Enter your email address:


Showing posts with label Hacking. Show all posts
Showing posts with label Hacking. Show all posts

Saturday, April 20, 2013

Weevely : Stealth PHP web shell with telnet style console


Weevely is a stealth PHP web shell that provides a telnet-like console. It is an essential tool for web application post exploitation, and can be used as stealth backdoor or as a web shell to manage legit web accounts, even free hosted ones.

  • More than 30 modules to automatize administration and post exploitation tasks:
    • Execute commands and browse remote filesystem, even with PHP security restriction
    • Audit common server misconfigurations
    • Run SQL console pivoting on target machine
    • Proxy your HTTP traffic through target
    • Mount target filesystem to local mount point
    • Simple file transfer from and to target
    • Spawn reverse and direct TCP shells
    • Bruteforce SQL accounts through target system
    • Run port scans from target machine
    • And so on..
  • Backdoor communications are hidden in HTTP Cookies
  • Communications are obfuscated to bypass NIDS signature detection
  • Backdoor polymorphic PHP code is obfuscated to avoid HIDS AV detection


Nessus 5.0.2 vulnerability scanner updates

Nessus is the world’s most widely-deployed vulnerability and configuration assessment product updated to version 5.0.2 .Nessus 5 features high-speed discovery, configuration auditing, asset profiling, sensitive data discovery, patch management integration, and vulnerability analysis of your security posture with features that enhance usability, effectiveness, efficiency, and communication with all parts of your organization.

Nessus 5.0.2 change logs:
  • UTF8 encoding problems would sometimes cause the generation of reports to fail
  • Fixed a case where generating some compliance checks reports would cause the scanner to hang, using 100% of the CPU
  • Resolved a resource leak issue occurring when a large number of different users are connected at the same time .
  • Network congestion errors are now detected more conservatively
  • Upgraded libxml2, libxslt, openssl to their newest versions
  • Some nessusd.rules directives were not honored by the port scanners
  • Solaris 10 build

BeEF 0.4.3.8 - Browser Exploitation Framework



The Browser Exploitation Framework (BeEF) is a powerful professional security tool. It is a penetration testing tool that focuses on the web browser. BeEF is pioneering techniques that provide the experienced penetration tester with practical client side attack vectors. 

Unlike other security frameworks, BeEF focuses on leveraging browser vulnerabilities to assess the security posture of a target. This project is developed solely for lawful research and penetration testing.

BeEF hooks one or more web browsers as beachheads for the launching of directed command modules. Each browser is likely to be within a different security context, and each context may provide a set of unique attack vectors.

Transfer your Domain to blogger ( Domain point to bogger)/ Edit Your DNS



How to Edit DNS Record when function is not provided with domain controller like crazydomains.in


Hello Friends,

Today one of my friends ask this problem then i am making this tut.


For transferring your domain to your blog on blogger.com Just go to basic setting write your top leve domain name and you will be provided two CNAME settings to be edited on the DNS of name server of domain.


It is easy to update the CNAME in domain DNS setting but when you purchase your domain at lower price some domain controller does not provide you to edit DNS setting you can update only nameservers.

So how will you do it.

Here is tut for this,

1. Go to your domain controller and update name server there

     ns1: ghs.google.com


     ns2: ghs.google.com

( IT does not matter you can put watever else.)

2. Now do the same thing as told above. Go to basic settings tab and update your domain you will get two
 CNAME there like this


                 


3. Step: Now Use Cloudflare.com for editing you DNS :)

   Create an Account on Cloudflare its Free.
 
  provide the domain name it vl take 40 sec to detect all you DNS Settings.

When it shows you all the DNS just Delete all DNS settings watever is there.

Then add two CNAME as per given in blogger.com




then cick on I am done editing my DNS Records.

Now Cloudflare will provide you two nameservers



Now update these nameserver provided in your Domain Control.
Wait for 2- 3 hrs for updation of DNS records. when done,

4. Just go to your Blogger Setting and update your domain name and its done.

**Note Choose all Setup free in Cloudflare :)


Monday, September 17, 2012

WEP Cracker Using fern wifi cracker



A very good tutorial by my friend harpreet singh on Wep Cracking. He has used the tool "fern-wifi-cracker" which is easily avaliable on backtrack 5 R3.

So lets begin ...
Go to backtrack --> exploitation tools --> wireless exploitation tools --> 
WLAN exploitation --> fern-wifi-cracker

Now select the wireless interface you have ( it can be wlan0, wlan1 etc..)


























Now there's a button on which you can see wifi logo, click that and it will start the network scanning ( of-course its using airodump here).

Note*: if you double-click anywhere in the tool, you'll get a "settings" dialog box... you can set the channel there and also you can start the xterm.


























Now if you see closely, you'll note that the two buttons below the scan button will get enabled, the first button is the WEP cracking button and the second one is for WPA cracking.

Click the button for WEP cracking


























After clicking that button, a new dialog box will open. you can select the wep network from the list and then you can select the type of attack i.e arp replay attack, chop-chop attack or fragmentation attack. then click "Attack"...


























You'll be able to see the number of ivs are increasing.There's a progress bar at the end of the dialog box.When the progress bar reaches the end, this tool starts aircrack for cracking wifi password


























When the password is cracked, it will be shown at the bottom of the dialog box...

NOW COMES THE INTERESTING PART:
(before going further, i suggest you to connect to the internet for this)

Go to "toolbox" --> Geolocatory tracker.




















Give the bssid of the AP in the text box and click "Trace".




















I think everyone has already guessed what it will show...

YES... INDEED... IT WILL SHOW YOU THE LOCATION OF THE AP ON THE GOOGLE MAPS ... You can see the coordinates as well..




















And also you can see in the toolbox, there's a button for cookie hijacking called "cookie hijacker" ..

ok guys so that's it for now... :-)

Related Posts