Sunday, 31 July 2011
8 Articles for Learning Android Mobile Malware Analysis
Online attackers are paying increased attention to mobile devices. At the moment, the biggest mobile threat vector seems to take the form of trojan applications designed to run on a mobile phone and containing unwanted "features." If you come across a malicious program of that nature, how can you analyze it? This quick post notes several articles and tools that focus on examining
Labels:
android,
article,
exploitation,
Hacking,
Information Security,
reverse_engineering,
Source,
tool
Saturday, 30 July 2011
Reverse Engineering Tools For Android
This tool was created by nelhage Reverse Android: Some miscellaneous Android reverse-engineering tools.
This repository contains some tools I've written for reverse-engineering Android
applications, as well as any that I may write in the future.
You can find the initial announcement of these tools on my blog:
http://blog.nelhage.com/2010/12/some-android-reverse-engineering-tools/
The contents
This repository contains some tools I've written for reverse-engineering Android
applications, as well as any that I may write in the future.
You can find the initial announcement of these tools on my blog:
http://blog.nelhage.com/2010/12/some-android-reverse-engineering-tools/
The contents
Labels:
Brute Force Tool,
Hacking,
hacking tool,
Information Leak,
Information Security,
packet analysis,
reverse_engineering,
security,
Source
Howto: Wireless Ownage Video Of Securitytube.net
With over 40+ HD videos containing 12+ hours of Wireless Ownage, this DVD weighs in at around 4.2 Gigabytes! A quick breakdown of the course topics and associated videos is available here. Direct Download Links: 1. Mirror thanks to Mister_X from the Aircrack Team:
http://securitytube.aircrack-ng.org/Wi-Fi-Security-Megaprimer/WLAN-Security-Megaprimer-v1.iso
2. Mirror thanks to Chaos
http://securitytube.aircrack-ng.org/Wi-Fi-Security-Megaprimer/WLAN-Security-Megaprimer-v1.iso
2. Mirror thanks to Chaos
Labels:
article,
exploitation,
Hacking,
howto,
Information Security,
security,
sniffer,
sniffering,
video,
video security,
Vulnerability
Tuesday, 26 July 2011
SSLSniff with iOS Detection
Apple has announce iOS 4.3.5 and I found something looks interesting
Data Security
Available for: iOS 3.0 through 4.3.4 for iPhone 3GS and iPhone 4 (GSM), iOS 3.1 through 4.3.4 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.4 for iPad
Impact: An attacker with a privileged network position may capture or modify data in sessions protected by SSL/TLS
Description: A
Data Security
Available for: iOS 3.0 through 4.3.4 for iPhone 3GS and iPhone 4 (GSM), iOS 3.1 through 4.3.4 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.4 for iPad
Impact: An attacker with a privileged network position may capture or modify data in sessions protected by SSL/TLS
Description: A
Labels:
article,
exploitation,
Hacking,
howto,
Information Leak,
Information Security,
iOS,
packet analysis,
security,
Source,
tool,
Vulnerability
Pwn Residential Router With Routerpwn
Routerpwn.com is a web application that helps you in the exploitation of vulnerabilities in residential routers.
It is a compilation of ready to run local and remote web exploits.
Programmed in Javascript and HTML in order to run in all "smart phones" and mobile internet devices.
It is only one page, so you can store it offline for local exploitation without internet connection.
==
It is a compilation of ready to run local and remote web exploits.
Programmed in Javascript and HTML in order to run in all "smart phones" and mobile internet devices.
It is only one page, so you can store it offline for local exploitation without internet connection.
==
Labels:
article,
exploitation,
Hacking,
hacking tool,
Information Leak,
Information Security,
password,
security,
wireless
Monday, 25 July 2011
HowTo: Learn Batch Programming Fast And Easy
Batch Programming is extremely helpful if you want to automate small tasks, Batch programming is though only restricted to windows platform but it has lots of other uses and the best part is that it's very easy as compared to other programming languages, While browsing on google for batch programming related e-books I came across a fantastic book which teaches batch programming
Labels:
article,
Crack,
exploitation,
Hacking,
hacking tool,
howto,
Information Security,
packet analysis,
programming,
security,
Source,
tool
Thursday, 21 July 2011
Metasploit Console Customizable Prompts
The Metasploit Console now supports customizable prompts similar to how bash has the PS1 variable. To set a custom prompt the setg command can be used to set the Prompt variable. For example:
msf > setg Prompt "%T - (Sessions: %S Jobs: %J) "
Thu Jul 21 02:25:43 -0400 2011 - (Sessions: 0 Jobs: 0) >
This command will result in the timestamp, session count and job counts to be displayed within
msf > setg Prompt "%T - (Sessions: %S Jobs: %J) "
Thu Jul 21 02:25:43 -0400 2011 - (Sessions: 0 Jobs: 0) >
This command will result in the timestamp, session count and job counts to be displayed within
Labels:
article,
Hacking,
hacking tool,
Information Security,
metasploit,
security
SQL Injection Bypass WAF
Great article, the source is in the bottom of this post.
1)Comments: SQL comments are a blessing to us SQL injectors. They allow us to bypass a lot of the restrictions of Web application firewalls and to kill certain SQL statements to execute the attackers commands while commenting out the actual legitimate query. Some comments in SQL:
//, — , /**/, #, –+, — -, ;
2)Case Changing:
1)Comments: SQL comments are a blessing to us SQL injectors. They allow us to bypass a lot of the restrictions of Web application firewalls and to kill certain SQL statements to execute the attackers commands while commenting out the actual legitimate query. Some comments in SQL:
//, — , /**/, #, –+, — -, ;
2)Case Changing:
Labels:
article,
exploitation,
Hacking,
Information Security,
programming,
security,
sql_injection,
Vulnerability,
Web,
Web Application,
Web Application Attack
Wednesday, 20 July 2011
Damn Small SQLi Scanner [DSSS]
Damn Small SQLi Scanner(DSSS) has been made as a PoC where I wanted to show that commercial (SQLi) scanners can be beaten under 100 lines of code. It supports blind/error SQLi tests, depth 1 crawling and advanced comparison of different response attributes to distinguish blind responses. If you are satisfied with your commercial tool scanning results then I believe that you could even be more
Labels:
exploitation,
Hacking,
hacking tool,
Information Leak,
Information Security,
security,
Security News,
Source,
sql_injection,
tool,
Vulnerability,
Web,
Web Application,
Web Application Attack
Howto: Install Chrome OS on Macbook AIR
Download the install image from here
Extract the archive using your decompression tool of choice (The Unarchiver for Mac works great)
Burn the image to a USB stick using dd (check the wiki if you need help with this, same as Flow/Vanilla instructions)
Insert both this USB stick and the OS X install drive into your Macbook Air while it’s switched off
Hold the “C” key down and press the power
Extract the archive using your decompression tool of choice (The Unarchiver for Mac works great)
Burn the image to a USB stick using dd (check the wiki if you need help with this, same as Flow/Vanilla instructions)
Insert both this USB stick and the OS X install drive into your Macbook Air while it’s switched off
Hold the “C” key down and press the power
Labels:
article,
Hacking,
howto,
Information Security,
Source
Wifuzz-"Smashing APs for fun & profit "
WiFuzz is a 802.11 fuzzer to trigger corner-case situations in the network stack of today's Access Points.
Source: http://code.google.com/p/wifuzz/wiki/WiFuzz
If you like my blog, Please Donate Me
One Dollar $1.00 Two Dollar $2.00 Three Dollar $3.00
Source: http://code.google.com/p/wifuzz/wiki/WiFuzz
If you like my blog, Please Donate Me
One Dollar $1.00 Two Dollar $2.00 Three Dollar $3.00
Labels:
exploitation,
fuzz,
Hacking,
hacking tool,
Information Security,
security,
Source,
tool,
wireless
Monday, 18 July 2011
SQL Injection Tools List
Sqlninja ( http://sqlninja.sourceforge.net/ ) Supports only Microsoft SQL Server.
sqlmap ( http://sqlmap.sourceforge.net/ )
Full support: MySQL, Oracle, PostgreSQL and Microsoft SQL Server.
