Command and Control Guide to Merlin

In this article, we learn how to use Merlin C2 tool. It is developed by Russel Van Tuyl in Go language. Table of content: Introduction Installation Windows exploitation Windows post exploitation Linux exploitation Linux post exploitation Introduction Merlin is great cross platform Command and control tool written in Go language. It’s made of two elements… Continue reading →
The post Command and Control Guide to Merlin appeared first on Hacking Articles.

Link: https://www.hackingarticles.in/command-and-control-guide-to-merlin/

nps_payload: An Application Whitelisting Bypass Tool

In this article, we will create payloads using a tool named nps_payload and get meterpreter sessions using those payloads. This tool is written by Larry Spohn and Ben Mauch. Find this tool on GitHub. Attacker: Kali Linux Target: Windows 10 Table of Content: Downloading and Installing Getting session using MSBuild Getting session using MSBuild HTA… Continue reading →
The post nps_payload: An Application Whitelisting Bypass Tool appeared first on Hacking Articles.

Link: https://www.hackingarticles.in/nps_payload-an-application-whitelisting-bypass-tool/

Hiding IP During Pentest using PowerShell Empire (http_hop)

This is our fourth article in empire series, in this article we learn to use hop payload in PowerShell empire. Empire has an inbuilt listener named http_hop which allows us to redirect our traffic to one of our another active listener after getting an agent. Thus, the name hop as it hops the agent from… Continue reading →
The post Hiding IP During Pentest using PowerShell Empire (http_hop) appeared first on Hacking Articles.

Link: https://www.hackingarticles.in/hiding-ip-during-pentest-using-powershell-empire-http_hop/

Legion – An Easy-To-Use, Super-Extensible And Semi-Automated Network Penetration Testing Tool That Aids In Discovery, Reconnaissance And Exploitation Of Information Systems

Legion, a fork of SECFORCE’s Sparta, is an open source, easy-to-use, super-extensible and semi-automated network penetration testing framework that aids in discovery, reconnaissance and exploitation of information systems. Legion is developed and maintained by GoVanguard. More information about Legion, including the product roadmap, can be found on it’s product page at https://GoVanguard.io/legion.FEATURESAutomatic recon and scanning with NMAP, whataweb, nikto, Vulners, Hydra, SMBenum, dirbuster, sslyzer, webslayer and more (with almost 100 auto-scheduled scripts)Easy to use graphical interface with rich context menus and panels that allow pentesters to quickly find and exploit attack vectors on hostsModular functionality allows users to easily customize Legion and automatically call their own scripts/toolsHighly customizable stage scanning for ninja-like IPS evasionAutomatic detection of CPEs (Common Platform Enumeration) and CVEs (Common Vulnerabilities and Exposures)Realtime autosaving of project results and tasksNOTABLE CHANGES FROM SPARTARefactored from Python 2.7 to Python 3.6 and the elimination of depreciated and unmaintained librariesUpgraded to PyQT5, increased responsiveness, less buggy, more intuitive GUI that includes features like:Task completion estimates1-Click scan lists of ips, hostnames and CIDR subnetsAbility to purge results, rescan hosts and delete hostsGranual NMAP scanning optionsSupport for hostname resolution and scanning of vhosts/sni hostsRevise process queuing and execution routines for increased app reliability and performanceSimplification of installation with dependency resolution and installation routinesRealtime project autosaving so in the event some goes wrong, you will not loose any progress!Docker container deployment optionSupported by a highly active development teamGIF DEMOINSTALLATIONTRADITIONAL METHODAssumes Ubuntu, Kali or Parrot Linux is being used with Python 3.6 installed. Other dependencies should automatically be installed. Within Terminal:git clone https://github.com/GoVanguard/legion.gitcd legionsudo chmod +x startLegion.shsudo ./startLegion.shDOCKER METHODAssumes Docker and Xauthority are installed. Within Terminal:git clone https://github.com/GoVanguard/legion.gitcd legion/dockersudo chmod +x runIt.shsudo ./runIt.shATTRIBUTIONRefactored Python 3.6+ codebase, added feature set and ongoing development of Legion is credited to GoVanguardThe initial Sparta Python 2.7 codebase and application design is credited SECFORCE.Several additional PortActions, PortTerminalActions and SchedulerSettings are credited to batmancrew.The nmap XML output parsing engine was largely based on code by yunshu, modified by ketchup and modified SECFORCE.ms08-067_check script used by smbenum.sh is credited to Bernardo Damele A.G.Legion relies heavily on nmap, hydra, python, PyQt, SQLAlchemy and many other tools and technologies so we would like to thank all of the people involved in the creation of those.Download Legion

Link: http://feedproxy.google.com/~r/PentestTools/~3/jDSvXwEafjY/legion-easy-to-use-super-extensible-and.html

Windows Persistence with PowerShell Empire

This is the third article in our empire series, through this we will learn elevated persistence methods. Its trigger method is pretty organised with storage options contained within each module. In Empire, the elevated persistence modules use trigger method and different storage options are required in different modules.  All of these persistence modules are based… Continue reading →
The post Windows Persistence with PowerShell Empire appeared first on Hacking Articles.

Link: https://www.hackingarticles.in/windows-persistence-with-powershell-empire/

Post Exploitation on Saved Password with LaZagne

This article will be focused on The LaZagne project and its usage in Post Exploitation. Table of Content: Introduction of LaZagne Project Syntax and Parameters Achieve Meterpreter and Upload LaZagne Help Screen Mails Argument Windows Argument Browsers Argument Databases Argument Wi-Fi Argument All Argument oN Parameter Verbose Mode Parameter Quiet Parameter Introduction of LaZagne Project… Continue reading →
The post Post Exploitation on Saved Password with LaZagne appeared first on Hacking Articles.

Link: https://www.hackingarticles.in/post-exploitation-on-saved-password-with-lazagne/

UPDATE: Kali Linux 2019.1 Release!

PenTestIT RSS Feed
Kali Linux 2019.1 is the latest Kali Linux release. This is the first 2019 release, which comes after Kali Linux 2018.4, that was made available in the month of October. This new release includes all patches, fixes, updates, and improvements since the last release – Kali Linux 2018.3, including a shiny new Linux kernel versionRead more about UPDATE: Kali Linux 2019.1 Release!
The post UPDATE: Kali Linux 2019.1 Release! appeared first on PenTestIT.

Link: http://pentestit.com/update-kali-linux-2019-1-release/

Comprehensive Guide on Snort (Part 1)

This article will introduce a guide to understand IDS using Snort as an example for it. Table of Content : Introduction to IDS Categories of IDS Types of IDS Introduction to Snort Introduction to IDS IDS Stands for Intrusion Detection System. The techniques and methods on which an IDS is founded on are used to… Continue reading →
The post Comprehensive Guide on Snort (Part 1) appeared first on Hacking Articles.

Link: https://www.hackingarticles.in/comprehensive-guide-on-snort-part-1/

Penetration Testing on Memcached Server

In our previous article, we learned how to configure Memcached Server in Ubuntu 18.04 system to design our own pentest lab. Today we will learn multiple ways to exploit Memcached Server. Table of Contents Dumping data from the Memcached server manually. Dumping data using libmemcached-tools. Dumping data using Metasploit. Monitoring using Watchers. Requirements Target: Memcached… Continue reading →
The post Penetration Testing on Memcached Server appeared first on Hacking Articles.

Link: https://www.hackingarticles.in/penetration-testing-on-memcached-server/

BeEF – The Browser Exploitation Framework Project

What is BeEF?BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser.Amid growing concerns about web-borne attacks against clients, including mobile clients, BeEF allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors. Unlike other security frameworks, BeEF looks past the hardened network perimeter and client system, and examines exploitability within the context of the one open door: the web browser. BeEF will hook one or more web browsers and use them as beachheads for launching directed command modules and further attacks against the system from within the browser context.Get InvolvedYou can get in touch with the BeEF team. Just check out the following:Please, send us pull requests!Web: https://beefproject.com/Bugs: https://github.com/beefproject/beef/issuesSecurity Bugs: security@beefproject.comIRC: ircs://irc.freenode.net/beefprojectTwitter: @beefprojectRequirementsOperating System: Mac OSX 10.5.0 or higher / modern LinuxRuby: 2.3 or newerSQLite: 3.xNode.js: 6 or newerThe gems listed in the Gemfile: https://github.com/beefproject/beef/blob/master/Gemfilebrew install selenium-server-standalone (See https://github.com/shvets/selenium)Quick StartThe following is for the impatient.The install script installs the required operating system packages and all the prerequisite Ruby gems:$ ./installFor full installation details, please refer to INSTALL.txt.We also have an Installation page on the wiki.Upon successful installation, be sure to read the Configuration page on the wiki for important details on configuring and securing BeEF.UsageTo get started, simply execute beef and follow the instructions: $ ./beefVideoDownload Beef

Link: http://feedproxy.google.com/~r/PentestTools/~3/W1UXPoIIVbg/beef-browser-exploitation-framework.html