So in my previous post, I told you how to integrate Jenkins with BurpSuite Professional. But this one is different we will run the Burp’s active scan with a simple python script. And later you can add that to your Jenkins and fully automate the testing part. So let’s get things rolling
In this blog post, I will discuss how to find more subdomains. In this post, I will be telling you about how to use security trails and Haktrails
As we all know Recon is a very important step in the bug bounty or even in penetration testing and finding numerous domains will help you get more attack vectors and more widespread areas for your testing.
Extracting relevant information can play a very crucial role in many situations. Extracting this information is pretty simple and somewhat easy. …
Hi Everyone in this blog I would help you in setting up Burpsuite Professional with Jenkins. There are a lot of tools which you could use such as Acunetix or Netsparker. But we all know these tools cost a hell of a lot of money. So in order to save the cost. I came up with using Burp as a DAST Tool in the Pipeline. I know a lot of you will say why not move to an open-source DAST tool such as OWASP ZAP. …
Hey, guys in this Blog I would like to help you in discovering potentially malicious domains targeting your website. Find lookalike/phishing domains that adversaries can use to attack you.
For finding phishing domains we would use a tool called Dnstwist.
This tool works by generating a large list of permutations based on a domain name you provide and then checking if any of those permutations are in use. Additionally, it can generate fuzzy hashes of the web pages to see if they are part of an ongoing phishing attack or brand impersonation
$ git clone https://github.com/elceef/dnstwist.git
$ cd dnstwist
$ pip install
In this blog post, I would be telling you about how to attack docker containers using docker misconfiguration. Will use this with the docker runtime host option to access the containers.
The default setup provides un-encrypted and un-authenticated direct access to the Docker daemon. It is conventional to use port
2375for un-encrypted, and port
2376for encrypted communication with the daemon.
2376port using Nmap
nmap -p 2375,2376 -n 192.168.56.4 -v
This is my second blog on Container security. In this post, I'm trying to cover the basics of docker security. What is docker? why do we need to learn docker? and its security best practices.
Docker is a set of platform-as-a-service (PaaS) products that use OS-level virtualization to deliver software in packages called containers.
In layman's terms, Docker is an application build and deployment tool. It is based on the idea that you can package your code with dependencies into a deployable unit called a container.
I know the Tittle seems too big but ill try to keep this short.
I will be using Vagrant to create a virtual machine. I know we can use ansible or other tools but I’m not that smart.
For vulnerable applications, I’m here using ThreadsApp created by enciphers. You can use other vulnerable applications as well such as juice shops or Dvwa. I’m Using ThreadsApp as it is new and the application mimics a real web application.
Let's get started
I recently started learning about container security. And here is the first blog.
When you hear containers you think of Docker. The most popular container technology is Docker that was launched in 2013 as an open-source container runtime. But apart from docker, there are alternatives such as rkt, Hyper-v, LXC.
A container is a technology that packages up source code, dependencies, and configurations.
A container image is a standalone, lightweight, and executable software containing everything needed to run an application. A container image becomes a container at runtime.