... neuere Einträge
Monday, 2. January 2012
Reaver Cracking WPA
Am Monday, 2. Jan 2012 im Topic 'Tools'
Reaver is a WPA attack tool developed by Tactical Network Solutions that exploits a protocol design flaw in WiFi Protected Setup (WPS). This vulnerability exposes a side-channel attack against Wi-Fi Protected Access (WPA) versions 1 and 2 allowing the extraction of the Pre-Shared Key (PSK) used to secure the network. With a well-chosen PSK, the WPA and WPA2 security protocols are assumed to be secure by a majority of the 802.11 security community.
Download
http://code.google.com/p/reaver-wps/downloads/list
Usage is simple just specify the target BSSID and the monitor mode interface to use:
# reaver -i mon0 -b 00:01:02:03:04:05
Info
http://securityxploit.blogger.de/stories/1970771/
Download
http://code.google.com/p/reaver-wps/downloads/list
Usage is simple just specify the target BSSID and the monitor mode interface to use:
# reaver -i mon0 -b 00:01:02:03:04:05
Info
http://securityxploit.blogger.de/stories/1970771/
Bluelog- Linux
Am Monday, 2. Jan 2012 im Topic 'Tools'
Bluelog is a simple Bluetooth scanner designed to tell you how many discoverable devices there are in an area as quickly as possible. It is written in C. That so eliminating compatibility issues in most platforms.
Download
ftp://ftp.digifail.com/downloads/software/bluelog/bluelog-1.0.0.tar.gz
Download
ftp://ftp.digifail.com/downloads/software/bluelog/bluelog-1.0.0.tar.gz
Lilupophilupop - SQL
Am Monday, 2. Jan 2012 im Topic 'Vulnerabilities'
Infections are shows on .com, .de, & .uk as the most affected regions.
If you want to find out if you have a problem just google for
by
Kumar
If you want to find out if you have a problem just google for
by
Kumar
Easy Router PIN
Am Monday, 2. Jan 2012 im Topic 'News'
There is a newly discovered vulnerability in the WiFi Protected Setup standard that reduces the number of attempts it would take an attacker to brute-force the PIN for a wireless router's setup process. The flaw results in too much information about the PIN being returned to an attacker and makes the PIN quite weak, affecting the security of millions of WiFi routers and access points. Security researcher Stefan Viehbock discovered the vulnerability (PDF)
Download PDF
http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf
Download PDF
http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf
Password Security Scanner
Am Monday, 2. Jan 2012 im Topic 'Tools'
This utility scans the passwords stored by popular Windows applications (Microsoft Outlook, Internet Explorer, Mozilla Firefox, and more...)
Supported Applications
Internet Explorer 4.0 - 6.0
Internet Explorer 7.0 - 9.0
Mozilla Firefox (All Versions)
Dialup/VPN passwords of Windows
MSN/Windows Messenger
Microsoft Outlook
Windows Live Mail
Download
http://www.nirsoft.net/utils/password_security_scanner.html
Supported Applications
Internet Explorer 4.0 - 6.0
Internet Explorer 7.0 - 9.0
Mozilla Firefox (All Versions)
Dialup/VPN passwords of Windows
MSN/Windows Messenger
Microsoft Outlook
Windows Live Mail
Download
http://www.nirsoft.net/utils/password_security_scanner.html
Canape - Network testing tool
Am Monday, 2. Jan 2012 im Topic 'Web Security'
CANAPE is a network testing tool for arbitrary protocols, but specifically designed for binary ones. It contains code to implement standard network proxies and provide the user the ability to capture and modify traffic to and from a server.The core can be extended through multiple .NET programming languages to parse protocols as required and implement custom proxies.Canape was released during Blackhat Europe 2012 where Context presented Canape with a worked example against Citrix ICA.
Download
http://www.contextis.co.uk/research/tools/canape/download/Canape%20Version%201.msi
Download
http://www.contextis.co.uk/research/tools/canape/download/Canape%20Version%201.msi
... ältere Einträge