Bài đăng

Đang hiển thị bài đăng từ Tháng 4, 2021

Vulnhub Fsoft Hacking Challenges

Hình ảnh
Vulnhub Fsoft Hacking Challenges Vulnhub Fsoft Hacking Challenges Walkthrough We start by scanning the host with nmap Nmap –A –T4 –p- 192.168.1.7  Running dirb on the host there is a robot file inside of it some directories we can try The path  http://192.168.1.7/blog/  is running WordPress, now lets enumerate the users on the service wpscan –url  http://192.168.1.7/blog/  -e u  There is a backup path were have some files were we can download, one of them is a php page with some information of sql database were are a username – password – database name   The pathhttp://192.168.1.7/assets/ adminer.php  we can use these credentials in this page as:   Got it and now we can go through the database, I found the admin and fs0ft username and some passwords.     Now we need to add the host name of WordPress to our hosts file    Now we go to  http://fsoft.hacking/blog/wp-login.php  and login using username fs0ft and ...

Social engineering with pastebin.com and ssh to rob bitcoin - phishing

Hình ảnh
  Social engineering with pastebin.com and ssh to rob bitcoin - phishing Social engineering with pastebin.com and ssh to rob bitcoin Visit pastebin.com see an ssh password account note of a server Connect ssh: If you want to take over the number of bitcoins that are currently in the system, you will receive a message confirming that bitcoin account and having to transfer into that bitcoin wallet a small amount of bitcoin to authenticate. After you transfer, you will be fooled. Thank for ...

frida-android-unpinning-ssl

Hình ảnh
  frida-android-unpinning-ssl frida-android-unpinning-ssl /*     Android SSL Re-pinning frida script v0.1 @masbog     $ frida -U -f it.app.mobile -l frida-android-unpinning-ssl.js    $ [Samsung GT-I9500::it.app.mobile]-> %resume        or        $ frida --codeshare masbog/frida-android-unpinning-ssl    $ [Samsung GT-I9500::it.app.mobile]-> %resume        TODO: bypass kony android application        original source code from: https://github.com/sensepost/objection/blob/8974d37733d108762184bb41fe8d0a4f1fffb591/objection/hooks/android/pinning/disable.js     */ setTimeout(function() {     Java.perform(function() {         console.log("");         console.log("[.] Android Cert Pinning Bypass");         var CertificateFactory = Java.use("java.security.cert.CertificateFactory"...

Instagram Hacking Ebook - "jonathan galindo" doing...

Hình ảnh
  6 thg 7, 2020 Instagram Hacking Ebook - "jonathan galindo" doing... Instagram Hacking Ebook - "jonathan galindo" doing... Instagram Hacking Ebook - "jonathan galindo" doing... Shaco JX   -  11:40 Chia sẻ Không có nhận xét nào: Đăng nhận xét ‹ › Trang chủ Xem phiên bản web Được tạo 6 thg 7, 2020 Instagram Hacking Ebook - "jonathan galindo" doing... Instagram Hacking Ebook - "jonathan galindo" doing... Instagram Hacking Ebook - "jonathan galindo" doing... Shaco JX   -  11:40 Chia