/images/avatar.jpg

Anthares101

Time based user enumeration in Apache Guacamole

Time based user enumeration in Apache Guacamole Is this even a thing? Well, according to OWASP it is! And to my surprise it could work extremelly well given the right scenario. Remember that performing any of the attacks explained in this post to networks without previous consent is illegal, this post information is for educational purposes only. Setup Let’s prepare the environment, I deployed a Tomcat Guacamole instance (v1.5.4) and generated some users.

How to setup the Flipper Zero for Wi-Fi attacks

How to setup the Flipper Zero for Wi-Fi attacks Before starting, remember that performing any of the attacks explained in this post to networks without previous consent is illegal, this post information is for educational purposes only. Introduction You may be thinking: “I just buy the Wi-Fi Flipper board and call it a day” well, not really. Even buying the Flipper Wi-Fi Devboard instead of making a custom module won’t enable the Flipper to start de-authenticating people out of the box, you will need to flash the proper firmware.

MAGI Project a year later

MAGI Project a year later How has MAGI behaved in the last year? Is the Kubernetes cluster even alive? Well, the header image is kind of spoiling the answers to those questions but, since the idea of the post is talking a bit about the implication of having an on premise Kubernetes cluster, you may be interested in continue reading. Is MAGI still running? You probably already knew the answer but yes!

DNS tunneling

DNS tunneling The idea of this technique is to use the DNS protocol to route all the traffic, just like a VPN! Of course this method will make your connection slower but will allow you to bypass certain systems like network filters or captive portals. Obviously, you could use this to exfiltrate data too. The reason why this works is that normally when captive portals or firewalls rules are setup, the administrators block all TCP and UDP connections when certain rule is met but they forget about checking DNS queries.

Attacking Wi-Fi networks with Aircrack-ng

Attacking Wi-Fi networks with Aircrack-ng Before starting, remember that performing any of the attacks explained in this post to networks without previous consent is illegal, this post information is for educational purposes only. Introduction Wi-Fi uses management frames (datagrams are called frames in this context) and data frames. Only data frames are encrypted and injecting them into the network will require a previous association with the AP. This is not necessary for management frames or if we send data frames spoofing some of the clients MAC addresses.

MAGI Project

MAGI project The idea I have been thinking about the idea of building a cluster made of Raspberrys and update my home infrastructure a bit. Right now, I use a Raspberry Pi 4 B as a little server to run Pi Hole, personal projects, Plex… and also as a NAS. All this sevices are run using Docker containers because I love Docker and the management is easier that way, allowing me to recover from a failure really quick.