sábado, 22 de agosto de 2020

Ettercap: Man In The Middle (MITM)


"Ettercap is a suite for man in the middle attacks on LAN. It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols (even ciphered ones) and includes many feature for network and host analysis." read more...


Website: http://ettercap.sourceforge.net

Continue reading
  1. Hacking Tools For Pc
  2. Hack Website Online Tool
  3. Nsa Hack Tools Download
  4. World No 1 Hacker Software
  5. Hack Tools For Ubuntu
  6. Hacker Tools Software
  7. Usb Pentest Tools
  8. Tools For Hacker
  9. Hack Tools For Pc
  10. Hacker Tools Software
  11. New Hacker Tools
  12. Pentest Tools Port Scanner
  13. Beginner Hacker Tools
  14. Hacking Tools For Windows 7
  15. Hacker Tools Software
  16. Hacker Search Tools
  17. Hacker Tools For Mac
  18. Free Pentest Tools For Windows
  19. Hacking Tools Pc
  20. Hacker Tools Mac
  21. Hacking Tools 2020
  22. Best Hacking Tools 2020
  23. How To Hack
  24. Pentest Tools Github
  25. Hacking Tools Windows
  26. Hack Tools For Ubuntu
  27. Hacking Tools Online
  28. Hack Tools For Mac
  29. Nsa Hack Tools
  30. Hacking Tools Windows
  31. Pentest Tools Url Fuzzer
  32. Hack Tools For Ubuntu
  33. Hacker Tools Windows
  34. Hacker Tools List
  35. Free Pentest Tools For Windows
  36. Hack Tools For Mac
  37. Pentest Tools Online
  38. Hack Tools Mac
  39. Computer Hacker
  40. Hacking Tools Hardware
  41. Hack Tools For Pc
  42. Hacker Tools Apk
  43. Pentest Tools Kali Linux
  44. Pentest Recon Tools
  45. Hacking Tools Windows
  46. Pentest Tools Website
  47. Hacking Tools Free Download
  48. Hacker Tools 2019
  49. Hacking Tools Windows
  50. Hacker Tools Software
  51. Hacker Tools Free
  52. Pentest Tools Apk
  53. Termux Hacking Tools 2019
  54. Pentest Tools Framework
  55. Hacker Tools For Ios
  56. Pentest Tools Bluekeep
  57. Hacking Tools Github
  58. How To Hack
  59. Tools Used For Hacking
  60. Pentest Tools For Windows
  61. Hacker Tools Free
  62. Nsa Hacker Tools
  63. Hackers Toolbox
  64. Hack Tools Online
  65. Pentest Automation Tools
  66. Pentest Tools List
  67. Hacker Tools List
  68. Hack Tools For Windows
  69. Hack Tools
  70. Hacker Tools
  71. Best Hacking Tools 2020
  72. Hack Tools Github
  73. Hacker Tools Github
  74. Hacking Tools For Kali Linux
  75. Pentest Tools Kali Linux
  76. Hack Tools For Ubuntu
  77. Hacking Tools For Windows Free Download
  78. Hacker Tools Linux
  79. Hacks And Tools
  80. Hacking Tools 2020
  81. Tools 4 Hack
  82. Hacker Security Tools
  83. Hack Tool Apk No Root
  84. Hack Tools
  85. Pentest Recon Tools
  86. Ethical Hacker Tools

Leo's Noob


I would like to send a salve to my friend noob at Rivendel in Brazilian company hahaha
Continue reading

