Accéder au contenu principal

Articles

Affichage des articles du mai, 2020

Reversing C++ String And QString

After the rust string overview of its internal substructures, let's see if c++ QString storage is more light, but first we'r going to take a look to the c++ standard string object: At first sight we can see the allocation and deallocation created by the clang++ compiler, and the DAT_00400d34 is the string. If we use same algorithm than the rust code but in c++: We have a different decompilation layout. Note that the Ghidra scans very fast the c++ binaries, and with  rust binaries gets crazy for a while. Locating main is also very simple in a c++ compiled binary, indeed is more  low-level than rust. The byte array is initialized with a simply move instruction:         00400c4b 48 b8 68        MOV        RAX,0x6f77206f6c6c6568 And basic_string generates the string, in the case of  rust this was carazy endless set of calls, detected by ghidra as a runtime, but nevertheless the basic_string is an external imported function not included on the binary. (gdb) x/x 0x7fffffffe1d0 0x7f

Lockdoor-Framework: A PenTesting Framework With Cyber Security Resources

About Lockdoor-Framework     Author:  SofianeHamlaoui Github:  SofianeHamlaoui Twitter:  S0fianeHamlaoui Facebook:  S0fianeHamlaoui     Tested on:  Kali Linux, Ubuntu, Arch Linux, Fedora, OpenSuse and Windows (Cygwin)    LockDoor is a Framework aimed at helping penetration testers, bug bounty hunters And cyber security engineers. This tool is designed for Debian/Ubuntu/ArchLinux based distributions to create a similar and familiar distribution for Penetration Testing. But containing the favorite and the most used tools by Pentesters. As pentesters, most of us has his personal ' /pentest/ ' directory so this Framework is helping you to build a perfect one. With all of that ! It automates the Pentesting process to help you do the job more quickly and easily. Lockdoor-Framework installation:    For now,  Lockdoor-Framework supports Debian-based Linux distros (Kali Linux, ParrotSec, Ubuntu...), Arch Linux based distros (Manjaro, BlackArch, ArchStrike...),  Fedora, OpenSuse, Cygwi

Blockchain Exploitation Labs - Part 2 Hacking Blockchain Authorization

Bypassing Blockchain Authorization via Unsecured Functions Note: Since the first part of this series I have also uploaded some further videos on remediation of reentrancy and dealing with compiler versions when working with this hacking blockchain series.   Head to the console cowboys YouTube account to check those out.   Haha as mentioned before I always forget to post blogs when I get excited making videos and just move on to my next project… So make sure to subscribe to the YouTube if you are waiting for any continuation of a video series.. It may show up there way before here.  Note 2:  You WILL run into issues when dealing with Ethereum hacking, and you will have to google them as versions and functionality changes often... Be cognizant of versions used hopefully you will not run into to many hard to fix issues.  In the second part of this lab series we are going to take a look at privacy issues on the blockchain which can result in a vulnerably a traditional system may   not face

Convertify – La Mejor Herramienta Para Convertir Tu Sitio Web En Aplicación

This article is the property of Tenochtitlan Offensive Security. Verlo Completo --> https://tenochtitlan-sec.blogspot.com Related posts Hacking Attacks Hacking Tools Growth Hacking Cursos Portatil Para Hacking Hacking Linux Curso De Hacking Gratis Hacking Mifare Ultimate Hacking Keyboard Marketing Growth Hacking Hacking Tools Hacking Roblox Whatsapp Hacking Curso De Growth Hacking

Top Linux Commands Related To Hardware With Descriptive Definitions

Commands in Linux are just the keys to explore and close the Linux. As you can do things manually by simple clicking over the programs just like windows to open an applications. But if you don't have any idea about commands of Linux and definitely you also don't know about the Linux terminal. You cannot explore Linux deeply. Because terminal is the brain of the Linux and you can do everything by using Linux terminal in any Linux distribution. So, if you wanna work over the Linux distro then you should know about the commands as well. In this blog you will exactly get the content about Linux hardware commands which are related to CPU and memory processes. dmesg The dmesg command is used in Linux distribution for the sake of detecting hardware and boot messages in the Linux system. cat /proc/cpuinfo The cat command is basically used to read something over the terminal like cat index.py will display all the content which exist in index.py over the terminal. So cat /proc/cpuinfo wi

ASIS CTF Quals 2015 - Sawthis Writeup - Srand Remote Prediction

The remote service ask for a name, if you send more than 64 bytes, a memory leak happens. The buffer next to the name's is the first random value used to init the srand() If we get this value, and set our local srand([leaked] ^ [luckyNumber]) we will be able to predict the following randoms and win the game, but we have to see few details more ;) The function used to read the input until the byte \n appears, but also up to 64 bytes, if we trigger this second condition there is not 0x00 and the print shows the random buffer :) The nickname buffer: The seed buffer: So here it is clear, but let's see that the random values are computed with several gpu instructions which are decompiled incorrectly: We tried to predict the random and aply the gpu divisions without luck :( There was a missing detail in this predcitor, but there are always other creative ways to do the things. We use the local software as a predictor, we inject the leaked seed on the local binary of the remote server

CEH: Gathering Host And Network Information | Scanning

Scanning It is important that the information-gathering stage be as complete as possible to identify the best location and targets to scan. After the completion of  footprinting and information gathering methodologies, scanning is performed. During scanning, the hacker has vision to get information about network an hosts which are connected to that network that can help hackers to determine which type of exploit to use in hacking a system precisely. Information such as an IP addresses, operating system, services, and installed applications. Scanning is the methodology used to detect the system that are alive and respond on the network or not. Ethical hackers use these type of scanning to identify the IP address of target system. Scanning is also used to determine the availability of the system whether it is connected to the network or not. Types Of Scanning  Network Scanning Identifies IP addresses on a given network or subnet Port Scanning Determines open, close, filtered and unfilte

KPOT Info Stealer Samples

KPOT Stealer is a "stealer" malware that focuses on stealing account information and other data from various software applications and services References 1.   2020-04-19  Didier Stevens posted analysis of KPOT infostealer on the Infosec Handlers Diary blog  "KPOT Analysis: Obtaining the Decrypted KPOT EXE " These are samples to follow his analysis routine. 2. 2019-05-09 Proofpoint. New KPOT v2.0 stealer brings zero persistence and in-memory features to silently steal credentials Download               Other malware Download. Email me if you need the password (see in my profile) 1. http://contagio.deependresearch.org/crime/kpotstealer_win_samp.zip  from Didier Stevens' post 2.  http://contagio.deependresearch.org/crime/kpotstealer(proofpoint)_win_samp.zip  - Proofpoint Hashes 1. From Didier Stevens' post MD5  56ad7b243511ee7398d43df7643dc904 SHA-1  ae5ab7798ca267b1265a0496c562f219821d17cf SHA-256  3fd4aa339bdfee23684ff495d884aa842165e61af85fd09411abfd64b9

Blockchain Exploitation Labs - Part 2 Hacking Blockchain Authorization

Bypassing Blockchain Authorization via Unsecured Functions Note: Since the first part of this series I have also uploaded some further videos on remediation of reentrancy and dealing with compiler versions when working with this hacking blockchain series.   Head to the console cowboys YouTube account to check those out.   Haha as mentioned before I always forget to post blogs when I get excited making videos and just move on to my next project… So make sure to subscribe to the YouTube if you are waiting for any continuation of a video series.. It may show up there way before here.  Note 2:  You WILL run into issues when dealing with Ethereum hacking, and you will have to google them as versions and functionality changes often... Be cognizant of versions used hopefully you will not run into to many hard to fix issues.  In the second part of this lab series we are going to take a look at privacy issues on the blockchain which can result in a vulnerably a traditional system may   not face