2023年5月31日星期三

DSniff


"dsniff is a collection of tools for network auditing and penetration testing. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.). arpspoof, dnsspoof, and macof facilitate the interception of network traffic normally unavailable to an attacker (e.g, due to layer-2 switching). sshmitm and webmitm implement active monkey-in-the-middle attacks against redirected SSH and HTTPS sessions by exploiting weak bindings in ad-hoc PKI." read more...

Website: http://www.monkey.org/~dugsong/dsniff/

Related news


  1. Underground Hacker Sites
  2. Hack Tool Apk No Root
  3. Github Hacking Tools
  4. Hacking Tools Mac
  5. How To Install Pentest Tools In Ubuntu
  6. Hacking Tools For Pc
  7. Hacking Tools Windows
  8. Hacking Tools Online
  9. Hacking Tools Download
  10. Ethical Hacker Tools
  11. Pentest Reporting Tools
  12. Hacking Tools And Software
  13. Beginner Hacker Tools
  14. Pentest Tools Github
  15. Pentest Tools Tcp Port Scanner
  16. Hacking Tools Kit
  17. Hacking Tools Online
  18. Pentest Tools Windows
  19. Hack And Tools
  20. Hack Tools For Mac
  21. Blackhat Hacker Tools
  22. Hacker Tools Software
  23. Hack Tools For Pc
  24. Hacker Hardware Tools
  25. Pentest Tools Download
  26. Pentest Tools Url Fuzzer
  27. Hack Tools
  28. Hacking Tools Usb
  29. Top Pentest Tools
  30. Hacking Tools For Windows 7
  31. Hack Tools Github
  32. Hacker Tools 2019
  33. Kik Hack Tools
  34. How To Hack
  35. Computer Hacker
  36. Pentest Tools Online
  37. Hackrf Tools
  38. Hack Tools Download
  39. Pentest Tools Framework
  40. Hacking Tools 2020
  41. Hack Tools Pc
  42. Hacker Tools Windows
  43. Hackrf Tools
  44. Best Hacking Tools 2019
  45. Hacking Tools
  46. Android Hack Tools Github
  47. Hack Apps
  48. Hacking Tools And Software
  49. Hacker Tools Software
  50. Pentest Box Tools Download
  51. Hacking Tools Windows 10
  52. Hacker Tools Free Download
  53. Pentest Tools Bluekeep
  54. Pentest Tools Kali Linux
  55. Nsa Hack Tools Download
  56. Pentest Tools Website Vulnerability
  57. Hacker Security Tools
  58. Hacker Tools Apk Download
  59. Hack Tool Apk No Root
  60. Pentest Tools Linux
  61. Hack Tools For Games
  62. Hack Website Online Tool
  63. Hacking Tools Usb
  64. Hack Tools
  65. Hacking Tools Windows
  66. Nsa Hack Tools Download
  67. Easy Hack Tools
  68. Hack Tools For Windows
  69. Hacker Tools Github
  70. Game Hacking
  71. Pentest Tools Port Scanner
  72. Pentest Tools Windows
  73. Pentest Automation Tools
  74. Hacking Tools For Beginners
  75. Hacker Tools For Windows
  76. Hacking Tools Online
  77. Hacker Tools Linux
  78. Pentest Tools For Mac
  79. Ethical Hacker Tools
  80. Pentest Tools Review
  81. Hacking Tools For Beginners
  82. Hacking Tools For Beginners
  83. Hack App
  84. Tools 4 Hack
  85. Termux Hacking Tools 2019
  86. Hacker Tools 2020
  87. Hacker Tools Mac
  88. Nsa Hacker Tools
  89. Blackhat Hacker Tools
  90. Hacking Tools And Software
  91. Hacking Tools 2019
  92. Hacker Tools
  93. Hacker Tools Apk Download
  94. Hacking Tools For Windows
  95. Free Pentest Tools For Windows
  96. Pentest Tools For Windows
  97. Hacking App
  98. Hacker Hardware Tools
  99. Hacking Tools For Beginners
  100. What Are Hacking Tools
  101. Pentest Tools For Ubuntu
  102. Pentest Automation Tools
  103. Hacking Tools 2020
  104. Hack Tools
  105. Hack App
  106. Pentest Tools Tcp Port Scanner
  107. Hacking Tools Windows
  108. Best Hacking Tools 2019
  109. Hack Tools For Windows
  110. Hacking Tools Hardware
  111. Hackrf Tools
  112. Hacking Tools For Beginners
  113. World No 1 Hacker Software
  114. Pentest Tools Framework
  115. Hack Tools For Windows
  116. Hack Tool Apk
  117. Pentest Recon Tools
  118. Hack Tools Mac
  119. Hack Rom Tools
  120. Hacker Hardware Tools
  121. Hacking Tools Name
  122. Hacker Tools For Ios
  123. Hacker Hardware Tools
  124. Hacker Tools 2019
  125. How To Install Pentest Tools In Ubuntu
  126. New Hack Tools
  127. Pentest Tools Framework
  128. Hacking Tools 2020
  129. Pentest Tools Kali Linux
  130. Hacker Tools Apk
  131. Hack Tools For Mac
  132. Growth Hacker Tools
  133. Hacking Tools For Mac
  134. What Is Hacking Tools
  135. Tools 4 Hack
  136. Hacking Tools For Windows
  137. Tools Used For Hacking
  138. Pentest Tools Review
  139. Hackrf Tools
  140. Hacking Tools Hardware
  141. Hack Tools For Pc
  142. Hacker Tools Apk
  143. Pentest Tools
  144. Hack Apps
  145. Hack Tools 2019
  146. Hacking Tools
  147. Hacker Hardware Tools
  148. How To Make Hacking Tools
  149. Hack App
  150. Bluetooth Hacking Tools Kali
  151. Beginner Hacker Tools
  152. Hacking Tools For Windows Free Download

