Skip to main content

Posts

Showing posts from June, 2020

ShodanEye: Collect Infomation About All Devices Connected To The Internet With Shodan

About ShodanEye    This tool collects all information about all devices that are directly connected to the internet with the specified keywords that you enter. This way you get a complete overview.    Here you can read the latest article about Shodan Eye:  Shodan Eye Ethical Hacking Tool Release    The types of devices that are indexed can vary enormously: from small desktops, refrigerators to nuclear power plants and everything in between. You can find everything using "your own" specified keywords. Examples can be found in a file that is attached:    The information obtained with this tool can be applied in many areas, a small example: Network security, keep an eye on all devices in your company or at home that are confronted with internet. Vulnerabilities. And so much more.    For additional data gathering, you can enter a Shodan API key when prompted. A Shodan API key can be found here .  Shodan Eye Ethical Hacking Tool Release    Before we start the year 2020, today ther

Security Drift – The Silent Killer

Global spending on cybersecurity products and services is predicted to exceed $1 trillion during the period of five years, between 2017 to 2021, with different analysts predicting the Compound Annual Growth Rate (CAGR) at anywhere between 8 to 15%. It is not surprising to see this growth in spending, which is primarily driven by the evolving sophistication and volume of attacks as well as the via The Hacker News This article is the property of Tenochtitlan Offensive Security. Verlo Completo --> https://tenochtitlan-sec.blogspot.com Related news Hacking Names Pentest Example Report Hacking Games Online Pentest Lab Setup Hacker Prank Pentestmonkey Sql Injection Pentest Checklist Hacker Kevin Mitnick Pentest Lab Setup Hacking Software Pentest Free Is Hacking Illegal How To Pentest A Network Pentest Distro

Files Download Information

After 7 years of Contagio existence, Google Safe Browsing services notified Mediafire (hoster of Contagio and Contagiominidump files) that "harmful" content is hosted on my Mediafire account. It is harmful only if you harm your own pc and but not suitable for distribution or infecting unsuspecting users but I have not been able to resolve this with Google and Mediafire. Mediafire suspended public access to Contagio account. The file hosting will be moved. If you need any files now, email me the posted Mediafire links (address in profile) and I will pull out the files and share via other methods. P.S. I have not been able to resolve "yet" because it just happened today, not because they refuse to help.  I don't want to affect Mediafire safety reputation and most likely will have to move out this time. The main challenge is not to find hosting, it is not difficult and I can pay for it, but the effort move all files and fix the existing links on the Blogpost, and t

Sslmerge - Tool To Help You Build A Valid SSL Certificate Chain From The Root Certificate To The End-User Certificate

Is an open source tool to help you build a valid SSL certificate chain from the root certificate to the end-user certificate. Also can help you fix the incomplete certificate chain and download all missing CA certificates. How To Use It's simple: # Clone this repository git clone https://github.com/trimstray/sslmerge # Go into the repository cd sslmerge # Install ./setup.sh install # Run the app sslmerge -i /data/certs -o /data/certs/chain.crt symlink to bin/sslmerge is placed in /usr/local/bin man page is placed in /usr/local/man/man8 Parameters Provides the following options: Usage: sslmerge <option|long-option> Examples: sslmerge --in Root.crt --in Intermediate1.crt --in Server.crt --out bundle_chain_certs.crt sslmerge --in /tmp/certs --out bundle_chain_certs.crt --with-root sslmerge -i Server.crt -o bundle_chain_certs.crt Options: --help show this message --debug displays information on the screen (debug mode) -i, --

Leo's Noob

I would like to send a salve to my friend noob at Rivendel in Brazilian company hahaha Related word Hacking Quotes Pentest Hardware Hacker Language Hacker Code Hacking The Art Of Exploitation Pentest Practice Sites Pentest Stages Hacking Growth Pentest App Hacking Page Pentest

How tO Secure Yourself From Evil Twin Attack

How To Secure Yourself From Evil Twin Attack ? Hello, in this article you are going to learn how to secure yourself from getting hacked using evil twin attack. 1) Do not connect to any public networks, anyone can sniff your data while you are on a public network.Evil Twin attack will be performed as a public network, so wherever possible restrict connecting to any open or public networks mainly if it wifi name is same as your wifi name 2) When your internet connection suddenly stops working, you might be under DOS attack using evil twin attack, just restart the router and the hacker need to restart the attack and as it takes some time.  Maybe they leave it or continue some other time  3) Running a VPN to ensure that any browsing and transmitted data is done through an encrypted tunnel that cannot be easily snooped.  4) Do not always rely on the name of the network, make sure it is a legitimate and trusted network or not.  Thank You for Reading, Hope It's Useful @£V£

DOWNLOAD XSSTRIKE – ADVANCED XSS EXPLOITATION SUITE

XSSTRIKE – ADVANCED XSS EXPLOITATION SUITE XSStrike is really advanced XSS exploitation and detection suite, which contains a very powerful XSS fuzzer and provides no false positive results using fuzzy matching. XSStrike is the first XSS scanner that generates its own payloads. Download xsstrike and test it out. It also has built in an artificial intelligent enough to detect and break out of various contexts. FEATURES: Powerful Fuzzing Engine Context Breaking Intelligence AI Payload Generation GET & POST Methods Support Cookie Support WAF Fingerprinting Handcrafted Payloads to Filter and WAF Evasion Hidden Parameter Discovery Accurate Results DOWNLOAD XSSTRIKE – ADVANCED XSS EXPLOITATION SUITE Click here  to download xsstrike. Related articles Pentest Magazine Pentest Basics Pentest Tools Framework Hacking Apps Hacker Anonymous Hacking Games Online Hacking Tutorials Pentest Questions

Tricks To Bypass Device Control Protection Solutions

Preface As I wrote in a previous blog post, I had an engagement last year where my task was to exfiltrate data from a workstation on some sort of storage media. The twist in that task was Lumension Sanctuary Device Control , and the version was 4.3.2, but I am not sure how newer version work and this seems to be a more general problem with device control solution, for example with Symantec products . But what is a device control solution? In short, they audit I/O device use and block the attempts to use unauthorized devices. This includes hardware such as USB, PS/2, FireWire, CD/DVD so basically every I/O port of a computer. In my opinion, these are pretty good things and they offer a better looking solution than de-soldering the I/O ports from the motherboards or hot-gluing them, but on the other hand, they can be bypassed. Bypass OK, so what is the problem? Well the way these  device control solutions work is that they load a few kernel drivers to monitor the physical ports of the m

$$$ Bug Bounty $$$

What is Bug Bounty ? A bug bounty program, also called a vulnerability rewards program (VRP), is a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs. Bug bounty programs are often initiated to supplement internal code audits and penetration tests as part of an organization's vulnerability management strategy. Many software vendors and websites run bug bounty programs, paying out cash rewards to software security researchers and white hat hackers who report software vulnerabilities that have the potential to be exploited. Bug reports must document enough information for for the organization offering the bounty to be able to reproduce the vulnerability. Typically, payment amounts are commensurate with the size of the organization, the difficulty in hacking the system and how much impact on users a bug might have. Mozilla paid out a $3,000 flat rate bounty for bugs that fit its criteria, while Facebook has given out as much as $20,000 for a

DirBuster: Brute Force Web Directories

"DirBuster is a multi threaded java application designed to brute force directories and files names on web/application servers. Often is the case now of what looks like a web server in a state of default installation is actually not, and has pages and applications hidden within. DirBuster attempts to find these. However tools of this nature are often as only good as the directory and file list they come with. A different approach was taken to generating this. The list was generated from scratch, by crawling the Internet and collecting the directory and files that are actually used by developers! DirBuster comes a total of 9 different lists (Further information can be found below), this makes DirBuster extremely effective at finding those hidden files and directories. And if that was not enough DirBuster also has the option to perform a pure brute force, which leaves the hidden directories and files nowhere to hide! If you have the time ;) " read more... Download: https://sour

Wirelurker For OSX, iOS (Part I) And Windows (Part II) Samples

PART II Wirelurker for Windows (WinLurker) Research:  Palo Alto Claud Xiao: Wirelurker for Windows Sample credit: Claud Xiao PART I Research: Palo Alto Claud Xiao  WIRELURKER: A New Era in iOS and OS X Malware Palo Alto |Claud Xiao - blog post  Wirelurker Wirelurker Detector  https://github.com/PaloAltoNetworks-BD/WireLurkerDetector Sample credit: Claud Xiao Download Download Part I Download Part II Email me if you need the password List of files List of hashes  Part II s+«sìÜ 3.4.1.dmg 925cc497f207ec4dbcf8198a1b785dbd apps.ipa 54d27da968c05d463ad3168285ec6097 WhatsAppMessenger 2.11.7.exe eca91fa7e7350a4d2880d341866adf35 使用说明.txt 3506a0c0199ed747b699ade765c0d0f8 libxml2.dll c86bebc3d50d7964378c15b27b1c2caa libiconv-2_.dll 9c8170dc4a33631881120a467dc3e8f7 msvcr100.dll bf38660a9125935658cfa3e53fdc7d65 libz_.dll bd3d1f0a3eff8c4dd1e993f57185be75 mfc100u.dll f841f32ad816dbf130f10d86fab99b1a zlib1.dll c7d4d685a0af2a09cbc21cb474358595 │   apps.ipa │   σ╛«σìÜ 3.4.1.dmg │ └───WhatsAp