Monday, August 31, 2020
WPSeku V0.4 - Wordpress Security Scanner
This summary is not available. Please
click here to view the post.
Sunday, August 30, 2020
Urlgrab - A Golang Utility To Spider Through A Website Searching For Additional Links
A golang utility to spider through a website searching for additional links with support for JavaScript rendering.
Install
go get -u github.com/iamstoxe/urlgrabFeatures
- Customizable Parallelism
- Ability to Render JavaScript (including Single Page Applications such as Angular and React)
Usage
Usage of urlgrab:
-cache-dir string
Specify a directory to utilize caching. Works between sessions as well.
-debug
Extremely verbose debugging output. Useful mainly for development.
-delay int
Milliseconds to randomly apply as a delay between requests. (default 2000)
-depth int
The maximum limit on the recursion depth of visited URLs. (default 2)
-headless
If true the browser will be displayed while crawling.
Note: Requires render-js flag
Note: Usage to show browser: --headless=false (default true)
-ignore-query
Strip the query portion of the URL before determining if we've visited it yet.
-ignore-ssl
Scrape pages with invalid SSL certificates
-js-timeout int
The amount of seconds before a request to render javascript should timeout. (default 10)
-json string
The filename where we should store the output JSON file.
-max-body int
The limit of the retrieved response body in kilobytes.
0 means unlimited.
Supply this value in kilobytes. (i.e. 10 * 1024kb = 10MB) (default 10240)
-no-head
Do not send HEAD requests prior to GET for pre-validation.
-output-all string
The directory where we should store the output files.
-proxy string
The SOCKS5 proxy to utilize (format: socks5://127.0.0.1:8080 OR http://127.0.0.1:8080).
Supply multiple proxies by separating them with a comma.
-random-agent
Utilize a random user agent string.
-render-js
Determines if we utilize a headless chrome instance to render javascript.
-root-domain string
The root domain we should match links against.
If not specified it will default to the host of --url.
Example: --root-domain google.com
-threads int
The number of threads to utilize. (default 5)
-timeout int
The amount of seconds before a request should timeout. (default 10)
-url string
The URL where we should start crawling.
-urls string
A file path that contains a list of urls to supply as starting urls.
Requires --root-domain flag.
-user-agent string
A user agent such as (Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:47.0) Gecko/20100101 Firefox/47.0).
-verbose
Verbose outputAuthor
Devin Stokes
- Twitter: @DevinStokes
- Github: @IAmStoxe
via KitPloit
This article is the property of Tenochtitlan Offensive Security. Verlo Completo --> https://tenochtitlan-sec.blogspot.com
Related articles- Pentest Tools Alternative
- Pentest Tools Download
- Hackers Toolbox
- Hacker Tools List
- Hacker Search Tools
- Pentest Tools Find Subdomains
- Pentest Tools Linux
- Hacking Tools For Beginners
- Kik Hack Tools
- Pentest Tools Download
- How To Make Hacking Tools
- Hacking Tools Download
- Pentest Tools Url Fuzzer
- Hacking Tools Software
- Hacker Tools Windows
- Free Pentest Tools For Windows
- Hacking Tools For Kali Linux
- Hacking App
- Pentest Box Tools Download
- Pentest Tools List
- Blackhat Hacker Tools
- Hack Website Online Tool
- Computer Hacker
- Pentest Tools Kali Linux
- Best Hacking Tools 2020
- Hacker Tools Hardware
- Hacking Tools Download
- New Hacker Tools
- Hacking Tools For Beginners
- Pentest Tools For Android
- Hack Apps
- Hacking Tools For Windows 7
- How To Install Pentest Tools In Ubuntu
- Best Hacking Tools 2020
- New Hack Tools
- Hacking Tools For Beginners
- Hacking Tools For Kali Linux
- Hacker Tools Windows
- Hack And Tools
- Hack Website Online Tool
- Hacker Tools Free Download
- Beginner Hacker Tools
- Hacker Tools Linux
- Hacking Tools For Pc
- Hack Tools
- Best Pentesting Tools 2018
- Pentest Reporting Tools
- Hack Apps
- Hacker Tools Free
- Hacker Tools Mac
- Hack Website Online Tool
- Hack Tools 2019
- Termux Hacking Tools 2019
- Pentest Tools Framework
The Pillager 0.7 Release
I spent the last couple days recoding the Pillager, getting rid of bugs, optimizing code, making it more extendable and more solid overall. So this post is to release the new code. However, with that being said, the Pillager is in mass revision right now and I added some more developers to the team to add a whole host of new database attacking features as well as moving past databases and into other areas of post exploitation pillaging. Soon to be released.. As usual this tool and any tool i create is based on my issues when performing penetration tests and solves those problems.. If you have any insight or comments i will certainly take them into consideration for future releases.
For now check out Version 0.7.. Named searches and Data searches via external config files are now functioning properly as well as other bugs fixed along the way... Drop this in a BT5 VM and make sure you have your DB python stuff installed per the help docs and you should be good to go. If you are looking to use oracle you are going to have to install all the oracle nonsense from oracle or use a BT4r2 vm which has most of the needed drivers minus cxoracle which will need to be installed.
http://consolecowboys.org/pillager/pillage_0.7.zip
Ficti0n$ python pillager.py
[---] The Database Pillager (DBPillage) [---]
[---] CcLabs Release [---]
[---] Authors: Ficti0n, [---]
[---] Contributors: Steponequit [---]
[---] Version: 0.7 [---]
[---] Find Me On Twitter: ficti0n [---]
[---] Homepage: http://console-cowboys.blogspot.com [---]
Release Notes:
--Fixed bugs and optimized code
--Added Docstrings
--Fixed Named and Data searches from config files
About:
The Database Pillager is a multiplatform database tool for searching and browsing common
database platforms encountered while penetration testing. DBPillage can be used to search
for PCI/HIPAA data automatically or use DBPillage to browse databases,display data.
and search for specified tables/data instances.
DBpillage was designed as a post exploitation pillaging tool with a goal of targeted
extraction of data without the use of database platform specific GUI based tools that
are difficult to use and make my job harder.
Supported Platforms:
--------------------
-Oracle
-MSSQL
-MYSQL
-PostGreSQL
Usage Examples:
************************************************************************
For Mysql Postgres and MsSQL pillaging:
---------------------------------------
python dbPillage -a [address] -d [dbType] -u [username] -p [password]
For Oracle pillaging you need a SID connection string:
------------------------------------------------------
python dbPillage-a [address]/[sid] -d [dbType] -u [username] -p [password]
Grab some hashes and Hipaa specific:(Default is PCI)
------------------------------------
python dbPillage -a [address] -d [dbType] -u [username] -p [password] --hashes -s hipaa
Drop into a SQL CMDShell:
-------------------------
python dbpillage.py -a [address] -d [dbType] -u [username] -p [password] -q
Config file specified searches:
-------------------------------
Search for data Items from inputFiles/data.txt:
python dbpillage.py -a [address] -d [dbType] -u [username] -p [password] -D
Search for specific table names from inputFiles/tables.txt:
python dbpillage.py -a [address] -d [dbType] -u [username] -p [password] -N
Switch Options:
---------------------
-# --hashes = grab database password hashes
-l --limit = limit the amount of rows that are searched or when displaying data (options = any number)
-s --searchType = Type of data search you want to perform (options:pci, hipaa, all)(PCI default)
-u --user = Database servers username
-p --pass = Password for the database server
-a --address = Ipaddress of the database server
-d --database = The database type you are pillageing (options: mssql,mysql,oracle,postgres)
-r --report = report format (HTML, XML, screen(default))
-N --nameSearch = Search via inputFiles/tables.txt
-D --dataSearch = Targeted data searches per inputFiles/data.txt
-q --queryShell = Drop into a SQL CMDshell in mysql or mssql
Prerequisites:
-------------
python v2 (Tested on Python 2.5.2 BT4 R2 and BT5 R3 - Oracle stuff on BT4r2 only unless you install the drivers from oracle)
cx_oracle (cx-oracle.sourceforge.net)
psycopg2 (initd.org/psycopg/download/)
MySQLdb (should be on BT by default)
pymssql (should be on BT by default)
Read more
For now check out Version 0.7.. Named searches and Data searches via external config files are now functioning properly as well as other bugs fixed along the way... Drop this in a BT5 VM and make sure you have your DB python stuff installed per the help docs and you should be good to go. If you are looking to use oracle you are going to have to install all the oracle nonsense from oracle or use a BT4r2 vm which has most of the needed drivers minus cxoracle which will need to be installed.
http://consolecowboys.org/pillager/pillage_0.7.zip
Ficti0n$ python pillager.py
[---] The Database Pillager (DBPillage) [---]
[---] CcLabs Release [---]
[---] Authors: Ficti0n, [---]
[---] Contributors: Steponequit [---]
[---] Version: 0.7 [---]
[---] Find Me On Twitter: ficti0n [---]
[---] Homepage: http://console-cowboys.blogspot.com [---]
Release Notes:
--Fixed bugs and optimized code
--Added Docstrings
--Fixed Named and Data searches from config files
About:
The Database Pillager is a multiplatform database tool for searching and browsing common
database platforms encountered while penetration testing. DBPillage can be used to search
for PCI/HIPAA data automatically or use DBPillage to browse databases,display data.
and search for specified tables/data instances.
DBpillage was designed as a post exploitation pillaging tool with a goal of targeted
extraction of data without the use of database platform specific GUI based tools that
are difficult to use and make my job harder.
Supported Platforms:
--------------------
-Oracle
-MSSQL
-MYSQL
-PostGreSQL
Usage Examples:
************************************************************************
For Mysql Postgres and MsSQL pillaging:
---------------------------------------
python dbPillage -a [address] -d [dbType] -u [username] -p [password]
For Oracle pillaging you need a SID connection string:
------------------------------------------------------
python dbPillage-a [address]/[sid] -d [dbType] -u [username] -p [password]
Grab some hashes and Hipaa specific:(Default is PCI)
------------------------------------
python dbPillage -a [address] -d [dbType] -u [username] -p [password] --hashes -s hipaa
Drop into a SQL CMDShell:
-------------------------
python dbpillage.py -a [address] -d [dbType] -u [username] -p [password] -q
Config file specified searches:
-------------------------------
Search for data Items from inputFiles/data.txt:
python dbpillage.py -a [address] -d [dbType] -u [username] -p [password] -D
Search for specific table names from inputFiles/tables.txt:
python dbpillage.py -a [address] -d [dbType] -u [username] -p [password] -N
Switch Options:
---------------------
-# --hashes = grab database password hashes
-l --limit = limit the amount of rows that are searched or when displaying data (options = any number)
-s --searchType = Type of data search you want to perform (options:pci, hipaa, all)(PCI default)
-u --user = Database servers username
-p --pass = Password for the database server
-a --address = Ipaddress of the database server
-d --database = The database type you are pillageing (options: mssql,mysql,oracle,postgres)
-r --report = report format (HTML, XML, screen(default))
-N --nameSearch = Search via inputFiles/tables.txt
-D --dataSearch = Targeted data searches per inputFiles/data.txt
-q --queryShell = Drop into a SQL CMDshell in mysql or mssql
Prerequisites:
-------------
python v2 (Tested on Python 2.5.2 BT4 R2 and BT5 R3 - Oracle stuff on BT4r2 only unless you install the drivers from oracle)
cx_oracle (cx-oracle.sourceforge.net)
psycopg2 (initd.org/psycopg/download/)
MySQLdb (should be on BT by default)
pymssql (should be on BT by default)
Read more
- Hackrf Tools
- Hack Tools 2019
- Best Pentesting Tools 2018
- Hacking Tools Usb
- Hacking Tools Hardware
- Pentest Tools Find Subdomains
- Hacker Tools Hardware
- Growth Hacker Tools
- Hack Tools For Ubuntu
- Hacking Tools For Windows Free Download
- Pentest Tools Github
- Usb Pentest Tools
- What Is Hacking Tools
- Hack Tools
- Hack And Tools
- Kik Hack Tools
- Hack Tools For Pc
- Pentest Tools For Android
- What Are Hacking Tools
- Hacking Tools And Software
- Hacking Tools Usb
- Hacking Tools For Kali Linux
- Hack Apps
- Hack Tools For Pc
- Hacker Tools For Pc
- Pentest Tools Port Scanner
- Hacking Tools Software
- Hak5 Tools
- Hacking Tools
- Game Hacking
- Pentest Automation Tools
- Pentest Tools For Ubuntu
- Pentest Tools Bluekeep
- Best Pentesting Tools 2018
- Hack Tools For Ubuntu
- Pentest Tools For Ubuntu
- Hacker Tools Apk
- Hacker Tools 2020
- Pentest Tools Free
- Pentest Tools Online
- Hacker Tools Apk
- Pentest Tools Subdomain
- Beginner Hacker Tools
- Hack And Tools
- Pentest Tools Android
- Github Hacking Tools
- Hack Tools
- Hacker Tools For Ios
- Hacker Tools For Windows
- Pentest Tools Port Scanner
- Hacking Tools Download
- Hacks And Tools
- Hacking Tools
- Pentest Tools Alternative
- Hacking Tools Online
- Hacker Tools Free
- Best Hacking Tools 2020
- Pentest Tools Review
- Pentest Tools Review
- Pentest Recon Tools
- Hacking Tools Online
- Hak5 Tools
- What Are Hacking Tools
- World No 1 Hacker Software
- Hacking Tools And Software
- Pentest Box Tools Download
- Hacker Security Tools
- Hacker Tools For Pc
- Hacking Tools 2020
- Github Hacking Tools
- Hack App
- Hack Tools Mac
- World No 1 Hacker Software
- Hacker Tools Linux
- Hack And Tools
- Usb Pentest Tools
- Hack Tool Apk
- Beginner Hacker Tools
- Hacking Tools Online
- Growth Hacker Tools
- Free Pentest Tools For Windows
- Hacker Tools 2019
- Pentest Tools Android
- Bluetooth Hacking Tools Kali
- What Is Hacking Tools
- Hacker Tools Apk
- Hacking Tools Pc
- Nsa Hack Tools Download
- Hack Website Online Tool
- Pentest Tools Kali Linux
- How To Hack
- Hacker Tools Free
- Black Hat Hacker Tools
- Pentest Tools Apk
- Hack Tools
- Hacker Search Tools
- Hacking Tools Mac
- Pentest Reporting Tools
- Hak5 Tools
- Termux Hacking Tools 2019
- Hack Tools Github
- Hackrf Tools
- Pentest Tools For Ubuntu
- Hacker Security Tools
- Free Pentest Tools For Windows
- Kik Hack Tools
- Easy Hack Tools
- Hackrf Tools
- Nsa Hacker Tools
- Hack Tool Apk No Root
- Hack Tools For Mac
- Hacker Search Tools
- Tools For Hacker
- Pentest Tools Nmap
- Hacking Tools Windows 10
- Pentest Tools For Windows
- Tools 4 Hack
- Hack Tools For Ubuntu
- Pentest Tools Website
- Ethical Hacker Tools
- Hacker Tools Hardware
- Tools For Hacker
- Pentest Tools Kali Linux
- Hack Tool Apk
- Hacking Tools Pc
- Install Pentest Tools Ubuntu
- Hack Tools For Pc
- Hacker Tools Online
- Usb Pentest Tools
- Pentest Tools Linux
- New Hack Tools
- Bluetooth Hacking Tools Kali
- Underground Hacker Sites
- Best Hacking Tools 2020
- Hackrf Tools
- Pentest Tools Website
- Top Pentest Tools
- Beginner Hacker Tools
- Android Hack Tools Github
- Pentest Tools List
- Hack Tools For Pc
- Hack Tools 2019
- Nsa Hacker Tools
- Pentest Automation Tools
- Pentest Tools Framework
- Hacking Tools Hardware
- Pentest Tools Github
- Hack Tools
- Hacking Tools Github
- Hacking Apps
- Top Pentest Tools
- Hack Tools Github
- Pentest Tools Framework
- Pentest Tools
- Hacker Tools For Ios
- Pentest Tools Port Scanner
- Hack Tools For Pc
- Hack App
- Hacking Tools 2020
- Hacking Tools Name
- Ethical Hacker Tools
- Pentest Tools Linux
- Hacking Tools For Mac
- Best Hacking Tools 2019
- Game Hacking
- Hacker Search Tools
- Free Pentest Tools For Windows
- Hacker Security Tools
- Best Hacking Tools 2020
Saturday, August 29, 2020
$$$ Bug Bounty $$$
What is Bug Bounty ?
A bug bounty program, also called a vulnerability rewards program (VRP), is a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs. Bug bounty programs are often initiated to supplement internal code audits and penetration tests as part of an organization's vulnerability management strategy.
Many software vendors and websites run bug bounty programs, paying out cash rewards to software security researchers and white hat hackers who report software vulnerabilities that have the potential to be exploited. Bug reports must document enough information for for the organization offering the bounty to be able to reproduce the vulnerability. Typically, payment amounts are commensurate with the size of the organization, the difficulty in hacking the system and how much impact on users a bug might have.
Mozilla paid out a $3,000 flat rate bounty for bugs that fit its criteria, while Facebook has given out as much as $20,000 for a single bug report. Google paid Chrome operating system bug reporters a combined $700,000 in 2012 and Microsoft paid UK researcher James Forshaw $100,000 for an attack vulnerability in Windows 8.1. In 2016, Apple announced rewards that max out at $200,000 for a flaw in the iOS secure boot firmware components and up to $50,000 for execution of arbitrary code with kernel privileges or unauthorized iCloud access.
While the use of ethical hackers to find bugs can be very effective, such programs can also be controversial. To limit potential risk, some organizations are offering closed bug bounty programs that require an invitation. Apple, for example, has limited bug bounty participation to few dozen researchers.
Read moreA bug bounty program, also called a vulnerability rewards program (VRP), is a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs. Bug bounty programs are often initiated to supplement internal code audits and penetration tests as part of an organization's vulnerability management strategy.
Many software vendors and websites run bug bounty programs, paying out cash rewards to software security researchers and white hat hackers who report software vulnerabilities that have the potential to be exploited. Bug reports must document enough information for for the organization offering the bounty to be able to reproduce the vulnerability. Typically, payment amounts are commensurate with the size of the organization, the difficulty in hacking the system and how much impact on users a bug might have.
Mozilla paid out a $3,000 flat rate bounty for bugs that fit its criteria, while Facebook has given out as much as $20,000 for a single bug report. Google paid Chrome operating system bug reporters a combined $700,000 in 2012 and Microsoft paid UK researcher James Forshaw $100,000 for an attack vulnerability in Windows 8.1. In 2016, Apple announced rewards that max out at $200,000 for a flaw in the iOS secure boot firmware components and up to $50,000 for execution of arbitrary code with kernel privileges or unauthorized iCloud access.
While the use of ethical hackers to find bugs can be very effective, such programs can also be controversial. To limit potential risk, some organizations are offering closed bug bounty programs that require an invitation. Apple, for example, has limited bug bounty participation to few dozen researchers.
- Hacker Tools Github
- Tools 4 Hack
- Hack Tools Pc
- Computer Hacker
- Physical Pentest Tools
- Hacking Tools Hardware
- Pentest Tools Bluekeep
- Pentest Tools Url Fuzzer
- Underground Hacker Sites
- Hacking Tools Name
- Hacking Tools For Pc
- Free Pentest Tools For Windows
- Pentest Tools
- Tools Used For Hacking
- How To Hack
- Hacking Tools Software
- New Hack Tools
- Ethical Hacker Tools
- Hacking Tools Windows 10
- Pentest Automation Tools
- Pentest Tools Nmap
- Hacks And Tools
- Hacking Tools 2019
- Hack Website Online Tool
- Hacker Tools For Ios
- Pentest Automation Tools
- Hacking Tools 2020
- Hack Tools Download
- Pentest Tools Website Vulnerability
- Hacker Tools Apk
- Pentest Tools Alternative
- Hacker Search Tools
- Android Hack Tools Github
- Pentest Tools Download
- Black Hat Hacker Tools
- Nsa Hack Tools Download
- Hacking Tools
- Termux Hacking Tools 2019
- Pentest Tools Online
- Physical Pentest Tools
- Hacker Tools Online
- Hacking Tools Software
- Hack Tools For Games
- How To Hack
- Pentest Tools Kali Linux
- Pentest Tools Kali Linux
- Hacker Tools Hardware
- Hack Tools 2019
- Pentest Tools Subdomain
- Hacker Tools List
- Hacker Techniques Tools And Incident Handling
- Hack Tools For Games
- Hack Rom Tools
- Hacking Tools 2019
- Hacking Tools Free Download
- Pentest Tools Online
- Hacker Tools Windows
- Hack Apps
- Hacker Tools For Pc
- Hacker Tools Apk Download
- Hacker Tools Mac
- Computer Hacker
- Hacking Tools For Windows Free Download
- Hackrf Tools
- Pentest Tools Alternative
- Hacker Tools Free
- Hak5 Tools
- Hack Tools Github
- Black Hat Hacker Tools
- Hacking App
- Install Pentest Tools Ubuntu
- Hacking Tools Mac
- Pentest Tools Online
- Hacker Techniques Tools And Incident Handling
- Hacker Tools For Ios
- Hacks And Tools
- Hacking Tools Kit
- Pentest Tools Website
- Hacks And Tools
- Hacker Tools Free
- Hack And Tools
- Hack Tools For Mac
- How To Hack
- Pentest Tools For Android
Subscribe to:
Comments (Atom)

