Malcom is a Malware Communication Analyzer designed to analyze a system’s network communication using graphical representations of network traffic, and cross-reference them with known malware sources.
This comes handy when analyzing how certain malware species try to communicate with the outside world.
Malcom Malware Communication Analyzer Features
Malcom can help you:
- Detect central command and control (C&C) servers
- Understand peer-to-peer networks
- Observe DNS fast-flux infrastructures
- Quickly determine if a network artifact is ‘known-bad’
The aim of Malcom is to make malware analysis and intel gathering faster by providing a human-readable version of network traffic originating from a given host or network. Convert network traffic information to actionable intelligence faster.
Installing Malcom Malware Communication Analyzer
Malcom is written in Python. Provided you have the necessary libraries, you should be able to run it on any platform. It’s recommended to use Python virtual environments (
virtualenv) so as not to mess up your system libraries.
redis, and other dependencies:
sudo apt-get install build-essential git python-dev libevent-dev mongodb libxml2-dev libxslt-dev zlib1g-dev redis-server libffi-dev libssl-dev python-virtualenv
Environment for Malware Communication Analyzer
If you’re used to doing malware analysis, you probably already have tons of virtual machines running on a host OS. Just install Malcom on a new VM, and route your other VM’s connections through Malcom. Use
enable_routing.sh to activate routing / NATing on the VM Malcom is running on. You’ll need to add an extra network card to the guest OS.
As long as it’s getting layer-3 network data, Malcom can be deployed anywhere. Although it’s not recommended to use it on high-availability networks (it wasn’t designed to be fast), you can have it running at the end of your switch’s mirror port or on your gateway.
You can download Malcom here:
Or read more here.
WepAttack is a WLAN open source Linux WEP key hacking tool for breaking 802.11 WEP keys using a wordlist based dictionary attack.
This tool is based on an active dictionary attack that tests millions of words to find the right key. Only one packet is required to start an attack.
What is a WEP Key?
Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11 wireless networks. Introduced as part of the original 802.11 standard ratified in 1997, its intention was to provide data confidentiality comparable to that of a traditional wired network. WEP, recognizable by its key of 10 or 26 hexadecimal digits (40 or 104 bits), was at one time widely in use and was often the first security choice presented to users by router configuration tools.
It’s kinda old now, but you still find it used in situations where the equipment isn’t updated very often (old control systems, CCTV, old point of sale systems etc).
Using WepAttack WEP Key Hacking Tool
WepAttack needs a dumpfile for attacking networks. If the network data is captured by Kismet a dumpfile is generated automatically. This file is in format “Kismet-[date]-[no].dump“ and can be passed to WepAttack.
wepattack -f dumpfile [-m mode] [-w wordlist] [-n network]
-f dumpfile network dumpfile to read from
-m mode run WepAttack in different modes. If this option is empty, all modes are executed sequentially (default)
64 WEP 64, ASCII mapping
128 WEP128, ASCII mapping
n64 WEP64, KEYGEN function
n128 WEP128, KEYGEN function
-w wordlist wordlist to use, without any wordlist stdin is used
-n network network number, can be passed to attack only one network. Default is attacking all available networks (recommended)
Example on how to use WEP Hacking Tool
wepattack –f Kismet-Oct-21-2002-3.dump –w wordlist.txt
You can download WepAttack here:
Or read more here.
Eraser is a hard drive wiper for Windows which allows you to run a secure erase and completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.
Eraser is a Windows focused hard drive wiper and is currently supported under Windows XP (with Service Pack 3), Windows Server 2003 (with Service Pack 2), Windows Vista, Windows Server 2008, Windows 7,8 ,10 and Windows Server 2012.
Secure drive erasure methods are supported out of the box. Erases files, folders and their previously deleted counterparts. Works with an extremely customizable scheduler.
Why a Secure Erase Hard Drive Wiper is important?
A lot of people underestimate the importance of this, especially if you are throwing out an old hard disk or selling something on that contains a hard disk (an old laptop or desktop).
Your first thought may be that when you ‘delete’ the file, the data is gone. But that is not true, when you delete a file, the operating system does not really remove the file from the disk; it only removes the reference of the file from the file system table.
The file remains on the disk until another file is created over it, and even after that, it might be possible to recover data by studying the magnetic fields on the disk platter surface.
Before the file is overwritten, anyone can easily retrieve it with a disk maintenance or an undelete utility.
That is why it’s critical to erase your disks properly before finding them a new home (be that a bin, recycling plant or selling them on).
Depending on the value of the date, select one of the below secure wipe algorithms.
Secure Erase Hard Drive Wiper Methods
Pseudorandom data, 1 Pass, The fastest wiping scheme. Your data is overwritten with random data (if you use a CSPRNG the data is indistinguishable from random noise.)
