BackTrack 4 Final Release

Taken  from the new BackTrack Site :

BackTrack 4 Final is out and along with this release come some exciting news, updates, and developments. BackTrack 4 has been a long and steady road, with the release of abeta last year, we decided to hold off on releasing BackTrack 4 Final until it was perfected in every way shape and form.

With this release includes a new kernel, a larger and expanded toolset repository,

… Read more »

Read More

Exploit-DB Updates

Lots of new updates in the exploit-db arena. Barabas whipped up a quick browser search bar plugin.

We got a massive CVE / OSVDB entry update from Steve Tornio which was added to our DB. Our “perfect” exploit template now has links to the exploit code, vulnerable app , CVE and OSVDB entries. See this example. You can now search for exploits via CVE or OSVDB.

We’ve added a new column to the database –

… Read more »

Read More

Explo.it – The Day After

The Exploit Database is up and running…survived day 1 . On a last moment fluke, we registered the domain https://www.exploit-db.com/, which is now also up and running.

We’ve improved the search functions on the site, and imported the “papers” and “shellcode” sections from Milw0rm. We’ve been getting our first submissions and are processing them almost in real time. We’ve set up an IRC channel on freenode  #exploitdb,

… Read more »

Read More

Offensive Security Exploit Archive Online

After a short and intense setup, we are ready to present the Offsec Exploit Archive. We’ve recreated the milw0rm database, updated it and are now accepting submissions. The purpose of the site is to provide researchers and security enthusiasts a repository of exploits, and when possible, the relevant affected software. We’ve started the party by posting a few new exploits of our own – namely a Novell eDirectory 8.8 SP5 iConsole Buffer overflow exploit and a HP Power Manager Administration Universal Buffer Overflow Exploit.

… Read more »

Read More

Offsec Web Server Hacked

For the past couple of weeks we have been watching escalating DOS attacks against our web server, specifically against the Metasploit Unleashed Wiki. Today as we were watching our apache logs, we noticed unusual requests. A quick analysis showed that our web server was compromised through a vulnerability in the wiki software we use for the free Metasploit course. The compromise occurred on Nov 6th,and went unnoticed for  around 28 hours.

A php shell was uploaded to the wiki through an obscure vulnerability,

… Read more »

Read More

Offensive Security Exploit Archive

For the past few months, Offensive Security has been working with additional exploit addicts (Rel1k) at maintaining the integrity of the Milw0rm exploit archive. For those who don’t know, Milw0rm has been dormant in the past few weeks, for reasons which remain with str0ke (he is alive, healthy and well btw).

Offensive Security together with Gerix.it will be picking up from the place Milw0rm left, and will be maintaining a new exploit archive collection which will be open to the public.

… Read more »

Read More

Metasploit Rising

The Framework that we all know and love is about to take a massive leap into the future.   The MSF crew as well as the MSF itself has been placed under Rapid 7’s corporate umbrella.

The framework will continue to be free, running under the BSD license. We expect to see major improvements in the MSF due to this shift. With corporate backing there will be more resources and time to improve the MSF.

… Read more »

Read More

News and Updates

We’ve got a bunch of exciting news, I’ll try to make this as short and concise as possible.

The guys from the Metasploit project have teamed up with Offensive Security to significantly expand our current Metasploit Unleashed public course. Work is underway!

Apropos MSFU, some statistics – over 3 million page views, 80k unique visitors and 58,000 password bruteforce attempts since the course is up.

BackTrack 4 development is going on strong,

… Read more »

Read More

Social Engineering at its best

In conjunction with a team of social engineers, penetration testers and information security experts, www.social-engineer.org is opening its “virtual” doors today.

The team at Offensive Security has been working with many contributors and specialists to put together the Webs Official Framework for Social Engineering.

www.social-engineer.org will house an ever growing framework for social engineering as well tools, how-to’s,  informational reviews and podcasts all geared at helping security minded professionals enhance their awareness and knowledge in the field of social engineering. 

… Read more »

Read More

Sniffing DECT Phones with BackTrack

BIG FAT HAIRY NOTE: IT IS ILLEGAL TO RECORD PHONE CONVERSATIONS IN MANY COUNTRIES. For a list of state privacy laws in the US, click here and here.

Thanks to 5m7x, dedected is soon to be added to the BackTrack repositories. In our internal tests, the standard AT&T cordless phone was found not to use encryption. The recording quality was phenomenal – you can find a copy of this recording here.

… Read more »

Read More

Microsoft IIS FTP 5.0 Remote SYSTEM Exploit

A remote Microsoft FTP server exploit was released today by Kingcope, and can be found at http://milw0rm.com/exploits/9541, https://www.exploit-db.com/exploits/9541/

A quick examination of the exploit showed some fancy manipulations in a highly restrictive environment that lead to a”useradd” type payload. The main issue was the relatively small payload size allowed by the SITE command, which was limited to around 500 bytes.

After a bit of tinkering around,

… Read more »

Read More

BackTrack 4 Pre Final Kernel Update

We have pushed a new kernel to the repository and updated several drivers. The upgrade process is a bit convoluted, but has been streamlined for the future. For now, run these commands from your backtrack box to update to the latest kernel and drivers:

apt-get update
apt-get install -d linux-image
cd /var/cache/apt/archives/
dpkg -i –force all linux-image-2.6.30.5_2.6.30.5-10.00.Custom_i386.deb
apt-get dist-upgrade
apt-get install madwifi-drivers
apt-get install r8187-drivers

After a reboot,

… Read more »

Read More