Deactivating endpoint protection software in an unauthorized manner (Revisited)

Posted on Posted in Paper

Introduction In general, endpoint protection software is a security control measure to protect IT systems, for example client or server systems, from different threats. Typical features of endpoint protection software are anti-virus and malware detection, application and device control mechanisms, or specific firewall functionalities. Endpoint protection software often is password protected in order to restrict […]

Google-Schutzschild rettet Blogger Krebs vor DDoS per IoT-Botnetz

Posted on Posted in Hacker News

Security-Blogger Brian Krebs war von einem der größten DDoS-Angriffe der Geschichte überrascht worden. Nachdem Akamai die Segel gestrichen hatte, schützt nun Google seine Webseite im Namen der Meinungsfreiheit. (Bild: Henri Bergius, CC BY-SA 2.0 ) Der unabhängige Security-Journalist Brian Krebs, der in der vergangenen WocheOpfer eines massiven DDoS-Angriffs wurde, beschwört eine düstere Zukunft herauf, in der […]

FireAway-Next Generation Firewall Bypass Tool

Posted on Posted in Tools

Fireaway is a tool for auditing, bypassing, and exfiltrating data against layer 7/AppID inspection rules on next generation firewalls. These tactics are based on the principle of having to allow connections to establish through the NGFW in order to see layer 7 data to filter, as well as spoofing applications to hide communication channels inside […]

Microsoft Exchange Sensitive Data Search: MailSniper

Posted on Posted in Tools

Microsoft Exchange Sensitive Data Search MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, insider intel, network architecture information, etc.). It can be used as a non-administrative user to search their own email, or by an Exchange administrator to search the mailboxes of every user […]