MaltegoVTPublic
A set of Maltego transforms for VirusTotal Public API v2.0. This set has the added functionality of caching queries on a daily basis to speed up resolutions.more...
View ArticleUK Bank Tests Out Electronic Wristbands that Use Customers’ Heartbeats for...
Halifax, a bank based in the UK, is testing out electronic wristbands that use customers’ heartbeats for authentication in an effort to make online banking safer.The test relies on the Nymi Band, an...
View ArticleKekeo
kekeo is a little toolbox I have started to manipulate Microsoft Kerberos in C (and for fun) here.....https://github.com/gentilkiwi/kekeo
View ArticlePowerShellCookbook
Scripts for the PowerShell Cookbook module here..........https://github.com/LeeHolmes/PowerShellCookbook
View ArticleHacking SQL Server Procedures – Part 4: Enumerating Domain Accounts
n SQL Server, security functions and views that allow SQL logins to enumerate domain objects should only be accessible to sysadmins. However, in this blog I’ll show how to enumerate Active Directory...
View ArticleMetasploit and MSGRPC
I wanted to automate connecting to MSGRPCmore here..........http://carnal0wnage.attackresearch.com/2015/03/metasploit-and-msgrpc.html
View ArticlePaper: Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS
AbstractDespite recent high-profile attacks on the RC4 algorithm in TLS, its usage is still running atabout 30% of all TLS traffic. This is attributable to the lack of practicality of the existing...
View ArticleExploit Kits and Malvertising: A Troublesome Combina
In the past few weeks we’ve noticed a problematic pattern developing: the increasing use of exploit kits in malvertising. In particular, zero-day exploits (usually seen first in targeted attacks) are...
View ArticleThe Andromeda/Gamarue botnet is on the rise again- Attackers use complex...
Attacks carried out with documents pepped up with macros seem to become in vogue again. G DATA’s security experts have analyzed several cases within the last weeks, in which active content in documents...
View ArticleEquation: The Death Star of Malware Galaxy
"Houston, we have a problem"One sunny day in 2009, Grzegorz Brzęczyszczykiewicz1 embarked on a flight to the burgeoning city of Houston to attend a prestigious international scientific conference. As a...
View ArticlePaper: Protecting Data on Smartphones and Tablets from Memory Attacks
AbstractSmartphones and tablets are easily lost or stolen. This makes themsusceptible to an inexpensive class of memory attacks, such as coldbootattacks, using a bus monitor to observe the memory bus,...
View ArticleWPScan black box WordPress vulnerability scanner 2.7 released!
You can find the download here.......https://github.com/wpscanteam/wpscan/releases/tag/2.7and the changelog which includes what is new like:Detects version in release date formatCopyrights updatedWP...
View ArticleVolatility Plugins
Pluginsuninstallinfo.py - Dumps HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall from memoryprefetch.py - scan memory for prefecth files and dump filename and timestampsidxparser.py - scan...
View ArticleSANS: TMon - Internet Threat Monitor
TMon is a small tool which monitors the current online threat levels. It has a green, yellow, red level indicator, and information about top 10 attacked ports and countries. It also provides...
View ArticleNimbus Protocol Enumeration With Nmap
CA Unified Infrastructure Management, previously known as Nimsoft, is a powerful IT monitoring solution that allows for management of numerous servers across a Nimsoft domain. This solution...
View ArticleApkProtect
Pay through the shield of the first generation of open source security reinforcement planAPK security reinforcement depth security protection services for mobile applications, you can put a layer of...
View Article2015-03-16 - EXAMPLES OF NUCLEAR EK PUSHING KELIHOS
I've noticed a recent trend on Threatglass, where Nuclear EK is pushing what EmergingThreats is identifying as Kelihos malware. Kelihos is a well-publicized botnet, easy to search for on Google.more...
View ArticleAnalyzing Queries on a Honeypot Name Server for Better DNS Log Quality
Honeypots are an easy and popular way to get statistics on the “Internet noise.” Getting more knowledge on Internet noise gives you more insight into what is out there and is one of the sources that...
View ArticleMicrosoft: Improperly Issued Digital Certificates Could Allow Spoofing
Microsoft is aware of an improperly issued SSL certificate for the domain “live.fi” that could be used in attempts to spoof content, perform phishing attacks, or perform man-in-the-middle attacks. It...
View ArticleCisc0wn - Cisco SNMP Script
Cisco SNMP enumeration, brute force, config downloader and password cracking script.Tested and designed to work against Cisco IOS Switches and Routers.more...
View Article