Partial support for: Microsoft Access, DB2, Informix, Sybase and Interbase.
Pangolin 3.2.3 free edition ( http://down3.nosec.org/pangolin_free_edition_3.2.3.1105.zip )
Your web applications using Access,
sqlmap ( http://sqlmap.sourceforge.net/ )
Full support: MySQL, Oracle, PostgreSQL and Microsoft SQL Server.
Partial support for: Microsoft Access, DB2, Informix, Sybase and Interbase.
Pangolin 3.2.3 free edition ( http://down3.nosec.org/pangolin_free_edition_3.2.3.1105.zip )
Your web applications using Access,
Labels:
exploitation,
Hacking,
hacking tool,
Information Security,
security,
Vulnerability,
Web,
Web Application,
Web Application Attack
SSLH = HTTPS, SSH, and OpenVPN on the same port.
What is it?sslh accepts HTTPS, SSH and OpenVPN connections on the same port. This makes it possible to connect to an SSH server or an OpenVPN on port 443 (e.g. from inside a corporate firewall, which almost never block port 443) while still serving HTTPS on that port.
InspirationThis feature has already been implemented as a
InspirationThis feature has already been implemented as a
Labels:
Information Security,
linux,
security,
Source,
tool
Friday, 15 July 2011
HTML 5 - XSSQL attack
Html 5 brings a lot of new features to the web. One of its features is SQLite - a client side database engine which allows storage of data on the client side. Databases can be created and queried by the JavaScript.
It is pretty clear that many developers would use the opportunity to store information on the client side. The risk will be high if they use this repository and store their
It is pretty clear that many developers would use the opportunity to store information on the client side. The risk will be high if they use this repository and store their
Labels:
article,
exploitation,
Hacking,
html5,
Information Security,
security,
Vulnerability,
Web,
Web Application
ECCOUNCIL was hacked again.
After couple months ago, Eccouncil was hacked with SQL Injection( I don't sure about that). Now I get the rumor that it was hacked again. Please see the detail here.
Link: http://gaysec.net/gay/eccouncilacademy.org.txt
If you like my blog, Please Donate Me
One Dollar $1.00 Two Dollar $2.00 Three Dollar $3.00
Link: http://gaysec.net/gay/eccouncilacademy.org.txt
If you like my blog, Please Donate Me
One Dollar $1.00 Two Dollar $2.00 Three Dollar $3.00
Labels:
Hacking,
Information Leak,
Information Security,
security,
Security News,
Vulnerability,
Web,
Web Application,
Web Application Attack
Thursday, 14 July 2011
Howto: Attacking through proxies
This post will tell you "How to use attacking tool with proxies".
1. Attack through Tor
1.1 Start Privoxy and Tor service.
$ /usr/sbin/privoxy /etc/privoxy/config
$ /usr/bin/tor
1.2 Create tunnel to the Tor service with socat
$ socat TCP4-LISTEN:8080,fork SOCKS4:127.0.0.1:target.com:80,socksport=9050
We're ready to attack or scanning with Nessus
1. Attack through Tor
1.1 Start Privoxy and Tor service.
$ /usr/sbin/privoxy /etc/privoxy/config
$ /usr/bin/tor
1.2 Create tunnel to the Tor service with socat
$ socat TCP4-LISTEN:8080,fork SOCKS4:127.0.0.1:target.com:80,socksport=9050
We're ready to attack or scanning with Nessus
Labels:
Hacking,
hacking tool,
Information Leak,
Information Security,
linux,
security,
Web,
Web Application,
Web Application Attack
Wednesday, 13 July 2011
Chrome Extensions for Security Professional
During Recent days we have seen a phenomenal increase in usage of Google Chrome Browser, however Security Professionals are still looking at Firefox for there day to day life usage, the basic reason behind it is large set of firefox extensions backing it up, we have also custom builds like OWASP Mantra doing the round.
