Transparency Myanmar

It's a 32bits elf binary of some version of vsftpd, where it have been added a backdoor, they don't specify is an authentication backdoor, a special command or other stuff.

I started looking for something weird on the authentication routines, but I didn't found anything significant in a brief period of time, so I decided to do a bindiff, that was the key for locating the backdoor quickly. I do a quick diff of the strings with the command "strings bin | sort -u" and "vimdiff" and noticed that the backdoored binary has the symbol "execl" which is weird because is a call for executing elfs, don't needed for a ftp service, and weird that the compiled binary doesn't has that symbol.

Looking the xrefs of "execl" on IDA I found that code that is a clear backdoor, it create a socket, bind a port and duplicate the stdin, stdout and stderr to the socket and use the execl:

There are one xrefs to this function, the function that decides when trigger that is that kind of systems equations decision:

The backdoor was not on the authentication, it was a special command to trigger the backdoor, which is obfuscated on that systems equation, it was no needed to use a z3 equation solver because is a simple one and I did it by hand.

The equation:
cmd[0] = 69
cmd[1] = 78
cmd[1] + cmd[2] = 154
cmd[2] + cmd[3] = 202
cmd[3] + cmd[4] = 241
cmd[4] + cmd[5] = 233
cmd[5] + cmd[6] = 217
cmd[6] + cmd[7] = 218
cmd[7] + cmd[8] = 228
cmd[8] + cmd[9] = 212
cmd[9] + cmd[10] = 195
cmd[10] + cmd[11] = 195
cmd[11] + cmd[12] = 201
cmd[12] + cmd[13] = 207
cmd[13] + cmd[14] = 203
cmd[14] + cmd[15] = 215
cmd[15] + cmd[16] = 235
cmd[16] + cmd[17] = 242

The solution:
cmd[0] = 69
cmd[1] = 75
cmd[2] = 79
cmd[3] = 123
cmd[4] = 118
cmd[5] = 115
cmd[6] = 102
cmd[7] = 116
cmd[8] = 112
cmd[9] = 100
cmd[10] = 95
cmd[11] = 100
cmd[12] = 101
cmd[13] = 106
cmd[14] = 97                    
cmd[15] = 118
cmd[16] = 117
cmd[17] = 125

The flag:

The binary:

Continue reading

The article will also be broken down into different subtopics and subcategories. This to make it easy for those who are just interested in skimming through the article to pick the part of WhatsApp hack they are most interested in. Just incase you don't have enough time to go through the entire article.

Search queries like these are a common place; Can WhatsApp be hacked? Can you read WhatsApp messages? How safe is the most popular trade fair in the world? This article gives you all the solution you need to hack any WhatsApp account, as well as how to protect yourself from a WhatsApp hack attack.

Although the messenger is now on an end-to-end encryption, WhatsApp is still not totally safe from espionage. WhatsApp chats and messages can still be accessed and read remotely, and old &deleted WhatsApp chats and messages retrieved.

WhatsApp Spy: Hack WhatsApp Chats and Messages

A very simple solution is to use a software that can hack WhatsApp remotely. All manufacturers offer to read the WhatsApp messages an extra web portal. In addition to the Whatsapp messages but can also spy on other messengers. So you can also have access to social media accounts.

The software may only be installed on a smartphone. If the user of the smartphone has been informed about the installation and effects.

WhatsApp Hacker: 3 Steps to Hack WhatsApp in 2020

You can hack Whatsapp using a second cell phone. No extra SIM card is necessary for this. The guide also works with a tablet. With this method, the other phone only needs to clone WhatsApp messages is internet connection.

The trick to hack Whatsapp successfully is not a software bug. It's the way WhatsApp has developed the setup wizard. Since there are no user accounts with passwords and you log in via the mobile number, here lies the vulnerability. But you can also protect yourself from the Whatsapp hack.

Hack WhatsApp Chat with the Best WhatsApp Hacking Tool

To read Whatsapp messages, the mobile phone number of the target must be known. The cell phone can remain locked. There is no need to install software to hack and read Whatsapp messages. Even with the PIN or fingerprint, the Whatsapp account can be hacked.

STEP 1: Create a New WhatsApp Account

To hack an account from Whatsapp, the app from the App Store must be installed on the second cell phone. After the installation of Whatsapp, target's phone number is entered. A confirmation request must be waited until access to the smartphone of the victim exists.

STEP 2: WhatsApp Account Confirmation

The confirmation of the Whatsapp account is the actual security risk of the messenger. Whatsapp usually confirms the registration via SMS. Occasionally the confirmation will also be sent by automated phone call via a phone call.

Calls and text messages can be read and taken by anyone even when the screen is locked. So that the WhatsApp hack does not stand out, the SMS must be removed from the start screen by swiping.

STEP 3: Enter Confirmation

The stolen verification PIN is now entered on the second smartphone. As a result, the WhatsApp account has been taken over by you. You can read the WhatsApp messages, which respond to this mobile phone number.

The downside to this trick is that the victim immediately notices the Whatsapp hack as soon as Whatsapp is opened. If the victim goes through the sign-in process again. The attacker loses access to the messages and no Whatsapp messages can be read.

How to Hack Someone's WhatsApp in 2020

A good way to hack a WhatsApp account is to hack whatsapp online. Here you can read WhatsApp messages via a browser and also write. The target user can continue to use his cell phone (works for iOS, Android phone etc) and does not notice the WhatsApp hack.

STEP 1: Access the Cell Phone

In order to be able to read WhatsApp messages by installing software. Access to the unlocked smartphone is required for a short time. In addition, cell phone, a computer or laptop is necessary. On this the Whatsapp messages will be read later.

STEP 2: Access WhatsApp Web

If you have access to the unlocked smartphone, Whatsapp must be started there. The Whatsapp settings include Whatsapp Web . If this is selected, Whatsapp opens a QR code scanner with the hint to open WhatsApp Web in the browser.

If the QR code is scanned in the browser with the smartphone. There is a permanent connection and Whatsapp messages can be read. If you want to hack Whatsapp in this way. You have full access to all incoming messages and you can even write messages yourself.

STEP 3: Read WhatsApp Messages

The target usually sees this Whatsapp hack only when the settings are invoked to Whatsapp Web in the app. Whatsapp messages can be read via the browser. Regardless of whether the smartphone is on home Wi-Fi or on the move. You can also hack group chats admin by just having any of the contact details.

WhatsApp Hack: How to Hack any WhatsApp account

Which is the most popular messaging app globally? Of course, you can use different apps from Android or iOS to send and receive messages. But Whatsapp remains everyone's favorite globally!

Whatsapp is one of the popular apps in the world. There are more than 2 billion active users on Whatsapp, messaging daily with the app. Why do people love WhatsApp? Whatsapp is very convenient and easy to use.

Other messaging apps like Facebook Messenger, still needs a special account to sign up for this app. If you change a new app, you'll need to add another account. This can be stressful, as you have to remember a lot of new passwords and usernames.


More info
  1. Hackrf Tools
  2. Hacking Tools For Windows Free Download
  3. Hacker Tools Apk
  4. Pentest Tools Website
  5. Hacking Tools And Software
  6. Pentest Tools Kali Linux
  7. Hacking Tools Free Download
  8. Nsa Hack Tools Download
  9. Pentest Tools Apk
  10. Pentest Tools For Mac
  11. Pentest Tools Bluekeep
  12. Pentest Tools Subdomain
  13. Hacking App
  14. Hacking Tools For Games
  15. Hack Rom Tools
  16. Hacking Tools For Windows
  17. Pentest Tools List
  18. Tools For Hacker
  19. Physical Pentest Tools
  20. Easy Hack Tools
  21. Hacking Tools Usb
  22. Hacker Tools Free Download
  23. Pentest Tools
  24. How To Hack
  25. Pentest Tools Bluekeep
  26. Hack Tools
  27. Hack Tool Apk No Root
  28. Hacking Tools Windows 10
  29. Pentest Tools Review
  30. Best Hacking Tools 2020
  31. Hacking Tools
  32. Hacker Tools For Ios
  33. Blackhat Hacker Tools
  34. Hacking Tools For Windows Free Download
  35. Hack Tools For Pc
  36. Hacker Techniques Tools And Incident Handling
  37. Hacks And Tools
  38. Hack Tools For Mac
  39. Hack Rom Tools
  40. What Is Hacking Tools
  41. Hacking Tools Github
  42. New Hack Tools
  43. Pentest Tools Apk
  44. New Hack Tools
  45. New Hacker Tools
  46. Hacking Tools For Beginners
  47. Hacking Tools For Mac
  48. Hacking Tools And Software
  49. Hacking Tools For Windows Free Download
  50. Pentest Tools Subdomain
  51. Hack Tools For Mac
  52. Pentest Tools Framework
  53. World No 1 Hacker Software
  54. Hacks And Tools
  55. Hacker Tools
  56. Hack Tools Online
  57. Hacker Tools Github
  58. Hacking Tools For Mac
  59. What Are Hacking Tools
  60. What Are Hacking Tools
  61. Hacker Tools Online
  62. Tools For Hacker
  63. Pentest Tools Open Source
  64. Hack Tools 2019
  65. Hack Apps
  66. Hacking Tools Mac
  67. Nsa Hacker Tools
  68. Hacking Tools 2020
  69. Pentest Tools Alternative
  70. Hacker Tools Free
  71. How To Make Hacking Tools
  72. Hacking Tools For Windows Free Download
  73. Hacker Techniques Tools And Incident Handling
  74. Hacking Tools Name
  75. Pentest Tools Bluekeep
  76. Hacker Tools For Ios
  77. Pentest Tools Download
  78. Pentest Tools Url Fuzzer
  79. Hack Tools Online
  80. Hacker Tools Github
  81. Hacking Tools Name
  82. Hacker Tools
  83. Install Pentest Tools Ubuntu
  84. Hacker Tools 2020
  85. Tools For Hacker
  86. Beginner Hacker Tools
  87. Pentest Tools
  88. Best Pentesting Tools 2018
  89. What Are Hacking Tools
  90. Hacker Tools Free Download
  91. Hacker
  92. World No 1 Hacker Software
  93. Hack Website Online Tool

Ever wanted to block someone from the network or limit their bandwidth without having the network admin privileges? Well Evil Limiter has got you covered then.

An amazing tool to help you control your network without having access to the admin panel.

Today I'm gonna show you how to use this interesting tool to take control of your network.


1. A PC or Laptop with Linux OS.
2. A Network Adapter.
3. Access to the Network you want to control.
4. sudo or root access on your Linux OS.

First of all we will download the tool from its github repository:

You can download and extract the zip file from the link above or you can clone evillimiter repository using git like this:

git clone 

Now lets install the downloaded tool on our machine

Step 1: Move inside the downloaded github repository

cd evillimiter

Step 2: To install type

sudo python3 install