<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by WalkingEclipse on Medium]]></title>
        <description><![CDATA[Stories by WalkingEclipse on Medium]]></description>
        <link>https://medium.com/@thewalkingeclipse?source=rss-34a65661daad------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/fit/c/150/150/1*RfJ3eHoUxJoFDkNeC4PFYg.png</url>
            <title>Stories by WalkingEclipse on Medium</title>
            <link>https://medium.com/@thewalkingeclipse?source=rss-34a65661daad------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Sun, 17 May 2026 04:28:35 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@thewalkingeclipse/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Create A Home Lab Using VirtualBox]]></title>
            <link>https://medium.com/@thewalkingeclipse/create-a-home-lab-using-virtualbox-007be66e9cf0?source=rss-34a65661daad------2</link>
            <guid isPermaLink="false">https://medium.com/p/007be66e9cf0</guid>
            <category><![CDATA[virtualbox]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[virtualization]]></category>
            <category><![CDATA[firewall]]></category>
            <category><![CDATA[homelab]]></category>
            <dc:creator><![CDATA[WalkingEclipse]]></dc:creator>
            <pubDate>Fri, 28 Feb 2025 11:02:16 GMT</pubDate>
            <atom:updated>2025-02-28T11:02:16.055Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*YSITu7IlZ-1qobGUnNTMmQ.png" /></figure><h3>Purpose</h3><p>You can build a home lab environment in many different ways, like virtualization, dedicated hardware, cloud-based, containers, or hybrid approaches. Building a home lab environment has many benefits and use cases.</p><p>My goal was to build a flexible virtual home lab that can be adjusted based on my needs at any given time. Virtualization seemed like my best bet so I scoured through the internet and found a phenomenal guide, <a href="https://benheater.com/building-a-security-lab-in-virtualbox/"><em>Building a Security Lab in VirtualBox</em></a> written by 0xBen. I used it to build my home lab with some tweaks and this is my version.</p><h3>Back Story</h3><p>I went on a side quest to try and recreate this home lab setup in my MacBook Pro M2 but quickly learned the limitations. But it allowed me to learn a lot about the different solutions available. If you’re looking to build a home lab similar to this one using a MacBook Pro M-series this isn’t the way. There are compatibility issues among other things that I won’t discuss here. However, I will go back and figure out a similar setup for my MacBook, and I’m excited to take on that challenge.</p><h4>Setup Summary</h4><p>For this home lab the following was used:</p><ul><li>VirtualBox</li><li>pfSense — firewall and DHCP server</li><li>Kali Linux — attack machine</li><li>Metasploitable 2 — vulnerable machine</li></ul><h4>System Specs</h4><p>Lenovo ThinkPad X1 Carbon:</p><ul><li>Processor: Intel Core 7</li><li>RAM: 32GB</li><li>Storage: 512GB</li></ul><p><strong>Note:</strong> I didn’t add the Active Directory machine that is part of the home lab but if you want to include it, follow <a href="https://benheater.com/building-a-security-lab-in-virtualbox/">0xBen’s guide</a>.</p><h3>Phase 1: Start Downloads</h3><h4><strong>pfSense</strong></h4><p>Netgate now requires users to sign in or create an account before downloading the image. If you don’t mind using your data then go for it but if you’re like me and don’t want to provide that, just make up the details and use a throwaway email. Download the AMD64 ISO IPMI/Virtual Machine version. Once checked out you’ll be emailed a download link, start the download.</p><p>Download <a href="https://www.pfsense.org/download/">here</a>.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*YJV4e0_DPDOihtZefjN92Q.png" /></figure><h4><strong>Kali Linux</strong></h4><p>Download the VirtualBox pre-built VM Kali Linux image <a href="https://www.kali.org/get-kali/#kali-virtual-machines">here</a>.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*kLz71dKK5g9HctNQAjOAnA.png" /></figure><h4>Metasploitable 2</h4><p>Download Metasploitable 2 <a href="https://vulnhub.com/entry/metasploitable-2,29/">here</a> or search for a different vulnerable machine in VulnHub. If you choose a different machine the install steps might differ so make sure to look for corresponding guides.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*p8EqsLXG60Dv4qFOl7LCGg.png" /></figure><h4>PeaZip</h4><p>The VM image files need to be extracted and there are different methods but I like using PeaZip. If you’d like to use it, you can download it <a href="https://peazip.github.io/peazip-64bit.html">here</a>.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/468/1*MYECqkPLHVFv3zNW6shF2A.png" /></figure><h4>Install Python Core / win32api</h4><p>VirtualBox requires Python Core / win32api dependencies and I find it easier to download them beforehand and have them ready to go. First, download the latest Python version <a href="https://www.python.org/downloads/">here</a>. Once it’s done downloading, open it to begin installation. After it successfully installs you’ll need to run two commands in the Command Prompt, make sure to launch it as an administrator.</p><p><strong>First command:</strong></p><pre>-m pip install pywin32</pre><p><strong>Second command:</strong></p><pre>python.exe -m pip install --upgrade pip</pre><p>If you need a visual walkthrough, <a href="https://www.youtube.com/watch?v=PHXpTBAcBs8">here</a> is a straightforward YouTube video.</p><h4>Install VirtualBox &amp; Extension Pack</h4><p>Download <strong>VirtualBox</strong> and the <strong>Extension Pack</strong> <a href="https://www.virtualbox.org/wiki/Downloads">here</a>. After the downloads are complete, start the installation process for VirtualBox, the Extension Pack is installed after.</p><p>If you’re unsure how to install them, <a href="https://www.youtube.com/watch?v=zVpYmmjYQJc">here</a> is a YouTube video.</p><p><strong>Note:</strong> You might still get a message during the VirtualBox installation advising you to download missing dependencies <strong>Python Core/win32api</strong>, just ignore it and continue.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*04v9xLUJMWawipLtzJIIvw.png" /></figure><h3>Phase 2: Extract VM Images</h3><p>Extract the VM images you downloaded during Phase 1. You can use your preferred extracting method, I used <strong>PeaZip</strong>.</p><h4>pfSense</h4><p>Navigate to where the <strong>pfSense </strong>download is, it should have a <strong><em>.gz</em></strong> extension.</p><p><strong><em>Right-click</em></strong> on the file → <strong><em>Open with</em></strong> → Select <strong><em>PeaZip</em></strong></p><p>PeaZip will open and you have the option to <strong>Extract</strong> the file into the current directory or change it. If you want to change it, click on the drop-down arrow next to Extract.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/922/1*nUS4-WO6WwD0fcmzPoHHBQ.png" /></figure><h4>Kali Linux</h4><p>Navigate to your system’s root directory, open the <strong><em>Users </em></strong>folder and then select your user profile. Open the folder named <strong><em>VirtualBox VMs</em></strong>. You’ll need to create a new folder here named <strong>Kali Linux</strong>. You’ll be extracting the Kali Linux image here so keep note of the folder’s path.</p><p>Navigate to where the <strong>Kali Linux</strong> download file is.</p><p><strong><em>Right-click</em></strong> on the file → <strong><em>Open with</em></strong> → Select <strong><em>PeaZip</em></strong></p><p>Click on the drop-down arrow next to <strong>Extract</strong> and select <strong>Extract all to</strong>, and select the file path of the new folder you created titled <strong><em>Kali Linux</em></strong>.</p><h4>Metasploitable 2</h4><p>The extraction process will be the same as the pfSense file. Navigate to where the <strong>Metasploitable 2</strong> download file is.</p><p><strong><em>Right-click</em></strong> on the file → <strong><em>Open with </em></strong>→ Select <strong><em>PeaZip</em></strong></p><p>Feel free to extract it wherever you want to house it. I created a folder specifically for my VMs (pfSense and Metasploitable 2) to live in.</p><h3>Phase 3: Import the VMs to VirtualBox</h3><p><strong>DO NOT START ANY OF THE VMs YET! YOU’RE JUST IMPORTING THE IMAGES FOR NOW!!!!</strong></p><h4>pfSense</h4><p>Open <strong>VirtualBox</strong> and click on the <strong><em>New</em></strong> button.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/404/1*YmXmkIpBw5AYtc4X1k2OkQ.png" /></figure><p><strong>Name:</strong> <em>pfSense-HomeLab</em></p><p><strong>ISO</strong>: Select the pfSense image you extracted earlier</p><p><strong>Type:</strong> <em>BSD</em></p><p><strong>Subtype:</strong> <em>FreeBSD</em></p><p><strong>Version</strong>: <em>FreeBSD (64-bit)</em></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*lTJ-IYy5zYNeYC9HQ_Bt5Q.png" /></figure><p>Click on the <strong><em>Hardware</em></strong> tab</p><p><strong>Base Memory:</strong> <em>1024 MB</em></p><p><strong>Processors:</strong> <em>1 CPU</em></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*CDDxYmXRqzloNRwdB4zmkw.png" /></figure><p>Click on the <strong><em>Hard Disk</em></strong> tab</p><p>Select <strong><em>Create a Virtual Hard Disk Now</em></strong></p><p>Under <strong><em>Hard Disk File Location and Size</em></strong>, the directory should auto populate</p><p>Make sure the <strong><em>Hard Disk</em></strong> space is set to <strong><em>16.00 GB</em></strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*HujIHxc5ew-N_RQlztwlPQ.png" /></figure><p>Click <strong><em>Finish</em></strong></p><p><strong>DO NOT START THE MACHINE! LEAVE IT ALONE!!!</strong></p><h4>Kali Linux</h4><p>To import <strong>Kali Linux</strong> click on the <strong><em>Tools</em></strong> tab located on the left side panel inside Virtual Box.</p><p>Click <strong><em>Add</em></strong> as shown below.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/408/1*k9tps787QH6Axz3VlXLXWA.png" /></figure><p>You’ll be prompted to select a file, navigate to the folder where you saved the exported <strong>Kali Linux</strong> files, and select the file ending in “<strong><em>.vbox”.