmation#/start</strong></a></p>
</blockquote>
<h3><strong>Step 2 – Creating &amp; Configuring a Lightsail Instance</strong></h3>
<p>In this setup of Cloud C2, we will utilize a single Amazon Lightsail instance for $5 a month to run our public Cloud C2.</p>
<img src="https://substackcdn.com/image/fetch/$s_!hoFh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F951ddc30-dc3b-4bc9-b8f8-4b24defab548_300x126.png" alt="" style="display:block;margin:0 auto" />

<h4><strong>Step 2.1:  Create your instance in Amazon Lightsail</strong></h4>
<p>Next, create and instance by selecting the instance “location/region” that works best for you, and select a “Linux/Unix” platform as an "OS Only" option. In this blog, we will be utilizing the latest Ubuntu LTS release and naming the instance to identify our LightSail resource (especially helpful, if you are running numerous instances in Lightsail).  See screenshot below for details.</p>
<img src="https://substackcdn.com/image/fetch/$s_!nxRu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1884e693-17ee-4649-9e35-5c4e607731b6_300x211.png" alt="" style="display:block;margin:0 auto" />

<img src="https://substackcdn.com/image/fetch/$s_!5FWs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33e02b44-c83e-403a-b48e-ed9d6575cc7d_300x87.png" alt="" style="display:block;margin:0 auto" />

<h4><strong>Step 2.2: Configure Lightsail Instance for Cloud C2</strong></h4>
<p>In the next steps, we will configure our Lightsail instance to allow network communications from our Hak5 devices to properly communicate to the Cloud C2 platform. Please keep in mind, using stricter network rules can prevent public facing instance exposure, but for this blog post we are not restricting IP Addresses.  In a controlled assessment, we would highly recommend utilizing a restricted IP address list, or VPN relay to access the Cloud C2 portal during engagements.</p>
<h4><strong>Step 2.2.1: Attach Static IP to Lightsail Instance</strong></h4>
<p>Select the networking tab, and create a static IP you can assign to your instance. Next, select your instance, and add an identifier name for the static IP. See screenshot below for details.</p>
<img src="https://substackcdn.com/image/fetch/$s_!68xS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4759a39c-c6a6-44c4-b9d3-7125400736e9_300x244.png" alt="" style="display:block;margin:0 auto" />

<h4><strong>Step 2.2.2: Configure Lightsail Firewall Rules</strong></h4>
<p>In this step, we will configure the proper firewall rules on our Cloud C2 instance to allow our Hak5 devices to properly communicate.  Please remember as stated before, it is always best practice to utilize restricted IP addresses or VPN access for public instances to reduce your attack surface. For this demonstration, we are leaving this instance public. To configure firewall rules, select the Networking tab and navigate to the firewall.  Scroll down and click the "+ Add rule" to configure rules. We will add several rules to our firewall. Add HTTPs, Custom TCP port 2022 and 8080. See screenshot below for details on port configuration.</p>
<img src="https://substackcdn.com/image/fetch/$s_!lx6E!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe09d3ec9-4831-4438-812f-4582c45489a6_300x94.png" alt="" style="display:block;margin:0 auto" />

<h3><strong>Step 3 – Setting up Cloud C2</strong></h3>
<h4><strong>Step 3.1:  Accessing Lightsail Instance</strong></h4>
<p>To quickly access your Lightsail instance, click on the “connect” tab in the top left. Then select Connect securely using your browser by “Connect Using SSH”. This will connect you to your instance via a SSH webshell. You can also configure your own SSH client as well.  See screenshot below.</p>
<img src="https://substackcdn.com/image/fetch/$s_!KUC3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F252c8c2c-fee5-4776-be81-8d98306563c3_300x139.png" alt="" style="display:block;margin:0 auto" />

<h4><strong>Step 3.2: Install Cloud C2 with a Bash Script</strong></h4>
<p>During these steps, we will have to install UnZip, since it is not natively installed on the AWS Lightsail Unbuntu Instance.  We will also utilize a Cloud C2 bash script that will automagically install the latest version of Cloud C2.  Once you are in the “Connect” console, copy and paste the script below to install Cloud C2.  Remember, you will have to register to get a valid license key from Hak5 which can be obtained free on the Hak5 website - <a href="https://shop.hak5.org/products/c2#c2-versions">https://shop.hak5.org/products/c2#c2-versions</a>. See bash install script below.</p>
<h4><strong>3.2.1:  Install UnZip</strong></h4>
<blockquote>
<p>sudo apt install unzip</p>
</blockquote>
<h4><strong>3.2.2: Cloud C2 Install Bash Script:</strong></h4>
<blockquote>
<p>wget <a href="https://c2.hak5.org/com">https://c2.hak5.org/com</a> -q -O <a href="http://c2.zip">c2.zip</a> &amp;&amp; unzip -qq <a href="http://c2.zip">c2.zip</a> &amp;&amp; \</p>
<p>IP=$(curl -s <a href="https://checkip.amazonaws.com">https://checkip.amazonaws.com</a>) &amp;&amp; \</p>
<p>echo "Copy the below setup token and browse to <a href="http://\(IP:8080">http://\)IP:8080</a>" &amp;&amp; \</p>
<p>./c2_community-linux-64 -hostname $IP</p>
</blockquote>
<h4><strong>Step 3.3: Activating and Setting up Cloud C2</strong></h4>
<p>Once the script is complete, you will get a setup token and a browse path where your Cloud C2 instance is running. Next, navigate to your Cloud C2 instance, and finish the activation process.</p>
<img src="https://substackcdn.com/image/fetch/$s_!Y9Yd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4acf077-3710-4ee6-9b47-717875f2d043_300x35.png" alt="" style="display:block;margin:0 auto" />

<h4><strong>3.3.1:  Setup Cloud C2 Account</strong></h4>
<p>In this setup process, you will be prompted to enter your valid “License Key” that would have been sent to you after your Hak5 Cloud C2 registration process. Check your email for the “Hak5 Cloud C2 Download &amp; License” from step 3.2 – Obtaining an active Cloud C2 License ( <a href="https://shop.hak5.org/products/c2#c2-versions">https://shop.hak5.org/products/c2#c2-versions</a> ). The setup token will be provided if the script runs successful.</p>
<img src="https://substackcdn.com/image/fetch/$s_!9yrC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee8f45af-5e8d-4072-9575-dacc581acab3_300x283.png" alt="" style="display:block;margin:0 auto" />

