Security List Network™
Follow Us on FacebookFollow Us on Google+Follow Us on TwitterFollow Us on Pinterest
Menu
  • Home
  • About Us
  • Security Archives
  • Partners
Menu
  • Automation
  • Browser
  • Brute Force
  • Code Scripting
  • Cryptography
  • Encryption
  • Exploits
  • Framework
  • Linux Security Distros
  • Mobile Applications Tools
    • Android Tools
    • iPhone Tools
  • Networking
    • Bluetooth
    • Monitoring/System Administrator
    • Network Mapping/Scanner
    • Packet Sniffer/Sniffing
    • Internet Security
    • Spoofing/Spoofer
    • Wireless/wifi
  • Penetration Test
    • BenchMark
    • Cross Site Scripting(XSS)
    • Fuzzer/Fuzzing
    • Sql Injection
    • Stress Testing
  • Security Tools
    • Anti Malware/Virus – Malware Analysis
    • Firewall
    • Intrussion Detection and Prevention System(IDS/IPS)
    • Registry Analysis

SITEMAP

Archives

Browse: Home   /   Networking   /   Page 81
Ufonet v0.6 - Galactic Offensive released.

Ufonet v0.6 – Galactic Offensive released.

November 4, 2015
anon80
Denial Of Service/Floods, Networking, Stress Testing

[!]Remember: this tool is NOT for educational purpose. Usage of UFONet for attacking targets without prior mutual consent is illegal. It is the end user’s…

Read Article →
Z-Attack is a Z-Wave Packet Interception and Injection Tool.

Z-Attack is a Z-Wave Packet Interception and Injection Tool.

November 4, 2015
Terry
Networking, Penetration Test

Z-Attack is a Z-Wave Packet Interception and Injection Tool GPLv3. This program is compatible with Rfcat and the Texas Instrument development KIT (with UART bridge)…

Read Article →
Concept-Rootkit - A simple conceptual linux rootkit.

Concept-Rootkit – A simple conceptual linux rootkit.

November 2, 2015
w0rm32
Networking, Penetration Test

A simple conceptual linux rootkit. how it work: – Hide the module: + Option1: Overwrite “lsmod” + Option2: Delete module listing “rootkit” from modules. –…

Read Article →
Artillery v1.5 released : is a combination of a honeypot, monitoring tool, and alerting system.

Artillery v1.5 released : is a combination of a honeypot, monitoring tool, and alerting system.

November 2, 2015
Infosec
Internet Security, Networking, Security Tools

Artillery is a combination of a honeypot, monitoring tool, and alerting system. Eventually this will evolve into a hardening monitoring platform as well to detect…

Read Article →
Hacking The Art Of Exploitation notes with samples and demos.

Hacking The Art Of Exploitation notes with samples and demos.

October 31, 2015
skygear
Code Scripting, Exploits, Networking

Hacking The Art Of Exploitation notes with samples and demos. List of File and inside Folder. 1. Exploitation: – Generalized Exploit Techniques – Buffer Overflows…

Read Article →
MCfly is an interactive program that spoofs  MAC addresses in a given interval.

MCfly is an interactive program that spoofs MAC addresses in a given interval.

October 29, 2015
K-159
Networking, Penetration Test, Spoofing/Spoofer

MCfly is an interactive tool for Linux that spoofs MAC addresses in a given interval. Script :

Python
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
import uuid, re, random, os, subprocess, time, threading, sys, string
from colorama import init
 
###Colors###
init(autoreset=True)
white = '\x1B[37m';dgray = '\x1b[90m';DGRAY = '\x1b[100m';lred = '\x1b[91m';LRED = '\x1b[101m';lgreen = '\x1b[92m';LGREEN = '\x1b[102m';lyellow = '\x1b[93m';LYELLOW = '\x1b[103m';lblue = '\x1b[94m';LBLUE = '\x1b[104m';lmagenta = '\x1b[95m';LMAGENTA = '\x1b[105m';lcyan = '\x1b[96m';LCYAN = '\x1b[106m';lgray = '\x1b[97m';LGRAY = '\x1b[107m';BOLD = '\x1B[1m'
 
###Art###
print lyellow + '''
   ___           __        
  / _ )___ _____/ /__      
/ _  / _ `/ __/  '_/      
/____/\_,_/\__/_/\_\        
/_  __/__/_  __/ /  ___    
/ / / _ \/ / / _ \/ -_)    
/_/__\___/_/_/_//_/\__/    
  / __/_ __/ /___ _________
/ _// // / __/ // / __/ -_)
/_/  \_,_/\__/\_,_/_/  \__/
MCfly is an interactive program that spoofs
MAC addresses in a given interval.
Author is not responsible to any damage caused
by this program
KittySec(C)                            
'''
 
###List of vendor MAC prefix
vendors = ['00:05:9A', '00:19:56', '00:02:B3', '00:00:C6', '00:11:11', '00:48:54']
 
def countdown(t):
while t:
       mins, secs = divmod(t, 60)
       timeformat = '{:02d}:{:02d}'.format(mins, secs)
sys.stdout.write(lmagenta + '\r' + '[info]' + white + ' Next spoof in: ' + str(timeformat).strip('\'\(\)') + ' seconds\r')
sys.stdout.flush()
       time.sleep(1)
        t -= 1
      
def rand(size=2, chars=string.hexdigits):
return str(''.join(random.choice(chars) for _ in range(size)))
 
def generateMAC():
randomMAC = random.choice(vendors) + ':' + rand() + ':' + rand() + ':' + rand()
return str(randomMAC).upper()
 
def spoofMAC(iface, interval):
threading.Timer(interval, spoofMAC, [iface, interval]).start()
try:
#Parse ifconfig
generatedMAC = generateMAC()
cmd = 'ifconfig ' + str(iface) + ' hw ether ' + generatedMAC
os.system(cmd)
spoofedMAC = str(subprocess.check_output(['ifconfig'])).split('HWaddr')
spoofedMAC = spoofedMAC[1].split(' ')
spoofedMAC = spoofedMAC[1]
#Check for successful spoofing
if spoofedMAC.upper() == generatedMAC:
print lgreen + '[+]' + ' Spoofed MAC address to ' + generatedMAC
countdown(interval)
else:
print lred + '[-] There was an error'
except Exception, e:
print lred + '[-] Error ' + str(e)
 
 
originalMAC = str(':'.join(re.findall('..', '%012x' % uuid.getnode()))).upper()
print lmagenta + '[info] ' + white + 'Original MAC address is: ' + originalMAC
 
#List available interfaces
availIfaces = str(os.listdir('/sys/class/net/'))
 
#Take user input
iface = str(raw_input(lyellow + '[?] Choose interface: ' + availIfaces + '\n'))
interval = int(raw_input(lyellow + '[?] Each how many minutes would you like to spoof to a newer MAC address?\n'))
interval = interval * 60
spoofMAC(iface, interval)

Source : https://github.com/kittysec

Read Article →
Empire v1.3 released : PowerShell post-exploitation agent.

Empire v1.3 released : PowerShell post-exploitation agent.

October 28, 2015
Parmin Tukidi
Exploits, Framework, Networking, Penetration Test

Changelog v-1.3.0: + Moved Find-Fruit.ps1 source to ./data/module_source/recon/* + Output tweak for find_fruit, added ShowAll flag Empire is a pure PowerShell post-exploitation agent built on…

Read Article →
netool.sh V- 4.5.2 released : MitM PENTESTING OPENSOURCE T00LKIT.

netool.sh V- 4.5.2 released : MitM PENTESTING OPENSOURCE T00LKIT.

October 25, 2015
Parmin Tukidi
Denial Of Service/Floods, Encryption, Exploits, Networking, Penetration Test, Phishing, Spoofing/Spoofer, Wireless/wifi

Changelog v-4.5 .2: + UPGRADE => msfcli replaced by msfconsole + netool.sh => “added” file selection GUI -> zenity displays + priv8.sh => “added” MitM…

Read Article →
← Previous 1 … 80 81 82 … 140 Next →

Copyright © 2018

Powered by Worldwide CyberSecurity Team.

  • Digital Forensics
  • Networking
  • Penetration Test
  • Security Tools