My first responsible disclosure was a disaster.

I will be redacting a lot from this post for legal reasons, but I believe it’s important for people to know and learn from. In other words, don’t make the same mistakes I did.

So what is a responsible disclosure? Let’s say you’re in the city and need cash so you find an ATM. As you approach it, you notice a small door with a lock on the side is open and you can clearly see cash inside the door within reach. What do you do? Some people may notice the door and quickly swipe as many $20s as they can while avoiding the camera, and likely never get caught. Most people would read this and agree that the responsible choice would be to call either the Police, the bank that owns the ATM, or both.

Let’s say you decide to call the bank. You didn’t take any money and you didn’t open the door. You noticed an issue that would cause harm to their business and decided contacting them was the right thing to do. You contact the bank and after explaining the situation, your put on hold. While waiting a police officer suddenly walks up and says the bank called saying someone was actively stealing from their ATM. They begin to question you as the person on the phone hangs up.

You might think this sounds unreasonable, unfair, or even a bit evil. Who knows how long the door had been opened and how many people stole from it, so why accuse the one person that did the right thing and contacted the owner? The call itself is a form of a “responsible disclosure” and unfortunately the outcome is often very similar to what I just described.

Responsible disclosures can involve a vulnerability, a bug, a zero day, poor configuration, or just poor procedure. For example, a cloud engineer may have unintentionally set an S3 bucket to public, exposing sensitive data to anyone that stumbles upon it. An online store may be using an older version of a web app containing a vulnerability that allows a customer to change their cart’s total at checkout. Or a hospital may be using unencrypted radio communication to send private information about their patients. More about that later.

A story from a few years ago is a perfect example of how a responsible disclosure can go wrong. the following is excerpts from https://techcrunch.com/2021/10/15/f12-isnt-hacking-missouri-governor-threatens-to-prosecute-local-journalist-for-finding-exposed-state-data/

“St. Louis Post-Dispatch journalist Josh Renaud reported that the website for the state’s Department of Elementary and Secondary Education (DESE) was exposing over 100,000 teachers’ Social Security numbers. These SSNs were discovered by viewing the HTML source code of the site’s web pages, allowing anyone with an internet connection to find the sensitive information by right-clicking the page and hitting “view page source.”… The Post-Dispatch reported the vulnerability to state authorities to patch the website, and delayed publishing a story about the problem to give the state enough time to fix the problem.”…Missouri’s Republican Governor Mike Parson described the journalist who uncovered the vulnerability as a “hacker”, and said the newspaper uncovered the flaw in “an attempt to embarrass the state”.

Due to the accusation coming from the governor in a public setting, and the accused being a journalist, this story quickly spread across the Internet. The fact that this data leak was so easy to discover and replicate, the backlash came from more than just the cyber security community. A new slogan was born “F12 isn’t a crime” due to F12 being a hot key for “view page source”, knowing that simply pressing one single key could be considered illegal made the governor’s comments all the more absurd. This story was popular in its time, but this happens way more than people realize, and continues to happen today.

Personally I believe the biggest reason many responsible disclosures end in punishment instead of praise is due to a lack of knowledge. I used the example of the ATM above so anyone could understand, but in cyber security the situation is a bit more complex.

Frame of mind and opinions also play a big role in how or why we do responsible disclosure. Fundamentally we do responsible disclosures because we feel it’s the right thing to do, but there are few that do it for money, recognition, blackmail, and other malicious reasons. It’s important to consider these things before making a disclosure, and it’s also important to consider how the entity you’re disclosing to will react. Blackmail is often the first assumption when you receive a responsible disclosure, even if it’s rarely ever the reason.

When I was a kid, I decided to scan a range of IP addresses similar to my own for instances of NetBus, a remote access trojan in the late 90s. NetBus was a script kiddie tool with a GUI that ran in Windows 98. The infected file was an exe that you could rename, create an icon for, and easily have it open a jpeg or another application while silently installing a backdoor on the victim’s computer. So many students in my highschool had learned of its existence that I was curious to see if there were many infected computers using the same ISP. I found one, connected to, and searched for an email address to contact the person. I learned it was an older lady in my town and emailed her, giving only my first name and explained that her computer was infected with a Trojan that allowed anyone to connect to it and take control. I included the infected filename and how to delete it, then I added a password onto the RAT to prevent anyone else from accessing it. She replied, accused me of hacking her and said the file I pointed out was added by her grandson to prevent people like me from hacking her, accused me of trying to trick her into removing it, and threatened to call the “internet police” (something older people everywhere believed existed back then). I sighed, deleted her info, and threw away the password that I had set. I could sleep better at night knowing that I helped her, even if she believed I had done the opposite. I was still young at the time and thought I was doing right even if the way I did it was a gray area of whether it was legal or not.

That’s not the story from the title though, although I wish I had remembered it at the time. As I mentioned in other posts, Software Defined Radio is a hobby for me. I won’t go into detail on the exact technology, but I will say that unencrypted data was being transmitted using 1990s pager technology that included personal patient information (as mentioned earlier). Anyone that has dabbled with SDR enough has probably found this or seen it on a youtube video, to the point it’s common knowledge to people in the know. It’s not a cellular frequency, and receiving this data is not illegal.

I was using SDR# for Windows to tune a $10 digitalTV USB dongle to receive digital signals in audio form that was being broadcasted. I piped the audio using a virtual microphone into a virtual audio output. I used a second application called PDW to listen to the virtual audio output and decode the audio into text. PDW is set to decode POCSSAG and Flex digital signals, which is what pagers used. The interesting thing about pagers is that every message is sent to every pager, and the pager itself ignores all messages except the ones directed to it. This is similar to the old style network hubs, which would send packets to every computer connected to the hub, and the computer would ignore the packets not meant for it. PDW itself has a GUI and looks like it was developed in the early 2000s.

I was showing this to a friend that worked in network Security for a health care organization, and he was shocked. He looked at a few of the identifiable addresses, and told me what organizations to reach out to, saying that maybe I could get a bug bounty or at least a very thankful IT person.

