Saturday, June 17, 2017

credmap – The Credential Mapper

7:17 AM Leave a Reply
credmap – The Credential Mapper
snitch – Information Gathering Tool Via Dorks

June 17, 2017 | 292 views  0
Keep on Guard!

Snitch is an information gathering tool which automates the process for a specified domain. Using built-in dork categories, this tool helps gather specified information domains which can be found using web search engines. It can be quite useful in early phases of penetration tests (commonly called the Information Gathering phase).

snitch - Information Gathering Tool Via Dorks

snitch can identify general information, potentially sensitive extensions, documents & messages, files and directories and web applications.

There are other tools which perform similar functions or parts of what snitch does:

– DMitry – Deepmagic Information Gathering Tool
– wig – CMS Identification & Information Gathering Tool
– theHarvester – Gather E-mail Accounts, Subdomains, Hosts, Employee Names




Usage


devil@hell:~/snitch$ python snitch.py
              _ __       __
  _________  (_) /______/ /_
 / ___/ __ \/ / __/ ___/ __ \
(__  ) / / / / /_/ /__/ / / /
/____/_/ /_/_/\__/\___/_/ /_/ ~0.3  

Usage: snitch.py [options]

Options:
  -h, --help            show this help message and exit
  -U [url], --url=[url]
                        domain(s) or domain extension(s) separated by comma*
  -D [type], --dork=[type]
                        dork type(s) separated by comma*
  -C [dork], --custom=[dork]
                        custom dork*
  -O [file], --output=[file]
                        output file
  -S [ip:port], --socks=[ip:port]
                        socks5 proxy
  -I [seconds], --interval=[seconds]
                        interval between requests, 2s by default
  -P [pages], --pages=[pages]
                        pages to retrieve, 10 by default
  -v                    turn on verbosity

 Dork types:
  info   Information leak & Potential web bugs
  ext    Sensitive extensions
  docs   Documents & Messages
  files  Files & Directories
  soft   Web software
  all    All
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
devil@hell:~/snitch$ python snitch.py
              _ __       __
  _________  (_) /______/ /_
 / ___/ __ \/ / __/ ___/ __ \
(__  ) / / / / /_/ /__/ / / /
/____/_/ /_/_/\__/\___/_/ /_/ ~0.3  

Usage: snitch.py [options]

Options:
  -h, --help            show this help message and exit
  -U [url], --url=[url]
                        domain(s) or domain extension(s) separated by comma*
  -D [type], --dork=[type]
                        dork type(s) separated by comma*
  -C [dork], --custom=[dork]
                        custom dork*
  -O [file], --output=[file]
                        output file
  -S [ip:port], --socks=[ip:port]
                        socks5 proxy
  -I [seconds], --interval=[seconds]
                        interval between requests, 2s by default
  -P [pages], --pages=[pages]
                        pages to retrieve, 10 by default
  -v                    turn on verbosity

 Dork types:
  info   Information leak & Potential web bugs
  ext    Sensitive extensions
  docs   Documents & Messages
  files  Files & Directories
  soft   Web software
  all    All
You can download snitch here:

snitch-master.zip

Or you can read more here.




 Tags: dorks, dorks tool, info gathering, info gathering tool, information gathering, information gathering tool, pen-testing, penetration-testing, Python, snitch

Posted in: Hacking Tools, Privacy, Web Hacking | Add a Comment
Fake News As A Service (FNaaS?) – $400k To Rig An Election

June 15, 2017 | 470 views  0

This is pretty interesting, the prices for Fake News as a Service have come out after some research by Trend Micro, imagine that you can create a fake celebrity with 300,000 followers for only $2,600.

Fake News As A Service (FNaaS?) - $400k To Rig An Election

Now we all know this Fake News thing has been going on for a while, and of course, if it’s happening, some capitalist genius is going to monetize it and offer it as a professional service.

Fake news has come to be associated with political intrigue but the same propaganda techniques are also abused by cybercriminals, according to a study by Trend Micro.

The techniques and methods used to spread fake news and manipulate public opinion have a wide range of objectives and even a price list.

Cybercriminals produce, market and monetise fake news in underground markets. The scope of a campaign and intended target affect pricing. For example, campaigns aimed to spark street protests are priced at $200,000 while discrediting a journalist would cost $55,000 and creating a fake celebrity (with 300,000 followers) costs a more modest $2,600.

A year-long campaign to influence election outcomes is available for just $400,000, the study says. Whether such listings are in themselves an attempt at disinformation is certainly debatable. US intel agencies, Western politicians and security firms are nigh-on unanimous that attempts to influence the US presidential election last year were the work of the Kremlin. For example, UK defence secretary Sir Michael Fallon recently said the Kremlin is “weaponising misinformation” as part of a sustained campaign that goes beyond alleged meddling in the presidential election.




You can read the full 77 page report by Trend here: The Fake News Machine [PDF]

It’s insightful to see the types of services that are available, and how they are categorised. Now I’ve known about social media manipulation for many years (fake likes, followers, YouTube views and so on) but to see this kind of Fake News at scale, as a service is something new to me.

Fake news services typically involve the creation of fake social media profiles and groups; developing the fake content itself; driving likes and retweets for dissemination; and building legitimate-looking news sites. All these steps are designed to set up and sustain false narratives.

For an additional fee, multiple news sites can be purchased which cross reference each other to add more authenticity to the fake news campaign, the report reveals.

Chinese, Russian, Middle Eastern and English underground marketplaces offer fake news services of one type or another. Regional differences exist.

For example, in China, fake advertorials can be purchased for as little as ¥100 (£11), while in Russia 35,000 rubles (£483) will buy your video two minutes on the YouTube homepage.

The report also details an example of the dissemination of fake news, including the cynical abuse of the recent Manchester bombing attack. Mexican journalists were falsely listed in galleries as bombing victims in what’s thought to be an attack by a drug cartel. These fake victim pics were subsequently promoted through social media.

Unfortunately there’s no technical solution to thwart this, it’s purely about education. If people don’t fact check, cross check and verify sources before disseminating them this whole Fake News situation is just going to get worse and worse.

I feel like it had a serious impact on both Brexit and the Trump election, and it’s likely to stay very relevant in any large scale World events as so many people now base their opinions on what they see online.

Source: The Register


 Tags: alternative news, buy fake news, discredit journalist, fake celebrity, fake news, fake news as a service, fake news service, fix election, fnaas

Posted in: Legal Issues, Social Engineering | Add a Comment
credmap – The Credential Mapper

June 13, 2017 | 1,388 views  2

Credmap is an open source credential mapper tool that was created to bring awareness to the dangers of credential reuse. It is capable of testing supplied user credentials on several known websites to test if the password has been reused on any of these.

credmap - The Credential Mapper

It is not uncommon for people who are not experts in security to reuse credentials on different websites; even security savvy people occasionally reuse credentials.

Credmap takes a username and/or e-mail, and a password as input and it attempts to login on a variety of known websites to verify if these credentials have been reused on any of them.




Usage


Usage: credmap.py --email EMAIL | --user USER | --load LIST [options]

Options:
  -h/--help             show this help message and exit
  -v/--verbose          display extra output information
  -u/--username=USER..  set the username to test with
  -p/--password=PASS..  set the password to test with
  -e/--email=EMAIL      set an email to test with
  -l/--load=LOAD_FILE   load list of credentials in format USER:PASSWORD
  -f/--format=CRED_F..  format to use when reading from file (e.g. u|e:p)
  -x/--exclude=EXCLUDE  exclude sites from testing
  -o/--only=ONLY        test only listed sites
  -s/--safe-urls        only test sites that use HTTPS.
  -i/--ignore-proxy     ignore system default HTTP proxy
  --proxy=PROXY         set proxy (e.g. "socks5://192.168.1.2:9050")
  --list                list available sites to test with
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Usage: credmap.py --email EMAIL | --user USER | --load LIST [options]

Options:
  -h/--help             show this help message and exit
  -v/--verbose          display extra output information
  -u/--username=USER..  set the username to test with
  -p/--password=PASS..  set the password to test with
  -e/--email=EMAIL      set an email to test with
  -l/--load=LOAD_FILE   load list of credentials in format USER:PASSWORD
  -f/--format=CRED_F..  format to use when reading from file (e.g. u|e:p)
  -x/--exclude=EXCLUDE  exclude sites from testing
  -o/--only=ONLY        test only listed sites
  -s/--safe-urls        only test sites that use HTTPS.
  -i/--ignore-proxy     ignore system default HTTP proxy
  --proxy=PROXY         set proxy (e.g. "socks5://192.168.1.2:9050")
  --list                list available sites to test with
Examples


./credmap.py --username janedoe --email janedoe@email.com
./credmap.py -u johndoe -e johndoe@email.com --exclude "github.com, live.com"
./credmap.py -u johndoe -p abc123 -vvv --only "linkedin.com, facebook.com"
./credmap.py -e janedoe@example.com --verbose --proxy "https://127.0.0.1:8080"
./credmap.py --load creds.txt --format "e.u.p"
./credmap.py -l creds.txt -f "u|e:p"
./credmap.py -l creds.txt
./credmap.py --list
1
2
3
4
5
6
7
8
./credmap.py --username janedoe --email janedoe@email.com
./credmap.py -u johndoe -e johndoe@email.com --exclude "github.com, live.com"
./credmap.py -u johndoe -p abc123 -vvv --only "linkedin.com, facebook.com"
./credmap.py -e janedoe@example.com --verbose --proxy "https://127.0.0.1:8080"
./credmap.py --load creds.txt --format "e.u.p"
./credmap.py -l creds.txt -f "u|e:p"
./credmap.py -l creds.txt
./credmap.py --list
You can download credmap here: