September 2016

We wrote about Bruter v1.0 ALPHA version back in 2008, recently they announced the release of v1.0 Final!
Bruter is a parallel network login brute-forcer on Win32. This tool is intended to demonstrate the importance of choosing strong passwords. The goal of Bruter is to support a variety of services that allow remote authentication.
It currently supports following services:
  • FTP
  • HTTP (Basic)
  • HTTP (Form)
  • IMAP
  • MSSQL
  • MySQL
  • POP3
  • SMB-NT
  • SMTP
  • SNMP
  • SSH2
  • Telnet
  • VNC
Recent Changes
  • Re-licensed to new-BSD license
  • Added proxy support (CONNECT, SOCKS4, SOCKS5)
  • Allowed more delimiter in combo file
  • Added password length filtered in combo and dictionary mode
  • Fixed miscellaneous bugs
  • Updated openssl library to 0.9.8n
You can download Bruter v1.0 Final here:

If you don’t know, Brutus is one of the fastest, most flexible remote password crackers you can get your hands on – it’s also free. It is available for Windows 9x, NT and 2000, there is no UN*X version available although it is a possibility at some point in the future. Brutus was first made publicly available in October 1998 and since that time there have been at least 70,000 downloads and over 175,000 visitors to this page. Development continues so new releases will be available in the near future.



Brutus was written originally to help me check routers etc. for default and common passwords.
Features
Brutus version AET2 is the current release and includes the following authentication types :
  • HTTP (Basic Authentication)
  • HTTP (HTML Form/CGI)
  • POP3
  • FTP
  • SMB
  • Telnet
Other types such as IMAP, NNTP, NetBus etc are freely downloadable from this site and simply imported into your copy of Brutus. You can create your own types or use other peoples.

The current release includes the following functionality :
  • Multi-stage authentication engine
  • 60 simultaneous target connections
  • No username, single username and multiple username modes
  • Password list, combo (user/password) list and configurable brute force modes
  • Highly customisable authentication sequences
  • Load and resume position
  • Import and Export custom authentication types as BAD files seamlessly
  • SOCKS proxy support for all authentication types
  • User and password list generation and manipulation functionality
  • HTML Form interpretation for HTML Form/CGI authentication types
  • Error handling and recovery capability inc. resume after crash/failure.
You can download brutus-aet2.zip here (the password is darknet123):


1. Nmap
I think everyone has heard of this one, recently evolved into the 4.x series.
Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source.
Can be used by beginners (-sT) or by pros alike (–packet_trace). A very versatile tool, once you fully understand the results.
2. Nessus Remote Security Scanner
Recently went closed source, but is still essentially free. Works with a client-server framework.
Nessus is the world’s most popular vulnerability scanner used in over 75,000 organizations world-wide. Many of the world’s largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications.
3. John the Ripper
John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.
4. Nikto
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired).
Nikto is a good CGI scanner, there are some other tools that go well with Nikto (focus on http fingerprinting or Google hacking/info gathering etc, another article for just those).
5. SuperScan
Powerful TCP port scanner, pinger, resolver. SuperScan 4 is an update of the highly popular Windows port scanning tool, SuperScan.
If you need an alternative for nmap on Windows with a decent interface, I suggest you check this out, it’s pretty nice.
6. p0f
P0f v2 is a versatile passive OS fingerprinting tool. P0f can identify the operating system on:
– machines that connect to your box (SYN mode),
– machines you connect to (SYN+ACK mode),
– machine you cannot connect to (RST+ mode),
– machines whose communications you can observe.
Basically it can fingerprint anything, just by listening, it doesn’t make ANY active connections to the target machine.
7. Wireshark (Formely Ethereal)
Wireshark is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Wireshark features that are missing from closed-source sniffers.
Works great on both Linux and Windows (with a GUI), easy to use and can reconstruct TCP/IP Streams! Will do a tutorial on Wireshark later.

8. Yersinia
Yersinia is a network tool designed to take advantage of some weakeness in different Layer 2 protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. Currently, the following network protocols are implemented: Spanning Tree Protocol (STP), Cisco Discovery Protocol (CDP), Dynamic Trunking Protocol (DTP), Dynamic Host Configuration Protocol (DHCP), Hot Standby Router Protocol (HSRP), IEEE 802.1q, Inter-Switch Link Protocol (ISL), VLAN Trunking Protocol (VTP).
The best Layer 2 kit there is.
9. Eraser
Eraser is an advanced security tool (for Windows), which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Works with Windows 95, 98, ME, NT, 2000, XP and DOS. Eraser is Free software and its source code is released under GNU General Public License.
An excellent tool for keeping your data really safe, if you’ve deleted it..make sure it’s really gone, you don’t want it hanging around to bite you in the ass.
10. PuTTY
PuTTY is a free implementation of Telnet and SSH for Win32 and Unix platforms, along with an xterm terminal emulator. A must have for any h4x0r wanting to telnet or SSH from Windows without having to use the crappy default MS command line clients.
11. LCP
Main purpose of LCP program is user account passwords auditing and recovery in Windows NT/2000/XP/2003. Accounts information import, Passwords recovery, Brute force session distribution, Hashes computing.
A good free alternative to L0phtcrack.
LCP was briefly mentioned in our well read Rainbow Tables and RainbowCrack article.
12. Cain and Abel
My personal favourite for password cracking of any kind.
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort.
13. Kismet
Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic.
A good wireless tool as long as your card supports rfmon (look for an orinocco gold).
14. NetStumbler
Yes a decent wireless tool for Windows! Sadly not as powerful as it’s Linux counterparts, but it’s easy to use and has a nice interface, good for the basics of war-driving.
NetStumbler is a tool for Windows that allows you to detect Wireless Local Area Networks (WLANs) using 802.11b, 802.11a and 802.11g. It has many uses:
  • Verify that your network is set up the way you intended.
  • Find locations with poor coverage in your WLAN.
  • Detect other networks that may be causing interference on your network.
  • Detect unauthorized “rogue” access points in your workplace.
  • Help aim directional antennas for long-haul WLAN links.
  • Use it recreationally for WarDriving.
15. hping
To finish off, something a little more advanced if you want to test your TCP/IP packet monkey skills.
hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired to the ping unix command, but hping isn’t only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features.
Yah I’ve stayed away from commercial products in this article, perhaps I’ll cover those another day.

Image result for darknet drugs pictures

The 2016 World Drug Report stated that the deepweb is fueling an international drug trade. According to Stijn Hoorens and David Décary-Hétu, the claim is not reinforced by empirical evidence. RAND Europe and the Universities of Montreal and Manchester conducted a study that ultimately disproved the 2016 WDR’s claims.
Global law enforcement agencies routinely arrest succesful deepweb vendors, indicating there is no shortage of online drug transactions. Many arrested vendors were able to tap into revenue streams that would have been nonexistent if not for the deepweb. There is no disputing that international transactions are a commonplace on darknetmarkets. However, researchers believe that such drug trade has had no substantial impact on global drug markets.
Judith Aldridge from the University of Manchester, David Décary-Hetu from the University of Montreal, and Stijn Hoorens from RAND conducted a massive deepweb scrape. The scrape contained data from 50 marketplaces and independent shops with a focus on both vendor and buyer demographics. Similar to recent findings from Monica Barratt and Aldridge, the RAND scrape shows online drug trade tripling since 2013.
Hoorens and Décary-Hétu write “but how global is this trade?”
The researchers found that marketplaces are dominated by vendors from the US, the UK and Australia. Vendor location was determined by looking at merchandise listings that indicated where the product would be shipping from. US-based vendors have the highest market share of cryptomarket drugs (35.9 percent of total drug revenues). The UK (16.1 percent) and Australia (10.6) are next in line.
Emerging economies have the least vendors, the study indicates:
Cryptomarkets offer potential customer outlets for vendors who are closely located to source regions. Our data suggests, however, that very few vendors operate from emerging economies, such as Southern Asia (heroin), Latin America (cannabis, cocaine), northern Africa (cannabis resin), or China (synthetic drugs and new psychoactive substances).
Deriving data about the buyer location is far more difficult. However, vendors often indicate locations they will ship to, giving researchers a starting point. The potential shipping routes were analyzed, revealing that North America and Oceania were the two most common destinations. Europe was the third most common.
The most common routes of darknet market drug trade were within North America, Europe, and Oceania. The researchers note that one-third of the transactions take unknown routes, so the data was difficult to estimate precisely. Regardless, this analysis indicates that majority of drugs bought online are shipped domestically or intra-continentally. Respectively few drugs traveled between continents.
The publication points out the discrepancy between their findings and the current beliefs:
This finding is interesting because it challenges the convention that cryptomarkets facilitate the globalization of drug retail markets. Countries such as Australia and the US have implemented strict monitoring of internationally shipped parcels, which explains the reluctance of vendors to ship across international borders. Contrast that to the limited or lack of monitoring of domestically shipped postal packages. With American buyers able to source cannabis, for example, from Colorado and Washington, where the drug has been legalized, why risk purchase from abroad?
An anomaly manifests itself when examining the Netherlands in light of domestic drug sales vs. international ones. Local law enforcement provided the researchers with intelligence suggesting that domestic sales from Dutch vendors are of little importance. However, the Netherlands has dominated global sales of MDMA with twenty-three percent of overall revenue. “The 225 vendors operating from the Netherlands generated $1.1 million in drug revenues per month and ranked fifth, after the US, UK, Australia, and Germany,” Hoorens Décary-Hétu wrote.
Looking at the Netherlands example, one can see that online international drug trade is only occurring with specific drugs. In this case, the Netherlands is the MDMA center of the world. In some countries, MDMA costs tenfold domestically what it would cost if ordered internationally from the Netherlands. The conclusion here is that international sales theoretically only take place for substances that justify the risk associated with international travel.
The researchers conclude that the full impact the darknet has on international drug trade is still somewhat inconclusive. However, aside from the Netherlands, the majority of the drug trade takes place within domestic borders. Darknet transactions have massively increased in number since 2013, but their impact on international drug trade is not yet of major significance.



At least 29 people have been injured in an explosion in a crowded district of New York City.
The cause of the blast late on Saturday in Chelsea remains unclear. Mayor Bill de Blasio described it as “intentional” but said that there were no known links to terror.
The force of the blast blew out windows and could be heard several blocks away.
Another device, reportedly a pressure cooker rigged with wires, was later found in the same district.
New York’s fire department said that of those injured, 24 were taken to hospital.
One received a puncture wound described as serious, while the rest suffered scrapes and bruises.
The explosion occurred around 21:00 (01:00 GMT on Sunday), outside a residence for blind people on West 23rd St.
Witnesses said people ran in all directions following the “incredibly loud” blast.
Some reports said the blast went off in a black metal construction toolbox, others that it was in a rubbish bin. Several blocks were shut by police but by 07:00 only 23rd St was closed, the New York Times reported.
A police official told the Times: “We don’t understand the target or the significance of it. It’s by a pile of dumpsters on a random sidewalk.”
Mr de Blasio said: “The initial indication is this was an intentional act.”
But he added: “We also want to be upfront saying that there is no evidence at this point of a terror connection to this incident.”
Article Excerpt: [BBC]

Black Dot Campaign” started on Facebook and it’s a campaign to recognize the victims of domestic abuse. That simple black dot on their hand signifies a call for help.


Black Dot Campaign
By putting a black dot on their palms, victims of domestic violence can show that they’re in danger. So if you ever notice a person with a black dot on his/her palm, help this person and call the police.
“The black dot on the hand lets professionals know you’re a really vulnerable domestic violence survivor, and that you need help but can’t ask because your abuser is watching your every move. In just 24 hours, the campaign has reached over 6,000 people worldwide, and has already helped 6 women. Please spread the campaign, and post a picture of your hand with the black dot, to show your support to all survivors of domestic violence,” stated the organizers behind this campaign.
1450345714_if-you-notice-someone-with-a-black-dot-on-his-palm-call-the-police-2
Story From Survivor of Domestic Violence:
“I’m heavily pregnant and the baby’s father is very abusive. With words, his hands. I’ve been petrified for so long and even more with the baby coming soon. I was at the hospital yesterday, he was with me, he never leaves my side anymore. I had to have an examination so the consultant asked me to lie on the bed and drew the curtain. I leant over and took the pen out of his pocket, pulled his hand over to me and wrote HELP ME. I didn’t have to say a word. “This campaign gave me the strength and the idea how to ask for help. I am now safe somewhere else thanks to that consultant and the black dot campaign. Thank you, 1 week to go until my due date and I am finally safe.”

SOURCES:



The idea that cannabis kills cancer cells seems to no longer be a conspiracy theory in the United States. With this information, can any state legitimately say no to medicinal marijuana?
Or could it even be considered a preventative herb to avoid getting cancer?
Amy Willis with Metro says that the US government has added a page on the use of cannabis and cannabinoids to their official cancer advicewebsite.
Willis advises, “The National Cancer Institute, part of the US Department of Health, now advises that ‘cannabinoids may be useful in treating the side effects of cancer and cancer treatment’ by smoking, eating it in baked products, drinking herbal teas or even spraying it under the tongue.”
The official government site has a long list of medicinal uses of cannabis, including: Anti-inflammatory activity, pain relief, anti-anxiety, stress relief, anti-tumor, antiviral activity and relieving muscle spasms caused by multiple sclerosis, and many many more.
The site goes on to talk about how cannabis has been proven to destroy cancer cells in lab experiments.
Willis continues, “Several scientific studies have suggested this in the past, and in April this year the US government’s National Institute on Drug Abuse revised their publications to suggest cannabis could shrink brain tumors by killing off cancer cells.”
If the United States government is finally willing to admit these benefits and that cannabis has been proven to kill cancer cells, then will other western nations follow suit?
If good health and decreasing cancer rates is important to you, then contact your government and tell them about the great benefits of cannabis – a natural herb that has a long list of benefits without the side effects of man-made cancer treatments.
Source:

The Deep Web is not The Dark Web. The Dark Web is the encrypted network that exists between Tor servers and their clients. The Deep Web is simply the content of databases and other web services that cannot be indexed by conventional search engines. You can only access 0.03% of the Internet via search engines; the rest is what makes up The Deep Web used mostly by pedophiles.
Cracked’s source, “Pam”, spent months undercover in an online community of child molesters, learning their lingo and studying their ways as part of an undergrad research project. She shares some of her horrifying experiences of visiting the dark side of the Internet…
1445428444398
#5. The Dark Web Has A Whole Pedophile “Community”
Child pornographers have their own Wikipedia, which is accessible through Tor, named “Hard Candy”. There is also a discussion forum called 3DBoys, which is full of erotic art; however, there isn’t any actual po*rn on 3DBoys. There is also a site called 7axxn, essentially the Mos Eisley Cantina for child pornographers. Since its membership was heavily restricted, the only way to get into 7axxn was to get an invitation from a current member and gaining their trust would require breaking the law. This whole “incriminate yourself to get inside” attitude was common among pedophiles of The Deep Web. Pam got lucky though; someone invited her on the third day and she was in. The further in she got, the more terrifying the implications of her research became.
#4. There Are “Child Lovers” And Then There Are “Child Molesters”
7axxn is a community of over 90,000 registered users, filled with gigabyte after gigabyte of child pornography. Most users are just there for the po*rn, but hundreds of them also contribute to a lively set of discussion forums. There are even polls, breaking down the popularity of things such as “Hurtcore”, which is the charming shorthand term for pornography featuring the violent physical abuse of children. Within the “community” there are people who are sexually assaulting victims who were incapable of giving consent (real rape), and those who are having ‘mutual’ sexual relationships with children (real se*x).
#3. It’s A Family Business
Pam found a moderator on 7axxn with the moniker sarahthecunt, who claims to have been molested by her dad as a young girl and enjoyed it so much that she grew up taking pride in her identity as a pedophile. She has three children that she and her husband are “bringing up pedo” (her husband is a member, too). This is another way of saying they rape their children and convince them that they’re enjoying it. She posts videos she and husband make; according to her, the kids are willing participants (obviously they can’t be). Here, in sarahthecunt’s own words, are the rules they set for their children:
#2. Child Molesters Have A Handbook
How does she manage to stay hidden from the eyes of the law for so long? Because people like her have a handbook that includes bits on argumentative justifications for pedophilia. Among other things, it advises buyers of child po*rn to do their business in Bitcoin and teaches readers “… how to have se*x with children, and hide it from a significant other”. The handbook also keys newbie pedophiles in on helpful hints such as using the shorthand acronym CP, instead of actually typing “child pornography”. Another term the community uses to avoid suspicion is “young friends”, which refers to the children they’ve either abused or wanted to abuse. The community further protects itself by carrying out all their communication anonymously on Tor and keeping vigilant moderators.
#1. They Are Very Good At Staying incognito
One day, Pam discovered a thread about the best way to drug children (one quote: “[Drug name removed] does wonders. Very mild and relaxes muscles too … Btw [removed] only make them tired and lethargic. Not a good choice for a light sleeper unless mixed with etoh (alcohol). Be careful.”). Disgustingly, those posts were right alongside those insisting that kids just love se*x.
Pam looked for any court admissible evidence, location data, ID information… but she found nothing. People in The Deep Web are very open about what they want to do to children, but also very careful about not mentioning where they are located. And the credit goes to Tor – that’s why it is next to impossible to stop the spread of child p*rn across the hidden reaches of the Internet.



