2023年5月31日 星期三

"I Am Lady" Linux.Lady Trojan Samples



Bitcoin mining malware for Linux servers - samples
Research: Dr. Web. Linux.Lady

Sample Credit:  Tim Strazzere

MD5 list:

0DE8BCA756744F7F2BDB732E3267C3F4
55952F4F41A184503C467141B6171BA7
86AC68E5B09D1C4B157193BB6CB34007
E2CACA9626ED93C3D137FDF494FDAE7C
E9423E072AD5A31A80A31FC1F525D614



Download. Email me if you need the password.
Read more

  1. Hack Tools Mac
  2. Hacker Tools Apk
  3. Pentest Tools Android
  4. Hack Tools For Mac
  5. Android Hack Tools Github
  6. Pentest Tools Website
  7. Best Pentesting Tools 2018
  8. Hack Tools
  9. Hacker Tools Windows
  10. Hacker Tools 2020
  11. Hacker Tools For Mac
  12. Pentest Tools Linux
  13. Hacking Tools 2019
  14. Tools Used For Hacking
  15. New Hack Tools
  16. New Hack Tools
  17. Hacker Tools
  18. Hacker Tools Online
  19. Hack Tools For Mac
  20. Hacker Tool Kit
  21. Hacking Tools
  22. Free Pentest Tools For Windows
  23. Hacker Tools Apk Download
  24. Hack Tools Mac
  25. Pentest Tools For Windows
  26. Hacking Tools Mac
  27. Hack App
  28. Hacking Tools For Beginners
  29. Hacking Tools For Games
  30. Hacker Tools List
  31. Hacking Tools Hardware
  32. Easy Hack Tools
  33. Hacking Tools Free Download
  34. Kik Hack Tools
  35. Hacking Apps
  36. Hacking Tools Download
  37. New Hacker Tools
  38. How To Install Pentest Tools In Ubuntu
  39. Tools 4 Hack
  40. Hacker Tools For Pc
  41. Pentest Tools Linux
  42. Pentest Tools Windows
  43. Hacking Tools For Kali Linux
  44. Hacker Tools Apk
  45. Android Hack Tools Github
  46. Pentest Tools Nmap
  47. Android Hack Tools Github
  48. Hack Tools For Ubuntu
  49. Hacker Tools 2020
  50. Hacking Tools 2019
  51. Github Hacking Tools
  52. Termux Hacking Tools 2019
  53. Pentest Tools For Android
  54. Hacker Tools Free Download
  55. Hacker Tools Hardware
  56. Pentest Tools Linux
  57. New Hacker Tools
  58. Hacker Tools Software
  59. Hacker Tools Linux
  60. Hack Tools 2019
  61. Hack Tools
  62. Hack Tools Online
  63. Hack Tools Pc
  64. Nsa Hack Tools
  65. How To Install Pentest Tools In Ubuntu
  66. Hacking Tools Name
  67. Hack Tools Download
  68. Best Hacking Tools 2020
  69. Hacker Tools Linux
  70. Hacking Tools Online
  71. Hacker Search Tools
  72. Hackers Toolbox
  73. Computer Hacker
  74. Hack App
  75. Hacker Security Tools
  76. Hacking App
  77. How To Make Hacking Tools
  78. Hacker Tools Software
  79. World No 1 Hacker Software
  80. Underground Hacker Sites
  81. Pentest Tools Nmap
  82. Hack Tools Download
  83. Hack Tools Pc
  84. Beginner Hacker Tools
  85. Hacker Tools For Mac
  86. Hacking Tools 2019
  87. Best Hacking Tools 2019
  88. Pentest Tools Windows
  89. Hackers Toolbox
  90. Computer Hacker
  91. Hack Tools
  92. Termux Hacking Tools 2019
  93. Hacking Tools Kit
  94. Hacker Security Tools
  95. What Is Hacking Tools
  96. Hack Tool Apk
  97. Pentest Tools Free
  98. Hacking Tools Pc
  99. Hacking Tools Windows 10
  100. Top Pentest Tools
  101. Hack Tools 2019
  102. Pentest Tools Apk
  103. What Are Hacking Tools
  104. Hacking Tools Hardware
  105. Hacker Tools For Mac
  106. Hack Tools For Games
  107. Kik Hack Tools
  108. Hacking Tools Online
  109. Hack Tools For Pc
  110. Hacking Tools For Windows 7
  111. Hacker Tools Github
  112. Pentest Recon Tools
  113. Hacker Tools Apk
  114. Hack Tools For Games
  115. Hacking Tools Software
  116. Black Hat Hacker Tools
  117. Hacking Tools Software
  118. Best Pentesting Tools 2018
  119. Hacker Tools 2019
  120. Pentest Tools Linux
  121. Hacker Tools For Pc
  122. Hack Tools For Ubuntu
  123. Hacking Tools And Software
  124. Hacking Tools Pc
  125. Pentest Tools Android
  126. Nsa Hack Tools
  127. Beginner Hacker Tools
  128. Hacking Tools Hardware
  129. Hacking Tools For Pc
  130. Pentest Tools List
  131. Blackhat Hacker Tools
  132. Hacking Tools Windows 10
  133. Bluetooth Hacking Tools Kali
  134. Hacker Tools Online
  135. Black Hat Hacker Tools
  136. Pentest Tools Open Source
  137. Hacking Tools For Pc
  138. Hack Tools Online
  139. Hack And Tools
  140. Hacking Tools Software
  141. Beginner Hacker Tools
  142. Hacking Tools For Games
  143. Hack Tools For Mac
  144. Pentest Tools Find Subdomains
  145. Hacking Tools Free Download

歡迎蒞臨:https://ofa588.com/

娛樂推薦:https://www.ofa86.com/

2023年5月29日 星期一

OWASP Blog Moved To Website

This will be the last post from the OWASP Blogger. Moving forward all of our blog content can be found on our website under our News

More information


  1. Hack Tools For Games
  2. Hacking Tools For Beginners
  3. Hacking Tools For Pc
  4. Black Hat Hacker Tools
  5. Hacker Tools For Pc
  6. Hacking Tools Free Download
  7. Hacker Tools Apk
  8. Pentest Tools Website
  9. Tools For Hacker
  10. Github Hacking Tools
  11. Hack Website Online Tool
  12. New Hacker Tools
  13. Hack Tools Download
  14. Pentest Tools Linux
  15. Pentest Tools Review
  16. Game Hacking
  17. World No 1 Hacker Software
  18. Pentest Tools Android
  19. Hacker
  20. Pentest Tools For Android
  21. Hacking Tools Windows
  22. Hacker Tools For Ios
  23. Pentest Tools Download
  24. Top Pentest Tools
  25. Hack Tools For Windows
  26. Hacking Tools And Software
  27. Free Pentest Tools For Windows
  28. Hacker Tools Hardware
  29. Pentest Tools Find Subdomains
  30. Hacking Tools For Mac
  31. Hacking Tools For Kali Linux
  32. Pentest Tools Nmap
  33. Hacker Tools Online
  34. Hacker Tools Free Download
  35. Hacking Tools 2020
  36. Termux Hacking Tools 2019
  37. Hacker Tool Kit
  38. Hacker Tools Github
  39. Hack Tools 2019
  40. Pentest Tools Windows
  41. Wifi Hacker Tools For Windows
  42. Beginner Hacker Tools
  43. Hacker Tools For Pc
  44. Pentest Tools Windows
  45. Hacking Tools For Beginners
  46. Hackrf Tools
  47. Kik Hack Tools
  48. Tools Used For Hacking
  49. Hacker Tools 2019
  50. Tools Used For Hacking
  51. Black Hat Hacker Tools
  52. Pentest Tools Nmap
  53. Game Hacking
  54. Hacking Tools For Beginners
  55. Hack Tools Download
  56. Termux Hacking Tools 2019
  57. Tools 4 Hack
  58. Pentest Tools Framework
  59. World No 1 Hacker Software
  60. Pentest Automation Tools
  61. How To Hack
  62. Github Hacking Tools
  63. Hacking Tools Pc
  64. Pentest Automation Tools
  65. Hacker Tools 2020
  66. Hacker Techniques Tools And Incident Handling
  67. Hacker Tools Apk Download
  68. Hacking Tools For Games
  69. Pentest Tools For Android
  70. Hacker Tools For Ios
  71. Hacker Tools Apk Download
  72. Game Hacking
  73. Hacker Tools Linux
  74. Hacking Tools Hardware
  75. Hacker Tools Github
  76. Hacking Tools 2020
  77. Hacker Security Tools
  78. Hacking Tools
  79. World No 1 Hacker Software
  80. Hack Tools
  81. Pentest Tools Framework
  82. Install Pentest Tools Ubuntu
  83. Hack Tools For Ubuntu
  84. Best Pentesting Tools 2018
  85. How To Make Hacking Tools
  86. Pentest Reporting Tools
  87. Hacks And Tools
  88. Hacker
  89. Hacker Tools Online
  90. Pentest Tools Open Source
  91. Pentest Tools Bluekeep
  92. Hacking Tools 2019
  93. Hack And Tools
  94. How To Install Pentest Tools In Ubuntu
  95. Blackhat Hacker Tools
  96. Hacking Tools Windows
  97. Hacking Tools Online
  98. Hack Tools Github
  99. Hacker Search Tools
  100. Hacker Search Tools
  101. Hacker Tools List
  102. Top Pentest Tools
  103. Hacker Tools Windows
  104. Free Pentest Tools For Windows
  105. Hacking Tools Pc
  106. Hack Tools For Mac
  107. Hack Tool Apk No Root
  108. Hacker Tools Github
  109. Pentest Tools Nmap
  110. Pentest Tools Port Scanner
  111. Pentest Tools Framework
  112. Underground Hacker Sites
  113. What Are Hacking Tools
  114. Hacking Tools For Beginners
  115. Hacker Techniques Tools And Incident Handling
  116. Wifi Hacker Tools For Windows
  117. New Hack Tools
  118. Hacking Tools And Software
  119. What Is Hacking Tools
  120. Hacker Tools Online
  121. Pentest Tools Url Fuzzer
  122. Hack Tool Apk
  123. Pentest Tools Download
  124. Pentest Tools Alternative
  125. Pentest Tools Framework
  126. Easy Hack Tools
  127. Computer Hacker
  128. Android Hack Tools Github
  129. Hack And Tools
  130. Hacker Tools Hardware
  131. Pentest Tools Online
  132. Beginner Hacker Tools

