Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Search the Community

Showing results for tags 'against'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 6 results

  1. What is RDP? For this attack we’ll use a tool called “crowbar” that gonna help us to brute force the credentials of the target machine. What is Crowbar? We can Download the tool right here [Hidden Content]
  2. EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. It is designed to be used in full scope wireless assessments and red team engagements. As such, the focus is placed on providing an easy-to-use interface that can be leveraged to execute powerful wireless attacks with minimal manual configuration. To illustrate how fast this tool is, here’s an example of how to set up and execute a credential-stealing evil twin attack against a WPA2-TTLS network in just two commands: Features Steal RADIUS credentials from WPA-EAP and WPA2-EAP networks. Perform hostile portal attacks to steal AD creds and perform indirect wireless pivots Perform captive portal attacks Built-in Responder integration Support for Open networks and WPA-EAP/WPA2-EAP No manual configuration is necessary for most attacks. No manual configuration necessary for the installation and setup process Leverages the latest version of hostapd (2.8) Support for evil twin and karma attacks Generate timed Powershell payloads for indirect wireless pivots Integrated HTTP server for Hostile Portal attacks Support for SSID cloaking Fast and automated PMKID attacks against PSK networks using hcxtools Password spraying across multiple usernames against a single ESSID EAPHammer now supports attacks against 802.11a and 802.11n networks. This includes the ability to create access points that support the following features: Both 2.4 GHz and 5 GHz channel support Full MIMO support (multiple inputs, multiple output) Frame aggregation Support for 40 MHz channel widths using channel bonding High Throughput Mode Short Guard Interval (Short GI) Modulation & coding scheme (MCS) RIFS HT power management Changelog v1.13.5 Fixed gevent / Python 3.9 related issues. [hide][Hidden Content]]
  3. WeDefend - Check Proccess and Network Activity to against Remote Access Trojan WeDefend is application based on java programming language with several features as check proccess activity, network activity, file encryption, disk hider and folder lock to against and also protect user data from Remote Access Trojan malware in Windows operating system. Video: [Hidden Content] Download: [Hidden Content]
  4. WPA2 is a 13-year-old WiFi authentication scheme widely used to secure WiFi connections, but the standard has been compromised, impacting almost all Wi-Fi devices—including in our homes and businesses, along with the networking companies that build them. Dubbed KRACK—Key Reinstallation Attack—the proof-of-concept attack demonstrated by a team of researchers works against all modern protected Wi-Fi networks and can be abused to steal sensitive information like credit card numbers, passwords, chat messages, emails, and photos. Since the weaknesses reside in the Wi-Fi standard itself, and not in the implementations or any individual product, any correct implementation of WPA2 is likely affected. According to the researchers, the newly discovered attack works against: Both WPA1 and WPA2, Personal and enterprise networks, Ciphers WPA-TKIP, AES-CCMP, and GCMP In short, if your device supports WiFi, it is most likely affected. During their initial research, the researchers discovered that Android, Linux, Apple, Windows, OpenBSD, MediaTek, Linksys, and others, are all affected by the KRACK attacks. It should be noted that the KRACK attack does not help attackers recover the targeted WiFi's password; instead, it allows them to decrypt WiFi users' data without cracking or knowing the actual password. So merely changing your Wi-Fi network password does not prevent (or mitigate) KRACK attack. Here's How the KRACK WPA2 Attack Works (PoC Code): Discovered by researcher Mathy Vanhoef of imec-DistriNet, KU Leuven, the KRACK attack works by exploiting a 4-way handshake of the WPA2 protocol that's used to establish a key for encrypting traffic. For a successful KRACK attack, an attacker needs to trick a victim into re-installing an already-in-use key, which is achieved by manipulating and replaying cryptographic handshake messages. The research [PDF], titled Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2, has been published by Mathy Vanhoef of KU Leuven and Frank Piessens of imec-DistriNet, Nitesh Saxena and Maliheh Shirvanian of the University of Alabama at Birmingham, Yong Li of Huawei Technologies, and Sven Schäge of Ruhr-Universität Bochum. The team has successfully executed the key reinstallation attack against an Android smartphone, showing how an attacker can decrypt all data that the victim transmits over a protected WiFi. You can watch the video demonstration above and download proof-of-concept (PoC) code from Github. The researchers say their key reinstallation attack could be exceptionally devastating against Linux and Android 6.0 or higher, because "Android and Linux can be tricked into (re)installing an all-zero encryption key (see below for more info)." However, there's no need to panic, as you aren't vulnerable to just anyone on the internet because a successful exploitation of KRACK attack requires an attacker to be within physical proximity to the intended WiFi network. WPA2 Vulnerabilities and their Brief Details The key management vulnerabilities in the WPA2 protocol discovered by the researchers has been tracked as: CVE-2017-13077: Reinstallation of the pairwise encryption key (PTK-TK) in the four-way handshake. CVE-2017-13078: Reinstallation of the group key (GTK) in the four-way handshake. CVE-2017-13079: Reinstallation of the integrity group key (IGTK) in the four-way handshake. CVE-2017-13080: Reinstallation of the group key (GTK) in the group key handshake. CVE-2017-13081: Reinstallation of the integrity group key (IGTK) in the group key handshake. CVE-2017-13082: Accepting a retransmitted Fast BSS Transition (FT) Reassociation Request and reinstalling the pairwise encryption key (PTK-TK) while processing it. CVE-2017-13084: Reinstallation of the STK key in the PeerKey handshake. CVE-2017-13086: reinstallation of the Tunneled Direct-Link Setup (TDLS) PeerKey (TPK) key in the TDLS handshake. CVE-2017-13087: reinstallation of the group key (GTK) while processing a Wireless Network Management (WNM) Sleep Mode Response frame. CVE-2017-13088: reinstallation of the integrity group key (IGTK) while processing a Wireless Network Management (WNM) Sleep Mode Response frame. The researchers discovered the vulnerabilities last year, but sent out notifications to several vendors on July 14, along with the United States Computer Emergency Readiness Team (US-CERT), who sent out a broad warning to hundreds of vendors on 28 August 2017. In order to patch these vulnerabilities, you need to wait for the firmware updates from your device vendors. According to researchers, the communication over HTTPS is secure (but may not be 100 percent secure) and cannot be decrypted using the KRACK attack. So, you are advised to use a secure VPN service—which encrypts all your Internet traffic whether it’s HTTPS or HTTP. You can read more information about these vulnerabilities on the KRACK attack's dedicated website, and the research paper. The team has also released a script using which you can check whether if your WiFi network is vulnerable to the KRACK attack or not.
  5. Version 1.0.0

    0 downloads

    Extreme Exploits - Advanced Defenses Against Hardcore Hacks Introduction Welcome to Extreme Exploits: Advanced Defenses Against Hardcore Hacks. The goal of this book is to help you better understand and cope with emerging information security threats and to impart upon you the experience-proven concepts and techniques we have developed defending some of the world's most targeted networks and information assets. This book presents a different perspective on network and information security than previous titles. Many of the books available on the information security bookshelf disclose hacks and counter-hacks by pointing the reader to hundreds of scripts and downloadable utilities. Still others focus narrowly on one or two software packages and specific environments or scenarios. In many cases, these texts quickly grow obsolete as tools and tactics evolve. Our text aims to conceptualize the threats while getting at the core matter behind them and provide the reader with a deeper understanding of the tactics and technologies involved in both defense and aggression. Armed with this knowledge, you'll make better use of the myriad of tools available today, but you'll also have the ability to design new tools, techniques, and operational policies for the future. Audience This book is meant for security practitioners and systems and network administrators of all skill levels. If you're a fellow information assurance analyst, you'll be pleased to find that our focus is not how to locate and compile tools, but instead we discuss how tools should be used and exactly how they work. You won't find concatenated manual pages or regurgitated web content here. Many of the examples provided include the use of open source software, but the concepts being discussed are applicable to commercial software solutions, which makes this book useful to both large and small organizations. If you're a technical manager, you'll be pleased to find that our concise explanations of technology and techniques will help you navigate the jargon employed by software and equipment vendors and assist you in developing easily understandable synopses of threats and the countermeasures for your fellow managers. Likewise, our discussion of the concepts behind these defenses will make you a smarter buyer when it comes to information security solutions. Pay special attention to the "Checklist for Developing Defenses" section included at the end of every chapter. It provides a simple "To Do" list of the most important tactical actions you can take today that will help keep your network safe. We hope technical managers will ask their staff what is being done with regard to each and every checklist item, thereby raising awareness and sharing knowledge that may have great impact on the security of your organization.
    $10
  6. View File Extreme Exploits - Advanced Defenses Against Hardcore Hacks Extreme Exploits - Advanced Defenses Against Hardcore Hacks Introduction Welcome to Extreme Exploits: Advanced Defenses Against Hardcore Hacks. The goal of this book is to help you better understand and cope with emerging information security threats and to impart upon you the experience-proven concepts and techniques we have developed defending some of the world's most targeted networks and information assets. This book presents a different perspective on network and information security than previous titles. Many of the books available on the information security bookshelf disclose hacks and counter-hacks by pointing the reader to hundreds of scripts and downloadable utilities. Still others focus narrowly on one or two software packages and specific environments or scenarios. In many cases, these texts quickly grow obsolete as tools and tactics evolve. Our text aims to conceptualize the threats while getting at the core matter behind them and provide the reader with a deeper understanding of the tactics and technologies involved in both defense and aggression. Armed with this knowledge, you'll make better use of the myriad of tools available today, but you'll also have the ability to design new tools, techniques, and operational policies for the future. Audience This book is meant for security practitioners and systems and network administrators of all skill levels. If you're a fellow information assurance analyst, you'll be pleased to find that our focus is not how to locate and compile tools, but instead we discuss how tools should be used and exactly how they work. You won't find concatenated manual pages or regurgitated web content here. Many of the examples provided include the use of open source software, but the concepts being discussed are applicable to commercial software solutions, which makes this book useful to both large and small organizations. If you're a technical manager, you'll be pleased to find that our concise explanations of technology and techniques will help you navigate the jargon employed by software and equipment vendors and assist you in developing easily understandable synopses of threats and the countermeasures for your fellow managers. Likewise, our discussion of the concepts behind these defenses will make you a smarter buyer when it comes to information security solutions. Pay special attention to the "Checklist for Developing Defenses" section included at the end of every chapter. It provides a simple "To Do" list of the most important tactical actions you can take today that will help keep your network safe. We hope technical managers will ask their staff what is being done with regard to each and every checklist item, thereby raising awareness and sharing knowledge that may have great impact on the security of your organization. Submitter dEEpEst Submitted 20/09/18 Category Libro Online Password ********  
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.