For today's software engineering content, we are going to dive into how to write out form requests to implement various HTTP methods from scratch, as well as how to setups basic HTML file from scratch.
I will be showing you how to setup form requests, as well as: text inputs, password inputs, submit modules, and lastly, file uploads for an html page.
The goal of this, is to get you into the habit of knowing how HTML code works and how to tamper with it.
Pay close attention to how I'm writing the code, as you'll need to know this for the upcoming lab that is set to launch soon.
Source code, like always, will be in the attachments section bellow.
Disclaimer
As always, personal disclaimer, any and all information for this is strictly for educational purposes and I do not condone any form of illegal activity, nor am I responsible for anything you should use this information for. DO NOT pen-test on anyone's network unless it is your own, or you have permission to do so. Now, letโs begin!
- The Hacker Who Laughs ๐ธ๐ธ๐๐ธ๐ธ
Radio Module
Today, Iโm going to cover how to program an RF module with arduino in order to send radio waves from one radio module to another.
This is going to come majorly into play for the next lab that I have set, as well as one of the biggest projects in the long run, so do pay close attention to how I am writing the code for it.
Donโt forget that how to set up any and all modules takes place during the major lab that will be combining all the parts together.
The goal for all of this is to get you used to how to write the code, and then we dive into how to physically set all of it up which is the fun hands on part that you all know and love.
Disclaimer
As always, personal disclaimer, any and all information for this is strictly for educational purposes and I do not condone any form of illegal activity, nor am I responsible for anything you should use this information for. DO NOT pen-test on anyone's network unless it is your own, or you have permission to do so. Now, letโs begin!
- The Hacker Who Laughs ๐ธ๐ธ๐๐ธ๐ธ
DANGER! WAP
Today, Iโm going to talk about WAP security and why itโs important for you to implement it for both home networks, ESPECIALLY HOME NETWORKS, as well as corporate infrastructures. We often overlook this, which can lead to a MASSIVE SPOF that can lead to a massive scaled botnet if weโre not careful with implementing proper WAP endpoint security measures. I specialize in networking overall so I have a lot of fun messing around with penetration testing regarding them.
Iโm also going to talk a bit about the various creative ways threat actors can exploit an access point to do some serious damage and a lot more. Of course *whistles* Iโm just theorizing. Itโs not like Iโve been paid to do this stuff before right hahaโฆ. *cricket noises*.. AHEMโฆ back to the point of the matter!
Iโm also going to talk about what SPOF is since itโs a CRITICAL topic that youโll often come across in Cyber and Information security, WHICH YOU NEED TO KNOW. Itโs so important that simply not knowing it is one of the MAIN reasons why we have so many security breaches and bad Cyber Security practices.
Lastly, since this is of course the danger series, I am going to address MANY remedies that can be done in order to enhance your overall network security, most of which you probably have never thought of in the first place. Iโve played around with a lot of this stuff, so do take my word for it.
This article is a part of the Danger! Series, which is where I raise more Cyber Security awareness about critical flaws and vulnerabilities that exist within various system infrastructures, including any protocols and data communication methods, and the Dangers of what could happen should they be exploited to the fullest extent. I also go over various mitigation strategies that can be used to prevent them as well. If by chance there is an exploit video for me showing the full potential risk, it will be included in the advance version of this article for PAID patreon members only!
Disclaimer
As always, personal disclaimer, any and all information for this is strictly for educational purposes and I do not condone any form of illegal activity, nor am I responsible for anything you should use this information for. DO NOT pen-test on anyone's network unless it is your own, or you have permission to do so. Now, let's begin!
- The Hacker Who Laughs ๐ธ๐ธ๐๐ธ๐ธ
DANGER! A.I.
Today Iโm going to address a hot topic, one that has been going around lately since itโs innate birthโฆ WILL A.I. REPLACE US?
Iโm going to basically debunk some of the most popular reasons why, and why itโs just another tool that will aid us in our daily lives. Iโm also going to talk a bit about what A.I.is and how it compares to actual human intelligence since the overall goal of it is to replicate the human mind. Iโm also, lastly, going to discuss the BIGGEST downfall that has been leading to a lot of FAILED expectations to be met from A.I, and how the overall introduction of it has affected the overall job market.
Recently with the development of OpenAI, which lead to stuff like ChatGPT, weโve entered a more advanced era of A.I., where it can do a bit more than just โHey Siriโ, or โHey Alexaโ, and query and search stuff for us and return the results. โA.Iโhas progressed to the point where itโs able to do ACTUAL stuff like: generate images for us, write our resume and cover letters, generate basic code templates, generate animations, etc. I think you get the picture! BUT, donโt be misled by what you see on paper. Not everything translates well.
Iโm also going to talk about why I donโt like A.I., which is mostly due to the FALSE image that it has implanted in our minds and WHY Iโm enjoying itโs slow and inevitable downfall. Iโm a HUGE tech enthusiast, and am VERY open minded to many implementations of it. Tech has advanced society to limits that I wouldnโt have imagine possible, which also lead to it HELPING a lot of people overall, as well as made things more accessible for the disabled: prosthetics, eye care, hearing impaired, etc, the list goes on. Typically technology BENEFITS EVERYONE and has a POSITIVE effect (ahemโฆ I know what youโre thinking just go with it haha), but in the case of A.I, it has lead to the false impression of a utopia that simply WILL NEVER EXIST! One where the robots will do all the work for us so we can just sit back and relax and prosper from it. We looked only a the short term of A.I. and not the long term, and because of that, we are PAYING a hefty price for it. Itโs being used to REPLACE us, NOT HELP US.
Lastly, Iโll also be covering a few HUGE security risks and COPY right laws that come into factor regarding it.
This article is a part of the Danger! Series, which is where I raise more Cyber Security awareness about critical flaws and vulnerabilities that exist within various system infrastructures, including any protocols and data communication methods, and the Dangers of what could happen should they be exploited to the fullest extent. I also go over various mitigation strategies that can be used to prevent them as well. If by chance there is an exploit video for me showing the full potential risk, it will be included in the advanced version of this article for PAID patreon members only!
Disclaimer
As always, personal disclaimer, any and all information for this is strictly for educational purposes and I do not condone any form of illegal activity, nor am I responsible for anything you should use this information for. DO NOT pen-test on anyone's network unless it is your own, or you have permission to do so. Now, letโs begin!
- The Hacker Who Laughs ๐ธ๐ธ๐๐ธ๐ธ
RevShell PHP
Today I am going to show you how to write your own custom reveshell script that can perform RCE on any system. This is taking inspiration from reveshells which have a series of RCE shells that you can download and interact with that will allow you to seamlessly achieve RCE for any remote file upload exploit.
Why am I covering this despite there being a site that allows you to do so? Well, much like all things involving hacking youโll run into situations where you need to write more complex code, even code that is pre-made beforehand for an exploit which might go out of the scope of what you need said program to do. This is also due to the fact that various detection systems are able to identify signature patterns. If you know how to write your own code you can apply further obfuscation methods that will allow you to bypass security.
I am also going to show you how the code works under the hood so that you have a CLEAR understanding of how it works and how to write it yourself.
This WILL be in the lab upcoming, so I recommend you get good with this as the REAL exploit for the next lab is going to be a lot more complex.
Disclaimer
As always, personal disclaimer, any and all information for this is strictly for educational purposes and I do not condone any form of illegal activity, nor am I responsible for anything you should use this information for. DO NOT pen-test on anyone's network unless it is your own, or you have permission to do so. Now, letโs begin!
- The Hacker Who Laughs ๐ธ๐ธ๐๐ธ๐ธ
SSHClient
Today Iโm going to show you how to write your own SSH client via Python that you can use to connect to ANY SSH service and pipe in commands to the server.
The main little goal of this exercise is to teach you how the SSH protocol works under the hood. What you do with this information, which like all things, can also be used for hacking.
I will also eventually be covering how to write your one SSH server which can come in handy. The issue with this is there have been reports of people having issues with the module working.
Disclaimer
As always, personal disclaimer, any and all information for this is strictly for educational purposes and I do not condone any form of illegal activity, nor am I responsible for anything you should use this information for. DO NOT pen-test on anyone's network unless it is your own, or you have permission to do so. Now, letโs begin!
- The Hacker Who Laughs ๐ธ๐ธ๐๐ธ๐ธ
Wireshark
For todayโs tool video, Iโm going to show you how to sniff out network traffic to spy on sensitive credentials that are sent, and WHY you should NEVER use a site unless it has HTTPS enabled on it. Be mindful, just because a site does have HTTPS enabled doesnโt mean itโs safe and secure. Threat actors tend to have phishing sites that enable the protocol to trick us into thinking itโs legit.
The wireshark tool, which is used for network traffic analysis, can also be used for a variety of protocol analysis, even for stuff like VOIP eavesdropping, which can allow you to spy on peopleโs phone call conversations over corporate networks. Iโll eventually cover stuff like that in future parts involving the tool later on.
Disclaimer
As always, personal disclaimer, any and all information for this is strictly for educational purposes and I do not condone any form of illegal activity, nor am I responsible for anything you should use this information for. DO NOT pen-test on anyone's network unless it is your own, or you have permission to do so. Now, letโs begin!
- The Hacker Who Laughs ๐ธ๐ธ๐๐ธ๐ธ
Servo
Today I'm going to show you how to program servo motors in arduino.
The main goal is to โsimulateโ and show you how programming them for drones work under the hood. Iโll of course leave the working code attached. Just pay attention to how I write the code and go about the overall process and youโll be fine.
For this demonstration Iโll be covering how to program them via the standard ones that come with the arduino kit. Iโll also show you how to program them via ESC motors for the drone.
Disclaimer
As always, personal disclaimer, any and all information for this is strictly for educational purposes and I do not condone any form of illegal activity, nor am I responsible for anything you should use this information for. DO NOT pen-test on anyone's network unless it is your own, or you have permission to do so. Now, letโs begin!
- The Hacker Who Laughs ๐ธ๐ธ๐๐ธ๐ธ
LCD
Today Iโm going to show you how to program LCD screens.
This is staple if you get crafty and want to program CUSTOM stuff like *cough* visualizers that print your emojis to the screen.
Iโll be showing you how to program TWO versions of LCD screens that youโll commonly see in the arduino kit for beginners. 1 of them is the standard one with MANY pin connectors attached to them which can be the most complex to setup. The other is one that is commonly and easily interchangeable which includes a ISC adapter attached to them which is seamless to install and program.
I recommend knowing how to program both of them so you can make either work in case you are running short on supplies, OR, in the event you ONLY have one or the other. None the less itโs still staple to know how to program BOTH of them.
Disclaimer
As always, personal disclaimer, any and all information for this is strictly for educational purposes and I do not condone any form of illegal activity, nor am I responsible for anything you should use this information for. DO NOT pen-test on anyone's network unless it is your own, or you have permission to do so. Now, letโs begin!
- The Hacker Who Laughs ๐ธ๐ธ๐๐ธ๐ธ
BufferOverflow64
Todayโs exploit video will feature something that has been HEAVILY requested by many of my followersโฆ BINARY injection, also known commonly as a Buffer Overflow exploit.
Much like how SQL injection is hard to learn without proper instruction, so is binary injection. What Iโm going to show you today is the overall premise and concept behind the technique. This is the DEFINITIVE example and BEST way to EASILY explain how binary injection works to ANYONE that wants to learn more about it.
Binary is overall one of the HARDEST techniques to learn and master mostly due to there being FEW GOOD resources that can teach it to you.
Iโm also going to write some sample code in C that will be vulnerable to buffer overflow attacks, so that you can play with it and get a feel for how it works on a technical level. This will also set us up for the next part, which will be me covering how to use a debugger to analyze the code flow, as well as perform the overall exploit the manual way. There are more special surprises for binary injection coming up so do stay tuned.
As always, any and all videos that are included with this article will be for PAID members only! You can check out my tiers and pricing down in my patreon link in the comment section below as well as on my website.
Disclaimer
As always, personal disclaimer, any and all information for this is strictly for educational purposes and I do not condone any form of illegal activity, nor am I responsible for anything you should use this information for. DO NOT pen-test on anyone's network unless it is your own, or you have permission to do so. Now, letโs begin!
- The Hacker Who Laughs ๐ธ๐ธ๐๐ธ๐ธ
RCEBinary
Today, Iโm going to dive further into binary injection exploits, and cover how to exploit them for RCE, remote code execution. Iโm also going to show you how to use one of the most common tools that is used to analyze code flow as well as binary applications overall which is the GDB debugger. Iโll explain a bit about what that is as well.
Last time, I showed you how to exploit vulnerable functions inside of a program via end user input in order to call other functions within the program via memory EVEN if the function is NEVER explicitly called in the program itself. This was to highlight the dangers of leaving vulnerable code within an application and how it can be exploited by threat actors to execute it which can be problematic if youโve left stuff like backdoors in the code that the threat actor can easily piggyback off of to compromise internal infrastructures.
This time around, we are going to take it a step further and exploit the overall application to have it perform ANY form of RCE that we want against a target application whether it be in plain text format or binary format.
This is a CRUCIAL skill to master, as youโll often run into various CTF challenges that require you to know binary exploitation, as well as overall in general if you are running some security tests. It overall comes in handy if youโre just a hacker in general and is a STAPLE skill to master. Youโll go a long way, ESPECIALLY if you plan to do forensic with this skill set.
Disclaimer
As always, personal disclaimer, any and all information for this is strictly for educational purposes and I do not condone any form of illegal activity, nor am I responsible for anything you should use this information for. DO NOT pen-test on anyone's network unless it is your own, or you have permission to do so. Now, letโs begin!
- The Hacker Who Laughs ๐ธ๐ธ๐๐ธ๐ธ
SmbClient
For todayโs tool video, Iโm going to show you how to use the smbclient tool in order to sniff out and exploit smb file shares on windows systems to retrieve a sensitive file that contains password end user credentials.
File shares are one of the most CRITICAL end points to protect on any system. Thereโs a reason why OS systems CLOSE their ports by default on most systems.
Should a threat actor be able to breach the service, they will have access to any and all file shares on the system, as well as being able to upload and replace and or tamper with files within the FTP service. This can lead to a lot more complex exploits like living off the land for example.
Disclaimer
As always, personal disclaimer, any and all information for this is strictly for educational purposes and I do not condone any form of illegal activity, nor am I responsible for anything you should use this information for. DO NOT pen-test on anyone's network unless it is your own, or you have permission to do so. Now, letโs begin!
- The Hacker Who Laughs ๐ธ๐ธ๐๐ธ๐ธ