[ cyb / λ / tech ] [ zzz / drg / lit / diy ] [ w / rpg / r / layer ] [ q ] [ / ] [ popular / random / rules / radio / $$ / irc / news ]

/cyb/ - cyberpunk

“There will come a time when it isn't "They're spying on me through my phone", anymore. Eventually, it will be, "My phone is spying on me.””
Name
Email
Subject
Comment
File
Embed
Password (For file deletion.)

RADIO IS BACK
RADIO IS BACK
RADIO IS BACK
RADIO IS BACK

16 things about what the fuck is going on.

*****Weekly project challenge thread! DO EEETT NOW!*****
Check out the new /random/ threadlist
Choose a board, e-mail me and tell me why you want to moderate it. admin@lainchan.org
Watch Texhnolyze with us every Saturday


File: 1401640218089.png (174.42 KB, 468x210, 1401510833004.png)

 No.1372[Last 50 Posts]

Please do not shitpost, this is suppose to be serious.

here's a good source to get you started!
http://opensecuritytraining.info
>>

 No.1374

File: 1401643240687.jpg (73.35 KB, 1280x720, 1393896293198.jpg)

>>1372
Check out the 'External Resources', there's more free stuff.
This is a pretty good collection, too:
https://trailofbits.github.io/ctf/

Places where you can do exercises:
http://captf.com/practice-ctf/
http://www.wechall.net/
http://crackmes.de/

It would be cool to have a Lain CTF or just solve some together!

>>

 No.1381

>>1374
>>1372
Much appreciated!

>>

 No.1391

Is this thread 4real? Will I learn to be a pro hacker if I voraciously study these links?

>>

 No.1395

>>1391
If you do CTFs? Well, maybe you will.

>>

 No.1396

look up Joe McCray, He does some great videos and he's really funny too

>>

 No.1400

File: 1401698217660.png (522.66 KB, 635x833, hack_database.png)

>>1391
Not sure about the pro, but you would get pretty good.

>>

 No.1402

>>1391
everything takes practice, you still need a fundamental knowledge of computers though.

>>

 No.1403

Does anyone here use the blackarch repos for utilities? I kind of need some tips on which tools are worth using. Its a big list of shit and there seem to be a lot of redundancies in the purposes fulfilled by each tool.

For those who don't know what I'm talking about:
http://blackarch.org/tools.html

>>

 No.1406

>>1403
beef and burbsuite are good for web applications
anything with cisco is good

but, the best thing to do is pop open a vm and test the tools yourself, a lot depends on what your looking for, that why everyone shitposts hurdur not making ur own haxxor toolz

it looks like a good list and i would like to check out a few tools! thanks

>>

 No.1423

Anyone here play io.smashthestack.org? I made it to level 8 by going through an article in Phrack 49 along with some brute force. I've been actually learning x86 to continue further.

>>

 No.1430

>>1423
Ive heard quite a bit about this, is it really any good as far as developing skills is concerned

Also, what do you nignogs think about kali as a way to learn about new tools?

>>

 No.1431

>>1423
I have reached level 7 once but I forgot about it so I will probably restart it soon.
Can you link the article please?

>>

 No.1434

>>1430
i guess it would be ok to learn new tools, but of the tools there are already popular, so learning them would be as easy as installing them.

>>

 No.1444

>>1430
I picked up objdump and then gdb. Obviously C and bash skills improved too.
>>1431
It was Smashing the Stack for Fun and Profit. I had to modify the shellcode to get it to work.


>>

 No.1594

It would be cool if we could play CTFs together, even if we suck we would learn so much from each other.

>>

 No.1595

>>1530
Thanks.

I got to level 5 and I tried doing what I found in the article.
When I compiled shellcode.c on my computer and tried to analyse it using gdb as the article recommended, I got some weird shit for the execve function.

(I hope you don't mind intel syntax)


(gdb) disassemble __execve
Dump of assembler code for function execve:
0x0806c470 <+0>: push ebx
0x0806c471 <+1>: mov edx,DWORD PTR [esp+0x10]
0x0806c475 <+5>: mov ecx,DWORD PTR [esp+0xc]
0x0806c479 <+9>: mov ebx,DWORD PTR [esp+0x8]
0x0806c47d <+13>: mov eax,0xb
0x0806c482 <+18>: call DWORD PTR ds:0x80ea9f0
0x0806c488 <+24>: cmp eax,0xfffff000
0x0806c48d <+29>: ja 0x806c491 <execve+33>
0x0806c48f <+31>: pop ebx
0x0806c490 <+32>: ret
0x0806c491 <+33>: mov edx,0xffffffe8
0x0806c497 <+39>: neg eax
0x0806c499 <+41>: mov ecx,DWORD PTR gs:0x0
0x0806c4a0 <+48>: mov DWORD PTR [ecx+edx*1],eax
0x0806c4a3 <+51>: or eax,0xffffffff
0x0806c4a6 <+54>: pop ebx
0x0806c4a7 <+55>: ret
End of assembler dump.


I don't see any interrupts.
Also, I tried disassembling the function that is called and got this, which is even weirder:


(gdb) disassemble ds:0x80ea9f0
No symbol table is loaded. Use the "file" command.
(gdb) disassemble 0x80ea9f0
Dump of assembler code for function _dl_sysinfo:
0x080ea9f0 <+0>: inc eax
0x080ea9f1 <+1>: lock push es
0x080ea9f3 <+3>: or BYTE PTR [eax],ah
End of assembler dump.

>>

 No.1596

Try
disassemble *0x80ea9f0


You can also use this if you don't want to reverse-engineer every single syscall: http://syscalls.kernelgrok.com/

>>

 No.1597

>>1596
thanks,that worked.
And what does the asterisk mean exactly?


(gdb) disassemble *0x80ea9f0
Dump of assembler code for function _dl_sysinfo_int80:
0x0806f040 <+0>: int 0x80
0x0806f042 <+2>: ret
End of assembler dump.

>>

 No.1598

>>1597
The same as in C, it dereferences a pointer. Can you post the disassembly of __execve in AT&T syntax too, please? I wonder how it looks in that.

>>

 No.1599

>>1598
here:

(gdb) disassemble __execve
Dump of assembler code for function execve:
0x0806c470 <+0>: push %ebx
0x0806c471 <+1>: mov 0x10(%esp),%edx
0x0806c475 <+5>: mov 0xc(%esp),%ecx
0x0806c479 <+9>: mov 0x8(%esp),%ebx
0x0806c47d <+13>: mov $0xb,%eax
0x0806c482 <+18>: call *0x80ea9f0
0x0806c488 <+24>: cmp $0xfffff000,%eax
0x0806c48d <+29>: ja 0x806c491 <execve+33>
0x0806c48f <+31>: pop %ebx
0x0806c490 <+32>: ret
0x0806c491 <+33>: mov $0xffffffe8,%edx
0x0806c497 <+39>: neg %eax
0x0806c499 <+41>: mov %gs:0x0,%ecx
0x0806c4a0 <+48>: mov %eax,(%ecx,%edx,1)
0x0806c4a3 <+51>: or $0xffffffff,%eax
0x0806c4a6 <+54>: pop %ebx
0x0806c4a7 <+55>: ret
End of assembler dump.
(gdb) disassemble *0x80ea9f0
Dump of assembler code for function _dl_sysinfo_int80:
0x0806f040 <+0>: int $0x80
0x0806f042 <+2>: ret
End of assembler dump.

>>

 No.1613

How would someone go about deleting system32 on a remote machine.
Do i need a RAT?

>>

 No.1643

>>1613
Just send them that picture that claims their computer will speed up if they delete system32.

>>1599
I don't get why so many hate AT&T syntax. I find it much easier to understand and work with.

>>

 No.1646

>>1643
I don't really hate AT&T, it's just that the little assembly that I did was using Intel syntax (with NASM).

>>

 No.1653

>>1643
Unfortunately the fucker I want to fuck with isn't a complete retard.
He will blindly install stuff from some trusted friends. I might have to social engineer a RAT onto his computer via extension of some friends…

>>

 No.1657

Fuck, why are all of these books written using MASM? Anyone know of any NASM related learning resources?

