Jump to content

gigiRoman

Active Members
  • Content Count

    407
  • Joined

  • Last visited

  • Days Won

    14

Everything posted by gigiRoman

  1. gigiRoman

    Fun stuff

    Am lucrat la un moment dat cu o placa audio motu. Cert e ca driverul asio lucreaza la nivelul kernelului de windows si de acolo instabilitatea.
  2. Am gasit o posibila solutie: In cazul meu unele contacte au preluat poza si nicknameul de skype. La app permisions poti vizualiza ce aplicatii au acces la contacte. Desi in contactele de google imi disparuse de mult timp un fost coleg, acum am realizat ca a aparut iar cu poza de skype si cu nr de telefon. Bafta!
  3. gigiRoman

    [RST] SSH Brute Force Tool [Python]

    https://stackoverflow.com/questions/19152578/no-handlers-could-be-found-for-logger-paramiko
  4. Paradisul terestru a fost abandonat exact în momentul când a devenit realizabil. Sursa: https://www.google.ro/url?sa=t&source=web&rct=j&url=https://foaienationala.files.wordpress.com/2009/08/1984_romana.pdf&ved=2ahUKEwjTrcfiudrdAhXQmLQKHXlgCnEQFjAAegQIBhAB&usg=AOvVaw218MXCK6TiB13y_zyThz8T
  5. Poate are aplicatia de telefon default pe asta: "Truecaller - Caller ID & Block". Oricum e interesant de generat o agenda cu toate nr din ro si de scrapuit numele si pozele.
  6. Spider are dreptate. E posibil ca ransomwareul sa fie folosit de niste script kiddies care nici nu stiu sa il foloseasca. E de la niste indieni clocici. Mergeti pe firul epic,identificati procesul care a facut criptarea si incercati sa ii dati momeala, gen sa mai copiati alte fisiere sa vedeti daca incearca sa le cripteze. Teoretic ar trebui sa fie o singura cheie de criptare pt tot pcul. Si atunci cand se apuca sa cripteze faceti un process dump sa prindeti cheia din ram. Acum nu stiu daca functioneaza, sunt ipoteze... PS: CE AM MAI GASIT ULTERIOR, DECAT DELOC E BINE SI ASA: https://sensorstechforum.com/coded-file-virus-remove-restore-files/ https://quickremovevirus.com/how-can-i-remove-decoder_masterindia-com-virus-completely/ http://ru.pcviruscare.com/blog/удалите-decoder_masterindia-com-помощь-по-удалению-вредо Bafta!
  7. gigiRoman

    Python offensive

    Acum totul e corect politic @MrGrj Python joins movement to dump 'offensive' master, slave terms Python creator Guido van Rossum retired as "benevolent dictator for life" in July, but like Michael Corleone in The Godfather III, he's been pulled back in to resolve a debate about politically incorrect language. Like other open source communities, Python's minders have been asked whether they really want to continue using … Sursa: https://forums.theregister.co.uk/forum/6/2018/09/11/python_purges_master_and_slave_in_political_pogrom/#c_3610915 A quiet debate has developed for years in the coding community, forcing programmers to ask whether the terms "master" and "slave" are not insensitive. Now Python, one of the world's most popular programming languages, has abandoned the terminology – and not everyone is happy with it. Master / Slave is generally used in hardware, architecture and coding to refer to a device, database or process that controls another. For more than a decade, there has been some concern that the terms are offensive because of their relationship to the institution of slavery. Last week, a developer named Victo Stinner published four pull requests asking the Python community to consider changing the terms Master / Slave with something like Parent / Worker. "For reasons of diversity, it would be nice to try to avoid the" master "and" slave "terminology that can be associated with slavery," he wrote to explain his thinking. This is the internet, so people have opinions. Some people did not agree with the proposal in measured terms and simply did not think it was necessary. Others have launched on anti-diversity screeds and are predictably talking about censorship and mental control. "Seeing all the PC / SJW absurdities around me, I'm afraid this may be the beginning of Python becoming PCython," wrote a developer. Another commentator decided to take things literally, saying: "As far as I can [ sic ] I say that there is not a single instance where documents use" master "as a reference to human slavery or where use could be seen implicating an endorsement of that notion. " Someone else claimed that the terms are indeed positive in the BDSM community. "You want to support diversity, so why are you discriminating against that subculture?" They asked. And, of course, Reddit turned into a cesspool while the users watched it all go down. It was all enough to involve Guido van Rossum, the creator of Python. Van Rossum officially retired in July, leaving the community to defend itself when it comes to governance, but the quarrels have pulled it back to lay the law. "I'm closing this now," he wrote. His final decision was to accept three of Stinner's four requests. In his view, "the fourth should not be united because it reflects the underlying terminology of UNIX ptys". So you decide that Python 3.8 will change the term "slave" to "worker" or "helper" and "master process" to "parent process". Python was named the most popular programming language in the IEEE Spectrum world in the past year, so this change is great for the programming community. Following is the guide by Drupal and Django. If you think this is just another symptom of a desire out of control of being politically correct or not, it's just a fact that languages change over time. Programmers should know it better than anyone else. Sursa: https://aus.remonews.com/python-programming-language-ditches-master-slave-terms-pissing-off-some/ Fi-r-ar! Cum traducea Irina Margareta Nistor tot: "la naiba!"
  8. gigiRoman

    Ghost pack

    https://github.com/GhostPack A collection of security related toolsets. Popular repositories 261 GhostPack/Seatbelt 245 GhostPack/SafetyKatz 138 GhostPack/SharpRoast 133 GhostPack/SharpUp 132 GhostPack/SharpDump 132 GhostPack/SharpWMI
  9. gigiRoman

    Wtf Linus Torvalds ????

    Linus Torvalds takes a break from Linux to learn empathy ????? https://www.google.ro/search?q=linus+torvalds&client=ms-android-google&prmd=inv&source=lnt&tbs=qdr:w&sa=X&ved=0ahUKEwjMsuSh2sjdAhVwqIsKHeqVA_wQpwUIHA&biw=412&bih=604&dpr=2.63
  10. gigiRoman

    Wtf Linus Torvalds ????

    @Matthew Asta nu stiam. Site-ul l-am gasit astazi. De unde stii de site-ul asta? Bafta!
  11. gigiRoman

    Wtf Linus Torvalds ????

    Inteligenta emotionala... Mai multe detalii pe site in romana: https://www.incorectpolitic.com/linux-renunta-la-meritocratie/
  12. gigiRoman

    Wtf Linus Torvalds ????

    The culture around Linux will now slowly be replaced by the lame suits of HR, the harpy girl-powered programmers overhearing dork jokes at conferences, gender neutral language, prim and proper mailing list language and the whole works. As an old developer I've been in too many places when this culture takes over. It called "corporate world". Everything slows down 10x. Software expenses increases 10x, bugs abound, computers crawl. Meetings takes most of the day. Ah, you talk about your family and your little dog in the meetings, of course. Feelings are important. It's the natural evolution. When men colonize an environment, just then, women arrive, and womanize the environment. Their social structure is very different than men's. But make no mistake, those people are savages, and will ostracize and force you to resign much more violently that the apparently 'violent' aggressive male culture. Then, the bravest men abandon the place and explore other lands. It's time to explore other lands. ≠============== ..and whats funny, even Soviets weren't retarded enough o abolish meritocracy in science and tech fields, it was only in economy - private enterprise was outlawed and you all know the results - USSR somehow kept up with the capitalist west in technology in many fields, yet failed miserably in economy and wealth/life quality abolishing meritocracy in tech would be a complete disaster but here we are ================== Sursa: https://boards.4chan.org/pol/thread/186016573
  13. gigiRoman

    caut programator, platesc prin btc

    Iti trebuie niste proxy prin care sa treci requesturile.
  14. gigiRoman

    Carti Alex david.

    Chiar ca: daca stai sa citesti cartile astea nu treci de laba. Ca tot suntem pe security si cum @aelius a amintit de sven hassel luati de aici:https://www.google.ro/url?sa=t&source=web&rct=j&url=http://index-of.es/Hack/Cyber%20Warfare.pdf&ved=2ahUKEwjqmc3_267dAhXDCewKHVlDAS4QFjACegQICBAB&usg=AOvVaw1kZZS_l68DXfygk0nfH_Hf Descriere: Description Product description Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists. This book provides concrete examples and real-world guidance on how to identify and defend a network against malicious attacks. It probes relevant technical and factual information from an insider's point of view, as well as the ethics, laws and consequences of cyber war and how computer criminal law may change as a result. Logical, physical, and psychological weapons used in cyber warfare are discussed. This text will appeal to information security practitioners, network security administrators, computer system administrators, and security analysts. Provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks Dives deeply into relevant technical and factual information from an insider's point of view Details the ethics, laws and consequences of cyber war and how computer criminal law may change as a result Review "A fifth domain of war has been added to land, air, sea and space: cyber. Malware capable of taking a nuclear program offline was science fiction 5 years ago: Stuxnet demonstrates that information security is now a matter of national security. This timely and necessary book provides an assessment of the current state of cyber warfare, and more importantly, where the conflict is heading. Highly recommended for information security professionals."--Eric Conrad, Lead Author, CISSP Study Guide, President, Backshore Communications From the Back Cover Cyber Warfare explores the battlefields, participants and the tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists. Every one of our systems is under attack from multiple vectors―our defenses must be ready all the time and our alert systems must detect the threats every time. About the Author Jason Andress (CISSP, ISSAP, CISM, GPEN) is a seasoned security professional with a depth of experience in both the academic and business worlds. Presently he carries out information security oversight duties, performing penetration testing, risk assessment, and compliance functions to ensure that critical assets are protected. Jason has taught undergraduate and graduate security courses since 2005 and holds a doctorate in computer science, researching in the area of data protection. He has authored several publications and books, writing on topics including data security, network security, penetration testing, and digital forensics. Steve Winterfeld (CISSP, PMP, SANS GSEC, Six Sigma) has a strong technical and leadership background in Cybersecurity, Military Intelligence, Certification & Accreditation (C&A), Simulations and Project Management.
  15. Am avut si eu un din asta acum 4 ani. I l-am dat lui taica-miu si in 2 luni i-a spart touch-ul. El l-a schimbat cu 100 de lei si merge si astazi. Daca esti mai priceput poti comanda piese de la gsmnet, ca sunt ieftine (cat o masa la unele cantine). Uite link: https://www.gsmnet.ro/cauta/Touchscreen lumia 520 Multa sanatate! Ps: dc lcd e intact trebuie sa iei doar touchul, care e un plastic transparent cu niste sarme.
  16. gigiRoman

    E vreo problema cu Huawei Mate 9 ?

    Atunci ia-ti un nokia 1020 cu camera de 41 mega pixeli la 400 lei de pe olx.
  17. gigiRoman

    Ubports

    Salut, A folosit careva ubuntu touch? https://kriscode.blogspot.com/2017/12/ssh-and-ubuntu-touch.html?m=1 https://ubports.com/blog/ubports-blog-1/post/terminal-chapter-1-113 Pare o alternativa interesanta la android. Am avut nethunter, dar nu e cum ma asteptam. Bafta!
  18. gigiRoman

