Notes


MobileApp Pentesting Cheatsheet

The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics and checklist, which is mapped OWASP Mobile Risk Top 10 for conducting pentest. MobileApp-Pentest-Cheatsheet

They

They wake up in the morning and look at their phone. They scroll through social media for a few hours and then get out of bed. They go to the kitchen and make themselves some breakfast, but they don’t really eat it. They just stare at it and then eventually throw it away. They sit down at their computer and start to work on some project or another, but they can’t focus. Their mind keeps wandering and they can’t seem to get anything done. They give up and start to watch TV, but they can’t concentrate on that either. They just keep scrolling through their phone or looking at pictures on the internet. They don’t really interact with other people, except for when they have to. They just go through the motions of life, but they don’t really feel alive.

SpiderSMS - End to End Encrypted SMS and SMS Tunneling app

This is an secure SMS encryption and tunneling app for those who would like to implement E-2-E Encryption to their SMS communications. SpiderSMS

Detect-It-Easy - determining types of files

Detect It Easy, or abbreviated “DIE” is a program for determining types of files.

“DIE” is a cross-platform application, apart from Windows version there are also available versions for Linux and Mac OS.

Many programs of the kind (PEID, PE tools) allow to use third-party signatures. Unfortunately, those signatures scan only bytes by the pre-set mask, and it is not possible to specify additional parameters. As the result, false triggering often occur. More complicated algorithms are usually strictly set in the program itself. Hence, to add a new complex detect one needs to recompile the entire project. No one, except the authors themselves, can change the algorithm of a detect. As time passes, such programs lose relevance without the constant support.

Detect It Easy has totally open architecture of signatures. You can easily add your own algorithms of detects or modify those that already exist. This is achieved by using scripts. The script language is very similar to JavaScript and any person, who understands the basics of programming, will understand easily how it works. Possibly, someone may decide the scripts are working very slow. Indeed, scripts run slower than compiled code, but, thanks to the good optimization of Script Engine, this doesn’t cause any special inconvenience. The possibilities of open architecture compensate these limitations. Detect-It-Easy

pyWhat - identify anything

Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it’ll tell you what it is!

Imagine this: You come across some mysterious text 0x52908400098527886E0F7030069857D2E4169EE7 or dQw4w9WgXcQ and you wonder what it is. What do you do?

Well, with what all you have to do is ask what “0x52908400098527886E0F7030069857D2E4169EE7” and what will tell you!

what’s job is to identify what something is. Whether it be a file or text! Or even the hex of a file! What about text within files? We have that too! what is recursive, it will identify everything in text and more! pyWhat - identify anything

Passion comes and goes like a storm

Passion comes and goes like a storm,
for now calm and healing.
That’s fine.
But don’t go without for too long.

An inside view of domain anonymization as-a-service — BraZZZerSFF

One, if not the main, challenge with producing good intelligence is to have access to the right information at the right moment. The right telemetry from the right angle helps you to detect and dig out the right signal. Sometimes, in order to obtain good telemetry, you need a bit of luck.

The story we are writing here will try to explain how, from a simple mistake made by an operator, we managed to collect and exploit a lot of precious information from a “Fast Flux” network called BraZZZerS Fast Flux between end of 2018 and 2022. An inside view of domain anonymization as-a-service — the BraZZZerSFF infrastructure

Technical analysis of Hydra Android malware

If we unzip the sample and explore the AndroidManifest.xml, we see that the entry point com.sdktools.android.MainActivity is not found in the code of the sample. This an indication of a packed sample. You can identify the packing technique using droidlysis or APKiD. If we use droidlysis, We can see the it the sample uses DexClassLoader, malware uses JsonPacker packer. So we need to get the decrypted payload of the sample. We will use Frida to get the decrypted payload. We will install the sample on the Android studio as an emulator and by using WSL on my host we will launch Frida to start the malicious APP to get the payload. Then we pull the payload to our host from the emulator. Technical analysis of Hydra Android malware

How I hacked my car

Last summer I bought a 2021 Hyundai Ioniq SEL. It is a nice fuel-efficient hybrid with a decent amount of features like wireless Android Auto/Apple CarPlay, wireless phone charging, heated seats, & a sunroof.

One thing I particularly liked about this vehicle was the In-Vehicle Infotainment (IVI) system. As I mentioned before it had wireless Android Auto which seemed to be uncommon in this price range, and it had pretty nice, smooth animations in its menus which told me the CPU/GPU in it wasn’t completely underpowered, or at least the software it was running wasn’t super bloated. How I Hacked my Car

Demystifying the SVCHOST.EXE Process and Its Command Line Options

The Service Host process or svchost.exe is one the most notorious processes out there. It got a bad reputation for being ‘malicious’ due to mostly two factors, one is malware impersonating it and the other is good old ‘Task Manager’.

Because of the way task manager was designed in the old days (and to some extent today), it never gave much details into processes on the system and especially ‘special’ processes like svchost.exe. So by using the task manager to see what processes are opened, you’ll get a bunch of svchost.exe processes with the description ‘Host Process for Windows Services’. Without any information about the services that are hosted in it. So it only took malware two additional steps to make itself look legitimate.Demystifying the SVCHOST.EXE Process and Its Command Line Options

We're all puppets

We’re all puppets, some of us just happen to see the strings.

pamspy - Credentials Dumper for Linux

pamspy leverage eBPF technologies to achieve an equivalent work of 3snake.

It will track a particular userland function inside the PAM (Pluggable Authentication Modules) library, used by many critical applications to handle authentication.

pamspy will load a userland return probe eBPF program to hook the pam_get_authtok function from libpam.so. PAM stands for ‘Pluggable Authentication Modules’, and have a flexible design to manage a different kind of authentication on Linux.

Each time an authentication process tries to check a new user, It will call pam_get_authtok, and will be here to dump the content of the critical secrets! pamspy - Credentials Dumper for Linux

Leaked GTA 6 videos - download

If you want to download the 90 leaked GTA 6 videos, go here.

15 year old basement hacker

vMass Bot - automate the exploitation of remote hosts

vMass Bot automates the exploitation of remote hosts by trying to find environment files (.env) in target hosts and extract tools and info insde, then the bot detects the target host CMS and tries to auto exploit and upload shell payload using the vMass vulnerability set (108 exploits in the current version 1.2).

No target list ? No worries, vMass Bot can generate hosts lists from IP ranges, URL list, dotenv low profile dorks and scrapes from (bing, duckduckgo, ..) or you can use IP ranges from various hosting providers for best hit rate while scanning, then generated lists can be checked using the bot to eleminate dead hosts. vMass Bot - automate the exploitation of remote hosts

It's much better for your mind

Just go scroll through Twitter and consume some news, communicate with friends and complete strangers, learn something new, be moved, be annoyed, be outraged, agree with someone, vehemently disagree with another, feel superior, feel jealous, look at some memes and laugh your ass off, all in the span of less than an hour. It’s much better for your mind.