Skip to main content

Posts

Streamlining DLL Hijacking with Automated Testing

  I’ve developed a script that automates the DLL hijacking process. During my testing, I noticed that we often focus on DLLs marked as “Not Found” when testing for DLL hijacking. However, an interesting observation is that among these “Not Found” DLLs, a few (typically one or two) might actually execute, even though we don’t manually test all of them. This script helps automate the testing of all potential DLLs. Note that the payload execution still requires manual verification, as the script is currently a work in progress. Features: Do not perform testing on DLLs within the Windows directory. If the command prompt runs with administrative privileges, the script will ask if you want to execute with elevated permissions. Allows exploitation with either administrative or normal user privileges. It offers multiple payload options to choose from. Execution Process: Run  Run1_Auto_DLL_Hijacking_Admin.bat  with administrative privileges. It first launches Procmon and then prompts you to ini

Binary Protection Checker & Sig Checker Automation Script

  I have developed an automation script for testing binary protection and signature issues. Previously, we had to open the terminal and enter commands, which involved copying paths, and it was a bit irritating for me. Now, with this script, all you need to do is execute the batch file and paste the installable directory path. Both test cases will be performed automatically by this script, and you will receive the results in the same folder under the name "output." It might be helpful for someone. Download:  https://github.com/crazywifi/Binary_Protection_Sig_Checker_Automation.git

How to Create a Telegram Notifications for Conditions in Google Sheet

Create a Bot for the Telegram Alert Open Telegram messenger, sign in to your account or create a new one Enter @Botfather in the search tab and choose this bot. (Official Telegram bots have a blue checkmark beside their name.) Click “Start” to activate BotFather bot.In response, you receive a list of commands to manage bots. Choose or type the /newbot command and send it. Choose a name for your bot — your subscribers will see it in the conversation. And choose a username for your bot — the bot can be found by its username in searches. The username must be unique and end with the word “bot.” Copy the token value. How to Create a New Bot for Telegram: https://sendpulse.com/knowledge-base/chatbot/telegram/create-telegram-chatbot How to Get Your Telegram Chat ID:   https://diyusthad.com/2022/03/how-to-get-your-telegram-chat-id.html In your Telegram account, search for “@myidbot” or open this link t.me/myidbot on your smartphone. Start a conversation with that bot and type /getid. You will

Restore Your Old Blurry Face Image (Face Restoration)

Now we have a tool to restore our old images which we have taken with a low configuration camera. It's time to restore our grandparents, parents, and child blurry photos. This tool is free of cost. 😇 Thanks to the GFPGAN team, who build this.  Check the output: Installation: Download and install Python3 Download the zip file GFPGAN  and unzip it. Open the CMD and navigate to the GFPGAN folder. Run this command pip3 install -r requirements.txt Download ANACONDA and install it. Download PYTORCH  and in the package, choose pip. Download and install CUDA . Download the pre-trained model . GFPGANv1.3.pth is better to use. Move the model file to {" GFPGAN-1.3.8\experiments\pretrained_models\ "}. Copy the blur face image to {" GFPGAN-1.3.8\inputs\whole_imgs\ "}. Run the command {" python inference_gfpgan.py "}. If you are using any other model, then use "python inference_gfpgan. py -v option". Check "python inference_gfpgan.py -h" option

Movie Search By GoogleDorksV2

Now you can search movies by the script. Automation is always great. CMD Movie_Search_By_GoogleDorks.exe By Lazy hacker [Follow: https://lazyhacker22.blogspot.com/] Enter Movie Name: Secret Space UFOs Rise of the Tr3b site:vidoza.net Secret Space UFOs Rise of the Tr3b site:www.1377x.to Secret Space UFOs Rise of the Tr3b https://www.1377x.to/movie/917143/Secret-Space-UFOs-Rise-of-the-TR3B-2021/ Check this tool: Download

Top 10 Must Watch Hacking Movies or Web Series

  Mr. Robot (TV Series 2015-2019) Citizenfour (2014) CyberHell (Exposing An Internet Horror) Hacker 2016 Live Free or Die Hard 2007 Snowden 2016 Blackhat 2015 Who AM I 2014 Trust No One: The Hunt for the Crypto King Web of Make Believe: Death, Lies and the Internet

Some Mitigation Against Phishing and MITM

Regular phishing awareness should be done in the organization. Regular 2FA/MFA hacking awareness should be done in the organization. The Phishing campaign should be run internally in the organization to check the employee's awareness. Reward the employees if they successfully pass the phishing internal check . So that all other employees remember it. Reward the employees who tell about the phishing email or any phishing activity. This creates a positive impact in the organization and the team. The common misconception people have with the standard form of MFA (SMS, Touch, Push) is that it prevents social engineering . Although it MFA protects against an attack, it's commonly still vulnerable to a MITM phishing attack . Check the example of Uber Hack 2022   Take a regular quiz related to phishing and reward some of the employees who pass the quiz. This will motivate others. Always check the domain name while entering the username and password. Make this a habit. Block ph

Another Hack: Uber Hacked By Teen 2022

The company has reported that it is investigating a cyber security incident and also alerted the law-enforcement authorities. Uber is on high alert after a hacker claimed that the ride-hailing giant has suffered a data breach. The alleged breach had reportedly forced Uber to take several internal communications and engineering systems offline. Screenshot from Twitter  vxunderground How this attack worked initially (According to news and Twitter): You all are thinking that how the attacker bypassed the MFA?  An extremely common misconception people have with standard forms of MFA (push/touch/mobile) is that it prevents social engineering. Although MFA can protect against an attacker who only has the victim's credentials, it is commonly still vulnerable to MiTM attacks. Check the analysis of the Uber attack, he has explained it clearly https://mobile.twitter.com/BillDemirkapi/status/1570602097640607744 Some mitigation to avoid these hacks: Regular phishing awareness should be done in

Free Cybersecurity Certifications

Introduction to Cybersecurity Cybersecurity Essentials Networking Essentials Android Bug Bounty Hunting: Hunt Like a Rat Ethical Hacking Essentials (EHE) Digital Forensics Essentials (DFE) Network Defense Essentials (NDE) Introduction to Dark Web, Anonymity, and Cryptocurrency AWS Skill Builder Introduction to Cybersecurity Building a Cybersecurity Toolkit Cyber Aces Free Cyber Security Training Course Introduction to Information Security Penetration Testing - Discovering Vulnerabilities

Web Application Security Testing (WAPT) Interview Questions

Let's Contribute All Together For Creating a Questions Dump What are the vulnerabilities you have to test in the Login form, Payment gateway? What is clickjacking? What is the mitigation of clickjacking? What is CSRF? How to mitigate CSRF? Let's take an example, If a developer implements a CSRF token in a cookie, will it mitigate the CSRF issue? Is it possible to mitigate the CSRF by header? If yes why, if No why? If the data is in JSON format, how you will check the CSRF issue and what are the ways of exploitation? Where to implement the CSRF token and why? If the client doesn't want to change the UI or doesn't want to implement the CSRF tokens, and headers then what mitigation you recommended to the client for CSRF? What is the problem with the per-request token? Is login CSRF possible? Explain login CSRF? Have you ever exploited it? What is the mitigation for login CSRF? Suppose, in an application csrf token is implemented in each request and every request, except th