Nimrod Levy

Nimrod Levy

Israel
5K‏ עוקבים מעל 500 קשרים

על אודות

Nimrod Levy is a seasoned security researcher with over a decade of experience in the…

פעילות

הצטרפו עכשיו כדי לראות את כל פעילות

ניסיון

חינוך

רישיונות והסמכות

ניסיון בהתנדבות

  • BSidesTLV גרפי

    CTF Developer & leader

    BSidesTLV

    -להציג 5 שנים 4 חודשים

    השכלה

  • Toolswatch.org גרפי

    Arsenal Presenter at Blackhat

    Toolswatch.org

    -להציג 6 שנים 7 חודשים

    I presented my open source project ReDTunnel together with Tomer Zait to the audience that came to blackhat.

    https://www.blackhat.com/asia-19/arsenal/schedule/presenters.html#nimrod-levy-38707
    https://www.blackhat.com/us-19/arsenal/schedule/presenters.html#nimrod-levy-38707

  • OWASP Foundation גרפי

    CTF Developer and leader

    OWASP Foundation

    - 2 חודשים

    Writing, designing and implementing "Capture the flag" challenges which categorized for a developers which want to practice security abilities which based on web applicaition methodologies.
    The CTF was included the following challenges:
    1. Breaking the captcha - Nightmare (Hard)
    2. Flags, Flags, Flags (HTTP/2.0)
    3. Alcatraz (SQL Injection)
    4. Lazy admin (Old environment + missconfiguration)
    5. Image converter (Image magic vulnerability)
    6. The bug (exploiting via Python…

    Writing, designing and implementing "Capture the flag" challenges which categorized for a developers which want to practice security abilities which based on web applicaition methodologies.
    The CTF was included the following challenges:
    1. Breaking the captcha - Nightmare (Hard)
    2. Flags, Flags, Flags (HTTP/2.0)
    3. Alcatraz (SQL Injection)
    4. Lazy admin (Old environment + missconfiguration)
    5. Image converter (Image magic vulnerability)
    6. The bug (exploiting via Python exceptions)
    7. The code (exploiting via Python exceptions)
    8. Recommendation Generator (Template Injection)
    9. Around the world - Real (Proxy/VPN challenge - hard)
    10. devDucks (exploiting via Python exceptions)
    11. OWASP University (Type of SQL Injection)
    12. No pain no gain (Missconfiguration)
    13. Curriculum Vitae (Jajascript Challenge)
    14. Break the capthca (Easy)
    15. Arround the world (Proxy/VPN challenge - easy)

    Writeups:

    https://writeups.jctf.team/OWASP-IL-2018/
    https://writeups.jctf.team/OWASP-IL-2018/
    https://github.com/romanzaikin/owasp-il-ctf
    https://github.com/zvikam/OWASP-IL-2018
    https://www.itsafe.co.il/tutorials/owaspil_alcatraz
    https://www.youtube.com/watch?v=uPdc1pVcYMA

  • BSidesTLV גרפי

    CTF Developer & leader

    BSidesTLV

    - 2 חודשים

    The 2018 BSidesTLV CTF competition brought together over 310 team burning the midnight oil to crack our challenged in a bout that lasted for two weeks! But you can now enjoy the same pain and suffering, using this easy to use, condensed VM that now hosts all our challenges in an easy to digest format. This VM now includes all challenges from the CTF:

    IAmBrute
    Shared Directory
    Redirect me
    Crypto2
    c1337Shell
    IH8emacs
    Into the rabbit hole
    PimpMyRide
    Wtflol
    Can you…

    The 2018 BSidesTLV CTF competition brought together over 310 team burning the midnight oil to crack our challenged in a bout that lasted for two weeks! But you can now enjoy the same pain and suffering, using this easy to use, condensed VM that now hosts all our challenges in an easy to digest format. This VM now includes all challenges from the CTF:

    IAmBrute
    Shared Directory
    Redirect me
    Crypto2
    c1337Shell
    IH8emacs
    Into the rabbit hole
    PimpMyRide
    Wtflol
    Can you bypass the SOP?
    T.A.R.D.I.S.
    I'm Pickle Rick!
    Creative Agency
    hideinpILainsight
    DockingStation
    NoSocket
    PySandbox-Insane
    ContactUs
    GamingStore

    Download CTF:
    https://www.vulnhub.com/entry/bsidestlv-2018-ctf,250/

    Writeups & Solutions:
    https://writeups.jctf.team/BSidesTLV-2018/
    https://github.com/ctfs/write-ups-2017/tree/master/bsidessf-ctf-2017
    https://www.digitalwhisper.co.il/files/Zines/0x61/DW97-2-BSides2018.pdf

פרסומים

  • ReDTunnel: Redefining DNS Rebinding Attack

    DigitalWhisper

    Did you wonder how you could browse target's internal network without deploying anything on the victim machine? Sounds like magic, right? Imagine that you could have a one-click setup that will provide you a magic tunnel from the outside world. That's when we came up with the "ReD Tunnel" idea. The design goal was to use tools that exist on the victim's device, like the browser, rather than rely on 0days to stay below the radar of the most advanced AV. To create this new capability, we decided…

    Did you wonder how you could browse target's internal network without deploying anything on the victim machine? Sounds like magic, right? Imagine that you could have a one-click setup that will provide you a magic tunnel from the outside world. That's when we came up with the "ReD Tunnel" idea. The design goal was to use tools that exist on the victim's device, like the browser, rather than rely on 0days to stay below the radar of the most advanced AV. To create this new capability, we decided to combine two concepts: JavaScript reconnaissance techniques and the DNS rebinding attack. Open your browser, wait until the victim visits your website and start browsing the internal websites in their network. Now, when red-teaming you could really "be a guest, but feel at home".

    כות בים נוספים
    ראו פרסום
  • The differences between Red Team and Penetration Testing

    Nimrod Levy

    Abstract:
    Lately, more organizations are subjected to cyber attacks.
    Security personnel of those organizations are not always sure what is the right attitude to facilitate future violations.
    In this lecture, I will cover the differences between red teaming and penetration testing.
    Understanding the differences can help an organization to make wiser decisions on the most effective security assessment.

    Presentation:…

    Abstract:
    Lately, more organizations are subjected to cyber attacks.
    Security personnel of those organizations are not always sure what is the right attitude to facilitate future violations.
    In this lecture, I will cover the differences between red teaming and penetration testing.
    Understanding the differences can help an organization to make wiser decisions on the most effective security assessment.

    Presentation: https://www.slideshare.net/nimrodlevy9/the-difference-between-penetration-testing-and-red-team

    ראו פרסום
  • Cyber-attacks - are we really safe?

    Nimrod Levy

    This article explain about a inadequate protection of organizations on a world, Worth reading :)

    ראו פרסום

קורסים

  • Offensive Security - Cracking The Perimeter (CTP)

    OSID: OS-13342

  • Penetration Testing With Kali By Offensive Security

    OS-13342

  • Secrets Of NMAP by Professor Messor

    -

פרויקטים

  • D(COM) V(ulnerability) S(canner) AKA Devious swiss army knife - Lateral movement using DCOM Objects

    -להציג

    Did you ever wonder how you can move laterally through internal networks? or interact with remote machines without alerting EDRs?
    Let's assume that we have a valid credentials, or an active session with access to a remote machine, but we are without an option for executing a process remotely in a known, expected or a highly-monitored method (i.e. WMI, Task Scheduler, WinRM, PowerShell Remoting).

    For these scenarios, the DVS framework comes to the rescue.

    The DVS framework is a…

    Did you ever wonder how you can move laterally through internal networks? or interact with remote machines without alerting EDRs?
    Let's assume that we have a valid credentials, or an active session with access to a remote machine, but we are without an option for executing a process remotely in a known, expected or a highly-monitored method (i.e. WMI, Task Scheduler, WinRM, PowerShell Remoting).

