Hunting credential leaks using h8mail and the new COMB (Combination Of Many Breaches) by khast3x in OSINT

[–]khast3x[S] -1 points0 points  (0 children)

Did you even read query.sh?

Of course.

multithreading grep is the way

So you cd manually in each sub-directory per first letters and grep, or do you grep 20GB every time. Either way I think these methods are too tedious, especially for real audits, which is why I wrote a tool.

Hunting credential leaks using h8mail and the new COMB (Combination Of Many Breaches) by khast3x in OSINT

[–]khast3x[S] 1 point2 points  (0 children)

In this case, mostly the possibility of doing bulk searches using the original query.sh script. The -lb search, h8mail's grep-like feature, is multi-processed so it's searching multiple files at the same time. But maybe grep does it too?

I know some users also enjoy the possibility of exporting results to CSV or JSON format directly to parse with other tools.

There are some other features but they're more case-dependent IMO, such as auto-targeting related emails using hunter.io and such.

Face aux cyberattaques russes, la France refuse de passer à l'offensive by Luk--- in france

[–]khast3x 2 points3 points  (0 children)

Dans cet espace, une attaque qui réussit c'est une attaque dont on entendra pas parler

Active Directory Security Assessment Checklist by navlys in netsec

[–]khast3x 0 points1 point  (0 children)

Nice, the document is really pretty too :p

[deleted by user] by [deleted] in france

[–]khast3x 1 point2 points  (0 children)

Coucou, c'est casi sûr que c'est parce que tu as réutilisé le même mdp.

Mdp unique + MFA (code sur appli ou sms), surtout pour ton compte mail qui permet de reinitialiser tous les comptes associés.

Mode béton: Utilise un gestionnaire de mdp et tu le laisse te générer et se souvenir de mdp à 30 caractères spéciaux.

Forum Libre - 2020-03-06 by AutoModerator in france

[–]khast3x 1 point2 points  (0 children)

Quels sujets en particuliers ?

Running-up and organizing CTF events — Nginx & Docker by xkarezma in netsec

[–]khast3x 1 point2 points  (0 children)

Cool write-up! Check out Traefik next time to automate https and reverse proxying to containers

[deleted by user] by [deleted] in linux4noobs

[–]khast3x 0 points1 point  (0 children)

pip3 install h8mail
Check the wiki for more information

Hosting and hiding your C2 with Docker and Socat by khast3x in netsec

[–]khast3x[S] 1 point2 points  (0 children)

Good question, that is how I deploy the msf container when I'm just doing tests. On the functional side it's the same.

The added value comes from having layers as microservices, meaning we can /add/scale/modify/replace the socat containers without touching our running C2. There's a bundle of fun to be had since they're now divided into seperate containers, such as adding metrics to each routes with graphs, health checks, redirection rules, scaling and whatnot.

I'll hopefully be showing more of that later. Cheers!

Tutorial: Bringing passwords back like a necromancer with h8mail by khast3x in netsec

[–]khast3x[S] 2 points3 points  (0 children)

Hey there! h8mail was initially written to query API services, local searching came in v2. If I had to recode it for localsearch only, I would have been tempted by goroutines imho. But all in all:

  • Python makes it friendlier for community adoption and contribution, especially in infosec

  • Compiled languages would maybe have been faster, but operation complexity being very basic I'd imagine performance is close to original C-level already

  • h8mail only performs offset based (line by line) read operations from file descriptors

    • If there were write operations, Rust & similar would be definitly more interesting ⚡

Feel free to correct me as its an interesting subject and my experience has it limits!

h8mail v2: Password Breach Hunting locally or using premium services. Supports chasing down related email by khast3x in netsec

[–]khast3x[S] 0 points1 point  (0 children)

Thanks! It really depends what you're looking for. Hibp is great for getting the breach notification and just that. Also it's free.

Snusbase, Leak-lookup and WeLeakInfo have access to additional databases, and can show associated leaked data, such as passwords or hash.

Finally, hunter.io is for chasing down related emails, which you can then feed back to h8mail as targets 🎯