I found this over the weekend as well on Twitter. Looks like an excellent enhancement to an awesome MiTM tool. According to the blurb on GitHub it:
“Currently MultiRelay relays HTTP, WebDav, Proxy and SMB authentications to an SMB server. This tool can be customized to accept a range of users to relay to a target. The concept behind this is to only target domain Administrators, local Administrators, or privileged accounts.”
This was on my Twitter feed over the weekend, looks like this would be really useful for a modern day Active Directory. According to the blurb on it in GitHub it can “gathers information about the Active Directory and generates a report which can provide a holistic picture of the current state of the target AD environment.”
Researches recently discovered it is possible to snoop on 3G to 5G cellular networks using a fake base station created by an software defined radio (SDR). It has been well known for the past few years that 2G mobile phone security has been broken, but 3G to 5G remained secure. However, the researchers have now determined that lack of randomness and other weakness you can decrypt traffic over the air.
In their research they used a USRP B210 SDR which costs about $1300, but it’s likely that cheaper TX/RX capable SDRs such as the LimeSDR, HackRF One, and others could also be used. The LimeSDR retails for about $300 and the HackRF One retails for about $330.
Ted Yapo has released plans and source code which allows the use of a low cost FT232RL based USB to Serial Port adapter as a transmit capable SDR. It appears that the FT232RL via harmonics is able to transmit up to at least 27 MHz, and possibly higher.
Microsoft recently announced the end of life for their new Edge browser that was introduced with Windows 10 as a lightweight more secure version of Internet Explorer. Due to a number of severe vulnerabilities shortly after the product was launched it never got any significant traction in the browser wars. It is suspected that they will be writing a new browser that is based on the Chromium engine.
I found an interesting write up for how to use the Microsoft .NET Dynamic Language Runtime (DLR) for offensive purposes because it makes whatever is loaded incredibly difficult because it can be in a language that is not natively installed, such as IronPython.