Monday, October 31, 2011

Extracting the Password Hashes from a Memory Dump

Via this post in thehackernews.com.


This video explains how to use Volatility to extract the NTLM password hashes from a memory dump, by  finding the memory addresses that belong to the \WiNDOWS\system32\config\SAM and  and \WiNDOWS\system32\config\system.




Resources on Vulnerable Web Applications

This post is just a reference to a list of available vulnerable web applications, in case I need to test tools or sharpen my skills :)


This post from Taddong has a good list of projects that maintain vulnerable web applications in several languages: PHP, Java, Ruby, ColdFusion, etc.


The listing is broken into Offline (source code),  VM/ISO  and Live Systems.



Tuesday, October 25, 2011

DroidSheep: Hijacking Sites With Your Android Phone

Found via securitytube .


Droidsheep is an Android application that permits to use your rooted Android phone to easily hijack websites in a wireless network.



Tuesday, October 11, 2011

Friday, October 7, 2011

Chris Gates and Rob Fuller at Derbycon 2011

Really nice presentation that Chris Gates and Rob Fuller gave at Derbycon 2011  (via IronGeek).

In a nutshell,  the talk exposes how a pen-test should be carried instead of  the simple 'scan-exploit-report'.

A proper penetration test must be data driven and it will always be costumer dependent. In fact, one of the most complicated parts of a penetration test is deciding with the costumer the objective and the rules of engagement.

The last part explains several post-exploitation techniques and some available tools that are under development.


Wednesday, October 5, 2011

Adaptive Penetration Testing at Derbycon

Irongeek has started publishing the Videos of Derbycon 2011 and the following one is probably one of my favorites so far.

Kevin Mitnick and Dave Kennedy go through some examples of penetration tests that, mainly, use social engineering attacks.

At the end of the talk Dave Kennedy also presented the new version of The Social-Enginner Toolkit.

Really worth watching!