Questions about this topic? Sign up to ask in the talk tab.

Difference between revisions of "Bleeding Life"

From NetSec
Jump to: navigation, search
(Bleeding Life 3)
Line 50: Line 50:
 
*Bleeding Life 1 (retired)
 
*Bleeding Life 1 (retired)
 
*Bleeding Life 3 (In circulation)
 
*Bleeding Life 3 (In circulation)
 
== Bleeding Life 3 ==
 
 
{{quote|Send me a PM with your email address on our [[IRC]] or email me [mailto:[email protected] here] if you are a penetration tester or vulnerability analyst interested in obtaining a copy of Bleeding Life 3.|Reynard}}
 
 
=== Features ===
 
* Advanced Statistical Information
 
* Stylish Progress Bars
 
* Full User-Friendly Admin Panel
 
* Referer Stats
 
* Secure Panel - Login/Logout
 
* Ability To Set and Save Passwords On Panel
 
* Ability To Allow Guest Access - Guest Can Only View Stats Page, Clicking and Other Pages Disabled.
 
* Ability To Add and/or Remove Exploits Used
 
* Ability To Add Scan4You Credentials For Built-In Scanner Use
 
* Ability To Filter Browsers
 
* Ability To Filter Operating Systems
 
* Attempt To Detect and Filter HTTP Proxies
 
* Ability To Blacklist by IP/Range
 
* Ability To Import Blacklist
 
* On Panel Built In Scanner
 
* Ability To Upload Payload From Panel
 
* Payload Statistical Information - MD5, Size, SHA1
 
* Ability To Generate iFrame On Panel / Encrypted
 
* Ability To Domain Check/Scan On Panel
 
 
=== Screenshots ===
 
 
*[http://i.imgur.com/WU3rC.png]
 
*[http://i.imgur.com/GBvjW.png]
 
*[http://i.imgur.com/Ihyck.png]
 
*[http://i.imgur.com/BuH5E.png]
 
*[http://i.imgur.com/ZDsmG.png]
 
 
{{series
 
| Name = Bleeding Life
 
| PartOf = Buffer Overflows
 
}}
 

Revision as of 02:02, 2 March 2012

Bleeding Life

Bleeding Life 2 is an exploit pack that affects the web browsers on the Microsoft Windows operating system with remote code execution buffer overflows.

Disclaimer

RPU0j.png By obtaining this software, you are solely responsible for its use and for the consequences that may occur as a result of the use of the software. This software is intended solely for the purposes of vulnerability and penetration testing in a lab environment or on a private computer network that you own. This software is not intended to be placed on a public network (i.e The Internet). This software is not intended to be used maliciously in any way. Use of this software for malicious purposes could lead to you being held criminally liable for any damages caused. You agree to indemnify, hold harmless, and otherwise not sue or hold liable, the authors, or anyone else associated with this software against all claims, damages, legal fees, costs, or other payments. Not for use by cybercriminals.

Download HERE

Features

Bleeding Life 2 has a variety of exploits and statistics features.

Exploits

Adobe

Java

Statistics

  • Statistics by Exploit
  • Statistics by Browser
  • Statistics by OS Version

Server Requirements

  • MySQL
  • PHP
  • HTTPD (apache, lighttpd, nginx, etc)

Installation & Configuration

c3el4.png Before running Bleeding Life 2's installer, you must first fill out config.php, which has been thoroughly commented for your ease of use.

The installer is located at $DOCUMENT_ROOT/install. Installation is incredibly easy.

Download

Bleeding Life 2

Additional Versions

  • Bleeding Life 1 (retired)
  • Bleeding Life 3 (In circulation)