Since tobacco smoking causes cancer, marijuana smoking must as well. Right? Wrong.
Marijuana decreases the risk of lung cancer. Marijuana does not cause chronic obstructive pulmonary disease (COPD). Thus, Pot is safer than cigarettes.
Professor emeritus of medicine at UCLA and one of the United States’ leading pulmonologists who has been studying weed and its effects on lungs for more than 30 years, Dr. Donald Tashkin once sought to prove pot causes lung cancer, but the evidence forced him to conclude that average weed smoking does not cause lung cancer or impair lung function:
“The smoke content of marijuana is very similar to that of tobacco. There is a higher concentrate of cancer-causing chemicals in marijuana tar, and it reaches the lungs before any other organ, so there is this idea that they are related in causing the same health issues of the lungs. But through my studies we failed to find any positive association [with cancer]. Instead, the association would be negative, between lung cancer and the use of marijuana. The likelihood is, that despite the fact that marijuana smoke contains carcinogens, we don’t see the same heightened risks of cancers that we see in tobacco.”
Dr. Tashkin is not alone in his analysis. To investigate the association between cannabis smoking and lung cancer risk, data on 2,159 lung cancer cases and 2,985 controls were pooled from 6 case-control studies in the US, Canada, UK, and New Zealand within the International Lung Cancer Consortium. Results from the pooled analyses in 2014 provided little evidence for an increased risk of lung cancer among habitual or long-term cannabis smokers.
“I was opposed to legalization because I thought it would lead to increased use and that would lead to increased health effects. But at this point, I’d be in favor of legalization. I wouldn’t encourage anybody to smoke any substances. But I don’t think it should be stigmatized as an illegal substance. Tobacco smoking causes far more harm. And in terms of an intoxicant, alcohol causes far more harm.” – Dr. Tashkin
“Reasoning for this may be that marijuana is a potent anti-inflammatory and suppressive. But COPD is activated by tobacco smoke and other toxic substances. The other major impact of tobacco smoking on the lungs is the association between smoking tobacco and the development of destructive pulmonary disease, the third cause of death in America.”
peoplewhovesmoked-768x401
Again, his current findings echo results from previous research. In a large cross-sectional analysis of US adults aged 18 to 59 using data from two rounds of the National Health and Nutrition Examination Surveys (NHANES), researchers from Georgia’s Emory University found in 2015 that occasional and low cumulative marijuana use was not associated with adverse effects on pulmonary function.
Cumulative lifetime marijuana use, up to 20 joint-years, is not associated with adverse changes in spirometric [a person’s ability to exhale] measures of lung health. Although greater than 20 joint-years of cumulative marijuana exposure was associated with a twofold increased odds of a FEV1/FVC less than 70%, this was the result of an increase in FVC [forced vital capacity], rather than a disproportional decrease in FEV1 [forced expiratory volume]as is typically associated with obstructive lung diseases.
The largest and longest study ever to consider the issue [Researchers tested the lung function of 5115 young adults over the course of 20 years, starting in 1985 when they were aged 18 to 30], published in 2012 in the Journal of the American Medical Association, found that occasional marijuana smoking does not impair lung function.
Marijuana may have beneficial effects on pain control, appetite, mood, and management of other chronic symptoms. Our findings suggest that occasional use of marijuana for these or other purposes may not be associated with adverse consequences on pulmonary function.
Marijuana plus tobacco equals lung poison
Consultant Physician at St. Lucia’s Victoria Hospital, Dr. Martin Didier, warns:
Tobacco contains over 4,000 toxic substances which destroys your lungs. Marijuana for all we know is less toxic, probably contains up to 400 but the combination of smoking marijuana and tobacco they interact and it changes the whole thing into a poison. A poison which destroys the structure and function of the lungs with a lot of consequences.”
Marijuana use alone doesn’t cause significant abnormalities to the lungs
Allen St. Pierre, executive director of the National Organization to Reform Marijuana Laws, told ThinkProgress:
“If we’re serious public policy people, we would let the scientists figure this out. Does one set of vegetative matter produce a certain range of carcinogens? If so, to what degree and amount? How do people consume it? This entire discussion should be based on science. But the laughable thing is that the government is against this type of research. All we have are anecdotes but we need science that meets the standards of a proper peer review.”
Via anonhq

Author Name

Contact Form

Name

Email *

Message *

Powered by Blogger.