Seaverns Web Development Coding Security Applications and Software Development Bex Severus Galleries Digital Art & Photography

FreeDDNS – A Dynamic DNS Solution for Everyone

FreeDDNS: A Dynamic DNS Solution for Everyone

Dynamic DNS (DDNS) is a service that automatically updates the IP address associated with a domain name when the IP address changes. This is particularly useful for devices with dynamic IP addresses, such as home routers or servers, where the IP address is not static and can change frequently. Without DDNS, accessing these devices remotely would require manually updating the IP address each time it changes, which is impractical.

What is FreeDDNS?
FreeDDNS is a cost-effective, self-hosted Dynamic DNS solution designed to provide users with a reliable way to map a domain name to a dynamic IP address without relying on third-party services. Unlike traditional DDNS services that often come with subscription fees or limitations, FreeDDNS empowers users to create their own DDNS system using simple PHP scripts and a web server.

How FreeDDNS Works
The FreeDDNS project consists of three core scripts:

  1. fddns.php: This script runs on the local machine and sends periodic requests to a remote server. It includes the local machine’s hostname in the request, allowing the remote server to identify and log the client’s IP address.
  2. access.php: This script runs on the remote server and logs the client’s IP address and hostname. It ensures that the latest IP address is always recorded in a log file (fddns.log).
  3. index.php: This script fetches the logged IP address and hostname from fddns.log and uses it to retrieve and display web content from the client’s machine.

The process is simple:

  • The local machine sends its hostname and IP address to the remote server.
  • The remote server logs this information.
  • When accessed, the remote server uses the logged IP address to fetch content from the local machine, effectively creating a dynamic link between the domain name and the changing IP address.

Why Use FreeDDNS?

  1. Cost-Effective: FreeDDNS eliminates the need for paid DDNS services, saving you money.
  2. Customizable: Since it’s self-hosted, you have full control over the system and can tailor it to your needs.
  3. Reliable: By using simple PHP scripts and a web server, FreeDDNS ensures a lightweight and efficient solution.
  4. Easy to Implement: The scripts are straightforward and can be set up in minutes, even by users with minimal technical expertise.

FreeDDNS is the perfect solution for anyone looking to access their home network, personal server, or IoT devices remotely without the hassle of manual IP updates or expensive subscriptions. Whether you’re a tech enthusiast, a small business owner, or a hobbyist, FreeDDNS offers a reliable, customizable, and cost-effective way to stay connected. Take control of your dynamic IP challenges today with FreeDDNS—your gateway to seamless remote access.

FreeDDNS (Beta) 1.9kb
Download

Seaverns Web Development Coding Security Applications and Software Development Bex Severus Galleries Digital Art & Photography

Apache LAMP Install Script

Apache LAMP Install Script

Here’s a full Apache LAMP Install Script for setting up aa LAMP stack on Ubuntu (assuming Linux is excluded from the setup), including the installation and configuration of Apache, PHP, MySQL, and phpMyAdmin. The script also includes basic Apache configurations, enabling modules like mod_rewrite, and configuring phpMyAdmin with secure settings.

Full Apache LAMP Install Script
(for Ubuntu-based systems):



#!/bin/bash

# Update and upgrade the system
sudo apt update -y
sudo apt upgrade -y

# Add PPA for PHP and Apache
echo "Adding PPA repositories for PHP and Apache..."
sudo add-apt-repository ppa:ondrej/php -y
sudo add-apt-repository ppa:ondrej/apache2 -y
sudo apt update -y

# Install Apache2
echo "Installing Apache2..."
sudo apt install apache2 -y

# Install PHP and commonly used extensions
echo "Installing PHP and extensions..."
sudo apt install php libapache2-mod-php php-cli php-mysql php-curl php-gd php-xml php-mbstring php-zip php-soap -y

# Install MySQL Server and secure the installation
echo "Installing MySQL Server..."
sudo apt install mysql-server -y

# Run MySQL Secure Installation
echo "Securing MySQL installation..."
sudo mysql_secure_installation

# Install phpMyAdmin
echo "Installing phpMyAdmin..."
sudo apt install phpmyadmin php-mbstring php-zip php-gd php-json php-curl -y

# Link phpMyAdmin to Apache web directory
echo "Configuring phpMyAdmin..."
sudo ln -s /usr/share/phpmyadmin /var/www/html/phpmyadmin

# Set permissions for phpMyAdmin
echo "Setting permissions for phpMyAdmin..."
sudo chown -R www-data:www-data /usr/share/phpmyadmin
sudo chmod -R 755 /usr/share/phpmyadmin

# Enable Apache modules
echo "Enabling Apache modules..."
sudo a2enmod rewrite
sudo a2enmod headers
sudo a2enmod ssl

# Set up basic Apache configurations (security headers, etc.)
echo "Configuring Apache settings..."
echo '
<IfModule mod_headers.c>
Header always set X-Content-Type-Options "nosniff"
Header always set X-XSS-Protection "1; mode=block"
Header always set X-Frame-Options "SAMEORIGIN"
Header always set Referrer-Policy "no-referrer"
</IfModule>

<IfModule mod_rewrite.c>
RewriteEngine On
RewriteCond %{REQUEST_FILENAME} !-f
RewriteCond %{REQUEST_FILENAME} !-d
RewriteRule ^(.+)$ /index.php [QSA,L]
</IfModule>
' | sudo tee /etc/apache2/conf-available/security_headers.conf > /dev/null

# Enable custom security headers configuration
sudo a2enconf security_headers

# Enable and restart Apache and MySQL services
echo "Restarting Apache and MySQL..."
sudo systemctl restart apache2
sudo systemctl restart mysql

# Set MySQL to start on boot
echo "Ensuring MySQL starts on boot..."
sudo systemctl enable mysql

# Test Apache and MySQL installation
echo "Testing Apache and MySQL..."
sudo systemctl status apache2
sudo systemctl status mysql

# Configure phpMyAdmin with MySQL (Optional, run if needed)
echo "Configuring phpMyAdmin to work with MySQL..."
# Create a user for phpMyAdmin in MySQL
sudo mysql -u root -p -e "CREATE USER 'phpmyadmin'@'localhost' IDENTIFIED BY 'phpmyadminpassword';"
sudo mysql -u root -p -e "GRANT ALL PRIVILEGES ON *.* TO 'phpmyadmin'@'localhost' WITH GRANT OPTION; FLUSH PRIVILEGES;"

echo "LAMP stack installation complete!"


Breakdown of the Apache LAMP Install Script:

  1. System Updates:
    • Updates the package list and upgrades the system to ensure it is up-to-date.
  2. PPA for PHP and Apache:
    • Adds the PPA repositories for the latest PHP and Apache versions (ppa:ondrej/php and ppa:ondrej/apache2).
  3. Apache2 Installation:
    • Installs the Apache web server.
  4. PHP Installation:
    • Installs PHP along with some common PHP extensions (like MySQL, CURL, GD, MBString, XML, and SOAP).
  5. MySQL Installation and Security Setup:
    • Installs MySQL and runs the mysql_secure_installation script to secure the MySQL installation (you’ll need to set a root password and answer security questions).
  6. phpMyAdmin Installation:
    • Installs phpMyAdmin and relevant PHP extensions. It then configures it to be accessible via the Apache web server.
  7. Enabling Apache Modules:
    • Enables the mod_rewrite, mod_headers, and mod_ssl modules for security and functionality.
  8. Apache Basic Configuration:
    • Sets up HTTP security headers and enables the mod_rewrite rule to handle URL rewriting in Apache.
  9. Restart Services:
    • Restarts Apache and MySQL services to apply changes.
  10. Test:
    • Verifies that Apache and MySQL services are running properly.
  11. MySQL User for phpMyAdmin (Optional):
    • Creates a user for phpMyAdmin in MySQL with the necessary privileges. You can customize the password and user details.

Additional Notes:

  • MySQL Secure Installation: This script will invoke the mysql_secure_installation command during execution. You will be prompted to configure your MySQL root password and set other security options interactively.
  • phpMyAdmin: By default, phpMyAdmin will be accessible at http://your-server-ip/phpmyadmin after running this script. Make sure to adjust any security settings (e.g., .htaccess protection) for production environments.
  • Permissions: The script ensures that phpMyAdmin has proper file permissions to function correctly under the web server’s user (www-data).
Linux Apache MySQL Php LAMP Server

MySQL

What is MySQL?