Stop Using MD-5, Now!

TL;DR: Don't use MD-5 to identify malware samples. Believe me, it is a bad idea. Use SHA-256 or a stronger hash function.

This post is dedicated to all malware researchers, still using MD-5 to identify malware samples.

Before deep-diving into the details, let me explain my view on this topic. Whenever you want to identify a malware, it is only OK to publish the MD-5 hash of the malware if you post at least the SHA-256 hash of the malware as well. Publishing only the MD-5 hash is unprofessional. If you want to understand why, please continue reading. If you know about the problem, but want to help me spread the word, please link to my site www.stopusingmd5now.com.

By writing articles/posts/etc. and publishing the MD-5 hash only, it is the lesser problem that you show people your incompetency about hash functions, but you also teach other people to use MD-5. And it spreads like a disease... Last but not least, if I find a sample on your blog post, and you use MD-5 only, I can't be sure we have the same sample.

Here is a list to name a few bad examples (order is in Google search rank order):


Introduction to (cryptographic) hash functions

A long time ago (according to some sources since 1970) people started designing hash functions, for an awful lot of different reasons. It can be used for file integrity verification, password verification, pseudo-random generation, etc. But one of the most important properties of a cryptographic hash function is that it can "uniquely" identify a block of data with a small, fixed bit string. E.g., malware can be identified by using only the hash itself, so everybody who has the same malware sample will have the same hash; thus they can refer to the malware by the hash itself.

It is easy to conclude that there will always be collisions, where a different block of data has the same result hashes. The domain (block of data) is infinite, while the codomain (possible hash values) is finite. The question is how easy it is to find two different blocks of data, having the same hash. Mathematicians call this property "collision resistance." Proper cryptographic hash functions are collision-resistant, meaning it is impractical or impossible to find two different blocks of data, which have the same hash.

In 1989 Ronald Rivest (the first letter in the abbreviation of the RSA algorithm) designed the MD-2 hashing algorithm. Since 1997 there are publications about that this hashing algorithm is far from perfect.

In 1990 Ronald Rivest designed the MD-4 algorithm, which is considered as broken at least from 1991. But MD-4 is still in use from Windows XP until Windows 8 in the password protocol (NTLM). Unfortunately, there are more significant problems with NTLM besides using MD-4, but this can be the topic of a different blog post.

In 1991 (you might guess who) designed yet another hashing algorithm called MD-5, to replace MD-4  (because of the known weaknesses). But again, in from 1993 it has been shown many times that MD-5 is broken as well. According to Wikipedia, "On 18 March 2006, Klima published an algorithm [17] that can find a collision within one minute on a single notebook computer, using a method he calls tunneling". This means, that with the 8 years old computing power of a single notebook one can create two different files having the same MD-5 hash. But the algorithms to generate collisions have been improved since, and "a 2013 attack by Xie Tao, Fanbao Liu, and Dengguo Feng breaks MD-5 collision resistance in 2^18 time. This attack runs in less than a second on a regular computer." The key takeaway here is that it is pretty damn hard to design a secure cryptographic hash function, which is fast, but still safe. I bet that if I would develop a hash function, Ron would be able to hack it in minutes.

Now, dear malware researcher, consider the following scenario. You as, a malware analyst, find a new binary sample. You calculate the MD-5 hash of the malware, and Google for that hash. You see this hash value on other malware researchers or on a sandbox/vendor's site. This site concludes that this sample does this or that, and is either malicious or not. Either because the site is also relying solely on MD-5 or because you have only checked the MD-5 and the researcher or sandbox has a good reputation, you move on and forget this binary. But in reality, it is possible that your binary is totally different than the one analyzed by others. The results of this mistake can scale from nothing to catastrophic.

If you don't believe me, just check the hello.exe and erase.exe on this site from Peter Sellinger. Same MD-5, different binaries; a harmless and a (fake) malicious one... And you can do the same easily at home. No supercomputers,  no NSA magic needed.

On a side-note, it is important to mention that even today it can be hard to find a block of data (in generic), if only the MD-5 hash is known ("pre image resistance"). I have heard people arguing this when I told them using MD-5 as a password hash function is a bad idea. The main problem with MD-5 as a password hash is not the weaknesses in MD-5 itself, but the lack of salt, lack of iterations, and lack of memory hardness. But still, I don't see any reason why you should use MD-5 as a building block for anything, which has anything to do with security. Would you use a car to drive your children to the school, which car has not been maintained in the last 23 year? If your answer is yes, you should neither have children nor a job in IT SEC.

Conclusion

If you are a malware researcher, and used MD-5 only to identify malware samples in the past, I suggest to write it down 1000 times: "I promise I won't use MD-5 to identify malware in the future."

I even made a website dedicated to this problem, www.stopusingmd5now.com . The next time you see a post/article/whatever where malware is identified by the MD-5 hash only, please link to this blog post or website, and the world will be a better and more professional place.


PS: If you are a forensics investigator, or software developer developing software used in forensics, the same applies to you.
PS 2: If you find this post too provocative and harsh, there is a reason for this ...

Update: I have modified two malware (Citadel, Atrax) with the help of HashClash, and now those have the same MD-5. Many thanks for Marc Stevens for his research, publishing his code, and help given during the collision finding.

Related links


  1. Hacking Tools Github
  2. Pentest Tools Subdomain
  3. Hacker Tools
  4. Hak5 Tools
  5. Ethical Hacker Tools
  6. Hacker Tools Windows
  7. Hacking Tools For Mac
  8. Hackrf Tools
  9. Ethical Hacker Tools
  10. Nsa Hack Tools
  11. Pentest Tools List
  12. Tools Used For Hacking
  13. Hack Tools For Mac
  14. World No 1 Hacker Software
  15. Pentest Box Tools Download
  16. Hacking Tools 2019
  17. Hacking Tools 2020
  18. Usb Pentest Tools
  19. Hacking Tools Windows
  20. Hacker Tools Apk
  21. Pentest Tools Framework
  22. Game Hacking
  23. How To Make Hacking Tools
  24. Hacking Tools Hardware
  25. Hack Tools For Pc
  26. Hacking Tools Download
  27. Tools 4 Hack
  28. Pentest Automation Tools
  29. Hack Tools Online
  30. Install Pentest Tools Ubuntu
  31. Pentest Tools For Ubuntu
  32. Hacker Tools Free
  33. Pentest Tools
  34. Hacking Tools For Games
  35. Hacking Apps
  36. Hacker Tools Free Download
  37. Pentest Tools Port Scanner
  38. Hack Tools Pc
  39. Hacking Tools Windows
  40. Hacking Tools For Mac
  41. Hackers Toolbox
  42. Pentest Tools Windows
  43. Hacks And Tools
  44. How To Hack
  45. Hack Tools Mac
  46. Nsa Hack Tools
  47. Beginner Hacker Tools
  48. Install Pentest Tools Ubuntu
  49. Hacking Tools And Software
  50. Hack Apps
  51. Hacking Tools Windows 10
  52. Pentest Box Tools Download
  53. Hack App
  54. Pentest Tools Find Subdomains
  55. Hacker Hardware Tools
  56. Pentest Tools Nmap
  57. Pentest Tools For Windows
  58. Hacking App
  59. Nsa Hacker Tools
  60. Wifi Hacker Tools For Windows
  61. Pentest Tools
  62. Pentest Recon Tools
  63. Hacker Tools 2019
  64. Hack Tools For Games
  65. Hacker Search Tools
  66. Hacking Tools Download
  67. Hack Tool Apk No Root
  68. Pentest Tools Linux
  69. Hack Tool Apk No Root
  70. What Is Hacking Tools
  71. Hacker Tools Linux
  72. Hacker Tools List
  73. Hacking Tools Download

2023年5月30日星期二

The OWASP Foundation Has Selected The Technical Writer For Google Season Of Docs

The OWASP Foundation has selected the technical writer for Google Season of Docs by Fabio Cerullo


The OWASP Foundation has been accepted as the organization for the Google Seasons of Docs, a project whose goals are to give technical writers an opportunity to gain experience in contributing to open source projects and to give open-source projects an opportunity to engage the technical writing community.

During the program, technical writers spend a few months working closely with an open-source community. They bring their technical writing expertise to the project's documentation, and at the same time learn about open source and new technologies.

The open-source projects work with the technical writers to improve the project's documentation and processes. Together they may choose to build a new documentation set, or redesign the existing docs, or improve and document the open-source community's contribution procedures and onboarding experience. Together, we raise public awareness of open source docs, of technical writing, and of how we can work together to the benefit of the global open source community.

After a careful review and selection process, the OWASP Foundation has picked the primary technical writer who will work along the OWASP ZAP Team for the next 3 months to create the API documentation of this flagship project.

Congratulations to Nirojan Selvanathan!

Please refer to the linked document where you could look at the deliverables and work execution plan.



Read more


OVER $60 MILLION WORTH OF BITCOINS HACKED FROM NICEHASH EXCHANGE

Over $60 Million Worth of Bitcoins Hacked from NiceHash Exchange. Bitcoin mining platform and exchange NiceHash has been hacked, leaving investors short of close to $68 million in BTC.
As the price of Bitcoin continues to rocket, surging past the $14,500 mark at the time of writing, cyberattackers have once again begun hunting for a fresh target to cash in on in this lucrative industry.
Banks and financial institutions have long cautioned that the volatility of Bitcoin and other cryptocurrency makes it a risky investment, but for successful attackers, the industry potentially provides a quick method to get rich — much to the frustration of investors.
Unfortunately, it seems that one such criminal has gone down this path, compromising NiceHash servers and clearing the company out.
In a press release posted on Reddit, on Wednesday, NiceHash said that all operations will stop for the next 24 hours after their "payment system was compromised and the contents of the NiceHash Bitcoin wallet have been stolen."
NiceHash said it was working to "verify" the precise amount of BTC stolen, but according to a wallet which allegedly belongs to the attacker — traceable through the blockchain — 4,736.42 BTC was stolen, which at current pricing equates to $67,867,781.
"Clearly, this is a matter of deep concern and we are working hard to rectify the matter in the coming days," NiceHash says. "In addition to undertaking our own investigation, the incident has been reported to the relevant authorities and law enforcement and we are co-operating with them as a matter of urgency."
"We are fully committed to restoring the NiceHash service with the highest security measures at the earliest opportunity," the trading platform added.
The company has also asked users to change their online passwords as a precaution. NiceHash says the "full scope" of the incident is unknown.
"We are truly sorry for any inconvenience that this may have caused and are committing every resource towards solving this issue as soon as possible," the company added.
Inconvenience is an understatement — especially as so much was left in a single wallet — but the moment those coins shift, we may know more about the fate of the stolen investor funds.
Related word

