β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Share several IDS open source systems :
1)) Prelude IDS
From the perspective of design, it is positioned to meet the needs of large-scale networks, and implements network detectors, log analyzers, and alarm information centralized viewing and analysis tools. The network detector part is basically a copy of Snort's functions and is fully compatible with Snort's rule set. ( http://www.prelude-ids.org/ )
2)) Firestorm
It is a very high-performance network intrusion detection system (NIDS). Currently it only implements the detector part and is fully compatible with Snort's rule set, but plans include real support for analysis, reporting, remote console and real-time sensor configuration. It is completely pluggable, so it is very flexible. It can record alarm information to the Prelude IDS manager. It claims to be much better than Snort in performance. http://www.scaramanga.co.uk/firestorm/
3)) NetSTAT
Based on the research results of STAT (State Transition Analysis Technique) describing the attack, using the unique STATL language to describe the attack, the attack description text is converted into C++ code by the STATL interpretation tool and compiled into the detection engine to realize the detection function. It has been released. STATL language interpretation conversion tool and a basic example network detector part (a few examples of detection functions). To be proficient in using this IDS tool requires relatively strong programming skills, but with this IDS, very complex detection functions can be achieved.
http://www.cs.ucsb.edu/~rsg/STAT/
4)) Bro
It is a real-time network intrusion detection software implemented by Vern Paxson. It was released in 1998 under the BSD license. Its original design goal was to achieve a real-time alarm, separation of mechanism and strategy, and high scalability in a 100M network. Monitor the audit system.
https://www.bro.org/
5)) Suricata
It is a system that supports IDS, IPS, and NSM. The system has a Snort-like architecture and relies on signatures like Snort. It can even use the same Emerging Threat rule set used by VRT Snort rules and Snort itself. Suricata is newer than Snort, and it will have a chance to overtake Snort. https://suricata-ids.org/
6)) OSSEC
OSSEC open source security information management system (OPEN SOURCE SECURITY INFORMATION MANAGEMENT) is an open source host-based intrusion detection system, which can be referred to as HIDS for short. It has log analysis, file integrity check, policy monitoring, rootkit detection, real-time alarm, and linkage response. https://ossec.github.io/
ENJOY β€οΈππ»
WRITTEN BY
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Share several IDS open source systems :
1)) Prelude IDS
From the perspective of design, it is positioned to meet the needs of large-scale networks, and implements network detectors, log analyzers, and alarm information centralized viewing and analysis tools. The network detector part is basically a copy of Snort's functions and is fully compatible with Snort's rule set. ( http://www.prelude-ids.org/ )
2)) Firestorm
It is a very high-performance network intrusion detection system (NIDS). Currently it only implements the detector part and is fully compatible with Snort's rule set, but plans include real support for analysis, reporting, remote console and real-time sensor configuration. It is completely pluggable, so it is very flexible. It can record alarm information to the Prelude IDS manager. It claims to be much better than Snort in performance. http://www.scaramanga.co.uk/firestorm/
3)) NetSTAT
Based on the research results of STAT (State Transition Analysis Technique) describing the attack, using the unique STATL language to describe the attack, the attack description text is converted into C++ code by the STATL interpretation tool and compiled into the detection engine to realize the detection function. It has been released. STATL language interpretation conversion tool and a basic example network detector part (a few examples of detection functions). To be proficient in using this IDS tool requires relatively strong programming skills, but with this IDS, very complex detection functions can be achieved.
http://www.cs.ucsb.edu/~rsg/STAT/
4)) Bro
It is a real-time network intrusion detection software implemented by Vern Paxson. It was released in 1998 under the BSD license. Its original design goal was to achieve a real-time alarm, separation of mechanism and strategy, and high scalability in a 100M network. Monitor the audit system.
https://www.bro.org/
5)) Suricata
It is a system that supports IDS, IPS, and NSM. The system has a Snort-like architecture and relies on signatures like Snort. It can even use the same Emerging Threat rule set used by VRT Snort rules and Snort itself. Suricata is newer than Snort, and it will have a chance to overtake Snort. https://suricata-ids.org/
6)) OSSEC
OSSEC open source security information management system (OPEN SOURCE SECURITY INFORMATION MANAGEMENT) is an open source host-based intrusion detection system, which can be referred to as HIDS for short. It has log analysis, file integrity check, policy monitoring, rootkit detection, real-time alarm, and linkage response. https://ossec.github.io/
ENJOY β€οΈππ»
WRITTEN BY
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Images, posts & videos related to _X64dbg_.pdf
650.1 KB
Images, posts & videos related to _X64dbg_
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Run Kali Linux XFCE-desk :
Install XFCE
1) step to install XFCE and run it in Kali Linux. Enter the following command to install XFCE.
$ sudo apt install xfce4
2) Install XRDP
XRDP provides an easy remote desktop experience. It is open-source but does not work for Microsoft Windows.
$ sudo apt install xrdp
3) After installation, issue the following command to continue the procedure.
$ sudo /etc/init.d/xrdp start
4) Connect to Kali Linux
For this purpose, you can use the remote desktop connection that usually comes with the windows. Next, enter your user name and password.
5) Possible Problem
If port 3380 is active, rather than port 3389, you may encounter an error that says that your computer is not able to connect to another console.
6) Change the Port
First, open the XRDP configuration file and type the following command to change the port.
$ sudo nano /etc/xrdp/xrdp.ini
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Run Kali Linux XFCE-desk :
Install XFCE
1) step to install XFCE and run it in Kali Linux. Enter the following command to install XFCE.
$ sudo apt install xfce4
2) Install XRDP
XRDP provides an easy remote desktop experience. It is open-source but does not work for Microsoft Windows.
$ sudo apt install xrdp
3) After installation, issue the following command to continue the procedure.
$ sudo /etc/init.d/xrdp start
4) Connect to Kali Linux
For this purpose, you can use the remote desktop connection that usually comes with the windows. Next, enter your user name and password.
5) Possible Problem
If port 3380 is active, rather than port 3389, you may encounter an error that says that your computer is not able to connect to another console.
6) Change the Port
First, open the XRDP configuration file and type the following command to change the port.
$ sudo nano /etc/xrdp/xrdp.ini
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Osmedeus allows you automated run the collection of awesome tools to reconnaissance and vulnerability scanning against the target.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/j3ssie/Osmedeus
2) cd Osmedeus
3) ./install.sh
4) ./osmedeus.py -t example.com
5) # normal routine
./osmedeus.py -t example.com
./osmedeus.py -T list_of_target.txt
# normal routine but slow speed on all moddule
./osmedeus.py -t example.com --slow 'all'
# normal routine but exclude some modules
./osmedeus.py -t example.com -x 'linkfinding,dirb'
# direct mode examples
./osmedeus.py -m subdomain -t example.com
./osmedeus.py -m portscan -i "1.2.3.4/24"
./osmedeus.py -m "portscan,vulnscan" -i "1.2.3.4/24" -w result_folder
# direct list mode examples
./osmedeus.py -m portscan -I list_of_targets.txt
./osmedeus.py -m portscan,vulnscan -I list_of_targets.txt
./osmedeus.py -m screen -I list_of_targets.txt -w result_folder
# report mode
./osmedeus.py -t example.com --report list
./osmedeus.py -t example.com --report export
./osmedeus.py -t example.com --report sum
./osmedeus.py -t example.com --report short
./osmedeus.py -t example.com --report full
π¦F E A T U R E S :
Subdomain Scan.
Subdomain TakeOver Scan.
Screenshot the target.
Basic recon like Whois, Dig info.
Web Technology detection.
IP Discovery.
CORS Scan.
SSL Scan.
Wayback Machine Discovery.
URL Discovery.
Headers Scan.
Port Scan.
Vulnerable Scan.
Seperate workspaces to store all scan output and details logging.
REST API.
Slack notific React Web UI.
Support Continuous Scan.
ations.
