There is a idiom - use a thorn to remove a thorn. Tools like Al-Khaser cement this idiom. It is an open source, benign malware to test how good your anti-malware or local security product is. It allows you to do so by implementing commonly used tactics used by actual malwares and tests them on your system.What is Al-Khaser? Al-Khaser is a benign, proof-of-concept malware that tests your anti-malware system by performing a series of tests to test it's effectiveness. You can also use this Read more about Al-Khaser: A Benign Malware to Test Your Anti Malware
Malware's are always getting smarter and trying to outsmart our generic detection methodologies. One of the first ways they avoid detection is by checking if the executing environment is a virtual machine (VM). There are multiple ways to do that. Red Pill by Joanna Rutkowska, verifying memory structures such as Store Interrupt Descriptor Table (SIDT), Store Local Descriptor Table (SLDT), Store Global Descriptor Table (SGDT) and Store Task Register (STR) and checking for well known registry Read more about Antivmdetection: Thwart Virtual Machine Detection!
Since Friday this week has been most eventful because of a malware - Wanacrypt, infecting thousands of computer networks in a jiffy. As speculated, it leveraged a very potent exploit that was made public by the Shadow Brokers. The name of the exploit is ETERNALBLUE, which was used by the Equation Group to exploit a large number of systems right untill Windows 10. List of Equation Group Exploits lists the exploits and their targets. Read more about Wanacrypt: What Do We Know About It As Of Now?
An older post describing Wifiphisher can be found here. Recently an update was made to the open source tool that helps you execute speedy and automated phishing attacks against wireless networks. Most notably, this new release includes the Lure10 attack - a novel way for associating automatically with any device that is within range running the latest Windows. Read more about UPDATE: Wifiphisher v1.3!
A human is the weakest link in cyber security and tools like Wifiphisher cement the fact. This tool exploits this weak link by launching a social-engineering attack leading the user to a phishing page and then you can get the users password or install your stuff. Read more about Wifiphisher: Perform Automated Customized Phishing Attacks Against Wi-Fi Clients!