Pentoo 2013.0 RC1.1 Released
- Changes saving
- CUDA/OpenCL Enhanced cracking software
- John the ripper
- Hashcat Suite of tools
- Kernel 3.7.5 and all needed patches for injection
- XFCE 4.10
- All the latest tools and a responsive development team!
- Hardened Kernel with aufs patches
- Backported Wifi stack from latest stable kernel release
- Module loading support ala slax
- Changes saving on usb stick
- XFCE4 wm
- Cuda/OPENCL cracking support with development tools
- System updates if you got it finally installed
Posted by Mohit Kumar at Saturday, March 09, 2013
Snort 2.9.4.1 - Network intrusion detection system
- Updated File processing for partial HTTP content and MIME attachments.
- Addition of new config option max_attribute_services_per_host and improve memory usage within attribute table.
- Handle excessive overlaps in frag3.
- Stream API updates to return session key for a session.
- Reduce false positives for TCP window slam events.
- Updates to provide better encoding for TCP packets generated for respond and react.
- Disable non-Ethernet decoders by default for performance reasons. If needed, use --enable-non-ether-decoders with configure.
Posted by Mohit Kumar at Monday, March 04, 2013
Unhide Forensic Tool, Find hidden processes and ports
- Compare /proc vs /bin/ps output
- Compare info gathered from /bin/ps with info gathered by walking thru the procfs. ONLY for Linux 2.6 version
- Compare info gathered from /bin/ps with info gathered from syscalls (syscall scanning).
- Full PIDs space ocupation (PIDs bruteforcing). ONLY for Linux 2.6 version
- Compare /bin/ps output vs /proc, procfs walking and syscall. ONLY for Linux 2.6 version
- Reverse search, verify that all thread seen by ps are also seen in the kernel.
- 6- Quick compare /proc, procfs walking and syscall vs /bin/ps output. ONLY for Linux 2.6 version.
- Unhide-TCP
unhide-tcp is a forensic tool that identifies TCP/UDP ports that are listening but are not listed in /bin/netstat through brute forcing of all TCP/UDP ports available.
- -f Write a log file (unhide.log) in the current directory.
- -h Display help
- -m Do more checks. As of 2010-11-21 version, this option has only effect for the procfs, procall, checkopendir and checkchdir tests.
- -r Use alternate version of sysinfo check in standard tests
- -V Show version and exit
- -v Be verbose, display warning message (default : don't display). This option may be repeated more than once.
gcc –static unhide.c -o unhide
gcc -Wall -O2 –static unhide-tcp.c -o unhide-tcp
gcc -Wall -O2 –static -pthread unhide-linux26.c -o unhide-linux26
gcc -Wall -O2 -static -o unhide_rb unhide_rb.c
Available for Windows & Linux Platform. Download latest Version : Windows or Linux
Posted by Mohit Kumar at Friday, February 15, 2013
PwnPi v2.0 - A Pen Test Drop Box distro for the Raspberry Pi
Login username and password is root:root
Tools List:
Download Here
Posted by Mohit Kumar at Saturday, November 10, 2012
TXDNS v 2.2.1 - Aggressive multithreaded DNS digger
New features:
- Support AAAA(IPv6)record queries:
- -rr AAAA;
- Rewrite summarizing statistics using a thread-safe algorithm instead mutex.
Bug fixes:
- Fixed a problem when running under Windows XP;
- Fixed a problem when parsing a IPv6 address.
- November 9th, 2012 by Arley Silveira
Posted by Mohit Kumar at Saturday, November 10, 2012
ExploitShield Browser Edition - Forget about browser vulnerabilities
Posted by Mohit Kumar at Sunday, November 04, 2012
Wifi Honey - Creates fake APs using all encryption
Installing wifi honey
chmod a+x wifi_honey.sh
./wifi_honey.sh fake_wpa_net
./wifi_honey.sh fake_wpa_net 1 waln1
Download Wifi Honey
Posted by Mohit Kumar at Saturday, November 03, 2012
Burp Suite Free Edition v1.5 released
- Burp's UI has been completely overhauled, to improve looks and usability:
- Fonts are now available throughout the UI, with corresponding resizing of all UI elements (tables, dialogs, buttons, etc.).
- There are configurable hotkeys for all common functions.
- Intruder and Repeater now have smart tabs, which you can drag to reorder, and click to create, close or rename.
- Tables are natively sortable everywhere, except where the row ordering is part of the options you are configuring.
- Text fields now have context-aware auto-complete memory.