So for those who love using Google Chrome and still miss the large
Labels:
Crack,
exploitation,
Hacking,
hacking tool,
Information Security,
security,
tool,
Web,
Web Application,
Web Application Attack
Tuesday, 12 July 2011
Hacking with Evilgrade on Backtrack5
After install evilgrade on Backtrack5(Tutorial how to install evilgrade on Backtrack5). Now we try to use it. And this tutorial, we will use the new Metasploit tool name's "msfvenom" to create the shell and use it to pwn victim. You can download this tutorial document and my ettercap-ng that was compiled by myself in the last of this post.
Attacker IP: 192.168.168.156 [Backtrack 5
Attacker IP: 192.168.168.156 [Backtrack 5
Labels:
backdoor,
Crack,
exploitation,
Hacking,
howto,
Information Security,
security,
Source,
tool,
Web,
Web Application,
Web Application Attack
Saturday, 9 July 2011
Howto: Compile "Slowloris with TOR" Source Code.
Slowloris, DoS tool, holds connections open by sending partial HTTP requests. It continues to send subsequent headers at regular intervals to keep the sockets from closing. In this way webservers can be quickly tied up. In particular, servers that have threading will tend to be vulnerable, by virtue of the fact that they attempt to limit the amount of threading they'll allow. Slowloris
Labels:
article,
dos,
exploitation,
Hacking,
hacking tool,
howto,
Information Security,
linux,
security,
Source,
tool,
Vulnerability
Thursday, 7 July 2011
Howto: Install evilgrade on Backtrack5
EvilGrade exploits weaknesses in the auto-update services of multiple common software packages. It is able to trick the service into believing there is a signed update available for the product, thus prompting the user to install the upgrade. Unfortunately the upgrade is in actuality an attacker’s payload. The nefarious part about this product is that it is very difficult for the average
Labels:
article,
exploitation,
Hacking,
hacking tool,
howto,
Information Leak,
Information Security,
linux,
security,
Source,
tool,
Vulnerability
Vega | Open Source Web Application Scanner
Vega is an open source platform to test the security of web applications. Vega can help you find and validate SQL Injections, Cross-Site Scripting (XSS), inadvertently disclosed sensitive information, and other vulnerabilities. It is written in Java, GUI based, and runs on Linux, OS X, and Windows.
Vega includes an automated scanner for quick tests and an intercepting
Vega includes an automated scanner for quick tests and an intercepting
Labels:
Hacking,
hacking tool,
Information Leak,
Information Security,
linux,
Microsoft,
security,
Source,
tool,
Vulnerability,
Web,
Web Application,
Web Application Attack
Wednesday, 6 July 2011
Exposed Anonymous and LulzSec by Teampoison
After LulzSec and Anonymous released the Operation Anti Security = #AntiSec that some hackers disagree and agree and LulzSec broke up the group. Now hacker group name's Teampoison has released about information of LulzSec and Anonymous members. You can view it in the below link.
Download Link: http://www.wupload.com/file/45239054/expose_lulzsec_and_anonymous.docx
Pastebin Link: http://
Download Link: http://www.wupload.com/file/45239054/expose_lulzsec_and_anonymous.docx
Pastebin Link: http://
Labels:
Hacking,
Information Leak,
Information Security,
security,
Security News,
Web
Monday, 4 July 2011
Article: Penetration Testing with Brute Forcing Tool.
This article will show you how to use Metasploit for penetration testing with brute forcing module or another technique of Metasploit and how to post exploitation without TTY. This article has written by myself and sorry about my bad English. Please download pdf to view.