Posts

Showing posts from 2020

How to compile an Android kernel

Image
By  nathanchance , Recognized Develope r. Introduction Hello everyone, I will be going over how to compile a kernel from beginning to end! Prerequisites: A Linux environment (preferably 64-bit) Knowledge of how to navigate the command line Common sense A learning spirit, there will be no spoonfeeding here What this guide will cover: Downloading the source Downloading a cross compiler Building the kernel Flashing the kernel What this guide will NOT cover: Setting up a build environment (plenty of existing Linux installation guides) Adding features to the kernel (plenty of git cherry-picking guides) I know this has been done before but on a cursory search, I have not seen a guide that was recently updated at all. 1. Downloading the source If you have a custom kernel you want to build, move along after cloning the kernel using the git clone command below. If you are compiling your stock kernel, it is ultimately up to you to know where to get your kernel source from but here are some commo

What is script?

Image
What is script? script is a Go library for doing the kind of tasks that shell scripts are good at: reading files, executing subprocesses, counting lines, matching strings, and so on. Why shouldn't it be as easy to write system administration programs in Go as it is in a typical shell? script aims to make it just that easy. Shell scripts often compose a sequence of operations on a stream of data (a pipeline). This is how script works, too. What can I do with it? Let's see a simple example. Suppose you want to read the contents of a file as a string: contents, err := script.File("test.txt").String() That looks straightforward enough, but suppose you now want to count the lines in that file. numLines, err := script.File("test.txt").CountLines() For something a bit more challenging, let's try counting the number of lines in the file which match the string "Error": numErrors, err := script.File("test.txt").Match("Error").CountLin

Hackers Breach 3.5 Million MobiFriends Dating App Credentials

Image
The credentials of 3.5 million users of MobiFriends, a popular dating app, have surfaced on a prominent deep web hacking forum, according to researchers. MobiFriends is an online service and  Android app  designed to help users worldwide meet new people online. The Barcelona-based developer of MobiFriends, MobiFriends Solutions, has not commented on the leak. Researchers say the leaked data include dates of birth, genders, website activity, mobile numbers, usernames, email addresses and MD5 hashed passwords. Roy Bass, senior dark web analyst at Risk Based Security (RBS), told Threatpost the posting came from a reliable source. Bass said that researchers verified the data against the MobiFriends official website (researchers also provided Threatpost with redacted screenshots of the shared credentials). The compromised credentials were originally posted for sale on an underground forum on Jan. 12 by a threat actor named “DonJuji,” according to a RBS post on Thursday. The threat actor att

Wifi Honey

Image
This script creates five monitor mode interfaces, four are used as APs and the fifth is used for airodump-ng. To make things easier, rather than having five windows all this is done in a screen session which allows you to switch between screens to see what is going on. All sessions are labelled so you know which is which. Source: https://digi.ninja/projects/wifi_honey.php Author: Robin Wood License: Creative Commons Attribution-Share Alike 2.0 Tools included in the wifi-honey package wifi-honey – Wi-Fi honeypot root@kali:~# wifi-honey -h Usage: /usr/bin/wifi-honey <essid> <channel> <interface> Default channel is 1 Default interface is wlan0 Robin Wood <robin@digininja.org> See Security Tube Wifi Mega Primer episode 26 for more information wifi-honey Usage Example Broadcast the given ESSID  (FreeWiFi)  on channel 6  (6)  using the wireless interface  (wlan0) : root@kali:~# wifi-honey FreeWiFi 6 wlan0

Deepfakes a Cybersecurity Threat

Image
In 2019,  50% of all global organizations  fell victim to ransomware, compromised accounts, or spoofed credentials, many due to falling for a phishing attack. In the same year,  Australians reported  $61.6 million lost due to investment scams. As alarming as these statistics are, we expect cybersecurity threats for 2020 to increase. Indeed, with the start of this new year, cybersecurity experts have been coming together to predict the targeted attack vectors and how to protect against them. Some of the most highly discussed topics include an increase in deepfakes, ransomware, and the standardization of MFA (multi-factor authentication). Deepfakes a Cybersecurity Threat for 2020 As technology advances, we’re hearing the term ‘deepfake’ more frequently. This word encompasses everything from  1920’s filmmakers animating earthquakes,  to the modern day  politicians “saying”  controversial things. At the core, today’s deepfakes use AI-based technology to create fake videos and audio that lo

EagleEye - Stalk Your Friends. Find Their Instagram, FB And Twitter Profile

Image
Stalk Your Friends. Find Their Instagram, FB And Twitter Profiles Using Image Recognition And Reverse Image Search. This only works if their  Facebook  Profile is public What does this do? In simple words you have at least one Image of the Person you are looking for and a clue about its name. You feed this program with it and it tries to find Instagram, Youtube, Facebook,  Twitter  Profiles of this Person. How does it work? You give it a name and at least one photo. It then searches Facebook for this name and does Facial Recognition to determine the right Facebook Profile. After that it does a Google and ImageRaider  Reverse  Image Search to find other Social Media Profiles. If a  Instagram  Profile was found it will be verified by comparing your known photo of the Person to some of the Instagram Pictures. In the end you get a PDF Report :) How to use it Automated Prequisites Installation wget https://raw.githubusercontent.com/ThoughtfulDev/EagleEye/master/pre.sh && chmod +x pr

$40 Million Worth Of Bitcoin To Be Sold On Auction By The US Government

Image
More than 4,000 BTC will be auctioned today by the United States Marshals Service (USMS). The procedure will happen with sealed bids where the highest bidder gets the bitcoins. All of the bitcoins included in the auction have been forfeited in different federal criminal, administrative, and civil cases The US Marshal Service will  carry out  a sealed bid auction for around 4041 BTC later today. The amount, at current BTC rates, equals a little less than $40 million. According to the official release, there is a required deposit to participate in the auction set to $200,000. The bitcoins will be sold in four different series, divided into several blocks. This is how the distribution looks like: USMS Bitcoin Auction Lot Distribution. Source:  USMS To participate, bidders had to register with the USMS. The registration process opened on February 3rd and ended on Wednesday 12th, and those who are approved to take part must have received a confirmation from the USMS. All documentation recei

Hacking IoT devices with Focaccia-Board: A Multipurpose Breakout Board to hack hardware in a clean and easy way!

Image
Prologue Even before the appearance of the word (I)IoT, I was breaking hardware devices, as many of you, with a multitude of debuggers (i.e. stlink, jlink, RS23–2-2USB, etc.). It was always a PITA bringing around a device that does UART-to-USB, another that supports JTAG or SWD, a SPI reader/dumper, etc. Luckily for all of us, FTDI released the lovely FT232H chipset which does support all of them in one-single-chip. Hurray! One of the cheapest boards embedding the FT232H on the market is the FT232H CJMCU, which cost less than 10 EUR! FT232 CJMCU (Easily available on ebay, amazon or  Aliexpress ) Though, there was still a couple of drawbacks: Every-time I had to remember which Pin was doing what. For each of the protocols! (i.e. UART, JTAG, SWD, I2C, SPI). There were not Pull-Up resistors on the PCB. Some Pins used for a protocol have to be short-circuited to operate with other protocols (i.e. I2C or SWD). Too many flying cables when you need to connect to some testing DuPont wires (exa