vsResolver – Alpha – DNS Validating Stub Resolver

The Validating Stub Resolver (vsResolver) is a DNS stub resolver that implements the Domain Name System Security Extensions (DNSSEC) specified in RFC 4033, RFC 4034 and RFC 4035. These add data origin authentication and data integrity to the Domain Name System. vsResolver extends the dnspython toolkit (http://www.dnspython.org/) and uses the pycrypto library for its underlying crypto implementation(https://www.dlitz.net/software/pycrypto/)

Features

  • DNS Security Extenstions (DNSSEC) Validating Stub Resolver
  • Written in python
  • Extends dnspython, which uses pycrypto
  • Returns a query result along with a DNSSEC rating of BOGUS, PROVABLY_INSECURE or SECURE
  • negative results (e.g., NXDOMAIN) are also rated as BOGUS, PROVABLY_INSECURE or SECURE
  • See RFC4033, RFC4034 and RFC4035 for details on DNSSEC
  • Can be used as is as a utility to determine the DNSSEC status of a domain
  • Can be used as a software library to provide DNSSEC valiation to a DNS query

How to use :

c:> vsResolver.py 192.168.1.9 0 [Example]

Platform : Windows & linux

Download Latest Version : vsresolver-code.zip (86.5 kB)

Find Current Release | Read more in here : vsresolver

Advertisements

Sipvicious V 0.2.7 released

SIPVicious suite is a set of tools that can be used to audit SIP based VoIP systems.

Changelog For V-0.2.7 :

  • Feature: svcrash.py has a new option -b which bruteforces the attacker’s port
  • Feature: svcrack.py now tries the extension as password by default, automatically
  • Feature: svcrack.py and svwar.py now support setting of source port
  • Feature: new parameter –domain can be passed to all tools which specifies a custom domain in the SIP uri instead of the destination IP
  • Feature: new –debug switch which shows the messages recieved
  • Bug fix: Sometimes nonces could not be extracted due to an incorrect regex
  • Bug fix: Fixed an unhandled exception when decoding tags
  • Bug fix: now using hashlib when available instead of md5
  • Bug fix: removed the space after the SIP address in the From header which led to newer version of Asterisk to ignore the SIP messages
  • Bug fix: dictionaries with new lines made svcrack.py stop without this fix
  • Change: renamed everything to start with sv
  • Bug fix: changed the way shelved files are opened by the fingerprinting module
  • Change: fingerprinting disabled by default since it was giving too many problems and very little benefits

Download :

Windowssipvicious-0.2.7.zip linuxsipvicious-0.2.7.tar.gz

Find Other version | Or read more in here : http://enablesecurity.com/

Skypeproxy – Tunneling TCP IP through Skype.

Most network administrators at work, university or school deny access to file sharing, instant messaging or social networks such as facebook or myspace with a firewall or proxy server. If you are constantly getting a message saying “Can’t connect” or something similar, the service you are trying to connect to has probably been blocked by your network administrator.

Skype tunnel works in very similar way as well-known “TCP Tunnel/Monitor“… with only one diff: the transport for it – Skype Network.

For example : how works ssh-client-tunneling from office to home linux

prerequisites:

a) Preinstalled Skipe vv. 2,3,4,5 on Linux, Windows, MacOS.

b) two skypeId ( 1st is server, 2nd is client )

Just run :

1. on server: #java -jar 0.0.X-yyy-zz.jar listen

2. on client: #java -jar 0.0.X-yyy-zz.jar send <to_skypeId_contact> <local_tcp_port> <remote_host> <remote_port>

Proxy, Socks,ICQ, SSH, Windows Remote Desktop, VNC, Radmin, X-server and much much more aplications will be accessible again from any place where you use Skype 😉

For reference : Exploiting P2P Communications to Invade Users’ Privacy

Download :

skypeproxy-0.0.9-SNAPSHOT-jar-with-dependencies.jar [Listen] 2012

skypeproxy-0.0.8-SNAPSHOT-jar-with-dependencies.jar [Listen]

skypeproxy-0.0.5.zip

Read more in here : code.google.com