Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 03/15/16 in all areas

  1. Salut, Am pont de facut bani: munca. Incercati, si dupa 1an veniti sa-mi spuneti daca a functionat.
    5 points
  2. Romtelecom avea niste servicii de tot cacatul, de toata pula, muite, futute, gaozarite, slobozite in gura, cred ca Telekom doar a preluat infrastructura si nu a imbunatatit nimic.
    2 points
  3. MicrosoftLumiaRO are redirect catre MicrosoftLumia. Numarul de like-uri intre cele doua pagini este aproape identic. Probabil din cauza redirectului a fost modificat numarul de like-uri? (astfel incat sa indice numarul like-urilor paginii MicrosoftLumia, in loc de MicrosoftLumiaRO) EDIT: https://www.facebook.com/business/help/331800410323820 tl;dr: Global Pages allow advertisers to provide localized versions of their content for their customers all over the world, but with one universal brand name, total fan count, vanity URL, and global insights across their entire fan base.
    2 points
  4. Monday, March 14, 2016 Bypassing Antivirus With Ten Lines of Code or (Yet Again) Why Antivirus is Largely Useless I had originally set out to write a long winded blog post on different antivirus bypass techniques. I went through what was supposed to be step 1 of my guide and uploaded my resultant binary to virustotal. To my complete and utter shock, the binary got a 0/56 detection rate. I decided to throw out my long winded idea and move forward with this quick, dirty, and unbelievably easy method. I believe that most of my readers would agree with me that bypassing most antivirus based solutions is rather trivial, however I do occasionally bump in to some people who solely rely on tools that generate binaries that can easily be fingerprinted and flagged by antivirus solutions. This article is largely intended for that audience. Before I dive in to this small tidbit of C++ code, I'd like to touch on a tool that is really good at producing binaries that almost always evade detection, Veil-Evasion (part of theVeil-Framework). This tool is awesome (many thanks to @harmj0y and others for creating and contributing to this awesome project) and in almost all instances I have had to use it has not let me down. If it has, I blame people who keep generating binaries and then testing them on virustotal. If you people could stop doing that, that would be great. At any rate, this begs the question, if tools like Veil Evasion are so epic, why should you care about knowing how to slap togother a binary with a shellcode payload yourself? Well there are a number of reasons: People get busy and tools become deprecated The binaries generated by tools become fingerprintable; not the payload necessarily, but the compiled structure of the binary. As a penetration tester, you should really know how to do this. Ups your leet cred.. or so I hear. Before you take a look at the below code, it's worth noting that this is targeting the windows platform; as obviously noted with the reference to windows.h #include <windows.h> #include <iostream> int main(int argc, char **argv) { char b[] = {/* your XORd with key of 'x' shellcode goes here i.e. 0x4C,0x4F, 0x4C */}; char c[sizeof b]; for (int i = 0; i < sizeof b; i++) {c = b ^ 'x';} void *exec = VirtualAlloc(0, sizeof c, MEM_COMMIT, PAGE_EXECUTE_READWRITE); memcpy(exec, c, sizeof c); ((void(*)())exec)(); } Quite simply, the above code creates a character array with shell code you can add, performs an XOR operation with the incredibly sophisticated key of lowercase 'x', allocates some memory, copies the character array in said allocated memory, and executes it. It may be worth highlighting that you will need to XOR your shellcode with your key of choosing (in this case 'x') before you put it in the above code and compile. So you are probably looking at that and thinking 'really?' - I know how you feel. This is how I felt after I intended this to be step 1 of my tutorial and I ran it through virustotal and it returned 0/56 detection. I'd like to stress that this is an incredible simple and most basic technique, yet its success is still rather astonishing. I originally wrote this example and tested it on virus total a while ago, but I did reanalyze the executable on virustotal at the time of publishing this post and found it still had a 0 detection rate. The binary you generate will very likely not match the SHA256 of the binary I have tested; the binary I uploaded contained shellcode generated with the metasploit framework. Final Comments Alright, so antivirus is dead. We all know that. That being said, we can't argue that over 95% of organizations are still depending on antivirus to protect endpoints. Is there a better way? certainly. A number of vendors, which I shall not name, have launched products that take a new approach to protecting endpoints primarily focusing on identification of known exploit techniques. This is usually performed by way of injecting DLLs in to processes that will monitor for these known techniques and prevent the exploit from working successfully. Is this fool proof technique? I would be inclined to say no. The bar will be raised, but a new type of cat and mouse game will begin. Final note: The above may not work on _all_ antivirus solutions. I figure that was obvious, but thought I would mention it before the pitch forks come after me! Sursa: http://www.attactics.org/2016/03/bypassing-antivirus-with-10-lines-of.html
    2 points
  5. Mi s-a parut interesant, poate cineva e interesat daca face jocuri : https://www.humblebundle.com/cryengine-bundle
    1 point
  6. E prima oara cand aud de tutoriale pentru avansati. Daca vrei cauta proiecte sa faci. Asta e singura solutie.
    1 point
  7. @Sveratus: Mai lasa-ne coaie cu offtopicul tau si du-te la sapat. Hai, restricted la postat pe-aici pana se indura ceva mod de tine ca mie mi-e scarba de ratati.
    1 point
  8. 1 point
  9. Mare prost mare om .. daca taicato sau un părinte ar pății asta tu ce chef de munca ai cand afli ca taicato are cancer ... sau daca nu ai terminat inca școlile ?
    1 point
  10. De ce nu faci public sa invatam toti,sau matale cauti referali ori sclavi cibernetici.ceva e putred in Danemarca,cum zicea un mare nene.
    1 point
  11. Man, eu si silent citim carti... Scriem carti :))))))) SEriously?!
    0 points
  12. In loc de copypaste pune linkul daca totusi vrei sa pui copypaste pune o descriere mai scurta sau tradusa
    -1 points
  13. Ia zi moldovene care e numarul tau de la masina sau esti atat de sarac ca n-ai masina?Virginule daca te prind in strada te iau pe capota saracule.Taran basit ai venit o zi in capitala si te crezi scapatat ,tot un moldovean prost ai ramas.Cand ai venit prima oara la oras,tia-i asezat mamaliga pe capacul de la WC credeai ca-i masa de la bucatarie cu cos.Mars la tara moldovene dute sa te stergi la cur cu frunze de bostan crezi ca ma impresionezi ,ai crescut in porumb tot taran esti duten mm nu ma faci tu pe mn taran,tu care tea facut ma-ta in fanarie.
    -1 points
  14. Eu va spun ca nu o sa mai scapati de milogi astia spammeri daca nu inchideti postariile astea de milogii si sai banatii , adica ce plm tiai gasit aici sa ceri bitcoin pt tactu duteb plm la munca si intretinel tu sti cati mortii mati au cancer in tara asta?
    -3 points
×
×
  • Create New...