Daily Archives: November 15, 2016

TomCatWarDeployer: Apache Tomcat Auto WAR Deployment And Pwning Penetration Testing Tool

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

TomCatWarDeployer: Apache Tomcat Auto WAR deployment & Pwning Penetration Testing Tool..
Apache Tomcat auto WAR deployment & pwning penetration testing tool.
What is it?

This is a penetration testing tool intended to leverage Apache Tomcat credentials in order to automatically generate and deploy JSP Backdoor, as well as […]

By |November 15th, 2016|Papers|

DMitry A Deepmagic Information Gathering Tool

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

DMitry (Deepmagic Information Gathering Tool) is a UNIX/(GNU) Linux Command Line Application coded in C language.

DMitry has the ability to gather as much information as possible about a host. Base functionality is able to gather possible subdomains, email addresses, uptime information, tcp port scan, whois […]

By |November 15th, 2016|Papers|

Pharming: A Type of Phishing And DNS Poisoning Attack

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Pharming: A Type of Phishing And DNS Poisoning Attack
Pharming is a cyber attack intended to redirect a website’s traffic to another, fake site. Pharming can be conducted either by changing the hosts file on a victim’s computer or by exploitation of a vulnerability in DNS […]

By |November 15th, 2016|Papers|

How To Break SSL Protection via MITM Attack With SSLStrip Tool

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

How To Break SSL Protection via MITM Attack With SSLStrip Tool
sslstrip is a MITM tool that implements Moxie Marlinspike’s SSL stripping attacks. It requires Python 2.5 or newer, along with the ‘twisted’ python module.
First Requirements:

Run Python
The python “twisted-web” module (apt-get install python-twisted-web)

Setup

 Unpack: […]

By |November 15th, 2016|Papers|

A2SV: Auto Scanning Tool To Find SSL Vulnerability

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

A2SV: Auto Scanning Tool To Find SSL Vulnerability
What is A2SV?
Its an Auto Scanning tool to find SSL Vulnerability and its featured with HeartBleed, CCS Injection, SSLv3 POODLE, FREAK… etc

A. Support Vulnerability

CCS Injection
HeartBleed
SSLv3 POODLE
FREAK Attack
LOGJAM Attack
SSLv2 DROWN

B. Dev Plan

SSL […]

By |November 15th, 2016|Papers|

CuckooDroid – Automated Android Malware Analysis Tool

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

CuckooDroid – Automated Android Malware Analysis with Cuckoo Sandbox.
CuckooDroid is an extension of Cuckoo Sandbox the Open Source software for automating analysis of suspicious files, CuckooDroid brigs to cuckoo the capabilities of execution and analysis of android application.

CuckooDroid featured with VM-detection techniques, encryption key extraction, […]

By |November 15th, 2016|Papers|

Pompem – Exploit and Vulnerability Finder Pentester Tool

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Pompem – Exploit and Vulnerability Finder Pentester Tool
Pompem is an open source tool, designed to automate the search for Exploits and Vulnerability in the most important databases.
Its’s Developed in Python, has a system of advanced search, that help the work of pentesters and ethical hackers. […]

By |November 15th, 2016|Papers|