Jump to content

DuTy^

Active Members
  • Posts

    836
  • Joined

  • Last visited

  • Days Won

    7

Everything posted by DuTy^

  1. What is LFI Suite? LFI Suite is a totally automatic tool able to scan and exploit Local File Inclusion vulnerabilities using many different methods of attack, listed in the section Features. Features Works with Windows, Linux and OS X Automatic Configuration Automatic Update Provides 8 different Local File Inclusion attack modalities: /proc/self/environ php://filter php://input /proc/self/fd access log phpinfo data:// expect:// Provides a ninth modality, called Auto-Hack, which scans and exploits the target automatically by trying all the attacks one after the other without you having to do anything (except for providing, at the beginning, a list of paths to scan, which if you don't have you can find in this project directory in two versions, small and huge). Tor proxy support Reverse Shell for Windows, Linux and OS X How to use it? Usage is extremely simple and LFI Suite has an easy-to-use user interface; just run it and let it lead you. Reverse Shell When you got a LFI shell by using one of the available attacks, you can easily obtain a reverse shell by entering the command "reverseshell" (obviously you must put your system listening for the reverse connection, for instance using "nc -lvp port"). Dependencies Python 2.7.x Python extra modules: termcolor, requests socks.py Tool: https://github.com/D35m0nd142/LFISuite
  2. DuTy^

    Swap Digger

    SWAP_DIGGER – TOOLS TO AUTOMATE LINUX SWAP ANALYSIS DURING POST-EXPLOITATION OR FORENSICS. -- swap_digger -- Author: Emeric NASI (Sio) at blog.sevagas.com swap_digger is a bash script used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc. Tool: https://github.com/sevagas/swap_digger
      • 1
      • Upvote
  3. Hash Buster is a python script which uses several online hash crackers to find cleartext of a hash in less than 5 seconds. Features of Hash Buster: Detects hash MD5 Support SHA1 Support SHA2 Support Adding more APIs for SHA1 and SHA2 Tool: https://github.com/UltimateHackers/Hash-Buster
      • 1
      • Upvote
  4. ron?
  5. DuTy^

    Goodbye!

