How to Hack an App Video Series

app hacking

In order to bring attention to how easy hackers are able to exploit applications, the people at Arxan Technologies have posted a series of videos showing how to hack mobile apps using various open source tools. You can find the videos HERE. Jonathan Carter does a pretty good job going into details on how the tools work with lots of details. Check it out.

Here is a summary of the videos Continue reading

VN:F [1.9.22_1171]
Rating: 5.0/5 (1 vote cast)

Installing and Troubleshooting Kali Linux On Raspberry Pi

RASPBERRY

I have been asked a handful of times about the steps to install Kali Linux on a Raspberry Pi. My buddy Aamir Lakhani and I went through the installation process a million times with different models to develop our best practices for the installation process. This post will cover a very short summary of how to install Kali Linux on a model B+ Raspberry Pi. The full details as well as many other Raspberry Pi penetration testing use cases can be found in our book HERE. Continue reading

VN:F [1.9.22_1171]
Rating: 5.0/5 (2 votes cast)

SourceFire Licensing And How To Get License Key for FireSIGHT / Defense Center

sourcefirelogoI am asked about Cisco Next Generation Security aka FireSIGHT licensing at least once a week. This post will explain the license options for Cisco FirePOWER and what is needed to request demo licenses to enable your demo system. NOTE: This is the current license model as of March 8th 2015.

For those that are not familiar with the new Cisco FirePOWER offering, it is a blend of Content Filtering, Reputation Security, Application Visibility and Controls, Vulnerability Scanning, IPS/IDS, Network and Endpoint Day Zero protection. These features are offered as a dedicated physical or virtual appliance, as a software option ran inside of a X generation ASA or as a Cloud service. For the dedicated appliance, virtual appliance and ASA version, there are three license options. Continue reading

VN:F [1.9.22_1171]
Rating: 5.0/5 (2 votes cast)

Tax Time: Let the Phishing Begin

phishingcartoonEarl Carter and Craig Williams from the Cisco Security Blog posted a great article on a recent wave of taxed related spear-phishing attacks (original post found HERE). What is interesting is how attackers leverage current trends as the theme for their malware. For example, we will probably see a bunch of March Madness attacks along with Tax related phishing this month since thats what people are searching for online. This contradictions the old belief that “safe searching” aka not going to adult websites or searching for free software will keep you safe from malware. The reality is the attackers want the most bang for their buck so they will target where the most people are at. In March, thats Tax season and March Madness. Here is the post from Cisco. Continue reading

VN:F [1.9.22_1171]
Rating: 4.0/5 (3 votes cast)

Comparing iOS to Android – Which is more secure?

Android-Vs-iOSI have been asked a bunch of times “Which is the more secure mobile platform? Android or iOS?”. There are tons of articles on this topic found by searching on Google. Here is my two cents on the topic.

When looking at Apple iOS and Android, both take completely different approaches to security giving pros and cons to each option. Apple is extremely strict with how applications can leverage resources while Android is open source. For example, Apple devices sandbox APPs meaning they can’t interact with other APPs. Only “jail broken” phones open up the ability for applications to interact with other resources. So for those thinking its smart to jailbreak your iPhone, just be warned that you are also putting your device at risk for compromise. Continue reading

VN:F [1.9.22_1171]
Rating: 5.0/5 (1 vote cast)

CBSNews DARPA: Nobodys safe on the Internet 60 Mins Video

darpa1

CBSNews has a segment of 60s minutes covering how DARPA “the creator of the Internet” is fighting cyber crime (found HERE). They claim Dan Kaufman aka Darpa Dan and his team have built a application that can monitor the military’s network for compromised hosts. They continue to claim “any device that is breached will show up as red dots so you know EXACTLY whats going on”. Uhhhhh sure … is this malware / breach detection mixed with behavior analytics or is it just smoke and mirrors to look impressive on TV?

Next they say they can shut down or quarantine an infected system. Ok well at least that sounds reasonable since technology like NAC is around so just add a desktop management application and that is accomplished. I guess it sounds reasonable when DARPA Dan’s team gets a half of billion dollars a year to develop technology according to this report. With that budget, they better be able to accomplish something.  Continue reading

VN:F [1.9.22_1171]
Rating: 0.0/5 (0 votes cast)

Bank Hackers Steal Millions via Malware

cyber-attack-hacker

My buddy Aamir Lakahni at drchaos wrote a interesting post about criminals using RAT tools to steal boat loads of money from banks. The original post can be found HERE.

Another week, another hack. A group of cybercriminals used phishing attacks to install remote access toolkits (RATs) and steal over $300 million from banks and other financial institutions (source: http://www.nytimes.com/2015/02/15/world/bank-hackers-steal-millions-via-malware.html)

Using RATs is not new, and common method cybercriminals use. We had an in-depth look at njRAT and the Sweet Orange Exploit on this site. It is also not uncommon to use phishing and other social engineering attacks by attackers to trick users into installing sophisticated malicious tools. Continue reading

VN:F [1.9.22_1171]
Rating: 0.0/5 (0 votes cast)

NSS Labs Threat Capabilities Report Available

threatglasses1NSS Labs just released their latest Threat Capabilities Report found HERE. Its a short yet interesting report covering  widely used applications that were exploited after September of 2014. They list the top applications, operating systems and countries hosting command and control call homes. This one is free to download. Below is a summary from the report.

Continue reading

VN:F [1.9.22_1171]
Rating: 0.0/5 (0 votes cast)