Context Some time ago we published an important update to Syphoon, featuring the new dynamic socket injection system. In short, this allows using Ruby code to generate content on the fly for context-dependent injections. Taking things further To demonstrate the power of dynamic injections, we thought we'd publish a new release of Syphoon, this time including some new scripts. Specifically, two new scripts are provided to attack the Windows Update system (WSUS) when configured to use HTTP. wsus-inject-cmd This first script simply allows running commands (through cmd.exe) as 'NT AUTHORITY/SYSTEM' on any client machine requesting WSUS through HTTP. This is...
The best socket injection system just got better Socket injection is big fun for sure. Easily drop XSS-based attacks on victim browsers with a simple regex, inject payloads within SMTP/POP emails, or simply embed raccoon pictures in every web page. However, static strings can only take us so far. There comes a point when we start thinking it would be nice for the string to be a bit more flexible, maybe even dependent on specific conditions for each injection. This is taking us into the realm of dynamic injection. Introducing dynamic injection Instead of simply asking Syphoon to insert some...
How secure are your networks? Artio shines a new light on your network to reveal things no other solution can see. Built on our experience with network intrusion, this next-level detection system can identify threats previously kept under the radar. Detect NAC bypass, ghosting, MAC cloning, poisoning and more Artio is the first commercially-available solution to detect Ethernet ghosting / NAC bypass. Artio also detects network scans, partial ghosting / MAC theft, poisoning / MITM (Man-In-The-Middle) and more. Simple integration Artio is packaged as a standard 19" rack-mount unit (1U), with a short depth of only 230mm (including power connector). Detection...
Weapons-grade MitM Syphoon is a MitM (Man-in-the-Middle) tool - it abuses the network to redirect communications from other hosts through itself. This allows sniffing as well as manipulation of communications between hosts on the network. Beat the network into submission When thinking about MitM, the first thing that comes to mind is often sniffing passwords out of clear-text exchanges. This is a gross oversimplification of what Syphoon is capable of. MitM is only the beginning - Syphoon offers a wide range of tools to extract information, manipulate exchanges, strip SSL, redirect network flows and more. Written exclusively in C and optimized...
- 3D print
- Swiss day