MadAgent
Active Members-
Posts
97 -
Joined
-
Last visited
-
Days Won
1
MadAgent last won the day on August 5 2012
MadAgent had the most liked content!
Recent Profile Visitors
The recent visitors block is disabled and is not being shown to other users.
MadAgent's Achievements
Newbie (1/14)
36
Reputation
-
Caut router wireless cu functii multiple?
MadAgent replied to Oli_Claudiu's topic in Sisteme de operare si discutii hardware
Daca vrei sa dai doar pe cablu, cred ca iti poti face cu orice router care suporta DD-WRT; daca vrei sa dai si pe wireless si iti place sa modezi, te poti apuca sa faci ceva cu Raspberry; iar o solutie relativ ieftina out of the box ar fi pineapple. -
Sper sa nu fi postat in rubrica gresita si sa va fie de ajutor(celor care vreti sa faceti reverse). E bruteforcer(SSH) din cate am putut sa-mi dau seama, se conecteaza la un C&C(cred ca nu e IRCD). Din pacate la momentul testarii, conectarea la C&C da timeout. Acelasi binar pentru mai multe procesoare - x32, x64,arm, mips,..... Link: https://www.sendspace.com/file/54jyoj
-
- 1
-
De-a lungul timpului, am gasit mai multe IP-uri pe care eu personal le blochez de obicei pe anumite servere, unele sunt de la firme de securitate, altele sunt de la institutii guvernamentale, iar celelalte honeypot-uri de la diverse entitati fizice sau juridice fara renume. Unele dintre IP-uri sunt luate de pe "decedatul" ryan cu mult timp in urma. #!/bin/sh $IPTABLES_CMD="/sbin/iptables" $IPTABLES_CMD -A INPUT -m iprange --src-range 123.252.235.208-123.252.235.215 -j DROP $IPTABLES_CMD -A INPUT -m iprange --src-range 149.5.0.0-149.5.255.255 -j DROP $IPTABLES_CMD -A INPUT -m iprange --src-range 149.9.0.0-149.9.255.255 -j DROP $IPTABLES_CMD -A INPUT -m iprange --src-range 195.228.45.0-195.228.45.255 -j DROP $IPTABLES_CMD -A INPUT -m iprange --src-range 196.20.64.0-196.20.127.255 -j DROP $IPTABLES_CMD -A INPUT -m iprange --src-range 208.123.40.0-208.123.41.255 -j DROP $IPTABLES_CMD -A INPUT -m iprange --src-range 208.123.40.0-208.123.41.255 -j DROP $IPTABLES_CMD -A INPUT -m iprange --src-range 208.80.192.0-208.80.199.255 -j DROP $IPTABLES_CMD -A INPUT -m iprange --src-range 213.30.189.64-213.30.189.71 -j DROP $IPTABLES_CMD -A INPUT -m iprange --src-range 24.6.0.0-24.6.255.255 -j DROP $IPTABLES_CMD -A INPUT -m iprange --src-range 67.112.0.0-67.127.255.255 -j DROP $IPTABLES_CMD -A INPUT -m iprange --src-range 67.112.0.0-67.127.255.25 -j DROP $IPTABLES_CMD -A INPUT -m iprange --src-range 68.62.208.0-68.62.223.255 -j DROP $IPTABLES_CMD -A INPUT -m iprange --src-range 69.164.192.0-69.164.223.255 -j DROP $IPTABLES_CMD -A INPUT -m iprange --src-range 74.92.0.0-74.95.255.255 -j DROP $IPTABLES_CMD -A INPUT -m iprange --src-range 