In the noon time i was chatting with one of my friend while he was at an airport in Paris, during the chat he mentioned that he paid some bucks to access wifi for half an hour.
Well that lead to a spark in my brain. On some basic quick thinking it reminded me about the same situation that i faced while travelling too,
but in my scenario, i only faced two types of policies used by admins at airport that restricted wifi access.
1-- MAC ADDRESS CROSS CHECK.
2-- SUPPLYING USER WITH A TEMP KEY THAT EXPIRES IN A TIME PRE-DEFINED TIME PERIOD.
On collecting info from him it showed that they are surely using the first case.
That just reminded me of something similar i went through while helping a friend in china,
basically there university was using a a client software, that assigns ip address by checking mac add.
so access to other systems except the university registered laptop/pc was
restricted, so we used the similar trick for of spoofing the mac address
n voila it worked.
so just for explaining that part created to vidz of tools n there how tos for spoofing it on both win and a Linux system.
tools used are :: win : macshift : link
Linux : macchanger :: link
## on any debian based distro like ubuntu just
## apt-get install macchanger
##if you guys using backtrack or any other security distro i should probably be there in it.
So here are the videos to get you start up fast and easy.
mac address spoofing Linux
mac address spoofing Windows
Thanks for reading.
For any queries or suggestions plz comment below.
Yinsain.
Hey guys this is yash aka yinsain here,if you are reading this then you are surely not infected with it. I was getting a bit curious about all this news i was getting from my friend about a new malware hitting the web, well as i looked into it, it looks nothing new, just the old skool technique to redirect victims to a malicious server for there own good.
Methods are still the same but the techniques to achieve that has really evolved from years till now. As this name is a bit eye catchy you might be interested but do you really know what it is and what will it do.
Lets start with the name, Monday malware was given to it because it will knock you off the internet on monday that is today 9/7/2012 as most of the agencies are saying.
Well its actual name is still not defined but people have given its so many names, and some are from gov agencies also to classify it.
Other name is 'Alureon/DNS Changer bot'.
So lets dig into its working, as i dont hold a working executable or its source code. So i will be demonstrating the effect of this malware in a controlled enviroment via some network tools.
To understand the basic working of this malware you should be aware of some of the working principles of internet. The one we are focusing on in this blog post is DNS. For a basic explanation, this is the service which manages the juggling of ip addresses and the host names, wrong info of ipaddress will lead you to a wrong page, that is what that malware do but in a stealthy manner, most probably redirecting the victim to thr own server for malicious purposes. for further details you can read this.
Here i am using a virtual machine to depict a victim and using a linux(ubuntu) host machine to create an infected scenario.
Tools :: dsniff-suite, Virtualbox.
Setup ::
Getting the softwares,
------------------------------------------------------------------------------------------------------------------------------------
apt-get install dsniff
for virtualbox
either download a installer file for your o.s. or follow the linux way.
please note you will require root priviledges to do this.
-------------------------------------------------------------------------------------------------------------------------------------
And now for the dnsspoof, this tool reads out the domains from a file which we can provide.
edit it the way you feel, just maintain the structure it recognizes.
here is mine.
so we are ready..
i have just added three entries for the common sites that people open.
>> paypal
>> facebook
>> google
So the setup for the tool is ready,
Now you need a victim, here in our example we are using a virtual victim
so you can google it to get a detailed instruction to get a virtual machine all set with o.s. of your choice for this.
Our victim here is windows xp user.
NOTE :: THIS DEMO WORKS ON ALL THE O.Ss INCLUDING WINDOWS, MAC OS AND LINUX. BUT THE REAL MALWARE WAS REPORTED TO JUST WORK ON WINDOWS AND MAC OS TILL NOW. LINUX STILL SURVIVES HUH.
So lest fire up our virtual machine.
lets open up our websites....
as you can see, all the three seems to opening fine..
and even the dns_cache is fine.
So lets start the attack to create an infected scenario....
I will try to keep it least complicated so open up three different instances of terminal.
As you can see the url was valid, but due to the infected victim machine,
request got redirected to the host mentioned in the spoof file for dnsspoof.
Be careful while logging in any of your accounts or buying any stuff online, if you are infected you may endup in a bad situation.
This is how a dns spoofing can occur, this is extremely dangerous for day to day users, as they may get redirected to fake pages and innocently give up their login credentials without any suspicion.
PREVENTIVE MEASURES::
>> do get your system cleaned by a valid tool like avira dnschanger bot remover if your windows or mac is infected.
>> contact your isp to get a valid list of dns servers' ipaddresses which are owned by the isps.
Again thanks for reading.
plz leave comments or message me for any query.
In this post i will be guiding you through an easy method of setting up your exploitation framework and this tool is nothing else than the superior metasploit framework..
GUYS THIS TUTORIAL IS FOR LINUX OS, IF YOU WANT THE SAME FOR WINDOWS COMMENT, MESSAGE ME.
So lets start out,
tools required :: a linux os
its upto you which one you prefer, im using arch linux but you can use ubuntu. Its a newbie-friendly distro as compared to arch.
www.ubunut.com
Assuming that your os in installed, doesnt matter on disk or virtually and updated (if not do it, and if you dont kno how, check below).
This whole framework is dependent on ruby language,
so first of all we require to resolve the required dependencies.
------------------------------------------------------------------------------------------------------------------------------
apt-get update && apt-get upgrade
//this will do the update part
this will install the necessay packages
-------------------------------------------------------------------------------------------------------------------------------
Now the method we will using to fetch metasploit for our system is using subversion.
to kno more about it.
http://subversion.apache.org/
Now the minor things are done now comes the important part
Subversion is a version control system, basically what it does is it synchorises your local folder with the remote folder being used as a developement base
svn >> acronym for subversion this is used for commands
-----------------------------------------------------------------------------------------------------------------------------------
something like this should be visible, it will list down the remote folders and files
If you get something similar that means you are ready to go.
now, do
------------------------------------------------------------------------------------------------------------------------------------
$ svn checkout https://www.metasploit.com/svn/framework3/trunk/ msf
or
$ svn co https://www.metasploit.com/svn/framework3/trunk/ msf
both are same, co is for checkout same as svn for the whole
--------------------------------------------------------------------------------------------------------------------------------------
This will create a folder named msf with all the files in your current directory.
This a big download and takes few seconds to initiate so wait for it,
soon it will start and your screen will be filled with data transfer details
So now you are back with all the downloaded files.
if you now issue ls command you will surely
see all the files
This is it this your framework succesfully installed.
UPDATE
Now to update it this command can be used, for that you have to come to this directory everytime, as subversion checks the current directory to recognize the point of last update
------------------------------------------------------------------------------------------------------------------------------------
$ svn update
------------------------------------------------------------------------------------------------------------------------------------
//As you have just installed it you wont be requiring any update but i would recommend you keep updating it in a day or two for latest exploits, me myself usually do it everyday, you can automate this also with crontab.
After each update there is a revision no. left to keep track like this
Now you can test your main tool, in this all of these msf* tools are extremely useful and if used in a combined manner can render a desired exploitation.
issue this command
------------------------------------------------------------------------------------------------------------------------------------
$ ./msfconsole
------------------------------------------------------------------------------------------------------------------------------------
if it loads up without any errors with ruby interpreter then you are good to go and it should look like this, and you will be welcomed with a msf> prompt
EXTENSIONS
Now comes the part for installing extensions, not a priority but it is required to enable raw sockets and wifi modules.
Raw sockets,
go to your dir where you installed msf and then into external and then
----------------------------------------------------------------------------------------------------------------------------------
$ cd /opt/metasploit3/msf3/external/pcaprub/
# cd /opt/metasploit3/msf3/external/ruby-lorcon2/
# svn co http://802.11ninja.net/svn/lorcon/trunk lorcon2
# cd lorcon2
# ./configure --prefix=/usr && make && make install
# cd ..
# ruby extconf.rb
# make && make install
Guys im again informing you this is not a tutorial for development, only things covered in this post will be about setting up your android tools.
Further posts may even dig deeper in android forensics.
So for even starting up with your setup you should first decide about your platform. I would recommend mac or a linux box, and this tutorial is also following the same. But windows guys dont feel bad, comment below and i will respond with solutions and help.
So guys if you are familiar with Linux then its a plus point, if you dont then also its not a major issue, you can catch up any time you want. Download any iso of a Linux distribution of your preference. I would recommend Ubuntu, its a bit rookie friendly.
heres the link download
These distros are available in livecd format but you will require a system with installation done because you want your changes to be persistent.
Daring new guys can surely install it on a system, but if you are scared of blowing of your close-to-your-heart windows installation then virtualization solutions are always present.
You can try out virtual-box or vmware-player both are excellent.
I wont be guiding for with a linux installation, so google it.
So, lets assume now you have a working linux distribution on a disk or virtually, or maybe you are on the classier side and giving a smirk with a mac.
But mac guys take care and check out the documentation because im not helping.
linux guys now fire up your terminal.
If you are on an older version of ubuntu say before 11.04, then you probably on gnome2 enviroment so go to applications under accesories or system tools there will be terminal, on a newer distro, guys just hit your windows key and type in terminal it will be there.
so you have your terminal opened up.
now lets resolve the dependencies required to run our sdk.
As we are working on linux so fetch the required tar file and place it in a
folder of your choice.
Usually additional installation are done under /opt directory but you can feel free to put it anywhere, for the rest of the post i wil be keeping it in /opt.
gain the required priviledges for that folder and continue to extract it.
for newbies please just right click and follow it.
for guys who are comfortable and wanna learn do this
----------------------------------------------------------------------------------------------------------------
reach your directory and
do
tar zxvf android-sdk_r18-linux.tgz
the no. after r may vary for you depending on when are you viewing this
-----------------------------------------------------------------------------------------------------------------
now cd into the directory issue ls command
now some of the sub-directories are visible.
first and the most important utility require is adb, but unfortunately, it has been shifted to platforms folder that means we have to download it.
For that go into tools directory and enter ./android.
Another screen will pop up showing a gui like this select Android platform tools and then click on install package.
let it download the required package.
After its done, go back to upper directory and then into platform-tools and issue ls command.
So here we are, our two of the most important tools that we require are here.
adb and fastboot.
Now you can issue command ./adb devices but no devices will be shown if not
connected in debugging mode,
here is how you can put your android in debugging mode go to settings/application/development and then select Android debugging.
so now your device is ready,
now try again, it should show it now.,
now you can issue ./adb shell command too, as tis the only device connected it will drop down its shell only,
now its upto you how you explore into.
and we have the android shell..
Plz do follow the post nxt post regarding android will go into forensics of its filesystem.
I have seen many people put up videos tutoring about c programming and stuff, but most of those videos lack some of the major concepts important for practical programming. So i thought why not cover this topic too, this is also an outcome of requests from friends, having problems in same topic.
A prior knowledge of string constants, argument passing, pointers, pointers to pointers is necessary in any programming language, helps you to get eased up for it, if you know c then its even better,
lest start with a simple code that is so popular that even a non programmer who ever wanted to learn programming but lost interest must have also seen before throwing the book, yeah u got me right its the oldskool HELLO WORLD eg
when you compile this code snippet, you get the usual hello world output on screen, but this is constraining our will to program the way we want, in this example hello world string will get hard coded into the executable generated after compiling.
One question arises commonly, why cant it be dynamic??
ans is simple, it can be made dynamic, creators of c were not so foolish to leave such a thing. This can be achieved with parameter passing just like any other function, but the only difference between this type of argument passing is that arguments are passed from the enviroment of your os not inside your program.
With a slight modification in the code above you can achieve it,
argc --> its an integer data type,
--> keeps the count of total arguments
in a standalone program with no parameters, vaue of argc is always 1,
this facility can be used for error checking
IF (parameters less than 2)
PRINT plz check the usage or plz pass correct number of arguments.
this variable increments with your no of parameters you pass.
lets say your compiled program is helloworld.
so on a linux box
$./helloworld hello this is a parameter passing example
or a windows machine
>helloworld.exe hello this is a parameter passing example
this is the portion where it gets confusing for some people, but i will start from the base and we can build our way up,
so the concept of an array
what is an array??
it is a contiguous block of memory which can be used to store data in a rightly order.
main points about it.
--> array name is a pointer itself,
basically it points to the first memory block of the array.
so this code is also fairly legal,
-------------------------------------------------------------------
int *p , egarray[2];
p = egarray;
//then
printf() for egarray[0] and *p will output the
same value.
----------------------------------------------------------------------
arrays can be created for all possible datatypes depending on your needs, int ,char n struct arrays are common in and same is with array of pointers.
think of it as a registers which stores the starting point of another array