In my mind the blame was on the people sending the data, not the tech itself and not the organization. It’s no different than a data leak over email, due to email being unencrypted in nature. For example, If I sent classified info using email, the blame would be on me because email is generally not encrypted. This would be considered misuse, not my employer’s fault and not the fault of the email vendor.

I contacted the two healthcare organizations that we were able to find, and no, I can not mention their name, frequencies, pager vendor, or the contents of the messages. One was extremely grateful and said they would send it up the chain and put a stop to it. The other never responded.

The next day an attorney and the CEO of a pager vendor contacted me indirectly, threatening a lawsuit and stating that I was in violation of federal wiretapping laws. They had been contacted by the second healthcare org that I emailed and the blame had apprently been put in the vendor. After some back and forth and the fact that they decided to contact my employer, who had nothing to do with the situation, I was sent a “Cease and Desist” and told that they would not press charges as long as I agreed to it and returned it signed.

To be clear, I didn’t go to the press about the issue, nor did I make any kind of public disclosure. The source was the misuse by the employees of the healthcare org and that’s who I disclosed it to. Rather than fixing the issue through policy and educating their staff on how PII shouldn’t be sent over unencrypted comms, they instead forwarded my disclosure to the vendor, who’s gut reaction was that I was trying to attack their business’ reputation.

Even though I hadn’t broken any laws (I had multiple lawyers confirm that), to keep things civil I signed their cease and desist agreement stating that I would not intentionally capture data from that vendor, and added that I never intentionally captured data from them in the first place and was not aware of their existence before. I will note again that neither the vendor, their customer, nor the frequencies they use has been added to this blogpost.

It’s hard to say if they were trying to scare me, trying to save face in front of a customer, or they just didn’t know enough about their own product and believed it to be a secure way to send personal and private details of patients who expect a hospital to safeguard that info. I learned something that day that I should have already known. DO NOT give your real name in a responsible disclosure. There are exceptions, such as bug bounty programs like hackerone.com and other bug bounties. When reaching out directly, no matter how noble your actions are, you must protect yourself and assume the worse. Use proper OPSEC. Look for email providers on TOR or use a VPN to sign up with Protonmail under a fake name, while using a fresh browser within a temporary VM.

Like many others, I expected the second healthcare org to be as thankful as the first. Just like one would expect a bank to thank the person that alerted them to a breach in their ATM. I hope this saves someone from the legal consequences of uneducated and embarrassed CEOs and governors when a flaw is brought to light by someone trying to help.

CEUs for CompTIA certs

The truth is I forgot about this blog site because I’ve been very busy, and I try to “unplug” the the last part of the day.

That being said, my CompTIA certs are about to expire and I need to CE points to add. I will be adding several blog entries to acquire those points.

This is basically a way to extend the expiration of your certification without purchasing and passing another exam. There are costs involved, but they are much less than the cost of another certificate.

To add CEU points to a CompTIA cert, the following is listed for blogs:


You can earn 1 CEU for each blog post of at least 500 words.

Timing: Your blog post must be written and published during your three-year renewal cycle.

Relevance: At least 50 percent of the blog post content must relate to one or more of the exam objectives for the certification you’re renewing.

Documentation: Submit the following documentation to receive CEUs for the blog post:

  1. URL or copy of the published work with your name and the date published.
  2. Description of the content covered

I currently need 28 more points. I will be using other means of acquiring points, such as work experience which requires a letter from my supervisor on company letterhead.

ChatGPT Part1

If you have listened to the news, podcasts, or youtube over the passed few weeks, you have probably heard ChatGPT mentioned. There are numerous videos online showing how to use it to do your homework, write code, make money, and even a few surprising hacks and jailbreaks. It has reignited the fear and debate over whether AI will cause a loss of jobs, specifically for coders and customer service operators more recently.

This is my experience so far, and some ideas on whether people need to be worried.

Chatting with chatGPT is like chatting with many chatbots, except responses are lengthy and more accurate, and you can ask that responses be altered in specific ways. This is the “Transformative” portion if chatgpt, allowing the bot to continue referencing the original question. Basic it remembers what started the conversation and isn’t limited to a single answer.

Here, i ask it to tell me a joke about AI, then I asked for a different answer in a cheeky way:

Now I go on to ask it to tell a joke about AI, but in the style if Edgar Allen Poe. (recently binge watched Wednesday):

The joke continue further on in a similar length to “The Raven”

For us, the most useful everyday use of ChatGPT would be it’s ability to write code. Later I asked it how to create my own chatGPT using python script. It gave me all the code, as well as an explanation of how to run it and committed what each part of the code did. Ut referenced api keys, which i asked “how do i acquire an api key that this code needs?” And it gave me the url and detailed steps to acquire an api key from openai

Within a few minutes, I had my own chatgpt app

I want to play with this more hopefully find some jail breaks and hacks. So I’m going to label this post as part 1 with as many as 2 more to come.

For now, I want to talk about possibilities. Yes, this is a great coding tool. Google is a great coding tool, but you can spend a long time searching for code and scripts that accomplishes your task, runs in your environment, and is the correct version. GitHub is amazing, but it can be overwhelming to someone with little or no programming knowledge. ChatGPT can literally make you custom code and scripts based on what you ask for. If they don’t work, you simply tell the chat, ad well ad the error, and it will rewrite it.

This is perfect for automation and SOAR for those of us in defensive security. Let’s say you are a jr analyst and you know bash any python, but not powershell, which is primarily what your SIEM uses for automated responses on Windows host. Maybe you need to make automation that quarantine a host to prevent lateral movement from an attacker, and Powershell is the only script all of the host in your environment will run. ChatGPT: write a powershell script that will quarantine a compromised host on a network. Copy, then go straight to testing.

Will people loose jobs from this? With this specific version, I doubt it. What comes from this could cause some job loss in the developer field, but it’s more likely developers will use it as a tool to help with parts of their code. Besides, there are still errors in some of the code ChatGPT produces, and many organizations would not want every detail of their network and trade secrets handed over to OpenAI to let software owned by openAI write their infrastructure as code, scripts, and full apps. Basically I’m saying coders won’t loose their jobs, but the knowledge required to be a coder might include people who know virtually no languages.

