segunda-feira, 5 de junho de 2023

Hacker Group 'Moses Staff' Using New StrifeWater RAT In Ransomware Attacks

 


A politically motivated hacker group tied to a series of espionage and sabotage attacks on Israeli entities in 2021 incorporated a previously undocumented remote access trojan (RAT) that masquerades as the Windows Calculator app as part of a conscious effort to stay under the radar.

Cybersecurity company Cybereason, which has been tracking the operations of the Iranian actor known as Moses Staff, dubbed the malware "StrifeWater."

"The StrifeWater RAT appears to be used in the initial stage of the attack and this stealthy RAT has the ability to remove itself from the system to cover the Iranian group's tracks," Tom Fakterman, Cybereason security analyst, said in a report. "The RAT possesses other capabilities, such as command execution and screen capturing, as well as the ability to download additional extensions."

Moses Staff came to light towards the end of last year when Check Point Research unmasked a series of attacks aimed at Israeli organizations since September 2021 with the objective of disrupting the targets' business operations by encrypting their networks, with no option to regain access or negotiate a ransom.

The intrusions were notable for the fact that they relied on the open-source library DiskCryptor to perform volume encryption, in addition to infecting the systems with a bootloader that prevents them from starting without the correct encryption key.


To date, victims have been reported beyond Israel, including Italy, India, Germany, Chile, Turkey, the U.A.E., and the U.S.

The new piece of the attack puzzle discovered by Cybereason comes in the form of a RAT that's deployed under the name "calc.exe" (the Windows Calculator binary) and is used during the early stages of the infection chain, only to be removed prior to the deployment of the file-encrypting malware.

The removal and the subsequent replacement of the malicious calculator executable with the legitimate binary, the researchers suspect, is an attempt on the part of the threat actor to cover up tracks and erase evidence of the trojan, not to mention enable them to evade detection until the final phase of the attack when the ransomware payload is executed.

StrifeWater, for its part, is no different from its counterparts and comes with numerous features, chief among them being the ability to list system files, execute system commands, take screen captures, create persistence, and download updates and auxiliary modules.

"The end goal for Moses Staff appears to be more politically motivated rather than financial," Fakterman concluded. "Moses Staff employs ransomware post-exfiltration not for financial gain, but to disrupt operations, obfuscate espionage activity, and to inflict damage to systems to advance Iran's geopolitical goals."

Related word

  1. New Hack Tools
  2. Hacker Tools Linux
  3. Hacker Tools List
  4. Hack Tools For Games
  5. Pentest Tools Android
  6. Pentest Tools Website Vulnerability
  7. Hacking Tools For Beginners
  8. Game Hacking
  9. Pentest Tools Nmap
  10. Hacking Tools 2020
  11. Best Hacking Tools 2020
  12. Black Hat Hacker Tools
  13. Pentest Recon Tools
  14. Hacking Tools For Games
  15. Hacking Tools For Windows Free Download
  16. World No 1 Hacker Software
  17. Hacker Tools Windows
  18. Hack Tools For Mac
  19. New Hacker Tools
  20. Hack Tool Apk
  21. Pentest Tools List
  22. Bluetooth Hacking Tools Kali
  23. Game Hacking
  24. Hack Tool Apk No Root
  25. Hacking Tools Kit
  26. Pentest Tools Nmap
  27. Tools 4 Hack
  28. Hacking Tools For Kali Linux
  29. Hacker Tools Hardware
  30. Hacking Tools Mac
  31. Hacking Tools Kit
  32. Pentest Tools Kali Linux
  33. Hacking Tools Name
  34. Pentest Tools Tcp Port Scanner
  35. Hacker Security Tools
  36. Pentest Tools Bluekeep
  37. Hack App
  38. Pentest Tools Website
  39. Hacker Hardware Tools
  40. Hacking Tools For Pc
  41. Hack Tools For Ubuntu
  42. Hacking Tools Github
  43. Pentest Tools Website Vulnerability
  44. Pentest Tools Tcp Port Scanner
  45. What Is Hacking Tools
  46. Usb Pentest Tools
  47. Easy Hack Tools
  48. Pentest Tools Alternative
  49. Nsa Hacker Tools
  50. Hack Tools For Windows
  51. Best Pentesting Tools 2018
  52. Termux Hacking Tools 2019
  53. Best Hacking Tools 2020
  54. Physical Pentest Tools
  55. Game Hacking
  56. Pentest Reporting Tools
  57. Pentest Tools Website Vulnerability

Hacking All The Cars - Part 1


A step by step lab based mini course on analyzing your car network


I wanted to learn about hacking cars. As usual I searched around the internet and didn't find any comprehensive resources on how to do this, just bits and pieces of the same info over and over which is frustrating. I am not a car hacking expert, I just like to hack stuff. This mini course will run in a fully simulated lab environment available from open garages, which means in 5 minutes from now you can follow along and hack cars without ever bricking your girlfriends car. Since you obviously wouldn't attack your own Lambo, totally use your girlfriends Prius. 

Below are the topics covered in this blog  series so you can decide if you want to read further: 

Whats covered in this car hacking mini course: 

Setting up Virtual Environments for testing
Sniffing CAN Traffic
Parsing CAN Traffic
Reverse Engineering CAN IDs 
Denial of service attacks
Replaying/Injecting Traffic
Coding your own CAN Socket Tools in python
Targeted attacks against your cars components
Transitioning this to attacking a real car with hardware

The first thing we are going to do before we get into any car hacking specifics such as "WTF is CAN?", is get your lab up and running. We are going to run a simple simulated CAN Bus network which controls various features of your simulated car. Its better to learn by doing then sit here and recite a bunch of car network lingo at you and hope you remember it.  

I also don't want you to buy a bunch of hardware and jack into your real car right away. Instead there are options that can get you started hacking cars RIGHT NOW by following along with this tutorial. This will also serve to take away the fear of hacking your actual car by understanding what your doing first. 


Video Playlist: 




Setting up your Lab: 

First things first, set yourself up with an Ubuntu VMware install, and load it up. Optionally you could use a Kali Iinux VM, however, that thing drives me nuts with copy paste issues and I think Kayak was giving me install problems. So support is on you if you would like to use Kali. However, I do know Kali will work fine with OpenGarages virtual car.. So feel free to use it for that if you have it handy and want to get started right away. 


Install PreReq Libraries: 

Once you load this up you are going to want to install CAN utilities and pre-requisite libraries. This is really easy to do with the following Apt-get commands:
sudo apt-get update
sudo apt-get install libsdl2-dev libsdl2-image-dev can-utils  

Then we are going to pull down the ICSimulator repo: 


Starting the simulator: 

Once this is done we can startup the simulator by changing directories to the downloaded repo and running the following 2 commands, which will setup a virtual CAN interface and a simulator GUI Cluster: 

Run the setup Script to get the vcan0 interface up: 
root@kali:~/ICSim# ./setup_vcan.sh 
root@kali:~/ICSim# ./icsim vcan0

On a new terminal tab we will open up our simulators controller with the following command,
root@kali:~/ICSim#./controls vcan0

Note: that the controller must be the in-focus GUI screen to send keyboard commands to the simulator. 






How to Use the Simulator: 

The simulator has a speedometer with Right and Left turn signals, doors etc.  Below are the list of commands to control the simulator when the Control panel is in focus. Give them each a try and note the changes to the simulator. 
Up and Down keys control the gauges clusters speedometer
Left and Right keys Control the Blinkers
Right Shift + X, A or B open doors 
Left Shift + X, A or be Close doors

Try a few of the above commands for example Right Shift +X and you will see the interface change like so, notice the open door graphic: 


Awesome, thanks to OpenGarages you now you have your very own car to hack

Notice in the setup commands above we used a VCan0 interface. Run Ifconfig and you will now see that you indeed have a new network interface that speaks to the CAN network over VCan0. 

ficti0n@ubuntu:~/Desktop/ICSim$ ifconfig vcan0
vcan0     Link encap:UNSPEC  HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00  
          UP RUNNING NOARP  MTU:16  Metric:1
          RX packets:558904 errors:0 dropped:0 overruns:0 frame:0
          TX packets:558904 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1 
          RX bytes:3663935 (3.6 MB)  TX bytes:3663935 (3.6 MB)


Car networks run on a variety of protocols most prevalent being CAN. You can think of a CAN Bus like an old school networking hub where everyone can see everyone elses traffic. This is true to some extent although you may not see all of the cars traffic if its not connected to that particular bus your plugged into. You can think of CAN traffic kind of like UDP in that its send and forget, the main difference being parts of the CAN bus network don't actually have addresses and everything runs off arbitration IDs and priorities. Thats enough background to get you doing rather then reading.

