There are a lot of open source WordPress security scanners out there right now and WPSeku is one more of them. Since it's release about a month ago, it has a few static cross-site scripting, local file inclusion and SQL injection strings which it tries to leverage while scanning a website. Read more about WPSeku: A Simple WordPress Security Scanner!
Archives for May 2017
A problem with remote web application vulnerability scanners is that sometimes they have false positives. The only way to get good results is by launching an actual exploit, which if not treated with caution can lead to problems with the web application itself. This is where pyfiscan comes into picture and helps you perform a non-intrusive vulnerability scan on your own web application. Read more about pyfiscan: A Local Web Application Vulnerability Scanner!
This post is about a functionality which was untill today was not automated, yet very important in real world and bug bounty scenarios. The name is - PwnBack, a open source Burp Extender plugin, coded in JAVA which leverages the Wayback search engine and generates a sitemap accordingly. Read more about PwnBack: Wayback Machine Leveraging Burp Extender Plugin!
This is a short post about howmanypeoplearearound, an open source tool in Python that can help you identify the number of people in the vicinity of your WiFi connection. Read more about howmanypeoplearearound: Detect People Around You!
Since Friday this week has been most eventful because of a malware - Wanacrypt, infecting thousands of computer networks in a jiffy. As speculated, it leveraged a very potent exploit that was made public by the Shadow Brokers. The name of the exploit is ETERNALBLUE, which was used by the Equation Group to exploit a large number of systems right untill Windows 10. List of Equation Group Exploits lists the exploits and their targets. Read more about Wanacrypt: What Do We Know About It As Of Now?
This is a short post about a cool PowerShell script – Invoke-Obfuscation that can help us a lot post exploitation. Why PowerShell? It is because, this shell and scripting language is already present on most modern Windows operating systems. It also has memory only execution capabilities that can help you evade anti-viruses and the likes, with almost no logging in the eventlog! Imagine if you are able to execute PowerSploit, obfuscating all your "stuff"! Read more about Invoke-Obfuscation: A PowerShell Command & Script Obfuscator!
A lot many good things are being done in Docker. Jackhammer is another good example of this. The authors have gone ahead and put almost everything you would need for vulnerability assessment and vulnerability management, dockerized it, made it an all-in-one tool and put it up for us to use! A few other security related docker projects can be found here. Read more about Jackhammer: A Vulnerability Assessment Collaboration Tool!