PRINT
PRINT
SEND MAIL
SEND MAIL
Cyber ThreatsTOP 10 STORIES

JavaScript Web Apps and Servers Vulnerable to ReDoS Attacks

JavaScript web apps and web servers are susceptible to a specific type of vulnerabilities/attacks known as regular expression (regex) denial of service (ReDoS). These vulnerabilities take place when an attacker sends large and complex pieces of text to the open input of a JavaScript-based web server or app. View Full Story ORIGINAL SOURCE: Bleeping Computer The post JavaScript Web Apps and Servers Vulnerable to ReDoS Attacks appeared first on IT SECURITY GURU.

Cyber ThreatsTOP 10 STORIES

EU considers 60-minute deadline for social networks to remove terrorist content

No longer the carrot, now the stick: the European Commission is considering imposing an hour-long deadline for social networks to remove terrorist and extremist content after voluntary measures appear to have failed. View Full Story ORIGINAL SOURCE: ZDNet The post EU considers 60-minute deadline for social networks to remove terrorist content appeared first on IT SECURITY GURU.

Cyber ThreatsTOP 10 STORIES

Botnet of smart air conditioners and water heaters could bring down the power grid

If smart appliances that can be remotely controlled over the internet were to be compromised and used in a botnet, then attackers could cause local power outages or even large-scale blackouts, according to a presentation given by Princeton University researchers at the USENIX Security Symposium. View Full Story ORIGINAL SOURCE: CSO Online The post Botnet of smart air conditioners and water heaters could bring down the power grid appeared first on IT SECURITY GURU.

Cyber ThreatsTHIS WEEK’S GURUS

Tech giants warn Coalition bill opens customers up to cyber attack

The peak body representing tech giants Facebook, Google, Twitter and Amazon has blasted a Coalition bill that would force them to assist law enforcement agencies in decrypting private communications. View Full Story ORIGINAL SOURCE: The Guardian The post Tech giants warn Coalition bill opens customers up to cyber attack appeared first on IT SECURITY GURU.

Cyber ThreatsTOP 10 STORIES

Hacking prosecutions fall for a further year despite the threat of cyber crime

The number of computer hacking prosecutions fell for the second successive year in 2017, despite the ever-increasing threat to businesses and individuals, says RPC, the City-headquartered law firm. View Full Story ORIGINAL SOURCE: London Loves Business The post Hacking prosecutions fall for a further year despite the threat of cyber crime appeared first on IT SECURITY GURU.

EXPLOIT-COLLECTORHacking ToolsHash CrackerHomePassword Cracking

dcipher – Online Hash Cracking Using Rainbow & Lookup Tables

dcipher is a JavaScript-based online hash cracking tool to decipher hashes using online rainbow & lookup table attack services. The capacity to programmatically crack passwords is also a function of the number of possible passwords per second which can be checked. If a hash of the target password is available to the attacker, this number can be in the billions or trillions per second, since an offline attack is possible. In this case dcipher uses online hash checking services, which have extremely large Rainbow…

AWSAWS IAMCloudSploit ScansEC2MisconfigurationNEW TOOLSNodeJSScanScriptsSecurity Audit

CloudSploit Scans – AWS Security Scanning Checks

CloudSploit scans is an open-source project designed to allow detection of security risks in an AWS account. These scripts are designed to run against an AWS account and return a series of potential misconfigurations and security risks.InstallationEnsure that NodeJS is installed. If not, install it from here.git clone git@github.com:cloudsploit/scans.gitnpm installSetupTo begin using the scanner, edit the index.js file with your AWS key, secret, and optionally (for temporary credentials), a session token. You can also set a file containing credentials. To determine the permissions associated…

penetration testingTUTORIALS

Windows Privilege Escalation (AlwaysInstallElevated)

Hello Friends!! In this article we are demonstrating the Windows privilege escalation method via the method of AlwaysInstallElevated policy. In penetration testing, when we spawn command shell as local user, it is possible to exploit the vulnerable features (or configuration settings) of Windows Group policy, to further elevate them to admin privileges and gain the administrator access Table of Content Introduction Lab setup Spawn command shell as local user Escalate privilege manually via .msi payload (MSfvenom) Escalated privilege via Adding user Administrators Group (Msfvenom)…

Exchange ServicesHiddenNBNSNEW TOOLSNTLMNtlmRelayToEWSSMB

NtlmRelayToEWS – Ntlm Relay Attack To Exchange Web Services

ntlmRelayToEWS is a tool for performing ntlm relay attacks on Exchange Web Services (EWS). It spawns an SMBListener on port 445 and an HTTPListener on port 80, waiting for incoming connection from the victim. Once the victim connects to one of the listeners, an NTLM negociation occurs and is relayed to the target EWS server.Obviously this tool does NOT implement the whole EWS API, so only a handful of services are implemented that can be useful in some attack scenarios. I might be adding…