StripedFly: Perennially flying under the radar

Nobody would even suspect the mining malware was merely a mask, masquerading behind an intricate modular framework that supports both Linux and Windows. The amount of effort that went into creating the framework is truly remarkable, and its disclosure was quite astonishing.

October 26, 2023
Read More >>

Hack The Box: Jupiter Machine Walkthrough – Medium Difficulty

In this post, I would like to share a walkthrough of the Jupiter Machine from Hack the Box This room will be considered a Medium machine on Hack the Box What will you gain from the Jupiter machine? For the user flag, you will need to enumerate the subdomain which we found a subdomain directed to […]

The post Hack The Box: Jupiter Machine Walkthrough – Medium Difficulty appeared first on Threatninja.net.

October 21, 2023
Read More >>

XorDDoS Infects Linux Devices and uses them to Carry out DDoS Attacks

A new campaign has been discovered that uses XorDDoS Trojan, which affects Linux systems and devices, turning them into zombies that can be controlled by threat actors remotely. Moreover, these compromised systems can later be used for DDoS(Distributed Denial-of-Service) attacks. Comparing this current campaign with the campaign conducted in 2022, there was only one change […]

The post XorDDoS Infects Linux Devices and uses them to Carry out DDoS Attacks appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

October 17, 2023
Read More >>

Hack The Box: Intentions Machine Walkthrough – Hard Difficulty

In this post, I would like to share a walkthrough of the Intentions Machine from Hack the Box This room will be considered a Hard machine on Hack the Box What will you gain from the Intentions machine? For the user flag, you will need to abuse the SQL Injection of the second order which will […]

The post Hack The Box: Intentions Machine Walkthrough – Hard Difficulty appeared first on Threatninja.net.

October 14, 2023
Read More >>

WcamPhish – Unauthorized remote camera access via link

Introduction WcamPhish is a method for capturing images of a target’s webcam or front camera on a phone. In order to create a link that we can send to the target over the internet, WcamPhish hosts a fake website on a PHP server that was custom-built. If the target agrees, the website requests their camera […]

October 11, 2023
Read More >>

Shaco – C linux agent for the Havoc framework

Shaco Shaco is a simple C Linux agent for the Havoc framework, available at https://github.com/HavocFramework/Havoc. Utilizing a hardcoded socket, Shaco communicates with the server over HTTP. Commands This is the list of commands that the agent supports: Features Features of Shaco agent Running and Configuration/Compilation Clone git clone –recurse-submodules https://github.com/souzomain/Shaco.git  After cloning this repo, you […]

October 11, 2023
Read More >>