Samba vulnerability (CVE-2015-0240)

by admin

Monday, February 23rd, 2015 at 11:29 am

CVE-2015-0240 is a security flaw in the smbd file server daemon. It can be exploited by a malicious Samba client, by sending specially-crafted packets to the Samba server. No authenticated is required to exploit this flaw. It can result in remotely controlled execution of arbitrary code as root.

more info: https://securityblog.redhat.com/2015/02/23/samba-vulnerability-cve-2015-0240/

Veil-Catapult

by admin

Sunday, July 13th, 2014 at 3:48 pm

Veil-Symbol
Veil Framework recently added a payload delivery tool Veil-Catapult. Works like SMBexec with utilizing Veil-Evasion to generate AV-evading binaries, impacket to upload/host the binaries, and the passing-the-hash toolkit to trigger execution using temporary SMB server. :::Read more here::: & :::here:::

HDD Firmware Backdoor

by admin

Friday, July 4th, 2014 at 1:28 pm


This Recon 2014 talk presents a firmware attack on an off-the-shelf hard drive. The implemented backdoor is capable of exfiltrating any data stored on the hard drive, through a network connection, without any modification of the system’s operating system or software. The talk laid out how the hard drive’s firmware is designed, and how the backdoor can interact with the firmware, and then explain how the backdoor can be remote-controlled, p. ex., through an installed web server.

Recon14_HDD.pdf

Hacking IoT Lightbulbs

by admin

Friday, July 4th, 2014 at 1:00 pm


LIFX bulbs connect to a WiFi network in order to allow them to be controlled using a smart phone application. The research presented was performed against version 1.1 of the LIFX firmware.
::: Click Here :::

Jacking Windows Logon Credentials

by admin

Sunday, November 3rd, 2013 at 6:03 pm

For Win2k/XP you can use this modified GINA stub. More information about how GINA works can be found in his excellent blog post.
For Vista/7 you can use this custom credential provider More information can be found in his blog post.

Analysis of the FBI Tor Malware

by admin

Tuesday, September 24th, 2013 at 10:20 pm

In April 2013, a piece of malware was found embedded in Freedom Hosting’s darknet server that would exploit a security hole in a particular web browser and execute code on the user’s computer. This code gathered some information about the user and sent it to a server in Virginia and then crashed – it had no obvious malicious intent that is so characteristic of malware. It was therefore theorised that the FBI, who have offices in Virginia, and who have ‘form’ for writing malware, may have authored it – this now appears to be true.
http://oweng.myweb.port.ac.uk/fbi-tor-malware-analysis/

Getting internal IP addresses via html5

by admin

Friday, September 13th, 2013 at 12:16 pm

Neat little trick to get internal IP address using HTML5 WebRTC from 2x.io blog. Which also can be used for nasty javascript to do internal attacks, on your router for instance. Check out the :::DEMO:::.

Stealing passwords every time they change

by admin

Friday, September 13th, 2013 at 10:59 am

carnal 0wnage blog has an “evil pass filter” .dll example that logs passwords to a textfile or http post every time someone changes their password on a windows box. Works on Windows 2000, XP all the way up to Windows 8 & 2012.

Veil – Payload Generator to Bypass Antivirus

by admin

Thursday, May 30th, 2013 at 7:53 pm

https://www.christophertruncer.com/veil-a-payload-generator-to-bypass-antivirus/

DVR Hacking

by admin

Saturday, February 2nd, 2013 at 11:41 am

http://console-cowboys.blogspot.com/2013/01/swann-song-dvr-insecurity.html

IP: Loading... - Host: Loading...
IP Geolocation: unknown.

We love our country, but fear our government.