Monday
RUSSIA AND THE RISE OF THE MACHINES
This summary is not available. Please
click here to view the post.
Sunday
AntiCredit
Application for purchasing credits for Anti (Android Network Toolkit).
Anti is currently in pre-release, but you can register an account in advance through this app.
We are not currently supporting Honeycomb tablets. Tablets will be supported in Version 2.
Download Anti Android App, Now available as Free, Silver, Gold and Premium. Easy hacking on the go!
Remember that Android app called Anti,
developed by Itzhak Avraham - A Security researcher, designed to bring
easy hacking on the go with all the hacking tools available to
penetration testers on PCs to smartphones, with an automated interface
intended to make sniffing local networks and owning remote servers as
simple as pushing a few buttons with attack methods:
Hack a Droid Android Download App v4.2
Hack a Droid is a little suite of
homemade implementations of security tools for Android composed by a
wireless key cracker, a router password cracker, an utility that scans
for hosts in your LAN, a port scanner and a service banner grabber.
Zimperium Finally Releases 'Anti' For Android, Allows You To Use Penetration Testing Tools On The Go
The days where penetration testers carry around laptops with them to test the security of networks seem to be numbered, with Zimperium's 'Anti' bringing a lot of those tools over from the PC to Android smartphones.
It's been a long time coming, but Anti is now available to download to your phone for free from the Zimperium website.
For some strange reason, you will have to install 'AntiCredit' from the
Android Market in order to actually use the application effectively by
buying credits, meaning that you will have two apps which, essentially,
perform the same function.
After you have downloaded and installed
Anti from the web (you will first need to enable the installation of
3rd party applications by going to Settings > Applications >
Unknown sources), you are prompted to buy AntiCredits in order to
actually use many of the features within the app. Once you have
downloaded it separately, you can then choose from three tiered plans.
Buying
silver credits will allow you to use man-in-the-middle as well as
remote exploits. This pack comes with 20 credits (with one credit being
used for each exploit) and will put you back $10. If you to choose to
upgrade to gold credits, it will cost you $50, and for that you will be
able to access additional server cracking dictionaries and use less
crowded servers than members using silver. With gold, you will be able
to use 150 credits.
srgn-InfoGather
One of my old tools which helps for initials steps of Information
Gathering. Basic, it works with dig, whois and nmap scan results.
Unfortunately, it’s not really user-friendly and not documented. I’ve
already coded the basic structure of new information gathering tool,
however still needs a looot of work.
WebSurgery v0.6a
WebSurgery is a suite of tools for security testing of web
applications. It was designed for security auditors to help them with
the web application planning and exploitation. Currently, it uses an
efficient, fast and stable Web Crawler, File/Dir Brute forcer, Fuzzer
for advanced exploitation of known and unusual vulnerabilities such as
SQL Injections, Cross site scripting (XSS), Brute force for login forms,
identification of firewall-filtered rules, DOS Attacks and WEB Proxy to
analyze, intercept and manipulate the traffic between your browser and
the target web application.
DROIDSHEEP
GET IT!
Google removed DroidSheep from the Android Market. So the only way to get it is actually to download it from here.
Changelog for v14:
- Added username resolution for facebook, linkedin, twitter, flickr and yahoo
- Showing IP of the victims device
- Some bugfixes
- New Languages available: polish, bulgarian, croatian, french and german
- Update notification for future versions of DroidSheep
- Added username resolution for facebook, linkedin, twitter, flickr and yahoo
- Showing IP of the victims device
- Some bugfixes
- New Languages available: polish, bulgarian, croatian, french and german
- Update notification for future versions of DroidSheep
In case you have problems when installing
the new version (Android saying “not installed”, please uninstall the
old version manually and download the new one!)
Droidsheep-Android Application for Session Hijacking
Now there is another best tool for Android OS that can hijack session and it called Droidsheep.
[Android App] WifiKill - disable internet for network hoggers
Description:
Well, with this app you can disable internet connection for a device on
the same network. So if someone (anyone) is abusing the internet wasting
precious bandwidth for a Justin Bieber videoclips you could just kill
their connection and stay happy with a full bandwidth just for yourself.
Google pulled it from market, so it's only available here:
DONATION VERSION AD-FREE:
http://slideme.org/application/wifikill
http://slideme.org/application/wifikill
Project homepage: http://forum.ponury.net/
Friday
Penetration Testing: Tips For Successful Test
We have discussed so many pen testing tools before so this article will not introduce you to tool but some tips surely.
First of all make sure that the test you are going to do is not conflict with the laws of local government, you must have an idea about cyber laws and crimes that you will surely learn by your experiences and through your academic career.
Labels:
pentester
Penetration Testing vs Vulnerability Assessment
Penetration
testing and Vulnerability assessment what actually a difference, it is a
complicated topic to be discussed. People are often classified as the
same thing when in fact they are not. Penetration Testing does sound a
lot more exciting, but in our experience we have found that most
clients actually require a comprehensive Vulnerability Assessment or
V.A. and not a more intrusive Penetration Test.
Labels:
pentester
How To Write A Penetration Testing Report
Penetration testing
is an act to evaluate the security of a computer and computer network,
penetration testing is a legal act so proper documentation is required,
as discussed about several tips and steps for the successful penetration testing,
this article will discuss about the end phase that report writing,
means after penetration testing how you must make a report to submit
clients.
Writing
a report is an art, penetration testing report is just like a simple
business report you must consider the objective and goals, how many
goals has been achieved the way of achieving the goals, timing and all
others relevant information that will give an idea about the test to the
reader of the report.
Labels:
pentester
What is the term Hacker mean's?
HACKER:-
In common usage, a hacker is a person who breaks into computers, usually by gaining access to administrative controls.
The subculture that has evolved around hackers is often referred to as the computer underground. Proponents claim to be motivated by artistic and political ends, and are often unconcerned about the use of illegal means to achieve them.
Other uses of the word hacker exist that are not related to computer security (computer programmer and home computer hobbyists), but these are rarely used by the mainstream media.
Hacking developed alongside "Phone Phreaking", a term referred to exploration of the phone network without authorization, and there has often been overlap between both technology and participants. Bruce Sterling traces part of the roots of the computer underground to the Yippies, a 1960s counterculture movement which published the Technological Assistance Program (TAP) newsletter. [3]. Other sources of early 70s hacker culture can be traced towards more beneficial forms of hacking, including MIT labs or the homebrew club, which later resulted in such things as early personal computers or the open source movement.
Hacker groups:-
Subscribe to:
Posts (Atom)