Jump to content

ThaiFight

Moderators
  • Posts

    426
  • Joined

  • Last visited

  • Days Won

    6

Everything posted by ThaiFight

  1. La Multi Ani !
  2. Ai b?ut prea mult )treze?te-te in pu..mea si nu mai posta aiurea.
  3. @wHoIS ,totu?i e?ti IT-ist sau manelist ? Da eu sunt mare, mare, Faraon este un jeg de melodie
  4. Pe ce lume tr?ie?ti ?
  5. @rectisor Pentru a depune cât mai putin efort,urm?re?te-?i vecinul când pleac? de acas?,?i sparge-i u?a ca ?ie mai u?or
  6. Doresc tuturor membrilor acestui forum,ca s?rb?torile de iarna sa va aduc? s?n?tate,fericire ,împlinirea tuturor dorin?elor ?i s?n?tate celor dragi. La multi ani !
  7. Roag?-l pe Mos Cr?ciun.
  8. Ai zis bine @Cyb3rGhost dar di p?cate nu cred ca îl ?tie folosii nici pe ala
  9. Contents : *Wordlists - Comprises of password lists, username lists and subdomains *Web Service finder - Finds web services of a list of IPs and also returns any URL rewrites *Gpprefdecrypt.* - Decrypt the password of local users added via Windows 2008 Group Policy Preferences. *rdns.sh - Runs through a file of line seperated IPs and prints if there is a reverse DNS set or not. *grouppolicypwn.sh - Enter domain user creds (doesnt need to be priv) and wil lcommunicated with the domain controllers and pull any stored CPASS from group policies and decode to plain text. Useful for instant Domain Admin! *privchecker.sh - Very young script that simply checks DCenum to a list of users to find their group access, indicated any privilaged users, this list can be edited. *NessusParserSummary.py - Parses Nessus results to give a summary breakdown of findings plus a host count next to each. *NessusParserBreakdown.py- Parses Nessus results to give a host based breakdown of findings plus the port(protocol) and CVSS rating. *NmapParser.py - Parses raw NMAP results (or .nmap) and will create individual .csv files for each host with a breakdown of ports, service version, protocol and port status. *NmapPortCount.py - Parses raw NMAP results (or .nmap) and will generate a single CSV with a list of Hosts, a count of how many open/closed/filtered ports it has, the OS detection and ICMP response. *Plesk-creds-gatherer.sh - Used on older versions of plesk (before the encription came in) that allows you to pull out all the credentials form the databases using a nice Bash menu *BashScriptTemplate.sh - Handy boiler plate template fro use in new scripts. *PythonScriptTemplate.py - Handy boiler plate template fro use in new scripts. *ipexplode.pl - Simply expands CIDRs and prints the ips in a list, handy for when you need a list of IPs and not a CIDR *LinEsc.sh - Linux escilation script. This will test common methods of gaining root access or show potential areas such as sticky perms that can allow manual testing for root escilation *gxfr.py - GXFR replicates dns zone transfers by enumerating subdomains using advanced search engine queries and conducting dns lookups. *knock.sh - Simple script used to test/perform port knocking. *sslscan-split-file.py - Used to split a large SSLScan results file into individual SSLScan results. *TestSSLServer.jar - Similar tool to SSLScan but with different output. *wiffy.sh - Wiffy hacking tool, encapsulated in a single Bash script. Download : https://github.com/leonteale/pentestpackage
  10. Introduction Advanced Policy Firewall or APF is iptable based firewall system which is a free distribution, this firewall is designed to meet today’s security based essential needs.The firewall is designed to be very informative and present the user with an easy to use follow process. Features Highlight The filters perfromed by APF can be catagourised in three parts static rule based policy. It define how firewall should handle certain traffic in specific conditions while giving access to certain port or adding some ip address as trusted one. Connection based stateful policy Firewall will identify valid/legitimated packets from the different types of connections and will allow only valid connections which are allowed in firewall rules and other will be rejected. Sanity based policy Can identify network attacks by screening or scrutinizing packets, it will discard and log any data which is considered as inappropriate. Installation It is recommended to