Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 12/01/16 in all areas

  1. 4 points
  2. Le-am oprit pentru tine man, chill
    3 points
  3. @wHoIS Pune te rog poza cu drapelul ala comandat la tine man :)))) Muie romania, bagi pula in ea de baraca.
    3 points
  4. La capatul acestui mini challenge va asteapta posibilitatea obtinerii unui loc de munca. Va urez mult succes! 1Decembrie2016.jpg > SHA-1: C0BBBAC269A7C60DB1A3C6916D9DD4C74E9CFA74
    2 points
  5. Așa e ăștia de au reușit să sară gardul și au dat de apă caldă
    2 points
  6. http://i.imgur.com/0JxHrFY.png http://i.imgur.com/GXCY3s4.jpg La cererea maestrului aelius. #
    2 points
  7. Muie romania. Muie tigani. Muie Zu.
    2 points
  8. Zici tu bre, dar femei bune ca aici mai rar prin alte locuri
    2 points
  9. Va rog frumos daca se poate sa banati acest user care e platit sigur de rusi sa ne defaime tara.Sau macar 3 zile pana trec sarbatorile in respect pt ziua Romaniei.Acest user e @aelius.Faceti va rog ceva sa nu se intre la calomnie.Mare atentie va rog! Ca un fapt divers sunt satul de interlopi de astia care daca iau 1 an steroizi se cred sefi orasului si vor sa controleze tot si ne rad in fata.Adevaratele valori raman indiferent de cati cotropitori sau defaimatori avem dar se pot pierde daca nu luam atitudine. Uitati niste citate de-ale lui(DOAR CATEVA) https://rstforums.com/forum/topic/103430-hackerul-guccifer-a-fost-adus-din-sua-%C3%AEn-rom%C3%A2nia-%C8%99i-%C3%AEncarcerat-la-penitenciarul-rahova/?do=findComment&comment=641248 https://rstforums.com/forum/topic/103836-la-multi-ani-romania/?do=findComment&comment=642975 https://rstforums.com/forum/topic/103753-recomandare-cale-de-urmat-in-domeniul-it/?do=findComment&comment=642763 https://rstforums.com/forum/topic/103580-vand-kingston-hyperx-1866mhz-8gb-x-2-2/?do=findComment&comment=642650
    1 point
  10. Ptiuuuu sa-mi trag oualele pe coliva ta de meltean... Ca m-a mancat in cur sa intru un minut. De unde dracu va parasuteaza internetu... numa voi stiti. Iti cumpara nenea un pistol cu teava intoarsa si un polonic cu luneta sa alergi dupa shemale si dupa aelius ala. Ca poate asa Rromulia va creste in intelect, cu unu ca tine in minus.
    1 point
  11. Pai nu sunt in tara la tine. Poti sta linistit. Si nici ban nu-ti dau. Imi place ca esti troll de prima mana :))) Vezi ca se da ban pe numele mamei. ahahaha
