Showing posts with label penetration testing. Show all posts
Showing posts with label penetration testing. Show all posts

Monday, November 14, 2011

Samurai webtesting Framework live cd download


Samurai webtesting Framework live cd download


The Samurai Web Testing Framework is a LiveCD focused on web application testing. This is a nice tool for website penetration testing of web applications.  Starting with reconnaissance, This iso included tools such as the Fierce domain scanner and Maltego. For mapping, it has included tools such WebScarab and ratproxy. Then discovery tools are also choosen. These would include w3af and burp. For exploitation, the final stage, it also included BeEF, AJAXShell and much more. This CD also includes a pre-configured wiki, set up to be the central information store during your pen-test.


Download Here:
http://sourceforge.net/projects/samurai/files/samurai/samurai-0.9.7/samurai-0.9.7.iso/download

Samurai webtesting Framework live cd download


Samurai webtesting Framework live cd download


The Samurai Web Testing Framework is a LiveCD focused on web application testing. This is a nice tool for website penetration testing of web applications.  Starting with reconnaissance, This iso included tools such as the Fierce domain scanner and Maltego. For mapping, it has included tools such WebScarab and ratproxy. Then discovery tools are also choosen. These would include w3af and burp. For exploitation, the final stage, it also included BeEF, AJAXShell and much more. This CD also includes a pre-configured wiki, set up to be the central information store during your pen-test.


Download Here:
http://sourceforge.net/projects/samurai/files/samurai/samurai-0.9.7/samurai-0.9.7.iso/download

download Burp Suite Free Edition v1.4 – Web Application Security Testing Tool

Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application’s attack surface, through to finding and exploiting security vulnerabilities.


Burp gives you full control, letting you combine advanced manual techniques with state-of-the-art automation, to make your work faster, more effective, and more fun.


New Features

  1. The ability to compare site maps
  2. Functions to help with testing access controls using your browser
  3. Support for preset request macros
  4. Session handling rules to help you work with difficult situations
  5. In-browser rendering of responses from all Burp tools
  6. Auto recognition and rendering of character sets
  7. Support for upstream SOCKS proxies
  8. Headless mode for unattended scripted usage
  9. Support for more types of redirection
  10. Support for NTLMv2 and IPv6
  11. Numerous enhancements to Burp’s extensibility
  12. Greater stability on OSX



Download Here:
http://portswigger.net/burp/burpsuite_v1.4.zip

download Burp Suite Free Edition v1.4 – Web Application Security Testing Tool

Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application’s attack surface, through to finding and exploiting security vulnerabilities.


Burp gives you full control, letting you combine advanced manual techniques with state-of-the-art automation, to make your work faster, more effective, and more fun.


New Features

  1. The ability to compare site maps
  2. Functions to help with testing access controls using your browser
  3. Support for preset request macros
  4. Session handling rules to help you work with difficult situations
  5. In-browser rendering of responses from all Burp tools
  6. Auto recognition and rendering of character sets
  7. Support for upstream SOCKS proxies
  8. Headless mode for unattended scripted usage
  9. Support for more types of redirection
  10. Support for NTLMv2 and IPv6
  11. Numerous enhancements to Burp’s extensibility
  12. Greater stability on OSX



Download Here:
http://portswigger.net/burp/burpsuite_v1.4.zip

Skipfish - web application security scanner


Skipfish - web application security scanner


Skipfish is an active web application security reconnaissance tool. It prepares an interactive sitemap for the targeted site by carrying out a recursive crawl and dictionary-based probes. The resulting map is then annotated with the output from a number of active (but hopefully non-disruptive) security checks. The final report generated by the tool is meant to serve as a foundation for professional web application security assessments.


Key features:


High speed: pure C code, highly optimized HTTP handling, minimal CPU footprint - easily achieving 2000 requests per second with responsive targets.
Ease of use: heuristics to support a variety of quirky web frameworks and mixed-technology sites, with automatic learning capabilities, on-the-fly wordlist creation, and form autocompletion.
Cutting-edge security logic: high quality, low false positive, differential security checks, capable of spotting a range of subtle flaws, including blind injection vectors.
The tool is believed to support Linux, FreeBSD, MacOS X, and Windows (Cygwin) environments.


Dowload Here
http://code.google.com/p/skipfish/downloads/list

Skipfish - web application security scanner


Skipfish - web application security scanner


Skipfish is an active web application security reconnaissance tool. It prepares an interactive sitemap for the targeted site by carrying out a recursive crawl and dictionary-based probes. The resulting map is then annotated with the output from a number of active (but hopefully non-disruptive) security checks. The final report generated by the tool is meant to serve as a foundation for professional web application security assessments.


Key features:


High speed: pure C code, highly optimized HTTP handling, minimal CPU footprint - easily achieving 2000 requests per second with responsive targets.
Ease of use: heuristics to support a variety of quirky web frameworks and mixed-technology sites, with automatic learning capabilities, on-the-fly wordlist creation, and form autocompletion.
Cutting-edge security logic: high quality, low false positive, differential security checks, capable of spotting a range of subtle flaws, including blind injection vectors.
The tool is believed to support Linux, FreeBSD, MacOS X, and Windows (Cygwin) environments.


Dowload Here
http://code.google.com/p/skipfish/downloads/list

THC Hydra v.6.4 released | network logon cracker


THC Hydra v.6.4 released | network logon cracker


If you want to crack password of various networking protocols to access remote logon, Hydra is the best tool for that. Hydra is a parallized login cracker which supports numerous protocols to attack. New modules are easy to add, beside that, it is flexible and very fast. Version 6 was tested to compile cleanly on Linux, windows/Cygwin, Solaris 11, FreeBSD 8.1 and OSX.


Currently this tool supports:
TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, SMB, SMBNT, MS-SQL, MYSQL, REXEC, RSH, RLOGIN, CVS, SNMP, SMTP-AUTH, SOCKS5, VNC, POP3, IMAP, NNTP, PCNFS, ICQ, SAP/R3, LDAP2, LDAP3, Postgres, Teamspeak, Cisco auth, Cisco enable, AFP, Subversion/SVN, Firebird, LDAP2, Cisco AAA (incorporated in telnet module). For HTTP, POP3, IMAP and SMTP, several login mechanisms like plain and MD5 digest are supported.


This tool is a proof of concept code, to give researchers and security consultants the possiblity to show how easy it would be to gain unauthorized access from remote to a system.


Disclaimer
1. This tool is for legal purposes only!
2. The GPLv3 applies to this code.
3. A special license expansion for OpenSSL is included which is required for the debian people


Changelog:

  •  Update SIP module to extract and use external IP addr return from server error to bypass NAT
  •  Update SIP module to use SASL lib
  •  Update email modules to check clear mode when TLS mode failed
  •  Update Oracle Listener module to work with Oracle DB 9.2
  •  Update LDAP module to support Windows 2008 active directory simple auth
  •  Fix to the connection adaptation engine which would loose planned attempts
  •  Fix make script for CentOS, reported by ya0wei
  •  Print error when a service limits connections and few pairs have to be tested
  •  Improved Mysql module to only init/close when needed
  •  Added patch from the FreeBSD maintainers
  •  Module usage help does not need a target to be specified anymore
  •  configure script now honors /etc/ld.so.conf.d/ directory 
Download Here

THC Hydra v.6.4 released | network logon cracker


THC Hydra v.6.4 released | network logon cracker


If you want to crack password of various networking protocols to access remote logon, Hydra is the best tool for that. Hydra is a parallized login cracker which supports numerous protocols to attack. New modules are easy to add, beside that, it is flexible and very fast. Version 6 was tested to compile cleanly on Linux, windows/Cygwin, Solaris 11, FreeBSD 8.1 and OSX.


Currently this tool supports:
TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, SMB, SMBNT, MS-SQL, MYSQL, REXEC, RSH, RLOGIN, CVS, SNMP, SMTP-AUTH, SOCKS5, VNC, POP3, IMAP, NNTP, PCNFS, ICQ, SAP/R3, LDAP2, LDAP3, Postgres, Teamspeak, Cisco auth, Cisco enable, AFP, Subversion/SVN, Firebird, LDAP2, Cisco AAA (incorporated in telnet module). For HTTP, POP3, IMAP and SMTP, several login mechanisms like plain and MD5 digest are supported.


This tool is a proof of concept code, to give researchers and security consultants the possiblity to show how easy it would be to gain unauthorized access from remote to a system.


Disclaimer
1. This tool is for legal purposes only!
2. The GPLv3 applies to this code.
3. A special license expansion for OpenSSL is included which is required for the debian people


Changelog:

  •  Update SIP module to extract and use external IP addr return from server error to bypass NAT
  •  Update SIP module to use SASL lib
  •  Update email modules to check clear mode when TLS mode failed
  •  Update Oracle Listener module to work with Oracle DB 9.2
  •  Update LDAP module to support Windows 2008 active directory simple auth
  •  Fix to the connection adaptation engine which would loose planned attempts
  •  Fix make script for CentOS, reported by ya0wei
  •  Print error when a service limits connections and few pairs have to be tested
  •  Improved Mysql module to only init/close when needed
  •  Added patch from the FreeBSD maintainers
  •  Module usage help does not need a target to be specified anymore
  •  configure script now honors /etc/ld.so.conf.d/ directory 
Download Here

Sunday, November 13, 2011

download free Metasploit framework 3.7.2


download free Metasploit framework 3.7.2 



Metasploit Framework 3.7.2 includes 698 exploit modules, 358 auxiliary modules, and 54 post modules, 11 new exploits, 1 new auxiliary module, and 15 new post modules.This release addresses several issues with updating the framework, adds 11 exploit / auxiliary modules and brings a plethora of new features.


New Exploit Modules since 3.7.1


  1. MS11-050 IE mshtml!CObjectElement Use After Free
  2. AWStats Totals =< v1.14 multisort Remote Command Execution
  3. IBM Tivoli Endpoint Manager POST Query Buffer Overflow
  4. Cisco AnyConnect VPN Client ActiveX URL Property Download and Execute
  5. Magix Musik Maker 16 .mmm Stack Buffer Overflow
  6. VisiWave VWR File Parsing Vulnerability
  7. GoldenFTP PASS Stack Buffer Overflow
  8. DATAC RealWin SCADA Server 2 On_FC_CONNECT_FCS_a_FILE Buffer Overflow
  9. 7-Technologies IGSS <= v9.00.00 b11063 IGSSdataServer.exe Stack Overflow
  10. 7-Technologies IGSS 9 Data Server/Collector Packet Handling Vulnerabilities
  11. 7-Technologies IGSS 9 IGSSdataServer .RMS Rename Buffer Overflow



Download Here:
http://metasploit.com/download/

download free Metasploit framework 3.7.2


download free Metasploit framework 3.7.2 



Metasploit Framework 3.7.2 includes 698 exploit modules, 358 auxiliary modules, and 54 post modules, 11 new exploits, 1 new auxiliary module, and 15 new post modules.This release addresses several issues with updating the framework, adds 11 exploit / auxiliary modules and brings a plethora of new features.


New Exploit Modules since 3.7.1


  1. MS11-050 IE mshtml!CObjectElement Use After Free
  2. AWStats Totals =< v1.14 multisort Remote Command Execution
  3. IBM Tivoli Endpoint Manager POST Query Buffer Overflow
  4. Cisco AnyConnect VPN Client ActiveX URL Property Download and Execute
  5. Magix Musik Maker 16 .mmm Stack Buffer Overflow
  6. VisiWave VWR File Parsing Vulnerability
  7. GoldenFTP PASS Stack Buffer Overflow
  8. DATAC RealWin SCADA Server 2 On_FC_CONNECT_FCS_a_FILE Buffer Overflow
  9. 7-Technologies IGSS <= v9.00.00 b11063 IGSSdataServer.exe Stack Overflow
  10. 7-Technologies IGSS 9 Data Server/Collector Packet Handling Vulnerabilities
  11. 7-Technologies IGSS 9 IGSSdataServer .RMS Rename Buffer Overflow



Download Here:
http://metasploit.com/download/

xssf - Cross-Site Scripting Framework


xssf - Cross-Site Scripting Framework


The Cross-Site Scripting Framework (XSSF) is a security tool designed to turn the XSS vulnerability exploitation task into a much easier work. The XSSF project aims to demonstrate the real dangers of XSS vulnerabilities, vulgarizing their exploitation. This project is created solely for education, penetration testing and lawful research purposes.


