User Controls

  1. 1
  2. 2
  3. 3
  4. ...
  5. 1319
  6. 1320
  7. 1321
  8. 1322
  9. 1323
  10. 1324
  11. ...
  12. 1426
  13. 1427
  14. 1428
  15. 1429

Posts by Sophie

  1. Sophie Pedophile Tech Support
    Too old for you bud.

    And a guy probably but that's besides the point. I was just wondering.
  2. Sophie Pedophile Tech Support
    As a side note i got blocked by @MalwareMustDie on twitter a couple days ago. Which is unfortunate because they're really good reverse engineer's and malware analysts but i'd like to see the silver lining and say, if they are blocking me that must mean my malware dev is improving lol.
  3. Sophie Pedophile Tech Support
    Turning it into a class actually sounds like a closer solution than making a monstrosity of a function. Im not sure what the method would be to import it as a module. I am sure you would have to do some fiddling like naming the functions and such but it might be less work than turning the whole thing into a class.

    The fun in comp sci is doing things that werent done. Like combining two programs that werent designed to be integrated into eachother. Thats how we get better software. And learn what works and what doesnt.

    True, but i'd like some advice before i get started. Also @Hewfil, that github ius MY github and yes it has the improved version of Gcat, simply download the master file as .zip.
  4. Sophie Pedophile Tech Support
    Already have GCat bud. What're these about? I'd say hit me up in a Pm but LanLan is being a lazy bastard.

    Not the improved Gcat you don't, but anyway, this program is about interacting with your local network. Say you have 5 computers on it, you run PyCat to scan for the ones that are up and then target them to execute commands remotely in example. It's like Netcat but better look up Netcat.
  5. Sophie Pedophile Tech Support
    Gonna give you my noobish perspective so plz dont laff @ me ok guise?

    Could you pretty much just write the scanner in as a function? Alternatively could you import the scanner as a module?

    Don't worry, i'm not uber 1337 either. But can i have functions within functions? If anything i'd have to make it into a class and have the functions within execute as methods. Also, yeah i could import it as a module but what do i do then to call on the modules functionality? Just name the functions in succession? These two programs weren't designed to be integrated into each other but i still want to do it.
  6. Sophie Pedophile Tech Support
    Is this the program you gave me, and a new one you made or something?

    No silly, this is something else entirely. For gcat please see my github. https://github.com/NullArray/gcat
  7. Sophie Pedophile Tech Support
    Alright so i have two scripts that i'd like to combine. First off we have my python replacement tool for Netcat called PyCat. Now this is useful for interacting with hosts on the local network. Here's muh code.


    # PyCat is a python replacement for Netcat

    import sys
    import socket
    import getopt
    import threading
    import subprocess


    # Define global variables
    listen = False
    command = False
    upload = False
    execute = ""
    target = ""
    upload_destination = ""
    port = 0


    # Usage/Help function
    def usage():
    # ASCII Logo
    print '8888888b. .d8888b. 888 '
    print '888 Y88b d88P Y88b 888_ '
    print '888 888 888 888 888 '
    print '888 d88P888 888888 8888b. 888888 '
    print '8888888P" 888 888888 "88b8 88 '
    print '888 888 888888 888. d888888 888 '
    print '888 Y88b 888Y88b d88P 888 888 Y88b. '
    print '888 "Y88888 "Y8888P" "Y888888 "Y888 '
    print ' 888 '
    print ' Y8b d88P '
    print ' "Y88P" '
    # ASCII Logo

    # Help text
    print
    print
    print "PyCat Net Tool"
    print
    print "Usage: PyCat.py -t target_host -p port"
    print
    print "-l --listen"
    print "listen on [host]:[port] for incoming connections"
    print
    print "-c --command"
    print "Initialize a command shell"
    print
    print "-e --execute=file_to_run"
    print "Execute file upon connection"
    print
    print "-u --upload=destination"
    print "Upon connection upload file and write to [destination]"
    print
    print "Examples: "
    print "PyCat.py -t 192.168.0.1 -p 5555 -l -c"
    print "PyCat.py -t 192.168.0.1 -p 5555 -l -u=c:\\target.exe"
    print "Pycat.py -t 192.168.0.1 -p 5555 -l -e=\"cat /etc/passwd\""
    print "echo 'ABCDEFGHI' | ./PyCat.py -t 192.168.11.12 -p 135"
    sys.exit(0)


    def client_sender(buffer):

    client = socket.socket(socket.AF_INET, socket.SOCK_STREAM)

    try:
    # Connect to target host
    client.connect((target,port))
    # Check for input from stdin, if input is present send to remote target
    if len(buffer):
    client.send(buffer)

    # Recieve data back until there is no more data to recieve
    while True:

    # Wait for data response
    recv_len = 1
    response = ""

    while recv_len:

    data = client.recv(4096)
    recv_len = len(data)
    response+= data

    if recv_len < 4096:
    break

    print response,

    # Wait for more input
    buffer = raw_input("")
    buffer += "\n"

    # Send it off (Loop)
    client.send(buffer)

    except:
    print "
    [*] Exception! Exiting."

    # Close connection
    client.close()


    # Primary server loop and stub function to handle command execution and command shell
    def server_loop():
    global target

    # If no target is specified, we listen on all interfaces
    if not len(target):
    target = "0.0.0.0"

    server = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    server.bind((target,port))

    server.listen(5)

    while True:
    client_socket, addr = server.accept()

    # Spin off a thread to handle new client
    client_thread = threading.Thread(target=client_handler, args=(client_socket,))
    client_thread.start()


    def run_command(command):
    # Trim the new line
    command = command.rstrip()

    # Run command and retrieve output
    try:
    output = subprocess.check_output(command,stderr=subprocess.STDOUT, shell=True)
    except:
    output = "Failed to execute command. \r\n"

    # Send output back to the client
    return output


    def client_handler(client_socket):
    global upload
    global execute
    global command

    # Check for upload
    if len(upload_destination):
    # Read in all of the bytes and write to out destination
    file_buffer = ""
    # Keep reading data until none is available
    while True:
    data = client_socket.recv(1024)

    if not data:
    break
    else:
    file_buffer += data
    # Now we take these bytes and try to write them out
    try:
    file_descriptor = open(upload_destination,"wb")
    file_descriptor.write(file_buffer)
    file_descriptor.close()

    # Acknowledge that we wrote the file out
    client_socket.send("Succesfully saved file to %s\r\n" % upload_destination)
    except:
    client_socket.send("Failed to save file to %s\r\n" % upload_destination)

    if len(execute):
    # Run the command
    output = run_command(execute)

    client_socket.send(output)

    # Start another loop if command shell was requested
    if command:

    while True:
    # Show prompt
    client_socket.send("<BHP:#> ")

    # Now we recieve until we see a linefeed (enter key)
    cmd_buffer = ""
    while "\n" not in cmd_buffer:
    cmd_buffer += client_socket.recv(1024)

    # Send back the command output
    response = run_command(cmd_buffer)

    # Send the response back
    client_socket.send(response)


    # Main funtion
    def main():
    global listen
    global port
    global execute
    global command
    global upload_destination
    global target

    # Check if proper arguments are passed
    if not len(sys.argv[1:]):
    usage()

    # Read commandline options
    try:
    opts, args = getopt.getopt(sys.argv[1:],"hle:t:p:cu",["help","listen","execute","target","port","command","upload"])
    except getopt.GetoptError as err:
    print str(err)
    usage()

    for o,a in opts:
    if o in ("-h","--help"):
    usage()
    elif o in ("-1", "--listen"):
    listen = True
    elif o in ("-e", "--execute"):
    execute = a
    elif o in ("-c", "--commandshell"):
    command = True
    elif o in ("-u", "--upload"):
    upload_destination = a
    elif o in ("-p", "--port"):
    port = int(a)
    else:
    assert False,"Unhandled Option"


    # Are we going to listen or just send data from stdin?
    if not listen and len(target) and port > 0:

    # Read in the buffer from the commandline, this will block, so send CTRL-D if not sending input to stdin
    buffer = sys.stdin.read()

    # Send data off
    client_sender(buffer)

    # We are going to listen and potentially upload things, execute commands and drop a shell back -
    # depending on the above commandline options
    if listen:
    server_loop

    main()


    Now i have another program that scans the local network for hosts that are up and i'd like to combine the two, so you scan for hosts that are up and then when you have an idea of which one's are up you can have the rest of PyCat functionality to interact with these hosts so you can execute remote commands and such. Here's the code for my network scanner.


    import socket
    import os
    import struct
    import threading

    from netaddr import IPNetwork,IPAddress
    from ctypes import *

    # Host to listen on
    host = "192.168.0.187"

    # Subnet to target
    subnet = "192.168.0.0/24"

    # Message we'll check ICMP responses for
    magic_message = "FIREBALL!"

    def udp_sender(subnet,magic_message):
    sender = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)

    for ip in IPNetwork(subnet):
    try:
    sender.sendto(magic_message,("%s" % ip,65212))
    except:
    pass


    class IP(Structure):

    _fields_ = [
    ("ihl", c_ubyte, 4),
    ("version", c_ubyte, 4),
    ("tos", c_ubyte),
    ("len", c_ushort),
    ("id", c_ushort),
    ("offset", c_ushort),
    ("ttl", c_ubyte),
    ("protocol_num", c_ubyte),
    ("sum", c_ushort),
    ("src", c_ulong),
    ("dst", c_ulong)
    ]

    def __new__(self, socket_buffer=None):
    return self.from_buffer_copy(socket_buffer)

    def __init__(self, socket_buffer=None):

    # map protocol constants to their names
    self.protocol_map = {1:"ICMP", 6:"TCP", 17:"UDP"}

    # human readable IP addresses
    self.src_address = socket.inet_ntoa(struct.pack("<L",self.src))
    self.dst_address = socket.inet_ntoa(struct.pack("<L",self.dst))

    # human readable protocol
    try:
    self.protocol = self.protocol_map[self.protocol_num]
    except:
    self.protocol = str(self.protocol_num)



    class ICMP(Structure):

    _fields_ = [
    ("type", c_ubyte),
    ("code", c_ubyte),
    ("checksum", c_ushort),
    ("unused", c_ushort),
    ("next_hop_mtu", c_ushort)
    ]

    def __new__(self, socket_buffer):
    return self.from_buffer_copy(socket_buffer)

    def __init__(self, socket_buffer):
    pass

    # Create a raw socket and bind it to the public interface
    if os.name == "nt":
    socket_protocol = socket.IPPROTO_IP
    else:
    socket_protocol = socket.IPPROTO_ICMP

    sniffer = socket.socket(socket.AF_INET, socket.SOCK_RAW, socket_protocol)

    sniffer.bind((host, 0))

    # We want the IP headers included in the capture
    sniffer.setsockopt(socket.IPPROTO_IP, socket.IP_HDRINCL, 1)

    # If we're on Windows we need to send some ioctls
    # to setup promiscuous mode
    if os.name == "nt":
    sniffer.ioctl(socket.SIO_RCVALL, socket.RCVALL_ON)


    # Start sending packets
    t = threading.Thread(target=udp_sender,args=(subnet,magic_message))
    t.start()

    try:
    while True:

    # Read in a single packet
    raw_buffer = sniffer.recvfrom(65565)[0]

    # Create an IP header from the first 20 bytes of the buffer
    ip_header = IP(raw_buffer[0:20])

    #print "Protocol: %s %s -> %s" % (ip_header.protocol, ip_header.src_address, ip_header.dst_address)

    # If it's ICMP we want it
    if ip_header.protocol == "ICMP":

    # Calculate where our ICMP packet starts
    offset = ip_header.ihl * 4
    buf = raw_buffer[offset:offset + sizeof(ICMP)]

    # Create our ICMP structure
    icmp_header = ICMP(buf)

    #print "ICMP -> Type: %d Code: %d" % (icmp_header.type, icmp_header.code)

    # Now check for the TYPE 3 and CODE 3 which indicates
    # a host is up but no port available to talk to
    if icmp_header.code == 3 and icmp_header.type == 3:

    # Check to make sure we are receiving the response
    # that lands in our subnet
    if IPAddress(ip_header.src_address) in IPNetwork(subnet):

    # Test for our magic message
    if raw_buffer[len(raw_buffer)-len(magic_message):] == magic_message:
    print "Host Up: %s" % ip_header.src_address
    # Handle CTRL-C
    except KeyboardInterrupt:
    # if we're on Windows turn off promiscuous mode
    if os.name == "nt":
    sniffer.ioctl(socket.SIO_RCVALL, socket.RCVALL_OFF)


    Now how would i go about combining the two?

  8. Sophie Pedophile Tech Support
    So apparently there's this thing called DNS fast flux, the basic idea is that you switch out IP addresses at a high rate through a single fully qualified domain name by changing the DNS record. This allows for something that they call distributed command and control. Where it is hard to detect where the actual C&C is because requests are rerouted through a series of proxies. Pic related.



    Now that's all well and good but doesn't explain to me how it actually works or how one would go about setting something like this up, hypothetically of course. And while we're on the topic of doing haxxy things with DNS, feel free to give me a walkthrough of DNS cache poisoning. Now i could probably configure nmap to scan the entire internet for DNS servers but then what. I got Responder which is a LLMNR, NBT-NS and MSDNS poisoner with built in rogue server authentication support, but i'd like to get into details on the specific process of poisoning DNS records.
  9. Sophie Pedophile Tech Support
    PAWS from amps?

    Not sure if you could classify it as PAWS, where do we draw the distinction between PAWS and neuronal damage?
  10. Sophie Pedophile Tech Support
    Call me a faggot but I prefer a banana-seat 70's-era customized Murray Eliminator. Just rolling down the street with the cool breeze flowing through my hair…..


    Reminds me of GTA for some reason.
  11. Sophie Pedophile Tech Support
    Anhedonia, depression, low energy, low motivation are all signs of decreased DA/NE receptor function. Real withdrawal shouldn't last more than a couple weeks.
  12. Sophie Pedophile Tech Support
    Call me a faggot but i like sport bikes better.
  13. Sophie Pedophile Tech Support
    That reminds me of some kind of totse conference call using some program I can't remember way back when.

    It somehow managed to work with dialup and I could hear everyone well, talked for a minute then discovered to my horror that everyone could tell I was a little kid (5th, 6th grade at the time?).

    Ha, that's pretty funny. How old are you now?
  14. Sophie Pedophile Tech Support
    I like how no one responded ontopic ITT.
  15. Sophie Pedophile Tech Support
    Those bracelets are objectively homosexual.
  16. Sophie Pedophile Tech Support
    Wait, is that really him?

    If so, has Holly/Bumble seen this? Someone needs to get her reaction if she hasn't.

    Yeah that's him, he also said on TC a while ago how he was going to prison for raping his cousin. IDK how true that is but it's what he said.
  17. Sophie Pedophile Tech Support
    Have you guys seen the list of research chemicals that are going to be restricted in china in a couple of weeks? Looks like the scene is going to change drastically for a while:

    http://pastebin.com/VsSBdLv3

    I guess sploo better stock up on some syncans

    Fuck they're even banning the fentanyl analogues.
  18. Sophie Pedophile Tech Support
    I'm sure there was one thing today that was good or memorable in general, in this thread we name them. For me i was hanging out downtown waiting for my GF to finish at the psychologist's office when i met a nice girl. Seems like a small thing but she was really something else we talked for a little bit and it was good, her general attitude and demeanor brightened my day, which was nice.

    Go, go ,go.
  19. Sophie Pedophile Tech Support
    burnish was banned from 4chan, this is why he suicided: https://www.reddit.com/r/4chan/comments/3k0yvt/b_successfully_reports_a_mass_murderer_to_mi5/

    As good a reason as any to be sure.
  20. Sophie Pedophile Tech Support
    If he really cared about himself he would quit smoking and workout a lil bit.

    Is that your cure for depression? WOW, good God man! Write a research paper this information needs to get out there! Who would have thought that the cure to depression would be as simple as just quitting smoking and working out? Amazing.
  1. 1
  2. 2
  3. 3
  4. ...
  5. 1319
  6. 1320
  7. 1321
  8. 1322
  9. 1323
  10. 1324
  11. ...
  12. 1426
  13. 1427
  14. 1428
  15. 1429
Jump to Top