<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>mytty</title>
    <link>https://mytty.org/</link>
    <description>Recent content on mytty</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <copyright>Except where otherwise noted, content on this site is created by Richard Sammet and&lt;br&gt; licensed under a &lt;a href=http://creativecommons.org/licenses/by/4.0/&gt;Creative Commons Attribution 4.0 International License&lt;/a&gt;.</copyright>
    <lastBuildDate>Thu, 15 Aug 2019 17:42:42 +0000</lastBuildDate>
    
	<atom:link href="https://mytty.org/index.xml" rel="self" type="application/rss+xml" />
    
    
    <item>
      <title>TYS 0x07 - onebyte to rule them all</title>
      <link>https://mytty.org/posts/tys_0x07_onebyte/</link>
      <pubDate>Thu, 15 Aug 2019 17:42:42 +0000</pubDate>
      
      <guid>https://mytty.org/posts/tys_0x07_onebyte/</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This post is part of the Test Your Skills series. You can find an introduction &lt;a href=&#34;https://mytty.org/projects/tys/&#34;&gt;here&lt;/a&gt;. And an overview of all TYS&amp;rsquo;s currently available is over &lt;a href=&#34;https://mytty.org/tags/tys/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;hr /&gt;

&lt;h4 id=&#34;challenge&#34;&gt;Challenge&lt;/h4&gt;

&lt;p&gt;The goal of this challenge is to write a script/tool/exploit which successfully bypasses the login of the network enabled service running in the provided docker container - without changing the docker run command (run it exactly the way as shown below) or any of the scripts/files provided.
Feel free to explore the container and take a closer look at the application binary.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>TYS 0x06 - willItBounce</title>
      <link>https://mytty.org/posts/tys_0x06_willitbounce/</link>
      <pubDate>Fri, 02 Aug 2019 17:50:15 +0000</pubDate>
      
      <guid>https://mytty.org/posts/tys_0x06_willitbounce/</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This post is part of the Test Your Skills series. You can find an introduction &lt;a href=&#34;https://mytty.org/projects/tys/&#34;&gt;here&lt;/a&gt;. And an overview of all TYS&amp;rsquo;s currently available is over &lt;a href=&#34;https://mytty.org/tags/tys/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;hr /&gt;

&lt;h4 id=&#34;challenge&#34;&gt;Challenge&lt;/h4&gt;

&lt;p&gt;The goal of this challenge is to find a way to send a specific input from your host to the &amp;ldquo;Hidden Service&amp;rdquo; inside the container (as illustrated by the red arrow) - without changing the docker run command (build and run it exactly the way as shown below) or any of the scripts/files provided.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>TYS 0x05 - open sesame</title>
      <link>https://mytty.org/posts/tys_0x05_open_sesame/</link>
      <pubDate>Mon, 27 May 2019 07:50:15 +0000</pubDate>
      
      <guid>https://mytty.org/posts/tys_0x05_open_sesame/</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This post is part of the Test Your Skills series. You can find an introduction &lt;a href=&#34;https://mytty.org/projects/tys/&#34;&gt;here&lt;/a&gt;. And an overview of all TYS&amp;rsquo;s currently available is over &lt;a href=&#34;https://mytty.org/tags/tys/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;hr /&gt;

&lt;h4 id=&#34;challenge&#34;&gt;Challenge&lt;/h4&gt;

&lt;p&gt;The goal of this challenge is to get your hands on the secret code which itself is hidden behind a secret and a captcha protection! You are allowed use any means necessary - think outside the box!&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>TYS 0x04 - Is it really that easy?!</title>
      <link>https://mytty.org/posts/tys_0x04_is_it_really_that_easy/</link>
      <pubDate>Thu, 16 May 2019 19:02:09 +0000</pubDate>
      
      <guid>https://mytty.org/posts/tys_0x04_is_it_really_that_easy/</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This post is part of the Test Your Skills series. You can find an introduction &lt;a href=&#34;https://mytty.org/projects/tys/&#34;&gt;here&lt;/a&gt;. And an overview of all TYS&amp;rsquo;s currently available is over &lt;a href=&#34;https://mytty.org/tags/tys/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;hr /&gt;

&lt;h3 id=&#34;challenge&#34;&gt;Challenge&lt;/h3&gt;

&lt;p&gt;Your objective? Get root! But, do it without making any changes to the container/image or the file-system outside your users home directory (/home/void) and do not change the docker run command (run it the way shown below)!&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Hacking a telnetd sensor node on the back of busybox telnetd</title>
      <link>https://mytty.org/posts/telnetd_sensor_node/</link>
      <pubDate>Fri, 03 May 2019 16:30:21 +0000</pubDate>
      
      <guid>https://mytty.org/posts/telnetd_sensor_node/</guid>
      <description>&lt;h3 id=&#34;telnetd-sensor-node-what&#34;&gt;Telnetd sensor node what?!&lt;/h3&gt;

