Skip to main content

Phoenix's Terminal Log v0.0.1


This month I did lots of bounties alone…

Had a very nice findings and one of them was RCE (Remote Code Execution) using a SAMBA vuln.
(CVE-2021-44142)

I always try to teach my girlfriend the hacking world, she doesn’t like coding stuff but last week, she learned the logic behind the SQL and Template Injections, she is not in IT, and knowing this may not work for anything at all but this is what you get if you have a nerd boyfriend.


Can’t quit energy drinks, I know it’s not healthy but I keep drinking them.
My favorite one is red-bull, I think that’s the best one.

They sell a big 24 pack box at Costco and I grab one box whenever I go to Costco.

But I also like Blue&Yellow Amper or Volt (Mexican energy drink brands). Cheap and fast alternative to Redbull. We say 3B (Tres Bae) when something is dead cheap in Mexico. So it’s a 3B alternative.

Recently I have been focusing strongly on improving some things in my business,
I also hired a 3 new pentesters from Europe who can work with me, from Sweden, Turkey and Cyprus…

I currently try to break into ICS and Automotive Pentesting, made some friends who work in this field, I wanna see how it goes.

The new office feels great, my favorite part of the new office is that you can see the Caribbean sea from the windows and the other side has city view, I think it is full of inspiration.

A couple of months ago I took a decision to rebrand my business Mach Dynamics, and I was looking for a new brand name that would reflect what we do at first sight because Mach Dynamics doesn’t make you think we do cybersecurity and the marketing was kinda challenging….

I finally got the trademark results and I'm able to use my new branding from now on

(Black Trace - Offensive Cybersecurity with .icu domain (I See You) - ( you see what I did here? Cool isn't it?)

I think it was the perfect time for a change.

This week I’m doing some in-person visits to companies, it’s a different approach than doing everything behind a computer.

And, I’m also starting with the Hackerspace project. There’ll be some hackers from my Cybersecurity community and OWASP Chapter I’m pat of (Hopefully)


There will be great initiatives and there’s a huge room fort improvement. I think I should brainstorm these ideas.

Some of the plans that I aim to do with the Hackerspace are;

  • Off-Sec Podcasts

  • Live Demos

  • Outreach activities

  • Social activities / beach time, BBQ etc.

And:

  • I want Hackerspace to volunteerly make “Bug Bounties”, and I want to use the revenue earned from bug bounties to help children.

Ethical Hacking for Better Future:

Cybersecurity is not the only way to fight against crime.

If anyone knows about the history and the concept of BUG BOUNTY , you' would easily guess what I am talking about.


The original idea of Bug Bounty was to use hacking skills for good, and instead of being a Black Hat Hacker or Internet Pirate and eventually end up in jail, Bug Bounties creating a Legal opportunity so you can earn money and help companies to close their security gaps at the same time.

This was the real ideology behind organizations like HackerOne or BlackHat was actually found.

Not all black hat hackers are professionals who knows very advanced and complex attack techniques. There are also the 12, 15, 16 years-old children who knows some simple tricks and hacking companies for fun and inconsistently becoming a black hat hacker and end up in high security jail for years.


So I was trying to brainstorm an idea over that and came up with this:

Better education, better health, better opportunities for kids == Less Crime, Less Les Suffering and better life-quality, a pathway to achieve dreams.

  • One of the organizations I have in my mind is Kids International.
    But I am not limited with one.. Still researching about this, and trying to see how it would be the most efficient way to manage this. Working with a single org or various orgs or doing it in our own and help directly without relying on other organizations idk…

    Not sure if these organizations work well and efficiently though…

    • Respecting bug bounty confidentiality I will make public statements about all the revenue generated and donations made on monthly basis, and be completely transparent about it,

    • We will not accept private donations to avoid misinterpretations.
      If someone wants to help they can directly donate to those organizations or make bug bounties with us to earn the money first.

It’s still a raw plan and trying to improve some parts…

I hope to get some job or a contract this week, I keep contacting companies and hoping to get responses. That’s all for now.

Comments

Popular posts from this blog

Beyond the Pentest: Why We Do What We Do

  “We had a two-week pentest. They gave us a 40-page report. We fixed the high-severity issues. Are we secure now?” This is a line I’ve heard far too many times from CISOs and security leads and I always give them the same answer: No, you’re not secure. Not even close. I’m a penetration tester, but not the kind you’re used to. Let me explain. The Old Red vs Blue Paradigm Is Dead We’re no longer living in a world where attackers show up, hit your network hard for a few days, and disappear. Real adversaries stay there and observe you for months. Even for Years . They don’t follow rules of engagement. They evolve. They study you. And they compromise you slowly. The traditional red team-blue team separation, and the "2-week pentest, fix top 5 CVEs" checklist approach? It’s outdated. It gives a false sense of security . We don’t play by those rules at Gl1tch | Risk. Offensive Security as a Service – A Different Approach In our practice, we go beyond traditional penetration testing...

Entering Password Protected Windows Computer without the Password

 If you have a windows laptop and you don’t know the password for some reason (!) (Maybe it’s not yours ?) and want to login without entering the password, here’s a simple way to hack it without being too technical. You just need to bypass the password protection. I didn’t try this method on other windows versions, you can give it a try but for windows 10 and windows 11 it works perfectly fine. (You need an empty physical pen drive to bypass) Step 1: Download Hiren Boot ISO file: https://www.hirensbootcd.org/ Step 2: Mount the iso file to your USB (You will lose all of the data) You can use RUFUS to do this. I will skip this step. Step 3: Start the windows computer you want to bypass the password, and open the BIOS menu. Depends on the manufacturer the BIOS menu can be opened with F12, ESC or Delete buttons from the keyboard during system boot. Step 4: Select the USB from BIOS menu to boot. Step 5: It will open live os, similar to a windows environment but it’s not… We will use ...

Stop the Scammers. Detection of Homoglyph Attack Attempt using KQL (Kusto Query Language)!

  Phishing attempts are getting sneakier, often leveraging homoglyph attacks or unusual characters to trick employees. I put together a simple but effective query to scan for new users created with "weird" characters in the email domain that indicates a potential sign of a spoofed or malicious account creation attempt. KQL Breakdown: This query scans 7 days of CloudAppEvents for the `Create user.` action, then checks the new user's email domain for any non-ASCII characters (characters outside the standard English keyboard set: $\text{U+0000}$ to $\text{U+007F}$) . This is a great starting point for spotting internationalized domain name (IDN) abuse or other sophisticated L3 attacks. CloudAppEvents | where TimeGenerated > ago(7d) | where ActionType == "Create user." | extend Email = tostring(parse_json(RawEventData).EmailAddress) | extend Domain = tostring(split(Email,"@")[1]) | where Domain matches regex @"[^\u0000-\u007F]" | project Ti...