본문 바로가기

모의해킹 (WAPT)175

LogViewer Pro 1.8.7.0 The LogViewer Pro is a viewer for text log files. Features include: Fast scrolling, eats low memory Supports any file size (4 Gb and larger) Multitabbed interface Auto-reload file, "Follow tail" mode Allows to highlight some lines (e.g. "errors", "warnings") Supports multiple encodings: ANSI, OEM, UTF-8, Unicode LE/BE etc. File search (both forward and backward) File printing Line wrapping, conf.. 2012. 3. 13.
Metasploit Framework 4.2.0 “The Metasploit Framework is a penetration testing toolkit, exploit development platform, and research tool. The framework includes hundreds of working remote exploits for a variety of platforms. Payloads, encoders, and nop slide generators can be mixed and matched with exploit modules to solve almost any exploit-related task.“ Official change log for Metasploit Framework 4.2.0: IPv6 Coverage: M.. 2012. 2. 23.
Apache httpOnly Cookie Disclosure // Source: https://gist.github.com/1955a1c28324d4724b7b/7fe51f2a66c1d4a40a736540b3ad3fde02b7fb08 // Most browsers limit cookies to 4k characters, so we need multiple function setCookies (good) { // Construct string for cookie value var str = ""; for (var i=0; i 2012. 2. 3.
RainbowCrack Project UPDATE “RainbowCrack uses time-memory tradeoff algorithm to crack hashes. It differs from the hash crackers that use brute force algorithm. RainbowCrack is a general propose implementation of Philippe Oechslin’s faster time-memory trade-off technique. It crack hashes with rainbow tables.” Official change log for RainbowCrack 1.5: Support 64-bit Windows operating systems Support 32-bit Linux operating s.. 2012. 1. 13.
OWASP AJAX Crawling Tool (update) Enumerating AJAX Applications with ACT (AJAX Crawling Tool) This demo shows how the AJAX Crawling Tool can be used in conjunction with your favorite proxy to fully enumerate and test AJAX applications. The purpose of the video is to: 1) Demonstrate how traditional spidering tools do not enumerate entire applications 2) How to run a basic ACT session and attacking it's findings using a proxy 출처 .. 2012. 1. 6.