exploit.org
6.11K subscribers
25 photos
1 video
25 links
FinTech & Cybersecurity.
contact@exploit.org
Download Telegram
Poisoning attacks against Windows machines have become well known among pentesters. In this article, Caster will demonstrate how to detect poisoning attacks using Suricata.

Caster - Neurotransmitter

https://blog.exploit.org/caster-neurotransmitter
Kerberos, while more secure than NTLM, also has some security nuances. In this article, researcher Caster will demonstrate techniques for detecting Kerberos attacks using Suricata.

Caster - Kerbhammer

https://blog.exploit.org/caster-kerbhammer
UPDATE: Telegram has fixed this bug.

🙂 Telegram started banning bots that send messages, where service number "t.me/+42777" is included in its content as a link.
Some of popular bots (like @fabrika) got already banned.

If you own a bot, turn off sending messages whose content depends on user input (e.g. greeting with user's firstname, etc.).

P.S Telegram started slowly rollbacking the bans.
Please open Telegram to view this post
VIEW IN TELEGRAM
Tomorrow
Active Directory is used in many networks and is often the target of attacks. In this article, Caster will demonstrate the capabilities of Suricata signatures to detect attacks against Active Directory.

Caster - If You Hadn't

https://blog.exploit.org/caster-ifyouhadnt
I think network traffic analysis in pentest scenarios is vastly underrated. In this article, I will demonstrate a technique to silently analyze the security of network equipment based on traffic analysis alone.

Caster - Funeral

https://blog.exploit.org/caster-funeral
🚀 OWASP Netryx Release 🚀
https://github.com/OWASP/www-project-netryx

We have our official release of Netryx under OWASP Foundation - advanced Java security framework designed to protect your data and save you from cyber attacks. Here are the key features:

JA3, JA4+, and HTTP/2 Fingerprinting:
identification of users based on TLS and HTTP connection establishment, which helps to avoid bots and bad actors.

Intrusion Detection System (IDS):
Collect and analyze data to detect and block malicious activities.

HTTP/2 0day Protection:
Block attacks exploiting vulnerabilities in the HTTP/2 protocol, preventing you from RST Stream vulnerability

Path Traversal Protection:
Prevent unauthorized access to files outside the web root directory, ensuring your data remains secure.

Protection Against Various Injection Attacks:
HTML, JS, LDAP, and CMD encoders ensuring safety against different types of injection attacks.

Secure Memory Management:
Ensure sensitive information like keys and tokens are safely handled in memory, protecting from Data in Use attacks.

And much more! All these features are implemented in Java, making OWASP Netryx a big addition to your security toolkit.

Don't forget to star the repository 😉

#OWASP #Netryx #CyberSecurity #Java #WebSecurity
Please open Telegram to view this post
VIEW IN TELEGRAM
Currently we are witnessing arrest of creator of main digital privacy respecting messenger Pavel Durov.

WHY THIS MATTERS:
With over 950 million users, Telegram is one of the last products with respect to digital privacy. Holding Durov accountable for content shared by users or for protecting user data from authorities sets a dangerous precedent moving on for everyone that wants to create a privacy first solutions. This is not just about one person. It’s about safeguarding the right to privacy for all of us as a collective.

This action is a serious threat to the fundamental right to privacy in the digital age. Telegram has been a vital tool for millions around the world, ensuring freedom of speech and protecting our personal data, as well as providing the outlet to freely share opinions and information from unwarranted intrusion.

WHAT CAN YOU DO:
We need to raise our voices and demand justice. Write to Amnesty International at contactus@amnesty.org and urge them to support Pavel Durov and advocate for his release. Amnesty has a powerful voice on global platform and has been instrumental in defending human rights across the world. If we unite and work together by sending our concerns to them with requests, we will get justice to work.

Let’s stand together for our fundamental digital rights and make sure this doesn’t go unnoticed. 🛡️

#Repost to other places and channels in order to reach broader masses and communities, so we can get more gravitas in order to protect human right to digital privacy

We as humans are stronger and louder in unity and mass.

Line for Enquiries: contactus@amnesty.org
Mail template: https://telegra.ph/Amnesty-Mail-Template-08-25

#FreeDurov #PrivacyMatters #DigitalRights #AmnestyInternational
A researcher under the nickname Caster returns with his "Against" release to our blog.
This is an extremely specific article about attacks on MikroTik routers.

Release Date: 09/27/2024

https://blog.exploit.org/caster-against/
TailScale is a popular solution for building virtual networks, but in the hands of a pentester, it can be a pivoting tool.

Magama Bazarov, known under his alter ego “Caster” returns to exploit.org with his exotic release “Bipolar Disorder” about pivoting using TailScale.

https://blog.exploit.org/caster-bipolar-disorder
Caster strikes again!

His RouterOS configuration security analyzer “Sara” got its own icon in the Kali Linux distribution in the form of Caster's logo.
You can install this tool directly from the Kali repository:

kali@kali:~$ sudo apt update && sudo apt install sara


Unstoppable psycho!
Perhaps an airplane will fly over your head every few minutes, or even more than one. Services like Flightradar24 amazingly accurately show information about planes in the air because they receive data through the ADS-B protocol. This can be done independently, and I will show you how to do it.

A security researcher under the alias "Sterva" makes his debut on exploit.org with his article on processing flight information with ADS-B.

https://blog.exploit.org/ads-b-guide-demodulation-and-decoding/
Sterva continues to conquer ADS-B!

Meet his new article on exploit.org “ADS-B Spoofing”. This article explores the principles of ADS-B data transmission, encoding, and signal generation through a controlled experimental setup.

https://blog.exploit.org/ads-b-spoofing/
Magama Bazarov, known under his alter ego Caster is preparing a new release - "Philosophy of Nietzsche"
In his September work “Violence” he broke down the technique of pivoting on Linux with Nebula, now he will do the same on Windows with an exotic trick using ICS Sharing.

Stay tuned.
This media is not supported in your browser
VIEW IN TELEGRAM
Caster will release his article “Philosophy of Nietzsche” on December 20
Caster's new release, Philosophy of Nietzsche, is available now on exploit.org

An extremely specific method of pivoting on Windows using Nebula.

https://blog.exploit.org/caster-philosophy-of-nietzsche
exploit.org
Caster's new release, Philosophy of Nietzsche, is available now on exploit.org An extremely specific method of pivoting on Windows using Nebula. https://blog.exploit.org/caster-philosophy-of-nietzsche
Inspired by Friedrich Nietzsche's "Thus Spoke Zarathustra", Caster continues his experiments with Nebula. He has greatly increased the complexity of the network architecture while adapting his experimental concept from “Philosophy of Nietzsche” to it.

New release coming soon.
Caster's new release on pivoting on Windows using Nebula in the presence of NAT.

Release Date: 30 December 2024

https://blog.exploit.org/caster-ubermensch/