Brainfoldb4u's Blog

Just another WordPress.com weblog

Archive for January 12th, 2010

Automated Web app finger printing tool

Posted by brainfoldb4u on January 12, 2010

In penetration testing finger printing the target web presence and enumerating as much as information possible is the primary step for an attacker/ security professional to discover vulnerability. With fingerprinting information attacker can develop an accurate attack scenario to exploit vulnerability in the software type/version being used by the target host. As important security vulnerabilities like SQL injection, buffer over flow are extremely depend on specific software version and software vendor, accurately identifying this sort of information becomes critical. Namp is one of the best tool serves the purpose for free.

Another tool currently released by Richard.sammet on http://mytty.org/wafp/, Basically this is a ruby based web application finger pritning tool using SQlite DB.

How it works

WAFP fetches the files given by the Finger Prints from a webserver and checks if the checksums of those files are matching to the given checksums from the Finger Prints. This way it is able to detect the detailed version and even the build number of a web application.

A Web Application Finger Print consits of a set of relative file locations in conjunction with their md5sums. It is made based on a production or example installation of a Web Application or just out of an extracted Web Application install files tarball. For this task, generate_wafp_fingerprint.sh is to be used.

Visit Richard.sammet site for download and samples

Posted in Security tools | Tagged: , | Leave a Comment »

Researcher Rates Mac OS X Vulnerability 'High

Posted by brainfoldb4u on January 12, 2010

Flaw in versions 10.5 and 10.6 can be exploited by a remote attacker, says SecurityReason

The proof of concept merely triggers a memory access error, but such buffer overflow conditions can sometimes be exploited to run arbitrary code.

Although the issue has apparently been fixed in FreeBSD and OpenBSD, the researchers imply that the changes have not filtered through to Mac OS X, where it is said to be present in Leopard (10.5) and Snow Leopard (10.6).

The issue is also said to have been present in NetBSD, Google Chrome, Firefox and other Mozilla projects, Opera, MatLab, and other pieces of software.

SecurityReason’s advisory describes a flaw in the libc/gdtoa code in OpenBSD, NetBSD, FreeBSD, and MacOS X, as well as Google Chrome, Mozilla Firefox and other Mozilla software, Opera, KDE, and K-Meleon. SecurityReason’s advisory rates the vulnerability’s risk as “high” and claims that the flaw can be exploited by a remote attacker.

Continue reading..

For security reasons advisory and proof of concept click here

Posted in Hacking, Information Security, Vulnerability | Tagged: , | Leave a Comment »