Browsing tag

Attack

Sigurlx – A Web Application Attack Surface Mapping Tool

  sigurlx a web application attack surface mapping tool, it does …: Categorize URLs URLs’ categories: > endpoint > js {js} > style {css} > data {json|xml|csv} > archive {zip|tar|tar.gz} > doc {pdf|xlsx|doc|docx|txt} > media {jpg|jpeg|png|ico|svg|gif|webp|mp3|mp4|woff|woff2|ttf|eot|tif|tiff} Next, probe HTTP requests to the URLs for status_code, content_type, e.t.c Next, for every URL of category endpoint with […]

Kube-Alien – Tool To Launches Attack on K8s Cluster from Within

  This tool launches attack on k8s cluster from within. That means you already need to have an access with permission to deploy pods in a cluster to run it. After running the kube-alien pod it tries to takeover cluster’s nodes by adding your public key to node’s /root/.ssh/authorized_keys file by using this image https://github.com/nixwizard/dockercloud-authorizedkeys […]

SKA – Simple Karma Attack (Evil Twin Attack)

  SKA allows you to implement a very simple and fast karma attack. You can sniff probe requests to choice the fake AP name or, if you want, you could insert manually the name of the AP (evil twin attack). When the target has connected to your WLAN you could active the HTTP redirection and […]

W3Brute – Automatic Web Application Brute Force Attack Tool

w3brute is an open source penetration testing tool that automates attacks directly to the website’s login page. w3brute is also supported for carrying out brute force attacks on all websites. Features Scanner: w3brute has a scanner feature that serves to support the bruteforce attack process. this is a list of available scanners: automatically detects target […]

How to do reconnaissance attack over your target the correct way

A team of information security experts explains that a domain name represents some kind of label for IP addresses on the Internet. Since some companies move their infrastructure to the cloud, we must find business servers in the set of IP addresses in the cloud, such as finding a needle in a haystack. This is […]

How to make a Subdomain Takeover Attack

A team of information security experts tells us that sub-domain acquisition vulnerabilities happen whenever a subdomain points to a service (for example, GitHub pages, Heroku, etc.) that has been removed or removed. This may allow an attacker to configure a page in the service that was being used and direct his page to that subdomain. […]

WiFite 2 – Automated Wireless Attack Tool

Wifite is a Python script for auditing wireless networks which aims to be the “set it and forget it” wireless auditing tool.   What’s new in Wifite 2? Lots of files instead of “one big script”. Cleaner process management — No longer leaves processes running in the background. UX: Target access points are refreshed every second […]

shimit – A tool that implements the Golden SAML attack

shimit is a python tool that implements the Golden SAML attack. python .shimit.py -h usage: shimit.py [-h] -pk KEY [-c CERT] [-sp SP] -idp IDP -u USER [-reg REGION] [–SessionValidity SESSION_VALIDITY] [–SamlValidity SAML_VALIDITY] -n SESSION_NAME -r ROLES -id ARN [-o OUT_FILE] [-l LOAD_FILE] [-t TIME] ██╗ ███████╗██╗ ██╗██╗███╗ ███╗██╗████████╗ ██╗ ██╗ ██╔╝ ██╔════╝██║ ██║██║████╗ ████║██║╚══██╔══╝ ██╔╝ […]

Cyber security and strategy

Cybersecurity is a practice that ensures that all the information, confidentiality and availability are intact and not compromised with. It depends on how you keep them safe and in case of any adversaries, how to recover that information. Having said that one should keep in mind how the hackers and those involved in developing malicious […]

PiKarma – Detects Wireless Network Attacks

Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points) Working Principle for PiKarma Collects all the packets from Wireless Network. (Probe Response) Analyses all the packets in real time. If PiKarma finds more than one SSID info from unique mac address in Probe Response; Logs the activity […]

2018 cybersecurity trends and predictions

The year 2017 was quite exciting as we came across several new things from Ransomware to IoT malware and more. Several industries found themselves gripped at the mercy of the hackers and criminals. The vulnerabilities in Windows which was made known to us by these same hackers. Anyway, we have all had our share of […]

SNIFFlab – Create Your Own MITM Test Environment

Essentially it’s a WiFi hotspot that is continually collecting all the packets transmitted across it. All connected clients’ HTTPS communications are subjected to a “Man-in-the-middle” attack, whereby they can later be decrypted for analysis What is SNIFFLab MITM Test Environment In our environment, dubbed Snifflab, a researcher simply connects to the Snifflab WiFi network, is […]

Striker – Offensive Information And Vulnerability Scanner

Striker is an offensive information and vulnerability scanner. Features Just supply a domain name to Striker and it will automatically do the following for you: Check and Bypass Cloudflare Retrieve Server and Powered by Headers Fingerprint the operating system of Web Server Detect CMS (197+ CMSs are supported) Launch WPScan if target is using WordPress […]

The New iOS 11.1 Wi-Fi hacked again

Just when the Apple released 11.1 as a patch to address the crack in WiFi and other exploits, here comes the news that it has been hacked again. It was during Trend Micro’s Zero Day Initiative they revealed this news, but have yet to give the details of the exploits. There were several exploits discovered, […]

Ethereum phishing attack that earns $15K in two hours

Wesley Neelen (security researcher) has received a phishing email that seems to be from the legal online Ethereum wallet site Myetherwallet.com. Cybercriminals are trying to get the login credentials for all type of accounts through phishing emails. By tricking possible victims to enter their username and password on a fake website (legitimate-looking), the attackers are […]

DUHK (Don’t Use Hard-coded Keys) Attack Recovers Encryption Keys & Reveals VPN Connections

DUHK (Don’t Use Hard-coded Keys) is a new crypto implementation attack that could enable attackers to obtain secret keys that secure VPN (Virtual Private Network) connections, web browsing sessions and read encrypted communications crossing over VPN connections. The encrypted data could contain sensitive business data, login credentials, credit card information and other private data. The […]

Cyber Attack Kept Secret from Public by Microsoft for Years

Not the first news of this nature but it was very recently discovered that Microsoft suffered a cyber attack from a group of very intelligent hackers way back in 2013. Cyber attacks happen but to think a major attack like this one can be kept secret for long is just plain ridiculous. Nevertheless, Microsoft did […]

BaRMIe – Java RMI Enumeration And Attack Tool

BaRMIe is a tool for enumerating and attacking Java RMI (Remote Method Invocation) services. RMI services often expose dangerous functionality without adequate security controls, however RMI services tend to pass under the radar during security assessments due to the lack of effective testing tools. In 2008 Adam Boulton spoke at AppSec USA (YouTube) and released […]

New Serious Flaw Called KRACK Attack Allow to Break WPA2 WiFi Protocol in Any WiFi Modem

Highly Secured WiFi Protocol “WPA2” Critical Weakness allows to Break any WiFi Network using Key Reinstallation Attack (KRACK Attack) and this flow is given an Ability to Attacker to crack any of Victims WiFi Modem within The Range of Network. Wi-Fi Protected Access II (WPA2) is security protocol and security certification program developed by the Wi-Fi Alliance to secure wireless […]

BaRMIe – Java RMI Enumeration & Attack Tool

BaRMIe is a tool for enumerating and attacking Java RMI (Remote Method Invocation) services. RMI services often expose dangerous functionality without adequate security controls, however RMI services tend to pass under the radar during security assessments due to the lack of effective testing tools. In 2008 Adam Boulton spoke at AppSec USA (YouTube) and released […]