Showing posts with label Penetration Testing. Show all posts
Showing posts with label Penetration Testing. Show all posts

GFI LanGuard 2012 One Solution For vulnerability Scanning, Patch Management, Network & Software Audit

GFI LanGuard 2012 One Solution For Vulnerability Scanning, Patch Management, Network & Software Auditing 

Earlier we have talked about GFI LanGuard, but while looking at the rising cyber threats, security researcher  continue to identify new, sophisticated malware threats, vulnerability and patch management are more critical than ever as a key component of a layered security approach. To get rid of all those security challenges, GFI Software announced the availability of GFI LanGuard 2012, in which the manufacturer claimed to provide network and system administrators with the ability to manage 100 percent of their patching needs through a single, intuitive and easy-to-use interface, without the need for other update tools. So lets take a roam of this fine product of GFI Software-

Enhanced Features of GFI LanGuard 2012 include:
  • Comprehensive Patch Management – Administrators can now manage 100 percent of their patching needs – both security and non-security updates – from a centralized console. No other update tools are necessary.
  • Strong Vulnerability Assessment for Network Devices – Network devices such as printers, routers and switches from manufacturers such as HP and Cisco, can now be detected and scanned for vulnerabilities. GFI LanGuard 2012 performs over 50,000 checks against operating systems, installed applications and device firmware for security flaws and misconfigurations. It also runs network audits that now detect mobile devices running iOS and Android operating systems.
  • Improved Scan and Remediation Performance – New Relay Agents receive patches and definition files directly from the GFI LanGuard server and distribute as appropriate – helping IT resources save time, manage network bandwidth and increase the number of devices that can be accommodated. This is particularly effective in multi-site and large networks.
GFI LanGuard 2012 combines vulnerability scanning, patch management, and network and software auditing into one solution that enables IT professionals to scan, detect, assess and correct potential security risks on their networks with minimal administrative effort. GFI LanGuard also enables administrators to inventory devices attached to their networks; receive change alerts, such as notification when a new application is installed; ensure antivirus applications are current and enabled; and strengthen compliance with industry regulations through automated patch management that defends against potential network vulnerabilities. With GFI LanGuard, IT administrators can manage more than 2,500 machines from a single console, it integrates with more than 1,500 security applications and includes keyword search functionality.

After going through the above brief description, many of you must be excited about this new product. For the kind information of our readers, yes indeed GFI LanGuard 2012 is one of the finest tool ever released in this domain. Detailed information LanGuard 2012 can be found here. Also a 30 day trail pack of GFI LanGuard 2012 has been made available for download





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Hcon Security Testing Framework (HconSTF) v0.5 Codename 'Prime' Released

Hcon Security Testing Framework (HconSTF) v0.5 Codename 'Prime' Released

Previously we have discussed couple of times about HconSTF - a browser based security testing framework. Earlier in last year we got HconSTF version 0.4, now after almost 14 month, the author of Hcon, Mr. Ashish Mistry (Information Security Researcher) has proudly released the version 0.5 of HconSTF code named "Prime." No doubt that Hcon has already became a very popular and widely used browser based pen testing framework. Not only in hackers community but also several security experts and infosec researcher's prefers Hcon as one of their all time favorite pentesing tool as HconSTF is very flexible and very handy multipurpose tool for any IT Security Professionals, Web Bug bounty Hunters, Web Developers or any one interested in IT security. As expected this version of Hcon, came with enhanced features and more functionality, so lets take a glance of HconSTF v0.5 -

HconSTF is semi-automated but you still need your brain to work it out. It can be use in all kind of security testing stages, it has tools for conducting tasks like,
  • Web Penetration Testing
  • Web Exploits Development
  • Web Malware Analysis
  • Open Source Intelligence ( Cyber Spying & Doxing )
  • and much more with lots of hidden features

HconSTF v0.5 in Brief:-
  • Based on Firefox 17.0.1
  • Designed in Process based methodology
  • Less in size (40mb packed-80mb extracted), consumes less memory
  • More than 165+ search plugins
  • New IDB 0.1 release integrated
  • Underlined Logging for each and every request
  • More NEW scanners for DomXSS, Reflected XSS
  • New reporting features like note taking, url logging for easy report making
  • Smart searchbox - just select and it will copy it and just change search engine to search
  • Integrated Tor, AdvoR, I2p and more proxies
  • New Grease monkey scripts (18 scripts)
To Download HconSTF v0.5 Click Here [Download Type- Portable (no need to install , run from usb drive or any memory card) Platform : Windows XP , Vista , 7 both x32 & x64]





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

'Kali Linux' The Most Advanced & Stable Penetration Testing Distribution

From The Makers of BackTrack We Got 'Kali Linux' The Most AdvancedStable Penetration Testing Distribution 

Fans of world famous penetration testing distribution 'BackTrack' can now taste another flavor as the developer at BackTrack and Offensive Security has introduced a new Linux distribution targets enterprise security, offering a suite of helpful tools for rigorous testing calling it "Kali Linux." In the official release note Offensive-Security claimed that Kali Linux is the most advanced, robust, and stable penetration testing distribution to date. From that note we also came to know that this new distribution is a product of seven years long knowledge and experience which make Kali Linux the “next generation” penetration testing distribution. Now lets look at the main features of Kali Linux at a glance: 

Kali Linux Features:-

Kali is a complete re-build of BackTrack Linux, adhering completely to Debian development standards. All-new infrastructure has been put in place, all tools were reviewed and packaged, and we use Git for our VCS.
  • More than 300 penetration testing tools: After reviewing every tool that was included in BackTrack, we eliminated a great number of tools that either did not work or had other tools available that provided similar functionality.
  • Free and always will be: Kali Linux, like its predecessor, is completely free and always will be. You will never, ever have to pay for Kali Linux.
  • Open source Git tree: We are huge proponents of open source software and ourdevelopment tree is available for all to see and all sources are available for those who wish to tweak and rebuild packages.
  • FHS compliant: Kali has been developed to adhere to the Filesystem Hierarchy Standard, allowing all Linux users to easily locate binaries, support files, libraries, etc.
  • Vast wireless device support: We have built Kali Linux to support as many wireless devices as we possibly can, allowing it to run properly on a wide variety of hardware and making it compatible with numerous USB and other wireless devices.
  • Custom kernel patched for injection: As penetration testers, the development team often needs to do wireless assessments so our kernel has the latest injection patches included.
  • Secure development environment: The Kali Linux team is made up of a small group of trusted individuals who can only commit packages and interact with the repositories while using multiple secure protocols.
  • GPG signed packages and repos: All Kali packages are signed by each individual developer when they are built and committed and the repositories subsequently sign the packages as well.
  • Multi-language: Although pentesting tools tend to be written in English, we have ensured that Kali has true multilingual support, allowing more users to operate in their native language and locate the tools they need for the job.
  • Completely customizable: We completely understand that not everyone will agree with our design decisions so we have made it as easy as possible for our more adventurous users tocustomize Kali Linux to their liking, all the way down to the kernel.
  • ARMEL and ARMHF support: Since ARM-based systems are becoming more and more prevalent and inexpensive, we knew that Kali’s ARM support would need to be as robust as we could manage, resulting in working installations for both ARMEL and ARMHF systems. Kali Linux has ARM repositories integrated with the mainline distribution so tools for ARM will be updated in conjunction with the rest of the distribution. Kali is currently available for the following ARM devices:
Kali is specifically tailored to penetration testing and therefore, all documentation on this site assumes prior knowledge of the Linux operating system. For more information, I would like to request you to visit the official website of Kali Linux. 




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Nmap 6.25 Released! With 85 New Scripts, Windows 8 Enhancements & Better Performance

Nmap 6.25 Released! With 85 New Scripts, Windows 8 Enhancements & Better Performance

Gordon Lyon also known as Fyodor, the author of world's most popular security scanner 'Nmap' announced another update. Almost after five months we got this new version that is Nmap 6.25. This release of Nmap  contains hundreds of improvements, including 85 new NSE scripts, nearly 1,000 new OS and service detection fingerprints, performance enhancements such as the new kqueue and poll I/O engines, better IPv6 traceroute support, Windows 8 improvements, and much more!  It also includes the work of five Google Summer of Code interns who worked full time with Nmap mentors during the summer. 

Here are the most important change since 6.01:
  • Integrated all of your IPv4 OS fingerprint submissions since January (more than 3,000 of them).  Added 373 fingerprints, bringing the new total to 3,946.  Additions include Linux 3.6, Windows 8, Windows Server 2012, Mac OS X 10.8, and a ton of new WAPs, printers, routers, and other devices--including our first IP-enabled doorbell! Many existing fingerprints were improved.
  • Integrated all of your service/version detection fingerprints submitted since January (more than 1,500)!  Our signature count jumped by more than 400 to 8,645.  We now detect 897 protocols, from extremely popular ones like http, ssh, smtp and imap to the more obscure airdroid, gopher-proxy, and enemyterritory. 
  • Integrated your latest IPv6 OS submissions and corrections. We're still low on IPv6 fingerprints, so please scan any IPv6 systems you own or administer and submit them to http://nmap.org/submit/.  Both new fingerprints (if Nmap doesn't find a good match) and corrections (if Nmap guesses wrong) are useful.
  • Enabled support for IPv6 traceroute using UDP, SCTP, and IPProto(Next Header) probes. 
  • Scripts can now return a structured name-value table so that results are query-able from XML output. Scripts can return a string as before, or a table, or a table and a string. In this last case, the table will go to XML output and the string will go to screen output. See http://nmap.org/book/nse-api.html#nse-structured-output 
  • [Nsock] Added new poll and kqueue I/O engines for improved performance on Windows and BSD-based systems including Mac OS X. These are in addition to the epoll engine (used on Linux) and the classic select engine fallback for other system.  
  • [Ncat] Added support for Unix domain sockets. The new -U and --unixsock options activate this mode.  These provide compatibility with Hobbit's original Netcat. 
  • Moved some Windows dependencies, including OpenSSL, libsvn, and the vcredist files, into a new public Subversion directory /nmap-mswin32-aux and moved it out of the source tarball. This reduces the compressed tarball size from 22 MB to 8 MB and similarly reduces the bandwidth and storage required for an svn checkout.
  • [NSE] Replaced old RPC grinder (RPC enumeration, performed as part of version detection when a port seems to run a SunRPC service) with a faster and easier to maintain NSE-based implementation. This also allowed us to remove the crufty old pos_scan scan engine. 




For additional information and to know the full change log of this release click Here. To download Namp 6.25 (Source Code & Binary Packages) for Windows, Linux, Mac, Unix & few other OS click Here






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

SecretLayer: Advanced Steganography Software [Pro Version Download Now]

SecretLayer: Advanced Steganography Software [Pro Version Download Now]

Hackers, security professionals and also many other people who are involved in this cyber domain must be familiar with the term 'steganography'. I do believe that many of us have used this finest technique many times, may be some times for fun, or may be some nasty jobs. For those who are not so familiar with Steganography, then it is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. In very simple word its one of finest art of deception. For your information, now a days Steganography has been widely used, or I should say misused by many terrorist organizations for transmitting their hidden messages. One of the most dangerous changeless with Steganography is, researcher can detect whether an image or text is containing hidden message, but so far they can't unveil the inside message. 
Today we will talk about an advanced tool which is designed to tweak the color of specific pixels. The tool is named 'SecretLayer' which lets you encrypt your data (so you're no worse off than before) and then hide that encrypted data in ordinary images, like the ones used every day on all websites and email attachments. 

The Pro version of Secret Layer supports encryption of your data: -




  • Encryption type: AES, Key length: 128, 196, 256 (bits)
  • Encryption type: Blowfish, Key length: 128, 196, 256, 384, 448 (bits)
  • Encryption type: Cast-128, Key length: 40, 64, 128 (bits)
  • Encryption type: Cast-256, Key length: 128, 160, 192, 224, 256 (bits)
  • Encryption type: DES, Key length: 64 (bits)
  • Encryption type: IDEA, Key length: 128 (bits)
  • Encryption type: RC5, Key length: 64, 128, 192, 256, 384, 448, 512, 1024, 1536, 2040 (bits)
  • Encryption type: Twofish, Key length: 128, 192, 256 (bits)



  • A container with the encrypted data is hidden inside of an ordinary-looking image. This is all done automatically and in the background: you don't have to do anything extra. To download SecretLayer click Here. Earlier I told you that Steganography is on the finest way of hiding your secrete message, besides it contains many threats, as it has been widely used by criminals for transmitting messages. So far those hidden contains can not be decrypted easily. So now its upto you, that how will you use such tools. Remember one lesson which we have already learnt from a Famous movie SpiderMan, that is 'With greater power there comes greater responsibility...'. So I urge you not to use such tools for negative purposes. 






    SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

    BackBox Linux 3 Released! To Perform Penetration Tests & Security Assessments

    BackBox Linux 3 Released! To Perform Penetration Tests & Security Assessments

    In past we have discussed many times about BackBox, which is a Linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments. Designed to be fast, easy to use and provide a minimal yet complete desktop environment. Its own software repositories, always being updated to the latest stable version of the most used and best known ethical hacking tools. Now a days along with  BackTrack this Ubuntu based penetration testing distribution has became very popular in hacker communities, even several penetration testers also using BackBox. Like other popular Pen testing distro, BackBox also get updated periodically. This time BackBox developer team has announced a major release BackBox Linux, version 3.0. The major release include features such as the new Linux Kernel 3.2 flower and Xfce 4.8. Apart from the system major upgrade, all auditing tools are up to date as well. 

    What's new:- 
    • System upgrade
    • Bug corrections
    • Performance boost
    • Improved start menu
    • Improved Wi-Fi dirvers (compat-wireless aircrack patched)
    • New and updated hacking tools
    System requirements:- 
    • 32-bit or 64-bit processor
    • 512 MB of system memory (RAM)
    • 4.4 GB of disk space for installation
    • Graphics card capable of 800×600 resolution
    • DVD-ROM drive or USB port
    To Download BackBox Linux Version 3.0 Click Here





    SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

    Whonix -Anonymous Operating System Based on Debian/GNU Linux & Tor

    Whonix -Anonymous Operating System Based on Debian/GNU Linux & Tor 

    Whonix, which is earlier called TorBOX or aos; now been reintroduced with a new style. This time we got a complete anonymous general purpose Operating System based on Virtual Box, Debian GNU/Linux and Tor.  According to the project wiki page - in Whonix IP and DNS leaks are impossible. Not even malware with root rights can find out the user's real IP/location. This is because Whonix consists of two virtual machines. One machine solely runs Tor and acts as a gateway, which we call Whonix-Gateway. The other machine, which we call Whonix-Workstation, is on a completely isolated network. Only connections through Tor are possible. 

    We request our reader to See Security for a more comprehensive description, security features and threat model. You can even go through with full change log and also download the source code from github

    Key Features:- 

    • Adobe Flash anonymously
    • browse the web anonymously
    • Anonymous IRC
    • Anonymous Publishing
    • Anonymous E-Mail with Mozilla Thunderbird and TorBirdy
    • Add a proxy behind Tor (Tor -> proxy)
    • Based on Debian GNU/Linux.
    • Based on the Tor anonymity network.
    • Based on Virtual Box.
    • Can torify almost any application.
    • Can torify any operating system
    • Can torify Windows.
    • Chat anonymously.
    • Circumvent Censorship.
    • DNSSEC over Tor
    • Encrypted DNS
    • Full IP/DNS protocol leak protection.
    • Hide the fact that you are using Tor/Whonix
    • Isolating Proxy
    • Java anonymously
    • Javascript anonymously
    • Location/IP hidden servers
    • Prevents anyone from learning your IP.
    • Prevents anyone from learning your physical location.
    • Private obfuscated bridges supported.
    • Protects your privacy.
    • Protocol-Leak-Protection and Fingerprinting-Protection
    • Secure And Distributed Time Synchronization Mechanism
    • Security by Isolation
    • Stream isolation to prevent identity correlation through circuit sharing
    • Virtual Machine Images
    • VPN/Tunnel Support
    • Whonix is produced independently from the Tor (r) anonymity software and carries no guarantee from  The Tor Project about quality, suitability or anything else.
    • Transparent Proxy
    • Tunnel Freenet through Tor
    • Tunnel i2p through Tor
    • Tunnel JonDonym through Tor
    • Tunnel Proxy through Tor
    • Tunnel Retroshare through Tor
    • Tunnel SSH through Tor
    • Tunnel UDP over Tor
    • Tunnel VPN through Tor
    To Download Whonix-0.4.5 Click Here. Before download please note that Whonix is produced independently from the Tor anonymity software and carries no guarantee from The Tor Project about quality, suitability or anything else. 








    SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

    THC-IPv6 Attack Toolkit, A Tool to Attack the Inherent Protocol Weaknesses of IPV6 & ICMP6


    THC-IPv6 Attack Toolkit, A Tool to Attack the Inherent Protocol Weaknesses of IPV6 & ICMP6

    German hackers group, widely known as THC -The Hacker's Choice released an comprehensive attack toolkit for the IPv6 protocol suite named 'THC-IPv6 Attack Toolkit'. THC is the first group who is releasing such attacking tool for IPv6 protocol. According to the release note this is  a complete tool set to attack the inherent protocol weaknesses of IPV6 and ICMP6, and includes an easy to use packet factory library. It comprises of state-of-the-art tools for alive scanning, man-in-the-middle attacks, denial-of-service etc. which exploits inherent vulnerabilities in IPv6. 

    Features at a Glance:- 
    • parasite6: icmp neighbor solitication/advertisement spoofer, puts you as man-in-the-middle, same as ARP mitm (and parasite)
    • alive6: an effective alive scanng, which will detect all systems listening to this address
    • dnsdict6: parallized dns ipv6 dictionary bruteforcer
    • fake_router6: announce yourself as a router on the network, with the highest priority
    • redir6: redirect traffic to you intelligently (man-in-the-middle) with a clever icmp6 redirect spoofer
    • toobig6: mtu decreaser with the same intelligence as redir6
    • detect-new-ip6: detect new ip6 devices which join the network, you can run a script to automatically scan these systems etc.
    • dos-new-ip6: detect new ip6 devices and tell them that their chosen IP collides on the network (DOS).
    • trace6: very fast traceroute6 with supports ICMP6 echo request and TCP-SYN
    • flood_router6: flood a target with random router advertisements
    • flood_advertise6: flood a target with random neighbor advertisements
    • exploit6: known ipv6 vulnerabilities to test against a target
    • denial6: a collection of denial-of-service tests againsts a target
    • fuzz_ip6: fuzzer for ipv6
    • implementation6: performs various implementation checks on ipv6
    • implementation6d: listen daemon for implementation6 to check behind a fw
    • fake_mld6: announce yourself in a multicast group of your choice on the net
    • fake_mld26: same but for MLDv2
    • fake_mldrouter6: fake MLD router messages
    • fake_mipv6: steal a mobile IP to yours if IPSEC is not needed for authentication
    • fake_advertiser6: announce yourself on the network
    • smurf6: local smurfer
    • rsmurf6: remote smurfer, known to work only against linux at the moment
    • sendpees6: a tool by willdamn(ad)gmail.com, which generates a neighbor solicitation requests with a lot of CGAs (crypto stuff ;-) to keep the CPU busy. nice.
    • thcping6: sends a hand crafted ping6 packet [and about 25 more tools for you to discover]
    For detailed information about the usage, library interface & so on click here. To Download THC-IPv6 Attack Toolkit Click Here (Linux Only). For those who are hearing the name THC first time, we want to give you reminder that before this tool, this German hackers group published few other hack tools like Hydra (Fastest Login Cracker), THC SSL Dos and so on. 






    SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

    Nessus 5.0.2 Vulnerability Scanner Released & Available For Download

    Nessus 5.0.2 Vulnerability Scanner Released & Available For Download 

    Earlier we have discussed several times about Nessus, a proprietary comprehensive vulnerability scanning tool. After almost six months, yet again Tenable Network Security officially announced the availability of Nessus 5.0.2. According to surveys done by sectools.org, Nessus is the world's most popular vulnerability scanner, taking first place in the 2000, 2003, and 2006 security tools survey. Tenable estimates that it is used by over 75,000 organizations worldwide. This update is largely a bugfix release, however a new build for Solaris 10 is now available. The major issues addressed in 5.0.2 include enhanced support for UTF8 encoding problems in reports and the detection of network congestion errors during scans more conservatively. 

    Official Change Log for Nessus 5.0.2:- 
    • UTF8 encoding problems would sometimes cause the generation of reports to fail 
    • Fixed a case where generating some compliance checks reports would cause the scanner to hang, using 100% of the CPU 
    • Resolved a resource leak issue occurring when a large number of different users are connected at the same time 
    • Network congestion errors are now detected more conservatively 
    • Upgraded libxml2, libxslt, openssl to their newest versions 
    • Some nessusd.rules directives were not honored by the port scanners 
    • Solaris 10 build
    Other fixes:-
    • Smarter max_hosts and global.max_hosts defaults
    • Added support for named virtual hosts for IPv6
    • Fixed a memory leak when mixing IPv4 and IPv6 targets
    • Fixed the systemd control script (Fedora 16)
    • Fixed a crash in nessus-mkcert on the command-line (Win32)
    • Fixed a crash in localtime(), when passed an invalid argument (Win32)
    • Fixed scratchpad_query() to allow NULL arguments
    • PSSDK fix (Win32)

    To Download Nessus 5.0.2 Click Here



    SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

    Social-Engineer Toolkit (SET) Version 4.0 Codenamed “Balls of Steel” Released

    Social-Engineer Toolkit (SET) Version 4.0 Codenamed “Balls of Steel” Released


    Social Engineer Toolkit also known as SET gets another update. Now we have Social Engineer Toolkit version 4.0 codename “Balls of Steel” is officially available for public consumption. In his official blog; Trusted Sec, the developper of SET has claimed that this version of SET is the most advanced toolkit till today. This version is the collection of several months of development and over 50 new features and a number of enhancements, improvements, rewrites, and bug fixes
    Lets talk about some highlights and the new major features of SET 4.0- the Java Applet attack has been completely rewritten and obfuscated with added evasion techniques. All of the payloads have been heavily encrypted with a number of heavy anti-debugging tools put in place. PyInjector is now available on the Java Applet attack natively and deploys shellcode automatically through a byte compiled executable. The powershell attack vectors now support customized payload selection through the config/set_config. A new attack vector has been added called the Dell DRAC Attack Vector (default credential finder). A new teensy payload has been added from the Offensive-Security crew – the auto-correcting attack vector with DIP switch and SDcard “Peensy”. The web cloner has been completely rewritten in native python removing the dependency for wget. The new IE zero day has been included in the Metasploit Web Attack Vector. The Java Repeater and Java Redirection has been rewritten to be more reliable. Obfuscation added to randomized droppers including OSX and Linux payloads.

    Full Changelog of The Social-Engineer Toolkit (SET) 4.0:- 

    •  Added a new attack vector to SET called the Dell Drac attack vector under the Fast-Track menu.
    •  Optimized the new attack vector into SET with standard core libraries
    •  Added the source code for pyinjector to the set payloads
    •  Added an optimized and obfuscated binary for pyinjector to the set payloads
    •  Restructured menu systems to support new pyinjector payload for Java Applet Attack
    •  Added new option to SET Java Applet – PyInjector – injects shellcode straight into memory through a byte compiled python executable. Does not require python to be installed on victim
    •  Added base64 encoded to the parameters passed in shellcodexec and pyInjector
    •  Added base64 decode routine in Java Applet using sun.misc.BASE64Decoder – native base64 decoding in Java is the suck
    •  Java Applet redirect has been fixed – was a bug in how dynamic config files were changed
    •  Fixed the UNC embed to work when the flag is set properly in the config file
    •  Fixed the Java Repeater which would not work even if toggled on within the config file
    •  Fixed an operand error when selecting high payloads, it would cause a non harmful error and an additional delay when selecting certain payloads in Java Applet
    •  Added anti-debugging protection to pyinjector
    •  Added anti-debugging protection to SET interactive shell
    •  Added anti-debugging protection to Shellcodeexec
    •  Added virtual entry points and virtualized PE files to pyinjector
    •  Added virtual entry points and virtualized PE files to SET interactive shell
    •  Added virtual entry points and virtualized PE files to Shellcodeexec
    •  Added better obfsucation per generation on SET interactive shell and pyinjector
    •  Redesigned Java Applet which adds heavily obfsucated methods for deploying
    •  Removed Java Applet source code from being public – since redesign of applet, there are techniques used to obfuscate each time that are dynamic, better shelf life for applet
    •  Added a new config option to allow you to select the payloads for the powershell injection attack. By specifying the config options allows you to customize what payload gets delivered via the powershell shellcode injection attack
    •  Added double base64 encoding to make it more fun and better obfuscation per generation
    •  Added update_config() each time SET is loaded, will ensure that all of the updates are always present and in place when launching the toolkit
    •  Rewrote large portions of the Java Applet to be dynamic in nature and place a number of non descriptive things into place
    •  Added better stability to the Java Applet attack, note that the delay between execution is a couple seconds based on the obfuscation techniques in place
    •  Completely obfsucated the MAC and Linux binaries and generate a random name each time for deployment
    •  Fixed a bug that would cause custom imported executables to not always import correctly
    •  Fixed a bug that would cause a number above 16 to throw an invalid options error
    •  Added better cleanup routines for when SET starts to remove old cached information and files
    •  Fixed a bug that caused issues when deploy binaries was turned to off, would cause iterative loop for powershell and crash IE
    •  Centralized more routines into set.options – this will be where all configuration options reside eventually
    •  Added better stability when the Java Applet Repeater is loaded, the page will load properly then execute the applet.
    •  The site cloner has been completely redesigned to use urllib2 instead of wget, long time coming
    •  The cloner file has been cleaned up from a code perspective and efficiency
    •  Added better request handling with the new urllib2 modules for the website cloning
    •  Added user agent string configuration within the SET config and the new urllib2 fetching method
    •  Added a pause when generating Teensy payloads
    •  Added the Offensive-Security “Peensy” multi-attack vector for the Teensy attacks
    •  Added the Microsoft Internet Explorer execCommand Use-After-Free Vulnerability from Metasploit into the Metasploit Browser Exploits Attack vectors
    •  Fixed a bug in cleanup_routine that would cause the metasploit browser exploits to not function properly
    •  Fixed a bug that caused the X10 sniffer and jammer to throw an exceptions if the folder already existed



    To Download The Social-Engineer Toolkit (SET) 4.0 Click Here



    SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

    Fbpwn Version 2.0 Released (Java Based Facebook Social Engineering Framework) Twitter pwn added

    Fbpwn Version 2.0 Released (A cross-platform Java based Facebook social engineering framework) Twitter pwn added

    Earlier we have discussed about Fbpwn. Now the time has come to update the version as the author - Hussein El Motayam has going to release version 2.0 of Fbpwn -A cross-platform Java based Facebook social engineering framework developed by Team Motayam. The most notable thing of this version is that the author has added 'Twitter pwn' that means you can now also extract Twitter information using Fbpwn Version 2.0. 

    Bug Fix in Beta - 2.0
    • Fixed all Login issues
    • Added a new module: Dictionary builder
    • Added a new module: Close friends finder
    • Added an option to group dumped information by victim's ID
    • Use FBPwn through proxy

    Fbpwn 2.0 is Capable of:
    • Dump friend list
    • Add all victim friends
    • Dump all users album pictures
    • Dump profile information
    • Dump photos
    • Check friends request
    • Dump victim wall
    • Clone the profiles

    FBPwn modules are:

    AddVictimFriends: Request to add some or all friends of bob to increase the chance of bob accepting any future requests, after he finds that you have common friends.

    ProfileCloner: A list of all bob's friends is displayed, you choose one of them (we'll call him andy). FBPwn will change mallory's display picture, and basic info to match andy's. This will generate more chance that bob accepts requests from mallory as he thinks he is accepting from andy. Eventually bob will realize this is not andy's account, but probably it would be too late as all his info are already saved for offline checking by mallory.

    CheckFriendRequest: Check if mallory is already friend of bob, then just end execution. If not, the module tries to add bob as as a friend and poll waiting for him to accept. The module will not stop executing until the friend request is accepted.

    DumpFriends: Accessable friends of bob is saved for offline viewing. The output of the module depends on other modues, if mallory is not a friend of bob yet, the data might not be accessable and nothing will be dumped.

    DumpImages: Accessable images (tagged and albums) are saved for offline viewing including comments under each image and album names. Same limitations of dump friends applies.

    DumpInfo: Accessable basic info are saved for offline viewing. Same limitations of dump friends applies.

    DumpWall: Dumps wall posts for offline viewing. Same limitations of dump friends applies.

    DictionaryBuilder: Builds a dictionary using words from comments under photos and wall posts.

    CloseFriendsFinder: Finds the victim's close circle of friends by counting number of comments,likes and tags under photos and wall posts with the ability to change the weights of the ranking criteria.


