Metabigor – Command Line Search Engines Without Any API Key

Command line Search Engine without any API key.What is Metabigor?Metabigor allows you do query from command line to awesome Search Engines (like Shodan, Censys, Fofa, etc) without any API key.But Why Metabigor? Don’t use your API key so you don’t have to worry about litmit of API quotation.* Do query from command line without Premium account.* Get more result without Premium account. * But I have an Premium account why do I need this shit? Again Metabigor will not lose your API quotation.Your query will optimized so you gonna get more result than using it by hand or API key.Never get duplicate result.*How it works?Metabigor gonna use your cookie or not to simulate search from browser and optimize the query to get more result.Search Engine currently supportedShodan.Censys.Fofa Pro.Installationgit clone https://github.com/j3ssie/Metabigorcd Metabigorpip3 install -r requirements.txtDemoHow to useBasic Usage./metabigor.py -s-q ‘<your_query>’ [options]Check out the Advanced Usage to explore some awesome optionsExample commandsNote: Fill your credentials or your sessions on config.conf if you wan’t to get more results../metabigor.py -s fofa -q ‘title=”Dashboard – Confluence" && body=".org"’ ./metabigor.py -s fofa -q ‘title="Dashboard – Confluence" && body=".org"’ -b –disable_pages./metabigor.py -s shodan -q ‘port:"3389" os:"Windows"’ –debugOptions[*] Setup session===============Do command below or direct modify config.conf file./metabigor.py -s shodan –cookies=<content of polito cookie>./metabigor.py -s censys –cookies=<content of auth_tkt cookie>./metabigor.py -s fofa –cookies=<content of _fofapro_ars_session cookie>[*] Basic Usage===============./metabigor.py -s <source> -q ‘<your_query>’ [options][*] More Options=============== -d OUTDIR, –outdir OUTDIR Directory output -o OUTPUT, –output OUTPUT Output file name –raw RAW Directory to store raw query –proxy PROXY Proxy for doing request to search engine e.g: http://127.0.0.1:8080 -b Auto brute force the country code –disable_pages Don’t loop though the pages –store_content Store the raw HTML souce or not –hh Print this message –debug Print debug output[*] Example commands===============./metabigor.py -s fofa -q ‘title="Dashboard – Confluence" && body=".org"’ -b./metabigor.py -s fofa -q ‘title="Dashboard – Confluence" && body=".org"’ -b –disable_pages./metabigor.py -s shodan -q ‘port:"3389" os:"Windows"’ –debug./metabigor.py -s shodan -Q list_of_query.txt –debug -o rdp.txt./metabigor.py -s censys -q ‘(scada) AND protocols: "502/modbus"’ -o something –debug –proxy socks4://127.0.0.1:9050TODOPredine query to do specific task like subdomain scan, portscanAdding more search engine. ZoomEyeBaiduCreditsLogo from flaticon by Vitaly Gorbachev and ascii logo converted by picasciiContact@j3ssiejjjDownload Metabigor

Link: http://www.kitploit.com/2019/05/metabigor-command-line-search-engines.html

Wpbullet – A Static Code Analysis For WordPress (And PHP)

A static code analysis for WordPress Plugins/Themes (and PHP)InstallationSimply clone the repository, install requirements and run the script$ git clone https://github.com/webarx-security/wpbullet wpbullet$ cd wpbullet$ pip install -r requirements.txt$ python wpbullet.pyUsageAvailable options:–path (required) System path or download URL Examples:–path=”/path/to/plugin"–path="https://wordpress.org/plugins/example-plugin"–path="https://downloads.wordpress.org/plugin/example-plugin.1.5.zip"–enabled (optional) Check only for given modules, ex. –enabled="SQLInjection,CrossSiteScripting"–disabled (optional) Don’t check for given modules, ex. –disabled="SQLInjection,CrossSiteScripting"–cleanup (optional) Automatically remove content of .temp folder after scanning remotely downloaded plugin$ python wpbullet.py –path="/var/www/wp-content/plugins/plugin-name"Creating modulesCreating a module is flexible and allows for override of the BaseClass methods for each module as well as creating their own methodsEach module in Modules directory is implementing properties and methods from core.modules.BaseClass, thus each module’s required parameter is BaseClassOnce created, module needs to be imported in modules/__init__.py. Module and class name must be consistent in order to module to be loaded.If you are opening pull request to add new module, please provide unit tests for your module as well.Module templateModules/ExampleVulnerability.pyfrom core.modules import BaseClassclass ExampleVulnerability(object): # Vulnerability name name = "Cross-site Scripting" # Vulnerability severity severity = "Low-Medium" # Functions causing vulnerability functions = [ "print" "echo" ] # Functions/regex that prevent exploitation blacklist = [ "htmlspecialchars", "esc_attr" ]Overriding regex match patternRegex pattern is being generated in core.modules.BaseClass.build_pattern and therefore can be overwritten in each module class.Modules/ExampleVulnerability.pyimport copy…# Build dynamic regex pattern to locate vulnerabilities in given contentdef build_pattern(self, content, file): user_input = copy.deepcopy(self.user_input) variables = self.get_input_variables(self, content) if variables: user_input.extend(variables) if self.blacklist: blacklist_pattern = r"(?!(\s?)+(.*(" + ‘|’.join(self.blacklist) + ")))" else: blacklist_pattern = "" self.functions = [self.functions_prefix + x for x in self.functions] pattern = r"((" + ‘|’.join(self.functions) + ")\s{0,}\(?\s{0,1}" + blacklist_pattern + ".*(" + ‘|’.join(user_input) + ").*)" return patternTestingRunning unit tests: $ python3 -m unittestDownload Wpbullet

Link: http://www.kitploit.com/2019/05/wpbullet-static-code-analysis-for.html

From Dev to InfoSec Part 5 – Fortis Fortuna Adiuvat

Two years ago, I set out to get into cybersecurity. I had no idea where this journey would take me, and I had no aspirations at the time of turning this into a career. I’ve found that very rarely do people who have been doing something as long as me decide to completely change their profession and eschew the comforts of years of experience. Fortis Fortuna Adiuvat! I knew last year that security was where I wanted to be, and I was coming to the realization that I may need to leave Microsoft in order to do it. It wasn’t a decision that I would take lightly having been with the company for 8 years. Then I got a surprise.
The post From Dev to InfoSec Part 5 – Fortis Fortuna Adiuvat appeared first on The Ethical Hacker Network.

Link: https://www.ethicalhacker.net/columns/bango/from-dev-to-infosec-part-5-fortis-fortuna-adiuvat/

Introduction to analysing full disk encryption solutions

I’ve written a couple of times on the subject of boot loaders and full disk encryption, but I haven’t really explored it in more detail. With this blog post I hope to dive a bit deeper into how to actually start performing these type of analysis and why they are useful to perform. I’ll start … Continue reading Introduction to analysing full disk encryption solutions

Link: https://diablohorn.com/2019/05/21/introduction-to-analysing-full-disk-encryption-solutions/