The Matrix of the brain

There’s a line in The Matrix that escapes me, it’s where Neo or someone asks Trinity if she knows how to pilot a specific type of helicopter. She replies that she will in a moment as that knowledge is downloaded directly into her brain. If only.

The real world doesn’t work like that. Not quite. But you can still download knowledge into your brain, only it takes a little longer. Yet it amazes me how many people don’t bother learning stuff any more. To actively seek out new knowledge.

I enjoy learning. I’m an autodidact. I think that’s the right word. Essentially I just keep teaching myself stuff. I love the process. You can teach an old dog new tricks and I teach myself every day.

I love comparing the me after to the me before. This morning I know nothing about a particular subject but I’ve gathered some books, articles, or web resources together and I’m ready to learn. Then at the end of the day, or week, or however much time I’ve allocated to learning about the new subject, I look back at what I now know that I didn’t before. I’ve downloaded new knowledge and information into my head. Stuff I didn’t know before that I do now. I think that’s cool.

I’ll think about what I’ve learned and combine it with other things I know and my brain will sort out all the connections like a Neo4J database. Only this database is big with limitless capacity. At least I’ve not hit any discernible limits yet.

What shall I learn today?

Who called me

Who called me

When you work with computers and possess at least one certification in cyber security, you tend to have friends or family that call or message you on occasion asking you to trace a phone number for them as if you are some form of digital private eye.

The truth is that only the authorities with the assistance of the telecom providers can legally do that. All these websites that say they can trace any number in the world for you are lying. They are just scams after your money. At best they have scraped open source content for numbers and can tell you the network provider, country of origin, and anything that is available online for free. Maybe they’ve concatenated and absorbed phone directories and public domain phone number repositories. They certainly can’t trace an unlisted number for you.

That said, if the number does have a footprint of some kind in the public domain then there are ways of finding it. Using Google Dorking to scour search engine data may uncover something useful. Governmental company registration databases that are open to the public may also reveal data. Whois records, club memberships, company websites, etc.

The phone number is just a character string. Play with the format when searching. For example if you were called by 07709 123456 and you are in the UK you could search for exact string matches of:

07709 123456
07709123456
7709 123456
7709123456
44 07709 123456
44 7709 123456
4407709123456
447709123456

Google for OSINT tools and techniques related to phone numbers for more suggestions.

OSINT yourself

When learning anything new, knowing where to start can prove a challenge. Do you pay for a course, buy a book, or maybe look online?

With OSINT I recommend starting with yourself. Imagine you are an in-house digital private detective hired by yourself to investigate, well, yourself. Maybe you are about to apply for a high-profile job or are about to be security vetted for some reason. Either way, the client, you, wants to know what information is out there in the wide world about you.

OSINT stands for Open Source INTelligence and relates to the accessing of freely available information sources in order to process the data retrieved in order to obtain some form of intelligence, in this case learning what information is available about your subject online. The subject being you.

It’s a great way to learn OSINT techniques and it can be both fun and illuminating. Good or bad, whatever you find will be useful. If you find good things that you are happy to be out there then great. If you find bad things then at least you now know about them and can do something about them.

Start with search engines like Google. Search for all variations of your name. If you find images of yourself, paste them into reverse image search engines to see where else they may appear. Log and record everything you find. URLs, images, text, everything. Map out your findings and follow every lead. Leave no stone unturned. Your job as an OSINT investigator is to find everything about your client that is publicly available.

Carry out web searches for OSINT tools and techniques. Have a play with the tools as part of your endeavour. Note what is useful and what is not. Start creating your own playbook and make lots of notes. The deeper you dive the more you learn.

Take your time, don’t rush things. Learn how to look up company information, property details, employment history, social network accounts, and so on.

Search for report templates and create something that suits you. Write up your findings with recommendations.

