Jump to content

Byte-ul

Active Members
  • Posts

    2175
  • Joined

  • Last visited

  • Days Won

    30

Everything posted by Byte-ul

  1. Se poate scoate acel indicator? Iese cam tare in evidenta, intra toti prostii pe chat si nu mai sunt destui moderatori care sa se ocupe
  2. Byte-ul

    Like vs Rep

    Reputatia parea mai utila pentru ca trebuia sa dai 3 clickuri, in timp ce pentru a da un like trebuia un singur click. Nu are nicio treaba cu cat de util era un user pentru comunitate.
  3. Byte-ul

    Test

    Imi scoate si mie cineva banul de pe chat? Se pare ca aici adminii pot scoate banuri, moderatorii doar le pot da
  4. Probabil ai ban. Eu am ban și apare lafel
  5. Byte-ul

    Test

    proxy test @Nytro chatul nu are proxy pentru imagini si merge un ipgrabber blana pe el. Confirma @Gecko
  6. The Dridex banking trojan that is widely being used by cyber criminals to distribute malware onto users’ machines has now been found distributing a security software. A portion of the Dridex banking Trojan botnet may have been hacked or compromised by an unknown Whitehat Hacker, who replaced the malicious links with Avira Antivirus installers. What is Dridex Banking Trojan? How it Works? Dridex malware – also known as Bugat and Cridex – is believed to have been created by cyber criminals in Eastern Europe in an effort to harvest online banking details. Even after a high-profile takedown operation in late 2015, the Dridex botnet seems to be active again. The Dridex virus typically distributes itself through spam messages or emails that include malicious attachments, most often a Microsoft Office file or Word document integrated with malicious macros. Once the malicious file has been clicked, the macros download and install the main payload of the virus – the trojan program itself – from a hijacked server, which installs and runs on the victim's computer. The Dridex trojan program then creates a keylogger on the infected machine and manipulates banking websites with the help of transparent redirects and web-injects. This results in stealing victim's personal data like usernames and passwords, with an ultimate aim to break into bank accounts and siphon off cash. Hacker replaces Trojan with Anti-virus However, the recent Hack Surprises: Instead of distributing banking trojan, a portion of the Dridex botnet currently seems to be spreading legitimate copies of the free anti-virus software from Avira, as the company has announced itself. "The content behind the malware download [link] has been replaced, it is now providing [a legitimate], up-to-date Avira web installer instead of the usual Dridex loader," explained Avira malware expert Moritz Kroll, reported Reg. Avira believes that the white hat hacker or hackers may have hacked into a portion of infected web servers using the same flaws the malware authors used and then replaced the malicious code with the Avira installer. So, once infected, instead of receiving Dridex malware, the victims get a valid, signed copy of Avira antivirus software. "We still don't know exactly who is doing this with our installer and why – but we have some theories," said Kroll. "This is certainly not something we are doing ourselves." Although the motives behind including the Avira software is still unclear, these kinds of actions are considered to be illegal in many countries, said Kroll. What can be done to protect From Malware Attacks? The guidance for preventing yourself from being a part of the Dridex Banking Trojan botnet is: Ensure you have an updated antivirus program running on your PC, which should be able to intercept the malicious attachments before they are opened. One of the best measures for securing your online environment is to deploy an at the network layer, which is especially useful to quickly detect malware and other threats in your network when integrated with a and SIEM (Security Intelligence and Event Monitoring) solution, such as (USM). Be careful of opening email attachments sent from an unknown email address, particularly (in this case) Microsoft Word and Excel files. Disable Macros in MS Office, or at least set the Macros to request permission before they run. haha
      • 3
      • Upvote
  7. Cei ce folosesc "unelte" deja existente sunt niste prosti (denumiti script-kiddies). Nu iti recomand sa devii unul.
  8. Posteaza si "Total cost with sales" de aici: https://steamdb.info/calculator/ De ce accepti plata in skinuri de CS:GO daca nu mai ai chef de jocuri?
  9. Byte-ul

    Test

    Esti naspa fsdfsdfsdfsdfsdfsdffsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdf dfgdfgdfgdf fgdfgdfgdfgdf dfg fdg adasdasd sd fsdf sdf dsfsdfsd d sd asd d asd asd ss @Nytro apar posturile din cosul de gunoi pe prima pagina.
  10. Byte-ul

    Test

    int main(){ int pula_me = 99; return 1; } Tot sunt futute tagurile code
  11. https://github.com/dotnet/core
  12. Hearthstone ?i heroes of the storm sunt gratis. Crisis 2 e probabil 5 euro. Just cause 3 era 60 euro parca. Ce afacerist e?ti tu.
  13. Byte-ul

    RST Bashed

    La multi ani!
  14. Maybe using this? PyInstaller Extractor download | SourceForge.net I don't know.
  15. That's what PjOrion does.
  16. It uses exception handling to redirect flow. In addition it introduces control flow obfuscation, junk instructions and variable name obfuscation.
  17. Just use PjOrion.
  18. Byte-ul

    keygen

    Keygen: aaaa.exe E asa mare pentru ca l-am compilat cu CodeBlocks. Cam asa sunt calculate numerele alea: [C++] #include <iostream> #include <string.h> int main() { int number1 = 0; - Pastebin.com
  19. wut? What source code?
  20. Use PJOrion and compile it to .pyc. Obfuscate and Protect the code with it. PjOrion - ??????????????, ??????????, ????????????, ?????????? ????? (??????: 1.3.1 ????: 11.10.2015) - ActionScript & Python - ?????? Korean Random
  21. This should be enough to generate a HWID. >>> import platform >>> platform.machine() 'x86' >>> platform.version() '5.1.2600' >>> platform.platform() 'Windows-XP-5.1.2600-SP2' >>> platform.uname() ('Windows', 'name', 'XP', '5.1.2600', 'x86', 'x86 Family 6 Model 15 Stepping 6, GenuineIntel') >>> platform.system() 'Windows' >>> platform.processor() 'x86 Family 6 Model 15 Stepping 6, GenuineIntel' from uuid import getnode as get_mac mac = get_mac()
  22. Nu ne arati si un atac contra unui site vulnerabil? De ce ai folosit in vector iframe? Dar onload? De ce stringul din alert este intre // si nu intre ghilimele?
  23. Spune-mi tu te rog. Nu stiu sa caut pe google.
×
×
  • Create New...