Wednesday, May 22, 2024

Yearly Archives: 2021

Experts Detail Logging Tool of DanderSpritz Framework Used by Equation Group Hackers

Researchers in the field of cybersecurity can get a close look at a system known as Double Feature. The system's sole purpose is to...

Threat Actors Abuse MSBuild for Cobalt Strike Beacon Execution

Threat Actors Abuse MSBuild for Cobalt Strike Beacon Execution Malicious operations have recently been spotted abusing Microsoft Build Engine (MSBuild). This is to execute...

LOLcrawler

For bugbounty and penetration testing/redteaming, a headless web crawler is used Lolcrawler is a headless browser crawler designed for BugBounty and RedTeaming. Be aware that this code is really sluggish, but it should be able to run for several days and uncover some fascinating urls/paths. BeautifulSoup, jsbeautifier, urlextract, and linkfinder.py are among the crawler's methods for attempting to locate links and urls. Due to the headless selenium browser, you'll need to install Docker to run this crawler. Users need to install docker to run this crawler due to the headless selenium browser. Disclaimer: The intended use for the tool is strictly educational...

Kubesploit: Testing Containerized Environments with a New Offensive Tool

This is a full framework dedicated to Kubernetes that will help penetration testers and Red Teamers run a comprehensive and in-depth test to imitate real-life attack scenarios that are a danger to many enterprises across the world. More than 84 percent of enterprises utilise containers in production, and more than 78 percent use Kubernetes as their container orchestration platform, according to a Cloud Native Computing Foundation (CNCF) survey. Because of the technology's widespread adoption, attackers must develop their Kubernetes skills. Key Benefits To assist in the protection of Kubernetes clusters against assaults, we must first understand the technology and the businesses that are being attacked. However, the majority of today's technologies are focused on passively scanning the cluster for vulnerabilities, and there is a lack of coverage for more complicated attack vectors. These tools may allow you to see the problem, but they will not allow you to solve it. It's critical to run the exploit to replicate a real-world attack in order to assess corporate network resilience. When an exploit is launched, the organization's cyber event management is practised, which isn't the case when scanning for cluster concerns. This can assist the business in learning how to respond when real attacks occur, determining whether its other detection systems are functioning properly, and determining what adjustments should be done. New features: The new modules are being created For containerized environment attack vectors such breakout from...

New Flaws Expose EVlink Electric Vehicle Charging Stations to Remote Hacking

A number of new vulnerabilities have been patched by Schmidt Electric, exposing its EVlink electric vehicle charging stations to remote hacking attacks. In an announcement...

Echelon Infostealer Drops in via Telegram

An attack targeting users of several file-sharing and messaging platforms has been discovered using a new variant of the Echelon credential stealer malware. How the...

KlustAIR Scanner

Submit all images in your #kubernetes cluster to Anchore for a #vulnerability check, and use kubeaudit to double-check your settings. Requirements Python 3 Running Anchore...

Octovy

For the organization, package a GitHub repository vulnerability scanner. Based on Trivy, a vulnerability management tool for 3rd party OSS products. It functions as a GitHub App, scanning the source code of a repository placed in Trivy's GitHub App. The scan results are saved in the database, and the Web portal allows the developer and security administrator to view and manage vulnerabilities. Features:- Vulnerability detection across the entire organization Management of Vulnerabilities Disclaimer: - The intended use for the tool is strictly educational...

Dridex Omicron phishing taunts with funeral helpline number

Over the last few weeks, a malware distributor has been taunting victims and researchers with the Dridex banking malware. Phishing campaigns taunt victims with...

Stealthy BLISTER malware slips in unnoticed on Windows systems

A malware campaign this week exploited Windows systems to cloak malicious components as real executable files by using code-signing certificates. Payload Blister, which was detected,...

Most Read

Write For Us