MySQL is an open-source relational database management system (RDBMS) that is widely used for managing and organizing data in a structured manner. Developed and maintained by Oracle Corporation, MySQL uses Structured Query Language (SQL) to handle database tasks such as data retrieval, insertion, updating, and deletion.

What It’s Used For

MySQL is versatile and can be used in a variety of contexts:

  1. Web Applications: It’s commonly used in conjunction with PHP and Apache in the LAMP (Linux, Apache, MySQL, PHP/Perl/Python) stack for developing web applications.
  2. Data Storage: It stores data in a tabular format, which is suitable for applications requiring structured data storage, such as CRM systems, e-commerce sites, and content management systems (CMS).
  3. Analytics and Reporting: Businesses use MySQL to store and query large datasets, performing operations like complex joins, aggregations, and reporting.
  4. Application Development: Developers use MySQL for backend databases in applications due to its reliability and performance.
  5. Business Applications: It supports enterprise-level applications and ERP systems by managing large volumes of transactional data.

Institutions That Use MySQL

MySQL is used by a wide range of institutions:

  1. Tech Companies: Many tech giants and startups use MySQL, including Facebook, Twitter, and Google, for various internal systems and services.
  2. Educational Institutions: Universities and research organizations use MySQL for managing research data, student records, and educational content.
  3. Financial Institutions: Banks and financial services use MySQL for transactional data, customer management, and compliance-related applications.
  4. Government Agencies: Government departments use MySQL for managing public records, administrative data, and service delivery systems.
  5. Healthcare: Hospitals and clinics use MySQL for patient records, appointment scheduling, and medical data management.

Security and Vulnerabilities

Security:

  1. Access Control: MySQL supports user authentication and permissions, allowing administrators to control who can access or modify data.
  2. Encryption: It offers data-at-rest and data-in-transit encryption options to protect sensitive information.
  3. Audit Logging: It can log queries and changes to monitor and detect suspicious activity.
  4. Security Updates: Regular updates and patches are released to address security vulnerabilities.

Vulnerabilities:

  1. SQL Injection: Like other SQL-based systems, MySQL can be vulnerable to SQL injection attacks if applications do not properly sanitize user input.
  2. Misconfigurations: Incorrectly configured MySQL installations can lead to security issues, such as unauthorized data access.
  3. Outdated Versions: Running outdated versions without the latest security patches can expose the database to known vulnerabilities.
  4. Backup Security: If not properly secured, backup files can be a target for data breaches.

Resources

Here are some useful resources for learning more about MySQL:

  1. MySQL Official Website – The main site for downloads, documentation, and product information.
  2. MySQL Documentation – Comprehensive documentation covering installation, configuration, and usage.
  3. MySQL Tutorial – A resource for learning MySQL through tutorials and examples.
  4. MySQL Forums – A place to ask questions and engage with the MySQL community.
  5. MySQL Security Best Practices – Guidelines and recommendations for securing MySQL installations.

This overview should give you a solid understanding of MySQL, its uses, and its security aspects.

Coding, Security & Web Development

Senya 2.0 MySQL Database Editor

Senya – MySQL Database Editor

Sleek and easy to use MySQL Database Editor.
Enter Server Configuration Manually Or Automatically From File.

By: K0NxT3D
Version: 2.0.1
URL: http://www.seaverns.com/senya/
File: Senya_2.0.zip
Senya 2.0 Files:
index.php – Main Page
display_table.php – Display MySQL Tables
update.php – Update MySQL Tables
style.css – Default Style
saved_hosts.txt – Example Autoload Configuration File

K0NxT3D

Senya 1.0 Cross Domain WordPress Data Mining Utility

Сеня 1.0 (Senya 1.0)

Senya 1.0 Cross Domain WordPress Data Mining Utility

Сеня 1.0 – K0NxT3D 2024
Back End WordPress Utility

Features:

  • Edit WordPress Database.
  • Edit WordPress User Tables.
  • Edit WordPress User Information.
  • Display WordPress Domain and Associated Admin Email Addresses Across Multiple Domains.

A simple and easy to use PHP/HTML Based MySQL Back End Connection Utility with Editing Capabilities and Email Harvesting across Multiple Domains.

Download

Cybercriminals Weaponizing Open-Source SSH-Snake Tool for Network Attacks

SSH-Snake, a self-modifying worm that leverages SSH credentials.

Original Article : The Hacker News

A recently open-sourced network mapping tool called SSH-Snake has been repurposed by threat actors to conduct malicious activities.

“SSH-Snake is a self-modifying worm that leverages SSH credentials discovered on a compromised system to start spreading itself throughout the network,” Sysdig researcher Miguel Hernández said.

“The worm automatically searches through known credential locations and shell history files to determine its next move.”

SSH-Snake was first released on GitHub in early January 2024, and is described by its developer as a “powerful tool” to carry out automatic network traversal using SSH private keys discovered on systems.

In doing so, it creates a comprehensive map of a network and its dependencies, helping determine the extent to which a network can be compromised using SSH and SSH private keys starting from a particular host. It also supports resolution of domains which have multiple IPv4 addresses.

“It’s completely self-replicating and self-propagating – and completely fileless,” according to the project’s description. “In many ways, SSH-Snake is actually a worm: It replicates itself and spreads itself from one system to another as far as it can.”

BotNet CNC Control Hacker Inflitration Exploits Vulnerabilities SSH TCP Bots Hardware Software Exploited

BotNet CNC Control Hacker Infiltrates & Exploits Vulnerabilities Vie SSH TCP Both Hardware Software Exploited

Sysdig said the shell script not only facilitates lateral movement, but also provides additional stealth and flexibility than other typical SSH worms.

The cloud security company said it observed threat actors deploying SSH-Snake in real-world attacks to harvest credentials, the IP addresses of the targets, and the bash command history following the discovery of a command-and-control (C2) server hosting the data.

How Does It Work?

These attacks involve active exploitation of known security vulnerabilities in Apache ActiveMQ and Atlassian Confluence instances in order to gain initial access and deploy SSH-Snake.
“The usage of SSH keys is a recommended practice that SSH-Snake tries to take advantage of in order to spread,” Hernández said. “It is smarter and more reliable which will allow threat actors to reach farther into a network once they gain a foothold.”

When reached for comment, Joshua Rogers, the developer of SSH-Snake, told The Hacker News that the tool offers legitimate system owners a way to identify weaknesses in their infrastructure before attackers do, urging companies to use SSH-Snake to “discover the attack paths that exist – and fix them.”

“It seems to be commonly believed that cyber terrorism ‘just happens’ all of a sudden to systems, which solely requires a reactive approach to security,” Rogers said. “Instead, in my experience, systems should be designed and maintained with comprehensive security measures.”

Netcat file transfer chat utility send receive files

Netcat file transfer chat utility. Easily Send & Receive Files Local & Remote.

“If a cyber terrorist is able to run SSH-Snake on your infrastructure and access thousands of servers, focus should be put on the people that are in charge of the infrastructure, with a goal of revitalizing the infrastructure such that the compromise of a single host can’t be replicated across thousands of others.”

Rogers also called attention to the “negligent operations” by companies that design and implement insecure infrastructure, which can be easily taken over by a simple shell script.

“If systems were designed and maintained in a sane manner and system owners/companies actually cared about security, the fallout from such a script being executed would be minimized – as well as if the actions taken by SSH-Snake were manually performed by an attacker,” Rogers added.

“Instead of reading privacy policies and performing data entry, security teams of companies worried about this type of script taking over their entire infrastructure should be performing total re-architecture of their systems by trained security specialists – not those that created the architecture in the first place.”

The disclosure comes as Aqua uncovered a new botnet campaign named Lucifer that exploits misconfigurations and existing flaws in Apache Hadoop and Apache Druid to corral them into a network for mining cryptocurrency and staging distributed denial-of-service (DDoS) attacks.

The hybrid cryptojacking malware was first documented by Palo Alto Networks Unit 42 in June 2020, calling attention to its ability to exploit known security flaws to compromise Windows endpoints.
As many as 3,000 distinct attacks aimed at the Apache big data stack have been detected over the past month, the cloud security firm said. This also comprises those that single out susceptible Apache Flink instances to deploy miners and rootkits.

“The attacker implements the attack by exploiting existing misconfigurations and vulnerabilities in those services,” security researcher Nitzan Yaakov said.

Apache Vulnerability Update Available!

Apache Vulnerability Update Available!

“Apache open-source solutions are widely used by many users and contributors. Attackers may view this extensive use as an opportunity to have inexhaustible resources for implementing their attacks on them.”

