• Content Count

  • Avg. Content Per Day

  • Joined

  • Last visited

  • Days Won


dEEpEst last won the day on January 20 2021

dEEpEst had the most liked content!

Community Reputation

36,176 Excellent

About dEEpEst

  • Rank
    ☣☣ In The Depths ☣☣

Recent Profile Visitors

58,953 profile views
  1. dEEpEst

    What is an image replay attack ?

    ✓ What is an image replay attack ? An image replay attack is the use of a picture to fool an authentication method. Image replay attacks are most commonly used by an attacker trying to gain entry to a system protected by less-than-secure biometric authentication technology implementations. The method has been used successfully against low-end fingerscanners, iris scanners and facial recognition systems. In the simplest cases, image replay attacks involve a printed image of the subject used for authentication. An attacker might, for example, present a picture of an authorized user to a facial recognition system. Extra measures can be implemented in facial recognition and iris scans to foil printed or static images, however; such measures include requiring the user to wink, blink or speak. More sophisticated image replay attack methods may involve recorded video and audio playback to defeat these measures. Methods of defeating these attacks exist as well, however. Video and audio are typically out of sync to a detectable degree when played back from a file. Security algorithms have been created to detect the discrepancy and prevent these attacks. Making biometric authentication methods secure from image replay attacks can't rely on the methods used to detect data replay attacks. (The opposite is also true.) When security is important, it is advisable for administrators to be aware of both attack methods and counter measures.
  2. dEEpEst

    What is OTP token ?

    ✓ What is OTP token ? A one-time password token (OTP token) is a security hardware device or software program that is capable of producing a single-use password or PIN passcode. One-time password tokens are often used as a part of two-factor and multifactor authentication. The use of one-time password tokens hardens a traditional ID and password system by adding another, dynamic credential. Depending upon the vendor, an OTP token will generate a PIN synchronously or asynchronously. Synchronous tokens use a secret key and time to create a one-time password. Asynchronous tokens use a challenge-response authentication mechanism (CRAM). In the past, OTP security tokens were usually pocket-size fobs with a small screen that displayed a number. The number changed every 30 or 60 seconds, depending on how the token is configured and the user entered his or her user name and password, plus the number displayed on the token. Today, OTP tokens are often software-based, and the passcode generated by the token is displayed on the user's smartphone screen. Software tokens make it easier for mobile users to enter authentication information and not have to keep track of a separate piece of hardware.
  3. dEEpEst

    What is password salting ?

    ✓What is password salting ? Password salting is a technique to protect passwords stored in databases by adding a string of 32 or more characters and then hashing them. Salting prevents hackers who breach an enterprise environment from reverse-engineering passwords and stealing them from the database. Password salting increases password complexity, making them unique and secure without affecting user experience. It also helps prevent hash table attacks and slows down brute-force and dictionary attacks. ✓ Password hashing and why salting is required Hashing prevents passwords from being exposed or stolen by threat actors, since they are not stored as plaintext. For example, when users create an account with a username and password on a website, their password is hashed and stored in an internal file system in an encrypted form. When users log in, the password runs through a one-way hashing algorithm that converts the password into a different and unrecognizable string of characters. During login, this string is compared to the other hashes stored in the website's database. If the credentials match the stored hash, users can access the account. If it doesn't match, hash verification fails, and users are not able to log in.
  4. HexorBase is a database application designed for administering and auditing multiple database servers simultaneously from a centralized location, it is capable of performing SQL queries and bruteforce attacks against common database servers (MySQL, SQLite, Microsoft SQL Server, Oracle, PostgreSQL ).HexorBase allows packet routing through proxies or even metasploit pivoting antics to communicate with remotely inaccessible servers which are hidden within local subnets. It works on Linux and Windows running the following: ###Requirements: python python-qt4 cx_Oracle python-mysqldb python-psycopg2 python-pymssql python-qscintilla2 ###Downloads to download the latest version [Hidden Content] To install simply run the following command in terminal after changing directory to the path were the downloaded package is: [email protected]:~# dpkg -i hexorbase_1.0_all.deb ###Icons and Running the application: Software Icon can be found at the application Menu of the GNOME desktop interfaces Icon can also be found at /usr/share/applications for KDE and also GNOME: There you find "HexorBase.desktop" ###To get the source code for this project from SVN, here's the checkout link: [email protected]:~# svn
  5. [Hidden Content]
  6. Download: [Hidden Content]
  7. dEEpEst

    What is password cracking ?

    What is password cracking ? - Password cracking is the process of using an application program to identify an unknown or forgotten password to a computer or network resource. It can also be used to help a threat actor obtain unauthorized access to resources. - With the information malicious actors gain using password cracking, they can undertake a range of criminal activities. Those include stealing banking credentials or using the information for identity theft and fraud. - A password cracker recovers passwords using various techniques. The process can involve comparing a list of words to guess passwords or the use of an algorithm to repeatedly guess the password.
  8. [Hidden Content] * Hᴏᴡ Sᴏᴄɪᴀʟ Eɴɢɪɴᴇᴇʀɪɴɢ Wᴏʀᴋs? - ɢᴀᴛʜᴇʀ ɪɴғᴏʀᴍᴀᴛɪᴏɴ: ᴛʜɪs ɪs ᴛʜᴇ ғɪʀsᴛ sᴛᴀɢᴇ, ᴛʜᴇ ʟᴇᴀʀɴs ᴀs ᴍᴜᴄʜ ᴀs ʜᴇ ᴄᴀɴ ᴀʙᴏᴜᴛ ᴛʜᴇ ɪɴᴛᴇɴᴅᴇᴅ ᴠɪᴄᴛɪᴍ. ᴛʜᴇ ɪɴғᴏʀᴍᴀᴛɪᴏɴ ɪs ɢᴀᴛʜᴇʀᴇᴅ ғʀᴏᴍ ᴄᴏᴍᴘᴀɴʏ ᴡᴇʙsɪᴛᴇs, ᴏᴛʜᴇʀ ᴘᴜʙʟɪᴄᴀᴛɪᴏɴs ᴀɴᴅ sᴏᴍᴇᴛɪᴍᴇs ʙʏ ᴛᴀʟᴋɪɴɢ ᴛᴏ ᴛʜᴇ ᴜsᴇʀs ᴏғ ᴛʜᴇ ᴛᴀʀɢᴇᴛ sʏsᴛᴇᴍ. - ᴘʟᴀɴ ᴀᴛᴛᴀᴄᴋ: ᴛʜᴇ ᴀᴛᴛᴀᴄᴋᴇʀs ᴏᴜᴛʟɪɴᴇ ʜᴏᴡ ʜᴇ/sʜᴇ ɪɴᴛᴇɴᴅs ᴛᴏ ᴇxᴇᴄᴜᴛᴇ ᴛʜᴇ ᴀᴛᴛᴀᴄᴋ - ᴀᴄϙᴜɪʀᴇ ᴛᴏᴏʟs: ᴛʜᴇsᴇ ɪɴᴄʟᴜᴅᴇ ᴄᴏᴍᴘᴜᴛᴇʀ ᴘʀᴏɢʀᴀᴍs ᴛʜᴀᴛ ᴀɴ ᴀᴛᴛᴀᴄᴋᴇʀ ᴡɪʟʟ ᴜsᴇ ᴡʜᴇɴ ʟᴀᴜɴᴄʜɪɴɢ ᴛʜᴇ ᴀᴛᴛᴀᴄᴋ. - ᴀᴛᴛᴀᴄᴋ: ᴇxᴘʟᴏɪᴛ ᴛʜᴇ ᴡᴇᴀᴋɴᴇssᴇs ɪɴ ᴛʜᴇ ᴛᴀʀɢᴇᴛ sʏsᴛᴇᴍ. - ᴜsᴇ ᴀᴄϙᴜɪʀᴇᴅ ᴋɴᴏᴡʟᴇᴅɢᴇ: ɪɴғᴏʀᴍᴀᴛɪᴏɴ ɢᴀᴛʜᴇʀᴇᴅ ᴅᴜʀɪɴɢ ᴛʜᴇ sᴏᴄɪᴀʟ ᴇɴɢɪɴᴇᴇʀɪɴɢ ᴛᴀᴄᴛɪᴄs sᴜᴄʜ ᴀs ᴘᴇᴛ ɴᴀᴍᴇs, ʙɪʀᴛʜᴅᴀᴛᴇs ᴏғ ᴛʜᴇ ᴏʀɢᴀɴɪᴢᴀᴛɪᴏɴ ғᴏᴜɴᴅᴇʀs, ᴇᴛᴄ. ɪs ᴜsᴇᴅ ɪɴ ᴀᴛᴛᴀᴄᴋs sᴜᴄʜ ᴀs ᴘᴀssᴡᴏʀᴅ ɢᴜᴇssɪɴɢ.
  9. Welcome to another hacking tutorial. Today you will learn how to use google to hack passwords and accounts. Not only that you can also hack web servers and find email lists webcams and so on. This technique is called google dorks or Google Dorking. This includes the use of google search operators to find log files. You may not know this but Google has a bad habit of indexing everything. I mean literally everything. With the right dorks, you can hack devices just by Googling the correct parameters and you will have passwords to log in. Below I will show you a demo of how I was able to find passwords of PayPal accounts which were stored openly. So what is Google Dorking and Google Hacking? Google Dorking is an advanced application of Google search operators — using google search operators to hunt for specific vulnerable devices, exploitable files, sensitive data and so on through specific search strings. So basically we can find log files password files email lists etc. openly on the web. What Kinds of Things Do Dorks Connect to the Internet? You would be amazed as to what you can find connected and lying on the internet. Everything from controllers to nuclear stations. Luckily people are implementing security measures with the rise of security threats. So how is it relevant to you? Imagine getting a new house with security cameras or smart IoT devices that provide the ability to control everything via your phone whenever you want. You set it up, connect it to your Wi-Fi and can manage everything. What’s going on in the background isn’t so simple. The devices call a server stored on the internet and streams video and data in real-time, allowing you to control That server may require no password to access the files from your server so that they can access files making your smart home accessible to anyone who searches for text via the server. And google just goes and finds all the devices connected on the internet. So without further ado, let’s begin the tutorial. Finding FTP Servers & Websites Using HTTP To