WAppEx v2.0 : Web Application exploitation Tool
Updates in 2.0
- Auto-detect feature deleted from exploits
- Browser tool deleted
- Exploits and payloads view changed
- Exploit Database with the following features added:
- New script syntax and structure
- Searching, selecting, and executing of exploits.
- Add/remove database entries (exploits or payloads)
- Add exploits or payloads to the database using either the Exploit Wizard or the script file
- Batch testing of multiple targets against multiple exploits
- Execute multiple instances of one or more payloads (for every running exploit) simultaneously.
- Following tools added:
- Manual Request
- Dork Finder
- Exploit Editor
- Hidden File Checker
- Neighbor Site Finder
- Local File Inclusion analyzer script updated
- 24 new payloads for LFI, RFI, and PHP Code Execution vulnerabilities added:
- Directory Explorer
- CodeExec Bind
- 3 connect-back shells
- Code Execution
- MySQL Dump
- ServerInfo
- 4 command execution payloads
- Bug-fixes:
- Find Login Page crashed on start
- Problem with software registration
- Stop button did not work when retrieving data from SQL server
- Problem with saving SQL results
- Crashed when closing Find Login Page
- Status icons were not displayed properly in exploit tabs
- An exploit database covering a wide range of vulnerabilities.
- A set of tools useful for penetration testing:
- Manual Request
- Dork Finder
- Exploit Editor
- Hidden File Checker
- Neighbor Site Finder
- Find Login Page
- Online Hash Cracker
- Encoder/Decoder
- Execute multiple instances of one or more exploits simultaneously.
- Execute multiple instances of one or more payloads (for every running exploit) simultaneously.
- Test a list of target URL’s against a number of selected exploits.
- Allows you to create your own exploits and payloads and share them online.
- A number of featured exploits (6) and payloads (39) bundled within the software exploit database:
- Testing and exploiting of Local File Inclusion vulnerabilities
- Testing and exploiting of Local File Disclosure vulnerabilities
- Testing and exploiting of Remote File Inclusion vulnerabilities
- Testing and exploiting of SQL Injection vulnerabilities
- Testing and exploiting of Remote Command Execution Inclusion vulnerabilities
- Testing and exploiting of Server-side Code Injection vulnerabilities
Posted by Mohit Kumar at Friday, February 15, 2013
TXDNS v 2.2.1 - Aggressive multithreaded DNS digger
New features:
- Support AAAA(IPv6)record queries:
- -rr AAAA;
- Rewrite summarizing statistics using a thread-safe algorithm instead mutex.
Bug fixes:
- Fixed a problem when running under Windows XP;
- Fixed a problem when parsing a IPv6 address.
- November 9th, 2012 by Arley Silveira
Posted by Mohit Kumar at Saturday, November 10, 2012
ExploitShield Browser Edition - Forget about browser vulnerabilities
Posted by Mohit Kumar at Sunday, November 04, 2012
Joomscan updated - now can identify 673 joomla vulnerabilities
Posted by Mohit Kumar at Saturday, November 03, 2012
BeEF 0.4.3.8 - Browser Exploitation Framework
Posted by Mohit Kumar at Saturday, November 03, 2012
Burp Suite Free Edition v1.5 released
- Burp's UI has been completely overhauled, to improve looks and usability:
- Fonts are now available throughout the UI, with corresponding resizing of all UI elements (tables, dialogs, buttons, etc.).
- There are configurable hotkeys for all common functions.
- Intruder and Repeater now have smart tabs, which you can drag to reorder, and click to create, close or rename.
- Tables are natively sortable everywhere, except where the row ordering is part of the options you are configuring.
- Text fields now have context-aware auto-complete memory.
Posted by Mohit Kumar at Thursday, November 01, 2012
Snuck - Automatic XSS filter bypass
Posted by Mohit Kumar at Tuesday, October 23, 2012
OWASP Zed Attack Proxy (ZAP) Weekly Releases
- Completely rewritten 'traditional' Spider (c/o Cosmin Stefan and the GSoC)
- New Ajax Spider (using Crawljax, c/o Guifre Ruiz and the GSoC)
- Web sockets support (c/o Robert Koch and the GSoC)
- Performance improvements (both speed and memory)
- Session awareness
- Authentication handling
- Contexts
- Modes (Safe, Protected and Standard)
- Online links in menu
Posted by Mohit Kumar at Monday, October 22, 2012
Social-Engineer Toolkit (SET) 4.1.3 Released
Posted by Mohit Kumar at Friday, October 19, 2012
WebSploit Framework 2.0.3 with Wifi Jammer
[>]Social Engineering Works
[>]Scan,Crawler & Analysis Web
[>]Automatic Exploiter
[>]Support Network Attacks
----
[+]Autopwn - Used From Metasploit For Scan and Exploit Target Service
[+]wmap - Scan,Crawler Target Used From Metasploit wmap plugin
[+]format infector - inject reverse & bind payload into file format
[+]phpmyadmin Scanner
[+]LFI Bypasser
[+]Apache Users Scanner
[+]Dir Bruter
[+]admin finder
[+]MLITM Attack - Man Left In The Middle, XSS Phishing Attacks
[+]MITM - Man In The Middle Attack
[+]Java Applet Attack
[+]MFOD Attack Vector
[+]USB Infection Attack
[+]ARP Dos Attack
[+]Web Killer Attack
[+]Fake Update Attack
[+]Fake Access point Attack
Download WebSploit Framework 2.0.3
Posted by Mohit Kumar at Wednesday, October 17, 2012
jSQL Injection v 2.0 released
- GET, POST, header, cookie methods
- visual, errorbase, blind algorithms
- automatic best algorithms detection
- data retrieving progression
- proxy setting
- For now supports only MySQL.
Download jSQL Injection v 2.0
Posted by Mohit Kumar at Wednesday, October 17, 2012
Arachni version 0.4.1.1 Released
- Auditor#log and Auditor#log_remote_file bugfixed to pass a Hash of the response headers instead of a String — also solving another bug causing response bodies not to be logged in the Issues. [Issue #294]
- Issue — Response headers are now always Hash.
- Reports
- HTML — Removed response headers handling code and added the option to not include HTTP response bodies. [Issue #296]
- XML — Removed response headers handling code and added the option to not include HTTP response bodies. [Issue #296]
- HTTP debugging output now includes Response data. [Issue #297]
- Executables
- arachni_rpcd_monitor — Laxed standards enforced on the Dispatcher URL argument. [Issue #293]
- Path extractors
- Added path extractor for the area HTML tag (href attribute). [Issue #300]
Posted by Mohit Kumar at Wednesday, October 17, 2012
Social Engineer Toolkit version 4.1 released
- Removed the Java Exploit from being built into the Java Applet. Being detected by to many AV vendors.
- Added core libraries to the scraper, needed for check_config and apache mode checks
- Added check for apache mode within harvester, will move new php customize script to apache directory and extract under different directory
- Rewrote new check mechanism in scraper for config checks and cleaned up code
- Fixed a bug that would cause the verified signature import to error out when selecting number 9 in the web attack menu
- Added a custom php script into harvester that allows you to check harvested credentials through apache
- Added compatibility with multiattack and apache mode for credential harvester and java applet combined
- Fixed the allports payload, really buggy at first with powershell injection, got it more stable
- Added better stability for the credential harvester to handle exceptions when being passed certain pieces of data including null connections
- Added better stability on the multiattack credential harvester php and applet attack
- Fixed a bug that would cause payload selection to not work correctly when using pyInjector
- Added so the peensy attack will prompt for an IP address and rewrite the pde file for the appropriate IP addresses
- Added datetime on teensy devices so they don’t overwrite the teensy.pde files anymore
- Added better encoding into the java applet attack vector
- Added better packing and encryption on the pyinjector attack, loads super fast now when executing applet
- Added better reliability in the Java Applet
- Even more improved load times for the Java Applet and executable execution
- Added anti debugger and encryption to the initial staged downloader which is used for fast loading of payloads
Posted by Mohit Kumar at Tuesday, October 09, 2012
Nessus 5.0.2 vulnerability scanner updates
- UTF8 encoding problems would sometimes cause the generation of reports to fail
- Fixed a case where generating some compliance checks reports would cause the scanner to hang, using 100% of the CPU
- Resolved a resource leak issue occurring when a large number of different users are connected at the same time .
- Network congestion errors are now detected more conservatively
- Upgraded libxml2, libxslt, openssl to their newest versions
- Some nessusd.rules directives were not honored by the port scanners
- Solaris 10 build
Posted by Mohit Kumar at Tuesday, October 09, 2012