Again a long delay between VMs, but that cannot be helped. Work, family must come first. Blogs and hobbies are pushed down the list. These things aren’t as easy to make as one may think. Time and some planning must be put into these challenges, to make sure that:
1) It’s possible to get root remotely [ Edit: sorry not what I meant ]
1a) It’s possible to remotely compromise the machine
2) Stays within the target audience of this site
3) Must be “realistic” (well kinda…)
4) Should serve as a refresher for me. Be it PHP or MySQL usage etc. Stuff I haven’t done in a while.
I also had lots of troubles exporting this one. So please take the time to read my comments at the end of this post.



Merry Christmas and Happy New Year

Another Christmas is soon about us, another year is almost near.
Would like to thank everyone we hold dear.
You have all made Kioptrix what we are,
Everyone near and far.

We had planned to stay small but fair,
Without tearing out much of our hair.
We have succeeded in continuing on for another year,
Thank you very much, it gives us tears.

For everyone who has supported us in the past,
Let’s hope the relationship lasts.
We have met many new faces because if this.
And to them we wish holiday bliss.


Thank you for keeping Kioptrix alive well during 2011. Personally I never expected our blog to be so popular. As I’ve said many time before “difficulty is relative to everyone”, so is success. And consider this past year, as well as this whole project of ours a success.

Merry Christmas & Happy New Year.
Be good & stay safe guys.

Thank you,
aka loneferret


After seeing a Tweet about dumping password hashes from a live Windows 2008 Domain Controller, I was intrigued. Reading a post from Tim Tomes (LaNMaSteR53), I figured I’d give it a shot and if successful show my findings (with pictures). It’s an ingenious method of getting the hash values. This attack falls into the “post-exploitation” category. Even more so seeing administrative or system privileges are needed.

Firstly, we’ll need a few things to get this going. VSSOwn is a great script created by Tomes and Mark Baggett. In a nut shell, it will help us create a volume shadow copy of the windows domain controller’s drive from which the NTDS and SYSTEM files will be extracted. Yes you read right, we’ll be getting what we need from VSS. On Windows 2008 & 7 this feature is always on by default. Periodically taking backups of our system drive which also includes NTDS, SYSTEM the SAM files. VSSOwn has other interesting features, I strongly recommend checking out Tomes’ and Baggett’s talk from Hack3ercon 2.

Second item on our list will be another tool to retrieve the hashes once we’ve recovered our system files. Csaba Barta, a Hungarian researcher, has developed an open source tool to parse NTDS.dit files. Right now his tool only seems to work on NTDS files from 32bit domain controllers. This is why our target is a Win2008 R1. Let’s hope he gets the 64bit soon. The tool runs on Linux and installs great on BackTrack 5. With our groceries finished, we can now move along and recover our password hashes.



Another Hackfest has come and gone…

Well Hackfest third edition, Quebec’s largest and best Information Security Conference, has come to past. Like years previous this one was amazing.  The talks were full of life and content that kept you glued to your seat. The CTF games at the end of each day were simply works of networking art (trying to get the network diagram atm).  Unfortunately, due to a degenerative disease called “aging” I couldn’t participate in the events. Perhaps next year… who knows.

A major part of this conference were the people attending. Most, if not all, are hackers at heart willing to talk, share ideas and opinions. One could basically strike up a conversation with practically anyone.  Same goes with the speakers. The beauty of these types of Cons., is that you can actually hear yourself (and others) speak. No need to text message the guy in front of you just to say “Hi…”.

For a second year in a row, Hackfest has exceeded all expectations breaking every record they could think off. Attendance was up (300++), pre-registration was up, t-shirt sales were up and CTF participation was up.  It showed too… You’ve should’ve seen the organizers, zombies really do exist.

I have to thank all the sponsors such as Slow Cow, Offensive Security, The Laval University for helping these guys put up a great event. Leaving some important ones out I’m sure, but just going by memory from what I saw/heard over there…

With this all said and done, I unfortunately don’t have any pictures of the event and it’s memorable moments. Please take the time to visit the site and have a look around. This convention is worthy of your attention. And if you live near the Quebec boarder, say Ottawa, Vermont, Boston (yes it’s not that far) consider doing the trip next year. Quebec City really is a beautiful place to visit…



Although I’m quite aware this subject has probably been blogged to death, this entry serves two purposes. For one my memory is shot and I need to write this somewhere to help me not forget. The second is the simple fact that this site is, after all, for the beginner.

Imagine yourself the following scenario:  You’re at work (or one of your clients) and you need to RDP out to your place.  Then you remember port 3389, amongst others, are blocked from going outside the corporate network.  What does a bored admin do…? What will he do?  He organizes ahead of time so as to be able to connect home using a SSH Tunnel.