<h4><strong>Step 3.4: Logging into your Cloud C2 Instance.</strong></h4>
<p>Once your account has been setup, you can navigate to your C2 Cloud instance, and login with the newly created Username and Password that was created during the setup process.</p>
<img src="https://substackcdn.com/image/fetch/$s_!Kir7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadad6097-b42f-4f0a-8c7f-6df56234e737_283x300.png" alt="" style="display:block;margin:0 auto" />

<h3><strong>Step 4 – Enjoy! Happy Hacking…</strong></h3>
<p>Start adding Hak5 approved devices such as WiFi Pineapple, LAN Turtle, Packet Squirrel, Signal Owl, ScreenCrab, Shark Jack and the KeyCroc to your Cloud C2 instance. Adding devices to Cloud C2 getting started guide can be found [at] <a href="https://docs.hak5.org/hc/en-us/articles/360014295634-Adding-Devices-to-Cloud-C2">https://docs.hak5.org/hc/en-us/articles/360014295634-Adding-Devices-to-Cloud-C2</a></p>
<h4><strong>Cloud C2 Dashboard</strong></h4>
<img src="https://substackcdn.com/image/fetch/$s_!0PET!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79954266-f701-407b-8397-2340cc7e5e72_300x82.png" alt="" style="display:block;margin:0 auto" />

<h4><strong>References:</strong></h4>
<ul>
<li><p>[1]. Cloud C2 Downloads –  <a href="https://shop.hak5.org/products/c2#c2-versions">https://shop.hak5.org/products/c2#c2-versions</a></p>
</li>
<li><p>[2]. Hak5 Devices – <a href="https://shop.hak5.org/">https://shop.hak5.org/</a></p>
</li>
<li><p>[3]. Cloud C2 Installation and Setup Guides – <a href="https://docs.hak5.org/hc/en-us/articles/360012947534-About-Cloud-C2">https://docs.hak5.org/hc/en-us/articles/360012947534-About-Cloud-C2</a></p>
</li>
<li><p>[4]. Adding Devices to Cloud C2  – <a href="https://docs.hak5.org/hc/en-us/articles/360014295634-Adding-Devices-to-Cloud-C2">https://docs.hak5.org/hc/en-us/articles/360014295634-Adding-Devices-to-Cloud-C2</a></p>
</li>
</ul>
<p><strong>Prt.2 – Hak5 Cloud C2 SSL Setup on AWS - (Coming Soon!)</strong></p>
]]></content:encoded></item><item><title><![CDATA[How to Install Kali on Raspberry Pi 400]]></title><description><![CDATA[In this blog, we will show you how to install and setup Kali linux on the new Raspberry Pi 400 Personal Computer.


Hardware List

Raspbery Pi 400

Micro SD Card

PowerSupply

Ethernet/Rj45 Cord

Mous]]></description><link>https://blog.portslug.com/how-to-install-kali-on-raspberry-pi-400</link><guid isPermaLink="true">https://blog.portslug.com/how-to-install-kali-on-raspberry-pi-400</guid><dc:creator><![CDATA[Portslug's Terminal]]></dc:creator><pubDate>Sun, 15 Nov 2020 15:00:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/uploads/covers/69d32adb40c9cabf448de22f/52ee8f8a-01cc-4df6-81a5-fe7528472ed8.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In this blog, we will show you how to install and setup Kali linux on the new Raspberry Pi 400 Personal Computer.</p>
<img src="https://substackcdn.com/image/fetch/$s_!2pL8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77917f0e-e7a1-488f-bb3a-128557dc138c_300x167.jpeg" alt="" style="display:block;margin:0 auto" />

<h4><strong>Hardware List</strong></h4>
<ul>
<li><p><a href="https://vilros.com/products/raspberry-pi-400">Raspbery Pi 400</a></p>
</li>
<li><p><a href="https://www.amazon.com/SAMSUNG-Select-microSDXC-Adapter-MB-ME128HA/dp/B08879MG33">Micro SD Card</a></p>
</li>
<li><p><a href="https://vilros.com/products/vilros-usb-c-5v-3a-power-supply-with-switch-designed-for-pi-4">PowerSupply</a></p>
</li>
<li><p>Ethernet/Rj45 Cord</p>
</li>
<li><p>Mouse ~{- )</p>
</li>
</ul>
<h4><strong>Installing Kali Linux on your Raspberry Pi 400</strong></h4>
<ol>
<li><p>To begin, we need to first download the latest Kali linux image from the official Kali arm <a href="https://www.offensive-security.com/kali-linux-arm-images/">downloads page</a>.<br />On the kali download page select the latest image "<strong>Kali Linux RaspberryPi 2 (v1.2), 3 and 4 (64bit)</strong>" from their <a href="https://www.offensive-security.com/kali-linux-arm-images/">website</a>.</p>
<img src="https://substackcdn.com/image/fetch/$s_!EL51!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04834597-6645-4781-9285-f391363c8b5f_300x70.png" alt="" style="display:block;margin:0 auto" />
</li>
<li><p>Writing your Kali image to an SD card, we can utilizing a software called "<a href="https://www.balena.io/etcher/"><strong>Etcher</strong></a>".<br />Etcher is a piece of software that allows your to easily flash OS images to SD cards &amp; USB drives easily.</p>
<img src="https://substackcdn.com/image/fetch/$s_!w7d-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcedbd10f-2d43-429c-9058-2b54fbb91c9e_159x49.png" alt="" style="display:block;margin:0 auto" />
</li>
<li><p>Begin by opening up the Etcher software application on your device. With Etcher click the "<strong>Select Image</strong>" button and navigate to your Kali image "<strong>kali-linux-2020.3b-rpi3-nexmon-64.img</strong>" file location.</p>
<img src="https://substackcdn.com/image/fetch/$s_!QBzk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd067a743-766e-49c0-aa5d-653880a2ea0d_300x179.png" alt="" style="display:block;margin:0 auto" />
</li>
<li><p>Next, click on the select target "SD Card" that is ready to be flashed with latest image.</p>
<img src="https://substackcdn.com/image/fetch/$s_!FJpS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F990813af-9f0b-4d60-8ce7-18142cd0b411_300x176.png" alt="" style="display:block;margin:0 auto" />
</li>
<li><p>To write the image to your selected SD card, click on "Flash!"  The flash process can take some time, be patient as it validates and writes the image to your SD Card.</p>
</li>
</ol>
<img src="https://substackcdn.com/image/fetch/$s_!Q440!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcaa248cc-8cca-46bf-9394-c4db599d9ea5_300x178.png" alt="" style="display:block;margin:0 auto" />

<blockquote>
<p>Once this process has been completed, your SD card will have the latest Kali ARM image installed. Insert the SD card into the Pi400, and follow the bootup order instructions on the Raspberry Pi400.</p>
</blockquote>
<h4><strong>Kali Linux Interface Defaults</strong></h4>
<ol>
<li><p><a href="https://www.kali.org/">Kali</a> is a linux distribution that is primarily designed for ethical hacking. It was first released back in March 2013 and is still developed and maintained by <a href="https://www.offensive-security.com/">Offensive Security</a>.  If you are unaware of the Kali linux distribution I highly recommend doing research to learn more about the capabilities and features that exist within the distribution.</p>
</li>
<li><p>The Kali linux distribution for the Raspberry Pi comes with a GUI, so you are not required to interact with it purely using SSH, but that option is always available. Once you boot the Pi400, it will load the Kali operating system, you will be greeted by the following login screen.  You can use the default username "<strong>kali</strong>" and the password "<strong>kali</strong>" - all lowercase</p>
<img src="https://substackcdn.com/image/fetch/$s_!NQbt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F67540b57-69d5-48e6-9534-6af530cbe080_300x223.png" alt="" style="display:block;margin:0 auto" />
</li>
<li><p>Upon logging into Kali linux on your Raspberry Pi 400, you will land on the default desktop interface. From this interface, you can easily interact to find all the available applications that are installed on Kali by default. Feel free to explore kali to learn all the things Kali.</p>
</li>
<li><p>Also, remember the first thing you want to do after logging into your Raspberry Pi 400 is to change the default credentials from "kali" to your designated credentials. To do this, you will need to run the following command:</p>
<blockquote>
<p><strong>passwd</strong></p>
</blockquote>
<p>After, running this command, you will be prompted to change your current password on the current account you are authenticated into.</p>
</li>
<li><p>Now you are all setup and running kali on your Raspberry Pi400. Enjoy!</p>
</li>
</ol>
<h4><strong>References:</strong></h4>
<ul>
<li><p>[1]. Kali ARM linux Image - <a href="https://www.offensive-security.com/kali-linux-arm-images/">https://www.offensive-security.com/kali-linux-arm-images/</a></p>
</li>
<li><p>[2]. Raspberry Pi 400 - <a href="https://www.raspberrypi.org/products/raspberry-pi-400/">https://www.raspberrypi.org/products/raspberry-pi-400/</a></p>
</li>
<li><p>[3]. Etcher Flash Software by Balena - <a href="https://www.balena.io/etcher/">https://www.balena.io/etcher/</a></p>
</li>
<li><p>[4]. Kali Linux Distro - <a href="https://www.kali.org/">https://www.kali.org/</a></p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[Breaking Down Two Common Attack Techniques with CyberChef]]></title><description><![CDATA[What is CyberChef?
CyberChef is a simple, intuitive web application for analyzing and decoding data without having to deal with complex tools or programming languages.  It is also known as the “Cyber ]]></description><link>https://blog.portslug.com/breaking-down-two-common-attack-techniques-with-cyberchef</link><guid isPermaLink="true">https://blog.portslug.com/breaking-down-two-common-attack-techniques-with-cyberchef</guid><dc:creator><![CDATA[Portslug's Terminal]]></dc:creator><pubDate>Tue, 31 Mar 2020 14:00:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/uploads/covers/69d32adb40c9cabf448de22f/611cbf4a-cfe1-46e6-bd10-1a6a5a30481a.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<hr />
<h5><strong>What is CyberChef?</strong></h5>
<p>CyberChef is a simple, intuitive web application for analyzing and decoding data without having to deal with complex tools or programming languages.  It is also known as the “Cyber Swiss Army Knife” and encourages both technical and non-technical people to explore data formats, encryption and compression.</p>
<h5><strong>Why use CyberChef?</strong></h5>
<p>Data sets come in all shapes, sizes and formats in the modern digital landscape and CyberChef helps make sense of this data in an easy to use web application.</p>
<h5><strong>How does it work?</strong></h5>
<p>As stated above the CyberChef web application interface is very intuitive and straight forward.  It takes the trivial work out of complex data sets and quickly performs a wide range of data manipulation functions called “operations”. A sequence of operations is called a “Recipe”.</p>
<h5><strong>Useful Operations: (CyberChef has over 300+ Operations and is rapidly growing)</strong></h5>
<p><strong>From/To Hex</strong> <strong>Regular Expressions</strong> <strong>Strings</strong> <strong>All the Hashes</strong> <strong>From/To Base64</strong> <strong>XOR Brute Force</strong> <strong>Zip/Unzip</strong> <strong>Script Beautify</strong> <strong>URL Encode/Decode</strong> <strong>Encrypt/Decrypt</strong> <strong>Tar/Untar</strong> <strong>Render Image</strong> <strong>Decode Text</strong> <strong>HTTP Request</strong> <strong>Syntax Highlighting</strong> <strong>Extract EXIF</strong> <strong>CSV to JSON</strong> <strong>Public Key Conversions</strong> <strong>To/From Punycode</strong> <strong>Extract File paths</strong> <strong>JSON to CSV</strong> <strong>Detect Filetype</strong> <strong>Scan Embedded Files</strong> <strong>YARA Rules</strong></p>
<hr />
<h5><strong>CyberChef UI:</strong></h5>
<p>The user interface is very robust and powerful, I highly recommend hosting your own internal web app for private research and jumping in the public version to get a feel for the platform beforehand. Please see the screenshot below that outlines some of the high-level features.</p>
<img src="https://substackcdn.com/image/fetch/$s_!OwS7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c2c578c-49b6-4b18-8df0-9e3bec15ba28_300x142.png" alt="" style="display:block;margin:0 auto" />

<h5><strong>CyberChef Default Key Bindings:</strong></h5>
<p><strong>Command</strong> <strong>Shortcut (Win/Linux)</strong> <strong>Shortcut (Mac)</strong> Place cursor in search field Ctrl+Alt+f Ctrl+Opt+f Place cursor in input box Ctrl+Alt+i Ctrl+Opt+i Place cursor in output box Ctrl+Alt+o Ctrl+Opt+o Place cursor in first argument field of the next operation in the recipe Ctrl+Alt+. Ctrl+Opt+. Place cursor in first argument field of the nth operation in the recipe Ctrl+Alt+[1-9] Ctrl+Opt+[1-9] Disable current operation Ctrl+Alt+d Ctrl+Opt+d Set/clear breakpoint Ctrl+Alt+b Ctrl+Opt+b Bake Ctrl+Alt+Space Ctrl+Opt+Space Step Ctrl+Alt+' Ctrl+Opt+' Clear recipe Ctrl+Alt+c Ctrl+Opt+c Save to file Ctrl+Alt+s Ctrl+Opt+s Load recipe Ctrl+Alt+l Ctrl+Opt+l Move output to input Ctrl+Alt+m Ctrl+Opt+m Create a new tab Ctrl+Alt+t Ctrl+Opt+t Close the current tab Ctrl+Alt+w Ctrl+Opt+w Go to next tab Ctrl+Alt+RightArrow Ctrl+Opt+RightArrow Go to previous tab Ctrl+Alt+LeftArrow Ctrl+Opt+LeftArrow</p>
<h5><strong>How will we use it in the blog post?</strong></h5>
<p>The focus of this blog post is to show a brief overview of how CyberChef can aid in analysis when you are attempting to decode or decipher pieces of the puzzle.  Below is two example encoding techniques that are commonly utilized by attackers to evade detection.</p>
<h5><strong>Example 1 – Percentage-Based URL Encoding to Bypass Email Gateways in Phishing Attacks:</strong></h5>
<p>In this example breakdown it shows a percent-based URL encoded phishing email that is used to fool the basic URL and domain checks by perimeter devices that we often see threat actors utilize to deliver malicious payloads. We can utilize CyberChef to easily decode these phishing emails during analysis.</p>
<p>As you can see in code listed below, the true destination of the hyperlink is not immediately obvious to the untrained eye and the same holds true for many perimeter security gateways.  We see the URL percent-based encoding it being utilized to redirect us to a specific URL that is encoded in the first code snippet area labeled encoded URL. After decoding the URL encoding in CyberChef we can see the malicious redirect is actually pointing to a different domain in the decoded URL section.</p>
<p><strong>Encoded URL:</strong></p>
<blockquote>
<p>Hxxps://<a href="http://www.google.lv/url?q=%68%74%74%70%73%3A%2F%2F%67%64%61%6e%6b%2e%63%6f%6d%2F%6f%66%66%6c%63%65%2e%6f%2F%6d%69%63%72%6f%73%6f%66%74%2F%6f%66%66%69%63%65%&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNFP%5C_u6aiJIlXvPgImlhRFP0w5nYlg">www.google.lv/url?q=%68%74%74%70%73%3A%2F%2F%67%64%61%6e%6b%2e%63%6f%6d%2F%6f%66%66%6c%63%65%2e%6f%2F%6d%69%63%72%6f%73%6f%66%74%2F%6f%66%66%69%63%65%&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNFP\_u6aiJIlXvPgImlhRFP0w5nYlg</a></p>
</blockquote>
<p><strong>Decoded URL depicted in green above:</strong></p>
<blockquote>
<p>hxxps://gdank[.]com/offlce.o/microsoft/office%&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNFP_u6aiJIlXvPgImlhRFP0w5nYlg</p>
</blockquote>
<img src="https://substackcdn.com/image/fetch/$s_!Nfwv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1f7d7a4-2952-4fd0-a4f3-aa800f3647f4_300x106.png" alt="" style="display:block;margin:0 auto" />

<h5><strong>Example 2 - Ransomware using PowerShell to delete Shadow Copy:</strong></h5>
<p>In this example breakdown you will see a tactic that is commonly used in many PowerShell related attacks to evade detection.  Attackers often use base64 encoding to hide malicious attributes or strings within invoked PowerShell commands. As you can see below when the base64 is decoded you observe a command input that is utilizing PowerShell to delete shadow copies. Oftentimes these encoded PowerShell commands can be used to download malicious payloads or other nefarious actions.</p>
<p><strong>Encoded PowerShell command:</strong> </p>
<blockquote>
<p>[SYSMON EVENT TYPE 1 – RANSOMWARE USING POWERSHELL TO DELETE SHADOWCOPY]<br />Image C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe<br />CommandLine powershell -e</p>
<p><strong>RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==</strong><br />CurrentDirectory C:\Users\port\AppData\Local\Temp\<br />ParentImage C:\Users\port\AppData\Local\Temp\rpr1l7q0.exe<br />ParentCommandLine “C:\Users\port\AppData\Local\Temp\rpr1l7q0.exe”</p>
</blockquote>
<p><strong>Decoded base64 depicted in green above:</strong></p>
<blockquote>
<p>Get-WmiObject Win32_Shadowcopy | ForEach-Object {$_.Delete();}</p>
</blockquote>
<img src="https://substackcdn.com/image/fetch/$s_!peJy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3cac898d-ee77-4026-8003-88061dc07a82_300x106.png" alt="" style="display:block;margin:0 auto" />