</em></strong></p><p>Don’t worry about making any adjustments to the machine now. You’ll be going back in the next phase to change a few things.</p><p><strong>DO NOT START THE MACHINE! LEAVE IT ALONE!!!</strong></p><h4>Metasploitable 2</h4><p>Click on the <strong><em>New</em></strong> icon.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/404/1*YmXmkIpBw5AYtc4X1k2OkQ.png" /></figure><p><strong>Name:</strong> <em>Metasploitable 2</em></p><p><strong>Folder:</strong> Leave it as is</p><p><strong>ISO Image:</strong> Leave it as is</p><p><strong>Type:</strong> <em>Linux</em></p><p><strong>Subtype:</strong> <em>Linux 2.4</em></p><p><strong>Version:</strong> <em>Linux 2.4 (32-bit)</em></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*HgMmgo7HGxws2xHv43HBkA.png" /></figure><p>Click on the <strong><em>Hardware</em></strong> tab</p><p><strong>Base Memory:</strong> <em>1024 MB</em></p><p><strong>Processors:</strong> <em>1 CPU</em></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*GEeDgc9PVuicL1S911Vj9w.png" /></figure><p>Click on the <strong><em>Hard Disk</em></strong> tab</p><p>Select <strong><em>Use an Existing Virtual Hard Disk File</em></strong> button</p><p>Click on the <strong><em>File icon</em></strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*ojkQqKdUPaMh9_SPW2Txfw.png" /></figure><p>Click on the <strong><em>Add</em></strong> icon</p><p>Browse to the folder where you extracted the <strong>Metasploitable 2</strong> files</p><p>Choose the file ending with <strong>.vmdk</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/964/1*KYWmWCtzCqCLXeZiRvxAQQ.png" /></figure><p>Click <strong><em>Finish</em></strong> to create the machine</p><p><strong>DO NOT START THE MACHINE! LEAVE IT ALONE!!!</strong></p><h3>Phase 4: Configure the VMs</h3><h4>pfSense</h4><p>Select the <strong>pfSense</strong> machine, it should be highlighted in blue.</p><p>Click on the <strong><em>Settings</em></strong> icon as shown below.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*CNOW6rYs4l2LKFk40s-bDw.png" /></figure><p>Once the <strong><em>Settings </em></strong>window opens, click on the <strong><em>Experts </em></strong>tab.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/319/1*nr0rMeS9z14L5zfk0kO4Eg.png" /></figure><blockquote><strong>System</strong></blockquote><p>Select the <strong><em>System</em></strong> tab</p><p>Under <strong><em>Boot Order</em></strong> move the <strong><em>Hard Disk</em></strong> up until it’s the first option, then move <strong><em>Optical</em></strong> after <strong><em>Hard Disk</em></strong> so it’s the second option</p><p>Uncheck <strong><em>Floppy</em></strong></p><p>Your <strong><em>Boot Order</em></strong> should look like the screenshot below</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*fKkdtshvs_1JNHHrwabp6g.png" /></figure><blockquote><strong>Audio</strong></blockquote><p>Click on the <strong><em>Audio</em></strong> tab</p><p>Uncheck <strong><em>Enable Audio</em></strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Emsp9e3JxbD_HbmmpfUGUQ.png" /></figure><blockquote><strong>USB</strong></blockquote><p>Click on the <strong><em>USB</em></strong> tab</p><p>Uncheck <strong><em>Enable USB Controller</em></strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*uqinAiIN2uE-SGzzqh-gqw.png" /></figure><blockquote><strong>Network</strong></blockquote><p>Now click on the <strong><em>Network</em></strong> tab</p><p><strong>Adapter 1</strong></p><p>Check <strong><em>Enable Network Adapter</em></strong></p><p><strong>Attached to:</strong> <em>Bridge Adapter</em></p><p><strong>Adapter Type:</strong> <em>Paravirtualized Network (virtio-net)</em></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Y45_hUzPRq8Fpwd4S-6U3g.png" /></figure><p><strong>Adapter 2</strong></p><p><strong>Attached to:</strong> <em>Internal Network</em></p><p><strong>Name:</strong> <em>home-lab-LAN</em></p><p><strong>Adapter Type:</strong> <em>Paravirtualized Network (virtio-net)</em></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*FWAzSsgb2xKcZYcSHIfnxA.png" /></figure><p><strong>Adapter 3</strong></p><p><strong>Attached to:</strong> <em>Internal Network</em></p><p><strong>Name:</strong> <em>home-lab-isolated</em></p><p><strong>Adapter Type:</strong> <em>Paravirtualized Network (virtio-net)</em></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*nTIsbX9-SnihqrXB1F5RLg.png" /></figure><p><strong>Adapter 4</strong></p><p><strong>Note:</strong> Adding this network is optional if you plan on adding a Windows machine for Active Directory learning/hacking, 0xBen outlines the steps <a href="https://benheater.com/virtualbox-lab-pfsense-firewall/">here</a>.</p><h4>Kali Linux</h4><p>Click on the <strong>Kali Linux</strong> machine to highlight it and click on the <strong><em>Settings</em></strong> icon.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*4crxXsHEXrIUHR5_nSDsGg.png" /></figure><p>Once the <strong><em>Settings</em> </strong>window opens, click on the <strong><em>Experts</em> </strong>tab.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/319/1*nr0rMeS9z14L5zfk0kO4Eg.png" /></figure><blockquote><strong>Network</strong></blockquote><p>Click on the <strong><em>Network</em></strong> tab</p><p><strong>Adapter 1</strong></p><p>Check <strong><em>Enable Network Adapter</em></strong></p><p><strong>Attached to:</strong> <em>Internal Network</em></p><p><strong>Name:</strong> select <strong><em>home-lab-LAN</em></strong> from the dropdown menu</p><p><strong>Adapter Type:</strong> <em>Paravirtualized Network (virtio-net)</em></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*g-UfBbAmH21C-Oj2MOKenQ.png" /></figure><p>Click <strong><em>OK</em> </strong>to save the changes made</p><h4>Metasploitable 2</h4><p>Click on the <strong>Metasploitable 2</strong> machine to highlight it and click on the <strong><em>Settings</em></strong> icon.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1022/1*DEpCQHoWuvwITVXpV9Z8Dg.png" /></figure><p>Once the <strong><em>Settings</em> </strong>window opens, click on the <strong><em>Experts</em> </strong>tab.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/319/1*nr0rMeS9z14L5zfk0kO4Eg.png" /></figure><blockquote><strong>Network</strong></blockquote><p>Click on the <strong>Network</strong> tab</p><p><strong>Adapter 1</strong></p><p>Check <strong><em>Enable Network Adapter</em></strong></p><p><strong>Attached to:</strong> <em>Internal Network</em></p><p><strong>Name:</strong> select <strong><em>home-lab-isolated</em></strong> from the dropdown menu</p><p><strong>Adapter Type:</strong> <em>Intel PRO/1000 MT Desktop (82540EM)</em></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*j7weCEq5MDXXOswzHErBFA.png" /></figure><blockquote><strong>Audio</strong></blockquote><p>Click on the <strong><em>Audio</em></strong> tab</p><p>Uncheck <strong><em>Enable Audio</em></strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Ra7WEa13rAWoSAy4H9UOzg.png" /></figure><blockquote><strong>USB</strong></blockquote><p>Click on the <strong><em>USB</em></strong> tab</p><p>Uncheck <strong><em>Enable USB Controller</em></strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*4xdeSFMTKsQyUW9gtlE6hg.png" /></figure><h3>Phase 5: Time To Start VMs</h3><p>It’s important to start the machines one at a time in the order presented below. This section is lengthy but once you’re done, running your lab will be a smooth process.</p><h4>pfSense</h4><p>Select the <strong>pfSense</strong> machine, it should be highlighted in blue, then click on the <strong><em>Start</em></strong> icon.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*PLPbP2Dk74kZXDvfTMSVhQ.png" /></figure><p>It’ll take a few minutes for the machine to start. Let it do its thing, once done the <strong>Netgate Installer</strong> will appear. You won’t be able to click on the options with your mouse, instead use the <em>arrow keys</em> for option selection and the <em>Enter</em> key to accept the selection.</p><p>Choose <strong><em>Accept</em></strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*YJV4e0_DPDOihtZefjN92Q.png" /></figure><p>Select <strong><em>Install </em></strong>and choose <strong><em>OK</em></strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*87axJiKC2I_UhTM7-79tYQ.png" /></figure><p>I don’t have screenshots for the following steps but it’s fairly easy to follow along.</p><p>Next, <strong><em>WAN Interface Assignment and Configuration</em></strong></p><blockquote><strong>Please select WAN</strong></blockquote><p>Select <strong><em>vtnet0</em></strong> and <strong><em>OK</em></strong></p><p>Next, <strong><em>WAN (vtnet0) Network Mode Setup</em></strong></p><blockquote><strong>Adjust the network operation mode for the WAN (vtnet0) interface if necessary</strong></blockquote><p>Select <strong><em>&gt;&gt;&gt; Continue</em></strong> and <strong><em>OK</em></strong></p><p>Next, <strong><em>LAN Interface Assignment and Configuration</em></strong></p><blockquote><strong>Please select the LAN interface</strong></blockquote><p>Select <strong><em>vtnet1</em></strong> and <strong><em>OK</em></strong></p><p>Next, L<strong><em>AN (vtnet1) Network Mode Setup</em></strong></p><blockquote><strong>Adjust the network operation mode for the LAN (vtnet1) interface if necessary</strong></blockquote><p>Select <strong><em>&gt;&gt;&gt; Continue</em> </strong>and <strong><em>OK</em></strong></p><p>Make sure <strong><em>LAN</em></strong> is <strong><em>vtnet1</em></strong> and <strong><em>WAN</em></strong> is <strong><em>vtnet0</em></strong></p><p>If it matches choose <strong><em>Continue</em></strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*wcp4U8ExfwZEiwgfwc6FtQ.png" /></figure><p>Select <strong><em>Install CE</em></strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*NI1pYvDYzPZFkCOtctkRcg.png" /></figure><p>Select <strong><em>&gt;&gt;&gt; Continue </em></strong>and<strong><em> OK</em></strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*C_L-eSPp1Kt8e14XJ6zSmA.png" /></figure><p>Select <strong><em>Stripe </em></strong>and <strong><em>OK</em></strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*sUnVntYWFASvSNjJz2ljIg.png" /></figure><p>Select <strong><em>OK</em></strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*y36mbOiyx75xdy063JTPHA.png" /></figure><p>Select <strong><em>Yes</em></strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*WtmcTz2IZYmbOK5MroIuvQ.png" /></figure><p>Select the option that states <strong><em>Current Stable Release</em></strong><em> </em>and <strong><em>OK</em></strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*zSjUYWND2zJZGhYRae1d2g.png" /></figure><p>The next screen which indicate it’s downloading</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*1XEexnmJvmICnGLJQCdjLQ.png" /></figure><p>Select <strong><em>OK</em></strong><em> </em>once done</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*cowbYNLzvzoZMLKZJgCpNw.png" /></figure><p>Select <strong><em>Reboot</em></strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*JyMYHx634DkGWAEJrec4Sw.png" /></figure><p>Allow the machine to finish booting, if it exits start the machine again. It will take a few minutes to load.</p><p>You’ll be asked, “<strong><em>Do VLANs need to be set up first?</em></strong>”</p><p>Type <strong><em>n</em></strong> and press <strong>Enter</strong></p><p>Next, “<strong><em>Enter the WAN interface name or ‘a’ for auto-detection (vtnet0 vtnet1 vtnet2 vtnet3 or a):</em></strong>”</p><p>Type <strong><em>vtnet0</em></strong> and press <strong>Enter</strong></p><p>Next, “<strong><em>Enter the LAN interface name or ‘a’ for auto-detection</em></strong>”</p><p>Type <strong><em>vtnet1</em></strong> and press <strong>Enter</strong></p><p>Next, “<strong><em>Enter the Optional 1 interface name or ‘a’ for auto-detection</em></strong>”</p><p>Type <strong><em>vtnet2</em></strong> and press <strong>Enter</strong></p><p>Next, the interface assignments will appear:</p><p><strong><em>WAN → vtnet0</em></strong></p><p><strong><em>LAN → vtnet1</em></strong></p><p><strong><em>OPT1 → vtnet2</em></strong></p><p>You’ll be asked “<strong><em>Do you want to proceed [y:n]?</em></strong>”</p><p>Type <strong><em>y</em></strong> and press <strong>Enter</strong></p><p>Configure the <strong>LAN</strong> interface further.</p><p>Type <strong><em>2</em></strong> and press <strong>Enter</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*AbcfgQbSOPQ-zceNsU-kpQ.png" /></figure><p>Next, start configuring the LAN “<strong><em>Enter the number of the interface you wish to configure</em></strong>”</p><p>Type <strong><em>2</em></strong> and press <strong>Enter</strong></p><p>Next, “<strong><em>Configure IPv4 address LAN interface via DHCP?</em></strong>”</p><p>Type <strong><em>n</em></strong> and press <strong>Enter</strong></p><p>Next, “<strong><em>Enter the new LAN IPv4 address. Press &lt;ENTER&gt; for none:</em></strong>”</p><p>Type <strong><em>10.0.0.1</em></strong> and press <strong>Enter</strong></p><p><strong>Note:</strong> You can use any IPv4 address you’d like just keep it in the private IPv4 ranges.</p><p>Next, “<strong><em>Enter the new LAN IPv4 subnet bit count (1 to 31):</em></strong>”</p><p>Type <strong><em>24</em></strong> and press <strong>Enter</strong></p><p>Next, press <strong>Enter</strong> since this is a LAN</p><p>Next, “<strong><em>Configure IPV6 address LAN interface via DHCP6?</em></strong>”</p><p>Type <strong><em>n</em></strong> and press <strong>Enter</strong></p><p>Next, press <strong>Enter </strong>since you won’t be using IPv6</p><p>Next, “<strong><em>Do you want to enable the DHCP server on LAN?</em></strong>”</p><p>Type <strong><em>y</em></strong> and press <strong>Enter</strong></p><p>Next, “<strong><em>Enter the start address of IPv4 client address range:</em></strong>”</p><p>Type <strong><em>10.0.0.11</em></strong> and press <strong>Enter</strong></p><p>Next, “<strong><em>Enter the end address of the IPv4 client address range:</em></strong>”</p><p>Type <strong><em>10.0.0.243</em></strong> and press <strong>Enter</strong></p><p><strong>Note:</strong> If you assigned the LAN a different IPv4 address than the one above (10.0.0.1) make sure to stick to that range. Example, if you used 10.5.5.1, your range should start at 10.5.5.11 and end at 10.5.5.243.</p><p>Next, “<strong><em>Do you want to revert to HTTP as the webConfigurator protocol?</em></strong>”</p><p>Type <strong><em>n</em></strong> and press <strong>Enter</strong></p><p>Next, you’ll see the confirmation for the changes made</p><p>Press <strong>Enter</strong></p><p>Time to configure the <strong>Isolated LAN</strong></p><p>Type <strong><em>2</em></strong> and press <strong>Enter</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*AbcfgQbSOPQ-zceNsU-kpQ.png" /></figure><p>Next, start configuring the isolated LAN <strong>“<em>Enter the number of the interface you wish to configure</em>”</strong></p><p>Type <strong><em>3</em></strong> and press <strong>Enter</strong></p><p>Next, <strong>“<em>Configure IPv4 address OPT1 interface via DHCP?</em>”</strong></p><p>Type <strong><em>n</em></strong> and press <strong>Enter</strong></p><p>Next, <strong>“<em>Enter the new OPT1 IPv4 address</em>“</strong></p><p>Type <strong><em>10.6.6.1</em></strong></p><p><strong>Note:</strong> You can use any IPv4 address you’d like just keep it in the private IPv4 range.</p><p>Next, <strong>“<em>Enter the new OPT1 IPv4 subnet bit count (1 to 31):</em>”</strong></p><p>Type <strong><em>24</em></strong> and press <strong>Enter</strong></p><p>Next, press <strong>Enter</strong> since this is a LAN</p><p>Next, <strong>“<em>Configure IPV6 address OPT1 interface via DHCP6?</em>”</strong></p><p>Type <strong><em>n</em></strong> and press <strong>Enter</strong></p><p>Next, press <strong>Enter</strong> since you won’t be using IPv6.</p><p>Next, “<strong><em>Do you want to enable the DHCP server on OPT1?</em></strong>”</p><p>Type <strong><em>y</em></strong> and press <strong>Enter</strong></p><p>Next, “<strong><em>Enter the start address of IPv4 client address range:</em></strong>”</p><p>Type <strong><em>10.6.6.11</em></strong> and press <strong>Enter</strong></p><p>Next, “<strong><em>Enter the end address of the IPv4 client address range:</em></strong>”</p><p>Type <strong><em>10.6.6.243</em></strong> and press <strong>Enter</strong></p><p>Next, “<strong><em>Do you want to revert to HTTP as the webConfigurator protocol?</em></strong>”</p><p>Type <strong><em>n</em></strong> and press <strong>Enter</strong></p><p>Next, you’ll see the confirmation for the changes made</p><p>Press <strong>Enter</strong></p><p>I won’t be using the Active Directory lab so I won’t be going over configuring interface <strong><em>OPT2</em></strong>. However, you can find instructions on configuring that interface <a href="https://benheater.com/virtualbox-lab-pfsense-firewall/">here</a>.</p><p>Leave the pfSense machine running in the background.</p><h4>Kali Linux</h4><p>Start the <strong>Kali Linux</strong> machine. Make sure it’s highlighted and click on the <strong><em>Start</em></strong> icon.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/932/1*IvMtj3a8ioYdUNNOnmwHcg.png" /></figure><p>It will take a few minutes for the machine to load just let it do its thing. Once it’s done, the login screen will appear. Enter the default login which is <strong><em>Kali</em></strong> for both the username and password.</p><p>Once logged in, open the terminal and run the following to verify the machine got the right IPv4 address (10.0.0.11) from the DHCP server.</p><pre>ip address</pre><h4>Setup Firewall Rules in pfSense</h4><p>Don’t start the <strong>Metasploitable 2</strong> machine until you set the firewall rules for pfSense. Remember the machine is vulnerable and you don’t want it running on your system without safeguards.</p><p>For this section, I’ll be directing you to <a href="https://benheater.com/virtualbox-lab-configure-pfsense/">“<strong>Configuring the pfSense Firewall for Our VirtualBox Lab”</strong></a>, written by 0xBen.</p><h4>Metasploitable 2</h4><p>After you configure the firewall rules, start the <strong>Metasploitable 2</strong> machine. Make sure it’s highlighted and click on the <strong><em>Start</em></strong> icon.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/919/1*MUvVVfu3W5_aOI1pXC8k8g.png" /></figure><p>It’ll take a few minutes to load and you’ll be asked to log in, use <strong><em>msfadmin</em></strong> for both username and password.</p><p>Verify the machine has the IP address you assigned it by running the following command, it should display <strong><em>10.6.6.11</em></strong></p><pre>ip a</pre><h3>Tips</h3><h4>Booting Order</h4><p>It is important to boot the virtual machines in the right order. Let the machine fully boot before starting the next one.</p><p><strong><em>pfSense</em></strong> → <strong><em>Kali Linux</em></strong> → <strong><em>Metasploitable 2</em></strong></p><h4>pfSense</h4><p>To turn off the machine safely, type <strong><em>6</em></strong> and press <strong>Enter</strong></p><p>Type <strong><em>y</em></strong> and press <strong>Enter</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*AbcfgQbSOPQ-zceNsU-kpQ.png" /></figure><h4>Kali Linux</h4><p><strong>Change Root Password</strong></p><p>It is highly advisable to change your Kali Linux root password to strengthen security. It’s important to note that changing the root password is not the same as changing the default user (Kali) password.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/740/1*Pd9NYpZtV-ny0aNU2LSieg.png" /></figure><h4>Change Default Username and Password</h4><p>To change the default username (Kali) and password (Kali) you’ll need to restart the machine and login as root. The username will be root and the password is the one you created in the previous step. If you didn’t change the root password, the default is Kali.</p><p><strong>Change the username:</strong></p><pre>usermod -l newuser olduser</pre><figure><img alt="" src="https://cdn-images-1.medium.com/max/638/1*2EWtzt0kb4z7wpkxxbFg4Q.png" /></figure><p><strong>Update the directory:</strong></p><pre>usermod -d /home/newuser -m newuser</pre><figure><img alt="" src="https://cdn-images-1.medium.com/max/567/1*DYont8AGKdqC9UFNrj4EtQ.png" /></figure><p><strong>Update the group name:</strong></p><pre>groupmod -n newuser olduser</pre><figure><img alt="" src="https://cdn-images-1.medium.com/max/576/1*unAeGuEWKcCsm5UW_pQ3gw.png" /></figure><p><strong>Change the User ID:</strong></p><pre>usermod -u newID newuser</pre><figure><img alt="" src="https://cdn-images-1.medium.com/max/568/1*cA8jE4bPNGKPpE9v-ayIng.png" /></figure><p>Restart the machine for the changes to take effect.