Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation since 08/17/24 in all areas

  1. Cum e fratilor? Unde e democratia? 5 oameni s-au pisat pe milioane de romani. Din pix. Lovitura de stat fara armata, fara nimic. Indiferent cu cine ati votat sau ce favorit ati avut. Democratia s-a dovedit o carpa de sters la cur, asa cum spuneam "Ministrul Justiției: Românii trebuie să voteze în cunoștință de cauză, să afle adevărul despre ce s-a întâmplat" Romanii ar trebui sa-i alerge si sa-i incendieze, baga-si-ar pula in ea de capusala. Sa dea socoteala pentru toti anii de hotie, pentru coruptie, nepotism si 7 generatii din familiile politicienilor ce ar fi trebuit sa-si serveasca tara sa fie batuti in cuie, rastigniti si incendiati.
    9 points
  2. Nu ai ce gestiona. E un bullshit treaba cu atacurile, iar raportul este facut pentru a putea invalida alegerile, in caz ca nu le convine ceva. Nu Simion, Georgescu sau care mai sunt au distrus tara. Consumam ce ne este servit, de +30 de ani. Rahatul cu convocarea CSAT este la ordinul evreului refuzat la export (Iohannis). Nu am votat si nu voi vota niciodata pentru ceva legat de Romania. Sunt plecat de multi ani din tara si nu consider ca ar fi corect sa influentez directia in care merge, prin vot. Ma consider de partea dreptei extreme si cred ca democratia este gresit inteleasa de multi. Multe legi ar trebui schimbate sau pur si simplu eliminate Daca ai un angajat care te fura, nu astepti patru ani. Il dai afara pe loc. Acelasi lucru ar trebui sa se aplice si functionarilor publici. Ei sunt acolo sa ne reprezinte interesele, nu sa faca ce vor. Sa zicem ca esti primar. Dupa cinci-sase luni, daca nu ai realizat nimic, venim peste tine, te luam la rost si iti dam un ultimatum: doua luni sa ne arati rezultate. Calea catre adevar incepe cu fermitatea – ranga intr-o mana si Biblia in cealalta. Pentru cei care striga "vrem democratie" – ce fel de democratie doriti? Cea "moderna", in care alegerile sunt libere doar pe hartie, dar de fapt manipulate prin propaganda si populism? Sau poate cea in care institutiile, platite din bani publici, se autointituleaza democratice, dar sunt ineficiente si corupte? Ori preferati varianta in care drepturile sunt garantate, dar raman inaccesibile pentru pulime?
    9 points
  3. Eu am raportat un SQLi in platforma unora care se ocupau de bilete la o conferinta de IT, n-au facut nimic, anul urmator eram VIP si eu si un prieten
    6 points
  4. How I Also Hacked my Car 2024-01-30T22:14:07+00:00 • goncalomb • hacking,car,dacia,rpi This blog post is kind of inspired by another that I saw on HN some time ago, "How I Hacked my Car". After praising the infotainment system of the car, a Hyundai IONIQ, the author ends up hacking it and running custom software on the head unit. Well, my much cheaper 2023 Dacia Sandero also has a decent infotainment system with navigation and wireless Android Auto. Even before I got the car, I searched around to see if the system was hackable. I was not surprised to find that a simple USB drive with an autorun.sh script gets run as root. A classic. Various forums around the web use this method to change skins and side-load navigation maps. I was not interested in that, my goal was also to run some custom software. Well, there is more to the story, otherwise, I would just that autorun.sh "feature". The Infotainment System The system is a MediaNav Evolution from Renault (which Dacia is a subsidiary of), built by LG (FCC ID: BEJLAN5900WR). It's a Linux box. Over the years there have been various iterations of this system, the older devices used WinCE. The navigation part of the software is by a company called NNG (iGO?). Apparently, they provide navigation software for many other devices. MediaNav Evolution (unofficially called MediaNav 4) The autorun.sh Just by looking around on various forums, I knew of 3 special files that when placed on a USB drive would trigger some debug functions: autorun_bavn/autorun.sh: a script that gets run as root logfiles_bavn: a directory that gathers various system logs and files usb_logging: a directory where the system continually dumps dlt files (proprietary log system) One good thing about the log files is that they contain the Wi-Fi password for the AP. This password can be reset on the UI, but it's never visible. Knowing the password allows other devices to connect to it (e.g. PC). When using wireless Android Auto it connects automatically, I think it bootstraps using Bluetooth. I was most interested in the autorun.sh... But it was not working, I couldn't get the script to run. The Firmware At this point, I decided to start inspecting the firmware to see what was wrong, and if there was another way in. My device came with version 6.0.9.9. I wanted a recent update file, but the official website doesn't provide a direct download. It requires installing a desktop application, "Toolbox", which I ended up doing. The application can be used to buy map updates or download firmware/OS updates for free. The procedure starts with collecting some information about the system/car to a USB drive. After connecting it to a PC, the "Toolbox" software detects a new update and puts the new update file on the drive. I didn't update it, I just wanted the file, it was version 6.0.10.2: >: file upgrade.lgu upgrade.lgu: POSIX tar archive (GNU) I also had an older update file, version 6.0.9.7, that I found in some random forum. Sometimes even grep can be a great analysis tool. Just by running grep -RF autorun.sh on the contents of both the new and old firmware, I could see that the new one had no matches. Time to load Ghidra and see what's going on... Version 6.0.9.7 has the autorun.sh feature, but it is not present on version 6.0.10.2 Comparing the 2 files it was evident that they had removed the autorun.sh backdoor. Even though I didn't have the specific firmware for my installed version (6.0.9.9), it was clear that mine didn't have it and that's why I could never get it to work. This miscmanager file is also responsible for the other USB debug features, these are all still there. The core OS appears to be from GENIVI/COVESA (GitHub: GENIVI/COVESA). I'm not familiar with these systems at all. They have a fair bit of open-source stuff that will probably explore in the future. I decompiled other binaries to try to look for some other interesting stuff. Found a lot of D-Bus stuff, that will be useful for getting vehicle information when I can run my own software. But my goal was to get root access first. One way would be to craft a new update file with a backdoor, which would require reverse engineering the whole upgrade procedure, and as expected the update files do have some signature hashes that presumably need to match. Getting root access directly would be the preferred way. The Android Update App Something I noticed on the official website was that they were promoting a new way to update the maps, using an Android phone app. Could this be my way in? The description on Google Play promises to "Eliminate the Sneaker Network", an expression that I had never heard, in reference to not requiring a USB drive. Of course I didn't install it, there is no point in that. I just searched the id com.nng.pbmu.dacia on Google to find one of the many sites that offer the .apk file for download. I'm not an Android developer, I just know that deep inside there is some bytecode that traces its root back to Java, and I know Java. I don't care about Dalvik, ART, Zygote, or whatever. Just give me those Java classes. Over the years I've decompiled a few Android apps, my preferred way is just to unpack the .apk as a .zip (that's all it is), get the .dex bytecode files, run them through dex2jar to get some .jar files and open them with good old JD-GUI. Recently I've discovered jadx which provides a better experience for decompiling apps. To my surprise the app was quite complex, it appears to include some sort of native bindings, and most of the functionality is implemented in some kind of proprietary .xs scripts (similar to JavaScript). These are found on the app's resources. Android APIs are exported as modules to be used in the .xs scripts Several native libraries and .xs scripts It appears that the liblib_nng_sdk.so library is responsible for running these scripts, but I didn't explore it further. My goal was just to focus on what kind of protocol was used to update the maps on the device. And I found it in the file nftp.xs. NFTP!? Is it standard FTP? No, it's not standard FTP or any other known protocol that I could find. It's a new binary protocol for transferring files, implemented on these .xs scripts. The app then uses Android Open Accessory (AOA) as the transport layer for the protocol. AOA was totally new to me, but after some reading, it was clear that it is just a way of establishing a standard for an accessory to talk USB with an Android device. The names are confusing, the "accessory" is actually the USB host (in this case, the head unit) and the Android device is the USB peripheral. The Other Side The new update file that I had was version 6.0.10.2, which, according to the website, was the version required for the new update app to work. That naturally means that there is some specific service/code on that file to handle the update on the head unit side. After some digging, I found it. It's another set of .xs scripts, these run on a native interpreter. There is also a native binary, aoa2sock, that bridges the gap between USB (AOA) and the .xs scripts by providing a pipe for the transfer protocol. It's clear that this phone update feature is an afterthought, the binaries/scripts are not part of the standard upgrade filesystem, they are installed separately from a .ipk package file (yellowtool.ipk) when the system is updated. The internal name they use is YellowTool / YellowBox. And this is the only part of the entire system that is coded with these .xs scripts, everything else is just native binaries. Most of the system uses native binaries and Qt applications The mobile update app feature uses .xs scripts Being plain text scripts, it was relatively easy to understand what the protocol does and what kind of access it provides, even though the coding style is atrocious. Constructing The Backdoor At this point, just by reading the code, I was pretty sure that it was possible to write arbitrary files under the /navi directory, and that would give me full access if I carefully modified some files. I just needed to create a fake Android update app and connect using AOA. Well, as I said before, I'm not an Android developer, so I went with the next best thing, the Linux Kernel. As it turns out I'm also not a kernel developer... But I knew that it has something called gadget mode, where a device running Linux can act as a USB peripheral (instead of a host). Could I make a Raspberry Pi act as an Android device in AOA mode? Gadget mode can be configured from userspace using configfs (just by writing specific /sys/kernel/config/ files), this way does not require writing any kernel code, but it's limited to specific "functions" already implemented in the kernel (e.g. serial port, mass storage, ethernet adapter etc). Not unsurprisingly, that's how the guys at Google implemented AOA, they added a new "accessory" function to the kernel. They even tried to push it upstream, but it went nowhere, currently, it's not part of the Linux Kernel. I don't think it will ever be, it's probably too specific, and it's kind of a weird protocol. After reading more about AOA, it was clear that it involved a kind of handshake where the accessory asks the Android device for AOA, and after that, the device just acts like a serial port (a "raw" data pipe), and it's up to the developer to do the rest (this is a simplification, and there are other modes, read more). So maybe I could use the serial gadget function to fake an Android device already in accessory mode, without implementing the handshake. I also found the talk where they first announced AOA, back in 2011. It's a nice talk if you are into USB stuff: The Testing Setup The system is something like this: Android side: Update App / "nftp" (.xs scripts) <=> AOA <=> USB Head unit side: USB (host) <=> aoa2sock <=> "nftp" (.xs scripts) <=> [reads/writes system files] For testing, I used 2 Raspberry Pies. Because the head unit is ARM-based as is the Raspberry Pi, I was able to run the aoa2sock binary and .xs interpreter from the firmware, this simulated the head unit and acted like a USB host. The other RPi was the USB peripheral (using the On-The-Go, OTG port), which when configured correctly using the gadget mode, acted like an Android device in AOA mode. The smaller Raspberry Pi Zero 2 W can be powered from the OTG port and will act as the Android device After messing about with multiple gadget configurations, I was seeing some promising debug messages from aoa2sock, that's the binary extracted from the firmware that creates a pipe between the USB AOA and the weird "nftp" protocol (.xs scripts), on the head unit side. But it was not working... "No AOA endpoint was found": My fake head unit was not recognizing my fake Android device >: file aoa2sock aoa2sock: ELF 32-bit LSB executable, ARM, EABI5 version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-armhf.so.3, for GNU/Linux 2.6.32, BuildID[sha1]=XXXXXXXX, with debug_info, not stripped After inspecting the aoa2sock binary in Ghidra (thanks for the debug info) and reading the kernel code, I finally found the issue. The kernel serial port gadget uses a different USB subclass from the one used by AOA, and it can't be changed from userspace. Is this a bug? I think AOA is correct in using USB_SUBCLASS_VENDOR_SPEC for a generic interface OK... Let's patch the kernel I ended up having to download the kernel source and patch the f_serial.c gadget function to change the USB subclass. After compiling the kernel module and loading it using modprobe, it finally worked and the aoa2sock binary recognized the device. My fake Android device was finally connected to my fake head unit Can I call myself a kernel developer now? All that was left to do was to somehow recreate that "nftp" protocol. I didn't really want to use the proprietary .xs files implementation, so I wrote my own in Python. At this point, I had all the pieces and the Raspberry Pi now replaced the Android app: Raspberry Pi side: Python Script ("nftp" implementation) <=> USB Gadget Mode (emulates AOA) Head unit side (same as before): USB (host) <=> aoa2sock <=> "nftp" (.xs scripts) <=> [reads/writes system files] Creating the backdoor involved issuing "nftp" commands to edit a specific file under the /navi directory and inject a call to a bash script, this bash script (also uploaded using "nftp") contains the payload that runs as root. H4cking Time After much testing with my dual RPi setup, I was confident that it was going to work... Raspberry Pi Zero 2 W (OTG port) connected to the infotainment head unit Setting up for an update... Ready to "Update with Phone", that option is only available after version 6.0.10.2 Waiting for a phone Time to put the RPi in gadget mode (I was connected to it using SSH)... Sorry, it's not a phone and we are not sending any maps Sending and running the payload... Got it! Success! I had root access. That payload is just call to a specific D-Bus method that I found while analyzing the firmware, it shows a popup with custom text and title. The text is the output of the id command. Finally, after replacing the payload with something more useful, a simple socat bind shell and connecting back to it using Wi-Fi, I had full access. Give me that root shell If you didn't follow it all the way, here's a summary: I used a Raspberry Pi in USB gadget mode to simulate an Android device connected to the head unit. The head unit thinks it's accepting a navigation maps update from the "phone", but because the update protocol allows for arbitrary file changes, I can issue commands to modify a specific file and inject a call to a bash script that gets run as root. Code Please Everything is on GitHub with more detailed instructions (it contains no proprietary code). The key pieces are my implementation of the "nftp" protocol and the gadget configuration. What's Next? This is just the beginning, now it's time to really explore the system. First, I'll probably end up restoring the autorun.sh functionality, with a custom service, because I think that's the easiest way to load software. That way I can keep all the new stuff on the drive and make as few changes to the system as possible. One of the main things I would like to do is record car parameters, stuff like speed, fuel, location etc. It remains to be seen if I can easily access that information through D-Bus, or if I need to go deeper. I'm not interested in adding anything that requires my attention while driving. But that's for another time... Some Extras (Could I have used SSH?) Two ports are open by default on the head unit, an SSH server, and some Apple service, probably related to CarPlay (Server: AirTunes/320.17.6), I didn't really explore that. But I tried cracking the /etc/shadow root password from the update file using hashcat / john with some rules and password lists. I'm not an expert doing this at all, I don't even know if I was doing it right, and was not successful. Not that it matters now, I could just change the root password or add a new user. SSH on port 22 / AirTunes/320.17.6 on port 7000 Sursa: https://goncalomb.com/blog/2024/01/30/f57cf19b-how-i-also-hacked-my-car
    5 points
  5. In lumea noastra, la specimene de genul le spunem escroci. Ei se considera hackeri 🤣 Ma bucur ca ai pus titlul prin care iti faci descrierea, fie ea si putin eronata. Lasa-ne ma nene cu sfaturi dinastea. Vezi-ti de banii tai, de cartela ta reincarcabila de la vodafone sau ce valori consideri tu ca ai. Pentru noi esti doar un tomberon de gunoi.
