Leviathan: An All In One Security Audit Toolkit!

Fresh off the GitHub repository – Leviathan, an open source, wide-range  security audit toolkit that helps you with service discovery, brute force, SQL injection detection and running custom exploit. One of the guys behind this project is Utku Sen. If you remember he was the one who wrote open source ransomware – EDA2 and Hidden Tear.

Leviathan
Leviathan

Continue reading “Leviathan: An All In One Security Audit Toolkit!”

UPDATE: Wifiphisher v1.3!

An older post describing Wifiphisher can be found here. Recently an update was made to the open source tool that helps you execute speedy and automated phishing attacks against wireless networks. Most notably, this new release includes the Lure10 attack – a novel way for associating automatically with any device that is within range running the latest Windows.

Wifiphisher
Wifiphisher

Continue reading “UPDATE: Wifiphisher v1.3!”

Kali Linux 2017.1: The Professional Penetration-Testing Distro!

Kali Linux really needs no introduction today. It is the de-facto open source, Debian-based operating system for penetration testing, vulnerability assessments, digital forensics and wireless assessments.  It is one of those operating systems that I see being actively developed and has a huge and helpful community. This post talks about the improvements and new tool additions in the latest open source Kali Linux 2017.1 Rolling release.

Kali Linux
Kali Linux

Continue reading “Kali Linux 2017.1: The Professional Penetration-Testing Distro!”

Docker IDA: The Large Scale Reverse Engineering System!

Docker containers are the future! It surely seems so from the myriad projects that are being ‘dockerized’! One such cool project is Docker IDA, your answer for large scale reverse engineering, which allows you to run IDA Pro disassembler in Docker containers for automating, scaling and distributing the use of IDAPython scripts.

Docker IDA
Docker IDA

Continue reading “Docker IDA: The Large Scale Reverse Engineering System!”

List of Equation Group Exploits!

It has been sometime since the Shadow Brokers released a major cache of tools and exploits used/created by the Equation Group. This post is an attempt at listing only the exploits and their names from the last two; Linux and Windows, Equation Group dumps. These are the dump details:

eqgrp-auction-file.tar.xz
Password: CrDj"(;Va.*NdlnzB9M?@K2)#>deB7mN
Decrypted files: https://github.com/x0rz/EQGRP_Lost_in_Translation

eqgrp-free-file.tar.xz
Password: theequationgroup
Decrypted files: https://github.com/samgranger/EQGRP

If you have any details to add/share tweet @pentestit.

Equation Group
Equation Group

Continue reading “List of Equation Group Exploits!”

PowerSploit: A Post-Exploitation Framework in PowerShell!

PowerSploit is an opensource, offensive Microsoft PowerShell toolkit that has been coded to help penetration testers in almost all phases of an assignment. It can help you perform reconnaissance and also help you to elevate your privileges and maintain access.


PowerSploit
PowerSploit

Continue reading “PowerSploit: A Post-Exploitation Framework in PowerShell!”

RedSnarf: Retrieve Hashes & Credentials from Windows!

What do you do after you have successfully gained access to a system and you want to improve your foothold or try to move laterally in the network? You run RedSnarf, that helps you start by retrieving hashes and credentials from Windows workstations, servers and domain controllers!

RedSnarf
RedSnarf

Continue reading “RedSnarf: Retrieve Hashes & Credentials from Windows!”