Saturday, March 24, 2018

Youtube daily report Mar 24 2018

When you hear the word 'caterpillar', you probably think of a hungry little chubby-grubby

thing happily chowing down on some leaves.

But the Hawaiian inchworm, also known as the ambush caterpillar, might change your mind.

Because when it arrived in paradise, it ditched the peaceful vegan diet for razor-sharp claws,

a sensitive hair trigger, and a taste for meat.

Specifically, live bug meat.

The first thing that's weird about these guys is that islands are often home to gentler

forms of life—a tendency known as island tameness.

That's because the vast majority of species don't make the dangerous trek across waterways.

So those that do find themselves in a habitat free from their usual competitors and predators,

where they can start a new, more relaxed lifestyle.

Hawaiian raspberries ditched their thorns, for example.

No point in being thorny if there are no mammals you need to fend off.

Somehow, Hawaii's inchworms didn't get the memo.

For them, the lack of insect eaters was an opportunity—there were just so many bugs

around, and pretty much no one else was eating them.

They were already used to a somewhat protein-rich diet because of their fondness for pollen

over leaves.

And, like other caterpillars, they were equipped with powerful jaws for chewing tough plant

material.

At some point — probably within the last hundred million years or so — they started

using those jaws to chew insects instead.

No one noticed these caterpillars' unusual eating habits until the 1970s, when a biologist

named Steven Montgomery saw one chewing on a fly.

Slightly confused, he brought the animal back to the lab.

For two days, it just sat there, and didn't take so much as a single bite of the leaf

it clung to.

So on a hunch, he threw a fruit fly in with the caterpillar.

And then the fly made the mistake of bumping into the caterpillar's backside.

There are other inchworms that rear up and snap their bodies defensively.

But when prey touches a Hawaiian inchworm, it goes on the attack, whipping around to

grab its meal with the six long, sharp claws attached to its legs.

After that, it's all over for the prey.

Even though it's probably not dead yet, it's lunchtime for the caterpillar.

There are a few other types of carnivorous caterpillars, almost all of which are native

to Hawaii.

But the ambush caterpillar is definitely the most violent.

A close second is probably H. molluscivora, which eats snails by wrapping them in silk

while they're sleeping, then eating them alive once they can't escape.

Which is less violent, but more creepy!

But at least it's not a living whip with terrifyingly sharp claws.

So thanks, Hawaiian inchworms, for the nightmares.

And thank you for watching this episode of SciShow!

If you love learning all about the bizarre world we live in, you can keep up with our

latest episodes by going to youtube.com/scishow and subscribing.

For more infomation >> Meet the World's Most Terrifying Caterpillar - Duration: 2:51.

-------------------------------------------

LOREDANA LECCISO: "NON HO GRADITO ESTERNAZIONI DI ROMINA POWER" | K.N.B.T - Duration: 10:19.

For more infomation >> LOREDANA LECCISO: "NON HO GRADITO ESTERNAZIONI DI ROMINA POWER" | K.N.B.T - Duration: 10:19.

-------------------------------------------

Lorenzo nei guai poco prima della scelta di Sara? | M.C.G.S - Duration: 3:33.

For more infomation >> Lorenzo nei guai poco prima della scelta di Sara? | M.C.G.S - Duration: 3:33.

-------------------------------------------

Mazda CX-3 2.0 SkyActiv-G 120 GT-M | Automaat | Navigatie | Head-up | 1/2 leer | Xenon - Duration: 0:58.

For more infomation >> Mazda CX-3 2.0 SkyActiv-G 120 GT-M | Automaat | Navigatie | Head-up | 1/2 leer | Xenon - Duration: 0:58.

-------------------------------------------

고민정 부대변인|K-News - Duration: 12:32.

For more infomation >> 고민정 부대변인|K-News - Duration: 12:32.

-------------------------------------------

A new journey starts now (^ω^) [3DS Pokemon Omega Ruby] - Duration: 13:03.

Hey Hey people RatoBoy here. And welcome to a new video.

And todays video is going to be playing Pokemon Omega Ruby.

Anyways let's get started.

Let's go

As u can see, just from the intro, we are getting

our new adventure at Pokemon Omega Ruby

I do not play the other pokemon games because

well i'm learning * I mean Relearning*

Sorry for the silence (つ﹏<。)

I'm not going to put the audio from the game.

Sorry about that (ㄒoㄒ) Because I can't do it...

uhhhh... And if I don't take any kind of strike in this video issss

with too much luck

If u guys are asking yourselfs if I'm running this game on a real 3DS... Well I'm not...

I' m running this on citra emulator (3DS Emulator)

It is because of this, that sometimes there's some lag

But i think that is not an issue

Silence... Again... (つ﹏<。)

In my opinion this intro is a

little bit boring

They could probably cut this part

More silence... (つ﹏<。)

Ok... Professor Brich

Obviously I'm a boy...

What's my name? (・∧‐)ゞ

Let me... see...

*Back to music discussion*

Instead of putting the game's music

I'll just put other music on the background

I'm don't have any idea what music is going to be

But... I will see that

uhhhh.... Done!

Ok done!

They could get

the nickname from the 3ds but ok ._.

I know this map like nobody

Objective of this serie is:

Get the best team possible

After that, i ll try to transfer that team to other pokemon games

But for now...

is just...

That...

OBVIOUSLY CATCH THEM ALL... It's pokemon after all

I do not think anyone would forget that part, right?

Ok let's get out of here

Unfortunately

in this game i can not take out the black lines

Well, it will stay like that

Ok... That little lag ._.

Silence the movie Σ( ̄ロ ̄lll)

OK...

We are finally in the new city and bla bla bla

New house and stuff like... We all know...

The funny think is

I think that i can already run right?

In this new generation of pokemons, instead of give to us the running shoes, we already have ones

U can go big one

OK now i need to correct the clock... Now i can run yeah!

But he corrects himself

It's not like in the old pokemons

*Ok enough to compare old games with new ones*

It's 1:09 pm

Uau... he got the right time...

* referring to the room * I'm going to be honest I did not like it that much...

Well, i'll not spend too much time here

Ok let's go downstairs

Now she calls me...

To see the ...

Yeah...

Hello??? The screen just went black...

Poor guy

We lost dad's part

OK let me see...

We can't go up

We need to get in here

YES... I'm...

Good one...

Old lady: "My daughter have the same age as u, go see her upstairs" ( ͡° ͜ʖ ͡°)

Silence the movie Part 2 Σ( ̄ロ ̄lll)

Well...

*The girl is like* random person on my room

It's everything just fine ┴┬┴┤( ͡° ͜ʖ├┬┴┬

yes it's me (MARIO)... thx

nice to meet ya

I already knew u, but ok...

True! The professor Birch is her father

Sorry if i'm going too fast

Is just that

For more infomation >> A new journey starts now (^ω^) [3DS Pokemon Omega Ruby] - Duration: 13:03.

-------------------------------------------

ALLA SERA - Ugo Foscolo - lettura integrale (con sottotitoli e traduzioni) - Duration: 2:46.

Perhaps because of the fatal quïete You are the imago so dear to me, come

Or evening! And when you are courted happily Summer clouds and serene zephyrs,

And when from the snowy air you inquire Darkness and long to the universe Meni

Always come down invoked, and the secrete Ways of my heart so tenderly.

Vagar you make me with my thoughts on the trail that go to eternal nothing; and in the meantime he flees

this time, and with him he weighs them

Of the cures with me, he fades; and while I look at your peace, he sleeps

That spiror warrior who roars me.

For more infomation >> ALLA SERA - Ugo Foscolo - lettura integrale (con sottotitoli e traduzioni) - Duration: 2:46.

-------------------------------------------

Lightning McQueen's Biggest...

For more infomation >> Lightning McQueen's Biggest...

-------------------------------------------

VTS_01_1 - Duration: 1:38.

For more infomation >> VTS_01_1 - Duration: 1:38.

-------------------------------------------

Anyone Else

For more infomation >> Anyone Else

-------------------------------------------

日本語字幕[EPISODE] J-hope 1st mixtape MV Shooting #2 - Duration: 13:17.

For more infomation >> 日本語字幕[EPISODE] J-hope 1st mixtape MV Shooting #2 - Duration: 13:17.

-------------------------------------------

Jessie J为华晨宇按摩,华晨宇感叹好贵的按摩,李维嘉表情亮了 - Duration: 4:26.

For more infomation >> Jessie J为华晨宇按摩,华晨宇感叹好贵的按摩,李维嘉表情亮了 - Duration: 4:26.

-------------------------------------------

Connaissez-vous ces youtubeuses ? - Duration: 1:16.

For more infomation >> Connaissez-vous ces youtubeuses ? - Duration: 1:16.

-------------------------------------------

고민정 부대변인|K-News - Duration: 12:32.

For more infomation >> 고민정 부대변인|K-News - Duration: 12:32.

-------------------------------------------

Malware Demonstration (Android): Metasploit Framework Backdoor - Duration: 14:40.

Some guy on Android dev subreddit discord server asked for help with his notepad app.

He kept asking everyone to try it without explaining the actual problem.

I've decided to download a copy to decompile it and then I've noticed some stuff in it.

As I've managed to find the original of this app,

I'll show you the comparison between decompiled versions of these copies.

Just in a sec.

First of all, there are loads of permissions that don't fit the app.

Along with that, there's a package inside of application that doesn't fit the rest of application.

That's because he wasn't actually looking for help.

The app that he posted is legitimate,

but it also contains a Metasploit framework backdoor.

The backdoor from this app allows the attacker to gain access to the victims device remotely.

I'm not quite sure why he tried to deceive actual developers in discord server for Android development,

but he decided to raqequit after we warned others about it.

Therefore, I'll try to demonstrate the behavior of this backdoor... more or less.

I've decompiled and transferred malicious parts of app to a separate project.

To make this story short: These are anonymous classes that...

have some kind of behavior inside of main classes, these three.

So, I'll skip those and I'll just explain those three.

So this a broadcast receiver that starts malicious service when the system boots up.

This is a service that invokes main method of malicious code,

and finally, this is the core of malicious behavior.

We'll try to install app from the project for now, which contains fewer logs for possible details, more or less.

Yeah so, we'll launch it. It's here. So, plain and simple "hello world."

So, the cycle goes more or less, eh... like this.

First of all, it will get the path of private app data folder where it will save JAR file (Java Archive).

This file contains a remote administration tool...

or whatever else that will take the control of your device.

After that, it will try to parse the address and port of the payload listener through various parts of the code, including this part.

It's a long byte array.

So, this makes it harder to find out what's the actual address and port in some way.

When the address and port are defined, it will connect to the payload listener, or retry in few seconds if it fails.

When the connection is established, it will download the JAR file and use it to remotely control the device.

You can see that it tries to...

connect to ngrok.io, as we could be able to see it over here,

which is actually a legitimate service for exposing local servers online.

To make this thing work again again, I'll use, uh...

Kali Linux with Metasploit framework console, and use it to expose payload server through ngrok service.

So we'll go put this on background,

and then we'll run ngrok on Kali to expose specific TCP port.

Ok, so to make sure that the app is able to connect,

you'll have to replace the address and port in code with the ones that ngrok service gave.

So we'll switch that...

... find the place. This is it. We'll replace the code.

Actually, the variables. First the address just in case.

Then the port.

And then, we run the app again.

So it should relaunch.

and let's check the logs.

So this is the old port, but this is the actual one we're trying to connect, which is this. Oops.

So it's able to connect this time,

but it's not able to get any kind of data because we still didn't set up the payload, as in the payload listener.

So, we'll do this now. Let's minimize this...

...go back in here, and...

... we'll launch the Metasploit framework console,

and then we'll start the actual payload listener.

So we'll wait until it starts up.

Okay, so now the payload listener is running and *we should gibberish* we should be able to get a new session soon.

Okay, we got it.

Let's check it over here.

So I managed to download the actual file, and now it should be able to...

We are able to access the actual device from the terminal and we can do whatever the app has permissions to do so.

So, we'll check few options.

And we'll start with few of those, from the top.

Well, from the top of Android commands, so we'll start with few activities.

This is basically the URI (uri) Intent... actually, it's your string which is supposed to launch the intent for telephone number,

which is in this case for the phone...

... and then for the web...

So, this launches the Chrome browser.

And then, we'll continue with few other things.

Well, I've tried to run some other kind of activities from...

... well with... from explicit intent, but that doesn't work quite well in this case.

So, we'll continue with other stuff.

So, we can see that device is rooted...

... and then we'll try to dump all these call logs, contacts list and SMS messages.

Okay, so all those files are saved in home folder, so I can check it out over here.

So we have the call log, I'll show it over here.

It's pretty much the same thing.

So, missed call, outgoing call and the incoming call.

The contacts, which is the only one.

And then, for the SMS.

Okay, so what's next?

So, geolocation should be able to get the...

... geolocation (GPS coordinates) of the device, but that doesn't work in this case.

"Hide app icon" should hide the actual icon of the notepad from the launcher.

So, it's not kind of possible to launch it in this case,

but it should be still able to stay in the memory, and it's still listed in the apps list.

Just to make sure...

Yeah, it's still here... and still running.

Interval collect pretty much just getting the data from the...

... from, how to say...

from Wi-Fi, cellular networks and geolocation data, in a way that it tracks probably all those stations and networks

as in to check all those Wi-Fi, how to say...

...Wi-Fi access points.

The geolocations of probably nearby places, as I've tried and it doesn't work in emulator...

and for cellular... probably just cellular networks (names and signal strength) that are on, well...

... around the well, network. How else to say it... Sorry. (Couldn't think of better way to explain it.)

So, we'll skip that and we'll go to something simple.

Send SMS is basically just sending an SMS message to some... destination number.

I've already tried that before, so I'll try it again

So first, destination number...

I don't remember the actual quote from the "Wargames," but still...

I'm probably doing this wrong, but never mind.

Yeah, I'm probably doing it wrong, but the SMS is sent, either way.

So, the next thing is setting the ringer mode which is basically setting the...

...audio of the actual ringer of the device (ring volume), not the actual audio (media volume).

Just give me a sec.

Okay, so it will only change this part.

By default, it will just set it to '1', which is basically the default value.

Whoops.

We'll go to the '0'.

Oh, shoot.

We have to set first the option.

So, now it's set to '0', which is basically on mute.

If you put it to '1', it will put it to default and then if you set it to '2'...

... then it will go to maximum volume.

Well, the SQLite query is basically performing a query from databases in local storage.

So, we'll skip that because I don't know any kind of...

... database in this case and for wakelock is basically the...

wakelock management for the app.

And in this case, as much as I've managed to find out...

Just a sec.

It's able to at least turn on the screen. That's pretty much I know.

For those advanced wakelock flags, that's pretty much...

Not a thing I still know.

So I didn't... how to say, research that far.

So, I will just turn the screen on remotely in this case.

Plain simple.

And... WLAN geolocate is basically indicating the geolocation data with WLAN, but...

That's pretty much kind of broken in this case, it doesn't seem to work.

And there pretty much no how to say... arguments, even though it says there is some kind of error in this case.

Okay, so we are pretty much done with Android commands.

So, we'll take a... you can also try to take a snap of webcams, or actually camera, so we'll do that.

And there you have it.

There actual picture of the camera, because the emulator has this kind of...

...camera emulation.

And that's pretty much about the camera itself.

I've tried to do the streaming and that caused pretty much lots of lags, so I'll skip that.

Well, there's all, well..

With accessing the actual phone you should be able to access the actual how to say, sale terminal or shell...

... or the actual system itself, but for now...

Oh, shoot.

Well, that's pretty much about it.

Bye.

No comments:

Post a Comment