Showing posts with label Hacking Tools. Show all posts
Showing posts with label Hacking Tools. Show all posts

Saturday, September 10, 2011

Arachni v0.3 Released – Web Application Security Scanner Framework

It’s been a while since we last mentioned Arachni, it was back in February – Arachni v0.2.2.1 – Web Application Security Scanner Framework.


For those who are not aware, Arachni is a fully automated system which tries to enforce the fire and forget principle. As soon as a scan is started it will not bother you for anything nor require further user interaction. Upon completion, the scan results will be saved in a file which you can later convert to several different formats (HTML, Plain Text, XML, etc.)


The project was initially started as an educational exercise though it has since evolved into a powerful and modular framework allowing for fast, accurate and flexible security/vulnerability assessments..


More than that, Arachni is highly extend-able allowing for anyone to improve upon it by adding custom components and tailoring most aspects to meet most needs.


The author notified us of a major new release (v0.3) which has some great new features, a few of those being:


A new custom-written, lightweight SpiderAdd-on support for the WebUI Scan schedulerAutoDeploy — Convert any SSH enabled Linux box into a DispatcherImproved accuracy of differential analysis auditsImproved accuracy of timing attack auditsHighly optimized timing attacks

If you are interested in the WebUI aspect you can check out some screenshots here, the more comprehensive ChangeLog is also available here.


For those of you into benchmarking and testing you might be interested to know that during a recent test Arachni was the only (from a long list of commercial and F/OSS systems) that hit 100% on both XSS and SQLi tests in the WAVSEP benchmark:


Commercial Web Application Scanner Benchmark


The author is doing a great job with this tool and rapidly closing the gap between free security scanners and the very expensive commercial options. If you do have any feedback on Arachni v0.3 drop a comment here or hit up the Arachni Google Group.


You can download Arachni v0.3 here:


arachni-v0.3-cde.tar.gz


Or read more here.

winAUTOPWN v2.7 Released – Windows Autohacking Tool

I’ve always been skeptical about this tool, especially seen as though the first version was released on April Fools day in 2009, anyway it’s 2 years later now and it still seems to be around so I think it’s worth publishing an update.


If any of you have actually tested this tool out, do drop a comment below.


winAUTOPWN and bsdAUTOPWN are minimal Interactive Frameworks which act as a frontend for quick systems vulnerability exploitation. It takes inputs like IP address, Hostname, CMS Path, etc. and does a smart multi-threaded portscan for TCP ports 1 to 65535. Exploits capable of giving Remote Shells, which are released publicly over the Internet by active contributors and exploit writers are constantly added to winAUTOPWN/bsdAUTOPWN. A lot of these exploits are written in scripting languages like python, perl and php. Presence of these language interpreters is essential for successful exploitations using winAUTOPWN/bsdAUTOPWN.


Exploits written in languages like C, Delphi, ASM which can be compiled are pre-compiled and added along-with others. On successful exploitation winAUTOPWN/bsdAUTOPWN gives a remote shell and waits for the attacker to use the shell before trying other exploits. This way the attacker can count and check the number of exploits which actually worked on a Target System.


New in v2.7


This version covers almost all remote exploits up-till mid-July 2011 and a few older ones as well. This version incorporates a few new commandline parameters: -perlrevshURL (for a PERL Reverse Shell URL), – mailFROM (smtpsender) and -mailTO (smtpreceiver). These are the commandline arguments required for a few exploits which require remote connect-back using a perl shell and email server exploits requiring authentication respectively. This version also tackles various internal bugs and fixes them.


A complete list of all Exploits in winAUTOPWN is available in CHANGELOG.TXT
A complete list of User Interface changes is available in UI_CHANGES.txt


Also, in this version :

BSDAUTOPWN has been upgraded to version 1.5.In this release you will also find pre-compiled binaries for :FreeBSD x86FreeBSD x64DragonFly BSD x86

You can download winAUTOPWN v2.7 here:


winAUTOPWN_2.7.RAR


Or read more here.

Agnitio v2.0 Released – Code Security Review Tool

It’s been a while since we’ve mentioned Agnitio, it was earlier this year in March: Agnitio v1.2 – Manual Security Code Review Tool.


