Netsec
7.49K subscribers
22.9K links
This channel posts the feed from r/netsec.
For any suggestions dm @streaak
Donate to keep the bot running https://www.paypal.me/akhilgv
Download Telegram
Catalog of Supply Chain Compromises
/r/blueteamsec/comments/eeffw5/catalog_of_supply_chain_compromises/

Submitted December 23, 2019 at 12:59PM by digicat
via reddit https://ift.tt/2sYlcOV
Full release of Empire 3.0! BC-Security's fork will be the Kali supported fork going forward. Plus details on what's in the update.
https://ift.tt/2EKUVqj

Submitted December 23, 2019 at 06:51PM by Hubble_BC_Security
via reddit https://ift.tt/2SmzKCO
App Analysis: Plenty of Fish; Locating users and revealing information via the API
https://ift.tt/2EO95Xr

Submitted December 23, 2019 at 06:43PM by theappanalyst
via reddit https://ift.tt/392wQZL
NGINX error_page request smuggling
https://ift.tt/34UvnBE

Submitted December 24, 2019 at 09:21PM by albinowax
via reddit https://ift.tt/2MpVsC6
Pentester's Mindset - Get out of the limited OWASP TOP-10/SANS TOP-25/Bug Bounty mindset
https://ift.tt/2MHp1PV

Submitted December 25, 2019 at 03:30PM by rotisabzi
via reddit https://ift.tt/34R7XwR
SANS Holiday Hack 2019 Writeup - Kringlecon 2: Turtle Doves
https://ift.tt/2PUcydq

Submitted December 26, 2019 at 12:11AM by PolleV
via reddit https://ift.tt/35WuIAX
Parse and convert Nessus, Nmap (and more tools) to XLSX, CSV
https://ift.tt/2LOYPlW

Submitted December 26, 2019 at 01:37AM by 0bs1d1an-
via reddit https://ift.tt/39feWTF
Wifi deauthentication attacks and home security
https://ift.tt/360gD5j

Submitted December 27, 2019 at 10:47PM by liotier
via reddit https://ift.tt/2Q5rohv
<b>Parsuite: A Modularized Parser Framework Written in Python 3</b>
<a href="https://github.com/arch4ngel/parsuite">https://github.com/arch4ngel/parsuite</a>I came across <a href="https://www.reddit.com/r/netsec/comments/efl3rc/parse_and_convert_nessus_nmap_and_more_tools_to/">0bs1d1an-'s</a> post about a really cool parser yesterday that supports input files from various sources and it inspired me to share this modular parser I've been working on. I put it together when I decided too much time was being spent using grep and awk during my day-to-day as a penetration tester.Hope someone finds it useful!Framework CapabilitiesYou can create simple <strong>parser modules</strong> and drop them in the <code>parsuite.modules</code> path as described in the <a href="https://github.com/arch4ngel/parsuite/wiki/Parser-Modules">wiki</a>, which'll make them appear in the interface.<strong>abstractions</strong> can be used to represent elements from Nessus, NMap, Masscan, and Burp XML files as Python objects (it's not one-to-one, but enough to get the job done in most cases)<strong>parsers</strong> can be used to parse XML objects on the quickCurrent ModulesThere are several super useful modules already implemented, but here are the three I use most often:nessus_api_host_dumperContrary to the name, this module dumps output from a Nessus scan using the JSON API to while using the filesystem as an improvised database, i.e. each vulnerability receives a folder that contains a list of affected hosts, ports, and sockets. The directory structure is: <code><output directory>/<severity>/<vulnerability name></code>.This module is particularly useful when long scans are running or when the user interface stops working due to large data sets (thanks Tenable).``` archangel@deskjet~> parsuite nessus_api_host_dumper --url <a href="https://www.somenessus.com:8834">https://www.somenessus.com:8834</a> -od nessus_output -i --scan-names TestScan [+] Starting the parser [+] Loading modules [+] Executing module: nessus_api_host_dumper [+] Getting user credentials...[+] Attempting to dump hosts from TestScan [+] Processing: TestScan [+] Processing scan hosts [+] Processing scan plugins (this may take some time) [+] Processing target plugin ids [+] [INFO] traceroute_information [+] [INFO] nessus_scan_information [+] [INFO] additional_dns_hostnames [+] [INFO] tls_version_1_1_protocol_detection [+] [INFO] tls_npn_supported_protocol_enumeration [+] [INFO] tls_next_protocols_supported [+] [INFO] tls_alpn_supported_protocol_enumeration [+] [INFO] ssl_root_certification_authority_certificate_infor [+] [INFO] ssl_perfect_forward_secrecy_cipher_suites_supporte [+] [INFO] ssl_cipher_suites_supported [+] [INFO] ssl_cipher_block_chaining_cipher_suites_supported [+] [INFO] ssl_certificate_signed_using_weak_hashing_algorith [+] [INFO] ssl_certificate_information [+] [INFO] ssl_tls_versions_supported [+] [INFO] hsts_missing_from_https_server [+] [INFO] nessus_tcp_scanner [+] [INFO] hypertext_transfer_protocol_http_information [+] [INFO] http_server_type_and_version [+] [INFO] service_detection [+] Module execution complete. Exiting. ```...and the directory structure looks like``` archangel@deskjet~> head nessus_output/info/additional_dns_hostnames/additional_informationPlugin Name: Additional DNS HostnamesPlugin ID: 46180Severity: INFODescription:Hostnames different from the current hostname have been collected by miscellaneous plugins. Nessus has generated a list of hostnames that point to the remote host. Note that these are only the alternate hostnames for vhosts discovered on a web server.Different web servers may be hosted on name-based virtual hosts. ```xml_dumperExtract output from NMap, Nessus, and Masscan XML files in various formats.Here's an example of dumping records in URI format while searching for HTTP services.<code>root@deskjet:recon~> parsuite xml_dumper -ifs full_aggressive.xml --format uri --sreg --service-search 'https?' [+] Starting the parser [+] Loading…
Bumble: Finding dates and WiFi access points
https://ift.tt/2QsYpD5

Submitted December 28, 2019 at 10:25PM by theappanalyst
via reddit https://ift.tt/2Q5GKT9
D-Link DIR-859 — Unautenticated RCE (CVE-2019–17621)
https://ift.tt/2t7ntYu

Submitted December 27, 2019 at 07:45AM by secenv
via reddit https://ift.tt/37eoSev