Questions about this topic? Sign up to ask in the talk tab.

Difference between revisions of "User:Mike/Sandbox"

From NetSec
Jump to: navigation, search
(Regular table)
Line 1: Line 1:
<nowiki>~~~</nowiki> = default sig (change it in prefs) [[User:Mike|Mike]]
+
{{info|<center>More tools and articles coming in '''June'''.  Until then, you can get involved by joining [[IRC]] or subscribing to [http://www.reddit.com/r/blackhat /r/blackhat].</center>}}{{social}}
  
<nowiki>~~~~</nowiki> = sig then time [[User:Mike|Mike]] 13:01, 2 May 2012 (MSK)
+
<center>
  
<nowiki>~~~~~</nowiki> = time 13:01, 2 May 2012 (MSK)
+
<table style="border:.5em solid #aaaaaa; border-radius:.9em; -o-border-radius:radius|.9em; -icab-border-radius:.9em; -khtml-border-radius:.9em; -moz-border-radius:.9em; -webkit-border-radius:.9em; background-color:background|#dddddd; width:100%;"><tr><td>
 +
<big>'''Articles'''</big>
  
[[User:Mike|&#123;&#123;SUBST:Nosubst&#124;User:Mike/Sig&#125;&#125;]] 13:19, 2 May 2012 (MSK)
+
----
 +
 
 +
'''Exploitation:'''
 +
 
 +
[[Buffer overflow|Stack overflows]] &bull; [[SQL injection]] &bull; [[XSS]] &bull; [[Cookies]] &bull; [[File inclusion]] &bull; [[Command Injection|Command injection]] &bull; [[XSCF]] &bull; [[Cold Fusion Hacking]]
 +
 
 +
'''Programming:'''
 +
 
 +
[[Ascii shellcode]] &bull; [[C]] &bull; [[CPP|C++]] &bull; [[Perl]] &bull; [[Python]] &bull; [[LUA]] &bull; [[Polymorphic]] &bull; [[Bash book|The bash book]]</table>
 +
 
 +
 
 +
 
 +
'''[[Vanguard]]'''
 +
 
 +
''[[Web Exploitation|web application vulnerability]] testing engine written in [[perl]] with LibWhisker2 support''
 +
 
 +
'''[[Jynx2]]'''
 +
 
 +
''Version 2.0 of the classic [[LD_Preload]] userland rootkit written in [[C]]''
 +
 
 +
'''[[Bleeding Life]]'''
 +
 
 +
''[[PHP]] and [[MySQL]] based browser [[buffer overflow]] exploit pack''
 +
 
 +
'''[[Kolkata]]'''
 +
 
 +
''Configurable [[perl]] scanner that analyzes [[cryptography|checksums]] to perform fingerprinting on web applications with static file analysis''
 +
 
 +
'''[[GScrape]]'''
 +
 
 +
''Google scraper written [[perl]] for rapidly identifying vulnerable websites and generating statistics''
 +
 
 +
'''[[Lfi_autopwn.pl]]'''
 +
 
 +
''Given a [[File inclusion|file inclusion]] vulnerability, this [[Perl]] script will spawn a shell''
 +
 
 +
'''[[MySql 5 Enumeration|Mysql5 enumerator]]'''
 +
 
 +
''Automatically map contents or query a remote database given a URL vulnerable to [[SQL injection]] with this [[perl]] script''
 +
 
 +
'''[http://chokepoint.net/?id=5 Social Network Redirection Utility]'''
 +
 
 +
''Rickroll your friends with forged image redirects''
 +
 
 +
([http://www.blackhatacademy.org/security101/index.php?title=Special:AllPages All Pages])
 +
</center>

Revision as of 06:26, 9 May 2012

c3el4.png
More tools and articles coming in June. Until then, you can get involved by joining IRC or subscribing to /r/blackhat.

Articles


Exploitation:

Stack overflowsSQL injectionXSSCookiesFile inclusionCommand injectionXSCFCold Fusion Hacking

Programming:

Ascii shellcodeCC++PerlPythonLUAPolymorphicThe bash book


Vanguard

web application vulnerability testing engine written in perl with LibWhisker2 support

Jynx2

Version 2.0 of the classic LD_Preload userland rootkit written in C

Bleeding Life

PHP and MySQL based browser buffer overflow exploit pack

Kolkata

Configurable perl scanner that analyzes checksums to perform fingerprinting on web applications with static file analysis

GScrape

Google scraper written perl for rapidly identifying vulnerable websites and generating statistics

Lfi_autopwn.pl

Given a file inclusion vulnerability, this Perl script will spawn a shell

Mysql5 enumerator

Automatically map contents or query a remote database given a URL vulnerable to SQL injection with this perl script

Social Network Redirection Utility

Rickroll your friends with forged image redirects

(All Pages) </center>