Security Reconnaissance

We have talked about SlowHTTPTest in detailed here, 2 days ago Shekyan released a new version, below is summary of change log.

SlowHTTPTest 1.4 release notes:

  • Added man pages as doc support
  • Some bug fixes
  • and now it can handle 64000 concurrent connections  😀 OpsS!!

You can read our previous post in detail that would help you, how to compile and use it.

Download and install SlowHTTPTest latest version :

wget http://slowhttptest.googlecode.com/files/slowhttptest-1.4.tar.gz
tar -zxvf slowhttptest-1.4.tar.gz

[Keep Reading…]

FBPwnknown in community commonly as Facebook Profile dumper have released latest version last week FBPwn Beta – 0.1.7 We have already talked about it in detail. We have also shoot FBPwn video tutorial can be viewed here

In this release there are some bug fixes, it doesn’t contain new features.

Issues fixed :

  • getting authenticated profile’s ID while logging in
  • Friend list dumping feature.
  • Adding victim’s friends.
  • Profile cloning
  • Image dumper

Download FBPwn Beta – 0.1.7 from

http://fbpwn.googlecode.com/files/FBPwn-beta-0.1.7.zip

Network Miner 1.1 is a Network Forensic Analysis Tool that can be used to capture packets in order to detect sessions, plain text logins(user,password), hosts, open ports, certificates and dozen of other features that can be only viewed when you install it. It also support Offline analysis of PCap files that i captured using different tools/Operating systems.

Our previous post about Network Miner 1.0 can be viewed for the detail description. How ever this post is about Network Miner 1.1 release.

 

Network Miner 1.1 ChangeLog Summary :

  • Google Analytic’s parameters (Screen resolution,language,browser and other info)  in Network Miner under ‘Host Details’.
  • Drag n Drop pcap files directly, make sure Networkminer 1.1 is running 😀
  • Provide PCap files as a arguments using CLI interface.
  • Improvements for SMB/CIFS and NetBIOS.
  • Point-to-Point Protocol (PPP) frames Support in PCap data files.
  • Stability for load PCap data files.
Download :

FBPwn is releasing new version very quickly. What we believe, It is because of the tool has some outstanding features that given developers a new thought, how facebook data can be accessed with different ways. Our previous post regarding FBPwn Beta – 0.1.4  was in detail about its strength and HowTo use it.

FBPwn Beta - 0.1.5 version contain new FEATURES and one FIX.

Summary from the Official ChangeLog

  • Exception is fixed for the issue
  • Use FBPwn through proxy
  • Check for new version / Update.
  • WallDumper module is also added
  • About dialog
Download  FBPwn-beta-0.1.5  here
Download FBPwn Video Tutorial  directly from
https://rapidshare.com/files/507532677/FBPwn-Video-Tutorial.ogv 

Watch FBPWn video tutorial Shoot by HG Team on youtube below ;

 What is FBPwn?

FBPWN is a crossplateform java based Facebook profile dumper developed by Information Security Analyst team from RISST, released under GPL License. This tiny but worth full application is still in beta phase but can do plenty of usefull jobs for you 🙂

How FBPwn works?

FBPwn sends requests to your facebook friends/polls and wait for the acceptance notification. Once your target(victim) accepts friend request, it dumps all info that includes everything(username,email,friends list, etc) it is visible.

What if your victim UnFriend/Delete from friend list you?

This application is super fast and it fetches data rapidly as soon victim access requests. It will dump all victim information including username, email, friend list, photos and other info. So it doesn’t matter if victim figures out it as a fake account because it is too late 😀

Crawl Facebook Contact list, profiles that contain email addresses and build a
mailing list of million emails contact by writing a small piece of bash script.

How to use FBPwn?

As we said, it is cross platform so it can be run on any operating system that have java installed. In our example, i am using it on BackTrack Linux.

wget http://fbpwn.googlecode.com/files/FBPwn-beta-0.1.4.zip
unzip FBPwn-beta-0.1.3.zip
cd FBPwn-beta-0.1.3
./run.sh

We have shoot FBPwn Video Tutorial. It covers how can you use this application. But due to codecs we could not upload it youtube. that will be posted soon. Stay tune.

Update – 15th Sep, 2011:

Sorry guys we couldn’t convert it, ofcourse we tried few times but failed :-D. So STOP sending Video tutorial REQUESTS emails.

Download FBPwn Video Tutorial  directly from
https://rapidshare.com/files/507532677/FBPwn-Video-Tutorial.ogv

Introduction :
Slow HTTP DoS attacks rely on the fact that the HTTP protocol, by design, requires requests to be completely received by the server before they are processed. SlowHTTPTest is developed by Sergey Shekyan, Who is  Developer Web Application Scanning at Qualys.

This tool is enough capable to acquire resource on server side at application layer.

How to Install SlowHTTPTest?
wget http://slowhttptest.googlecode.com/files/slowhttptest-1.1.tar.gz
gunzip slowhttptest-1.1.tar.gz
tar xf slowhttptest-1.1.tar
cd slowhttptest-1.1

Configure & Compile it. You can use custom –prefix=your-location
./configure
make
make install

How To Use SlowHTTPTest for DoS?
slowhttptest -c 1000 -B -g -o output-file-name -i 100 -r 300 -s 10240 -u http://www.example.com/url/page.html -x 20

Detailed options :

-a start start value of ranges-specifier for range header test
-b bytes limit of range-specifier for range header test
-c number of connections limited to 1024
-H, B, or R specify to slow down in headers section or in message body.
            -R enables range test
-g generate statistics in CSV and HTML formats, pattern is slow_xxx.csv/html,
   where xxx is the time and date
-i seconds interval between follow up data in seconds, per connection
-l seconds test duration in seconds
-o file custom output file path and/or name, effective if -g is specified
-r connections per second connection rate
-s bytes value of Content-Length header, if -B specified
-t verb custom verb to use
-u URL target URL, the same format you type in browser, e.g https://host:port/
-v level verbosity level of log 0-4
-x bytes max length of follow up data

Troubleshooting :

configure: error: OpenSSL is missing

Install openssl devel package on backtrack(or any debian based distro)
aptitude install libssl-dev

On CEntOS Linux :
yum install openssl-devel

SlowHTTPTest Video Tutorial :