Saturday, 19. May 2012
web-sorrow - Linux
Am Saturday, 19. May 2012 im Topic 'Pentest'
A perl based tool used for checking a Web server for misconfiguration, version detection, enumeration, and server information. I will build more Functionality in the future. what is's NOT: Vulnerably scanner, inspection proxy, DDoS tool, exploitation framework. It's entirely focused on Enumeration and collecting Info on the target server
EXAMPLES:
basic: perl Wsorrow.pl -host scanme.nmap.org -S
look for login pages: perl Wsorrow.pl -host 192.168.1.1 -auth
CMS intense scan: perl Wsorrow.pl -host 192.168.1.1 -Ws -Cp all -I
most intense scan possible: perl Wsorrow.pl -host 192.168.1.1 -e -ua "I come in peace"
Download
http://code.google.com/p/web-sorrow/downloads/list
EXAMPLES:
basic: perl Wsorrow.pl -host scanme.nmap.org -S
look for login pages: perl Wsorrow.pl -host 192.168.1.1 -auth
CMS intense scan: perl Wsorrow.pl -host 192.168.1.1 -Ws -Cp all -I
most intense scan possible: perl Wsorrow.pl -host 192.168.1.1 -e -ua "I come in peace"
Download
http://code.google.com/p/web-sorrow/downloads/list
Friday, 4. May 2012
HackBar 1.6.1 - Add-on
Am Friday, 4. May 2012 im Topic 'Pentest'
This toolbar will help you in testing sql injections, XSS holes and site security. It is NOT a tool for executing standard exploits and it will NOT teach you how to hack a site. Its main purpose is to help a developer do security audits on his code. If you know what your doing, this toolbar will help you do it faster.
Download
https://addons.mozilla.org/en-US/firefox/addon/hackbar/
"
# Load url ( alt a )
This loads the url of the current page into the textarea.
# Split url ( alt s )
When this button is clicked, the url/text in the textarea will be split into multiple lines using the ? and & character
# Execute ( alt x, ctrl enter )
This will execute the current url in the textarea, i mostly use ctrl+enter
# INT -1 ( alt - )
First select a number in the textarea and press this button, the number will be lowered by 1 and the url will be loaded.
# INT +1 ( alt + )
Again first select a number in the textarea and press this button, 1 will be added to the number and the url will be loaded.
# HEX -1 ( control alt - )
First select a number in the textarea and press this button, the number will be lowered by 1 and the url will be loaded.
# HEX +1 ( control alt + )
Again first select a number in the textarea and press this button, 1 will be added to the number and the url will be loaded.
# MD5 Hash ( alt m )
this is a standard hashing method, often used as an encryption method for passwords. It will MD5 hash the currently selected string.
# SHA-1/256
this is a standard hashing method, often used as an encryption method for passwords. It will SHA-1/256 hash the currently selected string.
# MySQL CHAR() ( alt y )
If quotes are escaped but you did find an SQL injection thats exploitable, you can use this button to convert lets say:
load_file('/etc/passwd') --> load_file(CHAR(47, 101, 116, 99, 47, 112, 97, 115, 115, 119, 100))
Thus omiting the use of quotes to load a file.
You can also use this on
WHERE foo LIKE ('%bar%') --> WHERE foo LIKE (CHAR(37, 98, 97, 114, 37))
# MsSQL CHAR() ( alt q )
Same story as MySQL CHAR(), MsSQL has a slightly different CHAR syntax
--> WHERE foo LIKE ( CHAR(37) + CHAR(98) + CHAR(97) + CHAR(114) + CHAR(37))
# Base64 encode / decode
Base64 encoding ( UU ) is often used to store data (like a return url etc.) This will help you to read those values.
# URLencode / decode
This will encode or decode the currently selected characters to url safe characters. I mostly use it to end a query with # (%23) when in a pseudo path where i cant use /* or
"
by
amarjit
Download
https://addons.mozilla.org/en-US/firefox/addon/hackbar/
"
# Load url ( alt a )
This loads the url of the current page into the textarea.
# Split url ( alt s )
When this button is clicked, the url/text in the textarea will be split into multiple lines using the ? and & character
# Execute ( alt x, ctrl enter )
This will execute the current url in the textarea, i mostly use ctrl+enter
# INT -1 ( alt - )
First select a number in the textarea and press this button, the number will be lowered by 1 and the url will be loaded.
# INT +1 ( alt + )
Again first select a number in the textarea and press this button, 1 will be added to the number and the url will be loaded.
# HEX -1 ( control alt - )
First select a number in the textarea and press this button, the number will be lowered by 1 and the url will be loaded.
# HEX +1 ( control alt + )
Again first select a number in the textarea and press this button, 1 will be added to the number and the url will be loaded.
# MD5 Hash ( alt m )
this is a standard hashing method, often used as an encryption method for passwords. It will MD5 hash the currently selected string.
# SHA-1/256
this is a standard hashing method, often used as an encryption method for passwords. It will SHA-1/256 hash the currently selected string.
# MySQL CHAR() ( alt y )
If quotes are escaped but you did find an SQL injection thats exploitable, you can use this button to convert lets say:
load_file('/etc/passwd') --> load_file(CHAR(47, 101, 116, 99, 47, 112, 97, 115, 115, 119, 100))
Thus omiting the use of quotes to load a file.
You can also use this on
WHERE foo LIKE ('%bar%') --> WHERE foo LIKE (CHAR(37, 98, 97, 114, 37))
# MsSQL CHAR() ( alt q )
Same story as MySQL CHAR(), MsSQL has a slightly different CHAR syntax
--> WHERE foo LIKE ( CHAR(37) + CHAR(98) + CHAR(97) + CHAR(114) + CHAR(37))
# Base64 encode / decode
Base64 encoding ( UU ) is often used to store data (like a return url etc.) This will help you to read those values.
# URLencode / decode
This will encode or decode the currently selected characters to url safe characters. I mostly use it to end a query with # (%23) when in a pseudo path where i cant use /* or
"
by
amarjit
Monday, 30. April 2012
maxisploit-scanner
Am Monday, 30. Apr 2012 im Topic 'Pentest'
This tool has three purposes :
1. SQL injection :
a)Error based: it scans for vulnerable websites based on common SQL errors for variety of databases.
b)Difference (true/false) scan: it scans for sites that do not display SQL errors but yet are vulnerable , the concept behind this scan is true / false query to the database which will give different answers which will then be scanned and in case of difference in length and content site will be considered vulnerable.
2.XSS scanner : it encrypts XSS vector and tries to scan result from web server , if XSS vector is found inside source than site is vulnerable. It only uses GET request to web server. NOTE: It will scan for XSS vector but it will not test if alert or any other event really happened.
3. Admin scanner : it scans for admin login locations , based on default list or any other that you have supplied.Response code 200 and 306 is considered success.
4. Shared hosting scanner : it send request to sameip.org and then parses html for pages
Download
http://code.google.com/p/maxisploit-scanner/downloads/list
1. SQL injection :
a)Error based: it scans for vulnerable websites based on common SQL errors for variety of databases.
b)Difference (true/false) scan: it scans for sites that do not display SQL errors but yet are vulnerable , the concept behind this scan is true / false query to the database which will give different answers which will then be scanned and in case of difference in length and content site will be considered vulnerable.
2.XSS scanner : it encrypts XSS vector and tries to scan result from web server , if XSS vector is found inside source than site is vulnerable. It only uses GET request to web server. NOTE: It will scan for XSS vector but it will not test if alert or any other event really happened.
3. Admin scanner : it scans for admin login locations , based on default list or any other that you have supplied.Response code 200 and 306 is considered success.
4. Shared hosting scanner : it send request to sameip.org and then parses html for pages
Download
http://code.google.com/p/maxisploit-scanner/downloads/list
Saturday, 28. April 2012
BackBox Linux 2.05 released!
Am Saturday, 28. Apr 2012 im Topic 'Pentest'
"The BackBox team is proud to announce the release 2.05 of BackBox Linux. The new release include features such as Ubuntu 11.04, Linux Kernel 2.6.38 and Xfce 4.8.0. The ISO images (32bit & 64bit)"
Download
http://www.backbox.org/downloads
BackBox is a GNU/Linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments. Designed to be fast, easy to use and provide a minimal yet complete desktop environment, thanks to its own software repositories, always being updated to the latest stable version of the most used and best known ethical hacking tools.
Download
http://www.backbox.org/downloads
BackBox is a GNU/Linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments. Designed to be fast, easy to use and provide a minimal yet complete desktop environment, thanks to its own software repositories, always being updated to the latest stable version of the most used and best known ethical hacking tools.
Dirfuzz
Am Saturday, 28. Apr 2012 im Topic 'Pentest'
This is a tool for directory discovery of web applications, by default it uses a dictionary
based approach which is in data/fdirs.txt it can also use the crawler module to find links
up to 1 level of depth.
Info
https://github.com/matugm/dirfuzz/#readme
Download
https://github.com/matugm/dirfuzz/tarball/master
based approach which is in data/fdirs.txt it can also use the crawler module to find links
up to 1 level of depth.
Info
https://github.com/matugm/dirfuzz/#readme
Download
https://github.com/matugm/dirfuzz/tarball/master
Wednesday, 18. April 2012
Ra.2 - xss-scanner
Am Wednesday, 18. Apr 2012 im Topic 'Pentest'
Ra.2 is basically a lighweight Mozilla Firefox Add-on that uses a very simple yet effective and unique approach to detect most DOM-based XSS vulnerabilities, if not all. Well it needs to work on it’s speed but tools great.
