Hacking

The seedier side of all of the above forums.

RDS remote RAT alternative

Am looking for an alternative for RDS(Remote desktop service) tool. does anyone know of a better alternative that has a stable HVNC module.

http://savepic.net/8039578.jpg

need activation keys of Facebook Password Finder v2.9.8

Hi i need the activation keys of Facebook Password Finder v2.9.8..
Thx in advance

voip router hacking

So i figured out a good formula for hacking voip routers made by edgewater networks. As far as i can tell these havent been sucked into any huge botnets even though logging in is pretty easy. This account is a throwaway so make what you will of this post.

Anyway most of these things have custom firmware for a company that runs a bunch and gives them out to customers, like Shoretel, Cox, AT&T, Comcast, so what youll find depends on how hard you look. But most companies just look about the same. Optimum Cablevision will sometimes put the http server on some weird port like 81 or 8081 instead of the normal one though.

Most will have a http server open on port 80 that has an authentication realm of System. So if you wanted to look for one on something that crawls for http headers, you'd search for WWW-Authenticate: Basic realm="System". From the http server, the user/pass is usually a straightforward enough root/default or rouser/default. These mostly just let you configure the router but theyre most useful than they might seem so dont discount them too much if you find them. On some models the ping test function will let you inject shell commands. So in the box where it asks you for a ping address you can put say "127.0.0.1 ; cat /etc/shadow" and itll print out the shadow file into where the ping results would be.

More to the point and more ignored usually, the default root ssh password is shift+2345678109. So if you type it out its @#$%^&*!)( . Not a bad default right? Sometimes admin/default also works on ssh for some dumbass reason. Once you're in the /etc/config directory has most everything you might want to figure out about the device. This would be a good time to say that the passwords are almost always just des. If you need to brute them it can usually be done in about a day.

Privesc Ubuntu Server

Let's say I have gotten access to a server running Ubuntu and I am having a bit of trouble in getting root, just hypothetically. I got write access and read access to most files and folders. I own the entire site. Backdoor installed via PHP and there is mysql access through phpmyadmin and ssh and ftp access as well. So we are talking post explotation. There is very few tools available, seems not even mysql is present, which I don't get since there is access via phpmyadmin. I have no gcc available nor ability to run any python. I could compile stuff on my linux box although I lack knowledge in how runnable it would be on the compromised server. I am guessing that my best bet would be a privesc via mysql exploit, but I don't want to leave my IP in the logs when doing a reverse shell.

Any tips?

Sorry for not dropping any version numbers as I don't have them in front of me and this beeing hypothetically. I want to learn, but as of now I am just a white-hat script-kiddie noob. My goal, if this was real, would be to get shadow and let the rainbow shine on it until it is clear as day Smile

For educational purposes only. Would it be possible to create a program that can generate working codes for Google Play money.

I was just curious if it would at all be possible to create a program that could generate, let's say, Google play codes that have cash value? Just fishing for educational purposes only.

Bash Bunny

Hello there!

I was wondering what you guys think of Hak5's new product called the Bash Bunny.

Link: https://hakshop.com/products/bash-bunny

Thanks!

Wikileaks, CIA, and Agent Steal

I found it pretty amusing that the CIA was using a similar technique to my own app, Agent Steal.

wikileaks wrote:

A number of the CIA's electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked.

This was pulled from https://wikileaks.org/ciav7p1/ if you're interested in reading the full thing. I'd be interested to know when the CIA started using this method, although I'm sure others used it even before I did. I think I first used it in 1997, so I'm sure somebody beat me to the punch. I figured that some of you who use Agent Steal probably would find this funny.

need help in hacking instagram & snapchat

in our country quite easy to find hackers by IP
i want to hack instagram & snapchat

can anybody help in this.....!!!

v1.0 Every Tool In 1 Script! Anybody Wants to test it?

Hey Guys i'm working on a script that integrates every Pentesting tool in just 1 simple script and its so easy to use but right now im working on it and i don't have time to test the tools, so anybody wants to test them for me and make sure they work ill send a free copy to any1 that wants to test it and report any bugs! Thanks

Here are some Pics:

This is how it looks when you first launch the program:
https://postimg.org/image/c6hcxbw8z/

These are some Cryptographic tools:
https://postimg.org/image/qzfccer5f/

This is the information gathering section:
https://postimg.org/image/mkkkkf95p/

Anybody interested! Comment Below!

world most powerful people

Hello great house of information,it is my pleasure to mingle with u all.
Kindly take good care of me

Syndicate content