Kerberos, while more secure than NTLM, also has some security nuances. In this article, researcher Caster will demonstrate techniques for detecting Kerberos attacks using Suricata.
Caster - Kerbhammer
https://blog.exploit.org/caster-kerbhammer
Caster - Kerbhammer
https://blog.exploit.org/caster-kerbhammer
โค7๐5๐ฅ4โก1
UPDATE: Telegram has fixed this bug.
๐ Telegram started banning bots that send messages, where service number "
Some of popular bots (like@fabrika) got already banned.
If you own a bot, turn off sending messages whose content depends on user input (e.g. greeting with user's firstname, etc.).
P.S Telegram started slowly rollbacking the bans.
t.me/+42777"
is included in its content as a link.Some of popular bots (like
If you own a bot, turn off sending messages whose content depends on user input (e.g. greeting with user's firstname, etc.).
P.S Telegram started slowly rollbacking the bans.
Please open Telegram to view this post
VIEW IN TELEGRAM
๐ฉ15๐6๐2๐2โก1
Active Directory is used in many networks and is often the target of attacks. In this article, Caster will demonstrate the capabilities of Suricata signatures to detect attacks against Active Directory.
Caster - If You Hadn't
https://blog.exploit.org/caster-ifyouhadnt
Caster - If You Hadn't
https://blog.exploit.org/caster-ifyouhadnt
โค7๐ฅ3โก1
I think network traffic analysis in pentest scenarios is vastly underrated. In this article, I will demonstrate a technique to silently analyze the security of network equipment based on traffic analysis alone.
Caster - Funeral
https://blog.exploit.org/caster-funeral
Caster - Funeral
https://blog.exploit.org/caster-funeral
โค10๐ฅ6๐5โ2โก1
๐ OWASP Netryx Release ๐
https://github.com/OWASP/www-project-netryx
We have our official release of Netryx under OWASP Foundation - advanced Java security framework designed to protect your data and save you from cyber attacks. Here are the key features:
JA3, JA4+, and HTTP/2 Fingerprinting:
identification of users based on TLS and HTTP connection establishment, which helps to avoid bots and bad actors.
Intrusion Detection System (IDS):
Collect and analyze data to detect and block malicious activities.
HTTP/2 0day Protection:
Block attacks exploiting vulnerabilities in the HTTP/2 protocol, preventing you from RST Stream vulnerability
Path Traversal Protection:
Prevent unauthorized access to files outside the web root directory, ensuring your data remains secure.
Protection Against Various Injection Attacks:
HTML, JS, LDAP, and CMD encoders ensuring safety against different types of injection attacks.
Secure Memory Management:
Ensure sensitive information like keys and tokens are safely handled in memory, protecting from Data in Use attacks.
And much more! All these features are implemented in Java, making OWASP Netryx a big addition to your security toolkit.
Don't forget to star the repository๐
#OWASP #Netryx #CyberSecurity #Java #WebSecurity
https://github.com/OWASP/www-project-netryx
We have our official release of Netryx under OWASP Foundation - advanced Java security framework designed to protect your data and save you from cyber attacks. Here are the key features:
JA3, JA4+, and HTTP/2 Fingerprinting:
identification of users based on TLS and HTTP connection establishment, which helps to avoid bots and bad actors.
Intrusion Detection System (IDS):
Collect and analyze data to detect and block malicious activities.
HTTP/2 0day Protection:
Block attacks exploiting vulnerabilities in the HTTP/2 protocol, preventing you from RST Stream vulnerability
Path Traversal Protection:
Prevent unauthorized access to files outside the web root directory, ensuring your data remains secure.
Protection Against Various Injection Attacks:
HTML, JS, LDAP, and CMD encoders ensuring safety against different types of injection attacks.
Secure Memory Management:
Ensure sensitive information like keys and tokens are safely handled in memory, protecting from Data in Use attacks.
And much more! All these features are implemented in Java, making OWASP Netryx a big addition to your security toolkit.
Don't forget to star the repository
#OWASP #Netryx #CyberSecurity #Java #WebSecurity
Please open Telegram to view this post
VIEW IN TELEGRAM
๐ฅ14๐9โค6๐ค2โก1
Currently we are witnessing arrest of creator of main digital privacy respecting messenger Pavel Durov.
