Items Tagged with "Tools"
Chapcrack and CloudCracker Unlock MS-CHAPv2-Based VPN Traffic
September 06, 2012 Added by:Dan Dieterle
A recently released article explains in detail how to crack MS-CHAPv2 communication used in many PPTP based VPNs with a 100% success rate. But that is not all, the protocol is also used in WPA2 enterprise environments for connecting to Radius authentication servers. Ouch...
Comments (0)
OPSEC: Is the Juice Worth the Squeeze?
September 06, 2012 Added by:Joel Harding
In the cyber world there is a process called IGL or Intelligence Gain-Loss. Sometimes deploying a new tool would disclose a capability that the US has to gather intelligence, but sometimes the gain outweighs the loss of a source. Ya gotta ask is the juice worth the squeeze?
Comments (0)
Let Me Out of Your .NET Work: Intro
September 05, 2012 Added by:Rob Fuller
The problem I find with these tools is that they are still straight TCP. I know most networks still allow some ports directly outbound and these tools are still quite valid. During the span between these two tools being released, MrB released a site that listens on all 65k ports...
Comments (0)
Cross-Protocol Chained Pass the Hash for Metasploit
August 29, 2012 Added by:Rob Fuller
Every so often someone writes a Metasploit Module that is pretty epic. July 12th was one such day, and as soon as you do you can start using this (using the example resource file to put a file, cat it out, enum shares available, list files on a share) then psexec all from a single URL being loaded...
Comments (0)
Backtrack 5 r3 List of (Some of the) New Tools and Programs
August 27, 2012 Added by:Dan Dieterle
What are the new utilities included with Backtrack 5r3? I couldn’t find a list, so I decided to make one myself comparing BT5r2 with the latest version. This is not an exhaustive list, but hopefully it will help people see some of the very cool new tools and programs added to Backtrack...
Comments (1)
Which Application Testing is Right for Your Organization?
August 23, 2012 Added by:Brent Huston
Billions of dollars and millions of identities are at stake every day. In the past, security professionals thought firewalls, Secure Sockets Layer, patching, and privacy policies were enough to protect websites from hackers. Today, we know better. Whatever your industry — you should have consistent testing...
Comments (0)
Metasploitable 2.0 pt 4: Cracking Linux Passwords and Pentesting with Grep
August 20, 2012 Added by:Dan Dieterle
Because we had a root shell, we were able to grab the Linux password hashes from the system by simply copying them and pasting them on our local machine. We were then able to use John the Ripper to crack them. We now have passwords to play with...
Comments (0)
Bypassing TrendMicro's Service Protections
August 20, 2012 Added by:Rob Fuller
It's injecting our payload into the service binary and tossing our payload into "rundll32.exe" at run time on the victim. Lets change this so it doesn't do any injection and just executes a binary. That removes the 'injection' piece and hopefully lets us get our shell...
Comments (0)
Open Source Security Tools You Could Be Using
August 17, 2012
Jeff Bardin, a Principal at Treadstone 71 LLC, shared a variety of open source tools that businesses and consumers can use can for “espionage, competitive intelligence, and intellectual property” purposes. Check out this video to find out more about these tools and what they can do...
Comments (0)
Pro-Syrian Hackers Target Activists with Fake Anti-Hacking Tool
August 16, 2012 Added by:Electronic Frontier Foundation
The latest malware campaign plays into users' concerns about protecting their security by offering a fake security tool called AntiHacker, which promises to provide "Auto-Protect & Auto-Detect & Security & Quick scan and analyzing." AntiHacker instead installs a remote access tool called DarkComet RAT...
Comments (0)
Recovering tmpfs from Linux and Android Memory Captures with Volatility
August 14, 2012 Added by:Andrew Case
Tmpfs is interesting from a forensics perspective for a few reasons. The first is that, in a traditional forensics scenario, the investigator expects that he can shut a computer off, images its disk(s), and get back the filesystem at the time of when the computer was running. With tmpfs, this is obviously not true...
Comments (3)
Metasploitable 2.0 Tutorial pt 2: Scanning for Network Services
August 14, 2012 Added by:Dan Dieterle
Okay, we put in 192.168.12.20 and it scanned it and returned the version of Samba that was running on it. But what if we wanted to scan the whole network for just systems running Samba. This is where the beauty of the RHOSTS command comes into play. Instead of just scanning the single host, let’s scan all 256 clients...
Comments (0)
Billions of Hashes per Second with Multiforcer Password Cracker
August 07, 2012 Added by:Dan Dieterle
So what does it take to reach cracking speeds topping 154 Billion hashes per second with multiple hashes? The tool was created to help out pentesters who need to crack passwords, but can not submit hashes obtained to online cracking programs due to auditing agreement restrictions...
Comments (0)
Metasploitable 2.0 Tutorial: Checking for Open Ports with Nmap
August 03, 2012 Added by:Dan Dieterle
I mentioned recently that we would take a closer look at Metasploitable 2.0, the purposefully vulnerable Linux virtual machine used for learning security tactics and techniques. In this intro, we will quickly cover obtaining Metasploitable 2.0 and scanning it for open ports and services...
Comments (0)
DefCon: Dan Tentler Discusses the Power of Shodan
August 02, 2012
Everyone knows routers, switches and servers are connected to the internet - but what else is out there? Has anybody even looked? Some of Dan's Shodan findings were pretty surprising, and these discoveries are an excellent metric for identifying how successful our security campaigns as an industry are...
Comments (0)
Visualize Wi-Fi Networks Using Vistumbler and Google Earth
July 30, 2012 Added by:Dale Rapp
Vistumbler is an excellent free tool that scans for nearby wireless networks within range of your wi-fi adapter. Once Vistumbler finds a wireless network it will display the networks SSID, signal strength, encryption being used, mac address, the networks channel, access point manufacturer, and much more...