As I stated above, I would like to follow up on this post. I think in the next few weeks we will see uses for this AI that we can’t imagine at the moment.

Link

Here’s a list of online OSINT tools and more. Some require payment.
I promise to update this list. There are still many sites I want to test before adding.

Social Media

https://sovip.io/?pa=1 – SoVIP Snapchat Search – may include NSFW photos

https://www.social-searcher.com/ Social Searcher
https://www.social-searcher.com/google-social-search/ Google Social Search

https://roadtolarissa.com/javascript/reddit-comment-visualizer/ Reddit Comment History

Photo Forensics

https://pimeyes.com/en Pimeyes Reverse Image Search

https://fotoforensics.com/ Foto Forensics

https://tineye.com TinEye Reverse Image Search

Network/Domain/IP/Website information

https://shodan.io – Search IoT, servers, SCADA, Network Appliances, etc.

https://www.sans.org/posters/google-hacking-and-defense-cheat-sheet/ SANS Google Dorking Cheat Sheet

https://hackertarget.com/ HackerTarget’s various IP and Domain lookup tools.

https://urlscan.io/ enumerate websites, get screenshots, HTTP redirects, and behavior. Great for reverse engineering URLs in phishing attacks.

Podcast/Books/etc (mostly Michael Bazzell)

https://inteltechniques.com/podcast.html – Best OSINT Podcast IMO

https://unredactedmagazine.com/ – Unredacted Magazine

https://inteltechniques.com/book1.html – Open Source Intelligence Techniques 9th edition

Multiple Tools

https://inteltechniques.com/tools/index.html – IntelTechniques Search Tools

https://start.me/p/rxRbpo/ti – @paranoid_ch1ck’s tools on start.me

https://start.me/p/L1rEYQ/osint4all – OSINT4ALL on start.me

https://start.me/p/wMdQMQ/tools – Technisette’s Tools page on start.me

https://osintframework.com/ – OSINT Framework (not a start.me page)

Maps – Location – Addresses

https://www.mapchannels.com/ – Various map types. Includes Dual Map and quad map features.

https://www.arcgis.com/apps/mapviewer/index.html – arcgis – local governments use this system for public parcel maps. Consider Googling: (county) (state) GIS Parcel Map

Breach Databases

https://haveibeenpwned.com/ Have I Been Pwned? is always a good starting point in an investigation.

https://intelx.io – Intelligence X

https://rapidapi.com/rohan-patra/api/breachdirectory – BreachDirectory API

https://dehashed.com/ – Dehashed

https://www.peopledatalabs.com/ – People Data Labs – Personal and business data purchased from various sources

https://psbdmp.ws/ – PSBDMP – Pastebin Dumps

Misc.

https://buckets.grayhatwarfare.com/ – Public Buckets AWS, Azure, and more.

https://search.censys.io/ – Asset and attack surface search

https://gchq.github.io/CyberChef/ – CyberChef – aka The Cyber Swiss Army Knife. Decode/Encode different text and file formats, encryption, and more.

Possible ways to circumvent censorship for Russians

With Putin’s war on Ukraine, and the death of thousands of Ukraine’s civilians, many Russian citizen’s appear to be manipulated by the government owned media. Although many Russian’s may also be afraid to publicly say what they really think, and what they know ti be true. Regardless, Russia is heavily censoring any news media site that calls Russian’s terrorism a “war”.

Here are some possible ways that the outside internet could be accessed from within Russia, so that Russian citizens can see what the rest of the world is seeing and saying about this invasion.

Tor Browser torproject.org Tor aka The Onion Router, is a network built for anonymous web browsing that is accessed using the Tor Browser, Tails OS, or by one of several scripts that can be run to route all traffic through Tor. Tor uses three layers of encryption so that traffic is fully encrypted up until between the exit router and the source.

If Tor alone does not prevent blocked sites or censorship, consider reading about the options on Tor’s censorship circumvention site https://tb-manual.torproject.org/circumvention/

You may also consider changing your DNS to 1.1.1.1 which uses a secure DNS, a feature available in Firefox. This alone is likely not enough to view censored websites from Russia

https//privateinternetaccess.com/

VPNs are another way to possibly circumvent censorship online. I can personally vouch for Private Internet Access aka PIA https://www.privateinternetaccess.com/ this is a paid subscription, but only costs around $35 yearly.

Free VPNs exist, but they are highly regarded as dangerous. Not because VPN companies want money, but because most free or community based VPNs tend to be full of vulnerabilities, including the ability or users to see traffic from other users.

Specifically for viewing censored media, you could consider a web proxy such as proxysite.com. Basically your using one website to open another. This is not recommended for privacy, so do not give any personal information. It is however, very useful for censorship.

I will continue to add other options as I learn of them. If anything isn’t mentioned here, consider adding a comment with other possible ideas.

Update 2-3-2022

Hello followers! All 4 or 5 of you! I haven’t created a blog post for a while, and wanted to add something to show that this site isn’t dead. I started this nearly a year ago, due to suggestions from a friend and from a talk at KringleCon 2021. To be honest I’m a bit of a perfectionist, which makes blogging very difficult. I’m the kind of person that will begin to write, suddenly realize that I don’t like the site’s theme, spend 45 minutes trying to find a theme I do like, then get frustrated and give up. I have more drafts than actual posts, most of which will never be public, but I keep them because of the time and effort invested into it. Aside from that, 2021 was hard. Not because of Covid 19 specifically, but for multiple, non-related reasons. Also work has become more involved this year, and I’m the kind of person that doesn’t want to see a computer screen after staring at one all day at work, and sometimes I don’t want to think about security, after thinking about it all day at work.
In the midst of all that, this blog hasn’t been a priority. However, I’m not getting rid of it anytime soon. I do plan to eventually do some updates, maybe change the layout to something easier to read.

