Nov 22, 2014

Tools: .NET ExploitRemotingService (c) 2014 James Forshaw

A tool to exploit .NET Remoting Services vulnerable to CVE-2014-1806 or CVE-2014-4149. It only works on Windows although some aspects might work in Mono on *nix.

Source:: https://github.com/tyranid/ExploitRemotingService

If you like my blog, Please Donate Me
Or Click The Banner For Support Me.

Nov 20, 2014

CheatSheet: Adb and Android Shell Cheat Sheet

https://github.com/maldroid/adb_cheatsheet/blob/master/cheatsheet.pdf?raw=true


If you like my blog, Please Donate Me
Or Click The Banner For Support Me.

Slide: Web Architecture - Mechanism and Threats

This slide is my presentation that I present in 2600Thailand Meeting.

https://db.tt/Pu3MeThe


 


If you like my blog, Please Donate Me
Or Click The Banner For Support Me.

Nov 17, 2014

Tools: Hamms - Malformed servers to test your HTTP client


Hamms is designed to elicit failures in your HTTP Client. Connection failures, malformed response data, slow servers, fat headers, and more!

Installation

You can either install hamms via pip:
pip install hamms
Or clone this project:
git clone https://github.com/kevinburke/hamms.git

Usage

  1. Start hamms by running it from the command line:
    python hamms/__init__.py
    
    Or use the HammsServer class to start and stop the server on command.
    from hamms import HammsServer
    
    class MyTest(object):
        def setUp(self):
            self.hs = HammsServer()
            self.hs.start()
    
        def tearDown(self):
            self.hs.stop()
  2. Make requests and test your client. See the reference below for a list of supported failure modes.
By default, Hamms uses ports 5500-5600. In the future, this port range may be configurable.

Source:: https://github.com/kevinburke/hamms

If you like my blog, Please Donate Me
Or Click The Banner For Support Me.