lunes, 31 de agosto de 2020

Web-fu - The Ultimate Web Hacking Chrome Extension

Web-fu Is a web hacking tool focused on discovering and exploiting web vulnerabilitites.

 BROWSER INTEGRATION 

This tool has many advantages, as a browser-embedded webhacking tool, is very useful for scanning browser-authenticated applications, if browser can authenticate and access to the web application, the tool also can. Note that some other tools do not support neither certificate authentication nor web vpn accesses.
The integration with chrome, provides a more comfortable and agile way of web-hacking, and you have all the application data loaded on the hacking tool, you don't need to copy the url, cookies, etc. to the tool, just right click and hack.
The browser rendering engine is also used in this tool, to draw the html of the responses.


 FALSES POSITIVES 

When I coded this tool, I was obsessed with false positives, which is the main problem in all detection tools.  I have implemented a gauss algorithm, to reduce the faslse positives automatically which works very very well, and save a lot of time to the pentester.


 VIDEO 

 Here is a video, with some of the web-fu functionalitites:

 VISUAL FEATURES 

This tool has a visual crawler. Normal crawlers doesn't parse the ajvascript, this tool does. The visual crawler loads each link of the web site, rendering the html and executing all the javascript as a normal load, then the links are processed from he DOM and clicked.
A visual form cracker, is also available, althow is experimental and only works on some kind of forms.


 SCANNING FEATURES

The web-fu's portscanner, has a database of a common web ports, like 80,81,8080 and so on.
The cracker module, can bruteforce web directories to find new attack vectors, and can fuzz get and post parameters for discovering vulns, and also crack passwords. There are 9 preloaded wordlists, and you can also load a custom wordlist. Prefilters, falsepositive reductor and render will be helpful. The scanners support SSL, if the website can be loaded in the chrome, can be scanned by web-fu.


ENCODERS & DECODERS

The supported encoders and decoders are: base64, urlescape and urlencode


OTHER FEATURES

A web notepad is available, saving the information on the browser localStorage, there is one notepad per site. A cookie editor is also very useful for pentesting. The inteceptor, is like a web proxy but from the inside of the browser, you can intercept a request There is also a session locker and a exploit web search.


CHROME STORE 
Here is the link to the chrome store, the prize is about one euro, very cheap if you compare with other scanners: Web-Fu on Chrome Store


 With webfu, you will do the best web site pentest and vulnerability assessment.


Related articles


  1. Beginner Hacker Tools
  2. Hack Tools Github
  3. Kik Hack Tools
  4. What Is Hacking Tools
  5. Hacking Tools
  6. Hacking Tools Mac
  7. Hacking Tools
  8. Pentest Recon Tools
  9. Hack App
  10. Hacker Tools Mac
  11. Growth Hacker Tools
  12. Hack And Tools
  13. Pentest Tools Website Vulnerability
  14. Pentest Box Tools Download
  15. Hacker Tools 2020
  16. Pentest Tools Linux
  17. Hack Tools For Pc
  18. Hack Tools For Mac
  19. Pentest Tools
  20. Hacking Tools And Software
  21. Pentest Tools For Android
  22. Pentest Tools Tcp Port Scanner
  23. Hack Tools For Ubuntu
  24. Hacking Tools For Windows
  25. Hacker Security Tools
  26. Pentest Tools Review
  27. Install Pentest Tools Ubuntu
  28. Hacking Tools Online
  29. Hacking Tools 2020
  30. Nsa Hack Tools Download
  31. Hacker Hardware Tools
  32. Pentest Tools For Mac
  33. Pentest Automation Tools
  34. Hacking Tools For Windows Free Download
  35. Pentest Tools Framework
  36. Physical Pentest Tools
  37. Pentest Tools Download
  38. Hacking Tools Github
  39. Pentest Tools Apk
  40. Hacking Apps
  41. How To Make Hacking Tools
  42. Tools Used For Hacking
  43. Growth Hacker Tools
  44. Hacking Tools Mac
  45. Pentest Tools Open Source
  46. Physical Pentest Tools
  47. Top Pentest Tools
  48. Hacker Tools Free
  49. New Hacker Tools
  50. Pentest Tools Linux
  51. Physical Pentest Tools
  52. Hack Tools For Windows
  53. Pentest Tools Tcp Port Scanner
  54. Hacking Tools For Games
  55. Beginner Hacker Tools
  56. Hack Tools For Pc
  57. Kik Hack Tools
  58. Kik Hack Tools
  59. Termux Hacking Tools 2019
  60. Pentest Tools Framework
  61. Kik Hack Tools
  62. Beginner Hacker Tools
  63. Hack Apps
  64. Nsa Hack Tools
  65. Pentest Tools Windows
  66. Pentest Tools Subdomain
  67. Hack Tools For Ubuntu
  68. Hacking Tools Free Download
  69. Pentest Tools Kali Linux
  70. Tools Used For Hacking
  71. Hack Tools Github
  72. New Hack Tools
  73. Bluetooth Hacking Tools Kali
  74. Bluetooth Hacking Tools Kali
  75. Pentest Tools Review
  76. Top Pentest Tools
  77. Pentest Tools
  78. Hacking Apps
  79. Hacker Tools
  80. Hacking Tools And Software
  81. Pentest Tools Url Fuzzer
  82. Pentest Tools For Mac
  83. How To Make Hacking Tools
  84. Hacking Tools Free Download
  85. Hack Tool Apk
  86. Hack App
  87. Pentest Tools For Ubuntu
  88. Hacking Tools For Kali Linux
  89. Pentest Tools For Mac
  90. Hacker Techniques Tools And Incident Handling
  91. Hacker Tools For Windows
  92. Hacker Tools 2020
  93. Computer Hacker
  94. Hack Tools
  95. Pentest Tools Tcp Port Scanner
  96. Pentest Tools For Mac
  97. Hacker Tools Free Download
  98. Pentest Tools Free
  99. Android Hack Tools Github
  100. Hacker Tools Online
  101. Hacking Tools For Pc
  102. Hack Tool Apk
  103. Tools For Hacker
  104. Top Pentest Tools
  105. How To Install Pentest Tools In Ubuntu
  106. Hacking Tools Free Download
  107. Hack Tools For Windows
  108. Pentest Box Tools Download
  109. Hacker Tools Linux
  110. Hacker Tools Mac
  111. Hack Tool Apk No Root
  112. Hacking Tools Windows
  113. Pentest Tools Apk
  114. Underground Hacker Sites
  115. Hack Tool Apk
  116. Wifi Hacker Tools For Windows

