“For some people hacking is a hobby, for some a career. For Nimrod hacking is the air he breaths, his life. Nimrod's has unusual technical abilities together with his positive attitude and a great personality, I can highly recommend Nimrod as a great person to work with.”
על אודות
Nimrod Levy is a seasoned security researcher with over a decade of experience in the…
פעילות
-
שמח לשתף על רכישת אקסלה. צעד גדול נוסף במטרה לספק ללקוחותינו את הערך הגבוה ביותר, תודה לצוותים! Stay Tuned:)..
שמח לשתף על רכישת אקסלה. צעד גדול נוסף במטרה לספק ללקוחותינו את הערך הגבוה ביותר, תודה לצוותים! Stay Tuned:)..
נוסף לייק על ידי Nimrod Levy
-
🚨 Calling All Security Researchers, Join Us in Building the Future of Security We're a well-funded stealth security startup in San Francisco…
🚨 Calling All Security Researchers, Join Us in Building the Future of Security We're a well-funded stealth security startup in San Francisco…
נוסף לייק על ידי Nimrod Levy
-
5 סיבות למה ממש לא כדאי שיהיה לכם פודקאסט: 1. פודקאסט הוא הדרך האותנטית ביותר לבנות קהל מעריצים שמעורב רגשית במסע שלכם. אם עצם המחשבה על אלפי אנשים…
5 סיבות למה ממש לא כדאי שיהיה לכם פודקאסט: 1. פודקאסט הוא הדרך האותנטית ביותר לבנות קהל מעריצים שמעורב רגשית במסע שלכם. אם עצם המחשבה על אלפי אנשים…
נוסף לייק על ידי Nimrod Levy
ניסיון
חינוך
רישיונות והסמכות
-
-
-
Hack The Box - Zephyr (Red Team Operations)
Hack The Box
שהונפקותְעוּדַת זֶהוּת אישורים HTBCERT-476860100F -
-
-
-
CTP Offensive Security Certified Expert (OSCE)
Offensive Security
שהונפקותְעוּדַת זֶהוּת אישורים OS-13342 -
PWK Offensive Security Certified Professional (OSCP) certification
Offensive Security
שהונפקותְעוּדַת זֶהוּת אישורים OS-13342
ניסיון בהתנדבות
-
-
Arsenal Presenter at Blackhat
Toolswatch.org
-להציג 6 שנים 7 חודשים
I presented my open source project ReDTunnel together with Tomer Zait to the audience that came to blackhat.
https://www.blackhat.com/asia-19/arsenal/schedule/presenters.html#nimrod-levy-38707
https://www.blackhat.com/us-19/arsenal/schedule/presenters.html#nimrod-levy-38707 -
CTF Developer and leader
OWASP Foundation
- 2 חודשים
Writing, designing and implementing "Capture the flag" challenges which categorized for a developers which want to practice security abilities which based on web applicaition methodologies.
The CTF was included the following challenges:
1. Breaking the captcha - Nightmare (Hard)
2. Flags, Flags, Flags (HTTP/2.0)
3. Alcatraz (SQL Injection)
4. Lazy admin (Old environment + missconfiguration)
5. Image converter (Image magic vulnerability)
6. The bug (exploiting via Python…Writing, designing and implementing "Capture the flag" challenges which categorized for a developers which want to practice security abilities which based on web applicaition methodologies.
