another Blog on Information Security | Network Security | Tips and Tricks | Sharing is Caring | Search,Learn,Share |
Wednesday, January 30, 2013
SQLSentinel v0.3 - OpenSource tool for sql injection security testing
SQLSentinel is an opensource tool that automates the process of finding the sql injection on a website. SQLSentinel includes a spider web and sql errors finder. You give in input a site and SQLSentinel crawls and try to exploit parameters validation error for you. When job is finished, it can generate a pdf report which contains the url vuln found and the url crawled.
Please remember that SQLSentinel is not an exploiting tool. It can only finds url Vulnerabilities
SQLSentinel github:
https://github.com/karonte691/sqlsentinel
SQLSentinel Web Site
Download SQLSentinel_v_0.3.zip (2.1 MB)
Download other version
Source-
http://sourceforge.net/projects/sqlsentinel/
Tuesday, January 29, 2013
inspathx - Path Disclosure Finder
A tool that uses local source tree to make requests to the url and search for path inclusion error messages. It's a common problem in PHP web applications that we've been hating to see. We hope this tool triggers no path disclosure flaws any more. See our article about path disclosure.
http://yehg.net/lab/pr0js/view.php/path_disclosure_vulnerability.txt
Report bugs/suggestions to inspathx at yehg dot net.
WHY
Web application developers sometimes fail to add safe checks against authentications, file inclusion ..etc are prone to reveal possible sensitive information when those applications' URLs are directly requested. Sometimes, it's a clue to Local File Inclusion vulnerability. For open-source applications, source code can be downloaded and checked to find such information.
This script will do this job.
First you have to download source archived file of your desired OSS.
Second, extract it.
Third, feed its path to inspath
The inspath takes
-d, --dir /source/app set source code directory/source path definition file of application Required
-u, --url http://site.com/ set url if -g option is not specified
-t, --threads 10 set thread number(default: 10)
-l, --language php set language [php,asp,aspx,jsp,jspx,cfm,all] (default all - means scan all)
-x, --extension php set file extensions (php4,php5,...) default regex: php4,php5,php6,php,asp,aspx,jsp
,jspx,cfm
-m, --method TYPE http method get/post (default: get)
-h, --headers HEADERS add http header
-q, --data DATA http get/post data
-n, --null-cookie add null session cookie (no need to specify cookie name)
-f, --follow follow http redirection
-p, --param-array identify parameters in target url,make 'em array (value: 1 for , 2 for ,
3 for , n .... *n) <note: --data value untouched>
-r, --regexp REGEXP specify your own regexp to search in returned responses
-g, --gen FILE read source directory (-d) & generate file list so next time you can feed this file path in -d option instead of source directory.
--rm remove source directory used to generate path file list.
-c, --comment STRING comment for path definition file to be used with -g and -d options. date is automatically appended.
--x-p show only paths in console and write them to file with path_vuln.txt surfix. This does not contain target url portion.
--xp alias to --x-p
-s, --search STRING search path definition files in paths/ & paths_vuln/ directories.
See the sample logs in sample_logs folder - scan logs of latest mambo and wordpress applications
Similar terms: Full Path Disclosure, Internal Path Leakage
SUPPORTED LANGUAGES
PHP
ASP(X)
JSP(X)
ColdFusion
HOW
ruby inspathx.rb -u http://localhost/wordpress
ruby inspathx.rb -u http://localhost/wordpress -p 1
ruby inspathx.rb -d /sources/wordpress -u http://localhost/wordpress
ruby inspathx.rb -d /sources/wordpress -g paths/wordpress-3.0.4
ruby inspathx.rb -d paths/wordpress-3.0.4 -u http://localhost/wordpress
ruby inspathx.rb -d c:/sources/wordpress -u http://localhost/wordpress -t 20 -l php
ruby inspathx.rb -d /sources/jspnuke -u http://localhost/jspnuke -t 20 -l jsp -x jsp,jspx -n
See EXAMPLES for more information.
DOWNLOAD/UPDATE
We love svn. Check it out at
svn checkout http://inspathx.googlecode.com/svn/trunk/ inspathx-read-only
SAMPLE LOGS
Mambo 4.6.5 http://inspathx.googlecode.com/svn/trunk/sample_logs/localhost_mambo_.log
WordPress 3.0.1 http://inspathx.googlecode.com/svn/trunk/sample_logs/localhost_wp_.log
REFERENCES
http://www.owasp.org/index.php/Full_Path_Disclosure
http://projects.webappsec.org/Information-Leakage
http://cwe.mitre.org/data/definitions/209.html
Use portable bash versions if you wish:
http://www.pentesterscripting.com/discovery/web_requester
http://www.pentesterscripting.com/exploitation/bash_web_parameter_fuzzer
Source-
http://code.google.com/p/inspathx/
http://yehg.net/lab/pr0js/view.php/path_disclosure_vulnerability.txt
Report bugs/suggestions to inspathx at yehg dot net.
WHY
Web application developers sometimes fail to add safe checks against authentications, file inclusion ..etc are prone to reveal possible sensitive information when those applications' URLs are directly requested. Sometimes, it's a clue to Local File Inclusion vulnerability. For open-source applications, source code can be downloaded and checked to find such information.
This script will do this job.
First you have to download source archived file of your desired OSS.
Second, extract it.
Third, feed its path to inspath
The inspath takes
-d, --dir /source/app set source code directory/source path definition file of application Required
-u, --url http://site.com/ set url if -g option is not specified
-t, --threads 10 set thread number(default: 10)
-l, --language php set language [php,asp,aspx,jsp,jspx,cfm,all] (default all - means scan all)
-x, --extension php set file extensions (php4,php5,...) default regex: php4,php5,php6,php,asp,aspx,jsp
,jspx,cfm
-m, --method TYPE http method get/post (default: get)
-h, --headers HEADERS add http header
-q, --data DATA http get/post data
-n, --null-cookie add null session cookie (no need to specify cookie name)
-f, --follow follow http redirection
-p, --param-array identify parameters in target url,make 'em array (value: 1 for , 2 for ,
3 for , n .... *n) <note: --data value untouched>
-r, --regexp REGEXP specify your own regexp to search in returned responses
-g, --gen FILE read source directory (-d) & generate file list so next time you can feed this file path in -d option instead of source directory.
--rm remove source directory used to generate path file list.
-c, --comment STRING comment for path definition file to be used with -g and -d options. date is automatically appended.
--x-p show only paths in console and write them to file with path_vuln.txt surfix. This does not contain target url portion.
--xp alias to --x-p
-s, --search STRING search path definition files in paths/ & paths_vuln/ directories.
See the sample logs in sample_logs folder - scan logs of latest mambo and wordpress applications
Similar terms: Full Path Disclosure, Internal Path Leakage
SUPPORTED LANGUAGES
PHP
ASP(X)
JSP(X)
ColdFusion
HOW
ruby inspathx.rb -u http://localhost/wordpress
ruby inspathx.rb -u http://localhost/wordpress -p 1
ruby inspathx.rb -d /sources/wordpress -u http://localhost/wordpress
ruby inspathx.rb -d /sources/wordpress -g paths/wordpress-3.0.4
ruby inspathx.rb -d paths/wordpress-3.0.4 -u http://localhost/wordpress
ruby inspathx.rb -d c:/sources/wordpress -u http://localhost/wordpress -t 20 -l php
ruby inspathx.rb -d /sources/jspnuke -u http://localhost/jspnuke -t 20 -l jsp -x jsp,jspx -n
See EXAMPLES for more information.
DOWNLOAD/UPDATE
We love svn. Check it out at
svn checkout http://inspathx.googlecode.com/svn/trunk/ inspathx-read-only
SAMPLE LOGS
Mambo 4.6.5 http://inspathx.googlecode.com/svn/trunk/sample_logs/localhost_mambo_.log
WordPress 3.0.1 http://inspathx.googlecode.com/svn/trunk/sample_logs/localhost_wp_.log
REFERENCES
http://www.owasp.org/index.php/Full_Path_Disclosure
http://projects.webappsec.org/Information-Leakage
http://cwe.mitre.org/data/definitions/209.html
Use portable bash versions if you wish:
http://www.pentesterscripting.com/discovery/web_requester
http://www.pentesterscripting.com/exploitation/bash_web_parameter_fuzzer
Source-
http://code.google.com/p/inspathx/
GNS3 0.8.4 RC1 released
GNS3 0.8.4 RC1 is now released. This is the last step before a final release and last chance to catch bugs.
Here is a quick list of the changes:
Or by visiting http://www.gns3.net/gns3-0-8-
GNS3 is a graphical network simulator that allows simulation of complex networks.
To provide complete and accurate simulations, GNS3 is strongly linked with:
GNS3 is an excellent complementary tool to real labs for network engineers, administrators and people wanting to study for certifications such as Cisco CCNA, CCNP, CCIP and CCIE as well as Juniper JNCIA, JNCIS and JNCIE.
It can also be used to experiment features of Cisco IOS, Juniper JunOS or to check configurations that need to be deployed later on real routers.
Thanks to VirtualBox integration, now even system engineers and administrators can take advantage of GNS3 to make labs and study for Redhat (RHCE, RHCT), Microsoft (MSCE, MSCA), Novell (CLP) and many other vendor certifications.
This project is an open source, free program that may be used on multiple operating systems, including Windows, Linux, and MacOS X.
Features overview |
Monday, January 28, 2013
httest 2.2.13 - script based tool for testing and benchmarking web applications
httest is a script based tool for testing and benchmarking web applications, web servers, proxy servers and web browsers. httest can emulate clients and servers in the same test script, very useful for testing proxys.
The httest provides a large variety of HTTP-related functionality, useful for implementing all kinds of HTTP-based tests. Licenced under the Apache License Version 2.0.
Features
The httest provides a large variety of HTTP-related functionality, useful for implementing all kinds of HTTP-based tests. Licenced under the Apache License Version 2.0.
Features
- HTTP server client simulation
- SSL support
- IPv6 support
- Request/response validation
- Cut and paste from request/response
- Execute shell commands and use output in HTTP stream
- Lua scripting engine
- Javascript engine
- Full ICAP support
- Websocket support
- XPath support
- NTLM authentication tool
- SOCKS support
- Simple SMTP support
- Simple POP3 support
- Distributed load test support
New httest 2.2.13 released on 25. January 2013 available. Recommended stable version.
With Lua, websocket, debugging, javascript, XPath, SSL tracing and load testing support.
With Lua, websocket, debugging, javascript, XPath, SSL tracing and load testing support.
Download httest-2.2.13-win.zip (3.4 MB) updated on 26-Jan-2013
Components
- httest - main programm
- htproxy - generate httest scripts
- htntlm - enable ntlm in your httest scripts
- hturlext - extracts url from html (GNU General Public License 2.0)
- htremote - enable interactive scripts in your httest scripts
Use Cases
Source-
UPDATE NOWASP (Mutillidae) v2.4.2 - Web Pen-Test Practice Application
NOWASP (Mutillidae) is a free, open source, deliberately vulnerable web-application providing a target for web-security enthusiest. NOWASP (Mutillidae) can be installed on Linux and Windows using LAMP, WAMP, and XAMMP for users who do not want to administrate a webserver. It is pre-installed on SamuraiWTF, Rapid7 Metasploitable-2, and OWASP BWA. The existing version can be updated on pre-installed platforms. With dozens of vulns and hints to help the user; this is an easy-to-use web hacking environment designed for labs, security enthusiast, classrooms, CTF, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, corporate web sec training courses, and as an "assess the assessor" target for vulnerability assessment software.
Instructional videos using NOWASP (Mutillidae) are available on the "webpwnized" YouTube channel athttps://www.youtube.com/user/webpwnized. Project/video updates tweeted tohttps://twitter.com/webpwnized.
Instructional videos using NOWASP (Mutillidae) are available on the "webpwnized" YouTube channel athttps://www.youtube.com/user/webpwnized. Project/video updates tweeted tohttps://twitter.com/webpwnized.
Features
- Mutillidae can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to install or administrate their own webserver. Mutillidae is confirmed to work on XAMPP, WAMP, and LAMP. XAMPP is the "default" deployment.
- Installs easily by dropping project files into the "htdocs" folder of XAMPP.
- Will attempt to detect if the MySQL database is available for the user
- Preinstalled on Rapid7 Metasploitable 2, Samurai Web Testing Framework (WTF), and OWASP Broken Web Apps (BWA)
- Contains 2 levels of hints to help users get started
- Has dozen of vulnerablities and challenges. Contains at least one vulnearbility for each of the OWASP Top Ten 2007 and 2010
- Includes bubble-hints to help point out vulnerable locations
- System can be restored to default with single-click of "Setup" button
- Switches between secure and insecure mode
- Secure and insecure source code for each page stored in the same PHP file for easy comparison
- Used in graduate security courses, in corporate web sec training courses, and as an "assess the assessor" target for vulnerability software
- Mutillidae has been tested/attacked with Cenzic Hailstorm ARC, W3AF, SQLMAP, Samurai WTF, Backtrack, HP Web Inspect, Burp-Suite, NetSparker Community Edition, and other tools
- Instructional Videos: http://www.youtube.com/user/webpwnized
- Updates tweeted to @webpwnized
Source-
ESSPEE - (ESSPEE-R3 x86) Penetration Testing & Forensics
ESSPEE is a derivetive of Back | Track 5, based on Ubuntu 12.04. Designed for users who wish to use only free software. It is packed with featured security tools with stable configurations. This version consolidates the Unity desktop interface; a brand new way to find and manage your applications.
Features
Features
- A Perfect Forensics Mode - Read-Only Mount
- A Perfect Stealth Mode - Networking Disabled
- Latest kernel with aufs support (Kernel 3.7.4)
- Metasploit Framework v4.6.0-dev [core:4.6 api:1.0]
- OSSEC - Open Source Host-based Intrusion Detection System
- Gnome-fallback Desktop Environment.
- Gnome-Pie - All your favourite applications at single click
- Suricata - Open Source Next Generation IDS/ IPS.
- Snorby - Suricata IDS/IPS Monitoring Web Interface.
- Meld - A visual diff and merge tool for compare files and directories.
- MySQL Workbench - A visual MySQL database designing tool.
- ESSPEE Personal Firewall - Realtime Pop-up Notification. (Thanks to Leopard Flower)
- Net Activity Viewer - A graphical network connections viewer.
- LOIQ - Open source network stress testing application.
- Guymager - Forensics imaging tool (GUI)
- Ostinato - Open-source network packet crafter/traffic generator.
- FSlint - Find and clean various unwanted extraneous files.
- Ruby 1.9.3p327 (2012-11-10 revision 37606)
- Fern Wi-Fi Cracker
- Virtualbox - Create your own virtual lab
- Nemiver - A standalone graphical C and C++ debugger
- Open Audit - Network inventory, audit and management tool
- Mobile Phone Forensics tools
- Anonymity - Tor network and many more .......
ESSPEE_R3_Live_DVD released on 26/01/2013
Download - https://docs.google.com/uc?export=download&confirm=no_antivirus&id=0B9Qo6IGWg3_qVzUzTmk1eG95QzQ
MD5 - 61aa7c877568d8c109fb407b0540f0f4
Size - 3.35 GB
Type - ISO (DVD)
OS - Linux (Based on Ubuntu 12.04 - Precise Pangolin)
Category - Network Security, Penetration testing, Forensics, Data Recovery.
Source-
http://sourceforge.net/projects/esspee/Friday, January 25, 2013
SystemRescueCD 3.3.0
SystemRescueCD: Bootable CD with a complete Linux system and tools for repairing and restoring data after a system crash. It creates and edits partitions and contains system utilities such as parted, partimage and fstools, as well as basic tools such as editors and network programs. Supports both 'classic' and network file systems such as NFS and Samba.
Download systemrescuecd-x86-3.3.0.iso (385.7 MB)
Download other versions from here
Download systemrescuecd-x86-3.3.0.iso (385.7 MB)
Download other versions from here
System and Networking Guides
In addition to the SystemRescueCd documentation here are other related guides:
- Disk Partitioning: Introduction, attributes, tools, GPT disks, How Grub boots, How to repair Grub
- LVM Volume-Manager: Overview, How it works, Booting, Rootfs on LVM, Snapshots and Backups
- Networking on Linux: network configuration, advanced routing, dport routing, load balancing
Project documentation
This project comes with good documentation. Here are the most important chapters:
For the impatient:
- Quick start guide: please read this if this is the first time you are using this system recovery cd.
Chapters about basic usage:
- Downloading and burning: how to download and burn SystemRescueCd
- Booting SystemRescueCd: the boot options you many want to use
- Starting to use the system: how to use SystemRescueCd when it's ready
- Network: configuration and programs: how to configure internet and the network
- System software: description of the linux software which is available on this disc
- Mounting an NTFS partition with full Read-Write support: how to mount your windows partition to see its files
- System boot floppy disks: other low level system tools you may need (e.g.: memory tester)
Chapters about advanced usage:
- How to personalize SystemRescueCd: make a custom SystemRescueCd with your own modifications or software
- How to install SystemRescueCd on a USB-stick: how to install SystemRescueCd on a USB stick
- Easy install SystemRescueCd on harddisk: you can also boot SystemRescueCd directly from the harddisk
- PXE network booting with SystemRescueCd: you can boot SystemRescueCd from the network
- Run your own scripts at start-up with autorun: use SystemRescueCd to run your own scripts
- Manage remote windows or linux servers using SystemRescueCd: administrate remote servers using SystemRescueCd
- Backup data from an unbootable Windows computer: backup your data if your windows is broken
System tools included
- GNU Parted: creates, resizes, moves, copies partitions, and filesystems (and more).
- GParted: GUI implementation using the GNU Parted library.
- Partimage: popular opensource disk image software which works at the disk block level
- ddrescue: Attempts to make a copy of a partition or floppy/Hard Disk/CD/DVD that has hardware errors, optionally filling corresponding bad spots in input with user defined pattern in the copy.
- FSArchiver: flexible archiver that can be used as both system and data recovery software
- File systems tools (for Linux and Windows filesystems): format, resize, and debug an existing partition of a hard disk
- Ntfs3g: enables read/write access to MS Windows NTFS partitions.
- sfdisk: saves / restores partition table (and more).
- Test-disk: tool to check and undelete partition, supports reiserfs, ntfs, fat32, ext2/3 and many others
- Memtest+: to test the memory of your computer (first thing to test when you have a crash or unexpected problems)
- Rsync: very-efficient and reliable program that can be used for remote backups.
- Network tools (Samba, NFS, ping, nslookup, ...): to backup your data across the network
Browse the short system tools page for more details about the most important software included.
Browse the detailed package list for a full list of the packages.
Advanced uses
SystemRescueCd is available for blind people. Now, the linux speakup screen reader is working well, and the speakup keymap is installed. This feature was tested by Gregory Nowak. Please note that you need SystemRescueCd-1.1.0 or later. Notes specific to using speakup in SystemRescueCD are available on the speakup info page.
It is possible to make customized versions of the CD. For example, you can add your own scripts, to make an automatic restoration of the system. It's also possible to burn a customized DVD, with SystemRescueCd and 4.2 GB for your data (backup for example). Read the manual for more details. There is a new manual chapter that explains How you can burn a DVD+RW from SystemRescueCd
You can use SystemRescueCd to backup data from an unbootable Windows computer, if you want to backup the data stored on a Windows computer that cannot boot any more.
It is very easy to install SystemRescueCd on a USB stick. That's very useful in case you can't boot from the CD drive. You just have to copy several files to the stick and run syslinux. The install process can be done from Linux or Windows. Follow instructions from the Manual for more details.
Source-
Recon-ng - Web Reconnaisance framework written in Python
Recon-ng is a full-featured Web Reconnaisance framework written in Python. Complete with independent modules, database interaction, built in convenience functions, interactive help, and command completion, Recon-ng provides a powerful environment in which open source web-based reconnaissance can be conducted quickly and thoroughly.
Recon-ng has a look and feel similar to the Metasploit Framework, reducing the learning curve for leveraging the framework. However, it is quite different. Recon-ng is not intended to compete with existing frameworks, as it is designed exclusively for web-based open source reconnaissance. If you want to exploit, use the Metasploit Framework. If you want to Social Engineer, us the Social Engineer Toolkit. If you want to conduct reconnaissance, use Recon-ng! See the Usage Guide for more information.
Recon-ng is a completely modular framework and makes it easy for even the newest of Python developers to contribute. Each module is a subclass of the "module" class. The "module" class is a customized "cmd" interpreter equipped with built-in functionality that provides simple interfaces to common tasks such as standardizing output, interacting with the database, making web requests, and managing API keys. Therefore, all the hard work has been done. Building modules is simple and takes little more than a few minutes. See the Development Guide for more information.
Thursday, January 24, 2013
Update NOWASP (Mutillidae) v2.4.1 - Web Pen-Test Practice Application
NOWASP (Mutillidae) is a free, open source, deliberately vulnerable web-application providing a target for web-security enthusiest. NOWASP (Mutillidae) can be installed on Linux and Windows using LAMP, WAMP, and XAMMP for users who do not want to administrate a webserver. It is pre-installed on SamuraiWTF, Rapid7 Metasploitable-2, and OWASP BWA. The existing version can be updated on pre-installed platforms. With dozens of vulns and hints to help the user; this is an easy-to-use web hacking environment designed for labs, security enthusiast, classrooms, CTF, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, corporate web sec training courses, and as an "assess the assessor" target for vulnerability assessment software.
Instructional videos using NOWASP (Mutillidae) are available on the "webpwnized" YouTube channel athttps://www.youtube.com/user/webpwnized. Project/video updates tweeted tohttps://twitter.com/webpwnized.
Instructional videos using NOWASP (Mutillidae) are available on the "webpwnized" YouTube channel athttps://www.youtube.com/user/webpwnized. Project/video updates tweeted tohttps://twitter.com/webpwnized.
Features
- Mutillidae can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to install or administrate their own webserver. Mutillidae is confirmed to work on XAMPP, WAMP, and LAMP. XAMPP is the "default" deployment.
- Installs easily by dropping project files into the "htdocs" folder of XAMPP.
- Will attempt to detect if the MySQL database is available for the user
- Preinstalled on Rapid7 Metasploitable 2, Samurai Web Testing Framework (WTF), and OWASP Broken Web Apps (BWA)
- Contains 2 levels of hints to help users get started
- Has dozen of vulnerablities and challenges. Contains at least one vulnearbility for each of the OWASP Top Ten 2007 and 2010
- Includes bubble-hints to help point out vulnerable locations
- System can be restored to default with single-click of "Setup" button
- Switches between secure and insecure mode
- Secure and insecure source code for each page stored in the same PHP file for easy comparison
- Used in graduate security courses, in corporate web sec training courses, and as an "assess the assessor" target for vulnerability software
- Mutillidae has been tested/attacked with Cenzic Hailstorm ARC, W3AF, SQLMAP, Samurai WTF, Backtrack, HP Web Inspect, Burp-Suite, NetSparker Community Edition, and other tools
- Instructional Videos: http://www.youtube.com/user/webpwnized
- Updates tweeted to @webpwnized
Update version available for download -
source-


.png)





.png)
