AttackSurfaceMapper automates the reconnaissance process

AttackSurfaceMapper, a new open source OSINT tool created by Andreas Georgiou and Jacob Wilkin, security consultants at Trustwave SpiderLabs, automates the process of collecting data that can help pentesters find a way into targets’ systems and n… Continue reading AttackSurfaceMapper automates the reconnaissance process

US military turns to Parrot to help develop new reconnaissance drones

Parrot had quite a presence in the world of consumer drones a few years back, starting out as a purveyor of playful toy drones and working its way into the prosumer realm. Though it hasn’t reached the heights of some drone companies in terms … Continue reading US military turns to Parrot to help develop new reconnaissance drones

Retrieve hostnames for IP addresses to connect to HTTP services, when no (reverse) DNS PTR records are available?

I’m conducting a penetration test, where I’m facing the following problem:

After having retrieved a set of IP addresses through tools like whois, I cannot successfully connect to the HTTP-based websites/services using the IP… Continue reading Retrieve hostnames for IP addresses to connect to HTTP services, when no (reverse) DNS PTR records are available?

How can I determine the vulnerability for a sub domain takeover attack?

I have found research efforts on explaining how sub domain takeovers can take place authored by a gentleman named “Patrik Hudák”. Through his site’s blogs he illustrates and conveys an understanding of the phenomenon:

https:… Continue reading How can I determine the vulnerability for a sub domain takeover attack?

BlackEnergy Successor Hits Energy Companies Since 2015

For the past three years, a stealthy cyberespionage group has been targeting energy companies, primarily from Poland and Ukraine, using a new malware framework dubbed GreyEnergy. GreyEnergy is a modular malware platform which, according to researchers… Continue reading BlackEnergy Successor Hits Energy Companies Since 2015