Chinaunix首页 | 论坛 | 博客
  • 博客访问: 221885
  • 博文数量: 88
  • 博客积分: 3020
  • 博客等级: 中校
  • 技术积分: 707
  • 用 户 组: 普通用户
  • 注册时间: 2009-02-12 16:56
文章分类
文章存档

2010年(26)

2009年(62)

我的朋友

分类: LINUX

2010-10-10 15:18:36


DirBuster ver 0.12 (OWASP PROJECT) (Java)

Usage: s3rg3770@localhost:~/Tools/Web_scanner/DirBuster-0.12$ java -jar DirBuster.jar
Starting OWASP DirBuster 0.12


-------------------------------------

Inguma (joseanpiti) (Python)

free penetration testing and vulnerability discovery toolkit
See Doc inside...


------------------------------------

Scapy (http://www.secdev.org/projects/scapy/) (Python)
interactive packet manipulation tool Author: Philippe BIONDI
See Doc inside.

------------------------------------

Admin Control Panel Finder v1.1 (Author:KuNdUz) (Perl)

Usage: s3rg3770@localhost:~/Tools/Web_scanner$ perl ACPF.pl
~ Enter Site
* ex: or /path
->
~ Enter site source code
* ex: asp or php
->
->Target:
->Site source code: php
->Searching admin control panel...
[-] Not Found <- admin/
[-] Not Found <- administrator/

---------------------------------------

Mini MySqlat0r 0.3 (Copyright © 2007 Free Software Foundation, Inc. <) (Java + manual)

Usage: s3rg3770@localhost:~/Tools/Web_scanner$ java -jar mms_0_3.jar


-------------------------------------
Utrillo bug hunting tool () (Java)

Tool per il source auditing di sorgenti, scritto in Java

--------------------------------------
iScan 0.1b () (Java)

scanner di vulnerabilità per siti web
open source e multi piattaforma

------------------------------------

Nikto 2.03 (© 2008 CIRT, Inc. ) (Perl + Doc/Manual)

Usage: s3rg3770@localhost:~/Tools/Web_scanner/nikto$ perl nikto.pl (options)




------------------------------------

JBroFuzz 1.1 (OWASP PROJECT) (Java)

Usage: s3rg3770@localhost:~/Tools/Web_scanner/jbrofuzz$ java -jar JBroFuzz.jar


------------------------------------

Powerfuzzer v1 (Python-Require WxPython or EXE ver. Beta )



------------------------------

Wapiti 2.0.0 (Python + doc + author in package)

Usage: s3rg3770@localhost:~/Hack/Tools/Web_scanner/wapiti/src$ python wapiti.py (options)



--------------------------------

Pixy (Secure Systems Lab, Vienna University of Technology) (Java/Perl/PHP)

RTFM Here

s3rg3770@localhost:/opt/lampp/htdocs/audit/pixy$ perl run-all.pl
usage: check [options] file
-a,--call-string call-string analysis (else: functional)
-A,--alias use alias analysis
-L,--literal use literal analysis (usually not necessary)
-P,--prefixes print prefixes and suffixes
-V,--verbosegraphs disable verbose depgraphs
-b,--brief be brief (for regression tests)
-c,--cfg dump the function CFGs in dot syntax
-d,--detailcfg dump the function control flow graphs and the
CFGs of their paramters in dot syntax
-f,--functions print function information
-g,--registerGlobals DISABLE register_globals for analysis
-h,--help print help
-i,--getisuntaintedsql make the GET array untainted for SQL analysis
-l,--libdetect detect libraries (i.e. scripts with empty main
function)
-m,--max print maximum number of temporaries
-o,--outputdir output directory (for graphs etc.)
-p,--parsetree print the parse tree in dot syntax
-q,--query enable interactive queries
-r,--notrim do NOT trim untained stuff (during sanit
analysis)
-s,--sinks provide config files for custom sinks
-t,--table print symbol tables
-v,--verbose enable verbose output
-w,--web web interface mode
-y,--analysistype type of taint analysis (sqlsanit, sql, file,
xsssanit, xss)