>>

 No.1872

>>1653
Send him a batfile or vbscript disguised as a jpg. Don't overengineer things.

>>

 No.1887

>>1653
google the SET, it should come with metasploit.
you can get his login info on anysite.

>>

 No.1954

Anyone could recommend some good books? I'm sick of the videos, I just can't concentrate watching them.

>>

 No.1971

>>1954
depends on what you want?
>grey hat hacking third edition
( great for just getting off, main focus is on tools and not making exploits, but that doesn't stop it from being a great book)

>Hacking the art of exploitation Second edition

Best book out there, however, you need to know some ASM and C and you will need to re-read alot to fully understand

>Violent Python a cookbook for hackers 2013

I really like it personally, it mainly focuses on scripting your own tools

>Google

i cannot stress this enough, if you ever have trouble with anything GOOGLE will have some form of a answer, google will be your greatest book, most powerful hacker tool, and your greatest ally.

>>

 No.1981

>>1374
I like this idea, I'd help make a lain ctf. it might help with publicity too

>>

 No.1982

File: 1403834928857.gif (144.14 KB, 180x180, 1402593225787.gif)

>>1595
>>1596
>>1597
>>1599

There is no way i could into reverse engineering, it's practically moon speak

>>

 No.1983

Wow, making an exploit for level 9 of io.smashthestack was quite a challenge. Now I'm stuck at level 10 and not sure what to do.

>>

 No.1986

File: 1403857782098.jpg (13.71 KB, 480x360, fun_things.jpg)

>>1982
Don't give up, reverse engineering can be lots of fun! I suggest checking out Lena's tutorials:
https://tuts4you.com/download.php?view.2876
It's a bit dated and you will need flash to play them, but it's pretty great.
A good book on the topic is `Reversing: Secrets of Reverse Engineering` and if you have problems with assembly, there's `Programming from the Ground Up Book`:
https://savannah.nongnu.org/projects/pgubook/

>>

 No.1994

>>1986
Thanks anon

>>

 No.1998

>>1981
We could start with some little challenges here and make something out of it if there's enough interest.

>>

 No.2061

>>1403
You use blackarch? Would you recommend it as a main distro? My t60 is an empty shell looking for work.

>>

 No.2435

Here's a reverse engineering challenges:
http://flare-on.com/

>WARNING! Some of these challenges may be malicious.

Take care.

>>

 No.2577

>>2435
Anyone doing this? I'm on level 6, it was fun and not that hard so far.

>>

 No.2596

This thread and the links it contains have inspired me to take up C and try some wargames. It's quite a lot of fun and not at all as hard as I'd imagined. Soon we'll all be 1337 hackers!

>>

 No.2624

>>2596
(heavy breathing)
Then we form the Lain electronic army(where figth off all enemies foriegn and domestic)….next we hack the gibson……..then the planet…

>>

 No.2625

File: 1406921061794.jpg (70.17 KB, 500x313, 13770167436.jpg)

>>2624
If any of you know some upcoming CTFs, we could participate as a team with some Lain related name (Knights of the Cyber Calculus or something).

>>

 No.2635

>>2625
that would be awesome as hell,but this board is slow so it will be awhile

>>

 No.2636

>>2625
i'd certainly be interested, although I fear I wouldn't have much to offer in terms of knowledge

>>

 No.2637

File: 1406950235864.png (418.35 KB, 467x438, have_a_good_war.png)

This one is pretty fun, but it requires an account, and it times out if you leave it alone for too long.
https://microcorruption.com/login

>>

 No.2638

btw lains i need help on something. i plan on writing this botnet with python. which ive been learning. ive seen sample codes of irc botnets and i can comprend 70% of the code but i still need help on with it. are irc botnets still viable? Or lains should i just contiune learn python and make some random programs of my own before i head into the botnet.

>>

 No.2639

>>2638

>wanting to write a botnet

That's wrong

>>

 No.2640

File: 1406959148260.jpg (33.18 KB, 593x385, you-disgust-me.jpg)

>>2638
I won't help you. You are a bad person.

>>

 No.2641

>>2640
im sorry ;_; dont be mad its late .

pls correct me on what it is supposed to be called

>>

 No.2642

>>2641
But srsly, continue to learn the language and make programs, then get into any Networkingbotnetthingymajingi stuff.
I mean, you can try it as a big project, but smaller programs would give you more accomplishments and would steadily improve your code, if you show it to people.

>>

 No.2643

>>2641
im building one just to see how it works .im not trying to break into nsa server or steal shit or become l337 haxor (i dont have balls for that)….im just curious on how it works line by line, and im person who learn by doin not by reading it or something.

>>

 No.2644

>>2638
I don't think anyone uses IRC botnets any more, except maybe if the server is a Tor hidden service. But since you are not planning on releasing it into the wild anyway unless you want to spend the rest of your life in prison, writing a simple one shouldn't be much different than a regular IRC bot.

>>

 No.2645

>>2435
>so i downloaded this
>.EXE
>i run it in wine
>i have to accept an eula
>its a self extracting archive
>it fucking crashes
>wtf

>>

 No.2646

>>2645
Thank god for VMs, right?

>>

 No.2647

>>2645
Fuck the EULA, just do
7z e Flare_On_Challenge.EXE

I couldn't even run it because I have no 64 bit computer.

>>

 No.2648

>>2638
>>2643
"IRC Botnets"
Do you mean an IRC bot? Use an existing library, or make your own. There's like a billion tutorials, and the protocol is fairly easy to implement. http://tools.ietf.org/html/rfc1459

>>

 No.2650

>>2646
leave me alone, i can't motivate myself to get into VMs

>>2647
thank you and bog bless 7z

>>

 No.2655

>>1983
You still on level 10? I exploited level 9 on my computer by using
[main() ret addr][XXXX][main() ret addr][%u%u%u%u%u][%.NUM1u%n][%.NUM2u%n][NOP…NOP][SHELLCODE]
, but something is strange with the esp I grab on the smashthestack server. Hopefully I'll be stuck with you soon.

>>

 No.2656

>>2655
Woops. That second address should be offset by 2 because I first write the lower 2 bytes then the higher 2 bytes.

>>

 No.2660

>>2656
Oh shit, I'm level 10 now, but lainchan is ded!

>>

 No.2665

>>2664
>>2660
>>2656
sirs excuse me
how do i level 1 on http://io.smashthestack.org/
i logged in and understood the basic idea but how do i go about solving the stuff
i have used gdb before or whatever, but what do i dooo

>>

 No.2666

>>2665
There's a README in the level1 home directory. Here's some help to get you started if you get lost after the README.

level1@io:~$ less README
level1@io:~$ /levels/level01
Enter the 3 digit passcode to enter: 123
level1@io:~$ gdb -q /levels/level01
Reading symbols from /levels/level01…(no debugging symbols found)…done.
(gdb) set disassembly-flavor intel
(gdb) disassemble main
Dump of assembler code for function main:
0x08048080 <+0>: push 0x8049128
0x08048085 <+5>: call 0x804810f <puts>
0x0804808a <+10>: call 0x804809f <fscanf>
0x0804808f <+15>: cmp eax,0x10f
0x08048094 <+20>: je 0x80480dc <YouWin>
0x0804809a <+26>: call 0x8048103 <exit>
End of assembler dump.
(gdb) print 0x10f
$1 = 271
(gdb) run
Starting program: /levels/level01
Enter the 3 digit passcode to enter: 271
Congrats you found it, now read the password for level2 from /home/level2/.pass
process 4732 is executing new program: /bin/bash
sh-4.2$ exit
exit
[Inferior 1 (process 4732) exited normally]
(gdb) quit
level1@io:~$ /levels/level01
Enter the 3 digit passcode to enter: 271
Congrats you found it, now read the password for level2 from /home/level2/.pass
sh-4.2$ ls -las /home/level2
total 931536
4 dr-xr-x–x 2 level2 level2 4096 Nov 30 2013 .
4 drwxr-xr-x 34 root root 4096 Feb 26 21:14 ..
4 -r——– 1 level2 level2 19 Dec 18 2013 .pass
4 -r–r–r– 1 root root 2246 Oct 9 2012 .vimrc
931520 -rw-r–r– 1 level2 level2 953869666 Aug 3 22:45 tags
sh-4.2$

>>

 No.2889

Normally I don't give a shit about piracy, but I'm kind of weary about pirating from someone capable of making IDA Pro. That price tag is ridiculous though.

It's all hype right? Should I just use radare2 or something?

>>

 No.2898

>>2889
I really want radare2 to succeed, but they are not even close to IDA yet.

>>

 No.2899

>>2666
thank you kind sir

>>

 No.2901

i have the password for level02 but it keeps saying
1. wrong password
or
2. (key,password)
i was wondering if i got the password right? hgvbmkQIHavkGg5wyk

>>

 No.2902

>>2901
Looks right. You can copy-paste in the shell by using Ctrl+Shift+c and Ctrl+Shift+v.

>>

 No.2959

>>2650
>leave me alone, i can't motivate myself to get into VMs
You download VM software and some Linux ISOs. Then you run the VM software, make a new machine, and install with the ISO.

>>

 No.2989

One set of hacking challenges I found a while ago was
http://www.enigmagroup.org/
it seems to deal with upper level / web site hacking (like javascript exploits), I didn't do many of the lessons but it was still pretty useful.
there's an account required but its otherwise free

>>2636
Same here, actually. In other words, lets just keep learning, and share what we know!

>>

 No.2999

hey, i'm new to hacking ect, so im wonderign if one of you can answer this question:
is it possible to hack(?) into this website http://hourlycomic.com/robots.txt and remove the
User-agent: ia_archiver
Disallow: /
in order to access previous versions of the site on waybackmachine?

>>

 No.3000

>>2999
>in order to access previous versions of the site on waybackmachine?
No. If they were disallowed in the robots.txt they couldn't make previous copies of the site.

>>

 No.3011

>>2999
no, sorry. Finding another archive of the site is your best bet

>>

 No.3018

>>2999
I'm not sure if this is what you mean, but if you want future versions to be stored by archive.org, then yes, if you get write access to the website it will do that. But as others have pointed out, time travel is sadly impossible.

>>

 No.3046

>>3000
>>3018
i should clarify
the robot.txt was only added this past year, before that the site was being archived, and the archives reached back to about 2006, but i am no longer able to view these archives because of the robot.txt
i have done some research into it and it seems that if the robot.txt was removed these archives that the wayback machine has would become available again
thanks for your help

>>

 No.3082

>>3046
well, there were some resources on the kind of hacking you're looking for in the thread, you could use those easily enough

>>

 No.3237

File: 1409101069067.jpg (33.85 KB, 781x960, 1405912145220.jpg)

Here are some good CTF games for those just starting out.

http://overthewire.org/wargames/

>>

 No.3238

>>3237
err wargames, my bad

>>

 No.3247

>>3237
I tried a few of these, and a couple of them didn't work for me.

The first case wouldn't accept the password, the second wouldn't keep a connection open. The latter could be (almost certainly is) an issue with the program I wrote for it.

>>

 No.3295

If you send a bunch private messages in quick succession to a user on irc using otr containing the otr v2 handshake their reply is usually large and fast enough for them to get their connection killed by the irc server.

> PRIVMSG ioerror :?OTRv2?

> PRIVMSG ioerror :?OTRv2?
> PRIVMSG ioerror :?OTRv2?
> PRIVMSG ioerror :?OTRv2?
> PRIVMSG ioerror :?OTRv2?
> PRIVMSG ioerror :?OTRv2?
> PRIVMSG ioerror :?OTRv2?
> PRIVMSG ioerror :?OTRv2?

>>

 No.3507

Hi guys. I've looked at the opensecuritytraining link and got interested in learning (I spend a lot of time in front of my computer so why not?), but I was wondering why I would want to learn this aside from it turning into a hobby.
Why do you guys learn to hack?

>>

 No.3517

Gonna be honest here, a lot of people shitpost and generally think down on "hacking", but it's not actually that hard and it's pretty fun.

I've been a "hacker" for around five or six years. Started with writing Batch scripts on Windows XP, and just grew from there to where I am now, reverse engineering stuff, writing exploits for different vulns, and I even got a job as a computer security analyst.

Hacking is fun, uses your brain, and can grant great rewards. Stick with it! Also remember that you don't need CTFs to learn, you can still learn how to hack with real world examples. Want to find some vulnerable servers? Try out either Metasploit or ShodanHQ, or even better, use Metasploit to scan servers you find on ShodanHQ.

>>

 No.3520

There are many definitions for hacker, and we have a wide spectrum here.
I usually only learn to "hack" what I physically own. I want to break, rebuild and improve.

>>

 No.3545

>>3507
Really I like a lot of the definitions of hacking, even the ones that are more about social engineering or cracking (aka the pop culture definition of hacking) but for different reasons.
Childishly no doubt, I like the sense of access to hidden knowledge and insight that comes with doing borderline illegal shit, even if the methods are crude and not in the spirit of hacking, I like to explore the private, lonely parts of wherever I am, either online or offline.
In another sense, I really like the idea of taking something, an idea or piece of electronics, deconstructing to understand its meaning and examining every force at work, then reconstructing for ends of my own or others'. That's another reason why I learn to hack.
There's a sense of satisfaction that comes with hacking something, maybe the reward of a problem solved or job well done. Sometimes I'm just proud of my own originality.

>>

 No.3549

>>3545
i like this definition of hacking best:
>beeing creative with technology
>thinking outside the box

>>

 No.3558

>>3549
Well considering the opinion of the first hackers and the ignorance of the media, it most certainly is the latter.

>>

 No.3641

File: 1410247740236.jpg (36.67 KB, 348x342, 1406876509305.jpg)

So how long would it take a computer rookie to become a master of hacking if he was a hikikomori and spent all day everyday learning?

>>

 No.3643

>>3641
a year

>>

 No.3651

>>3641
You can learn anything pretty quickly, if you actually love it.

>>

 No.3698

File: 1410500946083.jpg (84.99 KB, 602x491, post-241-0-58478400-141030….jpg)

Anyone got the file with the passwords?
Also what do with 5000000 email addresses?
https://forum.btcsec.com/index.php?/topic/9426-gmail-meniai-parol/

>>

 No.3701

>>3698
>Also what do with 5000000 email addresses?
Sell them to spammers.

>>

 No.3707

>>3641
That's a waste of time. Seclude yourself with action movies instead. Then you can become Jackie Chan.

>3698

Print them out and place them on a plaque above your fireplace.

>>

 No.3722

>>3698
flfibej3wc3myvwv.onion/fileuploader
1st file on top has passwords

>>

 No.3723

>>3722
thx man

>>

 No.3886

>>3722
Is it illegal to download?

>>

 No.3895

>>3886
Does it matter?

>>

 No.3901

Just a reminder to keep things as legal as possible, I don't wanna prune this thread since it really is a educational thread

>>

 No.3905

Is anyone still going on smashthestack? Stuck at level 11 with the MD5 collision. Please send reinforcements and hot pockets.

>>

 No.3913

>>3905
I'm on microcorruption, first thing of that variety that I used so I might replay the tutorial 5 times

>>

 No.3921

>>3901
Please don't Mr Mod-kun. This is actually a really helpful thread

>>

 No.3925

>>3901
What here was on the border? or are you making this post just?

>>

 No.3926

>>3925
I'm gonna guess the password file and
>Is it illegal to download?
>Does it matter?
Made the mod post.

>>

 No.3928

>>3926
Well is it actually illegal to download?

>>

 No.3929

>>3925
There was a post that implied that the poster did something illegal.

>>

 No.3930

Is it possible to make a program that goes through all of last.fm's artists and saves them in a txt/html/whatever file, along with its similar artists?

I want to use the site's recommendation system when offline.

>>

 No.3931

>>3930
yeah, what you're thinking of is a web crawler. You can do one in any language but it's probably better to do it with whatever last.fm's api works in.