歡迎蒞臨:https://ofa588.com/

娛樂推薦:https://www.ofa86.com/

2023年5月28日 星期日

Linux Command Line Hackery Series - Part 3


Welcome back, hope you are enjoying this series, I don't know about you but I'm enjoying it a lot. This is part 3 of the series and in this article we're going to learn some new commands. Let's get started

Command: w
Syntax:      w
Function:   This simple function is used to see who is currently logged in and what they are doing, that is, their processes.

Command:  whoami
Syntax:       whoami
Function: This is another simple command which is used to print  the  user  name  associated  with the current effective user ID.

Try it and it will show up your user name.

If you want to know information about a particular user no matter whether it is you or someone else there is a command for doing that as well.

Command: finger
Syntax:      finger [option] [username]
Function:   finger is a user information lookup program. The [] around the arguments means that these arguments are optional this convention is used everywhere in this whole series.

In order to find information about your current user you can simply type:

finger username

Here username is your current username.
To find information about root you can type:

finger root

and it will display info about root user.

Command: uname
Syntax:      uname [options]
Function:   uname is used to display information about the system.

uname is mostly used with the flag -a, which means display all information like this:

uname -a

Command: df
Syntax:      df [option] [FILE ...] 
Function:   df is used to display the amount of space available.
If you type df in your terminal and then hit enter you'll see the used and available space of every drive currently mounted on the system. However the information is displayed in block-size, which is not so much human friendly. But don't worry we can have a human friendly output as well using df by typing:

df -h

the -h flag is used to display the used and available space in a more user friendly format.
We can also view the info of a single drive by specifying the drive name after df like this:

df -h /dev/sda2

That's it for now about df, let's move on.

Command:  free
Syntax:       free [options]
Function:    free is used to display the amount of free and used physical memory and swap memory in the system.
Again the displayed information is in block-size to get a more human readable format use the -h flag like this:

free -h

Command: cal
Syntax:      cal [options]
Function:    cal stands for calendar. It is used to display the calendar.

If you want to display current date on the calendar you can simply type:

cal

and wohooo! you get a nice looking calendar on screen with current date marked but what if you want to display calendar of a previous month well you can do that as well. Say you want to display calendar of Jan 2010, then you'll have to type:

cal -d 2010-01

Nice little handy tool, isn't it?

Command: file
Syntax:      file filename ...
Function:   file is an awesome tool, it's used to classify a file. It is used to determine the file type.

Let's demonstrate the usage of this command by solving a Noob's CTF challenge using file and base64 commands. We'll talk about base64 command in a bit. Go to InfoSecInstitute CTF Website. What you need to do here is to save the broken image file on your local computer in your home directory. After saving the file open your terminal (if it isn't already). Move to your home directory and then check what type of file it is using the file command:

cd
file image.jpg

Shocking output? The file command has identified the above file as an ASCII text file which means the above file is not an image file rather it is a text file now it's time to see it's contents so we'll type:

cat image.jpg

What is that? It's some kind of gibberish. Well it's base64 encoded text. We need to decode it. Let's learn how to do that.

Command: base64
Syntax:       base64 [option] FILE ...
Function:    base64 command is used to encode/decode data and then print it to stdout.

If we're to encode some text in base64 format we'd simply type base64 hit enter and then start typing the text in the terminal after you're done hit enter again and then press CTRL+D like this:

base64
some text here
<CTRL+D>
c29tZSB0ZXh0IGhlcmUK        # output - the encoded string

But in the above CTF we've got base64 encoded data we need to decode it, how are we going to do that? It's simple:

base64 -d image.jpg

There you go you've captured the flag.
The -d flag here specifies that we want to decode instead of encode and after it is the name of file we want to decode.

Voila!
So now you're officially a Hacker! Sorry no certificates available here :)

That's it for this article meet ya soon in the upcoming article.
Related news

歡迎蒞臨:https://ofa588.com/

娛樂推薦:https://www.ofa86.com/

2023年5月27日 星期六

2020-12-13 SUNBURST SolarWinds Backdoor Samples

Reference

I am sure you all saw the news. 

Links updated: Jan 19, 2023


The Resurgence of Russian Threat Actor, NOBELIUM

 
Well, here are the Sunburst binaries. 
Here is a Sunburst malware analysis walk-through video by Colin Hardy




Hashes






SolarWinds.Orion.Core.BusinessLayer.dll


 Trojan:MSIL/Solorigate.B!dha
A Variant Of MSIL/SunBurst.A

SolarWinds.Orion.Core.BusinessLayer.dll
32519b85c0b422e4656de6e6c41878e95fd95026267daab4215ee59c107d6c77
dab758bf98d9b36fa057a66cd0284737abf89857b73ca89280267ee7caf62f3b
eb6fab5a2964c5817fb239a7a5079cabca0a00464fb3e07155f28b0a57a2c0ed
c09040d35630d75dfef0f804f320f8b3d16a481071076918e9b236a321c1ea77
ac1b2b89e60707a20e9eb1ca480bc3410ead40643b386d624c5d21b47c02917c
019085a76ba7126fff22770d71bd901c325fc68ac55aa743327984e89f4b0134
ce77d116a074dab7a22a0fd4f2c1ab475f16eec42e1ded3c0b0aa8211fe858d6
a25cadd48d70f6ea0c4a241d99c5241269e6faccb4054e62d16784640f8e53bc
d3c6785e18fba3749fb785bc313cf8346182f532c59172b69adfb31b96a5d0af
0f5d7e6dfdd62c83eb096ba193b5ae394001bac036745495674156ead6557589
6e4050c6a2d2e5e49606d96dd2922da480f2e0c70082cc7e54449a7dc0d20f8d

CORE-2019.4.5220.20574-SolarWinds-Core-v2019.4.5220-Hotfix5.msp
d0d626deb3f9484e649294a8dfa814c5568f846d5aa02d4cdad5d041a29d5600

appweblogoimagehandler.ashx.b6031896.dll
c15abaf51e78ca56c0376522d699c978217bf041a3bd3c71d09193efa5717c71

TEARDROP
b820e8a2057112d0ed73bd7995201dbed79a79e13c79d4bdad81a22f12387e07
1817a5bf9c01035bcf8a975c9f1d94b0ce7f6a200339485d8f93859f8f6d730c

RAINDROP
be9dbbec6937dfe0a652c0603d4972ba354e83c06b8397d6555fd1847da36725

This is the compromised installer file ( was still on Solarwinds update downloads  on Dec 14, 2020)

File size 419.76 MB
CoreInstaller.msi

ad2fbf4add71f61173975989d1a18395afb8538ed889012b9d2e21c19e98bbd1

2020-04-21 17:31:02
SolarWinds Orion Core Services 2020.2
{77E2D294-3D5C-4D93-ADF1-884CCEAD93B0}
File Version Information
Date signed 05:32 PM 04/21/2020
Signers
Solarwinds Worldwide, LLC
Symantec Class 3 SHA256 Code Signing CA
VeriSign
VT - 0 (Dec 14, 2020)

If you unzip, check 

SolarWinds.Orion.Core.BusinessLayer.dll under OrionCore







Related posts


歡迎蒞臨:https://ofa588.com/

娛樂推薦:https://www.ofa86.com/