Netsec
7.49K subscribers
22.9K links
This channel posts the feed from r/netsec.
For any suggestions dm @streaak
Donate to keep the bot running https://www.paypal.me/akhilgv
Download Telegram
Wifi deauthentication attacks and home security
https://ift.tt/360gD5j

Submitted December 27, 2019 at 10:47PM by liotier
via reddit https://ift.tt/2Q5rohv
<b>Parsuite: A Modularized Parser Framework Written in Python 3</b>
<a href="https://github.com/arch4ngel/parsuite">https://github.com/arch4ngel/parsuite</a>I came across <a href="https://www.reddit.com/r/netsec/comments/efl3rc/parse_and_convert_nessus_nmap_and_more_tools_to/">0bs1d1an-'s</a> post about a really cool parser yesterday that supports input files from various sources and it inspired me to share this modular parser I've been working on. I put it together when I decided too much time was being spent using grep and awk during my day-to-day as a penetration tester.Hope someone finds it useful!Framework CapabilitiesYou can create simple <strong>parser modules</strong> and drop them in the <code>parsuite.modules</code> path as described in the <a href="https://github.com/arch4ngel/parsuite/wiki/Parser-Modules">wiki</a>, which'll make them appear in the interface.<strong>abstractions</strong> can be used to represent elements from Nessus, NMap, Masscan, and Burp XML files as Python objects (it's not one-to-one, but enough to get the job done in most cases)<strong>parsers</strong> can be used to parse XML objects on the quickCurrent ModulesThere are several super useful modules already implemented, but here are the three I use most often:nessus_api_host_dumperContrary to the name, this module dumps output from a Nessus scan using the JSON API to while using the filesystem as an improvised database, i.e. each vulnerability receives a folder that contains a list of affected hosts, ports, and sockets. The directory structure is: <code><output directory>/<severity>/<vulnerability name></code>.This module is particularly useful when long scans are running or when the user interface stops working due to large data sets (thanks Tenable).``` archangel@deskjet~> parsuite nessus_api_host_dumper --url <a href="https://www.somenessus.com:8834">https://www.somenessus.com:8834</a> -od nessus_output -i --scan-names TestScan [+] Starting the parser [+] Loading modules [+] Executing module: nessus_api_host_dumper [+] Getting user credentials...[+] Attempting to dump hosts from TestScan [+] Processing: TestScan [+] Processing scan hosts [+] Processing scan plugins (this may take some time) [+] Processing target plugin ids [+] [INFO] traceroute_information [+] [INFO] nessus_scan_information [+] [INFO] additional_dns_hostnames [+] [INFO] tls_version_1_1_protocol_detection [+] [INFO] tls_npn_supported_protocol_enumeration [+] [INFO] tls_next_protocols_supported [+] [INFO] tls_alpn_supported_protocol_enumeration [+] [INFO] ssl_root_certification_authority_certificate_infor [+] [INFO] ssl_perfect_forward_secrecy_cipher_suites_supporte [+] [INFO] ssl_cipher_suites_supported [+] [INFO] ssl_cipher_block_chaining_cipher_suites_supported [+] [INFO] ssl_certificate_signed_using_weak_hashing_algorith [+] [INFO] ssl_certificate_information [+] [INFO] ssl_tls_versions_supported [+] [INFO] hsts_missing_from_https_server [+] [INFO] nessus_tcp_scanner [+] [INFO] hypertext_transfer_protocol_http_information [+] [INFO] http_server_type_and_version [+] [INFO] service_detection [+] Module execution complete. Exiting. ```...and the directory structure looks like``` archangel@deskjet~> head nessus_output/info/additional_dns_hostnames/additional_informationPlugin Name: Additional DNS HostnamesPlugin ID: 46180Severity: INFODescription:Hostnames different from the current hostname have been collected by miscellaneous plugins. Nessus has generated a list of hostnames that point to the remote host. Note that these are only the alternate hostnames for vhosts discovered on a web server.Different web servers may be hosted on name-based virtual hosts. ```xml_dumperExtract output from NMap, Nessus, and Masscan XML files in various formats.Here's an example of dumping records in URI format while searching for HTTP services.<code>root@deskjet:recon~> parsuite xml_dumper -ifs full_aggressive.xml --format uri --sreg --service-search 'https?' [+] Starting the parser [+] Loading…
Bumble: Finding dates and WiFi access points
https://ift.tt/2QsYpD5

Submitted December 28, 2019 at 10:25PM by theappanalyst
via reddit https://ift.tt/2Q5GKT9
D-Link DIR-859 — Unautenticated RCE (CVE-2019–17621)
https://ift.tt/2t7ntYu

Submitted December 27, 2019 at 07:45AM by secenv
via reddit https://ift.tt/37eoSev
Demonstrating the Capital One breach on your own AWS account
https://ift.tt/2MBpX8d

Submitted December 29, 2019 at 04:40PM by sanitybit
via reddit https://ift.tt/37huqol
Various Android Apps allow anyone to remotely edit db/prefs due to debugging library in prod
https://ift.tt/354L618

Submitted December 29, 2019 at 04:16PM by Deletescape
via reddit https://ift.tt/2QvKMD8
cve-search/git-vuln-finder - Finding potential software vulnerabilities from git commit messages
Finding potential software vulnerabilities from git commit messages. The output format is a JSON with the associated commits which could contain a fix regarding a software vulnerability. The search is based on a set of regular expressions against the commit messages only. If CVE IDs are present, those are added automatically in the output.https://github.com/cve-search/git-vuln-finder

Submitted December 28, 2019 at 08:40PM by adulau
via reddit https://ift.tt/37gFkuG
PCG Random number generators are flawed and easy to predict
https://ift.tt/2rFRGKD

Submitted December 29, 2019 at 11:36PM by mgostIH
via reddit https://ift.tt/2thPnkj
Threat intelligence, building your citadel
https://ift.tt/39jI1O5

Submitted December 29, 2019 at 11:58PM by 0xsha
via reddit https://ift.tt/2F5uvQc
Call your tier-one support engineer a "hacker" for fixing a problem your system designers couldn't figure out? Good luck finding that zero-day exploit I told you about.
/r/ProRevenge/comments/eh89df/call_your_tierone_support_engineer_a_hacker_for/

Submitted December 30, 2019 at 03:17AM by _vavkamil_
via reddit https://ift.tt/2rCkvdV
An attacker logged into the RDP Honeypot a few weeks ago and was able to dump credentials and move laterally in 36 minutes. They used Advanced Scanner + ProcDump + PsExec to move laterally to a Domain Controller. Would you have detected and responded to this activity?
https://ift.tt/2F5sB1W

Submitted December 30, 2019 at 02:48AM by InfoSecJim
via reddit https://ift.tt/36a0avt
Some LOLbin Examples for Antivirus Evasion - Silly Rabbit, Trix are for Kids
https://ift.tt/2Q8Wyob

Submitted December 30, 2019 at 07:52AM by thickofits
via reddit https://ift.tt/2MIbkQG