Welcome to HBH! If you have tried to register and didn't get a verification email, please using the following link to resend the verification email.

Cum Security Toolkit


Cum Security Toolkit

By ghostghost | 5916 Reads |
0     0

The Cum Security Toolkit(CST) is a great tool to use. I have used this once or twice for puposes that will stay unknown. This is fast and easy to break into ports that are open, send a string to the open ports (user specified), and show their reply. It is more an enumeration / stress tool. You can scan seperate ports and/or portranges, and you can scan a single host, or supply a list with servers for bulk scanning. Thats the Port scanner.

Also the CGI Scanner, web vulnerability scanner, that scans using a database of scripts, files and directories (user editable). The sample databases included contain +2200 possibly vulnerable scripts/dirs. You can scan with or without using (multiple) proxy servers. The cgi scanner has +11 different anti-IDS tactics (hex-values, double slashes, self-reference directories, session splicing, parameter hiding, http misformatting, dos/win directory syntax, case sensitivity, null method processing, long urls, premature request ending and http 0.9 scans), and sends fake "X-Forwarded-For:", "Referer:" and "User-Agent:" headers to hide your scans even more.

You can also specify a waittime between 2 script fetches. The cgi scanner uses HEAD requests for faster scanning (you can scan using GET by providing an extra flag), and supports scanning virtual hosts. You can also specify another port to scan instead of the standard port 80, or another directory than the standard cgi-bin or scripts. The scanner outputs the scripts and/or directories that return a 200, 201, 202, 204, 403 or 401 HTTP code (you can specify other codes too using an extra flag) and outputs the target webserver software. You can scan single hosts, or supply a file with a list with targets for bulk scanning.

The CST security scanners are all in JAVA and to run them you need a Java runtime environment.

Sounds like fun? Want a CST?

Download here http://www.blackhat.be/cst/cst1_41.tar.gz

Comments
ghost's avatar
ghost 19 years ago

Couldn't they come up with a better name for their Security Toolkit? Cum? That's just sick.

ghost's avatar
ghost 19 years ago

yeah, but it works. If you dont think of it like that. But it does sound like it. First it goes and finds the open "ports" and then it leaves "residue" behind.

ghost's avatar
ghost 19 years ago

Hey, I don't know about you, but I always know which ports I want to use and when :)

ghost's avatar
ghost 19 years ago

I know which ports i want as well. But its how you get in the ports is what counts. :p

ghost's avatar
ghost 19 years ago

I saw this title and said "Oh no now hack4u is writing Sex Protection articles

ghost's avatar
ghost 17 years ago

I had to view this