UPDATE: This probably only affects the VMWare image, you will know if it also affects the Kali install if your hashes match my sample hashes below. So the fine folks at offensive security released this new distro called “Kali Linux” recently, which is essentially: Replacing Backtrack Based on Debian (instead of Ubuntu) One of the …
An interesting tool for Java source code analysis is OWASP LAPSE Plus. You can see the instructions to set it up on the project’s page or here. OWASP LAPSE Plus requires Eclipse Helios and a number of people who know more than me at stack overflow suggest that you should not install eclipse using apt-get. …
NOTE: I also posted this to the BeEF Project Wiki here Some Backtrack 5 security tools need ruby 1.8 (i.e. whatweb) and others ruby 1.9.2 (i.e. BeEF). This script automates the switch. By setting the ruby environment to the correct ruby version we can run all tools. This script aims to make this small task …
This is just a quick note to let you know that I recently put together a Backtrack 5 Installation Script on the BeEF project wiki here. You won’t have to install BeEF by hand on your Backtrack 5 H4x0r server farms and clouds anymore ;).
Let’s imagine the following fictional scenario: You are operating on a shoe string security budget. An old Windows XP SP0 machine was compromised and you are tasked with acquiring a raw hard drive image so that you can perform some forensics on that image later on. To keep things simple we are leaving memory forensics …
A nice tool for SSL cipher testing is this Perl script: ssl-cipher-check.pl, however, in Backtrack and also on other distros you may get this error the first time you run it: ssl-cipher-check.pl -vw my.exampledomain.com 443 … ERROR: Unable to find /usr/bin/gnutls-cli-debug. Please install the gnutls-devel package To avoid that simply install the missing package as …
In a recent pen test, after compromising the host machine I faced the fact that LM hashes were disabled, and the passwords in use were relatively strong so the normal dictionary and brute-force attacks would not work straightaway. Because it was a long pen test, I had an idea: I could use the meterpreter key …
When Testing for HTTP Methods and XST a common vulnerability to find is XST. When you manually verify that this vulnerability is truly present (i.e. not a tool false positive) you can use tools like netcat but sometimes the web server is using SSL and netcat will not work straightaway. You can get around this …
Unlike previous Backtrack versions Nessus now comes installed by default on Backtrack 5. This is very cool because all that is left for you is to activate Nessus! If that was not enough, when you upgrade Backtrack the instructions to register are just shown to you: …. root@bt:~# apt-get upgrade … – Please run /opt/nessus/sbin/nessus-adduser …
Update 19:00 – Also related to this is this post by Carlos Perez, Unfortunately the script is not yet in the metasploit trunk today. But you can download it and copy it to the appropriate folders in the meantime. So, I compromised a Win2k8 R2 x64 host during a pen test and wanted to dump …