Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ Android Hacking Apps & tools : list 7
Β» Mobile Apps (Hack On Android)
[AndroRat](https://github.com/wszf/androrat) - Android Remote Administrative Tool
cspoilt - A tool that enumerates local hosts, finds vulnerabilities and their exploits, cracks Wi-Fi password, installs backdoors blablabla!!!
[Hackode](https://play.google.com/store/apps/details?id=com.techfond.hackode&hl=en) - All In One Android Pentest Tool
zANTI - Network mapping, port discovery, sniffing, packet manipulation, DoS, MITM blablabla!!
[FaceNiff](http://faceniff.ponury.net/) - Intercept and sniff WiFi network traffic for Social Media packets
Droidsheep - Android application that analyzes security in wireless networks and also captures Twitter, Linked, Facebook, and other accounts
[USB Cleaver](https://forum.xda-developers.com/showthread.php?t=1656497) - Silently recover information from a target Windows 2000 or higher computer, including password hashes, LSA secrets, IP information
Shark - Network Packate analysis tool
[DroidBox](https://github.com/pjlantz/droidbox) - Dynamic analysis of Android apps
Wi-Fi Kill - Disable other Users from WiFi Access
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ Android Hacking Apps & tools : list 7
Β» Mobile Apps (Hack On Android)
[AndroRat](https://github.com/wszf/androrat) - Android Remote Administrative Tool
cspoilt - A tool that enumerates local hosts, finds vulnerabilities and their exploits, cracks Wi-Fi password, installs backdoors blablabla!!!
[Hackode](https://play.google.com/store/apps/details?id=com.techfond.hackode&hl=en) - All In One Android Pentest Tool
zANTI - Network mapping, port discovery, sniffing, packet manipulation, DoS, MITM blablabla!!
[FaceNiff](http://faceniff.ponury.net/) - Intercept and sniff WiFi network traffic for Social Media packets
Droidsheep - Android application that analyzes security in wireless networks and also captures Twitter, Linked, Facebook, and other accounts
[USB Cleaver](https://forum.xda-developers.com/showthread.php?t=1656497) - Silently recover information from a target Windows 2000 or higher computer, including password hashes, LSA secrets, IP information
Shark - Network Packate analysis tool
[DroidBox](https://github.com/pjlantz/droidbox) - Dynamic analysis of Android apps
Wi-Fi Kill - Disable other Users from WiFi Access
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - wszf/androrat: androrat
androrat. Contribute to wszf/androrat development by creating an account on GitHub.
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ ways to connect to SSH and SCP through a proxy server (jump) on Linux :
1) SCP via proxy
Method 1: using scp with ProxyJump
In openssh package version 7.4p1-11 or newer, we can use the ProxyJump option to transfer files using a proxy server.
The scp command syntax for proxy file transfers is:
# scp -o "ProxyJump <User> @ <Proxy-Server>" <File-Name> <User> @ <Destination-Server>: <Destination-Path>
For instance:
# scp -o "ProxyJump user@10.23.100.70" dataFile.txt user@192.168.10.100: / tmp
user@10.23.100.70's password:
user@192.168.10.100's password:
dataFile.txt
Where my proxy is 10.23.100.70 and the target server is 192.168.10.100.
Method 2: using scp with ProxyCommand
SCP uses ssh as its main protocol and hence we can use ssh options along with scp commands.
2) Setting up SSH to make your life easier
The syntax for using the ProxyCommand option with the scp command is:
# scp -o "ProxyCommand ssh <user> @ <Proxy-Server> nc% h% p" <File-Name> <User @ <Destination-Server>: <Destination-Path>
Where:
% h will be replaced with the hostname to connect
% p will be replaced with port
3) When using the ProxyCommand parameter, make sure the nmap-ncat package is installed on the proxy that provides the nc command, otherwise the following error message will be displayed.
ssh_exchange_identification: Connection closed by remote host
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ ways to connect to SSH and SCP through a proxy server (jump) on Linux :
1) SCP via proxy
Method 1: using scp with ProxyJump
In openssh package version 7.4p1-11 or newer, we can use the ProxyJump option to transfer files using a proxy server.
