- Hakin9: E-magazine offering in-depth looks at both attack and defense techniques and concentrates on difficult technical issues.
- Hacked Gadgets: A resource for DIY project documentation as well as general gadget and technology news.
- Packet Storm: Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers.
- KitPloit: Leading source of Security Tools, Hacking Tools, CyberSecurity and Network Security.
- Phrack Magazine: Digital hacking magazine.
- HackRead: HackRead is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance, and Hacking News with full-scale reviews on Social Media Platforms.
- The Hacker News: The Hacker News — most trusted and widely-acknowledged online cyber security news magazine with in-depth technical coverage for cybersecurity.
- Exploit DB: An archive of exploits and vulnerable software by Offensive Security. The site collects exploits from submissions and mailing lists and concentrates them in a single database.
- Metasploit: Find security issues, verify vulnerability mitigations & manage security assessments with Metasploit. Get the worlds best penetration testing software now.
Tuesday, June 30, 2020
Top 9 Websites to Learn How to Hack Like a Pro 2018
Wednesday, June 10, 2020
Cain And Abel
"Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort. It covers some security aspects/weakness present in protocol's standards, authentication methods and caching mechanisms; its main purpose is the simplified recovery of passwords and credentials from various sources, however it also ships some "non standard" utilities for Microsoft Windows users." read more...
Related news
Tishna: An Automated Pentest Framework For Web Servers, Web Applications To Web Security
Tishna is complete automated pentest framework for web servers, application layer to web security.
Tishna was tested on: Kali Linux, Parrot Security OS, Black Arch, Termux, Android Led TV.
Tishna's interface: Tishna has 62 options with full automation and can be use for web security swiss knife.
Tishna's installation: First, boot your Kali Linux or Parrot Security OS up. Then open Terminal and enter these commands
Appeared:
- Cyber Space (Computer Security).
- Terror Security (Computer Security).
- National Cyber Security Services.
Brief Introduction
- Tishna is useful in Banks, Private Organisations and Ethical hacker personnel for legal auditing.
- It serves as a defense method to find as much as information possible for gaining unauthorised access and intrusion.
- With the emergence of more advanced technology, cybercriminals have also found more ways to get into the system of many organizations.
- Tishna software can audit, servers and web behaviour.
- Tishna can perform Scanning & Enumeration as much as possible of target.
- It's first step to stop cyber criminals by securing your Servers and Web Application Security.
- Tishna is false positive free, when there is something it will show no matter what, if it is not, it will give blank results rather error.
Developer
Support to the coder
You can sponsor and support via BTC.
The bitcoin address: 3BuUYgEgsRuEra4GwqNVLKnDCTjLEDfptu
Related articles
- Pentest+ Vs Ceh
- Pentest Web Application
- Pentest Ftp
- Hacker
- Hacking
- Hacking Jacket
- Hackerrank Sql
- Pentest Plus
- Pentestgeek
- Pentest Software
- Hacking Wifi
- Hacking The Art Of Exploitation
- Hacker Google
- Pentest Plus
- How To Pentest A Website With Kali
- Pentest Training
- Pentest Bootcamp
- Hacking Quotes
- Hacking 3Ds
The Pillager 0.7 Release
For now check out Version 0.7.. Named searches and Data searches via external config files are now functioning properly as well as other bugs fixed along the way... Drop this in a BT5 VM and make sure you have your DB python stuff installed per the help docs and you should be good to go. If you are looking to use oracle you are going to have to install all the oracle nonsense from oracle or use a BT4r2 vm which has most of the needed drivers minus cxoracle which will need to be installed.
http://consolecowboys.org/pillager/pillage_0.7.zip
Ficti0n$ python pillager.py
[---] The Database Pillager (DBPillage) [---]
[---] CcLabs Release [---]
[---] Authors: Ficti0n, [---]
[---] Contributors: Steponequit [---]
[---] Version: 0.7 [---]
[---] Find Me On Twitter: ficti0n [---]
[---] Homepage: http://console-cowboys.blogspot.com [---]
Release Notes:
--Fixed bugs and optimized code
--Added Docstrings
--Fixed Named and Data searches from config files
About:
The Database Pillager is a multiplatform database tool for searching and browsing common
database platforms encountered while penetration testing. DBPillage can be used to search
for PCI/HIPAA data automatically or use DBPillage to browse databases,display data.
and search for specified tables/data instances.
DBpillage was designed as a post exploitation pillaging tool with a goal of targeted
extraction of data without the use of database platform specific GUI based tools that
are difficult to use and make my job harder.