The author notified me of a new version that was recently released with quite a few additions. For those not familiar with it, Agnitio is a tool to help developers and security professionals conduct manual security code reviews in a consistent and repeatable way. Agnitio aims to replace the adhoc nature of manual security code review documentation, create an audit trail and reporting.


Changes in V2.0


The major changes in v2.0 is the addition of a code analysis module which comes with Android and iOS rules, an editor for the checklist questions and the ability to create/edit/remove code analysis rules.

Fixed verify report button bug. It used to make the app crash if the report path field was empty because it didn’t check if it was empty before trying to use the field value.Delete profile functionality added on the “view profiles” tab. Some users requested this functionality.Removed hard coded filesystem paths and database names/locations from the code and make them configuration items.Data editor for both principles and checklist guidance sections. This allows users to customise the guidance using their own languages, guidance text etc.Increase the max size value of the text boxes on the principles guidance tab to allow more information to be entered by users.More accurate error on the profile creation tab – specify exactly what fields have been missed rather than listing all.Added “About” form with info, license, credits etcRegular expressions expanded to include a wider range of characters including non English characters.Turn the “other” language box red if the user clicks save with the other check box ticked but not language entered on the create and view profile tabs.Metrics tab now “returns” if only one app is available rather than trying to load all graphs and throwing a separate error for each one.

The author is always interested in feedback and has integrated a lot of it into v2.0 of Agnitio, if you want to give some suggestions/bug reports or whatever after using the tool you can do so via the Security Ninja blog here, or on Twitter @securityninja.


You can download Agnitio v2.0 here:


Agnitio v2.zip


Or read more here.

Mediggo – Tool To Detect Weak Or Insecure Cryptosystems Using Generic Cryptanalysis Techniques

Mediggo is an opensource cryptanalysis library. This library implements generic cryptanalysis techniques to detect weak or insecure cryptosystems or learn and practice with cryptanalysis.


This library is open source (LGPL licence) and written in C programming language. Samples and test cases are provided with each techniques:

the solution is not always given to make people practicethe solution can always be obtained by contacting the development team

Current Features

Detection and cryptanalysis of weakly implemented or trapped systems

Future Features

Automatic detection of statistical biases in cryptographic algorithms.Specific cryptanalysis tools.

You can download Mediggo here:


megiddo-0.4.0.tar.gz


Or read more here.

WebSurgery – Web Application Security Testing Suite

WebSurgery is a suite of tools for security testing of web applications. It was designed for security auditors to help them with the web application planning and exploitation. Currently, it uses an efficient, fast and stable Web Crawler, File/Dir Brute forcer, Fuzzer for advanced exploitation of known and unusual vulnerabilities such as SQL Injection, Cross site scripting (XSS), Brute force for login forms, identification of firewall-filtered rules, DOS Attacks and WEB Proxy to analyze, intercept and manipulate the traffic between your browser and the target web application.


WEB Crawler


WEB Crawler was designed to be fast, accurate, stable, completely parametrable and the use of advanced techniques to extract links from Javascript and HTML Tags. It works with parametrable timing settings (Timeout, Threading, Max Data Size, Retries) and a number of rules parameters to prevent infinitive loops and pointless scanning (Case Sensitive, Dir Depth, Process Above/Below, Submit Forms, Fetch Indexes/Sitemaps, Max Requests per File/Script Parameters). It is also possible to apply custom headers (user agent, cookies etc) and Include/Exclude Filters. WEB Crawler come with an embedded File/Dir Brute Forcer which helps to directly brute force for files/dirs in the directories found from crawling.


WEB Bruteforcer


WEB Bruteforcer is a brute forcer for files and directories within the web application which helps to identify the hidden structure. It is also multi-threaded and completely parametrable for timing settings (Timeout, Threading, Max Data Size, Retries) and rules (Headers, Base Dir, Brute force Dirs/Files, Recursive, File’s Extension, Send GET/HEAD, Follow Redirects, Process Cookies and List generator configuration).
By default, it will brute force from root / base dir recursively for both files and directories. It sends both HEAD and GET requests when it needs it (HEAD to identify if the file/dir exists and then GET to retrieve the full response).


WEB Fuzzer


WEB Fuzzer is a more advanced tool to create a number of requests based on one initial request. Fuzzer has no limits and can be used to exploit known vulnerabilities such (blind) SQL Inections and more unsual ways such identifing improper input handling, firewall/filtering rules, DOS Attacks.


WEB Editor


A simple WEB Editor to send individual requests. It also contains a HEX Editor for more advanced requests.


WEB Proxy


WEB Proxy is a proxy server running locally and will allow you to analyze, intercept and manipulate HTTP/HTTPS requests coming from your browser or other application which support proxies.


You can download WebSurgery here:


Setup – setup.msi
Portable – websurgery.zip


Or read more here.

Friday, September 9, 2011

Uniscan 4.0 Released - vulnerability scanner


Uniscan 4.0 Released 


The Uniscan vulnerability scanner is aimed at information security, which aims at finding vulnerabilities in Web systems and is licensed under the GNU GENERAL PUBLIC LICENSE 3.0 (GPL 3). The Uniscan was developed using the Perl programming language to be easier to work with text, has an easy to use regular expressions and is also multi-threaded.


Uniscan Features Identification of system pages through a Web Crawler.Use of threads in the crawler.Control the maximum number of requests the crawler.Control of variation of system pages identified by Web Crawler.Control of file extensions that are ignored.Test of pages found via the GET method.Test the forms found via the POST method.Support for SSL requests (HTTPS).Proxy support.


Official Change Log : Uniscan is now Modularized.Added directory checks.Added file checks.Added PUT method enabled check.Bug fix in crawler when found ../ directory.Crawler support POST method.Configuration by file uniscan.conf.Added checks for backup of files found by crawler.Added Blind SQL-i checks.Added static RCE, RFI, LFI checks.Crawler improved by checking /robots.txt.improved XSS vulnerability detection.improved SQL-i vulnerability detection.


Download Here:
http://sourceforge.net/projects/uniscan/files/4.0/uniscan.tar/download

winAUTOPWN v2.7 – Windows Autohacking Tool


winAUTOPWN v2.7 – Windows Autohacking Tool


This version covers almost all remote exploits up-till mid-July 2011 and a few older ones as well. This version incorporates a few new commandline parameters: -perlrevshURL (for a PERL Reverse Shell URL), – mailFROM (smtpsender) and -mailTO (smtpreceiver). These are the commandline arguments required for a few exploits which require remote connect-back using a perl shell and email server exploits requiring authentication respectively. This version also tackles various internal bugs and fixes them.
A complete list of all Exploits in winAUTOPWN is available in CHANGELOG.TXT
A complete list of User Interface changes is available in UI_CHANGES.txt
Also, in this version :


BSDAUTOPWN has been upgraded to version 1.5.
In this release you will also find pre-compiled binaries for :
FreeBSD x86
FreeBSD x64
DragonFly BSD x86


Download winAUTOPWN v2.7
http://27.106.39.229/w/Downloads.html

Yersinia - tool for analyzing and testing networks and systems.


Yersinia - tool for analyzing and testing networks and systems.




Yersinia is a network tool designed to take advantage of some weakeness in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems.


Currently, there are some network protocols implemented, but others are coming (tell us which one is your preferred). Attacks for the following network protocols are implemented (but of course you are free for implementing new ones):


Spanning Tree Protocol (STP)
Cisco Discovery Protocol (CDP)
Dynamic Trunking Protocol (DTP)
Dynamic Host Configuration Protocol (DHCP)
Hot Standby Router Protocol (HSRP)
IEEE 802.1Q
IEEE 802.1X
Inter-Switch Link Protocol (ISL)
VLAN Trunking Protocol (VTP)




Download Here:
http://www.yersinia.net/download.htm

WebSurgery v.0.6 Released - Web application testing suite




WebSurgery is a suite of tools for security testing of web applications. It was designed for security auditors to help them with the web application planning and exploitation. Currently, it uses an efficient, fast and stable Web Crawler, File/Dir Brute forcer, Fuzzer for advanced exploitation of known and unusual vulnerabilities such as SQL Injections, Cross site scripting (XSS), Brute force for login forms, identification of firewall-filtered rules, DOS Attacks and WEB Proxy to analyze, intercept and manipulate the traffic between your browser and the target web application.


download Here:
http://www.surgeonix.com/blog/index.php/archives/117

download Sniffjoke - Anti-sniffing Framework & Tool For Session Scrambling


download Sniffjoke - Anti-sniffing Framework & Tool For Session Scrambling

SniffJoke is an application for Linux that handle transparently your TCP connection, delaying, modifying and injecting fake packets inside your transmission, make them almost impossible to be correctly read by a passive wiretapping technology (IDS or sniffer).


An Internet client running SniffJoke injects in the transmission flow some packets able to seriously disturb passive analysis like sniffing, interception and low level information theft. No server support is needed!


The internet protocols have been developed to allow two elements to communicate, not some third-parts to intercept their communication. This will happen, but the communication system has been not developed with this objective. SniffJoke uses the network protocol in a permitted way, exploiting the implicit difference of network stack present in an operating system respect the sniffers dissector.


How Does It Work?
It works only under Linux (at the moment), creates a fake default gateway in your OS (the client or a default gateway) using a TUN interface check every traffic passing thru it, tracks every session and
applyies two concepts: the scramble and the hack.


The scramble is the technology to bring:


A sniffer to accept as true a packet who will be discarded by the server, or
A sniffer to drop a packet who will be accepted by the server.
The scramble technology brings in desynchronisation between the sniffer flow and the real flow.


The bogus packet accepted by the sniffer is generated by the “plugin” is a C++ simple class, which in a pseudo statefull tracking will forge the packet to be injected inside the flow. is pretty easy to develop
anew one, and if someone wants to make research on sniffers attack (or fuzzing the flow searching for bugs) need to make the hand inside its.


The configuration permits to define blacklist/whitelist ip address to scramble, a degree of aggressivity for each port, which plugin will be used.


download here:
http://www.delirandom.net/sniffjoke/sniffjoke-howto-usage/

DarkComet-RAT v.4.0 released


DarkComet-RAT (Remote Administration Tool) is the most complete and one of the most stable RAT in the scene.this software is design for people that have a very good knowledge in computer security, it can be userfull in many case. 


Remote control your network computers (LAN / WAN) 
Remote assist your clients if you manage a company 
Find your lost passwords in your computers 
Spy your home networks (For your childs,Wife,Husband...) 
Test the security of your computers or your company 
To develop your knowledge in RAT softwares 


Change log: 
DarkComet-RAT is now compiled on Delphi XE instead of Delphi 2010. 
Synthax highlighter added in remote keylogger. 
Get hard drive information added in file manager 
Bot logs in main form had change, it is more efficient / fast and user friendly 
Whole system parser is now far stable and faster 
No-IP was moded and is now better ;) 
Flags manager has been ported to the main client settings form 
Now you can change the default size Width and Height of the users thumbnails 
No more menu in the top of the SIN (Main Window - Users list)so it is more clear 
and much more 


Download Here:
http://www.darkcomet-rat.com/process_download.php?id=5

Monitoring Network Traffic Using Packet Sniffing Tools


Network traffic is the flow of data across the network (Wired and Wireless Network)
Packet sniffer or Network analyzer is a computer program or a piece of computer hardware that can intercept and log traffic passing over a digital network.

