Pages

Your IP

Your IP
your IP

Sunday

AntiCredit

Application for purchasing credits for Anti (Android Network Toolkit).

Anti is currently in pre-release, but you can register an account in advance through this app.

We are not currently supporting Honeycomb tablets. Tablets will be supported in Version 2.

Download Anti Android App, Now available as Free, Silver, Gold and Premium. Easy hacking on the go!

local-targets target
 
Remember that Android app called Anti, developed by Itzhak Avraham -  A Security researcher, designed to bring easy hacking on the go with all the hacking tools available to penetration testers on PCs to smartphones, with an automated interface intended to make sniffing local networks and owning remote servers as simple as pushing a few buttons with attack methods:

Hack a Droid Android Download App v4.2

Hack a Droid is a little suite of homemade implementations of security tools for Android composed by a wireless key cracker, a router password cracker, an utility that scans for hosts in your LAN, a port scanner and a service banner grabber.

Hack a Droid Android App       Hack a Droid Android App 

Zimperium Finally Releases 'Anti' For Android, Allows You To Use Penetration Testing Tools On The Go

The days where penetration testers carry around laptops with them to test the security of networks seem to be numbered, with Zimperium's 'Anti' bringing a lot of those tools over from the PC to Android smartphones.

It's been a long time coming, but Anti is now available to download to your phone for free from the Zimperium website. For some strange reason, you will have to install 'AntiCredit' from the Android Market in order to actually use the application effectively by buying credits, meaning that you will have two apps which, essentially, perform the same function.

After you have downloaded and installed Anti from the web (you will first need to enable the installation of 3rd party applications by going to Settings > Applications > Unknown sources), you are prompted to buy AntiCredits in order to actually use many of the features within the app. Once you have downloaded it separately, you can then choose from three tiered plans.
Buying silver credits will allow you to use man-in-the-middle as well as remote exploits. This pack comes with 20 credits (with one credit being used for each exploit) and will put you back $10. If you to choose to upgrade to gold credits, it will cost you $50, and for that you will be able to access additional server cracking dictionaries and use less crowded servers than members using silver. With gold, you will be able to use 150 credits.

anti android local anti device menu

srgn-InfoGather

One of my old tools which helps for initials steps of Information Gathering. Basic, it works with dig, whois and nmap scan results. Unfortunately, it’s not really user-friendly and not documented. I’ve already coded the basic structure of new information gathering tool, however still needs a looot of work.

WebSurgery v0.6a

WebSurgery is a suite of tools for security testing of web applications. It was designed for security auditors to help them with the web application planning and exploitation. Currently, it uses an efficient, fast and stable Web Crawler, File/Dir Brute forcer, Fuzzer for advanced exploitation of known and unusual vulnerabilities such as SQL Injections, Cross site scripting (XSS), Brute force for login forms, identification of firewall-filtered rules, DOS Attacks and WEB Proxy to analyze, intercept and manipulate the traffic between your browser and the target web application.



DROIDSHEEP

GET IT!

Google removed DroidSheep from the Android Market. So the only way to get it is actually to download it from here.
Changelog for v14:
- Added username resolution for facebook, linkedin, twitter, flickr and yahoo
- Showing IP of the victims device
- Some bugfixes
- New Languages available: polish, bulgarian, croatian, french and german
- Update notification for future versions of DroidSheep
In case you have problems when installing the new version (Android saying “not installed”, please uninstall the old version manually and download the new one!)

Droidsheep-Android Application for Session Hijacking

droidsheep
Android is one of the best and most famous operating system for mobile devices, mobile devices is now a important part of our life and we are using it every where in any condition. There are a lot people that are using Wifi on their mobile devices. Look at the past when we had a Firefox ad ons that can hijack Facebook, Twitter and other social networking websites sessions and the tool is called Firesheep, after this we got FaceNiff the purpose is same means session hijacking while Faceniff is for android OS.

Now there is another best tool for Android OS that can hijack session and it called Droidsheep.

[Android App] WifiKill - disable internet for network hoggers



Description:
Well, with this app you can disable internet connection for a device on the same network. So if someone (anyone) is abusing the internet wasting precious bandwidth for a Justin Bieber videoclips you could just kill their connection and stay happy with a full bandwidth just for yourself.

Google pulled it from market, so it's only available here:

DONATION VERSION AD-FREE:
http://slideme.org/application/wifikill

Project homepage: http://forum.ponury.net/

Friday

Penetration Testing: Tips For Successful Test


lens7079782_1253358862pentest 

Penetration testing is growing field and most of the companies hire ethical hackers to perform a quick pen test on their network to evaluate the security of the network. If you are expert in penetration testing or if you are a student of this field, in both cases you must follow some rules (tips) to perform a effective penetration testing.
We have discussed so many pen testing tools before so this article will not introduce you to tool but some tips surely.

First of all make sure that the test you are going to do is not conflict with the laws of local government, you must have an idea about cyber laws and crimes that you will surely learn by your experiences and through your academic career.


Penetration Testing vs Vulnerability Assessment


prev_1286651041
Penetration testing and Vulnerability assessment what actually a difference, it is a complicated topic to be discussed. People are often classified as the same thing when in fact they are not. Penetration Testing does sound a lot more exciting, but in our experience we have found that most clients actually require a comprehensive Vulnerability Assessment or V.A. and not a more intrusive Penetration Test.  








How To Write A Penetration Testing Report

penetration-testing
Penetration testing is an act to evaluate the security of a computer and computer network, penetration testing is a legal act so proper documentation is required, as discussed about several tips and steps for the successful penetration testing, this article will discuss about the end phase that report writing, means after penetration testing how you must make a report to submit clients.

This figure shows the effective and the best way of doing penetration testing, top four steps has been discussed on previous article click here to learn.

Penetration+TextWriting a report is an art, penetration testing report is just like a simple business report you must consider the objective and goals, how many goals has been achieved the way of achieving the goals, timing and all others relevant information that will give an idea about the test to the reader of the report.

What is the term Hacker mean's?

HACKER:-


In common usage, a hacker is a person who breaks into computers, usually by gaining access to administrative controls.
The subculture that has evolved around hackers is often referred to as the computer underground. Proponents claim to be motivated by artistic and political ends, and are often unconcerned about the use of illegal means to achieve them.
Other uses of the word hacker exist that are not related to computer security (computer programmer and home computer hobbyists), but these are rarely used by the mainstream media.
Hacking developed alongside "Phone Phreaking", a term referred to exploration of the phone network without authorization, and there has often been overlap between both technology and participants. Bruce Sterling traces part of the roots of the computer underground to the Yippies, a 1960s counterculture movement which published the Technological Assistance Program (TAP) newsletter. [3]. Other sources of early 70s hacker culture can be traced towards more beneficial forms of hacking, including MIT labs or the homebrew club, which later resulted in such things as early personal computers or the open source movement.

Hacker groups:-