SQL INJECTION TUTORIAL FULL FEATURES 1> NOW TOOL HAS JUMPING PROXY SUPPORT SO ONCE YOU ACTIVATE THIS TASK AFTER EACH OF THE TASK WILL BE USE DIFFERENT PROXY YOU NO NEED TO CHANGE ITS MANUALLY. 2> NEW FUNCTION ADDED FOR REMOTE DESKTOP BRUTE FORCING NOTE: THIS TASK IS PERFORMED BY TSGRIENDER 3> THE COOLEST FUNCTION IS THAT IT HAS ADDED RDP BRUTE FORCING FROM RANGE OF IP. FIRST TOOL WILL COLLECT ALL THE IP WHICH HAVE PORT3389 IS OPEN AND THEN IT WILL BRUTE FORCE IT 4> NOW YOU CAN CRACK ENCRYPTION USING 2 MORE METHODS , ONLINE AND ALSO BY AUTO WORDS PATTERN 5> NOW ALL THE OUTPUT WILL BE STORED IN FILE 6> I HAVE FILTERED FEW OUTPUT 7> CREDIT SECTION UPDATED 8> HELP SECTION UPDATED 9> OS FINGERPRINTING, SSL FINGERPRINTING, AND DATABASE FINGERPRINTING ADDED. 10> AUTO UPDATE MESSAGE WILL DISPLAY IF UPDATES ARE AVAILABLE. 11> FIXED FEW ERRORS OLD FEATURES ————————- SO WHAT IS RPSS? BASICALLY IF YOU ARE NEW IN HACKING OR PENETRATION TESTING THEN THIS TOOL CAN BE VERY HELP FULL TO YOU. BECAUSE THIS TOOL FOLLOW PROPER SEQUENCE OF PENETRATION TESTING METHODS. THIS IS POWERFUL SECURITY SHELL WHICH CAN BE PENETRATE ANY OF THE WEB APPLICATION. BUT IF YOU ARE EXPERIENCED HACKER OR PENETRATION TESTER THEN USING THIS TOOL YOU CAN MAKE YOUR PENETRATION PROCESS MORE FAST AND EASY. THIS TOOL IS COVERING ALMOST ALL THE HACKING AND PENETRATION TECHNIQUES FUNCTION PROXY 1> Getproxy 2> Testproxylist 3> Testproxy 4> Autoproxy 5> Jumping 6> Loadproxy 7> removing 8>Changing
FOOT PRINTING 9> ip getting 10> smtp address grabbing 11> tracing the rough 12> identifying technology of server (header information) 13> full server header info gathering 14> crawling emails from search engines (capability to track tricky emails too) 15> website crawling (fussing links of same directory) 16> login page finder (support for asp,aspx,php,cfm,jsp,html,htm with no of payloads) 17> sub domain enumeration 18>host name qualification from ip range 19> web server service analysis 20> website structure fingerprinting 21> who is look up 22> reversing 23> enumerates server users 24> daemon foot printing 25> operating system foot printing 26> SSLcheck (by this task you can test ssl cipher) 27> DBcheck (by this task you can test database) 28> web server monitoring
[color=#FF4500]ANALYSIS[/color] 29> getting port information +service info (using thread so very fast) 30> sql injection scan 30.1-> auto scanning url 30.2->auto creating exploitable url 30.3->auto cheacking version 30.4-> auto fuzing table
SUPPORT 57> wordlist builder using custom combination 58> extracting ip addresses from files 59> extracting emails from files 60> crawling words from any of the web which is given by you 61> wget utility
SERVER TASK 62> getting port information +service info (using thread so very fast) 63> sql injection scan 63.1-> auto scanning url 63.2->auto creating exploitable url 63.3->auto cheacking version 63.4-> auto fuzing table 64> blind injection scan 65> lfi scan 66> rfi scan 67> rce scan 68> xss scan (support HTTPS also) 69> cgi scan (more vuln paths) 70> cms scan (support joomla, membo etc…) 71> custom scan 72> full scan VERBOUS TASK 73> getting port information +service info (using thread so very fast) 74> sql injection scan 74.1-> auto scanning url 74.2->auto creating exploitable url 74.3->auto cheacking version 74.4-> auto fuzing table
GOOGLE DORK (FEW TASK HAS PROBLEM WORKING ON IT) 102> Dorkscan 103> Subscan 104> Gvscan 105> Shellscan 106> Ranker 107> Usergrab 108> Dorkcreator 109> Cmsscan
ROOT (UNDER DEVELOPMENT) 110> Bandtest 111> Flooding 112> Honeypot 113> Chat 114> Games 115> Ids 116> Automachine REQURENMENT INTERNET CONNECTION : MORE THEN 256 K.B.P.S ONLY TESTED ON WINDOWS X.P CANT SAY ABOUT OTHER OS BUT IT SHOULD BE RUN I THINK TUTORIAL: FOR HELP TYPE -H FOR ENTERING ANY DIRECTORY ENTER "in <directory name>.” FOR EXAMPLE "in proxy” FOR EXECUTING ANY FILE ENTER exe <file name> FOR EXAMPLE "exe getproxy” more function all penetration out put will be log into a file name pentest.txt you can change this file how? see in help by typing "-h” FOR VIEW DIRECTORY ENTER "show” FEATURES 1> fake user agent 2> proxy support 3> verbose mode option