sábado, 27 de janeiro de 2024

Hacking Windows 95, Part 2

In the Hacking Windows 95, part 1 blog post, we covered that through a nasty bug affecting Windows 95/98/ME, the share password can be guessed in no time. In this article, I'm going to try to use this vulnerability to achieve remote code execution (with the help of publicly available tools only).

The first thing we can do when we have read access to the Windows directory through the share, is to locate all the *.pwl files on the c:\windows directory, copy them to your machine where Cain is installed, switch to Cracker tab, pwl files, load the pwl file, add username based on the filename, and try to crack it. If you can't crack it you might still try to add a .pwl file where you already know the password in the remote windows directory. Although this is a fun post-exploitation task, but still, no remote code execution. These passwords are useless without physical access.


One might think that after having a share password and user password, it is easy to achieve remote code execution. The problem is:
  • there is no "at" command (available since Windows 95 plus!)
  • there is no admin share
  • there is no RPC
  • there is no named pipes
  • there is no remote registry
  • there is no remote service management
If you think about security best practices, disabling unnecessary services is always the first task you should do. Because Windows 95 lacks all of these services, it is pretty much secure!

During my quest for a tool to hack Windows 95, I came across some pretty cool stuff:
LanSpy

But the best of the best is Fluxay, which has been written by chinese hackers. It is the metasploit from the year 2000. A screenshot is worth more than a 1000 words. 4 screenshot > 4 thousand words :)





It is pretty hard to find the installer, but it is still out there!

But at the end, no remote code execution for me.

My idea here was that if I can find a file which executes regularly (on a scheduled basis), I can change that executable to my backdoor and I'm done. Although there is no scheduler in the default Windows 95, I gave it a try. 

Let's fire up taskman.exe to get an idea what processes are running:


Looks like we need a more powerful tool here, namely Process Explorer. Let's try to download this from oldapps.com:


LOL, IE3 hangs, can't render the page. Copying files to the Win95 VM is not that simple, because there are no shared folders in Win95 VM. And you can't use pendrives either, Win95 can't handle USB (at least the retail version). After downloading the application with a newer browser from oldapps, let's start Process Explorer on the test Windows 95.


Don't try to download the Winsocks 2 patch from the official MS site, it is not there anymore, but you can download it from other sites

Now let's look at the processes running:


After staring it for minutes, turned out it is constant, no new processes appeared.
Looking at the next screenshot, one can notice this OS was not running a lot of background processes ...


My current Win7 has 1181 threads and 84 processes running, no wonder it is slow as hell :)

We have at least the following options:
  1. You are lucky and not the plain Windows 95 is installed, but Windows 95 Plus! The main difference here is that Windows 95 Plus! has built-in scheduler, especially the "at" command. Just overwrite a file which is scheduled to execution, and wait. Mission accomplished!
  2. Ping of death - you can crash the machine (no BSOD, just crash) with long (over 65535 bytes) ICMP ping commands, and wait for someone to reboot it. Just don't forget to put your backdoor on the share and add it to autoexec.bat before crashing it. 
  3. If your target is a plain Windows 95, I believe you are out of luck. No at command, no named pipes, no admin share, nothing. Meybe you can try to fuzz port 137 138 139, and write an exploit for those. Might be even Ping of Death is exploitable?
Let's do the first option, and hack Windows 95 plus!
Look at the cool features we have by installing Win95 Plus!


Cool new boot splash screen!


But our main interest is the new, scheduled tasks!


Now we can replace diskalm.exe with our backdoor executable, and wait maximum one hour to be scheduled.

Instead of a boring text based tutorial, I created a YouTube video for you. Based on the feedbacks on my previous tutorialz, it turned out I'm way too old, and can't do interesting tutorials. That's why I analyzed the cool skiddie videoz, and found that I have to do the followings so my vidz won't suck anymore:
  • use cool black windows theme
  • put meaningless performance monitor gadgets on the sidebar
  • use a cool background, something related with hacking and skullz
  • do as many opsec fails as possible
  • instead of captions, use notepad with spelling errorz
  • there is only one rule of metal: Play it fuckin' loud!!!!
Related articles

  1. How To Make Hacking Tools
  2. Hacker Techniques Tools And Incident Handling
  3. Hacker Search Tools
  4. Pentest Tools For Windows
  5. Pentest Tools
  6. Hacking Tools Software
  7. Pentest Tools Port Scanner
  8. Pentest Tools Nmap
  9. Hack Tools For Games
  10. Android Hack Tools Github
  11. Usb Pentest Tools
  12. Pentest Tools Linux
  13. Hacking Apps
  14. Hacker Tools Apk
  15. Underground Hacker Sites
  16. Hacker Tools For Windows
  17. Hacker Tools Free Download
  18. Kik Hack Tools
  19. Hack And Tools
  20. Growth Hacker Tools
  21. Pentest Tools For Windows
  22. Pentest Tools Url Fuzzer
  23. Best Pentesting Tools 2018
  24. Hacking Apps
  25. Hacker Tool Kit
  26. Hack Tool Apk No Root
  27. Hacker Tools Github
  28. Hack Tools For Pc
  29. Hacker
  30. Hack Rom Tools
  31. Hacker Tools 2020
  32. Hacking Tools Name
  33. Hacking Tools For Beginners
  34. Hack Tools Pc
  35. Hacking Tools For Kali Linux
  36. Hacker Tools Mac
  37. Pentest Tools List
  38. Hack Tools For Mac
  39. Pentest Tools Kali Linux
  40. Pentest Tools Bluekeep
  41. Hacking Tools And Software
  42. Hacker Tools Hardware
  43. Hacker Tools Free Download
  44. Pentest Tools Free
  45. Hack Tools 2019
  46. Hacker Tools Linux
  47. Tools For Hacker
  48. Hacker Tools For Windows
  49. Pentest Tools Port Scanner
  50. Pentest Tools Online
  51. Hack Tools For Pc
  52. Pentest Tools Apk
  53. Blackhat Hacker Tools
  54. Hacking Tools Online
  55. Hacking Tools For Beginners
  56. Termux Hacking Tools 2019
  57. Hack Rom Tools
  58. Free Pentest Tools For Windows
  59. Hack Rom Tools
  60. Pentest Tools Alternative
  61. Best Pentesting Tools 2018
  62. Hack Apps
  63. Nsa Hack Tools
  64. Free Pentest Tools For Windows
  65. Hacker Tools Apk
  66. Pentest Tools For Mac
  67. Hacking Tools For Kali Linux
  68. Hack Tools Pc

The OWASP Foundation Has Selected The Technical Writer For Google Season Of Docs

The OWASP Foundation has selected the technical writer for Google Season of Docs by Fabio Cerullo


The OWASP Foundation has been accepted as the organization for the Google Seasons of Docs, a project whose goals are to give technical writers an opportunity to gain experience in contributing to open source projects and to give open-source projects an opportunity to engage the technical writing community.

During the program, technical writers spend a few months working closely with an open-source community. They bring their technical writing expertise to the project's documentation, and at the same time learn about open source and new technologies.

The open-source projects work with the technical writers to improve the project's documentation and processes. Together they may choose to build a new documentation set, or redesign the existing docs, or improve and document the open-source community's contribution procedures and onboarding experience. Together, we raise public awareness of open source docs, of technical writing, and of how we can work together to the benefit of the global open source community.

After a careful review and selection process, the OWASP Foundation has picked the primary technical writer who will work along the OWASP ZAP Team for the next 3 months to create the API documentation of this flagship project.

Congratulations to Nirojan Selvanathan!

Please refer to the linked document where you could look at the deliverables and work execution plan.



Continue reading


  1. Hacking Tools Name
  2. Hacker Tools For Windows
  3. Hacker Tools For Mac
  4. Pentest Tools Framework
  5. Hack Tools For Ubuntu
  6. Hacker Search Tools
  7. New Hacker Tools
  8. Hacking Tools Download
  9. Growth Hacker Tools
  10. Hack Tools Online
  11. Pentest Tools For Android
  12. Hacker Tools Windows
  13. Pentest Tools Find Subdomains
  14. Hack Tool Apk
  15. Wifi Hacker Tools For Windows
  16. Pentest Recon Tools
  17. Pentest Tools Free
  18. Pentest Tools Find Subdomains
  19. Hacking Tools For Windows
  20. Pentest Tools Find Subdomains
  21. Physical Pentest Tools
  22. Game Hacking
  23. Hacking Tools Github
  24. Hack And Tools
  25. Github Hacking Tools
  26. Hack Tool Apk No Root
  27. Hack Tools
  28. Hack Tools
  29. Pentest Tools Tcp Port Scanner
  30. Usb Pentest Tools
  31. Pentest Tools Bluekeep
  32. Pentest Box Tools Download
  33. Github Hacking Tools
  34. Hacking Tools For Beginners
  35. Github Hacking Tools
  36. Pentest Tools For Mac
  37. Hacker
  38. Hacking Tools For Beginners
  39. Hacking Tools For Windows 7
  40. Hak5 Tools
  41. Tools For Hacker
  42. Top Pentest Tools
  43. Hack And Tools
  44. Pentest Tools Port Scanner
  45. Hacks And Tools
  46. Hacking Tools Software
  47. Hack Tools Download
  48. Hacker Tools Apk
  49. Hacker Tools 2020
  50. Hacking Tools For Games
  51. Hacking Tools For Kali Linux
  52. Hack Tool Apk
  53. Hack Tools For Games
  54. Hacking Tools Windows 10
  55. Beginner Hacker Tools
  56. Pentest Tools For Mac
  57. Pentest Tools Apk
  58. Game Hacking
  59. Hacker Search Tools
  60. Nsa Hacker Tools
  61. Hacking App
  62. Pentest Recon Tools
  63. Hack Tools 2019
  64. Hacker
  65. Hacking Tools And Software
  66. What Are Hacking Tools
  67. Hak5 Tools
  68. Wifi Hacker Tools For Windows
  69. Hacking Tools
  70. Hacker Tools 2019
  71. Hack Tools Download
  72. Hacker Tools For Ios
  73. Pentest Tools Online
  74. Black Hat Hacker Tools
  75. Pentest Box Tools Download
  76. Hacker Tools 2020
  77. Nsa Hacker Tools
  78. Hacker Tools 2020
  79. Pentest Tools Download
  80. Free Pentest Tools For Windows
  81. Nsa Hack Tools Download
  82. Beginner Hacker Tools
  83. Hack Tools For Games
  84. Pentest Tools Github
  85. Hacker Tools Apk Download
  86. Computer Hacker
  87. Hack Tools
  88. Physical Pentest Tools
  89. Hacker Tools
  90. Game Hacking
  91. Ethical Hacker Tools
  92. Nsa Hack Tools
  93. New Hack Tools
  94. Hacking Tools Name
  95. Hacker Tools
  96. Hacker Tool Kit
  97. Hacker Tools Windows
  98. Pentest Tools Bluekeep
  99. Pentest Recon Tools
  100. Hack Apps
  101. Pentest Tools Open Source
  102. New Hack Tools
  103. World No 1 Hacker Software
  104. Pentest Tools Apk
  105. Pentest Tools Android
  106. World No 1 Hacker Software
  107. Pentest Tools Website Vulnerability
  108. Hack Tools
  109. How To Hack
  110. Hack Tools Download
  111. What Is Hacking Tools
  112. Hacker Tools Mac
  113. Hack Tools For Games
  114. Pentest Tools Apk
  115. Hacking Tools For Windows 7
  116. Hacking Tools For Kali Linux
  117. Hack Tools Github
  118. Pentest Tools Free
  119. Pentest Tools Windows
  120. Pentest Tools Open Source
  121. What Are Hacking Tools
  122. Hacker Tools 2020
  123. Hacker Tools
  124. Hacking Tools For Games
  125. Tools Used For Hacking
  126. Best Hacking Tools 2019
  127. Hacker Tools Mac
  128. Pentest Tools Port Scanner
  129. Hacker Search Tools
  130. Pentest Tools Subdomain
  131. Hacking Tools Hardware
  132. Hack Tools Download
  133. Hack Tools
  134. Beginner Hacker Tools
  135. Pentest Tools For Ubuntu
  136. Beginner Hacker Tools

Pointers Part 1: The Basics



So you're eager to learn about pointers but unfortunately you got stuck because they seemed to you terrible in nature? That's not true I know, but many of the people get confused when they arrive at the topic of pointers. Well pointers are the most important tools in C programming and are the one that can make you fly (unless you don't know how to ride over them). In this article we're going to learn basics of pointers.
Pointers are the varaibles that store addresses of other variables. Easy ain't it?
So lets start with the decleration of a pointer, pointer is decreleared as:
data_type *var_name;
e,g
int *pt;
well the astrisk(*) before the variable name is the thing that makes variable a pointer. So far so good now what?
Now lets say we want to store address of a variable in our pointer variable that seems pretty complex..!
Let's do it:
int number = 100;
int *pt = #
Is it really complex..?
what we are doing here is that we are first declaring and initializing a integer variable (number) with value of 100 and then we declare and initialize a pointer variable (pt) with the address of number variable. Now pt (pointer variable) contains the address of number (integer varaible). So what? Now we can use this pointer variable to change the value of number variable. Is this some kind of Magic? Maybe. Lets' do it:
*pt = 200;
what we have done here is that we De-referencing the pt variable with the asterisk (*) and then assigned it the value of 200 now the number variable contains 200. Isn't it a magic? De-referencing is used for accessing the value of the variable towards which our pointer is pointing simple. So lets write a full program of what we have learned so far.
/*Pointer Basics: Creating and Using Pointers*/
#include<stdio.h>
int main(void){
  int number = 100;
  int *pt = &number;
  printf("Value of 'number' is: %d", number);
  printf("Address of 'number' is: %p", pt);
  *pt = 200;
  printf("New value of 'number' is: %d", number);
  return 0;
}
What this whole program did was it created a integer variable and a pointer to integer variable and then printed out the value and address of the 'number' variable and after that we De-referenced the pointer variable so that we can access the value to which our pointer variable is pointing and changed the old 100 value with new 200 value and at last we printed that out. Easy isn't it?
But do you know that you can get the address of a variable even by using ampersand (&) operator? Lemme show you how. I'll declare and initialize a variable 'var' and then print it to screen using ampersand (&) operator:
int var = 10;
printf("Address of 'var' is %p\n", &var);
the last statement here will print out the address of 'var' not value so that means it is equal to this statement:
int *pt = &var;
printf("Address of 'var' is %p\n", pt);
here we first assigned the address of 'var' to pointer variable 'pt' and then printed out the address of 'var' using the pointer variable (pt).
So lets write another program that will wrap up this part of 'Pointer Basics':
/*Pointer Basics Part 1: Program 2*/
#include<stdio.h>
int main(void){
   int var = 10;
   int *pt = &var;
   printf("The Value of 'var' is: %d\n", var);
   printf("De-referencing: *pt = %d\n", *pt);
   printf("Ampersand: The Address of 'var' is %p\n",  &var);
   printf("pt = %p\n", pt);
   return 0;
}
So that's the end of first part watch out for the next part in which we'll tighten our grip on pointers and get ready for some Advanced '*po(inter)-fo'.
Read more
  1. Install Pentest Tools Ubuntu
  2. Pentest Tools Framework
  3. Hacking Tools For Pc
  4. How To Hack
  5. Best Hacking Tools 2019
  6. Hack App
  7. Game Hacking
  8. Hacker Tools List
  9. Pentest Tools Alternative
  10. Hacking Tools For Windows
  11. Hacker Tools Apk
  12. Computer Hacker
  13. Tools 4 Hack
  14. Hack Tools For Mac
  15. Hack App
  16. Pentest Tools Download
  17. Wifi Hacker Tools For Windows
  18. Hack Tools For Games
  19. Nsa Hacker Tools
  20. Hacking Tools For Games
  21. New Hack Tools
  22. Hacker Tools 2020
  23. Tools For Hacker
  24. Hacking Tools Windows 10
  25. Github Hacking Tools
  26. Pentest Tools Alternative
  27. Hacker Tools For Pc
  28. Bluetooth Hacking Tools Kali
  29. Hacking Tools Usb
  30. Hacker Tool Kit
  31. Hacker Tools Free
  32. Hacking Tools 2019
  33. New Hack Tools
  34. Hack And Tools
  35. Hacking Tools Kit
  36. Hacking Tools For Games
  37. Best Hacking Tools 2019
  38. Best Hacking Tools 2019
  39. New Hacker Tools
  40. Pentest Tools Download
  41. Tools For Hacker
  42. Hacker Tools Linux
  43. Blackhat Hacker Tools
  44. Pentest Tools Github
  45. Hack Tools Pc
  46. Pentest Reporting Tools
  47. Hacker Tools Apk Download
  48. Physical Pentest Tools
  49. Pentest Recon Tools
  50. Pentest Reporting Tools
  51. Ethical Hacker Tools
  52. Hacker Tools Free Download
  53. Hacker Tools Free
  54. Install Pentest Tools Ubuntu
  55. Hack Tool Apk No Root
  56. Pentest Tools Find Subdomains
  57. Nsa Hacker Tools
  58. Wifi Hacker Tools For Windows
  59. Pentest Tools Android
  60. New Hack Tools
  61. Best Hacking Tools 2020
  62. Hack Rom Tools
  63. Hack Website Online Tool
  64. Hacker Tools Windows
  65. Hack Tools For Ubuntu
  66. Nsa Hack Tools Download
  67. Hacker Tools Mac
  68. Hacker Tools Apk
  69. Hacker Tools For Pc
  70. Hackrf Tools
  71. Pentest Tools Windows
  72. Usb Pentest Tools
  73. Ethical Hacker Tools
  74. Hacker Tools Software
  75. Hacker Tools Mac
  76. Pentest Tools Review
  77. Pentest Tools Alternative
  78. Hacker Tools Mac
  79. Hack Tools
  80. How To Make Hacking Tools
  81. Growth Hacker Tools
  82. Hacking Tools Windows
  83. Computer Hacker
  84. Hack Tools
  85. Blackhat Hacker Tools
  86. Hacking Tools Usb
  87. Hack Tools Github
  88. Hacking Tools Software
  89. Usb Pentest Tools
  90. Hacker Tools 2019
  91. Usb Pentest Tools
  92. Hacking Tools Windows
  93. Hacking Tools 2019
  94. Hacking Tools Hardware
  95. Pentest Recon Tools
  96. New Hacker Tools
  97. Hacking Tools For Windows
  98. Hacker Techniques Tools And Incident Handling
  99. Hacking App
  100. Hacking Tools Name
  101. Hack Tools Mac
  102. Hacker Tools Windows
  103. Pentest Recon Tools
  104. Hack And Tools
  105. Pentest Tools Online
  106. Hacks And Tools
  107. Physical Pentest Tools
  108. Hacking Tools Download
  109. What Is Hacking Tools
  110. Black Hat Hacker Tools
  111. Hack Tools Github
  112. Hacker Tool Kit
  113. Pentest Reporting Tools
  114. Bluetooth Hacking Tools Kali
  115. Hacker Tools For Ios
  116. Hacker Tools Windows
  117. Kik Hack Tools
  118. Hacking Tools Usb
  119. Pentest Tools Nmap
  120. Pentest Tools
  121. Hack Tools For Ubuntu
  122. Hacking Tools Online
  123. Ethical Hacker Tools
  124. Beginner Hacker Tools
  125. Hacker Tools For Pc
  126. Hacker Tools For Mac
  127. Hacking Tools Windows
  128. Pentest Tools Tcp Port Scanner
  129. Hacker Hardware Tools
  130. Hacker Search Tools
  131. Hacker Tools 2019