Month: July 2020

NEW TOOLSScanWebAppPort ForwardingKubernetes SecurityEffortless IntegrationsKubei

Kubei – A Flexible Kubernetes Runtime Scanner

Kubei is a vulnerabilities scanning tool that allows users to get an accurate and immediate risk assessment of their kubernetes clusters. Kubei scans all images that are being used in a Kubernetes cluster, including images of application pods and system pods. It doesn’t scan the entire image registries and doesn’t require preliminary integration with CI/CD pipelines.It is a configurable tool which allows users to define the scope of the scan (target namespaces), the speed, and the vulnerabilities level of interest.It provides a graphical UI…

TUTORIALSWebsite Hacking

Comprehensive Guide to Remote File Inclusion (RFI)

Have you ever wondered about the URL of the web-applications, some of them might include files from the local or the remote servers as either “page=” or “file=”. I hope you’re aware of the File Inclusion vulnerability. If not, I suggest you revisit our previous article for better understanding, before going deeper with the Remote File Inclusion Vulernabilty implemented in this section. Table of Content Introduction to RFI Why Remote file Inclusion Occurs? Remote File Inclusion Exploitation Basic Remote File Inclusion Reverse Shell through…

NEW TOOLSDLLPrivilege EscalationMisconfigurationMisconfigurationsdazzleUP

dazzleUP – A Tool That Detects The Privilege Escalation Vulnerabilities Caused By Misconfigurations And Missing Updates In The Windows OS

A tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates in the Windows operating systems. dazzleUP detects the following vulnerabilities.Exploit ChecksThe first feature of dazzleUP is that it uses Windows Update Agent API instead of WMI (like others) when finding missing patches. dazzleUP checks the following vulnerabilities.DCOM/NTLM Reflection (Rotten/Juicy Potato) VulnerabilityCVE-2019-0836CVE-2019-0841CVE-2019-1064CVE-2019-1130CVE-2019-1253CVE-2019-1385CVE-2019-1388CVE-2019-1405CVE-2019-1315CVE-2020-0787CVE-2020-0796dazzleUP do exploit checks when target system is Windows 10 operating system (builds 1809, 1903, 1909 and 2004) that are currently supported by Microsoft. If run on an unsupported operating…

Security FeedsMalware DescriptionsFeaturedTargeted AttacksMalware Technologies

WastedLocker: technical analysis

The use of crypto-ransomware in targeted attacks has become an ordinary occurrence lately: new incidents are being reported every month, sometimes even more often. On July 23, Garmin, a major manufacturer of navigation equipment and smart devices, including smart watches and bracelets, experienced a massive service outage. As confirmed by an official statement later, the cause of the downtime was a cybersecurity incident involving data encryption. The situation was so dire that at the time of writing of this post (7/29) the operation of…

NEW TOOLSDorksSensitive InformationBash ScriptinguDorkGoogle HackingGoogle Search

uDork – Tool That Uses Advanced Google Search Techniques To Obtain Sensitive Information In Files Or Directories, Find IoT Devices, Detect Versions Of Web Applications, And So On

uDork is a script written in Bash Scripting that uses advanced Google search techniques to obtain sensitive information in files or directories, find IoT devices, detect versions of web applications, and so on.uDork does NOT make attacks against any server, it only uses predefined dorks and/or official lists from (Google Hacking Database: ).New functional version: v.2.0Author: M3n0sD0n4ldTwitter: @David_UtonDownload and install:$ git clone cd uDork$ chmod +x Open the file "" and write inside this line:$ ./ -hSteps to obtain the cookie and…

TUTORIALSPentest Lab Setup

Penetration Testing Lab Setup:MS-SQL

Today you will learn how to install and configure MS SQL server in windows server 2019 operating system for penetration testing within the VM Ware. MSSQL is Microsoft SQL Server for database management in the network. By default, it runs on port 1433. Table of Content Configure SQL express setup Feature Selection Instance Configuration Database Engine Configuration Configure SQL Management Studio setup Connect to server from windows 10 Requirement: Download setup file ENU\x64\SQLEXPR_x64_ENU.exe Download setup file ENU\x86\SQLManagementStudio_x86_ENU.exe from Download heidisql tool Configure SQL express setup…

NEW TOOLSOpen RedirectOpen Redirection DetectionOpen Redirection FuzzerOralyzer

Oralyzer – Tool To Identify Open Redirection

Oralyzer, a simple python script, capable of identifying the open redirection vulnerability in a website. It does that by fuzzing the url i.e. provided as the input.FeaturesOralyzer can identify different types of Open Redirect Vulnerabilities :Header BasedJavascript BasedMeta Tag BasedInstallationOralyzer is built with python3.6 and hence aforesaid version would be ideal for it's smooth functioning.$ git clone pip3 install -r requirements.txtUsageDownload Oralyzer


Sunset: Midnight Vulnhub Walkthrough

Today we are going to solve another boot2root challenge called “Sunset: Midnight”.  It’s available at VulnHub for penetration testing and you can download it from here. The credit for making this lab goes to whitecr0wz. Let’s get started and learn how to successfully break it down. Level: Intermediate Penetration Testing Methodology Reconnaissance Netdiscover Nmap Enumeration Hydra bruteforce MySQL service Exploiting WordPress administrator’s password change Modification of code to build a webshell Privilege Escalation Misuse of recycled passwords Binary abuse without fixed load path Capture…

NEW TOOLSREST APINodeDashboardOpenshiftKubebox

Kubebox – Terminal And Web Console For Kubernetes

Terminal and Web console for KubernetesFeatures Configuration from kubeconfig files (KUBECONFIG environment variable or $HOME/.kube) Switch contexts interactively Authentication support (bearer token, basic auth, private key / cert, OAuth, OpenID Connect, Amazon EKS, Google Kubernetes Engine, Digital Ocean) Namespace selection and pods list watching Container log scrolling / watching Container resources usage (memory, CPU, network, file system charts) [1] Container remote exec terminal Cluster, namespace, pod eventsFollow @kubebox for some updates.RunThe following alternatives are available for you to use Kubebox, depending on your preferences and…