The CTF was included the following challenges:
1. Breaking the captcha - Nightmare (Hard)
2. Flags, Flags, Flags (HTTP/2.0)
3. Alcatraz (SQL Injection)
4. Lazy admin (Old environment + missconfiguration)
5. Image converter (Image magic vulnerability)
6. The bug (exploiting via Python exceptions)
7. The code (exploiting via Python exceptions)
8. Recommendation Generator (Template Injection)
9. Around the world - Real (Proxy/VPN challenge - hard)
10. devDucks (exploiting via Python exceptions)
11. OWASP University (Type of SQL Injection)
12. No pain no gain (Missconfiguration)
13. Curriculum Vitae (Jajascript Challenge)
14. Break the capthca (Easy)
15. Arround the world (Proxy/VPN challenge - easy)
Writeups:
https://writeups.jctf.team/OWASP-IL-2018/
https://writeups.jctf.team/OWASP-IL-2018/
https://github.com/romanzaikin/owasp-il-ctf
https://github.com/zvikam/OWASP-IL-2018
https://www.itsafe.co.il/tutorials/owaspil_alcatraz
https://www.youtube.com/watch?v=uPdc1pVcYMA -
CTF Developer & leader
BSidesTLV
- 2 חודשים
The 2018 BSidesTLV CTF competition brought together over 310 team burning the midnight oil to crack our challenged in a bout that lasted for two weeks! But you can now enjoy the same pain and suffering, using this easy to use, condensed VM that now hosts all our challenges in an easy to digest format. This VM now includes all challenges from the CTF:
IAmBrute
Shared Directory
Redirect me
Crypto2
c1337Shell
IH8emacs
Into the rabbit hole
PimpMyRide
Wtflol
Can you…The 2018 BSidesTLV CTF competition brought together over 310 team burning the midnight oil to crack our challenged in a bout that lasted for two weeks! But you can now enjoy the same pain and suffering, using this easy to use, condensed VM that now hosts all our challenges in an easy to digest format. This VM now includes all challenges from the CTF:
IAmBrute
Shared Directory
Redirect me
Crypto2
c1337Shell
IH8emacs
Into the rabbit hole
PimpMyRide
Wtflol
Can you bypass the SOP?
T.A.R.D.I.S.
I'm Pickle Rick!
Creative Agency
hideinpILainsight
DockingStation
NoSocket
PySandbox-Insane
ContactUs
GamingStore
Download CTF:
https://www.vulnhub.com/entry/bsidestlv-2018-ctf,250/
Writeups & Solutions:
https://writeups.jctf.team/BSidesTLV-2018/
https://github.com/ctfs/write-ups-2017/tree/master/bsidessf-ctf-2017
https://www.digitalwhisper.co.il/files/Zines/0x61/DW97-2-BSides2018.pdf
פרסומים
-
ReDTunnel: Redefining DNS Rebinding Attack
DigitalWhisper
Did you wonder how you could browse target's internal network without deploying anything on the victim machine? Sounds like magic, right? Imagine that you could have a one-click setup that will provide you a magic tunnel from the outside world. That's when we came up with the "ReD Tunnel" idea. The design goal was to use tools that exist on the victim's device, like the browser, rather than rely on 0days to stay below the radar of the most advanced AV. To create this new capability, we decided…
Did you wonder how you could browse target's internal network without deploying anything on the victim machine? Sounds like magic, right? Imagine that you could have a one-click setup that will provide you a magic tunnel from the outside world. That's when we came up with the "ReD Tunnel" idea. The design goal was to use tools that exist on the victim's device, like the browser, rather than rely on 0days to stay below the radar of the most advanced AV. To create this new capability, we decided to combine two concepts: JavaScript reconnaissance techniques and the DNS rebinding attack. Open your browser, wait until the victim visits your website and start browsing the internal websites in their network. Now, when red-teaming you could really "be a guest, but feel at home".
כות בים נוספיםראו פרסום -
The differences between Red Team and Penetration Testing
Nimrod Levy
Abstract:
Lately, more organizations are subjected to cyber attacks.
Security personnel of those organizations are not always sure what is the right attitude to facilitate future violations.
In this lecture, I will cover the differences between red teaming and penetration testing.
Understanding the differences can help an organization to make wiser decisions on the most effective security assessment.
Presentation:…Abstract:
Lately, more organizations are subjected to cyber attacks.
Security personnel of those organizations are not always sure what is the right attitude to facilitate future violations.
In this lecture, I will cover the differences between red teaming and penetration testing.
