Rome Didn’t Fall in a Day: Building A Resilient Empire C2, Part Two

[Originally posted on ImplicitDeny] - This write up is for Empire 1.5, but the same concepts and commands are the same. In Part One we went over the reasons for having a resilient C2 infrastructure, and what it should look like. In summary, we want to have two or more internet accessible servers to host the different …

Continue reading Rome Didn’t Fall in a Day: Building A Resilient Empire C2, Part Two

Vulnerabilities in Cohu 3960HD

[Originally posted at Critical Informatics] Vulnerabilities Summary The Cohu 3960HD Series cameras contain multiple vulnerabilities: directory listing, unauthenticated XMLRPC commands, arbitrary file upload and code execution, source code disclosure, failed session expiration, and client-side input validation vulnerabilities were discovered. The directory listing issue led to the discovery of other included vulnerabilities. Product Overview The Cohu …

Continue reading Vulnerabilities in Cohu 3960HD

Rome Didn’t Fall in a Day: Building A Resilient Empire C2, Part One

[Originally posted at ImplicitDeny] In this two-part series, we will walk through building an infrastructure to host your command and control (C2). At the end of this series, you should have at least two servers ready for your engagement. One server will be a simple web server to host your stagers, and the other will …

Continue reading Rome Didn’t Fall in a Day: Building A Resilient Empire C2, Part One