Published on March 3rd, 2014 | by NJ Ouchn0
Rooted Warfare 2014 First Edition – Selected Tools
The selected tools for Rooted Warfare Tools Event First Edition of Rooted Con is released. An amazing lineup of weapons that ranges from Information gathering, Wireless hacking, malware analysis to web application assessment and security intelligence.
Find below the accepted tools
Dradis is an open-source framework to enable you to work efficiently by gathering information from different tools and presenting it in a variety of formats.
We currently support Burp Scanner, Nessus, NeXpose, Nikto, Nmap, OpenVAS, OSVDB, Retina, SureCheck, VulnDB HQ, w3af, wXf and Zed Attack Proxy but with what you’ll learn in this workshop you’ll be able to connect Dradis to any other tool and present the information in any way you need.
Favii is a multi-user platform for the acquisition, representation and knowledge management following the KISS principle. A Knowledge Management with Semantic Web technologies, integrates Favii mandatory policies, role-based (RBAC / MAC) for access and handling of the safety knowledge, and a powerful search engine.
Both security policies, as queries for searches are treated as any other knowledge, by the user can be manipulated. In parallel, we have developed several ontologies for knowledge acquisition in the field of computer security: software, hardware, IP addresses, ports, administrators machines … all of which is managed by Favii.
FruityWifi is an open source tool for auditing wireless networks. It let you quickly and easily deploy advanced attacks using the web interface or by sending messages. Initially the application was created for use with a Raspberry -Pi , but can be installed on any Debian based system. FruityWifi include modules for added flexibility. These modules can be installed to add new functionality. Some of the modules available are urlsnarf , dnsspoof , Kismet, MDK3 , ngrep , nmap , and sslstrip squid3 ( with functionality to inject code ) , Captive Portal , and more. The show will focus on how to use the FruityWifi to audit wireless networks , deploying advanced attacks , how to use and create modules, how to combine them with each other and with other devices.
We show how to use the tool in different settings and situations , how to control it remotely via the web panel or sending messages for example, using Twitter. If FruityWifi is accepted for Rooted Warfare , will be shown exclusively launch the new WSDL + client panel with LCD and Keypad for RaspberryPi .
GoLismero is an open source framework designed to perform security audits . Its main features are the ability to call external tools (such as nmap , OpenVAS , sqlmap , XSSer , Wfuzz , dnsrecon , Shodan , Punkspider , Theharvester , Spiderfoot , sslscan … ) regardless of the results , unify , mix and detect vulnerablidades repeated (found by different tools). In addition , it also has numerous tests.
GoLismero is intended not only for the pen -tester , but also designed to meet the cycles and needs an audit to a real customer , as it has well-defined and configurable scopes , you can define the level of intrusiveness of the tests, whole process of audit and testing shall be logged in a database with timestamps , and any audit made golismero is reproducible. It supports many formats to show results. Currently in which more work has been done is the portable HTML (no dependencies of any kind, or pictures . All information is embedded in a single HTML file). In future versions it will incorporate word and pdf.
HttpAuthCrack is a tool developed in Python to test credentials on sites and devices using HTTP Basic authentication type.
To indicate the sites and devices to test, you can pass a list of IP addresses in a file, or you can use the result of a search Shodan having a “shodan dork” as an argument.
an installation package for Mac OS X systems to compile and install all those programs that are necessary for security audits and ethical hacking. They are organised into categories and there’s no need to recompile any software.
This way, we can have a large number of Kali tools installed at the same time.
OSUETA stands for OpenSSH User Enumeration Timing Attack and is a small script written in Python to exploit a bug present in versions 5 . * and 6. * of OpenSSH . In these versions during the authentication process , you may obtain a list of users in the system discriminated by the time it takes the system to evaluate an arbitrarily long password.
If the user is present, the time it takes the server to respond is larger. For example , to allow users found present in a system , this tool can be useful in penetration testing to shorten in brute force. The script also has the ability to establish a Denial of Service attack in the ssh service.
ParameterFuzz web is an audit tool, intended for testing by a dictionary, the existence of parameters in the pages, where the HTML code of the same does not contain all of them.
After the collection of parameters, it can exploit vulnerabilities of various types to easily identify security flaws.
peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful or not. The aim of this tool is to provide all the necessary components that a security researcher could need in a PDF analysis without using 3 or 4 tools to make all the tasks.
Robots Rider is a command line tool that unifies multiple external tools, in order to identify an interesting attack surface to start a pentest on a domain or a public list of URLs
It uses ‘theHarvester’ to get the full list of domains related to the domain that we want to attack.
“Sinfonier: Storm Builder for Security Intelligence” is a web service created by Telefonica Digital which streamlines integration of open source data to deduct intelligence metadata. Telefonica Digital’s Sinfonier provides a human cloud of analysts with a secure and open environment, to graphically build high-level Apache Storm topologies, and execute and share them for a definable period of time
Apache Storm is a free and open source, distributed, real-time computation system. Storm use three abstractions: “spouts”, “bolts” and “topologies”. Sinfonier includes one more abstraction: “Drains”. Thus, a topology is not only a network of spouts and bolts, but also of drains. Spouts are a source of streams. Bolts process input streams and produce new output streams. Drains send input streams to both storage and other services. By means of these drains, analysts can connect specific modules allowing them to create their own intelligence methodology in an easy-to-use and intuitive manner. Once complete, these new abstractions can be shared privately or publicly, culminating in a crowd-sourced intelligence system.
ZAP Proxy is a free and open source tool in continuous improvement. A very interesting aspect of ZAP is the API, that allows you to manipulate the tool with our own scripts.
Besides showing the newest capabilities ZAP Proxy, we developed getzapdata.py. It uses ZAP API to extract all entry points (parameter GET, POST, Cookie and Headers) and puts them be in a CSV file for further analysis.
The schedule will be posted soon at the official website http://www.rootedwarfare.com