Are We Correctly Educating Users about Phishing?


Technology that stands the test of time becomes more complex. Likewise, attacks also mature and become more complex. So why do we continue to educate people on phishing the same way we did 10 years ago?

I see a lot phishing attacks, and those attacks become more complex every day, but the user education hasn’t changed much. The following is a list that comes from top search results for “How to prevent phishing.” You can probably guess most of them without looking:

  • Misspelled words
  • Bad grammar
  • Don’t open attachments
  • Domain name misspelled in links
  • The message creates a sense of urgency.
  • The message asks for money.
  • Odd greeting “Hey Dear,”

Before you scoff, I’m aware that this holds true to many phishing attacks that occur today. I can check my junk folder right now and see examples of each of these. However, I’m not worried about the email that lands in my junk folder. I’m worried about the convincing emails that pass all the checks and arrive in my inbox.

In my personal experience on the enterprise level, more than 80% of the phishing attacks are credential harvesting. An email will claim to be a service used by a coworker to send you a fax, document, or voicemail. These emails look legit with no spelling mistakes and occasionally include some standard customer policy or disclaimer at the bottom, and sometimes a company logo. Many will show a thumbnail or convincing icon of a document, a fake media player, or link of some kind. All of which are links to a website. When clicked, a webpage opens asking for credentials to proceed. Many times, the page will show your email address at the top, giving it that extra legit look. Once the username and/or password is typed in, the creds are sent to the attacker and the webpage forwards the victim to the real site.

The credentials it’s trying to harvest are generally Google or Office365, but can occasionally show up as iCloud, Twitter, Facebook, or your email provider.

An example of a spoofed Office 365 login page found in a phishing attack, created to steal credentials.

Digging deeper, I’ve noticed many times that the landing page isn’t the original URL in the email. The link will send the user to a page on a domain that does some checks and then forwards to another webpage, or sometimes multiple pages, and many times on a separate domains. Occasionally they will attempt to check for active sessions on Twitter, iCloud, LinkedIn, O365, Google, and Facebook, and redirect to a spoofed portal based on what it finds.

Others involve “Off the Shelf” Phishing Apps, such as BLACK EYE Phishing Tool, which is the updated version of ShellPhish. https://github.com/8L4NK/blackeye

So what does a convincing phishing attack look like? Below is an example of a phishing attack that threw me off at first. If I wasn’t already familiar with the types of emails sent my O365 Security and Compliance, this would have been hard to spot. The first clue was the sender’s address.

This was a clever idea. Most people would not expect an email telling you to check O365 Security and Compliance to be malicious. It has the O365 logo, convincing subject line and sender name, and an added sense of urgency. Note that there are no spelling mistakes, attachments, bad grammar, odd greetings, or requests for money. From the list above, the only item you can see is the sense of urgency.

Back to the reason for this post, are we educating people properly about phishing attacks? My answer is ‘not entirely’. That earlier list is useful because attacks like that still exist, but bad spelling and grammar should be a side note, not the top of the list, and unfortunately that’s the only part most people remember.

Here are a few suggestions I have for phishing education:

First off, people need to consider when they should and should not give out their email address. I say this for two reasons:
1. If signing up for a free service, your information is likely to be sold, and it’s not always clear who is purchasing it.
2. Giving out your email address less means you receive less emails. The more emails you receive, the more likely you are to rush through checking them.

We need to be more cautious on who we choose to give our information to. We might trust that Facebook will only show our information to those in our friends list, but what happens when their information is leaked? At the time of writing this, a recent news story showed personal data had been leaked from 533 million Facebook accounts. This included names, email addresses, physical addresses, phone numbers, date of birth, gender, and so on.

If you are required to provide an email address for a service, consider having two separate email accounts, one for personal and financial use, and another signing up for services, such as social media or an app. This can also help people spot emails that don’t belong.

Most of all, use common sense. People need to take time to ask themselves “why am I receiving this email?” The person that received the O365 security and compliance email above did not have access to that service, and anyone that does have access knows better. For all unexpected emails, don’t click the link within the email. Type the address into the browser manually, or use a search engine. URLs and Links within emails make up most of the phishing attacks that make it into an inbox.

If your friends, family, or coworkers email you asking for anything specific, such as money or personal information, call them. Especially if there is a sense of urgency. If the email says they can’t be reached, contact them another way. If it was that urgent, they probably wouldn’t have sent an email.

If you suspect that your username and password has been stolen, change your password as soon as possible. If any other account shares the same password, changes those also. Use 2 Factor Authentication!!! Either an authenticator app or a physical device like a Yubikey. You can purchase a Yubikey 5 with NFC from Amazon using my affiliated link below:

Yubikey 5 NFC on Amazon

Exploring the wide open world of TikTok.

There’s not a lot of talk about TikTok between peers in the infosec community. The TikTok platform is somewhat of a joke to many in the security world due to many of it’s factors. The truth is that it’s gaining popularity and it may be here to stay, so from a security and privacy perspective we need to acknowledge it and give it the attention it deserves.

If your reading this blog, then it’s unlikely that you’ve never heard of TikTok. It made world news when Former President Donald Trump ordered China’s ByteDance (TikTok’s Parent company) to divest ownership of the application, and threatened to shut down its U.S. operations through executive action. As with most threats Trump made during those short nightmarish 4 years, there were likely hidden reasons that benefited himself or his close friends. Regardless of Trump’s rationale, TikTok was owned by a Chinese business, which is required by law to send it’s data to the Chinese government. Security researchers checked and saw “unusually large” amounts of data that TikTok was collecting on it’s users.

After some legal back and forth, and bids made by Oracle and Microsoft, Oracle ended up purchasing 12% of TikTok, because ByteDance was unwilling to give their algorithm to Microsoft as part of the deal. So a small chunk of TikTok stock belongs to US based company Oracle, and that was enough to make the politicians happy. Note that Oracle also owns small portions in Canada in other countries, but I couldn’t find the exact details on percentages or if the 12% is everything that isn’t China.

