Sunday, August 30, 2020

Voodoo-Kali - Kali Linux Desktop On Windows 10

Iemhacker-kali-windows

How it works?
 * Kali Linux with XFCE Desktop Environment in Windows Subsystem for Linux (WSL)
 * VcXsrv X Server for Windows is doing the hard GUI lifting
 * XFCE is started natively in WSL and displayed by VcXsrv

Install Voodoo-Kali:
 1, Enable WSL and install Kali Linux from the Microsoft Store. Read Install Kali Linux desktop on Windows 10 from Microsoft Store

 2, To start Kali Linux in Windows 10, open Command Prompt and enter the command: kali

 3, Enter this commands:
      apt install wget -y 
      wget https://raw.githubusercontent.com/Re4son/WSL-Kali-X/master/install-WSL-Kali-X
      bash ./install-WSL-Kali-X

 4, Download and install VcXsrv Windows X Server from SourceForge

 5, Start VcXsrv, accept change in firewall rules, exit VcXsrv

Run Voodoo-Kali:
   Start kali in Windows as normal user (that's default), and launch Voodoo-Kali:
    * as normal user: ./start-xfce
    * as root: sudo /root/xtart-xfce

Run Kali Desktop in an RDP session:
   In Kali Linux WSL, type: sudo /etc/init.d/xrdp start
   In Windows 10, open Run and enter mstsc.exe and connect to "127.0.0.1:3390"
remote%2Bdesktop

Status: Voodoo-Kali is in its infancy and it is far from being elegant. I'm working on it though and step by step I'll push out improvements. Below a snippet of the To-Do list:
 * Clean up and comment the scripts
 * Make for a cleaner exit
 * Better error handling and dependency checking (get rid of sleep, etc.)
 * Improve stability of Java programs
 * Improve the looks??
 * …

   Any help is truly appreciated, in any shape or form – from tips to pull requests.
   Why don't you join the forums to discuss?

Further Information:
 * Offsec – Kali Linux in the Windows App Store
 * MSDN – Windows Subsystem for Linux Overview

