Friday, May 30, 2014

Kali linux 1.0.7 has been released

Kali linux 1.0.7 has just been released, complete with a whole bunch of tool updates, a new kernel, and some cool new features. Check out our changelog for a full list of these items. As usual, you don’t need to re-download or re-install Kali to benefit from these updates – you can update to the latest and greatest using these simple commands:
apt-get update
apt-get dist-upgrade
# If you've just updated your kernel, then:
reboot

KaliLinuxEncryptedUSBPersistence

One of the new sought out features introduced (which is also partially responsible for the kernel update) is the ability to create Kali Linux Live USB with LUKS Encrypted Persistence. This feature ushers in a new era of secure Kali Linux USB portability, allowing us to either boot to a “clean” Kali image or alternatively, overlay it with the contents of a persistent encrypted partition, all within the same USB drive.

ToolDevelopersAhoy!

This release also marks the beginning of some co-ordinated efforts between Kali developers and tool developers to make sure their tools are represented correctly and are fully functional within Kali Linux. We would like to thank the metasploit, w3af, and wpscan dev teams for working with us to perfect their Kali packages and hope that more tool developers join in. Tool developers are welcome to send us an email to  and we’ll be happy to work with you to better integrate your tool into Kali.

KaliLinux:GreaterThantheSumofitsParts

For quite some time now, we’ve been preaching that Kali Linux is more than a “Linux distribution with a collection of tools in it”. We invest a significant amount of time and resources developing and enabling features in the distribution which we think are useful for penetration testers and other security professionals. These features range from things like “live-build“, which allows our end users to easily customize their own Kali ISOs, to features like Live USB persistence encryption, which provides paranoid users with an extra layer of security. Many of these features are unique to Kali and can be found nowhere else. We’ve started tallying these features and linking them from our Kali documentation page – check it out, it’s growing to be an impressive list!

Torrents,VirtualMachine&ARMimages

In the next few days, Offensive Security will post Virtual Machine and custom ARM images for the 1.0.7 release
Source-

OWASP ZAP (Zed Attack Proxy) v2.3.1 released : An easy to use integrated penetration testing tool for finding vulnerabilities in web applications.

OWASP Zed Attack Proxy (ZAP) An easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing as well as being a useful addition to an experienced pen testers toolbox.Changelog v2.3.1
  • ZAP changes request data (while switching views) ( Issue 81 )
  • Unfulfilled dependencies hang the active scan ( Issue 377 )
  • Cant remove scripts marked as ‘load on start’ ( Issue 1073 )
  • core.newSession doesn’t clear Sites ( Issue 1114 )
  • Historical Request Tab Doesn’t allow formatting changes ( Issue 1155 )
  • Proxy gzip decoder doesn’t update content length in response headers ( Issue 1156 )
  • Unable to set a home directory with a space on the command line ( Issue 1163 )
  • Redundant indexes in zapdb.script ( Issue 1166 )
  • Add proxy support for “deflate” content encoding ( Issue 1168 )
  • Spider Context/User pop up menus no longer shown ( Issue 1170 )
  • Unable to select 2 requests in fuzz results (Ctrl + click) ( Issue 1179 )
  • Vulnerable pages active scanned only once ( Issue 1181 )
  • Alerts of same type for different parameters of same vulnerable page shown only once in “Alerts” tree ( Issue 1182 )
  • NullPointerException while selecting a node in the “Alerts” tab after deleting a message ( Issue 1183 )
  • Cmdline session params have no effect ( Issue 1191 )
  • Scan URL path elements – turn off by default ( Issue 1193 )
  • Command line arguments are not passed to extensions when starting ZAP in daemon mode ( Issue 1194 )
  • AbstractPlugin.bingo incorrectly sets evidence to attack ( Issue 1196 )
  • Issue with loading addons that did not initialize correctly ( Issue 1202 )
  • WordPress Authentication Script ( Issue 1203 )
  • ‘History’ tab is not cleared when a new session is created through the API with ZAP in GUI mode ( Issue 1206 )

The following changes were made in this release:
Full Changelog: here 

Monday, January 13, 2014

Subterfuge - The Man-in-the-Middle Attacks Framework v1.0 released




Enter Subterfuge, a Framework to take the arcane art of Man-in-the-Middle Attacks and make it as simple as point and shoot. Subterfuge demonstrates vulnerabilities in the ARP Protocol by harvesting credentials that go across the network and even exploiting machines by injecting malicious code directly into their browsing sessions.


