Saturday, 16 March 2019

BUG HUNTER - A COLLECTION OF BUG HUNTING TOOLS


A Collection of Information Gathering, Mapping, Discovery and Exploitation Tools for Bug Hunting.

Information Gathering :

Basic Commands for Information Gathering, Masscan, DNS Recon, Sublist3r, Alt-DNS, Amass, Subfinder, Enumall, Aquatone, Cloudflare_Enum, InfoG, The Harvester, Recon-NG, SetoolKit, WhatWeb, Maltego

Mapping :

Nmap, Firefox Browser, Firefox Browser Extensions, Burp Suite Pro, Burp Suite Extensions, Intruder Payloads for Burp Suite, Payloads All The Thing

Discovery :

Acunetix-WVS, Arachni, Burp Suite, Nexpose, Nikto, Vega, Wapiti, Web Security Scanner, Websecurify Suite, Joomscan, w3af, Zed Attack Proxy, WP-Scan, FuzzDB, CeWL

Exploitation :

XSS : XSS Radar, XSSHunter, xssHunter Client, DOMxssScanner, XSSer, BruteXSS, XSStrike, XSS'OR
SQLi : SQLmap
XXE : OXML-xxe, XXEinjextor
SSTI : Tplmap
SSRF : SSRF-Detector, Ground Control
LFI : LFISuit
Mobile : MobSF, GenyMotion, Apktool, dex2jar, jd-gui, idb
Other : Gen-xbin-Avi, GitTools, DVCS Ripper, TKO Subs, SubBruteforcer, Second-Order, Race The Web, CORStest, RCE Struts-pwn, ysoSerial, PHPGGC, Retire-js, Getsploit, Findsploit, BFAC, WP-Scan, CMSmap, Joomscan, JSON W T T, Wfuzz, Patator, Netcat, ChangeMe, wappalyzer, builtwith, wafw00f, assetnote, jsbeautifier, LinkFinder

PoCs & Reporting :

Bug Bounty Platforms, POCs (Proof of Concepts), CheatSheet, EyeWitness, HttpScreenshot, BugBountyTemplates, Template Generator

Installation in Linux :

Open Terminal and Type :

● git clone https://github.com/thehackingsage/bughunter.git

● cd bughunter
● chmod +x bughunter.py
● sudo cp bughunter.py /usr/bin/bughunter



That's it.. type bughunter in terminal to execute the tool.

Video :

YouTube : Bug Hunter : A Collection of Tools for Bug Hunting

Repository :  

https://github.com/thehackingsage/bughunter


That's It... If You Like This Post Please Share This With Your Friends..

& Don't Forget To Follow Me At TwitterInstagramGithub & SUBSCRIBE My YouTube Channel..!!!


Happy Hacking!!!

Labels: , , , , ,

Sunday, 30 September 2018

BurpSuite Pro, Plugins and Payloads

BurpSuite Pro, Plugins and Payloads by Mr.SAGE


Burp Suite is a reliable and practical platform that provides you with a simple means of performing security testing of web applications. It gives you full control, letting you combine advanced manual techniques with various tools that seamlessly work together to support the entire testing process. The utility is easy-to-use and intuitive and does not require you to perform advanced actions in order to analyze, scan and exploit web apps. It is highly configurable and comes with useful features to assist experienced testers with their work.​

The main window displays all the available tools you can choose from and set each one's settings the way you want.
Being designed to work alongside your browser, the application functions as an HTTP proxy, thus all the HTTP/s traffic from your browser passes through the utility. This way, if you want to perform any kind of testing, you need to configure the browser to work with it.

The first thing you need to do is to confirm that the app's proxy listener is active. Simply navigate to the Proxy tab and take a look in the Proxy Listeners section. You should see an entry in the table with the Running check box ticked. The second thing you are required to do is to configure your browser to use the app's proxy listener as its HTTP proxy server. Finally, you need to configure the browser to be able to send HTTP requests through the app without problems.
The previously mentioned utility gives you complete control over all of the actions you want to perform and get detailed information and analysis about the web applications you are testing. Using tools such as Intruder, Repeater, Sequencer and Comparer you are able to carry out different actions with ease.

