Silicon Shecky

Infosec Practitioner

  • About
  • Categories
    • General
    • Computers
    • Software
    • Rants
    • Security
    • Internet/Music
    • Reviews
    • Microsoft
    • Hardware
    • Mobile Computing
  • Links
    • Infosec
      • Burbsec
      • Infosec Exchange Mastodon
      • Hacks4Pancakes Blog
      • Krebs On Security
      • Bleeping Computer
  • Archives

Connect

  • Bluesky
  • LinkedIn
  • Mastodon
  • RSS
  • Twitter

[footer_backtotop]

Copyright © 2025 ·Sixteen Nine Pro Theme · Genesis Framework by StudioPress · WordPress

Time changes things

October 5, 2017 By Michael Kavka Leave a Comment

The title says it all, time changes things. Communities change, adjust, split and reform. Your perspective changes as you wind up with more filters from more experiences. With all that has been going on in the infosec world, I think a non-technical article, a look at how things can and do change is relevant. All that follows is my opinions based on my observations.

There is a powder keg slowly exploding across the infosec community. Harassment, fragmentation, bullying, making fun of, changes to the way people view us and how we view ourselves. The infosec community has grown a lot over the years. Just take a look at not only attendance numbers for Defcon, Shmoocon, Derbycon and the other conferences out there, but look at how many conferences have come into being. As information security has become more relevant, the amount of people in it have increased. the first generation has given way to the second and third generation. Natural progression changes ones point of view. Adapt or become irrelevant.

I am not a Jack Daniel or Jeff Man, I do not have the honor of being well known or respected. Even with my age, I am not sure which generation of professionals I would fall into, but I love what I do, and have been impressed with the portion of the infosec community that I know. I have noticed a lot of issues with the community at large though. These issues have been growing over time, and I see it through various places, Twitter, Podcasts, meetups, and conferences. I am judging, because no matter what, that is what we all do. We cannot stop judging, that is what an opinion is, a judgement. I do what I can to stay neutral, to try and understand both sides, but it is hard. Now, lets start by looking at something that seems not related.

Ever look at a children in different stages of their life? If you can, go and watch a 0-2 year old for a while. It is even better if you can watch the same one every couple of months as they age. Watcher their wonderment, how open they are to things. How curious they are about everything, and how non-judgemental they tend to be. Race, gender, none of it matters to them. The try and learn, experimenting for the way to get something done. Sort of like the young person just getting into hacking/information security.

As that child grows, between nature and nurture, their world expands and their view on the world shrinks. Experiences, how others look at things around them, and what they are taught take hold. The wonderment disappears. Judgements become more serious. Friendships are formed and disappear, sometimes for good reasons, sometimes not. They integrate into society, after all we are communal creatures. The more information they have the more filters are put into their head about things until perspectives seem to become natural to them. Some see things and they want to change them for the better. Others want to maintain the status quo. Society itself changes around them. What was once acceptable might not be anymore. They are stuck though trying to change what has become their nature, or they go the way of, accept me as I am warts and all. This does not excuse them, but is just a fact. They tend to group with people who are more accepting of them, and put up defense mechanisms to keep their ego somewhat safe. It is part of being a person. It takes work to break that.

That sums up the basic idea of change over the years for a person, but how does this relate to the infosec community? Lets look at those last couple of lines though. We tend to group with those who are like minded.

I have and am in many different communities. some larger than others, some no longer exist or have changed a lot over the years and are not what they once were. All of them have fractured or become cliquish. An example is the local theatre community I am part of. The theatre I do most of my work with right now has its factions. The membership is small, but it has its cliques. People who are like minded gravitate toward each other. We still all work together to make some cool productions happen. We try to bring in new people to add onto our community and ensure the survival of it, but in the end not everyone agrees with each other, and not everyone likes each other. Still the group has continued on for 57 years, even with this splintering, the cliques that have formed and the disagreements that have been had. The larger community in the metro area looks at each theatre as its own clique. Some are harder to get into than others, some don’t like outsiders. This is what happens as groups increase in size. It does not mean the whole community cannot come together, for instance in helping raise money for relief in Puerto Rico, but it does mean cliques. They have always existed in our community, read team, blue team, dev, ops, noobs, kiddies and more. It take effort to overcome these stigmas, and some, maybe more that I realize, will float between groups. The more specialized we become the more tendency to be part of a smaller group of the whole.

