Monday, January 13, 2014

Subterfuge - The Man-in-the-Middle Attacks Framework v1.0 released




Enter Subterfuge, a Framework to take the arcane art of Man-in-the-Middle Attacks and make it as simple as point and shoot. Subterfuge demonstrates vulnerabilities in the ARP Protocol by harvesting credentials that go across the network and even exploiting machines by injecting malicious code directly into their browsing sessions.


The first step in any Subterfuge attack is gaining a Man-in-the-Middle position. Currently, Subterfuge only ships with one method of establishing itself as MITM, ARP Cache Poisoning. Nevertheless, as a framework, its modular design allows it to support multiple methods.
Some used attacks
ARP Cache Poisoning
Dynamic Poison Retention & ARPBLock

Subterfuge comes with modules that give the ability to leverage the position quickly and easily. Moreover, if your needs are particularly specific, you can create a module for Subterfuge without the need to launch your own attack from scratch. Subterfuge comes packaged with several default modules that you can use to great effect.
List of some integrated modules
Credential Harvester
Session Hijacking
HTTP Code Injection
Denial of Service
Tunnel Block
Network View
Evilgrade

Version 1.0 is the first release of Subterfuge to have come out of Beta! It includes significant package upgrades, compatibility fixes, a modified interface, and a whole new packaging system.

The tool comes with a rich documentation and examples. Take care to go through the website

Download
FAQ
Subterfuge Documentation
Troubleshooting Guide
Development Blog

Thursday, January 9, 2014

Kali Linux 1.0.6 Released



Kernel3.12,LUKSnuke,AmazonAMI/GoogleComputeimagesandmore!
It’s been a while since last minor release which makes 1.0.6 a more significant update than usual. With a new 3.12 kernel, a LUKS nuke feature, new Kali ARM build scripts, and Kali AMAZON AMI and Google Compute image generation scripts, not to mention numerous tool additions and updates – this release is really heavily laden with goodness. For more information about what’s new in this release, check the Kali changelog.

KaliARMBuildScriptsNowAvailable
This new release brings with it the introduction of the Offensive Security Trusted ARM image scripts – a set of slowly growing scripts that are able to build Kali Linux images for various ARM devices. These scripts will replace the growing number of actual ARM image releases we have in order to reduce the exponentially growing amount of traffic we serve on each release. We will release a short blog post about how to use these scripts in the next few days.

LUKSNukePatchAddedtocryptsetup
A couple of days ago, we demonstrated a cool patch for cryptsetup, which introduces a self destruction feature. The response to this post was overwhelmingly positive, as many people voted to see this feature included in Kali Linux. Therefore, we included this patch into our cryptsetup package yesterday, making the luksAddNuke options available to all Kali users by default. The patch is non-invasive and will not change anything for anyone that does not want to make use of it. No action is necessary if you currently use LUKS and don’t want to utilize the key nuke feature. The updated cryptsetup package is present in Kali 1.0.6 by default. We’d like to take a moment to thank everyone who participated in the poll for voicing their opinion. This kind of feedback is very useful for us, giving us a better feel for the type of features to add in the future. In an upcoming blog post, we will take the opportunity to better explain this new feature and show you how to test it out.

UpdatedInstructionsforBuildingVMwareToolswithKernel3.12
VMware Tools always lags behind new kernels, which always causes us headaches and this time is no exception. At the time of this release, VMware Tools does not cleanly compile against kernel 3.12 and requires a set of patches. We have posted these Kali Linux VMware Tools patches on GitHub along with instructions on how to use them. We suspect that these build issues will go away in future releases of VMware Tools.

KaliLinuxAmazonAMI/GoogleComputeBuildScriptsNowAvailable
Yay! This was on our todo list for quite awhile and we’re happy to bring this feature out at last. A set of scripts that enables you to build your own custom Amazon AMI and Google Compute cloud images. If you intend to use the images for any real work, you should first consult with the terms of service of the cloud provider.

SeparationofKaliOfficialImagesandOffensiveSecurityContributedImages
Due to the ever growing number of ARM images Offensive Security is contributing as well as the high demand of more flavours of VMware images, we’ve separated the Official Kali images from Offensive Security contributed images. This allows us to generate more VMware image flavours (amd64, i486, i686-pae), as well as increased flexibility in future releases. To find updated VMware and custom ARM images, visit the Offensive Security Custom Image Download Page. Please bear with us as we update images on this server in the next few days.

ImprovingKaliLinuxPackageFeatures
In the past couple of weeks, jerichodotm has been helping us add watch files to our Kali packages. These watch files allow us to monitor upstream tarball releases for updates in a much more reliable manner. Once this process is complete, we’ll be able to monitor new upstream software updates with much more ease. For example, if you want to check if there’s a new upstream release of nmap, you could do the following:

root@kali:~# apt-get install devscripts
root@kali:~# apt-get source nmap
root@kali:~# cd nmap-6.40/
root@kali:~/nmap-6.40# uscan --no-download --verbose
-- Scanning for watchfiles in .
-- Found watchfile in ./debian
-- In debian/watch, processing watchfile line:
http://nmap.org/dist/nmap-((?:\d+\.)+\d+)\.tgz
-- Found the following matching hrefs:
nmap-5.00.tgz
nmap-5.20.tgz
nmap-5.21.tgz
nmap-5.50.tgz
nmap-5.51.1.tgz
nmap-5.51.2.tgz
nmap-5.51.3.tgz
nmap-5.51.4.tgz
nmap-5.51.5.tgz
nmap-5.51.6.tgz
nmap-5.51.tgz
nmap-6.00.tgz
nmap-6.01.tgz
nmap-6.25.tgz
nmap-6.40.tgz
Newest version on remote site is 6.40, local version is 6.40
=> Package is up to date
-- Scan finished
root@kali:~/nmap-6.40#
NoRe-DownloadingRequired

Lastly, if you already have a Kali Linux installation up and running, you don’t need to download a new ISO. You can easily upgrade your installation to the latest and greatest Kali Linux has to offer as follows:

root@kali:~# apt-get update
root@kali:~# apt-get dist-upgrade
….Engage.

We’re really happy with this release and are looking forward to completing our next goals with 1.0.7. As usual, you are welcome to visit our Kali Linux forums (which now default to HTTPS), read up on our official documentation, submit bugs and patches, or chat with us in IRC, irc.freenode.net, #kali-linux.
ShamelessPlug

Offensive Security has recently updated its “Penetration Testing With BackTrack” online course to “Penetration Testing with Kali linux“. If you’re looking for official, quality training on Kali Linux, this is a great place to start. We’re biased of course, but many other people seem to think so too!

Source-
http://www.kali.org/news/kali-linux-106-released/

Saturday, January 4, 2014

SQLI Hunter v1.2 - automation tool to scan for an Sql Injection vulnerability

SQLI Hunter is an automation tool to scan for an Sql Injection vulnerability in a website.
It automates the search of sqli vulnerable links from Google using google dorks! 

SQLI Hunter can also find admin page of any website by using some predefined admin page lists.

Features :-
- Supports 500 results
- Url List can be Imported / Exported
- Setting for connection timeout
- Proxy Settings
Bug Fixed !

Download Sql Hunter v1.2

Source-
http://www.hackwithmak.com/2012/08/sqli-hunter-v11.html
http://sourceforge.net/projects/sqlihunter/

Screenshot -

The Zed Attack Proxy (ZAP) 2.2.2 released

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications.

It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing.

ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually


Some of ZAP's functionality:-

Intercepting Proxy
Traditional and AJAX spiders
Automated scanner
Passive scanner
Forced browsing
Fuzzer
Dynamic SSL certificates
Smartcard and Client Digital Certificates support
Web sockets support
Support for a wide range of scripting languages
Plug-n-Hack support
Authentication and session support
Powerful REST based API
Automatic updating option
Integrated and growing marketplace of add-ons

Download ZAP 


ZAP 2.2.2 is available via the above link, for more details see the release notes

You can also get cross platform weekly releases which include all of the latest changes.

ZAP Is the Top Security Tool of 2013 as voted by ToolsWatch.org readers!


For more details about ZAP, including the full user guide, see the wiki.
For more videos see the links on the wiki videos page.

Source-