domingo, 30 de agosto de 2020

Galileo - Web Application Audit Framework

Related articles


Top 15 Best Operating System Professional Hackers Use

Top 10 Best Operating System Professional Hackers Use

Top 15 Best Operating System Professional Hackers Use

Top 15 Best Operating System Professional Hackers Use

A hacker is someone who seeks and exploits the weaknesses of a computer system or network computing. Hackers may be motivated by a multitude of reasons, such as profit, protest, challenge, enjoyment or to assess these weaknesses to help in removing them.
The listed operating systems are based on the Linux kernel so it is all free operating systems.

1. Kali Linux

Kali Linux maintained and funded by Offensive Security Ltd. and it is first on our list. Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It was developed by Mati Aharoni and Devon Kearns of Offensive Security through rewriting BackTrack, its previous forensics Linux distribution based on Ubuntu. Kali Linux has a specific project for the withdrawal of compatibility and portability of Android-specific devices, called Kali Linux NetHunter. It is the first open test platform penetration Source for Nexus Android devices, created as a joint effort between the member of the Kali "BinkyBear" Security and offensive community. It supports Wireless 802.11 frame injection, one-click configurations MANA Evil access point, keyboard HID (Teensy as attacks), as well as attacks MITM USB Mala.

2. Back Box

Back Box is an evaluation penetration testing Linux distribution and Ubuntu-based security aimed at providing an analysis of computer network systems and toolkit. Desktop environment back box includes a complete set of tools needed for ethical hacking and security testing.

3. Parrot Security OS

Parrot Security OS is a GNU / Linux distribution based on Debian. Fue built in order to perform penetration tests (safety information), vulnerability assessment and mitigation, Computer Forensics and Anonymous Surfing. Ha been developed by the team of Frozen box.
Parrot is based on the stable branch (Jessie) of Debian, a Linux 4.1 kernel hardened customized with a branch grsecurity patched available. The desktop environment is MATE fork of Gnome 2, and the default display manager is LightDM. The project is certified to run on machines with 265MB of RAM minimum follow and it is suitable for both 32-bit (i386) and 64-bit (amd64), with a special edition that works on 32-bit machines of age (486). Moreover, the project is available for Armel and armhf architectures. It even offers an edition (both 32 bit and 64 bit) developed for servers only for pen testing cloud.

4. Live Hacking OS

Live Hacking OS is a Linux distribution packed with tools and utilities for ethical hacking, penetration testing, and countermeasure verification. It includes embedded GUI GNOME user. There is a second variation available which has only the command line and requires much fewer hardware requirements.

5. DEFT Linux

DEFT stands for Digital Evidence and Forensic Toolkit and it is a distribution of Linux open source software built around the DART (Toolkit for Advanced Response Digital) and is based on the Ubuntu operating system. It has been designed from scratch to offer some of the best computer forensics open source and incident response tools that can be used by individuals, IT auditors, investigators, military, and police.

6. Samurai Web Testing Framework

The Samurai Web Testing Framework is a live Linux environment which has been pre-configured to function as a web pen-testing environment. The CD contains the best of open source and free tools that focus on testing and websites that attack. In the development of this environment, it is based on our selection of tools that we use in our practice of security. Hence, it includes the tools that were used in the four steps of a pen-test web.

7. Network Security Toolkit

The Network Security Toolkit (NST) is a Live CD based on Linux that provides a set of security tools computing and open source network to carry out routine security tasks and diagnostic networks and tracing. The distribution can be used as an analysis of network security, validation and monitoring tool for servers hosting virtual machines. NST has management capabilities similar to Fedora packages and maintains its own repository of additional packages.

8. Bugtraq

Bugtraq is a mailing list dedicated to safety issues in computers. On-topic issues new discussions about vulnerabilities, security-related notices providers, operating methods, and how to fix them. This is a mailing list of large volume, and almost all new vulnerabilities are there. Bugtraq computer freaks and experienced developers are discussed, is available in Debian, Ubuntu and openSUSE 32 and 64-bit architectures.

9. NodeZero

NodeZero is an open source system based on the operating core derived from the most popular Linux distribution in the world, Ubuntu, and designed to be used for penetration testing operations. The distribution can be downloaded as an ISO image live DVD, which will also take place on computers that support both 32-bit (x86) and 64-bit (x86_64) instruction set. Besides the fact that it allows you to start the live system, start menu contains several advanced features such as the ability to perform a diagnostic test of system memory, boot from local disk options, start the installer directly and to start in safe graphics mode, text mode or in debug mode.
Default graphical desktop environment NodeZero is powered by GNOME, which uses the classic GNOME interface. It has a design of two panels and uses the default software repositories of Ubuntu.

10. Pentoo

Pentoo is a Live CD and Live USB OS designed for penetration testing and security assessment. It is based on Gentoo Linux, Pentoo is offered both as 32-bit and 64-bit live cd which is installable. Pentoo is also available as a superposition of an existing Gentoo installation. It has conductors packet injection patched wifi, GPGPU cracking software, and plenty of tools for penetration testing and security assessment. The kernel includes Pentoo grsecurity and PAX hardening and additional patches with the binary compiled from a string of hardened with the latest nightly versions of some tools that are available.

#11 Live Hacking OS

Well, this Linux distro actually comes with some useful hacking tools which are often used in penetration testing or ethical hacking purpose. Live Hacking OS consists of the GNOME inbuilt. The operating system is really easy to operate and it can work on less RAM.

#12 Knoppix STD

This is another best Linux distro which focuses on tools for computer security. Knoppix STD brings some advanced tools for Password cracking, Firewalls, Network Utilities, Honeypots, Wireless Networking and more. This is one of the most used operating systems for Hackers.

#13 Cyborg Hawk

Cyborg Hawk is a new operating system which is based on Ubuntu Linux. Well, lots of hackers talk about Cyborg hawk and its one of the most powerful and cutting-edge penetration testing distribution that has ever been created. The operating system houses more than 700 tools for different purposes.

#14 Blackbuntu

Well, this is another operating system which is based on Linux and it was specially developed for penetration testing. Well, the operating system is very famous amongst hackers and it offers an awesome platform to learn Information security.

#15 Weakerth4n

Well, this is another best operating system which is used by professional hackers. WeakerTh4n actually comes with lots of hacking tools and it's actually a modern operating system for WiFi Hacking. Some of the wireless tools include SQL Hacking, Password Cracking, WiFi attacks, Cisco exploitation and more.
Related word
  1. Pentest Tools Tcp Port Scanner
  2. Hackrf Tools
  3. Computer Hacker
  4. Hacker Tools
  5. Pentest Tools For Ubuntu
  6. Hacker Tools For Mac
  7. What Is Hacking Tools
  8. Hack Tools For Ubuntu
  9. Hack App
  10. Hacking Tools Download
  11. Hacking Tools 2020
  12. Hack And Tools
  13. Pentest Tools Android
  14. Hack Tool Apk No Root
  15. Hack Apps
  16. Hacking Tools For Windows
  17. Hack Tools For Pc
  18. Hacking Tools For Windows 7
  19. Pentest Reporting Tools
  20. Hacking Tools Name
  21. Best Hacking Tools 2020
  22. Hacking Tools For Games
  23. Hacker
  24. Hacker Search Tools
  25. Pentest Tools Linux
  26. What Are Hacking Tools
  27. Hack Tools Pc
  28. Hacking Tools For Games
  29. Pentest Tools Kali Linux
  30. Best Pentesting Tools 2018
  31. Hacking Tools For Windows 7
  32. Github Hacking Tools
  33. Github Hacking Tools
  34. Pentest Tools Port Scanner
  35. Hacker Tools For Mac
  36. Hacking Tools Windows 10
  37. Termux Hacking Tools 2019
  38. Hacking Tools Pc
  39. Android Hack Tools Github
  40. Best Hacking Tools 2020
  41. Hacking App
  42. Hacker Tools For Ios
  43. Hacker Tools 2019
  44. Hacking Tools 2020
  45. Hackers Toolbox
  46. Tools For Hacker
  47. Hacking Tools Kit
  48. Hacker Tools Free
  49. Pentest Tools Website Vulnerability
  50. Hacking Tools Github
  51. Pentest Tools Apk
  52. Hacking Tools For Mac
  53. Hacking Tools 2019
  54. What Is Hacking Tools
  55. Pentest Tools Kali Linux
  56. Best Hacking Tools 2019
  57. New Hack Tools
  58. Hacker Tools Software
  59. Hacking Tools Free Download
  60. Pentest Tools Bluekeep
  61. Hacking Tools For Kali Linux
  62. Pentest Tools Alternative
  63. Hack Tools
  64. Hacker Tool Kit
  65. Hacker Tool Kit
  66. Hack Tools Pc
  67. Hacker Tools 2019
  68. Hacker Tools Free Download
  69. Best Hacking Tools 2019
  70. How To Install Pentest Tools In Ubuntu
  71. Hack Tools Github
  72. Hacking Tools Hardware
  73. Pentest Tools Online
  74. Hacking App
  75. Pentest Tools Tcp Port Scanner
  76. Hacking App
  77. Pentest Tools Linux
  78. Pentest Tools Open Source
  79. Nsa Hacker Tools
  80. Best Hacking Tools 2020
  81. Hacking Tools For Games
  82. Pentest Tools Bluekeep
  83. Hack Tools Download
  84. New Hack Tools
  85. Pentest Tools Online
  86. Hack Tool Apk No Root
  87. Hacking Tools For Beginners
  88. Pentest Tools Download
  89. Pentest Automation Tools
  90. Easy Hack Tools
  91. Best Hacking Tools 2019
  92. Free Pentest Tools For Windows
  93. Tools Used For Hacking
  94. Hacker Tools For Mac
  95. Hack Tool Apk
  96. Pentest Box Tools Download
  97. Hacker Tools Hardware
  98. Hacker Tools
  99. Best Hacking Tools 2020
  100. Pentest Tools Android
  101. Pentest Tools Open Source
  102. Easy Hack Tools
  103. Github Hacking Tools
  104. Bluetooth Hacking Tools Kali
  105. Pentest Tools Nmap
  106. How To Install Pentest Tools In Ubuntu

sábado, 29 de agosto de 2020

Kali Linux 2018.3 Release - Penetration Testing And Ethical Hacking Linux Distribution



Kali 2018.3 brings the kernel up to version 4.17.0 and while 4.17.0 did not introduce many changes, 4.16.0 had a huge number of additions and improvements including more Spectre and Meltdown fixes, improved power management, and better GPU support.

New Tools and Tool Upgrades

Since our last release, we have added a number of new tools to the repositories, including:
  • idb – An iOS research / penetration testing tool
  • gdb-peda – Python Exploit Development Assistance for GDB
  • datasploit – OSINT Framework to perform various recon techniques
  • kerberoast – Kerberos assessment tools

In addition to these new packages, we have also upgraded a number of tools in our repos including aircrack-ng, burpsuite, openvas,wifite, and wpscan.
For the complete list of updates, fixes, and additions, please refer to the Kali Bug Tracker Changelog.

Download Kali Linux 2018.3


If you would like to check out this latest and greatest Kali release, you can find download links for ISOs and Torrents on the Kali Downloads page along with links to the Offensive Security virtual machine and ARM images, which have also been updated to 2018.3. If you already have a Kali installation you're happy with, you can easily upgrade in place as follows.
root@kali:~# apt update && apt -y full-upgrade
If you come across any bugs in Kali, please open a report on our bug tracker. It's more than a little challenging to fix what we don't know about.

Making sure you are up-to-date


To double check your version, first make sure your network repositories is enabled.
root@kali:~# cat</etc/apt/sources.list
deb http://http.kali.org/kali kali-rolling main non-free contrib
EOF
root@kali:~#

Then after running apt -y full-upgrade, you may require a reboot before checking:
root@kali:~# grep VERSION /etc/os-release
VERSION="2018.3"
VERSION_ID="2018.3"
root@kali:~#



More articles