76.96.0.0-76.127.255.255 -j DROP $IPTABLES_CMD -A INPUT -m iprange --src-range 81.27.0.0-81.27.255.255 -j DROP $IPTABLES_CMD -A INPUT -m iprange --src-range 84.14.214.192-84.14.214.223 -j DROP $IPTABLES_CMD -A INPUT -m iprange --src-range 85.48.0.0-85.55.255.255 -j DROP $IPTABLES_CMD -A INPUT -m iprange --src-range 85.84.0.0-85.87.255.255 -j DROP $IPTABLES_CMD -A INPUT -p tcp -i eth1 -s 10.0.0.125 --dport 25 -j REJECT $IPTABLES_CMD -A INPUT -p tcp -s 204.181.64.8 -j DROP $IPTABLES_CMD -A INPUT -p tcp -s 38.105.71.114 -j DROP $IPTABLES_CMD -A INPUT -p tcp -s 38.105.71.72 -j DROP $IPTABLES_CMD -A INPUT -p tcp -s 63.240.91.179 -j DROP $IPTABLES_CMD -A INPUT -p tcp -s 69.164.194.188 -j DROP $IPTABLES_CMD -A INPUT -p tcp -s 69.28.58.11 -j DROP $IPTABLES_CMD -A INPUT -p tcp -s 69.28.58.3 -j DROP $IPTABLES_CMD -A INPUT -s 109.129.189.25 -j DROP $IPTABLES_CMD -A INPUT -s 110.212.10.83 -j DROP $IPTABLES_CMD -A INPUT -s 111.85.145.67 -j DROP $IPTABLES_CMD -A INPUT -s 112.237.14.255 -j DROP $IPTABLES_CMD -A INPUT -s 113.106.106.131 -j DROP $IPTABLES_CMD -A INPUT -s 113.224.152.145 -j DROP $IPTABLES_CMD -A INPUT -s 113.225.187.144 -j DROP $IPTABLES_CMD -A INPUT -s 113.240.31.69 -j DROP $IPTABLES_CMD -A INPUT -s 113.70.91.171 -j DROP $IPTABLES_CMD -A INPUT -s 113.89.160.108 -j DROP $IPTABLES_CMD -A INPUT -s 114.221.173.245 -j DROP $IPTABLES_CMD -A INPUT -s 114.221.174.20 -j DROP $IPTABLES_CMD -A INPUT -s 114.246.65.21 -j DROP $IPTABLES_CMD -A INPUT -s 114.246.94.130 -j DROP $IPTABLES_CMD -A INPUT -s 114.248.93.229 -j DROP $IPTABLES_CMD -A INPUT -s 115.213.74.17 -j DROP $IPTABLES_CMD -A INPUT -s 115.60.8.23 -j DROP $IPTABLES_CMD -A INPUT -s 116.236.201.122 -j DROP $IPTABLES_CMD -A INPUT -s 116.238.231.239 -j DROP $IPTABLES_CMD -A INPUT -s 117.136.9.173 -j DROP $IPTABLES_CMD -A INPUT -s 117.22.203.191 -j DROP $IPTABLES_CMD -A INPUT -s 118.100.233.137 -j DROP $IPTABLES_CMD -A INPUT -s 118.169.34.98 -j DROP $IPTABLES_CMD -A INPUT -s 118.213.83.50 -j DROP $IPTABLES_CMD -A INPUT -s 118.32.89.208 -j DROP $IPTABLES_CMD -A INPUT -s 118.81.3.97 -j DROP $IPTABLES_CMD -A INPUT -s 119.108.179.10 -j DROP $IPTABLES_CMD -A INPUT -s 119.108.184.61 -j DROP $IPTABLES_CMD -A INPUT -s 119.108.185.49 -j DROP $IPTABLES_CMD -A INPUT -s 119.118.224.11 -j DROP $IPTABLES_CMD -A INPUT -s 119.118.227.104 -j DROP $IPTABLES_CMD -A INPUT -s 119.118.234.253 -j DROP $IPTABLES_CMD -A INPUT -s 119.118.235.129 -j DROP $IPTABLES_CMD -A INPUT -s 119.118.236.5 -j DROP $IPTABLES_CMD -A INPUT -s 119.119.232.17 -j DROP $IPTABLES_CMD -A INPUT -s 119.192.191.117 -j DROP $IPTABLES_CMD -A INPUT -s 120.0.196.204 -j DROP $IPTABLES_CMD -A INPUT -s 120.69.249.188 -j DROP $IPTABLES_CMD -A INPUT -s 120.89.55.3 -j DROP $IPTABLES_CMD -A INPUT -s 121.29.121.203 -j DROP $IPTABLES_CMD -A INPUT -s 122.169.71.53 -j DROP $IPTABLES_CMD -A INPUT -s 122.169.76.19 -j DROP $IPTABLES_CMD -A INPUT -s 122.173.11.26 -j DROP $IPTABLES_CMD -A INPUT -s 122.224.129.146 -j DROP $IPTABLES_CMD -A INPUT -s 123.101.50.131 -j DROP $IPTABLES_CMD -A INPUT -s 123.119.238.120 -j DROP $IPTABLES_CMD -A INPUT -s 123.134.170.169 -j DROP $IPTABLES_CMD -A INPUT -s 123.134.175.46 -j DROP $IPTABLES_CMD -A INPUT -s 123.161.193.186 -j DROP $IPTABLES_CMD -A INPUT -s 123.175.177.156 -j DROP $IPTABLES_CMD -A INPUT -s 123.188.187.249 -j DROP $IPTABLES_CMD -A INPUT -s 123.237.8.146 -j DROP $IPTABLES_CMD -A INPUT -s 123.247.158.181 -j DROP $IPTABLES_CMD -A INPUT -s 123.252.235.210 -j DROP $IPTABLES_CMD -A INPUT -s 123.67.48.107 -j DROP $IPTABLES_CMD -A INPUT -s 124.107.147.138 -j DROP $IPTABLES_CMD -A INPUT -s 124.130.0.7 -j DROP $IPTABLES_CMD -A INPUT -s 124.134.102.51 -j DROP $IPTABLES_CMD -A INPUT -s 124.89.51.12 -j DROP $IPTABLES_CMD -A INPUT -s 124.94.211.119 -j DROP $IPTABLES_CMD -A INPUT -s 125.125.190.176 -j DROP $IPTABLES_CMD -A INPUT -s 125.224.199.18 -j DROP $IPTABLES_CMD -A INPUT -s 125.93.76.242 -j DROP $IPTABLES_CMD -A INPUT -s 128.151.238.70 -j DROP $IPTABLES_CMD -A INPUT -s 128.241.111.20 -j DROP $IPTABLES_CMD -A INPUT -s 143.215.130.53 -j DROP $IPTABLES_CMD -A INPUT -s 149.5.168.2 -j DROP $IPTABLES_CMD -A INPUT -s 149.9.0.58 -j DROP $IPTABLES_CMD -A INPUT -s 150.70.172.103 -j DROP $IPTABLES_CMD -A INPUT -s 150.70.172.206 -j DROP $IPTABLES_CMD -A INPUT -s 166.205.15.248 -j DROP $IPTABLES_CMD -A INPUT -s 173.227.230.236 -j DROP $IPTABLES_CMD -A INPUT -s 176.28.54.34 -j DROP $IPTABLES_CMD -A INPUT -s 178.125.148.201 -j DROP $IPTABLES_CMD -A INPUT -s 178.255.248.155 -j DROP $IPTABLES_CMD -A INPUT -s 180.110.188.186 -j DROP $IPTABLES_CMD -A INPUT -s 183.191.217.78 -j DROP $IPTABLES_CMD -A INPUT -s 183.91.2.8 -j DROP $IPTABLES_CMD -A INPUT -s 186.42.141.207 -j DROP $IPTABLES_CMD -A INPUT -s 186.46.17.199 -j DROP $IPTABLES_CMD -A INPUT -s 188.165.140.240 -j DROP $IPTABLES_CMD -A INPUT -s 188.98.64.4 -j DROP $IPTABLES_CMD -A INPUT -s 189.67.191.43 -j DROP $IPTABLES_CMD -A INPUT -s 193.173.137.253 -j DROP $IPTABLES_CMD -A INPUT -s 193.200.150.125 -j DROP $IPTABLES_CMD -A INPUT -s 195.134.168.251 -j DROP $IPTABLES_CMD -A INPUT -s 195.177.247.202 -j DROP $IPTABLES_CMD -A INPUT -s 195.214.79.22 -j DROP $IPTABLES_CMD -A INPUT -s 195.228.45.78 -j DROP $IPTABLES_CMD -A INPUT -s 195.243.67.18 -j DROP $IPTABLES_CMD -A INPUT -s 196.20.73.60 -j DROP $IPTABLES_CMD -A INPUT -s 198.172.203.249 -j DROP $IPTABLES_CMD -A INPUT -s 200.215.222.234 -j DROP $IPTABLES_CMD -A INPUT -s 201.53.194.175 -j DROP $IPTABLES_CMD -A INPUT -s 201.82.88.189 -j DROP $IPTABLES_CMD -A INPUT -s 202.144.154.34 -j DROP $IPTABLES_CMD -A INPUT -s 203.210.153.11 -j DROP $IPTABLES_CMD -A INPUT -s 204.118.31.201 -j DROP $IPTABLES_CMD -A INPUT -s 204.181.64.8 -j DROP $IPTABLES_CMD -A INPUT -s 204.95.105.214 -j DROP $IPTABLES_CMD -A INPUT -s 205.212.79.43 -j DROP $IPTABLES_CMD -A INPUT -s 207.189.121.46 -j DROP $IPTABLES_CMD -A INPUT -s 207.6.44.37 -j DROP $IPTABLES_CMD -A INPUT -s 208.80.192.56 -j DROP $IPTABLES_CMD -A INPUT -s 208.80.194.28 -j DROP $IPTABLES_CMD -A INPUT -s 208.80.194.33 -j DROP $IPTABLES_CMD -A INPUT -s 208.80.194.35 -j DROP $IPTABLES_CMD -A INPUT -s 209.17.131.125 -j DROP $IPTABLES_CMD -A INPUT -s 211.236.246.220 -j DROP $IPTABLES_CMD -A INPUT -s 212.227.136.64 -j DROP $IPTABLES_CMD -A INPUT -s 212.56.95.253 -j DROP $IPTABLES_CMD -A INPUT -s 212.92.4.44 -j DROP $IPTABLES_CMD -A INPUT -s 213.119.53.117 -j DROP $IPTABLES_CMD -A INPUT -s 213.30.189.66 -j DROP $IPTABLES_CMD -A INPUT -s 213.85.115.198 -j DROP $IPTABLES_CMD -A INPUT -s 213.88.151.72 -j DROP $IPTABLES_CMD -A INPUT -s 216.155.158.171 -j DROP $IPTABLES_CMD -A INPUT -s 216.157.208.146 -j DROP $IPTABLES_CMD -A INPUT -s 216.18.100.157 -j DROP $IPTABLES_CMD -A INPUT -s 217.75.75.99 -j DROP $IPTABLES_CMD -A INPUT -s 218.202.219.8 -j DROP $IPTABLES_CMD -A INPUT -s 218.22.173.88 -j DROP $IPTABLES_CMD -A INPUT -s 218.4.211.134 -j DROP $IPTABLES_CMD -A INPUT -s 219.139.148.108 -j DROP $IPTABLES_CMD -A INPUT -s 219.151.9.139 -j DROP $IPTABLES_CMD -A INPUT -s 220.152.129.221 -j DROP $IPTABLES_CMD -A INPUT -s 220.178.18.166 -j DROP $IPTABLES_CMD -A INPUT -s 220.225.70.109 -j DROP $IPTABLES_CMD -A INPUT -s 221.11.46.91 -j DROP $IPTABLES_CMD -A INPUT -s 221.137.218.249 -j DROP $IPTABLES_CMD -A INPUT -s 222.183.15.230 -j DROP $IPTABLES_CMD -A INPUT -s 222.240.216.19 -j DROP $IPTABLES_CMD -A INPUT -s 24.6.61.231 -j DROP $IPTABLES_CMD -A INPUT -s 27.188.224.187 -j DROP $IPTABLES_CMD -A INPUT -s 38.105.71.114 -j DROP $IPTABLES_CMD -A INPUT -s 38.105.71.72 -j DROP $IPTABLES_CMD -A INPUT -s 38.229.0.75 -j DROP $IPTABLES_CMD -A INPUT -s 46.5.31.193 -j DROP $IPTABLES_CMD -A INPUT -s 58.216.206.62 -j DROP $IPTABLES_CMD -A INPUT -s 58.53.131.186 -j DROP $IPTABLES_CMD -A INPUT -s 59.92.68.2 -j DROP $IPTABLES_CMD -A INPUT -s 60.213.136.122 -j DROP $IPTABLES_CMD -A INPUT -s 60.215.157.32 -j DROP $IPTABLES_CMD -A INPUT -s 60.52.96.99 -j DROP $IPTABLES_CMD -A INPUT -s 61.163.230.239 -j DROP $IPTABLES_CMD -A INPUT -s 61.180.36.50 -j DROP $IPTABLES_CMD -A INPUT -s 62.10.117.169 -j DROP $IPTABLES_CMD -A INPUT -s 62.194.131.137 -j DROP $IPTABLES_CMD -A INPUT -s 63.240.91.179 -j DROP $IPTABLES_CMD -A INPUT -s 64.124.203.72 -j DROP $IPTABLES_CMD -A INPUT -s 64.124.203.77 -j DROP $IPTABLES_CMD -A INPUT -s 64.212.34.30 -j DROP $IPTABLES_CMD -A INPUT -s 64.237.49.72 -j DROP $IPTABLES_CMD -A INPUT -s 67.121.127.36 -j DROP $IPTABLES_CMD -A INPUT -s 67.124.37.250 -j DROP $IPTABLES_CMD -A INPUT -s 67.124.38.158 -j DROP $IPTABLES_CMD -A INPUT -s 67.79.193.250 -j DROP $IPTABLES_CMD -A INPUT -s 68.62.212.103 -j DROP $IPTABLES_CMD -A INPUT -s 68.71.52.49 -j DROP $IPTABLES_CMD -A INPUT -s 69.119.109.216 -j DROP $IPTABLES_CMD -A INPUT -s 69.163.129.35 -j DROP $IPTABLES_CMD -A INPUT -s 69.164.194.188 -j DROP $IPTABLES_CMD -A INPUT -s 69.28.58.11 -j DROP $IPTABLES_CMD -A INPUT -s 69.28.58.3 -j DROP $IPTABLES_CMD -A INPUT -s 69.33.155.123 -j DROP $IPTABLES_CMD -A INPUT -s 71.56.58.47 -j DROP $IPTABLES_CMD -A INPUT -s 72.1.196.184 -j DROP $IPTABLES_CMD -A INPUT -s 74.211.165.68 -j DROP $IPTABLES_CMD -A INPUT -s 74.45.163.47 -j DROP $IPTABLES_CMD -A INPUT -s 74.50.3.205 -j DROP $IPTABLES_CMD -A INPUT -s 76.119.101.56 -j DROP $IPTABLES_CMD -A INPUT -s 77.121.0.3 -j DROP $IPTABLES_CMD -A INPUT -s 80.108.65.8 -j DROP $IPTABLES_CMD -A INPUT -s 80.201.238.34 -j DROP $IPTABLES_CMD -A INPUT -s 81.240.20.154 -j DROP $IPTABLES_CMD -A INPUT -s 8.17.84.53 -j DROP $IPTABLES_CMD -A INPUT -s 81.93.167.102 -j DROP $IPTABLES_CMD -A INPUT -s 82.169.28.225 -j DROP $IPTABLES_CMD -A INPUT -s 82.75.58.63 -j DROP $IPTABLES_CMD -A INPUT -s 84.127.116.154 -j DROP $IPTABLES_CMD -A INPUT -s 84.14.214.213 -j DROP $IPTABLES_CMD -A INPUT -s 84.158.131.139 -j DROP $IPTABLES_CMD -A INPUT -s 84.158.132.168 -j DROP $IPTABLES_CMD -A INPUT -s 84.158.132.191 -j DROP $IPTABLES_CMD -A INPUT -s 84.197.30.65 -j DROP $IPTABLES_CMD -A INPUT -s 84.222.66.12 -j DROP $IPTABLES_CMD -A INPUT -s 85.186.178.141 -j DROP $IPTABLES_CMD -A INPUT -s 85.54.230.6 -j DROP $IPTABLES_CMD -A INPUT -s 85.85.187.243 -j DROP $IPTABLES_CMD -A INPUT -s 86.55.176.111 -j DROP $IPTABLES_CMD -A INPUT -s 87.179.30.194 -j DROP $IPTABLES_CMD -A INPUT -s 89.217.104.62 -j DROP $IPTABLES_CMD -A INPUT -s 91.176.232.84 -j DROP $IPTABLES_CMD -A INPUT -s 91.182.132.233 -j DROP $IPTABLES_CMD -A INPUT -s 91.182.35.169 -j DROP $IPTABLES_CMD -A INPUT -s 91.20.16.4 -j DROP $IPTABLES_CMD -A INPUT -s 91.202.72.226 -j DROP $IPTABLES_CMD -A INPUT -s 91.212.136.222 -j DROP $IPTABLES_CMD -A INPUT -s 91.52.196.131 -j DROP $IPTABLES_CMD -A INPUT -s 92.113.246.92 -j DROP $IPTABLES_CMD -A INPUT -s 92.140.43.101 -j DROP $IPTABLES_CMD -A INPUT -s 92.9.231.169 -j DROP $IPTABLES_CMD -A INPUT -s 93.122.64.100 -j DROP $IPTABLES_CMD -A INPUT -s 94.227.11.160 -j DROP $IPTABLES_CMD -A INPUT -s 94.67.209.184 -j DROP $IPTABLES_CMD -A INPUT -s 95.133.42.146 -j DROP $IPTABLES_CMD -A INPUT -s 96.50.0.167 -j DROP $IPTABLES_CMD -A INPUT -s 96.50.0.168 -j DROP $IPTABLES_CMD -A INPUT -s 99.30.82.190 -j DROP $IPTABLES_CMD -A INPUT -s 99.50.91.143 -j DROP $IPTABLES_CMD -I INPUT -s 129.78.233.211 -j DROP $IPTABLES_CMD -I INPUT -s 129.78.233.212 -j DROP $IPTABLES_CMD -I INPUT -s 140.120.21.19 -j DROP $IPTABLES_CMD -I INPUT -s 150.70.172.101 -j DROP $IPTABLES_CMD -I INPUT -s 150.70.173.39 -j DROP $IPTABLES_CMD -I INPUT -s 150.70.173.57 -j DROP $IPTABLES_CMD -I INPUT -s 150.70.75.167 -j DROP $IPTABLES_CMD -I INPUT -s 150.70.97.122 -j DROP $IPTABLES_CMD -I INPUT -s 178.217.186.39 -j DROP $IPTABLES_CMD -I INPUT -s 195.159.140.196 -j DROP $IPTABLES_CMD -I INPUT -s 213.167.45.195 -j DROP $IPTABLES_CMD -I INPUT -s 213.174.144.38 -j DROP $IPTABLES_CMD -I INPUT -s 218.45.10.35 -j DROP $IPTABLES_CMD -I INPUT -s 219.84.227.101 -j DROP $IPTABLES_CMD -I INPUT -s 219.84.227.102 -j DROP $IPTABLES_CMD -I INPUT -s 219.84.227.104 -j DROP $IPTABLES_CMD -I INPUT -s 219.84.227.106 -j DROP $IPTABLES_CMD -I INPUT -s 219.84.227.107 -j DROP $IPTABLES_CMD -I INPUT -s 219.84.227.108 -j DROP $IPTABLES_CMD -I INPUT -s 219.84.227.111 -j DROP $IPTABLES_CMD -I INPUT -s 219.84.227.113 -j DROP $IPTABLES_CMD -I INPUT -s 219.84.227.125 -j DROP $IPTABLES_CMD -I INPUT -s 219.84.227.129 -j DROP $IPTABLES_CMD -I INPUT -s 219.84.227.131 -j DROP $IPTABLES_CMD -I INPUT -s 219.84.227.144 -j DROP $IPTABLES_CMD -I INPUT -s 219.84.227.145 -j DROP $IPTABLES_CMD -I INPUT -s 219.84.227.147 -j DROP $IPTABLES_CMD -I INPUT -s 219.84.227.149 -j DROP $IPTABLES_CMD -I INPUT -s 219.84.227.90 -j DROP $IPTABLES_CMD -I INPUT -s 219.84.227.91 -j DROP $IPTABLES_CMD -I INPUT -s 219.84.227.92 -j DROP $IPTABLES_CMD -I INPUT -s 219.84.227.94 -j DROP $IPTABLES_CMD -I INPUT -s 219.84.227.96 -j DROP $IPTABLES_CMD -I INPUT -s 46.28.88.12 -j DROP $IPTABLES_CMD -I INPUT -s 5.35.208.53 -j DROP $IPTABLES_CMD -I INPUT -s 62.118.254.11 -j DROP $IPTABLES_CMD -I INPUT -s 62.149.26.52 -j DROP $IPTABLES_CMD -I INPUT -s 62.149.26.54 -j DROP $IPTABLES_CMD -I INPUT -s 68.64.169.107 -j DROP $IPTABLES_CMD -I INPUT -s 91.192.138.120 -j DROP Daca ati mai gasit si voi si vreti sa impartasiti, postati si le adaug in lista principala. P.S. Daca ar fi important sa fie in alta sectiune va rog mutati.
-
Misto, dar tot nu te identifica unic pe tine, ci te incadreaza intr-un tipar... Daca as folosi browser-ul respectiv si pentru lucruri care tin de viata de zi cu zi, sau daca as iesi direct cu adresa de acasa, sau m-as loga pe conturi personale, GLUGA ar putea sa ma gaseasca dupa user behaviour. Oricum daca faci magarii si vrea sa te gaseasca downloadeaza ceva cu un 0day la tine si-ti activeaza camera, iti ia seriile de la componente si "tãti shele"(daca au bagat in New York Times, cred ca ar putea sa bage si-n alte site-uri).
-
Tyupkin Malware Hacking ATM Machines Worldwide
MadAgent replied to akkiliON's topic in Stiri securitate
Compromisuri... poate se gandea ca pentru o depanare, nu va avea loc in spatele ATM-ului(ex ATM din magazine - sunt frecvente in afara tarii) cu un laptop sau alte echipamente(sau pentru a nu desface toata magaoaia, sunt ATM-uri care se deschid prin fata - http://www.extremetech.com/wp-content/uploads/2013/12/Two_Loomis_Employees_Refilling_an_ATM_at_the_Downtown_Seattle_REI.jpg). -
Identificarea se face pe IP, UserAgent: $etag = substr(sha1($secret . sha1($_SERVER["REMOTE_ADDR"]) . sha1($_SERVER["HTTP_USER_AGENT"])), 0, 18); Momentan, daca schimbi IP + stergi cookies + stergi cache esti protejat(cel putin de metodele publice), bineinteles ca pot exista apllet-uri sau alte nebunii semnate anumite authority-uri prin care se pot vedea seriile de hardware, dar asta e viata. Off-topic: Daca vrei sa fi invizibil, lasi tehnologia acasa si intri intr-un buncar sub pamant la 50-100m adancime(nu mai merge nici daca esti in padure, te gasi dupa ritmul batailor inimii).
-
Tyupkin Malware Hacking ATM Machines Worldwide
MadAgent replied to akkiliON's topic in Stiri securitate
Din pacate, unele ATM-uri au port usb in partea din fata(unele sub keypad). Poti da jos keypad-ul si sa bagi stick cu autorun, sau daca e disabled autorunul dar are cod de admin default, poti gasi o modalitate sa rulezi... Off-topic: Tehnologii de doi lei sunt adoptate pentru plati doar din cauza ca lumea a fost invatata(voit de catre "sistem" sau au fost luati de valul tehnologizarii) sa le foloseasca si are prea putine informatii pentru a-si da seama la ce se expun. -
Daca are webpage-ul in alt dir sau daca are altcineva drepturi pe directory, nu se poate scrie in fisier. Daca are iptables in picioare, nu se deschide port. Rar se blocheaza ping din iptables, si de obicei se blocheaza incoming, nu outgoing, deci e cel mai sigur asa
-
AdyRo, dupa cum ii spune si numele, trebuie sa pui ip in loc de Google. Foloseste varianta postata...
-
Pai, cam asta e, dar din teste am vazut ca pe anumite geo locatii ale serverului pune tot h3, restul de modificari sunt facute dupa nevoile mele...
-
#!/bin/bash #Based on bing-ip2hosts v4 by Andrew Horton aka urbanadventurer, MorningStar Security #Modified by MadAgent on August 2014, released for RST Forums #Saves results to 'hosts' file VERSION=0.5 TMPDIR=./tmp ANIMATION=0 OUTPUTIP=1 HTTPPREFIX=0 IP= PREFIX= DEBUG=0 rm -rf hosts > /dev/null 2>&1 if [ -z "$1" ] || [ "$1" == "-h" ] || [ "$1" == "--help" ]; then echo -e " OPTIONS are: -n\t\tTurn off the progress indicator animation -t <DIR>\tUse this directory instead of /tmp. The directory must exist. -i\t\tOptional CSV output. Outputs the IP and hostname on each line, separated by a comma. -p\t\tOptional http:// prefix output. Useful for right-clicking in the shell. " exit 1 fi while getopts "nipt:" optionName; do case "$optionName" in n) ANIMATION=0;; t) TMPDIR="$OPTARG";; i) OUTPUTIP=1;; p) HTTPPREFIX=1;; [?]) echo "Error"; exit 1;; esac done shift $(($OPTIND -1)) if [ -z "$1" ]; then echo "need an IP or hostname" exit 1 fi animation="/-\|" page=0 last_page_check= how_many=1 uniq_hosts=0 single_page= # if the parameter looks like an IP go ahead, otherwise resolve it if [ `echo "$1" | egrep "(([0-9]+\.){3}[0-9]+)|\[[a-f0-9:]+\]"` ]; then IP="$1" else # IP=`resolveip -s "$1"` IP=`nslookup "$1" |egrep "^Address: \w+\.\w+\.\w+\.\w+$"|tail -1|awk '{ print $2 }'` # dig -t a treshna.com +short if [ "$IP" == "" ]; then echo "Error: cannot resolve $1 to an IP" exit fi fi all_hosts=`mktemp -p $TMPDIR -t bing-ip2hosts.tmp.XXXXXX` while [ -z "$last_page_check" ] && [ -n "$how_many" ] && [ -z "$single_page" ]; do if [ $ANIMATION == 1 ]; then echo -ne "\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b" echo -en "[ $IP | Scraping $how_many | Found $uniq_hosts | ${animation: $(( $page % 4 )) :1} ]" fi url="http://www.bing.com/search?q=ip%3A$IP&go=&qs=n&first=${page}0&FORM=PERE" out=`mktemp -p "$TMPDIR" -t bing-ip2hosts.tmp.XXXXXX` wget -q -O "$out" "$url" last_page_check=`egrep -o '<span class="sb_count" id="count">[0-9]+-([0-9]+) of (\1)' $out` if [[ "$last_page_check" -eq "" ]]; then last_page_check=`egrep -o '<span class="sb_count">[0-9]+-([0-9]+) of (\1)' $out` fi if [ "$DEBUG" -eq 1 ]; then echo "Last Page Check: $last_page_check" fi # if no results are found, how_many is empty and the loop will exit how_many=`egrep -o '<span class="sb_count" id="count">[^<]+' $out|cut -d '>' -f 2|cut -d ' ' -f 1-3` if [[ "$how_many" -eq "" ]]; then how_many=`egrep -o '<span class="sb_count">[^<]+' $out|cut -d '>' -f 2|cut -d ' ' -f 1-3` fi # check for a single page of results single_page=`egrep -o '<span class="sb_count" id="count">[0-9] results' $out` if [[ "$single_page" -eq "" ]]; then single_page=`egrep -o '<span class="sb_count">[0-9] ' $out` fi if [ $DEBUG -eq 1 ];then echo "Single Page: $single_page" fi # no captcha support or detection # pages will contain "Typing the characters in the picture above helps us ensure that a person, not a program, is performing a search" vhosts=`cat "$out"| egrep -o "<h3><a href=\"[^\"]+" $out |cut -d '"' -f 2` if [[ "$vhosts" -eq "" ]]; then vhosts=`cat "$out"| egrep -o "<h2><a href=\"[^\"]+" $out |cut -d '"' -f 2` fi echo -e "$vhosts" >> "$all_hosts" uniq_hosts=`cat "$all_hosts" | cut -d '/' -f 3 | tr '[:upper:]' '[:lower:]' | sort | uniq | wc -l` if [ $DEBUG -eq 0 ]; then rm -f "$out" fi let page=$page+1 if [ $DEBUG -eq 1 ]; then echo "Page: $page" fi done if [ $ANIMATION == 1 ]; then echo fi __NSLOOKUP="$(which nslookup)" __HOST="$(which host)" if [[ "$__NSLOOKUP" != "" ]]; then echo -e "$($__NSLOOKUP $IP | grep name | awk '{ print $NF }' | sed 's/\.$//' | sed 's/ //g')" >> "$all_hosts" fi if [[ "$__HOST" != "" ]]; then echo -e "$($__HOST $IP | grep -v 'not found' | grep name | awk '{ print $NF }' | sed 's/\.$//' | sed 's/ //g')" >> "$all_hosts" fi echo -e "$(host $IP | grep -v 'not found' | awk '{ print $NF }' | sed 's/\.$//' | sed 's/ //g')" >> "$all_hosts" uniq_hosts=`cat "$all_hosts" | cut -d '/' -f 3 | tr '[:upper:]' '[:lower:]' | sort | uniq` if [ $DEBUG -eq 0 ]; then rm -f "$all_hosts" fi if [ $OUTPUTIP == 1 ]; then PREFIX="$IP," fi if [ $HTTPPREFIX == 1 ]; then PREFIX="$PREFIX""http://" fi for h in `echo "$uniq_hosts"` do echo "$PREFIX$h" >> hosts done
-
Login bypass Exploit -> poti executa comenzi trimitand parametrii prin post sau GET Examplu: SyRiAn Electronic Army Shell :: SEA Shell Bypass: SyRiAn Electronic Army Shell :: SEA Shell Mai vezi si panoul de comanda, deci nu te mai complici sa dai ca Dorel prin GET si POST...
-
Cred ca este o variatie a https://towelroot.com
-
Am cam stat sa ma gandesc daca sa postez sau nu. Daca tot l-am gasit l-am urcat aici: https://www.sendspace.com/file/hs4v1o Nu stiu daca e ceva de capul lui, nu am prea avut timp de el azi. Daca are cineva timp/chef sa-l testeze, sa lase si un feedback.
-
Pentru ca invatamantul din Romania e praf, pentru ca scoala de la noi nu te invata nimic, pentru ca intr-o tara cat de cat civilizata ar trebui sa se puna accent pe ceea ce sti, nu pe ce curpapir pui pe masa, pentru ca astazi pe chat se vorbea de shpaga pentru BAC, pentru ca tocmai am vazut asta si m-a marcat in ce lume traim, pentru ca pot, pentru ca postez rar pe forum, pentru a va mai scoate din monotonie.