AWSBucketDump – AWS S3 Security Scanning Tool

Outsmart Malicious Hackers

AWSBucketDump is an AWS S3 Security Scanning Tool, which allows you to quickly enumerate AWS S3 buckets to look for interesting or confidential files. It’s similar to a subdomain brute-forcing tool but is made specifically for S3 buckets and also has some extra features that allow you to grep for delicious files as well as download interesting files if you’re not afraid to quickly fill up your hard drive.

AWSBucketDump - AWS S3 Security Scanning Tool

Using the download feature might fill your hard drive up, you can provide a max file size for each download at the command line when you run the tool. Keep in mind that it is in bytes.

By default, there are two threads for checking buckets and two buckets for downloading.

AWSBucketDump Usage


AWSBucketDump S3 Security Tool Requirements

Non-Standard Python Libraries:

  • xmltodict
  • requests
  • argparse

A great accompaniment would be these DNS wordlists from the SecLists repository: Discovery >> DNS

You can download AWSBucketDump here:

Or read more here.

Topic: Hacking Tools

nbtscan Download – NetBIOS Scanner For Windows & Linux

Keep on Guard!

nbtscan is a command-line NetBIOS scanner for Windows that is SUPER fast, it scans for open NetBIOS nameservers on a local or remote TCP/IP network, and this is the first step in the finding of open shares.

nbtscan Download - NetBIOS Scanner For Windows & Linux

It is based on the functionality of the standard Windows tool nbtstat, but it operates on a range of addresses instead of just one.

What is nbtscan?

NETBIOS is commonly known as the Windows “Network Neighborhood” protocol, and (among other things), it provides a name service that listens on UDP port 137. When it receives a query on this port, it responds with a list of all services it offers. Windows ships with a standard tool nbtstat which queries a single IP address when given the -A parameter. When running against a machine on the local network (a development box), it shows:

The numeric code (in hexadecimal) and the type serve to identify the service being offered, and (for instance) a UNIQUE code of <20> indicates that the machine is running the file-sharing service. Unfortunately, nbtstat only reports the codes, and it requires looking up the meanings elsewhere. The References section at the end of this document lists some resources to learn what all the codes mean.

Machines participating in NetBIOS listen on UDP port 137 for these queries and respond accordingly. Simple configurations might only have a few resource records (as above), but an NT server supporting a large enterprise could easily have more than a dozen. Though it’s sometimes useful to examine the full set of resource records for a given machine, in practice it’s more useful to summarize them into the key “interesting” services.

Our tool has taken this approach. Not only does it scan ranges of addresses — instead of just one machine — but it can fully decode most of the resource record types and can summarize the interesting data on a one-line display.

On our network, we have quite a few machines, but it appears that only three respond to our queries:

Using nbtscan NetBIOS Scanner

When nbtscan is run without command-line arguments, it reports a short “help” listing that summarizes the options available, which are expanded on here.

If you want something to screw with a tool like nbtscan you can check out something like Fake NetBIOS Tool – Simulate Windows Hosts.

Download nbtscan

Windows – The Win32 version of the tool, which works well on Windows 9x, NT and 2000, is available below as nbtscan.exe. It’s written in portable C and is less than 40 kbytes, requires no special libraries or DLLs, and is run in a MS-DOS command window.

Linux – The code works fine on Linux, and a version built on Red Hat Linux 6.2 is available as well.

You can download nbtscan here:

nbtscan.exe (v1.0.35) – Windows binary (36 kbytes)
nbtscan-1.0.35-redhat-linux – Linux binary (44kbytes)
nbtscan-1.0.31-sco-5.0.6.bin – SCO Open Server 5.0.6
nbtscan-source-1.0.35.tgz (gzip’d tarball) (ZIP)

Or read more here.

Topic: Networking Hacking

Equifax Data Breach – Hack Due To Missed Apache Patch

Outsmart Malicious Hackers

The Equifax data breach is pretty huge with 143 million records leaked from the hack in the US alone with unknown more in Canada and the UK.

