HackDig : Dig high-quality web security articles for hacker

hping3 – TCP/IP Packet Assembler & Analyser

hping is a command-line oriented TCP/IP packet assembler/analyser. The interface is inspired to the ping unix command, but hping isn’t only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features.While hping was mainly used as a
Publish At:2016-01-29 22:35 | Read:1466 | Comments:0 | Tags:Hacking Tools Network Hacking hping hping2 hping3 learn tcp/

MITMf – Man-In-The-Middle Attack Framework

MITMf is a Man-In-The-Middle Attack Framework which aims to to provide a one-stop-shop for Man-In-The-Middle and network attacks while updating and improving existing attacks and techniques.Originally built to address the significant shortcomings of other tools (e.g Ettercap, Mallory), it’s been almost completely re-written from scratch to provide a mo
Publish At:2016-01-18 15:20 | Read:2228 | Comments:0 | Tags:Hacking Tools Network Hacking man in the middle framework ma

Fortinet SSH Backdoor Found In Firewalls

So the Fortinet SSH Backdoor, apparently it’s just a management authentication issue. Sorry, what’s that? It looks like a passphrase based admin level access login via SSH to me personally.Which is scary.They are adamantly shouting from rooftops that it was not planted by a 3rd party (NSA? Like Juniper..) or any kind of malicious activity.Enterpr
Publish At:2016-01-14 02:50 | Read:2304 | Comments:0 | Tags:Exploits/Vulnerabilities Network Hacking fortidoor fortigate

dnscat2 – DNS Tunnel Tool

This DNS tunnel tool named dnscat2 creates an encrypted tunnel over the DNS protocol primarily as a command-and-control (C&C) channel for penetration testers as outbound DNS is rarely blocked in networks.This makes it a very effective tunnel out of almost every network.Overviewdnscat2 comes in two parts: the client and the server.The client is designed to be
Publish At:2016-01-11 20:35 | Read:1710 | Comments:0 | Tags:Network Hacking c&c tool dns c&c dns command and control dns

Zarp – Network Attack Tool

Zarp is a network attack tool centred around the exploitation of local networks. This does not include system exploitation, but rather abusing networking protocols and stacks to take over, infiltrate, and knock out. Sessions can be managed to quickly poison and sniff multiple systems at once, dumping sensitive information automatically or to the attacker dir
Publish At:2015-11-28 09:40 | Read:1427 | Comments:0 | Tags:Hacking Tools Network Hacking arp poisoning network attack n

ProtonMail DDoS Attack – Sustained & Sophisticated

So the ProtonMail DDoS Attack – if you’re not familiar ProtonMail is an secure, free, encrypted e-mail service that promises absolutely no compromises. It’s been getting hit hard since November 3rd, with a large scale rather sophisticated set of DDoS attacks rendering it unable to receive or send e-mail.It seems to have mitigated the bulk o
Publish At:2015-11-11 20:25 | Read:1748 | Comments:0 | Tags:Cryptography Network Hacking Privacy ddos ddos attack encryp

HookME – API Based TCP Proxy Including SSL

HookME is a an API based TCP Proxy software designed for intercepting communications by hooking the desired process and hooking the API calls for sending and receiving network data (even SSL clear data). HookME provides a nice graphic user interface allowing you to change the packet content in real time, dropping or forwarding the packet.It also has a Python
Publish At:2015-10-02 19:05 | Read:1907 | Comments:0 | Tags:Hacking Tools Network Hacking api based tcp proxy hookme net

EvilFOCA – Network Attack Toolkit

Evil Foca is a network attack toolkit for penetration testing professionals and security auditors whose purpose it is to test security in IPv4 and IPv6 data networks.The software automatically scans the networks and identifies all devices and their respective network interfaces, specifying their IPv4 and IPv6 addresses as well as the physical addresses throu
Publish At:2015-09-26 20:10 | Read:2024 | Comments:0 | Tags:Hacking Tools Network Hacking evil foca evilfoca ipv6 ipv6 s

Telegram DDoS Attack – Messaging App Suffers 200GBps Pounding

For those not familiar before we get to the Telegram DDoS attack, Telegram is an instant messaging system focusing on privacy and multi-platform availability. It was launched by the founders of VK, the largest social network in Russia and is run as an independent non-profit company in Germany.The client code is open-source and audited and various implementat
Publish At:2015-07-15 16:45 | Read:1322 | Comments:0 | Tags:Network Hacking telegram telegram attack telegram ddos teleg

Egress-Assess – Test Network Egress Data Detection

Egress-Assess is a tool used to test network egress data detection capabilities, it works over FTP, HTTP and HTTPS. It can generate various data-types to test detection, credit card details, social security numbers (SSN) and name/address combos.This tool is designed to be an easy way to test exfiltrating data from the network you are currently plugged into.
Publish At:2015-07-14 06:25 | Read:2304 | Comments:0 | Tags:Countermeasures Network Hacking Security Software data-leak

BTCrawler – Bluetooth Diagnostic & Discovery Tool

BTCrawler is an application used to to discover Bluetooth devices and the services they provide, it is useful if you wish to know which Bluetooth enabled devices are in your proximity for debugging, spying, curiosity or any other purpose.With this program you’ll be even able to find every service provided by those devices and to list all its Bluetooth
Publish At:2015-06-27 19:30 | Read:2099 | Comments:0 | Tags:Hacking Tools Network Hacking bluetooth bluetooth device dis

Just-Metadata – Gathers & Analyse IP Address Metadata

Just-Metadata is a tool that can be used to gather IP address metadata passively about a large number of IP addresses, and attempt to extrapolate relationships that might not otherwise be seen. Just-Metadata has “gather” modules which are used to gather metadata about IPs loaded into the framework across multiple resources on the internet. Just-M
Publish At:2015-06-14 05:55 | Read:3012 | Comments:0 | Tags:Countermeasures Network Hacking Security Software analyse at

Patator – Multi-threaded Service & URL Brute Forcing Tool

Patator is an extremely flexible, module, multi-threaded, multi-purpose service & URL brute forcing tool written in Python that can be used in many ways. Basically the author got tired of using Medusa, Hydra, ncrack, metasploit auxiliary modules, nmap NSE scripts and the like because:They either do not work or are not reliable (got me false negatives se
Publish At:2015-06-09 23:25 | Read:2404 | Comments:0 | Tags:Hacking Tools Network Hacking Password Cracking brute force

OpenVAS 7 Released – Open Source Vulnerability Scanner

The Open Vulnerability Assessment System (OpenVAS) is a framework of several services and tools offering a comprehensive and powerful vulnerability scanning and vulnerability management solution. The actual security scanner is accompanied with a daily updated feed of Network Vulnerability Tests (NVTs), over 35,000 in total (as of April 2014).The OpenVAS Mana
Publish At:2015-01-17 17:10 | Read:1810 | Comments:0 | Tags:Exploits/Vulnerabilities Hacking Tools Network Hacking explo

BlueScan – A Bluetooth Device Scanner

BlueScan is a BASH script that acts as a Bluetooth device scanner. It’s a tool designed to detect Bluetooth devices within the radio range of your system and extract as much information as possible from the devices without the requirement to pair.The tool works unobtrusively, ie without establishing a connection to the devices found and undetected. No
Publish At:2015-01-11 00:00 | Read:2924 | Comments:0 | Tags:Hacking Tools Network Hacking bluescan bluescanner bluetooth


Share high-quality web security related articles with you:)


Tag Cloud