Showing posts with label Security Review. Show all posts
Showing posts with label Security Review. Show all posts

Thursday, November 8, 2012

How to crack/reset your Windows account?

Have you lost or forgotten your Windows password?

It's one of the security best practice to enable password on your Windows user account to ensure you have adequate protection from malicious access to your personal files. 

It is a common practice to forget your computer password if you're not using it for a while or perhaps just returned from holidays. Unfortunately, currently Windows operating systems doesn't have an option to reset your password like we commonly see in web applications such as Facebook, Hotmail etc.

In the majority of the cases, I have seen users have to format and reinstall the Windows to access their computer again but unfortunately they have to sacrifice  loss of their personal data if they haven't backed-up.

So what to do? How to crack/reset the password of the Windows operating system?

I recently come across this nice password resetter tool "Password Resetter", which cracks windows password in minutes without affecting your personal data.

As stated on their website that it can recover 99,9% of passwords from nearly any Windows installation in a matter of seconds! You do not need to remember old passwords in order to crack your Windows password.

Password Resetter recovers the lost Windows administrator or user password from any Windows Operation System. It supports Windows Vista, XP, NT, 2000 and the newest Windows 7.

How to use Password Resetter?

1) Download a copy of Password Resetter.

2) Burn the image on CD/DVD. The package comes with the detailed tutorial.

3) Once the bootable CD/DVD is ready, boot the system with this CD/DVD. Select the user account and then click on reset button.



Another cool feature?

It supports USB, which means you can crack/reset your Windows password with USB drives in case you do not have CD/DVD.  

This is not a freeware, you will need to purchase this software for around $35 for personal use.

Thursday, June 14, 2012

Metasploit: The Penetration Tester’s Guide

Want a great book on Backtrack 5 and the Metasploit Framework?


Look no further than “Metasploit: The Penetration Tester’s Guide” written by the all star cast of David Kennedy (creator of the Social Engineering Toolkit), Jim O’Gorman (instructor at Offensive-Security), Devon Kearns (a BackTrack Linux developer), and Mati Aharoni (created BackTrack and founder of Offensive-Security). 


This is the most complete and comprehensive instruction book for Metasploit that I have seen so far. The authors walk you step by step, command by command through using the Metasploit Framework as a penetration tester. You move quickly from the basics of Penetration testing through using the platform to perform the different phases of intelligence gathering and exploitation. 


Excellent book for anyone interested in a hands on approach to computer security, the Metaslpoit pro who wants a great reference book and those new to Metasploit that want a step by step instruction manual.


Metasploit: The Penetration Tester’s Guide – Check it out!

Sunday, February 13, 2011

What have we learned from Conficker?

Conficker has been somewhat of a catalyst to help unify a large group of professional and academic whitehats

Conficker is the name applied to a sequence of malicious software. It initially exploited a flaw in Microsoft software, but has undergone significant evolution since then (versions A through E thus far).

Nearly from its inception, Conficker demonstrated just how effective a random scanning worm can take advantage of the huge worldwide pool of poorly managed and unpatched internet-accessible computers. Even on those occasions when patches are diligently produced, widely publicized, and auto-disseminated by operating system and application manufactures, Conficker demonstrates that millions of Internet-accessible machines may remain permanently vulnerable.

In some cases, even security-conscious environments may elect to forgo automated software patching, choosing to trade off vulnerability exposure for some perceived notion of platform stability.

Another lesson of Conficker is the ability of malware to manipulate the current facilities through which internet name space is governed. Dynamic domain generation algorithms (DGAs), along with fast flux (domain name lookups that translate to hundreds or thousands of potential IP addresses), are increasingly adopted by malware perpetrators as a retort to the growing efficiency with which whitehats were able to behead whole botnets by quickly identifying and removing their command and control sites and redirecting all bot client links.

While not an original concept, Conficker's DGA produced a new and unique struggle between Conficker's authors and the whitehat community, who fought for control of the daily sets of domains used as Conficker's internet rendezvous points.

Yet another lesson from the study of Conficker is the ominous sophistication with which modern malware is able to terminate, disable, reconfigure, or blackhole native OS and third-party security services..

Today's malware truly poses a comprehensive challenge to our legacy host-based security products, including Microsoft's own anti-malware and host recovery technologies. Conficker offers a nice illustration of the degree to which security vendors are challenged to not just hunt for malicious logic, but to defend their own availability, integrity, and the network connectivity vital to providing them a continual flow of the latest malware threat intelligence.

To address this concern, we may eventually need new OS services specifically designed to help third-party security applications maintain their foothold within the host.

Tuesday, June 1, 2010

Web browser keeps track of which web addresses you have visited

History of Social Network Use Reveals Your Identity

Web browsing history can be used to identify individuals in a membership group on a social networking site, according to researchers at the Vienna University of Technology. The researchers built a Web site to read the Web addresses visited by people who use Xing, a business-oriented social network based in Hamburg, Germany.

They collected data on 6,500 groups containing 1.8 million users, and analyzed the overlap between the lists of names of group members that were publicly available. The researchers estimate that 42 percent of Xing users could be uniquely identified by the membership groups they visited. Xing has begun to add random numbers to mask addresses, but the response might not be enough to foil a similar snooping site, says Stanford University computer scientist Arvind Narayanan.

The next round of Firefox, Chrome, and Safari browsers could have fixes to prevent browsing history from being relayed to Web site owners.


Please refer here to read an interesting research.

Thursday, December 31, 2009

How your corporate domain name is managed?

Domain Names Security and Vulnerability Assessment - Answer the following questions...

  • Where are your domain names registered?
  • How much are you paying for it? (Is your brand really worth just $9.95 a year?)
  • Who has access to change your DNS registration?
  • Are those people trusted?
  • How do you authenticate to make changes to your DNS registration?
  • Is that authentication system adequate? (Are you using passwords or certificates?)
  • What is the access recovery process for your DNS registration in the event that you loose your access credential? Is that recovery process secure?
  • Have you locked out registrar transfers for your domain?
  • Is your DNS Whois contact information up to date?
  • Are you carefully monitoring the email addresses associated with the Whois contact information for your domain? (If not, you might loose your domain if someone complains about the accuracy of your Whois contact information or claims (even fraudulently) that you are infringing upon their trademarks.)
  • How are you hosting your DNS records?
  • If you are hosting your DNS with a third party, you need to ask all the access control questions that you asked about your DNS registrar - Who has access, how do they have access, and what is the recovery process...
  • If you are hosting your own DNS, how are you managing the security of your DNS servers?
  • What DNS records are you publishing? What process exists within your organization to create a new DNS record within your domain and how do old DNS records get expired?
  • Are those processes connected with other business controls that need to be invoked whenever your organization publishes information on the Internet?
Hopefully, your organization has looked at these questions carefully and has mature processes, but the fact is that these issues are frequently overlooked, and represent a significant and widespread vulnerability on the Internet today.

Monday, November 2, 2009

The pros and cons of switching to Windows 7

Top eight reasons to jump in with both feet to upgrade to Windows 7

I'll also tell you three possible reasons for keeping the new OS on the shelf — for a while, at least.

I find a solid core of real improvements in the new release. There are many aspects of Windows 7 that cry out for adopting it and just a few that suggest sticking with Vista or XP.
  1. Windows 7 is easier on the eyes

    Windows 7's a stunner. From wallpaper that changes itself to the tightly controlled group of icons in the area near the clock, Win7 puts the things you need most where you need them. The OS also moves the flotsam out of the way.

    Since there's no Sidebar in Windows 7 — good riddance, I say — Win7's gadgets move to the high-rent district of the desktop, where you can move, resize, and snap them together neatly.

  2. The Action Center puts all the nags in one place

    Windows XP and Vista are notorious for scattering important information all over creation. At the same time — and quite perversely — every two-bit application you install on an XP or Vista PC can pop up annoying messages, distracting your attention while you're trying to get some work done.

    Win7 reduces the shrill impositions to a minimum by funneling almost all interactions through the Action Center. Yes, the Action Center has its roots in the old Security Center, but it's all grown up now.

    The Action Center serves as traffic cop for announcements that inform, warn, and often annoy. But rather than a pop-up window, the only alert you'll see is a flag in the notification area (near the clock) that turns yellow or red as needs dictate.

  3. Win7's security is stronger and less intrusive

    Security stuff gets complicated very quickly. Suffice it to say that Windows 7 is significantly more difficult to crack than Vista, which in turn was an order or magnitude tougher to break into than XP. (Internet Explorer and the .NET Framework are noteworthy exceptions.)

    Compared to Vista's User Account Control (UAC), the equivalent in Windows 7 is clipped and reined in. You can get to the settings easily. For most people, security won't be nearly so difficult in Win7 as it was in Vista.

  4. You can make a movie of what ails your PC

    If you haven't seen Windows 7's new Problem Steps Recorder (PSR), you owe it to yourself to try it. Click Start, type psr, and hit Enter. This little utility lets you record everything on the screen — except the stuff you type — as it happens. When you're done, PSR spits out an MHTML file that can be opened and played back in Internet Explorer

    Like the Snipping Tool in Vista (also available in Win7), once you try PSR, you won't know how you ever lived without it.

  5. Search works — finally!

    Windows XP's built-in search feature is a slow, painful, buggy joke. In Vista, search is a little less labored, occasionally usable, but still unreliable.

    In Windows 7, Microsoft has, at long last, woven search into the operating system itself. There's no noticeable system overhead, searches proceed fairly quickly, and — most important of all — the results are accurate.

  6. You get better control of your devices

    Windows 7 centralizes control of all devices: printers, MP3 players, phones, keyboards, mice, fax machines, and anything else you plug into your computer. The controls all appear in a place called Device Stage.

    If you're tired of having 10 different programs in 10 different places to control your attached hardware, those days are rapidly drawing to a close. The junky little programs that go with the devices will disappear, too. At least I hope they will. So long, commercial driver-update utilities!

  7. Win7 Libraries beat out My Documents any day

    While Libraries don't do away with the need to organize your files, they make it much, much simpler to track files and put them in the right locations.

    "A place for everything, and everything in its place," With Windows 7 Libraries, file management is easier than ever.

  8. HomeGroup makes sharing safe, fast, and fun

    A stroke of pure design genius, Windows 7 HomeGroup bundles all the sharing options you'd likely want in order to make files, printers, and media accessible to any other Windows 7 PC on your network.
Three reasons why Windows 7 isn't for everybody

Despite these and other Win7 positives, there are at least three good reasons for Windows XP and Vista users to stick with their current OS:
  1. If your PC isn't up to snuff, fuhgeddaboutit!

    While Windows 7's hardware demands are less stringent than Vista's, there are zillions of PCs that simply can't handle Win7. However, if you have a desktop machine or laptop that's more than a few years old, upgrading its hardware to support Windows 7 is likely more trouble than it's worth. Don't bother.

  2. If your hardware or software demands XP, stick with that OS

    The XP Mode built into Windows 7 Professional and Ultimate is a Virtual PC–based implementation of XP. XP Mode makes sense for large companies that want to get the benefits of Windows 7 but have to put up with hardware or software that runs only under Windows XP.

  3. Don't try to fix what ain't broke

    By far the most-compelling argument for staying with Windows XP or Vista is this: The Windows you have now does everything you need, and you aren't overly concerned about rootkits or other nearly invisible malware hosing your machine. In this case, there's no compelling reason to go out on a limb with Win7.
Replacing your operating system is slightly simpler than performing a self-administered brain transplant, but it's still no walk in the park. In the vast majority of cases, upgrades to Windows 7 go in smoothly, with a few minor irritations — maybe you can't find the install CD for an old program, for example, or you forgot to write down a password.

But in a small percentage of cases, the Windows 7 installation doesn't go well at all. As they say, stuff happens. Any upgrade could potentially become calamitous, and Windows 7 isn't immune.

Tuesday, December 9, 2008

Top 10 Things To Look Forward To In Windows 7

Windows 7 Beta 1 Coming January 2009

Web site Windows 7 Centre reports that Microsoft's forthcoming update to Vista, Windows 7, will release its first official beta on January 13, 2009. In meanwhile I did some research to find out Windows 7's awesome new features.

Note:
The Windows 7 Preview is a pre-beta release, which means it's not even close to feature-complete. Chances are good that later releases will add or take away features listed below (though most likely later releases will grow these seeds and add a few more goodies).


Second note:
Surely Windows 7 includes stability and performance improvements under the hood with highly technical explanations that would make operating system coders very happy. However, this list is purely from my experience as a regular user, living and working with Windows 7 for about five days.
Here are just a few of the things to look forward to in Windows 7.

10. Ding-dong, the Sidebar is dead.


One of the first things I hunted down and killed in Windows Vista was the Sidebar, which loaded by default and docked Vista's Gadgets to the right side of your desktop. In Windows 7, the sidebar is no more, and gadgets, should you want them, can roam free across the desktop. This time around, the gadgets feel less distracting to me—the CPU meter and calendar gadgets are my favourites, though this screenshot shows many more.




9. Calculator, WordPad, and Paint got overhauled.

It sucks that Windows 7 is stripping the built-in Photo Gallery and movie-making software that you'll find in Vista (even the Windows Calendar is nowhere to be found in the 7 Preview), but a few of their built-in stalwarts did get some attention. WordPad and Paint both got the Office 2007 ribbon installed, and Calculator now incorporates real world uses into it. At this point only masochists still use Paint and WordPad, but the extension of the ribbon to those inconsequential programs may be a harbinger for more upgrades and ribbon appearances in the future.



8. Windows 7 will run longer on your notebook's battery power.

While I'm running the Windows 7 Preview on a plugged-in desktop computer, notebook owners will be thrilled to know that Windows 7 promises to run more efficiently and thus longer on battery. It can also identify what's causing battery issues, though this is currently a well-buried option.

7. You can switch between Wi-Fi networks in one click from the system tray.

File this under "a small change can make a huge difference": Click on the Wi-Fi adaptor in your system tray to pop up a menu of available wireless networks. From there you can refresh the list, and choose the one you want to connect to in one click. Another boon for roaming notebook users.



6. You can decide what you do and don't want to see in the system tray.

No more registry-editing to blanket-disable balloon notifications in your system tray! Windows 7 lets you set what icons and notifications you see in your tray with a detailed dialog box. Just right-click the system tray and choose "Customize..." in the menu.



5. You get more control of User Account Control.

The single biggest complaint about Windows Vista was its User Account Control's incessant, nagging, pop-up dialogs that would ask you if you were ABSOLUTELY SURE you wanted to do the thing you just told the computer to do. In the name of security, Vista would even check if this STRANGE and SCARY program called Notepad was ok to run:



While legions of Vista users would sacrifice the well-intentioned security that User Account Control offered by turning it off completely just to get their sanity back, in Windows 7 you can fine-tune the level of nags, warnings, and confirmation prompts you get.



4. Libraries group similar content; Homegroups to make sharing libraries easier.

Windows networking is a pain in the ass, but Windows 7 is out to fix that with two things: content Libraries and Homegroups. Libraries are a way to group similar types of files even if they live in different folders. For instance, your Video library could include your TV folder, Movies folder, DVD Rips folder, and your Home Movies folder. Then, you can create a Homegroup (basically a reworking of Windows' existing Workgroups), that makes sharing those libraries between PCs easier.

Since I don't have two Windows 7 boxes available, I wasn't able to test how much easier sharing files was between the machines; however, the whole file-sharing layout and UI looks significantly more intuitive for regular Jolenes who just want to view the photos stored on the office computer in the living room.

