<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://enlacehacktivista.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Quetzalcoatl</id>
	<title>Enlace Hacktivista - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://enlacehacktivista.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Quetzalcoatl"/>
	<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php/Special:Contributions/Quetzalcoatl"/>
	<updated>2026-05-06T00:37:26Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.8</generator>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Tor_Browser_Privacy_Optimization&amp;diff=1767</id>
		<title>Tor Browser Privacy Optimization</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Tor_Browser_Privacy_Optimization&amp;diff=1767"/>
		<updated>2025-09-18T19:40:52Z</updated>

		<summary type="html">&lt;p&gt;Quetzalcoatl: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;* Disable JavaScript. To do this, set Security Level to &amp;quot;Safest&amp;quot; in the Tor Browser settings.&lt;br /&gt;
* In &amp;quot;about:config&amp;quot; change &amp;quot;privacy.resistFingerprinting.spoofOsInUserAgentHeader&amp;quot; from &amp;quot;false&amp;quot; to &amp;quot;true&amp;quot; (note, [https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/43189 this does not work AT ALL in the latest version of the Tor browser]).&lt;/div&gt;</summary>
		<author><name>Quetzalcoatl</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Tor_Browser_Privacy_Optimization&amp;diff=1766</id>
		<title>Tor Browser Privacy Optimization</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Tor_Browser_Privacy_Optimization&amp;diff=1766"/>
		<updated>2025-09-18T19:35:43Z</updated>

		<summary type="html">&lt;p&gt;Quetzalcoatl: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;* Disable JavaScript. To do this, set Security Level to &amp;quot;Safest&amp;quot; in the Tor Browser settings.&lt;br /&gt;
* In &amp;quot;about:config&amp;quot; change &amp;quot;privacy.resistFingerprinting.spoofOsInUserAgentHeader&amp;quot; from &amp;quot;false&amp;quot; to &amp;quot;true&amp;quot; (note, this does not work AT ALL in the latest version of the Tor browser).&lt;/div&gt;</summary>
		<author><name>Quetzalcoatl</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Opsec_Measures&amp;diff=1765</id>
		<title>Opsec Measures</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Opsec_Measures&amp;diff=1765"/>
		<updated>2025-09-18T19:34:56Z</updated>

		<summary type="html">&lt;p&gt;Quetzalcoatl: /* OPSEC Tools */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Recommended Measures ==&lt;br /&gt;
Here you will find resources that will help you from a technological operational security perspective. OPSEC is much more than simply what networks and technology you use.&lt;br /&gt;
&lt;br /&gt;
Make sure that you use a separate and fully encrypted computer to work from. This can be a virtual machine, USB, external drive or a throw away laptop. All of your network traffic should be routed entirely over Tor (whonix is the best for this). See [https://enlacehacktivista.org/images/6/69/Hack_back1.txt Phineas Fishers operational security practices] for hackers OPSEC.&lt;br /&gt;
&lt;br /&gt;
== OPSEC Tools ==&lt;br /&gt;
There is no silver bullet when it comes to protecting yourself, staying safe and anonymous. It&#039;s important to know how to use the tools we rely on to keep us safe and free. Below you will find industry standard tools that will help keep your hacktivity private and secure.&lt;br /&gt;
&lt;br /&gt;
When communicating with journalists or other hackers it&#039;s important to keep all communication end-to-end encrypted, network connection over Tor and to [https://www.wired.com/2015/05/silk-road-2/ not use aliases or emails that lead back to your real world identity].&lt;br /&gt;
&lt;br /&gt;
* https://www.qubes-os.org ([http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion Tor])&lt;br /&gt;
* https://www.whonix.org ([http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion Tor])&lt;br /&gt;
* https://tails.net&lt;br /&gt;
* The whonix wiki has lots of great info on anonymity even if you&#039;re not using whonix: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
* [https://www.whonix.org/wiki/Comparison_with_Others Custom]: https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TransparentProxy&lt;br /&gt;
* Use veracrypt to encrypt your virtual machines and hard drive. Make sure to save your hacktivity inside of a [https://veracrypt.eu/en/Hidden%20Volume.html hidden volume] for plausible deniability. https://veracrypt.fr&lt;br /&gt;
* Tor browser: https://www.torproject.org ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html Tor])&lt;br /&gt;
** See [[Tor Browser Privacy Optimization]]&lt;br /&gt;
* If you plan on transacting you should always start from monero and swap your XMR to another coin. This reduces traceability (over Tor) and will defeat standard blockchain investigations. https://www.getmonero.org ([http://monerotoruzizulg5ttgat2emf4d6fbmiea25detrmmy7erypseyteyd.onion/index.html Tor])&lt;br /&gt;
&lt;br /&gt;
== Guides and Information ==&lt;br /&gt;
* [https://www.anarsec.guide/ AnarSec]&lt;br /&gt;
Interesting techniques for detecting [[wikipedia:Evil Maid attack|evil maid attacks]], along with lots of great information on Qubes, Tails, GrapheneOS and more.&lt;br /&gt;
* [https://www.notrace.how/ No Trace Project]&lt;br /&gt;
Mostly focused on surveillance of physical actions, but plenty is relevant for hacking. Hackers will need to watch out for physical frame grabbers and keyloggers in addition to [https://www.notrace.how/earsandeyes/ microphone and cameras], along with being mindful of [https://www.notrace.how/resources/read/who-wrote-that.html what they write.]&lt;br /&gt;
&lt;br /&gt;
== Know your enemy ==&lt;br /&gt;
Cyber investigators will use many techniques to uncover your identity to facilitate in a successful arrest. Books as seen below help us see and understand some of the tactics they use, even trying to infiltrate groups to collect information. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Always be aware, know your enemy!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* (Book) Hunting Cyber Criminals: A Hacker&#039;s Guide to Online Intelligence Gathering Tools and Techniques 1st Edition&lt;br /&gt;
* (Book) Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency&lt;/div&gt;</summary>
		<author><name>Quetzalcoatl</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Tor_Browser_Privacy_Optimization&amp;diff=1764</id>
		<title>Tor Browser Privacy Optimization</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Tor_Browser_Privacy_Optimization&amp;diff=1764"/>
		<updated>2025-09-18T19:34:45Z</updated>

		<summary type="html">&lt;p&gt;Quetzalcoatl: Created page with &amp;quot;* Disable JavaScript. To do this, set Security Level to &amp;quot;Safest&amp;quot; in the Tor Browser settings. * Change &amp;quot;privacy.resistFingerprinting.spoofOsInUserAgentHeader&amp;quot; from &amp;quot;false&amp;quot; to &amp;quot;true&amp;quot; (note, this does not work AT ALL in the latest version of the Tor browser).&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;* Disable JavaScript. To do this, set Security Level to &amp;quot;Safest&amp;quot; in the Tor Browser settings.&lt;br /&gt;
* Change &amp;quot;privacy.resistFingerprinting.spoofOsInUserAgentHeader&amp;quot; from &amp;quot;false&amp;quot; to &amp;quot;true&amp;quot; (note, this does not work AT ALL in the latest version of the Tor browser).&lt;/div&gt;</summary>
		<author><name>Quetzalcoatl</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Initial_Access_Tactics,_techniques_and_procedures&amp;diff=1758</id>
		<title>Initial Access Tactics, techniques and procedures</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Initial_Access_Tactics,_techniques_and_procedures&amp;diff=1758"/>
		<updated>2025-07-22T17:11:07Z</updated>

		<summary type="html">&lt;p&gt;Quetzalcoatl: /* Services */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Phishing ==&lt;br /&gt;
[https://www.frontiersin.org/articles/10.3389/fcomp.2021.563060/full Phishing] is the most common attack method favored by advanced persistent threat groups and cyber criminal organized gangs. This is because it relies on social engineering to trick the target to either download a malicious e-mail attachment or click on a malicious link.&lt;br /&gt;
&lt;br /&gt;
==== Tools ====&lt;br /&gt;
* https://0xboku.com/2021/07/12/ArtOfDeviceCodePhish.html&lt;br /&gt;
* https://medium.com/maltrak/com-objects-p-2-your-stealthy-fileless-attack-bf78318d9165&lt;br /&gt;
* https://infosecwriteups.com/recipe-for-a-successful-phishing-campaign-part-1-2-dc23d927ec55&lt;br /&gt;
* https://www.xanthus.io/mastering-the-simulated-phishing-attack&lt;br /&gt;
* https://github.com/Arno0x/EmbedInHTML&lt;br /&gt;
* https://github.com/L4bF0x/PhishingPretexts&lt;br /&gt;
* http://lockboxx.blogspot.com/2018/12/gophish-evilginx2-for-phishing.html&lt;br /&gt;
* https://book.hacktricks.xyz/phishing-methodology&lt;br /&gt;
* https://outflank.nl/blog/2020/03/30/mark-of-the-web-from-a-red-teams-perspective&lt;br /&gt;
* https://delta.navisec.io/a-pentesters-guide-part-4-grabbing-hashes-and-forging-external-footholds/&lt;br /&gt;
* https://www.rootshellsecurity.net/ntlm_theft-a-tool-for-file-based-forced-ntlm-hash-disclosure/&lt;br /&gt;
* https://getgophish.com/ Be sure to [https://www.sprocketsecurity.com/blog/never-had-a-bad-day-phishing-how-to-set-up-gophish-to-evade-security-controls remove the identifying headers gophish adds]&lt;br /&gt;
* https://github.com/curtbraz/PhishAPI&lt;br /&gt;
* https://github.com/edoverflow/can-i-take-over-xyz&lt;br /&gt;
* https://blog.sublimesecurity.com/red-team-techniques-gaining-access-on-an-external-engagement-through-spear-phishing/&lt;br /&gt;
* Phishing with GoPhish and DigitalOcean: https://www.ired.team/offensive-security/initial-access/phishing-with-gophish-and-digitalocean | [https://www.sprocketsecurity.com/blog/never-had-a-bad-day-phishing-how-to-set-up-gophish-to-evade-security-controls remove the identifying headers gophish adds]&lt;br /&gt;
* Phishing with MS Office: https://www.ired.team/offensive-security/initial-access/phishing-with-ms-office&lt;br /&gt;
&lt;br /&gt;
== Password Attacks ==&lt;br /&gt;
Groups like [https://www.microsoft.com/en-us/security/blog/2022/03/22/dev-0537-criminal-actor-targeting-organizations-for-data-exfiltration-and-destruction/ Lapsus$] show&#039;s the world that you don&#039;t need to be a great technical hacker to pwn massive corporations and if common password and multi-factor authentication (MFA) attacks work on the likes of [https://en.wikipedia.org/wiki/Lapsus$ Uber, Rockstar games, Okta and so on] then they will work on our hacktivist targets!&lt;br /&gt;
&lt;br /&gt;
If your target uses multi-factor authentication you can try either [https://www.forbes.com/sites/daveywinder/2022/09/18/has-uber-been-hacked-company-investigates-cybersecurity-incident-as-law-enforcement-alerted social engineering] or MFA fatigue.&lt;br /&gt;
&lt;br /&gt;
=== Usernames ===&lt;br /&gt;
Create a bespoke username word list based on OSINT, recon, permutations and your targets employee LinkedIn, website and other social media profiles to aid in your password attacks to develop possible usernames and e-mails for password spraying.&lt;br /&gt;
&lt;br /&gt;
* https://github.com/digininja/CeWL&lt;br /&gt;
* https://github.com/Mebus/cupp&lt;br /&gt;
* https://github.com/digininja/RSMangler&lt;br /&gt;
* https://github.com/sc0tfree/mentalist&lt;br /&gt;
* https://github.com/urbanadventurer/username-anarchy&lt;br /&gt;
* https://github.com/vysecurity/LinkedInt&lt;br /&gt;
* https://github.com/initstring/linkedin2username&lt;br /&gt;
* https://github.com/shroudri/username_generator&lt;br /&gt;
&lt;br /&gt;
=== Passwords ===&lt;br /&gt;
Common and leaked credentials to test login portals and network services.&lt;br /&gt;
&lt;br /&gt;
==== Default passwords ====&lt;br /&gt;
* https://cirt.net/passwords&lt;br /&gt;
* https://default-password.info&lt;br /&gt;
* https://datarecovery.com/rd/default-passwords&lt;br /&gt;
* https://github.com/ihebski/DefaultCreds-cheat-sheet&lt;br /&gt;
&lt;br /&gt;
==== Common and leaked passwords ====&lt;br /&gt;
* https://wiki.skullsecurity.org/index.php?title=Passwords&lt;br /&gt;
* https://github.com/danielmiessler/SecLists/tree/master/Passwords&lt;br /&gt;
* https://github.com/danielmiessler/SecLists/tree/master/Passwords/Leaked-Databases&lt;br /&gt;
* https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt&lt;br /&gt;
* https://github.com/projectdiscovery/nuclei-templates/tree/main/helpers/wordlists&lt;br /&gt;
&lt;br /&gt;
=== Password cracking tools ===&lt;br /&gt;
&lt;br /&gt;
* https://github.com/byt3bl33d3r/SprayingToolkit&lt;br /&gt;
* https://www.kali.org/tools/hydra&lt;br /&gt;
* https://www.kali.org/tools/brutespray&lt;br /&gt;
* https://www.kali.org/tools/medusa&lt;br /&gt;
* https://www.kali.org/tools/patator&lt;br /&gt;
* https://github.com/1N3/BruteX&lt;br /&gt;
&lt;br /&gt;
=== Searching leaks ===&lt;br /&gt;
* https://github.com/khast3x/h8mail [Free but includes paid services]&lt;br /&gt;
&lt;br /&gt;
==== Services ====&lt;br /&gt;
&#039;&#039;&#039;Please note: DO NOT use intelx[.]io as they [https://web.archive.org/web/20230319045845/https://twitter.com/_IntelligenceX/status/1610302930069889024 have been seen doxing hackers] in the past and [https://web.archive.org/web/20230323031901/https://blog.intelx.io/2020/07/05/why-we-are-going-to-block-tor-ips block the use of Tor]. AVOID!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
You can use services that compile COMBO lists (leaked credentials) to search for your targets domain, then download the results and use them in a password attack to see whether or not your target recycles their credentials.&lt;br /&gt;
&lt;br /&gt;
* https://haveibeenpwned.com&lt;br /&gt;
* https://stealerlo.gs/&lt;br /&gt;
* https://leak-lookup.com [Paid. Accepts crypto (XMR &amp;amp; BTC)]&lt;br /&gt;
* https://dehashed.com [Paid. Accepts crypto (BTC)]&lt;br /&gt;
&lt;br /&gt;
Once your leaks have been downloaded you can [https://archive.ph/C8tI2 parse] your results in the format, e-mail:pass.&lt;br /&gt;
&lt;br /&gt;
=== Password spraying ===&lt;br /&gt;
Employees commonly use recycled and weak credentials for convenience. If you already have valid passwords you can try and spray them across different services to test whether they have been recycled on other services or not. You can also take common passwords [https://github.com/danielmiessler/SecLists/blob/master/Passwords/common_corporate_passwords.lst (Spring2023)] and spray them hoping an employee uses a weak and guessable credential.&lt;br /&gt;
 &lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://pentestlab.blog/2019/09/05/microsoft-exchange-password-spraying&lt;br /&gt;
* https://github.com/blacklanternsecurity/TREVORspray&lt;br /&gt;
* https://github.com/knavesec/CredMaster&lt;br /&gt;
* https://github.com/xFreed0m/RDPassSpray&lt;br /&gt;
* https://github.com/dafthack/MailSniper&lt;br /&gt;
&lt;br /&gt;
=== Hash cracking ===&lt;br /&gt;
[https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Hash%20Cracking.md Crack password hashes] using both online and offline tools!&lt;br /&gt;
&lt;br /&gt;
==== Identify hash ====&lt;br /&gt;
* https://github.com/blackploit/hash-identifier&lt;br /&gt;
&lt;br /&gt;
==== Online tools ====&lt;br /&gt;
* https://hashes.com/en/decrypt/hash [Free &amp;amp; Paid]&lt;br /&gt;
* https://crackstation.net&lt;br /&gt;
&lt;br /&gt;
==== Offline tools ====&lt;br /&gt;
* https://github.com/hashcat/hashcat&lt;br /&gt;
* https://github.com/openwall/john&lt;br /&gt;
* https://github.com/NotSoSecure/password_cracking_rules&lt;br /&gt;
&lt;br /&gt;
== Buying access ==&lt;br /&gt;
&lt;br /&gt;
You can use the russian market to purchase credentials stolen from targets through the use of info stealer malware. Search your target here to see if you can make a quick win gaining access to an employee account. Any account that allows internal access is always a great start.&lt;br /&gt;
* http://flydedxmmddhgt3vfhv6om63ra2u2x4jxginulhxb6nzcnj3wwgavwyd.onion [Paid]&lt;br /&gt;
&lt;br /&gt;
You can also find access brokers selling network access inside of companies on forums. Services include but is not limited to account credentials, shells, implants, and other remote management software (RDP, VPN, SSH, etc).&lt;br /&gt;
&lt;br /&gt;
* https://xss.is ([http://xssforumv3isucukbxhdhwz67hoa5e2voakcfkuieq4ch257vsburuid.onion Tor])&lt;br /&gt;
* https://exploit.in [Paid] ([https://exploitivzcm5dawzhe6c32bbylyggbjvh5dyvsvb5lkuz5ptmunkmqd.onion Tor])&lt;br /&gt;
* https://ramp4u.io [Free &amp;amp; Paid] ([http://rampjcdlqvgkoz5oywutpo6ggl7g6tvddysustfl6qzhr5osr24xxqqd.onion Tor])&lt;br /&gt;
&lt;br /&gt;
== Spray and pray ==&lt;br /&gt;
As seen by [https://enlacehacktivista.org/hackback2.webm Guacamaya], hacktivists can benefit from a highly targeted spray and pray campaign whereby you scan IP ranges of countries of interest or your target companies IP ranges for critical vulnerabilities and attack protocols with a password attack. In the case of Guacamaya they scanned and exploited proxyshell and yoinked all their target e-mails out of their Microsoft exchange e-mail servers and leaked them. You can also do the same! See [https://enlacehacktivista.org/index.php?title=Scanning_and_Recon scanning and recon] for tools such as [https://github.com/projectdiscovery/nuclei nuclei] and the [https://nmap.org/book/nse.html nmap scripting engine] (NSE) to then vulnerability scan the IP addresses you discover.&lt;br /&gt;
&lt;br /&gt;
=== Networks ===&lt;br /&gt;
&lt;br /&gt;
==== Vulnerability Scanning ====&lt;br /&gt;
We can use a vulnerability scanning spray and pray technique on [https://attack.mitre.org/techniques/T1190 publicly facing applications] to masscan the internet or specific IP ranges for critical vulnerabilities that we can later exploit and gain initial access into target networks with. Here we scan for and exploit both Proxyshell and CVE-2018-13379 as they are both high severity and critical CVE vulnerabilities. In your attacks focus on [https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a new] and [https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-117a old] CVE vulnerabilities that are commonly exploited.&lt;br /&gt;
&lt;br /&gt;
Here we port scan IP ranges for either the entire internet or specific country IP ranges, append those ports to the end of the IP address separated with a colon and then proceed to vulnerability scan the discovered hosts before finally exploiting the identified vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
If the output from the scans is too large, then you can use the [https://linux.die.net/man/1/split split] command to break the output file up into smaller files and scan against those via multiple [https://linux.die.net/man/1/screen screen] windows/sessions to make your scanning more efficient.&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;code&amp;gt;split -l 10000 results.txt results_&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;IP Ranges&#039;&#039;&#039;:&lt;br /&gt;
* List of IP ranges from popular cloud providers: https://kaeferjaeger.gay/?dir=ip-ranges&lt;br /&gt;
* CIDR country-level IP data, straight from the Regional Internet Registries, updated hourly: https://github.com/herrbischoff/country-ip-blocks&lt;br /&gt;
* [https://github.com/robertdavidgraham/masscan#how-to-scan-the-entire-internet Scan the entire internet:] 0.0.0.0/0&lt;br /&gt;
&lt;br /&gt;
===== Proxyshell =====&lt;br /&gt;
&#039;&#039;&#039;Tool&#039;&#039;&#039;: [https://github.com/robertdavidgraham/masscan masscan]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1.&#039;&#039;&#039; Scan for [https://www.mandiant.com/resources/blog/pst-want-shell-proxyshell-exploiting-microsoft-exchange-servers Proxyshell]:&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://github.com/herrbischoff/country-ip-blocks ranges.txt] --rate 50000 -p443 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] | grep -Eo &#039;[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+&#039; &amp;gt; results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;code&amp;gt;sed -i &#039;s/$/:443/&#039; results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;[https://github.com/projectdiscovery/nuclei nuclei] -l results.txt -t [https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-34473.yaml nuclei-templates/http/cves/2021/CVE-2021-34473.yaml] -o vulns.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Exploit Discovered hosts: [[Proxyshell]]&lt;br /&gt;
&lt;br /&gt;
===== CVE-2018-13379 =====&lt;br /&gt;
&#039;&#039;&#039;2.&#039;&#039;&#039; Scan for [https://www.ic3.gov/Media/News/2021/210402.pdf CVE-2018-13379]:&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://github.com/herrbischoff/country-ip-blocks ranges.txt] --rate 50000 -p4443,10443,8443 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] --output-format list --output-file results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;awk &#039;{ print $4 &amp;quot;:&amp;quot; $3 }&#039; results.txt &amp;gt; final_results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;[https://github.com/projectdiscovery/nuclei nuclei] -l final_results.txt -t [https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2018/CVE-2018-13379.yaml nuclei-templates/http/cves/2018/CVE-2018-13379.yaml] -o vulns.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
Exploit Discovered hosts: [[Fortinet SSL VPN Path Traversal]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tool&#039;&#039;&#039;: [https://github.com/zmap/zmap zmap]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1.&#039;&#039;&#039; Scan for Microsoft Exchange E-mail Servers:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
sudo zmap -q -p 443 | httpx -silent -s -sd -location \&lt;br /&gt;
&amp;gt; | awk &#039;/owa/ { print substr($1,9) }&#039; &amp;gt; owa.txt&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;2.&#039;&#039;&#039; Vulnerability scan discovered hosts for [[Proxyshell]] using [https://github.com/GossiTheDog/scanning/blob/main/http-vuln-exchange-proxyshell.nse NSE] &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
nmap -p 443 -Pn -n \&lt;br /&gt;
&amp;gt; --script http-vuln-exchange-proxyshell.nse -iL owa.txt&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://enlacehacktivista.org/hackback2.webm Exploit Discovered hosts]&lt;br /&gt;
&lt;br /&gt;
===== Domains =====&lt;br /&gt;
Mass subdomain enumerating, port scanning and vulnerability scanning domains at the start of an operation when targeting a country or specific TLDs (.gov) is a great way to get a lot of coverage and find low hanging fruit vulnerabilities which may serve as the initial access vector when hacking your targets.&lt;br /&gt;
&lt;br /&gt;
See [[Domain Spray and Pray]] scanning.&lt;br /&gt;
&lt;br /&gt;
==== Password Attacks ====&lt;br /&gt;
A lot of organizations use VPNs and RDPs to allow employees and third-party contractors to remotely connect into the internal network of the organization. For either developer, testing, lazy administration or forgotten about servers these systems can be left running with weak or default credentials with no multi-factor authentication in place. Port scan the internet for ports they commonly run on, cross referencing against Shodan for standard and non-standard ports then use common and default credentials.&lt;br /&gt;
&lt;br /&gt;
===== RDP =====&lt;br /&gt;
&#039;&#039;&#039;1.&#039;&#039;&#039; [https://github.com/galkan/crowbar Remote Desktop (RDP) Brute forcing]:&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://enlacehacktivista.org/images/4/4b/Latin_american_ranges.txt ranges.txt] --rate 50000 -p3389 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] | grep -Eo &#039;[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+&#039; &amp;gt; results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;[https://github.com/vanhauser-thc/thc-hydra hydra] -L [https://github.com/danielmiessler/SecLists/tree/master/Usernames usernames.txt] -P [https://github.com/danielmiessler/SecLists/tree/master/Passwords passwords.txt] -M targets.txt -t 16 rdp -o results&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== VPN =====&lt;br /&gt;
&#039;&#039;&#039;2.&#039;&#039;&#039; Virtual Private Network (VPN) Brute forcing:&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;sudo [https://github.com/robertdavidgraham/masscan masscan] -Pn -sS -iL [https://enlacehacktivista.org/images/4/4b/Latin_american_ranges.txt ranges.txt] --rate 50000 -p10443,443 --open-only --excludefile [https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2 block.txt] | grep -Eo &#039;[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+&#039; &amp;gt; results.txt&amp;lt;/code&amp;gt;&lt;br /&gt;
* To brute-force see: https://enlacehacktivista.org/index.php?title=VPN_brute_forcing&lt;/div&gt;</summary>
		<author><name>Quetzalcoatl</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Exploitation&amp;diff=1757</id>
		<title>Exploitation</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Exploitation&amp;diff=1757"/>
		<updated>2025-07-22T17:08:51Z</updated>

		<summary type="html">&lt;p&gt;Quetzalcoatl: /* Cross-site scripting (XSS) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=== Payloads ===&lt;br /&gt;
* https://github.com/swisskyrepo/PayloadsAllTheThings&lt;br /&gt;
* https://github.com/payloadbox&lt;br /&gt;
* WAF bypass payloads: https://github.com/waf-bypass-maker/waf-community-bypasses&lt;br /&gt;
&lt;br /&gt;
=== Metasploit ===&lt;br /&gt;
* Install on server: https://docs.metasploit.com/docs/using-metasploit/getting-started/nightly-installers.html&lt;br /&gt;
&lt;br /&gt;
=== Public exploits ===&lt;br /&gt;
* https://www.kali.org/tools/exploitdb/#searchsploit&lt;br /&gt;
&lt;br /&gt;
=== SQL injection (SQLi) ===&lt;br /&gt;
* https://github.com/sqlmapproject/sqlmap&lt;br /&gt;
* Tamper agent scripts for sqlmap (WAF bypass): https://forum.bugcrowd.com/t/sqlmap-tamper-scripts-sql-injection-and-waf-bypass/423&lt;br /&gt;
* https://github.com/r0oth3x49/ghauri&lt;br /&gt;
* SQL Injection &amp;amp; XSS Playground: https://www.ired.team/offensive-security-experiments/offensive-security-cheetsheets/sql-injection-xss-playground#classic-sql-injection&lt;br /&gt;
&lt;br /&gt;
=== Cross-site scripting (XSS) ===&lt;br /&gt;
* https://github.com/hahwul/dalfox&lt;br /&gt;
* https://github.com/s0md3v/XSStrike&lt;br /&gt;
* https://github.com/mandatoryprogrammer/xsshunter&lt;br /&gt;
* https://www.ired.team/offensive-security-experiments/offensive-security-cheetsheets/sql-injection-xss-playground#xss&lt;br /&gt;
&lt;br /&gt;
=== Command Injection ===&lt;br /&gt;
* https://github.com/commixproject/commix&lt;br /&gt;
&lt;br /&gt;
=== SSRF ===&lt;br /&gt;
* https://github.com/swisskyrepo/SSRFmap&lt;/div&gt;</summary>
		<author><name>Quetzalcoatl</name></author>
	</entry>
</feed>