A complete guide to penetrate into multiple targets using Armitage - Happy Hunting
http://ift.tt/2kN6HH8
Submitted December 23, 2017 at 11:53PM by drhydrogen1
via reddit http://ift.tt/2kMx6V8
http://ift.tt/2kN6HH8
Submitted December 23, 2017 at 11:53PM by drhydrogen1
via reddit http://ift.tt/2kMx6V8
My Hack Stuff
How to Compromise Multiple Targets using Armitage? - My Hack Stuff
Armitage is ignored by ethical hackers who avoid its GUI in favor of traditional command-line input of the Metasploit console.
Basic security for Linux
http://ift.tt/2kLtqDp
Submitted December 24, 2017 at 12:00AM by wewewawa
via reddit http://ift.tt/2BJ9wTR
http://ift.tt/2kLtqDp
Submitted December 24, 2017 at 12:00AM by wewewawa
via reddit http://ift.tt/2BJ9wTR
securityinabox.org
Basic security for Linux
PassGAN: A deep learning approach for password guessing
http://ift.tt/2yZEaSD
Submitted December 24, 2017 at 03:45AM by brannondorsey
via reddit http://ift.tt/2DD0YLF
http://ift.tt/2yZEaSD
Submitted December 24, 2017 at 03:45AM by brannondorsey
via reddit http://ift.tt/2DD0YLF
GitHub
brannondorsey/PassGAN
PassGAN - A Deep Learning Approach for Password Guessing (https://arxiv.org/abs/1709.00440)
RCE in Trend Micro Smart Protection Server
http://ift.tt/2CDAl7S
Submitted December 24, 2017 at 04:15AM by maximilianov
via reddit http://ift.tt/2l3hegE
http://ift.tt/2CDAl7S
Submitted December 24, 2017 at 04:15AM by maximilianov
via reddit http://ift.tt/2l3hegE
Core Security
Trend Micro Smart Protection Server Multiple Vulnerabilities
1. Advisory InformationTitle: Trend Micro Smart Protection Server Multiple VulnerabilitiesAdvisory ID: CORE-2017-0008Advisory URL: http://www.coresecurity.com/advisories/trend-micro-smart-protection-server-multiple-vulnerabilitiesDate published: 2017-12-19Date…
Experimenting with the Audiocodes MP264 - Reverse shells, Firmware analysis and LEDE
http://ift.tt/2kNxi6O
Submitted December 24, 2017 at 02:08AM by crcthrsbatterystpl
via reddit http://ift.tt/2kOH8VQ
http://ift.tt/2kNxi6O
Submitted December 24, 2017 at 02:08AM by crcthrsbatterystpl
via reddit http://ift.tt/2kOH8VQ
www.batterystapl.es
Experimenting with the Audiocodes MP264
The Audiocodes MP264 is a gateway device which was issued to customers of some ISPs in Australia ( iPrimus , and the companies it owns...
Thoughts about SS7 vulnerabilities and 2FA over SMS?
Hey guys, so recently I was reading articles about SMS being an insecure method of transmitting 2FA codes. This makes sense reading about the SS7 breaches and inherently social engineering also increases the risk of this being a 'bad' method of authentication.In fact if I understand this correctly this means SMS basically is not 'true' 2FA, since the whole point is to require something you HAVE and proves you HAVE it, if SMS is this insecure then it fails this litmus test.My biggest conundrum on this is recoverability, obviously they still need my Google password, which is rather long and secure, however it still opens a hole however small.However, closing that hole means that should my phone be lost/destroyed, my tablet/work PC/home PC and smattering of backup envelopes be lost/inaccessible (basically a natural disaster), I would lose everything.I guess this is kind of the point, and TECHNICALLY I could reach out to Google and see if I could get access again, but they are notoriously troublesome when it comes to this.What are your thoughts, is the risk with SS7/SMS vulnerabilities 'big' enough to warrant being extra paranoid, or is it largely fools gold? I am not an important person, nor am I rich, the likelyhood of someone directly targeting me is unlikely and all the computers I use on a daily basis belong to me. I also have Google Prompt setup so even if something did happen I would be able to select that it wasn't me/see a notification.I am pretty sure I am massively overthinking this, but figure I would ask the experts. Thanks for any help or clarification you can provide!
Submitted December 24, 2017 at 05:26AM by Vorteth
via reddit http://ift.tt/2poQlJe
Hey guys, so recently I was reading articles about SMS being an insecure method of transmitting 2FA codes. This makes sense reading about the SS7 breaches and inherently social engineering also increases the risk of this being a 'bad' method of authentication.In fact if I understand this correctly this means SMS basically is not 'true' 2FA, since the whole point is to require something you HAVE and proves you HAVE it, if SMS is this insecure then it fails this litmus test.My biggest conundrum on this is recoverability, obviously they still need my Google password, which is rather long and secure, however it still opens a hole however small.However, closing that hole means that should my phone be lost/destroyed, my tablet/work PC/home PC and smattering of backup envelopes be lost/inaccessible (basically a natural disaster), I would lose everything.I guess this is kind of the point, and TECHNICALLY I could reach out to Google and see if I could get access again, but they are notoriously troublesome when it comes to this.What are your thoughts, is the risk with SS7/SMS vulnerabilities 'big' enough to warrant being extra paranoid, or is it largely fools gold? I am not an important person, nor am I rich, the likelyhood of someone directly targeting me is unlikely and all the computers I use on a daily basis belong to me. I also have Google Prompt setup so even if something did happen I would be able to select that it wasn't me/see a notification.I am pretty sure I am massively overthinking this, but figure I would ask the experts. Thanks for any help or clarification you can provide!