Read more at CNBC TikTok Deal Splits Control Between US and Chinese Owners

TikTok itself has grown at blazing speeds, and is catching up fast to the big boys of social media Facebook, Youtube, and Twitter. This was made possible by the isolation brought on by the Covid19 Pandemic ( due to our basic need for society), and the free publicity brought to you by our former US President.
PS. My favorite word for 2021 is “Former”

So what is TikTok exactly and how is it different?

If you remember Vine from the mid 2010s, then TikTok is a version of Vine with a few added features pulled from Twitch and other social media platforms. The TikTok app even works exactly like the Vine app with it’s quick 15 to 60 second videos, delivered to you in an endless scroll. The differences (from what I can tell) include the editing interface and the live streams. Live is a big part of TikTok, with the usual scrolling chat that allow viewers to interact with the creator and send gifts, similar to Twitch. Many popular creators have multiple moderators to assist with managing the live chats, and the chat has a filter to allow certain words not to be said. For example, creators who are showing how to make health foods or drinks might filter “poop” to prevent viewers from saying “that looks like poop.”

TikTok’s definition will depend greatly on you ask. The security world and those that reverse engineer the site say “TikTok is a data collection service that is thinly veiled as a social media networkGuy who Reverse Engineered TikTok on boredpanda.com. But if you ask the standard to heavy users, it’s a God-send. Social Media fundamentally provides social interaction to people you would normally not have social contact with. For people who are too busy for events in their community, who work from home, or just don’t feel like they fit in where they are, social media can be a lifesaver. It’s our need to belong to something and to have relationships. It’s probably something that I personally need to do more of. That’s why I believe it’s important to look at these platforms very closely and protect the users that make up the network.

What I’ve learned from TikTok:

If you are male, TikTok’s algorithm with send you mostly female videos. If you are female, you will be served mostly male videos. They’re algorithm also puts lower priority on videos from LGBTQ and creators with obesity among other things. Very little control is given on the web interface (as opposed to the mobile app). For instance, to change certain settings in your profile you must use the mobile app because no option is available when using a web browser. After all, mobile apps can pull more data off your device than a website, and can do so with more secrecy.

When I first joined TikTok, I immediately believed that it was almost entirely female creators, because female creators made up 80% of what TikTok served me. This would be preferable for someone in their 20s and not married, but I was suspicious. I learned that the results were the opposite when using a fake female account. My feed and search results as a female user were noticeably different, showing way more male created videos.

To test the male vs female claim, I did a very simple search using my male account. A search that is normally guaranteed to have high male to female ratio.. I searched “infosec”. The first few results were mostly female with a few thumbnails that didn’t show anyone. As I scrolled i slowly started to see more videos from male creators. To be fair, there isn’t a lot of infosec people on TikTok. Most of my results were copies of previous results.

Two guys in a row in my search for “inforsec”, and both have their face covered in the thumbnail..

These results are not expected on any platform. Hopefully there will one day be equal gender ratio in the information security world, but it’s widely recognized that there are more men in infosec.
Shout out to all the women in the security world! We need more of you and what your able to bring to the table.

The TikTok Culture

Those of us older millennials remember the internet in the late 90s early 2000s. In those days, you didn’t use your real name, you never posted a picture of yourself publicly, and never gave personal information or credit card numbers. It was a time when prime-time TV included catching online child predators (which we need now more than ever) and movies like “The Net”. But, the internet was unknown and scary back then. We had chats and tight communities and friendships without ever needing to know each other’s real name or appearance. You always wondered, and in time, people would share that info, but the magic of it was your friends like you for you, and not what you looked like, where you came from or who your friends and family were. a/s/l? Most people asked but few responses were honest.

On TikTok, this kind of thinking is taboo. If you set up an account pretending to be something you aren’t, people find that suspicious. It mirrors a larger paradigm shift in online culture that started with Facebook (which I wont get into here). On TikTok, you are expected to be everything you are in real life and more. It attempts to be more personal than YouTube, while it’s content remains very public. This is partly due to the platform preferring mobile phones over traditional PCs, but also because of the short video time. Your videos can be 15 seconds, or 60 seconds.

TikTok turned it’s live feature into an achievement. How do you reach this achievement? Popularity. 1000 followers are required to achieve the “Live” option.

DigitalTrends.com writes:

“A TikTok user must have at least 1,000 followers to even see the live stream option on the platform, for example. Even after you hit 1,000 followers, it could still take several days before the live stream button appears.”

The Monetary benefits for creators:

Why is it important to go live? Two reasons, live streams can be longer than 60 seconds, and followers can send the streamer “Gifts” only on a live stream. Here’s how gifts work:
1. A User must purchase “Coins”. Coins are the only monetary purchase that can be made.
2. Once a user has Coins, they can then click the “Gift” icon in a live video.
3. This gift icon is then sent to the creator’s account, and are converted into “Diamonds”
4. Diamonds can then be cashed in, but the creator receives only 50% or less of the original coin’s value. TikTok keeps the other 50-60%

This information and much more can be found on this site: Alpha.com: How Much are TikTok Gift Points Worth?

Coins, Gifts, and Diamonds can be complicated by design, and depend on the nation’s currency and it’s exchange rates. Best estimates put Diamonds at around $0.05 USD. Coins purchased in bulk are around $0.015 or 1.5 cents, but Gifts start out at 5 Coins, and so multiple gifts are needed to attain diamonds. Like I said, complicated.

In my opinion, it would be very hard to make a living on TikTok without having a secondary source of income. That may range from music sales, to alternative advertising within videos, or using TikTok as a secondary platform to YouTube. However, there are creators that claim they can make a few thousand dollars each live stream, and a few are able to make a living on those earnings.

Friends versus Followers

This topic is honestly a little complicated too. To add a friend, you must follow that person, and they must follow you back. If you have content that only friend’s can see, then this agreement must take place. One can not see friends only content by being a follower alone.

