Warning
This comprehensive repository provides hands-on advanced cybersecurity resources and tools for educational purposes only. Use at your own risk, as unauthorized use may result in severe legal consequences, including imprisonment. The content is strictly educational, focusing on cybersecurity principles. Exercise caution, adhere to ethical guidelines, and avoid activities breaching legal boundaries. Misuse can lead to serious legal ramifications, and you are solely responsible for your actions.
Welcome to the Dark Web Rust repository! This project is a continuum work of the black-hat-rust book. Here, you'll delve into the world of networking, implementing low-level protocols, including IP, TCP, UDP, ICMP, and much more topics. The primary focus is on hands-on hacking methodologies, providing a comprehensive learning experience through Jupyter notebooks. Each chapter in this repository is also available in PDFs, Markdown, and other formats.
To use the notebooks in this repository, you need to set up your environment. Follow these steps to get started:
Clone the repository to your local machine:
git clone https://github.com/wiseaidev/dark-web-rust.git
Install the required dependencies and libraries. Make sure you have Rust
, Jupyter Notebook
, and evcxr_jupyter
installed on your system.
# Install a Rust toolchain (e.g. nightly):
curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh -s -- -y --default-toolchain nightly
# Install Jupyter Notebook
pip install notebook
# Install evcxr_jupyter
cargo install evcxr_jupyter
evcxr_jupyter --install
Navigate to the cloned repository:
cd dark-web-rust/chapter-1
Start Jupyter Notebook:
jupyter notebook
Access the notebooks in your web browser by clicking on the notebook file you want to explore.
ID | Title | NB Pages | Topics | Open on GitHub | Launch on Binder | Read PDF |
---|---|---|---|---|---|---|
1 | Crafting a Rust-Based Network Sniffer | 42 | - Introduction to Network Sniffers - Rust for Network Programming - The socket2 Crate - Fundamentals of Raw Network Packets in Rust - Decoding different IP and Transport layers Packets in Rust - How to build your own custom NMAP-like ports scanner |
|||
2 | Hidden Threads: Mastering the Art of Steganography in Rust | 29 | - Exploring the PNG File Format - Reading amd Validating PNG Image Files - Preprocessing PNG Images. - Hiding Secrets with Steganography |
|||
3 | Rust's Cryptographic Strengths and Vulnerabilities | 23 | - Cryptography in Rust - Hashing - Cracking MD5 Hashes - Implementing bcrypt - Message Authentication - Symmetric Encryption - Asymmetric Encryption |
|||
4 | Web Reconnaissance in Rust | 26 | - Web Reconnaissance and Social Engineering. - Cookies management for persistent sessions. - Crafting stealthy requests with custom user-agents. - Leveraging proxies using Reqwest for enhanced security. - Building a modular browser struct in Rust. - Utilizing DuckDuckGo API for information gathering. - Advanced interactions like image search and custom queries. - Parsing Xeets in Rust for efficient data handling. - Implementing anonymous email communication. Mass social engineering techniques. |
|||
5 | The Dirty COW vulnerability in Rust | 39 | - Memory Mapping. - Applications of Memory Mapping. - Memory-Mapped Database. - Memory-Mapped Networking. - Shared and Private Memory Mapping. - Copy On Write (COW) Mechanism. - Madvise System Call and Read-Only Files. |
|||
6 | SQL Injection in Rust | 12+ | - SQL Injection In Rocket and SQLite - Gathering User Input. - Fetching Data From the Database. - SQL Injection Exploitation. - SQL Injection Through cURL. - SQL Injection Mitigation. |
|||
7 | TCP Protocol Vulnerabilities and Countermeasures | TODO | TODO | TODO | TODO | TODO |
The following is a collection of CLIs developed while writing this book, providing insight into what you might expect from this book.
Crate | Stars | Description |
---|---|---|
Rping | ? A Fully Anonymous Any TCP Flag Flooding Attack CLI. | |
ipcap | ? Perform IP lookup from the command line without internet access. | |
stegano | ♂️ A powerful and memory-safe steganography tool | |
duckduckgo | ? A CLI and library for instant DuckDuckGo searches. |
This project is licensed under the MIT. For more details, You can refer to the LICENSE file.
Stay Ethical, Stay Legal. Use Responsibly.