    5 points
  6. Salut! Te costa 50 lei. 100 lei daca vrei si cursul de venit pasiv
    4 points
  7. Chiar ma bucur, companiile de telecomunicatii sunt prea imbarligate si varza. Vodafone next ? Astept sa vina Starlink cu telefonie mobila si fac mutarea, de-abia astept sa scap de fosilele astea care au monopol pe piata si ofera servicii de cacao. In telecomunicatii un Senior Security Engineer ia intre 12000 si 15000 de lei maxim, pe langa low-ball-ul asta nesimtit mai ai si patru manageri deasupra, mai trebuie sa lucrezi si cu toate borataniile de toate natiile. Mergeti de curiozitate la orice Orange Shop si spuneti-le ca vreti sa portati o cartela PrePaid (dati numarul unui prieten) si ca aveti nevoie de seria de la cartela. Cu seria de la cartela va duceti la Vodafone si faceti cerere de portare, oare ce se intampla dupa? //Later edit, se pare ca si-a luat un fraier de la ei stealer, au ajuns baietii in Jira si de acolo a fost poveste, la mai multe.
    4 points
  8. Hackeri sau nu, unii au făcut bani căruța. Trebuie aplaudați pe cei care si-au riscat pielea si au făcut bani. Trebuie sa învățam si de la cei care au căzut la ani grei.
    4 points
  9. Campania lui CG a fost prea bine pusa la punct si el e prea retardat ca sa faca asa ceva. Cand el se plange de cezariana ca se rupe firul devin desi nevasta-sa a facut de 2 ori cezariana, cand zice ca apa contine informatii dar nu daca e imbuteliata, cand zice ca nu exista Covid ca nu l-a vazut nimeni, cand nevasta-sa zice sa porti fusta ca de jos vine energia in corp si o gramada de alte mizerii, incepi sa realizezi ca cea mai buna alegere e oricine altcineva.
    4 points
  10. Imediat iti zice ala ca te doare lombarul pentru ca nu ai pus o compresa cu teancuri de euro la el 🤣
    4 points
  11. da, exista, iar restul care zic sa renunti habar n-au despre ce vorbesc. A fost facut de ga0zchi, un membru de pe RSTCenter (actualul RSTForums). Se numeste Coailly si a fost postata o versiune beta aici pe forum, care mergea doar pe Betano si Princess. Calcula probabilitatile cu precizie de zece zecimale, deci mult peste ce ofera casele, care se limiteaza la doua zecimale. @black_death_c4t il are de vanzare, ii poti da un mesaj privat. @YKelyan sa-mi aduci aminte sa-mi iau 20 de lei in plus ca sa-ti dau de o apa anu' asta la DefCamp. hackuri betano, hackuri princess, hackuri 888casino, ponturi pariuri, hack aviator unibet
    4 points
  12. Hello komrads today's hacked romanian websites zoso.ro & arhiblog.ro FULL DB Dump from today. All emails from comments and all logins. Download here: You need to be a registered user to view this link! You need to comment "Thank You" after you log in!
    4 points
  13. Sa dam tag si la fratele nostru, @Zatarra 🤣
    3 points
  14. Poate ca polonic nu mai e pe forum, dar o sa fie intotdeauna in inimile noastre ❤️
    3 points
  15. Welcome, we also barely speak Romanian (although native) so it is fine.
    3 points
  16. @Nytro @aelius poate aveti nevoie de un imprumut
    3 points
  17. Presedinte fake, justitie fake, produse fake, magazine fake...curand si tara 404
    3 points
  18. Aveti ncrack, hydra, medusa si o tona de alte solutii si tot cu mizeriile de "arhive" ati ramas... Romania tot in 2002 este.
    3 points
  19. :))))))) mi-am luat trigger. Nu beau mai mult de 30-35 de espresso pe zi frate. Da sunt interesat de nebunul de kw3
    3 points
  20. Ce batrani suntem. TinKode e barbat in toata firea, Nytro e deja la al 3-lea copil, Aelius a renuntat la cafea si Kw3 a devenit preot paroh.
    3 points
  21. Bre, s-au furat alegerile. Ce te astepti pe o bucata de forum din suburbiile internetilor? 🤣 Toata Europa e un comunism. Am ingropat URSS, am facut Uniunea Sovietica Europeana
    3 points
  22. Nu a fost inchis, numai ca acum e hostat direct prin serverele de la fbi. Ai grija baietel ca daca nu intri pe site-ul asta din tor si cu conexiune prin 3 frigidere o sa trezesti cu un view de duba alba la fereastra.
    3 points
  23. Raman uimit de faptul ca oamenii au uitat ca cea mai sigura metoda de comunicare ramane telepatia si apeleaza la tot felul de aplicatii online pentru a purta discutii sensibile. De ce nu ne intoarcem la vechile practici ale stramosilor nostri daci? Nu are relevanta daca esti mafiot, vizigot, ostrogot, conteaza sa proiectezi informatiile dobandite din apa catre subconstientul interlocutorului.
    3 points
  24. Probabil peste 10 ani nici notificare la 6 dimineata nu iti mai dau. Te trezesti direct in Desert pe undeva ca in Mad Max si o drona e trimisa spre tine sa te extermine ca cica esti Cyber Terorist.
    3 points
  25. Prima regula care nu se aplica doar in security, ci si in multe alte lucruri, inclusiv fotbal sau mai stiu eu ce e urmatorul: sa iti placa ceea ce faci. Daca o faci pentru bani, slabe sanse sa ai succes. Daca iti place o sa pui si osul la treaba care e urmatorul pas. Sa inveti. Mai intai cate putin din fiecare, apoi extinzi ceea ce stii in functie de necesitati.
    3 points
  26. Banii se fac muncind, legal. Sau inseland, furand sau efectuand alte activitati - ilegal. Grupurile la care te referi probabil sunt niste mizerii piramidale din care nu o sa faci bani, o sa pierzi inutil mult timp.
    3 points
  27. s-au gasit rusi la PNL. Naaa, muie la leftisti si creduli. Poporul asta are nevoie de un reset total
    3 points
  28. (refresh) ANAF a descoperit că PNL a plătit o campanie care l-a promovat masiv pe Călin Georgescu pe TikTok - Snoop Ai dreacu rusi au mai fost romanii astea.. 😂😂
    3 points
  29. E scam. Foloseste Hostinger ce accepta plati crypto pentru host, intrucat la whois nu iese privacy chipurile dar nici ei nu stiu defapt cine le ia serverul in primire pentru gazduire si nu cred ca ii intereseaza. E un serviciu olandez (culmea, nu?), poate unul din cele foarte putine de acest fel in Europa. IP-ul de server bineinteles ca e blacklisted si el, nu mai pun amatorismul in sine al site-ului. L.E: Totodata, atentie mare la renumitul site "ScamAdviser", la o analiza mai ampla facuta de mine acum vreun an, in spate se afla un soi de ONG-uri de tipul 'black african people can code too' si alte labe triste d'astea, ce sa vezi, sustinute tocmai de statul Olandez cu fonduri. Nu are nici dracu o pregatire acolo reala sa realizeze vreun sistem de detectie a unui scam, is cateva zeci de VPS-uri ce acceseaza un link si face niste estimari sparte'n PHP cel mai probabil. Prostii de la noi, ca asa e ei, prosti l-au prezentat imediat la stiri si emisiuni dedicate IT ca fiind vreun mare serviciu de baza anti-scam, in realitate, multe scam-uri au scor mare la ei pe site si daca continui sa sapi fara oboseala, ajungi la concluciza ca aia is sefii la scameri, aia mari nu oricare. ScamAdviser e cel mai grandios si inteligent scam posibil aparut in ultimii ani.
    3 points
  30. In 2014 era OK când licuriciul cel mare (albastru) de la care luam lumina manipula alegerile prin Facebook. Își mai aduce aminte cineva de puie monta ? In 2024 nu mai e OK când licuriciul rosu de la Beijing manipulează alegerile prin TikTok. E doar praf in ochi pentru prosti. Documentul de CSAT ne arata ca "niste rusi au intrat pe platforma, nu au schimbat nimic", dar curtea constitutionala da o lovitura de stat sa anuleze votul popular. Statul s-a pisat pe toti prostii care au o sug pe la televizor si pe tiktok/youtube cu statul de drept, democratie, ue. Alegerile prezidentiale au fost manipulate de chineji dar alea parlamentare nu ? Tinand cont ca Romania e Republica Parlamentara unde premierul are mult mai multa putere decand presedintele care e doar de forma si excursii. Mesajul asta e pt fraierii aia de lucreaza prin institutii si au bale la gura cu democratia, ue, statul de drept.
    3 points
  31. Dupa cum zici tu, nu e vina UE, e vina romanilor. Da, nu a celor de la PSD si PNL ca si-au facut averi si au spart bani intre ei, ci ai romanilor ca i-au votat timp de 35 de ani. CG nu e Pro UE cand urmarind videoclipuri cu el de acum 2-3 ani vezi ca e fan Rusia. Sputnik a scris ca e sustinator rus, asta nu am vazut in vreo stire ci am verificat eu. Cat despre CG, nu doar asta e problema, ci ca e si retardat, la fel ca nevasta-sa. Zice ca s-a intalnit cu o civilizatie care nu e umana, ca apa are informatii, daca o imbuteliezi nu mai are si o gramada de alte bazaconii pe care nici Andrei de la Insula Iubirii nu le putea scoate nici pe LSD. Sa nu mai zic ca trebuie sa purtam fuste ca din pamant vine energia sau ce sloboz zicea nevasta-sa aia. Sa fim seriosi, daca ar stii toate lucrurile astea, nu ar mai vota nimeni cu el, dar in "reclamele" de pe tik tok nu apare nimic negativ. Si asa cum daca vezi o reclama la un produs nu te arunci sa il cumperi ci iti pierzi putin timp sa vezi review-uri, asa nu ar trebui nici sa votezi, doar ca ai vazut un filmulet cu un Gigel si ca pare de treaba sau ca pare destept sau mai stiu eu ce. Si Floricica Dansatoarea daca se imbraca mai elegant si citeste un discurs pare la fel. Tara merge prost pentru ca unii sa o duca bine, asa a fost mereu. Si aici discutia e foarte lunga si nu are rost. De aceea inteleg perfect nevoie de schimbare, dar daca facem o schimbare, sa nu alegem un nebun sa ne conduca si sa ne reprezinte. Cel putin sa ne mai documentam inainte de a pune acea stampila, ca nu votam un concurent la Puterea Dragostei ci ne alegem presedintele.