With the help of Spider, you can crawl an application to locate its content and functionality. You are able to add new scope by selecting the protocol and specifying the host name or the IP range. Then the utility monitors all the transferred bytes and queued requests.
The Intruder tool enables you to perform attacks against web apps. Simply set the host name and the port number, define one or more payload sets and you are done. You can also use the HTTP protocol by checking the proper box from the Target tab.

Another tool that automates testing tasks is called Sequencer, which analyzes the quality of randomness in an application's session tokens. Firstly, you need to load at least 100 tokens, then capture all the requests.
Overall, Burp Suite Free Edition lets you achieve everything you need, in a smart way. It helps you record, analyze or replay your web requests while you are browsing a web application.

Features of Professional Edition :
  • Burp Proxy
  • Burp Spider
  • Burp Repeater
  • Burp Sequencer
  • Burp Decoder
  • Burp Comparer
  • Burp Intruder
  • Burp Scanner
  • Save and Restore
  • Search
  • Target Analyzer
  • Content Discovery
  • Task Scheduler
  • Release Schedule
Download BurpSuite Pro, Plugins and Payloads : http://bit.ly/burpsuitepro

https://github.com/thehackingsage/burpsuite


More Payloads : https://github.com/swisskyrepo/PayloadsAllTheThings


Requirements :


Burp requires a computer with the official Java Runtime Environment (64-bit edition, version 1.6 or later) installed.


Download the latest Java Runtime Environment (JRE) : Click Here


How To Use Burp Suite Pro ? :

  • Download BurpSuitePro as ZIP : http://bit.ly/burpsuitepro
  • extract and open folder
  • open BurpSuite-Keygen.jar with java
  • open BurpSuite-Pro-v1.7.37.jar with java
  • copy-paste Licence from Keygen to BurpSuite and Click on Next
  • choose Manual Installation and copy-paste Activation Request from BurpSuite to Keygen
  • now copy-paste Activation Response from Keygen to BurpSuite
  • click next and your pro version will activate 
that's it !!! start using burpsuite pro 

Note : you don't have to repeat this process again and again to use it. after doing it once Windows User run .bat file & Linux User run .sh file to use the BurpSuitePro.. 


if you face any problem feel free to ask..


How To Use Burp Suite Plugins ? :

  • open BurpSuite 
  • go to Extender > Extensions
  • click on Add and Select .jar file & then click on Next
BurpSuite Hackbar Plugin | Mr.SAGE

That's It !!! 


Note : One More Thing You Need To Know That Now You Are Using BurpSuite Pro So Now You Can Also Use All Pro Extensions From BApp Store. 



Install Pro Extensions | Mr.SAGE

Video Tutorial :

YouTube : Soon

That's It !!!

if you like this post please like & share with your friends..

Download H4CK3R The Book (An Ethical Hacking ebook For Beginners) :

https://www.h4ck3rthebook.blogspot.com

Twitter : https://www.twitter.com/thehackingsage

Instagram : https://www.instagram.com/thehackingsage

Github : https://www.github.com/thehackingsage

& DON'T FORGET TO SUBSCRIBE..!!!

YouTube : https://youtube.com/hacktronian/

Happy Hacking !!!

Labels: , , , , , , , , ,

Thursday, 16 August 2018

Tools for Information Gathering, Web Application Testing, Infrastructure Testing, Exploit Helpers and Utils

Tools For Web Application Testing by Mr. SAGE


Information Gathering

Google Hacking : Allows you to find juicy information indexed by Google about a target website (ex. directory listing, sensitive files, error messages, login pages, etc).

Find Subdomains : Allows you to discover subdomains of a target domain and to determine the attack surface of a target organization. Find systems which are less protected and more vulnerable to attacks.

Find Virtual Hosts : Attempts to discover virtual hosts that are configured on a given IP address. This is helpful to find multiple websites hosted on the same server.

Website Recon : This tool allows you to discover the technologies used by a target web application - server-side and client-side. It can also scan multiple virtual hosts on the same IP.

Metadata Extractor : Extracts metadata from public documents such as: pdf, doc, xls, ppt, docx, pptx, xlsx. The metadata may contain: author name, username, company name, software version, document path, creation date, etc.

Subdomain Takeover : Allows you to discover subdomains of a target organization which point to external services (ex. Amazon S3, Heroku, Github, etc) and are not claimed - leaving them vulnerable to hostile takeover.

Web Application Testing

URL Fuzzer : Discover hidden files and directories (which are not linked in the HTML pages): .conf, .bak, .bkp, .zip, .xls, etc. Get easy access to hidden content hosted on your target web server.

Web Server Scan : Finds common vulnerabilities which affect web applications: SQL injection, XSS, OS Comand Injection, Directory Traversal and others. The scanner also identifies specific web server configuration issues.

WordPress Scan : This tool helps you to discover security issues and vulnerabilities in the target WordPress website using the most advanced WordPress scanner: WPScan.

SharePoint Scan : Discover various security weaknesses and vulnerabilities in web applications built on top of Microsoft SharePoint and FrontPage.

Drupal Scan : Finds Drupal version, modules, theme and their vulnerabilities. Checks for common Drupal misconfigurations and weak server settings.

Joomla Scan : Perform a Joomla security assessment by finding vulnerabilities in Joomla core, components, modules and templates.

Infrastructure Testing

Ping Sweep : Enables you to see which IPs are 'live' within a given network range. Behind a 'live' IP there is a running server or workstation.

TCP Port Scan : Allows you to discover which TCP ports are open on your target host and also to detect service information, operating system version and to do traceroute.

UDP Port Scan : Allows you to discover which UDP ports are open on your target host, identify the service versions and detect the operating system.

Network Scan OpenVAS : This is a comprehensive scanner which allows you to detect a wide range of vulnerabilities mosty related to network services and operating systems but also includes web server configuration tests.

DNS Zone Transfer : Check if the name servers of the target domain are vulnerable to DNS Zone Transfer and attempt to retrieve the full DNS Zone file.

SSL Heartbleed Scan : This tool attempts to identify servers vulnerable to the OpenSSL Heartbleed vulnerability (CVE-2014-0160). When such a server is discovered, the tool also provides a memory dump from the affected server.

SSL POODLE Scan : The SSLv3 POODLE vulnerability scanner attempts to find SSL servers vulnerable to CVE-2014-3566, also known as POODLE (Padding Oracle On Downgraded Legacy) vulnerability.

SSL DROWN Scan : The DROWN vulnerability scanner tests a range of IP addresses (or just a single host) for the DROWN vulnerability in OpenSSL.

ROBOT Attack Scan : Allows you to discover vulnerable TLS servers (Web, Email, FTP) which are affected by the ROBOT vulnerability.

Exploit Helpers

HTTP Request Logger : This is a useful pentest utility which logs all the HTTP/S requests received on a certain handler URL: source IP, User Agent, URL parameters, timestamp, etc. This allows you to easily create Proof of Concepts in order to demonstrate vulnerabilities such as XSS, data exfiltration or to do social engineering.

Utils

ICMP Ping : Check if a server is live and responds to ICMP Echo requests. This tool can also be used to find the IP address of a hostname.

Whois Lookup : This tool allows you to perform Whois lookups online and extract information about domain names and IP addresses.

That's It !!! 

if you like this post please like & share with your friends..

Download H4CK3R The Book (An Ethical Hacking ebook For Beginners) : 





& DON'T FORGET TO SUBSCRIBE..!!!


Keep Visiting... Enjoy !!! :)

Labels: , , , , , , , ,

Friday, 4 May 2018

9 Popular Training Courses To Learn Ethical Hacking Online.

9 Popular Training Courses To Learn Ethical Hacking Online. | THE HACKING SAGE

How to become a Professional Hacker? This is one of the most frequently asked queries we came across on a daily basis. Do you also want to learn real-world hacking techniques but don’t know where to start ? Well there is 9 online courses that let you get started your career in hacking and penetration testing regardless of your experience level. The goal of this online training course is to help you master an ethical hacking and penetration testing methodology..


9 Popular Training Courses To Learn Ethical Hacking Online. | THE HACKING SAGE


9 Online Courses That Would Help You To Become A Certified Pentester : Super-Sized Ethical Hacking Bundle



1. Bug Bounty : Web Hacking


Hackers breaching a system or network of a company could end up in jail, but legally hacking and responsibly reporting it to the respective company could help you earn a good amount. 

Even Google and Facebook paid out $6 Million and $5 Million respectively last year to hackers and bug hunters for discovering and reporting vulnerabilities in their web services as part of their bug bounty programs.


This course will help you explore types of vulnerabilities such as SQL, XSS, and CSRF injection and how you can use them to legally hack major brands like Facebook, Google, and PayPal and get paid.


2. CompTIA Security + Exam Preparation


If you are a beginner and you want to try your hands and make a career in the cyber world, then you need a good certification.

Beginning with basic security fundamentals, threats and vulnerabilities, this course will help you walk through more advanced topics, providing you with the knowledge you need to pass the globally-recognized CompTIA Security+ certification exam in one go.

3. Ethical Hacking Using Kali Linux From A to Z


Kali Linux is always one of the most modern ethical hacking tools and a favourite tool of hackers and cyber security professionals.

This course offers you with the knowledge about Kali Linux – one of the popular operating systems that come with over 300 tools for penetration testing, forensics, hacking and reverse engineering – and practising different types of attacks using its hacking capabilities.


4. Ethical Hacking From Scratch to Advanced Techniques


Since every single day a company is getting hacked and having its website shut down or customers' data compromised, ethical hackers are in demand. If you want to take steps closer to a new career in ethical hacking, this course is for you.

This course will help you learn how to bypass different security layers, break into networks, compromise computers, crack passwords, crash systems, and compromise apps, emails, social media accounts, and then evaluate their security, and propose solutions.

5. Learn Social Engineering From Scratch


Social engineering has been the primary cause of most high profile cyber-attacks in recent years. The impact of it on an organisation could result in economic loss, loss of Privacy, temporary or permanent Closure, loss of goodwill and Lawsuits and Arbitrations.

This course will help you learn how to hack into all major operating systems, including Windows, macOS, and Linux, use social engineering to deliver Trojans to a target, and interact with the compromised systems, as well as protect your company from such attacks.

6. Learn Website Hacking and Penetration Testing From Scratch


To protect your websites and infrastructure from getting hacked by hackers, you first need to think like a hacker.

This course will help you learn how to hack websites and applications by carrying out different cyber attacks against it as a black hat hacker but fix those holes that allowed you to hack them like a white hat.

7. Hands on, Interactive Penetration Testing & Ethical Hacking


This course will teach you, in real time, each stage of a penetration testing environment so that you can tweak and test your skills.

You will also learn how to use Rapid 7's Metasploit to exploit targets and run post exploitation techniques, utilise PowerShell with Empire, and evade anti-virus software from major vendors.


8. Complete WiFi and Network Ethical Hacking Course 2017


WiFi hacking is an all time hot topic among hackers as well as penetration testers.

This online Wi-Fi and Network Ethical Hacking course are structured in a way to provide you with an in-depth, hands-on, comprehensive information on Wi-Fi hacking and its security to protect it from any cyber attack.

By the end of this course, regardless of experience, you will be able to break all types of WiFi encryption methods and ready to start pursuing your career in network security.

9. Cyber Security Volume I: Hackers Exposed


Internet security has never been as important as it is today with more information than ever being handled digitally around the globe, government conducting mass surveillance, and hackers stealing sensitive data from the ill-equipped networks, websites, and PCs.

This course will walk you through basics of hacking to an understanding of the threat and vulnerability landscape, build a foundation to expand your security knowledge, and protect yourself and others.
 

Get All These Courses at Once : Super-Sized Ethical Hacking Bundle

That's It...

Source : The Hackers News

and if you like this post please like & share with your friends..

Download H4CK3R The Book (An Ethical Hacking ebook For Beginners) : 

https://www.h4ck3rthebook.blogspot.com

Twitter : https://www.twitter.com/thehackingsage

Instagram : https://www.instagram.com/thehackingsage

Github : https://www.github.com/thehackingsage

& DON'T FORGET TO SUBSCRIBE..!!!

YouTube : https://www.youtube.com/channel/UCYK1n9A4TUq1CvGc6F3DzoA


Keep Visiting... Enjoy !!! :)

Labels: , , , , , , , , , , , , , ,