terça-feira, 23 de janeiro de 2024

Hacking Facebook By Using PHP Script | Social Engineering Attack | LAN And WAN (Same Or Different Networks)


This Video is absolutely for Educational Purposes only, please don't do any illegal activity. If you do then I'm not responsible for your illegal activity. The purpose of this video is to show you How hackers can hack your social media by using their own local servers.

Basically these type of attacks  known as Social Engineering attacks or Phishing. Attacker just send the duplicate vulnerable HTML page to the victim, when victim enters any type of information to that vulnerable page it'll automatically received by the attacker.

Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels. The attacker uses phishing emails to distribute malicious links or attachments that can perform a variety of functions, including the extraction of login credentials or account information from victims.

How phishing works 

Phishing attacks typically rely on social networking techniques applied to email or other electronic communication methods, including direct messages sent over social networks, SMS text messages and other instant messaging modes.

Phishers may use social engineering and other public sources of information, including social networks like LinkedIn, Facebook and Twitter, to gather background information about the victim's personal and work history, his interests, and his activities.

Hacking by PHP

As PHP is server side scripting language so first of all you have need to install a local server (WAMP, XAMPP or LAMPP) over your system. Because if there is no any server running on your system then you can't even run your PHP script. So if you wanna do a programming with PHP this is the first step to download and install a server from the Internet. You can easily download and install servers by watching my videos. Just visit my YouTube channel and watch there.



Hacking Facebook By Using PHP Script | Social Engineering Attack | You can perform this attack over LAN and WAN (Same or Different Networks)

Related links


  1. Pentest Tools Android
  2. Tools For Hacker
  3. Game Hacking
  4. Hacking Tools
  5. Hacking Tools For Windows Free Download
  6. Pentest Tools Url Fuzzer
  7. Hacking Tools 2020
  8. Hacking App
  9. Wifi Hacker Tools For Windows
  10. Pentest Tools Apk
  11. Hacking App
  12. Pentest Tools Website
  13. Usb Pentest Tools
  14. Pentest Tools Review
  15. Hacker Search Tools
  16. Hak5 Tools
  17. Hacker Tools For Mac
  18. Pentest Tools Nmap
  19. Pentest Tools Port Scanner
  20. Usb Pentest Tools
  21. Github Hacking Tools
  22. Pentest Tools Alternative
  23. Hacker Tools Windows
  24. Hacker Search Tools
  25. Hacking Tools Download
  26. Pentest Tools List
  27. Hack Tools Mac
  28. Hack Website Online Tool
  29. Top Pentest Tools
  30. Pentest Tools For Ubuntu
  31. Hacker Tools 2020
  32. Pentest Tools Github
  33. Hacker Tools Free
  34. Pentest Tools Review
  35. How To Make Hacking Tools
  36. Pentest Tools Find Subdomains
  37. Hacking Tools
  38. Tools For Hacker
  39. Pentest Box Tools Download
  40. Hacker Tools Windows
  41. Hacker Tools List
  42. Pentest Automation Tools
  43. Hack Tools For Ubuntu
  44. Pentest Tools Windows
  45. Hacker Tools
  46. Hack Tools
  47. Hack Tools For Pc
  48. Free Pentest Tools For Windows
  49. Hacking Tools Online
  50. Underground Hacker Sites
  51. Pentest Tools For Windows
  52. Hacking Tools Software
  53. New Hacker Tools
  54. Pentest Recon Tools
  55. New Hacker Tools
  56. Blackhat Hacker Tools
  57. Hacker Tools Linux
  58. Hacker Tools For Windows

Emulating Shellcodes - Chapter 1

 There are many basic shellcodes that can be emulated from the beginning from the end providing IOC like where is connecting and so on. But what can we do when the emulation get stuck at some point?

The console has many tools to interact with the emulator like it was a debugger but the shellcode really is not being executed so is safer than a debugger.

target/release/scemu -f ~/Downloads/shellcodes_matched/drv_shellcode.bin -vv 


In some shellcodes the emulator emulates millions of instructions without problem, but in this case at instruction number 176 there is a crash, the [esp + 30h] contain an unexpected 0xffffffff.

There are two ways to trace the memory, tracing all memory operations with -m or inspecting specific place with -i which allow to use registers to express the memory location:

target/release/scemu -f ~/Downloads/shellcodes_matched/drv_shellcode.bin  -i 'dword ptr [esp + 0x30]'


Now we know that in position 174 the value 0xffffffff is set.

But we have more control if we set the console at first instruction with -c 1 and set a memory breakpoint on write.




This "dec" instruction changes the zero for the 0xffffffff, and the instruction 90 is what actually is changing the stack value.

Lets trace the eax register to see if its a kind of counter or what is doing.


target/release/scemu -f ~/Downloads/shellcodes_matched/drv_shellcode.bin  --reg eax 


Eax is not a counter, is getting hardcoded values which is probably an API name:


In this case this shellcode depend on previous states and crash also in the debugger because of  register values. this is just an example of how to operate in cases where is not fully emulated.

In next chapter will see how to unpack and dump to disk using the emulator.


Related links


Ransomware.OSX.KeRanger Samples


Research: New OS X Ransomware KeRanger Infected Transmission BitTorrent Client Installer by Claud Xiao

Sample credit: Claud Xiao


File information

d1ac55a4e610380f0ab239fcc1c5f5a42722e8ee1554cba8074bbae4a5f6dbe1 
1d6297e2427f1d00a5b355d6d50809cb 
Transmission-2.90.dmg

e3ad733cea9eba29e86610050c1a15592e6c77820927b9edeb77310975393574 
56b1d956112b0b7bd3e44f20cf1f2c19 
Transmission

31b6adb633cff2a0f34cefd2a218097f3a9a8176c9363cc70fe41fe02af810b9
14a4df1df622562b3bf5bc9a94e6a783 
General.rtf

d7d765b1ddd235a57a2d13bd065f293a7469594c7e13ea7700e55501206a09b5 
24a8f01cfdc4228b4fc9bb87fedf6eb7 
Transmission2.90.dmg

ddc3dbee2a8ea9d8ed93f0843400653a89350612f2914868485476a847c6484a
3151d9a085d14508fa9f10d48afc7016 
Transmission

6061a554f5997a43c91f49f8aaf40c80a3f547fc6187bee57cd5573641fcf153 
861c3da2bbce6c09eda2709c8994f34c 
General.rtf



Download
Related news

  1. Hacker Tools 2019
  2. Beginner Hacker Tools
  3. Pentest Tools Alternative
  4. Hacking Tools Kit
  5. Hacker Tools For Pc
  6. Hack Tools
  7. Hacker Tools Linux
  8. Pentest Tools Framework
  9. Pentest Automation Tools
  10. Tools Used For Hacking
  11. Hacker Tools Mac
  12. Hacking Tools Windows
  13. Hack Tools For Pc
  14. Hacking Tools Online
  15. Hack Apps
  16. Android Hack Tools Github
  17. Pentest Tools List
  18. Hak5 Tools
  19. Pentest Tools Bluekeep
  20. Hacking Tools For Beginners
  21. Pentest Reporting Tools
  22. Hack Rom Tools
  23. Hacker Tools 2019
  24. Hacker Tools 2019
  25. Pentest Tools Download
  26. Pentest Tools Website
  27. Hacking Tools For Beginners
  28. Hak5 Tools
  29. Hacker Tools Apk
  30. Pentest Tools Kali Linux
  31. Hacking Tools Free Download
  32. Pentest Tools Online
  33. Hacker
  34. Hacking Tools Free Download
  35. Pentest Tools Windows
  36. Hack Rom Tools
  37. Hacking Tools For Windows Free Download
  38. Hacking Tools Download
  39. Wifi Hacker Tools For Windows
  40. Hacking Tools Online
  41. Hacker Tools Github
  42. Hack Website Online Tool
  43. Pentest Tools Online
  44. Best Pentesting Tools 2018
  45. Pentest Automation Tools
  46. Pentest Tools Framework
  47. Tools Used For Hacking
  48. Blackhat Hacker Tools
  49. Tools Used For Hacking
  50. Best Hacking Tools 2019
  51. Hacker Techniques Tools And Incident Handling
  52. Pentest Tools Online
  53. Hak5 Tools
  54. Hacker Tools
  55. Pentest Tools
  56. Pentest Tools Alternative
  57. Hacker Tools
  58. Hacker Tool Kit
  59. Game Hacking
  60. Pentest Tools List
  61. Hack Tools
  62. Pentest Tools Kali Linux
  63. Best Pentesting Tools 2018
  64. Pentest Tools Url Fuzzer
  65. Pentest Tools For Android
  66. Android Hack Tools Github
  67. Pentest Recon Tools
  68. Hack Tools Download
  69. Hack Tool Apk No Root
  70. Tools Used For Hacking
  71. Hack Tools For Games
  72. Pentest Tools Kali Linux
  73. Hacking Tools For Kali Linux
  74. Hacker Tools For Windows
  75. Hack Tools For Games
  76. Hacking Tools For Windows
  77. Hacker Tools Online