OWASP Mth3l3m3nt Framework

Categories
OWASP Mth3l3m3nt, Uncategorized, Web Attacks

It’s Finally out there the OWASP Mth3l3m3nt Framework . It’s a small tool to aid you in carrying out your pentest tasks with as little resources as possible. Most of us can afford the simple shared hosting services but not a powerful enough VPS to run pentest distros especially due to cost constraints. This one […]

Adding anti-antivirus technology

Categories
malware, Uncategorized

This is a followup article to the previous one. So say the machine has an antivirus that’s not so smart, well you can attempt to kill it. We will make a function that will utilize windows management to load processes and find a specific one based on the antivirus or protection program.   Now since […]

N00bs CTF – Level 1

Categories
ctf, Uncategorized

This is based on the Noob CTF Labs. Level One is here. Answer: infosec_flagis_welcome  The hint is ” may the source be with you” therefore press ctrl+u  on the browser and view the source. notice there is a HTML Comment at the top of the page. <!– infosec_flagis_welcome –>

Level 2

Categories
ctf, Uncategorized

This is based on the infosec Institute Noob CTF http://ctf.infosecinstitute.com/. In Level 2. Answer: infosec_flagis_wearejuststarting Step one : The Image is broken but exists in the image folder. so we download it. first thing is identify if it is indeed an image. We can use filealyzer for this. Now in the Hex tab we see […]

Can Phishers be more uncreative in 2015???

Categories
Uncategorized, Web Attacks

It has become a trend with the 4 phase phish : Identify a target Attack the site Upload phishing page Email and Harvest Well from the previous post we identified some flaws in the phishing attack but that’s 2014. It gets worse when phishers become this uncreative. The uncreativity was an attempt in one of […]

Clouded Flaws

Categories
Uncategorized, WAAS, Web Attacks, webdev

This is a simple discussion based on the demo done at Barcamp 2014.This writeup is based on the problems faced in the implementation of a majority of the cloud based systems especially those offered as SaaS. Some of the issues highlighted here are:  Session Management Failures Poor Coding Practices (Non Secure SDLC) Failed Business Continuity […]