Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - xor

Pages: [1] 2 3 4
1
Hacking and Security / Re: read out IP-Header
« on: October 29, 2015, 03:19:10 am »
You can't get an IP header from an image.
You can only get an IP header from the network traffic.

If you did not packet capture the network traffic, you have no chance to get it.

You also have no chance to get it if the e-mail isn't coming directly to you, if it goes to an intermediary server, you won't be able to get the IP header of the senders connection with the server.

2
Hardware / Re: What kind of tools do you guys use?
« on: October 29, 2015, 02:52:41 am »
I have a crappy iron from a local electronics store, but I look after it well, so it continues to work.
Just remember a couple of things when soldering:

1. A chisel tip is often better than a fine point, even for surface mount soldering.
2. Drag soldering is your friend.
3. Flux is your BEST friend.
4. Tin your tip after you use it, no.. really. If you don't, even a $300 iron wont work well.
5. DO NOT BUY COMPONENT BAGS / BINS. Unless you're looking for a bunch of crap to practice solder. You will not get any use out of most of the components.
6. Have an idea in your head of what you want to make, buy the components just for that project. Sure it might be nice having a parts bin sometimes, but you end up having a bunch of stuff you don't know how to use, or what to do with.
7. Salvaging is not worth your time unless you want to practice desoldering. If the chip is in a removable socket, go for it, that's a few seconds for a potentially useful 555 timer or RS232 chip.
8. If you are doing resoldering (reseating / replacing a component), a hot air gun is your friend.
9. Solder from smallest to largest component to avoid them getting in your way.

-- xor

3
Hacking and Security / Re: [Software Crack] YNAB - You Need A Budget
« on: October 13, 2015, 08:49:45 am »
Can you please post the input data that you were trying to use?

4
C - C++ / Re: What does this code
« on: October 08, 2015, 06:44:27 am »
They created a file mapping called WhatTheFile.
You can take advantage of any language and map to that same file to read or write what's in it.

The function that you're probably trying to cause an exception in is itoa(v3, DstBuf, 10);
This puts the number in v3 (1) into DstBuf and converts it to a string in Base 10 format.

The file mapping to CreateFileMapping is only accessing 256 bytes.
If you map to the file and write past this, you will overwrite the value of v3, which means you can put a string in it and make it crash on itoa.

5
C - C++ / Re: Check if a string is inside a string
« on: October 06, 2015, 03:34:48 am »
But seriously. As ArkPhase said, why not use strstr?
Don't reinvent the wheel if there's no need to.

http://www.tutorialspoint.com/c_standard_library/c_function_strstr.htm

6
Hacking and Security / Re: [Software Crack] ReSharper 9.x
« on: October 01, 2015, 02:34:39 am »
I originally placed the serial into the clipboard, then thought better than to include WinForms stuff in a Console project.
So I then put it on the console, and figured that people wouldn't want to manually type it in.
I could have left it and let people use file redirects to output it to a file, but I figured most people wouldn't know how to do that.

So debug window it is. Yes, I overlooked that it only runs in Debug mode, but it does allow copy and paste.

Also, thanks for that write up 0E 800, although you could strip the Form1 out of the project, seeing as you are not using it.

For anyone wondering, I have decompiled the executable and can confirm that it is NOT trojanized.
This is the MD5 Hash of the version I checked: CFB63FD02FCC3938AD8D879D0FC5627C
PLEASE CHECK THE MD5 AFTER DOWNLOADING, BE SAFE!

http://onlinemd5.com/

-- xor.

7
Hacking and Security / [Software Crack] ReSharper 9.x
« on: September 30, 2015, 10:47:44 am »
For those of you who have done any development with the .NET framework, you are missing out if you are not using the ReSharper extension.
This tool by JetBrains gives you unparalleled productivity through code refactoring and analysis.

Once you use this tool, you will wonder how you ever lived without it.
Since it has been a while since I released anything, here is the source code to generate keys for the latest 9.x release.

Individual licenses are pretty cheap though for what you get, and if you are working on open source projects, or are a student, you can get it for free anyway, so check it out!

https://github.com/XorLogic/CrackMesAndKeygens/tree/master/KeyGens/Resharper9Keygen/Resharper9Keygen

-- xor

8
Networking / Re: Reliable UDP
« on: September 23, 2015, 03:14:36 am »
UDP was never made to be reliable. If you want reliability, use TCP, reliability is built in.
That said, if you want to make your own bloated version of UDP that has reliability you may want to code some of the following features:

 - Packet numbering / sequencing - UDP packets arrive out of order, so you can either hard code only sending the next packet when you receive an acknowledgement that it has arrived, or you can put a sequence number and have the receiver rebuild the packets.

 - Delivery acknowledgement (ACK) - server sends an ACK that the message was received. Also remember that the server may send an ACK, but the client may not get it, so you could be stuck receiving a packet that you already have because the client doesn't get your message saying that you received it.

 - Resend timeout - resend the packet if you didn't receive an ACK for it after a while, you'll obviously want to limit this otherwise your protocol would be vulnerable to being abused in a DDoS attack.

 - Packet checksums - make sure the data integrity is kept, otherwise don't ACK the packet and wait for it to be sent again.

 - Packet length prefixes - easier for the server to determine how much data you sent.


Easily said... just use TCP for reliability.

9
It's pretty terrible in terms of gameplay. The visuals aren't too bad, but there's not much replay value.
Also, once you've completed the missions, that's it, there are no more. Unlike Uplink where they keep coming.

Completed both paths in a few hours.
Even got in to the honeypot that traces you within a few seconds, nothing in there but the honey comb theme.

It was fun for a little bit, but the difficulty doesn't scale as you move on, it just gets repetitive.
6 / 10

-- xor

10
Hacking and Security / Re: TCP/IP knowledge : how far does it get you ?
« on: September 18, 2015, 03:06:49 am »
First, you can use a packet sniffer such as wireshark to see what a particular protocol packet looks like.
This will show you the entirety of the packets structure.

Then you want to learn how to write packets using the RAW format.

http://www.tenouk.com/Module43a.html
http://www.binarytides.com/raw-socket-programming-in-python-linux/
https://msdn.microsoft.com/en-us/library/windows/desktop/ms740548(v=vs.85).aspx
http://www.winsocketdotnetworkprogramming.com/clientserversocketnetworkcommunication8h.html

11
.NET Framework / [C#] Raw Disk Access
« on: September 17, 2015, 10:13:34 am »
If attempting to access the raw data on your drive using File or FileStream, you will quickly encounter a message that you are not allowed to access drives starting with \\.\

By using the Kernel32.dll CreateFile import and C# SafeFileHandle, we are able to bypass this limitation.
The code below accesses the first 512 bytes of Physical Drive 0 as Read Only.
You can adapt this for your own needs, if you need to write to the drive, or see more data.

Note: You may need to run this with administrator access.

http://pastebin.com/j7Jhrzsr

-- xor


12
Hacking and Security / Re: TCP/IP knowledge : how far does it get you ?
« on: September 17, 2015, 08:54:17 am »
Protocols in the lower layers of the OSI Model as shown in the link below, have very well defined structures.

TCP for example has certain flags which are set depending on the point in the three way handshake. Applications such as nmap take advantage of this to perform SYN scans, RST scans, etc.

You can modify an IP header to spoof the source IP address of a packet.
You can give a packet an invalid checksum so see how a receiving device handles it.
You can say the size of the packet is really large, but only send them a small amount of data, or vice versa.
You can even fuzz these structures to find weaknesses in the layers themselves that you might be able to take advantage of.

There's a lot to learn by learning networking as well.

Reference:
http://f.tqn.com/y/compnetworking/1/S/g/basics_osimodel.jpg

13
Beginner's Corner / Re: dns hijacking facebook
« on: September 17, 2015, 05:17:36 am »
Certain websites are in all browsers HSTS list.

This means that even if you browse to them using HTTP, they will also redirect to HTTPS.
If this wasn't the case, your DNS hijacking would work fine, now though, you have to have a certificate that is trusted on the client computer.

Kind of annoying and can't be solved without access to that machine.

14
Hacking and Security / Re: SSH username finder.
« on: September 15, 2015, 09:45:58 am »
Not on all implementations. It's easy to find out by trying.

15
Beginner's Corner / Re: Is hacking personal computers really possible ?
« on: September 15, 2015, 05:07:42 am »
Are you trying to hack a particular person or device, someone you know, or are you trying to target a random device?

There are a lot of consumer routers on the internet these days with simple default username and passwords.
They can be used as pivot points to the internal network, or they can be used to transparently redirect a users traffic through a malicious server where the data can be sniffed. Even for things like facebook that use HTTPS, you can man in the middle the SSL connection, though they might get a warning for something like that unless you happen to use a certificate in their trusted store.

Most of the time you will be hacking a device at the border of their network. Not all are vulnerable, but a lot of them have well known and documented exploits.

-- xor

Pages: [1] 2 3 4