  1. Hacker Tools List
  2. Hacker Tools Windows
  3. Hackrf Tools
  4. Easy Hack Tools
  5. Pentest Tools Url Fuzzer
  6. Hacker Tools Windows
  7. Nsa Hacker Tools
  8. Pentest Tools List
  9. Pentest Tools For Android
  10. Pentest Tools
  11. Hacker Tools Hardware
  12. Usb Pentest Tools
  13. Hacker Tools For Mac
  14. Hacking Tools For Windows
  15. Nsa Hack Tools Download
  16. Hacking Tools For Games
  17. Hacker Security Tools
  18. Hacking Tools Usb
  19. Hacking Tools Online
  20. Hacks And Tools
  21. Hacking Tools Kit
  22. Hack Tools Online
  23. Hacker Tools Online
  24. Pentest Recon Tools
  25. Nsa Hack Tools Download
  26. Free Pentest Tools For Windows
  27. Pentest Tools Website
  28. Hack Tools
  29. Kik Hack Tools
  30. What Are Hacking Tools
  31. Pentest Tools Find Subdomains
  32. Pentest Tools Open Source
  33. Hacking Tools For Windows Free Download
  34. Hacker Security Tools
  35. Hack App
  36. Hack Tools
  37. Hacker Tools Online
  38. Hacking Tools For Games
  39. What Is Hacking Tools
  40. Hack Tool Apk No Root
  41. Pentest Tools
  42. Hacker Tools Apk
  43. Blackhat Hacker Tools
  44. Game Hacking
  45. Hacker Tools Github
  46. Pentest Tools Find Subdomains
  47. Github Hacking Tools
  48. Hacking Tools Name
  49. Pentest Tools Port Scanner
  50. Hack Tools Mac
  51. Pentest Tools Subdomain
  52. Hacking Tools
  53. Best Hacking Tools 2019
  54. Pentest Tools For Windows
  55. Hacking Tools Mac
  56. Hack Tools Github
  57. Hacker Tools For Mac
  58. Hack Website Online Tool
  59. Hacker Tools List
  60. Hacking Tools For Mac
  61. Pentest Reporting Tools
  62. Hacking Tools Pc
  63. Hack Tool Apk
  64. Tools 4 Hack
  65. Hacker Tools Free
  66. Hacking Tools Free Download
  67. Pentest Tools Port Scanner
  68. Install Pentest Tools Ubuntu
  69. Pentest Tools Framework
  70. Github Hacking Tools
  71. Hack Apps
  72. Hacking Tools Usb
  73. Pentest Tools Open Source
  74. Hacker Tools Mac
  75. Hacking Tools Download
  76. Hacking Tools Kit
  77. Hacking Tools Mac
  78. Free Pentest Tools For Windows
  79. Pentest Tools Open Source
  80. Android Hack Tools Github
  81. Hack Tools Download
  82. Hacking Tools Online
  83. Hacker Tools Apk
  84. Hacking Tools Software
  85. Beginner Hacker Tools
  86. Blackhat Hacker Tools
  87. Hacking Apps
  88. Wifi Hacker Tools For Windows
  89. How To Install Pentest Tools In Ubuntu
  90. Pentest Tools Linux
  91. Hacker
  92. Hacker Tools Windows
  93. Top Pentest Tools
  94. Best Hacking Tools 2019
  95. Hacking Tools Kit
  96. Hack Apps
  97. Hack Tools For Games
  98. How To Install Pentest Tools In Ubuntu
  99. Hack Tools Github
  100. Hacker Tools Windows
  101. Physical Pentest Tools
  102. Pentest Tools Github
  103. Hacking Tools Software
  104. Pentest Tools Online
  105. Blackhat Hacker Tools
  106. Pentest Tools Free
  107. Hacking Tools For Pc
  108. Hacker Tools Free
  109. Hacker Security Tools
  110. Hackers Toolbox
  111. Hacking Tools Github
  112. Hacker Tool Kit
  113. New Hacker Tools
  114. Hacking Tools Windows
  115. Hacker Techniques Tools And Incident Handling
  116. Hacking Tools Windows
  117. Pentest Box Tools Download
  118. Pentest Automation Tools
  119. Hacker Tools For Mac
  120. Pentest Tools Github
  121. Hacker Tools 2020
  122. Hacking Tools Software
  123. Hacking Tools Name
  124. Hacking Tools And Software
  125. Hacking Tools Free Download
  126. Install Pentest Tools Ubuntu
  127. Easy Hack Tools
  128. Hackrf Tools
  129. Nsa Hacker Tools
  130. Pentest Tools For Ubuntu
  131. Hacker Tools Apk Download
  132. Black Hat Hacker Tools
  133. Pentest Tools Android
  134. Hack Tools 2019
  135. Pentest Tools For Windows
  136. Pentest Tools Port Scanner
  137. Hacker Tools
  138. Nsa Hack Tools
  139. Free Pentest Tools For Windows
  140. Hacker Tools Apk
  141. Hack Tools Github
  142. Hacker Tools For Windows
  143. Underground Hacker Sites
  144. Hacker Tools 2019
  145. Hacking Tools Free Download
  146. Hacker Tools Online
  147. Hack Tools For Ubuntu
  148. Hack App
  149. Usb Pentest Tools
  150. Growth Hacker Tools
  151. Nsa Hack Tools Download
  152. Best Pentesting Tools 2018