Pentoo 2013.0 RC1.1 Released
- Changes saving
- CUDA/OpenCL Enhanced cracking software
- John the ripper
- Hashcat Suite of tools
- Kernel 3.7.5 and all needed patches for injection
- XFCE 4.10
- All the latest tools and a responsive development team!
- Hardened Kernel with aufs patches
- Backported Wifi stack from latest stable kernel release
- Module loading support ala slax
- Changes saving on usb stick
- XFCE4 wm
- Cuda/OPENCL cracking support with development tools
- System updates if you got it finally installed
Posted by Mohit Kumar at Saturday, March 09, 2013
WAppEx v2.0 : Web Application exploitation Tool
Updates in 2.0
- Auto-detect feature deleted from exploits
- Browser tool deleted
- Exploits and payloads view changed
- Exploit Database with the following features added:
- New script syntax and structure
- Searching, selecting, and executing of exploits.
- Add/remove database entries (exploits or payloads)
- Add exploits or payloads to the database using either the Exploit Wizard or the script file
- Batch testing of multiple targets against multiple exploits
- Execute multiple instances of one or more payloads (for every running exploit) simultaneously.
- Following tools added:
- Manual Request
- Dork Finder
- Exploit Editor
- Hidden File Checker
- Neighbor Site Finder
- Local File Inclusion analyzer script updated
- 24 new payloads for LFI, RFI, and PHP Code Execution vulnerabilities added:
- Directory Explorer
- CodeExec Bind
- 3 connect-back shells
- Code Execution
- MySQL Dump
- ServerInfo
- 4 command execution payloads
- Bug-fixes:
- Find Login Page crashed on start
- Problem with software registration
- Stop button did not work when retrieving data from SQL server
- Problem with saving SQL results
- Crashed when closing Find Login Page
- Status icons were not displayed properly in exploit tabs
- An exploit database covering a wide range of vulnerabilities.
- A set of tools useful for penetration testing:
- Manual Request
- Dork Finder
- Exploit Editor
- Hidden File Checker
- Neighbor Site Finder
- Find Login Page
- Online Hash Cracker
- Encoder/Decoder
- Execute multiple instances of one or more exploits simultaneously.
- Execute multiple instances of one or more payloads (for every running exploit) simultaneously.
- Test a list of target URL’s against a number of selected exploits.
- Allows you to create your own exploits and payloads and share them online.
- A number of featured exploits (6) and payloads (39) bundled within the software exploit database:
- Testing and exploiting of Local File Inclusion vulnerabilities
- Testing and exploiting of Local File Disclosure vulnerabilities
- Testing and exploiting of Remote File Inclusion vulnerabilities
- Testing and exploiting of SQL Injection vulnerabilities
- Testing and exploiting of Remote Command Execution Inclusion vulnerabilities
- Testing and exploiting of Server-side Code Injection vulnerabilities
Posted by Mohit Kumar at Friday, February 15, 2013
BlindElephant – Web Application Fingerprinting
The BlindElephant Web Application Finger-printer attempts to discover the version of a (known) web application by comparing static files at known locations against precomputed hashes for versions of those files in all all available releases. The technique is fast, low-bandwidth, non-invasive, generic, and highly automatically.
Posted by Mohit Kumar at Friday, February 15, 2013
PwnPi v2.0 - A Pen Test Drop Box distro for the Raspberry Pi
Login username and password is root:root
Tools List:
Download Here
Posted by Mohit Kumar at Saturday, November 10, 2012
SSLsplit v 0.4.5 - Man-in-the-middle attacks against SSL/TLS
Change Log:
- Add support for 2048 and 4096 bit Diffie-Hellman
- Fix syslog error messages
- Fix threading issues in daemon mode .
- Fix address family check in netfilter NAT lookup
- Fix build on recent glibc systems
- Minor code and build process improvements
Posted by Mohit Kumar at Saturday, November 10, 2012
TXDNS v 2.2.1 - Aggressive multithreaded DNS digger
New features:
- Support AAAA(IPv6)record queries:
- -rr AAAA;
- Rewrite summarizing statistics using a thread-safe algorithm instead mutex.
Bug fixes:
- Fixed a problem when running under Windows XP;
- Fixed a problem when parsing a IPv6 address.
- November 9th, 2012 by Arley Silveira
Posted by Mohit Kumar at Saturday, November 10, 2012
PySQLi - Python SQL injection framework
Posted by Mohit Kumar at Sunday, November 04, 2012
Joomscan updated - now can identify 673 joomla vulnerabilities
Posted by Mohit Kumar at Saturday, November 03, 2012
BeEF 0.4.3.8 - Browser Exploitation Framework
Posted by Mohit Kumar at Saturday, November 03, 2012
Spooftooph 0.5.2 - Automated spoofing or cloning Bluetooth device
Features
- Clone and log Bluetooth device information
- Generate a random new Bluetooth profile
- Change Bluetooth profile every X seconds
- Specify device information for Bluetooth interface
- Select device to clone from scan log
1) Specify NAME, CLASS and ADDR.
root@thnlab: spooftooph -i hci0 -n new_name -a 00:11:22:33:44:55 -c 0x1c010c
2) Randomly generate NAME, CLASS and ADDR.
root@thnlab: spooftooph -i hci0 -R
3) Scan for devices in range and select device to clone. Optionally dump the device information in a specified log file.
root@thnlab: spooftooph -i hci0 -s -w file.csv
4) Load in device info from log file and specify device info to clone.
root@thnlab: spooftooph -i hci0 -r file.csv
5) Clone a random devices info in range every X seconds.
root@thnlab: spooftooph -i hci0 -t 10
Download Spooftooph 0.5.2
Posted by Mohit Kumar at Saturday, November 03, 2012
Wifi Honey - Creates fake APs using all encryption
Installing wifi honey
chmod a+x wifi_honey.sh
./wifi_honey.sh fake_wpa_net
./wifi_honey.sh fake_wpa_net 1 waln1
Download Wifi Honey
Posted by Mohit Kumar at Saturday, November 03, 2012
Burp Suite Free Edition v1.5 released
- Burp's UI has been completely overhauled, to improve looks and usability:
- Fonts are now available throughout the UI, with corresponding resizing of all UI elements (tables, dialogs, buttons, etc.).
- There are configurable hotkeys for all common functions.
- Intruder and Repeater now have smart tabs, which you can drag to reorder, and click to create, close or rename.
- Tables are natively sortable everywhere, except where the row ordering is part of the options you are configuring.
- Text fields now have context-aware auto-complete memory.
Posted by Mohit Kumar at Thursday, November 01, 2012
Scylla v1 Penetration Testing Tool - Because there's no patch for human stupidity
Scylla provides all the power of what a real audit, intrusion, exclusion and analysis tool needs, giving the possibility of scanning misconfiguration bugs dynamically. Scylla aims to be a better tool for security auditors, extremely fast, designed based on real scenarios, developed by experienced coders and constructed with actual IT work methods.
The words “Configuration Tracer” are the best definition for Scylla, a tool to help on IT audits. Scylla is a tool to audit different online application protocols and configurations, built over a brute-force core.
This tool acts as a tool for unifying auditing techniques, in other words, it does what oscanner, winfingerprint, Hydra, DirBuster, and other tools do, and also what those tools don't do.
Supported Protocols
- Terminal (Telnet, SSH, telnets)
- FTP (FTPS, FTP, SFTP)
- SMB (Also Windows RPC)
- LDAP
- POP3 (POP3S)
- SMTP (SMTPS)
- IMAP
- MySql
- MSSQL
- Oracle (Database and TNS Listener)
- DB2 (Database and DAS)
- HTTP(HTTPS; Basic AUTH Brute Force, Digest AUTH Brute Force, Form Brute Force, Directory and files Brute Force)
- DNS (DNS snooping)
- Postgres SQL
Posted by Mohit Kumar at Thursday, November 01, 2012
BackBox Linux version 3.0 released
- System upgrade
- Bug corrections
- Performance boost
- Improved start menu
- Improved Wi-Fi dirvers (compat-wireless aircrack patched)
- New and updated hacking tools
- 32-bit or 64-bit processor
- 512 MB of system memory (RAM)
- 4.4 GB of disk space for installation
- Graphics card capable of 800×600 resolution
- DVD-ROM drive or USB port
Posted by Mohit Kumar at Thursday, November 01, 2012
Social-Engineer Toolkit (SET) 4.1.3 Released
Posted by Mohit Kumar at Friday, October 19, 2012
WebSploit Framework 2.0.3 with Wifi Jammer
[>]Social Engineering Works
[>]Scan,Crawler & Analysis Web
[>]Automatic Exploiter
[>]Support Network Attacks
----
[+]Autopwn - Used From Metasploit For Scan and Exploit Target Service
[+]wmap - Scan,Crawler Target Used From Metasploit wmap plugin
[+]format infector - inject reverse & bind payload into file format
[+]phpmyadmin Scanner
[+]LFI Bypasser
[+]Apache Users Scanner
[+]Dir Bruter
[+]admin finder
[+]MLITM Attack - Man Left In The Middle, XSS Phishing Attacks
[+]MITM - Man In The Middle Attack
[+]Java Applet Attack
[+]MFOD Attack Vector
[+]USB Infection Attack
[+]ARP Dos Attack
[+]Web Killer Attack
[+]Fake Update Attack
[+]Fake Access point Attack
Download WebSploit Framework 2.0.3
Posted by Mohit Kumar at Wednesday, October 17, 2012
Ettercap 0.7.5 released - codename "Assimilation"
- Fix versioning, flags.
- Need latest version of libnet that supports IPv6
- Fix gtk crash.
- Switched to git repo and CMAKE
- Now that IPv6 is supported the cli requires an extra “/”. To poison all hosts in a broadcast domain the command would be /// (Instead of // // in past versions.)
- Fixed Release tag and build flags, BZ 855504.
- Fixed Obsoletes, BZ 855067.
- Switch to git ettercap_rc branch for gtk crash, BZ 853791.
- Dropped UI and daemon patches.
- Merged subpackages, in part due to buildsystem change.
- Spec cleanup.
- Rebuilt for https ://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild
- Add hardened build.
- libnet rebuild.
- New upstream.
- Rebuild against PCRE 8.30
Posted by Mohit Kumar at Wednesday, October 17, 2012
jSQL Injection v 2.0 released
- GET, POST, header, cookie methods
- visual, errorbase, blind algorithms
- automatic best algorithms detection
- data retrieving progression
- proxy setting
- For now supports only MySQL.
Download jSQL Injection v 2.0
Posted by Mohit Kumar at Wednesday, October 17, 2012
Arachni version 0.4.1.1 Released
- Auditor#log and Auditor#log_remote_file bugfixed to pass a Hash of the response headers instead of a String — also solving another bug causing response bodies not to be logged in the Issues. [Issue #294]
- Issue — Response headers are now always Hash.
- Reports
- HTML — Removed response headers handling code and added the option to not include HTTP response bodies. [Issue #296]
- XML — Removed response headers handling code and added the option to not include HTTP response bodies. [Issue #296]
- HTTP debugging output now includes Response data. [Issue #297]
- Executables
- arachni_rpcd_monitor — Laxed standards enforced on the Dispatcher URL argument. [Issue #293]
- Path extractors
- Added path extractor for the area HTML tag (href attribute). [Issue #300]
Posted by Mohit Kumar at Wednesday, October 17, 2012
Server Shield v1.0.2 - Protect your Linux machine in 1 minute
- Firewall Hardening
- TCP Hardening
- Data Leakage Protection
- ICMP/Ping Flood Protection
- Rootkit Protection
- DoS Protection
- Spoof Protection
- Bogus TCP Protection
- SYN Flood Protection
- Requires
- iptables ("yum install iptables")
Posted by Mohit Kumar at Sunday, October 14, 2012