Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
A new online registry website will be created by Russia ministry, for repeat traffic offenders.
#International
#International
β β β Uππ»βΊπ«Δπ¬πβ β β β
New release for this hacking tool :
ARP Poisoning and Sniffing
DHCP Discover and Starvation
Subdomains Identification
Certificate Cloning
TCP Analysis (ISN, Flags)
Username check on social networks
Web Techonologies Identification
and a lot more!
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) $ python3 -m pip install --upgrade git+https://github.com/fportantier/habu.git
2) This must works on any system that has Python 3 installed.
Note: On some systems (like Microsoft Windows) you must adjust the command to point to the correct path of the Python executable.
3) Upgrade
Now we have a command to upgrade directly from the Git repo and clean any old command that not longer exists or that has been renamed.
$ habu.upgrade
Β»for example usage:
https://github.com/fportantier/habu
β β β Uππ»βΊπ«Δπ¬πβ β β β
New release for this hacking tool :
ARP Poisoning and Sniffing
DHCP Discover and Starvation
Subdomains Identification
Certificate Cloning
TCP Analysis (ISN, Flags)
Username check on social networks
Web Techonologies Identification
and a lot more!
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) $ python3 -m pip install --upgrade git+https://github.com/fportantier/habu.git
2) This must works on any system that has Python 3 installed.
Note: On some systems (like Microsoft Windows) you must adjust the command to point to the correct path of the Python executable.
3) Upgrade
Now we have a command to upgrade directly from the Git repo and clean any old command that not longer exists or that has been renamed.
$ habu.upgrade
Β»for example usage:
https://github.com/fportantier/habu
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - fportantier/habu: Hacking Toolkit
Hacking Toolkit. Contribute to fportantier/habu development by creating an account on GitHub.
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Google workers declared the formation of a labor union and tensions between management have increased.
#International
#International
Forwarded from DailyCVE
π΅chromium:Multiple vulnerabilities debian, kali CVE-2019-8075 CVE-2020-6510 CVE-2020-6511 CVE-2020-6512 :
https://dailycve.com/chromiummultiple-vulnerabilities-debian-kali-cve-2019-8075-cve-2020-6510-cve-2020-6511-cve-2020
https://dailycve.com/chromiummultiple-vulnerabilities-debian-kali-cve-2019-8075-cve-2020-6510-cve-2020-6511-cve-2020
Dailycve
chromium:Multiple vulnerabilities debian, kali CVE-2019-8075 CVE-2020-6510 CVE-2020-6511 CVE-2020-6512 | CVE
Details:
Debian Security Advisory DSA-4824-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
January 01, 2021 https://www.debian.org/security/faq
- - ----------------β¦
Debian Security Advisory DSA-4824-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
January 01, 2021 https://www.debian.org/security/faq
- - ----------------β¦
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SO helping for pentesters:
steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
F E A T U R E S :
simple CLI with the ability to run pure Nmap engine
predefined scans included in the modules
support Nmap Scripting Engine (NSE) with scripts arguments
TOR support (with proxychains)
multiple scans at one time
at this point: 31 modules with 459 scan profiles
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
For any linux open terminal and type:
# Clone this repository
1) git clone --recursive https://github.com/trimstray/sandmap
# Go into the repository
2) cd sandmap
# Install
3) ./setup.sh install
# Run the app
4) sandmap
π¦The etc/main.cfg configuration file has the following structure:
# shellcheck shell=bash
# Specifies the default destination.
# Examples:
# - dest="127.0.0.1,8.8.8.8"
dest="127.0.0.1"
# Specifies the extended Nmap parameters.
# Examples:
# - params="--script ssl-ccs-injection -p 443"
params=""
# Specifies the default output type and path.
# Examples:
# - report="xml"
report=""
# Specifies the TOR connection.
# Examples:
# - tor="true"
tor=""
# Specifies the terminal type.
# Examples:
# - terminal="internal"
terminal="internal"
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SO helping for pentesters:
steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
F E A T U R E S :
simple CLI with the ability to run pure Nmap engine
predefined scans included in the modules
support Nmap Scripting Engine (NSE) with scripts arguments
TOR support (with proxychains)
multiple scans at one time
at this point: 31 modules with 459 scan profiles
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
For any linux open terminal and type:
# Clone this repository
1) git clone --recursive https://github.com/trimstray/sandmap
# Go into the repository
2) cd sandmap
# Install
3) ./setup.sh install
# Run the app
4) sandmap
π¦The etc/main.cfg configuration file has the following structure:
# shellcheck shell=bash
# Specifies the default destination.
# Examples:
# - dest="127.0.0.1,8.8.8.8"
dest="127.0.0.1"
# Specifies the extended Nmap parameters.
# Examples:
# - params="--script ssl-ccs-injection -p 443"
params=""
# Specifies the default output type and path.
# Examples:
# - report="xml"
report=""
# Specifies the TOR connection.
# Examples:
# - tor="true"
tor=""
# Specifies the terminal type.
# Examples:
# - terminal="internal"
terminal="internal"
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - trimstray/sandmap: Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles. - trimstray/sandmap
Forwarded from UNDERCODE NEWS
A new issue due to a malfunction of the mechanism at Shizuoka Branch, unable to earn money at Seven Bank ATMs.
