Showing posts with label Tool. Show all posts
Showing posts with label Tool. Show all posts

Sunday, April 14, 2013

Hacking Tools 2013 – Cracking Tools 2013




Berikut ini adalah Download Hacking Tools 2013, Hacking Tools 2013, Tools Hacking 2013, Cracking Tools 2013, Tools Cracking 2013, Tool Hack 2013, Tool Crack 2013, Tool Hacking 2013, Tool Cracking 2013, Tool Hacker 2013, Tool Cracker 2013, Tools Hacker 2013, Tools Cracker 2013, Pentest Tool 2013, Security Tools 2013, Password Hack 2013, yang mungkin bisa bermanfaat untuk bisa anda pakai di 2013. Happy Hacking All :)
hacking tools 2013 cracking tools 2013 security tools 2013 pentesting tools 2013
Ayo buruan download penetration testing 2013 and security tools 2013, networking tools 2013, gmail hacking tools 2013, learn ethical hacking 2013, vulnerability assessment 2013, penetration testing 2013, email hacking 2013, password hacking 2013, reverse engineering 2013. Download hacking tools, networking tools, gmail hacking, learn ethical hacking, vulnerability, penetration testing, hack email, hacking, password hacking, reverse engineering 2013, wifi hacker 2013. Hacker Tools 2013, Hack Tool 2013, Hacker Tool 2013, Hacking Tool 2013, Hack Tool 2013, Cracking Tools 2013, Cracker Tools 2013, Cracking Tool 2013, Cracker Tool 2013, Crack Tools 2013, Crack Tool 2013, Security Tool 2013, Pentester Tool 2013, Password Cracker 2013, Password Hacking2013.

1. PWN STAR

Sebuah script bash untuk meluncurkan AP , dapat dikonfigurasi dengan berbagai macam pilihan serangan. Termasuk sejumlah script index.html dan server php, untuk phishing. Dapat bertindak sebagai multi-klien captive portal menggunakan php dan iptables. Eksploitasi klasik seperti kejahatan-PDF, De-auth dengan aireplay, dll.
PwnStar BinusHacker
Fitur Umum:
  1. Mengelola Antarmuka dan MAC Spoofing
  2. Mengatur sniffing
  3. Web phishing
  4. Karmetasploit
  5. WPA handshake
  6. De-auth klien
  7. Mengelola Iptables
Download PwnStar Disini:

2. ZED Attack Proxy (ZAP)

(ZAP) adalah alat penetrasi pengujian terpadu untuk menemukan kerentanan dalam aplikasi web. Tools ini dirancang untuk digunakan oleh orang-orang dengan berbagai pengalaman security dan dengan demikian sangat ideal untuk para pengembang dan penguji fungsional yang baru untuk penetration testing serta menjadi tambahan yang berguna untuk toolbox tester.
ZAP - Zen Attack Proxy 2013
Fitur Utama:
  1. Intercepting Proxy
  2. Active scanner
  3. Passive scanner
  4. Brute Force scanner
  5. Spider
  6. Fuzzer
  7. Port Scanner
  8. Dynamic SSL certificates
  9. API
  10. Beanshell integration
Download ZAP Disini:

3. SET (Social Engineering Toolkit)

Tools yang berfokus pada menyerang unsur kelemahan dan kelengahan manusia. Tool ini sangat banyak digunakan saat ini dan merupakan salah satu tools yang sukses di demonstrasikan di Defcon.
SET - Social Engineering Toolkit BinusHacker
Fitur Utama:
  • Spear-Phishing Attack Vector
  • Java Applet Attack Vector
  • Metasploit Browser Exploit Method
  • Credential Harvester Attack Method
  • Tabnabbing Attack Method
  • Man Left in the Middle Attack Method
  • Web Jacking Attack Method
  • Multi-Attack Web Vector
  • Infectious Media Generator
  • Teensy USB HID Attack Vector

Download Social Engineering Toolkit Disini:

4. BURP SUITE

Burp Suite adalah alat yang sangat bagus sekali untuk pengujian keamanan aplikasi web. Alat ini sangat bagus untuk pentester dan peneliti keamanan. Ini berisi berbagai alat dengan antarmuka banyak di antara mereka yang dirancang untuk memudahkan dan mempercepat proses menyerang aplikasi website.
Burp Suite - BinusHacker
Fungsi Umum:
  1. Intersepsi proxy
  2. Radar crawling dan spider
  3. Webapps scanner
  4. Alat penyerangan
  5. Repeater dan sequencer tools
Download Burp Suite Disini:

