• Quote of the week

    By 1850, the House of Rothschild represented more wealth than all the families of Europe. Shortly after he formed the Bank of England, William Patterson lost control of it to Nathan Rothschild and here is how he did it:

    “Nathan Rothschild was an observer on the day the Duke of Wellington defeated Napoleon at Waterloo, Belgium. He knew that with this information he could make a fortune. He later paid a sailor a big fee to take him across the English Channel in bad weather. The news of Napoleon’s defeat would take a while to hit England. When Nathan arrived in London, he began selling securities and bonds in a panic. The other investors were deceived into believing that Napoleon won the war and was eyeing England so they began to sell their securities too. What they were unaware of is that Rothschild’s agents were buying all the securities that were being sold in panic. In one day, the Rothschild fortune grew by one million pounds. They literally bought control of England for a few cents on the dollar. The same way the Rockefeller’s went into Japan after World War 2 and bought everything 10 cents on the dollar. SONY=Standard Oil New York, a Rockefeller Company.”

    — Dr. Ken Matto (History of Lies, Thievery, and Deceit)

GhostInTheNet – Hide in network like a Ghost – GitHackTools – Security Toolkit for Pentesters

GhostInTheNet
Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan

How it works
The basic and primary network protocol is ARP for IPv4 and NDP (ICMPv6) for IPv6, located in the link and network layer, provides main connectivity in a LAN.
Despite its utility and simplicity, it has numerous vulnerabilities that can lead to a MITM attack and leak of confidentiality.
Patching of such a widely used standard is a practically impossible task.

A very simple, but at the same time effective solution is to disable ARP and NDP responses on an interface and be very cautious with broadcasting.
Considering the varieties of implementations, this means that anyone in the network wouldn’t be able to communication with such host, only if the host is willing it-self.
The ARP/NDP cache will be erased quickly afterwards.

Here is an example schema:
A >>> I need MAC address of B >>> B
A <<< Here it is <<< B
A <<< I need MAC address of A <<< B
A >>> I’m not giving it >>> B
A <<< F*CK YOU! <<< B

To increase privacy, it’s advised to spoof the MAC address, which will provide a better concealment.
Moreover, the hostname has to be changed (especially if using DHCP).
All this is possible using simple commands in Linux kernel and a script that automates it all.

Analysis
No ARP/NDP means no connectivity, so an absolute stealth and obscurity on the network/link layer.
This protects from all possible DOSes and MITMs (ARP, DNS, DHCP, ICMP, Port Stealing) and far less resource consuming like ArpON.
Such mitigation implies impossibility of being scanned (nmap, arping).

Besides, it doesn’t impact a normal internet or LAN connection on the host perspective.
If you’re connecting to a host, it will be authorised to do so, but shortly after stopping the communication, the host will forget about you because, ARP/NDP tables won’t stay long without a fresh request.
Regarding the large compatibility and cross-platforming, it’s very useful for offsec/pentest/redteaming as well.

You see everyone, but nobody sees you, you’re a ghost.
Mitigation and having real supervision on the network will require deep reconfiguration of OSes, IDPSes and all other equipement, so hardly feasible.

Examples & how to use this tool is at:  GhostInTheNet – Hide in network like a Ghost – GitHackTools – Security Toolkit for Pentesters

146total visits,1visits today

Leave a Reply

  • Similar Posts

  • Famous Quotes In History

    “All our law is private law, written by The National Law Institute, Law Professors, and the Bar Association, the Agents of Foreign Banking interests. They have come to this position of writing the law by fraudulently deleting the “Titles of Nobility and Honour” Thirteenth Amendment from the Constitution for the United States, creating an oligarchy of Lawyers and Bankers controlling all three branches of our government. Most of our law comes directly through the Hague or the U.N. Almost all U.N. treaties have been codified into the U.S. codes. That’s where all our educational programs originate. The U.N. controls our education system. The Federal Register Act was created by Pres. Roosevelt in 1935. Title 3 sec. 301 et seq. by Executive Order. He gave himself the power to create federal agencies and appoint a head of the agency. He then re-delegated his authority to make law (statutory regulations) to those agency heads. One big problem there, the president has no constitutional authority to make law. Under the Constitution re-delegation of delegated authority is a felony breach. The president then gave the agencies the authority to tax. We now have government by appointment running this country. This is the shadow government sometimes spoken about, but never referred to as government by appointment. This type of government represents taxation without representation. Perhaps this is why some people believe the Constitution was suspended. It wasn’t suspended, it was buried in bureaucratic red tape.”
    — David M. Dodge

    ” I know that most men, including those at ease with problems of the greatest complexity, can seldom accept even the simplest and most obvious truth if it be such as would oblige them to admit the falsity of conclusions which they have delighted in explaining to colleagues, which they have proudly taught to others, and which they have woven, thread by thread, into the fabric of their lives. ”
    — Leo Tolstoy

     

    Past Famous Quotes | Archive

  • What's New

    What's New
    Milestones: The De-Program Network has surpassed 100,000,000 visits since January 1, 2018 & there is still 9 days left for the month of January with 4112 unique URLs in 4855 links & growing.
    Big SHOUT OUT for all of you who helped make it possible.
    Reformatting of Wisdom & Freedom Little Books I II & III began fall of 2017.
    The De-Program Network Mind Map can be found at the bottom of the Projects tab called theBrain.
    Until we "officially" open: Enter at your own risk.

    Featured Article

    Featured Article
    Periodically there comes along an article that everyone should read. The link below is updated regularly with stellar works that can't be missed.