tag:blogger.com,1999:blog-83172222311336605472024-03-18T23:44:42.840-03:00KitPloit - PenTest & Hacking ToolsKitPloit - leading source of Security Tools, Hacking Tools, CyberSecurity and Network Security ☣Unknownnoreply@blogger.comBlogger14125tag:blogger.com,1999:blog-8317222231133660547.post-48281152327846885642021-07-16T08:30:00.004-04:002021-07-16T08:30:00.299-04:00Exploit_Mitigations - Knowledge Base Of Exploit Mitigations Available Across Numerous Operating Systems, Architectures And Applications And Versions<p>The goal is to list <a href="https://www.kitploit.com/search/label/Exploitation" target="_blank" title="exploitation">exploitation</a> mitigations added over time in various operating systems, software, libraries or hardware. It becomes handy to know if a given <a href="https://www.kitploit.com/search/label/Vulnerability" target="_blank" title="vulnerability">vulnerability</a> is easily exploitable or not depending on exploitation mitigations in place.</p> <p>An example is the following:</p> <p style="text-align: center;"><a href="https://github.com/nccgroup/exploit_mitigations/blob/master/img/example.png" rel="nofollow" target="_blank" title="Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions. (3)"></a><a href="http://3.bp.blogspot.com/-ooYBRdiYPFA/YOZh0RoZbNI/AAAAAAAAiEI/w3vi0ASy65AI2QkKmiYiE8yQZc1Uly-LwCK4BGAYYCw/s1600/exploit_mitigations_1_example-749208.png"><img alt="" border="0" height="180" id="BLOGGER_PHOTO_ID_6982375822998465746" src="http://3.bp.blogspot.com/-ooYBRdiYPFA/YOZh0RoZbNI/AAAAAAAAiEI/w3vi0ASy65AI2QkKmiYiE8yQZc1Uly-LwCK4BGAYYCw/w640-h180/exploit_mitigations_1_example-749208.png" width="640" /></a></p> <div><br /></div><span><a name='more'></a></span><div><br /></div><div><span style="font-size: large;"><b>Supported targets</b></span><br /> <p>We currently support the following operating systems:</p> <ul> <li><a href="https://github.com/nccgroup/exploit_mitigations/blob/master/windows_mitigations.md" rel="nofollow" target="_blank" title="Microsoft Windows">Microsoft Windows</a></li> <li><a href="https://github.com/nccgroup/exploit_mitigations/blob/master/linux_mitigations.md" rel="nofollow" target="_blank" title="Linux">Linux</a></li> <li><a href="https://github.com/nccgroup/exploit_mitigations/blob/master/android_mitigations.md" rel="nofollow" target="_blank" title="Google Android">Google Android</a></li> <li><a href="https://github.com/nccgroup/exploit_mitigations/blob/master/iphone_mitigations.md" rel="nofollow" target="_blank" title="Apple iPhone OS (iOS)">Apple iPhone OS (iOS)</a></li> <li><a href="https://github.com/nccgroup/exploit_mitigations/blob/master/openbsd_mitigations.md" rel="nofollow" target="_blank" title="OpenBSD">OpenBSD</a></li> <li><a href="https://github.com/nccgroup/exploit_mitigations/blob/master/freebsd_mitigations.md" rel="nofollow" target="_blank" title="FreeBSD">FreeBSD</a></li> </ul> <p>and the following software:</p> <ul> <li><a href="https://github.com/nccgroup/exploit_mitigations/blob/master/firefox_mitigations.md" rel="nofollow" target="_blank" title="Mozilla Firefox">Mozilla Firefox</a></li> <li><a href="https://github.com/nccgroup/exploit_mitigations/blob/master/edge_mitigations.md" rel="nofollow" target="_blank" title="Microsoft Edge">Microsoft Edge</a></li> <li><a href="https://github.com/nccgroup/exploit_mitigations/blob/master/chrome_mitigations.md" rel="nofollow" target="_blank" title="Google Chrome">Google Chrome</a></li> <li><a href="https://github.com/nccgroup/exploit_mitigations/blob/master/office_mitigations.md" rel="nofollow" target="_blank" title="Microsoft Office">Microsoft Office</a></li> </ul> <p>and the following libraries:</p> <ul> <li><a href="https://github.com/nccgroup/exploit_mitigations/blob/master/glibc_mitigations.md" rel="nofollow" target="_blank" title="glibc">glibc</a></li> </ul> <p>and the following hardware:</p> <ul> <li><a href="https://github.com/nccgroup/exploit_mitigations/blob/master/arm_mitigations.md" rel="nofollow" target="_blank" title="ARM">ARM</a></li> </ul> <br /><span style="font-size: large;"><b>Motivations</b></span><br /> <p>It has become challenging to follow when certain mitigations are added in an update and/or backported to some older versions of various software and hardware.</p> <p>Sometimes, online content becomes deprecated due to mitigation changes and it can be hard to keep up. Also, it is easy to forget after a short time if you don't work on a specific software/hardware.</p> <p>We have been filling this gap by tracking all the mitigations in summary tables that hold the mitigations names and linking to online references to get technical information about them.</p> <p>The shared information has demonstrated to be useful for several years to exploit developers.</p> <br /><span style="font-size: large;"><b>Does my current environment have mitigation X?</b></span><br /> <p>This is a common question any exploit developer may have when trying to develop an exploit for a given target.</p> <p>E.g. let's say you want to exploit a Windows kernel driver on Windows 7 x64 containing a kernel NULL pointer dereference bug. Is it exploitable?</p> <p>Checking our table, we read the "NULL page mitigation" was introduced in "Windows 8 32-bit/64-bit and backported to Vista+ 64-bit". Now we know it depends if our target Windows 7 x64 is <a href="https://www.kitploit.com/search/label/Up-to-date" target="_blank" title="up-to-date">up-to-date</a> or not, more precisely, we can focus on figuring out which KB introduces this mitigation and check our target against that KB!</p> <br /><span style="font-size: large;"><b>Final words</b></span><br /> <p>We do accept pull requests so feel free to do so :)</p> <p>We do have other targets in our private <a href="https://www.kitploit.com/search/label/Pipeline" target="_blank" title="pipeline">pipeline</a> too so reach out if you are interested in another particular one :)</p> <br /><br /><div style="text-align: center;"><b><span style="font-size: x-large;"><a class="kiploit-download" href="https://github.com/nccgroup/exploit_mitigations" rel="nofollow" target="_blank" title="Download Exploit_Mitigations">Download Exploit_Mitigations</a></span></b></div></div>Unknownnoreply@blogger.comtag:blogger.com,1999:blog-8317222231133660547.post-69750470062041195912020-10-14T08:30:00.008-03:002020-10-14T08:30:09.172-03:00MEDUZA - A More Or Less Universal SSL Unpinning Tool For iOS<div class="separator" style="clear: both; text-align: center;"><a href="https://1.bp.blogspot.com/-TLGeEX7NEgg/X4Uqjd5FibI/AAAAAAAAUBQ/3VnK57T0_FkuF2kfY4D5LgU0xRTs6O6kgCNcBGAsYHQ/s2048/MEDUZA_2_mitmpoxy.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1129" data-original-width="2048" height="352" src="https://1.bp.blogspot.com/-TLGeEX7NEgg/X4Uqjd5FibI/AAAAAAAAUBQ/3VnK57T0_FkuF2kfY4D5LgU0xRTs6O6kgCNcBGAsYHQ/w640-h352/MEDUZA_2_mitmpoxy.png" width="640" /></a></div><br /><div class="separator" style="clear: both; text-align: center;"><a href="https://1.bp.blogspot.com/-4pJveBV4Bx0/X4UqjKvVb_I/AAAAAAAAUBM/pBQfw5ozuso6EPwy7z08aUaZEkP0d6lyACNcBGAsYHQ/s2510/MEDUZA_1_frida-script.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1108" data-original-width="2510" height="282" src="https://1.bp.blogspot.com/-4pJveBV4Bx0/X4UqjKvVb_I/AAAAAAAAUBM/pBQfw5ozuso6EPwy7z08aUaZEkP0d6lyACNcBGAsYHQ/w640-h282/MEDUZA_1_frida-script.png" width="640" /></a></div><p><br /></p><p>"MEDUZA" ("медуза") means "jellyfish" in Ukrainian</p> <br /><span style="font-size: large;"><b>What is MEDUZA?</b></span><br /> <p>It's a <a href="https://frida.re/" rel="nofollow" target="_blank" title="Frida">Frida</a>-based tool, my replacement for <a href="https://github.com/nabla-c0d3/ssl-kill-switch2" rel="nofollow" target="_blank" title="SSLKillSwitch">SSLKillSwitch</a>. I created it for in-house use, but then decided to opensource it. TBH, I hate open source, but the world is full of compromises... :(</p><span><a name='more'></a></span><div><br /></div><span style="font-size: large;"><b>How does it work?