Download
http://code.google.com/p/ra2-dom-xss-scanner/downloads/list
Download
http://code.google.com/p/ra2-dom-xss-scanner/downloads/list
Monday, 2. April 2012
X-Scan
Am Monday, 2. Apr 2012 im Topic 'Pentest'
Create: 2005-07-18
X-Scan is a general scanner for scanning network vulnerabilities for specific IP address scope or stand-alone computer by multi-threading method, plug-ins are supportable. Which X-Scan feature include in the following: service type, remote OS type and version detection, weak user/password pair, and all of the nessus attack scripts combination.
Download
http://xfocus.org/programs/200507/X-Scan-v3.3-en.rar
X-Scan is a general scanner for scanning network vulnerabilities for specific IP address scope or stand-alone computer by multi-threading method, plug-ins are supportable. Which X-Scan feature include in the following: service type, remote OS type and version detection, weak user/password pair, and all of the nessus attack scripts combination.
Download
http://xfocus.org/programs/200507/X-Scan-v3.3-en.rar
Thursday, 29. March 2012
WebSploit
Am Thursday, 29. Mar 2012 im Topic 'Pentest'
WebSploit Is a open source tool for :
Metasploit Module's
Scan, Analysis, & Exploit Target Service's (use autopwn)
Scan, Crawler Target Web
Inject Custom Payload Into File Format's
Scan & Find Admin Page Of Target Site
Scan & Find User's Of Apache WebServer
Scan & Find Local File Inclusion Vulnerability's
Brute Force Target Website Folders (Directory Brute Forcer)
Scan PHPMyAdmin Page's (All Version)
Download
http://sourceforge.net/projects/websploit/files/WebSploit%20Toolkit%20V.1.5/
Metasploit Module's
Scan, Analysis, & Exploit Target Service's (use autopwn)
Scan, Crawler Target Web
Inject Custom Payload Into File Format's
Scan & Find Admin Page Of Target Site
Scan & Find User's Of Apache WebServer
Scan & Find Local File Inclusion Vulnerability's
Brute Force Target Website Folders (Directory Brute Forcer)
Scan PHPMyAdmin Page's (All Version)
Download
http://sourceforge.net/projects/websploit/files/WebSploit%20Toolkit%20V.1.5/
Friday, 23. March 2012
Configuration Check Tool
Am Friday, 23. Mar 2012 im Topic 'Pentest'
eEye Digital Security, the industry’s leading innovator of threat management solutions, just released new research, “Working Toward Configuration Best Practices” . Findings verify that proper configuration and mitigations remain the most effective way to secure IT infrastructure.
Info PDF
http://www.eeye.com/eEyeDigitalSecurity/media/ResearchPapers/eEye_ICWST_WP.pdf
Download
http://go.eeye.com/icwt
Info PDF
http://www.eeye.com/eEyeDigitalSecurity/media/ResearchPapers/eEye_ICWST_WP.pdf
Download
http://go.eeye.com/icwt
Tuesday, 20. March 2012
RIPS - PHP Vulnerabilities Scanner
Am Tuesday, 20. Mar 2012 im Topic 'Pentest'
Features
detect XSS, SQLi, File disclosure, LFI/RFI, RCE vulnerabilities and more
5 verbosity levels for debugging your scan results
mark vulnerable lines in source code viewer
highlight variables in the code viewer
user-defined function code by mouse-over on detected call
active jumping between function declaration and calls
list of all user-defined functions (defines and calls), program entry points (user input) and scanned files (with includes) connected to the source code viewer
graph visualization for files and includes as well as functions and calls
create CURL exploits for detected vulnerabilties with few clicks
visualization, description, example, PoC, patch and securing function list for every vulnerability
7 different syntax highlighting colour schemata
display scan result in form of a top-down flow or bottom-up trace
only minimal requirement is a local webserver with PHP and a browser (tested with Firefox)
regex search function
Download
http://sourceforge.net/projects/rips-scanner/files/
detect XSS, SQLi, File disclosure, LFI/RFI, RCE vulnerabilities and more
5 verbosity levels for debugging your scan results
mark vulnerable lines in source code viewer
highlight variables in the code viewer
user-defined function code by mouse-over on detected call
active jumping between function declaration and calls
list of all user-defined functions (defines and calls), program entry points (user input) and scanned files (with includes) connected to the source code viewer
graph visualization for files and includes as well as functions and calls
create CURL exploits for detected vulnerabilties with few clicks
visualization, description, example, PoC, patch and securing function list for every vulnerability
7 different syntax highlighting colour schemata
display scan result in form of a top-down flow or bottom-up trace
only minimal requirement is a local webserver with PHP and a browser (tested with Firefox)
regex search function
Download
http://sourceforge.net/projects/rips-scanner/files/
... ältere Einträge