Default password lists

I’ve decided to centralize the default password lists for multiple vendors. I’m making this a sticky post and will update this list when as I find these types of sites:

* – NETGEAR Default Password List
* – Linksys Default Password List
* – D-Link Default Password List
* – Cisco Default Password List
* – Default Router Usernames and Passwords (multiple vendors)
* – Telnet, MySQL and other Linux and Windows service passwords courtesy of n0tazombie.

Always available CTF Labs

I have identified the following CTF labs which are 24/7 and most if not all are free:

To everyone that made me aware of these thank you!

BHIS Blog Post: GNU Radio Primer

Black Hills Information Security just published a great blog post for anyone interested in software defined radios (SDRs). It links to other tutorials that he found while working with a car key fob and how he used GNU Radio paired with a HackRF One to capture and replay the signal back to the receiver. This is a good read for anyone interested in doing working with SDRs.

BHIS Blog Post:

How to disable LLMNR

Many of you are probably already familiar with what Responder does. It takes advantages of protocols such as LLMNR to spoof responses to Windows auto proxy discovery. Black Hills Information Security has just published a blog post on how to disable LLMNR. This protocol has no security, is a broadcast layer 2 protocol and was designed to be used for DNS resolution when there is no DNS server in the network. Nice right? It is also how Windows performs it’s proxy discovery since Windows Vista and it can be spoofed from any node on the broadcast domain. This has been used by hackers to send the user to a proxy server they control to steal user credentials for websites such as online banking and also exploit the browser itself.

BHIS Blog Post:

China’s “Great Cannon” being actively used against Hong Kong protestors

Apparently China has brought out the proverbial “big guns” for dealing with the protests that have been going on in Hong Kong for the last 6+ months. The “Great Cannon” is a capability that is in the Great Firewall of China and it is cyber weapon has the ability to downgrade HTTPS to HTTP and then inject malicious JavaScript into targets web browser which gives them full control of the web browser and can be used to track what is being said, sites being visited, and worst of all create a massive botnet using the affected web browsers to launch a distributed denial of service (DDoS) attack the forums being used to coordinate protests.

You can read more about China’s “Great Cannon” here:

Offensive Security released Kali Linux 2019.4

Offensive Security, the company that is behind Kali Linux, has just released a new version of Kali Linux they are calling 2019.4. This recent release includes the usual updates to their tools, changes the default window manage from Gnome to XFCE, inclusion of PowerShell for Linux and other minor tweaks but it also has a new mode that was introduced that they are calling “UnderCover Mode” which changes the Kali desktop to look like Windows 10. This is great if you are trying to do penetration testing in a public place or at the client facility.


A new open source open source intelligence tool: OSINT-recon

Finally some competition for recon-ng! This tool will collect and aggregate data from the following sources:

GitHub repo can be found here: