TIME

NEPAL QATAR BELFAST, UK MALAYSIA DUBAI

Wednesday, August 26, 2020

Hacking Windows 95, Part 2

In the Hacking Windows 95, part 1 blog post, we covered that through a nasty bug affecting Windows 95/98/ME, the share password can be guessed in no time. In this article, I'm going to try to use this vulnerability to achieve remote code execution (with the help of publicly available tools only).

The first thing we can do when we have read access to the Windows directory through the share, is to locate all the *.pwl files on the c:\windows directory, copy them to your machine where Cain is installed, switch to Cracker tab, pwl files, load the pwl file, add username based on the filename, and try to crack it. If you can't crack it you might still try to add a .pwl file where you already know the password in the remote windows directory. Although this is a fun post-exploitation task, but still, no remote code execution. These passwords are useless without physical access.


One might think that after having a share password and user password, it is easy to achieve remote code execution. The problem is:
  • there is no "at" command (available since Windows 95 plus!)
  • there is no admin share
  • there is no RPC
  • there is no named pipes
  • there is no remote registry
  • there is no remote service management
If you think about security best practices, disabling unnecessary services is always the first task you should do. Because Windows 95 lacks all of these services, it is pretty much secure!

During my quest for a tool to hack Windows 95, I came across some pretty cool stuff:
LanSpy

But the best of the best is Fluxay, which has been written by chinese hackers. It is the metasploit from the year 2000. A screenshot is worth more than a 1000 words. 4 screenshot > 4 thousand words :)





It is pretty hard to find the installer, but it is still out there!

But at the end, no remote code execution for me.

My idea here was that if I can find a file which executes regularly (on a scheduled basis), I can change that executable to my backdoor and I'm done. Although there is no scheduler in the default Windows 95, I gave it a try. 

Let's fire up taskman.exe to get an idea what processes are running:


Looks like we need a more powerful tool here, namely Process Explorer. Let's try to download this from oldapps.com:


LOL, IE3 hangs, can't render the page. Copying files to the Win95 VM is not that simple, because there are no shared folders in Win95 VM. And you can't use pendrives either, Win95 can't handle USB (at least the retail version). After downloading the application with a newer browser from oldapps, let's start Process Explorer on the test Windows 95.


Don't try to download the Winsocks 2 patch from the official MS site, it is not there anymore, but you can download it from other sites

Now let's look at the processes running:


After staring it for minutes, turned out it is constant, no new processes appeared.
Looking at the next screenshot, one can notice this OS was not running a lot of background processes ...


My current Win7 has 1181 threads and 84 processes running, no wonder it is slow as hell :)

We have at least the following options:
  1. You are lucky and not the plain Windows 95 is installed, but Windows 95 Plus! The main difference here is that Windows 95 Plus! has built-in scheduler, especially the "at" command. Just overwrite a file which is scheduled to execution, and wait. Mission accomplished!
  2. Ping of death - you can crash the machine (no BSOD, just crash) with long (over 65535 bytes) ICMP ping commands, and wait for someone to reboot it. Just don't forget to put your backdoor on the share and add it to autoexec.bat before crashing it. 
  3. If your target is a plain Windows 95, I believe you are out of luck. No at command, no named pipes, no admin share, nothing. Meybe you can try to fuzz port 137 138 139, and write an exploit for those. Might be even Ping of Death is exploitable?
Let's do the first option, and hack Windows 95 plus!
Look at the cool features we have by installing Win95 Plus!


Cool new boot splash screen!


But our main interest is the new, scheduled tasks!


Now we can replace diskalm.exe with our backdoor executable, and wait maximum one hour to be scheduled.

Instead of a boring text based tutorial, I created a YouTube video for you. Based on the feedbacks on my previous tutorialz, it turned out I'm way too old, and can't do interesting tutorials. That's why I analyzed the cool skiddie videoz, and found that I have to do the followings so my vidz won't suck anymore:
  • use cool black windows theme
  • put meaningless performance monitor gadgets on the sidebar
  • use a cool background, something related with hacking and skullz
  • do as many opsec fails as possible
  • instead of captions, use notepad with spelling errorz
  • there is only one rule of metal: Play it fuckin' loud!!!!

Related news


  1. Hacker Tools Free
  2. Hacker Tools For Mac
  3. Blackhat Hacker Tools
  4. Hacker Tools 2019
  5. Pentest Tools Free
  6. Hacking Tools Pc
  7. Ethical Hacker Tools
  8. Hacker Search Tools
  9. Hack Tools For Windows
  10. Hacker Tool Kit
  11. Nsa Hacker Tools
  12. Hacker Tools
  13. Hack Website Online Tool
  14. Hacker Tools For Mac
  15. Hacker Tools
  16. How To Make Hacking Tools
  17. Github Hacking Tools
  18. Tools 4 Hack
  19. Pentest Tools Apk
  20. Hacking Tools For Mac
  21. Hacker Tools Free
  22. Hacker Techniques Tools And Incident Handling
  23. Hacker Security Tools
  24. Hacking Tools Mac
  25. Pentest Tools Website
  26. Hack Tools Online
  27. Github Hacking Tools
  28. Pentest Tools Bluekeep
  29. Hacker Tools For Pc
  30. Hacker Tools Online
  31. Pentest Reporting Tools
  32. Hacking Tools For Kali Linux
  33. Hacker Tools For Pc
  34. Hackrf Tools
  35. Hacker Tools Windows
  36. Pentest Tools Free
  37. Hacking Tools Free Download
  38. Hackrf Tools
  39. Hacker Tools Free
  40. Pentest Tools Alternative
  41. Hacking Tools Windows
  42. Free Pentest Tools For Windows
  43. Pentest Tools Linux
  44. Pentest Tools Open Source
  45. Pentest Tools For Windows
  46. Hacking Tools Usb
  47. Hackrf Tools
  48. Hack Tools Github
  49. Growth Hacker Tools
  50. Pentest Tools For Mac
  51. Pentest Tools For Android
  52. How To Make Hacking Tools
  53. Install Pentest Tools Ubuntu
  54. Tools Used For Hacking
  55. Hacking Tools Online
  56. Hack Tools For Mac
  57. Black Hat Hacker Tools
  58. Pentest Tools Website Vulnerability
  59. Hacking Tools 2020
  60. Hack Tools Pc
  61. How To Install Pentest Tools In Ubuntu
  62. Kik Hack Tools
  63. Hacking Tools Download
  64. Hacking Tools For Windows 7
  65. Tools Used For Hacking
  66. Hacking App
  67. Hack Tools For Pc
  68. Physical Pentest Tools
  69. Hack Tools
  70. Pentest Box Tools Download
  71. Pentest Tools Find Subdomains
  72. Hacker Techniques Tools And Incident Handling
  73. Hacker Tools Mac
  74. Hacking Tools For Windows 7
  75. Hacker Tools Online
  76. Hack Tools For Windows
  77. Hacker Tools 2019
  78. Hacking Tools For Windows Free Download
  79. Bluetooth Hacking Tools Kali
  80. Hacking Tools And Software
  81. Hacking Tools Software
  82. Hacking Tools For Windows 7
  83. Hacking Tools 2019
  84. Hacking Tools For Pc
  85. Hacking Tools Hardware
  86. Hacking Tools 2019
  87. Pentest Tools Online
  88. Hack Tools Pc
  89. Hacking Tools Name
  90. Hack Tools Github
  91. Hacking Tools For Beginners
  92. Hack Tools For Mac
  93. Hack Tools For Ubuntu
  94. Best Pentesting Tools 2018
  95. Hacking Tools Name
  96. Hacker Tool Kit
  97. Pentest Reporting Tools
  98. Hacking Tools 2019
  99. Pentest Tools Subdomain
  100. Growth Hacker Tools
  101. Hacker Tools For Pc

Top 20 Best Free Hacking Apps For Android |2019|

 20 Best Free hacking apps For Android |2019|. 

Android is now one of the most popular operating systems. So, hackers have also started using Android devices for their tasks. Now Android devices are used for penetration testing and other hacking activities including IT security administrator, Wi-Fi hacking and network monitoring. There are several hacking apps or Android devices. So, we have curated a list of best hacking apps for Android.


Before you start using these apps, you must take a backup of your important data. I also recommend the use of these apps on a separate device. Using this on your primary phone is not recommended. It is because many of these apps require a rooted device and app can also harm your phone.


Note: Hacking apps can be used for educational and malicious purpose. But we never encourage malicious operations. We are listing the apps here just for educational purpose. You should only use these apps to learn. We do not support any unethical use of these apps.

1.  AndroRAT

AndroRAT stands for Android RAT. RAT is the short form of Remote Administrative Tool and it allows an attacker to remotely control and fetch information from a device. AndroRAT does the same thing. It has a server developed in Java/Swing but the Android application has been developed in Java Android.

AndroRAT allows you to connect information like call logs, contacts, messages, location and more. You can remotely monitor sent and received messages send texts, use the camera, open a URL in the browser, make phone calls and remotely monitor the device.

The connection to the server can be triggered by an SMS or a call. From the server GUI, you can check all the connected clients and access information.

As the app allows silent remote access, it is not available on Play Store.

                Download APK

2. zANTI

zANTI is a known penetration testing suite of applications you can install locally on Android smartphone. This tool brings scanning tools Diagnostic features and Reporting tools. You can use this malicious software to attack a network and check for any loopholes in your network. This tool is used to test redirect and SSL stripping attacks. You can edit request and response messages from web servers, the host takes websites from your Android phone and more.


                  Download 

3. FaceNiff

FaceNiff is another good Android hacking that allows you to intercept the traffic of your WiFi network. You can use this tool to snoop what people are doing on the network you are. You can snoop on services like Facebook, Twitter, Amazon, YouTube and more. This is one of the notable too for steal cookies from the WiFi network and gives the attacker unauthorized access to other people's account.

This app requires a rooted device. So, you can only use the app if you have a rooted phone.

Download APK

4. Droidsheep

Droidsheep is also a similar app that helps security analysts understand what is happening in your Wi-Fi network. Like Face Sniff, this app can also hijack the web session profiles over a network and supports most of the services and websites.

The primary difference between Droidsheep and FaceSniff is that Droidsheep works with almost all the websites while FaceSniff has limited support.

                     Download APK

5. Hackode

Hackode is another good hacking apps for Android. It is not a single app but a collection of tools for ethical hackers and penetration testers. The app comes with three modules including Reconnaissance, Scanning and Security Feed. You can use this app for SQL Injection, Google hacking, MySQL Server, Whois, Scanning, DNS Dif, DNS lookup, IP, MX Records, Security RSS Feed, Exploits etc.

The app is still in beta, but available in Play Store.

                  Download Here

6. cSploit

cSploit is also a good security tool for Android. It comes with several options like cracking Wi-Fi password, installing backdoors, finding vulnerabilities and their exploits. If you are looking for a good hacking app or hacker app for Android, you should try this one for sure.

                  Download APK

7. DroidBox

DroidBox is also a similar kind of app that allows you to do the dynamic analysis of Android applications. You can use this app to get information like hashes of APK package, network traffic, SMS & phone calls, Incoming/outgoing network data, Listing broadcast receivers and more.

                    Download

8. Nmap

If you are into security or hacking, I am sure you already know the name of this too. Like the desktop tool, Nmap for Android also allows you to scan

It works on both on non-rooted and rooted phones. If you are a beginner, you should try this app and learn from it.

                      Download

9. SSHDroid

SSHDroid is SSH tool developed for Android. It lets you connect to a remote computer and run terminal commands, transfer and edit files. The app also provided features like shared-key authentication, WiFi autostart whitelist, extended notification control etc,

This app is available on Play Store.

                    Download

10. Kali Linux NetHunter

Kali Linux NetHunter is an open source penetration testing platform for Android. It officially supports Nexus and OnePlus devices. It provides the ultimate penetration testing platform that allows you to perform a wide range of attacks.

                     Download

11. APKInspector

APKInspector allows you to perform reverse engineering on an APK. you can use this to get a deep insight or APK and get the source code of any Android app. You can do modifications in the APK and visualize the DEX code to erase the credits and license.

                 Download APK

12. Shark for Root

Shark for Root is an advanced hacking tool for security experts and hackers. It can work as a traffic snipper. You can use the tcpdump command on rooted devices. It works on Wi-Fi, 3G, and FroYo tethered mode.

                    Download

13. dSploit

dSploit is an Android network penetrating testing suit. You can download and install it on your device to perform network security testing. It supports all Android devices running on Android 2.3 Gingerbread or higher. You need to root this phone for using the app. After rooting the phone, you need to download BusyBox from Google Play Store

The app comes with several modules including Port Scanner, Inspector, RouterPWN, Trace, Login Cracker, Packet Forger, Vulnerability Finder, and MITM.

                      Download

14. WPScan

WPScan is a WordPress vulnerability scanner for Android. This app is used to scan WordPress based websites and find possible vulnerabilities. WPScan is a popular desktop tool but this WPScan for Android is not related to that. So, do not think of it as an official WPScan app.

                      Download

15. Network Mapper

Network Mapper is a network scanner tool for network admins. It used to scan the network, lists all devices connected and find Open ports of various servers like FTP servers, SSH servers, SMB servers etc on the network. The tool is available on Play Store.

                     Download

16. Andosid

Andosid is like LOIC for the desktop. This tool is used to perform DOS attacks from Android mobile phones. You can use this tool to set a target URL and perform a DOS attack in one click. The tool will start flooding target URL with fake requests.

                     Download

17. DroidSQLi

DroidSQLi app allows attackers to perform SQL Injection on a target URL. You just need to find a target URL and this tool will start the fully automated SQL Injection attack.

                     Download

18. AppUse

AppUse is a Virtual Machine developed by AppSec Labs. It is a freely available mobile application security testing platform that comes with lots of custom made tools by AppSec Labs. If you want to sue your Android phone as your penetration testing tool, this one is for you.

                   Download

19. Network Spoofer

Network Spoofer is also a good hacking app for android. It lets you change the website on other people's computer from your Android phone. Connect to a WiFI network and then choose a spoof to use with the app. this tool is to demonstrate how vulnerable a network is. Do not try this on any unauthorized networks.

                 Download

20. DroidSheep Guard

As the name suggests, DroidSheep Guard works against DroidSheep. It monitors Android devices' ARP-table and tries to detect ARP-Spoofing attack on your network. It does not require a rooted device.

               Download


@EVERYTHING NT


Related links


  1. Pentest Tools Linux
  2. Hack And Tools
  3. Wifi Hacker Tools For Windows
  4. Hacking Tools For Kali Linux
  5. Pentest Tools Tcp Port Scanner
  6. Hacking Tools Software
  7. Hack Tools Download
  8. Hack Tools Download
  9. Hacking Tools Kit
  10. Black Hat Hacker Tools
  11. Pentest Tools Alternative
  12. Hacking Tools Software
  13. Hacking Tools For Windows
  14. Pentest Tools Android
  15. Hacker Tools 2019
  16. Hacking Tools
  17. Hacker Tools Linux
  18. Pentest Tools Port Scanner
  19. Hacking Tools Kit
  20. Hak5 Tools
  21. Hacking Tools Pc
  22. Pentest Tools Download
  23. What Is Hacking Tools
  24. Hack And Tools
  25. Tools Used For Hacking
  26. Hacker Tools Github
  27. Github Hacking Tools
  28. Hack Tools For Pc
  29. Tools For Hacker
  30. Hacking Tools For Windows 7
  31. Pentest Tools Review
  32. Hack Tools Github
  33. Hacks And Tools
  34. Black Hat Hacker Tools
  35. Hacker Tools 2020
  36. Pentest Tools Apk
  37. Pentest Reporting Tools
  38. Pentest Tools For Mac
  39. Pentest Tools For Mac
  40. Pentest Tools Website
  41. Tools 4 Hack
  42. Kik Hack Tools
  43. Ethical Hacker Tools
  44. Hacking Tools Github
  45. Hacker Hardware Tools
  46. Hacking Tools Usb
  47. Pentest Tools Tcp Port Scanner
  48. Hacking Tools Windows
  49. Hack Tools For Pc
  50. Install Pentest Tools Ubuntu
  51. Hacker Tools Online
  52. Hack Tools Online
  53. Hacker Tools For Mac
  54. Black Hat Hacker Tools
  55. Hacker Techniques Tools And Incident Handling
  56. Hacker Techniques Tools And Incident Handling
  57. Termux Hacking Tools 2019
  58. Hack Tools Pc
  59. Top Pentest Tools
  60. Pentest Tools Review
  61. Pentest Tools Website
  62. Hacking Tools For Windows 7
  63. Hack And Tools
  64. Pentest Tools Linux
  65. Hacking Tools Name
  66. Pentest Tools Website
  67. Best Hacking Tools 2019
  68. How To Install Pentest Tools In Ubuntu
  69. Hacker Tools Windows
  70. Best Hacking Tools 2020
  71. Pentest Tools Open Source
  72. Hacker Tools 2019
  73. Hacking Tools Online
  74. New Hacker Tools
  75. Hack And Tools
  76. Top Pentest Tools
  77. Hack Tools 2019
  78. Hacking Tools Software
  79. Hack Tools Online
  80. Pentest Tools Framework
  81. Hacker Tools Hardware
  82. Beginner Hacker Tools
  83. Hacking Tools For Kali Linux
  84. Hacker Tools Hardware
  85. Hack Rom Tools
  86. Pentest Tools Port Scanner
  87. Hacking Tools Download
  88. Hacking Tools Download
  89. Hacker Tools 2019
  90. Hacking App
  91. Hackers Toolbox
  92. Pentest Tools Free
  93. Hacker Tools Apk
  94. Hacker Tools Apk Download
  95. Hacker Tools List
  96. Hacking Tools For Mac
  97. Pentest Tools For Ubuntu
  98. Hack Tools For Pc
  99. Hacking Tools For Windows
  100. Hacker Tools Apk Download
  101. How To Make Hacking Tools
  102. Black Hat Hacker Tools
  103. Hacker Tools
  104. Hackers Toolbox
  105. Top Pentest Tools
  106. Hacking Tools And Software
  107. Pentest Tools For Mac
  108. Pentest Tools Windows
  109. Physical Pentest Tools
  110. Easy Hack Tools
  111. Hack Tools 2019
  112. Hacking Tools Usb
  113. Hacking Tools For Windows 7
  114. Beginner Hacker Tools
  115. Pentest Tools Review
  116. Hack Tools Github
  117. Hacking Tools For Beginners
  118. Hacker Tools
  119. Hacker
  120. Hackrf Tools
  121. Hacker Tools Github
  122. Hacker Search Tools
  123. Ethical Hacker Tools
  124. Nsa Hacker Tools
  125. Hack Tools Download
  126. Hacker Tools Mac
  127. Hacking Apps
  128. Hack Tools Github
  129. New Hack Tools
  130. Hacking Tools Name
  131. Pentest Tools Find Subdomains
  132. Hacking Tools For Windows Free Download
  133. World No 1 Hacker Software
  134. Hack Tools For Games
  135. Hacking Tools Windows
  136. Hacking Tools Online
  137. Nsa Hacker Tools
  138. Pentest Tools Android
  139. Pentest Tools Open Source
  140. How To Make Hacking Tools
  141. What Are Hacking Tools
  142. New Hacker Tools
  143. Hack Tool Apk No Root
  144. Hacker
  145. Hack Tools Mac
  146. Pentest Tools Subdomain
  147. Wifi Hacker Tools For Windows
  148. Hacking Tools Software

