Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - dumbSec

Pages: [1]
1
Hacking and Security / Re: zte router and lan pc
« on: January 09, 2016, 03:57:30 pm »
I would probably set up an apache page that cloned the interface of the router then add some type of warning about security update.  He will most likely  just type in the credentials to see what is going on and they will be sent straight to you.  An easy way to do this is to use setoolkit i believe.  with a little bit of html addition to the original page it will look very legit and and create a level of urgency that will require his attention. https://www.youtube.com/watch?v=kGcdeAPMmfs

that is only the first part because then you have to cause him to open it,  it is best if it just pops up when he tries to open a webpage and looks like a router alert or update that requires his information to continue. you will need him to connect to your ip somehow.  DNS spoofing is the best way unless you have physical access to his computer.    This may cause problems however as there are many people using this network it sounds like.  If you can forward most responses to regular dns then only change the response for a certain page that he is most likely to use but not the other residents then you have a chance.  another option is to give him a link to the page you have created and hope he opens it,  not always reliable. 

I am not going to try and give you a walkthrough on how to do this since every situation is different but this may be an option to look into if you really need to get into the router.  Once you have the router the game becomes much easier because then you can use site cloning and set up dns in the router in many routers to link a specific page search to your clones(ie facebook, gmail, or whatever other credentials you would like to grab)
hope this has been helpful and gives you something to learn about
noSec

p.s. way too many emotocons dude

2
Found it on the Webs / IT Epic Fail (kinda long but a good read)
« on: January 09, 2016, 04:23:07 am »
Ok Everyone here is the long awaited first post (except for my introduction) and Im sure you have been waiting...
So here goes, first of all I want you all to think of the very first credential you would enter when you are faced with a daunting user password situation.  I will tell you mine at the end of this article. You will have to excuse my typing I dont spell everything correctly or even use punctuation as you can already tell.
Over Christmas I was fortunate enough to get some time off from work so of couse I squandered most of it away on the computer.  However during this wasted time I came across something that peaked my interest.
This is not a post too prove to you my vast hacker skills or make myself a legend since it is really more of a security epic fail. But maybe the next time you come across this type of situation your curiosity will be spike as was mine.
I am not the guy that you will be talking about as having the most prowess or the most IT knowledge but if you talk about me it will be because I believe I had the coolest hack EVER!(or ytour just talking shit and thats fine too. I am always open to constructive criticism of that nature) so lets start at the beginning. I will try to reference everything I can.
WARNING: This is not a tutorial nor a challenge.( I want to forever be the winnner starting right now)  Illegal activities are illegal by nature and cannot be undone.  It does not matter if you are trying to help or trying to harm the consequences happen to be very similar.
If you are reading this because I gained access to your system just say thanks in the replies.

So lets start at the beginning.  It was a VERY rainy day durring the holiday season and I was searchin through Shodan.(https://www.shodan.io/)  For those of you who are unfamilliar with shodan it is a wonderful web search that looks for IP addresses that have open ports.  There are several filters that can be applied and it is a great tool to see if you are not properly secured from remote points. Do not rely on shodan alone to come to this conclusion. As I poked through numerous results I happened to stumble upon an open port 80 web interface.(yea guys thats right it was way too easy) So in my normal curious nature I took the time to open another tab and loaded this baby up.  It was an S2Netbox and it was clearly labeled as so.  I have never heard of this particular piece of technology but I thought to myself, “this might be kind of interesting.”  Off to every hackers favorite resource! GOOGLE!
Well it turns out that a company called S2 Security Corporation developed a very nice piece of technology .  It is a system designed to monitor and control building security systems.  More specifically it is an RFID based system.
   So as I sat back looking at these two blank entry fields I thought and thought and quietly murmured to myself, “what the hell!”  Bam first try guys I never had to open burp, hydra, no hashes, no anything! Ridiculous right. Well its out there.
   I mean we have all used our skills to check off the bucket list:
---Crack neighbors router interface and change their ssid to something really stupid or offensive  CHECK
---Do it again and blacklist one device to cause confusion and high data usage CHECK
---Crack the work wifi password and use it to wirelessly print photos of borat in a mankini to your bosses desktop printer while he is on facebook and your supposed to be working CHECK
Please add your list of prank type stupid accomplishment in reply (Just for fun ) I love new ideas! But this is truly epic considering that most of the time we spend countless hours to come up with a database full of useless information, a weak ass file server and the occasional porn stash.
   Anyways,  how many times have you told people, “its not like in the movies”, “you cant just take over stuff”,”ETC.”?  Well for one time in hacker history it was exactly that.  Within 5 minutes I was sitting infront of a nice little GUI web based interface with admin privileges.  If you have still not looked up S2 Netbox I will explain just what this is.  It controls all the RFID operated door locks, all the elevators, all the alarms, and all the cameras. (In my case the building was using a seperate surveillance system so no cameras were available.)  As an admin you can modify users add users, read rfid info and scan in new cards as well as remotely operate all building functions and monitor building occupancy.  You can easily add another admin account as a back door or anything you can dream of.  And best of all it is all packaged into a very user friendly web app that can be interfaced from any OS and any security proffesional(i.e. security guard) can learn to efficiently use after his first day of on the job training. Perfect for all ages of hacker.
   Although I would have loved to play with this system for several days finding incoming IP addresses to connect with the other five convergence halls and 2 banks I felt mysteriously compelled to let the owners of this system know that they were extremely vulnerable. And that is what I did although it took 3 days for them to notice Maybe because it was the holidays.  I started off by entering work log into the system asking for a credentials modification... and nothing happened.  So I contacted a company that I believe was resposnsible for setting up the security... and nothing happened.  And finally I contacted them through their website contact us page explaining once again that this was serious... no response but they did take the drastic measures to change their password.
   Conclusion: I still think this is not an acceptable answer to their security needs.  I understand  why they finally changed the password(I basically forced them), I understand why this device has a web browser interface(it is functional with any OS so it can be used by any company). But I do not understand why it is on a web connected network or atleast not firewalled.  Each building will be internally managed, access cards will be issued on site to the customers occupying the structure.  There is no need to monitor or use this system from anywhere but inside the structure. Without a firewall when I connect to your ip if there is a port 80 connection available I will automatically be connected with it, this is a problem. And for credentials  Username: admin Password: (wait for it...) admin   This is unaceptable by any standard and a large company like Olympia Development Corporation that is managing atleast 2 banks and 10 other large office building should know better.  And so should you.

The webpage for the building in question is http://www.olympiadevelopment.com/new-olympia/index.php/portfolio/convergence-center-iv.html

The static IP address of the system that still has not blocked outside connections(as of the time I post this) is
70.165.69.25

I am not encouraginging anyone to hack this system as it is illegal as hell and a company like this has the resources to own you for it.  This information is only for verification purposes.  Call me a script kiddie I dont care Im not far from it Im not out to hurt peole or do stupid stuff but this would even meet my definition of stupid!  Lets Get our shit together guys and help other people do it too.

God bless you and happy new years,
noSec

3
C - C++ / Re: looking to learn c++ ?
« on: January 08, 2016, 05:55:16 am »
This is definitely in my list of goals I will check it out and see if I like the structure
ty
noSec

4
General discussion / Re: Monitor Mode
« on: January 08, 2016, 05:51:02 am »
http://forums.kali.org/
Maybe this would be a better place to look.  If you want our help you need to tell us a lot more.
Are you using a wifi dongle or an onboard wifi device.  Many devices will not operate in monitor mode
what is your chipset that is always helpful to know
how are you entering monitor mode is it on fern or are you using a comand line option
tell us something more than just my monitor isnt working

Thanks
noSec

Pages: [1]