New Web-Based Credit Card Stealer Uses Telegram Messenger to Exfiltrate Data

The Hacker News-- Cybercriminal groups are constantly evolving to find new ways to pilfer financial information, and the latest trick in their arsenal is to leverage the messaging app Telegram to their benefit. In what's the latest tactic adopted by Magecart groups, the encrypted messaging service is being used to send stolen payment details from … Continue reading New Web-Based Credit Card Stealer Uses Telegram Messenger to Exfiltrate Data

How a badly configured DB allowed us to own an entire cloud of over 25K hosts (part 1/2)

InfoSec Write-ups - Medium-- IntroductionIn this write up we’ll see how we were able to combine direct sqlmap connection to a database with BMC/IPMI exploitation to compromise a big cloud-hosted client.Getting a footholdA couple of years ago, our team was tasked with performing an infrastructure pentest in an Openstack network. It was formed by about 2000 … Continue reading How a badly configured DB allowed us to own an entire cloud of over 25K hosts (part 1/2)

How to Hack Wi-Fi: Automating Wi-Fi Hacking with Besside-ng

Null Byte « WonderHowTo-- Besside-ng is the hidden gem of the Aircrack-ng suite of Wi-Fi hacking tools. When run with a wireless network adapter capable of packet injection, Besside-ng can harvest WPA handshakes from any network with an active user — and crack WEP passwords outright. Unlike many tools, it requires no special dependencies and … Continue reading How to Hack Wi-Fi: Automating Wi-Fi Hacking with Besside-ng

Killchain – A Unified Console To Perform The “Kill Chain” Stages Of Attacks

KitPloit - PenTest Tools!-- What is “Kill Chain”?From Wikipedia: The term kill chain was originally used as a military concept related to the structure of an attack; consisting of target identification, force dispatch to target, decision, order to attack the target, and finally the destruction of the target.Reconnaissance – Uses social engineering to find weaknesses … Continue reading Killchain – A Unified Console To Perform The “Kill Chain” Stages Of Attacks

WHAT PROBLEM SOLVING ACTUALLY LOOKS LIKE

InfoSec Write-ups - Medium-- What Problem Solving Actually Looks LikeThe proof of concept images for the vending machine hack were lost. How did I get them back?honest blog bannerAugust 9, 2020: I was starting to piece together my last week’s post, when I opened Google Photos for the images to be included as proof-of-concept. Unfortunately, I couldn’t find … Continue reading WHAT PROBLEM SOLVING ACTUALLY LOOKS LIKE

Hacking Windows 10: How to Bypass VirusTotal & AMSI Detection Signatures with Chimera

Null Byte « WonderHowTo-- Microsoft's built-in antimalware solution does its best to prevent common attacks. Unfortunately for Windows 10 users, evading detection requires almost no effort at all. An attacker armed with this knowledge will easily bypass security software using any number of tools. As Microsoft's antimalware solution is Windows 10's first line of defense, … Continue reading Hacking Windows 10: How to Bypass VirusTotal & AMSI Detection Signatures with Chimera

OSWE like Boxes Series 0x01 — HTB Blocky Write-up

InfoSec Write-ups - Medium-- OSWE like Boxes Series 0x01 — HTB Blocky Write-upHi guys, today we will be looking at Blocky Box from Hackthebox. It was very easy machine with two solutions. One is intended other one unintended. Summary part for intended way.SummaryThere are 4 open ports 21, 22, 80 and 25565.Head on to port 80, there is a wordpress … Continue reading OSWE like Boxes Series 0x01 — HTB Blocky Write-up