Welcome, Guest
You have to register before you can post on our site.

Username
  

Password
  





Search Forums

(Advanced Search)

Forum Statistics
» Members: 82
» Latest member: onpoyopasop
» Forum threads: 13
» Forum posts: 36

Full Statistics

Online Users
There are currently 10 online users.
» 0 Member(s) | 10 Guest(s)

Latest Threads
CEH Certified Ethical Hac...
Forum: Hacking Tools and Programs
Last Post: singhkajay
10-20-2020, 10:33 AM
» Replies: 1
» Views: 233
Южная жизнь
Forum: Announcements and Rules
Last Post: Gerardokig
10-20-2020, 08:33 AM
» Replies: 1
» Views: 43
Acunetix 13.0.200911171 P...
Forum: Hacking Tools and Programs
Last Post: User3301
10-03-2020, 08:06 PM
» Replies: 6
» Views: 375
Dark Side
Forum: Announcements and Rules
Last Post: Regabibia
10-01-2020, 11:44 AM
» Replies: 2
» Views: 269
Major
Forum: Announcements and Rules
Last Post: Regabibia
10-01-2020, 10:46 AM
» Replies: 4
» Views: 596
Nesus v8.9.1 with all upd...
Forum: Hacking Tools and Programs
Last Post: navinpal1234
09-29-2020, 03:53 PM
» Replies: 3
» Views: 194
Metasploit Zerologon Modu...
Forum: Hacking Tools and Programs
Last Post: malandraum
09-27-2020, 12:35 PM
» Replies: 0
» Views: 82
Microsoft Windows XP Sour...
Forum: Hacking Tools and Programs
Last Post: raiduserrussia
09-27-2020, 11:58 AM
» Replies: 0
» Views: 76
Microsoft Windows Server ...
Forum: Hacking Tools and Programs
Last Post: raiduserrussia
09-27-2020, 11:57 AM
» Replies: 0
» Views: 74
COBALT STRIKE 4.1 FREE D...
Forum: Hacking Tools and Programs
Last Post: raiduserrussia
09-27-2020, 11:51 AM
» Replies: 3
» Views: 317

 
  Южная жизнь
Posted by: Irina - 10-17-2020, 07:21 AM - Forum: Announcements and Rules - Replies (1)

Золотой пляж анапа

Print this item

  Nesus v8.9.1 with all updates!
Posted by: malandraum - 09-27-2020, 12:44 PM - Forum: Hacking Tools and Programs - Replies (3)

About the use of Nessus' new plug-in package and the use of the latest version of AWVS

This article has a total of 2054 words, thank you for your patience and comments.
Friends have always been asking me in messages or emails, asking me if the new plug-in package of Nessus can't be used in the old version. I tested it today and it can be used. It is still combined with which version I posted before. For details, please see here: Today I tested the new plug-in package: all-2.0(20200825).tar as an example , Simply talk about how to use,
premise: first stop Nessus service, [font=font-size:16px;white-space:normal;background-color:#FFFFFF;]net stop "Tenable Nessus" (requires administrator rights), see the above article for details, there are instructions.[/font]
One sentence summary:
Close the Nessus service, download the plug-in package all-2.0(20200825).tar, then unzip it to a place, then open the command prompt cmd window with administrator privileges, and use the copy command to overwrite the plug-in package directory of Nessus, Start the Nessus service, open the browser, and wait for the plug-in to be reloaded.
Long-winded explanation: The
general path is Nessus \nessus\plugins under the installation path of Nessus. Please check your installation path yourself, find the plugin directory, and copy the path. Then enter your Nessus installation path, my path is D:\ Nessus\nessus\plugins\,   and then remember the path after decompression, for example, decompress in D:\downlods\all-2.0(20200825)\, just in the command Line cd  D:\After Nessus\nessus\plugins\ press Enter, execute: copy  D:\downlods\ all-2.0(20200825)\* ./ /Y
After entering , wait a few minutes, there are a lot of files, more than 123,000  , recommended This kind of command line copy, graphical interface, afraid that you will be stuck...
After copying, start the Nessus service. , Open the browser and wait for the plug-in to be loaded.


