Quantcast
Channel: phocean – Phocean.net
Browsing all 22 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Password stealing using a password filter

Nice stuff from @mubix: the technic consists in injecting a DLL to lsass.exe, using the password filter feature of Windows. The password filter architecture is useful to check that a password is...

View Article


Pentest of a Wi-Fi network with Cisco NCS

I had a chance to audit this device during a Wi-Fi pentest. Cisco Prime Network Control System is a Wi-Fi controller that allows to manage multiple access points and centralize their configuration:...

View Article


Image may be NSFW.
Clik here to view.

(in)Security of JSONP: CSRF risks

JSONP vs JSON I had an opportunity to experiment exploiting JSONP in real life. Honestly, I had never heard of it before. JSON is a well known method to serialize data, but what is JSONP? Actually, it...

View Article

The joy of dependencies: Metasploit on Fedora 20

UPDATE 02/2015 : see there for the procedure on Fedora 21 As I started to use Fedora 20 at work – by the way, a solid distro with all security features enabled, I had the bad surprise to get similar...

View Article

Image may be NSFW.
Clik here to view.

Mimikatz offline, as a Volatility plugin!

I just tested the Mimikatz plugin for Volatility and it worked very well on a Windows 7 dump: Output of the Mimikatz plugin for Volatility Good job ;-)

View Article


Image may be NSFW.
Clik here to view.

RF fun with a SDR

So this post will be the first of a series on fun “hacking” hardware that I own. I just received my RTL-SDR to play with radio frequencies. This one is based on a RTL2832U chipset and a R820T tuner. My...

View Article

Joomla brute force

I released a new tool there. It is a Ruby script that is able to brute force recent versions of Joomla. Enjoy!

View Article

Testing Heartbleed vulnerability

No fresh news, but I had been wanting to test the Heartbleed vulnerability for a while and just missed time. I used the following quick setup: Debian 7.0 virtual machine as a vulnerable host Heartleech...

View Article


Installation of Metasploit on Fedora 21 / 22

Update 2015/08/04: Works on Fedora 22 too. I recently applied the exact same procedure with success. A quick update from a previous post for setting Metasploit on Fedora 21, the latest version. It is...

View Article


Quick tip: harden your ARP table the easy way (Linux)

ARP spoofing is a good old attack on LAN and still a devastating one, leading to trafic interception (MiTM). You may want to make sure that nobody is tricking on you at office, at a security...

View Article

A journey with Btrfs

Why BTRFS ? I have recently tested Btrfs as the file system for my /home partition (which was previously on ext4). I have been impressed by what this file system enables to do, but also came to the...

View Article

A few (convenient) dockerfiles

I just put on my github a few dockerfiles for virtual machines that I frequently use to get some quick work done or to temporary share some data. Here they are: Debian-based Etherpad Debian-based...

View Article

Image may be NSFW.
Clik here to view.

Metasploit Dockerfile

Hey, Managing updates and dependencies of a Metasploit installation have definitely been too much trouble and repetitive. Instead of keeping reproducing boring installation steps every x months, I...

View Article


Small improvements to the Metasploit-framework Dockerfile

I made a few improvements (at least, I think they are) to the metasploit-frameword Dockerfile : A volume from the container /root/.msf4 to $HOME/.msf4, so that you can benefit from your customized...

View Article

Lessons learned with Docker, Nodejs apps and volumes

Context I have kept playing with Docker recently, just for fun and to learn. It is very powerful, but still young. It quickly shows some limit when it comes to security or persistence. There are some...

View Article


Msf docker image now in REMnux!

Just a quick note to say that I am very happy about this Metasploit docker image being useful to some people, according to the feedback I got. And Lenny was kind enough to integrate it into his Linux...

View Article

Site going to full TLS

Hi dear subscribers, Thanks to let’s encrypt, the site is now going to be accessible only through HTTPS. It also concern the RSS/ATOM feeds. So please update your links and RSS agregators so that you...

View Article


Metasploit framework docker image now published on Docker Hub

I pushed the image on Docker Hub, so that deploying it is now as easy as: docker pull phocean/msf It is an automatic build based on the Github repository. It means that the image is built by Docker,...

View Article

One more rant against the Linux Intel graphic driver

Some quick notes that may help random Linux users looking for similar issues. I am, like many, the unfortunate user of a laptop with Intel graphics (Thinkpad T460 to be precise). Why unfortunate?...

View Article

Image may be NSFW.
Clik here to view.

Reducing the friction™ with social medias thanks to Netvibes

I have been a big fan of the “Reducing the friction” series of article published by Scott Lowe a while back. These articles consist in tips to automate or improve the smoothness of repeated...

View Article
Browsing all 22 articles
Browse latest View live