&lt;p&gt;I call it a sensor node (more on that in a later post), you might call it a telnetd &lt;a href=&#34;https://en.wikipedia.org/wiki/Method_stub&#34;&gt;stub&lt;/a&gt;. We are essentially talking about a telnet service which looks like a telnet service, is fingerprinted as a telnet service, replies like a telnet service, but is limited to bare minimal functionality and just meant as a sensor to gather information.&lt;/p&gt;

&lt;p&gt;In this case, we are looking for the folks who are looking for us - or, who are looking for exposed services on the interwebs (or maybe your corp network?).&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>NTP Fingerprinting with nmap</title>
      <link>https://mytty.org/posts/ntp_fingerprinting_with_nmap/</link>
      <pubDate>Sat, 20 Apr 2019 13:06:42 +0000</pubDate>
      
      <guid>https://mytty.org/posts/ntp_fingerprinting_with_nmap/</guid>
      <description>&lt;h3 id=&#34;ntp-an-easy-quick-reliable-and-lightwight-way-to-fingerprint-a-system&#34;&gt;NTP - An easy, quick, reliable and lightwight way to fingerprint a system&lt;/h3&gt;

&lt;p&gt;About ten years ago, and around three years after the nmap scripting engine (NSE) &lt;a href=&#34;https://github.com/nmap/nmap/blob/master/CHANGELOG#L11491&#34;&gt;made it into mainline&lt;/a&gt;, I wrote and contributed &lt;a href=&#34;https://nmap.org/nsedoc/scripts/ntp-info.html&#34;&gt;&lt;code&gt;ntp-info&lt;/code&gt;&lt;/a&gt; to the &lt;a href=&#34;https://nmap.org/&#34;&gt;nmap project&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>TYS 0x03 - I fatfinger deleted my cute little puppy!</title>
      <link>https://mytty.org/posts/tys_0x03_my_cute_little_puppy/</link>
      <pubDate>Sat, 13 Apr 2019 11:02:14 +0000</pubDate>
      
      <guid>https://mytty.org/posts/tys_0x03_my_cute_little_puppy/</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This post is part of the Test Your Skills series. You can find an introduction &lt;a href=&#34;https://mytty.org/projects/tys/&#34;&gt;here&lt;/a&gt;. And an overview of all TYS&amp;rsquo;s currently available is over &lt;a href=&#34;https://mytty.org/tags/tys/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;hr /&gt;

&lt;h3 id=&#34;scenario&#34;&gt;Scenario&lt;/h3&gt;

&lt;p&gt;Bob, who has a very cute little puppy, sends you an email asking for your help. He says that he, by accident, deleted the best picture he had of his cute little puppy from a USB memory stick. He also mentioned that he immediately unplugged the memory stick once he noticed that he deleted the picture. He took an image of the stick with &lt;a href=&#34;https://en.wikipedia.org/wiki/Dd_(Unix)&#34;&gt;DD&lt;/a&gt; and attached it to the email.&lt;/p&gt;

&lt;p&gt;His last line in the mail is something like: This is really important to me. I need this picture back asap. I will make up to you if you can deliver within 72 hours!&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>dockerinoz - build containers that won&#39;t haunt you</title>
      <link>https://mytty.org/posts/dockerinoz/</link>
      <pubDate>Sat, 06 Apr 2019 11:32:33 +0000</pubDate>
      
      <guid>https://mytty.org/posts/dockerinoz/</guid>
      <description>&lt;h3 id=&#34;dockerinoz-simple-dockerfile-security-best-practices-verification&#34;&gt;dockerinoz - simple Dockerfile (security) best practices verification&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;dockerinoz&lt;/strong&gt; is a very small and simple tool which allows you to verify the content of Dockerfiles against a given best practice. It&amp;rsquo;s nothing more than a fancy grep using a bit more than just simple regular expressions.
This approach allows for &lt;em&gt;very&lt;/em&gt; quick verifications which is especially important when implementing &lt;strong&gt;dockerinoz&lt;/strong&gt; into your build pipeline. It also makes &lt;strong&gt;dockerinoz&lt;/strong&gt; super easy to modify and extend - especially as the rules are just regular expressions in a json file (rules.json).&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>TYS 0x02 - PHP in 2019?! Are you insane!?</title>
      <link>https://mytty.org/posts/tys_0x02_php_in_2019/</link>
      <pubDate>Sat, 30 Mar 2019 11:40:11 +0000</pubDate>
      
      <guid>https://mytty.org/posts/tys_0x02_php_in_2019/</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This post is part of the Test Your Skills series. You can find an introduction &lt;a href=&#34;https://mytty.org/projects/tys/&#34;&gt;here&lt;/a&gt;. And an overview of all TYS&amp;rsquo;s currently available is over &lt;a href=&#34;https://mytty.org/tags/tys/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;hr /&gt;