  1. Tools For Hacker
  2. Hacking Tools For Kali Linux
  3. Hacking Tools 2020
  4. Game Hacking
  5. Hacking Tools Github
  6. Tools Used For Hacking
  7. How To Hack
  8. Free Pentest Tools For Windows
  9. What Is Hacking Tools
  10. Hack Tool Apk No Root
  11. New Hack Tools
  12. Hacks And Tools
  13. Tools Used For Hacking
  14. Hacker Tools For Windows
  15. Hack Apps
  16. Hack App
  17. How To Install Pentest Tools In Ubuntu
  18. Kik Hack Tools
  19. Hacker Tools Online
  20. Hacker Tools Apk Download
  21. Pentest Tools Website Vulnerability
  22. New Hacker Tools
  23. Computer Hacker
  24. Pentest Tools For Ubuntu
  25. Hack Tools For Windows
  26. Easy Hack Tools
  27. Pentest Tools Framework
  28. Pentest Tools Alternative
  29. Hacking Tools Usb
  30. Game Hacking
  31. Hacker Tools For Windows
  32. Hacking Tools 2020
  33. Hacking Tools Online
  34. Pentest Tools Website Vulnerability
  35. Pentest Recon Tools
  36. Pentest Tools Linux
  37. Hacker
  38. Growth Hacker Tools
  39. Hacking Tools For Games
  40. Hack Tools
  41. Hacker Tools Software
  42. Hacking Tools For Games
  43. Hacking Tools Mac
  44. Pentest Tools Apk
  45. Hackers Toolbox
  46. Hack Tools Online
  47. Hackers Toolbox
  48. Nsa Hack Tools
  49. Pentest Tools For Windows
  50. Growth Hacker Tools
  51. Hacking Tools Free Download
  52. Hack Tools For Ubuntu
  53. Hacker Tools List
  54. Hacking Tools Pc
  55. Hacker Tools 2020
  56. Pentest Tools Free
  57. Hacker Tools Apk Download
  58. Hacking Tools Hardware
  59. Hacker Tools Free Download
  60. Hack Tools For Ubuntu
  61. Top Pentest Tools
  62. Hacker Tools Apk
  63. Pentest Tools Port Scanner
  64. Pentest Tools For Windows
  65. Pentest Tools For Android
  66. Hack Tools
  67. Hacker Tools For Windows
  68. Hack Tools 2019
  69. Hacker Tools Software
  70. Hacking Tools Pc
  71. Hack Rom Tools
  72. Pentest Tools Url Fuzzer
  73. Hak5 Tools
  74. Hacker Tools List
  75. Hacking Tools Windows
  76. Hack Tools Github
  77. Growth Hacker Tools

What Is Cybercrime? What Are The Types Of Cybercrime? What Is Cyberlaw In India?

What is cyber crime?

Cybercrime is the use of computers & networks to perform illegal activities such as spreading viruses,online  bullying,performing unauthorized electronic fund transfers etc. Most cyber crimes are committed through the internet.
Some cyber crime also be carried out using mobile phones via Sms and online chatting applications.

TYPES OF CYBERCRIME

The following list presents the common types of cybercrimes-

1-Computer Fraud-Intential deception for personal gain via the use of computer system.

2-Privacy Violations-Exposing personal information such as email addresses,phone numbers,account details etc, on social media,websites,etc.

3-Identity theft-Stealing personal information from somebody and impersonating that person.

4-Sharing copyright files/information-This involves distributing copyright protected files such as eBooks and computer program etc.

5-Electronic funds transfer-This involves gaining an unauthorized access to bank computer networks and making illegal funds transferring.

6-Electronic money laundering-This involves the use of the computer to launder money.

7-Atm fraud-This involves intercepting ATM card details such as account numbers and PIN numbers.These details are then used to withdraw funds from the intercepted accounts.

8-Denial of service attack-This involves the use of computers in multiple locations to attack servers with a view of shutting them down.

9-Spam:sending unauthorized emails.
These emails usually contain advertisements.


CYBER LAW

Under The Information Technology Act,2000 
CHAPTER XI-OFFENCES-66. Hacking with computer system.

1-whoever with the Intent to cause or knowing that he is likely to cause Wrongfull Loss or Damage to the public or any person Destroys or Deletes or Alter any Information Residing in computer Resource or diminishes its value or utility or affects it injuriously by any means, commits hack.

2-whoever commits hacking shell be punished with imprisonment up to three years, or  with fine which may extend up to two lakh rupees,or with both.

Read more


  1. Pentest Tools List
  2. Hacking Tools Github
  3. Hacks And Tools
  4. New Hack Tools
  5. Hacking Tools Pc
  6. Hackrf Tools
  7. Pentest Tools Github
  8. Hack And Tools
  9. Hacking Tools For Windows 7
  10. Pentest Tools Subdomain
  11. Hacking Tools For Mac
  12. Pentest Tools Alternative
  13. Pentest Tools For Windows
  14. Hacking Tools Pc
  15. Hack Apps
  16. New Hack Tools
  17. Top Pentest Tools
  18. Hacking Tools Windows
  19. Pentest Tools Download
  20. Pentest Tools For Mac
  21. Hacker Tools Windows
  22. Pentest Tools Subdomain
  23. How To Install Pentest Tools In Ubuntu
  24. Hacks And Tools
  25. Hack Tools 2019
  26. Pentest Automation Tools
  27. Pentest Tools Review
  28. Hack Website Online Tool
  29. Hack Tools For Ubuntu
  30. World No 1 Hacker Software
  31. Pentest Tools For Mac
  32. Hack Tools
  33. Hak5 Tools
  34. Pentest Tools Website
  35. Hacking Tools Name
  36. Tools For Hacker
  37. Computer Hacker
  38. Hacking Tools Windows 10
  39. Pentest Tools Url Fuzzer
  40. Pentest Tools Linux
  41. Underground Hacker Sites
  42. Hack Tools
  43. Hacker Security Tools
  44. Hacker Tools Hardware
  45. Kik Hack Tools
  46. Hacks And Tools
  47. Pentest Automation Tools
  48. How To Make Hacking Tools
  49. Hack Tools For Mac
  50. How To Make Hacking Tools
  51. Hacking Tools Windows 10
  52. Hack Apps
  53. Pentest Tools Apk
  54. Pentest Tools Website Vulnerability
  55. Pentest Recon Tools
  56. Hacker Tools Mac
  57. Pentest Tools For Windows
  58. Hack Tools For Windows
  59. Tools 4 Hack
  60. Hacking Tools Online
  61. Hacking Tools Kit
  62. Hack Tools For Ubuntu
  63. Hack App
  64. Hacker Tools For Pc
  65. Pentest Tools Bluekeep
  66. Hacking Tools Github
  67. Game Hacking
  68. Hacker Tools 2019
  69. Hack Tools Github
  70. Hacking Tools For Mac
  71. Pentest Tools Nmap
  72. Hack And Tools
  73. Hacking Tools And Software
  74. Hack Tools Online
  75. Hacking Apps
  76. Hacking Tools 2019
  77. Pentest Tools For Windows
  78. Hack Website Online Tool
  79. Pentest Reporting Tools
  80. What Are Hacking Tools
  81. Best Hacking Tools 2019
  82. Tools 4 Hack
  83. Hacking Tools Windows 10
  84. Pentest Reporting Tools
  85. Hacking Tools Software
  86. Hacker Tools Windows
  87. Hacking Tools For Windows 7
  88. Pentest Tools Windows
  89. Hacker Security Tools
  90. Pentest Tools Android
  91. Hacks And Tools
  92. Hack And Tools
  93. Pentest Tools Android
  94. World No 1 Hacker Software
  95. Hacker Hardware Tools
  96. Hack Apps
  97. Pentest Tools For Windows
  98. Easy Hack Tools
  99. Pentest Tools Subdomain
  100. Hack Tools For Ubuntu
  101. Hacker Tools For Mac
  102. Pentest Recon Tools
  103. Tools For Hacker
  104. Best Hacking Tools 2020
  105. Bluetooth Hacking Tools Kali
  106. Hacking Tools For Games
  107. Hack Tools For Windows
  108. Hacker Techniques Tools And Incident Handling
  109. Hack Tools For Mac
  110. Pentest Tools Linux
  111. Growth Hacker Tools
  112. Hacking Tools Software
  113. Pentest Tools For Android
  114. Nsa Hack Tools Download
  115. Physical Pentest Tools
  116. Pentest Tools Kali Linux
  117. Pentest Tools Apk
  118. Pentest Tools Download
  119. Pentest Tools Tcp Port Scanner
  120. Hacking Tools For Kali Linux
  121. Pentest Tools Open Source
  122. Pentest Tools Url Fuzzer
  123. Pentest Tools Website
  124. New Hacker Tools
  125. Hack Tools For Mac
  126. Hacking Tools
  127. Hacker
  128. Hack Tools Pc
  129. Game Hacking
  130. Hacking Tools For Windows
  131. Hack Tools Pc
  132. Hacker Tools For Pc
  133. Hacks And Tools
  134. Pentest Tools For Mac
  135. Hacking Tools Mac
  136. Pentest Tools Android
  137. Hacker Tools Mac
  138. Hacking Tools And Software
  139. Hacks And Tools
  140. Hacking Tools
  141. Android Hack Tools Github
  142. Black Hat Hacker Tools
  143. Hacker Tool Kit
  144. Hacking Tools For Games
  145. Nsa Hacker Tools
  146. Computer Hacker
  147. Hacker Tools For Pc
  148. Termux Hacking Tools 2019
  149. Hack Tools For Ubuntu

