A tool to gather information about wireless networks: it generates graphs of
binomo networks/nodes identified, ssids, probes, gathers information from smtp/telnet/msn/ftp/http among other protocols and allows to use captured http cookies to gain access to web servers using cookie-based authentication.
Web site: wifizoo.hexale.org
Forums: Wifizoo Forum
NTLM Pass-The-Hash for Windows!. This toolkit allows to authenticate to remote servers using NTLM hashes instead of cleartext passwords, and also 'steals' from memory NTLM password hashes of logon sessions (current and
minimum deposit in binomo in india sometimes past logon sessions).
Additional information: http://osscoresecurity.com/pshtoolkit/doc/index.html
Forums: PSH/PTH Toolkit Forums
Presentations: Hack-In-The-Box 2008 - Malaysia /
(local copy) -
Ba-con Argentina 2008
Papers: Modifying Windows NT Logon Credentials (Original paper I wrote in 2000)
Third-party papers: pourquoi la securite est un echec (by nicolas ruff, eads). /
(local copy), ethicalhacker.net
video tutorial.
Third-party tools: Pass-the-Hash toolkit GUI with source code included,
PassTheHashGUI.rar
PTH addresses for -a switch: http://www.hexale.org/pth/pth_addrs.txt
A tool to intercept & debug execution of programs. It allows the user to intercept API calls (dll exports) and other functions by setting breakpoints on arbitrary memory addresses within a process. The 'hooks' are written in python an can be changed in runtime (if you change a 'hook' while the program is running, next time the hook is triggered the new code will be executed).
Third-Party papers: "High-Level Reverse Engineering" (by Matthew Lewis - IRM) /
(local copy)
Documentation: API reference, examples, script library, videos
Forums: Universal Hooker Forums
Decrypting Coldfusion datasources passwords
These two small scripts will allow you to decrypt the datasource passwords stored by Coldfusion. After compromising a coldfusion installation it is useful to obtain the clear-text passwords used for
binomo trading tricks the different configured datasources. These passwords can then be used to access the datasources (commonly database servers) directly and to try to access other services.
Additional information: http://hexale.blogspot.com/2008/07/how-to-decrypt-coldfusion-datasource.html and
http://hexale.blogspot.com/2009/10/how-to-decrypt-coldfusion-v6-datasource.html
Coldfusion v7 and v8 decryptor: http://www.hexale.org/tools/coldfusion78_ds_decrypt.tgz
Coldfusion v6 decryptor: http://www.hexale.org/tools/decryptcf6.tgz