Quantcast
Channel: BOT24
Browsing all 8064 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

MaltegoVTPublic

A set of Maltego transforms for VirusTotal Public API v2.0. This set has the added functionality of caching queries on a daily basis to speed up resolutions.more...

View Article


Image may be NSFW.
Clik here to view.

UK Bank Tests Out Electronic Wristbands that Use Customers’ Heartbeats for...

Halifax, a bank based in the UK, is testing out electronic wristbands that use customers’ heartbeats for authentication in an effort to make online banking safer.The test relies on the Nymi Band, an...

View Article


Image may be NSFW.
Clik here to view.

Kekeo

kekeo is a little toolbox I have started to manipulate Microsoft Kerberos in C (and for fun) here.....https://github.com/gentilkiwi/kekeo

View Article

Image may be NSFW.
Clik here to view.

PowerShellCookbook

Scripts for the PowerShell Cookbook module here..........https://github.com/LeeHolmes/PowerShellCookbook

View Article

Image may be NSFW.
Clik here to view.

Hacking SQL Server Procedures – Part 4: Enumerating Domain Accounts

n SQL Server, security functions and views that allow SQL logins to enumerate domain objects should only be accessible to sysadmins. However, in this blog I’ll show how to enumerate Active Directory...

View Article


Image may be NSFW.
Clik here to view.

Metasploit and MSGRPC

I wanted to automate connecting to MSGRPCmore here..........http://carnal0wnage.attackresearch.com/2015/03/metasploit-and-msgrpc.html

View Article

Image may be NSFW.
Clik here to view.

Paper: Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS

AbstractDespite recent high-profile attacks on the RC4 algorithm in TLS, its usage is still running atabout 30% of all TLS traffic. This is attributable to the lack of practicality of the existing...

View Article

Image may be NSFW.
Clik here to view.

Exploit Kits and Malvertising: A Troublesome Combina

In the past few weeks we’ve noticed a problematic pattern developing: the increasing use of exploit kits in malvertising. In particular, zero-day exploits (usually seen first in targeted attacks) are...

View Article


Image may be NSFW.
Clik here to view.

The Andromeda/Gamarue botnet is on the rise again- Attackers use complex...

Attacks carried out with documents pepped up with macros seem to become in vogue again. G DATA’s security experts have analyzed several cases within the last weeks, in which active content in documents...

View Article


Image may be NSFW.
Clik here to view.

Equation: The Death Star of Malware Galaxy

"Houston, we have a problem"One sunny day in 2009, Grzegorz Brzęczyszczykiewicz1 embarked on a flight to the burgeoning city of Houston to attend a prestigious international scientific conference. As a...

View Article

Image may be NSFW.
Clik here to view.

Paper: Protecting Data on Smartphones and Tablets from Memory Attacks

AbstractSmartphones and tablets are easily lost or stolen. This makes themsusceptible to an inexpensive class of memory attacks, such as coldbootattacks, using a bus monitor to observe the memory bus,...

View Article

Image may be NSFW.
Clik here to view.

WPScan black box WordPress vulnerability scanner 2.7 released!

You can find the download here.......https://github.com/wpscanteam/wpscan/releases/tag/2.7and the changelog  which includes what is new like:Detects version in release date formatCopyrights updatedWP...

View Article

Image may be NSFW.
Clik here to view.

Volatility Plugins

Pluginsuninstallinfo.py - Dumps HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall from memoryprefetch.py - scan memory for prefecth files and dump filename and timestampsidxparser.py - scan...

View Article


Image may be NSFW.
Clik here to view.

SANS: TMon - Internet Threat Monitor

TMon is a small tool which monitors the current online threat levels. It has a green, yellow, red level indicator, and information about top 10 attacked ports and countries. It also provides...

View Article

Image may be NSFW.
Clik here to view.

Nimbus Protocol Enumeration With Nmap

CA Unified Infrastructure Management, previously known as Nimsoft, is a powerful IT monitoring solution that allows for management of numerous servers across a Nimsoft domain. This solution...

View Article


Image may be NSFW.
Clik here to view.

ApkProtect

Pay through the shield of the first generation of open source security reinforcement planAPK security reinforcement depth security protection services for mobile applications, you can put a layer of...

View Article

Image may be NSFW.
Clik here to view.

2015-03-16 - EXAMPLES OF NUCLEAR EK PUSHING KELIHOS

I've noticed a recent trend on Threatglass, where Nuclear EK is pushing what EmergingThreats is identifying as Kelihos malware. Kelihos is a well-publicized botnet, easy to search for on Google.more...

View Article


Image may be NSFW.
Clik here to view.

Analyzing Queries on a Honeypot Name Server for Better DNS Log Quality

Honeypots are an easy and popular way to get statistics on the “Internet noise.” Getting more knowledge on Internet noise gives you more insight into what is out there and is one of the sources that...

View Article

Image may be NSFW.
Clik here to view.

Microsoft: Improperly Issued Digital Certificates Could Allow Spoofing

Microsoft is aware of an improperly issued SSL certificate for the domain “live.fi” that could be used in attempts to spoof content, perform phishing attacks, or perform man-in-the-middle attacks. It...

View Article

Image may be NSFW.
Clik here to view.

Cisc0wn - Cisco SNMP Script

Cisco SNMP enumeration, brute force, config downloader and password cracking script.Tested and designed to work against Cisco IOS Switches and Routers.more...

View Article
Browsing all 8064 articles
Browse latest View live