With that said, the downside to this is that it will take longer to acquire enough friends to do a live video, and even longer to gain any gifts (or make profit)

The Privacy issues of TikTok on it’s surface

With what we already know about TikTok’s data collection, there’s no way I would use it without a VPN, and I wouldn’t recommend using it on a mobile device that wasn’t a burner phone or hasn’t been hardened before hand. Let’s put it this way, if you have information on your phone that you wouldn’t want other people to have, you shouldn’t use this app. Right off the bat, the app requests access to your contact list, other social media accounts, phone number, camera, microphone, local (home) network. As if that wasn’t bad enough, well.. don’t take my word for it.. Here’s some more from boredpanda.com from someone with 15 years experience and reverse engineered the app:



To be fair, this post was from almost a year ago. Lets add a few what I’ve seen recently. And I haven’t had a chance at attempting to reverse engineer the app, but maybe soon.

Uploading videos are public be default. You must specifically request for videos to be “friends only” or only viewable to you.

The gifts and monetary exchange is sketchy at best. There is little information provided by TikTok on actual numbers. The money that TikTok itself makes from these are not enough to support the platform, so it goes without saying that most of ByteDance’s profits come from selling some of that user data, and we can assume some nation state funding is involved.

The platform and it’s culture put a lot of emphasis on the individual and personal information. The vast majority of TikTok’s videos are self videos, and what people do in those videos will remain online indefinitely, possibly by one of the several archiving projects that collect TikTok videos and publish them publicly. See this reddit feed if you would like to look at the discussion on TikTok video archiving without the need of a TikTok account: https://www.reddit.com/r/Archiveteam/comments/hr3zsm/lets_archive_tiktok/
This is not a new concept, even Angelfire and Geocities pages have been resurrected recently, bringing back websites created up to 30 years ago. And there are bigger projects, such as the The WayBack Machine .
Point being, What you do online will always be there, in one form or another. It can be viewed by potential employers, schools, and future friend’s and in-laws. I predict there will be a lot of social media accounts pulled out of the void in future Presidential elections


https://tik.fail/browse Another TikTok video Archive that appears to be on hold due to API changes.
I will add more archive links as they become available.

To the TikTok community:

I can’t stress this enough, I’m not targeting TikTok users in this post. I know many and they are great people. A lot of great friendships have been made on this platform, and it’s giving potential stars a chance to shine. I love the people that make up TikTok.. Most of them anyways.. There are some blatant child predators I’ve come across and I have no respect for that kind of scum. Maybe that’s a blog post for another day, because I would love nothing more than to expose people who manipulate and hurt children. So stay tuned…
…But to the average users on TikTok, If you have to be there, please consider doing it this way:
Use a web browser on a PC in privacy/privacy mode, behind a VPN. Brave is a great privacy enriched browser built on chromium, that has built in adblockers and other features. It wouldn’t hurt to do it within a clean Virtual Machine, the same safeguards we use to reverse engineer malware, because that’s basically what your using.

If you must use it on a mobile phone, purchase a prepaid smart phone from Walmart, and add a VPN like Private Internet Access or PIA, but do not add your email address or any other accounts or apps to the phone. Set your normal phone up as a WiFi access point and connect the WiFi from the TikTok phone to your normal phone with the VPN enabled. This will allow you to use the same amount of data, but in a safe way.

I would have suggested using the Tor Browser, which does all that for you. However, when I tried to browse TikTok in Tor the screen became distorted and made it impossible to click anything. This occurred on the two highest security profile types. This is due partly to the restriction on scripts being run within TOR, but there also seems to be some safeguards TikTok has to prevent a hardened browser like Tor from working correctly.

More things to consider: The US military does not allow TikTok on it’s networks, nor does many Federal agencies, large enterprises, and defense networks. Supposedly, the parent company ByteDance are also not allowed to use TikTok on they’re own network, although this isn’t verified and I assume there are some details left out of that claim.

If this blog post doesn’t scare you, then check back. I’m going to be making a blog post that will explain to people why privacy matters, and why businesses want you to believe privacy is dead.

If you are the victim of an internet stalker, then visit this link, or call the number below:
National Center for Victims of Crime
1-855-4-VICTIM (1-855-484-2846)

For information on how to report Child Sex Trafficking, Pornography, Sexual Abuse or kidnapping, visit this page on the Department of Justice’s website:
https://www.justice.gov/criminal-ceos/report-violations

Or call your local law enforcement.

Why we love Mr. Robot

I’m a big Mr. Robot fan. I have two t-shirts, an Fsociety mask, two patches, and a copy of Elliot’s journal from prison. This doesn’t sound like much, but it’s major for me because I’m not the type to collect Funko Pop, or wear tshirts of my favorite show, band, etc. So it’s funny to think back to when a coworker first recommended the show to me, and I rolled my eyes and ignored him.

Mr. Robot was a series that aired on USA beginning in 2015 about a Security Engineer by day, vigilante hacker by night, named Elliot Alderson (played by Rami Malick) who “wanted to change the world.” He meets up with a group of hackers called “F Society” to erase the world’s debt, and take on the “people who secretly run the world… top 1% of the top 1% who play God without permission…”

As stated above, I first heard about Mr. Robot from a co worker. I was discussing “Halt and Catch Fire”, which is another great show that aired on AMC. After I explained the story line, he asked if I was also watching Mr. Robot. “What’s that?” I asked. “I’m surprised you haven’t heard of it. It’s about a hacker…” I can’t recall anything he said after that line because I tuned out the rest. It wasn’t until he asked 2 more times that I finally decided to give it a chance. The first episode I watched was season 1 episode 5, where Elliot infiltrates Steel Mountain, and halfway into the episode I was hooked. I stopped the episode and decided I needed to watch it from the beginning. I was caught up the following day.

Why did I ignore it? Before Mr. Robot, no movie or TV show had ever accurately portrayed a hacker, or the act of hacking. Many had the right mindset and good ideas, but it was always overshadowed by a lack of realism. There was even a new term created for this epidemic called “HollywoodOS”. Even within the movies I liked, I could never fully enjoy them out of frustration and a little embarrassment. If you don’t understand what I mean, try watching the live action Mario Bros. Movie that was released in the early 90s. If you know anything about Super Mario Bros, you will quickly understand what I’m talking about.

I’ve mentioned before that the 1995 movie “Hackers” is what started me down the path of becoming a hacker, but that happened when I was in 7th grade. It didn’t take long for me to realize that the hacker community was not a big fan of the movie, and as I learned the trade I too realized how fake and silly the footage really was. Flying through a virtual world where directory trees are on large boxes? Where worms visually resemble a long twisted umm… worm? with tentacles? Viruses speaking ransoms and singing until they execute? There’s no logical rationale for any of it. Even the keyboard the network security team uses with it’s flat inverted keys, would make typing extremely difficult.

Inverted keyboard in the movie Hackers

All that aside, the story line portrayed hackers as the good guys for once, and there were some legit hacks and good ideas mentioned, and even a few Easter eggs. “Hackers” fell victim to the same mistakes of every other Hollywood attempt at portraying hacking, and little has changed over the years.

Mr. Robot was the first to get it right (and hopefully not the last). Wargames was close, but most other films portrayed hacking as multiple, big screens with a lot of graphics, or speed typist writing hundreds of lines of perfect code on the spot. My favorite Hollywood hacker fail is the CSI scene where two agents are typing on the same keyboard at an attempt to fend off an intrusion.

WarGames 1983

Sam Esmail had a team of security professionals work with production to make the hacks as accurate as possible. He actually put forth the effort needed to get it right, and it shows that he cared. Wikipedia states:

“Aside from the pilot episode, Esmail hired Kor Adana (former network security analyst and forensics manager for Toyota Motor Sales), Michael Bazzell (security consultant and former FBI Cyber Crimes Task Force agent and investigator) and James Plouffe (lead solutions architect at MobileIron) as his advisors to oversee the technical accuracy of the show. By the second season, Adana assembled a team of hackers and cybersecurity experts including Jeff Moss (founder and director of Black Hat and DEF CON computer security conferences),[77] Marc Rogers (principal security researcher for Cloudflare and head of security for DEF CON),[78] Ryan Kazanciyan (chief security architect for Tanium) and Andre McGregor (director of security for Tanium and former FBI Cyber Special agent) to assist him with the authenticity of the hacks and the technology being used.[79

The show’s team of experts answering questions in the Mr Robot Panel at Defcon

Sam Esmail was fascinated by hacker culture and stated that he had wanted to make a film about it for around 15 years. He was also inspired by the Arab Spring. This all came on the heels of the NSA leaks by Edward Snowden, which occurred in 2013, two years before Mr. Robot aired. This show was legit, and the timing was perfect. For the first time ever, the hacker and security community as a whole had nothing bad to say about what they were seeing.

Mr. Robot even took a few jabs at the past Hollywood attempts at hacker films. In season 1, before the Steel Mountain hack, Romero and Mobley are watching the movie “Hackers” in a hotel room, and Romero (being the older, seasoned hacker/phreaker) says “Hollywood hacker bullshit! I’ve been in this game 27 years. Not once have I come across an animated singing virus.” This is exactly what most hackers in the 90s would have said about the movie “Hackers”

In addition to the authenticity of the hacks, I think Sam Esmail also realized something in production that Hollywood had never considered. We get excited when you show software, or a pen-test tool being used accurately, that we ourselves have experience using, or helped develop. When I saw the HackRF being used in the last few episodes of the 4th season, I tapped my wife’s shoulder and said “Look! It’s a hackRF like you got me for our anniversary! You wanted to know what it does? There’s your answer.”

OpenWRT Interface and USB Rubber Ducky

Another reason we love Mr. Robot is that it gives examples of use cases, usually being the worse case scenario. I’ve found myself showing clips to family and friends to help push the idea of why security and privacy is important. Anytime someone is loose on privacy, especially in a business setting, I tend to ask if they’ve seen Mr. Robot.

All that aside, you don’t have to be a hacker to love the show and understand the story line. This wasn’t really a show about hacking, it was a show about a hacker with serious personal issues, suffering from mental illness, creating a revolution, and questioning his reality. This all makes for a great show, but believe it or not, it goes even deeper..

Like most people, I had never heard of ARGs (Alternate Reality Games). Mr Robot introduced me that world when I decided to check the QR Code drawn in pencil in Elliot’s journal in Season 2 Episode 2. The day the show aired, I found myself seeking a copy online that I could pause and take screen shot of the QR Code. Once that was accomplished, I opened Paintbrush and drew over the blocks in black so that my phone could pick up the possible message or URL. As a result, I landed on Confictura Industries, which then looked like a 1990’s style home page for the notebook’s brand. Confused and curious, I Googled what I was seeing. I quickly found a group on Reddit called ARG Society. https://www.reddit.com/r/ARGsociety/

whoismrrobot.com part of the Mr. Robot ARG

With the ARG, the first few findings offered prizes to the few people who found them and solved the puzzles. Season 2 offered an e-coin signup with prizes (ringtones, clues, wallpaper). As the show progressed and became more popular, the ARG became bigger, with more sites to find, clues that spanned across multiple social media sites, and increasingly more complex. Click the link above to see how complex season 4 became. With this, I found out there were many other ARGs and it became a new hobby. Some good one’s to check are “This House has People In it”, Cloverfield, Petscop, Dad, and the infamous Cicada 3301 (Whether or not this was an ARG is debatable) https://en.wikipedia.org/wiki/Cicada_3301

Many of us love it because Elliot’s problems mirrored a lot of our own. It’s no secret that there’s an epidemic of depression and social anxiety within the hacking and security community. Elliot’s mental health issues included all of that to an extreme, as well as drug abuse and Dissociated Identity Disorder. Elaborating on this subject could require spoilers, so I’ll end it with this…
Those of us that know that pain and shared those struggles with Elliot, now feel a little less alone in the world.

Modified Electric Flyswatter for more bug zapping Power!

