Papers

/Papers

A2SV: Auto Scanning Tool To Find SSL Vulnerability

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

A2SV: Auto Scanning Tool To Find SSL Vulnerability
What is A2SV?
Its an Auto Scanning tool to find SSL Vulnerability and its featured with HeartBleed, CCS Injection, SSLv3 POODLE, FREAK… etc

A. Support Vulnerability

CCS Injection
HeartBleed
SSLv3 POODLE
FREAK Attack
LOGJAM Attack
SSLv2 DROWN

B. Dev Plan

SSL […]

By |November 15th, 2016|Papers|

CuckooDroid – Automated Android Malware Analysis Tool

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

CuckooDroid – Automated Android Malware Analysis with Cuckoo Sandbox.
CuckooDroid is an extension of Cuckoo Sandbox the Open Source software for automating analysis of suspicious files, CuckooDroid brigs to cuckoo the capabilities of execution and analysis of android application.

CuckooDroid featured with VM-detection techniques, encryption key extraction, […]

By |November 15th, 2016|Papers|

Pompem – Exploit and Vulnerability Finder Pentester Tool

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Pompem – Exploit and Vulnerability Finder Pentester Tool
Pompem is an open source tool, designed to automate the search for Exploits and Vulnerability in the most important databases.
Its’s Developed in Python, has a system of advanced search, that help the work of pentesters and ethical hackers. […]

By |November 15th, 2016|Papers|

OWASP Mth3l3m3nt Framework: A Penetration Testing Aiding And Exploitation Framework Tool

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

OWASP Mth3l3m3nt Framework: A Penetration Testing Aiding Tool And Exploitation Framework
It fosters a principle of attack the web using the web as well as pentest.

Modules Packed in so far are:

Payload Store
Shell Generator (PHP/ASP/JSP/JSPX/CFM)
Payload Encoder and Decoder (Base64/Rot13/Hex/Hexwith \x seperator/ Hex with 0x […]

By |November 14th, 2016|Papers|

A Simple Static Malware Analyzer SSMA Tool Written in Python 3

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

SSMA is a simple malware analyzer written in Python 3.

Features:

Analyze PE file’s header and sections (number of sections, entropy of sections/PE file, suspicious section names, suspicious flags in the characteristics of the PE file, etc.)
Searches for possible domains, e-mail addresses, IP addresses in […]

By |November 14th, 2016|Papers|

PWND.SH: Post-Exploitation Framework (and an interactive shell) Developed In Bash Shell Scripting

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

It aims to be cross-platform (Linux, Mac OS X, Solaris etc.) and with little to no external dependencies.
Install:
$ cd bin/
$ ./compile_pwnd_sh.sh
This will generate a file called pwnd.sh

$ ls -la pwnd.sh
-rw-r–r–@ 1 ikotler  staff  7823 Oct 19 16:55 pwnd.sh

Now let’s get pwnd!

$ source pwnd.sh
Pwnd v1.0.0, Itzik […]

By |November 14th, 2016|Papers|

VolatilityBot – An Automated Memory Analyzer For Malware Samples And Memory Dumps

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

VolatilityBot – An Automated Memory Analyzer For Malware Samples And Memory Dumps
VolatilityBot is an automation tool for researchers cuts all the guesswork and manual tasks out of the binary extraction phase, or to help the investigator in the first steps of performing a memory analysis […]

By |November 14th, 2016|Papers|

Nathan: Android Emulator for Mobile Security Testing Tool

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Nathan is a 5.1.1 SDK 22 AOSP Android emulator customized to perform mobile security assessment.

Supported architectures:

x86
arm (soon)

The emulator is equipped with the Xposed Framework and the following pre-installed modules:

SSLUnpinning, to bypass SSL Certificate pinning.
Inspeckage, to perform the dynamic analysis of an […]

By |November 14th, 2016|Papers|

What Does The IP Address 0.0.0.0 Really Mean? What Are Its Different Uses?

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

You might have heard about the IP address 0.0.0.0 but never thought much about it. Some of you would be knowing that it’s a ‘no particular address’ placeholder’. But, what else? What does it really mean in different situations? Well, here I’ll try to answer these […]

By |November 7th, 2016|Papers|

Hack Sticky Key Feature And Reset Windows Password Using CMD

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Protecting your Windows machine with a password is a must. It’s a great layer of security disabling unauthorized people from using your computer. But there are times when your own security layer restricts you from using your Windows OS. Probably, because you aren’t worthy of […]

By |November 7th, 2016|Papers|