200 spin links 10-11-2022

25 spin link 10-11-2022
10 spins 10-11-2022
25 spin 10-11-2022
25 spin link 10-11-2022
50 spin link 10-11-2022
25 spin 10-11-2022
25 spin link 10-11-2022
25 spin link 10-11-2022
25 spins 09-11-2022
25 spins 09-11-2022
Coin link 09-11-2022
10 spin link 09-11-2022
25 spin 09-11-2022
10 spins 09-11-2022
Coin link 09-11-202

5 spin link 09-11-2022

25 spin link 08.11.2022

Coin link 08.11.2022
25 spin 08.11.2022

Coin link 08.11.2022
10 spins 08.11.2022
Coin link 08.11.2022
25 spins 07-11-2022
25 spin link 07-11-2022
10 spin 07-11-2022
25 spin 07-11-2022
Spin link 07-11-2022
25 spin link 07-11-2022
25 spin link 07-11-2022
25 spin link 07-11-2022
10 spin 06-11-2022
10 spin link 06-11-2022
25 spin link 06-11-2022
25 spin 06-11-2022
10 spin 06-11-2022
25 spin link 06-11-2022
25 spin link 06-11-2022
25 spin 05-11-2022
25 spin link 05-11-2022
Coin link 05-11-2022
10 spin link 05-11-2022
Coin link 05-11-2022
25 spin 04.11.2022

10 spin 04-11-2022
Coin link 04.11.2022

Coin link 04.11.2022

25 spin 04.11.2022
10 spin link 04-11-2022
25 spin link 04-11-2022
25 spin 04-11-2022
25 spin 03.11.2022

10 spin link 03.11.2022

25 spin 03.11.2022

25 spin link 03.11.2022

10 spins 03.11.2022

25 spin 03.11.2022
25 spins 03.11.2022
25 spin link 02.11.2022

25 spin 02.11.2022

Coin link 02.11.2022
10 spin link 02.11.2022

25 spin 02.11.2022



25 spin 02.11.2022
25 spin 02.11.2022
25 spin 01.11.2022

10 spin 01.11.2022
Coin link 01.11.2022

Coin link 01.11.2022
25 spin 01.11.2022

25 spin link 31-10-2022
50 spin link 31-10-2022
40 spin 31-10-2022
40 spin link 31.10.2022
25 spin link 31.10.2022

25 spin link 31.10.2022
25 spin 31-10-2022
25 spin 31-10-2022
25 spins 30.10.2022
25 spin link 30.10.2022

30 spin link 30.10.2022

25 spin 30.10.2022

25 spin 30.10.2022
25 spin 30.10.2022

35 spin 30.10.2022
25 spin 30.10.2022

50 spins 29.10.2022

25 spins 29.10.2022

Coin link 29.10.2022
25 spin link 29.10.2022

25 spin 29.10.2022
 30 spin link 29.10.2022

30 spins 29.10.2022
25 spin link 29-10-2022
25 spins link 28-10-2022
25 spin 28-10-2022
25 spin link 28-10-2022
25 spin link 28-10
25 spins 28-10-2022
25 spin 28-10-2022
25 spin 28.10.2022

25 spin 28.10.2022
25 spin link 27-10-2022
10 spin link 27-10-2022
25 spin 27.10.2022
25 spin link 27.10.2022
10 spin link 27.10.2022
25 spin link 26.10.2022
25 spin link 26-10-2022
25 spin link 26-10-2022
25 spin link 26-10-2022
25 spin link 26-10-2022
Coin link 26-10-2022
10 spin 26-10-2022
25 spin link 25-10-2022
25 spin 25-10-2022
25 spin link 25-10
25 spin link 25-10-2022
10 spin link 25-10-2022
25 spin link 25-10-2022
25 spin link 25-10-2022
25 spin link 25-10-2022
25 spin link 24.10.2022

25 spin link 24.10.2022
10 spin 24-10
25 spin link 24-10-2022
10 spin link 24-10-2022
Coin link 24-10-2022
25 spin link 24-10-2022
25 spin link 23-10-2022
25 spin link 23-10-2022
Coin link 23-10-2022
25 spins 23-10-2022
Coin link 23-10-202
25 spin link 23-10-2022
10 spin link 23-10-2022
25 spin link 22-10-2022
25 spin link 22-10-2022
25 spin link 22-10-2022
25 spin link 22-10-2022
10 spin link 22-10-2022
10 spin link 22-10-2022
25 spin link 22-10-2022
25 spin link 21-10-2022
25 spin 21-10-2022
25 spin link 21-10-2022
Coin link 21.10.2022
25 spins 21.10.2022

10 spin 21.10.2022

25 spin link 21.10.2022

CMS Identification


A CMS or Content Management System is an application that can be used to manage and organize text, movies, pictures, links and many other types of data. Functionality varies from CMS to CMS,
 but most are web based and offer some sort of access control. Many of the most popular websites in the world use free and publicly available CMS' like Wordpress, Joomla and Drupal.

What CMS' Can Be Detected

WhatCMS.org looks at a variety of factors within a webpage to determine what CMS a website is using, but it is admittedly not 100% accurate. We've included algorithms for detecting all of the major CMS, but if you feel like we're missing one or if our algorithm is working well, let us know and we'll do our best to improve.

Keep in mind a website may use multiple CMS'. Wordpress may be used as the primary CMS, while using vBulletin on a subdomain (forum.example.com) or subdirectory (example.com/forum). For this reason, you can enter any url in the form above to see what CMS is being used on a specific page.


How to identify which CMS is used on a website?

Below tools will help to identify which cms is used on site:

CMS Analyzer Effectiveness

W3Techs (w3techs.com/sites) 73%

BuiltWith (builtwith.com) 64%

Wappalyzer (firefox add-on) 36%

CMS Detector (detectcms.com) 27%

CMSeye (cms.targetinfolabs.com) 27%



1] W3Techs provides the most comprehensive information set on the technologies used, it was also the most effective tool in our test for identifying the CMS used. The tool can be reached via web page or used as a bookmarklet, a browser extension or a google subscribed link.


2] BuiltWith represents a really powerful tool that even in its free version shows a technology profile for given a website which includes information on:

• Server, CMS and framework used

• Analytics and tracking systems used

• Content delivery network, aggregation functionality and document information
It also provides a SEO profile with basic SEO items as Metadata, Page Keywords or Response Time. The overall SEO score is given as well (very similar system as WebsiteGrader).


3] Wappalyzer is a user-friendly browser add-on that uncovers the technologies used on websites. It detects CMS and e-commerce systems, message boards, JavaScript frameworks, hosting panels, analytics tools and more. It shows the results straight in the address bar or in the status bar.


4] CMS Detector works perfectly for revealing the webserver, framework or language used by a website. Unfortunately it lacks this power of identifying the CMS.


5] CMSeye is a simple tool focused only on identifying the CMS, it mostly works only for open source CMSs and sometimes it’s not accurate (even we don’t believe that the Ektron website does run on Wordpress).
 
 
BlindElephant

The BlindElephant Web Application Fingerprinter attempts to discover the version of a (known) web application by comparing static files at known locations against precomputed hashes for versions of those files in all all available releases. The technique is fast, low-bandwidth, non-invasive, generic, and highly automatable.

Scan the remote host (http://192.168.1.252/wp), specifying the web application in use (wordpress):

     root@kali:~# BlindElephant.py http://192.168.1.252/wp wordpress



Plecost
 
WordPress finger printer tool, plecost search and retrieve information about the plugins versions installed in WordPress systems. It can analyze a single URL or perform an analysis based on the results indexed by Google. Additionally displays CVE code associated with each plugin, if there. Plecost retrieves the information contained on Web sites supported by WordPress, and also allows a search on the results indexed by Google.

Use 100 plugins (-n 100), sleep for 10 seconds between probes (-s 10) but no more than 15 (-M 15) and use the plugin list (-i /usr/share/plecost/wp_plugin_list.txt) to scan the given URL (192.168.1.202/wordpress):

     root@kali:~# plecost -n 100 -s 10 -M 15 -i /usr/share/plecost/wp_plugin_list.txt 192.168.1.202/wordpress


WPScan
 

WPScan is a black box WordPress vulnerability scanner that can be used to scan remote WordPress installations to find security issues.

Scan a target WordPress URL and enumerate any plugins that are installed:

     root@kali:~# wpscan --url http://wordpress.local --enumerate p





Database Exploitation

 

These tools are used to pentest the database including finding vulnerability,exploiting the vulnerability to gather database.


bbqsql

BBQSQL is a SQL injection framework specifically designed to be hyper fast, database agnostic, easy to setup, and easy to modify. The tool is extremely effective at exploiting a particular type of SQL injection flaw known as blind/semi-blind SQL injection. When doing application security assessments we often uncover SQL vulnerabilities that are difficult to exploit.

While current tools have an enormous amount of capability, when you can’t seem to get them to work you are out of luck. We frequently end up writing custom scripts to help aid in the tricky data extraction, but a lot of time is invested in developing, testing and debugging these scripts.

