UNDERCODE SECURITY
225 subscribers
295 photos
1.03K files
1.73K links
πŸ¦‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
Forwarded from WEB UNDERCODE - PRIVATE
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How should medical equipment resist hacker attacks ?
#news


> Since 2020, the scale of cyber attacks has increased by 300% compared to last year. Institutions such as hospitals, pharmacies, and medical equipment suppliers that concern everyone's life and health are facing greater security risks than ever before. Even though this series of attacks are sometimes not directly targeted at a certain medical Internet of Things (IoMT) device, it can also pass through the hospital’s internal network to infect devices used to diagnose and treat patients, such as intravenous pumps, patient monitors, and breathing. Machine and x-ray machine.

> As John Riggi, senior consultant for cyber security and risk of the American Hospital Association (AHA), said: "The worst case is that these life-saving medical equipment may be unusable directly after being infected."

>For hospitals, the best way to prevent cyber attacks and protect IoMT equipment from infection is to isolate the most vulnerable and critical equipment from each other or maintain a virtual distance, which is the so-called network segmentation.

πŸ¦‘Hospitals can take the following practical steps to segment the clinical network, reduce the attack surface, and protect patients from cyber attacks:

1. Make clear who is responsible first

Traditionally, medical equipment safety has always been the responsibility of biomedical engineering equipment experts.

However, with the increasing popularity of IoMT equipment and the increase in cyber attacks against healthcare, the IT team of the hospital information department has to invest more energy in the security of medical equipment. Therefore, the information department and the biomedical engineering research team need to work closely together to design and implement safe and effective security policies for clinical networks.

In order to ensure the safety of medical equipment and integrate the IT and biomedical teams across departments, a separate and final IoMT network security policy decision maker is needed at this time. Some large organizations have even added the role of Medical Device Security Officer (MDSO), who is directly responsible for the security of medical devices in the entire clinical network of the hospital.

2. Create a reliable equipment list

If you do not have enough in-depth knowledge of the medical equipment connected to the hospital, the configuration files on the equipment, and the communication mode, you cannot set a network segmentation strategy.

Automated inventory tools must also be able to continuously analyze the equipment while understanding the behavior, criticality, and vulnerability of the IoMT equipment.

3. Assess the risk of each device

The risk score should be calculated based on the degree of criticality and medical impact that the equipment may cause. Risk assessment should be conducted continuously and abnormal network behavior should be continuously monitored. In order to assess the risk, the following factors must be considered:

Communication with external servers required for normal device functions (i.e. vendor communication)
The device needs to store and send ePHI, and for what purpose?
Device usage pattern
Does the device run an unsupported operating system or have any known vulnerabilities? If so, do you use patches or network segmentation methods to protect the equipment?
4. Follow regulatory guidelines and rules in real time

If the hospital does not comply with federal and state regulatory standards, it will face a fine of millions of dollars. Regardless of monetary loss, failure to comply with cybersecurity guidelines puts medical equipment at risk and may endanger patient safety, business integrity, and hospital reputation.

The guidelines and regulations concerning healthcare and medical equipment are updated regularly. In order to maintain compliance, hospitals must pay close attention to regulatory standards and updates issued by state and federal agencies, including:
Forwarded from WEB UNDERCODE - PRIVATE
U.S. Food and Drug Administration (FDA)
Medical Device Information Sharing and Analysis (MDISS) Initiative
Health Insurance Portability and Accountability Act (HIPAA)
5. Design, verify and execute segmentation strategies

Segmentation strategies are used to reduce the attack surface and prevent potential threats. Network segmentation can also help the network run more smoothly by restricting traffic to designated areas and reducing network load.

> However, before implementing any segmentation strategy on the clinical network, its safety and effectiveness should be tested. The hospital security team should always verify the segmentation strategy and then execute it on the network to ensure the continuity of medical services and clinical operations.

Share USβ€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from WEB UNDERCODE - PRIVATE
πŸ¦‘How should medical equipment resist hacker attacks ?
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘WHAT IS ARP ATTACK & how to secure yourself ?

ARP attacks mainly exist in the local area network. If a computer in the local area network is infected with an ARP Trojan, the system infected with the ARP Trojan will try to intercept the communication information of other computers in the network by means of "ARP spoofing". It will cause communication failures of other computers in the network. Let's introduce the solution to the ARP attack on the computer.

πŸ¦‘Computer suffers ARP attack, solution :
#FastTips

1. Turn on the built-in firewall of the system. In fact, the built-in firewall of the system can also cope with general ARP attacks! But few people use it. First click on the start menu and enter the control panel!

