background preloader

Security Tools and Exploits

Security Tools and Exploits
Here is a collection of coding samples, tools, and misc. other things that we have written over the past. All source code published on this website is considered copyrighted material and licensed under the FreeBSD licensing agreement found here: At the tail of of this page you can find the full copyright disclosure. BypassUAC – Attack that allows you to bypass Windows UAC in Windows Vista and Windows 7 both on x86 and x64 operating systems. Download BypassUAC here. Download EgressBuster here. PowerShell_PoC – zip file containing a number of powershell samples including SAM database dumping, reverse shells, bind shells, all natively written in PowerShell Download PowerShell_PoC here. Download Metasploit_Modules here. Encrypted_http_shell.zip – Contained source code and complied binaries of a server client reverse shell that communicates natively on HTTP channels. Download Encrypted_http_shell here. Download Simple_py_shell here.

CESG Homepage CESG launches Certified Cyber Security Consultancy CESG is pleased to announce a new approach to providing cyber security consultancy services for government and industry. Published on Monday 01 Jun 2015 New Certified Cyber Security Consultancy The newsletter describes the new scheme in detail, including proposed membership requirements, benefits and fees. Published on Tuesday 19 May 2015 New guidance on securing Industrial Control Systems New ICS guidance has been released by CPNI and CESG. Published on Monday 18 May 2015 More Items GCHQ Certified Masters Degrees - Calling Notice Academic Briefing Event 14th January 2015 GCHQ Certified Master's Degrees - Calling Notice Academic Briefing Event 14th January 2015 Published on Monday 08 Dec 2014 IA Practitioners' Event - York Racecourse 2015 Agile IA: Breaking the Chains and Responding to Change - Call for Speakers Published on Wednesday 26 Nov 2014 ACE-CSR Annual Conference 2014

STEGANOGRAPHY SOFTWARE Steganography applications conceal information in other, seemingly innocent media. Steganographic results may masquerade as other file for data types, be concealed within various media, or even hidden in network traffic or disk space. We are only limited by our imagination in the many ways information and data can be exploited to conceal additional information. Over the years I've been asked to add steganography and related application to my website, in the tool matrix, or steganography list. The following provides a list of stegangraphy and related products. NOTICE: Some of the programs listed here contain strong encryption components, and the export of them from the US is restricted by the EAR regulations. Neil F. Main Page | Steganography Page

Des outils pratiques pour les hackers Bonjour les ami(e)s, nous avons déjà vu comment devenir un bon hacker, aujourd’hui je vais vous présenter une liste des logiciels et outils qui sont utiles pour les hackers et les auditeurs en sécurité . Pour cela, il est préférable d’avoir la distribution Backtrack installé sur une machine virtuelle. Alors sans plus attendre voici quelques outils nécessaires pour scanner et exploiter les vulnérabilités d’une application web : 1. The Mole est un outil automatique d’exploitation des injections SQL. C’est en fournissant un lien vulnérable ou bien une adresse valide du site ciblé que l’on pourra tester l’injection et pourquoi pas l’exploiter. Cet outil fonctionne sur les bases de donnée de type MySQL, SQL Server, PostgreSQL et Oracle. 2. Est un scanner de vulnérabilités spécialement conçu pour WordPress. Pour en savoir plus, lisez notre article sur WPScan 3. 4. Uniscan est un scanner open source de vulnérabilités pour les applications web. 5. 6. havij

Is Security Awareness a Waste of Time? How do you know what devices are accessing your network? How do you detect a rogue device? What can you do to prevent a threat in your network and minimize the risk? With workforce mobility, bring your own device (BYOD) into the workplace, and guest access into your network, enterprises are realizing how important it is to track and monitor who and what is accessing the network. We’ve recently seen examples of how rogue devices have caused significant damage through gaining access to corporate infrastructure through network vulnerabilities. The panelists will look at how Network Access Control (NAC) or Endpoint Visibility, Access, and Security (EVAS) is being implemented by enterprises worldwide to address network security while continuing to support current infrastructure and the expanding mobile workforce. Topics of discussion will include: How to gain complete network visibility and control of all network devices from a cost effective, centralized deployment

Creating a Custom Linux Kernel in Debian GNU/Linux The most current version of this document can be found at Contents DisclaimerMaintenance LogIntroductionStep 1: Update Your sources.list FileStep 2: Update the List of Available PackagesStep 3: Apply Pending UpdatesStep 4: Install the Kernel Source PackageStep 5: Unpack the Kernel SourcesStep 6: Install Step 7: Patch the KernelStep 8: Configure the KernelStep 9: Create the Kernel Image PackageStep 10: Customize the Kernel Installation Environment Changing Boot Loaders Customizing the Squeeze (6.0) Environment Customizing the Wheezy (7.1) Environment Customizing the Jessie EnvironmentStep 11: Install the Kernel Image PackageStep 12: Shutdown and RebootStep 13: Clean UpStep 13a: Clean Up (Part Two)Step 14: MaintenanceAlternativesA Specific ExampleAnother Specific ExampleConclusion Disclaimer This is not an official Debian site. The author is not a member of the Debian kernel team. Maintenance Log Updates for kernel 3.11. Introduction apt-cdrom add

Le navigateur web des hackers [ MANTRA ] Publié le 13 août, 2011 par Ahmed Mantra, le navigateur des hackers, est une collection d’outils libres et open source intégrée dans un navigateur web, il est très pratique pour les testeurs de pénétration, les développeurs d’applications Web et les hackers. Il s’agit en fait d’une version portable du navigateur Web Firefox regroupant une collection de modules utiles lors de tests d’intrusions. En effet ce navigateur jouit de plus de 40 extensions embarquées par défaut pour garder sous la main les outils indispensables à l’exécution de batteries de tests. Parmi les extension qui contient Mandra on trouve : Mantra est Téléchargeable ici (Windows, Linux, Mac)

start [VERIS Community] The Vocabulary for Event Recording and Incident Sharing (VERIS) is a set of metrics designed to provide a common language for describing security incidents in a structured and repeatable manner. VERIS is a response to one of the most critical and persistent challenges in the security industry - a lack of quality information. VERIS targets this problem by helping organizations to collect useful incident-related information and to share that information - anonymously and responsibly - with others. The overall goal is to lay a foundation from which we can constructively and cooperatively learn from our experiences to better measure and manage risk. This site serves as a central hub for all things VERIS. overview: A brief summary of VERIS and what it can do for you. schema: The latest VERIS schema files are available on GitHub. documentation: This wiki is the primary source of supporting documentation pertaining to the VERIS Community schema.

Challenge - spider.io Tools for creating TCP/IP packets | Linux Blog hping ( hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired to the ping(8) unix command, but hping isn't only able to send ICMP echo requests. Features include: * Firewall testing * Advanced port scanning * Network testing, using different protocols, TOS, fragmentation * Manual path MTU discovery * Advanced traceroute, under all the supported protocols * Remote OS fingerprinting * Remote uptime guessing * TCP/IP stacks auditing * hping can also be useful to students that are learning TCP/IP Hping works on the following unix-like systems: Linux, FreeBSD, NetBSD, OpenBSD, Solaris, MacOs X, Windows. Nemesis ( Nemesis is a command-line network packet crafting and injection utility for UNIX-like and Windows systems. Nemesis can natively craft and inject ARP, DNS, ETHERNET, ICMP, IGMP, IP, OSPF, RIP, TCP and UDP packets. Scapy ( Yersinia (

Cloud - Taking Simplicity Even Further Burp Suite Tutorial – The Intruder Tool Hi everyone, I have been spending some time this week reviewing some of the old Security Ninja blog posts now that we are getting close to our second birthday. I wanted to create a list of things I’ve promised to write about but never got around to doing. The first item on my list is a tutorial for the Burp Suite. If you Google “Burp Suite Tutorial” my blog post from 2008 saying I was going to write a tutorial is the 7th result returned. The old Security Ninja blog has received over 2,000 visits to that blog post including an additional 30 visits so far in March. What is the Burp Suite? Burp Suite is an integrated platform for attacking web applications. Burp Suite allows you to combine manual and automated techniques to enumerate, analyse, scan, attack and exploit web applications. Source: The Burp Suite is made up of tools (descriptions take from the Port Swigger website): Spider: Burp Spider is a tool for mapping web applications. Selecting a payload

Do Your Negotiating Techniques Create Value? - INSEAD It’s no longer a game of hard-ball. Today’s negotiations are about more than just money. In the late 1990s, a European beverage company, number one in its market, squeezed suppliers so hard on price that a glass manufacturer with a strong supply links to the company went bankrupt. Not unusual in the cut-throat world of business but this time the tough stance backfired. When the market took an upturn a few months later the beverage company, with limited bottle supply, couldn’t feed demand and fell from number one to number two in a market of just three or four players. The company, according to Horacio Falcao, INSEAD Affiliate Professor of Decision Sciences who was brought in to look at what went wrong, lost more money in that one year than its aggressive procurement techniques had saved in ten. “By squeezing everything you have you can get results very quickly,” says Falcao. Negotiating in a crisis A second trend Change of approach Companies don’t have to overpay to win. Negotiation skills

Security Testing your Apache Configuration with Nikto Introduction By now you've got the perfect setup for your new Ubuntu 6.0.6 (Dapper Drake) box. You may have even followed the excellent Intrusion Detection and Prevention with BASE and Snort tutorial. This tutorial, inspired by one of the chapters in Hardening Apache by Tony Mobily (APress), will show you how to set up the free web server security scanner tool, Nikto. Remember, only scan servers you own or that you have permission to scan, or you could easily risk legal action and jail time. Let's get started. 1.1 Installing Net_SSLeay Net_SSLeay is a Perl Module that adds the ability to connect over SSL connections. I generally create a /src directory to download all my source files into, and will be doing that first. mkdir /src cd /src Now we can download the Net_SSLeay Perl Module source: wget Once it finishes downloading, let's extract it and enter the unarchived folder: tar -xzvf Net_SSLeay.pm-1.30.tar.gz cd .

Related: