Recently Browsing 0 members
No registered users viewing this page.
Members online now
No members to show
By Salaheldin A.
OSINT Tools collections:
Verification Toolset : https://start.me/p/ZGAzN7/verification-toolset
Mapping & Monitoring : https://start.me/p/7k4BnY/mapping-monitoring
Search Engines: https://start.me/p/b56G5Q/search-engines
Social Media Dashboard : https://start.me/p/m6MbeM/social-media-intelligence-dashboard
Threat Intel, OSINT and malware investigation resources : https://start.me/p/rxRbpo/ti
AML Toolbox : https://start.me/p/rxeRqr/aml-toolbox
Technisette collection : https://start.me/p/wMdQMQ/tools
Ph055a collection : https://github.com/Ph055a/OSINT-Collection
By Tim Casey
You may have heard research from IBM's X-Force ISIS on Magecart's attacks on "commercial-grade layer 7 (L7) routers .... typically used by airports, casinos, hotels and resorts, to name a few." (https://securityintelligence.com/posts/leading-magecart-group-targeting-captive-wi-fi-users-via-l7-routers/)
I have a CCNA and never heard of "commercial grade" routers, so thought I would look for some.
The closest product I came up with in my search was Cisco's Meraki. https://meraki.cisco.com/solutions/hospitality. BTW, has a bluetooth low engergy beacon traffic tracking, which has some privacy implications. "How long did guests spend at the lobby bar this past week, and how many spent over an hour at the hotel restaurant last Thursday?" Wow. And Login into Wifi with Facebook. What could go wrong. Anyway it has an API, maybe this is what MG5 is attacking: https://meraki.cisco.com/solutions/location_analytics. This link has a few sub links with access to more detailed information.
Anyway, usually when we hear about Layer7 is tracking app use on a network or load balancing. Many Cisco products have this feature. But I don't think that is what X-Force is talking about.
It would nice if IBM would release more information, if you want the report you have to enter your business info (there is a link at the bottom of the first link above).
By Rami Shaath
Interesting... some overlap and use of RU infrastructure..
Curious, has anyone found the SHA256 eqv of the SHA-1 (Yea.. I know) mentioned in the article? Just hashes would suffice.
By Rami Shaath
DISCLAIMER - I don't work for, or endorse this job posting. However, I know the CISO well and is on a look out for awesome talent to build unique services in the region.
if you are interested, reach out to him directly. (see below)