Sunday, 29 April 2018

Fluxion - The number 1 WiFi Cracking Tool

Fluxion - The number 1 WiFi Cracker
Fluxion is a remake of linset by vk496 with less bugs and enhanced functionality.
See Fluxion site: https://fluxionnetwork.github.io/fluxion/


Fluxion is the future of MITM WPA attacks
   Fluxion is a security auditing and Social-Engineering research tool. It is a remake of linset by vk496 with (hopefully) less bugs and more functionality. The script attempts to retrieve the WPA/WPA2 key from a target access point by means of a social engineering (phishing) attack. It's compatible with the latest release of Kali (rolling). Fluxion's attacks' setup is mostly manual, but experimental auto-mode handles some of the attacks' setup parameters. Read the FAQ before requesting issues.

   If you need quick help, fluxion is also avaible on gitter. You can talk with us on Gitter or on Discord.

Screenshot (On Kali Linux 2018.1)


Installation

   Read here before you do the following steps:

   
git clone https://github.com/FluxionNetwork/fluxion (Download Fluxion)
   cd fluxion
   sudo bash ./fluxion.sh (Run Fluxion)

📜 Changelog: Fluxion gets weekly updates with new features, improvements, and bugfixes. Be sure to check out the changelog here.

How to contribute
   All contributions are welcome! Code, documentation, graphics, or even design suggestions are welcome; use GitHub to its fullest. Submit pull requests, contribute tutorials or other wiki content -- whatever you have to offer, it'll be appreciated but please follow the style guide.

How it works ?
 * Scan for a target wireless network.
 * Launch the Handshake Snooper attack.
 * Capture a handshake (necessary for password verification).
 * Launch Captive Portal attack.
 * Spawns a rogue (fake) AP, imitating the original access point.
 * Spawns a DNS server, redirecting all requests to the attacker's host running the captive portal.
 * Spawns a web server, serving the captive portal which prompts users for their WPA/WPA2 key.
 * Spawns a jammer, deauthenticating all clients from original AP and lureing them to the rogue AP.
 * All authentication attempts at the captive portal are checked against the handshake file captured earlier.
 * The attack will automatically terminate once a correct key has been submitted.
 * The key will be logged and clients will be allowed to reconnect to the target access point.
 * For a guide to the Captive Portal attack, read the Captive Portal attack guide

Requirements
   A Linux-based operating system. GitHackTools recommend Parrot Security OS or Kali Linux. Kali Linux & Parrot Security OS support the latest Aircrack-ng versions. An external wifi card is recommended.

Credits
 * l3op - contributor
 * dlinkproto - contributor
 * vk496 - developer of linset
 * Derv82 - @Wifite/2
 * Princeofguilty - @webpages and @buteforce
 * Photos for wiki @http://www.kalitutorials.net
 * Ons Ali @wallpaper
 * PappleTec @sites
 * MPX4132 - Fluxion V3

Disclaimer
   Authors do not own the logos under the /attacks/Captive Portal/sites/ directory. Copyright Disclaimer Under Section 107 of the
Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research.

   The usage of Fluxion for attacking infrastructures without prior mutual consent could be considered an illegal activity, and is highly discouraged by its authors/developers. It is the end user's responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program.

Note
 * Beware of sites pretending to be related with the Fluxion Project. These may be delivering malware.
 * Fluxion DOES NOT WORK on Linux Subsystem For Windows 10, because the subsystem doesn't allow access to network interfaces. Any Issue regarding the same would be Closed Immediately

Links
 * Fluxion website: https://fluxionnetwork.github.io/fluxion/
 * Discord: https://discordapp.com/invite/G43gptk
 * Gitter: https://gitter.im/FluxionNetwork/Lobby



[WARHOX] HOW TO CRACK VMWARE 14 PRO WARKING 10,000%


DISCLAIMER: This Channel DOES NOT Promote or encourage Any illegal activities , all contents provided by This Channel is meant for EDUCATIONAL PURPOSE only .

Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.

________________________________
Serial:
ZF19K-02Z8H-H89ZQ-UFWZE-WQKU0
VA552-68W90-489UY-T7MEX-M3AV2
VZ302-43YEP-M8DWQ-VWZEC-YKH8D
CA3DK-62W9P-08D7Z-5EXZG-XY8CF
VF3N0-AHX8P-H8EYY-G6WNC-X7KW0

_________________________________________________________________



Saturday, 28 April 2018

Finding Packages for Kali Linux

Finding Packages for Kali Linux
Use apt-cache
   Of the various interfaces available to search for packages, apt-cache is the most basic and rudimentary of them all.

   However, it is also the interface we tend to use most often because it is fast, easy, and efficient. By default, apt-cache searches for a given term in package names as well as their descriptions.
   
   Use this command: apt-cache search PACKAGES NAME

   For example, knowing that all Kali Linux metapackages include ‘aircrack-ng’ in their names, we can easily search for all of them.
   Enter this command: apt-cache search aircrack-ng

   In many cases, apt-cache returns far too many results because it searches in package descriptions. The searches can be limited to the package names themselves by using the –names-only option.

root@kali:~# apt-cache search nmap | wc -l
37
root@kali:~# apt-cache search nmap --names-only
dnmap - Distributed nmap framework
fruitywifi-module-nmap - nmap module for fruitywifi
nmap-dbgsym - debug symbols for nmap
python-libnmap - Python 2 NMAP library
python-libnmap-doc - Python NMAP Library (common documentation)
python3-libnmap - Python 3 NMAP library
libnmap-parser-perl - parse nmap scan results with perl
nmap - The Network Mapper
nmap-common - Architecture independent files for nmap
zenmap - The Network Mapper Front End
nmapsi4 - graphical interface to nmap, the network scanner
python-nmap - Python interface to the Nmap port scanner
python3-nmap - Python3 interface to the Nmap port scanner

   Since apt-cache has such wonderfully greppable output, we can keep filtering results until they’re at a manageable number.

root@kali:~# apt-cache search nmap --names-only | egrep -v '(python|perl)'
dnmap - Distributed nmap framework
fruitywifi-module-nmap - nmap module for fruitywifi
nmap - The Network Mapper
nmap-common - Architecture independent files for nmap
nmap-dbgsym - debug symbols for nmap
nmapsi4 - graphical interface to nmap, the network scanner
zenmap - The Network Mapper Front End

   You can further filter down the search results but once you start chaining together a few commands, that’s generally a good indication that it’s time to reach for a different tool.

Use aptitude
   The aptitude application is a very close cousin of apt and apt-get except it also includes a very useful ncurses interface. It is not included in Kali by default but it can quickly be installed as follows.
   root@kali:~# apt update && apt -y install aptitude

   After installation, running aptitude without any options will launch the ncurses interface. One of the first things you will notice is that you can quickly and easily browse through packages by category, which greatly helps with sorting through the thousands of available packages.

   To search for a package, either press the / character or select ‘Find’ under the ‘Search’ menu. As you enter your query, the package results will be updated dynamically

   Once you’ve located a package of interest, you can mark it for installation with the + character or to remove/deselect it, the character.

   At this point, you can keep searching for other packages to mark for installation or removal. When you’re ready to install, press the g key to view the summary of the actions to be taken.

   If you’re satisfied with the proposed changes, press g again and aptitude will complete the package installations as usual.

Use search engines
   If you want to restrict your searches to tools that are packaged by the Kali team, the easiest way to do so is probably by using the search engines site (Google, Bing or DuckDuckGo) search operator.

   Using this keyword: site:kali.org PACKAGES NAME

   Example: site:kali.org lynis

Read more
 * What is Kali Linux Metapackages and How to install it?: http://bit.ly/2IGVcub
 * DEBIAN PACKAGE MANAGEMENT

How to check Spectre and Meltdown on Ubuntu/Debian ?

Debian/Linux with Spectre and Meltdown vulnerability
Using Terminal
   To check Spectre and Meltdown vulnerability by Terminal, enter that command. You will see information about security vulnerabilities on the CPU from Linux kernel developers:
      grep . /sys/devices/system/cpu/vulnerabilities/*

Using Spectre & Meltdown checker for Linux
   If you would like to know more about the Specter and Meltdown vulnerabilities, you can use the "Specter and Meltdown checker for Linux"

   First, enter the that command to download "Specter and Meltdown checker for Linux":
      git clone https://github.com/speed47/spectre-meltdown-checker
      cd spectre-meltdown-checker

   Next, to check and see details about the Specter and Meltdown vulnerabilities on your CPU, enter this command:
      sudo ./spectre-meltdown-checker.sh

   You will find detailed information about security vulnerabilities Meltdown, Specter Specter v1 and v2 on your CPU. And whether your computer is vulnerable to attacks via Specter and Meltdown vulnerabilities

How to patch vulnerabilities Specter and Meltdown ?
   Developers will release patches through the packages, so update your Linux distribution regularly

Read more: 
 * Spectre & Meltdown checker for Linux
 * Meltdown and Spectre - Two serious Security Holes in the CPU severely

Ransomnix ransomware variant encrypts websites



Ransomnix is a (supposedly Jigsaw, but not really) ransomware variant that holds websites for ransom, and encrypts any files associated with the website.

This ransomware was discovered in the second half of 2018, and there's a brief write-up by Amigo-A here as well: Ransomnix ransomware

In this blog post, we'll discuss a newer variant.


Analysis

Several encrypted websites were discovered, which display the following message:

Figure 1 - Ransom message, part 1

Figure 2 - Ransom message, part 2

The full message is as follows:


JIGSAW RANSOMNIX 2018
I WANT TO PLAY A GAME!
Now Pay 0.2 BTC
OR
Payment will increase by
0.1
BTC each day after
00:00:00
Your Key Will Be Deleted
Your Bill till now 2.4000000000000004 BTC
Dear manager, on
Fri Apr 06 2018 02:08:34 GMT+0100 (GMT Summer Time)
your database server has been locked, your databases files are encrypted
and you have unfortunately "lost" all your data, Encryption was produced using
unique public key RSA-2048 generated for this server.
To decrypt files you need to obtain the private key.
All encrypted files ends with .Crypt
Your reference number: 4027
To obtain the program for this server, which will decrypt all files,
you need to pay 0.2 bitcoin on our bitcoin address 1VirusnmipsYSA5jMv8NKstL8FkVjNB9o (today 1 bitcoin was around 15000 $).
After payment send us your number on our mail crypter@cyberservices.com and we will send you decryption tool (you need only run it and all files will be decrypted during a few hours depending on your content size).
Before payment you can send us one small file (100..500 kilobytes) and we will decrypt it!
It's your guarantee that we have decryption tool. (use your reference number as a subject to your message)
We don't know who are you, All what we need is some money.
Don't panic if we don't answer you during 24 hours. It means that we didn't received your letter and write us again.
You can use one of that bitcoin exchangers for transfering bitcoin.
https://localbitcoins.com
https://www.kraken.com
You dont need install bitcoin programs - you need only use one of this exchangers or other exchanger that you can find in www.google.com for your country.
Please use english language in your letters. If you don't speak english then use https://translate.google.com to translate your letter on english language.
You do not have enough time to think each day payment will increase by
0.1 BTC and after one week your privite key will be deleted and your files will be locked for ever.

People use cryptocurrency for bad choices,
 but today you will have to use it to pay for your files!
 It's your choice!

The following JavaScript is responsible for keeping track of the price, and increasing it:

Figure 3 - JS function

The starting price is set at 0.2 BTC, but will increase every day with 0.1 BTC thanks to two functions: inprice and startTimer.
The function for calculating the time and date, startTimer, is a copy/paste from the following StackOverflow answer: The simplest possible JavaScript countdown timer?

Note that the start_date variable, 1522976914000, is the epoch timestamp in milliseconds, which converted is indeed Friday 6 April 2018 01:08:34, as mentioned in the ransom note.

Ransomware message details:

BTC Wallet: 1VirusnmipsYSA5jMv8NKstL8FkVjNB9o
Email: crypter@cyberservices.com 
Extension: .Crypt

Files will be encrypted, as claimed by the cybercriminals, with RSA-2048.

Unfortunately, it appears several people have already paid for decryption: 1VirusnmipsYSA5jMv8NKstL8FkVjNB9o


Disinfection

If possible, restore the website from a backup, and consequently patch your website, this means: install all relevant and security patches for your CMS, and plugins where applicable.

Then, change all your passwords. Better be safe than sorry.

It is currently unknown if decryption is possible. If you have an example of an encrypted file, please do upload it to ID Ransomware and NoMoreRansom, to see if decryption is possible, or if a decryptor can be developed.


Prevention

For preventing ransomware that attacks your websites, you can follow my prevention tips here.

General ransomware prevention tips can be found here.


Conclusion

Ransomware can in theory be installed on everything; whether it's your machine, your website, or your IoT device. Follow the prevention tips above to stay safe.

Remember: create backups, regularly, and test them as well.



IOCs