XSSF allows creating a communication channel with the targeted browser (from a XSS vulnerability) in order to perform further attacks. Users are free to select existing modules (a module = an attack) in order to target specific browsers.


XSSF provides a powerfull documented API, which facilitates development of modules and attacks. In addition, its integration into the Metasploit Framework allows users to launch MSF browser based exploit easilly from an XSS vulnerability.


In addition, an interesting though exploiting an XSS inside a victim's browser could be to browse website on attacker's browser, using the connected victim's session. In most of cases, simply stealing the victim cookie will be sufficient to realize this action. But in minority of cases (intranets, network tools portals, etc.), cookie won't be useful for an external attacker. That's why XSSF Tunnel was created to help the attacker to help the attacker browsing on affected domain using the victim's session.


Download
https://code.google.com/p/xssf/downloads/list

xssf - Cross-Site Scripting Framework


xssf - Cross-Site Scripting Framework


The Cross-Site Scripting Framework (XSSF) is a security tool designed to turn the XSS vulnerability exploitation task into a much easier work. The XSSF project aims to demonstrate the real dangers of XSS vulnerabilities, vulgarizing their exploitation. This project is created solely for education, penetration testing and lawful research purposes.


XSSF allows creating a communication channel with the targeted browser (from a XSS vulnerability) in order to perform further attacks. Users are free to select existing modules (a module = an attack) in order to target specific browsers.


XSSF provides a powerfull documented API, which facilitates development of modules and attacks. In addition, its integration into the Metasploit Framework allows users to launch MSF browser based exploit easilly from an XSS vulnerability.


In addition, an interesting though exploiting an XSS inside a victim's browser could be to browse website on attacker's browser, using the connected victim's session. In most of cases, simply stealing the victim cookie will be sufficient to realize this action. But in minority of cases (intranets, network tools portals, etc.), cookie won't be useful for an external attacker. That's why XSSF Tunnel was created to help the attacker to help the attacker browsing on affected domain using the victim's session.


Download
https://code.google.com/p/xssf/downloads/list

Domsnitch - passive reconnaissance tool inside DOM


Domsnitch - passive reconnaissance tool inside DOM


DOM Snitch is an experimental Chrome extension that enables developers and testers to identify insecure practices commonly found in client-side code. 


developers we have adopted several approaches to intercepting JavaScript calls to key and potentially dangerous browser infrastructure such as document.write or HTMLElement.innerHTML (among others). Once a JavaScript call has been intercepted, DOM Snitch records the document URL and a complete stack trace that will help assess if the intercepted call can lead to cross-site scripting, mixed content, insecure modifications to the same-origin policy for DOM access, or other client-side issues.


Key features:



  • Real-time: Developers and testers can observe DOM modifications as they happen inside the browser without the need to step through JavaScript code with a debugger or pause the execution of their application.
  • Easy to use: With built-in security heuristics and nested view, both advanced and less experienced developers and testers can quickly spot areas of the application being tested that need more attention.
  • Easier collaboration: Enables developers and testers to easily export and share captured DOM modifications while troubleshooting an issue with their peers.



Download Here
https://code.google.com/p/domsnitch/downloads/list

Domsnitch - passive reconnaissance tool inside DOM


Domsnitch - passive reconnaissance tool inside DOM


DOM Snitch is an experimental Chrome extension that enables developers and testers to identify insecure practices commonly found in client-side code. 


developers we have adopted several approaches to intercepting JavaScript calls to key and potentially dangerous browser infrastructure such as document.write or HTMLElement.innerHTML (among others). Once a JavaScript call has been intercepted, DOM Snitch records the document URL and a complete stack trace that will help assess if the intercepted call can lead to cross-site scripting, mixed content, insecure modifications to the same-origin policy for DOM access, or other client-side issues.


Key features:



  • Real-time: Developers and testers can observe DOM modifications as they happen inside the browser without the need to step through JavaScript code with a debugger or pause the execution of their application.
  • Easy to use: With built-in security heuristics and nested view, both advanced and less experienced developers and testers can quickly spot areas of the application being tested that need more attention.
  • Easier collaboration: Enables developers and testers to easily export and share captured DOM modifications while troubleshooting an issue with their peers.



Download Here
https://code.google.com/p/domsnitch/downloads/list