Lançado o Kali NetHunter 3.0

Lançado o Kali NetHunter 3.0

kalinethunterO NetHunter foi desenvolvido ativamente por mais de um ano, e sofreu nada menos do que uma completa transformação desde a sua última versão. Os resultados são uma revisão completa da aplicação NetHunter no Android, com uma interface mais polida e um conjunto de recursos em pleno funcionamento.

Através do trabalho comunitário é possível considerá-lo uma plataforma móvel de testes de penetração estável, de nível comercial.

Mas o que há de novo no Kali NetHunter 3.0?

Dentre as novidades estão o suporte ao Android Lollipop e Marshmallow (AOSP Android 6.x), melhorias na documentação e diversos novos recursos e ataques adicionados.

Confira mais detalhes através do link:

BSides Winnipeg 2015 – Modern TLS in the Enterprise

BSides Winnipeg 2015 – Modern TLS in the Enterprise

The state of TLS/SSL is changing at a rapid pace over the last year and its use and implementation is being dragged around by the ear by the browser vendors. What are the consequences of implementing modern TLS in complicated and regulated environments? How has TLS been used in these environments to date? How do we design services which implement all of the benefits of TLS but also limit their impact to infrastructure and regulatory costs? Are TLS and PKI strategies identical and aligned across application stacks and portfolios? This talk will give examples of the ways TLS has been used in Enterprise infrastructure over the years and will discuss possible solutions and strategies to meld the seemingly incompatible requirements of regulatory compliance and end-to-end security. For More Information Please Visit:-



Snowden Leak Proves That NSA And GCHQ Spied On Israeli Drones Using Open Source Tools

Snowden Leak Proves That NSA And GCHQ Spied On Israeli Drones Using Open Source Tools

Israeli Long Range UAV (Image: 3DPrint)

Israeli Long Range UAV (Image: 3DPrint)

Short Bytes: According to the latest documents provided by Edward Snowden to The Intercept, NSA and GCHQ were involved in surveillance activities pertaining to Israeli and Syrian drones presumed to be carrying weapons. The security agencies performed a collaborative operation codenamed Anarchist which was revealed in these documents leaked by the NSA Whistleblower.

It was in 2013 when Edward Snowden used TOR to bust the global secret surveillance activities conducted by NSA, revealing around 1.7 million files as estimated by the United States Officials. Three years have passed, but the NSA authorities can still feel the impact in their head. The Intercept has published some snapshots that reveal more about the surveillance activities conducted by the American and British security agencies.

The images contribute as a part of the documents obtained by The Intercept from NSA whistleblower Edward Snowden, which account for a series of surveillance operations led by Britain’s GCHQ (Government Communications Headquarters) in assistance with its American counterpart NSA. The purpose of the operations was to intercept analogue video feeds from Israeli and Syrian drones presumed to be carrying missiles.

Codenamed as “Anarchist”, the video interception mission by GCHQ and NSA involved the exploit of satellite and radio communication signals in east Mediterranean and Levant regions which was conducted at the GCHQ station at the Royal Air Force communication base situated in Troodos Mountains of Cyprus.

A training module was issued to the analysts to guide them with available open source tools and methods to process scrambled imagery obtained from Israeli drones. Instructions were mentioned to capture the video footage frames in BMP format images with the use of M2Extra.

GCHQ used open source software like AntiSky to break down commercial satellite encryption. AntiSky was developed by Dr. Markus Kuhn, Computer Laboratory at the University of Cambridge. The software allows anyone to peep through the satellite signals and then use his expertise to come up with some meaningful outcome. However, digital video signals used by some drones might pose difficulty for the analysts appointed by the security agencies.

The computing power needed to descramble the images in near real time is considerable without the use of dedicated hardware such as a video capture card that can record uncompressed images. It is still possible to descramble individual frames to determine the image content without making too much effort.

— Cited from the Anarchist Training Module “ISUAV Video Descrambling”, released by The Intercept.

NSA and CGHQ Surveillance snaphot of Heron TP

Image | The Intercept

A 6-minute video footage was captured by the analysts on January 28, 2010, featuring a Heron TP – manufactured by Israel Aerospace Industries – carrying a heavy weapon, probably a missile that is clearly visible on the left wing.

“It certainly looks like the missile-shaped objects are weapons. The bodies appear to have cruciform tail fins. The distortion makes it a bit hard to tell size, but — assuming they are bombs — these are definitely less than 500-pound class,” says the Aviation Week editor Bill Sweetman.

Several more signals were intercepted on different dates and the analysts arrived at the conclusion that the Israeli and Syrian militaries were using IAI Heron, IAI Eitan, and Aeronautics Aerostar Tactical – “This is the standard IAI Heron, which can be recognized by the shape of the satellite communications radome,” said Sweetman in reference to an image captured on April 26, 2009 – loaded with weapons.

Another blurred snapshot – which was “too poor to process” according to an Anarchist document – was recorded on August 25, 2009. The same day when several Palestinians were killed in a Gaza smuggler tunnel bombing conducted by IDF. A 14-second video footage from January 3, 2008, captured by Menwith Hill NSA surveillance site, was of an Israeli F-16 fighter plane, “showed an ‘unbroken line’ running through the targeting display, indicating that the target being tracked was on the ground”. The footage could be related to Gaza strip airstrikes that killed nine people. NSA did pat its back for intercepting the footage in an internal newsletter published in March 2008.

The Intercept writes,

A 2010 GCHQ report includes stills from a video captured by Anarchist that “revealed multiple video streams from different cameras.” The report explains that “this is potentially a significant upgrade to the normal analogue video we see, this new system adds the capability to see a number of video feeds simultaneously.” It concludes that “we currently have no collection system capable of processing this signal due to the high data rate and complexity of the underlying data,” and suggests expanding capabilities in order to capture such videos.

Clearly, the report did express GCHQ and NSA’s concern to intercept the digital video footage and advanced communication methods utilized in newer Israeli drones.

Write your views about this revelation in the comments section below.

Also read: Case Against NSA Dismissed Because Nobody Can Prove That It is Spying

The post Snowden Leak Proves That NSA And GCHQ Spied On Israeli Drones Using Open Source Tools appeared first on fossBytes.


SegInfocast #27 – Cofre de Senhas e Gerenciamento de Identidades

SegInfocast #27 – Cofre de Senhas e Gerenciamento de Identidades

seginfocast-logo-novo_150SegInfocast #27 – Faça o download aqui.

Paulo Sant’anna recebe Carolina Bozza, Country Manager da CyberArk, profissional com mais de 10 anos de experiência no mercado de TI, para uma conversa sobre Cofre de Senhas e Gerenciamento de Identidades. Dentre os vários assuntos, podemos destacar:

O que é um cofre de senhas?

Nossa convidada explica o que é um cofre de senhas, suas características, diferentes versões e objetivos.

Desafios e principais problemas de senhas e gerenciamento de identidades

Quais os principais (e comuns) problemas enfrentados pelas empresas brasileiras no dia a dia? Carolina cita casos reais onde a falta do gerenciamento adequado de senhas traz a tona problemas muitas vezes inesperados.

Implementação de um Cofre de Senhas

Carolina comenta sobre os principais desafios na implementação de um cofre de senhas, e cita as principais dicas para que o projeto seja bem sucedido.

E os Benefícios?

Além da melhor gestão da identidade, a implementação traz outros benefícios como auditoria, gerenciamento de contas privilegiadas, entre outros.

Carolina Bozza tem mais de 10 anos de experiência em TI. Atualmente trabalha como Country Manager da CyberArk. Foi coautora da publicação: “Guia de Segurança para e-Commerce”. Já palestrou em vários eventos no Brasil como SecureBrasil, Roadsec, MindTheSec, SecurityDay, BHack entre outros.

Exploiting site with LFI(Local File Inclusion) to Upload shell Tutorial-By Spirit

Exploiting site with LFI(Local File Inclusion) to Upload shell Tutorial-By Spirit

Hello again ;)
So, I am Spirit as you all know and today discuss about lfi(local File Inclusion)

So, lets start :D
This tutorial is for educational purpose only i am not responsible for any harm.
And please suggest me what should i make in my next tutorial and please let me know about my mistakes if i have done in my tutorial ;)
Please do some practice grin emoticon
Thanks for watching guys and keep watching pentesting with spirit
Channel link::
Facebook page link::
Twitter account::