Top Process Related Commands In Linux Distributions


Commands in Linux are just the keys to explore and close the Linux. As you can do things manually by simple clicking over the programs just like windows to open an applications. But if you don't have any idea about commands of Linux and definitely you also don't know about the Linux terminal. You cannot explore Linux deeply. Because terminal is the brain of the Linux and you can do everything by using Linux terminal in any Linux distribution. So, if you wanna work over the Linux distro then you should know about the commands as well. In this blog you will exactly get the content about Linux processes commands which are are given below.

ps

The "ps" command is used in Linux to display your currently active processes over the Linux based system. It will give you all the detail of the processes which are active on the system.

ps aux|grep

The "ps aux|grep" command is used in Linux distributions to find all the process id of particular process like if you wanna know about all the process ids related to telnet process then you just have to type a simple command like "ps aux|grep 'telnet'". This command will give you the details about telnet processes.

pmap

The "pmap" command in Linux operating system will display the map of processes running over the memory in Linux based system.

top

The "top" command is used in Linux operating system to display all the running processes over the system's background. It will display all the processes with process id (pid) by which you can easily kill/end the process.

Kill pid

Basically the kill command is used to kill or end the process or processes by simply giving the process id to the kill command and it will end the process or processes. Just type kill and gave the particular process id or different process ids by putting the space in between all of them. kill 456 567 5673 etc.

killall proc

The "killall proc" is the command used in Linux operating system to kill all the processes named proc in the system. Killall command just require a parameter as name which is common in some of the processes in the system.

bg

The "bg" is the command used in Linux distributions to resume suspended jobs without bringing them to foreground.

fg

The "fg" command is used in Linux operating system to brings the most recent job to foreground. The fg command also requires parameters to do some actions like "fg n" n is as a parameter to fg command that brings job n to the foreground.

Related word