Congratulations! You just got started in OSINT and you had fun doing it. You learned new tools and techniques and you also learned what information about you is freely available. Now action any recommendations and run a periodic check. Plus sign up to OSINT groups, newsletters, and websites and keep learning!

Hack your home network

A great way to learn ethical hacking in the comfort of your own home, is to hack your own home.

When asked how I got started and which courses I recommended, I always suggest to start at home.

Most people have internet access served by a home router, with at least one computer, maybe some tablets, mobile phones, smart TVs, set-top boxes, and possibly some IoT devices connected in order to receive updates and serve content.

Why not learn the tools and techniques of hacking by running a security test on your own home network? Start by using a tool like nmap to scan your network and see what devices you can find. Map out the connected devices by IP address and try to fingerprint each. Look at open ports. Is the device located at a particular IP address a printer or mobile phone? How can you tell? Probe the device further. Is the operating system and software being reported out dated? Are there known vulnerabilities and exploits for your device? Google the versions being reported by nmap.

Once you have mapped out your network, run periodic scans to see if new devices connect. Walk around your house and turn things on that you know will connect to the home network or wait for other occupants of your household to enable their devices. Let them know what you are doing. Remember, you are scanning not exploiting!

Next use a packet sniffer like Wireshark to inspect the traffic between your devices and the router and the internet. Are there any security holes you can see? Use an application programming interface (API) tool to try to communicate with your devices. Understand how they work. Probe for weaknesses.

Once you are done write a report for yourself on your findings along with recommendations. Look online for vulnerability analysis or penentration test report templates. What could you do to improve the security of your home network and home devices? Maybe change some settings on the router? Remove permissions granted to devices that you no longer own. Maybe you added a port-forwarding rule for a games console that is long gone. Delete the rule if still present.

Congratulations. You have learned how to scan a network, probe for weaknesses, and compose a report on your findings with recommendations, and all from the comfort of your own home with no cost to you other than your time. Next, fix the problems that you found and action any recommendations.

Museums

I love museums.

My friends and family get bored easily when I drag them around yet another museum or art gallery. But I love them. They transport me back in time into history. They bring what I have read in books alive. I can see the objects, clothes, furniture, and rooms from different periods, cultures, and countries.

I can get lost in a museum. The bigger the better. I’ve spent many hours in the British Museum and The Louvre. I’ve stood beneath objects so big in the Cairo museum, and stared at the small Mona Lisa as tourists walk by, snap a pic, then keep on walking. Did they really see it or did their phone see it for them?

I’ve been in museums in the Americas, Australasia, Africa, and Europe. I’ve been invited into archives and restoration rooms, been to early screenings, grand openings, and closings.

I love museums.

Overwhelmed

Ever get that feeling of just being overwhelmed?

There’s just too much to learn.
There’s too many jobs to do.
There’s too many people to fit into the schedule.
I can’t read everything by then.
We can’t fix everything.
There’s not enough time.

It can all be.. overwhelming.

Sometimes you just have to take a moment, think, get perspective, and work out what you can achieve in the time available. Then communicate that to whomever. Maybe yourself.

The world is full of things to learn, things to do, people to see, places to be. Time is precious; spend it wisely. Don’t get overloaded by the noise. Make wise choices and just do what you can. Choose quality over quantity, expertise over generalist, friend over networker.

Don’t let the noise drown your signal.

Using OSINT to locate old friends

As you get better at OSINT you start to wonder what else you can do with these skills. Like maybe locating old friends.

I’m not talking about stalking here, to be clear. I’m talking about seeing if you can use OSINT to research an old friend to see what they are up to and if they are ok. Maybe you worked with someone day in and day out twenty years ago and you haven’t heard from them in decades. Are they ok, what are they up to these days? Not to say hi but just to know that they are ok and doing well.

I’ve worked with many people for many years and on occasion I often wonder what they are up to and if they are well. Using OSINT you may just obtain the answer. Hopefully a positive one.

OSINT, reconnecting people.