viernes, 21 de agosto de 2020

How To Build A "Burner Device" For DEF CON In One Easy Step

TL;DR: Don't build a burner device. Probably this is not the risk you are looking for.

Introduction

Every year before DEF CON people starts to give advice to attendees to bring "burner devices" to DEF CON. Some people also start to create long lists on how to build burner devices, especially laptops. But the deeper we look into the topic, the more confusing it gets. Why are we doing this? Why are we recommending this? Are we focusing on the right things?

What is a "burner device" used for?

For starters, the whole "burner device" concept is totally misunderstood, even within the ITSEC community. A "burner device" is used for non-attribution. You know, for example, you are a spy and you don't want the country where you live to know that you are communicating with someone else. I believe this is not the situation for most attendees at DEF CON. More info about the meaning of "burner" https://twitter.com/Viss/status/877400669669306369

Burner phone means it has a throwaway SIM card with a throwaway phone, used for one specific operation only. You don't use the "burner device" to log in to your e-mail account or to VPN to your work or home.
But let's forget this word misuse issue for a moment, and focus on the real problem.

The bad advice

The Internet is full of articles focusing on the wrong things, especially when it comes to "burner devices". Like how to build a burner laptop, without explaining why you need it or how to use it.
The problem with this approach is that people end up "burning" (lame wordplay, sorry) significant resources for building a secure "burner device". But people are not educated about how they should use these devices.

The threats

I believe the followings are some real threats which are higher when you travel:
1. The laptop getting lost or stolen.
2. The laptop getting inspected/copied at the border.

These two risks have nothing to do with DEF CON, this is true for every travel.

Some other risks which are usually mentioned when it comes to "burner devices" and DEF CON:
3. Device getting owned via physical access while in a hotel room.
4. Network traffic Man-in-the-middle attacked. Your password displayed on a Wall of Sheep. Or having fun with Shellshock with DHCP. Information leak of NTLM hashes or similar.
5. Pwning the device via some nasty things like WiFi/TCP/Bluetooth/LTE/3G/GSM stack. These are unicorn attacks.

6. Pwning your device by pwning a service on your device. Like leaving your upload.php file in the root folder you use at CTFs and Nginx is set to autostart. The author of this article cannot comment on this incident whether it happened in real life or is just an imaginary example. 

How to mitigate these risks? 

Laptop getting stolen/lost/inspected at the border?
1. Bring a cheap, empty device with you. Or set up a fake OS/fake account to log in if you really need your day-to-day laptop. This dummy account should not decrypt the real files in the real account.

Device getting owned while in a hotel room with physical access

1. Don't bring any device with you.
2. If you bring any, make it tamper-resistant. How to do that depends on your enemy, but you can start by using nail glitter and Full Disk Encryption. Tools like Do Not Disturb help. It also helps if your OS supports suspending DMA devices before the user logs in.
3. If you can't make the device tamper-resistant, use a device that has a good defense against physical attackers, like iOS.
4. Probably you are not that important anyway that anyone will spend time and resources on you. If they do, probably you will only make your life miserable with all the hardening, but still, get pwned.

Network traffic Man-in-the-middle attacked

1. Don't bring any device with you.
2. Use services that are protected against MiTM. Like TLS.
3. Update your OS to the latest and greatest versions. Not everyone at DEF CON has a 0dayz worth of 100K USD, and even the ones who have won't waste it on you. 
4. Use fail-safe VPN. Unfortunately, not many people talk about this or have proper solutions for the most popular operating systems.
5. For specific attacks like Responder, disable LLMNR, NBT-NS, WPAD, and IPv6 and use a non-work account on the machine. If you don't have the privileges to do so on your machine, you probably should not bring this device with you. Or ask your local IT to disable these services and set up a new account for you.

Pwning the device via some nasty thing like WiFi/TCP/Bluetooth/LTE/3G/GSM stack

1. Don't bring any device with you.
2. If you bring any, do not use this device to log in to work, personal email, social media, etc.
3. Don't worry, these things don't happen very often. 

Pwning your device by pwning a service on your device

Just set up a firewall profile where all services are hidden from the outside. You rarely need any service accessible on your device at a hacker conference.

Conclusion

If you are still so afraid to go there, just don't go there. Watch the talks at home. But how is the hotel WiFi at a random place different from a hacker conference? Turns out, it is not much different, so you better spend time and resources on hardening your daily work devices for 365 days, instead of building a "burner device".

You probably need a "burner device" if you are a spy for a foreign government. Or you are the head of a criminal organization. Otherwise, you don't need a burner device. Maybe you need to bring a cheap replacement device.
Related links

$$$ Bug Bounty $$$

What is Bug Bounty ?



A bug bounty program, also called a vulnerability rewards program (VRP), is a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs. Bug bounty programs are often initiated to supplement internal code audits and penetration tests as part of an organization's vulnerability management strategy.




Many software vendors and websites run bug bounty programs, paying out cash rewards to software security researchers and white hat hackers who report software vulnerabilities that have the potential to be exploited. Bug reports must document enough information for for the organization offering the bounty to be able to reproduce the vulnerability. Typically, payment amounts are commensurate with the size of the organization, the difficulty in hacking the system and how much impact on users a bug might have.


Mozilla paid out a $3,000 flat rate bounty for bugs that fit its criteria, while Facebook has given out as much as $20,000 for a single bug report. Google paid Chrome operating system bug reporters a combined $700,000 in 2012 and Microsoft paid UK researcher James Forshaw $100,000 for an attack vulnerability in Windows 8.1.  In 2016, Apple announced rewards that max out at $200,000 for a flaw in the iOS secure boot firmware components and up to $50,000 for execution of arbitrary code with kernel privileges or unauthorized iCloud access.


While the use of ethical hackers to find bugs can be very effective, such programs can also be controversial. To limit potential risk, some organizations are offering closed bug bounty programs that require an invitation. Apple, for example, has limited bug bounty participation to few dozen researchers.

Read more


  1. Hacking Tools
  2. Hacking Tools Pc
  3. Pentest Tools Port Scanner
  4. Termux Hacking Tools 2019
  5. Hacker Hardware Tools
  6. Hacking Tools 2019
  7. Pentest Tools Apk
  8. Hack Tools Pc
  9. Hacker Techniques Tools And Incident Handling
  10. Hacking Tools Kit
  11. Hack Tools For Windows
  12. Pentest Reporting Tools
  13. Hack Rom Tools
  14. How To Make Hacking Tools
  15. Hacking Tools
  16. Hacking Tools Pc
  17. Hacking Apps
  18. Hacker Tools Windows
  19. Github Hacking Tools
  20. Tools Used For Hacking
  21. Pentest Tools Port Scanner
  22. Hacker Tool Kit
  23. Hacker
  24. Growth Hacker Tools
  25. What Are Hacking Tools
  26. How To Hack
  27. Hacker Tools Free Download
  28. Hack Tools For Ubuntu
  29. Pentest Tools For Ubuntu
  30. New Hacker Tools
  31. Hacker Hardware Tools
  32. Hacking Tools 2019
  33. What Are Hacking Tools
  34. How To Hack
  35. Hak5 Tools
  36. Game Hacking
  37. Hacking Tools For Beginners
  38. Pentest Tools Port Scanner
  39. Hacking Tools Usb
  40. Hak5 Tools
  41. Hacker Tools For Windows
  42. Bluetooth Hacking Tools Kali
  43. Pentest Tools For Mac
  44. Hacker Tools Free Download
  45. Hacking Tools For Windows 7
  46. Hacking Tools For Games
  47. Hacker Tools Apk Download
  48. Hacker Tools For Ios
  49. Hacker Techniques Tools And Incident Handling
  50. Pentest Tools Android
  51. Hacker Tools Free Download
  52. Pentest Tools Free
  53. Ethical Hacker Tools
  54. Tools For Hacker
  55. Github Hacking Tools
  56. What Is Hacking Tools
  57. Hacks And Tools
  58. Pentest Tools Github
  59. New Hack Tools
  60. Tools For Hacker
  61. Blackhat Hacker Tools
  62. Hacker Tool Kit
  63. World No 1 Hacker Software
  64. Pentest Tools Subdomain
  65. Hack App
  66. Best Hacking Tools 2020
  67. Hacking Tools And Software
  68. Hacking Tools Software
  69. Pentest Tools Free
  70. Pentest Tools For Android
  71. Hack Rom Tools
  72. Underground Hacker Sites
  73. Physical Pentest Tools
  74. Hack Tools For Ubuntu
  75. Hacking Tools For Beginners
  76. Hacker Tools 2019
  77. Pentest Tools Windows
  78. Pentest Tools Linux
  79. Pentest Tools Open Source
  80. Hacker Tools For Ios
  81. New Hacker Tools
  82. Pentest Tools Online
  83. Hacker Tools Software
  84. Pentest Reporting Tools
  85. Hacking Tools Name
  86. Pentest Tools Framework
  87. Hacking App
  88. Tools Used For Hacking
  89. Hack Tools
  90. Pentest Box Tools Download
  91. Hacker Tools For Ios
  92. Hacker Tool Kit
  93. Pentest Tools Website
  94. Hacking Tools Kit
  95. Hacking Tools For Mac
  96. New Hack Tools
  97. New Hacker Tools
  98. Hacker Tools Free Download
  99. Pentest Tools Windows
  100. Pentest Tools For Ubuntu
  101. Android Hack Tools Github
  102. Pentest Tools For Android
  103. Github Hacking Tools
  104. Hack Tools Pc
  105. Hacking Tools Github
  106. Hacking Tools Windows 10
  107. Pentest Tools For Windows
  108. Best Pentesting Tools 2018
  109. Hacker
  110. Hacker Tools For Mac
  111. Pentest Automation Tools
  112. Hacking Tools For Games
  113. Hacker Tools List
  114. Hacker Tools Mac