----------------------------------------------

Wfuzz 1.1 (edge-security) (Python / Pycurl or Exe)

Usage: s3rg3770@localhost:~/Hack/Tools/Web_scanner/wapiti/src$ python wfuzz.py -c -z range -r 1-100 --hc 404



----------------------------------------------

FIS-v0.2 (File Inclusion Scanner) (Zapotek) (PHP)
scans PHP files mapping PHP/HTTP GET variables and then performs a security audit

Usage
php fis.php


---------------------------------------------------

Spike PHP Security Audit Tool (Ashwin Kumar) (PHP)

1. Usage
---------

* To install, unzip Spike phpSecAudit package.

> unzip spike_phpSecAudit.zip

* Change directory to your php repository.

> cd /path/to/code/to/audit

* Execute the run.php, passing the file name or directory to audit.

> php /path/to/spike_phpSecAudit/run.php test_file.php

or

> php /path/to/spike_phpSecAudit/run.php dir_name


---------------------------------------------------

RATS - Rough Auditing Tool for Security

RATS is authored, maintained and distributed by Secure Software, Inc. All
bug reports, patches, database contributions, comments, etc. should be sent to
rats@securesoftware.com. Our website is http://www.securesoftware.com/

for usage RTFM , install and go... XD

s3rg3770@localhost:~$ rats -h
RATS v2.0 - Rough Auditing Tool for Security
Copyright 2001, 2002 Secure Software Inc
http://www.securesoftware.com

usage: rats [-adhilrwxR] [--help] [--database|--db] name1 name2 ... namen

-a report any occurence of function 'fun' in the source file(s)
-d specify an alternate vulnerability database.
--db
--database
-h display usage information (what you're reading)
--help
-i report functions that accept external input
--input
-l force the specified langauge to be used
--language
-r include references that are not function calls
--references
-w <1,2,3> set warning level (default 2)
--warning <1,2,3>
-x do not load default databases
-R don't recurse subdirectories scanning for matching files
--no-recursion
--xml Output in XML.
--html Output in HTML.
--follow-symlinks
Follow symlinks and process files found.
--noheader
Don't print initial header in output
--nofooter
Don't show timing information footer at end of analysis
--quiet
Don't print status information regarding what file is being analyzed
--resultsonly
No header, footer, or status information
--columns
Show column number of hte line where the problem occured.
--context
Display the line of code that caused the problem report


------------------------------------------------------

Sulley - Fuzzing Framework

Sulley is a fuzzer development and fuzz testing framework consisting of multiple extensible components
RTF PDF inside the package. XD

-------------------------------------------------

Burp Suite ()


------------------------------------------------

ISR-sqlget () (Perl)

It's a blind SQL injection tool developed in Perl.
It lets you get databases schemas and tables rows
RTFM inside the package XD
Usage: ./ISR-sqlget.pl [ACTION] [OPTIONS]

Action:
-c: Check parser module
-t: Get test page
-a: Get all database names (only mssql)
-s: Get database/s structure/s
-d: Get database/s information/s (csv format)
-g: Graphic structure of database (gif format)


Options:
-n: Session name
-p: (Use with -c action, specify src page to check the module);
Default ./template/$SESSION.testpage
-v: Verbose
-h: Help


---------------------------------------------------

PHP Fuzzer (Remote) (RoMeO[DarkMindZ.com]) @author c0ke (PHP)

Scans a uri for XSS, RFI, LFI, SQL Injection and Path disclosures.
Some options include custom User_Agent/Referer, scan choice, proxy and phproxy

Usage : RTFM in the package... XD

-----------------------------------------------



Cookie Tools - cookiesniffer (xenion ) (C)

cookiesniffer e' un semplice e potente cookie sniffer che riconosce
(attraverso euristiche) e ricostruisce (con libnids) qualsiasi connessione
HTTP nuova oppure gia' esistente, facendo il parsing di qualsiasi messaggio
HTTP valido oppure parzialmente valido. L'output e' un insieme di file
contenenti le informazioni raccolte con time-stamps in un formato che puo'
essere facilmente utilizzato con i tool standard di UNIX come grep, awk, cut
e sed. Supporta le reti wireless

RTFM !! inside the package XD ...

------------------------------------------------------

xssfuzz1.1 (Written by RSnake ) (CGI/Perl)

#No RTFM here, if you don't know what this does you probably shouldn't be
#messing with it anyway. This is for people doing XSS research only, if those
#words don't resonate with you, you've got the wrong program.

-----------------------------------------------

Xsss v0.40 (2005 Sven Neuhaus ) (Perl + pdf)

Usage: s3rg3770@localhost:~/xsss-0.40b$ ./xsss


---------------------------------------------

XSS Scanner (d3hydr8[at]gmail[dot]com) (Python)

Usage: python XSSscan.py
----------------------------------------------

XSS Scanner2 (d3hydr8[at]gmail[dot]com ) (Python)

Usage: ./xsstest.py
[options]
-p/-proxy : Add proxy support

--------------------------------------------

Footzo v.1.0 by rgod + ajx_footzo (PHP)

PHP bof scanner >> Extremely rough to use.... Readme.txt inside.


------------------------------------------------

SQLINJECT 1.10 (Sergio 'shadown' Alvarez) (Python)


Usage: s3rg3770@localhost:~/Hack/Tools/Sql_scanner/1$ python sqlinject.py
###############################################
# Net-Twister WebApp-Injection Module #
# Coded by Sergio 'shadown' Alvarez #
# Contact: shadown@gmail.com #
###############################################
Usage: sqlinject.py -h -p -t -l [file loging] -s [use SSL] -e [enum only] -f [use FUZZ]
Options:
-h : target host
-p : target port, default 80 (OPTIONAL)
-t : target path, default '/' (OPTIONAL)
-l : log into files every request and response, default None (OPTIONAL)
-s : turns on SSL, default None (OPTIONAL)
-e : enumeration of GETs and POSTs only, default None (OPTIONAL)
-f : full fuzzing data mode, default None (OPTIONAL)

----------------------------------------------------

mysqlbf (Ilo--, ilo@reversing.org ) (C Language / with binary + readme.txt)

Usage : s3rg3770@localhost:~/Hack/Tools/Sql_scanner/2$ ./mysqlbf

http-sql adaptive bruteforce $Revision: 1.13 $
ilo@reversing.org

This program is now being developed by Dab at


Usage: ./mysqlbf [http://]host[:port][/path/][file]?args [*]sqlval[:length][=initval] match

type ./mysqlbf -help for more info.

---------------------------------------------------

Sqlmap 0.6.3 (inquis and belch ) (Python)

Usage: sqlmap.py [options] (-h to know more.... )

-------------------------------------------------

SQL Injection Digger (Metaeye Security Group ) (Ruby)

Usage: sqid.rb [options] (-h to know more...)

-------------------------------------------------

SQLIer (brad@bcable.net) (Bash)


Usage: sqlier [OPTIONS] [url]
-c [host] Clear all exploit information stored for [host].
-o [file] Output cracked passwords to [file].
-s [seconds] Wait [seconds] between page requests.
-u [usernames] Usernames that will be brute forced from the database,
comma separated (Username1,Username2,Username3).
-w [options] Pass [options] to wget.

Passing Field Names:
--table-names [table_names] Comma separated list of table names to guess.
--user-fields [user_fields] Comma separated list of username fields to guess.
--pass-fields [pass_fields] Comma separated list of password fields to guess.

---------------------------------------------

SQL Table/Column Fuzz (d3hydr8[at]gmail[dot]com) (Python)

Usage: ./d3sqlfuzz.py (p.s add more table, column name in the source..)

-------------------------------------------

SQLBrute (Justin Clarke, justin at justinclarke dot com) (Python)

Usage: sqlbrute.py options url
[--help|-h] - this help
[--verbose|-v] - verbose mode
[--server|-d oracle|sqlserver] - type of database server (default MS SQL Server)
[--error|-e regex] - regex to recognize error page (error testing on
ly)
[--threads|-s number] - number of threads (default 10)
[--cookie|-k string] - cookies needed
[--time|-n] - force time delay (waitfor) testing
[--data|-p string] - POST data
[--database|-f database] - database to enumerate data from (SQL Server)
[--table|-t table] - table to extract data from
[--column|-c column] - column to extract data from
[--where|-w column=data] - restrict data returned to rows where column "co lumn" matches "data"
[--header|-x header::val] - header to add to the request (i.e. Referer::htt p://foobar/blah.asp)
[--output|-o file] - file to send output to
[--psyco|-y] - enable psyco acceleration, if installed (real m emory hog)

-------------------------------------------------------------


Blind SQL Injection (POC. aramosf@514.es // ) (Perl)

Integer based Injection-->bsqlbf.pl - url [options]

String Based Injection-->bsqlbf.pl - url ' [options]

------------------------------------options:--------------------------
-sql: valid SQL syntax to get; version(), database(),
query like-->(select table_name from inforamtion_schema.tables limit 1 offset 0)
-get: If MySQL user is root, supply word readable file name
-blind: parameter to inject sql. Default is last value of url
-match: *RECOMMENDED* string to match in valid query, Default is try to get auto
-start: if you know the beginning of the string, use it.
-length: maximum length of value. Default is 32.
-time: timer options:
0: dont wait. Default option.
1: wait 15 seconds
2: wait 5 minutes
-type: Type of injection:
0: Type 0 (default) is blind injection based on True and False responses
1: Type 1 is blind injection based on True and Error responses
-database: Backend database:
0: MS-SQL (Default)
1: MYSQL
2: POSTGRES
3: ORACLE
-rtime: wait random seconds, for example: "10-20".
-method: http method to use; get or post. Default is GET.
-uagent: http UserAgent header to use. Default is bsqlbf 2.0
-ruagent: file with random http UserAgent header to use.
-cookie: http cookie header to use
-rproxy: use random http proxy from file list.
-proxy: use proxy http. Syntax: -proxy=
-proxy_user: proxy http user
-proxy_pass: proxy http password


bash# bsqlbf.pl -url -blind u -sql "select table_name from imformation_schema.tables limit 1 offset 0" -database 1 -type 1
bash# bsqlbf.pl -url ' -method post -get "/etc/passwd" -match "foo"

-----------------------------------------------------


LiLith v0.6a ((c) 2003-2005 Michael Hendrickx ) (Perl)

s3rg3770@localhost:~/Hack/Tools/Sql_scanner/9$ perl lilith.pl
LiLith v0.6a : http forms scanner/injector
by michael@code.ae ()

usage: lilith.pl [options]
with following options:
-d : (or file) where to start [default: /]
-a : agent to use (-a 0 for list) ["LiLith v0.6a"]
-u : basic authentication credentials
-p : proxy server (proxy:port)
-U : proxy authentication credentials
-T : wait seconds between requests [0s]
-f : if defined, extensive logging is done to
-c : ignore cookies presented by
-g : try more poison, even when error is found
-s : do not attempt to guess server version
-S : do not strip host and directory from output
-I : don't try to get directory listings
-i : don't inject any poison
-A : print all return codes (lots of data)
-v : verbosity

------------------------------------------------

SQLiX Version 1.0 (Cedric COCHIN - OWASP Project) (Perl)


s3rg3770@localhost:~/Hack/Tools/Sql_scanner/SQLiX$ perl SQLiX.pl


Error: you need to specify a target.

Usage: SQLiX.pl [options]
-help Show this help

Target specification:
-url [URL] Scan a given URL.
Example: -url=""
--post_content [CONTENT] Add a content to the current [URL] and change the HTTP method to POST
-file [FILE_NAME] Scan a list of URI provided via a flat file.
Example: -file="./crawling"
-crawl [ROOT_URL] Scan a web site from the given root URL.
Example: -crawl=""

Injection vectors:
-referer Use HTTP referer as a potential injection vector.
-agent Use HTTP User agent as a potential injection vector.
-cookie [COOKIE] Use the cookie as a potential injection vector.
Cookie value has to be specified and the injection area
tagged as "--INJECT_HERE--".
Example: -cookie="userID=--INJECT_HERE--"

Injection methods:
-all Use all the injection methods.
-method_taggy Use MS-SQL "verbose" error messages method.
-method_error Use conditional error messages injection method.
-method_blind Use all blind injection methods.
-method_blind_integer Use integer blind injection method.
-method_blind_string Use string blind injection method.
-method_blind_statement Use statement blind injection method.
-method_blind_comment Use MySQL comment blind injection method.

Attack modules:
-exploit Exploit the found injection to extract information.
by default the version of the database will be retrieved
-function [function] Used with exploit to retrieve a given function value.
Example: -function="system_user"
Example: -function="(select password from user_table)"
-union Analyse target for potential UNION attack [MS-SQL only].

MS-SQL System command injection:
-cmd [COMMAND] System command to be executed.
Example: -cmd="dir c:\\"
-login [LOGIN] MS-SQL login to use if known.
-password [PASSWORD] MS-SQL password to use if known.

Verbosity:
-v=[n] Verbose mode level
v=0 => no output, only results are displayed at the end
v=2 => realtime display, provide minimum result info
v=5 => debug view [all url,content and headers are displayed]

-----------------------------------------

SqlInference (Copyright (C) 2006 Antonio "s4tan" Parata ) (Perl)

Usage: sqlInf.pl [-t 0|1] [-v]
: website prone to sql injection attack
: string on which it's possible to make inference, for example:
1) known column name
2) LOAD_FILE('') where is a filename (e.g. /etc/passwd)
3) a MySQL function like: DATABASE(), LAST_INSERT_ID(), USER(), VERSION()
-t : type 0 to end the query whit /*
type 1 to end the query whit %20and%20'1'%20=%20'1
-v : verbose output

example: sqlInf.pl '' 'VERSION()' -t 1 -v
example: sqlInf.pl '' 'LOAD_FILE("/etc/passwd")'

------------------------------------------

SQL Playground 3 (Charles FOL)

Usage : php sp.php
>
RTFM inside the package... XD

--------------------------------------



ASP Auditor v2.2 (Author david.kierznowski_at_gmail.com) (Perl)

s3rg3770@localhost:~/Hack/Tools/Sql_scanner$ perl asp-audit.pl


[ASP Auditor v2.2]
Usage: asp-audit.pl [] (opts)

(opts)
-bf brute force ASP.NET version using JS Validate
directories.
--------------------------------------------

VERY GOOD !!!

SchemaFuzz ( # rsauron[at]gmail[dot]com ) (Python)

Usage: schemafuzz.py |
| -MySQL v5+ Information_schema Database Enumeration |
| -MySQL v4+ Data Extractor |
| -MySQL v4+ Table & Column Fuzzer |
| Usage: schemafuzz.py [options] |
| -h help

-----------------------------------------------

LFIfuzz (d3hydr8[at]gmail[dot]com) (Python)

Usage: s3rg3770@localhost:~/Hack/Tools/Lfi_scanner$ python lfi.py

d3hydr8[at]gmail[dot]com LFIfuzz v1.0


Usage: ./lfifuzz.py

Ex. ./lfifuzz.py site.com/index.php?id= /etc/passwd

---------------------------------------

LFIscanner (d3hydr8[at]gmail[dot]com) (Python)

Usage: ./lfiscan.py

Ex. ./lfiscan.py -h google.com -p 80 -null -v
Ex. ./lfiscan.py -list sites.txt -p 80 -v

[options]
-h/-host : Host to scan
-p/-port : Port to use (defaults: 80)
-l/-list : List of sites to scan through
-n/-null : Adds a null byte onto the end of the inclusion
-v/-verbose : Shows every lfi attempt

----------------------------------------

LFIscan ( by drake ) (Perl)

Usage: s3rg3770@localhost:~/Hack/Tools/Lfi_scanner$ perl lfiscanner.pl

----------------------------------------------------
lfi scan // by: dr4k3
----------------------------------------------------
#c00kies crew // irc.got2think.org #c00kies
----------------------------------------------------
>Insert Link[...]
>

-------------------------------------------

UnHash 1.0 (dxp2532 |at| gmail |dot| com) (Language C)

brute force attack against a given hash. The hash can be MD5 or SHA1

s3rg3770@localhost:~/Hack/Tools/Brute_forcer/Hash/sha1/unhash$ ./unhash
Usage: unhash SIZE SET HASH
Performs a brute-force attack on the given HASH.
Only MD5 and SHA1 hashes!

SIZE Minimum amount of letters to start with.

SET Number of the alphabet set to acquire letters from.
1. Numeric only
2. Hexadecimal in lowercase
3. HEXadecimal in uppercase
4. alpha only in lowercase
5. ALPHA only in uppercase
6. alphanumeric in lowercase
7. ALPHANUMERIC in uppercase
8. All alpha only, both uppercase and lowercase
9. Alpha-Numeric, both uppercase and lowercase
10. All printable ascii characters

HASH Hashed string to attack.

-------------------------------------------------

Multi MD5 Online Cracker v0.1 ( no fonte ) (File seguibile , aggiunta estensione .exe.lol poichè prob segnalazione AV - usare con WINE. Tool utile di ricerca MD5 crackati su 9 motori di ricerca in contemporanea e velocemente. Prima di eseguirlo togliere la spunta dai siti csthis.com e cryptobitch.de non più on line )

Usage : s3rg3770@localhost:~/Hack/Tools/Brute_forcer/Hash/md5-2/bin$ wine mhc.exe
immagine

.---------------------------------------------


k8's Md5 Db. - Autore: K8 Versione 0.2 (PHP)
Script che permette l'inserimento di hash da file e non, e la ricerca

1) Impostare user e pass dal config.php per la connessione a MySQL.
2) Creare una cartella per le wordlist ed impostare il percorso in config.php
3) Creare una database denominato md5.
4) Creare una tabella denominata md5.
Con le seguenti caratteristiche:

mysql> describe md5;
+-------------+--------------+------+-----+---------+----------------+
| Field | Type | Null | Key | Default | Extra |
+-------------+--------------+------+-----+---------+----------------+
| id | int(11) | NO | PRI | NULL | auto_increment |
| pass_md5 | varchar(64) | NO | | | |
| pass_chiaro | varchar(64) | NO | | | |
+-------------+--------------+------+-----+---------+----------------+
3 rows in set (0.10 sec)


Ho impostato max 64 caratteri per la password in chiaro. Se volete modificar,
fatelo pure,cambiando il valore nel file config.php al DEFINE MAXLENGTH & MINLENGTH.
Se volete usar un altro database,modificate il file config.php con il nome del vostro db.
Se volete usar un'altra tabella,modificate il file functions.php con il nome della vostra tabella.


---------------------------------------------

Hash Calculator v1.2 (Dhruva Sagar) (Java)

The user can calculate hashes using various different commercially available algorithms that are used often namely MD2, MD5, SHA-1, SHA-256, SHA-384, SHA-512


---------------------
Md5This () (Java)

Dictionary recover md5 Salted for example E107 - Vbulletin - IPB

Usage: s3rg3770@localhost:~/Hack/Tools/Brute_forcer/Hash/bYMd5ThiS$ java -jar Md5This.jar

阅读(3415) | 评论(1) | 转发(0) |
0

上一篇:LWP

下一篇:LW

给主人留下些什么吧!~~

chinaunix网友2010-10-11 17:55:20

很好的, 收藏了 推荐一个博客,提供很多免费软件编程电子书下载: http://free-ebooks.appspot.com