FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ WIRED

The Notorious Lockbit Ransomware Gang Has Been Disrupted by Law Enforcement

By: Matt Burgess β€” February 20th 2024 at 12:50
LockBit’s website, infrastructure, and data have been seized by law enforcementβ€”striking a huge blow against one of the world’s most prolific ransomware groups.
☐ β˜† βœ‡ WIRED

Congress Sure Made a Lot of Noise About Kids’ Privacy in 2023β€”and Not Much Else

By: Matt Laslo β€” December 22nd 2023 at 12:00
Members of the US Congress touted improvements to children’s privacy protections as an urgent priority. So why didn’t they do anything about it?
☐ β˜† βœ‡ KitPloit - PenTest Tools!

Forbidden-Buster - A Tool Designed To Automate Various Techniques In Order To Bypass HTTP 401 And 403 Response Codes And Gain Access To Unauthorized Areas In The System

By: Zion3R β€” November 14th 2023 at 11:30


Forbidden Buster is a tool designed to automate various techniques in order to bypass HTTP 401 and 403 response codes and gain access to unauthorized areas in the system. This code is made for security enthusiasts and professionals only. Use it at your own risk.

  • Probes HTTP 401 and 403 response codes to discover potential bypass techniques.
  • Utilizes various methods and headers to test and bypass access controls.
  • Customizable through command-line arguments.

Install requirements

pip3 install -r requirements.txt

Run the script

python3 forbidden_buster.py -u http://example.com

Forbidden Buster accepts the following arguments:

fuzzing (stressful) --include-user-agent Include User-Agent fuzzing (stressful)" dir="auto">
  -h, --help            show this help message and exit
-u URL, --url URL Full path to be used
-m METHOD, --method METHOD
Method to be used. Default is GET
-H HEADER, --header HEADER
Add a custom header
-d DATA, --data DATA Add data to requset body. JSON is supported with escaping
-p PROXY, --proxy PROXY
Use Proxy
--rate-limit RATE_LIMIT
Rate limit (calls per second)
--include-unicode Include Unicode fuzzing (stressful)
--include-user-agent Include User-Agent fuzzing (stressful)

Example Usage:

python3 forbidden_buster.py --url "http://example.com/secret" --method POST --header "Authorization: Bearer XXX" --data '{\"key\":\"value\"}' --proxy "http://proxy.example.com" --rate-limit 5 --include-unicode --include-user-agent

  • Hacktricks - Special thanks for providing valuable techniques and insights used in this tool.
  • SecLists - Credit to danielmiessler's SecLists for providing the wordlists.
  • kaimi - Credit to kaimi's "Possible IP Bypass HTTP Headers" wordlist.


☐ β˜† βœ‡ Naked Security

Crimeware server used by NetWalker ransomware seized and shut down

By: Paul Ducklin β€” August 14th 2023 at 14:06
The site was running from 2014 and allegedly raked in more than $20m, which the DOJ is seeking to claw back...

☐ β˜† βœ‡ Naked Security

S3 Ep147: What if you type in your password during a meeting?

By: Paul Ducklin β€” August 10th 2023 at 13:34
Latest episode - listen now! (Full transcript inside.)

☐ β˜† βœ‡ WIRED

NYPD Body Cam Data Shows the Scale of Violence Against Protesters

By: Dhruv Mehrotra, Andrew Couts β€” July 20th 2023 at 19:12
A landmark $13 million settlement with the City of New York is the latest in a string of legal wins for protesters who were helped by a video-analysis tool that smashes the β€œbad apple” myth.
☐ β˜† βœ‡ WIRED

Silk Road’s Second-in-Command, Variety Jones, Gets 20 Years in Prison

By: Andy Greenberg β€” July 11th 2023 at 18:31
Roger Thomas Clark, also known as Variety Jones, will spend much of the rest of his life in prison for his key role in building the world’s first dark-web drug market.
☐ β˜† βœ‡ Naked Security

S3 Ep141: What was Steve Jobs’s first job?

By: Paul Ducklin β€” June 29th 2023 at 16:58
Latest episode - listen now! (Full transcript inside.)

☐ β˜† βœ‡ Naked Security

UK hacker busted in Spain gets 5 years over Twitter hack and more

By: Naked Security writer β€” June 26th 2023 at 15:35
Not just that infamous Twitter hack, but SIM-swapping, stalking and swatting too...

☐ β˜† βœ‡ Naked Security

S3 Ep139: Are password rules like running through rain?

By: Paul Ducklin β€” June 15th 2023 at 16:43
Latest episode - listen now! (Full transcript inside.)

☐ β˜† βœ‡ Naked Security

Gozi banking malware β€œIT chief” finally jailed after more than 10 years

By: Paul Ducklin β€” June 13th 2023 at 16:43
Gozi threesome from way back in the late 2000s and early 2010s now all charged, convicted and sentenced. The DOJ got there in the end...

☐ β˜† βœ‡ Naked Security

History revisited: US DOJ unseals Mt. Gox cybercrime charges

By: Naked Security writer β€” June 12th 2023 at 16:58
Though the mills of the Law grind slowly/Yet they grind exceeding small/Though with patience they stand waiting/With exactness grind they all...

☐ β˜† βœ‡ Naked Security

S3 Ep137: 16th century crypto skullduggery

By: Paul Ducklin β€” June 1st 2023 at 16:45
Lots to learn, clearly explained in plain English... listen now! (Full transcript inside.)

s3-ep137-feat-1200

☐ β˜† βœ‡ Naked Security

S3 Ep136: Navigating a manic malware maelstrom

By: Paul Ducklin β€” May 25th 2023 at 16:50
Latest episode - listen now. Full transcript inside...

☐ β˜† βœ‡ Naked Security

Ransomware tales: The MitM attack that really had a Man in the Middle

By: Paul Ducklin β€” May 24th 2023 at 17:59
Another traitorous sysadmin story, this one busted by system logs that gave his game away...

☐ β˜† βœ‡ Naked Security

Phone scamming kingpin gets 13 years for running β€œiSpoof” service

By: Naked Security writer β€” May 22nd 2023 at 16:58
Site marketing video promised total anonymity, but that was a lie. 170 arrested already. Potentially 1000s more to follow.

ispoof-1200

☐ β˜† βœ‡ Naked Security

US offers $10m bounty for Russian ransomware suspect outed in indictment

By: Naked Security writer β€” May 17th 2023 at 16:40
"Up to $10 million for information that leads to the arrest and/or conviction of this defendant."

☐ β˜† βœ‡ Naked Security

Google wins court order to force ISPs to filter botnet traffic

By: Naked Security writer β€” April 28th 2023 at 19:59
CryptBot criminals are alleged to have plundered browser passwords, illicitly-snapped screenshots, cryptocurrency account data, and more.

☐ β˜† βœ‡ Naked Security

Ex-CEO of breached pyschotherapy clinic gets prison sentence for bad data security

By: Paul Ducklin β€” April 18th 2023 at 16:56
Did the sentence fit the crime? Read the backstory, and then have your say in our comments! (You may post anonymously.)

☐ β˜† βœ‡ Naked Security

S3 Ep125: When security hardware has security holes [Audio + Text]

By: Paul Ducklin β€” March 9th 2023 at 18:58
Lastest episode - listen now! (Full transcript inside.)

☐ β˜† βœ‡ Naked Security

DoppelPaymer ransomware supsects arrested in Germany and Ukraine

By: Naked Security writer β€” March 6th 2023 at 16:16
Devices seized, suspects interrogated and arrested, allegedly connected to devastating cyberattack on University Hospital in DΓΌsseldorf.

☐ β˜† βœ‡ Naked Security

Dutch police arrest three cyberextortion suspects who allegedly earned millions

By: Naked Security writer β€” February 27th 2023 at 17:33
Ever paid hush money to crooks who broke into your network? Wondered how much you can trust them?

☐ β˜† βœ‡ Naked Security

S3 Ep118: Guess your password? No need if it’s stolen already! [Audio + Text]

By: Paul Ducklin β€” January 19th 2023 at 15:53
As always: entertaining, informative and educational... and not bogged down with jargon! Listen (or read) now...

☐ β˜† βœ‡ Naked Security

S3 Ep117: The crypto crisis that wasn’t (and farewell forever to Win 7) [Audio + Text]

By: Paul Ducklin β€” January 12th 2023 at 17:59
Tell us in the comments... What's the REAL reason there was no Windows 9? (No theory too far-fetched!)

☐ β˜† βœ‡ Naked Security

S3 Ep108: You hid THREE BILLION dollars in a popcorn tin?

By: Paul Ducklin β€” November 10th 2022 at 17:26
Patches, busts, leaks and why even low-likelihood exploits can be high-severity risks - listen now!

☐ β˜† βœ‡ Naked Security

Silk Road drugs market hacker pleads guilty, faces 20 years inside

By: Paul Ducklin β€” November 8th 2022 at 17:58
Jurisprudence isn't like arithmetic... two negatives never make a positive!

☐ β˜† βœ‡ Naked Security

S3 Ep107: Eight months to kick out the crooks and you think that’s GOOD? [Audio + Text]

By: Paul Ducklin β€” November 3rd 2022 at 17:51
Listen now - latest episode - audio plus full transcript

☐ β˜† βœ‡ Naked Security

S3 Ep103: Scammers in the Slammer (and other stories) [Audio + Text]

By: Paul Ducklin β€” October 6th 2022 at 14:43
Latest episode - listen and learn now (or read and revise, if the written word is your thing)...

☐ β˜† βœ‡ Naked Security

NetWalker ransomware affiliate sentenced to 20 years by Florida court

By: Naked Security writer β€” October 5th 2022 at 16:55
Judge tells the accused that if he hadn't pleaded guilty, "I would have given you life."

☐ β˜† βœ‡ Naked Security

BEC fraudster and romance scammer sent to prison for 25 years

By: Paul Ducklin β€” October 4th 2022 at 19:12
Two years of scamming + $10 million leeched = 25 years in prison. Just in time for #Cybermonth.

rs-1200

☐ β˜† βœ‡ Naked Security

Last member of Gozi malware troika arrives in US for criminal trial

By: Paul Ducklin β€” July 20th 2022 at 14:56
His co-conspirators went into and got out of prison years ago, while he remained free. Now the tables have turned...

☐ β˜† βœ‡ KitPloit - PenTest Tools!

Zenbuster - Multi-threaded URL Enumeration/Brute-Forcing Tool

By: noreply@blogger.com (Unknown) β€” July 17th 2022 at 12:30


ZenBuster is a multi-threaded, multi-platform URL enumeration tool written in Python by Zach Griffin (@0xTas).

I wrote this tool as a way to deepen my familiarity with Python, and to help increase my understanding of Cybersecurity tooling in general. ZenBuster may not be the fastest or most comprehensive tool of its kind. It is however, simple to use, decently flexible, and in practice only marginally slower than other "tried-and-true" tools like Gobuster. Personally, I have been using it to help me solve CTF challenges on platforms like TryHackMe, and have found my implementation to be satisfactorily reliable.

This software is intended for use in CTF challenges, or by security professionals to gather information on their targets:

  • It is capable of brute-force enumerating subdomains and also URI resources (directories/files).
  • Both methods of enumeration require use of an appropriate wordlist or dictionary file.
  • Features Include:
    1. Hostname format supports standard, IPv4, and IPv6.
    2. Support for logging results to a file with -O [filename].
    3. Specifying custom ports for nonstandard webservers with -p .
    4. Optional file extensions in directory mode with -x .
    5. Quiet mode for less distracting output with -Q.
    6. Color can be disabled for less distracting output with -nc/-nl.
    7. Tested on Python versions 3.9 and 3.10, with theoretical support for versions >= 3.6

CAUTION/DISCLAIMER

ZenBuster is capable of producing a potentially unwelcome number of HTTP requests in a short amount of time.

The developers and contributors are not liable or responsible for any damage caused by misuse or abuse of this software.

Please Enumerate Responsibly!

License

Multi-threaded URL enumeration/brute-forcing tool in Python. (5)

ZenBuster is licensed under the GNU GPLv3 License, see here for more information.

Credits

Yin-Yang ASCII art in the banners were created by Joan G. Stark (jgs) and Hayley Jane Wakenshaw (hjw). Modifications were made by me, when specified with: 'zg'.


Installation

Firstly, ensure that Python version >= 3.6 is installed, then clone the repository with:

git clone https://github.com/0xTas/zenbuster.git

Next, cd zenbuster.

Dependencies

ZenBuster relies on 3 external libraries to function, and it is recommended to install these with:

pip install -r requirements.txt

The modules that will be installed and their purposes are as follows:

  1. Python requests

    • The backbone of each enumeration request. Without this, the script will not function.
  2. termcolor

    • Enables colored terminal output. Non-critical, the script can still run without color if this is not present.
  3. colorama (Windows only)

    • Primes the Windows terminal to accept ANSI color codes (from Termcolor). Non-critical.

These dependencies may be installed manually, with pip using requirements.txt, or via interaction with the script upon first run.


Usage

Once dependencies have been installed, you can run the program in the following ways:

On Linux (+Mac?):

./zenbuster.py [options] or python3 zenbuster.py [options]

On Windows:

python zenbuster.py [options]

[Options]

Short Flag Long Flag Purpose
-h --help Displays the help screen and exits
-d --dirs Enables Directory Enumeration Mode
-s -ssl Forces usage of HTTPS in requests
-v --verbose Prints verbose info to terminal/log
-q --quiet Minimal terminal output until final results
-nc --no-color Disables colored terminal output
-nl --no-lolcat Disables lolcat-printed banner (Linux only)
-u <hostname> --host Host to target for the scan
-w <wordlist> --wordlist Path to wordlist/dictionary file
-x <exts> --ext Comma-separated list of file extensions (Dirs only)
-p <port#> --port Custom port option for nonstandard webservers
-o [filename] --out-file Log results to a file (accepts custom name/path)

Example Usage

./zenbuster.py -d -w /usr/share/wordlists/dirb/common.txt -u target.thm -v

python3 zenbuster.py -w ../subdomains.txt --host target.thm --ssl -O myResults.log

zenbuster -w subdomains.txt -u target.thm --quiet (With .bashrc alias)


Planned Features/Improvements

  • Increased levels of optional verbosity.
  • Allow optional throttling of task thread-count.
  • Allow users to modify the list of ignored status codes.
  • Allow greater user control over various request headers.
  • Allow optional ignoring of responses based on content-length.
  • Expand subdomain enumeration to include OSINT methods instead of just brute-forcing.
  • Explore a more comprehensive and source-readable solution to fancy colored output (possibly using rich).

Known Issues/Limitations

  • Enumerating long endpoints may result in ugly terminal output due to line-wraping on smaller console windows. Logging to a file is recommended, especially on Windows.
  • If target host is a vHost on a shared webserver, enumeration via IP may not function as expected. Use domain/hostname instead.


☐ β˜† βœ‡ Naked Security

Canadian cybercriminal pleads guilty to β€œNetWalker” attacks in US

By: Paul Ducklin β€” July 4th 2022 at 14:09
Bust in Canada, now bust in the USA as well.

☐ β˜† βœ‡ Naked Security

Interpol busts 2000 suspects in phone scamming takedown

By: Paul Ducklin β€” June 20th 2022 at 18:10
Friends don't let friends get scammed. Not everyone knows how typical scams unfold, so here are some real-world examples...

☐ β˜† βœ‡ Naked Security

SSNDOB Market domains seized, identity theft β€œbrokerage” shut down

By: Paul Ducklin β€” June 8th 2022 at 14:53
The online identity "brokerage" SSNDOB Market didn't want people to be in any doubt what it was selling.

☐ β˜† βœ‡ Naked Security

He sold cracked passwords for a living – now he’s serving 4 years in prison

By: Paul Ducklin β€” May 13th 2022 at 15:31
Crooks don't need a password for every user on your network to break in and wreak havoc. One could be enough...

☐ β˜† βœ‡ Naked Security

US cryptocurrency coder gets 5 years for North Korea sanctions busting

By: Naked Security writer β€” April 13th 2022 at 15:52
Cryptocurrency expert didn't take "No" for an answer when the US authorities said he couldn't pursue cryptocoin opps in North Korea.

☐ β˜† βœ‡ Naked Security

Serious Security: Darkweb drugs market Hydra taken offline by German police

By: Paul Ducklin β€” April 6th 2022 at 16:22
Why are Tor sites hard to locate and therefore difficult to take down? We explain in plain English...

☐ β˜† βœ‡ Naked Security

LAPSUS$ hacks continue despite two hacker suspects in court

By: Paul Ducklin β€” April 4th 2022 at 21:36
Do you know where in your company to report security anomalies? If you receive such reports, do you have an efficient way to process them?

☐ β˜† βœ‡ Naked Security

UK police arrest 7 hacking suspects – have they bust the LAPSUS$ gang?

By: Naked Security writer β€” March 25th 2022 at 01:48
Seven alleged hackers have been arrested in the UK. But who are they, and which hacking crew are they from?

☐ β˜† βœ‡ Naked Security

Alleged Kaseya ransomware attacker arrives in Texas for trial

By: Naked Security writer β€” March 11th 2022 at 14:59
The US Independence Day weekend of 2021 wasn't much of a holiday for cybersecurity staff. That was when the Kaseya attack unfolded...

☐ β˜† βœ‡ Naked Security

Self-styled β€œCrocodile of Wall Street” arrested with husband over Bitcoin megaheist

By: Naked Security writer β€” February 9th 2022 at 14:44
The cops say they've recovered 80% of a $72 million cryptocoin heist... but the recovered funds alone are now worth over $4 billion!

☐ β˜† βœ‡ Naked Security

Alleged carder gang mastermind and three acolytes under arrest in Russia

By: Naked Security writer β€” January 24th 2022 at 14:14
The motto of the gang was "In Fraud We Trust", and they went by a dizzying range of online nicknames.

☐ β˜† βœ‡ Naked Security

Kaseya ransomware suspect nabbed in Poland, $6m seized from absent colleague

By: Naked Security writer β€” November 8th 2021 at 22:37
Suspects nabbed, millions seized, in ransomware busts across the globe.

❌