exploit.org
5.54K subscribers
26 photos
1 video
26 links
FinTech & Cybersecurity.
contact@exploit.org
Download Telegram
Kerberos, while more secure than NTLM, also has some security nuances. In this article, researcher Caster will demonstrate techniques for detecting Kerberos attacks using Suricata.

Caster - Kerbhammer

https://blog.exploit.org/caster-kerbhammer
โค7๐Ÿ‘5๐Ÿ”ฅ4โšก1
UPDATE: Telegram has fixed this bug.

๐Ÿ™‚ Telegram started banning bots that send messages, where service number "t.me/+42777" is included in its content as a link.
Some of popular bots (like @fabrika) got already banned.

If you own a bot, turn off sending messages whose content depends on user input (e.g. greeting with user's firstname, etc.).

P.S Telegram started slowly rollbacking the bans.
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ’ฉ15๐Ÿ‘6๐Ÿ˜2๐Ÿ•Š2โšก1
Tomorrow
โค12๐Ÿ”ฅ7๐Ÿ’ฉ4๐Ÿ‘Œ4๐Ÿ–•3
Active Directory is used in many networks and is often the target of attacks. In this article, Caster will demonstrate the capabilities of Suricata signatures to detect attacks against Active Directory.

Caster - If You Hadn't

https://blog.exploit.org/caster-ifyouhadnt
โค7๐Ÿ”ฅ3โšก1
I think network traffic analysis in pentest scenarios is vastly underrated. In this article, I will demonstrate a technique to silently analyze the security of network equipment based on traffic analysis alone.

Caster - Funeral

https://blog.exploit.org/caster-funeral
โค10๐Ÿ”ฅ6๐Ÿ‘5โœ2โšก1
๐Ÿš€ OWASP Netryx Release ๐Ÿš€
https://github.com/OWASP/www-project-netryx

We have our official release of Netryx under OWASP Foundation - advanced Java security framework designed to protect your data and save you from cyber attacks. Here are the key features:

JA3, JA4+, and HTTP/2 Fingerprinting:
identification of users based on TLS and HTTP connection establishment, which helps to avoid bots and bad actors.

Intrusion Detection System (IDS):
Collect and analyze data to detect and block malicious activities.

HTTP/2 0day Protection:
Block attacks exploiting vulnerabilities in the HTTP/2 protocol, preventing you from RST Stream vulnerability

Path Traversal Protection:
Prevent unauthorized access to files outside the web root directory, ensuring your data remains secure.

Protection Against Various Injection Attacks:
HTML, JS, LDAP, and CMD encoders ensuring safety against different types of injection attacks.

Secure Memory Management:
Ensure sensitive information like keys and tokens are safely handled in memory, protecting from Data in Use attacks.

And much more! All these features are implemented in Java, making OWASP Netryx a big addition to your security toolkit.

Don't forget to star the repository ๐Ÿ˜‰

#OWASP #Netryx #CyberSecurity #Java #WebSecurity
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ14๐Ÿ‘9โค6๐Ÿค”2โšก1
โค36๐Ÿ•Š16๐Ÿ‘9๐Ÿ’ฉ2
Currently we are witnessing arrest of creator of main digital privacy respecting messenger Pavel Durov.

WHY THIS MATTERS:
With over 950 million users, Telegram is one of the last products with respect to digital privacy. Holding Durov accountable for content shared by users or for protecting user data from authorities sets a dangerous precedent moving on for everyone that wants to create a privacy first solutions. This is not just about one person. Itโ€™s about safeguarding the right to privacy for all of us as a collective.

This action is a serious threat to the fundamental right to privacy in the digital age. Telegram has been a vital tool for millions around the world, ensuring freedom of speech and protecting our personal data, as well as providing the outlet to freely share opinions and information from unwarranted intrusion.

WHAT CAN YOU DO:
We need to raise our voices and demand justice. Write to Amnesty International at contactus@amnesty.org and urge them to support Pavel Durov and advocate for his release. Amnesty has a powerful voice on global platform and has been instrumental in defending human rights across the world. If we unite and work together by sending our concerns to them with requests, we will get justice to work.

Letโ€™s stand together for our fundamental digital rights and make sure this doesnโ€™t go unnoticed. ๐Ÿ›ก๏ธ

#Repost to other places and channels in order to reach broader masses and communities, so we can get more gravitas in order to protect human right to digital privacy

We as humans are stronger and louder in unity and mass.

Line for Enquiries: contactus@amnesty.org
Mail template: https://telegra.ph/Amnesty-Mail-Template-08-25

#FreeDurov #PrivacyMatters #DigitalRights #AmnestyInternational
๐Ÿ•Š22๐Ÿ‘14โค12๐Ÿ”ฅ12๐Ÿ˜5
A researcher under the nickname Caster returns with his "Against" release to our blog.
This is an extremely specific article about attacks on MikroTik routers.

