Crypt0jan·5 days agoClassification in Confluence… done right.TL;DR We did a thing and built a classification app for Confluence that runs with minimal rights. This means the app cannot access the contents of the page itself, ever. We’ve made it available for free in the Atlassian Marketplace. The why We all feel the need to classify information at some point…Atlassian4 min readAtlassian4 min read
Tom Wolters·5 days agoThe Year Of The White RabbitIn January 2023 the Chinese New Year of the Rabbit started. A mere coincidence as we (Chapter8) were just busy with reporting a serious vulnerability concerning another rabbit, a White Rabbit to be exact. This blog post is not just a technical brief of the vulnerability, but also a write-up…Hacking6 min readHacking6 min read
Tom Wolters·5 days agoUsing Your Tools Against YouIn one of our missions we noticed a Sentry web application. Sentry is used to remotely obtain information about crashes and issues users might have. Sentry users can login, join a team and read through crashes, their stack traces and meta-data about an issue. ChatGPT defines Sentry as: Sentry is…Hacking5 min readHacking5 min read
Tom Wolters·5 days agoSafer Internet Day: How To Coordinated Vulnerability DisclosureToday (7 Feb ’23) is Safer Internet Day! The Chapter8 team tries to make the internet safer every day. Not just with ‘our day job’ but also in our spare time we try to research software for vulnerabilities or find and report vulnerabilities to organisations that run insecure software. In…Hacking5 min readHacking5 min read
Pepijn Vissers·Mar 12, 2022Plant a tree. Now.Geopolitics and the state of cyber. “The best time to plant a tree was 20 years ago. The second best time is now.” — Chinese proverb. Hello dear readers, Although our next blog was supposed to be a short pun article on the importance of offensive forward security and training…Cybersecurity7 min readCybersecurity7 min read
Pepijn Vissers·Feb 4, 2022Advanced Purple TeamingThe what, why, when, where and how. Part one: the what. Hi there, dear readers. You got the APT-joke in the title, right? Good! In this small blog post series, I’ll take you through a virtual Purple Team Mission from early start to aftercare. The way most people know about…Cybersecurity6 min readCybersecurity6 min read
Pepijn Vissers·Jan 22, 2022Adding our own Kill Chain to VECTR…because the industry standards do not always suffice. TL;DR: we added our own Time Phased Kill Chain to VECTR to be able to report attack paths and detection results in the order that they actually took place. …Cybersecurity11 min readCybersecurity11 min read
Pepijn Vissers·Nov 30, 2021Five Purple Christmas Gifts…because we all love Christmas lists! 2021 was a great year for us. On the very first day, Crypt0jan and I welcomed Cyb3rt as the Hunter of our Purple Team and shortly after, we started a Mission in one of the most protected areas of the Netherlands. …Cybersecurity5 min readCybersecurity5 min read
Chapter8·Aug 26, 2021Patching Intel’s SFP+ driver for ……well, to make things work, honestly. Not for fun nor profit. TL;DR: Intel’s ixgbe-driver sees our Finisar 10Gb SPF+ cards as 1Gb, and therefor loading these drivers will fail. But this patch by Crypt0jan will make them work and spare you his headaches, anger and frustration. You’re welcome. Tested with: …Intel3 min readIntel3 min read
Chapter8·Aug 13, 2021Purple Team War Stories — №3Hacking and defending a hospital, part one — Wow, dear readers. It took us a while to come up with another war story, because we were so busy! Because this Assignment was quite intensive, we have split the tale into several parts. This Assignment was a Mission that took us to an industry that has been — and…Cybersecurity13 min readCybersecurity13 min read