Get Mystery Box with random crypto!

Ethical Hackers Vol. 2

Logo of telegram channel ethicalhackerscommunity2 — Ethical Hackers Vol. 2 E
Logo of telegram channel ethicalhackerscommunity2 — Ethical Hackers Vol. 2
Channel address: @ethicalhackerscommunity2
Categories: Technologies
Language: English
Subscribers: 6.95K
Description from channel

Acquire Content-Rich Courses and Tutorials here For Free.
Strictly for Educational purposes only💯

Ratings & Reviews

3.00

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

0

4 stars

2

3 stars

0

2 stars

0

1 stars

1


The latest Messages 5

2022-05-14 16:36:59 The BoB Web Application Security Project (BWASP) is an open-source, analysis tool to support for Web Vulnerability (https://www.kitploit.com/search/label/Vulnerability) Manual Analysis (https://www.kitploit.com/search/label/Analysis) hackers. The BWASP tool basically provides predicted information through vulnerability analysis (https://www.kitploit.com/search/label/Vulnerability%20Analysis) without proceeding with an attack. BWASP supports performing automated (https://www.kitploit.com/search/label/Automated) analysis and manual analysis. The BWASP Project supports: Find Attack vector automatically. (e.g. SQL Injection, Cross-site Scripting) Detect website technology. Log4J vulnerability scan (Partially supports java language) HTTP REST API GuideLine Result Test payload option(attack test)
Getting started pip3 install -r requirements.txt

python3 start.py BWASP Tool Guide guide-ko-documentation (https://github.com/BWASP/BWASP/blob/main/GUIDE_ko.md) guide-en-documentation (https://github.com/BWASP/BWASP/blob/main/GUIDE_en.md) Roadmap Add OSINT feature (find subdomains) Reference Web Infra Environment Analysis: wappalyzer(https://github.com/AliasIO/wappalyzer) Contact bwasptop9@gmail.com (mailto:bwasptop9@gmail.com) Contributor Dohun Koo (@dohunny (https://github.com/dohunny)) Sanghyeon Lee (@isanghyeon (https://github.com/isanghyeon)) Joowon Kim (@arrester (https://github.com/arrester)) Jongmin Kim (@Universe1122 (https://github.com/Universe1122)) Joonyoung Jeong (@jeongjy0317 (https://github.com/jeongjy0317)) Joomyeong Lee (@PecentZero (https://github.com/PecentZero)) PL: Jiheon Choi (@jiheon-dev (https://github.com/jiheon-dev)) Mentor: Gangseok Lee (@codeengn (https://github.com/codeengn)), Sehan Park (@combab0 (https://github.com/combab0)) Acknowledgement This work was supported by Korea Information Technology Research (https://www.kitploit.com/search/label/Research) Institute (KITRI) Best of the Best (BoB) Program 10th vulnerability analysis track. [Project Name: BoB Web Application Security Project]

Download BWASP (https://github.com/BWASP/BWASP)
367 viewsEH Community Feed, 13:36
Open / Comment
2022-05-14 16:36:59
285 viewsEH Community Feed, 13:36
Open / Comment
2022-05-14 16:36:59 BWASP - BoB Web Application Security Project
http://www.kitploit.com/2022/05/bwasp-bob-web-application-security.html
279 viewsEH Community Feed, 13:36
Open / Comment
2022-05-14 01:11:52 for accessible 64-bit processes (except 'list') - RogueAssemblyHunter_x64.exe --mode=sweep - Example 2 : Scan processes, list all CLR modules in accessible 32-bit managed processes, and show error information - RogueAssemblyHunter_x86.exe --mode=sweep --hunt=list --debug - Example 3 : Watch for new processes, scan all CLR modules (if managed and 64-bit), do not scan the RogueAssemblyHunter process, and do 2 checks with a 3 second delay between - RogueAssemblyHunter_x64.exe --mode=watch --suppress --checks=2 --sleep=3 - Example 4 : Scan single process by PID, list in-memory only CLR module findings, and export CLR modules to specified path - RogueAssemblyHunter_x86.exe --mode=process --pid=4650 --hunt=memory-only --export=c:\evilassemblies\ - Example 5 : Scan processes, list in-memory only CLR module findings for accessible 64-bit processes, do no scan RogueAssemblyHunter process, and do not show title banner - RogueAssemblyHunter_x64.exe --mode=sweep --hunt=memory-only --suppress --nobanner Release Files: Invoke-RogueAssemblyHunter & Compiled Binaries For convinience, a PowerShell script along with two compiled binaries (RogueAssemblyHunter_x64.exe and RogueAssemblyHunter_x86.exe) have been included in the \Release folder. Feel free to modify to fit your use cases (e.g. deployment, embedding, checks, sleep, etc.). Example Usage: Run Invoke-RogueAssemblyHunter in sweep mode and check for all hunt options cd c:\path\to\RogueAssemblyHunter import-module .\Invoke-RogueAssemblyHunter.ps1 Invoke-RogueAssemblyHunter Run Invoke-RogueAssemblyHunter in watch mode and check for all hunt options cd c:\path\to\RogueAssemblyHunter import-module .\Invoke-RogueAssemblyHunter.ps1 Invoke-RogueAssemblyHunter -ScanMode watch SHA256 Hashes: e804711a8b6469f1b13b388de47dfa6dde1c85279d365db7b6e19e1644990fa6 Invoke-RogueAssemblyHunter.ps1 cc985d918e566671aa209142abc55bd798ca6c1a18730b785ac8c18d489736c3 RogueAssemblyHunter_x64.exe ae3aead43871e263cd8465d5356c4daaae0635714321f872c931ec825008287a RogueAssemblyHunter_x86.exe Roadmap Managed dump (.dmp) file analysis Improve sig-status check(s) Output improvements (e.g. json) Stability and bug fixes Credits, Inspiration, & Resources Hunting For In-Memory .NET Attacks (https://www.elastic.co/blog/hunting-memory-net-attacks) | by Joe Desimone (@dez_ (https://mobile.twitter.com/dez_)) Get-ClrReflection (https://gist.github.com/dezhub/2875fa6dc78083cedeab10abc551cb58) | by Joe Desimone (@dez_ (https://mobile.twitter.com/dez_)) Get-InjectedThread (https://gist.github.com/jaredcatkinson/23905d34537ce4b5b1818c3e6405c1d2) | by Jared Atkinson (@jaredcatkinson (https://mobile.twitter.com/jaredcatkinson)) pe-sieve (https://github.com/hasherezade/pe-sieve) | by hasherezade (@hasherezade (https://mobile.twitter.com/hasherezade)) CLR MD — Analyzing Live Process (https://harshaprojects.wordpress.com/2015/12/29/clr-md-analyzing-live-process/) | by Harsha How to enumerate Modules in each App Domain using ClrMD (https://sukesh.me/2020/06/12/how-to-enumerate-modules-in-each-app-domain-using-clrmd/) | by Sukesh Ashok Kumar WMIProcessWatcher (https://github.com/malcomvetter/WMIProcessWatcher/) | by Tim MalcomVetter (@malcomvetter (https://twitter.com/malcomvetter))

