Sunday, 25. September 2011
Most Read Top 5
1 209 20.07.11 winAUTOPWN v2.7
2 120 15.09.11 Backtrack 5 Wireless Penetration Testing
3 115 28.08.11 Killapache - DDOS tool - Perl
4 114 24.07.11 Ani Shell - PHP
5 97 20.07.11 BackTrack 5 Release 1

Permalink

 


Friday, 23. September 2011
PenTBox
PenTBox is a Security Suite that packs security and stability testing oriented tools for networks and systems.
Programmed in Ruby and oriented to GNU/Linux systems, but compatible with Windows, MacOS and every systems where Ruby works.

Download
http://www.pentbox.net/download-pentbox/

Permalink

 


Clickjacking For Shells

Permalink

 


Bypassing Internet Explorer's XSS Filter
By default Internet Explorer 9 has a security system to help prevent Reflective XSS attacks. There are well known shortfalls of this system, most notably that it does not attempt to address DOM based XSS or Stored XSS. This security system is built on an arbitrary philosophy which only accounts for the most straight forward of reflective XSS attacks[1]. This paper is covering three attack patterns that undermine Internet Explorer’s ability to prevent Reflective XSS. These are general attack patterns that are independent of Web Application platform.


Download PDF
https://sitewat.ch/files/Bypassing%20Internet%20Explorer%27s%20XSS%20Filter.pdf

Permalink

 


BruCON Agnitio workshop
Required for the Agnitio hands on demos:

A 32bit Windows Operating System (XP or 7 preferably – VM will be fine)
.NET framework 3.5 installed
Agnitio v2.0 installed
http://sourceforge.net/projects/agnitiotool/
Download the Pandemobium Android and iOS source code
https://github.com/denimgroup/Pandemobium
Download the selected vulnerable open source application
https://github.com/denimgroup/Pandemobium

by David Rook (Security Ninja)

Permalink

 


Script to audit web applications - Perl
Features and changes made in lilith

got rid of many many false positives (that’s good)
when SQL error is found, it now goes onto next var
improved (i hope) scanning engine
(anti) coldfusion support
better cookie handling and cookie tampering
omitted perl HTML::Form limitation
better verbose output
extensive logging
detects directory indexing
recursive URL dissection
cleaned up this pasta code

Download
http://michaelhendrickx.com/wp-content/uploads/2008/11/lilith-06atar.gz

Permalink

 


Android vulnerabilities
The first vulnerability is known as a “Permission escalation vulnerability”, and allows attackers to install additional “arbitrary applications with arbitrary permissions”, without first asking the user if they want to permit such actions. This would allow attackers to access call records, texts, web browsing history and media stored on the device.
The second bug only affects the Samsung Nexus S smartphone. It lets attackers gain root access on the device, providing them with full control over the handset. Google has yet to address the security issues.

Permalink

 


Tuesday, 20. September 2011
Avira Internet Security 2012 License Key - Free
Avira is looking to capture the market with this new kind of promotion. Avira has declared that they are going to add one month subscription for every 10,000 new fans. In other words, if Avira receives 120,000 fans during the promo campaign then 12 months subscription (1 year) will be added to the license key. The promo campaign will end on October 17, 2011.

Click here "http://www.facebook.com/avira?sk=app_28134323652" to visit promo page on facebook and click on the “Like” button.
Click on the “Enter Sweepstakes” button, and then allow the sweepstakes application to access your profile information.
Fill up the “Entry Form” and click on the “Submit” button.
You have successfully applied for this promo. Just to make sure, check your email. You should receive an email from notifications@wildfireapp.com about your successfully entry.

Permalink

 


TSRC - Application level attack
TSRC - Application level attack
Session Race Conditions and Session Puzzling

A few months ago Shay Chen, Senior Manager at Hacktics Advanced Security Center (HASC) published a paper about Session Puzzling, a new application level attack vector of critical severity and numerous uses, but for some bizarre reasons, most of the responses I got was that the attack was too complicated to comprehend all it once.

The project home page (presentation, whitepaper, training kit)
http://code.google.com/p/puzzlemall/

The following movies demonstrate a few simple TSRC attacks:

Exploiting Temporal Session Race Conditions via Connection Pool Consumption:
http://www.youtube.com/watch?v=woWECWwrsSk

Exploiting Temporal Session Race Conditions via RegEx DoS:
http://www.youtube.com/watch?v=3k_eJ1bcCro

Permalink

 


NetworkMiner
NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows. NetworkMiner can be used as a passive network sniffer/packet capturing tool in order to detect operating systems, sessions, hostnames, open ports etc. without putting any traffic on the network. NetworkMiner can also parse PCAP files for off-line analysis and to regenerate/reassemble transmitted files and certificates from PCAP files.NetworkMiner collects data (such as forensic evidence) about hosts on the network rather than to collect data regarding the traffic on the network. The main user interface view is host centric (information grouped per host) rather than packet centric (information showed as a list of packets/frames).

