Forwarded from UNDERCODE NEWS
Sberbank and Microsoft have created a robot that carries bags of money and can extract oil.
#Technologies
#Technologies
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Updated Network and Web Pentest Automation Framework
F E A T U R E S :
Many supported Services: Target most common TCP/UDP services (HTTP, FTP, SSH, SMB, Oracle, MS-SQL, MySQL, PostgreSQL, VNC, etc.).
Combine Power of Tools: Each security check is performed by a tool from the toolbox. Attacks are performed by chaining security checks.
Context Awareness: Security checks to run are selected and adapted according to the context of the target (i.e. detected technologies, credentials, vulnerabilities, etc.).
Reconnaissance: Automatic fingerprinting (product detection) of targeted services is performed.
CVE Lookup: When product names and their versions are detected, a vulnerability lookup is performed on online CVE
databases (using Vulners & CVE Details).
Vulnerability Scanning: Automatically check for common vulnerabilities and attempt to perform some exploitations (auto-pwn).
Brute-force Attack: Automatically check for default/common credentials on the service and perform dictionnary attack if necessary. Wordlists are optimized according to the targeted services.
Post-authentication Testing: Automatically perform some post-exploitation checks when valid credentials have been found.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/koutto/jok3r.git
2) cd jok3r
3) Show all the tools in the toolbox:
python3 jok3r.py toolbox --show-all
4) Install all the tools in the toolbox (already done in Docker container):
python3 jok3r.py toolbox --install-all --auto
5)Update all the tools in the toolbox and prompt each time to check update:
6) python3 jok3r.py toolbox --update-all
Update all the tools in the toolbox without any prompt:
python3 jok3r.py toolbox --update-all --auto
7) Security Testing
Create a new mission in local database:
python3 jok3r.py db
jok3rdb[default]> mission -a mayhem
[+] Mission "mayhem" successfully added
[*] Selected mission is now mayhem
jok3rdb[mayhem]>
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Updated Network and Web Pentest Automation Framework
F E A T U R E S :
Many supported Services: Target most common TCP/UDP services (HTTP, FTP, SSH, SMB, Oracle, MS-SQL, MySQL, PostgreSQL, VNC, etc.).
Combine Power of Tools: Each security check is performed by a tool from the toolbox. Attacks are performed by chaining security checks.
Context Awareness: Security checks to run are selected and adapted according to the context of the target (i.e. detected technologies, credentials, vulnerabilities, etc.).
Reconnaissance: Automatic fingerprinting (product detection) of targeted services is performed.
CVE Lookup: When product names and their versions are detected, a vulnerability lookup is performed on online CVE
databases (using Vulners & CVE Details).
Vulnerability Scanning: Automatically check for common vulnerabilities and attempt to perform some exploitations (auto-pwn).
Brute-force Attack: Automatically check for default/common credentials on the service and perform dictionnary attack if necessary. Wordlists are optimized according to the targeted services.
Post-authentication Testing: Automatically perform some post-exploitation checks when valid credentials have been found.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/koutto/jok3r.git
2) cd jok3r
3) Show all the tools in the toolbox:
python3 jok3r.py toolbox --show-all
4) Install all the tools in the toolbox (already done in Docker container):
python3 jok3r.py toolbox --install-all --auto
5)Update all the tools in the toolbox and prompt each time to check update:
6) python3 jok3r.py toolbox --update-all
Update all the tools in the toolbox without any prompt:
python3 jok3r.py toolbox --update-all --auto
7) Security Testing
Create a new mission in local database:
python3 jok3r.py db
jok3rdb[default]> mission -a mayhem
[+] Mission "mayhem" successfully added
[*] Selected mission is now mayhem
jok3rdb[mayhem]>
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - koutto/jok3r: Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework
Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework - koutto/jok3r
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦FULL METASPLOIT COURSES :
https://www.youtube.com/watch?v=hJEzf3DPRvc
18 MIN
https://www.youtube.com/watch?v=cqxEXqizcHc
https://youtu.be/_C7nRJ6WsmI
4 HOURS
https://null-byte.wonderhowto.com/how-to/hack-like-pro-evade-av-software-with-shellter-0168504/
42 min
https://youtu.be/Zx9Jy7z0zCM
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦FULL METASPLOIT COURSES :
https://www.youtube.com/watch?v=hJEzf3DPRvc
18 MIN
https://www.youtube.com/watch?v=cqxEXqizcHc
https://youtu.be/_C7nRJ6WsmI
4 HOURS
https://null-byte.wonderhowto.com/how-to/hack-like-pro-evade-av-software-with-shellter-0168504/
42 min
https://youtu.be/Zx9Jy7z0zCM
β β β Uππ»βΊπ«Δπ¬πβ β β β
YouTube
Hacking Tutorial 3: Metasploit Framework introduction and first attack
This video shows how to harness the power of Metasploit Framework - the ultimate penetration testing tool. Metasploit has a modular structure supporting thousands of auxiliary tools (e.g. scanning), exploits, payloads and so forth.
The video demonstratesβ¦
The video demonstratesβ¦
Forwarded from UNDERCODE NEWS
A module application used by millions of students around the world expose a new vulnerability.
#Vulnerabilities
#Vulnerabilities
Forwarded from UNDERCODE NEWS
A telecommunications protection legislation was adopted by Finland, stating it does not threaten a business or region.
#international
#international
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π§ Installing and configuring StrongSwan VPN on Ubuntu 20.04:
1) VPN is used to create a private network from a public internet connection to protect your data.
2) strongSwan is one of the most famous VPN software that supports various operating systems including Linux, OS X, FreeBSD, Windows, Android and iOS.
It uses the IKEv1 and IKEv2 protocols to securely establish a connection.
3) You can extend its functionality with built-in plugins.
4) You can install it with other required components using the following command:
apt-get install install strongswan strongswan-pki libcharon-extra-plugins libcharon-extauth-plugins libstrongswan-extra-plugins -y
Once all packages have been installed, you can proceed to create a CA certificate.
π¦How to create a certificate for a VPN server
1) Then you will need to generate a certificate and key for the VPN server to authenticate the server on the client side.
First, create a private key for the root CA with the following command:
ipsec pki --gen --size 4096 --type rsa --outform pem> /etc/ipsec.d/private/ca.key.pem
2) Then create a root CA and sign it using the above key:
ipsec pki --self --in /etc/ipsec.d/private/ca.key.pem --type rsa --dn "CN = My VPN Server CA" --ca --lifetime 3650 --outform pem> / etc / ipsec.d / cacerts / ca.cert.pem
3) Then create a private key for the VPN server using the following command:
ipsec pki --gen --size 4096 --type rsa --outform pem> /etc/ipsec.d/private/server.key.pem
4) Finally, generate a server certificate using the following command:
ipsec pki --pub --in /etc/ipsec.d/private/server.key.pem --type rsa | ipsec pki --issue --lifetime 2750 --cacert /etc/ipsec.d/cacerts/ca.cert.pem --cakey /etc/ipsec.d/private/ca.key.pem --dn "CN = vpn .domain.com "--san =" vpn.domain.com "--flag serverAuth --flag ikeIntermediate --outform pem> /etc/ipsec.d/certs/server.cert.pem
5) At this point, all certificates are ready for your VPN server.
StrongSwan VPN setup
The default strongswan configuration file is /etc/ipsec.conf.
We can back up the main config file and create a new file:
mv /etc/ipsec.conf /etc/ipsec.conf-bak
Then create a new config file:
nano /etc/ipsec.conf
Add the following config and conn settings:
config setup
charondebug = "ike 2, knl 2, cfg 2, net 2, esp 2, dmn 2, mgr 2"
strictcrlpolicy = no
uniqueids = yes
cachecrls = no
conn ipsec-ikev2-vpn
auto = add
compress = no
type = tunnel
keyexchange = ikev2
fragmentation = yes
forceencaps = yes
dpdaction = clear
dpddelay = 300s
rekey = no
left =% any
leftid=@vpn.domain.com
leftcert = server.cert.pem
leftsendcert = always
leftsubnet = 0.0.0.0 / 0
right =% any
rightid =% any
rightauth = eap-mschapv2
rightsourceip = 10.10.10.0 / 24
rightdns = 8.8.8.8
rightsendcert = never
eap_identity =% identity
Save and close the /etc/ipsec.conf file.
