Jump to content

All Activity

This stream auto-updates     

  1. Past hour
  2. O sa ajungi la viteze de genul numai daca descarci pe SSD sa stii, pe HDD nici pomeneala.
  3. Today
  4. OKQL

    Invitatie FileList

    La vetize de peste 100 MB/s, nu este posibil Cu stimă: Gheorghe de la coada vacìi /si doo
  5. Buna, am nevoie de un cod de invitatie pentru FileList. Am auzit ca vitezele de download sunt geniale folosind acest tracker roman. Am vazut pe net la altii vetize de peste 100 MB/s cu abonamentul de la RDS de 1000. Cine ar putea sa ma ajute cu un cod ii multumesc din toata inima. Doua coduri ar fi genial dar daca se poate unu ar fi perfect si asa. Va multumesc mult, Alex
  6. Yesterday
  7. Since 2007, hackers have provided virtual services to criminals. July 16, 2019 | 17:15 0 123 The SBU operatives with partners from the United States stopped the activities of a powerful hacker group. This was reported by the. Head of the Security Service of Ukraine Ivan Bakanov. Since 2007, hackers have provided virtual services to criminals, creating conditions for them to freely carry out illegal activities. The attackers used Dark Net - a part of the Internet that was hidden from ordinary users, where it is possible to anonymously purchase weapons, drugs and the like. Law enforcement officers could not identify the participants, because hosting did not respond to requests. Intelligence officers have established that the organizer of the group is a citizen of Ukraine, who received his first hacker experience in Moscow in the mid-2000s. Already in 2007, he began to provide his services to hackers around the world through Ukrainian networks, carefully concealing the actual location of his equipment from law enforcement officers and special services of any country. The equipment was periodically found by Ukrainian, Russian, and American law enforcement officers, confiscated it, temporarily ceased operations, but the hacker group continued to operate. The group has about ten main participants and dozens of accomplices in several countries, as well as thousands of customers. They are concerned that hundreds of terabytes of data are in the hands of the special services, which can be evidence in hundreds of criminal cases around the world. According to our estimates, we can talk about 40% of the Russian-language segment of Dark Net, ”said the acting minister. head of the SBU. In the United States alone, an average of fifty years in prison was brought against the organizer. He is accused of fraud, unauthorized interference, theft of personal data and a number of other crimes under US criminal law. In Ukraine, the organizer and another member of the group declared suspicion of committing criminal offenses under Part 2 of Art. 361 and Part 3 of Art. 301 of the Criminal Code. They are under house arrest. During the authorized investigative actions on the territory of a private house near Odessa, we found a real data center with a backup autonomous power source, security, powerful Internet access channels, which was carefully hidden. A preliminary study of network equipment and an assessment of the ranges of IP addresses used by the grouping indicates at least three autonomous systems reserved for enterprises of the Russian Federation. Given the counter-intelligence regime that exists in the Russian Federation, as well as the technological features of the organization and construction of SORM-3, possession and control of this numbering resource by the group could not take place without control and cover of Russian special services. This information allows the SBU to get a clearer picture of the cyber attacks on Ukrainian critical infrastructure facilities, and the role of the Russian special services in cyber attacks on other countries. Partea cu liftul.. chiar interesanta . Source : https://368.media/2019/07/16/sbu-razoblachila-krupnuyu-hakerskuyu-set-v-odesse/
  8. jreister

    Help

    Vezi pe chatul forumului, au băieții de acolo Koailii, e fix ce îți trebuie ție.
  9. Ai dreptate. Este vorba despre un autoposting. pentru o aplicatie care ruleaza doar pe ios/android . Am deja unul . doar ca nu mai ruleaza cum trebuie. si vreau sa fie facut altcumva .
  10. Link to PDF : https://www.sophos.com/en-us/medialibrary/PDFs/technical-papers/sophos-rdp-exposed-the-threats-thats-already-at-your-door-wp.pdf?fbclid=IwAR1Gj_oOa-2uuqEjqQCsO2l5nug2_LMPicIk-k3OQ1CDshpMThzQSmJTt18
  11. .Breacker

    Help

    Nytro said: Inainte de a posta: - verifica data ultimului post, nu redeschide un topic fara un motiv serios - daca e cazul vezi mai intai ce zice prietenul Google - gandeste-te daca postul tau e util sau postezi doar ca sa te afli in treaba - asigura-te ca nu incalci regulile - fii atent la limbajul folosit, vorbeste frumos si cat mai corect gramatical - pentru orice problema legata de forum, contacteaza-ma
  12. Duminica, 21 Iulie - ora 10:00 AM, lansam un challenge pe grupul nostru de Slack. Intra in discutie cu ceilalti membrii si afla de la ei cum a fost challenge-ul anterior, schimba idei cu ei sau poti sa iti faci un plan cu ei! Cine rezolva acest challenge primeste o invitatie gratuita la conferinta noastra, din data de 17-18 Oct, si totodata poate participa la challenge-urile noastre oficiale. Oferim 3 invitatii, mai exact o sa oferim invitatie la conferinta celor mai buni si mai rapizi dintre voi! Timpul decide cine castiga invitatia O sa postam un mic regulament despre cum se va desfasura acest challenge, de aceea zic... Hai pe Slack! - www.hackthezone.com/slack Happy Ethical Hacking, AlexHTZ
  13. Altair is a Python tool that can be used to scan for web related vulnerabilities, some of which include database vulnerabilities (SQL), Cross Site Scripting (XSS), Local File Inclusion (LFI), Remote File Inclusion (RFI), potential sensitive files, and directories containing sensitive information. The tool scans files and directories of the target host to find potential vulnerabilities. Altair can also make use of SQLMAP and Lfier tools to exploit the said vulnerabilities. SQLMAP is a handy tool that exploits database vulnerabilities. Lfier tool is capable of exploiting the LFI vulnerabilities. https://latesthackingnews.com/2019/03/03/altair-an-open-source-modular-web-vulnerability-scanner/
  14. Plin de frilensari. Sa moara jana bine-am ras. Bwahahahahahahaahahah
  15. OKQL

    Help

    Coailii V. 69
  16. Software Engineer in Cluj. Mid / Senior. Python sau confortabil sa cross-training. Ping me cu CV-uri/linkedin/github/stackoverflow whateva.
  17. gigiRoman

    Help

    Google are androidul.
  18. Poti spune si aici despre ce e vorba. Cand postezi ceva, asigura-te ca lasi detalii pentru toti utilizatorii, de aceea s-a facut categoria locuri de munca. Nu exista proiecte private, doar tepari. De fiecare data apare unul pe aici care face pe programatorul si unul care cauta. Lasati aici sa vedem si noi despre ce e vorba.
  19. Te invităm în perioada 06 iulie și 15 octombrie la Romexpo, la cea mai mare aventură spațială a vieții tale în cadrul expoziției Space Adventure, care a cucerit cinci țări deja. Expoziția vine în România cu multe jocuri interactive si simulatoare. Bucură-te de istoria uluitoare a călătoriilor spațiale și de experiența sentimentului de a fi un astronaut! Link : https://www.expozitiespatiala.ro/?utm_source=ads&utm_medium=page&utm_campaign=0045&fbclid=IwAR25GuUCkipvD262ZBP-znuZu6AuLsdfUoGYA0MjTA7chEMFdwF5OF8RSIE
  20. Cybercrime group Sea Turtle attacked the organization ICS-Forth, which controls the Greek top-level domains .gr and .el. Cisco Talos was first talked about Sea Turtle grouping in April this year. The attackers use a very unusual technique of hacking - instead of attacking the victim directly, they gain access to domain registrar accounts and managed DNS providers and change the company's DNS settings. By modifying the DNS records of internal servers, attackers redirect traffic destined for legitimate applications and the company's mail servers to the servers they control, carry out a man-in-the-middle attack and intercept the credentials. The above attacks are short-lived (lasting from several hours to several days) and invisible (most companies do not check the DNS settings for changes). According to FireEye, the group acts in the interests of the Iranian government. In order to get to the victim, Sea Turtle does not stop hacking into the provider's network entirely. As reportedin the first Cisco Talos report, the group hacked into the Swedish organization NetNod, which manages the traffic exchange point. The attack allowed attackers to manipulate the DNS records for sa1 [.] Dnsnode [.] Net and gain access to the credentials of the top-level domain administrator of Saudi Arabia (.sa) In a new report, Cisco Talos reports a similar attack on the Greek organization ICS-Forth. At the moment, researchers find it difficult to say what the attackers did in the ICS-Forth networks after hacking. It is also unknown for which domains the attackers changed the DNS settings. After the organization notified the public about the hacking, Sea Turtle remained in its networks for another five days. Source: https://www.securitylab.ru/news/499907.php
  21. Caut un programator C/C++ cu cunostinte in platformele ios/android . pentru un proiect privat . platesc pana la $50.000 si $5.000 pentru fiecare update. sau posibilitate de parteneriat garantez $10.000 pe saptamana. pentru mai multe detalii . pm .
  22. Last week
  23. In Laravel Framework through 5.5.40 and 5.6.x through 5.6.29, remote code execution might occur as a result of an unserialize call on a potentially untrusted X-XSRF-TOKEN value. This involves the decrypt method in Illuminate/Encryption/Encrypter.php and PendingBroadcast in gadgetchains/Laravel/RCE/3/chain.php in phpggc. The attacker must know the application key, which normally would never occur, but could happen if the attacker previously had privileged access or successfully accomplished a previous attack. https://www.exploit-db.com/exploits/47129
  1. Load more activity
×
×
  • Create New...