UNDERCODE COMMUNITY
KB4-CON2019-12WaystoHack2FA.pdf
12 Ways to Hack 2FA
Forwarded from UNDERCODE NEWS
Huge lawsuit against Facebook: 48 states in the US are demanding that it be forced to disband.
#international
#international
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Hijacking tutorial:
1) First, we will need to gear up for the attack:
Open up the Ettercap utility in Kali Linux. To work with it in a GUI, open up a terminal and type:
$ ettercap -G
The Ettercap GUI window will be displayed. Go to the menu and select βsniff>unisniff,β as shown in the following window:
2) Next, open up a new terminal without closing the other one, and type the following command:
$ ifconfig
3) After entering the above command, you will see your default network interface. Now, copy it and select it in the Ettercap menu.
With that done, click the βhostβ button in the menu and select the βscan for hostβ option. Then, wait until the scan is finished.
4) The results will be displayed . From the submenu, click on the MITM tab and select βARP poisoning.β
Next, instruct the machine using the options tab that has just popped up. Enable the βsniff remote networkβ option by checking the box next to it.
5) Then, hit the start button from the menu to the attack. Your machine will now engage in sniffing for any systems connected to your remote network.
Now that the ettercap has been primed for the attack, leave it running in the background and proceed to launch the Ferret tool.
6) Start the Ferret plugin
To launch the Ferret plugin, open up a new terminal and type the following syntax, then hit Enter:
$ ferret -i eth0
You have now successfully launched the ferret tool, as well. Next, we will minimize this window and fire up the Hamster plugin.
7) Launch Hamster
Start Hamster by typing the following into a new command terminal:
$ hamster
This will listen to the loopback IP, which, in our case, is [IP address] and [port number]
8) Next, fire up the web browser and type the port number and the loopback IP in its URL terminal to set up the web interface for Hamster:
With the Hamster utility prepared, we must now configure the adapters. Go to the options in the browserβs menu and click on βeth0,β and wait until the browser comes up with some results:
9) Examine the results carefully once they pop up. You will see a whole bunch of IP addresses, including your own.
10) Next, we will select the target IP address in the Hamster web interface
11) See the Victimβs Web History
You can click on each of the recorded cookies to see what is going on in the sessions, which websites were accessed, the userβs private chat logs, file transfer history, etc. You can extract a lot of information here, as you are likely to have a lot of cookies.
Mess around and see what you can get your hands on. And remember, everything that you can do on the system that you are pen-testing here, a hacker can do as well, which goes to show how prone a system can be to such simple attacks.
Reference linuxforo
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Hijacking tutorial:
1) First, we will need to gear up for the attack:
Open up the Ettercap utility in Kali Linux. To work with it in a GUI, open up a terminal and type:
$ ettercap -G
The Ettercap GUI window will be displayed. Go to the menu and select βsniff>unisniff,β as shown in the following window:
2) Next, open up a new terminal without closing the other one, and type the following command:
$ ifconfig
3) After entering the above command, you will see your default network interface. Now, copy it and select it in the Ettercap menu.
With that done, click the βhostβ button in the menu and select the βscan for hostβ option. Then, wait until the scan is finished.
4) The results will be displayed . From the submenu, click on the MITM tab and select βARP poisoning.β
Next, instruct the machine using the options tab that has just popped up. Enable the βsniff remote networkβ option by checking the box next to it.
5) Then, hit the start button from the menu to the attack. Your machine will now engage in sniffing for any systems connected to your remote network.
Now that the ettercap has been primed for the attack, leave it running in the background and proceed to launch the Ferret tool.
6) Start the Ferret plugin
To launch the Ferret plugin, open up a new terminal and type the following syntax, then hit Enter:
$ ferret -i eth0
You have now successfully launched the ferret tool, as well. Next, we will minimize this window and fire up the Hamster plugin.
7) Launch Hamster
Start Hamster by typing the following into a new command terminal:
$ hamster
This will listen to the loopback IP, which, in our case, is [IP address] and [port number]
8) Next, fire up the web browser and type the port number and the loopback IP in its URL terminal to set up the web interface for Hamster:
With the Hamster utility prepared, we must now configure the adapters. Go to the options in the browserβs menu and click on βeth0,β and wait until the browser comes up with some results:
9) Examine the results carefully once they pop up. You will see a whole bunch of IP addresses, including your own.
