Jump to content

Nytro

Administrators
  • Content Count

    15944
  • Joined

  • Last visited

  • Days Won

    223

Everything posted by Nytro

  1. Da, e in CrackMapExec, insa nu i-a mai facut update de o gramada de timp. L-am cunoscut pe byt3bl33d3r la BlackHat Asia, e super de treaba, a zis ca o sa ii faca update, dar probabil a uitat. Poate ii mai aduc eu aminte. Este si in PTF, dar la fel, nu e updated https://github.com/trustedsec/ptf/tree/master/modules/windows-tools
  2. Description NetRipper is a post exploitation tool targeting Windows systems which uses API hooking in order to intercept network traffic and encryption related functions from a low privileged user, being able to capture both plain-text traffic and encrypted traffic before encryption/after decryption. NetRipper was released at Defcon 23, Las Vegas, Nevada. Abstract The post-exploitation activities in a penetration test can be challenging if the tester has low-privileges on a fully patched, well configured Windows machine. This work presents a technique for helping the tester to find useful information by sniffing network traffic of the applications on the compromised machine, despite his low-privileged rights. Furthermore, the encrypted traffic is also captured before being sent to the encryption layer, thus all traffic (clear-text and encrypted) can be sniffed. The implementation of this technique is a tool called NetRipper which uses API hooking to do the actions mentioned above and which has been especially designed to be used in penetration tests, but the concept can also be used to monitor network traffic of employees or to analyze a malicious application. https://github.com/NytroRST
  3. Nytro

    Modificari forum

    Vreau doar sa existe un topic in care sa postam daca modificam cate ceva la forum. De exemplu, azi: mysql> update user set ipaddress = '1.3.3.7'; Query OK, 0 rows affected (0.41 sec) Rows matched: 99511 Changed: 0 Warnings: 0 mysql> update post set ipaddress = '1.3.3.7'; Query OK, 0 rows affected (0.78 sec) Rows matched: 393377 Changed: 0 Warnings: 0 mysql> update adminlog set ipaddress='1.3.3.7'; Query OK, 71678 rows affected (0.34 sec) Rows matched: 71678 Changed: 71678 Warnings: 0 mysql> update moderatorlog set ipaddress='1.3.3.7'; Query OK, 585 rows affected (0.01 sec) Rows matched: 590 Changed: 585 Warnings: 0 mysql> update searchlog set ipaddress='1.3.3.7'; Query OK, 213 rows affected (0.02 sec) Rows matched: 213 Changed: 213 Warnings: 0 mysql> update threadrate set ipaddress='1.3.3.7'; Query OK, 3322 rows affected (0.01 sec) Rows matched: 3322 Changed: 3322 Warnings: 0
  4. NetRipper - Added support for Opera and SecureCRT https://github.com/NytroRST/NetRipper
  5. Nytro

    High School

    Legat de liceu mate-info intensiv, iti voi spune parerile mele: 1. Se face informatica, se face (sper) C++, dar nu prea mult la nivel de limbaj (e.g. clase, exceptii, templates) ci mai mult la nivel de algoritmica. E foarte util pentru viitor. Daca inveti C++ in liceu, o sa iti fie usor sa inveti orice alt limbaj. In plus, sugestia mea ar fi sa inveti singur alte lucruri, din carti sau tutoriale de pe Internet + multa practica. O sa ajute mai mult pe viitor, e destul de limitat ce se face la cateva ore pe saptamana. 2. Partea de matematica nu mi-a placut si la acea vreme nu mi s-a parut foarte utila, insa are propriile beneficii. In plus, cand vei merge la o facultate de informatica, poti sa fii sigur ca te vei lovi de aceasta materie, asa ca ar fi bine sa prinzi bazele din liceu. Ah, se mai da si admitere la mate, deci ca sa intri ai nevoie de asa ceva. Un bonus ar fi urmatoarele: criptografie si inteligenta artificiala. O sa te ajute daca inveti matematica. 3. Partea de engleza nu e importanta, e obligatorie. Trebuie sa stii engleza. Nu conteaza pe ce nivel, o sa ai nevoie ca sa inveti singur si vei avea de asemenea nevoie cand vei lucra in domeniu. Legat de liceu, a fost super misto. Esti copil, profita de asta, distreaza-te. Ai liceul si facultatea (poate) in care ai timp sa te distrezi. Dar daca de tanar te apuci sa inveti lucruri si esti baiat serios, vei avea un viitor frumos. Insa gaseste echilibrul intre invatat si viata.
  6. NetRipper - Added support for Slack x64 https://github.com/NytroRST/NetRipper
  7. Nytro

    SecureWorks

    Stiu ca programul este de 12/24 12/48, dar nu stiu nimic de salariu. Stiam ca se platesc bine turele si colegii (de pe vremea cand lucram acolo) erau multumiti. Acum depinde si de voi. Daca sunteti la inceput, e o buna oportunitate de a intra in domeniul "security". Daca aveti ceva experienta, va puteti gasi altceva.
  8. NetRipper - Added support for Chrome 70 x64 https://github.com/NytroRST/NetRipper
  9. Nytro

    Problema exploit

    De unde ai rulat acel script? Are un backdoor si cineva are acces acolo!
  10. Nytro

    SecureWorks

    Am lucrat pana anul trecut, de ce anune ai fi interesat?
  11. Nytro

    Salutare tuturor, wget | perl

    Pare sa fie o vulnerabilitate Remote Command Execution. Daca e Drupal, poate sa fie Drupalgedon.
  12. Nytro

    [RST] XSS Fuzzer

    Mersi frumos!
  13. Nytro

    [RST] XSS Fuzzer

    What is XSS Fuzzer? XSS Fuzzer is a simple application written in plain HTML/JavaScript/CSS which generates XSS payloads based on user-defined vectors using multiple placeholders which are replaced with fuzzing lists. It offers the possibility to just generate the payloads as plain-text or to execute them inside an iframe. Inside iframes, it is possible to send GET or POST requests from the browser to arbitrary URLs using generated payloads. Why? XSS Fuzzer is a generic tool that can be useful for multiple purposes, including: Finding new XSS vectors, for any browser Testing XSS payloads on GET and POST parameters Bypassing XSS Auditors in the browser Bypassing web application firewalls Exploiting HTML whitelist features Example In order to fuzz, it is required to create placeholders, for example: The [TAG] placeholder with fuzzing list img svg. The [EVENT] placeholder with fuzzing list onerror onload. The [ATTR] placeholder with fuzzing list src value. The payloads will use the mentioned placeholders, such as: <[TAG] [ATTR]=Something [EVENT]=[SAVE_PAYLOAD] /> The [SAVE_PAYLOAD] placeholder will be replaced with JavaScript code such as alert(unescape('[PAYLOAD]'));. This code is triggered when an XSS payload is successfully executed. The result for the mentioned fuzzing lists and payload will be the following: <img src=Something onerror=alert(unescape('%3Cimg%20src%3DSomething%20onerror%3D%5BSAVE_PAYLOAD%5D%20/%3E')); /> <img value=Something onerror=alert(unescape('%3Cimg%20value%3DSomething%20onerror%3D%5BSAVE_PAYLOAD%5D%20/%3E')); /> <img src=Something onload=alert(unescape('%3Cimg%20src%3DSomething%20onload%3D%5BSAVE_PAYLOAD%5D%20/%3E')); /> <img value=Something onload=alert(unescape('%3Cimg%20value%3DSomething%20onload%3D%5BSAVE_PAYLOAD%5D%20/%3E')); /> <svg src=Something onerror=alert(unescape('%3Csvg%20src%3DSomething%20onerror%3D%5BSAVE_PAYLOAD%5D%20/%3E')); /> <svg value=Something onerror=alert(unescape('%3Csvg%20value%3DSomething%20onerror%3D%5BSAVE_PAYLOAD%5D%20/%3E')); /> <svg src=Something onload=alert(unescape('%3Csvg%20src%3DSomething%20onload%3D%5BSAVE_PAYLOAD%5D%20/%3E')); /> <svg value=Something onload=alert(unescape('%3Csvg%20value%3DSomething%20onload%3D%5BSAVE_PAYLOAD%5D%20/%3E')); /> When it is executed in a browser such as Mozilla Firefox, it will alert the executed payloads: <svg src=Something onload=[SAVE_PAYLOAD] /> <svg value=Something onload=[SAVE_PAYLOAD] /> <img src=Something onerror=[SAVE_PAYLOAD] /> Sending requests It is possible to use a page vulnerable to XSS for different tests, such as bypasses for the browser XSS Auditor. The page can receive a GET or POST parameter called payload and will just display its unescaped value. Contact The application is in beta state so it might have bugs. If you would like to report a bug or provide a suggestion, you can use the GitHub repository or you can send me an email to contact [a] xssfuzzer.com. Link: https://xssfuzzer.com/
  14. BSides Bucharest is a non-profit organization, independently run, community supported conference and part of the worldwide Security BSides movement. The idea behind the Security BSides Bucharest event is to organize a sales-pitch free Information Security community where professionals, experts, researchers, and InfoSec enthusiasts come together to discuss. Presenters – who should speak at the Bsides Bucharest 2018 Conference? IT Security professionals IT Security enthusiasts Companies, organisations and anyone else that is interested in the IT Security field. If you belong to one of those groups you are cordially invited to submit a talk proposal (or a number of proposals). Please submit your proposals here. Deadline is October 15, 2018 Please note: There is no guarantee that a submission will be put onto the conference agenda! The program committee picks the most interesting talk proposals and informs the selected submitters until 1st of November 2018. Any questions? Email organizers at contact@bsidesbucharest.org Detalii: https://bsidesbucharest.org
  15. Nytro

    Bsides Bucharest 2018

    Maine e BSides.
  16. Nytro

    WPA crack

    Salut, E ok sa generezi parole daca banuiesti un pattern anume. De exemplu, o data de nastere, un nume, un cuvant cheie. E de asemenea in regula sa faci bruteforce pe un anume charset: litere mari, mici si cifre. Dar pentru asta nu e nevoie sa generezi un fisier, programele care iti permit sa fac bruteforce se pot ocupa de asta (e.g. hashcat). Solutia cea mai simpla ar fi sa folosesti un dictionar de parole. Un bun exemplu ar fi "rockyou", pentru ca e foarte mare, dar poti gasi multe altele. Bafta!
  17. Nytro

    Black Friday

    Ati gasit ceva interesant si redus pe bune? In cateva minute, la 00:00, ar trebui sa inceapa la PCGarage, dar a crapat deja si nu se incarca. Edit: Merge. Greu, dar merge.
  18. Nytro

    35C3 CTF

    35C3 CTF Fellow CTF players, 35C3 CTF is officially confirmed. This is the 7th iteration of this event and it will be as awesome as ever! It is a Jeopardy style CTF and is open to everyone online. The contest will run for 48 hours, from Dec 27th, 20:00 UTC to Dec 29th, 20:00 UTC. As always, try not to ruin other people's fun. If you happen to be at the 35th Chaos Communication Congress, you are free to come and hack with us and register an assembly in the CTF area. There will be a less hardcore version of this CTF with a different, easier challenge set. You can read more about it on the linked website. The winner of this event will qualify for DEF CON Finals 2019! Of course, there will be pwnage! IRC: #35c3ctf@irc.hackint.org Twitter: @EatSleepPwnRpt 35C3 Junior CTF We are proud to announce that 35C3 CTF will have a junior version this year (also online!). This means that alongside the main event, there will be a separate scoreboard with an easier set of challenges. What is a CTF and why you should I play it? A good overview can be found here! Who can play? Everyone! There will be no shared challenges with the main contest, so you can play either one, or even both. However, we recommend the junior version for people interested in infosec, who have not played CTF before; CTF players who found last year's main CTF just a bit too hard to be fun; CTF players who want to get better at categories they don't usually work on during CTFs. While the main contest will have a strict no-hinting policy, for the junior version we can be a bit more helpful, so ask us questions in IRC or come swing by our area at the 35th Chaos Communication Congress. During the CTF, we will have people on-site that can help you get started and deal with problems. If you want, you can register an assembly in the CTF area. There will be pwnage here as well! Time: The contest will run for 48 hours, from Dec 27th, 20:00 UTC to Dec 29th, 20:00 UTC. IRC: #35c3ctf-junior@irc.hackint.org Twitter: @EatSleepPwnRpt Links: - https://35c3ctf.ccc.ac/announcements/ - https://junior.35c3ctf.ccc.ac/announcements/
  19. Nytro

    Black Friday

    Am vazut cateva reduceri pe bune si la emag, produse pe care le urmaream. Mi-am luat Bitdefender cu 90 RON in loc de 140 RON.
  20. Nytro

    Ce carti mai cititi?

    Poate doar mi se pare, dar cred ca elefant.ro chiar au reduceri pe bune: http://www.elefant.ro/
  21. Hackerul Guccifer, predat autorităților din SUA Marcel Lehel Lazăr, hacker-ul cunoscut drept „Guccifer” sau „Micul Fum”, a fost predat autorităţilor judiciare americane, în vederea executării pedepsei de 52 de luni de închisoare, pronunţată de către un tribunal federal din statul Virginia pentru furt de identitate cu circumstanţe agravante şi acces neautorizat la computere, potrivit informaţiilor furnizate, luni, Agerpres, de către Curtea de Apel (CA) Alba Iulia. Marcel Lehel Lazăr are de executat o pedeapsă de 52 de luni de închisoare Ca urmare a unei informări primite de la Interpol, CA Alba Iulia a transmis că Marcel Lehel Lazăr a fost extrădat autorităţilor judiciare din Statele Unite ale Americii, în conformitate cu prevederile sentinţei penale nr.61/10 septembrie 2018 a instanţei. Hacker-ul a fost predat autorităţilor judiciare americane în urmă cu câteva zile. „Guccifer” a fost condamnat în 2016 la închisoare, de către un tribunal federal din oraşul Alexandria, după ce a pledat vinovat la două din cele nouă capete de acuzare, respectiv la acuzaţiile de acces neautorizat la un sistem informatic protejat şi furt de identitate în formă calificată. A fost extrădat, în primăvara lui 2016, din România în SUA, pe perioada desfăşurării procedurilor judiciare, şi a fost adus din nou în ţară în octombrie 2016 şi încarcerat iniţial la Rahova. În septembrie, CA Alba Iulia a admis cererea de extrădare în SUA a hacker-ului, predarea acestuia fiind amânată până la data punerii în libertate ca urmare a liberării condiţionate sau a executării până la termen a pedepsei de 7 ani închisoare pe care o executa în România. Instanţa a constatat atunci că sunt întrunite condiţiile extrădării în ceea ce îl priveşte pe Lazăr şi a admis cererea formulată de autorităţile judiciare din SUA, înregistrată la Direcţia Drept Internaţional şi Cooperare Judiciară din cadrul Ministerului Justiţiei la data de 8 august. „Guccifer” a făcut contestaţie la decizia CA Alba Iulia, contestaţie care i-a fost însă respinsă de către Înalta Curte de Casaţie şi Justiţie în data de 5 octombrie. În 23 octombrie, Tribunalul Hunedoara a dispus liberarea condiţionată a acestuia din pedeapsa de 7 ani de închisoare primită pentru că a spart conturile de e-mail ale mai multor personalităţi din România. „Guccifer” a fost condamnat după ce s-a stabilit că a accesat în mod repetat şi fără drept, prin încălcarea măsurilor de securitate, conturile de e-mail aparţinând unor persoane publice din România, cu scopul de a intra în posesia datelor confidenţiale aflate în poşta electronică. Printre persoanele al căror e-mail a fost spart de „Guccifer” se află George Maior şi Corina Creţu. Rolul potenţial al lui Marcel Lazăr Lehel în ancheta privind spargerea contului de e-mail al lui Hillary Clinton a fost evocat prima dată în primăvara lui 2016 de către Fox News. Contul de e-mail al fostului secretar de stat conţinea circa 2.200 de e-mail-uri cu informaţii clasificate şi alte 22 de nivel Top Secret. Lazăr este bănuit că a spart circa 100 de conturi de e-mail în perioada 2012-2014. Printre persoanele vizate se numără fostul secretar de stat american Colin Powell, Sidney Blumenthal, un apropiat al lui Hillary Clinton, membri ai familiilor Bush şi Rockefeller, dar şi vedete din SUA. Sursa: https://www.digi24.ro/stiri/actualitate/justitie/hackerul-guccifer-predat-autoritatilor-din-sua-1031036?
  22. Nytro

    Metasploit Community CTF

    Faceti conturi de echipa repede, ca se atinge maximum permis si e posibil sa nu se mai poata.
  23. Nytro

    RSP - BACK

    Cumparati si voi o tema...
  24. July 19, 2018 Using a HackRF to Spoof GPS Navigation in Cars and Divert Drivers Researchers at Virginia Tech, the University of Electronic Science and Technology of China and Microsoft recently released a paper discussing how they were able to perform a GPS spoofing attack that was able to divert drivers to a wrong destination (pdf) without being noticed. The hardware they used to perform the attack was low cost and made from off the shelf hardware. It consisted of a Raspberry Pi 3, HackRF SDR, small whip antenna and a mobile battery pack, together forming a total cost of only $225. The HackRF is a transmit capable SDR. The idea is to use the HackRF to create a fake GPS signal that causes Google Maps running on an Android phone to believe that it's current location is different. They use a clever algorithm that ensures that the spoofed GPS location remains consistent with the actual physical road networks, to avoid the driver noticing that anything is wrong. The attack is limited in that it relies on the driver paying attention only to the turn by turn directions, and not looking closely at the map, or having knowledge of the roads already. For example, spoofing to a nearby location on another road can make the GPS give the wrong 'left/right' audio direction. However, in their real world tests they were able to show that 95% of test subjects followed the spoofed navigation to an incorrect destination. In past posts we've seen the HackRF and other transmit capable SDRs used to spoof GPS in other situations too. For example some players of the once popular Pokemon Go augmented reality game were cheating by using a HackRF to spoof GPS. Others have used GPS spoofing to bypass drone no-fly restrictions, and divert a superyacht. It is also believed that the Iranian government used GPS spoofing to safely divert and capture an American stealth drone back in 2011. Other researchers are working on making GPS more robust. Aerospace Corp. are using a HackRF to try and fuse GPS together with other localization methods, such as by using localizing signals from radio towers and other satellites. [Also seen on Arstechnica] Hardware and Method used to Spoof Car GPS Navigation. Sursa: https://www.rtl-sdr.com/using-a-hackrf-to-spoof-gps-navigation-in-cars-and-divert-drivers/
  25. Nytro

    Ce carti mai cititi?

    In ultima perioada am citit Dan Brown - Simbolul pierdut si m-am apucat de Machine Learning and Security. Doar fizic, nu imi place sa citesc in format electronic, fie el PC sau Kindle.
×