Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Exploitation Framework for Embedded Devices :
F E A T U R E S :
exploits - modules that take advantage of identified vulnerabilities
creds - modules designed to test credentials against network services
scanners - modules that check if a target is vulnerable to any exploit
payloads - modules that are responsible for generating payloads for
various architectures and injection points
generic - modules that perform generic attacks
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
Open terminal and type :
1) apt-get install python3-pip
2) git clone https://www.github.com/threat9/routersploit
3) cd routersploit
4) python3 -m pip install -r requirements.txt
5) python3 rsf.py
6) Bluetooth Low Energy support:
apt-get install libglib2.0-dev
7) python3 -m pip install bluepy
8) python3 rsf.py
how to use:
https://www.youtube.com/watch?v=75siIiGNv98
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Exploitation Framework for Embedded Devices :
F E A T U R E S :
exploits - modules that take advantage of identified vulnerabilities
creds - modules designed to test credentials against network services
scanners - modules that check if a target is vulnerable to any exploit
payloads - modules that are responsible for generating payloads for
various architectures and injection points
generic - modules that perform generic attacks
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
Open terminal and type :
1) apt-get install python3-pip
2) git clone https://www.github.com/threat9/routersploit
3) cd routersploit
4) python3 -m pip install -r requirements.txt
5) python3 rsf.py
6) Bluetooth Low Energy support:
apt-get install libglib2.0-dev
7) python3 -m pip install bluepy
8) python3 rsf.py
how to use:
https://www.youtube.com/watch?v=75siIiGNv98
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - threat9/routersploit: Exploitation Framework for Embedded Devices
Exploitation Framework for Embedded Devices. Contribute to threat9/routersploit development by creating an account on GitHub.
Forwarded from UNDERCODE NEWS
Huawei has launched the Hongmeng OS cell phone developer UI beta version, which is exactly the same as the new one.
#Technologies
#Technologies
Forwarded from UNDERCODE NEWS
FUJIFILM introduces new technologies for magnetic tape, making 580 TB in one volume
#Technologies
https://undercodenews.com/fujifilm-introduces-new-technologies-for-magnetic-tape-making-580-tb-in-one-volume/16/12/2020/
#Technologies
https://undercodenews.com/fujifilm-introduces-new-technologies-for-magnetic-tape-making-580-tb-in-one-volume/16/12/2020/
(TELEGRAM STILL DOWN NOT CRAWLING ANY IMAGES )Forwarded from UNDERCODE NEWS
Google servers attacked as we told, and now telegram down, is that another cyber attack ?
#CyberAttacks
https://undercodenews.com/google-servers-attacked-as-we-told-and-now-telegram-down-is-that-another-cyber-attack/16/12/2020/
#CyberAttacks
https://undercodenews.com/google-servers-attacked-as-we-told-and-now-telegram-down-is-that-another-cyber-attack/16/12/2020/
Forwarded from UNDERCODE NEWS
Again Youtube and google services down(user hard to access services) this time telegram join the party
https://undercodenews.com/again-youtube-and-google-services-down-this-time-telegram-join-the-party/16/12/2020/
https://undercodenews.com/again-youtube-and-google-services-down-this-time-telegram-join-the-party/16/12/2020/
Undercodenews
again Youtube and google services down this time telegram join the party -
β¦
Forwarded from UNDERCODE NEWS
Bitcoin rate broke a historical record
#Updates
https://undercodenews.com/bitcoin-rate-broke-a-historical-record/16/12/2020/
#Updates
https://undercodenews.com/bitcoin-rate-broke-a-historical-record/16/12/2020/
Forwarded from UNDERCODE NEWS
Amazon: free secret Christmas list of must-see deals
#Technologies
MORE DETAILS - https://undercodenews.com/amazon-free-secret-christmas-list-of-must-see-deals/16/12/2020/
#Technologies
MORE DETAILS - https://undercodenews.com/amazon-free-secret-christmas-list-of-must-see-deals/16/12/2020/
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HACKING ANDROID AND MORE TOOLS :
* [apk-mitm - a CLI application that prepares Android APK files for HTTPS inspection](https://github.com/shroudedcode/apk-mitm)
* [Andriller - is software utility with a collection of forensic tools for smartphones](https://github.com/den4uk/andriller)
* [Dexofuzzy: Android malware similarity clustering method using opcode sequence-Paper](https://www.virusbulletin.com/virusbulletin/2019/11/dexofuzzy-android-malware-similarity-clustering-method-using-opcode-sequence/)
* [Chasing the Joker](https://docs.google.com/presentation/d/1sFGAERaNRuEORaH06MmZKeFRqpJo1ol1xFieUa1X_OA/edit#slide=id.p1)
* [Side Channel Attacks in 4G and 5G Cellular Networks-Slides](https://i.blackhat.com/eu-19/Thursday/eu-19-Hussain-Side-Channel-Attacks-In-4G-And-5G-Cellular-Networks.pdf)
* [Shodan.io-mobile-app for Android](https://github.com/PaulSec/Shodan.io-mobile-app)
* [Popular Android Malware 2018](https://github.com/sk3ptre/AndroidMalware_2018)
* [Popular Android Malware 2019](https://github.com/sk3ptre/AndroidMalware_2019)
* [Popular Android Malware 2020](https://github.com/sk3ptre/AndroidMalware_2020)
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HACKING ANDROID AND MORE TOOLS :
* [apk-mitm - a CLI application that prepares Android APK files for HTTPS inspection](https://github.com/shroudedcode/apk-mitm)
* [Andriller - is software utility with a collection of forensic tools for smartphones](https://github.com/den4uk/andriller)
* [Dexofuzzy: Android malware similarity clustering method using opcode sequence-Paper](https://www.virusbulletin.com/virusbulletin/2019/11/dexofuzzy-android-malware-similarity-clustering-method-using-opcode-sequence/)
* [Chasing the Joker](https://docs.google.com/presentation/d/1sFGAERaNRuEORaH06MmZKeFRqpJo1ol1xFieUa1X_OA/edit#slide=id.p1)
* [Side Channel Attacks in 4G and 5G Cellular Networks-Slides](https://i.blackhat.com/eu-19/Thursday/eu-19-Hussain-Side-Channel-Attacks-In-4G-And-5G-Cellular-Networks.pdf)
* [Shodan.io-mobile-app for Android](https://github.com/PaulSec/Shodan.io-mobile-app)
* [Popular Android Malware 2018](https://github.com/sk3ptre/AndroidMalware_2018)
* [Popular Android Malware 2019](https://github.com/sk3ptre/AndroidMalware_2019)
* [Popular Android Malware 2020](https://github.com/sk3ptre/AndroidMalware_2020)
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - niklashigi/apk-mitm: π€ A CLI application that automatically prepares Android APK files for HTTPS inspection
π€ A CLI application that automatically prepares Android APK files for HTTPS inspection - niklashigi/apk-mitm
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
The rise of over $1 billion worth of start-up Privacy Security was driven by the investment fund of Salesforce and Tiger Digital Global.
#international
#international
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦looking for safe websites for mod softwares for windows :
http://www.softpedia.com/
https://www.filepuma.com/
https://sourceforge.net/
https://www.microsoft.com/en-gb/download/default.aspx
https://ninite.com/
http://www.majorgeeks.com/
http://www.snapfiles.com/
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦looking for safe websites for mod softwares for windows :
http://www.softpedia.com/
https://www.filepuma.com/
https://sourceforge.net/
https://www.microsoft.com/en-gb/download/default.aspx
https://ninite.com/
http://www.majorgeeks.com/
http://www.snapfiles.com/
β β β Uππ»βΊπ«Δπ¬πβ β β β
Softpedia
Softpedia - Free Downloads Encyclopedia
A library of over 1,000,000 free and free-to-try applications for Windows, Mac, Linux and Smartphones, Games and Drivers plus tech-focused news and reviews
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
Quick install tools for kali/debian Angr:
A) Angr (Android)
1) Angr is a Python framework for analyzing binaries. It is useful for both static and dynamic symbolic ("concolic") analysis. In other words: given a binary and a requested state, Angr will try to get to that state, using formal methods (a technique used for static code analysis) to find a path, as well as brute forcing. Using angr to get to the requested state is often much faster than taking manual steps for debugging and searching the path towards the required state. Angr operates on the VEX intermediate language and comes with a loader for ELF/ARM binaries, so it is perfect for dealing with native code, such as native Android binaries.
