Zer0Byte

Geekiest Techno News

Archive for the ‘Linux’ Category

How the Raspberry Pi USB Malware Scanner Works

This article by “Icarus Cyber Labs” Explains the technical working of their newly created USB Malware Scanner. The core aspect of the malware scanner is a python script that continuously polls for USB devices. The polling is done by continuously checking the output of the “blkid” command in Linux. This can also be accomplished by using the  [ Read More ]

Advance Wifi Network Pentesting Notes

Advanced Wireless Network Pentesting Notes First of all make sure to randomize your MAC address and clean your ARP tables, Use an ALPA usb wirless adapter device or whatever 🙂 I- airdump-ng To Sniff The Traffic : All people whom they do pentesting know this part i will not say all how packets works and  [ Read More ]

Aircrack-ng Updated After 3 Years

Finally after 3 long Years, Our favorite weapon of choice got an update. A lot of fixes and improvements on all tools and documentation have been made.In addation few new tools and scripts including distributed cracking tool are also included.The Complete change log can be viewed below. Complete Aircrack-ng Changelog Version 1.2 beta 1 Version 1.2-beta1  [ Read More ]

Sqli Dorking with a Huge list of Google Dorks

This a very nice easy to use Sqli dorking script made in Perl. This can be used to easily extract the results from google or bing in to a text file. I recommend edit the file erasing the word “site:” (Line 147) to get compatibility with the file of Dorks provided by Zer0 Byte (http://zer0byte.com/zeropastebin/?8a67aa4cadbf88a7#we2TTzy/Oto1K8ukCDXAxTfI/jIKs4H2ujjzExCwLng=)  [ Read More ]

AttackVector Linux: the dragon has tails Released

A new Pen-testing Linux distro has arrived which is designed to give its users the anonymity they always wanted.  “AttackVector Linux is a new distribution for anonymized penetration and security. It is based on Kali and TAILS, which are both based on Debian.“ in order to understand why this distro can be important to us, you must read this article i wrote  [ Read More ]

Pwning WIFI Access Points with XSS using SSID

Lee7s at CDW  found a very creative way to  pwn wifi access points that have the “site survey” option. In their white paper they conducted their test on few APs that included WIFI Pineapple aswell. Just Imagine pwning wifi pineapple haX0r with this exploit ;p BTW this exploit was even presented in this years Black hat  [ Read More ]

Leets the new bt is out with loads of tools. Tools categorys are much like BT-R3 but there some new tools as well The first thing you’ll notice is you can install directly from the live boot menu instead of a desktop icon, Which worked well for me because I was having trouble getting it to  [ Read More ]

Since the birth of Raspberry devices which were developed by Raspberry Pi Foundation, its always been one of the favourite toy for hackers from all around the world. The beauty of this is device is that its only for 25 USD $ and  is a credit-card-sized single-board computer. Just look at the picture below or  [ Read More ]

Backtrack 5 r3 Released -Complete Change Log

Bactrack 5 r3 change log

The time has come to refresh our security tool arsenal – BackTrack 5 R3 has been released. R3 focuses on bug-fixes as well as the addition of over 60 new tools – several of which were released in BlackHat and Defcon 2012. A whole new tool category was populated – “Physical Exploitation”, which now includes tools  [ Read More ]

Network Analysis Using Wireshark and Xplico

This tutorial will capture traffic on a local network with Wireshark and then forensics will be carried out with Xplico by using its intuitive web interface. These two tools are already included in Backtrack 5 Xplico Xplico is a Network Forensic Analysis Tool (NFAT), which is a software that reconstructs the contents of acquisitions performed  [ Read More ]