Supported Platforms:
--------------------
-Oracle
-MSSQL
-MYSQL
-PostGreSQL
Usage Examples:
************************************************************************
For Mysql Postgres and MsSQL pillaging:
---------------------------------------
python dbPillage -a [address] -d [dbType] -u [username] -p [password]
For Oracle pillaging you need a SID connection string:
------------------------------------------------------
python dbPillage-a [address]/[sid] -d [dbType] -u [username] -p [password]
Grab some hashes and Hipaa specific:(Default is PCI)
------------------------------------
python dbPillage -a [address] -d [dbType] -u [username] -p [password] --hashes -s hipaa
Drop into a SQL CMDShell:
-------------------------
python dbpillage.py -a [address] -d [dbType] -u [username] -p [password] -q
Config file specified searches:
-------------------------------
Search for data Items from inputFiles/data.txt:
python dbpillage.py -a [address] -d [dbType] -u [username] -p [password] -D
Search for specific table names from inputFiles/tables.txt:
python dbpillage.py -a [address] -d [dbType] -u [username] -p [password] -N
Switch Options:
---------------------
-# --hashes = grab database password hashes
-l --limit = limit the amount of rows that are searched or when displaying data (options = any number)
-s --searchType = Type of data search you want to perform (options:pci, hipaa, all)(PCI default)
-u --user = Database servers username
-p --pass = Password for the database server
-a --address = Ipaddress of the database server
-d --database = The database type you are pillageing (options: mssql,mysql,oracle,postgres)
-r --report = report format (HTML, XML, screen(default))
-N --nameSearch = Search via inputFiles/tables.txt
-D --dataSearch = Targeted data searches per inputFiles/data.txt
-q --queryShell = Drop into a SQL CMDshell in mysql or mssql
Prerequisites:
-------------
python v2 (Tested on Python 2.5.2 BT4 R2 and BT5 R3 - Oracle stuff on BT4r2 only unless you install the drivers from oracle)
cx_oracle (cx-oracle.sourceforge.net)
psycopg2 (initd.org/psycopg/download/)
MySQLdb (should be on BT by default)
pymssql (should be on BT by default)
More articles
HOW TO ROOT A SERVER? – SERVER ROOTING
HOW TO ROOT A SERVER?
1 – With local Root.
2 – With SQL by reading the same important files on it root password.
3 – With exploit on software (Buffer Overflow).
OK, let's back to work.
HOW TO SEARCH LOCAL ROOT?
1. Local.C: which are not ready.
2. Local: ready to use.
HOW TO GET ROOT ACCESS?
net. After that open your terminal if you are under Linux or CMD if you are under Windows. I will explain only Linux, and for Windows, its all the same.
4 – chmod 777 local.c
5 – now to change the local-root from local.c > local
6 – chmod 777 local
7 – ./local to local rootwork
8 – su
then see your id uid=0(root) gid=0(root) groups=0(root)
Getting UID=0 means, u had got root privileges and hence can do a variety of stuff on the remote server say Mass deface, dump database, redirect sites, change content, etc etc.
Continue reading
- Hacking Box
- Pentest +
- Pentest Box
- Hacking The Art Of Exploitation
- Pentest Security
- Pentest Tools Github
- Pentest+ Vs Ceh
- Pentest Tools Free
- Pentest With Kali Linux
- Pentest Aws
- Pentest Web Application
- Hacking Jailbreak
- Pentest Dns
- Pentesting Tools
- Hacking Language
- Hacking Websites
- Hacking Programs
- Pentest With Kali
Tuesday, June 9, 2020
Video Archives Of Security Conferences And Workshops
Just some links for your enjoyment
List of security conferences in 2014
Video archives:
AIDE (Appalachian Institute of Digital Evidence)
Blackhat
Botconf
Bsides
- BSides DC 2014
- BSides Chicago 2014
- BSides Nashville 2014
- BSides Augusta 2014
- BSides Huntsville 2014
- BSides Las Vegas 2014
- BSidesDE 2013
- BSidesLV 2013
- BSidesRI 2013
- Bsides Cleveland 2012 BsidesCLE
- Bsides Las Vegas 2012
Defcon
- Defcon: All Conference CDs and DVDs with Presentation PDF files (updated 2014 for DEF CON 22): Torrent
- Defcon Wireless Village 2014
- Defcon: all other
Digital Bond's S4x14
Circle City Con
GrrCON Information Security Summit & Hacker Conference
- 2011 https://www.youtube.com/
playlist?list= PL70E48008B3E43448 - 2012 https://www.youtube.com/
playlist?list= PL1F1B29D6E0D89A5F - 2013 https://www.youtube.com/
playlist?list= PL3UAg9Zuj1yK5nePRJCq1Y3gVLkoq Vj9a - 2014 https://www.youtube.com/
playlist?list= PL3UAg9Zuj1yLmemIKw- domjg5UkbN-pLc
Hack3rcon
Shmoocon
- Adrian Crenshaw. Intro to Darknets: Tor and I2P Workshop
- Installing the I2P darknet software in Linux
- Adrian Crenshaw. Installing Nessus on Kali Linux and Doing a Credentialed Scan
- Intro to Metasploit Class at IU Southeast
