Jump to content

Search the Community

Showing results for tags 'hacking'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Informatii generale
    • Anunturi importante
    • Bine ai venit
    • Proiecte RST
  • Sectiunea tehnica
    • Exploituri
    • Challenges (CTF)
    • Bug Bounty
    • Programare
    • Securitate web
    • Reverse engineering & exploit development
    • Mobile security
    • Sisteme de operare si discutii hardware
    • Electronica
    • Wireless Pentesting
    • Black SEO & monetizare
  • Tutoriale
    • Tutoriale in romana
    • Tutoriale in engleza
    • Tutoriale video
  • Programe
    • Programe hacking
    • Programe securitate
    • Programe utile
    • Free stuff
  • Discutii generale
    • RST Market
    • Off-topic
    • Discutii incepatori
    • Stiri securitate
    • Linkuri
    • Cosul de gunoi
  • Club Test's Topics
  • Clubul saraciei absolute's Topics
  • Chernobyl Hackers's Topics
  • Programming & Fun's Jokes / Funny pictures (programming related!)
  • Programming & Fun's Programming
  • Programming & Fun's Programming challenges
  • Bani pă net's Topics
  • Cumparaturi online's Topics
  • Web Development's Forum
  • 3D Print's Topics

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Yahoo


Jabber


Skype


Location


Interests


Occupation


Interests


Biography


Location

  1. https://nitro.download/view/218D09D3DA26FF8/CA.PYTHON.FOR.BEGINNERS.22.2.part1.rar https://nitro.download/view/78C3D4BF0DFD09B/CA.PYTHON.FOR.BEGINNERS.22.2.part2.rar https://nitro.download/view/F7C4CB81DEF6109/CA.PYTHON.FOR.BEGINNERS.22.2.part3.rar https://nitro.download/view/D8C8CB1F28EDDD2/dsvwc.Learn.Complete.Python3.GUI.using.Tkinter.part1.rar https://nitro.download/view/1CAECD1D3A66DA0/dsvwc.Learn.Complete.Python3.GUI.using.Tkinter.part2.rar https://nitro.download/view/9BA674419AF6DFB/dsvwc.Learn.Complete.Python3.GUI.using.Tkinter.part3.rar https://nitro.download/view/354200A91CF53D7/E6WmUCHy__Learning_Python_Made_Easy.rar https://nitro.download/view/30B4D2D03EAE55E/F730hMoz_.PythonSkil.rar https://nitro.download/view/F9CB5731E8C754E/FuXfpb9X__pythonpand.rar https://nitro.download/view/DEF43A3DB3AEB97/hd3og.Python.Automation.Automate.Mundane.Tasks.with.Python.rar https://nitro.download/view/E33E5A1C0FE3E2D/Just_enough_Python_Programming_for_Beginners.part1.rar https://nitro.download/view/34EEBF8B257B765/Just_enough_Python_Programming_for_Beginners.part2.rar https://nitro.download/view/F02921EC9B64A56/Just_enough_Python_Programming_for_Beginners.part3.rar https://nitro.download/view/5F159C664DA43BB/Just_enough_Python_Programming_for_Beginners.part4.rar https://nitro.download/view/1C6A78C0270ECD6/khqcb.Learn.to.Code.with.Python.Updated.part1.rar https://nitro.download/view/F1611D21AF9A0A3/khqcb.Learn.to.Code.with.Python.Updated.part2.rar https://nitro.download/view/43BA53B1D30355C/khqcb.Learn.to.Code.with.Python.Updated.part3.rar https://nitro.download/view/B64C83C263E7965/khqcb.Learn.to.Code.with.Python.Updated.part4.rar https://nitro.download/view/90ED2122B5FCF99/khqcb.Learn.to.Code.with.Python.Updated.part5.rar https://nitro.download/view/2CCF3DC2318053D/Project-Based_Python_Programming_For_Kids_and_Beginners__Video_.rar https://nitro.download/view/8BDAA74045FC933/Python_A-Z_Learn_Python_Programming_By_Building_Projects.rar https://nitro.download/view/EEC35E3D0DA6AF1/Python_Programming_in_5_Hours.part1.rar https://nitro.download/view/1A501131E2FF856/Python_Programming_in_5_Hours.part2.rar https://nitro.download/view/42A1DA16DDCB604/rxc50.Unit.Testing.in.Python.rar https://nitro.download/view/D834009BDD88B70/XumTDwh9__Python__Ba.rar https://nitro.download/view/65B03CCE82CE19E/Python_Programming_in_5_Hours.part3.rar
  2. https://nitro.download/view/8B3EAE632DF4DA5/Pluralsight_-_Advanced_Malware_Analysis_-_Combating_Exploit_Kits.rar https://nitro.download/view/CF61C21F87C18AF/Pluralsight_-_Automated_Web_Testing_with_Selenium.rar https://nitro.download/view/89BE4DCFCB74438/Pluralsight_-_Ethical_Hacking_-_Sniffing.rar https://nitro.download/view/11253678B35572E/Pluralsight_-_Exploit_Development_and_Executin_with_Metasploit.rar https://nitro.download/view/742D42D7DF676F0/Pluralsight_-_Python_Beyond_The_Basics.rar https://nitro.download/view/3B68728B423A8EE/Pluralsight_-_Raspberry_Pi_for_Developers_Tutorial-kEISO.rar https://nitro.download/view/62AAB424BEA0E7A/Pluralsight_-_VMware_Virtual_SAN_(VSAN)_Fundamentals.rar https://nitro.download/view/093F8AE3D8337C5/Pluralsight_C%23_From_Scratch__OGNADROL_.rar https://nitro.download/view/6D325666B0F58AD/PluralSight_C%23_From_Scratch_Part_2.rar https://nitro.download/view/19224A472C05F9E/PLURALSIGHT_CREATE_A_WINDOWS_10_IMAGE_TUTORIAL.rar https://nitro.download/view/B94C3C7C18EF4CB/PluralSight_Electronics_Fundamentals_Tutorial.rar https://nitro.download/view/031181B896F67E4/PLURALSIGHT_INTRODUCTION_TO_BROWSER_SECURITY_HEADERS_TUTORIAL.rar https://nitro.download/view/514645DCD3BFC7D/PluralSight_Network_Operations_for_Comptia_NetworkPlus_N10-006_Tutorial.rar https://nitro.download/view/D4ACF26D065A42F/PLURALSIGHT_SOCIAL_MEDIA_MARKETING_FOR_YOUR_STARTUP_TUTORIAL.rar https://nitro.download/view/B75D9428CF90A0B/PLURALSIGHT_UNDERSTANDING_ENTERPRISE_ARCHITECTURE_TUTORIAL.rar https://nitro.download/view/377EF4EF1A81457/Pluralsight-CCIE_Routing_and_Switching__Implement_IPv4_and_IGPs.rar https://nitro.download/view/1B5BD178D2E7A12/PLURALSIGHT.ETHICAL.HACKING.HACKING.WEB.APPLICATIONS.TUTORIAL-kEISO.tar https://nitro.download/view/AB2018DFAA59623/PLURALSIGHT.ETHICAL.HACKING.HACKING.WEB.APPLICATIONS.TUTORIAL.rar https://nitro.download/view/3D42EEA91581060/PLURALSIGHT.ETHICAL.HACKING.HACKING.WEB.SERVERS.TUTORIAL-kEISO.rar https://nitro.download/view/C5046EA35D1584A/PLURALSIGHT.ETHICAL.HACKING.HACKING.WEB.SERVERS.TUTORIAL-kEISO.tar https://nitro.download/view/5450A7AC512557F/PLURALSIGHT.ETHICAL.HACKING.SQL.INJECTION.TUTORIAL-kEISO.rar https://nitro.download/view/6A49ADC990A028E/PLURALSIGHT.ETHICAL.HACKING.SQL.INJECTION.TUTORIAL-kEISO.tar https://nitro.download/view/C4B79FEFEE306C9/PLURALSIGHT.ETHICAL.HACKING.SYSTEM.HACKING.TUTORIAL-kEISO.tar https://nitro.download/view/0E4C97611808DC7/PLURALSIGHT.PENETRATION.TESTING.AND.ETHICAL.HACKING.WITH.KALI.LINUX.TUTORIAL-kEISO.tar https://nitro.download/view/E6CE492B8BF25D6/Pluralsight.Windows.Registry.Troubleshooting-XQZT.rar https://nitro.download/view/FC75150EFBCFD6F/CBT_Nuggets_-_Microsoft_Visio_2010_for_IT_Professionals.rar https://nitro.download/view/7A3841C0EC04228/CBT_Nuggets_70-413_Designing_and_Implementing_a_Server_Infrastructure.rar https://nitro.download/view/7B9C581570272E1/CCA_Citrix_Certified_Administrator.iso https://nitro.download/view/80E695705D0B63F/CEH_Certified_Ethical_Hacker.iso https://nitro.download/view/564E0AB33C5D1B8/CISA_Certified_Information_Systems_Auditor.iso https://nitro.download/view/ACED94F8309BE38/CISM_Certified_Information_Security_Manager.iso https://nitro.download/view/1555EB149E93851/CISSP_Certified_Information_Systems_Security_Professional.iso https://nitro.download/view/6C24B7C5D60BD9A/CIW_Certified_Internet_Web_Professional_-_CIW_Foundations.rar https://nitro.download/view/EFD25D3951F3FDB/CIW_Certified_Internet_Web_Professional_-_JavaScript_Fundamentals.iso https://nitro.download/view/2CB79F2A130ABCC/CWNA_Certified_Wireless_Network_Administrator.iso https://nitro.download/view/E7EFDB6C29CB0B7/CWNE_Certified_Wireless_Network_Expert.iso https://nitro.download/view/ED7957237F0BF61/en_windows_7_ultimate_x86_dvd.iso https://nitro.download/view/20D1450ECB0E442/ITIL_Information_Technology_Infrastructure_Library.iso https://nitro.download/view/492F25D47CADB00/LPIC-1_Linux_Professional_Institute_Certification.rar https://nitro.download/view/4E6856E20F9C1C1/LPIC-2_Linux_Professional_Institute_Certification.rar https://nitro.download/view/C801F865F23A342/OCA-DBA_Oracle_Certified_Associate_-_Database_Administrator.iso https://nitro.download/view/F8968F7D0E994A7/PMP_Project_Management_Professional.iso https://nitro.download/view/B3E7ADC45AF20F7/RHCE_1_Red_Hat_Certified_Engineer.iso https://nitro.download/view/BC4B21E813783EF/RHCE_2_Red_Hat_Certified_Engineer.iso https://nitro.download/view/EEE78BE9F42A40F/SCJP_Sun_Certified_Java_Programmer.iso https://nitro.download/view/F90D5961C27E393/SSCP_Systems_Security_Certified_Practitioner.iso https://nitro.download/view/E220E29940B4453/VBScript_Visual_Basic_Scripting.iso https://nitro.download/view/F9440DDFA2B2B12/VCP_VMware_Certified_Professional.iso https://nitro.download/view/05007C64BC75D74/Wireless%23.rar https://nitro.download/view/8619B2205D3CD87/ZCE_Zend_Certified_Engineer_PHP_5.iso https://nitro.download/view/B682A7014416489/Agile_Project_Management.iso https://nitro.download/view/A8DA7BDAB60450E/C%23_C-Sharp.iso https://nitro.download/view/4F03A66A39258AF/CIW_Certified_Internet_Web_Professional_-_Perl_Fundamentals.rar https://nitro.download/view/4ADE0DD5F66690B/CWNA_Update.rar https://nitro.download/view/B8255A92973F557/End_User_Security.rar
  3. Write-ups of All types Bugs Bug Bounty Writeups and exploit‘s resource Read More : https://reconshell.com/bug-bounty-resources/
  4. Venom psh-cmd-exe persistence payload Tutorial-By Spirit Hello guys I am Spirited wolf as you all know and today i'm here to demonstrate a tutorial on Persistence using Metasploit-Framework. So, for this we will use the Venom-The Shellcode Generator for this ================================ Tutorial Link:: Venom Tutorial link ================================== So, Venom is a toolkit designed by my friend and it's really very awesome toolkit You can download it from here:: https://sourceforge.net/projects/crisp-shellcode-generator/ (Point to remember :: The Version that i am using is currently in Developer Stage you can't download it) ====================================================== This Tutorial is for educational purpose only , I'll not be responsible for any Harm. ====================================================== Please Subscribe My Channel If you like it:: www.youtube.com/c/Pentestingwithspirit Please Like My Facebook Page:: www.facebook.com/Pentestingwithspirit Follow me on Twitter:: @spirit3113
  5. Degeaba banati conturi. Inca astept mesaje de la oamenii interesati. Pentru cei ce nu stiu , suntem o echipa si avem nevoie de cunostiintele tale in hacking la un nou nivel.
  6. Salut, Are cineva idee cum sa hack usb Chromecast? Or playstation3? Pentru scopuri educationale... Folosind kali Linux si python script... Hack Chromecast usb and upload o image/ce vrei pe tv, asta e in esenta. O zi buna...
  7. https://comp.st/o3iG thank me later
  8. Washington (CNN): Two Romanian hackers infiltrated nearly two-thirds of the outdoor surveillance cameras in Washington, DC, as part of an extortion scheme, according to federal court documents. In a criminal complaint filed last week in the US District Court for the District of Columbia, the US government alleges that the two Romanian hackers operating outside the United States infiltrated 65% of the outdoor surveillance cameras operated by DC city police — that's 123 cameras out of 187 in the city. The alleged hacking occurred during a four-day period in early January. The hacking suspects, Mihai Alexandru Isvanca and Eveline Cismaru, are also accused of using the computers behind the surveillance cameras to distribute ransomware through spam emails, according to an affidavit by Secret Service agent James Graham in support of the government's criminal complaint. The affidavit alleges the hackers meant to use the malware to lock victims' computers and then extort payments from them to regain access. In the affidavit, the Romanians are accused of "intent to extort from persons money and other things of value, to transmit in interstate and foreign commerce communications containing threats to cause damage to protected computers." They were traced through their registered email addresses, one of which roughly translates into "selling souls" in Romanian, according to the affidavit. http://edition.cnn.com/2017/12/20/politics/romanian-hackers-dc-cameras/index.html
  9. Hi all, while surfing various IRC Channels, i have come across a list of very useful links, courses to get into hacking URL: https://ghostbin.com/paste/j858d There are courses for computer basics, hacking, programming and many more Good luck in your long journey of learning!
  10. Salut, Un amic de-al meu, Alexandru B, fiind student la master in cadrul Facultatii de Psihologie, si-a ales tema de disertatie Criminologie Informatică: Particularitatile tulburarilor de personalitate ale hackerilor sub conditiile agresivitatii si stimei de sine si identificarea hackerilor "de mâine". Lucrarea presupune efectuarea unui studiu asupra catorva grupuri de persoane: non-hackers, white hat hackers, grey hat hackers si black hat hackers cu scopul de a sublinia aspecte psihologice ale hackerilor, in ideea in care in Romania nu a mai fost efectuat vreun studiu similar. Ma adresez tuturor care sunt interesati sa participe la acest studiu, sa completeze chestionarul de mai jos. Pot sa va asigur de urmatoarele aspecte: - Completarea chestionarului este anonima: nu se colecteaza date personale sau date care ar putea ajuta la identificarea participantilor la studiu - Chestionarul este construit folosind Google Forms care NU ofera informatii despre respondent precum email/cont Google/IP/tara/etc, si puteti chiar folosi Tor/VPN/proxy/etc alaturi de un throw-away account daca simtiti nevoia. Ca si multumire, in afara de faptul ca lucrarea va fi publicata, Alexandru va oferi si cateva materiale (carti, articole) pe domeniu. Rog seriozitate si pe cat posibil mai putin spam Link formular: https://goo.gl/forms/DhA7ElPVo1dYql5k2 Multumesc, shark0der
  11. Hi all, there is a website that I found where you can practice your website hacking skills. There are 50 vulnerabilities to be found, this website goes along with the courses from my previous course where I provide a URL with a plethora of courses The URL of this website: http://hackyourselffirst.troyhunt.com/ Good luck.
  12. Ma ajuta si pe mine cineva sa imi dea niste cursuri despre java..html si toate celelalte chestii explicate pentru cei care habar nu au de asa ceva. Mersi mult..
  13. Salutare tuturor! Sunt la Facultatea de Psihologie la Master, iar lucrarea mea implică să dau un chestionar de personalitate celor care știu să facă hacking de orice tip sau hacktivism. Totul este confidențial....iar rezultatele finale vi le pot da. Vreau să întreb dacă ați completa un chestionar în google forms de acest tip ca să vă atașez linkul? http://researchcentral.ro/index.php?action=listateste&ID=96 Aștept păreri!
  14. The hacker says this demonstrates that when organizations make hacking tools, those techniques will eventually find their way to the public. In January, Motherboard reported that a hacker had stolen 900GB of data from mobile phone forensics company Cellebrite. The data suggested that Cellebrite had sold its phone cracking technology to oppressive regimes such as Turkey, the United Arab Emirates, and Russia. Now the hacker responsible has publicly released a cache of files allegedly stolen from Cellebrite relating to Android and BlackBerry devices, and older iPhones, some of which may have been copied from publicly available phone cracking tools. "The debate around backdoors is not going to go away, rather, its is almost certainly going to get more intense as we lurch toward a more authoritarian society," the hacker told Motherboard in an online chat. "It's important to demonstrate that when you create these tools, they will make it out. History should make that clear," they continued. Cellebrite is an Israeli firm which specializes in extracting data from mobile phones for law enforcement agencies. The company's flagship product, the Universal Forensic Extraction Device (UFED), typically comes as a small, laptop-sized device, and can pull SMS messages, emails, and more from thousands of different mobile phone models. The investigator needs to have physical access to the phone to analyze it. A Motherboard investigation found that US state police and highway patrol agencies have collectively spent millions of dollars on Cellebrite technology. The hacker claimed to have taken the newly released data from a remote Cellebrite server, and said they had extracted them from UFED images. They told Motherboard that the files were encrypted, likely in an attempt to protect Cellebrite's intellectual property, but that they managed to bypass the protections. The hacker's ASCII art, which reads "backdoorz." "The ripped, decrypted and fully functioning Python script set to utilize the exploits is also included within," the hacker wrote in a README file accompanying the data dump. The hacker posted links to the data on Pastebin. It's not clear when any of this code was used in the UFED. Many of the directory names start with "ufed" followed by a different type of phone, such as BlackBerry or Samsung. In their README, the hacker notes much of the iOS-related code is very similar to that used in the jailbreaking scene—a community of iPhone hackers that typically breaks into iOS devices and release its code publicly for free. Jonathan Zdziarski, a forensic scientist, agreed that some of the iOS files were nearly identical to tools created and used by the jailbreaking community, including patched versions of Apple's firmware designed to break security mechanisms on older iPhones. A number of the configuration files also reference "limera1n," the name of a piece of jailbreaking software created by infamous iPhone hacker Geohot. He said he wouldn't call the released files "exploits" however. Zdziarski also said that other parts of the code were similar to a jailbreaking project called QuickPwn, but that the code had seemingly been adapted for forensic purposes. For example, some of the code in the dump was designed to brute force PIN numbers, which may be unusual for a normal jailbreaking piece of software. "If, and it's a big if, they used this in UFED or other products, it would indicate they ripped off software verbatim from the jailbreak community and used forensically unsound and experimental software in their supposedly scientific and forensically validated products," Zdziarski continued. A spokesperson for Cellebrite told Motherboard in an email: "The files referenced here are part of the distribution package of our application and are available to our customers. They do not include any source code." He added that the company monitors new research from academia and the information security community, including "newly published forensic methods, research tools and publicly documented issues, including "jailbreaks," which enable platform research." Cellebrite develops methods for gaining access to phones that do not change or alter data on the device, the spokesperson continued. He wrote that Cellebrite's technology is used to combat child trafficking and exploitation, sexual assault, murder, and drug and gang crime. In its statement released in response to the initial data breach, Cellebrite only mentioned that "basic contact information" of its customers had been stolen. But as Motherboard reported at the time, the cache of data included much more. In early 2016, the Department of Justice and Apple entered a fierce legal battle, in which the department tried to legally compel Apple to build a custom operating system that would allow investigators to bypass security protections on an iPhone. A concern at the time was that, if such an operating system was created, it could leak and become public. Although these dumped tools may not be the most sensitive—Cellebrite keeps its techniques for cracking more recent iPhones inhouse—they do demonstrate that those worries were justified. Researchers will likely now dig through the content for any interesting attacks or findings. "@FBI Be careful in what you wish for," the hacker's message reads, before signing off with a piece of ASCII art, which says "Backdoorz." https://motherboard.vice.com/en_us/article/hacker-dumps-ios-cracking-tools-allegedly-stolen-from-cellebrite
  15. Thread-ul principal cu anunturi & noutati despre DefCamp 2016! Primul anunt e in urmatorul post.
  16. Test Microsoft Edge and versions of IE6 through IE11 using free virtual machines you download and manage locally. https://dev.windows.com/en-us/microsoft-edge/tools/vms/ About Your Virtual Machine: Please note that these virtual machines expire after 90 days. We recommend setting a snapshot when you first install the virtual machine which you can roll back to later.
  17. Top 10 OWASP-Cross-site Scripting (XSS)-By Spirit Hello guys:blackhat: I am Spirit as you all know and today i am here to give a Nooby or a simple tutorial on Xss attack i.e:Cross Site Scripting. So, before doing XSS you should learn the basics of Javascript. You can learn it from here http://www.w3schools.com/js Tutorial:: ------------------------------------------------------------------------------------------------------------ This Tutorial is for educational purpose only i will not responsible for any harm. ------------------------------------------------------------------------------------------------------------ Thanks for watching guys and keep watching pentesting with spirit :victoire: And please subscribe :thumbsup: Our youtube Channel link:: https://www.youtube.com/c/Pentestingwithspirit Facebook page link:: http://facebook[dot]com/Pentest.with.spirit1 Twitter account:: @spirit3113
  18. Some basics tutorials of Metasploit- by Spirit Hello Guys, My name is Spirited wolf and today i am here to share my some nooby tutorial's of Metasploit :blackhat: So, first thing is what is Metasploit? ->So, my answer will be Metaspoit Framework is a open source penetration tool used for developing and executing exploit code against a remote target machine it, Metasploit frame work has the world’s largest database of public, tested exploits. In simple words, Metasploit can be used to test the Vulnerability of computer systems in order to protect them and on the other hand it can also be used to break into remote systems. Its a powerful tool used for penetration testing. Learning to work with metasploit needs a lot of efforts and time. Ofcourse to can learn metasploit overnight, it needs lots of practice and patience. So, here you go the :drinks: Cheerz... [Part 1]Hacking into Windows using Setoolkit+Measploit tutorial-By Spirit [Part 2]Create a Key logger to Sniff HTTPS data with metasploit tutorial-By Spirit [Part 3]Disable your victim's Windows Firewall using Metasploit-Tutorial by Spirit [Part 4]How to exploit any Windows/Linux by Firefox_xpi_bootstrapped_add-on exploit tutorial-By Spirit [Part 5]OS Command Injection Tutorial-By Spirit If you Like these Tutorial then please subscribe my channel and also do share please :drinks: But any ways it just for the newbies not for professional's :ifyouknowwhatImean: Please comment if i done anything wrong.:blackhat: ----------------------------------------------------------------------------------------------------------- This tutorial is for educational purpose only. I'll not responsible for any harm. ------------------------------------------------------------------------------------------------------------ Use your skills to protect other not to harm kiki emoticon Thanks for watching guys and keep watching pentesting with spirit Our youtube Channel link:: https://www.youtube.com/c/Pentestingwithspirit Facebook page link:: http://facebook[dot]com/Pentest.with.spirit1 Twitter account:: @spirit3113
  19. Un write up frumos din partea unei tanti din Romania ce aparent traieste in Canada. Contine cateva puncte bune. " Are penetration testing phases different from the ones of a malicious attack? The answer is no. Both malicious attackers and penetration testers go through the same stages or phases in their attacks/tests: 1. Gathering Information phase. During this stage, as much as possible data on the target is collected (e.g. the target IP address range, domain name registration records, mail server records, etc.), to design the blueprint of the target. 2. Scanning phase. The target is scanned for entry points such as wireless access points, lnternet gateways, available systems, running services, vulnerability lists, and port listening. Other tests would check if default user IDs, passwords, and guest passwords have been disabled or changed and no remote login is allowed. 3. Gaining Access phase. Based on the vulnerabilities which were identified during scanning, attempts are made to access the system. To accomplish this task, one could use automated exploit tools, or legitimate information obtained from social engineering. 4. Maintaining Access phase. Once access has been acquired, attempts are made to escalate the privileges to root/admin and then to upload a piece of code (also named “backdoor”) on the target so that access to the target is maintained independent from the authorized entry points into the system/network. This will allow to connect to the target anytime. 5. Covering Tracks phase. This phase is same important as the previous ones, as leaving a mark can show how elevated access to protected resources can be obtained and this information can be later on maliciously be used by others with access to the system. This phase involves restoring the system to normal pretest configurations, which includes removing files, cleaning logs, registry entries, deleting the uploaded backdoor, etc. " Source: Adeptus Mechanicus PenTest - DEICE-S1.140
  20. Salut, Hello, Content de te revoir! Sunt cunoscut ca si Pix_xiE pe web. Am fost atras de computere inca de la varsta de 7 ani insa familia mea nu si-a permis un computer pe atunci asa ca le-am acordat putina atentie. In 2006 ai mei mi-au cumparat primul computer intr-o zi de iarna (in apropiere de Craciun). Am fost atras de idee in general, ideea de a avea acces la o baza atat de mare de informatii intr-un monitor atat de mic (acum a devenit ceva mai mare si a facut 2 copilasi, dar nah; pana si monitoarele se maturizeaza ). V-ati gandit vreodata ce-ar putea face un adolescent daca si-ar sincroniza timpul petrecut la computer astfel incat sa se concentreze DOAR pe lucrurile care i-ar putea schimba/imbunatati felul in care gandeste si viata ? Presupun ca da. "knowledge is power" , asa a fost si asa va ramane. La 15 ani am auzit prima oara de conceptul de bitcoin iar la 16 ani, cand navigand la intamplare pe un forum cineva discuta despre noua moneda virtuala. Am inceput prin a ma interesa pe cat de mult despre felul in care functioneaza acest sistem lovindu-ma de notiuni ample de criptografie, matematica si informatica. Acum 2 ani, intr-o zi oarecare si avand cateva probleme personale si financiare am vazut in bitcoin o portita spre un taram al viselor. Acela a fost momentul in care m-am decis sa ma apuc serios de studiat securitatea sistemelor (cu alte cuvinte daca stii cum functioneaza securitatea unui computer/server stii si cum sa o spargi, ceea ce este adevarat.Ex: Daca stii cum sa inchizi o usa, stii si cum sa o deschizi, e logic.) Am fost atras in mare parte de metodele de criptografie folosite de moneda si de raspunsul la intrebarea: cum pot deschide portofelul x fara o parola, cum pot afla o parola de la sistemul y si cum pot transfera de la x la y fara a lasa vreun log in urma. Asa am pus bazele unui mic grup cu cativa prieteni de facultate. Am aflat mai multe despre diverse metode intr-un loc numit deep web dupa cateva zile de cautare, cei care au auzit stiu despre ce vorbesc. Informatiile pe care le poti gasi acolo sunt mind-blowing. daca stii cum si unde sa cauti. Nu am facut asta pentru bani (moneda Bitcoin este una foarte interesanta) banii sunt un bonus, o recompensa care ne aduce cu un nivel mai sus fata de restul. In primul rand majoritatea o facem pentru ca ne macina o curiozitate si suntem alergici la mistere cand vine vorba de lumea virtuala (sau de fete). Altii o fac doar pentru bani si le inteleg motivele unora, Romania este o tara saraca si ma tem ca va fi pentru mult timp. Hackingul mi-a schimbat viata din mai multe puncte de vedere si mi-a schimbato in bine. In viata de zi cu zi ma ocup de asigurarea securitatii la o firma de IT renumita, in timpul liber imi fac de cap. In rest, sunt un om simplu si obisnuit la fel ca si voi. Un singur mesaj pentru micii incepatori in lumea hackingului: Fiti curiosi, curiozitatea este una dintre cele mai frumoase trasaturi umane. Folositi-va abilitatile pentru a schimba lumea in ceva mai bun decat azi si luptati pentru a face din visele de azi realitatea de maine Daca va pot ajuta cu ceva aveti trimiteti-mi un pm, voi raspunde in timpul liber. SUCCES ! P.S. Joke time: Daca va intalniti cu vreun agent FBI trimiteti-le mesajul asta din partea mea www.youtube.com/watch?v=j5-yKhDd64s -Pix_xiE is NOT afraid-
