Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Google "Ascending Strike": from every perspective to preserve the three-dimensional effect of illumination, 2D becomes "4D"
#Updates
#Updates
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Brute force RTSP-HACK CAMERA FROM IP:
As already mentioned BEFORE THIS MESSAGE, the URI ("page" address) at which the media stream is available differs from device to device. That is, if you do not have credentials for authentication using the RTSP protocol, then to get the route (URL) of the media stream, you will have to search for it by brute force.
1) You can look at the variety of addresses at https://www.ispyconnect.com/sources.aspx .
2) Program Cameradar able to search for the source address and select the user's password. As stated in the description, Cameradar hacks RTSP CCTV cameras.
Cameradar allows you to:
A) Detect open RTSP hosts on any available target host
B) Determine which device model is broadcasting
C) Launch automatic dictionary attacks to find the route of their flow (ex: /live.sdp)
D) Launch automatic dictionary attacks to guess camera username and password
E)Receive a complete and convenient report on the results
To install the program, see the page https://kali.tools/?p=6132
π¦The launch is very simple:
1) cameradar -t Π₯ΠΠ‘Π’
The " -t , --targets " option sets the target. The target can be a file listing hosts or network ranges, IP address, IP range, subnet, or a combination of both. Example: --targets = "192.168.1.72,192.168.1.74"
2) The program makes a lot of requests and if some of them fail, it displays these errors on the screen, as a result of which the output becomes cluttered, so I prefer to add " 2> / dev / null " to the command .
Examples of successful launches:
cameradar -t 201.191.170.250 2>/dev/null
cameradar -t 98.124.38.218 2>/dev/null
3) The description of the program mentions "nmap", but this is Cameradar's own library, it is written in Go and has nothing to do with the original Nmap network scanner - perhaps this is the reason for such slowness.
4) You can scan the network to collect Cameradar targets, for example, using Masscan :
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Brute force RTSP-HACK CAMERA FROM IP:
As already mentioned BEFORE THIS MESSAGE, the URI ("page" address) at which the media stream is available differs from device to device. That is, if you do not have credentials for authentication using the RTSP protocol, then to get the route (URL) of the media stream, you will have to search for it by brute force.
1) You can look at the variety of addresses at https://www.ispyconnect.com/sources.aspx .
2) Program Cameradar able to search for the source address and select the user's password. As stated in the description, Cameradar hacks RTSP CCTV cameras.
Cameradar allows you to:
A) Detect open RTSP hosts on any available target host
B) Determine which device model is broadcasting
C) Launch automatic dictionary attacks to find the route of their flow (ex: /live.sdp)
D) Launch automatic dictionary attacks to guess camera username and password
E)Receive a complete and convenient report on the results
To install the program, see the page https://kali.tools/?p=6132
π¦The launch is very simple:
1) cameradar -t Π₯ΠΠ‘Π’
The " -t , --targets " option sets the target. The target can be a file listing hosts or network ranges, IP address, IP range, subnet, or a combination of both. Example: --targets = "192.168.1.72,192.168.1.74"
2) The program makes a lot of requests and if some of them fail, it displays these errors on the screen, as a result of which the output becomes cluttered, so I prefer to add " 2> / dev / null " to the command .
Examples of successful launches:
cameradar -t 201.191.170.250 2>/dev/null
cameradar -t 98.124.38.218 2>/dev/null
3) The description of the program mentions "nmap", but this is Cameradar's own library, it is written in Go and has nothing to do with the original Nmap network scanner - perhaps this is the reason for such slowness.
4) You can scan the network to collect Cameradar targets, for example, using Masscan :
> > sudo masscan 0.0.0.0/0 --exclude 255.255.255.255 --randomize-hosts --rate 200 -p 554,5554,8554 --output-filename cameras.xml
The following commands create the β camera β directory and filter all IP addresses from cameras * .xml files into camera / hosts.txt file .
> > mkdir camera
cat cameras*.xml | grep -o -E '[0-9]{1,}\.[0-9]{1,}\.[0-9]{1,}\.[0-9]{1,}' | sort | uniq > camera/hosts.txt
Counting the number of IP addresses on which at least one port from 554, 5554 and 855 is open.
> >cat camera/hosts.txt | wc -l
> > 10955
(Don't copy our tips)β β β Uππ»βΊπ«Δπ¬πβ β β β
Telegram
UNDERCODE TESTING
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BEFORE HACK CCTV; What is RTSP USED FOR ANY CCTV, and what is it for :
1) Real-time streaming protocol (born real time streaming protocol, abbr RTSP..) - application protocol for use in systems that work with multimedia dataβ¦
π¦BEFORE HACK CCTV; What is RTSP USED FOR ANY CCTV, and what is it for :
1) Real-time streaming protocol (born real time streaming protocol, abbr RTSP..) - application protocol for use in systems that work with multimedia dataβ¦
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Bitcoin is expected to hit the longest consecutive month since 2019 since smashing the milestone.
