Monday, August 31, 2020

How Block Chain Technology Can Help Fight Wuhan Corona Virus Outbreak

As the death toll and the infected cases of widespread coronavirus continue to increase, global organizations and the tech industry has come forward with technology like blockchain to fight coronavirus.

Along with the equipment and monetary support, technology also withstands against the virus with better plans and solutions. Hence, tech industries have started leveraging blockchain technology in the wake of a global health emergency.

Blockchain Helps In Real-Time Online Tracking

The Center for Systems Science and Engineering has already set up an online platform to track coronavirus and visualize the growing number of infected patients in real-time.

But Acoer, an Atlanta-based blockchain app developer, has also launched an alternative online data visualization tool to easily trail and depict the Cororanvirus outbreak using blockchain technology.

Acoer platform, named HashLog, is more advanced and clear as it pulls the data from the Hedera Hashgraph database using the HashLog data visualization engine.

Hedera Hashgraph is an immutable, transparent and decentralized database based on distributed ledger technology that provides synchronized and unchangeable data from the public networks.

Moreover, researchers, scientists, and journalists can use the HashLog dashboard to understand the spread of the virus and act against it swiftly.

For data sources, Johns Hopkins CSSE extracts data from WHO, CDC, ECDC, NHC, and DXY. On the other hand, Acoer maps the public data, including data from the Center for Disease Control (CDC) and the World Health Organization (WHO). Therefore, data may differ on both platforms.

(left) CSSA and Acoer (right)

Blockchain Can Help Monitor And Control Money Flow

To fight the further spread of the coronavirus (2019-nCoV) outbreak globally, China has also received abundant monetary support from the international community to create better action plans.

China's govt-led organization and charities are responsible for overseeing and utilizing the influx of money to research and generate a solution for coronavirus. But due to the lack of coordination and mismanagement among the various organization, money is not being laid out to curb the crisis.

Recently, a paper published by Syren Johnstone, from the University of Hong Kong, discusses the problems encountered by charities, in China and elsewhere. It argues that the present crisis should be seen as a call to arms.

Syren urges for a borderless solution with better management of donations and implementation using the emerging tech like Blockchain and Artificial Intelligence.

Keeping that in mind, Hyperchain, a Chinese company, also announced blockchain-based charity platform to streamline the donation from all over the world.

Since the Hyperchain platform is based on the blockchain, it offers more transparency among the sender and receiver of funds to bring trust and immutability to restrict the transaction data deletion.

Overall, Hyperchain improves administrative function for the money and also extends the logistics actions.

@HACKER NT

Read more


  1. Pentest Box Tools Download
  2. Hack Tools Pc
  3. Pentest Tools For Mac
  4. Hacker Tools Mac
  5. How To Install Pentest Tools In Ubuntu
  6. Hacker Hardware Tools
  7. Hacker Tools Mac
  8. Hack Rom Tools
  9. Hack Tools For Mac
  10. Pentest Tools For Mac
  11. Hacking Tools For Pc
  12. Physical Pentest Tools
  13. Pentest Reporting Tools
  14. Hacking Tools Usb
  15. Pentest Tools Port Scanner
  16. Pentest Tools Apk
  17. Black Hat Hacker Tools
  18. Hack Rom Tools
  19. Beginner Hacker Tools
  20. Android Hack Tools Github
  21. Hack Tools For Games
  22. Hacker Tools Software
  23. Pentest Tools Windows
  24. Install Pentest Tools Ubuntu
  25. Hacker Tools Github
  26. Hacks And Tools
  27. Hacker Tools For Pc
  28. Hacker Tools Linux
  29. How To Install Pentest Tools In Ubuntu
  30. Github Hacking Tools
  31. Hacker Tools List
  32. Pentest Tools Subdomain
  33. Blackhat Hacker Tools
  34. Hacker Tools 2020
  35. Growth Hacker Tools
  36. Pentest Recon Tools
  37. Hacking Tools Windows 10
  38. Hack Tools For Ubuntu
  39. Hacking Tools
  40. Hacking Tools 2020
  41. Hacking Tools For Games
  42. Hack Tools 2019
  43. Free Pentest Tools For Windows
  44. Hacking Tools Name
  45. Hacking Tools For Beginners
  46. Github Hacking Tools
  47. Pentest Tools Android
  48. Hacking Tools For Mac
  49. Pentest Tools For Ubuntu
  50. Best Hacking Tools 2020
  51. Hacker Security Tools
  52. Hack Tool Apk No Root
  53. Hackrf Tools
  54. Hack Tools Mac
  55. Hacker Tools Mac
  56. Hacking Tools
  57. Pentest Tools Framework
  58. Pentest Tools For Ubuntu
  59. Hack Tools Mac
  60. New Hack Tools

Sunday, August 30, 2020

CEH: Gathering Network And Host Information, Types Of Scan


In Hacking the main focus is over gathering the information about victim or victim's machine. Which will help to find out which type of exploit will works according to the given circumstances. Gathering the network and host information means to find out by which network, the which victim's machine is connected and communicating over the network. Moreover, scanning is also performed for gathering information about open and closed ports. After that they'll able to find the vulnerabilities in the target system and try to get access to the system.

Types Of Scan

As a CEH you should know the scan types and uses:

SYN

SYN scan doesn't complete the TCP three way handshake that is why it is known as a half-open scan. An attacker send a SYN packet to the victim machine if SYN/ACK packet is received back to attacker, then it clarify that the port is listening due to the acknowledgment by the victim that it has completed the connection. While if the attacker is received the RST/ACK packet then it assumed that the port is closed or open.


XMAS

XMAS scan works only on target system that has the RFC 793 development of TCP/IP and it doesn't works against any version of windows.
XMAS scan send a packet with by setting up the FIN, URG and PSH flags of the TCP header. The function of this scan is if the port is active there will be no response but if the port is closed the target responds with a RST/ACK packet.


FIN

A FIN scan send a packet by setting up only the FIN flag of the TCP. This scan is similar to XMAS scan. FIN scan receives no response if the port is active while if the port is closed it receives the RST/ACK packet.


NULL 

NULL scan is also similar to the XMAS scan. But the only difference is that it sends a packet without setting up the any flag of TCP header. NULL scan receives no response if the port is open but if the port is closed it receives the RST/ACK packet.


IDLE

It is just like spoofing an IP address by sending a SYN packet to the victim's machine to find out which services are available over the system. This scan is completed with the help of another system called as "Zombie" (that is not receiving or transmitting any information).


Related word

WiFi Hacking On Tablets

Disclaimer: Don't hack anything where you don't have the authorization to do so. Stay legal.

Ever since I bought my first Android device, I wanted to use the device for WEP cracking. Not because I need it, but I want it :) After some googling, I read that you can't use your WiFi chipset for packet injection, and I forgot the whole topic.

After a while, I read about hacking on tablets (this was around a year ago), and my first opinion was: 
"This is stupid, lame, and the usage of that can be very limited".

After playing one day with it, my opinion just changed: 
"This is stupid, lame, the usage is limited, but when it works, it is really funny :-)"

At the beginning I looked at the Pwn Pad as a device that can replace a pentest workstation, working at the attacker side. Boy was I wrong. Pwn Pad should be used as a pentest device deployed at the victim's side!

You have the following options:
  1. You have 1095 USD + VAT + shipping to buy this Pwn Pad
  2. You have around 200 USD to buy an old Nexus 7 tablet, a USB OTG cable, a USB WiFi dongle (e.g. TP-Link Wireless TL-WN722N USB adapter works).



In my example, I bought a used, old 2012 Nexus WiFi. Originally I bought this to play with different custom Android ROMs, and play with rooted applications. After a while, I found this Pwn Pad hype again and gave it a shot.

The Pwn Pad community edition has an easy-to-use installer, with a proper installation description. Don't forget to backup everything from your tablet before installing Pwn Pad on it!

I don't want to repeat the install guide, it is as easy as ABC. I booted a Ubuntu Live CD, installed adb and fastboot, and it was ready-to-roll. I have not measured the time, but the whole process was around 20 minutes.


The internal WiFi chipset can be used to sniff traffic or even ARP poisoning for active MiTM. But in my case, I was not able to use the internal chipset for packet injection, which means you can't use it for WEP cracking, WPA disauth, etc. This is where the external USB WiFi comes handy. And this is why we need the Pwn Pad Android ROM, and can't use an average ROM.

There are two things where Pwn Pad really rocks. The first one is the integrated drivers for the external WiFi with monitor mode and packet injection capabilities. The second cool thing is the chroot wrapper around the Linux hacking tools. Every hacking tool has a start icon, so it feels like it is a native Android application, although it is running in a chroot Kali environment.

Wifite

The first recommended app is Wifite. Think of it as a wrapper around the aircrack - airmon - airodump suite. My biggest problem with WEP cracking was that I had to remember a bunch of commands, or have the WEP cracking manual with me every time I have to crack it. It was overcomplicated. But thanks to Wifite, that is past.

In order to crack a WEP key, you have to:
  1. Start the Wifite app
  2. Choose your adapter (the USB WiFi)

  3. Choose the target network (wep_lan in the next example)
  4. Wait for a minute 
  5. PROFIT!

SSH reverse shell

This is one of the key functionalities of the Pwn Pad. You deploy the tablet at the Victim side, and let the tablet connect to your server via (tunneled) SSH.

