This commit is contained in:
bt3gl 2014-11-19 14:46:14 -05:00
parent 7091a95fdc
commit f4b8b9ad43
9 changed files with 85 additions and 27 deletions

View File

@ -4,6 +4,7 @@
## MD5
- The MD5 hashing algorithm always returns 128 bit values, so the chance that two randomly chosen objects have the same hash is 1:2**128.
### Scripts
@ -32,6 +33,7 @@ $ echo -n password | md5sum
## SHA
- SHA-1 has output size of 160 bits, so chances of collisions are 2**160.
### Scripts
- SHA-256 brute force

View File

@ -1,3 +1,49 @@
# Tools
### Keyloggers
* Rin Logger
---
# Vulnerabilities Glossary
* LD_PRELOAD: hijacking functions to a shared library: you can set this enviroment variable direct to the linker to load a library of your choice.
### Common Vulnerabilities:
* Authentication: to not require authentication in a situation that warrants it; information isn't trustworthy (authentication in the client side).
* Authorization: there are several formal designs for access control: discretionary access control, mandatory access control, role-based access control. Vulnerabilities: missing authorization (webpages).
* Accountability: expectation that a system can identify and log users' activities. Vulnerabilities: system's failure to log operations in sensitive data; system doesn't protect its data.
* Confidentiality: expectation that only authorized parties can view data. Vulnerabilities: failure/lack in encryption, homemade encryption, storing sensitive data unnecessarily.
* Integrity: the expectation that only authorized parties are able to modify the data. Vulnerabilities: failure in access control, failure in confidentiality, bail-and-switch attack.
* Availability: capability to use a resource when expected. Vulnerability: DoS.
---
# Exploits and Attacks Glossary
* Denial of Service (DoS): occurs when an attacker can make a system unavailable by performing some unanticipated action.
* Attack surface: the collection of all entry points that provide access to an asset. Operational vulnerabilities occur when the attack surface is exposed unnecessarily. Minimizing the attack surface is referred to *host hardening*.
---
# Overall Protective Measures:
### Development Measures

View File

@ -1,5 +0,0 @@
# Exploits and Attacks Glossary
* Denial of Service (DoS): occurs when an attacker can make a system unavailable by performing some unanticipated action.
* Attack surface: the collection of all entry points that provide access to an asset. Operational vulnerabilities occur when the attack surface is exposed unnecessarily. Minimizing the attack surface is referred to *host hardening*.

View File

@ -1,22 +0,0 @@
## Vulnerabilities Glossary
* LD_PRELOAD: hijacking functions to a shared library: you can set this enviroment variable direct to the linker to load a library of your choice.
### Common Vulnerabilities:
* Authentication: to not require authentication in a situation that warrants it; information isn't trustworthy (authentication in the client side).
* Authorization: there are several formal designs for access control: discretionary access control, mandatory access control, role-based access control. Vulnerabilities: missing authorization (webpages).
* Accountability: expectation that a system can identify and log users' activities. Vulnerabilities: system's failure to log operations in sensitive data; system doesn't protect its data.
* Confidentiality: expectation that only authorized parties can view data. Vulnerabilities: failure/lack in encryption, homemade encryption, storing sensitive data unnecessarily.
* Integrity: the expectation that only authorized parties are able to modify the data. Vulnerabilities: failure in access control, failure in confidentiality, bail-and-switch attack.
* Availability: capability to use a resource when expected. Vulnerability: DoS.

View File

Before

Width:  |  Height:  |  Size: 58 B

After

Width:  |  Height:  |  Size: 58 B

View File

@ -0,0 +1,37 @@
## [Nikto](http://sectools.org/tool/nikto/)
* Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1200 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software.
* Most scanned vulnerabilities are things such as XSS, phpmyadmin logins,
etc.
* It's coded in Perl.
* It is not a stealthy tool. It will test a web server in the quickest time possible, and it is obvious in log files.
* There is support for LibWhisker's anti-IDS methods.
* To fire it up in a website:
```
$ ./nikto.pl -h <IP> -p <PORT> -output <OUTPUT-FILE>
```
* The output file can be open with *Niktorat*.
## [W3af](http://w3af.org/)
* w3af is a Web Application Attack and Audit Framework. The projects goal is to create a framework to help you secure your web applications by finding and exploiting all web application vulnerabilities.
* It's coded in Python.
* It has plugins that communicate with each other.
* It removes some of the headaches involved in manual web application testing through its Fuzzy and manual request generator feature.
* It can be configured to run as a MITM proxy. The requests intercepted can be sent to the request generator and then manual web application testing can be perfomerd using variables parameters.
* It also has features to exploit the vulnerabilities that it finds. w3af supports detection of both simple and blind OS commanding vulnerability.