Index
A
- access control list (ACL) / Bypassing reputation filtering in next generation firewalls
- admin account
- AES stream mode
- TCP tunnel, protecting / Protecting your tunnel with AES – stream mode
- Cipher Block Chaining (CBC) mode encryption / Cipher Block Chaining (CBC) mode encryption
- Counter (CTR) mode encryption / Counter (CTR) mode encryption
- anomaly-based mode / Bypassing IPS with handmade XOR encryption
- asymmetric / Introduction to encryption algorithms
- attacker machine
- preparing / Preparing the attacker machine
- internet access, setting up / Setting up internet access
B
- BeautifulSoup 3.2.1
- reference link / Parsing a tweet in three lines
- behavior-based mode / Bypassing IPS with handmade XOR encryption
- Block Mode / Protecting your tunnel with AES – stream mode, Cipher Block Chaining (CBC) mode encryption
- botnet filtering
- bypassing / Bypassing botnet filtering
- IPS, bypassing with handmade XOR encryption / Bypassing IPS with handmade XOR encryption
C
- chained connection / Countermeasures
- Cipher Block Chaining (CBC) mode encryption / Protecting your tunnel with AES – stream mode, Cipher Block Chaining (CBC) mode encryption
- Component Object Model (COM) / Bypassing host-based firewalls
- COM protocol
- reference link / Bypassing host-based firewalls
- connection attempts
- tuning / Tuning the connection attempts
- Counter (CTR) mode encryption / Protecting your tunnel with AES – stream mode, Counter (CTR) mode encryption
D
- data exfiltration, HTTP reverse shell
- client side / Client side
- server side / Server side
- data exfiltration, TCP reverse shell
- server side / Server side
- client side / Client side
- Data Leaking Prevention (DLP) / Countermeasures
- DNS aware shell / DNS aware shell
- DNS poisoning
- about / Password phishing – DNS poisoning
- Python script, used / Using Python script
- dynamic DNS (DDNS) / Dynamic DNS
E
- encryption algorithms / Introduction to encryption algorithms
F
- Facebook
- password phishing / Facebook password phishing
- false positive / Bypassing IPS with handmade XOR encryption
- Firefox API
- hooking, with Immunity Debugger / Firefox API hooking with Immunity Debugger
- Firefox browser
- about / Man in the browser
- process / Firefox process
G
- Google Chrome
- saved passwords, dumping / Dumping saved passwords out of Google Chrome
- password remotely, acquiring / Acquiring the password remotely
- Google Forms
- interacting / Interacting with Google Forms
H
- Hijacking IE / Hijacking IE
- host-based firewalls
- bypassing / Bypassing host-based firewalls
- Hijacking IE / Hijacking IE
- Host-Based Intrusion Detection System (HIDS) / Countermeasures
- HTTP reverse shell
- about / HTTP reverse shell
- coding / Coding the HTTP reverse shell
- server side / Server side
- client side / Client side
- data exfiltration / Data exfiltration – HTTP
- EXE file, exporting / Exporting to EXE
- HTTP session
- recovered password, submitting / Submitting the recovered password over HTTP session
- file, testing against antivirus / Testing the file against antivirus
- Hybrid encryption key / Hybrid encryption key
- hybrid method / Hybrid encryption key
I
- Immunity Debugger
- about / Firefox API hooking with Immunity Debugger
- URL, for installing / Firefox API hooking with Immunity Debugger
- inline transfer / Client side
- Internet Explorer (IE) / Bypassing host-based firewalls
- IPS
- bypassing, with handmade XOR encryption / Bypassing IPS with handmade XOR encryption
K
- KeePass password manager
- hijacking / Hijacking KeePass password manager
- reference link / Hijacking KeePass password manager
- keylogger
- about / Antivirus free keylogger
- pyHook library, installing / Installing pyHook and pywin
- pywin library, installing / Installing pyHook and pywin
- code, adding / Adding code to keylogger
L
- LastPass / Man in the browser
- legitimate windows service
- low-level port scanner
- integrating / Integrating low-level port scanner
M
- Metasploit screen capturing
- replicating / Replicating Metasploit's screen capturing
- Metasploit searching
- replicating, for content / Replicating Metasploit searching for content
- target directory navigation / Target directory navigation
N
- Network Address Translation (NAT) / Setting up internet access
- No-IP agent / Dynamic DNS
P
- password hacking, countermeasures
- about / Countermeasures
- online account, securing / Securing the online account
- computer, securing / Securing your computer
- network, securing / Securing your network
- suspicious activity, viewing / Keeping a watch on any suspicious activity
- persistence
- about / Persistence
- putty.exe persistent, creating / Making putty.exe persistent
- HTTP reverse shell, creating / Making a persistent HTTP reverse shell
- countermeasures / Countermeasures
- Photodex
- about / Privilege escalation – preparing vulnerable software
- URL, for downloading / Privilege escalation – preparing vulnerable software
- Pretty Good Privacy (PGP) / Introduction to encryption algorithms
- private key / Introduction to encryption algorithms
- privilege escalation
- service file / Privilege escalation – weak service file
- vulnerable software, preparing / Privilege escalation – preparing vulnerable software
- legitimate windows service, backdooring / Privilege escalation – backdooring legitimate windows service
- admin account, creating / Privilege escalation – creating a new admin account and covering the tracks
- tracks, covering / Privilege escalation – creating a new admin account and covering the tracks
- privilege escalation attack / Privilege escalation – weak service file
- privilege escalation types
- reference link / Privilege escalation – weak service file
- public key / Introduction to encryption algorithms
- py2exe-0.6.9.win32-py2.7.exe version
- URL, for downloading / Exporting to EXE
- PyCrypto
- reference link / Counter (CTR) mode encryption
- pyHook library
- URL, for downloading / Installing pyHook and pywin
- installing / Installing pyHook and pywin
- Python
- in Firefox proof of concept (PoC) / Python in Firefox proof of concept (PoC)
- in Firefox EXE / Python in Firefox EXE
- Python 2.7.14+ version
- reference link / Preparing the target machine
- Python script
- using / Using Python script
- pywin32 library
- URL, for installing / Acquiring the password remotely
- pywin library
- URL, for downloading / Installing pyHook and pywin
- installing / Installing pyHook and pywin
R
- reputation filtering
- bypassing, in firewall / Bypassing reputation filtering in next generation firewalls
- SourceForge, interacting / Interacting with SourceForge
- Google Forms, interacting / Interacting with Google Forms
- requests 2.7.0
- reference link / Coding the HTTP reverse shell
- RSA asymmetric algorithm
- TCP tunnel, protecting / Protecting your tunnel with RSA
S
- service file / Privilege escalation – weak service file
- shell breakdown
- preventing / Tips for preventing a shell breakdown
- signature-based mode / Bypassing IPS with handmade XOR encryption
- SourceForge
- interacting / Interacting with SourceForge
- reference link / Interacting with SourceForge
- Stream Mode / Protecting your tunnel with AES – stream mode, Counter (CTR) mode encryption
- symmetric / Introduction to encryption algorithms
T
- target machine
- preparing / Preparing the target machine
- TCP reverse shell
- about / TCP reverse shell
- coding / Coding a TCP reverse shell
- server side / Server side
- client side / Client side
- data exfiltration / Data exfiltration – TCP
- EXE file, exporting / Exporting to EXE
- TCP tunnel
- protecting, with AES stream mode / Protecting your tunnel with AES – stream mode
- tracks
- Twitter
- interacting / Interacting with Twitter
- tweet, parsing / Parsing a tweet in three lines
- countermeasures / Countermeasures
U
- user access control (UAC) / Privilege escalation – weak service file
W
- winappdbg library
- URL, for downloading / Python in Firefox proof of concept (PoC)