2. Select the "System and Security" option on the control panel page to enter,

3. In the system and security interface, choose to enter the check firewall status under the windows firewall!

4. On the windows firewall status page, click "open or close windows firewall" in the right menu

5. Open and close the firewall page, and turn on the firewall in all network environments!

enjoyβ€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to quickly remove the Trojan horse virus in the system ?
Clearing the DLL backdoor is
relatively file-bundled. The DLL insertion Trojan is more advanced, with no process, no ports, etc. It is difficult for ordinary people to notice. Therefore, the removal steps are relatively complicated.


The DLL insertion Trojan is more advanced, with no process, no ports, etc. It is difficult for ordinary people to notice. Therefore, the removal steps are relatively complicated.

1. End the Trojan horse process.
Since this type of Trojan horse is embedded in other processes, it does not generate specific items in the process viewer. If we find that our system is abnormal, we need to judge whether it has been hit DLL Trojan.

> Here we use the IceSword tool. After running the program, it will automatically detect the running process of the system. Right-click on the suspicious process and select "Module Information" in the pop-up menu. You can view all DLL modules in the pop-up window. At this time, if you find an item of unknown origin, you can select it, and then click the "Uninstall" button to delete it from the process. For some stubborn processes, we will also click the "Forced Release" button, and then use the address in the "Module File Name" column to delete them directly in the folder.

2. Finding suspicious DLL modules
As general users are not familiar with the calling of DLL files, it is difficult to determine which DLL module is suspicious. In this way, ECQ-PS (Super Process King) can come in handy.

> After running the software, you can see all the processes in the current system in the middle list. After double-clicking one of the processes, you can display detailed information in the "All Modules" tab of the window below, including the module name , Version and manufacturer, and time of creation, etc. The manufacturer and creation time information is more important. If it is a critical system process such as "svchost.exe", but the result is a module from an unknown manufacturer, the module must be faulty. In addition, if the manufacturer is Microsoft, but the creation time is different from that of other DLL modules, it may also be a DLL Trojan.

> In addition, we can also directly switch to the "Suspicious Module" option, the software will automatically scan the suspicious files in the module and display them in the list. Double-click the suspicious DLL module in the scan result list to see the process of calling this module. Generally, each DLL file is called by multiple processes. If this DLL file is only called by this process, it may also be a DLL Trojan. Click the "Forced Delete" button to delete the DLL Trojan from the process.

3. Thorough Rootkit detection It is
impossible for anyone to check the ports, registry, files, and services in the system all the time to see if the Trojan is hidden. At this time I can use some special tools for detection.

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Backup Legal Mega
πŸ¦‘New Paid programming books

> https://mega.nz/folder/eaBzlAjY#05vx3nezLN9hOtWsREc-bw
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘practical methods to break through IDS intrusion detection system :

There are many kinds of polymorphic URL encoding technologies, and the author here introduces 9 commonly used and representative methods. For the convenience of explanation, here is the URL with the submission address /msadc/msadcs.dll as an example. "/Msadc/msadcs.dll" has been collected in snort and other major IDS rule set files, so when we directly submit /msadc/msadcs.dll to the target machine, it will be intercepted and alarmed by IDS.

The first trick: "/./" string insertion method

In view of the special role of "./", we can insert it into the URL to achieve URL transformation. For example, for /msadc/msadcs.dll, we can rewrite it as /././msadc/././msadcs.dll, /./msadc/.//./msadcs.dll and other forms to disrupt IDS The identification mark analysis engine realizes the purpose of deceiving IDS. Moreover, the URL after the rewrite is equivalent to the unmodified URL. The author has shown through experiments that this method can bypass IDS such as Snort.

The second trick: "00" ASCII code

Some time ago, the Internet upload vulnerability was used to exploit this feature, and everyone must be familiar with it. Its principle is that when the computer processes the string, it automatically truncates at the ASCII code 00. We can rewrite /msadc/msadcs.dll to /msadc/msadcs.dll Iloveheikefangxian, use Winhex to change the space between .dll and Ilove to the ASCII code of 00, save it, and then submit it with NC and pipe. In this way, in the view of some IDS, the /msadc/msadcs.dll Iloveheikefangxian is not the same as the string of attack intent specified in its rule set file, so it will be indifferent to the behavior of the attacker. Look! How extensive is the application of the principle of "automatically truncating at ASCII code 00 when the computer processes a string"! Philosophically speaking, things are connected with each other, we should think more and dig out the internal laws, so There will be new discoveries.

