During the creation a new selenium script, you can have a problem with python interpreter because you don’t have importing a Python Library. This is a example of the problem: >>> from selenium import selenium Traceback (most recent call last): File "test.py", line 1, in from selenium import selenium ImportError: No module named selenium The following steps will help you to solve the issue: 1) Download the Selenium Client Drivers […]

Pre-requisite Python version 1.5.2 or higher. Download NTLMAPS You can download ntlmaps file from http://ntlmaps.sourceforge.net/ Install NTLMAPS extract the package into the “bin” directory tar xvfz ntlmaps- -C /usr/local/bin create a symbolic link ln -s /usr/local/bin/ntlmaps- /usr/local/bin/ntlmaps edit the NTLMAPS configuration file vi /usr/local/bin/ntlmaps/server.cfg Configure NTLMAPS [GENERAL] LISTEN_PORT: 5865 PARENT_PROXY: your.isa.server.name PARENT_PROXY_PORT: your.isa.server.port PARENT_PROXY_TIMEOUT:15 ALLOW_EXTERNAL_CLIENTS:1 FRIENDLY_IPS: your.client.ip URL_LOG:0 MAX_CONNECTION_BACKLOG:5 [CLIENT_HEADER] Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/vnd.ms-excel, application/msword, application/vnd.ms-powerpoint, */* User-Agent: Mozilla/4.0 (compatible; MSIE 5.5; Windows 98)   [NTLM_AUTH] […]

FireEye is issuing a secondary offering of $700m, after shares in the cybersecurity company have soared more than 50 per cent in the month since it made a $1bn acquisition. The Silicon Valley-based cybersecurity technology company – which went public last September – will sell up to $700m worth of shares, or about 9 per cent of its market capitalisation, it said in a filing yesterday. Investors have rushed to fund a new […]

Regulators for Britain’s infrastructure networks were summoned to Whitehall on Wednesday to be warned by security chiefs to better prepare for crippling cyber attacks by hostile foreign states or terrorists. Sir Iain Lobban, the head of GCHQ, and senior figures in MI5 will meet representatives from the Civil Aviation Authority, Ofgem, Ofwat, Ofcom, the Bank of England and government ministers to discuss the UK’s state of readiness for “systemic” disruption […]

Eleven companies accused of employing corrupt private detectives to gather information about members of the public are under investigation for criminal and civil offences, eight years after police first uncovered evidence against them. The “blue-chip hacking” scandal, which broke last year, revealed that more than 100 City institutions, including law firms, financial services and insurance companies, were thought to have engaged rogue investigators who obtained information illegally through “blagging”. Inquiries by a […]

Today’s item from the NSA’s Tailored Access Operations (TAO) group implant catalog: SWAP(TS//SI//REL) SWAP provides software application persistence by exploiting the motherboard BIOS and the hard drive’s Host Protected Area to gain periodic execution before the Operating System loads. (TS//SI//REL) This technique supports single or multi-processor systems running Windows, Linux, FreeBSD, or Solaris with the following file systems: FAT32, NTFS, EXT2, EXT3, or UFS1.0. (TS//SI//REL) Through remote access or interdiction, ARKSTREAM […]