Technology and Technics. Flolloping Floopily.

Once I started to create spam poetry and search term poetry, and I believed it was original. Then I discovered that great poets of the virtual scrapyard had come before me. Finally, I found serious articles about so-called Found Poetry and I found poets publishing their spam poetry in earnest. I learned about the Sokal … Continue reading Technology and Technics. Flolloping Floopily.

Simple Ping Sweep, Port Scan, and Getting Output from Blind Remote Command Execution

Just dumping some quick and dirty one-liners! These are commands I had used to explore locked-down Windows and Linux machines, using bash or powershell when no other binaries were available or could be transferred to the boxes easily. Trying to ping all hosts in a subnet Linux for i in $(seq 1 254); do host=192.168.0.$i; … Continue reading Simple Ping Sweep, Port Scan, and Getting Output from Blind Remote Command Execution

Echo Unreadable Hex Characters in Windows: forfiles

How to transfer small files to a locked-down Windows machine? When there is no option to copy, ftp, or http GET a file. When powershell is blocked so that you can only use Windows cmd commands? My first choice would be to use certutil: certutil is a built-in tool for certificate and PKI management. It … Continue reading Echo Unreadable Hex Characters in Windows: forfiles

Certificates and PKI. The Prequel.

Some public key infrastructures run quietly in the background since years. They are half forgotten until the life of a signed file has come to an end - but then everything is on fire. In contrast to other seemingly important deadlines (Management needs this until XY or the world will come to an end!) this … Continue reading Certificates and PKI. The Prequel.

Hacking

I am joining the ranks of self-proclaimed productivity experts: Do you feel distracted by social media? Do you feel that too much scrolling feeds transforms your mind - in a bad way? Solution: Go find an online platform that will put your mind in a different state. Go hacking on hackthebox.eu. I have been hacking … Continue reading Hacking

Cloudy Troubleshooting (2)

Unrelated to part 1 - but the same genre. Actors this time: File Cloud: A cloud service for syncing and sharing files. We won't drop a brand name, will we? Client: Another user of File Cloud. [Redacted]: Once known for reliability and as The Best Network. Dark Platform: Wannabe hackers' playground. elkement: Somebody who sometimes just wants to be an … Continue reading Cloudy Troubleshooting (2)

Infinite Loop: Theory and Practice Revisited.

I've unlocked a new achievement as a blogger, or a new milestone as a life-form. As a dinosaur telling the same old stories over and over again. I started drafting a blog post, as I always do since a while: I do it in my mind only, twist and turn in for days or weeks … Continue reading Infinite Loop: Theory and Practice Revisited.

Cloudy Troubleshooting

Actors: Cloud: Service provider delivering an application over the internet. Client: Business using the Cloud Telco: Service provider operating part of the network infrastructure connecting them. elkement: Somebody who always ends up playing intermediary. ~ Client: Cloud logs us off ever so often! We can't work like this! elkement: Cloud, what timeouts do you use? … Continue reading Cloudy Troubleshooting

Logging Fun with UVR16x2: Photovoltaic Generator – Modbus – CAN Bus

The Data Kraken wants to grow new tentacles. I am playing with the CMI - Control and Monitoring Interface - the logger / 'ethernet gateway' connected to our control units (UVR1611, UVR16x2) via CAN bus. The CMI has become a little Data Kraken itself: Inputs and outputs can be created for CAN bus and Modbus, … Continue reading Logging Fun with UVR16x2: Photovoltaic Generator – Modbus – CAN Bus