This has been a busy month so please excuse a lazier Infosec Digest than usual.
Scanless – a command line utility for public sites that port scan on your behalf.
“At a high level, the Web Cache Deception attack is very simple to execute and contains only two steps: (1) An attacker coerces the victim to open a link on the valid application server containing the payload. (2) The attacker opens the newly cached page on the server, using the same link, to see the exact same page as the victim. This attack only makes sense when the vulnerable resource that’s available to the attacker returns sensitive data.” (continue reading here)
Whoopz HP has been shipping a keylogger for years… and they didn’t even know it.
There’s a new tool that helps you use WayBack Machine for recon. On the topic, ksaj had this to say on /r/netsec – “I’ve been using WayBack Machine for recon since the first time I’d heard of it. Not only for site mapping, but also for taking specific notice of the various technology changes. Always nice to know if they fix their bugs, or simply ‘upgrade’ them blindly. Much better than being in their logs leading up to the actual attack. Especially if they have ID/IPS or are connected to a good 3rd party monitoring company.”
Magic with Manticore (binary analysis tool)
So you want to man-in-the-middle SSH?
OK OK we’ll post something about WannaCry. Here‘s the execution workflow. There. OK.
SlashCrypto finds a $5,000 Google error page.
Here’s a legit iOS testing guide. It’s in PDF.
The comments of this Hacker News post became a crypto crash course.
RFID Hacking with the Proxmark3 (this is a new dawn for RFID research)
Bonus: a bunch of great software for the Proxmark3, including a bruteforcer.
And I don’t remember what these links were but I noted to share them with you: