HackDig : Dig high-quality web security articles for hacker

Post #WannaCry Reaction #127: Do I Need a Pen Test?

By Daniel MiesslerIn the wake of WannaCry and other recent events, everyone from the Department of Homeland Security to my grandmother are recommending penetration tests as a silver bullet to prevent falling victim to the next cyber attack. But a penetration test is not a silver bullet, nor is it universally what is needed for improving the security po
Publish At:2017-05-20 01:45 | Read:2624 | Comments:0 | Tags:#WannaCry cyber attack daniel meissler ioactive penetration

SecureLayer7 Gratis PenTest Summer 2017

Overview Under the Gratis Pentest 2016, we have evaluated security postures of two open source applications i.e. Refinery CMS, PageKit CMS. We perform the penetration testing for the deserving Open Source Application as SecureLayer7’s contribution to Open Source Community. We allocate two or three days full time from our working hours, to yield a numbe
Publish At:2017-02-26 04:25 | Read:2050 | Comments:0 | Tags:News penetration testing pentest

PageKit Open Source CMS Penetration Test

Overview Under the SecureLayer7’s Gratis Pentest Summer 2016, our consultant “Saurabh Banawar” have performed the 2 days penetration testing on the PageKit open source CMS application. Following vulnerabilities Saurabh have found during the penetration testing. Vertical/Horizontal Authentication Bypass or Password Reset Vulnerability (Crit
Publish At:2017-01-31 19:45 | Read:2167 | Comments:0 | Tags:Knowledge-base SecureLayer7 Services penetration testing pen

Pentest Toolbox Additions 2016

I’ve added some handy tools to my pentest toolbox this year. You’ll find a short description of each with links to more information below. Whether red or blue team, you’ll want to know what these tools can do.Password SprayingPassword spraying is guessing a few passwords against a large list of users in order to avoid account lockout. You w
Publish At:2016-11-08 16:05 | Read:3585 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Blue Team

Some Notes on Utilizing Telco Networks for Penetration Tests

After a couple of years in pentesting Telco Networks, I’d like to give you some insight into our pentesting methodology and setup we are using for testing “Mobile and Telecommunication Devices”. I am not talking about pentesting professional providers’ equipment (as in previous blogposts), it is about pentesting of devices that have a
Publish At:2016-05-25 14:40 | Read:3180 | Comments:0 | Tags:Security Tools 2G gsm IoT pentest sms Telco

The iOS Get out of Jail Free Card

By Michael Allen @_Dark_Knight_If you haveever been part of a Red Team engagement, you will be familiar with the “Get outof Jail Free Card". In a nutshell, it’s a signed document giving youpermission to perform the activity you were caught doing. In some instances,it’s the difference between walking away and spending the night in a jail ce
Publish At:2015-09-16 00:30 | Read:3685 | Comments:0 | Tags:hacking iOS iOS hacking michael allen mobile apps mobile hac

Saving Polar Bears When Banner Grabbing

As most of us know, the Earth’s CO2 levels keep rising, which directly contributesto the melting of our pale blue dot’s icecaps. This is slowly but surely makingit harder for our beloved polar bears to keep on living. So, it’s time for usinformation security professionals to help do our part. As we all know, everypacket traveling over the
Publish At:2015-07-30 10:25 | Read:8271 | Comments:0 | Tags:hacking ioactive labs tools penetration testing pentest port

PwC chooses ImmuniWeb for vulnerability and penetration testing

PwC chooses ImmuniWeb for vulnerability and penetration testing Posted by Kevin on July 14, 2015.PCI DSS mandates at least annual vulnerability scanning and penetration testing. But there are well known problems with both. Vulnerability scanning on its own is not ultimately enough; and
Publish At:2015-07-14 23:15 | Read:3017 | Comments:0 | Tags:News News_cloud News_vulnerabilities ImmuniWeb pentest vulne

The Evil CVE: CVE-666-666 – “Report Not Read”

I had an interesting discussion with a friend this morning. He explained that, when he is conducting a pentest, he does not hesitate to add sometimes in his report a specific finding regarding the lack of attention given to the previous reports. If some companies are motivated by good intentions and ask for regular pentests against their infrastructure or a
Publish At:2015-02-27 00:45 | Read:2563 | Comments:0 | Tags:Pentesting Security CVE Pentest Report

My Little Pwnie Box

As a pentester, I’m always trying to find new gadgetstools to improve my toolbox. A few weeks ago, I received my copy of Dr Philip Polstra’s book: “Hacking and Penetration Testing with Low Power Devices” (ISBN: 978-0-12-800751-8). I had a very interesting chat with Phil during the last BruCON edition and I was impressed by his “
Publish At:2015-02-19 19:30 | Read:4250 | Comments:0 | Tags:Hardware Pentesting Security Beagle Beaglebone Pentest The D

Weekly Metasploit Wrapup: SQL Server Privileges, Templating New Modules

Microsoft SQL Server Pen-Tester Pro TipThis week, we've landed a trio of fun and interesting modules from long-time Metasploit community contributor Scott nullbind Sutherland which automate up a couple Pro Tips on what to do when you've scored a login on a Microsoft SQL Server during a penetration test. One of these is a method to escalate the privileges of
Publish At:2014-11-14 13:50 | Read:3279 | Comments:0 | Tags:udp mssql database pentest templates weekly-wrapup

A Quick Peek at Network Injection

Like many of you, I’ve been looking at the various NSA document leaks to see what kind of tools and techniques are being used. I suppose these releases will give cybercriminals new ideas and we will see some of these put to nefarious use sooner than later. This particular article was very interesting, especially the concept of network injectors. I
Publish At:2014-08-21 09:00 | Read:7508 | Comments:0 | Tags:Pentest Tools inject intercept network injection poc

Automated vs hybrid vulnerability scanning

Automated vs hybrid vulnerability scanning A CIO’s experienceAleksandr Kirpo, CSO of the credit card processing Ukranian Processing CenterYou will have heard about programs that perform automated security scanning for website safety assessments. Such scanning software was developed in
Publish At:2014-08-15 10:39 | Read:2653 | Comments:0 | Tags:Whitepapers High-Tech Bridge ImmuniWeb pentest Qualys securi

Basic Data Exfiltration

So you pwned the system and got root access, awesome but what's next? Oh, I need to get the /etc/passwd and /etc/shadow out for a start. Ok how?There are a couple of ways to do it:1. Meterpreter's 'download' commandIt's great if you're using meterpreter as the payload. Simple and hassle free. Just 'cd' and 'pwd' through the victim machine's directory withou
Publish At:2014-08-12 20:06 | Read:3093 | Comments:0 | Tags:data exfil exfiltration meterpreter netcat pentest ssh wget

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud