Saturday, December 21, 2013

"Exploit Pack" -- The most advanced and easy to use tool for pentesters



Exploit Pack is an open source GPLv3 licensed bundle of scripts ( known as exploits ) with an easy to use GUI and a SID IDE. It’s built on JAVA and Python, which means it’s easy to customize and works very nicely on any device. Like every software that has an open source license you can patch, extend or add your own ideas to it. Just checkout the code and go for it. This tool was made thinking on the end-user, it's not going to replace any other security tool on the market, but it's for sure a must-have for every security enthusiast, researcher or paranoid user.

It's easy to use

Hello script kiddie. Don't you worry, you can always use this tool without reading any kind of documentation. But shame on you.
Multi OS support

It was developed thinking on multi platform support by default for x86 but it will run on Windows, Linux, FreeBSD and Mac OSX.
IDE for Exploit Dev's

A must-have for effective exploit development, extend or add more features and include your own exploit codes. 
 

"NoSQLMap" -- Automated NoSQL Database pwnage

What is NoSQLMap?

NoSQLMap is an open source Python tool designed to audit for as well as automate injection attacks and exploit default configuration weaknesses in NoSQL databases, as well as web applications using NoSQL in order to disclose data from the database.  It is named as a tribute to Bernardo Damele and Miroslav's Stampar's popular SQL injection tool SQLmap, and its concepts are based on and extensions of Ming Chow's excellent presentation at Defcon 21, "Abusing NoSQL Databases".  Presently the tool's exploits are focused around MongoDB, but additional support for other NoSQL based platforms such as CouchDB, Redis, and Cassandra are planned in future releases; right now the goal is to provide a proof of concept tool to debunk the premise that NoSQL is impervious to SQL injection attacks.



Features

  • Automated MongoDB database enumeration and cloning attacks.
  • PHP application parameter injection attacks against MongoClient to return all database records.
  • Javascript function variable escaping and arbitrary code injection to return all database records.
  • Timing based attacks similar to blind SQL injection to validate Javascript injection vulnerabilities with no feedback from the application.
  • More coming soon!  
                                     Please Download NoSQLMap from here.
                                                       DOWNLOAD

Drone engineered to autonomously seek out, hack, and wirelessly take full control over any other drones

Amazon announced they're planning to use unmanned drones to deliver some packages to customers within five years. Cool! How fun would it be to take over drones, carrying Amazon packages…or take over any other drones, and make them my little zombie drones. Awesome.
Using a Parrot AR.Drone 2, a Raspberry Pi, a USB battery, an Alfa AWUS036H wireless transmitter, aircrack-ng, node-ar-drone, node.js, and my SkyJack software, I developed a drone that flies around, seeks the wireless signal of any other drone in the area, forcefully disconnects the wireless connection of the true owner of the target drone, then authenticates with the target drone pretending to be its owner, then feeds commands to it and all other possessed zombie drones at my will.
SkyJack also works when grounded as well, no drone is necessary on your end for it to work. You can simply run it from your own Linux machine/Raspberry Pi/laptop/etc and jack drones straight out of the sky.
SkyJack (available from github) is primarily a perl application which runs off of a Linux machine, runs aircrack-ng in order to get its wifi card into monitor mode, detects all wireless networks and clients around, deactivates any clients connected to Parrot AR.drones, connects to the now free Parrot AR.Drone as its owner, then uses node.js with node-ar-drone to control zombie drones.
I detect drones by seeking out any wireless connections from MAC addresses owned by the Parrot company, which you can find defined in the Registration Authority OUI.

aircrack-ng

I use aircrack-ng to put our wireless device into monitor mode to find our drones and drone owners. I then use aireplay-ng to deauthenticate the true owner of the drone I'm targeting. Once deauthenticated, I can connect as the drone is waiting for its owner to reconnect.

node-ar-drone

I use node-ar-drone to control the newly enslaved drone via Javascript and node.js.

Hardware

Parrot AR.Drone 2

The Parrot AR.Drone 2 is the drone that flies around seeking other drones, controlled from an iPhone, iPad or Android, and is also the type of drone SkyJack seeks out in order to control. SkyJack is also capable of seeking out Parrot AR.Drone version 1.
The Parrots actually launch their own wireless network which is how the owner of the drone connects. We take over by deauthenticating the owner, then connecting now that the drone is waiting for its owner to connect back in, exploiting the fact that we destroyed their wireless connection temporarily.

Raspberry Pi

I use a Raspberry Pi to drive the project as it's inexpensive, reasonably light, has USB, and runs Linux.

Alfa AWUS036H wireless adapter

I use the Alfa AWUS036H wireless card which supports raw packet injection and monitor mode which allow me to deauthenticate users who are legitimately connected to their drones.

Edimax EW-7811Un wireless adapter

I also use the Edimax EW-7811Un wireless USB adapter in order for SkyJack to launch its own network. This allows me to connect to SkyJack from my laptop or iPad and watch all the other drones as they're being controlled.

USB Battery

I suggest any USB battery which is light (under 100 grams), and can output close to an amp (1000mAh). The Raspberry Pi + wifi will likely use about this much juice. You could also possibly hook up three AAA batteries together to get about 4.5V out which would be a bit lighter, though I'm not sure how much current it will be able to output.

 Please watch the detail video here YOUTUBE




Thursday, November 28, 2013

Vulnerable Web Application for Learning Penetration Testing

penetration test, occasionally pentest, is a method of evaluating computer and network security by simulating an attack on a computer system or network from external and internal threats. So Web application Penetration Testing is the security evaluation of Web application or simply known as websites. Many people want to learn about web apps hacking and want to persuade their career as pen-tester but don't have idea about learning and where to test their skill. So I have provided list of vulnerable web apps where you can try you web kung-fu skill or can use any automated tools for pen-test.


Project name Project home page Technologies/Frameworks
OWASP bricks http://sechow.com/bricks/ PHP, MySQL
NOWASP (Mutillidae) http://sourceforge.net/projects/mutillidae/ PHP, MySQL
DVWA (Damn Vulnerable Web Application) http://www.dvwa.co.uk PHP, MySQL
OWASP WebGoat Project https://www.owasp.org/index.php/Category:OWASP_WebGoat_Project .NET, J2EE
InsecureWebApp http://insecurewebapp.sourceforge.net/main/index.html J2EE (JSP)
exploit.co.il Vulnerable Web App http://sourceforge.net/projects/exploitcoilvuln/ PHP
hackxor http://hackxor.sourceforge.net Perl, MySQL
LAMP Security Training http://sourceforge.net/projects/lampsecurity/ PHP, MySQL
BodgeIt Store http://code.google.com/p/bodgeit/ J2EE (JSP)
Moth http://www.bonsai-sec.com/en/research/moth.php PHP, MySQL
OWASP Vicnum http://sourceforge.net/projects/vicnum/ PHP, Perl
Hack Me Bank http://www.mcafee.com/us/downloads/free-tools/hacme-bank.aspx .NET 1.1, MSSQL
Hack Me Bank – Android http://www.mcafee.com/us/downloads/free-tools/hacme-bank-android.aspx Java 1.6 and up, Android SDK
Hack Me Books http://www.mcafee.com/us/downloads/free-tools/hacmebooks.aspx Java 1.4 and up
Hack Me Casion http://www.mcafee.com/us/downloads/free-tools/hacme-casino.aspx Ruby on Rails
Hack Me Shipping http://www.mcafee.com/us/downloads/free-tools/hacmeshipping.aspx ColdFusion, MySQL
Hack Me Travel http://www.mcafee.com/us/downloads/free-tools/hacmetravel.aspx .NET 1.1, C++

Wednesday, November 27, 2013

New way of Hacking Facebook "Tab Napping" Be Aware!!

Hacking account of any Facebook users has been the delightful perspective of any normal human beings. And every year hackers around the world invent new techniques to hack Facebook account. Recently the new way of hacking Facebook account is in the hacking scenario and its "Tabnapping"

Tab Napping

A new kind of phishing that is usually created for Facebook users is hitting the internet. This is totally a new kind of phishing which can trick users to fall on its trap.

How does it works?

Tab napping is more sophisticated than the phishing scams we have ever seen so far, and its no longer relies on persuading you to click on a dodgy link. Instead it targets internet users who open lots of tabs on their browser at the same time (for example, by pressing CTRL + T). If we have multiple tabs open and we are reading the page on our current active tab, any of the other inactive browser tabs could be replaced with a fake web page that is set up to obtain your personal data, the web page will look exactly the same as the page you opened in the tab, we probably wont even even know it has been replaced with a fake page. Fraudsters can actually detect when a tab has been left inactive for a while, and spy on your browser history to find out which websites you regularly visit, and therefore which pages to fake.This may surprise us but phishers and fraudsters in general can actually detect when a tab has been left inactive for a period of time, which means they can spy on our browsing history, this tells them which websites and web pages you visit on a regularly basis, so they'll know which bank we use and which email account we use, whatever we view, they'll know about it, which means they'll know which fake pages to make to replace the real pages in your inactive tabs, we've now left our self open to become a victim of tab napping.


Steps for creating Tab Napping

First of all we should have a web site to upload the tab napping files and if  we don't have then we may create in a free web hosting site. 
  •  First we have to download the phishing and script here. Download
  • Then we have to upload all the files and folders to our website.  
  • The website contain a game and have to send website address(your tab napping website where you upload all the files) to our friend or anyone else whose Facebook account we want to hack and tell him/her that if your are intelligent or smart or say anything else then play this game and win it.
  •  Actually the game is very difficult and he/she will not win in less time and he/she will go to another tab in browser like Facebook, Google, Youtube, Yahoo etc and when he/she came back to the website , it will be automatically redirected and saying them to logged in with Facebook account to continue...


  • When our victim log in with Facebook account then her/his password will saved in our website and he/she will be redirected to main game page.

  •  Now just have tp open=======http://www.our-website.com/fb/password.html------and we will see the email and passwords.
This is just an educational blog for those who wants to learn about Information Security. I am not responsible for any kind of damage done by you. Please remain safe and learn more.


Tuesday, November 19, 2013

FruityWifi (Wireless Network Auditing Tool) V1.0 released

FruityWifi is a new Wireless Network auditing tool which is based upon the WiFi Pineapple. This application is an open source tool which has been tested in Debian, Kali Linux, Kali Linux ARM (Raspberry Pi), Raspbian (Raspberry Pi). It can be installed in any Debain based system. This tool is developed by xtr4nge.


The Following are the services that are given by the FruityWifi.
  • Wireless: Start|Stop wireless access point. (hostapd)
  • Supplicant: Connects to the internet using a wireless interface
  • Karma: REF: http://www.digininja.org/karma/
  • URL Snarf: Start|Stop urlsnarf
  • URL Spoof: Start|Stop urlsnarf
  • Kismet: Start|Stop kismet
  • Squid: Start|Stop squid3
  • sslstrip: Start|Stop sslstrip
The FruityWifi is available for download and that's too for free. You can download the tool from here

Installation

The developer xtr4ange has provided manual guide for those who are interested. This link leads to the manual guide provided by developer and if you want to view the steps of installation in video then go to his Youtube channel