Posted by Mohit Kumar at Thursday, November 01, 2012
Penetration Testing Cheat Sheet from 'Average Security Guy'
Posted by Mohit Kumar at Thursday, November 01, 2012
BackBox Linux version 3.0 released
- System upgrade
- Bug corrections
- Performance boost
- Improved start menu
- Improved Wi-Fi dirvers (compat-wireless aircrack patched)
- New and updated hacking tools
- 32-bit or 64-bit processor
- 512 MB of system memory (RAM)
- 4.4 GB of disk space for installation
- Graphics card capable of 800×600 resolution
- DVD-ROM drive or USB port
Posted by Mohit Kumar at Thursday, November 01, 2012
DEFT 7.2 Released - Computer Forensic live system
- Virtual appliance based on Vmware 5 with USB3 support
- Kernel 3.0.0-26
- Autopsy 3 beta 5 (using Wine – please note that you need minimum 1GB ram)
- Log2tmeline 0.65
- Guymager 0.6.12-1
- Vmfs support
- Some mirror fix
Posted by Mohit Kumar at Thursday, November 01, 2012
Android Privacy Guard v1.0.8 - OpenPGP for Android
- HKP key server support
- app2sd support
- more pass phrase cache options: 1, 2, 4, 8 hours
- bugfixes
Posted by Mohit Kumar at Tuesday, October 23, 2012
OWASP Zed Attack Proxy (ZAP) Weekly Releases
- Completely rewritten 'traditional' Spider (c/o Cosmin Stefan and the GSoC)
- New Ajax Spider (using Crawljax, c/o Guifre Ruiz and the GSoC)
- Web sockets support (c/o Robert Koch and the GSoC)
- Performance improvements (both speed and memory)
- Session awareness
- Authentication handling
- Contexts
- Modes (Safe, Protected and Standard)
- Online links in menu
Posted by Mohit Kumar at Monday, October 22, 2012
ModSecurity 2.7.0 Stable Release
ModSecurity is a web application firewall that can work either embedded or as a reverse proxy. It provides protection from a range of attacks against web applications and allows for HTTP traffic monitoring, logging and real-time analysis.
- Internationalization (I18N) Support
- HMAC Token Injection to prevent data manipulation
- PCRE JIT Support to speed up regular expression operators
- Caching Lua VMs to speed up multiple scripts
- Ability to add exceptions based on TAG and MSG data
- Per-rule Performance information in audit log
Posted by Mohit Kumar at Wednesday, October 17, 2012
The Autopsy Forensic Browser v 3.0.0 released
Posted by Mohit Kumar at Wednesday, October 17, 2012
Server Analyser : Simple Server Malware Scanner
Posted by Mohit Kumar at Wednesday, October 17, 2012
Server Shield v1.0.2 - Protect your Linux machine in 1 minute
- Firewall Hardening
- TCP Hardening
- Data Leakage Protection
- ICMP/Ping Flood Protection
- Rootkit Protection
- DoS Protection
- Spoof Protection
- Bogus TCP Protection
- SYN Flood Protection
- Requires
- iptables ("yum install iptables")
Posted by Mohit Kumar at Sunday, October 14, 2012
Whonix ALPHA 0.4.5 - Anonymous Virtual operating system
- All applications, including those, which do not support proxy settings, will automatically be routed through Tor.
- Installation of any software package possible.
- Safe hosting of Hidden services possible.
- Protection against side channel attacks, no IP or DNS leaks possible^3^ To test for leaks, see LeakTests.
- Advantage over Live CD's: Tor's data directory is still available after reboot, due to persistent storage. Tor requires persistent storage to save it's Entry Guards.
- Java / JavaScript / flash / Browser Plugins / misconfigured applications cannot leak your real external IP.
- Whonix does even protect against root exploits (Malware with root rights) on the Workstation.
- Uses only Free Software.
- Building Whonix from source is easy.
- Tor+Vidalia and Tor Browser are not running inside the same machine. That means that for example an exploit in the browser can't affect the integrity of the Tor process.
- It is possible to use Whonix setup in conjunction with VPNs, ssh and other proxies. But see Tor plus VPN/proxies Warning. Everything possible, as first chain or last chain, or both.
- Loads of Optional Configurations (additional features / Add-Ons) available.
- Best possible Protocol-Leak-Protection and Fingerprinting-Protection.
Posted by Mohit Kumar at Saturday, October 13, 2012
SANS Investigative Forensic Toolkit 2.14 Released
- iPhone, Blackberry, and Android Forensic Capabilities
- Registry Viewer (YARU)
- Compatibility with F-Response Tactical, Standard, and Enterprise
- PTK 2.0 (Special Release – Not Available for Download)
- Automated Timeline Generation via log2timeline
- Many Firefox Investigative Plugins
- Windows Journal Parser and Shellbags Parser (jp and sbag)
- Many Windows Analysis Utilities (prefetch, usbstor, event log, and more)
- Complete Overhaul of Regripper Plugins (added over 80 additional plugins)
Posted by Mohit Kumar at Tuesday, October 09, 2012
Nessus 5.0.2 vulnerability scanner updates
- UTF8 encoding problems would sometimes cause the generation of reports to fail
- Fixed a case where generating some compliance checks reports would cause the scanner to hang, using 100% of the CPU
- Resolved a resource leak issue occurring when a large number of different users are connected at the same time .
- Network congestion errors are now detected more conservatively
- Upgraded libxml2, libxslt, openssl to their newest versions
- Some nessusd.rules directives were not honored by the port scanners
- Solaris 10 build
Posted by Mohit Kumar at Tuesday, October 09, 2012