Poisoning attacks against Windows machines have become well known among pentesters. In this article, Caster will demonstrate how to detect poisoning attacks using Suricata.
Caster - Neurotransmitter
https://blog.exploit.org/caster-neurotransmitter
Caster - Neurotransmitter
https://blog.exploit.org/caster-neurotransmitter
Kerberos, while more secure than NTLM, also has some security nuances. In this article, researcher Caster will demonstrate techniques for detecting Kerberos attacks using Suricata.
Caster - Kerbhammer
https://blog.exploit.org/caster-kerbhammer
Caster - Kerbhammer
https://blog.exploit.org/caster-kerbhammer
UPDATE: Telegram has fixed this bug.
🙂 Telegram started banning bots that send messages, where service number "
Some of popular bots (like@fabrika) got already banned.
If you own a bot, turn off sending messages whose content depends on user input (e.g. greeting with user's firstname, etc.).
P.S Telegram started slowly rollbacking the bans.
t.me/+42777"
is included in its content as a link.Some of popular bots (like
If you own a bot, turn off sending messages whose content depends on user input (e.g. greeting with user's firstname, etc.).
P.S Telegram started slowly rollbacking the bans.
Please open Telegram to view this post
VIEW IN TELEGRAM
Active Directory is used in many networks and is often the target of attacks. In this article, Caster will demonstrate the capabilities of Suricata signatures to detect attacks against Active Directory.
Caster - If You Hadn't
https://blog.exploit.org/caster-ifyouhadnt
Caster - If You Hadn't
https://blog.exploit.org/caster-ifyouhadnt
I think network traffic analysis in pentest scenarios is vastly underrated. In this article, I will demonstrate a technique to silently analyze the security of network equipment based on traffic analysis alone.
Caster - Funeral
https://blog.exploit.org/caster-funeral
Caster - Funeral
https://blog.exploit.org/caster-funeral
🚀 OWASP Netryx Release 🚀
https://github.com/OWASP/www-project-netryx
We have our official release of Netryx under OWASP Foundation - advanced Java security framework designed to protect your data and save you from cyber attacks. Here are the key features:
JA3, JA4+, and HTTP/2 Fingerprinting:
identification of users based on TLS and HTTP connection establishment, which helps to avoid bots and bad actors.
Intrusion Detection System (IDS):
Collect and analyze data to detect and block malicious activities.
HTTP/2 0day Protection:
Block attacks exploiting vulnerabilities in the HTTP/2 protocol, preventing you from RST Stream vulnerability
Path Traversal Protection:
Prevent unauthorized access to files outside the web root directory, ensuring your data remains secure.
Protection Against Various Injection Attacks:
HTML, JS, LDAP, and CMD encoders ensuring safety against different types of injection attacks.
Secure Memory Management:
Ensure sensitive information like keys and tokens are safely handled in memory, protecting from Data in Use attacks.
And much more! All these features are implemented in Java, making OWASP Netryx a big addition to your security toolkit.
Don't forget to star the repository😉
#OWASP #Netryx #CyberSecurity #Java #WebSecurity
https://github.com/OWASP/www-project-netryx
We have our official release of Netryx under OWASP Foundation - advanced Java security framework designed to protect your data and save you from cyber attacks. Here are the key features:
JA3, JA4+, and HTTP/2 Fingerprinting:
identification of users based on TLS and HTTP connection establishment, which helps to avoid bots and bad actors.
Intrusion Detection System (IDS):
Collect and analyze data to detect and block malicious activities.
HTTP/2 0day Protection:
Block attacks exploiting vulnerabilities in the HTTP/2 protocol, preventing you from RST Stream vulnerability
Path Traversal Protection:
Prevent unauthorized access to files outside the web root directory, ensuring your data remains secure.
Protection Against Various Injection Attacks:
HTML, JS, LDAP, and CMD encoders ensuring safety against different types of injection attacks.
Secure Memory Management:
Ensure sensitive information like keys and tokens are safely handled in memory, protecting from Data in Use attacks.
