endlessh: SSH tarpit that slowly sends an endless banner Security News & Discussion |
- endlessh: SSH tarpit that slowly sends an endless banner
- Sleuthing from public sources to figure out how the Hateful Eight leaker was caught
- CORS Misconfigurations
- Bumble: Finding dates and WiFi access points
- Parsuite: A Modularized Parser Framework Written in Python 3
- D-Link DIR-859 — Unautenticated RCE (CVE-2019–17621)
endlessh: SSH tarpit that slowly sends an endless banner Posted: 28 Dec 2019 03:21 AM PST |
Sleuthing from public sources to figure out how the Hateful Eight leaker was caught Posted: 28 Dec 2019 11:54 AM PST |
Posted: 28 Dec 2019 08:25 AM PST |
Bumble: Finding dates and WiFi access points Posted: 28 Dec 2019 08:55 AM PST |
Parsuite: A Modularized Parser Framework Written in Python 3 Posted: 27 Dec 2019 11:04 AM PST https://github.com/arch4ngel/parsuite I came across 0bs1d1an-'s post about a really cool parser yesterday that supports input files from various sources and it inspired me to share this modular parser I've been working on. I put it together when I decided too much time was being spent using grep and awk during my day-to-day as a penetration tester. Hope someone finds it useful! Framework Capabilities
Current ModulesThere are several super useful modules already implemented, but here are the three I use most often: nessus_api_host_dumper
This module is particularly useful when long scans are running or when the user interface stops working due to large data sets (thanks Tenable). ``` archangel@deskjet~> parsuite nessus_api_host_dumper --url https://www.somenessus.com:8834 -od nessus_output -i --scan-names TestScan [+] Starting the parser [+] Loading modules [+] Executing module: nessus_api_host_dumper [+] Getting user credentials... [+] Attempting to dump hosts from TestScan [+] Processing: TestScan [+] Processing scan hosts [+] Processing scan plugins (this may take some time) [+] Processing target plugin ids [+] [INFO] traceroute_information [+] [INFO] nessus_scan_information [+] [INFO] additional_dns_hostnames [+] [INFO] tls_version_1_1_protocol_detection [+] [INFO] tls_npn_supported_protocol_enumeration [+] [INFO] tls_next_protocols_supported [+] [INFO] tls_alpn_supported_protocol_enumeration [+] [INFO] ssl_root_certification_authority_certificate_infor [+] [INFO] ssl_perfect_forward_secrecy_cipher_suites_supporte [+] [INFO] ssl_cipher_suites_supported [+] [INFO] ssl_cipher_block_chaining_cipher_suites_supported [+] [INFO] ssl_certificate_signed_using_weak_hashing_algorith [+] [INFO] ssl_certificate_information [+] [INFO] ssl_tls_versions_supported [+] [INFO] hsts_missing_from_https_server [+] [INFO] nessus_tcp_scanner [+] [INFO] hypertext_transfer_protocol_http_information [+] [INFO] http_server_type_and_version [+] [INFO] service_detection [+] Module execution complete. Exiting. ``` ...and the directory structure looks like ``` archangel@deskjet~> head nessus_output/info/additional_dns_hostnames/additional_information Plugin Name: Additional DNS HostnamesPlugin ID: 46180Severity: INFODescription:Hostnames different from the current hostname have been collected by miscellaneous plugins. Nessus has generated a list of hostnames that point to the remote host. Note that these are only the alternate hostnames for vhosts discovered on a web server. Different web servers may be hosted on name-based virtual hosts. ``` xml_dumper
Here's an example of dumping records in URI format while searching for HTTP services.
templatizer
I use this to create things like phishing emails. Here's a (bad) example of how you could create some links with random values and an email from a csv file. Input CSV file:
Output:
[link] [comments] |
D-Link DIR-859 — Unautenticated RCE (CVE-2019–17621) Posted: 26 Dec 2019 06:15 PM PST |
You are subscribed to email updates from /r/netsec - Information Security News & Discussion. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment