Month: July 2018


Earn Bitcoins just by surfing Online !

Use CryptoTab as your default browser to maximize your revenue Mining speed increases when your browser is active. Use CryptoTab browser for your everyday activities, visit your favorite sites, watch movies online, and take advantage of maximum mining power. Browser with built-in mining CryptoTab Browser includes built-in mining algorithm that allows using your computer resources more effectively than in extension format. It boosts your mining speed up to 8 times and increases BTC earnings. Enhance your browser with over 150 thousand extensions Set up…


Cerberus Linux v1 Subsystem for Windows 10!

Cerberus Linux subsystem is Linux to run on top windows! like the picture bellow^^^ Cerberus linux v1 tools and extras : 15 new Cerberus Frameworks : Metapackages , containers with custom scripts within! Exploits (to analyze): EARLYSHOVEL RedHat 7.0 – 7.1 Sendmail 8.11.x exploit EBBISLAND (EBBSHAVE) root RCE via RPC XDR overflow in Solaris 6, 7, 8, 9 & 10 (possibly newer) both SPARC and x86. ECHOWRECKER remote Samba 3.0.x Linux exploit. EASYBEE appears to be an MDaemon email server vulnerability EASYFUN EasyFun 2.2.0 Exploit for WDaemon…


Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…


Cerberus Linux v3

  Cerberus Linux v3  Cerberus is a penetration testing distribution focusing on automation and anonymity , it aims to have the best tools available on the hacking scene tools like Fuzzbunch, Dandespritz, Cobalt strike, Armitage, Metasploit framework and Metasploit community version set up and ready for use!! It includes custom scripts, custom themes, custom icons!Cerberus distribution is based on Debian testing, it has the capability to use 3 repositories to install packages from kali repo,Debian repo, and cyber sec repo! Cerberus is an Angry…

Active DirectoryMacNEW TOOLSResponderSMBSMB RelayUsernames

Ridrelay – Quick And Easy Way To Get Domain Usernames While On An Internal Network

Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv. Quick and easy way to get domain usernames while on an internal network.How it worksRidRelay combines the SMB Relay attack, common lsarpc based queries and RID cycling to get a list of domain usernames. It takes these steps:Spins up an SMB server and waits for an incoming SMB connectionThe incoming credentials are relayed to a specified target, creating a connection with the context of the relayed userQueries are…

Cyber ThreatsEDITOR’S NEWS

Mimecast acquires Israeli cybersecurity vendor Solebit for $88m

UK data security company Mimecast Ltd. today announced that it has acquired Israeli cybersecurity company Solebit for $88 million. This will mean the Herzilya based company will now become Mimecast’s Isreal development centre. Solebit provides a fast, accurate and computationally efficient approach for the identification and isolation of zero-day malware and unknown threats in data files as well as links to external resources. Mimecast says that the acquired cybersecurity technology will enhance its cyber resilience platform architecture and that Solebit provides powerful threat protection to help…

Cyber ThreatsTOP 10 STORIES

Chinese “hackers” are sending malware via snail mail

In what amounts to one of the simplest but most baffling forms of social engineering,  hackers from China have taken to sending CDs full of malware to state officials, leading the Multi-State Information Sharing and Analysis Center, a government security outfit, to release a warning detailing the scam. The trick is simple: a package arrives with a Chinese postmark containing a rambling message and a small CD. The CD, in turn, contains a set of Word files that include script-based malware. These scripts run…

Cyber ThreatsTOP 10 STORIES

How hack on 10,000 WordPress sites was used to launch an epic malvertising campaign

Security researchers at Check Point have lifted the lid on the infrastructure and methods of an enormous “malvertising” and banking trojan campaign. The operation delivered malicious adverts to millions worldwide, slinging all manner of nasties including crypto-miners, ransomware and banking trojans. View Full Story ORIGINAL SOURCE: The Register The post How hack on 10,000 WordPress sites was used to launch an epic malvertising campaign appeared first on IT SECURITY GURU.

DistributedDoSDoS Test ToolGoldenEyeNEW TOOLS

GoldenEye v1.2.0 – Layer 7 (KeepAlive+NoCache) DoS Test Tool

GoldenEye is an python app for SECURITY TESTING PURPOSES ONLY!GoldenEye is a HTTP DoS Test Tool.Attack Vector exploited: HTTP Keep Alive + NoCacheUsage USAGE: ./ <url> [OPTIONS] OPTIONS: Flag Description Default -u, --useragents File with user-agents to use (default: randomly generated) -w, --workers Number of concurrent workers (default: 50) -s, --sockets Number of concurrent sockets (default: 30) -m, --method HTTP Method to use 'get' or 'post' or 'random' (default: get) -d, --debug Enable Debug Mode [more verbose output] (default: False) -n, --nosslcheck Do not…

Cyber ThreatsEDITOR’S NEWS

Most common web-based vulnerabilities still prevalent after nine years

Analysis of vulnerabilities discovered by NCC Group researchers over the last nine years found that instances of common web-based vulnerabilities have largely refused to fall over during this time, with cross-site scripting (XSS) vulnerabilities appearing the most frequently.   The global cyber security and risk mitigation expert found that despite this type of vulnerability being understood across the industry for decades, XSS flaws, which enable attackers to inject malicious scripts into websites or victim browsers, still account for 18% of all bugs logged.  …

Cyber ThreatsEDITOR’S NEWS

UK Card Fraud Falls 8 Percent in 2017 as Criminals Seek New Battlegrounds

Silicon Valley analytic software firm FICO today released its annual interactive map which reveals changes in card fraud across Europe. Based on data from Euromonitor International and UK Finance, the map shows which countries have made significant gains in the fight against payments card fraud in 2017. France and the UK achieved reductions of 6 and 8 percent, respectively, for the biggest reductions in net fraud losses. This is despite losses across the 19 countries surveyed rising by €30 million, or 2 percent.  …

Cyber ThreatsEDITOR’S NEWS

ICO reveals fivefold increase in personal data breach reports

The Information Commissioner’s Office (ICO) has revealed a big rise in the number of self-reported personal data breach notifications in the first full month following the introduction of the new General Data Protection Regulation (GDPR). During a webinar for data controllers posted on the ICO website, Laura Middleton, head of the ICO’s personal data breach reporting team revealed there were 1,792 personal data breaches notified to the ICO in June, following the introduction of the GDPR on 25 May 2018. This was a 173…

Cyber ThreatsTOP 10 STORIES

Cosco Systems Fully Recovered from Cyber Attack

China’s state-run COSCO Shipping Lines said Monday its network applications in the Americas have been completely recovered after the company’s operations had been hit by a cyberattack last week. View Full Story ORIGINAL SOURCE: American Shipper The post Cosco Systems Fully Recovered from Cyber Attack appeared first on IT SECURITY GURU.