Forwarded from GAMINGFLEXER (Nҽʋҽɾƙɳɯ_ _ƈօֆʍօֆ)
An invisible war
For the past few months I've been fighting an invisible war but for you to understand I need to tell a story…
In 2008 I was surfing the internet looking for something to increase my knowledge when I come across an announcement of a “new” operating system using the Linux kernel, it was a mobile device system called Android, it was still far from being released on Brazil but my mind had already projected the possibilities of a mobile system with the Linux Kernel…
I imported the first smartphone using Android, a HTC from T-MOBILE, it did not even work on the Brazilian network, at only 11 years old I invested in a technology in which nobody gave anything even the manufacturers that now banalize the platform.
Years later a well-known Hacker and tool developer named EvilSOCKET created the first Android Hacking tool called dSploit, he did what I plan to do one day but was unaware of at the time… dSploit was what opened my mind to Hacking possibilities with Android and further consolidated what I predicted, that the future of Hacking is mobile!
But not all are perfect, EvilSOCKET sold the company ZIMPERIUM and killed the dSploit project, I thought this would make other professionals invest in Android, my mistake…
Years later Kali Linux emerged as a replacement for BackTrack from the renowned Offensive Security, soon after they announced Kali NetHunter a system similar to Kali Linux but aimed at Android. Can you imagine my ecstasy when I learned of this? Finally a company investing in the future, but once again I had my dreams torn to know that it was a totally pig system, poorly developed and "emulated" now Android already a Linux distro emulate another inside it is very stupid !!! Offensive Security uses the system as a backdoor for NEXUS and ONEplus devices.
But I as a Brazilian have always heard everyone even Brazilians say: Brazil is rubbish, Brazilians can do nothing but steal, a Brazilian will never go forward…
I grew up listening to this but decided to go over everything and slap my face even though I knew I would be tried and crucified by many but most of all I knew that I could help my professional class and that's what really matters to me, on 08/09/2016 I started a project of an Advanced Pentest distribution for Android smartphones using all the futuristic methodologies that I could develop observing the evolution of Android and computer security, it was a native system (No emulation) fully developed with focus on Android devices, without emulating anything, making use of the Linux Kernel itself already present in the device. The project name was ANDRAX!
The first BETA was completely conceptual, just Nmap and a few other tools, but I was wondering if the idea was viable, if I could touch people's minds if I could make them support me on this arduous journey, the result was amazing… on the first day of telegram launch i got over 120 messages from different people talking about the system…
We can say that the idea was a success, for the first time in my life I had proof that Brazil could offer something useful to the world, but as they say; nail that stands out gets hammered.
The haters arrived very quickly, so there was an army of devoted NetHunter and Offensive Security devotees cursing me, spreading lies, ANDRAX was an Open Source system but they said it was a backdoor… but you know the most impressive thing about these people that Do you defend with your own life a system you don't even know? They do not have a device that runs NetHunter, they do not know how to program, they do not work with computer security… that is, it is only the people who make Brazil taxed as rubbish compared to other countries… so I learned to ignore these robots without arguments.
#ANDRAX
For the past few months I've been fighting an invisible war but for you to understand I need to tell a story…
In 2008 I was surfing the internet looking for something to increase my knowledge when I come across an announcement of a “new” operating system using the Linux kernel, it was a mobile device system called Android, it was still far from being released on Brazil but my mind had already projected the possibilities of a mobile system with the Linux Kernel…
I imported the first smartphone using Android, a HTC from T-MOBILE, it did not even work on the Brazilian network, at only 11 years old I invested in a technology in which nobody gave anything even the manufacturers that now banalize the platform.
Years later a well-known Hacker and tool developer named EvilSOCKET created the first Android Hacking tool called dSploit, he did what I plan to do one day but was unaware of at the time… dSploit was what opened my mind to Hacking possibilities with Android and further consolidated what I predicted, that the future of Hacking is mobile!
But not all are perfect, EvilSOCKET sold the company ZIMPERIUM and killed the dSploit project, I thought this would make other professionals invest in Android, my mistake…
Years later Kali Linux emerged as a replacement for BackTrack from the renowned Offensive Security, soon after they announced Kali NetHunter a system similar to Kali Linux but aimed at Android. Can you imagine my ecstasy when I learned of this? Finally a company investing in the future, but once again I had my dreams torn to know that it was a totally pig system, poorly developed and "emulated" now Android already a Linux distro emulate another inside it is very stupid !!! Offensive Security uses the system as a backdoor for NEXUS and ONEplus devices.
But I as a Brazilian have always heard everyone even Brazilians say: Brazil is rubbish, Brazilians can do nothing but steal, a Brazilian will never go forward…
I grew up listening to this but decided to go over everything and slap my face even though I knew I would be tried and crucified by many but most of all I knew that I could help my professional class and that's what really matters to me, on 08/09/2016 I started a project of an Advanced Pentest distribution for Android smartphones using all the futuristic methodologies that I could develop observing the evolution of Android and computer security, it was a native system (No emulation) fully developed with focus on Android devices, without emulating anything, making use of the Linux Kernel itself already present in the device. The project name was ANDRAX!
The first BETA was completely conceptual, just Nmap and a few other tools, but I was wondering if the idea was viable, if I could touch people's minds if I could make them support me on this arduous journey, the result was amazing… on the first day of telegram launch i got over 120 messages from different people talking about the system…
We can say that the idea was a success, for the first time in my life I had proof that Brazil could offer something useful to the world, but as they say; nail that stands out gets hammered.
The haters arrived very quickly, so there was an army of devoted NetHunter and Offensive Security devotees cursing me, spreading lies, ANDRAX was an Open Source system but they said it was a backdoor… but you know the most impressive thing about these people that Do you defend with your own life a system you don't even know? They do not have a device that runs NetHunter, they do not know how to program, they do not work with computer security… that is, it is only the people who make Brazil taxed as rubbish compared to other countries… so I learned to ignore these robots without arguments.
#ANDRAX
Forwarded from GAMINGFLEXER (Nҽʋҽɾƙɳɯ_ _ƈօֆʍօֆ)
"cracked" m.a.r.i.n.a - ported for pc (Linux)
Download: https://anonfile.com/BbZ08cC4n0/marina_CRACKED_BY_matej_sochan_zip
I also improved the script, because Weidsom likes only "real hackers."
How to use?:
1. You must have Parrot os or Kali Linux installed on your pc
2. Open folder "marina" (v2)
3. "Open in terminal."
4. Type: "su"
5. Type: "python3 marina.py
6. Use!!
Marina(andrax) author: Weidsom Nascimeto
Ported for pc: Matej Socháň
Pst.. I am working on v1 port..
Download: https://anonfile.com/BbZ08cC4n0/marina_CRACKED_BY_matej_sochan_zip
I also improved the script, because Weidsom likes only "real hackers."
How to use?:
1. You must have Parrot os or Kali Linux installed on your pc
2. Open folder "marina" (v2)
3. "Open in terminal."
4. Type: "su"
5. Type: "python3 marina.py
6. Use!!
Marina(andrax) author: Weidsom Nascimeto
Ported for pc: Matej Socháň
Pst.. I am working on v1 port..
