Browsing tag

SSH

Tool to perform brute force attacks on ssh, smtp, facebook and Instagram- brut3k1t

As an introduction, brut3k1t is a bruteforce module on the server side that supports dictionary attacks for various protocols, information security experts say. Some of the current protocols that are complete and compatible are: ssh ftp smtp XMPP instagram Facebook There will also be implementations of different protocols and services including Twitter, Facebook and Instagram. The professionals […]

PyCryptoMiner – A New Linux Crypto-miner Botnet Spreading over the SSH Protocol to Mining Monero

Highly Sophisticated Python Script Based Linux Crypto-miner botnet called PyCryptoMiner abusing SSH port and targeting Linux users to mining Monero CryptoCurrency. Its written in python language which is difficult to detect and this botnet crypto-miner uses over 36,000 domains that is related to scams, gambling, and adult services. This Crypto miner mainly focusing on mining Monero and […]

RedLogin – SSH Brute-force Tools

Red Login: SSH Brute-force Tools. Features: High speed and precision CLI ( Console based ) Run the arbitrary command after the attack is successful ( Default ‘Uname -a’ ) Telegram messanger support for sending reports via bot API Usage: Redlogin.exe (Optional) -telegram ==> List of targets ip list ==> List of usernames want to test ==> List of […]

HonSSH – Log all SSH communications between a client and server

HonSSH is a high-interaction Honey Pot solution. HonSSH will sit between an attacker and a honey pot, creating two separate SSH connections between them.  Features Captures all connection attempts to a text file, database or email alerts. When an attacker sends a password guess, HonSSH can automatically replace their attempt with the correct password (spoof_login […]

BothanSpy & Gyrfalcon: CIA Malware To Steal SSH Credentials From Windows & Linux PCs

Short Bytes: WikiLeaks has recently published new documents, revealing new CIA malware implants. The first implant, named BothanSpy, targets SSH client Xshell on Windows machines. The second implant, called Gyrfalcon, targets OpenSSH clients on Linux system. Both implants are capable of stealing user credentials and spying on the session traffic. While Windows users were getting […]

Setting up Linux Encrypted Networking Tool Secure Shell (SSH)

Much like the title explains, SSH or Secure Shell is an encrypted networking tool. Aimed at allowing users of various systems access to a secure log in, SSH easily provides ample security. Fortunately, the setup is also relatively simple. As always, we’ll be utilizing the standard Linux terminal. In this case, our example OS is […]

ssh-audit – SSH Server Auditing

ssh-audit is a tool for ssh server auditing. SSH1 and SSH2 protocol server support; grab banner, recognize device or software and operating system, detect compression; gather key-exchange, host-key, encryption and message authentication code algorithms; output algorithm information (available since, removed/disabled, unsafe/weak/legacy, etc); output algorithm recommendations (append or remove based on recognized software version); output security […]

Advantech ICS Gear Still Vulnerable to Shellshock, Heartbleed

Twice in the past year, security researchers have found and reported critical vulnerabilities in Modbus gateways built by Advantech that are used to connect serial devices in industrial control environments to IP networks. Most recently, independent security researcher Neil Smith found hard-coded SSH keys in the Advantech EKI series of devices, while a year ago […]

Microsoft Debuts Its First Release of Homemade SSH for Windows

Short Bytes: Working to fulfill its promise, Microsoft has released the first build of the Windows Powershell version of SSH tool. The code has been made publicly available on GitHub where developers can modify and improve it. Long back in June, Microsoft revealed its intentions to bring SSH for Windows and contributing to the OpenSSH […]

Sentry – Prevents Brute Force Attacks Against SSH, FTP, SMTP and More

Supporting OS (operating system) FreeBSD Mac OS X Linux (CentOS, Debain, Ubuntu) Download Command: bash || sh export SENTRY_URL=https://raw.githubusercontent.com/msimerson/sentry/master/sentry.pl curl -O $SENTRY_URL || wget $SENTRY_URL || fetch –no-verify-peer $SENTRY_URL perl sentry.pl –update Running sentry.pl –update will: create the sentry database (if needed) install the perl script (if needed) prompt you to edit /etc/hosts.allow (if needed) […]