    Ubports

    https://ibb.co/gU1Dsp https://ibb.co/jAH8Q9 https://ibb.co/g5BeXp https://ibb.co/gjMeXp https://ibb.co/cnXKXp https://ibb.co/cMi4yU https://ibb.co/kjT4yU https://ibb.co/iaqHJU https://ibb.co/imdRCp https://ibb.co/gixKXp https://ibb.co/eTBDsp Cam trista experienta. Nu este stabil. Se restarteaza din senin. Nu poti sa montezi stick ntfs. Sunt mult mai putine pachete disponibile in apt. Sistemul de operare are rezervati din start 16 gb. Intr-o zi se scurge 50% din baterie daca nu e folosit. Poate in versiunea 18.04 vor schimba ceva. Momentan nu ai ce sa faci cu telefonul in conditiile astea. PS: testele au fost facute pe versiunea stabila 15.04. Incepand cu 16(instabila) dau drumul la libertine container prin care poti rula aplicatii de desktop pe telefon. Exista un demo in care se ruleaza o aplicatie de calc: vedem ce va fi.
  19. Sursa: https://github.com/FICS/atcmd ATtention Spanned A collection of scripts used to automatically extract Android firmware images and process them for AT commands. These scripts may be modified for other tasks, such as extracting specific files or merely extracting base filesystem images. The scripts are divided into directories based on their function. Refer to the READMEs contained in each directory for usage instructions and more detailed information. extract: contains code for extracting AT commands from Android firmware images interact: contains code to spawn a shell for interactively sending AT commands to phones and observing the returned responses send: contains code for automated testing of a large number of AT commands on a physical phone, with all responses recorded in a log file usbswitch: contains code for switching a device to an alternate USB configuration and enabling the modem interface For questions contact the first, second, or third author via email. If you base any academic work off of ATCMD, please cite our paper: @inproceedings {tian18, author = {Dave (Jing) Tian and Grant Hernandez and Joseph I. Choi and Vanessa Frost and Christie Ruales and Patrick Traynor and Hayawardh Vijayakumar and Lee Harrison and Amir Rahmati and Michael Grace and Kevin R. B. Butler}, title = {ATtention Spanned: Comprehensive Vulnerability Analysis of {AT} Commands within the Android Ecosystem}, booktitle = {27th {USENIX} Security Symposium ({USENIX} Security 18)}, year = {2018}, address = {Baltimore, MD}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/tian}, publisher = {{USENIX} Association}, }
  20. gigiRoman

    Salutare

    Mi-au amintit de puterea panterei: https://www.mariciu.ro/puterea-panterei/
  21. gigiRoman

    Offensive security

    La oferta: Titlurile: https://m.imgur.com/a/xYtGaNE Documentele: https://wetransfer.com/downloads/9263b7163faf2142c7781dc08b81566420180827150434/734a80762464fcd8fcb7a14ba157359620180827150434/ec6c68 Succes
  22. gigiRoman

    Oare cu ce se ocupa unii ?

    Baietii cu ochii albastri nu sunt nicodata obositi.
  23. gigiRoman

    Senior Application Security Tester (Pentest)

    Ceh e mai pentru entry level, parca e facut de niste indieni. Cissp e mai pentru experimentati. Din ce stiu la cissp sunt intrebari practice, situatii din care sa reiasa nivelul de experienta. La ceh e intrebarea si raspunsul. Sa ma contraziceti daca nu e asa. http://www.techexams.net/forums/isc-sscp-cissp/127772-multiple-certification-difficulty-ranking.html
  24. gigiRoman

    Oare cu ce se ocupa unii ?

    La ce banca ai fost? In alta ordine de idei, stiu pe cineva contabil si banii multi nu vin din idei marete, ci din aceleasi cacaturi. La firma erau clienti care aveau firme de paza, comert cu masini, marketing, consultanta etc. Unele afaceri prolifereaza orice ar fi.
  25. Practical Malware Analysis Starter Kit Package last updated: 2016-05-14 This package contains most of the software referenced in Practical Malware Analysis. Some of the links have broken over time, some companies have folded or been bought. I’ve done what I can to compile it all in one place for my own convenience and I figured I’d share it. It contains: MD5DEEP 4.4 and related tools (sha1deep, hashdeep, whirlpooldeep, etc) and 64-bit equivalents. WinMD5Free v1.20 PEiD v0.95 with KANAL plugin Strings v2.52 upx 3.91 PEview v0.9.9 Resource Hacker v4.2.5 PEBrowse Professional v10.1.4 PEBrowse64 Professional v6.3.1 PE Explorer 1.99 R6 (Trial) Process Monitor (procmon) v3.2 Process Explorer (procexp) v16.10 Regshot v1.9.0 ApateDNS v1.0 Netcat (nc) 1.11 and 64-bit build Wireshark v2.0.3 FakeNet 1.0c (INetSim alternative for Windows) Combined Volume Set of Intel® 64 and IA-32 Architectures Software Developer’s Manuals IDA Pro Free v5.0 with FindCrypt plugin, IDA Entropy Plugin Autoruns v13.51 and autorunsc OllyDbg v1.10 and v2.01d OllyDump Plugin WinDbg x86 and x64 v6.11.1.404 Immunity Debugger (ImmDbg) v1.85 SoftICE 4.05 for w98 and NT/XP (SEE FOOTER) SoftIceNT 4.2.7 (from 2.7 Driver Studio build) for XP (SEE FOOTER) OSR Driver Loader v3.0 Poison Ivy RAT 2.3.2 (Password is “malware” with no quotes, if the exe is eaten by your AV) pwdump6 (as PwDump.exe) pwdump7 Pass-The-Hash Toolkit v1.4 Metasploit Framework v4.11.7 PyCrypto (Requires Python 2.7) Snort 2.9.8.2 ScoopyNG v1.0 Mandiant Red Curtain 1.0 ASPack 2.39 (Trial) PETite v2.4 WinUPack v0.39 Final Themida 2.4.1.0 (Trial) shellcode_launcher.exe (Gone from practicalmalwareanalysis.com) Bochs 2.6.8 Burp Suite 1.7.03 CaptureBAT 2.0.0-5574 Cuckoo 2.0-RC1 (Requires Python) CFF Explorer (As Explorer Suite 4) WinHex 18.8.0.0 Import REConstructor (ImpREC) 1.7e LordPE 1.41 Deluxe Malcode Analyst Pack Memoryze 3.0 OfficeMalScanner 0.5 Zynamics BinDiff 4.20 (Key provided by Zynamics) pdfid.py and pdf-parser.py (Requires Python, obviously) Sandboxie v5.10 Buster Sandbox Analyzer v1.88 Update 4 TCPView v3.05 The Sleuth Kit 4.2.0 for Windows VERA v0.3 Volatility 2.5 Yara v1.7.1 x86 and x64 Docs and Licenses when given are in their own folders. I recommend you add the “Portable Binaries” folder to your Windows PATH. WARNING: This is not a toy. There are malicious code samples provided in the labs. Poison Ivy is real C2 malware. Use extreme caution with this software. COPYRIGHT: I do not claim copyright to any of the software packaged. All software provided was freely available online, and included in one place for your convenience. PASSWORD: The password to open the zip is “malware” with no quotes. You will likely need to make exceptions in your AV for the folder you place and extract this package. REGARDING SOFTICE: The provided build of SoftICE is a pirated scene release from 2000. I would consider it abandonware, as it has changed hands from NuMega to Compuware and again to Micro Focus, who has not released or updated the software. It has not received an update nor been available for purchase in ten years. If you are uncomfortable having this software, simply delete SoftICE427installnt.exe, SI405w9x.exe, and the SoftICE 4.05 NT and XP folder from Setup Binaries. It was exceedingly difficult to find the Windows XP version so I have included it for posterity. REGARDING LORDPE: LordPE looks like a pirated scene release but was actually created as a scene tool. Download: zip or torrent. Sursa: https://bluesoul.me/practical-malware-analysis-starter-kit/
×