Forwarded from GAMINGFLEXER (Nҽʋҽɾƙɳɯ_ _ƈօֆʍօֆ)
👆install this too first then run the script
Forwarded from GAMINGFLEXER (Nҽʋҽɾƙɳɯ_ _ƈօֆʍօֆ)
Nҽʋҽɾƙɳɯ_ _ƈօֆʍօֆ:
su -c busybox tar -xyJf /storage/emulated/0/andrax.r4-build2.tar.xz -C /data/data/com.thecrackertechnology.andrax/ANDRAX/
👆in termux after installing andrax and giving root permission
#andrax
su -c busybox tar -xyJf /storage/emulated/0/andrax.r4-build2.tar.xz -C /data/data/com.thecrackertechnology.andrax/ANDRAX/
👆in termux after installing andrax and giving root permission
#andrax
Forwarded from GAMINGFLEXER (Nҽʋҽɾƙɳɯ_ _ƈօֆʍօֆ)
Forwarded from GAMINGFLEXER (Nҽʋҽɾƙɳɯ_ _ƈօֆʍօֆ)
☝🏼☝🏼☝🏼KERNAL MODIFICATION FOR ANDRAX FOR FULL SUPPORT
Forwarded from GAMINGFLEXER (Nҽʋҽɾƙɳɯ_ _ƈօֆʍօֆ)
# How to Hack Mobile Networks 3G/4G #andrax
> Mobile telecommunication networks are today one of the most important pillars of modern society
> Hacking these networks is more than an attack is proof that you are one of the best! In hacking or you are 1 or 0
## How mobile networks works?
Mobile telecommunications networks have very intricate infrastructures that require a lot of study time to understand.
But I will try to explain as much as possible in this article.
### Introduction
- 1st Generation Analog Systems
- Analog Telecommunication
- No data transmission, only voice transmission
- 2nd Generation Digital Systems
- Purely digital technology
- Circuit switching: dedicated point-to-point connections during calls
- TDMA, GSM, CDMA
- Circuit-switched data services (HSCSD)
- Very slow data transmission
- 2.5 – 3rd Generation
- Mix of circuit switching and packet-switching
- Packet-switched data
- Allows mobile networks to transmit IP packets to the Internet
- GPRS, EDGE, CDMA2000
- 4th Generation
- All IP-based secured packet switched network (IPv6 supported)
- Voice also transmitted over IP
- LTE, WiMAX
### Differences in structure, equipment and protocols
2G | 3G | 4G/LTE
------------ | ------------- | -------------
BTS | NodeB | eNodeB
BSC | merged into NodeB | merged into eNodeB
MSC/VLR | RNC | MME, MSC Proxy
HLR | HLR, IMS HSS, HE | LTE SAE HSS, SDR/SDM
STP | STP,SG | Legacy STP
GGSN | GGSN | PDN GW
SGSN | SGSN | MME/SGW
IN | IN/PCRF | PCRF
RAN Firewall | RAN Firewall | SeGW
### LTE and 3G User Connection
E-UTRAN consists of eNodeBs (i.e., base
stations).
It manages the radio communication between
eNodeB and UE and facilitates communication
between the UE and EPC
S-GW: All user IP packets are transferred through the S-GW,
which serves as the local mobility anchor when the UE moves
between eNodeBs.
P-GW: The PDN (packet data network) Gateway is responsible for
IP address allocation for the UE, QoS enforcement and flow-based charging.
## But how to hack a mobile network?
There are hundreds of possibilities, many flaws, many types of attacks.
### What i need to hack a mobile network, some hardware?
* A Android smartphone
* #Andrax
A smartphone is a transceiver, and already comes with all the necessary hardware, thanks to the technology of the new networks and the powerful Linux environment in Android we can access the STACK of the protocols and put these networks in our hands!
### 3G/4G STACK Blocks on Android devices
Everything in Linux is file, to access the interfaces of the modems in Android we have to access the "block devices" located in /dev
For example in my device we can see ours TTY to SCOMM with chipset, in pts dir we have our umts modem SCOMM too.
Using these SCOMM blocks we can elevate the STACK to inject protocols flaws.
### The first step to hack a mobile network
First use the "simplest" attack which is very complex, attack based on internal routing failure on NodeB or ENodeB.
To do this we have to disconnect our WiFi network and raise the mobile network interface which in Android is called "rmnet"
We can see that in my case I am connected in ENodeB with ip 10.117.200.51 and mask 255.255.255.0, that is, my network block is from 10.117.200.1 to 10.117.200.254
To list the possible breakpoints on this network I have to use nmap. but with very delicate parameters because the SeGW firewall is very violent and one of the best designed structures to identify scanners!
