Posts Tagged ‘Wireshark’

Graphing Suspicious URL Relationships

10,000 websites have been compromised to redirect users to a new exploit toolkit called Nice Pack, discovered Wednesday, attempts to take advantage of flaws in users’ third-party apps, such as Java and Adobe, to install the “Zero Access Trojan,”. Malicious URL are not always related to a single domain, attackers mostly try to place redirect [...]

Share

Wireshark 1.6.1 Malformed IKE Packet DoS

New vulnerability have been discovered in Wireshark 1.6.1 that affects IKEv1 protocol function proto_tree_add_item() this bug allow to conduct a denial of service attack. This is not the first vulnerability that has been discovered lately in wireshark as in the 18th of April Paul Makowski working for SEI/CERT discovered vulnerability allows a remote user that [...]

Share

Capturing and Analyzing Malicious Network Traffic

Sniffers are very important tools for analyzing and capturing all packets in real time. If you want to understand what Malware change on the network level here you can find some useful sniffing utilities: Wireshark’s GUI Fantastic packet analyzer tool for Windows, Linux, Mac OS X, and various other platforms, at first this tool is [...]

Share

Sniffing/MITM Attacks on Tor network

Tor is wonderful tool to ensure your privacy on the Internet ,Tor software is a program that you can run on your computer to helps keep you safe on the Internet.Tor prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. [...]

Share

Ways for Effective Network Penetration Testing

Any security professional has his own way in conducting a penetration testing mission but the whole plan and method for performing the pentest should be in accordance with the security standards recommendations and regulations. The first thing is to start with defining a framework for the several part of pentest this will involve obtaining comprehensive [...]

Share