PRINT
PRINT
SEND MAIL
SEND MAIL

Month: November 2017

Debian

Cerberus Linux v3

  Cerberus Linux v3  Cerberus is a penetration testing distribution focusing on automation and anonymity , it aims to have the best tools available on the hacking scene tools like Fuzzbunch, Dandespritz, Cobalt strike, Armitage, Metasploit framework and Metasploit community version set up and ready for use!! It includes custom scripts, custom themes, custom icons!Cerberus distribution is based on Debian testing, it has the capability to use 3 repositories to install packages from kali repo,Debian repo, and cyber sec repo! Cerberus is an Angry…

Windows Hacking

Black Window 10 Enterprise

Black Window 10 Enterprise is the first windows based penetration testing distribution with linux integraded ! The system comes activated with a digital license for windows enterprise ! It supports windows apps and linux apps, gui and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of cerberus linux! It has managed to implement cerberus os within windows.Offers the stability of a windows system and it offers the hacking part with a…

METASPLOIT TUTORIALS

Announcing the Metasploitable3 Community CTF

Been waiting for the Linux version of Metasploitable3 to drop? We’ll do you one better: Metasploit is giving the community a week to rain shells on a penguin-shaped Metasploitable3 instance—and to win prizes at the end of it. Play starts December 4; see below for full competition details. TL;DR: Sign up, drop shells, win stuff. Not into capturing flags but jonesing for a look at the code? We’ll release the Linux Metasploitable3 source code to the community soon after the competition ends. Happy hacking!…

Kali LinuxTUTORIALS

How to install kali linux within windows 10!

Things you need: First, you need to have Windows 10 system then according to Microsoft's instructions to enable   and install WSL and Python 3.0. Python 3.5 WSL-Distribution-Switcher Git Step 1 Once you’re sure you’re using the correct version of Windows 10 Anniversary Update, open the Settings app and head to Update & Security > For Developers. Activate the “Developer Mode” switch here to enable Developer Mode. Next, open the Control Panel, click “Programs,” and click “Turn Windows Features On or Off” under Programs and Features. Enable the…

TUTORIALS

SAML Post-Intrusion Attack Mirrors ‘Golden Ticket’

Researchers at CyberArk Labs have created a post-intrusion attack technique known as a Golden SAML that could allow an attacker to fake enterprise user identities and forge authentication to gain access to valuable cloud resources in a federation environment. “Using this post-exploit technique, attackers can become any user they want to be – with the highest level of privileges – and gain approved, federated access to a targeted app,” according to CyberArk Labs who revealed the attack technique this week. Related PostsUber Reveals 2016…

New Releases

Cerberus Futuristic Desktop (Kerberos Update)

Cerberus Teaser Cerberus Gnu Debian Linux Cerberus is a penetration testing distribution focusing on automation and anonymity , it aims to have the best tools available on the hacking scene tools like : Fuzzbunch,Dandespritz, Cobalt strike , Armitage , Metasploit framework and metasploit cummunity version set up and ready for use!!It includes custom scripts ,custom themes,custom icons !Cerberus distribution is based on debian testing ,it has the capability to use 3 repositories to install packages from kali repo,debian repo and cybersec repo! Cerberus is…

TUTORIALS

Uber Reveals 2016 Breach of 57 Million User Accounts

Ride-hailing service Uber Technologies revealed Tuesday that the company suffered a breach of 57 million Uber user accounts in 2016. According to reports, Uber then attempted to cover up the incident by paying $100,000 to attackers to keep the hack a secret and delete the data. The breach and subsequent failure to properly disclose the incident also cost Uber’s chief security officer Joe Sullivan and one of his deputies their jobs. Related PostsCENTCOM Says Massive Data Cache Found on Leaky Server is Benign November…

METASPLOIT TUTORIALS

How to Remotely Grab a Screenshot of Someone’s Compromised Computer

Set Up the Hack First , let's select an exploit to use. Since he's using a Windows Server 2003 system, I like to use the MS08_067_ netapi exploit, so let's type: msf > use exploit/windows/smb/ms08_067_netapi To simplify our screen captures, we'll need to use Metasploit's Meterpreter payload. Let's load it into our exploit by: msf > (ms08_067_netapi) set payload windows/meterpreter/reverse_tcp Next, we need to set our options. At this point, I like to use the "show options" command to see what options are necessary to run…

TUTORIALS

US-CERT Warns of ASLR Implementation Flaw In Windows

The U.S. Computer Emergency Readiness Team is warning of a vulnerability in Microsoft’s implementation of Address Space Layout Randomization that affects Windows 8, Windows 8.1 and Windows 10. The vulnerability could allow a remote attacker to take control of an affected system. Microsoft said it is investigating the matter. Related PostsMicrosoft Patches 20 Critical Vulnerabilities November 14, 2017 , 5:10 pmGoogle Patches KRACK Vulnerability in Android November 8, 2017 , 10:10 amTor Browser Users Urged to Patch Critical ‘TorMoil’ Vulnerability November 4, 2017 ,…

TUTORIALS

Command and Control – WMI

Command and Control – WMI November 20, 2017 netbiosXRed TeamC2, Command and Control, Penetration Testing, Red Team, WMI1 Comment Windows Management Instrumentation (WMI) is a Microsoft technology that was designed to allow administrators to perform local and remote management operations across a network. Since WMI is part of the windows ecosystem which exist since Windows 98 it can be used in almost every network regardless if it is running Windows 10 or Windows XP. Some of the operations that can be performed via WMI…