Docker containers are the future! It surely seems so from the myriad projects that are being ‘dockerized’! One such cool project is Docker IDA, your answer for large scale reverse engineering, which allows you to run IDA Pro disassembler in Docker containers for automating, scaling and distributing the use of IDAPython scripts.
It has been sometime since the Shadow Brokers released a major cache of tools and exploits used/created by the Equation Group. This post is an attempt at listing only the exploits and their names from the last two; Linux and Windows, Equation Group dumps. These are the dump details:
eqgrp-auction-file.tar.xz Password: CrDj"(;Va.*NdlnzB9M?@K2)#>deB7mN Decrypted files: https://github.com/x0rz/EQGRP_Lost_in_Translation eqgrp-free-file.tar.xz Password: theequationgroup Decrypted files: https://github.com/samgranger/EQGRP
If you have any details to add/share tweet @pentestit.
PowerSploit is an opensource, offensive Microsoft PowerShell toolkit that has been coded to help penetration testers in almost all phases of an assignment. It can help you perform reconnaissance and also help you to elevate your privileges and maintain access.
What do you do after you have successfully gained access to a system and you want to improve your foothold or try to move laterally in the network? You run RedSnarf, that helps you start by retrieving hashes and credentials from Windows workstations, servers and domain controllers!
Much has been said about Cuckoo Sandbox over the years – on the older PenTestIT blog and at other places, which means that most of us know what this automated malware analysis system is capable of! The reason behind this post is that a few minutes ago, Cuckoo Sandbox 2.0.0 was released!
There are a lot of WordPress security tools out there such as the WPScan, vulnerability scanner. Now, there is an addition – WPForce, which I consider is a more offensive tool that performs brute force attempts against a targeted WordPress installation.
All of us know that a typical penetration testing engagement begins with reconnaissance (run nmap, etc.), testing for services & their default passwords then moving onto launching common exploits (Metasploit, etc.), getting access and then lateral movement. This is okay on small networks, but tends to be slow on large networks. Fortunately, we have APT2 to help us!