Subscribe: Entries feed

Last update: 25 September 2022

ALPHA THREAT BLOGS

An exemplary learning community

Malware Techniques: Windows Command Obfuscation

Obfuscation can be simply understood as the art of hiding code in plainsight, in order to defeat the signature based defence mechanisms in place. Obfuscation has always been in fashion among malware authors. These obfuscation techniques can be frequently observed while researching advanced threats and malware samples. This blog posts will highlight...

DNSCRYPT: ENCRYPTING YOUR DAILY DNS TRAFFIC

DNSCrypt aids in encrypting the normal DNS traffic so that it can't be snooped DNSCRYPT DNSCrypt focuses on securing communications between a client and its first-level resolver. It does this by encrypting traffic, making it harder to snoop in a local network. This prevents variety of attacks like Man in the Middle. The DNSCrypt daemon acts as a...

DEFEATING CAPTCHAS: OPTICAL CHARACTER RECOGNITION

This blog post discuss the art of Optical Character Recognition and using it to read the Captchas. OPTICAL CHARACTER RECOGNITION (OCR) Simply stating Optical Character Recognition (OCR) is the art of extracting text from images or any form of document. OCR can extract text from a scanned document or an image of a document. CAPTCHA CAPTCHA stands...

HTTP BACKDOOR USING WEBIFY

This article discusses about using GoLang tool webify to establish a simple HTTP backdoor that listens on a port  and executes remote commands sent over. There are lots of tools and techniques out there, but it is always helpful to know your alternatives. Webify invokes your script and writes the request body to your process' stdin. Stdout is then...

MOST COMPLETE IP CAMERA DEFAULT CREDENTIALS LIST

Title says it all.This list comes handy during a pentest. Format is CAMERA MODEL: USERNAME/PASSWORD multiple authentication are separated by a comma (,)     ACTi: admin/123456 or Admin/123456     Alhua: admin/admin     American Dynamics: admin/admin or admin/9999     Amcrest: admin/admin     Arecont Vision: none     AvertX: admin/1234     Avigilon:...

BATCH FILE PROGRAMMING

Batch file programming is the native programming offered by the Microsoft Windows Operating System. Batch file is created using any text editors like notepad, WordPad, WinWord or so on, which comprises of a sequence of built-in commands used to perform some often done tasks like deleting a series of files of same type or of different type, creating...

- page 1 of 1