Mac OS

Apple Mac OS X

el8 Vuln Scan

In the wake of the recent compromise of the ProFTPd distribution
server and the subsequent root-level backdoor that was placed into
the source[0], we are proud to announce a cutting edge source code
scanner that will help you detect backdoors in your code. This code
is free to use for 30 days, after which time you must pay for it.

- ------------- el8 Vuln Scan v.0.1 -------------

#!/bin/bash

###################################################################
#
# Place this script inside the top level directory of your
# source code repo.
#
# Please delete this after 30 days, or purchase a copy from our
# online store.
#
# 50% of all proceeds will go to the victims that have been
# owned by ACIDBITCHES within the past 6 years.
#
###################################################################

# main

export PATH=/bin

grep -r ACIDBITCHES *

- ------------- el8 Vuln Scan v.0.1 -------------

Thank you for helping us to help you make the Internet a safer
place.

[0] http://permalink.gmane.org/gmane.comp.security.ids.snort.emerging-sigs/7965

HTTrack

HTTrack is a free (GPL, libre/free software) and easy-to-use offline browser utility.

It allows you to download a World Wide Web site from the Internet to a local directory, building recursively all directories, getting HTML, images, and other files from the server to your computer. HTTrack arranges the original site's relative link-structure. Simply open a page of the "mirrored" website in your browser, and you can browse the site from link to link, as if you were viewing it online. HTTrack can also update an existing mirrored site, and resume interrupted downloads. HTTrack is fully configurable, and has an integrated help system.

WinHTTrack is the Windows 2000/XP/Vista/Seven release of HTTrack, and WebHTTrack the Linux/Unix/BSD release.

Huge Dictionary File

Just what is stated. A HUGE dictionary file I found while surfing the interwebs.

Hydra

Hydra is a tool that can guess/crack valid login/password pairs extremely quickly. It supports a great deal of protocols. Variant exist both for Windows and Unix.

Currently Hydra supports attack against the following services:

TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, SMB, SMBNT, MS-SQL, MYSQL, REXEC, RSH, RLOGIN, CVS,

SNMP, SMTP-AUTH, SOCKS5, VNC, POP3, IMAP, NNTP, PCNFS, ICQ, SAP/R3, LDAP2, LDAP3, Postgres,

Teamspeak, Cisco auth, Cisco enable, LDAP2, Cisco AAA

Installation:

./configure

make

make install

Pre-requisites:

libssh2

libssh2.so may need to be linked from its installed location to /lib so Hydra detects it when trying to crack ssh.

Creddump

creddump is a python tool to extract various credentials and secrets from Windows registry hives. It currently extracts:

* LM and NT hashes (SYSKEY protected)
* Cached domain passwords
* LSA secrets

It essentially performs all the functions that bkhive/samdump2, cachedump, and lsadump2 do, but in a platform-independent way.

It is also the first tool that does all of these things in an offline way (actually, Cain & Abel does, but is not open source and is only available on Windows).

CMOT

What this tool does, although numerous online resources are available, is enable you to submit MD5 and other hashes to be cracked. This & other tools also exist that allow submission of hashes to multiple resources simultaneously in the hope you will obtain the requisite match to allow you to log in with the broken password.

aiocracker

Simple password cracker that attempts to crack password hashes ( md5, sha1, sha256, sha384, sha512) against any given wordlist.
Pre-requisites: Python

Bing

This is a tool for security researchers. It allows you to search for either an IP address or a DNS name and display all associated domain names known to Bing.

* If a specific IP address is searched, all domain records associated with that address are displayed
* If a DNS name is searched, all domain records associated with all addresses returned for that DNS name are displayed (this case is shown in the screenshot below)

Two separate self-contained versions of the tool are available: command-line-based and GUI-based. The GUI version can be spawned directly from the browser - no installation or additional files are required - just click on the link in Downloads and select Run.

Both versions require the .NET Framework 3.5.

Ovaldi

OVAL's reference interpreter shows how: information can be collected from a computer; definitions can be used to test the system for computer vulnerabilities, configuration issues, programs, and patches; and results of the tests can be presented.

OVAL is an international, information security/community standard that has been designed to:

Promote open and publicly available security content,

Standardise the transfer of this information across the entire spectrum of security tools and services.

OVAL includes a language used to encode system details, and an assortment of content repositories held throughout the community. The language standardises the three main steps of the assessment process:

Representing configuration information of systems for testing;

Analysing the system for the presence of the specified machine state (vulnerability, configuration, patch state, etc.);

Reporting the results of this assessment.

One of the minor drawbacks of using the Mitre OVAL framework is that it is command-line based, which can prove time consuming when scans and updates to the framework need to be performed. SSA has been designed to add a graphical front-end to this process and also provides a great deal more extensibility when utilising the framework in conjunctions with their tool.

Medusa

Medusa is a speedy, massively parallel, modular, login brute-forcer for network services created by the geeks at Foofus.net. It
currently has modules for the following services: AFP, CVS, FTP, HTTP, IMAP, MS-SQL, MySQL, NCP (NetWare), NNTP, PcAnywhere, POP3, PostgreSQL, rexec, rlogin, rsh, SMB, SMTP (AUTH/VRFY), SNMP, SSHv2, SVN, Telnet, VmAuthd, VNC. It also includes a basic web form module and a generic wrapper module for external scripts.

While Medusa was designed to serve the same purpose as THC-Hydra, there are several significant differences. For a brief comparison, see:

http://www.foofus.net/jmk/medusa/medusa-compare.html

Syndicate content