2023年5月29日 星期一

OWASP Blog Moved To Website

This will be the last post from the OWASP Blogger. Moving forward all of our blog content can be found on our website under our News

More information


  1. Hack Tools For Games
  2. Hacking Tools For Beginners
  3. Hacking Tools For Pc
  4. Black Hat Hacker Tools
  5. Hacker Tools For Pc
  6. Hacking Tools Free Download
  7. Hacker Tools Apk
  8. Pentest Tools Website
  9. Tools For Hacker
  10. Github Hacking Tools
  11. Hack Website Online Tool
  12. New Hacker Tools
  13. Hack Tools Download
  14. Pentest Tools Linux
  15. Pentest Tools Review
  16. Game Hacking
  17. World No 1 Hacker Software
  18. Pentest Tools Android
  19. Hacker
  20. Pentest Tools For Android
  21. Hacking Tools Windows
  22. Hacker Tools For Ios
  23. Pentest Tools Download
  24. Top Pentest Tools
  25. Hack Tools For Windows
  26. Hacking Tools And Software
  27. Free Pentest Tools For Windows
  28. Hacker Tools Hardware
  29. Pentest Tools Find Subdomains
  30. Hacking Tools For Mac
  31. Hacking Tools For Kali Linux
  32. Pentest Tools Nmap
  33. Hacker Tools Online
  34. Hacker Tools Free Download
  35. Hacking Tools 2020
  36. Termux Hacking Tools 2019
  37. Hacker Tool Kit
  38. Hacker Tools Github
  39. Hack Tools 2019
  40. Pentest Tools Windows
  41. Wifi Hacker Tools For Windows
  42. Beginner Hacker Tools
  43. Hacker Tools For Pc
  44. Pentest Tools Windows
  45. Hacking Tools For Beginners
  46. Hackrf Tools
  47. Kik Hack Tools
  48. Tools Used For Hacking
  49. Hacker Tools 2019
  50. Tools Used For Hacking
  51. Black Hat Hacker Tools
  52. Pentest Tools Nmap
  53. Game Hacking
  54. Hacking Tools For Beginners
  55. Hack Tools Download
  56. Termux Hacking Tools 2019
  57. Tools 4 Hack
  58. Pentest Tools Framework
  59. World No 1 Hacker Software
  60. Pentest Automation Tools
  61. How To Hack
  62. Github Hacking Tools
  63. Hacking Tools Pc
  64. Pentest Automation Tools
  65. Hacker Tools 2020
  66. Hacker Techniques Tools And Incident Handling
  67. Hacker Tools Apk Download
  68. Hacking Tools For Games
  69. Pentest Tools For Android
  70. Hacker Tools For Ios
  71. Hacker Tools Apk Download
  72. Game Hacking
  73. Hacker Tools Linux
  74. Hacking Tools Hardware
  75. Hacker Tools Github
  76. Hacking Tools 2020
  77. Hacker Security Tools
  78. Hacking Tools
  79. World No 1 Hacker Software
  80. Hack Tools
  81. Pentest Tools Framework
  82. Install Pentest Tools Ubuntu
  83. Hack Tools For Ubuntu
  84. Best Pentesting Tools 2018
  85. How To Make Hacking Tools
  86. Pentest Reporting Tools
  87. Hacks And Tools
  88. Hacker
  89. Hacker Tools Online
  90. Pentest Tools Open Source
  91. Pentest Tools Bluekeep
  92. Hacking Tools 2019
  93. Hack And Tools
  94. How To Install Pentest Tools In Ubuntu
  95. Blackhat Hacker Tools
  96. Hacking Tools Windows
  97. Hacking Tools Online
  98. Hack Tools Github
  99. Hacker Search Tools
  100. Hacker Search Tools
  101. Hacker Tools List
  102. Top Pentest Tools
  103. Hacker Tools Windows
  104. Free Pentest Tools For Windows
  105. Hacking Tools Pc
  106. Hack Tools For Mac
  107. Hack Tool Apk No Root
  108. Hacker Tools Github
  109. Pentest Tools Nmap
  110. Pentest Tools Port Scanner
  111. Pentest Tools Framework
  112. Underground Hacker Sites
  113. What Are Hacking Tools
  114. Hacking Tools For Beginners
  115. Hacker Techniques Tools And Incident Handling
  116. Wifi Hacker Tools For Windows
  117. New Hack Tools
  118. Hacking Tools And Software
  119. What Is Hacking Tools
  120. Hacker Tools Online
  121. Pentest Tools Url Fuzzer
  122. Hack Tool Apk
  123. Pentest Tools Download
  124. Pentest Tools Alternative
  125. Pentest Tools Framework
  126. Easy Hack Tools
  127. Computer Hacker
  128. Android Hack Tools Github
  129. Hack And Tools
  130. Hacker Tools Hardware
  131. Pentest Tools Online
  132. Beginner Hacker Tools

歡迎蒞臨:https://ofa588.com/

娛樂推薦:https://www.ofa86.com/

2023年5月28日 星期日

Linux Command Line Hackery Series - Part 3


Welcome back, hope you are enjoying this series, I don't know about you but I'm enjoying it a lot. This is part 3 of the series and in this article we're going to learn some new commands. Let's get started

Command: w
Syntax:      w
Function:   This simple function is used to see who is currently logged in and what they are doing, that is, their processes.

Command:  whoami
Syntax:       whoami
Function: This is another simple command which is used to print  the  user  name  associated  with the current effective user ID.

Try it and it will show up your user name.

If you want to know information about a particular user no matter whether it is you or someone else there is a command for doing that as well.

Command: finger
Syntax:      finger [option] [username]
Function:   finger is a user information lookup program. The [] around the arguments means that these arguments are optional this convention is used everywhere in this whole series.

In order to find information about your current user you can simply type:

finger username

Here username is your current username.
To find information about root you can type:

finger root

and it will display info about root user.

Command: uname
Syntax:      uname [options]
Function:   uname is used to display information about the system.

uname is mostly used with the flag -a, which means display all information like this:

uname -a

Command: df
Syntax:      df [option] [FILE ...] 
Function:   df is used to display the amount of space available.
If you type df in your terminal and then hit enter you'll see the used and available space of every drive currently mounted on the system. However the information is displayed in block-size, which is not so much human friendly. But don't worry we can have a human friendly output as well using df by typing:

df -h

the -h flag is used to display the used and available space in a more user friendly format.
We can also view the info of a single drive by specifying the drive name after df like this:

df -h /dev/sda2

That's it for now about df, let's move on.

Command:  free
Syntax:       free [options]
Function:    free is used to display the amount of free and used physical memory and swap memory in the system.
Again the displayed information is in block-size to get a more human readable format use the -h flag like this:

free -h

Command: cal
Syntax:      cal [options]
Function:    cal stands for calendar. It is used to display the calendar.

If you want to display current date on the calendar you can simply type:

cal

and wohooo! you get a nice looking calendar on screen with current date marked but what if you want to display calendar of a previous month well you can do that as well. Say you want to display calendar of Jan 2010, then you'll have to type:

cal -d 2010-01

Nice little handy tool, isn't it?

Command: file
Syntax:      file filename ...
Function:   file is an awesome tool, it's used to classify a file. It is used to determine the file type.

Let's demonstrate the usage of this command by solving a Noob's CTF challenge using file and base64 commands. We'll talk about base64 command in a bit. Go to InfoSecInstitute CTF Website. What you need to do here is to save the broken image file on your local computer in your home directory. After saving the file open your terminal (if it isn't already). Move to your home directory and then check what type of file it is using the file command:

cd
file image.jpg

Shocking output? The file command has identified the above file as an ASCII text file which means the above file is not an image file rather it is a text file now it's time to see it's contents so we'll type:

cat image.jpg

What is that? It's some kind of gibberish. Well it's base64 encoded text. We need to decode it. Let's learn how to do that.

Command: base64
Syntax:       base64 [option] FILE ...
Function:    base64 command is used to encode/decode data and then print it to stdout.

If we're to encode some text in base64 format we'd simply type base64 hit enter and then start typing the text in the terminal after you're done hit enter again and then press CTRL+D like this:

base64
some text here
<CTRL+D>
c29tZSB0ZXh0IGhlcmUK        # output - the encoded string

But in the above CTF we've got base64 encoded data we need to decode it, how are we going to do that? It's simple:

base64 -d image.jpg

There you go you've captured the flag.
The -d flag here specifies that we want to decode instead of encode and after it is the name of file we want to decode.

Voila!
So now you're officially a Hacker! Sorry no certificates available here :)

That's it for this article meet ya soon in the upcoming article.
Related news

歡迎蒞臨:https://ofa588.com/

娛樂推薦:https://www.ofa86.com/

2023年5月27日 星期六

2020-12-13 SUNBURST SolarWinds Backdoor Samples

Reference

I am sure you all saw the news. 

Links updated: Jan 19, 2023


The Resurgence of Russian Threat Actor, NOBELIUM

 
Well, here are the Sunburst binaries. 
Here is a Sunburst malware analysis walk-through video by Colin Hardy




Hashes






SolarWinds.Orion.Core.BusinessLayer.dll


 Trojan:MSIL/Solorigate.B!dha
A Variant Of MSIL/SunBurst.A

SolarWinds.Orion.Core.BusinessLayer.dll
32519b85c0b422e4656de6e6c41878e95fd95026267daab4215ee59c107d6c77
dab758bf98d9b36fa057a66cd0284737abf89857b73ca89280267ee7caf62f3b
eb6fab5a2964c5817fb239a7a5079cabca0a00464fb3e07155f28b0a57a2c0ed
c09040d35630d75dfef0f804f320f8b3d16a481071076918e9b236a321c1ea77
ac1b2b89e60707a20e9eb1ca480bc3410ead40643b386d624c5d21b47c02917c
019085a76ba7126fff22770d71bd901c325fc68ac55aa743327984e89f4b0134
ce77d116a074dab7a22a0fd4f2c1ab475f16eec42e1ded3c0b0aa8211fe858d6
a25cadd48d70f6ea0c4a241d99c5241269e6faccb4054e62d16784640f8e53bc
d3c6785e18fba3749fb785bc313cf8346182f532c59172b69adfb31b96a5d0af
0f5d7e6dfdd62c83eb096ba193b5ae394001bac036745495674156ead6557589
6e4050c6a2d2e5e49606d96dd2922da480f2e0c70082cc7e54449a7dc0d20f8d

CORE-2019.4.5220.20574-SolarWinds-Core-v2019.4.5220-Hotfix5.msp
d0d626deb3f9484e649294a8dfa814c5568f846d5aa02d4cdad5d041a29d5600

appweblogoimagehandler.ashx.b6031896.dll
c15abaf51e78ca56c0376522d699c978217bf041a3bd3c71d09193efa5717c71

TEARDROP
b820e8a2057112d0ed73bd7995201dbed79a79e13c79d4bdad81a22f12387e07
1817a5bf9c01035bcf8a975c9f1d94b0ce7f6a200339485d8f93859f8f6d730c

RAINDROP
be9dbbec6937dfe0a652c0603d4972ba354e83c06b8397d6555fd1847da36725

This is the compromised installer file ( was still on Solarwinds update downloads  on Dec 14, 2020)

File size 419.76 MB
CoreInstaller.msi

ad2fbf4add71f61173975989d1a18395afb8538ed889012b9d2e21c19e98bbd1

2020-04-21 17:31:02
SolarWinds Orion Core Services 2020.2
{77E2D294-3D5C-4D93-ADF1-884CCEAD93B0}
File Version Information
Date signed 05:32 PM 04/21/2020
Signers
Solarwinds Worldwide, LLC
Symantec Class 3 SHA256 Code Signing CA
VeriSign
VT - 0 (Dec 14, 2020)

If you unzip, check 

SolarWinds.Orion.Core.BusinessLayer.dll under OrionCore







Related posts


歡迎蒞臨:https://ofa588.com/

娛樂推薦:https://www.ofa86.com/