Showing posts with label Tools. Show all posts
Showing posts with label Tools. Show all posts

NMap New Version 7.70 Released With Hundred of New OS And Service Fingerprints, 9 New NSE Scripts

NMap New Version 7.70 Released With Hundreds of New OS And Service Fingerprints

NMap New Version 7.70 Released With Hundred of New OS And Service Fingerprints


Nmap unfastened protection Scanner, Port Scanner, & network Exploration device. down load open source software for Linux, home windows, UNIX, FreeBSD, and so forth.



It consists of hundreds of latest OS and carrier fingerprints, nine new NSE scripts (for a total of 588), a miles-advanced model of our Npcap windows packet taking pictures library/motive force, and service detection improvements to make -sV quicker and greater accurate. 



and people are just a few of the dozens of improvements defined below.


Nmap 7.70 source code and binary programs for Linux, windows, and Mac are to be had for free



in case you locate any bugs in this launch, please let us understand on the Nmap Dev listing or trojan horse tracker as described at https://nmap.org/e-book/man-insects.html.



here is the entire listing of great changes in NMAP:


• [Windows] We made a ton of enhancements to our Npcap windows packet capturing library (https://nmap.org/npcap/) for greater performance and stability, as well as smoother installer and better 802.eleven uncooked framecapturing help. Nmap 7.70 updates the bundled Npcap from model zero.93 to zero.ninety nine-r2, along with a majority of these modifications from the remaining seven Npcap releases:

https://nmap.org/npcap/changelog



• included all of your service/model detection fingerprints submitted from March 2017 to August 2017 (728 of them). The signature count number went up 1.02% to eleven,672, such as 26 new softmatches.  We now stumble on 1224 protocols from filenet-pch, lscp, and netassistant to sharp-faraway, urbackup, and watchguard.  we will try and integrate the ultimate submissions in the subsequent launch.



• integrated all your IPv4 OS fingerprint submissions from September 2016 to August 2017 (667 of them). brought 298 fingerprints, bringing the brand new general to five,652. Additions include iOS 11, macOS Sierra, Linux four.14, Android 7, and greater.



• incorporated all 33 of your IPv6 OS fingerprint submissions from September 2016 to August 2017. New groups for OpenBSD 6.zero and FreeBSD eleven.0 were added, as well as bolstered businesses for Linux and OS X.



• added the --solve-all choice to solve and experiment all IP addresses of a bunch.  This basically replaces the resolveall NSE script. [Daniel Miller]



• [NSE][SECURITY] Nmap developer nnposter found a protection flaw (directory traversal vulnerability) inside the way the non-default http-fetch script sanitized URLs. If a consumer manualy ran this NSE script in opposition to a malicious internet server, the server should probably (relying on NSE arguments used) cause documents to be stored outdoor the supposed destination directory. present documents could not be overwritten.  We fixed http-fetch, audited our different scripts to make certain they didn't make this mistake, and updated the httpspider library API to protect towards this through default. [nnposter, Daniel Miller]



• [NSE] introduced 9 NSE scripts, from eight authors, bringing the whole as much as 588! they may be all indexed at https://nmap.org/nsedoc/, and the summaries are underneath:



   - deluge-rpc-brute performs brute-force credential checking out towards

   Deluge BitTorrent RPC offerings, using the brand new zlib library. [Claudiu Perta]

   - hostmap-crtsh lists subdomains by using querying Google's certificate

   Transparency logs. [Paulino Calderon]

   - [GH#892] http-bigip-cookie decodes unencrypted F5 big-IP cookies and

   reports returned the IP cope with and port of the actual server in the back of the

   load-balancer. [Seth Jackson]

   - http-jsonp-detection attempts to discover JSONP endpoints in net

   servers. JSONP endpoints may be used to pass equal-foundation coverage

   regulations in web browsers. [Vinamra Bhatia]

   - http-trane-data obtains records from Trane Tracer SC controllers

   and connected HVAC devices. [Pedro Joaquin]

   - [GH#609] nbd-info makes use of the new nbd.lua library to question community Block

   devices for protocol and record export information. [Mak Kolybabi]

   - rsa-vuln-roca exams for RSA keys generated via Infineon TPMs

   vulnerable to return Of Coppersmith attack (ROCA) (CVE-2017-15361). tests

   SSH and TLS offerings. [Daniel Miller]

   - [GH#987] smb-enum-offerings retrieves the listing of offerings jogging on a

   remote windows device. current windows systems requires a privileged area

   account for you to list the offerings. [Rewanth Cool]

   - tls-alpn checks TLS servers for utility Layer Protocol Negotiation

   (ALPN) aid and reviews supported protocols. ALPN in large part replaces NPN,

   which tls-nextprotoneg was written for. [Daniel Miller]



• [GH#978] fixed Nsock on home windows giving errors while deciding on on STDIN.

This turned into inflicting Ncat 7.60 in connect mode to stop with errors: libnsock select_loop(): nsock_loop mistakes 10038: An operation turned into attempted on something that is not a socket.  [nnposter]



• [Ncat][GH#197][GH#1049] fix --ssl connections from losing on renegotiation, the same trouble that was partly fixed for server mode in [GH#773]. mentioned on home windows with -e through pkreuzt and vinod272. [Daniel

Miller]



• [NSE][GH#1062][GH#1149] some adjustments to brute.lua to higher handle misbehaving or rate-restricting services. most importantly, brute.killstagnated now defaults to true. way to xp3s and Adamtimtim for reporing infinite loops and presenting adjustments.



• [NSE] VNC scripts now guide Apple far off laptop authentication (auth kind 30) [Daniel Miller]



• [NSE][GH#1111] restoration a script crash in ftp.lua when PASV connection timed out. [Aniket Pandey]

• [NSE][GH#1114] update bitcoin-getaddr to receive more than one response message, for the reason that first message commonly most effective has one deal with in it. [h43z]



• [Ncat][GH#1139] Ncat now selects the appropriate default port for a given proxy kind. [Pavel Zhukov]



• [NSE] memcached-info can now acquire records from the UDP memcached carrier similarly to the TCP carrier. The UDP carrier is frequently used as a DDoS reflector and amplifier. [Daniel Miller]



• [NSE][GH#1129] changed url.absolute() behavior with recognize to dot and dot-dot course segments to conform with RFC 3986, phase five.2. [nnposter]



• eliminated deprecated and undocumented aliases for numerous lengthy alternatives that used underscores instead of hyphens, which includes --max_retries. [Daniel Miller]



• advanced service experiment's remedy of gentle matches in  approaches. to start with, any probes that could bring about a complete healthy with the gentle matched carrier will now be despatched, regardless of rarity. This improves the chances of matching uncommon offerings on non-standard ports.  2d, probes at the moment are skipped if they do not incorporate any signatures for the gentle matched provider.



Perviously the probes could still be run as long as the goal port range matched the probe's specification.  collectively, those changes have to make service/model detection quicker and extra accurate.  For greater information on how it works, see https://nmap.org/book/vscan.html. [Daniel Miller]



• --model-all now turns off the soft fit optimization, ensuring that each one probes virtually are despatched, despite the fact that there aren't any current fit lines for the softmatched provider. this is slower, but gives the maximum comprehensive effects and produces higher fingerprints for submission.

[Daniel Miller]



• [NSE][GH#1083] New set of Telnet softmatches for version detection based totally on Telnet DO/do not alternatives supplied, protecting a huge variety of devices and working structures. [D Roberson]



• [GH#1112] Resolved crash possibilities resulting from surprising libpcap version string format. [Gisle Vanem, nnposter]



• [NSE][GH#1090] restore false positives in rexec-brute with the aid of checking responses for indicators of login failure. [Daniel Miller]



• [NSE][GH#1099] fix http-fetch to preserve downloaded documents in separate vacation spot directories. [Aniket Pandey]



• [NSE] introduced new fingerprints to http-default-money owed:

+ Hikvision DS-XXX community digicam and NUOO DVR [Paulino Calderon]

+ [GH#1074] ActiveMQ, Purestorage, and Axis network Cameras [Rob

Fitzpatrick, Paulino Calderon]



• brought a new provider detection fit for WatchGuard Authentication Gateway. [Paulino Calderon]



• [NSE][GH#1038][GH#1037] Script qscan become now not looking at interpacket delays

(parameter qscan.postpone). [nnposter]



• [NSE][GH#1046] Script http-headers now fails nicely if the goal does not return a valid HTTP reaction. [spacewander]



• [Ncat][Nsock][GH#972] eliminate RC4 from the listing of TLS ciphers used by default, according with RFC 7465. [Codarren Velvindron]



• [NSE][GH#1022] restore a false fine circumstance in ipmi-cipher-0 resulting from now not checking the error code in responses. Implementations which go back

an mistakes are not susceptible. [Juho Jokelainen]



• [NSE][GH#958]  new libraries for NSE.

   - idna - aid for internationalized domains in programs

   (IDNA)

   - punycode (a switch encoding syntax used in IDNA) [Rewanth Cool]



• [NSE] New fingerprints for http-enum:

   - [GH#954] Telerik UI CVE-2017-9248 [Harrison Neal]

   - [GH#767] Many WordPress version detections [Rewanth Cool]



• [GH#981][GH#984][GH#996][GH#975] fixed Ncat proxy authentication troubles [nnposter]:



   - Usernames and/or passwords could not be empty

   - Passwords couldn't contain colons

   - SOCKS5 authentication was now not well documented

   - SOCKS5 authentication had a memory leak



• [GH#1009][GH#1013] Fixes to autoconf header documents to permit autoreconf to be run. [Lukas Schwaighofer]



• [GH#977] stepped forward DNS service model detection coverage and consistency by way of the use of data from a undertaking Sonar internet huge survey. Numerouse false positives were eliminated and reliable softmatches added. fit strains for version.bind responses were additionally conslidated the usage of the approach underneath.

[Tom Sellers]



• [GH#977] modified version probe fallbacks in order to paintings pass protocol (TCP/UDP). This permits consolidating in shape lines for services wherein the responses on TCP and UDP are similar. [Tom Sellers]



• [NSE][GH#532] brought the zlib library for NSE so scripts can easily deal with compression. This paintings started at some stage in GSOC 2014, so we're mainly pleased to ultimately integrate it! [Claudiu Perta, Daniel Miller]



• [NSE][GH#1004] constant handling of brute.retries variable. It was being treated because the number of tries, no longer retries, and a fee of zero would result in endless retries. instead, it's miles now the variety of retries, defaulting to two (three general attempts), with out a alternative for infinite retries.



• [NSE] http-devframework-fingerprints.lua supports Jenkins server detection and returns more records when Jenkins is detected [Vinamra Bhatia]



• [GH#926] The rarity stage of MS sq.'s carrier detection probe turned into reduced. Now we will discover MS square in abnormal ports with out increasing version intensity. [Paulino Calderon]



• [GH#957] restore reporting of zlib and libssh2 variations in "nmap --version". We were continually reporting the model wide variety of the included supply, even if a distinct model turned into certainly linked. [Pavel Zhukov]



• upload a brand new helper function for nmap-carrier-probes in shape traces: $I(1,">") will unpack an unsigned big-endian integer value up to 8 bytes wide from capture 1. the second option may be "<" for little-endian. [Daniel Miller]



experience this new launch and please do allow us to know if you find any troubles!



download hyperlink: https://nmap.org/download.html

Keylogger Tutorial



Keylogger Tutorial

Keylogger monitor the keys typed in a user can easily find user passwords and other information a user may not wish others to know about.
Keyloggers, as a surveillance tool, are often used by employers to ensure employees use work computers for business purposes only. Unfortunately, keyloggers can also be embedded in spyware allowing your information to be transmitted to an unknown third party.
About keyloggers
key loggersA keylogger is a program that runs in the background, recording all the keystrokes. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped raw to the attacker. The attacker then peruses them carefully in the hopes of either finding passwords, or possibly other useful information that could be used to compromise the system or be used in a social engineering attack. For example, a keylogger will reveal the contents of all e-mail composed by the user. Keylogger is commonly included in rootkits.
A keylogger normally consists of two files: a DLL which does all the work and an EXE which loads the DLL and sets the hook. Therefore when you deploy the hooker on a system, two such files must be present in the same directory.
There are other approaches to capturing info about what you are doing.
* Some keyloggers capture screens, rather than keystrokes.
* Other keyloggers will secretly turn on video or audio recorders, and transmit what they capture over your internet connection.
A keyloggers might be as simple as an exe and a dll that are placed on a machine and invoked at boot via an entry in the registry. Or a keyloggers could be which boasts these features:
* Stealth: invisible in process list
* Includes kernel keylogger driver that captures keystrokes even when user is logged off (Windows 2000 / XP)
* ProBot program files and registry entries are hidden (Windows 2000 / XP)
* Includes Remote Deployment wizard
* Active window titles and process names logging
* Keystroke / password logging
* Regional keyboard support
* Keylogging in NT console windows
* Launched applications list
* Text snapshots of active applications.
* Visited Internet URL logger
* Capture HTTP POST data (including logins/passwords)
* File and Folder creation/removal logging
* Mouse activities
* Workstation user and timestamp recording
* Log file archiving, separate log files for each user
* Log file secure encryption
* Password authentication
* Invisible operation
* Native GUI session log presentation
* Easy log file reports with Instant Viewer 2 Web interface
* HTML and Text log file export
* Automatic E-mail log file delivery
* Easy setup & uninstall wizards
* Support for Windows (R) 95/98/ME and Windows (R) NT/2000/XP