Who uses packet sniffers?
Packet sniffers are used by both White Hat Hacker (Legal) and Black Hat Hacker (Illegal) activity.
Legal packet sniffer is a commercial device used to assist with network management and maintenance and to provide network security. It is also used as a diagnostic tool for network backup systems and to examine the network system for any security breaches.
Illegal packet sniffer is used to gain unauthorized access to sensitive information and data on a network. An illegal packet sniffer is installed without the knowledge of the IT administrator and hides in different areas of the network for the purpose of spying on and stealing the information packets that pass over the network.
How packet Sniffer works?
When a computer sends a data in the network it sends in the form of packets. These packets are the chunks of data are actually directed to the certain designated system. Actually every sent data has a predefined receiving point. So, all the data are directly directed to a particular computer. Normally a system in a network is designed to receive and read only those data which are intended for it, but when we install a packet sniffer on a network, it looks out for all the data traveling across the network.
The packet-sniffing process involves a cooperative effort between software and hardware. This process can be broken down into three steps such as
Packet sniffer collects raw binary data from the wire. Typically, this is done by switching the selected network interface into promiscuous modeCaptured binary data is converted into a readable form.Analysis of the captured and converted data. The packet sniffer takes the captured network data, verifies its protocol based on the information extracted, and begins its analysis of that protocol’s specific features.
Packet Sniffing Tools
Some popular to tools for network analyzing and packet sniffing are given below.
Wireshark - It is a fantastic open source network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, delving down into just the level of packet detail you need. Wireshark has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. It also supports hundreds of protocols and media types.
Tcpdump - It is one of the oldest network packet sniffer. It was originally written in 1987. Tcpdump works primarily on Unix like operating systems, but there is a port of it that works on Windows as well. tcpdump  is meant for experienced users only, as this packet sniffer is a command line utility. tcpdump can analyze network behavior, and monitor applications that generate network traffic.
 
Microsoft Network Monitor - Microsoft Network Monitor is a free network packet sniffer. This works on Windows PCs, and provides expert capability to see all the network traffic in real time on an intuitive GUI. Microsoft Network Monitor  is actively maintained by Microsoft, is available for a completely free download, and has a dedicated support site here. Microsoft Network Monitor can be used by beginners just to analyze their home network traffic, or by network administrators to analyze complete organization network by sniffing network packets.
Kismet - Kismet is an console  based 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. It identifies networks by passively sniffing and can even decloak hidden networks if they are in use. It can automatically detect network IP blocks by sniffing TCP, UDP, ARP, and DHCP packets, log traffic in Wireshark/TCPDump compatible format, and even plot detected networks and estimated ranges on downloaded maps.
Capsa - It is a very comprehensive network packet sniffer that comes in both free version as well as paid version. Free version comes with tons of features, and is good enough for home use, as well as use in small business. Capsa  does effective network analysis in real time by sniffing network packets, and analyze them. Free version of Capsa lets you monitor 50 IP addresses together, which makes this free packet sniffer especially useful for network administrators.
SniffPass - SniffPass is a very specific type of packet sniffer that focuses on capturing passwords from network traffic. When you turn on Sniffpass password sniffer, it keeps on monitoring network traffic, and as soon as it intercepts a password, it instantly shows that on screen. This is a great way to find forgotten passwords of websites.
Ettercap - Ettercap is a suite for man in the middle attacks on LAN. It features sniffing of live connections, content filtering on the fly and many other interesting tricks.It supports active and passive dissection of many protocols (even ciphered ones) and includes many feature for network and host analysis.
Dsniff - Dsniff is a collection of tools for network auditing and penetration testing. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data. arpspoof, dnsspoof, and macof facilitate the interception of network traffic normally unavailable to an attacker. sshmitm and webmitm implement active monkey-in-the-middle attacks against redirected SSH and HTTPS sessions by exploiting weak bindings in ad-hoc PKI.
EtherApe - EtherApe is a graphical network monitor for Unix modeled after etherman. Featuring link layer, IP and TCP modes, it displays network activity graphically. Hosts and links change in size with traffic. Color coded protocols display.
Cain and Abel - Enables sniffing on switched LANs and Man-in-the-Middle attacks. The sniffer in this version can also analyze encrypted protocols such as SSH-1 and HTTPS, and contains filters to capture credentials from a wide range of authentication mechanisms.
Ntop - Ntop shows network usage in a way similar to what top does for processes. In interactive mode, it displays the network status on the user's terminal. In Web mode, it acts as a Web server, creating an HTML dump of the network status. It sports a NetFlow/sFlow emitter/collector, an HTTP-based client interface for creating ntop-centric monitoring applications, and RRD for persistently storing traffic statistics.
Network Miner - NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows. NetworkMiner can be used as a passive network sniffer/packet capturing tool in order to detect operating systems, sessions, hostnames, open ports etc. without putting any traffic on the network. NetworkMiner can also parse PCAP files for off-line analysis and to regenerate/reassemble transmitted files and certificates from PCAP files.

HACK THE HACKER : BIN TEXT


Bin Text is basically a text extractor software used to extract text from application or any file. It can extract email ID and password from applications like Hotmail Hacker and Gmail Hacker. Step by Step usage and tutorial is below:
1. Refer my article Hack Gmail Accounts : Gmail Hacker to create Gmail Hacker.exe file.
2. Unzip the downloaded Bin Text software in a separate folder.
3. Open Bin Text and browse for the location where you have kept the Gmail Hacker.exe file that you have created. Now Hit Go.
4. Bin Text will scan the whole file and display all the extracted text from Gmail Hacker.exe file.
5. Now scroll down till you find email address and password as I have shown in the screen shot above.
This means that if your friend or someone else has given you this Gmail hacker software and told you that this software can hack email accounts and if you feel suspicious of him, you can easily hack his email account password. Enjoy hacking the hacker!!!
Download here:
http://www.mediafire.com/download.php?yoeiinztzyy

SMAC : THE MAC ADDRESS CHANGER


SMAC is a powerful and easy to use MAC Address Changer (Spoofer) for Windows systems, regardless of whether the network card manufacturers allow this option or not. Its features include:
Automatically Activate new MAC Address after changing itShow the manufacturer of the MAC Address Randomly Generate any New MAC Address or based on a selected manufacturerPre-load MAC Addresses List and choose the new MAC address from the list.IPConfig button - click to show network adapter (IPConfig) info to confirm changesUser-friendly GUI

Download here:

http://www.mediafire.com/download.php?4djm2znbtmu

FAKE MSN FREEZER


As the name says, this software do not freeze MSN accounts but you can use it to play pranks on your friends. You can send it to your friend telling him that it freezes people's MSN accounts. When he/she will double-click it, it will shutdown their PC within 30 seconds. You can also bind some keylogger or RAT to it with a binder and crypt it with a crypter if you really wanna hack them.
Download here:
http://www.mediafire.com/download.php?o0wmm2zhtnw

EMAIL SPAMMER : BOMB THEM!


Bomb Them! is another simple and very fast email bomber designed to bomb your victim's email account with thousands of emails. As most email bombers do, it uses your Gmail account, and also includes "sending in HTML" and priority feature which results in faster sending of mails.
Download here:
http://www.mediafire.com/download.php?mmm232uyy2n

SWISS ARMY KNIFE


Swiss Army Knife is a multifunctional program which allows us to perform simple tasks of our computer like logoff, shutdown, opening Task Manager, internet explorer or firefox etc. It also has inbuilt hacking tools like Port Scanner, Email Bomber, Facebook Freezer, IM Spammer and also a Batch Virus creator.
Download here:
http://www.mediafire.com/download.php?mnyduzejtkn

HACKER TOOLS


This is a nice collection of' "must have" tools for a hacker such as RAT, keylogger, mail bomber, crypter etc. The advantage of using this package is that all the tools are joined under the same GUI and all the tools are FUD i.e. they will not be detected by your antivirus. So I advice you to use them at your own risk. Alternatively you can use Sandboxie or Deep Freeze to protect your computer if something unexpected happens.
Download here (Pass included in archive):
http://www.mediafire.com/download.php?qz0myynoguy

SONIC BAT - THE BATCH FILE VIRUS CREATOR



This program creates batch (.bat) viruses and has varied options to ruin the victim computer in different ways. We can flood the storage space on victims' computer by making large number of files in different folders by using its "folder flood" feature. It also includes bat to exe converter to convert your batch virus files into exe virus programs and an icon changer.
Download here:
http://www.mediafire.com/download.php?ijzjmx3kd3t

INVISIBLE SECRETS 2.1


With this program, you can hide/encrypt any file say a program, song, document etc in a carrier file (JPEG or BMP image) and send it to anyone secretly without exposing it to world and your friend or other person can decrypt it on other end using this software. You can also specify the password for encryption and decryption. The person on other end can only decrypt the file if he has this software and knows the encryption password. With this software, you can also:
Delete carrier file after processAdd fake files to play pranks on friends   Add other carrier formats (.doc, .txt etc.) other than JPEG or BMP images which are defaultDownload here:
http://www.mediafire.com/download.php?ogzmhzzzhhm