Monday, January 7, 2013
sql fingerprint next generation
Microsoft SQL Server fingerprinting can be a time consuming process, because it involves trial and error methods to determine the exact version. Intentionally inserting an invalid input to obtain a typical error message or using certain alphabets that are unique for certain server are two of the many ways to possibly determine the version, but most of them require authentication, permissions and/or privileges on Microsoft SQL Server to succeed.
Instead, ESF.pl uses a combination of crafted packets for SQL Server Resolution Protocol (SSRP) and Tabular Data Stream Protocol (TDS) (protocols natively used by Microsoft SQL Server) to accurately perform version fingerprinting and determine the exact Microsoft SQL Server version. ESF.pl also applies a sophisticated Scoring Algorithm Mechanism (Powered by Exploit Next Generation++ Technology), which is a much more reliable technique to determine the Microsoft SQL Server version. It is a tool intended to be used by:
This version is a completely rewritten version in Perl, making ESF.pl much more portable than the previous binary
version (Win32), and its original purpose is to be used as a tool to perform automated penetration test. This version
also includes the followingMicrosoft SQL Server versions to its fingerprint database:
Microsoft SQL Server 2012 SP1 (CU1)
Microsoft SQL Server 2012 SP1
Microsoft SQL Server 2012 SP1 CTP4
Microsoft SQL Server 2012 SP1 CTP3
Microsoft SQL Server 2012 SP0 (CU4)
Microsoft SQL Server 2012 SP0 (MS12-070)
Microsoft SQL Server 2012 SP0 (CU3)
Microsoft SQL Server 2012 SP0 (CU2)
Microsoft SQL Server 2012 SP0 (CU1)
Microsoft SQL Server 2012 SP0 (MS12-070)
Microsoft SQL Server 2012 SP0 (KB2685308)
Microsoft SQL Server 2012 RTM
download
MiTM Attacks Against Mobile Devices
Normally when one thinks of MiTM (Man In The Middle) attacks over wireless802.11 protocols, thoughts of ARP Poisoning and Wifi-Pineapples come to mind. Traditionally these attacks were conducted against laptops using embedded wireless functionality. Now that most mobile phones and tablet devices have Wifi capabilities in addition to access to their cellular networks, they have added themselves to the list of potential victims.
Wifi only devices, such as Google Android tablets and Apple Ipads, are particularly at risk to these kinds of attacks, especially in public environments such as airports.
If you use an Android or iOS device to connect to a Microsoft Exchange server over WiFi, security researcher Peter Hannay a PhD student, researcher and lecturer based at Edith Cowan University in Perth Western Australia has taken readily available security tools and prepared a rather damaging MiTM attack targeting mobile devices over WiFi.
The purpose of this attack is to impersonate an application the mobile device is attempting to connect to (MS Exchange Server in this case). Once the connection is established, the bogus Exchange Serve sends provisioning commands back to the device. Among commands that can be sent is the option to remotely wipe the device of its data.
How it works:
The attacker would enable their wifi-pineapple or similar platform to perform DNS spoofing and offer up a self-signed SSL certificate to clients that connect to i. This would prompt the connecting victim to accept this bogus certificate and make the connection. Unfortunately most end users aren’t particularly security savvy, click through the warning message, and are then subjected to what the attacker has in store for them. In this case, possibly the issuance of a command to remotely wipe the device.
The future does not look particularly bright for mobile device owners. Pending research is attempting to add the implementation of an open source software protocol library with the objectives of emulating the ActiceSync protocol and serving as a translation layer between mobile MS Exchange clients and other types of servers. This could ultimately provide such nefarious activities as retrieving data from the mobile device such as address books, contacts, emails, calendar entries and similar data using remote backup facilities or pushing policy to the phone and change configuration options such as what server the device wants to communicate with by default. There are, however, mobile hacking and security training classes available to help people learn countering techniques (and other attack techniques).
This attack is not viewed as a flaw in MS Exchange Server or the client software, according to Microsoft, but a flaw in the implementation of the aforementioned client in the Google Android and Apple iOS mobile operating systems. One has to at least question the trust model that is in place. The server component goes through great measures to ensure that a trusted client and end user is connecting while the client doesn’t follow suit. Microsoft Windows Phones are not vulnerable to this attack.
rujukan link
Vega Web Security Scanner
Vega Web Security Scanner merupakan satu tools yang ada pada Backtrack5 R3.ia memudahkan kita untuk membuat penentration dan dapat mengetahui kelemahan pada web tersebut.tools ini boleh juga install pada windows dan mac
selamat mencuba
sumber rujukan
wappalyzer
wappalyzer adalah satu tools untuk kita mudah mengetahui web yang kita surf mengunakan software ape..version web apa..byk hackers menggunakan plugin ini sebelum membuat attack ..download link di bawah
download
Hack WPA used reaver
kat sini nak share satu benda.biasenye kita hack wifi gune tools seperti "beini" , "fern wifi cracker" dan "aircrack".tapi kat sini nak share satu cara nak hack wifi yang guna security WPA.yaitu reaver.
reaver hanya untuk platform linux sahaja.sesape guna backtrack guna command dibawah untuk install
sudo apt-get install reaver
reaver boleh hack wifi unifi,yes, yang menggunakan WPA PSK dan wps.proses ini menagambil masa selama 5 jam.
cara nak hack
1.run device wifi pada airmon-ng
2.run airodump-ng.kita copy bssid AP yang kita nak attack dan paste kat command di bawah
3.reaver -i mon0 -b "bssid" -vv
dan akan terpapar proses mseperti dibawah.
reaver hanya untuk platform linux sahaja.sesape guna backtrack guna command dibawah untuk install
sudo apt-get install reaver
reaver boleh hack wifi unifi,yes, yang menggunakan WPA PSK dan wps.proses ini menagambil masa selama 5 jam.
cara nak hack
1.run device wifi pada airmon-ng
2.run airodump-ng.kita copy bssid AP yang kita nak attack dan paste kat command di bawah
3.reaver -i mon0 -b "bssid" -vv
dan akan terpapar proses mseperti dibawah.
command ping dalam sun solaris
biasa dalam windows command ping mudah dan senang tapi dalam sun solaris perlu masuk dalam /usr/sbin
mula masuk ke user root
cd /usr/sbin
ping -s ip address
command ini bersamaan command dibawah
ping ip address -t
Subscribe to:
Posts (Atom)