Integrit - File Verification System

Integrit – File Verification System

Integrit is a file verification system, a simple yet secure alternative to products like tripwire. It has a small memory footprint, uses up-to-date cryptographic algorithms, and has features that make sense (like including the MD5 checksum of newly generated databases in the report). The Integrit system detects intrusion by detecting when trusted files have been […]

Tags: , , , , , , , ,

Posted in: Countermeasures, Security Software | Add a Comment
Critical Remote Root Zero-Day In FireEye Appliances

Critical Remote Root Zero-Day In FireEye Appliances

So FireEye doesn’t have a particularly good reputation in the security community, it’s generally not handled responsible disclosure well and it’s even taken a security firm (ERNW) to court over a vulnerability disclosure. And now there’s another critical remote root zero-day in FireEye appliances – which is scary, as these are high end devices protecting […]

Tags: , , , , , , ,

Posted in: Countermeasures, Exploits/Vulnerabilities | Add a Comment
Pupy - Open-Source Remote Administration Tool AKA RAT

Pupy – Open-Source Remote Administration Tool AKA RAT

Pupy is an open-source remote administration tool (RAT), that is cross platform and has an embedded Python interpreter, allowing its modules to load Python packages from memory and transparently access remote Python objects. Pupy can communicate using different transports and have a bunch of cool features & modules. On Windows, Pupy uses reflective dll injection […]

Tags: , , , , , , , ,

Posted in: Hacking Tools | Add a Comment
Latest Update Patches 78 CVE-classified Flash Security Vulnerabilities

Latest Update Patches 78 CVE-classified Flash Security Vulnerabilities

So as a rule, in 2015 running Adobe Flash is already pretty scary – but the latest patch release covers 78 CVE-classified Flash security vulnerabilities. That’s not scary, that’s terrifying. By now you kinda expect flaws in Flash, it’s just a given. But 78 CVE-classified vulnerabilities in one patch release? That’s just insane, that’s worse […]

Tags: , , , , , , , ,

Posted in: Exploits/Vulnerabilities | Add a Comment
SprayWMI - Unicorn PowerShell Injection Mass Spray Tool

SprayWMI – PowerShell Injection Mass Spray Tool

SprayWMI is a method for mass spraying Unicorn PowerShell injection to CIDR notations. It’s an alternative to traditional, ‘noisy’ tools which leave something on the disk like PsExec, smbexec, winexe and so on. These tools have worked really well, however, they are fairly noisy creating a service and touching disk which will trigger modern defense […]

Tags: , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Hacking Tools, Windows Hacking | Add a Comment
VTech Hacked - Over 7 Million Records Leaked

VTech Hack – Over 7 Million Records Leaked (Children & Parents)

And once again, the messy technical flaws of a company are being exposed with the recent VTech hack – it’s really not looking good for them with account passwords ‘secured’ with unsalted md5 hashes and all kinds of private information being leaked includes parents addresses, kids birthdays, genders, secret answers and associated meta-data (IP addresses, […]

Tags: , , , , , , , ,

Posted in: Database Hacking, Exploits/Vulnerabilities, Privacy | Add a Comment
LSAT - Linux Security Auditing Tool

LSAT – Linux Security Auditing Tool

Linux Security Auditing Tool (LSAT) is a post install security auditing tool. It is modular in design, so new features can be added quickly. It checks inetd entries and scans for unneeded RPM packages. It is being expanded to work with Linux distributions other than Red Hat, and checks for kernel versions. It (for now) […]

Tags: , , , , , , , ,

Posted in: Linux Hacking, Security Software | Add a Comment
Zarp - Network Attack Tool

Zarp – Network Attack Tool

Zarp is a network attack tool centred around the exploitation of local networks. This does not include system exploitation, but rather abusing networking protocols and stacks to take over, infiltrate, and knock out. Sessions can be managed to quickly poison and sniff multiple systems at once, dumping sensitive information automatically or to the attacker directly. […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment
Dell Backdoor Root Cert - There

Dell Backdoor Root Cert – What You Need To Know

So a few days ago the Internet exploded with chatter about a Dell backdoor root cert AKA a rogue root CA, almost exactly like what happened with Lenovo and Superfish. It started with this Reddit thread – Dell ships laptops with rogue root CA, exactly like what happened with Lenovo and Superfish in the Technology […]

Tags: , , , , , , , , , ,

Posted in: Cryptography, Privacy | Add a Comment
Rekall - Memory Forensic Framework

Rekall – Memory Forensic Framework

Rekall is a memory forensic framework that provides an end-to-end solution to incident responders and forensic analysts. From state of the art acquisition tools, to the most advanced open source memory analysis framework. It strives to be a complete end-to-end memory forensic framework, encapsulating acquisition, analysis, and reporting. In particular Rekall is the only memory […]

Tags: , , , , , , , , ,

Posted in: Forensics | Add a Comment