start, we will be using the following dork to search for FTP servers that are open. Searching for these servers can allow us to find internal files and data as shown below: intitle:"index of" inurl:ftp intitle:"index of" inurl:http These servers are public because the index file of their FTP and the HTTP server is the kind of thing that Google loves to scan and index— a fact many people tend to forget. Google’s scanning leads to a complete list of all the files contained within the server being publically available on Google. If we want to start attacking some hacking targets, we can be more specific and search for online forms still using HTTP by changing the text in the search title. intitle:"forum" inurl:http inurl:"registration" Here you can see we’ve found a list of vulnerable online forums using HTTP which can easily be hacked and compromised. Find Log Files with Passwords and username Now we will search for files of the .log type. Searching for LOG files will allow us to look for clues about what the username password to the systems or admin accounts is. The dork we’ll be using to do this is as follows. allintext:password filetype:log allintext:username filetype:log With these dorks, you can easily find usernames and passwords for hacking. Check below I just found a log with all the usernames and passwords for Paypal account and server login and password. Find Configuration Files with Passwords Configuration files should never be public but people never really learn and .ENV files are the best examples of this. If we search for .ENV files that contain a string username and password, we instantly find the accounts. This is how hackers make leaked username password lists. filetype:env "DB_PASSWORD" Find Email Lists on the internet Email lists are a great way of scraping email addresses for phishing and other campaigns used by hackers. These lists are frequently exposed by companies or schools that are trying to organize email lists for their members who forget to implement even the most basic security. filetype:xls inurl:"email.xls" Find Open Cameras If you thought Shodan was scary then your so wrong. Google is scarier. Camera login and viewing pages are usually HTTP, meaning Google always indexes them. One of the common formats for webcams is searching for “top.htm” in the URL as shown below: inurl:top.htm inurl:currenttime While you can easily view the cameras as I did without a password; many dorks look for webcam login pages that have a well-known default password. This tactic is illegal since you logged in using a password, it allows easy access to many webcams not intended for public viewing. Meaning you can spy on people and find things you shouldn’t be found. admin and 12345 are the most common passwords for hacking webcams found by google Dorking. Which Dorks Are the Most Dangerous? By far, the most severe kind of danger is the exposed files and configurations being available openly. We can credential important configurations as well as other sensitive data and account information or the entire service itself via google search operators. This happens in one of two ways. A server or other service is set up incorrectly and exposes its administrative logs to the internet directly. When passwords are changed, or a user fails to log in correctly, these logs can leak the credentials being used to the internet openly as shown in the demo using Google Dorking.
  10. dEEpEst

    Preventing social engineering

    Preventing social engineering There are a number of strategies companies can take to prevent social engineering attacks, including the following: - Make sure information technology departments are regularly carrying out penetration testing that uses social engineering techniques. This will help administrators learn which types of users pose the most risk for specific types of attacks, while also identifying which employees require additional training. - Start a security awareness training program, which can go a long way toward preventing social engineering attacks. If users know what social engineering attacks look like, they will be less likely to become victims. - Implement secure email and web gateways to scan emails for malicious links and filter them out, thus reducing the likelihood that a staff member will click on one. - Keep antimalware and antivirus software up to date to help prevent malware in phishing emails from installing itself. - Stay up to date with software and firmware patches on endpoints. - Keep track of staff members who handle sensitive information, and enable advanced authentication measures for them. - Implement 2FA to access key accounts, e.g., a confirmation code via text message or voice recognition. - Ensure employees don't reuse the same passwords for personal and work accounts. If a hacker perpetrating a social engineering attack gets the password for an employee's social media account, the hacker could also gain access to the employee's work accounts. - Implement spam filters to determine which emails are likely to be spam. A spam filter might have a blacklist of suspicious Internet Protocol addresses or sender IDs, or they might detect suspicious files or links, as well as analyze the content of emails to determine which may be fake.
  11. dEEpEst

    Types of social engineering attacks

    Types of social engineering attacks Popular types of social engineering attacks include the following techniques : - Baiting : An attacker leaves a malware-infected physical device, such as a Universal Serial Bus flash drive, in a place it is sure to be found. The target then picks up the device and inserts it into their computer, unintentionally installing the malware. - Phishing : When a malicious party sends a fraudulent email disguised as a legitimate email, often purporting to be from a trusted source. The message is meant to trick the recipient into sharing financial or personal information or clicking on a link that installs malware. - Spear phishing : This is like phishing, but the attack is tailored for a specific individual or organization. - Vishing : Also known as voice phishing, vishing involves the use of social engineering over the phone to gather financial or personal information from the target. - Whaling : A specific type of phishing attack, a whaling attack targets high-profile employees, such as the chief financial officer or chief executive officer, to trick the targeted employee into disclosing sensitive information.These three types of phishing attacks fall under the wider umbrella of social engineering. - Pretexting : One party lies to another to gain access to privileged data. For example, a pretexting scam could involve an attacker who pretends to need financial or personal data to confirm the identity of the recipient. - Scareware : This involves tricking the victim into thinking their computer is infected with malware or has inadvertently downloaded illegal content. The attacker then offers the victim a solution that will fix the bogus problem; in reality, the victim is simply tricked into downloading and installing the attacker's malware. - Watering hole : The attacker attempts to compromise a specific group of people by infecting websites they are known to visit and trust with the goal of gaining network access. - Diversion theft : In this type of attack, social engineers trick a delivery or courier company into going to the wrong pickup or drop-off location, thus intercepting the transaction. - Quid pro quo : This is an attack in which the social engineer pretends to provide something in exchange for the target's information or assistance. For instance, a hacker calls a selection of random numbers within an organization and pretends to be a technical support specialist responding to a ticket. Eventually, the hacker will find someone with a legitimate tech issue whom they will then pretend to help. Through this interaction, the hacker can have the target type in the commands to launch malware or can collect password information. - Honey trap : In this attack, the social engineer pretends to be an attractive person to interact with a person online, fake an online relationship and gather sensitive information through that relationship. - Tailgating : Sometimes called piggybacking, tailgating is when a hacker walks into a secured building by following someone with an authorized access card. This attack presumes the person with legitimate access to the building is courteous enough to hold the door open for the person behind them, assuming they are allowed to be there. - Rogue security software : This is a type of malware that tricks targets into paying for the fake removal of malware. - Dumpster diving : This is a social engineering attack whereby a person searches a company's trash to find information, such as passwords or access codes written on sticky notes or scraps of paper, that could be used to infiltrate the organization's network. - Pharming : With this type of online fraud, a cybercriminal installs malicious code on a computer or server that automatically directs the user to a fake website, where the user may be tricked into providing personal information.
  12. dEEpEst

    How does social engineering work?