3. You can instantly snap your windows to size, and clear the desktop in one motion.

As widescreen monitors become more common, easier side-by-side window management is key—and Windows 7 builds that in. While not as configurable as a third-party program like GridMove, Windows 7 offers the ability to snap a window to half your screen size simply by dragging it to the left or right of the screen. Here's what it looks like when you do so—let go of your mouse button and that Lifehacker browser window would snap that half-screen-sized glass overlay you see behind it. Along similar lines, the new "Aero Shake" feature lets you clear the desktop of all background windows by grabbing the top bar of the active window and moving it back and forth quickly.

2. Windows 7 starts up faster.

Scheduling your morning coffee run for the time between the moment you hit the power button on your PC and actually start working sucks. Windows Vista is sloooooow when it comes to starting up and getting you to your desktop; but even the Preview tester release of Windows 7 shows 20% faster boot times than Vista.

1. You can do MUCH more from the Windows 7 taskbar.

Most people live with the Windows taskbar visible on their desktop at all times, so the more use you can get out of the real estate it hogs, the better. Windows 7's taskbar is greatly improved in two ways. First, you can pin programs to it indefinitely for easy quick launch, similar to RocketDock or the Mac OS X dock. Second, on a crowded desktop covered with windows, using the new "Aero Peek" feature, you can preview individual windows from grouped taskbar apps, and even close documents from the thumbnails themselves.

This doesn't sound like a big deal in theory, but in practice when you've got two monitors and a dozen windows open from four apps, Peek comes in way handy. Here's a screencast of Peek in action.
There's also a permanent "Show Desktop" button on the far right of the taskbar which both clears the Desktop of all windows (instant Boss button!) and restores them right to where they were in another click. As you can see, Windows 7 is a big pile of small improvements over Vista that amount to a lot in aggregate.

Any other Preview release testers out there unearth features I didn't mention here? Shout 'em out in the comments.


(Note: The Windows 7 Preview's version of Peek is yet incomplete; this is just the beginning of what you'll be able to do with it.)

Monday, September 8, 2008

Wireless Intrusion Detection Tool

AirSnare - Another must-have wireless security tool

AirSnare is another tool to add to your Wireless Intrusion Detection Toolbox. AirSnare will alert you to unfriendly MAC addresses on your network and will also alert you to DHCP requests taking place. If AirSnare detects an unfriendly MAC address you have the option of tracking the MAC address's access to IP addresses and ports or by launching Wireshark upon a detection.




A quick walkthrough using Airsnare

* Install Airsnare, then run the Airsnare Update and download the latest drivers for your wireless adaptor. If the software reports a missing COMDLG32.OCX, download it from here and save it in C:\windows\System32\

* Once AirSnare is up and running, check the Network Adaptors list, right-click on the adaptor you use to connect to your network and select Start. AirSnare will scan your network to compile a list of Unfriendly MAC addresses and mark them with a sjull and crossbones.

* To add known devices to the Friendly list, close Airsnare, open c:\Program Files\AirSnare\TrustedMAC.txt and add the MAC addresses, decriptions and the last two digits of the IP address for each device.

* Save the file, relaunch, and you will see a list of Friendly MAC addresses. You can also add a trusted device by right-clicking on an Unfriendly MAC address. At first it might be easier to leave one of your computers off the friendly list, so you get an idea of what Unfriendly traffic looks like.

* By default AirSnare also installs Wireshark - a network protocol analyser that provides a lot more detail as to what's happening on your network.

* If you want to keep a record of network activity you can right-click on the top right window to write the current session to a text file, although all Unfriendly activity is automatically logged to Watch1.txt.

Please click here to download and refer here for complete user guide.

Thursday, July 31, 2008

Security Analyser - Automating code review...

New IBM tool analyzes code for mistakes as its written

IBM's Rational Software unit this week unveiled a development tool that can scan and check code as it's written to uncover errors before they make their way further into the development life cycle where fixes are far more costly.

The IBM Rational Software Analyzer automatically scans the new code up to 700 times before an application is complete. Its operation is similar to the grammar check function in Microsoft Word, according to IBM.

"We unfortunately see a lot of defects in code. You really want to be able to minimize those defects. The earlier you do it in the life cycle the less expensive it becomes," said Dave Locke, director of product marketing for the Rational operation.

Please click here to read full details.

Tuesday, May 20, 2008

NetworkMiner

Passive Sniffer and Packet Analysis Tool for Windows...

NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows. NetworkMiner can be used as a passive network sniffer/packet capturing tool in order to detect operating systems, sessions, hostnames, open ports etc. without putting any traffic on the network. NetworkMiner can also parse PCAP files for off-line analysis and to regenerate/reassemble transmitted files and certificates from PCAP files.

The purpose of NetworkMiner is to collect data (such as forensic evidence) about hosts on the network rather than to collect data regarding the traffic on the network. The main view is host centric (information grouped per host) rather than packet centric (information showed as a list of packets/frames).NetworkMiner performs OS fingerprinting based on TCP SYN and SYN+ACK packet by using OS fingerprinting databases from
p0f (by Michal Zalewski) and Ettercap (by Alberto Ornaghi and Marco Valleri). NetworkMiner can also perform OS fingerprinting based on DHCP packets (which usually are broadcast packets) by making use of the Satori (by Eric Kollmann) OS fingerprinting database from FingerBank. NetworkMiner also uses the MAC-vendor list from Nmap (by Fyodor).



The newly released version 0.84 of NetworkMiner supports live sniffing of WLAN traffic (IEEE 802.11). This allows users to perform wireless network forensic analysis on any Windows machine with an AirPcap adapter installed. The RadioTap protocol as well as the Logical Link Control (LLC) protocol are also implemented in order to extract as much information as possible about the hosts communicating over a WLAN.

More info can be found at the NetworkMiner Wiki site.

Monday, April 28, 2008

Unlocking Network Knowledge

Net/FSE, the Network Forensic Search Engine

Packet Analytics' Net/FSE, the network forensic search engine, is the first commercial solution available to network security analysts that are built from the ground up to make network event analysis operations cost effective, faster and more efficient. Net/FSE, available as a free download, brings together event data from network devices and gives security analysts the ability to correlate and analyze billions of events in real time.

Net/FSE gives the security team the ability to collect any type of network event data, including flow data (unlike many SIM and log management solutions) that can be generated by almost every enterprise network router and is essentially a free resource of forensic information. Other valuable information sources for Net/FSE include alerts from IDS, IPS, SIM and NBA, firewall logs, web server logs, authentication logs and database server access logs.

SIMs and log management solutions have partially addressed the needs of network security analysts but such systems are not built to provide analysis capabilities for alert analysis, indepth network forensics or incident response. Net/FSE by Packet Analytics fills the gap in the network security market by bringing cost effective, easy to use network event analysis capabilities to enterprise networks. Net/FSE adds value to an enterprise’s existing tool suite and maximizes the value of these tools by making the organization’s security practitioners more effective in their daily tasks.

Saturday, April 5, 2008

Wireshark 1.0.0 Released

A free packet sniffer....

Wireshark is a free packet sniffer computer application. It is used for network troubleshooting, analysis, software and communications protocol development, and education.

Wireshark, the most popular network protocol analysis tool has finally turned to version 1.0.


This released version is not much different than the previous version 99.8 released in Feb 27. Apart from some cosmetic improvement from the previous version this version includes an experimental Mac OS X package.

You can download wireshark 1.0.0 from here

For a more complete list of information about this release, read the official release note here.

Thursday, April 3, 2008

ProxyStrike

Proxy to Find Vulnerabilities in Web Application

ProxyStrike is an active Web Application Proxy, is a tool designed to find vulnerabilities while browsing an application. It was created because the problems we faced in the pentests of web applications that depends heavily on Javascript, not many web scanners did it good in this stage, so we came with this proxy.

