Hacking

The seedier side of all of the above forums.

Cybrary is Hosting Live Webinars for Ethical Hacking [CEH]!

Sup everyone, just wanted to let you all know that Cybrary is hosting Live Webinars, throughout November through December, feel free to check it out here:

https://www.cybrary.it/cybrary-live/

It says you need to be Insider Pro, but I don't know I got in for free, let me know your thoughts/opinions. Cheers! Smile

[UPDATE]
You can access the webinars for free every Monday and Wednesday from 12:00 - 1:30 PM and you can access archives of previous webinars here:
https://www.cybrary.it/cybrary-live/ethical-hacking-certification-prep-l...

The webinars are free, but the labs for Ken are not; for his labs you need to purchase an Insider Pro Subscription for 100 dollars (I did this a couple of months back I thought it was great for people with low end computers that cant use too much resources and a lot of time to spare), you can always navigate to the other free CEH classes that have labs with them that are free like this one:
https://www.cybrary.it/catalog/practice_labs/ethical-hacker

Ah and the last thing you should know is that this is for the written portion of the CEH not the practical one!

[ + ] Implementing macchanger in Python

Occasionally in certain situations of LAN exploitation you may need to change your mac address so an attack can't be traced back to your NIC or wireless NIC. Or say for example, you have your system and you are about to enter a LAN, and don't want any logs to trace back to your nic afterwards, then changing your mac address is essential to fool ARP tables.Take note that to do this you need to have sudo privileges on your machine. Then I've written a mac changing script that can help you do just that, the way it works is you call ifconfig to change the address of the interface for you; I use the argparse module to take in arguments and run ifconfig as a subprocess, plain and simple:

def get_arguments():
        global interface #pull up the interface global variable
        global new_mac #pull up the new mac adress global variable
        parser = argparse.ArgumentParser() #call argparse
        parser.add_argument("-i","--interface", help = "The name of the interface", dest = "interface")
        parser.add_argument("-n","--newMAC",help = "The new MAC address",dest= "new_mac")
        args = parser.parse_args()  #parse the args
        interface =args.interface       #set the values for the global variable
        new_mac = args.new_mac


def change_mac(interface, new_mac):
        print("[+] Changing MAC address for {0} to {1}").format(interface,new_mac)
        subprocess.call(["ifconfig",interface,"down"])  #call ifconfig from shell
        subprocess.call(["ifconfig",interface,"hw","ether", new_mac])
        subprocess.call(["ifconfig",interface, "up"])
        result = subprocess.check_output(["ifconfig", interface]) #grab the resulting ifconfig output  
        new_address = re.search(r"\w\w:\w\w:\w\w:\w\w:\w\w:\w\w",result) # Use a regular expression to filter out the new mac
        if new_address:
                print(new_address.group()) #choose the the first one in the group of the new object
        else:
                print("[-] Cannot read MAC address")

get_arguments()
if interface and len(new_mac)==17:

Hack Gmail Account with Hydra

Hello To all

start!!!!

open Terminal
#apt update
#apt upgrade
#pkg install git
#pkg install python2
#git clone https://www.github.com/Gameye98/Black_Hydra.git
#cd Black_Hydra
(at this step insert password list that you have)
#cp-r/storage/emulated/o/pass.txt/$HOME/Black_Hydra
#python2 blackhydra.py

Good Luck

[ + ] The Art of Shellcoding and Port Binding

To the reader: I've moved posts like this into my new blog which you can find by clicking on blogs on the menu to your left I will be posting guides like this on there from now on!

Initially before writing this I thought to myself that because I had worked really hard on this matter (give or take about two weeks or so of constant hammering), I have just opened doors that were previously closed to me due to the passage of time and how things change. But I was convinced that what this community stands for, and how without it and someone there to guide me on this journey I'd be lost as hell. So I figured I'd give back by sharing what I've learned recently, which is creating shellcode for a portbind attack... however, the difference between what is commonly used to make it and my version of doing so, is that I use a more logical and concise method of doing it. To preface this I'm going to assume that you know x64 ASM, C network programming, and the basics of using Linux. I am also trusting that this post stays within the Soldierx community, I strongly support this community and hope to see its members cherish from this information.

If you don't know x64 ASM, I would recommend using Ray Seyfarth's Intro to x64 on Linux (and Windows for future projects):
https://www.amazon.com/s/ref=dp_byline_sr_book_1?ie=UTF8&text=Ray+Seyfar...
If you don't know C network programming I highly recommend Linux Socket Programming By Example by Warren Gay:
https://www.amazon.com/Linux-Socket-Programming-Example-Warren/dp/078972...

WPA2 Cracking

WPA2

WPA2 was built from the ground up to provide a secure encryption system for wireless networks.
It implements an encryption protocol built specifically for wireless security called Counter Mode with Cipher Block Chaining
Message Authentication Code Protocol (CCMP).
CCMP is built on the Advanced Encryption Standard (AES).
WPA and WPA2 support both personal and enterprise setups. WPA/WPA2 personal uses a pre-shared key, similar to WEP.
WPA/WPA2 enterprise adds an additional element called a Remote Authentication Dial-In User Service (RADIUS) server to manage client authentication.

The Enterprise Connection Process

In WPA/WPA2 enterprise networks, the client connection process comprises four steps. First the client and the access
point agree on mutually supported security protocols. Then, based on the authentication protocol chosen, the access point and the RADIUS server
exchange messages to generate a master key. Once a master key is generated, a message that authentication was successful is sent to the access point
and passed on to the client, and the master key is sent to the access point.
The access point and the client exchange and verify keys for mutual authentication, message encryption, and message integrity via a four-way hand-shake.
Following key exchange, traffic between the client and the access point is secured with WPA or WPA2.

