PwnStar latest version with new Exploits released
- “hotspot_3″ is a simple phishing web page, used with basic menu option 4.
- “portal_simple” is a captive portal which allows you to edit the index.html with the name of the portal eg “Joe’s CyberCafe”. It is used for sniffing.
- “portal_hotspot3″ phishes credentials, and then allows clients through the portal to the internet
- “portal_pdf” forces the client to download a malicious pdf in order to pass through the portal
- captive-portal with iptables and php
- more php scripts added
- exploits added
- mdk3 and airdrop deauth
- manage interfaces and MACspoofing
- set up sniffing
- serve up phishing or malicious web pages
- launch karmetasploit
- grab WPA handshakes
- de-auth clients
- manage IPtables
Posted by Mohit Kumar at Saturday, November 10, 2012
SSLsplit v 0.4.5 - Man-in-the-middle attacks against SSL/TLS
Change Log:
- Add support for 2048 and 4096 bit Diffie-Hellman
- Fix syslog error messages
- Fix threading issues in daemon mode .
- Fix address family check in netfilter NAT lookup
- Fix build on recent glibc systems
- Minor code and build process improvements
Posted by Mohit Kumar at Saturday, November 10, 2012
NetSleuth : Open source Network Forensics And Analysis Tools
NetSleuth is an opensource network forensics and analysis tool, designed for triage in incident response situations. It can identify and fingerprint network hosts and devices from pcap files captured from Ethernet or WiFi data (from tools like Kismet).
- An easy realtime overview of what devices and what people are connected to any WiFi or Ethernet network.
- Free. The tool can be downloaded for free, and the source code is available under the GPL.
- Simple and cost effective. No requirement for hardware or reconfiguration of networks.
- “Silent portscanning” and undetectable network monitoring on WiFi and wired networks.
- Automatic identification of a vast array of device types, including smartphones, tablets, gaming consoles, printers, routers, desktops and more.
- Offline analysis of pcap files, from tools like Kismet or tcpdump, to aid in intrusion response and network forensics.
Posted by Mohit Kumar at Saturday, November 10, 2012
TXDNS v 2.2.1 - Aggressive multithreaded DNS digger
New features:
- Support AAAA(IPv6)record queries:
- -rr AAAA;
- Rewrite summarizing statistics using a thread-safe algorithm instead mutex.
Bug fixes:
- Fixed a problem when running under Windows XP;
- Fixed a problem when parsing a IPv6 address.
- November 9th, 2012 by Arley Silveira
Posted by Mohit Kumar at Saturday, November 10, 2012
Scylla v1 Penetration Testing Tool - Because there's no patch for human stupidity
Scylla provides all the power of what a real audit, intrusion, exclusion and analysis tool needs, giving the possibility of scanning misconfiguration bugs dynamically. Scylla aims to be a better tool for security auditors, extremely fast, designed based on real scenarios, developed by experienced coders and constructed with actual IT work methods.
The words “Configuration Tracer” are the best definition for Scylla, a tool to help on IT audits. Scylla is a tool to audit different online application protocols and configurations, built over a brute-force core.
This tool acts as a tool for unifying auditing techniques, in other words, it does what oscanner, winfingerprint, Hydra, DirBuster, and other tools do, and also what those tools don't do.
Supported Protocols
- Terminal (Telnet, SSH, telnets)
- FTP (FTPS, FTP, SFTP)
- SMB (Also Windows RPC)
- LDAP
- POP3 (POP3S)
- SMTP (SMTPS)
- IMAP
- MySql
- MSSQL
- Oracle (Database and TNS Listener)
- DB2 (Database and DAS)
- HTTP(HTTPS; Basic AUTH Brute Force, Digest AUTH Brute Force, Form Brute Force, Directory and files Brute Force)
- DNS (DNS snooping)
- Postgres SQL
Posted by Mohit Kumar at Thursday, November 01, 2012
Social-Engineer Toolkit (SET) 4.1.3 Released
Posted by Mohit Kumar at Friday, October 19, 2012
WebSploit Framework 2.0.3 with Wifi Jammer
[>]Social Engineering Works
[>]Scan,Crawler & Analysis Web
[>]Automatic Exploiter
[>]Support Network Attacks
----
[+]Autopwn - Used From Metasploit For Scan and Exploit Target Service
[+]wmap - Scan,Crawler Target Used From Metasploit wmap plugin
[+]format infector - inject reverse & bind payload into file format
[+]phpmyadmin Scanner
[+]LFI Bypasser
[+]Apache Users Scanner
[+]Dir Bruter
[+]admin finder
[+]MLITM Attack - Man Left In The Middle, XSS Phishing Attacks
[+]MITM - Man In The Middle Attack
[+]Java Applet Attack
[+]MFOD Attack Vector
[+]USB Infection Attack
[+]ARP Dos Attack
[+]Web Killer Attack
[+]Fake Update Attack
[+]Fake Access point Attack
Download WebSploit Framework 2.0.3
Posted by Mohit Kumar at Wednesday, October 17, 2012
dSploit v1.0.23b -- Android network penetration suite
- RouterPWN
- Launch the http://routerpwn.com/ service to pwn your router.
- Port Scanner
- A syn port scanner to find quickly open ports on a single target.
- Inspector
- Performs target operating system and services deep detection, slower than syn port scanner but more accurate.
- Vulnerability Finder
- Search for known vulnerabilities for target running services upon National Vulnerability Database.
- Login Cracker
- A very fast network logon cracker which supports many different services.
