viernes, 4 de septiembre de 2020

Dystopia, Totalitarianism, And O5R


God damn, we're living in some fucked-up times!

Sure, there's the pandemic; lockdown house-arrest with accompanied domestic abuse, boredom, depression, and suicide; racial tensions with riots, looting, arson, shootings, vandalism; the proposed de-funding of police... take your pick.

But right now, I want to focus on social justice warriors taking aim at our beloved hobby.  From orcs and drow to disclaimers disavowing legacy products such as Oriental Adventures. Can anyone guess where they'll strike next?

Ironically, a contingent of SJWs are boycotting WotC and D&D because the company isn't woke enough, not far-left enough for the screeching radicals on twitter.

Well, finally some of the old guard are taking notice and putting their foot down.  For instance, This post from the Greyhawk Grognard.  The top illustration of Daenerys Targaryen is apt.  We're in a cultural war and the opposing side won't accept anything less than total submission.

The far-left fascists won't stop there, either.  Eventually, they'll take everything old school away.  If they had their way, the OSR would be nothing but a reminder of the horrible, oppressive, racist, sexist, homophobic, transphobic, colonial, alt-right, no good past that must be annihilated in order to bring a new age of peace and prosperity.

Never mind the Socialist & Communist horrors of mass death, imprisonment, poverty, starvation, and loss of freedom.  After all, you can't make utopia for the very few who truly deserve it without breaking millions of eggs along the way, right?  That's by design, only we're the eggs.

Here is an interesting article from The Hill.  From a Democrat perspective, Judd Gregg will tell you these new progressives want power.  Their ends justify any means - that means darkness, evil, corruption, oppression, and terror for those unfortunate enough to be under their iron fist.  Think I'm exaggerating?  There's a lot of things the "trained Marxists" never told you... but that's a blog post for another day.

What to do about the SJWs coming for our Isle of Dread?  Well, speak up for one thing.  If the silent majority made their voices heard, we'd be out of this mess, instead of sinking deeper into the quicksand of resistance-is-futile totalitarianism.

Cancel culture is real.  This is the open-letter by celebrities.  I've suffered from its affects in both greater and lesser quantities, everything from censoring crybabies telling me they'll never buy my books to being from certain social media platforms.  Nevertheless, I'm thriving.  As Ben Shapiro recently said, the dirty little secret is they can only cancel you if you allow yourself to be cancelled.

I don't care which side the of the political aisle you're on or who you vote for in November.  That's your business.  But I love this hobby/industry/community and don't want to see it destroyed.

As much as I love being a lone wolf, it may be time to organize.  Is some kind of organization to push back against the takeover of our gaming culture warranted?  If so, I see it as 5th wave OSR.  Years ago, I and a few others started using O5R to mean a combination of OSR and 5th edition, but it never really caught on as I'd hoped.  So it goes...

After due consideration, I think it's time to remodel O5R to mean the 5th wave of the OSR - forces openly and actively opposed to disclaimers, sensitivity readers, consent checklists, tradition shaming, attacking the fandom (remember when they called us straight white male terrorists?), shoehorning racist stereotypes into fantasy humanoids, banning or outright burning their own books, and so forth.

The O5R is dead... long live the O5R!

Venger As'Nas Satanis

High Priest of Kort'thalis Publishing


p.s. Only 74 luxurious hardcover Cha'alt books remaining.  Ordering details here!

p.p.s. Ladies and gentlemen, we have a petition.

lunes, 31 de agosto de 2020

Osintgram - A OSINT Tool On Instagram


Osintgram is a OSINT tool on Instagram.

Osintgram offers an interactive shell to perform analysis on Instagram account of any users by its nickname. You can get:
- addrs           Get all registered addressed by target photos
- captions Get user's photos captions
- comments Get total comments of target's posts
- followers Get target followers
- followings Get users followed by target
- hashtags Get hashtags used by target
- info Get target info
- likes Get total likes of target's posts
- mediatype Get user's posts type (photo or video)
- photodes Get description of target's photos
- photos Download user's photos in output folder
- propic Download user's profile picture
- stories Download user's stories
- tagged Get list of users tagged by target
- target Set new target
- wcommented Get a list of user who commented target's photos
You can find detailed commands usage here.
Latest version | CHANGELOG

Installation
  1. Fork/Clone/Download this repo
    git clone https://github.com/Datalux/Osintgram.git
  2. Navigate to the directory
    cd Osintgram
  3. Run pip3 install -r requirements.txt
  4. Create a subdirectory config
    mkdir config
  5. Create in config folder the file: username.conf and write your Instagram account username
  6. Create in config folder the file: pw.conf and write your Instagram account password
  7. Run the main.py script
    python3 main.py <target username>

Updating
Run git pull in Osintgram directory

Contributing
You can propose a feature request opening an issue or a pull request.

External library
Instagram API: https://github.com/ping/instagram_private_api




via KitPloit

More information


domingo, 30 de agosto de 2020

WiFiJammer: Amazing Wi-Fi Tool


The name sounds exciting but really does it jam WiFi networks? Yes, it is able to do the thing which it's name suggests. So today I'm going to show you how to annoy your friend by cutting him/her short of the WiFi service.

Requirements:


  1. A computer/laptop with WiFi capable of monitoring (monitor mode).
  2. A Linux OS (I'm using Arch Linux with BlackArch Repos)
  3. And the most obvious thing wifijammer (If you're having BlackArch then you already have it).


How does it work? You maybe thinking!, it's quite simple it sends the deauth packets from the client to the AP (Access Point) after spoofing its (client's) mac-address which makes AP think that it's the connected client who wants to disconnect and Voila!

Well to jam all WiFi networks in your range its quite easy just type:

sudo wifijammer



but wait a minute this may not be a good idea. You may jam all the networks around you, is it really what you want to do? I don't think so and I guess it's illegal.

We just want to play a prank on our friend isn't it? So we want to attack just his/her AP. To do that just type:

sudo wifijammer -a <<AP-MAC-ADDRESS>>

here -a flag specifies that we want to jam a particular AP and after it we must provide the MAC-ADDRESS of that particular AP that we want to jam.
Now how in the world am I going to know what is the MAC-ADDRESS of my friend's AP without disturbing the other people around me?
It's easy just use the Hackers all time favorite tool airodump-ng. Type in the following commands:

sudo airmon-ng

sudo airodump-ng

airmon-ng will put your device in monitor mode and airodump-ng will list all the wifi networks around you with their BSSID, MAC-ADDRESS, and CHANNELS. Now look for your friend's BSSID and grab his/her MAC-ADDRESS and plug that in the above mentioned command. Wooohooo! now you are jamming just your friend's wifi network.

Maybe that's not what you want, maybe you want to jam all the people on a particular channel well wifijammer can help you even with that just type:

sudo wifijammer -c <<CHANNEL-NUMBER>>

with -c we specify to wifijammer that we only want to deauth clients on a specified channel. Again you can see with airodump-ng who is on which channel.

wifijammer has got many other flags you can check out all flags using this command that you always knew:

sudo wifijammer -h



Hope you enjoyed it, good bye and have fun :)

Related articles


  1. Black Hat Hacker Tools
  2. Hack Tools Online
  3. Hacking Tools For Windows 7
  4. Hacker Tools Free
  5. Hacking Tools For Kali Linux
  6. Ethical Hacker Tools
  7. Hacking Tools Hardware
  8. Hacking Tools Kit
  9. Android Hack Tools Github
  10. Pentest Tools Tcp Port Scanner
  11. Hacking App
  12. Bluetooth Hacking Tools Kali
  13. Best Hacking Tools 2019
  14. Best Hacking Tools 2019
  15. Hack Tools Pc
  16. Hacker Tools 2020
  17. Pentest Tools Alternative
  18. Hak5 Tools
  19. Hacker Tools For Ios
  20. Hacker
  21. Pentest Tools
  22. Hacking Tools For Windows Free Download
  23. Hacker Tools For Pc
  24. Best Pentesting Tools 2018
  25. Hacker Security Tools
  26. Kik Hack Tools
  27. Hacker Tools For Ios
  28. Hacker Tools List
  29. Hacking Tools For Windows Free Download
  30. Blackhat Hacker Tools
  31. Android Hack Tools Github
  32. Hacking Tools For Pc
  33. Bluetooth Hacking Tools Kali
  34. Ethical Hacker Tools
  35. Hacking Tools Windows
  36. Hacking Tools For Windows Free Download
  37. Pentest Tools Review
  38. Hacking Tools For Windows 7
  39. Hacker Tools For Pc
  40. Nsa Hacker Tools
  41. Hacking Tools For Mac
  42. Pentest Tools For Ubuntu
  43. Hack Tools For Pc
  44. Best Pentesting Tools 2018
  45. Pentest Tools Android
  46. Hack Tools For Ubuntu
  47. Easy Hack Tools
  48. Hacking Tools For Pc
  49. World No 1 Hacker Software
  50. Pentest Tools Online
  51. Hackers Toolbox

Top 20 Best Free Hacking Apps For Android |2019|

 20 Best Free hacking apps For Android |2019|. 

Android is now one of the most popular operating systems. So, hackers have also started using Android devices for their tasks. Now Android devices are used for penetration testing and other hacking activities including IT security administrator, Wi-Fi hacking and network monitoring. There are several hacking apps or Android devices. So, we have curated a list of best hacking apps for Android.


Before you start using these apps, you must take a backup of your important data. I also recommend the use of these apps on a separate device. Using this on your primary phone is not recommended. It is because many of these apps require a rooted device and app can also harm your phone.


Note: Hacking apps can be used for educational and malicious purpose. But we never encourage malicious operations. We are listing the apps here just for educational purpose. You should only use these apps to learn. We do not support any unethical use of these apps.

1.  AndroRAT

AndroRAT stands for Android RAT. RAT is the short form of Remote Administrative Tool and it allows an attacker to remotely control and fetch information from a device. AndroRAT does the same thing. It has a server developed in Java/Swing but the Android application has been developed in Java Android.

AndroRAT allows you to connect information like call logs, contacts, messages, location and more. You can remotely monitor sent and received messages send texts, use the camera, open a URL in the browser, make phone calls and remotely monitor the device.

The connection to the server can be triggered by an SMS or a call. From the server GUI, you can check all the connected clients and access information.

As the app allows silent remote access, it is not available on Play Store.

                Download APK

2. zANTI

zANTI is a known penetration testing suite of applications you can install locally on Android smartphone. This tool brings scanning tools Diagnostic features and Reporting tools. You can use this malicious software to attack a network and check for any loopholes in your network. This tool is used to test redirect and SSL stripping attacks. You can edit request and response messages from web servers, the host takes websites from your Android phone and more.


                  Download 

3. FaceNiff

FaceNiff is another good Android hacking that allows you to intercept the traffic of your WiFi network. You can use this tool to snoop what people are doing on the network you are. You can snoop on services like Facebook, Twitter, Amazon, YouTube and more. This is one of the notable too for steal cookies from the WiFi network and gives the attacker unauthorized access to other people's account.

This app requires a rooted device. So, you can only use the app if you have a rooted phone.

Download APK

4. Droidsheep

Droidsheep is also a similar app that helps security analysts understand what is happening in your Wi-Fi network. Like Face Sniff, this app can also hijack the web session profiles over a network and supports most of the services and websites.

The primary difference between Droidsheep and FaceSniff is that Droidsheep works with almost all the websites while FaceSniff has limited support.

                     Download APK

5. Hackode

Hackode is another good hacking apps for Android. It is not a single app but a collection of tools for ethical hackers and penetration testers. The app comes with three modules including Reconnaissance, Scanning and Security Feed. You can use this app for SQL Injection, Google hacking, MySQL Server, Whois, Scanning, DNS Dif, DNS lookup, IP, MX Records, Security RSS Feed, Exploits etc.

The app is still in beta, but available in Play Store.

                  Download Here

6. cSploit

cSploit is also a good security tool for Android. It comes with several options like cracking Wi-Fi password, installing backdoors, finding vulnerabilities and their exploits. If you are looking for a good hacking app or hacker app for Android, you should try this one for sure.

                  Download APK

7. DroidBox

DroidBox is also a similar kind of app that allows you to do the dynamic analysis of Android applications. You can use this app to get information like hashes of APK package, network traffic, SMS & phone calls, Incoming/outgoing network data, Listing broadcast receivers and more.

                    Download

8. Nmap

If you are into security or hacking, I am sure you already know the name of this too. Like the desktop tool, Nmap for Android also allows you to scan

It works on both on non-rooted and rooted phones. If you are a beginner, you should try this app and learn from it.

                      Download

9. SSHDroid

SSHDroid is SSH tool developed for Android. It lets you connect to a remote computer and run terminal commands, transfer and edit files. The app also provided features like shared-key authentication, WiFi autostart whitelist, extended notification control etc,

This app is available on Play Store.

                    Download

10. Kali Linux NetHunter

Kali Linux NetHunter is an open source penetration testing platform for Android. It officially supports Nexus and OnePlus devices. It provides the ultimate penetration testing platform that allows you to perform a wide range of attacks.

                     Download

11. APKInspector

APKInspector allows you to perform reverse engineering on an APK. you can use this to get a deep insight or APK and get the source code of any Android app. You can do modifications in the APK and visualize the DEX code to erase the credits and license.

                 Download APK

12. Shark for Root

Shark for Root is an advanced hacking tool for security experts and hackers. It can work as a traffic snipper. You can use the tcpdump command on rooted devices. It works on Wi-Fi, 3G, and FroYo tethered mode.

