SlideShare a Scribd company logo
1 of 5
Download to read offline
GadgetProbe
Java deserialization exploits made easy
A new tool developed by researchers at Bishop Fox is intended to lessen the strain of exploiting Java
deserialization bugs, a challenging and often undervalued class of security vulnerabilities found in Java
web applications, by starting the trial-and-error effort needed to find potentially vulnerable Java libraries
used in remote applications.
"Given a list of libraries, GadgetInspector will automatically discover new gadget chains," Jake Miller,
security associate at Bishop Fox said, "By feeding the information from GadgetProbe into
GadgetInspector, you will be able to develop custom gadget chains unique to the specific set of libraries
present in the application you are testing."
Batea
Machine learning tool simplifies target discovery
Researchers at Delve Labs have engineered an open source tool that uses machine learning to
emphasize potential security threats in network device data. The utility is called Batea, a reference to the
instrument which gold prospectors use to find streaks of gold embedded in the sand and shale scooped
up from riverbeds.
It is an open source tool that leverages machine learning to find valuable information in network device
data.
Batea takes an XML version of an Nmap report and applies a series of transformations to create a matrix
of numerical features about each device, such as the number of open ports, the complexity of the
hostname, or the IP address octet.
It then uses Isolation Forest, an unsupervised machine learning algorithm suitable for anomaly detection,
to find the outstanding assets in the network.
"It's easy to make the parallel between gold mining and penetration testing, or even malicious network
intrusion," Serge Olivier Paquette, research lead at Delve Labs said.
SymTCP
Circumventing deep packet inspection
Academics have released a tool designed to bypass deep packet inspection (DPI) to the open source
community. Named as SymTCP, the software is described as a mean to "automatically discover subtle
discrepancies between two TCP implementations".
SymTCP can be used to find differences between a server and DPI, and exploit these differences to avoid
deep packet inspection.DPI can be priceless for preventing buffer overflow and man-in-the-middle attacks
in corporate setups, but it can also be used to conduct surveillance and establish censorship blocks at the
ISP level.
SymTCP first runs ‘symbolic execution' on a server's TCP implementation, and the resulting scan collects
execution paths labeled as either ‘accept' or ‘drop' for packet inspection. The DPI system is then checked
with generated packet sequences to ascertain which, if any, are processed in the same way by the DPI
and the server. If discrepancies in handling are detected, the open source tool is able to create packets
that can reach core elements in the code responsible for accepting or dropping requests, thereby
potentially avoiding DPI middle box checks.
Google tackles USB keystroke injection attacks
From offense to defence, Google has developed a tool for Linux machines that combats USB keystroke
injection attacks by flagging suspicious keystroke speeds and blocking devices classified as malicious.
In a post on the Google Open Source blog, Google security engineer Sebastian Neuner explained how the
tool uses two heuristic variables – keystroke speed and time between keystrokes – to distinguish between
benign and malicious inputs.
Neuner advises users to recalibrate the default parameters by gauging their own typing speed using online
utilities whilst running the Google tool in ‘monitoring' mode.
"The tool is not a silver bullet against USB-based attacks or keystroke injection attacks, since an attacker
with access to a user's machine (required for USB-based keystroke injection attacks) can do worse things
if the machine is left unlocked," Neuner said.

More Related Content

What's hot

Frankenstein. stitching malware from benign binaries
Frankenstein. stitching malware from benign binariesFrankenstein. stitching malware from benign binaries
Frankenstein. stitching malware from benign binaries
Yury Chemerkin
 
Crisis. advanced malware
Crisis. advanced malwareCrisis. advanced malware
Crisis. advanced malware
Yury Chemerkin
 
Treat Detection using Hadoop
Treat Detection using HadoopTreat Detection using Hadoop
Treat Detection using Hadoop
DataWorks Summit
 
Abhilash Owk - Resume
Abhilash Owk - ResumeAbhilash Owk - Resume
Abhilash Owk - Resume
abhilashowk
 

What's hot (18)

A SYSTEM FOR VALIDATING AND COMPARING HOST-BASED DDOS DETECTION MECHANISMS
A SYSTEM FOR VALIDATING AND COMPARING HOST-BASED DDOS DETECTION MECHANISMSA SYSTEM FOR VALIDATING AND COMPARING HOST-BASED DDOS DETECTION MECHANISMS
A SYSTEM FOR VALIDATING AND COMPARING HOST-BASED DDOS DETECTION MECHANISMS
 
