Questions about this topic? Sign up to ask in the talk tab.

Difference between revisions of "User:Mike/Sandbox"

From NetSec
Jump to: navigation, search
Line 1: Line 1:
 
{{info|<center>More tools and articles coming in '''June'''.  Until then, you can get involved by joining [[IRC]] or subscribing to [http://www.reddit.com/r/blackhat /r/blackhat].</center>}}{{social}}
 
{{info|<center>More tools and articles coming in '''June'''.  Until then, you can get involved by joining [[IRC]] or subscribing to [http://www.reddit.com/r/blackhat /r/blackhat].</center>}}{{social}}
 +
  
 
<center>
 
<center>
 +
  
 
<table style="border:.5em solid #aaaaaa; border-radius:.9em; -o-border-radius:radius|.9em; -icab-border-radius:.9em; -khtml-border-radius:.9em; -moz-border-radius:.9em; -webkit-border-radius:.9em; background-color:background|#dddddd; width:100%;"><tr><td>
 
<table style="border:.5em solid #aaaaaa; border-radius:.9em; -o-border-radius:radius|.9em; -icab-border-radius:.9em; -khtml-border-radius:.9em; -moz-border-radius:.9em; -webkit-border-radius:.9em; background-color:background|#dddddd; width:100%;"><tr><td>
Line 15: Line 17:
  
 
[[Ascii shellcode]] &bull; [[C]] &bull; [[CPP|C++]] &bull; [[Perl]] &bull; [[Python]] &bull; [[LUA]] &bull; [[Polymorphic]] &bull; [[Bash book|The bash book]]</td></tr></table>
 
[[Ascii shellcode]] &bull; [[C]] &bull; [[CPP|C++]] &bull; [[Perl]] &bull; [[Python]] &bull; [[LUA]] &bull; [[Polymorphic]] &bull; [[Bash book|The bash book]]</td></tr></table>
 +
 +
  
 
</center>
 
</center>
 +
 +
  
 
{|style="border:.5em solid #aaaaaa; border-radius:.9em; -o-border-radius:radius|.9em; -icab-border-radius:.9em; -khtml-border-radius:.9em; -moz-border-radius:.9em; -webkit-border-radius:.9em; background-color:background|#dddddd; width:100%;"
 
{|style="border:.5em solid #aaaaaa; border-radius:.9em; -o-border-radius:radius|.9em; -icab-border-radius:.9em; -khtml-border-radius:.9em; -moz-border-radius:.9em; -webkit-border-radius:.9em; background-color:background|#dddddd; width:100%;"
!colspan="6" align="right"|<big>'''Tools</big>
+
!colspan="6" align="center"|<big>'''Tools</big>
 
|-
 
|-
 
|valign="top"|'''[[Vanguard]]'''
 
|valign="top"|'''[[Vanguard]]'''
Line 26: Line 32:
 
|valign="top"|'''[[Jynx2]]'''
 
|valign="top"|'''[[Jynx2]]'''
 
|valign="top"|''Version 2.0 of the classic [[LD_Preload]] userland rootkit written in [[C]]''
 
|valign="top"|''Version 2.0 of the classic [[LD_Preload]] userland rootkit written in [[C]]''
|
+
|-
 
|valign="top"|'''[[Bleeding Life]]'''
 
|valign="top"|'''[[Bleeding Life]]'''
 
|valign="top"|''[[PHP]] and [[MySQL]] based browser [[buffer overflow]] exploit pack''
 
|valign="top"|''[[PHP]] and [[MySQL]] based browser [[buffer overflow]] exploit pack''
|-
+
|
 
|valign="top"|'''[[Kolkata]]'''
 
|valign="top"|'''[[Kolkata]]'''
 
|valign="top"|''Configurable [[perl]] scanner that analyzes [[cryptography|checksums]] to perform fingerprinting on web applications with static file analysis''
 
|valign="top"|''Configurable [[perl]] scanner that analyzes [[cryptography|checksums]] to perform fingerprinting on web applications with static file analysis''
|
+
|-
 
|valign="top"|'''[[GScrape]]'''
 
|valign="top"|'''[[GScrape]]'''
 
|valign="top"|''Google scraper written [[perl]] for rapidly identifying vulnerable websites and generating statistics''
 
|valign="top"|''Google scraper written [[perl]] for rapidly identifying vulnerable websites and generating statistics''
Line 44: Line 50:
 
|valign="top"|'''[http://chokepoint.net/?id=5 Social Network Redirection Utility]'''
 
|valign="top"|'''[http://chokepoint.net/?id=5 Social Network Redirection Utility]'''
 
|valign="top"|''Rickroll your friends with forged image redirects''
 
|valign="top"|''Rickroll your friends with forged image redirects''
|
+
|-
|valign="top"|([[Special:AllPages|All Pages]])
+
|colspan="6" align="center" valign="top"|<small>([[Special:AllPages|All Pages]])</small>
 
|}
 
|}

Revision as of 06:58, 9 May 2012

c3el4.png
More tools and articles coming in June. Until then, you can get involved by joining IRC or subscribing to /r/blackhat.



Articles


Exploitation:

Stack overflowsSQL injectionXSSCookiesFile inclusionCommand injectionXSCFCold Fusion Hacking

Programming:

Ascii shellcodeCC++PerlPythonLUAPolymorphicThe bash book



Tools
Vanguard web application vulnerability testing engine written in perl with LibWhisker2 support Jynx2 Version 2.0 of the classic LD_Preload userland rootkit written in C
Bleeding Life PHP and MySQL based browser buffer overflow exploit pack Kolkata Configurable perl scanner that analyzes checksums to perform fingerprinting on web applications with static file analysis
GScrape Google scraper written perl for rapidly identifying vulnerable websites and generating statistics Lfi_autopwn.pl Given a file inclusion vulnerability, this Perl script will spawn a shell
Mysql5 enumerator Automatically map contents or query a remote database given a URL vulnerable to SQL injection with this perl script Social Network Redirection Utility Rickroll your friends with forged image redirects
(All Pages)