Multi-Stage Phishing Campaign Leverages BYOD Concept to Target Organizations

Microsoft has released information regarding a multi-stage phishing effort that allowed attackers to use the concept of Bring Your Own Device (BYOD) to spread malware across an organization's network invisibly.…

Continue ReadingMulti-Stage Phishing Campaign Leverages BYOD Concept to Target Organizations

EnumIAX

enumIAX is an Inter Asterisk Exchange protocol username brute-force enumerator. enumIAX may operate in two distinct modes; Sequential Username Guessing or Dictionary Attack. Sequential Username Guessing:- In Sequential Username Guessing…

Continue ReadingEnumIAX

Enum4linux

Enum4linux is a tool for enumerating information from Windows and Samba systems. It attempts to offer similar functionality to enum.exe formerly available from www.bindview.com. It is written in Perl and…

Continue ReadingEnum4linux

DotDotPwn

DotDotPwn is a very flexible intelligent fuzzer to discover traversal directory vulnerabilities in software such as HTTP/FTP/TFTP servers, Web platforms such as CMSs, ERPs, Blogs, etc. Also, it has a…

Continue ReadingDotDotPwn

DNSWalk

DNSwalk is a DNS debugger.  It performs zone transfers of specified domains and checks the database in numerous ways for internal consistency, as well as accuracy.   Download Link:- https://github.com/davebarr/dnswalk

Continue ReadingDNSWalk

DNSTracer

Dnstracer determines where a given Domain Name Server (DNS) gets its information from, and follows the chain of DNS servers back to the servers which know the data. Its behavior…

Continue ReadingDNSTracer