DSX "Pure SEO" Content Management System

DSX DS7-1.2.5 Content Management System

DSX Version 7-1.2.5 (DS7) “Pure SEO” Content Management System. (Release Update V7-1.2.5)

While this CMS is considered “Black Hat”, it is what it is and it works.
Search Engines have priorities in what ranks and what doesn’t rank and
the single most important things anyone who wants the Top Ten knows are,
that your pages have to load fast, your content has to be abundant, thick and most
of all Hypertext Links.

DSX Delivers on all aspects of Fast Ranking “Pure SEO” tactics that I’ve developed
over the last 20+ years as a Professional SEO Expert and I stand behind my work.
I’m offering DSX 7-1.2.5 at a Very affordable price because it’s very small at this
point and that makes it relatively easy for you to make more of it or if you’re patient,
wait for the next version with far more features.

Installation & Troubleshooting.
View Demo
PhP Header Request Spoofing Ip Address User Agent Geo-Location

Generate Random HTTP Request

Random HTTP Request Generator – “generator.php”

This generates the Header Request Information to be sent to a Destination URL.
For Testing Purposes Only – Some Files Have Been Excluded.
The Destination URL tracks incoming HTTP Requests and filters them for “bad data” or
“Spoofed Requests” such as the requests generated here.

Server Status Monitor PhP Code

PhP Monitor Active and Inactive Servers

This is a simple and no frills way to monitor your servers.
You will need to create the file “urls.txt” in the same folder as the “active-servers.php” file.

Examples – urls.txt:
https://www.my-website.com/
http://localhost/
http://www.my-website.com/some/page.php

Navigate to the active-servers.php file. ( http://www.your-site.com/scripts/active-servers.php)
Online Servers will be Lime and Offline Servers, Red.

active-servers.php

<head>
<title>Active Servers</title>
</head>
<body style=”background-color: #0c0c0c;”>
<div>
<table width=”100%” height=”100%”>
<tr>
<td>
<table style=”margin-bottom: 100%;text-transform: uppercase;”>
<?php
$fn = fopen(“urls.txt”,”r”);
while(! feof($fn)) {
$result = fgets($fn);
$server=gethostbyname(parse_url($result, PHP_URL_HOST));
if (fsockopen($server, 80)){
echo (‘ <tr><td><b><a style=”color: Lime; text-decoration: none;”href=”‘.$result.'” target=”viewer”>’.$result.'</b></td></tr>’. “\r\n”);
} else
{
echo (‘ <tr><td style=”color: #a00000″>’.$result.'</td></tr>’. “\r\n”);
}

} fclose($fn); ?>

</table>
</td>
<td width=”100%”><iframe align=”right” class=”viewpanel” src=”” name=”viewer” frameborder=”0″ width=”100%” height=”600px”></iframe></td>
</tr>
</table>
</div>
</body>

Netcat file transfer chat utility send receive files

Netcat Scheduled Server / Client File Transfer Script

Using Netcat may be “Old School”, but so am I, so I love using Netcat for simple tasks or just chatting without Big Brother paying too much attention. I love using Bold Text too.

These are two separate scripts, one for use on a server, “server.sh” (home pc/Pi/laptop or and server that allows you to use Netcat) and “client.sh”, which you can use on your Android or Laptop etc from a mobile location.
Of course you’re going to have to set permissions and run them. I highly suggest editing out the sleep function and using cron if you’re savvy as this is really meant to update files such as remote sensors, cameras etc.

*Edit the IP address to your server in client.sh.

server.sh

#!/bin/bash
clear
    echo "Server Running."
        mkdir incoming
    date="$(date +'%Y-%m-%d_%H-%M')"
    file="incoming/payload.file"
# Set the Servers Port To Listen On
    echo $(nc -l 1234 > $file)
        mv $file "incoming/$date.payload"
    echo "File Recieved."
    sleep 10
./$(basename $0) && exit

client.sh

#!/bin/bash
clear
mkdir outgoing
    echo "Client Running."
        file="outgoing/payload.file"
# For Demo Only
    touch $file
    echo "Some Data" >> $file
# Set The Server IP and Port To Connect To
    echo $(nc -w 3 192.168.1.XXX 1234 < $file)
    echo "File Sent."
    sleep 60
./$(basename $0) && exit