Fluxion - Automated EvilAP Attack Tool

Fluxion – Automated EvilAP Attack Tool

Fluxion is an automated EvilAP attack tool for carrying out MiTM attacks on WPA Wireless networks written in a mix of Bash and Python. Fluxion is heavily based off Linset the Evil Twin Attack Bash Script, with some improvements and bug-fixes. How it Works Scan the networks. Capture a handshake (can’t be used without a […]

Tags: , , , , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Password Cracking, Wireless Hacking | Add a Comment
Exitmap - Tor Exit Relay Scanner

Exitmap – Tor Exit Relay Scanner

Exitmap is a fast and modular Python-based Tor exit relay scanner. Exitmap modules implement tasks that are run over (a subset of) all exit relays. If you have a background in functional programming, think of exitmap as a map() interface for Tor exit relays. Modules can perform any TCP-based networking task; fetching a web page, […]

Tags: , , , , , , ,

Posted in: Network Hacking, Privacy | Add a Comment
DAVScan - WebDAV Security Scanner

DAVScan – WebDAV Security Scanner

DAVScan is a quick and lightweight WebDAV security scanner designed to discover hidden files and folders on DAV enabled web servers. The scanner works by taking advantage of overly privileged/misconfigured WebDAV servers or servers vulnerable to various disclosure or authentication bypass vulnerabilities. The scanner attempts to fingerprint the target server and then spider the server […]

Tags: , , , , , , ,

Posted in: Hacking Tools, Web Hacking | Add a Comment
Wycheproof - Test Crypto Libraries Against Known Attacks

Wycheproof – Test Crypto Libraries Against Known Attacks

Project Wycheproof is a tool to test crypto libraries against known attacks. It is developed and maintained by members of Google Security Team, but it is not an official Google product. At Google, they rely on many third party cryptographic software libraries. Unfortunately, in cryptography, subtle mistakes can have catastrophic consequences, and they found that […]

Tags: , , , , , , , ,

Posted in: Countermeasures, Cryptography, Programming | Add a Comment
Ending The Year With A 650Gbps DDoS Attack

Ending The Year With A 650Gbps DDoS Attack

It seems that 2016 has been the year of immense DDoS attacks, many coming from Mirai. This seems to be a newcomer though ending the year with a 650Gbps DDoS attack. The Dyn DNS DDoS attack that some speculated reached over 1Tbps was probably the biggest, but this isn’t that far behind and it’s bigger […]

Tags: , , , , , , , , , ,

Posted in: Network Hacking | Add a Comment
Ettercap - A Suite For Man-In-The-Middle Attacks

Ettercap – A Suite For Man-In-The-Middle Attacks

Ettercap is a comprehensive suite for man-in-the-middle attacks (MiTM). It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It also supports active and passive dissection of many protocols and includes many features for network and host analysis. Ettercap works by putting the network interface into promiscuous mode and […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment
DBShield - Go Based Database Firewall

DBShield – Go Based Database Firewall

DBShield is a Database Firewall written in Go that has protection for MySQL/MariaDB, Oracle and PostgreSQL databases. It works in a proxy fashion inspecting traffic and dropping abnormal queries after a learning period to populate the internal database with regular queries. Learning mode lets any query pass but it records information about it (pattern, username, […]

Tags: , , , , , , , ,

Posted in: Countermeasures, Database Hacking, Security Software | Add a Comment
Kiev Power Outage Linked To Cyber Attacks

Kiev Power Outage Linked To Cyber Attacks

A Kiev power outage last weekend in Ukraine has been linked to a cyber attack, which is worryingly similar to an attack that happened around the same time last year. Sub-stations and transmission stations have always been a weak point for nation-state attacks as EVERYTHING relies on them now. Plus with smart grids and remotely […]

Tags: , , , , , , ,

Posted in: Hardware Hacking | Add a Comment
dnsteal - DNS Exfiltration Tool

dnsteal – DNS Exfiltration Tool

dnsteal is a DNS exfiltration tool, essentially a fake DNS server that allows you to stealthily extract files from a victim machine through DNS requests. dnsteal is coded in Python and is available on Github. Features dnsteal currently has: Support for multiple files Gzip compression supported Supports the customisation of subdomains Customise bytes per subdomain […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment