Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 09/07/17 in all areas

  1. Cu ocazia aniversarii a zece ani de FileList, au decis sa lanseze mai multe surprize, unda dintre acestea fiind: Toate bune si frumoase, doar ca, daca esti tampit ca mine si ai gasit prima data giftbox-ul la ora 5 dimineata (sau pentru oamenii normali, esti ocupat) si nu ai cum sa verifici la 24 de ore, vei pierde din premii*. Si cum suntem cu totii 0xH4X0R1 pe aici am decis sa fac un mic script in PowerShell (daca am chef/rabdare il voi face si in Python) care sa se ocupe de problema: Mod de utilizare: Copy - Paste la cod intr-o fereastra de PowerShell apoi rulati Invoke-FileListGetGift. Salvati codul intr-un fisier *.ps1 apoi din PowerShell ii faceti source: adica scrieti in consola ". .\NumeFisier.ps1" (atentie la punctul din fata - e ca la bash) apoi rulati Invoke-FileListGetGift. Daca doriti sa vedeti mesajele de debug setati $DebugPreference = "Continue" in consola din care rulati apoi apelati Invoke-FileListGetGift.
    7 points
  2. De cand ma stiu n-am avut niciodata nevoie sa apelez la vreo garantie de ceva. Oricum, daca sunt probleme, imi trimite telefonul si rezolvam. Nu ma trag pe fese pentru un drum la Telekom. Daca clientul e din Buzau/Ploiesti, cu atat mai bine. Am zis sa postez mai intai aici, sa luati ceva sigur. Daca nu, mergeti pe OLX. Oricum acolo va ajunge si telefonul asta.
    3 points
  3. https://www.steganos.com/specials/cobi1617/sos
    2 points
  4. kernel-exploits CVE-2016-2384: a double-free in USB MIDI driver CVE-2016-9793: a signedness issue with SO_SNDBUFFORCE and SO_RCVBUFFORCE socket options CVE-2017-6074: a double-free in DCCP protocol CVE-2017-7308: a signedness issue in AF_PACKET sockets CVE-2017-1000112: a memory corruption due to UFO to non-UFO path switch Sursa: https://github.com/xairy/kernel-exploits
    2 points
  5. Pe aceeasi tema, lista exploituri de Linux Kernel (privilege escalation): https://github.com/lucyoa/kernel-exploits Aveti versiunile de Kernel vulnerabile pentru fiecare exploit in parte. In plus aveti si varianta deja compilata pentru o parte din ele (daca aveti incredere si nu mai vreti sa pierdeti timpul cu compilation flags si instalari de biblioteci).
    2 points
  6. M-a tot văzut ca bântui pe aici pe forum si na, totuși e prea tare. Cel mai tare cadou de ziua mea https://imgur.com/a/Xv1DU
    2 points
  7. Si daca nu iti raspundem ne vei face si noua la fel ? :)))))
    2 points
  8. Cand am citit titlul credeam ca vii sa ceri sfaturi de gonoree, sifilis, chlamydia, etc.
    2 points
  9. Table of ContentsVisual/Mechanical Inspection 2 •Service Eligibility 2 •Swollen Battery 3 .•Display Modification 3 •Liquid Contact 4 •Debris or Corrosion 6 •Enclosure Wear 6 iPhone 6 Hardware Overview 7 iPhone 6 Plus Hardware Overview 9 iPhone 6s Hardware Overview 11 iPhone 6s Plus Hardware Overview 13 iPhone 7 Hardware Overview 15 iPhone 7 Plus Hardware Overview 17 Service Eligibility Guidelines 19 Model Numbers and Configuration Codes 20 Download: https://www.dropbox.com/s/igvowila1q317ys/070-00167-I_EN.pdf?dl=0
    1 point
  10. Bai nebunilor, garantia este pe PRODUS nu pe persoana care a cumparat produsul si nu exista vreo lege sa te oblige sa arati buletinul la un service. PUNCT! Garantia urmeaza produsul pana la expirare indiferent de cate ori se revinde produsul. Garantia este transmisibila si odata cu ea drepturile si obligatiile ei catre noua persoana care foloseste produsul. Magazinul nu are voie sa refuze garantia indiferent cine e trecut pe factura. La service nu esti obligat sa aduci dovada de plata decat daca doresti restituirea banilor. In alta ordine de idei cine iti cere alte documente la service in afara de garantia produsului face ABUZ si va puteti adresa OPC.
    1 point
  11. Resurgence in energy sector attacks, with the potential for sabotage, linked to re-emergence of Dragonfly cyber espionage group The energy sector in Europe and North America is being targeted by a new wave of cyber attacks that could provide attackers with the means to severely disrupt affected operations. The group behind these attacks is known as Dragonfly. The group has been in operation since at least 2011 but has re-emerged over the past two years from a quiet period following exposure by Symantec and a number of other researchers in 2014. This “Dragonfly 2.0” campaign, which appears to have begun in late 2015, shares tactics and tools used in earlier campaigns by the group. The energy sector has become an area of increased interest to cyber attackers over the past two years. Most notably, disruptions to Ukraine’s power system in 2015 and 2016 were attributed to a cyber attack and led to power outages affecting hundreds of thousands of people. In recent months, there have also been media reports of attempted attacks on the electricity grids in some European countries, as well as reports of companies that manage nuclear facilities in the U.S. being compromised by hackers. The Dragonfly group appears to be interested in both learning how energy facilities operate and also gaining access to operational systems themselves, to the extent that the group now potentially has the ability to sabotage or gain control of these systems should it decide to do so. Symantec customers are protected against the activities of the Dragonfly group. Figure 1. An outline of the Dragonfly group's activities in its most recent campaign Dragonfly 2.0 Symantec has evidence indicating that the Dragonfly 2.0 campaign has been underway since at least December 2015 and has identified a distinct increase in activity in 2017. Symantec has strong indications of attacker activity in organizations in the U.S., Turkey, and Switzerland, with traces of activity in organizations outside of these countries. The U.S. and Turkey were also among the countries targeted by Dragonfly in its earlier campaign, though the focus on organizations in Turkey does appear to have increased dramatically in this more recent campaign. As it did in its prior campaign between 2011 and 2014, Dragonfly 2.0 uses a variety of infection vectors in an effort to gain access to a victim’s network, including malicious emails, watering hole attacks, and Trojanized software. The earliest activity identified by Symantec in this renewed campaign was a malicious email campaign that sent emails disguised as an invitation to a New Year’s Eve party to targets in the energy sector in December 2015. The group conducted further targeted malicious email campaigns during 2016 and into 2017. The emails contained very specific content related to the energy sector, as well as some related to general business concerns. Once opened, the attached malicious document would attempt to leak victims’ network credentials to a server outside of the targeted organization. In July, Cisco blogged about email-based attacks targeting the energy sector using a toolkit called Phishery. Some of the emails sent in 2017 that were observed by Symantec were also using the Phishery toolkit (Trojan.Phisherly), to steal victims’ credentials via a template injection attack. This toolkit became generally available on GitHub in late 2016, As well as sending malicious emails, the attackers also used watering hole attacks to harvest network credentials, by compromising websites that were likely to be visited by those involved in the energy sector. The stolen credentials were then used in follow-up attacks against the target organizations. In one instance, after a victim visited one of the compromised servers, Backdoor.Goodor was installed on their machine via PowerShell 11 days later. Backdoor.Goodor provides the attackers with remote access to the victim’s machine. In 2014, Symantec observed the Dragonfly group compromise legitimate software in order to deliver malware to victims, a practice also employed in the earlier 2011 campaigns. In the 2016 and 2017 campaigns the group is using the evasion framework Shellter in order to develop Trojanized applications. In particular, Backdoor.Dorshel was delivered as a trojanized version of standard Windows applications. Symantec also has evidence to suggest that files masquerading as Flash updates may be used to install malicious backdoors onto target networks—perhaps by using social engineering to convince a victim they needed to download an update for their Flash player. Shortly after visiting specific URLs, a file named “install_flash_player.exe” was seen on victim computers, followed shortly by the Trojan.Karagany.B backdoor. Typically, the attackers will install one or two backdoors onto victim computers to give them remote access and allow them to install additional tools if necessary. Goodor, Karagany.B, and Dorshel are examples of backdoors used, along with Trojan.Heriplor. Strong links with earlier campaigns There are a number of indicators linking recent activity with earlier Dragonfly campaigns. In particular, the Heriplor and Karagany Trojans used in Dragonfly 