<h5><strong>Conclusion</strong></h5>
<p>CyberChef is a powerful tool for any blue or red teamers arsenal.  The possibilities with CyberChef capabilities are endless. Researchers have utilized this tool to bake up some great recipes to include breaking down group policy preference password decryption, decoding and reversing strings and character substitutions, using Yara rules with deobfuscated malicious scripts and much more.  I highly recommend checking out CyberChef and trying to figure out ways it can enhance or fit into your analysis workflow.</p>
<p><strong>References:</strong></p>
<ul>
<li><p>[1].  CyberChef Project - <a href="https://gchq.github.io/CyberChef/">https://gchq.github.io/CyberChef/</a></p>
</li>
<li><p>[2]. Threat Actors Use Percentage-Based URL Encoding to Bypass Email Gateways -  <a href="https://cofense.com/threat-actors-use-percentage-based-url-encoding-bypass-email-gateways/">https://cofense.com/threat-actors-use-percentage-based-url-encoding-bypass-email-gateways/</a></p>
</li>
<li><p>[3].  Malware examples from our friends over at BroadAnalysis - <a href="https://broadanalysis.com/">https://broadanalysis.com/</a></p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[A Beginners Shodan Quest]]></title><description><![CDATA[What is Shodan:
Shodan is a search engine that allows researchers to explore and discover a wide range of devices that are connected to the internet, where they are located and who is using them. Shod]]></description><link>https://blog.portslug.com/a-beginners-shodan-quest</link><guid isPermaLink="true">https://blog.portslug.com/a-beginners-shodan-quest</guid><dc:creator><![CDATA[Portslug's Terminal]]></dc:creator><pubDate>Fri, 13 Mar 2020 14:00:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/uploads/covers/69d32adb40c9cabf448de22f/bd8a1caf-e8c8-475a-9e57-d0f9c967e8b9.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h4><strong>What is Shodan:</strong></h4>
<p>Shodan is a search engine that allows researchers to explore and discover a wide range of devices that are connected to the internet, where they are located and who is using them. Shodan is a very powerful reconnaissance tool that can be used to see the bigger picture of internet-connected/public-facing devices such as Smart TVs, refrigerators, Webcams, SCADA and much more [1]. Shodan has servers located around the world that crawl the internet 24/7 to provide the latest internet connected device intelligence.  Using this intelligence can tell you a wide array of information, like where devices are located geographically, what types of technology and versions are present on the devices discovered.</p>
<h4><strong>Why use Shodan:</strong></h4>
<p>Shodan is of particular use for security research that is focused around internet connected devices such as Internet of Things (IoT). The number of devices connected to the internet has surpassed 26+ billion worldwide according to Statista consumer data reports conducted in 2018 [2].  As IoT devices become more popular in our daily lives, we can expect these numbers to increase drastically over the next several years. The state of IoT connected devices are projected to grow 10% according to” iot-analytics” global research market breakdown [3].</p>
<img src="https://substackcdn.com/image/fetch/$s_!R6IY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70bfb448-b758-4805-9921-f0542096c3e4_624x369.png" alt="" style="display:block;margin:0 auto" />

<p>As we see internet-connected devices increase, Shodan can be a great reconnaissance tool for researchers and organizations alike.  This search engine can help organizations discover internet-connected devices and provide global insight into an organization attack surface.  Also, with Shodan’s vast internet-scale data researchers can conduct large scale research quickly. This is one of my go-to tools when conducting attack surface profiling.</p>
<h4><strong>Getting Started with Shodan</strong></h4>
<h5><strong>Basic Shodan UI Overview</strong></h5>
<p>The new Shodan UI is broken down into two primary columns, the left column focuses on several core areas such as total results returned, top ports, organizations, products and operating systems discovered.</p>
<img src="https://substackcdn.com/image/fetch/$s_!PxNV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a0d04ee-db1a-4b43-9fff-9f84dfada393_478x898.png" alt="" style="display:block;margin:0 auto" />

<p>The center column focuses on the data returned based on the search query filter. This area brings back the specific details related to returned results such as the IP address, location, technology, organization, certificates, response codes and other important information.</p>
<img src="https://substackcdn.com/image/fetch/$s_!uecw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ae18aa6-6c0c-497d-bdda-0062c6433130_1024x787.png" alt="" style="display:block;margin:0 auto" />

