HackDig : Dig high-quality web security articles for hackers

The Surge in Ransomware Attacks

Ransomware, a malware that is capable of encrypting the files of the user. This eventually leads to a demand for ransom in exchange for restoring the users’ data post payment. There are some vectors that allow ransomware to get the right of entry or access to a computer or server. One of the maximum common systems for delivering ransomware by using
Publish At:2020-09-18 06:00 | Read:116 | Comments:0 | Tags:Knowledge-base Penetration Testing Security Advisory how ran

Weaponizing Group Policy Objects Access

Recently, I was on an engagement where I discovered I had plaintext credentials to an account that could modify Active Directory Group Policy Objects (GPOs). This proved to be a fun challenge, as Group Policy files and properties can be bent to our will even when hacking through a straw (SOCKS only, in this case). Goal: Use Group Policy to pull down a fil
Publish At:2020-09-17 10:49 | Read:117 | Comments:0 | Tags:Penetration Testing Red Team Adversarial Attack Simulation S

So, You Got Access to a *nix system… Now What?

Note to Reader: For simplicity, I will be referring to all Unix, Linux, and other Unix-like systems simply as *nix, unless a specific distinction needs to be made. As a pentester, you will likely come across a *nix system at some point. If you are like many of the people I have worked with and encountered in the security industry, you are much more famili
Publish At:2020-09-01 15:37 | Read:113 | Comments:0 | Tags:Application Security Assessment Penetration Testing Security

What are Black Box, Grey Box, and White Box Penetration Testing? [Updated 2020]

IntroductionPentesters are apparently huge fans of colors. Different roles within pentesting assignments are designated as Red Team, Blue Team, Purple Team and others. Given this, it’s not surprising that different types of pentests are designated by color as well. You may have heard of white-box, black-box, and even gray-box pentesting but may be wond
Publish At:2020-08-11 10:31 | Read:212 | Comments:0 | Tags:Penetration Testing

One Size Doesn’t Fit All: Penetration Testing Maturity

As the security industry continues to progress, companies are focusing on their own security programs, trying to figure out what works and what doesn’t. One of the areas of focus that goes to the early days of the security industry is penetration testing. Penetration testing has always been a validation method to identify exposures and help prioritize
Publish At:2020-08-11 10:25 | Read:183 | Comments:0 | Tags:Decision Making Operational Performance Maturity Assessment

Malicious Macros for Script Kiddies

Introduction Macros seem like the new hotness amongst hackers, but I thought macros were just simple scripts that some accountant in finance used to simplify their spreadsheets. How can I use and abuse these things to Hack the Planet and rule the world? How can something designed in the 90s still be relevant? In previous blog posts, I provided the foun
Publish At:2020-08-04 09:29 | Read:237 | Comments:0 | Tags:Penetration Testing Research Security Testing & Analysis

Thycotic Secret Server: Offline Decryption Methodology

On offensive engagements, we frequently encounter centralized internal password managers that are used by various departments to store incredibly sensitive account information, such as Domain Admin accounts, API keys, credit card data, the works. It used to be that these systems were implemented without multi-factor authentication. “Hacking” them was as simp
Publish At:2020-07-28 15:20 | Read:193 | Comments:0 | Tags:Application Security Assessment Penetration Testing Red Team

Securing Your Environment While Working Remotely

Before the coronavirus pandemic hit, working from home used to be a novelty for many employees. According to a June 2020 IBM Security and Morning Consult “Work From Home Survey,” 80% of respondents say they worked from home either rarely or not at all prior to the pandemic. In-office work allowed employers and information technology (IT) teams to
Publish At:2020-07-14 09:05 | Read:322 | Comments:0 | Tags:Incident Response Network Security Services Home Network Sec

8 Keys to Writing Safer Code

All too often, security in code is an afterthought. There’s a reason that bug bounties are so prevalent; as codebases get larger, testing gets harder. Add in the time constraints of a “move fast and break things” mentality and it’s no wonder so many security issues arise. The basics might be there, encrypted connections, hashed passwo
Publish At:2020-07-09 11:54 | Read:367 | Comments:0 | Tags:Application Security Assessment Penetration Testing Security

Google Tsunami vulnerability scanner is now open-source

Google announced that its Tsunami vulnerability scanner for large-scale enterprise networks is going to be open-sourced. Google has decided to release as open-source a vulnerability scanner for large-scale enterprise networks named Tsunami. “We have released the Tsunami security scanning engine to the open source communities. We hope t
Publish At:2020-07-09 04:30 | Read:443 | Comments:0 | Tags:Breaking News Hacking Google hacking news information securi

Adventures in Phishing Email Analysis

Opening Phishing attacks are a daily threat to all organizations and unfortunately, they are one of the hardest threats to protect against. No matter how many defensive layers an organization has put in place following best practice defense-in-depth design, it only takes one (1) user to click on that malicious link or open that weaponized attached documen
Publish At:2020-06-18 10:09 | Read:370 | Comments:0 | Tags:Incident Response Incident Response & Forensics Penetration

Workflow Improvements for Pentesters

As penetration testers, we are always on the lookout for quality of life improvements. Whether it’s scripting, automating some mundane process, or trying to conquer that all-important client report, it is in our very nature to constantly strive to make things better. One way to advance your art as a pentester is through workflow improvements. A lot
Publish At:2020-06-16 15:41 | Read:349 | Comments:0 | Tags:Penetration Testing Security Testing & Analysis

Abusing Windows Telemetry for Persistence

Today we’re going to talk about a persistence method that takes advantage of some of the wonderful telemetry that Microsoft has included in Windows versions for the last decade. The process outlined here affects Windows machines from 2008R2/Windows 7 through 2019/Windows 10.As of this posting, this persistence technique requires local admin rights to i
Publish At:2020-06-09 06:06 | Read:448 | Comments:0 | Tags:Application Security Assessment Penetration Testing Research

Introducing Proxy Helper – A New WiFi Pineapple Module

I have had several occasions when I’ve been performing a pentest against an Android or iOS application, attempting to monitor the traffic with Burp Suite, only to realize that the application is not respecting my proxy settings. Now, if you have a rooted or jailbroken device, there are some ways you can force the application to go through a proxy, but
Publish At:2020-05-26 13:56 | Read:340 | Comments:0 | Tags:Application Security Assessment Hardware Security Assessment

Refocusing Cybersecurity Best Practices on Security Hygiene

While organizations around the world are rightly focused on the COVID-19 pandemic, the work of cybersecurity must continue. In fact, attackers often increase their efforts to breach networks and systems during times of trouble, counting on the chaos as a useful distraction. In such times, the best cybersecurity practices should actually refocus on the most b
Publish At:2020-05-24 06:18 | Read:482 | Comments:0 | Tags:CISO Antivirus Chief Information Security Officer (CISO) Cyb


Tag Cloud