Browsing category

Pentest

Apple iPhone X is Providing Developers access to Facial Data

Apple’s privacy signs do not spread to the thousands of app developers who will gain access to facial data in order to increase entertainment features for iPhone X customers, such as closing a three-dimensional mask to their face for a selfie or letting a video game style mirror the player’s real-world facial expressions. Apple allows […]

Hackers are using Google search results to spread banking Trojan

Cybercriminals decided to use the Search Engine Optimization (SEO) to make their malicious links more widespread in the search results, allowing them to gain more victims with the Zeus Panda banking Trojan. This Zeus Panda group determined to use a group of hacked websites to insert keywords in new pages or hide the keywords inside […]

Telnet IoT Honeypot – Python Telnet Honeypot For Catching Botnet Binaries

This project implements a python telnet server trying to act as a honeypot for IoT Malware which spreads over horribly insecure default passwords on telnet servers on the internet. Other than https://github.com/stamparm/hontel or https://github.com/micheloosterhof/cowrie (examples), which provides full (via chroot) or simulated behaviour of a linux system this honeypots goal is just to collect statistics […]

HouseProxy – HTTP proxy focused on block phishing URL’s

Protect your parents from phishing, HTTP proxy focused on block phishing URL’s Install git clone https://github.com/mthbernardes/HouseProxy.git cd HouseProxy/ pip install -r requeriments.txt Config Edit etc/HouseProxy.conf to change de default user and password Create a entry in your DNS to house.proxy Usage $ hug -f index.py $ sudo echo “localhost house.proxy” >> /etc/hosts Set the house.proxy:3128 […]

Trump’s Organization got compromised by Hackers 4 years Ago

In 2013, Hackers apparently gained access to the Trump Organization’s domain booking account and created at least 250 website subdomains that cybersecurity specialists refer to as “shadow” subdomains. Each one of these shadow Trump subdomains guided to a Russian IP address, implying that they were hosted at these Russian addresses. Every website domain is connected […]

CryptoShuffler malware made over $150,000 worth of Bitcoin

The CryptoShuffler malware has been discovered by security researchers from Kaspersky Lab, cybercriminals are using this malware to steal cryptocurrencies from the victim’s wallet by replacing their address with its own in the devices. The malware remains idly on victims’ machines, waiting for a Bitcoin transaction then substitute any string that seems like a Bitcoin […]

nullinux – SMB null Session Identification and Enumeration Tool

nullinux is an internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and users through SMB null sessions. Unlike many of the enumeration tools out there already, nullinux can enumerate multiple targets at once and when finished, creates a users.txt file of all users found on […]

The Value of Bitcoin has surpassed $6,800

The cryptocurrency has had a bullish streak completely the week following the CME’s statement that it will introduce bitcoin expectations contracts. According to data from CoinDesk, the virtual money reached an all-time high of $6,994.01 at about 3:04 a.m. ET Thursday. After nearing $7,000, the price withdrew slightly but held above the $6,900 mark. A surge in the digital […]

Phishruffus – Intelligent Threat Hunter And Phishing Servers

Phishruffus is a tool designed to identify threats and malicious DNS servers on the Internet that are used for the illicit practice of bank phishing. Usage: $ pip install -r requirements.txt $ ./phishruffus.py –listdns dns_servers.txt –timeout 5 Download Phishruffus Download Best WordPress Themes Free Download Download Best WordPress Themes Free Download Download WordPress Themes Free […]

Apple has released Mac OS 10.13.1 that fixes WiFi KRACKS Vulnerability

Critically, both OS updates address the KRACK Wi-Fi vulnerability for any devices. It is a dangerous vulnerability in the WPA2 Wi-Fi assurance standard that allowed hostile actors to perform a key reinstallation and receive to Wi-Fi traffic for keys and other personal data, among other things. Both also include numerous new Unicode 10.0 emoji. They include the “I love you” hand […]

Diamorphine – LKM Rootkit for Linux Kernels 2.6.x/3.x/4.x

Diamorphine is a LKM rootkit for Linux Kernels 2.6.x/3.x/4.x Features When loaded, the module starts invisible; Hide/unhide any process by sending a signal 31; Sending a signal 63(to any pid) makes the module become (in)visible; Sending a signal 64(to any pid) makes the given user become root; Files or directories starting with the MAGIC_PREFIX become […]

TROMMEL – Sift Through Directories of Files to Identify Indicators That May Contain Vulnerabilities

TROMMEL sifts through directories of files to identify indicators that may contain vulnerabilities. TROMMEL identifies the following indicators related to: Secure Shell (SSH) key files Secure Socket Layer (SSL) key files Internet Protocol (IP) addresses Uniform Resource Locator (URL) email addresses shell scripts web server binaries configuration files database files specific binaries files (i.e. Dropbear, […]

Number of Launches at SpaceX has doubled over the past year

SpaceX has begun, on average, about 1.5 times per period during this year. From that view, the company’s 16th launch of 2017 may not appear all that spectacular. After all, posting something like the Koreasat-5A business communications satellite to a geostationary transfer orbit is growing old hat for the new space company. However, Monday’s launch […]

Lynis 2.5.7 – Security Auditing Tool for Unix/Linux Systems

We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core functions of Lynis. These changes are the next of simplification improvements we made. There is a risk of breaking your existing configuration. Lynis is an open source security auditing tool. Used by system administrators, security […]

cve-search – Perform Local Searches For Known Vulnerabilities

cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilitate search and processing of CVEs. The main objective of the software is to avoid doing direct and public lookup into the public CVE databases. This is usually faster to do local lookups and limits […]

Websites need to ask permission to extract fingerprints from the user in Firefox 58

Canvas fingerprinting relies on websites meaning able to receive data from HTML canvas details calmly. In future, Firefox users will be required to give their approval before that wrenching can take place, just as users of the Tor Browser are. The community in behavior to Tor Browser is no chance. That privacy-first browser is really […]

After Equifax Breach Woman’s ID got stolen for 15 Times

“I don’t remember if my data has been sold to the dark web or where this goes,” she said. “I keep getting letters from Kohl’s, from Macy’s, from Old Navy saying, ‘Thank you for your request.’” But she says she’s nevermore applied for credit from any of those areas. Instead, Van Fleet and her attorney […]