Browsing tag

Firewall

New malware attack turns Elasticsearch databases into DDoS botnet

The malware attack involves two stages including one in which existing cryptomining malware is removed. The IT security researchers at Trend Micro have discovered a new malware campaign targeting Elasticsearch databases in the wild. The campaign takes advantage of unprotected or publicly available Elasticsearch databases, infect them with malware before turning them into botnet zombies […]

A Simple Look At An Efficient Enterprise MDR

In general, corporate security policies define the information assets needed to continue corporate activities. Detecting threats to this information asset is the role of detection and response system. In addition, reducing or avoiding the risk against detected threats plays a role of prevention, a big word today in the age of left and right hacking […]

WebMap – Nmap Web Dashboard And Reporting

A Web Dashbord for Nmap XML Report Usage You should use this with docker, just by sending this command: $ mkdir /tmp/webmap $ docker run -d –name webmap -h webmap -p 8000:8000 -v /tmp/webmap:/opt/xml rev3rse/webmap $ # now you can run Nmap and save the XML Report on /tmp/webmap $ nmap -sT -A -T4 -oX […]

TimpDoor Android malware turning devices into hidden proxies

Android users in North America are the current target of TimpDoor malware. The McAfee Mobile Research team has identified an active phishing campaign that traps users by sending an SMS to influence them on downloading and installing an Android malware app TimpDoor. It is a fake voice-message app that allows attackers to infect the devices and […]

XXRF Shots – Tool to Test SSRF Vulnerabilities

What is SSRF vulnerability? Server Side Request Forgery (SSRF) is a type of vulnerability class where attacker sends crafted request from a vulnerable web application, including the unauthorised access to the internal resources behind the firewall which are inaccessible directly from the external network. Installation git clone https://github.com/ariya/phantomjs.git cd phantomjs chmod +x build.py ./build.py Usage […]

Firecall – Automate SSH Communication With Firewalls, Switches, Etc.

Automate SSH communication with firewalls, switches, etc. Description These scripts are designed to automate sending commands to a Cisco ASA firewall. The intended purpose here is to eliminate the need to manually log in to a firewall to make changes. This code can be run directly via command line or it can be incorporated into […]

Firewalls: What They Are & Why You Need Them

There are some phrases that you hear bandied about, and you think that you know what they are. You have a basic understanding and that suits your current needs. Firewall is one of these words. You will be familiar with it already, but do you really know what one is? In its simplest terms, a […]

DefenseMatrix – Full security solution for Linux Servers

Full security solution for Linux Servers. SCUTUM is to be added into DefenseMatrix Project After consideration, SCUTUM, as a nice firewall controller, is to be added into DefenseMatrix. It will soon replace the iptables controller and arptables controller in DefenseMatrix. Expect lots of improvements. What is DefenseMatrix? DefenseMatrix helps individuals and organizations who use Linux […]

New IoT Botnet DoubleDoor Bypass Firewall to Drop Backdoor

A new Internet of Things (IoT) botnet campaign dubbed as DoubleDoor has been discovered by NewSky Security, which uses two exploits for bypassing authentication procedures on victim devices and also nullify additional security features. In this campaign, attackers can easily take full control of the targeted devices despite the user has enabled authentication or added […]

CFC – Linux Centralized Firewall Control

Centralized firewall control provides a centralized way to manage the firewall on multiple servers or loadbalancers running iptables. This way you can quickly allow/block/del/search abuse ranges etc. with one command on several servers. It accesses those servers through ssh. It supports both IPv4 and IPv6. Tested on Debian 6.x / 7.x / 8.x / 9.x, […]

CISCO ISSUES NEW PATCHES FOR CRITICAL FIREWALL SOFTWARE VULNERABILITY

Cisco has released new patches for a critical vulnerability in its Adaptive Security Appliance software after further investigation revealed additional attack vectors. The company first announced the vulnerability, CVE-2018-0101, on Jan. 29. It received a Common Vulnerability Scoring System base score of 10.0, the highest possible, and was initially discovered by Cedric Halbronn from NCC Group. “After broadening […]

Chiron – An IPv6 Security Assessment Framework with Advanced IPv6 Extension Headers Manipulation Capabilities

Chiron is an IPv6 Security Assessment Framework, written in Python and employing Scapy. It is comprised of the following modules: • IPv6 Scanner • IPv6 Local Link • IPv4-to-IPv6 Proxy • IPv6 Attack Module • IPv6 Proxy All the above modules are supported by a common library that allows the creation of completely arbitrary IPv6 header chains, fragmented or not. […]

SimpleWall – Simple tool to configure Windows Filtering Platform (WFP)

Simple tool to configure Windows Filtering Platform (WFP) which can configure network activity on your computer. The lightweight application is less than a megabyte, and it is compatible with Windows Vista and higher operating systems. You can download either the installer or portable version. For correct working, need administrator rights. Features: Simple interface without annoying […]

habu – Network Hacking Toolkit

Habu is to teach (and learn) some concepts about Python and Network Hacking. These are basic functions that help with some tasks for Ethical Hacking and Penetration Testing. Most of them are related with networking, and the implementations are intended to be understandable for who wants to read the source code and learn from that. […]

What To Do If A Particular Website Is Not Opening On The Internet?

Short Bytes: There can be many reasons why you aren’t able to access a particular website on the internet. These include the issues with the web browser, website, internet service provider, bad DNS server, etc. You can fix these issues using Tor, VPN, custom DNS, etc. The situation becomes very irritating when you’re not able […]

Raptor WAF – Web Application Firewall Using DFA

Raptor WAF is a simple web application firewall made in C, using KISS principle, to make poll use select() function, is not better than epoll() or kqueue() from *BSD but is portable, the core of match engine using DFA to detect XSS, SQLi and path traversal. Short video: WAF stands for Web Application Firewall. It […]

Are You Ready for Firewall Protection for Your Car?

The Internet-connected cars will require firewall protection and some companies are already providing it The Internet has invaded most of the things in our world and its scope is broadening day by day. This time, it is our vehicles that will be receiving a digital boost. The reason is that cars are already being connected […]