Skip to content

wiseaidev/dark-web-rust

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

60 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ“š Dark Web Rust

Work In Progress Maintenance License made-with-rust Jupyter Notebook Share On Reddit Share On Ycombinator Share On X Share On Meta Share On Linkedin

Warning

This comprehensive repository provides hands-on advanced cybersecurity resources and tools for educational purposes only. Use at your own risk, as unauthorized use may result in severe legal consequences, including imprisonment. The content is strictly educational, focusing on cybersecurity principles. Exercise caution, adhere to ethical guidelines, and avoid activities breaching legal boundaries. Misuse can lead to serious legal ramifications, and you are solely responsible for your actions.

Welcome to the Dark Web Rust repository! This project is a continuum work of the black-hat-rust book. Here, you'll delve into the world of networking, implementing low-level protocols, including IP, TCP, UDP, ICMP, and much more topics. The primary focus is on hands-on hacking methodologies, providing a comprehensive learning experience through Jupyter notebooks. Each chapter in this repository is also available in PDFs, Markdown, and other formats.

πŸ“ Table of Contents

πŸš€ Installation

To use the notebooks in this repository, you need to set up your environment. Follow these steps to get started:

  1. Clone the repository to your local machine:

    git clone https://github.com/wiseaidev/dark-web-rust.git
  2. Install the required dependencies and libraries. Make sure you have Rust, Jupyter Notebook, and evcxr_jupyter installed on your system.

    # Install a Rust toolchain (e.g. nightly):
    curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh -s -- -y --default-toolchain nightly
    
    # Install Jupyter Notebook
    pip install notebook
    
    # Install evcxr_jupyter
    cargo install evcxr_jupyter
    evcxr_jupyter --install	
  3. Navigate to the cloned repository:

    cd dark-web-rust/chapter-1
  4. Start Jupyter Notebook:

    jupyter notebook
  5. Access the notebooks in your web browser by clicking on the notebook file you want to explore.

πŸ“Œ Chapters

ID Title NB Pages Topics Open on GitHub Launch on Binder Read PDF
1 Crafting a Rust-Based Network Sniffer 42 - Introduction to Network Sniffers
- Rust for Network Programming
- The socket2 Crate
- Fundamentals of Raw Network Packets in Rust
- Decoding different IP and Transport layers Packets in Rust
- How to build your own custom NMAP-like ports scanner
Github Binder nbviewer
2 Hidden Threads: Mastering the Art of Steganography in Rust 29 - Exploring the PNG File Format
- Reading amd Validating PNG Image Files
- Preprocessing PNG Images.
- Hiding Secrets with Steganography
Github Binder nbviewer
3 Rust's Cryptographic Strengths and Vulnerabilities 23 - Cryptography in Rust
- Hashing
- Cracking MD5 Hashes
- Implementing bcrypt
- Message Authentication
- Symmetric Encryption
- Asymmetric Encryption
Github Binder nbviewer
4 Web Reconnaissance in Rust 26 - Web Reconnaissance and Social Engineering.
- Cookies management for persistent sessions.
- Crafting stealthy requests with custom user-agents.
- Leveraging proxies using Reqwest for enhanced security.
- Building a modular browser struct in Rust.
- Utilizing DuckDuckGo API for information gathering.
- Advanced interactions like image search and custom queries.
- Parsing Xeets in Rust for efficient data handling.
- Implementing anonymous email communication.
Mass social engineering techniques.
Github Binder nbviewer
5 The Dirty COW vulnerability in Rust 39 - Memory Mapping.
- Applications of Memory Mapping.
- Memory-Mapped Database.
- Memory-Mapped Networking.
- Shared and Private Memory Mapping.
- Copy On Write (COW) Mechanism.
- Madvise System Call and Read-Only Files.
Github Binder nbviewer
6 SQL Injection in Rust 12+ - SQL Injection In Rocket and SQLite
- Gathering User Input.
- Fetching Data From the Database.
- SQL Injection Exploitation.
- SQL Injection Through cURL.
- SQL Injection Mitigation.
Github Binder nbviewer
7 TCP Protocol Vulnerabilities and Countermeasures TODO TODO TODO TODO TODO

πŸ›  Tools

The following is a collection of CLIs developed while writing this book, providing insight into what you might expect from this book.

Crate Stars Description
Rping Stars 🌊 A Fully Anonymous Any TCP Flag Flooding Attack CLI.
ipcap Stars 🌍 Perform IP lookup from the command line without internet access.
stegano Stars πŸ•΅οΈβ€β™‚οΈ A powerful and memory-safe steganography tool
duckduckgo Stars πŸ¦† A CLI and library for instant DuckDuckGo searches.

πŸ“œ License

This project is licensed under the MIT. For more details, You can refer to the LICENSE file.

πŸ“ˆ Star History

Star History Chart

Stay Ethical, Stay Legal. Use Responsibly. ⚠️