> Cyber Security Strategy - From Idea to Mobile App RealityVinova Our team will brainstorm with you on where to begin, where to go, and how to get you there. Whether you have a spark of an idea or an existing app – we can help. Getting your mobile strategy right is what our unique services are all about. We’ll wrestle with business challenges, discover new opportunities that will help you define and refine your product ideas into mobile app reality.

How an automated pentesting stick can address multiple security needs – TechRepublic

How an automated pentesting stick can address multiple security needs – TechRepublic
Image: iStock/M-A-U

Penetration testers and threat actors (hackers) share a lot in common when it comes to the methods and tools used to test a network’s defenses, identify vulnerabilities, and compromise systems. The similarities far outweigh the differences except in authorized access.

SEE:  (TechRepublic)

Note: The aim of this article isn’t to provide anyone with the green light to run security tools on any network that isn’t owned by the user. This goes for networks you might be allowed to work on in a certain capacity, but please understand that most networks will not look too favorably on their own IT staff performing pentesting tasks on them. So, unless you have explicit permission to do so: DON’T! Set up a lab of your own and test there instead.

It’s also not the aim of this article to walk you through the step-by-step process of hacking a network. Rather, it is to illustrate some of the uses for automated pentesting tools and how they may even be used for specific types of attacks to raise awareness of these unauthorized devices. They may even be sitting in your network closet or plugged in to the back of a desktop computer as you read this.

SEE:  (TechRepublic) 

Before we begin, some of the hardware tools you may need to set up one or all of these are listed below:

RasPwn OS on Raspberry Pi

This Linux distribution is a more defensive tool (or quite the opposite, depending on your perspective). What I mean is, this open-source OS image, when installed on a Raspberry Pi 2/3b, for example, emulates a vulnerable Linux server with vulnerabilities to exploit. The concept behind this vulnerable OS is for users to test their security skills, effectively learning how to exploit these systems and how to best protect them.

The installation process for RasPwn is straightforward for anyone with experience installing images on SD cards for use with Raspberry Pi. Depending on the OS installed on the computer you will be installing the image from, there are several different methods to copy the image over. Using the dd utility on Linux/macOS or Win32DiskImager can accomplish this task. Once the microSD is booted from the Raspberry Pi, RasPwn will boot and resize the image, and then the system will be ready for attack.

Rubber Ducky on USB flash drive

The USB Rubber Ducky is described by its vendor Hak5 as “a keystroke injection tool,” which comes in the form of a standard issue USB flash drive. Beneath its conventional exterior lies a small, yet powerful tool that effectively convinces computers that it is a keyboard and allows any number of commands, or “Ducky scripts,” to execute on the host device.

While it is possible to create your own Rubber Ducky using a development board, the complexity has been removed using Hak5’s own-built device available on its website, along with a number of tutorials and demonstrations of various attack types. Want to test keylogging capability? Check. Perform exfiltration of credential hashes? Yup. Create reverse shells? That and so much more can be done in mere seconds.

From an attacker’s standpoint, the capabilities are nearly endless whether the commands are being executed within the limited character space of the loader itself or leveraging the host’s own internet connectivity to phone home to a cloud-hosted server or shared drive space to retrieve more complex scripts from a command and control (C2) server. Depending on your skill set and what types of information you’re looking to test, your imagination is the limit.

Kali Linux on Raspberry Pi

Anyone who has more than dabbled in computer security should be well aware of Kali and all the glorious tools offered by the infosec-focused distro. In a nutshell, just about any open-source security tool in use today can be found in the latest Kali Linux image. Offsec Services, the maintainers of the Kali distro, make it available for a variety of hardware/device types, including Raspberry Pi, which makes perfect sense when looking to deploy a customized tool that is powerful, yet stealthy.

The process of getting the image onto the microSD card is similar to other Pi-based projects and referenced above in the RasPwn section. Once the image is written to SD card, the card is then loaded into the Pi device and booted to complete the installation and setup. It’s that simple! However, if you’re looking to pre-configure your Kali environment, like further customizing tools, installing or removing specific toolsets, or if you just like to tinker with the repositories, using the rpi.sh script allows users to modify it accordingly and build their own customized version of Kali.

By including the necessary tools and customizing them during installation, the resulting pre-configured environment ensures that your tools contain exactly what will be needed when deploying your security testing tools to the testing environment. And since Kali is a full-fledged OS in its own right, it is fully upgradable and manageable from remote connections, reverse shells, and over ad-hoc wireless connections for maximum flexibility. 

Cybersecurity Insider Newsletter

Strengthen your organization’s IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices.
Delivered Tuesdays and Thursdays

This content was originally published here.

Malcare WordPress Security

ruby on rails developer singapore,web designer singapore,app development singapore,website design singapore,app developer singapore,android developer singapore,website development singapore,web development singapore,singapore web design,website designer singapore,mobile application developer singapore,singapore mobile application developer,web design company singapore,mobile apps development singapore,mobile app developer singapore,singapore mobile app developer,singapore web development,design agency singapore,web design services singapore,web development company singapore,mobile apps singapore,developer in singapore,mobile game developer singapore,singapore website design,graphic designer in singapore,mobile app development singapore,ios developer singapore,developers in singapore,web design singapore,singapore web design services,design firms in singapore,mobile application development singapore,website developer singapore,singapore app developer,web application singapore,ios app development singapore,mobile developer singapore