    1 point
  12. Pai tie iti pot da eu ban. Nu e problema Si fara sa discut cu cineva de asta. Am spus asa ca nu-ti dea altii ban.
    1 point
  13. O fi gasit shemale man! :)))))
    1 point
  14. Nimeni nu da doi bani pe tancuri, fasolea si carnatul ii baza.
    1 point
  15. da ce ai facut bobita ai uitat de 6 avioane luate second hand :)))
    1 point
  16. 1 point
  17. 1 point
  18. We’re publishing this as an emergency bulletin for our customers and the larger web community. A few hours ago a zero day vulnerability emerged in the Tor browser bundle and the Firefox web browser. Currently it exploits Windows systems with a high success rate and affects Firefox versions 41 to 50 and the current version of the Tor Browser Bundle which contains Firefox 45 ESR. If you use Firefox, we recommend you temporarily switch browsers to Chrome, Safari or a non-firefox based browser that is secure until the Firefox dev team can release an update. The vulnerability allows an attacker to execute code on your Windows workstation. The exploit is in the wild, meaning it’s now public and every hacker on the planet has access to it. There is no fix at the time of this writing. Currently this exploit causes a workstation report back to an IP address based at OVH in France. But this code can likely be repurposed to infect workstations with malware or ransomware. The exploit code is now public knowledge so we expect new variants of this attack to emerge rapidly. This is a watering hole attack, meaning that a victim has to visit a website that contains this exploit code to be attacked. So our forensic team is keeping an eye on compromised WordPress websites and we expect to see this code show up on a few of them during the next few days. An attackers goal would be to compromise workstations of visitors to WordPress websites that have been hacked. How this unfolded On Tuesday just after noon Pacific time, someone published a 0 day exploit for Firefox and Tor to the tor browser mailing list. Since then researcher Dan Guido posted a series of tweets with some analysis of the exploit itself. Twitter user @TheWack0lian noticed the shellcode (code that executes on your Windows workstation once exploited) is very similar to shellcode likely used by the FBI back in 2013 to deanonymize visitors to child porn websites hosted by FreedomHosting. The FBI confirmed that they compromised that server and days later it was serving malware that would infect site visitor workstations. The code then reported site visitor real IP addresses, MAC addresses (network card hardware address) and windows computer name to a central server. This code is very similar. What we found The shell code in this attack calls back to IP address 5.39.27.226, which was a web server hosted at OVH in France. The site is now down. Our own research shows that if you look up this IP address in Shodan, it had an SSL certificate that is a wildcard for the energycdn.com domain name. That site for energycdn is simplistic and according to archive.org, it has not changed since 2014. Googling energycdn.com shows that the domain is used frequently to host pirated content. Norton Safe Web reports it hosts viruses. Google Safe Browsing transparency report says the domain hosts malware and redirects to malicious sites. One could speculate that the server at 5.39.27.226 was used by energycdn.com as one of their servers to host pirated content. Perhaps the server was compromised by whoever controls energycdn to host that content and then was reinfected by the perpetrator of this new malware variant. But we’re speculating. Via wordfence.com
    1 point
  19. hunter (l)user hunter using WinAPI calls only Introduction: During Red Team engagments it is common to track/hunt specific users. Assuming we already have access to a desktop as a normal user (no matter how, always "assume compromise") in a Windows Domain and we want to spread laterally. We want to know where the user is logged on, if he is a local administrator in any box, to which groups he belongs, if he has access to file shares, and so on. Enumerating hosts, users, and groups will also help to get a better understanding of the Domain layout. You might be thinking, "use Powerview". Lately, one of the most common problems I encounter during Red Team exercises is the fact that PowerShell is heavily monitored. If you use it, you'll get caught, sooner or later. By now everyone is well aware how powerfull PowerShell is, including Blue Teams and Security Vendors. There are multiple ways to work around this. To avoid using multiple old school tools (psloggedon.exe, netsess.exe, nltest, netview, among others) and to reduce the amount of tools uploaded to compromised systems I created a simple tool that doesn't require Administrative privileges to run and collect the information listed below, and relies only on the Windows API. You might end up dealing with white list bypass and process evasion, but I'll leave that for another day. Link: https://github.com/fdiskyou/hunter
    1 point
  20. cam asa eu ma folosesc de http://netu.tv , urc la ei tot , imi da cod embed , +monentizare , la 10.000 de views 80$ , plm, si am 2 reclame atata tot , cand dau play
    1 point
  21. http://www72.zippyshare.com/v/w1NC2xWv/file.html
    1 point
  22. Combo user: pass 1,3M GirlShare - Download Big Combo List(1.329.290 Adet).txt Combo 4M Mail: pass GirlShare - Download Email Pass 3940338.txt
    1 point
  23. :))))))))) Iar tu ? vezi ca ROMANUL ala bulangiu a dat teapa rusului. A trimis omul memoriile si nu i-a platit. Exemplu clasic de #romulan. Valori ? #curve, #escroci, #hoti, #manea -> romanian tag cloud
    -2 points
This leaderboard is set to Bucharest/GMT+03:00
×
×
  • Create New...