  21. O carte pentru pasionatii de hacking : Zippyshare.com - The_Hacker_Playbook_2_-_Peter_Kim.rar Have Funk!
  22. As vrea sa incepem azi o serie de tutoriale despre hacking. In functie de parerea voastra, vom cuntinua sau nu.
  23. Probabil, majoritatea userilor care activeaza pe aceasta comunitate, a incercat sa invete sau sunt in procesul de a invata sau au invatat un limbaj de programare la nivel mediu/pro. Cat v-a luat sa invatati, in ce imprejurimi, si de cata rabdare ati avut nevoie? Edit: Ma refer la perioada in care v-ati acomodat cu limbajul/sintaxa si modul de programare, sa zicem un nivel mediu de cunostinte. E normal ca nu poti stapanii un limbaj 100%, dar exista acea perioada de "awakening" in care iti dai seama cum merg lucrurile si totul pare mai usor si de pus in practica , si e mai usor sa asimilezi alte concepte/idei.
  24. Hello everyone how are you i found this forum on google while serching for SMTP scanner. i love this forum they are very focus in hacking insted blackhat. im from malaysia and looking forward to you all! Salute Romanian!
  25. Am primit emailul urmator de la Udemy, si m-am gandit la voi. Pentru cei interesati: ############### Hi, this is Andrew from Hacking School team. WWH 4.0 is coming! From now on till the end of the weekend (+ 1 more day for sleepyheads) we're celebrating Weekend With Hacking - Strike 4! So again I prepared a huge discount for you. This is the real deal. You can get all of our IT Sec / Hacking related courses for only $9 (yes, nine bucks!), saving up to 90% of the regular price. Just use this coupon code: 4HACK Like last month, there's a little catch. We're giving you this huge discount in exchange for your feedback. You can leave your review on the course dashboard. Just select your rate and write a short paragraph about the selected training. If you already enrolled in several courses, just pick your favorite one and leave us a note. And this is what you can get during Weekend With Hacking 4.0 (coupon code is already applied): - !!! LAST PREMIERE Rootkits and Invisible Software course – only $9 instead of $97 - Best-selling IT Security Beginner: Certified Hacking Training - only $9 instead of $99 (over 9538 students already enrolled) - Best-selling IT Security Professional: Certified Hacking Training - only $9 instead of $99 (over 4497 students already enrolled) - Best-selling Hacking School: Computer and Network Hacking Mastery Course - only $9 instead of $97 (over 2929 students enrolled) - Hacking School: Website Hacking in Practice course - only $9 instead of $79 (over 3883 students already enrolled) - New Windows 2008 R2 – Hacking and Securing – only $9 instead of $99 !!! - Windows 8: Hacking and Securing course - only $9 instead of $79 - Windows 7: Hacking and Securing course - only $9 instead of $79 - Hacking School: Hacking Wireless Networks. Theory and practice - only $9 instead of $99 - Windows Server 2008 R2 Administration Exam prep. course – only $9 instead of $99 - Hacking Academy: METASPLOIT - Penetration Tests from Scratch - only $9 instead of $89 I invite you to enroll and hope to see you inside! P.S. Please don't forget to leave us a review after you use the coupon code. Thanks! Best regards, Andrew from Hacking School Support Team ###### Spor la treaba!
×
×
  • Create New...