    For these scenarios, the DVS framework comes to the rescue.

    The DVS framework is a swiss army knife which allows you to enumerate vulnerable functions of remote DCOM objects, launch them and even launch attacks using them.

    The framework is being developed with a "Red Team" mindset and uses stealth methods to compromise remote machines.

    The DVS framework contains various ways to bypass remote hardening against DCOM by re-enableing DCOM access remotely and automatically grant the required permissions to the attacking user.

    The framework can also revert changes on the remote machine to their original state, prior to the attack - hiding these changes from defenders.

    Our main insight is that the tool can also execute commands using non-vulnerable DCOM objects through an awesome technique (Read below about Invoke-RegisterRemoteSchema)

    Compatible with PowerShell 2.0 and up

    Youtube Video PoC: https://www.youtube.com/watch?v=FAjwybmFJAA&feature=youtu.be

    ראו פרויקט
  • XSSPosed-releases

    XSSPosed-releases is tool that extracts latest XSS vulnerabilities published via XSSPosed.org that display a full disclosure about the malicious payload on the infected website

    ראו פרויקט
  • Israeli Iron Chrome

    Google Chrome is probably the most secure browser on the internet. However, the product’s
    ability to be secure is not maximized in its default settings.
    Iron Chrome, is a combination of the best tested, verified security & privacy extensions to make a high-privacy and high-security for the end-user in Chrome browser that's not contain espionage code of Google.

    ראו פרויקט
  • PyWeakServices tool

    When performing a security testing on a Windows environment, or any environment for that matter, one of the things you’ll need to check is if you can escalate your privileges from a low privilege user to a high privileged user. No matter what environment you are testing there are going to be a range or roles with varying privileges. For the most part, on a local windows environment there going to be three roles / privileged users.

    ראו פרויקט
  • Sandworm Detector

    Sandworm exploit vulnerability found in windows Object Linking and Embedding (OLE) allowing arbitrary code execution. Platforms such as Windows Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be vulnerable. This script intended to identify if office file is infected with sandworm vector.

    ראו פרויקט
  • Keylogger

    Keylogger is a type of surveillance software (considered to be either software or spyware) that has the capability to record every keystroke you make to a log file, usually encrypted. A keylogger recorder can record instant messages, e-mail, and any information you type at any time using your keyboard. The log file created by the keylogger can then be sent to a specified receiver. Some keylogger programs will also record any e-mail addresses you use and Web site URLs you visit. Keyloggers, as a…

    Keylogger is a type of surveillance software (considered to be either software or spyware) that has the capability to record every keystroke you make to a log file, usually encrypted. A keylogger recorder can record instant messages, e-mail, and any information you type at any time using your keyboard. The log file created by the keylogger can then be sent to a specified receiver. Some keylogger programs will also record any e-mail addresses you use and Web site URLs you visit. Keyloggers, as a surveillance tool, are often used by employers to ensureemployees use work computers for business purposes only. this keylogger captures the screen when the screen was a significant change, and save the keyboards

    ראו פרויקט
  • AutoBrowser 4.0

    AutoBrowser is a tool written in python for penetration testers. The purpose of this tool is to create report(Json file) and screenshots of http/s based ports on the network. you can choose between analyze Nmap report(XML file -oX) or scan with Nmap, then the tool automaticly Check the results with http/s request on each host using headless web browser, then it would take a screenshot of the response page content.

    This tool is designed for IT professionals to perform penetration…

    AutoBrowser is a tool written in python for penetration testers. The purpose of this tool is to create report(Json file) and screenshots of http/s based ports on the network. you can choose between analyze Nmap report(XML file -oX) or scan with Nmap, then the tool automaticly Check the results with http/s request on each host using headless web browser, then it would take a screenshot of the response page content.

    This tool is designed for IT professionals to perform penetration testing.
    Proof of concept video from AutoBrowser 4.0:
    https://youtu.be/wYLr9QavBKQ

    ראו פרויקט
  • SMTPFuzzer 1.0

    The SMTP Fuzzer will connect to a given mail server and use a wordlist to enumerate users that are present on the remote system.

    ראו פרויקט
  • MSSqlPwner

    -

    MSSqlPwner is an advanced and versatile pentesting tool designed to seamlessly interact with MSSQL servers and based on Impacket. The MSSqlPwner tool empowers ethical hackers and security professionals to conduct comprehensive security assessments on MSSQL environments.
    With MSSqlPwner, users can execute custom commands through various methods, including custom assembly, xp_cmdshell, and sp_oacreate(Ole Automation Procedures) and much…

    MSSqlPwner is an advanced and versatile pentesting tool designed to seamlessly interact with MSSQL servers and based on Impacket. The MSSqlPwner tool empowers ethical hackers and security professionals to conduct comprehensive security assessments on MSSQL environments.
    With MSSqlPwner, users can execute custom commands through various methods, including custom assembly, xp_cmdshell, and sp_oacreate(Ole Automation Procedures) and much more.

    https://github.com/ScorpionesLabs/MSSqlPwner/tree/main

  • SubDomain Analyzer

    -

    The "SubDomain Analyzer" tool written in Python language.
    The purpose of "SubDomain Analyzer" getting full detailed information of selected domain.
    The "SubDomain Analyzer" gets data from domain by following steps:

    1. Trying to get the zone tranfer file.
    2. Gathers all information from DNS records.
    3. Analyzing the DNS records (Analyzing all IP's addresses from DNS records and test class C range from IP address (For example: 127.0.0.1/24) and getting all data that containing…

    The "SubDomain Analyzer" tool written in Python language.
    The purpose of "SubDomain Analyzer" getting full detailed information of selected domain.
    The "SubDomain Analyzer" gets data from domain by following steps:

    1. Trying to get the zone tranfer file.
    2. Gathers all information from DNS records.
    3. Analyzing the DNS records (Analyzing all IP's addresses from DNS records and test class C range from IP address (For example: 127.0.0.1/24) and getting all data that containing the domain being analyzed).
    4. Tests subdomains by dictionary attack.
    The Subdomain Analyzer can keep new addresses which found on DNS records or IP's analyzer. The Subdomain Analyzer can brings a very qualitative information about the domain being analyzed, additionally, he shows a designed report with all the data.

    ראו פרויקט
  • WordPress XMLRPC BruteForce PoC Code

    -

    This PoC script relies of a vulnerability in WordPress systems been available from version 3.5 to version 4.0 (included) that allow a brute force attacks through xmlrpc.php file A malicious attacker might to hack a WordPress users using this vulnerability

    ראו פרויקט

כבוד ופרסים

  • Apple Hall of Fame

    Apple

    Persistent Cross-site scripting in iCloud mail that leads to credential hijacking

    Hall of Fame URL: https://support.apple.com/en-il/HT201536
    https://support.apple.com/en-us/HT212711

  • AT&T Hall of fame

    -

    AT&T Inc. is an American multinational conglomerate holding company headquartered at Whitacre Tower in Downtown Dallas, Texas. AT&T is the world's largest telecommunications company.
    URL: https://bugbounty.att.com/hof.php

  • Zynga's Whitehat Hall of Fame

    Zynga

    Zynga is an American video game developer running social video game services founded in July 2007 and headquartered in San Francisco, California, United states.

    Hall of fame:
    https://www.zynga.com/security/whitehats

  • 3rd Place at The Israel Cyber Challenge

    -

    This is Capture-The-Flag kind of a game, in which the contestants will have several hours to collect as many flags as they can. Teams will compete against each other in breaking an intricate code and hacking into a secure computer.

