Sunday, August 30, 2020

Pcap Of Wannacry Spreading Using EthernalBlue

Saw that a lot of people were looking for a pcap with WannaCry spreading Using EthernalBlue.

I have put together a little "petri dish" test environment and started looking for a sample that has the exploit. Some samples out there simply do not have the exploit code, and even tough they will encrypt the files locally, sometimes the mounted shares too, they would not spread.

Luckily, I have found this nice blog post from McAfee Labs: https://securingtomorrow.mcafee.com/mcafee-labs/analysis-wannacry-ransomware/ with the reference to the sample SHA256: 24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c (they keep referring to samples with MD5, which is still a very-very bad practice, but the hash is MD5: DB349B97C37D22F5EA1D1841E3C89EB4)

Once I got the sample from the VxStream Sandbox site, dropped it in the test environment, and monitored it with Security Onion. I was super happy to see it spreading, despite the fact that for the first run my Windows 7 x64 VM went to BSOD as the EthernalBlue exploit failed.

But the second run was a full success, all my Windows 7 VMs got infected. Brad was so kind and made a guest blog post at one of my favorite sites, www.malware-traffic-analysis.net so you can find the pcap, description of the test environment and some screenshots here: http://malware-traffic-analysis.net/2017/05/18/index2.htmlRelated word

How To Start | How To Become An Ethical Hacker

Are you tired of reading endless news stories about ethical hacking and not really knowing what that means? Let's change that!
This Post is for the people that:

  • Have No Experience With Cybersecurity (Ethical Hacking)
  • Have Limited Experience.
  • Those That Just Can't Get A Break


OK, let's dive into the post and suggest some ways that you can get ahead in Cybersecurity.
I receive many messages on how to become a hacker. "I'm a beginner in hacking, how should I start?" or "I want to be able to hack my friend's Facebook account" are some of the more frequent queries. Hacking is a skill. And you must remember that if you want to learn hacking solely for the fun of hacking into your friend's Facebook account or email, things will not work out for you. You should decide to learn hacking because of your fascination for technology and your desire to be an expert in computer systems. Its time to change the color of your hat 😀

 I've had my good share of Hats. Black, white or sometimes a blackish shade of grey. The darker it gets, the more fun you have.

If you have no experience don't worry. We ALL had to start somewhere, and we ALL needed help to get where we are today. No one is an island and no one is born with all the necessary skills. Period.OK, so you have zero experience and limited skills…my advice in this instance is that you teach yourself some absolute fundamentals.
Let's get this party started.
  •  What is hacking?
Hacking is identifying weakness and vulnerabilities of some system and gaining access with it.
Hacker gets unauthorized access by targeting system while ethical hacker have an official permission in a lawful and legitimate manner to assess the security posture of a target system(s)

 There's some types of hackers, a bit of "terminology".
White hat — ethical hacker.
Black hat — classical hacker, get unauthorized access.
Grey hat — person who gets unauthorized access but reveals the weaknesses to the company.
Script kiddie — person with no technical skills just used pre-made tools.
Hacktivist — person who hacks for some idea and leaves some messages. For example strike against copyright.
  •  Skills required to become ethical hacker.
  1. Curosity anf exploration
  2. Operating System
  3. Fundamentals of Networking
*Note this sites





Read more


APT Hackers Exploit Autodesk 3D Max Software For Industrial Espionage

It's one thing for APT groups to conduct cyber espionage to meet their own financial objectives. But it's an entirely different matter when they are used as "hackers for hire" by competing private companies to make away with confidential information. Bitdefender's Cyber Threat Intelligence Lab discovered yet another instance of an espionage attack targeting an unnamed international

via The Hacker NewsRelated news

Saturday, August 29, 2020

TOP 10 HACKING MOVIES YOU SHOULD WATCH

Technology and hacking gave a new horizon to the science fiction movies. As hacking is getting common and every online thing is at risk whether it's 10% or 90%, not a system is 100% secure over the internet. Every day new security holes are getting discovered. So, now most of the sci-fi movies have the tech and hack stuff to grow awareness in everybody's mind about the online privacy and risk to their information. Here I am sharing top 10 hacking movies that worth a watch.

