lunes, 22 de enero de 2024

DSploit

DSploit

After playing with the applications installed on the Pwn Pad, I found that the most important application (at least for me) was missing from the pre-installed apps. Namely, DSploit. Although DSploit has tons of features, I really liked the multiprotocol password sniffing (same as dsniff) and the session hijacking functionality.

The DSploit APK in the Play Store was not working for me, but the latest nightly on http://dsploit.net worked like a charm.

Most features require that you and your target uses the same WiFi network, and that's it. It can be Open, WEP, WPA/WPA2 Personal. On all of these networks, DSploit will sniff the passwords - because of the active attacks. E.g. a lot of email clients still use IMAP with clear text passwords, or some webmails, etc. 

First, DSploit lists the AP and the known devices on the network. In this case, I chose one victim client.


In the following submenu, there are tons of options, but the best features are in the MITM section. 


Stealthiness warning: in some cases, I received the following popup on the victim Windows:


This is what we have under the MITM submenu:


Password sniffing

For example, let's start with the Password Sniffer. It is the same as EvilAP and DSniff in my previous post. With the same results for the popular Hungarian webmail with the default secure login checkbox turned off. Don't forget, this is not an Open WiFi network, but one with WPA2 protection!


Session hijack

Now let's assume that the victim is very security-aware and he checks the secure login checkbox. Another cause can be that the victim already logged in, long before we started to attack. The session hijacking function is similar to the Firesheep tool, but it works with every website where the session cookies are sent in clear text, and there is no need for any additional support.

In a session hijacking attack (also called "sidejacking"), after the victim browser sends the authentication cookies in clear text, DSploit copies these cookies into its own browser, and opens the website with the same cookies, which results in successful login most of the time. Let's see session hijacking in action!

Here, we can see that the session cookies have been sniffed from the air:


Let's select that session, and be amazed that we logged into the user's webmail session.




Redirect traffic

This feature can be used both for fun or profit. For fun, you can redirect all the victim traffic to http://www.kittenwar.com/. For-profit, you can redirect your victim to phishing pages.


Replace images, videos

I think this is just for fun here. Endless Rick Rolling possibilities.


Script injection

This is mostly for profit. client-side injection, drive-by-exploits, endless possibilities.

Custom filter

If you are familiar with ettercap, this has similar functionalities (but dumber), with string or regex replacements. E.g. you can replace the news, stock prices, which pizza the victim ordered, etc. If you know more fun stuff here, please leave a comment (only HTTP scenario - e.g. attacking Facebook won't work).

Additional fun (not in DSploit) - SSLStrip 

From the MITM section of DSploit, I really miss the SSLStrip functionality. Luckily, it is built into the Pwn Pad. With the help of SSLStrip, we can remove the references to HTTPS links in the clear text HTTP traffic, and replace those with HTTP. So even if the user checks the secure login checkbox at freemail.hu, the password will be sent in clear text - thus it can be sniffed with DSniff.

HTML source on the client-side without SSLstrip:


HTML source on the client-side with SSL strip:


With EvilAP, SSLStrip, and DSniff, the password can be stolen. No hacking skillz needed.

Lessons learned here

If you are a website operator where you allow your users to login, always:
  1. Use HTTPS with a trusted certificate, and redirect all unencrypted traffic to HTTPS ASAP
  2. Mark the session cookies with the secure flag
  3. Use HSTS to prevent SSLStrip attacks
If you are a user:
  1. Don't trust sites with your confidential data if the above points are not fixed. Choose a more secure alternative
  2. Use HTTPS everywhere plugin
  3. For improved security, use VPN
Because hacking has never been so easy before.
And last but not least, if you like the DSploit project, don't forget to donate them!
Related word

  1. Hackrf Tools
  2. Hacking Tools And Software
  3. Hacker Tools Mac
  4. Hacker Tools Software
  5. Hacker Tools Windows
  6. Hacker Tools Linux
  7. Hack Tools
  8. Hack App
  9. Physical Pentest Tools
  10. Growth Hacker Tools
  11. Hacks And Tools
  12. Wifi Hacker Tools For Windows
  13. Pentest Tools For Mac
  14. Hacker Hardware Tools
  15. Hacker Tool Kit
  16. Hacking Tools
  17. Hacking Tools Windows
  18. Hack Tools For Pc
  19. Hacker Security Tools
  20. Computer Hacker
  21. Pentest Tools
  22. Hack Apps
  23. Hack Tools For Mac
  24. Hacking Tools For Games
  25. World No 1 Hacker Software
  26. Pentest Tools Apk
  27. Hacking Tools For Games
  28. Hak5 Tools
  29. Hack And Tools
  30. Hak5 Tools
  31. Hacker Tool Kit
  32. Ethical Hacker Tools
  33. Install Pentest Tools Ubuntu
  34. Hacking Tools Github
  35. Pentest Tools Android
  36. Hack Apps
  37. Hacker Tools Apk
  38. What Are Hacking Tools
  39. Best Pentesting Tools 2018
  40. Hack Tools For Pc
  41. Hacking Tools For Windows Free Download
  42. New Hacker Tools
  43. Hack And Tools
  44. Pentest Reporting Tools
  45. Hacker Tools Mac
  46. Hacking Tools For Kali Linux
  47. Pentest Box Tools Download
  48. Hacker Tools Linux
  49. Pentest Tools Windows
  50. Hacking Tools Pc
  51. Hacker Tools For Pc
  52. Pentest Tools Bluekeep
  53. Github Hacking Tools
  54. Hacking Tools Kit
  55. Hacker Tool Kit
  56. Tools 4 Hack
  57. Hacking Tools For Kali Linux
  58. Pentest Tools Kali Linux
  59. Hack Tool Apk
  60. Hack Website Online Tool
  61. Pentest Tools For Android
  62. Hacker Tools Mac
  63. Hack Tools For Pc
  64. Hacker Tools
  65. Hacker Tools
  66. Pentest Tools Nmap
  67. Hacking Tools Online
  68. Hacker Tools For Ios
  69. Pentest Automation Tools
  70. Black Hat Hacker Tools
  71. Hacking Tools Kit
  72. Hacking Tools Pc
  73. Hacking Tools And Software
  74. Hacker Tools Github
  75. Beginner Hacker Tools
  76. Hack Tools Pc
  77. Nsa Hack Tools
  78. Hacking Tools Download
  79. Hacker Tools Linux
  80. Nsa Hacker Tools
  81. Easy Hack Tools
  82. What Are Hacking Tools
  83. Hacker Hardware Tools
  84. Pentest Tools Github
  85. Pentest Tools Port Scanner
  86. Bluetooth Hacking Tools Kali
  87. Tools For Hacker
  88. Pentest Automation Tools
  89. Hacking Tools Windows 10
  90. What Is Hacking Tools
  91. Hacker Tools For Ios
  92. Pentest Tools Tcp Port Scanner
  93. Pentest Reporting Tools
  94. Pentest Tools For Mac
  95. Hacker Security Tools
  96. Pentest Tools For Windows
  97. Black Hat Hacker Tools
  98. Hacker Hardware Tools
  99. Hacking Tools For Windows Free Download
  100. Hack Tools Pc
  101. Hacking Tools Pc
  102. Computer Hacker
  103. Hacking Tools For Pc
  104. Pentest Tools
  105. Hacker Tools Mac
  106. Hacker Tools Github
  107. Hacking Tools 2019
  108. Pentest Tools Kali Linux
  109. Pentest Tools Alternative
  110. Pentest Tools Apk
  111. Computer Hacker
  112. Hacking Tools 2019
  113. Pentest Tools Github
  114. Hack Tools For Ubuntu
  115. Pentest Tools For Mac
  116. Hacking Tools For Windows 7
  117. Hacking Apps
  118. Pentest Tools Linux
  119. Hacking Tools Name
  120. Pentest Tools For Mac
  121. Hacking Tools For Kali Linux
  122. How To Hack
  123. Pentest Tools For Ubuntu
  124. Pentest Tools Website Vulnerability
  125. Hack Website Online Tool
  126. Pentest Tools Alternative
  127. Hacker Tools Free Download
  128. Kik Hack Tools
  129. Kik Hack Tools
  130. Pentest Tools Find Subdomains
  131. Pentest Tools Github
  132. Hack Tool Apk
  133. Tools For Hacker
  134. Hackrf Tools
  135. Hacker Tools Hardware
  136. Hacker Tools Windows
  137. Hacking Tools Windows
  138. Pentest Reporting Tools
  139. Tools For Hacker
  140. Pentest Tools Download
  141. Hacking Tools Hardware
  142. Tools 4 Hack
  143. Hacker Tools Free
  144. Computer Hacker
  145. Pentest Box Tools Download
  146. Top Pentest Tools
  147. Hack Tools Online
  148. Black Hat Hacker Tools
  149. Pentest Tools Port Scanner
  150. Hack Rom Tools
  151. Pentest Tools Website Vulnerability
  152. Growth Hacker Tools
  153. Hacker Tools 2020

Steghide - A Beginners Tutorial




All of us want our sensitive information to be hidden from people and for that we perform different kinds of things like hide those files or lock them using different softwares. But even though we do that, those files  attractive people to itself as an object of security. Today I'm going to give you a slight introduction to what is called as Steganography. Its a practice of hiding an informational file within another file like you might have seen in movies an image has a secret message encoded in it. You can read more about Steganography from Wikipedia.


