Jump to content

Fi8sVrs

Active Members
  • Posts

    3206
  • Joined

  • Days Won

    87

Posts posted by Fi8sVrs

  1. 1 hour ago, wHoIS said:

    Sa inteleg ca nu am pus solutia corecta?

     

    Tu ce solutie ai ?

    Inurl din pacate nu am pe ce lucra mometan, sau insite:

     

    Edit, il gasesc oricum

    Edit2: hahaha ne transmite sarbatori fericite

    Edit3: pe 1 si 8 sunt ale lor cu ghioceii vietii, pe cand iesim la baut?

     

     

  2. 12 minutes ago, aismen said:

    Eu nu sunt asa de prost. Sa ma iei de boase.

    Stiu man, era pamflet

     

    Edit// ideea este, nu arunca nimeni in aer cum vor ei, cheile le detin numai capitanii

  3. 27 minutes ago, ARUBA said:

    Nu am acuzat pe nimeni. Un abonament costa 70 de ron pe luna, iar conditiile de calatorie sunt mult, mult mai bune decat in alte tari civilizate unde costurile sunt mult mai mari.

    Sunt pt teste post hunting

     

    On:trimite-mi pm cu screenshot, please, pare cunoscut

  4. CVE-2018-10933 libssh authentication bypass, a vulnerable Docker container that listens on port 2222 for exploitation. A basic proof-of-concept libssh patch included in the container to bypass auth. To login use the default "myuser" / "mypassword" from libssh. A patch is applied to a copy of libssh in the Docker container which injects a SSH2_MSG_USERAUTH_SUCCESS packet during any authentication (keyboard-interactive / pubkey / gss-api etc.) attempt and sets the client side state to proceed. The included server has been patched from example code to allow exploitation to succeed.

    ./build.sh ./run.sh ssh -l myuser -p 2222 localhost

    A patched exploit-libssh-0.8.3 and vulnerable sshd are available in the container for testing purposes. The "ssh-client" will successfully bypass authentication but is unable to spawn a shell against the default example server due to additional authentication checks in the server code.

    [root@305b48cb932e ]# cd /root/exploit-libssh-0.8.3/build/examples [root@305b48cb932e examples]# ./ssh-client -l root 127.0.0.1 The server is unknown. Do you trust the host key (yes/no)? SHA256:Mg6j2yHWMsRe56ABhAYjLIJK9yD2N3lGQAl3EfGqP7w yes This new key will be written on disk for further usage. do you agree ? yes Requesting shell : Channel request shell failed [root@305b48cb932e examples]# 

    Source

  5. NOTE:

    This tool has been re-written to run on Kali (2018.1)
    DEPENDENCIES:

    apt-get install qt4-dev-tools


    TODO:

        Add a updater for the tool.

        Add a WPS tab + support for WPS cracking (Reaver / Bully, or support for both)

        Consider renaming the project?

        Change deprecated "iwconfig" with the use of "iw"

        Consider adding "hashcat" GPU cracking option.

        WPA handshake capture is slow, considering enhancement to it. wifite2 got a VERY FAST handshake capturing method, consider using that code.

        Fix new graphics.

    LAUNCH:

    To launch the program use: $ python gerix.py

    Enjoy!

    NOTE: For copy and paste in xterm windows you can use the shortcuts CTRL-INS and SHIFT-INS. In alternative, you can select the text with the mouse, and use the third button of the mouse to paste it. On a laptop you can emulate the third button pressing the first and the second button together.

     

    Source:

    https://github.com/kimocoder/gerix-wifi-cracker/blob/master/README.md

    • Upvote 1
  6. WPML, a module that allows running fully multilingual websites with WordPress, making it easy to translate WordPress pages, posts, tags, categories and themes was recently hacked by an unhappy employee. According to this page: https://wpml.org/home/about-us/, WPML is running on more than 600 000 websites. There are almost 1 million compromised accounts on the WPML website.

     

    Below you can see a message that was sent to all WPML clients in 20 January 2019.

     

    Quote

     


    ,

    We’re very sorry to report that our website got hacked. The evidence that we have points to an ex-employee who planted a backdoor before leaving the company.

    That attacker did the following:

    Copied the names and emails of our clients
    Sent a mass email on our behalf
    Defaced our purchase page and added a fake blog post

    We’re very sorry that we allowed this to happen. We’ll take a lot more precaution when others leave the company in the future. Of course, some of our employees have access to sensitive material and we trust them to use it wisely.

    Is there an exploit in WPML plugin?

    The attacker did not modify the code in WPML plugins. We double checked right now and we can confirm that the ZIP files that you are downloading from us were not tampered with.

    Was payment information compromised?

    No. We don’t store payment information on our server. We use PayPal and Stripe for payment processing and they store the payment details. When you buy from us, we don’t ever see your credit card number.

    Is my WPML account compromised?

    Possibly. The attacker gained access to all client names and emails and may be able to login to your account. This will allow the attacker to pose as you on wpml.org.

    Please log-in and change your password.

    What’s WPML team doing about this hack?

    We’re rebuilding the server from scratch, resetting all passwords and locking down everything. Since the intruder had access to the server, we can’t tell what other holes there are, so we’re building the site from scratch. This will take us until tomorrow morning.

    We’ll write again once our site is secured again. Again, we’re very sorry for having lost your name and email to this intruder. Besides fixing the site, we’ll also take legal action.

    – Amir

     

    recommend that everyone who has accounts on WPML.com should change urgently his / her password. At this moment the wordpress wpml plugins are not affected by this hack, but your account data from WPML is compromised. If you are using the same password on other websites we recommend to set a different password there too. Make sure to update all your WordPress plugins in order to prevent upcoming plugin hacks.

     

    Via

    http://www.hackingnews.com/breaking-news/wpml-org-website-was-hacked-what-you-need-to-know/

     

  7. 8 hours ago, aismen said:

    Uite un total pe ce am cheltuit eu:

     

    RPi3 - 163 lei

    Carcasa SNES - 125 lei (include și transport din SUA)

    Încărcător - 20 lei

    Ventilator - 5 lei

    Controller XBOX Wireless - 180 lei

    Cablu HDMI - 30 lei

    Card SD SDHC Class 10 16GB - 60 lei parcă

     

    Total: 583 lei. Se poate să fi cheltuit și mai mult. Ideea este că dacă vrei să faci această investiție ar trebui chiar să îți placă.

    Sunt kituri la 38, $40 canadieni, depinde..

     

     

    //am gasit kit pi3 b+ la $80 ca, depinde ce xauti

    • Downvote 1
  8. VC4CL is an implementation of the OpenCL 1.2 standard for the VideoCore IV GPU (found in all Raspberry Pi models).

    The implementation consists of:

        The VC4CL OpenCL runtime library, running on the host CPU to compile, run and interact with OpenCL kernels.
        The VC4C compiler, converting OpenCL kernels into machine code. This compiler also provides an implementation of the OpenCL built-in functions.
        The VC4CLStdLib, the platform-specific implementation of the OpenCL C standard library, is linked in with the kernel by VC4C

     

    Source: https://github.com/doe300/VC4CL/blob/master/Readme.md

    • Downvote 1
  9. In most organisations using Active Directory and Exchange, Exchange servers have such high privileges that being an Administrator on an Exchange server is enough to escalate to Domain Admin. Recently I came across a blog from the ZDI, in which they detail a way to let Exchange authenticate to attackers using NTLM over HTTP. This can be combined with an NTLM relay attack to escalate from any user with a mailbox to Domain Admin in probably 90% of the organisations I’ve seen that use Exchange. This attack is possible by default and while no patches are available at the point of writing, there are mitigations that can be applied to prevent this privilege escalation. This blog details the attack, some of the more technical details and mitigations, as well as releasing a proof-of-concept tool for this attack which I’ve dubbed “PrivExchange”.

     

    Read more s-ar incadra la tutoriale, cautati sursa dupa titlu, ceva cu .io

     

    Edit: https://dirkjanm.io/abusing-exchange-one-api-call-away-from-domain-admin/

    • Upvote 1
    • Downvote 1
×
×
  • Create New...