Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - scuarplex

Pages: [1]
1
Hacking and Security / Re: Most embarrasing hack you've ever done?
« on: June 10, 2013, 04:54:25 pm »
Lame defaces + registered at zone-h  :'(

2
Tutorials / Re: Hack any browser using BeEF
« on: June 06, 2013, 09:24:00 pm »
Common guys why is so hard to teach someone something new? This is the tutorial section and are ment to spread knowledge.

What's the point of having a tutorial section if we are going to criticize every one that makes a question?

I really don't understand how can you infect someone by giving the link that contains localhost's address. There should be an advanced configuration I think. It's not that easy
.


It's not that hard. When you start up BeeF directly connected to the internet, having an external IP associated to your network card (check it out with ifconfig and make sure to know what's the difference between an internal IP and a external IP), BeeF should give you URI with your external IP.

After you have this Script on the outside you could include it on a phishing, hack a site and put it into an iframe, create a domain with a fake site and spread it, or just raise an Apache in the same IP with a simple HTML with beef embedded and pass your IP with a http:// to a friend of yours to test this tool.

Of course you could learn a lot of Javascript, that would be pretty useful for you but this is a very complete suite for attacks and it saves a lot of time. There's no need to reinvent the wheel.

Perhaps the best would be that you spend hours, days, weeks, years reading and reading but this can be a fun way to learn asking yourself "Why this works like this?" "Why it isn't working?" and such.

Cheers

3
Tutorials / Re: Hack any browser using BeEF
« on: June 05, 2013, 10:14:31 pm »
I've used BeeF in a few Client Side attacks and my two cents are:

Change the default port to 443 or 80 so it doesn't get blocked by any Firewall (or upload it to a website).

When you get a new zombie make sure to use any of the persitence plug-in as a first measure.

Some AV's detect the js hook, so you might wanna touch it a little before deploying it.

4
Tutorials / Re: Basic Phishing Tutorial
« on: June 05, 2013, 10:08:23 pm »
ok, since this topic is here, i always have a question about it.

I made a page like this before ( 4 testing ) and was wondering how to change the PHP code to make it take the users input and pass it to the real website to log in and redirect the user after that to the website  "after logging in" ?

I think we will need to make him has a cookies with that credential, but how ?

That will make him a lot less suspicious after the redirection .



Curl can make that for you: http://php.net/manual/en/book.curl.php


  • Check how Facebook do the login POST request
  • Config a POST with the $user and $pass vars
  • A cookiejar could be used to store the generated cookie
  • Use mail function to send the login to an account of your choice
Not sure about the cookiejar but CURL will make your life easier to make request either using regular HTTP or HTTPS
 

5
Hacking and Security / Re: Your top 10 most useful hacking tools?
« on: June 05, 2013, 09:53:47 pm »
Web app:
1.- Burpsuite Pro
2.- PHP
3.- Notepad++
4.- Dirbuster

Networking:
5.- nmap
6.- Nessus
7.- nc
8.- Wireshark / ettercap /sslstrip

Security:
9.- Truecrypt
10.- Open pgp

6
Anonymity and Privacy / Re: Idea for "Super secure" P2P chat.
« on: June 05, 2013, 04:19:01 pm »
You guys might wanna check out this project: https://github.com/alfred-gw/torirc

7
Have you tried Google Cache option?

Is it a Facebook Profile or Page? I don't understand exactly what you are trying to recover.

8
Hacking and Security / Re: How do you find a 0day ? (web apps)
« on: June 04, 2013, 10:43:58 pm »
No you dont do it automatically with scanners/tools.
No tool exists that can find an 0day for you. ¿

There are tool for finding 0days actually such as:


RIPS: http://sourceforge.net/projects/rips-scanner/
SWAT:https://www.owasp.org/index.php/Category:OWASP_SWAAT_Project


Among others which performs an static analysis (Code Review).


Of course you can't compare it with a manual static/dynamic analysis of a Web Application.


There are logic flaws which would be impossible for a Tool to find out. And regular vulnerabilities which have to be exploited in some other kind of way since it's not always matching the defined heuristic.

Wanna learn how to find 0days in Web Apps?
  • Learn to code
  • Learn how to code secure
  • Learn how do static and dynamic analysis
Check OWASP for references
Quote
0-days in web apps are easy, but usually not really interesting. A CSRF vulnerability in a WordPress plugin is not interesting at all. An arbitrary code execution in the base WordPress system is interesting

Interest depends on how far your imagination can go. A CSRF attack well performed can create an administrator in a sensitive blog.


The xmlrpc in Wordpress didn't seem to have a great usage, but when you combine it with a small botnet you could have 90% of the Wordpress Blogs (at least when it was realeased) performing a DDoS attack at some target of your choice

Pages: [1]