Posts

Showing posts from June, 2019

Trio convicted of the Garissa university terror attack will be sentenced on 03/07/2019

Image
Three suspects were on Wednesday convicted over the 2015 Garissa University terror attack. Nairobi Chief Magistrate Francis Andayi found Mohamed Ali Abdikar, Hassan Aden Hassan and Rashid Charles Mberesero, a Tanzanian, were involved in an attack that left 148 people dead. Mr Andayi, however, freed Sahal Diry Hussein, saying he cannot be linked to the attack just because he was found in the company of one of the attackers. Prosecutors had proven “beyond a reasonable doubt” that “they knew the plot,” he said but did not give further details of the alleged conspiracy. The Nairobi court will sentence the trio on July 3. The three convictions are the first to result from a long-running investigation and prosecution. All four gunmen were killed by security forces. The operation’s suspected ringleader, Mohamed Mohamud, also named “Kuno,” a former professor at a Koranic school in Garissa, was killed in southwestern Somalia in 2016. The Shabaab said he had been killed by

You do not need VPN, OTT.... just it needs a simple trick to access social media with any tax or vpn

Image
I have alot of tricks  on this internet connections here in eastafrica, but today, I think I must now  expose my simple trick to UCC, MTN, AIRTEL, AFRICELL.... etc, these have always  thought that the OTT has barred many from freely accessing  social media. From the infancy of this tax I discovered  a simple way of using Instagram, twitter, facebook, palmchat, badoo, without  incurring  such cost called OTT. This trick is usable on nearly all browsers  including Firefox, opera, uc browser and all browsers that come already installed on Chinese made  phones... Even old model Nokia phones allow such trick!!!  It works on all phones www.ucc.co.ug , mtn.co.ug , airtel.co.ug , www.africell.ug

DRC is slowly being eaten up by the serpent of Rwanda!!! North kivu is under siege

Image
On 31st May 2018, two RDF special force batallions led by Col Pascal Muhizi, known within the RDF as Mwarimu due to being a military instructor for a long time entered North Kivu, DR Congo. Col Pascal Muhizi is under the 3rd division commanding RDF troops in administrative sectors of Rubavu, Rutsiro and Nyabihu. Col Pascal Muhizi of RDF On the night of 31st May 2019, Col Pascal Muhizi supported by Col Baudouin Ngaruye led two RDF battalions inside North Kivu, DR Congo. Col Baudouin Ngaruye is a former RPA, FARDC, CNDP and M23 officer who was indicted by ICC and has been living in Rwanda under Criminal Paul Kagame’s protection. Since the end of last year, Gen James Kabarebe recalled Col Baudouin Ngaruye and deployed him within DR Congo desk. Col Baudouin Ngaruye is currently the chief military coordinator of RDF in North Kivu, DR Congo. Col Baudouin Ngaruye During the 31st May 2019 military adventure, the target of RDF special forces was to hunt and wipe out an armed group that

Chaining three bugs

C:\Users\IEUser\Downloads\AsaGui-windows-2.0.141>  Electron Socket IO Port: 8000 Electron Socket started on port 8000 at 127.0.0.1 ASP.NET Core Port: 8001 stdout: Use Electron Port: 8000 stdout: Hosting environment: Production Content root path: C:\Users\IEUser\Downloads\AsaGui-windows-2.0.141\resources\app\bin\ Now listening on: http://0.0.0.0:8001 Application started. Press Ctrl+C to shut down. ..............listening  to everything on port 8001... ....enjoy this now...... function startAspCoreBackend(electronPort) { // hostname needs to be localhost, otherwise Windows Firewall will be triggered. portscanner.findAPortNotInUse(8000, 65535, 'localhost', function (error, electronWebPort) {     console.log('ASP.NET Core Port: ' + electronWebPort);     loadURL = `http://localhost:${electronWebPort}`;     const parameters = [`/electronPort=${electronPort}`, `/electronWebPort=${electronWebPort}`];     let binaryFile = manifestJsonFile.executable;  

Why use jupyter for security investigations

Image
Why Use Jupyter for Security Investigations? ‎ What is Jupyter? Jupyter is an interactive development and data manipulation environment hosted in a browser. It takes code that you type into a cell, executes it and returns the output to you. Here is an example: For more introductory information and sample notebooks go to  jupyter.org . and the jupyter introductory documentation Why Jupyter? "Why would I use Jupyter notebooks to work with Azure Sentinel data rather than the built-in query and investigation tools?" might be your first question. And the first answer is that, usually, you wouldn't. In most cases, the scenario and data that you are investigating can be handled perfectly well in with the coming graphical investigation tool, with Log Analytics queries and cool case features like Bookmarks. The second point to make is that it is not an either/or question .You should think about Jupyter notebooks as something to use to supplement the bu

How to access RDP over SSH tunnel

Image
How to access RDP over SSH tunnel Remote Desktop Protocol (RDP) helps to get a nice graphical connection to a remote computer. But it also help attackers, that compromised such computer, to get a connection to this remote computer. Usually, companies protect such non-exposed systems by firewall and NAT rules from inbound RDP attempts. But attackers know about it and found other ways to bypass it such as network tunneling and host-based port forwarding. In this blog post I will show how to do RDP over SSH tunnel with  plink , but first, lets just understand what it means to create a tunnel. Network tunneling and port forwarding Tunneling, also known as “port forwarding”, is the transmission of data for use only within private network through the public network. It allows us to transmit data from one network to another. It uses the process of  encapsulation  through which the private network communications are sent to the public networks. It reminds VPN because VPN i

This is good for cyber crime investigation

Image
msticpy  is a package of python tools intended to be used for security investigations and hunting (primarily in Jupyter notebooks). Most of the tools originated from code written in Jupyter notebooks which was tidied up and re-packaged into python modules. I’ve added some references to other blogs in the References  section, where I describe some of these notebooks in more detail. The goals of the package are twofold: Reduce the clutter of code in notebooks making them easier to use and read. Provide building-blocks for future notebooks to make authoring them simpler and quicker. There are some side benefits from this: The functions and classes are easier to test when extracted into standalone modules, so (hopefully) they are more robust. The code is easier to document, and the functionality is more discoverable than having to wade through old notebooks and copy and paste the desired functions. While much of the functionality is only useful in Jupyter notebooks (e.g.