Author Archives: Pentester

A Guide to Creating an Incident Response Plan
14 Dec

A Guide to Creating an Incident Response Plan

Cyber security is one of the direst threats facing modern businesses today. Global cyber-crime damages are set to exceed $6 trillion each year by 2021. Despite the growing threat of cyber-attacks, more than half of businesses that suffered an attack didn’t anticipate any changes to their security measures for next year. Increasing cyber-attacks will help triple the number of unfilled cyber-security […]

read more »
Plundering Windows Account Info via **Authenticated** SMB Sessions
05 Dec

Plundering Windows Account Info via **Authenticated** SMB Sessions

Rpcclient is Your Friend! By Ed Skoudis I absolutely adore the Server Message Block (SMB) protocol. Sure, it’s ugly and bewilderingly complex. But, what I love is the raw power SMB provides for manipulating Windows environments during a penetration test. Via SMB, you can remotely access file shares, the registry, services, domain authentication, and much […]

read more »
PayPal’s TIO Networks reveals data breach impacted 1.6 million users
05 Dec

PayPal’s TIO Networks reveals data breach impacted 1.6 million users

The company says evidence of “unauthorized access” has appeared during a recent investigation. PayPal’s recently-acquired payment processor TIO Networks has revealed that up to 1.6 million customers have had their information stolen in a recent data breach. Last week, the Vancouver, Canada-based TIO Networks said that following the suspension of operations, evidence has been uncovered […]

read more »
CHECKSEC.SH NOW WITH FORTIFY_SOURCE SUPPORT
02 Dec

CHECKSEC.SH NOW WITH FORTIFY_SOURCE SUPPORT

New checksec.sh release. What’s new with version 1.4: * Support for FORTIFY_SOURCE (–fortify-file, –fortify-proc) * Lots of other bugfixes and improvements   – Check if the readelf command is available   – readelf support for 64-bit ELF files   – Check if the requested files and directories do exist   – ‘–dir’ is now case-sensitive and correctly deals with […]

read more »
NEWLY PUBLISHED EXPLOIT CODE USED TO SPREAD MIRAI VARIANT
28 Nov

NEWLY PUBLISHED EXPLOIT CODE USED TO SPREAD MIRAI VARIANT

Qihoo 360 Netlab researchers reported on Friday that they are tracking an uptick in botnet activity associated with a variant of Mirai. Targeted are ports 23 and 2323 on internet-connected devices made by ZyXEL Communications that are using default admin/CentryL1nk and admin/QwestM0dem telnet credentials. “About 60 hours ago, since 2017-11-22 11:00, we noticed big upticks on […]

read more »