                                       Download Voodoo-Kali
Read more
  1. Best Hacking Tools 2019
  2. Pentest Tools Tcp Port Scanner
  3. Hack Tools
  4. Black Hat Hacker Tools
  5. Pentest Tools For Mac
  6. Hacker Tools Free Download
  7. Black Hat Hacker Tools
  8. How To Install Pentest Tools In Ubuntu
  9. Hacking App
  10. Hacking Tools For Beginners
  11. Best Hacking Tools 2019
  12. Hack Tools Pc
  13. Hacker Tool Kit
  14. Hacking Tools Download
  15. Hacking Tools For Games
  16. Ethical Hacker Tools
  17. Hackers Toolbox
  18. Pentest Tools For Mac
  19. Hacker Tools Apk Download
  20. Nsa Hacker Tools
  21. Hack App
  22. Pentest Tools Alternative
  23. Tools 4 Hack
  24. Pentest Tools For Ubuntu
  25. Hack And Tools
  26. Hacking Tools Kit
  27. World No 1 Hacker Software
  28. Hacker Tools Windows
  29. New Hack Tools
  30. Pentest Tools Linux
  31. Hacking Tools For Pc
  32. Pentest Automation Tools
  33. Physical Pentest Tools
  34. Pentest Tools Review
  35. World No 1 Hacker Software
  36. Pentest Tools Free
  37. Kik Hack Tools
  38. Hacker Tools For Mac
  39. Hacker Tools
  40. Bluetooth Hacking Tools Kali
  41. Hacking Tools Hardware
  42. Hacking App
  43. Tools 4 Hack
  44. Hacker Tools For Pc
  45. Pentest Tools Online
  46. Pentest Tools Url Fuzzer
  47. Hacking Tools For Windows
  48. Pentest Tools Linux
  49. Pentest Tools Review
  50. Hacker Tools Windows
  51. Kik Hack Tools
  52. Hacker Tools Linux
  53. Nsa Hacker Tools
  54. Github Hacking Tools
  55. Hacking Tools 2020
  56. Hack Tools Github
  57. Pentest Tools Subdomain
  58. Pentest Tools Linux
  59. Underground Hacker Sites
  60. Hacking Tools Windows 10
  61. Hacking Tools Pc
  62. Tools Used For Hacking
  63. Hacker Techniques Tools And Incident Handling
  64. Hack Tools
  65. Pentest Tools
  66. Android Hack Tools Github
  67. Blackhat Hacker Tools
  68. Hacking Tools Software
  69. New Hack Tools
  70. Pentest Tools Download
  71. Hack Tools Download
  72. Hacker Tools Windows
  73. Pentest Tools
  74. Pentest Automation Tools
  75. Hack Tools For Ubuntu
  76. Pentest Box Tools Download
  77. Hacker Hardware Tools
  78. Hacker Hardware Tools
  79. Pentest Tools Github
  80. Pentest Automation Tools
  81. Hack Tools For Ubuntu
  82. Hacking App
  83. Hacking Tools Kit
  84. Hacking Tools Github
  85. Pentest Tools Github
  86. Kik Hack Tools
  87. Hacker Search Tools
  88. Hacker Techniques Tools And Incident Handling
  89. New Hack Tools
  90. Hack Tools Download
  91. Pentest Tools Windows
  92. Pentest Recon Tools
  93. Best Hacking Tools 2020
  94. New Hacker Tools
  95. Hacker Tools For Ios
  96. Hacker
  97. Hacking Apps
  98. Hack Tools For Games
  99. Beginner Hacker Tools
  100. Pentest Tools Url Fuzzer
  101. Pentest Box Tools Download
  102. Hak5 Tools
  103. Hacking Tools Windows 10
  104. Kik Hack Tools
  105. Hacker Tools For Pc
  106. Beginner Hacker Tools
  107. Hacker Tools Apk Download
  108. Hacker Tools
  109. Hacker Techniques Tools And Incident Handling
  110. Hacking Tools Github
  111. Hacker Tools For Pc
  112. Pentest Tools Framework
  113. Pentest Tools Port Scanner
  114. Hack Tools Mac
  115. Pentest Tools Android
  116. Hacking Tools And Software
  117. Hacker Tools List
  118. Hack Tool Apk
  119. Pentest Tools Subdomain
  120. Hacker
  121. Hacking Tools For Games
  122. Beginner Hacker Tools
  123. Hacker Tools Windows
  124. Pentest Tools
  125. Pentest Tools Tcp Port Scanner
  126. Pentest Tools Open Source
  127. How To Make Hacking Tools
  128. Pentest Tools Kali Linux
  129. Pentest Tools Website
  130. Easy Hack Tools
  131. Hacker Tools Free
  132. Pentest Tools Subdomain
  133. Pentest Tools Bluekeep
  134. Hacking Tools 2019
  135. Pentest Tools Nmap
  136. Pentest Tools Online
  137. Underground Hacker Sites
  138. Hacker Tools Online
  139. Hack Tools 2019
  140. Hacking Tools Software
  141. Pentest Reporting Tools
  142. Hacks And Tools
  143. Hacker
  144. Pentest Tools Port Scanner
  145. Hacker Tools For Windows
  146. Hacking App
  147. Hacking Tools For Windows 7
  148. Hacker Tools Windows
  149. Pentest Reporting Tools
  150. Physical Pentest Tools
  151. Hacker Tools 2020
  152. Hacking Tools Pc
  153. How To Make Hacking Tools
  154. Wifi Hacker Tools For Windows
  155. Tools 4 Hack
  156. Hack Apps
  157. Ethical Hacker Tools
  158. Hacker Techniques Tools And Incident Handling
  159. Usb Pentest Tools
  160. Hacking Tools 2020
  161. Pentest Tools Nmap
  162. Hacking Tools Free Download
  163. What Are Hacking Tools
  164. Hacker Tools Github
  165. Underground Hacker Sites
  166. Hacking Tools Usb
  167. Hacker Search Tools
  168. Hack Tools Download
  169. Hacking Tools For Beginners
  170. Pentest Tools Website

Rastrea2R - Collecting & Hunting For IOCs With Gusto And Style



Ever wanted to turn your AV console into an Incident Response & Threat Hunting machine? Rastrea2r (pronounced "rastreador" - hunter- in Spanish) is a multi-platform open source tool that allows incident responders and SOC analysts to triage suspect systems and hunt for Indicators of Compromise (IOCs) across thousands of endpoints in minutes. To parse and collect artifacts of interest from remote systems (including memory dumps), rastrea2r can execute sysinternal, system commands and other 3rd party tools across multiples endpoints, saving the output to a centralized share for automated or manual analysis. By using a client/server RESTful API, rastrea2r can also hunt for IOCs on disk and memory across multiple systems using YARA rules. As a command line tool, rastrea2r can be easily integrated within McAfee ePO, as well as other AV consoles and orchestration tools, allowing incident responders and SOC analysts to collect forensic evidence and hunt for IOCs without the need for an additional agent, with 'gusto' and style!


Dependencies
  • Python 2.7.x
  • git
  • bottle
  • requests
  • yara-python

Quickstart
  • Clone the project to your local directory (or download the zip file of the project)
$git clone https://github.com/rastrea2r/rastrea2r.git
$cd rastrea2r
  • All the dependencies necessary for the tool to run can be installed within a virtual environment via the provided makefile.
$make help
help - display this makefile's help information
venv - create a virtual environment for development
clean - clean all files using .gitignore rules
scrub - clean all files, even untracked files
test - run tests
test-verbose - run tests [verbosely]
check-coverage - perform test coverage checks
check-style - perform pep8 check
fix-style - perform check with autopep8 fixes
docs - generate project documentation
check-docs - quick check docs consistency
serve-docs - serve project html documentation
dist - create a wheel distribution package
dist-test - test a wheel distribution package
dist-upload - upload a wheel distribution package
  • Create a virtual environment with all dependencies
$make venv
//Upon successful creation of the virtualenvironment, enter the virtualenvironment as instructed, for ex:
$source /Users/ssbhat/.venvs/rastrea2r/bin/activate
  • Start the rastrea2r server by going to $PROJECT_HOME/src/rastrea2r/server folder
$cd src/rastrea2r/server/
$python rastrea2r_server_v0.3.py
Bottle v0.12.13 server starting up (using WSGIRefServer())...
Listening on http://0.0.0.0:8080/
  • Now execute the client program, depending on which platform you are trying to scan choose the target python script appropriately. Currently Windows, Linux and Mac platforms are supported.
$python rastrea2r_osx_v0.3.py -h
usage: rastrea2r_osx_v0.3.py [-h] [-v] {yara-disk,yara-mem,triage} ...

Rastrea2r RESTful remote Yara/Triage tool for Incident Responders

positional arguments: {yara-disk,yara-mem,triage}

modes of operation
yara-disk Yara scan for file/directory objects on disk
yara-mem Yara scan for running processes in memory
triage Collect triage information from endpoint

optional arguments:
-h, --help show this help message and exit
-v, --version show program's version number and exit


Further more, the available options under each command can be viewed by executing the help option. i,e

$python rastrea2r_osx_v0.3.py yara-disk -h
usage: rastrea2r_osx_v0.3.py yara-disk [-h] [-s] path server rule

positional arguments:
path File or directory path to scan
server rastrea2r REST server
rule Yara rule on REST server

optional arguments:
-h, --help show this help message and exit
-s, --silent Suppresses standard output
  • For ex, on a Mac or Unix system you would do:
$cd src/rastrea2r/osx/

$python rastrea2r_osx_v0.3.py yara-disk /opt http://127.0.0.1:8080/ test.yar

Executing rastrea2r on Windows

Currently Supported functionality
  • yara-disk: Yara scan for file/directory objects on disk
  • yara-mem: Yara scan for running processes in memory
  • memdump: Acquires a memory dump from the endpoint ** Windows only
  • triage: Collects triage information from the endpoint ** Windows only

Notes
For memdump and triage modules, SMB shares must be set up in this specific way:
  • Binaries (sysinternals, batch files and others) must be located in a shared folder called TOOLS (read only)
    \path-to-share-foldertools
  • Output is sent to a shared folder called DATA (write only)
    \path-to-share-folderdata
  • For yara-mem and yara-disk scans, the yara rules must be in the same directory where the server is executed from.
  • The RESTful API server stores data received in a file called results.txt in the same directory.

Contributing to rastrea2r project
The Developer Documentation provides complete information on how to contribute to rastrea2r project