WHY THIS MATTERS:
With over 950 million users, Telegram is one of the last products with respect to digital privacy. Holding Durov accountable for content shared by users or for protecting user data from authorities sets a dangerous precedent moving on for everyone that wants to create a privacy first solutions. This is not just about one person. Itโs about safeguarding the right to privacy for all of us as a collective.
This action is a serious threat to the fundamental right to privacy in the digital age. Telegram has been a vital tool for millions around the world, ensuring freedom of speech and protecting our personal data, as well as providing the outlet to freely share opinions and information from unwarranted intrusion.
WHAT CAN YOU DO:
We need to raise our voices and demand justice. Write to Amnesty International at contactus@amnesty.org and urge them to support Pavel Durov and advocate for his release. Amnesty has a powerful voice on global platform and has been instrumental in defending human rights across the world. If we unite and work together by sending our concerns to them with requests, we will get justice to work.
Letโs stand together for our fundamental digital rights and make sure this doesnโt go unnoticed. ๐ก๏ธ
#Repost to other places and channels in order to reach broader masses and communities, so we can get more gravitas in order to protect human right to digital privacy
We as humans are stronger and louder in unity and mass.
Line for Enquiries: contactus@amnesty.org
Mail template: https://telegra.ph/Amnesty-Mail-Template-08-25
#FreeDurov #PrivacyMatters #DigitalRights #AmnestyInternational
WHY THIS MATTERS:
With over 950 million users, Telegram is one of the last products with respect to digital privacy. Holding Durov accountable for content shared by users or for protecting user data from authorities sets a dangerous precedent moving on for everyone that wants to create a privacy first solutions. This is not just about one person. Itโs about safeguarding the right to privacy for all of us as a collective.
This action is a serious threat to the fundamental right to privacy in the digital age. Telegram has been a vital tool for millions around the world, ensuring freedom of speech and protecting our personal data, as well as providing the outlet to freely share opinions and information from unwarranted intrusion.
WHAT CAN YOU DO:
We need to raise our voices and demand justice. Write to Amnesty International at contactus@amnesty.org and urge them to support Pavel Durov and advocate for his release. Amnesty has a powerful voice on global platform and has been instrumental in defending human rights across the world. If we unite and work together by sending our concerns to them with requests, we will get justice to work.
Letโs stand together for our fundamental digital rights and make sure this doesnโt go unnoticed. ๐ก๏ธ
#Repost to other places and channels in order to reach broader masses and communities, so we can get more gravitas in order to protect human right to digital privacy
We as humans are stronger and louder in unity and mass.
Line for Enquiries: contactus@amnesty.org
Mail template: https://telegra.ph/Amnesty-Mail-Template-08-25
#FreeDurov #PrivacyMatters #DigitalRights #AmnestyInternational
๐22๐14โค12๐ฅ12๐5
A researcher under the nickname Caster returns with his "Against" release to our blog.
This is an extremely specific article about attacks on MikroTik routers.
Release Date: 09/27/2024
https://blog.exploit.org/caster-against/
This is an extremely specific article about attacks on MikroTik routers.
Release Date: 09/27/2024
https://blog.exploit.org/caster-against/
๐131โคโ๐ฅ63๐39๐ฉ19๐ฅ15
TailScale is a popular solution for building virtual networks, but in the hands of a pentester, it can be a pivoting tool.
Magama Bazarov, known under his alter ego โCasterโ returns to exploit.org with his exotic release โBipolar Disorderโ about pivoting using TailScale.
https://blog.exploit.org/caster-bipolar-disorder
Magama Bazarov, known under his alter ego โCasterโ returns to exploit.org with his exotic release โBipolar Disorderโ about pivoting using TailScale.
https://blog.exploit.org/caster-bipolar-disorder
๐25๐ฅ14โค13๐ฉ8๐7
Caster strikes again!
His RouterOS configuration security analyzer โSaraโ got its own icon in the Kali Linux distribution in the form of Caster's logo.
You can install this tool directly from the Kali repository:
Unstoppable psycho!
His RouterOS configuration security analyzer โSaraโ got its own icon in the Kali Linux distribution in the form of Caster's logo.
You can install this tool directly from the Kali repository:
kali@kali:~$ sudo apt update && sudo apt install sara
Unstoppable psycho!
๐13๐ฅ10๐ฉ4โ1
Perhaps an airplane will fly over your head every few minutes, or even more than one. Services like Flightradar24 amazingly accurately show information about planes in the air because they receive data through the ADS-B protocol. This can be done independently, and I will show you how to do it.
A security researcher under the alias "Sterva" makes his debut on exploit.org with his article on processing flight information with ADS-B.
https://blog.exploit.org/ads-b-guide-demodulation-and-decoding/
A security researcher under the alias "Sterva" makes his debut on exploit.org with his article on processing flight information with ADS-B.
https://blog.exploit.org/ads-b-guide-demodulation-and-decoding/
๐11๐ฅ3๐คฎ3๐ฉ3๐คก2
Sterva continues to conquer ADS-B!
Meet his new article on exploit.org โADS-B Spoofingโ. This article explores the principles of ADS-B data transmission, encoding, and signal generation through a controlled experimental setup.
https://blog.exploit.org/ads-b-spoofing/
Meet his new article on exploit.org โADS-B Spoofingโ. This article explores the principles of ADS-B data transmission, encoding, and signal generation through a controlled experimental setup.
https://blog.exploit.org/ads-b-spoofing/
โค7๐ฅ3๐2๐ฅฑ1๐1
Magama Bazarov, known under his alter ego Caster is preparing a new release - "Philosophy of Nietzsche"
In his September work โViolenceโ he broke down the technique of pivoting on Linux with Nebula, now he will do the same on Windows with an exotic trick using ICS Sharing.
Stay tuned.
In his September work โViolenceโ he broke down the technique of pivoting on Linux with Nebula, now he will do the same on Windows with an exotic trick using ICS Sharing.
Stay tuned.
๐ฅ13โค5๐2๐ฅฑ2๐2
This media is not supported in your browser
VIEW IN TELEGRAM
Caster will release his article โPhilosophy of Nietzscheโ on December 20
๐ฅ7๐4โค2๐ฅฑ2๐คฃ1
Caster's new release, Philosophy of Nietzsche, is available now on exploit.org
An extremely specific method of pivoting on Windows using Nebula.
https://blog.exploit.org/caster-philosophy-of-nietzsche
An extremely specific method of pivoting on Windows using Nebula.
https://blog.exploit.org/caster-philosophy-of-nietzsche
๐ฅ5๐3๐3โคโ๐ฅ2๐ด1
exploit.org
Caster's new release, Philosophy of Nietzsche, is available now on exploit.org An extremely specific method of pivoting on Windows using Nebula. https://blog.exploit.org/caster-philosophy-of-nietzsche
Inspired by Friedrich Nietzsche's "Thus Spoke Zarathustra", Caster continues his experiments with Nebula. He has greatly increased the complexity of the network architecture while adapting his experimental concept from โPhilosophy of Nietzscheโ to it.
New release coming soon.
New release coming soon.
๐ฅ7๐4๐2๐2๐ด1
Caster's new release on pivoting on Windows using Nebula in the presence of NAT.
Release Date: 30 December 2024
https://blog.exploit.org/caster-ubermensch/
Release Date: 30 December 2024
https://blog.exploit.org/caster-ubermensch/
๐6๐2โค1๐ฅ1๐1
Caster returns with the release of the โSeen It Allโ video
Taking off his red mask and putting on his blue mask, he performed an in-depth packet analysis and demonstrated Suricata IDS signatures to detect attacks on Active Directory.
https://www.youtube.com/watch?v=LvsBC9dGpWg
Taking off his red mask and putting on his blue mask, he performed an in-depth packet analysis and demonstrated Suricata IDS signatures to detect attacks on Active Directory.
https://www.youtube.com/watch?v=LvsBC9dGpWg
YouTube
Seen It All: Detecting Active Directory Attacks with Suricata IDS [English Subtitles]
A research study on detecting attacks on Windows networks based on traffic analysis. Especially for Blue Team engineers and Windows administrators.
Gist flie with signatures: https://gist.github.com/casterbyte/b0370faab8c3d0061dd3eb6c1c8ef3df
Github link:โฆ
Gist flie with signatures: https://gist.github.com/casterbyte/b0370faab8c3d0061dd3eb6c1c8ef3df
Github link:โฆ
๐ฅ6โค3๐2๐2๐1
Caster returns with the release of a crazy article about attacks on IPv6. Welcome back!
https://blog.exploit.org/caster-legless
https://blog.exploit.org/caster-legless
๐ฅ6๐2โค1๐1๐คจ1