HackDig : Dig high-quality web security articles for hacker

Splunk Custom Search Command: Searching for MISP IOC’s

While you use a tool every day, you get more and more knowledge about it but you also have plenty of ideas to improve it. I’m using Splunk on a daily basis within many customers’ environments as well as for personal purposes. When you have a big database of events, it becomes quickly mandatory to deploy techniques to help you to extract juicy inf
Publish At:2017-10-31 14:55 | Read:643 | Comments:0 | Tags:MISP Security Splunk Hunting IOC Python

Automatic Extraction of Data from Excel Sheet

Excel sheets are very common files in corporate environments. It’s definitively not a security tool but it’s not rare to find useful information stored in such files. When these data must be processed for threat hunting or to collect IOC’s, it is mandatory to automate, as much as possible, the processing of data. Here a good example: Everyd
Publish At:2017-10-24 21:20 | Read:356 | Comments:0 | Tags:Software Unix Automation Excel Python Script Tool

FTP Injection flaws in Java and Python allows firewall bypass

The two programming languages, Java and Python, are affected by serious FTP Injection flaws that can be exploited by hackers to bypass any firewall. Attackers can trick Java and Python applications to execute rogue FTP commands that would open ports in firewalls The unpatched flaws reside in the way the two programming languages handle File Transfer Protocol
Publish At:2017-02-22 21:30 | Read:1723 | Comments:0 | Tags:Breaking News Hacking firewall FTP Injection Java Python sec

Digging for Security Bugs in Python Code

Python is a great development language for so many reasons. Its developers enjoy huge library support. Do you want to deploy a simple web server or implement a RESTful API? There are modules for that. Capture, analyze, and visualize network traffic flow? There are simple and free modules for all of that, too.Developers using Python can create a prototype in
Publish At:2017-01-25 09:35 | Read:1090 | Comments:0 | Tags:Off Topic Bandit BsidesSF python

KNXmap: A KNXnet/IP Scanning and Auditing Tool

Users of the KNX, a standard for home automation bus systems, may already have come across KNXnet/IP (also known as EIBnet/IP): It is an extension for KNX that defines Ethernet as a communication medium for KNX which allows communication with KNX buses over IP driven networks. Additionally, it enables one to couple multiple bus installations over IP gateways
Publish At:2016-09-05 10:50 | Read:1262 | Comments:0 | Tags:Announcements Tools Uncategorized IoT KNX python

Pentesting Webservices with Net.TCP Binding

Hi all, Most of you that are  pentesters  may have already tested plenty of webservices using SOAP (Simple Object Access Protocol) for communication. Typically, such SOAP messages are transferred over HTTP (Hypertext Transfer Protocol) and are encapsulated in XML (Extensible Markup Language). Microsoft has developed different representations of this protocol
Publish At:2016-08-02 22:10 | Read:1001 | Comments:0 | Tags:Security Tools negotiate net.tcp python wcf webservice

Implementing an Obsolete VPN Protocol on Top of HTTP: Because Why Not?

Recently I’ve started some research on MikroTik’s RouterOS, the operating system that ships with RouterBOARD devices. As I’m running such a device myself, one day I got curious about security vulnerabilities that have been reported on the operating system and the running services as it comes with tons of features. Searching for known vulner
Publish At:2016-05-31 16:40 | Read:1096 | Comments:0 | Tags:Tools crypto javascript MS-CHAP-V2 PPTP python RC4 RouterOS

Pupy – Open-Source Remote Administration Tool AKA RAT

Pupy is an open-source remote administration tool (RAT), that is cross platform and has an embedded Python interpreter, allowing its modules to load Python packages from memory and transparently access remote Python objects. Pupy can communicate using different transports and have a bunch of cool features & modules. On Windows, Pupy uses reflective dll injec
Publish At:2015-12-14 23:30 | Read:1629 | Comments:0 | Tags:Hacking Tools Python trojan rat open source rat python rat r

SprayWMI – PowerShell Injection Mass Spray Tool

SprayWMI is a method for mass spraying Unicorn PowerShell injection to CIDR notations. It’s an alternative to traditional, ‘noisy’ tools which leave something on the disk like PsExec, smbexec, winexe and so on.These tools have worked really well, however, they are fairly noisy creating a service and touching disk which will trigger modern d
Publish At:2015-12-08 04:45 | Read:1527 | Comments:0 | Tags:Exploits/Vulnerabilities Hacking Tools Windows Hacking power

Zarp – Network Attack Tool

Zarp is a network attack tool centred around the exploitation of local networks. This does not include system exploitation, but rather abusing networking protocols and stacks to take over, infiltrate, and knock out. Sessions can be managed to quickly poison and sniff multiple systems at once, dumping sensitive information automatically or to the attacker dir
Publish At:2015-11-28 09:40 | Read:968 | Comments:0 | Tags:Hacking Tools Network Hacking arp poisoning network attack n

Rekall – Memory Forensic Framework

Rekall is a memory forensic framework that provides an end-to-end solution to incident responders and forensic analysts. From state of the art acquisition tools, to the most advanced open source memory analysis framework.It strives to be a complete end-to-end memory forensic framework, encapsulating acquisition, analysis, and reporting. In particular Rekall
Publish At:2015-11-23 21:10 | Read:1308 | Comments:0 | Tags:Forensics cross platform memory analysis linux forensics mem

windows-privesc-check – Windows Privilege Escalation Scanner

Windows-privesc-check is standalone executable that runs on Windows systems. It tries to find misconfiguration that could allow local unprivileged users to escalate privileges to other users or to access local applications (e.g. databases).Essentially it’s a Windows privilege escalation scanner, the Microsoft side of the World counterpart to unix-prive
Publish At:2015-10-17 08:15 | Read:985 | Comments:0 | Tags:Security Software Windows Hacking PyInstaller Python windows

Twittor – Backdoor Using Twitter For Command & Control

Twittor is a stealthy Python based backdoor using Twitter (Direct Messages) as a command and control server. This project has been inspired by Gcat which does the same but using a Gmail account.SetupFor this to work you need:A Twitter account (Use a dedicated account! Do not use your personal one!)Register an app on Twitter with Read, write, and direct messa
Publish At:2015-10-09 13:05 | Read:928 | Comments:0 | Tags:Hacking Tools Programming backdoor command and control Pytho

HookME – API Based TCP Proxy Including SSL

HookME is a an API based TCP Proxy software designed for intercepting communications by hooking the desired process and hooking the API calls for sending and receiving network data (even SSL clear data). HookME provides a nice graphic user interface allowing you to change the packet content in real time, dropping or forwarding the packet.It also has a Python
Publish At:2015-10-02 19:05 | Read:1299 | Comments:0 | Tags:Hacking Tools Network Hacking api based tcp proxy hookme net

Weevely 3 – Weaponized PHP Web Shell

Weevely is a command line weaponized PHP web shell dynamically extended over the network at runtime and is designed for remote administration and pen testing. It provides a telnet-like console through a PHP script running on the target, even in restricted environments.The low footprint agent and over 30 modules shape an extensible framework to administrate,
Publish At:2015-09-18 18:40 | Read:1485 | Comments:0 | Tags:Hacking Tools Web Hacking command line web shell extensible


Share high-quality web security related articles with you:)


Tag Cloud