LATEST ARTICLES

Real Intelligence Threat Analytics Tool

What is Here RITA is an open source framework for network traffic analysis. The framework ingests Bro/Zeek Logs in TSV format, and currently supports the following major features: Beaconing Detection: Search for signs of beaconing behavior in and out of your networkDNS Tunneling Detection Search for signs...

AES & DES ENCRYPTION AND DECRYPTION …

AES ENCRYPTION AND DECRYPTION import base64 from Crypto import Random from Crypto.Cipher import AES inp=raw_input("Enter the raw input : "); key=raw_input("Enter anything to generate key nEnter exact 32 digits key or press enter for auto generate : "); if key=='': key=Random.new().read(32) bs=32 #...

zero-day –Adobe releases out-of-band security update for newly discovered Flash

Adobe issued an out of band updated today for Experience Manager, Experience Manager Forms, Adobe Acrobat and Reader and Download Manager covering 81 CVEs with many rated as critical. The company stated that none of the reported issues have been spotted in the wild and noted updates are available for all the products.

BIOS Emulator For Unicorn Engine — unicorn-bios

About Basic BIOS emulator/debugger for Unicorn Engine. Written to debug the XEOS Operating System boot sequence. Usage: Usage: unicorn-bios BOOT_IMG Options: --help / -h: Displays help. --memory / -m:...

Targeted Evil Twin Attacks Against WPA2-Enterprise Networks– Eaphammer v1.9.0

Overview EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. It is designed to be used in full scope wireless assessments and red team engagements. As such, focus is placed on providing an easy-to-use interface that can be leveraged to execute powerful wireless attacks with minimal manual configuration.

BOTNET THREAT TO INTERNET SECURITY…

Research paper by VISHAL CHAUHAN (SECURITY ANALYST) ABSTRACT Botnet uses commands and control channels (C&C).To initiate attack botnet uses IRC and HTTP protocols.It's a big challenge to detect and prevent botnet attacks due to the Commands & Control channels.In botnet a malicious website is created which captures the details...

POSTENUM-clean, nice and easy tool for basic/advanced privilege escalation techniques.

Postenum Postenum is a clean, nice and easy tool for basic/advanced privilege escalation vectors/techniques. Postenum tool is intended to be executed locally on a Linux box. Be more than a normal user. be the ROOT. USE ./postenum.sh ./postenum.sh...

Implementation_Of_10_Registry_Key_EditsOrChanges

·      How to modify the Windows Registry The first thing I will discuss before we delve into the deep is how to modify the Windows Registry and the precautions you should take. In order to modify the registry, you will need to open the Windows Registry Editor. To do so, use the key combination Windows...

How Does Tor Works…

The Tor network is a group of volenteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along...

CVE-2019-14287 !!! Sudo Flaw Lets Linux Users Run Commands As Root Even When They’re Restricted

Description... When sudo is configured to allow a user to run commands as an arbitrary user via the ALL keyword in a Runas specification, it is possible to run commands as root by specifying the user ID -1 or 4294967295. Sudo versions affected...