In this tutorial I'm going to use a tool called steghide, which is a simple to use Steganography tool and I'm running it on my Arch Linux. What I'm going to do is simply encode an image with a text file which contains some kind of information which I don't want other people to see. And at the end I'll show you how to decode that information back. So lets get started:


Requirements:

1. steghide
2. a text file
3. an image file

After you have installed steghide, fire up the terminal and type steghide




It will give you list of options that are available.


Now say I have a file with the name of myblogpassword.txt which contains the login password of my blog and I want to encode that file into an Image file with the name of arch.jpg so that I can hide my sensitive information from the preying eyes of my friends. In order to do that I'll type the following command in my terminal:


steghide embed -ef myblogpassword.txt -cf arch.jpg




here steghide is the name of the program

embed flag is used to specify to steghide that we want to embed one file into another file
-ef option is used to specify to steghide the name (and location, in case if its in some other directory) of the file that we want to embed inside of the another file, in our case its myblogpassword.txt
-cf option is used to specify the name (and location, in case if its in some other directory) of the file in which we want to embed our file, in our case its an image file named arch.jpg

After typing the above command and hitting enter it will prompt for a password. We can specify a password here in order to password protect our file so that when anyone tries to extract our embedded file, they'll have to supply a password in order to extract it. If you don't want to password protect it you can just simply hit enter.


Now myblogpassword.txt file is embedded inside of the image file arch.jpg. You'll see no changes in the image file except for its size. Now we can delete the plain password text file myblogpassword.txt.


In order to extract the embedded file from the cover file, I'll type following command in the terminal:


steghide extract -sf arch.jpg -xf myblogpass.txt




here steghide is again name of the program
extract flag specifies that we want to extract an embedded file from a stego file
-sf option specifies the name of the stego file or in other words the file in which we embedded another file, in our case here its the arch.jpg file
-xf option specifies the name of the file to which we want to write our embedded file, here it is myblogpass.txt
(remember you must specify the name of file with its location if its somewhere else than the current directory)

After typing the above command and hitting enter, it will prompt for a password. Supply the password if any or otherwise just simply hit enter. It will extract the embedded file to the file named myblogpass.txt. Voila! you got your file back but yes the image file still contains the embedded file.


That's it, very easy isn't it?


It was a pretty basic introduction you can look for other things like encrypting the file to be embedded before you embed it into another file and so on... enjoy
:)

More articles


domingo, 21 de enero de 2024

Snmpcheck


"snmpcheck is a free open source utility to get information via SNMP protocols. It works fine against Windows, Linux, Cisco, HP-UX, SunOS systems and any devices with SNMP protocol support. It could be useful for penetration testing or systems monitoring. snmpcheck has been tested on GNU/Linux, *BSD, Windows systems and Cygwin. snmpcheck is distributed under GPL license and based on Athena-2k script by jshaw. " read more...

Website: http://www.nothink.org/perl/snmpcheck


Related posts


HACKING GMAIL FOR FREE CUSTOM DOMAIN EMAIL

hacking-gmail-for-free-custom-domain-email


HACKING GMAIL FOR FREE CUSTOM DOMAIN EMAIL

When it comes to email providers, there's no competitor to Google's awesome features. It is efficient which connects seamlessly with the rest of your Google products such as YouTube, Drive, has a major application called Gmail Inbox, and is overall an extremely powerful email service. However, to use it with a custom domain, you need to purchase Google Apps for either $5 or $10/month, which for casual users is a bit unnecessary. On top of that, you don't even get all of the features a personal account gets, e.g. Inbox. So, here's a free way to use your Gmail account with a custom domain. I am just going to show you hacking Gmail for free custom domain email.

SO, HOW HACKING GMAIL FOR FREE CUSTOM DOMAIN EMAIL

PASSWORD: EHT

STEPS:

  • First, register with Mailgun using your Gmail address. Use your Gmail only. Once you have clicked the confirm link, log in to the Mailgun website. Now you're in the dashboard, move on the right under "Custom Domains", click "Add Domain".
  • Follow the setup instructions and set DNS records with whoever manages your DNS. Once you've done this, click on the "Routes" link on the top to set up email forwarding.
  • Now move to the Route tab and click on Create New Route.
  • As you click the button, you will see a page like below. Just enter the information as entered in the following screenshot.
  • Just replace the quoted email with your desired email in the above-given screenshot.
  • Next, we'll setup SMTP configuration so we would be able to send emails from an actual server. Go to "Domains" tab, click on your domain name.
  • On this page, click "Manage your SMTP credentials" then "New SMTP Credential" on the next page.
  • Type in the desired SMTP credentials. And, go to Gmail settings and click "Add another email address you own". Once you open, enter the email address you wish to send from.
  • In the next step, set the SMTP settings as follows.
  • After clicking "Add Account" button, now you're done.
  • The final step, make sure to set it to default email in the Gmail settings > Accounts.
That's all. Now you got free Gmail custom domain with 10,000 emails per month. Hope it will work for you. If you find any issue, just comment below.


