Unhide Forensic Tool, Find hidden processes and ports
- Compare /proc vs /bin/ps output
- Compare info gathered from /bin/ps with info gathered by walking thru the procfs. ONLY for Linux 2.6 version
- Compare info gathered from /bin/ps with info gathered from syscalls (syscall scanning).
- Full PIDs space ocupation (PIDs bruteforcing). ONLY for Linux 2.6 version
- Compare /bin/ps output vs /proc, procfs walking and syscall. ONLY for Linux 2.6 version
- Reverse search, verify that all thread seen by ps are also seen in the kernel.
- 6- Quick compare /proc, procfs walking and syscall vs /bin/ps output. ONLY for Linux 2.6 version.
- Unhide-TCP
unhide-tcp is a forensic tool that identifies TCP/UDP ports that are listening but are not listed in /bin/netstat through brute forcing of all TCP/UDP ports available.
- -f Write a log file (unhide.log) in the current directory.
- -h Display help
- -m Do more checks. As of 2010-11-21 version, this option has only effect for the procfs, procall, checkopendir and checkchdir tests.
- -r Use alternate version of sysinfo check in standard tests
- -V Show version and exit
- -v Be verbose, display warning message (default : don't display). This option may be repeated more than once.
gcc –static unhide.c -o unhide
gcc -Wall -O2 –static unhide-tcp.c -o unhide-tcp
gcc -Wall -O2 –static -pthread unhide-linux26.c -o unhide-linux26
gcc -Wall -O2 -static -o unhide_rb unhide_rb.c
Available for Windows & Linux Platform. Download latest Version : Windows or Linux
Posted by Mohit Kumar at Friday, February 15, 2013
WAppEx v2.0 : Web Application exploitation Tool
Updates in 2.0
- Auto-detect feature deleted from exploits
- Browser tool deleted
- Exploits and payloads view changed
- Exploit Database with the following features added:
- New script syntax and structure
- Searching, selecting, and executing of exploits.
- Add/remove database entries (exploits or payloads)
- Add exploits or payloads to the database using either the Exploit Wizard or the script file
- Batch testing of multiple targets against multiple exploits
- Execute multiple instances of one or more payloads (for every running exploit) simultaneously.
- Following tools added:
- Manual Request
- Dork Finder
- Exploit Editor
- Hidden File Checker
- Neighbor Site Finder
- Local File Inclusion analyzer script updated
- 24 new payloads for LFI, RFI, and PHP Code Execution vulnerabilities added:
- Directory Explorer
- CodeExec Bind
- 3 connect-back shells
- Code Execution
- MySQL Dump
- ServerInfo
- 4 command execution payloads
- Bug-fixes:
- Find Login Page crashed on start
- Problem with software registration
- Stop button did not work when retrieving data from SQL server
- Problem with saving SQL results
- Crashed when closing Find Login Page
- Status icons were not displayed properly in exploit tabs
- An exploit database covering a wide range of vulnerabilities.
- A set of tools useful for penetration testing:
- Manual Request
- Dork Finder
- Exploit Editor
- Hidden File Checker
- Neighbor Site Finder
- Find Login Page
- Online Hash Cracker
- Encoder/Decoder
- Execute multiple instances of one or more exploits simultaneously.
- Execute multiple instances of one or more payloads (for every running exploit) simultaneously.
- Test a list of target URL’s against a number of selected exploits.
- Allows you to create your own exploits and payloads and share them online.
- A number of featured exploits (6) and payloads (39) bundled within the software exploit database:
- Testing and exploiting of Local File Inclusion vulnerabilities
- Testing and exploiting of Local File Disclosure vulnerabilities
- Testing and exploiting of Remote File Inclusion vulnerabilities
- Testing and exploiting of SQL Injection vulnerabilities
- Testing and exploiting of Remote Command Execution Inclusion vulnerabilities
- Testing and exploiting of Server-side Code Injection vulnerabilities
Posted by Mohit Kumar at Friday, February 15, 2013
Automated HTTP Enumeration Tool
Posted by Mohit Kumar at Friday, February 15, 2013
PwnPi v2.0 - A Pen Test Drop Box distro for the Raspberry Pi
Login username and password is root:root
Tools List:
Download Here
Posted by Mohit Kumar at Saturday, November 10, 2012
NetSleuth : Open source Network Forensics And Analysis Tools
NetSleuth is an opensource network forensics and analysis tool, designed for triage in incident response situations. It can identify and fingerprint network hosts and devices from pcap files captured from Ethernet or WiFi data (from tools like Kismet).
- An easy realtime overview of what devices and what people are connected to any WiFi or Ethernet network.
- Free. The tool can be downloaded for free, and the source code is available under the GPL.
- Simple and cost effective. No requirement for hardware or reconfiguration of networks.
- “Silent portscanning” and undetectable network monitoring on WiFi and wired networks.
- Automatic identification of a vast array of device types, including smartphones, tablets, gaming consoles, printers, routers, desktops and more.
- Offline analysis of pcap files, from tools like Kismet or tcpdump, to aid in intrusion response and network forensics.
Posted by Mohit Kumar at Saturday, November 10, 2012
TXDNS v 2.2.1 - Aggressive multithreaded DNS digger
New features:
- Support AAAA(IPv6)record queries:
- -rr AAAA;
- Rewrite summarizing statistics using a thread-safe algorithm instead mutex.
Bug fixes:
- Fixed a problem when running under Windows XP;
- Fixed a problem when parsing a IPv6 address.
- November 9th, 2012 by Arley Silveira
Posted by Mohit Kumar at Saturday, November 10, 2012
PySQLi - Python SQL injection framework
Posted by Mohit Kumar at Sunday, November 04, 2012
Joomscan updated - now can identify 673 joomla vulnerabilities
Posted by Mohit Kumar at Saturday, November 03, 2012
BeEF 0.4.3.8 - Browser Exploitation Framework
Posted by Mohit Kumar at Saturday, November 03, 2012
Burp Suite Free Edition v1.5 released
- Burp's UI has been completely overhauled, to improve looks and usability:
- Fonts are now available throughout the UI, with corresponding resizing of all UI elements (tables, dialogs, buttons, etc.).
- There are configurable hotkeys for all common functions.
- Intruder and Repeater now have smart tabs, which you can drag to reorder, and click to create, close or rename.
- Tables are natively sortable everywhere, except where the row ordering is part of the options you are configuring.
- Text fields now have context-aware auto-complete memory.
Posted by Mohit Kumar at Thursday, November 01, 2012
Snuck - Automatic XSS filter bypass
Posted by Mohit Kumar at Tuesday, October 23, 2012
OWASP Zed Attack Proxy (ZAP) Weekly Releases
- Completely rewritten 'traditional' Spider (c/o Cosmin Stefan and the GSoC)
- New Ajax Spider (using Crawljax, c/o Guifre Ruiz and the GSoC)
- Web sockets support (c/o Robert Koch and the GSoC)
- Performance improvements (both speed and memory)
- Session awareness
- Authentication handling
- Contexts
- Modes (Safe, Protected and Standard)
- Online links in menu
Posted by Mohit Kumar at Monday, October 22, 2012
Social-Engineer Toolkit (SET) 4.1.3 Released
Posted by Mohit Kumar at Friday, October 19, 2012
WebSploit Framework 2.0.3 with Wifi Jammer
[>]Social Engineering Works
[>]Scan,Crawler & Analysis Web
[>]Automatic Exploiter
[>]Support Network Attacks
----
[+]Autopwn - Used From Metasploit For Scan and Exploit Target Service
[+]wmap - Scan,Crawler Target Used From Metasploit wmap plugin
[+]format infector - inject reverse & bind payload into file format
[+]phpmyadmin Scanner
[+]LFI Bypasser
[+]Apache Users Scanner
[+]Dir Bruter
[+]admin finder
[+]MLITM Attack - Man Left In The Middle, XSS Phishing Attacks
[+]MITM - Man In The Middle Attack
[+]Java Applet Attack
[+]MFOD Attack Vector
[+]USB Infection Attack
[+]ARP Dos Attack
[+]Web Killer Attack
[+]Fake Update Attack
[+]Fake Access point Attack
Download WebSploit Framework 2.0.3
Posted by Mohit Kumar at Wednesday, October 17, 2012
Ettercap 0.7.5 released - codename "Assimilation"
- Fix versioning, flags.
- Need latest version of libnet that supports IPv6
- Fix gtk crash.
- Switched to git repo and CMAKE
- Now that IPv6 is supported the cli requires an extra “/”. To poison all hosts in a broadcast domain the command would be /// (Instead of // // in past versions.)
- Fixed Release tag and build flags, BZ 855504.
- Fixed Obsoletes, BZ 855067.
- Switch to git ettercap_rc branch for gtk crash, BZ 853791.
- Dropped UI and daemon patches.
- Merged subpackages, in part due to buildsystem change.
- Spec cleanup.
- Rebuilt for https ://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild
- Add hardened build.
- libnet rebuild.
- New upstream.
- Rebuild against PCRE 8.30
Posted by Mohit Kumar at Wednesday, October 17, 2012
jSQL Injection v 2.0 released
- GET, POST, header, cookie methods
- visual, errorbase, blind algorithms
- automatic best algorithms detection
- data retrieving progression
- proxy setting
- For now supports only MySQL.
Download jSQL Injection v 2.0
Posted by Mohit Kumar at Wednesday, October 17, 2012
Arachni version 0.4.1.1 Released
- Auditor#log and Auditor#log_remote_file bugfixed to pass a Hash of the response headers instead of a String — also solving another bug causing response bodies not to be logged in the Issues. [Issue #294]
- Issue — Response headers are now always Hash.
- Reports
- HTML — Removed response headers handling code and added the option to not include HTTP response bodies. [Issue #296]
- XML — Removed response headers handling code and added the option to not include HTTP response bodies. [Issue #296]
- HTTP debugging output now includes Response data. [Issue #297]
- Executables
- arachni_rpcd_monitor — Laxed standards enforced on the Dispatcher URL argument. [Issue #293]
- Path extractors
- Added path extractor for the area HTML tag (href attribute). [Issue #300]
Posted by Mohit Kumar at Wednesday, October 17, 2012
Server Analyser : Simple Server Malware Scanner
Posted by Mohit Kumar at Wednesday, October 17, 2012
Grinder Version 0.3 released
- Added a Fuzzer tab to allow users to view statistics (bar charts) about the fuzzers that have been run in the system. You can also drill down in to individual fuzzers to view what targets they are generating crashes on. Added bar chart support via jqPlot.
- Added a Settings tab. Moved the user account management features from the System tab into this new Settings tab.
- Add in initial work for automated testcase reduction via .\node\reduction.rb
- Added IE10 support (As seen in Windows 8 Consumer Preview) (grinder\node\browser\internetexplorer.rb).
- Added a --fuzzer parameter to grinder.rb. When bringing up a node you can now specify a single fuzzer to load instead of loading all the fuzzers in the nodes fuzzer directory. Usefull for testing a specific fuzzer (e.g. >ruby grinder.rb --fuzzer=DOMBlaster2000 FF)
- Added a --help and --version parameter to grinder.rb and testcase.rb.
- grinder_logger.dll is now thread safe and can handle log messages of an arbitrary size.
- Changed the server.rb 301 reditect to a 307 temporary redirect.
- Many small bug fixes!
Posted by Mohit Kumar at Tuesday, October 09, 2012
SANS Investigative Forensic Toolkit 2.14 Released
- iPhone, Blackberry, and Android Forensic Capabilities
- Registry Viewer (YARU)
- Compatibility with F-Response Tactical, Standard, and Enterprise
- PTK 2.0 (Special Release – Not Available for Download)
- Automated Timeline Generation via log2timeline
- Many Firefox Investigative Plugins
- Windows Journal Parser and Shellbags Parser (jp and sbag)
- Many Windows Analysis Utilities (prefetch, usbstor, event log, and more)
- Complete Overhaul of Regripper Plugins (added over 80 additional plugins)
Posted by Mohit Kumar at Tuesday, October 09, 2012