If you remember, I had posted about this Red Teaming Hardware Implant in an earlier post. It now happens that it was updated and we now have WarBerryPi Version 5! As you remember, it is a Raspberry Pi based hardware implant allowing you to be stealthy during red teaming scenarios, exfiltrating information with speed. Read more about UPDATE: WarBerryPi Version 5!
About a month and half ago, Nmap 7.50 was released. Today, a few minutes ago - Nmap 7.60 was made available with SSH support, improved SMB2/SMB3 support by Paulino Calderon (@calderpwn), addition of 14 NSE scripts and a new Npcap version. Nmap is now the default tool to discover services running on a remotely connected system. None of us really need any introduction to this very popular “network mapper“. Read more about UPDATE: Nmap 7.60 Now Available!
If you read this blog, you must have read about an earlier post titled - List of Raspberry Pi DIY Projects for Anonymity! Though that post dealt with DIY projects about anonymity, this post is about WarBerryPi, which is more of a device to be used for offensive activities such as red teaming built on the versatile Raspberry Pi platform.The name WarBerryPi was conceived by the author as the red team, blue team nomenclature is based on military terms. This tool allows you to plug it in Read more about WarBerryPi: Red Teaming Hardware Implant!
Nmap is now the default tool to discover services running on a remotely connected system. None of us really need any introduction to this very popular "network mapper". The Linux man page describes it as:Nmap ("Network Mapper") is an open source tool for network exploration and security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what Read more about Nmap 7.50 Now Available!
If you stay in California and want to protect your privacy, or you want to circumvent internet censorship imposed by your government or simply want to stay anonymous on the wire chances are you use use TOR or use a anonymous, no-log-keeping VPN. This post lists a few Do-It-Yourself projects that involves not more than a Raspberry Pi to try and keep you anonymous. As always I will try to keep this post updated. Additionally, if you know of any projects that I may have missed, you sure can let me Read more about List of Raspberry Pi DIY Projects for Anonymity!
An older post describing Wifiphisher can be found here. Recently an update was made to the open source tool that helps you execute speedy and automated phishing attacks against wireless networks. Most notably, this new release includes the Lure10 attack - a novel way for associating automatically with any device that is within range running the latest Windows. Read more about UPDATE: Wifiphisher v1.3!
A human is the weakest link in cyber security and tools like Wifiphisher cement the fact. This tool exploits this weak link by launching a social-engineering attack leading the user to a phishing page and then you can get the users password or install your stuff. Read more about Wifiphisher: Perform Automated Customized Phishing Attacks Against Wi-Fi Clients!