A tool to gather information about wireless networks: it generates graphs of binomo
networks/nodes identified, ssids, probes, gathers information from smtp/telnet/msn/ftp/http among other protocols and allows to use captured http cookies to gain access to web servers using cookie-based authentication.
Web site: wifizoo.hexale.org
Forums: Wifizoo Forum
NTLM Pass-The-Hash for Windows!. This toolkit allows to authenticate to remote servers using NTLM hashes instead of cleartext passwords, and also 'steals' from memory NTLM password hashes of logon sessions (current and minimum deposit in binomo in india
sometimes past logon sessions).
Additional information: http://osscoresecurity.com/pshtoolkit/doc/index.html
Forums: PSH/PTH Toolkit Forums
Presentations: Hack-In-The-Box 2008 - Malaysia
/ (local copy)
- Ba-con Argentina 2008
Papers: Modifying Windows NT Logon Credentials
(Original paper I wrote in 2000)
Third-party papers: pourquoi la securite est un echec (by nicolas ruff, eads).
/ (local copy)
, ethicalhacker.net video tutorial
Pass-the-Hash toolkit GUI with source code included, PassTheHashGUI.rar
PTH addresses for -a switch: http://www.hexale.org/pth/pth_addrs.txt
A tool to intercept & debug execution of programs. It allows the user to intercept API calls (dll exports) and other functions by setting breakpoints on arbitrary memory addresses within a process. The 'hooks' are written in python an can be changed in runtime (if you change a 'hook' while the program is running, next time the hook is triggered the new code will be executed).
Third-Party papers: "High-Level Reverse Engineering"
(by Matthew Lewis - IRM) / (local copy)
Documentation: API reference, examples, script library, videos
Forums: Universal Hooker Forums
Decrypting Coldfusion datasources passwords
These two small scripts will allow you to decrypt the datasource passwords stored by Coldfusion. After compromising a coldfusion installation it is useful to obtain the clear-text passwords used for binomo trading tricks
the different configured datasources. These passwords can then be used to access the datasources (commonly database servers) directly and to try to access other services.
Additional information: http://hexale.blogspot.com/2008/07/how-to-decrypt-coldfusion-datasource.html
Coldfusion v7 and v8 decryptor: http://www.hexale.org/tools/coldfusion78_ds_decrypt.tgz
Coldfusion v6 decryptor: http://www.hexale.org/tools/decryptcf6.tgz