UPDATED VERSION: RouterSploit 3.4.0

PenTestIT RSS Feed
RouterSploit 3.4.0, the long awaited router exploitation framework update is out guys! This release includes some really cool features and updates such as using pycryptodome from pycryptoand newer exploitation modules! Read on for the improvements. What is RouterSploit? The RouterSploit Framework is an open-source exploitation framework dedicated to embedded devices. It consists of the followingRead more about UPDATED VERSION: RouterSploit 3.4.0
The post UPDATED VERSION: RouterSploit 3.4.0 appeared first on PenTestIT.

Link: http://pentestit.com/updated-version-routersploit-3-4-0/

iBombShell: A Dynamic Post-Exploitation Remote Shell

PenTestIT RSS Feed
Consider you have a shell on a system and other post-exploitation do not work for you as they are being caught by a security solution on the system. Worry not as we now have iBombShell, a dynamic remote shell that can be run on any system that supports PowerShell. The reason this is called dynamicRead more about iBombShell: A Dynamic Post-Exploitation Remote Shell
The post iBombShell: A Dynamic Post-Exploitation Remote Shell appeared first on PenTestIT.

Link: http://pentestit.com/ibombshell-dynamic-post-exploitation-remote-shell/

Comparison of Open Source Adversary Emulation Tools

PenTestIT RSS Feed
If you liked my older post titled “List of Adversary Emulation Tools“, I am sure you must want to know what is the difference or comparison between the different tools. This post is an attempt to do just that -to list down the comparison of open source adversary emulation tools. I have compared their capabilitiesRead more about Comparison of Open Source Adversary Emulation Tools
The post Comparison of Open Source Adversary Emulation Tools appeared first on PenTestIT.

Link: http://pentestit.com/open-source-adversary-emulation-tools-comparison/

UPDATE: Kali Linux 2018.3 Release!

PenTestIT RSS Feed
Kali Linux 2018.3 is the latest Kali Linux release. This is the third release which comes after the last release, that was made available in the month of April. This new release includes all patches, fixes, updates, and improvements since the last release – Kali Linux 2018.2, including a shiny new Linux kernel version 4.17.0 and upgrades toRead more about UPDATE: Kali Linux 2018.3 Release!
The post UPDATE: Kali Linux 2018.3 Release! appeared first on PenTestIT.

Link: http://pentestit.com/update-kali-linux-2018-3-release/

Remote NTLM relaying through meterpreter on Windows port 445

The hijacking of port 445 to perform relay attacks or hash capturing attacks has been a recurring topic for a while now. When you infect a target with meterpreter, how do you listen on port 445? A few weeks ago this topic resurfaced again in part due to Dirk-jan (@_dirkjan) that saw this question flying … Continue reading “Remote NTLM relaying through meterpreter on Windows port 445"

Link: http://diablohorn.com/2018/08/25/remote-ntlm-relaying-through-meterpreter-on-windows-port-445/

Black Hat & DEF CON 2018 – Tradecraft Security Weekly #28

This is the Hacker Summer Camp 2018 edition of Tradecraft Security Weekly. In this week’s episode Beau Bullock (@dafthack) talks about some of the more interesting items he saw come out of the Black Hat and DEF CON conferences this year. Links: ZigDiggity – https://github.com/BishopFox/zigdiggity Humble Chameleon – https://github.com/claissg/humble_chameleon WHID Injector – https://github.com/whid-injector/WHID Chiron – https://github.com/aatlasis/Chiron ExchangeRelayX blog – https://blog.quickbreach.io/one-click-to-owa/ […]
The post Black Hat & DEF CON 2018 – Tradecraft Security Weekly #28 appeared first on Security Weekly.

Link: http://feedproxy.google.com/~r/securityweekly/Lviv/~3/AbyF-hORexc/

Introducing Reneo

Reneo is a Windows tool to help incident responders, forensics specialists, and security researchers analyze and reverse engineer malicious and obfuscated scripts and other content. This tool can convert from/to various formats, transform, deobfuscate, encode/decode, encrypt/decrypt, and hash strings. The … Continue reading →

Link: http://www.kahusecurity.com/2018/06/introducing-reneo/

Creating a ram disk through meterpreter

The magical ‘in memory execution‘ option of meterpreter is of course one of the better options that we as attackers love to use. However if you want to store ‘random files’ in memory or need to execute more complex applications which contain dependencies on other files, there is no ‘in memory’ option for that as … Continue reading “Creating a ram disk through meterpreter"

Link: http://diablohorn.com/2018/08/06/creating-a-ram-disk-through-meterpreter/

UPDATED VERSION: RouterSploit 3.3.0

PenTestIT RSS Feed
Since my last update, this router exploitation framework have gone through a lot of updates. This post is about RouterSploit 3.3.0 code named I Know You Were Trouble. We will also discuss changes made to and an earlier version 3.2.0 to maintain a chain with the hopes that I keep a watch on these coolRead more about UPDATED VERSION: RouterSploit 3.3.0
The post UPDATED VERSION: RouterSploit 3.3.0 appeared first on PenTestIT.

Link: http://pentestit.com/updated-version-routersploit-3-3-0/