Welcome to my cybersecurity site, please leave shoes at the door.

CatsnCats | CyberSecurity

2049-10-45

A quick and dirty python zip file brute forcer - note you will need a list of possible words so you know get to OSINT
Python Script [+]

import pyzipper
import itertools
import string

# Define character sets for generating passwords
lowercase = 'abcdefghijklmnopqrstuvwxyz'  # a-z
digits = '0123456789'  # 0-9
special = '!@#$%^&*()_+-=[]{}|;:,.<>?'  # Special characters

# Function to generate variations of a password using character substitutions
def generate_variations(password):
    variations = ['']
    for char in password:
        new_variations = []
        for variant in variations:
            new_variations.append(variant + char)
        variations = new_variations
    return variations

print("Hello, world!")
        

2049-10-18

Back to basics
Hacker GIF

I have been doing some theory work to try to get myself more towards a real-world cyber point of view, instead of my hyper fixations.

Going through the below framework, I found it interesting to analyze the Target hack of 2013 from this perspective:

Policy - Target didn’t have policies to ensure third-party suppliers had a proper security posture. Attackers exploited a contractor’s credentials, prompting organizations to strengthen third-party risk management policies. Mechanisms - Target’s FireEye malware detection tool worked, but their incident response failed, allowing attackers to persist for weeks. Assurance - FireEye reliably detected malware, but gaps in Target’s response exposed weaknesses in their security mechanisms, such as Single Sign-On vulnerabilities. Incentives - Target was a lucrative target during the holiday shopping season. Management’s prioritization of operations over security led to delays in notifying affected customers.

2049-10-16

Port Scanner getting around Ping Barriers or how I learned to love the bomb
Read more
IoT Hacking