Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      itsMe

      Acunetix Web Vulnerability Scanner 12.0.181012141 Full Lisence

      Recommended Posts

      Hidden Content

        Give reaction to this post to see the hidden content.

      Vulnerability Scanner – Audit Your Web

      Security with Acunetix

      Multi-threaded, lightning fast crawler and scanner that can crawl hundreds of thousands of pages without interruptions.

      •     Detects over 4500 web application vulnerabilities.
      •     Scans open-source software and custom-built applications.
      •     Detects critical vulnerabilities with 100% accuracy.

      Info:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Links removed

      Pass:

      Hidden Content

        Give reaction to this post to see the hidden content.

      This new build reports sites that do not implement Content Security Policy (CSP) or Subresource Integrity (SRI) and detects Node.js source disclosure, Ghostscript RCE, SSRF in Paperclip and other vulnerabilities. This new build has a good number of updates and some important fixes. Below is a full list of updates.

      New Vulnerability Checks

          New check for Content Security Policy (CSP) not implemented
          New check for Subresource Integrity (SRI not implemented
          New check for Node.js web application source code disclosure
          New check for Ghostscript RCE via file upload
          New check for Paperclip Server-Side Request Forgery (SSRF) via file upload (CVE-2017–0889)
          New check for WPEngine _wpeprivate/config.json information disclosure
          New check for Cross-site Scripting in HTTP-01 ACME challenge implementation
          New check for npm log file disclosure
          New check for PHP-CS-Fixer cache file disclosure
          Multiple new WordPress and Joomla vulnerability checks.

      Updates

          License keys can now be updated via the Acunetix web UI
          Additional memory improvements
          Improved exclusion of parameters
          Multiple updates to existing vulnerability checks
          Improved CORS origin validation failure checks
          Improved Pickle Serialization check.

      Fixes

          Manual Intervention was not working after a paused scan is resumed
          Scans for some sites using Digest HTTP Authentication were stopping unexpectedly
          Additional fixes for issues causing scans exiting unexpectedly
          Fixed issue causing many product update requests when proxy authentication is incorrectly configured
          Fixed: Some backup files / folders were not being identified
          Fixed: Some vulnerabilities were incorrectly reported in the site root
          Fixed issue in similar page detection causing scans to take longer than expected
          Fixed issue causing valid sessions not to be identified correctly during the scan.

      Edited by 0x1
      remove link

      Share this post


      Link to post
      Share on other sites

      Virus....

      This version of Acunetix Web Vulnerability Scanner 12 is available for download on the internet.

      Trojan binded in installer acunetix_ 12.0.181012141.exe

      Infected Version

      Hidden Content

        Give reaction to this post to see the hidden content.

       

       

       

      My Clean Version...

      Hidden Content

        Give reaction to this post to see the hidden content.

       

       

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

       

       

       

       

       

       

       

       

       

      Share this post


      Link to post
      Share on other sites

      @mauzzz :thank_you: i confirm is infected. @sQuoII you can check this ?

      Analyse :

      Spoiler
      Quote

      Code injection in process: C:\Sandbox\-\DefaultBox\user\current\AppData\Local\TempSetup.exe
      Code injection in process: C:\Sandbox\-\DefaultBox\user\current\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\taskhost.exe
      Created a mutex named: Global\.net clr networking
      Created an event named: Global\CorDBIPCSetupSyncEvent_2336
      Created an event named: Global\CorDBIPCSetupSyncEvent_3420
      Created an event named: Global\CorDBIPCSetupSyncEvent_3944
      Created process: C:\Users\-\AppData\Local\TempSetup.exe, "C:\Users\-\AppData\Local\TempSetup.exe" , C:\Program Files\Sandboxie
      Created process: C:\Users\-\AppData\Roaming\Microsoft Corporation\Microsoft® Windows® Operating System\8.1.1.7800\svchost.exe, "C:\Users\-\AppData\Roaming\Microsoft Corporation\Microsoft® Windows® Operating System\8.1.1.7800\svchost.exe" , C:\Users\-\AppData\Roaming\Microsoft\Windows\8.1.7601.17587
      Created process: C:\Users\-\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\taskhost.exe, "C:\Users\-\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\taskhost.exe" , C:\Users\-\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\
      Defined code injection in process: C:\Sandbox\-\DefaultBox\user\current\AppData\Roaming\Microsoft Corporation\Microsoft® Windows® Operating System\8.1.1.7800\svchost.exe
      Defined file type created: C:\Users\-\AppData\Local\TempSetup.exe
      Defined file type created: C:\Users\-\AppData\Roaming\Microsoft Corporation\Microsoft® Windows® Operating System\8.1.1.7800\svchost.exe
      Defined file type created: C:\Users\-\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\svchost.exe
      Defined file type created: C:\Users\-\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\taskhost.exe
      Defined registry AutoStart location created or modified: user\current\software\Microsoft\Windows\CurrentVersion\Run\Intel(R) Common Networking System = C:\Users\-\AppData\Roaming\Microsoft Corporation\Microsoft Windows Operating System\8.1.1.7800\svchost.exe
      Error reporting dialog change: machine\software\microsoft\windows\windows error reporting\dontshowui = 00000001
      Got computer name
      Got input locale identifiers
      Got system default language ID
      Hid file from user: C:\Users\-\AppData\Roaming\Microsoft Corporation\Microsoft® Windows® Operating System\8.1.1.7800\svchost.exe
      Queried DNS: goldenshoponline.us

       

       

      Svchost.exe connect to godenshop domaine for copy url and try to download explorer.zip file on domaine vietnamnet but blocked by comodo

      Hidden Content

        Give reaction to this post to see the hidden content.
       

      Share this post


      Link to post
      Share on other sites

      Great tool, always needed for any hackers arsenal, would recommend this forum 10/10. 
      I do appreciate the post, will report later whether it works.

       

      Share this post


      Link to post
      Share on other sites
      5 minutes ago, teratzu said:

      Great tool, always needed for any hackers arsenal, would recommend this forum 10/10. 
      I do appreciate the post, will report later whether it works.

       

      you are on section Post Infected i remove link now this is best

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Beautiful HTML5 SHOUTcast & Icecast Radio Web Player. Built in HTML/CSS/jQuery, Animated and Mobile Ready. It’s compatible with SHOUTcast DNAS 1/2 & Icecast 2. Easy to install and customize!
          Demo:
           
          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.  
        • By dEEpEst
          Host Header Attack Vulnerability Demonstration | POC | Penetration Testing 
          Video Tutorial 

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. WPScan is a free, for non-commercial use, black box WordPress Vulnerability Scanner written for security professionals and blog maintainers to test the security of their WordPress websites.

          v3.7.7
              Fixed rare crash due to conflict between slugs and API endpoints
              Fixed Incorrect RDF URLs detection


          Hidden Content
          Give reaction to this post to see the hidden content.  
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Sn1per Community Edition is an automated scanner that can be used during a penetration test to enumerate and scan for vulnerabilities. Sn1per Professional is Xero Security’s premium reporting add-on for Professional Penetration Testers, Bug Bounty Researchers and Corporate Security teams to manage large environments and pentest scopes
          FEATURES:
              Automatically collects basic recon (ie. whois, ping, DNS, etc.)
              Automatically launches Google hacking queries against a target domain
              Automatically enumerates open ports via Nmap port scanning
              Automatically brute forces sub-domains gathers DNS info and checks for zone transfers
              Automatically checks for sub-domain hijacking
              Automatically runs targeted Nmap scripts against open ports
              Automatically runs targeted Metasploit scan and exploit modules
              Automatically scans all web applications for common vulnerabilities
              Automatically brute forces ALL open services
              Automatically test for anonymous FTP access
              Automatically runs WPScan, Arachni and Nikto for all web services
              Automatically enumerates NFS shares
              Automatically test for anonymous LDAP access
              Automatically enumerate SSL/TLS cyphers, protocols and vulnerabilities
              Automatically enumerate SNMP community strings, services and users
              Automatically list SMB users and shares, check for NULL sessions and exploit MS08-067
              Automatically exploit vulnerable JBoss, Java RMI and Tomcat servers
              Automatically tests for open X11 servers
              Auto-pwn added for Metasploitable, ShellShock, MS08-067, Default Tomcat Creds
              Performs high-level enumeration of multiple hosts and subnets
              Automatically integrates with Metasploit Pro, MSFConsole and Zenmap for reporting
              Automatically gathers screenshots of all websites
              Create individual workspaces to store all scan output
          Changelog
              v8.1 – Added Citrix Gateway Arbitary Code Execution CVE-2019-19781 vulnerability detection
              v8.1 – Added Pulse Secure VPN Arbitrary File Disclosure CVE-2019-11510 exploit
              v8.1 – Added –data-length=50 for NMap IPS evasion
              v8.1 – Removed NMap vulscan script due to F+ results
              v8.1 – Fixed issue with CRT.SH sub-domain retrieval
              v8.1 – Updated Kali Linux keyring package
              v8.1 – Fixed “[: ==: unary operator expected” in all code
              v8.1 – Updated Sn1per Professional autoload settings
              v8.1 – Updated web brute force wordlists
              v8.1 – Removed null and debug errors from passive spider API output
              v8.1 – Updated Commoncrawl index repo
              v8.1 – Updated DockerFile repository
              v8.1 – Fixed issue with -dh flag to delete host with Sn1per Pro v8.0
              v8.1 – Fixed issue with subfinder missing
              v8.1 – Fixed issue with 7zip missing
              v8.1 – Added check for Ubuntu to install.sh automatically

          Hidden Content
          Give reaction to this post to see the hidden content.