10) Next, we will select the target IP address in the Hamster web interface
11) See the Victimβs Web History
You can click on each of the recorded cookies to see what is going on in the sessions, which websites were accessed, the userβs private chat logs, file transfer history, etc. You can extract a lot of information here, as you are likely to have a lot of cookies.
Mess around and see what you can get your hands on. And remember, everything that you can do on the system that you are pen-testing here, a hacker can do as well, which goes to show how prone a system can be to such simple attacks.
Reference linuxforo
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦CISCO AUDI TOOLS PDFs and VIDEOS:
https://www.cisco.com/c/dam/en_us/training-events/product-training/prime-infrastructure-31/ja-audit/PI31_Audit_JobAid.pdf
https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cust_contact/contact_center/icm_enterprise/icm_enterprise_12_0_1/Configuration/Guide/ucce_b_12-security-guide/ucce_b_1171-security-guide_chapter_01001.pdf
https://www.cisco.com/c/en/us/td/docs/wireless/prime_infrastructure/2-2/configuration/guide/pi_22_cg/tools.pdf
https://www.youtube.com/watch?v=r39qD_FV_X4
https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/auditing_the_system.pdf
https://www.youtube.com/watch?v=EaA5pLAwnkc
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦CISCO AUDI TOOLS PDFs and VIDEOS:
https://www.cisco.com/c/dam/en_us/training-events/product-training/prime-infrastructure-31/ja-audit/PI31_Audit_JobAid.pdf
https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cust_contact/contact_center/icm_enterprise/icm_enterprise_12_0_1/Configuration/Guide/ucce_b_12-security-guide/ucce_b_1171-security-guide_chapter_01001.pdf
https://www.cisco.com/c/en/us/td/docs/wireless/prime_infrastructure/2-2/configuration/guide/pi_22_cg/tools.pdf
https://www.youtube.com/watch?v=r39qD_FV_X4
https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/auditing_the_system.pdf
https://www.youtube.com/watch?v=EaA5pLAwnkc
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SQL HACKING PDFS & VIDEOS :
https://www.pdfdrive.com/sql-injection-attacks-and-defensepdf-e23004387.html
http://index-of.es/Failed-attack-techniques/SQL%20Injection.pdf
http://scholarworks.sjsu.edu/cgi/viewcontent.cgi?article=1081&context=etd_projects
http://www.sis.pitt.edu/~jjoshi/courses/IS2620/Spring11/Paper7.pdf
https://www.youtube.com/watch?v=WFFQw01EYHM
https://www.youtube.com/watch?v=SJgYdTckMBY
https://www.youtube.com/watch?v=1qgehzaxMEY
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SQL HACKING PDFS & VIDEOS :
https://www.pdfdrive.com/sql-injection-attacks-and-defensepdf-e23004387.html
http://index-of.es/Failed-attack-techniques/SQL%20Injection.pdf
http://scholarworks.sjsu.edu/cgi/viewcontent.cgi?article=1081&context=etd_projects
http://www.sis.pitt.edu/~jjoshi/courses/IS2620/Spring11/Paper7.pdf
https://www.youtube.com/watch?v=WFFQw01EYHM
https://www.youtube.com/watch?v=SJgYdTckMBY
https://www.youtube.com/watch?v=1qgehzaxMEY
β β β Uππ»βΊπ«Δπ¬πβ β β β
Pdfdrive
SQL Injection Attacks and Defense.pdf - PDF Drive
Justin Clarke is a co-founder and Director of Gotham Digital Science, He provides Oracle security audits, security training and consulting.
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦βΈοΈ How to install Netdata on Kubernetes using Helm ?
1) Step 1 - Install Helm on Linux | macOS
Next, we'll show you the steps you need to take to install Helm on Linux | macOS.
2) Download the Helm package from this link : https://github.com/helm/helm/releases
3) Unpack the package using tar -xvzf <downloaded-package>
4) Move the binary to usr / local / bin / helm
π¦We will be using an installation script that automates the steps above.
1) curl -fsSL -o get_helm.sh https://raw.githubusercontent.com/helm/helm/master/scripts/get-helm-3
2) chmod 700 get_helm.sh
3) sudo ./get_helm.sh
4) MacOS users can also use brew's package management tool.
