XorDDoS Infects Linux Devices and uses them to Carry out DDoS Attacks

A new campaign has been discovered that uses XorDDoS Trojan, which affects Linux systems and devices, turning them into zombies that can be controlled by threat actors remotely. Moreover, these compromised systems can later be used for DDoS(Distributed Denial-of-Service) attacks. Comparing this current campaign with the campaign conducted in 2022, there was only one change […]

The post XorDDoS Infects Linux Devices and uses them to Carry out DDoS Attacks appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

October 17, 2023
Read More >>

Hack The Box: Intentions Machine Walkthrough – Hard Difficulty

In this post, I would like to share a walkthrough of the Intentions Machine from Hack the Box This room will be considered a Hard machine on Hack the Box What will you gain from the Intentions machine? For the user flag, you will need to abuse the SQL Injection of the second order which will […]

The post Hack The Box: Intentions Machine Walkthrough – Hard Difficulty appeared first on Threatninja.net.

October 14, 2023
Read More >>

WcamPhish – Unauthorized remote camera access via link

Introduction WcamPhish is a method for capturing images of a target’s webcam or front camera on a phone. In order to create a link that we can send to the target over the internet, WcamPhish hosts a fake website on a PHP server that was custom-built. If the target agrees, the website requests their camera […]

October 11, 2023
Read More >>

Shaco – C linux agent for the Havoc framework

Shaco Shaco is a simple C Linux agent for the Havoc framework, available at https://github.com/HavocFramework/Havoc. Utilizing a hardcoded socket, Shaco communicates with the server over HTTP. Commands This is the list of commands that the agent supports: Features Features of Shaco agent Running and Configuration/Compilation Clone git clone –recurse-submodules https://github.com/souzomain/Shaco.git  After cloning this repo, you […]

October 11, 2023
Read More >>

Impulse Denial-of-service ToolKit

Modern Denial-of-service ToolKit Main Window Methods-  Method Target Description SMS PHONE Sends a massive amount of SMS messages and calls to a single target EMAIL EMAIL Sends a massive amount of Email messages to a target NTP IP:PORT A SYN flood (half-open attack) is a type of denial-of-service (DDoS) attack that aims to make a […]

October 11, 2023
Read More >>

A flaw in libcue library impacts GNOME Linux systems

A vulnerability in the libcue library impacting GNOME Linux systems can be exploited to achieve remote code execution (RCE) on affected hosts. A threat actor can trigger a vulnerability, tracked as CVE-2023-43641 (CVSS score: 8.8), in the libcue library impacting GNOME Linux systems to achieve remote code execution (RCE) on affected hosts. libcue provides an […]

The post A flaw in libcue library impacts GNOME Linux systems appeared first on Security Affairs.

October 10, 2023
Read More >>