Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "Talk:Hacking index"
From NetSec
(→Dmcrypt) |
(→Facebook) |
||
(54 intermediate revisions by 3 users not shown) | |||
Line 7: | Line 7: | ||
* [[alphanumeric x86_64 data manipulation]] | * [[alphanumeric x86_64 data manipulation]] | ||
* [[converting x86_64 shellcode to alphanumeric shellcode]] | * [[converting x86_64 shellcode to alphanumeric shellcode]] | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
Computer Forensics | Computer Forensics | ||
Line 47: | Line 25: | ||
2 European Cyberlaw | 2 European Cyberlaw | ||
2.1 Definititons of Cybercrime as per the Budapest Convention | 2.1 Definititons of Cybercrime as per the Budapest Convention | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
==Network Recon== | ==Network Recon== | ||
Line 121: | Line 34: | ||
6 Tools | 6 Tools | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
== Social Engineering == | == Social Engineering == | ||
Line 207: | Line 57: | ||
2 Real Life Example of Subnetting | 2 Real Life Example of Subnetting | ||
− | Virtual machines | + | == Virtual machines == |
1 Subsystems | 1 Subsystems | ||
1.1 Hardware Virtualization | 1.1 Hardware Virtualization | ||
Line 215: | Line 65: | ||
3 Creating Vulnerable VMs for Penetration Testing | 3 Creating Vulnerable VMs for Penetration Testing | ||
− | + | == API == | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | API | + | |
1 API technologies | 1 API technologies | ||
1.1 The Web | 1.1 The Web | ||
Line 272: | Line 112: | ||
6.4 DNS Leaks | 6.4 DNS Leaks | ||
− | Assembly | + | ==Assembly== |
+ | {{info|<center>Wait for this page to be completed before adding indeces.</center>}} | ||
1 Introduction | 1 Introduction | ||
2 Binary | 2 Binary | ||
Line 286: | Line 127: | ||
6.6 Control flow operators | 6.6 Control flow operators | ||
6.7 Taking it further | 6.7 Taking it further | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
==Buffer Overflows== | ==Buffer Overflows== | ||
Line 312: | Line 141: | ||
* [[disable execstack]] | * [[disable execstack]] | ||
* [[return address for buffer overflow]] | * [[return address for buffer overflow]] | ||
− | + | * [[32 bit shellcode analysis]] | |
− | + | * [[64 bit shellcode analysis]] | |
− | + | * [[find eip for buffer overflow]] | |
− | + | * [[find rip for buffer overflow]] | |
− | + | * [[x86 buffer overflow exploit]] | |
− | + | * [[64 bit buffer overflow exploit]] | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
==C== | ==C== | ||
+ | {{info|<center>Wait for this page to be completed before adding any indeces for it.</center>}} | ||
1 Overview | 1 Overview | ||
1.1 Basic Formatting | 1.1 Basic Formatting | ||
Line 335: | Line 160: | ||
1.6 Example Program | 1.6 Example Program | ||
− | == | + | == DDoS Attack == |
− | + | {{info|The three way hand shake information should be placed into the [[TCP/IP]] page, which should merely be linked from the ddos attack page.}} | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
1 Three way handshake and Connect State | 1 Three way handshake and Connect State | ||
2 TCP Attacks | 2 TCP Attacks | ||
Line 384: | Line 175: | ||
4.1 ICMP Smurf | 4.1 ICMP Smurf | ||
4.2 ICMP Redirect | 4.2 ICMP Redirect | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
==LUA== | ==LUA== | ||
Line 405: | Line 188: | ||
4.2 Declaring, and populating a Table | 4.2 Declaring, and populating a Table | ||
4.3 Indexing Tables | 4.3 Indexing Tables | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
==Nmap== | ==Nmap== | ||
Line 468: | Line 197: | ||
6 Script Scanning | 6 Script Scanning | ||
7 Conclusion | 7 Conclusion | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
==Routing== | ==Routing== | ||
Line 549: | Line 203: | ||
3 Back to Subnetting | 3 Back to Subnetting | ||
4 Extras | 4 Extras | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
==Tor== | ==Tor== | ||
Line 581: | Line 223: | ||
3.3 Whitelisting using PCRE | 3.3 Whitelisting using PCRE | ||
− | == | + | == Zombies == |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
1 Definition | 1 Definition | ||
2 Exploitation | 2 Exploitation | ||
Line 607: | Line 230: | ||
5 Evolution | 5 Evolution | ||
− | BGP | + | == BGP == |
1 Lesson 1 | 1 Lesson 1 | ||
1.1 Network Discovery with BGP | 1.1 Network Discovery with BGP | ||
Line 616: | Line 239: | ||
2.1.3 3.0 - RIP | 2.1.3 3.0 - RIP | ||
− | Bcrypt | + | == Bcrypt == |
1 Lesson | 1 Lesson | ||
2 1.0 - Introduction | 2 1.0 - Introduction | ||
Line 622: | Line 245: | ||
4 3.0 - General Talk | 4 3.0 - General Talk | ||
5 4.0 - Further Reading | 5 4.0 - Further Reading | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
==Forensic chain of custody== | ==Forensic chain of custody== | ||
Line 709: | Line 296: | ||
==Linux Assembly== | ==Linux Assembly== | ||
+ | {{info|<center>Wait until this page is completed before creating any indeces for it.</center>}} | ||
1 32 bit syscall table | 1 32 bit syscall table | ||
1.1 Introduction | 1.1 Introduction | ||
Line 716: | Line 304: | ||
2 64 bit syscall table | 2 64 bit syscall table | ||
2.1 Example: Assembly for setuid(0); execve('/bin/sh',0,0); exit(0); | 2.1 Example: Assembly for setuid(0); execve('/bin/sh',0,0); exit(0); | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
==Physical Security== | ==Physical Security== | ||
Line 752: | Line 310: | ||
2.1 Prevention | 2.1 Prevention | ||
2.2 Attack Vectors | 2.2 Attack Vectors | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
==RoR Patching== | ==RoR Patching== | ||
Line 823: | Line 324: | ||
2.3 Example Rule | 2.3 Example Rule | ||
− | == | + | == traceroute == |
− | + | {{info|before this part is done, traceroute and tcp traceroute '''must be combined''', its the same thing with a different three letter acronym before it!}} | |
− | + | ||
− | + | ||
− | + | ||
TCP Traceroute | TCP Traceroute | ||
1 Overview | 1 Overview | ||
Line 842: | Line 340: | ||
5 Options for Traceroute | 5 Options for Traceroute | ||
− | Wireless Security | + | == Wireless Security == |
+ | {{info|This page needs to be completed and updated before it is seo'd.}} | ||
1 Basics | 1 Basics | ||
2 Wired Equivalent Privacy (WEP) | 2 Wired Equivalent Privacy (WEP) | ||
Line 851: | Line 350: | ||
--[[User:Hatter|Hatter]] 03:23, 21 May 2012 (MSK) | --[[User:Hatter|Hatter]] 03:23, 21 May 2012 (MSK) | ||
− | == | + | == bitwise math == |
− | * [[ | + | |
− | * [[ | + | |
− | * [[ | + | *[[introduction to binary]] |
− | * [[ | + | *[[binary addition]] |
− | * [[ | + | *[[bitwise operators]] |
− | * [[ | + | *[[binary to hexadecimal]] |
+ | *[[not]] | ||
+ | *[[and]] | ||
+ | *[[and rules]] | ||
+ | *[[and properties]] | ||
+ | *[[and logic table]] | ||
+ | *[[bitwise and example]] | ||
+ | *[[xor]] | ||
+ | *[[xor logic table]] | ||
+ | *[[xor rules]] | ||
+ | *[[bitwise xor example]] | ||
+ | *[[xor properties]] | ||
+ | *[[or]] | ||
+ | *[[or rules]] | ||
+ | *[[or properties]] | ||
+ | *[[or example]] | ||
+ | *[[or logic table]] | ||
+ | *[[bit shifts and bit rotations]] | ||
+ | *[[logical shift]] | ||
+ | *[[bitwise math exercises]] | ||
+ | *[[bit rotations]] | ||
+ | *[[circular shifts]] | ||
+ | *[[hexadecimal signed numbers]] | ||
+ | *[[integer overflows]] | ||
+ | *[[two's complement]] | ||
+ | *[[rotation with carry]] |
Latest revision as of 05:42, 27 June 2012
Contents
- 1 intermediate shellcode stuff
- 2 Network Recon
- 3 Social Engineering
- 4 Subnetting
- 5 Virtual machines
- 6 API
- 7 Anonymity
- 8 Assembly
- 9 Buffer Overflows
- 10 C
- 11 DDoS Attack
- 12 LUA
- 13 Nmap
- 14 Routing
- 15 Tor
- 16 Unsafe String Replacement
- 17 Zombies
- 18 BGP
- 19 Bcrypt
- 20 Forensic chain of custody
- 21 Gentoo
- 22 Irssi Tutorial
- 23 Jynx Rootkit/1.0
- 24 Linux Assembly
- 25 Physical Security
- 26 RoR Patching
- 27 Snort
- 28 traceroute
- 29 Wireless Security
- 30 bitwise math
intermediate shellcode stuff
most of this stuff goes to the Category:Indexing .
- introduction to printable 32-bit x86 polymorphic shellcode
- alphanumeric x86_64 instructions
- intercompatible alphanumeric x86 instructions
- alphanumeric x86 architecture detection
- alphanumeric x86_64 data manipulation
- converting x86_64 shellcode to alphanumeric shellcode
Computer Forensics
1 Cybercrime 1.1 Investigation 1.2 Preserving the evidence 1.3 Where to find evidence 1.3.1 Hardwarewise 1.3.2 Softwarewise 2 Forensic Imaging 2.1 HardDisk Imaging
Cyberlaw
1 Australian Cyberlaw 1.1 Acts Applying to Cybercrime in Australia 1.2 Cybercrime Act 2001 Offences 1.3 Case Study: First Cybercrime Conviction in Australia 2 European Cyberlaw 2.1 Definititons of Cybercrime as per the Budapest Convention
Network Recon
1 IP Addressing 2 Subnet Masks 3 Ports 4 Routing 5 Theory 6 Tools
Social Engineering
1 Methods 1.1 Email 1.2 Telephone 1.3 Examples 1.4 Lesson 1 1.4.1 - Preface by Wikipedia 1.4.2 - Outline of Social Engineering 1.4.3 - Analysing and Creating Milestones 1.4.4 - Mantras for Social Engineering 1.4.5 - Example 1.4.6 - Other Uses 1.5 Lesson 2 - Politeness 1.5.1 - Introduction 1.5.2 - Things To Keep in Mind 1.5.3 - Putting Social Engineering to Work 1.5.4 - Protecting Yourself From Social Engineering
Subnetting
1 General Subnetting 2 Real Life Example of Subnetting
Virtual machines
1 Subsystems 1.1 Hardware Virtualization 1.2 Host Machine 1.3 Guest Machine 2 Virtualization Tools 3 Creating Vulnerable VMs for Penetration Testing
API
1 API technologies 1.1 The Web 1.1.1 Web services 1.1.2 Remote Procedure Calls 1.2 General software 1.2.1 Software Libraries 1.2.2 COM objects (Windows)
Anonymity
1 General Services 1.1 Virtual Private Servers 1.2 Virtual Private Networks 1.3 SSH Tunneling 1.3.1 Basic Example of SSH Tunneling 1.4 Shell Accounts 1.5 FTP / Telnet 2 Web-Browsing 2.1 General 2.1.1 Best Practices 2.2 Firefox 2.2.1 Recommended Extensions 2.3 TODO 3 Email Privacy 3.1 PGP / GNUPG Encryption 3.2 Anonymous Remailers 3.3 Throw-away Accounts 4 IM & Chat 4.1 Instant Messaging 4.1.1 Pidgin 4.1.1.1 Using OTR 4.1.2 TorChat 4.1.3 TorPM 4.1.4 ICQ 4.2 Chat 4.2.1 IRC 4.2.1.1 Using OTR 4.2.2 SILC 4.2.2.1 Key based authentication 4.2.3 Utilising IRC Bouncers 5 Files & Hard-Disk Encryption 6 Possible Downfalls 6.1 Network Performance 6.2 Personal Information 6.3 IP Leaks 6.4 DNS Leaks
Assembly
1 Introduction 2 Binary 3 Number handling 4 Data storage 5 Memory Addressing 6 Instructions 6.1 Syntaxes 6.2 Data manipulation basic primitives 6.3 Basic arithmetic 6.4 Bitwise mathematics operators 6.5 Shifts and rotations 6.6 Control flow operators 6.7 Taking it further
Buffer Overflows
- buffer overflow protection
- cause of buffer overflow
- example buffer overflow
- disable aslr
- vulnerable overflow application
- bof.c
- disable compiler stack protection
- buffer overflow test
- buffer overflow testing for x86
- buffer overflow testing for x86_64
- disable execstack
- return address for buffer overflow
- 32 bit shellcode analysis
- 64 bit shellcode analysis
- find eip for buffer overflow
- find rip for buffer overflow
- x86 buffer overflow exploit
- 64 bit buffer overflow exploit
C
1 Overview 1.1 Basic Formatting 1.1.1 Includes 1.1.2 The main() Function 1.2 Variables 1.3 Loops 1.4 If/Else 1.5 Compilation 1.6 Example Program
DDoS Attack
The three way hand shake information should be placed into the TCP/IP page, which should merely be linked from the ddos attack page. |
1 Three way handshake and Connect State 2 TCP Attacks 2.1 Synflood 2.1.1 Spoofed Synflood 2.1.2 Dealing with Synfloods 2.2 Advanced Attacks 2.2.1 Optimistic ACK Floods 2.2.2 Duplicate ACK Spoofing 3 UDP Attacks 3.1 Dealing with UDP floods 4 ICMP Attacks 4.1 ICMP Smurf 4.2 ICMP Redirect
