Saturday, January 27, 2024

OpenVAS


"OpenVAS stands for Open Vulnerability Assessment System and is a network security scanner with associated tools like a graphical user front-end. The core is a server component with a set of network vulnerability tests (NVTs) to detect security problems in remote systems and applications." read more...

Read more


ASIS CTF Quals 2015 - Sawthis Writeup - Srand Remote Prediction


The remote service ask for a name, if you send more than 64 bytes, a memory leak happens.
The buffer next to the name's is the first random value used to init the srand()


If we get this value, and set our local srand([leaked] ^ [luckyNumber]) we will be able to predict the following randoms and win the game, but we have to see few details more ;)

The function used to read the input until the byte \n appears, but also up to 64 bytes, if we trigger this second condition there is not 0x00 and the print shows the random buffer :)

The nickname buffer:



The seed buffer:



So here it is clear, but let's see that the random values are computed with several gpu instructions which are decompiled incorrectly:







We tried to predict the random and aply the gpu divisions without luck :(



There was a missing detail in this predcitor, but there are always other creative ways to do the things.
We use the local software as a predictor, we inject the leaked seed on the local binary of the remote server and got a perfect syncronization, predicting the remote random values:




The process is a bit ugly becouse we combined automated process of leak exctraction and socket interactive mode, with the manual gdb macro.




The macro:



















Continue reading

Networking | Routing And Switching | Tutorial 2 | 2018


Welcome to my 2nd tutorial of the series of networking. In this video I've briefly described peer to peer network (P2P). Moreover, you'll see how to make a peer to peer network? How it's working? How we can intercept traffic over the network by using Wireshark? and many more. Wireshark tool is integrated with eNSP so it'll be installed automatically when you install the eNSP. On the other hand, you can install the Wireshark for your personal use from its website.

What is Peer to Peer (P2P) network? 

As when devices are connected with each other for the sake of communication that'll be known as a Network. Now what is peer to peer network? In P2P network each and every device is behaving like a server and a client as well. Moreover They are directly connected with each other in such a way that they can send and received data to other devices at the same time and there is no need of any central server in between them.

There is a question that mostly comes up into our minds that  Is it possible to capture data from the network? So the answer is yes. We can easily captured data from the network with the help of tools that have been created for network troubleshooting, so whenever there will be some issues happening to the network so we fixed that issues with the help of tools. Most usable tool for data capturing that every network analyst used named Wireshark but there are so many other tools available over the internet like SmartSniff, Ethereal, Colasoft Capsa Network Analyze, URL Helper, SoftX HTTP Debugger and many more.

What is Wireshark?

Wireshark is an open source network analyzer or sniffer used to capture packets from the network and tries to display the brief information about the packets. It is also used for software and communication protocol development. Moreover, Wireshark is the best tool to intercept the traffic over the network.


Continue reading


  1. Pentest Tools Open Source
  2. Hacker Tools Mac
  3. Pentest Tools Website
  4. Hacking Tools For Beginners
  5. Android Hack Tools Github
  6. Bluetooth Hacking Tools Kali
  7. Pentest Tools Linux
  8. Hacking Tools For Windows
  9. Blackhat Hacker Tools
  10. Wifi Hacker Tools For Windows
  11. Pentest Recon Tools
  12. Pentest Tools Port Scanner
  13. Nsa Hack Tools
  14. Pentest Tools Online
  15. Pentest Tools Subdomain
  16. Pentest Tools Website
  17. Hacker Tools List
  18. Tools 4 Hack
  19. Hacker Tools 2020
  20. Hacker Tools Hardware
  21. Hackers Toolbox
  22. Hack Tools For Games
  23. Hak5 Tools
  24. Pentest Tools Open Source
  25. Hack App
  26. Kik Hack Tools
  27. Hack Rom Tools
  28. Pentest Tools Nmap
  29. Hacking Tools Usb
  30. Pentest Tools Apk
  31. Hack And Tools
  32. Pentest Reporting Tools
  33. Hacker
  34. Termux Hacking Tools 2019
  35. Hack Tools For Ubuntu
  36. Hacking Tools For Mac
  37. Nsa Hack Tools
  38. Hacking Tools For Windows 7
  39. Hacking Tools For Windows 7
  40. Hack Tools For Windows
  41. Hack Tools For Games
  42. Hacking Tools Windows 10
  43. Hacking Tools Usb
  44. Hack And Tools
  45. Hack Tool Apk No Root
  46. Hacking Tools 2019
  47. How To Install Pentest Tools In Ubuntu
  48. Best Hacking Tools 2019
  49. Hacker Tools 2020
  50. Hack Tools Pc
  51. Hack Tools
  52. Pentest Tools Windows
  53. Hacker Tools Windows
  54. Hacker Tools Free
  55. Pentest Tools Find Subdomains
  56. Pentest Tools For Android
  57. Game Hacking
  58. Beginner Hacker Tools
  59. Hacker Security Tools
  60. Ethical Hacker Tools
  61. Hacker Tools
  62. Pentest Automation Tools
  63. Hacker Tools List
  64. Hacking Tools For Kali Linux
  65. Hacking Tools For Beginners
  66. Android Hack Tools Github
  67. Hacker Tools Hardware
  68. Hacker
  69. Hacking Tools For Mac
  70. Hack Tools 2019
  71. Pentest Reporting Tools
  72. New Hack Tools
  73. Pentest Tools
  74. Pentest Tools Kali Linux
  75. New Hacker Tools
  76. Hacker Tool Kit
  77. Termux Hacking Tools 2019
  78. Pentest Tools Website Vulnerability
  79. Hacking Apps
  80. Hack Website Online Tool
  81. Easy Hack Tools
  82. Hacker Tools For Ios
  83. Hacker Tools 2019
  84. Hack Tools
  85. Hacker Tools Online
  86. Nsa Hacker Tools
  87. Hacker Tools Github
  88. What Is Hacking Tools
  89. Pentest Tools List
  90. Nsa Hacker Tools
  91. Pentest Reporting Tools
  92. Tools For Hacker
  93. Hacking Tools For Kali Linux
  94. Pentest Tools Alternative
  95. Pentest Tools For Windows
  96. Pentest Tools For Android
  97. Nsa Hacker Tools
  98. Pentest Tools Nmap
  99. What Is Hacking Tools
  100. Hack And Tools
  101. Tools For Hacker
  102. Hacking Tools Windows
  103. Pentest Reporting Tools
  104. Hackers Toolbox
  105. Pentest Tools Url Fuzzer
  106. Pentest Tools Android
  107. Bluetooth Hacking Tools Kali
  108. World No 1 Hacker Software
  109. Hacker Tools Linux
  110. Blackhat Hacker Tools
  111. What Is Hacking Tools
  112. Hacking Tools 2019
  113. Hacking Tools Free Download
  114. Pentest Tools
  115. Pentest Tools Port Scanner
  116. Tools For Hacker
  117. Pentest Tools List
  118. Hackers Toolbox
  119. Hack App
  120. Hacking Tools Name
  121. Hacker Tools For Pc
  122. Hack Apps
  123. Pentest Tools Online
  124. Hacker Tools Windows
  125. Pentest Tools Open Source
  126. Hack Tools 2019
  127. Hack App
  128. Hacking Tools For Kali Linux
  129. Hacking Tools And Software
  130. Termux Hacking Tools 2019
  131. Hack Tools
  132. Hack App
  133. Beginner Hacker Tools
  134. Hacker Tools For Windows
  135. Pentest Tools Linux
  136. Hacking Tools Name
  137. Hacker Tools Apk Download
  138. Game Hacking
  139. Hack Tools For Mac
  140. Underground Hacker Sites
  141. Hacker Tools Software
  142. Hack Tools For Pc
  143. Beginner Hacker Tools
  144. Tools 4 Hack
  145. Hacking Tools For Pc
  146. Tools 4 Hack
  147. Pentest Tools Url Fuzzer
  148. Hak5 Tools
  149. Hacking Tools For Beginners
  150. Hack Website Online Tool
  151. Physical Pentest Tools
  152. Hacking Tools For Games
  153. Hack Tools For Pc
  154. Hacking Tools Windows 10
  155. Hacking Tools Software
  156. Termux Hacking Tools 2019
  157. Hacking Apps
  158. Best Pentesting Tools 2018
  159. Hacking Tools Windows 10
  160. Hack Tools For Mac
  161. How To Install Pentest Tools In Ubuntu
  162. Hacking Tools Pc
  163. Pentest Tools Port Scanner
  164. Hack Tools For Windows
  165. Hack Tools Mac
  166. Pentest Tools Alternative
  167. Hack Tools For Ubuntu