Release Date: 09/27/2024

https://blog.exploit.org/caster-against/
๐Ÿ‘131โคโ€๐Ÿ”ฅ63๐Ÿ‘39๐Ÿ’ฉ19๐Ÿ”ฅ15
TailScale is a popular solution for building virtual networks, but in the hands of a pentester, it can be a pivoting tool.

Magama Bazarov, known under his alter ego โ€œCasterโ€ returns to exploit.org with his exotic release โ€œBipolar Disorderโ€ about pivoting using TailScale.

https://blog.exploit.org/caster-bipolar-disorder
๐Ÿ‘25๐Ÿ”ฅ14โค13๐Ÿ’ฉ8๐Ÿ‘Œ7
Caster strikes again!

His RouterOS configuration security analyzer โ€œSaraโ€ got its own icon in the Kali Linux distribution in the form of Caster's logo.
You can install this tool directly from the Kali repository:

kali@kali:~$ sudo apt update && sudo apt install sara


Unstoppable psycho!
๐Ÿ‘13๐Ÿ”ฅ10๐Ÿ’ฉ4โœ1
Perhaps an airplane will fly over your head every few minutes, or even more than one. Services like Flightradar24 amazingly accurately show information about planes in the air because they receive data through the ADS-B protocol. This can be done independently, and I will show you how to do it.

A security researcher under the alias "Sterva" makes his debut on exploit.org with his article on processing flight information with ADS-B.

https://blog.exploit.org/ads-b-guide-demodulation-and-decoding/
๐Ÿ‘11๐Ÿ”ฅ3๐Ÿคฎ3๐Ÿ’ฉ3๐Ÿคก2
Sterva continues to conquer ADS-B!

Meet his new article on exploit.org โ€œADS-B Spoofingโ€. This article explores the principles of ADS-B data transmission, encoding, and signal generation through a controlled experimental setup.

https://blog.exploit.org/ads-b-spoofing/
โค7๐Ÿ”ฅ3๐Ÿ‘2๐Ÿฅฑ1๐Ÿ’Š1
Magama Bazarov, known under his alter ego Caster is preparing a new release - "Philosophy of Nietzsche"
In his September work โ€œViolenceโ€ he broke down the technique of pivoting on Linux with Nebula, now he will do the same on Windows with an exotic trick using ICS Sharing.

Stay tuned.
๐Ÿ”ฅ13โค5๐Ÿ‘Ž2๐Ÿฅฑ2๐Ÿ–•2
This media is not supported in your browser
VIEW IN TELEGRAM
Caster will release his article โ€œPhilosophy of Nietzscheโ€ on December 20
๐Ÿ”ฅ7๐Ÿ‘Ž4โค2๐Ÿฅฑ2๐Ÿคฃ1
Caster's new release, Philosophy of Nietzsche, is available now on exploit.org

An extremely specific method of pivoting on Windows using Nebula.

https://blog.exploit.org/caster-philosophy-of-nietzsche
๐Ÿ”ฅ5๐Ÿ‘3๐Ÿ‘Ž3โคโ€๐Ÿ”ฅ2๐Ÿ˜ด1
exploit.org
Caster's new release, Philosophy of Nietzsche, is available now on exploit.org An extremely specific method of pivoting on Windows using Nebula. https://blog.exploit.org/caster-philosophy-of-nietzsche
Inspired by Friedrich Nietzsche's "Thus Spoke Zarathustra", Caster continues his experiments with Nebula. He has greatly increased the complexity of the network architecture while adapting his experimental concept from โ€œPhilosophy of Nietzscheโ€ to it.

New release coming soon.
๐Ÿ”ฅ7๐Ÿ‘Ž4๐Ÿ‘2๐Ÿ’Š2๐Ÿ˜ด1
Caster's new release on pivoting on Windows using Nebula in the presence of NAT.

Release Date: 30 December 2024

https://blog.exploit.org/caster-ubermensch/
๐Ÿ‘Ž6๐Ÿ‘2โค1๐Ÿ”ฅ1๐Ÿ˜1
Caster returns with the release of the โ€œSeen It Allโ€ video

Taking off his red mask and putting on his blue mask, he performed an in-depth packet analysis and demonstrated Suricata IDS signatures to detect attacks on Active Directory.

https://www.youtube.com/watch?v=LvsBC9dGpWg
๐Ÿ”ฅ6โค3๐Ÿ‘Ž2๐Ÿ’Š2๐Ÿ˜1
Caster returns with the release of a crazy article about attacks on IPv6. Welcome back!

https://blog.exploit.org/caster-legless
๐Ÿ”ฅ6๐Ÿ’Š2โค1๐Ÿ‘Ž1๐Ÿคจ1