Tuesday, May 16, 2017

HTTrack Website Copier
Free software offline browser

Version 3.49-1 (04/01/2017)

Engine fixes (keep-alive, redirects, new hashtables, unit tests)
Installing HTTrack: Go to the download section now!
For help and questions: Visit the forumRead the documentationRead the FAQsBrowse the sources

Screenshot of Windows GUI

Welcome

HTTrack is a free (GPL, libre/free software) and easy-to-use offline browser utility.
It allows you to download a World Wide Web site from the Internet to a local directory, building recursively all directories, getting HTML, images, and other files from the server to your computer. HTTrack arranges the original site's relative link-structure. Simply open a page of the "mirrored" website in your browser, and you can browse the site from link to link, as if you were viewing it online. HTTrack can also update an existing mirrored site, and resume interrupted downloads. HTTrack is fully configurable, and has an integrated help system.
WinHTTrack is the Windows 2000/XP/Vista/Seven release of HTTrack, and WebHTTrack the Linux/Unix/BSD release. See the download page.

This example is implemented as a logic class (UDPGetTime) wrapping a UDP socket. The logic class handles all events, leaving the main loop to just check if the process has finished.

Latest commit 719b164 on 14 Mar 2016@bremoran bremoran Update UDP client readme 

 README.md

UDP Time Example

This application reads the current UTC time by sending a packet to utcnist.colorado.edu (128.138.140.44).
This example is implemented as a logic class (UDPGetTime) wrapping a UDP socket. The logic class handles all events, leaving the main loop to just check if the process has finished.

Pre-requisites

To build and run this example the following requirements are necessary:
  • A computer with the following software installed:
    • yotta. Please note that yotta has its own set of dependencies, listed in the installation instructions
    • Note that pyOCD is installed automatically when installing yotta
    • Keil or ARM GCC toolchain
    • A serial terminal emulator (e.g. screen, pySerial, cu).
  • An FRDM-K64F development board.
  • An Ethernet connection to the internet.
  • An Ethernet cable.
  • A micro-USB cable.
  • If your OS is Windows, please follow the installation instructions for the serial port driver.
Note: To discover the serial port used by the connected mbed-enabled board, either use mbed-ls, or use your OS's built-in mechanism for port discovery:
  • On Windows, open Device Manager, and look at the list of ports to determine which one matches your mbed-enabled device
  • On Linux, the virtual com port will appear as /dev/ttyACM*
  • On Mac OS X, the virtual com port will appear as /dev/tty.usbmodem*

Getting started

  1. Connect the FRDM-K64F to the internet using the Ethernet cable.
  2. Connect the FRDM-K64F to the computer with the micro-USB cable, being careful to use the micro-USB port labeled "OpenSDA".
  3. Navigate to the root mbed-example-network directory that came with your release and open a terminal.
  4. Set the yotta target:
    $ yotta target frdm-k64f-gcc
    
  5. Build the examples. This will take a long time if it is the first time that the examples have been built:
    $ yt build
    
  6. Copy build/frdm-k64f-gcc/test/mbed-example-network-test-helloworld-udpclient.bin to your mbed board and wait until the LED next to the USB port stops blinking.
  7. Start the serial terminal emulator and connect to the virtual serial port presented by FRDM-K64F. For settings, use 115200 baud, 8N1, no flow control.
  8. Press the reset button on the board.
  9. The output in the terminal window should look like:
    UDP client IP Address is 10.2.202.44
    Starting DNS Query for utcnist.colorado.edu
    DNS Response Received:
    utcnist.colorado.edu = 128.138.140.44
    Sending "time" to 128.138.140.44:37
    Data Available!
    UDP: 3666511712 seconds since 01/01/1900 00:00 GMT
    

Using a debugger

Optionally, connect using a debugger to set breakpoints and follow program flow. Proceed normally up to and including step 5 (building the example), then:
  1. yotta debug mbed-example-network-test-helloworld-udpclient
    The output should look like this:
    info: found mbed-example-network-test-helloworld-udpclient at test/mbed-example-network-test-helloworld-udpclient
    info: preparing PyOCD gdbserver...
    info: finding connected board...
    info: new board id detected: ...
    info: board allows 5 concurrent packets
    info: DAP SWD MODE initialised
    info: IDCODE: ...
    info: K64F not in secure state
    info: 6 hardware breakpoints, 4 literal comparators
    info: CPU core is Cortex-M4
    info: FPU present
    info: 4 hardware watchpoints
    info: starting PyOCD gdbserver...
    info: Telnet: server started on port 4444
    info: GDB server started at port:3333
    GNU gdb (GNU Tools for ARM Embedded Processors) 7.6.0.20131129-cvs
    Copyright (C) 2013 Free Software Foundation, Inc.
    License GPLv3+: GNU GPL version 3 or later 
    This is free software: you are free to change and redistribute it.
    There is NO WARRANTY, to the extent permitted by law.  Type "show copying"
    and "show warranty" for details.
    This GDB was configured as "--target=arm-none-eabi".
    For bug reporting instructions, please see:
    ...
    Reading symbols from ...done.
    info: One client connected!
    (gdb)
    
  2. Start a terminal emulator and connect to the virtual serial port presented by the FRDM-K64F at 115200, 8N1.
  3. Load the program
    (gdb) load
    
  4. Once the program has loaded, start it.
    (gdb) c
    
  5. The output in the serial terminal window should look like in step 9 above (the final step of the regular run).

pkcs11-tool man page pkcs11-tool — utility for managing and using PKCS #11 security tokens

Description

The pkcs11-tool utility is used to manage the data objects on smart cards and similar PKCS #11 security tokens. Users can list and read PINs, keys and certificates stored on the token. User PIN authentication is performed for those operations that require it.

Options

--attr-from path
Extract information from path (DER-encoded certificate file) and create the corresponding attributes when writing an object to the token. Example: the certificate subject name is used to create the CKA_SUBJECT attribute.
--change-pin-c
Change the user PIN on the token
--unlock-pin
Unlock User PIN (without --login unlock in logged in session; otherwise --login-typehas to be 'context-specific').
--hash-h
Hash some data.
--id id-d id
Specify the id of the object to operate on.
--init-pin
Initializes the user PIN. This option differs from --change-pin in that it sets the user PIN for the first time. Once set, the user PIN can be changed using --change-pin.
--init-token
Initialize a token: set the token label as well as a Security Officer PIN (the label must be specified using --label).
--input-file path-i path
Specify the path to a file for input.
--keypairgen-k
Generate a new key pair (public and private pair.)
--key-type specification
Specify the type and length of the key to create, for example rsa:1024 or EC:prime256v1.
--usage-sign
Specify 'sign' key usage flag (sets SIGN in privkey, sets VERIFY in pubkey).
--usage-decrypt
Specify 'decrypt' key usage flag (RSA only, set DECRYPT privkey, ENCRYPT in pubkey).
--usage-derive
Specify 'derive' key usage flag (EC only).
--label name-a name
Specify the name of the object to operate on (or the token label when --init-token is used).
--list-mechanisms-M
Display a list of mechanisms supported by the token.
--list-objects-O
Display a list of objects.
--list-slots-L
Display a list of available slots on the token.
--list-token-slots-T
List slots with tokens.
--login-l
Authenticate to the token before performing other operations. This option is not needed if a PIN is provided on the command line.
--login-type
Specify login type ('so', 'user', 'context-specific'; default:'user').
--mechanism mechanism-m mechanism
Use the specified mechanism for token operations. See -M for a list of mechanisms supported by your token.
--module mod
Specify a PKCS#11 module (or library) to load.
--moz-cert path-z path
Test a Mozilla-like keypair generation and certificate request. Specify the path to the certificate file.
--output-file path-o path
Specify the path to a file for output.
--pin pin-p pin
Use the given pin for token operations. If set to env:VARIABLE, the value of the environment variable VARIABLE is used. WARNING: Be careful using this option as other users may be able to read the command line from the system or if it is embedded in a script. If set to env:VARIABLE, the value of the environment variable VARIABLE is used.
This option will also set the --login option.
--puk puk
Supply User PUK on the command line.
--new-pin pin
Supply new User PIN on the command line.
--set-id id-e id
Set the CKA_ID of the object.
--show-info-I
Display general token information.
--sign-s
Sign some data.
--decrypt,
Decrypt some data.
--derive,
Derive a secret key using another key and some data.
--slot id
Specify the id of the slot to use.
--slot-description description
Specify the description of the slot to use.
--slot-index index
Specify the index of the slot to use.
--token-label label
Specify the label of token. Will be used the first slot, that has the inserted token with this label.
--so-pin pin
Use the given pin as the Security Officer PIN for some token operations (token initialization, user PIN initialization, etc). If set to env:VARIABLE, the value of the environment variable VARIABLE is used. The same warning as --pin also applies here.
--test-t
Perform some tests on the token. This option is most useful when used with either --login or --pin.
--test-hotplug
Test hotplug capabilities (C_GetSlotList + C_WaitForSlotEvent).
--private
Set the CKA_PRIVATE attribute (object is only viewable after a login).
--test-ec
Test EC (best used with the --login or --pin option).
--test-fork
Test forking and calling C_Initialize() in the child.
--type type-y type
Specify the type of object to operate on. Examples are cert, privkey and pubkey.
--verbose-v
Cause pkcs11-tool to be more verbose.
NB! This does not affect OpenSC debugging level! To set OpenSC PKCS#11 module into debug mode, set the OPENSC_DEBUG environment variable to a non-zero number.
--read-object-r
Get object's CKA_VALUE attribute (use with --type).
--delete-object-b
Delete an object.
--application-label label
Specify the application label of the data object (use with --type data).
--application-id id
Specify the application ID of the data object (use with --type data).
--issuer data
Specify the issuer in hexadecimal format (use with --type cert).
--subject data
Specify the subject in hexadecimal format (use with --type cert/privkey/pubkey).
--signature-format format
Format for ECDSA signature: 'rs' (default), 'sequence', 'openssl'.
--write-object id-w path
Write a key or certificate object to the token. path points to the DER-encoded certificate or key file.

ATM'S HACKING AGAIN...

Hacking Ubiquiti AirOS with Metasploit

Good Morning friends. AirOS is the firmware maintained by Ubiquiti Networks for its airMAX products which include routers and switches. This firmware is Linux based. This module exploits a file upload vulnerability existing in the firmware to install a new root user to /etc/passwd and an SSH key to /etc/dropbear/authorized_keys. So let’s see hacking Ubiquiti AirOS. Start Metasploit and load the exploit as shown below. Type command “show options” to see what options we need to set.
airos1
The only option we need to set is our target IP address. If you have followed my previous howto’s you already know how to find the vulnerable targets. Set the target IP address as shown below. This module does not support check. No problem. Type command “show payloads” to see the payloads we can use with this exploit. We normally have only one i.e interacting with the target’s shell. Set the payload.

airos2
Type “run”  to execute our exploit. We will get the command shell of our target as shown below.

airos3
Let’s check it. Type command “ls” to get contents of the present directory.
airos4
This is the passwd file of our target which has been overwritten by our exploit.

airos5

Man in the Rain