β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Tools used for exploiting Windows:
- [Exploitation](https://github.com/hacksysteam/Exploitation) : Windows Software Exploitation
- [hacking-team-windows-kernel-lpe](https://github.com/vlad902/hacking-team-windows-kernel-lpe) : Previously-0day exploit from the Hacking Team leak, written by Eugene Ching/Qavar.
- [mimikatz](https://github.com/gentilkiwi/mimikatz) : A little tool to play with Windows security - extract plaintexts passwords, hash, PIN code and kerberos tickets from memory.
- [Pazuzu](https://github.com/BorjaMerino/Pazuzu) : Reflective DLL to run binaries from memory
- [Potato](https://github.com/foxglovesec/Potato) : Privilege Escalation on Windows 7,8,10, Server 2008, Server 2012
- [UACME](https://github.com/hfiref0x/UACME) : Defeating Windows User Account Control
- [Windows-Exploit-Suggester](https://github.com/GDSSecurity/Windows-Exploit-Suggester) : This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Tools used for exploiting Windows:
- [Exploitation](https://github.com/hacksysteam/Exploitation) : Windows Software Exploitation
- [hacking-team-windows-kernel-lpe](https://github.com/vlad902/hacking-team-windows-kernel-lpe) : Previously-0day exploit from the Hacking Team leak, written by Eugene Ching/Qavar.
- [mimikatz](https://github.com/gentilkiwi/mimikatz) : A little tool to play with Windows security - extract plaintexts passwords, hash, PIN code and kerberos tickets from memory.
- [Pazuzu](https://github.com/BorjaMerino/Pazuzu) : Reflective DLL to run binaries from memory
- [Potato](https://github.com/foxglovesec/Potato) : Privilege Escalation on Windows 7,8,10, Server 2008, Server 2012
- [UACME](https://github.com/hfiref0x/UACME) : Defeating Windows User Account Control
- [Windows-Exploit-Suggester](https://github.com/GDSSecurity/Windows-Exploit-Suggester) : This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - hacksysteam/Exploitation: Windows Software Exploitation
Windows Software Exploitation. Contribute to hacksysteam/Exploitation development by creating an account on GitHub.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Installing video drivers in Linux
A) On Kali Linux
1) Installing video drivers for NVIDIA on Linux
> sudo apt install -y ocl-icd-libopencl1 nvidia-driver nvidia-cuda-toolkit
2) Enabling OpenCL for Intel
If your CPU supports OpenCL, then install the following packages:
sudo apt install firmware-misc-nonfree intel-opencl-icd
B) On Arch Linux, BlackArch
Enabling OpenCL for NVIDIA
Remove xf86-video-nouveau there it is:
sudo pacman -R xf86-video-nouveau
> Install proprietary NVIDIA driver, CUDA and other required packages:
sudo pacman -S nvidia nvidia-utils opencl-nvidia opencl-headers cuda
C) Enabling OpenCL for Intel
sudo pacman -S linux-firmware intel-compute-runtime pocl
Friends, I need your support - if you have a different distribution kit or AMD video card, write in the comments how you installed the video driver - I will add this information here.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Installing video drivers in Linux
A) On Kali Linux
1) Installing video drivers for NVIDIA on Linux
> sudo apt install -y ocl-icd-libopencl1 nvidia-driver nvidia-cuda-toolkit
2) Enabling OpenCL for Intel
If your CPU supports OpenCL, then install the following packages:
sudo apt install firmware-misc-nonfree intel-opencl-icd
B) On Arch Linux, BlackArch
Enabling OpenCL for NVIDIA
Remove xf86-video-nouveau there it is:
sudo pacman -R xf86-video-nouveau
> Install proprietary NVIDIA driver, CUDA and other required packages:
sudo pacman -S nvidia nvidia-utils opencl-nvidia opencl-headers cuda
C) Enabling OpenCL for Intel
sudo pacman -S linux-firmware intel-compute-runtime pocl
Friends, I need your support - if you have a different distribution kit or AMD video card, write in the comments how you installed the video driver - I will add this information here.
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦PowerShell Hacking
- [BloodHound](https://github.com/adaptivethreat/BloodHound) : Six Degrees of Domain Admin
- [Empire](https://github.com/adaptivethreat/Empire) : Empire is a PowerShell and Python post-exploitation agent
- [Generate-Macro](https://github.com/enigma0x3/Generate-Macro) : Powershell script will generate a malicious Microsoft Office document with a specified payload and persistence method
- [Invoke-AltDSBackdoor](https://github.com/enigma0x3/Invoke-AltDSBackdoor) : This script will obtain persistence on a Windows 7+ machine under both Standard and Administrative accounts by using two Alternate Data Streams
- [Old-Powershell-payload-Excel-Delivery](https://github.com/enigma0x3/Old-Powershell-payload-Excel-Delivery) : This version touches disk for registry persistence
- [PSRecon](https://github.com/gfoss/PSRecon) : PSRecon gathers data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted data, hashes PowerShell and various system properties, and sends the data off to the security team
- [PowerShell-Suite](https://github.com/FuzzySecurity/PowerShell-Suite) : Some useful scripts in powershell
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦PowerShell Hacking
- [BloodHound](https://github.com/adaptivethreat/BloodHound) : Six Degrees of Domain Admin
- [Empire](https://github.com/adaptivethreat/Empire) : Empire is a PowerShell and Python post-exploitation agent
- [Generate-Macro](https://github.com/enigma0x3/Generate-Macro) : Powershell script will generate a malicious Microsoft Office document with a specified payload and persistence method
- [Invoke-AltDSBackdoor](https://github.com/enigma0x3/Invoke-AltDSBackdoor) : This script will obtain persistence on a Windows 7+ machine under both Standard and Administrative accounts by using two Alternate Data Streams
- [Old-Powershell-payload-Excel-Delivery](https://github.com/enigma0x3/Old-Powershell-payload-Excel-Delivery) : This version touches disk for registry persistence
- [PSRecon](https://github.com/gfoss/PSRecon) : PSRecon gathers data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted data, hashes PowerShell and various system properties, and sends the data off to the security team
- [PowerShell-Suite](https://github.com/FuzzySecurity/PowerShell-Suite) : Some useful scripts in powershell
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - SpecterOps/BloodHound-Legacy: Six Degrees of Domain Admin
Six Degrees of Domain Admin. Contribute to SpecterOps/BloodHound-Legacy development by creating an account on GitHub.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How viruses spread ?
To know how viruses spread, you need to start first with what types of viruses are:
Network viruses spread over various computer networks.
File viruses are introduced mainly into executable modules. File viruses can inject into other types of files, but, as a rule, written in such files, they never gain control and, therefore, lose their ability to replicate.
Boot viruses are introduced into the boot sector of the disk (Boot sector) or into the sector containing the system disk boot program (Master Boot Record).
File boot viruses infect both files and boot sectors of disks.
Macro viruses are written in high-level languages ββand infect document files of applications that have built-in automation languages ββ(macro languages), such as applications of the Microsoft Office family.
Trojans masquerading as useful programs are a source of virus infection on your computer.
The main ways to distribute your Trojan:
1) Protroyan gamer: Go to the gaming forum, well, or a blog where you can leave comments and glue your Trojan with cheats, as they say the profit is good, because gamers turn off their antivirus.
2) he same thing, but gluing with cracks, again comments on forums, torrent trackers, etc. The coverage is great, maybe as they say.
3) Varez music and clips, here the method is quite simple, a shortcut is made, like music / playlist, etc. for example, it runs it, and instead of it the Trojan is launched, well, of course, music / movie can also be launched to divert your eyes. The main thing is to mask your virus so that no one thinks that this is an executable file that will launch the shortcut.
4) Distribution by mail with the extension .src, you can spam by mail like there: "You received an invoice!", Or "You got money", the main thing is that you would have to open such a file, and this is an executable file with a Trojan horse.
Your not allowed to copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How viruses spread ?
To know how viruses spread, you need to start first with what types of viruses are:
Network viruses spread over various computer networks.
File viruses are introduced mainly into executable modules. File viruses can inject into other types of files, but, as a rule, written in such files, they never gain control and, therefore, lose their ability to replicate.
Boot viruses are introduced into the boot sector of the disk (Boot sector) or into the sector containing the system disk boot program (Master Boot Record).
File boot viruses infect both files and boot sectors of disks.
Macro viruses are written in high-level languages ββand infect document files of applications that have built-in automation languages ββ(macro languages), such as applications of the Microsoft Office family.
Trojans masquerading as useful programs are a source of virus infection on your computer.
The main ways to distribute your Trojan:
1) Protroyan gamer: Go to the gaming forum, well, or a blog where you can leave comments and glue your Trojan with cheats, as they say the profit is good, because gamers turn off their antivirus.
2) he same thing, but gluing with cracks, again comments on forums, torrent trackers, etc. The coverage is great, maybe as they say.
3) Varez music and clips, here the method is quite simple, a shortcut is made, like music / playlist, etc. for example, it runs it, and instead of it the Trojan is launched, well, of course, music / movie can also be launched to divert your eyes. The main thing is to mask your virus so that no one thinks that this is an executable file that will launch the shortcut.
4) Distribution by mail with the extension .src, you can spam by mail like there: "You received an invoice!", Or "You got money", the main thing is that you would have to open such a file, and this is an executable file with a Trojan horse.
Your not allowed to copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦NGINUX TIPS :
1) Enable Nginx acquisition module
2) filebeat modules enable nginx
3) Edit Nginx collection configuration
vi modules.d/nginx.yml
- module: nginx
access:
enabled: true
var.paths: ["/data/access.log*"]
error:
enabled: true
var.paths: ["/data/error.log*"]
- module: nginx
access:
enabled: true
var.paths: ["/data/access.log*"]
error:
enabled: true
var.paths: ["/data/error.log*"]
Set Filebeat to create Index Pattern and Dashboard on Kibana
filebeat setup
4) Restart Filebeat to take effect
docker restart filebeat
π¦1) Create a storage volume to facilitate the joint mounting of Nginx and Filebeat containers
> docker volume create nginx-log-volume
2) Start the Nginx container and map the storage volume to the log directory
docker run -d --name nginx -p 80:80 -v nginx-log-volume:/var/log/nginx nginx:latest
3) Enter the container to modify the configuration
docker exec -it nginx /bin/bash
4) In the container environment, the default log will be input to stdout, so cancel this setting and specify the file
unlink /var/log/nginx/access.log
unlink /var/log/nginx/error.log
touch /var/log/nginx/access.log /var/log/nginx/error.log
nginx -s reload
Your not allowed to copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦NGINUX TIPS :
1) Enable Nginx acquisition module
2) filebeat modules enable nginx
3) Edit Nginx collection configuration
vi modules.d/nginx.yml
- module: nginx
access:
enabled: true
var.paths: ["/data/access.log*"]
error:
enabled: true
var.paths: ["/data/error.log*"]
- module: nginx
access:
enabled: true
var.paths: ["/data/access.log*"]
error:
enabled: true
var.paths: ["/data/error.log*"]
Set Filebeat to create Index Pattern and Dashboard on Kibana
filebeat setup
4) Restart Filebeat to take effect
docker restart filebeat
π¦1) Create a storage volume to facilitate the joint mounting of Nginx and Filebeat containers
> docker volume create nginx-log-volume
2) Start the Nginx container and map the storage volume to the log directory
docker run -d --name nginx -p 80:80 -v nginx-log-volume:/var/log/nginx nginx:latest
3) Enter the container to modify the configuration
docker exec -it nginx /bin/bash
4) In the container environment, the default log will be input to stdout, so cancel this setting and specify the file
unlink /var/log/nginx/access.log
unlink /var/log/nginx/error.log
touch /var/log/nginx/access.log /var/log/nginx/error.log
nginx -s reload
Your not allowed to copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ the server code, the server binds the local IP and port to monitor access:
package udp;
import java.io.IOException;
import java.net.DatagramPacket;
import java.net.DatagramSocket;
import java.net.InetSocketAddress;
/
* UDP
*/
public class UdpServerSocket {
private byte[] buffer = new byte[1024];
private static DatagramSocket ds = null;
private DatagramPacket packet = null;
private InetSocketAddress socketAddress = null;
/
*/
public static void main(String[] args) throws Exception {
String serverHost = "127.0.0.1";
int serverPort = 3344;
UdpServerSocket udpServerSocket = new UdpServerSocket(serverHost,
serverPort);
while (true) {
udpServerSocket.receive();
udpServerSocket.response;
}
}
/
*/
public UdpServerSocket(String host, int port) throws Exception );
}
socketAddress = new InetSocketAddress(host, port);
ds = new DatagramSocket(socketAddress);
System.out.println( */
public final String receive() throws IOException {
packet = new DatagramPacket(buffer, buffer.length);
ds.receive(packet);
String info = new String(packet.getData(), 0, packet.getLength());
System.out.println("xyοΌ" + info);
return info;
}
/
*/
public final void response(String info) throws IOException {
System.out.println(xy : " + packet.getAddress().getHostAddress()
+ ",ε£οΌ" + packet.getPort());
DatagramPacket dp = new DatagramPacket(buffer, buffer.length, packet
.getAddress(), packet.getPort());
dp.setData(info.getBytes());
ds.send(dp);
}
}
Your not allowed to copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ the server code, the server binds the local IP and port to monitor access:
package udp;
import java.io.IOException;
import java.net.DatagramPacket;
import java.net.DatagramSocket;
import java.net.InetSocketAddress;
/
* UDP
*/
public class UdpServerSocket {
private byte[] buffer = new byte[1024];
private static DatagramSocket ds = null;
private DatagramPacket packet = null;
private InetSocketAddress socketAddress = null;
/
*/
public static void main(String[] args) throws Exception {
String serverHost = "127.0.0.1";
int serverPort = 3344;
UdpServerSocket udpServerSocket = new UdpServerSocket(serverHost,
serverPort);
while (true) {
udpServerSocket.receive();
udpServerSocket.response;
}
}
/
*/
public UdpServerSocket(String host, int port) throws Exception );
}
socketAddress = new InetSocketAddress(host, port);
ds = new DatagramSocket(socketAddress);
System.out.println( */
public final String receive() throws IOException {
packet = new DatagramPacket(buffer, buffer.length);
ds.receive(packet);
String info = new String(packet.getData(), 0, packet.getLength());
System.out.println("xyοΌ" + info);
return info;
}
/
*/
public final void response(String info) throws IOException {
System.out.println(xy : " + packet.getAddress().getHostAddress()
+ ",ε£οΌ" + packet.getPort());
DatagramPacket dp = new DatagramPacket(buffer, buffer.length, packet
.getAddress(), packet.getPort());
dp.setData(info.getBytes());
ds.send(dp);
}
}
Your not allowed to copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Websites bugs scanners online :
https://sitecheck.sucuri.net/
https://wpsec.com/
https://hackertarget.com/wordpress-security-scan/
http://www.scanwp.com/
https://wploop.com/wordpress-security-online-scanner/
https://quttera.com/
https://pentest-tools.com/network-vulnerability-scanning/ghost-scanner
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Websites bugs scanners online :
https://sitecheck.sucuri.net/
https://wpsec.com/
https://hackertarget.com/wordpress-security-scan/
http://www.scanwp.com/
https://wploop.com/wordpress-security-online-scanner/
https://quttera.com/
https://pentest-tools.com/network-vulnerability-scanning/ghost-scanner
β β β Uππ»βΊπ«Δπ¬πβ β β β
Sucuri Security
SiteCheck is a website security scanner that checks any link or URL for malware, viruses, blacklist status, or malicious code. Check your website safety for free with Sucuri..
LIST OF SMARTPHONES VULNERABLES TO WANNCRY :
Galaxy Note 2
Galaxy Tab S2
Lg g4
Galaxy S7
Xiaomi Mi 4i
Galaxy S4
Galaxy Note 4
ZTE x500
Galaxy Note 3
Galaxy Tab 2
Oppo N3
Galaxy Note 5
Vivo X6 plus
Nexus 5
Nexus 5X
Galaxy Note Edge
Asus Zenfone 2
Galaxy A5
LenovoS90
OppoR7 plus
Xiaomi Redmi
Lenovo A8504
Galaxy Note 2
Galaxy Tab S2
Lg g4
Galaxy S7
Xiaomi Mi 4i
Galaxy S4
Galaxy Note 4
ZTE x500
Galaxy Note 3
Galaxy Tab 2
Oppo N3
Galaxy Note 5
Vivo X6 plus
Nexus 5
Nexus 5X
Galaxy Note Edge
Asus Zenfone 2
Galaxy A5
LenovoS90
OppoR7 plus
Xiaomi Redmi
Lenovo A8504
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Network security
#FastTips
is essentially the information security on the network. In a broad sense, all relevant technologies and theories related to the confidentiality, integrity, availability, authenticity and controllability of information on the network are the field of network security research. Ensuring the information security of the network system is the goal of network security. Information security includes two aspects: the security of information storage and the security of information transmission. Information storage security refers to the security of information in a static storage state, such as whether it will be used without authorization, etc. The transmission security of information refers to the safety of information in the dynamic transmission process. In order to ensure the security of network information transmission, there are the following issues:
γγ(1) The monitoring of information on the network
γγ(2) The impersonation of the user's identity
γγ(3) The tampering of information on the network
γγ(4) The denial of the information sent
γγ(5) The retransmission of the information
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Network security
#FastTips
is essentially the information security on the network. In a broad sense, all relevant technologies and theories related to the confidentiality, integrity, availability, authenticity and controllability of information on the network are the field of network security research. Ensuring the information security of the network system is the goal of network security. Information security includes two aspects: the security of information storage and the security of information transmission. Information storage security refers to the security of information in a static storage state, such as whether it will be used without authorization, etc. The transmission security of information refers to the safety of information in the dynamic transmission process. In order to ensure the security of network information transmission, there are the following issues:
γγ(1) The monitoring of information on the network
γγ(2) The impersonation of the user's identity
γγ(3) The tampering of information on the network
γγ(4) The denial of the information sent
γγ(5) The retransmission of the information
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β