Latest Post

Key Reinstallation Attack
The attack affects all modern WPA2 implementations, and is particularly dangerous on Android 6+ / Linux - you can force a WiFi connection to use a session key consisting of zeroes alone ... And that's all because these platforms wanted to be more secure, but that's a bit further.

Depending on the security model you use, you can: Decrypt the communication, spoof the communication (impersonate the sending packets), inject the packets.

The essence of the attack
What is the attack? First of all, on the appropriate replay of certain messages sent between the client and the AP, during the so-called. 4-way handshake, which is the process of communication between two parties, in which, among others, Prove that they know the shared key (which you set by securing the WiFi network) without revealing this key. The process also creates an additional key ( Temporal Key ) that encrypts the communication (ie secures it).

RouterSploit - Router Exploitation Framework
The RouterSploit Framework is an open-source exploitation framework dedicated to embedded devices.
It consists of various modules that aids penetration testing operations:

exploits - modules that take advantage of identified vulnerabilities
creds - modules designed to test credentials against network services
scanners - modules that check if a target is vulnerable to any exploit


  • gnureadline (OSX only)
  • requests
  • paramiko
  • beautifulsoup4
  • pysnmp

Wordpress Security Scanner

WPSeku is a black box WordPress vulnerability scanner that can be used to scan remote WordPress installations to find security issues.
WPSeku is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation version 3 of the License. WPSeku is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with WPSeku; if not, write to the Free Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.

WhatWeb - Website Fingerprinter

WhatWeb identifies websites. Its goal is to answer the question, "What is that Website?". WhatWeb recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices. WhatWeb has over 1700 plugins, each to recognize something different. WhatWeb also identifies version numbers, email addresses, account IDs, web framework modules, SQL errors, and more.

WhatWeb can be stealthy and fast, or thorough but slow. WhatWeb supports an aggression level to control the tradeoff between speed and reliability. When you visit a website in your browser, the transaction includes many hints of what web technologies are powering that website. Sometimes a single web page visit contains enough information to identify a website but when it does not, WhatWeb can interrogate the website further. The default level of aggression, called 'stealthy', is the fastest and requires only one HTTP request of a website. This is suitable for scanning public websites. More aggressive modes were developed for use in penetration tests.

Most WhatWeb plugins are thorough and recognize a range of cues from subtle to obvious. For example, most WordPress websites can be identified by the meta HTML tag, e.g. '<meta name="generator" content="WordPress 2.6.5">', but a minority of WordPress websites remove this identifying tag but this does not thwart WhatWeb. The WordPress WhatWeb plugin has over 15 tests, which include checking the favicon, default installation files, login pages, and checking for "/wp-content/" within relative links.

* Over 1700 plugins
* Control the trade off between speed/stealth and reliability
* Performance tuning. Control how many websites to scan concurrently.
* Multiple log formats: Brief (greppable), Verbose (human readable), XML, JSON, MagicTree, RubyObject, MongoDB.
* Proxy support including TOR
* Custom HTTP headers
* Basic HTTP authentication
* Control over webpage redirection
* Nmap-style IP ranges
* Fuzzy matching
* Result certainty awareness
* Custom plugins defined on the command line

Man in the Middle attacks
Man in the Middle attacks

What is a man in the middle?
Man in the middle attacks are methods (which have been discussed since 1995), in which the attacker latches into a communication link, and then sits in the middle between the two communication endpoints. Previously, when data communication was still done via leased lines, this meant that the attacker would interrupt the line, hang in between, and thus be able to see and change all transmitted data. Today it is easier. This physical placement between the two communication endpoints is no longer necessary with networking on the Internet and because of the philosophy behind the Internet that the data itself finds its way to the opposite point. The attacker only needs to change the signposts that the data packages use to find their way, i.e. he makes sure that the data packets come to him after he has looked at them or changed them, he redirects them to the endpoint. This is the basis of all modern man-in-the-middle attacks.

Modern Android development with Kotlin
Kotlin promises a well-readable and concise syntax, modern language features and functional programming with high security. Does the Java alternative, thanks to its seamless interaction with Android, make the hearts of app developers beat faster?

After five years of development, JetBrains launched the long-awaited version of Kotlin 1.0 in February 2016 and promised stability: Future Kotlin versions are no longer required for existing code. As a statically typed general-purpose language for JVM and browsers, Kotlin can be used wherever Java is running.

Author Name

{picture#YOUR_PROFILE_PICTURE_URL} YOUR_PROFILE_DESCRIPTION {facebook#} {twitter#} {google#} {pinterest#} {youtube#}

Contact Form


Email *

Message *

Powered by Blogger.