Saturday, October 21, 2017

WAIDPS - Wireless Auditing, Intrusion Detection and Prevention System

WAIDPS - Wireless Auditing, Intrusion Detection and Prevention System is an open source project which is designed for both offensive and defensive purpose in mind.

This project is original created by SY Chua of SYWorks Programming. However, it is no longer maintained by him since 2014. The GitHub version is v1.0 R.6 and it is dated Oct 10, 2014. However, the demo in his tutorials and Youtube videos are displayed v1.0 R.7 dated Oct 11, 2014.

This software is a very good design in screen layout and good operation experience. Since v1.0 R.6 will crash when handshake is captured and it is not working properly on Kali Linux 2017.2, I modified the Python script to make it to work again in two days. Meanwhile, IEEE 802.11ac is also supported in my modification.

It is well tested on Kali Linux 2017.2. Other penetration testing Linux distributions may work too.

My modification is also an open source project and it is released under GPLv3.





Reference

[1] This project is forked from https://github.com/SYWorks/waidps
[2] Official tutorial - Part 1
[3] Official tutorial - Part 2
[4] Official tutorial - Part 3
[5] Official Youtube Playlist
[6] RealTek 8812AU Driver Installation
[7] TP-Link Archer T4UHP (Realtek 8812AU chipset)

That's all! See you.


Friday, October 20, 2017

HOWTO : Install RealTek 8812AU Driver with Packet Injection And Monitor Mode Support

TP-Link Archer T4UHP v1 is also supported by this driver with monitor mode and packet injection. It is a IEEE 802.11ac USB dongle.

Although Kali Linux has its own 8812au driver, I find AirCrack-ng's driver is the best.

Step 1 :

On Ubuntu Desktop 16.04.3 :

sudo apt update
sudo apt install build-essential dkms git


On Kali Linux 2017.2 :

apt update
apt install dkms


Step 2 :

git clone https://github.com/aircrack-ng/rtl8812au
cd rtl8812au


Step 3 :

On Ubuntu Desktop 16.04.3 :

Make sure to change at dkms.conf before running the following commands.

nano dkms.conf

Change all "/update" to "/kernel/drivers/net/wireless"

sudo bash ./dkms-install.sh

On Kali Linux 2017.2 :

bash ./dkms-install.sh

Step 4 :

To remove the dkms driver :

cd rtl8812au

Ubuntu Desktop 16.04.2 :

sudo bash ./dkms-remove.sh

Kali Linux 2017.2 :

bash ./dkms-remove.sh

Step 5 :

To control it, I suggest to use iw wireless tool.

Beware that the driver does not work properly on the following commands :

(1) airmon-ng start wlan0
(2) iw dev wlan0 interface add wlmon0 type monitor

Reference

AirCrack-ng RTL8812AU driver

That's all! See you.


Wednesday, October 11, 2017

HOWTO : Install GCC 7.x on Ubuntu 16.04.3 LTS

Some features require GCC 7.x to compile with, such as AVX-512.

sudo add-apt-repository ppa:ubuntu-toolchain-r/test
sudo apt update
sudo apt install gcc-7

Set gcc-7 as default in order for the compilation.

sudo update-alternatives --install /usr/bin/gcc gcc /usr/bin/gcc-7 60 --slave /usr/bin/gcc-ar gcc-ar /usr/bin/gcc-ar-7 --slave /usr/bin/gcc-nm gcc-nm /usr/bin/gcc-nm-7 --slave /usr/bin/gcc-ranlib gcc-ranlib /usr/bin/gcc-ranlib-7

sudo update-alternatives --install /usr/bin/gcc gcc /usr/bin/gcc-5 60 --slave /usr/bin/gcc-ar gcc-ar /usr/bin/gcc-ar-5 --slave /usr/bin/gcc-nm gcc-nm /usr/bin/gcc-nm-5 --slave /usr/bin/gcc-ranlib gcc-ranlib /usr/bin/gcc-ranlib-5

Now, gcc-7 is the default compiler. To change back to gcc-5, you need to run :

sudo update-alternatives --config gcc

Then select gcc-5.

That's all! See you.


