Jump to content

CES

Members
  • Posts

    3
  • Joined

  • Last visited

About CES

  • Birthday 02/15/1984

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

CES's Achievements

Newbie

Newbie (1/14)

10

Reputation

  1. CES

    Shodan

    (pentru cine nu stia de el) SHODAN is a search engine that lets you find specific computers (routers, servers, etc.) using a variety of filters. Some have also described it as a public port scan directory or a search engine of banners. Web search engines, such as Google and Bing, are great for finding websites. But what if you're interested in finding computers running a certain piece of software (such as Apache)? Or if you want to know which version of Microsoft IIS is the most popular? Or you want to see how many anonymous FTP servers there are? Maybe a new vulnerability came out and you want to see how many hosts it could infect? Traditional web search engines don't let you answer those questions. Exemplu (sa nu mai plangeti dupa root-uri): ASUS RT-AC66U acsd Param - Remote Root Shell Exploit + SHODAN - Computer Search Engine + MSFpayload & MSFencode | Information Security Berserker
  2. Search beyond words We index the HTML, Javascript, CSS, and plaintext of hundreds of million pages. https://search.nerdydata.com/ Exemplu: http://www.exploit-db.com/exploits/29482/ + https://search.nerdydata.com/search/#!/searchTerm=themes/kernel-theme//searchPage=1/sort=pop
  3. Azazel is a userland rootkit written in C based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional features, and focuses heavily around anti-debugging and anti-detection. Features include log cleaning, pcap subversion, and more. Anti-debugging Avoids unhide, lsof, ps, ldd detection Hides files and directories Hides remote connections Hides processes Hides logins PCAP hooks avoid local sniffing Two accept backdoors with full PTY shells. Crypthook encrypted accept() backdoor Plaintext accept() backdoor PAM backdoor for local privesc and remote entry Log cleanup for utmp/wtmp entries based on pty Uses xor to obfuscate static strings Azazel - Security101 - Blackhat Techniques - Hacking Tutorials - Vulnerability Research - Security Tools
×
×
  • Create New...