Archive | October, 2012

Web-Sorrow v1.48 – Version Detection, CMS Identification, Enumeration & Server Scanning Tool

Find your website's Achilles' Heel


Web-Sorrow is a PERL based tool for misconfiguration, version detection, enumeration, and server information scanning. It’s entirely focused on enumeration and collecting information about a target server. Web-Sorrow is a “safe to run” program, meaning it is not designed to be an exploit or perform any harmful attacks.

There’s a couple of other tools that focus more on the identification part:

WhatWeb – Next Gen Web Scanner – Identify CMS (Content Management System)
Wappalyzer – Web Technology Identifier (Identify CMS, JavaScript etc.)

There’s also a pretty cool web app I use often which is – http://builtwith.com/

Features

  • Web Services: Identify a CMS and it’s version number, social media widgets and buttons, hosting provider, CMS plugins, and favicon fingerprints
  • Authentication areas: logins, admin logins, email webapps
  • Bruteforce: Subdomains, files and directories
  • Stealth: with -ninja you can gather valuable info on the target with as few as 6 requests, with -shadow you can request pages via google cache instead of from the host
  • AND MORE: Sensitive files, default files, source disclosure, directory indexing, banner grabbing

In some ways it overlaps with other tools too like:

GoLISMERO – Web Application Mapping Tool
Skipfish 1.94b Released – Active Web Application Security Reconnaissance Tool
Nikto 2.1.0 Released – Web Server Security Scanning Tool
Lilith – Web Application Security Audit Tool

But as always, you should try them all and see which ones suits the way you work best.

You can download Web-Sorrow here:

Web-Sorrow_v1.4.8.zip

Or read more here.


Posted in: Hacking Tools, Privacy, Web Hacking

Tags: , , , , , , , , , ,

Posted in: Hacking Tools, Privacy, Web Hacking | Add a Comment
Recent in Hacking Tools:
- MANA Toolkit – Rogue Access Point (evilAP) And MiTM Attack Tool
- BBQSQL – Blind SQL Injection Framework
- DET – Data Exfiltration Toolkit

Related Posts:

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,992,185 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,477,721 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 687,078 views

Get protected with Sucuri


Hackers Break Into White House Military Network

Find your website's Achilles' Heel


It’s been a while, but hey I’m back! So here’s a news story that caught my eye today – it’s been a while since we’ve reported on a Spear Phishing attack, and guess what? Yes, last time it was also perpetrated by Chinese, but it was targeting Google’s Gmail.

Targeted Phishing Attacks Carried Out On Gmail – Likely From China

This time however the target was a little more serious, the US White House military network (WHMO). It’s pretty scary stuff, if a foreign power was able to take over control of the network used to co-ordinate nuclear attacks..

Hackers reportedly attempted a brazen attack on a White House military network in charge of the president’s nuclear football.

US officials familiar with the incident said unidentified hackers launched an attack early last month on the network used by the White House Military Office (WHMO), an military office in charge of sensitive communications, including systems to send and authenticate nuclear strike commands. The office is also responsible for arranging presidential communications and travel. However it seems only less significant systems were targeted by an assault that was, in any case, ultimately unsuccessful.

An unnamed Obama national security official said: “This was a spear phishing attack against an unclassified network.”

“In this instance the attack was identified, the system was isolated, and there is no indication whatsoever that any exfiltration of data took place,” the official said, the Washington Free Beacon (a Conservative blog that broke the story) reports.

It seems like some people in the White House need some education though if these kind of attacks are getting through, even if no data was actually lost – it’s not a good sign. And why are such critical systems even accessible from the Internet?

Even if the attack failed, it shows that something is very wrong with the architecture and network segregation.


Follow-up reports suggest that a dodgy email with a malicious attachment made it past perimeter defences and onto someone’s desktop, where it might have been opened, and a machine infected. But this machine was quickly identified and isolated before any damage was done.

Rob Rachwald, director of security strategy at Imperva, said the attempted attack should nonetheless act as a wake up call.

“Yet again traditional security software has failed to keep the bad guys out. Enterprise needed to assume that they have been compromised which means we need to detect abnormal access to data and Intellectual Property. This is yet another example of why we need to rethink the current security model and implement a new one that puts cameras on sensitive information.”

The attack was launched from Chinese networks, which by itself doesn’t mean much. However some officials seem to reckon the Chinese military cyber warfare specialists, working as part of a unit called the 4th Department of General Staff of the People’s Liberation Army, or 4PLA, are the most likely suspects behind the attack.

Obviously the Cyber Security Czar that was talked about at the start of the Obama administration isn’t doing a very good job.

It just goes to show how hard it is to secure critical data, and still give people reasonable access rights to it. It’s a constant struggle between security and usability, as security levels increase – usability decreases and everything tends to become a pain in the arse.

Either way it gives some good insights into the fact that the White House needs to get their act together.

Source: The Register


Posted in: General Hacking, Legal Issues, Phishing

Tags: , , , , , , , , , , , , , , ,

Posted in: General Hacking, Legal Issues, Phishing | Add a Comment
Recent in General Hacking:
- BADLOCK – Are ‘Branded’ Exploits Going Too Far?
- Dradis – Reporting Platform For IT Security Professionals
- Kid Gets Arrested For Building A Clock – World Goes NUTS

Related Posts:

Most Read in General Hacking:
- 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) - 1,171,953 views
- Hack Tools/Exploits - 631,119 views
- Password Cracking with Rainbowcrack and Rainbow Tables - 436,605 views

Get protected with Sucuri