Right now it has available Sql injection and XSS modules. Both modules are designed to catch as many vulnerabilities as we can, it's that why the SQL Injection module is a Python port of the great DarkRaver "Sqlibf". The XSS module is made by us, using our library Gazpacho (soon will be released as standalone tool).

The process is very simple, ProxyStrike runs like a passive proxy listening in port 8008 by default, so you have to browse the desired web site setting your browser to use ProxyStrike as a proxy, and ProxyStrike will analyze all the paremeters in background mode. For the user is a passive proxy because you won't see any different in the behaviour of the application, but in the background is very active. :)

Features:

Http request/response history
Request parameter stats
Request parameter values stats
Request url parameter signing and header field signing
Use of an alternate proxy (tor for example ;D )
Sql attacks
Xss attacks
Export results to HTML or XML
Console version (python proxystrike.py -c / proxystrike.exe -c

Downloads:

ProxyStrike v1.0 (Windows)
ProxyStrike v1.0 (Linux/OSX)

Friday, March 28, 2008

Best SQL Injection Tool

Pangolin - v1.2.590

Pangolin is a GUI tool running on Windows to perform as more as possible pen-testing through SQL injection. This version now supports following databases and operations:

MSSQL : Server informations, Datas, CMD execute, Regedit, Write file, Download file, Read file, File Browser...
ORACLE : Server informations, Datas, Accounts cracking...
PGSQL : Server informations, Datas, Read file...
DB2 : Server informations, Datas, ...
INFORMIX : Server informations, Datas, ...
SQLITE : Server informations, Datas, ...
Access : Server informations, Datas, ...
SYBASE : Server informations, Datas, etc.

And supports:

HTTPS support
Pre-Login
Proxy
Specify any HTTP headers(User-agent, Cookie, Referer and so on)
Bypass firewall setting
Auto-analyzing keyword
Detailed check optio ns
Injection-points management etc.

What's the differents to the others?

Easy-of-use : What I try to do is making pen-tester more care about result, not the process. All you should do is clicking the buttons. Amazing Speed : so many people told you things about brute sql injection, is it really necessary? Forget char-by-char, we can row-by-row(of cource, not every injection-point can do this)?


The exact check method : do you really think automated tools like AWVS,APPSCAN can find all injection-points?

So, whatever, just check it out, and then enjoy your feeling ;)

More information : http://www.nosec.org/web/index.php?q=pangolin


Download : http://seclab.nosec.org/security/pangolin_bin.rar


Declare: Pangolin is designed for security testing by pen-tester when he has been authorized. DO NOT attack any website viciously or accept the consequences!!!

Wednesday, March 26, 2008

WEBSHAG 1.00 - Just Released !

Multi-Platform Web Server Audit Tool.

Webshag is a free, multi-threaded, multi-platform web server audit tool. Written in Python, it gathers commonly useful functionalities for web server auditing like website crawling, URL scanning or file fuzzing. It also provides innovative functionalities like the capability of retrieving the list of domain names hosted on a target machine and file fuzzing using *dynamically* generated filenames (in addition to common list-based fuzzing).

Webshag URL scanner and file fuzzer are aimed at reducing the number of false positives and thus producing cleaner result sets. For this purpose, webshag implements a web page fingerprinting mechanism resistant to content changes. This fingerprinting mechanism is then used in a false positive removal algorithm specially aimed at dealing with “soft 404″ server responses.

Webshag provides a full featured and intuitive graphical user interface as well as a text-based command line interface.

Tuesday, March 11, 2008

Software turns flash drive into PC

Now this is called Virtual World :)

A US company has launched a computer program that can turn most flash memory sticks, hard drives or iPods into "virtual" PCs that can run most programs that work on Windows XP.

The software, known as MojoPac, allows you to use any computer without leaving a trail of evidence.

Every time you plug your MojoPac-enabled device into any Windows XP PC , MojoPac automatically launches your environment on the host PC. Your communications, music, games, applications, and files are all local and accessible. And when you unplug the MojoPac device, no trace is left behind your information is not cached on the host PC.