Equifax Data Breach - Hack Due To Missed Apache Patch

The original statement about the breach is as follows for those that weren’t up to date with it, which came out Sept 7th (4 months AFTER the breach happened).

Equifax Inc. (NYSE: EFX) today announced a cybersecurity incident potentially impacting approximately 143 million U.S. consumers. Criminals exploited a U.S. website application vulnerability to gain access to certain files. Based on the company’s investigation, the unauthorized access occurred from mid-May through July 2017. The company has found no evidence of unauthorized activity on Equifax’s core consumer or commercial credit reporting databases.

The information accessed primarily includes names, Social Security numbers, birth dates, addresses and, in some instances, driver’s license numbers. In addition, credit card numbers for approximately 209,000 U.S. consumers, and certain dispute documents with personal identifying information for approximately 182,000 U.S. consumers, were accessed.

So pretty serious stuff with a kit ripe for social engineering and some pretty heavy weight identity theft.

Some good info in this video, skip to 3:02 for the Equifax story coverage:

Just today the entry point has been published, which is pretty unusual in these type of cases to get ANY info other than the fact it happened. It’s linked to a flaw in Apache Struts that was public in March 2017.

Equifax has been intensely investigating the scope of the intrusion with the assistance of a leading, independent cybersecurity firm to determine what information was accessed and who has been impacted. We know that criminals exploited a U.S. website application vulnerability. The vulnerability was Apache Struts CVE-2017-5638. We continue to work with law enforcement as part of our criminal investigation, and have shared indicators of compromise with law enforcement.

As the Apache Foundation pointed out earlier this week, it reported CVE-2017-5638 in March 2017. Doubt us? Here’s the NIST notification that mentions it as being notified on March 10th.

It’s a pretty nasty situation especially if you watched the video above and you realise that Equifax is also managing to monetize their screw up.

You can find the latest here:

At least a good amount of information is coming out around this case so we can keep an eye on it and see what else turns up.

Source: The Register

Topic: Hacking News

Seth – RDP Man In The Middle Attack Tool

Keep on Guard!

Seth is an RDP Man In The Middle attack tool written in Python to MiTM RDP connections by attempting to downgrade the connection in order to extract clear text credentials.

Seth - RDP Man In The Middle Attack Tool

It was developed to raise awareness and educate about the importance of properly configured RDP connections in the context of pentests, workshops or talks.

Usage of Seth RDP Man In The Middle Attack Tool

Run it like this:

Unless the RDP host is on the same subnet as the victim machine, the last IP address must be that of the gateway.

The script performs ARP spoofing to gain a Man-in-the-Middle position and redirects the traffic such that it runs through an RDP proxy. The proxy can be called separately:

Requirements for Seth RDP MiTM Attack Tool

  • python3
  • tcpdump
  • arpspoof (arpspoof is part of dsniff)
  • openssl < 1.1.0f

OpenSSL should not be too recent, as it does not support older versions of the SSL protocol and thus may be incompatible with older version of the Windows RDP client.

You can check out the full paper here:

Attacking RDP How to Eavesdrop on Poorly Secured RDP Connections

There’s also another related tool which can extract RDP sessions:

SessionGopher – Session Extraction Tool

You can download Seth for RDP MiTM here:

Or read more here.

Topic: Hacking Tools
dcrawl - Web Crawler For Unique Domains

dcrawl – Web Crawler For Unique Domains

dcrawl is a simple, but smart, multithreaded web crawler for randomly gathering huge lists of unique domain names. How does dcrawl work? dcrawl takes one site URL as input and detects all a href= links in the site’s body. Each found link is put into the queue. Successively, each queued link is crawled in the […]

Topic: Hacking Tools
Time Warner Hacked - AWS Config Exposes 4M Subscribers

Time Warner Hacked – AWS Config Exposes 4M Subscribers

What’s the latest on the web, Time Warner Hacked is what it’s about now as a bad AWS S3 config (once again) exposes the details of approximately 4 Million subscribers. This follows not long after the Instagram API leaking user contact information and a few other recent leaks involving poorly secured Amazon AWS S3 buckets […]

Topic: Hacking News