British HMG IS5 (Baseline), 1 Pass, Your data is overwritten with zeroes.
Russian GOST P50739-95, 2 Passes, GOST P50739-95 wiping scheme calls for a single pass of zeroes followed by a single pass of random data
British HMG IS5 (Enhanced), 3 Passes, British HMG IS5 (Enhanced) is a three pass overwriting algorithm: first pass – with zeroes, second pass – with ones and the last pass with random data.
US Army AR380-19, 3 Passes, AR380-19 is data wiping scheme specified and published by the U.S. Army. AR380-19 is three pass overwriting algorithm: first pass – with random data, second with a random byte and the third pass with the complement of the 2nd pass
US Department of Defense DoD 5220.22-M (E), 3 Passes, DoD 5220.22-M (E) is a three pass overwriting algorithm: first pass – with zeroes, second pass – with ones and the last pass – with random data
US Air Force 5020, 3 Passes, US Air Force 5020 is a three pass overwriting algorithm with the first pass being that of a random byte, followed by two passes of complement data (shifted 8 and 16 bits right respectively)
US Department of Defense DoD 5220.22-M(ECE), 7 Passes, DoD 5220.22-M(ECE) is seven pass overwriting algorithm: first, fourth and fifth pass with a random byte, its 8 right-bit shift complement and 16 right-bit shift complement; second and sixth passes with zeroes, and third and seventh pass with random data
Canadian RCMP TSSIT OPS-II, 7 Passes, RCMP TSSIT OPS-II is a seven pass overwriting algorithm with three alternating patterns of zeroes and ones and the last pass – with a random byte
German VSITR, 7 Passes, The German standard calls for data to be overwritten with three alternating patterns of zeroes and ones and in the last pass with random data
Schneier’s Algorithm, 7 Passes, The Bruce Schneier algorithm has seven passes: first pass – with ones, the second pass – with zeroes and then five times with random data
You can download Eraser here:
Or read more here.
Netsparker just published some anonymized Web Security Stats about the security vulnerabilities their online solution identified on their users’ web applications and web services during the last 3 years.
Data-based stats like these, which are not based on surveys, can be pretty useful – at least to get a broad overview of what is going on. These statistics also serve a solid purpose – they help all developers, security professionals and anyone who works with web applications better understand what might be going wrong.
XSS is way more common than SQL Injection
SQL Injection has been the most critical web application vulnerability in the last decade according to the OWASP Top 10 list of most critical web application security flaws (yeah come-on guys, we are still waiting for the new version!). Though the Netsparker statistics show us that it is the other way round, at least in terms of volume.
26% of the identified vulnerabilities, 40,908 to be exact, were a mix of reflected and DOM Cross-site scripting (XSS) vulnerabilities. Only 2% of the identified vulnerabilities were SQL Injections.
That is a big discrepancy, though this is not a surprise according to the authors. They said:
Developers have a lot of resources to write code that is not vulnerable to SQL Injections, such as prepared statements. New frameworks by default protects against SQL Injection and makes it quite hard to write insecure SQL code. On the other hand XSS vulnerabilities are much more complex to address and even when the framework has built-in protection, it’s very easy to make mistakes
Outdated & vulnerable software is still a major web application security risk
Update your apps, your server, your software – Apple, Google, Microsoft are constantly harping on this topic but it doesn’t seem to help that much.
It’s one of the easiest best practices to follow, especially in modern times with automated updates and patch management software easily available.
It seems not to be the case that people are following it with 5% of the identified issues related to outdated software.
If Equifax and Mossack Fonseca had their software up to date, last year we wouldn’t have had two of the biggest data breaches on the internet.
Accuracy is key to more secure web applications
There are several other statistics from which we can learn something from, an interesting one for me was the fact that Netsparker automatically verified around 80% of the identified vulnerabilities.
False positives are a big problem in automated vulnerability and security scanning as someone has to manually spend hours verifying the results and weeding out the false positives. With Netsparker automatically doing this, a smaller team can do more effective work and a larger team can be more productive doing less manual verification.
Read The Netsparker Scan Web Security Stats Report
The report is much more detailed and has much more statistics, so please read the Netsparker scan statistics report for all the numbers and common security issues that make web applications vulnerable to malicious hacker attacks and can save you from some embarrassment.
CTFR is a Python-based tool to Abuse Certificate Transparency Logs to get subdomains from a HTTPS website in a few seconds. You missed AXFR technique didn’t you? (Open DNS zone transfers), so how does it work? CTFR does not use dictionary attack or brute-force attacks, it just helps you to abuse Certificate Transparency Logs. What […]
testssl.sh is a free command line tool to test SSL security, it checks a server’s service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws and more. testssl.sh is pretty much portable/compatible. It is working on every Linux, Mac OS X, FreeBSD distribution, on MSYS2/Cygwin (slow). It is […]