  • 1st Place at The Israel Cyber Challenge

    -

    This is a Capture-The-Flag kind of a challenge, in which the contestants (in groups of three) have several hours to collect as many flags as they can.
    The subject of the challenge was to find Guri Alfi (Israeli Comedian) and he's kidnappers by hacking their network....

  • 3rd Place at The Israel Cyber Challenge

    Symantec™, Israel Air Force, EMC-RSA and Israel Aerospace Industries Ltd.

    This is Capture-The-Flag kind of a game, in which the contestants will have several hours to collect as many flags as they can. Teams will compete against each other in breaking an intricate code and hacking into a secure computer.

    Get into the hackers' mindset, recognize the targets and win the challenge.

  • PayPal - Security Researchers Hall of Fame

    PayPal

    PayPal is an American worldwide online payments system. Online money transfers serve as electronic alternatives to traditional paper methods like checks and money orders. PayPal is one of the world's largest internet payment companies.

    I was added to the PayPal Security Researchers Hall of Fame for discovering a critical vulnerability in PayPal's main application.

    Hall of Fame Link:
    https://www.paypal.com/us/webapps/mpp/security-tools/wall-of-fame-honorable-mention

  • 1st Place at The Israel Cyber Challenge

    Symantec™, Israel Air Force, EMC-RSA and Israel Aerospace Industries Ltd.

    The Israel Cyber Challenge is a two round Capture-The-Flag event which is set up in a virtual environment which simulates various real life scenarios and challenges participants on many different areas in the information security world.
    The 1st round was designed by Israel Aerospace Industries Ltd. ,The challenge had 4 missions and approximately 150 teams (3 members per team) participated. The challenge was on various topics such as Web application hacking, Exploitation, Cryptography and…

    The Israel Cyber Challenge is a two round Capture-The-Flag event which is set up in a virtual environment which simulates various real life scenarios and challenges participants on many different areas in the information security world.
    The 1st round was designed by Israel Aerospace Industries Ltd. ,The challenge had 4 missions and approximately 150 teams (3 members per team) participated. The challenge was on various topics such as Web application hacking, Exploitation, Cryptography and more.
    Out of the 150 teams who participated in the first round only 21 teams made it to the final stage which had approximately 80 missions on various topics such as Web application hacking, infrastructure hacking, Forensics and more.

    "Prof. Itzik Ben Israel, head of Yuval Ne'eman Workshop, Gen. (Ret.) Kieth Alexander, former director of the NSA, Nadav Tsafrir, Team8, former head of 8200, Erez Kreiner, former director of the National Information Security Center have congratulated the winners in the most prestigious Cyber Challenge event" -Symantec Israel.

    In the news:
    http://www.timesofisrael.com/israeli-hackers-scary-talented-says-security-expert/
    http://www.nrg.co.il/online/1/ART2/622/473.html
    http://www.pc.co.il/kehila/165821/
    http://goo.gl/MpH7Q4
    http://www.israelhayom.co.il/article/218825
    http://www.israeldefense.co.il/?CategoryID=760&ArticleID=6958

  • Symantec™​ Cyber Readiness Challenge 2014 Top 10

    The Symantec™​ Cyber Readiness Challenge was hosted during the CyberTech event,

    Designed for many levels of technical skill and experience it puts participants in the hacker's shoes to understand their targets, technology and thought processes so they can ultimately better protect their organization and themselves.​​​​

שפות

  • English

    -

  • Hebrew

    מיומנות שפת אם או דו-לשונית

המלצות התקבל

עוד פעילות על ידי Nimrod

הצג Nimrod את הפרופיל המלא

  • ראה את מי שאתה מכיר במשותף
  • הכירו
  • צור קשר Nimrod ישירות
הצטרפו נוף הפרופיל המלא

פרופילים דומים אחרים

שמות אחרים Nimrod Levy ב Israel

הוסף כישורים חדשים עם קורסים אלה