Home Blog Page 389

SSHD Poison : A Tool To Get Creds Of Pam Based SSHD Authentication

0
SSHD Poison : A Tool To Get Creds Of Pam Based SSHD Authentication

SSHD Poison is a tool to get creds of pam based sshd authentication, this is not the easiest way to do that (you can create a pam module, or just add auth optional pam_exec.so quiet expose_authtok /bin/bash -c {read,-r,x};{echo,-e,"`env`\n$x"}>>somefile in a service configuration), not even the stealthiest (the tool don’t have any mechanism to try hide yourself, and needs control the main sshd pid all the time), but code this gave me a lot of fun.

How it works

The tool starts attaching the main sshd pid and wait for some events, when a new process is created, it means that a new connection was started, after that the tool will wait for an execve event, then checks if the program executed is the same as the main pid, to ensure a re-exec (this is why we need take control of the main pid, every re-exec will erase any memory modification), then a breakpoint are set in the entry point of the new process, for wait the program load the shared librarys.

When it’s done and the breakpoint has hit, it are unset, the program will write the shellcode to a code cave, and the GOT entry for pam_set_item, used by libpam, will be changed, to hook internal libpam call to pam_set_item function.

The log format are password\0rhost\0user\0.

This will only works with x86_64 PIE binaries, and kernel 3.4 or early (PTRACE_SEIZE), I tested this with OpenSSH_8.0p1, OpenSSL 1.1.1b 26 Feb 2019 with kernel 5.0.13-arch1-1-ARCH and OpenSSH_7.9p1 Debian-10, OpenSSL 1.1.1b 26 Feb 2019with kernel 4.19.0-kali3-amd64

Also Read – CrossLinked : LinkedIn Enumeration Tool To Extract Valid Employee Names From An Organisation

Compiling

git clone –recurse-submodules https://github.com/hc0d3r/sshd-poison
– cd sshd-poison
– make

Demo

SSHD Poison : A Tool To Get Creds Of Pam Based SSHD Authentication

HiddenWall : Linux Kernel Module Generator For Custom Rules With Netfilter

0
HiddenWall : Linux Kernel Module Generator For Custom Rules With Netfilter

HiddenWall is a Linux kernel module generator for custom rules with netfilter. (block ports, Hidden mode, rootkit functions etc). The motivation: on bad situation, attacker can put your iptables/ufw to fal.

But if you have HiddenWall, the attacker will not find the hidden kernel module that block external access, because have a hook to netfilter on kernel land(think like a second layer for firewall).

My beginning purpose at this project is protect my personal server, now is protect the machines of my friends. When i talk “friends”, i say peoples that don’t know how to write low level code.

Using the HiddenWall you can generate your custom kernel module for your firewall configuration. The low level programmer can write new templates for modules etc…

Also Read – Graffiti : A Tool To Generate Obfuscated One Liners To Aid In Penetration Testing

First step, understand before run

Verify if the kernel version is 3.x, 4.x or 5.x:

uname -r

Clone the repository

git clone https://github.com/CoolerVoid/HiddenWall

Enter the folder

cd HiddenWall/module_generator

Edit your firewall rules in directory rules/server.yaml, the python scripts use that file to generate a new firewall module.

$ cat rules/server.yaml
module_name: SandWall
public_ports: 80,443,53
unhide_key: AbraKadabra
hide_key: Shazam
fake_device_name: usb14
liberate_in_2_out: True
whitelist: machine:
ip: 192.168.100.181
open_ports: 22,21
machine:
ip: 192.168.100.22
open_ports: 22

If you want study the static code to generate, look the content at directory “templates”.

Second step, generate your module

If you want generate a kernel module following your YAML file of rules, follow that command:

$ python3 WallGen.py –template template/hiddenwall.c -r rules/server.yaml

This generate a generic module with rules of server.yaml, if you want to use another template you can use “wall.c”, so template module “hiddenwall” have option to run on hidden mode(is not visible to “# lsmod” for example).

Third step, install your module

To test module:

# cd output; make clean; make
# insmod SandWall.ko

The rule of YAML to generate module is simple, drop all out to in packets, accept ports 80,443 and 53. The machine 192*.181 can connect at ports 22 and 21…

if you use nmap at localhost/127.0.0.1 you can view the ports open… because rule liberate_in_2_out is true.

Password to turn Firewall visible is “AbraKadabra”.

Password to turn Firewall invisible is “Shazam”.

You need to send password for your fake device “usb14”.

To exit module, you need turn visible at “lsmod” command …

# echo “AbraKadabra” > /dev/usb14
# lsmod | grep SandWall
# rmmod SandWall

Best SEO training course for beginners by moz in 2019

0

As the years are passing, businesses under different niches have reached millions of people for various reasons. Also, most of them are interested to work in reputed companies for various reasons. But the thing is not all the jobs are going to assure you to stay. Even we can see that millions of people are thrown out of companies for various reasons. At this stage, people are getting afraid of surviving their life. If you are one of them, then make sure to find the right solution to utilize it in a better way.

For information, most of them are moving towards beginning the business under different niches. If you are also going to start the business, then make sure to utilize digital marketing. Yes, digital marketing is playing a major role among business people. Once started using this marketing way, then you can easily reach among the millions of people. Also, you can witness the traffic on your business website for sure. If you are a beginner, then make sure to follow the best SEO training courses which are available across the internet to pick.

Utilization of best SEO training courses

If you are planning to begin the business, then make sure to choose the SEO training courses. Nowadays, most of people are searching for better courses to learn in deep. Yes, most of the SEO courses are offering the best stuff to learn in deep. Also, people who were all used to follow traditional marketing for a long time; they are also planning to focus on the SEO training courses for a better outcome. If everything is managed to follow, then you will be going to witness the good outcome in the end.

When it comes to SEO courses, you can search for various kinds of stuff to learn. Even you can also go ahead with the courses by moz at any time. If you are at the initial stage of the business in 2019, then moz SEO sources are going to be offering the best outcome than expected for sure. Also, it has the potential to learn and you can start to apply the right strategies on your business. Once applied well, then you can witness the growth in your business for sure. If you are looking to know more information before getting involved in the business, then make sure to follow webmarketing – top SEO course summary.

Learn more about strategies

Usually, when it comes to handling the businesses under different niches, the strategies are always considered to be the important ones. Also, it has the potential to reach among the right target audience. It is also one of the main reasons where most of the people are looking forward to picking good strategies. Once started following the strategies, then you will be going to see the changes in your business for sure. When you are searching for better strategies, then it is possible for you to pick in a short time. In terms of searching for the best strategies, you can find it many as per your wish and utilize it.

When you are planning to pick the best strategies, then there are several available across the internet. As per your business demands it, then you can choose the right strategies for business. Basically, people who all are at the beginner level, they must be aware of the strategies to use. If everything can be handled and utilize it in a better way, then they will be going to witness the good outcome in the end for sure. It is the main reason where most of the business people are going ahead with SEO training courses.

Experience the huge profits

Once started following the business in a better way, then you must be aware of the strategies and courses which are available across the internet. As per convenience, make sure to pick the best one. Once done with choosing the training courses, then try to learn in deep. And, then it is important for you to apply over your business. Once applied, then you will be going to witness the good outcome and profits in a better way.  

Top Paying Pay per Click Affiliate Programs for Beginners

0

As the days are passing, millions of people are highly focusing on the businesses to begin in different ways. For information, they are getting a chance to handle the business but it is essential for them to make money in a quick time. However, one should keep it in mind that most of the businesses are mainly required to follow patience in order to witness a better result in the end. Even you can witness the business like affiliate programs for beginners.

When it comes to affiliate marketing, most of them are highly making money through this best business. All you need to do is selling the products of others and making commission. Well, this is how the people are handling the business in a better way. Also, it is easy for the business people to make money by following the right strategies in a good way. If everything is managed to follow in your business, then you can see the upwards in business for sure. In case, if you are struggling to manage the business without knowing any proper stuff, then get support from experts.

Choose the best pay per click affiliate programs

For information, in order to expect a better outcome with good profit, it is important for you to choose the pay per click programs to get in-depth stuff. If you are managing to handle your business with the support of these things, then you will be going to see the best level of changes for sure. If you are searching for the best pay per click affiliate programs across the internet, then you can search it that whenever you want. Also, as per your wish and convenience, it is possible for you to pick the best one.

According to your business demands it, it is essential for you to pick the affiliate programs. In case, if you are in the stage of beginner level, then make sure to choose the best programs to learn in deep. As per the trends, it is important for you to pick the best programs. Also, for the beginners, the programs are always playing a major role for most of the time. It is the important reason where beginners are always looking forward to pick the affiliate programs in general.

