This program can be used in the post-exploration stage. You can run the client in a deamonized mode on the target with a frequency to connect at. Whenever the server isn’t running, the client sleeps and tries again at the next interval. When you start the server, you will be presented with a control shell with various commands / actions to choose from.
Go to the releases page and download the latest poet-client and poet-server files available. Then skip to the Usage section below. Alternatively, you can build Poet yourself (it’s pretty easy). Make sure you have the python2.7 and zip executables available. git clone https://github.com/mossberg/poet cd poet make This will create a bin/ directory which contains poet-client and poet-server. Continue reading python – poet post-exploitation tool→
You can download a ready to use Rapberryvas image from these mirrors: mirror1 mirror2 (I used a 16GB sdcard to flash them using Win32DiskImager. ) username: pi password:0penvas login Openvas https://ip user: openvas password:0penvas
Openvas is a great vulnerability scanner No packages are available for version 7 so i have installed it from source on my raspberry pi. http://www.openvas.org/install-source.html
download Developers of team Jellyfish have posted a PoC of a portable executable gpu remote access tool. They already posted a linux version earlier this week.
Tapping an infected computer’s GPU allows malware to run without the usual software hooks or modifications mallware makes in the operating system kernel. Those modifications can be dead giveaways that a system is infected.
Advantages of gpu stored rootkits:
No gpu malware analysis tools available on web
Can snoop on cpu host memory via DMA
Gpu can be used for fast/swift mathematical calculations like xor’ing or parsing
Malicious memory may be retained across warm reboots. (Did more conductive research on the theory of malicious memory still being in gpu after shutdown)
It is just a mather of time untill a version emerge that runs on graphics processors integrated into CPUs.