Changes V-2.0 ”Cyber Angels” Fixes : [>]added about option [>]added new header art [>]optimized size from 8 mg to 1.4 mg
New Tools : [+]Fake Update [network attack vector] [+]Fake Access point [wireless attack vector]
Hacking Victim System With MFOD & Java Applet Attack Using Websploit Toolkit Video
WebSploit Is An Open Source Project For : [>]Social Engineering Works [>]Scan,Crawler & Analysis Web [>]Automatic Exploiter [>]Support Network Attacks —— [+]Autopwn - Used From Metasploit For Scan and Exploit Target Service [+]wmap - Scan,Crawler Target Used From Metasploit wmap plugin [+]format infector - inject reverse & bind payload into file format [+]phpmyadmin Scanner [+]LFI Bypasser [+]Apache Users Scanner [+]Dir Bruter [+]admin finder [+]MLITM Attack - Man Left In The Middle, XSS Phishing Attacks [+]MITM - Man In The Middle Attack [+]Java Applet Attack [+]MFOD Attack Vector [+]USB Infection Attack [+]ARP Dos Attack [+]Web Killer Attack [+]Fake Update Attack [+]Fake Access point Attack
dbd is a Netcat-clone, designed to be portable and offer strong encryption. It runs on Unix-like operating systems and on Microsoft Win32. dbd features AES-CBC-128 + HMAC-SHA1 encryption (by Christophe Devine), program execution (-e option), choosing source port, continuous reconnection with delay, and some other nice features. dbd supports TCP/IP communication only. Source code and binaries are distributed under the GNU General Public License.
Java has a number of different archive formats. This talk covers the J2SE / J2EE type archives. The goal here is to show how simple it is to add potentially malicious software to three of the most common format.
JAR – Java ARchive
Typical run in Java Virtual Machines on client system
ZIP files with manifests, metadata and Java byte-code
Can be digitally signed
WARs – Web application Archives
Typical run on Java application servers such as Tomcat
Run as the remote server user.
Can be digitally signed
EAR – Enterprise application ARchive
Very similar to WAR, but with extended enterprise features.
All three file formats when allowed to run can create sockets, interact with the filesystem outside of the respective virtual machines and execute commands there. This makes then perfectly suited for exploitation.
Run typical with full permissions of the user and display very few warnings. At most you receive a “run or don’t run” style prompt. Signing, even with a self-signed certificate, reduces these warnings.
AV engines rarely do effective heuristic analysis on known malicious code when it’s inserted into a Java Archive format.