In-depth analysis

If you are planning to sell the products in order to make commission, then the in-depth analysis is always essential for the business people to focus on it. Usually, most of the beginners are always looking for the stuff to gather for their business. Apart from that, they can also reach the experts and learn in deep when it comes to handling the affiliate marketing. At this stage, you can even search it for the good programs which are going to be helpful for all the seekers. Some of the programs are come up for free and some for pay.

At the end of the day, it is all up to your wish and convenience to pick the best programs and go ahead with that. If everything is managed to follow, then you will be going to witness the good result in the end. These are the main things where most of the people would be looking for it. At the same time, they are used to follow and applying it on their businesses for most of the time. If these things are utilizing it in a better way, then you will be going to make more money than expected for sure. For instance, to know essential details, you can even go ahead with journalreview – high paying affiliate programs for beginners. Hope, it will be helpful in general.

Utilization of best affiliate programs

Whenever you are going to choose the best affiliate programs, then it is important for you to choose the best one. For information, not all the programs are going to be offering the best outcome in the end. So, it is always vital for people to choose the best one. Especially, people who all are in the initial stage of the business, the utilization of affiliate programs among them would offer the excellent outcome in the end for sure.

WAFw00f : Identify & Fingerprint Web Application Firewall (WAF) Products Protecting A Website

0
WAFw00f : Identify & Fingerprint Web Application Firewall (WAF) Products Protecting A Website

WAFW00F identifies and fingerprints Web Application Firewall (WAF) products. To do its magic, WAFW00F does the following:

  • Sends a normal HTTP request and analyses the response; this identifies a number of WAF solutions.
  • If that is not successful, it sends a number of (potentially malicious) HTTP requests and uses simple logic to deduce which WAF it is.
  • If that is also not successful, it analyses the responses previously returned and uses another simple algorithm to guess if a WAF or security solution is actively responding to our attacks.

You can also check whether Is this website Safe by using various methods.

Also Read – Pe-Sieve : Recognizes & Dumps A Variety Of Potentially Malicious Implants

It detects a number of WAFs. To view which WAFs it is able to detect run WAFW00F with the -l option. At the time of writing the output is as follows:

$ wafw00f -l

WAFW00F – Web Application Firewall Detection Tool

Can test for these WAFs:
BlockDoS (BlockDoS)
Armor Defense (Armor)
ACE XML Gateway (Cisco)
Malcare (Inactiv)
RSFirewall (RSJoomla!)
PerimeterX (PerimeterX)
Varnish (OWASP)
Barracuda Application Firewall (Barracuda Networks)
Anquanbao (Anquanbao)
NetContinuum (Barracuda Networks)
HyperGuard (Art of Defense)
Incapsula (Imperva Inc.)
Safedog (SafeDog)
NevisProxy (AdNovum)
SEnginx (Neusoft)
BitNinja (BitNinja)
Janusec Application Gateway (Janusec)
NinjaFirewall (NinTechNet)
Edgecast (Verizon Digital Media)
Alert Logic (Alert Logic)
Cloudflare (Cloudflare Inc.)
SecureSphere (Imperva Inc.)
Bekchy (Faydata Technologies Inc.)
Kona Site Defender (Akamai)
Wallarm (Wallarm Inc.)
Cloudfront (Amazon)
aeSecure (aeSecure)
eEye SecureIIS (BeyondTrust)
VirusDie (VirusDie LLC)
DOSarrest (DOSarrest Internet Security)
SiteGround (SiteGround)
Chuang Yu Shield (Yunaq)
Yunsuo (Yunsuo)
NAXSI (NBS Systems)
UTM Web Protection (Sophos)
Approach (Approach)
NetScaler AppFirewall (Citrix Systems)
DynamicWeb Injection Check (DynamicWeb)
Xuanwudun
WebTotem (WebTotem)
Comodo (Comodo CyberSecurity Solutions)
WTS-WAF (WTS)
PowerCDN (PowerCDN)
BIG-IP Access Policy Manager (F5 Networks)
BinarySec (BinarySec)
Greywizard (Grey Wizard)
Shield Security (One Dollar Plugin)
ASP.NET Generic Protection (Microsoft)
CacheWall (Varnish)
Expression Engine (EllisLab)
Airlock (Phion/Ergon)
WatchGuard (WatchGuard Technologies)
WP Cerber Security (Cerber Tech)
Yunjiasu (Baidu Cloud Computing)
DenyALL (Rohde & Schwarz CyberSecurity)
AnYu (AnYu Technologies)
Secure Entry (United Security Providers)
ISA Server (Microsoft)
Yundun (Yundun)
FirePass (F5 Networks)
GoDaddy Website Protection (GoDaddy)
Imunify360 (CloudLinux)
Safe3 Web Firewall (Safe3)
WebSEAL (IBM)
NSFocus (NSFocus Global Inc.)
360WangZhanBao (360 Technologies)
Squarespace (Squarespace)
Imperva SecureSphere
Bluedon (Bluedon IST)
AliYunDun (Alibaba Cloud Computing)
Wordfence (Feedjit)
Palo Alto Next Gen Firewall (Palo Alto Networks)
Tencent Cloud Firewall (Tencent Technologies)
West263CDN
WebARX (WebARX Security Solutions)
Mission Control Application Shield (Mission Control)
BIG-IP Local Traffic Manager (F5 Networks)
Sitelock (TrueShield)
ZScaler (Accenture)
CrawlProtect (Jean-Denis Brun)
Teros (Citrix Systems)
AWS Elastic Load Balancer (Amazon)
Cloudbric (Penta Security)
StackPath (StackPath)
URLScan (Microsoft)
Sucuri (Sucuri Inc.)
TransIP Web Firewall (TransIP)
OnMessage Shield (BlackBaud)
Distil (Distil Networks)
Profense (ArmorLogic)
ModSecurity (SpiderLabs)
FortiWeb (Fortinet)
XLabs Security WAF (XLabs)
ASP.NET RequestValidationMode (Microsoft)
Jiasule (Jiasule)
ChinaCache CDN Load Balancer (ChinaCache)
URLMaster SecurityCheck (iFinity/DotNetNuke)
Reblaze (Reblaze)
Newdefend (NewDefend)
Trafficshield (F5 Networks)
KS-WAF (KnownSec)
SiteGuard (Sakura Inc.)
CdnNS Application Gateway (CdnNs/WdidcNet)
DataPower (IBM)
WebKnight (AQTRONIX)
BIG-IP Application Security Manager (F5 Networks)
Barikode (Ethic Ninja)
Zenedge (Zenedge)
SonicWall (Dell)
DotDefender (Applicure Technologies)
USP Secure Entry Server
AppWall (Radware)

How do I use it?

For help please make use of the –help option. The basic usage is to pass it a URL as an argument. Example:

$ wafw00f https://example.org

WAFW00F – Web Application Firewall Detection Tool

Checking https://example.org
The site https://example.org is behind Edgecast (Verizon Digital Media) WAF.
Number of requests: 1

How do I install it?

The following should do the trick:

python setup.py install

IP Finder CLI : The Official Command Line Client For IPFinder

0
IP Finder CLI : The Official Command Line Client For IPFinder

IP Finder CLI is the Official Command Line Client For IPFinder, singing up for a free account at https://ipfinder.io/auth/signup, for Free IPFinder API access token.

The free plan is limited to 4,000 requests a day, and doesn’t include some of the data fields To enable all the data fields and additional request volumes see https://ipfinder.io/pricing.

It include the following features;

  • Supports Single IP Address, asn, ranges, firewall as Input
  • Supports Bulk
  • Exports Results to Screen or to An Output File
  • Supports IPv4 and IPv6
  • Supports ASN number , RANGES , Firewall

Also Read – LANGhost : A LAN Dropbox Chatbot Controllable Via Telegram

System Requirements

Installation

Via composer

First, download the IPfinder cli using Composer:

composer global require ipfinder-io/ip-finder-cli

Make sure to place composer’s system-wide vendor bin directory in your $PATH so the IPfinder executable can be located by your system. This directory exists in different locations based on your operating system; however, some common locations include:

  • macOS: $HOME/.composer/vendor/bin
  • GNU / Linux Distributions: $HOME/.config/composer/vendor/bin
  • Windows: %USERPROFILE%\AppData\Roaming\Composer\vendor\bin