The scp command syntax for proxy file transfers is:
# scp -o "ProxyJump <User> @ <Proxy-Server>" <File-Name> <User> @ <Destination-Server>: <Destination-Path>
For instance:
# scp -o "ProxyJump user@10.23.100.70" dataFile.txt user@192.168.10.100: / tmp
user@10.23.100.70's password:
user@192.168.10.100's password:
dataFile.txt
Where my proxy is 10.23.100.70 and the target server is 192.168.10.100.
Method 2: using scp with ProxyCommand
SCP uses ssh as its main protocol and hence we can use ssh options along with scp commands.
2) Setting up SSH to make your life easier
The syntax for using the ProxyCommand option with the scp command is:
# scp -o "ProxyCommand ssh <user> @ <Proxy-Server> nc% h% p" <File-Name> <User @ <Destination-Server>: <Destination-Path>
Where:
% h will be replaced with the hostname to connect
% p will be replaced with port
3) When using the ProxyCommand parameter, make sure the nmap-ncat package is installed on the proxy that provides the nc command, otherwise the following error message will be displayed.
ssh_exchange_identification: Connection closed by remote host
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Online fortune-telling is investigated by CCTV: touching porcelain with high technology and researching psychology is "money"!
#international
#international
Forwarded from UNDERCODE NEWS
Indian operators are asking the Department of Telecommunications to allow Huawei and ZTE to engage in 5G tests.
#international
#international
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦What is memory forensics?
1) Memory forensics is a forensic analysis of a computer's memory dump.
Its main use is to investigate sophisticated computer attacks that are stealthy enough not to leave data on a computer's hard drive.
2) Therefore, memory (RAM) must be analyzed for forensic information.
Necessary requirements
Instruments:
Volatility
Redline
Caploader
2) Command:
vol.py -f <memory_image> βprofile = <profile> envars | findstr COMPUTERNAME
3) Windows has many environment variables for starting processes that can retrieve reference data such as OS, TEMP, windir, Path ... and the currently used hostname will be stored in a variable named COMPUTERNAME.
4) You can view environment variables through Power Shell.
Command:
Get-ChildItem Env
5) Get a list of processes
Tool: Volatility
Command:
vol.py -f <file_image> βprofile == <profile_name> pslist
pslist: Finds and views a doubly linked list of processes and displays a summary of the data.
6) This method usually cannot show you terminated or hidden processes.
psscan: Scans for _EPROCESS objects rather than relying on a linked list.
7) This plugin can also find terminated and unrelated (hidden) processes.
psxview: finds processes using alternative process lists, so you can refer to different sources of information and identify malicious inconsistencies.
8) Extract hashes
Now, using the virtual offset SYSTEM and SAM, we can extract the hashes:
D: \ volatility> vol.py -f ch2.dmp βprofile = Win7SP1x86 hashdump -y 0x8b21c008 -s 0x9aad6148> hashes.txt
Volatility Foundation Volatility Framework 2.6.1
Let's take a look at the hashes.txt file:
Administrator: 500: aad3b435b51404eeaad3b435b51404ee: 31d6cfe0d16ae931b73c59d7e0c089c0 :::
Guest: 501: aad3b435b51404eeaad3b435b51404ee: 31d6cfe0d16ae931b73c59d7e0c089c0 :::
John Doe: 1000: aad3b435b51404eeaad3b435b51404ee: b9f917853e3dbf6e6831ecce60725930 :::
9) now crack hash with John
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦What is memory forensics?
1) Memory forensics is a forensic analysis of a computer's memory dump.
Its main use is to investigate sophisticated computer attacks that are stealthy enough not to leave data on a computer's hard drive.
2) Therefore, memory (RAM) must be analyzed for forensic information.
Necessary requirements
Instruments:
Volatility
Redline
Caploader
2) Command:
vol.py -f <memory_image> βprofile = <profile> envars | findstr COMPUTERNAME
3) Windows has many environment variables for starting processes that can retrieve reference data such as OS, TEMP, windir, Path ... and the currently used hostname will be stored in a variable named COMPUTERNAME.
4) You can view environment variables through Power Shell.
Command:
Get-ChildItem Env
5) Get a list of processes
Tool: Volatility
Command:
vol.py -f <file_image> βprofile == <profile_name> pslist
pslist: Finds and views a doubly linked list of processes and displays a summary of the data.
6) This method usually cannot show you terminated or hidden processes.
psscan: Scans for _EPROCESS objects rather than relying on a linked list.
7) This plugin can also find terminated and unrelated (hidden) processes.
psxview: finds processes using alternative process lists, so you can refer to different sources of information and identify malicious inconsistencies.
8) Extract hashes
Now, using the virtual offset SYSTEM and SAM, we can extract the hashes:
D: \ volatility> vol.py -f ch2.dmp βprofile = Win7SP1x86 hashdump -y 0x8b21c008 -s 0x9aad6148> hashes.txt
Volatility Foundation Volatility Framework 2.6.1
Let's take a look at the hashes.txt file:
Administrator: 500: aad3b435b51404eeaad3b435b51404ee: 31d6cfe0d16ae931b73c59d7e0c089c0 :::
Guest: 501: aad3b435b51404eeaad3b435b51404ee: 31d6cfe0d16ae931b73c59d7e0c089c0 :::
John Doe: 1000: aad3b435b51404eeaad3b435b51404ee: b9f917853e3dbf6e6831ecce60725930 :::
9) now crack hash with John
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
On the internet, personal information and medical records of 300,000 Muscovites recovering from coronavirus were found
#Leaks
#Leaks
Forwarded from UNDERCODE NEWS
Calculated cruelty: When the algorithm makes decisions instead of public bodies.
#Technologies #Analytiques
#Technologies #Analytiques
Forwarded from UNDERCODE NEWS
A blow to Cellcom: Expon in advanced negotiations with Pelephone for a network sharing agreement.
#international
#international
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How Password Tracking to Protect Against Hacks Works in iOS 14 ?
1) Monitoring passwords in Safari
If iCloud Keychain is configured to automatically enter passwords in mobile apps and web apps, Safari will alert you of cracked passwords when you visit the site. If you use iCloud Keychain to automatically enter logins and passwords on sites in this browser, after logging in, the browser will warn you about the need to change the password on the site:
>βThis password appeared in a data breach, which increases the risk of this account being compromised. You must change your password immediately. "
βThe iPhone can create a complex password for you. Do you want to change the password for [site name] "?
2) If you click on the "Change password on the site" button, a window will open in the "Passwords" menu in the system settings. Here you can enter and change the password on the site or use the "Forgot your password?" Command, depending on the options available on the site. iCloud Keychain will help you choose a strong password.
If the site has an option to sign in with an Apple account, it is suggested that you do just that instead of having iCloud Keychain automatically generate a password. Your Apple ID will be used to sign in to your account. This will limit the amount of information the site collects about you.
3) Monitoring passwords in settings
If you don't want to wait for a warning about vulnerable passwords from Safari, for which you need to sign in to your account on the site, you can open system preferences and see security recommendations. This way you can take action before it's too late. It's also useful if you store passwords in the iCloud Keychain but don't use it for automatic data entry, so you won't get warnings in Safari.
Open the "Passwords" section in the system settings. Or you can tell Siri to "Open Passwords." Use Face ID, Touch ID, or PIN to sign in.
4) After logging into your account, you will see an option to auto-complete passwords. Here you can choose iCloud Keychain or another password manager like LastPass to automatically enter your username and password. Below this option and before the list of accounts, you will see security recommendations. Open them up.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How Password Tracking to Protect Against Hacks Works in iOS 14 ?
1) Monitoring passwords in Safari
If iCloud Keychain is configured to automatically enter passwords in mobile apps and web apps, Safari will alert you of cracked passwords when you visit the site. If you use iCloud Keychain to automatically enter logins and passwords on sites in this browser, after logging in, the browser will warn you about the need to change the password on the site:
>βThis password appeared in a data breach, which increases the risk of this account being compromised. You must change your password immediately. "
βThe iPhone can create a complex password for you. Do you want to change the password for [site name] "?
2) If you click on the "Change password on the site" button, a window will open in the "Passwords" menu in the system settings. Here you can enter and change the password on the site or use the "Forgot your password?" Command, depending on the options available on the site. iCloud Keychain will help you choose a strong password.
If the site has an option to sign in with an Apple account, it is suggested that you do just that instead of having iCloud Keychain automatically generate a password. Your Apple ID will be used to sign in to your account. This will limit the amount of information the site collects about you.
3) Monitoring passwords in settings
If you don't want to wait for a warning about vulnerable passwords from Safari, for which you need to sign in to your account on the site, you can open system preferences and see security recommendations. This way you can take action before it's too late. It's also useful if you store passwords in the iCloud Keychain but don't use it for automatic data entry, so you won't get warnings in Safari.
