BluePillSecurity is a blog where I post monthly about deception. Some posts are technical, others strategic, hopefully all are at least mildly entertaining or thought provoking. This month is the culmination of a mini-series of posts that explores using a few different deceptive resources to catch an attacker in an Active Directory environment.
Hey HN! I'm just getting started on a new project, outlining what I've learned about building a deception program at my current employer. If building a new security capability, especially if that capability is or involves deception, I'd love to know what you think!
New posts on the first of every month :)
If you really want to overengineer things, take a look at https://kmanc.github.io/be_my_guest/! I only put in the effort to make this work for my own networking gear, but it could be pretty easily extended to work on other hardware :)
Bit of a self-plug I know, but this reminds me of something I had made a while back (https://github.com/kmanc/wifi_qr). Nice work! Always fun to see others' take on neat projects
EDIT - I had an idea that I'm currently working through that I like but am a little stuck so taking a break before I revisit. TLDR is to use an ATTINY85 to auto-"type" the password in for folks who bring a laptop and can't scan the QR code. I wrote the Python code to generate the .ino script that would actually do the writing, but I'm having a little bit of trouble getting micronucleus to write the script to the ATTINY without an un/re plug. You can see the WIP on my digispark branch in that repo
Maybe! The problem I was trying to solve was that a 30 character password randomly generated is a pain to type out by hand haha. That said I think having the text would be a step in the right direction
Today I'd like to share what will hopefully be just the beginning of a collection of offensive security tools I write in Rust. I decided to give this a shot because I wanted to be able to generate my own reverse shells for CTFs and the like without needing to rely solely on 3rd party tools.
With a quick change to the config.rs file, you can compile a TCP reverse shell that will point back to your machine whether your target is running Linux or Windows. Linux uses Rust's std::process::Command while Windows uses the windows::Win32 APIs.
Over time I intend to create more tools that use this as a base. Some ideas include: a TCP reverse shell that performs process migration, an obfuscated version for circumventing antivirus, and a staged version. Would love to hear what you think about it!
If you like CTF-style hacking challenges like HackTheBox or TryHackMe, this might be a handy tool for you. I originally wrote the script in bash but then decided to try it out in Rust because all the cool kids were writing things in Rust. Speaking of which, if you happen to know Rust well and you notice things that I'm doing wrong I'd love to hear it! I read through the docs and tried to learn what I could but I'd be shocked if there weren't a few poorly designed features here and there
It's not perfect, but this was a project of mine that I create a while back to share guest wifi with friends who come over and visit. Long story short, a QR code allows a guest to log into wifi. The QR code and password are changed weekly via a cron job, and the whole thing runs on a Raspberry Pi nano.
This setup would only work out-of-the-box on a Ubiquity network as that's what I have, but I tried to document the basic steps it would take if an interested party wanted to replicate this on other hardware. I hope you enjoy!
Note: I don't intend to steal any thunder from the [recent Show HN](https://hackernews.hn/item?id=27803146) where a website was created to turn a wifi password to a QR code; I think it's a great project! I just never thought anyone would be interested in this until I saw all the comments on it so now I'd like to share my version :)
This repo of mine walks through how to use a raspberry pi with an eInk screen to automatically update passwords and the resulting QR code. Would love to see what y'all think!
I hope you enjoy!