Linux Distributions / macOS

download the IPfinder cli using from github using curl

##using curl
$ curl -LO https://github.com/ipfinder-io/ip-finder-cli/releases/download/v1.0.0/ipfinder.phar
##Using wget
$ wget https://github.com/ipfinder-io/ip-finder-cli/releases/download/v1.0.0/ipfinder.phar
$ chmod +x ipfinder.phar
$ sudo mv ipfinder.phar /usr/bin/ipfinder
$ ipfinder -h

Windows

  • Download IPFINDER PHAR from github
  • Create a directory for PHP binaries; e.g., C:\bin
  • Open a command line (e.g., press Windows+R » type cmd » ENTER)
  • Create a wrapping batch script (results in C:\bin\ipfinder.cmd):

C:\Users\username> cd
C:\bin C:\bin> echo @php “%~dp0ipfinder.phar” %* > ipfinder.cmd
C:\bin> exit

  • Open a new command line and confirm that you can execute IPfinder from any path:

C:\Users\username> ipfinder –help

Vulnx : CMS & Vulnerabilities Detector & An Intelligent Bot Auto Shell Injector

0
Vulnx : CMS & Vulnerabilities Detector & An Intelligent Bot Auto Shell Injector

Vulnx is a cms and vulnerabilities detection, an intelligent auto shell injector, fast cms detection of target and fast scanner and information gathering like subdomains, ipaddresses, country, org, timezone, region, ans and more …

Instead of injecting shell and checking it works like all the other tools do, vulnx analyses the response with and recieve if shell success uploaded or no. vulnx is searching for urls with dorks.

Features

  • Detect cms (wordpress, joomla, prestashop, drupal, opencart, magento, lokomedia)
  • Target information gatherings
  • Target Subdomains gathering
  • Multi-threading on demand
  • Checks for vulnerabilities
  • Auto shell injector
  • Exploit dork searcher
  • Ports Scan High Level
  • DNS-Servers Dump

Also Read – Telegram BBBot : Telegram Bug Bounty Bot

DNS-Map-Results

To do this, we’ll run a scan with the –dns flag and -d for subdomains. To generate a map of isetso.rnu.tn, you can run the command vulnx -u isetso.rnu.tn --dns -d --output $PATHin a terminal window.

$PATH : Where export the graphs ?

Let’s zoom in and look at the Subdomains,MX & DNS Records.

Exploits

Available command line options

usage: vulnx [options]

-u –url url target to scan
-D –dorks search webs with dorks
-o –output specify output directory
-t –timeout http requests timeout
-c –cms-info search cms info[themes,plugins,user,version..]
-e –exploit searching vulnerability & run exploits
-w –web-info web informations gathering
-d –domain-info subdomains informations gathering
-l, –dork-list list names of dorks exploits
-n, –number-page number page of search engine(Google)
-p, –ports ports to scan
-i, –input specify input file of domains to scan
–threads number of threads
–dns dns informations gathering

Docker

VulnX can be launched in docker.

$ git clone https://github.com/anouarbensaad/VulnX.git
$ cd VulnX
$ docker build -t vulnx ./docker/
$ docker run -it –name vulnx vulnx:latest -u http://exemple.com

make a local volume to view the results into a logfile

$ docker run -it –name vulnx -v “$PWD/logs:/VulnX/logs” vulnx:latest -u http://exemple.com

Install vulnx on Ubuntu

$ git clone https://github.com/anouarbensaad/vulnx.git
$ cd VulnX
$ chmod +x install.sh
$ ./install.sh

Now run vulnx

Install vulnx on Termux

$ pkg update
$ pkg install -y git
$ git clone http://github.com/anouarbensaad/vulnx
$ cd vulnx
$ chmod +x install.sh
$ ./install.sh

CLICK HERE TO SHOW THE RESULT

example command with options : settimeout=3 , cms-gathering = all , -d subdomains-gathering , run –exploits

vulnx -u http://example.com –timeout 3 -c all -d -w –exploit

example command for searching dorks : -D or –dorks , -l –list-dorks

vulnx –list-dorks return table of exploits name. vulnx -D blaze return urls found with blaze dork

WhatsSpy : Trace The Moves Of A WhatsApp User

0
WhatsSpy : Trace The Moves Of A WhatsApp User

WhatsSpy Public (not to confuse with WhatsSpy) is an web-oriented application that tracks every move on WhatsApp of whoever you like to follow (by only knowing their phonenumber).

This application is setup as an Proof of Concept that WhatsApp is broken in terms of privacy. It keeps track of the following activities:

What can WhatsSpy Public do?

Profile your daily habits and smartphone usage throughout the day, if you like that or not.

It contains the following functions:

  • Track user status / status message and profile picture (history).
  • Track any privacy setting changes.
  • Be notified via various services if a user comes online/changed any of the above in WhatsApp.
  • Compare users statuses to draw conclusions.
  • Get a timeline view just like Facebook about the tracked users.
  • Group all tracked users and view statistics about them.
  • Share profiles via unique tokens.
  • Full language support for EN,DE,ES,NL

Also Read – XSSCon : Simple XSS Scanner Tool

Installling

Setting up WhatsSpy Public requires somewhat IT knowledge and you might need a second SIM card. There are for both the normal and Raspberry Pi image installation videos available.

You have three options to setup WhatsSpy Public:

For updates please check updatelog and how to update.

Screenshots

Overview

Overview edit contact

Compare

Timeline

Statistics

And it’s even mobile (pinning the webpage, not an APK)!

An external installation pinned to the home-screen of an Android phone

Parat – Python Based Remote Administration Tool (RAT)

0
Parat – Python Based Remote Administration Tool (RAT)

Parat is a simple remote administration tool (RAT) written in python. Compatible with both python 2 and 3 versions(dont forget that may causes some error.so please share us any error(s))

Do you want to try?

Copy and paste on your terminal:

git clone https://github.com/micle-fm/Parat && cd Parat && python main.py

Note: it may need to install python -m easy_install pypiwin32 on some targets.

Also Read – Rogue : An Extensible Toolkit Providing Penetration Testers An Easy-To-Use Platform

Features

  • Fully UnDetectable(FUD)
  • Compatible with Telegram messanger
  • Bypass windows User Account Control(UAC)
  • Memory executation
  • No any requirments to setup

Telegram

You can communicate it using telegram messanger. For this do steps:

  1. Open telegram.service file by an editor
  2. Insert your bot token on line 15, replaced on YOUR_BOT_TOKEN
  3. Run telegram.service by typing: python telegram.service
  4. Now you can use your bot to control it 🙂 

WhoAmIMailBot : Service To Mask Your E-Mails

0
WhoAmIMailBot : Service To Mask Your E-Mails

WhoAmIMailBot is a service to mask your e-mails. It was inspired by Blur, where you can create an alias for your e-mail and use it to signup on applications. The problem with Blur is that all e-mails pass trough their infraestructure and I don’t need/want anybody looking on my e-mails, so I made this project. It is similar to Blur service but runs on your own infraestructure!

How it works?

You will need:

  • A domain (to not expend money you can use no-ip services);
  • A VPS that allows smtp outbound;
  • A telegram bot ID;
  • Your telegram user ID;
  • This project.

Your VPS will run a postfix that will redirect e-mails using the postfix function of virtual alias (where you can set an e-mail address to redirect all incoming messages to another e-mail), the no-ip domain will be the domain which you’ll use on your alias e-mails and the telegram bot will manage your alias.

Also Read – Versionscan : A PHP Version Scanner For Reporting Possible Vulnerabilities

Installation

  • From source

git clone https://github.com/mthbernardes/WhoAmIMailBot.git
cd WhoAmIMailBot
docker build -t whoamimailbot .
docker run -d -p 25:25 –name whoamimailbot -v /data/postfix/:/data -e TELEGRAM_BOT_TOKEN=”BOT_TOKEN” -e TELEGRAM_USER_ID=”USER_ID”

  • From Hub Docker

You can download the image using the following command:

docker pull btamburi/whoamimailbot

or

docker run -d -p 25:25 –name whoamimailbot -v /data/postfix/:/data -e TELEGRAM_BOT_TOKEN=”BOT_TOKEN” -e TELEGRAM_USER_ID=”USER_I

Environment variables

This image uses environment variables to allow the configuration of some parameteres at run time:

  • TELEGRAM_BOT_TOKEN: Telegram bot token. (Use: @BotFather)
  • TELEGRAM_USER_ID: Your Telegram ID. (Use: @my_id_bot)
  • FAKE_DOMAIN: Your fake domain for receive email. (Example: mailbot.ddns.net )

Usage

On your telegram bot you have the follow commands,