Darknet https://www.darknet.org.uk Hacking Tools, Hacker News & Cyber Security Tue, 30 Apr 2019 08:07:05 +0000 en-US hourly 1 https://wordpress.org/?v=5.2.1 https://www.darknet.org.uk/images/darknet_logo_small.jpghttps://www.darknet.org.uk/images/darknet_logo_small.jpgdf6f0b SecLists – Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells https://www.darknet.org.uk/2019/04/seclists-usernames-passwords-urls-sensitive-data-patterns-fuzzing-payloads-web-shells/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed https://www.darknet.org.uk/2019/04/seclists-usernames-passwords-urls-sensitive-data-patterns-fuzzing-payloads-web-shells/#respond Tue, 30 Apr 2019 08:06:38 +0000 https://www.darknet.org.uk/?p=5106 SecLists – Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells

SecLists is the security tester’s companion. It’s a collection of multiple types of lists used during security assessments, collected in one place.

List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.

The goal is to enable a security tester to pull this repository onto a new testing box and have access to every type of list that may be needed.

Contents of SecLists

Each section has tonnes of content including the below:

  • Discovery lists (DNS, SNMP, Web content)
  • Fuzzing Payloads (Databases, LFI, SQLi, XSS)
  • Password lists (Common credentials, cracked hashes, honeypot captures, leaked lists)
  • Data Pattern lists
  • Payload files (Zip bombs, flash, images)
  • Username lists (Honeypot captures)
  • Web shells

Install SecLists

Zip

wget -c https://github.com/danielmiessler/SecLists/archive/master.zip -O SecList.zip \
&& unzip SecList.zip \
&& rm -f SecList.zip

Git (Small)

git clone --depth 1 https://github.com/danielmiessler/SecLists.git

Git (Complete)

git clone git@github.com:danielmiessler/SecLists.git

You can access all the lists here:

https://github.com/danielmiessler/SecLists

Read the rest of SecLists – Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells now! Only available at Darknet.

]]>
https://www.darknet.org.uk/2019/04/seclists-usernames-passwords-urls-sensitive-data-patterns-fuzzing-payloads-web-shells/feed/ 0
DeepSound – Audio Steganography Tool https://www.darknet.org.uk/2019/03/deepsound-audio-steganography-tool/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed https://www.darknet.org.uk/2019/03/deepsound-audio-steganography-tool/#comments Tue, 05 Mar 2019 10:34:11 +0000 http://www.darknet.org.uk/?p=4487 DeepSound – Audio Steganography Tool

DeepSound is an audio steganography tool and audio converter that hides secret data into audio files, the application also enables you to extract secret files directly from audio files or audio CD tracks.

This audio steganography tool can be used as copyright marking software for wave, flac, wma, ape, and audio CD.

DeepSound also support encrypting secret files using AES-256(Advanced Encryption Standard) to improve data protection. The application additionally contains an easy to use Audio Converter Module that can encode several audio formats (FLAC, MP3, WMA, WAV, APE) to others (FLAC, MP3, WAV, APE).

Read the rest of DeepSound – Audio Steganography Tool now! Only available at Darknet.

]]>
https://www.darknet.org.uk/2019/03/deepsound-audio-steganography-tool/feed/ 1
What are the MOST Critical Web Vulnerabilities in 2019? https://www.darknet.org.uk/2019/02/what-are-the-most-critical-web-vulnerabilities-in-2019/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed Wed, 27 Feb 2019 06:43:24 +0000 https://www.darknet.org.uk/?p=5114 What are the MOST Critical Web Vulnerabilities in 2019?

So what is wild on the web this year? Need to know about the most critical web vulnerabilities in 2019 to protect your organization?

Well luckily for you Acunetix compiles an annual web application vulnerability report which is a fairly hefty piece of analysis on data gathered from the previous year. This is compiled from the automated web and network perimeter scans run on the Acunetix Online platform, over a 12 month period, across more than 10,000 scan targets.

Read the rest of What are the MOST Critical Web Vulnerabilities in 2019? now! Only available at Darknet.

]]>
GoBuster – Directory/File & DNS Busting Tool in Go https://www.darknet.org.uk/2019/02/gobuster-directory-file-dns-busting-tool-in-go/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed Mon, 25 Feb 2019 03:50:51 +0000 https://www.darknet.org.uk/?p=5107 GoBuster – Directory/File & DNS Busting Tool in Go

GoBuster is a Go-based tool used to brute-force URIs (directories and files) in web sites and DNS subdomains (with wildcard support) – essentially a directory/file & DNS busting tool.

The author built YET ANOTHER directory and DNS brute forcing tool because he wanted..

  • … something that didn’t have a fat Java GUI (console FTW).
  • … to build something that just worked on the command line.
  • … something that did not do recursive brute force.

Read the rest of GoBuster – Directory/File & DNS Busting Tool in Go now! Only available at Darknet.

]]>
BDFProxy – Patch Binaries via MiTM – BackdoorFactory + mitmproxy https://www.darknet.org.uk/2019/02/bdfproxy-patch-binaries-via-mitm-backdoorfactory-mitmproxy/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed Mon, 04 Feb 2019 05:52:28 +0000 http://www.darknet.org.uk/?p=3966 BDFProxy – Patch Binaries via MiTM – BackdoorFactory + mitmproxy

BDFProxy allows you to patch binaries via MiTM with The Backdoor Factory combined with mitmproxy enabling on the fly patching of binary downloads (software updates for example) from vendors that don’t validate data integrity.

The Backdoor Factory allows you to patch binaries with shell-code so combining that with mitmproxy, which is a Python proxy-server that can catch HTTP, change traffic on the fly, replay traffic, decode and render primitive data types – gives you BDFProxy.

Read the rest of BDFProxy – Patch Binaries via MiTM – BackdoorFactory + mitmproxy now! Only available at Darknet.

]]>
Domained – Multi Tool Subdomain Enumeration https://www.darknet.org.uk/2019/01/domained-multi-tool-subdomain-enumeration/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed Sun, 20 Jan 2019 07:26:03 +0000 https://www.darknet.org.uk/?p=5049 Domained – Multi Tool Subdomain Enumeration

Domained is a multi tool subdomain enumeration tool that uses several subdomain enumeration tools and wordlists to create a unique list of subdomains that are passed to EyeWitness for reporting.

This produces categorized screenshots, server response headers and signature based default credential checking. It is written in Python heavily leveraging Recon-ng.

Domains Subdomain Enumeration Tools Leveraged

Subdomain Enumeraton Tools:

  • Sublist3r
  • enumall
  • Knock
  • Subbrute
  • massdns
  • Recon-ng
  • Amass
  • SubFinder

Reporting + Wordlists:

  • EyeWitness
  • SecList (DNS Recon List)
  • LevelUp All.txt Subdomain List

Domained Subdomain Enumeration Tool Usage

--install/--upgrade Both do the same function – install all prerequisite tools
--vpn Check if you are on VPN (update with your provider)
--quick Use ONLY Amass and SubFinder
--bruteall Bruteforce with JHaddix All.txt List instead of SecList
--fresh Delete old data from output folder
--notify Send Pushover or Gmail Notifications
--active EyeWitness Active Scan
--noeyewitness No Eyewitness
-d The domain you want to preform recon on
-b Bruteforce with subbrute/massdns and SecList wordlist
-s n Only HTTPs domains
-p Add port 8080 for HTTP and 8443 for HTTPS

Subdomain Enumeration Examples

First Steps are to install required Python modules and tools:

sudo pip install -r ./ext/requirements.txt
sudo python domained.py --install

Example 1 – Uses subdomain example.com (Sublist3r (+subbrute), enumall, Knock, Amass, and SubFinder)

python domained.py -d example.com

Example 2: – Uses subdomain example.com with seclist subdomain list bruteforcing (massdns, subbrute, Sublist3r, Amass, enumall, and SubFinder), adds ports 8443/8080 and checks if on VPN

python domained.py -d example.com -b -p --vpn

Example 3: – Uses subdomain example.com with large-all.txt bruteforcing (massdns, subbrute, Sublist3r, Amass, enumall and SubFinder)

python domained.py -d example.com -b --bruteall

Example 4: – Uses subdomain example.com and only Amass and SubFinder

python domained.py -d example.com --quick

Example 5: – Uses subdomain example.com, only Amass and SubFinder and notification

python domained.py -d example.com --quick --notify

Example 6: – Uses subdomain example.com with no EyeWitness

python domained.py -d example.com --noeyewitness

Note: --bruteall must be used with the -b flag

You can download Domained here:

domained-master.zip

Or read more here.

Read the rest of Domained – Multi Tool Subdomain Enumeration now! Only available at Darknet.

]]>
Acunetix Vulnerability Scanner For Linux Now Available https://www.darknet.org.uk/2018/12/acunetix-vulnerability-scanner-for-linux-now-available/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed Wed, 19 Dec 2018 16:00:39 +0000 https://www.darknet.org.uk/?p=5101 Acunetix Vulnerability Scanner For Linux Now Available

Acunetix Vulnerability Scanner For Linux is now available, now you get all of the functionality of Acunetix, with all of the dependability of Linux.

Following extensive customer research, it became clear to us that a number of customers and security community professionals preferred to run on Linux. Tech professionals have long chosen Linux for their servers and computers due to its robust security. However, in recent years, this open source operating system has become much more user-friendly.

Read the rest of Acunetix Vulnerability Scanner For Linux Now Available now! Only available at Darknet.

]]>
Gerix WiFi Cracker – Wireless 802.11 Hacking Tool With GUI https://www.darknet.org.uk/2018/12/gerix-wifi-cracker-wireless-802-11-hacking-tool-with-gui/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed https://www.darknet.org.uk/2018/12/gerix-wifi-cracker-wireless-802-11-hacking-tool-with-gui/#comments Sun, 16 Dec 2018 20:17:06 +0000 https://www.darknet.org.uk/?p=4540 Gerix WiFi Cracker – Wireless 802.11 Hacking Tool With GUI

Gerix WiFi cracker is an easy to use Wireless 802.11 Hacking Tool with a GUI, it was originally made to run on BackTrack and this version has been updated for Kali (2018.1).

To get it up and running make sure you do:

apt-get install qt4-dev-tools

Running Gerix Wireless 802.11 Hacking Tool

$ python gerix.py

You can download Gerix here:

gerix-wifi-cracker-master.zip

Or read more here.

Read the rest of Gerix WiFi Cracker – Wireless 802.11 Hacking Tool With GUI now! Only available at Darknet.

]]>
https://www.darknet.org.uk/2018/12/gerix-wifi-cracker-wireless-802-11-hacking-tool-with-gui/feed/ 1
Malcom – Malware Communication Analyzer https://www.darknet.org.uk/2018/11/malcom-malware-communication-analyzer/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed Wed, 28 Nov 2018 19:02:29 +0000 https://www.darknet.org.uk/?p=4555 Malcom – Malware Communication Analyzer

Malcom is a Malware Communication Analyzer designed to analyze a system’s network communication using graphical representations of network traffic, and cross-reference them with known malware sources.

This comes handy when analyzing how certain malware species try to communicate with the outside world.

Malcom Malware Communication Analyzer Features

Malcom can help you:

  • Detect central command and control (C&C) servers
  • Understand peer-to-peer networks
  • Observe DNS fast-flux infrastructures
  • Quickly determine if a network artifact is ‘known-bad’

The aim of Malcom is to make malware analysis and intel gathering faster by providing a human-readable version of network traffic originating from a given host or network.

Read the rest of Malcom – Malware Communication Analyzer now! Only available at Darknet.

]]>
WepAttack – WLAN 802.11 WEP Key Hacking Tool https://www.darknet.org.uk/2018/11/wepattack-wlan-802-11-wep-key-hacking-tool/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed https://www.darknet.org.uk/2018/11/wepattack-wlan-802-11-wep-key-hacking-tool/#comments Fri, 23 Nov 2018 13:47:01 +0000 https://www.darknet.org.uk/?p=4812 WepAttack – WLAN 802.11 WEP Key Hacking Tool

WepAttack is a WLAN open source Linux WEP key hacking tool for breaking 802.11 WEP keys using a wordlist based dictionary attack.

This tool is based on an active dictionary attack that tests millions of words to find the right key. Only one packet is required to start an attack.

What is a WEP Key?

Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11 wireless networks. Introduced as part of the original 802.11 standard ratified in 1997, its intention was to provide data confidentiality comparable to that of a traditional wired network.[1] WEP, recognizable by its key of 10 or 26 hexadecimal digits (40 or 104 bits), was at one time widely in use and was often the first security choice presented to users by router configuration tools.

Read the rest of WepAttack – WLAN 802.11 WEP Key Hacking Tool now! Only available at Darknet.

]]>
https://www.darknet.org.uk/2018/11/wepattack-wlan-802-11-wep-key-hacking-tool/feed/ 1