Demo videos on Youtube

Presentations

Credits & References



Related word


  1. Free Pentest Tools For Windows
  2. Hacker Tools Apk Download
  3. Pentest Tools Website Vulnerability
  4. Pentest Tools Windows
  5. Hacker
  6. Hack Tools For Pc
  7. Best Hacking Tools 2019
  8. Free Pentest Tools For Windows
  9. Pentest Tools Subdomain
  10. Blackhat Hacker Tools
  11. Pentest Automation Tools
  12. Hacker Tools 2019
  13. Free Pentest Tools For Windows
  14. Hack Tools For Pc
  15. Hacking Tools Hardware
  16. Hacker Tools Apk
  17. Hacking Tools 2020
  18. Tools For Hacker
  19. Hacking Tools Name
  20. Hack Tools For Pc
  21. Hacking Tools 2020
  22. Hacking Tools Github
  23. Hacker Tools Hardware
  24. Usb Pentest Tools
  25. Hacking Tools Kit
  26. Top Pentest Tools
  27. Hack Tools Mac
  28. Hacks And Tools
  29. Pentest Tools Download
  30. Hacking Tools Name
  31. Hacker Tools
  32. Black Hat Hacker Tools
  33. Tools For Hacker
  34. Pentest Tools Framework
  35. Hacker Tools List
  36. Hack App
  37. Free Pentest Tools For Windows
  38. Hacker Tool Kit
  39. Hack Tools Github
  40. Hacker Tools Free Download
  41. Hacker Tools 2019
  42. World No 1 Hacker Software
  43. Hacker Tools For Windows
  44. Beginner Hacker Tools
  45. Hacker Tools Github
  46. Hacking Tools Software
  47. Pentest Tools Framework
  48. Pentest Reporting Tools
  49. Pentest Tools Website Vulnerability
  50. Hacker Hardware Tools
  51. Hackers Toolbox
  52. Growth Hacker Tools
  53. Hack Tools Github
  54. Pentest Tools Linux
  55. Hacker
  56. Hacking Tools Usb
  57. Underground Hacker Sites
  58. Game Hacking
  59. Hacker Tools Free Download
  60. Hacking Tools Windows
  61. Hack Tool Apk No Root
  62. Hacking Tools For Mac

Saturday, August 29, 2020

OWASP May Connector 2019

OWASP
Connector
May 2019

COMMUNICATIONS


Letter from the Vice Chairman:

Dear OWASP Community,

Since last month the foundation has been busy working towards enabling our project leaders and community members to utilize funds to work on nurturing and developing projects. So far there has been huge uptake on this initiative. It's great to see so many people passionate about collaborating at project summits. 
 
Our Global AppSec Tel-Aviv is nearly upon us, for members, there is an extra incentive for attending this conference, in the form of a significant discount. This and the sandy beaches and beautiful scenery, not to mention the great speakers and trainers we have lined up, is a great reason to attend. If you have not done so we would encourage you to attend this great conference - https://telaviv.appsecglobal.org.
 
One of the key things I've noticed in my Board of Director tenure is the passion our community emits, sometimes this passion aids in growing the foundation, but sometimes it also forces us to take a step back and look at how we do things within the foundation. With Mike, our ED and staff we have seen a lot of good change from an operations perspective, with more in the pipeline. Mike's appointment has allowed the Board of Directors to take a step back from operations and enable us to work on more strategic goals. To this end at a recent Board meeting we discussed each Board member taking up one of the following strategic goals, as set out at the start of the year:
 
1.Marketing the OWASP brand 
2.Membership benefits
3.Developer outreach

  • Improve benefits 
  • Decrease the possibility of OWASP losing relevance
  • Reaching out to management and Risk levels
  • Increase involvement in new tech/ ways of doing things – dev ops
 
4.Project focus 
  • Get Universities involved
  • Practicum sponsored ideas
  • Internships 

 
5.Improve finances
6.Improve OWAP/ Board of Directors Perception
7.Process improvement
8. Get consistent ED
9.Community empowerment
 
I would encourage the community to come forward if you have any ideas on the above and are happy to work with one of the 7 Board of Directors and community members on one of these initiatives. 
 
Thanks and best wishes, 
Owen Pendlebury
Vice Chair

OWASP FOUNDATION UPDATE FROM INTERIM EXECUTIVE DIRECTOR:

OWASP Foundation welcomes aboard Emily Berman as Events Director. Emily was most recently with the Scrum Alliance where she planned high-profile functions for upwards of 2,000 guests. Emily brings a fresh approach to events planning and her 12 years of experience planning and organizing large-scale events worldwide well in advance will greatly benefit our Global AppSecs.
Did you Register yet? 
Global AppSec DC September 9-13, 2019
submit to the Call for Papers and Call for Training
Check out Sponsorship Opportunities while they are still available.
Save the Date for Global AppSec Amsterdam Sept 23-27, 2019 
Sponsorship Opportunities are available

EVENTS 

You may also be interested in one of our other affiliated events:

