ICT Security Tools
14.9K views | +0 today
Follow
ICT Security Tools
A collection of best ICT Security Tools + tutorials how to use them...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

MagicTree: Data management for penetration testers

MagicTree: Data management for penetration testers | ICT Security Tools | Scoop.it

Have you ever spent ages trying to find the results of a particular portscan you were sure you did? Or grepping through a bunch of files looking for data for a particular host or service? Or copy-pasting bits of output from a bunch of typescripts into a report?

No comment yet.
Scooped by Gust MEES
Scoop.it!

Hackers pierce network with jerry-rigged mouse • The Register

Hackers pierce network with jerry-rigged mouse • The Register | ICT Security Tools | Scoop.it
When hackers from penetration testing firm Netragard were hired to pierce the firewall of a customer, they knew they had their work cut out. The client specifically ruled out the use of social networks, telephones, and other social-engineering vectors, and gaining unauthorized physical access to computers was also off limits.

Deprived of the low-hanging fruit attackers typically rely on to get a toe-hold onto their target, Netragard CTO Adriel Desautels borrowed a technique straight out of a plot from Mission Impossible: He modified a popular, off-the-shelf computer mouse to include a flash drive and a powerful microcontroller that ran custom attack code that compromised whatever computer connected to it.
No comment yet.