Bài đăng

Hình ảnh
QCG.id.vn     webp:

Vulnhub Fsoft Hacking Challenges

Hình ảnh
Vulnhub Fsoft Hacking Challenges Vulnhub Fsoft Hacking Challenges Walkthrough We start by scanning the host with nmap Nmap –A –T4 –p- 192.168.1.7  Running dirb on the host there is a robot file inside of it some directories we can try The path  http://192.168.1.7/blog/  is running WordPress, now lets enumerate the users on the service wpscan –url  http://192.168.1.7/blog/  -e u  There is a backup path were have some files were we can download, one of them is a php page with some information of sql database were are a username – password – database name   The pathhttp://192.168.1.7/assets/ adminer.php  we can use these credentials in this page as:   Got it and now we can go through the database, I found the admin and fs0ft username and some passwords.     Now we need to add the host name of WordPress to our hosts file    Now we go to  http://fsoft.hacking/blog/wp-login.php  and login using username fs0ft and ...

Social engineering with pastebin.com and ssh to rob bitcoin - phishing

Hình ảnh
  Social engineering with pastebin.com and ssh to rob bitcoin - phishing Social engineering with pastebin.com and ssh to rob bitcoin Visit pastebin.com see an ssh password account note of a server Connect ssh: If you want to take over the number of bitcoins that are currently in the system, you will receive a message confirming that bitcoin account and having to transfer into that bitcoin wallet a small amount of bitcoin to authenticate. After you transfer, you will be fooled. Thank for ...

frida-android-unpinning-ssl

Hình ảnh
  frida-android-unpinning-ssl frida-android-unpinning-ssl /*     Android SSL Re-pinning frida script v0.1 @masbog     $ frida -U -f it.app.mobile -l frida-android-unpinning-ssl.js    $ [Samsung GT-I9500::it.app.mobile]-> %resume        or        $ frida --codeshare masbog/frida-android-unpinning-ssl    $ [Samsung GT-I9500::it.app.mobile]-> %resume        TODO: bypass kony android application        original source code from: https://github.com/sensepost/objection/blob/8974d37733d108762184bb41fe8d0a4f1fffb591/objection/hooks/android/pinning/disable.js     */ setTimeout(function() {     Java.perform(function() {         console.log("");         console.log("[.] Android Cert Pinning Bypass");         var CertificateFactory = Java.use("java.security.cert.CertificateFactory"...

Instagram Hacking Ebook - "jonathan galindo" doing...

Hình ảnh
  6 thg 7, 2020 Instagram Hacking Ebook - "jonathan galindo" doing... Instagram Hacking Ebook - "jonathan galindo" doing... Instagram Hacking Ebook - "jonathan galindo" doing... Shaco JX   -  11:40 Chia sẻ Không có nhận xét nào: Đăng nhận xét ‹ › Trang chủ Xem phiên bản web Được tạo 6 thg 7, 2020 Instagram Hacking Ebook - "jonathan galindo" doing... Instagram Hacking Ebook - "jonathan galindo" doing... Instagram Hacking Ebook - "jonathan galindo" doing... Shaco JX   -  11:40 Chia