This is an electric flyswatter that has been modified to be more powerful. Your likely to find these in hardware stores, probably on end caps. It’s shaped like a small, plastic tennis racket with a trigger button, and a compartment for two AA batteries. To use it, you swat at flies or insects while holding the button, which shocks the bug as it’s being hit. They’re good to have when camping in areas with a lot of mosquitoes. You can purchase an Electric Fly Swatter by clicking the link below.

HOMEVAGE Electric Fly Swatter (2 AA Batteries Included) $14.99

Due to safety reasons, the shock is not that impressive. The only way a bug can be “zapped” is if it’s touching the inner and outer metal screen. Even then, it’s hard to know for sure if it’s being zapped because the voltage is very low. I wanted more power…

The electric fly swatter you see at the top is one that I modified a couple years ago. It has a much higher voltage output than the stock fly swatter, and I will show you everything you need to modify one for yourself. The modification consists of replacing the stock transformer inside with a Step Up Power Module, aka “Voltage Multiplier” to increase the voltage to as much as 700kV and create an arc (or spark) without anything touching the screens. The nice thing about these voltage multipliers is that they fit easily inside the handle of the fly swatter, and work off of two AA batteries.

DC Step Up Module / Voltage Generator / Voltage Multiplier
The Red and Green wires connect to the + and – sides of the batteries. The other two wires connect to the mesh screen .
The original stock transformer

You can purchase a one for yourself from Amazon $6.99 by visiting this link:
DC Boost Step Up Power Module High Voltage Generator DC 3V-6V,700KV

The reason I’m revisiting this project now is because I’ve been afraid to leave the batteries inside when its not in use. The button is easy to press, and doing so will cause a small arc. It’s possible for a child to grab it and shock themselves, or worse case, dropped onto the button and potentially cause a fire. So I revisited this project to add a safety switch onto the bottom.

This is the inside of the flyswatter prior to installing the safety switch. The black trigger button was originally a programming switch for an aftermarket remote start system for a car. Most installers remove this button during the install to prevent the system from being reprogrammed by accident. It’s soldered in-line with the + wire coming from the batteries to the Voltage Multiplier. I replaced the stock button because it was broken during disassembly, but it would have worked as well and required less work.

Here is a rough schematic I spent 5 minutes drawling in MS Paint. The bottom shows the safety switch that we are adding, which is going in-line with the negative wire from the batteries.
There are 3 wires coming from the mesh screen at the top, one wire for a center mesh (positive charge), and two wires for each of the outer mesh (negative charge). Both outer mesh wires will connect to a single wire from the module, and the other wire is connected to the inner mesh. It doesn’t matter which wire is which from the module, as long as the two outer mesh screens are connected to the same wire. This is honestly a simple circuit and great for beginners.

This is the switch I will add to be used as a safety switch. It has a small washer that reads “On Off” so that anyone can easily see whether the power is turned off or on. The current trigger switch will make the connection to the + side wire from the batteries, while the safety switch makes the connection to the – side. Both switches will have to be “ON” to allow the zapper to function.

There is limited room inside the handle, and since we’re working with high voltage we don’t want any wires to come loose or short out, so I’ll be soldering my connections and using heat shrink tubing.

This is my Hakko soldering iron. I’ve used many soldering irons over the years, and this is my favorite. The base is heavy enough to prevent itself from tipping over, and includes a wet sponge and wire mesh thing to quickly clean the tip. The iron itself heats up within 10 seconds, and shows a readout of the temperature. Hakko is a well known brand, so finding new tips is easy. You can purchase this Hakko Soldering Iron at this link:
Hakko FX888D-23BY Digital Soldering Station FX-888D FX-888 (blue & yellow)

This is standard 2:1 heat shrink tubing that I’m using for this application. You can purchase a similar assorted box of heat shrink tubing here:
650pcs Heat Shrink Tubing Black innhom Heat Shrink Tube Wire Shrink Wrap UL Approved Ratio 2:1 Electrical Cable Wire Kit Set Long Lasting Insulation Protection, Safe and Easy, Eco-Friendly Material

Always tin wires and contacts with solder before soldering them together. It’s makes soldering them together easier and creates a stronger weld. I also use flux when I have it nearby. Do not inhale the fumes from the solder, and use a fume filter if one is available.

.

After soldering the wires to the switch, I slide some small pieces of heat shrink tubing over the wires and contacts. Normally I use a heat gun, or my solder reflow gun set at a low temperature, but I decided to use a torch because the tubing was so small. You have to be careful with a lighter or torch because it can quickly melt the material, which is why I’m leaving an inch between the end of the flame and the tube, and constantly moving the torch up and down. Always keep in mind that heat rises.

Heat shrink is better than electric tape at staying adhered to the wires. I normally do not use electric tape in cars or anything that requires movement and sudden temperature changes. Electric tape has a tendency to dry out and unravel over time, which would expose the wires that it’s supposed to protect.

I added a larger piece of heat shrink tubing around both wires to keep them together. I could have used tape for this, but since I already had the torch and heat shrink tube out, it was easier to use another tube. That section of wires will run along the side of the batteries, so keeping them snug will help prevent an accident when replacing batteries in the future.

I decided to mount the safety switch on bottom of the handle. Mounting it on the side would feel awkward with the toggle switch sticking up between your fingers, or poking the palm of your hand. There was no place higher that provided enough space inside, so the bottom was really my only choice.

I desoldered the original green wire from the negative battery terminal and replaced it with one wire from my switch. Then I soldered the other switch wire the the original green wire I just just desoldered.

To mount this safety switch, I had to drill a hole into the bottom of the handle large enough for the threaded area part of the switch to fit through, but small enough to keep the nuts from falling through.
This is what the safety switch looks like after everything was reassembled.

Here’s a video of this electric flyswatter in use, so you can see the outcome and the arc created by the Voltage Generator Module thingy.
The arc will always occur where the inner and outer screens are closest. Unless a bug is on it, this flyswatter tends to always arc in that top area.

After I was finished, I tested to make sure all switches were working as expected. I hope you found this informative. Note that the links within this blog post are affiliated links, which means I get paid when they are used to purchase parts from Amazon.