Cybersecurity firm Immunity Inc. decided to sell a BlueKeep exploit module capable of full remote code execution as part of its penetration testing toolkit.Continue…
This list of tools is really useful both in penetration testing on an Android application and in reverse engineering of a suspicious application.
All tools are OSS and freely available: so, enjoy!
Months ago, I published a post about Flare VM, a project by Fireeye/Mandiant researcher focused on the creation of a Windows-based security distribution for malware analysis.
Recently, Fireeye released a similar project: another windows-based distribution, but this time dedicated to penetration testing and red teaming, named Command VM.Continue…
Offensive Security has released an official version of Kali Linux for Raspberry Pi 4, the last (and most powerful) version of the compact computer board, released just two weeks ago with a 1.5 GHz 64-bit quad-core ARM Cortex-A72 processor and 4GB of RAM.Continue…
How attackers can exploit Group Policy Preferences file in order to discover passwords?
And how SysAdmins can mitigate this vulnerability?
…using a small python script!
During the first phase of a penetration test, especially when the test is performed in blackbox mode, is really important to gather correct informations from company websites and employees social accounts.
SQLiv is a Python-based scanning tool that uses Google, Bing or Yahoo for targetted scanning, focused on reveal pages with SQL Injection vulnerabilities.
It uses known dorks in order to find vulnerable URLs.
- multiple domain scanning with SQL injection dork by Bing, Google, or Yahoo
- targetted scanning by providing specific domain (with crawling)
- reverse domain scanning
- Resolve some dependencies:
pip install bs4 termcolor google
- Clone the git repository:
git clone https://github.com/Hadesy2k/sqliv.git
- Start python setup:
sudo python2 setup.py -i
python sqliv.py --help usage: sqliv.py [-h] [-d D] [-e E] [-p P] [-t T] [-r] optional arguments: -h, --help show this help message and exit -d D SQL injection dork -e E search engine [Google only for now] -p P number of websites to look for in search engine -t T scan target website -r reverse domain
Some usage examples
1. Multiple domain scanning with SQLi dork
- it simply search multiple websites from given dork and scan the results one by one
python sqliv.py -d <SQLI DORK> -e <SEARCH ENGINE> python sqliv.py -d "inurl:index.php?id=" -e google
2. Targetted scanning
- can provide only domain name or specifc url with query params
- if only domain name is provided, it will crawl and get urls with query
- then scan the urls one by one
python sqliv.py -t <URL> python sqliv.py -t www.example.com python sqliv.py -t www.example.com/index.php?id=1
3. Reverse domain and scanning
- do reverse domain and look for websites that hosted on same server as target url
python sqliv.py -t <URL> -r
More information and downloads
- Official GitHub repository: https://github.com/Hadesy2k/sqliv
WPSeku is a Black-box WordPress vulnerability scanner that can be used to scan remote WordPress installations to find security issues.
What is a Black-box scanner?
Black-box security testing refers to a method of software security testing in which the security controls, defences and design of an application are tested from the outside-in, with little or no prior knowledge of the application’s internal workings.
Essentially, black-box testing takes an approach similar to that of a real attacker.
The last available version is the 0.2.1 and can be downloaded from GitHub.
First, install requests:
# pip install requests
After, clone the git repository:
# git clone https://github.com/m4ll0k/WPSeku.git
Finally, start the tool:
# python wpseku.py
Usage: ./wpseku.py [--target|-t] http://localhost
-t --target Target URL (eg: http://localhost)
-x --xss Testing XSS vulns
-s --sql Testing SQL vulns
-l --lfi Testing LFI vulns
-q --query Testable parameters (eg: "id=1&test=1")
-b --brute Bruteforce login via xmlrpc
-u --user Set username, default=admin
-p --proxy Set proxy, (host:port)
-m --method Set method (GET/POST)
-c --cookie Set cookies
-w --wordlist Set wordlist
-a --agent Set user-agent
-r --redirect Redirect target url, default=True
-h --help Show this help and exit
wpseku.py --target http://localhost
wpseku.py -t http://localhost/wp-admin/post.php -m GET -q "post=49&action=edit" [-x,-s,-l]
wpseku.py --target http://localhost --brute --wordlist dict.txt
wpseku.py --target http://localhost --brute --user test --wordlist dict.txt