The standalone components of the library can be found at the following locations:
One infrastructure tool is available here:
I would recommend AttackAPI 0.8 to everyone who is interested in high-end hacking not because I wrote it but because it provides a good demonstration of what is possible today. That, I hope will take our awareness even further.
AttackAPI slowly moves to its 1.0 release where I am planning to standardize its core, fix discovered bugs and make it even more cross-platformed. Still, there is a long way to go but I am willing to take my chances. There are plans for 0.9 but I will keep them undisclosed for now.
So what 0.8 has to offer? There are a couple of things that worth attention. I will start in chronological order.
The Client interface can be used to enumerate the current client. It has functionalities to fingerprint the current operating system, installed plugins, the browser in use and the local NATed IP address and hostname. This tool is brilliant for doing the first steps of any targeted attack.
The Server, on the other hand, can be used to fingerprint the current server. It provides information about its domain, IP address, platform, server software and the application architecture. Its purpose is to identify what is currently available. That is important because the Web is very distributed and agile network and controlling dozens of infected clients is a mission on its own.
Full information on AttackAPI is available here:
- dirs3arch – HTTP File & Directory Brute Forcing Tool
- ODAT (Oracle Database Attacking Tool) – Test Oracle Database Security
- SHODAN – Expose Online Devices (Wind Turbines, Power Plants & More!)
Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,857,300 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,042,759 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 618,850 views