Jump to content

ThaiFight

Moderators
  • Posts

    426
  • Joined

  • Last visited

  • Days Won

    6

Everything posted by ThaiFight

  1. ThaiFight

    RST Bashed

    cu smântâna sau f?r? ?
  2. FBI-ul a cerut oficial extradarea lui Marcel Lehel pentru a raspunde in fata unui tribunal din Statele Unite pentru ca ar fi spart conturile de e-mail ale unor personalitati si ar fi dezvaluit corespondenta lor privata. Printre victime se afla si generalul Colin Powell a carui corespondenta cu europarlamentarul roman Corina Cretu a starnit controverse peste ocean. Fost taximetrist in Arad, Marcel Lazar Lehel s-a transformat peste noapte in cel mai vanat hacker de pe planeta. Se intampla imediat dupa ce judecatorii romani il condamnasera la trei ani de inchisoare cu suspendare pentru violarea conturilor de socializare ale unor vedete din Romania. Ramas liber, Micul Fum, cum isi spunea Lehel, si-a luat numele de Guccifer in mediul online. Iar prima victima a ales-o peste ocean: generalul Collin Powell la care ajunsese dupa ce ii accesase ilegal corespondenta Corinei Cretu. Mai multe ziare din Statele Unite au facut publice schimburile de presupuse scrisori dintre Corina Cretu si Colin Powell, dezvaluite de hackerul roman. "Nu am crezut ca la 43 de ani pot sa plang atat de mult pentru un barbat, ca o adolescenta", ii marturisea Corina Cretu in Ajunul Craciunului, in 2010. "Te-am iubit prea mult, prea multi ani. TU ai fost cea mai mare iubire a vietii mele...". Fortat sa reactioneze, Colin Powell a spus ca a cunoscut-o pe Corina Cretu, dar a precizat ca nu au depasit barierele unei relatii de amicitie si in niciun caz nu si-a inselat sotia, care ii este alaturi de 50 de ani. Iar Cretu si-a exprimat indignarea pentru folosirea publica a unor fotografii furate din corespondenta ei, fapt ce i-ar incalca dreptul la viata privata. Nici Hilary Clinton, sotia fostului presedinte Bill Clinton, sau familia lui George Bush, nu au scapat de indiscretia lui Guccifer. La FBI s-au intregistrat plangeri pe banda rulanta impotriva romanului: oameni de afaceri, actori sau politicieni au cerut ca hackerul sa fie prins si pus sub acuzare. A doua sentinta primita de Lehel dupa violarea corespondentei fostului sef de la SRI, Cristian Maior si a Corinei Cretu, sri cristian maior si a corinei cretu, a fost de 7 ani de inchisoare cu executare, iar acum procurorii americani cer extradarea lui in Statele Unite. Soarta lui Guccifer va fi decisa de Curtea de Apel Timisoara peste doua luni. Daca va fi judecat in Statele Unite, risca sa primeasca o condamnare de cateva zeci de ani, asa ca si-ar putea petrece restul zilelor intr-o inchisoare americana. Asa cum ar putea fi condamnat si la plata unor despagubiri uriase, de cateva milioane de dolari. Source SUA cer extr?darea lui Guccifer. Ce risc? hackerul român care a dezv?luit leg?tura dintre Corina Cre?u ?i Colin Powell
  3. Ai b?ut prea mult )treze?te-te in pu..mea si nu mai posta aiurea.
  4. @wHoIS ,totu?i e?ti IT-ist sau manelist ? Da eu sunt mare, mare, Faraon este un jeg de melodie
  5. @rectisor Pentru a depune cât mai putin efort,urm?re?te-?i vecinul când pleac? de acas?,?i sparge-i u?a ca ?ie mai u?or
  6. Doresc tuturor membrilor acestui forum,ca s?rb?torile de iarna sa va aduc? s?n?tate,fericire ,împlinirea tuturor dorin?elor ?i s?n?tate celor dragi. La multi ani !
  7. Ai zis bine @Cyb3rGhost dar di p?cate nu cred ca îl ?tie folosii nici pe ala
  8. Contents : *Wordlists - Comprises of password lists, username lists and subdomains *Web Service finder - Finds web services of a list of IPs and also returns any URL rewrites *Gpprefdecrypt.* - Decrypt the password of local users added via Windows 2008 Group Policy Preferences. *rdns.sh - Runs through a file of line seperated IPs and prints if there is a reverse DNS set or not. *grouppolicypwn.sh - Enter domain user creds (doesnt need to be priv) and wil lcommunicated with the domain controllers and pull any stored CPASS from group policies and decode to plain text. Useful for instant Domain Admin! *privchecker.sh - Very young script that simply checks DCenum to a list of users to find their group access, indicated any privilaged users, this list can be edited. *NessusParserSummary.py - Parses Nessus results to give a summary breakdown of findings plus a host count next to each. *NessusParserBreakdown.py- Parses Nessus results to give a host based breakdown of findings plus the port(protocol) and CVSS rating. *NmapParser.py - Parses raw NMAP results (or .nmap) and will create individual .csv files for each host with a breakdown of ports, service version, protocol and port status. *NmapPortCount.py - Parses raw NMAP results (or .nmap) and will generate a single CSV with a list of Hosts, a count of how many open/closed/filtered ports it has, the OS detection and ICMP response. *Plesk-creds-gatherer.sh - Used on older versions of plesk (before the encription came in) that allows you to pull out all the credentials form the databases using a nice Bash menu *BashScriptTemplate.sh - Handy boiler plate template fro use in new scripts. *PythonScriptTemplate.py - Handy boiler plate template fro use in new scripts. *ipexplode.pl - Simply expands CIDRs and prints the ips in a list, handy for when you need a list of IPs and not a CIDR *LinEsc.sh - Linux escilation script. This will test common methods of gaining root access or show potential areas such as sticky perms that can allow manual testing for root escilation *gxfr.py - GXFR replicates dns zone transfers by enumerating subdomains using advanced search engine queries and conducting dns lookups. *knock.sh - Simple script used to test/perform port knocking. *sslscan-split-file.py - Used to split a large SSLScan results file into individual SSLScan results. *TestSSLServer.jar - Similar tool to SSLScan but with different output. *wiffy.sh - Wiffy hacking tool, encapsulated in a single Bash script. Download : https://github.com/leonteale/pentestpackage
  9. Introduction Advanced Policy Firewall or APF is iptable based firewall system which is a free distribution, this firewall is designed to meet today’s security based essential needs.The firewall is designed to be very informative and present the user with an easy to use follow process. Features Highlight The filters perfromed by APF can be catagourised in three parts static rule based policy. It define how firewall should handle certain traffic in specific conditions while giving access to certain port or adding some ip address as trusted one. Connection based stateful policy Firewall will identify valid/legitimated packets from the different types of connections and will allow only valid connections which are allowed in firewall rules and other will be rejected. Sanity based policy Can identify network attacks by screening or scrutinizing packets, it will discard and log any data which is considered as inappropriate. Installation It is recommended to have at least 2 LAN cards, 4 GB RAM, dual core processor and 1 GB free disk space to dedicate your system as APF firewall. Update Ubuntu 15.10 # apt-get update Download package : # wget http://www.rfxn.com/downloads/apf-current.tar.gz Extract package : # tar -xvf apf-current.tar.gz Extract and install package : # cd apf-9.7-2/ # ./install.sh Sample output : Installing APF 9.7-2: Completed. Installation Details: Install path: /etc/apf/ Config path: /etc/apf/conf.apf Executable path: /usr/local/sbin/apf Other Details: Listening TCP ports: 53,631 Listening UDP ports: 53,68,631,5353,23566,47956 Note: These ports are not auto-configured; they are simply presented for information purposes. You must manually configure all port options. Now have a look in /etc/apf/conf.apf # The installation path of APF; this can be changed but it is not recommended. INSTALL_PATH="/etc/apf" # Untrusted Network interface(s); all traffic on defined interface will be # subject to all firewall rules. This should be your internet exposed # interfaces. Only one interface is accepted for each value. IFACE_IN="eth0" IFACE_OUT="eth0" # Trusted Network interface(s); all traffic on defined interface(s) will by-pass # ALL firewall rules, format is white space or comma separated list. IFACE_TRUSTED="eth0" # This option will allow for all status events to be displayed in real time on # the console as you use the firewall. Typically, APF used to operate silent # with all logging piped to $LOG_APF. The use of this option will not disable # the standard log file displayed by apf --status but rather compliment it. SET_VERBOSE="1" Let us explain some of the important parameters which are important in this configuration file IFACE_IN=”eth0? IFACE_OUT=”eth0? Interface in and interface out define which interface you will be using for firewall as inbound and outbound DEVEL_MODE=”1? Keep Developer mode as 1 IG_TCP_CPORTS Define allowed TCP ports IG_UDP_CPORTS Define allowed UDP ports Command Examples To start firewall : # apf -s To stop firewall # apf -f Output : apf(7480): {glob} flushing & zeroing chain policies apf(7480): {glob} firewall offline To restart firewall : # apf -r To dump current status of firewall on terminal : # apf -st To deny some host : # apf -a 192.168.1.1 It will add IP ADDR to trusted address and entries goes to /etc/apf/allow_hosts.rules # apf -d 192.168.1.1 Above command will add IP ADDR to deny, entries goes to /etc/apf/deny_hosts.rules # apf -u 192.168.1.1 Remove entries either from trsuted or from deny hosts rules Now your firewall is ready to work in an easy to use and deploy manner. Source How to configure APF Firewall with ubuntu 15.10 | Unixmen
  10. Când dore?ti Îmi po?i las num?rul t?u de fix,?i i?i explica am?nun?it de ce pl?te?ti asa mult.
  11. @Reebock ,agent door to door ? dac? da,i?i în?eleg frustrarea.
  12. Ciudata treaba. eu lucrez la Telekom,si nu vad cum îmi po?i tu vinde mie credit în valoare de 20$ la pre? de 10$ Ps : A?tept un Pm cu o explica?ie favorabila dac? este posibil,in schimbul c?ruia i?i voi las? un feedback.
  13. Salut @UnUser nu,nu se poate :)doar dac? comanzi acas? la un prieten,?i ii dai o bere prietenului sa nu spun? nim?nui.
  14. Just another Simple static analysis tool to find bugs like a grep unix command, at mosca have a modules, that was call egg, each egg is a simple config to find bug at especific language like PHP,Ruby,ASP etc... Example of egg config at directory "egg", If Mosca read a line with vunerability of egg in source code, then, mosca have alert about vulnerability and save at logs. Download here : https://github.com/CoolerVoid/Mosca
  15. Salut @Massaro ,la mine merge.nu cred ca a expirat linku-ul
  16. Da,e bun,dar nu are flash :)Faci poze numai ziua.
  17. Salut ,si bine ai venit @dagisar
  18. Salut @wikedx cite?te aici,si poate g?se?ti unul pe m?sura Care este smartphone-ul cu cea mai bun? camer? foto Ps :Mai c?uta?i ?i pe fratele Google ca este gratis.
  19. Ok.ti-am scris asear? pe google :)am mai încercat cu alte chestii,dar nimic pana acum
  20. Salut @galante r?mâne decodat
×
×
  • Create New...