BBQSQL helps automate the process of exploiting tricky blind SQL injection. We developed a very easy UI to help you setup all the requirements for your particular vulnerability and provide real time configuration checking to make sure your data looks right. On top of being easy to use, it was designed using the event driven concurrency provided by Python’s gevent. This allows BBQSQL to run much faster than existing single/multithreaded applications.
 

     root@kali:~# bbqsql



sqlninja


Fancy going from a SQL Injection on Microsoft SQL Server to a full GUI access on the DB? Take a few new SQL Injection tricks, add a couple of remote shots in the registry to disable Data Execution Prevention, mix with a little Perl that automatically generates a debug script, put all this in a shaker with a Metasploit wrapper, shake well and you have just one of the attack modules of sqlninja!

Sqlninja is a tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end.

Its main goal is to provide a remote access on the vulnerable DB server, even in a very hostile environment. It should be used by penetration testers to help and automate the process of taking over a DB Server when a SQL Injection vulnerability has been discovered.

Connect to the target in test mode (-m t) with the specified config file (-f /root/sqlninja.conf):

     root@kali:~# sqlninja -m t -f /root/sqlninja.conf



sqlsus

sqlsus is an open source MySQL injection and takeover tool, written in perl.

Via a command line interface, you can retrieve the database(s) structure, inject your own SQL queries (even complex ones), download files from the web server, crawl the website for writable directories, upload and control a backdoor, clone the database(s), and much more…

Whenever relevant, sqlsus will mimic a MySQL console output.

sqlsus focuses on speed and efficiency, optimising the available injection space, making the best use (I can think of) of MySQL functions.

It uses stacked subqueries and an powerful blind injection algorithm to maximise the data gathered per web server hit.

Using multithreading on top of that, sqlsus is an extremely fast database dumper, be it for inband or blind injection.

If the privileges are high enough, sqlsus will be a great help for uploading a backdoor through the injection point, and takeover the web server.

It uses SQLite as a backend, for an easier use of what has been dumped, and integrates a lot of usual features (see below) such as cookie support, socks/http proxying, https.

Generate a configuration file for the scan (-g sqlsus.cfg):
 

     root@kali:~# sqlsus -g sqlsus.cfg



IDS/IPS Identification


Used in computer security, intrusion detection refers to the process of monitoring computer and network activities and analyzing those events to look for signs of intrusion in your system. The point of looking for unauthorized intrusions is to alert IT professionals and system administrators within your organization to potential system or network security threats and weaknesses.

IDS — A Passive Security Solution


An intrusion detection system (IDS) is designed to monitor all inbound and outbound network activity and identify any suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. IDS is considered to be a passive-monitoring system, since the main function of an IDS product is to warn you of suspicious activity taking place − not prevent them. An IDS essentially reviews your network traffic and data and will identify probes, attacks, exploits and other vulnerabilities. IDSs can respond to the suspicious event in one of several ways, which includes displaying an alert, logging the event or even paging an administrator. In some cases the IDS may be prompted to reconfigure the network to reduce the effects of the suspicious intrusion.

An IDS specifically looks for suspicious activity and events that might be the result of a virus, worm or hacker. This is done by looking for known intrusion signatures or attack signatures that characterize different worms or viruses and by tracking general variances which differ from regular system activity. The IDS is able to provide notification of only known attacks.

The term IDS actually covers a large variety of products, for which all produce the end result of detecting intrusions. An IDS solution can come in the form of cheaper shareware or freely distributed open source programs, to a much more expensive and secure vendor software solution. Additionally, some IDSs consist of both software applications and hardware appliances and sensor devices which are installed at different points along your network.

IPS — An Active Security Solution


IPS or intrusion prevention system, is definitely the next level of security technology with its capability to provide security at all system levels from the operating system kernel to network data packets. It provides policies and rules for network traffic along with an IDS for alerting system or network administrators to suspicious traffic, but allows the administrator to provide the action upon being alerted. Where IDS informs of a potential attack, an IPS makes attempts to stop it. Another huge leap over IDS, is that IPS has the capability of being able to prevent known intrusion signatures, but also some unknown attacks due to its database of generic attack behaviors. Thought of as a combination of IDS and an application layer firewall for protection, IPS is generally considered to be the "next generation" of IDS.

Currently, there are two types of IPSs that are similar in nature to IDS. They consist of host-based intrusion prevention systems (HIPS) products and network-based intrusion prevention systems (NIPS).

200 spin links 10-11-2022 200 spin links 10-11-2022 Reviewed by Manoj Mohata on 00:22 Rating: 5

No comments:

Powered by Blogger.