ooniprobe – Network Interference Detection Tool

OONI, the Open Observatory of Network Interference, is a global observation network which aims is to collect high quality data using open methodologies, using Free and Open Source Software (FL/OSS) to share observations and data about the various types, methods, and amounts of network tampering in the world. “The Net interprets censorship as damage and […]

Hackers Using Legitimate Windows Tools for Hiding Malware and Evade the Detection

Malware Authors are always using many sophisticated techniques to spreading advance persistent threats and Hiding Malware to evade the current defense mechanism such as hiding advance Malware in a legitimate process. In this case, malware using some trusted system process to inject the malicious code into the victim’s machine without being caught by security tools. […]

What Is ARP Spoofing? — Attacks, Detection, And Prevention

Spoofing is often defined as imitating (something) while exaggerating its characteristic features for comic effect. Not in the real world but also in the computer networking world, spoofing is a common practice among notorious users to intercept data and traffic meant for a particular user. Though there are a lot of spoofing attacks known in […]

FIN7 Spear Phishing Attacks Now Aim At Avoiding Detection

The FIN7 hacking group has been targeting organizations from the retail sector of late, and Security Research Team from ICEBERG was busy tracking the activities of FIN7. According to their findings, FIN7 is exploiting victims in the retail industry using various phishing techniques and continuously adapting phishing documents to evade detection. After compromising the Point […]

Open Source Invalid Traffic Detection: Nameles

Nameles provides an easy to deploy, scalable IVT detection and filtering solution that is proven to detect at a high level of accuracy ad fraud and other types of invalid traffic such as web scraping. Comprehensive DetectionDetects display, video and in-app based ad fraud, web scraping and other forms of invalid traffic from both mobile […]

psad – Intrusion Detection and Log Analysis with iptables

The Port Scan Attack Detector psad is a lightweight system daemon written in is designed to work with Linux iptables/ip6tables/firewalld firewalling code to detect suspicious traffic such as port scans and sweeps, backdoors, botnet command and control communications, and more. It features a set of highly configurable danger thresholds (with sensible defaults provided), verbose alert […]

RHAPIS – Network Intrusion Detection Systems Simulator

Network intrusion detection systems simulator. RHAPIS provides a simulation environment through which user is able to execute any IDS operation. Basic Usage Type HELP in the console in order to see the available commands. RHAPIS is written in Lua language. You need to have installed Lua in order to run RHAPIS. The first commands that […]

Nameles – Open Source Invalid Traffic Detection

Nameles provides an easy to deploy, scalable IVT detection and filtering solution that is proven to detect at a high level of accuracy ad fraud and other types of invalid traffic such as web scraping. Comprehensive DetectionDetects display, video and in-app based ad fraud, web scraping and other forms of invalid traffic from both mobile […]

Nzyme – Wireless Monitoring, Intrusion Detection & Forensics

Nzyme collects 802.11 management frames directly from the air and sends them to a Graylog (Open Source log management) setup for WiFi IDS, monitoring, and incident response. It only needs a JVM and a WiFi adapter that supports monitor mode. Think about this like a long-term (months or years) distributed Wireshark/tcpdump that can be analyzed and filtered […]

Bashware lets malware evade detection by exploiting Windows 10′ Linux Shell

Bashware Technique Can Exploit Windows Subsystem for Linux (WSL) to Hide Malware Making 400 Million Computers Vulnerable. Security firm Checkpoint’s researchers Gal Elbaz and Dvir Atias have discovered a new attack method that allows hackers hide all the known malware and bypass even the best security solutions. The attack technique has been dubbed as Bashware […]

OLE flaw lets malware infected PowerPoint files evade antivirus detection

Microsoft PowerPoint is the latest platform used by cyber criminals for delivering malware. Reportedly, there is a vulnerability in the Windows Object Linking, and Embedding (OLE) interface that can be exploited to avoid detection by antivirus software. Malicious threat actors are using the OLE interface flaw to distribute infected Microsoft Office documents. According to Trend […]

SSL/TLS Client Fingerprinting for Malware Detection

A JA3 hash represents the fingerprint of an SSL/TLS client application as detected via a network sensor or device, such as Bro or Suricata. This allows for simple and effective detection of client applications such as Chrome running on OSX (JA3=94c485bca29d5392be53f2b8cf7f4304) or the Dyre malware family running on Windows (JA3=b386946a5a44d1ddcc843bc75336dfce) or Metasploit’s Meterpreter running on […]

Avoiding Anti-Virus Detection with Veil-Evasion

Veil-Framework is defined in Ryan Gandrud’s blog as, For ethical hackers, evading AV software is a significant detail of success. If an anti-virus program is alerted of an attack, there is a higher likelihood of presenting further weaknesses. Even more, the execution itself would be pointless due to the exploit’s detectability. git clone https://github.com/Veil-Framework/Veil-Evasion.git cd […]

Malware Author Inflates Backdoor Trojan With Junk Data Hoping to Avoid Detection

A malware coder is injecting megabytes of junk data inside his malicious payloads, hoping to avoid detection by some antivirus solutions or delay investigations of infosec professionals. Known only as “123”, this malware coder has been active since 2015, when he was first spotted deploying the XXMM malware. His activity falls in the category of […]

Meterpreter Payload Detection – Tool for detecting Meterpreter in memory like IPS-IDS and Forensics tool

Meterpreter_Payload_Detection.exe tool for detecting Meterpreter in memory like IPS-IDS and Forensics tool DOWNLOAD Meterpreter_Payload_Detection https://github.com/DamonMohammadbagher/Meterpreter_Payload_Detection CREDITS: DamonMohammadbagher  Install Notes Download Meterpreter_Payload_Detection Compile C#code or unzip release_v1.0.0.4 Run Meterpreter_Payload_Detection.exe If you liked this software please consider leaving a star and folking the software from github. C# code Author : Damon Mohammadbagher Meterpreter Signature Authors : Rohan […]

Sophisticated Android Based Banking Trojan “BankBot” Reach Play Store Which Avoid Detection by Google Security Scanner

[jpshare]Specifically Target to infect  Android  Trojan entered into Google Play store which give more pain to Google Security team to find this  malware “Android.BankBot.149.origin” . According to the Dr.Web Once this Malware Reached to the Android  Device , it force to user and grant the Admin privilege  and also Delete the Icon in the Home […]

How to Perform Open Port Scanning and OS Detection Using Nmap

Today in this tutorial we will have a look at how we can use Nmap (Which stands for Network Mapper )in  Kali Linux to scan for open ports. To do this, we will use OS detection. Nmap is an open source tool that can be used for network exploration and security auditing. This comes standard […]

LOG-MD – Log Malicious Detection tool

LOG-MD was designed for Windows based systems to audit log and advanced audit policy settings and guide users to enable and configure the audit settings to help push and encourage moving security and detection forward.  LOG-MD was also designed to gather the artifacts from malicious activity, referred to as “Malicious Discovery”, faster than the standard methods […]