&lt;h3 id=&#34;there-is-a-reason-for-everything&#34;&gt;There is a reason for everything!&lt;/h3&gt;

&lt;p&gt;PHP was one of the first web-specialized languages (created 1994) broadly used. Even today, 25 years later, PHP is powering at least parts of most of the web based applications on the internet (~80% - check &lt;a href=&#34;https://w3techs.com/&#34;&gt;https://w3techs.com/&lt;/a&gt;).&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>TYS 0x01 - communication in the shadows</title>
      <link>https://mytty.org/posts/tys_0x01_communication_in_the_shadows/</link>
      <pubDate>Sun, 24 Mar 2019 18:20:11 +0000</pubDate>
      
      <guid>https://mytty.org/posts/tys_0x01_communication_in_the_shadows/</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This post is part of the Test Your Skills series. You can find an introduction &lt;a href=&#34;https://mytty.org/projects/tys/&#34;&gt;here&lt;/a&gt;. And an overview of all TYS&amp;rsquo;s currently available is over &lt;a href=&#34;https://mytty.org/tags/tys/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;hr /&gt;

&lt;h3 id=&#34;what-is-going-on-in-our-network&#34;&gt;What is going on in our network?!&lt;/h3&gt;

&lt;p&gt;You are a SOC analyst looking into some weird traffic you spotted on TCP/31337.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>TYS 0x00 - santas little RAT</title>
      <link>https://mytty.org/posts/tys_0x00_santas_little_rat/</link>
      <pubDate>Sat, 16 Mar 2019 20:30:11 +0000</pubDate>
      
      <guid>https://mytty.org/posts/tys_0x00_santas_little_rat/</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This post is part of the Test Your Skills series. You can find an introduction &lt;a href=&#34;https://mytty.org/projects/tys/&#34;&gt;here&lt;/a&gt;. And an overview of all TYS&amp;rsquo;s currently available is over &lt;a href=&#34;https://mytty.org/tags/tys/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;hr /&gt;

&lt;h3 id=&#34;santa-brought-you-a-little-something-for-xmas&#34;&gt;Santa brought you a little something for Xmas!&lt;/h3&gt;

&lt;p&gt;I know, it&amp;rsquo;s not Xmas anymore! But, when I wrote this challenge I was down deep in the Christmas spirit ;)&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>TYS</title>
      <link>https://mytty.org/projects/tys/</link>
      <pubDate>Thu, 14 Mar 2019 23:36:33 +0000</pubDate>
      
      <guid>https://mytty.org/projects/tys/</guid>
      <description>&lt;h3 id=&#34;test-your-skills&#34;&gt;Test Your Skills&lt;/h3&gt;

&lt;p&gt;TYS is a pet project I started around Christmas 2018. Every other week I craft a little cyber security challenge and publish it in my organizations internal wiki for the wider security team to play with. As I exclusively work on these challenges during my spare time I decided to also share them with all of you (if there is actually anybody reading this!).&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>apatf - levenshtein distance in cyber security</title>
      <link>https://mytty.org/posts/apatf/</link>
      <pubDate>Sun, 03 Mar 2019 17:10:26 +0000</pubDate>
      
      <guid>https://mytty.org/posts/apatf/</guid>
      <description>&lt;h3 id=&#34;levenshtein-distance-what&#34;&gt;Levenshtein distance what?&lt;/h3&gt;

&lt;p&gt;If you work or are just interested in cyber security you will have most likely encountered situations in which you would have loved to be able to automatically identify the percentage wise difference of two files or strings. A good example is a login or error page check. Imagine you are fuzzing a web application and you try to differentiate a successful injection from an error page.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>except Exception as me:</title>
      <link>https://mytty.org/posts/except_exception_as_me/</link>
      <pubDate>Sat, 02 Mar 2019 23:58:11 +0000</pubDate>
      
      <guid>https://mytty.org/posts/except_exception_as_me/</guid>
      <description>&lt;h3 id=&#34;tryagain-true&#34;&gt;tryAgain(True):&lt;/h3&gt;

&lt;p&gt;Ha, you might wonder what this madman is talking about ;) For returning visitors of &lt;a href=&#34;https://mytty.org&#34;&gt;mytty.org&lt;/a&gt; that all should make sense. &lt;a href=&#34;https://mytty.org/about/&#34;&gt;I&lt;/a&gt; used to publish cyber security related content &lt;a href=&#34;http://web.archive.org/web/20120203192347/http://www.mytty.org/&#34;&gt;pretty frequently&lt;/a&gt;. I kept going for a few years until around mid of 2010. I figure that&amp;rsquo;s when my work got the better part of me and my life for good (oh yes, I&amp;rsquo;ve been working consulting hours) and I just stopped publishing any content at all.&lt;/p&gt;</description>
    </item>
    
  </channel>
</rss>