Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - jpHernandez

Pages: [1]
1
Beginner's Corner / [Powershell] Build your very simple Port Scanner
« on: January 09, 2015, 11:59:15 pm »
This code is written in PowerShell, a very simple port scanner

Code: (powershell) [Select]
$device = $args[0]
$port = $args[1]
$start = $args[2]
$stop = $args[3]


function pingdevice()
{
    if(Test-Connection $device -ErrorAction SilentlyContinue)
    {
        Write-Output "$device is up"
        Write-Output "-----------------"
        }
    else
    {
        Write-Output "$device is down"
        Write-Output "-----------------"
        exit
        }
}


function checkports()
{
    if($port -match "multi")
    {
        for($counter=$start; $counter -le $stop; $counter++)
        {
            $porttest = New-Object Net.Sockets.TcpClient
            try
            {
                $connect = $porttest.Connect($device,$counter)
                write-ouput "port $counter is open"
                }
            catch
            {
                Write-Output "port $counter is closed"
                }
         }
    }
    else
    {
        $porttest = New-Object Net.Sockets.TcpClient
        try
        {
            $connect = $porttest.Connect($device,$port)
            Write-Output "port $port is open"
            }
        catch
        {
            write-output "port $port is closed"
            }
    }
}


write-output ""


pingdevice
checkports


Write-Output ""
Cheers,
jph :)

2
This code collects information from local machine and saves it to a text file called "info.txt"

Code: [Select]
@echo off
title info
hostname > info.txt
date /t >> info.txt
time /t >> info.txt
echo + Dumping user accounts...
net user >> info.txt
echo Done
echo + Dumping system information...
systeminfo >> info.txt
echo Done
echo + Dumping network status...
netstat -ano >> info.txt
echo Done
echo + Dumping network shares...
net share >> info.txt
echo Done
echo + Dumping computers on LAN...
net view >> info.txt
echo Done
echo + Dumping wireless networks on range...
netsh wlan show networks >> info.txt
echo Done
echo + Dumping network accounts info...
net accounts >> info.txt
echo Done
echo + Dumping workstation config...
net config workstation >> info.txt
echo Done
echo + Dumping localgroups...
net localgroup >> info.txt
echo Done
echo + Dumping administrators...
net localgroup administrators >> info.txt
echo Done
echo + Dumping running tasks...
tasklist >> info.txt
echo Done
echo + Dumping installed softwares...
reg query HKLM\Software >> info.txt
reg query HKCU\Software >> info.txt
echo Done
echo. >> info.txt
echo End of File >> info.txt

Cheers,
jph ;D

3
Beginner's Corner / The LIFO Algorithm
« on: January 09, 2015, 11:49:05 pm »
Code: (java) [Select]
/**
 * This is a working stack example for beginners that wanted to know
 * the logic of stack..
 *
 * @author J.P.Hernandez
 * @version 1.0
 */

import java.util.Scanner;


public class stack {
public static void main(String args[]){
Scanner scan = new Scanner(System.in);
int stackSize;
int choice;
int current=-1;
int pushItem;

System.out.println("We will create a stack!");
System.out.println("First let us determine the Stack Type and Size");
System.out.print("Integer is the type of Stack, and the size is: ");
stackSize = scan.nextInt();

int stackArray[] = new int[stackSize];

System.out.println("Now that the stack size is "+ stackSize+", let us begin!");
System.out.println("\n");

do{
System.out.println("1. Push");
System.out.println("2. Pop");
System.out.println("3. Top");
System.out.println("4. Exit");
System.out.print("I want to: ");
choice = scan.nextInt();

//this is if choice is to push
if(choice==1){
current++;
if(current==stackSize){
System.out.println("STACK IS FULL");
current--;
}else{
System.out.println("Push Me: ");
pushItem = scan.nextInt();
stackArray[current] = pushItem;
System.out.println(pushItem+" is pushed into stackArray");
}
}

//this is if choice is to pop
if(choice==2){
if(current==-1){
System.out.println("STACK IS EMPTY");
}else{
current--;
System.out.println("Popped: "+stackArray[++current]);
current--;
}
}

//this is if choice is to show top
if(choice==3){
if(current==-1){
System.out.println("NO TOP");
}else{
System.out.println("TOP: "+stackArray[current]);
}
}

//this is if choice is to exit the program
if(choice==4){
System.out.println("Thank you for learning stacks...");
}

}while(choice!=4);
}
}
------------------------------------------------
Implementing Stacks, Basic LIFO Algorithm [FOR BEGINNERS]


Cheers,
jph  ;D

4
Beginner's Corner / Re: [TOOL 4 FUN] Randipgen.exe
« on: January 09, 2015, 03:16:44 pm »
You never understand the word "HACK" in your career. Poor being. Your criticism to other's programs will not make you a better hacker. Hacking is an enjoyable hobby, without limitations and restrictions applied.

d4rkcat, yes, I will post the source code, right away. Thanks

EDIT: Here's the two source codes...

http://upload.evilzone.org/index.php?page=download&file=uMtV1g6Xcmrv2798L749XnauL7Xtlz6CpqJmXvBVtHFEu5mUEl

Cheers,
jph  ;D

Staff note: do you even edit nigga?

5
Beginner's Corner / Re: [PENTEST TOOL] Dumphreak v1.0
« on: January 09, 2015, 03:12:55 pm »
First of all, I used to word "boot" to describe "start", heck, it is not a live USB
Second, it has no hidden backdoors, truly, if you browse to the backdoor files, you will see some backdoor files so that you can use it for your liking.
Third, I named it "dumphreak" for "dump" because of it dumper features, which dumps information about the local machine.
Fourth, bloated? Of course, with all that stuff, it might be a framework
and Fifth, what's the use of beast trojan or the jps virus makers, if you cannot kill AV'S, and no worries about it because you can easily turn them off, dump some info and then turn it back on.


Still Cheers,
jph  ;D

6
Beginner's Corner / [TOOL 4 FUN] Randipgen.exe
« on: January 09, 2015, 02:57:26 pm »
Generates random ip address.. just for fun...
get it here:


http://upload.evilzone.org/index.php?page=download&file=vEq1zFIbv6Mk4zH33SaZesOQ0Mqd3Z0GawwGU6LJWxVNRiuRD1



Usage:
randipgen -g <number of ip addresses to generate>


Simple as that.


Cheers,
jph 8)

7
Beginner's Corner / Re: [PENTEST TOOL] Dumphreak v1.0
« on: January 09, 2015, 02:29:04 pm »
By the way, here's the shot





sometimes, a fan of trolls.. LOL


Cheers,
jph  ;D

8
Beginner's Corner / Re: [PENTEST TOOL] Dumphreak v1.0
« on: January 09, 2015, 02:22:38 pm »
Can't really upload the zip here in evilzone this time, my connection sucks, and today, it just takes nearly forever to upload a 300kb less exe file, you can download the tool for testing, meanwhile, from mediafire, in my indicated link. thanks.


Cheers,
jph


ps. don't forget to rehash the zip, that trick always works...  ;D

9
Beginner's Corner / Re: [PENTEST TOOL] Dumphreak v1.0
« on: January 09, 2015, 02:05:02 pm »
Will upload the zip in no time...


Meanwhile here is the menu for you, it is also contained in the README file inside the zip package


-----------------------------------------------------------------------------------------------------

---FAQS---
-What is Dumphreak 1.0?-
Dumphreak 1.0 is a local enumeration tool for penetration testing.


-What are its uses?-
If you do pentesting, you know what I mean, if you're not, how do you find this app anyway? :D


-I can't understand the menu-
Ok, it's like this


-Dumper contains tools for dumping information
-Several options in the dumper menu contains the "view dump info" and "export to text file". What does it mean? Simple. View dump info will enable you to see the dump info without saving it to text file, while export to text file, as the name suggests, saves the dump info to text file which is important.


++Dumper Tools++
+Dump User Accounts - dumps user accounts locally
+Dump System Info - enables you to view complete system info
+Dump Computers - lists all the computers in the network
+Dump Local Hashes - dumps passwords (shadowed)
-For x32 bit option is for those who are using 32 bit systems
-For x64 bit option is for those who are using 64 bit systems
**Note: If you don't know what is yours, just explore and click
+Dump Services - dumps running services on the machine
+Dump Network Status - displays the listening and established connection of the local machine.
+Dump Local Ports - list down ports in use
+Dump Running Tasks - dumps running processes
+Dump Wireless Networks - shows available wireless nets
+Dump Wireless Interfaces - shows available wireless interfaces
+Dump Routing Table - displays the routing table
+Dump Complete Wireless Info - dumps complete info about wireless
+Dump Localgroups - dumps localgroups in the machine
+Dump Administrator Accounts - shows accounts which belongs to the Administrator group


-Stealer Tools contains-
**Note: Many thanks to the guyz @ securityxploded.com for this awesome tools.. I don't wish to reinvent the wheel that's why i came up utilizing your tools for my program..


++Stealer Tools++
-This tools steals passwords for the following accounts-
-Chrome
-Ciso
-D-Link
-Facebook
-Firefox
-Google
-Internet Explorer
-Juniper
-Mail
-MSN
-Network
-Opera
-Outlook
-Product Keys
-Seamonkey
-Thunderbird
-Twitter
-Wifi
-Yahoo
credits to: securityxploded.com


-Installer tools just include a few apps for easy installation-
+Telnet Installer - telnet's useful for banner grabbing
+Telnet Uninstaller - to erase suspicion
+WinpCap Installer - winpcap is needed for many apps
+USB Dumper Installer - usb dumper tool for dumping usb info to local system


-Backdoor Tools, contains the most important part of this program-


+Open Backdoor Files - opens the folder containing the backdoor and trojan files for easy transfer
+Open Startup Folder - option to use to easily include the shortcut link or the program directly whenever the system starts
-For all users - indicates the program should start whoever uses
-For specific user - indicates the program should start whoever in the homepath for the current machine user
+Open System32 folder - opens the folder containing the core files of windows. A good place to hide something.
+Generate tini backdoor - converts the tini.dat file into tini.exe, in that way, the AV's cannot detect tini.dat, and you can always turn off the AV's and then generate the tini.exe program for backdoor uses.
+Port klogger.exe to system - requires administrative rights, to copy klogger.exe program to the system32 folder to provide keylogging.
+Port tini.exe to System - requires administrative rights, to copy tini.exe program to the system32 folder to provide backdoor through telnetting to port 7777
+Construct a virus contains three versions of JPS Virus Maker
-jps1
-jps2
-jps3
**Note: Different versions of JPS Virus maker produces different options, so suit your needs
+Summon Beast! - invokes the beast program, a remote administration tool, with own setup-your-own-server and remote control tool. Alternatives for Back Orifice, Netbus, Subseven, Shark++, or Poison Ivy, Cybergate, turkojan, etc..


-About page-
-Contains info about the author


-Is this a freeware?-
-Yes it is. And also slightly open source, if you wanted to improve the program and add some bells and whistles to it, just pm me or message me at jpHernandez@programmer.net and ask for a source code of the main executable. The source code for the tools used is included already, in the bin file, as you can actually edit the batch files, but for executable files, if you would like, you can also ask for the source codes. Just mail me.


-AV's detected it, shall I banish it?-
-It's up to you. It will not cause any harm to your machine, unless you plant a keylogger or run a tini.exe, because all those tools are used IF the machine is not yours.. And also, the tools herein, must be used for penetration testing. I DO NOT ENCOURAGE illegal hacking, for I am not held responsible for damages that you may cause to somebody or someone.


-Is this a use-at-your-own-risk tool?-
-Indeed. You are warned. View the legality.txt file


-It is not running-
-Check the compatibility of the program to your system


-Cannot dump local hashes-
-check to see in the fgdump file in the bin and make the changes
+set the following files to be run with admin compatibility:
-pwdump.exe
-servpw.exe
-servpw64.exe
After following that, you should run it with no hassle.
-------------------------------------------------------------------------------------------------------


More reviews, much better, I do have the source code for the exe might as well upload it if demand is presented.. Glad to help for the hacker community.


Cheers,
jph  :D

10
Beginner's Corner / [PENTEST TOOL] Dumphreak v1.0
« on: January 09, 2015, 01:38:44 pm »
Recently, I've just coded a compilation of handy tools that can be use for physical penetration testing. If you have a physical access to a machine, booting this from USB, and exploring the compiled and programmed scripts, can earn you some trophies (I've tried this many times, and indeed, I haven't failed).
Please let me know if it is useful to you. You can view the readme file for more info. This is Windows specific.


dumphreak_v1.0.zip MD5 Hash - 4357bd34 ac81d622 bb509eae 9c70e798
http://www.mediafire.com/download/kg31br466eak7q3/dumphreak_v1.0.zip

Thank you for the coming review..  :)

11
Tutorials / Re: Kulverstukas method to make windows less shit. (terminal)
« on: January 09, 2015, 12:54:50 pm »
indeed linux beat windows in any angle, but there are tools ported from linux to windows, that is why, it is not that bad, as long as the tool is working on windows, it is still not that useless.  :P
but still I love linux...

Pages: [1]