Skip to main content

Phoenix's Terminal Log v0.0.1


This month I did lots of bounties alone…

Had a very nice findings and one of them was RCE (Remote Code Execution) using a SAMBA vuln.
(CVE-2021-44142)

I always try to teach my girlfriend the hacking world, she doesn’t like coding stuff but last week, she learned the logic behind the SQL and Template Injections, she is not in IT, and knowing this may not work for anything at all but this is what you get if you have a nerd boyfriend.


Can’t quit energy drinks, I know it’s not healthy but I keep drinking them.
My favorite one is red-bull, I think that’s the best one.

They sell a big 24 pack box at Costco and I grab one box whenever I go to Costco.

But I also like Blue&Yellow Amper or Volt (Mexican energy drink brands). Cheap and fast alternative to Redbull. We say 3B (Tres Bae) when something is dead cheap in Mexico. So it’s a 3B alternative.

Recently I have been focusing strongly on improving some things in my business,
I also hired a 3 new pentesters from Europe who can work with me, from Sweden, Turkey and Cyprus…

I currently try to break into ICS and Automotive Pentesting, made some friends who work in this field, I wanna see how it goes.

The new office feels great, my favorite part of the new office is that you can see the Caribbean sea from the windows and the other side has city view, I think it is full of inspiration.

A couple of months ago I took a decision to rebrand my business Mach Dynamics, and I was looking for a new brand name that would reflect what we do at first sight because Mach Dynamics doesn’t make you think we do cybersecurity and the marketing was kinda challenging….

I finally got the trademark results and I'm able to use my new branding from now on

(Black Trace - Offensive Cybersecurity with .icu domain (I See You) - ( you see what I did here? Cool isn't it?)

I think it was the perfect time for a change.

This week I’m doing some in-person visits to companies, it’s a different approach than doing everything behind a computer.

And, I’m also starting with the Hackerspace project. There’ll be some hackers from my Cybersecurity community and OWASP Chapter I’m pat of (Hopefully)


There will be great initiatives and there’s a huge room fort improvement. I think I should brainstorm these ideas.

Some of the plans that I aim to do with the Hackerspace are;

  • Off-Sec Podcasts

  • Live Demos

  • Outreach activities

  • Social activities / beach time, BBQ etc.

And:

  • I want Hackerspace to volunteerly make “Bug Bounties”, and I want to use the revenue earned from bug bounties to help children.

Ethical Hacking for Better Future:

Cybersecurity is not the only way to fight against crime.

If anyone knows about the history and the concept of BUG BOUNTY , you' would easily guess what I am talking about.


The original idea of Bug Bounty was to use hacking skills for good, and instead of being a Black Hat Hacker or Internet Pirate and eventually end up in jail, Bug Bounties creating a Legal opportunity so you can earn money and help companies to close their security gaps at the same time.

This was the real ideology behind organizations like HackerOne or BlackHat was actually found.

Not all black hat hackers are professionals who knows very advanced and complex attack techniques. There are also the 12, 15, 16 years-old children who knows some simple tricks and hacking companies for fun and inconsistently becoming a black hat hacker and end up in high security jail for years.


So I was trying to brainstorm an idea over that and came up with this:

Better education, better health, better opportunities for kids == Less Crime, Less Les Suffering and better life-quality, a pathway to achieve dreams.

  • One of the organizations I have in my mind is Kids International.
    But I am not limited with one.. Still researching about this, and trying to see how it would be the most efficient way to manage this. Working with a single org or various orgs or doing it in our own and help directly without relying on other organizations idk…

    Not sure if these organizations work well and efficiently though…

    • Respecting bug bounty confidentiality I will make public statements about all the revenue generated and donations made on monthly basis, and be completely transparent about it,

    • We will not accept private donations to avoid misinterpretations.
      If someone wants to help they can directly donate to those organizations or make bug bounties with us to earn the money first.

It’s still a raw plan and trying to improve some parts…

I hope to get some job or a contract this week, I keep contacting companies and hoping to get responses. That’s all for now.

Comments

Popular posts from this blog

Beyond the Pentest: Why I Do What I Do

  “We had a two-week pentest. They gave us a 40-page report. We fixed the high-severity issues. Are we secure now?” This is a line I’ve heard far too many times from CISOs and security leads and I always give them the same answer: No, you’re not secure. Not even close. I’m a penetration tester, but not the kind you’re used to. Let me explain. The Old Red vs Blue Paradigm Is Dead We’re no longer living in a world where attackers show up, hit your network hard for a few days, and disappear. Real adversaries stay there and observe you for months. Even for Years . They don’t follow rules of engagement. They evolve. They study you. And they compromise you slowly. The traditional red team-blue team separation, and the "2-week pentest, fix top 5 CVEs" checklist approach? It’s outdated. It gives a false sense of security . We don’t play by those rules at Gl1tch | Risk. Offensive Security as a Service – A Different Approach In our practice, we go beyond traditional penetration testing...

VIP Ticket to Ruin your Life | Golden Ticket Attack

Have you ever heard of a ticket so powerful it gives you access to an entire Active Directory environment? That’s exactly what a  Golden Ticket  does. An attacker can create a Ticket Granting Ticket (TGT) using the KRBTGT account hash. This allows an attacker to impersonate  any user , access  any resource , and remain  undetected for as long as they want . Golden Ticket attacks are difficult to detect and devastating when successful. The  core vulnerability  that enables a Golden Ticket attack lies in the  design of Kerberos authentication in Active Directory , specifically how  Ticket Granting Tickets (TGTs)  are  trusted  and  validated . The Root Cause: The entire Kerberos trust model in AD depends on the secrecy of the KRBTGT account’s password hash. What Does That Mean? The KRBTGT account is a special built-in account in Active Directory. It is used by the Key Distribution Center (KDC) to sign and encrypt TGTs. A...

Data Poisoning: A Technical Deep Dive into AI's Most Insidious Threat

Artificial Intelligence and Machine Learning (AI/ML) models are rapidly becoming the bedrock of modern business operations, I had opportunity to do security assignments with AI features in different companies and I I also made lots of research and investigation, and chance to do tinkering on computer and ML models, to find more and more ways to hack these models. The whole AI thing is actually simply relying on DATA. The way it works with data is heavily relying on mathematical concepts where Prediction, Probability, discrete math, calculus, etc. But we don’t need any of these. What we want is DATA. Before hacking anything, you should first learn how it works. AI models reliance on DATA for it’s core functionality makes it vulnerable to a subtle, and devastating attack vector: data poisoning . There are other attack vectors as well, but I want to focus on DATA POISONING Technique in this text, since it’s one of the biggest attack vectors and it’s also the most difficult to secure compl...