The Personal Connection Process

The WPA/WPA2 personal connection process is slightly simpler than the enterprise one: No RADIUS server is required, and the entire process is
between the access point and the client. No authentication or master key step occurs, and instead of a RADIUS server and master key, WPA/WPA2 personal use pre-shared keys, which are generated using pre-shared passphrases.
The WPA/WPA2 personal passphrase that you enter when you connect to a secured network is static, whereas enterprise setups use dynamic keys

Compiling Key-logger

Guys i have seen a few things on the internet about installing and compiling a Key-logger inside a picture perhaps on .jpeg and once the victim downloads or opens the picture it will install a key-logger on their computer has anyone had any experience in doing this and have made it either to social engineer attack someone and what sort of programming language is needed for such an attack depending on the O/S system. And perhaps can an email address be made for the Key-logger to respond to as i have had an idea to test it out if i have the knowledge to be able to research and compile one but i just thought that i would like to ask any programmer if it is possible as the email client will be proton mail for the receiving aspect of anonymity with using the tails O/S system for access to the email client after cracking a network all programming will be done on an offline computer as of yet i have not the knowledge to annoymize myself across the web an would consider myself to be compromise-able so all endeavors will be done with a old laptop and a new hard drive installed and encrypted on the laptop i use for secuiryt based reasons perhaps an SD card that i can swallow in case of a compromise its good to be paranoid such as i am eyes everywhere but i thought i would just like to post it and see if i get a reply Guys thanks very much for taking the time to read my post.

SQLi Basic only for newbs

Hello fellas,

According to Wikipedia:
SQL injection is a code injection technique, used to attack data-driven applications,
in which nefarious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).
SQL injection must exploit a security vulnerability in an application's software.
SQL injection is mostly known as an attack vector for websites but can be used to attack any type of SQL database.

There are three parts of a database management system, like SQL.

1 Creating structure of table
2 Entering data
3 Making queries

When SQL is used to display data on a web page, it is common to allow web users input their own queries.
Basically, the users, can create queries and request data from their SQL servers without typing any code.
There is a method of creating queries which can be exploited by an attacker.
An url ending in .php is a direct indication that the website uses sql to deliver a lot of its data and that you can execute queries directly by changing the url.
Usually the data in the SQL tables is protected and can be viewed directly only by an admin.
However, if we send some commands to the SQL server, it doesn't understand what to do, and returns an error.
Sometimes this error means something like that "I'll give private data for you babe".
This attack can be used to obtain confidential data like a list of username and passwords of all users on a website.

We have to find a website which is vulnerable to SQL injection (SQLi) attacks.
Vulnerability has 2 criteria. Firstly, it has to allow execution of queries from the url, and secondly,
it should show an error for some kind of query. An error is an indication of a SQL vulnerability.
Then we should obtain information about SQL version and the number of tables in database and columns in the tables.
Finally we have to extract the information from the tables.

Bypassing AV during meterpreter process migrate

Hi guys, am trying to migrate to another process in Metasploit. however, the server is running Zemana Endpoint and to the best of my knowledge, it's the one blocking the migrate process. Every time I run migrate -N winlogon.exe the session dies immediately.
Does anyone know of a way I can bypass this?

Thanks

Base64 URI Download Link Generator - Convert any file into a link

Base64 URI Download Link Generator is a tool that will convert any file into a downloadable html link. This is useful in certain cases, for example you want to send an html email to a user with actionable stuff! All you have to do is open the file you want to embed, Convert to Ascii, copy the code to "Base64 URI Download Link Generator", give it a filename and extension, a name and press "Encode".

In a few seconds, depending on the size of the file, a html code with base64 encoding will be generated.

The main reason why i code this tool was because attachments are been blocked on most email providers and you won't be able to send exe, zip, cmd, lnk, etc. This is a security method implemented by email providers to reduce virus spreading and "Base64 URI Download Link Generator" is the way to use if you want to send suspicious files to a user and still bypass email providers filters.

Note: The program is a bit slow.

Note 2: Data URI Scheme doesn't work with IE or EDGE. Also there is a premium tool based on this program called "URI FUD Generator" that reduces antivirus detection on certain files (not 100% FUD but with good results)! PM me for more info.

Download:
http://www.mediafire.com/file/xwmm726kobqdsbl/Base64_URI_Download_Link_G...

Virustotal:
https://virustotal.com/#/file/f37dd22bb44f5fbd798ac25db6a0f47e32c64c34c1...

Firefox Exploit Generator - CVE-2013-1670/CVE-2013-1710

This is a toolkit to generate Firefox exploits that works on Firefox from version 15.0 to version 23.0 on Windows.

Note: You will need to obfuscate or encode the result generated in order to avoid or reduce antivirus detection. Also both generators have the exploits in plain text therefore they may be detected. (Don't trust, check the source before using them)

The purpose of both generators is to offer to beginners a easy way to generate custom exploit code for this two vulnerabilities without requiring coding. (Just Copy/Paste or simple batch programming)

[b]Download:[/b]
http://www.mediafire.com/file/nv6vsoo44h1cg4p/Firefox_Exploit_Generator.rar

[b]Virus Analysis[/b] (6/56)
https://virustotal.com/en/file/a8838ddcd12db1a60491f1b02f2ed271d74b461d9...

Syndicate content