Sunday, August 30, 2020

macSubstrate - Tool For Interprocess Code Injection On macOS


macSubstrate is a platform tool for interprocess code injection on macOS, with the similar function to Cydia Substrate on iOS. Using macSubstrate, you can inject your plugins (.bundle or .framework) into a mac app (including sandboxed apps) to tweak it in the runtime.
  • All you need is to get or create plugins for your target app.
  • No trouble with modification and codesign for the original target app.
  • No more work after the target app is updated.
  • Super easy to install or uninstall a plugin.
  • Loading plugins automatically whenever the target app is relaunched.
  • Providing a GUI app to make injection much easier.

Prepare
  • Disable SIP
  • Why should disable SIP
    System Integrity Protection is a new security policy that applies to every running process, including privileged code and code that runs out of the sandbox. The policy extends additional protections to components on disk and at run-time, only allowing system binaries to be modified by the system installer and software updates. Code injection and runtime attachments to system binaries are no longer permitted.

Usage
  1. download macSubstrate.app, put into /Applications and launch it.
    StatusBar
  2. grant authorization if needed.
  3. install a plugin by importing or dragging into macSubstrate.
    ToInstall
  4. launch the target app.
    step 3 and step 4 can be switched
    Once a plugin is installed by macSubstrate, it will take effect immediately. But if you want it to work whenever the target app is relaunched or macOS is restarted, you need to keep macSubstrate running and allow it to automatically launch at login.
  5. uninstall a plugin when you do not need it anymore.
    Installed

Plugin
macSubstrate supports plugins of .bundle or .framework, so you just need to create a valid .bundle or .framework file. The most important thing is to add a key macSubstratePlugin into the info.plist, with the dictionary value:
Key Value
TargetAppBundleID the target app's CFBundleIdentifier, this tells macSubstrate which app to inject.
Description brief description of the plugin
AuthorName author name of the plugin
AuthorEmail author email of the plugin
Please check the demo plugins demo.bundle and demo.framework for details.

Xcode Templates
macSubstrate also provides Xcode Templates to help you create plugins conveniently:
  1. ln -fhs ./macSubstratePluginTemplate ~/Library/Developer/Xcode/Templates/macSubstrate\ Plugin
  2. Launch Xcode, and there will be 2 new plugin templates for you.

Security
  1. SIP is a new security policy on macOS, which will help to keep you away from potential security risk. Disable it means you will lose the protection from SIP.
  2. If you install a plugin from a developer, you should be responsible for the security of the plugin. If you do not trust it, please do not install it. macSubstrate will help to verify the code signature of a plugin, and I suggest you to scan it using VirusTotal. Anyway, macSubstrate is just a tool, and it is your choice to decide what plugin to install.


Related posts

  1. Ethical Hacker Tools
  2. Black Hat Hacker Tools
  3. Hacking Tools 2019
  4. Pentest Tools Review
  5. Pentest Tools Url Fuzzer
  6. Pentest Tools Kali Linux
  7. Hacking Tools For Pc
  8. Hack Tools For Mac
  9. Pentest Recon Tools
  10. Pentest Tools Download
  11. Hacking Tools 2019
  12. Pentest Tools Find Subdomains
  13. Tools Used For Hacking
  14. Hacker Tools Github
  15. Kik Hack Tools
  16. Hacking Tools Download
  17. Hacking Tools Download
  18. Hacker Tools
  19. Pentest Tools Port Scanner
  20. Hacking Tools Online
  21. Hacking App
  22. Hacker Tools Apk Download
  23. Usb Pentest Tools
  24. Hack Tools For Windows
  25. Pentest Reporting Tools
  26. Top Pentest Tools
  27. Pentest Tools Kali Linux
  28. Blackhat Hacker Tools
  29. Hacking Tools Windows 10
  30. Hacking Tools Pc
  31. Hack Tools Github
  32. Blackhat Hacker Tools
  33. Hacks And Tools
  34. What Is Hacking Tools
  35. Hack Tools For Games
  36. Hacker Tools Linux
  37. Hacking Tools For Pc
  38. Hacker Security Tools
  39. Hack Tools Github
  40. Bluetooth Hacking Tools Kali
  41. Hacking Tools For Windows
  42. Hacker Tools 2020
  43. Hacking Apps
  44. Hacker Search Tools
  45. Best Pentesting Tools 2018
  46. Hak5 Tools
  47. How To Make Hacking Tools
  48. Nsa Hack Tools Download
  49. Underground Hacker Sites
  50. Hack Tools
  51. Hack And Tools
  52. Hacking App
  53. Tools Used For Hacking

Voodoo-Kali - Kali Linux Desktop On Windows 10

Iemhacker-kali-windows

How it works?
 * Kali Linux with XFCE Desktop Environment in Windows Subsystem for Linux (WSL)
 * VcXsrv X Server for Windows is doing the hard GUI lifting
 * XFCE is started natively in WSL and displayed by VcXsrv

Install Voodoo-Kali:
 1, Enable WSL and install Kali Linux from the Microsoft Store. Read Install Kali Linux desktop on Windows 10 from Microsoft Store

 2, To start Kali Linux in Windows 10, open Command Prompt and enter the command: kali

 3, Enter this commands:
      apt install wget -y 
      wget https://raw.githubusercontent.com/Re4son/WSL-Kali-X/master/install-WSL-Kali-X
      bash ./install-WSL-Kali-X

 4, Download and install VcXsrv Windows X Server from SourceForge

 5, Start VcXsrv, accept change in firewall rules, exit VcXsrv

Run Voodoo-Kali:
   Start kali in Windows as normal user (that's default), and launch Voodoo-Kali:
    * as normal user: ./start-xfce
    * as root: sudo /root/xtart-xfce

Run Kali Desktop in an RDP session:
   In Kali Linux WSL, type: sudo /etc/init.d/xrdp start
   In Windows 10, open Run and enter mstsc.exe and connect to "127.0.0.1:3390"
remote%2Bdesktop

Status: Voodoo-Kali is in its infancy and it is far from being elegant. I'm working on it though and step by step I'll push out improvements. Below a snippet of the To-Do list:
 * Clean up and comment the scripts
 * Make for a cleaner exit
 * Better error handling and dependency checking (get rid of sleep, etc.)
 * Improve stability of Java programs
 * Improve the looks??
 * …

   Any help is truly appreciated, in any shape or form – from tips to pull requests.
   Why don't you join the forums to discuss?

Further Information:
 * Offsec – Kali Linux in the Windows App Store
 * MSDN – Windows Subsystem for Linux Overview

                                       Download Voodoo-Kali
Read more
  1. Best Hacking Tools 2019
  2. Pentest Tools Tcp Port Scanner
  3. Hack Tools
  4. Black Hat Hacker Tools
  5. Pentest Tools For Mac
  6. Hacker Tools Free Download
  7. Black Hat Hacker Tools
  8. How To Install Pentest Tools In Ubuntu
  9. Hacking App
  10. Hacking Tools For Beginners
  11. Best Hacking Tools 2019
  12. Hack Tools Pc
  13. Hacker Tool Kit
  14. Hacking Tools Download
  15. Hacking Tools For Games
  16. Ethical Hacker Tools
  17. Hackers Toolbox
  18. Pentest Tools For Mac
  19. Hacker Tools Apk Download
  20. Nsa Hacker Tools
  21. Hack App
  22. Pentest Tools Alternative
  23. Tools 4 Hack
  24. Pentest Tools For Ubuntu
  25. Hack And Tools
  26. Hacking Tools Kit
  27. World No 1 Hacker Software
  28. Hacker Tools Windows
  29. New Hack Tools
  30. Pentest Tools Linux
  31. Hacking Tools For Pc
  32. Pentest Automation Tools
  33. Physical Pentest Tools
  34. Pentest Tools Review
  35. World No 1 Hacker Software
  36. Pentest Tools Free
  37. Kik Hack Tools
  38. Hacker Tools For Mac
  39. Hacker Tools
  40. Bluetooth Hacking Tools Kali
  41. Hacking Tools Hardware
  42. Hacking App
  43. Tools 4 Hack
  44. Hacker Tools For Pc
  45. Pentest Tools Online
  46. Pentest Tools Url Fuzzer
  47. Hacking Tools For Windows
  48. Pentest Tools Linux
  49. Pentest Tools Review
  50. Hacker Tools Windows
  51. Kik Hack Tools
  52. Hacker Tools Linux
  53. Nsa Hacker Tools
  54. Github Hacking Tools
  55. Hacking Tools 2020
  56. Hack Tools Github
  57. Pentest Tools Subdomain
  58. Pentest Tools Linux
  59. Underground Hacker Sites
  60. Hacking Tools Windows 10
  61. Hacking Tools Pc
  62. Tools Used For Hacking
  63. Hacker Techniques Tools And Incident Handling
  64. Hack Tools
  65. Pentest Tools
  66. Android Hack Tools Github
  67. Blackhat Hacker Tools
  68. Hacking Tools Software
  69. New Hack Tools
  70. Pentest Tools Download
  71. Hack Tools Download
  72. Hacker Tools Windows
  73. Pentest Tools
  74. Pentest Automation Tools
  75. Hack Tools For Ubuntu
  76. Pentest Box Tools Download
  77. Hacker Hardware Tools
  78. Hacker Hardware Tools
  79. Pentest Tools Github
  80. Pentest Automation Tools
  81. Hack Tools For Ubuntu
  82. Hacking App
  83. Hacking Tools Kit
  84. Hacking Tools Github
  85. Pentest Tools Github
  86. Kik Hack Tools
  87. Hacker Search Tools
  88. Hacker Techniques Tools And Incident Handling
  89. New Hack Tools
  90. Hack Tools Download
  91. Pentest Tools Windows
  92. Pentest Recon Tools
  93. Best Hacking Tools 2020
  94. New Hacker Tools
  95. Hacker Tools For Ios
  96. Hacker
  97. Hacking Apps
  98. Hack Tools For Games
  99. Beginner Hacker Tools
  100. Pentest Tools Url Fuzzer
  101. Pentest Box Tools Download
  102. Hak5 Tools
  103. Hacking Tools Windows 10
  104. Kik Hack Tools
  105. Hacker Tools For Pc
  106. Beginner Hacker Tools
  107. Hacker Tools Apk Download
  108. Hacker Tools
  109. Hacker Techniques Tools And Incident Handling
  110. Hacking Tools Github
  111. Hacker Tools For Pc
  112. Pentest Tools Framework
  113. Pentest Tools Port Scanner
  114. Hack Tools Mac
  115. Pentest Tools Android
  116. Hacking Tools And Software
  117. Hacker Tools List
  118. Hack Tool Apk
  119. Pentest Tools Subdomain
  120. Hacker
  121. Hacking Tools For Games
  122. Beginner Hacker Tools
  123. Hacker Tools Windows
  124. Pentest Tools
  125. Pentest Tools Tcp Port Scanner
  126. Pentest Tools Open Source
  127. How To Make Hacking Tools
  128. Pentest Tools Kali Linux
  129. Pentest Tools Website
  130. Easy Hack Tools
  131. Hacker Tools Free
  132. Pentest Tools Subdomain
  133. Pentest Tools Bluekeep
  134. Hacking Tools 2019
  135. Pentest Tools Nmap
  136. Pentest Tools Online
  137. Underground Hacker Sites
  138. Hacker Tools Online
  139. Hack Tools 2019
  140. Hacking Tools Software
  141. Pentest Reporting Tools
  142. Hacks And Tools
  143. Hacker
  144. Pentest Tools Port Scanner
  145. Hacker Tools For Windows
  146. Hacking App
  147. Hacking Tools For Windows 7
  148. Hacker Tools Windows
  149. Pentest Reporting Tools
  150. Physical Pentest Tools
  151. Hacker Tools 2020
  152. Hacking Tools Pc
  153. How To Make Hacking Tools
  154. Wifi Hacker Tools For Windows
  155. Tools 4 Hack
  156. Hack Apps
  157. Ethical Hacker Tools
  158. Hacker Techniques Tools And Incident Handling
  159. Usb Pentest Tools
  160. Hacking Tools 2020
  161. Pentest Tools Nmap
  162. Hacking Tools Free Download
  163. What Are Hacking Tools
  164. Hacker Tools Github
  165. Underground Hacker Sites
  166. Hacking Tools Usb
  167. Hacker Search Tools
  168. Hack Tools Download
  169. Hacking Tools For Beginners
  170. Pentest Tools Website

Rastrea2R - Collecting & Hunting For IOCs With Gusto And Style



Ever wanted to turn your AV console into an Incident Response & Threat Hunting machine? Rastrea2r (pronounced "rastreador" - hunter- in Spanish) is a multi-platform open source tool that allows incident responders and SOC analysts to triage suspect systems and hunt for Indicators of Compromise (IOCs) across thousands of endpoints in minutes. To parse and collect artifacts of interest from remote systems (including memory dumps), rastrea2r can execute sysinternal, system commands and other 3rd party tools across multiples endpoints, saving the output to a centralized share for automated or manual analysis. By using a client/server RESTful API, rastrea2r can also hunt for IOCs on disk and memory across multiple systems using YARA rules. As a command line tool, rastrea2r can be easily integrated within McAfee ePO, as well as other AV consoles and orchestration tools, allowing incident responders and SOC analysts to collect forensic evidence and hunt for IOCs without the need for an additional agent, with 'gusto' and style!


Dependencies
  • Python 2.7.x
  • git
  • bottle
  • requests
  • yara-python

Quickstart
  • Clone the project to your local directory (or download the zip file of the project)
$git clone https://github.com/rastrea2r/rastrea2r.git
$cd rastrea2r
  • All the dependencies necessary for the tool to run can be installed within a virtual environment via the provided makefile.
$make help
help - display this makefile's help information
venv - create a virtual environment for development
clean - clean all files using .gitignore rules
scrub - clean all files, even untracked files
test - run tests
test-verbose - run tests [verbosely]
check-coverage - perform test coverage checks
check-style - perform pep8 check
fix-style - perform check with autopep8 fixes
docs - generate project documentation
check-docs - quick check docs consistency
serve-docs - serve project html documentation
dist - create a wheel distribution package
dist-test - test a wheel distribution package
dist-upload - upload a wheel distribution package
  • Create a virtual environment with all dependencies
$make venv
//Upon successful creation of the virtualenvironment, enter the virtualenvironment as instructed, for ex:
$source /Users/ssbhat/.venvs/rastrea2r/bin/activate
  • Start the rastrea2r server by going to $PROJECT_HOME/src/rastrea2r/server folder
$cd src/rastrea2r/server/
$python rastrea2r_server_v0.3.py
Bottle v0.12.13 server starting up (using WSGIRefServer())...
Listening on http://0.0.0.0:8080/
  • Now execute the client program, depending on which platform you are trying to scan choose the target python script appropriately. Currently Windows, Linux and Mac platforms are supported.
$python rastrea2r_osx_v0.3.py -h
usage: rastrea2r_osx_v0.3.py [-h] [-v] {yara-disk,yara-mem,triage} ...

Rastrea2r RESTful remote Yara/Triage tool for Incident Responders

positional arguments: {yara-disk,yara-mem,triage}

modes of operation
yara-disk Yara scan for file/directory objects on disk
yara-mem Yara scan for running processes in memory
triage Collect triage information from endpoint

optional arguments:
-h, --help show this help message and exit
-v, --version show program's version number and exit


Further more, the available options under each command can be viewed by executing the help option. i,e

$python rastrea2r_osx_v0.3.py yara-disk -h
usage: rastrea2r_osx_v0.3.py yara-disk [-h] [-s] path server rule

positional arguments:
path File or directory path to scan
server rastrea2r REST server
rule Yara rule on REST server

optional arguments:
-h, --help show this help message and exit
-s, --silent Suppresses standard output
  • For ex, on a Mac or Unix system you would do:
$cd src/rastrea2r/osx/

$python rastrea2r_osx_v0.3.py yara-disk /opt http://127.0.0.1:8080/ test.yar

Executing rastrea2r on Windows

Currently Supported functionality
  • yara-disk: Yara scan for file/directory objects on disk
  • yara-mem: Yara scan for running processes in memory
  • memdump: Acquires a memory dump from the endpoint ** Windows only
  • triage: Collects triage information from the endpoint ** Windows only

Notes
For memdump and triage modules, SMB shares must be set up in this specific way:
  • Binaries (sysinternals, batch files and others) must be located in a shared folder called TOOLS (read only)
    \path-to-share-foldertools
  • Output is sent to a shared folder called DATA (write only)
    \path-to-share-folderdata
  • For yara-mem and yara-disk scans, the yara rules must be in the same directory where the server is executed from.
  • The RESTful API server stores data received in a file called results.txt in the same directory.

Contributing to rastrea2r project
The Developer Documentation provides complete information on how to contribute to rastrea2r project

Demo videos on Youtube

Presentations

Credits & References



Related word


  1. Free Pentest Tools For Windows
  2. Hacker Tools Apk Download
  3. Pentest Tools Website Vulnerability
  4. Pentest Tools Windows
  5. Hacker
  6. Hack Tools For Pc
  7. Best Hacking Tools 2019
  8. Free Pentest Tools For Windows
  9. Pentest Tools Subdomain
  10. Blackhat Hacker Tools
  11. Pentest Automation Tools
  12. Hacker Tools 2019
  13. Free Pentest Tools For Windows
  14. Hack Tools For Pc
  15. Hacking Tools Hardware
  16. Hacker Tools Apk
  17. Hacking Tools 2020
  18. Tools For Hacker
  19. Hacking Tools Name
  20. Hack Tools For Pc
  21. Hacking Tools 2020
  22. Hacking Tools Github
  23. Hacker Tools Hardware
  24. Usb Pentest Tools
  25. Hacking Tools Kit
  26. Top Pentest Tools
  27. Hack Tools Mac
  28. Hacks And Tools
  29. Pentest Tools Download
  30. Hacking Tools Name
  31. Hacker Tools
  32. Black Hat Hacker Tools
  33. Tools For Hacker
  34. Pentest Tools Framework
  35. Hacker Tools List
  36. Hack App
  37. Free Pentest Tools For Windows
  38. Hacker Tool Kit
  39. Hack Tools Github
  40. Hacker Tools Free Download
  41. Hacker Tools 2019
  42. World No 1 Hacker Software
  43. Hacker Tools For Windows
  44. Beginner Hacker Tools
  45. Hacker Tools Github
  46. Hacking Tools Software
  47. Pentest Tools Framework
  48. Pentest Reporting Tools
  49. Pentest Tools Website Vulnerability
  50. Hacker Hardware Tools
  51. Hackers Toolbox
  52. Growth Hacker Tools
  53. Hack Tools Github
  54. Pentest Tools Linux
  55. Hacker
  56. Hacking Tools Usb
  57. Underground Hacker Sites
  58. Game Hacking
  59. Hacker Tools Free Download
  60. Hacking Tools Windows
  61. Hack Tool Apk No Root
  62. Hacking Tools For Mac