The third trick: use the path separator "\"

For web servers like Microsoft's IIS, "\" can also be used as a path separator like "/". Some IDS did not consider the non-standard path separator "\" when setting the rule set file. If we rewrite /msadc/msadcs.dll to \msadc\ msadcs.dll, we can escape snort, because there is no identification mark of \msadc\ msadcs.dll in the snort rule set file. It is worth mentioning that the path separator "\" also has a magical effect, which is the "%5c" violent library method mentioned in the "Hacker Line of Defense" some time ago. "%5c" is the hexadecimal representation of "\".

Fourth trick: hexadecimal encoding

For a character, we can use the escape symbol "%" plus its hexadecimal ASCII code to represent it. For example, the first character "/" in /msadc/msadcs.dll can be expressed as %2F, and the following characters can be expressed by their corresponding hexadecimal ASCII code combined with "%". The URL encoded by this method It is no longer the original appearance. There may be no encoded string in the IDS rule set file, so IDS can be bypassed. But this method is invalid for IDS that uses HTTP preprocessing technology.

The fifth trick. Illegal Unicode encoding

UTF-8 encoding allows the character set to contain more than 256 characters, so it also allows more than 8 bits of encoding. The hexadecimal ASCII code of the "/" character is 2F, and the binary number is 00101111. The standard method for representing 2F in UTF-8 format is still 2F, but multi-byte UTF-8 can also be used to represent 2F. The character "/" can be represented by single-byte, double-byte, and three-byte UTF-8 encoding as shown in the following table:

"/" character representation binary hexadecimal

Single byte 0xxxxxxx 00101111 2F

Double byte 110xxxxx 10xxxxxx 11000000 10101111 C0 AF

Three bytes 1110xxxx 10xxxxxx 10xxxxxx 11100000 10000000 10101111 E0 80 AF
According to this method, we can encode the entire string accordingly. Although the resources that the encoded URLs ultimately point to are all the same, their expressions are different, and the filter string may not exist in the IDS rule set file, thus achieving the goal of breaking IDS.

Sixth trick: redundant coding method

The redundant coding is also called double decoding. I still remember that the Unicode decoding vulnerabilities and the double decoding vulnerabilities of IIS in 2000-2001 were making a lot of noise. At that time, many friends were confused and thought that the Unicode decoding vulnerabilities were double decoding vulnerabilities. In fact, the two of them are two different things. Is described in "Illegal Unicode Encoding". The redundant encoding refers to encoding a character multiple times. For example, the "/" character can be represented by %2f, and the "%", "2", and "f" characters in "%2f" can be represented by its ASCII code hexadecimal, according to the mathematical According to the knowledge of permutation and combination, the encoding form is 2 to the 3rd power, so "%2f" can be rewritten as: "%25%32%66", "%252f", etc. to realize the polymorphism of the URL. After encoding, The string may not be collected in the IDS rule set file, which can fool some IDS.

Seventh trick. Add false paths

After adding the string "../" to the URL, the directory after the string has no meaning and becomes invalid. Therefore, using the "../" character string can disrupt the identification mark analysis engine and break through the IDS!

Eighth trick: insert multiple slashes

We can use multiple "/" instead of a single "/". The replaced URL will still work as before. For example, the request for /msadc/msadcs.dll can be changed to ////msadc////msadcs.dll. After the author has experimented, this method can bypass some IDS.

Ninth trick: Comprehensive polymorphic coding

Smart, you will know when you read this subtitle. The so-called synthesis is to combine the several polymorphic coding techniques introduced above. In this way, the effect will be better. I hope this article will learn from you

enjoyβ€οΈπŸ‘πŸ»
written
by
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Nine practical methods to break through IDS intrusion detection system
Password Spraying Outlook Web Access_ Remote Shell.pdf
617.7 KB
A well written tutorial- #forbeginers Password Spraying Outlook Web Access_ Remote Shell
/▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 Updated Linux :

> Its a framework filled with alot of options and hacking tools you use directly in the script from brute forcing to payload making. Im still trying to think of what to add to the script. I now have another tool out called htkl-lite its hackers-tool-kit just not as big and messy. To see updates check on my instagram unkn0wn or if there are any problems message me on instagram.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1️⃣git clone https://github.com/unkn0wnh4ckr/hackers-tool-kit

2️⃣cd hackers-tool-kit

3️⃣python install.py

Run
4️⃣ROOT IS NOT REQUIRED TO RUN BUT IS RECOMMENDED

5️⃣cd hackers-tool-kit

6️⃣python htk.py

Then choose option

7️⃣the htksecure.py file will run the hackers-tool-kit with proxychains and other tools making you anonymous when hacking but some stuff might be slow or not work... to run htk secure look below

cd hackers-tool-kit

python htksecure.py

πŸ¦‘Tested On:

> debian

> Undercode Linux

enjoyβ€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