ImgWonders
  1. Homepage
  2. ethicalhackers

#ethicalhackers hashtag

Posts attached with hashtag: #ethicalhackers

Anonymous Hackers πŸ–€ (@anons_hackers) Instagram Profile Photo
anons_hackers

Anonymous Hackers πŸ–€

WAScan – An Open Source Web Application Scanner powerful web application scanner named WAScan. WAScan stands for Web Application Scanner, it also completely open source. The purpose of the tool is to gather information and find various vulnerabilities assuming a”black-box” . WAScan is built on Python 2.7 and can run on any platform which has a Python environment. The features of WAScan allows it to fingerprint, audit, bruteforce and disclose sensitive information of a web application. s

Anonymous Hackers πŸ–€ (@anons_hackers) Instagram Profile Photo
anons_hackers

Anonymous Hackers πŸ–€

Kazakhstan Begins Intercepting HTTPS Internet Traffic Of All Citizens Forcefully If you are in Kazakhstan and unable to access the Internet service without installing a certificate, you're not alone. The Kazakhstan government has once again issued an advisory to all major local Internet Service Providers (ISPs) asking them to make it mandatory for all their customers to install government-issued root certificates on their devices in order to regain access to the Internet services. The root certificate in question, labeled as "trusted certificate" or "national security certificate," if installed, allows ISPs to intercept and monitor users' encrypted HTTPS and TLS connections, helping the government spy on its citizens and censor content. In other words, the government is essentially launching a "man in the middle" attack on every resident of the country. Starting from April this year, Kazakh ISPs began informing their users about the "national security certificate" that would be mandatory to install in order to continue uninterrupted access to a list of "allowed" HTTPS websites. Now, Tele2, one of the major Kazakh ISPs, has finally started redirecting all HTTPS connections of its customers to a web page containing certificate files and instructions on how to install it on Windows, macOS, Android, and iOS devices. One of the most serious security implications we can easily spot here is that β€” since users can only browse non-HTTPS sites before installing the certificates, the Cert files are available for download only over insecure HTTP connections, which can easily allow hackers to replace Certificate files using MiTM attacks. Other national ISPs, listed below, also have plans to start forcing their Internet users into installing the root certificate shortly to comply with the law. s

Anonymous Hackers πŸ–€ (@anons_hackers) Instagram Profile Photo
anons_hackers

Anonymous Hackers πŸ–€

InfoG v1.0 – An Open Source Information Gathering Tool InfoG is a Shellscript used to gather information about a target. It allows the ethical hacker to gather information during the initial phases of a test. The tool has many features. Some are as follows: Check Website info Check Phone info IP Tracker Check Valid E-mail Check if site is Up/Down Check internet speed Check Personal info Find IP behind Cloudflare Find Subdomains Port Scan (Multi-threaded) Check CMS Check DNS leaking s

Anonymous Hackers πŸ–€ (@anons_hackers) Instagram Profile Photo
anons_hackers

Anonymous Hackers πŸ–€

Watch Out! Microsoft Spotted Spike in Astaroth Fileless Malware Attacks Security researchers at Microsoft have released details of a new widespread campaign distributing an infamous piece of fileless malware that was primarily being found targeting European and Brazilian users earlier this year. Dubbed Astaroth, the malware trojan has been making the rounds since at least 2017 and designed to steal users' sensitive information like their credentials, keystrokes, and other data, without dropping any executable file on the disk or installing any software on the victim's machine. Initially discovered by researchers at Cybereason in February this year, Astaroath lived off the land by running the payload directly into the memory of a targeted computer or by leveraging legitimate system tools, such as WMIC, Certutil, Bitsadmin, and Regsvr32, to run the malicious code. While reviewing the Windows telemetry data, Andrea Lelli, a researcher at Microsoft Defender ATP Research Team, recently spotted a sudden unusual spike in the usage of Management Instrumentation Command-line (WMIC) tool, leading to the disclosure of a fileless attack. Further investigation revealed that the attackers behind this campaign are distributing multi-stage Astaroth malware through spear-phishing emails with a malicious link to a website hosting an LNK shortcut file. Clicking the shortcut file executes Windows built-in WMIC tool that downloads and executes a JavaScript code, which further abuses the Bitsadmin tool to download all other malicious payloads that actually perform the malicious tasks of pilfering and uploading the victim's data while disguising itself as a system process. s

Anonymous Hackers πŸ–€ (@anons_hackers) Instagram Profile Photo
anons_hackers

Anonymous Hackers πŸ–€

Cynet Launches Free Offering For Incident Response Service Providers More and more, organizations take the route of outsourcing incident response to Managed Security Service Providers. This trend is distinct regardless of the organization's cyber maturity level and can be found across a wide range of cyber maturity, from small companies with no dedicated security team to enterprises with a fully equipped SOC. The hands of the incident response service providers are extremely busy, and the need from their side to scale while maintaining top quality has never been greater. To address this need, Cynet offers IR service providers to collect data, analyze, investigate and remediate threats on their customers' environments with Cynet 360 platform for free, introducing unmatched speed and reliability into their operations. Any incident responder can now simply sign up to Cynet and immediately get free access to the platform. "Cynet tackles the incident response play at its most fundamental core – speed," said Eyal Gruner, co-founder of Cynet. "By harnessing Cynet 360's lightspeed distribution infrastructure, Cynet enables IR providers to get immediate visibility into the entire environment they are accountable for investigating, purging from it malicious presences and handing it back to the customer, clean and ready for production." According to Gruner, who comes from deep offensive security and incident response background, Cynet 360 is, with no match, the fastest incident response tool available on the market today, and is now offering IR providers to use it for free. s

Anonymous Hackers πŸ–€ (@anons_hackers) Instagram Profile Photo
anons_hackers

Anonymous Hackers πŸ–€

Over 1,300 Android Apps Caught Collecting Data Even If You Deny Permissions Smartphones are a goldmine of sensitive data, and modern apps work as diggers that continuously collect every possible information from your devices. The security of modern mobile operating systems, like Android and iOS, is primarily based on permissions that explicitly define which sensitive services, device capabilities, or user information an app can access, allowing users decide what apps can access. However, new findings by a team of researchers at the International Computer Science Institute in California revealed that mobile app developers are using shady techniques to harvest users' data even after they deny permissions. In their talk "50 Ways to Pour Your Data" [PDF] at PrivacyCon hosted by the Federal Trade Commission last Thursday, researchers presented their findings that outline how more than 1,300 Android apps are collecting users' precise geolocation data and phone identifiers even when they've explicitly denied the required permissions. "Apps can circumvent the permission and gain access to protected data without user consent by using both covert and side channels," the researchers wrote. "These channels occur when there is an means to access the protected resource that is not audited by the security mechanism, thus leaving the resource unprotected." Researchers studied more than 88,000 apps from the Google Play store, 1,325 of which were found violating permission systems within the Android operating system by using hidden workarounds that allow them to look for users' personal data from sources like metadata stored in photos and Wi-Fi connections. s

Anonymous Hackers πŸ–€ (@anons_hackers) Instagram Profile Photo
anons_hackers

Anonymous Hackers πŸ–€

Dashboards to Use on Palo Alto Networks for Effective Management Enterprises should expect to see more cyber attacks launched against them. The data that they now gather and store have made their infrastructures key targets for hackers. Customer data and intellectual property can be sold in the black market for profit, and sensitive information can also be used by hackers to extort them. Enterprises are now aggressively shifting their workloads to the cloud which, while it has many benefits, expands their defensive perimeter and exposes them to further risks as well. As such, organizations are now widely investing in various security solutions in order to comprehensively protect their networks. Gartner expects security spending to exceed $124 billion this year. Solutions such as firewalls and threat prevention tools have increasingly become essential for enterprises. Leading firewall provider Palo Alto Networks, for example, provides companies with various measures to protect their infrastructures. It's currently being used by tens of thousands of enterprise customers. However, while the protection the service gives administrators much respite from security concerns, administrators still need to stay on top of their infrastructures. Fortunately, users are also able to tap into available integrations with other security solutions to gain additional functionalities. Log management solution Xplg, for instance, can be integrated with solutions like Palo Alto Networks. This integration allows administrators to use Xplg to intelligently analyze security services' logs to reveal patterns and discover potential anomalies in their network activities. Insights from these analyses could expose threats and vulnerabilities for administrators to address. s

Anonymous Hackers πŸ–€ (@anons_hackers) Instagram Profile Photo
anons_hackers

Anonymous Hackers πŸ–€

Unpatched Prototype Pollution Flaw Affects All Versions of Popular Lodash Library Lodash, a popular npm library used by more than 4 million projects on GitHub alone, is affected by a high severity security vulnerability that could allow attackers to compromise the security of affected services using the library and their respective user base. Lodash is a JavaScript library that contains tools to simplify programming with strings, numbers, arrays, functions, and objects, helping programmers write and maintain their JavaScript code more efficiently. Liran Tal, a developer advocate at open-source security platform Snyk, recently published details and proof-of-concept exploit of a high-severity prototype pollution security vulnerability that affects all versions of lodash, including the latest version 4.17.11. The vulnerability, assigned as CVE-2019-10744, potentially affects a large number of frontend projects due to the popularity of lodash that is being downloaded at a rate of more than 80 million times per month. Prototype pollution is a vulnerability that enables attackers to modify a web application's JavaScript object prototype, which is like a variable that can be used to store multiple values based on a predefined structure. These structures and default values are called prototypes that prevent an application from hashing when no values are set. However, if an attacker manages to properties into existing JavaScript language construct prototypes and manipulate these attributes to overwrite or pollute, it could affect how the application processes JavaScript objects through the prototype chain, leading to a denial of service issue or a remote code execution vulnerability. s

English Turkish