2.0 were both also used in the earlier Dragonfly campaigns between 2011 and 2014. Trojan.Heriplor is a backdoor that appears to be exclusively used by Dragonfly, and is one of the strongest indications that the group that targeted the western energy sector between 2011 and 2014 is the same group that is behind the more recent attacks. This custom malware is not available on the black market, and has not been observed being used by any other known attack groups. It has only ever been seen being used in attacks against targets in the energy sector. Trojan.Karagany.B is an evolution of Trojan.Karagany, which was previously used by Dragonfly, and there are similarities in the commands, encryption, and code routines used by the two Trojans. Trojan.Karagny.B doesn’t appear to be widely available, and has been consistently observed being used in attacks against the energy sector. However, the earlier Trojan.Karagany was leaked on underground markets, so its use by Dragonfly is not necessarily exclusive. Feature Dragonfly (2013-2014) Dragonfly 2.0 (2015-2017) Link strength Backdoor.Oldrea Yes No None Trojan.Heriplor (Oldrea stage II) Yes Yes Strong Trojan.Karagany Yes Yes (Trojan.Karagany.B) Medium-Strong Trojan.Listrix (Karagany stage II) Yes Yes Medium-Strong “Western” energy sector targeted Yes Yes Medium Strategic website compromises Yes Yes Weak Phishing emails Yes Yes Weak Trojanized applications Yes Yes Weak Figure 2. Links between current and earlier Dragonfly cyber attack campaigns Potential for sabotage Sabotage attacks are typically preceded by an intelligence-gathering phase where attackers collect information about target networks and systems and acquire credentials that will be used in later campaigns. The most notable examples of this are Stuxnet and Shamoon, where previously stolen credentials were subsequently used to administer their destructive payloads. The original Dragonfly campaigns now appear to have been a more exploratory phase where the attackers were simply trying to gain access to the networks of targeted organizations. The Dragonfly 2.0 campaigns show how the attackers may be entering into a new phase, with recent campaigns potentially providing them with access to operational systems, access that could be used for more disruptive purposes in future. The most concerning evidence of this is in their use of screen captures. In one particular instance the attackers used a clear format for naming the screen capture files, [machine description and location].[organization name]. The string “cntrl” (control) is used in many of the machine descriptions, possibly indicating that these machines have access to operational systems. Clues or false flags? While Symantec cannot definitively determine Dragonfly’s origins, this is clearly an accomplished attack group. It is capable of compromising targeted organizations through a variety of methods; can steal credentials to traverse targeted networks; and has a range of malware tools available to it, some of which appear to have been custom developed. Dragonfly is a highly focused group, carrying out targeted attacks on energy sector targets since at least 2011, with a renewed ramping up of activity observed in the last year. Some of the group’s activity appears to be aimed at making it more difficult to determine who precisely is behind it: The attackers used more generally available malware and “living off the land” tools, such as administration tools like PowerShell, PsExec, and Bitsadmin, which may be part of a strategy to make attribution more difficult. The Phishery toolkit became available on Github in 2016, and a tool used by the group—Screenutil—also appears to use some code from CodeProject. The attackers also did not use any zero days. As with the group’s use of publicly available tools, this could be an attempt to deliberately thwart attribution, or it could indicate a lack of resources. Some code strings in the malware were in Russian. However, some were also in French, which indicates that one of these languages may be a false flag. Conflicting evidence and what appear to be attempts at misattribution make it difficult to definitively state where this attack group is based or who is behind it. What is clear is that Dragonfly is a highly experienced threat actor, capable of compromising numerous organizations, stealing information, and gaining access to key systems. What it plans to do with all this intelligence has yet to become clear, but its capabilities do extend to materially disrupting targeted organizations should it choose to do so. Protection Symantec customers are protected against Dragonfly activity, Symantec has also made efforts to notify identified targets of recent Dragonfly activity. Symantec has the following specific detections in place for the threats called out in this blog: Trojan.Phisherly Backdoor.Goodor Trojan.Karagany.B Backdoor.Dorshel Trojan.Heriplor Trojan.Listrix Trojan.Karagany Symantec has also developed a list of Indicators of Compromise to assist in identifying Dragonfly activity: Family MD5 Command & Control Backdoor.Dorshel b3b5d67f5bbf5a043f5bf5d079dbcb56 hxxp://103.41.177.69/A56WY Trojan.Karagany.B 1560f68403c5a41e96b28d3f882de7f1 hxxp://37.1.202.26/getimage/622622.jpg Trojan.Heriplor e02603178c8c47d198f7d34bcf2d68b8 Trojan.Listrix da9d8c78efe0c6c8be70e6b857400fb1 Hacktool.Credrix a4cf567f27f3b2f8b73ae15e2e487f00 Backdoor.Goodor 765fcd7588b1d94008975c4627c8feb6 Trojan.Phisherly 141e78d16456a072c9697454fc6d5f58 184.154.150.66 Screenutil db07e1740152e09610ea826655d27e8d Customers of the DeepSight Intelligence Managed Adversary and Threat Intelligence (MATI) service have previously received reporting on the Dragonfly 2.0 group, which included methods of detecting and thwarting the activities of this adversary. Best Practices Dragonfly relies heavily on stolen credentials to compromise a network. Important passwords, such as those with high privileges, should be at least 8-10 characters long (and preferably longer) and include a mixture of letters and numbers. Encourage users to avoid reusing the same passwords on multiple websites and sharing passwords with others should be forbidden. Delete unused credentials and profiles and limit the number of administrative-level profiles created. Employ two-factor authentication (such as Symantec VIP) to provide an additional layer of security, preventing any stolen credentials from being used by attackers. Emphasize multiple, overlapping, and mutually supportive defensive systems to guard against single point failures in any specific technology or protection method. This should include the deployment of regularly updated firewalls as well as gateway antivirus, intrusion detection or protection systems (IPS), website vulnerability with malware protection, and web security gateway solutions throughout the network. Implement and enforce a security policy whereby any sensitive data is encrypted at rest and in transit. Ensure that customer data is encrypted as well. This can help mitigate the damage of potential data leaks from within an organization. Implement SMB egress traffic filtering on perimeter devices to prevent SMB traffic leaving your network onto the internet. Educate employees on the dangers posed by spear-phishing emails, including exercising caution around emails from unfamiliar sources and opening attachments that haven’t been solicited. A full protection stack helps to defend against emailed threats, including Symantec Email Security.cloud, which can block email-borne threats, and Symantec Endpoint Protection, which can block malware on the endpoint. Symantec Messaging Gateway’s Disarm technology can also protect computers from threats by removing malicious content from attached documents before they even reach the user. Understanding the tools, techniques, and procedures (TTP) of adversaries through services like DeepSight Adversary Intelligence fuels effective defense from advanced adversaries like Dragonfly 2.0. Beyond technical understanding of the group, strategic intelligence that informs the motivation, capability, and likely next moves of the adversaries ensures more timely and effective decisions in proactively safeguarding your environment from these threats. Source
    1 point
  12. Una peste alta, anuntul nu mai este valabil.
    1 point
  13. Pentru 2 milioane diferenta romanul prefera sa il ia din magazin. Mai scade pretul daca vrei sa faci afaceri.
    1 point
  14. WPA2-HalfHandshake-Crack Conventional WPA2 attacks work by listening for a handshake between client and Access Point. This full fourway handshake is then used in a dictonary attack. This tool is a Proof of Concept to show it is not necessary to have the Access Point present. A person can simply listen for WPA2 probes from any client withen range, and then throw up an Access Point with that SSID. Though the authentication will fail, there is enough information in the failed handshake to run a dictionary attack against the failed handshake. For more information on general wifi hacking, see here Install $ sudo python setup.py install Sample use $ python halfHandshake.py -r sampleHalfHandshake.cap -m 48d224f0d128 -s "no place like 127.0.0.1" -r Where to read input pcap file with half handshake (works with full handshakes too) -m AP mac address (From the 'fake' access point that was used during the capture) -s AP SSID -d (optional) Where to read dictionary from Capturing half handshakes To listen for device probes the aircrack suite can be used as follows sudo airmon-ng start wlan0 sudo airodump-ng mon0 You should begin to see device probes with BSSID set as (not associated) appearing at the bottom. If WPA2 SSIDs pop up for these probes, these devices can be targeted Setup a WPA2 wifi network with an SSID the same as the desired device probe. The passphrase can be anything In ubuntu this can be done here http://ubuntuhandbook.org/index.php/2014/09/3-ways-create-wifi-hotspot-ubuntu/ Capture traffic on this interface. In linux this can be achived with TCPdump sudo tcpdump -i wlan0 -s 65535 -w file.cap (optional) Deauthenticate clients from nearby WiFi networks to increase probes If there are not enough unassociated clients, the aircrack suite can be used to deauthenticate clients off nearby networks http://www.aircrack-ng.org/doku.php?id=deauthentication Sursa: https://github.com/dxa4481/WPA2-HalfHandshake-Crack
    1 point
  15. Sters. Oricum informatiile nu mai sunt valide!
    1 point
  16. Dragut! La multi ani! "Stie cineva un RAT pentru Android/iPhone?"
    1 point
  17. Contents Understanding the Risk.............................................................................................................. 3 Communication.......................................................................................................................... 5 Transport Layer Security (TLS) .............................................................................................. 5 Certificate Pinning .................................................................................................................. 6 Data Storage.............................................................................................................................. 9 Binary Protections.....................................................................................................................14 Obfuscation ...........................................................................................................................15 Root/Jailbreak Detection .......................................................................................................15 Debug Protection...................................................................................................................17 Hook Detection......................................................................................................................18 Runtime Integrity Checks.......................................................................................................20 Attacker Effort ...........................................................................................................................21 Grading Applications.................................................................................................................22 Download: http://file.digitalinterruption.com/Secure Mobile Development.pdf
    1 point
  18. https://img-9gag-fun.9cache.com/photo/a7DoMVx_460sv.mp4
    1 point
  19. Depinde de domeniul in care vrei sa te specializezi caci "computer science" e la fel ca "medicina", sunt foarte multe domenii si sub-domenii. Si apoi depinde de unde si ce vrei sa lucrezi dupa ce termini. Caci daca vrei sa lucrezi in afara tarii, o universitate din UK arata mai bine (chiar daca tehnic poate ca nu te pregateste la fel de mult - aici ma refer la cele mai slabe caci daca te duci la ceva bun din top 10 le surclaseaza mult pe cele din Ro, aka se pisa pe ele cu stropi) pe CV decat ceva pulifric din Ro. Mai ales daca vrei sa ramai in UK sa lucrezi dupa. Asta pentru ca ei cunosc standardele de aici si de multe ori chiar au partneriate si internship-uri cu universitatile. Unii chiar merg in sandwich-year intre anul 2 si 3. (Si cand spun UK se pot intelege si alte tari, nu e musai UK. ) Daca vrei sa lucrezi in Babuinland dupa, da mai bine stai in Bucuresti, nu are rost sa iti faci datorii de £27k. Dar si unii recruiteri in Ro vor vedea studiile in afara (pe langa lb engleza fluenta - avantaj) ca ceva ce te deosebeste de restul. Si universitatea nu iti va turna informatie si cunostinta cu palnia in cap, doar iti ofera o structura si o disciplina/maturitate a gandirii, eventual te scoate putin din comfortul propriu intr-un sens pozitiv, in rest tine doar de individ "to make the most of it". Si aici universitatile din UK le surclaseaza mult pe cele din Ro referitor la resurse (fizice si electronice), contacte in industrie, research in domeniu, etc. Si apoi oportunitatile in timpul studentiei, cand esti aici fizic sunt altele fata de cele din Ro, mai ales daca esti undeva aproape de Londra sau hub-urile "tech". I-am spus si in privat, nu umbla cainii cu covrigi in coada pe aici, nu e totul roz, sunt nasoale si pe aici cum sunt peste tot. Dar apoi calitatea vietii este alta. Ca si angajat esti tratat diferit, ai mult mai multe drepturi, "employment law" este mult mai avansat, definit si enforced decat in Babuinland. Si apoi poti sa iei restul la rand.. calitatea vietii, transportul, sanatatea, distractia, mentalitatea oamenilor, etc. Pana la urma sunt ani din viata ta pe care nu ii vei putea da inapoi si in mare masura iti vor influenta restul vietii. Trebuie sa alegi ceva ca apoi sa poti dormi noaptile, in loc sa stai cu gandul "ce ar fi fost daca..." si sa ai regrete (ia marturiseste, @MrGrj, iti dai pumni in coaie acum? Daca nu probabil inca nu ai ajuns la criza varstei mijlocii... )
    1 point
  20. Chiar daca n-ar fi avut nici un virus...de ce plm ai vrea sa-ti faci un .exe dintr-un .jar? Sa ti se spuna ca nu ai java instalat cand rulezi un .exe?
    0 points
  21. Salut! Tocmai am primit asta pe whatsapp: Redirectioneaza la http://vouchercadou2017.site/emag/. Pe whois apare inregistrat cu mail de privacyguardian. Be safe!
    -1 points
  22. Buna, Te poate bana un site daca ai WI FI? la fel ca si atuncea cand aveai IP dinamic sa stie ce calculator ii?Am primit negative rep pe un forum nui dau numele de la niste fraieri si vreau sa imi fac mai multe conturi si sa ii injur in mama lor de fraieri care o dat bani pt conturi premium
    -2 points
×
×
  • Create New...