Jump to content
  1. Informatii generale

    1. Anunturi importante

      Anunturile importante si regulile forumului. Cititi regulamentu​l inainte de a posta.

      12.6k
      posts
    2. Bine ai venit

      Bine ati venit pe forumul Romanian Security Team, aici va puteti prezenta (optional)

      18.1k
      posts
    3. Proiecte RST

      Aici veti putea gasi toate programele, tutorialele, metodele si exploiturile create de catre membrii RST

      4.3k
      posts
  2. Sectiunea tehnica

    1. Exploituri

      Cele mai noi exploituri, POC-uri sau shellcode-uri

      7.3k
      posts
    2. Challenges (CTF)

      Challenge-uri - Wargames, pentru amatorii CTF-urilor

      9.5k
      posts
    3. Bug Bounty

      Categorie destinata discutiilor referitoare la site-urile care au un program Bug Bounty in desfasurare prin care rasplatesc persoanele care le raporteaza vulnerabilitati

      2.2k
      posts
    4. Programare

      Coltul programatorilor: C/C++, Visual Basic, .NET, Java, ASM, Shell scripting, Perl, Python

      22.6k
      posts
    5. Securitate web

      Tutoriale si discutii legate de securitatea aplicatiilor web

      623
      posts
    6. Reverse engineering & exploit development

      Tutoriale despre analiza malware, sample-uri, cod sursa, programe utile, reverse engineering si exploit development

      1.9k
      posts
    7. Mobile security

      Discutii despre telefoane mobile, root-ing, jailbreak-ing etc.

      12.6k
      posts
    8. Sisteme de operare si discutii hardware

      Discutii in materie hardware, windows, unix, bsd etc.

      7.5k
      posts
    9. Electronica

      Discutii generale despre electronica

      2.6k
      posts
    10. Wireless Pentesting

      Wardriving area, WiFi, Bluetooth si GSM hacking

      3.8k
      posts
    11. Black SEO & monetizare

      Tips & tricks, questions, monetizare

      8.8k
      posts
  3. Programe

    1. Programe hacking

      Postati aici utilitare cum ar fi sniffere, bruteforcers, fuzzers etc. Nu faceti cereri aici.

      28.2k
      posts
    2. Programe securitate

      Postati aici programe cum ar fi firewall-uri, antivirusi si programe similare

      2.7k
      posts
    3. Programe utile

      Programe ce nu se incadreaza in celelalte sectiuni: hack sau securitate

      12.1k
      posts
    4. Free stuff

      Diverse lucruri utile, fiind excluse root-uri, SMTP-uri, VPS-uri etc.

      8.7k
      posts
  4. Discutii generale

    1. RST Market

      Orice vanzare/cumparare care are legatura cu frauda online/bancara sau access neautorizat este penalizata cu ban permanent!  Minim 50 de posturi pentru acces!

      23.9k
      posts
    2. Off-topic

      Discutii pe diverse teme, discutii care nu se incadreaza la celalalte categorii. Doar discutii din domeniul IT!

      137.1k
      posts
    3. Discutii incepatori

      Daca esti incepator, ai o intrebare simpla sau vrei sa stii mai multe despre un domeniu, aici e sectiunea potrivita

      2.9k
      posts
    4. Stiri securitate

      Stiri din domeniul securitatii IT

      20.1k
      posts
    5. Linkuri

      Postati aici doar linkurile despre securitate!

      9.4k
      posts
    6. Cosul de gunoi

      Toate topicurile care au deviat de la raspuns vor fi mutate aici.

      45.3k
      posts
  • Topics

  • Posts

    • The Malwarebytes report said a new threat actor may be targeting Russian and pro-Russian individuals.   Hossein Jazi and Malwarebytes' Threat Intelligence team released a report on Thursday highlighting a new threat actor potentially targeting Russian and pro-Russian individuals.   The attackers included a manifesto about Crimea, indicating the attack may have been politically motivated. The attacks feature a suspicious document named "Manifest.docx" that uniquely downloads and executes double attack vectors: remote template injection and CVE-2021-26411, an Internet Explorer exploit.        Jazi attributed the attack to the ongoing conflict between Russian and Ukraine, part of which centers on Crimea. The report notes that cyberattacks on both sides have been increasing.    But Jazi does note that the manifesto and Crimea information may be used as a false flag by the threat actors.    Malwarebytes' Threat Intelligence team discovered the "Манифест.docx" ("Manifest.docx") on July 21, finding that it downloads and executes the two templates: one is macro-enabled and the other is an html object that contains an Internet Explorer exploit.   The analysts found that the exploitation of CVE-2021-26411 resembled an attack launched by the Lazarus APT.    According to the report, the attackers combined social engineering and the exploit in order to increase their chances of infecting victims.    Malwarebytes was not able to attribute the attack to a specific actor, but said that a decoy document was displayed to victims that contained a statement from a group associating with a figure named Andrey Sergeevich Portyko, who allegedly opposes Russian President Vladimir Putin's policies on the Crimean Peninsula.    Jazi explained that the decoy document is loaded after the remote templates are loaded. The document is in Russian but is also translated into English.    The attack also features a VBA Rat that collects victim's info, identifies the AV product running on victim's machine, executes shell-codes, deletes files, uploads and downloads files while also reading disk and file systems information.   Jazi noted that instead of using well known API calls for shell code execution which can easily get flagged by AV products, the threat actor used the distinctive EnumWindows to execute its shell-code.   Via zdnet.com
    • valabil si doctorul Fauci la comentarii: James 2 hours ago So he basically says the vaccine doesn’t work for the delta variant, but the blame is on the people who won’t get the vaccine (which doesn’t work).  He must think we’re complete idiots at this point. marcus 19 minutes ago You have to take into account that there is literally brain dead sick people everywhere who still worship and follow this crap.   in curand in Romenistan: CDC recomandă, din nou, purtarea măștii în interior, chiar și pentru vaccinați. Statele americane fără mască au avut mai puține cazuri de Covid decât cele cu mască. Contradicțiile lui Fauci. BOMBĂ: CDC renunță la metoda de diagnosticare RT-PCR Un editorial excepțional al lui Tucker Carlson,de  la Fox News    
    • Nu pot sa cred...wtf...  :( ms. Edit : rezolvat 
    • vezi in sectiunea de stiri   PS: bine ca nu ti-ai lasat adersa
    • Salut, de la ce ar putea fi aceasta eroare An error 500 occurred on server cand verific adresa? https://www.blockchain.com/btc/address/bc1qq9tk3uhcx58y5qvmzs50nhs49m0pdkmrfpkzs4
    • Nu ar strica ceva detalii suplimentare. Public sau in privat. Nume program, producator, link descarcare daca (mai) exista, etc. Licentierea programelor este, in general, un aspect sensibil al dezvoltatorilor de software. Unii folosesc tehnologii realizate de altii pentru licentierea propriilor produse, unii se bazeaza pe propria inteligenta/creativitate.   Depinde foarte mult daca licenta achizitionata este (sau era) legata de o anumita platforma hardware (hardware ID, serie HDD ...), daca se asteapta vreun raspuns de pe un server online etc.   Exista o multitudine de modalitati de licentiere astfel incat fara detalii suplimentare nu cred ca putem veni cu solutia salvatoare. Solutie care poate exista ... sau nu.
    • Nu prea ai ce sa faci daca functionalitatea programului nu permite activarea licentei. Poti incerca sa dai ceasul cu cativa ani inapoi dar sunt slabe sanse sa functioneze (ulterior il dai inapoi). O versiune mai noua a programului nu si-ar face treaba? Poate poti discuta cu producatorul sa iti dea una noua  
    • 8DAF2JRHC U23W5P9IO IUE44GN3D 41MW71AC3 YL6UZRW51 J0O5RAGH7 QRVL118JU   HTTP bandwidth usage stats
    • folosit  HHRLE5O6Y   alte noi aici HDTWTTEWS DMRDLEQ9Z G0B5JFA2S 3P69SNBTG 5X19KVFFX IHNIK916I 3SZ1SB8OH  
×
×
  • Create New...