For web apps that log activity, there are times where an attac...tester... will stumble upon something interesting using less protection for their anonymity, and then switch over to a proxy or something better to do their POC or actual attack, which they then anonymously email to a vendor.
On Sun, Oct 17, 2010 at 9:30 PM, Adrian Crenshaw <[email protected]>wrote: > I’m working on a presentation, and need a little help. I’m trying to come > up with little things “Pro Bono Pentesters” forget about that may lead to > their identity being discovered, tie them to an event, or at least reduce > the “anonymity set” they are in. > > Mac Address left in logs > Browser tabs that automatically open that may give info about them (for > example, if I have my tabs auto open to my site, my webmail, etc) > Network scans that are done that automatically use the credentials of the > logged in user > Host name/NetBIOs info that makes it obvious who it is > Last DHCP lease renew (example, the IDS on a network notice that particular > host requested a renew for a specific IP, and using that IP they can figure > out the last network the person was on. Need more details how this workd) > > Other ideas? > > Thanks, > Adrian > _______________________________________________ > Pauldotcom mailing list > [email protected] > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > Main Web Site: http://pauldotcom.com >
_______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