                    Download

13. dSploit

dSploit is an Android network penetrating testing suit. You can download and install it on your device to perform network security testing. It supports all Android devices running on Android 2.3 Gingerbread or higher. You need to root this phone for using the app. After rooting the phone, you need to download BusyBox from Google Play Store

The app comes with several modules including Port Scanner, Inspector, RouterPWN, Trace, Login Cracker, Packet Forger, Vulnerability Finder, and MITM.

                      Download

14. WPScan

WPScan is a WordPress vulnerability scanner for Android. This app is used to scan WordPress based websites and find possible vulnerabilities. WPScan is a popular desktop tool but this WPScan for Android is not related to that. So, do not think of it as an official WPScan app.

                      Download

15. Network Mapper

Network Mapper is a network scanner tool for network admins. It used to scan the network, lists all devices connected and find Open ports of various servers like FTP servers, SSH servers, SMB servers etc on the network. The tool is available on Play Store.

                     Download

16. Andosid

Andosid is like LOIC for the desktop. This tool is used to perform DOS attacks from Android mobile phones. You can use this tool to set a target URL and perform a DOS attack in one click. The tool will start flooding target URL with fake requests.

                     Download

17. DroidSQLi

DroidSQLi app allows attackers to perform SQL Injection on a target URL. You just need to find a target URL and this tool will start the fully automated SQL Injection attack.

                     Download

18. AppUse

AppUse is a Virtual Machine developed by AppSec Labs. It is a freely available mobile application security testing platform that comes with lots of custom made tools by AppSec Labs. If you want to sue your Android phone as your penetration testing tool, this one is for you.

                   Download

19. Network Spoofer

Network Spoofer is also a good hacking app for android. It lets you change the website on other people's computer from your Android phone. Connect to a WiFI network and then choose a spoof to use with the app. this tool is to demonstrate how vulnerable a network is. Do not try this on any unauthorized networks.

                 Download

20. DroidSheep Guard

As the name suggests, DroidSheep Guard works against DroidSheep. It monitors Android devices' ARP-table and tries to detect ARP-Spoofing attack on your network. It does not require a rooted device.

               Download


@EVERYTHING NT


Continue reading


NcN 2015 CTF - theAnswer Writeup


1. Overview

Is an elf32 static and stripped binary, but the good news is that it was compiled with gcc and it will not have shitty runtimes and libs to fingerprint, just the libc ... and libprhrhead
This binary is writed by Ricardo J Rodrigez

When it's executed, it seems that is computing the flag:


But this process never ends .... let's see what strace say:


There is a thread deadlock, maybe the start point can be looking in IDA the xrefs of 0x403a85
Maybe we can think about an encrypted flag that is not decrypting because of the lock.

This can be solved in two ways:

  • static: understanding the cryptosystem and programming our own decryptor
  • dynamic: fixing the the binary and running it (hard: antidebug, futex, rands ...)


At first sight I thought that dynamic approach were quicker, but it turned more complex than the static approach.


2. Static approach

Crawling the xrefs to the futex, it is possible to locate the main:



With libc/libpthread function fingerprinting or a bit of manual work, we have the symbols, here is the main, where 255 threads are created and joined, when the threads end, the xor key is calculated and it calls the print_flag:



The code of the thread is passed to the libc_pthread_create, IDA recognize this area as data but can be selected as code and function.

This is the thread code decompiled, where we can observe two infinite loops for ptrace detection and preload (although is static) this antidebug/antihook are easy to detect at this point.


we have to observe the important thing, is the key random?? well, with the same seed the random sequence will be the same, then the key is "hidden" in the predictability of the random.

If the threads are not executed on the creation order, the key will be wrong because is xored with the th_id which is the identify of current thread.

The print_key function, do the xor between the key and the flag_cyphertext byte by byte.


And here we have the seed and the first bytes of the cypher-text:



With radare we can convert this to a c variable quickly:


And here is the flag cyphertext:


And with some radare magics, we have the c initialized array:


radare, is full featured :)

With a bit of rand() calibration here is the solution ...



The code:
https://github.com/NocONName/CTF_NcN2k15/blob/master/theAnswer/solution.c





3. The Dynamic Approach

First we have to patch the anti-debugs, on beginning of the thread there is two evident anti-debugs (well anti preload hook and anti ptrace debugging) the infinite loop also makes the anti-debug more evident:



There are also a third anti-debug, a bit more silent, if detects a debugger trough the first available descriptor, and here comes the fucking part, don't crash the execution, the execution continues but the seed is modified a bit, then the decryption key will not be ok.





Ok, the seed is incremented by one, this could be a normal program feature, but this is only triggered if the fileno(open("/","r")) > 3 this is a well known anti-debug, that also can be seen from a traced execution.

Ok, just one byte patch,  seed+=1  to  seed+=0,   (add eax, 1   to add eax, 0)

before:


after:



To patch the two infinite loops, just nop the two bytes of each jmp $-0



Ok, but repairing this binary is harder than building a decryptor, we need to fix more things:

  •  The sleep(randInt(1,3)) of the beginning of the thread to execute the threads in the correct order
  •  Modify the pthread_cond_wait to avoid the futex()
  • We also need to calibrate de rand() to get the key (just patch the sleep and add other rand() before the pthread_create loop
Adding the extra rand() can be done with a patch because from gdb is not possible to make a call rand() in this binary.

With this modifications, the binary will print the key by itself. 

More articles


  1. Pentest Tools Open Source
  2. Hacks And Tools
  3. Install Pentest Tools Ubuntu
  4. Usb Pentest Tools
  5. Hacking Tools Mac
  6. Pentest Tools Windows
  7. Hack Tools For Windows
  8. Pentest Tools List
  9. Hacking Tools For Windows 7
  10. Pentest Tools Website
  11. Hacker Tools For Mac
  12. Best Hacking Tools 2019
  13. Hacking Tools For Mac
  14. Hack Tools 2019
  15. Bluetooth Hacking Tools Kali
  16. Hacking Tools Mac
  17. Hacker Tools Free Download
  18. Hacking Tools Windows
  19. Hacking Tools Software
  20. How To Hack
  21. Hacking Tools Github
  22. Pentest Tools For Mac
  23. New Hack Tools
  24. Hack Tools Download
  25. Hacker Tools Apk
  26. Hack Tools
  27. Hackrf Tools
  28. Hacking Apps
  29. Pentest Tools Online
  30. Hacking Tools Hardware
  31. Best Pentesting Tools 2018
  32. Physical Pentest Tools
  33. Pentest Tools
  34. Pentest Tools Website Vulnerability
  35. Blackhat Hacker Tools
  36. Hack Tools 2019
  37. Pentest Tools Tcp Port Scanner
  38. Hacking Tools For Beginners
  39. Underground Hacker Sites
  40. Pentest Reporting Tools
  41. Tools Used For Hacking
  42. Underground Hacker Sites
  43. Hacker Tools For Windows
  44. Pentest Tools For Ubuntu
  45. Bluetooth Hacking Tools Kali
  46. Hacking Tools Online
  47. Hack Tools Mac
  48. Hacker Tools For Windows
  49. Hacking Tools Software
  50. Hacking Apps
  51. Pentest Tools For Android
  52. Pentest Tools Port Scanner
  53. Hacking Tools For Windows
  54. Hacking Tools 2020
  55. Hacker Security Tools
  56. Pentest Tools Review
  57. Pentest Tools Find Subdomains
  58. Hacking Tools Usb
  59. New Hack Tools
  60. Black Hat Hacker Tools
  61. Hacker Tools For Pc
  62. Pentest Tools Review
  63. Wifi Hacker Tools For Windows
  64. Hacker Tools For Windows
  65. Pentest Tools For Windows
  66. Top Pentest Tools
  67. Hack Tools Pc
  68. Pentest Tools Alternative
  69. Hacks And Tools
  70. Tools Used For Hacking
  71. Game Hacking
  72. Hacker Tools Mac
  73. Pentest Tools For Windows
  74. Pentest Tools For Mac
  75. Hackrf Tools
  76. Hack Tools
  77. Hackrf Tools
  78. Hack Tools For Mac
  79. Hacker Tools Windows
  80. Underground Hacker Sites
  81. Pentest Tools Port Scanner
  82. Hack App
  83. Hack Tools
  84. Hack Rom Tools
  85. Best Hacking Tools 2019
  86. Hacker Tool Kit
  87. Hacker Tools Linux
  88. Hacking Tools For Beginners
  89. Bluetooth Hacking Tools Kali
  90. Hacking Tools And Software
  91. Hacker Security Tools
  92. Hack Tools Online
  93. Hacker Techniques Tools And Incident Handling
  94. Github Hacking Tools
  95. Hack Tools
  96. Hacking Tools Windows 10
  97. Hacker Tools Apk Download
  98. Hacker Security Tools
  99. Hacker Tools For Ios
  100. Hacking Tools For Mac
  101. Hacker Tools Free
  102. Pentest Tools Subdomain
  103. Wifi Hacker Tools For Windows
  104. Hacking Tools For Mac
  105. Hack Tools Mac
  106. Hacking Tools
  107. Pentest Tools Website Vulnerability
  108. Bluetooth Hacking Tools Kali