have at least 2 LAN cards, 4 GB RAM, dual core processor and 1 GB free disk space to dedicate your system as APF firewall. Update Ubuntu 15.10 # apt-get update Download package : # wget http://www.rfxn.com/downloads/apf-current.tar.gz Extract package : # tar -xvf apf-current.tar.gz Extract and install package : # cd apf-9.7-2/ # ./install.sh Sample output : Installing APF 9.7-2: Completed. Installation Details: Install path: /etc/apf/ Config path: /etc/apf/conf.apf Executable path: /usr/local/sbin/apf Other Details: Listening TCP ports: 53,631 Listening UDP ports: 53,68,631,5353,23566,47956 Note: These ports are not auto-configured; they are simply presented for information purposes. You must manually configure all port options. Now have a look in /etc/apf/conf.apf # The installation path of APF; this can be changed but it is not recommended. INSTALL_PATH="/etc/apf" # Untrusted Network interface(s); all traffic on defined interface will be # subject to all firewall rules. This should be your internet exposed # interfaces. Only one interface is accepted for each value. IFACE_IN="eth0" IFACE_OUT="eth0" # Trusted Network interface(s); all traffic on defined interface(s) will by-pass # ALL firewall rules, format is white space or comma separated list. IFACE_TRUSTED="eth0" # This option will allow for all status events to be displayed in real time on # the console as you use the firewall. Typically, APF used to operate silent # with all logging piped to $LOG_APF. The use of this option will not disable # the standard log file displayed by apf --status but rather compliment it. SET_VERBOSE="1" Let us explain some of the important parameters which are important in this configuration file IFACE_IN=”eth0? IFACE_OUT=”eth0? Interface in and interface out define which interface you will be using for firewall as inbound and outbound DEVEL_MODE=”1? Keep Developer mode as 1 IG_TCP_CPORTS Define allowed TCP ports IG_UDP_CPORTS Define allowed UDP ports Command Examples To start firewall : # apf -s To stop firewall # apf -f Output : apf(7480): {glob} flushing & zeroing chain policies apf(7480): {glob} firewall offline To restart firewall : # apf -r To dump current status of firewall on terminal : # apf -st To deny some host : # apf -a 192.168.1.1 It will add IP ADDR to trusted address and entries goes to /etc/apf/allow_hosts.rules # apf -d 192.168.1.1 Above command will add IP ADDR to deny, entries goes to /etc/apf/deny_hosts.rules # apf -u 192.168.1.1 Remove entries either from trsuted or from deny hosts rules Now your firewall is ready to work in an easy to use and deploy manner. Source How to configure APF Firewall with ubuntu 15.10 | Unixmen
  11. Salut,si bine ai venit @sebulba
  12. Când dore?ti Îmi po?i las num?rul t?u de fix,?i i?i explica am?nun?it de ce pl?te?ti asa mult.
  13. @Reebock ,agent door to door ? dac? da,i?i în?eleg frustrarea.
  14. Ciudata treaba. eu lucrez la Telekom,si nu vad cum îmi po?i tu vinde mie credit în valoare de 20$ la pre? de 10$ Ps : A?tept un Pm cu o explica?ie favorabila dac? este posibil,in schimbul c?ruia i?i voi las? un feedback.
  15. Salut @UnUser nu,nu se poate :)doar dac? comanzi acas? la un prieten,?i ii dai o bere prietenului sa nu spun? nim?nui.
  16. Just another Simple static analysis tool to find bugs like a grep unix command, at mosca have a modules, that was call egg, each egg is a simple config to find bug at especific language like PHP,Ruby,ASP etc... Example of egg config at directory "egg", If Mosca read a line with vunerability of egg in source code, then, mosca have alert about vulnerability and save at logs. Download here : https://github.com/CoolerVoid/Mosca
  17. Salut @Massaro ,la mine merge.nu cred ca a expirat linku-ul
  18. Da,e bun,dar nu are flash :)Faci poze numai ziua.
  19. Salut ,si bine ai venit @dagisar
  20. Salut @wikedx cite?te aici,si poate g?se?ti unul pe m?sura Care este smartphone-ul cu cea mai bun? camer? foto Ps :Mai c?uta?i ?i pe fratele Google ca este gratis.
  21. Ok.ti-am scris asear? pe google :)am mai încercat cu alte chestii,dar nimic pana acum
  22. Salut @galante r?mâne decodat
  23. Cite?te regulamentul înainte de a deschide thread-uri
  24. exista,dar nu pentru cer?etori
  25. Nu avem asa ceva.Go to sleep
×
×
  • Create New...