Skip to main content

Posts

Showing posts from August, 2020

OSIF: An Open Source Facebook Information Gathering Tool

About OSIF    OSIF is an accurate Facebook account information gathering tool, all sensitive information can be easily gathered even though the target converts all of its privacy to (only me), sensitive information about residence, date of birth, occupation, phone number and email address. For your privacy and security, i don't suggest using your main account! OSIF Installtion    For Termux users, you must install python2 and git first: pkg update upgrade pkg install git python2    And then, open your Terminal and enter these commands:    If you're Windows user, follow these steps: Install Python 2.7.x from Python.org first. On Install Python 2.7.x Setup , choose Add python.exe to Path . Download OSIF-master zip file . Then unzip it. Open CMD or PowerShell at the OSIF folder you have just unzipped and enter these commands: pip install -r requirements.txt python osif.py Before you use OSIF, make sure that: Turn off your VPN before using this tool. Do not overuse this tool. i

Russian Arrested After Offering $1 Million To U.S. Company Employee For Planting Malware

Hackers always find a way in even if there's no software vulnerability to exploit. The FBI has arrested a Russian national who recently traveled to the United States and offered $1 million in bribe to an employee of a targeted company for his help in installing malware into the company's computer network manually. Egor Igorevich Kriuchkov, 27-year-old, entered the United States as a tourist via The Hacker News This article is the property of Tenochtitlan Offensive Security. Verlo Completo --> https://tenochtitlan-sec.blogspot.com More articles Hacker Hardware Tools Hacking Tools For Pc Pentest Box Tools Download Hacker Tools Linux World No 1 Hacker Software Hacker Tools For Windows Pentest Tools Online Hack Tools For Windows Hack Rom Tools Pentest Tools Framework Hack Tools Github Hack Tools Download How To Make Hacking Tools Hak5 Tools Pentest Tools Github Kik Hack Tools Hacking Tools Download Termux Hacking Tools 2019 Hack Tools Download Pentest Tools R

Medusa: A Speedy, Parallel And Modular Login Brute-forcing Tool

About Medusa    Medusa is a speedy, parallel, and modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application:    Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently.    Flexible user input. Target information (host/user/password) can be specified in a variety of ways. For example, each item can be either a single entry or a file containing multiple entries. Additionally, a combination file format allows the user to refine their target listing.    Modular design. Each service module exists as an independent .mod file. This means that no modifications are necessary to the core application in order to extend the supported list of services for brute-forcing.    Multiple protocols supported. Many services are currently supported (e.g. SMB, HTTP, MS-SQL, POP3, RDP, SSHv2, among ot

CTF: FluxFingers4Future - Evil Corp Solution

For this years hack.lu CTF I felt like creating a challenge. Since I work a lot with TLS it was only natural for me to create a TLS challenge. I was informed that TLS challenges are quite uncommon but nevertheless I thought it would be nice to spice the competition up with something "unusual". The challenge mostly requires you to know a lot of details on how the TLS record layer and the key derivation works. The challenge was only solved by one team (0ops from China) during the CTF. Good job! So let me introduce the challenge first. The Challenge You were called by the incident response team of Evil-Corp, the urgently need your help. Somebody broke into the main server of the company, bricked the device and stole all the files! Nothing is left! This should have been impossible. The hacker used some secret backdoor to bypass authentication. Without the knowledge of the secret backdoor other servers are at risk as well! The incident response team has a full packet capture of t