Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 07/03/17 in all areas

  1. 4 points
  2. Have you tried here https://gloryholefoundation.com ?
    2 points
  3. Traffic Exploder is a bot that will allow you to Dominate website traffic. This bot will supercharge your website, increasing the visitors, views and bounce rate by ten fold. Traffic will continuously flow from every part of the world based on the parameters you specify. Imagine what unlimited traffic can do for you : Decrease bounce rate Increase impressions Increase Unique Visitors Make your site more appealing to banner ad marketplaces (via more impressions) Increase views on any page which counts views and ranks/rates you based on those views Lower Alexa (untested) Sell Traffic to others for an easy income Sell View Increasing Services Sell your high-traffic site for more (vs. no traffic site) and more.... Features : Enter an Referral URL (New 1.06) Deep link clicking (New 1.06) Improved Proxy Finding/Testing (New 1.06) Improved Thread Control (New 1.06) Multiple URLs Unlimited Views Proxy Harvester - Built into the core, never worry about proxies or unique IPs Proxy Scrubbing Random Pause Interval Timeout Control Thread Control Easy to use, get started in seconds Progress Bar and Statistics Safe Traffic : This bot generates safe traffic to your website. It does not click on any ads nor will it get you banned from any ad marketplaces. Download
    1 point
  4. See you in November at DefCamp 2017 Want to experience a conference that offers outstanding content infused with a truly cyber security experience? For two days (November 9th-10th) Bucharest will become once again the capital of information security in Central & Eastern Europe hosting at DefCamp more than 1,300 experts, passionate and companies interested to learn the “what” and “how” in terms of keeping information & infrastructures safe. Now it’s getting really close: this year's conference is only months away, and that means very early bird tickets are now available. Register Now at DefCamp 2017 (50% Off) What can you expect from the 2017 edition? 2 days full of cyber (in)security topics, GDPR, cyber warfare, ransomware, malware, social engineering, offensive & defensive security measurements 3 stages hosting over 35 international speakers and almost 50 hours of presentations Hacking Village hosting more than 10 competitions where you can test your skills or see how your technology stands 1,300 attendees with a background in cyber security, information technology, development, management or students eager to learn How to get involved? Speaker: Call for Papers & Speakers is available here. Volunteer: Be part of DefCamp #8 team and see behind the scene the challenges an event like this can have. Partner: Are you searching opportunities for your company? Become our partner! Hacking Village: Do you have a great idea for a hacking or for a cyber security contest? Consider applying at the Hacking Village Call for Contests. Attendee: Register at DefCamp 2017 right now and you will benefit of very early bird discounts. Register Now at DefCamp 2017 (50% Off) Use the following code to get an extra 10% discount of the Very Early Bird Tickets by June 27th. This is the best price you will get for 2017 edition. Code: DEFCAMP_2017_VEB_10 Website: https://def.camp/
    1 point
  5. Same issue macOS Chrome
    1 point
  6. Poti face si cu virtualbox pe debian. Am in productie de aproape 2 ani si functioneaza perfect. Fugi de ubuntu daca vrei stabilitate si nu vreun desktop acasa.
    1 point
  7. ● freebbble.com Free design elements from Dribbble. ● dribbble.com Search Dribbble request "freebie". Priceless! ● graphicburger.com Attractive work, made with care for each pixel. ● pixelbuddha.net Free and premium work for the professional community. ● wearebridge.co works in the style of the material design based on Google's leadership. ● premiumpixels.com Free creative work for children. ● fribbble.com Free PSD format works from the Dribbble website users. ● freebiesbug.com Fresh free work for designers. ● 365psd.com Download free psd every day. ● dbfreebies.co best free sites with Dribbble and Behance. ● uispace.net high-quality work for the coolest people. ● www.pixeden.com/free-design-web-resources free operation. ● creativemarket.com/free-goods Fresh free work on Mondays. ● freepik.com Graphic elements for each. ● techandall.com Free work, news and other information. ● invisionapp.com/tethr most beautiful set of design elements for iOS. 30 useful resources for graphic designer All are invited to fill up the font files, textures, plug-ins, templates, brushes, action and different clipart. Please note you will need to carefully separate the wheat from the chaff on these resources. But the chance to find something suitable is still there. 1. www.umka.kharkov.ua/htmlbr/pack088.html - more than 800 sets of brushes 2. zerolayer.ru/ - brushes, shapes, textures, action games, frames, fonts 3. globator.net/ - brushes, styles, fonts 5. tutbrush.com/ - brushes. Sorted by topic. 6. www.0lik.ru/ - gradients, patterns, brushes, Action Games, styles, textures, forms, templates 7. photoshopmix.ru/ - brushes, patterns, textures, shapes, Action Games, fonts, gradients 8. demiart.ru/ forum forum / s = dd5a1f42da7b55558fa3f2fd the index.php? .. - warehouse on Demiarte: brush, plug-ins, clip 9. photoshopbrushes.ru - brushes. Sorted by topic. 10. www.gzweb.ru - gradients, brushes, Action Games, styles, textures, shapes, patterns 11. www.vsekisti.ru - a huge collection of brushes 12. goldenone.ru/ - brushes, fonts, templates 13. www.photoshop- master.ru/ - gradients, brushes, Action Games, styles, textures, shapes, patterns 14. www.rozhdestvo.org/ - Christmas brushes, fonts, styles, clipart 15. fotodryg.ru/ - brushes, fonts, shapes 16. www.alldesign.biz/ - gradients, brushes, Action Games, styles, textures, forms, templates, fonts 17. design-mania.ru/category/downloads - templates, brushes, fonts, textures 18. balbesof.net/down/view/brashs.html - a collection of brushes 19. design.ru-deluxe.ru/ - styles, shapes , textures, plug-ins, frames, patterns 20. www.grafamania.net/photoshop - brushes, fonts, templates, frames 21. deeplace.net/ - brushes, plugins, Action Games, clipart, fonts, borders, textures 22. 2dtutorials.ru / download - brushes, fonts, styles, clipart 23. photoshope.ru/index.htm - plugins, brushes, actions, styles, shapes, gras ienty, textures, fonts 24. colorworld.org/ - plugins, brushes, styles, gradients, textures, fonts 25. rukoyatki.ru/photoshop - gradients, brushes, Action Games, styles, textures, forms, templates, drawing 26. www. forum.thesoul.ru/index.php?showforum=6 - texture, brush, styles, filters 27. www.zerores.com.ru/ - fonts brush 28. www.cwer.ru/dlya_photoshop_0 - brushes, masks, eksheny , textures, fonts 29. www.deviantart.com/ - brushes, textures, shapes, fonts 30. fordezign.ru/ - Action Games, gradients, brushes, plugins, styles, textures large list of useful resources for designers and web-developers 1. photos Free resources Unsplash - www.unsplash.com Picjumbo - www .picjumbo.com Gratisography - www.gratisography.com Superfamous - www.superfamous.com Little Visuals - www.littlevisuals.co Split Shire - www.splitshire.com Pixabay - www.pixabay.com I of'm the Free - www.imcreator. com / free the New Old Stock - www.nos.twnsnd.co the Function the free Photos - http://wefunction.com/category/free-photos/ Paul Jarvis the free Photos - http://pjrvs.com/a/photos Paid resources Compfight - www.compfight.com Stocksy - www.stocksy.com Placeit the Product Shots - www.placeit.net iStockphoto - www.istockphoto.com 2. Fonts Okay the Type - www.okaytype.com Typekit - www.typekit.com the My Fonts - www.myfonts.com Fonts - www.fonts.com the Font Squirrel - www.fontsquirrel.com Da the Font - www.dafont.com the Google Fonts - www.google.com/fonts 1001 the Free Fonts - www.1001freefonts.com of Lost the Type Press the op-Co - www.losttype.com Ico Moon - www.icomoon.io 3. Mockup Mockupr - www.mockupr.com Flinto - www.flinto.com Flinto Icon Strike!  - www.flinto.com/strike WebFlow - www.webflow.com Mockuuups - www.mockuuups.com 4. Preliminary design Moqups - www.moqups.com Wireframe.cc - ww.wireframe.cc Mockflow - www.mockflow.com a Mockingbird - www.gomockingbird.com 5. Prototyping Mixture - www.mixture.io Gridset - www.gridsetapp.com 6. Adaptive design Responsive.is - http://responsive.is/type .. Gridpak - www.gridpak.com for Responsive nav - www.responsive-nav.com Off the Navigation Screen - http://tympanus.net/Development/MultiLevelPushMenu/ for Responsive the Web Design the Test - www.designmodo.com/responsive-test/ Media Queries - www.mediaqueri.es Foundation by ZURB - www.foundation.zurb.com Jetstrap - www.jetstrap.com WebFlow - www.webflow.com Gridset - www.gridsetapp.com BrowserStack - www.browserstack.com Sassaparilla -  http://sass.fffunction.co the Dimensions - the Extension the Chrome 7. Working with color 0 to 255 - www.0to255.com Colour Lovers - www.colourlovers.com Brand the Colors - www.brandcolors.net as Adobe Kuler the Color Wheel - https:// kuler.adobe.com/create/color-wheel/ the Color a Scheme Designer - www.colorschemedesigner.com Hex to the RGB Converter - http://hex.colorrrs.com 8. the CSS Animate.css - www.daneden.me/animate of CSS3 the Animation Cheat Sheat - http://www.justinaguilar.com/animations/index.html the Can I of the Use?  - www.caniuse.com the Animation the Fill Code - www.animationfillcode.com 9. the HTML 5 the HTML5 Please - www.html5please.com the Can I of the Use?  - www.caniuse.com 10. Free files for Photoshop PSDS.co - www.psds.co Fribbble - www.fribbble.com Premium the Pixels - www.premiumpixels.com Teehan + Lax iOS 7 PSD file Gui (the iPhone) - www.teehanlax .com / tools / iphone Teehan + Lax iOS 7 PSD Gui (iPad)  - www.teehanlax.com/tools/ipad/ iPhone Mockuuups - www.mockuuups.com 11. Icons Other Icons - www.othericons.com Batch - www. adamwhitcroft.com/batch/ Icon Sweets - www.iconsweets.com Ico Moon - www.icomoon.io 12. image compression Tiny Png - www.tinypng.com JPEGmini - www.jpegmini.com ImageOptim - www.imageoptim.com 13. Tools for Photoshop the Mac Rabbit Slicy - www.macrabbit.com/slicy/ Renamy - www.renamy.com Blendme.in - www.blendme.in 14. for inspiration Siteinspire - www.siteinspire.com a Land Book - www.land-book .com Awwwards - www.awwwards.com of The the Best Designs The - www.thebestdesigns.com Dribbble - www.dribbble.com Behance - www.beha nce.com 15. Where to find orders ooomf - www.ooomf.com Juiiicy - www.juiiicy.com Dribbble Jobs - www.dribbble.com/jobs Authentic Jobs - www.authenticjobs.com Workfu - www.workfu.com Onsite - www .onsite.io 16. Build card MapBox - www.mapbox.com Leaflet - www.leafletjs.com the Google the map Builder - http://googlemapbuilder.mynameisdonald.com/ Snazzy maps - www.snazzymaps.com 17. Online learning Treehouse - www.teamtreehouse.com Dev.Opera -  http://dev.opera.com/web Steer - www.steer.me Lynda - www.lynda.com Codeacademy -www. codecademy.com Code School - www.codeschool.com 18. Podcasts on the design and theme of web of The the Freelance the Web - www.thefreelanceweb.com Unfinished Business - www.unfinished.bz Happy on Monday - www.happymondaypodcast.com Boagworld A - www.boagworld. com / show For / Shop Talk Show - www.shoptalkshow.com of The the Back to the Front Show - www.backtofrontshow.com of The Big the Web Show - www.zeldman.com/category/the-big-w .. Upfront Podcast - www.upfrontpodcast .com of The Industry - www.theindustry.cc/category/po .. 19. presentation Art Speaking.io - www.speaking.io Mark Boulton's Tips - www.markboulton.co.uk/journal/spea .. the On Speaking's by Brad Frost - www.bradfrostweb.com/blog/post/on .. Suggestions for the Speakers by by Frank Chimero - http://frankchimero.com/blog/suggestions-for-speakers/ of The: best advice on the public by speaking of Ladies in Tech - http : // ladiesintech.com/the-best-advice-on-public-speaking/ You're paying to speak by Remy Sharp - http://remysha rp.com/2014/03/07/youre-paying-to-speak/ 20. Just useful websites Symbols - www.copypastecharacter.com Service to remove their profiles on different sites - www.justdelete.me Learn your UDID - www. whatsmyudid.com know what it looks like some kind of shape, icon, but can not remember the name? Draw it and you prompt - www.shapecatcher.com 21. Books Grid Systems' in the Graphic Design - http://amzn.to/1aNQC8B the HTML & the CSS: Design and the Build the Web the Sites - http://amzn.to/1biuvJi of The Pocket Guide series: Collection 1,2 or 3 (just £ 6 for 4 in each books) The Geometry of Type - http://amzn.to/1ekRiSV Insites: The Book - http://viewportindustries.com/insites-the -book the Do not the Make Me the Think - http://amzn.to/1ekRul6 Above the Fold - http://amzn.to/1cLAIdv Design is a Job jobseeker - www.abookapart.com/products/design- .. the required minimum books for the novice web dizaynera- http://blog.tilda.cc/booksfordesigners
    1 point
  8. Hello everyone. I joined this community a while ago; I have/had been a lurker for even longer. A huge part of what made the hacker community what it was (and what it is here) involves a willingness to share knowledge (without spoonfeeding). I would feel remiss if I gained so much from so many of you and did not give something back on occasion. What follows are anecdotes, opinions and observations I can share after almost 7 years working professionally in the InfoSec/Netsec field. Most of my work in this sphere has been anchored in Penetration Testing. Even when my official designation was Network Security Analyst, I spent most of those 3 years in engagements against PCI environments utilized for subcontracting work from Comcast, Verizon, Time Warner, Sprint and AT&T (to name a few of my former employers clients). Currently, I manage the Cybersecurity Lab of an International company that employees over 200,000 employees. Most of my work in my current position involves Penetration Testing (every type imaginable, including focused blackbox testing against embedded devices and the network/control structures surrounding them). I am also a lead point of contact for our international teams during remediation and triage of major security threats, incidents and breaches. For example, I was the my company’s head analyst for the recent Shamoon 2.0 attacks (W32.DisttrackB/W97M.Downloader) last February, as well as the recent Wannacry outbreak. I also serve in a Security Engineer capacity, as I am regularly asked to evaluate facets of our products and provide feedback and opinions on the security ramifications involved. I am extremely busy and wanted to give back what I have taken thus far, so this is going to be long... Here goes nothing: 1) I am completely self taught (meaning I acquired no college/formal education to get where I am). That being said, a solid Computer Science degree is invaluable as a base (I would generally avoid Cybersecurity degrees and go for CS ), and even the degree itself will open doors into this business. Also, I work alongside high-level engineers (CS and Electrical Engineering PhDs); what they can do in a short period of time once they take an interest in InfoSec/NetSec is frightening. 2) That leads me to this: to be great in this industry ( or great for this industry), I believe that InfoSec/NetSec has to become a lifestyle,not just a job. I easily work 80+ hours a week (every week) between work, further study and skills building. And I love just about every minute of it. There is a huge need for InfoSec/NetSec professionals,which I feel is going to lead to a flood of low knowledge, low passion, low skill hiring. Anyone trying to get into this industry for the cash alone is going to have a rude awakening: there are probably lower pressure, lower work hour ways to earn the same money doing something that actually interests you.. Also, those of us really invested in these arts can pretty easily spot our own. 3) Learn to study, and learn to love the act of studying. Much of this job is continual study; eventually, when presented with an issue youare ignorant of, you will feel confident in knowing that you can find the answers you need. Break the issue into small, manageable pieces (goals really), and put the pieces together until you can view the whole answer. 4) Most of my success in this industry has been due to a willingness to work hard, persevere and never give up. Ever. Most of this job is the creative solving of problems that do not or may not have any easy answer (or any answer at all…yet). You have to build a no retreat, no surrender, obsessive need to conquer problems. 5) I specialize in network penetration, though I have become fairly well rounded. To me, network penetration is the art of acquiring advantages. During an engagement, I am always looking to acquire advantages. I study and train to better recognize and maximize the resources within an environment that allow me to gain those advantages. Gaining these advantages are more a product of knowledge and experience then an application of tools. 6) I am also looking to be efficient; the best penetration tests replicate real world attacks. In that vein, each action you take raises the probability that you will be detected. For hackers and freedom fighters engaged in illegal activity,you may want to consider the latter a bit. Once you make ingress and launch any manner of offensive action, you have escalated the legal ramifications of your trespass by multiple magnitudes. Also remember that the probability of you getting caught and prosecuted is never 0.00%: you have to be prepared, you have to be careful, you have to be patient and you have to prepare contingencies. 7) I use a measurement/assessment of risk vs. reward to make each action within the network as efficient as possible; by percentages,losing a queen to take a rook is generally a loser’s bet. The best way I’ve learned to temper a careful approach is with an old sales slogan (“ Always be closing the deal”, which I modified to “Always be advancing your position(s)”). 7) I try as much as possible to engage a target as a stalking, ambush predator: I move carefully and try to use the environment to hide myself as I seek to exploit the target/objectives lack of awareness. I work to remain patient and identify/quantify as many of the variables of the current environment/situation as possible. Sometimes the best decision you can make is to slow down or hold your current position for a bit; watching Tcpdump or Wireshark while thinking on a better move is still advancing your position. 8) To lower the probability of detection (whenever possible) I attempt to attack, enumerate or probe from an obfuscated position. Configuring your attack host/node for the highest probability of situational anonymity (using tunneling, proxies, encapsulation ,etc.) is infinitely useful in pentesting, hacking and/or general security/privacy. Mastering the manipulation of proxy, tunneling and encapsulation protocols (which involves a deep understanding of networking/TCP/UDP) almost lends you quasi-magical invisibility and teleportation powers when involved in network penetration. Obfuscation itself is one of 10,000 reasons why experience/knowledge in the disciplines of networking, OS and programming combined with security research are such huge advantages (and another reason why if you take up this path you may never stop learning). 9) Learn to use every tool you can, but more importantly, learn why the tool works. If you work in/at exploitation long enough, the principles governing the tools will help you exploit a box someday,regardless of whether you use that particular tool to get the wanted/needed result.. 9) Knowledge/experience over tool use is especially important today: regardless of what many sites say, you will not find many enterprise/corporate networks today (as a professional penetration tester at least) where there are gross configurations/deployments leading to an easy, out of the box (deploy tool== Meterpreter) exploitation. 10) When training for a fight, professional mixed martial artists put themselves in the worst possible positions so they react properly when the fight is underway. Eventually, training/practicing your exploitation/research techniques the same way will be a huge boon in engagements, POCs (or in the wild). I especially like to round difficulty up during research; it is difficult for someone else to minimize your findings if you have added (and circumvented) greater security measures than the norm (rather than having reduced them). 11) Most of my exploitation of networks in the last couple years have been a process of discovering network misconfigurations and weaknesses (especially in Windows firewall, Programs and Features, LGPO/GPO policies and/or IE/Internet Options within Window Domains/Networks) or information leaks that I locate online or through DNS enumeration that ultimately leads to my gaining access to a host. From there, remote exploitation (toward post exploitation/privilege escalation/pivoting) will often occur This is largely when knowledge of things such as Powershell (leveraged by itself or tools like Powersploit/CrackMapExec/PsExec/Empire) become invaluable (in Windows networks). I have actually been finding easier remote exploits when attacking Linux/Unix boxes in enterprise networks (finding Solaris with Apache Tomcat during enumeration still springs hope eternal in my human breast). Many (actually, maybe all) of these companies are/were new at deploying Unix/Linux boxes in their networks and were making some serious mistakes with deployment. 12) Enumeration is the most important part of an engagement to me. You should get used to enumeration without automated tools; I love Nmap, but many times it is not feasible to usewithin the customer’s network (network overhead issues, the chance of detection by IIDS, the chance of breaking PLCs or other embedded devices, etc.). In cases where you are on the customer’s network, tools like Wireshark, Tcpdump, knowledge of networking protocols/ports and banner grabbing are your friends. 13) For those engagements where you first need to gain access to the network, you definitely have more room for running some louder tools: I love Fierce (and DNS enumeration in general) as it often presents my way in. Google dorking is still also an incredible tool, as is Firefox with the right set of extensions (Hackbar, Tamperdata, Wappalyzer, BuiltWIth, Uppity, IP Address and DOmain Information, etc,.). Who loves Dirbuster in these cirumstances? This carbon/caffeine based lifeform right here. Whether you are pentesting, bughunting or hacking/freedom fighting, a paid Shodan subscription will($50) is worth every cent. The capacity to make exacting, accurate searches for greater than five pages has helped me in more engagements/bughunts than I can remember. 14) When I am explaining why a config/setting/LGPO /GPO (etc.) is a security risk to a client or my fellow employees, I like to explain that many of the advantages I look for in my environment are most often advantages that are needlessly provided to me. If it does not break key functionality or seriously impede efficiency/development time, than it is in their best interest to deny me as many advantages as possible, even when the advantages appear as if they are minutia. When dealing with a client or non-security fellow employees,you should work to create a relationship of mutual help and teamwork. I am not there to rub their noses in there crap; I am there to help improve their security so the company can prosper. This is partially a customer service gig where solutions (remediation/counter measures) are more beneficial to the customer than the exploitation itself. Whenever possible, I like to end the post-exploitation/penetration test conversation/meeting/presentation with the attitude that I am here to help fix these issues , how can WE best close these gaps? How can I help make your (or our) company safer, so that we can become more prosperous? 15) I personally despise Microsoft (and many proprietary products/companies) on many levels, but when it comes to work, I am platform agnostic. Whatever tool is needed to complete the mission is the tool I am going to employ. However, whenever possible without jeopardizing the mission, I am going to employ an Open Source/Unix/Linux-centric solution. I work hard to show my company the value in Open Source. The way to show that value isn’t to be the super Unix/Linux/GPL neckbeard who constantly bemoans proprietary software./platforms. The best way (for me), is to show how effective the strategy involving the Open Source tool is. Then, in my report, I explain the business hook of using Open Source (if the tool is free for commercial use). I am sensitive to companies taking Open Source tools and turning them into something proprietary. However, if I can make my company (which is both huge and almost universally recognized as ethical, which is rare) see the value in Open Source, I know they will eventually incorporate Open Source into the support packages for their products (which they have while keeping the tools ad the license in tact). This than spreads the value of Open Source to smallercompanies who see it being trusted by a much larger company. 16) I have tens of thousands of dollars worth of licenses atmy disposal. However, I will never use tools like Nexpose, Nessus, Canvas orMetasploit Pro unless the project, client, or a governing body specificallyrequire them. I believe these tools develop poor habits. Obviously, if a project such as evaluating an entire domain of IP/hosts for vulnerabilities is my task, I am going to use Nessus. However, (whenever a time/project permits, which they most often do) I am going to evaluate the findings (and search for other vulnerabilities) manually. 17) The ultimate goal should be reliance on nothing more than a Linux/Unix Terminal, some manner of network access and a programming language. One of my favorite exploitation tools is my Nexus 7 2013 flo tablet (running a modified version of Nethunter) and a Bluetooth folio keyboard ( I got the idea from n-o-d-e, https://www.youtube.com/watch?v=hqG8ivP0RkQ44) as the final product is a netbook that fits in a jacket pocket). I have exploited some seriously huge clients with thislittle rig (for ingress and a quick root shell, WPS on network/enterpriseprinters and knowledge PCL/PJL/Postscript are often your friend). I have also exploited other customers with a cheap UMX smartphone with 5 gigs of storage, 1 gb of memory and GNUroot Debian (Guest Wifi access from the parking lot or an onsite public restroom, human nature, and Responder.py analyze mode, followed by WPAD, LLMNR and NetBios poisoning with NTLMv1 and LM authorization downgradefor the win). 18) During (red team, onsite, etc.) engagements, even when the ultimate target of the engagement is located on a hardwired network with heavy segmentation/compartmentalization (such as the conduit/zone based layouts that are general best practice in Industrial sectors), it is always worthgaining a host/node with corporate WIFI access. One thing WIFI access provides is reach: an Administrator’s (or other privileged user’s) dedicated workstation may be out of reach, but his other devices (if in scope) may be connected to Corp. WIFI for reasons such as saving data on a plan. Also, WIFI allows me attacks of opportunity even when I am doing other things. Running Responder.py on a misconfigured network’s WIFI while I am elsewise engaged is gaining me advantages (maybe clear text creds, maybe hashes, maybe NTLMv1 and LM hashes) at little cost to my time or attention. When I employ this, I like to spoof the poisoning machines hostname/mac address to something familiar on the network. If you see a bunch of hosts named “Apple” during your recon, and all of those hosts are not online, spoof the hostname/MAC to match one of the Apple machines (this will not withstand close scrutiny, but will often suffice with a little work). It always helps to watch and take note on the norms of the network traffic and protocols. Try to match this as much as possible (this will likely help you avoid IDS/IPS, firewall rules, etc.) and whatever traffic would seriously stand out, try to tunnel or encapsulate with normal network traffic/protocols. 19) This leads to two other points: A) Be prepared for the majority of people within a company who do not care about, or will minimize security issues. Do not get frustrated; I find that showing the parties involved what they stand to lose as a company from a vuln to be more effective than focusing on the vuln itself. This is where the Nexus and cheap smartphone come into play: taking the client’s domain with a laptop may scare up some results, but showing s customer that an attacker could cost them tens of millions with a $20 dollar smartphone or a $100 dollar tablet (from the parking lot) works wonders. C) I have an interest in learning to exploit everything and anything. This has served me well during network penetration tests, as many targets will defend their DCs, file servers and hosts, but not pay much attention to the printers and IoT devices within the network. D) To this end, learn to work with uncommon protocols. UPnP. NTLDNA and SSDP have been serving me well for the last couple years. Many file servers (and company smartphones/tablets when they are in scope) keep the UPnP door (and associated protocols) wide open. I once grabbed SNMP and other default network appliance creds from a fileserver through UPnP. 20) If you are going to pay for certs with your own cash, I recommend the OSCP. Yes, some of the machines/exploits are outdated. You won’t find many of the SMB remote exploits used for the course in the wild very often anymore (unless an Admin leaves a test server up, which happens occasionally). However, the overall experience, breakdown on enumeration methodology, self reliance and mindset the entire experience teaches you are invaluable. I have seen some sites peddling garbage certs with no industry recognition. Save your money for the OSCP; its profile in the industry is high and growing. Certs are no replacement for experience, but starting out with a IT/CS related degree or some general IT experience (even Helpdesk work) along with the OSCP will get you hired somewhere. 21) For persistence, I prefer adding innocuous user accounts/Remote Desktop accounts. If I am going to add some manner of privileged user account early to mid engagement, I usually try to add a more low profile account (if I have the option) such as Server Operator; these type of accounts allow privileged access you can build from, but generally are not watched with the scrutiny of an Administrator account. When I do create Administrator accounts (I try to wait until I begin my endgame), I will try to match the naming convention to similar accounts in within the network. if a For example, if the Administrator accounts within the network are named USsupervisor, I will name the added account something like USupervisor. If I know the clear text password of the account I have mimicked, I will use the same password. 22) Keep good notes during the engagement; too much information is better than to little information. Captured PCAPS of network traffic are great for examination during down time between engagements. 23) If you are a hacker, freedom fighter, or someone generally concerned about max privacy, this series of articles and configurations are for you: https://www.ivpn.net/blog/privacy-guides/advanced-privacy-and-anonymity-part-146 24) My favorite distro is Backbox; it starts out with a solid set of tools ninus the obscure bloat (and so far I have been able to add anything Kali has to Backbox). You can use Backbox's "Anonymous" option for a full transparent Tor proxy, Macchanger and host name changer and set RAM to overwrite on exit. I also keep Portable Virtualbox on a USB drive with a Kali Linux image... You could follow some of the advice here: http://www.torforum.org/viewtopic.php?f=2&t=1832020 And here: http://www.torforum.org/viewtopic.php?f=2&t=1832020 The articles above could help you create an encrypted USB with a Whonix gateway and Kali Linux workstation (you could probably exchange Kali OS in the Whonix Workstation for any Debian/Debian like OS). This configuration is disposable and concealable, and will run all of the Kali Workstation's (or other Debian/Debian like OS) through Tor. You could also create multiple other Vanilla Whonix Workstations/Gateways on the USB to create a type of local jumpbox sequencea to tunnel between/through SSH and/or VPN them before final Kali workstation. (Note: This is just a gut feeling, but for your own OpSec/security/anonymity, you are probably best replacing the Kali workstation with another Debian/Debian like distro. I have tried Katoolin in the Whonix Workstation, but I find that Katoolin often breaks i). 25) A VPS with your pentest tools installed is a valuable commodity; I call mine DeathStar, and I can call down some thunder from my Nexus 7 2013 flo (and a prepaid Wireless hotspot) from pretty much anywhere. There are some providers who do not give a damn about the traffic leaving your VM as long as you are using a VPN and a DMCA does not come their way. For hackers and freedom fighters, get your VPS from a country outside 14 Eyes countries (providers in Eastern European/former Soviet Block countries can be both dirt cheap and extremely honorable; just do your research and have tolerance for the occasional technical issue). You could pay with laundered/tumbled Bitcoin; even better are those providers who except gift cards (much like some VPN providers do)as payment. Have another party buy the gift cards a good distance away from you; you can find some of these providers who take gift cards on Low End Box. The VPS can be a valuable addition to the encrypted USB above (as you now have a host/node to catch your reverse shells without sacrificing Tor) when combined with SSH or IPsec (such as Strongswan, which is in the Debian repos). 26) Again, this post was long because I am busy, and Iwanted to make the contribution I felt I owed this site since shortly after it began. If you have technical questions concerning (or any questions in general), please post them as comments and I will definitely get you back an answer. https://0x00sec.org/t/shared-thoughts-after-6-years-in-pentesting/2492
    1 point
  9. Pleas i need doc or pdf exploit silent
    -1 points
×
×
  • Create New...