10 links
tagged with all of: penetration-testing + security
Click any tag below to further narrow down your results
Links
Automating the WSUS attack involves exploiting the Windows Server Update Service by spoofing its IP address to serve malicious updates, allowing attackers to gain local administrative access on targeted Windows machines. The tool, wsuks, facilitates this attack by using ARP spoofing and serving a predefined PowerShell script alongside PsExec64.exe, enabling the creation of a new user with admin privileges or adding an existing domain user to the local admin group. Users must run the tool with root privileges on a local network with an HTTP-configured WSUS server.
Exploiting enterprise Wi-Fi networks, even those secured with EAP-TLS, is possible through techniques like wireless pivots and rogue access points. This article explores how attackers can capture credentials and network traffic by taking advantage of misconfigurations and the behavior of trusted devices as they connect to various networks. The discussion includes the mechanics of attacks and the importance of understanding Wi-Fi security boundaries.
WPAUDIT is a comprehensive WordPress security audit tool aimed at ethical hackers and security professionals, offering advanced features for vulnerability scanning and penetration testing. Its modular architecture allows for customizable scan profiles and integration with various security tools, making it an essential resource for thorough security assessments of WordPress installations. The documentation provides detailed guidance on setup, usage, and extending its functionalities.
SetupHijack is a security research tool designed to exploit vulnerabilities in Windows installer and update processes by hijacking file drops in writable directories. It allows attackers to replace legitimate files with malicious payloads, executing them with elevated privileges without needing admin access. The tool is intended for red team, penetration testing, and security research applications, emphasizing controlled and authorized use only.
Learn essential strategies for securing Supabase deployments through practical fixes for common misconfigurations identified in real-world penetration tests. The guide emphasizes the importance of proper authentication, PostgREST configurations, and secure handling of Edge Functions and storage to mitigate potential vulnerabilities.
Generate malicious PDF files with phone-home functionalities for penetration testing and red-teaming purposes using a provided Python script. The tool creates various types of PDFs that exploit different vulnerabilities, serving as resources for security testing and educational insights into malicious document behavior.
SAMLSmith is a C# tool designed for generating custom SAML responses and executing Silver and Golden SAML attacks, aimed at security researchers and penetration testers. It offers four main commands for generating SAML responses via command line parameters or JSON configuration files, as well as extracting certificates from AD FS encrypted materials. The tool is based on components from the Python tool ADFSpoof and is intended for authorized security testing and research only.
IAMhounddog is a tool designed for penetration testers to efficiently identify privileged principals and second-order privilege escalation opportunities in AWS environments. It streamlines the assessment of permission relationships among AWS roles, users, and policies, reducing the need for manual reviews. Created by Nathan Tucker and released by Virtue Security, it aids in enhancing security testing processes for cloud infrastructures.
secureCodeBox is a modular toolchain designed for continuous security scans of software projects within a Kubernetes environment. It aims to automate the detection of low-hanging fruit security issues early in the development process, allowing penetration testers to focus on more complex vulnerabilities. While it enhances ongoing application security, it requires a deep understanding of security practices and proper configuration.
Wyrm is an open-source Red Team security testing framework written in Rust, designed for authorized security testing. Users are advised to change default credentials for security and to back up profiles before updating, as the project is under active development with planned updates and new features. It provides various functionalities, including encrypted communication and dynamic payload generation, while emphasizing legal and authorized use only.