Remot3d v2.0 – Tool Created For Large Pentesters As Well As Just For The Pleasure Of Defacers To Control Server By Backdoors

Remot3d – A tool made to generate backdoor to control and exploit a server where the server runs the PHP (Hypertext Preprocessor) program.                Equipped with a backdoor that has been Obfuscated which means that 100% FUD (FULLY UNDETECTABLE) in other words can penetrate the firewall of a server because of its ignorance if it’s a Malware, Written in Shell Script Language or commonly known as BASH by a 16 year old teenager.ScreenshotsList of Remot3d FunctionsCreate backdoor for windows or linux servers (can run php file) Bypass disable function’s with imap_open vulnerability Bypass read file /etc/passwd with cURL or Unique Logic Script’s Generating Backdoor and can be remoted on Tools Some other fun stuff 🙂 Getting Startedgit clone https://github.com/KeepWannabe/Remot3dcd Remot3dsudo setup.sh && Remot3dLinux operating systems we recommend :Linux mint (Ubuntu Based with Mate DE)ParrotBackTrackBackboxDracOSIbisLinuxUpdate Remot3dTo update remot3d go to your Remot3d folder and execute : git pull && sudo setup.sh && Remot3dHelped by :- my god Allah SWT.- Bayu Fedra (https://github.com/bayufedra)- Ardhana Reky (https://github.com/ardzz)- Novran Fathir (https://github.com/panophan)- Ardhana Resky (https://github.com/Ardzz)- Hasanal Bulkiah (https://github.com/florienzh4x)- Agus Setya R (https://github.com/agussetyar)- Edo Maland (https://github.com/ScreetSec)- IndoXploit – ZeroByte.ID – Eldersc0de Family and Much more !Download Remot3d

Link: http://feedproxy.google.com/~r/PentestTools/~3/yLlm2OQbWtE/remot3d-v20-tool-created-for-large.html

Remot3d – An Simple Exploit for PHP Language

It’s easy to create a backdoor in an instant, the backdoor can be used in a remote process via a Linux terminal on the server that runs the PHP Language program.Made to bypass the system that is disabled on the server, especially for reading sensitive files that are /etc/passwdScreenshotsList of Remot3d FunctionsCreate backdoor for windows or linux servers (can run php file) Bypass disable function’s with imap_open vulnerability Bypass read file /etc/passwd with cURL or Unique Logic Script’s Generating Backdoor and can be remoted on Tools Some other fun stuff 🙂 Getting Startedgit clone https://github.com/KeepWannabe/Remot3dcd Remot3dchmod +x Remot3d.sh && ./Remot3d.shLinux operating systems we recommend :Linux mint (Ubuntu Based with Mate DE)ParrotBackTrackBackboxDracOSIbisLinuxUpdate Remot3dTo update remot3d go to your Remot3d folder and execute : git pull && chmod +x Remot3d.sh && ./Remot3d.shDownload Remot3d

Link: http://feedproxy.google.com/~r/PentestTools/~3/MfRDXGlJowM/remot3d-simple-exploit-for-php-language.html

Novahot – A Webshell Framework For Penetration Testers

novahot is a webshell framework for penetration testers. It implements a JSON-based API that can communicate with trojans written in any language. By default, it ships with trojans written in PHP, ruby, and python.Beyond executing system commands, novahot is able to emulate interactive terminals, including mysql, sqlite3, and psql. It additionally implements “virtual commands" that make it possible to upload, download, edit, and view remote files locallly using your preferred applications.InstallationInstall the executable directly from npm:[sudo] npm install -g novahotThen seed a config file:novahot config > ~/.novahotrcUsageView the available trojans with novahot trojan list. Select a trojan in a language that is appropriate for your target, then copy its source to a new file. (Ex: novahot trojan view basic.php > ~/my-trojan.php) Change the control password in the newly-created trojan. Upload the trojan to a web-accessible location on the target. Configure target information in the targets property in ~/.novahotrc. Run novahot shell to open a shell. Shell ModesInternally, novahot uses "modes" and "adapters" to emulate various interactive clients, currently including the mysql, psql (postgres), and sqlite3 clients.To change novahot’s mode, issue the appropriate "dot command":.mysql { "username" : "mysql-user", "password" : "the-password", "database" : "the-database" }(Connection parameters may be specified as JSON while changing modes, or alternatively saved as target configuration data in ~/.novahotrc.)For example, the mysql mode makes it possible to directly run queries like the following:mysql> SELECT ID, user_login, user_email, user_pass FROM wp_users;There additionally exists a payload mode that can be used to POST arbitrary data to the trojan. See the wiki for more information.Virtual Commandsnovahot implements four "virtual commands" that utilize payloads built in to the trojans to extend the functionality of the shell:downloaddownload <remote-filename> [<local-filename>]Downloads <remote-filename> to –download-dir, and optionally renames it to <local-filename> if specified.uploadupload <local-filename> [<remote-filename>]Uploads <local-filename> to the shell’s cwd, and optionally renames <local-filename> to <remote-filename> if specified.viewview <remote-filename> [<local-filename>]Downloads <remote-filename> to –download-dir, and optionally renames it to <local-filename> After downloading, the file will be opened by the "viewer" application specified in the configs.editedit <remote-filename>Downloads <remote-filename> to a temporary file, and then opens that file for editing using the "editor" specified in the configs. Afterward, if changes to the file are saved locally, the file will be re-uploaded to the server automatically.Provisioning a Test EnvironmentThis repository contains a laboratory environment built on Vagrant, Docker, and the Damn Vulnerable Web Application ("DVWA"). Steps for provisioning the environment vary depending on the capabilities of your physical host.Using docker-composeIf you have docker and docker-compose installed on your physical host, you may simply do the following:Clone and cd to this repositoryRun: docker-compose upAfter the docker container starts, the DVWA will be accessible at http://localhost:80.Using vagrantIf docker is not installed on your physical host, you may use Vagrant/Virtualbox to access a docker-capable virtual-machine:Clone and cd to this repositoryProvision a virtual machine: vagrant upSSH into the virtual machine: vagrant sshStart the docker container: sudo su; cd /vagrant; docker-compose upThe DVWA will be accessible at http://localhost:8000.Configuring novahot against the laboratory environmentSpecify the following connection strings in your ~/.novahotrc file to connect the novahot client to the PHP trojan embedded in the DVWA container:{ "targets": { "dvwa" : { "uri" : "http://localhost:8000/novahot.php", "password" : "the-password", "mysql" : { "username": "root", "password": "vulnerables", "database": "dvwa" } } }}You may then establish a webshell via:novahot shell dvwaAdditional InformationAdditional information can be found in the wiki:ConfigurationThe Client/Trojan APIsqlite3 "dot command" conflictsDownload Novahot

Link: http://www.kitploit.com/2018/11/novahot-webshell-framework-for.html

Podcast: A Utility Ransomware Attack Post-Hurricane

A “critical water utility” was hit by a recent ransomware attack, significantly impeding the service in the week after Hurricane Florence hit the East Coast of the U.S. The Onslow Water and Sewer Authority (ONWASA) said in a Monday release that a “sophisticated ransomware attack… has left the utility with limited computer capabilities.” While customer data […]

Link: https://threatpost.com/podcast-a-utility-ransomware-attack-post-hurricane/138391/