BeEF 0.4.3.8 - Browser Exploitation Framework
Posted by Mohit Kumar at Saturday, November 03, 2012
Spooftooph 0.5.2 - Automated spoofing or cloning Bluetooth device
Features
- Clone and log Bluetooth device information
- Generate a random new Bluetooth profile
- Change Bluetooth profile every X seconds
- Specify device information for Bluetooth interface
- Select device to clone from scan log
1) Specify NAME, CLASS and ADDR.
root@thnlab: spooftooph -i hci0 -n new_name -a 00:11:22:33:44:55 -c 0x1c010c
2) Randomly generate NAME, CLASS and ADDR.
root@thnlab: spooftooph -i hci0 -R
3) Scan for devices in range and select device to clone. Optionally dump the device information in a specified log file.
root@thnlab: spooftooph -i hci0 -s -w file.csv
4) Load in device info from log file and specify device info to clone.
root@thnlab: spooftooph -i hci0 -r file.csv
5) Clone a random devices info in range every X seconds.
root@thnlab: spooftooph -i hci0 -t 10
Download Spooftooph 0.5.2
Posted by Mohit Kumar at Saturday, November 03, 2012
Wifi Honey - Creates fake APs using all encryption
Installing wifi honey
chmod a+x wifi_honey.sh
./wifi_honey.sh fake_wpa_net
./wifi_honey.sh fake_wpa_net 1 waln1
Download Wifi Honey
Posted by Mohit Kumar at Saturday, November 03, 2012
JBoss Autopwn - JSP Hacking Tool For JBoss AS Server
Posted by Mohit Kumar at Saturday, November 03, 2012
Burp Suite Free Edition v1.5 released
- Burp's UI has been completely overhauled, to improve looks and usability:
- Fonts are now available throughout the UI, with corresponding resizing of all UI elements (tables, dialogs, buttons, etc.).
- There are configurable hotkeys for all common functions.
- Intruder and Repeater now have smart tabs, which you can drag to reorder, and click to create, close or rename.
- Tables are natively sortable everywhere, except where the row ordering is part of the options you are configuring.
- Text fields now have context-aware auto-complete memory.
Posted by Mohit Kumar at Thursday, November 01, 2012
Scylla v1 Penetration Testing Tool - Because there's no patch for human stupidity
Scylla provides all the power of what a real audit, intrusion, exclusion and analysis tool needs, giving the possibility of scanning misconfiguration bugs dynamically. Scylla aims to be a better tool for security auditors, extremely fast, designed based on real scenarios, developed by experienced coders and constructed with actual IT work methods.
The words “Configuration Tracer” are the best definition for Scylla, a tool to help on IT audits. Scylla is a tool to audit different online application protocols and configurations, built over a brute-force core.
This tool acts as a tool for unifying auditing techniques, in other words, it does what oscanner, winfingerprint, Hydra, DirBuster, and other tools do, and also what those tools don't do.
Supported Protocols
- Terminal (Telnet, SSH, telnets)
- FTP (FTPS, FTP, SFTP)
- SMB (Also Windows RPC)
- LDAP
- POP3 (POP3S)
- SMTP (SMTPS)
- IMAP
- MySql
- MSSQL
- Oracle (Database and TNS Listener)
- DB2 (Database and DAS)
- HTTP(HTTPS; Basic AUTH Brute Force, Digest AUTH Brute Force, Form Brute Force, Directory and files Brute Force)
- DNS (DNS snooping)
- Postgres SQL
Posted by Mohit Kumar at Thursday, November 01, 2012
Penetration Testing Cheat Sheet from 'Average Security Guy'
Posted by Mohit Kumar at Thursday, November 01, 2012
BackBox Linux version 3.0 released
- System upgrade
- Bug corrections
- Performance boost
- Improved start menu
- Improved Wi-Fi dirvers (compat-wireless aircrack patched)
- New and updated hacking tools
- 32-bit or 64-bit processor
- 512 MB of system memory (RAM)
- 4.4 GB of disk space for installation
- Graphics card capable of 800×600 resolution
- DVD-ROM drive or USB port
Posted by Mohit Kumar at Thursday, November 01, 2012
DEFT 7.2 Released - Computer Forensic live system
- Virtual appliance based on Vmware 5 with USB3 support
- Kernel 3.0.0-26
- Autopsy 3 beta 5 (using Wine – please note that you need minimum 1GB ram)
- Log2tmeline 0.65
- Guymager 0.6.12-1
- Vmfs support
- Some mirror fix
Posted by Mohit Kumar at Thursday, November 01, 2012
Android Privacy Guard v1.0.8 - OpenPGP for Android
- HKP key server support
- app2sd support
- more pass phrase cache options: 1, 2, 4, 8 hours
- bugfixes
Posted by Mohit Kumar at Tuesday, October 23, 2012
Snuck - Automatic XSS filter bypass
Posted by Mohit Kumar at Tuesday, October 23, 2012
TCHead - TrueCrypt Password Cracking Tool
Posted by Mohit Kumar at Monday, October 22, 2012
OWASP Zed Attack Proxy (ZAP) Weekly Releases
- Completely rewritten 'traditional' Spider (c/o Cosmin Stefan and the GSoC)
- New Ajax Spider (using Crawljax, c/o Guifre Ruiz and the GSoC)
- Web sockets support (c/o Robert Koch and the GSoC)
- Performance improvements (both speed and memory)
- Session awareness
- Authentication handling
- Contexts
- Modes (Safe, Protected and Standard)
- Online links in menu
Posted by Mohit Kumar at Monday, October 22, 2012
Social-Engineer Toolkit (SET) 4.1.3 Released
Posted by Mohit Kumar at Friday, October 19, 2012
WebSploit Framework 2.0.3 with Wifi Jammer
[>]Social Engineering Works
[>]Scan,Crawler & Analysis Web
[>]Automatic Exploiter
[>]Support Network Attacks
----
[+]Autopwn - Used From Metasploit For Scan and Exploit Target Service
[+]wmap - Scan,Crawler Target Used From Metasploit wmap plugin
[+]format infector - inject reverse & bind payload into file format
[+]phpmyadmin Scanner
[+]LFI Bypasser
[+]Apache Users Scanner
[+]Dir Bruter
[+]admin finder
[+]MLITM Attack - Man Left In The Middle, XSS Phishing Attacks
[+]MITM - Man In The Middle Attack
[+]Java Applet Attack
[+]MFOD Attack Vector
[+]USB Infection Attack
[+]ARP Dos Attack
[+]Web Killer Attack
[+]Fake Update Attack
[+]Fake Access point Attack
Download WebSploit Framework 2.0.3
Posted by Mohit Kumar at Wednesday, October 17, 2012
dSploit v1.0.23b -- Android network penetration suite
- RouterPWN
- Launch the http://routerpwn.com/ service to pwn your router.
- Port Scanner
- A syn port scanner to find quickly open ports on a single target.
- Inspector
- Performs target operating system and services deep detection, slower than syn port scanner but more accurate.
- Vulnerability Finder
- Search for known vulnerabilities for target running services upon National Vulnerability Database.
- Login Cracker
- A very fast network logon cracker which supports many different services.
- Packet Forger
- Craft and send a custom TCP or UDP packet to the target.
- MITM
- A set of man-in-the-middle tools to command&conquer the whole network .
Posted by Mohit Kumar at Wednesday, October 17, 2012
Ettercap 0.7.5 released - codename "Assimilation"
- Fix versioning, flags.
- Need latest version of libnet that supports IPv6
- Fix gtk crash.
- Switched to git repo and CMAKE
- Now that IPv6 is supported the cli requires an extra “/”. To poison all hosts in a broadcast domain the command would be /// (Instead of // // in past versions.)
- Fixed Release tag and build flags, BZ 855504.
- Fixed Obsoletes, BZ 855067.
- Switch to git ettercap_rc branch for gtk crash, BZ 853791.
- Dropped UI and daemon patches.
- Merged subpackages, in part due to buildsystem change.
- Spec cleanup.
- Rebuilt for https ://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild
- Add hardened build.
- libnet rebuild.
- New upstream.
- Rebuild against PCRE 8.30
Posted by Mohit Kumar at Wednesday, October 17, 2012
jSQL Injection v 2.0 released
- GET, POST, header, cookie methods
- visual, errorbase, blind algorithms
- automatic best algorithms detection
- data retrieving progression
- proxy setting
- For now supports only MySQL.
Download jSQL Injection v 2.0
Posted by Mohit Kumar at Wednesday, October 17, 2012
Arachni version 0.4.1.1 Released
- Auditor#log and Auditor#log_remote_file bugfixed to pass a Hash of the response headers instead of a String — also solving another bug causing response bodies not to be logged in the Issues. [Issue #294]
- Issue — Response headers are now always Hash.
- Reports
- HTML — Removed response headers handling code and added the option to not include HTTP response bodies. [Issue #296]
- XML — Removed response headers handling code and added the option to not include HTTP response bodies. [Issue #296]
- HTTP debugging output now includes Response data. [Issue #297]
- Executables
- arachni_rpcd_monitor — Laxed standards enforced on the Dispatcher URL argument. [Issue #293]
- Path extractors
- Added path extractor for the area HTML tag (href attribute). [Issue #300]
Posted by Mohit Kumar at Wednesday, October 17, 2012
ModSecurity 2.7.0 Stable Release
ModSecurity is a web application firewall that can work either embedded or as a reverse proxy. It provides protection from a range of attacks against web applications and allows for HTTP traffic monitoring, logging and real-time analysis.
- Internationalization (I18N) Support
- HMAC Token Injection to prevent data manipulation
- PCRE JIT Support to speed up regular expression operators
- Caching Lua VMs to speed up multiple scripts
- Ability to add exceptions based on TAG and MSG data
- Per-rule Performance information in audit log
Posted by Mohit Kumar at Wednesday, October 17, 2012