Tools:
Ardamax Keylogger is a keystroke recorder that captures user’s activity and saves it to an encrypted log file. The log file can be viewed with the powerful Log Viewer. Use this tool to find out what is happening on your computer while you are away, maintain a backup of your typed data automatically or use it to monitor your kids. Also you can use it as a monitoring device for detecting unauthorised access. Logs can be automatically sent to your e-mail address, access to the keylogger is password protected. Besides, Ardamax Keylogger logs information about the Internet addresses the user has visited.

This invisible spy application is designed for 2000, XP, 2003, Vista and Windows 7.
  • Security – allows you to protect program settings, Hidden Mode and Log file.
  • Application monitoring – keylogger will record the application that was in use that received the keystroke!
  • Time/Date tracking – it allows you to pinpoint the exact time a window received a keystroke!
  • Powerful Log Viewer – you can view and save the log as a HTML page or plain text with keylogger Log Viewer.
  • Small size – Ardamax Keylogger is several times smaller than other programs with the same features. It has no additional modules and libraries, so its size is smaller and the performance is higher.
  • Ardamax Keylogger fully supports Unicode characters which makes it possible to record keystrokes that include characters from Japanese, Chinese, Arabic and many other character sets.
  • It records every keystroke. Captures passwords and all other invisible text.
Other Features:
  • Windows 2000/2003/XP/Vista/Windows 7 support
  • Monitors multi-user machines
  • Automatic startup
  • Friendly interface
  • Easy to install

Perfect Keylogger for Windows 98/2000/XP/Vista and Windows 7
The latest, improved and most stealth version of Perfect Keylogger is now available only after purchase. To protect the product from abuse and improve its quality for the registered users, we no longer offer the trial version of the latest builds. The localized versions of Perfect Keyloger and 64-bit version are also available after purchase. The last public version is still available, but keep in mind that it’s not the latest and may be flagged by security software.


Damn Small SQLi Scanner (DSSS): A Fully Functional SQL Injection Vulnerability Scanner

Damn Small SQLi Scanner (DSSS): A Fully Functional SQL Injection Vulnerability Scanner

Damn Small SQLi Scanner (DSSS): A Fully Functional SQL Injection Vulnerability Scanner 




As of optional settings it supports HTTP proxy together with HTTP header values User-Agent, Referer and Cookie.

Sample runs

$ python dsss.py -h
Damn Small SQLi Scanner (DSSS) < 100 LoC (Lines of Code) #v0.2o
by: Miroslav Stampar (@stamparm)

Usage: 

dsss.py [options]

Options:

  --version          show program's version number and exit
  -h, --help         show this help message and exit
  -u URL, --url=URL  Target URL (e.g. "http://www.target.com/page.php?id=1")


--data=DATA        POST data (e.g. "query=test")
  --cookie=COOKIE    HTTP Cookie header value
  --user-agent=UA    HTTP User-Agent header value
  --referer=REFERER  HTTP Referer header value
  --proxy=PROXY      HTTP proxy address (e.g. "http://127.0.0.1:8080")
$ python dsss.py -u "http://testphp.vulnweb.com/artists.php?artist=1"
Damn Small SQLi Scanner (DSSS) < 100 LoC (Lines of Code) #v0.2o
 by: Miroslav Stampar (@stamparm)

* scanning GET parameter 'artist'
 (i) GET parameter 'artist' could be error SQLi vulnerable (MySQL)
 (i) GET parameter 'artist' appears to be blind SQLi vulnerable (e.g.: 'http://t
estphp.vulnweb.com/artists.php?artist=1%20AND%2061%3E60')

scan results: possible vulnerabilities found

Requirements

Python version 2.6.x or 2.7.x is required for running this program.

Download DSSS

NILI: A Tool For Network Scan, Man in the Middle, Protocol Reverse Engineering And Fuzzing

NILI: A Tool For Network Scan, Man in the Middle, Protocol Reverse Engineering And Fuzzing


NILI: A Tool For Network Scan, Man in the Middle, Protocol Reverse Engineering And Fuzzing



Installing


Here is some Instructions for Installing Prerequisites, Select Proper Instructions for your Operating System.

Unix-like

1- Install Python3 and pip:

$ sudo apt-get install python3
$ sudo apt-get install python3-pip

2- Install Scapy:

$ cd /tmp
$ git clone https://github.com/phaethon/scapy

$ cd scapy
$ sudo python3 setup.py install

3- Install Netzob:

$ git clone https://dev.netzob.org/git/netzob
$ cd ./netzob/
$ sudo apt-get install python3 python3-dev python3-setuptools build-essential
$ python3 setup.py install
$ python3 -m pip install bintrees --upgrade


Windows

1- Install python3

2- Install Scapy:

2-1- Install Winpcap
2-2- Install Scapy3k

python -m pip install scapy-python3

3- Install Netzob

Download


SweetSecurity - Network Security Monitoring on Raspberry Pi Type Devices

SweetSecurity - Network Security Monitoring on Raspberry Pi Type Devices


SweetSecurity - Network Security Monitoring on Raspberry Pi Type Devices


Scripts to setup and install Bro IDS, Elasticsearch, Logstash, Kibana, and Critical Stack on any device.


Installation:


sudo python setup.py

Follow prompts to enter appropriate information for chosen installation type

Installation Types

  • Full Install: This will install Bro IDS, Critical Stack (optional), Logstash, Elasticsearch, Kibana, Apache, and Sweet Security Client/Server. Choose this option ONLY if you have 2GB of memory or more.
  • Sensor Only: This will install Bro IDS, Critical Stack (optional), Logstash, and Sweet Security Client
  • Web Server Only: This will install Elasticsearch, Kibana, Apache, and Sweet Security Server

New Functionality:


  • Modularized Installation - Choose to deploy all the tools on one device, or split among multiple for better performance.


  1. Full Install - Deploy Bro IDS, Critical Stack, Elasticsearch, Logstash, Kibana, Apache, and Sweet Security
  2. Sensor Install - Deploy Bro IDS, Critical Stack, Logstash, and Sweet Security
  3. Web Admin Install - Deploy Elasticsearch, Kibana, and Apache
  • ARP Spoofing - Full code to monitor all network traffic out of the box without network changes.
  • Complete Bro Log Support - All Bro log files are now normalized by Logstash
  • Kibana Content - Searches, Visualizations, and Dashboards are now included
  • Architecture Support - Now supports installing on non ARM architectures
  • Custom NMAP Pre-Fix - updated NMAP pre-fixes based on the IEEE OUI list
  • Web Administration - apache/flask based web administration to manage known devices and system health

Prerequisites

Most of the dependencies will be installed during installation. However you will need to make sure these are followed before trying to install the code.

Supported Operating Systems

  • Raspbian Jessie
  • Debian Jessie
  • Ubuntu 16.04

Supported Hardware

  • RaspberryPi 3
  • x86
  • x86_64

System Requirements

  • ARM, x86, or x86_64 CPU
  • 2GB RAM
  • 8GB Disk Storage
  • 100 MB NIC (Recommended 1GB) Note: 2GB of storage is required while the Raspberry Pi 3 only has 1GB. The code can be split to run on two devices, such as two Raspberry Pi's or a Raspberry Pi and AWS.

Fixes:


  • Optimized Logstash Config
  • Updated Bro IDS to 2.5.1
  • Updated Logstash to version 5.5.1
  • Updated Elasticsearch to version 5.5.1
  • Update kibana to version 5.5.1


Download SweetSecurity
RastLeak Tool To Automatic Leak Information Using Hacking With Search Engine

RastLeak Tool To Automatic Leak Information Using Hacking With Search Engine

RastLeak: Tool to automatic leak information using Hacking with Search Engines

How to install

Install requirements with:

pip install -r requirements.txt

#How to use:

python rastleak.py

The last stable version is rastleak.py

$python rastleak.py -h

Usage: rastleak.py [-h] -d DOMAIN -o OPTION -n SEARCH -e EXT [-f EXPORT]

This script searchs files indexed in the main searches of a domain to detect a possible leak information

Optional Arguments:


-h, --help show this help message and exit

-d DOMAIN, --domain DOMAIN


The domain which it wants to search

-o OPTION, --option OPTION

                    Indicate the option of search
                  
                     1.Searching leak information into the target
                     2.Searching leak information outside target

-n SEARCH, --search SEARCH

                    Indicate the number of the search which you want to do

-e EXT, --ext EXT Indicate the option of display:

                     1-Searching the domains where these files are found
                     2-Searching ofimatic files

-f EXPORT, --export EXPORT

                    Indicate the type of format to export results.
                  
                     1.json (by default)
                     2.xlsx              

Download RastLeak

Popular Posts