Then there are the other issues that divide us. Harassment is the largest of them. I don’t have an answer for that. Some people are just going to harass others. The larger the group, the more chance there is for harassment. All we can do is report and try to stop it. Harassment I honestly feel comes from inferior feelings or wanting to be the center of attention. Some of it might just be trolling. The long term effect though scares people away from not only community events, but the field all together.

Speaking of the need to be superior, people get picked on for going for different certs. The CISSP is looked down upon by a lot of the community, yet it is something that does help in the long run, if for no other reason than it gets you past the HR guardians when job searching. SANS is one of the gold standards, but a new person, unless they have saved a decent amount of money, is not going to be able to afford that sort of training. We pick on people who were at companies that have been breached. We don’t know the full story, but we rip the hell out of these people. We are all jaded by our own experiences, our own perceptions and are all socially engineered by the masses constantly. Social Media is a wonderful tool, but like any tool it has up and downsides.

The best way that I can think of to help overcome some of these issues is to talk about them. Straight up, respectfully talk about them. That means listening and trying to understand what the opposite view is, even when the opposite view is obviously wrong. We have to get out of the habit of just flaming at each other. We have to get back into the habit of being in wonder and curious of the world around us. Most importantly, we have to realize that not only are we wrong at times, but being wrong or making mistakes is the way we learn. Passing on our knowledge is the way we survive, and just like we have to do with the technological aspect of infosec, we have to constantly adapt and learn from the changing social world around us, or we are going to be irrelevant.

Filed Under: Rants

Random Stuff for the week ending 9-30-17

September 29, 2017 By Michael Kavka Leave a Comment

Since I don’t have a single topic to write about I figure some thoughts, ideas and endorsements/suggestions would be a nice change of pace.

I have to wonder at what point we reach oversaturation on data breaches (if we haven’t already) to the point where people shrug their shoulders and go meh. I have to think we are close, especially in a month where we have had Equifax, Deloitte, and Whole Foods announcing they have been popped. I also have to wonder when we will stop jumping the gun on attribution, as it tends to make the whole industry look like we do not know what we are talking about. Wait till we have enough facts to do things proper.

Along the same lines as the attribution situation, I have really started to notice how many people bitch about a problem, say passwords, but offer no ideas on how to fix the problem. Passwords for example, I will hear MFA(or 2FA) as the solution, but what are the multiple factors then? Again, it is easy to bitch about something, but much harder to offer a viable solution, especially one that can be adopted by the every day person.

I want to give a great shout out to the Brakeing Down Security Podcast and Slack for it. I had done a 6 week Powershell for DFIR training class through the group, and found it awesome (they got Mick Douglas to teach it). The Slack has many channels in it for chatting about different aspects of the infosec Community including a Jobs Board, career advice area, powershell, Malware, and much more. Bryan Brake, Amanda Berlin, and Brian Boettcher put out a fantastic security focused podcast. I highly recommend listening to it. Also there is the Book Club in the Slack which right now is covering “Cyber Operations: Building, Defending, and Attacking Modern Computer Networks”. We do a live voice chat every other week on the chapter(s) decided on prior. The live chat this week made me realize how much about Active Directory I actually do know, and how much I still have left to learn (Azure, Federated Services and more).

Those in the Chicago area or those visiting, Burbsec is still going strong. 4 different locations, a different one each week. Burbsec East just changed where it is being located and the first night at the new venue went fantastic. Come on out and be social with us!

That covers this randomness, have a great day!

Filed Under: Security Tagged With: InfoSec, Security

First time for everything

September 14, 2017 By Michael Kavka Leave a Comment

On Tuesday, September 12, 2017 4PM CST, my manager gave me a document called KB1243-Critical-Install.docx to analyze. This document is a self executing zip file using a docx type, with an embedded OLE binary object that executes, contacts an external site, and downloads a payload. I ended my analysis about 11AM CST 9-13-2017. Below is a more detailed explanation of how I came to these conclusions.

 

Detailed Analysis

Initially, I took the file straight into a Kali VM that I use for checking potentially malicious items. Trying to just open the docx file gave me an archiver error due to the file type. This led me to open a terminal and do an unzip on the file using the following unzip KB1243-Critical-Install.docx. Unzipping gave me 3 directories and an XML file:

The folder docProps gave me 2 xml files, the directory _rels was empty, but the word directory was where the real fun began. Inside this directory I saw the following:

The media folder contained 3 images and an emf file, with one of the images being the company logo and the other being an image of a security warning screen:

The real finding was in the embeddings folder which had one item in named oleObect1.bin which raised my suspicions even more.

The next step was to see what was contained inside this binary file. A little research turned up a piece of free software called oledump. It is a python program, “oledump.py is a program to analyze OLE files (Compound File Binary Format). These files contain streams of data. oledump allows you to analyze these streams.” Perfect. Once I downloaded oledump onto my Kali VM I ran it against the full docx file. The results were:

The A2 stream would be what I was looking for, as the A1 was a header and A3 was just info on the object itself. The Size and the O marking (for object) are the tip off. This prompted me ot do the following command:

So it would not give me the information using oledump that I was looking for, but I knew I was onto something. I decided to go old school and just cat the oldObject1.bin file to see if I would get anything of interest.

There are some interesting items in there. The padded opening states that it is an Ole10Native object. Then there was this line:

OLE PackagPackage?9?q@?KB1243-Install.batC:\Users\brikut01\Desktop\KB1243-Install.bat8C:\Users\brikut01\AppData\Local\Temp\KB1243-Install.batstart /b powershell -noP -sta -w 1 –enc

So this file first off is going to run a Bat file, that was at one point on a user named brikut01’s machine (username is not in our AD therefore is something on the creators side) . This also starts powershell from a command line with NoProfile (-noP), a single thread (-sta), the –w 1 hides the session and the –enc which accepts base-64 encoded string version of a command. The Encoding makes sense considering the long obfuscate string following ends in == which is a tell tale sign of base64 encoding. The last line deletes the .bat file itself thereby trying to leave no trace.

Thankfully there are tools to decode base64 encoding. Using one of these tools it revealed the following:

This boils down to setting a Group Policy to stop logging, what is an AMSI (Assembly Management System) bypass, grabbing the default web proxy credentials, setting a cookie, and putting it all together to send to an IP address via http so it can be tracked and download something from the IP address. I did not download the payload to see what it was. The final 3 letters, iex invokes the expression.

I checked on the IP address and found it pointed to VPS. I was later given 2 more files to look at which used the same code, but different IP addresses to the same VPS.

 

Update: Trying to get the file this was supposed to download came back with a 500 error from the server.

Filed Under: Security Tagged With: Analysis, Malware

  • « Previous Page
  • 1
  • …
  • 24
  • 25
  • 26
  • 27
  • 28
  • …
  • 248
  • Next Page »

RSS Taggart Institute Intel Feed

  • Uncovering Qilin attack methods exposed through multiple cases October 27, 2025 Takahiro Takeda
  • ISC Stormcast For Monday, October 27th, 2025 https://isc.sans.edu/podcastdetail/9672, (Mon, Oct 27th) October 27, 2025
  • Shaq's new ride gets jaq'ed in haq attaq October 26, 2025 Brandon Vigliarolo
  • The Kavanaugh stop, 50 days later October 26, 2025 Chris Geidner
  • Kaitai Struct WebIDE, (Sun, Oct 26th) October 26, 2025
  • [REVIVE-SA-2025-002] Revive Adserver Vulnerability October 26, 2025
  • [REVIVE-SA-2025-001] Revive Adserver Vulnerability October 26, 2025
  • New CoPhish attack steals OAuth tokens via Copilot Studio agents October 25, 2025 Bill Toulas
  • What Really Doomed Napoleon’s Army? Scientists Find New Clues in DNA October 25, 2025 Becky Ferreira
  • MPs urge government to stop Britain's phone theft wave through tech October 25, 2025 Lindsay Clark

Browse by tags

Active Directory Android Antivirus Apple Beta Chrome Computers Exchange Exchange 2007 Firefox General Thoughts Google InfoSec Internet Explorer iOS iPad IT Linux Mac Malware Microsoft OS OSx Patches Rants SBS SBS 2008 Security Security Patches Server SMB Software Support Surface TechEd Tweets Ubuntu Verizon Virus Vista vulnerabilities Windows Windows 7 Windows 8 XP