Jump to content

QuoVadis

Active Members
  • Posts

    2713
  • Joined

  • Days Won

    192

Everything posted by QuoVadis

  1. "Athena" - like the related "Hera" system - provides remote beacon and loader capabilities on target computers running the Microsoft Windows operating system (from Windows XP to Windows 10). Once installed, the malware provides a beaconing capability (including configuration and task handling), the memory loading/unloading of malicious payloads for specific tasks and the delivery and retrieval of files to/from a specified directory on the target system. It allows the operator to configure settings during runtime (while the implant is on target) to customize it to an operation. Athena v1.0 User Guide Athena Technology Overview Athena (Design) Athena (Demo) Athena (Design/Engine) https://wikileaks.org/vault7/#Athena
  2. QuoVadis

    .

    @Iceman. ofera-le si niste vouchere KFC, sa vezi cum iti dublezi vanzarile..
  3. Cum au spus si cei de mai sus btc-ul se poate da prin tumblere specifice si nu ti-l mai gaseste nici dracu'. Sunt tot felul de variante si metode si daca depui nitel efort li se pierde urma. La lucru am primit atacuri masive si initial credeam ca sunt ransomware-uri dar unele sunt pdf-uri cu exploit-uri si altele sunt link-uri care atunci cand dai click un script iti downloadeaza tot ce ai salvat in browser: user, parole, cookies, etc. Ce e nasol e ca astfel de chestii vor da apa la moara pentru propaganda si legi stupide care nu au nici o treaba cu astfel de lucruri. Meanwhile, in Rromania..
  4. Probabil stii astea deja: pentru performanta foloseste nginx (daca nu o faci deja) si mai poti umbla la setarile de acolo. Apoi la la setarile de la db (my.cnf) putin tuning (depinde si ce db folosesti). Depinde si de setarile din php, mai ales opcache la care ii poti da disable si sa faci php-fpm on demand decat dinamic, etc. Apoi la wp, pe langa pluginuri, tema, etc. setarile din db unele pot capata putin tuning pentru performanta (ex: tabela wp_options are un default la autoload pus pe yes si poti verifica daca uneori dureaza prea mult sa-i adaugi un index la column, etc.).
  5. http://www.digi24.ro/stiri/externe/rusia/rusia-anunta-ca-doua-nave-s-au-ciocnit-in-marea-neagra-713724 Damn!
  6. QuoVadis

    Flood

    Ai incercat aici https://gloryholefoundation.com/ ? Ofera tool gratuit pentru ddos, e conectat la un botnet puternic.
  7. La anii aia (studentiei) sunt multi naivi, necopti la minte, din simplul fapt ca au fost tinuti pe palme de parinti care au dus greul si pentru ei. Aparuse pe net ceva studiu (nu stiu cat de credibil e) ca 2 milioane de romani sufera de depresie. Sa vedem ce urmeaza in anii urmatori din acest punct de vedere. Insa cert este ca realitatea ii va izbi rapid, fara mila. Putini se vor adapta, iar majoritatea... vor vota PSD.
  8. • The main objectives of a Zero-day attack are for hackers or attackers to be able steal sensitive information, legal documents, enterprises data, and other information. We have analyzed the lifecycle of Zero-day vulnerabilities and different detection methodologies. • In this paper, we propose a novel hybrid layered architecture framework for Zero-day attack detection and analysis in real-time, which is based on statistics, signatures, and behavior techniques. To enhance our architecture, we used an SVM approach in order to provide unsupervised learning and minimize false alarm detection capabilities. • In this research, we focus on integrating the anomaly detection and signature generation based methods. In a layered approach, layers are supposed to execute dedicated functionality in parallel. Parallel work of each layer improves the performance of our proposed approach. In this paper, we also present the different experimental comparisons we made between our approach and various standard parameters and our result shows a high detection rate of Zero-day attacks. Download: aHR0cHM6Ly93ZS50bC9ybzk0RElGYzBO
  9. https://argus-sec.com/remote-attack-bosch-drivelog-connector-dongle/ In summary, the following two vulnerabilities were found: An information leak in the authentication process between the Drivelog Connector Dongle and the Drivelog Connect smart phone application. Security holes in the message filter in the Drivelog Connector dongle. The information leak allowed us to quickly brute-force the secret PIN offline and connect to the dongle via Bluetooth. Once connected to the dongle, security holes in the message filter of the dongle enabled us to inject malicious messages into the vehicle CAN bus. In our research, we were able to turn off the engine of a moving car while within Bluetooth range. As troubling as that is, in a more general sense, since we can use the dongle to inject malicious messages into the CAN bus, we may have been able to manipulate other ECUs on the network. If an attacker were to implement this attack method in the wild, we estimate that he could cause physical effects on most vehicles on the road today. This post describes the basic setup and capabilities of the Drivelog dongle and its accompanying mobile app. We describe the research in the order in which it was carried out. That is, first we describe how we uncovered potential security holes in the message filter and then we describe how we uncovered the information leak in the authentication process between the dongle and the app. We then describe a complete attack flow.
  10. QuoVadis

    armata

    De unde apar creaturile astea... 'tu-va mamele alea proaste care nu v-o avortat!
  11. Sfatul meu este sa te limitezi la cat dai cu bata in balta pe aici... pentru ca e domeniu public si se face departamentul universitatii de rahat chiar daca esti un reprezentant indirect (student).
  12. Tocmai ma pregateam sa dau la muie la toti profesorii de acolo care te lasa sa faci astfel de chestii fara nici o etica de research. Insa m-am oprit apoi gandidu-ma ca ei poate nu stiu ce faci tu inca. Daca nu ai dat pe la cursurile de etica si epistemologie, da-ti 2 palme, vorbeste cu profesorii si apoi revino. Succes!
  13. @spider Pai daca tinerii frumosi si liberi au frecat menta in loc sa mearga la vot.. au votat cei de mai sus si pentru ei:
  14. http://www.digi24.ro/stiri/actualitate/social/asistatii-social-nu-vor-sa-munceasca-703542 Lehamite level 10..
  15. https://github.com/x0rz/EQGRP
  16. Da-i pm la @aelius , are o colectie intreaga de spargatori
  17. https://wikileaks.org/vault7/#Marble Framework Today, March 31st 2017, WikiLeaks releases Vault 7 "Marble" - 676 source code files for the CIA’s secret anti-forensic Marble Framework. https://wikileaks.org/vault7/#Dark Matter Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware. https://wikileaks.org/ciav7p1/ A series of leaks on the U.S. Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency.
  18. Daca vrei mocangeala vezi AWS si Google Cloud. Sau chiar https://www.alpharacks.com/myrack/cart.php?a=add&pid=231 unde ai la 3 lei / luna. Daca bagi in seama toti ... la ce te mai plangi aici?
  19. Ce servicii bre sa incerce lumea la tine tu-ti ma-ta aia grasa si coclita?! Ai gazduire de la un provider puscat (HostGator) care era ceva acum un deceniu si bagi burtologie ca esti specializat si pulencur la plural ("suntem specializati" - tu'va'n gat de specialisti ca daca va pun sa instalati un lamp nu aveti habar) - cine e tampit sa isi tina fisierele la un pitiponc de liceu? Doar altii la fel de pitiponci si la fel de cretini. Vii pe un forum unde marea majoritate au lucrat/lucreaza cu provideri adevarati si tu incerci sa faci gat ca ai merita sa fii bagat in seama. Mergi dracu' pe forumuri de metinari, "cantar straic" si alte cele si iti gasesti clienti (prosti).
  20. De ce si-ar incredinta cineva fisierele unui copil? Ar trebui sa fie ori prost ori sa umble cu balarii. So, intrebarea (retorica) este: de ce te-ai complica cu astfel de oameni? Daca nu aveti de lucru...
  21. Recomand http://psihiatrie-bucuresti.com/
  22. https://www.facebook.com/sectiapolitic/videos/401204223588550/?hc_ref=NEWSFEED Vi se da muie in direct, cu tupeu, cu jet puternic si cu nervi ca de ce nu inghititi tot: unde sunt tinerii? mai #rezista? #Rezistati pana ardeti iarasi de vii ca sobolanii in gauri!
  23. Uite astea 2 ce am gasit asa pe fuga. Mai adu-mi aminte saptamana viitoare si caut mai multe. https://www.amazon.co.uk/dp/B019OMDRXG/ Download: aHR0cHM6Ly93d3cuZHJvcGJveC5jb20vcy93a3BtMTd0NWYzbXU1bmIvRGlnaXRhbCUyMEZvcmVuc2ljcy56aXA/ZGw9MQ== https://www.amazon.co.uk/dp/B01986MFIG/ Download: aHR0cHM6Ly93d3cuZHJvcGJveC5jb20vcy84Z2xqMHdlMXZ2dWZmaHkvT3BlcmF0aW5nJTIwU3lzdGVtcyUyMEZvcmVuc2ljcy56aXA/ZGw9MQ== LE: dintr-o alta colectie, sa-mi zici daca iti "surad" vreuna din astea: Cyber Forensics - A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition ISBN: 9780849383281 Digital Forensics for Handheld Devices ISBN: 9781439898772 Machine Learning Forensics for Law Enforcement, Security, and Intelligence ISBN: 9781439860694 What Every Engineer Should Know About Cyber Security and Digital Forensics ISBN: 9781466564527 Multimedia Security - Watermarking, Steganography, and Forensics ISBN: 9781439873311
  24. Daca iti caut sa iti dau eBooks stai bine cu engleza? (sa nu imi pierd timpul degeaba)
×
×
  • Create New...