Sunday, April 9, 2017




DIGITAL HIDE AND SEEK
How to keep yourself hidden

By

Zachary Standridge




Online Network Security
Spring 2017



















Copyright 2017

By

Zachary Standridge
We are a littering society. We belch out greenhouse gasses as we breathe. We litter the earth just by driving down the road. Archaeologist of today are doing their PhD research by sorting through the trash piles of long forgotten cultures . There is no way we can exist in this world without leaving a little bit of ourselves behind. Our computers are the same way. Every time we just turn on a terminal, we are leaving behind little bits of information on who we are and what we do during the day to day existence of our lives. Your phone is a mobile computer jumping from one cell tower to another and logging your movements. Your browser is keeping a log of every single thing which peeks your curiosity. Your email is keeping tabs on you more than any other service which we depend on for our day to function. But you already knew this right? What about the places you don't know about. What about that box in the closet? What about the server in your office back room? What is being left behind there which you would never even know about. When you see the crazy person on the street with a tin foil hat ranting and raving about the hackers or the government reading your thoughts and disheartening in the night undetected, they are not too far off. The industry of data forensics is a quickly growing field and they are trying every day to come up with more ways to locating you but the are of keeping them busy is also becoming a business necessity. It is more than just seeing that proper traffic is encrypted, it means not having to lock down that router or creating that impressive DMZ for protecting your infrastructure. There is no difference in whether you are wearing a black hat or a white hat...or a gray, you have to understand that you are leaving behind a trail which can be used against you. Each of the following methodologies reducing your personal information is available but no one method is full proof. They will remove at least some of the little bits of data which are even now flowing over the Internet. Lets say it again. They are not complete and full proof. There are always new tech coming out which is designed to divert and bypass the information. Cracks will always be created. All they can do is just make it harder for the investigator to do his job or for the black hat to move on to another easier target. There are almost an infinite amount of methods, applications, and extensions so lets be fair by using three from the white hat side of the coin and three from the black,
Number 1: Cookie Management. Google is a search engine right? No. Its an advertisement communication company which is in the business of getting to know you and putting you in front of an advertiser which will pay for your data. The search engine companies will say that they are just giving us as consumers the best products, services, and features available for making our lives easier while not putting an ad for a purse designer in frornt of a middle age man. This is the flaw in their plan. The sale of our information which are collected by cookies may be a necessity evil for the use of the search engine's little toys but what happens to the little bits of information after they(google/yahoo....etc) has used them? They are stored on our systems just waiting for the wrong reasons. The most common method of tracking your cookies is built right into your browser by default. Each time you come back to a site such as Facebook, the browser sends the cookie from your last visit back to the serve where it links up all your past visits into a profile. These little cookies are not going anywhere. They are designed to only delete themselves if previously configured to. Most of them time, they just sit in your temp file forever unless you personally delete them. So how do we get rid of them? Most all browsers have a method for removing cookies. It is common practice to set up a scheduled event for removing them all and there are many browser extensions which will delete the file as soon as you close the page. There are more stubborn ways of cookie tracking in the works however. Advertising companies across the board hire more programmers than any other job market. With the introduction of Super Cookies, the use of a simple deletion will not work anymore. The user will become dependant on apps and extensions for maintaining their visible footprints. One of these extensions, Ghostery, watches the flow of data coming from each and every website. Ghostery is designed to flag some of the most common little tricks for installing a cookie such as single-pixel images. These files are then either blocked or allowed by the user.
Number 2. Each and every machine, VM or physical, has an address. That address is your Internet Protocol address (IP). Just as *69 did for people in the 90's, your IP address can be tracked when you attach to another machine or ask for connection. They do change, but by a vast majority, they are static which is why hiding your IP address is so important. With the creation of Tor, (The onion router) by the Office of Naval Research which directs traffic through a free world wide network which is made up of over 7000 relays to conceal a user's location and usage from anyone or any program conducting network surveillance or network traffic analysis, allowed for a healing encrypted super network over all other networks on the Internet. How is works is, when you machine starts a connection the network maps out a path through the nodes in the subnet, your web page requests then follow this path through the nodes to the server. The service request is encrypted at each node again and again so that if your traffic is intercepted, it would have to be decrypted at each node back to you for any information to be usable. At the destination the machine on the last node then submits the request as if you were right there in front of it. When the traffic is coming back, the same process happens over again. Every machine in the linked chain does not know what is passing through but only what the node behind it sends. This is the golden key, every thing is encrypted and thus there is no chance of data seepage from a machine in the chain. So, this is great but there are flaws in this system as well. This process only works if the machine at the end works as your proxy but it still can track the actions of the user. It doesn't know who you are but it knows what you are putting out there onto the Internet where it will be disseminated to the masses. If you check your email from within a Tor browser, it data may be safe on your side but you are still activating it on the server side which is still easily read. For this reason, it is still best to add on a layer of encryption to your emails.
Number 3. SSL is one of the most simple and easy ways to protect your content and data. When working with websites with the prefix HTTPS, the data stream between yourself and the webserver is being encrypted. While it is not standard yet, major online email providers will request that you make sure that your address bar is started with https by automatically adding it when connecting. The SSL connection works by scrambling up the data from to and from the webpage server, if configured correctly. The process also hides any of the links in the chain from the server, through the area wide network and into your LAN. This is especially useful when abroad and forced to use a public wifi which may or may not be monitored for traffic capturing. SSL has its flaws however. It only is able to protect the data as it is moving between your terminal and the server. It does not have the ability to control what the server does with your information. When reading your favorite online news feed, the SSL service will block any router between being victim of a man in the middle attack but it is impossible for it to protect you from anyone seeing your feed anywhere else. There are other ways of bypassing SSL security such as poisoning the Certificate Authentication Process to bypass it but since it is so complicated without the use of a script kiddie your local wifi sniffer will break it.
Number 4. You have just successfully taken over or compromised a system using a python os.system alias and have really put in the work to get there. Now its time to make sure that you are not seen. As soon as you connect, you are leaving traces and every activity which you do from within is being recorded by the system itself just as if the user was doing it. If your intention is to not be logged, it is time to start covering your tracks. The first place to start is the windows event log since that is also one of the most easily accessible to other users. The intruder would need to clear these entries of his activities to minimize being traced by forensic investigators. When the victim or target runs EventVWR, it activated a window with a listed format of all security-oriented logs available. The attacker would need to clear these logs immediately. Using Ruby interpreter in meterpreter to clear the logs would be your best, simplest, and quickest choice. Using Log.clear, cleaning the log is almost instantly done. Now that they windows system event logs are cleared, the attacker have the security, application, DNS, and all the other logs to clear. That is done by using scripts in Winenum.rb. The function is used to make sure that all window event logs are cleared of the entry of the attacker. The last step in clearing your tracks would be to re write the script which is in /pentest/exploits/framework3/scripts/meterpreter and check to make sure that every thing has worked.
Number 5. Since not everyone uses five VMs at a time or has the money to work specifically with an IOS machine, the attacker most likely will be attacking a windows machine. This means clearing out the event logs. This time, without metasploit.
  1. Click the root node.
  2. On the action menu, click connect to another computer
  3. In the another computer box, type the name or IP address of the remote computer.
  4. Click OK.
With the addition of a backdoor after compromising the system for use later, this would be a very helpful way of keeping the attackers activities hidden from the terminal owner while still being able to spoof the identity of the owner.