#International
#International
Forwarded from UNDERCODE NEWS
Forwarded from DailyCVE
π΅influxdb: Unauthorised access - Remote/unauthenticated:
https://dailycve.com/influxdb-unauthorised-access-remoteunauthenticated
https://dailycve.com/influxdb-unauthorised-access-remoteunauthenticated
Dailycve
influxdb: Unauthorised access - Remote/unauthenticated | CVE
Details:
It was discovered that incorrect validation of JWT tokens in InfluxDB, a time series, metrics, and analytics database, could result in
authentication bypass.
For the stable distribution (buster), this problem has been fixed in
version 1.6.4-1+deb10u1.β¦
It was discovered that incorrect validation of JWT tokens in InfluxDB, a time series, metrics, and analytics database, could result in
authentication bypass.
For the stable distribution (buster), this problem has been fixed in
version 1.6.4-1+deb10u1.β¦
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ DNS SAD cache poisoning: interim fix for Linux servers and desktops :
#! / usr / bin / env bash
#
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
###########################################
#
# Three options for installation. Choose one of the following:
#
# 1. Copy to /etc/cron.minutely
#
# 2. Copy the script to the DNS server. Create a file in /etc/cron.d with
# the following syntax:
#
# * * * * * root /path/to/icmp_ratelimit.sh> / dev / null 2> & 1
#
# 3. Create a user cron entry while using
#
# * * * * * /path/to/icmp_ratelimit.sh> / dev / null 2> & 1
#
# - Change "/ path / to" to match the exact location of the script.
# - Finally, make sure it is executable: chmod + x /path/to/icmp_ratelimit.sh
#
seconds = "60"
while [[$ {seconds} -gt 0]]
do
echo $ ((500 + $ {RANDOM}% 1500))> / proc / sys / net / ipv4 / icmp_ratelimit
echo $ ((500 + $ {RANDOM}% 1500))> / proc / sys / net / ipv6 / icmp_ratelimit
sleep .95
done
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ DNS SAD cache poisoning: interim fix for Linux servers and desktops :
#! / usr / bin / env bash
#
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
###########################################
#
# Three options for installation. Choose one of the following:
#
# 1. Copy to /etc/cron.minutely
#
# 2. Copy the script to the DNS server. Create a file in /etc/cron.d with
# the following syntax:
#
# * * * * * root /path/to/icmp_ratelimit.sh> / dev / null 2> & 1
#
# 3. Create a user cron entry while using
crontab -e#
# * * * * * /path/to/icmp_ratelimit.sh> / dev / null 2> & 1
#
# - Change "/ path / to" to match the exact location of the script.
# - Finally, make sure it is executable: chmod + x /path/to/icmp_ratelimit.sh
#
seconds = "60"
while [[$ {seconds} -gt 0]]
do
echo $ ((500 + $ {RANDOM}% 1500))> / proc / sys / net / ipv4 / icmp_ratelimit
echo $ ((500 + $ {RANDOM}% 1500))> / proc / sys / net / ipv6 / icmp_ratelimit
sleep .95
done
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
The stocks that can be exposed to the record-breaking virtual currency have soared more than Bitcoin.
#International
#International
Forwarded from DailyCVE
π΅CVE-2020-1909 Whatsapp memory corruption, crashes and potentially code execution:
https://dailycve.com/cve-2020-1909-whatsapp-memory-corruption-crashes-and-potentially-code-execution
https://dailycve.com/cve-2020-1909-whatsapp-memory-corruption-crashes-and-potentially-code-execution
Forwarded from UNDERCODE TESTING
An animation of the pairing process shows the true appearance of Appleβs AirTags tracker.
#Technologies
MORE DETAILS - https://undercodenews.com/an-animation-of-the-pairing-process-shows-the-true-appearance-of-apples-airtags-tracker/04/01/2021/
#Technologies
MORE DETAILS - https://undercodenews.com/an-animation-of-the-pairing-process-shows-the-true-appearance-of-apples-airtags-tracker/04/01/2021/
Forwarded from UNDERCODE TESTING
π΅WebChat bot by Microsoft, Send Box takes up entire iFrame in iOS Bug:
https://dailycve.com/webchat-bot-microsoft-send-box-takes-entire-iframe-ios-bug
https://dailycve.com/webchat-bot-microsoft-send-box-takes-entire-iframe-ios-bug
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SOURCES CODES & BINARY FOR HACKING :
[BPF for Ultrix](http://www.tcpdump.org/other/bpfext42.tar.Z): A distribution of BPF for Ultrix 4.2, with both source code and binary modules.