Note: Use Virtual Machine and scan on VirusTotal before downloading any program on Host Machine for your privacy.

More articles


  1. Kik Hack Tools
  2. What Is Hacking Tools
  3. Hacker Tools Free Download
  4. Hackrf Tools
  5. Hacking Tools For Beginners
  6. Hack Tools 2019
  7. Pentest Tools Download
  8. Hack Tools
  9. Pentest Tools Kali Linux
  10. Hacker Tools List
  11. Wifi Hacker Tools For Windows
  12. Pentest Tools Linux
  13. Hacking Tools 2019
  14. Hacks And Tools
  15. What Is Hacking Tools
  16. Blackhat Hacker Tools
  17. Hacks And Tools
  18. Hacker Hardware Tools
  19. Hacking Tools Usb
  20. Black Hat Hacker Tools
  21. Termux Hacking Tools 2019
  22. Nsa Hack Tools Download
  23. Growth Hacker Tools
  24. Kik Hack Tools
  25. Hack Tools
  26. Nsa Hack Tools Download
  27. Hacking Tools Hardware
  28. Nsa Hack Tools Download
  29. How To Install Pentest Tools In Ubuntu
  30. Bluetooth Hacking Tools Kali
  31. Hacking Tools 2020
  32. Nsa Hacker Tools
  33. Pentest Tools Download
  34. Pentest Automation Tools
  35. How To Install Pentest Tools In Ubuntu
  36. Pentest Tools List
  37. Hacks And Tools
  38. Hack Tools
  39. Hacker Tools For Ios
  40. Hacking Tools Github
  41. Nsa Hack Tools Download
  42. Termux Hacking Tools 2019
  43. Hacking Tools Name
  44. Hacking Tools For Windows Free Download
  45. Install Pentest Tools Ubuntu
  46. Hacker Tools Online
  47. Pentest Tools Alternative
  48. Easy Hack Tools
  49. Easy Hack Tools
  50. Hack Tool Apk No Root
  51. Hack And Tools
  52. Top Pentest Tools
  53. Pentest Tools Website Vulnerability
  54. Hacking Tools Hardware
  55. How To Hack
  56. Hacking App
  57. Hacking Tools Free Download
  58. Termux Hacking Tools 2019
  59. Hack Tools Download
  60. Pentest Recon Tools
  61. Hacker Tools Linux
  62. Tools Used For Hacking
  63. Hacking Tools Usb
  64. Pentest Tools List
  65. Pentest Tools For Mac
  66. Pentest Tools Website Vulnerability
  67. Pentest Tools Website
  68. Hacks And Tools
  69. Hackrf Tools
  70. Pentest Tools Find Subdomains
  71. Hacking Tools For Mac
  72. Hack Tools For Windows
  73. Best Pentesting Tools 2018
  74. Hacking Tools Windows 10
  75. Hacker Tools Windows
  76. Hacking Tools Usb
  77. Hacker Tools Free
  78. Free Pentest Tools For Windows
  79. Tools 4 Hack
  80. Pentest Tools
  81. Hacking Tools Github
  82. Pentest Tools Github
  83. Hacker Tools Apk
  84. Hacking Tools For Mac
  85. Hacking Tools For Kali Linux
  86. Android Hack Tools Github
  87. Game Hacking
  88. Hacking Tools Name
  89. Hacker Tools Linux
  90. Hack Tools Online
  91. Best Hacking Tools 2019
  92. Hacking Tools Windows 10
  93. Hack Tools For Ubuntu
  94. Termux Hacking Tools 2019
  95. Best Pentesting Tools 2018
  96. Hack Tool Apk No Root
  97. Physical Pentest Tools
  98. Pentest Tools Linux
  99. Kik Hack Tools
  100. Pentest Tools Port Scanner
  101. Hack Tools For Windows
  102. Hacking Tools Pc
  103. Best Pentesting Tools 2018
  104. Best Hacking Tools 2020
  105. Hak5 Tools
  106. Hacker Tools List
  107. Pentest Automation Tools
  108. Hacking Tools Usb
  109. Hacking Tools For Beginners
  110. Hacker Tools
  111. Underground Hacker Sites
  112. Pentest Tools Url Fuzzer
  113. Pentest Tools Find Subdomains
  114. Hacker Tools Github