Jump to content


  • Content Count

  • Joined

  • Last visited

  • Days Won


Nytro last won the day on September 15

Nytro had the most liked content!

Community Reputation

4356 Excellent

About Nytro

  • Rank
  • Birthday 03/11/1991

Recent Profile Visitors

36440 profile views
  1. Te referi la acele LPIC? Din cate am vazut eu cuprind multe lucruri si cred ca sunt si destul de recunoscute. Adica mi se par foarte OK.
  2. Nu cred ca ai nevoie de VPN pentru bug bounty, te complici, nu o sa se ia nimeni de tine. Sunt multe servicii, ceva romanesc e RoTunneling al unui baiat de pe forum. Hidemyass (parca) am folosit in trecut pentru un engagement (la munca) si a fost ok.
  3. Bun venit, daca te putem ajuta cu ceva nu ezita sa intrebi.
  4. Partea cu acel Gigel care intra pe Zoom nu e chiar de joaca. Si se vede ca Romania nu este o tara atat de adaptata tehnologic cum se crede (vazand ca toti copii au smart phone-uri si stiu sa "isi bage" jocuri crackuite). Profesorii ar trebui sa stie si ei sa puna o parola la o conferinta de Zoom. E ok cand se intampla la clase mai mari dar daca e vorba de copii mai mici? Nu stii ce dubiosi pot sa apara.
  5. OSWE/AWAE Preparation Jan 22, 2020 WebExploit Development Share on: updated Content AWAE1.5 OSWE Exam Preparation This post contains all trainings and tutorials that could be useful for offensive security’s OSWE certification. I will be updating the post during my lab and preparation for the exam. Course Syllabus: https://www.offensive-security.com/documentation/awae-syllabus.pdf Before registering for AWAE Lab: Get comfortable with python requests library Read Web Application Hacker’s handbook, again if you a
  6. Nytro


    Zolom C# Executable with embedded Python that can be used reflectively to run python code on systems without Python installed Usage zolom.exe --script:"from random import seed; from random import random; seed(1); print 'getting random number'; print random();" zolom.exe --b64script:"ZnJvbSByYW5kb20gaW1wb3J0IHNlZWQ7IGZyb20gcmFuZG9tIGltcG9ydCByYW5kb207IHNlZWQoMSk7IHByaW50ICdnZXR0aW5nIHJhbmRvbSBudW1iZXInOyBwcmludCByYW5kb20oKTs=" Building Using Visual Studio restore the nuget packages and then click build. Adding more modules Unzip the Lib.zip file and add your modul
  7. ARM64 Reversing and Exploitation Part 2 - Use After Free SEPTEMBER 6, 2020 In this blog post, we will be exploiting a Use-after-free vulnerability in the vuln binary. The binaries for this and the next article can be found here. This UaF challenge is based on the one used by Protostar Use-after-free vulnerabilities occurs on the use of heap allocated memory after it has been freed. This can lead to several unexpected behaviours, from a crash to code execution. Anyways, let’s get started. Copy the vuln binary to your iOS or Corellium device. Run the bina
  8. HEVD writeups Sep 15, 2020 Yuvaly0 Intro This writeups do not aim to replace all of the existing good places already. I wrote them so I could get deeper understanding of the vulnerabilities I’ve decided to write writeups only for the vulns that interested me the most. There are references to the articles I used in the git repo. At the end of each section, I put a reference to the full source code Non Paged Pool Overflow Double Fetch Non Paged Pool Overflow
  9. mango.pdf.zone "work" by the hacker known as "Alex" / @mangopdf When you browse Instagram and find former Australian Prime Minister Tony Abbott's passport number Do not get arrested challenge 2020 Sep 15, 2020 • mangopdf (Alex Hope) Act 1: Sunday afternoon So you know when you’re flopping about at home, minding your own business, drinking from your water bottle in a way that does not possess any intent to subvert the Commonwealth of
  10. Nytro


    Zer0Dump Zer0dump is an PoC exploit/tool for abusing the vulnerabilities associated with CVE-2020-1472 (Zerologon) in order to initiate a full system takeover of an unpatched Windows domain controller. Special thanks to @dirkjanm and @SecureAuthCorp Sursa: https://github.com/bb00/zer0dump
  11. Security Engineering — Third Edition I'm writing a third edition of Security Engineering, which will be published in November 2020. With both the first edition in 2001 and the second edition in 2008, I put six chapters online for free at once, then added the others four years after publication. For the third edition, I negotiated an agreement with the publishers to put the chapters online for review as I wrote them. So the book came out by instalments over 2019-20, like Dickens' novels. Once the manuscript goes to press at the end of September 2020, all except seven sample c
  12. Whalescan Released as open source by NCC Group Plc - https://www.nccgroup.com/ Developed by Saira Hassan (@saiii_h) https://github.com/nccgroup/whalescan Released under Apache license 2.0, see LICENSE for more information Introduction Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulnerable packages on the container. It also checks the config and Docker files for misconfigurations. This tool can be used as part of a Windows container review on local copies of the containers, and on
  13. Atunci e mai nasol decat ma asteptam. Dar pana la urma nu e nevoie sa gaseasca parola daca vrea doar fisierele. Ar trebui sa incerce Process Monitor sa se uite la scrierile de fisiere, e posibil sa fie scrise undeva in %TEMP%. Daca se face totul din memorie, teoretic e nasol, practic tot se pot pune breakpoint-uri pe WriteFile(Ex) sau chiar NtWriteFile si acolo sa se poata vedea continutul fisierelor.
  14. Nu stiu daca este legal sau ilegal dar nu cred ca se poate direct cu un pixel/imagine pe chat deoarece Instagram, Facebook, Twitter si alte platforme au "protectie" impotriva acestor lucruri si nu browser-ul userului o sa faca request catre acel pixel/imagine ci backendul platformei. Daca chiar vrei ceva sa mearga ii trimiti un link cu ceva si un mesaj prin care convingi persoana sa il deschida. Daca face asta ii poti afla IP-ul. Acum vine intrebarea: ce faci cu IP-ul? Nu mai sunt vremurile de acum X ani in care la "whois" sa vezi adresa de acasa a cuiva. Si un IP e probabil
  15. Salut, incearca in primul rand sa deschizi aplicatia intr-un editor de text ca Notepad++ si sa te uiti prin ea, e posibil sa vezi parola acolo. Ceva mai practic ar fi sa rulezi un utilitar "strings" (Linux sau Windows) care ia automat stringurile unde poate fi si parola. Poti vedea activitatea binarului dar acea decryptare PROBABIL o sa se faca in memorie. Insa nu m-ar mira sa ruleze un binar in linie de comanda in care sa apara si parola, deci o solutie gen Process Monitor cum a mentionat si @gigiRoman ar putea fi foarte utila. Daca nu merg astea, probabil aplicatia
  • Create New...