    3 points
  32. A Russian cybercriminal wanted in the U.S. in connection with LockBit and Hive ransomware operations has been arrested by law enforcement authorities in the country. According to a news report from Russian media outlet RIA Novosti, Mikhail Pavlovich Matveev has been accused of developing a malicious program designed to encrypt files and seek ransom in return for a decryption key. "At present, the investigator has collected sufficient evidence, the criminal case with the indictment signed by the prosecutor has been sent to the Central District Court of the city of Kaliningrad for consideration on the merits," the Russian Ministry of Internal Affairs said in a statement. Matveev has been charged under Part 1 of Article 273 of the Criminal Code of the Russian Federation, which relates to the creation, use, and distribution of computer programs that can cause "destruction, blocking, modification or copying of computer information." He was previously charged and indicted by the U.S. government in May 2023 for launching ransomware attacks against "thousands of victims" in the country and across the world. He is also known by various online aliases Wazawaka, m1x, Boriselcin, Uhodiransomwar, and Orange. Matveev has also gone public about his criminal activities, stating that "his illicit activities will be tolerated by local authorities provided that he remains loyal to Russia." He was sanctioned by the U.S. Treasury and has been the subject of a reward of up to $10 million for any information that could lead to his arrest or conviction. A subsequent report from Swiss cybersecurity firm PRODAFT revealed that Matveev has been leading a team of six penetration testers to carry out the ransomware attacks. Besides working as an affiliate for Conti, LockBit, Hive, Trigona, and NoEscape ransomware groups, he is said to have had a management-level role with the Babuk ransomware group up until early 2022. Furthermore, he is believed to have deeper ties with the Russian cybercrime group known as Evil Corp. The development comes a little over a month after four members of the now-defunct REvil ransomware operation were sentenced to several years in prison in Russia after they were convicted of hacking and money laundering charges. Update# A security research community that goes by the alias "club1337" said in a post on X that they received confirmation from Matveev that he had been charged in Russia, and that he had paid two fines and forfeited a chunk of the cryptocurrency earned. "He is currently out on bail, unharmed, and awaiting the next steps in the legal process," the researcher said. In a related law enforcement action, Stanislav Moiseyev, the founder of the now-defunct Hydra darknet marketplace, has been sentenced to life in prison. He has also been ordered to pay a fine of 4 million rubles. The recent wave of arrests and prosecution of Russian cybercriminals are an unusual departure from the norm, as it's uncommon for the Kremlin to prosecute its own hackers as long as they stay out of targeting companies and individuals located within its borders. Source: https://thehackernews.com/2024/11/wanted-russian-cybercriminal-linked-to.html
    3 points
  33. S-a dus creditul de pe cartela reîncărcabilă 🤣 Luna viitoare cand produce 5.95 usd, ne viziteaza iar
    3 points
  34. Cand faci lucruri care nu sunt legale puscaria este inevitabila. Tot ce scrii tu aici sunt frustrari acumulate pentru ca pe tine nu te duce capul iar pe altii ii duce dar il folosesc intr-un scop bun pentru ei si familia lor. Eu sunt din Dragasani si sunt unul dintre aia care nu a facut puscarie pentru ca am stat departe de prostii si am ajuns sa o duc chiar bine.
    3 points
  35. Pacat ca monedele alea, bitoin cum le ziceti, nu intra in carucioarele de la Lidl.
    3 points
  36. Mie nu mi se pare ca o duc rau deloc, nu am griji (ma doare putin lombaru ce-i drept) dar in rest toate bune si frumoase, fara frica de puscarie. ❤️
    3 points
  37. Sau si-au dat seama ca UE este ultima flegma. Au ingropat urss si au facut o copie, mult mai comunista si mai infecta. Migratie, cutiteala, jaf armat pe strazi, talharii la ordinea zilei, radare prin boscheti, strazile au inceput sa se asemene cu cele din romania anilor 90, gaozari legebeteu, 47% taxe, bani pentru ucraina in parastasul lor de borâti si sobolani - Uite o imagine a Germaniei si inca nu e imaginea completa. 14.000 companii inchise doar anul asta, pe langa vw in insolventa. slava coclender :))))))
    3 points
  38. haha, am avut un flash back din anii 2000 🤧
    3 points
  39. Se cheama Keylogger
    3 points
  40. Sa-mi bag pula de nu au rupt chinezii in doua emagul cu fakeuri. Mai ales pe componente pc aproape orice seller care nu e emag e tepar.