Thursday, October 05, 2017

Vulnerability scanner can be trusted?

Many companies use vulnerability scanners to scan their systems, websites, products often to make sure they are secured. However, the former CEO of being hacked Equifax blamed that the system had been scanned after a week when the Apache Struts vulnerability had been announced. The scanner cannot detect the presence of un-patched Apache Struts implementations.

Please see the 8th paragraph of this articie for the captioned mention statement.

May be the vulnerability scanner signatures are not up-to-date that caused this fault. So, your vulnerability scanner should be up-to-date too!

That's all! See you.


Tuesday, September 12, 2017

Cloudflare-Recon Version 0.2 Demo

Cloudflare-Recon is forked from Cloudflare-enum which is written in Python. It obtains the DNS zone record from a website that protected by CloudFlare. This tool is a Swiss Army Knife that can be defensive and/or offensive.

CloudFlare is a cloud based service that provides Distributed Denial of Service (DDos) or DoS as well as Web Application Firewall (WAF) protection to the websites. The real IP address of the websites that protected by Cloudflare will be hidden as purpose. However, Cloudflare is a well known company that aiding and abetting criminals who host their websites behind it for malicious activities.

When the DNS zone records are configured incorrectly, the IP address of the server cannot be hidden and Cloudflare cannot protect you from being DDoS/DoS.

This tool is useful for law enforcements, hackers and sysadmins for finding out the real IP of the website that protected by Cloudflare.

Cloudflare-Recon is modified by Samiux.

Changlog :
Version: 0.1 - Sept 10, 2017 GMT+8
[+] Forked from Cloudflare-enum
[+] Enhancement

Version: 0.2 - Sept 12, 2017 GMT+8
[+] Improve readable foramtted output
[+] Error handling





That's all! See you.


Sunday, September 10, 2017

Cloudflare-Recon version 0.1 Demo

Cloudflare-Recon is forked from Cloudflare-enum which is written in Python. It obtains the DNS zone record from a website that protected by CloudFlare. This tool is a Swiss Army Knife that can be defensive and/or offensive.

CloudFlare is a cloud based service that provides Distributed Denial of Service (DDos) or DoS as well as Web Application Firewall (WAF) protection. The real IP address of the websites that protected by Cloudflare will be hidden as purpose. However, Cloudflare is a well known company that aiding and abetting criminals who host their websites behind it for malicious activities.

When the DNS zone records are configured incorrectly, the IP address of the server cannot be hidden and Cloudflare cannot protect you from being DDoS/DoS.

This tool is useful for law enforcements, hackers and sysadmins for finding out the real IP of the website that protected by Cloudflare.

Cloudflare-Recon is modified by Samiux on Sept 10, 2017.

Version: 0.1 - Sept 10, 2017 GMT+8
[+] Enhancement











That's all! See you.


HatCloud-ng version 0.1 Demo

HatCloud-ng is forked from HatCloud which is written in Ruby. It obtains the "Real IP Address" from a website that protected by CloudFlare. This tool is a Swiss Army Knife that can be defensive and/or offensive.

CloudFlare is a cloud based service that provides Distributed Denial of Service (DDos) or DoS as well as Web Application Firewall (WAF) protection. The real IP address of the websites that protected by Cloudflare will be hidden as purpose. However, Cloudflare is a well known company that aiding and abetting criminals who host their websites behind it for malicious activities.

When the DNS zone records are configured incorrectly, the IP address of the server cannot be hidden and Cloudflare cannot protect you from being DDoS/DoS.

This tool is useful for law enforcements, hackers and sysadmins for finding out the real IP of the website that protected by Cloudflare.

HatCloud-ng is modified by Samiux on Sept 10, 2017.

Version: 0.1 - Sept 10, 2017 GMT+8
[+] Bug fixes for original HatCloud dated 2017-09-10
[+] Information and error handling enhancement





That's all! See you.


Saturday, September 09, 2017

HOWTO : Install Metasploit Framework on Ubuntu 16.04.3 LTS

Metasploit Framework is a exploit framework.

Step 1 :

sudo apt install curl

cd ~
mkdir infosec
cd ~/infosec
curl https://raw.githubusercontent.com/rapid7/metasploit-omnibus/master/config/templates/metasploit-framework-wrappers/msfupdate.erb > msfinstall && chmod 755 msfinstall && ./msfinstall

msfconsole


Answer "yes" when you see this prompt message :

Would you like to use and setup a new database (recommended)? yes

Update and Upgrade

sudo apt update
sudo apt dist-upgrade


That's all! See you.


HOWTO : Install John on Ubuntu 16.04.3 LTS

John is a password cracker.

Step 1 :

sudo apt install git build-essential libssl-dev

Step 2 :

cd ~
mkdir infosec
cd infosec

git clone https://github.com/magnumripper/JohnTheRipper.git
cd JohnTheRipper/src
./configure
make clean
make

cd ../run
./john --help


Update and Upgrade

sudo apt update
sudo apt dist-upgrade

cd ~/infosec/JohnTheRipper
git pull origin master
cd src
./configure
make clean
make


That's all! See you.


HOWTO : Install THC-Hydra on Ubuntu 16.04.3 LTS

THC-Hydra is a password brute forcer.

Step 1 :

sudo apt install git build-essential libssl-dev libssh-dev libidn11-dev libpcre3-dev libgtk2.0-dev libmysqlclient-dev libpq-dev libsvn-dev firebird-dev libncurses5-dev

Step 2 :

cd ~
mkdir infosec
cd infosec
git clone https://github.com/vanhauser-thc/thc-hydra.git
cd thc-hydra
./configure
make
./hydra -h
./xhydra


Update and Upgrade

sudo apt update
sudo apt dist-upgrade

cd ~/infosec/thc-hydra
git pull origin master
make clean
./configure
make

That's all! See you.


HOWTO : Install Recon-ng on Ubuntu 16.04.3 LTS

Recon-ng is a full-featured Web Reconnaissance framework.

Step 1 :

sudo install git python-pip python-dnspython python-mechanize python-slowaes python-xlsxwriter python-jsonrpclib python-lxml

Step 2 :

pip install dicttoxml --upgrade

Step 3 :

cd ~
mkdir infosec
cd ~/infosec
git clone https://LaNMaSteR53@bitbucket.org/LaNMaSteR53/recon-ng.git
cd recon-ng
./recon-ng


Update and Upgrade

sudo apt update
sudo apt dist-upgrade

pip install dicttoxml --upgrade

cd ~/infosec/recon-ng
git pull origin master


That's all! See you.


Friday, September 08, 2017

HOWTO : Install Weevely3 on Ubuntu 16.04.3 LTS

Weevely3 is a web shell and it is hardly detected by Anti-Virus and the traffic is obfuscated within the HTTP requests.

Step 1 :

sudo apt install g++ python-pip libyaml-dev python-dev libncurses5 libncurses5-dev

mkdir infosec
git clone https://github.com/epinna/weevely3.git
cd weevely3
pip install -r requirements.txt --upgrade


Step 2 :

cd ~/infosec/weevely3
python weevely3.py -h


Update and Upgrade

sudo apt update
sudo apt dist-upgrade
cd ~/infosec/weevely3
git pull origin master
pip install -r requirements.txt --upgrade


Reference

Documentation

That's all! See you.


HOWTO : Install Vega 1.0 on Ubuntu 16.04.3 LTS

Vega is an open source web application vulnerability scanner.

Step 1 :

sudo apt install libwebkitgtk-1.0 default-jdk unzip

mkdir infosec
cd ~/infosec

wget https://dist.subgraph.com/downloads/VegaBuild-linux.gtk.x86_64.zip
unzip VegaBuild-linux.gtk.x86_64.zip


Step 2 :

cd vega
./Vega


That's all! See you.


Thursday, September 07, 2017

HOWTO : Install SpiderFoot on Ubuntu 16.04.3 LTS

SpiderFoot is an open source intelligence automation tool.

Step 1 :

sudo apt install git python-lxml python-netaddr python-m2crypto python-cherrypy3 python-mako python-requests python-bs4

Step 2 :

cd ~/
mkdir infosec
cd ~/infosec
git clone https://github.com/smicallef/spiderfoot.git


Step 3 : (Optional)

If you want to implement login feature, you need to :

echo "admin:admin" > ~/infosec/spiderfoot/passwd

Step 4 :

To run it :

cd ~/infosec/spiderfoot
python ./sf.py

Step 5 :

Open your browser and point to http://127.0.0.1:5001

* Make sure to add API Keys to the related items in the settings.

Update and Upgrade

sudo apt update
sudo apt dist-upgrade
cd ~/infosec/spiderfoot
git pull origin master


Reference

Documentation

That's all! See you.


HOWTO : Install OpenVAS 9 on Ubuntu 16.04.3 LTS

OpenVAS is an open source vulnerability scanner.

Step 1 :

sudo add-apt-repository ppa:mrazavi/openvas
sudo apt update

sudo apt install sqlite3
sudo apt install openvas9


* Make sure you install sqlite3 first, otherwise, the openvas9 will fail to install.

Step 2 :

To enable pdf reports:

sudo apt install texlive-latex-extra --no-install-recommends
sudo apt install texlive-fonts-recommended


To install openvas-nasl utility:

sudo apt-get install libopenvas9-dev

Step 3 :

sudo greenbone-nvt-sync
sudo greenbone-scapdata-sync
sudo greenbone-certdata-sync


Step 4 :

sudo systemctl restart openvas-scanner
sudo systemctl restart openvas-manager
sudo openvasmd --migrate (#only required when upgrading from an older version)
sudo openvasmd --rebuild --progress


Step 5 :

Default URL is https://localhost:4000
Use "admin" as username and password.

Step 6 : (Optional)

If you want to change port number, you need to :

sudo nano /etc/default/openvas-gsa
sudo systemctl restart openvas-gsa


That's all! See you.


Tuesday, September 05, 2017

HOWTO : Install SQLMap on Ubuntu 16.04.3 LTS

Metasploit Framework is required for SQLMap takeover process. The following is the complete SQLMap installation procedure on Ubuntu 16.04.3 LTS.

Step 1 :

sudo apt update
sudo apt dist-upgrade
sudo apt install git python-pip curl


Step 2 : Install SQLMap

cd ~/
mkdir infosec
cd ~/infosec

git clone https://github.com/sqlmapproject/sqlmap.git


Step 3 : Install Metasploit Framework

cd ~/infosec
curl https://raw.githubusercontent.com/rapid7/metasploit-omnibus/master/config/templates/metasploit-framework-wrappers/msfupdate.erb > msfinstall && chmod 755 msfinstall && ./msfinstall

msfconsole


Answer "yes" when you see this prompt message :

Would you like to use and setup a new database (recommended)? yes

Step 4 : Install SQLMap Dependencies

sudo apt install python-impacket python-ibm-db-sa python-kinterbasdb python-pyodbc python-pymssql python-pymysql python-psycopg2 python-pysqlite2 python-pymssql python-ntlm

pip install cx_Oracle --upgrade


Step 5 : Update/Upgrade

sudo apt update
sudo apt dist-upgrade

msfupdate

pip install cx_Oracle --upgrade

cd ~/infosec/sqlmap
python sqlmap.py --update


That's all! See you.


Wednesday, August 23, 2017

時事觀察節目-談雙學三犯只是加刑

余非:2017年8月21日,上訴庭宣判「雙學三犯」黃之鋒、羅冠聰和周永康三人加刑前,李卓人竟然在面書﹝Facebook﹞預先上載美國國會及行政當局中國委員會支持黃之鋒等人但未公布的聲明。聲明指,美國國會打算在黃之鋒等人被判入獄後,重新檢視香港在美國法例所賦予的特殊關係,明顯公然干涉香港內部事務。

余非又指,「犯罪動機高尚」,這些「搞事青年骨幹」就可以免責?「雙學三犯」黃之鋒、羅冠聰和周永康判監,余非強調是法庭對他們只是加刑,並不是重﹝重新﹞判。

請分享出去一齊聽聽余非的精闢分析!