</p><p>Log in using the new username and the default password (Kali).</p><p>If you don’t see any icons when you log in and only see the desktop wallpaper, use <strong><em>Ctrl + Alt + T</em></strong> to launch the terminal.</p><pre>sudo rm -r .cache .config .local<br>Enter password:</pre><p>Restart the machine.</p><pre>sudo reboot</pre><figure><img alt="" src="https://cdn-images-1.medium.com/max/736/1*vfGF1yY4XrOcND9SOhm33Q.png" /></figure><p><strong>Change the password:</strong></p><pre>passwd <br>Enter current password:<br>Enter new password:<br>Retype new password:</pre><p>The password is now changed. To test this, you can restart the machine and log in using the new username and password.</p><h4>All Machines</h4><h3>Snapshots</h3><p>Take a snapshot of all your virtual machines to avoid importing and setting them up all over again if something goes wrong. By taking a snapshot after the initial installation and configuration, you can revert to the snapshot and use the machine as if nothing happened.</p><p>Select each machine and click on the <strong><em>side menu</em></strong></p><p>Click on <strong><em>Snapshots</em></strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/755/1*ARwjpbp44te8peWm3YtA4A.png" /></figure><p>Click on <strong><em>Take</em></strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*PuG_f_8vJvtJDfsxEvQFWw.png" /></figure><p>Give the snapshot a name, description and click <strong><em>Ok</em></strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/828/1*PrZA41HwcjxAIMKV-giFzw.png" /></figure><p>Follow these same steps for the other machines.</p><h3>Conclusion</h3><p>Setting up a home lab can be a lengthy process, but a worthy one. You get to learn a lot along the way. Spend some time and get familiar with your environment. There are a lot of Metasploitable 2 writeups you can follow and I find this a great way to learn. However, I encourage you to go back and try to recreate the steps from memory to help you grasp the skills and techniques used.</p><p>Stay curious!</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=007be66e9cf0" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Petshop Pro Walkthrough]]></title>
            <link>https://medium.com/@thewalkingeclipse/petshop-pro-walkthrough-ee868597f704?source=rss-34a65661daad------2</link>
            <guid isPermaLink="false">https://medium.com/p/ee868597f704</guid>
            <category><![CDATA[hacker101-ctf]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[web-app-vulnerabilities]]></category>
            <category><![CDATA[ctf-walkthrough]]></category>
            <category><![CDATA[web-app-security]]></category>
            <dc:creator><![CDATA[WalkingEclipse]]></dc:creator>
            <pubDate>Mon, 18 Nov 2024 07:24:13 GMT</pubDate>
            <atom:updated>2024-11-18T07:24:13.570Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*_1IYmNETd1_knPgLp1oafw.jpeg" /></figure><h3><strong>Flag 0 …</strong></h3><h4><strong>Hints:</strong></h4><ul><li>Something looks out of place with checkout.</li><li>It’s always nice to get stuff free.</li></ul><p>To find this flag we have to figure out a way to get a JPEG for free.</p><p>As you can see on the homepage there are two JPEGS that can be added to the cart. If you add one to the cart and proceed to check out you will see <em>Payments temporarily disabled</em> message displayed.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/498/1*QyDbJ5GfEoo6TVnx99cMlw.png" /></figure><p>So how can we check out and get the JPEG for free?</p><p>Let’s start by inspecting the <em>Check Out</em> button located in the <em>Shopping Cart </em>page.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/453/1*kWIS2TZA32btcs7z08P1dw.png" /></figure><p>Upon inspection, we can see that there is something hidden in the form. To find out what it is we need to erase the text <em>hidden</em> next to <em>type</em>. An input box should pop up on the webpage. The price needs to be changed to zero and this can be done through that box or from the Inspector section.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/164/1*o1v8VOytQGThgyVybv4gBw.png" /></figure><p>Once the price is set to <em>ZERO</em> go ahead and click on the <em>Check Out </em>button.</p><p>Your <strong>FLAG</strong> should appear!</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/684/1*QNFhC0cr3P2dazT-hEfpFA.png" /></figure><h3><strong>Flag 1 …</strong></h3><h4><strong>Hints:</strong></h4><ul><li>There must be a way to administer the app.</li><li>Tools may help you find the entry point.</li><li>Tools are also great for finding credentials.</li></ul><p>It looks like we need to find a way to login as an admin to take control over the webpage.</p><p><strong>Note:</strong> You must prepare yourself because to find this flag there are several steps to take.</p><p>Let’s go back to the Home page. There are no buttons or links to click on to log in so the next step is to try commonly used login paths.</p><p>Try using <em>/admin</em> at the end of the URL. Okay, that did not work.</p><p>Let’s try <em>/login</em> this time. Bingo, we got us a winner!</p><p>Once the login page loads go ahead and try using default admin usernames and passwords. I tried using the following:</p><p><strong>Usernames:</strong> admin, administrator, user</p><p><strong>Password: </strong>admin, password, 12345</p><p>Each combination produced a <em>Invalid username</em> message. This message is important because it let’s us know which credential is invalid.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/310/1*7fWod4FXPujXjChNvJAhJQ.png" /></figure><p>It is clear that we need help from tools to brute force our way in. I tried using <strong>Hydra</strong> but it was acting up so I used <strong>Burp Suite Community</strong> with the <strong>Turbo Intruder </strong>extension.</p><h4><strong>Step One:</strong></h4><p>Open Burp Suite.</p><p><strong>*</strong> If you already have the Turbo Intruder extension installed skip to Step 2.</p><p>To install the Turbo Intruder extension go to <em>Extensions tab</em> &gt;<em> BApp Store</em> &gt; Search bar &gt; type in <em>Turbo Intruder</em> &gt; Click <em>Install</em></p><p>Once it’s done installing the Turbo Intruder tab should populate at the top.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*mxO-hzxLN7vL5P58qL2ryg.png" /></figure><p><strong>Tutorial:</strong> If you are a visual learner here is a step by step video to help you out, <a href="https://www.youtube.com/watch?v=zpFv2gN6vYc">Turbo Intruder Tutorial</a>.</p><p>Now, the fun part begins …</p><h4><strong>Step Two:</strong></h4><p>Go to the <em>Proxy</em> tab in Burp Suite.</p><p>Turn on the proxy on the browser.</p><p>Go back to Burp Suite and click <em>Intercept is off</em> to turn in on</p><p>Go back to the webpage and try to log in using any credentials.</p><p>Burp should capture this interaction.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*vW9cT9eR_ozs6W2VDnOizQ.png" /></figure><p>You can turn off the proxy.</p><p>Right-click on the Raw capture &gt; <em>Extensions</em> &gt; <em>Turbo Intruder</em> &gt; <em>send to Turbo Intruder</em></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*NkT1tSbaB1_9MGnYJ0LimA.png" /></figure><h4><strong>Step Three:</strong></h4><p>Turbo Intruder pops up and the capture will be on top and the coding section on the bottom.</p><p>Click on <em>Last code used </em>drop-down menu &gt; <em>examples/basic.py</em></p><p><strong>Tip:</strong> Before we edit the code, first we need to download or create a list of usernames and passwords. I used the rockyou.txt and this can be downloaded <a href="https://github.com/josuamarcelc/common-password-list/tree/main/rockyou.txt">here</a>. Note the path you save your file to.</p><p>On the code section we will make the following adjustments:</p><p><strong>Line 3 &amp; 4</strong></p><pre>CurrentConnections=200<br>requestPerConnection=150</pre><p><strong>Line 8</strong></p><pre>for word in open(&#39;&lt;Your file path goes here&gt;&#39;):</pre><p><strong>Line 14 &amp; 15</strong></p><pre>if (&#39;Invalid username&#39; not in req.response):<br>table.add(req)</pre><p>Head over to the <em>Raw capture</em> section on top and make the following adjustments:</p><p><strong>Line 20</strong></p><pre>username=%s&amp;password=test</pre><p><strong>*</strong> This tells the code we are only looking for the username.</p><p>Click on <em>Attack</em>.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*HhFEoCwNxFw8WCaqQZa79Q.png" /></figure><p>You should see it running. Give it about a minute and then the table above should load up with results.</p><p>On the table we are looking at the <em>Status</em> column and looking for code <em>200</em>. Under the<em> Payload</em> column you’ll find the username.</p><p>Head over to the webpage and input that username and pair it with a random password.</p><p>Click <em>Log In</em>.</p><p>The message that should appear is <em>Invalid password</em>.</p><p>Congrats you now have a valid username!</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/410/1*3CNeO64ZOEJQ8i4yiJSvqQ.png" /></figure><h4><strong>Step Four:</strong></h4><p>Go back to the Turbo Intruder window and click on <em>Configure</em> located at the bottom. It will take you back to the Raw capture and coding window.</p><p>Make the following adjustments to the code:</p><p><strong>Line 14</strong></p><pre>if (&#39;Invalid password&#39; not in req.response):</pre><p>Make the following adjustments to the <em>Raw</em> <em>capture</em>:</p><p><strong>Line 20</strong></p><pre>username=&lt;input valid username here&gt;&amp;password=%s</pre><p>*Make sure you type the valid username next to <em>username=</em></p><p>Click on <em>Attack</em>.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*_fLlR_QhMY037XWRJgHa8A.png" /></figure><p>Give it a few minutes and once the table loads up look for <em>Status</em> code <em>302</em> and the <em>Payload</em> value is your password.