<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacking on System Overlord</title><link>https://systemoverlord.com/tags/hacking.html</link><description>Recent content in Hacking on System Overlord</description><generator>Hugo</generator><language>en-us</language><managingEditor>david@systemoverlord.com (David Tomaschik)</managingEditor><webMaster>david@systemoverlord.com (David Tomaschik)</webMaster><lastBuildDate>Wed, 22 Nov 2017 00:00:00 +0000</lastBuildDate><atom:link href="https://systemoverlord.com/tags/hacking/index.xml" rel="self" type="application/rss+xml"/><item><title>2017 Hacker Holiday Gift Guide</title><link>https://systemoverlord.com/2017/11/22/2017-hacker-holiday-gift-guide.html</link><pubDate>Wed, 22 Nov 2017 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2017/11/22/2017-hacker-holiday-gift-guide.html</guid><description>&lt;p&gt;I&amp;rsquo;ve been thinking about gifts for Hackers and Makers lately as the holiday
season arrives. I decided I&amp;rsquo;d build a public list of some of my favorite things
(and perhaps some things I&amp;rsquo;d like myself as well!) I&amp;rsquo;ll break it down into a
few categories for different kinds of hackers (and different kinds of gifters as
well). Prices are current as of writing, but not something I&amp;rsquo;ll be updating.&lt;/p&gt;</description></item><item><title>Passing Android Traffic through Burp</title><link>https://systemoverlord.com/2014/07/13/passing-android-traffic-through-burp/</link><pubDate>Sun, 13 Jul 2014 20:57:18 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2014/07/13/passing-android-traffic-through-burp/</guid><description>&lt;p&gt;I wanted to take a look at all HTTP(S) traffic coming from an Android device, even if applications made direct connections without a proxy, so I set up a transparent Burp proxy. I decided to put the Proxy on my Kali VM on my laptop, but didn&amp;rsquo;t want to run an AP on there, so I needed to get the traffic to there.&lt;/p&gt;
&lt;h3 id="network-setup"&gt;Network Setup&lt;/h3&gt;
&lt;p&gt;&lt;img src="https://systemoverlord.com/img/blog/wifitap.png" alt="Network Topology Diagram"&gt;&lt;/p&gt;
&lt;p&gt;The diagram shows that my wireless lab is on a separate subnet from the rest of my network, including my laptop. The lab network is a NAT run by IPTables on the Virtual Router. While I certainly could&amp;rsquo;ve ARP poisoned the connection between the Internet Router and the Virtual Router, or even added a static route, I wanted a cleaner solution that would be easier to enable/disable.&lt;/p&gt;</description></item><item><title>Book Review: The Hacker Playbook...</title><link>https://systemoverlord.com/2014/05/21/book-review-the-hacker-playbook/</link><pubDate>Wed, 21 May 2014 01:10:54 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2014/05/21/book-review-the-hacker-playbook/</guid><description>&lt;p&gt;&lt;a href="http://www.amazon.com/gp/product/1494932636/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=1494932636&amp;amp;linkCode=as2&amp;amp;tag=systemovecom-20"&gt;The Hacker Playbook: Practical Guide To Penetration Testing&lt;/a&gt; is an attempt to use a continuous series of football metaphors to describe the process of a network penetration test. Maybe the metaphors would work better for someone who actually watches sports, but I felt they were a bit strained and forced at times. That being said, the actual content and techniques described are solid and generally useful information. It&amp;rsquo;s arranged in the stages of a good penetration test, and reads like a strong guide for those relatively new to penetration testing. Unfortunately, it doesn&amp;rsquo;t set up general guides for each area as much as describing specific &amp;ldquo;plays&amp;rdquo; for each area, so once those techniques start to fall flat, it doesn&amp;rsquo;t leave you with a lot of depth.&lt;/p&gt;</description></item><item><title>A Brief History of the Internet (Security-Wise)</title><link>https://systemoverlord.com/2014/04/16/a-brief-history-of-the-internet-security-wise/</link><pubDate>Wed, 16 Apr 2014 04:55:14 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2014/04/16/a-brief-history-of-the-internet-security-wise/</guid><description>&lt;p&gt;I originally posted this to the &lt;a href="http://dc404.org/"&gt;DC404 Mailing List&lt;/a&gt;, but got some positive feedback, so I thought I&amp;rsquo;d post it here as well. The broad strokes should be correct, but there might be some inaccuracies here — if you&amp;rsquo;re aware of one, please let me know and I&amp;rsquo;ll correct it.&lt;/p&gt;
&lt;p&gt;There was a thread ongoing about Heartbleed, and it turned into a question of why security on the Internet is so complicated, and couldn&amp;rsquo;t it be any simpler? Well, the truth be told, security on the Internet is a house of cards.&lt;/p&gt;</description></item><item><title>Weekly Reading List for 1/18/14</title><link>https://systemoverlord.com/2014/01/18/weekly-reading-list-for-11714/</link><pubDate>Sat, 18 Jan 2014 05:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2014/01/18/weekly-reading-list-for-11714/</guid><description>&lt;p&gt;I&amp;rsquo;ve decided to start posting a weekly reading list of interesting security-related articles I&amp;rsquo;ve come across in the past week. They&amp;rsquo;re not guaranteed to be new, but should at least still be relevant.&lt;/p&gt;
&lt;h4 id="using-a-beaglebone-to-bypass-8021x"&gt;Using a BeagleBone to bypass 802.1x&lt;/h4&gt;
&lt;p&gt;Most security practitioners are already aware that NAC doesn&amp;rsquo;t provide meaningful security. While it&amp;rsquo;ll keep some random guy from plugging in to an exposed ethernet port in the lobby (shouldn&amp;rsquo;t that be turned off?), it won&amp;rsquo;t stop a determined attacker. You can just MITM the legitimate device, let it perform the 802.1x handshake, then send packets appearing to be from the legitimate device. To make it easier, &lt;a href="http://shellsherpa.nl/nac-bypass-8021x-or-beagle-in-the-middle"&gt;ShellSherpa has put together a BeagleBone-based device to automatically MITM the NAC connection&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>LD_PRELOAD for Binary Analysis</title><link>https://systemoverlord.com/2014/01/13/ld_preload-for-binary-analysis/</link><pubDate>Mon, 13 Jan 2014 02:18:16 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2014/01/13/ld_preload-for-binary-analysis/</guid><description>&lt;p&gt;During the BreakIn CTF, there were a few challenges that depended on the return value of of libc functions like &lt;code&gt;time()&lt;/code&gt; or &lt;code&gt;rand()&lt;/code&gt;, and had differing behavior depending on those return values. In order to more easily reverse those binaries, it can be nice to control the return values of those functions. In other cases, you have binaries that may call functions like &lt;code&gt;unlink()&lt;/code&gt;, &lt;code&gt;system()&lt;/code&gt;, etc., where you prefer not to have those functions really called. (Though you are running these untrusted binaries in a VM, right?)&lt;/p&gt;</description></item></channel></rss>