Friday, February 16, 2018

Datasploit usage using docker container - OSINT

Datasploit performs automated OSINT on a domain / email / username / IP and find out relevant information from different sources. Easy to contribute OSINT Framework. Code for Banner, Main and Output function. Datasploit automatically do rest of the things for you. Useful for Pen-testers, Bug Bounty Hunters, Cyber Investigators, Product companies, Security Engineers, etc.Collaborate the results, show them in a consolidated manner. Tries to find out credentials, api-keys, tokens, sub-domains, domain history, legacy portals, usernames, dumped accounts, etc. related to the target. Can be used as library, automated scripts or standalone scripts.Can generate lists which can be feeded to active scan tools.Generates HTML, along with text files.

Thursday, January 11, 2018

Less perks and more pitfalls of cryptocurrency

I was always wondering to invest or not to invest in cryptocurrency. I started looking all articles that exist on the internet. Majority of articles were reflecting the same in terms of advantages and disadvantages. However, after reviewing almost 50 different articles, what I have analyzed is there are more pitfalls with fewer perks.

So I gathered all pitfalls of bitcoin to cover them in the single article. Those are as follows. Thanks to the industry contributors.

Saturday, September 16, 2017

Android Kiosk Browser Lock down Security Testing Checklist

What is Kiosk Browser Lockdown?
In simple words, if you want to restrict the usability of the device that you are giving to your employee/customer's hand, you can use kiosk browser lockdown facility to make that device single purpose used.

Generally, all finance companies use that at their branches when the customer comes to their branch and any kind of help and representative approaches them with a tablet which has that bank/company's application running on it. Now that device may land into many hands such as a company's all employees and sometimes clients too. So to restrict that device's all functionalities such as settings, other apps on home screen etc.., a company uses kiosk lockdown which can be paid or free software. 

Monday, May 1, 2017

Working with BurpSuite MobileAssistant Tool

Recently on Friday, April 28, 2017, burpsuite has released its new tool dubbed as mobile assistant. Mainly this is released for two purposes. It is designed to change the system wide proxy setting and to bypass ssl certificate pinning. Currently this is available for iOS device 8 and later only. You can found more detail on the official blog referenced below: Here I am going for an in-depth tutorial starting from the setting up the mobile assistant to using it.

Friday, April 7, 2017

CVE-2016-7786 - Sophos Cyberoam UTM - Privilege Escalation

In this small article I am going to share one of my zero day that I found a while back ago in Sophos Cyberoam UTM device.

Thursday, March 30, 2017

Network Security VAPT Checklist

Hi Guys, there are very few technical network security assessment checklist. So I thought to share my own on this. Have a look and enjoy. Lets talk about the scope first. If you are given a 1000 machines to perform VAPT, then here is your scope. Single machine can have 65535 ports open. Any single port can deploy any service software from the world. For example FTP can be run on smartftp, pureftpd etc.. Any single FTP software version (for example pureftpd 1.0.22) can have number of vulnerabilities available. So if you multiply all of these, then it is impossible for any auditor to go ahead and probe all ports manually and find services manually. Even if he/she is able to do it, it is impossible to check all vulnerabilities that are pertaining to a single port of a single machine. Hence we have to rely on scanners such as nexpose, nessus, openvas, coreimpact etc. Here are some quick tools and test cases that one can perform on commonly found ports in the network pentest.

Friday, March 3, 2017

Android Application Backup Vulnerabiility Testing

You must be already knowing about android application backup process. Beauty of this vulnerability is it works on non-rooted devices too sometimes. The vulnerability lies within the AndroidManifest.xml file.

Today we are going to test DIVA (Damn Insecure Vulnerable Application) against this vulnerability. First I had diva-beta.apk file. I unzip that using below command:

Friday, November 18, 2016

Android Anti Java Hooking - Adding Layer to your SSL pinning and Root detection

In this article I am going to highlight the importance of why we must implement anti java hooking technique in our application. What are their advantages and disadvantages.

What is android hooking?

Hooking is a process of injecting malicious payload into existing running process. To illustrate that, assume we have root detection feature in our application. Using rootclock 3rd party application if root detection mechanism can be bypassed. Now mostly all these application which bypasses root detection, ssl pinning etc.. they hook into running application process. So how to be safe against these application? Here comes the android anti java hooking technique.