SecurityTracker.com


Being a security person, it is important that you keep track of the latest vulnerabilities, news and any sort that is related.  Refer securitytracker.com, one of the many places you can get updated.

Link: http://www.securitytracker.com/
Twitter: http://twitter.com/#!/securitytracker

 

 

 

 

 

 

 

Advertisements

Spying on your victim with Screenspy of Metasploit in Ubuntu!


Screenspy is a feature in Meterpreter which allows you to view what your targeted host is doing on his workstation.  It captures the images on your targeted host, sends it back to you on a set interval (in seconds) and you will look at it as if its live on your local machine.

Source: http://eromang.zataz.com/2011/02/08/metasploit-meterpreter-screenshot-and-screenspy-stdapi/

Cracking SMBNT with Medusa


As I am learning more about the SMB protocol for Windows, I came across Medusa.  So first thing I did was try and hook it up with a dictionary and attack my Windows OS which is on Windows 7.  After installing it, (see here to know how), I looked at the arguments and start cracking!  I tried cracking using THC-HYDRA but I had some difficulties at first.  The commands are pretty much the same if you look at it. Read the rest of this entry »

Medusa Parallel Network Login Auditor by Foofus


Something similar to THC-HYDRA, Medusa was written by JoMo-Kun from Foofus.

Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application:

  • Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently.
  • Flexible user input. Target information (host/user/password) can be specified in a variety of ways. For example, each item can be either a single entry or a file containing multiple entries. Additionally, a combination file format allows the user to refine their target listing.
  • Modular design. Each service module exists as an independent .mod file. This means that no modifications are necessary to the core application in order to extend the supported list of services for brute-forcing. Read the rest of this entry »

Winfingerprint | Enumeration phase!


Winfingerprint is a Win32 MFC VC++ .NET based security tool that is able to Determine OS, enumerate users, groups, shares, SIDs, transports, sessions, services, service pack and hotfix level, date and time, disks, and open tcp and udp ports.

Source: http://sourceforge.net/projects/winfingerprint/

Armitage | Beyond Metasploit


You might want to consider using Armitage as your primary arsenal apart from using Metasploit’s msfconsole or msfgui.

What Is Armitage

Armitage is a graphical cyber attack management tool for Metasploit that visualizes your targets, recommends exploits, and exposes the advanced capabilities of the framework. Read the rest of this entry »

What is Pass-The-Hash Toolkit?


The Pass-The-Hash Toolkit contains utilities to manipulate the Windows Logon Sessions mantained by the LSA (Local Security Authority) component. These tools allow you to list the current logon sessions with its corresponding NTLM credentials (e.g.: users remotely logged in thru Remote Desktop/Terminal Services), and also change in runtime the current username, domain name, and NTLM hashes (YES, PASS-THE-HASH on Windows!).

Source: http://oss.coresecurity.com/projects/pshtoolkit.htm