Posts

Showing posts from August, 2019

RFID cloning with Proxmark3 Easy

Image
In this post, I would like to explain how in a recent Red Team engagement, I successfully managed to clone an RFID Access Control card and gained entry into the premise. #TheKit The client was using HiD 125khz cards. I used "Proxmark 3 Easy" which is a low cost RFID cloning kit, is a stripped down version of the real “ Proxmark 3 RDV 2 ”. The "Proxmark3 easy" does not support several things like battery, relaying and doesn't have an amplifier, also it has a smaller memory. But the device is quite sufficient during a Red Team Physical engagement. It looks something like this when you order on Amazon. I wanted to build a mobile RFID cloning kit and use it for my Red Team engagements, but note with this setup the scanning distance of 6cm is useless in real engagements, I'm not that brave enough and you really have to get up close to clone a card so the setup initially didn't work, however I got lucky and me and my partner found a lost targe

Open Source Vulnerability Scanning Tips

Preamble : I have more experience with Nessus & Qualys than OpenVAS, being a professional Penetration tester you don't normally rely on OpenVAS much. However after becoming a freelance consultant, I'd to build my skills for Open source vulnerability scanning tools, as you Nessus licenses cost a lot. So essentially the below may be basic for some but it might help some who are new to it. This post has two items 1st one is mainly about accessing the OpenVAS web console remotely. 2nd is about ensuring the NMAP vulnerability scanning scripts (nse) are download. Section 1: OpenVAS quick config (assume you've already installed OpenVAS on a VM) #1: You may want to access OpenVAS remotely or want to access OpenVAS installed on a VM from the host machine. sed -e 's/127.0.0.1/0.0.0.0/g' greenbone-security-assistant.service openvas-manager.service openvas-scanner.service -i The above command will replace all occurrences of 127.0.0.1 to 0.0.0.0 in the files a