Hashing Algorithms

A cryptographic hash function is a mathematical formula or algorithm that creates a one way encryption process. By “one-way”, this means the information that is encrypted by a hash function can not be decrypted. The purpose for using these one-way hashing algorithms is two-fold: to provide a check of integrity to protect some important piece […]

New Release of Kali Linux

Kali Linux is a penetration testing framework that contains over 600 penetration testing tools. It is a Debian based toolkit built on the foundation created by BackTrack. Some of the better known tools include: Wireshark – packet sniffer and protocol analysis nmap – port scanner john the ripper – password hash cracker metasploit framework – […]

Falling or Ballistically-launched Object that Makes Backdoors

DARPA-Funded Hacker’s Tiny $50 Spy Computer Hides In Offices, Drops From Drones – [] At the Shmoocon security conference Friday in Washington D.C., O’Connor plans to present the F-BOMB, or Falling or Ballistically-launched Object that Makes Backdoors. Built from just the hardware in a commercially-available PogoPlug mini-computer, a few tiny antennae, eight gigabytes of flash […]

MiniPwner for Penetration Testing

MiniPwner is a battery powered TP-Link TL-WR703N router running OpenWrt. It has an ethernet port, integrated wifi and some tools installed. It is small and cheap. MiniPwner – [] What is the MiniPwner The MiniPwner is a penetration testing “drop box”. It is designed as a small, simple but powerful device that can be inconspicuously […]

P0f v3 Fingerprinting Tool (new release)

For a long time, p0f has filled a mostly empty space for passive reconnaissance tools. There is now an updated version (a release candidate) with some new features. p0f v3 (release candidate 0) – [] 1. What’s this? P0f is a tool that utilizes an array of sophisticated, purely passive traffic fingerprinting mechanisms to identify […]

Android Network Toolkit for Pentesting

ANTi is a smartphone, android based, penetration testing toolkit that can scan a network, find vulnerabilities, run exploits, produce reports and more. There is a free version with limited functions and several paid versions that scale up in functionality. The videos linked at the bottom of this article are interesting. ANTi – Android Network Toolkit […]

DNA Ink Branding

From footballs to food to luxury goods, branding an item with ink that contains a specific DNA marker is becoming the latest technique to stop counterfeiters. Plant DNA Helps Catch Criminals and Thwart Counterfeiters – [] Counterfeiters are skilled at making knockoffs of even the most high-end tech and luxury products. But one European luxury […]

Evil Mouse Penetration Tool

Netragard’s Hacker Interface Device (HID) – [] We (Netragard) recently completed an engagement for a client with a rather restricted scope. The scope included a single IP address bound to a firewall that offered no services what so ever. It also excluded the use of social attack vectors based on social networks, telephone, or email […]

Software Assurance Tools

Software Assurance deals with making sure that software acts as it was intended and is free from vulnerabilities. Too often these days, our software is distributed while it is still filled with undiscovered flaws that attackers may be able to use to penetrate our systems. It is far more cost effective to spend the time […]

GPU Password Cracking

Using GPUs to aid in password cracking continues to become more effective in both speed and cost. GPU Password Cracking – Bruteforceing a Windows Password Using a Graphic Card – [] GPGPU computing is getting lots of attention these days. GPGPU computing simply means doing general calculations on graphic cards (GPUs) rather than CPUs. Traditionally, […]