>>BPF+](http://www.cs.berkeley.edu/~abegel/sigcomm99/bpf+.ps): Exploiting Global Data-flow Optimization in a Generalized Packet Filter Architecture By Andrew Begel, Steven McCanne, and Susan Graham.
>>FFT-FGN-C](http://ita.ee.lbl.gov/html/contrib/fft_fgn_c.html): is a program for synthesizing a type of self-similar process known as fractional Gaussian noise. The program is fast but approximate. Fractional Gaussian noise is only one type of self-similar process. When using this program for synthesizing network traffic, you must keep in mind that it may be that the traffic you seek is better modeled using one of the other processes.
>>Haka](http://www.haka-security.org/): An open source security oriented language which allows to describe protocols and apply security policies on (live) captured traffic. The scope of Haka language is twofold. First of all, it allows to write security rules in order to filter/alter/drop unwanted packets and log and report malicious activities. Second, Haka features a grammar enabling to specify network protocols and their underlying state machine.
>>RIPE-NCC Hadoop for PCAP](https://github.com/RIPE-NCC/hadoop-pcap): A Hadoop library to read packet capture (PCAP) files. Bundles the code used to read PCAPs. Can be used within MapReduce jobs to natively read PCAP files. Also features a Hive Serializer/Deserializer (SerDe) to query PCAPs using SQL like commands.
>>Traffic Data Repository at the WIDE Project](http://www.sonycsl.co.jp/person/kjc/papers/freenix2000/): It becomes increasingly important for both network researchers and operators to know the trend of network traffic and to find anomaly in their network traffic. This paper describes an on-going effort within the WIDE project to collect a set of free tools to build a traffic data repository containing detailed information of our backbone traffic. Traffic traces are collected by tcpdump and, after removing privacy information, the traces are made open to the public. We review the issues on user privacy, and then, the tools used to build the WIDE traffic repository. We will report the current status and findings in the early stage of our IPv6 deployment.
Usenix93 Paper on BPF](ftp://ftp.ee.lbl.gov/papers/bpf-usenix93.ps.Z): The libpcap interface supports a filtering mechanism based on the architecture in the BSD packet filter. BPF is described in the 1993 Winter Usenix paper "The BSD Packet Filter: A New Architecture for User-level Packet Capture".
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SOURCES CODES & BINARY FOR HACKING :
[BPF for Ultrix](http://www.tcpdump.org/other/bpfext42.tar.Z): A distribution of BPF for Ultrix 4.2, with both source code and binary modules.
>>BPF+](http://www.cs.berkeley.edu/~abegel/sigcomm99/bpf+.ps): Exploiting Global Data-flow Optimization in a Generalized Packet Filter Architecture By Andrew Begel, Steven McCanne, and Susan Graham.
>>FFT-FGN-C](http://ita.ee.lbl.gov/html/contrib/fft_fgn_c.html): is a program for synthesizing a type of self-similar process known as fractional Gaussian noise. The program is fast but approximate. Fractional Gaussian noise is only one type of self-similar process. When using this program for synthesizing network traffic, you must keep in mind that it may be that the traffic you seek is better modeled using one of the other processes.
>>Haka](http://www.haka-security.org/): An open source security oriented language which allows to describe protocols and apply security policies on (live) captured traffic. The scope of Haka language is twofold. First of all, it allows to write security rules in order to filter/alter/drop unwanted packets and log and report malicious activities. Second, Haka features a grammar enabling to specify network protocols and their underlying state machine.
>>RIPE-NCC Hadoop for PCAP](https://github.com/RIPE-NCC/hadoop-pcap): A Hadoop library to read packet capture (PCAP) files. Bundles the code used to read PCAPs. Can be used within MapReduce jobs to natively read PCAP files. Also features a Hive Serializer/Deserializer (SerDe) to query PCAPs using SQL like commands.
>>Traffic Data Repository at the WIDE Project](http://www.sonycsl.co.jp/person/kjc/papers/freenix2000/): It becomes increasingly important for both network researchers and operators to know the trend of network traffic and to find anomaly in their network traffic. This paper describes an on-going effort within the WIDE project to collect a set of free tools to build a traffic data repository containing detailed information of our backbone traffic. Traffic traces are collected by tcpdump and, after removing privacy information, the traces are made open to the public. We review the issues on user privacy, and then, the tools used to build the WIDE traffic repository. We will report the current status and findings in the early stage of our IPv6 deployment.
Usenix93 Paper on BPF](ftp://ftp.ee.lbl.gov/papers/bpf-usenix93.ps.Z): The libpcap interface supports a filtering mechanism based on the architecture in the BSD packet filter. BPF is described in the 1993 Winter Usenix paper "The BSD Packet Filter: A New Architecture for User-level Packet Capture".
β β β Uππ»βΊπ«Δπ¬πβ β β β
Andrewbegel
Andrew Begel β Home Page
A theme for faculty profile page