<p>If you click on a specific IP address/hostname within Shodan, it will drill into a full information view that breaks down the raw data into sections based on General Information, Web Technologies, Vulnerabilities, Open Ports, etc.  The Shodan website UI is very intuitive and user-friendly.  If you have issues or want to learn more about the Shodan UI you can visit the help navigate the website at the following link: <a href="https://help.shodan.io/the-basics/navigating-the-website">https://help.shodan.io/the-basics/navigating-the-website</a></p>
<h5><strong>Shodan Basic Filters &amp; Syntax</strong></h5>
<p>Below is a list of general search filters that can be utilized for the Shodan search engine. In addition to general search filters, combinations and customized search queries can be performed to get more granular search results faster. See example filters and searches area below.</p>
<h6><strong>Basic search filters you can use:</strong></h6>
<ul>
<li><p><code>city:</code> search for devices in a particular city by using the name of the city</p>
</li>
<li><p><code>country:</code> search for devices in a particular country by using 2-letter country code</p>
</li>
<li><p><code>http.title:</code> search for the title of the website</p>
</li>
<li><p><code>net:</code> search based on an IP or /x CIDR</p>
</li>
<li><p><code>org:</code> search for the name of the organization that owns the IP space</p>
</li>
<li><p><code>geo:</code> discover devices via geo coordinates (longitude/latitude)</p>
</li>
<li><p><code>hostname:</code> searches values that match a specified hostname</p>
</li>
<li><p><code>os:</code> search based on operating system discovered</p>
</li>
<li><p><code>port:</code> search for exposed ports that are open and running services</p>
</li>
<li><p><code>product:</code> search for the name of a product or technology stack</p>
</li>
</ul>
<blockquote>
<p> **“**All filter references can be found documented on the Shodan website at [5]: <a href="https://beta.shodan.io/search/filters.%E2%80%9D">https://beta.shodan.io/search/filters.<strong>”</strong></a></p>
</blockquote>
<h6><strong>Example Filters &amp; Searches</strong></h6>
<ul>
<li><p>Discover Apache products: <code>product:Apache</code><br />Discover Webcams: <code>Server: SQ-WEBCAM</code></p>
</li>
<li><p>Discover Windows XP Operating System in San Francisco: <code>city:"San Francisco" os:"Windows XP"</code></p>
</li>
<li><p>Discover RDP exposed in New Orleans: <code>city:"New Orleans" port:3389</code></p>
</li>
<li><p>Discover exposed Citrix NetScaler’s: <code>http.waf:”Citrix NetScaler”</code></p>
</li>
<li><p>Discover Elastic Search host: <code>port:9200 all:"indices" all:"production"</code></p>
</li>
<li><p>Discover Routers with Default Credentials: <code>"admin+1234"</code></p>
</li>
</ul>
<blockquote>
<p><strong>Report &amp; Data Exports:</strong>  You can create reports or export your search results in Shodan by clicking on “create report” or “download results” to export data based on your needs. The download results allow you to export data as CSV, JSON or XML.</p>
</blockquote>
<h6><strong>New Features:</strong></h6>
<ul>
<li><p><strong>New Beta Search Engine:</strong> Shodan beta search engine adds additional intelligence across the search platform.  It gives more data-drive view of the technology and vulnerabilities that could be impacted on the devices discovered in a newer UI interface [6].</p>
</li>
<li><p><strong>Shodan Monitor:</strong> Shodan network monitor allows an organization to keep track of the devices that they have exposed to the internet. You can easily setup monitoring and notifications to show complete visibility into what you have connected [7].</p>
</li>
<li><p><strong>Shodan Exploits:</strong> Shodan exploits is a search engine that pulls known exploits back to from several sources such as ExploitDB and Metasploit in an easy to navigate UI [8].</p>
</li>
</ul>
<h6><strong>References:</strong></h6>
<ul>
<li><p>[1].  You should also check out shodan at <a href="https://www.shodan.io/">https://www.shodan.io/</a>, and the blog at <a href="https://blog.shodan.io">https://blog.shodan.io</a>.</p>
</li>
<li><p>[2].  Statista, 2019 reporting - <a href="https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/">https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/</a></p>
</li>
<li><p>[3].  State of the IoT 2018: Number of IOT devices connected and accelerating growth metrics - <a href="https://iot-analytics.com/state-of-the-iot-update-q1-q2-2018-number-of-iot-devices-now-7b/">https://iot-analytics.com/state-of-the-iot-update-q1-q2-2018-number-of-iot-devices-now-7b/</a></p>
</li>
<li><p>[4].  Shodan help navigate the website - <a href="https://help.shodan.io/the-basics/navigating-the-website">https://help.shodan.io/the-basics/navigating-the-website</a></p>
</li>
<li><p>[5].  Shodan Filter references - <a href="https://beta.shodan.io/search/filters">https://beta.shodan.io/search/filters</a></p>
</li>
<li><p>[6]. Shodan Beta Search - <a href="https://monitor.shodan.io/">https://monitor.shodan.io/</a></p>
</li>
<li><p>[7]. Shodan Monitor - <a href="https://beta.shodan.io/">https://beta.shodan.io/</a></p>
</li>
<li><p>[8]. Shodan Exploits - <a href="https://exploits.shodan.io/">https://exploits.shodan.io/</a></p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[Reducing an Organizations Email Attack Surface]]></title><description><![CDATA[In today’s cyber landscape threats are evolving on a daily basis.  There are many ways to reduce your company’s attack surface.  A simple way to reduce a company’s email attack surface is by blocking ]]></description><link>https://blog.portslug.com/reducing-an-organizations-email-attack-surface</link><guid isPermaLink="true">https://blog.portslug.com/reducing-an-organizations-email-attack-surface</guid><dc:creator><![CDATA[Portslug's Terminal]]></dc:creator><pubDate>Thu, 15 Aug 2019 14:00:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/uploads/covers/69d32adb40c9cabf448de22f/2366db28-e443-4249-8116-004a50a0d76c.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In today’s cyber landscape threats are evolving on a daily basis.  There are many ways to reduce your company’s attack surface.  A simple way to reduce a company’s email attack surface is by blocking incoming file types.  Email attachments frequently contain malicious content that are delivered to organization’s end-users. These inbound attachments can contain numerous types of malicious files (ransomware, ZIP attachments with SCR scripts, .exe, Macros, VBscripts, etc.).</p>
<p>To block incoming file types see methods and policies outlined below.</p>
<p>It is important to spend some time testing these rules before implementing any policies in your organization and do so with caution! In some cases clients have had all of their mail blocked when using some methods and these policies can take hours to propagate across an organization. This is why testing rules before implementation is HIGHLY recommended.</p>
<p><strong>Office 365</strong> – Block Incoming File Types (Instructions)</p>
<ul>
<li><p>Log into your office 365 “Administrator portal”</p>
</li>
<li><p>From the top bar, select, "Admin", then select "Exchange"</p>
</li>
<li><p>From the Left Side bar, select "Mail Flow"</p>
</li>
<li><p>From the top bar select "Rules"</p>
</li>
<li><p>Click on the "+" icon and select "Create A New Rule"</p>
</li>
<li><p>First, Click on the "More Options" link at the bottom of the screen</p>
</li>
<li><p>Back, to the top of the screen, In the "Name" box, give the rule a name, Something like Incoming "Incoming Executable Extension Block Rule"</p>
</li>
<li><p>From the "Apply this rule if..." drop down box, hover the mouse over "Any attachment" and from the pop out box, select "file extension includes these words"</p>
</li>
<li><p>In the "Specify words or phrases" box, enter each extension you wish to block individually and without a . in front of the extension and click the "+" icon after each (A sample list is below) - To remove one, select the extension and use the "-" icon. - Once complete, select "OK"</p>
</li>
<li><p>Next, from the "Do the following." drop down box, hover the mouse over "Block the message" and form the pop out box, select any applicable action. The best one to use is "reject the message and include an explanation" - you will be asked to specify a rejection reason, here you would typically have a basic explanation "Our organization does not permit certain attachments, for more information email <a href="mailto:helpdesk@companyxyz.com">helpdesk@companyxyz.com</a>" or whichever email provides support at your organization.</p>
</li>
<li><p>Next, you can if you wish further configure the rule for exceptions and auditing, this is not necessary but optional. When finished click on the "save" button.</p>
</li>
<li><p>It will take some time for the rules to propagate and come into effect, typically leave it about an hour before testing from an external email account.</p>
</li>
</ul>
<p><strong>Exchange</strong> – Blocking incoming File Types (Instructions)</p>
<ul>
<li><p>Sign in to the “Exchange Admin Center”</p>
</li>
<li><p>Go to Mail Flow &gt; Rules</p>
</li>
<li><p>Select <strong>+</strong> (New) and then select <strong>create new rule</strong>.</p>
</li>
<li><p>In the <strong>Name</strong> box, specify a name for the rule and then select “<strong>More Options</strong>”.</p>
</li>
<li><p>Select the conditions and actions you want.</p>
</li>
</ul>
<blockquote>
<p><strong>These file types are intended as a sample only and not a recommendation as to what you should block at your own organization. As stated in the above article; please use with caution and testing is <em>HIGHLY recommended</em>.</strong></p>
</blockquote>
<p><strong>Files Types</strong> – (Sample File Types)</p>
<p>.asp</p>
<p>.bat</p>
<p>.cmd</p>
<p>.crt</p>
<p>.csh</p>
<p>.dll</p>
<p>.exe</p>
<p>.exe+</p>
<p>.gadget</p>
<p>.hlp</p>
<p>.hta</p>
<p>.inf</p>
<p>.js</p>
<p>.mag</p>
<p>.mam</p>
<p>.maq</p>
<p>.mar</p>
<p>.mas</p>
<p>.mat</p>
<p>.mau</p>
<p>.mav</p>
<p>.maw</p>
<p>.mda</p>
<p>.mdb</p>
<p>.mde</p>
<p>.mdt</p>
<p>.mdw</p>
<p>.mdz</p>
<p>.msc</p>
<p>.msi</p>
<p>.pif</p>
<p>.reg</p>
<p>.scf</p>
<p>.scr</p>
<p>.tmp</p>
<p>.vb</p>
<p>.vbe</p>
<p>.vbs</p>
<p>.vsmacros</p>
<p>.wsf</p>
<p>References:</p>
<p><a href="https://support.office.com/en-us/article/Blocked-attachments-in-Outlook-3811cddc-17c3-4279-a30c-060ba0207372">https://support.office.com/en-us/article/Blocked-attachments-in-Outlook-3811cddc-17c3-4279-a30c-060ba0207372</a></p>
<p><a href="http://social.technet.microsoft.com/wiki/contents/articles/24715.office-365-block-incoming-attachments-cryptolocker-and-other-email-transit-virus.aspx">http://social.technet.microsoft.com/wiki/contents/articles/24715.office-365-block-incoming-attachments-cryptolocker-and-other-email-transit-virus.aspx</a></p>
<p><a href="http://nickwhittome.com/2014/10/16/blocking-executable-attachments-even-in-zip-files-on-office-365/">http://nickwhittome.com/2014/10/16/blocking-executable-attachments-even-in-zip-files-on-office-365/</a></p>
<p><a href="https://technet.microsoft.com/en-us/library/jj919236(v=exchg.150).aspx">https://technet.microsoft.com/en-us/library/jj919236(v=exchg.150).aspx</a></p>
]]></content:encoded></item><item><title><![CDATA[Prt.2 – How to Setup MouseJack and JackIt!]]></title><description><![CDATA[MouseJack Setup
This blog will focus on setting up MouseJack on the Crazyradio by flashing the firmware.  Inorder to do this follow the steps below.
The hardware required is a Crazy Radio – \(28 - \)3]]></description><link>https://blog.portslug.com/prt-2-how-to-setup-mousejack-and-jackit</link><guid isPermaLink="true">https://blog.portslug.com/prt-2-how-to-setup-mousejack-and-jackit</guid><dc:creator><![CDATA[Portslug's Terminal]]></dc:creator><pubDate>Fri, 19 Apr 2019 14:00:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/uploads/covers/69d32adb40c9cabf448de22f/f4841f38-1892-46df-ab49-b4dcbdc7ba13.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>MouseJack Setup</strong></p>
<p>This blog will focus on setting up MouseJack on the Crazyradio by flashing the firmware.  Inorder to do this follow the steps below.</p>
<p>The hardware required is a Crazy Radio – \(28 - \)35 USD</p>
<p>Go to github:  <a href="https://github.com/BastilleResearch/mousejack/">https://github.com/BastilleResearch/mousejack/</a></p>
<p><em>***Please see the Bastille github pages for the latest release and updates related to MouseJack Research and installation documentation.</em></p>
<p><strong>The First steps are Install dependencies on Ubuntu:</strong></p>
<blockquote>
<p>sudo apt-get install sdcc binutils python python-pip</p>
<p>sudo pip install -U pip</p>
<p>sudo pip install -U -I pyusb</p>
<p>sudo pip install -U platformio</p>
</blockquote>
<img src="https://substackcdn.com/image/fetch/$s_!-Our!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d0eacd8-0cfe-4dca-8554-91f7a7a7d4b5_300x123.png" alt="" style="display:block;margin:0 auto" />