White, black, grey hat or no hat...we all need to keep ourselves from being taken advantage of by the gathering and removal of the information we leave behind on a computer. Since our field is still growing by leaps and bounds, there are always going to be new ways for people to track the little bits of information left behind but thanks to these new ways of tracking, there will always be new ways of being hidden in the shadows. 

Thursday, June 2, 2016

No matter how painful distance apart can be, not having you in my life is worse.  

Tuesday, November 24, 2015

Here is a thing that sucks.....
Ever since I grew out my beard for two years, I went from a guy that could get away with not shaving for three, maybe four days to a guy who has to do it every single day unless I want to look like a homeless person walking the streets. Apparently, something about growing it out woke up the follicles and made them more fertile.
Simple answer is to grow it out again. I know that there are a lot of people out there that dig the look but it really bugged me. It itched, my scars would become inflamed when the moisture would stay on them for longer than usual, and the beard required more maintenance than I honestly wanted to put into it. Plus, it added ten years to my face, which I supposed doesn't really matter since the difference between middle age man and crusty old fossil is basically just a term interchangeable at this point in my life.

Saturday, November 7, 2015

Why my day is going better than yours...

1.I fell asleep talking to her and woke up with a smile because of it.

2. I scored three cookies on the way out of the hotel

3. An old man (in his 70's) noticed my engineering ring and almost flipped over his luggage to talk to me about how cool it was that the tradition had come all the way from his alma mater. His daughter would have hers in a couple years if that no good boy friend of hers would leave her alone.

4. I discovered this video while cruising toward home.





When a problem asks me to solve using Laplace



Friday, November 6, 2015

The bar was closed.
Apparently guests are not allowed to play the Grand piano after midnight.


A photo posted by Pacehouse (@pacehouse) on

Thursday, October 29, 2015

Throw back Thursday (late night/early morning ) edition

nothing to report-just cant sleep


Once again, nothing really new to post. We haven't really worked on the house while we are dealing with more tax issues. So instead of real issues I am fluffing with a survey from Dismas on Facebook. 
Enjoy. 
Z

EDITED TO INCLUDE MODERN DAY RESPONSES. 






