Cloudflare-Recon is forked from Cloudflare-enum which is written in Python. It obtains the DNS zone record from a website that protected by CloudFlare. This tool is a Swiss Army Knife that can be defensive and/or offensive.
CloudFlare is a cloud based service that provides Distributed Denial of Service (DDos) or DoS as well as Web Application Firewall (WAF) protection to the websites. The real IP address of the websites that protected by Cloudflare will be hidden as purpose. However, Cloudflare is a well known company that aiding and abetting criminals who host their websites behind it for malicious activities.
When the DNS zone records are configured incorrectly, the IP address of the server cannot be hidden and Cloudflare cannot protect you from being DDoS/DoS.
This tool is useful for law enforcements, hackers and sysadmins for finding out the real IP of the website that protected by Cloudflare.
Cloudflare-Recon is modified by Samiux.
Changlog :
Version: 0.1 - Sept 10, 2017 GMT+8
[+] Forked from Cloudflare-enum
[+] Enhancement
Version: 0.2 - Sept 12, 2017 GMT+8
[+] Improve readable foramtted output
[+] Error handling
That's all! See you.
Open Source is a great idea and it has changed the world!
Open Source forever ....
While you do not know attack, how can you know about defense? (未知攻,焉知防?)
Do BAD things .... for the RIGHT reasons -- OWASP ZAP
It is easier to port a shell than a shell script. -- Larry Wall
Most of you are familiar with the virtues of a programmer. There are three, of course: laziness, impatience, and hubris. -- Larry Wall
为天地立心, 为生民立命, 为往圣继绝学, 为万世开太平。 -- 王炜
Tuesday, September 12, 2017
Sunday, September 10, 2017
Cloudflare-Recon version 0.1 Demo
Cloudflare-Recon is forked from Cloudflare-enum which is written in Python. It obtains the DNS zone record from a website that protected by CloudFlare. This tool is a Swiss Army Knife that can be defensive and/or offensive.
CloudFlare is a cloud based service that provides Distributed Denial of Service (DDos) or DoS as well as Web Application Firewall (WAF) protection. The real IP address of the websites that protected by Cloudflare will be hidden as purpose. However, Cloudflare is a well known company that aiding and abetting criminals who host their websites behind it for malicious activities.
When the DNS zone records are configured incorrectly, the IP address of the server cannot be hidden and Cloudflare cannot protect you from being DDoS/DoS.
This tool is useful for law enforcements, hackers and sysadmins for finding out the real IP of the website that protected by Cloudflare.
Cloudflare-Recon is modified by Samiux on Sept 10, 2017.
Version: 0.1 - Sept 10, 2017 GMT+8
[+] Enhancement
That's all! See you.
CloudFlare is a cloud based service that provides Distributed Denial of Service (DDos) or DoS as well as Web Application Firewall (WAF) protection. The real IP address of the websites that protected by Cloudflare will be hidden as purpose. However, Cloudflare is a well known company that aiding and abetting criminals who host their websites behind it for malicious activities.
When the DNS zone records are configured incorrectly, the IP address of the server cannot be hidden and Cloudflare cannot protect you from being DDoS/DoS.
This tool is useful for law enforcements, hackers and sysadmins for finding out the real IP of the website that protected by Cloudflare.
Cloudflare-Recon is modified by Samiux on Sept 10, 2017.
Version: 0.1 - Sept 10, 2017 GMT+8
[+] Enhancement
That's all! See you.
Labels:
Cloudflare-Recon,
Ubuntu
HatCloud-ng version 0.1 Demo
HatCloud-ng is forked from HatCloud which is written in Ruby. It obtains the "Real IP Address" from a website that protected by CloudFlare. This tool is a Swiss Army Knife that can be defensive and/or offensive.
CloudFlare is a cloud based service that provides Distributed Denial of Service (DDos) or DoS as well as Web Application Firewall (WAF) protection. The real IP address of the websites that protected by Cloudflare will be hidden as purpose. However, Cloudflare is a well known company that aiding and abetting criminals who host their websites behind it for malicious activities.
When the DNS zone records are configured incorrectly, the IP address of the server cannot be hidden and Cloudflare cannot protect you from being DDoS/DoS.
This tool is useful for law enforcements, hackers and sysadmins for finding out the real IP of the website that protected by Cloudflare.
HatCloud-ng is modified by Samiux on Sept 10, 2017.
Version: 0.1 - Sept 10, 2017 GMT+8
[+] Bug fixes for original HatCloud dated 2017-09-10
[+] Information and error handling enhancement
That's all! See you.
CloudFlare is a cloud based service that provides Distributed Denial of Service (DDos) or DoS as well as Web Application Firewall (WAF) protection. The real IP address of the websites that protected by Cloudflare will be hidden as purpose. However, Cloudflare is a well known company that aiding and abetting criminals who host their websites behind it for malicious activities.
When the DNS zone records are configured incorrectly, the IP address of the server cannot be hidden and Cloudflare cannot protect you from being DDoS/DoS.
This tool is useful for law enforcements, hackers and sysadmins for finding out the real IP of the website that protected by Cloudflare.
HatCloud-ng is modified by Samiux on Sept 10, 2017.
Version: 0.1 - Sept 10, 2017 GMT+8
[+] Bug fixes for original HatCloud dated 2017-09-10
[+] Information and error handling enhancement
That's all! See you.
Labels:
HatCloud-ng,
Ubuntu
Saturday, September 09, 2017
HOWTO : Install Metasploit Framework on Ubuntu 16.04.3 LTS
Metasploit Framework is a exploit framework.
Step 1 :
Answer "yes" when you see this prompt message :
Would you like to use and setup a new database (recommended)? yes
Update and Upgrade
That's all! See you.
Step 1 :
sudo apt install curl
cd ~
mkdir infosec
cd ~/infosec
curl https://raw.githubusercontent.com/rapid7/metasploit-omnibus/master/config/templates/metasploit-framework-wrappers/msfupdate.erb > msfinstall && chmod 755 msfinstall && ./msfinstall
msfconsole
Answer "yes" when you see this prompt message :
Would you like to use and setup a new database (recommended)? yes
Update and Upgrade
sudo apt update
sudo apt dist-upgrade
That's all! See you.
Labels:
Metasploit,
Ubuntu
HOWTO : Install John on Ubuntu 16.04.3 LTS
John is a password cracker.
Step 1 :
Step 2 :
Update and Upgrade
That's all! See you.
Step 1 :
sudo apt install git build-essential libssl-dev
Step 2 :
cd ~
mkdir infosec
cd infosec
git clone https://github.com/magnumripper/JohnTheRipper.git
cd JohnTheRipper/src
./configure
make clean
make
cd ../run
./john --help
Update and Upgrade
sudo apt update
sudo apt dist-upgrade
cd ~/infosec/JohnTheRipper
git pull origin master
cd src
./configure
make clean
make
That's all! See you.
HOWTO : Install THC-Hydra on Ubuntu 16.04.3 LTS
THC-Hydra is a password brute forcer.
Step 1 :
Step 2 :
Update and Upgrade
Step 1 :
sudo apt install git build-essential libssl-dev libssh-dev libidn11-dev libpcre3-dev libgtk2.0-dev libmysqlclient-dev libpq-dev libsvn-dev firebird-dev libncurses5-dev
Step 2 :
cd ~
mkdir infosec
cd infosec
git clone https://github.com/vanhauser-thc/thc-hydra.git
cd thc-hydra
./configure
make
./hydra -h
./xhydra
Update and Upgrade
sudo apt update
sudo apt dist-upgrade
cd ~/infosec/thc-hydra
git pull origin master
make clean
./configure
make
That's all! See you.
HOWTO : Install Recon-ng on Ubuntu 16.04.3 LTS
Recon-ng is a full-featured Web Reconnaissance framework.
Step 1 :
Step 2 :
Step 3 :
Update and Upgrade
That's all! See you.
Step 1 :
sudo apt install git python-pip python-dnspython python-mechanize python-slowaes python-xlsxwriter python-jsonrpclib python-lxml
Step 2 :
pip install dicttoxml --upgrade
Step 3 :
cd ~
mkdir infosec
cd ~/infosec
git clone https://LaNMaSteR53@bitbucket.org/LaNMaSteR53/recon-ng.git
cd recon-ng
./recon-ng
Update and Upgrade
sudo apt update
sudo apt dist-upgrade
pip install dicttoxml --upgrade
cd ~/infosec/recon-ng
git pull origin master
That's all! See you.
Friday, September 08, 2017
HOWTO : Install Weevely3 on Ubuntu 16.04.3 LTS
Weevely3 is a web shell and it is hardly detected by Anti-Virus and the traffic is obfuscated within the HTTP requests.
Step 1 :
Step 2 :
Update and Upgrade
Reference
Documentation
That's all! See you.
Step 1 :
sudo apt install g++ python-pip libyaml-dev python-dev libncurses5 libncurses5-dev
mkdir infosec
git clone https://github.com/epinna/weevely3.git
cd weevely3
pip install -r requirements.txt --upgrade
Step 2 :
cd ~/infosec/weevely3
python weevely3.py -h
Update and Upgrade
sudo apt update
sudo apt dist-upgrade
cd ~/infosec/weevely3
git pull origin master
pip install -r requirements.txt --upgrade
Reference
Documentation
That's all! See you.
HOWTO : Install Vega 1.0 on Ubuntu 16.04.3 LTS
Vega is an open source web application vulnerability scanner.
Step 1 :
Step 2 :
That's all! See you.
Step 1 :
sudo apt install libwebkitgtk-1.0 default-jdk unzip
mkdir infosec
cd ~/infosec
wget https://dist.subgraph.com/downloads/VegaBuild-linux.gtk.x86_64.zip
unzip VegaBuild-linux.gtk.x86_64.zip
Step 2 :
cd vega
./Vega
That's all! See you.
Thursday, September 07, 2017
HOWTO : Install SpiderFoot on Ubuntu 16.04.3 LTS
SpiderFoot is an open source intelligence automation tool.
Step 1 :
Step 2 :
Step 3 : (Optional)
If you want to implement login feature, you need to :
Step 4 :
To run it :
Step 1 :
sudo apt install git python-lxml python-netaddr python-m2crypto python-cherrypy3 python-mako python-requests python-bs4
Step 2 :
cd ~/
mkdir infosec
cd ~/infosec
git clone https://github.com/smicallef/spiderfoot.git
Step 3 : (Optional)
If you want to implement login feature, you need to :
echo "admin:admin" > ~/infosec/spiderfoot/passwd
Step 4 :
To run it :
cd ~/infosec/spiderfoot
python ./sf.py
Step 5 :
Open your browser and point to http://127.0.0.1:5001
* Make sure to add API Keys to the related items in the settings.
Update and Upgrade
sudo apt update
sudo apt dist-upgrade
cd ~/infosec/spiderfoot
git pull origin master
Reference
Documentation
That's all! See you.
Labels:
Spiderfoot,
Ubuntu
HOWTO : Install OpenVAS 9 on Ubuntu 16.04.3 LTS
OpenVAS is an open source vulnerability scanner.
Step 1 :
* Make sure you install sqlite3 first, otherwise, the openvas9 will fail to install.
Step 2 :
To enable pdf reports:
To install openvas-nasl utility:
Step 3 :
Step 4 :
Step 5 :
Default URL is https://localhost:4000
Use "admin" as username and password.
Step 6 : (Optional)
If you want to change port number, you need to :
That's all! See you.
Step 1 :
sudo add-apt-repository ppa:mrazavi/openvas
sudo apt update
sudo apt install sqlite3
sudo apt install openvas9
* Make sure you install sqlite3 first, otherwise, the openvas9 will fail to install.
Step 2 :
To enable pdf reports:
sudo apt install texlive-latex-extra --no-install-recommends
sudo apt install texlive-fonts-recommended
To install openvas-nasl utility:
sudo apt-get install libopenvas9-dev
Step 3 :
sudo greenbone-nvt-sync
sudo greenbone-scapdata-sync
sudo greenbone-certdata-sync
Step 4 :
sudo systemctl restart openvas-scanner
sudo systemctl restart openvas-manager
sudo openvasmd --migrate (#only required when upgrading from an older version)
sudo openvasmd --rebuild --progress
Step 5 :
Default URL is https://localhost:4000
Use "admin" as username and password.
Step 6 : (Optional)
If you want to change port number, you need to :
sudo nano /etc/default/openvas-gsa
sudo systemctl restart openvas-gsa
That's all! See you.
Tuesday, September 05, 2017
HOWTO : Install SQLMap on Ubuntu 16.04.3 LTS
Metasploit Framework is required for SQLMap takeover process. The following is the complete SQLMap installation procedure on Ubuntu 16.04.3 LTS.
Step 1 :
Step 2 : Install SQLMap
Step 3 : Install Metasploit Framework
Answer "yes" when you see this prompt message :
Would you like to use and setup a new database (recommended)? yes
Step 4 : Install SQLMap Dependencies
Step 5 : Update/Upgrade
That's all! See you.
Step 1 :
sudo apt update
sudo apt dist-upgrade
sudo apt install git python-pip curl
Step 2 : Install SQLMap
cd ~/
mkdir infosec
cd ~/infosec
git clone https://github.com/sqlmapproject/sqlmap.git
Step 3 : Install Metasploit Framework
cd ~/infosec
curl https://raw.githubusercontent.com/rapid7/metasploit-omnibus/master/config/templates/metasploit-framework-wrappers/msfupdate.erb > msfinstall && chmod 755 msfinstall && ./msfinstall
msfconsole
Answer "yes" when you see this prompt message :
Would you like to use and setup a new database (recommended)? yes
Step 4 : Install SQLMap Dependencies
sudo apt install python-impacket python-ibm-db-sa python-kinterbasdb python-pyodbc python-pymssql python-pymysql python-psycopg2 python-pysqlite2 python-pymssql python-ntlm
pip install cx_Oracle --upgrade
Step 5 : Update/Upgrade
sudo apt update
sudo apt dist-upgrade
msfupdate
pip install cx_Oracle --upgrade
cd ~/infosec/sqlmap
python sqlmap.py --update
That's all! See you.
Labels:
Metasploit,
SQLmap,
Ubuntu
Subscribe to:
Posts (Atom)