It’s soon Christmas and everyone is happy. I was waiting for some gifts from my grandma when I finally got an email from the norwegian post delivery system that the delivery adresse was incorrect. My grandma never gets the address right! Luckily,…Continue Reading →
At the end of S02E01 of Mr Robot, there is a scene where Darlene generate a ransomeware with a modified SET toolkit. My fingers were itching for the IP address 18.104.22.168 which seems to be the C2 address for this…Continue Reading →
SANS released a Holiday hacking challenge called “Gnome in Your Home” that had challenges all from reverse engineering, exploiting, auditing, forensics and so on. Before you start, you need to head into the 8bit game Holiday Hack Quest. This game will…Continue Reading →
I’ll be Gnome for Christmas: Firmware Analysis for Fun and Profit After telling Josh that GnomeNET-NorthAmerica is in the picture, he told me to speak with Jessica regarding the Gnome’s firmware. Jessica gave me a bin-file dumped from the Gnome’s…Continue Reading →
Let it Gnome! Let it Gnome! Let it Gnome! Internet-Wide Scavenger Hunt 5) What are the IP addresses of the five SuperGnomes scattered around the world, as verified by Tom Hessman in the Dosis neighborhood? 6) Where is each SuperGnome…Continue Reading →
There’s No Place Like Gnome for the Holidays: Gnomage Pwnage Based on their discovery of the SuperGnomes’ IP addresses and concerns about what increasingly seemed like a nefarious plot, Jessica and Joshua began to devise a plan of action. Josh,…Continue Reading →
My letter and wish to Santa Claus was finally granted. Yesterday I got a call from +0191, claiming to be Microsoft Support and that I had been sending a lot of bad traffic during the last few days. I did…Continue Reading →
Need to send sensitive text but no available encryption software? No problem! – No binaries are loaded from this or any external servers. – No hidden transfer of plain text. – The encrypted message is generated locally in your browser.
How serious can a malicious mail be? Few minutes later was several targeted companies in Norway infected. Luckily I managed to get a copy of the phishing email and decided to take a look at it.
The purpose with this project was to learn the basics around building an exploit. I will do my best to write a step-by-step guide from what I learned, including some fails I encountered during this project. To make this as…Continue Reading →