Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Wednesday, May 16, 2012

Making sniffer using libpcap




[0] http://www.tcpdump.org/pcap.html
[1] http://www.joshuarobinson.net/docs/libpcap_offline.html
[2] http://yuba.stanford.edu/~casado/pcap/section1.html
[3] http://www.winpcap.org/docs/docs_40_2/html/group__wpcapsamps.html
[4] http://www.linuxquestions.org/questions/programming-9/undefined-reference-to-functions-from-pcap-h-319252/

package samples
[5] http://wiki.wireshark.org/SampleCaptures



Tutorial how to
[1] http://www.linuxforu.com/2011/02/capturing-packets-c-program-libpcap/


More
http://www.tcpdump.org/pcap.html
http://networksecurity.org.ua/0596007949/networkst-chp-10-sect-2.html
http://www.tcpdump.org/pcap/pcap.html
http://commons.oreilly.com/wiki/index.php/Network_Security_Tools/Modifying_and_Hacking_Security_Tools/Writing_Network_Sniffers
 http://eecs.wsu.edu/~sshaikot/docs/lbpcap/
http://www.eecis.udel.edu/~sunshine/expcs/code/pcap_packet_read.c


Source:
[1] http://code.google.com/p/chengchuntu1/source/checkout
[2] http://sock-raw.org/papers/syn_scanner





Wednesday, April 04, 2012

gpg steps



export public key to asc
gpg -a --export FD9C1B26  > jfiq.pub


sign file/get pk
gpg -s segc-tarefa02.txt

sign file to asc format/get pk
gpg --clearsign segc-tarefa02.txt

add public key
gpg --import mo639_1s2012.pub

encrypt file/get uid
gpg -e -a segc-tarefa02.txt

References:

http://www.guiafoca.org/cgs/guia/avancado/ch-d-cripto.html

http://eriberto.pro.br/wiki/index.php?title=Usando_o_GnuPG

http://www.gnupg.org/gph/en/manual/x135.html

Monday, June 13, 2011

Offensive Security

Verify
nmap -sV -PN -p 445,137,139 --script=smb-check-vulns.nse


Meterpreter common commands


meterpreter > getprivs
meterpreter > migrate 2976
meterpreter > bglist

meterpreter > use -l
meterpreter > ?


meterpreter > bgrun keylogrecorder -c 1 -t 15
meterpreter> run keylogrecorder -c 1 -l -t 5
-c 1 to record a login session, "-l" to force logoff, and "-t 5" to deliver the keystrokes every 5 sec.

Basic meterpreter



Meterpreter Cllient commands
http://en.wikibooks.org/wiki/Metasploit/MeterpreterClient

Vulnerabilidad StickyKeys (sethc.exe)
http://foro.infiernohacker.com/index.php?topic=1867.0

Tools
http://www.md5decrypter.co.uk/

REG
http://ss64.com/nt/reg.html

Meterpreter REG
http://carnal0wnage.attackresearch.com/2007/06/defating-nod32-av.html

examples:
[1] Keylogging
http://www.offensive-security.com/metasploit-unleashed/Keylogging
[2] http://tekjournal.wordpress.com/2011/01/08/login-keystroke-recording/
[3] http://pctechtips.org/metasploit-getting-user-password-with-keylogrecorder/
[4] http://www.offensive-security.com/metasploit-unleashed/Meterpreter_Screen_Capture
[5] http://exploit.co.il/hacking/screenspy-meterpreter-script-review/

modules:
http://www.metasploit.com/modules/auxiliary/analyze/jtr_crack_fast


references:
[1] http://www.blueliv.com/downloads/Meterpreter_cheat_sheet_v0.1.pdf
[2] http://www.question-defense.com/2009/12/21/getting-started-with-meterpreter
[3] Custom exploit
http://www.pentester.es/2009/11/por-que-no-consigo-shell-con-mi.html

Tuesday, June 07, 2011

Windows::Network commands(cmd)

net user

net user guest
net user invitado


To enable the Guest account for network access:

net user guest /active:yes
net user invitado /active:yes

To disable the Guest account for network access:

net user guest /active:no
net user invitado /active:no


netstat

References
[1] netstat http://commandwindows.com/netstat.htm

Wednesday, June 01, 2011

Default Ports

PuertoDesc.EstadoObservaciones
20FTPcerradoUtilizado por FTP
21FTPcerradoUtilizado por FTP
22SSHabiertoSecure Shell.
23TELNETcerradoAcceso remoto
25SMTPcerradoServidor de correo SMTP
53DNScerradoServidor DNS
79FINGERcerradoServidor de información de usuarios de un PC
80HTTPabiertoServidor web
110POP3cerradoServidor de correo POP3
119NNTPcerradoServidor de noticias
135DCOM-scmcerradoSolo se puede cerrar a través de un cortafuegos
139NETBIOScerradoCompartición de Ficheros a través de una red
143IMAPcerradoServidor de correo IMAP
389LDAPcerradoLDAP. Tambien Puede ser utilizado por Neetmeting
443HTTPScerradoServidor web seguro
445MSFT DScerradoServer Message Block.
631IPPcerradoServidor de Impresion
1433MS SQLcerradoBase de Datos de Microsoft
3306MYSQLcerradoBase de Datos. MYSQL
5000UPnPcerradoEn windows está activado este puerto por defecto.

Tuesday, May 24, 2011

Windows.:Hidden user account

http://juliorestrepo.wordpress.com/2008/09/19/trucos-regedit-como-ocultar-una-cuenta-de-usuario-de-la-pantalla-de-bienvenida-de-windows-xp/

Thursday, May 19, 2011

PsTools::Remote tools

Share resource

NET SHARE sharename=drive:path /REMARK:"text" [/CACHE:Manual | Automatic | No ]
NET SHARE temp=c:\tmp /REMARK:"temporal files"

Drop share.
NET SHARE {sharename | devicename | drive:path} /DELETE
NET SHARE temp

Show resources
net view \\192.168.1.x


Open remote console

psexec \\IP -u USER -p PASSWORD


If Access denied(Acceso denegado) results, then:

Start, Control Panel, Administrative Tools,Local Security Policy.
Open the Local Policies, Security Options.

Accounts: Limit local account use of blank passwords to console logon only set to Disabled.

if don't work try:

Network access: Sharing and security model for local accounts set to "Classic - local users authenticate as themselves".


Notes(Remote Computer):

a) Debe tener habilitada la opción de "Compartir impresoras y archivos" (Inicio -> Ejecutar.... ncpa.cpl)
b) Debe tener deshabilitada la opción "Utilizar uso compartido simple de archivos"
c) Si tiene habilitado algún firewall debe permitir las conexiones por los puertos NetBIOS.
d) La máquina remota debe correr win NT, 2000, XP Pro, Vista o Server 2003
e) Tener usuario y contraseña válidos en la máquina remota
f) La máquina remota debe tener habilitado el recurso IPC$ y ADMIN$
g) La máquina remota debe tener iniciados los servicios NetLogon y Server

resources:
[1] psTools Download http://technet.microsoft.com/en-us/sysinternals/bb897553
[2] HOW TO: Restore Administrative Shares That Have Been Deleted http://support.microsoft.com/kb/318755
[3] Windows XP Professional File Sharing http://www.practicallynetworked.com/sharing/xp_filesharing/index.htm
[4] How to use the Simple File Sharing feature to share files in Windows XP http://support.microsoft.com/kb/304040

Monday, April 25, 2011

Web Security

Articles : How to hack a website (Basic sql injection)
http://www.ecademy.com/node.php?id=76050

references:
http://www.thc.org/thc-hydra/

Thursday, February 17, 2011

Wireless Metrics

dBm is defined as power ratio in decibel (dB) referenced to one milliwatt (mW). It is an abbreviation for dB with respect to 1 mW and the "m" in dBm stands for milliwatt.

dBm is different from dB. dBm represents absolute power, whereas dB is a ratio of two values and is used to represent gain or attenuation. For example, 3 dBm means 2 mW, and 3 dB means a gain of 2. Similarly, -3 dBm means 0.5 mW, whereas -3 dB means attenuation of 2.

The formula to calculate dBm from mW is:

dBm = 10 log10( P )
1mW

Table of dBm and mW
http://www.guatewireless.org/internetworking/redes/wireless/tabla-de-relacion-entre-dbm-y-potencia-de-transmision-wlan/

Wednesday, February 09, 2011

Running apps

Runtastic (I uninstalled because force to update your device - Internet connection problems) Runkeeper  (Currently testing) Runna (Complex,...