Darknet https://www.darknet.org.uk Hacking Tools, Hacker News & Cyber Security Thu, 30 Aug 2018 06:10:14 +0000 en-US hourly 1 https://wordpress.org/?v=4.9.8 https://www.darknet.org.uk/images/darknet_logo_small.jpghttps://www.darknet.org.uk/images/darknet_logo_small.jpgdf6f0b Intercepter-NG – Android App For Hacking https://www.darknet.org.uk/2018/08/intercepter-ng-android-app-for-hacking/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed https://www.darknet.org.uk/2018/08/intercepter-ng-android-app-for-hacking/#comments Thu, 30 Aug 2018 06:09:53 +0000 https://www.darknet.org.uk/?p=4776 Intercepter-NG – Android App For Hacking

Intercepter-NG is a multi functional network toolkit including an Android app for hacking, the main purpose is to recover interesting data from the network stream and perform different kinds of MiTM attacks.

Specifically referring to Intercepter-NG Console Edition which works on a range of systems including NT, Linux, BSD, MacOSX, IOS and Android.

The Windows version is the one with the most powerful feature-set, but the Android app is fairly handy too.

Read the rest of Intercepter-NG – Android App For Hacking now! Only available at Darknet.

https://www.darknet.org.uk/2018/08/intercepter-ng-android-app-for-hacking/feed/ 2
dcipher – Online Hash Cracking Using Rainbow & Lookup Tables https://www.darknet.org.uk/2018/08/dcipher-online-hash-cracking-using-rainbow-lookup-tables/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed https://www.darknet.org.uk/2018/08/dcipher-online-hash-cracking-using-rainbow-lookup-tables/#respond Mon, 20 Aug 2018 07:49:40 +0000 https://www.darknet.org.uk/?p=5013 dcipher – Online Hash Cracking Using Rainbow & Lookup Tables

dcipher is a JavaScript-based online hash cracking tool to decipher hashes using online rainbow & lookup table attack services.

The capacity to programmatically crack passwords is also a function of the number of possible passwords per second which can be checked. If a hash of the target password is available to the attacker, this number can be in the billions or trillions per second, since an offline attack is possible.

In this case dcipher uses online hash checking services, which have extremely large Rainbow Table sets of pre-computed hashes, to rapidly find hash collisions.

Read the rest of dcipher – Online Hash Cracking Using Rainbow & Lookup Tables now! Only available at Darknet.

https://www.darknet.org.uk/2018/08/dcipher-online-hash-cracking-using-rainbow-lookup-tables/feed/ 0
HTTP Security Considerations – An Introduction To HTTP Basics https://www.darknet.org.uk/2018/08/http-security-considerations-an-introduction-to-http-basics/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed https://www.darknet.org.uk/2018/08/http-security-considerations-an-introduction-to-http-basics/#respond Sat, 11 Aug 2018 16:01:33 +0000 https://www.darknet.org.uk/?p=5056 HTTP Security Considerations – An Introduction To HTTP Basics

HTTP is ubiquitous now with pretty much everything being powered by an API, a web application or some kind of cloud-based HTTP driven infrastructure. With that HTTP Security becomes paramount and to secure HTTP you have to understand it.

HTTP is the protocol that powers the web and to penetrate via a web service it pays to have a good solid foundational understanding of HTTP, how it works and the common response codes – many of which can lead to some kind of vulnerability which is exploitable.

Read the rest of HTTP Security Considerations – An Introduction To HTTP Basics now! Only available at Darknet.

https://www.darknet.org.uk/2018/08/http-security-considerations-an-introduction-to-http-basics/feed/ 0
Cangibrina – Admin Dashboard Finder Tool https://www.darknet.org.uk/2018/08/cangibrina-admin-dashboard-finder-tool/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed https://www.darknet.org.uk/2018/08/cangibrina-admin-dashboard-finder-tool/#respond Mon, 06 Aug 2018 09:30:52 +0000 https://www.darknet.org.uk/?p=5051 Cangibrina – Admin Dashboard Finder Tool

Cangibrina is a Python-based multi platform admin dashboard finder tool which aims to obtain the location of website dashboards by using brute-force, wordlists, Google, Nmap and robots.txt.

It is multi-threaded, supports modifying your user agent, using a TOR proxy, custom dorks, Nmap integration and can use both DuckDuckGo and Google.

Cangibrina Admin Dashboard Finder Requirements

  • Python 2.7
  • mechanize
  • PySocks
  • beautifulsoup4
  • html5lib
  • Nmap
  • TOR

Cangibrina Usage to Find Admin Dashboards

usage: cangibrina.py [-h] -u U [-w W] [-t T] [-v] [--ext EXT] [--user-agent]
[--tor] [--search] [--dork DORK] [--nmap [NMAP]]

Fast and powerful admin finder

optional arguments:
-h, --help show this help message and exit
-u U target site
-w W set wordlist (default: wl_medium)
-t T set threads number (default: 5)
-v enable verbose
--ext EXT filter path by target extension
--user-agent modify user-agent
--sub-domain search for sub domains instead of directories
--tor set TOR proxy
--search use google and duckduckgo to search
--dork DORK set custom dork
--nmap [NMAP] use nmap to scan ports and services

There are other specific tools in this area like WPScan for WordPress and DruPwn for Drupal – and in those cases the dashboard URLs are already known.

