I guess, somewhere along the way, I had registered an account with Ghostery when I was using their privacy plugin.
Today, I got a GDPR update notification from them, along with a ton of other users. The thing is, they failed to use the BCC field when they sent the email, so everyone’s names and email addresses were exposed to everyone else.
I suppose they better practice their GDPR habits a bit harder.
A very common question in OSCP student chat rooms and channels I hang out in is “should I be using something other than Keepnote?”
It is a fair question considering Keepnote is recommended in the PWK course materials. However, you may notice that it hasn’t been updated in over 6 years, and has actually been dropped from recent Kali versions. I have heard tales of OSCP students’ notes getting corrupted and lost, which is not a good situation to face when you are paying for limited time to complete the coursework (and exam).
If you are starting down the PWK/OSCP path, you will soon realize that you will need to take a lot of notes. Not just on the course materials, but on every exercise you do and every machine in the lab that you work on. This includes screenshots, copy-pasted output from nmap and other tools, and the specific steps you took to conquer a box (and hopefully the steps that didn’t work, from which you can reference in the future).
It adds up quickly, and it’s a challenge to keep straight as you hack away at box after box in the lab. Being a person that has kept a keen eye on note taking apps in general, long before I got my OSCP, I have some recommendations, with pros and cons of each.
In no particular order (see my Recommendations at the bottom):
Learn more and download CherryTree here.
- Hierarchical (pretty much unlimited depth)
- Free, open-source software for Linux and Windows. You *can* get this to run on a Mac, but it’s buggy
- Highly customizable through preferences and templates
- Imports notes from tons of places, does some good exporting too
- Can’t paste images from the clipboard directly into notes
- Not the greatest at embedding files in general
- Not easily synced between devices/VMs
- No Mac or mobile device support
CherryTree is like KeepNote in many ways, but it is has many more features and is actively maintained. If you are going to be solely storing and referencing your notes on one machine (your host or Kali VM), use this tool. The template feature is really awesome, and it lets you create a new note based on a template of your design. This means you could create a template for Lab VMs that you can quickly populate with data as you work on a given machine. You could do something similar for PWK exercises. It should make reporting much easier.
Download Evernote here.
- Feature rich app, integrates with Web Clipper browser extension
- Windows, Mac, iPhone, Android native clients with web version for Linux
- Is modern and hip, if that matters to you
- Costs $ if you want it to be any good. Free features seem to be waning as they push people into paying for the service
- Lacks true hierarchical organization (uses tags instead of folders)
My struggles with Evernote have been well documented on this blog in the past, but some people still swear by it, so I thought I’d mention it here. They do make ease-of-access a priority, and you can get to your Evernote stuff from just about anywhere. Using it is easy until you need to organize things with any complexity, and for the PWK labs, you’d have to be OK with using the #tags instead of folders.
Download Onenote from Microsoft here.
- Feature rich app, integrates with Onenote Clipper browser extension
- Free Windows, Mac, iPhone, Android native clients with web version for Linux
- Free version is not feature limited (just space, which hasn’t been a problem for me)
- Excellent hierarchical organization via notebooks > sections > pages > sub-pages
- Some people feel it has a bloated interface
- Exporting notes can pose challenges with formatting if you stray outside the pre-made lines
After many trials and tribulations, I ended up going all-in with Onenote for PWK/OSCP, and life in general. The ability to create multiple, separate notebooks (and choose which ones you want to see on which devices) has been my favorite feature. I can separate work from life from projects from shared stuff this way, and I still have a good amount of hierarchical ability to organize things.
Your Favorite Markdown Editor
I see people profess their undying devotion to markdown when the note-taking discussion comes up in various OSCP forums/chats, and I respect their decision and desire for simplicity. However, the one feature I used most, and I can’t imagine living without in the OSCP course, is the ability to paste a screenshot into a note. I did this so much that it would have driven me crazy to have to do anything else, and with markdown, you have to do some form of “save image/reference image via text in the note/embed via some other mechanism”. There are extra steps involved, and you can’t easily do the copy/paste thing.
Speaking of screenshots and the need to embed them in your notes, there are several options I would recommend depending on your choice of note taking apps and the platforms upon which you use them. Here are my top three:
- Snap ‘n Drag Pro (Mac only). Awesome customization options, ability to edit captures (add arrows/highlight/blurs), automatically adds to clipboard.
- Skitch – If you use Evernote, use this (unless you are on a Mac, see above)
- Shutter – Native Linux screenshot app
For PWK, I found the Evernote and Onenote clipper browser extensions to be limiting in that they only let you clip things from your web browser, when I needed to clip terminal output most frequently.
