Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update other-web-tricks.md #10

Open
wants to merge 6 commits into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
46 changes: 20 additions & 26 deletions Learning & Hacking.md
100644 → 100755
Original file line number Diff line number Diff line change
@@ -1,51 +1,45 @@
# Learning Pages and VMs
# Páginas de Aprendizado e VMs

## https://tryhackme.com/

Tryhackme is a platform with virtual machines that need to be solved through walkthroughs, which is very good for beginners and normal CTFs where you self must hack into the machines.
TryHackMe é uma plataforma com máquinas virtuais que precisam ser resolvidas através de tutoriais, o que é muito bom para iniciantes e CTFs normais onde você mesmo deve hackear as máquinas.

## https://www.root-me.org/

Root Me é outra página para hackear máquinas virtuais hospedadas online.

## https://www.root-me.org/
## https://www.vulnhub.com/

Rootme is another page for online hosted virtual machines to hack.
VulnHub possúi máquinas para baixar e hackear.

## https://www.hackthebox.eu/ https://academy.hackthebox.eu/catalogue

Hack The Box possúi máquinas online para hackear, mas elas são muito limitadas na versão gratuita.

## https://www.vulnhub.com/

Vulnhub has machines to download and then to hack



## https://www.hackthebox.eu/ https://academy.hackthebox.eu/catalogue

Hackthebox has online machines to hack, but there are very limited in the free version.

Recently the launched their academy, but it is a bit more expensive than for example tryhackme and has less.


Recentemente eles lançaram a academia deles, mas é um pouco mais cara do que por exemplo o TryHackMe.

## https://hack.me/

This site seems to be a community platform


Esse site é uma plataforma da comunidade.

## https://www.hacker101.com/

Free and smale site with videos and CTFs

Gratuito e menor com vídeos e CTFs.

## https://crackmes.one/

This site has a lot of binarys for forensic learning.
Este site tem vários binários para o aprendizado de forense.

## https://overthewire.org/wargames/

The wargames offered by the OverTheWire community can help you to learn and practice security concepts in the form of fun-filled games.
Perfect for beginners.
Os wargames oferecidos pela comunidade da OverTheWire podem ajudar você a aprender e praticar conceitos de segurança em forma de jogos divertidos.
Perfeito para iniciantes.

## https://www.hackthissite.org/missions/basic/

## https://www.hackthissite.org/missions/basic/
Extraído de https://www.hackthissite.org/
HackThisSite.org é lugar gratuito, seguro e legal para que hackers testem e expandam suas habilidades éticas de hacking com desafios, CTFs e mais.

## https://attackdefense.com/

Plataforma da [Pentester Academy](https://www.pentesteracademy.com/onlinelabs) com laboratórios de vários assuntos.
29 changes: 14 additions & 15 deletions android-forensics.md
Original file line number Diff line number Diff line change
@@ -1,24 +1,23 @@
# Android Forensics
# Forense em Android

## Locked Device
## Dispositivo Bloqueado

To start extracting data from an Android device it has to be unlocked. If it's locked you can:
Para começar a extração de dados de um dispositivo Android o mesmo tem que estar desbloqueado. Se ele estiver bloqueado você pode:

* Check if the device has debugging via USB activated.
* Check for a possible [smudge attack](https://www.usenix.org/legacy/event/woot10/tech/full_papers/Aviv.pdf)
* Try with [Brute-force](https://www.cultofmac.com/316532/this-brute-force-device-can-crack-any-iphones-pin-code/)
* Verificar se o dispositivo está com o modo debugging via USB ativado.
* Verificar por um possível [smudge attack](https://www.usenix.org/legacy/event/woot10/tech/full_papers/Aviv.pdf)
* Tentar um ataque de [força bruta](https://www.cultofmac.com/316532/this-brute-force-device-can-crack-any-iphones-pin-code/)

## Data Adquisition
## Aquisição de Dados

Create an [android backup using adb](mobile-apps-pentesting/android-app-pentesting/adb-commands.md#backup) and extract it using [Android Backup Extractor](https://sourceforge.net/projects/adbextractor/): `java -jar abe.jar unpack file.backup file.tar`
Crie um [backup android usando o adb](mobile-apps-pentesting/android-app-pentesting/adb-commands.md#backup) e extraia ele usando o [Android Backup Extractor](https://sourceforge.net/projects/adbextractor/): `java -jar abe.jar unpack arquivo.backup arquivo.tar`

### If root access or physical connection to JTAG interface
### Acesso root ou conexão física com uma interface JTAG

* `cat /proc/partitions` \(search the path to the flash memory, generally the first entry is _mmcblk0_ and corresponds to the whole flash memory\).
* `df /data` \(Discover the block size of the system\).
* dd if=/dev/block/mmcblk0 of=/sdcard/blk0.img bs=4096 \(execute it with the information gathered from the block size\).
* `cat /proc/partitions` \(procure o caminho para a memória flash, geralmente a primeira entrada é _mmcblk0_ e corresponde a toda memória flash\).
* `df /data` \(descubra o tamanho do bloco do sistema\).
* `dd if=/dev/block/mmcblk0 of=/sdcard/blk0.img bs=4096` \(execute-o com as informações coletadas do tamanho do bloco\).

### Memory

Use Linux Memory Extractor \(LiME\) to extract the RAM information. It's a kernel extension that should be loaded via adb.
### Memória

Use o Linux Memory Extractor \(LiME\) para extrair a informação da RAM. É uma extensão do kernel que deve ser carregada via adb.
Loading