<img src="https://substackcdn.com/image/fetch/$s_!T6YC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7084f1dc-8cb7-4155-95a6-d697eeab419f_300x85.png" alt="" style="display:block;margin:0 auto" />

<p>The following hardware has been tested and is known to work and is the current supported hardware list at the time of this blog.</p>
<ul>
<li><p>*CrazyRadio PA USB dongle (We are using CrazyRadio for this test)</p>
</li>
<li><p>SparkFun nRF24LU1+ breakout board</p>
</li>
<li><p>Logitech Unifying dongle (model C-U0007, Nordic Semiconductor based)</p>
</li>
</ul>
<p><strong>Second step is to initialize the Submodule:</strong></p>
<blockquote>
<p>git submodule init</p>
<p>git submodule update</p>
</blockquote>
<img src="https://substackcdn.com/image/fetch/$s_!sOuh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85e81b0e-82ac-4672-92cd-457844b24c20_300x37.png" alt="" style="display:block;margin:0 auto" />

<img src="https://substackcdn.com/image/fetch/$s_!Ugys!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbfd93fb6-61ab-42f8-9502-9064ed2bd6c1_300x44.png" alt="" style="display:block;margin:0 auto" />

<p><strong>Third step is to Build the fireware:</strong></p>
<blockquote>
<p>cd nrf-research-firmware</p>
<p>make</p>
</blockquote>
<img src="https://substackcdn.com/image/fetch/$s_!b-yE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8f57f41-7992-4ac6-8062-9ef0204c873e_300x115.png" alt="" style="display:block;margin:0 auto" />

<p><strong>Fourth step is to Flash over USB:</strong></p>
<p>nRF24LU1+ chips come with a factory programmed bootloader occupying the topmost 2KB of flash memory. The CrazyRadio firmware and RFStorm research firmware support USB commands to enter the Nordic bootloader.</p>
<p>Dongles and breakout boards can be programmed over USB if they are running one of the following firmwares:</p>
<ul>
<li><p>Nordic Semiconductor Bootloader</p>
</li>
<li><p>CrazyRadio Firmware</p>
</li>
<li><p>RFStorm Research Firmware</p>
</li>
</ul>
<p><strong>To flash the firmware over USB:</strong></p>
<blockquote>
<p>cd nrf-research-firmware</p>
<p>sudo make install</p>
</blockquote>
<img src="https://substackcdn.com/image/fetch/$s_!g3Yg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F454abd01-7cd0-472b-8cc2-ce8639b5e1c2_300x52.png" alt="" style="display:block;margin:0 auto" />

<img src="https://substackcdn.com/image/fetch/$s_!ngdD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0295c46d-796d-42aa-9542-b37c0c08d170_300x93.png" alt="" style="display:block;margin:0 auto" />

<blockquote>
<p>To get additional information on MouseJack capabilities and tools visit the github listed above.</p>
</blockquote>
<p>Once your CrazyRadio PA is ready, you can launch JackIt via:</p>
<blockquote>
<p>sudo jackit</p>
</blockquote>
<p><strong>JackIt Setup—</strong></p>
<p>After installing the firmware, you can install JackIt via:</p>
<blockquote>
<p>git clone <a href="https://github.com/insecurityofthings/jackit.gitcd">https://github.com/insecurityofthings/jackit.gitcd</a> jackitpip install -e .</p>
</blockquote>
<img src="https://substackcdn.com/image/fetch/$s_!NEMZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1d9b634-5ccf-40b7-bf5a-8a520676deee_300x67.png" alt="" style="display:block;margin:0 auto" />

<img src="https://substackcdn.com/image/fetch/$s_!tSl_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F706bce0d-cfa1-48d8-bf21-09dbc7743f04_300x131.png" alt="" style="display:block;margin:0 auto" />

<p>Once your CrazyRadio PA is ready, you can launch JackIt via:</p>
<blockquote>
<p>sudo jackit</p>
</blockquote>
<img src="https://substackcdn.com/image/fetch/$s_!O_Mf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9532d11f-79f0-473f-ac26-6e76b6b35d6f_300x129.png" alt="" style="display:block;margin:0 auto" />

<p><strong>Prt.3 – How to Attack Vulnerable Peripherals with MouseJacking! - (Coming Soon!)</strong></p>
<p>Published by @portslug &amp; @Wolfe409</p>
<p><strong>References</strong>:</p>
<p><a href="https://github.com/BastilleResearch/mousejack/">https://github.com/BastilleResearch/mousejack/</a></p>
<p><a href="https://github.com/insecurityofthings/jackit">https://github.com/insecurityofthings/jackit</a></p>
]]></content:encoded></item><item><title><![CDATA[Prt.1 – MouseJacking is a Dangerous Threat if your Wireless Peripherals are Vulnerable!]]></title><description><![CDATA[What is MouseJacking?
MouseJack is a class of vulnerabilities that affects the vast majority of wireless, non-Bluetooth keyboards and mice (Bastille, 2016). These peripherals are 'connected' to a host]]></description><link>https://blog.portslug.com/prt-1-mousejacking-is-a-dangerous-threat-if-your-wireless-peripherals-are-vulnerable</link><guid isPermaLink="true">https://blog.portslug.com/prt-1-mousejacking-is-a-dangerous-threat-if-your-wireless-peripherals-are-vulnerable</guid><dc:creator><![CDATA[Portslug's Terminal]]></dc:creator><pubDate>Mon, 15 Apr 2019 14:00:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/uploads/covers/69d32adb40c9cabf448de22f/e1caf978-7165-49c0-bc30-0fb114df947e.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>What is MouseJacking?</strong></p>
<p>MouseJack is a class of vulnerabilities that affects the vast majority of wireless, non-Bluetooth keyboards and mice (Bastille, 2016). These peripherals are 'connected' to a host computer using a radio transceiver, commonly a small USB dongle (Bastille, 2016). Since the connection is wireless, and mouse movements and keystrokes are sent over the air, it is possible to compromise a victim's computer by transmitting specially-crafted radio signals using a device which costs as little as $15.</p>
<p>An attacker can launch the attack from up to 100 meters away. The attacker is able to take control of the target computer, without physically being in front of it, and type arbitrary text or send scripted commands (Bastille, 2016). It is therefore possible to perform rapidly malicious activities without being detected. The MouseJack exploit centers around injecting unencrypted keystrokes into a target computer (Bastille, 2016). Mouse movements are usually sent unencrypted, and keystrokes are often encrypted (to prevent eavesdropping what is being typed). However the MouseJack vulnerability takes advantage of affected receiver dongles, and their associated software, allowing unencrypted keystrokes transmitted by an attacker to be passed on to the computer's operating system as if the victim had legitimately typed them(Bastille, 2016).</p>
<p><strong>Bastille MouseJack Youtube Video:</strong></p>
<p><a href="https://youtu.be/3NL2lEomB_Y">https://youtu.be/3NL2lEomB_Y</a></p>
<p><strong>What should you do to protect yourself?</strong></p>
<ul>
<li><p><strong>Do not use a vulnerable peripheral that this attack can be carried out against</strong>. <em>You should check your product vendor to make sure you are not using a vulnerable device.  Bastille has a list of vulnerable devices that it knows about on the website in the references section below. Also keep firmware updated on peripheral devices.</em></p>
</li>
<li><p><strong>Always lock your computer when you step away</strong>. <em>This should be done regardless of mousejacking threats as this should be best practice.</em></p>
</li>
<li><p><strong>Do not allow unauthorized USB devices in the environment</strong>. <em>There are many device control products in the market that allow you to whitelist specific devices and block access to unauthorized devices.</em></p>
</li>
</ul>
<p><a href="https://blog.portslug.com/prt-2-how-to-setup-mousejack-and-jackit"><strong>Prt.2 – How to Setup MouseJack and JackIt.</strong></a></p>
<p>Published by @portslug &amp; @Wolfe409</p>
]]></content:encoded></item></channel></rss>