[Image: thum-3e8b1598878678.png] 

Nessus plugin package all-2.0(20200825).tar:
https://cloud.189.cn /t/E7Zja27bM32y (Access code: qp4h)
I also provide an initial version of the plugin package all-2.0(20200321).tar of my last article:
https://cloud.189.cn/t/nmYzyuZni2ey (access code: mvj5)
awvs tool: https://cloud. 189.cn/t/a2QRn2FBFJNj (Access code: 9hs9)



In view of your various installation errors, I installed them all on the virtual machine myself and summarized:
1. Nessus 8.9.1 can be successfully installed and can be updated to the latest plug-in package: all-2.0_20200828.tar.gz is also possible scanned! Don't ask repeated questions anymore, big head.


2. Nessus plug-in update can still use this method to update, you can stop the Nessus service after the installation is complete and directly update to the latest plug-in package:
3. Ultimate trick: I packaged the above tools into a virtual machine. You really need to use it, but you have not configured it and installed it yourself, you can download and use it. All-2.0_20200828.tar.gz plug-in download: https://cloud.189.cn/t/yUr2qeZra2Ab (access code: 0iic) https://mega.nz/folder/LRFCiIAC#zIilB3PQU8nrZu4DVEIAQw The virtual machine file is still uploading, Update here after uploading. parallels desktop 16: https://cloud.189.cn/t/Vzy6ZraEZVni (access code: 5njj)

[Image: thum-d6f01599107737.png] 

Mac platform pd virtual machine image: https://cloud.189.cn/t/ArQrIfMRnqui (access code: rno0)
Mirror available for windows vmware: https://cloud.189.cn/t/ui2QvqQ7ZzQz (access code: dz5d)
Nessus-8.9.1-debian6_amd64.deb download: https://cloud.189.cn/t/EBju6jVJn6z2 (Access code: zc7w)

Print this item

  Metasploit Zerologon Module (CVE-2020-1472)
Posted by: malandraum - 09-27-2020, 12:35 PM - Forum: Hacking Tools and Programs - No Replies

Now you can get session directly from MSF with this new module!

https://github.com/rapid7/metasploit-fra...pull/14151
https://github.com/rapid7/ruby_smb/pull/164

This adds an exploit module for CVE-2020-1472, AKA Zerologon. This is a pure-Ruby implementation, leveraging the changes proposed in rapid7/ruby_smb#164. This module is capable of:

    Identifying the vulnerability through the standard check method
    Exploiting the vulnerability to set the machine account password to a blank value (using the REMOVE action)
    Restoring the machine account password to a specific value such as one recovered using secretsdump (using the RESTORE action)

Within the module, I maintained the 2000 attempt account. This was reliably successful for me when I tested against both Server 2016 and Server 2019 installations. The TCP port of the remote Netlogon service is automatically determined using the DCERPC mapping, however a user can explicitly specify a non-zero value instead.

The netlogon implementation I wrote is the bare minimum that was required to develop the module. I put the parts that are reusable into ruby_smb for the next time we need them. The NetrServerPasswordSet2Request is local to the module because of the NT_TRUST_PASSWORD structure which can be in different formats depending on conditions I'm not even entirely sure of. This structure is likely not reusable and that's why it's local to the module.

Possible future work:

    Automatic NBNAME identification. It currently doesn't look like Metasploit has a suitable library for this purpose and the code in auxiliary/scanner/netbios/nbname does not look easily repurposed.
    Automatic machine account password recovery. PR #13995 implements quite a bit of this already but does not appear to be working with the machine account at this time. Further testing here would be necessary. Update: Based on my testing the Metasploit windows_secrets_dump module is working as intended against my Server 2016 Domain Controller, but neither this Metasploit module nor the original impacket secretsdump tool are working against my Server 2019 Domain Controller. I suspect that either there's a difference in the authentication between these two versions or my 2019 Server is somehow configured differently.

dcerpc_epm Changes

This PR includes a couple of changes to the lib/msf/core/exploit/dcerpc_epm.rb file. First it normalizes the user's specified UUID value. UUIDs are not case sensitive and the ones generated by processing the server response are all lowercase. This fixes an issue that took me a few minutes to identify since I had passed my UUID in originally using all caps. Additionally, this checks the datastore['RPORT'] value a little more thoroughly. Since zero evaluates to true in Ruby it should also be treated as automatic (like nil is) in which case the default of 135 should be used
Verification

Testing requires the changes from rapid7/ruby_smb#164. To test that locally use the Gemfile.local with the following contents, (update the path as appropriate) and then run bundle install --gemfile Gemfile.local.
Gemfile.local

    Exploit the vulnerability to set the machine account password to a blank value
        From msfconsole
        Do: use auxiliary/admin/dcerpc/cve_2020_1472_zerologon
        Set the RHOSTS and NBNAME values
        Run the module and see that the password was set to a blank value
    Recover the original machine account password using impacket and secretsdump
        Run examples/secretsdump.py -no-pass NBNAME$@RHOST
            Note: The machine name (NBNAME from the module) must end with the dollar sign character ($)
        Search for the password in the output (NBNAME$:plain_password_hexSmile
    Restore the original machine account password
        From msfconsole
        Do: use auxiliary/admin/dcerpc/cve_2020_1472_zerologon
        Set the action to RESTORE
        Set the RHOSTS, NBNAME and PASSWORD values
        Run the module and see that the original value was restored

Example

[*]192.168.159.10:0 - Connecting to the endpoint mapper service...
[*]192.168.159.10:49667 - Binding to 12345678-1234-abcd-ef00-01234567cffb:1.0@ncacn_ip_tcp:192.168.159.10[49667] ...
[*]192.168.159.10:49667 - Bound to 12345678-1234-abcd-ef00-01234567cffb:1.0@ncacn_ip_tcp:192.168.159.10[49667] ...
[+] 192.168.159.10:49667 - Successfully authenticated
[+] 192.168.159.10:49667 - Successfully set the machine account (WIN-3MSP8K2LCGC$) password to: aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0 (empty)
[*]Auxiliary module execution completed

Print this item

  Microsoft Windows XP Source Code
Posted by: raiduserrussia - 09-27-2020, 11:58 AM - Forum: Hacking Tools and Programs - No Replies

Microsoft Windows XP Source Code

https://mega.nz/file/vmgUUJwJ#NKkJUvkTmq...u6OoQrChpI

Print this item

  Microsoft Windows Server 2003 Source Code
Posted by: raiduserrussia - 09-27-2020, 11:57 AM - Forum: Hacking Tools and Programs - No Replies

Microsoft Windows Server 2003 Source Code

https://mega.nz/file/vjgAGTDZ#K7opR3c9Hy...Vbyvy2h05w

Print this item

  Acunetix 13.0.200911171 Patch(Windows)
Posted by: foxomega - 09-27-2020, 11:02 AM - Forum: Hacking Tools and Programs - Replies (6)

13.0.200911171.zip, MD5: 1AECC6D23E9324F5678252965099127D
wvsc.exe, MD5: 60C3B819770FF6BFA1925D31DAE3C858
license_info.json, MD5: FA61560041725CE1361F5793363B8772

Replace License:
%ProgramData%\Acunetix\shared\license\license_info.json

Replace wvsc.exe:
Acunetix\13.0.200911171\wvsc.exe

Quote:https://www52.zippyshare.com/v/rNMHqCkq/file.html

acunetix_13.0.200911154, Windows Version Patch(Public)
acunetix_13.0.200911154_x64, Linux Version Patch(Right time)
acunetix_13.0.200911171_mac_x64, Mac Version Patch(Right time)

Print this item

  CEH Certified Ethical Hacker Study Guide | Tutorial
Posted by: foxomega - 09-27-2020, 02:41 AM - Forum: Hacking Tools and Programs - Replies (1)

Introduction

The Certified Ethical Hacker (CEH) exam was developed by the International Council of
E-Commerce Consultants (EC-Council) to provide an industry-wide means of certifying
the competency of security professionals. The CEH certification is granted to those who
have attained the level of knowledge and security skills needed to perform security audits
and penetration testing of systems and network.
The CEH exam is periodically updated to keep the certification applicable to the most
recent hacking tools and vulnerabilities. This is necessary because a CEH must be familiar
with the latest attacks and exploits. The most recent revisions to the exam as of this writing
are found in version 6. The version 6 exam objectives are reflected in this book.

Contents at a Glance

Introduction xxi
Assessment Test xxx
Chapter 1 Introduction to Ethical Hacking, Ethics, and Legality 1
Chapter 2 Gathering Target Information: Reconnaissance,
Footprinting, and Social Engineering 31
Chapter 3 Gathering Network and Host Information: Scanning
and Enumeration 63
Chapter 4 System Hacking: Password Cracking, Escalating
Privileges, and Hiding Files 95
Chapter 5 Trojans, Backdoors, Viruses, and Worms 125
Chapter 6 Gathering Data from Networks: Sniffers 153
Chapter 7 Denial of Service and Session Hijacking 173
Chapter 8 Web Hacking: Google, Web Servers, Web Application
Vulnerabilities, and Web-Based Password
Cracking Techniques 195
Chapter 9 Attacking Applications: SQL Injection and Buffer Overflows 221
Chapter 10 Wireless Network Hacking 239
Chapter 11 Physical Site Security 261
Chapter 12 Hacking Linux Systems 281
Chapter 13 Bypassing Network Security: Evading IDSs, Honeypots,
and Firewalls 301
Chapter 14 Cryptography 323
Chapter 15 Performing a Penetration Test 343
Appendix About the Companion CD 359
Glossary 363
Index 375
Table of Exercises

Exercise 2.1 Using SpyFu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Exercise 2.2 Using KeywordSpy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Exercise 2.3 Using the EDGAR Database to Gather Information . . . . . . . . . . . . . . . . . 36
Exercise 2.4 Using Whois . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Exercise 3.1 Using a Windows Ping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Exercise 3.2 Free IPTools Port Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Exercise 3.3 Use Netcraft to Identify the OS of a Web Server . . . . . . . . . . . . . . . . . . . 79
Exercise 3.4 Use Anonymouse to Surf Websites Anonymously . . . . . . . . . . . . . . . . . 80
Exercise 4.1 Use Ophcrack to Crack Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Exercise 4.2 Hiding Files Using NTFS File Streaming . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Exercise 4.3 Hiding Data in an Image Using ImageHide . . . . . . . . . . . . . . . . . . . . . . . . 116
Exercise 5.1 Using Netcat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Exercise 5.2 Signature Verification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
Exercise 5.3 Creating a Test Virus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Exercise 6.1 Use Wireshark to Sniff Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Exercise 6.2 Create a Wireshark filter to capture only traffic
to or from an IP address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
Exercise 7.1 Preventing SYN Flood Attacks on Windows 2000 Servers . . . . . . . . . . 181
Exercise 8.1 Disabling the Default Website in Internet Information Server . . . . . . . 199
Exercise 8.2 Using BlackWidow to Copy a Website . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
Exercise 8.3 Banner Grabbing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
Exercise 8.4 Using Metasploit to Exploit a Web Server Vulnerability . . . . . . . . . . . . 203
Exercise 8.5 Using Acunetix Web Vulnerability Scanner . . . . . . . . . . . . . . . . . . . . . . . . 211
Exercise 8.6 Using a Password Cracker . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
Exercise 9.1 Using HP’s Scrawlr to Test for SQL Injection Vulnerabilities . . . . . . . . . 227
Exercise 9.2 Performing a Buffer Overflow Attack Using Metasploit . . . . . . . . . . . . 231
Exercise 10.1 Installing and Using a WLAN Sniffer Tool . . . . . . . . . . . . . . . . . . . . . . . . 246
Exercise 10.2 MAC Address Spoofing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
Exercise 11.1 View a Video on Lockpicking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
Exercise 11.2 Audit Your Organization’s Physical Site Security . . . . . . . . . . . . . . . . . . 269
Exercise 12.1 Configuring and Compiling the Kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
Exercise 12.2 Using a Live CD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287
Exercise 12.3 Detecting Listening Network Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
525203flast.indd 19 3/17/10 6:02:01 PM
xx Table of Exercises
Exercise 13.1 Installing and Using KFSensor as a Honeypot . . . . . . . . . . . . . . . . . . . . 310
Exercise 14.1 Viewing a Digital Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
Exercise 14.2 Using WinMD5 to Compute File Hashes . . . . . . . . . . . . . . . . . . . . . . . . . 333
Exercise 15.1 Viewing a Pen Testing Framework of Tools . . . . . . . . . . . . . . . . . . . . . . . 348
Exercise 15.2 Viewing a Sample Pen Testing Report Framework . . . . . . . . . . . . . . . . . 350


Quote:https://mega.nz/file/meIi2CqL#w3DwWWPfTR...S_60d_RCK8

Print this item

  COBALT STRIKE 4.1 FREE DOWNLIAD
Posted by: foxomega - 09-27-2020, 02:36 AM - Forum: Hacking Tools and Programs - Replies (3)

#Cobalt Strike 4.1 (June 25, 2020)

Print this item

  Dark Side
Posted by: Matthewfesse - 09-20-2020, 01:55 AM - Forum: Announcements and Rules - Replies (2)

Как и с любым другим предметом обихода, стоимость на кальяны невероятно разнится.
Существуют дешевые , но не очень качественные модели, «дешевые и сердитые» – доступные и очень практичные и разумеется эксклюзивные
– из дорогих материалов с обильной детализацией. Но независимо от того , сколько Вы готовы потратить на кальян,
лучше все же не приобретать дешевые Китайские модели, потому что они не доставят нужного удовольствия как в курительных свойствах,
эстетических так и просто на просто могут быть не безопасны. Простыми словами – одно разочарование.
Лучше накопить и купить качественный кальян и использовать его несколько лет , чем выкидывать деньги на ветер и кальян после недолгого потребления.
Поэтому при выборе кальяна обратите внимание как минимум на внешний вид – он не должен быть поврежден,
все элементы при сборке должны плотно прилегать друг к другу, для создания герметичности.
Но,где купить кальян в Хабаровске?Покупка должна быть осмысленной и желательно бюджетной.

Dark Side c7271c3

Print this item

  Major
Posted by: Matthewfesse - 09-19-2020, 04:55 PM - Forum: Announcements and Rules - Replies (4)

Как и с любым другим предметом обихода, стоимость на кальяны невероятно разнится.
Существуют дешевые , но не очень качественные модели, «дешевые и сердитые» – доступные и очень практичные и разумеется эксклюзивные
– из дорогих материалов с обильной детализацией. Но независимо от того , сколько Вы готовы потратить на кальян,
лучше все же не приобретать дешевые Китайские модели, потому что они не доставят нужного удовольствия как в курительных свойствах,
эстетических так и просто на просто могут быть не безопасны. Простыми словами – одно разочарование.
Лучше накопить и купить качественный кальян и использовать его несколько лет , чем выкидывать деньги на ветер и кальян после недолгого потребления.
Поэтому при выборе кальяна обратите внимание как минимум на внешний вид – он не должен быть поврежден,
все элементы при сборке должны плотно прилегать друг к другу, для создания герметичности.
Но,где купить кальян в Хабаровске?Покупка должна быть осмысленной и желательно бюджетной.

Alpha Hookah 82c7271

Print this item