Open the "Passwords" section in the system settings. Or you can tell Siri to "Open Passwords." Use Face ID, Touch ID, or PIN to sign in.
4) After logging into your account, you will see an option to auto-complete passwords. Here you can choose iCloud Keychain or another password manager like LastPass to automatically enter your username and password. Below this option and before the list of accounts, you will see security recommendations. Open them up.
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
What has to be done nowadays? Similar diagnostics for non-vulnerability and penetration checking
#Analytiques
#Analytiques
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to determine which services to restart on a Linux system:
1) Use the needrestart utility to determine which services need to be restarted after an upgrade.
2) Install the needrestart utility.
$ sudo apt install needrestart
3) Let's display the summary using the command line.
$ sudo needrestart --help
needrestart 3.4 - Restart daemons after library updates.
4) Check what needs to be restarted using convenient output:
$ sudo needrestart -b
NEEDRESTART-VER: 3.4
NEEDRESTART-KCUR: 4.19.0-8-amd64
NEEDRESTART-KEXP: 4.19.0-9-amd64
NEEDRESTART-KSTA: 3
NEEDRESTART-SVC: exim4.service
NEEDRESTART-SVC: postgresql@11-main.service
5) Verify what needs to be restarted using human-readable output (requires user interaction).
$ sudo needrestart -u NeedRestart :: UI :: stdio -rl
6) Restart the services.
$ sudo needrestart -u NeedRestart :: UI :: stdio -ra
7) Again, check if you need to restart.
$ sudo needrestart -b
NEEDRESTART-VER: 3.4
NEEDRESTART-KCUR: 4.19.0-8-amd64
NEEDRESTART-KEXP: 4.19.0-9-amd64
NEEDRESTART-KSTA: 3
8) Reboot your operating system and check if you need to restart.
$ sudo needrestart -b
NEEDRESTART-VER: 3.4
NEEDRESTART-KCUR: 4.19.0-9-amd64
NEEDRESTART-KEXP: 4.19.0-9-amd64
NEEDRESTART-KSTA: 1
9) $ sudo needrestart -u NeedRestart :: UI :: stdio -rl
Scanning processes ...
Scanning linux images ...
Running kernel seems to be up-to-date.
No services need to be restarted.
No containers need to be restarted.
No user sessions are running outdated binaries.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to determine which services to restart on a Linux system:
1) Use the needrestart utility to determine which services need to be restarted after an upgrade.
2) Install the needrestart utility.
$ sudo apt install needrestart
3) Let's display the summary using the command line.
$ sudo needrestart --help
needrestart 3.4 - Restart daemons after library updates.
4) Check what needs to be restarted using convenient output:
$ sudo needrestart -b
NEEDRESTART-VER: 3.4
NEEDRESTART-KCUR: 4.19.0-8-amd64
NEEDRESTART-KEXP: 4.19.0-9-amd64
NEEDRESTART-KSTA: 3
NEEDRESTART-SVC: exim4.service
NEEDRESTART-SVC: postgresql@11-main.service
5) Verify what needs to be restarted using human-readable output (requires user interaction).
$ sudo needrestart -u NeedRestart :: UI :: stdio -rl
6) Restart the services.
$ sudo needrestart -u NeedRestart :: UI :: stdio -ra
7) Again, check if you need to restart.
$ sudo needrestart -b
NEEDRESTART-VER: 3.4
NEEDRESTART-KCUR: 4.19.0-8-amd64
NEEDRESTART-KEXP: 4.19.0-9-amd64
NEEDRESTART-KSTA: 3
8) Reboot your operating system and check if you need to restart.
$ sudo needrestart -b
NEEDRESTART-VER: 3.4
NEEDRESTART-KCUR: 4.19.0-9-amd64
NEEDRESTART-KEXP: 4.19.0-9-amd64
NEEDRESTART-KSTA: 1
9) $ sudo needrestart -u NeedRestart :: UI :: stdio -rl
Scanning processes ...
Scanning linux images ...
Running kernel seems to be up-to-date.
No services need to be restarted.
No containers need to be restarted.
No user sessions are running outdated binaries.
β β β Uππ»βΊπ«Δπ¬πβ β β β