You must have read my last post about Prowler, a full featured and open source tool that automates auditing and hardening guidance of an AWS account. It performs 52 checks based on CIS Amazon Web Services Foundations Benchmark 1.1. If you are looking for a smaller set of checks, then you have another option - Zeus. Read more about Zeus: Audit & Harden Your AWS Installations!
Archives for July 2017
All of us know that Center for Internet Security offers CIS Security Benchmarks for multiple systems to safeguard them against an ever changing threat landscape. For Amazon Web Services (AWS) the current version can be found here: CIS Amazon Web Services Foundations Benchmark 1.1. This post is about a tool that helps you automate most of the benchmarks - Prowler. Read more about Prowler: An AWS CIS Benchmark Auditing & Hardening Tool!
There is a lot of fun offensive stuff being developed in PowerShell these days. An example is Invoke-Phant0m an excellent Microsoft Windows eventlog wiper. This post is about PSAttack, a framework which tries to include almost all Microsoft PowerShell scripts that can be used in a penetration test. Read more about PSAttack: A Offensive PowerShell Console!
My old post about the OWASP Dependency-Check project can be found here. This post discusses the changes made to the open source software composition analysis utility in the latest release yesterday. Read more about UPDATE: OWASP Dependency-Check 2.0.0!
Internal network exploitation is a completely different ballgame all together. Many resources are trusted by default and security restrictions are minimal in most cases. One such resource which lacks security restrictions is the Microsoft Windows Server Update Services (WSUS). I have seen internal networks which lack SSL protection, because it is "not needed" for internal networks. This is where a script like WSUXploit comes into picture! Read more about WSUXploit: A Weaponized WSUS Exploit Script!
As the title suggests, OSRFramework is an open source research framework that helps you glean data from multiple sources. This information can be most helpful in multiple OSINT engagements where you are trying to get as much information about a target - user, domain, phone number, DNS lookups, information leaks research, deep web search etc. Read more about OSRFramework: The Open Sources Research Framework!
With the recent spread of a malware which the industry is calling by many names - Petya, NotPetya, Pnyetya and what not! One thing is for sure though - it rewrites your Master Boot Record (MBR) to render your system unusable. One of the many ways to avoid this from happening is by using MBRFilter from the Cisco Talos group. Read more about MBRFilter: A Tool To Protect Against MBR Infection!