Jump to content

We are happy to let you know that SIRUMIUM (ex crimeclub) is back online.
If you are old vendor here you will have one month bonus on your advertise and free banner in rotation.


All Activity

This stream auto-updates     

  1. Yesterday
  2. Browser Blocker for Windows blocks common browsers from accessing the internet on Windows. To block just run the batch as admin (Right click > Run as administrator) and select the browser. Download: https://filecrypt.cc/Container/43942BEC58.html https://www.file-upload.com/am5js5pp1b34 https://ddownload.com/z2h0fy9u822v http://www.filefactory.com/file/4avzkozl85uo/Browser Blocker for Windows.rar https://rg.to/file/f55985f59542e1d33ff758146a99f14d/Browser_Blocker_for_Windows.rar.html Virus Scan: The file is in plain text.
  3. Last week
  4. it's photoshop design service to do commercial for ur shop add me for more info
  5. Earlier
  6. what is this photo service about @REK00H4CK ? more details
  7. Hello .. I'm Introducing my service in photoshop design .. I Design [ Avatar - Banners - Web site pages - ] Prices : Avatar = 15$ Banner = 50$ ( small banner ) Banner = 100$ ( Big banner ) note : price change with diffrent sizes ... Payment is upfront you will pay 100% of the price before design .. Escrow is always welcome .. [ you will pay the fee ] price always change with diffrent sizes of the design .. payment only [ BTC ] Icq : 635079947 Rek00hack In Your Service
  8. thanks admin for the leak .
  9. Enjoy. https://mega.nz/file/GlcgXC7K#dO2InKil0btGFc7xNOIZp-ncJlZg4Isrjap1wQrhlmU
  10. Full source: https://medium.com/tenable-techblog/using-webrtc-ice-servers-for-port-scanning-in-chrome-ce17b19dd474 Using the browser to scan a LAN isn’t a new idea. There are many implementations that use XHR requests, websockets, or plain HTML to discover and fingerprint LAN devices. But in this blog, I’ll introduce a new scanning technique using WebRTC ICE servers. This technique is fast and, unlike the other methods, bypasses the blocked ports list. Unfortunately, it only works when the victim is using Chrome. You can skip my explanation and go straight to the code or the demo page. Otherwise, let’s start with a proof of concept video. Here I am scanning my network. https://www.youtube.com/watch?v=M6lBVhkzUmM&feature=emb_logo What’s an ICE Server? As I said, the scanning technique uses WebRTC ICE servers. An ICE server is a STUN or TURN server considered by a WebRTC RTCPeerConnection for self discovery, NAT traversal, and/or relay. A list of servers can be passed into the RTCPeerConnection’s constructor. Here’s an example constructor being provided one of Google’s public STUN servers: When the above RTCPeerConnection enters the ICE gathering state it will attempt to connect to the provided server. Protocols Matter ICE servers can be bound to either UDP or TCP ports. However, unless instructed otherwise, Chrome appears to only attempt communication over UDP. Below is a Wireshark screenshot of the packets Chrome sends to a non-existent TURN server. Everything is UDP. You can force Chrome to reach out over TCP if you know something about the ICE server URLs. The URLs passed to the RTCPeerConnection’s constructor must conform to RFC 7064 (STUN) or RFC 7065 (TURN). The TURN URI scheme follows: Most important for scanning purposes is the optional “?transport=” field. Chrome can be forced to use ICE over TCP by using a TURN URI that ends with “?transport=tcp”. We now have a way to initiate a TCP connection with any IP and port we choose. However, since almost all the hosts we’ll scan won’t be TURN servers, how can we determine if a host is alive or not? Determining If a Host Is Alive The following JSFiddle generates 256 TURN URI in order to find an active address in the range of 192.168.[0–255].1 https://jsfiddle.net/49n5oLj7/
  11. Maze: Newsmaze[.]top mazenews[.]top dnspexdevfbct2agyu3oxrmhm4ggf4ec6iwpnlb3kwb2rigrtuz3sayd[.]onion DoppelPaymer: doppleleaks[.]info doppleshare[.]top hpoo4dosa3x4ognfxpqcrjwnsigvslm7kv6hvmhh2yqczaxy3j6qnwad[.]onion REvil: dnpscnbaix6nkwvystl3yxglz7nteicqrou3t75tpcc5532cztc46qyd[.]onion Nemty: zjoxyw5mkacojk5ptn2iprkivg5clow72mjkyk5ttubzxprjjnwapkad[.]onion Nemty[.]top Nemty2[.]top Nefilim: hxt254aygrsziejn[.]onion Sekhmet: rlmuybcg5h5gaatr[.]onion Clop: ekbgzchl6x2ias37[.]onion Ragnar: p6o7m73ujalhgkiv[.]onion Snatch: snatch24uldhpwrm[.]onion snatchwezarcr27t[.]onion snatch6brk4nfczg[.]onion snatchh5ssxiorrn[.]onion snatch2q72f2wjff[.]onion snatch6rpvi7yy4t[.]onion mydatassuperhero [.] com mydatasuperhero[.]com
