Browsing category

Pentest

Bad Rabbit Ransomware Uses Leaked ‘EternalRomance’ NSA Exploit

A new widespread ransomware worm, known as “Bad Rabbit,” that hit over 200 major organisations, primarily in Russia and Ukraine this week leverages a stolen NSA exploit released by the Shadow Brokers this April to spread across victims’ networks. Earlier it was reported that this week’s crypto-ransomware outbreak did not use any National Security Agency-developed […]

Security Flaw in LG IoT Software Left Home Appliances Vulnerable

LG has updated its software after security researchers spotted a flaw that allowed them to gain control of devices like refrigerators, ovens, dishwashers, and even access the live feed from a robot vacuum cleaner. The vulnerability, dubbed HomeHack, potentially affects millions of LG SmartThinQ home appliances. It was uncovered by researchers at Check Point, who […]

Google Play Protect System Failed To Succeed First Security Test

Google’s new Play Protect security system did not success first real-world tests, and the system was rated dead in an experiment conducted by independent German lab AV-TEST, the product was able to stop only 65.8 percent of brand-new malware, and only 79.2 percent of 30-days-old malware. Most of the 20 other products scored results in […]

sqlmate – Tool Which Will Do What you Always Expected from SQLmap

There are some features that we think SQLMap should have. Like finding admin panel of the target, better hash cracking etc. If you think the same, SQLMate is for you. What it does? Feed it a SQL injection dork via –dork option and it will find vulnerable sites for you. After that, it will try […]

jQuery hacked: Site was hit, but not the library

The official blog of jQuery—most popular JavaScript library used by millions of websites—has been hacked by some unknown hackers, using the pseudonym “str0ng” and “n3tr1x.” jQuery’s blog website (blog.jquery.com) runs on WordPress—the world’s most popular content management system (CMS) used by millions of websites. While there is no evidence yet if the server (code.jquery.com) that […]

Ethereum phishing attack that earns $15K in two hours

Wesley Neelen (security researcher) has received a phishing email that seems to be from the legal online Ethereum wallet site Myetherwallet.com. Cybercriminals are trying to get the login credentials for all type of accounts through phishing emails. By tricking possible victims to enter their username and password on a fake website (legitimate-looking), the attackers are […]

ZeroDoor – A Script Written Lazily For Generating Cross-Platform Backdoors

A script written lazily for generating reverse shell backdoors on the go whenever you need without any hassle for your daily penetration needs . These backdoors are not James Bond high tech stuff but rather simple ones to prevent over exploitation and limited capabilities Once you generate the payload somehow execute on the concerned system […]

Reptile – LKM Linux Rootkit

Reptile is a LKM rootkit for evil purposes. If you are searching stuff only for study purposes, see the demonstration codes. Features Give root to unprivileged users Hide files and directories Hide files contents Hide processes Hide himself Boot persistence Heaven’s door – A ICMP/UDP port-knocking backdoor Client to knock on heaven’s door ? Install […]

Entire Europe is being affected by the BadRabbit Ransomware

According to various cybersecurity firms, the growing virus is dubbed “BadRabbit” and is a form of ransomware that bolts down machines and requires bitcoin from administrators. Screenshots of the infections posted to social media revealed BadRabbit asking for 0.05BTC for decryption, which is similar to £215 ($280). Reports show that the Kiev Metro, Odessa naval […]

Pixel 2 XL Displays are burning up already

News reported the issue, revealing a picture of a Pixel 2 XL with some fierce image remembrance around the navigation bar. Shortly after, numerous other reports of burn-in started popping up, and you can add News review unit to the list of assumed devices. You can see the persistent navigation bar burn-in below on our […]

Intel and Lenovo are trying to build UAF and U2F authentication into their devices

81 percent of data breaks last year involved weak, default or stolen passwords, and phishing attacks have advanced 65 percent year-on-year. Protecting online privacy, status and all types of data is more significant than ever demanding more robust security applications. Lenovo and Intel today published the first PC-ready built-in authentication steps to support users’ online […]

DUHK (Don’t Use Hard-coded Keys) Attack Recovers Encryption Keys & Reveals VPN Connections

DUHK (Don’t Use Hard-coded Keys) is a new crypto implementation attack that could enable attackers to obtain secret keys that secure VPN (Virtual Private Network) connections, web browsing sessions and read encrypted communications crossing over VPN connections. The encrypted data could contain sensitive business data, login credentials, credit card information and other private data. The […]

LeakManager – A Tool To Help You Manage Your Leaks

A Tool To Help You Manage Your Leaks Install sudo apt-get install mongodb-org screen pip3 install -r requeriments.txt Usage screen -S leakManager hug -f index.py -p 1337 OR gunicorn index:__hug_wsgi__ -b 0.0.0.0:1337 OR uwsgi –http 0.0.0.0:1337 –wsgi-file index.py –callable __hug_wsgi__ ctrl + a + d Change user/passwd edit etc/LeakManager.conf file MassInsert CSV Format email,username,password,database CSV […]

Four Darknet Markets Simultaneously Go Offline

In an astonishing hit to the Darknet, four of it’s most popular marketplaces all went down at the same time. Marketplaces involved include Tochka, Wall Street, Trade Route and Dream Market. It has been suspected, according to details of the event, these markets that went down, wasn’t due to government involvement. Users believe the sites […]

OWASP ZAP 2.6.0 – Penetration Testing Tool for Testing Web Applications

The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers*. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. Its also a great tool for experienced pentesters to use […]

Russia Fights to Keep Founder of BTC-e from Extradition to United States

In a tale as old as time, the United States and Russia are at it again. Alexander Vinnik, the founder of a cryptocurrency exchange website called BTC-e, was recently ordered to be extradited to the U.S. at their government’s request. However, Vinnik, who is a citizen of Russia, chose to fight against the extradition request […]

Exploit Pack – Penetration Testing Framework

Exploit Pack has been designed by an experienced team of software developers and exploit writers to automate processes so penetration testers can focus on what’s really important. The threat. This blend of software engineers and subject matter experts provides an unique advantage by combining technical know-how with true insight into the problem set, resulting in […]

srum-dump – A Forensics Tool to Convert the Data in the Windows srum

srum-dump This program will create an excel spreadsheet containing forensics artifacts contained the SRUM (System Resource Utilization Manager) database. The program can be run with no input and it will prompt you for each of the needed arguments. The program requires two inputs. The first is an SRUM database. The SRUM database is usually Windowssystem32sruSRUDB.dat. […]

DNS over TLS is being developed for the next Android Update

DNS over TLS is a protocol where DNS inquiries will be encrypted to the equivalent level as HTTPS and therefore a DNS can’t actually log or see the websites you visit. This utilizes TLS, or Transport Layer Security, to perform this encryption. This does need the DNS you are using to have DNS over TLS […]

The Value of Bitcoin has surpassed $6000 for the first time

The cryptocurrency hit an all-time high of $6,147.07 just a time after forcing through the $6,000 mark, according to data from application website CoinDesk. Much of the rise can be related to another upcoming split in bitcoin apprehended as a “fork”. This will lead to the discovery of a new cryptocurrency called bitcoin gold. Holders […]

Machine Learning Software created by Google is replicating itself

Now, Google has declared that AutoML has defeated the human AI engineers at their own game by setting machine-learning software that’s more effective and powerful than the best human-designed systems. An AutoML system recently broke a record for classifying perceptions by their content, scoring 82 percent. While that’s a relatively simple task, AutoML also beat […]