TOP 10 HACKING MOVIES

Here I have listed top 10 hacking movies that you should watch.

1. HACKERS (1995)

In Hackers, Angelina Jolie and Jonny Lee Miller portray two youthful and hip hackers. Miller portrays a hacker who got caught as a very young child at an age of 11 years after crashing thousands of computers and has been sentenced to zero computer access until his 18th birthday.

2. LIVE FREE OR DIE HARD (2007)

Live Free or Die Hard (also known as Die Hard 4 and released as Die Hard 4.0 outside North America) is a 2007 American action film, and the fourth in the Die Hard film series depicts a scenario where a hacker played by Timothy Olyphant (of Justified fame) takes down nearly the entire U.S. infrastructure in an attempt to transfer trillions of dollars from the Federal Reserve to his account. This movie gives a complete idea of how actually these blackhat hackers operate.

3. EAGLE EYE (2008)

In this movie, two people get a call from an unknown number by a woman. They get a task on the phone that if they don't follow the phone call they would die. This movie displays supercomputer hack on all networks and military networks. This is just an amazing movie on how artificial intelligence computer hacks our real life for bad motives.

4. ALGORITHM (2014)

The film 'Algorithm' tracks the travails of Will, who is the freelance computer hacker who hacks into a top-secret government contractor agency and downloads all their recently developed programs." You can see the full movie below

5. WARGAMES (1983)

The film features David Lightman (Broderick), a young high school student hacker who accidentally hacks into a military supercomputer and starts the countdown to World War III.

6. THE MATRIX (1999)

This is one of the greatest science fiction movies. In this movie, reality, as perceived by most humans, is actually a simulated reality called "the Matrix", created by machines to subdue the human population, while their bodies' heat and electrical activity are used as an energy source.
A character named "Neo", who is a computer Hacker, learns this truth and is drawn into a rebellion against the machines, which involves other people who have been freed from the "dream world". The Matrix franchise is a trilogy movie series.

7. TAKEDOWN (2000)

This movie is based on famous computer U.S. hacker Kevin David Mitnick. Based upon the book and written by his nemesis, Tsutomu Shimomura, the story tends to glorify Shimomura. Mitnick operated in the 1980s and '90s and eventually went to prison for a couple of years. Now, he is a highly paid IT security consultant, speaker, and writer.

8. BLACKHAT (2015)

Blackhat is newly released movie by Chris Hemsworth. In this movie, hackers hack the Chinese nuclear power plant to start a nuclear reaction. Simultaneously, they also hack the stock exchange and steal millions of dollars from the bank. This movie shows how a black hat hackers threaten governments.

9. THE ITALIAN JOB (2003)

Although the MINI Coopers are really the stars of The Italian Job (a remake of the 1969 film of the same name), Seth Green plays Lyle, a hacker among a group of elite thieves, who is able to manipulate traffic signals, among other devices, that make this grand theft possible.

10. UNTRACEABLE (2008)

This film involves a serial killer who rigs contraptions that kill his victims based on the number of hits received by a website KillWithMe.com that features a live streaming video of the victim. Millions of people log on, hastening the victims' deaths.

There may be more exciting hacking movies but I found these top 10 hacking movies that you should watch for once.
You can also find out the top 5 most dangerous hackers in the real world living.

More articles


  1. How To Install Pentest Tools In Ubuntu
  2. Best Hacking Tools 2020
  3. Best Hacking Tools 2019
  4. Pentest Tools Subdomain
  5. Pentest Tools For Android
  6. Termux Hacking Tools 2019
  7. Hacker Search Tools
  8. Hacking Tools For Mac
  9. Hack Tools
  10. Hacking Tools And Software
  11. Hacking Apps
  12. Hacking Tools For Windows 7
  13. Pentest Tools Review
  14. Hack Tools 2019
  15. Pentest Tools For Windows
  16. Hack Tools Download
  17. Hacking Tools For Mac
  18. Pentest Tools Bluekeep
  19. Hacking Tools Windows 10
  20. Hack Rom Tools
  21. Hack Tools For Ubuntu
  22. Hack Tools
  23. Hacking Tools 2020
  24. Hack And Tools
  25. Tools Used For Hacking
  26. Hacking Tools And Software
  27. Tools 4 Hack
  28. Hacking Tools Download
  29. Pentest Tools Bluekeep
  30. Hacking Tools Pc
  31. Hacker Tools Windows
  32. Hacker Tools Free Download
  33. Hacking Tools For Pc
  34. Pentest Tools Free
  35. Hacker Tools Github
  36. Pentest Automation Tools
  37. How To Install Pentest Tools In Ubuntu
  38. Hacking Tools Software
  39. How To Make Hacking Tools
  40. Pentest Tools Subdomain
  41. Hacker Tools Github
  42. Hacker Tools For Pc
  43. Physical Pentest Tools
  44. Hacking Tools Windows 10
  45. Pentest Tools Kali Linux
  46. Hacker Tools Free Download
  47. Pentest Tools For Mac
  48. Hack Apps
  49. Hacking Tools Usb
  50. Hacker Tools For Ios
  51. Usb Pentest Tools
  52. Hacker Tools Github
  53. Hacker Tools For Pc
  54. Hacking Tools For Kali Linux
  55. Free Pentest Tools For Windows
  56. Hacker Tools Online
  57. How To Install Pentest Tools In Ubuntu
  58. Tools Used For Hacking
  59. Hacking Tools Pc
  60. Hack Apps
  61. Nsa Hacker Tools
  62. Install Pentest Tools Ubuntu
  63. Hacker Tools 2020
  64. Kik Hack Tools
  65. Hack Tools For Pc
  66. Beginner Hacker Tools
  67. Best Hacking Tools 2019
  68. Hacking Tools And Software
  69. Hacker Tools Apk Download
  70. Hacker Techniques Tools And Incident Handling
  71. Hack Tools For Ubuntu
  72. Pentest Automation Tools
  73. Hack Tools
  74. Hack Tools
  75. Pentest Tools Find Subdomains
  76. Pentest Tools For Ubuntu
  77. Blackhat Hacker Tools
  78. Pentest Tools For Ubuntu
  79. Hacker Search Tools
  80. Hack Rom Tools
  81. Ethical Hacker Tools
  82. Game Hacking
  83. Hackers Toolbox
  84. Ethical Hacker Tools
  85. Pentest Box Tools Download
  86. Best Hacking Tools 2020
  87. Physical Pentest Tools
  88. Nsa Hack Tools
  89. Black Hat Hacker Tools
  90. Ethical Hacker Tools
  91. Hack Tools For Mac
  92. Pentest Tools Apk
  93. Hacker Tools For Ios
  94. Android Hack Tools Github
  95. Hacking Tools Kit
  96. Pentest Tools Subdomain
  97. Hacker Tool Kit
  98. Pentest Tools Bluekeep
  99. Pentest Tools Kali Linux
  100. Hacking Tools Mac
  101. Wifi Hacker Tools For Windows
  102. Growth Hacker Tools
  103. Best Hacking Tools 2020
  104. Hacking Tools Hardware
  105. Pentest Tools Tcp Port Scanner
  106. Pentest Tools
  107. Kik Hack Tools
  108. Hacking Tools For Beginners
  109. Hacker Tools For Pc
  110. Hak5 Tools
  111. Pentest Tools Linux
  112. Hacking Tools Mac
  113. Hacker Hardware Tools

C++ Std::String Buffer Overflow And Integer Overflow

Interators are usually implemented using signed integers like the typical "for (int i=0; ..." and in fact is the type used indexing "cstr[i]", most of methods use the signed int, int by default is signed.
Nevertheless, the "std::string::operator[]" index is size_t which is unsigned, and so does size(), and same happens with vectors.
Besides the operator[] lack of negative index control, I will explain this later.

Do the compilers doesn't warn about this?


