Android is undoubtedly one of the most vulnerable operating systems for smartphones with hackers developing new Android malware every 17 seconds. To prove the point researchers have exposed a malware campaign known as “Gooligan” that has been targeting Android users and so far has breached more than 1 million Google accounts of users around the […]
German interior minister has proposed a draft law for data protection (DVD) in which the powers and authorities of German Data Protection department have been limited greatly and they cannot even investigate suspected breaches of legal and medical records of people. Also Read: Statues of Snowden, Assange, Manning unveiled in Berlin’ Alexanderplatz square This particular bill will also […]
Short Bytes: A security researcher named Sami Laiho has found a simple flaw in the Windows 10 update procedure that can let a hacker bypass BitLocker and access elevated Command Line. To do so, one needs to hold Shift+F10 during the update process. Laiho advises the users to avoid leaving their PCs unattended during the update process. […]
Carleton University (Canada, Ottawa, Ontario) students must keep their computers and Wi-Fi routers off because some of the computers at the university are infected with ransomware. The malware uses encryption to lock the files on the system and ask for ransom. On Tuesday morning, the IT department of the university issued a notification to staff […]
Version 2.0 – 2015: https://www.youtube.com/playlist?list=PLIjb28IYMQgqqqApoGRCZ_O40vP-eKsgf
Version 2.5 – 2016: https://www.youtube.com/playlist?list=PLRic6PgcrsWGkgacL6WFnSQKVRZIoofRj
Python (2.7.*, version 2.7.11 was used for development and demo)
Msfconsole (accessible via environment variables)
cURL (curl) [NEW]
PyGame (apt-get install python-pygame) [NEW]
Chrome (14 Nov 2015) – This should still work.
Firefox (04 Nov 2016) – Tested live at Black Hat Arsenal 2016
Better WP Security 3.5.3 http://ift.tt/2fD3Ob2
Optional: WPSEO http://ift.tt/1blM6kR
SecurityCheck 2.8.9 http://ift.tt/2fD3rNY
Audio: Contains remixed audio notifications.
Exploits: Contains DirtyCow (DCOW) privilege escalation exploits.
Joomla_Backdoor: Contains a sample Joomla extension backdoor which can be uploaded as an administrator and subsequently used to execute arbitrary commands on the system with system($_GET[‘c’]).
Shells: Contains the PHP shells to inject, including a slightly modified version of pentestmonkey’s shell that connects back via wget.
Sense of Security
MaXe / InterN0T