LUA
1 Comments 2 Variables
- variable types in lua
2.1 Global Variables vs Local Variables 3 Functions
- list of functions used by lua
4 Tables
- using tables in lua
4.1 Declaring an empty Table 4.2 Declaring, and populating a Table 4.3 Indexing Tables
Nmap
1 Correct Usage 2 Scan Types 3 Options 4 Evasion Techniques 5 Target Specification 6 Script Scanning 7 Conclusion
Routing
1 Subnetting Schemes 2 Real World Examples 3 Back to Subnetting 4 Extras
Tor
1 How It Works 2 Common Pitfalls 3 Getting Tor and Extra Uses 3.1 Proxychains and Tor-Resolve 4 Hidden services 5 External Links
Unsafe String Replacement
- why string replacement can be unsafe
- unsafe string replacement in php
- unsafe string replacement using regular expressions
- unsafe string replacement example
- prevent unsafe string replacement
3 Defense 3.1 PHP 3.2 PCRE 3.3 Whitelisting using PCRE
Zombies
1 Definition 2 Exploitation 3 Types of Attacks 4 Staying Safe 5 Evolution
BGP
1 Lesson 1 1.1 Network Discovery with BGP 2 Lesson 2 2.1 ASN/BGP/RIP 2.1.1 1.0 - Introduction 2.1.2 2.0 - Example 2.1.3 3.0 - RIP
Bcrypt
1 Lesson 2 1.0 - Introduction 3 2.0 - Running bcrypt 4 3.0 - General Talk 5 4.0 - Further Reading
Forensic chain of custody
1 Forensic Chain of Custody 1.1 Acquisition 1.2 Witnesses and Documentation 1.3 Active Memory Snapshots
Gentoo
1 Virtual Machine Setup 2 Hard Drive Setup 3 Base installation and Configuration 4 CHROOT 5 Installing Software 6 Encrypted Home Dir 7 Kernel 8 Final Configurations 9 Bootloader 10 X Server 11 BASH 11.1 Part 1: Reading files 11.2 Part 2: Navigation 11.3 Other useful commands 11.4 Directing output 12 Screen 13 Services 14 Network Services 15 Debugging Services 16 Permissions and Security Basics 17 Getting Help 18 Troubleshooting
Irssi Tutorial
1 Getting Irssi 1.1 Debian/Ubuntu 1.2 Gentoo 1.3 Slackware 1.4 Frugalware 1.5 Solaris 1.6 Arch Linux 2 Connecting to the IRC 3 Sample config file 4 References
Jynx Rootkit/1.0
1 Jynx 1.1 Introduction 1.2 Configuration & Features 1.3 Exercise & Installation 1.4 Usage
Linux Assembly
1 32 bit syscall table 1.1 Introduction 1.2 Unlinked System Calls for 32bit systems 1.3 Linked System Calls for 32bit systems 1.4 Other Code Comparisons 2 64 bit syscall table 2.1 Example: Assembly for setuid(0); execve('/bin/sh',0,0); exit(0);
Physical Security
1 Overview 2 Execution 2.1 Prevention 2.2 Attack Vectors
RoR Patching
1 RoR Patching 1.1 Vulnerabilities 1.2 XSS 1.3 Params Injection & Mass Assignment Abuse
Snort
1 Basic Packet Sniffing Utilities 2 Rules 2.1 Rule Headers 2.2 Rule Option Section 2.3 Example Rule
traceroute
before this part is done, traceroute and tcp traceroute must be combined, its the same thing with a different three letter acronym before it! |
TCP Traceroute
1 Overview 1.1 vs. UDP/ICMP 1.2 What you can do 1.2.1 Windows 1.2.2 Linux
Traceroute
1 Performing a Traceroute 2 Example of Tracert 3 Options for Tracert 4 Example of Traceroute 5 Options for Traceroute
Wireless Security
This page needs to be completed and updated before it is seo'd. |
1 Basics 2 Wired Equivalent Privacy (WEP) 3 Wi-Fi Protected Access (WPA / WPA2-PSK) 4 Tools 5 Reaver
--Hatter 03:23, 21 May 2012 (MSK)
bitwise math
- introduction to binary
- binary addition
- bitwise operators
- binary to hexadecimal
- not
- and
- and rules
- and properties
- and logic table
- bitwise and example
- xor
- xor logic table
- xor rules
- bitwise xor example
- xor properties
- or
- or rules
- or properties
- or example
- or logic table
- bit shifts and bit rotations
- logical shift
- bitwise math exercises
- bit rotations
- circular shifts
- hexadecimal signed numbers
- integer overflows
- two's complement
- rotation with carry