And much more! All these features are implemented in Java, making OWASP Netryx a big addition to your security toolkit.
Don't forget to star the repository
#OWASP #Netryx #CyberSecurity #Java #WebSecurity
Please open Telegram to view this post
VIEW IN TELEGRAM
Currently we are witnessing arrest of creator of main digital privacy respecting messenger Pavel Durov.
WHY THIS MATTERS:
With over 950 million users, Telegram is one of the last products with respect to digital privacy. Holding Durov accountable for content shared by users or for protecting user data from authorities sets a dangerous precedent moving on for everyone that wants to create a privacy first solutions. This is not just about one person. It’s about safeguarding the right to privacy for all of us as a collective.
This action is a serious threat to the fundamental right to privacy in the digital age. Telegram has been a vital tool for millions around the world, ensuring freedom of speech and protecting our personal data, as well as providing the outlet to freely share opinions and information from unwarranted intrusion.
WHAT CAN YOU DO:
We need to raise our voices and demand justice. Write to Amnesty International at contactus@amnesty.org and urge them to support Pavel Durov and advocate for his release. Amnesty has a powerful voice on global platform and has been instrumental in defending human rights across the world. If we unite and work together by sending our concerns to them with requests, we will get justice to work.
Let’s stand together for our fundamental digital rights and make sure this doesn’t go unnoticed. 🛡️
#Repost to other places and channels in order to reach broader masses and communities, so we can get more gravitas in order to protect human right to digital privacy
We as humans are stronger and louder in unity and mass.
Line for Enquiries: contactus@amnesty.org
Mail template: https://telegra.ph/Amnesty-Mail-Template-08-25
#FreeDurov #PrivacyMatters #DigitalRights #AmnestyInternational
WHY THIS MATTERS:
With over 950 million users, Telegram is one of the last products with respect to digital privacy. Holding Durov accountable for content shared by users or for protecting user data from authorities sets a dangerous precedent moving on for everyone that wants to create a privacy first solutions. This is not just about one person. It’s about safeguarding the right to privacy for all of us as a collective.
This action is a serious threat to the fundamental right to privacy in the digital age. Telegram has been a vital tool for millions around the world, ensuring freedom of speech and protecting our personal data, as well as providing the outlet to freely share opinions and information from unwarranted intrusion.
WHAT CAN YOU DO:
We need to raise our voices and demand justice. Write to Amnesty International at contactus@amnesty.org and urge them to support Pavel Durov and advocate for his release. Amnesty has a powerful voice on global platform and has been instrumental in defending human rights across the world. If we unite and work together by sending our concerns to them with requests, we will get justice to work.
Let’s stand together for our fundamental digital rights and make sure this doesn’t go unnoticed. 🛡️
#Repost to other places and channels in order to reach broader masses and communities, so we can get more gravitas in order to protect human right to digital privacy
We as humans are stronger and louder in unity and mass.
Line for Enquiries: contactus@amnesty.org
Mail template: https://telegra.ph/Amnesty-Mail-Template-08-25
#FreeDurov #PrivacyMatters #DigitalRights #AmnestyInternational
A researcher under the nickname Caster returns with his "Against" release to our blog.
This is an extremely specific article about attacks on MikroTik routers.
Release Date: 09/27/2024
https://blog.exploit.org/caster-against/
This is an extremely specific article about attacks on MikroTik routers.
Release Date: 09/27/2024
https://blog.exploit.org/caster-against/
TailScale is a popular solution for building virtual networks, but in the hands of a pentester, it can be a pivoting tool.
Magama Bazarov, known under his alter ego “Caster” returns to exploit.org with his exotic release “Bipolar Disorder” about pivoting using TailScale.
https://blog.exploit.org/caster-bipolar-disorder
Magama Bazarov, known under his alter ego “Caster” returns to exploit.org with his exotic release “Bipolar Disorder” about pivoting using TailScale.
https://blog.exploit.org/caster-bipolar-disorder
Caster strikes again!
His RouterOS configuration security analyzer “Sara” got its own icon in the Kali Linux distribution in the form of Caster's logo.
