UPDATE: Kali Linux 2018.1 Release!

PenTestIT RSS Feed
Second post of the new year and it is about the latest Kali Linux 2018.1 release! The last Kali Linux release was made available in the month of November. As usual, this new release includes all patches, fixes, updates, and improvements since the last release – Kali Linux 2017.3. Importantly, a nasty bug that caused the Gnome ShellRead more about UPDATE: Kali Linux 2018.1 Release!
The post UPDATE: Kali Linux 2018.1 Release! appeared first on PenTestIT.

Link: http://pentestit.com/update-kali-linux-2018-1-release/

Kali Linux 2018.1 Release – The Best Penetration Testing Distribution

Kali Linux 2018.1 the first release of 2018, this fine release contains all updated packages and bug fixes since our 2017.3 release last November. This release wasn’t without its challenges–from the Meltdown and Spectre excitement (patches will be in the 4.15 kernel) to a couple of other nasty bugs.Kernel Updated to 4.14Kali Linux 2018.1 has a shiny new 4.14.12 kernel. New kernels always have a lot of new features and the 4.14 kernel is no exception, although two new features really stand out.AMD Secure Memory Encryption Support – Secure Memory Encryption is a feature that will be in newer AMD processors that enables automatic encryption and decryption of DRAM. The addition of this features means that systems will no longer (in theory) be vulnerable to cold-boot attacks because, even with physical access, the memory will be not be readable.Increased Memory Limits – Current (and older) 64-bit processors have a limit of 64 TB of physical address space and 256 TB of virtual address space (VAS), which was sufficient for more than a decade but with some server hardware shipping with 64 TB of memory, the limits have been reached. Fortunately, upcoming processors will enable 5-level paging, support for which is included in the 4.14 kernel. In short, this means that these new processors will support 4 PB of physical memory and 128 PB of virtual memory. That’s right, petabytes.Package UpdatesIn addition to the updated kernel, are also upgraded a number of packages, including zaproxy, secure-socket-funneling, pixiewps, seclists, burpsuite, dbeaver, and reaver. If you already have a Kali installation, you can easily get the latest version of these tools along with everything else that has been updated:apt update && apt full-upgradeNote that if you haven’t updated your Kali installation in some time (tsk2), you will like receive a GPG error about the repository key being expired (ED444FF07D8D0BF6). Fortunately, this issue is quickly resolved by running the following as root:wget -q -O – https://archive.kali.org/archive-key.asc | apt-key addHyper-V UpdatesFor those of you using Hyper-V to run the Kali virtual machines provided by Offensive Security, you will find that the Hyper-V virtual machine is now generation 2, which means it’s now UEFI-based and expanding/shrinking HDD is supported. The Hyper-V integration services are also included, which supports Dynamic Memory, Network Monitoring/Scaling, and Replication.Download Kali Linux 2018.1

Link: http://feedproxy.google.com/~r/PentestTools/~3/6cu8YZ3mWKM/kali-linux-20181-release-best.html

PiDense – Monitor Illegal Wireless Network Activities (Fake Access Points)

Monitor illegal wireless network activities.Similar SSID broadcastsSame SSID broadcastsCalculates unencrypted wireless networks densityWatches SSID broadcasts at the blacklist.Capabilities (Now)Calculates Unencrypted wireless network densityFinds same ssid, different encryptionWorking Principle for PiDenseCollects all the packets from Wireless Networks.Analyzes all the beacon packets.If PiDens detects more than defined threshold of OPN number, or different encryption with same SSID info ;Logs the activity with some extra information within defined template.Soon to be added featuresBlacklist SSID analysisCompany name setting for illegal wireless attack activities (Monitoring)ExampleUsageRequirementsHardware: TP LINK TL-WN722NModules: scapy, time, termcolor, argparseKali Linux:Download PiDense:git clone https://github.com/WiPi-Hunter/PiDense.gitInstall Python librarie(s):pip install termcolorIt’s done!Run the program with following command:Monitor mode:airmon-ng start interface(wlan0,wlan1) (Monitor mode)or ifconfig wlan0 downiwconfig wlan0 mode Monitorifconfig wlan0 upRun:cd PiDensepython pidense.py -hDownload PiDense

Link: http://feedproxy.google.com/~r/PentestTools/~3/Jkfd0DWlI0c/pidense-monitor-illegal-wireless.html

Post Exploitation Using WMIC (System Command)

This article is about Post Exploitation using the WMIC (Windows Management Instrumentation Command Line). When an Attacker gain a meterpreter session on a Remote PC, then he/she can enumerate a huge amount of information and make effective changes using the WMI Command Line. To do this, we will first get the meterpreter session on the… Continue reading →
The post Post Exploitation Using WMIC (System Command) appeared first on Hacking Articles.

Link: http://www.hackingarticles.in/post-exploitation-using-wmic-system-command/

SocialFish – Ultimate phishing tool with Ngrok integrated

Ultimate phishing tool with Ngrok integrated.PREREQUISITESPython 2.7Wget from PythonPHPTESTED ONKali Linux – ROLLING EDITIONCLONEgit clone https://github.com/UndeadSec/SocialFish.gitRUNNINGcd SocialFishsudo pip install -r requirements.txtpython SocialFish.pyAVAILABLE PAGES+ Facebook:Traditional Facebook login page.Advanced login with Facebook.+ Google:Traditional Google login page.Advanced login with Facebook.+ LinkedIN:Traditional LinkedIN login page.+ Github:Traditional Github login page.+ Stackoverflow:Traditional Stackoverflow login page.+ WordPress:Similar WordPress login page.Download SocialFish

Link: http://feedproxy.google.com/~r/PentestTools/~3/BtjAqwH_F9c/socialfish-ultimate-phishing-tool-with.html

Nmap Scans using Hex Value of Flags

In this article we are going to scan the target machine by sending TCP flags through their hexadecimal value and the actual Flag name can be confirm by analysis of Nmap traffic through Wireshark. Let’s have a look over Hex value of TCP Flag in given below table which we are going to use in… Continue reading →
The post Nmap Scans using Hex Value of Flags appeared first on Hacking Articles.

Link: http://www.hackingarticles.in/nmap-scans-using-hex-value-flags/

Manual Post Exploitation on Windows PC (System Command)

This article is about Post Exploitation on the Victim’s System using the Windows Command Line. When an Attacker gains a meterpreter session on a Remote PC, then he/she can enumerate a huge amount of information and make effective changes using the knowledge of the Windows Command Line. Requirement Attacker: Kali Linux TarObtain: Window PC To… Continue reading →
The post Manual Post Exploitation on Windows PC (System Command) appeared first on Hacking Articles.

Link: http://www.hackingarticles.in/manual-post-exploitation-windows-pc-system-command/

Wavecrack – Web Interface For Password Cracking With Hashcat

A user-friendly Web interface to share an hashcat cracking box among multiple users with some pre-defined options.ScreenshotsThe homepageAdding an hash to crack Seeing the results and some stats OutlineThis Web application can be used to launch asynchronous password cracks with hashcat.The interface tries to be as user-friendly as possible and facilitates the password cracking method choice and to automate the succession of various attack modes.It also displays statistics regarding the cracked passwords and allows to export the cracked password list in CSV.The application is designed to be used in a multi-user environment with a strict segregation between the cracking results of different users: the user authentication can be done through an LDAP directory or basic auth.UsageWavecrack can be used to do the following:Add new password hashes, choose the attack mode and the crack durationView the past and current cracks for your user with statistics and graphsView the overall load of the platformUpload a password-protected file and extract its hashThe attack modes are followed in the order they are displayed on the hash submit form.It is also possible to stop a crack. However, every cancelation is final.A limit to the amount of concurrent cracks can be defined in the settings in order not to reduce the current cracks performance.Requirementshashcat: follow these instructions for CPU only usage on a Kali linux hostflask (>=0.10.1)celery (>=3.1.18)SQLite (>=3.8.7.4)rabbitmq-server (>= 3.4.3)Rules for hashcat (examples)Wordlists (examples)InstallationInstall the RabbitMQ server and python-ldap requirements$ apt-get install libsasl2-dev libldap2-dev libssl-dev rabbitmq-serverInstall the python requirements$ pip install -r requirements.txt Create a cracker/app_settings.py configuration file from the cracker/app_settings.py.example file and notably edit the Mandatory settings section: The path of hashcatThe RabbitMQ connection string: by default, the guest/guest account is used. Be sure to harden your installationThe path of the SQLite databaseThe path of the hashcat rulesThe path of the wordlistsThe LDAP parameters: IP addressportLDAP database for the usersBase DN Initialize the local database linked in the cracker/app_settings.py configuration file $ sqlite3 base.db < base_schema.sqlStart the RabbitMQ server$ sudo service rabbitmq-server startStart Celery from the application folder$ celery worker -A cracker.celery Launch the Flask Web server Directly from the server.py file: this mode is not suitable for production purpose$ python server.pyWith a wsgi script: an example of app.wsgi.example is providedSimilarly, supervisorctl can be used to manage celery with a configuration file example in supervisorcelery.conf.example In order to stop the cracks after a certain amount of time, you can use the provided cron script. If you want to update the list of hashes supported, you can use the dedicated script which will parse hashcat's wiki and generate an updated hashcat_hashes.py. To do so, you need to have BeautifulSoup installed on your system. Finally, if you don't want to setup your own VM, you can use the Docker-based process described in the docker folder. Download Wavecrack

Link: http://feedproxy.google.com/~r/PentestTools/~3/aoJJ1wtuSBg/wavecrack-web-interface-for-password.html

EvilURL v2.0 – An Unicode Domain Phishing Generator for IDN Homograph Attack

Generate unicode evil domains for IDN Homograph Attack and detect them.PREREQUISITESpython 3.x for evilurl3.pyTESTED ON: Kali Linux – ROLLING EDITIONCLONEgit clone https://github.com/UndeadSec/EvilURL.gitRUNNINGcd EvilURLpython3 evilurl.pyCHANGELOG Full script updated to Python 3.x{ Python 2.x support closed } CheckURL Module.{ Now you can check if an url is evil.Now you can check connection from an evil url. } Better interactivity.{ Better interface and design. } VIDEO DEMODownload EvilURL

Link: http://feedproxy.google.com/~r/PentestTools/~3/9_CG-LiURkI/evilurl-v20-unicode-domain-phishing.html