background preloader

Malware Related

Facebook Twitter

Advanced password recovery. Offensive Python for Web Hackers (Blackhat) Tutorial. Description: This is the video of the talk titled "Offensive Python for Web Hackers" given at Blackhat 2010. It seems that everything is a web application nowadays. Whether the application is cloud-based, mobile, or even fat client they all seem to be using web protocols to communicate. Adding to the traditional landscape there is rise in the use of application programming interfaces, integration hooks, and next generation web technologies. What this means for someone testing web applications is that flexibility is the key to success. The Python programming language is just as flexible as today’s web application platforms. The language is appealing to security professionals because it is easy to read and write, has a wide variety of modules, and has plenty of resources for help.

This additional flexibility affords the tester greater depth than many of the canned tests that come with common tools they use on a daily basis. Scan IP Addresses for Malicious Activity - IPVoid.com BETA. Why Windows security is awful. August 25, 2009, 3:30 PM — A friend of mine suggested that I should include as boilerplate in my security stories, a line like: "Of course, if you were running desktop Linux or using a Mac, you wouldn't have this problem.

" She's got a point. Windows is now, always has been, and always will be insecure. Here's why. First, desktop Windows stands firmly on a foundation as a stand-alone PC operating system. It was never, ever meant to work in a networked world. So, security holes that existed back in the day of Windows for Workgroups, 1991, are still with us today in 2009 and Windows 7. Most of these problems come down to Windows has IPCs (interprocess communications), procedures that move information from one program to another, that were never designed with security in mind. Making matters worse is that they can be activated by user-level scripts, such as Word macros, or by programs simply viewing data, such Outlook's view window. Basic usage. Ncat always operates in one of two basic modes: connect mode and listen mode. In connect mode, Ncat initiates a connection (or sends UDP data) to a service that is listening somewhere. For those familiar with socket programming, connect mode is like using the connect function.

In listen mode, Ncat waits for an incoming connection (or data receipt), like using the bind and listen functions. You can think of connect mode as “client” mode and listen mode as “server” mode. To use Ncat in connect mode, run <host> may be a hostname or IP address, and <port> is a port number. Ncat --listen [<host>] [<port>]ncat -l [<host>] [<port>] In listen mode, <host> controls the address on which Ncat listens; if you omit it, Ncat will bind to all local interfaces (INADDR_ANY). By default, Ncat uses TCP and IPv4.

A good way to start learning about Ncat (and network protocols in general) is to connect to a network service and talk with it. Example 1. So much for using Ncat as a web browser. Figure 1. Bots vs Browsers - Public Bots and User Agents Database and Commentary. Windows PowerShell Remoting. HBGary - Defeat Tomorrow's Threats Today. Cisco IOS Penetration Testing with Metasploit « Rapid7 Network Security Blog.

Maltego 3 > Maltego Client.