Saturday, October 21, 2017

CATPHISH - For Phishing And Corporate Espionage

Project for phishing and corporate espionage.

Current Algorithms
  • SingularOrPluralise
  • prependOrAppend
  • doubleExtensions
  • mirrorization
  • homoglyphs
  • dashOmission
  • Punycode
CATPHISH v.0.0.5
Added more languages. Improved generator code.

CATPHISH v.0.0.4
Added Punycode algorithm for vietnamese and cyrillic characters map.
ruby catphish.rb -d microsoft.com -m Punycode -a



CATPHISH v.0.0.3
Analyzie target domain to generate smiliar-looking domains for phishing attacks.



HOW TO USE




Conducting Network Penetration and Espionage

OS Identification 
Synopsis 

It is possible to guess the remote operating system. 
List of Hosts 
95.141.28.91 

Remote operating system: FreeBSD 9.0 
FreeBSD 9.1 
Confidence Level: 85 
Method: SSH 

The remote host is running one of these operating systems: 
FreeBSD 9.0 
FreeBSD 9.1 

I 

PORT MYSQL (3306/TCP) 
Service Detection 

Synopsis 

The remote service could be identified. 
List of Hosts 
95.141.28.91 

A MySQL server is running on this port. 

PORT (OfTCP) 

Common Platform Enumeration (CPE) 
Synopsis 

It is possible to enumerate CPE names that matched on the remote\system. 
List of Hosts 
95.141.28.91 

The remote operating system matched the following CPE's: 

cpe:/o: freebsd: freebsd: 9.0 -> FreeBSD 9.0 

cpe:/o: freebsd: freebsd: 9.1 
Following application CPE's matched on the remote system: 

cpe:/a: openbsd: openssh: 5.8 -> OpenBSD OpenSSH 5.8 

cpe: /a :php:php: 5.3.18 

cpe: /a:igor_sysoev:nginx:l .2.4 

PORT SSH (22/TCP) 

SSH Protocol Versions Supported 

Synopsis 

A SSH server Is running on the remote host. 
List of Hosts 
95.141.28.91 

The remote SSH daemon supports the following versions of the 
SSH protocol: 

- 1.99 

- 2.0 

SSHv2 host Icey fingerprint: 5a:ce:da:el:b3 :c2: 6b:65:S7:f6:8e:e8:8 3 :d8 : 03:65 

So, you're a spy, hidden operative for NATO! You want to transmit a message (besides the software for secret ICMP type) ....then you remote call and previouse check the permission you have to transmit! ManageEngine Free Ping Tool Free Ping Tool monitors the availability of servers, routers, switches, mail servers and web servers using the power of ICMP ping. It displays the results in a dashboard

Fight Stingray & IMSI catchers with Android IMSI-Catcher Detector


AIMSICD is an app to detect IMSI-Catchers. IMSI-Catchers are false mobile towers (base stations) acting between the target mobile phone(s) and the real towers of service providers. As such they are considered a Man-In-The-Middle (MITM) attack. In the USA the IMSI-Catcher technology is commonly known under the name “StingRay“. Find out more on their WIKI.
For this app to function to its full potential you will want to have a rooted android phone. AIMSICD will alert you when your phone is attempting to connect to a suspicious cell tower

The experimental malware instead repurposes the speakers in earbuds or headphones to use them as microphones, converting the vibrations in air into electromagnetic signals to clearly capture audio from across a room.


PCM3060 (ACTIVE)

24-bit Asynchronous Stereo Audio Codec with 96/192kHz sampling rate


The PCM3060 is a low-cost, high-performance, single-chip, 24-bit stereo audio codec with single-ended analog inputs and differential analog outputs.
The stereo 24-bit ADC employs a 64-times delta-sigma modulator. It supports 16-96 kHz sampling rates and a 16/24-bit digital audio output word on the audio interface.

"you've been frame" Encoding is handled by the Network Interface Card, or NIC, inside the computer. It handles and decodes digital signals, and is in charge of all the messaging ins and outs on the computer

Signal Spy started as a companion app for Project Fi called Fi Spy. It provides information about your connectivity via cellular and wi-fi connections. It also gives you the ability to control that connection via dialer codes and monitor your connections with a history log. We also provide quick links to Fi communities. That is where we started, and we've made our features compatible with more carriers in the US and worldwide!

Traceroute Based IP Channel for Sending Hidden Short Messages

Abstract: In this paper we propose a novel covert channel for exchanging secret information, based on the IP header record route options. Instead of encrypting a secret message or embedding it into a multimedia object, as in traditional steganography, we process the entire message and generate several IP packets with different types to carry the secret information. Thereby we foil an eavesdropper who is primarily applying statistical tests to detect encrypted channels. We show that our approach provides more protection against steganalysis and sniffing attacks, and gives a covert channel capacity which is an order of magnitude higher than traditional methods. Keywords: covert channel; hidden information; IP header record route option; steganalysis; traceroute.
Traceroute Based IP Channel for Sending Hidden Short Messages (PDF Download Available)


https://www.researchgate.net/publication/220784943_Traceroute_Based_IP_Channel_for_Sending_Hidden_Short_Messages

Cell Phone Anti-tracking Anti-spying GPS Rfid Signal Blocker Pouch Case Bag Handset Function Bag

NATO SURVEILLANCE (continued)

"In 2001, Twibright Labs released Ronja Metropolis, an open source DIY 10 Mbit/s full duplex LED FSO over 1.4 km[24][25] In 2004, a Visible Light Communication Consortium was formed in Japan.[26] This was based on work from researchers that used a white LED-based space lighting system for indoor local area network (LAN) communications. These systems present advantages over traditional UHF RF-based systems from improved isolation between systems, the size and cost of receivers/transmitters, RF licensing laws and by combining space lighting and communication into the same system.
Projected data rates and future data rate claims vary. A low-cost white LED (GaN-phosphor) which could be used for space lighting can typically be modulated up to 20 MHz.[31] Data rates of over 100 Mbit/s can be easily achieved using efficient modulation schemes and Siemens claimed to have achieved over 500 Mbit/s in 2010
In September 2013, pureLiFi, the Edinburgh start-up working on Li-Fi, also demonstrated high speed point-to-point connectivity using any off-the-shelf LED light bulb. In previous work, high bandwidth specialist LEDs have been used to achieve the high data rates. The new system, the Li-1st, maximizes the available optical bandwidth for any LED device, thereby reducing the cost and improving the performance of deploying indoor FSO systems
The light beam can be very narrow, which makes FSO hard to intercept, improving security. In any case, it is comparatively easy to encrypt any data traveling across the FSO connection for additional security. FSO provides vastly improved electromagnetic interference (EMI) behavior compared to using microwaves." (legend from picture, wikipedia : RONJA is a free implementation of FSO using high-intensity LEDs."



https://en.wikipedia.org/wiki/Free-space_optical_communication

lightbulb spying technology. ...a mass surveillance device being disguised as an LED light bulb


Man in the Rain