سرورهای دی ان اس Quad9 شرکت IBM جایگزینی برای دی ان اس گوگل
آی پی این دی ان اس ها 9.9.9.9 بوده و با جمع آوری اطلاعات از منابع مختلف در خصوص دامنه های آسیب زننده، شما را از بازدید این سایت ها آگاه میکند.
توضیحات بیشتر و نحوه نصب در لینوکس:
https://www.dnsknowledge.com/tutorials/how-to-setup-quad9-dns-on-a-linux/
#dns
#google
#quad9
#ibm
#malware
@sec_nerd
آی پی این دی ان اس ها 9.9.9.9 بوده و با جمع آوری اطلاعات از منابع مختلف در خصوص دامنه های آسیب زننده، شما را از بازدید این سایت ها آگاه میکند.
توضیحات بیشتر و نحوه نصب در لینوکس:
https://www.dnsknowledge.com/tutorials/how-to-setup-quad9-dns-on-a-linux/
#dns
#quad9
#ibm
#malware
@sec_nerd
Dnsknowledge
How to setup Quad9 DNS on a Linux
Quad9 is a free security solution that uses DNS to protect your systems against the most common cyber threats and you can setup it on Linux.
X Attacker
ابزار تست نفوذ و اکسپلویت کردن آسیب پذیری ها در وبسایتها
https://github.com/Moham3dRiahi/XAttacker
#web
#pentest
@sec_nerd
ابزار تست نفوذ و اکسپلویت کردن آسیب پذیری ها در وبسایتها
https://github.com/Moham3dRiahi/XAttacker
#web
#pentest
@sec_nerd
GitHub
GitHub is where people build software. More than 150 million people use GitHub to discover, fork, and contribute to over 420 million projects.
رایت آپ با موضوع نفوذ به وب
https://drive.google.com/file/d/1zKSduUD-tRAJ29sUbNsiNbMlJfAJ2s-H/view
#writeup
#web
#pentest
@sec_nerd
https://drive.google.com/file/d/1zKSduUD-tRAJ29sUbNsiNbMlJfAJ2s-H/view
#writeup
#web
#pentest
@sec_nerd
توضیحاتی در مورد استفاده از Responder و سرقت هش های NTLM
https://osandamalith.com/2017/03/24/places-of-interest-in-stealing-netntlm-hashes/
#windows
#responder
#sniff
#network
@sec_nerd
https://osandamalith.com/2017/03/24/places-of-interest-in-stealing-netntlm-hashes/
#windows
#responder
#sniff
#network
@sec_nerd
🔐Blog of Osanda
Places of Interest in Stealing NetNTLM Hashes | 🔐Blog of Osanda
One day me and @m3g9tr0n were discussing different places where we can use responder in stealing NetNTLM hashes. After experimenting I thought of writing this post along with some cool findings in …
This media is not supported in your browser
VIEW IN TELEGRAM
راهکارهای جایگزین برای دستیابی به یوزر SYSTEM
https://blog.xpnsec.com/becoming-system/
#windows
#privilege_escalate
#network
@sec_nerd
https://blog.xpnsec.com/becoming-system/
#windows
#privilege_escalate
#network
@sec_nerd
write-up for dont_panic
موضوع : مهندسی معکوس
https://eternal.red/2017/dont_panic-writeup/
#RE
#writeup
@sec_nerd
موضوع : مهندسی معکوس
https://eternal.red/2017/dont_panic-writeup/
#RE
#writeup
@sec_nerd
رایت آپ H1-212 CTF هکر وان
https://www.sxcurity.pro/H1-212%20CTF%20Solution.pdf
#web
#hackerone
#bugBounty
@sec_nerd
https://www.sxcurity.pro/H1-212%20CTF%20Solution.pdf
#web
#hackerone
#bugBounty
@sec_nerd
اسکریپت بروت فورس باکت های s3 سرورهای ابری آمازون
lazys3
https://github.com/nahamsec/lazys3
#aws
#cloud
#bruteForce
@sec_nerd
lazys3
https://github.com/nahamsec/lazys3
#aws
#cloud
#bruteForce
@sec_nerd
GitHub
GitHub - nahamsec/lazys3
Contribute to nahamsec/lazys3 development by creating an account on GitHub.
جلوگیری از جاسوسی ویندوز ۱۰ با تغییر در فایل هاست و رجیستری
https://github.com/WindowsLies/BlockWindows
#windows
#telemetry
#spy
@sec_nerd
https://github.com/WindowsLies/BlockWindows
#windows
#telemetry
#spy
@sec_nerd
GitHub
GitHub - WindowsLies/BlockWindows: Stop Windows 10 Nagging and Spying. Works with Win7-10
Stop Windows 10 Nagging and Spying. Works with Win7-10 - WindowsLies/BlockWindows
امنیت اطلاعات
Mr_Robot_S03E06_eps3_5_kill_pr0cess.mkv
کلید GPG مورد استفاده الیوت در این قسمت 9C2FA3D1
https://pgp.mit.edu/pks/lookup?op=get&search=0xB178523B9C2FA3D1
#mr_robot
@sec_nerd
https://pgp.mit.edu/pks/lookup?op=get&search=0xB178523B9C2FA3D1
#mr_robot
@sec_nerd
امنیت اطلاعات
Mr_Robot_S03E06_eps3_5_kill_pr0cess.mkv
اسکن رنج آی پی مورد استفاده در این سریال:
nmap -sP 192.251.68.0/24
Starting Nmap 7.40 ( https://nmap.org ) at 2017-11-21 15:50 +0330
Nmap scan report for 192.251.68.218 irrelevant
Host is up (0.32s latency).
Nmap scan report for 192.251.68.223 (https://compute.e-corp-usa.com)
Host is up (0.30s latency).
Nmap scan report for 192.251.68.224 (https://y8agrfx3.bxjyb2jvda.net/) virtual linux machine
Host is up (0.31s latency).
Nmap scan report for 192.251.68.229 (https://yac9cl78.bxjyb2jvda.net/) upsadmin putty! jalebe!
Host is up (0.32s latency).
Nmap scan report for 192.251.68.232 (https://ycg67gca.bxjyb2jvda.net) kibana panel used in e-corp
Host is up (0.32s latency).
Nmap scan report for 192.251.68.233 (https://yakkqwhz.bxjyb2jvda.net/) frankBowman
Host is up (0.34s latency).
Nmap scan report for 192.251.68.234 (https://yakkqwhz.bxjyb2jvda.net/) frankBowman
Host is up (0.34s latency).
Nmap scan report for 192.251.68.238 (https://y9bukwer.bxjyb2jvda.net/) Live IP Camera
Host is up (0.31s latency).
Nmap scan report for 192.251.68.239 (https://i239.bxjyb2jvda.net/) fsociety ransom page
Host is up (0.32s latency).
Nmap scan report for 192.251.68.240 (https://irc.colo-solutions.net/) fsociety IRC channel
Host is up (0.32s latency).
Nmap scan report for 192.251.68.241 (https://www.conficturaindustries.com/) looks irrelevant
Host is up (0.32s latency).
Nmap scan report for 192.251.68.242 (https://i242.bxjyb2jvda.net/) UPS admin putty (ups_fw_patch.zip here)
Host is up (0.33s latency).
Nmap scan report for 192.251.68.243 (https://i243.bxjyb2jvda.net/) kali linux connects to mobley android
Host is up (0.33s latency).
Nmap scan report for 192.251.68.244 irrelevant
Host is up (0.33s latency).
Nmap scan report for 192.251.68.245 (https://i245.bxjyb2jvda.net/) some oldschool screen
Host is up (0.33s latency).
Nmap scan report for 192.251.68.246 (https://i246.bxjyb2jvda.net/) Elliot tools
Host is up (0.33s latency).
Nmap scan report for 192.251.68.247 (https://i247.bxjyb2jvda.net) mimikatz
Host is up (0.34s latency).
Nmap scan report for 192.251.68.248 irrelevant
Host is up (0.34s latency).
Nmap scan report for 192.251.68.249 irc channel
Host is up (0.34s latency).
Nmap scan report for 192.251.68.250 ransom page
Host is up (0.34s latency).
Nmap scan report for 192.251.68.251 irrelevant
Host is up (0.34s latency).
Nmap scan report for 192.251.68.252 irrelevant
Host is up (0.35s latency).
Nmap scan report for 192.251.68.253 irc channel
Host is up (0.35s latency).
Nmap scan report for 192.251.68.254 ransom page
Host is up (0.35s latency).
Nmap done: 256 IP addresses (24 hosts up) scanned in 52.97 seconds
#mr_robot
@sec_nerd
nmap -sP 192.251.68.0/24
Starting Nmap 7.40 ( https://nmap.org ) at 2017-11-21 15:50 +0330
Nmap scan report for 192.251.68.218 irrelevant
Host is up (0.32s latency).
Nmap scan report for 192.251.68.223 (https://compute.e-corp-usa.com)
Host is up (0.30s latency).
Nmap scan report for 192.251.68.224 (https://y8agrfx3.bxjyb2jvda.net/) virtual linux machine
Host is up (0.31s latency).
Nmap scan report for 192.251.68.229 (https://yac9cl78.bxjyb2jvda.net/) upsadmin putty! jalebe!
Host is up (0.32s latency).
Nmap scan report for 192.251.68.232 (https://ycg67gca.bxjyb2jvda.net) kibana panel used in e-corp
Host is up (0.32s latency).
Nmap scan report for 192.251.68.233 (https://yakkqwhz.bxjyb2jvda.net/) frankBowman
Host is up (0.34s latency).
Nmap scan report for 192.251.68.234 (https://yakkqwhz.bxjyb2jvda.net/) frankBowman
Host is up (0.34s latency).
Nmap scan report for 192.251.68.238 (https://y9bukwer.bxjyb2jvda.net/) Live IP Camera
Host is up (0.31s latency).
Nmap scan report for 192.251.68.239 (https://i239.bxjyb2jvda.net/) fsociety ransom page
Host is up (0.32s latency).
Nmap scan report for 192.251.68.240 (https://irc.colo-solutions.net/) fsociety IRC channel
Host is up (0.32s latency).
Nmap scan report for 192.251.68.241 (https://www.conficturaindustries.com/) looks irrelevant
Host is up (0.32s latency).
Nmap scan report for 192.251.68.242 (https://i242.bxjyb2jvda.net/) UPS admin putty (ups_fw_patch.zip here)
Host is up (0.33s latency).
Nmap scan report for 192.251.68.243 (https://i243.bxjyb2jvda.net/) kali linux connects to mobley android
Host is up (0.33s latency).
Nmap scan report for 192.251.68.244 irrelevant
Host is up (0.33s latency).
Nmap scan report for 192.251.68.245 (https://i245.bxjyb2jvda.net/) some oldschool screen
Host is up (0.33s latency).
Nmap scan report for 192.251.68.246 (https://i246.bxjyb2jvda.net/) Elliot tools
Host is up (0.33s latency).
Nmap scan report for 192.251.68.247 (https://i247.bxjyb2jvda.net) mimikatz
Host is up (0.34s latency).
Nmap scan report for 192.251.68.248 irrelevant
Host is up (0.34s latency).
Nmap scan report for 192.251.68.249 irc channel
Host is up (0.34s latency).
Nmap scan report for 192.251.68.250 ransom page
Host is up (0.34s latency).
Nmap scan report for 192.251.68.251 irrelevant
Host is up (0.34s latency).
Nmap scan report for 192.251.68.252 irrelevant
Host is up (0.35s latency).
Nmap scan report for 192.251.68.253 irc channel
Host is up (0.35s latency).
Nmap scan report for 192.251.68.254 ransom page
Host is up (0.35s latency).
Nmap done: 256 IP addresses (24 hosts up) scanned in 52.97 seconds
#mr_robot
@sec_nerd
تمپلیت html رایگان StarAdmin
https://github.com/BootstrapDash/StarAdmin-Free-Bootstrap-Admin-Template
#html
#template
@sec_nerd
https://github.com/BootstrapDash/StarAdmin-Free-Bootstrap-Admin-Template
#html
#template
@sec_nerd
امنیت اطلاعات
دادگستری آمریکا با متهم کردن یک ایرانی به نام «بهزاد مصری» به هک کردن شبکه رایانهای شرکت سازنده سریال «بازی تاج و تخت» و سرقت قسمتهای منتشر نشده آن، وی را تحت پیگرد قرار داد. منبع : فارس #news #iran #usa #breach #got7 @sec_nerd
Iranian Behzad Mesri charged in HBO hack, ‘Game of Thrones’ script theft
بهزاد مصری به عنوان عضوی از گروه هکری Turk Black Hat Security توسط دادگستری ایالات متحده به عنوان مجرم معرفی و تحت پیگرد قرار گرفت.
این تیم با ادعای nbc برای ارتش ایران علیه اسراییل اقدام به حملات سایبری کرده است.
@sec_nerd
هک شبکه HBO در دادگاه ارتباطی به دولت ایران پیدا نکرده و مصری به صورت شخصی این حمله را صورت داده است.
این هکر موفق شد با نفوذ به حساب کارکنان کمپانی HBO چهار قسمت از فصل هفت سریال Game of Thrones را بدست آورد.
https://www.nbcnews.com/news/world/iranian-behzad-mesri-charged-hbo-hack-game-thrones-script-theft-n822831
پست های مرتبط در زمان وقوع این حمله که در کانال پوشش داده شد:
https://t.iss.one/sec_nerd/414
https://t.iss.one/sec_nerd/443
https://t.iss.one/sec_nerd/464
#hbo
#got7
#iran
#usa
@sec_nerd
بهزاد مصری به عنوان عضوی از گروه هکری Turk Black Hat Security توسط دادگستری ایالات متحده به عنوان مجرم معرفی و تحت پیگرد قرار گرفت.
این تیم با ادعای nbc برای ارتش ایران علیه اسراییل اقدام به حملات سایبری کرده است.
@sec_nerd
هک شبکه HBO در دادگاه ارتباطی به دولت ایران پیدا نکرده و مصری به صورت شخصی این حمله را صورت داده است.
این هکر موفق شد با نفوذ به حساب کارکنان کمپانی HBO چهار قسمت از فصل هفت سریال Game of Thrones را بدست آورد.
https://www.nbcnews.com/news/world/iranian-behzad-mesri-charged-hbo-hack-game-thrones-script-theft-n822831
پست های مرتبط در زمان وقوع این حمله که در کانال پوشش داده شد:
https://t.iss.one/sec_nerd/414
https://t.iss.one/sec_nerd/443
https://t.iss.one/sec_nerd/464
#hbo
#got7
#iran
#usa
@sec_nerd
NBC News
The feds say an Iranian hacked HBO and stole "Game of Thrones" material
Mesri allegedly launched a campaign in May to gain access to HBO's servers through employee user accounts, and then got his hands on new episodes of hit shows.