Search the Community
Showing results for tags 'take'.
-
EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible. EyeWitness is designed to run on Kali Linux. It will auto-detect the file you give it with the -f flag as either being a text file with URLs on each new line, nmap xml output, or Nessus xml output. The -t (timeout) flag is completely optional, and lets you provide the max time to wait when trying to render and screenshot a web page. Changelog v20220307.1 b214b59 Merge branch ‘master’ of github.com:FortyNorthSecurity/EyeWitness 73bd6f3 added signatures FortyNorth Security has created a Windows client (thanks to the massive help of Matt Grandy (@Matt_Grandy_) with the stability fixes). All you need to do is build it locally (or check the releases), and then provide a path to a file containing the URLs you want to be scanned! EyeWitness will generate the report within your “AppData\Roaming” directory. The latest version of the C# EyeWitness supports parsing and taking screenshots of Internet Explorer and Chrome bookmarks without having to supply a list of URLs. This version is also small enough to be delivered through Cobalt Strike’s execute-assembly. [hide][Hidden Content]]
-
- eyewitness
- v20220307.1
-
(and 3 more)
Tagged with:
-
Since the beginning of this year, many well-known companies around the world have been attacked by hackers, such as McDonald’s, a world-renowned fast-food brand. Hackers stole part of McDonald’s data in the United States, South Korea, and Taiwan, including information about employees and restaurants. Kaseya, a developer of remote IT service management software, also suffered a large-scale ransomware attack, the hacker organization REvil used the vulnerability to access Kaseya’s server, and then posted a post on the dark web, demanding a ransom from Kaseya, asking the other party to pay a ransom of $70 million in exchange for repairing the data. Saudi Aramco, the world’s largest oil producer, also encountered a large amount of data theft, and the hackers demanded a ransom of $50 million. What is more familiar to the majority of DIY enthusiasts is that board card manufacturers were stolen by hackers of confidential documents, and data related to many unreleased products of Intel and AMD were leaked. Although similar incidents have occurred from time to time in the past, this year’s hacking attacks have been larger and more frequent. The victims are also large global multinational corporations. After a period of silence, some industry giants recently broke out similar incidents. This unfortunately the Swedish furniture brand IKEA was affected. According to HotHardware, IKEA has recently encountered continuous attacks by hackers. After hacking the e-mail system, stealing information, hackers took over the employee’s e-mail account and then pretended to be the employee to send e-mails to relevant IKEA partners for phishing. This method works very well because the recipient sees that the sender is a trusted IKEA staff member and has a good chance of downloading or opening the link in the email. What’s more difficult is that it’s still not clear whether hackers hacked into IKEA’s employee account or entered IKEA’s internal Microsoft Exchange server. Out of prudent consideration, IKEA has shut down some functions of the email system and increased the network alert level to avoid further risk of data leakage, and to investigate the relevant situation. Source
-
EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible. EyeWitness is designed to run on Kali Linux. It will auto-detect the file you give it with the -f flag as either being a text file with URLs on each new line, nmap xml output, or Nessus xml output. The -t (timeout) flag is completely optional, and lets you provide the max time to wait when trying to render and screenshot a web page. Changelog v20211025.1 c7eca23 Updated setup to use newest geckodriver (v.0.30.0) FortyNorth Security has created a Windows client (thanks to the massive help of Matt Grandy (@Matt_Grandy_) with the stability fixes). All you need to do is build it locally (or check the releases), and then provide a path to a file containing the URLs you want to be scanned! EyeWitness will generate the report within your “AppData\Roaming” directory. The latest version of the C# EyeWitness supports parsing and taking screenshots of Internet Explorer and Chrome bookmarks without having to supply a list of URLs. This version is also small enough to be delivered through Cobalt Strike’s execute-assembly. [hide][Hidden Content]]
-
- eyewitness
- v20211025.1
-
(and 3 more)
Tagged with:
-
EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible. EyeWitness is designed to run on Kali Linux. It will auto-detect the file you give it with the -f flag as either being a text file with URLs on each new line, nmap xml output, or Nessus xml output. The -t (timeout) flag is completely optional, and lets you provide the max time to wait when trying to render and screenshot a web page. Changelog v20210302.1 8f4c391 Updated signatures FortyNorth Security has created a Windows client (thanks to the massive help of Matt Grandy (@Matt_Grandy_) with the stability fixes). All you need to do is build it locally (or check the releases), and then provide a path to a file containing the URLs you want to be scanned! EyeWitness will generate the report within your “AppData\Roaming” directory. The latest version of the C# EyeWitness supports parsing and taking screenshots of Internet Explorer and Chrome bookmarks without having to supply a list of URLs. This version is also small enough to be delivered through Cobalt Strike’s execute-assembly. [hide][Hidden Content]]
-
- 3
-
- eyewitness
- v20210302.1
-
(and 3 more)
Tagged with:
-
EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible. EyeWitness is designed to run on Kali Linux. It will auto-detect the file you give it with the -f flag as either being a text file with URLs on each new line, nmap xml output, or Nessus xml output. The -t (timeout) flag is completely optional, and lets you provide the max time to wait when trying to render and screenshot a web page. Changelog v20201002.2 0b999fd Merge pull request #507 from jps3/master ad6ee1d Update Dockerfile FROM line FortyNorth Security has created a Windows client (thanks to the massive help of Matt Grandy (@Matt_Grandy_) with the stability fixes). All you need to do is build it locally (or check the releases), and then provide a path to a file containing the URLs you want to be scanned! EyeWitness will generate the report within your “AppData\Roaming” directory. The latest version of the C# EyeWitness supports parsing and taking screenshots of Internet Explorer and Chrome bookmarks without having to supply a list of URLs. This version is also small enough to be delivered through Cobalt Strike’s execute-assembly. [hide][Hidden Content]]
-
- 1
-
- eyewitness
- v20201002.2
-
(and 3 more)
Tagged with:
-
Stealth Screenshot Saver + Uploader is a combination of windows utilities to create a malicious program without requiring any heavy coding. The executable file contain: file.bat - Batch file contains the screenshot batch line + ftp credentials main.exe - Execute the hidden file.bat README.txt - dummy file with credits svchost.exe - Command line utility to take screenshots How to use? Open file.bat with notepad and change line 2, 4, 5, 6. In line 2, change between loop and savescreenshot. The first value is by default 60 (60 screenshots before upload) Also in the same line by default is 10000 (Wait 10 seconds between screenshots) In line 4 is the ftp server (Default is ftp.uploaded.net) In line 5 is the ftp username In line 6 is the ftp password Why Uploaded.net Uploaded.net is a public free file hosting service with ftp enabled by default. The advantage of Uploaded.net is that you can share the username and password in plain text and if anyone grab it and try to access the files it won't be possible to modify or delete without confirming by email. Developed using the following Technologies WinRAR, Q Compiler, UPX, Simple Batch Example Download: [Hidden Content] Virustotal: [Hidden Content]
-
- 11
-
- stealth
- screenshot
-
(and 7 more)
Tagged with: