Kali Linux 2018.4 Release – Penetration Testing and Ethical Hacking Linux Distribution

Welcome to our fourth and final release of 2018, Kali Linux 2018.4, which is available for immediate download. This release brings kernel up to version 4.18.10, fixes numerous bugs, includes many updated packages, and a very experimental 64-bit Raspberry Pi 3 image.New Tools and Tool UpgradesWireguard is a powerful and easy to configure VPN solution that eliminates many of the headaches one typically encounters setting up VPNs. Check out Wireguard post for more details on this great addition.Kali Linux 2018.4 also includes updated packages for Burp Suite, Patator, Gobuster, Binwalk, Faraday, Fern-Wifi-Cracker, RSMangler, theHarvester, wpscan, and more. For the complete list of updates, fixes, and additions, please refer to the Kali Bug Tracker Changelog.64-bit Raspberry Pi 3Has been created a very experimental Raspberry Pi 3 image that supports 64-bit mode. Please note that this is a beta image, so if you discover anything that isn’t working, please alert on the bug tracker.Ensuring your Installation is UpdatedTo double check your version, first make sure your Kali package repositories are correct.root@kali:~# cat /etc/apt/sources.listdeb http://http.kali.org/kali kali-rolling main non-free contribThen after running ‘apt -y full-upgrade’, you may require a ‘reboot’ before checking:root@kali:~# grep VERSION /etc/os-releaseVERSION=”2018.4"VERSION_ID="2018.4"root@kali:~#root@kali:~# uname -aLinux kali 4.18.0-kali2-amd64 #1 SMP Debian 4.18.10-2kali1 (2018-10-09) x86_64 GNU/LinuxIf you come across any bugs in Kali, please open a report on our bug tracker. We’ll never be able to fix what we don’t know about. Download Kali Linux 2018.4If you would like to check out this latest and greatest Kali release, you can find download links for ISOs and Torrents on the Kali Downloads page along with links to the Offensive Security virtual machine and ARM images, which have also been updated to 2018.4. If you already have a Kali installation you’re happy with, you can easily upgrade in place as follows.root@kali:~# apt update && apt -y full-upgradeDownload Kali Linux 2018.4

Link: http://feedproxy.google.com/~r/PentestTools/~3/L9M1Xv19iKQ/kali-linux-20184-release-penetration.html

imR0T – Send A Message To Your Whatsapp Contact And Protect Your Text By Encrypting And Decrypting (ROT13)

imR0T: Send a quick message with simple text encryption to your whatsapp contact and protect your text by encrypting and decrypting, basically in ROT13 with new multi encryption based algorithm on ASCII and Symbols Substitution.How To UseIt’s simple:# Clone this repositorygit clone https://github.com/Screetsec/imR0T.git# Go into the repositorycd imR0T# Permission Acceschmod +x imR0T# Run the app./imR0TCommand Linehelp: A standard command displaying help.imR0T╺─╸[ cli ] > help | |_ Options:[arguments] help |:| show this message show |:| show all modules from this tools list style |:| show list style use |:| use a module, ex : use [ID] options |:| show module options run |:| Execute the module set |:| Set a value back |:| Back to main clear |:| Clear window ls |:| list directory content cat |:| read file/standard input pwd |:| print name of current/working director exit |:| Exit programConfigurationBefore using feature send message to your whatsapp contact with text encryption. you must config file inconf/whatsapp.confand add your api key# Getting API :# Register in here https://www.apiwha.com/# Use your mail or temp mail 😛 # Setup API KEY# Example : # – api=”CA6DSQ3CLPC6FCQ3CLPC6F"api=""Demo VideoDownload imR0T

Link: http://feedproxy.google.com/~r/PentestTools/~3/xr9d3A7N8RI/imr0t-send-message-to-your-whatsapp.html

Malwoverview – Tool To Perform An Initial And Quick Triage On Either A Directory Containing Malware Samples Or A Specific Malware Sample

Malwoverview.py is a simple tool to perform an initial and quick triage on a directory containing malware samples (not zipped).This tool aims to :Determining similar executable malware samples (PE/PE+) according to the import table (imphash) and group them by different colors (pay attention to the second column from output). Thus, colors matter! Determining whether executable malware samples are packed or not packed according to the following rules: 2a. Two or more sections with Entropy > 7.0 or < 1.0 ==> Packed. 2b. One one section with Entropy > 7.0 or two sections with SizeOfRawData ==> Likely packed. 2c. None section with Entropy > 7.0 or SizeOfRawData ==> not packed.Determining whether the malware samples contain overlay. Determining the .text section entropy. Malwoverview.py only examines PE/PE+ files, skipping everything else. Checking each malware sample against Virus Total.REQUERIMENTSThis tool was tested on a Kali Linux 2018 system. Therefore, it will be necessary to install:Python version 2.7.x. $ apt-get install pythonPython-magic.To install python-magic package you can execute the following command: $ pip install python-magicOr compiling it from the github repository: $ git clone https://github.com/ahupp/python-magic$ cd python-magic/$ python setup.py build$ python setup.py installAs there are serious problems about existing two versions of python-magic package, my recommendation is to install it from github (second procedure above) and copy the magic.py file to the SAME directory of malwoverview tool. Pefile and colorama packages: $ pip install pefile$ pip install colorama$ pip install simple-json$ pip install requestsUSAGETo use the malwoverview, execute the command as shown below: $ python malwoverview -d <directory> -f <fullpath> -i <0|1> -b <0|1> -v <0|1> -a <0|1> -p <0|1> -s <0|1> -x <0|1>where: <directory> -d is the folder containing malware samples. <fullpath> -f specifies the full path to a file. Shows general information about the file (any filetype). (optional) -b 1 forces light gray background (for black terminals). It does not work with -f option. (optional) -i 1 show imports and exports (it is used with -f option). (optional) -x 1 extracts overlay (it is used with -f option). (optional) -v 1 queries Virus Total database for positives and totals (any filetype). (optional) -a 1 (optional) query Hybrid Analysis database for general report.Thus, you need to edit the malwoverview.py and insert your HA API and respective secret. (optional) -s 1 shows antivirus reports from the main players. This option is used with -f option (any filetype). (optional) -p 1 use this option if you have a public Virus Total API. It forces a one minute wait every 4 malware samples, but allows obtaining a complete evaluation of the malware repository.. If you use Virus Total option, so it is necessary to edit the malwoverview.py and insert your VT API. Remember that public VT API only allows 4 searches per second (as shown at the image above). Therefore, if you are willing to wait some minutes, so you can use the -p option, which forces a one minute wait every 4 malware samples, but allows obtaining a complete evaluation of the repository. *ATENTION: if the directory contains many malware samples, so malwoverview.py could take some time. :)HISTORYVersion 1.4: This version: * Adds the -a option for getting the Hybrid Analysis summary report. * Adds the -i option for listing imported and exported functions. Therefore, imported/exported function report was decoupled for a separated option. Version 1.3: This version: * Adds the -p option for public Virus Total API.Version 1.2: This version includes: * evaluates a single file (any filetype) * shows PE sessions. * shows imported functions. * shows exported function. * extracts overlay. * shows AV report from the main players. (any filetype)Version 1.1: This version: * Adds the VT checking feature.Version 1.0: Malwoverview is a tool to perform a first triage of malware samples in a directory and group them according to their import functions (imphash) using colors. This version: * Shows the imphash information classified by color. * Checks whether malware samples are packed. * Checks whether malware samples have overlay. * Shows the entropy of the malware samples. ScreenshotsImportant aspect: Malwoverview does NOT submit samples to VT. It submits only hashes, so respecting Non-Disclosure Agreements (NDAs).Download Malwoverview

Link: http://feedproxy.google.com/~r/PentestTools/~3/zvjsmu5dk5M/malwoverview-tool-to-perform-initial.html

pwnedOrNot v1.1.0 – Tool To Find Passwords For Compromised Email Accounts Using HaveIBeenPwned API

pwnedOrNot uses haveibeenpwned v2 api to test email accounts and tries to find the password in Pastebin Dumps.Featureshaveibeenpwned offers a lot of information about the compromised email, some useful information is displayed by this script:Name of BreachDomain NameDate of BreachFabrication statusVerification StatusRetirement statusSpam StatusAnd with all this information pwnedOrNot can easily find passwords for compromised emails if the dump is accessible and it contains the password.Tested onKali Linux 18.2Ubuntu 18.04Kali NethunterTermuxInstallationUbuntu / Kali Linux / Nethunter / Termuxchmod 777 install.sh./install.shUsagepython pwnedornot.py -husage: pwnedornot.py [-h] [-e EMAIL] [-f FILE]optional arguments: -h, –help show this help message and exit -e EMAIL, –email EMAIL Email account you want to test -f FILE, –file FILE Load a file with multiple email accountsDemoDownload pwnedOrNot

Link: http://feedproxy.google.com/~r/PentestTools/~3/dL2eqs-9iWs/pwnedornot-v110-tool-to-find-passwords.html

4Nonimizer – A Tol For Anonymizing The Public IP Used To Browsing Internet, Managing The Connection To TOR Network And To Different VPNs Providers

It is a bash script for anonymizing the public IP used to browsing Internet, managing the connection to TOR network and to different VPNs providers (OpenVPN), whether free or paid. By default, it includes several pre-configured VPN connections to different peers (.ovpn files) and download the credentials (if the corresponding provider support it). Also, it records each used IP that we use every 300 seconds in log files.This script is enabled as a service in systemd systems and uses a default vpn (VPNBook) at system startup.Since version 1.06 the dns resolution requests are done throught DnsCrypt (enable and disable with option enable_dns or disable_dns)Since version 1.12 the logs of connections vpn saved in sqlite in /logs/Attention VPN Providers!If you are a provider, you support OpenVPN and want your VPN to be integrated into 4nonimizer contact the developers at hackplayers @ ymail.com.InstallationDownload the repo using git, execute the command ./4nonimizer install in the directory, and follow the screen instructions, 4nonimizer will move to the directory /opt/ and installed as a service.This script has full compatibility with Kali Linux, although it has been properly tested and should also work on other distributions like Debian, Ubuntu and Arch (Manjaro). However there could be some bugs, or unexpected performances (please comments if you find any!).OptionsOnce installed 4nonymizer, enter the command 4nonimizer help to get the help, which shows all the available parameters: ___ _ _ / | (_) (_) / /| |_ __ ___ _ __ _ _ __ ___ _ _______ _ __ / /_| | ‘_ \ / _ \| ‘_ \| | ‘_ ` _ | |_ / _ \ ‘__| \___ | | | | (_) | | | | | | | | | | |/ / __/ | |_/_| |_|\___/|_| |_|_|_| |_| |_|_/___\___|_| By Carlos Antonini & Vicente Motos Version: 1.06-betaUsage: 4nonymizer      install: Install the script in run services     uninstall: Disable run service and remove app directory     change_provider: Change VPN Provider     change_ip: Change IP from VPN current     vpn_status: Check IP and provider VPN running     update_vpns: Update all ovpn of VPNs     start: Init the 4nonimizer service     stop: Stop the 4nonimizer service     stop_nonet: Stop the 4nonimizer service and shutdown network interfaces     restart: Restart the 4nonimizer service     update_app: Update this program via git     privoxy: Install and configure privoxy with port 8118 (BETA)     proxychains4: Install and configure proxychains4 for default in the system     browser: Fire up a firefox browser with profile privoxy -> tor     test_availability: Check peers availability and delete ovpn file if the IP/service is unreachable     location: Now you can select a specific country or continent of the vpn peer     enableboot: You can enable service in boot     disableboot: You can disable service in boot     enable_dnscrypt: Enable dnscrypt service     disable_dnscrypt: Disable dnscrypt service     help: Help (this screen)Available VPNsCurrently it supports the following VPN providers:- 7Proxies https://www.7proxies.com/- AirVPN https://airvpn.org/- Cryptostorm https://cryptostorm.is/- Cyberghost https://www.cyberghostvpn.com/en_US/- ExpressVPN https://www.expressvpn.com- FreeVPN https://freevpn.me/- HideMyAss https://www.hidemyass.com/- IpPVanish https://www.ipvanish.com/- NordVPN https://nordvpn.com- PIA https://www.privateinternetaccess.com/- ProntonVPN https://protonvpn.com/- Proxy.sh https://proxy.sh/- SlickVPN https://www.slickvpn.com- StrongVPN https://strongvpn.com/- TorGuard https://torguard.net/- TunnelBear https://www.tunnelbear.com/- VPNBook (por defecto) http://www.vpnbook.com/- VPNGate http://www.vpngate.net/en/- VPNKeys https://www.vpnkeys.com/- VPNMe https://www.vpnme.me/- Vyprvpn https://www.goldenfrog.com/es/vyprvpnInstall a new VPNTo install an additional vpn we have to use the following structure in order to the 4nonimizer be able to integrate and perform operations with it.First, we have to create the following dir structure /vpn/ within 4nonimizer path:In our example we create the folder /vpntest/ and within it placed all .ovpn files we have. If the files ovpn not have the certificate within each of them we put in the same folder as shown in the example certificate.crt.In addition, we must place a file named pass.txt containing 2 lines: the first one with the username and the second one with the password, as shown below:If we have correctly performed all steps when we execute the command 4nonimizer change_provider the menu will show our vpn:As you can see in the picture, option [7] it is the vpn we’ve created.Getting credencials and ovpn files automaticallyIf the VPN provider allows automation of credential and/or .ovpn files getting, 4nonimizer has standardized the following scripts names and locations:- /opt/4nonimizer/vpn/provider/vpn-get-pass.sh- /opt/4nonimizer/vpn/provider/vpn-get-ovpn.sh4nonimizer automatically detect the presence of both scripts and indicate (Auto-pass Login) or (Auto-get OVPN) if it finds in the first line of each file the expression ‘#4uto’ or ‘#m4nual’ depending on the performed actions.Extras- Execute ‘source 4nonimizer’ to activate autocompletation of parameters.- Copy .conkyrc in your home directory to load a 4nonimizer template and execute conky.Videos- Instalar 4nonimizer Kali Linux https://www.youtube.com/watch?v=FQRuRmMkcDg- 4nonimizer Navegando de manera segura VPN (Kali Linux 2016.2) https://www.youtube.com/watch?v=6GApaN7fSn8- devenir anonyme sur kali linux (4nonimizer) https://www.youtube.com/watch?v=Y3puD1Bw3xA- Anonymizer – How To Hide Your IP address on Kali Linux 2016.2 (Change IP) https://www.youtube.com/watch?v=MNdQD0DCG0A- Become Anonymous on kali linux 2016.2 https://www.youtube.com/watch?v=IFnhm-rrnEg- Auto Hide IP with 4nonimizer on KALI Linux 2017 https://www.youtube.com/watch?v=HgqZCm8Wdvw- Kali Linux – 4nonimizer | Surf Anonymously https://www.youtube.com/watch?v=_mOUQBv4sWsVersions Number codename date 1.00-beta .bye-world! 5/10/2016 1.02-beta .evol-time 11/10/2016 1.03-beta .using-latin-i 17/10/2016 1.04-beta .locateit 22/12/2016 1.05-beta .encrypting 03/01/2017 1.06-beta .1st-trial 18/01/2017 1.07-beta .noname 03/05/2017 1.08-beta .falcon 15/08/2017 1.09-beta .rabbit 09/11/2017 1.10 .fresh_air 27/02/2018 1.11 .shhh 17/05/2018 1.12 .sqliting 18/05/2018 ¡4nonimize the world!Download 4Nonimizer

Link: http://feedproxy.google.com/~r/PentestTools/~3/Pl4_YR4KP9Q/4nonimizer-tol-for-anonymizing-public.html

Spykeyboard – Keylogger Which Sends Us The Data To Our Gmail

This is a script which allows us to generate an undetectable keylogger which sends the captured keys to our gmail mail. Once we generated our keylogger in our kali linux we would have to pass the .py file to a windows machine to convert it to an .exe. The tool is under development.Install module in linux and windows:pip install keyboardCompile to .exeDownload Spykeyboard

Link: http://feedproxy.google.com/~r/PentestTools/~3/Tx81M3bygOo/spykeyboard-keylogger-which-sends-us.html

UPDATE: Kali Linux 2018.3 Release!

PenTestIT RSS Feed
Kali Linux 2018.3 is the latest Kali Linux release. This is the third release which comes after the last release, that was made available in the month of April. This new release includes all patches, fixes, updates, and improvements since the last release – Kali Linux 2018.2, including a shiny new Linux kernel version 4.17.0 and upgrades toRead more about UPDATE: Kali Linux 2018.3 Release!
The post UPDATE: Kali Linux 2018.3 Release! appeared first on PenTestIT.

Link: http://pentestit.com/update-kali-linux-2018-3-release/

Kali Linux 2018.3 Release – Penetration Testing and Ethical Hacking Linux Distribution

Kali 2018.3 brings the kernel up to version 4.17.0 and while 4.17.0 did not introduce many changes, 4.16.0 had a huge number of additions and improvements including more Spectre and Meltdown fixes, improved power management, and better GPU support.New Tools and Tool UpgradesSince our last release, we have added a number of new tools to the repositories, including:idb – An iOS research / penetration testing toolgdb-peda – Python Exploit Development Assistance for GDBdatasploit – OSINT Framework to perform various recon techniqueskerberoast – Kerberos assessment toolsIn addition to these new packages, we have also upgraded a number of tools in our repos including aircrack-ng, burpsuite, openvas,wifite, and wpscan.For the complete list of updates, fixes, and additions, please refer to the Kali Bug Tracker Changelog.Download Kali Linux 2018.3If you would like to check out this latest and greatest Kali release, you can find download links for ISOs and Torrents on the Kali Downloads page along with links to the Offensive Security virtual machine and ARM images, which have also been updated to 2018.3. If you already have a Kali installation you’re happy with, you can easily upgrade in place as follows.root@kali:~# apt update && apt -y full-upgradeIf you come across any bugs in Kali, please open a report on our bug tracker. It’s more than a little challenging to fix what we don’t know about.Making sure you are up-to-dateTo double check your version, first make sure your network repositories is enabled.root@kali:~# cat

Link: http://feedproxy.google.com/~r/PentestTools/~3/dF6YCwcpz4s/kali-linux-20183-release-penetration.html

DorkMe – Tool Designed With The Purpose Of Making Easier The Searching Of Vulnerabilities With Google Dorks

DorkMe is a tool designed with the purpose of making easier the searching of vulnerabilities with Google Dorks, such as SQL Injection vulnerabilities.DorkMe is a tool designed with the purpose of making easier the searching of vulnerabilities with Google Dorks, such as SQL Injection vulnerabilities.Dependencies pip install -r requirements.txtIt is highly recommended to add more dorks for an effective search, keep reading to see howUsagepython DorkMe.py –helpExamples:python DorkMe.py –url target.com –dorks vulns -v (recommended for test)python DorkMe.py –url target.com –dorks Deprecated,Info -v (multiple dorks)python DorkMe.py –url target.com –dorks all -v (test all)AboutDorkMe is a tool designed with the purpose of making easier the searching of vulnerabilities with Google Dorks, such as SQL Injection vulnerabilities.Any idea, failure etc please report to telegram: blueudpdork folder contains -> dorks to search, result folder contains -> results of DorkMe executionTested in ParrotOS and Kali Linux 2.0Beta VersionRemember DorkMe is beta, to avoid bans DorkMe wait about 1 minute on each request and 3 minutes every 100 requestsAdd DorksIf you want to add new dorks put it in one of the files in the dorks folder (preferable in its category), if it is not, you can add it to mydorks.txt. to add it: in the first line add the dork, in the second the severity: high , medium or low, and finally its description, look at the other files to do it correctlyEXAMPLE:inurl:php?id= [enter]high [enter]SQLi [enter](space)another dorkContact:Telegram: blueudpTwitter: https://twitter.com/blueudpDownload DorkMe

Link: http://feedproxy.google.com/~r/PentestTools/~3/sfavhb6w1YA/dorkme-tool-designed-with-purpose-of.html

Fluxion – WPA/WPA2 Security Hacked Without Brute Force

Fluxion is a security auditing and social-engineering research tool. It is a remake of linset by vk496 with (hopefully) less bugs and more functionality. The script attempts to retrieve the WPA/WPA2 key from a target access point by means of a social engineering (phishing) attack. It’s compatible with the latest release of Kali (rolling). Fluxion’s attacks’ setup is mostly manual, but experimental auto-mode handles some of the attacks’ setup parameters. Read the FAQ before requesting issues.If you need quick help, fluxion is also avaible on gitter. You can talk with us on Gitter or on Discord.InstallationRead here before you do the following steps.Download the latest revisiongit clone –recursive git@github.com:FluxionNetwork/fluxion.git Switch to tool’s directorycd fluxion Run fluxion (missing dependencies will be auto-installed)./fluxion.shFluxion is also available in archcd bin/archmakepkgor using the blackarch repopacman -S fluxionChangelogFluxion gets weekly updates with new features, improvements, and bugfixes. Be sure to check out the changelog here.How it worksScan for a target wireless network. Launch the Handshake Snooper attack. Capture a handshake (necessary for password verification). Launch Captive Portal attack. Spawns a rogue (fake) AP, imitating the original access point. Spawns a DNS server, redirecting all requests to the attacker’s host running the captive portal. Spawns a web server, serving the captive portal which prompts users for their WPA/WPA2 key. Spawns a jammer, deauthenticating all clients from original AP and lureing them to the rogue AP. All authentication attempts at the captive portal are checked against the handshake file captured earlier. The attack will automatically terminate once a correct key has been submitted. The key will be logged and clients will be allowed to reconnect to the target access point. For a guide to the Captive Portal attack, read the Captive Portal attack guide RequirementsA Linux-based operating system. We recommend Kali Linux 2 or Kali rolling. Kali 2 & rolling support the latest aircrack-ng versions. An external wifi card is recommended.Related workFor development I use vim and tmux. Here are my dotfilesCreditsl3op – contributordlinkproto – contributorvk496 – developer of linsetDerv82 – @Wifite/2Princeofguilty – @webpages and @buteforcePhotos for wiki @http://www.kalitutorials.netOns Ali @wallpaperPappleTec @sitesMPX4132 – Fluxion V3DisclaimerAuthors do not own the logos under the /attacks/Captive Portal/sites/ directory. Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for “fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. The usage of Fluxion for attacking infrastructures without prior mutual consent could be considered an illegal activity, and is highly discouraged by its authors/developers. It is the end user’s responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program. NoteBeware of sites pretending to be related with the Fluxion Project. These may be delivering malware. Fluxion DOES NOT WORK on Linux Subsystem For Windows 10, because the subsystem doesn’t allow access to network interfaces. Any Issue regarding the same would be Closed Immediately LinksFluxion website: https://fluxionnetwork.github.io/fluxion/ Discord: https://discordapp.com/invite/G43gptk Gitter: https://gitter.im/FluxionNetwork/Lobby Download Fluxion

Link: http://feedproxy.google.com/~r/PentestTools/~3/3tS5FCN0p6Q/fluxion-wpawpa2-security-hacked-without.html