Skip to main content

Fast-Track version 3.4

* Small change, I dynamically generate the version numbers now in menu and command line mode, before
you may have noticed it said Version 3 and never changed with different versions. Now its showing
the correct version numbers every update.
* Changed the changelog.txt and credits.txt to CREDITS and CHANGELOG. Also modified credits to be
up to date.
* Fixed a bug where going to About in menu mode would cause Fast-Track to crash.
* Added error handling if Fast-Track Web GUI if the port was already in use.
* Removed the Shikata Ga Nai encoding from Fast-Track's SQLPWANGE, it was causing issues
on some systems with corruptable executabls.
* Added better cleanup in SQLPwnage to remove H2B files as soon as the conversion to binary
is completed.
* Added a "browse" button to the wordlist specification in sql bruter and in binary to hex generator.
Before you had to manually specify the wordlist or file to convert, now you just hit the browse button
and navigate to it.
* Changed the timeout with no internet connection for identifying an IP address to 2 seconds instead of
the default of 8 on SQLPwnage.
* Changed the directories where SQLPwnage does its conversions from binary to hex to the appdata folder.
My plan is to make all information go into the appdata folder and noowhere else. A lot easier for cleanup.
* Created a "version" directory in bin that handles what version number Fast-Track is on for the menu mode
and command line mode.
* Added some cool stuff to the SQL Bruter, once a system gets popped with the "sa" account, Fast-Track will
now allow you to specify what type of payload you want. For example, you can use the normal command shell
but we also incorporated the 64kb debug bypass attack that uploads a metasploit reverse vnc or reverse
meterpreter to the system without having to upload anything. Pretty slick feature that I haven't seen in
any SQL bruters before.

Comments

Popular posts from this blog

ALFA-­AWUS036H & ALFA-­AWUS050NH INSTALLING/UPDATING DRIVERS RTL8187, r8187, RT2800usb on UBUNTU

NOTE: For surfing Internet with ALFA-AWUS050NH on Ubuntu Jaunty with rt2870sta driver, you must use the Kernel "2.6.28-11-generic #42-Ubuntu", without change or updates the drivers modules. NOTE: The tutorial is not related to Ubuntu karmic. Driver RTL8187/Stacks-­mac80211 (ref. ALFA-­AWUS036h) ­- These drivers, for surfing Internet, are more stable than r8187, and fully compatible with Network-Manager 0.7 installed by default on Ubuntu 9.04. Network-Manager 0.7 installed by default on Ubuntu 9.04. ­- Supports all encryption without problems. (OPEN, WEP and WPA/WPA2) ­- With Compat-Wireless, the "injection" working, but for support “Fragmentation attack” (opt. -5) you need to install one patch. - The RX sensitivity and packets injection is less, related to drivers r8187. Driver r8187/Stacks-ieee80211 (ref. ALFA-AWUS036h) - This driver is recommended for use with the Suite of Aircrack-ng, but not particularly suitable for Internet connections, as less stable and disc...

Sniffing SSL traffic using MITM attack / ettercap, fragrouter, webmitm and dnsspoof.

Before reading on this guide is for educational purposes only. I take no responsibility from what people do with this info. First thing is to get fragrouter. I don't know if you can use other tools provided with the backtrack, there are 100 ways to skin a cat and this is just my way. http://packetstormsecurity.nl/UNIX/IDS/nidsbench/fragrouter.html There are lots of things that you can do with fragrouter but we are going to use fragrouter to setup IP forwarding. We do this with this command : Code: fragrouter -B1Squash that window and put it to one side. Now open another shell and we will start dnsspoof with this command Code: dnsspoof -i ath0 (or whatever network interface you are using)Again put that window to one side and lets load up webmitm. Webmitm will issue our ssl cert to the victim so we can decrypt the traffic we capture. Start webmitm by typing Code: webmitm -dNow we can start the arp spoof. To start ettercap type Code: ettercap -T -M arp:remote /router addy/ /victim a...

Test New ALFA-AWUS036H v.2 (1.000mW) VS ALFA-AWUS036H v.1 (500mW)

- Recently emerged the New ALFA-AWUS036H v.2 (1.000mW), and these are the tests. TEST WITH NETSTUMBLER 1) usb da 100mW chipset railink 2) usb da 200mW chipset railink rt73 3) intel 2200 b/g con connettore esterno rp-sma 4) Alfa-AWUS036H 500mW 5) New Alfa-AWUS036H V2 da 1.000mW