Tuesday, November 12, 2024

Exploitation Tools

Embargo Ransomware Actors Abuses Safe Mode To Disable Security Solutions

In July 2024, the ransomware group Embargo targeted US companies using the malicious loader MDeployer and EDR killer MS4Killer.MDeployer deployed MS4Killer, which disabled security products, before executing the Embargo...

SMB Force-Authentication Vulnerability Impacts All OPA Versions For Windows

Open Policy Agent (OPA) recently patched a critical vulnerability that could have exposed NTLM credentials of the OPA server's local user account to remote...

Hackers Exploiting Selenium Grid Tool To Deploy Exploit Kit & Proxyjacker

Two campaigns targeting Selenium Grid's default lack of authentication are underway, as threat actors are exploiting this vulnerability to deploy malicious payloads, including exploit...

Threat Actors Exploiting Legitimate Software For Stealthy Cyber Attacks

CAMO, or Commercial Applications, Malicious Operations, highlights attackers' increasing reliance on legitimate IT tools to bypass security defenses, which can be used for various...

Hackers Toolkit Unveiled, Comprehensive Tools For Various Cyber Attacks

Hackers always keep updating their tools and add new ones to adapt to evolving security measures, bypass defenses, and exploit newly discovered vulnerabilities. Staying ahead...

TAG-100 Actors Using Open-Source Tools To Attack Gov & Private Orgs

Hackers exploit open-source tools to execute attacks because they are readily available, well-documented, and often have extensive community support, making them easy to modify...

EgressBuster – A Pentesting Tool to Compromise Victim via Command & Control using Firewall

Network Firewalls acts as a fortification to keep the internal corporate network secure. Many people often think as it is protecting a device from...

Netcat vs Cryptcat – Remote Shell to Control Kali Linux from Windows machine

Netcat is a good build network debugging tool, which can read and write data across computers using TCP or UDP, it is also called...

DNS Shell – Tool to Compromise and Maintain Control Over Victim Machine

DNS Shell protocol runs on the application layer of the TCP/IP Model. When an attacker or pentester tries to exploit DNS with RCE vulnerability (Remote Command Execution) destination...

Commix – Automated All-in-One OS Command Injection and Exploitation Tool

Commix (short for and njection eploiter) has a simple environment and it can be used, by web developers, penetration testers, or even security researchers...

BeEF – Browser Exploitation Framework Over WPN (Without Port Forwarding)

Beef Xss Framework is a browser exploitation tool. It mainly focuses on client-side attacks and web-based browsers.It helps a penetration tester to understand...