background preloader

Security and Privacy

Facebook Twitter

CaptureSetup/CapturePrivileges. You need to run Wireshark or TShark on an account with sufficient privileges to capture, or need to give the account on which you're running Wireshark or TShark sufficient privileges to capture. The way this is done differs from operating system to operating system. To be secure (at least in a way), it is recommended that even an administrator should always run in an account with (limited) user privileges, and only start processes that really need the administrator privileges. The Security page provides explanations why this is a good idea. Virtual machine If you are running inside a virtual machine, make sure the host allows you to put the interface into promiscous mode.

Windows The WinPcap driver (called NPF) is loaded by Wireshark when it starts to capture live data. Note: Simply stopping Wireshark won't stop the WinPcap driver! It might not be desirable that any local user can also capture from the network while the driver is loaded, but this can't be currently circumvented. Most UNIXes. Aufspüren von CSRF-Lücken. Stefan Schurtz - 05.11.2012 Wenn bösartige Webseiten den Router umkonfigurieren oder im Webmail-Frontend eine Weiterleitung einrichten ist meist Cross Site Request Forgery im Spiel. Der CSRFTester von OWASP spürt solche Lücken gezielt auf. Beim sogenannten Cross Site Request Forgery – kurz CSRF oder XSRF – handelt sich es, ähnlich wie beim Cross Site Scripting (XSS), um eine indirekte Angriffstechnik. Der Browser des Opfers reflektiert dabei die Attacke quasi wie eine Bande.

Oder sogar das Passwort ändern. Die Java-Oberfläche des CRSFTester ist schmucklos, erfüllt aber ihren Zweck. Mit dem in Java geschriebenen CSRFTester des Open Web Application Security Project (OWASP) kann man Web-Anwendungen sehr einfach auf diese Schwachstellen überprüfen. Die Benutzung des CSRFTesters gestaltet sich recht einfach und unproblematisch. Der CSRFTester bietet darüber hinaus diverse Filter und Möglichkeiten, den PoC nachträglich zu bearbeiten.

OWASP CSRFTester Project. Overview Just when developers are starting to run in circles over Cross Site Scripting, the 'sleeping giant' awakes for yet another web-catastrophe. Cross-Site Request Forgery (CSRF) is an attack whereby the victim is tricked into loading information from or submitting information to a web application for which they are currently authenticated. The problem is that the web application has no means of verifying the integrity of the request. The OWASP CSRFTester Project attempts to give developers the ability to test their applications for CSRF flaws. License CSRFTester is offered under the LGPL. Source You can access the source code at: Downloads Click here to download the latest OWASP CSRFTester 1.0 binary and startup script. Click here to download the latest OWASP CSRFTester 1.0 source and binary. Usage Instructions Click here for documentation regarding the use of the CSRFTester. Road Map Feedback and Participation We hope you find CSRFTester useful.

Programmable HID USB Keystroke Dongle: Using the Teensy as a pen testing device. Programmable HID USB Keystroke Dongle: Using the Teensy as a pen testing device Quick Links To Sections: Introduction So, why would a pen-tester want one? What sort of commands would you use? What's in a name? How it's built More Pics and Videos Programming examples and my PHUKD library A note on packaging Links Changelog Introduction While I was at Shmoocon 2010, I was given a Phantom Keystroker.

The Hak5 U3 USB switch blade is pretty cool, but lots of folks have autorun turned off by default now. The programmable key stroke dongle could be set to run by a timer. After the con, I decided to see if I could come up with a ghetto way to make a programmable USB keystroker. For those who want a more professional device with nicer packaging, Daren and Robin have a product coming soon.

So, why would a pen-tester want one? 1. Just use your imagination! What sort of commands would you use? All sorts of things could be done: 1. I'd like to note one disadvantage of the device. What's in a name? Video: Block Facebook from tracking you | Chrome Adblock. BackTrack Linux - Penetration Testing Distribution.

Passwort-Knacken für Admins. Cracking_Passwords_Guide.