Easily view report from commnad line.
enjoyβ€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Osmedeus allows you automated run the collection of awesome tools to reconnaissance and vulnerability scanning against the target.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/j3ssie/Osmedeus
2) cd Osmedeus
3) ./install.sh
4) ./osmedeus.py -t example.com
5) # normal routine
./osmedeus.py -t example.com
./osmedeus.py -T list_of_target.txt
# normal routine but slow speed on all moddule
./osmedeus.py -t example.com --slow 'all'
# normal routine but exclude some modules
./osmedeus.py -t example.com -x 'linkfinding,dirb'
# direct mode examples
./osmedeus.py -m subdomain -t example.com
./osmedeus.py -m portscan -i "1.2.3.4/24"
./osmedeus.py -m "portscan,vulnscan" -i "1.2.3.4/24" -w result_folder
# direct list mode examples
./osmedeus.py -m portscan -I list_of_targets.txt
./osmedeus.py -m portscan,vulnscan -I list_of_targets.txt
./osmedeus.py -m screen -I list_of_targets.txt -w result_folder
# report mode
./osmedeus.py -t example.com --report list
./osmedeus.py -t example.com --report export
./osmedeus.py -t example.com --report sum
./osmedeus.py -t example.com --report short
./osmedeus.py -t example.com --report full
π¦F E A T U R E S :
Subdomain Scan.
Subdomain TakeOver Scan.
Screenshot the target.
Basic recon like Whois, Dig info.
Web Technology detection.
IP Discovery.
CORS Scan.
SSL Scan.
Wayback Machine Discovery.
URL Discovery.
Headers Scan.
Port Scan.
Vulnerable Scan.
Seperate workspaces to store all scan output and details logging.
REST API.
Slack notific React Web UI.
Support Continuous Scan.
ations.
Easily view report from commnad line.
enjoyβ€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - j3ssie/osmedeus: A Workflow Engine for Offensive Security
A Workflow Engine for Offensive Security. Contribute to j3ssie/osmedeus development by creating an account on GitHub.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SQL injection vulnerability solutions:
1. The key to solving SQL injection vulnerabilities is to strictly check all data input from users and use the principle of least privilege for database configuration
2. All query statements use the parameterized query interface provided by the database, and the parameterized statements use parameters instead of embedding user input variables into the SQL statement.
3. The special characters ('"\<>&*; etc.) entering the database are escaped or coded.
4. Confirm the type of each data. For example, numeric data must be numeric, and the storage field in the database must correspond to int type.
5. The length of the data should be strictly regulated to prevent the relatively long SQL injection statement from being executed correctly to a certain extent.
6. The coding of each data layer of the website is unified. It is recommended to use UTF-8 coding. Inconsistent upper and lower coding may cause some filtering models to be bypassed.
7. Strictly restrict the operation authority of the website user's database, and provide this user with only the authority that can satisfy his work, thereby minimizing the harm of the injection attack to the database.
8. Avoid websites displaying SQL error messages, such as type errors, field mismatches, etc., to prevent attackers from using these error messages to make some judgments.
9. Before the website is released, it is recommended to use some professional SQL injection detection tools to detect and patch these SQL injection vulnerabilities in time.
ENJOY β€οΈππ»
WRITTEN BY
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SQL injection vulnerability solutions:
1. The key to solving SQL injection vulnerabilities is to strictly check all data input from users and use the principle of least privilege for database configuration
2. All query statements use the parameterized query interface provided by the database, and the parameterized statements use parameters instead of embedding user input variables into the SQL statement.
3. The special characters ('"\<>&*; etc.) entering the database are escaped or coded.
4. Confirm the type of each data. For example, numeric data must be numeric, and the storage field in the database must correspond to int type.
5. The length of the data should be strictly regulated to prevent the relatively long SQL injection statement from being executed correctly to a certain extent.
6. The coding of each data layer of the website is unified. It is recommended to use UTF-8 coding. Inconsistent upper and lower coding may cause some filtering models to be bypassed.
7. Strictly restrict the operation authority of the website user's database, and provide this user with only the authority that can satisfy his work, thereby minimizing the harm of the injection attack to the database.
8. Avoid websites displaying SQL error messages, such as type errors, field mismatches, etc., to prevent attackers from using these error messages to make some judgments.
9. Before the website is released, it is recommended to use some professional SQL injection detection tools to detect and patch these SQL injection vulnerabilities in time.
ENJOY β€οΈππ»
WRITTEN BY
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
WinDbg Malware Analysis Cheat Sheet.pdf
2 MB
1) !address List all memory segments in the process with their permissions and memory type. This is similar to the Memory Map in x64dbg.