  12. Source: https://www.fireeye.com/blog/threat-research/2020/08/hands-on-introduction-to-mandiant-approach-to-ot-red-teaming.html Operational technology (OT) asset owners have historically considered red teaming of OT and industrial control system (ICS) networks to be too risky due to the potential for disruptions or adverse impact to production systems. While this mindset has remained largely unchanged for years, Mandiant's experience in the field suggests that these perspectives are changing; we are increasingly delivering value to customers by safely red teaming their OT production networks. This increasing willingness to red team OT is likely driven by a couple of factors, including the growing number and visibility of threats to OT systems, the increasing adoption of IT hardware and software into OT networks, and the maturing of OT security teams. In this context, we deemed it relevant to share some details on Mandiant's approach to red teaming in OT based on years of experience supporting customers learning about tangible threats in their production environments. In this post we introduce Mandiant's approach to OT red teaming and walk through a case study. During that engagement, it took Mandiant only six hours to gain administrative control on the target's OLE for Process Control (OPC) servers and clients in the target's Distributed Control System (DCS) environment. We then used this access to collect information and develop an attack scenario simulating the path a threat actor could take to prepare for and attack the physical process (We highlight that the red team did not rely on weaknesses of the DCS, but instead weak password implementations in the target environment). NOTE: Red teaming in OT production systems requires planning, preparation and "across the aisle" collaboration. The red team must have deep knowledge of industrial process control and the equipment, software, and systems used to achieve it. The red team and the asset owner must establish acceptable thresholds before performing any activities. Visit our website for more information or to request Mandiant services or threat intelligence. Mandiant's Approach for Safe Red Teaming in OT Mandiant's approach to red teaming OT production systems consists of two phases: active testing on IT and/or OT intermediary systems, and custom attack modeling to develop one or more realistic attack scenarios. Our approach is designed to mirror the OT-targeted attack lifecycle—with active testing during initial stages (Initial Compromise, Establish Foothold, Escalate Privileges, and Internal Reconnaissance), and a combination of active/passive data collection and custom threat modeling to design feasible paths an attacker would follow to complete the mission.
  13. Source: https://labs.sentinelone.com/living-off-windows-land-a-new-native-file-downldr/ There are only a couple of default system-signed executables that let you download a file from a Web Server, and every security product and threat hunter specifically looks for them for signs of misuse or abuse by threat actors. While the usage of LOLBins[1] in the wild has been extensively written about[2,3], uncovering novel ones helps security practitioners and researchers alike prevent abuse of these native tools. In this post, we share details of a new binary that can be used as a stealthy downloader instead of the widely-leveraged – and monitored – certutil[4]. The binary desktopimgdownldr.exe, located in system32 folder in Windows 10, is originally used to set lock screen or desktop background image as part of Personalization CSP[5]. Therefore, it can be run as a standard user like this:
  14. This is awesome and will help to get active member. but hope to get good quality posts. I will contribute too.
  15. important message i change my telegram i see people get ripp by fake crooks here is the new telegram : HD_Pl4stic
  16. Nothing since the new domain name change
  1. Load more activity