Saturday, 19. May 2012
web-sorrow - Linux
A perl based tool used for checking a Web server for misconfiguration, version detection, enumeration, and server information. I will build more Functionality in the future. what is's NOT: Vulnerably scanner, inspection proxy, DDoS tool, exploitation framework. It's entirely focused on Enumeration and collecting Info on the target server

EXAMPLES:

basic: perl Wsorrow.pl -host scanme.nmap.org -S

look for login pages: perl Wsorrow.pl -host 192.168.1.1 -auth

CMS intense scan: perl Wsorrow.pl -host 192.168.1.1 -Ws -Cp all -I

most intense scan possible: perl Wsorrow.pl -host 192.168.1.1 -e -ua "I come in peace"

Download
http://code.google.com/p/web-sorrow/downloads/list

Permalink

 


Friday, 4. May 2012
HackBar 1.6.1 - Add-on
This toolbar will help you in testing sql injections, XSS holes and site security. It is NOT a tool for executing standard exploits and it will NOT teach you how to hack a site. Its main purpose is to help a developer do security audits on his code. If you know what your doing, this toolbar will help you do it faster.

Download
https://addons.mozilla.org/en-US/firefox/addon/hackbar/

"
# Load url ( alt a )
This loads the url of the current page into the textarea.

# Split url ( alt s )
When this button is clicked, the url/text in the textarea will be split into multiple lines using the ? and & character

# Execute ( alt x, ctrl enter )
This will execute the current url in the textarea, i mostly use ctrl+enter

# INT -1 ( alt - )
First select a number in the textarea and press this button, the number will be lowered by 1 and the url will be loaded.

# INT +1 ( alt + )
Again first select a number in the textarea and press this button, 1 will be added to the number and the url will be loaded.

# HEX -1 ( control alt - )
First select a number in the textarea and press this button, the number will be lowered by 1 and the url will be loaded.

# HEX +1 ( control alt + )
Again first select a number in the textarea and press this button, 1 will be added to the number and the url will be loaded.

# MD5 Hash ( alt m )
this is a standard hashing method, often used as an encryption method for passwords. It will MD5 hash the currently selected string.

# SHA-1/256
this is a standard hashing method, often used as an encryption method for passwords. It will SHA-1/256 hash the currently selected string.

# MySQL CHAR() ( alt y )
If quotes are escaped but you did find an SQL injection thats exploitable, you can use this button to convert lets say:
load_file('/etc/passwd') --> load_file(CHAR(47, 101, 116, 99, 47, 112, 97, 115, 115, 119, 100))
Thus omiting the use of quotes to load a file.
You can also use this on
WHERE foo LIKE ('%bar%') --> WHERE foo LIKE (CHAR(37, 98, 97, 114, 37))

# MsSQL CHAR() ( alt q )
Same story as MySQL CHAR(), MsSQL has a slightly different CHAR syntax
--> WHERE foo LIKE ( CHAR(37) + CHAR(98) + CHAR(97) + CHAR(114) + CHAR(37))

# Base64 encode / decode
Base64 encoding ( UU ) is often used to store data (like a return url etc.) This will help you to read those values.

# URLencode / decode
This will encode or decode the currently selected characters to url safe characters. I mostly use it to end a query with # (%23) when in a pseudo path where i cant use /* or
"
by
amarjit

Permalink

 


Monday, 30. April 2012
maxisploit-scanner
This tool has three purposes :

1. SQL injection :

a)Error based: it scans for vulnerable websites based on common SQL errors for variety of databases.

b)Difference (true/false) scan: it scans for sites that do not display SQL errors but yet are vulnerable , the concept behind this scan is true / false query to the database which will give different answers which will then be scanned and in case of difference in length and content site will be considered vulnerable.

2.XSS scanner : it encrypts XSS vector and tries to scan result from web server , if XSS vector is found inside source than site is vulnerable. It only uses GET request to web server. NOTE: It will scan for XSS vector but it will not test if alert or any other event really happened.