Maybe -T1 can help you!
We will use some of these active devices in the same netblock to jump out of that gateway and enter the SIGTRAN or DIAMETER if you are in a very old (2G) network in the SS7
#### SigPloit Framework
With SigPloit framewrok we can do some SIGNALING hacks but not something advanced like do it by our hands, SigPloit is included on ANDRAX and it is good to you start learn a bit about SIGNALING hacks. Combined with others attacks this can be very dangerous!
### Major attacks on mobile networks
* Routing failures
* SI
GN
> Mobile telecommunication networks are today one of the most important pillars of modern society
> Hacking these networks is more than an attack is proof that you are one of the best! In hacking or you are 1 or 0
## How mobile networks works?
Mobile telecommunications networks have very intricate infrastructures that require a lot of study time to understand.
But I will try to explain as much as possible in this article.
### Introduction
- 1st Generation Analog Systems
- Analog Telecommunication
- No data transmission, only voice transmission
- 2nd Generation Digital Systems
- Purely digital technology
- Circuit switching: dedicated point-to-point connections during calls
- TDMA, GSM, CDMA
- Circuit-switched data services (HSCSD)
- Very slow data transmission
- 2.5 – 3rd Generation
- Mix of circuit switching and packet-switching
- Packet-switched data
- Allows mobile networks to transmit IP packets to the Internet
- GPRS, EDGE, CDMA2000
- 4th Generation
- All IP-based secured packet switched network (IPv6 supported)
- Voice also transmitted over IP
- LTE, WiMAX
### Differences in structure, equipment and protocols
2G | 3G | 4G/LTE
------------ | ------------- | -------------
BTS | NodeB | eNodeB
BSC | merged into NodeB | merged into eNodeB
MSC/VLR | RNC | MME, MSC Proxy
HLR | HLR, IMS HSS, HE | LTE SAE HSS, SDR/SDM
STP | STP,SG | Legacy STP
GGSN | GGSN | PDN GW
SGSN | SGSN | MME/SGW
IN | IN/PCRF | PCRF
RAN Firewall | RAN Firewall | SeGW
### LTE and 3G User Connection
E-UTRAN consists of eNodeBs (i.e., base
stations).
It manages the radio communication between
eNodeB and UE and facilitates communication
between the UE and EPC
S-GW: All user IP packets are transferred through the S-GW,
which serves as the local mobility anchor when the UE moves
between eNodeBs.
P-GW: The PDN (packet data network) Gateway is responsible for
IP address allocation for the UE, QoS enforcement and flow-based charging.
## But how to hack a mobile network?
There are hundreds of possibilities, many flaws, many types of attacks.
### What i need to hack a mobile network, some hardware?
* A Android smartphone
* #Andrax
A smartphone is a transceiver, and already comes with all the necessary hardware, thanks to the technology of the new networks and the powerful Linux environment in Android we can access the STACK of the protocols and put these networks in our hands!
### 3G/4G STACK Blocks on Android devices
Everything in Linux is file, to access the interfaces of the modems in Android we have to access the "block devices" located in /dev
For example in my device we can see ours TTY to SCOMM with chipset, in pts dir we have our umts modem SCOMM too.
Using these SCOMM blocks we can elevate the STACK to inject protocols flaws.
### The first step to hack a mobile network
First use the "simplest" attack which is very complex, attack based on internal routing failure on NodeB or ENodeB.
To do this we have to disconnect our WiFi network and raise the mobile network interface which in Android is called "rmnet"
We can see that in my case I am connected in ENodeB with ip 10.117.200.51 and mask 255.255.255.0, that is, my network block is from 10.117.200.1 to 10.117.200.254
To list the possible breakpoints on this network I have to use nmap. but with very delicate parameters because the SeGW firewall is very violent and one of the best designed structures to identify scanners!
Maybe -T1 can help you!
We will use some of these active devices in the same netblock to jump out of that gateway and enter the SIGTRAN or DIAMETER if you are in a very old (2G) network in the SS7
#### SigPloit Framework
With SigPloit framewrok we can do some SIGNALING hacks but not something advanced like do it by our hands, SigPloit is included on ANDRAX and it is good to you start learn a bit about SIGNALING hacks. Combined with others attacks this can be very dangerous!
### Major attacks on mobile networks
* Routing failures
* SI
GN
Forwarded from GAMINGFLEXER (Nҽʋҽɾƙɳɯ_ _ƈօֆʍօֆ)
ALING Attacks
* HLR/HSS Injection
* HLR/HSS Poisoning
* PTP Flood
* EPC Hijack
* DIAMETER Fuzzing
* EPC DNS Spoof
* EPC DNS Recache
## What we can do hacking a mobile network?
* Free internet :)
* Control data
* Spoof data
* Hijack data
* Put users in a botnet
* DoS
* Clone clients
* ... The possibilities are endless!
@hackersmeet0
* HLR/HSS Injection
* HLR/HSS Poisoning
* PTP Flood
* EPC Hijack
* DIAMETER Fuzzing
* EPC DNS Spoof
* EPC DNS Recache
## What we can do hacking a mobile network?
* Free internet :)
* Control data
* Spoof data
* Hijack data
* Put users in a botnet
* DoS
* Clone clients
* ... The possibilities are endless!
@hackersmeet0
Forwarded from GAMINGFLEXER (Nҽʋҽɾƙɳɯ_ _ƈօֆʍօֆ)
👆try guys whoever are currently working on Andrax
Forwarded from Nҽʋҽɾƙɳɯ_ _ƈօֆʍօֆ
CHANGELOG:
v4 BUILD:2 [ 02/12/2019 ]
Fixed crash's
New MARINA version
v4 BUILD:1 [ 25/11/2019 ]
New terminal | GNOME/Mate Terminal like
New installation method
New M.A.R.I.N.A version
DCO Reorganized tools
New Adaptative icons
DHCPig removed
Siege removed
Jshell removed
Updated tools
AXSurf updated
New comfiguration on amass
Fixed sort
Fixed netstat
Fixed TLD_Scanner
Fixed installation crashs
Added double check to prevent motherfuckers who kill ANDRAX
in Baterry Otimization (If user block ANDRAX will force in anyway!)
Added lbd
Added netmask
Added nbtscan
Added smbmap
Added smtp-user-enum
Added onesixtyone
Added ike-scan
Added psk-crack
Added joomlavs
Added vulnx
Added ua-tester
Added cadaver
Added wifiarp
Added wifidns
Added wifiping
Added wifitap
Added eapmd5pass
Added figlet
Added Nemesis to DCO
Added XSpear to DCO
Added mikrotaker to DCO
Added fragroute to DCO
Added arping to DCO
Added dnsdict6 to DCO
Added inverse_lookup6 to DCO
Added thcping6 to DCO
Added trace6 to DCO
Added netdiscover to DCO
Added p0f to DCO
Added fuzz_ip6 to DCO
Added flood_advertise6 to DCO
Added flood_dhcpc6 to DCO
Added flood_mld26 to DCO
Added flood_mld6 to DCO
Added flood_mldrouter6 to DCO
Added flood_redir6 to DCO
Added flood_router26 to DCO
Added flood_router6 to DCO
Added flood_rs6 to DCO
Added flood_solicitate6 to DCO
Added flood_unreach6 to DCO
Added denial6 to DCO
Added fragmentation6 to DCO
Added kill_router6 to DCO
Added rsmurf6 to DCO
Added detect_sniffer6 to DCO
Added dos-new-ip6 to DCO
Added fake_advertise6 to DCO
Added fake_dhcps6 to DCO
Added fake_dns6d to DCO
Added fake_dnsupdate6 to DCO