BSides Winnipeg 2015 – BGP, some Python, and a DB

BSides Winnipeg 2015 – BGP, some Python, and a DB

BGP, some Python, and a DB Theodore Baschak How do services like BGPmon and Dyn provide Internet Intelligence? This talk will describe the process of building a small-scale BGP update logger, running it on a single AS, and then attempt to scale it up. For More Information Please Visit:-



Best Hacking Tools Of 2016 For Windows, Mac OS X, And Linux – fossBytes

Best Hacking Tools Of 2016 For Windows, Mac OS X, And Linux – fossBytes

acunetix best hacking tool 2016Short Bytes: fossBytes has prepared a useful list of the best hacking tools of 2016 based upon industry reviews, your feedback, and its own experience. This list will tell you about the best software used for hacking purposes featuring port scanners, web vulnerability scanner, password crackers, forensics tools and social engineering tools.

We have compiled this list of top hacking tools of 2016 with their best features and download links. Read about them, learn how to use them and share your reviews to make this list better.

Disclaimer: fossBytes is publishing this article just for educational purposes and we don’t promote any malicious practices.

Metasploit | Best Hacking Tools Of 2016metaspoit best hacking tool 2016

Rather than calling Metasploit a collection of exploit tools, I’ll call it an infrastructure that you can utilize to build your own custom tools. This free tool is one of the most popular cybersecurity tool around that allows you to locate vulnerabilities at different platforms. Metasploit is backed by more than 200,000 users and contributors that help you to get insights and uncover the weaknesses in your system.

This top hacking tool package of 2016 lets you simulate real-world attacks to tell you about the weak points and finds them. As a penetration tester, it pin points the vulnerabilities with Nexpose closed–loop integration using Top Remediation reports. Using the open source Metasploit framework, users can build their own tools and take the best out of this multi-purpose hacking tool.

Metasploit is available for all major platforms including Windows, Linux, and OS X.

Read more here and find download link.

Get Cyber Security threat report.

Acunetix WVS | Best Hacking Tools Of 2016acunetix best hacking tool 2016

Acunetix is a web vulnerability scanner (WVS) that scans and finds out the flaws in a website that could prove fatal. This multi-threaded tool crawls a website and finds out malicious Cross-site Scripting, SQL injection, and other vulnerabilities. This fast and easy to use tool scans WordPress websites form more than 1200 vulnerabilities in WordPress.

Acunetix comes with a Login Sequence Recorder that allows one to access the password protected areas of websites. The new AcuSensor technology used in this tool allows you to reduce the false positive rate. Such features have made Acunetix WVS a preferred hacking tools that you need to check out in 2016.

Acunetix is available for Windows XP and higher.

Read more here and find download link.

Nmap | Best Hacking Tools Of 2016zenmap- best hacking tool 2016

Nmap – also known as Network Mapper – falls in the category of a port scanner tool. This free and open source tool is the most popular port scanning tool around that allows efficient network discovery and security auditing. Used for a wide range of services, Nmap uses raw IP packets to determine the hosts available on a network, their services along with details, operating systems used by hosts, the type of firewall used, and other information.

Last year, Nmap won multiple security products of the year awards and was featured in multiple movies including The Matrix Reloaded, Die Hard 4, and others.  Available in the command line, Nmap executable also comes in an advanced GUI avatar.

Nmap is available for all major platforms including Windows, Linux, and OS X.

Read more here and find download link.

Also Read: Best Hacking Apps For Android Phones

Wireshark | Best Hacking Tools Of 2016wireshark- best hacking tool 2016

Wireshark is a well-known packet crafting tool that discovers vulnerability within a network and probes firewall rule-sets. Used by thousands of security professionals to analyze networks and live pocket capturing and deep scanning of hundreds of protocols. Wireshark helps you to read live data from Ethernet, IEEE 802.11, PPP/HDLC, ATM, Bluetooth, USB, Token Ring, Frame Relay, FDDI, and others.

This free and open source tool was originally named Ethereal. Wireshark also comes in a command-line version called TShark.

This GTK+-based network protocol analyzer runs with ease on Linux, Windows, and OS X.

Read more here and find download link.

oclHashcat | Best Hacking Tools Of 2016oclhashcat best hacking tool 2016

If password cracking is something you do on daily basis, you might be aware of the free password cracking tool Hashcat. While Hashcat is a CPU-based password cracking tool, oclHashcat is its advanced version that uses the power of your GPU.

oclHashcat calls itself world’s fastest password cracking tool with world’s first and only GPGPU based engine. For using the tool, NVIDIA users require ForceWare 346.59 or later and AMD users require Catalyst 15.7 or later.

This tool employs following attack modes for cracking:

  • Straight
  • Combination
  • Brute-force
  • Hybrid dictionary + mask
  • Hybrid mask + dictionary

Mentioning another major feature, oclHashcat is an open source tool under MIT license that allows an easy integration or packaging of the common Linux distros.

This useful hacking tool can be downloaded in different versions  for Linux, OSX, and Windows.

Read more here and find download link

Nessus Vulnerability Scanner | Best Hacking Tools Of 2016nessus1 best hacking tool 2016

This top free hacking tool of 2016 works with the help of a client-server framework. Developed by Tenable Network Security, the tool is one of the most popular vulnerability scanners we have. Nessus serves different purposes to different types of users – Nessus Home, Nessus Professional, Nessus Manager and Nessus Cloud.

Using Nessus, one can scan multiple types of vulnerabilities that include remote access flaw detection, misconfiguration alert, denial of services against TCP/IP stack, preparation of PCI DSS audits, malware detection, sensitive data searches etc. To launch a dictionary attack, Nessus can also call a popular tool Hydra externally.

Apart from the above mentioned basic functionalities, Nessus could be used to scan multiple networks on IPv4, IPv6 and hybrid networks. You can set scheduled scan to run at your chosen time and re-scan all or a subsection of previously scanned hosts using selective host re-scanning.

Nessus is supported by a variety of platforms including Windows 7 and 8, Mac OS X, and popular Linux distros like Debian, Ubuntu, Kali Linux etc.

Read more here and find download link

Maltego | Best Hacking Tools Of 2016Maltego-Screen best hacking tool 2016

Maltego is an open source forensics platform that offers rigorous mining and information gathering to paint a picture of cyber threats around you. Maltego excels in showing the complexity and severity of points of failure in your infrastructure and the surrounding environment.

Maltego is a great hacker tool that analyzes the real world links between people, companies, websites, domains, DNS names, IP addresses, documents and whatnot. Based on Java, this tool runs in an easy-to-use graphical interface with lost customization options while scanning.

Maltego hacking tool  is available for Windows, Mac, and Linux.

Read more here and find download link

Social-Engineer Toolkit | Best Hacking Tools Of 2016social engineer toolkit best hacking tool 2016

Also featured on Mr. Robot, TrustedSec’s Social-Engineer Toolkit is an advanced framework for simulating multiple types of social engineering attacks like credential harvestings, phishing attacks, and more. On the show, Elliot is seen using the SMS spoofing tool from the Social-Engineer Toolkit.

This Python-driven tool is the standard tool for social-engineering penetration tests with more than two million downloads. It automates the attacks and generates disguising emails, malicious web pages and more.

To download SET on Linux, type the following command:

git clone set/

Apart from Linux, Social-Engineer Toolkit is partially supported on Mac OS X and Windows.

Other top hacking tools in multiple categories:

Web Vulnerability Scanners – Burp Suite, Firebug, AppScan, OWASP Zed, Paros Proxy

Vulnerability Exploitation Tools – Netsparker, sqlmap, Core Impact, WebGoat, BeEF

Forensic Tools – Helix3 Pro, EnCase, Autopsy

Port Scanners – Unicornscan, NetScanTools, Angry IP Scanner

Traffic Monitoring Tools – Nagios, Ntop, Splunk, Ngrep, Argus

Debuggers – IDA Pro, WinDbg, Immunity Debugger, GDB

Rootkit Detectors – DumpSec, Tripwire, HijackThis

Encryption Tools – KeePass, OpenSSL, OpenSSH/PuTTY/SSH, Tor

Password Crackers – John the Ripper, Aircrack, Hydra, ophcrack

We hope that you found this top hacking tools of 2016 list helpful. Share your reviews in the comments below and help us improve this list.

Also Read: 10 Best Operating Systems For Ethical Hacking And Penetration Testing

The post Best Hacking Tools Of 2016 For Windows, Mac OS X, And Linux – fossBytes appeared first on fossBytes.


Quatro maneiras que um criminoso virtual pode invadir uma empresa

Quatro maneiras que um criminoso virtual pode invadir uma empresa

cyber attackMesmo possuindo muitas soluções de segurança da informação disponíveis no mercado não significa que sua empresa está imune a invasão, as recentes manchetes indicam isso. Devemos reconhecer que mesmo os melhores produtos não podem oferecer 100% de proteção aos agentes de ameaças maliciosas que querem ter acesso aos nossos sistemas.

Além disso, existem centenas de produtos de segurança no mercado que bombardeiam os profissionais de TI com milhares de alertas por semana, a maioria dos quais são indicação de algo, não necessariamente ruim. Estes realmente permitir ameaças reais a esgueirar-se os profissionais de segurança passados, fazendo tentativas para encontrar uma agulha num palheiro quase impossível.

Aqui estão quatro maneiras que um criminoso virtual pode invadir uma empresa, desviando das soluções de segurança mais comuns:

Infectar um dispositivo de terceiros.

Neste cenário, o criminoso infecta um componente com sistemas operacionais fornecido por terceiros. Esses componentes são geralmente pré-instalados em softwares que são fornecidos por um fabricante de OEM para promover determinados serviços e produtos, tais como as capacidades anti-roubo. O problema é que a maioria destes “extra-pacotes” são persistentes, projetado para permanecer no sistema, mesmo após a limpeza do sistema profissional ou uma substituição total da unidade de disco. O risco? Estes pacotes de software recebem o mais alto nível de privilégios de sistema, permitindo-lhes realizar qualquer atividade. Na verdade, alguns desses pacotes são conhecidos por agirem como backdoors. Recentemente, uma campanha de spyware massa foi exposta, revelando que nas duas últimas décadas, inúmeros pacotes de firmware comum eram, na verdade, ferramentas de spyware. No início deste ano, o Superfish, programa de anúncios adware pré-instalado em alguns computadores portáteis foi encontrado permitindo que os criminosos lançassem ataques Man-in-the-Middle contra a vítima.

Infectando um serviço de nuvem usado pela organização.

Neste cenário, o criminoso infecta um serviço de compartilhamento de arquivos comum com malware. Uma vez que os funcionários da organização sincronizam seus arquivos com esse serviço, resultará numa infecção em massa. O Dropbox, por exemplo, adverte precisamente contra esta ameaça, incentivando os usuários a considerar medidas adicionais de segurança para o sincronismo de arquivos.


Aproveitando vulnerabilidades de design.

Atacantes sofisticados encontrarão e explorarão falhas de design que são imprevistos pelos autores do sistema operacional e aplicativos, bem como aqueles que criam soluções que tentam impedir a infiltração de código malicioso. Por exemplo, Sandworm, uma falha de design que aparece em um componente do Windows. Ele pode permitir a execução remota de código. Foi usado em uma campanha de ciber-espionagem atribuída à Rússia, onde alvos eram: OTAN, Ucrânia, Polônia, União Européia, Empresas Européias de Telecomunicações e do Setor de Energia. Os atacantes foram capazes de ignorar facilmente as defesas até que os exploits foram descobertos e assinaturas ou novas técnicas de detecção foram atualizados.

Ataques focados nos dados.

Neste cenário, um exploit baseado em vulnerabilidades de corrupção de memória comum como estouro de buffer e permite execução remota de código arbitrário. O que faz com que este cenário de modo exclusivo, e, portanto, extremamente difícil para detectar, é que o ataque altera o comportamento de aplicação através da manipulação apenas os dados de endereço no âmbito de aplicação. Tal ataque foi apresentado na Black Hat Europa por Francisco Falcon: “”Exploiting Adobe Flash Player in the era of Control Flow Guard”.

É importante reconhecer que os atacantes criarão códigos maliciosos que realizarão os objetivos de encontrar e comprometere sistemas de dados valiosos enquanto simultaneamente permanecem abaixo do radar das defesas normais dos usuários do sistema.

Considerando que o comprometimento de nossos sistemas é inevitável, precisamos abordar os ataques tal como doenças crônicas, ou seja, controlar a doença em vez de curá-la. Como mencionado acima, no caso de cibersegurança, que significa prevenir as consequências da invasão, ou seja, o roubo de dados valiosos. Assim como o tratamento adequado pode aliviar o sofrimento e aumentar a longevidade, as organizações devem aprender a trabalhar com segurança em face de uma rede persistentemente comprometida.

Fonte (em inglês): link