You can install this tool directly from the Kali repository:
Unstoppable psycho!
His RouterOS configuration security analyzer “Sara” got its own icon in the Kali Linux distribution in the form of Caster's logo.
You can install this tool directly from the Kali repository:
kali@kali:~$ sudo apt update && sudo apt install sara
Unstoppable psycho!
Perhaps an airplane will fly over your head every few minutes, or even more than one. Services like Flightradar24 amazingly accurately show information about planes in the air because they receive data through the ADS-B protocol. This can be done independently, and I will show you how to do it.
A security researcher under the alias "Sterva" makes his debut on exploit.org with his article on processing flight information with ADS-B.
https://blog.exploit.org/ads-b-guide-demodulation-and-decoding/
A security researcher under the alias "Sterva" makes his debut on exploit.org with his article on processing flight information with ADS-B.
https://blog.exploit.org/ads-b-guide-demodulation-and-decoding/
Sterva continues to conquer ADS-B!
Meet his new article on exploit.org “ADS-B Spoofing”. This article explores the principles of ADS-B data transmission, encoding, and signal generation through a controlled experimental setup.
https://blog.exploit.org/ads-b-spoofing/
Meet his new article on exploit.org “ADS-B Spoofing”. This article explores the principles of ADS-B data transmission, encoding, and signal generation through a controlled experimental setup.
https://blog.exploit.org/ads-b-spoofing/
Magama Bazarov, known under his alter ego Caster is preparing a new release - "Philosophy of Nietzsche"
In his September work “Violence” he broke down the technique of pivoting on Linux with Nebula, now he will do the same on Windows with an exotic trick using ICS Sharing.
Stay tuned.
In his September work “Violence” he broke down the technique of pivoting on Linux with Nebula, now he will do the same on Windows with an exotic trick using ICS Sharing.
Stay tuned.
This media is not supported in your browser
VIEW IN TELEGRAM
Caster will release his article “Philosophy of Nietzsche” on December 20
Caster's new release, Philosophy of Nietzsche, is available now on exploit.org
An extremely specific method of pivoting on Windows using Nebula.
https://blog.exploit.org/caster-philosophy-of-nietzsche
An extremely specific method of pivoting on Windows using Nebula.
https://blog.exploit.org/caster-philosophy-of-nietzsche
exploit.org
Caster's new release, Philosophy of Nietzsche, is available now on exploit.org An extremely specific method of pivoting on Windows using Nebula. https://blog.exploit.org/caster-philosophy-of-nietzsche
Inspired by Friedrich Nietzsche's "Thus Spoke Zarathustra", Caster continues his experiments with Nebula. He has greatly increased the complexity of the network architecture while adapting his experimental concept from “Philosophy of Nietzsche” to it.
New release coming soon.
New release coming soon.
Caster's new release on pivoting on Windows using Nebula in the presence of NAT.
Release Date: 30 December 2024
https://blog.exploit.org/caster-ubermensch/
Release Date: 30 December 2024
https://blog.exploit.org/caster-ubermensch/
Caster returns with the release of the “Seen It All” video
Taking off his red mask and putting on his blue mask, he performed an in-depth packet analysis and demonstrated Suricata IDS signatures to detect attacks on Active Directory.
https://www.youtube.com/watch?v=LvsBC9dGpWg
Taking off his red mask and putting on his blue mask, he performed an in-depth packet analysis and demonstrated Suricata IDS signatures to detect attacks on Active Directory.
https://www.youtube.com/watch?v=LvsBC9dGpWg
YouTube
Seen It All: Detecting Active Directory Attacks with Suricata IDS [English Subtitles]
A research study on detecting attacks on Windows networks based on traffic analysis. Especially for Blue Team engineers and Windows administrators.
Gist flie with signatures: https://gist.github.com/casterbyte/b0370faab8c3d0061dd3eb6c1c8ef3df
Github link:…
Gist flie with signatures: https://gist.github.com/casterbyte/b0370faab8c3d0061dd3eb6c1c8ef3df
Github link:…