Friday, April 28, 2017

Armitage - Fast and Easy Hacking Tool

Armitage is a scriptable red team collaboration tool for Metasploit that visualizes targets, recommends exploits, and exposes the advanced post-exploitation features in the framework.

Through one Metasploit instance, your team will:

  • Use the same sessions
  • Share hosts, captured data, and downloaded files
  • Communicate through a shared event log.
  • Run bots to automate red team tasks.







Armitage
is a force multiplier for red team operations.

Armitage represents each target as a computer with its IP address and other information about it below the computer. The computer screen shows the operating system the computer is running. Steps are given below:     
            
  1. A red computer with electrical jolts indicates a compromised host.
  2. A directional green line indicates a pivot from one host to another. Pivoting allows Metasploit to route attacks and scans through intermediate hosts. A bright green line indicates the pivot communication path is in use.
  3. Click a host to select it. You may select multiple hosts by clicking and dragging a box over the desired hosts.
  4. Right click a host to bring up a menu with available options. The attached menu will show attack and login options, menus for existing sessions, and options to edit the host information.
  5. The login menu is only available after a port scan reveals open ports that Metasploit can use. The Attack menu is only available after finding attacks through the Attacks menu at the top of Armitage. Shell and Meterpreter menus show up when a shell or Meterpreter session exists on the selected host.

Several keyboard shortcuts are available in the targets panel. To edit these, go to Armitage -> Preferences.
  • Ctrl Plus - zoom in
  • Ctrl Minus - zoom out
  • Ctrl 0 - reset the zoom level
  • Ctrl A - select all hosts
  • Escape - clear selection
  • Ctrl C - arrange hosts into a circle
  • Ctrl S - arrange hosts into a stack
  • Ctrl H - arrange hosts into a hierarchy. This only works when a pivot is set up.
  • Ctrl P - export hosts into an image

Right click the targets area with no selected hosts to configure the layout and zoom-level of the targets area.

Download Armitage 

Instruction

For installation process contact me at email: cdcsit400[at]gmail[dot]com

Wednesday, April 26, 2017

Easy Film Maker Tool: Filmora Video Editor 6.0.3

Filmora is an all-in-one home video editor that has powerful functionality and a fully stacked feature set. Filmora is a solid app that gives you the features and styles that have been previously only available to professional film makers that have a certain level of experience and the expensive applications to match.

Filmora has a simple drag and drop interface, which gives you the freedom to be artistic with the story that you want to create.

Key features:

  • Text and titles: support for animated text.
  • Music library: support for adding your music tracks.
  • Overlays and filters: specifically designed filters and overlays to give your a professional finish.
  • Elements: Still and motion graphic support.
  • Unique visual effects: you can incorporate over 100 visual effects.
  • Speed control: Slow motion and time lapse support.

Overall, Filmora is a great app that has powerful features coupled with an easy to operate user interface. The design is fresh, modern and is a joy to use. If you recognize the framework and setup of Filmora it is because it is from the developers who brought you Wondershare Video Editor.

Please note, in the trial version of the app, the functionally is the same as the paid version except there is a watermark in your output files.

Download

filmora_setup_full846.exe

Instruction

For installation process contact me at email: cdcsit400[at]gmail[dot]com

Tuesday, April 25, 2017

Exciting Hacking Tool: Havij 1.15 Advanced SQL Injection

Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page.

It can take advantage of a vulnerable web application. By using this software user can perform back-end database fingerprint, retrieve DBMS users and password hashes, dump tables and columns, fetching data from the database, running SQL statements and even accessing the underlying file system and executing commands on the operating system.

The power of Havij that makes it different from similar tools is its injection methods. The success rate is more than 95% at injecting vulnerable targets using Havij.

The user friendly GUI (Graphical User Interface) of Havij and automated settings and detections makes it easy to use for everyone even amateur users.

Download Free Havij 1.15 Advanced SQL Injection Tool



New Features

  •    HTTPS support
  •     Add MSSQL Blind
  •     MSAccess more Blind (commercial version only)
  •     PostgreSQL added (only commercial version)
  •     Check for more updates.
  •     User manual query with additional results. (Only the commercial version)
  •     First line on the first request (all in one request), plus (commercial version only)
  •     Dumping the data to a file is added (only commercial version)
  •     Data stored in XML format added (only commercial version)
  •     Inject the target with an increase in port (the default http port is 80) (only commercial               version)
  •     XSS bug in saved reports fixed.
  •     Remove log added.
  •     Apply button is added to the set makes it possible to change the settings at any time (only         commercial version)         
  •     Keyword testing and repair methods are added.
  •     Find a sequence of computed columns and optimized for better injection and database to           detect.
  •     Find the number of columns and column wires for the better.
  •     “414 Request URI too long” error fixed.
  •     New method to get the table and column in MSSQL further.
  •     An in MSAccess injection when syntax errors are fixed manually defined.
  •     Active XP_Exec add cmdshell (only commercial version)
  •     Active OS_Ex add cmdshell (only commercial version)
  •     Remote desktop-Enable added to cmdshell (only commercial version)
  •     Confusing MySQL, MSSQL 2005, when they found that the number of         fixed columns.
  •     Broken MD5-cracker site removed.
  •     Bug in MSSQL error detection is not fixed.
  •     An error in the error column MSSQL is not fixed.
  •     Bug in injecting into access database fixed.
  •     Bug fixed in the data in MSSQL.
  •     Find an error in mssql fixed.
  •     Bug in detecting database type when the number of fixed columns.
  •     Bug in MSSQL error syntactic fixed and executation manually.

Download Free Havij 1.15 Advanced SQL Injection Tool

Instruction

For installation process contact me at email: cdcsit400[at]gmail[dot]com