3. Admin scanner : it scans for admin login locations , based on default list or any other that you have supplied.Response code 200 and 306 is considered success.

4. Shared hosting scanner : it send request to sameip.org and then parses html for pages

Download
http://code.google.com/p/maxisploit-scanner/downloads/list

Permalink

 


Saturday, 28. April 2012
BackBox Linux 2.05 released!
"The BackBox team is proud to announce the release 2.05 of BackBox Linux. The new release include features such as Ubuntu 11.04, Linux Kernel 2.6.38 and Xfce 4.8.0. The ISO images (32bit & 64bit)"

Download
http://www.backbox.org/downloads

BackBox is a GNU/Linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments. Designed to be fast, easy to use and provide a minimal yet complete desktop environment, thanks to its own software repositories, always being updated to the latest stable version of the most used and best known ethical hacking tools.

Permalink

 


Dirfuzz
This is a tool for directory discovery of web applications, by default it uses a dictionary
based approach which is in data/fdirs.txt it can also use the crawler module to find links
up to 1 level of depth.

Info
https://github.com/matugm/dirfuzz/#readme

Download
https://github.com/matugm/dirfuzz/tarball/master

Permalink

 


Wednesday, 18. April 2012
Ra.2 - xss-scanner
Ra.2 is basically a lighweight Mozilla Firefox Add-on that uses a very simple yet effective and unique approach to detect most DOM-based XSS vulnerabilities, if not all. Well it needs to work on it’s speed but tools great.

Download
http://code.google.com/p/ra2-dom-xss-scanner/downloads/list

Permalink

 


Monday, 2. April 2012
X-Scan
Create: 2005-07-18
X-Scan is a general scanner for scanning network vulnerabilities for specific IP address scope or stand-alone computer by multi-threading method, plug-ins are supportable. Which X-Scan feature include in the following: service type, remote OS type and version detection, weak user/password pair, and all of the nessus attack scripts combination.

Download
http://xfocus.org/programs/200507/X-Scan-v3.3-en.rar

Permalink

 


Thursday, 29. March 2012
WebSploit
WebSploit Is a open source tool for :
Metasploit Module's

Scan, Analysis, & Exploit Target Service's (use autopwn)
Scan, Crawler Target Web
Inject Custom Payload Into File Format's
Scan & Find Admin Page Of Target Site
Scan & Find User's Of Apache WebServer
Scan & Find Local File Inclusion Vulnerability's
Brute Force Target Website Folders (Directory Brute Forcer)
Scan PHPMyAdmin Page's (All Version)

Download
http://sourceforge.net/projects/websploit/files/WebSploit%20Toolkit%20V.1.5/

Permalink

 


Friday, 23. March 2012
Configuration Check Tool
eEye Digital Security, the industry’s leading innovator of threat management solutions, just released new research, “Working Toward Configuration Best Practices” . Findings verify that proper configuration and mitigations remain the most effective way to secure IT infrastructure.

Info PDF
http://www.eeye.com/eEyeDigitalSecurity/media/ResearchPapers/eEye_ICWST_WP.pdf

Download
http://go.eeye.com/icwt

Permalink

 


Tuesday, 20. March 2012
RIPS - PHP Vulnerabilities Scanner
Features

detect XSS, SQLi, File disclosure, LFI/RFI, RCE vulnerabilities and more
5 verbosity levels for debugging your scan results
mark vulnerable lines in source code viewer
highlight variables in the code viewer
user-defined function code by mouse-over on detected call
active jumping between function declaration and calls
list of all user-defined functions (defines and calls), program entry points (user input) and scanned files (with includes) connected to the source code viewer
graph visualization for files and includes as well as functions and calls
create CURL exploits for detected vulnerabilties with few clicks
visualization, description, example, PoC, patch and securing function list for every vulnerability
7 different syntax highlighting colour schemata
display scan result in form of a top-down flow or bottom-up trace
only minimal requirement is a local webserver with PHP and a browser (tested with Firefox)
regex search function


Download
http://sourceforge.net/projects/rips-scanner/files/

Permalink