Installation – Comprehensive Guide To Using Androguard

0

The versatile capabilities of Androguard, a powerful tool for reverse engineering Android applications. This guide provides a step-by-step overview on how to install Androguard using different methods, including direct downloads from PyPI and builds from the latest commits on GitHub. Once installed, explore its comprehensive command-line interface that offers a range of functionalities from APK analysis to dynamic tracing....

Netis Cloud Probe – Bridging Network Monitoring Gaps ith Advanced Packet Capture Tools

0

Netis Cloud Probe (Packet Agent, name used before)is an open source project to deal with such situation: it captures packets on Machine A but has to use them on Machine B. This case is very common when you try to monitor network traffic in the LAN but the infrastructure is incapable, for example There is neither TAP nor SPAN device in a physical environment. The Virtual Switch Flow Table does not support...

RdpStrike – Harnessing PIC And Hardware Breakpoints For Credential Extraction

0

The RdpStrike is basically a mini project I built to dive deep into Positional Independent Code (PIC) referring to a blog post written by C5pider, chained with RdpThief tool created by 0x09AL. The project aims to extract clear text passwords from mstsc.exe, and the shellcode uses Hardware Breakpoint to hook APIs. It is a complete positional independent code, and when the shellcode injects into the mstsc.exe process, it is going to...

CVE-2024-29849 : The Veeam Backup Enterprise Manager Authentication Bypass

0

According to Veeam official advisory, all the versions BEFORE Veeam Backup Enterprise Manager 12.1.2.172 are vulnerable Usage First, you need to have the right setup for a local HTTPS setup, use the following commands openssl req -new -x509 -keyout key.pem -out server.pem -days 365 -nodes python CVE-2024-29849.py --target https://192.168.253.180:9398/ --callback-server 192.168.253.1:443 _______ _ _ _______ _______ _____ __ ...

CVE-2024-26229 : Address Validation Flaws In IOCTL With METHOD_NEITHER

0

delve into CVE-2024-26229, a critical security vulnerability identified within the csc.sys driver, pivotal in handling I/O control codes. This issue is catalogued under CWE-781, indicating a severe oversight in address validation mechanisms when utilizing METHOD_NEITHER I/O Control Codes. Such vulnerabilities pose significant risks as they could allow attackers to execute arbitrary code within the kernel, leading to potential system...

DumpMDEConfig – Extracting Microsoft Defender Configuration And Logs With PowerShell Script

0

Invoke-DumpMDEConfig is a PowerShell script designed to extract and display Microsoft Defender configuration and logs, including excluded paths, enabled ASR rules, allowed threats, protection history, and Exploit Guard protection history. The script provides options to output the data in a table or CSV format. Usage # To run the script and output the results in list format: Invoke-DumpMDEConfig # To run the script and...

Phishing Engagement Infrastructure Setup Guide

0

The essential steps and strategies for setting up a robust phishing engagement infrastructure. From acquiring and categorizing domains to automating your phishing efforts, this article provides practical insights and resources for building effective phishing campaigns. We also delve into innovative methods for email delivery that bypass common security filters, ensuring your phishing emails reach their intended targets. Whether you're...

Detection Lab – A Comprehensive Overview Of Its Features, Documentation, And Legacy

0

This lab has been designed with defenders in mind. Its primary purpose is to allow the user to quickly build a Windows domain that comes pre-loaded with security tooling and some best practices when it comes to system logging configurations. It can easily be modified to fit most needs or expanded to include additional hosts. Read more about Detection Lab...

Kupa3 – Script Dependencies And Domain Connections On Websites

0

Kupa3 allows you to draw connections between scripts on specific website. It search for javascript code or source attribute, in html code, and crawls it in order to draw a dependency graph. This approach can help bug hunters to discover subdomains and examine javascript calls, OSINT researchers to check what companies are connected to each other or for tracking...

Whapa – Comprehensive Guide To The WhatsApp Forensic Toolset

0

In the digital age, forensic analysis of messaging applications like WhatsApp is crucial for both security and investigative purposes. 'Whapa' offers a sophisticated suite of tools designed to parse and analyze WhatsApp data on Android and iOS devices. Developed with Python and supported on multiple operating systems, Whapa enhances forensic capabilities with its robust features and compatibility. Whatsapp Parser Toolset Updated:...