>>

 No.3932

>>3931
Great, thanks. Noscript breaks lots of fancy websites so it sounds like a useful tool to make.
I'll be reporting back if I get it done.

btw, they made an Asimov joke in their robots.txt

Disallow: /harming/humans
Disallow: /ignoring/human/orders
Disallow: /harm/to/self

>>

 No.3936

>>3932
You know you can allow scripts on NoScript, right?

I generally allow anything that sounds trustworthy, you can middle-click on a script (click with your scroll wheel) and then view it's WOT Scorecard to see if things are trustworthy or tracking and stuff.

>>

 No.3939

>>3936
Whitelisting hasn't been working well for me, I allowed all of last.fm yet I can't add any artist to my library, the dialog doesn't pop up after I click "add".
rateyourmusic's search/rate don't work either, before nor after whitelisting the whole site.

Those are the only fancy (read: useless scripts everywhere) sites I use, so going fuckall and crawling the artists+similars list to a local file and making a program to make the recommendations sounds neat to me.
I could also use it to download music automatically, if combined with deluge or something.

>>

 No.3977

>>3939
>I allowed all of last.fm yet I can't add any artist to my library, the dialog doesn't pop up after I click "add".
Maybe they pull in JavaScript from other places?

>>

 No.3982

>>3977
How awful. I was already convinced to make the alternative anyway.

>>

 No.4866

I can post a huge collection of kali books that are really good, if anyone wants…

>>

 No.4870

>>4866
yes, please use >>/lit/

>>

 No.4883

>>1982
It's just assembly language anon
Learn basic processor architecture and learn basic commands and ur gud homey

>>

 No.4902

What frameworks do you use?
>metasploit
>recon-ng
>beEF

>>

 No.4943

>>4902
>frameworks
lel

>>

 No.4981

>doing some things on a debian VPS
>netstat, see a chinese IP connected on ssh
>huh?
>ps aux
>sshd: root [priv]
>sshd: root@pts/2
>NONONONO KILL IT WITH FIRE
>stop ssh
>kill sshd on that fucker

Apparently shellshock works on SSH. I even have root login disabled on it.

Time to search for rootkits. Just when I got everything working. Sigh.

>>

 No.4983

>>4981
Update your shit, dude. Debian pushed shellshock fixes over a week ago. Then you need to purge your authorized_keys files and change your root password.

>>

 No.4984

>>4983
It's updated allright, and I did all that shit you suggested.

I'm still confused on how he actually got in.

>>

 No.4985

>>4984
>>4983
Lel, he tried to install Jynx but bitches don't know about my asmutils

>>

 No.4986

>>4984
He probably got in before you updated.

>>

 No.4987

>>4986
The first thing I did when I got the box was an upgrade. Dunno tho, maybe his scanner beat apt-get in the race.

>>

 No.4989

>>4987
Yeah, could have been a lucky grab for him.

Is your VPS open to the internet or behind a NAT? Also do you have access restrictions? (I know you said you have root login disabled, so I assume so)

>>

 No.4990

>>4989
Open to the internet, I was setting up iptables when the fucker connected.

>>

 No.4993

>>4989
>Yeah, could have been a lucky grab for him.
Maybe he's looking for servers trying to update?

>>

 No.4994

File: 1414000423678.jpg (103.87 KB, 600x855, 1413446302194.jpg)

>>4981
China will never prosecute this guy or extradite him to your country. He can keep this up forever!

>>

 No.4996

>>4994
Well tbh I don't mind him pwning boxes as long as he doesn't pwn mine. Network exploration may be a bit questionable hobby, but it sure can be fun.
I bet the blackhats here can agree. I'm not a hacker tho, unless we are talking about the RMS chopstick hacking.

>>

 No.5108

My desktop recently got owned. Now I have a persistent BIOS infection. It's pretty bad, but it's interesting to read about.

>>

 No.5414

>>5108
How does that even happen?

>>

 No.5645

>>5414
my thoughts exactly

i wonder how you came to this conclusion >>5108

>>

 No.5881

>>5108
>>5414
>>5645

Maybe he just made somebody mad. I remember reading about this guy who got scammed and terrorized by the Triads in just that way

>>

 No.5893

File: 1416411825075.png (124.91 KB, 500x475, 1404181408068.png)

OK, Back to Pen-testing
https://www.pentesterlab.com
Has anyone used this resource?
Is it good?

>>

 No.5902

>>4996
Pwning boxes is fun. I just mess around and scan huge IP Ranges for vuln boxes.

Protip to anyone looking to do this: Invest in a Raspberry Pi or two. Virtually silent and you can just have it run NMap scans and send the results to you, it's great. I hated having to leave my desktop on when scanning a 65k IP address range (0.0.x.x) and was actually planning on buying a small server rack or something to do it until I discovered the Pi.

>>

 No.5913

>>5902
why not just make a simple script on free hosting server?
or better yet, use those boxes aforementioned?

>>

 No.5931

>>5902
nmap is old news, check out https://zmap.io/
but why do that soykaf from your own IP?

>>

 No.5941

So I have a problem, I'm trying to crack a piece of software that requires me to get around a login. There's already a crack available for a similar piece of software that gets around it. The structure of the problem software is it's multilingual and it's all hosted in a single exe. I've tried using IDR and OllyDBG to help but I'm pretty lost with what to do. I feel like I'm kind of in over my head with this, mainly cause I've never done this kind of stuff before.

So, where exactly should I start looking? Should I try to repurpose the original crack? From what I've gathered about it is that it either changes the memory location of the login to this php script or just fills it with nothing so the program just skips over it when it sees it (pretty sure that's not how that works though)

>>

 No.5942

>>5941
IDA* my bad

>>

 No.5943

>>5941
You could try this in Olly:
- run it
- get the "bad serial" message
- pause it
- execute until user code
This should lead you to the code that displays the error, backtracing from here could lead you to the actual verification code.

Makes me wonder, is there any software for collaborative reverse-engineering?

>>

 No.5944

>>5943
Weird, everytime I run the debugger it gives me a libcef error in the folder the exe is in

>>

 No.5945

>>5943
>Collaborative reverse engineering
We discuss it in our own thread.

>>

 No.6178

File: 1417007014983.jpeg (23.5 KB, 480x360, RAW-SOCKETS[1].jpeg)

for the lainons, raw socket programming in C
http://urlm.in/tcje

>>

 No.6208

>>5931
zmap isn't appropriate for some of the tasks that nmap is. It's a very specialized tool. If you want to go next-level try unicornscan

>>

 No.7187

More resources Tell me what you think!

>introduction

https://www.pentesterlab.com
http://www.hackthissite.org/
http://www.win.tue.nl/~aeb/linux/hh/hh.html


>Best computer security course you can get!

>includes homework, videos tutorials, exploit dev, web app hacking etc.
>all under creative commons
https://docs.google.com/document/d/1XGW7UdE5sAw9KUbO3awy7fYksBiLvX4DXPZMYTqYJ80/edit?pli=1

>>

 No.7327

>>1374
Came here to say wechall.net. Thank you.

>>

 No.7345

>>1396
Wow, that was good. I'm going to start learning how to work with these debuggers now.

>>

 No.7748

so there is this software "Joern" you can use to write code traversal queries for easier c code auditing
http://media.ccc.de/browse/congress/2014/31c3_-_6534_-_en_-_saal_g_-_201412282030_-_mining_for_bugs_with_graph_database_queries_-_fabs.html#video&t=124
https://mlsec.org/joern/

has anyone tried it? also, gently bumping this thread, and the talk is very interesting, and don't write your stuff in C if you can avoid it :-)

also, if you have seen that >>1396 video the part at 36 minutes will actually make sense

>>

 No.8369

>>1374
where would i learn to solve CTFS?

>>

 No.8400

any lains want to work on CTFs during weekends together?

we could meet in #lainchan on saturday and pick a random CTF to try.

I think it would be good for improving our skills.

>>

 No.8402

>>8400
That sounds fun, lets give it a try!

>>

 No.8403

>>8402
cool! see you next week :) I nominate microcorruption as a default (its easy to get into), if anyone has another CTF they'd rather do please suggest it.



Delete Post [ ]