Understanding the differences can help an organization to make wiser decisions on the most effective security assessment.
Presentation: https://www.slideshare.net/nimrodlevy9/the-difference-between-penetration-testing-and-red-team -
Cyber-attacks - are we really safe?
Nimrod Levy
This article explain about a inadequate protection of organizations on a world, Worth reading :)
קורסים
-
Offensive Security - Cracking The Perimeter (CTP)
OSID: OS-13342
-
Penetration Testing With Kali By Offensive Security
OS-13342
-
Secrets Of NMAP by Professor Messor
-
פרויקטים
-
D(COM) V(ulnerability) S(canner) AKA Devious swiss army knife - Lateral movement using DCOM Objects
-להציג
Did you ever wonder how you can move laterally through internal networks? or interact with remote machines without alerting EDRs?
Let's assume that we have a valid credentials, or an active session with access to a remote machine, but we are without an option for executing a process remotely in a known, expected or a highly-monitored method (i.e. WMI, Task Scheduler, WinRM, PowerShell Remoting).
For these scenarios, the DVS framework comes to the rescue.
The DVS framework is a…Did you ever wonder how you can move laterally through internal networks? or interact with remote machines without alerting EDRs?
Let's assume that we have a valid credentials, or an active session with access to a remote machine, but we are without an option for executing a process remotely in a known, expected or a highly-monitored method (i.e. WMI, Task Scheduler, WinRM, PowerShell Remoting).
For these scenarios, the DVS framework comes to the rescue.
The DVS framework is a swiss army knife which allows you to enumerate vulnerable functions of remote DCOM objects, launch them and even launch attacks using them.
The framework is being developed with a "Red Team" mindset and uses stealth methods to compromise remote machines.
The DVS framework contains various ways to bypass remote hardening against DCOM by re-enableing DCOM access remotely and automatically grant the required permissions to the attacking user.
The framework can also revert changes on the remote machine to their original state, prior to the attack - hiding these changes from defenders.
Our main insight is that the tool can also execute commands using non-vulnerable DCOM objects through an awesome technique (Read below about Invoke-RegisterRemoteSchema)
Compatible with PowerShell 2.0 and up
Youtube Video PoC: https://www.youtube.com/watch?v=FAjwybmFJAA&feature=youtu.be
-
XSSPosed-releases
XSSPosed-releases is tool that extracts latest XSS vulnerabilities published via XSSPosed.org that display a full disclosure about the malicious payload on the infected website
-
Israeli Iron Chrome
Google Chrome is probably the most secure browser on the internet. However, the product’s
ability to be secure is not maximized in its default settings.
Iron Chrome, is a combination of the best tested, verified security & privacy extensions to make a high-privacy and high-security for the end-user in Chrome browser that's not contain espionage code of Google. -
PyWeakServices tool
When performing a security testing on a Windows environment, or any environment for that matter, one of the things you’ll need to check is if you can escalate your privileges from a low privilege user to a high privileged user. No matter what environment you are testing there are going to be a range or roles with varying privileges. For the most part, on a local windows environment there going to be three roles / privileged users.
-
Sandworm Detector
Sandworm exploit vulnerability found in windows Object Linking and Embedding (OLE) allowing arbitrary code execution. Platforms such as Windows Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be vulnerable. This script intended to identify if office file is infected with sandworm vector.
-
Keylogger
Keylogger is a type of surveillance software (considered to be either software or spyware) that has the capability to record every keystroke you make to a log file, usually encrypted. A keylogger recorder can record instant messages, e-mail, and any information you type at any time using your keyboard. The log file created by the keylogger can then be sent to a specified receiver. Some keylogger programs will also record any e-mail addresses you use and Web site URLs you visit. Keyloggers, as a…
Keylogger is a type of surveillance software (considered to be either software or spyware) that has the capability to record every keystroke you make to a log file, usually encrypted. A keylogger recorder can record instant messages, e-mail, and any information you type at any time using your keyboard. The log file created by the keylogger can then be sent to a specified receiver. Some keylogger programs will also record any e-mail addresses you use and Web site URLs you visit. Keyloggers, as a surveillance tool, are often used by employers to ensureemployees use work computers for business purposes only. this keylogger captures the screen when the screen was a significant change, and save the keyboards
-
AutoBrowser 4.0
AutoBrowser is a tool written in python for penetration testers. The purpose of this tool is to create report(Json file) and screenshots of http/s based ports on the network. you can choose between analyze Nmap report(XML file -oX) or scan with Nmap, then the tool automaticly Check the results with http/s request on each host using headless web browser, then it would take a screenshot of the response page content.
This tool is designed for IT professionals to perform penetration…AutoBrowser is a tool written in python for penetration testers. The purpose of this tool is to create report(Json file) and screenshots of http/s based ports on the network. you can choose between analyze Nmap report(XML file -oX) or scan with Nmap, then the tool automaticly Check the results with http/s request on each host using headless web browser, then it would take a screenshot of the response page content.
This tool is designed for IT professionals to perform penetration testing.
Proof of concept video from AutoBrowser 4.0:
https://youtu.be/wYLr9QavBKQ -
SMTPFuzzer 1.0
The SMTP Fuzzer will connect to a given mail server and use a wordlist to enumerate users that are present on the remote system.
-
MSSqlPwner
-
MSSqlPwner is an advanced and versatile pentesting tool designed to seamlessly interact with MSSQL servers and based on Impacket. The MSSqlPwner tool empowers ethical hackers and security professionals to conduct comprehensive security assessments on MSSQL environments.
With MSSqlPwner, users can execute custom commands through various methods, including custom assembly, xp_cmdshell, and sp_oacreate(Ole Automation Procedures) and much…MSSqlPwner is an advanced and versatile pentesting tool designed to seamlessly interact with MSSQL servers and based on Impacket. The MSSqlPwner tool empowers ethical hackers and security professionals to conduct comprehensive security assessments on MSSQL environments.
With MSSqlPwner, users can execute custom commands through various methods, including custom assembly, xp_cmdshell, and sp_oacreate(Ole Automation Procedures) and much more.
https://github.com/ScorpionesLabs/MSSqlPwner/tree/main -
SubDomain Analyzer
-
The "SubDomain Analyzer" tool written in Python language.
The purpose of "SubDomain Analyzer" getting full detailed information of selected domain.
The "SubDomain Analyzer" gets data from domain by following steps:
1. Trying to get the zone tranfer file.
2. Gathers all information from DNS records.
3. Analyzing the DNS records (Analyzing all IP's addresses from DNS records and test class C range from IP address (For example: 127.0.0.1/24) and getting all data that containing…The "SubDomain Analyzer" tool written in Python language.
The purpose of "SubDomain Analyzer" getting full detailed information of selected domain.
The "SubDomain Analyzer" gets data from domain by following steps:
1. Trying to get the zone tranfer file.
2. Gathers all information from DNS records.
3. Analyzing the DNS records (Analyzing all IP's addresses from DNS records and test class C range from IP address (For example: 127.0.0.1/24) and getting all data that containing the domain being analyzed).
4. Tests subdomains by dictionary attack.
The Subdomain Analyzer can keep new addresses which found on DNS records or IP's analyzer. The Subdomain Analyzer can brings a very qualitative information about the domain being analyzed, additionally, he shows a designed report with all the data. -
WordPress XMLRPC BruteForce PoC Code
-
This PoC script relies of a vulnerability in WordPress systems been available from version 3.5 to version 4.0 (included) that allow a brute force attacks through xmlrpc.php file A malicious attacker might to hack a WordPress users using this vulnerability
כבוד ופרסים
-
Apple Hall of Fame
Apple
Persistent Cross-site scripting in iCloud mail that leads to credential hijacking
Hall of Fame URL: https://support.apple.com/en-il/HT201536
https://support.apple.com/en-us/HT212711 -
AT&T Hall of fame
-
AT&T Inc. is an American multinational conglomerate holding company headquartered at Whitacre Tower in Downtown Dallas, Texas. AT&T is the world's largest telecommunications company.
