Red Team Tools Updates: hashcat and SpiderFoot
Two kits favored by red teams and penetration testers have been updated recently, namely hashcat and SpiderFoot. Hashcat and SpiderFoot together read like a Robert Redford/Paul Newman movie title (yes, I'm that old). :-) Thanks to handler Rob Vandenbrink for the hashcat call out.

Hashcat v3.10: The world's fastest password cracker, and the world's first and only in-kernel rule engine
- Added some workarounds to deal with problems caused by broken OpenCL installation on the host system
 - Improved rule-engine: Enabled support to use the missing @ rule on GPU
 - Improved rule-engine: On Nvidia, the rule-engine got a small performance improvement
 
SpiderFoot 2.7.0: An open source intelligence automation tool to automate the process of gathering intelligence about a given target: IP address, domain name, hostname or network subnet. SpiderFoot can be used offensively, i.e. as part of a black-box penetration test to gather information about the target or defensively to identify what information your organisation is freely providing for attackers to use against you.
- Six (6) new modules:
	
- BotScout.com search for malicious e-mail addresses
 - MalwarePatrol.net search
 - IBM X-Force Threat Exchange search
 - Amazon S3 bucket search
 - Phone number identification
 - Public vulnerability search (PunkSpider and XSSposed)
 
 - Authentication and HTTPS support
 - Scan by use case: e.g. use "Passive" for gathering info without touching the target
 - SpamCop, bitcash.cz, VXVault, VOIPBL and more added as malicious data sources
 - Pastie and Notepad.cc added as data paste sources
 - Data can be flagged as false positive in the UI (with trickle-down effect)
 - Bunch of bug fixes and minor enhancements
 - User manual updated: http://www.spiderfoot.net/documentation/
 
              
Comments