• Hacked Twitter Acc Analytics Page

    08/04/2019 at 16:25 1 comment

    @hybridanalysis Scan of my un-private #hacked #iphone #twitter analytics page

    https://analytics.twitter.com/accounts/18ce54vevpn/audience_insights?audience_types=followers%2C&audience_ids=%2A%2C

    Found malicious artifacts related to "104.244.42.195": ...

    URL: https://cards.twitter.com/cards/18ce54xex7k/7ln6x (AV positives: 1/70 scanned on 07/06/2019 23:32:31)
    URL: https://cards.twitter.com/cards/18ce54xex7k/7mgqd (AV positives: 3/70 scanned on 07/02/2019 22:48:09)
    URL: https://cards.twitter.com/cards/18ce54wn2p4/7cafy/?m=transaction-ripple&v=037e3a4ea3ff&e=fprLiOGocypqNwuDLD0Y3UkWimTumGnvlTFjDDehDeo= (AV positives: 1/70 scanned on 06/29/2019 08:36:09)
    URL: https://cards.twitter.com/cards/18ce54wwchl/7f5vs (AV positives: 1/70 scanned on 05/23/2019 20:35:53)
    URL: http://104.244.42.195/ (AV positives: 1/67 scanned on 06/25/2018 21:56:33)
    File SHA256: 2beaf5e42dc463c3efe701aa44938fffcfb988f640dc33f20a51394a32f16c15 (AV positives: 1/72 scanned on 08/04/2019 07:16:51)
    File SHA256: 5d4a1f4b165af47f8a5e6e25995cd058b10454d7c13db48570ac276d2253d7e2 (AV positives: 1/72 scanned on 08/03/2019 09:07:36)
    File SHA256: 1c83115e5d5e68cfcc20c0a9f2ca8ddad0262dcdc0ef11f93081d0eb31fba435 (AV positives: 1/73 scanned on 08/03/2019 10:48:20)
    File SHA256: 2430f5bf5606dc7b782cd2fb4d6c3322b1937f88027192e2b59f05c680c7af03 (AV positives: 2/71 scanned on 08/03/2019 10:41:39)
    File SHA256: 8f812113bff364868c9c46c96cac3c8fb96cc33c108f22a361c6a83de9897346 (AV positives: 2/72 scanned on 08/03/2019 11:04:14)
    File SHA256: 7d419702a7732e34436c95e1d20a423871c27b69ec4830bb3d912a1146f9ef09 (Date: 03/21/2019 08:21:09)
    Found malicious artifacts related to "172.217.4.195": ...

    File SHA256: 1c8b03921bffc38281af823e7db17e0dbdfbafe39e7b1b96c0f43f2c7dd069be (AV positives: 58/72 scanned on 08/01/2019 21:34:14)
    File SHA256: 6fb0ae3f351806fcc92d9d894f72fd2ea13831f8eb5e14e01a9969d5cf905992 (AV positives: 27/71 scanned on 07/18/2019 22:05:33)
    File SHA256: 84bda664d4f6f5da6e06b43fc854123b7bb905c7a87eab7eb4d21c553f74eb8d (AV positives: 1/71 scanned on 07/12/2019 16:43:09)
    File SHA256: 4de062a251b1b38575f8e815823b27f05e8a8eba69aec44b89bfa5a88155c747 (AV positives: 48/74 scanned on 07/02/2019 21:52:48)
    File SHA256: 3ad692ef350cbbbd5779cf0f86e714f9378b54c8361f2aa99dcbe704daa164f7 (AV positives: 53/70 scanned on 06/10/2019 22:40:21)
    File SHA256: d9ae1d7a3953510c6a9f6e66365385da974fd8a7e7a16068333d0afd01497b4c (Date: 03/01/2018 13:38:56)

  • Seems I have BeEF, on an iPhone? as thats all i have

    08/04/2019 at 13:03 0 comments

    https://github.com/beefproject/beef/commit/1583a10a5a02f3162c9ab7482ab27e813f0abec7#diff-bc67b952e8a9350e40576fa30cdf717c
    

    core/main/router/router.rb
    @@ -1,136 +1,136 @@
    Why GitHub?
    Enterprise Explore
    Marketplace
    Pricing
    Search
    Sign in Sign up
    beefproject / beef Code Issues 99
    Watch 372
    Insights
    Star 4,416
    Fork 1,061
    Browse files
    ... 11#
    ... @@ -1,62 +1,59 @@
    2 2
    3 3
    4 4
    55#
    6 6 77
    # Copyright (c) 2006-2019 Wade Alcorn - wade@bindshell.net
    # Browser Exploitation Framework (BeEF) - http://beefproject.com
    # See the file 'doc/COPYING' for copying permission
    # BeEF Configuration file
    beef:
        version: '0.4.7.0-alpha'
        # More verbose messages (server-side)
        debug: false
        # More verbose messages (client-side)
        client_debug: false
        # Used for generating secure tokens
        crypto_default_value_length: 80
        # Credentials to authenticate in BeEF.
        # Used by both the RESTful API and the Admin interface
        credentials:
            user:   "beef"
            passwd: "beef"
        # Interface / IP restrictions
        restrictions:
            # subnet of IP addresses that can hook to the framework
            permitted_hooking_subnet: "0.0.0.0/0"
            # subnet of IP addresses that can connect to the admin UI
            #permitted_ui_subnet: "127.0.0.1/32"
            permitted_ui_subnet: "0.0.0.0/0"
            # slow API calls to 1 every  api_attempt_delay  seconds
            api_attempt_delay: "0.05"
    # HTTP server
        http:
            debug: false #Thin::Logging.debug, very verbose. Prints also full exception stack trace.
            host: "0.0.0.0"
            port: "3000"
            # Decrease this setting to 1,000 (ms) if you want more responsiveness
            #  when sending modules and retrieving results.
            # NOTE: A poll timeout of less than 5,000 (ms) might impact performance
            #  when hooking lots of browsers (50+).
            # Enabling WebSockets is generally better (beef.websocket.enable)
            xhr_poll_timeout: 1000
            # Host Name / Domain Name
            # If you want BeEF to be accessible via hostname or domain name (ie, DynDNS),
            #   set the public hostname below:
            #public: ""      # public hostname/IP address
            # Reverse Proxy / NAT
            # If you want BeEF to be accessible behind a reverse proxy or NAT,
            #   set both the publicly accessible hostname/IP address and port below:
            #public: ""      # public hostname/IP address
            #public_port: "" # public port (experimental)
            # Web Admin user interface URI
            web_ui_basepath: "/ui"
    # Hook
            hook_file: "/hook.js"
            hook_session_name: "BEEFHOOK"
            session_cookie_name: "BEEFSESSION"
            # Allow one or multiple origins to access the RESTful API using CORS
            # For multiple origins use: "http://browserhacker.com, http://domain2.com"
            restful_api:
                allow_cors: false
                cors_allowed_domains: "http://browserhacker.com"
            # Prefer WebSockets over XHR-polling when possible.
            websocket:
                enabled


    # Copyright (c) 2006-2019 Wade Alcorn -...

    Read more »

  • Seems I have BeEF, on an iPhone? as thats all i have

    08/04/2019 at 13:03 0 comments

    https://github.com/beefproject/beef/commit/1583a10a5a02f3162c9ab7482ab27e813f0abec7#diff-bc67b952e8a9350e40576fa30cdf717c
    

    core/main/router/router.rb
    @@ -1,136 +1,136 @@
    Why GitHub?
    Enterprise Explore
    Marketplace
    Pricing
    Search
    Sign in Sign up
    beefproject / beef Code Issues 99
    Watch 372
    Insights
    Star 4,416
    Fork 1,061
    Browse files
    ... 11#
    ... @@ -1,62 +1,59 @@
    2 2
    3 3
    4 4
    55#
    6 6 77
    # Copyright (c) 2006-2019 Wade Alcorn - wade@bindshell.net
    # Browser Exploitation Framework (BeEF) - http://beefproject.com
    # See the file 'doc/COPYING' for copying permission
    # BeEF Configuration file
    beef:
        version: '0.4.7.0-alpha'
        # More verbose messages (server-side)
        debug: false
        # More verbose messages (client-side)
        client_debug: false
        # Used for generating secure tokens
        crypto_default_value_length: 80
        # Credentials to authenticate in BeEF.
        # Used by both the RESTful API and the Admin interface
        credentials:
            user:   "beef"
            passwd: "beef"
        # Interface / IP restrictions
        restrictions:
            # subnet of IP addresses that can hook to the framework
            permitted_hooking_subnet: "0.0.0.0/0"
            # subnet of IP addresses that can connect to the admin UI
            #permitted_ui_subnet: "127.0.0.1/32"
            permitted_ui_subnet: "0.0.0.0/0"
            # slow API calls to 1 every  api_attempt_delay  seconds
            api_attempt_delay: "0.05"
    # HTTP server
        http:
            debug: false #Thin::Logging.debug, very verbose. Prints also full exception stack trace.
            host: "0.0.0.0"
            port: "3000"
            # Decrease this setting to 1,000 (ms) if you want more responsiveness
            #  when sending modules and retrieving results.
            # NOTE: A poll timeout of less than 5,000 (ms) might impact performance
            #  when hooking lots of browsers (50+).
            # Enabling WebSockets is generally better (beef.websocket.enable)
            xhr_poll_timeout: 1000
            # Host Name / Domain Name
            # If you want BeEF to be accessible via hostname or domain name (ie, DynDNS),
            #   set the public hostname below:
            #public: ""      # public hostname/IP address
            # Reverse Proxy / NAT
            # If you want BeEF to be accessible behind a reverse proxy or NAT,
            #   set both the publicly accessible hostname/IP address and port below:
            #public: ""      # public hostname/IP address
            #public_port: "" # public port (experimental)
            # Web Admin user interface URI
            web_ui_basepath: "/ui"
    # Hook
            hook_file: "/hook.js"
            hook_session_name: "BEEFHOOK"
            session_cookie_name: "BEEFSESSION"
            # Allow one or multiple origins to access the RESTful API using CORS
            # For multiple origins use: "http://browserhacker.com, http://domain2.com"
            restful_api:
                allow_cors: false
                cors_allowed_domains: "http://browserhacker.com"
            # Prefer WebSockets over XHR-polling when possible.
            websocket:
                enabled


    # Copyright (c) 2006-2019 Wade Alcorn - wade@bindshell.net...

    Read more »