The standalone components of the library can be found at the following locations:
One infrastructure tool is available here:
I would recommend AttackAPI 0.8 to everyone who is interested in high-end hacking not because I wrote it but because it provides a good demonstration of what is possible today. That, I hope will take our awareness even further.
AttackAPI slowly moves to its 1.0 release where I am planning to standardize its core, fix discovered bugs and make it even more cross-platformed. Still, there is a long way to go but I am willing to take my chances. There are plans for 0.9 but I will keep them undisclosed for now.
So what 0.8 has to offer? There are a couple of things that worth attention. I will start in chronological order.
The Client interface can be used to enumerate the current client. It has functionalities to fingerprint the current operating system, installed plugins, the browser in use and the local NATed IP address and hostname. This tool is brilliant for doing the first steps of any targeted attack.
The Server, on the other hand, can be used to fingerprint the current server. It provides information about its domain, IP address, platform, server software and the application architecture. Its purpose is to identify what is currently available. That is important because the Web is very distributed and agile network and controlling dozens of infected clients is a mission on its own.
Full information on AttackAPI is available here:
- EvilFOCA – Network Attack Toolkit
- peinjector – MITM PE File Injector
- Weevely 3 – Weaponized PHP Web Shell
Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,929,019 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,233,884 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 653,412 views