This independence allows people to use public computers without a trace of their session being left behind. PCs typically store a record of activity long after the computer has been turned off. "It's a slick way to move from machine to machine," says Rob Enderle, founder of the Enderle Group, a research firm that follows the PC industry. "It's about as safe as you can get."

Tuesday, February 26, 2008

Firekeeper

Turn FireFox into an Intrustion Detection System

Firekeeper is an Intrusion Detection and Prevention System for Firefox. It is able to detect, block and warn the user about malicious sites. Firekeeper uses flexible rules similar to Snort ones to describe browser based attack attempts. Rules can also be used to effectively filter different kinds of unwanted content.Features of Firekeeper include:
  • Ability to scan HTTP(S) request URL, response headers and body, and to cancel processing of suspicious requests

  • Encrypted and compressed responses are scanned after decryption/decompression

  • Privacy friendly - no data is send to external servers, all scanning is done on the local computer

  • Very fast pattern matching algorithm (taken directly from Snort).

  • Interactive, verbose alerts that give an ability to choose a response to detected attack attempt.

  • A detailed view of suspicious response headers and body

  • Event logging

  • Ability to use any number of files with rules and to automatically load files from remote locations

Download the newest Firekeeper release. Note: This is an alpha release which main purpose is to get feedback from users about Firekeeper's functionality and to test if Firekeeper works well on various different systems.

After installing visit a page with some tests, Firekeeper should display an alert for every link on this page.

Thursday, February 21, 2008

EXPLOIT-Me

Another Excellent Firefox Plugin..

Exploit-me is a FireFox plugin which is developed to ease penetration testings via web browser. Exploit-me is currently developed to exploit 2 types of web application vulnerabilties, which are SQL injection and XSS.

For more information about download links, please visit this page.

Other related reviews:
Yamwool’s, (IT)gossips’s, derossi’s.

Tuesday, January 29, 2008

Technika

XSS Discovery Tool # 2

Technika is another tool from GNUCITIZEN that allows you to easily construct bookmarklets and automatically execute them, imitating the functionalities of GreaseMonkey.

Technika is very small and integrates well with the Firebug command console, which can be used to test and develop your bookmarklets.The extension can be found at www.gnucitizen.org/projects/technika.

If you have Firebug installed you will be able to use Technika bookmarklet constructing features. You can use the Firebug console to test the bookmarklet and make sure that it is working. When you are happy with your code you can easily convert it to a bookmarklet by accessing the Technika menu and selecting Build Bookmarklet.You will be asked to select the folder where you want the bookmarklet to be stored.Type the bookmarklet name and press the OK button. If later you want to modify your bookmarklet, you can select the Technika menu and choose the Load Bookmarklet option. Another useful feature of Technika is that you can set your autorunable bookmarklets on different levels and define the order of their execution.

This mechanism is very similar to initrd booting mechanism on Unix/Linux. For example, if you want to develop a framework that consists of several bookmarklets, you may need to load the core libraries before the actual user scripts.

Tuesday, January 22, 2008

Keeping the Lights On

MANAGING RISK before it manages you

A client in the health service industry was recently amazed to discover that of the 4216 active hosts (IP addresses) discovered in its environment, 1193 (27%) had at least one high risk vulnerability. The organisation is responsible for the funding, management and delivery of public health services to an area containing 1.1 million people, so with a high risk of emerging worms, malware attacks and hacker exploitation indentified, the exisitng situation meant that the confidentiality of patient records and sensitive personal information was at an unacceptable risk. In addition, the character of a number of high risk vulnerabilities increased the likelihood of business disruption.

What about your environment? Have you performed a security risk baseline accross your entire organisation? Is network and system disruption a concern? Are your security controls appropriate to the level of risk faced?

It is likely that your IT environment also contains numerous security weaknesses which may lead to system outage and/or unauthorised access. Other major risks include service disruption and failure to comply with service level agreements, performance degradation, loss of data or system integrity, and exposure of confidential information. These outcomes can have a detrimental effect on your business.

So don't wait until an incident occurs - proactively manage your risks before they manage you!