With a little knowledge out of the way lets check if we can see our CAN traffic from our virtual car via the CanDump utility, which you installed as part of CanUtils package above. Using the following command on the vcan0 interface our simulator uses you can view a stream of traffic: 

ficti0n@ubuntu:~/Desktop/ICSim$ candump vcan0



Above we can see a bunch of CAN frames, and if we perform actions on the vehicle we will see changes to data values in the CanDump output.  However this may happen very fast, and we may not be able to see if for example we unlocked our simulators door. This is because things are changing constantly in the cars IDLE state. One single value changing may not stand out enough for us to take notice or may scroll so fast we cant see it. 


Capture and Replay CAN Actions: 

One option would be to perform an action and replay it, we should see the actions happen again in the replay if the traffic for the action we recorded is on the same bus network our device is plugged into. There are loads of networks within a car and its not guaranteed our network tap for example an OBD2 port plugin is connected to the same network as door we opened.  Or the door may not be connected to the network at all depending on your car and its age or how its configured. 

Replaying dumps with CanPlayer: 
Another useful tool included with CanUtils package is CanPlayer for replaying traffic. If the functionality we are trying to capture is on the same Bus as the adaptor plugged into the car, or in this case our Virtual CAN interface, we can use CanDump to save traffic to a file. We then use CanPlayer to replay the traffic on the network. For example lets run CanDump and open a door and then replay the functionality with CanPlayer. 

Lab 1 Steps: 

  1. Run CanDump
  2. Right Shift + X to open a door
  3. Cancel CanDump (ctrl+c)
  4. Left Shift + X to close the door
  5. Run can player with the saved dump and it will replay the traffic and open the door

Recording the door opening:  (-l for logging) 
ficti0n@ubuntu:~/Desktop/ICSim$ candump -l vcan0

Replaying the CanDump file:  (use the file your can dump created) 
ficti0n@ubuntu:~/Desktop/ICSim$ canplayer -I candump-2018-04-06_154441.log 

Nice, so if all went well you should see that your door is now open again. If this did not happen when attacking a real car, just try to replay it again. CAN networks are not like TCP/IP, they are more like UDP in that you send out your request and its not expecting a response. So if it gets lost then it gets lost and you have to resend. Perhaps something with higher priority on the network was sending at the time of your replay and your traffic was overshadowed by it.   




Interacting with the Can Bus and Reversing Traffic: 

So thats cool, but what about actually understanding what is going on with this traffic, CanDump is not very useful for this, is scrolls by to quickly for us to learn much from.  Instead we can use CanSniffer with colorized output to show us the bytes within packets that change. Below is an example of CanSniffer Traffic: 

To startup can sniffer run the following: 
ficti0n@ubuntu:~/Desktop/ICSim$ cansniffer -c vcan0




You will see 3 fields, Time, ID  and Data. Its pretty easy to figure out what these are based on thier name. The most important part for our usage in this blog are the ID and the Data fields.  

The ID field is the frame ID which is loosely associated with the device on the network which is effected by the frame being sent. The ID to also determines the priority of the frame on the network.  The lower the number of the CAN-ID the higher priority it has on the network and more likely it will be handled first.  The data field is the data being sent to change some parameter like unlocking a door or updating output. You will notice that some of the bytes are highlighted RED. The values in red are the values that are changing during the idle state you are currently in. 


Determine which ID and Byte controls the throttle: 

So with the terminal sniffing window open put the simulator and the controller into the foreground, with the controller being the window you have clicked and selected.  Pay attention to the CanSniffer output while hitting the UP ARROW and look for a value that was white but is now Red and increasing in value as the throttle goes up.  This might take you a few minutes of paying attention to whats going on to see. 

