Archives/2012

From aldeid
Jump to: navigation, search
Cewl-logo.png

CeWL, the Custom Word List generator

Thu, 17 May 2012 09:08:00 +0200

CeWL (pronounce "cool"), the Custom Word List generator is a ruby app which spiders a given url to a specified depth, optionally following external links, and returns a list of words which can then be used for password crackers such as John the Ripper. It has been written by DigiNinja.

Read more

Command-injection-logo.png

From command injection vulnerability to meterpreter

Sun, 06 May 2012 13:40:00 +0200

This tutorial shows how to take over a server (we will get a meterpreter) that hosts a web application vulnerable to command injection.

Read more

Dns2tcp-logo.png

dns2tcp

Sat, 14 Apr 2012 22:00:00 +0100

Dns2tcp is a tool for relaying TCP connections over DNS. Among other things, it can be used to bypass captive portals (e.g. hotels, airports, ...) when only port 53/udp is allowed by the firewall.

Read more

Hackademic-rtb2-logo.png

Hackademic RTB2 (Root This Box, Second Challenge)

Sun, 08 Apr 2012 23:39:00 +0100

This is the second challenge of Root This Box, Hackademic RTB2. Like the first challenge, Hackademic RTB2 is a vulnerable virtual machine and the objective is to become root by exploiting the vulnerabilities.

Read more

Hackademic-rtb1-logo.png

Hackademic RTB1 (Root This Box, First Challenge)

Sun, 08 Apr 2012 23:39:00 +0100

This is the first challenge of Root This Box, Hackademic RTB1. Hackademic RTB1 is a vulnerable virtual machine and the objective is to become root by exploiting the vulnerabilities and read the key in the /root directory.

Read more

Kioptrix4-logo.png

Kioptrix 4

Sat, 10 Dec 2012 08:23:00 +0100

Kioptrix4 is a deliberately vulnerable virtual machine which objective is to teach security. The entry point is a web based form and the objective is to get root.

Read more

Sqlmap-logo.png

Sqlmap

Sat, 10 Mar 2012 08:17:00 +0100

sqlmap is a very powerful tool that automates the process of detecting and exploiting SQL injections and taking over of database servers. It automatically detects forms and fields, and can, among other features, reverse the schema and read files on the server.

Read more

Themole-icon.png
Thu, 8 Dec 2011 19:24:00 +0100
Iscanner-icon.png
Sat, 1 Oct 2011 05:56:00 +0200
Inav-icon.png
Fri, 16 Sep 2011 19:05:00 +0200
Tellmeweb-icon.png
Fri, 12 Aug 2011 00:25:00 +0200
Fingerprint-icon.png
Tue, 09 Aug 2011 19:49:00 +0200
OSSEC-icon.png
Wed, 20 Jul 2011 19:36:00 +0200
Snorby-icon.png
Mon, 18 Jul 2011 13:03:00 +0200
Pytbull-icon.png
Sat, 30 Apr 2011 06:13:00 +0200
Pulledpork-icon.png
Mon, 18 Apr 2011 16:01:00 +0200
Suricata-vs-snort-icon.png
Mon, 11 Apr 2011 11:26:00 +0200


Older entries »