Tuesday, 26 June 2018

sqlcake - Automatic SQL Injection Exploitation toolkit

What is sqlcake?
   sqlcake is an automatic SQL injection exploitation kit written in Ruby. It's designed for system administration and penetration testing.
   sqlcake offers a few useful functions to gather database information easily by SQL injection usage.

   sqlcake also allows you to bypass magic quotes, dump tables and columns and gives you the possibility to run an interactive MySQL shell.
   sqlcake supports union stacked queries for real fast processing and blind injections with logarithmic techniques for saving time.

Tested on:
 * Kali Linux 2018.1 and Parrot Security OS 4.0.1
 * Windows 10/8/7

Install and Run
1, Download and install Ruby Lang
2, Download and Extract sqlcake-v1.1.tar
3, Open Command Prompt (Windows) or Terminal (Linux) in the folder just extracted
4, Enter this command to view help menu:
      ruby sqlceke.rb --help

Screenshots
Automatic SQL Injection and Database Information Gathering tool
sqlcake tested on Parrot Security OS 4.0.1
Downloads sqlcake
Visit sqlcake's website

WebSploit - Advanced MITM Framework

WebSploit Is An Open Source Project For:
 * Social Engineering Works
 * Scan,Crawler & Analysis Web
 * Automatic Exploiter
 * Support Network Attacks
 * Autopwn – Used From Metasploit For Scan and Exploit Target Service
 * WMap – Scan, Crawler Target Used From Metasploit wmap plugin
 * Format infector – inject reverse & bind payload into file format
 * PHP My Admin Scanner
 * CloudFlare resolver
 * LFI Bypasser
 * Apache Users Scanner
 * Dir Bruter
 * Admin finder
 * MLITM Attack – Man Left In The Middle, XSS Phishing Attacks
 * MITM – Man In The Middle Attack
 * Java Applet Attack
 * MFOD Attack Vector
 * USB Infection Attack
 * ARP Dos Attack
 * Web Killer Attack
 * Fake Update Attack
 * Fake Access point Attack
 * Wifi Honeypot
 * Wifi Jammer
 * Wifi Dos
 * Bluetooth POD Attack

Source: SourceForge and Github

Author: Fardin Allahverdinazhand

License: GNU General Public License v3.0

Install and Run Websploit
   git clone https://github.com/websploit/websploit
   cd websploit
   python websploit

WebSploit Usage Example:

Find PHP Admin login site with modules web/pma on Websploit
Find PHP Admin login site with modules web/pma on Websploit

Download WebSploit

Monday, 25 June 2018

Creative Destruction Download Now For Android APK+Data v1.0.4

So Finally A new Fortnite Like Game Launched For Android On play store.

So I decided to give This Game APK+Data Highly Compressed In just 400mb

How to Download Creative Destruction Game For Android.
  1. So first Download APK And Data.
  2. After Downloading Extract Data in Obb Folder And Install the APK you all ready Downloaded.
  3. And enjoy The New battle Royal Game For Android.
Note. This Game Required A Working Internet Connection to play.


Download Links.
And Watch This Gameplay Video.



PROPER USAGE OF LABEL IN BLOGGER




YES WE ARE HERE AGAIN WITH FULL INFO/GUIDES ON HOW TO PROPERLY USE LABEL IN BLOGGER BLOG/SITES. CONTINUE READING THIS POST FOR FULL GUIDE/INFO ABOUT OUR MAIN TOPIC OF DISCUSSION, HOW TO PROPERLY USE LABEL IN BLOGGER.

A LOT OF BLOGGERS FAILS IN GETTING JUST WHAT THEY WANT WHILE RUNNING A SITE BUILD AND HOSTED ON BLOGGER PLATFORM BECAUSE OF SOME LITTLE MISTAKES THEY MAKE BUT STILL DON’T RECOGNIZE THEM. TODAY WE WILL GIVE YOU FREE FULL GUIDES/TIPS ON GETTING JUST WHAT YOU DESIRE FROM BLOGGER

IF YOU HAVE BEEN FOLLOWING MY PREVIOUS POST), I PUBLISHED A POST LAST WEEK ABOUT CHECKOUT: HOW TO CREATE CATEGORY ON BLOGGER USING LABEL. THE POST GAVE A FULL DETAILS ON HOW TO MAKE YOUR BLOG HAVE TOP CATEGORIES LIKE A WORDPRESS SITE, AND I ALSO MENTIONED ON THE POST THAT YOU MUST HAVE TO USE YOUR LABEL TAG FROM YOUR DASHBOARD WHILE WRITING A NEW POST FROM WWW.BLOGGER.COM OR ANY OTHER BLOGGER APK.






THE USE OF LABEL IN BLOGGER
LABEL IN BLOGGER IS AN ALTERNATIVE OF CATEGORY IN WORDPRESS SO TAKE NOTE. I CAN STILL NOTICE A LOT OF BLOGGERS USING THEIR LABEL TAG AS A MEANS OF RANKING HIGH IN GOOGLE SEARCH FOR SOME SEARCH KEYWORD (BUT I TELL YOU “IT’S NOT CORRECT) IT MAY HELP IN RANKING YOU HIGH ON SEO BUT I TELL YOU THIS, IT WILL DISTROY YOUR BLOG. ALWAYS REMEMBER, LABEL BLOGGER IS AN ALTERNATIVE OF CATEGORY IN WORDPRESS FORBLOGGER DOES NOT SUPPORT CATEGORY BUT AS YOU CAN SEE. WAVYEARNERS.BLOGSPOT.COM IS A DECENT FULL EXAMPLE OF CATEGORY ON BLOGGER.


PROPER USAGE OF LABEL IN BLOGGER







Sunday, 24 June 2018

U2F Zero - A Secure and Open Source U2F Token

About U2F Zero
   U2F Zero is an open source U2F token for 2 factor authentication. It is implemented securely. It works with Google accounts, Github, Duo, and anything else supporting U2F. The latest version uses key derivation and has no limit on registrations.

   You can easily build your own. You just need to order the 8 SMT parts, $1.13-$3.5 per PCB, and programmer. It ends up being $35 for programmer and ~$5/board. The token should be durable enough to survive on a key chain for years, even after going through the wash.

   Check out the wiki for more on how to build your own.

   Redesign / FIDO 2
      FIDO 2 protocol is replacing U2F. It has more flexibility and support for password-less login. A new open source FIDO 2 token is being planned (with support for USB, Bluetooth, and NFC). Discussion for hardware design and usage is happening here, feel free to chip in.

Security Overview
   The security level is about the same as a modern car key. Any secret information cannot be read or duplicated. A true random number generator is used to create unpredictable keys.

   However, side channel leakage is an unsolved problem in industry and academia. So for well equipped adversaries that can make targetted attacks and get physical access, secret information leakage is possible. Any other hardware token that claims it's "impenetrable" or otherwise totally secure is still vulnerable to physical side channels and it's important to acknowledge. However, most people don't worry about targeted attacks from well equipped adversaries.


   For more information about U2F Zero's secure implementation and the problem of side channels, check out the wiki.

Why it's Secure?
 Hardware Random Number Generator:
A TRNG is used on chip to ensure high entropy keys get generated during registration.
 * Write Only Keys: Keys are generated on an off chip peripheral and live in write only memory. Nothing can read them except the peripheral itself.
 * Tamper Resistance: Atmel secure chip includes temperature and voltage tampering sensors.
 * Open Source: Because the source is open, there is confidence there are no backdoors in the source code.

How to Support?: Support this project by purchasing or sharing U2F Zero on Amazon.

License: Everything is open source and licensed under the Simplified BSD License.

The images of the U2F Zero
U2F USB token optimized for physical security, affordability, and style
Put it on your key chain
Plug it in and press a button. No drivers needed
Wear it around your neck