2) Angr allows for disassembly, program instrumentation, symbolic execution, control-flow analysis, data-dependency analysis, decompilation and more, given a large set of plugins.
3) Since version 8, Angr is based on Python 3, and can be installed with pip on *nix operating systems, macOS and Windows:
$ pip install angr
4) Some of angr's dependencies contain forked versions of the Python modules Z3 and PyVEX, which would overwrite the original versions. If you're using those modules for anything else, you should create a dedicated virtual environment with Virtualenv. Alternatively, you can always use the provided docker container. See the installation guide for more details.
B) Frida
Frida is a free and open source dynamic code instrumentation toolkit written by Ole AndrΓ© Vadla RavnΓ₯s that works by injecting the QuickJS JavaScript engine (previously Duktape and V8) into the instrumented process. Frida lets you execute snippets of JavaScript into native apps on Android and iOS (as well as on other platforms).
To install Frida locally, simply run:
$ pip install frida-tools
Code can be injected in several ways. For example, Xposed permanently modifies the Android app loader, providing hooks for running your own code every time a new process is started. In contrast, Frida implements code injection by writing code directly into process memory. When attached to a running app:
1) Frida uses ptrace to hijack a thread of a running process. This thread is used to allocate a chunk of memory and populate it with a mini-bootstrapper.
2) The bootstrapper starts a fresh thread, connects to the Frida debugging server that's running on the device, and loads a shared library that contains the Frida agent (frida-agent.so).
3) The agent establishes a bi-directional communication channel back to the tool (e.g. the Frida REPL or your custom Python script).
The hijacked thread resumes after being restored to its original state, and process execution continues as usual.
β β β Uππ»βΊπ«Δπ¬πβ β β β
Quick install tools for kali/debian Angr:
A) Angr (Android)
1) Angr is a Python framework for analyzing binaries. It is useful for both static and dynamic symbolic ("concolic") analysis. In other words: given a binary and a requested state, Angr will try to get to that state, using formal methods (a technique used for static code analysis) to find a path, as well as brute forcing. Using angr to get to the requested state is often much faster than taking manual steps for debugging and searching the path towards the required state. Angr operates on the VEX intermediate language and comes with a loader for ELF/ARM binaries, so it is perfect for dealing with native code, such as native Android binaries.
2) Angr allows for disassembly, program instrumentation, symbolic execution, control-flow analysis, data-dependency analysis, decompilation and more, given a large set of plugins.
3) Since version 8, Angr is based on Python 3, and can be installed with pip on *nix operating systems, macOS and Windows:
$ pip install angr
4) Some of angr's dependencies contain forked versions of the Python modules Z3 and PyVEX, which would overwrite the original versions. If you're using those modules for anything else, you should create a dedicated virtual environment with Virtualenv. Alternatively, you can always use the provided docker container. See the installation guide for more details.
B) Frida
Frida is a free and open source dynamic code instrumentation toolkit written by Ole AndrΓ© Vadla RavnΓ₯s that works by injecting the QuickJS JavaScript engine (previously Duktape and V8) into the instrumented process. Frida lets you execute snippets of JavaScript into native apps on Android and iOS (as well as on other platforms).
To install Frida locally, simply run:
$ pip install frida-tools
Code can be injected in several ways. For example, Xposed permanently modifies the Android app loader, providing hooks for running your own code every time a new process is started. In contrast, Frida implements code injection by writing code directly into process memory. When attached to a running app:
1) Frida uses ptrace to hijack a thread of a running process. This thread is used to allocate a chunk of memory and populate it with a mini-bootstrapper.
2) The bootstrapper starts a fresh thread, connects to the Frida debugging server that's running on the device, and loads a shared library that contains the Frida agent (frida-agent.so).
3) The agent establishes a bi-directional communication channel back to the tool (e.g. the Frida REPL or your custom Python script).
The hijacked thread resumes after being restored to its original state, and process execution continues as usual.
β β β Uππ»βΊπ«Δπ¬πβ β β β