「廣東話」原聲:余非三藩市《星島電台》時事觀察節目




余非 個人簡介:

香港中文大學中文系畢業,副修中國音樂(古箏),於同校取得碩士學位。之後赴英國修讀出版碩士。在港長期擔任編輯工作,曾主編高錕唯一一本中文自傳《潮平岸闊──高錕自述》;業餘從事文藝寫作。2003年轉為全職作家。

引述:
余非三藩市《星島電台》談雙學三犯只是加刑

Friday, August 18, 2017

HOWTO : Upgrade Ubuntu 16.04.3 to Ubuntu Gnome 16.04.3

Since Ubuntu Unity is no longer supported after Ubuntu 18.04, Ubuntu released Gnome 3 version for Ubuntu 16.04.3. We can upgrade it without pain.

sudo apt install ubuntu-gnome-desktop^

Select "gdm3" when prompted.

sudo apt remove unity lightdm ubuntu-desktop

sudo apt autoremove
sudo apt autoclean
sudo do-release-upgrade


Now, you can force to reboot the box by long pressing the shutdown button.

That's all! See you.

Update on August 19,2017 :

After the upgrade to Firefox 55.0.2, Firefox may not working properly on decimal place in your language. It shows 100,10 instead of 100.10 in my case even it is in English. This link will show you how to change it when necessary. I select "en-US" at "general.useragent.locale" in my case.


Wednesday, August 09, 2017

HOWTO : Fully Upgraded From Ubuntu 16.04.2 To 16.04.3

For some unknown reason, when Ubuntu 16.04.2 is upgraded to 16.04.3, the kernel does not upgrade from 4.4.x to 4.10.x automatically. The following steps will show you how to do it manually.

Step 1 :

sudo apt update
sudo apt dist-upgrade


Step 2 :

cat /etc/lsb-release

The output would be :

DISTRIB_ID=Ubuntu
DISTRIB_RELEASE=16.04
DISTRIB_CODENAME=xenial
DISTRIB_DESCRIPTION="Ubuntu 16.04.3 LTS"


Step 3 :

uname -r

If the kernel is still 4.4.x, you need to upgrade it manually.

Step 4 :

sudo apt --install-recommends install linux-generic-hwe-16.04 linux-tools-generic-hwe-16.04 xserver-xorg-hwe-16.04

sudo apt remove --purge linux-generic-lts-xenial linux-tools-generic-lts-xenial xserver-xorg-lts-xenial linux-image-generic-lts-xenial linux-generic linux-tools-generic linux-image-generic xserver-xorg linux-headers-generic linux-headers-generic-lts-xenial
sudo rm /boot/*-4.4.0-*
sudo apt autoremove
sudo apt autoclean


After the fully upgrade, the kernel would be 4.10.x after reboot.

That's all! See you.


Monday, July 17, 2017

[Warning] HSBC Phishing Website

This morning, I received an SMS message which stated that my account had been locked up and asked me to login to verify with a given link (http://activation-hsbc.com/cgi).

I inspected the "login" page and found that it would redirect you to your real local HSBC Personal eBanking Login page. However, your credentials would be logged by javascript and you would be redirected to Deep Web (or Dark Web) where all your real ebanking transaction sessions would be hijacked.

The phishing website domain was registered yesterday and the data show that it is from Russia (may be fake). The IP address of the server is 185.151.245.43. The URL http://185.151.245.43/cgi will show the same content.

I think that it may be a global HSBC phishing website. Beware!

That's all! See you.


(Update) After 4 hours of the reporting : I got the following confirmation email from HSBC :

Dear Customer

Thank you for your e-mail of 17 July regarding an SMS you received claiming to be from HSBC.

We confirm that the SMS in question is NOT genuine HSBC message. We have reported this matter to our relevant department for their attention and necessary action.

To safeguard your interests, please do not reply or click the link inside the SMS. Please delete the SMS immediately.

Thank you once again for taking the time to bring your concern to our attention. We are pleased to be of service.

Yours faithfully


Cxxxxxxa Wong
Senior Customer Support Officer
Retail Banking and Wealth Management

The Hongkong and Shanghai Banking Corporation Limited