-
Posts
3206 -
Joined
-
Days Won
87
Everything posted by Fi8sVrs
-
Inurl din pacate nu am pe ce lucra mometan, sau insite: Edit, il gasesc oricum Edit2: hahaha ne transmite sarbatori fericite Edit3: pe 1 si 8 sunt ale lor cu ghioceii vietii, pe cand iesim la baut?
-
Toti comentatori, postati solutia, numai faceti troll
-
Gasiti ultimele 3 caractere ce lipsesc din url si primiti,, tricouri, sepci, etc: https://youtu.be/cZ4QYk3N ??? Succes Edit (era sa uit) rezolvarea prin pm Solvers: .wHoIS . ...
-
E clean bro, doar yandex il gaseste https://www.virustotal.com/#/url/83df1d8ad9301ed2435d010426ad9daa7e8a43bbaaa99dec291ea6a449e57dff/detection
-
Produse pt bebelusi, biberoane etc... Edit, si in spot-uri sunt utilizate
-
Stiu man, era pamflet Edit// ideea este, nu arunca nimeni in aer cum vor ei, cheile le detin numai capitanii
-
Sunt pt teste post hunting On:trimite-mi pm cu screenshot, please, pare cunoscut
-
CVE-2018-10933 libssh authentication bypass, a vulnerable Docker container that listens on port 2222 for exploitation. A basic proof-of-concept libssh patch included in the container to bypass auth. To login use the default "myuser" / "mypassword" from libssh. A patch is applied to a copy of libssh in the Docker container which injects a SSH2_MSG_USERAUTH_SUCCESS packet during any authentication (keyboard-interactive / pubkey / gss-api etc.) attempt and sets the client side state to proceed. The included server has been patched from example code to allow exploitation to succeed. ./build.sh ./run.sh ssh -l myuser -p 2222 localhost A patched exploit-libssh-0.8.3 and vulnerable sshd are available in the container for testing purposes. The "ssh-client" will successfully bypass authentication but is unable to spawn a shell against the default example server due to additional authentication checks in the server code. [root@305b48cb932e ]# cd /root/exploit-libssh-0.8.3/build/examples [root@305b48cb932e examples]# ./ssh-client -l root 127.0.0.1 The server is unknown. Do you trust the host key (yes/no)? SHA256:Mg6j2yHWMsRe56ABhAYjLIJK9yD2N3lGQAl3EfGqP7w yes This new key will be written on disk for further usage. do you agree ? yes Requesting shell : Channel request shell failed [root@305b48cb932e examples]# Source
-
NOTE: This tool has been re-written to run on Kali (2018.1) DEPENDENCIES: apt-get install qt4-dev-tools TODO: Add a updater for the tool. Add a WPS tab + support for WPS cracking (Reaver / Bully, or support for both) Consider renaming the project? Change deprecated "iwconfig" with the use of "iw" Consider adding "hashcat" GPU cracking option. WPA handshake capture is slow, considering enhancement to it. wifite2 got a VERY FAST handshake capturing method, consider using that code. Fix new graphics. LAUNCH: To launch the program use: $ python gerix.py Enjoy! NOTE: For copy and paste in xterm windows you can use the shortcuts CTRL-INS and SHIFT-INS. In alternative, you can select the text with the mouse, and use the third button of the mouse to paste it. On a laptop you can emulate the third button pressing the first and the second button together. Source: https://github.com/kimocoder/gerix-wifi-cracker/blob/master/README.md
-
- 1
-
Postezi in gunoaie gunoierule, acum am observat, nu mai face up (post hunting) 13h de atunci, sunt obosit de la conf
-
E analog si digital, asta e aismen sigur, bashed
-
WPML, a module that allows running fully multilingual websites with WordPress, making it easy to translate WordPress pages, posts, tags, categories and themes was recently hacked by an unhappy employee. According to this page: https://wpml.org/home/about-us/, WPML is running on more than 600 000 websites. There are almost 1 million compromised accounts on the WPML website. Below you can see a message that was sent to all WPML clients in 20 January 2019. recommend that everyone who has accounts on WPML.com should change urgently his / her password. At this moment the wordpress wpml plugins are not affected by this hack, but your account data from WPML is compromised. If you are using the same password on other websites we recommend to set a different password there too. Make sure to update all your WordPress plugins in order to prevent upcoming plugin hacks. Via http://www.hackingnews.com/breaking-news/wpml-org-website-was-hacked-what-you-need-to-know/
-
In 7h incepe conferinta, pt cine este interesat Url: https://staysafeonline.org/dpd19-live/
-
- 1
-
Sunt kituri la 38, $40 canadieni, depinde.. //am gasit kit pi3 b+ la $80 ca, depinde ce xauti
-
VC4CL is an implementation of the OpenCL 1.2 standard for the VideoCore IV GPU (found in all Raspberry Pi models). The implementation consists of: The VC4CL OpenCL runtime library, running on the host CPU to compile, run and interact with OpenCL kernels. The VC4C compiler, converting OpenCL kernels into machine code. This compiler also provides an implementation of the OpenCL built-in functions. The VC4CLStdLib, the platform-specific implementation of the OpenCL C standard library, is linked in with the kernel by VC4C Source: https://github.com/doe300/VC4CL/blob/master/Readme.md
-
- 1
-
https://www.instructables.com/id/20-Portable-Raspberry-Pi-Game-Console/ Pentru Raspberry ieftin, filtreaza pret crescator
-
In most organisations using Active Directory and Exchange, Exchange servers have such high privileges that being an Administrator on an Exchange server is enough to escalate to Domain Admin. Recently I came across a blog from the ZDI, in which they detail a way to let Exchange authenticate to attackers using NTLM over HTTP. This can be combined with an NTLM relay attack to escalate from any user with a mailbox to Domain Admin in probably 90% of the organisations I’ve seen that use Exchange. This attack is possible by default and while no patches are available at the point of writing, there are mitigations that can be applied to prevent this privilege escalation. This blog details the attack, some of the more technical details and mitigations, as well as releasing a proof-of-concept tool for this attack which I’ve dubbed “PrivExchange”. Read more s-ar incadra la tutoriale, cautati sursa dupa titlu, ceva cu .io Edit: https://dirkjanm.io/abusing-exchange-one-api-call-away-from-domain-admin/
-
- 2
-
This tool was created during our research at Checkpoint Software Technologies on Whatsapp Protocol. Here is the link to our blog post: https://research.checkpoint.com/fakesapp-a-vulnerability-in-whatsapp/ The Extension: Source: https://github.com/romanzaikin/BurpExtension-WhatsApp-Decryption-CheckPoint
-
- 2
-
2014 tc
-
Ajuta-te singur
-
Doh, ramane indexat, in cal il pierzi ramane, doh Eu mi-am gasit notebook-ul pe olx
-
Government shutdown impacts .gov websites, puts Americans in danger
Fi8sVrs replied to jreister's topic in Stiri securitate
Vezi ce scrie acolo, le-am extras cu ocr, afganii -
Government shutdown impacts .gov websites, puts Americans in danger
Fi8sVrs replied to jreister's topic in Stiri securitate
@QuoVadis