5. ETTERCAP

Ettercap adalah sniffer multiguna / interceptor / logger untuk Local Area Network. Mendukung diseksi aktif dan pasif dari banyak protokol (bahkan yang dalam bentuk kode) dan mencakup banyak fitur untuk analisis jaringan dan host.
Ettercap - BinusHacker
Ettercap - BinusHacker
Fungsi Umum:
  1. Untuk melakukan capture traffic dan data
  2. Untuk melakukan logging network
  3. Dll
Download Ettercap Disini:

6. SANS Investigative Forensic Toolkit (SIFT)

The SANS Investigative Forensic Toolkit (SIFT) Workstation adalah VMware Appliance yang bisa di konfigurasi dengan semua kebutuhan untuk melakukan digital forensik secara mendetail. Kompatible dengan Expert Witness Format (E01), Advanced Forensic Format (AFF), and raw (dd) evidence formats. Versi baru telah sepenuhnya dibangun kembali pada basis Ubuntu dengan banyak tools tambahan dan kemampuan yang digunakan dalam teknologi modern forensik.SANS+Investigative+Forensic+Toolkit+2.14+Released
Fungsi Umum SIFT:
  1. iPhone, Blackberry, and Android Forensic Capabilities
  2. Registry Viewer (YARU)
  3. Compatibility with F-Response Tactical, Standard, and Enterprise
  4. PTK 2.0 (Special Release – Not Available for Download)
  5. Automated Timeline Generation via log2timeline
  6. Many Firefox Investigative Plugins
  7. Windows Journal Parser and Shellbags Parser (jp and sbag)
  8. Many Windows Analysis Utilities (prefetch, usbstor, event log, and more)
  9. Complete Overhaul of Regripper Plugins (added over 80 additional plugins)
Download SANS Investigative Forensic Toolkit (SIFT) Disini:

7. WIRESHARK

Wireshark adalah alat yang paling banyak digunakan dan paling populer pada dunia analyzer protokol, dan merupakan standar de facto di banyak industri dan lembaga pendidikan untuk menganalisa jaringan di berbagai protokol.
Wire Shark - 2013 - BinusHacker
Fungsi Umum:
  1. Live capture and offline analysis
  2. Standard three-pane packet browser
  3. Multi-platform: Runs on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and many others
  4. Captured network data can be browsed via a GUI, or via the TTY-mode TShark utility
  5. The most powerful display filters in the industry
  6. Rich VoIP analysis
  7. Read/write many different capture file formats
  8. Dll
Download WireShark Disini:

8. WEBSPLOIT

WebSploit adalah Open Source Project untuk Scan dan Analysis Remote System dari kelemahan-kelemahan pada aplikasi website.
WebSploit+Framework+2.0.3+with+Wifi+Jammer
Fitur Utama:
[>]Social Engineering Works
[>]Scan,Crawler & Analysis Web
[>]Automatic Exploiter
[>]Support Network Attacks
—-
[+]Autopwn – Used From Metasploit For Scan and Exploit Target Service
[+]wmap – Scan,Crawler Target Used From Metasploit wmap plugin
[+]format infector – inject reverse & bind payload into file format
[+]phpmyadmin Scanner
[+]LFI Bypasser
[+]Apache Users Scanner
[+]Dir Bruter
[+]admin finder
[+]MLITM Attack – Man Left In The Middle, XSS Phishing Attacks
[+]MITM – Man In The Middle Attack
[+]Java Applet Attack
[+]MFOD Attack Vector
[+]USB Infection Attack
[+]ARP Dos Attack
[+]Web Killer Attack
[+]Fake Update Attack
[+]Fake Access point Attack
Download WebSploit Framework Disini:

9. WINAUTOPWN

WinAutoPWN merupakan sebuah tools yang digunakan untuk mengexploitasi secara langsung Windows Framework, sehingga secara otomatis kita yang akan menjadi administrator di windows tersebut. Banyak digunakan oleh “Defacer” Indonesia untuk melakukan deface terhadap Windows Server :)
WinAutoPWN 2013 - BinusHacker
Download WinAutoPWN Disini:

10. HASHCAT

Hashcat adalah sebuah tools untuk crack berbagai password yang di encrypt, sangat powerfull untuk recovery password.
Hashcat 2013 - BinusHacker
Fungsi Umum:
  1. Multi-Threaded
  2. Free
  3. Multi-Hash (up to 24 million hashes)
  4. Multi-OS (Linux, Windows and OSX native binaries)
  5. Multi-Algo (MD4, MD5, SHA1, DCC, NTLM, MySQL, …)
  6. SSE2 accelerated
  7. All Attack-Modes except Brute-Force and Permutation can be extended by rules
  8. Very fast Rule-engine
  9. Rules compatible with JTR and PasswordsPro
  10. Possible to resume or limit session
  11. Automatically recognizes recovered hashes from outfile at startup
  12. Can automatically generate random rules
  13. Load saltlist from external file and then use them in a Brute-Force Attack variant
  14. Able to work in an distributed environment
  15. Specify multiple wordlists or multiple directories of wordlists
  16. Number of threads can be configured
  17. Threads run on lowest priority
  18. 30+ Algorithms implemented with performance in mind
  19. … and much more
Download HashCat Disini:

11. UNISCAN

Uniscan adalah scanner untuk aplikasi web, yang ditulis dalam perl untuk Linux. Saat ini versi Uniscan adalah 6,2.
uniscan
Fungsi Umum:
  1. Identification of system pages through a Web Crawler.
  2. Use of threads in the crawler.
  3. Control the maximum number of requests the crawler.
  4. Control of variation of system pages identified by Web Crawler.
  5. Control of file extensions that are ignored.
  6. Test of pages found via the GET method.
  7. Test the forms found via the POST method.
  8. Support for SSL requests (HTTPS).
  9. Proxy support.
  10. Generate site list using Google.
  11. Generate site list using Bing.
  12. Plug-in support for Crawler.
  13. Plug-in support for dynamic tests.
  14. Plug-in support for static tests.
  15. Plug-in support for stress tests.
  16. Multi-language support.
  17. Web client.
Download Uniscan Disini:

12. OLYYDBG

OllyDbg adalah 32-bit assembler debugger untuk Microsoft Windows. Penekanan pada analisis kode biner membuatnya sangat berguna dalam kasus-kasus di mana sourcecode tidak tersedia.
OllyDbg Cracking 2013 - BinusHacker
Fungsi Umum:
  1. Intuitive user interface, no cryptical commands
  2. Code analysis – traces registers, recognizes procedures, loops, API calls, switches, tables, constants and strings
  3. Directly loads and debugs DLLs
  4. Object file scanning – locates routines from object files and libraries
  5. Allows for user-defined labels, comments and function descriptions
  6. Understands debugging information in Borland® format
  7. Saves patches between sessions, writes them back to executable file and updates fixups
  8. Open architecture – many third-party plugins are available
  9. No installation – no trash in registry or system directories
  10. Debugs multithread applications
  11. Attaches to running programs
  12. Configurable disassembler, supports both MASM and IDEAL formats
  13. MMX, 3DNow! and SSE data types and instructions, including Athlon extensions
  14. Full UNICODE support
  15. Dynamically recognizes ASCII and UNICODE strings – also in Delphi format!
  16. Recognizes complex code constructs, like call to jump to procedure
  17. Decodes calls to more than 1900 standard API and 400 C functions
  18. Gives context-sensitive help on API functions from external help file
  19. Sets conditional, logging, memory and hardware breakpoints
  20. Traces program execution, logs arguments of known functions
  21. Shows fixups
  22. Dynamically traces stack frames
  23. Searches for imprecise commands and masked binary sequences
  24. Searches whole allocated memory
  25. Finds references to constant or address range
  26. Examines and modifies memory, sets breakpoints and pauses program on-the-fly
  27. Assembles commands into the shortest binary form
  28. Starts from the floppy disk
Download Ollydbg Disini:

13. BBQSQL

BBQSQL merupakan Opensource SQL injection tools dengan kerangka kerja khusus yang dirancang untuk menjalankan proses secara hyper cepat, agnostik database, mudah untuk setup, dan mudah untuk memodifikasi. Ini adalah satu lagi rilis mengagumkan dari Arsenal 2012 Blackhat USA. Ketika melakukan penilaian keamanan aplikasi, kita sering menemukan kerentanan SQL yang sulit untuk di exploitasi, dengan tools ini akan menjadi sangat mudah.
BBQSQL ditulis dengan bahasa pemrograman Python. Hal ini sangat berguna ketika menyerang kerentanan SQL injection rumit. BBQSQL juga merupakan alat semi-otomatis, yang memungkinkan sedikit kustomisasi bagi mereka yang sulit untuk memicu temuan injeksi SQL. Alat ini dibangun untuk menjadi agnostik database dan sangat serbaguna. Ia juga memiliki UI intuitif untuk membuat pengaturan serangan jauh lebih mudah.
BBQSQL SQL Injection Tools 2013 - BinusHacker
Fungsi Umum:
  1. SQL Injection Tools
  2. URL
  3. HTTP Method
  4. Headers
  5. Cookies
  6. Encoding methods
  7. Redirect behavior
  8. Files
  9. HTTP Auth
  10. Proxies
Download BBQSQL Disini:

14. CRYPTOHAZE

Tools untuk crack password / hash dimana cryptohaze mendukung CUDA, OpenCL, dan CPU kode (SSE, AVX, dll). Bisa berjalan di OS yang support CUDA. Semua ini ditujukan untuk pentester agar lebih mudah dalam melakukan crack hash.
CryptoHaze 2013 - BinusHacker
Fungsi Umum:
  1. Crack berbagai macam hash
  2. Menampilkan hasil dari crackhash
  3. Cracking di berbagai platform OS
Download Cryptohaze Disini:

15. SAMURAI WEB TESTING FRAMEWORK (SWTF)

SWTF ini digunakan untuk melakukan pengujian / pentest terhadap web application, digunakan untuk menemukan kelemahan dan melakukan exploitasi terhadap web tersebut. Sangat komplit dan banyak digunakan didunia termasuk digunakan oleh salah satu staff binushacker :)
Samurai Web Pentest 2013 - BinusHacker
Fungsi Umum:
  1. Web Scanner
  2. Web Mapping
  3. Web Exploitation
Download The Samurai Web Testing Framework Disini:


Tools di atas wajib untuk dimiliki di 2013, selamat untuk mencoba dan bereksperimen di awal tahun baru ini

 ..thanks to binus hackers

Saturday, March 9, 2013

.NET Framework Cleanup Tool User's Guide


.NET Framework Cleanup Tool User's Guide
Introduction
This .NET Framework cleanup tool is designed to automatically perform a set of steps to remove selected versions of the .NET Framework from a computer.  It will remove files, directories, registry keys and values and Windows Installer product registration information for the .NET Framework.  The tool is intended primarily to return your system to a known (relatively clean) state in case you are encountering .NET Framework installation, uninstallation, repair or patching errors so that you can try to install again.
There are a couple of very important caveats that you should review before using this tool to remove any version of the .NET Framework from your system:
  • This tool is designed as a last resort for cases where install, uninstall, repair or patch installation did not succeed for unusual reasons.  It is not a substitute for the standard uninstall procedure.  You should try the steps listed in this blog post before using this cleanup tool.
  • This cleanup tool will delete shared files and registry keys used by other versions of the .NET Framework.  If you run the cleanup tool, you will need to perform a repair/re-install for all other versions of the .NET Framework that are on your computer or they will not work correctly afterwards.
Download location
The .NET Framework cleanup tool is available for download at the following locations:
The .zip file that contains the tool also contains a file named history.txt that lists when the most recent version of the tool was published and what changes have been made to the tool over time.
Supported products
The .NET Framework cleanup tool supports removing the following products:
  • .NET Framework - All Versions
  • .NET Framework - All Versions (Tablet PC and Media Center)
  • .NET Framework - All Versions (Windows Server 2003)
  • .NET Framework - All Versions (Windows Vista and Windows Server 2008)
  • .NET Framework - All Versions (Windows 7)
  • .NET Framework 1.0
  • .NET Framework 1.1
  • .NET Framework 2.0
  • .NET Framework 3.0
  • .NET Framework 3.5
  • .NET Framework 4
  • .NET Framework 4.5
Not all of the above products will appear in the UI for the .NET Framework cleanup tool on every operating system.  The cleanup tool contains logic so that if it is run on an OS version that includes the .NET Framework as an OS component, it will not offer the option to clean it up.  This means that running the cleanup tool on Windows XP Media Center Edition or Tablet PC Edition will not offer the option to clean up the .NET Framework 1.0, running it on Windows Server 2003 will not offer the option to clean up the .NET Framework 1.1 and running it on Windows Vista or Windows Server 2008 will not offer the option to clean up the .NET Framework 2.0 or the .NET Framework 3.0.
When choosing to remove any of the above versions of the .NET Framework, the cleanup tool will also remove any associated hotfixes and service packs.  You do not need to run any separate steps to remove the service pack(s) for a version of the .NET Framework.
Silent installation mode
The .NET Framework cleanup tool supports running in silent mode.  In this mode, the tool will run without showing any UI, and the user must pass in a version of the .NET Framework to remove as a command line parameter.  To run the cleanup tool insilent mode, you need to download the cleanup tool, extract the file cleanup_tool.exe from the zip file, and then run it using syntax like the following:
cleanup_tool.exe /q:a /c:"cleanup.exe /p <name of product to remove>"
The value that you pass with the /p switch to replace <name of product to remove> in this example must exactly match one of the products listed in the Supported products section above.  For example, if you would like to run the cleanup tool in silent mode and remove the .NET Framework 1.1, you would use a command line like the following:
cleanup_tool.exe /q:a /c:"cleanup.exe /p .NET Framework 1.1"
One important note – as indicated above, the cleanup tool will not allow you to remove a version of the .NET Framework that is installed as part of the OS it is running on.  That means that even if you try this example command line on Windows Server 2003, the tool will exit with a failure return code and not allow you to remove the .NET Framework 1.1 because it is a part of that OS.
Similarly, you cannot use the cleanup tool to remove the .NET Framework 1.0 from Windows XP Media Center Edition or Windows XP Tablet PC Edition or remove the .NET Framework 2.0 or 3.0 from Windows Vista or Windows Server 2008.  In addition, if you run the cleanup tool on an OS that has any edition of the .NET Framework installed as a part of the OS, it will prevent you from using the .NET Framework - All Versions option because there is at least one version that it cannot remove.
If you are planning to run the cleanup tool in silent mode, you need to make sure to detect what OS it is running on and not pass in a version of the .NET Framework with the /p switch that is a part of the OS or make sure that you know how to handle the failure exit code that you will get back from the cleanup tool in that type of scenario.
Unattended installation mode
The .NET Framework cleanup tool supports running in silent mode.  In this mode, the tool will run and only show a progress dialog during removal, but will require no user interaction.  Unattended mode requires the user to pass in a version of the .NET Framework to remove as a command line parameter.  To run the cleanup tool inunattended mode, you need to download the cleanup tool, extract the file cleanup_tool.exe from the zip file, and then run it using syntax like the following:
cleanup_tool.exe /q:a /c:"cleanup.exe /p <name of product to remove> /u"
For example, if you would like to run the cleanup tool in unattended mode and remove the .NET Framework 1.1, you would use a command line like the following:
cleanup_tool.exe /q:a /c:"cleanup.exe /p .NET Framework 1.1 /u" 
Exit codes
The cleanup tool can returns the following exit codes:
  • 0 - cleanup completed successfully for the specified product
  • 3010 - cleanup completed successfully for the specified product and a reboot is required to complete the cleanup process
  • 1 - cleanup tool requires administrative privileges on the machine
  • 2 - the required file cleanup.ini was not found in the same path as cleanup.exe
  • 3 - a product name was passed in that cannot be removed because it is a part of the OS on the system that the cleanup tool is running on
  • 4 - a product name was passed in that does not exist in cleanup.ini
  • 100 - cleanup was able to start but failed during the cleanup process
  • 1602 - cleanup was cancelled
Log files
The cleanup tool creates the following log files:
  • %temp%\cleanup_main.log - a log of all activity during each run of the cleanup tool; this is a superset of the logs listed below as well as some additional information
  • %temp%\cleanup_actions.log - a log of actions taken during removal of each product; it will list files that it finds and removes, product codes it tries to remove, registry entries it tries to remove, etc.
  • %temp%\cleanup_errors.log - a log of errors and warnings encountered during each run of the cleanup tool

 
Free Web Hosting | Top Hosting | Great HTML Templates from easytemplates.com.