Written by Hack Forums - All Forums
who’s that give me that code rool 99.99 in bitsler???????????:
- Cough uid=2794225 ScammeR BEWARE $78 BTC https://hackforums.net/member.php?action...id=2794225 This guy scammed me 78$ in btc! 3 pics of the scam here.https://imgur.com/a/GceT LOL HE REPPED ME before I bought it too, watch this guy! Contact Details Skype live:cough.hf after the last pic he stopped responding. how sad he needed $78BTC that bad when I was a for sure client. Anyways DO NOT TRUST THIS USER HE IS A GOOD TALKER AND WILL KEEP GOING FOR DAYS, he has the drive to scam little money because he is a broke E-whorer so he wastes his time talking to dic pics anyways. BEWARE. also he disabled his acc or something after
- watch me fly walk to airoport scan.. result beep beep beep hackforum user detection.. ahh crap now have to explain why am sign on hackforum to police :/
- [CTF] HackFest 2016: Full Walkthrough (Quaoar, Sedna, Orcus) HackFest 2016: Full CTF Walkthrough Quaoar - EasySedna - MediumOrcus - Hard Hello all, I've recently been playing through the CTF challenges from HackFest 2016. I've decided to make this (fairly lengthy) write-up for those who are either playing this CTF or simply interested in the techniques and methods used in this challenge. I'll try and separate the three challenges as much as possible, however my notes are a little scattered (as they always are). The below walkthroughs will be more of a speedrun instead of a full playthrough. If you'd like to see my mad ramblings and train of thought with these CTF's, simply click below.[ Quaoar (All Notes) | Sedna (All Notes) | Orcus (All Notes) ] Quaoar Level 1 - ReconSpoiler (Click to View) Starting off with any CTF, I will always follow this method: 1. NetDiscover - This finds the target VM (I feel that looking at the VM's output is a little cheap sometimes, not like it's particularly difficult to find hosts on a LAN). Code:_____________________________________________________________________________ IP At MAC Address Count Len MAC Vendor / Hostname ----------------------------------------------------------------------------- 192.168.56.100 08:00:27:ea:00:d3 1 60 PCS Systemtechnik GmbH 192.168.56.101 08:00:27:ce:a9:4f 1 42 PCS Systemtechnik GmbH 2. Nmap - After locating the target's address, I'll run a thorough Nmap scan in-order to gain as much knowledge about the specific services as possible. Below is the output for the following command: Code:nmap -p- -A 192.168.56.101 [Full Nmap Report] Here's the TL;DR version: Code:22/tcp open ssh OpenSSH 5.9p1 Debian 5ubuntu1 (Ubuntu Linux; protocol 2.0) 53/tcp open domain ISC BIND 9.8.1-P1 80/tcp open http Apache httpd 2.2.22 ((Ubuntu)) 110/tcp open pop3 Dovecot pop3d 139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP) 143/tcp open imap Dovecot imapd 445/tcp open netbios-ssn Samba smbd 3.6.3 (workgroup: WORKGROUP) 993/tcp open ssl/imap Dovecot imapd 995/tcp open ssl/pop3 Dovecot pop3d 3. Quick banner check - Previous CTF challenges have sometimes left small hints on SSH and Telnet ports. So I now feel obligated to check every time. However, these challenges didn't have anything special to show there. So now I've compiled all the running services, it's time to check out the webserver. Usually I will separate this into different steps as well: 1. Manual Crawling and Source Code Analysis - The easier-side of CTF challenges will almost always have a clue (and sometimes a flag) hidden in the HTML source. However, this challenge series is a little different. The index page has no helpful resources available: All the image leads to is a Hackers reference, gave me a smile. However, no additional directories. 2. Automated Crawling / Directory Bruteforcing - So if you read the rambling notes at the top of this walkthrough, you'll notice that I really need to stop relying on Uniscan to brute directories for me. I used to use DirBuster, but it takes a long time for a full site crawl... Either way, here's the (useful) Uniscan output: Code:| Directory check: | [+] CODE: 200 URL: http://192.168.56.101/wordpress/ | [+] CODE: 200 URL: http://192.168.56.101/upload/ | | File check: | [+] CODE: 200 URL: http://192.168.56.101/index.html | [+] CODE: 200 URL: http://192.168.56.101/robots.txt | | Check robots.txt: | [+] Disallow: Hackers | [+] Allow: /wordpress/…