</b></span><br /> <p>It's simple. First time, you run an app without <a href="https://www.kitploit.com/search/label/Sniffing" target="_blank" title="sniffing">sniffing</a> and use it as usual. MEDUZA is sitting quietly and collecting <a href="https://www.kitploit.com/search/label/Certificates" target="_blank" title="certificates">certificates</a> used by the app to connect servers. Then MEDUZA generates a Frida script that fakes (==upnin) the collected certificates. So you run the app for second time, use the generated script, and catch the traffic with mitmproxy.</p> <br /><span style="font-size: large;"><b>Limitations</b></span><br /> <p>MEDUZA can only unpin apps using iOS system SSL libs. Some apps (e.g. Instagram) do not use the system SSL libs, they implement some third-party custom SSL stack (for example, <a href="https://www.kitploit.com/search/label/Instagram" target="_blank" title="Instagram">Instagram</a> uses OpenSSL statically linked to an Instagram private frameworks, see <a href="https://github.com/kov4l3nko/InstagramSSLPinningBypass-iOS" rel="nofollow" target="_blank" title="InstagramSSLPinningBypass-iOS">InstagramSSLPinningBypass-iOS</a> for details).</p> <p>Also, MEDUZA is based on Frida, so it does not work on apps with anti-Frida protection.</p> <br /><span style="font-size: large;"><b>Can I use MEDUZA alongside with other SSL bypass tools, e.g. SSLKillSwitch?</b></span><br /> <p>I didn't test it, but MEDUZA employs a different approach than SSLKillSwitch and similar tools, so, theoretically, they should work together without problems. Again, I didn't test it, so I'm not 100% sure.</p> <br /><span style="font-size: large;"><b>Requirements</b></span><br /> <ul> <li> <p>A Mac with MacOS Mojave or later (maybe MEDUZA works on Windows and Linux as well, but it was not tested)</p> </li> <li> <p>A jailbroken iOS device (MEDUZA was tested on iPhone SE 2016 with iOS 13.3 and iPhone 6s with iOS 14.0, both are jailbroken with <a href="https://checkra.in/" rel="nofollow" target="_blank" title="checkra1n">checkra1n</a>; theoretically, MEDUZA should work with other devices as well, but it was not tested)</p> </li> <li> <p>The latest <a href="https://frida.re/" rel="nofollow" target="_blank" title="Frida">Frida</a> installed on the Mac and the iOS device.</p> </li> <li> <p><a href="https://mitmproxy.org/" rel="nofollow" target="_blank" title="Mitmproxy">Mitmproxy</a> installed on the Mac (MEDUZA was not tested with other sniffers like <a href="https://www.kitploit.com/search/label/Charles" target="_blank" title="Charles">Charles</a> proxy, I'm not sure it will work)</p> </li> <li> <p>The Mac and iOS device should be connected with a USB data cable and connected to the same WiFi network.</p> </li> <li> <p>Python 3 with <a href="https://pypi.org/project/cryptography/" rel="nofollow" target="_blank" title="cryptography">cryptography</a> on the Mac (just <code>pip install cryptography</code>)</p> </li> </ul> <br /><span style="font-size: large;"><b>How to sniff HTTP(s) traffic?</b></span><br /> <p>There are two general steps. You need the first step to catch all certificates pinned by an app and generate a script to fake (==unpin) them. You should do it just once at the very beginning, then you can just use the generated script to sniff the traffic. The instruction for the first step:</p> <ol> <li> <p>Open Terminal on your Mac and run MEDUZA to list the installed/running apps on your iOS device:</p> <pre><code>$ python3 meduza.py -l<br /></code></pre> <p>The output should look like</p> <pre><code>MEDUZA iOS SSL unpinning tool<br />by Dima Kovalenko (@kov4l3nko)<br />============================================================<br /><br />[*] Waiting for an iOS device connected to USB...<br />[*] A list of installed applications:<br /> + Uber (com.ubercab.UberClient) is running, pid=40663<br /> - Home (com.apple.Home)<br /> - Files (com.apple.DocumentsApp)<br /> - Podcasts (com.apple.podcasts)<br /> - Contacts (com.apple.MobileAddressBook)<br /> - Music (com.apple.Music)<br /> - Photos (com.apple.mobileslideshow)<br /> - TV (com.apple.tv)<br /> + App Store (com.apple.AppStore) is running, pid=40627<br /> - Clock (com.apple.mobiletimer)<br /> + Settings (com.apple.Preferences) is running, pid=40619<br /> - TikTok (com.zhiliaoapp.musically)<br /> - Watch (com.apple.Bridge)<br /> - FaceTime (com.apple.facetime)<br /> - Maps (com.apple.Maps)<br /> - Voice Memos (com.apple.VoiceMemos)<br /> <...etc, you'll see remaining apps here...><br /></code></pre> </li> <li> <p><strong>Important!</strong> Make sure your iOS device WiFi settings are "clear", e.g. no proxy and/or custom router IP specified. On the first step, we <strong>do not try to sniff the traffic</strong>, so the WiFi network connection should be "as usual".</p> </li> <li> <p>Choose the app, e.g. Uber. Run MEDUZA as follows</p> <pre><code>$ python3 meduza.py -s <app name of id> <path/to/the/frida/script.js><br /></code></pre> <p>e.g. for Uber</p> <pre><code>$ python3 meduza.py -s com.ubercab.UberClient ./unpinUber.js<br /></code></pre> <p>Here <code>-s</code> means that Uber will be (re-)spawned. If you wanna connect to an already running app and do not re-spawn it, use <code>-a</code> instead of <code>-s</code>.</p> <p>As result, you should see something like</p> <pre><code>MEDUZA iOS SSL unpinning tool<br />by Dima Kovalenko (@kov4l3nko)<br />============================================================<br /><br />[*] Waiting for an iOS device connected to USB...<br />[*] Spawning com.ubercab.UberClient...<br />[*] Attaching to com.ubercab.UberClient...<br />[*] Reading JS payload meduza.js...<br />[*] Injecting JS payload to the process...<br />[*] SecCertificateCreateWithBytes(...) hooked!<br />[*] Resuming the application...<br />[*] Press ENTER to complete (you can do it anytime)...<br />[*] Got another certificate, its raw SHA256 hash: 99b05557bafde776f0afc15bbf6733585b8a03606cbf757158fb96324e01310a<br /> crashlytics.com<br /> reports.crashlytics.com<br /> firebase-settings.crashlytics.com<br /> apps-ios.crashlytics.com<br /> android-sdk.crashlytics.com<br /> api.crashlytics.com<br /> settings-api.crashlytics.com<br /> download.crashlytics.com<br /> distribution-uploads.crashlytics.com<br /> cm-us-east-1.crashlytics.com<br /> www.crashlytics.com<br /> try.crash lytics.com<br /> kits.crashlytics.com<br /> cm.crashlytics.com<br /> apps.crashlytics.com<br /> cm-ap-southeast.crashlytics.com<br /> settings.crashlytics.com<br /> e.crashlytics.com<br />[*] Got another certificate, its raw SHA256 hash: 954a9f7dd9f03784bdc5ca9183484a5bfc278ca9ba9f42b3a82f96cffddf277b<br />[*] Got another certificate, its raw SHA256 hash: 649a4665273e60b353fe9b4db1807d9669f82cb0ee85bd1e562e7c2f33fdec3a<br /> *.cfe.uber.com<br /> cfe.uber.com<br /> cn-dca1.cfe.uber.com<br />[*] Got another certificate, its raw SHA256 hash: eae72eb454bf6c3977ebd289e970b2f5282949190093d0d26f98d0f0d6a9cf17<br /><...etc, you can see many messages about certificates, it's ok...><br /></code></pre> </li> <li> <p>Do something typical in the app: login, tap some buttons, logoff... e.g. act like an ordinary dumb user :) Every time the app uses a (pinned or not pinned) certificate to connect a server, MEDUZA catches and remembers the certificate.</p> </li> <li> <p>As soon as you complete your monkey-tapping, press <code>ENTER</code> in the Terminal. MEDUZA will generate a script (e.g. <code>./unpinUber.js</code> in the example above).</p> </li> </ol> <p>The first step is completed. The second step is to use the script:</p> <ol> <li> <p>Run <code>ifconfig | grep "inet "</code> in your Mac Terminal to see your Mac's IP address.</p> </li> <li> <p>Run Mitmproxy on your Mac</p> </li> <li> <p>On your iOS device, set the Mac's IP and mitmproxy port (<code>8080</code> by default) as a proxy for the WiFi connection.</p> </li> <li> <p>Run the generated script with the app. E.g. to (re-)spawn and unpin Uber app, run in Mac Terminal</p> <pre><code>$ frida -U -f com.ubercab.UberClient --no-pause -l ./unpinUber.js<br /></code></pre> <p>See Frida documentation for other options (e.g. to connect already running application).</p> </li> </ol> <br /><span style="font-size: large;"><b>How to protect an app from MEDUZA?</b></span><br /> <p>There are many ways to do it, e.g.</p> <ol> <li> <p>Instagram uses a statically-linked fork of OpenSSL instead of iOS system libs to implement SSL stack. That is why MEDUZA doesn't work on Instagram.</p> </li> <li> <p>You can add some anti-Frida <a href="https://www.kitploit.com/search/label/Protection" target="_blank" title="protection">protection</a> to your app. MEDUZA is based on Frida: if Frida fails, MEDUZA fails as well.</p> </li> </ol> <br /><span style="font-size: large;"><b>MEDUZA doesn't work, what to do?</b></span><br /> <p>Try to fix it yourself or create an issue. However, I take a look at this GitHub account from time to time ( ==once a year) and support MEDUZA in my spare time ( ==never), so I can't guarantee any support. Welcome to the opensource world ;(</p> <br /><br /><div style="text-align: center;"><b><span style="font-size: x-large;"><a class="kiploit-download" href="https://github.com/kov4l3nko/MEDUZA" rel="nofollow" target="_blank" title="Download MEDUZA">Download MEDUZA</a></span></b></div>Unknownnoreply@blogger.comtag:blogger.com,1999:blog-8317222231133660547.post-61965841183671583272020-10-06T17:30:00.010-03:002020-10-06T17:30:07.022-03:00Lockphish - The First Tool For Phishing Attacks On The Lock Screen, Designed To Grab Windows Credentials, Android PIN And iPhone Passcode<div class="separator" style="clear: both; text-align: center;"><a href="https://1.bp.blogspot.com/-xNpxn8ZiSdc/X3qiUM6gcCI/AAAAAAAAT-c/jGKVZAQpDF07-oGlgghkGOfJrRLJzPuPgCNcBGAsYHQ/s645/Lockphish.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="394" data-original-width="645" src="https://1.bp.blogspot.com/-xNpxn8ZiSdc/X3qiUM6gcCI/AAAAAAAAT-c/jGKVZAQpDF07-oGlgghkGOfJrRLJzPuPgCNcBGAsYHQ/s16000/Lockphish.png" /></a></div><p><br /></p> <p>Lockphish it's the first tool (07/04/2020) for <a href="https://www.kitploit.com/search/label/Phishing%20Attacks" target="_blank" title="phishing attacks">phishing attacks</a> on the lock screen, designed to grab Windows credentials, <a href="https://www.kitploit.com/search/label/Android" target="_blank" title="Android">Android</a> PIN and iPhone <a href="https://www.kitploit.com/search/label/Passcode" target="_blank" title="Passcode">Passcode</a> using a https link.</p><span><a name='more'></a></span><p><br /></p><span><b>LockPhish Tutorial: <a href="https://www.kalilinux.in/2020/05/lockphish.html" rel="nofollow" target="_blank" title="https://www.kalilinux.in/2020/05/lockphish.html">https://www.kalilinux.in/2020/05/lockphish.html</a></b></span><br /><span><b>Author: The Linux Choice (Who deleted his GitHub repository)</b></span><br /><span><b>Twitter: <a href="https://twitter.com/linux_choice" rel="nofollow" target="_blank" title="https://twitter.com/linux_choice">https://twitter.com/linux_choice</a></b></span><br /> <br /><b><span style="font-size: large;">Features:</span></b><br /><ul style="text-align: left;"><li>Lockscreen <a href="https://www.kitploit.com/search/label/Phishing" target="_blank" title="phishing">phishing</a> page for Windows, Android and iPhone</li><li>Auto detect device</li><li>Port Forwarding by Ngrok</li><li>IP Tracker</li></ul> <br /><span style="font-size: large;"><b>Legal disclaimer:</b></span><br /> <p>Usage of <a href="https://www.kitploit.com/search/label/Lockphish" target="_blank" title="Lockphish">Lockphish</a> for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program.</p> <br /><b>Usage:</b><br /> <pre><code>git clone https://github.com/kali-linux-tutorial/lockphish<br />cd lockphish<br />bash lockphish.sh<br /></code></pre> <br /><span style="font-size: large;"><b>Conclusion</b></span><br /> <p>This is a great phishing tool which you use in your android system al well as pc. Just install <strong>Termux</strong> and follow the usage command.</p> <br /><br /><div style="text-align: center;"><b><span style="font-size: x-large;"><a class="kiploit-download" href="https://github.com/jaykali/lockphish" rel="nofollow" target="_blank" title="Download Lockphish">Download Lockphish</a></span></b></div>Unknownnoreply@blogger.comtag:blogger.com,1999:blog-8317222231133660547.post-83737015186208088782020-05-14T17:30:00.000-04:002020-05-14T17:30:05.471-04:00Lockphish - A Tool For Phishing Attacks On The Lock Screen, Designed To Grab Windows Credentials, Android PIN And iPhone Passcode<div class="separator" style="clear: both; text-align: center;">
<a href="https://1.bp.blogspot.com/-xx6EPhIPljM/XrnwplUEOlI/AAAAAAAASgI/MnJBh3b2mdYx1fiYjfmctdnnU_t2riZuQCNcBGAsYHQ/s1600/lockphish_1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="591" data-original-width="721" height="524" src="https://1.bp.blogspot.com/-xx6EPhIPljM/XrnwplUEOlI/AAAAAAAASgI/MnJBh3b2mdYx1fiYjfmctdnnU_t2riZuQCNcBGAsYHQ/s640/lockphish_1.png" width="640" /></a></div>
<br />
Lockphish it's the first tool (05/13/2020) for <a href="https://www.kitploit.com/search/label/Phishing%20Attacks" target="_blank" title="phishing attacks">phishing attacks</a> on the lock screen, designed to grab <a href="https://www.kitploit.com/search/label/Windows" target="_blank" title="Windows">Windows</a> credentials, <a href="https://www.kitploit.com/search/label/Android" target="_blank" title="Android">Android</a> PIN and iPhone <a href="https://www.kitploit.com/search/label/Passcode" target="_blank" title="Passcode">Passcode</a> using a https link.<br />
<br />
<b>Features:</b><br />
<br />
<ul>
<li>Lockscreen <a href="https://www.kitploit.com/search/label/Phishing" target="_blank" title="phishing">phishing</a> page for Windows, Android and iPhone</li>
<li>Auto detect device</li>
<li>Port Forwarding by Ngrok</li>
<li>IP Tracker</li>
</ul>
<a name='more'></a><br />
<span style="font-size: large;"><b>Legal disclaimer:</b></span><br />
Usage of Lockphish for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program.<br />
<br />
<b>Usage:</b><br />
<pre><code>git clone https://github.com/thelinuxchoice/lockphish
cd lockphish
bash lockphish.sh</code></pre>
<br />
<span style="font-size: medium;"><b>Author: <a href="https://github.com/thelinuxchoice/lockphish" rel="nofollow" target="_blank" title="https://github.com/thelinuxchoice/lockphish">https://github.com/thelinuxchoice/lockphish</a></b></span><br />
<span style="font-size: medium;"><b>Twitter: <a href="https://twitter.com/linux_choice" rel="nofollow" target="_blank" title="https://twitter.com/linux_choice">https://twitter.com/linux_choice</a></b></span><br />
<br />
<br />
<div style="text-align: center;">
<b><span style="font-size: x-large;"><a class="kiploit-download" href="https://github.com/thelinuxchoice/lockphish" rel="nofollow" target="_blank" title="Download Lockphish">Download Lockphish</a></span></b></div>
Unknownnoreply@blogger.comtag:blogger.com,1999:blog-8317222231133660547.post-59339378530383258632018-09-28T18:46:00.002-03:002018-09-28T18:46:35.013-03:00Seeker v1.0.7 - Get Accurate Location using a Fake Website<div class="separator" style="clear: both; text-align: center;">