$ brew install helm
5) After installation, confirm that everything is ok by checking the current version:
$ helm version
version.BuildInfo{Version:"v3.4.0", GitCommit:"7090a89efc8a18f3d8178bf47d2462450349a004", GitTreeState:"clean", GoVersion:"go1.14.10"}
6) Add the helm-charts repository then update helm
$ helm repo add stable https://charts.helm.sh/stable
$ helm repo update
7) Hang tight while we grab the latest from your chart repositories...
...Successfully got an update from the "stable" chart repository
Update Complete. βHappy Helming!β
Β» Step 2 - Installing Netdata Using the Helm Chart
You can install Helm Chart in two ways:
1) Install from Netdata's Helm repository
helm install netdata ./netdata-helmchart/charts/netdata
5) Now you can see the Helm deployed:
$ helm list
NAME NAMESPACE REVISION UPDATED STATUS CHART APP VERSION
netdata default 1 2020-11-20 18:41:46.244774507 +0000 UTC deployed netdata-3.1.0 v1.26.0
6) To check if the parent and child pods have been successfully deployed:
$ kubectl get pods
NAME READY STATUS RESTARTS AGE
netdata-child-fgh5c 2/2 Running 0 16h
netdata-child-qzhjp 2/2 Running 0 16h
netdata-child-ssmhp 2/2 Running 0 16h
netdata-parent-55d88fc784-x66ss 1/1 Running 0 16h
Step 3. Open Netdata-parent with NodePort
In this tutorial, we will introduce deployment using NodePort.
Netdata is configured by default to run on port 19999.
To open the port, use the command shown below:
$ kubectl expose deployment netdata-parent --type="NodePort" --port 19999
Now you can check the port on which the service was provided with the kubectl get service command:
$ kubectl get service
NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
kubernetes ClusterIP 10.96.0.1 <none> 443/TCP 21h
netdata ClusterIP 10.99.202.135 <none> 19999/TCP 17h
netdata-parent NodePort 10.97.24.181 <none> 19999:30939/TCP 16h
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦βΈοΈ How to install Netdata on Kubernetes using Helm ?
1) Step 1 - Install Helm on Linux | macOS
Next, we'll show you the steps you need to take to install Helm on Linux | macOS.
2) Download the Helm package from this link : https://github.com/helm/helm/releases
3) Unpack the package using tar -xvzf <downloaded-package>
4) Move the binary to usr / local / bin / helm
π¦We will be using an installation script that automates the steps above.
1) curl -fsSL -o get_helm.sh https://raw.githubusercontent.com/helm/helm/master/scripts/get-helm-3
2) chmod 700 get_helm.sh
3) sudo ./get_helm.sh
4) MacOS users can also use brew's package management tool.
$ brew install helm
5) After installation, confirm that everything is ok by checking the current version:
$ helm version
version.BuildInfo{Version:"v3.4.0", GitCommit:"7090a89efc8a18f3d8178bf47d2462450349a004", GitTreeState:"clean", GoVersion:"go1.14.10"}
6) Add the helm-charts repository then update helm
$ helm repo add stable https://charts.helm.sh/stable
$ helm repo update
7) Hang tight while we grab the latest from your chart repositories...
...Successfully got an update from the "stable" chart repository
Update Complete. βHappy Helming!β
Β» Step 2 - Installing Netdata Using the Helm Chart
You can install Helm Chart in two ways:
1) Install from Netdata's Helm repository
2) Clone the Netdata Git repository.4) Let's install the chart:
3) Make sure you have git installed on your system
Clone the git repository locally
git clone https://github.com/netdata/helmchart.git netdata-helmchart
helm install netdata ./netdata-helmchart/charts/netdata
5) Now you can see the Helm deployed:
$ helm list
NAME NAMESPACE REVISION UPDATED STATUS CHART APP VERSION
netdata default 1 2020-11-20 18:41:46.244774507 +0000 UTC deployed netdata-3.1.0 v1.26.0
6) To check if the parent and child pods have been successfully deployed:
$ kubectl get pods
NAME READY STATUS RESTARTS AGE
netdata-child-fgh5c 2/2 Running 0 16h
netdata-child-qzhjp 2/2 Running 0 16h
netdata-child-ssmhp 2/2 Running 0 16h
netdata-parent-55d88fc784-x66ss 1/1 Running 0 16h
Step 3. Open Netdata-parent with NodePort
In this tutorial, we will introduce deployment using NodePort.
