Monday, August 31, 2020

Tishna: An Automated Pentest Framework For Web Servers, Web Applications To Web Security

About Tishna:
   Tishna is complete automated pentest framework for web servers, application layer to web security.

   Tishna was tested on: Kali Linux, Parrot Security OS, Black Arch, Termux, Android Led TV.


Tishna's interface: Tishna has 62 options with full automation and can be use for web security swiss knife.

Tishna's installation: First, boot your Kali Linux or Parrot Security OS up. Then open Terminal and enter these commands

Appeared:
  • Cyber Space (Computer Security).
  • Terror Security (Computer Security).
  • National Cyber Security Services.

Brief Introduction
  • Tishna is useful in Banks, Private Organisations and Ethical hacker personnel for legal auditing.
  • It serves as a defense method to find as much as information possible for gaining unauthorised access and intrusion.
  • With the emergence of more advanced technology, cybercriminals have also found more ways to get into the system of many organizations.
  • Tishna software can audit, servers and web behaviour.
  • Tishna can perform Scanning & Enumeration as much as possible of target.
  • It's first step to stop cyber criminals by securing your Servers and Web Application Security.
  • Tishna is false positive free, when there is something it will show no matter what, if it is not, it will give blank results rather error.

Developer

Support to the coder
   You can sponsor and support via BTC.
   The bitcoin address: 3BuUYgEgsRuEra4GwqNVLKnDCTjLEDfptu
qr code

More info

Sunday, August 30, 2020

Vulcan DoS Vs Akamai

In the past I had to do several DoS security audits, with múltiples types of tests and intensities. Sometimes several DDoS protections were present like Akamai for static content, and Arbor for absorb part of the bandwith.

One consideration for the DoS/DDoS tools is that probably it will loss the control of the attacker host, and the tool at least has to be able to stop automatically with a timeout, but can also implement remote response checks.

In order to size the minimum mbps needed to flood a service or to retard the response in a significant amount of time, the attacker hosts need a bandwith limiter, that increments in a logarithmic way up to a limit agreed with the customer/isp/cpd.

There are DoS tools that doesn't have this timeouts, and bandwith limit based on mbps, for that reason I have to implement a LD_PRELOAD based solution: bwcontrol

Although there are several good tools for stressing web servers and web aplications like apache ab, or other common tools used for pen-testing, but I also wrote a fast web flooder in c++ named wflood.

As expected the most effective for taking down the web server are the slow-loris, slow-read and derivatives, few host were needed to DoS an online banking. 
Remote attacks to database and highly dynamic web content were discarded, that could be impacted for sure.

I did another tool in c++ for crafting massive tcp/udp/ip malformed packets, that impacted sometimes on load balancers and firewalls, it was vulcan, it freezed even the firewall client software.

The funny thing was that the common attacks against Akamai hosts, where ineffective, and so does the slow-loris family of attacks, because are common, and the Akamai nginx webservers are well tunned. But when tried vulcan, few intensity was enough to crash Akamai hosts.

Another attack vector for static sites was trying to locate the IP of the customer instead of Akamai, if the customer doesn't use the Akamai Shadow service, it's possible to perform a HTTP Host header scan, and direct the attack to that host bypassing Akamai.

And what about Arbor protection? is good for reducing the flood but there are other kind of attacks, and this protection use to be disabled by default and in local holidays can be a mess.

More information

EasySploit: A Metasploit Automation Bash Scripts To Use Metasploit Framework Easier And Faster Than Ever


About EasySploit: EasySploit is Metasploit automation tool to use Metasploit Framework EASIER and FASTER than EVER.

EasySploit's options:
  • Windows --> test.exe (payload and listener)
  • Android --> test.apk (payload and listener)
  • Linux --> test.py (payload and listener)
  • MacOS --> test.jar (payload and listener)
  • Web --> test.php (payload and listener)
  • Scan if a target is vulnerable to ms17_010 (EnternalBlue)
  • Exploit Windows 7/2008 x64 ONLY by IP (ms17_010_eternalblue)
  • Exploit Windows Vista/XP/2000/2003 ONLY by IP (ms17_010_psexec)
  • Exploit Windows with a link (HTA Server)
  • Contact with me - My accounts

EasySploit's installation
   You must install Metasploit Framework first.
   For Arch Linux-based distros, enter this command: sudo pacman -S metasploit

   For other Linux distros, enter these command to install Metasploit Framework:    And then, enter these commands to install EasySploit:

How to use EasySploit? (EasySploit video series tutorials)

Disclaimer about EasySploit:
   Usage of EASYSPLOIT for attacking targets without prior mutual consent is ILLEGAL. Developers are not responsible for any damage caused by this script. EASYSPLOIT is intented ONLY FOR EDUCATIONAL PURPOSES!!! STAY LEGAL!!!

You might like these similar tools:

You can support KALI LINUX TRICKS from Patreon.


Read more
  1. Free Pentest Tools For Windows
  2. Blackhat Hacker Tools
  3. Android Hack Tools Github
  4. Pentest Recon Tools
  5. Best Pentesting Tools 2018
  6. Physical Pentest Tools
  7. What Are Hacking Tools
  8. Best Hacking Tools 2019
  9. Hacking Tools Software
  10. Nsa Hacker Tools
  11. Hacker Tools For Mac
  12. What Are Hacking Tools
  13. Hacking Tools Kit
  14. Free Pentest Tools For Windows
  15. Hacker Tools Mac
  16. Pentest Reporting Tools
  17. Kik Hack Tools
  18. Tools 4 Hack
  19. Hack Tools
  20. Pentest Tools For Mac
  21. Hacker Tools Free
  22. Pentest Automation Tools
  23. Pentest Tools Online
  24. Hacker Search Tools
  25. Physical Pentest Tools
  26. Hacker Tools Mac
  27. Ethical Hacker Tools
  28. New Hack Tools
  29. Nsa Hack Tools Download
  30. Hacking Tools For Windows
  31. Pentest Tools For Windows
  32. Hacker Tools Free Download
  33. Blackhat Hacker Tools
  34. New Hack Tools
  35. Computer Hacker
  36. World No 1 Hacker Software
  37. Hack Tools Mac
  38. Install Pentest Tools Ubuntu
  39. Hacking Tools Mac
  40. Hacker Tools Windows
  41. Hacking Tools 2019
  42. Hack Website Online Tool
  43. Pentest Tools Port Scanner
  44. Hacking Tools Online
  45. Pentest Tools Find Subdomains
  46. Hacker Tools Hardware
  47. Pentest Tools Framework
  48. Hacking Tools Download
  49. Pentest Tools Download
  50. Blackhat Hacker Tools
  51. Hacker Tools Online
  52. Install Pentest Tools Ubuntu
  53. Hacker Tools Github
  54. Pentest Tools Windows
  55. Hack Tools For Pc
  56. Usb Pentest Tools
  57. Best Hacking Tools 2020
  58. Hack Tools
  59. Tools For Hacker
  60. Pentest Tools Apk
  61. Hacking Tools Hardware
  62. Pentest Tools Website Vulnerability
  63. Top Pentest Tools
  64. Pentest Tools Windows
  65. Hacker Tools For Pc
  66. Pentest Tools
  67. Hacker Tools Free
  68. Hacker Tools For Mac
  69. Computer Hacker
  70. Hacking Tools For Windows Free Download
  71. Hacking Tools Download
  72. Pentest Tools Port Scanner
  73. Hack Tools Github
  74. Hacking Tools Hardware
  75. Hacking Tools For Beginners
  76. Hack Tools
  77. Tools 4 Hack
  78. Hacker Tools 2020
  79. Pentest Recon Tools
  80. Hacker Tools Github
  81. Hacker Tools Windows
  82. Hacking Tools For Windows 7
  83. Hacking Tools For Windows
  84. Hacks And Tools
  85. Hacker Tools Apk
  86. Pentest Tools Github
  87. Hacking Tools Windows
  88. Hacker Tools Mac
  89. Hacker Tools For Windows
  90. Pentest Tools Alternative
  91. Install Pentest Tools Ubuntu
  92. Pentest Tools Website
  93. Hack Tools Download
  94. Hacker Tool Kit
  95. Hack Tools For Pc
  96. Hack Apps
  97. Pentest Tools Port Scanner
  98. Hack Tools For Games
  99. Free Pentest Tools For Windows
  100. Hak5 Tools
  101. Pentest Tools Website
  102. Hack Rom Tools
  103. Hack Tools Github
  104. Hacking Tools Usb
  105. Hack Tools
  106. Hacking Tools For Pc
  107. Hacker Tools Github
  108. Hack Tools For Ubuntu
  109. Pentest Tools List
  110. Top Pentest Tools
  111. Hack Tools 2019
  112. Ethical Hacker Tools
  113. Hacker Tools List
  114. Hacker Tools 2020
  115. Hacker Tool Kit
  116. Hack Tools Online
  117. Hack Rom Tools
  118. Pentest Tools Kali Linux
  119. Hacker Tools Online
  120. Hack Tools For Games
  121. Hacker Hardware Tools
  122. Hacker Tools For Mac
  123. Pentest Automation Tools
  124. Hacker Tools Free
  125. Kik Hack Tools
  126. Pentest Tools Website
  127. Pentest Tools For Android
  128. Game Hacking
  129. Pentest Tools Github
  130. Hacking Apps

OWASP ZAP Project - Zed Attack Proxy Team Releases Two Initiatives

The Zed Attack Proxy team is pleased to announce two recently released initiatives:


ZAP In Ten

The team have just launched a new series of videos called 'ZAP in Ten' in conjunction with AllDayDevOps.

ZAP in Ten is a series of short form videos featuring Simon Bennetts, project lead of the OWASP Zed Attack Proxy (ZAP)  project. Each video highlights a specific feature or resource for ZAP.

ZAP API Docs

As part of OWASP's participation in Google's Season of Docs, the ZAP project has had @sshniro working on API documentation. The first iteration of the documentation is now live It includes Java, Python, and shell example snippets all presented in a responsive and accessible design. Which we will continue to build on in the future.

Big thanks to Nirojan for his efforts on this wonderful initiative!  Congratulations and thanks to Google Open Source for helping to bring the open source and technical writer communities together!
Related word

  1. Hack Apps
  2. Hacking Tools Software
  3. Hacking Tools Name
  4. Hack Tools For Windows
  5. Pentest Tools Android
  6. Hack Tools For Ubuntu
  7. How To Hack
  8. Free Pentest Tools For Windows
  9. Pentest Tools Framework
  10. Nsa Hacker Tools
  11. What Are Hacking Tools
  12. Hacking Tools For Beginners
  13. Hacking Tools Pc
  14. Best Hacking Tools 2019
  15. Hack And Tools
  16. Hacking Tools Hardware
  17. Pentest Tools Online
  18. Hack Tools For Games
  19. Hack Tools For Games
  20. Hacker Tools Apk Download
  21. Hack Tools Online
  22. How To Install Pentest Tools In Ubuntu
  23. Pentest Tools Find Subdomains
  24. What Is Hacking Tools
  25. Hack Tools Pc
  26. Hack Tool Apk No Root
  27. Hack App
  28. Github Hacking Tools
  29. Hacker Tools Free Download
  30. Black Hat Hacker Tools
  31. Pentest Tools Free
  32. Pentest Tools Online
  33. World No 1 Hacker Software
  34. Tools 4 Hack
  35. Pentest Tools Tcp Port Scanner
  36. How To Make Hacking Tools
  37. Hacker Tools Apk Download
  38. Pentest Tools For Ubuntu
  39. Hacker Tools Software
  40. Hacking Tools Software
  41. Hacker Tools Hardware
  42. World No 1 Hacker Software
  43. Hak5 Tools
  44. Pentest Box Tools Download
  45. Pentest Tools Android
  46. Hacker Tool Kit
  47. Physical Pentest Tools
  48. Hacker Hardware Tools
  49. Pentest Automation Tools
  50. Hacking Tools For Beginners
  51. Hacker Tools
  52. Hacker Tools Online
  53. Computer Hacker
  54. How To Install Pentest Tools In Ubuntu
  55. Pentest Tools Url Fuzzer
  56. Hack Tools
  57. Hacker Tools Hardware
  58. Hacking Tools For Windows
  59. Hack Apps
  60. Hack And Tools
  61. World No 1 Hacker Software
  62. Best Pentesting Tools 2018
  63. Hack Tools
  64. Pentest Automation Tools
  65. Pentest Tools Download
  66. Hack Tools
  67. Hacking Tools For Windows Free Download
  68. Hacker Tool Kit
  69. Hacking Tools Windows 10
  70. Hacking Tools For Pc
  71. Pentest Tools Free
  72. Hacking Tools For Windows