<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-232798662055846003</id><updated>2022-04-29T07:46:39.045+02:00</updated><category term="Tools"/><category term="News"/><category term="Papers"/><category term="XSS"/><category term="Security"/><category term="Browser"/><category term="SQL Injection"/><category term="Security-Distro"/><category term="Bugs"/><category term="Malware"/><category term="0day"/><category term="Fuzzer"/><category term="Botnet"/><category term="Rootkit"/><title type='text'>Security-Shell</title><subtitle type='html'>Hacking and Security tools . News and Views for the World ®</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://security-sh3ll.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://security-sh3ll.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>d3v1l</name><uri>http://www.blogger.com/profile/03119852053430095623</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://4.bp.blogspot.com/-14ZpUTM5s6I/T7AToB85x4I/AAAAAAAABCk/1xf2L2Z_Hpo/s220/lol.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>1209</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-232798662055846003.post-5669258112995052746</id><published>2014-02-12T10:49:00.001+01:00</published><updated>2014-02-12T10:49:18.596+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><title type='text'>WAVSEP 2014 Web Application Scanner Benchmark</title><content type='html'>  &lt;div class=&quot;MsoNormal&quot; dir=&quot;LTR&quot; style=&quot;direction: ltr; text-align: left;&quot;&gt;The *2014* WAVSEP web application scanner benchmark has been published &lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; dir=&quot;LTR&quot; style=&quot;direction: ltr; text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; dir=&quot;LTR&quot; style=&quot;direction: ltr; text-align: left;&quot;&gt;Currently includes new products that were tested for the first time (ScanToSecure, N-Stalker), as well as returning vendors that were not tested for a while (NTOSpider).&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; dir=&quot;LTR&quot; style=&quot;direction: ltr; text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; dir=&quot;LTR&quot; style=&quot;direction: ltr; text-align: left;&quot;&gt;Covering a total *&lt;b&gt;63&lt;/b&gt;* vulnerability scanners, including commercial scanners, multiple SAAS engines and open source vendors, the research compares the performance of the various tested scanners in the following aspects:&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; dir=&quot;LTR&quot; style=&quot;direction: ltr; text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; dir=&quot;LTR&quot; style=&quot;direction: ltr; text-align: left;&quot;&gt;&lt;strong&gt;(*) Prices vs. Features&lt;/strong&gt;&lt;/div&gt;&lt;strong&gt; &lt;/strong&gt;&lt;div class=&quot;MsoNormal&quot; dir=&quot;LTR&quot; style=&quot;direction: ltr; text-align: left;&quot;&gt;&lt;strong&gt;(*) Automated Crawling (WIVET)&lt;/strong&gt;&lt;/div&gt;&lt;strong&gt; &lt;/strong&gt;&lt;div class=&quot;MsoNormal&quot; dir=&quot;LTR&quot; style=&quot;direction: ltr; text-align: left;&quot;&gt;&lt;strong&gt;(*) Technology and Input Delivery Method Support&lt;/strong&gt;&lt;/div&gt;&lt;strong&gt; &lt;/strong&gt;&lt;div class=&quot;MsoNormal&quot; dir=&quot;LTR&quot; style=&quot;direction: ltr; text-align: left;&quot;&gt;&lt;strong&gt;(*) Backup/Hidden File Detection Accuracy (*NEW!*)&lt;/strong&gt;&lt;/div&gt;&lt;strong&gt; &lt;/strong&gt;&lt;div class=&quot;MsoNormal&quot; dir=&quot;LTR&quot; style=&quot;direction: ltr; text-align: left;&quot;&gt;&lt;strong&gt;(*) Unvalidated Redirect Detection Accuracy (*NEW!*)&lt;/strong&gt;&lt;/div&gt;&lt;strong&gt; &lt;/strong&gt;&lt;div class=&quot;MsoNormal&quot; dir=&quot;LTR&quot; style=&quot;direction: ltr; text-align: left;&quot;&gt;&lt;strong&gt;(*) SQL Injection Detection Accuracy&lt;/strong&gt;&lt;/div&gt;&lt;strong&gt; &lt;/strong&gt;&lt;div class=&quot;MsoNormal&quot; dir=&quot;LTR&quot; style=&quot;direction: ltr; text-align: left;&quot;&gt;&lt;strong&gt;(*) Cross Site Scripting Detection Accuracy&lt;/strong&gt;&lt;/div&gt;&lt;strong&gt; &lt;/strong&gt;&lt;div class=&quot;MsoNormal&quot; dir=&quot;LTR&quot; style=&quot;direction: ltr; text-align: left;&quot;&gt;&lt;strong&gt;(*) Path Traversal / LFI Detection Accuracy&lt;/strong&gt;&lt;/div&gt;&lt;strong&gt; &lt;/strong&gt;&lt;div class=&quot;MsoNormal&quot; dir=&quot;LTR&quot; style=&quot;direction: ltr; text-align: left;&quot;&gt;&lt;strong&gt;(*) (XSS/Phishing via) Remote File Inclusion&lt;/strong&gt;&lt;/div&gt;&lt;strong&gt; &lt;/strong&gt;&lt;div class=&quot;MsoNormal&quot; dir=&quot;LTR&quot; style=&quot;direction: ltr; text-align: left;&quot;&gt;&lt;strong&gt;(*) Supported Vulnerability Detection Features (e.g. audit features)&lt;/strong&gt;&lt;/div&gt;&lt;strong&gt; &lt;/strong&gt;&lt;div class=&quot;MsoNormal&quot; dir=&quot;LTR&quot; style=&quot;direction: ltr; text-align: left;&quot;&gt;&lt;strong&gt;(*) Authentication and Usability Features&lt;/strong&gt;&lt;/div&gt;&lt;strong&gt; &lt;/strong&gt;&lt;div class=&quot;MsoNormal&quot; dir=&quot;LTR&quot; style=&quot;direction: ltr; text-align: left;&quot;&gt;&lt;strong&gt;(*) Coverage and Scan Barrier Support (AntiCSRF Tokens, CAPTCHA, etc)&lt;/strong&gt;&lt;/div&gt;&lt;strong&gt; &lt;/strong&gt;&lt;div class=&quot;MsoNormal&quot; dir=&quot;LTR&quot; style=&quot;direction: ltr; text-align: left;&quot;&gt;&lt;strong&gt;(*) Etc&lt;/strong&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; dir=&quot;LTR&quot; style=&quot;direction: ltr; text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; dir=&quot;LTR&quot; style=&quot;direction: ltr; text-align: left;&quot;&gt;The benchmark *&lt;b&gt;one page&lt;/b&gt;* result summary can be viewed through the following link:&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; dir=&quot;LTR&quot; style=&quot;direction: ltr; text-align: left;&quot;&gt;&lt;a href=&quot;http://sectoolmarket.com/price-and-feature-comparison-of-web-application-scanners-unified-list.html&quot; target=&quot;_blank&quot;&gt;http://sectoolmarket.com/price-and-feature-comparison-of-web-application-scanners-unified-list.html&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; dir=&quot;LTR&quot; style=&quot;direction: ltr; text-align: left;&quot;&gt;&lt;a href=&quot;http://sectoolmarket.com/price-and-feature-comparison-of-web-application-scanners-unified-list.html&quot; target=&quot;_blank&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; dir=&quot;LTR&quot; style=&quot;direction: ltr; text-align: left;&quot;&gt;The full article, which includes analysis and conclusions, can be accessed through the following link:&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; dir=&quot;LTR&quot; style=&quot;direction: ltr; text-align: left;&quot;&gt;&lt;span lang=&quot;HE&quot; style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;a href=&quot;http://sectooladdict.blogspot.com/2014/02/wavsep-web-application-scanner.html&quot; target=&quot;_blank&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;http://sectooladdict.blogspot.com/2014/02/wavsep-web-application-scanner.html&amp;nbsp;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; dir=&quot;LTR&quot; style=&quot;direction: ltr; text-align: left;&quot;&gt;&lt;span lang=&quot;HE&quot; style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; dir=&quot;LTR&quot; style=&quot;direction: ltr; text-align: left;&quot;&gt;&lt;span lang=&quot;HE&quot; style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;strong&gt;To be up to date with all news just follow&lt;/strong&gt; &lt;a href=&quot;https://twitter.com/sectooladdict&quot;&gt;https://twitter.com/sectooladdict&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;HE&quot; style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://security-sh3ll.blogspot.com/feeds/5669258112995052746/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=232798662055846003&amp;postID=5669258112995052746' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/5669258112995052746'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/5669258112995052746'/><link rel='alternate' type='text/html' href='http://security-sh3ll.blogspot.com/2014/02/wavsep-2014-web-application-scanner.html' title='WAVSEP 2014 Web Application Scanner Benchmark'/><author><name>d3v1l</name><uri>http://www.blogger.com/profile/03119852053430095623</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://4.bp.blogspot.com/-14ZpUTM5s6I/T7AToB85x4I/AAAAAAAABCk/1xf2L2Z_Hpo/s220/lol.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-232798662055846003.post-505863103627948339</id><published>2013-12-17T08:00:00.000+01:00</published><updated>2013-12-17T08:00:25.978+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><title type='text'>Faraday -  Penetration Test IDE</title><content type='html'>&lt;em&gt;&lt;a href=&quot;http://www.faradaysec.com/index.html&quot;&gt;Faraday&lt;/a&gt; introduces a new concept (IPE) Integrated Penetration-Test Environment a multiuser Penetration test IDE. Designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Features:&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;* +40 Plugins (Metasploit, Amap, Arachini, Dnsenum, Medusa, Nmap, Nessus, w3af, Zap and More!)&lt;br /&gt;* Collaborative support &lt;br /&gt;* Information Highlighting &lt;br /&gt;* Knowledge Filtering &lt;br /&gt;* Information Dashboard &lt;br /&gt;* Conflict Detection &lt;br /&gt;* Support for multiple Workspaces &lt;br /&gt;* IntelliSense Support &lt;br /&gt;* Easy Plugin Development &lt;br /&gt;* XMLRPC, XML and Regex Parsers&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;More info and Download:&lt;/strong&gt; &lt;a href=&quot;https://github.com/infobyte/faraday&quot;&gt;https://github.com/infobyte/faraday&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://security-sh3ll.blogspot.com/feeds/505863103627948339/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=232798662055846003&amp;postID=505863103627948339' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/505863103627948339'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/505863103627948339'/><link rel='alternate' type='text/html' href='http://security-sh3ll.blogspot.com/2013/12/faraday-penetration-test-ide.html' title='Faraday -  Penetration Test IDE'/><author><name>d3v1l</name><uri>http://www.blogger.com/profile/03119852053430095623</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://4.bp.blogspot.com/-14ZpUTM5s6I/T7AToB85x4I/AAAAAAAABCk/1xf2L2Z_Hpo/s220/lol.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-232798662055846003.post-7996850805813564391</id><published>2013-12-02T19:45:00.000+01:00</published><updated>2013-12-02T19:45:46.455+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><title type='text'>Evil Foca - IPv4 and IPv6 Penetration testing tool</title><content type='html'> &lt;em&gt;&amp;nbsp;&lt;/em&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;em&gt;&lt;a href=&quot;http://4.bp.blogspot.com/-FUSpT-cPGXY/UpzU6bHJ5ZI/AAAAAAAABMc/5Ce4j-5_osk/s1600/screen.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;228&quot; src=&quot;http://4.bp.blogspot.com/-FUSpT-cPGXY/UpzU6bHJ5ZI/AAAAAAAABMc/5Ce4j-5_osk/s320/screen.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/em&gt;&lt;/div&gt;&lt;em&gt; &lt;/em&gt;&lt;br /&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;em&gt;Evil Foca&lt;strong&gt; &lt;/strong&gt;is a tool for Pentesters and Security Auditors to perform security testing in IPv4/ IPv6 data networks.     &amp;nbsp;&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;The tool is capable to do different attacks such as:&lt;/strong&gt;&lt;br /&gt;           &lt;ul&gt;&lt;li&gt;&lt;em&gt;MITM on IPv4 networks using ARP Spoofing and DHCP ACK injection.&lt;/em&gt;&lt;/li&gt;&lt;em&gt;      &lt;/em&gt;&lt;li&gt;&lt;em&gt;MITM on IPv6 networks using Neighbor Advertisement Spoofing, SLAAC Attack, fake DHCPv6.&lt;/em&gt;&lt;/li&gt;&lt;em&gt;      &lt;/em&gt;&lt;li&gt;&lt;em&gt;DoS (Denial of Service) on IPv4 networks using ARP Spoofing.&lt;/em&gt;&lt;/li&gt;&lt;em&gt;      &lt;/em&gt;&lt;li&gt;&lt;em&gt;DoS (Denial of Service) on IPv6 networks using SLAAC Attack.&lt;/em&gt;&lt;/li&gt;&lt;em&gt;      &lt;/em&gt;&lt;li&gt;&lt;em&gt;DNS Hijacking.&amp;nbsp;&lt;/em&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;strong&gt;Download: &lt;a href=&quot;http://www.informatica64.com/evilfoca/download.aspx&quot;&gt;http://www.informatica64.com&lt;/a&gt;&lt;/strong&gt;&lt;br /&gt;&lt;ul&gt;            &lt;/ul&gt;&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://security-sh3ll.blogspot.com/feeds/7996850805813564391/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=232798662055846003&amp;postID=7996850805813564391' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/7996850805813564391'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/7996850805813564391'/><link rel='alternate' type='text/html' href='http://security-sh3ll.blogspot.com/2013/12/evil-foca-ipv4-and-ipv6-penetration.html' title='Evil Foca - IPv4 and IPv6 Penetration testing tool'/><author><name>d3v1l</name><uri>http://www.blogger.com/profile/03119852053430095623</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://4.bp.blogspot.com/-14ZpUTM5s6I/T7AToB85x4I/AAAAAAAABCk/1xf2L2Z_Hpo/s220/lol.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://4.bp.blogspot.com/-FUSpT-cPGXY/UpzU6bHJ5ZI/AAAAAAAABMc/5Ce4j-5_osk/s72-c/screen.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-232798662055846003.post-2030648906911332749</id><published>2013-11-02T14:43:00.000+01:00</published><updated>2013-11-02T14:43:33.971+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><title type='text'>Retire.js - Command line Scanner and Chrome plugin</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&amp;nbsp;Retire.js identify JavaScript libraries with known vulnerabilities in your application &amp;nbsp;&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;i&gt;&lt;a href=&quot;http://open.bekk.no/retire-js-what-you-require-you-must-also-retire&quot;&gt;Retire.js&lt;/a&gt; is a command line scanner that helps you identify dependencies with known vulnerabilites in your application. Using the provided Grunt plugin you can easily include Retire.js into your build process. Retire.js also provides a chrome extension allowing you to detect libraries while surfing your website. &lt;/i&gt;&lt;br /&gt;&lt;br /&gt;  &lt;em&gt;To detect a given version of a given component, Retire.js uses  filename or URL. If that fails, it will download/open the file and look  for specific comments within the file. If that also fails, there is the  possibility to use hashes for minified files. And if that fails as well,  the Chrome plugin will run code in a sandbox to try to detect the  component and version. This last detection mechanims is not available in  the command line scanner, as running arbitrary JavaScript-files in the  node-process could have unwanted consequences. If anybody knows of a  good way to sandbox the code on node, feel free to register and issue or  contribute.&amp;nbsp;&lt;/em&gt;&lt;br /&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;em&gt;&lt;/em&gt;&lt;em&gt;It&#39;s important to note that even though your site is using a  vulnerable library, that does not necessarily mean your site is  vulnerable. It depends on whether and how your site exercises the  vulnerable code. That said, it&#39;s better to be safe than sorry.&amp;nbsp;&lt;/em&gt;&lt;br /&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;strong&gt;More Info and Download:&lt;/strong&gt;&lt;em&gt; &lt;a href=&quot;https://github.com/bekk/retire.js&quot;&gt;https://github.com/bekk/retire.js&lt;/a&gt;&lt;/em&gt;&lt;br /&gt;&lt;em&gt;&lt;/em&gt;&lt;em&gt;&amp;nbsp;&lt;/em&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; </content><link rel='replies' type='application/atom+xml' href='http://security-sh3ll.blogspot.com/feeds/2030648906911332749/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=232798662055846003&amp;postID=2030648906911332749' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/2030648906911332749'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/2030648906911332749'/><link rel='alternate' type='text/html' href='http://security-sh3ll.blogspot.com/2013/11/retirejs-command-line-scanner-and.html' title='Retire.js - Command line Scanner and Chrome plugin'/><author><name>d3v1l</name><uri>http://www.blogger.com/profile/03119852053430095623</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://4.bp.blogspot.com/-14ZpUTM5s6I/T7AToB85x4I/AAAAAAAABCk/1xf2L2Z_Hpo/s220/lol.jpg'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-232798662055846003.post-7788636959765980221</id><published>2013-09-12T09:02:00.000+02:00</published><updated>2013-09-12T09:02:05.293+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><title type='text'>SpearPhisher – A Simple Phishing Email Generation Tool</title><content type='html'>&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;em&gt;&lt;a href=&quot;http://1.bp.blogspot.com/-IHHfl9M6qRA/UjFmri5qdHI/AAAAAAAABKg/aO3BZhJLhsQ/s1600/spearphiser1.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;153&quot; src=&quot;http://1.bp.blogspot.com/-IHHfl9M6qRA/UjFmri5qdHI/AAAAAAAABKg/aO3BZhJLhsQ/s200/spearphiser1.png&quot; width=&quot;200&quot; /&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/a&gt;&lt;/em&gt;&lt;/div&gt;&lt;br /&gt;&lt;em&gt;SpearPhisher is a simple point and click Windows GUI tool designed for (mostly) non-technical people who would like to supplement the education and awareness aspect of their information security program.  Not only is it useful to non-technical folks, penetration testers may find it handy for sending quick and easy ad-hoc phishing emails.  The tool supports specifying different sending names and email addresses, multiple recipients via TO, CC, BCC, and allows bulk loading with one recipient email address per line in a file.  It allows customization of the subject, adding one attachment, and SSL support for SMTP enabled mail servers.  One of the popular features with our client is the WYSIWYG HTML editor that allows virtually anyone to use the tool; previewing results as you point and click edit your malicious email body.  If you want to add custom XSS exploits, client side attacks, or other payloads such as a Java Applet code generated by the Social Engineer Toolkit (SET), its split screen editor allows more advanced users to edit HTML directly.&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Download and more info: &lt;/strong&gt;&lt;a href=&quot;https://www.trustedsec.com/september-2013/introducing-spearphisher-simple-phishing-email-generation-tool/&quot;&gt;https://www.trustedsec.com/september-2013/introducing-spearphisher-simple-phishing-email-generation-tool/&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://security-sh3ll.blogspot.com/feeds/7788636959765980221/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=232798662055846003&amp;postID=7788636959765980221' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/7788636959765980221'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/7788636959765980221'/><link rel='alternate' type='text/html' href='http://security-sh3ll.blogspot.com/2013/09/spearphisher-simple-phishing-email.html' title='SpearPhisher – A Simple Phishing Email Generation Tool'/><author><name>d3v1l</name><uri>http://www.blogger.com/profile/03119852053430095623</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://4.bp.blogspot.com/-14ZpUTM5s6I/T7AToB85x4I/AAAAAAAABCk/1xf2L2Z_Hpo/s220/lol.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://1.bp.blogspot.com/-IHHfl9M6qRA/UjFmri5qdHI/AAAAAAAABKg/aO3BZhJLhsQ/s72-c/spearphiser1.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-232798662055846003.post-2525159839413154760</id><published>2013-09-10T09:39:00.006+02:00</published><updated>2013-09-10T12:57:37.608+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>DefCamp 2013</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&amp;nbsp;International hacking and information security conference in Romania &amp;nbsp;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;b&gt;The DefCamp 2013 &lt;a href=&quot;http://defcamp.ro/call-for-papers/&quot;&gt;call for papers&lt;/a&gt; is officially open. The fourth edition of the international information security conference hosted in Romania will take place on November 29-30 2013, in Bucharest, at the Crystal Palace Ballroom.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Over 300 security experts, researchers, and enthusiasts from Romania and neighboring countries are expected to take part in the event. Between 29 - 30th of November the Crystal Palace Ballroom is hosting one of the most mesmerizing events of hacking &amp;amp; information security in Romania, &lt;a href=&quot;http://defcamp.ro/&quot;&gt;Defcamp&lt;/a&gt;. Now in its fourth year, the event continues to impress its audience with knowledge sharing, competition with varying levels of difficulty, romanian and foreign speakers, surprises and fun. &lt;br /&gt;&lt;br /&gt;&lt;i&gt;&quot;We have awaited the 48 hours of DefCamp 2013 since the closing moment of the last edition. It is hypnotizing to exchange ideas, to compete, to expand your knowledge and to meet people who you know only from the virtual world. DCTF (DefCamp Capture the Flag) - our main competition of the conference, Hack the Machine, App2Own, Spot the Cop, Wall of Sheep are just a few of the activities that will try to captivate your attention at Defcamp 2013. Sometimes I wish I could participate for me to fully enjoy these moments!&quot;&lt;/i&gt;, said &lt;a href=&quot;https://twitter.com/AndreiAvadanei&quot;&gt;Andrei Avădănei&lt;/a&gt; founder and coordinator of the Defcamp conference. &lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://1.bp.blogspot.com/-yfYtkg8TS20/Ui76--qLxvI/AAAAAAAABKQ/8BlHOoaV80A/s1600/defcamp_logo.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://1.bp.blogspot.com/-yfYtkg8TS20/Ui76--qLxvI/AAAAAAAABKQ/8BlHOoaV80A/s1600/defcamp_logo.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;The conference that will take place this fall will engage participants in discussions about 0days, PRISM, mobile security problems, DDOS, networking, P2P networks, D&amp;amp;D APT’s, social engineering. camera surveillance, application security research, lock picking, secure system administration with key industry specialist from Romania and abroad holding presentations. Everyone can apply to be a speaker at the conference, DefCamp 2013 being the first edition where we officially launched a &lt;a href=&quot;http://defcamp.ro/call-for-papers/&quot;&gt;Call for Papers&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;The DCTF ( &lt;a href=&quot;http://defcamp.ro/dctf/&quot;&gt;DefCamp Capture the Flag&lt;/a&gt; ) will have an on line qualifying round followed by a death defying duel during the event between the teams that enter the finals. The competition challenges are extremely provocative and various - exploits, cryptography, programming, steganography, forensics, reverse engineering etc, these subjects being dealt with in 25 problems from the first round. Similar activities, like DCTF, but dedicated directly to the participants of the event are Hack the Machine and App2Own where everyone will have at their disposal different services and services to put their skills to the test and win awards. &lt;br /&gt;&lt;br /&gt;DefCamp managed to, in just 3 editions, be the most awaited conference in the entire information security and hacking scene in Romania. Its the perfect time to &lt;a href=&quot;http://defcamp2013.eventbrite.com/&quot;&gt;join&lt;/a&gt; and feel the vibes. For more details you can access the &lt;a href=&quot;http://defcamp.ro/&quot;&gt;conferences website&lt;/a&gt; or you can contact us directly at the address &lt;b&gt;contact@defcamp.ro&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://security-sh3ll.blogspot.com/feeds/2525159839413154760/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=232798662055846003&amp;postID=2525159839413154760' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/2525159839413154760'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/2525159839413154760'/><link rel='alternate' type='text/html' href='http://security-sh3ll.blogspot.com/2013/09/defcamp-2013.html' title='DefCamp 2013'/><author><name>d3v1l</name><uri>http://www.blogger.com/profile/03119852053430095623</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://4.bp.blogspot.com/-14ZpUTM5s6I/T7AToB85x4I/AAAAAAAABCk/1xf2L2Z_Hpo/s220/lol.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://1.bp.blogspot.com/-yfYtkg8TS20/Ui76--qLxvI/AAAAAAAABKQ/8BlHOoaV80A/s72-c/defcamp_logo.png" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-232798662055846003.post-5774480455523884194</id><published>2013-08-27T08:25:00.000+02:00</published><updated>2013-08-27T09:17:02.109+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="XSS"/><title type='text'>CookieCatcher - Session Hijacking Tool</title><content type='html'>&lt;i&gt;CookieCatcher is an open source application which was created to assist in the exploitation of XSS (Cross Site Scripting) vulnerabilities within web applications to steal user session IDs (aka Session Hijacking). The use of this application is purely educational and should not be used without proper permission from the target application.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Features&lt;/b&gt;&lt;b&gt;:&lt;/b&gt;&lt;br /&gt;- Prebuilt payloads to steal cookie data&lt;br /&gt;- Just copy and paste payload into a XSS vulnerability&lt;br /&gt;- Will send email notification when new cookies are stolen&lt;br /&gt;- Will attempt to refresh cookies every 3 minutes to avoid inactivity timeouts&lt;br /&gt;- Provides full HTTP requests to hijack sessions through a proxy (BuRP, etc)&lt;br /&gt;- Will attempt to load a preview when viewing the cookie data&lt;br /&gt;- PAYLOADS&lt;br /&gt;- Basic AJAX Attack&lt;br /&gt;- HTTPONLY evasion for Apache CVE-20120053&lt;br /&gt;- More to come&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Video Demo:&lt;/strong&gt; &lt;a href=&quot;http://www.youtube.com/watch?v=2GH6RRozOpY&quot;&gt;http://www.youtube.com/watch?v=2GH6RRozOpY&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Download: &lt;/b&gt;&lt;a href=&quot;https://github.com/DisK0nn3cT/CookieCatcher&quot;&gt;https://github.com/DisK0nn3cT/CookieCatcher&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://security-sh3ll.blogspot.com/feeds/5774480455523884194/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=232798662055846003&amp;postID=5774480455523884194' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/5774480455523884194'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/5774480455523884194'/><link rel='alternate' type='text/html' href='http://security-sh3ll.blogspot.com/2013/08/cookiecatcher-session-hijacking-tool.html' title='CookieCatcher - Session Hijacking Tool'/><author><name>d3v1l</name><uri>http://www.blogger.com/profile/03119852053430095623</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://4.bp.blogspot.com/-14ZpUTM5s6I/T7AToB85x4I/AAAAAAAABCk/1xf2L2Z_Hpo/s220/lol.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-232798662055846003.post-8749888104684667791</id><published>2013-08-22T09:15:00.001+02:00</published><updated>2013-08-22T09:15:56.166+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><title type='text'>GoLismero - The Web Knife Version 2.0 beta Released</title><content type='html'>  &lt;em&gt;GoLismero is an open source framework for security testing. It&#39;s  currently geared towards web security, but it can easily be expanded to  other kinds of scans.&amp;nbsp;&lt;/em&gt;&lt;br /&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;em&gt; &lt;/em&gt;The most interesting features of the framework are:&lt;br /&gt;  &lt;ul&gt;&lt;li&gt;Real platform independence. Tested on Windows, Linux, *BSD and OS X.&lt;/li&gt;&lt;li&gt;No native library dependencies. All of the framework has been written in pure Python.&lt;/li&gt;&lt;li&gt;Good performance when compared with other frameworks written in Python and other scripting languages.&lt;/li&gt;&lt;li&gt;Very easy to use.&lt;/li&gt;&lt;li&gt;Plugin development is extremely simple.&lt;/li&gt;&lt;li&gt;The framework also collects and unifies the results of well known tools: sqlmap, xsser, openvas, dnsrecon, theharvester...&lt;/li&gt;&lt;li&gt;Integration with standards: CWE, CVE and OWASP.&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;strong&gt;Get&amp;nbsp; GoLismero  from&lt;/strong&gt; &lt;a href=&quot;http://golismero-project.com/&quot;&gt;http://golismero-project.com&lt;/a&gt;&lt;br /&gt;&lt;ul&gt;&lt;/ul&gt;&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://security-sh3ll.blogspot.com/feeds/8749888104684667791/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=232798662055846003&amp;postID=8749888104684667791' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/8749888104684667791'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/8749888104684667791'/><link rel='alternate' type='text/html' href='http://security-sh3ll.blogspot.com/2013/08/golismero-web-knife-version-20-beta.html' title='GoLismero - The Web Knife Version 2.0 beta Released'/><author><name>d3v1l</name><uri>http://www.blogger.com/profile/03119852053430095623</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://4.bp.blogspot.com/-14ZpUTM5s6I/T7AToB85x4I/AAAAAAAABCk/1xf2L2Z_Hpo/s220/lol.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-232798662055846003.post-9056706409420347466</id><published>2013-08-20T08:26:00.000+02:00</published><updated>2013-08-20T08:26:03.154+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><title type='text'>ZMap Internet Scanner v1.0.3 Released</title><content type='html'>&lt;em&gt;ZMap is a fast network scanner designed for Internet-wide network surveys. On a&lt;br /&gt;typical desktop computer with a gigabit Ethernet connection, ZMap is capable&lt;br /&gt;scanning the entire public IPv4 address space in under 45 minutes.&lt;br /&gt;&lt;br /&gt;While previous network tools have been designed to scan small network segments,&lt;br /&gt;ZMap is specifically architected to scan the entire address space.  It is built&lt;br /&gt;in a modular manner in order to allow incorporation with other network survey&lt;br /&gt;tools.  ZMap operates on GNU/Linux and supports TCP SYN and ICMP echo request&lt;br /&gt;scanning out of the box.&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Download and more info:&lt;/strong&gt; &lt;a href=&quot;https://zmap.io/&quot;&gt;https://zmap.io&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://security-sh3ll.blogspot.com/feeds/9056706409420347466/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=232798662055846003&amp;postID=9056706409420347466' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/9056706409420347466'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/9056706409420347466'/><link rel='alternate' type='text/html' href='http://security-sh3ll.blogspot.com/2013/08/zmap-internet-scanner-v103-released.html' title='ZMap Internet Scanner v1.0.3 Released'/><author><name>d3v1l</name><uri>http://www.blogger.com/profile/03119852053430095623</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://4.bp.blogspot.com/-14ZpUTM5s6I/T7AToB85x4I/AAAAAAAABCk/1xf2L2Z_Hpo/s220/lol.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-232798662055846003.post-3556738274928837415</id><published>2013-08-09T23:18:00.002+02:00</published><updated>2013-08-09T23:18:57.744+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><title type='text'>WATOBO 0.9.13 Released</title><content type='html'>&lt;em&gt;WATOBO is intended to enable security professionals to perform highly efficient (semi-automated ) web application security audits. WATOBO works like a local proxy, similar to Webscarab, Paros or BurpSuite. Additionally, WATOBO supports passive and active checks. Passive checks are more like filter functions. They are used to collect useful information, e.g. email or IP addresses. Passive checks will be performed during normal browsing activities. No additional requests are sent to the (web) application.&lt;/em&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b&gt;New Features:&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;* WATOBO has Session Management capabilities! You can define login scripts as well as logout signatures.&lt;br /&gt;* WATOB can act as a transparent proxy (requires nfqueue)&lt;br /&gt;* WATOBO can perform vulnerability checks out of the box&lt;br /&gt;* WATOBO can perform checks on functions which are protected by Anti-CSRF-/One-Time-Tokens &lt;br /&gt;* WATOBO supports Inline De-/Encoding.&lt;br /&gt;* WATOBO has smart filter functions, so you can find and navigate to the most interesting parts of the application easily. &lt;br /&gt;* WATOBO is written in (FX)Ruby and enables you to easily define your own checks&lt;br /&gt;* WATOBO runs on Windows, Linux, MacOS ... every OS supporting (FX)Ruby &lt;br /&gt;* WATOBO is free software ( licensed under the GNU General Public License Version 2)     &lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Download:&lt;/b&gt; &lt;a href=&quot;http://sourceforge.net/projects/watobo&quot;&gt;http://sourceforge.net/projects/watobo/&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://security-sh3ll.blogspot.com/feeds/3556738274928837415/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=232798662055846003&amp;postID=3556738274928837415' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/3556738274928837415'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/3556738274928837415'/><link rel='alternate' type='text/html' href='http://security-sh3ll.blogspot.com/2013/08/watobo-0913-released.html' title='WATOBO 0.9.13 Released'/><author><name>d3v1l</name><uri>http://www.blogger.com/profile/03119852053430095623</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://4.bp.blogspot.com/-14ZpUTM5s6I/T7AToB85x4I/AAAAAAAABCk/1xf2L2Z_Hpo/s220/lol.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-232798662055846003.post-6487317705448288387</id><published>2013-08-08T13:02:00.001+02:00</published><updated>2013-08-08T13:02:21.618+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Papers"/><title type='text'>Browser Timing Attacks</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;Pixel Perfect Timing  Attacks with HTML5&lt;/b&gt;&amp;nbsp;  &amp;nbsp;&lt;/div&gt;&lt;br /&gt;&lt;em&gt;Abstract&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;&lt;em&gt;This paper describes a number of timi ng attack techniques that can be used by a malicious web page to steal sensitive data from a browser, breaking cross - origin restrictions. The new requestAnimationFrame API can be used to time browser rendering operations and infer sensitive data based on t iming data . The first technique allows the browser history to be sniffed by detecting redraw events. The second part of the paper shows how SVG filters are vulnerable to a timing attack that can be used to read pixel values from a web page. This allows pix els from cross - origin iframes to be read using an OCR - style technique to obtain sensitive data from websites&amp;nbsp;&lt;/em&gt;&lt;br /&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;strong&gt;Download PDF:&lt;/strong&gt;&lt;em&gt; &lt;/em&gt;&lt;a href=&quot;http://contextis.co.uk/files/Browser_Timing_Attacks.pdf&quot;&gt;http://contextis.co.uk&lt;/a&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;</content><link rel='replies' type='application/atom+xml' href='http://security-sh3ll.blogspot.com/feeds/6487317705448288387/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=232798662055846003&amp;postID=6487317705448288387' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/6487317705448288387'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/6487317705448288387'/><link rel='alternate' type='text/html' href='http://security-sh3ll.blogspot.com/2013/08/browser-timing-attacks.html' title='Browser Timing Attacks'/><author><name>d3v1l</name><uri>http://www.blogger.com/profile/03119852053430095623</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://4.bp.blogspot.com/-14ZpUTM5s6I/T7AToB85x4I/AAAAAAAABCk/1xf2L2Z_Hpo/s220/lol.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-232798662055846003.post-1663040944504636201</id><published>2013-07-03T17:55:00.000+02:00</published><updated>2013-07-03T17:55:14.316+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><title type='text'>Zarp - Network Attack Framework</title><content type='html'> &lt;em&gt;Zarp is a network attack tool centered around the exploitation of local  networks. This does not include system exploitation, but rather abusing  networking protocols and stacks to take over, infiltrate, and knock out.  Sessions can be managed to quickly poison and sniff multiple systems at  once, dumping sensitive information automatically or to the attacker  directly. Various sniffers are included to automatically parse usernames  and passwords from various protocols, as well as view HTTP traffic and  more. DoS attacks are included to knock out various systems and  applications. These tools open up the possibility for very complex  attack scenarios on live networks quickly, cleanly, and quietly. &amp;nbsp;&lt;/em&gt; &lt;br /&gt;&lt;br /&gt;&amp;nbsp;Functionality: &lt;br /&gt;&lt;br /&gt;- Poisoners          &lt;br /&gt;- Parameter&lt;br /&gt;- Services &lt;br /&gt;- Sessions &lt;br /&gt;- Scanners  &lt;br /&gt;- DoS Attacks&lt;br /&gt;- Sniffers&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Download:&lt;/strong&gt; &lt;a href=&quot;https://github.com/hatRiot/zarp&quot;&gt;https://github.com/hatRiot/zarp&lt;/a&gt;&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;a href=&quot;https://defense.ballastsecurity.net/wiki/index.php/Zarp&quot;&gt;https://defense.ballastsecurity.net/wiki/index.php/Zarp&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://security-sh3ll.blogspot.com/feeds/1663040944504636201/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=232798662055846003&amp;postID=1663040944504636201' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/1663040944504636201'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/1663040944504636201'/><link rel='alternate' type='text/html' href='http://security-sh3ll.blogspot.com/2013/07/zarp-network-attack-framework.html' title='Zarp - Network Attack Framework'/><author><name>d3v1l</name><uri>http://www.blogger.com/profile/03119852053430095623</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://4.bp.blogspot.com/-14ZpUTM5s6I/T7AToB85x4I/AAAAAAAABCk/1xf2L2Z_Hpo/s220/lol.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-232798662055846003.post-3472785436202740157</id><published>2013-06-13T07:54:00.000+02:00</published><updated>2013-06-13T07:54:06.473+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Papers"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Released the new version of OWASP Top 10 - 2013</title><content type='html'>&lt;i&gt;This version was updated based on numerous comments received during  the comment period after the release candidate was released in Feb.  2013.&lt;/i&gt;  &lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt; A1 Injection &lt;/li&gt;&lt;li&gt; A2 Broken Authentication and Session Management &lt;/li&gt;&lt;li&gt; A3 Cross-Site Scripting (XSS) &lt;/li&gt;&lt;li&gt; A4 Insecure Direct Object References &lt;/li&gt;&lt;li&gt; A5 Security Misconfiguration &lt;/li&gt;&lt;li&gt; A6 Sensitive Data Exposure &lt;/li&gt;&lt;li&gt; A7 Missing Function Level Access Control &lt;/li&gt;&lt;li&gt; A8 Cross-Site Request Forgery (CSRF) &lt;/li&gt;&lt;li&gt; A9 Using Known Vulnerable Components &lt;/li&gt;&lt;li&gt;&amp;nbsp;A10 Unvalidated Redirects and Forwards&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;Get PDF format from: &lt;a href=&quot;http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013.pdf&quot;&gt;http://owasptop10.googlecode.com&lt;/a&gt; &amp;nbsp;- &lt;a href=&quot;https://www.owasp.org/index.php/Top10&quot;&gt;https://www.owasp.org/index.php/Top10&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://security-sh3ll.blogspot.com/feeds/3472785436202740157/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=232798662055846003&amp;postID=3472785436202740157' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/3472785436202740157'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/3472785436202740157'/><link rel='alternate' type='text/html' href='http://security-sh3ll.blogspot.com/2013/06/released-new-version-of-owasp-top-10.html' title='Released the new version of OWASP Top 10 - 2013'/><author><name>d3v1l</name><uri>http://www.blogger.com/profile/03119852053430095623</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://4.bp.blogspot.com/-14ZpUTM5s6I/T7AToB85x4I/AAAAAAAABCk/1xf2L2Z_Hpo/s220/lol.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-232798662055846003.post-4138004071379291814</id><published>2013-06-13T07:45:00.001+02:00</published><updated>2013-06-13T07:46:08.716+02:00</updated><title type='text'>Me on PayPal Wall of Fame</title><content type='html'>I don&#39;t want to disclose everything I reported but I would like to say that I&#39;m very happy to have my name listed there,along many of my friends :)&lt;br /&gt;&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;a href=&quot;https://www.paypal.com/webapps/mpp/security-tools/wall-of-fame&quot;&gt;https://www.paypal.com/webapps/mpp/security-tools/wall-of-fame&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://1.bp.blogspot.com/-uv5w7-F2l6U/UblaWOj5KFI/AAAAAAAABJs/w5sRo2gxWZI/s1600/1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;150&quot; src=&quot;http://1.bp.blogspot.com/-uv5w7-F2l6U/UblaWOj5KFI/AAAAAAAABJs/w5sRo2gxWZI/s320/1.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.computerworld.com/s/article/9228373/PayPal_to_pay_security_researchers_for_reported_vulnerabilities&quot;&gt;http://www.computerworld.com&lt;/a&gt; &lt;br /&gt;&lt;a href=&quot;http://www.pcpro.co.uk/features/378577/q-a-the-life-of-a-bug-bounty-hunter&quot;&gt;http://www.pcpro.co.uk&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://security-sh3ll.blogspot.com/feeds/4138004071379291814/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=232798662055846003&amp;postID=4138004071379291814' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/4138004071379291814'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/4138004071379291814'/><link rel='alternate' type='text/html' href='http://security-sh3ll.blogspot.com/2013/06/me-on-paypal-wall-of-fame.html' title='Me on PayPal Wall of Fame'/><author><name>d3v1l</name><uri>http://www.blogger.com/profile/03119852053430095623</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://4.bp.blogspot.com/-14ZpUTM5s6I/T7AToB85x4I/AAAAAAAABCk/1xf2L2Z_Hpo/s220/lol.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://1.bp.blogspot.com/-uv5w7-F2l6U/UblaWOj5KFI/AAAAAAAABJs/w5sRo2gxWZI/s72-c/1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-232798662055846003.post-6899610218262220895</id><published>2013-06-10T13:23:00.002+02:00</published><updated>2013-06-10T13:23:36.595+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><title type='text'>Nishang v.0.2.7 Released</title><content type='html'>&lt;b&gt;PowerShell for Penetration Testing&lt;/b&gt;   &lt;i&gt;&amp;nbsp;&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;&lt;i&gt;Nishang is a framework and collection of scripts and payloads which enables usage of PowerShell for offensive security and post exploitation during Penetraion Tests. The scripts are written on the basis of requirement by the author during real Penetration Tests.It contains many interesting scripts like download and execute, keylogger, dns txt pwnage, wait for command and much more. &amp;nbsp;&amp;nbsp;&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;st&quot;&gt;&lt;b&gt;Changelog:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;- DNS_TXT_Pwnage, Time_Execution and Wait_For_Command can now be stopped remotely. Also, these does not stop autmoatically after running a script/command now. &lt;br /&gt;- DNS_TXT_Pwnage, Time_Execution and Wait_For_Command can now return results using selected exfiltration method. &lt;br /&gt;- Fixed a minor bug in DNS_TXT_Pwnage. &lt;br /&gt;- All payloads which could post data to the internet now have three options pastebin/gmail/tinypaste for exfiltration. &lt;br /&gt;- Added Get-PassHashes payload. &lt;br /&gt;- Added Download-Execute-PS payload. &lt;br /&gt;- The keylogger logs only fresh keys after exfiltring the keys 30 times. &lt;br /&gt;- A delay after success has been introduced in various payloads which connect to the internet to avoid generating too much traffic.  &amp;nbsp; &lt;br /&gt;&lt;br /&gt;&lt;b&gt;Download:&lt;/b&gt; &lt;a href=&quot;http://code.google.com/p/nishang/downloads/list&quot;&gt;http://code.google.com/p/nishang/downloads/list&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://security-sh3ll.blogspot.com/feeds/6899610218262220895/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=232798662055846003&amp;postID=6899610218262220895' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/6899610218262220895'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/6899610218262220895'/><link rel='alternate' type='text/html' href='http://security-sh3ll.blogspot.com/2013/06/nishang-v027-released.html' title='Nishang v.0.2.7 Released'/><author><name>d3v1l</name><uri>http://www.blogger.com/profile/03119852053430095623</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://4.bp.blogspot.com/-14ZpUTM5s6I/T7AToB85x4I/AAAAAAAABCk/1xf2L2Z_Hpo/s220/lol.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-232798662055846003.post-7264962385355247423</id><published>2013-05-30T08:19:00.002+02:00</published><updated>2013-05-30T15:55:48.409+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Browser"/><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><title type='text'>PenQ - The Security Testing Browser Bundle</title><content type='html'>&lt;i&gt;PenQ is an open source Linux based penetration testing browser bundle we  built over Mozilla Firefox. It comes pre-configured with security tools  for spidering, advanced web searching, fingerprinting, anonymous  browsing, web server scanning, fuzzing, report generating and more.&amp;nbsp;&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/-FqqlIJr3ajM/UadaK92kd3I/AAAAAAAABJc/J5-YWWh55h8/s1600/Screen+Shot+2013-05-30+at+4.52.24+PM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;98&quot; src=&quot;http://3.bp.blogspot.com/-FqqlIJr3ajM/UadaK92kd3I/AAAAAAAABJc/J5-YWWh55h8/s200/Screen+Shot+2013-05-30+at+4.52.24+PM.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;i&gt;PenQ is configured to run on Debian based distributions including  Ubuntu and its derivative distros, and penetration testing operating  systems such as BackTrack and Kali.&lt;/i&gt;&lt;i&gt;With all its integrations, PenQ is a powerful  tool. Be mindful of what use you put it to. Responsible use of PenQ can  help secure web apps in a zap.&lt;/i&gt;&lt;br /&gt;&lt;div class=&quot;PenQCnt&quot; id=&quot;featureslist&quot;&gt;&lt;h4&gt;&lt;b&gt;Features&lt;/b&gt;&lt;/h4&gt;&lt;div class=&quot;PenQlist&quot;&gt;&lt;div class=&quot;listPenQ&quot;&gt;&lt;ul class=&quot;SecurityCntlist&quot;&gt;&lt;li&gt;OWASP ZAP&lt;/li&gt;&lt;li&gt;OWASP WebScarab&lt;/li&gt;&lt;li&gt;OWASP WebSlayer&lt;/li&gt;&lt;li&gt;Nikto Web Server Scanner&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div class=&quot;listPenQ&quot;&gt;&lt;ul class=&quot;SecurityCntlist&quot;&gt;&lt;li&gt;Wfuzz Web Application Fuzzer&lt;/li&gt;&lt;li&gt;Mozilla Add-ons Collection&lt;/li&gt;&lt;li&gt;Integrated Tor&lt;/li&gt;&lt;li&gt;OWASP Penetration Testing Checklist&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div class=&quot;listPenQ&quot;&gt;&lt;ul class=&quot;SecurityCntlist&quot;&gt;&lt;li&gt;PenTesting Report Generator&lt;/li&gt;&lt;li&gt;Vulnerability Databases Search&lt;/li&gt;&lt;li&gt;Access to Shell and System Utilities&lt;/li&gt;&lt;li&gt;Collection of Useful Links&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;b&gt;Download and more info:&lt;/b&gt; &lt;a href=&quot;http://www.qburst.com/products/PenQ&quot;&gt;http://www.qburst.com/products/PenQ&lt;/a&gt;   </content><link rel='replies' type='application/atom+xml' href='http://security-sh3ll.blogspot.com/feeds/7264962385355247423/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=232798662055846003&amp;postID=7264962385355247423' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/7264962385355247423'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/7264962385355247423'/><link rel='alternate' type='text/html' href='http://security-sh3ll.blogspot.com/2013/05/penq-security-testing-browser-bundle.html' title='PenQ - The Security Testing Browser Bundle'/><author><name>d3v1l</name><uri>http://www.blogger.com/profile/03119852053430095623</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://4.bp.blogspot.com/-14ZpUTM5s6I/T7AToB85x4I/AAAAAAAABCk/1xf2L2Z_Hpo/s220/lol.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/-FqqlIJr3ajM/UadaK92kd3I/AAAAAAAABJc/J5-YWWh55h8/s72-c/Screen+Shot+2013-05-30+at+4.52.24+PM.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-232798662055846003.post-8600509015761048542</id><published>2013-05-23T08:56:00.000+02:00</published><updated>2013-05-23T08:56:21.331+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>OWASP Europe Tour - Bucharest 2013</title><content type='html'>&lt;b&gt;&lt;a href=&quot;https://www.owasp.org/index.php/EUTour2013&quot;&gt;OWASP Europe TOUR&lt;/a&gt;,&lt;/b&gt; &lt;i&gt;is an event across the European region that  promotes  awareness about application security, so that people and  organizations can make informed decisions about true application  security risks. Everyone is free to participate in OWASP and all of our  materials are available under a free and open software license. &lt;/i&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;i&gt;Apart from OWASP&#39;s Top 10, most OWASP Projects are not widely  used and understood. In most cases this is not due to lack of quality  and usefulness of those Document &amp;amp; Tool projects, but due to a lack  of understanding of where they fit in an Enterprise&#39;s security ecosystem  or in the Web Application Development Life-cycle.&lt;/i&gt; &lt;/li&gt;&lt;/ul&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/-xSNSgr27Wjc/UZ29SptheQI/AAAAAAAABJM/76NvyJp-kb4/s1600/xs.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;199&quot; src=&quot;http://3.bp.blogspot.com/-xSNSgr27Wjc/UZ29SptheQI/AAAAAAAABJM/76NvyJp-kb4/s320/xs.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;ul&gt;&lt;/ul&gt;&lt;br /&gt;&lt;b&gt;Date:&lt;/b&gt; Wednesday 5th of June      &lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;&lt;b&gt;Venue Location: &lt;/b&gt;University &quot;Politehnica&quot; of Bucharest  &lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;&lt;b&gt;Venue Address:&lt;/b&gt; Splaiul Independentei nr. 313, sector 6, Bucuresti, ROMANIA; Rectorship Building, Senate Hall Postal cod: RO-060042 &lt;br /&gt;&lt;br /&gt;&lt;em&gt;Source&lt;/em&gt;: &lt;em&gt;&lt;a href=&quot;https://www.owasp.org/&quot;&gt;https://www.owasp.org&lt;/a&gt;&amp;nbsp;&lt;/em&gt;</content><link rel='replies' type='application/atom+xml' href='http://security-sh3ll.blogspot.com/feeds/8600509015761048542/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=232798662055846003&amp;postID=8600509015761048542' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/8600509015761048542'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/8600509015761048542'/><link rel='alternate' type='text/html' href='http://security-sh3ll.blogspot.com/2013/05/owasp-europe-tour-bucharest-2013.html' title='OWASP Europe Tour - Bucharest 2013'/><author><name>d3v1l</name><uri>http://www.blogger.com/profile/03119852053430095623</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://4.bp.blogspot.com/-14ZpUTM5s6I/T7AToB85x4I/AAAAAAAABCk/1xf2L2Z_Hpo/s220/lol.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/-xSNSgr27Wjc/UZ29SptheQI/AAAAAAAABJM/76NvyJp-kb4/s72-c/xs.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-232798662055846003.post-7846769352124550274</id><published>2013-05-20T16:56:00.000+02:00</published><updated>2013-05-20T16:56:24.026+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="SQL Injection"/><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><title type='text'>DroidSQLi - MySQL Injection tool for Android</title><content type='html'>&lt;em&gt;DroidSQLi is the first automated MySQL Injection tool for Android. It  allows you to test your MySQL-based web application against SQL  injection attacks. &amp;nbsp;&lt;/em&gt;&lt;br /&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://4.bp.blogspot.com/-2YrKk7HOV8c/UZo5WbAqGyI/AAAAAAAABI8/gQGASD45UvQ/s1600/unnamed.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;http://4.bp.blogspot.com/-2YrKk7HOV8c/UZo5WbAqGyI/AAAAAAAABI8/gQGASD45UvQ/s200/unnamed.jpg&quot; width=&quot;111&quot; /&gt;&lt;/a&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;DroidSQLi supports the following injection techniques:&lt;/strong&gt;&lt;br /&gt;- Time based injection&lt;br /&gt;- Blind injection&lt;br /&gt;- Error based injection&lt;br /&gt;- Normal injection&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Get it from&lt;/strong&gt; &amp;nbsp;&lt;a href=&quot;https://play.google.com/store/apps/details?id=net.edgard.droidsqli&quot;&gt;https://play.google.com/store/apps/details?id=net.edgard.droidsqli&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://security-sh3ll.blogspot.com/feeds/7846769352124550274/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=232798662055846003&amp;postID=7846769352124550274' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/7846769352124550274'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/7846769352124550274'/><link rel='alternate' type='text/html' href='http://security-sh3ll.blogspot.com/2013/05/droidsqli-mysql-injection-tool-for.html' title='DroidSQLi - MySQL Injection tool for Android'/><author><name>d3v1l</name><uri>http://www.blogger.com/profile/03119852053430095623</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://4.bp.blogspot.com/-14ZpUTM5s6I/T7AToB85x4I/AAAAAAAABCk/1xf2L2Z_Hpo/s220/lol.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://4.bp.blogspot.com/-2YrKk7HOV8c/UZo5WbAqGyI/AAAAAAAABI8/gQGASD45UvQ/s72-c/unnamed.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-232798662055846003.post-2921188816178458540</id><published>2013-05-12T20:08:00.003+02:00</published><updated>2013-05-12T20:08:47.452+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Papers"/><title type='text'>Static Analysis Technologies Evaluation Criteria Released</title><content type='html'>&lt;b&gt;Introduction:&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;i&gt;Static code analysis is the analysis of software source or binary code. It aims at automating code analysis to find as many common software security weaknesses as possible. There are several open source and commercial static code analysis tools and services available in the market for organizations to choose from. &lt;br /&gt;&lt;br /&gt;Static code analysis is rapidly becoming an essential part of most software organizations&#39; application security assurance program. Mainly because of their ability to analyze large amounts of source code in considerably shorter amount of time than a human could, uncover potential weaknesses, in addition to the ability to automate security knowledge and workflows.&lt;/i&gt;&amp;nbsp;    &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Download PDF:&lt;/strong&gt;&amp;nbsp; &lt;a href=&quot;http://projects.webappsec.org/w/file/fetch/66107997/SATEC_Manual-02.pdf&quot;&gt;http://projects.webappsec.org/w/file/fetch/66107997/SATEC_Manual-02.pdf&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Source: &lt;/strong&gt;&lt;a href=&quot;http://projects.webappsec.org/w/page/66094278/Static%20Analysis%20Technologies%20Evaluation%20Criteria&quot;&gt;http://projects.webappsec.org&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://security-sh3ll.blogspot.com/feeds/2921188816178458540/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=232798662055846003&amp;postID=2921188816178458540' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/2921188816178458540'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/2921188816178458540'/><link rel='alternate' type='text/html' href='http://security-sh3ll.blogspot.com/2013/05/static-analysis-technologies-evaluation.html' title='Static Analysis Technologies Evaluation Criteria Released'/><author><name>d3v1l</name><uri>http://www.blogger.com/profile/03119852053430095623</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://4.bp.blogspot.com/-14ZpUTM5s6I/T7AToB85x4I/AAAAAAAABCk/1xf2L2Z_Hpo/s220/lol.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-232798662055846003.post-8646110914119979235</id><published>2013-05-12T10:41:00.003+02:00</published><updated>2013-05-12T10:41:41.712+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security-Distro"/><title type='text'>AttackVector Linux</title><content type='html'>&lt;b&gt;Linux distro for anonymized penetration based on Kali and TAILS             &amp;nbsp;&lt;/b&gt;   &lt;i&gt;&amp;nbsp;&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;&lt;i&gt;AttackVector Linux is a new distribution for anonymized penetration and security. It is based on Kali and TAILS, which are both based on Debian. While Kali requires a modified kernel for network drivers to use injection and so forth, the Tor Project&#39;s TAILS is designed from the bottom up for encryption, and anonymity. Nmap can&#39;t UDP via Tor. The intention of AttackVector Linux is to provide the capability to anonymize attacks while warning the user when he or she takes actions that may compromize anonymity. The two projects have different design philosophies that can directly conflict with one another. In spite of this, the goal of AttackVector Linux is to integrate them complementarily into one OS.&amp;nbsp;&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Download:&lt;/b&gt; &lt;a href=&quot;https://bitbucket.org/attackvector/attackvector-linux/downloads&quot;&gt;https://bitbucket.org/attackvector&lt;/a&gt;   &lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b&gt;More Info:&amp;nbsp;&lt;/b&gt;&lt;a href=&quot;https://github.com/ksoona/attackvector&quot;&gt;https://github.com/ksoona/attackvector&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://security-sh3ll.blogspot.com/feeds/8646110914119979235/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=232798662055846003&amp;postID=8646110914119979235' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/8646110914119979235'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/8646110914119979235'/><link rel='alternate' type='text/html' href='http://security-sh3ll.blogspot.com/2013/05/attackvector-linux.html' title='AttackVector Linux'/><author><name>d3v1l</name><uri>http://www.blogger.com/profile/03119852053430095623</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://4.bp.blogspot.com/-14ZpUTM5s6I/T7AToB85x4I/AAAAAAAABCk/1xf2L2Z_Hpo/s220/lol.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-232798662055846003.post-5751768424540331572</id><published>2013-05-07T17:35:00.001+02:00</published><updated>2013-05-07T17:35:47.698+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><title type='text'>SpiderFoot v.2.0 Released</title><content type='html'>&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://2.bp.blogspot.com/-S02qkbNyt7E/UYke-CHle4I/AAAAAAAABIo/42GyvOnR0ok/s1600/xd.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;125&quot; src=&quot;http://2.bp.blogspot.com/-S02qkbNyt7E/UYke-CHle4I/AAAAAAAABIo/42GyvOnR0ok/s200/xd.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Open source Footprinting tool&amp;nbsp;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;i&gt;SpiderFoot is an open source footprinting tool, available for Windows  and Linux. It is written in Python and provides an easy-to-use GUI.  SpiderFoot obtains a wide range of information about a target, such as  web servers, netblocks, e-mail addresses and more.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;i&gt;SpiderFoot is designed from the ground-up to be modular. This means  you can easily add your own modules that consume data from other modules  to perform whatever task you desire.&lt;/i&gt;&lt;br /&gt;&lt;i&gt;      &lt;/i&gt;&lt;i&gt;As a simple example, you could create a module that  automatically attempts to brute-force usernames and passwords any time a  password-handling webpage is identified by the spidering module.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Download:&lt;/b&gt; &amp;nbsp;&lt;a href=&quot;https://github.com/smicallef/spiderfoot&quot;&gt;https://github.com/smicallef/spiderfoot&lt;/a&gt; &lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;a href=&quot;http://sourceforge.net/projects/spiderfoot/&quot;&gt;http://sourceforge.net/projects/spiderfoot/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;More Info:&lt;/b&gt; &amp;nbsp;&lt;a href=&quot;http://www.spiderfoot.net/&quot;&gt;http://www.spiderfoot.net&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://security-sh3ll.blogspot.com/feeds/5751768424540331572/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=232798662055846003&amp;postID=5751768424540331572' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/5751768424540331572'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/5751768424540331572'/><link rel='alternate' type='text/html' href='http://security-sh3ll.blogspot.com/2013/05/spiderfoot-v20-released.html' title='SpiderFoot v.2.0 Released'/><author><name>d3v1l</name><uri>http://www.blogger.com/profile/03119852053430095623</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://4.bp.blogspot.com/-14ZpUTM5s6I/T7AToB85x4I/AAAAAAAABCk/1xf2L2Z_Hpo/s220/lol.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/-S02qkbNyt7E/UYke-CHle4I/AAAAAAAABIo/42GyvOnR0ok/s72-c/xd.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-232798662055846003.post-1712213735861671402</id><published>2013-04-30T09:52:00.005+02:00</published><updated>2013-04-30T09:52:55.935+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><title type='text'>Arachni v0.4.2 Released</title><content type='html'>&lt;b&gt;Web Application Security Scanner Framework&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;   &lt;i&gt;Arachni is an Open Source, feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications.  It is smart, it trains itself by learning from the HTTP responses it receives during the audit process and is able to perform meta-analysis using a number of factors in order to correctly assess the trustworthiness of results and intelligently identify false-positives. It is versatile enough to cover a great deal of use cases, ranging from a simple command line scanner utility, to a global high performance grid of scanners, to a Ruby library allowing for scripted audits, to a multi-user multi-scan web collaboration platform. &lt;/i&gt;  &lt;i&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b&gt;The change-log is quite sizeable but the gist is:&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;i&gt;* Brand new web interface -- allowing for team collaboration.&lt;br /&gt;   * Significant decreases in memory usage.&lt;br /&gt;   * Issue remarks –  Providing extra context to logged issues.&lt;br /&gt;   * Improved payloads for Windows machines for path traversal and OS command injection.&lt;br /&gt;   * RPC API updates allowing for much easier remote scan management.&lt;br /&gt;   * Much improved profiling and detection of custom 404 responses.&lt;br /&gt;   * The ability to exclude pages from the scan based on content.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;For more details and Download visit:&lt;/b&gt; &amp;nbsp;&amp;nbsp;    &lt;a href=&quot;http://www.arachni-scanner.com/blog/new-release-v0-4-2-new-interface-new-website/&quot;&gt;http://www.arachni-scanner.com&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://security-sh3ll.blogspot.com/feeds/1712213735861671402/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=232798662055846003&amp;postID=1712213735861671402' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/1712213735861671402'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/1712213735861671402'/><link rel='alternate' type='text/html' href='http://security-sh3ll.blogspot.com/2013/04/arachni-v042-released.html' title='Arachni v0.4.2 Released'/><author><name>d3v1l</name><uri>http://www.blogger.com/profile/03119852053430095623</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://4.bp.blogspot.com/-14ZpUTM5s6I/T7AToB85x4I/AAAAAAAABCk/1xf2L2Z_Hpo/s220/lol.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-232798662055846003.post-133917465670100171</id><published>2013-04-15T16:00:00.000+02:00</published><updated>2013-04-15T16:02:14.470+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><title type='text'>Canari Framework</title><content type='html'>&lt;b&gt;Canari - Maltego Rapid Transform Development Framework&lt;/b&gt;   &lt;i&gt;&amp;nbsp;&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;&lt;i&gt;Canari is a rapid transform development framework for &lt;a href=&quot;http://paterva.com/&quot;&gt;Maltego&lt;/a&gt; written in Python. The original focus of Canari was to provide a set of transforms that would aid in the execution of penetration tests, and vulnerability assessments. Ever since it&#39;s first prototype, it has become evident that the framework can be used for much more than that. Canari is perfect for anyone wishing to graphically represent their data in Maltego without the hassle of learning a whole bunch of unnecessary stuff. It has generated interest from digital forensics analysts to pen-testers, and even psychologists. &amp;nbsp;&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&amp;nbsp; &lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;b&gt;Canari&#39;s core features include:&lt;/b&gt;&amp;nbsp;     &amp;nbsp;&lt;/i&gt;&lt;br /&gt;&lt;i&gt;- An easily extensible and configurable framework that promotes maximum reusability;     &amp;nbsp;&lt;/i&gt;&lt;br /&gt;&lt;i&gt;- A set of powerful and easy-to-use scripts for debugging, configuring, and installing transforms;&amp;nbsp;&lt;/i&gt;&lt;br /&gt;&lt;i&gt;-Finally, a great number of community provided transforms.&lt;/i&gt; &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;More info and Download:&lt;/b&gt; &lt;a href=&quot;http://www.canariproject.com/&quot;&gt;http://www.canariproject.com&amp;nbsp;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Video demo:&lt;/strong&gt; &lt;a href=&quot;http://www.youtube.com/allfro&quot;&gt;http://www.youtube.com/allfro&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://security-sh3ll.blogspot.com/feeds/133917465670100171/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=232798662055846003&amp;postID=133917465670100171' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/133917465670100171'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/133917465670100171'/><link rel='alternate' type='text/html' href='http://security-sh3ll.blogspot.com/2013/04/canari-framework.html' title='Canari Framework'/><author><name>d3v1l</name><uri>http://www.blogger.com/profile/03119852053430095623</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://4.bp.blogspot.com/-14ZpUTM5s6I/T7AToB85x4I/AAAAAAAABCk/1xf2L2Z_Hpo/s220/lol.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-232798662055846003.post-4469964404558363194</id><published>2013-04-03T13:42:00.000+02:00</published><updated>2013-04-03T13:42:35.577+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security-Distro"/><title type='text'>AppUse - Android Pentest Platform Unified Standalone Environment</title><content type='html'> &lt;em&gt;AppSec Labs recently developed the AppUse Virtual Machine. This system  is a unique, free, platform for mobile application security testing in  the android environment, and it includes unique custom-made tools  created by &lt;/em&gt;&lt;a href=&quot;https://appsec-labs.com/&quot;&gt;&lt;em&gt;AppSec Labs.&lt;/em&gt;&lt;/a&gt;&lt;em&gt;&amp;nbsp;&lt;/em&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;br /&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;em&gt;&lt;/em&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;em&gt;There is no need for installation of  simulators and testing tools, no need for SSL certificates of the proxy  software, everything comes straight out of the box pre-installed and  configured for an ideal user experience.&lt;/em&gt;&lt;em&gt;Security experts who have seen the  machine were very excited, calling it the next ‘BackTrack’ (a famous  system for testing security problems), specifically adjusted for android  application security testing.&amp;nbsp;&lt;/em&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/div&gt;&lt;em&gt;&lt;/em&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;em&gt;AppUse VM&lt;/em&gt;&lt;/strong&gt;&lt;em&gt; closes gaps  in the world of security, now there is a special and customized testing  environment for android applications.&amp;nbsp;&lt;/em&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/div&gt;&lt;em&gt;&lt;/em&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;em&gt;This machine is intended for the daily  use of security testers everywhere for Android applications, and is a  must-have tool for any security person.&amp;nbsp;&lt;/em&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Download:&lt;/strong&gt;&lt;em&gt; &lt;/em&gt;&lt;a href=&quot;http://sourceforge.net/projects/appuse/files/?source=directory&quot;&gt;http://sourceforge.net&lt;/a&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://security-sh3ll.blogspot.com/feeds/4469964404558363194/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=232798662055846003&amp;postID=4469964404558363194' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/4469964404558363194'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/4469964404558363194'/><link rel='alternate' type='text/html' href='http://security-sh3ll.blogspot.com/2013/04/appuse-android-pentest-platform-unified.html' title='AppUse - Android Pentest Platform Unified Standalone Environment'/><author><name>d3v1l</name><uri>http://www.blogger.com/profile/03119852053430095623</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://4.bp.blogspot.com/-14ZpUTM5s6I/T7AToB85x4I/AAAAAAAABCk/1xf2L2Z_Hpo/s220/lol.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-232798662055846003.post-7780493971394646135</id><published>2013-03-19T16:43:00.002+01:00</published><updated>2013-03-19T16:43:34.009+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="XSS"/><title type='text'>XSSF - Cross-Site Scripting Framework  v.3.0 Released</title><content type='html'>  &lt;em&gt;The Cross-Site Scripting Framework (&lt;/em&gt;&lt;strong&gt;&lt;em&gt;XSSF&lt;/em&gt;&lt;/strong&gt;&lt;em&gt;) is a  security tool designed to turn the XSS vulnerability exploitation task  into a much easier work. The XSSF project aims to demonstrate the real  dangers of XSS vulnerabilities, vulgarizing their exploitation. This  project is created solely for education, penetration testing and lawful  research purposes.&amp;nbsp;&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;&lt;em&gt;XSSF allows creating a &lt;/em&gt;&lt;strong&gt;&lt;em&gt;communication channel&lt;/em&gt;&lt;/strong&gt;&lt;em&gt;&amp;nbsp; with the targeted browser (from a XSS vulnerability) in order to  perform further attacks. Users are free to select existing modules (a  module = an attack) in order to target specific browsers. &lt;/em&gt;&lt;br /&gt;&lt;br /&gt;&lt;em&gt;XSSF  provides a powerfull documented API, which facilitates development of  modules and attacks. In addition, its integration into the &lt;/em&gt;&lt;strong&gt;&lt;em&gt;Metasploit Framework&lt;/em&gt;&lt;/strong&gt;&lt;em&gt; allows users to launch MSF browser based exploit easilly from an XSS vulnerability. &lt;/em&gt;&lt;br /&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;span class=&quot;watch-title  yt-uix-expander-head&quot; dir=&quot;ltr&quot; id=&quot;eow-title&quot; title=&quot;XSSF Basics: Install [Kali-1.0] &amp;amp; Use&quot;&gt;&lt;strong&gt;XSSF Basics: Install on Kali-1.0 Video Demo : &lt;/strong&gt;&lt;/span&gt;&lt;span class=&quot;watch-title  yt-uix-expander-head&quot; dir=&quot;ltr&quot; id=&quot;eow-title&quot; title=&quot;XSSF Basics: Install [Kali-1.0] &amp;amp; Use&quot;&gt;&lt;a href=&quot;http://www.youtube.com/watch?v=AhUhOirEfTE&quot;&gt;http://www.youtube.com/watch?v=AhUhOirEfTE&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;watch-title  yt-uix-expander-head&quot; dir=&quot;ltr&quot; title=&quot;XSSF Basics: Install [Kali-1.0] &amp;amp; Use&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span class=&quot;watch-title  yt-uix-expander-head&quot; dir=&quot;ltr&quot; title=&quot;XSSF Basics: Install [Kali-1.0] &amp;amp; Use&quot;&gt;&lt;strong&gt;Download:&lt;/strong&gt; &lt;a href=&quot;https://code.google.com/p/xssf/downloads/list&quot;&gt;https://code.google.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt; &lt;em&gt;&amp;nbsp;&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://security-sh3ll.blogspot.com/feeds/7780493971394646135/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=232798662055846003&amp;postID=7780493971394646135' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/7780493971394646135'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/232798662055846003/posts/default/7780493971394646135'/><link rel='alternate' type='text/html' href='http://security-sh3ll.blogspot.com/2013/03/xssf-cross-site-scripting-framework-v30.html' title='XSSF - Cross-Site Scripting Framework  v.3.0 Released'/><author><name>d3v1l</name><uri>http://www.blogger.com/profile/03119852053430095623</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://4.bp.blogspot.com/-14ZpUTM5s6I/T7AToB85x4I/AAAAAAAABCk/1xf2L2Z_Hpo/s220/lol.jpg'/></author><thr:total>1</thr:total></entry></feed>