- Louisville ISSA Web PenTesting Workshop
- Louisville Nmap Class 2014
- ISSA Kentuckiana - RESTful Web Services - Jeremy Druin - @webpwnized
- Introduction to HTML Injection (HTMLi) and Cross Site Scripting (XSS) Using Mutillidae
- Introduction to Pen Testing Simple Network Management Protocol (SNMP) - ISSA Kentuckiana workshop 9 - Jeremy Druin
- Liam Randall- Shmoocon 2013: Bro IDS and the Bro Network Programming Language
- Basics of using sqlmap - ISSA Kentuckiana workshop 8 - Jeremy Druin
- SQL Server Hacking from ISSA Kentuckiana workshop 7 - Jeremy Druin
- Introduction to buffer overflows from ISSA KY workshop 6 - Jeremy Druin
- The potential impact of Software Defined Networking on security - Brent Salisbury
- Into to Metasploit - Jeremy Druin
- Traceroute and Scapy Jeremy Druin @webpwnized
- Basic Setup of Security-Onion: Snort, Snorby, Barnyard, PulledPork, Daemonlogger
- NetworkMiner Professional for Network Forensics
More articles
New Printers Vulnerable To Old Languages
35 year old bugs features
The key point here is that we exploited PostScript and PJL interpreters. Both printer languages are ancient, de-facto standards and still supported by almost any laser printer out there. And as it seems, they are not going to disappear anytime soon. Recently, we got the chance to test a $2,799 HP PageWide Color Flow MFP 586 brand-new high-end printer. Like its various predecessors, the device was vulnerable to the following attacks:- Capture print jobs of other users if they used PostScript as a printer driver; This is done by first infecting the device with PostScript code
- Manipulate printouts of other users (overlay graphics, introduce misspellings, etc.) by infecting the device with PostScript malware
- List, read from and write to files on the printers file system with PostScript as well as PJL functions; limited to certain directories
- Recover passwords for PostScript and PJL credentials; This is not an attack per se but the implementation makes brute-force rather easy
- Launch denial of Service attacks of various kinds:
- PostScript based infinite loops
- PostScript showpage redefinition
- Disable jobmedia with proprietary PJL
- Set the device to offline mode with PJL
Now exploitable from the web
All attacks can be carried out by anyone who can print, which includes:- Web attacker:
- A malicious website that uses XSP
- Network access:
- Wireless access:
- Apple Air Print (enabled by default)
- Cloud access:
- Google Cloud Print (disabled by default)
- Physical access:
- Printing via USB cable or USB drive
- Potentially NFC printing (haven't tested)
Conclusion: Christian Slater is right
PostScript and PJL based security weaknesses have been present in laser printers for decades. Both languages make no clear distinction between page description and printer control functionality. Using the very same channel for data (to be printed) and code (to control the device) makes printers insecure by design. Manufacturers however are hard to blame. When the languages were invented, printers used to be connected to a computer's parallel or serial port. No one probably thought about taking over a printer from the web (actually the WWW did not even exist, when PostScript was invented back in 1982). So, what to do? Cutting support for established and reliable languages like PostScript from one day to the next would break compatibility with existing printer drivers. As long as we have legacy languages, we need workarounds to mitigate the risks. Otherwise, "The Wolf" like scenarios can get very real in your office…Continue reading
How To Switch From 32-Bit Windows 10 To 64-Bit Windows 10
Make sure Windows 10 64-bit is compatible with your PC
- Use the Windows key + I keyboard shortcut to open the Settings app.
- Click System.
- Click About.
- Under System type, you will see two pieces of information: if it says 32-bit operating system, x64-based processor, then it means that your PC is running a 32-bit version of Windows 10 on a 64-bit processor. If it says 32-bit operating system, x86-based processor, then your computer doesn't support Windows 10 (64-bit).
Make Sure Your Processor is 64-bit Capable
You'll see one of three things here:
- 64-bit operating system, x64-based processor. Your CPU does support 64-bit and you already have the 64-bit version of Windows installed.
- 32-bit operating system, x86-based processor. Your CPU does not support 64-bit and you have the 32-bit version of Windows installed.
- 32-bit operating system, x64-based processor. Your CPU supports 64-bit, but you have the 32-bit version of Windows installed.
Make Sure Your PC's Hardware Has 64-bit Drivers Available