Posts

Showing posts from July, 2018

What is .crypt12 file extension?

Image
.crypt12 file extension "Whats app encrypted database file." WHAT IS A CRYPT12 FILE? A crypt12 file is an encrypted database created by whatsapp messenger, an android messenger application. It contains a 256-bit AES encrypted database of messages sent and received through the app. INFORMATION:- The "crypt12" extension is often appended to a  .DB  file to create a  .DB.CRYPT12  file, which is used by whats app to secure a user's message database on his or her android device. For each new installment , whats app messenger uses a different algorithm to encrypt the DB files. The extension appended to the DB file,such as  .CRYPT7  or  .CRYPT8 , signifies the algorithm. If you are looking to decrypt a crypt12 to view the message history of the app's user you must locate the key file, Which stores the encryption key. The key file is  stored in the following location:  /data/data/com.whatsapp/files/key A CRYPT12 database f...

About whats app

Image
WHATS APP:- WhatsApp Messenger is a freeware and cross-platform instant messaging service for smartphones.It uses the Internet to make voice calls, one to one video calls; send text messages, images, GIF, videos, documents, user location, audio files, phone contacts and voice notes using standard cellular mobile numbers. Originally users could only communicate with other users individually or in groups of individual users, but in September 2017 WhatsApp announced a forthcoming business platform which will enable companies to provide customer service to users at scale.All data are end-to-end encrypted. It also incorporates a feature called Status, which allows users to upload photos and videos to a 24-hours-lifetime feed that, by default, are visible to all contacts, similar to Snapchat, Facebook and Instagram Stories. The client was created by WhatsApp Inc., based in Mountain View, California, which was acquired by Facebook in February 2014 for approximately US$19.3 billion.B...

POC of Nagios XI 5.2.6-5.4.12 -Chained Remote Code Execution(Metasploit) | CVE-2018-8733

Image
     Nagios XI 5.2.6-5.4.12 -Chained Remote Code Execution(Metasploit) Introduction:- As the new exploit(CVE-2018-8733) is published which is capable to exploit the Nagios XI between version 5.2.6 to 5.4.12.Nagios is available in all the platform so i download the nagios virtual machine version 5.4.10 for my lab and download the exploit from www.exploit-db.com and paste it in the sub directory “exploit” of the metasploit framework and initialise the database or you can easily update the metasploit-framework by updating the OS. About Nagios XI:- Nagios is the most powerful,trusted,free and open source computer software application which helps in network monitoring,server monitoring and application monitoring and entire infrastructure and ensuring systems,applications,services and business process are functioning properly.It is easy to configure package along with advanced alerting and reporting. Lab environment:- Software:-VMware Workstation Pro ...

ASCII Table,Control Characters,Printable Characters

ASCII control characters Decimal  Octal   Hex    Binary     Character   -----------------------------------------------------------------------------------------     000      000     0x00      00000000     NUL             (Null char.) 001      001     0x01      00000001     SOH            (Start of Header) 002      002     0x02      00000010     STX            (Start of Text) 003      003     0x03      00000011     ETX            (End of Text) 004      004     0x04      00000100     EOT    ...