The following 2 pictures show ID 244 in the IDLE state followed by pressing the up button to increase the speed. You will notice a byte has turned red and is increasing in value through a range of HEX values 0-F. It will continue to enumerate through values till it reaches its max speed. 





The byte in ID 244 which is changing is the value while the throttle is engaged, so 244 associated in some way with the increasing speed.   The throttle speed is a good value to start with as it keeps increasing its value when pressed making it easier to spot while viewing the CanSniffer output.  


Singling out Values with Filters: 

If you would like to single out the throttle value then click the terminal window and press -000000 followed by the Enter key which will clear out all of the values scrolling. Then press +244 followed by the Enter key which will add back the throttle ID. You can now click the controller again and increase the speed with your Up arrow button without all the noise clouding your view.  You will instead as shown below only have ID 244 in your output: 




To get back all of the IDs again click the terminal window and input +000000 followed by the Enter key.   Now you should see all of the output as before.  Essentially 000000 means include everything. But when you put a minus in front of it then it negates everything and clears your terminal window filtering out all values. 


Determine Blinker ID: 

Now lets figure out another ID for the blinkers. If you hit the left or right arrow with the controls window selected you will notice a whole new ID appears in the list, ID 188 shown in the picture below which is associated with the blinker. 




This ID was not listed before as it was not in use within the data output until you pressed the blinker control.  Lets single this value out by pressing -000000 followed by +188.  Just like in the throttle example your terminal should only show ID 188, initially it will show with 00 byte values. 

 As you press the left and the right blinker you will see the first Byte change from 00 to 01 or 02. If neither is pressed as in the screenshot above it will be 00. Its kind of hard to have the controller in focus and get a screenshot at the same time but the ID will remain visible as 00 until it times out and disappears from the list when not active. However with it filtered out as above you can get a better view of things and it wont disappear.  


Time for YOU to do some Protocol Reversing:

This lab will give you a good idea how to reverse all of the functionality of the car and associate each action with the proper ID and BYTE. This way you can create a map of intended functionality changes you wish to make.  Above we have done a few walk throughs with you on how to determine which byte and ID is associated with an action. Now its time to map everything out yourself with all the remaining functionality before moving on to attacking individual components.  


Lab Work Suggestion: 


  1. Take out a piece of paper and a pencil
  2. Try unlocking and locking doors and write down the ID which controls this action (remember your filters)
  3. Try unlocking each door and write down the BYTES needed for each door to open
  4. Try locking each doors and what Bytes change and what are their values, write them down
  5. Do the same thing for the blinkers left and right (Might be different then what I did above) 
  6. What ID is the speedometer using?  What byte changes the speed? 


Attacking Functionality Directly: 

With all of the functionality mapped out we can now try to target various devices in the network directly without interacting with the controllers GUI. Maybe we broke into the car via cellular OnStar connection  or the center console units BLE connection which was connected to the CAN network in some way.  
After an exploit we have direct access to the CAN network and we would like to perform actions. Or maybe you have installed a wireless device into an OBD2 port under the dashboard you have remote access to the automobile. 

Using the data from the CAN network reversing lab above we can call these actions directly with the proper CAN-ID and Byte.  Since we are remote to the target we can't just reach over and grab the steering wheel or hit the throttle we will instead send your CAN frame to make the change.
One way we can do this is via the CanSend utility. Lets take our information from our lab above and make the left turn signal flash with the following ID 188 for the turn signal by changing the first byte to 01 indicating the left signal is pressed. CanSend uses the format ID#Data. You will see this below when sending the turn signal via CanSend. 

ficti0n@ubuntu:~/Desktop/ICSim$ cansend vcan0 188#01000000 



You should have noticed that the left signal flashed. If not pay more attention and give it another try or make sure you used the correct ID and changed the correct byte.  So lets do the same thing with the throttle and try to set the speed to something with ID 244 that we determined was the throttle. 

ficti0n@ubuntu:~/Desktop/ICSim$ cansend vcan0 244#00000011F6 

My guess is that nothing happened because its so fast the needle is not going to jump to that value. So instead lets try repeating this over and over again with a bash loop which simply says that while True keep sending the throttle value of 11 which equates to about 30mph: 

ficti0n@ubuntu:~/Desktop/ICSim$ while true; do cansend vcan0 244#00000011F6;  done




Yes thats much better, you may notice the needle jumping back and forth a bit. The reason the needle is bouncing back and forth is because the normal CAN traffic is sent telling the car its actually set to 00 in between your frames saying its 30mph.  But it worked and you have now changed the speed the car sees and you have flashed the blinker without using the cars normal blinker controls. Pretty cool right? 


Monitor the CAN Bus and react to it: 

Another way to handle this issue is to monitor the CAN network and when it sees an ID sent it will automatically send the corresponding ID with a different value.. Lets give that a try to modify our speed output by monitoring for changes. Below we are simply running CanDump and parsing for ID 244 in the log output which is the throttle value that tells the car the speed. When a device in the car reports ID 244 and its value we will immediately resend our own value saying the speed is 30mph with the value 11.  See below command and try this out. 

ficti0n@ubuntu:~/Desktop/ICSim$ candump vcan0 | grep " 244 " | while read line; do cansend vcan0 244#00000011F6; done

With this running after a few seconds you will see the speed adjust to around 30MPH once it captures a legitimate CAN-ID 244 from the network traffic and sends its own value right after.  

Ok cool, so now while the above command is still running click the controller window and start holding down the Up arrow with the controller in focus.. After a few seconds or so when the speed gets above 30MPH you will see the needle fighting for the real higher value and adjusting back to 30MPH as your command keeps sending its on value as a replacement to the real speed. 

So thats one way of monitoring the network and reacting to what you see in a very crude manner.  Maybe someone stole your car and you want to monitor for an open door and if they try to open the door it immediately locks them in. 


Conclusion and whats next: 

I am not an expert car hacker but I hope you enjoyed this. Thats about as far as I want to go into this subject today, in the next blog we will get into how to code python to perform actions on the CAN network to manipulate things in a similar way.  With your own code you are not limited to the functionality of the tools you are provided and can do whatever you want. This is much more powerful then just using the CanUtils pre defined tools. Later on I will also get into the hardware side of things if you would like to try this on a real car where things are more complicated and things can go wrong. 