Netdata is configured by default to run on port 19999.
To open the port, use the command shown below:
$ kubectl expose deployment netdata-parent --type="NodePort" --port 19999
Now you can check the port on which the service was provided with the kubectl get service command:
$ kubectl get service
NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
kubernetes ClusterIP 10.96.0.1 <none> 443/TCP 21h
netdata ClusterIP 10.99.202.135 <none> 19999/TCP 17h
netdata-parent NodePort 10.97.24.181 <none> 19999:30939/TCP 16h
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
Releases Β· helm/helm
The Kubernetes Package Manager. Contribute to helm/helm development by creating an account on GitHub.
Forwarded from UNDERCODE NEWS
France fines Google 100 million euros and Amazon 35 million for illegal collection of user information.
#international
#international
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π§ How to enable rc.local shell script in systemd on Linux boot ?
1) Enabling rc.local shell script in systemd at boot of Linux system
Compatibility with /etc/rc.local is achieved through systemd using a special service called rc-local.service.
2) This module is automatically called in multi-user.target by systemd-rc-local-generator if /etc/rc.local is executable.
3) Executing rc.local shell script at boot time using systemd
Naturally, create or update / edit a file called /etc/rc.local using your favorite text editor.
I'm going to use the vim command:
$ sudo vim /etc/rc.local
## RHEL/CentOS/Fedora Linux ΠΎΡΡΠ΅Π΄Π°ΠΊΡΠΈΡΡΠΉΡΠ΅ ΡΠ°ΠΉΠ» /etc/rc.d/rc.local ##
$ sudo vim /etc/rc.d/rc.local
Add the required commands or call the script.
Here is my file:
#!/bin/sh
# add your commands
# call your scripts here
# let us set stuff for my wifi
/sbin/iw phy0 wowlan enable magic-packet disconnect
# last line must be exit 0
exit 0
Save and close the file when using vim.
π§ How to save a file in Vi / Vim and exit
Make sure you set the executable permissions for the file with the chmod command:
$ sudo chmod -v +x /etc/rc.local
Setting up rc-local.service on Linux when systemd starts
All we need to do is enter the following systemctl command:
$ sudo systemctl enable rc-local.service
4) Reboot Linux:
$ sudo reboot
Check the status after reboot:
$ sudo systemctl status rc-local.service
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π§ How to enable rc.local shell script in systemd on Linux boot ?
1) Enabling rc.local shell script in systemd at boot of Linux system
Compatibility with /etc/rc.local is achieved through systemd using a special service called rc-local.service.
2) This module is automatically called in multi-user.target by systemd-rc-local-generator if /etc/rc.local is executable.
3) Executing rc.local shell script at boot time using systemd
Naturally, create or update / edit a file called /etc/rc.local using your favorite text editor.
I'm going to use the vim command:
$ sudo vim /etc/rc.local
## RHEL/CentOS/Fedora Linux ΠΎΡΡΠ΅Π΄Π°ΠΊΡΠΈΡΡΠΉΡΠ΅ ΡΠ°ΠΉΠ» /etc/rc.d/rc.local ##
$ sudo vim /etc/rc.d/rc.local
Add the required commands or call the script.
Here is my file:
#!/bin/sh
# add your commands
# call your scripts here
# let us set stuff for my wifi
/sbin/iw phy0 wowlan enable magic-packet disconnect
# last line must be exit 0
exit 0
Save and close the file when using vim.
π§ How to save a file in Vi / Vim and exit
Make sure you set the executable permissions for the file with the chmod command:
$ sudo chmod -v +x /etc/rc.local
Setting up rc-local.service on Linux when systemd starts
All we need to do is enter the following systemctl command:
$ sudo systemctl enable rc-local.service
4) Reboot Linux:
$ sudo reboot
Check the status after reboot:
$ sudo systemctl status rc-local.service
β β β Uππ»βΊπ«Δπ¬πβ β β β