Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      • 0
      sk1ppa

      Thunderbird for stealed e-mails?

      Question

      Hello,

      first, sorry for my bad english, ich hope you can understand my question.

      sometimes i can't log in in my dumped e-mail accounts but when i try it with thunderbird there are no problems.

      on my main pc i am using a vpn and i used thunderbird in a virtual machine where proxifier was active with the "all_system" profile of vip72.

      ist there any risk for my security or can i use thunderbird,outlook similar tools without any problems?

      or can anyone say me a tool like "e-mail viewer by src-team"? i can't find a downloadlink for it or other tools like that.

       

      thank you veeeeeeery much from germany,

      skippa

      Share this post


      Link to post
      Share on other sites

      1 answer to this question

      Recommended Posts

      • 1
      7 hours ago, sk1ppa said:

      Hello,

      first, sorry for my bad english, ich hope you can understand my question.

      sometimes i can't log in in my dumped e-mail accounts but when i try it with thunderbird there are no problems.

      on my main pc i am using a vpn and i used thunderbird in a virtual machine where proxifier was active with the "all_system" profile of vip72.

      ist there any risk for my security or can i use thunderbird,outlook similar tools without any problems?

      or can anyone say me a tool like "e-mail viewer by src-team"? i can't find a downloadlink for it or other tools like that.

       

      thank you veeeeeeery much from germany,

      skippa

      @skippa

      vip72 is a proxy provider. from what i understand they sell "low quality socks"

      Im not sure on what you are looking to achieve when logging in to the emails, the

      only things that come to mind are CC/Banking/$ ..related.

      So I advise you to :

      Upgrade to an actual VPN ( no log non dmca compliant )

      mullvad.net <= HQ VPN

      For proxies make sure you use "Socks5" and that theyre  => "Clean".

      Here is a good provider Ive used in the past.

      Hidden Content

        Give reaction to this post to see the hidden content.

      To succeed in your email logins and activities. You must match your settings and configuration

      as close as possible to your email targets. use this to get an idea of what i detected when logging in,

      carding/cashing out etc...

      Hidden Content

        Give reaction to this post to see the hidden content.

      ########

      vip72 ist ein Proxy-Provider. von dem, was ich verstehe, verkaufen sie "niedrige Qualität Socken"

      Ich bin mir nicht sicher, was Sie erreichen möchten, wenn Sie sich in die E-Mails einloggen

      nur die Dinge, die in den Sinn kommen, sind CC / Banking / $ ..related.

      Also rate ich dir:

      Upgrade auf ein tatsächliches VPN (kein Protokoll, kein dmca-konform)

      mullvad.net <= HQ VPN

      Für Proxies stellen Sie sicher, dass Sie "Socks5" verwenden und dass theyre => "Clean".

      Hier ist ein guter Provider, den ich in der Vergangenheit benutzt habe.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Um in Ihren E-Mail-Logins und Aktivitäten erfolgreich zu sein. Sie müssen Ihre Einstellungen und Konfiguration anpassen

      so nah wie möglich an Ihren E-Mail-Zielen. Verwenden Sie dies, um eine Vorstellung davon zu bekommen, was ich beim Einloggen festgestellt habe,

      Kardieren / Auszahlen etc. ...

      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Security Onion is a free and open source Linux distribution for intrusion detection, enterprise security monitoring, and log management. It includes Elasticsearch, Logstash, Kibana, Snort, Suricata, Bro, OSSEC, Sguil, Squert, NetworkMiner, and many other security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes!
          Below are several diagrams to represent the current architecture and deployment scenarios for Security Onion on the Elastic Stack.
          Core Components
          Logstash – Parse and format logs.
          Elasticsearch – Ingest and index logs.
          Kibana – Visualize ingested log data.
          Auxiliary Components
          Curator – Manage indices through scheduled maintenance.
          ElastAlert – Query Elasticsearch and alert on user-defined anomalous behavior or other interesting bits of information.
          FreqServer -Detect DGAs and find random file names, script names, process names, service names, workstation names, TLS certificate subjects and issuer subjects, etc.
          DomainStats – Get additional info about a domain by providing additional context, such as creation time, age, reputation, etc.
          Changelog v2.3.30
                  Zeek is now at version 3.0.13.
                  CyberChef is now at version 9.27.2.
                  Elastic components are now at version 7.10.2. This is the last version that uses the Apache license.
                  Suricata is now at version 6.0.1.
                  Salt is now at version 3002.5.
                  Suricata metadata parsing is now vastly improved.
                  If you choose Suricata for metadata parsing, it will now extract files from the network and send them to Strelka. You can add additional mime types here: https://github.com/Security-Onion-Solutions/securityonion/blob/dev/salt/idstools/sorules/extraction.rules
                  It is now possible to filter Suricata events from being written to the logs. This is a new Suricata 6 feature. We have included some examples here: https://github.com/Security-Onion-Solutions/securityonion/blob/dev/salt/idstools/sorules/filters.rules
                  The Kratos docker container will now perform DNS lookups locally before reaching out to the network DNS provider.
                  Network configuration is now more compatible with manually configured OpenVPN or Wireguard VPN interfaces.
                  so-sensor-clean will no longer spawn multiple instances.
                  Suricata eve.json logs will now be cleaned up after 7 days. This can be changed via the pillar setting.
                  Fixed a security issue where the backup directory had improper file permissions.
                  The automated backup script on the manager now backs up all keys along with the salt configurations. Backup retention is now set to 7 days.
                  Strelka logs are now being rotated properly.
                  Elastalert can now be customized via a pillar.
                  Introduced new script so-monitor-add that allows the user to easily add interfaces to the bond for monitoring.
                  Setup now validates all user input fields to give up-front feedback if an entered value is invalid.
                  There have been several changes to improve install reliability. Many install steps have had their validation processes reworked to ensure that required tasks have been completed before moving on to the next step of the install.
                  Users are now warned if they try to set “securityonion” as their hostname.
                  The ISO should now identify xvda and nvme devices as install targets.
                  At the end of the first stage of the ISO setup, the ISO device should properly unmount and eject.
                  The text selection of choosing Suricata vs Zeek for metadata is now more descriptive.
                  The logic for properly setting the LOG_SIZE_LIMIT variable has been improved.
                  When installing on Ubuntu, Setup will now wait for cloud init to complete before trying to start the install of packages.
                  The firewall state runs considerably faster now.
                  ICMP timestamps are now disabled.
                  Copyright dates on all Security Onion specific files have been updated.
                  so-tcpreplay (and indirectly so-test) should now work properly.
                  The Zeek packet loss script is now more accurate.
                  Grafana now includes an estimated EPS graph for events ingested on the manager.
                  Updated Elastalert to release 0.2.4-alt2 based on the https://github.com/jertel/elastalert alt branch.
                  Pivots from Alerts/Hunts to action links will properly URI encode values.
                  Hunt timeline graph will properly scale the data point interval based on the search date range.
                  Grid interface will properly show “Search” as the node type instead of “so-node”.
                  Import node now supports airgap environments.
                  The so-mysql container will now show “healthy” when viewing the docker ps output.
                  The Soctopus configuration now uses private IPs instead of public IPs, allowing network communications to succeed within the grid.
                  The Correlate action in Hunt now groups the OR filters together to ensure subsequent user-added filters are correctly ANDed to the entire OR group.
                  Add support to so-firewall script to display existing port groups and host groups.
                  Hive init during Setup will now properly check for a running ES instance and will retry connectivity checks to TheHive before proceeding.
                  Changes to the .security analyzer yields more accurate query results when using Playbook.
                  Several Hunt queries have been updated.
                  The pfSense firewall log parser has been updated to improve compatibility.
                  Kibana dashboard hyperlinks have been updated for faster navigation.
                  Added a new so-rule script to make it easier to disable, enable, and modify SIDs.
                  ISO now gives the option to just configure the network during setup.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. ConPtyShell is a Fully Interactive Reverse Shell for Windows systems.
          The introduction of the Pseudo Console (ConPty) in Windows has improved so much the way Windows handles terminals. ConPtyShell uses this feature to literally transform your bash in a remote powershell.
          Briefly, it creates a Pseudo Console and attaches 2 pipes.
          Then it creates the shell process (default powershell.exe) attaching the Pseudo Console with redirected input/output.
          Then starts 2 Threads for Async I/O:
          – one thread for reading from the socket and writing to Pseudo Console input pipe;
          – the second thread for reading from the Pseudo Console output pipe and writing to the socket.
          ConPtyShell isn’t an “Upgrade to fully interactive” method for your reverse shell, just use it as your reverse shell 🙂
          If you want to know further information regarding ConPty you can find a great article [1] in the references section.
          NOTE: ConPtyShell uses the function CreatePseudoConsole(). This function is available since Windows 10 / Windows Server 2019 version 1809 (build 10.0.17763).
          Changelog v1.3
          Added
              Added a magic flag “upgrade” that allows to upgrade the current shell in a fully interactive shell. It uses Socket Hijacking technique to catch the socket used by the shell enhancing it with the ConPty.
          Changes
              Changed the usage of the sockets, going from C# sockets to native Winsock

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. About This File
          Features:
              Create modern looking borderless and resizable GUIs with control buttons (Close,Maximize/Restore,Minimize, Fullscreen, Menu)
              True borderless, resizeable GUI with full support for aerosnap etc.
              Many color schemes/themes included. See MetroThemes.au3 for more details.
              2 type of Windows 8/10 style buttons.
              Modern checkboxes, radios, toggles and progressbar.
              All buttons, checkboxes etc. have hover effects!
              Windows 10 style modern MsgBox.
              Windows 10/Android style menu that slides in from left

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. XeroChat, a multichannel marketing application, is the ultimate white-label SaaS software with an all-in-one solution for your business to grow. It offers all-powerful tools like Facebook Messenger Chatbot, Facebook Comment Auto Reply & Private Reply, Facebook Auto Comment Tools, Instagram Posting, Instagram Auto Comment Reply, Complete E-commerce Solutions inside Messenger & Outside Messenger, Restaurants Food Ordering inside Messenger & outside Messenger,Contactless QR Menu/Catalog Generate for Food order or Ecommerce Purchase, Social Media Posting, SMS Marketing, Email Marketing & many other features. Therefore, XeroChat is the best choice for your daily marketing solutions..
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Social Warfare makes sharing your content fast and easy. Social Warfare adds beautiful, lightning-fast social share buttons to your website or blog. But that's only the beginning...
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.