Go Back   Xisp.org Forums > Porn Password Cracking > Tools of the Trade

HTML-Debug v3.0

Reply
Views: 1972 - Replies: 6  
Thread Tools Display Modes

HTML-Debug v3.0
Old 08-07-2006, 04:02 AM   #1
Ncqr
Silver Exploiter
 
Ncqr's Avatar
 
Ncqr is offline Offline
Join Date: Jan 2006
Location: Australia
Posts: 487
Threads: 99
Ncqr is on a distinguished road
Default HTML-Debug v3.0

Wow i was absolutly amazed that i havent found this tool sooner.

Completly stunned at this tool. I have been looking for something like this for along time that can manipulate cookie + header data really fast and on the same tab. If ya dont know what im talkin about then dont worry this tool isnt for you.

But wow.


http://www.ken78x.com/index.php?page=downloadHD

If when you install it, it begins to crash the just go into the data folder and have a muck around with the config settings. I think the problem is the defualt site setting. Change it to a real site and ya will have no problems.

Worked with me.
  Reply With Quote

Old 08-07-2006, 05:39 PM   #2
Permutant
Banned
 
Permutant is offline Offline
Join Date: Jan 2006
Posts: 178
Threads: 23
Permutant is on a distinguished road
Default

That sounds handy, thanks a lot for sharing the fun, Ncqr
  Reply With Quote

Old 08-10-2006, 12:42 AM   #3
FlowerHorn
Exploiter
 
FlowerHorn's Avatar
 
FlowerHorn is offline Offline
Join Date: Nov 2005
Location: Vietnam
Posts: 760
Threads: 353
FlowerHorn is on a distinguished road
Default

ken78x makes many good tools. I love his html debugger, been using it like forever :)
  Reply With Quote

Old 08-11-2006, 11:55 PM   #4
thchog
Special Friend
 
thchog's Avatar
 
thchog is offline Offline
Join Date: Mar 2006
Location: California, USA
Posts: 319
Threads: 89
thchog is on a distinguished road
Default

Curious if anyone knows before I seek the answer out what the Trojan-Spy in the download really is?
I downloaded a few of Ken78's tools and this was the only one that came up as infected (not to mention he's supported @ some other very big and knowledgable, securi minded boards) so I presume it must either be due to its name or its functions (what ncqr's main reasons for liking the proggie) so I would not worry anyone reading this, just curious. I attached a screen shot of what occured when I scanned the zip/rar file before opening.....

Its 1 zip/rar with 1 word doc and 2 screen shots pasted on that word doc, no more.l
http://rapidshare.de/files/29081030/HTML_Debugger.rar

OH NCQR check this out, seems in the vicinity of your interests?

http://suif.stanford.edu/~livshits/work/lapse/

Below is a description of the tools use, for your interest perhaps use it in reverse, and could be quite fun/useful

Quote:
LAPSE stands for a Lightweight Analysis for Program Security in Eclipse. LAPSE is designed to help with auditing Java J2EE applications for common types of security vulnerabilities. LAPSE was developed as part of the Griffin Software Security Project.

LAPSE targets the following Web application vulnerabilities:
Parameter manipulation
Header manipulation
Cookie poisoning
Command-line parameters SQL injections
Cross-site scripting
HTTP splitting
Path traversal




What should you do to avoid these vulnerabilities in your code? How do we protect Web applications from exploits? The proper way to deal with these types of attacks is by sanitizing the tainted input.

If you are interested in auditing a Java Web application, LAPSE helps you in the following ways:
Identify taint sources
Identify taint sinks
Find paths between sources and sinks

LAPSE is inspired by existing lightweight security auditing tools such as RATS, pscan, and FlawFinder. Unlike those tools, however, LAPSE addresses vulnerabilities in Web applications. LAPSE is not intended as a comprehensive solution for Web application security, but rather as an aid in the code review process. Those looking for more comprehensive tools are encouraged to either read our Usenix Security '05 paper or to look at some of the tools produced by Fortify or Secure Software.
  Reply With Quote

Old 08-12-2006, 11:28 PM   #5
Ncqr
Silver Exploiter
 
Ncqr's Avatar
 
Ncqr is offline Offline
Join Date: Jan 2006
Location: Australia
Posts: 487
Threads: 99
Ncqr is on a distinguished road
Default

Hmm very interesting about the Trojan-Spy in the program. I suspect that it is due to what the program does. I.e if i was to download a root kit onto my computer just to check it out... my AV would warn me and then try to delete it becasue it is a root kit and the AV thinks that the root kit is trying to own my box but infact i downloaded it myself. I could be wrong... very wrong. But i havnt heard many bad things about it and many of us here have been using it for a long time with out any problems.

And a very nice find thchog with the other program...i will deffently give it a bash.
__________________
"He is a driven, unflinching, calculating machine."
  Reply With Quote

Old 08-14-2006, 01:43 AM   #6
thchog
Special Friend
 
thchog's Avatar
 
thchog is offline Offline
Join Date: Mar 2006
Location: California, USA
Posts: 319
Threads: 89
thchog is on a distinguished road
Default

Yeah I get similar warnings from KAV on formfinal and form@, I am not worried, I suspect you are correct.
  Reply With Quote

Old 08-16-2006, 08:04 PM   #7
thchog
Special Friend
 
thchog's Avatar
 
thchog is offline Offline
Join Date: Mar 2006
Location: California, USA
Posts: 319
Threads: 89
thchog is on a distinguished road
Default

Another you may enjoy Ncqr

Lazy Authorization Forcer
Code:
http://www.gnucitizen.org/projects/javascript-authorization-forcer/
This is an idea I am still developing but here you go POC is available
and it works. The malicious JavaScript presented here will try to
guess URLs that contain credentials. It is sort of Basic
Authentication/FTP Authentication bruteforcer.

The POC works well in IE6, IE7, Firefox and Opera. I wasn't able to
suppress the Basic Authentication dialog when trying to create Basic
Authentication Bruteforcer. However, I came up with this lazyForce
implementation. A typical attack vector will be as the following:

1. The attacker discovers your internal IP
2. Based on your IP a class C range is enumerated using the Port
Scanning or Visited Link Scanning technique.
3. Once a target is discovered a large enough dictionary is used to
find valid credentials associated with each IP.

In order to make IE work a style sheet that is embeded inside the
current document needs to be reused. Read the provided source code for
more information.

Visited Link Scanner
Code:
http://www.gnucitizen.org/projects/javascript-visited-link-scanner/
This is a technique that I've learned from Jeremiah Grossman
Code:
(http://jeremiahgrossman.blogspot.com/)
and his presentation on
JavaScript malware. Please, keep all the credits for this finding to
Jeremiah.

Code:
http://www.gnucitizen.org/projects/javascript-visited-link-scanner/visitedlinkscanner.js
The POC presented here is my improved version of the POC presented in
BlackHat. I made it work well in IE6, IE7, Firefox and Opera. IE6 has
very nasty disabilities when dealing with dynamically generated style
sheets. However, these can be easy sorted out by reusing the current
style sheet. If you are interested how it works just read the provided
source code.

Well, this is it.

--
pdp (architect)
Code:
http://www.gnucitizen.org
__________________
In times of rapid change, experience could be your worst enemy.
  Reply With Quote
Reply


Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
 
Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump



All times are GMT -4. The time now is 11:36 PM.


vBulletin skin developed by: Xisp.org Crew
Powered by vBulletin®
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
2005 © Copyright Xisp.org