Download
http://sourceforge.net/projects/networkminer/files/networkminer/

Permalink

 


Sunday, 18. September 2011
SpyEye Botnet - SQL
Exploit :
Vulnn type : Blind SQL injection
vuln script : frm_cards_edit.php
Affected version : ALL
May use any botnet from : https://spyeyetracker.abuse.ch/monitor.php

Download
http://pastebin.com/F46U8zwK

by
S4(uR4

Permalink

 


oclHashcat-plus v0.06
Worlds fastest md5crypt, phpass, mscash2 and WPA/WPA2 cracker

oclHashcat-plus faster than every other WPA cracker. The highly anticipated v0.06 of the Graphics Processing Unit accelerated password cracker tool oclHashcat-plus was released today. What makes it so special about this release is that it now has support for captured Wi-Fi Protected Access handshake cracking on top of all the other algorithms currently supported (MD5, MD5 Crypt, DES Crypt, NTLM, Domain Cached Credentials etc). It cracks WPA at an estimated rate of 0-300% faster than rivals, namely the python WPA cracker pyrit. It is coded in OpenCL so both NVIDIA and AMD devices are supported, however this improvement is more noticeable on AMD GPU devices as well as Multi-GPU system

Download
http://hashcat.net/oclhashcat-plus/

Permalink

 


WAVSEP 1.0.3
Project WAVSEP currently includes the following test cases:
Vulnerabilities:

Reflected XSS: 66 test cases, implemented in 64 jsp pages (GET & POST)
Error Based SQL Injection: 80 test cases, implemented in 76 jsp pages (GET & POST )
Blind SQL Injection: 46 test cases, implemented in 44 jsp pages (GET & POST )
Time Based SQL Injection: 10 test cases, implemented in 10 jsp pages (GET & POST )


False Positives:

7 different categories of false positive Reflected XSS vulnerabilities (GET & POST )
10 different categories of false positive SQL Injection vulnerabilities (GET & POST)


Download
http://code.google.com/p/wavsep/downloads/list

Permalink

 


Balaji Plus Cloud Antivirus Scanner
Leo Impact Launch World first Antivirus scanning software which protects your PC from viruses, trojans, spyware, rootkits and other malicious programs (zero day exploits) by using 32+ antivirus on cloud. Most of time you can install and use only 2 to 3 antivirus in one system, not more so virus author bypass top antivirus but Balajiplus is Free service by Leo impact Security for Corporate Social Responsibility to protect your digital life using multiple antivirus scanners on cloud. Collective Intelligence, Balaji Antivirus Plus proprietary cloud-scanning technology that automatically collects and processes millions of malware samples, lies at the core of Balaji Cloud Antivirus. In recent comparative tests conducted by both AV-Test.org and AV-Comparatives.org, Balaji Antivirus Security's detection and protection scores rank consistently amongst the top security solutions.

Download
http://balajiplus.com/

Permalink

 


Thursday, 15. September 2011
webadmin - Shell Upload Vulnerability
Google Dork: intitle:"webadmin.php"
Download: http://wacker-welt.de/webadmin/webadmin.php.gz

by
Caddy-Dz

http://pastebin.com/6YbK7STU

Permalink

 


Backtrack 5 Wireless Penetration Testing
Even though touted as a Beginner's Guide, this book has something for everyone - from the kiddies to the Ninjas. You can purchase the book from:
Global: http://www.amazon.com/BackTrack-Wireless-Penetration-Testing-Beginners/dp/1849515581/
India: http://www.packtpub.com/backtrack-5-wireless-penetration-testing-beginners-guide/book

Sample Chapter can be downloaded here:
http://www.packtpub.com/sites/default/files/5580OS-Chapter-6-Attacking-the-Client_0.pdf

Download DVD
http://www.securitytube.net/downloads

Permalink

 


Security Onion
The Security Onion LiveDVD is a bootable DVD that contains software used for installing, configuring, and testing Intrusion Detection Systems. It is based on Xubuntu 10.04 and contains Snort, Suricata, Sguil, Squert, Xplico, nmap, metasploit, Armitage, scapy, hping, netcat, tcpreplay, and many other security tools.

Download
http://sourceforge.net/projects/security-onion/files/20110913/

Permalink

 


Hook analyser
Hook analyser is a hook tool which can be potentially helpful in reversing applications and analysing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer. The tool can hook to an API in a process and can do following tasks.

Download
http://www.multiupload.com/WA9AJVQQYS

Permalink