</p><p>Go back to the webpage and input the valid username and found password.</p><p>Click <em>Log In</em>.</p><p>Congrats you have found your <strong>FLAG</strong>!</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/794/1*wHQixun3wxxkIHW60zo6KA.png" /></figure><h3><strong>Flag 2 …</strong></h3><h4><strong>Hints:</strong></h4><ul><li>Always test every input.</li><li>Bugs don’t always appear in a place where data is entered.</li></ul><p>Now that we have admin access we can edit and this flag is pointing us in that direction!</p><p>Click on one of the <em>edit</em> buttons. Here we can edit Name, Description, and Price.</p><p>Let’s attempt an XSS payload on the <em>Name</em> field.</p><p>Insert the following:</p><pre>&lt;script&gt;alert(1)&lt;/script&gt;</pre><p>Then click on <em>Save</em>.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/280/1*Z6GWC9M9gakDa21cyobRiw.png" /></figure><p><strong>Note:</strong> I attempted the XSS payload in the two other fields and got an error with one and got no flag with the other. I advise you try it so you can see the outcome for yourself.</p><p>Head back to the <em>Home</em> page.</p><p><strong>TIP:</strong> use the URL path</p><p>Click on the <em>link</em> that takes you to the cart.</p><p>You should see your <strong>FLAG</strong>!</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1001/1*BQ6odoksv9KQNnHpjIoW9Q.png" /></figure><p>Give yourself a hug! You’ve made it to the end and captured all three flags!</p><p>Time for a water break …</p><p>If you want to learn more about Turbo Intruder and all its uses, check out James Kettle article and video <a href="https://portswigger.net/research/turbo-intruder-embracing-the-billion-request-attack">here</a>.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=ee868597f704" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Postbook CTF Walkthrough]]></title>
            <link>https://medium.com/@thewalkingeclipse/postbook-ctf-walkthrough-ee3de79c6b7d?source=rss-34a65661daad------2</link>
            <guid isPermaLink="false">https://medium.com/p/ee3de79c6b7d</guid>
            <category><![CDATA[hacker101-ctf]]></category>
            <category><![CDATA[web-app-vulnerabilities]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[hacking]]></category>
            <category><![CDATA[web-app-security]]></category>
            <dc:creator><![CDATA[WalkingEclipse]]></dc:creator>
            <pubDate>Mon, 18 Nov 2024 07:16:05 GMT</pubDate>
            <atom:updated>2024-11-18T07:16:05.849Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*inpSkgDNGCqBIC6bVXO_5Q.jpeg" /></figure><h3><strong>Flag 0</strong></h3><h4><strong>Hints:</strong></h4><ul><li>The person with username “user” has a very easy password.</li></ul><p>Click on <em>Sign In</em></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/639/1*rvFkL6tMxHfoQFzAo3JmVQ.png" /></figure><p>Input the following:</p><p><strong>Username</strong>: user</p><p><strong>Password</strong>: &lt; I think you can guess it &gt;</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/371/1*pwRCxGYmiKYsFN8t0GaMoA.png" /></figure><p>Once you’ve successfully logged in, you will capture your first <strong>FLAG</strong>!</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/868/1*expCuKxEV6_eY96tMgRQmg.png" /></figure><h3><strong>Flag 1</strong></h3><h4>Hints:</h4><ul><li>Try viewing your own post and then see if you can change ID.</li></ul><p>To capture this flag we have to try to view another user’s post.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/723/1*E3IBvfbrW3_6GAl8rfCbsQ.png" /></figure><p>This can be done by clicking on one of the posts to view it. Then change the ID # on the URL path and press Enter.</p><p><strong>Tip:</strong> Go lower</p><p>You captured another <strong>FLAG</strong>!</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/879/1*Y1vdqrZixenStmTgwLch9w.png" /></figure><h3><strong>Flag 2</strong></h3><h4><strong>Hints:</strong></h4><ul><li>You should definitely use “Inspect Element” on the form when creating a new post.</li></ul><p>On the <em>Home</em> page we need to inspect the <em>What’s on your mind?</em> field.</p><p>Look for the <em>user_id</em> and change the value.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/578/1*t8ylv4EwPzZcfxXRpbbJZA.png" /></figure><p>Write something to post and click on <em>Create post</em>.</p><p>Now, you have captured the <strong>FLAG</strong>.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/891/1*OOLD8TfbiBIR-g8qyV9Kkg.png" /></figure><h3><strong>Flag 3</strong></h3><h4><strong>Hints</strong>:</h4><ul><li>189*5</li></ul><p>This flag really works our critical thinking and problem solving skills.</p><p>Find the product of this multiplication.</p><p>Then insert the product inside the URL path.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/159/1*zeY70uCSF-4CJ0piUiUAbQ.png" /></figure><p>You have captured the <strong>FLAG</strong>!</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/882/1*THBabsv9EdSOtWujLde78g.png" /></figure><h3><strong>Flag 4</strong></h3><h4><strong>Hints:</strong></h4><ul><li>You can edit your own posts. What about someone else’s?</li></ul><p>Right now we have user access and the only post we can see that does not belong to <em>user</em> is the one posted by <em>admin</em>.</p><p>So, let’s attempt to edit an admin post.</p><p>Click on one of your post to edit it. Then on the URL path you will have to change the <em>ID</em> number.</p><p><strong>Tip</strong>: Go lower.</p><p>It should take you to the admin’s post where you can edit. I suggest you add “EDITED” on the title so you can see the difference.</p><p>Click on <em>Save</em> post.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/344/1*X8Gd1v5kTi2JF6_AFzSCQw.png" /></figure><p>You’ve captured another FLAG!</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/882/1*Pxn4Xam1mvMqwTgJytd5HQ.png" /></figure><h3><strong>Flag 5</strong></h3><h4><strong>Hints:</strong></h4><ul><li>The cookie allows you to stay signed in. Can you figure out how they work so you can sign in to user with ID 1?</li></ul><p>To capture this flag we need to look for our cookie ID.</p><p>On the <em>Home</em> page right-click and <em>Inspect</em>.</p><p>Click on the <em>Storage tab &gt; look for Cookies &gt; look for ID</em>.</p><p>Click &gt; copy the value.</p><p>Find a MD5 decrypt and encrypt engine by doing a quick Google search.</p><p>First you must decrypt the value to see which number it is. This will show you which user you are.</p><p>Admin must have an ID # 1.</p><p>So, now encrypt the #1 and obtain its MD5 hash.</p><p>Copy the MD5 hash for #1 and paste it in the table, replacing the other cookie ID.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/836/1*A33bM_BgX7zFRMXlYeUHwg.png" /></figure><p>Refresh the page.</p><p><strong>FLAG</strong> 5 is now captured!</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/882/1*Hxo8kzrNV9sUcRvOeEfA0g.png" /></figure><h3><strong>Flag 6</strong></h3><h4><strong>Hints:</strong></h4><ul><li>Deleting a post seems to take an ID that is not a number. Can you figure out what it is?</li></ul><p>We have admin access now so we must delete one of the user’s post.</p><p>1. View one of the <em>user’s</em> post. Notate the post <em>ID</em> number.</p><p>2. Hover over the <em>delete</em> button for one of the admin’s post &gt; <em>right click &gt; Inspect &gt; find the delete hash ID</em>.</p><p>3. Go back to the <em>MD5 encrypt</em> engine and generate the hash for the user’s post ID number.</p><p>4. Copy it &gt; paste it on the <em>delete hash ID</em> section.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/836/1*4Hkr5MFuq6UwzJw__xPeRg.png" /></figure><p>Now click the <em>Delete</em> button you inspected.</p><p>The <strong>FLAG</strong> should appear!</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/872/1*Y6HxLsSwXSSXr6jojPHLFw.png" /></figure><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=ee3de79c6b7d" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[A little something to get you started CTF Walkthrough]]></title>
            <link>https://medium.com/@thewalkingeclipse/a-little-something-to-get-you-started-ctf-walkthrough-aefecf9a0af1?source=rss-34a65661daad------2</link>
            <guid isPermaLink="false">https://medium.com/p/aefecf9a0af1</guid>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[web-app-security]]></category>
            <category><![CDATA[ctf-writeup]]></category>
            <category><![CDATA[hacking]]></category>
            <category><![CDATA[hacker101-ctf]]></category>
            <dc:creator><![CDATA[WalkingEclipse]]></dc:creator>
            <pubDate>Mon, 18 Nov 2024 07:01:16 GMT</pubDate>
            <atom:updated>2024-11-18T07:01:16.800Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*H9aorlvAAbsHun9vzREtzQ.jpeg" /></figure><h4>Flag 0 …</h4><p>The first hint tells us we need to look at the source code.</p><p>Go ahead and take a look …</p><p>Do you spot anything out of the ordinary?</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/467/1*gMZT_IFZtbSN1-f90dS5xw.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/489/1*53O8-Oea5BrkvJu8KfnU2Q.png" /></figure><p>You should’ve found something is missing from the webpage.</p><p>The code indicates that there should be an image displayed but there isn’t.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/492/1*3QIcSt-dpUrbuJRvZiVscQ.png" /></figure><p>To view the image copy the file name and insert it to the end of the URL path.</p><p>Congrats, you captured the <strong>FLAG</strong>!</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/647/1*PnrlUmRN6PDfISEvp8inPg.png" /></figure><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=aefecf9a0af1" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Penetration Testing: A Quick Overview …]]></title>
            <link>https://medium.com/@thewalkingeclipse/penetration-testing-a-quick-overview-fe3fbe822b86?source=rss-34a65661daad------2</link>
            <guid isPermaLink="false">https://medium.com/p/fe3fbe822b86</guid>
            <category><![CDATA[data-breach]]></category>
            <category><![CDATA[cybersecurity-education]]></category>
            <category><![CDATA[pentest]]></category>
