|
Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Introducing PSAttack Par BlogLe [2016-03-08] à 17:42:14
Présentation : I ve been a huge PowerShell fan ever since I first discovered it as a Systems Administrator many years ago. It s an incredibly easy to use, intuitive and powerful language and helped me efficiently address a lot of tasks that came across my plate. Unfortunately, the other Systems Administrators that I worked with were less keen to pick it up. Years of pointing and clicking had made them nervous about using a command line. For different reasons, the Information Security community is in a similar state. PowerShell is an incredible platform for both offense and defense. There is a lot of cutting edge work being done by members of the PowerShell community, but the Information Security community at large is unaware of a lot of their contributions. This may stem from a lack of interest in Windows development or fear of having to learn yet another scripting language. No matter the reason, a lot of security professionals are missing out on some great work. Enter PSAttack --------------- To help make using offensive PowerShell easier, I ve created PSAttack. PSAttack is a custom made console that is designed to emulate PowerShell and enhance it. Built into PSAttack are over 110 offensive PowerShell commands representing some of the greatest work going on in the offensive PowerShell community. This selection of tools runs the entire gamut of a security assessment including Reconnaissance, Privilege Escalation, Backdoors and Data Exfiltration. It also includes a custom command called get-attack which helps to serve as an attack search engine. It takes a word or phrase and returns a list of commands and their descriptions that match what you re looking for. Get-Attack returning a list of commands related to the word Password All of this is bundled into a single executable that runs on anything from a fresh install of Windows 7 all the way up to a fully patched version of Windows 10. There s no installer, just double click and start attacking. Not Just for the Lab -------------------- In creating PSAttack, I didn t want to create a tool that was only used in a lab environment. I wanted to create something that was useful and could find its way into a penetration tester s bag of tricks. To this end, PSAttack is designed to evade antivirus and other hurdles. The various scripts and payloads that provide the commands are encrypted before being embedded into the executable. When PSAttack is run, these scripts are decrypted directly into memory, so the plain text payloads never touch the hard drive. This helps avoid detection by most antivirus solutions. PSAttack is also written using native .NET functions and objects to process PowerShell code, it does not rely on powershell.exe . Because .NET is such an important part of Windows, this means that it s very difficult for an organization to prevent PSAttack from accessing the functionality it needs to run. Getting PSAttack ----------------- PSAttack is available on our Github account. You can either compile the code yourself using Visual Studio or you can download pre-compiled binaries from the releases tab. Acknowledgments --------------- PSAttack relies on a lot of tools to make itself effective and it s important to make sure that the authors of those tools get the attention they deserve. Scripts from the following tools and frameworks are incorporated into PSAttack. These tools represent some of the best work being done in offensive PowerShell today PowerSploit Nishang Inveigh PowerCat
Les derniers articles du site "Blog" :
- Malware Trends - Q1 2016 - Simplified DDoS Testing at Scale - BreakingPoint Captures Real-World 2015 Application Trends - ATI Minecraft - Benchmarking Open Source SDN Controllers Are They Ready for Carrier-Grade Services - The End of Days is Here for Network Blind Spots - Ixia ATI Research Center Finds Multiple Security Vulnerabilities in IBM Tivoli Storage Manager FastBack - Introducing PSAttack - Mobile World Congress 2016 Recap - Ixia Smarter Security at RSA 2016
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.190.17.190 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.190.17.190 to any 80"
- Nous contacter par mail
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|