    2 points
  41. Urmaresc de cateva luni bune aceasta metoda care in mod normal nu ar fi trebuit sa functioneze, insa functioneaza extrem de bine si aduce trafic ca la balamuc siteurilor care o folosesc. Metoda este blackhat, se foloseste la greu si de parasite seo pentru a optimiza rezultatele finale, iar cei care o folosesc risca sa fie penalizati drastic de motoarele de cautare. Dar nu sunt Siteurile pe care le urmaresc constant cum profita de asta sunt in continuare bine mersi, cu fluctuatii intre 5K si 300K lunar vizitatori unici, in functie de amploarea atacului la momentul respectiv, iar de rankat rankeaza binisor. In spatele lor sunt intotdeauna chinezi, pentru ca de la ei a pornit tot si probabil pentru ca in China este foarte ieftin sa cumperi astfel de servicii existand deja infrastructura necesara pentru a da drumul la treaba imediat cum ai platit abonamentul. Rezultatele acestei metode sunt urmatoarele: 1. Crawlerul este prins captiv intr-o serie nesfarsita de redirecturi care duc catre pagini construite special ca sa primeasca trafic si juice in timp ce la randul lor genereaza trafic si juice pentru alte domenii sau subdomenii. 2. Domeniul principal al atacatorului creste in ranking ajungand pe pozitii bune pe long tail keywords. 3. Domeniile care cad victima tacticilor de parasite seo + spider pool incep sa sufere scaderi bruste de trafic, indiferent de autoritatea pe care o au (se poate observa usor lucrul asta la unele publicatii de presa din US). Asta se intampla din mai multe motive: ori au un bug de tip open-redirect care le permite atacatorilor sa creeze redirecturi, ori au functia interna de search indexabila, ori permit crearea unor pagini unde apar linkuri dofollow catre domenii ce fac parte din spider-pool. Sunt afectate CMS-uri, pluginuri, sau pur si simplu forumuri sau bloguri care lasa la liber comentariile si postarile. De cand urmaresc fenomenul asta nu am vazut nici macar un site spart care sa fie folosit in combinatie. Doar open redirects, pagini spammy, subdomenii si domenii setate sa faca redirecturi, forumuri si bloguri spamate cu linkuri care de multe ori sunt nofollow. Practic oricine cu skilluri tehnice poate face asta fara sa fie nevoit sa sparga siteuri, sau servere Cum functioneaza: Atacatorul pune pe o pagina link catre siteul A (siteul unui ziar cu autoritate mare), care este fortat sa redirectioneze catre siteul B (siteul unui magazin mare), care la randul lui redirectioneaza catre siteul C (siteul unei universitati de prestigiu), care mai apoi redirectioneaza fortat crawlerul catre siteul atacatorului. Iar atacatorul primeste la final cate putin din juice-ul fiecarui site implicat in redirect chain. Ceea ce contravine tuturor legilor nescrise din SEO si nu ar trebui sa functioneze in felul asta. Dar functioneaza pentru ca sunt milioane de astfel de actiuni zi de zi. Exemplu: Spammy page with links -> domainA.com/redir.php?out=https://domainB.com/link?u=https://domainC.com/url?out=https://anotherattackerdomain.com/internalpage.html -> attackersubdomainA/pagewithlinks+sitemapRedirect -> attackersubdomainB/pagewithlinks+sitemapRedirect -> attackersubdomainC/pagewithlinks+sitemapRedirect -> attackermoneysite+sitemapRedirect -> infinite redirects Atacatorii folosesc intotdeauna pe domeniile si subdomeniile lor o combinatie de multe linkuri externe si sitemaps care la randul lor forteaza motoarele de cautare sa considere redirecturile legit. De foarte multe ori sunt implicate si domenii expirate pe care le configureaza sa creeze si sa stearga la infinit subdomenii care au continut spammy. 4. Domeniile A, B si C, care au fost implicate in toata povestea fara voia lor vor suferi de o scadere a bugetului de crawl pe care Google i le-a alocat, dar asta se reflecta doar pe paginile lor legit. Pentru ca paginile parazit unde au fost create redirecturile fac parte din spider pool vor primi vizita crawlerului Google de cateva ori pe zi, uneori si de cateva sute de ori pe zi, pe cand paginile legit, cele normale, nu vor mai primi vizita motorului de cautare deoarece tot bugetul de crawl a fost consumat de paginile parazit. 5. Webmasterii domeniilor abuzate se prind greu ce se intampla, ceea ce duce la o prabusire inexplicabila a traficului pentru siteurile lor. Desi toate actiunile din spider pool apar in Google Search Console sub o forma sau alta, par simple spamuri random care nu ar trebui sa aiba vreun efect. Efectul devine vizibil cand apar in cateva luni sute de mii de pagini care nu ar trebui sa existe si sute de mii de accesari catre pagini care returneaza 404 - pentru ca cei care apeleaza la astfel de servicii sunt de multe ori ametiti si seteaza prost campaniile de spam, sau folosesc o alta metoda de tip parasite seo pentru a indexa cuvinte cheie in searchul intern al siteurilor care le cad victima (o metoda de cacat care cauzeaza doar probleme pentru victime si zero avantaje pentru spammeri). Stiu ca suna alambicat - este chiar si atunci cand vezi live intregul flow in fata ochilor - si as vrea sa vin cu exemple clare cu screenshots din GSC, stats s.a.m.d. dar nu pot face asta momentan fara sa dau chestii din casa. Rezultatele sunt oricum greu de explicat, pentru ca tot ce se intampla contravine cu tot ce se stie despre cum functioneaza Google, ce penalizeaza si ce premiaza. Practic motorul de cautare e ametit atat de tare de milioanele de redirecturi si de paginile cu linkuri spammy incat algoritmii anti spam nu mai au efectul scontat. Faptul ca domeniile care cad victima se duc rau la vale in doar cateva luni face ca metoda asta sa fie utila atat pentru SEO cat si pentru negative SEO. Studiul de mai jos explica o parte din metodele de atac si rezultatele acestora, dar metoda a fost intre timp combinata cu parasite seo si cu alte metode destul de rudimentare, care folosite impreuna aduc rezultate exceptional de bune. Nu veti gasi prea multe informatii cu ajutorul Google pentru ca este un subiect dezbatut pe larg doar in comunitatile din China, comunitati pe care le puteti gasi doar daca folositi Baidu ca motor de cautare impreuna cu cautari in limba chineza. Din informatiile gasite pe net, Baidu a fost primul motor de cautare care a fost abuzat in urma cu multi ani de chinezi prin metoda asta, dar au reusit sa le taie din avant. Google insa este vulnerabil in continuare desi echipa lor a luat la cunostinta despre problema. https://www.researchgate.net/profile/Haixin-Duan/publication/314246234_The_Ever-Changing_Labyrinth_A_Large-Scale_Analysis_of_Wildcard_DNS_Powered_Blackhat_SEO/links/58bdd8fdaca27261e52e96e4/The-Ever-Changing-Labyrinth-A-Large-Scale-Analysis-of-Wildcard-DNS-Powered-Blackhat-SEO.pdf P.S.: am raportat la Google zeci de domenii si subdomenii ale chinezilor, cu dovezi, screenshots cu paginile spammy, cu sitemaps modificate pentru a tine crawlerul captiv, redirect chain etc. Au trecut 8 luni si toate domeniile sunt bine mersi, mai putin cele ale victimelor care, dupa cum arata statisticile, sufera de o prabusire constanta a pozitiilor in Google.
    2 points
  42. Epuizarea psihica, cea fizica a exista dintotdeauna si e utila uneori, miscare, adormit repede etc. Nesiguranta zilei de maine a fost de asemenea mereu. Eu cred ca aici e de fapt problema. Ca stam prea mult pe net. Orice am face, stam prea mult cu un ecran in fata. Noi, suntem partial nevoiti, ca asta ne e meseria, dar putem evita sa facem asta in timpul liber. Dar noi ce mai batrani avem experienta trecutului si putem invata din ea: - nu pot merge in curte sa tai o gaina, dar pot sa evit KFC si sa cumpar un pui intreg, cat se poate de "crescut natural" - nu ma pot duce in gradina sa iau rosii, dar pot sa aleg ceva cat mai decent - nu trebuie sa ma duc sa dau cu coasa toata ziua, dar macar o ora la sala pot sa merg - pot sa stau pe Facebook 2 ore sau ma pot vedea cu niste prieteni, sau doar vorbi la telefon Eu am fost la tot felul de doctori dar mi-am aflat "problemele" si am grija cu ele. De exemplu, avand probleme la lombar si la genunchi nu le fortez deloc la sala. Evit pastilele cu orice pret, iau doar daca sunt necesare. Mancarea variata: pui, vita, peste, fructe de mare, legume combinate, fructe etc. si fara exces ma ajuta sa nu am lipsuri (sunt pe verde la analizele de sange ) Cat strict despre partea psihica, anxietate si workout problema e simpla: e ca si cum ai da la lopata 8 ore pe zi, ai ajunge acasa si ai mai da la lopata cateva ore. Asa cum asta ar pune o mare presiune pe oase si te-ar darama fizic, asa e si cu creierul. Dupa 8 ore de folosit intensiv creierul, il mai folosesti si acasa, mai esti stresat si din cine stie ce cauze si se aduna. Repede. Solutia e simpla: limiteaza timpul in care iti folosesti creierul. In PRIMUL rand la munca. E un cacat de job in IT, pentru o corporatie din care altii fac miliarde. Tu nu faci. Nu merita sa te imbolnavesti pentru asta. In plus sunt o gramada de job-uri disponibile, ne descurcam, nu e ca si cum viata noastra depinde de acel job. Daca esti focusat 8 ore pe zi la munca o iei razna.
    2 points
  43. Sters de autor. M-am razgandit si nu il mai las public 7 zile. Sorry guys
    2 points
  44. Înțeleg frustrarea ta, dar fiecare alege drumul pe care îl consideră cel mai potrivit pentru el. Ethical hacking și cybersecurity sunt domenii care nu doar că aduc venituri, dar contribuie și la un internet mai sigur. Criminalitatea cibernetică poate părea tentantă pentru un câștig rapid, dar riscurile și consecințele pe termen lung sunt enorme. Poți să faci bani și să-ți construiești o carieră solidă fără să îți compromiți integritatea.
    2 points
  45. L-a favorizat o pula. CSAT e o dugheana infiintata de scarba tiganeasca si evreiasca de Ion Iliescu George Simion a avut 396 milioane de vizualizări Tik Tok Marcel Ciolacu a avut – 328 milioane de vizualizări. Elena Lasconi a avut 202 milioane de vizualizări. Călin Georgescu a avut 135 milioane de vizualizări.
    2 points
×
×
  • Create New...