Jump to content

All Activity

This stream auto-updates

  1. Past hour
  2. Ya I bet! Makes me wonder how they frame it in their minds, when they can protect systems one day and the next day they are breaking into others (or whatever else).
  3. Today
  4. Nu cred ca ai sanse.
  5. Si eu am aceasi problema
  6. Salut! Am un laptop infectat cu un ransomware care pare să fi activat BitLocker pe toate partițiile. Cere o cheie de decriptare. Există vreo metodă de bypass sau de recuperare fără să plătesc? 💬 Răspuns 1 – TechGuru Din păcate, când ransomware activează BitLocker, nu folosește cheia ta de recuperare, ci generează un key protector nou și înlocuiește tot ce era în TPM. Asta înseamnă: TPM-ul nu mai conține cheia ta originală BitLocker nu poate fi “spart” Algoritmul AES folosit este imposibil de decriptat prin brute-force Nu există bypass tehnic dacă atacatorul a setat protector nou. 💬 Răspuns 2 – CyberMedic Există câteva lucruri pe care le poți verifica TOTUȘI: ✔️ 1. Caută automatele de backup ale cheii BitLocker În cazuri rare, ransomware-ul nu șterge toate copiile. Verifică: contul Microsoft → https: aka.ms/aadrecoverykey Azure AD (dacă e laptop de firmă) Domain Controller (în mediu enterprise) Stick USB pe care poate ai salvat cândva cheile 💬 Răspuns 3 – DigitalForensix ✔️ 2. Verifică Shadow Copies – DAR… Majoritatea ransomware-urilor rulează: vssadmin delete shadows /all /quiet … dar unele eșuează. Poți încerca cu: vssadmin list shadows Dacă există shadow copies → poți recupera fișierele înainte de criptare. 💬 Răspuns 4 – RootAccess ✔️ 3. Live Linux + carving Chiar dacă partiția e criptată, uneori: ransomware-ul reinitializează BitLocker dar nu apucă să cripteze tot SSD-ul sau lasă date în unallocated space Poți încerca: Autopsy FTK Imager PhotoRec / TestDisk Nu vei recupera tot, dar uneori scoți documente nefragmentate. 💬 Răspuns 5 – SecResearcher ✔️ 4. Dacă ransomware-ul este cunoscut, uneori există decryptor Pentru anumite familii de ransomware, cercetătorii reușesc să recupereze cheile sau să creeze decryptor. Verifică pe NoMoreRansom.org (Kaspersky + Europol). Sunt sute de decryptor-e gratuite.
  7. Yesterday
  8. This is a good point. There are also people doing both: whitehat as working for some governments, blackhat for doing "bad" stuff like APTs.
  9. Great! I will, thanks!
  10. I'd love to discuss this more if you're interested in chatting! I'm working on a university project about perspectives related to the human element of hacking. You can message me
  11. Ya I get what you're saying. Since there are people doing black hat, most probably have day jobs as well then - especially if they can't make too much with the black hat stuff. Maybe some even work in white hat roles, who knows...if you want to chat more about this topic I am completing a project for university! You can message me
  12. Last week
  13. The main difference between a whitehat and a blackhat is the way they sleep. Being blackhat means you do illegal stuff. I know, hiding IP bla bla, but in the end you get some money, use it, or you make a mistake or something and there are chances to end up in prison. I prefer less money but no worries. Regarding companies hiring in India or other countries, it is like people buying stuff: some buy from Temu, some get Lamborghinis, there is enough for everyone. As a whitehat, you need to offer quality for your services. And this, for sure, happens on the blackhat market as well. As a short conclusion, my opinion on this: it is very difficult to make a lot of money as blackhat, to be actually worth it. There are few people doing this. While there are millions of IT persons just doing well, having nice lives, family and everything they really need (not Lambos).
  14. First, you have to wise up to how clueless the corporate suits are and what a clown show the corporate world is from the inside. Why should I feel bad about jumping ship? If they're going to shuffle all their OPEX to CAPEX, they'll just be stuck with garbage security tools that generate more noise than anything useful. The security talent pool is a joke, all over the world, belive me, I've run plenty of interviews. If those are the people getting hired, then good luck to those companies, they will more than sure need it. Then you've got bug bounties, where you're totally at the mercy of the triagers. Have fun finding a solid bug just to be told it's a 'duplicate' or even worse, they accept it and then cut the bounty in half. From where I'm sitting, playing by the rules just isn't worth it anymore. I'm not telling anyone else what to do, but the whole situation in tech is a mess worldwide. So, you should probably expect things to get a lot uglier next year, in terms of security incidents. 10 years ago, yeah, maybe you could become a black hat with not too much repercursions, at least in Romania. Nowadays, the situations is a bit different, laws are harsher, Police is smarter (lol) and you need to be smarter than all of them. Go to Thailand, Vietnam, Philippines or Italy if you want to start your criminal career. Something to think about, I've seen an increase of old school members coming back to this place after more than 10 years of inactivity, what does that tell you? If you want to break the patterns, you will need to change your entire mindset, and, instead of working for some corporate jokers you should build something yourself. Really curious on what @Nytro and @Noriega have to say on this, as I'll always consider other opinions from people which I consider to be smarter than me. Let's not normalize layoffs, this isn't going in the right direction:
  15. That's a fair point. Do you think switching sides would be difficult for some? I mean in terms of feeling bad?- or do you think its easy to turn that off?
  16. Salut as avea si eu nevoie :D
  17. Yeah, let's normalize being let go every once in a while, live in a constant stress. Security teams are being disbanded in each and every company, replaced with cheaper workforce from Pakistan, India and so on, this is the reality we're living in right now. Even if you get enough money, it's still not a normal situation. AI AI AI AI FTW! Maybe it's time to switch sides, being a white hat isn't worth it anymore imo.
  18. Alright, so you want to understand our crew, eh? You've got to dig into the archives. Here's the essential lore: Polonique: Look up who she is and the whole story behind her arrival. Pax & the Yahoo XSS Saga: Find out who this person was, what they pulled off, and where they ended up. The RST vs. Mortal Team 'War': You'll want to see who won and get the scoop on the forum admin's... let's just say 'strong personality' and how they handled things."
  19. Are you asking where I am from or what race I am? I am from Canada
  20. I think
  21. I-a luat telefonul o cioara imputita de la parnaie si l-a vandut pe doua conserve de pateu, o franzela, si un cabanos, ca e foamea mare acolo.
  22. Si daca ai afla ca intr-adevar o impuleste altul cu ce te ajuta? E evident ca nu o sa o mai privesti cu acelasi respect si incredere niciodata, chiar daca nu ar avea alt maciucar. Mai bine divortezi si stai linistit.
  23. Hello, what race are you?
  24. Earlier
  25. It is not worth it to be blackhat. You can get enough money being whitehat.
  26. Thanks for the comment! I am not a bot haha Do you think that a lot of whitehats have dabbled in blackhat at some point maybe out of curiosity or just learning?
  27. nice outing and thanks for the work
  28. Stiu eu o aplicatie utila se numeste apel telefonic ... adica inainte sa vii acasa pui mana si o suni ca sa o anunti sa aiba timp si femeia sa se imbrace sa plece si prostul ca sa nu fie necesar sa te trimita sa duci gunoiul cand esti in pragul usii
  29. Hi, welcome, post something so we are sure you are not a bot. There are not too many blackhats around here, we are the poor whitehats. But there was one person with billions of dollars (that's what he said) teaching us how to be reach at some point.
  30. @Gangjas mai esti?
  1. Load more activity
×
×
  • Create New...