    Rest in peace! Dumnezeu sa aibe grija de tine! We all go back at 127.0.0.1 one day!
  6. Aveti Droperul?
  7. @miska mai documenteazate tinere inainte sa spui numai prostii...
  8. Salutare, acum 35 minute in Spania a inceput sa explodeze la nivel informatic, multe firme mari gen Telefonica (gen romtelecom la noi) BBVA Capgemini Orange Pwc Vodafone si mult mai multi printre care si banci au fost infectate de ransomware care se multiplica utilizand eternalblue cu doublepulsar. Marea majoritate a pc-urilor infectate erau windows 7. (Asta cred eu ca sa intamplat ca au folosit eternalblue, inca nu au spus nimic oficial) Cei de la telefonica au trimis mail la toata compania sa opreasca calculatoarele si tot ce e conectat la retea si sa desconecteze telefoanele de la wifi, au anuntat la fel prin megafonie la sediul central, dupa toata lumea a fost scoasa afara (zici ca era apocalipsa) Da-ti si voi cu translate http://www.telecinco.es/informativos/tecnologia/Telefonica-ataque-malware-hackeo_0_2369850315.html Eu astept sa se strecoare pe undeva prin ATM-uri, atunci sa vezi haos. Asa ca stiu ca e urat, dar faceti update la windows ca de acum o luna a iesit patch-ul // despre subiect in engleza: https://www.bleepingcomputer.com/news/security/telefonica-tells-employees-to-shut-down-computers-amid-massive-ransomware-outbreak/ //usr
  9. Okei, in sfarsit l-am rezolvat suntem aproximmativ 4 persoane care l-au rezolvat, o sa fac un write-up, si dupa ce se termina il public
  10. Salutare, e o conferinta de hacking, pe aici pe unde stau eu, la care poti intra decat rezolvand un CTF. Au trecut 3 zile de cand e online si decat baietii de la Follow the White Rabbit (FWHIBBIT), au reusit sa il scoata (2 dintre ei). Daca sunteti in Spania si il scoateti, misto, puteti sa veniti la conferinta. Ca sa nu ziceti ca il pun aici ca sa va pun la munca sa il scoateti si sa ma duc eu la conferinta, daca il scoateti nu spuneti raspunsul pana nu apare write-up -ul si il comparam. Daca vreti sa faceti 100€ ziceti-mi cum ati facut Linkul este asta: https://checkin.faqin.org/ <- this is the start. Eu am ajuns pana la the zone. Si acolo am ramas toti, daca va impolmoliti pana la the zone, spuneti-mi si va dau o mana de ajutor. Have fun!
  11. Spune si care este scopul, ca sa te putem ajuta cum trebuie. Daca vrei sa un program de genu pentru tine, ca ai un bar si vrei sa nu dai bani pe unul platit, ai aici o lista http://blog.capterra.com/the-top-6-free-and-open-source-pos-solutions/ Am folosit uniCenta e open source, scris in java, e usor de modificat si mi-a placut.
  12. Mie mereu cand intru imi apare asta pentru cateva secunde si dupa incarca calumea http://imgur.com/gHAtGLA
  13. Okei, acum sunt la un curs. Diseara ajung la home station si iti scriu
  14. Salut, ma intereseaza procesorul si placa, amandoua la 1200 RON corect? Plus sursa. Vroiam sa te intreb daca le trimiti si afara, spania mai exact! Plata si trimiterea, imi spui cum preferi. Mersi,
  15. aHR0cDovL3guY28vNmxuMDM= Uite-l aici, te duce direct la site
  16. Tell me how to hijack the wireless connection between the wireless mouse and receiver and inject a payload in the mouse nand memory to give me a meterpreter, in any os. I'm waiting you answer, hacker group!
  17. Am comandat un Raspberry zero, si o sa incerc sa fac un poc. Va tin la curent cu ce mi se intampla
  18. A nine-year-old critical vulnerability has been discovered in virtually all versions of the Linux operating system and is actively being exploited in the wild. Dubbed "Dirty COW," the Linux kernel security flaw (CVE-2016-5195) is a mere privilege-escalation vulnerability, but researchers are taking it extremely seriously due to many reasons. First, it's very easy to develop exploits that work reliably. Secondly, the Dirty COW flaw exists in a section of the Linux kernel, which is a part of virtually every distro of the open-source operating system, including RedHat, Debian, and Ubuntu, released for almost a decade. And most importantly, the researchers have discovered attack code that indicates the Dirty COW vulnerability is being actively exploited in the wild. Dirty COW potentially allows any installed malicious app to gain administrative (root-level) access to a device and completely hijack it. http://thehackernews.com/2016/10/linux-kernel-exploit.html Lucrez deocamdata, dar dupa ce obtin root imi da un kernel panic la un interval de 15-30 secunde https://github.com/dirtycow/dirtycow.github.io/blob/master/dirtyc0w.c Android Poc https://github.com/timwr/CVE-2016-5195
  19. Dute ba la sapa, mai creste si tu mai invata, mai cultiveazate. Numai ciorapei din astia ma critica, nu vine niciunu cu, capul pe umeri sa ma comenteze. Cred ca esti vreun pustan 14-19 ani care sta cu parintii/bunicii ca sa plateasca netu odata cu televizoru de la RDS, care nici incredere in ce ii iese pe gura nu are, freaca duda toata ziua si o arde pe forumuri incercand si el sa faca ceva, e constienti ca nu stie nimic. Toate caracteristicile astea se denota din faptul ca ai pierdut 10 min sa ma verifici pe forum, sa vezi cine sunt si ce fac, ca sa iti calculezi vorbele, sa stii cu cine sa te bagi. Poate daca erai la munca..... In fine, poate ca nu ai inteles cum merge forumul asta si ca esti prea proaspat. Mai da o tura!
  20. Nu stim. Toti muncim legal.
  21. Nu mai vorbii daca nu stii. Eu am schimbat 3 SSD-uri de 16TB pana acum. O gramada de bani. Nu stiam de la ce e pana nu am vazut sitrea asta care mi-a limpezit mintea si m-a spalat de pacate.
  22. Suflati in trompeta =)))))))))))))))
  23. De la 130dBi, la fel cum acele ca la pick-up de la HDD-uri sar de pe piulita. La SSD-uri din cauza vibratiei sunetului excesive, se agita la nivel molecular atomii de curent care transporta informatia prin boardul pre-made pe care sunt asezate cipurile NAND de memorie cu write/read definite, si provoaca cum ar veni o supra incalzile a enviromentului si la pierdere importanta de date gen input/output error... E naspareala cu astea...
  24. le poti pune intr-un zip. please
×
×
  • Create New...