            <category><![CDATA[penetration-testing]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <dc:creator><![CDATA[WalkingEclipse]]></dc:creator>
            <pubDate>Sun, 25 Aug 2024 16:01:30 GMT</pubDate>
            <atom:updated>2024-08-25T16:01:30.856Z</atom:updated>
            <content:encoded><![CDATA[<h3>Penetration Testing: A Quick Overview …</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*f7rRHS7vWovmJzdWWGfVWA.jpeg" /></figure><h3>What is it?..</h3><p>We have seen an incline in data breaches through ransomware attacks, with big corporations headlining such as the Colonial Pipeline and most recently Caesars Entertainment. Bringing penetration testing into focus as a great security preventative measure.</p><p>Penetration testers act as malicious actors attempting to breach an organization by finding and exploiting vulnerabilities. In simplest terms, organizations contract penetration testers to act as adversaries and exploit vulnerabilities to aid the organization in understanding its security landscape.</p><p>Penetration testing allows for a deeper look at the damage a breach can cause. Of course, there are a lot of moving parts before, during, and after a penetration test which I will cover in-depth in other posts. For now, I just want to provide a general overview of what penetration testing is.</p><h3>Why is penetration testing important?..</h3><p>Having a penetration test done is the best investment an organization can make. How can organizations defend their assets against malicious actors when they are unaware of how they could be potentially breached? Most organizations will implement basic security practices which is a great start but in today’s ever-evolving technological world much more is needed. When organizations are informed of where their weaknesses lie they can better protect their assets by strengthening those areas.</p><p>Additionally, many organizations are required to undergo penetration testing to remain compliant and abide by the laws and regulations pertaining to their specific industry. Some of these regulations include PCI DSS, HIPPA, GDPR, and many others.</p><h3>Breaking it down …</h3><p>To get a more rounded basic understanding of what penetration testing is, it’s important to break it down into its categories, types, environments, and stages.</p><h4>Categories</h4><ul><li><strong>White-Box: </strong>all the information necessary is provided by the organization about the environments that will be tested. This includes a range of things like IP addresses, source code, credentials, documentation, network infrastructure, etc.</li><li><strong>Black-Box: </strong>this test best simulates a malicious actor since it involves heavy reconnaissance due to the penetration tester having zero knowledge of the environments to be tested.</li><li><strong>Gray-Box: </strong>a combination of white-box and black-box testing. Partial information about the environments is provided while keeping other information hidden.</li></ul><h4>Types</h4><ul><li><strong>Internal: </strong>testing begins inside the network, aiming to gain access to privileged information.</li><li><strong>External: </strong>testing begins outside the network, aiming to gain access to the internal network.</li></ul><h4>Environments</h4><ul><li><strong>Network: </strong>a network scan is conducted to identify open/closed ports, the corresponding services, the versions running, etc.</li><li><strong>Perimeter Devices: </strong>Routers, switches, firewalls, IDS/IPS, antivirus, etc.</li><li><strong>Wireless Networks: </strong>Wi-Fi, Bluetooth, RFID, NFC, etc.</li><li><strong>Mobile: </strong>iOS and Android devices.</li><li><strong>Web Applications: </strong>web applications and the technology used to operate them.</li><li><strong>Physical: </strong>building entry points, gates, security personnel, cameras, buildings, etc. Social engineering plays a big role here.</li><li><strong>Cloud: </strong>tests are conducted to determine the technology used and if any vulnerabilities exist.</li><li><strong>Databases: </strong>MySQL, PostgreSQL, Oracle, etc.</li></ul><h4>Stages</h4><ol><li><strong>Pre-engagement:</strong> The penetration tester and organization agree on what is to be tested (in scope) and what is not (out of scope). The legal implications for both sides are discussed and mutually agreed on. The organization specifies its goals, business requirements, and much more.</li><li><strong>Reconnaissance:</strong> The penetration testers will begin gathering as much information about the organization and its network as possible. There are two types of reconnaissance, passive and active. The information gathered can be used to formulate an appropriate approach for later stages.</li><li><strong>Discovery:</strong> A combination of additional reconnaissance and vulnerability discoverability. Here a penetration tester can find additional information such as IP addresses, DNS details, directories, usernames, etc. A vulnerability scan is also performed to find any potential known vulnerabilities.</li><li><strong>Vulnerability Assessment:</strong> Vulnerabilities found are scored based on their severity level using The Common Vulnerability Scoring System. This helps determine which vulnerabilities need to be urgently addressed by the organization and the damage they can cause. These vulnerabilities are used to gain access in the next stage of the penetration test.</li><li><strong>Exploitation:</strong> This stage requires the exploitation of the vulnerabilities found previously. Notes are taken on the exploitation process so it can be replicated by the organization if needed.</li><li><strong>Post-Exploitation:</strong> This stage is all about maintaining access and documenting the data encountered throughout the exploitation. Important things to note are how long access was maintained and if the breach was noticed at any point.</li><li><strong>Reporting &amp; Risk Analysis:</strong> All the information gathered in previous stages is compiled into a comprehensive report. This report includes a risk analysis of the vulnerabilities found. Recommendations are also made to the organization on how to mitigate the vulnerabilities.</li><li><strong>Remediation:</strong> The organization is now tasked with addressing the vulnerabilities and implementing the recommendations. After they complete their tasks the penetration tester will go back and reassess the vulnerabilities.</li></ol><h3>Let’s Wrap It Up …</h3><p>This concludes the quick overview of penetration testing and its basic concepts. There is a lot more that goes into penetration testing which I will be breaking down further in upcoming posts. Performing a penetration test against an organization requires authorization from the organization’s stakeholders, otherwise it is considered illegal and punishable by the law.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=fe3fbe822b86" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[The Honeytrap: How Honeypots Lure Cyber Intruders]]></title>
            <link>https://medium.com/@thewalkingeclipse/the-honeytrap-how-honeypots-lure-cyber-intruders-72020e9f1cc0?source=rss-34a65661daad------2</link>
            <guid isPermaLink="false">https://medium.com/p/72020e9f1cc0</guid>
            <category><![CDATA[cybersecurity-tools]]></category>
            <category><![CDATA[honeypot]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[honeynet]]></category>
            <dc:creator><![CDATA[WalkingEclipse]]></dc:creator>
            <pubDate>Sun, 25 Aug 2024 16:01:26 GMT</pubDate>
            <atom:updated>2024-08-25T16:01:26.770Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*bGv85zH8-XkZiw-6iLS8Xg.jpeg" /></figure><h3>Lure Me In Honey …</h3><p>Hackers are constantly finding creative ways to penetrate a network to extract sensitive data. Imagine if there was a way to entrap hackers in a fake network environment and get front-row seats to witness their attack tactics. Well, there is a way and it’s called honeypots! Honeypots are decoy environments set up near the actual network to lure hackers and gather insights into their attack methods. Once the hacker is inside the honeypot security teams can monitor their activities and help keep them from reaching the real network.</p><h3>Main Honeypot Types</h3><h4>Production</h4><p>This type of honeypot is very popular due to how relatively easy it is to implement and the amount of information gathering it does. It collects IP addresses, traffic volume, intrusion date and time, etc. It is commonly used by corporations, private businesses, politicians, and many others.</p><h4>Research</h4><p>A research honeypot is very sophisticated and collects various details about attack techniques used. It is commonly used by governments, intelligence agencies, research organizations, and more. This type of honeypot is great at providing a deeper insight into how attackers perform attacks and the techniques they use.</p><h3>Specialized Honeypot Types</h3><h4>Malware</h4><p>The environment is exposed to known vulnerabilities to attract attacks and gather intelligence to better understand how attackers execute these attacks. Organizations can use the information gathered and make necessary changes to strengthen their security posture.</p><h4>Spam</h4><p>Focuses on capturing spam emails by creating a dedicated spam email address that can be scrapped by attackers using an email harvester. Once the attacker has the email address they will begin sending spam emails. The information gathered can be used to block the sender and similar emails.</p><h4>Database</h4><p>Houses fake datasets in an environment vulnerable to software and architecture structures to attract attackers. Information is gathered on injection attack techniques, credential hijacking, and various similar attacks.</p><h4>Spider</h4><p>This honeypot targets web and ad-network crawlers to collect the necessary information to help better understand malicious bots and blocking methods.</p><h3>Honeypot Complexity Classification</h3><h4>Low-interaction</h4><p>A low-interaction honeypot complexity environment collects basic information about an attacker as it contains low resources which results in advanced attackers easily spotting them. It is a convenient and commonly used complexity due to how easy it is to set up and maintain.</p><h4>High-interaction</h4><p>A high-interaction honeypot complexity environment consists of multiple levels making it interactive to hold an attacker’s attention. Implementing a “honeywall” or perimeter around the honeypot is highly recommended to protect the real network as it allows the security team to control the inbound/outbound traffic.</p><h4>Pure</h4><p>A pure honeypot complexity environment is a full-scale environment mimicking the real production environment making it highly interactive. This complexity allows the security team to track the attackers’ activity and is mostly used for research purposes.</p><h3>And Then There are Honeynets</h3><p>A honeynet consists of two or more interconnected honeypots and they are designed to collect data from sophisticated attacks like ransomware and DDoS. Honeynets offer a more realistic feel for attackers making them believe they are successfully moving from one point to another. This allows the security team to gather information on the techniques attackers use to launch sophisticated attacks and how they move about once inside the network.</p><h3>Benefits &amp; Risks</h3><h4>Benefits</h4><ul><li>Test incident response</li><li>Slow down or deter attackers</li><li>Gather intelligence and use it to strengthen the security posture</li></ul><h4>Risks</h4><ul><li>Cannot detect data breaches</li><li>Improper configuration can lead to attackers breaching the real network</li><li>Attackers can use false attacks on honeypots to distract the security team from a real attack</li></ul><h3>Sticky Situation…</h3><p>Honeypots enhance cybersecurity by providing intelligence to organizations and enabling researchers to study attack techniques and attacker methods. These controlled environments allow malicious actors to launch attacks without causing real damage, offering insights unattainable until after a data breach. However, honeypots also carry risks, and acknowledging them and their limitations is crucial to keeping the real network secure.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=72020e9f1cc0" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Am I Being Phished?]]></title>
            <link>https://medium.com/@thewalkingeclipse/am-i-being-phished-804081c79940?source=rss-34a65661daad------2</link>
            <guid isPermaLink="false">https://medium.com/p/804081c79940</guid>
            <category><![CDATA[phishing]]></category>
            <category><![CDATA[phishing-email]]></category>
            <category><![CDATA[social-engineering]]></category>
            <category><![CDATA[phishing-awareness]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <dc:creator><![CDATA[WalkingEclipse]]></dc:creator>
            <pubDate>Sun, 18 Aug 2024 16:01:38 GMT</pubDate>
            <atom:updated>2024-08-18T16:01:38.268Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*oWq0AtMd-e4NdCrz3EVfFQ.png" /></figure><h3>Phish, Phish, Phish …</h3><p>Social engineering is the most common threat companies and individuals alike face. Malicious actors launch social engineering attacks in an attempt to gain access to information they can further exploit. There are several <a href="https://www.hackingthepath.com/post/you-ve-been-fooled-social-engineering">social engineering</a> attacks such as Baiting, Pretexting, Quid Pro Quo, Phishing, etc. So, which social engineering attack is most commonly used? Phishing! That’s right, phishing has a high success rate making it a favorite among malicious actors. But how effective are we at detecting phishing emails? Well, the answer is … we are not as effective as we like to think. Even cybersecurity professionals have fallen victim to phishing attacks!</p><h3>Hooking The Bait …</h3><p>Malicious actors have a way of making their phishing emails sound important and urgent. They hook the victim by making them think that they must take action and if not there will be a negative consequence in return. Phishing emails will usually contain a malicious link or attachment.</p><p>Let’s look at the following email …</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Yl1zweJztWp0wZX_Uou42w.png" /></figure><p>… Do you spot any red flags?</p><p>Although phishing emails vary in content, they all tend to contain the same red flags. Let’s examine the above email in detail …</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*zdoaOGbN03Ggg-joy3TRhQ.png" /></figure><p>The subject line of this email suggests that the contents of the email are important and action must be taken. To be fair sometimes providers do send emails with subjects similar to this one. But it is important to note the sense of urgency the malicious actor is implementing here as it sets the tone for the rest of the email.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*zfFeJgent9Y5_tnW9-exow.png" /></figure><p>Next, take a look at the sender’s name and email address. This is the first clear red flag encountered in this email. The sender’s name indicates that this email should be coming from Zelle® but the name is <em>zelle fast</em> and the email address is <a href="mailto:bakaretracy123@gmail.com"><em>bakaretracy123@gmail.com</em></a><em> </em>which shows that this email is not coming from Zelle® but rather from someone attempting to impersonate the company. Why would a legitimate company use a regular Gmail account to send its customers emails?</p><p>Phishy …</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*azemC6hdY0d7CGOPWUAmlQ.png" /></figure><p>The <em>UNDER REVIEW</em> purple button is clickable although at first glance it does not show any indication that it is. If the victim of this email had clicked on the button, they would have been taken to a website that prompts them to input their login credentials. Many times, malicious actors will include buttons like these to trick the victim into clicking it either out of curiosity or accidentally.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*_kcezQt2mYWAzBijZdERAw.png" /></figure><p>Upon further inspecting the body of the email many red flags can be spotted. The name of the person who is “sending” money is inside parentheses which is unusual. Malicious actors tend to use phishing templates for a faster creation process which contain fill-in fields and we can assume that they placed the name <em>Brett Trent </em>as one of the fillers.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*QnkTk0wOChe4Ap6EVSvRhg.png" /></figure><p>The second paragraph also urges the victim to take action in order to receive payment by following the given instructions. It also fails to mention the name of the sender’s bank. Another thing to note here is the use of the word <em>usually</em> which hints at a <em>may or may not</em> meaning.</p><p><em>“You’ll may or may not get their payment once you follow the instructions below.”</em></p><p>Smells real phishy …</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*rjhzpAAN-E8am2UNV_0eCg.png" /></figure><p>Again, pay attention to word usage. Here the malicious actor used the word <em>hereby</em> to sound authoritative. At the beginning of the email, there is an amount of <em>$85 USD</em> shown but, in this paragraph, it is stated that the victim will receive an additional <em>$315.00 USD</em> in order to obtain a certificate that provides an <em>unrestricted zelle account</em>. The malicious actor is promising more money than expected plus an unrestricted account, sounds too good to be true. The last sentence contains incorrect grammar which is typical for phishing emails. Grammar mistakes are not spotted right away and can be easily missed if not read thoroughly.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*yXhpunIJUbrDxjz53t571Q.png" /></figure><p>The malicious actor uses persuasive language to put the victim at ease and ensure them that they <em>will receive their payment and an unrestricted zelle account</em>. But hold on! They finish off by stating “<em>neither the buyer nor the seller will lose a dime</em>”, this is an odd statement to make. I have not come across a company that uses language like this.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/704/1*yjOiluuHz2BrzDzipbghIA.png" /></figure><p>Lastly, at the end of the email, the malicious actor added a copyright stamp to further legitimatize the email. The legitimate Zelle® has the trademark symbol and it is owned by Early Warning Services, LLC.</p><h3>Spotting The Phish …</h3><p>Here are the main takeaways to help spot phishing emails:</p><ul><li><strong>Email address</strong> — Pay attention to the structure of the email address and the sender’s name. Often the name will look legitimate, but the email address will contain an error and give it away.</li><li><strong>Tone &amp; Timing</strong> — Malicious actors are notorious for setting a tone of urgency on their email subject lines and email bodies. If an email is prompting you to take action make sure you are expecting such email and if not, it is best to call your provider directly to verify.</li><li><strong>Color scheme &amp; graphics</strong> — If the email contains any graphics such as logos pay close attention to them as they will often seem a bit off (pixelated) and the color scheme will not match the actual legitimate company. This might not always be the case since some phishing emails are more sophisticated than others.</li><li><strong>Grammar</strong> — This is probably one of the best things to look for because 9/10 times the phishing email contains misspelled words, improper sentence structure, slang, etc. However often these errors are overlooked because most people just skim through the email instead of reading it thoroughly.</li><li><strong>Too good to be true offers</strong> — Some phishing emails will promise something in return for doing what is being asked of them but the reward sounds too good to be true. No one gives away money via email … yea I know bummer.</li><li><strong>Greeting</strong> — Phishing emails will contain a generalized greeting such as <em>Hello Customer</em> or <em>Dear Customer.</em> This is because malicious actors do not know your name or as explained earlier they are using fill-in phishing templates. Any service provider you use will always greet you by your first name or last name or both.</li><li><strong>Attachments &amp; Links</strong> — Be on the lookout for weird attachments and links since these can be malicious. Malicious attachments will have the file extension ending in something unfamiliar like <em>.exe.</em></li><li><strong>Requesting sensitive data</strong> — Credentials, financial information, and any Personal Identifiable Information (PII) are considered sensitive data. If an email is asking you to verify or provide sensitive data it is most likely a phishing email.</li></ul><h3>Phish Me Not …</h3><p>As technology evolves so do social engineering attacks and phishing emails are getting more sophisticated every day. Staying informed about phishing email trends and learning more about social engineering can save you from becoming a victim. Successful phishing attacks can cause devastating damage to companies and individuals. Data has become one of the most valuable assets that must be protected. Stay vigilant and say <strong>phish me not</strong> to malicious actors.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=804081c79940" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[You’ve Been Fooled: Social Engineering Edition]]></title>
            <link>https://medium.com/@thewalkingeclipse/youve-been-fooled-social-engineering-edition-ecc3ddf5c29e?source=rss-34a65661daad------2</link>
            <guid isPermaLink="false">https://medium.com/p/ecc3ddf5c29e</guid>
            <category><![CDATA[cybersecurity-awareness]]></category>
            <category><![CDATA[cyberattack]]></category>
            <category><![CDATA[cybersecurity-education]]></category>
            <category><![CDATA[social-engineering]]></category>
            <dc:creator><![CDATA[WalkingEclipse]]></dc:creator>
            <pubDate>Sat, 10 Aug 2024 11:08:09 GMT</pubDate>
            <atom:updated>2024-08-10T11:08:09.978Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*znMGC7kyLuCfkyv75L5y2g.jpeg" /></figure><h3>What is Social Engineering?..</h3><p>Social engineering is a form of attack that exploits humans by using manipulative tactics to trick victims into doing what the malicious actor needs to further perform an attack. Humans are inherently trusting in the workforce and attackers use this to their advantage. There are many forms of social engineering such as phishing, baiting, tailgating, quid pro quo, and more.</p><p>The first step malicious actors take is to investigate the target which is also referred to as the reconnaissance phase. They will find information regarding the organization, employees, emails, phone numbers, social media, third-party vendors, etc. Malicious actors will use this information to determine which social engineering attack to launch.</p><h3>Social Engineering Attacks …</h3><p><strong>Phishing</strong> — An attacker sends an email to its victim masquerading it as legitimate communication to trick them into clicking on a link that either takes the victim to a site where they are asked to input login or personal information or the link downloads malware.</p><p><strong>Baiting</strong> — This attack involves leaving a physical device such as a USB stick containing malware in a location where it could be found by the target or someone with access to the target.</p><p><strong>Tailgating</strong> — Also known as “piggybacking”, tailgating is when an attacker follows an authorized party into a secured area. An authorized party will often just hold the door open for the attacker under the assumption that they also are allowed in the secure area.</p><p><strong>Quid Pro Quo</strong> — This term translates to “a favor for a favor” and involves an attacker pretending to be someone exchanging a favor with the victim. This attack is best explained by using an example: An attacker pretends to be someone from the IT department calling the victim to help walk them through the steps to update their system or install a required software. The attacker is pretending to help the victim when in reality they are using them to gain access to the network by obtaining credentials or remote access.</p><h3>Prevention …</h3><p>Avoid clicking on links sent via email or other forms of communication if it is from an unknown source. Always double-check the email address of the sender and be aware that attackers can spoof a legitimate email address so always double-check by contacting the source.</p><p>Provide training to your employees on cybersecurity awareness and all the different social engineering attacks they might face. Education is knowledge and employees need to be aware of what these attacks might look like to help them prevent attacks.</p><p>Keep software up to date on all devices as updates usually offer security patches. When there is a known vulnerability and your systems are not patched against it, attackers will exploit it to gain access.</p><p>Always verify the identities of individuals you do not know to ensure they are who they say they are. Be wary of calls claiming to be from IT, any other department, third-party vendors, or anyone claiming to need a favor from you or is offering to help you.</p><p>Maintain anti-malware up to date so the most recent version is running on the systems. Anti-malware companies send out updates to patch vulnerabilities and because they have added detection tools for new attack vectors.</p><h3>Don’t Be Fooled …</h3><p>Social engineering is meant to trick, fool, and manipulate individuals into doing what an attacker wants without much resistance. It is vital for companies to invest in cybersecurity training as employees are vulnerable to these types of attacks. If an employee is not informed on what to look out for the attacker will use that to gain access and compromise the network. DON’T BE FOOLED!!!</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=ecc3ddf5c29e" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Cybersecurity & End-User Education]]></title>
            <link>https://medium.com/@thewalkingeclipse/cybersecurity-end-user-education-8bda179932ac?source=rss-34a65661daad------2</link>
            <guid isPermaLink="false">https://medium.com/p/8bda179932ac</guid>
            <category><![CDATA[social-engineering]]></category>
            <category><![CDATA[human-error]]></category>
            <category><![CDATA[end-users]]></category>
            <category><![CDATA[cybersecurity-education]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <dc:creator><![CDATA[WalkingEclipse]]></dc:creator>
            <pubDate>Fri, 20 Jan 2023 00:33:45 GMT</pubDate>
            <atom:updated>2024-11-18T06:42:51.947Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*qnuf4hnzOIFUpY7O" /></figure><h3>The Culprit …</h3><p>Human error is the main culprit behind security breaches and employees are at the forefront when it comes to keeping them at bay. Human error can result from erroneous execution of daily tasks, uninformed decision-making, or a combination of both. Most companies fail to invest in cybersecurity education and when their employees come face to face with a potential attack, they fail to recognize it as such.</p><p>Given that human error is considered the number one cause of security breaches the best defense against it, is end-user education. Providing company employees with cybersecurity education can better equip them to detect and even stop a breach before it even begins. But how can companies do this?</p><h3>Cybersecurity &amp; End-user Education Starting Point …</h3><p>Finding topics to cover can be overwhelming because there are so many attack vectors out in the wild. The best thing to do is to focus on one of the most common forms of attacks such as social engineering which gives you plenty of coverage. <a href="https://walkingeclipse.com/youve-been-fooled">Social engineering</a> is the most common form of attack companies face and this is where most attackers begin. There are many subcategories to social engineering such as phishing, vishing, baiting, pretexting, and so many more.</p><p>Building simple and easy-to-digest educational material around social engineering and its subcategories will help employees understand, recognize, and potentially prevent these types of attacks. Conduct regular training or workshops and promote a security focus work environment to encourage employees to participate.</p><h3>Human Error …</h3><p>The two most common human errors are those involving daily tasks and decision-making. Employees are required to make decisions and if not well informed they can make the wrong decision thinking they made the correct one. One example of this is clicking on a link from a phishing email that looks legitimate but it is not. The employee does not know what to look for in phishing emails or the tactics used by attackers. By the employee clicking on that link the network is now compromised.</p><p>Human error involving daily tasks can be something like sending an email containing sensitive information to the wrong person. This can occur due to the employee being distracted, tired, or simply because of the suggestion feature most email providers offer. Something so minuscule can place company security at risk of a security breach.</p><h3>Combating Human Error …</h3><p>As previously stated, the best way to combat human error is by providing end-user education through workshops or regular training. The material provided should be informative and easy to understand. Take into consideration that everyone has different learning styles and try to incorporate them as best as possible in your workshops or training. Every company operates differently therefore implement solutions to employee tiredness, distraction, etc. that best suits your company’s needs.</p><p><em>Originally published at </em><a href="https://walkingeclipse.hashnode.dev/cybersecurity-end-user-education"><em>https://walkingeclipse.hashnode.dev</em></a><em> on January 20, 2023.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=8bda179932ac" width="1" height="1" alt="">]]></content:encoded>
        </item>
    </channel>
</rss>