Thursday, May 7, 2020

BASICS OF METASPLOIT – BASIC COMMANDS OF METASPLOIT

Metasploit is an advanced hacking tool that comes itself with a complete lack of advanced penetration testing tools. Penetration testers and hackers are taking so much advantage of this tool. It's a complete hack pack for a hacker that he can play almost any attack with it. Here I am going to discuss the basics of Metasploit. I am not covering attacks in this article, as I am just making sure to share the basics of Metasploit and basic commands of Metasploit. So, we can get back to cover attacks of Metasploit in the next articles.

BASICS OF METASPLOIT

The Metasploit framework has three types of working environments.
  1. msfconsole
  2. msfcli interface
  3. msfweb interface
However, the most preferred and used is the 'msfconsole'. It's a very efficient command-line interface that has its own set of commands and system's working environment.
First of all, it's most important to know and understand all the useful commands of Metasploit that are going to be used.

BASIC COMMANDS OF METASPLOIT

Metasploit have a huge number of command that we can use in different type of attacks, but I am just going to share the most used and useful commands here that a beginner can easily understand and follow 'em.
  • help (It will give the basic commands you need to launch an exploit.
  • search (Finds out the keywords in the selected attack method).
  • show exploits (Shows list of an available exploit in the selected option).
  • show payloads (It lists all the payloads available).
  • show options (It helps you to know all the options if you might have forgotten one).
  • info (This is used to get information about any exploit or payload).
  • use (It tells Metasploit to use the exploit with the specified name).
  • set RHOST (Sets the address of specified remote host).
  • set RPORT (Sets up a port that connects to on the remote host).
  • set PAYLOAD (It sets the payload that gives you a shell when a service is exploited).
  • set LPORT (Sets the port number that the payload will open on the server when an exploit is exploited).
  • exploit  (It actually exploits the service).
  • rexploit (Reloads your exploit code and then executes the exploit without restarting the console).
These are the most used Metasploit commands which come in handy in most of the situations during any sort of attack. You must give all the commands a try and understand 'em how it works and then move to the next part of designing an attack.
Related articles

Wednesday, May 6, 2020

Pointers Part 1: The Basics



So you're eager to learn about pointers but unfortunately you got stuck because they seemed to you terrible in nature? That's not true I know, but many of the people get confused when they arrive at the topic of pointers. Well pointers are the most important tools in C programming and are the one that can make you fly (unless you don't know how to ride over them). In this article we're going to learn basics of pointers.
Pointers are the varaibles that store addresses of other variables. Easy ain't it?
So lets start with the decleration of a pointer, pointer is decreleared as:
data_type *var_name;
e,g
int *pt;
well the astrisk(*) before the variable name is the thing that makes variable a pointer. So far so good now what?
Now lets say we want to store address of a variable in our pointer variable that seems pretty complex..!
Let's do it:
int number = 100;
int *pt = #
Is it really complex..?
what we are doing here is that we are first declaring and initializing a integer variable (number) with value of 100 and then we declare and initialize a pointer variable (pt) with the address of number variable. Now pt (pointer variable) contains the address of number (integer varaible). So what? Now we can use this pointer variable to change the value of number variable. Is this some kind of Magic? Maybe. Lets' do it:
*pt = 200;
what we have done here is that we De-referencing the pt variable with the asterisk (*) and then assigned it the value of 200 now the number variable contains 200. Isn't it a magic? De-referencing is used for accessing the value of the variable towards which our pointer is pointing simple. So lets write a full program of what we have learned so far.
/*Pointer Basics: Creating and Using Pointers*/
#include<stdio.h>
int main(void){
  int number = 100;
  int *pt = &number;
  printf("Value of 'number' is: %d", number);
  printf("Address of 'number' is: %p", pt);
  *pt = 200;
  printf("New value of 'number' is: %d", number);
  return 0;
}
What this whole program did was it created a integer variable and a pointer to integer variable and then printed out the value and address of the 'number' variable and after that we De-referenced the pointer variable so that we can access the value to which our pointer variable is pointing and changed the old 100 value with new 200 value and at last we printed that out. Easy isn't it?
But do you know that you can get the address of a variable even by using ampersand (&) operator? Lemme show you how. I'll declare and initialize a variable 'var' and then print it to screen using ampersand (&) operator:
int var = 10;
printf("Address of 'var' is %p\n", &var);
the last statement here will print out the address of 'var' not value so that means it is equal to this statement:
int *pt = &var;
printf("Address of 'var' is %p\n", pt);
here we first assigned the address of 'var' to pointer variable 'pt' and then printed out the address of 'var' using the pointer variable (pt).
So lets write another program that will wrap up this part of 'Pointer Basics':
/*Pointer Basics Part 1: Program 2*/
#include<stdio.h>
int main(void){
   int var = 10;
   int *pt = &var;
   printf("The Value of 'var' is: %d\n", var);
   printf("De-referencing: *pt = %d\n", *pt);
   printf("Ampersand: The Address of 'var' is %p\n",  &var);
   printf("pt = %p\n", pt);
   return 0;
}
So that's the end of first part watch out for the next part in which we'll tighten our grip on pointers and get ready for some Advanced '*po(inter)-fo'.

Related posts


Nipe - A Script To Make TOR Network Your Default Gateway



Tor enables users to surf the Internet, chat and send instant messages anonymously, and is used by a wide variety of people for both Licit and Illicit purposes. Tor has, for example, been used by criminals enterprises, Hacktivism groups, and law enforcement agencies at cross purposes, sometimes simultaneously.

Nipe is a Script to make Tor Network your Default Gateway.

This Perl Script enables you to directly route all your traffic from your computer to the Tor Network through which you can surf the Internet Anonymously without having to worry about being tracked or traced back.

Download and install:
    git clone https://github.com/GouveaHeitor/nipe
cd nipe
cpan install Switch JSON LWP::UserAgent

Commands:
    COMMAND          FUNCTION
install Install dependencies
start Start routing
stop Stop routing
restart Restart the Nipe process
status See status

Examples:

perl nipe.pl install
perl nipe.pl start
perl nipe.pl stop
perl nipe.pl restart
perl nipe.pl status

Bugs

Related posts


Tuesday, May 5, 2020

Authelia - The Single Sign-On Multi-Factor Portal For Web Apps


Authelia is an open-source authentication and authorization server providing 2-factor authentication and single sign-on (SSO) for your applications via a web portal. It acts as a companion of reverse proxies like nginx, Traefik or HAProxy to let them know whether queries should pass through. Unauthenticated user are redirected to Authelia Sign-in portal instead.
Documentation is available at https://docs.authelia.com.

Authelia can be installed as a standalone service from the AUR, using a Static binary, Docker or can also be deployed easily on Kubernetes leveraging ingress controllers and ingress configuration.

Here is what Authelia's portal looks like



Features summary
Here is the list of the main available features:
For more details about the features, follow Features.

Proxy support
Authelia works in combination with nginx, Traefik or HAProxy. It can be deployed on bare metal with Docker or on top of Kubernetes.

Getting Started
You can start utilising Authelia with the provided docker-compose bundles:

Local
The Local compose bundle is intended to test Authelia without worrying about configuration. It's meant to be used for scenarios where the server is not be exposed to the internet. Domains will be defined in the local hosts file and self-signed certificates will be utilised.

Lite
The Lite compose bundle is intended for scenarios where the server will be exposed to the internet, domains and DNS will need to be setup accordingly and certificates will be generated through LetsEncrypt. The Lite element refers to minimal external dependencies; File based user storage, SQLite based configuration storage. In this configuration, the service will not scale well.

Full
The Full compose bundle is intended for scenarios where the server will be exposed to the internet, domains and DNS will need to be setup accordingly and certificates will be generated through LetsEncrypt. The Full element refers to a scalable setup which includes external dependencies; LDAP based user storage, Database based configuration storage (MariaDB, MySQL or Postgres).

Deployment
Now that you have tested Authelia and you want to try it out in your own infrastructure, you can learn how to deploy and use it with Deployment. This guide will show you how to deploy it on bare metal as well as on Kubernetes.

Security
Security is taken very seriously here, therefore we follow the rule of responsible disclosure and we encourage you to do so.
Would you like to report any vulnerability discovered in Authelia, please first contact clems4ever on Matrix or by email.
For details about security measures implemented in Authelia, please follow this link.

Breaking changes
See BREAKING.

Contribute
If you want to contribute to Authelia, check the documentation available here.

Contributors
Authelia exists thanks to all the people who contribute. [Contribute].

Backers
Thank you to all our backers! [Become a backer] and help us sustain our community.



via KitPloit

Continue reading


  1. Web Hacking 101
  2. Hacking Etico Que Es
  3. Hacking Day
  4. Growth Hacking Libro
  5. Hardware Hacking Tools

APPLE IPHONE X FACE ID CAN BE HACKED WITH SILICON MASK

Just a week after Apple released its brand new iPhone X on November 3, a team of researchers has claimed to successfully hack Apple's Face ID facial recognition technology with a mask that costs less than $150. They said Apple iPhone x face id can be hacked with silicon mask easily.

apple iPhone x face id hacked
Yes, Apple's "ultra-secure" Face ID security for the iPhone X is not as secure as the company claimed during its launch event in September this year.

"Apple engineering teams have even gone and worked with professional mask makers and makeup artists in Hollywood to protect against these attempts to beat Face ID," Apple's senior VP of worldwide marketing Phil Schiller said about Face ID system during the event.

"These are actual masks used by the engineering team to train the neural network to protect against them in Face ID."

However, the bad news is that researchers from Vietnamese cybersecurity firm Bkav were able to unlock the iPhone X using a mask.

Yes, Bkav researchers have a better option than holding it up to your face while you sleep. Bkav researchers re-created the owner's face through a combination of 3D printed mask, makeup, and 2D images with some "special processing done on the cheeks and around the face, where there are large skin areas" and the nose is created from silicone.

The researchers have also published a proof-of-concept video, showing the brand-new iPhone X first being unlocked using the specially constructed mask, and then using the Bkav researcher's face, in just one go.

"Many people in the world have tried different kinds of masks but all failed. It is because we understand how AI of Face ID works and how to bypass it," an FAQ on the Bkav website said.

"You can try it out with your own iPhone X, the phone shall recognize you even when you cover a half of your face. It means the recognition mechanism is not as strict as you think, Apple seems to rely too much on Face ID's AI. We just need a half face to create the mask. It was even simpler than we ourselves had thought."

Researchers explain that their "proof-of-concept" demo took about five days after they got iPhone X on November 5th. They also said the demo was performed against one of their team member's face without training iPhone X to recognize any components of the mask.

"We used a popular 3D printer. The nose was made by a handmade artist. We use 2D printing for other parts (similar to how we tricked Face Recognition 9 years ago). The skin was also hand-made to trick Apple's AI," the firm said.

The security firm said it cost the company around $150 for parts (which did not include a 3D printer), though it did not specify how many attempts its researchers took them to bypass the security of Apple's Face ID.

It should be noted that creating such a mask to unlock someone's iPhone is a time-consuming process and it is not possible to hack into a random person's iPhone.

However, if you prefer privacy and security over convenience, we highly recommend you to use a passcode instead of fingerprint or Face ID to unlock your phone.
Related posts

Friday, May 1, 2020

Don't Miss Sealed Bite, The Game Off 2019 Winner!

You might remember end of last year's Game Off game jam sponsored by Github. The winners have been annouced a while ago, and while again quite a few submissions were using closed source game engines, the overall winner isn't.

So make sure you don't miss Sealed Bite, a fun little/short jump and run:

Obvious inspiration comes from the very popular Celeste game.

You can find the source code here, and not all that surprising it utilizes everyone's favorite Godot Engine :) Sadly the graphic assets are quite a bit less free (CC-by-NC-ND).

Let us know if you enjoyed this gem of a game on our forums!

Buds, Blooms, And Thorns Review Of Tiny Epic Defenders 2E By Gamelyn Games

Buds, Blooms, and Thorns Review of Tiny Epic Defenders 2E by Gamelyn Games
DisclaimerSupport me on Patreon!
Vitals:
Title: Tiny Epic Defenders 2E
Designed by: Scott Almes
Publisher: Gamelyn Games
Year Published: 2018
MSRP: $25 ($30 Deluxe)
1-4p | 30-60 min | 14+

Introduction:
The very first Kickstarter Preview I ever wrote on my site was for Tiny Epic Defenders, way back in 2014.  This was shortly after I started reviewing games and is the sixth game I reviewed, and the first I wrote specifically for this blog.  The review was for the limited, no-artwork, print and play version that was available during the campaign.  I read the description of the game and thought it sounded great.  So I printed out the game and tried it out with some friends.  We all enjoyed the game and I went home that night, wrote up a review, and then backed the game the next day.  This was the start of my foray into Tiny Epic madness!  In the pledge manager I bought Tiny Epic Kingdoms and I've backed every Tiny Epic game since... 

With the exception of this Second Edition of Tiny Epic Defenders.  At the time I was a bit turned off that the first edition wasn't compatible with the new The Dark War expansion that was also being Kickstarted.  Previous backers were offered a small discount, but it still meant paying over $50 to have Tiny Epic Defenders 'up to date'.  Fortunately I received this copy of the second edition to review and I've picked up The Dark War expansion, so now my Tiny Epic collection is complete!

In Tiny Epic Defenders, one to four players work together to defend the Capitol City against attacking Monsters, Dire Enemies, and an ultimate Epic Foe.  Six regions surround the city and these regions must be defended else the attacks begin to reach the Capitol City.  Each region has a special ability when a hero is defending from there.  Each hero also has a special ability, and there are artifacts with special abilities that can be acquired when defending against Dire Enemies.  Defeat the Epic Foe before the Capitol City falls and you win!

