Quantcast
Channel: Hacking while you're asleep
Browsing all 53 articles
Browse latest View live
↧

Image may be NSFW.
Clik here to view.

Anonymizing your attacks with Tor and Proxychains

Are you using some anomyzer?Anonymizing your connection is one the main requirements you need to do when you want to do bad things... For this purpose we are going to use TOR. "Tor is free software and...

View Article


Image may be NSFW.
Clik here to view.

Detecting ZeroAccess in your Network with Fortigate and Ossim

ZeroAcces is a Trojan horse who use an advanced rootkit to hide itself and create a back door on the compromised host.The computers are infected  by "drive-by download" attacks:People who download and...

View Article


Image may be NSFW.
Clik here to view.

Pentesting Web Servers with Nikto in Backtrack and Kali Linux

Nikto is one of the most popular web security application when you are beginning a web pentesting project.You can download Nikto from http://cirt.net/nikto2 This tool has been included in Backtrack and...

View Article

Image may be NSFW.
Clik here to view.

DNS Enumeration with Fierce in Backtrack and Kali Linux

Fierce is a great script written in Perl by RSnake . This tool will help you for the first steps of a pentesting: the reconnaissance. The idea is to gather as much interesting details as possible about...

View Article

Image may be NSFW.
Clik here to view.

ZeroAccess Trojan - Network Analysis Part I

A few days ago, I talked about How to detect ZeroAccess in your Network  Now, I want to show you how this trojan works.The goal of this trojan is to earn money through Click Fraud... It is a type of...

View Article


Image may be NSFW.
Clik here to view.

ZeroAccess Trojan - Network Analysis Part II

As I said in ZeroAccess Trojan - Network Analysis Part I ,  the goal of this trojan is to earn money through Click Fraud...When the host has been already infected and it is a member of the botnet, the...

View Article

Image may be NSFW.
Clik here to view.

Searching attacks in your apache logs with Scalp

Scalp is a log analyzer for the Apache web server written by Romain Gaucher. The goal of this tool is to search through the apache log files and detect the possible attacks that have been sent through...

View Article

Image may be NSFW.
Clik here to view.

Zeus Trojan - Memory Forensics with Volatility

In this post I'm going to talk about Volatility. Volatility is one of  the best tools for memory forensics. It is an open source framework writen in python for incident response and malware...

View Article


Image may be NSFW.
Clik here to view.

How to Install Cuckoo Sandbox on Ubuntu 10.04 TLS

Cuckoo is a free malware analysis system. You can analyze any suspicious file with Cuckoo and it will give you some very detailed feedback:Traffic captures in Pcap format.Traces of win32 API...

View Article


Image may be NSFW.
Clik here to view.

Using robots.txt to locate your targets

As you know, the majority of the webmasters upload a file called robots.txt to their servers in order to give instructions to the crawlers like Google, Yahoo, Bing... about what pages mustn't be...

View Article

Image may be NSFW.
Clik here to view.

Free Security books for Dummies, DDOS, NGFW, IPS and more... UPDATED

Currently, we can check that many manufacturers of security appliances are writing books "for dummies".  You can get them for free and you can download them in this post.Notice these books are free...

View Article

Image may be NSFW.
Clik here to view.

Nmap 6.40 released: How to install and some examples using scripts.

As you know Nmap is a free security scanner. It is an open source project and it can be installed in the majority of the operating systems like Redhat Linux, Microsoft Windows, UNIX, FreeBSD,...

View Article

Image may be NSFW.
Clik here to view.

How to Bypass an Antivirus using Veil on Kali Linux

Veil is a awesome tool developed by Chris Truncer@ChrisTruncer, Mike Wright @TheMightyShiv and The Grayhound @the_grayhound specifically designed for Kali Linux which has the goal of:Bypass common AV...

View Article


Image may be NSFW.
Clik here to view.

GoLismero, a new hacking tool for pentesting projects

GoLismero is an open source framework for web auditing which has been recently presented at AppSec EU de OWAP  en Hamburgo. It has been developed by Daniel Garcia Garcia a.k.a cr0hn (@ggdaniel) and...

View Article

Image may be NSFW.
Clik here to view.

How to get the serial number of a program with OllyDbg

This post has the goal to show you some reversing techniques in order to get the the serial number of a certain program. This post is focused on beginners (with some knowledge in reversing) who want to...

View Article


Image may be NSFW.
Clik here to view.

Do you know all the Virustotal features?

Virustotal is a free online service that analyzes files and URLs in order to detect viruses, worms, trojans and other kinds of malware using a lot of anti-virus engines and website scanners.Currently,...

View Article

Image may be NSFW.
Clik here to view.

Static analysis of a packed malware sample with Cuckoo Part1

Currently, I am really interested in the malware behavior. I think is essential to learn how the malware is evolving if we want to fight with this pest...In this post I am going to talk about some...

View Article


Image may be NSFW.
Clik here to view.

Static analysis of a packed malware sample with Cuckoo Part2

If you have not read the previous post of this topic, you can see it here: Static analysis of a packed malware sample with Cuckoo Part1In the second post on this topic, I am going to talk about how to...

View Article

Image may be NSFW.
Clik here to view.

Decoding the code encoded

Some days ago, I discovered in my network a computer trying to make connections through a port which is not allowed in my next generation firewall. I located the suspicious host and I began to look for...

View Article

Image may be NSFW.
Clik here to view.

The technical analysis of the attack to PHP.net

This morning I've read this in the AlientVault blog: "Google was flagging the php.net website as potentialy harmful".It is really interesting because if you can spread malware from php.net which...

View Article
Browsing all 53 articles
Browse latest View live