The basic concept of the reverse shells are that an SSH tunnel is established between the Pwn Pad tablet (client) and your external SSH server (either directly or encapsulated in other tunneling protocol), and remote port forward is set up, which means on your SSH server you connect to a localport which is forwarded to the Pwn Pad and handled by the Pwn Pad SSH server.

I believe the best option would be to use the reverse shell over 3G, and let the tablet connect to the victim network through Ethernet or WiFi. But your preference might vary. The steps for reverse shells are again well documented in the documentation, except that by default you also have to start the SSH server on the Pwn Pad. It is not hard, there is an app for that ;-) On your external SSH server you might need to install stunnel and ptunnel if you are not using Kali. The following output shows what you can see on your external SSH server after successful reverse shell.

root@myserver:/home/ubuntu# ssh -p 3333 pwnie@localhost
The authenticity of host '[localhost]:3333 ([127.0.0.1]:3333)' can't be established.
ECDSA key fingerprint is 14:d4:67:04:90:30:18:a4:7a:f6:82:04:e0:3c:c6:dc.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '[localhost]:3333' (ECDSA) to the list of known hosts.
pwnie@localhost's password:
  _____      ___  _ ___ ___   _____  _____ ___ ___ ___ ___
 | _ \ \    / / \| |_ _| __| | __\ \/ / _ \ _ \ __/ __/ __|
 |  _/\ \/\/ /| .` || || _|  | _| >  <|  _/   / _|\__ \__ \
 |_|   \_/\_/ |_|\_|___|___| |___/_/\_\_| |_|_\___|___/___/

 Release Version: 1.5.5
 Release Date: 2014-01-30
 Copyright 2014 Pwnie Express. All rights reserved.

 By using this product you agree to the terms of the Rapid Focus
 Security EULA: http://pwnieexpress.com/pdfs/RFSEULA.pdf

 This product contains both open source and proprietary software.
 Proprietary software is distributed under the terms of the EULA.
 Open source software is distributed under the GNU GPL:
 http://www.gnu.org/licenses/gpl.html

pwnie@localhost:~$

Now you have a shell on a machine that is connected to the victim network. Sweet :) Now Metasploit really makes sense on the tablet, and all other command-line tools.

EvilAP and DSniff

Start EvilAP (it is again a wrapper around airobase), choose interface (for me the Internal Nexus Wifi worked), enter an SSID (e.g freewifi), enter channel, choose whether force all clients to connect to you or just those who really want to connect to you, and start.


The next step is to start DSniff, choose interface at0, and wait :) In this example, I used a popular Hungarian webmail, which has a checkbox option for "secure" login (with default off). There are sooo many problems with this approach, e.g. you can't check the certificate before connecting, and the login page is delivered over HTTP, so one can disable the secure login checkbox seamlessly in the background, etc. In this case, I left the "secure" option on default off.



In the next tutorial, I'm going to show my next favorite app, DSploit ;)

Lessons learned

Hacking has been never so easy before
In a home environment, only use WPA2 PSK
Choose a long, nondictionary passphrase as the password for WPA2
Don't share your WiFi passwords with people you don't trust, or change it when they don't need it anymore
Don't let your client device auto-connect to WiFi stations, even if the SSID looks familiar

I believe during an engagement a Pwn Plug has better "physical cloaking" possibilities, but playing with the Pwn Pad Community Edition really gave me fun moments.

And last but not least I would like to thank to the Pwn Pad developers for releasing the Community Edition!

Related links


Ask And You Shall Receive



I get emails from readers asking for specific malware samples and thought I would make a mini post about it.

Yes, I often obtain samples from various sources for my own research.

 I am sometimes too lazy/busy to post them but don't mind sharing.
If you are looking for a particular sample, feel free to ask. I might have it.

Send MD5 (several or few samples). I cannot provide hundreds/thousands of samples or any kind of feeds. If you ask for a particular family, I might be able to help if I already have it.

Unfortunately, I do not have time to do homework for students and provide very specific sets for malware with specific features as well as guarantee the C2s are still active.  Send your MD5(s) or at least malware family and I check if I have it :) If i have it, I will either send you or will post on the blog where you can download.

If you emailed me in the past and never got an answer, please remind me. Sometimes emails are long with many questions and I flag them to reply to later, when I have time and they get buried or I forget. It does not happen very often but accept my apologies if it happened to you.

Before you ask, check if it is already available via Contagio or Contagio Mobile.
1. Search the blog using the search box on the right side
2. Search here https://www.mediafire.com/folder/b8xxm22zrrqm4/BADINFECT
3. Search here https://www.mediafire.com/folder/c2az029ch6cke/TRAFFIC_PATTERNS_COLLECTION
4. Search here https://www.mediafire.com/folder/78npy8h7h0g9y/MOBILEMALWARE

Cheers,  Mila

More articles


  1. Hacking Tools Mac
  2. Hacker Tools Hardware
  3. Hacker Tools Github
  4. Hacking Tools Windows
  5. Blackhat Hacker Tools
  6. Hacking Tools
  7. Hacking Tools Online
  8. Easy Hack Tools
  9. Hacker Tools Software
  10. Pentest Tools Review
  11. Hacker Tools Free
  12. Github Hacking Tools
  13. Hacking Tools Usb
  14. Hacker
  15. Hacking Tools Kit
  16. Pentest Tools Website
  17. Hak5 Tools
  18. Hack Tools For Pc
  19. Hacker Tools Free Download
  20. Hack Tools Mac
  21. Kik Hack Tools
  22. Hacking Tools Github
  23. Nsa Hack Tools
  24. Tools 4 Hack
  25. Hacking Tools Name
  26. Underground Hacker Sites
  27. Hack And Tools
  28. Hack Rom Tools
  29. Hacking Tools Windows 10
  30. Pentest Tools Windows
  31. Hack Apps
  32. What Is Hacking Tools
  33. Pentest Tools Github
  34. Computer Hacker
  35. Black Hat Hacker Tools
  36. Hack Tools
  37. Hacker
  38. Hacking Tools For Windows 7
  39. Hack And Tools
  40. Pentest Tools Apk
  41. Bluetooth Hacking Tools Kali
  42. Github Hacking Tools
  43. Pentest Tools
  44. Black Hat Hacker Tools
  45. Hacker Tools Windows
  46. Hacking Tools Windows 10
  47. Hacking Tools Mac
  48. Pentest Tools List
  49. Nsa Hacker Tools
  50. Android Hack Tools Github
  51. Hacker Tools For Pc
  52. Pentest Tools For Mac
  53. Black Hat Hacker Tools
  54. Hack Apps
  55. Pentest Tools Port Scanner
  56. Hacking Tools Hardware
  57. Hacking Tools Online
  58. Pentest Tools Online
  59. Hacking Tools Windows
  60. New Hack Tools
  61. Hacking Tools For Beginners
  62. Hacking Tools Kit
  63. Pentest Tools Open Source
  64. Install Pentest Tools Ubuntu
  65. Github Hacking Tools
  66. Hack Tools For Games
  67. Hack And Tools
  68. Hack Tools
  69. Hack Rom Tools
  70. Hacker Tools Free Download
  71. Github Hacking Tools
  72. How To Hack
  73. Hacker Tool Kit
  74. Hack Tools
  75. Hacker Tools 2020
  76. Hack Tools
  77. Underground Hacker Sites
  78. Hacking Tools For Windows Free Download
  79. What Is Hacking Tools
  80. Hacking Tools Github
  81. Hak5 Tools
  82. Easy Hack Tools
  83. Hacker Tools
  84. Wifi Hacker Tools For Windows
  85. Pentest Tools Url Fuzzer
  86. Hacker Tools
  87. Hack Tools
  88. Install Pentest Tools Ubuntu
  89. Pentest Tools Website Vulnerability
  90. Hacking Tools Software
  91. Pentest Tools Free
  92. Hacking Tools 2019
  93. Best Hacking Tools 2020
  94. Hacking Tools Usb
  95. Hacking Tools Pc
  96. Hacking Tools For Mac
  97. Usb Pentest Tools
  98. Hacker Tools Free Download
  99. Hacking Tools 2020
  100. Android Hack Tools Github
  101. Hacking Tools Software
  102. Hacker Tools For Pc
  103. How To Make Hacking Tools
  104. Usb Pentest Tools
  105. Hacking Tools For Beginners
  106. Hack Tools 2019
  107. Hacking Tools Windows
  108. Tools 4 Hack
  109. Hacking Tools Windows
  110. Easy Hack Tools
  111. Pentest Tools Online
  112. Pentest Tools Tcp Port Scanner
  113. Pentest Tools For Ubuntu
  114. Hacking Tools For Windows
  115. Hack Tools Online
  116. Hack Website Online Tool
  117. Kik Hack Tools
  118. New Hack Tools
  119. Best Hacking Tools 2019
  120. Hacker Tools
  121. Hack Tools Mac
  122. Hacking Tools Mac
  123. Pentest Tools Download
  124. Hacker Tools
  125. Hack Tools For Pc
  126. How To Hack
  127. Hacker Tools
  128. Tools 4 Hack
  129. Hack Tools Github
  130. Tools 4 Hack
  131. Pentest Tools For Android
  132. Hacking Tools Windows 10
  133. Hacker Tools Apk Download
  134. Hak5 Tools
  135. Best Hacking Tools 2020
  136. Hacker Tool Kit
  137. Hacker Tools Apk
  138. Hacking Tools 2019
  139. Hacking Tools 2020
  140. Hacker

Search This Blog