Added fake_mld26 to DCO
Added fake_mld6 to DCO
Added fake_mldrouter6 to DCO
Added fake_router26 to DCO
Added fake_router6 to DCO
Added fake_solicitate6 to DCO
Added implementation6 to DCO
Added parasite6 to DCO
Added randicmp6 to DCO
Added redir6 to DCO
Added smurf6 to DCO
Added pixiewps to DCO
Added wifite2 to DCO
v3 STABLE [ 07/08/2019 ]
AXSurf
AFOS fixed
v3 BUILD:6 [ 07/08/2019 ]
Updated tools
Added Mikrotaker
Added Xspear
Changed download server
v3 BUILD:5 [ 25/07/2019 ]
Updated tools
Added nemesis
Added MARINA
Fixed NodeXP
Fixed some Crashs
v3 BUILD:4 [ 27/06/2019 ]
Updated tools
Updated AFOS (previous versions was errored)
Added new BUGs to fix later
Fixed Crashs
v3 BUILD:3 [ 20/06/2019 ]
Fix apps crashs
Fix SigPloit Java PATH
Fix some AFOS faults
Fixed Crashs
v3 BUILD:2 [ 10/06/2019 ]
Removed old LAUNCHER tools
Updated commit() to apply() (Prevent bugs)
Added WakeLock Permission
Added Singularity Framework
Fixed Crashs
v3 BUILD:1 [ 02/06/2019 ]
Updated a lot of tools
Removed cache files
Removed Ruby gems
Removed APKTOOL
Removed JAVA
Removed DarkSpiritz framework
Removed getsploit
NEW [ Tutorials Videos and Articles Activity ]
NEW [ Module AXSurf for Anonymize ]
Added Hashboy
Added Goca
Added CMSeeK
Added ISF
Added XanXSS
Added ReconDog
Added RED_HAWK
Added iSMTP
Added libusb-1-dev
Added BlueZ Tools for bluetooth Hacking
Added Bluesnarfer
Added Wfuzz
Added Nettacker
Added SIXNET-tools
Added ISAF
Added Netdiscover
Added modbus-cli
Added atg-info
Added BACnet-discover-enumerate
Added codesys-v2-discover
Added cspv4-info
Added dnp3-info
Added enip-enumerate
Added fox-info
Added modicon-info
Added omrontcp-info
Added omronudp-info
Added pcworx-info
Added proconos-info
Added s7-enumerate
Added Siemens-CommunicationsProcessor
Added Siemens-HMI-miniweb
Added Siemens-Scalance-module
Added Siemens-SIMATIC-PLC-S7
Added Siemens-WINCC
Added iec-identify
Added mms-identify
Added get_seed_range
Added iec-60870-5-104
Added iec-61850-8-1
Added profinet_scanner.noscapy
Added profinet_scanner.scapy
Added profinet_set_fuzzer
Added profinet_set_network_info
Added s7-1200_brute_offline
Added s7-1500_brute_offline
Added s7-packet-structure
Added s7_password_hashes_extractor
Added s7-show-payloads
Added show_byte_sequences
Added SCADAPASS
Added mbtget
Added modscan
Added plcscan
Added s7scan
Added Expliot
Added crackle
Added CANToolz
Added CryptoMobile
Added SigPloit
Added MinGW32
Added pycrate
v4 BUILD:2 [ 02/12/2019 ]
Fixed crash's
New MARINA version
v4 BUILD:1 [ 25/11/2019 ]
New terminal | GNOME/Mate Terminal like
New installation method
New M.A.R.I.N.A version
DCO Reorganized tools
New Adaptative icons
DHCPig removed
Siege removed
Jshell removed
Updated tools
AXSurf updated
New comfiguration on amass
Fixed sort
Fixed netstat
Fixed TLD_Scanner
Fixed installation crashs
Added double check to prevent motherfuckers who kill ANDRAX
in Baterry Otimization (If user block ANDRAX will force in anyway!)
Added lbd
Added netmask
Added nbtscan
Added smbmap
Added smtp-user-enum
Added onesixtyone
Added ike-scan
Added psk-crack
Added joomlavs
Added vulnx
Added ua-tester
Added cadaver
Added wifiarp
Added wifidns
Added wifiping
Added wifitap
Added eapmd5pass
Added figlet
Added Nemesis to DCO
Added XSpear to DCO
Added mikrotaker to DCO
Added fragroute to DCO
Added arping to DCO
Added dnsdict6 to DCO
Added inverse_lookup6 to DCO
Added thcping6 to DCO
Added trace6 to DCO
Added netdiscover to DCO
Added p0f to DCO
Added fuzz_ip6 to DCO
Added flood_advertise6 to DCO
Added flood_dhcpc6 to DCO
Added flood_mld26 to DCO
Added flood_mld6 to DCO
Added flood_mldrouter6 to DCO
Added flood_redir6 to DCO
Added flood_router26 to DCO
Added flood_router6 to DCO
Added flood_rs6 to DCO
Added flood_solicitate6 to DCO
Added flood_unreach6 to DCO
Added denial6 to DCO
Added fragmentation6 to DCO
Added kill_router6 to DCO
Added rsmurf6 to DCO
Added detect_sniffer6 to DCO
Added dos-new-ip6 to DCO
Added fake_advertise6 to DCO
Added fake_dhcps6 to DCO
Added fake_dns6d to DCO
Added fake_dnsupdate6 to DCO
Added fake_mld26 to DCO
Added fake_mld6 to DCO
Added fake_mldrouter6 to DCO
Added fake_router26 to DCO
Added fake_router6 to DCO
Added fake_solicitate6 to DCO
Added implementation6 to DCO
Added parasite6 to DCO
Added randicmp6 to DCO
Added redir6 to DCO
Added smurf6 to DCO
Added pixiewps to DCO
Added wifite2 to DCO
v3 STABLE [ 07/08/2019 ]
AXSurf
AFOS fixed
v3 BUILD:6 [ 07/08/2019 ]
Updated tools
Added Mikrotaker
Added Xspear
Changed download server
v3 BUILD:5 [ 25/07/2019 ]
Updated tools
Added nemesis
Added MARINA
Fixed NodeXP
Fixed some Crashs
v3 BUILD:4 [ 27/06/2019 ]
Updated tools
Updated AFOS (previous versions was errored)
Added new BUGs to fix later
Fixed Crashs
v3 BUILD:3 [ 20/06/2019 ]
Fix apps crashs
Fix SigPloit Java PATH
Fix some AFOS faults
Fixed Crashs
v3 BUILD:2 [ 10/06/2019 ]
Removed old LAUNCHER tools
Updated commit() to apply() (Prevent bugs)
Added WakeLock Permission
Added Singularity Framework
Fixed Crashs
v3 BUILD:1 [ 02/06/2019 ]
Updated a lot of tools
Removed cache files
Removed Ruby gems
Removed APKTOOL
Removed JAVA
Removed DarkSpiritz framework
Removed getsploit
NEW [ Tutorials Videos and Articles Activity ]
NEW [ Module AXSurf for Anonymize ]
Added Hashboy
Added Goca
Added CMSeeK
Added ISF
Added XanXSS
Added ReconDog
Added RED_HAWK
Added iSMTP
Added libusb-1-dev
Added BlueZ Tools for bluetooth Hacking
Added Bluesnarfer
Added Wfuzz
Added Nettacker
Added SIXNET-tools
Added ISAF
Added Netdiscover
Added modbus-cli
Added atg-info
Added BACnet-discover-enumerate
Added codesys-v2-discover
Added cspv4-info
Added dnp3-info
Added enip-enumerate
Added fox-info
Added modicon-info
Added omrontcp-info
Added omronudp-info
Added pcworx-info
Added proconos-info
Added s7-enumerate
Added Siemens-CommunicationsProcessor
Added Siemens-HMI-miniweb
Added Siemens-Scalance-module
Added Siemens-SIMATIC-PLC-S7
Added Siemens-WINCC
Added iec-identify
Added mms-identify
Added get_seed_range
Added iec-60870-5-104
Added iec-61850-8-1
Added profinet_scanner.noscapy
Added profinet_scanner.scapy
Added profinet_set_fuzzer
Added profinet_set_network_info
Added s7-1200_brute_offline
Added s7-1500_brute_offline
Added s7-packet-structure
Added s7_password_hashes_extractor
Added s7-show-payloads
Added show_byte_sequences
Added SCADAPASS
Added mbtget
Added modscan
Added plcscan
Added s7scan
Added Expliot
Added crackle
Added CANToolz
Added CryptoMobile
Added SigPloit
Added MinGW32
Added pycrate
Forwarded from Nҽʋҽɾƙɳɯ_ _ƈօֆʍօֆ
Mikrotik Special Login Feature
To access the Mikrotik Router there are certainly many ways that we can use. We can remotely Router by GUI (Graphical User Interface), or by CLI (Command Line Interface). There are several tools that we can use to remotely router in a GUI. Examples of applications are Winbox, Webfig and Mikrotik (Android & IOS). Then applications for remote Router CLI are Telnet, SSH and Serial.