Next, you will need to define the EAP user credentials and RSA private keys for authentication.
You can customize it by editing the /etc/ipsec.secrets file:
nano /etc/ipsec.secrets
Add the following line:
: RSA "server.key.pem"
vpnsecure: EAP "password"
Then restart the StrongSwan service as follows:
systemctl restart strongswan-starter
To enable StrongSwan to start at system boot, enter:
systemctl enable strongswan-starter
Check the status of the VPN server, enter:
systemctl status strongswan-starter
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π§ Installing and configuring StrongSwan VPN on Ubuntu 20.04:
1) VPN is used to create a private network from a public internet connection to protect your data.
2) strongSwan is one of the most famous VPN software that supports various operating systems including Linux, OS X, FreeBSD, Windows, Android and iOS.
It uses the IKEv1 and IKEv2 protocols to securely establish a connection.
3) You can extend its functionality with built-in plugins.
4) You can install it with other required components using the following command:
apt-get install install strongswan strongswan-pki libcharon-extra-plugins libcharon-extauth-plugins libstrongswan-extra-plugins -y
Once all packages have been installed, you can proceed to create a CA certificate.
π¦How to create a certificate for a VPN server
1) Then you will need to generate a certificate and key for the VPN server to authenticate the server on the client side.
First, create a private key for the root CA with the following command:
ipsec pki --gen --size 4096 --type rsa --outform pem> /etc/ipsec.d/private/ca.key.pem
2) Then create a root CA and sign it using the above key:
ipsec pki --self --in /etc/ipsec.d/private/ca.key.pem --type rsa --dn "CN = My VPN Server CA" --ca --lifetime 3650 --outform pem> / etc / ipsec.d / cacerts / ca.cert.pem
3) Then create a private key for the VPN server using the following command:
ipsec pki --gen --size 4096 --type rsa --outform pem> /etc/ipsec.d/private/server.key.pem
4) Finally, generate a server certificate using the following command:
ipsec pki --pub --in /etc/ipsec.d/private/server.key.pem --type rsa | ipsec pki --issue --lifetime 2750 --cacert /etc/ipsec.d/cacerts/ca.cert.pem --cakey /etc/ipsec.d/private/ca.key.pem --dn "CN = vpn .domain.com "--san =" vpn.domain.com "--flag serverAuth --flag ikeIntermediate --outform pem> /etc/ipsec.d/certs/server.cert.pem
5) At this point, all certificates are ready for your VPN server.
StrongSwan VPN setup
The default strongswan configuration file is /etc/ipsec.conf.
We can back up the main config file and create a new file:
mv /etc/ipsec.conf /etc/ipsec.conf-bak
Then create a new config file:
nano /etc/ipsec.conf
Add the following config and conn settings:
config setup
charondebug = "ike 2, knl 2, cfg 2, net 2, esp 2, dmn 2, mgr 2"
strictcrlpolicy = no
uniqueids = yes
cachecrls = no
conn ipsec-ikev2-vpn
auto = add
compress = no
type = tunnel
keyexchange = ikev2
fragmentation = yes
forceencaps = yes
dpdaction = clear
dpddelay = 300s
rekey = no
left =% any
leftid=@vpn.domain.com
leftcert = server.cert.pem
leftsendcert = always
leftsubnet = 0.0.0.0 / 0
right =% any
rightid =% any
rightauth = eap-mschapv2
rightsourceip = 10.10.10.0 / 24
rightdns = 8.8.8.8
rightsendcert = never
eap_identity =% identity
Save and close the /etc/ipsec.conf file.
Next, you will need to define the EAP user credentials and RSA private keys for authentication.
You can customize it by editing the /etc/ipsec.secrets file:
nano /etc/ipsec.secrets
Add the following line:
: RSA "server.key.pem"
vpnsecure: EAP "password"
Then restart the StrongSwan service as follows:
systemctl restart strongswan-starter
To enable StrongSwan to start at system boot, enter:
systemctl enable strongswan-starter
Check the status of the VPN server, enter:
systemctl status strongswan-starter
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to enable packet forwarding linux:
Then you will need to configure your kernel to enable packet forwarding by editing the /etc/sysctl.conf file:
nano /etc/sysctl.conf
Uncomment the following lines:
net.ipv4.ip_forward = 1
net.ipv6.conf.all.forwarding = 1
net.ipv4.conf.all.accept_redirects = 0
net.ipv4.conf.all.send_redirects = 0
Save and close the file, then reload the new settings using the following command:
sysctl -p
StrongSwan client installation and configuration
In this section, we will install the StrongSwan client on a remote computer and connect to the VPN server.
First install all required packages using the following command:
apt-get install strongswan libcharon-extra-plugins -y
After installing all the packages, stop the StrongSwan service with the following command:
systemctl stop strongswan-starter
Then you will need to copy the ca.cert.pem file from the VPN server to the /etc/ipsec.d/cacerts/ directory.
You can copy it using the SCP command as shown below:
scp root@vpn.domain.com: /etc/ipsec.d/cacerts/ca.cert.pem /etc/ipsec.d/cacerts/
Use the /etc/ipsec.secrets file to configure VPN client authentication:
nano /etc/ipsec.secrets
Add the following line:
vpnsecure: EAP "password"
Then edit the main strongSwan config file:
nano /etc/ipsec.conf
Add the following lines corresponding to your domain and password that you specified in /etc/ipsec.secrets.
conn ipsec-ikev2-vpn-client
auto = start
right = vpn.domain.com
rightid = vpn.domain.com
rightsubnet = 0.0.0.0 / 0
rightauth = pubkey
leftsourceip =% config
leftid = vpnsecure
leftauth = eap-mschapv2
eap_identity =% identity
Now start the StrongSwan VPN service using the following command:
systemctl start strongswan-starter
Then check the status of the VPN connection with the following command:
ipsec status
You should get the following output:
Security Associations (1 up, 0 connecting):
ipsec-ikev2-vpn-client [1]: ESTABLISHED 28 seconds ago, 104.245.32.158 [vpnsecure] ... 104.245.33.84 [vpn.domain.com]
ipsec-ikev2-vpn-client {1}: INSTALLED, TUNNEL, reqid 1, ESP in UDP SPIs: ca6f451c_i ca9f9ff7_o
ipsec-ikev2-vpn-client {1}: 10.10.10.1/32 === 0.0.0.0/0
The above output shows that a VPN connection is established between the client and the server, and the client computer is assigned an IP address of 10.10.10.1.
You can also confirm your new IP address with the following command:
ip a
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to enable packet forwarding linux:
Then you will need to configure your kernel to enable packet forwarding by editing the /etc/sysctl.conf file:
nano /etc/sysctl.conf
Uncomment the following lines:
net.ipv4.ip_forward = 1
net.ipv6.conf.all.forwarding = 1
net.ipv4.conf.all.accept_redirects = 0
net.ipv4.conf.all.send_redirects = 0
Save and close the file, then reload the new settings using the following command:
sysctl -p
StrongSwan client installation and configuration
In this section, we will install the StrongSwan client on a remote computer and connect to the VPN server.
First install all required packages using the following command:
apt-get install strongswan libcharon-extra-plugins -y
After installing all the packages, stop the StrongSwan service with the following command:
systemctl stop strongswan-starter
Then you will need to copy the ca.cert.pem file from the VPN server to the /etc/ipsec.d/cacerts/ directory.
You can copy it using the SCP command as shown below:
scp root@vpn.domain.com: /etc/ipsec.d/cacerts/ca.cert.pem /etc/ipsec.d/cacerts/
Use the /etc/ipsec.secrets file to configure VPN client authentication:
nano /etc/ipsec.secrets
Add the following line:
vpnsecure: EAP "password"
Then edit the main strongSwan config file:
nano /etc/ipsec.conf
Add the following lines corresponding to your domain and password that you specified in /etc/ipsec.secrets.
conn ipsec-ikev2-vpn-client
auto = start
right = vpn.domain.com
rightid = vpn.domain.com
rightsubnet = 0.0.0.0 / 0
rightauth = pubkey
leftsourceip =% config
leftid = vpnsecure
leftauth = eap-mschapv2
eap_identity =% identity
Now start the StrongSwan VPN service using the following command:
systemctl start strongswan-starter
Then check the status of the VPN connection with the following command:
ipsec status
You should get the following output:
Security Associations (1 up, 0 connecting):
ipsec-ikev2-vpn-client [1]: ESTABLISHED 28 seconds ago, 104.245.32.158 [vpnsecure] ... 104.245.33.84 [vpn.domain.com]
ipsec-ikev2-vpn-client {1}: INSTALLED, TUNNEL, reqid 1, ESP in UDP SPIs: ca6f451c_i ca9f9ff7_o
ipsec-ikev2-vpn-client {1}: 10.10.10.1/32 === 0.0.0.0/0
The above output shows that a VPN connection is established between the client and the server, and the client computer is assigned an IP address of 10.10.10.1.
You can also confirm your new IP address with the following command:
ip a
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦C/ C++ COURSES:
https://www.youtube.com/watch?v=vLnPwxZdW4Y&vl=en
4H
https://www.youtube.com/watch?v=MhYECGUzdA4
7 H
https://www.youtube.com/watch?v=_bYFu9mBnr4
10 H
https://www.youtube.com/watch?v=Umm1ZQ5ltZw
2H
https://www.youtube.com/watch?v=mUQZ1qmKlLY&vl=en
9H
https://www.youtube.com/watch?v=BClS40yzssA
1H
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦C/ C++ COURSES:
https://www.youtube.com/watch?v=vLnPwxZdW4Y&vl=en
4H
https://www.youtube.com/watch?v=MhYECGUzdA4
7 H
https://www.youtube.com/watch?v=_bYFu9mBnr4
10 H
https://www.youtube.com/watch?v=Umm1ZQ5ltZw
2H
https://www.youtube.com/watch?v=mUQZ1qmKlLY&vl=en
9H
https://www.youtube.com/watch?v=BClS40yzssA
1H
β β β Uππ»βΊπ«Δπ¬πβ β β β
YouTube
C++ Tutorial for Beginners - Full Course
This course will give you a full introduction into all of the core concepts in C++.
Want more from Mike? He's starting a coding RPG/Bootcamp - https://simulator.dev/
β€οΈ Support for this channel comes from our friends at Scrimba β the coding platform that'sβ¦
Want more from Mike? He's starting a coding RPG/Bootcamp - https://simulator.dev/
β€οΈ Support for this channel comes from our friends at Scrimba β the coding platform that'sβ¦
Forwarded from UNDERCODE NEWS
A telework system for LGWAN made by a genius programmer, behind the scenes that 460 local governments started using.
#Technologies
#Technologies
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Cracking pdf and videos :
http://index-of.co.uk/Hacking-Coleccion/135%20-%20Password%20Cracking%20Techniques%20%5B-PUNISHER-%5D.pdf
https://www.youtube.com/watch?v=eq097dEB8Sw
https://medium.com/@mail.anonymous.root/crack-open-a-password-protected-pdf-using-pdfcrack-882f84aa2c4f
https://www.youtube.com/watch?v=zRqWYMguw04
https://www.youtube.com/watch?v=S_07boKGbbU
https://www.youtube.com/watch?v=gTIyI9OaIIs
https://repo.zenk-security.com/Reversing%20.%20cracking/Cracking_Passwords_Guide.pdf
enjoy
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Cracking pdf and videos :
http://index-of.co.uk/Hacking-Coleccion/135%20-%20Password%20Cracking%20Techniques%20%5B-PUNISHER-%5D.pdf
https://www.youtube.com/watch?v=eq097dEB8Sw
https://medium.com/@mail.anonymous.root/crack-open-a-password-protected-pdf-using-pdfcrack-882f84aa2c4f
https://www.youtube.com/watch?v=zRqWYMguw04
https://www.youtube.com/watch?v=S_07boKGbbU
https://www.youtube.com/watch?v=gTIyI9OaIIs
https://repo.zenk-security.com/Reversing%20.%20cracking/Cracking_Passwords_Guide.pdf
enjoy
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS