segunda-feira, 22 de janeiro de 2024

Hackerhubb.blogspot.com

Hackerhubb.blogspot.comRead more
  1. Hack Tools Pc
  2. Hacking Apps
  3. Hack Tools For Games
  4. Hacker Tools 2019
  5. Hack Rom Tools
  6. Pentest Tools Free
  7. Hack Tools For Mac
  8. Hacking Tools Software
  9. Hacker Tools List
  10. Hacker Tools Online
  11. Hacking Tools And Software
  12. Install Pentest Tools Ubuntu
  13. Hacker Tools Github
  14. Hack Tools
  15. Pentest Tools Framework
  16. Hack Tools Mac
  17. Game Hacking
  18. Hacker Tools For Windows
  19. Hack Website Online Tool
  20. Hacker Tools Hardware
  21. Hack Tools Github
  22. Game Hacking
  23. Hack Website Online Tool
  24. Hack Tools Online
  25. Hack Tools For Ubuntu
  26. Hack Rom Tools
  27. Pentest Tools
  28. Hacking Tools Windows
  29. Hacking Tools For Beginners
  30. Hacking Tools Pc
  31. Hack Tools Github
  32. Hacker Tool Kit
  33. Hacker Tools For Windows
  34. Hacker Tools Online
  35. What Are Hacking Tools
  36. Hacking Tools Name
  37. Blackhat Hacker Tools
  38. Hack App
  39. Pentest Tools Bluekeep
  40. Hacker Tools For Mac
  41. Top Pentest Tools
  42. Hacker Tools Apk
  43. Hacker Tools Free Download
  44. Hacker Tools 2019
  45. Hack Tool Apk No Root
  46. Hacking Tools For Mac
  47. Hacker
  48. Tools 4 Hack
  49. Hacking Tools Name
  50. Hacker Tools 2019
  51. Github Hacking Tools
  52. Nsa Hacker Tools
  53. Black Hat Hacker Tools
  54. Pentest Tools Linux
  55. Pentest Tools For Android
  56. Hack App
  57. Hacking Tools For Windows 7
  58. Ethical Hacker Tools
  59. Hacking Tools For Pc
  60. Tools 4 Hack

ShellShock Payload Sample Linux.Bashlet



Someone kindly shared their sample of the shellshock malware described by the Malware Must die group - you can read their analysis here:

File: fu4k_2485040231A35B7A465361FAF92A512D
Size: 152
MD5: 2485040231A35B7A465361FAF92A512


VIrustotal

SHA256: e74b2ed6b8b005d6c2eea4c761a2565cde9aab81d5005ed86f45ebf5089add81
File name: trzA114.tmp
Detection ratio: 22 / 55
Analysis date: 2014-10-02 05:12:29 UTC ( 6 hours, 50 minutes ago )
Antivirus Result Update
Ad-Aware Linux.Backdoor.H 20141002
Avast ELF:Shellshock-A [Expl] 20141002
Avira Linux/Small.152.A 20141002
BitDefender Linux.Backdoor.H 20141002
DrWeb Linux.BackDoor.Shellshock.2 20141002
ESET-NOD32 Linux/Agent.AB 20141002
Emsisoft Linux.Backdoor.H (B) 20141002
F-Secure Linux.Backdoor.H 20141001
Fortinet Linux/Small.CU!tr 20141002
GData Linux.Backdoor.H 20141002
Ikarus Backdoor.Linux.Small 20141002
K7AntiVirus Trojan ( 0001140e1 ) 20141001
K7GW Trojan ( 0001140e1 ) 20141001
Kaspersky Backdoor.Linux.Small.cu 20141001
MicroWorld-eScan Linux.Backdoor.H 20141002
Qihoo-360 Trojan.Generic 20141002
Sophos Linux/Bdoor-BGG 20141002
Symantec Linux.Bashlet 20141002
Tencent Win32.Trojan.Gen.Vdat 20141002
TrendMicro ELF_BASHLET.A 20141002
TrendMicro-HouseCall ELF_BASHLET.A 20141002
nProtect Linux.Backdoor.H 20141001
Related word

Hacktivity 2018 Badge - Quick Start Guide For Beginners

You either landed on this blog post because 
  • you are a huge fan of Hacktivity
  • you bought this badge around a year ago
  • you are just interested in hacker conference badge hacking. 
or maybe all of the above. Whatever the reasons, this guide should be helpful for those who never had any real-life experience with these little gadgets. 
But first things first, here is a list what you need for hacking the badge:
  • a computer with USB port and macOS, Linux or Windows. You can use other OS as well, but this guide covers these
  • USB mini cable to connect the badge to the computer
  • the Hacktivity badge from 2018
By default, this is how your badge looks like.


Let's get started

Luckily, you don't need any soldering skills for the first steps. Just connect the USB mini port to the bottom left connector on the badge, connect the other part of the USB cable to your computer, and within some seconds you will be able to see that the lights on your badge are blinking. So far so good. 

Now, depending on which OS you use, you should choose your destiny here.

Linux

The best source of information about a new device being connected is
# dmesg

The tail of the output should look like
[267300.206966] usb 2-2.2: new full-speed USB device number 14 using uhci_hcd [267300.326484] usb 2-2.2: New USB device found, idVendor=0403, idProduct=6001 [267300.326486] usb 2-2.2: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [267300.326487] usb 2-2.2: Product: FT232R USB UART [267300.326488] usb 2-2.2: Manufacturer: FTDI [267300.326489] usb 2-2.2: SerialNumber: AC01U4XN [267300.558684] usbcore: registered new interface driver usbserial_generic [267300.558692] usbserial: USB Serial support registered for generic [267300.639673] usbcore: registered new interface driver ftdi_sio [267300.639684] usbserial: USB Serial support registered for FTDI USB Serial Device [267300.639713] ftdi_sio 2-2.2:1.0: FTDI USB Serial Device converter detected [267300.639741] usb 2-2.2: Detected FT232RL [267300.643235] usb 2-2.2: FTDI USB Serial Device converter now attached to ttyUSB0 

Dmesg is pretty kind to us, as it even notifies us that the device is now attached to ttyUSB0. 

From now on, connecting to the device is exactly the same as it is in the macOS section, so please find the "Linux users, read it from here" section below. 

macOS

There are multiple commands you can type into Terminal to get an idea about what you are looking at. One command is:
# ioreg -p IOUSB -w0 -l

With this command, you should get output similar to this:

+-o FT232R USB UART@14100000  <class AppleUSBDevice, id 0x100005465, registered, matched, active, busy 0 (712 ms), retain 20>     |   {     |     "sessionID" = 71217335583342     |     "iManufacturer" = 1     |     "bNumConfigurations" = 1     |     "idProduct" = 24577     |     "bcdDevice" = 1536     |     "Bus Power Available" = 250     |     "USB Address" = 2     |     "bMaxPacketSize0" = 8     |     "iProduct" = 2     |     "iSerialNumber" = 3     |     "bDeviceClass" = 0     |     "Built-In" = No     |     "locationID" = 336592896     |     "bDeviceSubClass" = 0     |     "bcdUSB" = 512     |     "USB Product Name" = "FT232R USB UART"     |     "PortNum" = 1     |     "non-removable" = "no"     |     "IOCFPlugInTypes" = {"9dc7b780-9ec0-11d4-a54f-000a27052861"="IOUSBFamily.kext/Contents/PlugIns/IOUSBLib.bundle"}     |     "bDeviceProtocol" = 0     |     "IOUserClientClass" = "IOUSBDeviceUserClientV2"     |     "IOPowerManagement" = {"DevicePowerState"=0,"CurrentPowerState"=3,"CapabilityFlags"=65536,"MaxPowerState"=4,"DriverPowerState"=3}     |     "kUSBCurrentConfiguration" = 1     |     "Device Speed" = 1     |     "USB Vendor Name" = "FTDI"     |     "idVendor" = 1027     |     "IOGeneralInterest" = "IOCommand is not serializable"     |     "USB Serial Number" = "AC01U4XN"     |     "IOClassNameOverride" = "IOUSBDevice"     |   }  
The most important information you get is the USB serial number - AC01U4XN in my case.
Another way to get this information is
# system_profiler SPUSBDataType  
which will give back something similar to:
FT232R USB UART:            Product ID: 0x6001           Vendor ID: 0x0403  (Future Technology Devices International Limited)           Version: 6.00           Serial Number: AC01U4XN           Speed: Up to 12 Mb/sec           Manufacturer: FTDI           Location ID: 0x14100000 / 2           Current Available (mA): 500           Current Required (mA): 90           Extra Operating Current (mA): 0 

The serial number you got is the same.

What you are trying to achieve here is to connect to the device, but in order to connect to it, you have to know where the device in the /dev folder is mapped to. A quick and dirty solution is to list all devices under /dev when the device is disconnected, once when it is connected, and diff the outputs. For example, the following should do the job:

ls -lha /dev/tty* > plugged.txt ls -lha /dev/tty* > np.txt vimdiff plugged.txt np.txt 

The result should be obvious, /dev/tty.usbserial-AC01U4XN is the new device in case macOS. In the case of Linux, it was /dev/ttyUSB0.

Linux users, read it from here. macOS users, please continue reading

Now you can use either the built-in screen command or minicom to get data out from the badge. Usually, you need three information in order to communicate with a badge. Path on /dev (you already got that), speed in baud, and the async config parameters. Either you can guess the speed or you can Google that for the specific device. Standard baud rates include 110, 300, 600, 1200, 2400, 4800, 9600, 14400, 19200, 38400, 57600, 115200, 128000 and 256000 bits per second. I usually found 1200, 9600 and 115200 a common choice, but that is just me.
Regarding the async config parameters, the default is that 8 bits are used, there is no parity bit, and 1 stop bit is used. The short abbreviation for this is 8n1. In the next example, you will use the screen command. By default, it uses 8n1, but it is called cs8 to confuse the beginners.

If you type:
# screen /dev/tty.usbserial-AC01U4XN 9600
or
# screen /dev/ttyUSB0 9600
and wait for minutes and nothing happens, it is because the badge already tried to communicate via the USB port, but no-one was listening there. Disconnect the badge from the computer, connect again, and type the screen command above to connect. If you are quick enough you can see that the amber LED will stop blinking and your screen command is greeted with some interesting information. By quick enough I mean ˜90 seconds, as it takes the device 1.5 minutes to boot the OS and the CTF app.

Windows

When you connect the device to Windows, you will be greeted with a pop-up.

Just click on the popup and you will see the COM port number the device is connected to:


In this case, it is connected to COM3. So let's fire up our favorite putty.exe, select Serial, choose COM3, add speed 9600, and you are ready to go!


You might check the end of the macOS section in case you can't see anything. Timing is everything.

The CTF

Welcome to the Hacktivity 2018 badge challenge!  This challenge consists of several tasks with one or more levels of difficulty. They are all connected in some way or another to HW RE and there's no competition, the whole purpose is to learn things.  Note: we recommend turning on local echo in your terminal! Also, feel free to ask for hints at the Hackcenter!  Choose your destiny below:    1. Visual HW debugging   2. Reverse engineering   3. RF hacking   4. Crypto protection  Enter the number of the challenge you're interested in and press [ 
Excellent, now you are ready to hack this! In case you are lost in controlling the screen command, go to https://linuxize.com/post/how-to-use-linux-screen/.

I will not spoil any fun in giving out the challenge solutions here. It is still your task to find solutions for these.

But here is a catch. You can get a root shell on the device. And it is pretty straightforward. Just carefully remove the Omega shield from the badge. Now you see two jumpers; by default, these are connected together as UART1. As seen below.



But what happens if you move these jumpers to UART0? Guess what, you can get a root shell! This is what I call privilege escalation on the HW level :) But first, let's connect the Omega shield back. Also, for added fun, this new interface speaks on 115200 baud, so you should change your screen parameters to 115200. Also, the new interface has a different ID under /dev, but I am sure you can figure this out from now on.




If you connect to the device during boot time, you can see a lot of exciting debug information about the device. And after it boots, you just get a root prompt. Woohoo! 
But what can you do with this root access? Well, for starters, how about running 
# strings hello | less

From now on, you are on your own to hack this badge. Happy hacking.
Big thanks to Attila Marosi-Bauer and Hackerspace Budapest for developing this badge and the contests.

PS: In case you want to use the radio functionality of the badge, see below how you should solder the parts to it. By default, you can process slow speed radio frequency signals on GPIO19. But for higher transfer speeds, you should wire the RF module DATA OUT pin with the RX1 free together.



More info
  1. Pentest Tools Online
  2. Install Pentest Tools Ubuntu
  3. Hack Tools Github
  4. Hacker Tools For Ios
  5. Hacker Tools For Mac
  6. Hacker Tools Free
  7. Bluetooth Hacking Tools Kali
  8. Bluetooth Hacking Tools Kali
  9. Pentest Tools For Android
  10. Hack Tools Online
  11. Hacker Tools For Windows
  12. Hack And Tools
  13. Hack Tools For Games
  14. Underground Hacker Sites
  15. Hacker Tools Online
  16. Game Hacking
  17. Hacking Tools Windows 10
  18. Android Hack Tools Github
  19. Hack Rom Tools
  20. Pentest Tools Website
  21. Hacker Tools 2020
  22. Hacker Techniques Tools And Incident Handling
  23. Top Pentest Tools
  24. What Are Hacking Tools
  25. Hack And Tools
  26. Computer Hacker
  27. Pentest Tools For Ubuntu
  28. Hackers Toolbox
  29. Hacker Tools For Mac
  30. Hacking Tools For Beginners
  31. Pentest Box Tools Download
  32. Pentest Tools Port Scanner
  33. Install Pentest Tools Ubuntu
  34. Hacking Tools For Windows 7
  35. Pentest Tools Online
  36. Pentest Tools Alternative
  37. Hacker Tools Windows
  38. Best Hacking Tools 2019
  39. Hacker Search Tools
  40. Hack Tool Apk No Root
  41. Pentest Tools Apk
  42. Hackers Toolbox
  43. Wifi Hacker Tools For Windows
  44. Hacking Tools Pc
  45. Pentest Tools For Mac
  46. New Hacker Tools
  47. Game Hacking
  48. New Hack Tools
  49. Pentest Tools Github
  50. Best Hacking Tools 2020
  51. Hacking Tools Mac
  52. Hacking Tools Github
  53. Pentest Tools Website
  54. New Hacker Tools
  55. Hacker Search Tools
  56. Pentest Tools Free
  57. Hacker Tools Free Download
  58. Hack Tools Download
  59. Easy Hack Tools
  60. Pentest Tools Url Fuzzer
  61. Tools For Hacker
  62. Hack Tools Online
  63. Free Pentest Tools For Windows
  64. Hacking Tools For Windows
  65. Hacking App
  66. Hack Tools Download
  67. Tools 4 Hack
  68. New Hacker Tools
  69. Black Hat Hacker Tools
  70. New Hacker Tools
  71. Usb Pentest Tools
  72. World No 1 Hacker Software
  73. Hacker Tools Software
  74. Hacking Tools For Windows 7
  75. Hack Apps
  76. Hack Tools
  77. Hacker Tools For Ios
  78. Hack Tools For Games
  79. Hacking Tools Pc
  80. Pentest Tools Port Scanner
  81. Hacking Tools 2019
  82. Hacker Techniques Tools And Incident Handling
  83. Hacker Techniques Tools And Incident Handling
  84. Pentest Tools Subdomain
  85. How To Hack
  86. Pentest Tools Kali Linux
  87. Pentest Tools Download
  88. Hacker Tools For Mac
  89. Nsa Hack Tools
  90. Hacker Tools 2020
  91. Hack Rom Tools
  92. Pentest Tools Free
  93. Pentest Recon Tools
  94. Nsa Hack Tools Download
  95. Hacker Tools Windows
  96. Easy Hack Tools
  97. Pentest Tools Apk
  98. Tools 4 Hack
  99. Hacking Tools And Software
  100. Pentest Tools For Android
  101. Hack Tools For Mac
  102. Pentest Tools Subdomain
  103. Underground Hacker Sites
  104. New Hacker Tools
  105. Hacking Apps
  106. Hack Tools For Windows
  107. Pentest Tools Open Source
  108. Hacking Apps
  109. Hack Tools
  110. Hack Tools Online
  111. Hacking Tools And Software
  112. Hacking Tools Pc
  113. Best Pentesting Tools 2018
  114. Black Hat Hacker Tools
  115. Wifi Hacker Tools For Windows
  116. Underground Hacker Sites
  117. Pentest Tools Tcp Port Scanner
  118. Top Pentest Tools
  119. Hacker Tools Online
  120. Hacker Tools For Mac
  121. Best Hacking Tools 2019
  122. Hacker Tools Apk
  123. Hacking Apps
  124. Best Pentesting Tools 2018
  125. Hacking Tools For Beginners
  126. Hack Tool Apk
  127. Hack App
  128. Hacker Security Tools
  129. Hacking Tools For Mac
  130. Hacking Tools Online
  131. Hack Tools
  132. Hacking Tools 2020
  133. Hacking Tools Windows
  134. Hack Tools 2019
  135. Computer Hacker
  136. Hack Tools Mac
  137. Hacker Tools For Mac
  138. Pentest Tools Find Subdomains
  139. Pentest Tools Kali Linux
  140. Nsa Hacker Tools
  141. Pentest Reporting Tools
  142. Hack Tools For Windows
  143. How To Install Pentest Tools In Ubuntu
  144. Hacker
  145. Install Pentest Tools Ubuntu
  146. Hacking Tools For Kali Linux
  147. Nsa Hack Tools Download
  148. Hack Tools For Ubuntu
  149. Hacking Tools Free Download
  150. Tools Used For Hacking
  151. Hacking Tools For Windows Free Download
  152. Blackhat Hacker Tools
  153. Hacker Hardware Tools
  154. Pentest Tools Website
  155. Easy Hack Tools
  156. Hack Tools
  157. Pentest Tools Nmap
  158. Hacking Tools Hardware
  159. Usb Pentest Tools
  160. Hacker Tools For Pc
  161. Hack Tool Apk
  162. Top Pentest Tools
  163. Hacker Tools For Windows
  164. Hacker Tools Apk Download
  165. Hacker

Quando eu te falei em amor

Quando os meus olhos te tocaram
Eu senti que encontrara
A outra, metade de mim
Tive medo de acordar
Como se vivesse um sonho
Que não pensei em realizar
E a força do desejo
Faz me chegar perto de ti

Quando eu te falei em amor
Tu sorriste para mim
E o mundo ficou bem melhor
Quando eu te falei em amor
Nos sentimos os dois
Que o amanha vem depois
E não no fim

Estas linhas que hoje escrevo
São do livro da memória
Do que eu sinto por ti
E tudo o que tu me das
É parte da história que eu ainda não vivi
E a força do desejo
Faz me chegar de ti

Quando eu te falei em amor
Tu sorriste para mim
E o mundo ficou bem melhor
Quando eu te falei em amor
Nos sentimos os dois
Que o amanha vem depois e não no fim

André Sardet

Collide

The dawn is breaking
A light shining through
You're barely waking
And I'm tangled up in you
Yeah

But I'm open, you're closed
Where I follow, you'll go
I worry I won't see your face
Light up again

Even the best fall down sometimes
Even the wrong words seem to rhyme
Out of the doubt that fills my mind
I somehow find, you and I collide

I'm quiet, you know
You make a first impression
I've found I'm scared to know
I'm always on your mind

Even the best fall down sometimes
Even the stars refuse to shine
Out of the back you fall in time
I somehow find, you and I collide

Don't stop here
I've lost my place
I'm close behind

Even the best fall down sometimes
Even the wrong words seem to rhyme
Out of the doubt that fills your mind

You finally find, you and I collide
You finally find You and I collide
You finally findYou and I collide

Howie Day


Everything

You're a falling star, You're the get away
car.

You're the line in the sand when I go too
far.

You're the swimming pool, on an August day.
And You're the perfect thing to see.

And you play it coy, but it's kinda cute.
Ah, When you smile at me you know exactly what you
do.

Baby don't pretend, that you don't know it's
true.

Cause you can see it when I look at you.

And in this crazy life, and through these crazy
times

It's you, it's you, You make me sing.
You're every line, you're every word, you're
everything.


You're a carousel, you're a wishing well,
And you light me up, when you ring my bell.
You're a mystery, you're from outer space,
You're every minute of my everyday.

And I can't believe, uh that I'm your man,
And I get to kiss you baby just because I
can.

Whatever comes our way, ah we'll see it
through,

And you know that's what our love can do.

And in this crazy life, and through these crazy
times

It's you, it's you, You make me sing
You're every line, you're every word, you're
everything.


So, La, La, La, La, La, La, La
So, La, La, La, La, La, La, La

And in this crazy life, and through these crazy
times

It's you, it's you, You make me sing.
You're every line, you're every word, you're
everything.

You're every song, and I sing along.
Cause you're my everything.
yeah, yeah

So, La, La, La, La, La, La, La
So, La, La, La, La, La, La, La

Michael Bublé