    To Download Fbpwn Version 2.0 Click Here (Disclaimer- Use this tool at your own risk)




    SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

    OllyDbg 2.01 Beta 2 Released! (x86 Debugger For Microsoft Windows)

    OllyDbg 2.01 Beta 2 Released! (x86 Debugger For Microsoft Windows)

    The author, Oleh Yuschuk (also known as Olly), of widely used assembler level debugger 'OllyDbg' has released the Beta 2 version of OllyDbg 2.01. As you all know OllyDbg itself is hardly changed, only minor improvements (like correct reaction on MOV SS,anything; PUSHF or disassembling of JE vs. JZ  etc. depending on the preceding comparison). More important, the developer have removed the nasty crashes that happened on some computers while invoking menu, or pressing ALT, or on similar harmless actions. Last year August got the Alpha 4 of OllyDbg 2.01 since then we have not seen nay upgrades or improvements, so after one year this release includes some of major upgrades and fixes several bugs. Plugin interface is slightly extended. Plugin API includes more than 500 functions, structures and variables. Of these, I have described less than 100, so you will frequently encounter 404 while browsing the help data. But all APIs used by Bookmarks plugin are fully documentedI would also like to describe briefly for those who are not familiar with debugger- OllyDbg is an x86 debugger that emphasizes binary code analysis, which is useful when source code is not available. It traces registers, recognizes procedures, API calls, switches, tables, constants and strings, as well as locates routines from object files and libraries. In many cases reverse engineers preferred OllyDbg, even this tool is widely used by underground communities for making crack of popular software & games. 


    To Download OllyDbg 2.01 beta 2 Click Here






    SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

    BackTrack 5 R3 Released & Available To Download

    BackTrack 5 R3 Released & Available To Download!!

    In our last post about BackTrack we mention the release date of long awaited BT 5 Release 3. So finally the countdown is over. The time has come to refresh our security tool arsenal – BackTrack 5 R3 has been released world wide. First BT5 R3 preview was released  in BlackHat 2012 Las Vegas for the enjoyment of conference attendees. The main aim of that pre-release was to figure out their last bug reports and tool suggestions from the BH / Defcon crowds. This final release mainly focuses on bug-fixes as well as the addition of over 60 new tool. A whole new tool category was populated – “Physical Exploitation”, which now includes tools such as the Arduino IDE and libraries, as well as the Kautilya Teensy payload collection.
    As usual KDE and GNOME, 32/64 bit ISOs, have been released a single VMware Image (Gnome, 32 bit). 
    We would also like to give to reminder that the first release candidate (R1) of BackTrack 5 was released in August last year. Later in March this year we got the second release candidate (R2) of BT 5. 
    For those requiring other VM flavors of BackTrack If you want to build your own VMWare image then instructions can be found in the BackTrack Wiki. Direct ISO downloads will be available once all our HTTP mirrors have synched. But still you can download BackTrack 5 R3 via torrent from the below links. 



    SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

    BackTrack 5 R3 (Penetration Testing Distribution) Will be Available on August 13th, 2012

    BackTrack 5 R3 (Penetration Testing Distribution) Will be Available on August 13th, 2012

    Earlier we have discussed several times about BackTrack. After the huge success BackTrack 5 R2, now the world's most popular and widely used penetration testing distribution BackTrack is set to release its third release candidate (R3) of BT 5. According to the official release The BackTrack Development team will be releasing an R3 revision of their Penetration Testing distribution in 2 weeks. This release focuses on bugfixes and over 50 new tool additions – making it the most potent revision yet. Though the BT5 R3 preview has already been released in BlackHat 2012 Las Vegas for the enjoyment of conference attendees, which can be found in their delegate bags.  The DVD contains a BT5 R3 Gnome, 32 bit edition – burnt as an ISO (as opposed to an image). The BackTrack Development team will be taking in their last bug reports and tool suggestions from the BH / Defcon crowds for the upcoming official release, which will be on August 13th, 2012We would also like to give to reminder that the first release candidate (R1) of BackTrack 5 was released in August last year. Current BT5 users can simply upgrade to the latest release using the regular update commands. More details will be released along with the full listing of new tools on the 13th of August. 







    SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

    Related Posts Plugin for WordPress, Blogger...