Because I am primarily a Mac user, I need good support for screenshot pasting, and I prefer hierarchical note structure for organization, I went with Onenote and Snap ‘n Drag Pro for my PWK and OSCP work. I continue to use these two tools in my personal and professional life, too.
If I were not a Mac user, I’d go with CherryTree and Skitch.
Have any opinions or additional input about all of this? Let me know in the comments.
I have obtained a standard user account on Windows. Now what?
This is a common question I see people inquire about frequently on the Discord/Slack/Mattermost servers I hang out on. This includes people working on CTF exercises (Hack the Box), OSCP/PWK studies, and just pentesting in general. The answer, of course, is that you need to enumerate the system and find a way to become Admin.
The methodology for how you actually do this depends on a lot, all depending on your specific environment and circumstances.
Windows Privilege Escalation to the Rescue
Here are some useful resources on what to do next in your given situation, after you have succesfully exploited your way onto a Windows box, but before you have the system administrator role. I collected these links, snippets, and exploits during my OSCP studies, saving them in this massive OneNote notebook. Rather than letting them sit there where no one but me can access them, I thought I’d share.
Some of these get pretty detailed, and some of them have links to yet even more resources on this topic.
Have fun…this rabbit hole runs deep!
Updated 11.11.18: A new resource I came across that looks pretty awesome:
Elevating privileges by exploiting weak folder permissions
Encyclopedia of Windows Privesc (video)
Windows Privesc Fundamentals
Windows Privesc Cheatsheet
Windows Privesc Check
A script that automates the checking of common vulnerabilities that can be exploited to escalate your privileges:
Common Windows Privesc Vectors
Windows Post-Exploitation Command List
WCE and Mimikatz in Memory over Meterpreter
Windows Privesc – includes tips and more resource links, on Github
Do you have any Windows Privesc resources you think should go here? Comment below and I will add them.
Care about your privacy in the wake of all the Facebook news?
Switch to Mozilla Firefox as your main browser. It is now faster than Chrome or Internet Explorer, it uses less memory, and it goes a lot further to care for your privacy online and keep you safe. https://www.mozilla.org/en-US/firefox/new/
Use Facebook in a restricted container to prevent it from tracking you when you are not on Facebook: https://blog.mozilla.org/fire…/facebook-container-extension/
Install the uBlock Origin add-on for Firefox to prevent trackers, ads (which are in and of themselves trackers), malware, and other nasties from harming you online. https://addons.mozilla.org/en-…/firefox/addon/ublock-origin/
Install EFF’s Privacy Badger add-on for Firefox to prevent even more tracking that uBlock doesn’t necessarily cover. https://addons.mozilla.org/…/firef…/addon/privacy-badger17/…
This setup will not only help you keep Facebook at arm’s length, it will help you in general to avoid malicious advertisements, malware, ransomware, and various types of web browser hijacking while surfing the Internet. Of course, you can always choose to leave Facebook altogether with these alternatives.
Enjoy, and stay safe!
I no longer do Facebook. In light of recent Facebook events (#facebookgate) related to data harvesting and various inaction in being complicit with election manipulation, I have deleted my account enirely.
I you want to keep up with me, and I hope you do, you can follow me here on my website or via Twitter at @willc.
Some day, some other social media platform may creep up into being something worthwhile (remember Ello?), but until then, this will have to do.
About a year ago, Mozilla added “captive portal” support to Firefox in an attempt to enhance usability when connecting to free WiFi portals, such as at an airport or a hotel. You have probably interacted with captive portals in the past, and if you are a Firefox user, you may have wondered why you had to open Chrome or IE or Safari to be able to log into the WiFi system, as you could only get the “Sign In” page to pop up in one of those browsers before getting access to the full Internet.
Firefox added support for these “Sign In” pages about a year ago, so that you don’t need to use a (shudder) different browser. That is all well and good, except for when it comes to using Burp Suite as a proxy for Firefox. If you are a pentester, you are probably used using Firefox (especially on Kali Linux) for your traffic proxying through Burp, as they make it easier than any other browser to set up and disable the proxy.
However, you may now be seeing a ton of requests like this:
Disable the detectportal.firefox.com requests
Seeing all those requests in Burp, much less thinking about all the noise they generate otherwise, is annoying. Because you probably won’t ever need to use a Captive Portal on your pentesting machine (a VM, in my case), you can completely disable Firefox’s attempts to detect them. Just browse to about:config and enter network.captive-portal-service.enabled. Double click it to change its value to “false” and you should be good to go.
That’s all, folks!