- Packet Forger
- Craft and send a custom TCP or UDP packet to the target.
- MITM
- A set of man-in-the-middle tools to command&conquer the whole network .
Posted by Mohit Kumar at Wednesday, October 17, 2012
Ettercap 0.7.5 released - codename "Assimilation"
- Fix versioning, flags.
- Need latest version of libnet that supports IPv6
- Fix gtk crash.
- Switched to git repo and CMAKE
- Now that IPv6 is supported the cli requires an extra “/”. To poison all hosts in a broadcast domain the command would be /// (Instead of // // in past versions.)
- Fixed Release tag and build flags, BZ 855504.
- Fixed Obsoletes, BZ 855067.
- Switch to git ettercap_rc branch for gtk crash, BZ 853791.
- Dropped UI and daemon patches.
- Merged subpackages, in part due to buildsystem change.
- Spec cleanup.
- Rebuilt for https ://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild
- Add hardened build.
- libnet rebuild.
- New upstream.
- Rebuild against PCRE 8.30
Posted by Mohit Kumar at Wednesday, October 17, 2012
ModSecurity 2.7.0 Stable Release
ModSecurity is a web application firewall that can work either embedded or as a reverse proxy. It provides protection from a range of attacks against web applications and allows for HTTP traffic monitoring, logging and real-time analysis.
- Internationalization (I18N) Support
- HMAC Token Injection to prevent data manipulation
- PCRE JIT Support to speed up regular expression operators
- Caching Lua VMs to speed up multiple scripts
- Ability to add exceptions based on TAG and MSG data
- Per-rule Performance information in audit log
Posted by Mohit Kumar at Wednesday, October 17, 2012
THC IPv6 Attack Toolkit v2.0 Released
Posted by Mohit Kumar at Thursday, October 11, 2012
Wireshark 1.8.3 Released
Posted by Mohit Kumar at Thursday, October 04, 2012
ARPwner - Arp poisoning and dns poisoning tool
Posted by Mohit Kumar at Thursday, October 04, 2012
Antiflood v-1.8.2 with IP tables bash script
Posted by Mohit Kumar at Tuesday, October 02, 2012
Social Engineer Toolkit 4.0 Released
The powershell attack vectors now support customized payload selection through the config/set_config. A new attack vector has been added called the Dell DRAC Attack Vector (default credential finder).
Download Social Engineer Toolkit 4.0:
svn co http://svn.trustedsec.com/social_engineering_toolkit set/
Posted by Mohit Kumar at Thursday, September 20, 2012
Covert VPN - VPN pivoting technology added to Cobalt Strike / Armitage
To activate Covert VPN, right-click a compromised host, go to Meterpreter -> Pivoting -> Deploy VPN. Select the remote interface you would like Covert VPN to bind to. If no local interface is present, press Add to create one.
Check Clone host MAC address to make your local interface have the same MAC address as the remote interface. It’s safest to leave this option checked.Select Inject VPN client into memory to deploy Covert VPN directly into memory. If this box is not checked, Cobalt Strike will upload and execute the Covert VPN client for you. The inject into memory option does not work reliably on Windows Vista, Windows 7, or 64-bit Windows XP.Press Deploy to start the Covert VPN client on the target. Covert VPN requires SYSTEM access to deploy.
Posted by Mohit Kumar at Friday, September 07, 2012
Network Security Toolkit v2.16.0-4104 Released
Posted by Mohit Kumar at Friday, September 07, 2012
PacketFence 3.5.1 - Network access control (NAC) solution
- FreeRADIUS watchdog updated for 3.5.0 changes (#1514)
- debian packages improvements regarding FreeRADIUS configuration
- cosmetic fix in `pfcmd service status` regarding pfdhcplistener (#1515)
- Guests are not able to confirm registration in some cases – take 2 (#1302)
- Sponsored guests regressions (#1505)
- Keep the PID on node_deregister (#1501)
- Handle the release_date on violation modify (#1474)
- Billing screen does not appear when billing feature is enabled (#1525)
- Web extension point regression (#1507)
- Command parsing issue with `pfcmd person` (#1523)
- pfdhcplistener process name identifies listened to interface (#1478)
- Guest management login and authentication regressions (#1518)
- FreeRADIUS documentation aligned with current practices
- More characters are allowed in password types on CLI and WebAdmin (#848)
- illegal characters in webservices user / pass not properly escaped (#1516)
Posted by Mohit Kumar at Friday, September 07, 2012
ZackAttack - Firesheep NTLM Authentication relaying
- The Rogue Servers - HTTP and SMB. These get the auth requests and keep recycling them
- The Clients - These connect to target servers and request NTLM creds from the Rogue Servers
- The Rules - Define auto actions to perform upon seeing a user.
- The Payloads - Methods to get users to autoauth with Integrated Windows Auth ergo not prompting the user for auth.
Posted by Mohit Kumar at Saturday, September 01, 2012
Etherwall v1.0 Beta 3 - Prevents Man in The Middle (MITM) Attack
- Daemon Processing
- ARP Packet Filtering
- Point to Point & Point to Multipoint Protection
- Realtime Protection
- System Logging
- Early Warning
- Support for networks Statically, Dynamically, or Both
- Supports for Ethernet Wired & Wireless interface (IEEE 802.3 & IEEE 802.11)
- Plugins / Tools
- Included Man Pages
- Easy to Use and Free
Posted by Mohit Kumar at Thursday, August 16, 2012