Forums

  1. Informatii generale

    1. Anunturi importante

      Anunturile importante si regulile forumului. Cititi regulamentu​l inainte de a posta.

      7695
      posts
    2. Bine ai venit

      Bine ati venit pe forumul Romanian Security Team, aici va puteti prezenta (optional)

      17634
      posts
    3. Proiecte RST

      Aici veti putea gasi toate programele, tutorialele, metodele si exploiturile create de catre membrii RST

      4376
      posts
  2. Sectiunea tehnica

    1. Exploituri

      Cele mai noi exploituri, POC-uri sau shellcode-uri

      6866
      posts
    2. Challenges

      Challenge-uri - Wargames, pentru amatorii CTF-urilor

      9625
      posts
    3. Bug Bounty

      Categorie destinata discutiilor referitoare la site-urile care au un program Bug Bounty in desfasurare prin care rasplatesc persoanele care le raporteaza vulnerabilitati

      2034
      posts
    4. Programare

      Coltul programatorilor: C/C++, Visual Basic, .NET, Java, ASM, Shell scripting, Perl, Python

      21910
      posts
    5. Reverse engineering & exploit development

      Tutoriale despre analiza malware, sample-uri, cod sursa, programe utile, reverse engineering si exploit development

      1481
      posts
    6. Mobile phones

      Discutii despre telefoane mobile, root-ing, jailbreak-ing etc.

      11767
      posts
    7. Sisteme de operare si discutii hardware

      Discutii in materie hardware, windows, unix, bsd etc.

      7156
      posts
    8. Electronica

      Discutii generale despre electronica

      2406
      posts
    9. Wireless Pentesting

      Wardriving area, WiFi, Bluetooth si GSM hacking

      3540
      posts
    10. 8476
      posts
  3. Tutoriale

  4. Programe

    1. Programe hacking

      Postati aici utilitare cum ar fi sniffere, bruteforcers, fuzzers etc. Nu faceti cereri aici.

      27690
      posts
    2. Programe securitate

      Postati aici programe cum ar fi firewall-uri, antivirusi si programe similare

      2568
      posts
    3. Programe utile

      Programe ce nu se incadreaza in celelalte sectiuni: hack sau securitate

      11947
      posts
    4. Free stuff

      Diverse lucruri utile, fiind excluse root-uri, SMTP-uri, VPS-uri etc.

      8774
      posts
  5. Discutii generale

    1. RST Market

      Orice vanzare/cumparare care are legatura cu frauda online/bancara sau access neautorizat este penalizata cu ban permanent!  Minim 50 de posturi pentru acces!

      22517
      posts
    2. Off-topic

      Discutii pe diverse teme, discutii care nu se incadreaza la celalalte categorii. Doar discutii din domeniul IT!

      135340
      posts
    3. Discutii incepatori

      Daca esti incepator, ai o intrebare simpla sau vrei sa stii mai multe despre un domeniu, aici e sectiunea potrivita

      689
      posts
    4. Stiri securitate

      Stiri din domeniul securitatii IT

      19267
      posts
    5. Ajutor

      Ai o problema si te putem ajuta? Posteaza aici.

      108968
      posts
    6. Cereri

      Cererile se fac doar aici, indiferent de subiect.

      50511
      posts
    7. Sugestii

      Vreti un forum mai bun? Orice sugestie din partea voastra va fi analizata. Doar sugestii pentru site/forum.

      5018
      posts
    8. Linkuri

      Postati aici doar linkurile despre securitate!

      9536
      posts
    9. Cosul de gunoi

      Toate topicurile care au deviat de la raspuns vor fi mutate aici.

      44286
      posts
  • Who's Chatting

  • Topics

  • Posts

    • Web Hacking 101 On December 22, 2015, Twitter paid over $14,000 to ethical hackers for exposing vulnerabilities. This wasn't a shakedown. Sites like Twitter, Shopify, Dropbox, Yahoo, Google, Facebook and more, ask ethical hackers to report security bugs and pay them. This book will teach you how you can get started with ethical hacking.   aHR0cDovL2Jvb2t6ei5vcmcvYm9vay8yNTk1NjcwLzE5YTgyZi8/X2lyPTE=        
    • Please login or register to see this link.   [...]   Live Audio Listening The EXTENDING implant also exfiltrates audio over a Wi-Fi hotspot, to a Live Listening Tool, running on a laptop. The Live Listening Tool can save files locally to disk as well as playing the received audio through the speakers.   Fake-off Recording EXTENDING will continue to record audio, even whilst the TV appears to be off. This is achieved by intercepting the command for the TV to switch-off and turning off the TV screen, leaving the processor running.   Kewl shit.
    • Judge authorized order allowing US to change data in thousands of infected devices.   Mass hacking seems to be all the rage currently. A Please login or register to see this link. apparently slipped secure code into vulnerable cameras and other insecure networked objects in the "Internet of Things" so that bad guys can't corral those devices into an army of zombie computers, like what happened with the record-breaking Mirai denial-of-service botnet. The Homeland Security Department issued alerts with Please login or register to see this link. for fending off similar “Brickerbot malware,” so-named because it bricks IoT devices. And perhaps most unusual, the FBI recently obtained a single warrant in Alaska to hack the computers of thousands of victims in a bid to free them from the global botnet, Kelihos. On April 5, Deborah M. Smith, chief magistrate judge of the US District Court in Alaska, greenlighted this first use of a controversial court order. Critics have since likened it to a license for mass hacking.   The FBI Please login or register to see this link. to Please login or register to see this link.  victims through a new procedural rule change that took effect in December amid worries among privacy advocates that the update would open a new door for government abuse. But the first use of the amendments to Please login or register to see this link. of the Federal Rules of Criminal Procedure has assuaged fears, at least for the moment, because the feds used their power to kill a botnet. The Electronic Frontier Foundation, for example, commended the feds for asking a judge to review exactly what data the FBI would and would not touch in victimized devices, which were located across the country. It was a "positive step" toward accountability and transparency in FBI computer break-ins, EFF staff attorney Andrew Crocker said. This wasn't the first time the government has gained permission from a federal court to jump in and clean infected computers worldwide. To dismantle Please login or register to see this link. , once considered the most damaging botnet, the US obtained civil and criminal court orders in federal court in Pittsburgh "authorizing measures to redirect the automated requests by victim computers for additional instructions away from the criminal operators to substitute servers," as well as "to collect dialing, routing, addressing and signaling ("DRAS") information from the Please login or register to see this link. ," Justice Department officials said at the time in 2014. For Kelihos, the feds needed stronger legal standing to free hostage computers because of the peer-to-peer nature of the infection, which demanded more "active measures," says John Bambenek, a manager at Fidelis Cybersecurity who's helping with the botnet cleanup. The FBI "had to infect machines," convert them into so-called supernodes that distribute connection lists to other victimized computers, and then "poison" all the computers so they would never again try to communicate with hacker-controlled devices, said Bambenek, who also assisted on the 2014 Gameover Zeus cleansing operation. With the Gameover Zeus botnet, the government wasn't modifying someone else’s computer. It was taking over malicious domains the computers were communicating with, he said. With Kelihos, "we were in essence actually changing data," and the Justice Department reasoned that this required the government to assert Rule 41, according to Bambenek. Often, the feds “use uncertainty as an excuse, or cover, for not getting a warrant," Crocker said. This time, "the government was proceeding with a lot more caution than in some of the other cases." He pointed to the government's warrantless use of secretive cellphone "Stingray" tracking equipment that continued for many years until the Justice Department released a seven-page legal use Please login or register to see this link. in 2015. But concerns remain that authorities might abuse the rule revisions, which empower judges to grant a single warrant for searching or seizing information on any number of devices, regardless of location. To kill Kelihos The Rule 41 reboot is the judicial branch’s acceptance of the reality that the Internet has no borders, and criminals increasingly are hiding their whereabouts through digital obfuscation. Authorities had complained that legal ambiguity, as well as the process of obtaining multiple warrants to probe far-flung devices, were hampering efforts to dismantle botnets like Gameover Zeus and to unmask child pornography users. (Last month, prosecutors in Washington state Please login or register to see this link. all charges against a child porn suspect rather than disclose the pre-Rule 41 inner workings of classified intrusion tools that federal investigators used to hack Playpen, a now-shuttered underage exploitation website.) "The law more generally has not really grappled with government hacking, and this is one of the more explicit references to this kind of activity by the government," Crocker said. The government says the FBI and hired cybersleuths did not view the contents of any of the machines infected by Kelihos, which spammed e-mail inboxes, stole banking credentials, and dispersed malware all over the Web. The government did collect each victim's IP address and "non-content" routing and signaling information so that Internet Service Providers could notify the victims, the Justice Department said. What's more, this month’s court order limits the FBI’s interaction with victimized machines to commands that block an infected computer from performing malicious activities and communicating with other devices in the botnet. In addition, it prohibits the government from seizing contents inside the victim's device and interrupting Internet access. Meanwhile, some criminal defense attorneys say Rule 41 could be enhanced to clearly spell out safeguards for civil liberties during bulk hacks by the government, similar to those imposed for wiretapping in the late 1960s. "Right now for lack of that kind of control, it will be easier to attack these searches” of personal devices as inadmissible during a trial, because lawmakers have not carefully considered privacy protections, said Peter Goldberger, chair of the National Association of Criminal Defense Lawyers Rules of Procedure Committee. The department announced last week that it had fingered Pyotr Levashov as the alleged operator of the Kelihos botnet. The Russian was Please login or register to see this link. by a federal grand jury in Bridgeport, Connecticut.   Sursa: Please login or register to see this link.
    • Suite for Information Gathering written in python 3.5. This tool automates some steps of Information Gathering from a target The module Google Hacking uses the tool: Please login or register to see this link. automatically. This module has been modified to be compatible with python 3.5. Please login or register to see this link. Installation pip install -r requirements.txt If you want to use nmap customized mode, you must install it in your computer. Please login or register to see this link. Usage Just write: python maxrecon.py. Don´t forget using sudo if you want to use the nmap feature.   Download: Please login or register to see this link.
    • nu vreau "moka", va las pm la amandoi.
    • Stimați participanți,
      Ne-ar face placere să lucram cu site-ul dvs. / plugin / video sau domeniu de găzduire.
      Monetizati fiecare utilizator cu un singur click! AdPop este o poziție favorabilă sub rețea publicitară și aici aveți doar o mică mostră a ceea ce se poate obține:
      • manager de cont personal;
      • Programul de Referral 5%;
      • este perfect pentru lansarea de produse sau mărci;
      • niveluri extreme de angajament și urmați link-uri;
      • Link direct sau comanda fila java. Testele au arătat că, dacă utilizați pop-under (chiar sub pagina) poate duce la o creștere de 7 ori a numărului de conversii și de 9 ori eCPM. Limita de frecvență interstițială, care arată o dată la fiecare 24 de ore, se asigură, de asemenea, o experiență pozitivă cu AdPop. Te rog, adauga numele de utilizator Skype Alina AdPop. Hai sa vorbim despre modul în care putem lucra împreună și de a începe pentru a obține premiul în bani. Așteptăm cu nerăbdare să răspunsul dumneavoastră! Toate cele bune,
      ECHIPA ADPOP
    • Eu i-am raspuns lui Che:)

      Pentru orice small-business outsourcingul e perfect.