... neuere Einträge
Sunday, 25. September 2011
Most Read Top 5
Am Sunday, 25. Sep 2011 im Topic 'News'
1 209 20.07.11 winAUTOPWN v2.7
2 120 15.09.11 Backtrack 5 Wireless Penetration Testing
3 115 28.08.11 Killapache - DDOS tool - Perl
4 114 24.07.11 Ani Shell - PHP
5 97 20.07.11 BackTrack 5 Release 1
2 120 15.09.11 Backtrack 5 Wireless Penetration Testing
3 115 28.08.11 Killapache - DDOS tool - Perl
4 114 24.07.11 Ani Shell - PHP
5 97 20.07.11 BackTrack 5 Release 1
Friday, 23. September 2011
PenTBox
Am Friday, 23. Sep 2011 im Topic 'Pentest'
PenTBox is a Security Suite that packs security and stability testing oriented tools for networks and systems.
Programmed in Ruby and oriented to GNU/Linux systems, but compatible with Windows, MacOS and every systems where Ruby works.
Download
http://www.pentbox.net/download-pentbox/
Programmed in Ruby and oriented to GNU/Linux systems, but compatible with Windows, MacOS and every systems where Ruby works.
Download
http://www.pentbox.net/download-pentbox/
Clickjacking For Shells
Am Friday, 23. Sep 2011 im Topic 'Vulnerabilities'
Bypassing Internet Explorer's XSS Filter
Am Friday, 23. Sep 2011 im Topic 'Vulnerabilities'
By default Internet Explorer 9 has a security system to help prevent Reflective XSS attacks. There are well known shortfalls of this system, most notably that it does not attempt to address DOM based XSS or Stored XSS. This security system is built on an arbitrary philosophy which only accounts for the most straight forward of reflective XSS attacks[1]. This paper is covering three attack patterns that undermine Internet Explorer’s ability to prevent Reflective XSS. These are general attack patterns that are independent of Web Application platform.
Download PDF
https://sitewat.ch/files/Bypassing%20Internet%20Explorer%27s%20XSS%20Filter.pdf
Download PDF
https://sitewat.ch/files/Bypassing%20Internet%20Explorer%27s%20XSS%20Filter.pdf
BruCON Agnitio workshop
Am Friday, 23. Sep 2011 im Topic 'Tutorials'
Required for the Agnitio hands on demos:
A 32bit Windows Operating System (XP or 7 preferably – VM will be fine)
.NET framework 3.5 installed
Agnitio v2.0 installed
http://sourceforge.net/projects/agnitiotool/
Download the Pandemobium Android and iOS source code
https://github.com/denimgroup/Pandemobium
Download the selected vulnerable open source application
https://github.com/denimgroup/Pandemobium
by David Rook (Security Ninja)
A 32bit Windows Operating System (XP or 7 preferably – VM will be fine)
.NET framework 3.5 installed
Agnitio v2.0 installed
http://sourceforge.net/projects/agnitiotool/
Download the Pandemobium Android and iOS source code
https://github.com/denimgroup/Pandemobium
Download the selected vulnerable open source application
https://github.com/denimgroup/Pandemobium
by David Rook (Security Ninja)
Script to audit web applications - Perl
Am Friday, 23. Sep 2011 im Topic 'Source Code'
Features and changes made in lilith
got rid of many many false positives (that’s good)
when SQL error is found, it now goes onto next var
improved (i hope) scanning engine
(anti) coldfusion support
better cookie handling and cookie tampering
omitted perl HTML::Form limitation
better verbose output
extensive logging
detects directory indexing
recursive URL dissection
cleaned up this pasta code
Download
http://michaelhendrickx.com/wp-content/uploads/2008/11/lilith-06atar.gz
got rid of many many false positives (that’s good)
when SQL error is found, it now goes onto next var
improved (i hope) scanning engine
(anti) coldfusion support
better cookie handling and cookie tampering
omitted perl HTML::Form limitation
better verbose output
extensive logging
detects directory indexing
recursive URL dissection
cleaned up this pasta code
Download
http://michaelhendrickx.com/wp-content/uploads/2008/11/lilith-06atar.gz
Android vulnerabilities
Am Friday, 23. Sep 2011 im Topic 'Vulnerabilities'
The first vulnerability is known as a “Permission escalation vulnerability”, and allows attackers to install additional “arbitrary applications with arbitrary permissions”, without first asking the user if they want to permit such actions. This would allow attackers to access call records, texts, web browsing history and media stored on the device.
The second bug only affects the Samsung Nexus S smartphone. It lets attackers gain root access on the device, providing them with full control over the handset. Google has yet to address the security issues.
The second bug only affects the Samsung Nexus S smartphone. It lets attackers gain root access on the device, providing them with full control over the handset. Google has yet to address the security issues.
Tuesday, 20. September 2011
Avira Internet Security 2012 License Key - Free
Am Tuesday, 20. Sep 2011 im Topic 'Web Security'
Avira is looking to capture the market with this new kind of promotion. Avira has declared that they are going to add one month subscription for every 10,000 new fans. In other words, if Avira receives 120,000 fans during the promo campaign then 12 months subscription (1 year) will be added to the license key. The promo campaign will end on October 17, 2011.
Click here "http://www.facebook.com/avira?sk=app_28134323652" to visit promo page on facebook and click on the “Like” button.
Click on the “Enter Sweepstakes” button, and then allow the sweepstakes application to access your profile information.
Fill up the “Entry Form” and click on the “Submit” button.
You have successfully applied for this promo. Just to make sure, check your email. You should receive an email from notifications@wildfireapp.com about your successfully entry.
Click here "http://www.facebook.com/avira?sk=app_28134323652" to visit promo page on facebook and click on the “Like” button.
Click on the “Enter Sweepstakes” button, and then allow the sweepstakes application to access your profile information.
Fill up the “Entry Form” and click on the “Submit” button.
You have successfully applied for this promo. Just to make sure, check your email. You should receive an email from notifications@wildfireapp.com about your successfully entry.
TSRC - Application level attack
Am Tuesday, 20. Sep 2011 im Topic 'Vulnerabilities'
TSRC - Application level attack
Session Race Conditions and Session Puzzling
A few months ago Shay Chen, Senior Manager at Hacktics Advanced Security Center (HASC) published a paper about Session Puzzling, a new application level attack vector of critical severity and numerous uses, but for some bizarre reasons, most of the responses I got was that the attack was too complicated to comprehend all it once.
The project home page (presentation, whitepaper, training kit)
http://code.google.com/p/puzzlemall/
The following movies demonstrate a few simple TSRC attacks:
Exploiting Temporal Session Race Conditions via Connection Pool Consumption:
http://www.youtube.com/watch?v=woWECWwrsSk
Exploiting Temporal Session Race Conditions via RegEx DoS:
http://www.youtube.com/watch?v=3k_eJ1bcCro
Session Race Conditions and Session Puzzling
A few months ago Shay Chen, Senior Manager at Hacktics Advanced Security Center (HASC) published a paper about Session Puzzling, a new application level attack vector of critical severity and numerous uses, but for some bizarre reasons, most of the responses I got was that the attack was too complicated to comprehend all it once.
The project home page (presentation, whitepaper, training kit)
http://code.google.com/p/puzzlemall/
The following movies demonstrate a few simple TSRC attacks:
Exploiting Temporal Session Race Conditions via Connection Pool Consumption:
http://www.youtube.com/watch?v=woWECWwrsSk
Exploiting Temporal Session Race Conditions via RegEx DoS:
http://www.youtube.com/watch?v=3k_eJ1bcCro
NetworkMiner
Am Tuesday, 20. Sep 2011 im Topic 'Web Security'
NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows. NetworkMiner can be used as a passive network sniffer/packet capturing tool in order to detect operating systems, sessions, hostnames, open ports etc. without putting any traffic on the network. NetworkMiner can also parse PCAP files for off-line analysis and to regenerate/reassemble transmitted files and certificates from PCAP files.NetworkMiner collects data (such as forensic evidence) about hosts on the network rather than to collect data regarding the traffic on the network. The main user interface view is host centric (information grouped per host) rather than packet centric (information showed as a list of packets/frames).
Download
http://sourceforge.net/projects/networkminer/files/networkminer/
Download
http://sourceforge.net/projects/networkminer/files/networkminer/
Sunday, 18. September 2011
SpyEye Botnet - SQL
Am Sunday, 18. Sep 2011 im Topic 'Vulnerabilities'
Exploit :
Vulnn type : Blind SQL injection
vuln script : frm_cards_edit.php
Affected version : ALL
May use any botnet from : https://spyeyetracker.abuse.ch/monitor.php
Download
http://pastebin.com/F46U8zwK
by
S4(uR4
Vulnn type : Blind SQL injection
vuln script : frm_cards_edit.php
Affected version : ALL
May use any botnet from : https://spyeyetracker.abuse.ch/monitor.php
Download
http://pastebin.com/F46U8zwK
by
S4(uR4
oclHashcat-plus v0.06
Am Sunday, 18. Sep 2011 im Topic 'Web Security'
Worlds fastest md5crypt, phpass, mscash2 and WPA/WPA2 cracker
oclHashcat-plus faster than every other WPA cracker. The highly anticipated v0.06 of the Graphics Processing Unit accelerated password cracker tool oclHashcat-plus was released today. What makes it so special about this release is that it now has support for captured Wi-Fi Protected Access handshake cracking on top of all the other algorithms currently supported (MD5, MD5 Crypt, DES Crypt, NTLM, Domain Cached Credentials etc). It cracks WPA at an estimated rate of 0-300% faster than rivals, namely the python WPA cracker pyrit. It is coded in OpenCL so both NVIDIA and AMD devices are supported, however this improvement is more noticeable on AMD GPU devices as well as Multi-GPU system
Download
http://hashcat.net/oclhashcat-plus/
oclHashcat-plus faster than every other WPA cracker. The highly anticipated v0.06 of the Graphics Processing Unit accelerated password cracker tool oclHashcat-plus was released today. What makes it so special about this release is that it now has support for captured Wi-Fi Protected Access handshake cracking on top of all the other algorithms currently supported (MD5, MD5 Crypt, DES Crypt, NTLM, Domain Cached Credentials etc). It cracks WPA at an estimated rate of 0-300% faster than rivals, namely the python WPA cracker pyrit. It is coded in OpenCL so both NVIDIA and AMD devices are supported, however this improvement is more noticeable on AMD GPU devices as well as Multi-GPU system
Download
http://hashcat.net/oclhashcat-plus/
WAVSEP 1.0.3
Am Sunday, 18. Sep 2011 im Topic 'Pentest'
Project WAVSEP currently includes the following test cases:
Vulnerabilities:
Reflected XSS: 66 test cases, implemented in 64 jsp pages (GET & POST)
Error Based SQL Injection: 80 test cases, implemented in 76 jsp pages (GET & POST )
Blind SQL Injection: 46 test cases, implemented in 44 jsp pages (GET & POST )
Time Based SQL Injection: 10 test cases, implemented in 10 jsp pages (GET & POST )
False Positives:
7 different categories of false positive Reflected XSS vulnerabilities (GET & POST )
10 different categories of false positive SQL Injection vulnerabilities (GET & POST)
Download
http://code.google.com/p/wavsep/downloads/list
Vulnerabilities:
Reflected XSS: 66 test cases, implemented in 64 jsp pages (GET & POST)
Error Based SQL Injection: 80 test cases, implemented in 76 jsp pages (GET & POST )
Blind SQL Injection: 46 test cases, implemented in 44 jsp pages (GET & POST )
Time Based SQL Injection: 10 test cases, implemented in 10 jsp pages (GET & POST )
False Positives:
7 different categories of false positive Reflected XSS vulnerabilities (GET & POST )
10 different categories of false positive SQL Injection vulnerabilities (GET & POST)
Download
http://code.google.com/p/wavsep/downloads/list
Balaji Plus Cloud Antivirus Scanner
Am Sunday, 18. Sep 2011 im Topic 'Malware Search'
Leo Impact Launch World first Antivirus scanning software which protects your PC from viruses, trojans, spyware, rootkits and other malicious programs (zero day exploits) by using 32+ antivirus on cloud. Most of time you can install and use only 2 to 3 antivirus in one system, not more so virus author bypass top antivirus but Balajiplus is Free service by Leo impact Security for Corporate Social Responsibility to protect your digital life using multiple antivirus scanners on cloud. Collective Intelligence, Balaji Antivirus Plus proprietary cloud-scanning technology that automatically collects and processes millions of malware samples, lies at the core of Balaji Cloud Antivirus. In recent comparative tests conducted by both AV-Test.org and AV-Comparatives.org, Balaji Antivirus Security's detection and protection scores rank consistently amongst the top security solutions.
Download
http://balajiplus.com/
Download
http://balajiplus.com/
Thursday, 15. September 2011
webadmin - Shell Upload Vulnerability
Am Thursday, 15. Sep 2011 im Topic 'Vulnerabilities'
Google Dork: intitle:"webadmin.php"
Download: http://wacker-welt.de/webadmin/webadmin.php.gz
by
Caddy-Dz
http://pastebin.com/6YbK7STU
Download: http://wacker-welt.de/webadmin/webadmin.php.gz
by
Caddy-Dz
http://pastebin.com/6YbK7STU
Backtrack 5 Wireless Penetration Testing
Am Thursday, 15. Sep 2011 im Topic 'Books change the World'
Even though touted as a Beginner's Guide, this book has something for everyone - from the kiddies to the Ninjas. You can purchase the book from:
Global: http://www.amazon.com/BackTrack-Wireless-Penetration-Testing-Beginners/dp/1849515581/
India: http://www.packtpub.com/backtrack-5-wireless-penetration-testing-beginners-guide/book
Sample Chapter can be downloaded here:
http://www.packtpub.com/sites/default/files/5580OS-Chapter-6-Attacking-the-Client_0.pdf
Download DVD
http://www.securitytube.net/downloads
Global: http://www.amazon.com/BackTrack-Wireless-Penetration-Testing-Beginners/dp/1849515581/
India: http://www.packtpub.com/backtrack-5-wireless-penetration-testing-beginners-guide/book
Sample Chapter can be downloaded here:
http://www.packtpub.com/sites/default/files/5580OS-Chapter-6-Attacking-the-Client_0.pdf
Download DVD
http://www.securitytube.net/downloads
Security Onion
Am Thursday, 15. Sep 2011 im Topic 'Pentest'
The Security Onion LiveDVD is a bootable DVD that contains software used for installing, configuring, and testing Intrusion Detection Systems. It is based on Xubuntu 10.04 and contains Snort, Suricata, Sguil, Squert, Xplico, nmap, metasploit, Armitage, scapy, hping, netcat, tcpreplay, and many other security tools.
Download
http://sourceforge.net/projects/security-onion/files/20110913/
Download
http://sourceforge.net/projects/security-onion/files/20110913/
Hook analyser
Am Thursday, 15. Sep 2011 im Topic 'Malware Search'
Hook analyser is a hook tool which can be potentially helpful in reversing applications and analysing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer. The tool can hook to an API in a process and can do following tasks.
Download
http://www.multiupload.com/WA9AJVQQYS
Download
http://www.multiupload.com/WA9AJVQQYS
... ältere Einträge