REGIONAL AND LOCAL EVENTS

Event DateLocation
Latam Tour 2019 Starting April 4, 2019 Latin America
OWASP Portland Training Day September 25, 2019 Portland, OR
OWASP Italy Day Udine 2019 September 27,2019 Udine, Italy
OWASP Portland Day October 16,2019 Wroclaw, Poland
LASCON X October 24-25,2019 Austin, TX
OWASP AppSec Day 2019 Oct 30 - Nov 1, 2019 Melbourne, Australia

PARTNER AND PROMOTIONAL EVENTS
Event Date Location
Open Security Summit June 3-7,2019 Woburn Forest Center Parcs, Bedfordshire
Hack in Paris 2019 June 16-20, 2019 Paris
Cyber Security and Cloud Expo Europe June 19-20, 2019 Amsterdam
IoT Tech Expo Europe June 19-20, 2019 Amsterdam
BlackHat USA 2019 August 3-8,2019 Las Vegas, Nevada
DefCon 27 August 8-11,2019 Las Vegas, Nevada
it-sa-IT Security Expo and Congress October 8-10, 2019 Germany

PROJECTS

We have had the following projects added to the OWASP inventory.  Please congratulate these leaders and check out the work they have done:

Project Type Leader(s)
Risk Assessment Framework Documentation Ade Yoseman Putra, Rejah Rehim
QRLJacker Tool Mohammed Baset
Container Security Verification Standard Documentation Sven Vetsch
Find Security Bugs Code Philippe Arteau
Vulnerable Web Application Code Fatih Çelik
D4N155 Tool Julio Pedro de Lira Neto
Jupiter Tool Matt Stanchek
Top 10 Card Game Documentation Dennis Johnson
Samurai WTF Code Kevin Johnson
DevSecOps Maturity Model Documentation Timo Pagel

 


Also, we will have the following projects presenting at the Project Showcase Global AppSec Tel Aviv:

Final Schedule
Wednesday, May 29th Thursday, May 30th
Time Project Presenter(s) Confirmed Time Project Presenter(s) Confirmed
10:​4​5 a.m. Glue Tool Omer Levi Hevroni Yes 10:​30 ​ a.m. API Security Erez Yalon, Inon Shkedy Yes
  ​7    
               
11:5​5​ a.m. IoT & Embedded AppSec Aaron Guzman Yes 11:​50​ a.m. Mod Security Core Rule Set Tin Zaw Yes
        12:​25 ​p.m. Automated Threats Tin Zaw Yes
12:​30 ​p.m. Lunch Break   12:​55​ p.m. Lunch Break  
2:​35​ p.m. SAMM John DiLeo Yes        
​3:10​ p.m. Application Security Curriculum John DiLeo Yes ​3:10 p.m. ​Damned Vulnerable Serveless Application​ ​Tal Melamed​ ​Yes​
 

Finally, if you are able to help participate in the Project Reviews at the Conference, please send me an email at harold.blankenship@owasp.com.  We have a large line-up of projects to review this time around:

Project To Level Leader(s)
Snakes and Ladders Flagship Katy Anton, Colin Watson
Cheat Sheet Series Flagship Dominique Righetto, Jim Manico
Mobile Security Testing Guide Flagship Jeroen Willemsen, Sven Schleier
Amass Lab Jeff Foley
Attack Surface Detector Lab Ken Prole
SecureTea Lab Ade Yoseman Putra, Bambang Rahmadi K.P, Rejah Rehim.A.A
Serverless Goat Lab Ory Segal

Google Summer of Code Update:
We were allocated 13 students this year!  The current timeline is as follows:
Google Season of Docs:
We were accepted into the Google Season of Docs.  There will be a single technical writer resource.  The current timeline is as follows:

COMMUNITY

New OWASP Chapters
Riyadh, Saudi Arabia
Guayaquil, Equador
Lome, Togo
Natal, Brazil
Nashua, New Hampshire
Gwalior, India
Louisville, Kentucky
Nainital, India
Liverpool, United Kingdom
Syracuse, New York

MEMBERSHIP

 
We would like to welcome the following Premier and Contributor Corporate Members.

Premier Corporate Members

Contributor Corporate Members
Join us
Donate
Our mailing address is:
OWASP Foundation 
1200-C Agora Drive, # 232
Bel Air, MD 21014  
Contact Us
Unsubscribe






This email was sent to *|EMAIL|*
why did I get this?    unsubscribe from this list    update subscription preferences
*|LIST:ADDRESSLINE|*