β β β Uππ»βΊπ«Δπ¬πβ β β β
Hack bluetooth with kali :
Bluesnarfing, all modern devices have at least some kind of protection against bluesnarfing. For example, I tested this with a Samsung Galaxy s7, and it prompted be to give permission to bluesnarfer to read my contacts, make calls, etc. So at least it asked me for permission!
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
To install bluesnarfer:
1) git clone https://github.com/kimbo/bluesnarfer.git
2) cd bluesnarfer
3) make
4) ./bluesnarfer.
5) First, you need to make sure you can reach the device from your computer. Connect your computer to your phone with Bluetooth, then verify you can reach it using something like l2ping:
l2ping <MAC_ADDRESS>
6) If you're having trouble finding the MAC_ADDRESS, usually you'll be able to see it in your bluetooth settings. I also like to use bluetoothctl and then devices list and it'll show you what devices have been picked up by the scanner or paired previously and what their MAC addresses are.
7) Next, you run the bluesnarfer program. The general usage is
./bluesnarfer -b <MAC_ADDR> [options]
For example, to list device info, run
./bluesnarfer -b <MAC_ADDR> -i
Once you get that working, you can test a bunch of AT commands (read contacts, read recent calls, make calls, send text messages, etc). Here's a good reference I found for AT commands: https://www.sparkfun.com/datasheets/Cellular%20Modules/AT_Commands_Reference_Guide_r0.pdf (Note that your phone may not support all of the AT commands listed in the reference guide.)
8) If running the above command doesn't work, you probably need to figure out the right channel to use. The default channel used is 17 (see src/bluesnarfer.c#L59).
To see what channels are available, I used the sdptool:
sdptool browse --tree --l2cap <MAC_ADDRESS>
β β β Uππ»βΊπ«Δπ¬πβ β β β
Hack bluetooth with kali :
Bluesnarfing, all modern devices have at least some kind of protection against bluesnarfing. For example, I tested this with a Samsung Galaxy s7, and it prompted be to give permission to bluesnarfer to read my contacts, make calls, etc. So at least it asked me for permission!
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
To install bluesnarfer:
1) git clone https://github.com/kimbo/bluesnarfer.git
2) cd bluesnarfer
3) make
4) ./bluesnarfer.
5) First, you need to make sure you can reach the device from your computer. Connect your computer to your phone with Bluetooth, then verify you can reach it using something like l2ping:
l2ping <MAC_ADDRESS>
6) If you're having trouble finding the MAC_ADDRESS, usually you'll be able to see it in your bluetooth settings. I also like to use bluetoothctl and then devices list and it'll show you what devices have been picked up by the scanner or paired previously and what their MAC addresses are.
7) Next, you run the bluesnarfer program. The general usage is
./bluesnarfer -b <MAC_ADDR> [options]
For example, to list device info, run
./bluesnarfer -b <MAC_ADDR> -i
Once you get that working, you can test a bunch of AT commands (read contacts, read recent calls, make calls, send text messages, etc). Here's a good reference I found for AT commands: https://www.sparkfun.com/datasheets/Cellular%20Modules/AT_Commands_Reference_Guide_r0.pdf (Note that your phone may not support all of the AT commands listed in the reference guide.)
8) If running the above command doesn't work, you probably need to figure out the right channel to use. The default channel used is 17 (see src/bluesnarfer.c#L59).
To see what channels are available, I used the sdptool:
sdptool browse --tree --l2cap <MAC_ADDRESS>
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - kimbo/bluesnarfer: Bluetooth hack, forked from https://gitlab.com/kalilinux/packages/bluesnarfer/
Bluetooth hack, forked from https://gitlab.com/kalilinux/packages/bluesnarfer/ - kimbo/bluesnarfer
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
2020 is coming to an end and Adobe alerts consumers that Flash support will be discontinued too.
#Updates
#Updates
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦bEST Wordlist Generator :
> > [Cupp](https://github.com/Mebus/cupp.git)
> >WordlistCreator](https://github.com/Z4nzu/wlcreator)
> >[Goblin WordGenerator](https://github.com/UndeadSec/GoblinWordGenerator.git)
> >[Password list (1.4 Billion Clear Text Password)](https://github.com/Viralmaniar/SMWYG-Show-Me-What-You-Got)
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦bEST Wordlist Generator :
> > [Cupp](https://github.com/Mebus/cupp.git)
> >WordlistCreator](https://github.com/Z4nzu/wlcreator)
> >[Goblin WordGenerator](https://github.com/UndeadSec/GoblinWordGenerator.git)
> >[Password list (1.4 Billion Clear Text Password)](https://github.com/Viralmaniar/SMWYG-Show-Me-What-You-Got)
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - Mebus/cupp: Common User Passwords Profiler (CUPP)
Common User Passwords Profiler (CUPP). Contribute to Mebus/cupp development by creating an account on GitHub.
Forwarded from UNDERCODE NEWS
In order to demonstrate the initial iPhone production line, Netizens released old images from 2007.
#Technologies
#Technologies
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
How to Compile the kernel :
1.
tar -Jxv -f linux**.tar.xz -C /target
cd /target
make help
2.
3.
N jobs co-work.
4.
5.
*note* that,
menuconfig.dependency : libncurse5, libncurse5-dev
xconfig.dependency : qt4-?
β β β Uππ»βΊπ«Δπ¬πβ β β β
How to Compile the kernel :
1.
tar -Jxv -f linux**.tar.xz -C /target
cd /target
make help
2.
make config || make oldconfig || make allyesconfig || make menuconfig || make xconfig
then it generats a .config file.3.
make -j N N jobs co-work.
4.
# make modules_install or make deb-pkg 5.
# make install or dpkg -i xx.deb *note* that,
menuconfig.dependency : libncurse5, libncurse5-dev
xconfig.dependency : qt4-?
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Is the web search style in Windows 10 too anti-human? Teaching you how to absolutely shut it down.
#Updates
#Updates
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
High-risk Windows vulnerability, Microsoft has actually been neglecting it for a year.
#Vulnerabilities
#Vulnerabilities
Forwarded from UNDERCODE NEWS
Intel's sales this year will hit 75 billion US dollars, the highest results in 52 years.
#Technologies
#Technologies
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Encrypt a disk with cryptsetup
1. prepare the empty disk (sdc)
2. parted sdc
# parted /dev/sdc
> mktable
> mkpart
3. format drive as luks
# cryptsetup luksFormat /dev/sdc1
4. open luks
# cryptsetup luksOpen /dev/sdc1 NAME
(where NAME is a mapped device name,
which will be seen at /dev/mapper/${NAME}
here we assume NAME=luks
)
# ls /dev/mapper/
** luks
5. format volume inside luks
# mkfs.ext4 /dev/mapper/luks
OR
# mkfs.ext4 /dev/dm-0
6. mount this ext4 filesystem
# mount /dev/dm-0 /MOUNT_POINT
7. umount filesystem
# umount /MOUNT_POINT
8. close luks
# cryptsetup luksClose /dev/dm-0
encrypt a disk image with luks
------------------------------
0. create my symlink
# ln -s /sbin/cryptsetup /sbin/luks
1. prepare a blank image file, by using dd or truncate
# truncate -s 1G luks.img
2. setup the image file as loop device
# losetup -f luks.img
3. Format this (virtual) device with luks header
# luks luksFormat /dev/loop0
P.S. input uppercase 'YES', then input your password for key slot 0
4. Open device
# luks open /dev/loop0 luks0
# lsblk
π¦Encrypt a disk with cryptsetup
1. prepare the empty disk (sdc)
2. parted sdc
# parted /dev/sdc
> mktable
> mkpart
3. format drive as luks
# cryptsetup luksFormat /dev/sdc1
4. open luks
# cryptsetup luksOpen /dev/sdc1 NAME
(where NAME is a mapped device name,
which will be seen at /dev/mapper/${NAME}
here we assume NAME=luks
)
# ls /dev/mapper/
** luks
5. format volume inside luks
# mkfs.ext4 /dev/mapper/luks
OR
# mkfs.ext4 /dev/dm-0
6. mount this ext4 filesystem
# mount /dev/dm-0 /MOUNT_POINT
7. umount filesystem
# umount /MOUNT_POINT
8. close luks
# cryptsetup luksClose /dev/dm-0
encrypt a disk image with luks
------------------------------
0. create my symlink
# ln -s /sbin/cryptsetup /sbin/luks
1. prepare a blank image file, by using dd or truncate
# truncate -s 1G luks.img
2. setup the image file as loop device
# losetup -f luks.img
3. Format this (virtual) device with luks header
# luks luksFormat /dev/loop0
P.S. input uppercase 'YES', then input your password for key slot 0
4. Open device
# luks open /dev/loop0 luks0
# lsblk
loop0 7:0 0 1G 0 loopβ β β Uππ»βΊπ«Δπ¬πβ β β β
ββluks0 253:0 0 1022M 0 crypt
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
Shells programing and checkers :
>>iCode CNES for Shell(https://github.com/lequal/iCodeCNES) An open source static code analysis tool for Shell and Fortran (77 and 90).
>>kmdr(https://kmdr.sh) CLI tool for learning commands from your terminal. kmdr delivers a break down of commands with every attribute explained.
>>shellcheck(https://www.shellcheck.net) ShellCheck, a static analysis tool that gives warnings and suggestions for bash/sh shell scripts.
>>SwiftFormat(https://github.com/nicklockwood/SwiftFormat) A library and commandline formatting tool for reformatting Swift code.
>>SwiftLint(https://realm.github.io/SwiftLint) A tool to enforce Swift style and conventions.
>>Tailor(https://github.com/sleekbyte/tailor) :warning: A static analysis and lint tool for source code written in Apple's Swift programming language.
β β β Uππ»βΊπ«Δπ¬πβ β β β
Shells programing and checkers :
>>iCode CNES for Shell(https://github.com/lequal/iCodeCNES) An open source static code analysis tool for Shell and Fortran (77 and 90).
>>kmdr(https://kmdr.sh) CLI tool for learning commands from your terminal. kmdr delivers a break down of commands with every attribute explained.
>>shellcheck(https://www.shellcheck.net) ShellCheck, a static analysis tool that gives warnings and suggestions for bash/sh shell scripts.
>>SwiftFormat(https://github.com/nicklockwood/SwiftFormat) A library and commandline formatting tool for reformatting Swift code.
>>SwiftLint(https://realm.github.io/SwiftLint) A tool to enforce Swift style and conventions.
>>Tailor(https://github.com/sleekbyte/tailor) :warning: A static analysis and lint tool for source code written in Apple's Swift programming language.
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
One point is decided between Washington and Beijing: the strength of the technological firms is underestimated.
#International
#International
β β β Uππ»βΊπ«Δπ¬πβ β β β
4,2 rating free hacking course-- Hacking Academy: How to Monitor & Intercept Transmitted Data:
Learn how to intercept data in networks
Monitor transmitted data
Detect intrusions
See what is going on in your network
Learn how to read and filter data in Wireshark
https://www.udemy.com/course/hacking-academy-monitoring-transmitted-data/
4,2 rating free hacking course-- Hacking Academy: How to Monitor & Intercept Transmitted Data:
Learn how to intercept data in networks
Monitor transmitted data
Detect intrusions
See what is going on in your network
Learn how to read and filter data in Wireshark
https://www.udemy.com/course/hacking-academy-monitoring-transmitted-data/
Udemy
Free Ethical Hacking Tutorial - Hacking Academy: How to Monitor & Intercept Transmitted Data
Learn how to intercept data in your network. Monitor transmitted data and detect intrusion. Free hacking lesson. - Free Course