The first step in any Subterfuge attack is gaining a Man-in-the-Middle position. Currently, Subterfuge only ships with one method of establishing itself as MITM, ARP Cache Poisoning. Nevertheless, as a framework, its modular design allows it to support multiple methods.
Some used attacks
ARP Cache Poisoning
Dynamic Poison Retention & ARPBLock

Subterfuge comes with modules that give the ability to leverage the position quickly and easily. Moreover, if your needs are particularly specific, you can create a module for Subterfuge without the need to launch your own attack from scratch. Subterfuge comes packaged with several default modules that you can use to great effect.
List of some integrated modules
Credential Harvester
Session Hijacking
HTTP Code Injection
Denial of Service
Tunnel Block
Network View
Evilgrade

Version 1.0 is the first release of Subterfuge to have come out of Beta! It includes significant package upgrades, compatibility fixes, a modified interface, and a whole new packaging system.

The tool comes with a rich documentation and examples. Take care to go through the website

Download
FAQ
Subterfuge Documentation
Troubleshooting Guide
Development Blog

Thursday, January 9, 2014

Kali Linux 1.0.6 Released



Kernel3.12,LUKSnuke,AmazonAMI/GoogleComputeimagesandmore!
It’s been a while since last minor release which makes 1.0.6 a more significant update than usual. With a new 3.12 kernel, a LUKS nuke feature, new Kali ARM build scripts, and Kali AMAZON AMI and Google Compute image generation scripts, not to mention numerous tool additions and updates – this release is really heavily laden with goodness. For more information about what’s new in this release, check the Kali changelog.

KaliARMBuildScriptsNowAvailable
This new release brings with it the introduction of the Offensive Security Trusted ARM image scripts – a set of slowly growing scripts that are able to build Kali Linux images for various ARM devices. These scripts will replace the growing number of actual ARM image releases we have in order to reduce the exponentially growing amount of traffic we serve on each release. We will release a short blog post about how to use these scripts in the next few days.

LUKSNukePatchAddedtocryptsetup
A couple of days ago, we demonstrated a cool patch for cryptsetup, which introduces a self destruction feature. The response to this post was overwhelmingly positive, as many people voted to see this feature included in Kali Linux. Therefore, we included this patch into our cryptsetup package yesterday, making the luksAddNuke options available to all Kali users by default. The patch is non-invasive and will not change anything for anyone that does not want to make use of it. No action is necessary if you currently use LUKS and don’t want to utilize the key nuke feature. The updated cryptsetup package is present in Kali 1.0.6 by default. We’d like to take a moment to thank everyone who participated in the poll for voicing their opinion. This kind of feedback is very useful for us, giving us a better feel for the type of features to add in the future. In an upcoming blog post, we will take the opportunity to better explain this new feature and show you how to test it out.

UpdatedInstructionsforBuildingVMwareToolswithKernel3.12
VMware Tools always lags behind new kernels, which always causes us headaches and this time is no exception. At the time of this release, VMware Tools does not cleanly compile against kernel 3.12 and requires a set of patches. We have posted these Kali Linux VMware Tools patches on GitHub along with instructions on how to use them. We suspect that these build issues will go away in future releases of VMware Tools.

KaliLinuxAmazonAMI/GoogleComputeBuildScriptsNowAvailable
Yay! This was on our todo list for quite awhile and we’re happy to bring this feature out at last. A set of scripts that enables you to build your own custom Amazon AMI and Google Compute cloud images. If you intend to use the images for any real work, you should first consult with the terms of service of the cloud provider.

SeparationofKaliOfficialImagesandOffensiveSecurityContributedImages
Due to the ever growing number of ARM images Offensive Security is contributing as well as the high demand of more flavours of VMware images, we’ve separated the Official Kali images from Offensive Security contributed images. This allows us to generate more VMware image flavours (amd64, i486, i686-pae), as well as increased flexibility in future releases. To find updated VMware and custom ARM images, visit the Offensive Security Custom Image Download Page. Please bear with us as we update images on this server in the next few days.