Special Login is used to access routers that are connected using the Console Cable by opening a telnet / ssh session that will direct you directly to the device (without having to log in to RouterOS first).
-----------------------------------------------------------------------------------------------------------
Maybe there are some questions for this special login feature,
1. To access Router2, why not directly connect it to a laptop? Well maybe the case is that you don't have a USB to RS232 Cable, you only have a Serial / Console cable. Thus we can use the "Special Login" feature.
2. Why don't Router1 and Router2 only connect using an ethernet cable? Isn't the need so that we can remotely Router2? Now for this case, for example, Router2 already has a complex configuration, and all interfaces contained in Router2 are accidentally disabled. Reset or Netinstall is not possible, so we can access Router2 using Console / Serial cable, and reactivate the interface that was accidentally disabled.
To access the Mikrotik Router there are certainly many ways that we can use. We can remotely Router by GUI (Graphical User Interface), or by CLI (Command Line Interface). There are several tools that we can use to remotely router in a GUI. Examples of applications are Winbox, Webfig and Mikrotik (Android & IOS). Then applications for remote Router CLI are Telnet, SSH and Serial.
Special Login is used to access routers that are connected using the Console Cable by opening a telnet / ssh session that will direct you directly to the device (without having to log in to RouterOS first).
-----------------------------------------------------------------------------------------------------------
Maybe there are some questions for this special login feature,
1. To access Router2, why not directly connect it to a laptop? Well maybe the case is that you don't have a USB to RS232 Cable, you only have a Serial / Console cable. Thus we can use the "Special Login" feature.
2. Why don't Router1 and Router2 only connect using an ethernet cable? Isn't the need so that we can remotely Router2? Now for this case, for example, Router2 already has a complex configuration, and all interfaces contained in Router2 are accidentally disabled. Reset or Netinstall is not possible, so we can access Router2 using Console / Serial cable, and reactivate the interface that was accidentally disabled.
ANDRAX Open DIscussion Group.
Everyone is invited to share their knowledge and discuss problems.
https://t.me/joinchat/HxCOaRW4DNGei8lutF2nsg
Everyone is invited to share their knowledge and discuss problems.
https://t.me/joinchat/HxCOaRW4DNGei8lutF2nsg
ANDRAX - GROUP pinned «ANDRAX Open DIscussion Group. Everyone is invited to share their knowledge and discuss problems. https://t.me/joinchat/HxCOaRW4DNGei8lutF2nsg»
Remote iPhone Exploitation Part 1: Poking Memory via iMessage and CVE-2019-8641
https://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-1.html
https://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-1.html
Blogspot
Remote iPhone Exploitation Part 1: Poking Memory via iMessage and CVE-2019-8641
Posted by Samuel Groß, Project Zero Introduction This is the first blog post in a three-part series that will detail how a vulnerability...