InfoSec Write-ups - Medium-- Utilize a Cloud C2 server and WireGuard to easily set up connections to private networks for pentesting or sysadmin.Continue reading on InfoSec Write-ups » View original article on InfoSec Write-ups - Medium
Author: Dade Murphy
Kraken – Cross-platform Yara Scanner Written In Go
KitPloit - PenTest Tools!-- Kraken is a simple cross-platform Yara scanner that can be built for Windows, Mac, FreeBSD and Linux. It is primarily intended for incident response, research and ad-hoc detections (not for endpoint protection). Following are the core features: Scan running executables and memory of running processes with provided Yara rules (leveraging go-yara). … Continue reading Kraken – Cross-platform Yara Scanner Written In Go
North Korean Hackers Used ‘Torisma’ Spyware in Job Offers-based Attacks
The Hacker News-- A cyberespionage campaign aimed at aerospace and defense sectors in order to install data gathering implants on victims' machines for purposes of surveillance and data exfiltration may have been more sophisticated than previously thought. The attacks, which targeted IP-addresses belonging to internet service providers (ISPs) in Australia, Israel, Russia, and defense contractors … Continue reading North Korean Hackers Used ‘Torisma’ Spyware in Job Offers-based Attacks
How to start Bug Bounty?
InfoSec Write-ups - Medium-- Simple Methodology to follow when starting a bug bountyPhoto by TechGig.comProject TrackingKeep track of site-hierarchy, tools output, interesting notes, etc.We can use mind-maps to visualize large scope by bug bounty hunting targets and allows them to break up methodology for in-depth bug hunting as well.Mission-wide recon is the art of discovering as many assets … Continue reading How to start Bug Bounty?
Bypass AMSI in PowerShell — A Nice Case Study
InfoSec Write-ups - Medium-- Bypass AMSI in PowerShell — A Nice Case StudyIn one of the RedTeam projects, I was looking to use BloodHoundAD Script. BloodHound is a single page JavaScript web application, built on top of Linkurious, compiled with Electron, with a Neo4j database fed by a C# data collector. BloodHound uses graph theory to reveal the … Continue reading Bypass AMSI in PowerShell — A Nice Case Study
Beware Of This Google Drive Phishing Campaign
Latest Hacking News-- Once again, users need to remain vigilant while clicking on links and notifications appearing on mobile phones. A new phishing Beware Of This Google Drive Phishing Campaign on Latest Hacking News. View original article on Latest Hacking News
Prop 24 passes in California, will change data privacy law
Malwarebytes Labs-- First-day returns in California showed voters firmly approving to change their state’s current data privacy law—which already guarantees certain privacy protections that many states do not—through the passage of Prop 24. As of the morning of November 4, according to The Sacramento Bee, 56.1 percent of California voters said “Yes” to Prop 24. … Continue reading Prop 24 passes in California, will change data privacy law
SwiftyInsta – Instagram Unofficial Private API Swift
KitPloit - PenTest Tools!-- Instagram offers two kinds of APIs to developers. The Instagram API Platform (extremely limited in functionality and close to being discontinued), and the Instagram Graph API for Business and Creator accounts only. However, Instagram apps rely on a third type of API, the so-called Private API or Unofficial API, and SwiftyInsta … Continue reading SwiftyInsta – Instagram Unofficial Private API Swift
What Keyboard Trackers Are For
Latest Hacking News-- Computer activity can be monitored for many reasons. Some entities do it to spy on users. However, keyboard trackers have What Keyboard Trackers Are For on Latest Hacking News. View original article on Latest Hacking News
Premium-Rate Phone Fraudsters Hack VoIP Servers of 1200 Companies
The Hacker News-- Cybersecurity researchers today took the wraps off an on-going cyber fraud operation led by hackers in Gaza, West Bank, and Egypt to compromise VoIP servers of more than 1,200 organizations across 60 countries over the past 12 months. According to findings published by Check Point Research, the threat actors — believed to … Continue reading Premium-Rate Phone Fraudsters Hack VoIP Servers of 1200 Companies