ChatGPT hacking buddy

I’ve given many talks on cyber security and ethical hacking over the past few years and one of the things I tend to say a lot is: “There is no such thing as cheating in hacking”.

What I mean by this is that as long as you are learning you are not cheating. It’s only when you take shortcuts and learn nothing in the process that you are cheating yourself.

So when attempting a CTF or Hack the Box or Try Hack Me machine and you get stuck and you have exhausted every technique and trick that you know and nothing is working, sure, go search for a writeup or forum posts on how to progress. Read just enough to get yourself unstuck and then keep going. Learn the technique, tool, or whatever you needed to know to progress. Add it to your knowledge-base.

This is learning not cheating. Finding the answer but not learning how and why it worked is just cheating yourself.

Recently I found myself stuck on a CTF that I was taking part in for fun. It was brand new so there were no writeups or forum articles to peek at. And I was stuck. In theory I could just move on to the next challenge and come back to this one later, time allowing, but I was having fun and I wanted to figure out why my solution wasn’t working. I wanted to learn, now.

I decided to see if AI could help. I’ve been playing around with the free version of ChatGPT recently and wondered if I could make use of it in this situation. I gave it a copy of the code from a program I had disassembled as part of the CTF and asked it to tell me what the code was doing. It did, in great detail. I then asked it how I could extract certain data that the program was storing in memory. It gave me detailed instructions using a tool that I was unfamiliar with. I asked if if I could do the same with another tool I was familiar with. It kindly said no and offered to teach me how to use the tool it recommended. I agreed and learned how to use the tool and managed to make progress.

I then continued hacking at the CTF asking ChatGPT for assistance when required. Although technically cheating, I was constantly learning throughout, and allthough I managed to get some virtual points on a virtual scoreboard, they were worthless in the real world, but the knowledge I gained from hacking with ChatGPT was priceless.

So now when I get really stuck and I’ve exhausted everything I know, I turn to ChatGPT as my AI hacking buddy. Only after I’ve finished the challenge, or both ChatGPT and I have failed to come up with a solution do I go looking for a writeup.
  

Temporary email

It’s very annoying when you come across something useful online that you want to access like an ebook or article that states that it is completely free, you just have to provide your email address before you can access it.

When we think of something that is free we tend to think in terms of monetary value. But cost comes in other forms as well, such as our time, and our data. By providing your email address you are giving away information, for free. The individual or company that you are giving this information to may use it to sell you something or to sell the actual data that you just freely gave. There are data brokers, email harvesters, etc, that will pay real money for valid email addresses, especially if it comes with context. For example if you were trying to access a free eBook on investing they now know that your email address belongs to someone that is interested in investing and that is valuable information.

The trick with such sites and asks is not to give your real email address yet still get access to the free content. To do this there are free temporary email services. Just google temporary email to see what I mean. With the click of a button you can create a randomly generated email address with a short time to live in minutes that you can use with the site offering the free content. You can then read the article or download the eBook (obviously scanning it for viruses and malware before opening) and when you are done no one has your real email address. Simples! 

HTB peer snooping

HTB (Hack The Box) offers a free and premium (VIP) tier for its members. It’s a great platform for learning ethical hacking (along with Try Hack Me). I promised myself that after I’d gotten through the free content that I would treat myself to VIP membership, but have yet to do so. You see, I discovered that there are unintended benefits of free membership. In addition to lots of free content including the seasons machines, there is a little known way of learning on HTB: Peer snooping.

You see, when you access a machine via a non-VIP account you are essentially sharing the (virtual) machine with other users. And when you have a foothold on a box and you are stuck on privilege escalation you can snoop on other players. You can look at who else is logged on and you can monitor what they are doing. You can see what tools, commands, CVEs, etc they are trying and can learn from them.

So next time you are trying a HTB machine and you have a foothold (a login with shell) try snooping on others that are also trying to pwn the machine. You may learn something.