1. When you looked at yourself in the mirror today, what was the first thing you thought?
2008
Damn I cut the hell out of myself. I need to get a buzz shaver
2015
Damn, I need some coffee.  
2. How much cash do you have in your wallet right now?
2008
43$
2015
I stopped carrying a thick wallet and carry a money clip now. 114$
3. What’s a word that rhymes with DOOR?
2008
Bore, core, fore, four, gore,hoar, lore, more, pore, roar,sore, snore,spore,store,tore,wore,yore...and how could I forget, as a Winnie the Pooh fan...Eeyore?!
2015
Same.....
4. Who is the 4th person on your call list on your cell phone?
2008
Duda
2015
Duda again, just labelled as her real name now. 
5. What is your favorite ring tone on your phone?
2008
Funki Porcini playing The Great Drive By from Love, Pussycats & Carwrecks 
2015
The Iphone default ring
6. What are you wearing right now?
2008
Old grey sweater and comfortable jeans
2015
New grey sweater and comfortable jeans. 
7. Do you label yourself?
2008
All the time. But the labels change every few hours or so.
2015
nope
8. Name the brand of the shoes you’re currently own?
2008
Dockers,Reeboks, Red Wings, and Wellco 
2015
John Doe, BCG tennis shoes, Brooks Brothers, and vintage Converse
9. Bright or Dark Room?
2008
Dark 
2015
Subdued lighting with light walls. 
10. What do you think about the person who took this survey before you?
2008
She is a fire cracker when the fuse burns in and you are waiting for the explosion
2015
She better call my ass if she wants me to bring her some real McNuggets when I see her next year. 
11. What does your watch look like?
2008
mid 1950's gold and silver mens everyday watch
2015
Still rocking the old Rolex but have added a model from this century. 
12. What were you doing at midnight last night?
2008
asleep on the couch with Dracula on the TV
2015
Talking with her
13.What did your last text message you received on your cell say?
2008
"I love you"
2015
Sweet dreams, Nite 
14. What’s a word that you say a lot?
2008
Rude!!! (Its from the out of the hood program)
2015
Awesome (I have no idea why I have started saying it a lot lately) 
15. Who told you he/she loved you last?(please exclude spouse , family, children)
2008
Since we are excluding spouse, family and children.
I would have to go with Buffy the dog. She was just curled up in my lap with her head over my shoulder before I started this. 
2015
Her
16. Last furry thing you touched?
2008
My puppy Buffy 
2015
Buffy
17. Favorite age you have been so far?
2008
teens 
2015
right now
18. What was the last thing you said to someone?
2008
Good night. 
2015
I'll take the trash to the road in the morning before I leave. 
19. The last song you listened to?
2008
Bah Samba - So Tired Of Waiting
2015
Renegades - X Ambassadors
20. Where did you live in 1987?
2008Commerce
2015
Same
21. Are you jealous of anyone?
2008
Not any more.
2015
Not jealous, just envious 
22. Is anyone jealous of you?
2008
Don't know, don't care, either.
2015
Don't know, don't care.
 23. Name three things that you have on you at all times?
2008
Phone(might not be charged), keys, ipod
2015
Phone, money clip, wallet
24. What’s your favorite town/city?
2008
Sitia, Crete
2015
Brighton England
25. When was the last time you wrote a letter to someone on paper?
2008
In February 
2015
Just the other day actually.
 26. Can you change the oil on a car?
2008
No, why bother when that's what service stations exist for.
2015
Yes, I have always been able to do it.Taking care of my cars is a matter of pride to me. 
27. Your first love/big crush: what is the last thing you heard about him/her?
2008
She is a flight attendant. 
2015
She is still a flight attendant, 
28. Does anything hurt on your body right now?
2008
My left leg always hurts lately
2015
Left leg and temples
29. What is your current desktop picture?
2008
Eiffel tower in the fall of last year 
2015
A close up of Murphy's nose 
30. Have you been burnt by love?
2008
Burnt, cooked, charred, toasted, scortched.....
2015 
I have been burnt, but the person whom did it to me, is mending that. 

Wednesday, October 28, 2015

Status Update:
I have a pool of water in my shoes. My underwear is tightening up on me as I type.  My office chair is soaking wet. I am cold already and there is an ac vent directly above my head.
========================break=============================
I love my motorcycle. It gives me the freedom I desperately desire on a day to day basis. Whether I am riding through the mountains or cutting around cars in midtown, there is nothing like the feeling of not being tethered down. 
========================break==============================
I checked the weather as I drank my morning coffee. The day was foretasted to be in the 70's, overcast and only a 10pc chance of rain. Awesome riding weather. I can get away with my open face helmet and just the leather jacket for my ride to work....so I thought. 
The 10pc chance of rain found me as soon as I hit 75n and followed me all the way up to the perimeter. There was such a downpour that the water was getting into the engine, making it shudder and lose power, which is a bit nerve racking while being surrounded by decaf extra foam caramel frap drinking office drones who would rather look at their phones instead of watching the road. It rained on me so hard that my suit which is normally protected in a bag for me to change into when I get to work was completely soaked through. My leather jacket is about 10 lbs heavier since it has adsorbed enough water to be currently on my coat rack dripping still after half an hour of being out of the weather. My gloves which are supposed to be weather proof, are...they just arent where my hands stick out of them. I have had wet hands for the past three hours and currently look as if  they are the hands of a 90 year old man. (wrinkled) 
Getting in to work, I  drop off my suit at the cleaners at the Marta station across the street for them to dry it out and began the day with a frog pond in my pants.  Everyone is making fun of me. So badly that I am debating on just running to Target for a replacement shirt and pants. This would be the point where I would have something funny to say but honestly, Im wet, Im pissed, and I just want this day to end already. 

Vent over.