If his code got a large input it would index a negative numer, let see g++ and clang++ warnings:



No warnings so many bugs out there...

In order to reproduce the crash we can load a big string or vector from file, for example:


I've implemented a loading function, getting the file size with tellg() and malloc to allocate the buffer, then in this case used as a string.
Let see how the compiler write asm code based on this c++ code.



So the string constructor, getting size and adding -2 is clear. Then come the operator<< to concat the strings.
Then we see the operator[] when it will crash with the negative index.
In assembly is more clear, it will call operator[] to get the value, and there will hapen the magic dereference happens. The operator[] will end up returning an invalid address that will crash at [RAX]



In gdb the operator[] is a  allq  0x555555555180 <_znst7__cxx1112basic_stringicst11char_traitsicesaiceeixem plt="">

(gdb) i r rsi
rsi            0xfffffffffffefffe  -65538


The implmementation of operator ins in those functions below:

(gdb) bt
#0  0x00007ffff7feebf3 in strcmp () from /lib64/ld-linux-x86-64.so.2
#1  0x00007ffff7fdc9a5 in check_match () from /lib64/ld-linux-x86-64.so.2
#2  0x00007ffff7fdce7b in do_lookup_x () from /lib64/ld-linux-x86-64.so.2
#3  0x00007ffff7fdd739 in _dl_lookup_symbol_x () from /lib64/ld-linux-x86-64.so.2
#4  0x00007ffff7fe1eb7 in _dl_fixup () from /lib64/ld-linux-x86-64.so.2
#5  0x00007ffff7fe88ee in _dl_runtime_resolve_xsavec () from /lib64/ld-linux-x86-64.so.2
#6  0x00005555555554b3 in main (argc=2, argv=0x7fffffffe118) at main.cpp:29

Then crashes on the MOVZX EAX, byte ptr [RAX]

Program received signal SIGSEGV, Segmentation fault.
0x00005555555554b3 in main (argc=2, argv=0x7fffffffe118) at main.cpp:29
29     cout << "penultimate byte is " << hex << s[i] << endl;
(gdb)


What about negative indexing in std::string::operator[] ?
It's exploitable!

In a C char array is known that having control of the index, we can address memory.
Let's see what happens with C++ strings:






The operator[] function call returns the address of string plus 10, and yes, we can do abitrary writes.



Note that gdb displays by default with at&t asm format wich the operands are in oposite order:


And having a string that is in the stack, controlling the index we can perform a write on the stack.



To make sure we are writing outside the string, I'm gonna do 3 writes:


 See below the command "i r rax" to view the address where the write will be performed.


The beginning of the std::string object is 0x7fffffffde50.
Write -10 writes before the string 0x7fffffffde46.
And write -100 segfaults because is writting in non paged address.



So, C++ std::string probably is not vulnerable to buffer overflow based in concatenation, but the std::string::operator[] lack of negative indexing control and this could create vulnerable and exploitable situations, some times caused by a signed used of the unsigned std::string.size()










More articles


  1. How To Hack
  2. Hacking Tools Download
  3. Hack Tool Apk No Root
  4. Pentest Tools Nmap
  5. Pentest Tools Download
  6. Hack Tool Apk No Root
  7. Hack Tools For Ubuntu
  8. Hack Tools Mac
  9. How To Hack
  10. Nsa Hacker Tools
  11. Hackrf Tools
  12. Hacking Tools For Games
  13. Hacking Tools 2019
  14. Hacker Search Tools
  15. Tools 4 Hack
  16. Hacking Tools Download
  17. Pentest Box Tools Download
  18. Hack Tools
  19. Physical Pentest Tools
  20. Pentest Tools Windows
  21. Hacking Tools Free Download
  22. Hacker
  23. Easy Hack Tools
  24. Pentest Automation Tools
  25. Pentest Tools Kali Linux
  26. Hacking Tools Pc
  27. Hacker Tools For Pc
  28. Computer Hacker
  29. Computer Hacker
  30. Pentest Tools For Android
  31. Hacker Hardware Tools
  32. Physical Pentest Tools
  33. Hack Tools For Ubuntu
  34. Hacking Tools Hardware
  35. Hacker Tools 2019
  36. Hacking App
  37. Pentest Tools Framework
  38. Physical Pentest Tools
  39. Hack Tools For Pc
  40. Hacker Tools Mac
  41. Hacking Tools Github
  42. Wifi Hacker Tools For Windows
  43. Hackers Toolbox
  44. Hack Website Online Tool
  45. Pentest Tools Find Subdomains
  46. Hacker Tools 2019
  47. Hack Tools
  48. Hacking Tools For Mac
  49. Pentest Tools Alternative
  50. Hack Tools For Mac
  51. Computer Hacker
  52. Free Pentest Tools For Windows
  53. Hack Tools For Windows
  54. Hack Tools For Games
  55. Termux Hacking Tools 2019
  56. Hacker Tools Windows
  57. Pentest Tools Linux
  58. Pentest Tools Windows
  59. Hack Website Online Tool
  60. Hak5 Tools
  61. Hacker Tools Online
  62. Pentest Tools Url Fuzzer
  63. Physical Pentest Tools
  64. New Hack Tools
  65. Physical Pentest Tools
  66. Pentest Tools
  67. Pentest Tools Framework
  68. Hacking Tools Online
  69. Nsa Hacker Tools
  70. Hack Tools
  71. Hacking Tools Free Download
  72. Growth Hacker Tools
  73. Hacker
  74. Best Hacking Tools 2020
  75. Pentest Tools Nmap
  76. Pentest Tools For Mac
  77. Hacking Tools Software
  78. World No 1 Hacker Software
  79. Pentest Tools Port Scanner
  80. Tools Used For Hacking
  81. Hack Tools Github
  82. How To Hack
  83. Hacker Tools Software
  84. Free Pentest Tools For Windows
  85. Hack And Tools
  86. Black Hat Hacker Tools
  87. Pentest Tools Android
  88. Android Hack Tools Github
  89. Pentest Tools Find Subdomains
  90. Hack Tools Download
  91. Hack Website Online Tool
  92. Hack Tools Online
  93. Easy Hack Tools
  94. Hacking Tools Windows 10
  95. Hacker
  96. Hacking Tools Online
  97. Pentest Tools Kali Linux
  98. New Hack Tools
  99. Pentest Tools Open Source
  100. Hack Tool Apk No Root
  101. Hacker Tools
  102. Hacking Tools Name
  103. Wifi Hacker Tools For Windows
  104. Tools 4 Hack
  105. Hacker Tools Hardware
  106. Hack Tools Github
  107. Hacker Tools Hardware
  108. Nsa Hack Tools
  109. Beginner Hacker Tools
  110. Hacker Hardware Tools
  111. Hacking Tools Windows
  112. Install Pentest Tools Ubuntu
  113. Pentest Reporting Tools
  114. Pentest Tools Website Vulnerability
  115. What Is Hacking Tools
  116. Hacker Tools Windows
  117. Hacking Tools Usb
  118. How To Hack
  119. Hacker Search Tools
  120. Hacker
  121. What Are Hacking Tools
  122. Hack Website Online Tool
  123. Hacking Tools For Kali Linux
  124. Pentest Tools Framework
  125. New Hack Tools
  126. Computer Hacker
  127. Android Hack Tools Github
  128. Hack And Tools
  129. Kik Hack Tools
  130. Pentest Tools Kali Linux
  131. Hacker Tools For Mac
  132. Termux Hacking Tools 2019
  133. Hacker Tools Free
  134. Github Hacking Tools
  135. Hacking Tools For Mac
  136. Hacker Tools Hardware
  137. Hacking Tools And Software
  138. Hack Tool Apk
  139. Hacking Tools Windows
  140. Hacking Tools Usb
  141. How To Hack
  142. Best Hacking Tools 2019
  143. Hack Tools Online
  144. Blackhat Hacker Tools
  145. Pentest Tools Open Source
  146. How To Make Hacking Tools