Monday, January 7, 2013

sql fingerprint next generation

Microsoft SQL Server fingerprinting can be a time consuming process, because it involves trial and error methods to determine the exact version. Intentionally inserting an invalid input to obtain a typical error message or using certain alphabets that are unique for certain server are two of the many ways to possibly determine the version, but most of them require authentication, permissions and/or privileges on Microsoft SQL Server to succeed. Instead, ESF.pl uses a combination of crafted packets for SQL Server Resolution Protocol (SSRP) and Tabular Data Stream Protocol (TDS) (protocols natively used by Microsoft SQL Server) to accurately perform version fingerprinting and determine the exact Microsoft SQL Server version. ESF.pl also applies a sophisticated Scoring Algorithm Mechanism (Powered by Exploit Next Generation++ Technology), which is a much more reliable technique to determine the Microsoft SQL Server version. It is a tool intended to be used by: This version is a completely rewritten version in Perl, making ESF.pl much more portable than the previous binary version (Win32), and its original purpose is to be used as a tool to perform automated penetration test. This version also includes the followingMicrosoft SQL Server versions to its fingerprint database: Microsoft SQL Server 2012 SP1 (CU1) Microsoft SQL Server 2012 SP1 Microsoft SQL Server 2012 SP1 CTP4 Microsoft SQL Server 2012 SP1 CTP3 Microsoft SQL Server 2012 SP0 (CU4) Microsoft SQL Server 2012 SP0 (MS12-070) Microsoft SQL Server 2012 SP0 (CU3) Microsoft SQL Server 2012 SP0 (CU2) Microsoft SQL Server 2012 SP0 (CU1) Microsoft SQL Server 2012 SP0 (MS12-070) Microsoft SQL Server 2012 SP0 (KB2685308) Microsoft SQL Server 2012 RTM download

ScanPlanner : NMAP now Online

sekarang dah ada tools baru tuk run nmap secara online link

MiTM Attacks Against Mobile Devices

Normally when one thinks of MiTM (Man In The Middle) attacks over wireless802.11 protocols, thoughts of ARP Poisoning and Wifi-Pineapples come to mind. Traditionally these attacks were conducted against laptops using embedded wireless functionality. Now that most mobile phones and tablet devices have Wifi capabilities in addition to access to their cellular networks, they have added themselves to the list of potential victims. Wifi only devices, such as Google Android tablets and Apple Ipads, are particularly at risk to these kinds of attacks, especially in public environments such as airports. If you use an Android or iOS device to connect to a Microsoft Exchange server over WiFi, security researcher Peter Hannay a PhD student, researcher and lecturer based at Edith Cowan University in Perth Western Australia has taken readily available security tools and prepared a rather damaging MiTM attack targeting mobile devices over WiFi. The purpose of this attack is to impersonate an application the mobile device is attempting to connect to (MS Exchange Server in this case). Once the connection is established, the bogus Exchange Serve sends provisioning commands back to the device. Among commands that can be sent is the option to remotely wipe the device of its data. How it works: The attacker would enable their wifi-pineapple or similar platform to perform DNS spoofing and offer up a self-signed SSL certificate to clients that connect to i. This would prompt the connecting victim to accept this bogus certificate and make the connection. Unfortunately most end users aren’t particularly security savvy, click through the warning message, and are then subjected to what the attacker has in store for them. In this case, possibly the issuance of a command to remotely wipe the device. The future does not look particularly bright for mobile device owners. Pending research is attempting to add the implementation of an open source software protocol library with the objectives of emulating the ActiceSync protocol and serving as a translation layer between mobile MS Exchange clients and other types of servers. This could ultimately provide such nefarious activities as retrieving data from the mobile device such as address books, contacts, emails, calendar entries and similar data using remote backup facilities or pushing policy to the phone and change configuration options such as what server the device wants to communicate with by default. There are, however, mobile hacking and security training classes available to help people learn countering techniques (and other attack techniques). This attack is not viewed as a flaw in MS Exchange Server or the client software, according to Microsoft, but a flaw in the implementation of the aforementioned client in the Google Android and Apple iOS mobile operating systems. One has to at least question the trust model that is in place. The server component goes through great measures to ensure that a trusted client and end user is connecting while the client doesn’t follow suit. Microsoft Windows Phones are not vulnerable to this attack. rujukan link

Vega Web Security Scanner

Vega Web Security Scanner merupakan satu tools yang ada pada Backtrack5 R3.ia memudahkan kita untuk membuat penentration dan dapat mengetahui kelemahan pada web tersebut.tools ini boleh juga install pada windows dan mac selamat mencuba sumber rujukan

wappalyzer

wappalyzer adalah satu tools untuk kita mudah mengetahui web yang kita surf mengunakan software ape..version web apa..byk hackers menggunakan plugin ini sebelum membuat attack ..download link di bawah download

Hack WPA used reaver

kat sini nak share satu benda.biasenye kita hack wifi gune tools seperti "beini" , "fern wifi cracker" dan "aircrack".tapi kat sini nak share satu cara nak hack wifi yang guna security WPA.yaitu reaver.

reaver hanya untuk platform linux sahaja.sesape guna backtrack guna command dibawah untuk install

sudo apt-get install reaver

reaver boleh hack wifi unifi,yes, yang menggunakan WPA PSK dan wps.proses ini menagambil masa selama 5 jam.

cara nak hack

1.run device wifi pada airmon-ng
2.run airodump-ng.kita copy bssid AP yang kita nak attack dan paste kat command di bawah
3.reaver -i mon0 -b "bssid" -vv

dan akan terpapar proses mseperti dibawah.


command ping dalam sun solaris

biasa dalam windows command ping mudah dan senang tapi dalam sun solaris perlu masuk dalam /usr/sbin mula masuk ke user root cd /usr/sbin ping -s ip address command ini bersamaan command dibawah ping ip address -t