<a href="https://2.bp.blogspot.com/-Jo9vwFtdnHI/W66g4KjJElI/AAAAAAAAMpQ/mjvxnDlPcQ8N2x3vBPd432_WCncOratjgCLcBGAs/s1600/seeker_1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="126" data-original-width="501" src="https://2.bp.blogspot.com/-Jo9vwFtdnHI/W66g4KjJElI/AAAAAAAAMpQ/mjvxnDlPcQ8N2x3vBPd432_WCncOratjgCLcBGAs/s1600/seeker_1.png" /></a></div>
<div align="center">
<br /></div>
<div style="text-align: justify;">
Concept behind <a href="http://www.kitploit.com/search/label/Seeker">Seeker</a> is simple, just like we host <a href="http://www.kitploit.com/search/label/Phishing">phishing</a> pages to get <a href="http://www.kitploit.com/search/label/Credentials">credentials</a> why not host a fake page that requests your loction just like many popular location based websites.</div>
<div style="text-align: justify;">
Seeker Hosts a fake website on <strong>Apache Server</strong> and uses <strong>Ngrok</strong>, website asks for Location Permission and if the user allows it, we can get :</div>
<ul>
<li>Longitude</li>
<li>Latitude</li>
<li>Accuracy</li>
<li>Altitude - Not always available</li>
<li>Direction - Only available if user is moving</li>
<li>Speed - Only available if user is moving</li>
</ul>
<a name='more'></a><br />
Along with Location Information we also get <strong>Device Information</strong> without any permissions :<br />
<ul>
<li>Operating System</li>
<li>Platform</li>
<li>Number of CPU Cores</li>
<li>Amount of RAM - Approximate Results</li>
<li>Screen Resolution</li>
<li>GPU information</li>
<li>Browser Name and Version</li>
<li>Public IP Address</li>
</ul>
<strong>This tool is purely a Proof of Concept and is for Educational Purposes Only, Seeker shows what data a malicious website can gather about you and your devices and why you should not click on random links and allow critical permissions such as Location etc.</strong><br />
<ul>
<li>Other tools and services offer IP <a href="http://www.kitploit.com/search/label/Geolocation">Geolocation</a> which is not very accurate and does not give location of user.<br />
</li>
<li>Generally if a user accepts location permsission, <a href="http://www.kitploit.com/search/label/Accuracy">Accuracy</a> of the information recieved is <strong>accurate to approximately 30 meters</strong>.<br />
</li>
</ul>
<strong>Note</strong> : On iPhone due to some reason location accuracy is approximately 65 meters.<br />
<br />
<span style="font-size: x-large;"><b>Tested On :</b></span><br />
<ul>
<li>Kali Linux 2018.2</li>
<li>Ubuntu 18.04</li>
<li>Arch Linux based Distro</li>
<li>Termux</li>
<li>Kali Linux (WSL)</li>
</ul>
<br />
<span style="font-size: x-large;"><b>Installation</b></span><br />
<br />
<span style="font-size: large;"><b>Ubuntu/Kali Linux</b></span><br />
<div>
<pre><code>git clone https://github.com/thewhiteh4t/seeker.git
cd seeker/
chmod 777 install.sh
./install.sh
# After Installation just type seeker in console
# OR using Docker
# Install docker
curl -fsSL https://get.docker.com -o get-docker.sh
sh get-docker.sh
# Build Seeker
cd seeker/
docker build -t seeker .
# Launch seeker
docker run -t --rm seeker</code></pre>
</div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://asciinema.org/a/195052" target="_blank"><img border="0" data-original-height="1600" data-original-width="1497" height="640" src="https://3.bp.blogspot.com/-a5yaMLVsjt8/W66gdilomjI/AAAAAAAAMpA/o2SoHi4NpO0Ff6lKmojtTpRopQLOYyX2wCLcBGAs/s640/seeker_7.png" width="598" /></a></div>
<br />
<span style="font-size: large;"><b>Arch Linux Based Distro</b></span><br />
<div>
<pre><code># Install docker
pacman -Syy
pacman -S docker
systemctl start docker.service
# Build Seeker
cd seeker/
docker build -t seeker .
# Launch seeker
docker run -t --rm seeker</code></pre>
</div>
<br />
<span style="font-size: large;"><b>Termux</b></span><br />
<div>
<pre><code>cd seeker/termux
chmod 777 install.sh
./install.sh
# After Installation just type seeker in console</code></pre>
</div>
<blockquote>
If you are unable to get ngrok url that means ngrok is unable to resolve dns, switch to Mobile Data instead of WiFi and it should work, this is a problem with ngrok.</blockquote>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://asciinema.org/a/195830" target="_blank"><img border="0" data-original-height="984" data-original-width="934" height="640" src="https://3.bp.blogspot.com/-Tg07RTH5QIw/W66gi_7_GUI/AAAAAAAAMpE/jVf_If-pegsthBvH7ZIohkcRz0j5dPjIwCLcBGAs/s640/seeker_8.png" width="606" /></a></div>
<br />
<span style="font-size: x-large;"><b>Demo</b></span><br />
Youtube - <a href="https://www.youtube.com/watch?v=ggUGPq4cjSM" rel="nofollow" target="_blank">https://www.youtube.com/watch?v=ggUGPq4cjSM</a><br />
<br />
<br />
<div style="text-align: center;">
<b><span style="font-size: x-large;"><a href="https://github.com/thewhiteh4t/seeker" rel="nofollow" target="_blank">Download Seeker</a></span></b></div>
Unknownnoreply@blogger.comtag:blogger.com,1999:blog-8317222231133660547.post-77412877882552221482018-07-19T10:19:00.000-04:002018-07-19T10:19:15.330-04:00Seeker - Find GeoLocation With High Accuracy<div class="separator" style="clear: both; text-align: center;">
<a href="https://3.bp.blogspot.com/-1zDBrIJu6gI/W02KG8V2WuI/AAAAAAAAL1Y/SUHSafU8pc8Mop2I9h_bWOiH6yu7oN1PACLcBGAs/s1600/seeker_1_seeker1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="636" data-original-width="752" height="540" src="https://3.bp.blogspot.com/-1zDBrIJu6gI/W02KG8V2WuI/AAAAAAAAL1Y/SUHSafU8pc8Mop2I9h_bWOiH6yu7oN1PACLcBGAs/s640/seeker_1_seeker1.png" width="640" /></a></div>
<br />
Seeker utilizes <strong>HTML5, Javascript, JQuery and PHP</strong> to grab <strong>Device Information</strong> and <strong>GeoLocation</strong> with High Accuracy.<br />
<ul>
<li>Other tools and services offer IP <a href="http://www.kitploit.com/search/label/Geolocation">Geolocation</a> which is not very accurate and does not give location of user.<br />
</li>
<li>Generally if a user accepts location permsission, Accuracy of the information recieved is <strong>accurate to approximately 30 meters</strong>.<br />
</li>
</ul>
<div>
<a name='more'></a><br /></div>
<strong>Note</strong> : On <a href="http://www.kitploit.com/search/label/iPhone">iPhone</a> due to some reason location accuracy is approximately 65 meters.<br />
It Hosts a fake website on <strong>Apache Server</strong> and uses <strong>Ngrok</strong> to generate a SSL link which asks for Location Permission and if the user allows it, we can get :<br />
<ul>
<li>Longitude</li>
<li>Latitude</li>
<li>Accuracy</li>
<li>Altitude - Not always available</li>
<li>Direction - Only available if user is moving</li>
<li>Speed - Only available if user is moving</li>
</ul>
Along with Location <a href="http://www.kitploit.com/search/label/Information">Information</a> we can also get <strong>Device Information</strong> without any permissions :<br />
<ul>
<li>Operating System</li>
<li>Platform</li>
<li>Number of CPU Cores</li>
<li>Amount of RAM - Approximate Results</li>
<li>Screen Resolution</li>
<li>GPU information</li>
<li>Browser Name and Version</li>
<li>Public IP Address</li>
</ul>
<br />
<span style="font-size: large;"><b>Tested On :</b></span><br />
<ul>
<li>Kali <a href="http://www.kitploit.com/search/label/Linux">Linux</a> 2018.2</li>
<li>Ubuntu 18.04</li>
</ul>
<br />
<span style="font-size: large;"><b>Requirements</b></span><br />
Supports both <strong>Python2</strong> and <strong>Python3</strong>.<br />
Seeker uses common standard python modules :<br />
<ul>
<li>os</li>
<li>time</li>
<li>json</li>
<li>requests</li>
<li>subprocess</li>
</ul>
<br />
<span style="font-size: large;"><b>Installation</b></span><br />
<div>
<pre><code>git clone https://github.com/thewhiteh4t/seeker.git
cd seeker/
chmod 777 install.sh
./install.sh
#After Installation just type seeker in console</code></pre>
</div>
<br />
<span style="font-size: large;"><b>Screenshots</b></span><br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://3.bp.blogspot.com/-1zDBrIJu6gI/W02KG8V2WuI/AAAAAAAAL1Y/SUHSafU8pc8Mop2I9h_bWOiH6yu7oN1PACLcBGAs/s1600/seeker_1_seeker1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="636" data-original-width="752" height="541" src="https://3.bp.blogspot.com/-1zDBrIJu6gI/W02KG8V2WuI/AAAAAAAAL1Y/SUHSafU8pc8Mop2I9h_bWOiH6yu7oN1PACLcBGAs/s640/seeker_1_seeker1.png" width="640" /></a></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://4.bp.blogspot.com/-ER6nGsz7rRg/W02KNxecpMI/AAAAAAAAL1c/qKtQ-QhQCD03duRD6DpGND9-rsCjw-K3QCLcBGAs/s1600/seeker_2_seeker2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="579" data-original-width="749" height="494" src="https://4.bp.blogspot.com/-ER6nGsz7rRg/W02KNxecpMI/AAAAAAAAL1c/qKtQ-QhQCD03duRD6DpGND9-rsCjw-K3QCLcBGAs/s640/seeker_2_seeker2.png" width="640" /></a></div>
<br />
<br />
<div style="text-align: center;">
<b><span style="font-size: x-large;"><a href="https://github.com/thewhiteh4t/seeker" rel="nofollow" target="_blank">Download Seeker</a></span></b></div>
Unknownnoreply@blogger.comtag:blogger.com,1999:blog-8317222231133660547.post-31155491068970790552017-10-24T16:25:00.000-03:002017-10-24T16:25:44.361-03:00How To Catch a Cheater<div style="text-align: justify;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://1.bp.blogspot.com/-pKD3rx41OV0/We-Tb50VPZI/AAAAAAAAJPA/EHYFT--HdtIVwfOdrDx1zDMjyrdl9KHMgCLcBGAs/s1600/spying.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="420" data-original-width="600" src="https://1.bp.blogspot.com/-pKD3rx41OV0/We-Tb50VPZI/AAAAAAAAJPA/EHYFT--HdtIVwfOdrDx1zDMjyrdl9KHMgCLcBGAs/s1600/spying.jpeg" /></a></div>
<br />
You have observed your partner and noticed some significant changes in behavior. They are more secretive about using their phone; they are working late or on the weekend; or they are not connecting with you like they used to. Do you have a cheater in the house? How can you find out? There are some old school methods and then there are some ways technology can help you with <a href="http://smstrackers.com/how-to-catch-a-cheater-with-10-cell-phone-spy-app-tricks/">how to catch a cheater</a>.</div>
<div style="text-align: justify;">
<b><span style="font-size: large;"><br /></span></b></div>
<div style="text-align: justify;">
<b><span style="font-size: large;">Tried and True from the Past</span></b></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
While some of these techniques may be a little too much cloak and dagger for you, they have worked many times in the past to catch cheaters. And they may suit your style of operation.</div>
<br />
<ol>
<li style="text-align: justify;">Show up at a known location unexpectedly and assess the situation. Drop into the baseball practice to see if they are present. If they are not there, ask the team members about the absence. Listen carefully. Sometimes friends are willing to share their suspicions. Sometimes they try to cover up. If the suspected cheater is present, watch from a distance to see if anything is going on.</li>
<li style="text-align: justify;">Check the garbage and recycling in your home and at their work for incriminating evidence.</li>
<li style="text-align: justify;">Look through the phone bills, bank account statements, or charge card statements for charges that are suspicious. Are there restaurant charges that are unfamiliar?</li>
<li style="text-align: justify;">Check the odometer of the car to see if there is extra mileage that would signal extra trips to an unknown location.</li>
<li style="text-align: justify;">Set your spouse up by planning a trip (business or family) and then stay close to home to observe what is happening. Use a camera to log the evidence.</li>
</ol>
<div>
<div style="text-align: justify;">
<b><span style="font-size: large;">Technological Solutions There are Apps for That! ???</span></b></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
You may want to use a technological solution for tracking behaviour for a variety of reasons. The evidence has already been recorded. All you have to do is locate it. It is easier to use technology, instead of a more physical solution. You will have evidence that you can use to confront the cheater. You are too embarrassed to go sneaking about. </div>
<div>
<ol>
<li style="text-align: justify;">Everyone's phone is full of personal information that is of a very telling nature. If you know the password, great. If you don't see if you can learn it by watching your partner unlock the phone. Or try some educated guesses. And then go through the phone looking for incriminating evidence. Review recent calls for repeated numbers, review the photos for people you don't know, look through messages and the app histories.</li>
<li style="text-align: justify;">If you can get into a computer your partner uses look for the same things you have done on the phone - any call history from programs like Skype and also look at History on the web browser. Check out the photos there as well.</li>
<li style="text-align: justify;">On social media sites that are used by the cheater look for unusual items, such as a review of a restaurant you don't recognize and comments that don't make any sense to you, such as “Great Game with the Red Sox, Friday night.” when you thought working late was was the excuse.</li>
<li style="text-align: justify;">If you do not know the passwords, take advantage of the opportunity to loan your phone to your partner in hope that they forget to log out. Then you can use that for access to complete searches.</li>
<li style="text-align: justify;">Installing tracking software on phones is another possibility, once you can get into the phone. Programs such as Contact Spy can track activity. Also you can track your spouse's cell phone by using the GPS function.</li>
<li style="text-align: justify;">If you can get access to the computer, you can install software that will pull up incriminating evidence such as key loggers that track keystrokes, </li>
<li style="text-align: justify;">Make a fake idea for a dating website to see if you can find your partner there. If you are insistent, set up a date.</li>
<li style="text-align: justify;">Use an audio recording device in a location where the cheater usually talks on the phone set to voice activate for those conversation that you are not allowed to hear. Many of these devices look like something else to make them appear to be innocuous. Put it in the home office, workshop, kitchen or bedroom.</li>
<li style="text-align: justify;">Put a hidden GPS on the car to track the journeys taken.</li>
</ol>
</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
And if you need more details about how to do any of these technological solutions go to the app store where for less than $5, the app walk you through the process step by step. Now you have some strategies about how to catch a cheater. </div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<b>Read more:</b></div>
<div style="text-align: justify;">
<a href="http://smstrackers.com/how-to-catch-a-cheater-with-10-cell-phone-spy-app-tricks/">http://smstrackers.com/how-to-catch-a-cheater-with-10-cell-phone-spy-app-tricks/</a></div>
</div>
<br />
<br />
<br />
<br />Unknownnoreply@blogger.comtag:blogger.com,1999:blog-8317222231133660547.post-21033746921527632412017-03-22T10:55:00.000-03:002017-03-22T10:55:03.578-03:00ooniprobe - Measure Internet Censorship & Speed<div class="separator" style="clear: both; text-align: center;">
<a href="https://4.bp.blogspot.com/-HFqJ9eNfWZs/WL3ttDXhsaI/AAAAAAAAHXc/TSzG8VCOcr86FIasZzoKIcw18Uc7-xT0ACLcB/s1600/ooniprobe_01.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://4.bp.blogspot.com/-HFqJ9eNfWZs/WL3ttDXhsaI/AAAAAAAAHXc/TSzG8VCOcr86FIasZzoKIcw18Uc7-xT0ACLcB/s1600/ooniprobe_01.jpg" /></a></div>
<br />
<div style="text-align: justify;">
Interested in collecting evidence of Internet censorship? Curious about
the speed and performance of the network that you are using?</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
By running the tests in this app, you will examine the following:</div>
<ul>
<li style="text-align: justify;">Blocking of websites </li>
<li style="text-align: justify;">Presence of systems that could be responsible for censorship and/or surveillance</li>
<li style="text-align: justify;">Speed and performance of your network</li>
</ul>
<a name='more'></a><br />
<div style="text-align: justify;">
These
tests have been developed by the <b>Open Observatory of Network
Interference (OONI)</b>, a free software project (under The Tor Project)
that aims to uncover **Internet censorship** around the world. Since
2012, OONI has collected millions of network measurements across more
than 90 countries, shedding light on multiple cases of network
interference. By running these tests, you will help increase
*transparency* around Internet censorship and network interference
around the world. </div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<b><span style="font-size: large;">Collecting evidence of Internet
censorship.</span></b></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
OONI's web connectivity test is designed to examine
whether websites are blocked and if so, how. This test, in particular,
attempts to determine whether access to sites is blocked through DNS
tampering, TCP/IP blocking, or by a transparent HTTP proxy. By knowing
how access to sites is interfered with, you can more easily evaluate how
to circumvent that specific type of censorship. As OONI is committed to
transparency through the publication of all network measurement data,
you can use it as evidence of any censorship events that you come
across.</div>
<div style="text-align: justify;">
<br /></div>
<br />
<div style="text-align: justify;">
<span style="font-size: large; font-weight: bold;"><br /></span></div>
<div style="text-align: justify;">
<b><span style="font-size: large;">Detecting systems responsible for censorship and
surveillance.</span></b></div>
<br />
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Various types of proxy technologies are used in networks
for implementing censorship, surveillance, and traffic manipulation.
OONI's HTTP invalid request line test is designed to uncover the
presence of such systems within tested networks. However, it's important
to point out that not all systems that you might find are necessarily
responsible for censorship and/or surveillance! Many proxy technologies,
for example, are used in networks for caching purposes.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<b><span style="font-size: large;">Measuring the speed and performance of your network.</span></b></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Sometimes the
network that we are using doesn't work as well as we'd like it to.
OONI's implementation of the Network Diagnostic Test (NDT) attempts to
measure the speed of your network by connecting to mLab servers near you
and by subsequently uploading and downloading random data. In doing so,
NDT collects low level TCP/IP information that can help characterize
the speed and performance of your network. Such information can also be
useful in examining cases of throttling. </div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<b><span style="font-size: large;">Open data.</span></b></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
OONI
publishes all network measurement data that it collects and processes
because open data allows third parties to conduct independent studies,
to verify OONI findings and/or to answer other research questions. Such
data also helps increase transparency around Internet censorship and
various forms of network interference. All data is published on OONI
Explorer: https://explorer.ooni.torproject.org/. </div>
<br />
<div style="text-align: justify;">
<span style="font-size: large; font-weight: bold;"><br /></span></div>
<b></b><br />
<div style="text-align: justify;">
<b><b><span style="font-size: large;">Free
software.</span></b></b></div>
<b>
</b>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
All OONI tests, as well as its NDT implementation, are based
on free and open source software. You can find the source code through
the following link: </div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<b>Attention. </b>Running ooniprobe might be against the terms of service of your ISP or
legally questionable in your country. By running ooniprobe you will
connect to web services which may be banned, and use web censorship
circumvention methods such as Tor. The OONI project will publish data
submitted by probes, possibly including your IP address or other
identifying information. In addition, your use of ooniprobe will be
clear to anyone who has access to your computer, and to anyone who can
monitor your Internet connection (such as your employer, ISP or
government).</div>
<div style="text-align: justify;">
<b><span style="font-size: large;"><br /></span></b></div>
<b><span style="font-size: large;">Screenshots</span></b><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://4.bp.blogspot.com/-_2qBje-JNQw/WL3t3BSTdeI/AAAAAAAAHXg/YrKC4ORwg1MUaUcaLAL0AvfF9CAB3OFYwCLcB/s1600/ooniprobe_02.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://4.bp.blogspot.com/-_2qBje-JNQw/WL3t3BSTdeI/AAAAAAAAHXg/YrKC4ORwg1MUaUcaLAL0AvfF9CAB3OFYwCLcB/s1600/ooniprobe_02.jpg" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://4.bp.blogspot.com/-DvcJQEVJIj4/WL3t3fA-QAI/AAAAAAAAHXk/XDxXI6qjuf0wfM_U2G42Y00skG7ahI14QCLcB/s1600/ooniprobe_03.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://4.bp.blogspot.com/-DvcJQEVJIj4/WL3t3fA-QAI/AAAAAAAAHXk/XDxXI6qjuf0wfM_U2G42Y00skG7ahI14QCLcB/s1600/ooniprobe_03.jpg" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://3.bp.blogspot.com/-qInXoE9yf_s/WL3t3V4bDcI/AAAAAAAAHXo/vPwgKRjcoGYYJtxoatSvtnno4eulav5SQCLcB/s1600/ooniprobe_04.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://3.bp.blogspot.com/-qInXoE9yf_s/WL3t3V4bDcI/AAAAAAAAHXo/vPwgKRjcoGYYJtxoatSvtnno4eulav5SQCLcB/s1600/ooniprobe_04.jpg" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://3.bp.blogspot.com/-JcFyf1Qp1xM/WL3t35FLEOI/AAAAAAAAHXs/_RxIzzoPyKsPl2J4X3cA0r9bbvC5ElaZQCLcB/s1600/ooniprobe_05.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://3.bp.blogspot.com/-JcFyf1Qp1xM/WL3t35FLEOI/AAAAAAAAHXs/_RxIzzoPyKsPl2J4X3cA0r9bbvC5ElaZQCLcB/s1600/ooniprobe_05.jpg" /></a></div>
<br />
<a href="https://play.google.com/store/apps/details?id=org.openobservatory.ooniprobe&hl=en" target="_blank"><b><span style="font-size: x-large;">Download ooniprobe (Android)</span></b></a><br />
<a href="https://itunes.apple.com/US/app/id1199566366?at=" target="_blank"><br class="Apple-interchange-newline" /></a>
<a href="https://itunes.apple.com/US/app/id1199566366?at=" target="_blank"><b><span style="font-size: x-large;">Download ooniprobe (IOs)</span></b></a><br />
<br />Unknownnoreply@blogger.comtag:blogger.com,1999:blog-8317222231133660547.post-77100373310457112682015-04-26T12:01:00.000-03:002015-04-26T12:04:01.210-03:00Packet Sender - The UDP and TCP Network Test Utility<div class="separator" style="clear: both; text-align: center;">
<a href="http://2.bp.blogspot.com/-bzhPgrqBZDY/VTz78gq5W0I/AAAAAAAAD6U/fBlzcXdvERo/s1600/packet_sender.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://2.bp.blogspot.com/-bzhPgrqBZDY/VTz78gq5W0I/AAAAAAAAD6U/fBlzcXdvERo/s1600/packet_sender.png" height="496" width="640" /></a></div>
<br />
<div style="text-align: justify;">
Packet Sender is an open source utility
to allow sending and receiving TCP and UDP packets. It is available free
(no ads / no bundleware) for <b>Windows</b>, <b>Mac</b>, and <b>Linux</b>. It can be used
for both commercial and personal use
(license). It's designed
to be very easy to use while still providing enough features for power users to do what they need.</div>
<a name='more'></a><br />
<div style="text-align: justify;">
<b><span class="Apple-style-span" style="font-size: large;">Mobile </span></b></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
The native mobile versions have been abandoned to focus on the more
popular and more capable desktop version. However, the GitHub
projects for both<b> <a href="https://github.com/dannagle/PacketSender-iOS" target="_blank">iOS</a></b> and <a href="https://github.com/dannagle/PacketSender-Android" target="_blank"><b>Android</b></a> are MIT Licensed and available for forking.</div>
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-PI6KoLC9jJg/VTz8mHMxjfI/AAAAAAAAD6c/0XZpcIF64Ig/s1600/iphone-packet_sender.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://3.bp.blogspot.com/-PI6KoLC9jJg/VTz8mHMxjfI/AAAAAAAAD6c/0XZpcIF64Ig/s1600/iphone-packet_sender.png" height="400" width="223" /></a>
<a href="http://1.bp.blogspot.com/-KYjLKcNHds4/VTz8oNI3UoI/AAAAAAAAD6k/aw6-PUh51B0/s1600/packet_sender-android.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://1.bp.blogspot.com/-KYjLKcNHds4/VTz8oNI3UoI/AAAAAAAAD6k/aw6-PUh51B0/s1600/packet_sender-android.png" height="400" width="240" /></a></div>
<br />
<b><span class="Apple-style-span" style="font-size: large;">
Change log</span></b><br />
<ul>
<li>Version 2015-04-19
<ul>
<li>Portable mode</li>
<li>Read in file from command line</li>
<li>Save traffic log</li>
<li>Mobile versions have been abandoned. Project focus is now on the far more popular desktop version.</li>
</ul>
</li>
<li>Version 2015-02-13
<ul>
<li>Migrated to GitHub</li>
<li>New vector-based logo</li>
<li>Bug fix in quick-disable/enable</li>
<li>Migrated to Qt 5.4</li>
<li>Ubuntu version brought up to date.</li>
<li>Forums are closed (spammers killed it).</li>
</ul>
</li>
<li>Version 2014-10-07
<ul>
<li>Initial launch of forums.</li>
<li>Multi-Send.</li>
<li>Quick-send from traffic log selected packets.</li>
<li>Packet Export/Import.</li>
<li>Rolling traffic log support.</li>
<li>Numerous configuration settings added:
<ul>
<li>Copy raw packet data to clipboard.</li>
<li>Receive before send.</li>
<li>Connection delays for slow devices.</li>
</ul>
</li>
<li>Command line interface default binds to 0.</li>
<li>Universal (XP through 8.1) Windows installer.</li>
<li>Migrated to Qt 5.3</li>
<li>Some rework of the "About" section.</li>
</ul>
</li>
<li>Version 2014-02-22
<ul>
<li>TCP connections are now fully threaded (no more UI freezes).</li>
<li>Brand new and highly capable command line interface. (Run PacketSender --help)</li>
<li>Some mild UI enhancements to make sending easier.</li>
<li>Ubuntu version brought up to date.</li>
<li>Windows XP now separated. </li>
<li>Qt 5.2</li>
</ul>
</li>
<li>Version 1.5 (Mobile)
<ul>
<li>Android version released.</li>
</ul>
</li>
<li>Version 2013-11-18
<ul>
<li>Copy to Clipboard button on traffic log.</li>
<li>Name prompt for traffic log.</li>
</ul>
</li>
<li>Version 2013-11-11
<ul>
<li>Bad installer on Windows. No other changes made.</li>
</ul>
</li>
<li>Version 2013-11-09
<ul>
<li>Searching packets from traffic log.</li>
<li>Fixed some traffic log stability problems.</li>
</ul>
</li>
<li>Version 2013-11-05
<ul>
<li>Added resending packets at user-specified intervals.</li>
<li>Traffic log sped up significantly.</li>
<li>Packet searching.</li>
<li>Table headers (both saved packets and traffic log) can be rearranged.</li>
<li>Response packet for TCP actually works now.</li>
<li>Response packet data can be manually updated.</li>
<li>About / License stuff moved to another tab.</li>
<li>Internal libraries updated.</li>
</ul>
</li>
<li>Version 2013-10-20
<ul>
<li>64-bit Ubuntu and Linux Mint support.</li>
</ul>
</li>
<li>Version 2013-10-14
<ul>
<li>Ubuntu and Linux Mint support.</li>
</ul>
</li>
<li>Version 2013-05-20
<ul>
<li>Saving is less quirky.</li>
<li>Domain names can be used in IP address line. Packet Sender will do a quick lookup to find the IP.</li>
<li>Internal libraries updated.</li>
</ul>
</li>
<li>Version 2012-09-12
</li>
<ul>
<li>Public release of deskop version.</li>
</ul>
</ul>
<div>
<br /></div>
<div style="text-align: center;">
<b><span class="Apple-style-span" style="font-size: x-large;"><a href="http://packetsender.com/#Download" target="_blank">Download Packet Sender</a></span></b></div>
Unknownnoreply@blogger.comtag:blogger.com,1999:blog-8317222231133660547.post-55293851259507775402014-02-22T22:08:00.000-03:002014-02-22T22:08:00.025-03:00[DVIA] Damn Vulnerable iOS Application<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-hkm7Stkgkd4/UwWcojWtJlI/AAAAAAAAB-4/btzZ98GjPsg/s1600/Damn+Vulnerable+iOS+Application+(DVIA).png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://4.bp.blogspot.com/-hkm7Stkgkd4/UwWcojWtJlI/AAAAAAAAB-4/btzZ98GjPsg/s1600/Damn+Vulnerable+iOS+Application+(DVIA).png" height="380" width="640" /></a></div>
<br />
<div style="text-align: justify;">
<em><strong>Damn Vulnerable iOS App (DVIA)</strong></em> is an iOS
application that is damn vulnerable. Its main goal is to provide a
platform to mobile security enthusiasts/professionals or students to
test their iOS penetration testing skills in a legal environment.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
This application covers all the common vulnerabilities found in iOS
applications (following OWASP top 10 mobile risks) and contains several
challenges that the user can try.</div>
<a name='more'></a><br />
<div style="text-align: justify;">
<strong><span style="line-height: 1.5em;">Vulnerabilities and Challenges Included</span></strong></div>
<ul>
<li style="text-align: justify;">Insecure Data Storage</li>
<li style="text-align: justify;">Jailbreak Detection</li>
<li style="text-align: justify;">Runtime Manipulation</li>
<li style="text-align: justify;">Transport Layer Security</li>
<li style="text-align: justify;">Client Side Injection</li>
<li style="text-align: justify;">Information Disclosure</li>
<li style="text-align: justify;">Broken Cryptography</li>
<li style="text-align: justify;">Application Patching</li>
</ul>
<br />
<div style="text-align: justify;">
All these vulnerabilities and their solutions have been tested upto IOS 7.0.4.</div>
<div style="text-align: justify;">
Every challenge/vulnerability has a link for a tutorial that users can read to learn more on that topic.</div>
<br />
<br />
<div style="text-align: center;">
<b><span class="Apple-style-span" style="font-size: x-large;"><a href="http://damnvulnerableiosapp.com/#downloads" target="_blank">Download DVIA</a></span></b></div>
Unknownnoreply@blogger.comtag:blogger.com,1999:blog-8317222231133660547.post-23037778093626278292014-02-13T19:29:00.000-03:002014-02-13T19:29:00.762-03:00[Introspy] Security profiling for blackbox iOS<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/--jIWWIgFmTQ/UvGThjFQ66I/AAAAAAAABzE/Qv9aaMIINnM/s1600/Introspy.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://3.bp.blogspot.com/--jIWWIgFmTQ/UvGThjFQ66I/AAAAAAAABzE/Qv9aaMIINnM/s1600/Introspy.png" height="640" width="480" /></a></div>
<br />
<div style="text-align: justify;">
Blackbox tool to help understand what an iOS application is doing at runtime
and assist in the identification of potential security issues.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
The tracer can be installed on a jailbroken device to hook and log
security-sensitive iOS APIs called by applications running on the device. The
tool records details of relevant API calls, including arguments and return
values and persists them in a database.
Additionally, the calls are also sent to the Console for real-time analysis.</div>
<a name='more'></a><br />
<h3 style="text-align: justify;">
How Introspy works</h3>
<div style="text-align: justify;">
The tool comprises two separate components: Introspy-iOS and Introspy-Analyzer. </div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Introspy-iOS is a tracer that can be installed on a jailbroken iOS
device. It will hook security-sensitive APIs called by a given
application, including functions related to cryptography, IPCs, data
storage / protection, networking, and user privacy. The call details are
all recorded and persisted in a SQLite database on the device</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
This database can then be fed to Introspy-Analyzer, which generates
an HTML report displaying all recorded calls, plus a list of potential
vulnerabilities affecting the application.</div>
<br />
<div style="text-align: center;">
<a href="https://github.com/iSECPartners/Introspy-iOS" target="_blank"><b><span class="Apple-style-span" style="font-size: x-large;">Download Introspy</span></b></a></div>
Unknownnoreply@blogger.comtag:blogger.com,1999:blog-8317222231133660547.post-12015607456796325542014-01-20T20:19:00.000-03:002014-01-20T20:19:08.286-03:00[IPhone Analyzer] IPhone Forensics Tool<div style="text-align: justify;">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://1.bp.blogspot.com/-8hX8MTqscUw/Ut2t64TceaI/AAAAAAAABpE/8O6Fu9oYzBU/s1600/IPhone+Analyzer.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://1.bp.blogspot.com/-8hX8MTqscUw/Ut2t64TceaI/AAAAAAAABpE/8O6Fu9oYzBU/s1600/IPhone+Analyzer.jpg" height="450" width="640" /></a></div>
<b><br /></b>
<b>iPhone Analzyer</b> allows you to <i>forensically examine or recover date from
in iOS device</i>. It principally works by <i>importing backups</i> produced by
iTunes or third party software, and providing you with a rich interface
to explore, <i>analyse and recover data</i> in human readable formats. Because
it works from the backup files everything is forensically safe, and no
changes are made to the original data.<br />
<a name='more'></a><br />
<h1>
Features</h1>
<ul>
<li>Supports iOS 2, iOS 3, iOS 4 and iOS 5 devices</li>
<li>Multi-platform (Java based) product, supported on Linux, Windows and Mac</li>
<li>Fast, powerful search across device including regular expressions</li>
<li>Integrated mapping supports visualisation of geo-tagged information,
including google maps searches, photos, and cell-sites and wifi
locations observed by the device (the infamous "locationd" data)</li>
<li>Integrated support for text messages, voicemail, address book
entries, photos (including metadata), call records and many many others</li>
<li>Recovery of "deleted" sqlite records (records that have been tagged
as deleted, but have not yet been purged by the device can often be
recovered),/li>
</li>
<li>Integrated visualisation of plist and sqlite files</li>
<li>Includes support for off-line mapping, supporting mapping on computers not connected to the Internet</li>
<li>Support for KML export and direct export to Google Earth</li>
<li>Browse the device file structure, navigate directly to key files or
explore the device using concepts such as "who", "when", "what" and
"where".</li>
<li>Analyse jail broken device directly over SSH without need for backup (experimental)</li>
</ul>
<br />
<br />
<div style="text-align: center;">
<b><span class="Apple-style-span" style="font-size: large;"><a href="http://sourceforge.net/projects/iphoneanalyzer/" target="_blank">Download IPhone Analyzer</a></span></b></div>
</div>
Unknownnoreply@blogger.comtag:blogger.com,1999:blog-8317222231133660547.post-65514396762900494292014-01-20T13:37:00.000-03:002014-01-20T13:37:56.888-03:00[Fing] Tool for Network Scan and Analysis for iPhone<a href="http://1.bp.blogspot.com/-cONzHOaQLrk/Ut1P7R4JwKI/AAAAAAAABnY/GUqALRWD1Nc/s1600/fing.jpeg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="http://1.bp.blogspot.com/-cONzHOaQLrk/Ut1P7R4JwKI/AAAAAAAABnY/GUqALRWD1Nc/s1600/fing.jpeg" height="320" style="cursor: move;" width="180" /></a><br />
<div style="text-align: justify;">
Highlight of features: </div>
<div style="text-align: justify;">
+ Discovers all devices connected to a Wi-Fi network. No limitation! </div>
<div style="text-align: justify;">
+ Displays the MAC Address and up-to-date Vendor names. </div>
<div style="text-align: justify;">
+ Customize names, icons and notes. </div>
<div style="text-align: justify;">
+ Wake On LAN. Switch on your cable-connected devices.</div>
<div style="text-align: justify;">
+ History of all discovered networks. You can review and edit your past scans at any time, also offline. </div>
<div style="text-align: justify;">
+ Checks the availability of Internet connection, reporting the geographic location of the ISP (Internet Service Provider). </div>
<div style="text-align: justify;">
+ Share a detailed report of any scan via email</div>
<div style="text-align: justify;">
+ Search devices by IP, MAC, Name, Vendor and Notes</div>
<div style="text-align: justify;">
+ In-app settings</div>
<div style="text-align: justify;">
+
Scans the open ports to find available services. It uses a fast engine
that supports hundreds of well-known ports, that you can customize with
your own</div>
<div style="text-align: justify;">
+ Translates IP addresses to its Domain Names, and reverse </div>
<div style="text-align: justify;">
+ Works also with hosts outside your local network</div>
<div style="text-align: justify;">
+ Tracks when a device has gone UP or DOWN, keeping disconnected devices in the list.</div>
<div style="text-align: justify;">
+ Discovers NetBIOS names.</div>
<div style="text-align: justify;">
+ Supports identification by IP address. Allows to customize nodes hidden behind a network switch.</div>
<div style="text-align: justify;">
+ Can sort devices by IP, MAC, Name, Vendor, State, Last Change.</div>
<div style="text-align: justify;">
+ Free of charge, Free of Ads </div>
<div style="text-align: justify;">
+
Integrates with Fingbox to sync and backup your customizations, merge
networks with multiple access points, monitor remote networks via
Fingbox Sentinels, get notifications of changes, and much more.</div>
<div style="text-align: justify;">
<br /><a name='more'></a></div>
<div style="text-align: justify;">
Fing
is born from the ashes of the famous Look@LAN, with a brand-new engine
that makes it even faster and smarter! Available also for Windows, Mac
OS X, Linux and more platforms!</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;">
<b><span class="Apple-style-span" style="font-size: x-large;"><a href="https://itunes.apple.com/us/app/fing-network-scanner/id430921107?mt=8" target="_blank">Download Fing</a></span></b></div>
Unknownnoreply@blogger.comtag:blogger.com,1999:blog-8317222231133660547.post-64027834964447482262013-12-17T21:34:00.000-03:002013-12-17T21:34:18.258-03:00[Cryptocat] Chat Client with encrypted conversations on iPhone and Android<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-l6dYFVLjZpk/UrDtRKZbEUI/AAAAAAAABVY/-ogUxjJ2QnU/s1600/Cryptocat.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://3.bp.blogspot.com/-l6dYFVLjZpk/UrDtRKZbEUI/AAAAAAAABVY/-ogUxjJ2QnU/s1600/Cryptocat.jpg" /></a></div>
<br />
<div style="text-align: justify;">
Cryptocat is an experimental browser-based chat client for easy to use, encrypted conversations. It aims to make encrypted, private chat easy to use and accessible. We want to break down the barrier that prevents the general public from having an accessible privacy alternative that they already know how to use. </div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Cryptocat is currently available for Chrome, Firefox and Safari. It uses the OTR protocol over XMPP for encrypted two-party chat and the (upcoming) mpOTR protocol for encrypted multi-party chat.</div>
<a name='more'></a><br />
<br />
<div style="text-align: center;">
<b><span class="Apple-style-span" style="font-size: x-large;"><a href="http://www.n0where.net/cryptocat-for-iphone-and-android/" target="_blank">Downlaod Cryptocat</a></span></b></div>
Unknownnoreply@blogger.com