Read the rest of Cangibrina – Admin Dashboard Finder Tool now! Only available at Darknet.

https://www.darknet.org.uk/2018/08/cangibrina-admin-dashboard-finder-tool/feed/ 0
Enumall – Subdomain Discovery Using Recon-ng & AltDNS https://www.darknet.org.uk/2018/07/enumall-subdomain-discovery-using-recon-ng-altdns/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed https://www.darknet.org.uk/2018/07/enumall-subdomain-discovery-using-recon-ng-altdns/#respond Mon, 30 Jul 2018 16:08:50 +0000 https://www.darknet.org.uk/?p=4768 Enumall – Subdomain Discovery Using Recon-ng & AltDNS

Enumall is a Python-based tool that helps you do subdomain discovery using only one command by combining the abilities of Recon-ng and AltDNS.

This gives you the ability to run multiple domains within the same session. The tool only has one module that needs an API key (/api/google_site) find instructions for that on the recon-ng wiki.

Setting up Enumall for Subdomain Discovery

Install recon-ng from Source, clone the Recon-ng repository:

git clone https://LaNMaSteR53@bitbucket.org/LaNMaSteR53/recon-ng.git

Change into the Recon-ng directory:

cd recon-ng

Install dependencies:

pip install -r REQUIREMENTS

Link the installation directory to /usr/share/recon-ng

ln -s /$recon-ng_path /usr/share/recon-ng

Optionally (highly recommended) download:

– AltDNS
– A good subdomain bruteforce list (example here)

Create the config.py file and specify the path to Recon-ng and AltDNS as it showed in config_sample.py.

Read the rest of Enumall – Subdomain Discovery Using Recon-ng & AltDNS now! Only available at Darknet.

https://www.darknet.org.uk/2018/07/enumall-subdomain-discovery-using-recon-ng-altdns/feed/ 0
RidRelay – SMB Relay Attack For Username Enumeration https://www.darknet.org.uk/2018/07/ridrelay-smb-relay-attack-for-username-enumeration/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed Sat, 21 Jul 2018 09:25:18 +0000 https://www.darknet.org.uk/?p=5014 RidRelay – SMB Relay Attack For Username Enumeration

RidRelay is a Python-based tool to enumerate usernames on a domain where you have no credentials by using a SMB Relay Attack with low privileges.

How RidRelay SMB Relay Attack Works

RidRelay combines the SMB Relay attack, common lsarpc based queries and RID cycling to get a list of domain usernames. It takes these steps:

  1. Spins up an SMB server and waits for an incoming SMB connection
  2. The incoming credentials are relayed to a specified target, creating a connection with the context of the relayed user
  3. Queries are made down the SMB connection to the lsarpc pipe to get the list of domain usernames.

Read the rest of RidRelay – SMB Relay Attack For Username Enumeration now! Only available at Darknet.

NetBScanner – NetBIOS Network Scanner https://www.darknet.org.uk/2018/07/netbscanner-netbios-network-scanner/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed Sat, 07 Jul 2018 19:11:41 +0000 https://www.darknet.org.uk/?p=4759 NetBScanner – NetBIOS Network Scanner

NetBScanner is a NetBIOS network scanner tool that scans all computers in the IP addresses range you choose, using the NetBIOS protocol.

For every computer located by this NetBIOS scanner, the following information is displayed:

  • IP Address
  • Computer Name
  • Workgroup or Domain
  • MAC Address
  • Network adapter manufacturer (from MAC address).

NetBScanner also shows whether a computer is a Master Browser.

Read the rest of NetBScanner – NetBIOS Network Scanner now! Only available at Darknet.

Metta – Information Security Adversarial Simulation Tool https://www.darknet.org.uk/2018/06/metta-information-security-adversarial-simulation-tool/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed Wed, 27 Jun 2018 15:15:49 +0000 https://www.darknet.org.uk/?p=5012 Metta – Information Security Adversarial Simulation Tool

Metta is an information security preparedness tool in Python to help with adversarial simulation, this can help you check various detection and control capabilities within your organisation.

This project uses Redis/Celery, python, and vagrant with virtualbox to do adversarial simulation. This allows you to test (mostly) your host based instrumentation but may also allow you to test any network based detection and controls depending on how you set up your vagrants.

Read the rest of Metta – Information Security Adversarial Simulation Tool now! Only available at Darknet.

Powershell-RAT – Gmail Exfiltration RAT https://www.darknet.org.uk/2018/06/powershell-rat-gmail-exfiltration-rat/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed https://www.darknet.org.uk/2018/06/powershell-rat-gmail-exfiltration-rat/#comments Sun, 24 Jun 2018 07:30:20 +0000 https://www.darknet.org.uk/?p=4983 Powershell-RAT – Gmail Exfiltration RAT

Powershell-RAT is a Python-based Gmail exfiltration RAT that can be used a Windows backdoor to send screenshots or other data as an e-mail attachment.

This RAT will help you during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends the information to an attacker as an e-mail attachment.

It claims to not need Administrator access and is not currently detected by Anti-virus software.

Read the rest of Powershell-RAT – Gmail Exfiltration RAT now! Only available at Darknet.

https://www.darknet.org.uk/2018/06/powershell-rat-gmail-exfiltration-rat/feed/ 2
SCADA Hacking – Industrial Systems Woefully Insecure https://www.darknet.org.uk/2018/06/scada-hacking-industrial-systems-woefully-insecure/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed Wed, 20 Jun 2018 15:37:21 +0000 https://www.darknet.org.uk/?p=5037 SCADA Hacking – Industrial Systems Woefully Insecure

It seems like SCADA hacking is still a topic in hacker conferences, and it should be with SCADA systems still driving power stations, manufacturing plants, refineries and all kinds of other powerful and dangerous things.

The latest talk given on the subject shows with just 4 lines of code and a small hardware drop device a SCADA based facility can be effectively DoSed by sending repeated shutdown commands to suscpetible systems.

Read the rest of SCADA Hacking – Industrial Systems Woefully Insecure now! Only available at Darknet.