Related news


  1. Hacker Tools Windows
  2. Hacker Tools For Mac
  3. Best Hacking Tools 2019
  4. Hacking Apps
  5. Hak5 Tools
  6. Wifi Hacker Tools For Windows
  7. Hacking Tools Kit
  8. Hack Apps
  9. Hacker Hardware Tools
  10. What Is Hacking Tools
  11. Usb Pentest Tools
  12. Hacker Tools List
  13. Hack Tools
  14. Hacking Tools Online
  15. Computer Hacker
  16. Pentest Tools Subdomain
  17. Growth Hacker Tools
  18. Hack Tools For Ubuntu
  19. Hack Tools Online
  20. Nsa Hack Tools
  21. Pentest Automation Tools
  22. Bluetooth Hacking Tools Kali
  23. How To Install Pentest Tools In Ubuntu
  24. New Hack Tools
  25. Black Hat Hacker Tools
  26. Hacker Tools Apk Download
  27. Hacker Tools For Mac
  28. Pentest Tools Website Vulnerability
  29. Pentest Tools Url Fuzzer
  30. Hacker Tools Software
  31. Pentest Tools Kali Linux
  32. Hacker Tools Free Download
  33. Hack And Tools
  34. Hacking Tools
  35. Pentest Tools Tcp Port Scanner
  36. Blackhat Hacker Tools
  37. Hacker Techniques Tools And Incident Handling
  38. Hacking Tools Github
  39. Hacker Tools For Pc
  40. Hack Tools For Ubuntu
  41. Hacking Tools For Beginners
  42. Blackhat Hacker Tools
  43. Pentest Tools Port Scanner
  44. Pentest Tools Linux
  45. Hack Tools For Games
  46. Android Hack Tools Github
  47. Hacker Tools Linux
  48. Hacking Tools Name
  49. Hacker Tools 2019
  50. Hacking App
  51. Hacker Techniques Tools And Incident Handling
  52. Hacking Tools For Windows
  53. Black Hat Hacker Tools
  54. Hacking Tools Github
  55. Pentest Tools For Windows
  56. Underground Hacker Sites
  57. Hacking Tools 2019
  58. Pentest Tools Apk
  59. Pentest Tools Windows
  60. Pentest Automation Tools
  61. Hacker Tools Software
  62. Hacking Tools Software
  63. Hacking Tools Github
  64. Hack Tools Github
  65. Hacker Tools 2019
  66. Hacking Tools Windows 10
  67. Hacker Tools
  68. Hacking Tools Kit
  69. Pentest Box Tools Download
  70. Hacking Tools Mac
  71. World No 1 Hacker Software
  72. Hack Tools Pc
  73. Hackrf Tools
  74. Pentest Tools Kali Linux
  75. Pentest Tools Alternative
  76. Hack Tools For Games
  77. Pentest Tools Framework
  78. Wifi Hacker Tools For Windows
  79. Pentest Tools Linux
  80. Easy Hack Tools
  81. Hacking App
  82. Pentest Tools Kali Linux
  83. Pentest Tools Windows
  84. Hacking Tools Usb
  85. Hackers Toolbox
  86. Termux Hacking Tools 2019
  87. Pentest Box Tools Download
  88. Hacker Tools Free
  89. Pentest Tools Website
  90. Hacking Tools For Mac
  91. Best Hacking Tools 2019
  92. Pentest Tools For Mac
  93. Hacker Tools Apk
  94. Pentest Automation Tools
  95. Nsa Hacker Tools
  96. How To Make Hacking Tools
  97. Hack Tools For Ubuntu
  98. New Hack Tools
  99. Hacker Tools Github
  100. Wifi Hacker Tools For Windows
  101. Black Hat Hacker Tools
  102. Nsa Hack Tools
  103. Hacks And Tools
  104. Pentest Reporting Tools
  105. Hacker Tools For Windows
  106. Hacking Tools Free Download
  107. Hacker Tools Apk Download
  108. Hacker Tool Kit
  109. Pentest Tools Website
  110. Hacking Tools Download
  111. Hacking Tools Github
  112. Pentest Tools Tcp Port Scanner
  113. Hacking Tools Hardware
  114. Hacking Tools
  115. Hacker
  116. Hacking App
  117. Hacking Tools

domingo, 4 de junho de 2023

Hackerhubb.blogspot.com

Hackerhubb.blogspot.com

More articles


  1. Pentest Tools Github
  2. Hak5 Tools
  3. Hacking Tools For Pc
  4. What Are Hacking Tools
  5. Hack Tools Online
  6. Hack Website Online Tool
  7. Pentest Tools Review
  8. Hacking Tools 2019
  9. Kik Hack Tools
  10. Hacker Tools Mac
  11. Hacker Tools Online
  12. Kik Hack Tools
  13. Black Hat Hacker Tools
  14. Hacking Tools For Games
  15. Hack Website Online Tool
  16. Hacking Tools And Software
  17. Hacking Tools For Pc
  18. Nsa Hack Tools Download
  19. Hack Website Online Tool
  20. Beginner Hacker Tools
  21. World No 1 Hacker Software
  22. Hacker Tools Github
  23. How To Install Pentest Tools In Ubuntu
  24. Hack Tools
  25. Hacker Tool Kit
  26. Hacker Tools For Windows
  27. Hack Tools
  28. Free Pentest Tools For Windows
  29. How To Install Pentest Tools In Ubuntu
  30. Hacker Search Tools
  31. Hacker Tools For Pc
  32. New Hacker Tools
  33. What Is Hacking Tools
  34. Pentest Tools Github
  35. Hack Tools For Windows
  36. Pentest Tools Url Fuzzer
  37. Pentest Tools Url Fuzzer
  38. Hackrf Tools
  39. Tools Used For Hacking
  40. Hacks And Tools
  41. Hack Tools For Ubuntu
  42. Growth Hacker Tools
  43. Hacker Security Tools
  44. Usb Pentest Tools
  45. Growth Hacker Tools
  46. Hackers Toolbox
  47. Hacker Tools Apk Download
  48. Hack Tools 2019
  49. Hacking Tools For Mac
  50. Github Hacking Tools
  51. Easy Hack Tools
  52. How To Hack
  53. Pentest Tools Website
  54. Hacker Tools For Windows
  55. Hacker Tools Apk Download
  56. Pentest Tools Github
  57. Hacker Tool Kit
  58. Hacking Tools Name
  59. Pentest Tools Apk
  60. Hack Website Online Tool
  61. Black Hat Hacker Tools
  62. Black Hat Hacker Tools
  63. Pentest Tools Bluekeep
  64. Hacking Tools For Kali Linux
  65. Hacker Tools Free
  66. Pentest Tools Tcp Port Scanner
  67. Usb Pentest Tools
  68. Pentest Tools For Windows
  69. Hacker Tools For Mac
  70. Hacking Apps
  71. Nsa Hack Tools
  72. Nsa Hack Tools Download
  73. Tools Used For Hacking
  74. Hacking Tools Free Download
  75. Pentest Tools Website
  76. What Are Hacking Tools
  77. Pentest Automation Tools
  78. Hacking Tools And Software
  79. Bluetooth Hacking Tools Kali
  80. Best Hacking Tools 2020
  81. Best Hacking Tools 2019
  82. Hacker Tools Apk
  83. Pentest Tools Github
  84. New Hacker Tools
  85. World No 1 Hacker Software
  86. Termux Hacking Tools 2019
  87. Hack Tool Apk
  88. Best Pentesting Tools 2018
  89. Hacking Tools Kit
  90. Pentest Tools Apk
  91. Hack Tools
  92. Pentest Tools List
  93. Hak5 Tools
  94. Hacking Tools For Windows 7
  95. Hacker Tools
  96. Pentest Tools List
  97. Pentest Tools Github
  98. Hacking Tools For Pc
  99. Hack Tools For Mac
  100. Hack Tools For Pc
  101. Pentest Tools For Android
  102. Free Pentest Tools For Windows
  103. Hacker Tools Windows
  104. Hacking Tools For Mac
  105. Nsa Hack Tools
  106. Hack Tools Online
  107. Pentest Tools Framework
  108. Best Hacking Tools 2019
  109. Best Hacking Tools 2019
  110. How To Make Hacking Tools
  111. Hacker Tools List
  112. Pentest Tools Online
  113. Android Hack Tools Github
  114. Pentest Tools List
  115. Hacking Tools
  116. Hackers Toolbox
  117. Pentest Tools For Ubuntu
  118. Top Pentest Tools
  119. Hacking Tools 2019
  120. Free Pentest Tools For Windows
  121. Computer Hacker
  122. Hacking Tools Hardware
  123. What Is Hacking Tools
  124. Hack Tools Download
  125. Hacking Tools Download
  126. Hacking Tools For Pc
  127. Pentest Tools Review
  128. Hacking Tools Usb
  129. Pentest Tools Github
  130. Hack App
  131. What Is Hacking Tools
  132. Pentest Tools Github
  133. Hacking Tools Github
  134. Hacking Tools Windows
  135. Hacks And Tools
  136. Hack And Tools
  137. Hacking Tools For Windows Free Download
  138. Hack And Tools
  139. Github Hacking Tools
  140. Nsa Hack Tools
  141. Hacker Tools Free
  142. Tools 4 Hack
  143. Hacker Tools 2019
  144. Usb Pentest Tools
  145. Physical Pentest Tools
  146. Hackers Toolbox
  147. Pentest Tools Tcp Port Scanner
  148. Blackhat Hacker Tools
  149. Tools 4 Hack
  150. Hacking Tools Kit
  151. Pentest Tools For Mac
  152. Hacker Tools Windows
  153. Pentest Tools Tcp Port Scanner
  154. Hack Tools Mac
  155. Hack Tools
  156. Hack Tools For Mac
  157. Hacking Tools Windows
  158. Hacker Tools Hardware
  159. Underground Hacker Sites
  160. Pentest Tools Online
  161. Hacker Tools Apk
  162. Hack Website Online Tool
  163. Hack Tool Apk No Root
  164. Free Pentest Tools For Windows
  165. Hacker Hardware Tools
  166. How To Hack
  167. Hacking Tools For Kali Linux
  168. Hacking Tools Windows