- [$2] EDU EMAILS. [PP/BTC] Good EDU Emails I'm selling @edu email accounts. People having them are eligible student offers and discounts, like a free 6-month Amazon Prime membership, Spotify and Apple Music discounts, the GitHub Student Pack which includes a $50 DigitalOcean code.Connected with Gmail Simple - $2. Most frequently sold, qualify for everything but AWS Educate. C̶u̶s̶t̶o̶m̶ ̶-̶ ̶$̶3̶.̶ ̶S̶a̶m̶e̶ ̶a̶s̶ ̶a̶b̶o̶v̶e̶,̶ ̶b̶u̶t̶ ̶c̶r̶e̶a̶t̶e̶d̶ ̶w̶i̶t̶h̶ ̶a̶ ̶l̶e̶g̶a̶l̶ ̶n̶a̶m̶e̶ ̶o̶f̶ ̶y̶o̶u̶r̶ ̶c̶h̶o̶i̶c̶e̶.̶ ̶F̶o̶r̶ ̶i̶n̶s̶t̶a̶n̶c̶e̶,̶ ̶i̶f̶ ̶y̶o̶u̶ ̶g̶a̶v̶e̶ ̶m̶e̶ ̶t̶h̶e̶ ̶n̶a̶m̶e̶ ̶J̶u̶s̶t̶i̶n̶ ̶B̶l̶a̶i̶r̶,̶ ̶y̶o̶u̶ ̶w̶o̶u̶l̶d̶ ̶g̶e̶t̶ ̶a̶n̶ ̶e̶m̶a̶i̶l̶ ̶l̶i̶k̶e̶ ̶j̶b̶l̶a̶i̶r̶@̶s̶o̶m̶e̶t̶h̶i̶n̶g̶.̶e̶d̶u̶Connected with Outlook S̶i̶m̶p̶l̶e̶ ̶-̶ ̶$̶4̶.̶ ̶T̶h̶e̶s̶e̶ ̶a̶c̶c̶o̶u̶n̶t̶s̶ ̶a̶r̶e̶ ̶t̶h̶e̶ ̶r̶a̶r̶e̶s̶t̶,̶ ̶h̶a̶v̶e̶ ̶a̶ ̶b̶u̶i̶l̶t̶-̶i̶n̶ ̶s̶u̶b̶s̶c̶r̶i̶p̶t̶i̶o̶n̶ ̶f̶o̶r̶ ̶O̶f̶f̶i̶c̶e̶ ̶3̶6̶5̶ ̶a̶n̶d̶ ̶d̶o̶ ̶q̶u̶a̶l̶i̶f̶y̶ ̶f̶o̶r̶ ̶A̶W̶S̶ ̶E̶d̶u̶c̶a̶t̶e̶ ̶$̶1̶0̶0̶ ̶P̶r̶o̶m̶o̶t̶i̶o̶n̶a̶l̶ ̶C̶r̶e̶d̶i̶t̶.̶ ̶C̶u̶s̶t̶o̶m̶ ̶-̶ ̶$̶5̶.̶ ̶S̶a̶m̶e̶ ̶a̶s̶ ̶a̶b̶o̶v̶e̶,̶ ̶b̶u̶t̶ ̶w̶i̶t̶h̶ ̶a̶ ̶l̶e̶g̶a̶l̶ ̶n̶a̶m̶e̶ ̶o̶f̶ ̶y̶o̶u̶r̶ ̶c̶h̶o̶i̶c̶e̶.̶ ̶I̶f̶ ̶y̶o̶u̶ ̶g̶a̶v̶e̶ ̶m̶e̶ ̶t̶h̶e̶ ̶n̶a̶m̶e̶ ̶T̶h̶o̶m̶a̶s̶ ̶M̶u̶r̶d̶o̶c̶k̶,̶ ̶y̶o̶u̶ ̶w̶o̶u̶l̶d̶ ̶g̶e̶t̶ ̶t̶m̶u̶r̶d̶o̶c̶k̶[̶n̶u̶m̶b̶e̶r̶]̶@̶d̶o̶m̶a̶i̶n̶.̶e̶d̶u̶Important + Terms of Service Outlook connected accounts do not work with Google Drive or GitHub Student Pack. An additional Gmail account with a random name is just $0.5 more for simple Outlook accounts and free for custom Outlook ones. When you apply for AWS Educate, your application might be not approved straight away. You should wait for up to ten days for the Educate team to review the request. These applications worked for me (twice, actually), but I DO NOT GUARANTEE the Educate team will approve yours. Your orders may take up to 72 hours to get fulfilled. Please be patient, I am not a robot and have my life too.Orders and paymenthttps://rocketr.net/buy/a3d0cc0076d4. I accept BTC and PayPal if you cover the fees. When you buy, you admit that you have read the Important + ToS section above. Things you can get with the email:Spoiler (Click to View)hese accounts can be used to get the following: Dreamspark software Microsoft office software Autodesk 3D software Riptiger software 6 MONTHS OF AMAZON PRIME, and 50% off Amazon Prime after 6 months Solid edge student edition software Lucidchart (diagramming web app) Fetch (Mac app) Prezi (online presentation app) Bitbucket cloud 3GB onedrive storage (1 year) 6 month lastpass premium password manager GitHub student dev pack Jetbrains (professional dev tools) Axure (professional prototyping software) PTC Creo 3D software YNAB (budget app) 1-year newegg premier service (qualifying schools only) Roboform (password manager) iDrive 50% off online backup Connectify 75% off services from $7 Adobe creative cloud 60% off Best Buy student coupons Techsmith educational program pricing
- Creating an AutoClicker (That isn’t complete garbage). I've seen quite a few posts on here regarding Autoclickers. Most new users or ones with little programming knowledge seem to be under the impression that an Autoclicker is some advanced piece of technology. Well, it's not and I'll show you how to make ...
- Can you find any Vulnerable? Please help me to find a vulnerable of this website. http://www.shadowapps.info Thank you
No related posts.