Darknet https://www.darknet.org.uk Hacking Tools, Hacker News & Cyber Security Wed, 19 Feb 2020 15:22:49 +0000 en-US hourly 1 https://wordpress.org/?v=5.3.2 https://www.darknet.org.uk/images/darknet_logo_small.jpghttps://www.darknet.org.uk/images/darknet_logo_small.jpgdf6f0b Judas DNS – Nameserver DNS Poisoning Attack Tool https://www.darknet.org.uk/2020/02/judas-dns-nameserver-dns-poisoning-attack-tool/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed https://www.darknet.org.uk/2020/02/judas-dns-nameserver-dns-poisoning-attack-tool/#respond Wed, 19 Feb 2020 15:22:49 +0000 https://www.darknet.org.uk/?p=5407 Judas DNS – Nameserver DNS Poisoning Attack Tool

Judas DNS is a Nameserver DNS Poisoning Attack Tool which functions as a DNS proxy server built to be deployed in place of a taken over nameserver to perform targeted exploitation. Judas works by proxying all DNS queries to the legitimate nameservers for a domain.

The magic comes with Judas’s rule configurations which allow you to change DNS responses depending on source IP or DNS query type. This allows an attacker to configure a malicious nameserver to do things like selectively re-route inbound email coming from specified source IP ranges (via modified MX records), set extremely long TTLs to keep poisoned records cached, and more.

Read the rest of Judas DNS – Nameserver DNS Poisoning Attack Tool now! Only available at Darknet.

]]>
https://www.darknet.org.uk/2020/02/judas-dns-nameserver-dns-poisoning-attack-tool/feed/ 0
dsniff Download – Tools for Network Auditing & Password Sniffing https://www.darknet.org.uk/2020/02/dsniff-download-tools-for-network-auditing-password-sniffing/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed https://www.darknet.org.uk/2020/02/dsniff-download-tools-for-network-auditing-password-sniffing/#respond Fri, 14 Feb 2020 14:46:40 +0000 https://www.darknet.org.uk/?p=4741 dsniff Download – Tools for Network Auditing & Password Sniffing

Dsniff download is a collection of tools for network auditing & penetration testing. Dsniff, filesnarf, mailsnarf, msgsnarf, URLsnarf, and WebSpy passively monitor a network for interesting data (passwords, e-mail, files, etc.).

ARPspoof, DNSspoof, and macof facilitate the interception of network traffic normally unavailable to an attacker (e.g, due to layer-2 switching). sshmitm and webmitm implement active monkey-in-the-middle attacks against redirected SSH and HTTPS sessions by exploiting weak bindings in ad-hoc PKI.

Read the rest of dsniff Download – Tools for Network Auditing & Password Sniffing now! Only available at Darknet.

]]>
https://www.darknet.org.uk/2020/02/dsniff-download-tools-for-network-auditing-password-sniffing/feed/ 0
OWASP Amass – DNS Enumeration, Attack Surface Mapping & External Asset Discovery https://www.darknet.org.uk/2020/02/owasp-amass-dns-enumeration-attack-surface-mapping-external-asset-discovery/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed https://www.darknet.org.uk/2020/02/owasp-amass-dns-enumeration-attack-surface-mapping-external-asset-discovery/#respond Mon, 10 Feb 2020 14:05:43 +0000 https://www.darknet.org.uk/?p=5400 OWASP Amass – DNS Enumeration, Attack Surface Mapping & External Asset Discovery

The OWASP Amass Project is a DNS Enumeration, Attack Surface Mapping & External Asset Discovery tool to help information security professionals perform network mapping of attack surfaces and perform external asset discovery using open source information gathering and active reconnaissance techniques.

Information Gathering Techniques Used by OWASP Amass for DNS Enumeration and More

The main functionality of Amass is as follows:

  • DNS: Basic enumeration, Brute forcing (optional), Reverse DNS sweeping, Subdomain name alterations/permutations, Zone transfers (optional)
  • Scraping: Ask, Baidu, Bing, DNSDumpster, DNSTable, Dogpile, Exalead, Google, HackerOne, IPv4Info, Netcraft, PTRArchive, Riddler, SiteDossier, ViewDNS, Yahoo
  • Certificates: Active pulls (optional), Censys, CertSpotter, Crtsh, Entrust, GoogleCT
  • APIs: AlienVault, BinaryEdge, BufferOver, CIRCL, CommonCrawl, DNSDB, GitHub, HackerTarget, IPToASN, Mnemonic, NetworksDB, PassiveTotal, Pastebin, RADb, Robtex, SecurityTrails, ShadowServer, Shodan, Spyse (CertDB & FindSubdomains), Sublist3rAPI, TeamCymru, ThreatCrowd, Twitter, Umbrella, URLScan, VirusTotal, WhoisXML
  • Web Archives: ArchiveIt, ArchiveToday, Arquivo, LoCArchive, OpenUKArchive, UKGovArchive, Wayback

Usage of Amass for DNS Enumeration, Attack Surface Mapping & External Asset Discovery

The Amass tool has several subcommands shown below for handling your Internet exposure investigation.

Read the rest of OWASP Amass – DNS Enumeration, Attack Surface Mapping & External Asset Discovery now! Only available at Darknet.

]]>
https://www.darknet.org.uk/2020/02/owasp-amass-dns-enumeration-attack-surface-mapping-external-asset-discovery/feed/ 0
Cameradar – Hack RTSP Video Surveillance CCTV Cameras https://www.darknet.org.uk/2020/01/cameradar-hack-rtsp-video-surveillance-cctv-cameras/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed https://www.darknet.org.uk/2020/01/cameradar-hack-rtsp-video-surveillance-cctv-cameras/#respond Wed, 29 Jan 2020 09:27:23 +0000 https://www.darknet.org.uk/?p=5384 Cameradar – Hack RTSP Video Surveillance CCTV Cameras

Cameradar is a Go-based tool to hack RTSP Video Surveillance CCTV Cameras, it can detect open RTSP hosts, detect device models and launch automated attacks.

The main features of Cameradar are:

  • Detect open RTSP hosts on any accessible target host
  • Detect which device model is streaming
  • Launch automated dictionary attacks to get their stream route (e.g.: /live.sdp)
  • Launch automated dictionary attacks to get the username and password of the cameras
  • Retrieve a complete and user-friendly report of the results

Using Cameradar to Hack RTSP Video Cameras

"-t, --targets": Set target.

Read the rest of Cameradar – Hack RTSP Video Surveillance CCTV Cameras now! Only available at Darknet.

]]>
https://www.darknet.org.uk/2020/01/cameradar-hack-rtsp-video-surveillance-cctv-cameras/feed/ 0
dSploit APK Download – Hacking & Security Toolkit For Android https://www.darknet.org.uk/2020/01/dsploit-apk-download-hacking-security-toolkit-for-android/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed https://www.darknet.org.uk/2020/01/dsploit-apk-download-hacking-security-toolkit-for-android/#comments Wed, 15 Jan 2020 10:11:53 +0000 https://www.darknet.org.uk/?p=5364 dSploit APK Download – Hacking & Security Toolkit For Android

dSploit APK Download is a Hacking & Security Toolkit For Android which can conduct network analysis and penetration testing activities. It aims to offer to IT security experts the most complete and advanced professional toolkit to perform network security assessments on a mobile device.

Once dSploit is started, you will be able to easily map your network, fingerprint alive hosts operating systems and running services, search for known vulnerabilities, crack logon procedures of many TCP protocols, perform man in the middle (MiTM) attacks such as password sniffing (with common protocols dissection), real-time traffic manipulation and more.

Read the rest of dSploit APK Download – Hacking & Security Toolkit For Android now! Only available at Darknet.

]]>
https://www.darknet.org.uk/2020/01/dsploit-apk-download-hacking-security-toolkit-for-android/feed/ 4
Scallion – GPU Based Onion Hash Generator https://www.darknet.org.uk/2020/01/scallion-gpu-based-onion-hash-generator/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed https://www.darknet.org.uk/2020/01/scallion-gpu-based-onion-hash-generator/#respond Thu, 09 Jan 2020 16:16:14 +0000 https://www.darknet.org.uk/?p=5359 Scallion – GPU Based Onion Hash Generator

Scallion is a GPU-driven Onion Hash Generator written in C#, it lets you create vanity GPG keys and .onion addresses (for Tor’s hidden services) using OpenCL.

Scallion runs on Mono (tested in Arch Linux) and .NET 3.5+ (tested on Windows 7 and Server 2008)

Scallion was used to find collisions for every 32bit key id in the Web of Trust’s strong set demonstrating how insecure 32bit key ids are.

Read the rest of Scallion – GPU Based Onion Hash Generator now! Only available at Darknet.

]]>
https://www.darknet.org.uk/2020/01/scallion-gpu-based-onion-hash-generator/feed/ 0
WiFi-Dumper – Dump WiFi Profiles and Cleartext Passwords https://www.darknet.org.uk/2019/12/wifi-dumper-dump-wifi-profiles-and-cleartext-passwords/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed Thu, 19 Dec 2019 15:06:54 +0000 https://www.darknet.org.uk/?p=5193 WiFi-Dumper – Dump WiFi Profiles and Cleartext Passwords

WiFi-Dumper is an open-source Python-based tool to dump WiFi profiles and cleartext passwords of the connected access points on a Windows machine. This tool will help you in a Wifi penetration testing and could also be useful when performing red team assessments or internal infrastructure engagements.

Each option in the tool generates the “.txt” file as an output, if you run the tool multiple times, the output gets appended to the previous results.

Read the rest of WiFi-Dumper – Dump WiFi Profiles and Cleartext Passwords now! Only available at Darknet.

]]>
truffleHog – Search Git for High Entropy Strings with Commit History https://www.darknet.org.uk/2019/12/trufflehog-search-git-for-high-entropy-strings-with-commit-history/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed Mon, 02 Dec 2019 07:09:50 +0000 https://www.darknet.org.uk/?p=5348 truffleHog – Search Git for High Entropy Strings with Commit History

truffleHog is a Python-based tool to search Git for high entropy strings, digging deep into commit history and branches. This is effective at finding secrets accidentally committed.

truffleHog previously functioned by running entropy checks on git diffs. This functionality still exists, but high signal regex checks have been added, and the ability to surpress entropy checking has also been added.

truffleHog --regex --entropy=False https://github.com/dxa4481/truffleHog.git

or

truffleHog file:///user/dxa4481/codeprojects/truffleHog/

truffleHog will go through the entire commit history of each branch, and check each diff from each commit, and check for secrets.

Read the rest of truffleHog – Search Git for High Entropy Strings with Commit History now! Only available at Darknet.

]]>
AIEngine – AI-driven Network Intrusion Detection System https://www.darknet.org.uk/2019/11/aiengine-ai-driven-network-intrusion-detection-system/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed Mon, 25 Nov 2019 14:05:03 +0000 https://www.darknet.org.uk/?p=5231 AIEngine – AI-driven Network Intrusion Detection System

AIEngine is a next-generation interactive/programmable Python/Ruby/Java/Lua and Go AI-driven Network Intrusion Detection System engine with capabilities of learning without any human intervention, DNS domain classification, Spam detection, network collector, network forensics and many others.

AIEngine also helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.

Functionality of AIEngine AI-driven Network Intrusion Detection System

The main functionalities of AIEngine are:

  • Support for interacting/programing with the user while the engine is running.

Read the rest of AIEngine – AI-driven Network Intrusion Detection System now! Only available at Darknet.

]]>
Sooty – SOC Analyst All-In-One CLI Tool https://www.darknet.org.uk/2019/11/sooty-soc-analyst-all-in-one-cli-tool/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed Fri, 01 Nov 2019 15:21:01 +0000 https://www.darknet.org.uk/?p=5285 Sooty – SOC Analyst All-In-One CLI Tool

Sooty is a tool developed with the task of aiding a SOC analyst to automate parts of their workflow and speed up their process.

The main goal of Sooty is to perform as much of the routine checks as possible which allows the analyst more time to spend on deeper analysis.

Features of Sooty SOC Analyst CLI Tool

  • Sanitise URL’s to be safe to send in emails
  • Perform reverse DNS and DNS lookups
  • Perform reputation checks from:
    • VirusTotal
    • BadIP’s
    • Abuse IPDB
  • Check if an IP address is a TOR exit node
  • Decode Proofpoint URL’s, UTF-8 encoded URLS, Office SafeLink URL’s and Base64 Strings
  • Get file hashes and compare them against VirusTotal (see requirements)
  • Perform WhoIs Lookups
  • Check Usernames and Emails against HaveIBeenPwned to see if a breach has occurred.

Read the rest of Sooty – SOC Analyst All-In-One CLI Tool now! Only available at Darknet.

]]>