#Updates
#Updates
β β β Uππ»βΊπ«Δπ¬πβ β β β
Hack bluetooth with kali :
Bluesnarfing, all modern devices have at least some kind of protection against bluesnarfing. For example, I tested this with a Samsung Galaxy s7, and it prompted be to give permission to bluesnarfer to read my contacts, make calls, etc. So at least it asked me for permission!
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
To install bluesnarfer:
1) git clone https://github.com/kimbo/bluesnarfer.git
2) cd bluesnarfer
3) make
4) ./bluesnarfer.
5) First, you need to make sure you can reach the device from your computer. Connect your computer to your phone with Bluetooth, then verify you can reach it using something like l2ping:
l2ping <MAC_ADDRESS>
6) If you're having trouble finding the MAC_ADDRESS, usually you'll be able to see it in your bluetooth settings. I also like to use bluetoothctl and then devices list and it'll show you what devices have been picked up by the scanner or paired previously and what their MAC addresses are.
7) Next, you run the bluesnarfer program. The general usage is
./bluesnarfer -b <MAC_ADDR> [options]
For example, to list device info, run
./bluesnarfer -b <MAC_ADDR> -i
Once you get that working, you can test a bunch of AT commands (read contacts, read recent calls, make calls, send text messages, etc). Here's a good reference I found for AT commands: https://www.sparkfun.com/datasheets/Cellular%20Modules/AT_Commands_Reference_Guide_r0.pdf (Note that your phone may not support all of the AT commands listed in the reference guide.)
8) If running the above command doesn't work, you probably need to figure out the right channel to use. The default channel used is 17 (see src/bluesnarfer.c#L59).
To see what channels are available, I used the sdptool:
sdptool browse --tree --l2cap <MAC_ADDRESS>
β β β Uππ»βΊπ«Δπ¬πβ β β β
Hack bluetooth with kali :
Bluesnarfing, all modern devices have at least some kind of protection against bluesnarfing. For example, I tested this with a Samsung Galaxy s7, and it prompted be to give permission to bluesnarfer to read my contacts, make calls, etc. So at least it asked me for permission!
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
To install bluesnarfer:
1) git clone https://github.com/kimbo/bluesnarfer.git
2) cd bluesnarfer
3) make
4) ./bluesnarfer.
5) First, you need to make sure you can reach the device from your computer. Connect your computer to your phone with Bluetooth, then verify you can reach it using something like l2ping:
l2ping <MAC_ADDRESS>
6) If you're having trouble finding the MAC_ADDRESS, usually you'll be able to see it in your bluetooth settings. I also like to use bluetoothctl and then devices list and it'll show you what devices have been picked up by the scanner or paired previously and what their MAC addresses are.
7) Next, you run the bluesnarfer program. The general usage is
./bluesnarfer -b <MAC_ADDR> [options]
For example, to list device info, run
./bluesnarfer -b <MAC_ADDR> -i
Once you get that working, you can test a bunch of AT commands (read contacts, read recent calls, make calls, send text messages, etc). Here's a good reference I found for AT commands: https://www.sparkfun.com/datasheets/Cellular%20Modules/AT_Commands_Reference_Guide_r0.pdf (Note that your phone may not support all of the AT commands listed in the reference guide.)
8) If running the above command doesn't work, you probably need to figure out the right channel to use. The default channel used is 17 (see src/bluesnarfer.c#L59).
To see what channels are available, I used the sdptool:
sdptool browse --tree --l2cap <MAC_ADDRESS>
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - kimbo/bluesnarfer: Bluetooth hack, forked from https://gitlab.com/kalilinux/packages/bluesnarfer/
Bluetooth hack, forked from https://gitlab.com/kalilinux/packages/bluesnarfer/ - kimbo/bluesnarfer
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
2020 is coming to an end and Adobe alerts consumers that Flash support will be discontinued too.
#Updates
#Updates
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦bEST Wordlist Generator :
> > [Cupp](https://github.com/Mebus/cupp.git)
> >WordlistCreator](https://github.com/Z4nzu/wlcreator)
> >[Goblin WordGenerator](https://github.com/UndeadSec/GoblinWordGenerator.git)
> >[Password list (1.4 Billion Clear Text Password)](https://github.com/Viralmaniar/SMWYG-Show-Me-What-You-Got)
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦bEST Wordlist Generator :
> > [Cupp](https://github.com/Mebus/cupp.git)
> >WordlistCreator](https://github.com/Z4nzu/wlcreator)
> >[Goblin WordGenerator](https://github.com/UndeadSec/GoblinWordGenerator.git)
> >[Password list (1.4 Billion Clear Text Password)](https://github.com/Viralmaniar/SMWYG-Show-Me-What-You-Got)
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - Mebus/cupp: Common User Passwords Profiler (CUPP)
Common User Passwords Profiler (CUPP). Contribute to Mebus/cupp development by creating an account on GitHub.
Forwarded from UNDERCODE NEWS
In order to demonstrate the initial iPhone production line, Netizens released old images from 2007.
#Technologies
#Technologies
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
How to Compile the kernel :
1.
tar -Jxv -f linux**.tar.xz -C /target
cd /target
make help
2.
3.
N jobs co-work.
4.
5.
*note* that,
menuconfig.dependency : libncurse5, libncurse5-dev
xconfig.dependency : qt4-?
β β β Uππ»βΊπ«Δπ¬πβ β β β
How to Compile the kernel :
1.
tar -Jxv -f linux**.tar.xz -C /target
cd /target
make help
2.
make config || make oldconfig || make allyesconfig || make menuconfig || make xconfig
then it generats a .config file.3.
make -j N N jobs co-work.
4.
# make modules_install or make deb-pkg 5.
# make install or dpkg -i xx.deb *note* that,
menuconfig.dependency : libncurse5, libncurse5-dev
xconfig.dependency : qt4-?
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Is the web search style in Windows 10 too anti-human? Teaching you how to absolutely shut it down.
#Updates
#Updates
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
High-risk Windows vulnerability, Microsoft has actually been neglecting it for a year.
#Vulnerabilities
#Vulnerabilities
Forwarded from UNDERCODE NEWS
Intel's sales this year will hit 75 billion US dollars, the highest results in 52 years.
#Technologies
#Technologies
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Encrypt a disk with cryptsetup
1. prepare the empty disk (sdc)
2. parted sdc
# parted /dev/sdc
> mktable
> mkpart
3. format drive as luks
# cryptsetup luksFormat /dev/sdc1
4. open luks
# cryptsetup luksOpen /dev/sdc1 NAME
(where NAME is a mapped device name,
which will be seen at /dev/mapper/${NAME}
here we assume NAME=luks
)
# ls /dev/mapper/
** luks
5. format volume inside luks
# mkfs.ext4 /dev/mapper/luks
OR
# mkfs.ext4 /dev/dm-0
6. mount this ext4 filesystem
# mount /dev/dm-0 /MOUNT_POINT
7. umount filesystem
# umount /MOUNT_POINT
8. close luks
# cryptsetup luksClose /dev/dm-0
encrypt a disk image with luks
------------------------------
0. create my symlink
# ln -s /sbin/cryptsetup /sbin/luks
1. prepare a blank image file, by using dd or truncate
# truncate -s 1G luks.img
2. setup the image file as loop device
# losetup -f luks.img
3. Format this (virtual) device with luks header
# luks luksFormat /dev/loop0
P.S. input uppercase 'YES', then input your password for key slot 0
4. Open device
# luks open /dev/loop0 luks0
# lsblk
π¦Encrypt a disk with cryptsetup
1. prepare the empty disk (sdc)
2. parted sdc
# parted /dev/sdc
> mktable
> mkpart
3. format drive as luks
# cryptsetup luksFormat /dev/sdc1
4. open luks
# cryptsetup luksOpen /dev/sdc1 NAME
(where NAME is a mapped device name,
which will be seen at /dev/mapper/${NAME}
here we assume NAME=luks
)
# ls /dev/mapper/
** luks
5. format volume inside luks
# mkfs.ext4 /dev/mapper/luks
OR
# mkfs.ext4 /dev/dm-0
6. mount this ext4 filesystem
# mount /dev/dm-0 /MOUNT_POINT
7. umount filesystem
# umount /MOUNT_POINT
8. close luks
# cryptsetup luksClose /dev/dm-0
encrypt a disk image with luks
------------------------------
0. create my symlink
# ln -s /sbin/cryptsetup /sbin/luks
1. prepare a blank image file, by using dd or truncate
# truncate -s 1G luks.img
2. setup the image file as loop device
# losetup -f luks.img
3. Format this (virtual) device with luks header
# luks luksFormat /dev/loop0
P.S. input uppercase 'YES', then input your password for key slot 0
4. Open device
# luks open /dev/loop0 luks0
# lsblk
loop0 7:0 0 1G 0 loopβ β β Uππ»βΊπ«Δπ¬πβ β β β
ββluks0 253:0 0 1022M 0 crypt