Anonymizing your attacks with Tor and Proxychains
Are you using some anomyzer?Anonymizing your connection is one the main requirements you need to do when you want to do bad things... For this purpose we are going to use TOR. "Tor is free software and...
View ArticleDetecting ZeroAccess in your Network with Fortigate and Ossim
ZeroAcces is a Trojan horse who use an advanced rootkit to hide itself and create a back door on the compromised host.The computers are infected by "drive-by download" attacks:People who download and...
View ArticlePentesting Web Servers with Nikto in Backtrack and Kali Linux
Nikto is one of the most popular web security application when you are beginning a web pentesting project.You can download Nikto from http://cirt.net/nikto2 This tool has been included in Backtrack and...
View ArticleDNS Enumeration with Fierce in Backtrack and Kali Linux
Fierce is a great script written in Perl by RSnake . This tool will help you for the first steps of a pentesting: the reconnaissance. The idea is to gather as much interesting details as possible about...
View ArticleZeroAccess Trojan - Network Analysis Part I
A few days ago, I talked about How to detect ZeroAccess in your Network Now, I want to show you how this trojan works.The goal of this trojan is to earn money through Click Fraud... It is a type of...
View ArticleZeroAccess Trojan - Network Analysis Part II
As I said in ZeroAccess Trojan - Network Analysis Part I , the goal of this trojan is to earn money through Click Fraud...When the host has been already infected and it is a member of the botnet, the...
View ArticleSearching attacks in your apache logs with Scalp
Scalp is a log analyzer for the Apache web server written by Romain Gaucher. The goal of this tool is to search through the apache log files and detect the possible attacks that have been sent through...
View ArticleZeus Trojan - Memory Forensics with Volatility
In this post I'm going to talk about Volatility. Volatility is one of the best tools for memory forensics. It is an open source framework writen in python for incident response and malware...
View ArticleHow to Install Cuckoo Sandbox on Ubuntu 10.04 TLS
Cuckoo is a free malware analysis system. You can analyze any suspicious file with Cuckoo and it will give you some very detailed feedback:Traffic captures in Pcap format.Traces of win32 API...
View ArticleUsing robots.txt to locate your targets
As you know, the majority of the webmasters upload a file called robots.txt to their servers in order to give instructions to the crawlers like Google, Yahoo, Bing... about what pages mustn't be...
View ArticleFree Security books for Dummies, DDOS, NGFW, IPS and more... UPDATED
Currently, we can check that many manufacturers of security appliances are writing books "for dummies". You can get them for free and you can download them in this post.Notice these books are free...
View ArticleNmap 6.40 released: How to install and some examples using scripts.
As you know Nmap is a free security scanner. It is an open source project and it can be installed in the majority of the operating systems like Redhat Linux, Microsoft Windows, UNIX, FreeBSD,...
View ArticleHow to Bypass an Antivirus using Veil on Kali Linux
Veil is a awesome tool developed by Chris Truncer@ChrisTruncer, Mike Wright @TheMightyShiv and The Grayhound @the_grayhound specifically designed for Kali Linux which has the goal of:Bypass common AV...
View ArticleGoLismero, a new hacking tool for pentesting projects
GoLismero is an open source framework for web auditing which has been recently presented at AppSec EU de OWAP Â en Hamburgo. It has been developed by Daniel Garcia Garcia a.k.a cr0hn (@ggdaniel) and...
View ArticleHow to get the serial number of a program with OllyDbg
This post has the goal to show you some reversing techniques in order to get the the serial number of a certain program. This post is focused on beginners (with some knowledge in reversing) who want to...
View ArticleDo you know all the Virustotal features?
Virustotal is a free online service that analyzes files and URLs in order to detect viruses, worms, trojans and other kinds of malware using a lot of anti-virus engines and website scanners.Currently,...
View ArticleStatic analysis of a packed malware sample with Cuckoo Part1
Currently, I am really interested in the malware behavior. I think is essential to learn how the malware is evolving if we want to fight with this pest...In this post I am going to talk about some...
View ArticleStatic analysis of a packed malware sample with Cuckoo Part2
If you have not read the previous post of this topic, you can see it here: Static analysis of a packed malware sample with Cuckoo Part1In the second post on this topic, I am going to talk about how to...
View ArticleDecoding the code encoded
Some days ago, I discovered in my network a computer trying to make connections through a port which is not allowed in my next generation firewall. I located the suspicious host and I began to look for...
View ArticleThe technical analysis of the attack to PHP.net
This morning I've read this in the AlientVault blog: "Google was flagging the php.net website as potentialy harmful".It is really interesting because if you can spread malware from php.net which...
View Article