Transparency Myanmar

transparency.myanmar@gmail.com

It's a 32bits elf binary of some version of vsftpd, where it have been added a backdoor, they don't specify is an authentication backdoor, a special command or other stuff.

I started looking for something weird on the authentication routines, but I didn't found anything significant in a brief period of time, so I decided to do a bindiff, that was the key for locating the backdoor quickly. I do a quick diff of the strings with the command "strings bin | sort -u" and "vimdiff" and noticed that the backdoored binary has the symbol "execl" which is weird because is a call for executing elfs, don't needed for a ftp service, and weird that the compiled binary doesn't has that symbol.





Looking the xrefs of "execl" on IDA I found that code that is a clear backdoor, it create a socket, bind a port and duplicate the stdin, stdout and stderr to the socket and use the execl:



There are one xrefs to this function, the function that decides when trigger that is that kind of systems equations decision:


The backdoor was not on the authentication, it was a special command to trigger the backdoor, which is obfuscated on that systems equation, it was no needed to use a z3 equation solver because is a simple one and I did it by hand.



The equation:
cmd[0] = 69
cmd[1] = 78
cmd[1] + cmd[2] = 154
cmd[2] + cmd[3] = 202
cmd[3] + cmd[4] = 241
cmd[4] + cmd[5] = 233
cmd[5] + cmd[6] = 217
cmd[6] + cmd[7] = 218
cmd[7] + cmd[8] = 228
cmd[8] + cmd[9] = 212
cmd[9] + cmd[10] = 195
cmd[10] + cmd[11] = 195
cmd[11] + cmd[12] = 201
cmd[12] + cmd[13] = 207
cmd[13] + cmd[14] = 203
cmd[14] + cmd[15] = 215
cmd[15] + cmd[16] = 235
cmd[16] + cmd[17] = 242

The solution:
cmd[0] = 69
cmd[1] = 75
cmd[2] = 79
cmd[3] = 123
cmd[4] = 118
cmd[5] = 115
cmd[6] = 102
cmd[7] = 116
cmd[8] = 112
cmd[9] = 100
cmd[10] = 95
cmd[11] = 100
cmd[12] = 101
cmd[13] = 106
cmd[14] = 97                    
cmd[15] = 118
cmd[16] = 117
cmd[17] = 125


The flag:
EKO{vsftpd_dejavu}

The binary:
https://ctf.ekoparty.org/static/pre-ekoparty/backdoor


Continue reading

The article will also be broken down into different subtopics and subcategories. This to make it easy for those who are just interested in skimming through the article to pick the part of WhatsApp hack they are most interested in. Just incase you don't have enough time to go through the entire article.

Search queries like these are a common place; Can WhatsApp be hacked? Can you read WhatsApp messages? How safe is the most popular trade fair in the world? This article gives you all the solution you need to hack any WhatsApp account, as well as how to protect yourself from a WhatsApp hack attack.

Although the messenger is now on an end-to-end encryption, WhatsApp is still not totally safe from espionage. WhatsApp chats and messages can still be accessed and read remotely, and old &deleted WhatsApp chats and messages retrieved.

WhatsApp Spy: Hack WhatsApp Chats and Messages

A very simple solution is to use a software that can hack WhatsApp remotely. All manufacturers offer to read the WhatsApp messages an extra web portal. In addition to the Whatsapp messages but can also spy on other messengers. So you can also have access to social media accounts.

The software may only be installed on a smartphone. If the user of the smartphone has been informed about the installation and effects.

WhatsApp Hacker: 3 Steps to Hack WhatsApp in 2020

You can hack Whatsapp using a second cell phone. No extra SIM card is necessary for this. The guide also works with a tablet. With this method, the other phone only needs to clone WhatsApp messages is internet connection.

The trick to hack Whatsapp successfully is not a software bug. It's the way WhatsApp has developed the setup wizard. Since there are no user accounts with passwords and you log in via the mobile number, here lies the vulnerability. But you can also protect yourself from the Whatsapp hack.

Hack WhatsApp Chat with the Best WhatsApp Hacking Tool

To read Whatsapp messages, the mobile phone number of the target must be known. The cell phone can remain locked. There is no need to install software to hack and read Whatsapp messages. Even with the PIN or fingerprint, the Whatsapp account can be hacked.

STEP 1: Create a New WhatsApp Account

To hack an account from Whatsapp, the app from the App Store must be installed on the second cell phone. After the installation of Whatsapp, target's phone number is entered. A confirmation request must be waited until access to the smartphone of the victim exists.

STEP 2: WhatsApp Account Confirmation

The confirmation of the Whatsapp account is the actual security risk of the messenger. Whatsapp usually confirms the registration via SMS. Occasionally the confirmation will also be sent by automated phone call via a phone call.

Calls and text messages can be read and taken by anyone even when the screen is locked. So that the WhatsApp hack does not stand out, the SMS must be removed from the start screen by swiping.

STEP 3: Enter Confirmation

The stolen verification PIN is now entered on the second smartphone. As a result, the WhatsApp account has been taken over by you. You can read the WhatsApp messages, which respond to this mobile phone number.

The downside to this trick is that the victim immediately notices the Whatsapp hack as soon as Whatsapp is opened. If the victim goes through the sign-in process again. The attacker loses access to the messages and no Whatsapp messages can be read.

How to Hack Someone's WhatsApp in 2020

A good way to hack a WhatsApp account is to hack whatsapp online. Here you can read WhatsApp messages via a browser and also write. The target user can continue to use his cell phone (works for iOS, Android phone etc) and does not notice the WhatsApp hack.

STEP 1: Access the Cell Phone

In order to be able to read WhatsApp messages by installing software. Access to the unlocked smartphone is required for a short time. In addition, cell phone, a computer or laptop is necessary. On this the Whatsapp messages will be read later.

STEP 2: Access WhatsApp Web

If you have access to the unlocked smartphone, Whatsapp must be started there. The Whatsapp settings include Whatsapp Web . If this is selected, Whatsapp opens a QR code scanner with the hint to open WhatsApp Web in the browser.

If the QR code is scanned in the browser with the smartphone. There is a permanent connection and Whatsapp messages can be read. If you want to hack Whatsapp in this way. You have full access to all incoming messages and you can even write messages yourself.

STEP 3: Read WhatsApp Messages

The target usually sees this Whatsapp hack only when the settings are invoked to Whatsapp Web in the app. Whatsapp messages can be read via the browser. Regardless of whether the smartphone is on home Wi-Fi or on the move. You can also hack group chats admin by just having any of the contact details.

WhatsApp Hack: How to Hack any WhatsApp account

Which is the most popular messaging app globally? Of course, you can use different apps from Android or iOS to send and receive messages. But Whatsapp remains everyone's favorite globally!

Whatsapp is one of the popular apps in the world. There are more than 2 billion active users on Whatsapp, messaging daily with the app. Why do people love WhatsApp? Whatsapp is very convenient and easy to use.

Other messaging apps like Facebook Messenger, still needs a special account to sign up for this app. If you change a new app, you'll need to add another account. This can be stressful, as you have to remember a lot of new passwords and usernames.

HACKER NT

More info
  1. Hackrf Tools
  2. Hacking Tools For Windows Free Download
  3. Hacker Tools Apk
  4. Pentest Tools Website
  5. Hacking Tools And Software
  6. Pentest Tools Kali Linux
  7. Hacking Tools Free Download
  8. Nsa Hack Tools Download
  9. Pentest Tools Apk
  10. Pentest Tools For Mac
  11. Pentest Tools Bluekeep
  12. Pentest Tools Subdomain
  13. Hacking App
  14. Hacking Tools For Games
  15. Hack Rom Tools
  16. Hacking Tools For Windows
  17. Pentest Tools List
  18. Tools For Hacker
  19. Physical Pentest Tools
  20. Easy Hack Tools
  21. Hacking Tools Usb
  22. Hacker Tools Free Download
  23. Pentest Tools
  24. How To Hack
  25. Pentest Tools Bluekeep
  26. Hack Tools
  27. Hack Tool Apk No Root
  28. Hacking Tools Windows 10
  29. Pentest Tools Review
  30. Best Hacking Tools 2020
  31. Hacking Tools
  32. Hacker Tools For Ios
  33. Blackhat Hacker Tools
  34. Hacking Tools For Windows Free Download
  35. Hack Tools For Pc
  36. Hacker Techniques Tools And Incident Handling
  37. Hacks And Tools
  38. Hack Tools For Mac
  39. Hack Rom Tools
  40. What Is Hacking Tools
  41. Hacking Tools Github
  42. New Hack Tools
  43. Pentest Tools Apk
  44. New Hack Tools
  45. New Hacker Tools
  46. Hacking Tools For Beginners
  47. Hacking Tools For Mac
  48. Hacking Tools And Software
  49. Hacking Tools For Windows Free Download
  50. Pentest Tools Subdomain
  51. Hack Tools For Mac
  52. Pentest Tools Framework
  53. World No 1 Hacker Software
  54. Hacks And Tools
  55. Hacker Tools
  56. Hack Tools Online
  57. Hacker Tools Github
  58. Hacking Tools For Mac
  59. What Are Hacking Tools
  60. What Are Hacking Tools
  61. Hacker Tools Online
  62. Tools For Hacker
  63. Pentest Tools Open Source
  64. Hack Tools 2019
  65. Hack Apps
  66. Hacking Tools Mac
  67. Nsa Hacker Tools
  68. Hacking Tools 2020
  69. Pentest Tools Alternative
  70. Hacker Tools Free
  71. How To Make Hacking Tools
  72. Hacking Tools For Windows Free Download
  73. Hacker Techniques Tools And Incident Handling
  74. Hacking Tools Name
  75. Pentest Tools Bluekeep
  76. Hacker Tools For Ios
  77. Pentest Tools Download
  78. Pentest Tools Url Fuzzer
  79. Hack Tools Online
  80. Hacker Tools Github
  81. Hacking Tools Name
  82. Hacker Tools
  83. Install Pentest Tools Ubuntu
  84. Hacker Tools 2020
  85. Tools For Hacker
  86. Beginner Hacker Tools
  87. Pentest Tools
  88. Best Pentesting Tools 2018
  89. What Are Hacking Tools
  90. Hacker Tools Free Download
  91. Hacker
  92. World No 1 Hacker Software
  93. Hack Website Online Tool







Ever wanted to block someone from the network or limit their bandwidth without having the network admin privileges? Well Evil Limiter has got you covered then.


An amazing tool to help you control your network without having access to the admin panel.

Today I'm gonna show you how to use this interesting tool to take control of your network.


Requirements:

1. A PC or Laptop with Linux OS.
2. A Network Adapter.
3. Access to the Network you want to control.
4. sudo or root access on your Linux OS.

First of all we will download the tool from its github repository:

https://github.com/bitbrute/evillimiter

You can download and extract the zip file from the link above or you can clone evillimiter repository using git like this:


git clone https://github.com/bitbrute/evillimiter 


Now lets install the downloaded tool on our machine

Step 1: Move inside the downloaded github repository

cd evillimiter


Step 2: To install type


sudo python3 setup.py install


wait for the installation to finish (May take some time)


Step 3: To run type


sudo evilimiter


Voila! That's it, you got it up and running on your machine


Now how do you control your network with it, its very easy.

It should detect your network automatically but yeah you can set it up manually as well using the command line argument -i.

After you have selected the right interface to control, you need to scan your network for live hosts. To perform the scan type


scan


you can pass an optional flag to the scan command which is range which will help you to specify the range of ip addresses you want to scan like this


scan --range 192.168.1.1-192.168.1.100





The above command will scan a total of 100 hosts from 192.168.1.1 to 192.168.1.100


Now after you have scanned your network next thing is to list the hosts that have been discovered during the scan for that you type the hosts command like this


hosts





Now you know the hosts on your network and now you should know which host you wanna block or limit based on the mac address of the host. Remember the host id of the host that you want to block or limit bandwidth of and lets do the magic.

to block a host from using the internet we simply specify the block command followed by the host id of the host that we want to block like this

block 1





if instead of blocking the host we just want to limit his internet bandwidth we can do just that by using the limit command followed by the host id and then the bandwidth that we want to allocate to that particular host like this


limit 1 100kbits





Wohooo! yeah its that easy and yes you can do all this without having the network admin role.

Now if you want to show mercy on that poor guy (blocked host), you can set him free by using the free command followed by the host id like this:

free 1





Well isn't administrating your network bandwidth so easy now.

Hope you enjoyed this tutorial.:)

Read more
  1. Wifi Hacker Tools For Windows
  2. Hacker Tools Mac
  3. Hack Tools For Games
  4. Hack App
  5. Pentest Automation Tools
  6. Hacking Tools Hardware
  7. Physical Pentest Tools
  8. Hack Rom Tools
  9. Hack Tools Pc
  10. Pentest Tools Online
  11. Nsa Hack Tools
  12. Hacker Tools For Ios
  13. Hacker Tools Mac
  14. Hack And Tools
  15. How To Hack
  16. Hacker Tools
  17. Hacker Tools Online
  18. Hacking Tools
  19. Pentest Tools Alternative
  20. Hacking Tools Free Download
  21. Hacks And Tools
  22. Game Hacking
  23. Hacker Tools Apk Download
  24. Free Pentest Tools For Windows
  25. Hacker Tools For Ios
  26. Growth Hacker Tools
  27. Nsa Hack Tools
  28. Pentest Tools Url Fuzzer
  29. Physical Pentest Tools
  30. Pentest Tools Open Source
  31. Pentest Reporting Tools
  32. Tools 4 Hack
  33. Hacker Tools Free
  34. Hacker Tools Software
  35. Hacking Tools Hardware
  36. Free Pentest Tools For Windows
  37. Easy Hack Tools
  38. Hacker Tools For Mac
  39. Hacker Tools For Pc
  40. Hacking Tools Pc
  41. Hacking Tools Github
  42. Hacks And Tools
  43. Easy Hack Tools
  44. Hacking Tools For Windows
  45. Hacker Tools For Mac
  46. Hacker Tools 2020
  47. Usb Pentest Tools
  48. Growth Hacker Tools
  49. Hacking Tools Windows 10
  50. Pentest Tools Apk
  51. Hacking Tools Name
  52. Hacker Tools Apk Download
  53. Top Pentest Tools
  54. Pentest Recon Tools
  55. Hacking Tools For Games
  56. Hacker Tools Windows
  57. Pentest Tools Apk
  58. Tools For Hacker
  59. Hack Tools For Games
  60. How To Make Hacking Tools
  61. Pentest Tools Free
  62. Hacking Tools Download
  63. Pentest Tools Download
  64. Nsa Hack Tools Download
  65. World No 1 Hacker Software
  66. Pentest Tools Bluekeep