Jump to content

Leaderboard


Popular Content

Showing content with the highest reputation since 09/16/18 in Posts

  1. 5 points
    Ne indreptam spre o dictatura la nivel mondial sau ce se intampla ? Vad ca cu fiecare moment care trece, fie el luna, zi sau an, ba tot ni se baga pe gat rahatul asta de egalitate cu tiganii de desert, ba ne intereseaza unde si-o trag unii, ba vad ca state precum SUA, care au facut asta de cand au deschis ochii, ba nu mai stiu care institutii gen Apple, fac si dreg dupa bunul plac in alte tari. Nu le convine americanilor o chestie, pac 100 de ani de puscarie, vor sa faca inchisori CIA la noi, fac, si au facut. Tigani de la noi sparg case la muedezi si fraierii in loc sa-i bage la parnaie sau atunci cand ii prind in casele lor sa le rupa gatul ei le mai dau si bani de buzunar ca cica-s necajiti si de asta fac ceea ce fac, si tiganii ii iau de prosti. Intr-un timp voiau astia de la noi sa dea o lege cum ca nu ai voie sa vorbesti peiorativ si discriminatoriu de tigani ca iti bagau o amenda de nu te vedeai, dar se pare ca nimeni nu face asta ci doar descrie situatia de fapt, starea actuala a lucrurilor. Python a scos recent chestia cu master si slave. Ce cacat ?! Tiganii indieni si cu cei africani au impanzit toata mUE dar nu numai, au ajuns la in locuri importante si in SUA dar si in alte tari si continente ale lumii. In UK cica dai peste tot de de astia. Credeam ca in Australia poate e altfel ca e departe de tot ce se intampla pe la noi, dar de unde, recent mi-a zis cineva ca sunt fututi si ei si chiar se supara si eventual poate iti dau amenda si ei ca si nemtalaii daca zici ceva de rau de oamenii astia. Mai citeam undeva ca in UK daca ai o firma cu mai multi angajati, firma ta proprie si personala nu a statului, esti obligat sa angajezi tigani de astia in propria ta firma ca altfel ai belit-o, si nu numai, te obliga sa-i angajezi si in functii de conducere, posturi CEO, de astea. Va mai aduceti aminte de Microsoft si de indianul care a cam futut OS-ul (cel putin asa ziceau unii, eu nu sunt documentat pe tema asta) ? Era sau inca mai este CEO. s.a.m.d. O scurta intrebare si scuzati "figura de stil": Ce pula mea se intampla si incotro ne indreptam noi ca lume ? P.S. Am uitat sa zic: Si Elvetia e fututa !
  2. 5 points
    Bazele de date cu evidenta populatiei din Brasov au fost infestate cu ransomware. Li s-a propus o solutie de securitate si backup chiar cu cateva luni inainte. Vina e a lor pentru ca nu isi dau seama ca sunt expusi la multe pe internet. Dar cine sa faca planning daca angajatii sunt pe pile si stau toata ziua pe facebook...
  3. 4 points
    google nu inseamna doar gmail. inseamna in primul rand insusi android, inseamna chrome, inseamna google+, inseamna youtube, inseamna waze. e de ajuns o singura data sa bagi numarul de telefon si iti conecteaza toti utilizatorii de pe platformele respective. asa cum de la facebook treci prin instagram si whatsapp, la fel cum cu yahoo treci prin Flickr. deci practic e de ajuns sa instalezi whatsapp pe telefon si ai sa vezi sugestii de prieteni pe FB(chiar daca nu ai instalat pe telefon) din lista de contacte
  4. 4 points
  5. 4 points
    La indieni n-a ajuns whatsapp? whatsapp whatchapp ceasapp ceascucucwap bagpolanmota
  6. 3 points
    Si nu prea esti cu toti boii acasa daca a fost nevoie sa dai copy paste la asa ceva
  7. 3 points
    https://devdocs.io/ Mi-am adus aminte recent de el, poate mai ajuta pe careva.
  8. 3 points
    totul vine de la Google. ca sa instalezi aplicatii si alte alea, ai bagat mail. toate contactele vin aliniate cu nickname folosit pe gmail&co. cu un telefon Asus acum ceva ani, am activat un mail facut prin 98. sa vezi explicatii ce a trebuit sa dau la nevasta despre cine e "darkgirl83" sau "your_sonya" care au aparut in rubrica doar pt faptul ca am conectat mail ala
  9. 3 points
    https://sites.google.com/secured.org/malwareunicorn/reverse-engineering/re101
  10. 3 points
    Încearcă să iei legătura cu poliția, respectiv DCCO, pentru că sunt printre singurii care au expertiza și mijloacele de a ajunge la indienii ăștia opăriți. Recomand asta pentru că am mai auzit de cazuri rezolvate de ei tot pe partea asta de țepe prin criptomonede/ransomware. Spor!
  11. 3 points
    Face cineva un patch pentru kernel, prin care sa introduca un modul de inteligenta artificiala care sa invete cum se comporta user-ul in functie de system call-uri si daca ajunge sa streseze kernelul (poate cu prea multe IO) - sa introduca un delay de consolare, urmat de un halt in cazul in care nu se opreste? "Kernels have feelings too!"
  12. 3 points
    VLAN Hopping and Mitigation September 10, 2018 | Pam X Get the latest security news in your inbox. Labs Research Security Essentials All Blogs No thanks. Close this now. Twitter LinkedIn Facebook Google Plus Reddit We’ll start with a few concepts: VLAN A VLAN is used to share the physical network while creating virtual segmentations to divide specific groups. For example, a host on VLAN 1 is separated from any host on VLAN 2. Any packets sent between VLANs must go through a router or other layer 3 devices. Security is one of the many reasons network administrators configure VLANs. However, with an exploit known as 'VLAN Hopping', an attacker is able to bypass these security implementations. Learn more about network segmentation and VLANs here. VLAN Hopping This type of exploit allows an attacker to bypass any layer 2 restrictions built to divide hosts. With proper switch port configuration, an attacker would have to go through a router and any other layer 3 devices to access their target. However, many networks either have poor VLAN implementation or have misconfigurations which will allow for attackers to perform said exploit. In this article, I will go through the two primary methods of VLAN hopping, known as 'switched spoofing', and 'double tagging'. I will then discuss mitigation techniques. Switched Network It is crucial we understand how switches operate if we would like to find and exploit their vulnerabilities. We are not necessarily exploiting the device itself, but rather the protocols and configurations instructing how they operate. On a switch, a port is either configured as an access port or a trunking port. An access port is typically used when connecting a host to a switch. With the implementation of VLANs, each access port is assigned to only one VLAN. A trunking port is used when connecting two switches or a switch and a router together. Trunking ports allow for traffic from multiple VLANs. A trunk port can be configured manually or created dynamically using Dynamic Trunking Protocol (DTP). DTP is a Cisco proprietary protocol where one use is to dynamically establish a trunk link between two switches. Switched Spoofing VLAN Attack An attacker acts as a switch in order to trick a legitimate switch into creating a trunking link between them. As mentioned before, packets from any VLAN are allowed to pass through a trunking link. Once the trunk link is established, the attacker then has access to traffic from any VLAN. This exploit is only successful when the legitimate switch is configured to negotiate a trunk. This occurs when an interface is configured with either "dynamic desirable", "dynamic auto" or "trunk" mode. If the target switch has one of those modes configured, the attacker then can generate a DTP message from their computer and a trunk link can be formed. Double Tagging Double tagging occurs when an attacker adds and modifies tags on an Ethernet frame to allow the sending of packets through any VLAN. This attack takes advantage of how many switches process tags. Most switches will only remove the outer tag and forward the frame to all native VLAN ports. With that said, this exploit is only successful if the attacker belongs to the native VLAN of the trunk link. Another important point is, this attack is strictly one way as it is impossible to encapsulate the return packet. VLAN Hopping Exploit Scenario 1 - Switch Spoofing Attack In this scenario there exists the attacker, a switch, and the target server. The attacker is attached to the switch on interface FastEthernet 0/12 and the target server is attached to the switch on interface FastEthernet 0/11 and is a part of VLAN 2. Take a look at the following topology. Once you are familiar with the topology, take a look at a few of the configurations set for the switch: interface FastEthernet0/11 switchport mode access switchport mode nonegotiate switchport access vlan 2 ! interface FastEthernet0/12 switchport mode dynamic auto Hopefully, you can see the configuration issue with interface fa0/12. This port is set to accept incoming negotiations to determine whether the port is for access or trunking. Which means an attacker is able to perform a Switch Spooking attack. Once the attacker connects to the port they can then send a DTP message and a trunking link will be established. An attacker can use the program Yersinia to craft and send a DTP message. Yersinia is a penetration testing framework built to attack many protocols that reside on layer 2. It comes pre-installed with kali Linux and has an easy to use graphical user interface (GUI). Yersinia Homepage - http://www.yersinia.net/ To launch Yersinia: yersinia -G Here is a quick look at the GUI: Now to send a DTP message is as simple as the following 4 steps: click "Launch attack" click the tab "DTP" click "enable trunking" click "ok" Yersinia will the send out a DTP message and within a few seconds, a trunking link will be established. In our scenario, the attacker will then have access to all traffic flowing through VLAN 2 and can directly attack without going through any layer 3 devices. Scenario 2 - Double Tagging Attack In this scenario, there exists an attacker, 2 switches, and a target server. The attacker is attached to switch 1. Switch 1 is attached to switch 2 and finally, our target is attached to switch 2. Take a look at the following topology. Once you are familiar with the topology, take a look at a few of the configurations set for switch 1. interface FastEthernet0/12 switchport mode access switchport nonegotiate switchport access vlan 1 ! interface FastEthernet0/11 switchport trunk encapsulation dot1q switchport mode trunk switchport nonegotiate switchport trunk native vlan 1 From these configurations, we see that an attacker would be unable to perform a switch spoofing attack. However, we see that the attacker belongs to the native VLAN of the trunk port. Which means this topology is vulnerable to a Double Tagging attack. An attacker can use the program Scapy, to create the specially crafted frames needed for processing this attack. Scapy is a Python program created to manipulate packets. Scapy Homepage - https://scapy.net/ Scapy Documentation - http://scapy.readthedocs.io/en/latest/usage.html Start Scapy: sudo ./scapy Using the sendp() function to craft a packet: >>>sendp(Ether()/Dot1Q(vlan=1)/Dot1Q(vlan=2)/IP(dst='<destination IP', src='<source IP>')/ICMP()) This will generate a double 802.1q encapsulated packet for the target on VLAN 2. Take a look at the following topology to view how the switches manage this frame. From the picture, we can see that switch 1 reads and removes only the outside tag. It checks that the host is part of the stated VLAN and forwards the packet to all native VLAN ports (VLAN 1). Switch 2 then receives the packet with only one header left. It assumes the frame belongs to the stated VLAN on this tag (VLAN 2) and forwards to all ports configured for VLAN 2. The target then receives the packet sent by the attacker. VLAN = HOPPED. Due to the nature of this attack, it is strictly one way. Please also note that this attack may not work on new switches as documented here. Mitigation for VLAN Hopping Switched Spoofing To prevent a Switched Spoofing attack, there are a few steps you should take: Do not configure any access points with either of the following modes: "dynamic desirable", "dynamic auto", or "trunk". Manually configure access ports and disable DTP on all access ports. switchport mode access switchport mode nonegotiate Manually configure all trunk ports and disable DTP on all trunk ports. switchport mode trunk switchport mode nonegotiate Shutdown all interfaces that are not currently in use. Double Tagging To prevent a Double Tagging attack, keep the native VLAN of all trunk ports different from user VLANs. Final Note Switches were not built for security. However, it is important to utilize security measures at every level. If you are to take the time to segment your network, make sure it is done properly and securely. Be diligent when configuring your network. Sursa: https://www.alienvault.com/blogs/security-essentials/vlan-hopping-and-mitigation
  13. 3 points
    Am scris un script care automeaza adaugatul calatoriilor. Ma gandesc ca il veti gasi util.. https://github.com/target111/RATB_PWN
  14. 2 points
    Salut, pot confirma, pe Chrome Version 69.0.3497.100 (Official Build) (64-bit) prima incarcare a site-ului nu se realizeaza cu succes, dupa refresh incarcandu-se normal.
  15. 2 points
    ceva fel de mancare din spania... nu prea ai calatorit din cate se vede...
  16. 2 points
  17. 2 points
    import codecs emoji=u"\U0001F498" encoded=emoji.encode('utf-16be') t=codecs.encode(encoded,'hex_codec') tt=codecs.decode(t,'ascii') prim=tt[0:4] secund=tt[4:] print("Primul numar:",int(prim,16), "Al doilea:",int(secund,16))
  18. 2 points
    Deci asta a luat 14 ani inchisoare deoarece nu colabora cu niste companii (private). Interesant, dar oare de ce nu ma surprinde pe cat ar trebui?
  19. 2 points
    În situații de genul, nu prea ai ce face altceva. Cu atât cu cât încearcă mai multe căi de a rezolva, cu atât cresc șansele să rezolve problema. Știu că ai noștri mai colaborau și cu FBI care își înființase o filială la noi legat de criminalitatea cibernetică. Nu e neapărat să-ți pui baza în telefoanele lor fixe din birouri, dar fiind în UE mai pot cere ajutorul colegilor. Și acum legat de postarea inițială: și firmele de cartier au măcar un back-up în Google drive, dă-o-n sărăcie de treabă. Adică când ai idioți în firmă care prezintă riscul de a deschide atașamente de la indieni, backup-ul e sfânt. Nu că altfel nu ar fi. Dar povestea asta o să se mai repete în România niște ani pentru că lumea ia securitatea și măsurile de protecție la mișto.
  20. 2 points
    :)))))))))))) Ce expertiza man? Ai fost vreodata pe acolo la ei la birouri sa vezi ce conditii si scule au? Hahahahahha
  21. 2 points
    https://github.com/GhostPack A collection of security related toolsets. Popular repositories 261 GhostPack/Seatbelt 245 GhostPack/SafetyKatz 138 GhostPack/SharpRoast 133 GhostPack/SharpUp 132 GhostPack/SharpDump 132 GhostPack/SharpWMI
  22. 2 points
    r2dec Converts asm to pseudo-C code. Software Requirements Requires radare2 version 2.9.0 or newer. Install Follow the following steps to install r2dec via r2pm r2pm init r2pm install r2dec done Usage open with radare2 your file analize the function you want to disassemble (af) run the plugin via pdd done. Arguments [0x00000000]> pdd? Usage: pdd [args] - core plugin for r2dec pdd - decompile current function pdd? - show this help pdda - decompile current function with side assembly pddb - decompile current function but shows only scopes pddu - install/upgrade r2dec via r2pm pddi - generates the issue data Environment R2DEC_HOME defaults to the root directory of the r2dec repo [0x00000000]> pdd --help r2dec [options] --help | this help message --assembly | shows pseudo next to the assembly --blocks | shows only scopes blocks --colors | enables syntax colors --casts | shows all casts in the pseudo code --debug | do not catch exceptions --html | outputs html data instead of text --issue | generates the json used for the test suite --paddr | all xrefs uses physical addresses instead of virtual addresses --xrefs | shows also instruction xrefs in the pseudo code Radare2 Evaluable vars You can use these in your .radare2rc file. r2dec.casts | if false, hides all casts in the pseudo code. r2dec.asm | if true, shows pseudo next to the assembly. r2dec.blocks | if true, shows only scopes blocks. r2dec.paddr | if true, all xrefs uses physical addresses compare. r2dec.xrefs | if true, shows all xrefs in the pseudo code. r2dec.theme | defines the color theme to be used on r2dec. e scr.html | outputs html data instead of text. e scr.color | enables syntax colors. Report an Issue open with radare2 your file analize the function you want to disassemble (af) give the data to the plugin via pddi or pdd --issue insert the JSON returned by the previous command into the issue (you can also upload the output) done. Supported Arch arm avr m68k (experimental) mips ppc sparc v850 wasm (partial) x86-64 (intel syntax) Developing on r2dec Read DEVELOPERS.md Example This example shows a possible dump of the plugin. Source Code #include <stdio.h> int main(int argc, char const *argv[]) { int var = 0; while(var < 0x90) { if(var < 0x10) { var += 0x50; } var += 0x10; } return 0; } radare2 view ╭ (fcn) main 50 │ main (int arg1, int arg2); │ ; var int local_20h @ rbp-0x20 │ ; var int local_14h @ rbp-0x14 │ ; var signed int local_4h @ rbp-0x4 │ ; DATA XREF from entry0 (0x1041) │ 0x00001119 55 push rbp │ 0x0000111a 4889e5 mov rbp, rsp │ 0x0000111d 897dec mov dword [local_14h], edi ; arg1 │ 0x00001120 488975e0 mov qword [local_20h], rsi ; arg2 │ 0x00001124 c745fc000000. mov dword [local_4h], 0 │ ╭─< 0x0000112b eb0e jmp 0x113b │ │ ; CODE XREF from main (0x1142) │ ╭──> 0x0000112d 837dfc0f cmp dword [local_4h], 0xf ; [0xf:4]=0x3e000300 │ ╭───< 0x00001131 7f04 jg 0x1137 │ │⋮│ 0x00001133 8345fc50 add dword [local_4h], 0x50 ; 'P' │ │⋮│ ; CODE XREF from main (0x1131) │ ╰───> 0x00001137 8345fc10 add dword [local_4h], 0x10 │ ⋮│ ; CODE XREF from main (0x112b) │ ⋮╰─> 0x0000113b 817dfc8f0000. cmp dword [local_4h], 0x8f ; [0x8f:4]=0x2a800 │ ╰──< 0x00001142 7ee9 jle 0x112d │ 0x00001144 b800000000 mov eax, 0 │ 0x00001149 5d pop rbp ╰ 0x0000114a c3 ret r2dec pseudo-C code /* r2dec pseudo C output */ #include <stdint.h> int32_t main (int32_t argc, char ** argv) { char ** local_20h; int32_t local_14h; int32_t local_4h; local_14h = edi; local_20h = rsi; local_4h = 0; while (local_4h <= 0x8f) { if (local_4h <= 0xf) { local_4h += 0x50; } local_4h += 0x10; } eax = 0; return eax; } Sursa: https://github.com/wargio/r2dec-js
  23. 2 points
  24. 2 points
    Daca prostia ar durea...
  25. 1 point
    vezi ca ai drugstore acolo la bookmarks
×