Archive for July, 2010

Introduction to Sql Injection,Blind Sql Injection,CSRF,and Cross Site Scripting videos

0

Detailed Introduction to Sql,Blind Sql Injection,CSRF,and Cross Site Scripting.

Introduction to Sql Injection

[kml_flashembed publishmethod=”static” fversion=”8.0.0″ movie=”http://download.boulder.ibm.com/ibmdl/pub/software/dw/richmedia/rational/08/appscan_demos/sqlinjection/viewer.swf” width=”600″ height=”400″ targetclass=”flashmovie”]Get Adobe Flash player

[/kml_flashembed]

Blind Sql Injection

[kml_flashembed publishmethod=”static” fversion=”8.0.0″ movie=”http://download.boulder.ibm.com/ibmdl/pub/software/dw/richmedia/rational/08/appscan_demos/blindsqlinjection/viewer.swf” width=”600″ height=”400″ targetclass=”flashmovie”]Get Adobe Flash player

[/kml_flashembed]

Cross Site Scripting

[kml_flashembed publishmethod=”static” fversion=”8.0.0″ movie=”http://download.boulder.ibm.com/ibmdl/pub/software/dw/richmedia/rational/08/appscan_demos/xss/viewer.swf” width=”600″ height=”400″ targetclass=”flashmovie”]Get Adobe Flash player

[/kml_flashembed]

Cross Site Request Forgery

[kml_flashembed publishmethod=”static” fversion=”8.0.0″ movie=”http://download.boulder.ibm.com/ibmdl/pub/software/dw/richmedia/rational/08/appscan_demos/csrf-cbt/viewer.swf” width=”600″ height=”400″ targetclass=”flashmovie”]Get Adobe Flash player

[/kml_flashembed]

NeoPwn Nokia N900 Mobile Penetration Testing device

0

Nokia900 has been Just released in our Country and Planning to buy the Awesome device,to install Neopwn Operation system which has Most of the backtrack tools Ported to debian to this device.NeoPwn beta will be released soon this month .

Neopwn project Details

http://www.neopwn.com/

Chkout the Teaser Vidoes

C programming for Hackers

5

Below are the list of Guides and Links for Learning C language

C Programming 101 from SecurityTube.net

Introduction to Pointers (C Programming)

Array Basics (C Programming 101)

Two Dimensional Arrays Part I (C Programming 101)

Two Dimensional Arrays Part II (C Programming 101)

Two Dimensional Arrays Part III (C Programming 101)

Structures (C Programming 101)

Memory Allocation with Malloc, Calloc and Realloc Part I (C Programming 101)

Memory Allocation with Malloc, Calloc and Realloc Part II (C Programming 101)

Gathering of Gray Presents :An Introduction to Programming for Hackers

An Introduction to Programming for Hackers Part I

An Introduction to Programming for Hackers Part II

An Introduction to Programming for Hackers Part III – Advanced Variables & Flow Control

An Introduction to Programming for Hackers Part IV – Conditionals

An Introduction to Programming for Hackers Part V – Functions

An Introduction to Programming for Hackers Part VI – Pointers, Data Structures and Dynamic Memory

An Introduction to Programming for Hackers Part VII – Basic File & Sockets Programming

An Introduction to Programming for Hackers Part VIII – Basic File & Sockets Programming
Download All the above Guides

http://rapidshare.com/files/405875972/C4HACKERS.rar

Exploit Writing Tutorials for Pentesters

2

Below are the few resources i found which helps us to learn Exploit Writing.

http://myne-us.blogspot.com/2010/08/from-0×90-to-0x4c454554-journey-into.html

Best Exploit writing Guide from Peter van Execkhoutte

Exploit writing tutorial part 1 : Stack Based Overflows

Exploit writing tutorial part 2 : Stack Based Overflows – jumping to shellcode

Exploit writing tutorial part 3 : SEH Based Exploits

Exploit writing tutorial part 3b : SEH Based Exploits – just another example

Exploit writing tutorial part 4 : From Exploit to Metasploit – The basics

Exploit writing tutorial part 5 : How debugger modules & plugins can speed up basic exploit development

Exploit writing tutorial part 6 : Bypassing Stack Cookies, SafeSeh, SEHOP, HW DEP and ASLR

Exploit writing tutorial part 7 : Unicode – from 0×00410041 to calc

Exploit writing tutorial part 8 : Win32 Egg Hunting

Starting to write Immunity Debugger PyCommands : my cheatsheet

Exploit writing tutorial part 9 : Introduction to Win32 shellcoding

Exploit writing tutorial part 10 : Chaining DEP with ROP – the Rubik’s[TM] Cube

How To write remote Exploits

http://www.linuxsecurity.com.br/info/exploit/remotexploit.php

Learning perl-exploit writing

http://www.milw0rm.com/papers/85

Writing Exploit win32 Tutorial Uisng Ollydbg and Perl by Barabas(old Stuff but very useful)

http://rs316.rapidshare.com/files/146862909/slmailbo.pdf

Python tools for penetration testers

2

Stumbled upon a  website  which tells about various python tools required for every Vulnerability research, reverse engineering and  penetration testing.

http://dirk-loss.de/python-tools.htm

WhatWeb Next generation Webscanner

1

WhatWeb Identify content management systems (CMS), blogging platforms, stats/analytics packages, javascript libraries, servers and more. When you visit a website in your browser the transaction includes many unseen hints about how the webserver is set up and what software is delivering the webpage. Some of these hints are obvious, eg. “Powered by XYZ” and others are more subtle. WhatWeb recognises these hints and reports what it finds.

Project Home

http://www.morningstarsecurity.com/research/whatweb
Installation & Usage guide

root@punter:/pentest/enumeration/wget http://www.morningstarsecurity.com/downloads/whatweb-0.4.4.tar.gz

root@punter:/pentest/enumeration#tar -xvf whatweb-0.4.4.tar.gz

root@punter:/pentest/enumeration#sudo apt-get install ruby ruby-dev libopenssl-ruby

root@punter:/pentest/enumeration# cd whatweb-0.4.4

root@punter:/pentest/enumeration/whatweb-0.4.4# ./whatweb www.punter-infosec.com
http://www.punter-infosec.com [301] HTTPServer[Apache], UncommonHeaders[x-pingback], RedirectLocation[http://punter-infosec.com/], MD5[d41d8cd98f00b204e9800998ecf8427e]
http://punter-infosec.com/ [200] WordPress[3.0], UncommonHeaders[x-pingback], Google-Analytics[GA][17091216], HTML5, HTTPServer[Apache], Title[Penetration Testing,Vulnerability Assessment,Web Application Security,Information Security,Hacking tools,Wireless Security], MetaGenerator[WordPress 3.0], PoweredBy[WordPress,], JQuery[1.4.2], MD5[be5d96caad6699a884649eec47a74115], Header-Hash[5a4d8f38fc3bcab1718c100deec99cbe], Footer-Hash[0b101ee73a06b03c68b9c4cc415da556], Div-Span-Structure[108005edf735f34820dc0a870e1d67e1]

Learning BufferOverFlow

1

below is the List of references and guides to start Learning and understanding how does BufferOverFlow works and finding BOF in softwares.

This is a simple demonstration of buffer overflow exploitation

http://smashthestack.org/l3thal/bof.txt

Writing Buffer Overflow Exploits using BackTrack by Lupin

Part One: A Simple Windows Stack Based Buffer Overflow
Part Two: A Windows Stack Based SEH Buffer Overflow
Part Three: A Windows Stack Based SEH Buffer Overflow with Character Translation
Part Four: A Windows Use After Free Heap Corruption Exploit
Part Five: A Windows Stack Based Overflow using an Egghunter and a Conditional Jump

Buffer Overflow Primer Series from Securitytube.net

Buffer Overflow Primer Part 1 (Smashing the Stack)

Buffer Overflow Primer Part 2 (Writing Exit Shellcode)

Buffer Overflow Primer Part 3 (Executing Shellcode)

Buffer Overflow Primer Part 4 (Disassembling Execve)

Buffer Overflow Primer Part 5 (Shellcode for Execve)

Writing Buffer Overflow Exploits – a Tutorial for Beginners
http://www.securiteam.com/securityreviews/5OP0B006UQ.html
Writing Windows Buffer Overflows
http://www.madirish.net/?article=215

Assembley lanugage for Penetration Testers

0

Assembley lanugage for Penetration tester

Below are the useful resources to learn Assembley Language for pentesters to start learning  Exploit writing

http://www.skullsecurity.org/wiki/index.php/Assembly

Linux Assembley

http://asm.sourceforge.net/
Programming From the Ground Up

http://download.savannah.gnu.org/releases-noredirect/pgubook/

Iczelion’s Win32 Assembly Homepage
http://win32assembly.online.fr/

Art of Assembly

http://homepage.mac.com/randyhyde/webster.cs.ucr.edu/index.html

first 5 chapters is enough

Intel Developer Manuals
http://www.intel.com/products/processor/manuals/

Assembly Language Primer for Hackers Videos

Assembly Primer for Hackers (Part 1) System Organization
http://securitytube.net/Assembly-Primer-for-Hackers-%28Part-1%29-System-Organization-video.aspx

Assembly Primer for Hackers (Part 2) Virtual Memory Organization
http://securitytube.net/Assembly-Primer-for-Hackers-%28Part-2%29-Virtual-Memory-Organization-video.aspx

Assembly Primer for Hackers (Part 3) GDB Usage Primer
http://securitytube.net/Assembly-Primer-for-Hackers-(Part-3)-GDB-Usage-Primer-video.aspx

Assembly Primer for Hackers (Part 4) Hello World
http://securitytube.net/Assembly-Primer-for-Hackers-(Part-4)-Hello-World-video.aspx

Assembly Primer for Hackers (Part 5) Data Types
http://securitytube.net/Assembly-Primer-for-Hackers-(Part-5)-Data-Types-video.aspx

Assembly Primer for Hackers (Part 6) Moving Data
http://securitytube.net/Assembly-Primer-for-Hackers-(Part-6)-Moving-Data-video.aspx

Assembly Primer for Hackers (Part 7) Working with Strings
http://securitytube.net/Assembly-Primer-for-Hackers-(Part-7)-Working-with-Strings-video.aspx

http://securitytube.net/Assembly-Primer-for-Hackers-(Part-8)-Unconditional-Branching-video.aspx

Assembly Primer for Hackers (Part 9) Conditional Branching
http://securitytube.net/Assembly-Primer-for-Hackers-(Part-9)-Conditional-Branching-video.aspx

Assembly Primer for Hackers (Part 10) Functions
http://securitytube.net/Assembly-Primer-for-Hackers-(Part-10)-Functions-video.aspx

Assembly Primer for Hackers (Part 11) Functions Stack
http://securitytube.net/Assembly-Primer-for-Hackers-(Part-11)-Functions-Stack-video.aspx

Web hacking Videos by Joe Hemler

1

Why spend all your time corrupting and controlling memory when you can type some text into your browser and get access to your target’s data? The growing complexity of web applications, the increasing data stored behind them, and the low awareness and understanding of web security vulnerabilities are creating a situation that is well-suited for exploitation. Joe Hemler will explain some of the most common vulnerabilities in web applications in this video.

http://vimeo.com/8134045

Go to Top