VOIPER - VoIP Exploit Research ToolVoIPER is a security toolkit that aims to allow developers and securityresearchers to easily, extensively and automatically test VoIP devicesfor security vulnerabilties. It incorporates a fuzzing suite built onthe Sulley fuzzing framework, a SIP torturer tool based on RFC 4475 anda variety of auxilliary modules to assist in crash detection and debuggingIt is cross platform and usable via a command line interface on Linux,Windows and OS X or a GUI on Windows. The primary goal of VoIPER is tocreate a toolkit with all required testing functionality built in and tominimise the amount of effort an auditor has to put into testing thesecurity of a VoIP code base.For the moment the fuzzer incorporates tests forSIP INVITE (3 different test suites)SIP ACKSIP CANCELSIP request structureSDP over SIPThis translates to well over 200,000 generated tests covering all SIPattributes specified in RFC 3261 for the given messages.Download: http://sourceforge.net/project/showfiles.php?group_id=208579---------------------------------------------------------------------fgdump versi 2.0fgdump is a password hash dumper for Windows 2000 and later systems. Itis capable of dumping LanMan and NTLM hashes as well as password hashhistories.Major changes that come with this release 2.0:fgdump will now detect 64-bit targets and report them as such64-bit pwdump and cachedump will be used when the target is detected as64-bitFixed a problem when connecting to some Samba servers whereRegQueryValueEx would not behave as expectedfgdump will now generate a session ID during each run - used tocorrelate failed logs and regular logsDownload: http://www.foofus.net/fizzgig/fgdump---------------------------------------------------------------------BlueMaho Bluetooth Security Testing Suite v.080422 betaBlueMaho is GUI-shell (interface) for suite of tools for testingsecurity of bluetooth devices. It is freeware, opensource, written onpython, uses wxPyhon. It can be used for testing BT-devices for knownvulnerabilities and major thing to do - testing to find unknownvulnerabilities.Featuresscan for devices, show advanced info, SDP records, vendor etcloop scan - it can scan all time, showing you online devicesalerts with sound if new device foundon_new_device - you can specify what command should it run when itfounds new deviceit can use separate dongles - one for scanning (loop scan) and one forrunning tools or exploitssend fileschange name, class, mode, BD_ADDR of local HCI devicessave results in databasetracking - it can show when remote device was seen first and how manytimesposition feature - it can write to database WHERE scanned device wasfound (you specify location by yourself)test remote device for known vulnerabilities (see exploits for moredetails)test remote device for unknown vulnerabilities (see tools for moredetails)themes! you can customize ittools:atshell.c by Bastian Ballmann (modified attest.c by Marcel Holtmann)bccmd by Marcel Holtmannbdaddr.c by Marcel Holtmannbluetracker.py by smileypsm_scan and rfcomm_scan from bt_audit-0.1.1 by Collin R. MullinerBSS (Bluetooth Stack Smasher) v0.8 by Pierre Betouinbtftp v0.1 by Marcel Holtmannbtobex v0.1 by Marcel Holtmanngreenplaque v1.5 by digitalmunition.comL2CAP packetgenerator by Bastian Ballmannredfang v2.50 by Ollie Whitehouseussp-push v0.10 by Davide Libenziexploits:Bluebugger v0.1 by Martin J. MuenchbluePIMp by Kevin FinisterreBlueZ hcidump v1.29 DoS PoC by Pierre Betouinhelomoto by Adam Lauriehidattack v0.1 by Collin R. MullinerNokia N70 l2cap packet DoS PoC Pierre BetouinSony-Ericsson reset display PoC by Pierre BetouinDownload:http://wiki.thc.org/BlueMaho?action=AttachFile&do=get&target=bluemaho_v080422_be\ta.tar.gz
Gildas Deograt, CISSP
10 tahun yang lalu
Tidak ada komentar:
Posting Komentar