Submitted December 24, 2017 at 05:26AM by Vorteth
via reddit http://ift.tt/2poQlJe
reddit
Thoughts about SS7 vulnerabilities and 2FA over SMS? • r/security
Hey guys, so recently I was reading articles about SMS being an insecure method of transmitting 2FA codes. This makes sense reading about the SS7...
Never Ending Security: Adapting the POC for CVE-2017-1000112 to Other Kernels
http://ift.tt/2zn7v9L
Submitted December 24, 2017 at 04:19AM by b4n1shed
via reddit http://ift.tt/2BGSxBJ
http://ift.tt/2zn7v9L
Submitted December 24, 2017 at 04:19AM by b4n1shed
via reddit http://ift.tt/2BGSxBJ
ricklarabee.blogspot.co.uk
Adapting the POC for CVE-2017-1000112 to Other Kernels
This post will show how to adapt Andrey's @andreyknvl proof of concent, https://github.com/xairy/kernel-exploits/blob/master/CVE-2017-10001...
Learn about securing communication with secure shell while penetration testing in Kali Linux
http://ift.tt/2BLlZqg
Submitted December 24, 2017 at 10:06PM by drhydrogen1
via reddit http://ift.tt/2zp97jt
http://ift.tt/2BLlZqg
Submitted December 24, 2017 at 10:06PM by drhydrogen1
via reddit http://ift.tt/2zp97jt
My Hack Stuff
How to Secure Communication while Penetration Testing? - My Hack Stuff
In this post I’ll discuss about minimizing detection by a target network or how to secure communication while penetration testing.
How I Got Paid $0 From the Uber Security Bug Bounty
http://ift.tt/2BuvTZa
Submitted December 25, 2017 at 02:14AM by jailbird
via reddit http://ift.tt/2DGwQPD
http://ift.tt/2BuvTZa
Submitted December 25, 2017 at 02:14AM by jailbird
via reddit http://ift.tt/2DGwQPD
Compromise Remote Access Protocols using Metasploit - Happy Hunting
http://ift.tt/2DJQ5aY
Submitted December 25, 2017 at 06:02AM by drhydrogen1
via reddit http://ift.tt/2l61x8e
http://ift.tt/2DJQ5aY
Submitted December 25, 2017 at 06:02AM by drhydrogen1
via reddit http://ift.tt/2l61x8e
My Hack Stuff
Compromise Remote Access Protocols - My Hack Stuff
Let us discuss about how we can compromise remote access protocols. There was a time when applications that bypass system protocols to provide
Think Twice Before Sharing On Social Media
http://ift.tt/2pqXMQ9
Submitted December 25, 2017 at 07:23AM by abr646
via reddit http://ift.tt/2DJipKE
http://ift.tt/2pqXMQ9
Submitted December 25, 2017 at 07:23AM by abr646
via reddit http://ift.tt/2DJipKE
DEMARCKO - Protect Yourself
Think Twice Before Sharing On Social Media
CHRISTMAS IS THE HOLIDAY OF SHARING
BUT YOU MIGHT WANT TO THINK TWICE ABOUT SHARING YOUR SPECIAL MOMENT ON SOCIAL MEDIA
THIS IS WHY YOU…
PassGAN: A deep learning approach to password guessing
http://ift.tt/2yZEaSD
Submitted December 25, 2017 at 06:38AM by brannondorsey
via reddit http://ift.tt/2l5Wu81
http://ift.tt/2yZEaSD
Submitted December 25, 2017 at 06:38AM by brannondorsey
via reddit http://ift.tt/2l5Wu81
GitHub
brannondorsey/PassGAN
PassGAN - A Deep Learning Approach for Password Guessing (https://arxiv.org/abs/1709.00440)
If an ISP deletes your Ip address does that mean any site holding your Ip adress cant do anything ?
I live in Canada and just curios and wanted to, I hear all the time is if someone has your Ip address can trace you. But as I stated if your internet service provider deletes your Ip address which my Isp rogers says it does after a year you stop using their service, are your off the raydar ?edit: this not because i did anything illegal lol
Submitted December 25, 2017 at 10:00AM by jeff101001
via reddit http://ift.tt/2l6Th8a
I live in Canada and just curios and wanted to, I hear all the time is if someone has your Ip address can trace you. But as I stated if your internet service provider deletes your Ip address which my Isp rogers says it does after a year you stop using their service, are your off the raydar ?edit: this not because i did anything illegal lol
Submitted December 25, 2017 at 10:00AM by jeff101001
via reddit http://ift.tt/2l6Th8a
reddit
If an ISP deletes your Ip address does that mean any... • r/security
I live in Canada and just curios and wanted to, I hear all the time is if someone has your Ip address can trace you. But as I stated if your...
Yahoo! Remote Code Execution via Spring Engine Server Side Template Injection
http://ift.tt/2zffiGE
Submitted December 25, 2017 at 01:20PM by chocoluvin
via reddit http://ift.tt/2Dbpan8
http://ift.tt/2zffiGE
Submitted December 25, 2017 at 01:20PM by chocoluvin
via reddit http://ift.tt/2Dbpan8
∞ Growing Web Security Blog
Yahoo! RCE via Spring Engine SSTI
This is write up in which I’ll explain a vulnerability I recently found, and reported through Yahoo’s bug bounty program. In web application security testing, doing reconnaissance is an…
Kali Linux on your Pocket: Kali 2017.3 on GPD 7 mini-laptop
http://ift.tt/2DKGUqL
Submitted December 25, 2017 at 04:55PM by Orlin82
via reddit http://ift.tt/2kS5qP2
http://ift.tt/2DKGUqL
Submitted December 25, 2017 at 04:55PM by Orlin82
via reddit http://ift.tt/2kS5qP2
Medium
Kali Linux on your Pocket: Kali 2017.3 on GPD 7 mini-laptop.
About teen weeks ago I bought a GPD Pocket 7 a mini-PC the size of a portable video game console that sports a quad-core Intel Z8750 CPU…
Machine Learning for Cybercriminals
http://ift.tt/2klG37J
Submitted December 25, 2017 at 08:31PM by alexander_polyakov
via reddit http://ift.tt/2kUFimy
http://ift.tt/2klG37J
Submitted December 25, 2017 at 08:31PM by alexander_polyakov
via reddit http://ift.tt/2kUFimy
ERPScan
Machine Learning for Cybercriminals
The article systemizes information on machine learning for cybercriminals deployment in malicious cyberspace to prepare security teams for imminent threats.
How I Got Paid $0 From the Uber Security Bug Bounty [x-post from /programming]
http://ift.tt/2BuvTZa
Submitted December 26, 2017 at 04:37AM by ElectroNeutrino
via reddit http://ift.tt/2ByQ5ZW
http://ift.tt/2BuvTZa
Submitted December 26, 2017 at 04:37AM by ElectroNeutrino
via reddit http://ift.tt/2ByQ5ZW
Bad passwords - this one from the DISA STIG
Recently learned the “standard” DISA STIG compliant password is asdf1234ASDF!@#$16 characters4-Of-4 compliantAnd stupidly-simple to guess
Submitted December 26, 2017 at 08:11AM by volci
via reddit http://ift.tt/2C9R32j
Recently learned the “standard” DISA STIG compliant password is asdf1234ASDF!@#$16 characters4-Of-4 compliantAnd stupidly-simple to guess
Submitted December 26, 2017 at 08:11AM by volci
via reddit http://ift.tt/2C9R32j
reddit
Bad passwords - this one from the DISA STIG • r/security
Recently learned the “standard” DISA STIG compliant password is asdf1234ASDF!@#$ 16 characters 4-Of-4 compliant And stupidly-simple to guess
Latest Virus Threats News - Cyware
http://ift.tt/2C6dvJH
Submitted December 26, 2017 at 04:32PM by cywarelabs12
via reddit http://ift.tt/2C7TzDV
http://ift.tt/2C6dvJH
Submitted December 26, 2017 at 04:32PM by cywarelabs12
via reddit http://ift.tt/2C7TzDV
Cyware
Latest Virus Threats News | Hackers Threats | Cyware
Cyware Present Cyber News on the go. Receive Brief extracts of Latest Virus Threats, Hackers Threats, Actors Threat articles, to keep you informed of the cyber incidents around the world.
Data Connectors Columbus - January 18, 2018
http://ift.tt/2DSoN23
Submitted December 26, 2017 at 05:01PM by cywarelabs12
via reddit http://ift.tt/2pBUfhZ
http://ift.tt/2DSoN23
Submitted December 26, 2017 at 05:01PM by cywarelabs12
via reddit http://ift.tt/2pBUfhZ
Cyware
Data Connectors Columbus | Cyware
The Columbus Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous…
LTS SECURE CYBER SOC based on SOAR stack overcome today’s security Challenges
http://ltssoc.com/
Submitted December 26, 2017 at 05:42PM by hardiksoni28111988
via reddit http://ift.tt/2C9vpcd
http://ltssoc.com/
Submitted December 26, 2017 at 05:42PM by hardiksoni28111988
via reddit http://ift.tt/2C9vpcd
Ltssoc
Adaptive SOC platform for cyber security
LTS Secure Intelligence Driven SOC is integrated Context-aware Security protection platforms that provides and integrate prediction, prevention, detection and response capabilities by leveraging adaptive security framework.