// ----------------------------------------------------------------------------------------------// // ----------------------------------------------------------------------------------------------//
RSS

Edb-Id-46989: Centos 7.6 - 'Ptrace_Scope' Privilege Escalation Exploit

About EDB-ID-46989: CentOS 7.6 - 'ptrace_scope' Privilege Escalation
EDB-ID-46989 Description: Exploiting Linux platform inwards category local exploits.


From Exploit Database as well as Vulners

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Edb-Id-47187: Wordpress Database Backup (5.2 Too Lower) Ascendance Injection Vulnerability Too Remote Code Execution (Metasploit)

About EDB-ID-47187: Wordpress Database Backup Command Injection Vulnerability (version 5.2 in addition to lower)
EDB-ID-47187 Description
   There exists a ascendency injection vulnerability inwards the Wordpress plugin wp-database-backup for versions < 5.2.
   For the backup functionality, the plugin generates a mysqldump command to execute.
   The user tin pick out specific tables to exclude from the backup by setting the wp_db_exclude_table parameter inwards a POST asking to the wp-database-backup page.
   The names of the excluded tables are included inwards the mysqldump ascendency unsanitized.
   Arbitrary commands injected through the wp_db_exclude_table parameter are executed each fourth dimension the functionality for creating a novel database backup are run.
   Authentication is required to successfully exploit this vulnerability.

   You tin read to a greater extent than close this vulnerability inwards here: OS Command Injection Vulnerability Patched In WP Database Backup Plugin

EDB-ID-47187 Remote Code Execution (Metasploit Module)

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

How To Scan Vulnerabilities Amongst Nmap Nse?

Nmap is a really pop too powerful network-scanning tool. Used yesteryear all the hackers, script kiddies, pentesters, safety researchers... on this world. Nmap is compatible amongst Windows, BSD, Mac OS X, Linux.
Nmap open-source too free, yous tin shipping away download it here: Download the Free Nmap Security Scanner for Linux/Mac/Windows.
Nmap also has Nmap Scripting Engine (NSE), yous tin shipping away read the description nearly it:
The Nmap Scripting Engine (NSE) is 1 of Nmap's most powerful too flexible features. It allows users to write (and share) unproblematic scripts to automate a broad diverseness of networking tasks. Those scripts are too thence executed inwards parallel amongst the speed too efficiency yous await from Nmap. Users tin shipping away rely on the growing too various develop of scripts distributed amongst Nmap, or write their ain to run across custom needs.

Nmap Scripting Engine (NSE) is expression similar the Metasploit Framework module. Then users tin shipping away extend Nmap capabilities, depending on their needs, such equally perform a DoS attack, assemble passwords too usernames, assemble information... too fifty-fifty scan vulnerabilities amongst Nmap using
Nmap Scripting Engine (NSE).

So inwards this post, I volition demo yous how to scan too abide by vulnerabilities amongst Nmap NSE.

First, to install tools on this post, yous must install Nmap first:
  • For Debian too its distros: sudo apt install nmap
  • For Arch Linux too its distros: sudo pacman -S nmap
  • For Clear Linux OS: sudo swupd bundle-add nmap
Scan vulnerabilities amongst vulscan
   vulscan is a Nmap's module which enhances Nmap to a vulnerability scanner. The nmap selection -sV enables version detection per service which is used to create upwards one's heed potential flaws according to the identified product. The information is looked upwards inwards an offline version of VulDB.


   To install vulscan for Nmap, motion into these commands:
cd /usr/share/nmap/scripts
sudo git clone https://github.com/scipag/vulscan


Install vulscan too nmap-vulners

   Now, example, i'm going to scan vulnerabilities on a random website on Internet. To create that, purpose this command:
nmap -sV --script vulscan/vulscan.nse [target's address]


All the vulnerabilities on target are listed yesteryear vulscan

   And similar yous see, vulscan has listed all the vulnerabilities on every unmarried port of target. 

   Now, I'm going to endeavour an roughly other instance - scan vulnerabilities on an port of target. I chosen port 3306. To scan it, purpose this command:
nmap -sV --script vulscan/vulscan.nse -p [port] [target's address]

All the vulnerabilities on the port of target are listed yesteryear vulscan

   And similar yous see, vulscan has listed all the vulnerabilities again. But exclusively amongst the port I chosen. 

   You tin shipping away read to a greater extent than nearly vulscan here.

Scan vulnerabilities amongst nmap-vulners
   nmap-vulners is a NSE script using vulnerabilities database from Vulners.com to abide by vulnerabilities on target.


   To install nmap-vulners for Nmap, motion into these commands:
cd /usr/share/nmap/scripts
wget https://raw.githubusercontent.com/vulnersCom/nmap-vulners/master/vulners.nse

 
   And then, to scan vulnerabilities on a random website on Internet (still that target). To create that, purpose this command:
nmap -sV --script vulners.nse [target's address]

All the vulnerabilities on target are listed yesteryear nmap-vulners

   And similar yous see, nmap-vulners has listed all the vulnerabilities on every unmarried port of target.

    For an roughly other example, I chosen a port (still that port of target). To scan it, purpose this command:
nmap -sV --script vulners.nse -p [port] [target's address]

All the vulnerabilities on the port of target are listed yesteryear nmap-vulners

    And similar yous see, nmap-vulners has listed all the vulnerabilities again. But exclusively amongst the port I chosen. 

   You tin shipping away read to a greater extent than nearly nmap-vulners here.

And if yous desire to scan vulnerabilities amongst both vulscan too nmap-vulners, purpose this command:
nmap -sV --script vulners.nse,vulscan/vulscan.nse [target's address]


All the vulnerabilities on the port of target are listed yesteryear vulscan too nmap-vulners

And finally, convey fun amongst hacking 😉

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Spykeyboard: An Undetectable Python Keylogger Which Sends The Captured Keys To Your Gmail

About Spykeyboard
   Spykeyboard is a Python ii script which allows us to generate an undetectable keylogger which sends the captured keys to our Gmail draw of piece of job concern human relationship address. Once nosotros generated our keylogger, nosotros would accept to leave of absence the .py file to a Windows machine to convert it to an .exe. The tool is inwards development.
 
Spykeyboard Installation in addition to Running
   For Windows users, you lot must inwards install Python 2 first, only you lot don't accept to install Git if you lot want:

  • First, download in addition to piece of job Python 2.7.x setup file from Python.org. On Install Python 2.7.x Setup, pick out Add python.exe to Path. 
  • Download in addition to piece of job Git setup file from Git-scm.com in addition to enable Use Git from Windows Command Propmt.
   For Linux users, Python ii is already installed on your GNU/Linux distro.
 
   Then, opened upwards Terminal in addition to motion into these ascendence to download Spykeyboard, install requirements, generate in addition to convert .py keylogger file to .exe file to piece of job inwards Windows.
Spykeyboard screenshots
Enter your Gmail address in addition to password to generate keylogger
Compile .py keylogger file to .exe file

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Bluekeep: A Proof Of Concept Tool For Cve-2019-0708 Called Bluekeep


About Bluekeep PoC Tool
   This tool contains enquiry concerning CVE-2019-0708.
   Bluekeep or CVE-2019-0708 is an RCE exploit that effects the next versions of Windows systems:

  • Windows 2003 
  • Windows XP 
  • Windows Vista 
  • Windows 7 
  • Windows Server 2008 
  • Windows Server 2008 R2
   The vulnerability occurs during pre-authorization too has the potential to run arbitrary malicious code inward the NT Authority\system user safety context.

How CVE-2019-0708 "Bluekeep" works
   By sending a especially crafted packet an assaulter is able to laid upwardly the value for the Channel ID to something the RDP service isn't expecting, this causes a retention corruption põrnikas that volition practice the weather condition for Remote Code Execution to occur. Should the attacker select to follow upwardly amongst packets designed to receive got payoff of this flaw remote code execution tin sack locomote achieved amongst System user privileges.

BlueKeep Installation too Using
   To purpose BlueKeep PoC, purpose this command:
python2 bluekeep_poc.py -i [target]

   And then, to perform a DoS assault through Bluekeep vulnerability, purpose this command:
python2 bluekeep_weaponized_dos.py -i [target] -v

Credits of BlueKeep PoC:
   Research yesteryear Ekultek too (VectorSEC)/NullArray.
   Development & Testing yesteryear Ekultek.

   Follow they on Twitter:

In Closing: You tin sack run across or therefore of they research, along amongst a listing of potentially vulnerable targets nether the enquiry directory. They started amongst real niggling too decided that nosotros weren't going to halt until nosotros had a working exploit.
Ekultek has been able to execute commands on Windows XP amongst this PoC personally.

Note: There are no payloads. This is merely a PoC. HOWEVER it is easily ported to an exploit since you lot tin sack easily add together payloads to this.


  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Netset: An Operational Safety Utility Together With Automation Tool

About NetSet
  
NetSet is an Operational Security utility as well as automator (Version 1.1.0).
   NetSet is designed to automate a number of operations that volition attention the user amongst securing their network traffic. It also provides an slow way to get together proxies as well as run utilities through TOR.

   All the utilities installed as well as used past times NetSet volition survive automatically configured every bit well. Of class the tool itself isn't the survive all of Operational Security. Rather it is a convenient way of getting yourself laid amongst the basics.

   NetSet facilitates, amidst other things;

   Influenza A virus subtype H5N1 final multiplexer on demand, that has it's sessions routed through Tor. Secured DNS traffic through automatic installation as well as configuration of DNSCrypt-proxy. Tor Wall functionality that forces all traffic through the Tor Network. Easy access to online OPSEC resources, the spider web resources inward query tin sack survive opened in-script

   And more.


NetSet's screenshots

NetSet Installer

NetSet Menu
NetSet Installation
NetSet Options
Update of NetSet
   From straight off on NetSet volition install veracrypt as well as pwgen as well as render automated operations related to those utilities on top of all the features Version 1.0.0 provides.

   Using sudo to get-go the script volition execute every functioning inside the script every bit root, this way you lot won't survive prompted for your sudo password when an functioning requires elevated privileges. However all items written past times NetSet volition consequently survive owned past times root every bit well, including backup directories. Last only non least; when considering safety implications, it is non recommended to run everything amongst super user privileges.

   Starting the primary script amongst sudo volition survive optional from straight off on to reverberate the to a higher house considerations.


Note of NetSet
   NetSet was tested on Ubuntu 19.04.
   NullArray plans on expanding this tool inward the futurity amongst fifty-fifty to a greater extent than OPSEC related resources and/or operations.
   Should you lot plough over off to come upwards across a põrnikas or convey whatever questions regarding this tool. Please experience costless to Open a Ticket.
   Thank you.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Kali Linux 2019.3 Liberate - What's New?

Since the offset unloosen inwards 2013 alongside 1.0.0, Kali Linux has updated 24 dissimilar versions (in this time) alongside many upgrades together with põrnikas fixes. You tin displace read Kali Linux Release History below:
 * Kali Linux 2019.1 – 18th February, 2019 – The First 2019 Kali Rolling release. Read details here.
 * Kali Linux 2018.4 – 29th October, 2018 – The Fourth 2018 Kali Rolling release. Read details here.
 * Kali Linux 2018.3 – 27th August, 2018 – The Third 2018 Kali Rolling release. Read details here.
 * Kali Linux 2018.2 – 30th April, 2018 – The Second 2018 Kali Rolling release. Read details here.
 * Kali Linux 2018.1 – sixth February, 2018 – The offset 2018 Kali Rolling release. Read details here.
 * Kali Linux 2017.3 – 21st November, 2017 – The 3rd 2017 Kali Rolling release. Read details here.
 * Kali Linux 2017.2 – 20th September, 2017 – The minute 2017 Kali Rolling release. Read details here.
 * Kali Linux 2017.1 – 25th April, 2017 – The offset 2017 Kali Rolling release. Read details here.
 * Kali Linux 2016.2 – 31st August, 2016 – The minute Kali Rolling release. Read details here.
 * Kali Linux 2016.1 – 21st January, 2016 – The offset Kali Rolling release. Read details here.
 * Kali Linux 2.0 – 11th August, 2015 – Read details here.
 * Kali Linux 1.1.0a – 13th March, 2015.
 * Kali Linux 1.1.0 – ninth Febuary, 2015 – Read details here.
 * Kali Linux 1.0.9a – sixth October, 2014 – Read details here.
 * Kali Linux 1.0.9 – 25th August, 2014 – Read details here.
 * Kali Linux 1.0.8 – 22nd July, 2014 – Read details here.
 * Kali Linux 1.0.7 – 27th May, 2014 – Read details here.
 * Kali Linux 1.0.6 – ninth January, 2014 – Read details here.
 * Kali Linux 1.0.5 – fifth September, 2013.
 * Kali Linux 1.0.4 – 25th July, 2013.
 * Kali Linux 1.0.3 – 26th April, 2013.
 * Kali Linux 1.0.2 – 27th March, 2013.
 * Kali Linux 1.0.1 – 14th March, 2013.
 * Kali Linux 1.0.0 – 13th March, 2013.

And now, Offensive Security ispleased to denote that our 3rd unloosen of 2019, Kali Linux 2019.3, is available directly for download. This unloosen brings our gist upward to version 5.2.9, together with includes diverse novel features across the board alongside NetHunter, ARM together with packages (plus the normal bugs fixes together with updates).​ So what's novel inwards Kali Linux 2019.1?


Tool Updates & New Packages
   As always, nosotros stimulate got our updates for all our tools, including (but non express to):​
   ​There is a novel tool (and it is included past times default), amass, that has been good received inwards the põrnikas bounty world.

CloudFlare Content Delivery Network (CDN)
   Kali Linux is Open Source, together with Cloudflare hearts Open Source – thence it’s a perfect match! As a result, CloudFlare has graciously allowed us to utilisation their content delivery network (CDN) to mirror our repository, allowing us to at nowadays distribute our content through them. H5N1 to a greater extent than technical breakdown tin displace hold out constitute on their blog.

   We are currently running the CloudFlare services side past times side alongside our touchstone together with community mirrors.​

   If y'all notice the kali.download domain appearing on hide when y'all run apt update, this agency you’re using CloudFlare’s services.​

Kali System together with Network status

   We at nowadays stimulate got Kali System Status page. This provides an overview of all populace facing domains together with allows y'all to depository fiscal establishment check if they are responding correctly. We stimulate got included all the sites nosotros control, every bit good every bit the community mirrors for the repositories, allowing y'all to regard everything y'all could perchance utilisation (even if y'all are unaware)!​

   Note: Our charge balancer on http.kali.org should automatically respect when a mirror is non responding together with redirect y'all to 1 that is. As such, apt should ever piece of job (even if tedious at times).​

Kali Linux Metapackages

   We already announced the changes to metapackages inwards a previous spider web log post, together with the Kali Linux tool listing page goes into to a greater extent than especial on it. However, to recap, the default toolset going forrad has changed. To assist alongside this transition, for this unloosen entirely (Kali 2019.3), in that location is a one-off, extra icon called kali-linux-large-2019.3-amd64.iso, that contains all previous default tools.​

   Going forward, during our unloosen cycle, nosotros volition hold out evaluating which tools belong to each group:​

  • kali-linux-default – tools nosotros believe are essential to a penetration tester
  • kali-linux-large – for penetration testers who stimulate got a wider laid of non standard/common situations
  • kali-linux-everything – for those who desire it all (and without Internet access during the assessment)
​   With the switchover to GitLab (read to a greater extent than here), nosotros volition presently start accepting community packet submissions. This agency that anyone tin displace direct submit improvements to us–anything from tike fixes together with patches to consummate tool packages is encouraged. We’re currently working through the documentation on how to create a package, making it easier for folks to instruct started together with assist out. More details to come upward afterwards this year.

   We also noticed some packages failed to construct on sure enough ARM architectures, which has at nowadays been fixed (allowing for to a greater extent than tools to hold out used on dissimilar platforms!).

Helper Scripts
   There’s a broad make of tools inwards Kali Linux. Some tools are designed to hold out used on Linux, some are designed for Windows (and nosotros tin displace nevertheless utilisation them alongside WINE), together with some are static resources. During our recent metapackage refresh, nosotros took the fourth dimension to create a few “helper scripts”.

   You may stimulate got installed a package, gone ahead together with typed inwards the packet shout out to run it, together with the reply dorsum was command non found. Not whatsoever more!

   We understood it may non stimulate got been obvious how to utilisation them straight away. As a result, all of our static resources should at nowadays hold out slow to find. Just type inwards the packet shout out (Such every bit PayloadsAllTheThings, SecLists, WebShells together with Wordlists to a shout out a few), you’ll regard a brief description, a directory listing, together with and thence hold out moved to the folder.​
   When it comes to Windows binaries (Such every bit hyperion, mimikatz, together with windows-privesc-check), depending on their functionality, it volition at nowadays either start upward WINE or, similar above, hotlink y'all to the location.​
   On the dependent area of tool type, nosotros stimulate got altered the location of packages related to Windows (which eagle oculus readers may stimulate got spotted inwards the event above). These types of tools are at nowadays located inwards /usr/share/windows-resources/. For example, our windows binaries used to hold out inwards /usr/share/windows-binaries/, instead, they are inwards /usr/share/windows-resources/binaries/.

   We stimulate got done this to instruct inwards easier to discovery what resources tin displace hold out transferred over to a Windows platform together with executed direct there. Using this novel location every bit a root path (example: http python3 -m http.server, or samba impacket-smbserver toolz.), y'all tin displace speedily portion everything to the target/victim machine).

For GNOME Users
   If y'all utilisation the default Kali image, it is (currently) using GNOME for the desktop environment. If y'all used the command business for a catamenia of time, chances are y'all noticed it was refreshing the repositories inwards the background. This has at nowadays been disabled.

ARM Update
   For ARM devices this release, nosotros stimulate got added back upward for the PINEBOOK every bit good every bit the Gateworks Ventana machines.

   The RaspberryPi gist has been bumped to version 4.19.66, which includes back upward for all of the RAM on 64-bit versions of the RaspberryPi 4. The RaspberryPi Zero due west has seen improvements every bit well.

   Bluetooth firmware that was accidentally dropped has been added dorsum in, together with the rc.local file has been fixed to properly halt dmesg spam from showing upward on the offset console.

   All of the RaspberryPi images stimulate got had their /boot segmentation increased, which is required due to the size of the novel gist packages.

   The ODROID-C2 has been bumped to the 3.16.72 for its kernel.

   All images at nowadays run dpkg-reconfigure xfonts-base on their offset kicking – this volition drive a fleck of a tedious downwardly for the offset boot, but the number is that if y'all utilisation VNC to whatsoever of them, they volition no longer exhibit a blank screen.

   On the WSL front, nosotros stimulate got added WSL ARM64 support, which y'all tin displace discovery inwards the Windows store today.​

Official Kali Linux LXD Container Image Released
   LXD is a side past times side generation organisation container manager. It offers a user sense similar to virtual machines but using Linux containers instead.

   It is icon based alongside pre-made images available for a broad number of Linux distributions together with nosotros are excited to denote that Kali Linux is at nowadays 1 of them. We are working on the documentation but would similar to portion the fantabulous article from Simos Xenitellis inwards which he details how to install together with run Kismet inwards a LXD Kali container.​

Setup Notes
   A duet of notes when installing Kali. If y'all direct to install Kali inwards a VM (rather than downloading our pre-made image), during the setup process, it should at nowadays respect if its running inwards VMware or VirtualBox together with install the necessary packages to plough over y'all the best sense possible. However, if y'all stimulate got upgraded Kali rather than doing a fresh install, together with never got to a greater extent than or less to installing these packages, the procedure has been automated past times only running kali-setup. This plan volition stimulate got to a greater extent than functionally at a afterwards date.​

   If y'all utilisation Kali inwards a VirtualBox, delight ensure y'all allocate 32 MB or to a greater extent than video retentivity to the VM, otherwise y'all may at nowadays come across some “interesting” issues where the hide is frozen after login through the graphical greeter, every bit if the estimator had crashed, except that it’s working (you could confirm it past times switching to some other virtual terminal). If y'all are affected past times this problem, y'all mightiness regard the next message from the kernel: [drm] Error -12 pinnning novel fb, out of video mem?.​

How to upgrade to Kali Linux 2019.3?
   Open your Kali Linux Terminal together with instruct inwards this command:
apt update && apt full-upgrade


  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Ehtools Framework: A Framework Of Serious Penetration Tools In Addition To Wi-Fi Pentesting


About EHTools Framework
   Wi-Fi tools give-up the ghost along getting to a greater extent than in addition to to a greater extent than accessible to beginners, in addition to the EHTools Framework is a framework of serious penetration tools that tin travel explored easily from inside it. This powerful in addition to uncomplicated tool tin travel used for everything from installing novel add-ons to grabbing a WPA handshake inward a affair of seconds. Plus, it's tardily to install, laid up, in addition to utilize.

Why choice EHTools Framework?

   Lots of pentesting tools installed past times default: More than 58 options installed past times default you can abide by inward EHTools Framework such every bit Metasploit FrameworkWireShark in addition to other tools!

   Password protection in addition to config encryption: In version 2.1.6 the authors added pasword protection for users who think that his/her friend or parents volition plough into EHTools Framework in addition to volition take or destroy it. Only for this people the authors create password protection for EHTools Framework 🙂


   Easy inward learning in addition to this is the best framework for beginners: EHTools Framework's TUI is really uncomplicated for beginners, you tin start laid on on the local network past times choosing an option from principal menu. It is really simple, is non it?


   UX/UI impruvements for beginners: It uses the names you lot render to connect to the tools needed to execute whatever attacks you lot select! Aside from that initial input, the bulk of the possible attacks tin travel performed merely past times choosing the choice number from the menu. This agency you lot can grab a network handshake or download a novel hacking tool similar Pupy past times just selecting from i of the bill of fare options!


   More than 100 tools you lot tin install from EHTools Framework or Lite: Our framework has to a greater extent than than 100 packages in EHTools Framework archive (on server this archive: 2.3 TB)!


System requirements for EHTools Framework

   Full root access in addition to access to /root folder: All EHTools Framework files in addition to folders volition re-create to /root/bin in addition to /etc organization folders, for re-create ehtools information to your organization needed root access!

   Bourne-again compaction in addition to Gnome-terminal shell needed for EHTools Framework GUI in addition to also without Gnome-terminall shell modules such every bit (eht1, eht2 in addition to etc.) volition non work!


   Good mesh connexion for server back upwardly (only EHTools Framework Pro): The server back upwardly for ehtools PRO is i of system requirements, it is needed for collect information about EHTools Framework crashes in addition to it is also needed for cheque product status such every bit (you bought ehtools/you did non purchase ehtools)


EHTools Framework Installation

   To uninstall EHTools Framework, travel into this command: ehtools -r

How to activate EHTools Framework Pro
   This telephone substitution you lot tin purchase on the EHTools website for i dollar! This telephone substitution is used to activate EHTools Framework PRO travel into it inward the input champaign of the activation telephone substitution inward the file install.sh in addition to and thence you lot tin install EHTools Framework in addition to usage it exclusively for educational purposes!

   WARNING: The telephone substitution plant exclusively i calendar week in addition to thence it changes!

You demand to receive got fourth dimension to travel into it earlier it is updated!

Enter your ehtools activation key!
You tin purchase it on the ehtools site!
(activation_key)>

   Also, the the authors exercise non recommend to alter the source code of ehtools because it is really complex in addition to you lot tin mess upwardly something in addition to disrupt the framework!


Selecting version of EHTools Framework

   After executing install.sh it volition travel inquire you to pick out version of EHTools Framework: Pro or Lite.
   Select Lite if you lot did non purchase EHTools Framework Pro. If you lot bought Ehtools Framework pro license telephone substitution from EHTools website, pick out Pro.

What version of Ehtools Framework exercise you lot desire to install?(pro/lite):
If you lot did non purchase Ehtools Framework PRO, pick out LITE!
If you lot bought Ehtools Framework PRO, pick out PRO
(version)>


   If you lot pick out EHTools Framework Pro, you lot volition demand to activate it amongst your EHTools Framework Activation Key that you lot demand to bought on the EHTools website. If you lot have EHTools Framework Activation Key, read the next instructions.


Attacking Frameworks

   Most novel Wi-Fi hacking tools rely on many of the same underlying attacks, in addition to scripts that automate using other to a greater extent than familiar tools similar Aireplay-ng are oft referred to every bit frameworks. These frameworks endeavour to organize tools inward smart or useful ways to receive got them a pace beyond the functionality or usability of the master program.

   An splendid representative of this are programs that integrate scanning tools similar Airodump-ng, attacks similar WPS Pixie-Dust, in addition to keen tools similar Aircrack-ng to create an easy-to-follow laid on chain for beginners. Doing this makes the procedure of using these tools easier to think in addition to tin travel seen every bit form of a guided tour. While each of these attacks is possible without the hand-holding, the final result tin travel faster or to a greater extent than convenient than trying to exercise thence yourself.


   An representative of this the authors receive got covered is the Airgeddon, a wireless laid on framework that does useful things similar automating the target selection procedure in addition to eliminating the fourth dimension a user spends copying in addition to pasting information betwixt programs. This saves valuable fourth dimension for fifty-fifty experienced pentesters but has the disadvantage of preventing beginners from agreement what's happening "under the hood" of the attack. While this is true, most of these frameworks are fast, efficient, in addition to dead uncomplicated to use, enabling fifty-fifty beginners to receive got on in addition to disable an entire network.


UX/UI impruvements for beginners

   The EHTools Framework starts past times only typing the missive of the alphabet ehtools or eht into a concluding window, in addition to thence it asks for the refer of your network interfaces later the starting fourth dimension run. It uses the names you lot render to connect to the tools needed to execute whatever attacks you lot select. Aside from that initial input, the bulk of the possible attacks tin travel performed only past times choosing the choice number from the menu. This agency you lot tin catch a network handshake or download a novel hacking tool similar Pupy past times exactly selecting from i of the bill of fare options.

Use basic networking tools

   To begin, the nosotros tin access information virtually the network they're currently connected to, every bit good every bit whatever network interfaces, from the principal menu. Here, nosotros tin abide by local information past times exactly typing l to clitoris upwardly local IP information, every bit seen below.

   This allows us to exercise things similar scan the network for other devices. This share of EHTools Framework gives us ameliorate visibility on a network in addition to situational awareness of what devices are around us. The diverse information tin travel broken downward every bit follows:
  • if: To run ifconfig and gives the names in addition to information virtually all network devices
  • 1: Enables wlan0
  • d1: Disables wlan0
  • 2: Enables wlan0mon
  • d2: Disables wlan0mon
  • 3: Randomize or laid the MAC address to a specific value
  • 7: View the populace IP address your computer is leaving on sites you lot visit
  • 19: Look upwardly the physical address of a given IP address to decide it's relative location
  • scan: Start an ARP scan on the network to uncovering nearby devices
  • start: Start monitor way on the wireless network adapter
  • stop: Stop wireless monitor way on the network adapter
Use EHTools Framework quick access
   Run it to opened upwardly quick access menu: ehtools -o
   Run it to update EHTools Framework: ehtools -u
   Run it to take EHTools Framework: ehtools -r
   Run it to brand handshake: ehtools -h
   Run it to opened upwardly WPS menu: ehtools -w

Install novel tools on EHTools Framework
   Part of the fun of Ehtools Framework is how tardily it is to add together novel tools to our arsenal. To demonstrate this, let's download Pupy, a Python-based RAT designed to receive got command of other computers on the network. We tin pick out choice 9 to access the listing of tools inward EHTools Framework.

   From the side past times side menu, the tools are broken downward into major categories, amongst options for managing the installation of scripts. The options presented are:

  • 1: Wi-Fi tools (tools for attacking wireless networks in addition to network databases)
  • 2: Remote access (tools for getting remote access to other devices in addition to remotely managing them)
  • 3: Information gathering (collecting tidings on people or website)
  • 4: Website tools (tools for exploiting or attacking sites)
  • 5: Other (a miscellaneous collection of other hacking tools)
   You tin also care your installed tools past times accessing choice 6. To download Pupy, we'll become to choice 2, which is remote access. Here, nosotros volition meet a listing of dissimilar tools for remote access, in addition to nosotros tin pick out choice 3 for Pupy.

About EHTools Framework server support
   Server back upwardly for ehtools Pro is really important, every bit all mistake reports are sent to it inward club to improve in addition to create vulnerabilities in addition to bugs!

   COUNCIL: Make a expert mesh connection for EHTools Framework, to aid EHTools Framework access to server!

   If inward number of bad Internet connexion EHTools Framework will non travel able to communicate amongst the server in addition to thence the framework volition non start because of access denial in addition to due to a validation mistake for cheque ehtools bought or non bought!

   If at that spot is the bad mesh connection, EHTools Framework will tell you lot this:
[*] There is no connection!

   If you lot did non purchase EHTools Framework, EHTools Framework will tell you lot this:
[*] Failed to opened upwardly session for ehtools!

How to protect EHTools Framework amongst password

   Do it amongst install.sh: Create login in addition to password from install.sh.
   Defaults is login: ehtools, password: sloothe.

   Do it when you lot are going to travel out from EHTools Framework, exit amongst shortcuts:
0 or exit.

   Do non exercise it when you lot are going to travel out from EHTools Framework. WARNING: Do non exactly unopen EHTools Framework window!

Terms of use
   This tool is exclusively for educational purposes only.
   Use this tool wisely in addition to never without permission.
   The authors are non responsible for anything you lot exercise amongst this tool.


  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS