Showing posts with label PHP. Show all posts
Showing posts with label PHP. Show all posts
Weevely : Stealth PHP web shell with telnet style console
Labels:
backtrack,
Hacking Tools,
PHP,
PHP web shell,
post exploitation,
script,
shell server,
Weevely
- More than 30 modules to automatize administration and post exploitation tasks:
- Execute commands and browse remote filesystem, even with PHP security restriction
- Audit common server misconfigurations
- Run SQL console pivoting on target machine
- Proxy your HTTP traffic through target
- Mount target filesystem to local mount point
- Simple file transfer from and to target
- Spawn reverse and direct TCP shells
- Bruteforce SQL accounts through target system
- Run port scans from target machine
- And so on..
- Backdoor communications are hidden in HTTP Cookies
- Communications are obfuscated to bypass NIDS signature detection
- Backdoor polymorphic PHP code is obfuscated to avoid HIDS AV detection
Subscribe to our Daily Newsletter via email - Be First to know about Security and Penetration testing tools. or Join our Huge Hackers Community on Facebook , Google+ and Twitter .
Subscribe Top Hacker Stories via email
Posted by Mohit Kumar at Friday, February 15, 2013
WordPress Version Checker - MD5 Hash Method
Labels:
Codes,
penetration testing,
PHP,
Scanners,
Vulnerability Assessment
WordPress Version Check provides you with an easy way of checking that which version your Victim is using. It is a simple php Script based upon MD5 Hash Method.
You can download the Script from Pastebin: http://pastebin.com/3c72K1kj
You can download the Script from Pastebin: http://pastebin.com/3c72K1kj
Subscribe to our Daily Newsletter via email - Be First to know about Security and Penetration testing tools. or Join our Huge Hackers Community on Facebook , Google+ and Twitter .
Subscribe Top Hacker Stories via email
Posted by Mohit Kumar at Tuesday, October 02, 2012
OWASP OWTF 0.15 - The Offensive Testing Framework
Labels:
Hacking Tools,
PHP,
Security Tools,
Vulnerability Assessment
The Offensive (Web, etc) Testing Framework (aka OWTF) is an OWASP+PTES-focused try to unite great tools and make penetration testing more efficient. The purpose of this tool is to automate the manual, uncreative part of penetration testing.
Features
- OWASP Testing Guide-oriented: owtf will try to classify the findings as closely as possible to the OWASP Testing Guide
- Report updated on the fly: As soon as each plugin finishes or sometimes before (i.e. after each vulnerability scanner finishes)
- "Scumbag spidering": Instead of implementing yet another spider (a hard job), owtf will scrub the output of all tools/plugins run to gather as many URLs as possible. This is somewhat "cheating" but tremendously effective since it combines the results of different tools, including several tools that perform brute forcing of files and directories.
- Resilience: If one tool crashes owtf will move on to the next tool/test, saving the partial output of the tool until it crashed
- Easy to configure: config files are easy to read and modify
- Easy to run: No strange parameters, DB setup requirements, libraries, complex dependencies, etc
- Full control of what tests to run, interactivity and hopefully easy to follow examples and help :)
- Easy to review trasaction log and plain text files with URLs, simple for scripting
- Basic Google Hacking without (annoying) API Key requirements via "blanket searches", trying a bunch of operators at once, you can then narrow the search down if you find something interesting.
- Easy to extract data from the database to parse or pass to other tools: They are all text files
Subscribe to our Daily Newsletter via email - Be First to know about Security and Penetration testing tools. or Join our Huge Hackers Community on Facebook , Google+ and Twitter .
Subscribe Top Hacker Stories via email
Posted by Mohit Kumar at Tuesday, October 02, 2012
Antiflood v-1.8.2 with IP tables bash script
Labels:
Codes,
Network Hacking,
PHP,
Security Tools
This module provides security enhancements against (HTTP) Flood & Brute Force Attacks for native PHP or .NET scripts at web application level. Massive crawling/scanning tools, HTTP flood tools can be detected and blocked by this module via htaccess or iptables, etc. You can use this module by including "iosec.php" to any PHP file which wants to be protected.
Features :
This is a unique project and it is the world's first web application flood guard script.
At web application (scripting) level you can,
- Block proxies. (only via HTTP header)
- Detect flooding IP addresses.
- Slow down or restrict access for automated tools (HTTP flood, brute force tools, vulnerability scanners, etc.)
- Save your server resources (database, cpu, ram, etc.) under an attack.
- Restrict access permanently or temporarily for listed IP addresses in "banlist" file.
- Notify yourself via email alerts when attacks begin.
- Implicit deny for DDoS attacks
Subscribe to our Daily Newsletter via email - Be First to know about Security and Penetration testing tools. or Join our Huge Hackers Community on Facebook , Google+ and Twitter .
Subscribe Top Hacker Stories via email
Posted by Mohit Kumar at Tuesday, October 02, 2012
Sptoolkit - A Simple Phishing Toolkit
Labels:
Codes,
Phishing,
PHP,
Vulnerabilities
The spt project ( sptoolkit ) is an open source phishing education toolkit that aims to help in securing the mind as opposed to securing computers. A simple, targeted link is all it takes to bypass the most advanced security protections. The link is clicked, the deed is done.
spt ( sptoolkit )was developed from the ground up to provide a simple and easy to use framework to identify your weakest links so that you can patch the human vulnerability. If the spt project sounds interesting to you, please consider downloading it for evaluation in your own organization. Feedback is welcomed and always appreciated.
Basic reuirements for sptoolkit
- Apache,
- PHP
- MySQL
Feature list of sptoolkit
- Vast improvements in the editing functionality for templates and education packages. Major changes include: two different editors to choose from (the oroginal spt text editor and TinyMCE), copy templates or education to new version and then customize them.
- Added education completion tracking, now you can determine if your targets completed the assigned education in a campaign.
- Support for the Google and TinyURL URL shortener services. Now your phishing emails can have shortened URLs, making them harder to detect.
- Support for sending SMTP using SSL secured connections.
- Enhancements to the viewing of campiang information including SMTP relay used and destination URL used.
- Initial support for using spt in SSL/TLS secured installations, code updates to prevent insecure content warnings.
- All forms now generate inline errors with entered value retention, allowing easy correction of incorrect or missing items without requiring all information to be entered again.
- Email tracking times are now more accurate when viewing campaign information.
- Most items in the Quick Start module now feature links allowing you to quickly access the desired location in the spt UI.
- Enhancements to the browser detection script for more information on what you need vs. what you have.
- Many security and usability issues fixed.
- Additional improvements in authentication and session management security.
Subscribe to our Daily Newsletter via email - Be First to know about Security and Penetration testing tools. or Join our Huge Hackers Community on Facebook , Google+ and Twitter .
Subscribe Top Hacker Stories via email
Posted by Mohit Kumar at Friday, August 31, 2012
Phemail.py: Phishing EMail Social Engineering Tool
Labels:
Codes,
Hacking Tools,
Phishing,
PHP,
Python
Social Engineering is defined as the process of inducing people into giving away access or confidential information. From a security consultant point of view this topic is not new and there are many tools which can be used against the target.
phemail.py - Phishing EMAIL. The main purpose of this tool is to prove who clicked on the phishing email without attempting to exploit the web browser but collecting as much information as possible. For this reason it will be 100% undetectable by any antivirus and it will obtain sufficient data to have an initial proof of concept for the client.
- Find corporate email addresses: Phemail has an option for harvesting corporate email addresses and save them to a file. Phemail.py leverages Google to search for LinkedIn specific corporate e-mail targets.
- Create a phishing email template: You get to create your own custom phishing templates. Do not forget to add the string “{0}” in each URL as the script will replace this string with the correct URL automatically.
- Host/upload a single PHP file: This file contains JavaScript code which attempts to collect web browser information and save it in a log file in /tmp directory.
- Run the php file as shown in the following example: # phemail.py -e test-emails.txt -f "Tax report " -r "Tax Report " -s "Important information about your tax" -b body.txt -w http://YOUR-WEBSITE.com
Subscribe to our Daily Newsletter via email - Be First to know about Security and Penetration testing tools. or Join our Huge Hackers Community on Facebook , Google+ and Twitter .
Subscribe Top Hacker Stories via email
Posted by Mohit Kumar at Thursday, August 16, 2012
RemoteScript - Execute scripts on multiple remote hosts
Labels:
Codes,
PHP,
Security Tools,
Shell Code
Execute a script on single or multiple remote hosts simultaneously via ssh . No client installation required. May work on any host with a ssh server. Php/mysql based.
Features
Features
- Execute shell script on single or multiple linux hosts remotely
- Group hosts to execute scripts on multiple hosts simultaneously
- Keep a trace of stout and error output
Subscribe to our Daily Newsletter via email - Be First to know about Security and Penetration testing tools. or Join our Huge Hackers Community on Facebook , Google+ and Twitter .
Subscribe Top Hacker Stories via email
Posted by Mohit Kumar at Friday, July 20, 2012
Mutillidae 2.1.20 - Test your Hacking skills
Labels:
Codes,
Hacking Tools,
penetration testing,
PHP,
Security Tools,
Vulnerabilities,
Vulnerability Assessment
Mutillidae is a free, open source web application provided to allow security enthusiast to pen-test and hack a web application. Mutillidae can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to install or administrate their own webserver. Mutillidae contains dozens of vulnerabilities and hints to help the user exploit them; providing an easy-to-use web hacking environment deliberately designed to be used as a hack-lab for security enthusiast, classroom labs, and vulnerability assessment tool targets.
Change log : Mutillidae 2.1.20:
- Changed some color schemes
- Bug fix: The html5 key validation on the on the html5 page was too restrictive. The validator was throwing errors even when the input was ok. This validation checks for any non-alphanumeric characters and prints an error if non-alphanumeric characters are found. This error message contains the bad key the user input. Since the site fails to output encode this error message, it is possible to perform DOM injection.
- Add the html5-storage.php to the vulnerabilities listing.
Subscribe to our Daily Newsletter via email - Be First to know about Security and Penetration testing tools. or Join our Huge Hackers Community on Facebook , Google+ and Twitter .
Subscribe Top Hacker Stories via email
Posted by Mohit Kumar at Friday, June 29, 2012
NinjaWPass - Protect WordPress against keyloggers and stolen passwords
Labels:
Codes,
PHP,
Security Tools
NinjaWPass is a free WordPress plugin written to protect your blog administration console. It makes it basically impossible for a hacker who stole your password to log in to your console. The way it works is simple but very efficient and it is being used by some large banking corporations in order to protect their customers online accounts. All you need to do is to define a second password (AKA the NinjaWPass password) from 10 to 30 characters.
At the WordPress login prompt, besides your current password, you will be asked to enter 3 randomly chosen characters from your NinjaWPass password. Whether your computer is infected by a keylogger or someone is spying over your shoulder, this protection will keep them away.
Additionally, the plugin offers the possibility to receive an alert by email whenever someone logs into your WordPress admin interface
At the WordPress login prompt, besides your current password, you will be asked to enter 3 randomly chosen characters from your NinjaWPass password. Whether your computer is infected by a keylogger or someone is spying over your shoulder, this protection will keep them away.
Additionally, the plugin offers the possibility to receive an alert by email whenever someone logs into your WordPress admin interface
Subscribe to our Daily Newsletter via email - Be First to know about Security and Penetration testing tools. or Join our Huge Hackers Community on Facebook , Google+ and Twitter .
Subscribe Top Hacker Stories via email
Posted by Mohit Kumar at Wednesday, June 27, 2012
Web Shell Detector v1.51 - Include Signatures of 290 Types of Web Shells
Labels:
Asp.net,
Codes,
Hacking Tools,
Malwares,
penetration testing,
PHP,
Scanners,
Security Tools,
Shell Code,
Vulnerability Assessment
Web Shell Detector is a php script that helps you find and identify php/cgi(perl)/asp/aspx shells. Web Shell Detector has a “web shells” signature database that helps to identify “web shell” up to 99%. By using the latest javascript and css technologies, web shell detector has a light weight and friendly interface.
Detection: Number of known shells: 290
Requirements: PHP 5.x, OpenSSL
Usage: To activate Web Shell Detector:
1) Upload shelldetect.php and shelldetect.db to your root directory
2) Open shelldetect.php file in your browser Example: http://www.website.com/shelldetect.php
3) Inspect all strange files, if some of files look suspicious, send them to http://www.websecure.co.il team. After submitting your file, it will be inspected and if there are any threats, it will be inserted into a “web shell detector” web shells signature database.
4) If any web shells found and identified use your ftp/ssh client to remove it from your web server (IMPORTANT: please be carefull because some of shells may be integrated into system files!).
Options
- extension - extensions that should be scanned
- showlinenumbers - show line number where suspicious function used
- dateformat - used with access time & modified time
- langauge - if I want to use other language
- directory - scan specific directory
- task - perform different task
- report_format - used with is_cron(true) file format for report file
- is_cron - if true run like a cron(no output)
- filelimit - maximum files to scan (more then 30000 you should scan specific directory)
- useget - activate _GET variable for easy way to recive tasks
- authentication - protect script with user & password in case to disable simply set to NULL
- remotefingerprint - get shells signatures db by remote
Subscribe to our Daily Newsletter via email - Be First to know about Security and Penetration testing tools. or Join our Huge Hackers Community on Facebook , Google+ and Twitter .
Subscribe Top Hacker Stories via email
Posted by Mohit Kumar at Saturday, June 09, 2012
Subscribe to:
Posts (Atom)