ImprovingKaliLinuxPackageFeatures
In the past couple of weeks, jerichodotm has been helping us add watch files to our Kali packages. These watch files allow us to monitor upstream tarball releases for updates in a much more reliable manner. Once this process is complete, we’ll be able to monitor new upstream software updates with much more ease. For example, if you want to check if there’s a new upstream release of nmap, you could do the following:

root@kali:~# apt-get install devscripts
root@kali:~# apt-get source nmap
root@kali:~# cd nmap-6.40/
root@kali:~/nmap-6.40# uscan --no-download --verbose
-- Scanning for watchfiles in .
-- Found watchfile in ./debian
-- In debian/watch, processing watchfile line:
http://nmap.org/dist/nmap-((?:\d+\.)+\d+)\.tgz
-- Found the following matching hrefs:
nmap-5.00.tgz
nmap-5.20.tgz
nmap-5.21.tgz
nmap-5.50.tgz
nmap-5.51.1.tgz
nmap-5.51.2.tgz
nmap-5.51.3.tgz
nmap-5.51.4.tgz
nmap-5.51.5.tgz
nmap-5.51.6.tgz
nmap-5.51.tgz
nmap-6.00.tgz
nmap-6.01.tgz
nmap-6.25.tgz
nmap-6.40.tgz
Newest version on remote site is 6.40, local version is 6.40
=> Package is up to date
-- Scan finished
root@kali:~/nmap-6.40#
NoRe-DownloadingRequired

Lastly, if you already have a Kali Linux installation up and running, you don’t need to download a new ISO. You can easily upgrade your installation to the latest and greatest Kali Linux has to offer as follows:

root@kali:~# apt-get update
root@kali:~# apt-get dist-upgrade
….Engage.

We’re really happy with this release and are looking forward to completing our next goals with 1.0.7. As usual, you are welcome to visit our Kali Linux forums (which now default to HTTPS), read up on our official documentation, submit bugs and patches, or chat with us in IRC, irc.freenode.net, #kali-linux.
ShamelessPlug

Offensive Security has recently updated its “Penetration Testing With BackTrack” online course to “Penetration Testing with Kali linux“. If you’re looking for official, quality training on Kali Linux, this is a great place to start. We’re biased of course, but many other people seem to think so too!

Source-
http://www.kali.org/news/kali-linux-106-released/

Saturday, January 4, 2014

SQLI Hunter v1.2 - automation tool to scan for an Sql Injection vulnerability

SQLI Hunter is an automation tool to scan for an Sql Injection vulnerability in a website.
It automates the search of sqli vulnerable links from Google using google dorks! 

SQLI Hunter can also find admin page of any website by using some predefined admin page lists.

Features :-
- Supports 500 results
- Url List can be Imported / Exported
- Setting for connection timeout
- Proxy Settings
Bug Fixed !

Download Sql Hunter v1.2

Source-
http://www.hackwithmak.com/2012/08/sqli-hunter-v11.html
http://sourceforge.net/projects/sqlihunter/

Screenshot -

The Zed Attack Proxy (ZAP) 2.2.2 released

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications.

It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing.

ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually


Some of ZAP's functionality:-

Intercepting Proxy
Traditional and AJAX spiders
Automated scanner
Passive scanner
Forced browsing
Fuzzer
Dynamic SSL certificates
Smartcard and Client Digital Certificates support
Web sockets support
Support for a wide range of scripting languages
Plug-n-Hack support
Authentication and session support
Powerful REST based API
Automatic updating option
Integrated and growing marketplace of add-ons

Download ZAP 


ZAP 2.2.2 is available via the above link, for more details see the release notes

You can also get cross platform weekly releases which include all of the latest changes.

ZAP Is the Top Security Tool of 2013 as voted by ToolsWatch.org readers!


For more details about ZAP, including the full user guide, see the wiki.
For more videos see the links on the wiki videos page.

Source-