Blackhat.az

Loading...

Blackhat.az

Register

Blogs2

The objective was simple – see how susceptible the organization is from an external point of view and test the effectiveness of the security controls that are managed enterprise-wide. As such, asides, the company name, we were given “ZERO” information to perform an external black-box penetration Testing. This black-box external penetration Testing Performing with a by a client called (Hackme)  OSINT 101 We kicked off with some Open Source Intelligence (OSINT) 101 :). There are quite a
Cybersecurity researchers of FireEye’s Mandiant Advanced Practices team have revealed all the details regarding a new malware family that they have detected recently. This malware depends on the Common Log File System (CLFS) to cover a second-stage payload in registry transaction files so that they can easily evade detection mechanisms. The security experts from FireEye reported that the malware is being called PRIVATELOG, and its installer, STASHLOG. They generally specify the integrity of the cybercriminals, but the
Recently, the Singapore University of Technology and Design has published details of more than a dozen vulnerabilities in the Bluetooth Classic [BR/EDR] protocol. According to research, this can be utilized to implement a variety of malicious actions, like launching device failures to accomplishing arbitrary code, and taking control of an unsafe system. After going through the detected vulnerability the experts claimed that this vulnerability, is collectively known as BrakTooth, and it has affected SoCs from a number
  CDK is an open-sourced container penetration toolkit, designed for offering stable exploitation in different slimmed containers without any OS dependency. It comes with useful net-tools and many powerful PoCs/EXPs helps you to escape container and takeover K8s cluster easily. Currently still under development, submit issues or mail i@cdxy.me if you need any help. Installation Download latest release in: https://github.com/cdk-team/CDK/releases/ Drop executable files into target container and start testing. Usage Usage: cdk evaluate [--full] cdk run (--list | <exploit> [<args>...]) cdk auto-escape <cmd> cdk
Performing Man In The Middle Attacks with Kali Linux Man in the Middle attacks is some of the most frequently attempted attacks on network routers. They’re used mostly to acquire login credentials or personal information, spy on the Victim, or sabotage communications or corrupt data. A man in the middle attack is the one where an attacker intercepts the stream of back and forth messages between two parties to alter the messages or just read
Android is the biggest organized base of any mobile platform and developing fast—every day. Besides, Android is rising as the most extended operating system in this viewpoint because of different reasons. However, as far as security, no data related to the new vulnerabilities that could prompt to a weak programming on this stage is being revealed, realizing that this stage has an outstanding attack surface. Information gathering Information Gathering is the most basic stride of
A modern BeEF inspired framework for the 21st century. Cross-platform clients => Web [in-browser] and Desktop [Electron]. Created from-scratch using pure NodeJS and Typescript. What can it do? Create a reverse Javascript shell between the victim and the attacker. Records keystrokes and logs them to a database. Extract and log saved passwords from the browser. Docs Getting started Installing Development Setting up the dev-server Builds and deployment CircleCI TravisCI Docs site: https://injectify.js.org/        
You can find the essence of technology everywhere. As businesses increase their dependency on Information Technology including Cloud, IOT, mobile devices, and social media, their cyber risk continues to rise at an alarming rate. Almost every day, you can find a new headline regarding the latest cybersecurity attack. Hackers are improving their methods and are still stealing millions of records and billions of dollars at an alarming frequency. One way to combat these attacks is
OLE automation is a process through which an application can access and manipulate the implied objects in other applications. Hence, in this article, we will how to use OLE automation to our benefit. Table of Content: What is OLE Automation? What are Facets? How to enable OLE Automation? GUI CLI Exploiting OLE Automation Metasploit PowerUpSQL What is OLE Automation? OLE stands for Object Linking and Embedding. Microsoft develops this technology to make it easier for
In this article, we will learn all about CLR assembly functionality provided by Microsoft and how we can exploit it to our potential. Table of Content: What is Common Language Runtime Integration? Trustworthy Database Property Enabling CLRIntegration with GUI Check and Enabling Trustworthy Exploit CLR Assembly Creating a DLL File Assemble DLL file with GUI Enable CLRItegration with CLI Import CLR DLL into SQL Server PowerUpSQL (Manual) PowerUpSQL (Remote) Metasploit and PowerUpSQL Metasploit Conclusion What
In this article, we will learn in detail how to pentest MSSQL servers using the Metasploit framework. Table of Content: Introduction Identify the Server Retrieve login credentials Obtaining sysadmin privileges Exploiting xp_cmdshell MSSQL Enumeration Login User Enumeration Executing MSSQL Queries Mssql exec Executing SQL queries via .sql file Creating Database Find Sample Data SchemaDump Capturing MSSQL login Exploiting CLRIntegration Hashdump Introduction Metasploit is an excellent framework developed by H. D. Moore. It is a free
Windows-auditing-mindmap Project purpose Windows auditing mindmap provides a simplified view of Windows Event logs and auditing capacities that enables defenders to enhance visibility for different purposes: Log collection (eg: into a SIEM) Threat hunting Forensic / DFIR Troubleshooting Mindmaps The following mindmaps are currently provided: Windows OS auditing baseline Windows Server roles auditing (also covers SQL Server and Advanced Threat Analytics) Active Directory (ADDS) auditing Exchange Server auditing (planned) Azure (planned) Windows OS auditing baseline This