2) !address [virtual address] List information about the memory segment that contains the virtual address. For example !address 400000 would show information about the section that contains address 0x40000. This is a quick way to find the start and end of a memory segment if you want to dump it.
.writemem [file name] [start address] [end address] Dump memory range to file. For example, .writemem C:
3) \dump.bin 400000 401000 would dump memory starting at 0x40000 and ending at 0x401000 to the dump.bin file.
eb [address] [byte] Enter one byte into memory at the address. For example, eb 400000 0xff would change the byte at address 0x400000 to 0xff. For a full list of enter commands (string, word, etc.) see the Microsoft docs here.
#full with video
2) !address [virtual address] List information about the memory segment that contains the virtual address. For example !address 400000 would show information about the section that contains address 0x40000. This is a quick way to find the start and end of a memory segment if you want to dump it.
.writemem [file name] [start address] [end address] Dump memory range to file. For example, .writemem C:
3) \dump.bin 400000 401000 would dump memory starting at 0x40000 and ending at 0x401000 to the dump.bin file.
eb [address] [byte] Enter one byte into memory at the address. For example, eb 400000 0xff would change the byte at address 0x400000 to 0xff. For a full list of enter commands (string, word, etc.) see the Microsoft docs here.
#full with video
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦X Attacker Tool, Website Vulnerability Scanner & Auto Exploiter
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
on termux install :
1) git clone https://github.com/Moham3dRiahi/XAttacker.git
2) cd XAttacker
3) chmod +x termux-install.sh
4) bash termux-install.sh
π¦Installation Windows alt tag
1) Download Perl
2) Download XAttacker
3) Extract XAttacker into Desktop
4) Open CMD and type the following commands:
5) cd Desktop/XAttacker-master/
6) perl XAttacker.pl
π¦SOME FEATURES :
blocktestimonial Exploit
β’ Rightnow Theme Exploit
β’ Konzept Exploit
β’ Omni Secure Files Exploit
β’ Pitchprint Exploit
β’ Satoshi Exploit
β’ Pinboard Exploit
β’ Barclaycart Exploit
β’ Com Facileforms Exploit
β’ Com Jwallpapers Exploit
β’ Com Extplorer Exploit
β’ Com Rokdownloads Exploit
β’ Com Sexycontactform Exploit
β’ Com Jbcatalog Exploit
β’ Com Blog Exploit
β’ Com Foxcontact Exploit
β’ Drupal Geddon Exploit
@UndercodeTesting
β verified
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦X Attacker Tool, Website Vulnerability Scanner & Auto Exploiter
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
on termux install :
1) git clone https://github.com/Moham3dRiahi/XAttacker.git
2) cd XAttacker
3) chmod +x termux-install.sh
4) bash termux-install.sh
π¦Installation Windows alt tag
1) Download Perl
2) Download XAttacker
3) Extract XAttacker into Desktop
4) Open CMD and type the following commands:
5) cd Desktop/XAttacker-master/
6) perl XAttacker.pl
π¦SOME FEATURES :
blocktestimonial Exploit
β’ Rightnow Theme Exploit
β’ Konzept Exploit
β’ Omni Secure Files Exploit
β’ Pitchprint Exploit
β’ Satoshi Exploit
β’ Pinboard Exploit
β’ Barclaycart Exploit
β’ Com Facileforms Exploit
β’ Com Jwallpapers Exploit
β’ Com Extplorer Exploit
β’ Com Rokdownloads Exploit
β’ Com Sexycontactform Exploit
β’ Com Jbcatalog Exploit
β’ Com Blog Exploit
β’ Com Foxcontact Exploit
β’ Drupal Geddon Exploit
@UndercodeTesting
β verified
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub is where people build software. More than 150 million people use GitHub to discover, fork, and contribute to over 420 million projects.
From unauthenticated to root on a supervision appliance.pdf
469.9 KB
EyesOfNetwork (βEONβ) is the OpenSource solution combining a pragmatic usage of ITIL processes and a technological interface allowing their workaday application. EyesOfNetwork Supervision is the first brick of a range of products targeting to assist IT managment and gouvernance. EyesOfNetwork Supervision provides event management, availability, problems and capacity
#full tutorial + pictures
#full tutorial + pictures
Password Spraying Outlook Web Access_ Remote Shell.pdf
617.7 KB
#requested full with pictures