Cybersecurity - Jim Butterworth
Cybersecurity - Jim ButterworthCybersecurity - Jim Butterworth
Cybersecurity - Jim Butterworth
 
Identifying Vulnerabilities Using Internet wide Scanning Data
Identifying Vulnerabilities Using Internet wide Scanning DataIdentifying Vulnerabilities Using Internet wide Scanning Data
Identifying Vulnerabilities Using Internet wide Scanning Data
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
 
AI for Cybersecurity Innovation
AI for Cybersecurity InnovationAI for Cybersecurity Innovation
AI for Cybersecurity Innovation
 
Frankenstein. stitching malware from benign binaries
Frankenstein. stitching malware from benign binariesFrankenstein. stitching malware from benign binaries
Frankenstein. stitching malware from benign binaries
 
Enhancing the Analysis of Software Failures in Cloud Computing Systems with D...
Enhancing the Analysis of Software Failures in Cloud Computing Systems with D...Enhancing the Analysis of Software Failures in Cloud Computing Systems with D...
Enhancing the Analysis of Software Failures in Cloud Computing Systems with D...
 
Crisis. advanced malware
Crisis. advanced malwareCrisis. advanced malware
Crisis. advanced malware
 
Android pen test basics
Android pen test basicsAndroid pen test basics
Android pen test basics
 
H@dfex 2015 malware analysis
H@dfex 2015   malware analysisH@dfex 2015   malware analysis
H@dfex 2015 malware analysis
 
Treat Detection using Hadoop
Treat Detection using HadoopTreat Detection using Hadoop
Treat Detection using Hadoop
 
Threat Hunting with Splunk
Threat Hunting with Splunk Threat Hunting with Splunk
Threat Hunting with Splunk
 
Privacy and integrity-preserving range queries
Privacy and integrity-preserving range queriesPrivacy and integrity-preserving range queries
Privacy and integrity-preserving range queries
 
EVIL: Exploiting Software via Natural Language
EVIL: Exploiting Software via Natural LanguageEVIL: Exploiting Software via Natural Language
EVIL: Exploiting Software via Natural Language
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Malware Analysis 101 -  N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...Malware Analysis 101 -  N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
 
Hacking Android [MUC:SEC 20.05.2015]
Hacking Android [MUC:SEC 20.05.2015]Hacking Android [MUC:SEC 20.05.2015]
Hacking Android [MUC:SEC 20.05.2015]
 
Abhilash Owk - Resume
Abhilash Owk - ResumeAbhilash Owk - Resume
Abhilash Owk - Resume
 
(Workshop) Reverse Engineering - Protecting and Breaking the Software
(Workshop) Reverse Engineering - Protecting and Breaking the Software(Workshop) Reverse Engineering - Protecting and Breaking the Software
(Workshop) Reverse Engineering - Protecting and Breaking the Software
 

Similar to The newest hacking tools of 2020 so far | ISOEH

Malware analysis and detection using reverse Engineering, Available at: www....
Malware analysis and detection using reverse Engineering,  Available at: www....Malware analysis and detection using reverse Engineering,  Available at: www....
Malware analysis and detection using reverse Engineering, Available at: www....
Research Publish Journals (Publisher)
 

Similar to The newest hacking tools of 2020 so far | ISOEH (20)

43 automatic
43 automatic43 automatic
43 automatic
 
Security Handbook
 Security Handbook Security Handbook
Security Handbook
 
website vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paperwebsite vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paper
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise Workshop
 
[IJET-V1I6P6] Authors: Ms. Neeta D. Birajdar, Mr. Madhav N. Dhuppe, Ms. Trupt...
[IJET-V1I6P6] Authors: Ms. Neeta D. Birajdar, Mr. Madhav N. Dhuppe, Ms. Trupt...[IJET-V1I6P6] Authors: Ms. Neeta D. Birajdar, Mr. Madhav N. Dhuppe, Ms. Trupt...
[IJET-V1I6P6] Authors: Ms. Neeta D. Birajdar, Mr. Madhav N. Dhuppe, Ms. Trupt...
 
Sample PPT Format.pptx E-commerce website for login
Sample PPT Format.pptx E-commerce website for loginSample PPT Format.pptx E-commerce website for login
Sample PPT Format.pptx E-commerce website for login
 
DEVELOPING MOBILE AGENT FOR INTRUSION DETECTION
DEVELOPING MOBILE AGENT FOR INTRUSION DETECTIONDEVELOPING MOBILE AGENT FOR INTRUSION DETECTION
DEVELOPING MOBILE AGENT FOR INTRUSION DETECTION
 
Slingshot APT - Critical Vulnerability through routers
Slingshot APT - Critical Vulnerability through routersSlingshot APT - Critical Vulnerability through routers
Slingshot APT - Critical Vulnerability through routers
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Malware analysis and detection using reverse Engineering, Available at: www....
Malware analysis and detection using reverse Engineering,  Available at: www....Malware analysis and detection using reverse Engineering,  Available at: www....
Malware analysis and detection using reverse Engineering, Available at: www....
 
FALCON.pptx
FALCON.pptxFALCON.pptx
FALCON.pptx
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 
Software Birthmark Based Theft/Similarity Comparisons of JavaScript Programs
Software Birthmark Based Theft/Similarity Comparisons of JavaScript ProgramsSoftware Birthmark Based Theft/Similarity Comparisons of JavaScript Programs
Software Birthmark Based Theft/Similarity Comparisons of JavaScript Programs
 
Project in malware analysis:C2C
Project in malware analysis:C2CProject in malware analysis:C2C
Project in malware analysis:C2C
 
Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12
 
Top 10 Penetration Testing Tools(Pen test tools).pptx
Top 10 Penetration Testing Tools(Pen test tools).pptxTop 10 Penetration Testing Tools(Pen test tools).pptx
Top 10 Penetration Testing Tools(Pen test tools).pptx
 
20210906-Nessus-FundamentalInfoSec.ppsx
20210906-Nessus-FundamentalInfoSec.ppsx20210906-Nessus-FundamentalInfoSec.ppsx
20210906-Nessus-FundamentalInfoSec.ppsx
 
A44090104
A44090104A44090104
A44090104
 
Ceh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networksCeh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networks
 

More from Shirsendu Kar

More from Shirsendu Kar (14)

Coca Cola Marketing Campaign - Open Happiness Campaign - Small World Machine
Coca Cola Marketing Campaign - Open Happiness Campaign - Small World MachineCoca Cola Marketing Campaign - Open Happiness Campaign - Small World Machine
Coca Cola Marketing Campaign - Open Happiness Campaign - Small World Machine
 
Digital Marketing vs Traditional Marketing - SysTab
Digital Marketing vs Traditional Marketing - SysTabDigital Marketing vs Traditional Marketing - SysTab
Digital Marketing vs Traditional Marketing - SysTab
 
Jezza motors E-Rickshaw distributor in India
Jezza motors E-Rickshaw distributor in IndiaJezza motors E-Rickshaw distributor in India
Jezza motors E-Rickshaw distributor in India
 
How does preschool benefit a child? | Principal Mrs. Sumitra Mitter, Arun Nu...
How does preschool  benefit a child? | Principal Mrs. Sumitra Mitter, Arun Nu...How does preschool  benefit a child? | Principal Mrs. Sumitra Mitter, Arun Nu...
How does preschool benefit a child? | Principal Mrs. Sumitra Mitter, Arun Nu...
 
Difference Between Modern and Contemporary Art | Emami Art
Difference Between Modern and Contemporary Art | Emami ArtDifference Between Modern and Contemporary Art | Emami Art
Difference Between Modern and Contemporary Art | Emami Art
 
Top 5 us tax issues for canadians | the accounting and tax
Top 5 us tax issues for canadians | the accounting and taxTop 5 us tax issues for canadians | the accounting and tax
Top 5 us tax issues for canadians | the accounting and tax
 
5 simple tax strategies for every home owner | the accounting and tax
5 simple tax strategies for every home owner | the accounting and tax5 simple tax strategies for every home owner | the accounting and tax
5 simple tax strategies for every home owner | the accounting and tax
 
B.p. poddar group department of information technology | bppimt
B.p. poddar group department of information technology | bppimtB.p. poddar group department of information technology | bppimt
B.p. poddar group department of information technology | bppimt
 
Benefits of having a six sigma certificate
Benefits of having a six sigma certificateBenefits of having a six sigma certificate
Benefits of having a six sigma certificate
 
All about gre and gmat
All about gre and gmatAll about gre and gmat
All about gre and gmat
 
Benefits of using e rickshaws in metro cities | Jezza Motors
Benefits of using e rickshaws in metro cities | Jezza MotorsBenefits of using e rickshaws in metro cities | Jezza Motors
Benefits of using e rickshaws in metro cities | Jezza Motors
 
Advantages of e rickshaws | Jezza Motors
Advantages of  e rickshaws | Jezza MotorsAdvantages of  e rickshaws | Jezza Motors
Advantages of e rickshaws | Jezza Motors
 
Why NDA offers the best opportunity | NDA Training Kolkata | Siegwald academy
Why NDA offers the best opportunity | NDA Training Kolkata | Siegwald academyWhy NDA offers the best opportunity | NDA Training Kolkata | Siegwald academy
Why NDA offers the best opportunity | NDA Training Kolkata | Siegwald academy
 
Siegwald academy
Siegwald academySiegwald academy
Siegwald academy
 

Recently uploaded

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 

Recently uploaded (20)

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 

The newest hacking tools of 2020 so far | ISOEH

  • 1.
  • 2. GadgetProbe Java deserialization exploits made easy A new tool developed by researchers at Bishop Fox is intended to lessen the strain of exploiting Java deserialization bugs, a challenging and often undervalued class of security vulnerabilities found in Java web applications, by starting the trial-and-error effort needed to find potentially vulnerable Java libraries used in remote applications. "Given a list of libraries, GadgetInspector will automatically discover new gadget chains," Jake Miller, security associate at Bishop Fox said, "By feeding the information from GadgetProbe into GadgetInspector, you will be able to develop custom gadget chains unique to the specific set of libraries present in the application you are testing."
  • 3. Batea Machine learning tool simplifies target discovery Researchers at Delve Labs have engineered an open source tool that uses machine learning to emphasize potential security threats in network device data. The utility is called Batea, a reference to the instrument which gold prospectors use to find streaks of gold embedded in the sand and shale scooped up from riverbeds. It is an open source tool that leverages machine learning to find valuable information in network device data. Batea takes an XML version of an Nmap report and applies a series of transformations to create a matrix of numerical features about each device, such as the number of open ports, the complexity of the hostname, or the IP address octet. It then uses Isolation Forest, an unsupervised machine learning algorithm suitable for anomaly detection, to find the outstanding assets in the network. "It's easy to make the parallel between gold mining and penetration testing, or even malicious network intrusion," Serge Olivier Paquette, research lead at Delve Labs said.
  • 4. SymTCP Circumventing deep packet inspection Academics have released a tool designed to bypass deep packet inspection (DPI) to the open source community. Named as SymTCP, the software is described as a mean to "automatically discover subtle discrepancies between two TCP implementations". SymTCP can be used to find differences between a server and DPI, and exploit these differences to avoid deep packet inspection.DPI can be priceless for preventing buffer overflow and man-in-the-middle attacks in corporate setups, but it can also be used to conduct surveillance and establish censorship blocks at the ISP level. SymTCP first runs ‘symbolic execution' on a server's TCP implementation, and the resulting scan collects execution paths labeled as either ‘accept' or ‘drop' for packet inspection. The DPI system is then checked with generated packet sequences to ascertain which, if any, are processed in the same way by the DPI and the server. If discrepancies in handling are detected, the open source tool is able to create packets that can reach core elements in the code responsible for accepting or dropping requests, thereby potentially avoiding DPI middle box checks.
  • 5. Google tackles USB keystroke injection attacks From offense to defence, Google has developed a tool for Linux machines that combats USB keystroke injection attacks by flagging suspicious keystroke speeds and blocking devices classified as malicious. In a post on the Google Open Source blog, Google security engineer Sebastian Neuner explained how the tool uses two heuristic variables – keystroke speed and time between keystrokes – to distinguish between benign and malicious inputs. Neuner advises users to recalibrate the default parameters by gauging their own typing speed using online utilities whilst running the Google tool in ‘monitoring' mode. "The tool is not a silver bullet against USB-based attacks or keystroke injection attacks, since an attacker with access to a user's machine (required for USB-based keystroke injection attacks) can do worse things if the machine is left unlocked," Neuner said.