    How does social engineering work? Social engineers use a variety of tactics to perform attacks. - The first step in most social engineering attacks is for the attacker to perform research and reconnaissance on the target. If the target is an enterprise, for instance, the hacker may gather intelligence on the organizational structure, internal operations, common lingo used within the industry and possible business partners, among other information. - One common tactic of social engineers is to focus on the behaviors and patterns of employees who have low-level but initial access, such as a security guard or receptionist; attackers can scan social media profiles for personal information and study their behavior online and in person. - From there, the social engineer can design an attack based on the information collected and exploit the weakness uncovered during the reconnaissance phase. - If the attack is successful, the attacker gains access to confidential information, such as Social Security numbers and credit card or bank account information; makes money off the targets; or gains access to protected systems or networks.
  13. dEEpEst

    What is social engineering ?

    What is social engineering ? - Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into breaking normal security procedures and best practices to gain unauthorized access to systems, networks or physical locations or for financial gain. - Threat actors use social engineering techniques to conceal their true identities and motives, presenting themselves as trusted individuals or information sources. The objective is to influence, manipulate or trick users into releasing sensitive information or access within an organization. Many social engineering exploits rely on people's willingness to be helpful or fear of punishment. For example, the attacker might pretend to be a co-worker who has some kind of urgent problem that requires access to additional network resources. - Social engineering is a popular tactic among attackers because it is often easier to exploit people than it is to find a network or software vulnerability. Hackers will often use social engineering tactics as a first step in a larger campaign to infiltrate a system or network and steal sensitive data or disperse malware.
  14. dEEpEst

    Cloud security tools

    Cloud security tools Many of the same tools used in on-premises environments should be used in the cloud, although cloud-specific versions of them may exist. These tools and mechanisms include encryption, IAM and single sign-on (SSO), data loss prevention (DLP), intrusion prevention and detection systems (IPSes/IDSes) and public key infrastructure (PKI). Some cloud-specific tools include the following: - Cloud workload protections platforms (CWPPs). A CWPP is a security mechanism designed to protect workloads -- for example, VMs, applications or data -- in a consistent manner. - Cloud access security brokers (CASBs). A CASB is a tool or service that sits between cloud customers and cloud services to enforce security policies and, as a gatekeeper, add a layer of security. - Cloud security posture management (CSPM). CSPM is a group of security products and services that monitor cloud security and compliance issues and aim to combat cloud misconfigurations, among other features. • Secure Access Service Edge (SASE) and zero-trust network access (ZTNA) are also emerging as two popular cloud security models/frameworks. • Security as a service, often shortened to SaaS or SECaaS, is a subset of software as a service. The Cloud Security Alliance (CSA) defined 10 SECaaS categories : 1.IAM 2.DLP 3.Web security 4.Email security 5.Security assessments 6.Intrusion management 7.Security information and event management (SIEM) 8.encryption 9.BC/disaster recovery (BCDR) 10.Network security These include services such as firewall as a service, cloud-based virtual private networks (VPNs) and key management as a service (KMaaS).
  15. dEEpEst

    Why cloud security is important

    Why cloud security is important - As enterprise cloud adoption grows, business-critical applications and data migrate to trusted third-party cloud service providers (CSPs). Most major CSPs offer standard cybersecurity tools with monitoring and alerting functions as part of their service offerings, but in-house information technology (IT) security staff may find these tools do not provide enough coverage, meaning there are cybersecurity gaps between what is offered in the CSP's tools and what the enterprise requires. This increases the risk of data theft and loss. - Because no organization or CSP can eliminate all security threats and vulnerabilities, business leaders must balance the benefits of adopting cloud services with the level of data security risk their organizations are willing to take. - Putting the right cloud security mechanisms and policies in place is critical to prevent breaches and data loss, avoid noncompliance and fines, and maintain business continuity (BC). - A major benefit of the cloud is that it centralizes applications and data and centralizes the security of those applications and data as well. Eliminating the need for dedicated hardware also reduces organizations' cost and management needs, while increasing reliability, scalability and flexibility.