CVE Feeds

Sep 18, 2014

Tools: PoisonShell PHP Backdoor

PoisonShell is a simple PHP shell that has several options

Source: http://packetstormsecurity.com/files/128249/poison.zip

If you like my blog, Please Donate Me
Or Click The Banner For Support Me.

Tools: tinfoleak – Get detailed information about a Twitter user activity



tinfoleak is a simple Python script that allow to obtain:
  • basic information about a Twitter user (name, picture, location, followers, etc.)
  • devices and operating systems used by the Twitter user
  • applications and social networks used by the Twitter user
  • place and geolocation coordinates to generate a tracking map of locations visited
  • show user tweets in Google Earth!
  • download all pics from a Twitter user
  • hashtags used by the Twitter user and when are used (date and time)
  • user mentions by the the Twitter user and when are occurred (date and time)
  • topics used by the Twitter user
You can filter all the information by:
  • start date / time
  • end date / time
  • keywords


Source: http://vicenteaguileradiaz.com/tools/

If you like my blog, Please Donate Me
Or Click The Banner For Support Me.

Sep 16, 2014

Tools: iLoot - Download backup of device from iCloud


Using this CLI tool you can download backups of devices assigned to your AppleID. Based on iphone-dataprotection script, so copyrights belong to respective owners. Offset operations added and other minor bugs fixed.

Source: https://github.com/hackappcom/iloot

If you like my blog, Please Donate Me
Or Click The Banner For Support Me.

Sep 14, 2014

Tools: Nethogs - Monitoring Traffic tool per protocol or per subnet

NetHogs is a small 'net top' tool. Instead of breaking the traffic down per protocol or per subnet, like most tools do, it groups bandwidth by process. NetHogs does not rely on a special kernel module to be loaded. If there's suddenly a lot of network traffic, you can fire up NetHogs and immediately see which PID is causing this. This makes it easy to indentify programs that have gone wild and are suddenly taking up your bandwidth.  

Source: http://nethogs.sourceforge.net/

If you like my blog, Please Donate Me
Or Click The Banner For Support Me.

Sep 8, 2014

CheatSheet: SSL Checklist for Pentesters

SSL Checklist for Pentesters

https://www.nccgroup.com/en/learning-and-research-centre/presentations/ssl-checklist-for-pentesters/



If you like my blog, Please Donate Me
Or Click The Banner For Support Me.

Howto: Ubuntu Radius Authenticaition[FreeRadius Server] with pam_radius_auth.so

1. Install pam_radius_auth

2. In /etc/pam.d/common-auth, use this configure in Auth part.
auth [success=done auth_err=bad default=ignore] pam_radius_auth.so localifdown debug
auth sufficient pam_unix.so nullok try_first_pass

3. Now, if you login to your console(tty), it will authenticate with Radius server and if your pc cannot connect to Radius Server, it will authenticate with local system unix authentication.

Reference::
- http://docs.oracle.com/cd/E37670_01/E36387/html/ol_pam_sec.html
- http://www.rjsystems.nl/en/2100-pam-debian.php
- http://freeradius.org/pam_radius_auth/ 
 


If you like my blog, Please Donate Me
Or Click The Banner For Support Me.

Sep 2, 2014

Howto: Web Defense – Apache2 Examples

Source: https://www.defcon.org/images/defcon-22/dc-22-presentations/Self/DEFCON-22-Blake-Self-cisc0ninja-Dont-DDOS-me-bro-UPDATED.pdf

.htaccess
Block him:
SetEnvIf User-Agent ”.*Fuck.*" Skid=1
Deny from env=Skid


.htaccess + mod_rewrite
Redirect him to himself:
<IfModule mod_rewrite.c>
RewriteCond %{HTTP_USER_AGENT} ^.*Fuck.*$
RewriteRule .* http://%{REMOTE_ADDR}/ [R,L]
</IfModule>
Redirect him somewhere more interesting:
<IfModule mod_rewrite.c>
RewriteCond %{HTTP_USER_AGENT} ^.*Fuck.*$
RewriteRule .* http://www.fbi.gov/ [R,L]
</IfModule>

Mod_evasive sample config
<IfModule mod_evasive20.c>
DOSHashTableSize 3097
DOSPageCount 3
DOSSiteCount 50
DOSPageInterval 3
DOSSiteInterval 5
DOSBlockingPeriod 1800
DOSEmailNotify shinobi@gmail.com
DOSLogDir /var/log/mod_evasive
DOSWhitelist 192.168.42.*
</IfModule>




If you like my blog, Please Donate Me
Or Click The Banner For Support Me.

Howto: Block TOR Client with IPTABLES

Source: https://www.defcon.org/images/defcon-22/dc-22-presentations/Self/DEFCON-22-Blake-Self-cisc0ninja-Dont-DDOS-me-bro-UPDATED.pdf

#!/bin/bash
# Block Tor Exit nodes
IPTABLES_TARGET="DROP"
IPTABLES_CHAINNAME="TOR”
if ! iptables -L TOR -n >/dev/null 2>&1 ; then 

  iptables -N TOR >/dev/null 2>&1
  iptables -A INPUT -p tcp -j TOR 2>&1
fi

cd /tmp/
echo -e "\n\tGetting TOR node list from dan.me.uk\n"
wget -q -O - "https://www.dan.me.uk/torlist/" -U SXTorBlocker/1.0 > /tmp/full.tor
sed -i 's|^#.*$||g' /tmp/full.tor
iptables -F TOR CMD=$(cat /tmp/full.tor | uniq | sort)
for IP in $CMD; do
  let COUNT=COUNT+1
  iptables -A TOR -s $IP -j DROP

done
iptables -A TOR -j RETURN echo -e "\n\tiptables is now blocking TOR connections\n”
rm /tmp/full.tor




If you like my blog, Please Donate Me
Or Click The Banner For Support Me.

Aug 28, 2014

Videos: Passwordscon 2014 Videos

www.irongeek.com/i.php?page=videos%2Fpasswordscon2014%2Fmainlist


If you like my blog, Please Donate Me
Or Click The Banner For Support Me.

Videos: TakeDownCon Rocket City 2014 Videos

http://www.irongeek.com/i.php?page=videos/takedowncon-rocketcity-2014/mainlist

If you like my blog, Please Donate Me
Or Click The Banner For Support Me.
 

Sponsors

lusovps.com

Blogroll

About

 Please subscribe my blog.

 Old Subscribe

Share |