Categories
security

Phineas Fisher’s account of how he took down HackingTeam

This is an amazingly detailed account of the actions taken to take down HT. One of the key moments in the article was how he went after the people with keys to the kingdom – the sysadmins.

One of my favourite passtimes is stalk the sysadmins. By spying on Christian Pozzi (Hacking Team’s sysadmin), I gained access to the Nagios server, which gave me access to the ‘rete sviluppo’ (the development network with the RCS source code). With a simple combination of PowerSploit’s Get-Keystrokes and Get-TimedScreenshot [13], nishang’s Do-Exfiltration, and GPO, I could spy on any employee I wanted, or even the entire domain.

                                 ,-._,-._             
                              _,-\  o O_/;            
                             / ,  `     `|            
                             | \-.,___,  /   `        
                              \ `-.__/  /    ,.\      
                             / `-.__.-\`   ./   \'
                            / /|    ___\ ,/      `\
                           ( ( |.-"`   '/\         \  `
                            \ \/      ,,  |          \ _
                             \|     o/o   /           \.
                              \        , /             /
                              ( __`;-;'__`)            \\
                              `//'`   `||`              `\
                             _//       ||           __   _   _ _____   __
                     .-"-._,(__)     .(__).-""-.      | | | | |_   _| |
                    /          \    /           \     | | |_| | | |   |
                    \          /    \           /     | |  _  | | |   |
                     `'-------`      `--------'`    __| |_| |_| |_|   |__
                               #antisec

Via Ghostbin