Download RogueAssemblyHunter (https://github.com/bohops/RogueAssemblyHunter)
354 viewsEH Community Feed, 22:11
Open / Comment
2021-12-21 00:45:36 https://t.me/ETHICALHACKERSC
67 viewsDrac., 21:45
Open / Comment
2021-10-01 18:16:55 https://t.me/dailychannelsbot?start=ethicalhackerscommunity
3.6K viewsDrac., 15:16
Open / Comment
2021-10-01 18:13:26 https://t.me/ETHICALHACKERSC
3.6K viewsDrac., 15:13
Open / Comment
2021-10-01 18:12:19 Ethical Hacking - Sniffing

Sniffing is the process of monitoring and capturing all the packets passing through a given network using sniffing tools.

Sniffing is a form of “tapping phone wires” and get to know about the conversation. It is also called wiretapping applied to the computer networks.
Sniffing allows you to see all sorts of traffic, both protected and unprotected. In the right conditions and with the right protocols in place, an attacking party may be able to gather information that can be used for further attacks or to cause other issues for the network or system owner.

What can be sniffed?
One can sniff the following sensitive information from a network −

Email traffic
FTP passwords
Web traffics
Telnet passwords
Router configuration
Chat sessions
DNS traffic

How it works
A sniffer normally turns the NIC of the system to the promiscuous mode so that it listens to all the data transmitted on its segment.

Types of Sniffing
Sniffing can be either Active or Passive in nature.

1. Passive Sniffing
In passive sniffing, the traffic is locked but it is not altered in any way. Passive sniffing allows listening only. It works with Hub devices. On a hub device, the traffic is sent to all the ports. In a network that uses hubs to connect systems, all hosts on the network can see the traffic. Therefore, an attacker can easily capture traffic going through.

The good news is that hubs are almost obsolete nowadays. Most modern networks use switches. Hence, passive sniffing is no more effective.

2. Active Sniffing
In active sniffing, the traffic is not only locked and monitored, but it may also be altered in some way as determined by the attack. Active sniffing is used to sniff a switch-based network. It involves injecting address resolution packets (ARP) into a target network to flood on the switch content addressable memory (CAM) table. CAM keeps track of which host is connected to which port.

Following are the Active Sniffing Techniques −

-MAC Flooding
-DHCP Attacks
-DNS Poisoning
-Spoofing Attacks
-ARP Poisoning


SUPPORT OUR COMMUNITY BY DONATION
https://www.buymeacoffee.com/E.H.Giveaway

===@Ethical_Hackers_Giveaway===
3.1K viewsDrac., 15:12
Open / Comment
2021-09-23 17:47:27 FUND OUR COMMUNITY

This community was started with the aim of creating a network where Ethical Hackers can unite, motivate each other, and share ideas that nurture those interested in learning as far as Ethical Hacking is concerned. The starting was rough but through the help of a chosen few, we've managed to endure many challenges till we got to the point that we see ourselves today.

However, we're yet to get to where we're supposed to be. That's why we started a donation campaign to fund the community's operations, to thank the chosen few, to keep the community alive in preparation to what's about to come next.

HELP THE COMMUNITY RUN BETTER :

Click the link below to learn more;
https://www.buymeacoffee.com/E.H.Giveaway
419 viewsDrac., 14:47
Open / Comment
2021-08-29 15:58:18 The community just got an upgrade !

Join our official DISCORD SERVER for upcoming events, updates, livestreams and so much more

https://discord.gg/69QN8qBY
820 viewsDrac., 12:58
Open / Comment