Blooms:
Blooms are the game's highlights and features.  Elements that are exceptional.
  • Unique turn based system.
  • Great artwork and components.
  • Simple, straightforward cooperative tower defense game.
  • Fast, casual play, perfect for families.
Buds:
Buds are interesting parts of the game I would like to explore more. 
  • The Dark War expansion adds a campaign mode and additional options.
  • Great for solo play!
  • The game arc progresses quickly from almost too easy to frantically difficult!  And multiple difficulty levels make sure you're always playing at an appropriate difficulty.
Thorns:
Thorns are a game's shortcomings and any issues I feel are noteworthy.
  • Prone to 'quaterbacking'; easy to have an alpha gamer.
  • Updates to the Second Edition are minor, but required to use the expansion.
Final Thoughts:
As I mentioned in the introduction, this is the third version of Tiny Epic Defenders that I've owned, starting with the rough print and play version, then the First Edition, and now the Second Edition, and it (along with Tiny Epic Kingdoms) began my obsession with the Tiny Epic series of games.  So this is a game that holds a special place in my heart.  But how well does this Second Edition compare to the rest of the Tiny Epic lineup?  And is it worth getting if you already have the First Edition?

Over the years, Tiny Epic Defenders has gotten quite a bit of play from me.  It's not the most challenging or deeply strategic in the Tiny Epic lineup, but it's been a great casual cooperative game that I can play with my family.  You can knock out a game in 30-40 minutes and, even though the age says 14+, I've been playing it with my sons since they were 5 and 7 and they've had no issues with the mechanics (setup is a little challenging though, so I'd recommend an adult at least play along with younger kids).  I've played Tiny Epic Defenders a number of times as a quick game to play with the boys and as a solo game to play while I'm waiting for them somewhere, and I love it in both instances.

However, Tiny Epic Defenders does have some issues.  The biggest issue is that the game is very prone to 'quarterbacking'.  The game plays great solo, and there's a very strong temptation for alpha gamers to just make all the decisions.  If you're playing with younger kids you have to make an effort to let them feel like they're involved in the decision making process.

My other issue with the Second Edition specifically, is that it didn't really seem necessary.  Yes, it has updated artwork, new ITEMeeples, and some slightly more balanced abilities for the heroes, locations, artifacts, and enemies, and a few rules tweaks help smooth out a few minor rough spots, so it's a marginally better game than the First Edition.  However, these changes are super minor to the gameplay.  But when The Dark War expansion was released, Gamelyn Games wanted to incorporate the better art and components that their later games were known for.  This meant the base game also needed an update, making the First Edition completely incompatible with the expansion.  I guess I understand the decision, but I wasn't happy about it at the time.  I felt like people were being forced to re-buy a perfectly good game just to have the expansion (I have similar feelings about other games that have done this, too, like the excellent Dracula's Feast by Jellybean Games).

So, if you never intend to buy or play the Expansion (which adds a bunch of new features, including more ITEMeeple artifacts, new enemies, a campaign mode, and more), the First Edition is sufficient.  The changes didn't really affect the overall experience for me.  But if the features of The Dark War expansion sound great (and they are pretty great), then you'll definitely want the Second Edition of the game.

Now, where does Tiny Epic Defenders rank among the rest of the Tiny Epic lineup?  That's a more subjective question.  I quite like the game for what it is.  It's not the most strategic game in the lineup, but it's probably the fastest to setup and play.  I think the cooperative aspect of the game works better than the cooperative mode of Tiny Epic Zombies (and setup is much faster).  Personally, I like Tiny Epic Galaxies and Tiny Epic Kingdoms better than Tiny Epic Defenders, but I'd rank it about the same as the other Tiny Epic games.  It scratches a different itch than any of the other games, so I definitely think it's worth adding to your collection, especially if you're interested in a fast, simple cooperative game to play solo or with your family.

Buds, Blooms, and Thorns Rating:
Bloom!  This game is great and worth
adding to your collection!  It should be
on just about every gamer's shelf. 

Pictures:






















Did you like this review?  Show your support: Support me on Patreon!Also, click the heart at Board Game Links , like GJJ Games on Facebook , or follow on Twitter .  And be sure to check out my games on  Tabletop Generation.


GJJ Games Reviews are independent, unpaid reviews of games I, George Jaros, have played with my family and friends.  Some of these games I own, some are owned by friends, some are borrowed, and some were provided by a publisher or designer for my honest feedback and evaluation.  I make every attempt to be both honest and constructively critical in my reviews, and they are all my opinions.  There are four types of reviews on GJJ Games: Full Reviews feature critical reviews based on a rubric and games receive a rating from 0 to 100.  Quick Reviews and Kickstarter Previews are either shorter reviews of published games or detailed preview reviews of crowdfunding games that will receive a rating from 0 to 10 based on my impressions of the game.  Buds, Blooms,and Thorns reviews are shorter reviews of either published or upcoming games that highlight three aspects of a game: Buds are parts of a game I look forward to exploring more, Blooms are outstanding features of a game, and Thorns are shortcomings of a game.  Each BBT review game will receive an overall rating of Thorn, Bud, or Bloom.