Data mining with Veil-PowerView
by admin
Tuesday, July 22nd, 2014 at 2:31 pm
Quickly find and explore shares our current user has access to: https://www.veil-framework.com/hunting-sensitive-data-veil-framework/
Quickly find and explore shares our current user has access to: https://www.veil-framework.com/hunting-sensitive-data-veil-framework/
Kali’s new image is a EFI Bootable ISO Hybrid image that supports Live USB Encrypted Persistence with LUKS Nuke support, out of the box. More Info @ http://www.kali.org/news/kali-1-0-8-released-uefi-boot-support/
Veil Framework recently added a payload delivery tool Veil-Catapult. Works like SMBexec with utilizing Veil-Evasion to generate AV-evading binaries, impacket to upload/host the binaries, and the passing-the-hash toolkit to trigger execution using temporary SMB server. :::Read more here::: & :::here:::
C99.php Shell has a Authentication Bypass Vulnerability, a backdoor, due to the use of the extract() comm, To bypass authentication add “?c99shcook[login]=0” to the URL. More info is ::HERE::
You can also go find ya some
This Recon 2014 talk presents a firmware attack on an off-the-shelf hard drive. The implemented backdoor is capable of exfiltrating any data stored on the hard drive, through a network connection, without any modification of the system’s operating system or software. The talk laid out how the hard drive’s firmware is designed, and how the backdoor can interact with the firmware, and then explain how the backdoor can be remote-controlled, p. ex., through an installed web server.
LIFX bulbs connect to a WiFi network in order to allow them to be controlled using a smart phone application. The research presented was performed against version 1.1 of the LIFX firmware.
::: Click Here :::
NSA’s XKeyscore http://pastebin.com/EivN2C7G
Also see: Jamming XKeyScore