URL: https://bugbounty.att.com/hof.php -
Zynga's Whitehat Hall of Fame
Zynga
Zynga is an American video game developer running social video game services founded in July 2007 and headquartered in San Francisco, California, United states.
Hall of fame:
https://www.zynga.com/security/whitehats -
3rd Place at The Israel Cyber Challenge
-
This is Capture-The-Flag kind of a game, in which the contestants will have several hours to collect as many flags as they can. Teams will compete against each other in breaking an intricate code and hacking into a secure computer.
-
1st Place at The Israel Cyber Challenge
-
This is a Capture-The-Flag kind of a challenge, in which the contestants (in groups of three) have several hours to collect as many flags as they can.
The subject of the challenge was to find Guri Alfi (Israeli Comedian) and he's kidnappers by hacking their network....
-
3rd Place at The Israel Cyber Challenge
Symantec™, Israel Air Force, EMC-RSA and Israel Aerospace Industries Ltd.
This is Capture-The-Flag kind of a game, in which the contestants will have several hours to collect as many flags as they can. Teams will compete against each other in breaking an intricate code and hacking into a secure computer.
Get into the hackers' mindset, recognize the targets and win the challenge.
-
PayPal - Security Researchers Hall of Fame
PayPal
PayPal is an American worldwide online payments system. Online money transfers serve as electronic alternatives to traditional paper methods like checks and money orders. PayPal is one of the world's largest internet payment companies.
I was added to the PayPal Security Researchers Hall of Fame for discovering a critical vulnerability in PayPal's main application.
Hall of Fame Link:
https://www.paypal.com/us/webapps/mpp/security-tools/wall-of-fame-honorable-mention -
1st Place at The Israel Cyber Challenge
Symantec™, Israel Air Force, EMC-RSA and Israel Aerospace Industries Ltd.
The Israel Cyber Challenge is a two round Capture-The-Flag event which is set up in a virtual environment which simulates various real life scenarios and challenges participants on many different areas in the information security world.
The 1st round was designed by Israel Aerospace Industries Ltd. ,The challenge had 4 missions and approximately 150 teams (3 members per team) participated. The challenge was on various topics such as Web application hacking, Exploitation, Cryptography and…The Israel Cyber Challenge is a two round Capture-The-Flag event which is set up in a virtual environment which simulates various real life scenarios and challenges participants on many different areas in the information security world.
The 1st round was designed by Israel Aerospace Industries Ltd. ,The challenge had 4 missions and approximately 150 teams (3 members per team) participated. The challenge was on various topics such as Web application hacking, Exploitation, Cryptography and more.
Out of the 150 teams who participated in the first round only 21 teams made it to the final stage which had approximately 80 missions on various topics such as Web application hacking, infrastructure hacking, Forensics and more.
"Prof. Itzik Ben Israel, head of Yuval Ne'eman Workshop, Gen. (Ret.) Kieth Alexander, former director of the NSA, Nadav Tsafrir, Team8, former head of 8200, Erez Kreiner, former director of the National Information Security Center have congratulated the winners in the most prestigious Cyber Challenge event" -Symantec Israel.
In the news:
http://www.timesofisrael.com/israeli-hackers-scary-talented-says-security-expert/
http://www.nrg.co.il/online/1/ART2/622/473.html
http://www.pc.co.il/kehila/165821/
http://goo.gl/MpH7Q4
http://www.israelhayom.co.il/article/218825
http://www.israeldefense.co.il/?CategoryID=760&ArticleID=6958 -
Symantec™ Cyber Readiness Challenge 2014 Top 10
The Symantec™ Cyber Readiness Challenge was hosted during the CyberTech event,
Designed for many levels of technical skill and experience it puts participants in the hacker's shoes to understand their targets, technology and thought processes so they can ultimately better protect their organization and themselves.
שפות
-
English
-
-
Hebrew
מיומנות שפת אם או דו-לשונית
המלצות התקבל
8 אנשים המליצו Nimrod
הצטרפו עכשיו כדי נוףעוד פעילות על ידי Nimrod
-
איזה מזל שיש AI ✨ אשתי, Noam Liel Sonnenfeld, בחודש תשיעי להריון, וכבר תקופה אנחנו מחפשים אפליקציה לתזמון צירים. כזו שלא עולה כסף, ושאין בה פרסומות…
איזה מזל שיש AI ✨ אשתי, Noam Liel Sonnenfeld, בחודש תשיעי להריון, וכבר תקופה אנחנו מחפשים אפליקציה לתזמון צירים. כזו שלא עולה כסף, ושאין בה פרסומות…
נוסף לייק על ידי Nimrod Levy
-
Reflected XSS in Odoo Apps via Prototype Pollution (jQuery BBQ < 1.3.1) Odoo apps (<= 15.0) using jQuery BBQ < 1.3.1 are vulnerable to prototype…
Reflected XSS in Odoo Apps via Prototype Pollution (jQuery BBQ < 1.3.1) Odoo apps (<= 15.0) using jQuery BBQ < 1.3.1 are vulnerable to prototype…
נוסף לייק על ידי Nimrod Levy
-
I recently won a MetaCTF Flash CTF and decided to use the prize money to dip my hands into hardware hacking! I bought a TP-Link Tapo C100 camera as…
I recently won a MetaCTF Flash CTF and decided to use the prize money to dip my hands into hardware hacking! I bought a TP-Link Tapo C100 camera as…
נוסף לייק על ידי Nimrod Levy
-
האקרים פרו פלסטיניים ניסו לגנוב לי את פרטי האשראי הבוקר. באופן לא מפתיע, בתקופה האחרונה יש עלייה ניכרת בנסיונות של תקיפות סייבר נגד ישראלים. אמנם…
האקרים פרו פלסטיניים ניסו לגנוב לי את פרטי האשראי הבוקר. באופן לא מפתיע, בתקופה האחרונה יש עלייה ניכרת בנסיונות של תקיפות סייבר נגד ישראלים. אמנם…
נוסף לייק על ידי Nimrod Levy
-
Red Team is not about just finding vulnerabilities. It’s about exposing blind spots, gaps in response, and false sense of security. 🔴 Attack ➝…
Red Team is not about just finding vulnerabilities. It’s about exposing blind spots, gaps in response, and false sense of security. 🔴 Attack ➝…
נוסף לייק על ידי Nimrod Levy
-
Recently contributed a bit to open source: implemented BOF support for the gopher agent in AdaptixC2. Waiting for the 0.7…
Recently contributed a bit to open source: implemented BOF support for the gopher agent in AdaptixC2. Waiting for the 0.7…
נוסף לייק על ידי Nimrod Levy
-
Back from BlackHat & DEF CON - what a week! Incredible to connect with so many brilliant minds. My biggest takeaway: We’ve officially crossed the…
Back from BlackHat & DEF CON - what a week! Incredible to connect with so many brilliant minds. My biggest takeaway: We’ve officially crossed the…
נוסף לייק על ידי Nimrod Levy
-
Most hackers know how to break things. Very few know how to build something that can’t be broken. 🔐 I wanted to change that. So I built Cyleet.io -…
Most hackers know how to break things. Very few know how to build something that can’t be broken. 🔐 I wanted to change that. So I built Cyleet.io -…
נוסף לייק על ידי Nimrod Levy
פרופילים דומים אחרים
שמות אחרים Nimrod Levy ב Israel
15 Nimrod Levy שמות אחרים מופיעים Israel ב-לינקדאין
הצג/י אנשים אחרים בשם Nimrod Levy