PaulDotCom mailing list archives

Re: Taking a leak on the wire


From: Bill Swearingen <hevnsnt () i-hacked com>
Date: Tue, 19 Oct 2010 09:00:30 -0500

Phone Home addresses (logs from FW or Netflow)
Tool set locations (a lot of time they place a samed name folder in a same
location on the disk)
Itunes "bonjour"
Their own sniffer logs catching them.  Often useful if they have wiped logs.
Bragging on forums

On Sun, Oct 17, 2010 at 9:30 PM, Adrian Crenshaw <irongeek () irongeek com>wrote:

I’m working on a presentation, and need a little help. I’m trying to come
up with little things “Pro Bono Pentesters” forget about that may lead to
their identity being discovered, tie them to an event, or at least reduce
the “anonymity set” they are in.

Mac Address left in logs
Browser tabs that automatically open that may give info about them (for
example, if I have my tabs auto open to my site, my webmail, etc)
Network scans that are done that automatically use the credentials of the
logged in  user
Host name/NetBIOs info that makes it obvious who it is
Last DHCP lease renew (example, the IDS on a network notice that particular
host requested a renew for a specific IP, and using that IP they can figure
out the last network the person was on. Need more details how this workd)

Other ideas?

Thanks,
Adrian
_______________________________________________
Pauldotcom mailing list
Pauldotcom () mail pauldotcom com
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

_______________________________________________
Pauldotcom mailing list
Pauldotcom () mail pauldotcom com
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Current thread: