β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Infrared devices in Linux full bu UndercOde
This article mainly introduces the relationship between Infrared and Linux, and describes the types of Infrared and the protocols and architectures supported by Linux Infrared. Linux IrDA uses IrDA infrared wireless transmission to communicate with peripheral devices. These devices include printers, modems, fax machines, mobile phones, and today's applications on PDAs.
Pinterest.com/UndercOdeOfficial
π¦ The types of Infrared include:
1) SIR: Standard IR-115200bps (emulation Serial Port)
2) MIR: Middle IR-1.15Mbps
3) FIR: Fast IR-4Mbps
4) VFIR: Very Fast IR-16Mbpshgdi
5) Dongle: Infrared adapters for the serial port
π¦ Linux Infrared Supported protocols:
Linux The protocols supported by IrDA include
1) .IrLAP
2) .IrLMP
3) .IrIAS
4) .IrIAP
5) .IrLPT-transfers between printers
6) .IrCOMM-emulate Serial and Parallel port
7) .IrOBEX-object (file etc.) transmission
8) .IrLAN-infrared network device (HTTP etc.)
9). IrSocket
π¦ The architecture of IrMC Linux Infrared:
Since its development in 1997, Linux IrDA is basically divided into two parts:
1) Linux-IrDA source code integrated in the Linux kernel Kernel version 2.2.x ~
directory-
γγ/ usr / src / linux / net / irda (protocal stuff)
γγ/ usr / src / linux / drivers / net / irda (device drivers)
γγ/ usr / src / linux / include / net / irda (header files)
2) Linux-IrDA tools.
PS. Currently throwing It is an experimental stage.
π¦ Linux system settings:
1) Edit file: /etc/conf.modules
#Irda
alias tty-ldisc-11 irtty
alias char-major-161 ircomm-tty
# post-install ircomm-tty /etc/rc.d /init.d/rc.irda autostart
# post-remove ircomm-tty /etc/rc.d/init.d/rc.irda autostop
2) Run: depmod -a
File the Edit: / etc / IrDA / your ON the IR Chip Drivers the depend.
3) The Run: depmod -a
π¦ HOW TO ?
In Case Dell Inspiron 5000
1) determines BIOS has IrDA enabled, and the recording system allocates resources (IRQ, DMA, I / O Port )
2) When recompiling Kernel
make menuconfig, IrDA modules are enabled, and check the protocols that need to be supported.
3) Install Irda-utils RPM
> irmanager: Detect peripheral infrared devices
irattach: Enable (mount) infrared
irdadump: Monitor the transmission between infrared devices
irdaping : Ping infrared peripheral device
irkbd: infrared keyboard
4) system is set with reference to the previous section
VI /etc/rc.config START_IRDA = Yes
LN -s /etc/rc.config /etc/rc.d/rd3.d/S99irda
the mknod / dev / irnine c 161 0
ln -s / dev / pilot / etc / irnine
E N J O Y
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Infrared devices in Linux full bu UndercOde
This article mainly introduces the relationship between Infrared and Linux, and describes the types of Infrared and the protocols and architectures supported by Linux Infrared. Linux IrDA uses IrDA infrared wireless transmission to communicate with peripheral devices. These devices include printers, modems, fax machines, mobile phones, and today's applications on PDAs.
Pinterest.com/UndercOdeOfficial
π¦ The types of Infrared include:
1) SIR: Standard IR-115200bps (emulation Serial Port)
2) MIR: Middle IR-1.15Mbps
3) FIR: Fast IR-4Mbps
4) VFIR: Very Fast IR-16Mbpshgdi
5) Dongle: Infrared adapters for the serial port
π¦ Linux Infrared Supported protocols:
Linux The protocols supported by IrDA include
1) .IrLAP
2) .IrLMP
3) .IrIAS
4) .IrIAP
5) .IrLPT-transfers between printers
6) .IrCOMM-emulate Serial and Parallel port
7) .IrOBEX-object (file etc.) transmission
8) .IrLAN-infrared network device (HTTP etc.)
9). IrSocket
π¦ The architecture of IrMC Linux Infrared:
Since its development in 1997, Linux IrDA is basically divided into two parts:
1) Linux-IrDA source code integrated in the Linux kernel Kernel version 2.2.x ~
directory-
γγ/ usr / src / linux / net / irda (protocal stuff)
γγ/ usr / src / linux / drivers / net / irda (device drivers)
γγ/ usr / src / linux / include / net / irda (header files)
2) Linux-IrDA tools.
PS. Currently throwing It is an experimental stage.
π¦ Linux system settings:
1) Edit file: /etc/conf.modules
#Irda
alias tty-ldisc-11 irtty
alias char-major-161 ircomm-tty
# post-install ircomm-tty /etc/rc.d /init.d/rc.irda autostart
# post-remove ircomm-tty /etc/rc.d/init.d/rc.irda autostop
2) Run: depmod -a
File the Edit: / etc / IrDA / your ON the IR Chip Drivers the depend.
3) The Run: depmod -a
π¦ HOW TO ?
In Case Dell Inspiron 5000
1) determines BIOS has IrDA enabled, and the recording system allocates resources (IRQ, DMA, I / O Port )
2) When recompiling Kernel
make menuconfig, IrDA modules are enabled, and check the protocols that need to be supported.
3) Install Irda-utils RPM
> irmanager: Detect peripheral infrared devices
irattach: Enable (mount) infrared
irdadump: Monitor the transmission between infrared devices
irdaping : Ping infrared peripheral device
irkbd: infrared keyboard
4) system is set with reference to the previous section
VI /etc/rc.config START_IRDA = Yes
LN -s /etc/rc.config /etc/rc.d/rd3.d/S99irda
the mknod / dev / irnine c 161 0
ln -s / dev / pilot / etc / irnine
E N J O Y
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦All Linux command: bzip2
bzip2
twitter.com/UndercOdeTC
π¦ ππΌππ πππΈβπ :
1) Function description: Compression program for .bz2 file.
2) Syntax: bzip2 [-cdfhkLstvVz] [-repetitive-best] [-repetitive-fast] [-compression level] [files to be compressed]
3) Supplementary explanation: bzip2 uses a new compression algorithm, and the compression effect is better than traditional LZ77 / The LZ78 compression algorithm is good. If you do not add any parameters, bzip2 will generate a .bz2 compressed file after deleting the file, and delete the original file.
π¦ Parameters:
γ-c or --stdout send compressed and decompressed results to standard output.
γ-d or --decompress performs decompression.
γ-f or --force bzip2 When compressing or decompressing, if the output file has the same name as an existing file, the preset file will not be overwritten by default. To override, use this parameter.
γ-h or --help Display help.
γ-k or --keep bzip2 deletes the original file after compression or
decompression. To keep the original file, use this parameter.
γ-s or --small reduces the amount of memory used during program execution.
γ-t or --test Test the integrity of the .bz2 compressed file.
γ-v or --verbose Display detailed information when compressing or decompressing files.
γ-z or --compress Force compression.
γ-L, --license,
γ-V or --version Display version information.
γ--repetitive-best If there are repeated data in the file, you can use this parameter to improve the compression effect.
γ--repetitive-fast If there is repeated information in the file, this parameter can be used to speed up the execution.
γ-Compression level Block size when compressed.
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦All Linux command: bzip2
bzip2
twitter.com/UndercOdeTC
π¦ ππΌππ πππΈβπ :
1) Function description: Compression program for .bz2 file.
2) Syntax: bzip2 [-cdfhkLstvVz] [-repetitive-best] [-repetitive-fast] [-compression level] [files to be compressed]
3) Supplementary explanation: bzip2 uses a new compression algorithm, and the compression effect is better than traditional LZ77 / The LZ78 compression algorithm is good. If you do not add any parameters, bzip2 will generate a .bz2 compressed file after deleting the file, and delete the original file.
π¦ Parameters:
γ-c or --stdout send compressed and decompressed results to standard output.
γ-d or --decompress performs decompression.
γ-f or --force bzip2 When compressing or decompressing, if the output file has the same name as an existing file, the preset file will not be overwritten by default. To override, use this parameter.
γ-h or --help Display help.
γ-k or --keep bzip2 deletes the original file after compression or
decompression. To keep the original file, use this parameter.
γ-s or --small reduces the amount of memory used during program execution.
γ-t or --test Test the integrity of the .bz2 compressed file.
γ-v or --verbose Display detailed information when compressing or decompressing files.
γ-z or --compress Force compression.
γ-L, --license,
γ-V or --version Display version information.
γ--repetitive-best If there are repeated data in the file, you can use this parameter to improve the compression effect.
γ--repetitive-fast If there is repeated information in the file, this parameter can be used to speed up the execution.
γ-Compression level Block size when compressed.
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ 2020 topic Geolocation Spy (GeoSpy) is an OSINT analysis and research tool that is used to track and execute
intelligent social engineering attacks in real time. It was created with the aim of teaching the world
show large Internet companies could obtain confidential information such as the status of sessions of their
websites or services and control their users through their browser, without their knowlege, but It evolves
with the aim of helping government organizations, companies and researchers to track the cybercriminals
π¦ ππΌππ πππΈβπ :
1) git clone https://github.com/entynetproject/geospy
2) cd geospy
3) chmod +x install.sh
4) ./install.sh
π¦ Commands:
Geolocation Spy execution
geospy -h
usage: geospy [-h] [-v] [-u URL] [-p PORT] [-ak ACCESSKEY] [-l LOCAL] [-n]
[-ic INJC] [-ud]
optional arguments:
-h, --help show this help message and exit
-u URL, --url URL Put the web page URL to clone.
-p PORT, --port PORT Insert your port.
-ak ACCESSKEY, --accesskey ACCESSKEY
Insert your custom Access Key.
-n, --ngrok Insert your ngrok Authtoken.
-ic INJC, --injectcode INJC
Insert your custom REST API path.
-ud, --update Update GeoSpy to the latest version.
π¦ Tested by UndercOde on
Ubuntu
debian
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ 2020 topic Geolocation Spy (GeoSpy) is an OSINT analysis and research tool that is used to track and execute
intelligent social engineering attacks in real time. It was created with the aim of teaching the world
show large Internet companies could obtain confidential information such as the status of sessions of their
websites or services and control their users through their browser, without their knowlege, but It evolves
with the aim of helping government organizations, companies and researchers to track the cybercriminals
π¦ ππΌππ πππΈβπ :
1) git clone https://github.com/entynetproject/geospy
2) cd geospy
3) chmod +x install.sh
4) ./install.sh
π¦ Commands:
Geolocation Spy execution
geospy -h
usage: geospy [-h] [-v] [-u URL] [-p PORT] [-ak ACCESSKEY] [-l LOCAL] [-n]
[-ic INJC] [-ud]
optional arguments:
-h, --help show this help message and exit
-u URL, --url URL Put the web page URL to clone.
-p PORT, --port PORT Insert your port.
-ak ACCESSKEY, --accesskey ACCESSKEY
Insert your custom Access Key.
-n, --ngrok Insert your ngrok Authtoken.
-ic INJC, --injectcode INJC
Insert your custom REST API path.
-ud, --update Update GeoSpy to the latest version.
π¦ Tested by UndercOde on
Ubuntu
debian
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
entynetproject/quack
Quack Toolkit is a set of tools to provide denial of service attacks. Quack Toolkit includes SMS attack tool, HTTP attack tool and many other attack tools. - entynetproject/quack
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Security issues with NFS services Full by UndercOde :
The NFS service of the Unix system is equivalent to the file sharing service on the MS system. Some people may think that this is an inappropriate analogy, but the two have surprisingly similar security issues.
> Just as many security problems on NT / Windows machines come from sharing Like resources, the misconfiguration of the NFS service can also allow your system to be taken over by intruders. NFS is built on the RPC (Remote Procedure Call) mechanism. Similarly, NT-based services on the RPC mechanism are not secure; they are shared for MS Resource attacks are currently the most popular NT attack method on the Internet. Attacks on NFS are also the most common method for UNix platform machines.
instagram.com/UndercOdeTestingCompany
π¦ ππΌππ πππΈβπ :
The insecurity of NFS is mainly reflected in the following 4 aspects:
1) Novice access control mechanism for NFS handy difficult to achieve control objectives accuracy difficult to achieve
2) NFS no real user authentication mechanism, but only authentication mechanism to process RPC / Mount request
3) earlier NFS allows unauthorized users to obtain a valid file handle
4) In a RPC remote call, a SUID program has superuser privileges.
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Security issues with NFS services Full by UndercOde :
The NFS service of the Unix system is equivalent to the file sharing service on the MS system. Some people may think that this is an inappropriate analogy, but the two have surprisingly similar security issues.
> Just as many security problems on NT / Windows machines come from sharing Like resources, the misconfiguration of the NFS service can also allow your system to be taken over by intruders. NFS is built on the RPC (Remote Procedure Call) mechanism. Similarly, NT-based services on the RPC mechanism are not secure; they are shared for MS Resource attacks are currently the most popular NT attack method on the Internet. Attacks on NFS are also the most common method for UNix platform machines.
instagram.com/UndercOdeTestingCompany
π¦ ππΌππ πππΈβπ :
The insecurity of NFS is mainly reflected in the following 4 aspects:
1) Novice access control mechanism for NFS handy difficult to achieve control objectives accuracy difficult to achieve
2) NFS no real user authentication mechanism, but only authentication mechanism to process RPC / Mount request
3) earlier NFS allows unauthorized users to obtain a valid file handle
4) In a RPC remote call, a SUID program has superuser privileges.
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Part 2 :Security issues with NFS services Full by UndercOde
We discuss them from these aspects:
π¦ ππΌππ πππΈβπ :
1) In the default case of most Unix systems When exporting a directory, if you do not specify read-only, the directory is writable; the NFS access control file is prone to misconfiguration. In many cases, it is configured to be accessible by any machine on the Internet. Remote users can use this command to It is found whether there is a configuration vulnerability in NFS. This command is a necessary step for almost all NFS attacks:
> showmount -e www.examl....com The
possible results are as follows:
/ usr (everyone)
/ export / target1 -access = target2
/ export / target2 -access = target1
2) You can mount the / usr directory on this NFS server to the local directory:
# mount www.exampl...com:/usr / tmp
3) This shows that the / usr directory can be mounted by any machine, and may even have write permissions; and / The export / target1 directory specifies host access restrictions, and must be a member of target2.exam,...com or a member of the Netgroup of target2 to mount.
4) Most intruders first use this command to query the NFS vulnerability on the target, just as the Netview command for NT It is worth reminding that the popular invasion method has changed from the previous attack method to determine the target to the method of invasion as long as there is opportunity for the opponent.
5) The intruder may write a script or a program using To scan a large range of addresses, list the results and report to yourself. Therefore, the correct configuration is very important. On the Internet, there are a lot of machines with wrong NFS settings. This configuration is generally stored in the / etc / exports file or / etc / dfs / dfstab.
6) The user authentication requested by the client from the client is composed of the user's UID and the GID of the group to which it belongs. This type of file access security verification is of course for systems without NFSIt is safe; but on the Internet, the root of other machines has the right to set such a UID on its own machine, and the NFS server does not matter whether the UID is on its own machine or not, as long as the UID matches, it will give this user operation on this file
π¦ EXample :
> For example, the directory / home / frank can only be opened for reading and writing by a user with a UID of 501, and this directory can be mounted by a remote machine.Then, the root user of this machine adds a user with a UID of 501, and then uses this The user logs in and mounts the directory, and can get the equivalent of 501 user operation permissions on the NFS server to read and write / home / frank. To solve this problem, you must properly configure exports, limit the host address of the customer, and explicitly set rw = host options, ro (read-only) options, and access = host options.
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Part 2 :Security issues with NFS services Full by UndercOde
We discuss them from these aspects:
π¦ ππΌππ πππΈβπ :
1) In the default case of most Unix systems When exporting a directory, if you do not specify read-only, the directory is writable; the NFS access control file is prone to misconfiguration. In many cases, it is configured to be accessible by any machine on the Internet. Remote users can use this command to It is found whether there is a configuration vulnerability in NFS. This command is a necessary step for almost all NFS attacks:
> showmount -e www.examl....com The
possible results are as follows:
/ usr (everyone)
/ export / target1 -access = target2
/ export / target2 -access = target1
2) You can mount the / usr directory on this NFS server to the local directory:
# mount www.exampl...com:/usr / tmp
3) This shows that the / usr directory can be mounted by any machine, and may even have write permissions; and / The export / target1 directory specifies host access restrictions, and must be a member of target2.exam,...com or a member of the Netgroup of target2 to mount.
4) Most intruders first use this command to query the NFS vulnerability on the target, just as the Netview command for NT It is worth reminding that the popular invasion method has changed from the previous attack method to determine the target to the method of invasion as long as there is opportunity for the opponent.
5) The intruder may write a script or a program using To scan a large range of addresses, list the results and report to yourself. Therefore, the correct configuration is very important. On the Internet, there are a lot of machines with wrong NFS settings. This configuration is generally stored in the / etc / exports file or / etc / dfs / dfstab.
6) The user authentication requested by the client from the client is composed of the user's UID and the GID of the group to which it belongs. This type of file access security verification is of course for systems without NFSIt is safe; but on the Internet, the root of other machines has the right to set such a UID on its own machine, and the NFS server does not matter whether the UID is on its own machine or not, as long as the UID matches, it will give this user operation on this file
π¦ EXample :
> For example, the directory / home / frank can only be opened for reading and writing by a user with a UID of 501, and this directory can be mounted by a remote machine.Then, the root user of this machine adds a user with a UID of 501, and then uses this The user logs in and mounts the directory, and can get the equivalent of 501 user operation permissions on the NFS server to read and write / home / frank. To solve this problem, you must properly configure exports, limit the host address of the customer, and explicitly set rw = host options, ro (read-only) options, and access = host options.
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ the purpose is to make NFS file handles difficult to guess. This information is generated by the stat (2) system call. Unfortunately, this call is used A function vn_stat () has a problem:
t.me/UndercOdeTesting
...
sb-> st_gen = vap-> va_gen;
sb-> st_blocks = vap-> va_bytes / S_BLKSIZE;
return (0);} The
π¦ above program code is exposed to generate st_gen All the information of this number, using this information, unauthorized users can get the handle of the file. The correct program should only allow this information to be exposed to root:
...
sb-> st_flags = vap-> va_flags;
if (suser (p-> p_ucred, & p-> p_acflag)) {
sb-> st_gen = 0;
} else {
sb-> st_gen = vap-> va_gen;
}
sb-> st_blocks = vap-> va_bytes / S_BLKSIZE;
return (0);
} In
this way, if it is not root, he can only get 0.
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ the purpose is to make NFS file handles difficult to guess. This information is generated by the stat (2) system call. Unfortunately, this call is used A function vn_stat () has a problem:
t.me/UndercOdeTesting
...
sb-> st_gen = vap-> va_gen;
sb-> st_blocks = vap-> va_bytes / S_BLKSIZE;
return (0);} The
π¦ above program code is exposed to generate st_gen All the information of this number, using this information, unauthorized users can get the handle of the file. The correct program should only allow this information to be exposed to root:
...
sb-> st_flags = vap-> va_flags;
if (suser (p-> p_ucred, & p-> p_acflag)) {
sb-> st_gen = 0;
} else {
sb-> st_gen = vap-> va_gen;
}
sb-> st_blocks = vap-> va_bytes / S_BLKSIZE;
return (0);
} In
this way, if it is not root, he can only get 0.
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Security issues with NFS services
>most dangerous error is to export the directory containing the SUID program, and the file has the execution right .SUID program itself is equivalent to superuser.
pinterest.com/UndercOdeOfficial
π¦ solution:
1) and remove any shared solution from the NT, the best solution is to ban NFS service, or AFS service instead (Andrew File System).
2) if Be sure to open NFS, do not allow a single machine to be both client and server;
3) The file system exported is only set to read-only
4) The execution of programs with SUID characteristics is prohibited
5) Do not export the home directory
6) Do not export Implementation feature
7) Use some secure NFS implementation (though not necessarily really secure)
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Security issues with NFS services
>most dangerous error is to export the directory containing the SUID program, and the file has the execution right .SUID program itself is equivalent to superuser.
pinterest.com/UndercOdeOfficial
π¦ solution:
1) and remove any shared solution from the NT, the best solution is to ban NFS service, or AFS service instead (Andrew File System).
2) if Be sure to open NFS, do not allow a single machine to be both client and server;
3) The file system exported is only set to read-only
4) The execution of programs with SUID characteristics is prohibited
5) Do not export the home directory
6) Do not export Implementation feature
7) Use some secure NFS implementation (though not necessarily really secure)
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ updates Wifi hack 2019 automate various wireless networks
twitter.com/UndercOdeTC
π¦Features :
1) Capture victims' traffic.
2) MAC address spoofing.
3) Set-up honeypot and evil twin attacks.
4) Show the list of in range access points.
5) Wireless adapter|card|dongle power amplification.
π¦πβπππΈπππππΈπππβ & βπβ:
1) git clone https://github.com/aress31/wirespy
2) go dir
3) chmod +x wirespy.sh
4) Run the script with root privileges:
> sudo ./wirespy.sh
Attacks:
eviltwin > launch an evil twin attack
honeypot > launch a rogue access point attack
π¦ Commands:
clear > clear the terminal
help > list available commands
quit|exit > exit the program
apscan > show all wireless access points nearby
leases > display DHCP leases
powerup > power wireless interface up (may cause issues)
start capture > start packet capture (tcpdump)
stop capture > stop packet capture (tcpdump)
status > show modules status
> Compatible with rooted Termux
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ updates Wifi hack 2019 automate various wireless networks
twitter.com/UndercOdeTC
π¦Features :
1) Capture victims' traffic.
2) MAC address spoofing.
3) Set-up honeypot and evil twin attacks.
4) Show the list of in range access points.
5) Wireless adapter|card|dongle power amplification.
π¦πβπππΈπππππΈπππβ & βπβ:
1) git clone https://github.com/aress31/wirespy
2) go dir
3) chmod +x wirespy.sh
4) Run the script with root privileges:
> sudo ./wirespy.sh
Attacks:
eviltwin > launch an evil twin attack
honeypot > launch a rogue access point attack
π¦ Commands:
clear > clear the terminal
help > list available commands
quit|exit > exit the program
apscan > show all wireless access points nearby
leases > display DHCP leases
powerup > power wireless interface up (may cause issues)
start capture > start packet capture (tcpdump)
stop capture > stop packet capture (tcpdump)
status > show modules status
> Compatible with rooted Termux
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Cracking Windows User Passwords
twitter.com/UNdercOdeTC
π¦ ππΌππ πππΈβπ :
1) the user name and password of the Windows system are stored in a SAM (Security Account Manager) file
> In Windows systems based on the NT kernel, including Windows 7 and later versions,
2) this file is saved in the "C: \ Windows \ System32 \ Config" directory. For security reasons, Microsoft has added some extra security measures to protect this file. First, after the operating system starts, the SAM file will be locked at the same time. This means that the user cannot open or copy the SAM file while the operating system is running. In addition to locking, the entire SAM file is encrypted and invisible.
3) Use John the Ripper tool to crack Windows user password.
a) Check the hard drive in the current system
> fdisk -l
The output shows that there is a disk in the current system and there is only one partition. The file system type is NTFS, which is also the disk that is stored in the Windows system.
b) Mount the hard drive. The execution command is as follows:
root@kali:~# mkdir /sda1
root@kali:~# mount /dev/sda1 /sda1/ /dev/sda1
After executing the above command, there is no output information.
c) Switch directories and enter the location of the Windows SAM file. The execution command is as follows:
root@kali:~# cd /sda1/WINDOWS/system32/config/
In this directory, you can see the SAM file.
d) Use SamDump2 to extract the SAM file. The execution command is as follows:
root@kali:/sda1/WINDOWS/system32/config# samdump2 utc system > /root/hash.txt
You can see from the output that the SAM file is extracted. Redirected the contents of the file to the /root/hash.txt file.
e) Run the john command to implement a password attack. The execution command is as follows:
root@kali:/sda1/WINDOWS/system32/config# /usr/sbin/john /root/hash.txt --format=nt
Created directory: /root/.undercode
Loaded 6 password hashes with no
different salts (NT MD4 [128/128 SSE2 + 32/32])
(Guest)
guesses: 4 time: 0:00:03:13 0.09% (3) (ETA: Mon May 12 06:46:42 2014) c/s: 152605K trying: 2KRIN.P - 2KRIDY8
guesses: 4 time: 0:00:04:26 0.13% (3) (ETA: Mon May 12 04:02:53 2014) c/s: 152912K trying: GR0KUHI - GR0KDN1
guesses: 4 time: 0:00:04:27 0.13% (3) (ETA: Mon May 12 04:15:42 2014) c/s: 152924K trying: HKCUUHT - HKCUGDS
THAT IT !
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Cracking Windows User Passwords
twitter.com/UNdercOdeTC
π¦ ππΌππ πππΈβπ :
1) the user name and password of the Windows system are stored in a SAM (Security Account Manager) file
> In Windows systems based on the NT kernel, including Windows 7 and later versions,
2) this file is saved in the "C: \ Windows \ System32 \ Config" directory. For security reasons, Microsoft has added some extra security measures to protect this file. First, after the operating system starts, the SAM file will be locked at the same time. This means that the user cannot open or copy the SAM file while the operating system is running. In addition to locking, the entire SAM file is encrypted and invisible.
3) Use John the Ripper tool to crack Windows user password.
a) Check the hard drive in the current system
> fdisk -l
The output shows that there is a disk in the current system and there is only one partition. The file system type is NTFS, which is also the disk that is stored in the Windows system.
b) Mount the hard drive. The execution command is as follows:
root@kali:~# mkdir /sda1
root@kali:~# mount /dev/sda1 /sda1/ /dev/sda1
After executing the above command, there is no output information.
c) Switch directories and enter the location of the Windows SAM file. The execution command is as follows:
root@kali:~# cd /sda1/WINDOWS/system32/config/
In this directory, you can see the SAM file.
d) Use SamDump2 to extract the SAM file. The execution command is as follows:
root@kali:/sda1/WINDOWS/system32/config# samdump2 utc system > /root/hash.txt
You can see from the output that the SAM file is extracted. Redirected the contents of the file to the /root/hash.txt file.
e) Run the john command to implement a password attack. The execution command is as follows:
root@kali:/sda1/WINDOWS/system32/config# /usr/sbin/john /root/hash.txt --format=nt
Created directory: /root/.undercode
Loaded 6 password hashes with no
different salts (NT MD4 [128/128 SSE2 + 32/32])
(Guest)
guesses: 4 time: 0:00:03:13 0.09% (3) (ETA: Mon May 12 06:46:42 2014) c/s: 152605K trying: 2KRIN.P - 2KRIDY8
guesses: 4 time: 0:00:04:26 0.13% (3) (ETA: Mon May 12 04:02:53 2014) c/s: 152912K trying: GR0KUHI - GR0KDN1
guesses: 4 time: 0:00:04:27 0.13% (3) (ETA: Mon May 12 04:15:42 2014) c/s: 152924K trying: HKCUUHT - HKCUGDS
THAT IT !
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Twitter
UNDERCODE TESTING COMPANY (@UnderCodeTC) | Twitter
The latest Tweets from UNDERCODE TESTING COMPANY (@UnderCodeTC). πΈππ§πππππ & πΈππ¨ππͺπ€ ππ‘πππ₯ππ. Lebanon-North
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Cracking Linux User Passwords
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
1) Cracking a Linux password is basically similar to cracking a Windows password, with only one difference in the process. Linux systems do not use the SAM folder to hold password hashes. The Linux system includes the encrypted password hash in a file called shadow, whose absolute path is / etc / shadow.
2) However, before using the John the Ripper to crack the / etc / shadow file, you also need the / etc / passwd file. This is the same reason that extracting the Windows password hash requires the system file and the SAM file. John the Ripper comes with a feature that combines shadow and passwd files so that you can use this tool to crack user passwords on Linux systems. This section will introduce methods to crack Linux user passwords.
3) Use John the Ripper tool to crack Linux user password. The specific operation steps are shown below.
(1) Use unshadow to extract the password hash. The execution command is as follows:
root@kali:~# unshadow /etc/passwd /etc/shadow > /tmp/linux_hashes.txt
After executing the above command, the / etc / passwd / file is combined with the / etc / shadow / file to generate a file called linux_hashes.txt, which is stored in the / tmp / directory.
(2) Crack the Linux user password. The execution command is as follows:
root@kali:~# john --format=crypt --show /tmp/linux_hashes.txt
root:123456:0:0:root:/root:/bin/bash
bob:123456:1000:1001::/home/bob:/bin/sh
alice:123456:1001:1002::/home/alice:/bin/sh
3 password hashes cracked, 0 left
(3)From the output, you can see that there are three users in the current system and their passwords are 123456.
270-01Note: Before using John the Ripper to start cracking Linux passwords, you need to use a version of John the Ripper that supports cracking different types of password hashes. If you use the wrong version or use the unpatched John the Ripper, the program will return the error message No password hashes loaded. Most modern Linux systems use SHA hash encryption algorithms to save passwords.
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Cracking Linux User Passwords
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
1) Cracking a Linux password is basically similar to cracking a Windows password, with only one difference in the process. Linux systems do not use the SAM folder to hold password hashes. The Linux system includes the encrypted password hash in a file called shadow, whose absolute path is / etc / shadow.
2) However, before using the John the Ripper to crack the / etc / shadow file, you also need the / etc / passwd file. This is the same reason that extracting the Windows password hash requires the system file and the SAM file. John the Ripper comes with a feature that combines shadow and passwd files so that you can use this tool to crack user passwords on Linux systems. This section will introduce methods to crack Linux user passwords.
3) Use John the Ripper tool to crack Linux user password. The specific operation steps are shown below.
(1) Use unshadow to extract the password hash. The execution command is as follows:
root@kali:~# unshadow /etc/passwd /etc/shadow > /tmp/linux_hashes.txt
After executing the above command, the / etc / passwd / file is combined with the / etc / shadow / file to generate a file called linux_hashes.txt, which is stored in the / tmp / directory.
(2) Crack the Linux user password. The execution command is as follows:
root@kali:~# john --format=crypt --show /tmp/linux_hashes.txt
root:123456:0:0:root:/root:/bin/bash
bob:123456:1000:1001::/home/bob:/bin/sh
alice:123456:1001:1002::/home/alice:/bin/sh
3 password hashes cracked, 0 left
(3)From the output, you can see that there are three users in the current system and their passwords are 123456.
270-01Note: Before using John the Ripper to start cracking Linux passwords, you need to use a version of John the Ripper that supports cracking different types of password hashes. If you use the wrong version or use the unpatched John the Ripper, the program will return the error message No password hashes loaded. Most modern Linux systems use SHA hash encryption algorithms to save passwords.
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Crunch tools -debian-parrot-kali tools :
twitter.com/UndercOdeTc
π¦ ππΌππ πππΈβπ :
a) Crunch is a tool for creating password dictionaries, which is usually used for brute force cracking. Passwords generated using the Crunch tool can be sent to a terminal, a file, or another program. The following will introduce the creation of a password dictionary using the Crunch tool> https://github.com/crunchsec/crunch
b) Generate a dictionary using Crunch. The specific operation steps are shown below.
1) Start the crunch command. The execution command is shown below.
root@kali:~# crunch
After executing the above command, the following information will be output:
2) Crunch can create a wordlist based on criteria you specify. The outout from crunch can be sent to the screen, file, or to another program.
Usage: crunch <min> <max> [options]
where min and max are numbers
Please refer to the man page for instructions and examples on how to use crunch.
3) The output shows the version and syntax of the crunch command. The syntax for generating a password using the crunch command is as follows:
4) crunch [minimum length] [maximum length] [character set] [options]
The options commonly used by the crunch command are shown below.
-o: Used to specify the location of the output dictionary file.
-b: specifies the maximum number of bytes written to the file. The size can be specified in KB, MB, or GB, but must be used with the -o START option.
-t: Set the special format used.
-l: This option is used to identify some characters of the placeholder when the -t option specifies @,%, or ^.
5) Create a password list file and save it on the desktop. Among them, the minimum length of the generated password list is 8 and the maximum length is 10, and ABCDEFGabcdefg0123456789 is used as the character set. The execution command is as follows:
root@kali:~# crunch 8 10 ABCDEFGabcdefg0123456789 βo /root/Desktop/
generatedCrunch.txt
Notice: Detected unicode characters. If you are piping crunch output
to another program such as john or aircrack please make sure that program
can handle unicode input.
Do you want to continue? [Y/n] y
Crunch will now generate the following amount of data: 724845943848960 bytes
691266960 MB
675065 GB
659 TB
0 PB
Crunch will now generate the following number of lines: 66155263819776
AAAAAAAA
AAAAAAAB
AAAAAAAC
AAAAAAAD
AAAAAAAE
AAAAAAAF
AAAAAAAG
AAAAAAAa
AAAAAAAb
AAAAAAAc
β¦β¦
AAdb6gFe
AAdb6gFf
AAdb6gFg
AAdb6gF0
AAdb6gF1
AAdb6gF2
AAdb6gF3
AAdb6gF4
AAdb6gF5
From the output information above, you can see that a 659TB large file will be generated, with a total of 66,552,638,976,976 lines. After the execution of the above command is completed, a dictionary file named generatedCrunch.txt will be generated on the desktop. Because there are many passwords generated by combination, it takes a long time.
6) After the above password dictionary file is generated, use the Nano command to open it. The execution command is as follows:
root@kali:~# nano /root/Desktop/generatedCrunch.txt
After executing the above command, the generatedCrunch.txt file will be opened. This file holds all passwords generated using the crunch command.
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Crunch tools -debian-parrot-kali tools :
twitter.com/UndercOdeTc
π¦ ππΌππ πππΈβπ :
a) Crunch is a tool for creating password dictionaries, which is usually used for brute force cracking. Passwords generated using the Crunch tool can be sent to a terminal, a file, or another program. The following will introduce the creation of a password dictionary using the Crunch tool> https://github.com/crunchsec/crunch
b) Generate a dictionary using Crunch. The specific operation steps are shown below.
1) Start the crunch command. The execution command is shown below.
root@kali:~# crunch
After executing the above command, the following information will be output:
2) Crunch can create a wordlist based on criteria you specify. The outout from crunch can be sent to the screen, file, or to another program.
Usage: crunch <min> <max> [options]
where min and max are numbers
Please refer to the man page for instructions and examples on how to use crunch.
3) The output shows the version and syntax of the crunch command. The syntax for generating a password using the crunch command is as follows:
4) crunch [minimum length] [maximum length] [character set] [options]
The options commonly used by the crunch command are shown below.
-o: Used to specify the location of the output dictionary file.
-b: specifies the maximum number of bytes written to the file. The size can be specified in KB, MB, or GB, but must be used with the -o START option.
-t: Set the special format used.
-l: This option is used to identify some characters of the placeholder when the -t option specifies @,%, or ^.
5) Create a password list file and save it on the desktop. Among them, the minimum length of the generated password list is 8 and the maximum length is 10, and ABCDEFGabcdefg0123456789 is used as the character set. The execution command is as follows:
root@kali:~# crunch 8 10 ABCDEFGabcdefg0123456789 βo /root/Desktop/
generatedCrunch.txt
Notice: Detected unicode characters. If you are piping crunch output
to another program such as john or aircrack please make sure that program
can handle unicode input.
Do you want to continue? [Y/n] y
Crunch will now generate the following amount of data: 724845943848960 bytes
691266960 MB
675065 GB
659 TB
0 PB
Crunch will now generate the following number of lines: 66155263819776
AAAAAAAA
AAAAAAAB
AAAAAAAC
AAAAAAAD
AAAAAAAE
AAAAAAAF
AAAAAAAG
AAAAAAAa
AAAAAAAb
AAAAAAAc
β¦β¦
AAdb6gFe
AAdb6gFf
AAdb6gFg
AAdb6gF0
AAdb6gF1
AAdb6gF2
AAdb6gF3
AAdb6gF4
AAdb6gF5
From the output information above, you can see that a 659TB large file will be generated, with a total of 66,552,638,976,976 lines. After the execution of the above command is completed, a dictionary file named generatedCrunch.txt will be generated on the desktop. Because there are many passwords generated by combination, it takes a long time.
6) After the above password dictionary file is generated, use the Nano command to open it. The execution command is as follows:
root@kali:~# nano /root/Desktop/generatedCrunch.txt
After executing the above command, the generatedCrunch.txt file will be opened. This file holds all passwords generated using the crunch command.
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Why We Use Elevation of Privilege ?
twitter.com/UndercOdeTC
π¦ ππΌππ πππΈβπ :
> Elevation of privilege is to increase the lowest privilege of a user to the highest. Often, the users we gain access to may have the lowest permissions.
> However, if you want to perform a penetration attack, you may need the administrator account permissions, so you need to upgrade the permissions. Privilege escalation can be achieved through the use of counterfeit tokens, local privilege escalation, and social engineering. This chapter introduces various methods to elevate user rights.
π¦Uses is
> Use of fake tokens;
> Local privilege elevation attack;
> Use of the Social Engineering Toolkit (SET);
> Attack using SET.
π¦Example Use of fake tokens :
1) Using fake tokens can impersonate another user in a network for various operations, such as elevating user rights, creating users and groups, and so on.
2) The token includes security information for the login session, such as user identification, user group, and user permissions.
3) When a user logs on to a Windows system, it is given an access token as part of its authentication session.
> For example, an intrusive user may need to perform a specific task as a domain administrator, and when it uses the token, it can impersonate the domain administrator to work. When it finishes processing the task, it usually discards the token permission
4) In this way, the intruder will use this weakness to elevate its access rights. This section will introduce the implementation of counterfeit token attacks under Meterpreter Shell.
and many,any such examples will send later on UndercOde
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Why We Use Elevation of Privilege ?
twitter.com/UndercOdeTC
π¦ ππΌππ πππΈβπ :
> Elevation of privilege is to increase the lowest privilege of a user to the highest. Often, the users we gain access to may have the lowest permissions.
> However, if you want to perform a penetration attack, you may need the administrator account permissions, so you need to upgrade the permissions. Privilege escalation can be achieved through the use of counterfeit tokens, local privilege escalation, and social engineering. This chapter introduces various methods to elevate user rights.
π¦Uses is
> Use of fake tokens;
> Local privilege elevation attack;
> Use of the Social Engineering Toolkit (SET);
> Attack using SET.
π¦Example Use of fake tokens :
1) Using fake tokens can impersonate another user in a network for various operations, such as elevating user rights, creating users and groups, and so on.
2) The token includes security information for the login session, such as user identification, user group, and user permissions.
3) When a user logs on to a Windows system, it is given an access token as part of its authentication session.
> For example, an intrusive user may need to perform a specific task as a domain administrator, and when it uses the token, it can impersonate the domain administrator to work. When it finishes processing the task, it usually discards the token permission
4) In this way, the intruder will use this weakness to elevate its access rights. This section will introduce the implementation of counterfeit token attacks under Meterpreter Shell.
and many,any such examples will send later on UndercOde
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ FreeRDP is a free remote desktop protocol library and clients 2020 updated
>FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Enjoy the freedom of using your software wherever you want, the way you want it, in a world where interoperability can finally liberate your computing experience.
instagram.com/UndercOdeTestingCompany
π¦ ππΌππ πππΈβπ :
1> official release :
> https://pub.freerdp.com/releases/
2> extract tar -zxvf namefile.tar.gz
3> ./configure
4> make
5> sudo make install
π¦Streaming the Virtual Desktop:
With H.264 desktop streaming, introduced in RDP 10, we now also have new possibilities to transfer the desktop content to the user. We have developed a special load-balancing algorithm that adjusts image quality during streaming, based on current network characteristics. FreeRDPβs network characteristics detection (which is part of the RDP core specification) provides us with all the necessary information about the connectionβs latency and bandwidth. Depending on these parameters we dynamically increase or decrease the quality level of the H.264 encoder. An implementation of the software H.264 encoder backend, using OpenH264, is also part of the FreeRDP library.
π¦ Performance matters:
> As explained earlier, Thincast Workstation provides virtual graphics hardware to the guest that exposes full Direct3D11 support. This means all graphical operations in the guest OS are handled and accelerated by the host GPU. As we want to achieve the best performance possible, it would be a pity to do the H.264 encoding of our virtual desktop in software. Luckily, thanks to FreeRDPβs modular architecture, we were able to plug-in our own hardware encoders and completely offload this work from the CPU. Because every vendor has its own multimedia framework we implemented encoders for all major GPU producers including NVidia, AMD and Intel.
π¦ Tested by UndercOde
@UndercOdeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ FreeRDP is a free remote desktop protocol library and clients 2020 updated
>FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Enjoy the freedom of using your software wherever you want, the way you want it, in a world where interoperability can finally liberate your computing experience.
instagram.com/UndercOdeTestingCompany
π¦ ππΌππ πππΈβπ :
1> official release :
> https://pub.freerdp.com/releases/
2> extract tar -zxvf namefile.tar.gz
3> ./configure
4> make
5> sudo make install
π¦Streaming the Virtual Desktop:
With H.264 desktop streaming, introduced in RDP 10, we now also have new possibilities to transfer the desktop content to the user. We have developed a special load-balancing algorithm that adjusts image quality during streaming, based on current network characteristics. FreeRDPβs network characteristics detection (which is part of the RDP core specification) provides us with all the necessary information about the connectionβs latency and bandwidth. Depending on these parameters we dynamically increase or decrease the quality level of the H.264 encoder. An implementation of the software H.264 encoder backend, using OpenH264, is also part of the FreeRDP library.
π¦ Performance matters:
> As explained earlier, Thincast Workstation provides virtual graphics hardware to the guest that exposes full Direct3D11 support. This means all graphical operations in the guest OS are handled and accelerated by the host GPU. As we want to achieve the best performance possible, it would be a pity to do the H.264 encoding of our virtual desktop in software. Luckily, thanks to FreeRDPβs modular architecture, we were able to plug-in our own hardware encoders and completely offload this work from the CPU. Because every vendor has its own multimedia framework we implemented encoders for all major GPU producers including NVidia, AMD and Intel.
π¦ Tested by UndercOde
@UndercOdeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
dpham14@hotmail.com:Iloveudina1 | Expiration = 2019-12-16 13:39:18
hide0324@gmail.com:chinpira0324 | Expiration = 2020-04-21 15:48:10
Kungii0@gmail.com:Hussain123 | Expiration = 2019-11-16 13:51:34
chandarachun@gmail.com:triggahaw1 | Expiration = 2019-09-19 00:47:39
Tylerv667767@gmail.com:That1day2 | Expiration = 2019-12-26 03:53:30
xbones123@hotmail.com:nikolai55 | Expiration = 2019-10-13 09:22:17
razielphisher@gmail.com:Lancas7er | Expiration = 2021-05-28 16:37:13
snakus_raph@hotmail.com:Jurras2c | Expiration = 2021-12-24 13:43:31
dawson.coyle@ccvineland.org:frog1111 | Expiration = 2020-08-29 01:38:58
jester83198@gmail.com:Defender1 | Expiration = 2022-10-05 22:30:23
gibbsharry@hotmail.com:fourteen14 | Expiration = 2022-05-28 11:18:48
sitrikerak@gmail.com:chaosknighta | Expiration = 2019-09-21 10:38:34
andrewcoxfilm@hotmail.com:thehoho1 | Expiration = 2021-01-18 12:44:32
cazer99@gmail.com:Edward99 | Expiration = 2020-05-05 19:00:36
Henry066@hotmail.fr:Henry660 | Expiration = 2022-07-12 15:21:44
patrick_98@live.de:Patrick98 | Expiration = 2022-07-20 16:11:50
jonathan.tarith@gmail.com:Germania4405 | Expiration = 2022-08-08 14:38:16
bcleahy@gmail.com:brendan2 | Expiration = 2019-10-13 21:22:14
philippdeurer@icloud.com:Fcbayern13 | Expiration = 2022-04-25 02:50:44
delaunayalexandre18@gmail.com:Alexandre9 | Expiration = 2019-10-19 10:06:47
toriol64@gmail.com:tato6446 | Expiration = 2020-05-11 18:00:09
joelstav82@gmail.com:Joelstav1 | Expiration = 2020-05-15 07:11:12
deathmachine4888@gmail.com:Fartfart1 | Expiration = 2022-01-30 00:08:24
joel_chong84@hotmail.com:s9427833c | Expiration = 2019-10-01 18:27:04
Andersson.gustav@hotmail.com:Kattmat22 | Expiration = 2022-05-18 07:02:39
alisaydam46@hotmail.com:saydam46 | Expiration = 2020-05-01 09:33:21
kylef97@hotmail.co.uk:william22 | Expiration = 2021-04-19 08:41:15
qualm17@aol.com:Onimusha1 | Expiration = 2022-08-27 21:25:55
blue.kry@gmail.com:Stabilo1 | Expiration = 2022-05-13 18:03:13
Eirik.Aanstad@gmail.com:Kjf9w9er | Expiration = 2019-09-29 07:05:04
aman-parmar25@hotmail.com:Likeaboss1 | Expiration = 2022-02-24 10:37:06
hamed.mohamed.pro@gmail.com:Momox93120 | Expiration = 2022-01-08 02:08:52
eeva.valtokari@hotmail.com:Kiriquu1 | Expiration = 2019-09-27 20:24:08
gtonsei101@gmail.com:angelwing7 | Expiration = 2020-06-14 21:45:47
randysesariojr@gmail.com:ninja3221 | Expiration = 2020-08-02 13:59:15
pinkyshaffer@gmail.com:homer333 | Expiration = 2020-06-01 00:00:00
jenjenfear2@gmail.com:Pinkpink22 | Expiration = 2022-01-05 12:01:03
auglvig@msn.com:Viviogdan1 | Expiration = 2019-10-13 20:43:39
gaving@talktalk.net:trybe1745 | Expiration = 2022-03-16 12:08:18
dl_blr@hotmail.com:kimecW35 | Expiration = 2022-09-12 17:09:36
one4daniel@gmail.com:anthony33 | Expiration = 2019-09-29 20:50:11
reparaudio@laposte.net:michto288 | Expiration = 2020-04-09 14:18:05
phelo70@ntlworld.com:f2sidecars | Expiration = 2020-09-10 20:06:43
nschwitters@yahoo.com:nickrs11 | Expiration = 2022-06-03 13:20:44
liamodwyer85@gmail.com:kilteely619 | Expiration = 2021-11-01 19:40:33
mrecord25@gmail.com:Mcgwire25 | Expiration = 2020-06-06 22:24:39
marslevandreas@gmail.com:Gvd78mns1 | Expiration = 2022-06-15 12:47:36
dbrown1991@comcast.net:Ferrium2010 | Expiration = 2020-07-23 22:15:34
naif.s.k@msn.com:naif409409409 | Expiration = 2020-06-27 22:55:20
jakob.vestbjerg@hotmail.dk:Jalle123 | Expiration = 2022-07-10 12:27:17
milind892002@gmail.com:m3030351 | Expiration = 2022-05-21 03:01:01
anthony.n.1989@gmail.com:vegeta67 | Expiration = 2022-04-21 23:52:05
thanatoshan@gmail.com:wocaonima123 | Expiration = 2020-06-07 12:05:20
shaomengda@hotmail.com:123456qQ | Expiration = 2022-03-13 17:42:52
mathew.dimmock@gmail.com:Splatman18 | Expiration = 2020-06-08 06:30:50
mike@bommaritodesign.com:Sweatb22 | Expiration = 2021-11-16 02:55:03
quentonh234@gmail.com:Wordbla6 | Expiration = 2022-06-18 23:38:36
philyew@live.com:deion211 | Expiration = 2021-02-20 23:46:04
reverendphu@gmail.com:Phugod123 | Expiration = 2019-09-18 22:48:36
hide0324@gmail.com:chinpira0324 | Expiration = 2020-04-21 15:48:10
Kungii0@gmail.com:Hussain123 | Expiration = 2019-11-16 13:51:34
chandarachun@gmail.com:triggahaw1 | Expiration = 2019-09-19 00:47:39
Tylerv667767@gmail.com:That1day2 | Expiration = 2019-12-26 03:53:30
xbones123@hotmail.com:nikolai55 | Expiration = 2019-10-13 09:22:17
razielphisher@gmail.com:Lancas7er | Expiration = 2021-05-28 16:37:13
snakus_raph@hotmail.com:Jurras2c | Expiration = 2021-12-24 13:43:31
dawson.coyle@ccvineland.org:frog1111 | Expiration = 2020-08-29 01:38:58
jester83198@gmail.com:Defender1 | Expiration = 2022-10-05 22:30:23
gibbsharry@hotmail.com:fourteen14 | Expiration = 2022-05-28 11:18:48
sitrikerak@gmail.com:chaosknighta | Expiration = 2019-09-21 10:38:34
andrewcoxfilm@hotmail.com:thehoho1 | Expiration = 2021-01-18 12:44:32
cazer99@gmail.com:Edward99 | Expiration = 2020-05-05 19:00:36
Henry066@hotmail.fr:Henry660 | Expiration = 2022-07-12 15:21:44
patrick_98@live.de:Patrick98 | Expiration = 2022-07-20 16:11:50
jonathan.tarith@gmail.com:Germania4405 | Expiration = 2022-08-08 14:38:16
bcleahy@gmail.com:brendan2 | Expiration = 2019-10-13 21:22:14
philippdeurer@icloud.com:Fcbayern13 | Expiration = 2022-04-25 02:50:44
delaunayalexandre18@gmail.com:Alexandre9 | Expiration = 2019-10-19 10:06:47
toriol64@gmail.com:tato6446 | Expiration = 2020-05-11 18:00:09
joelstav82@gmail.com:Joelstav1 | Expiration = 2020-05-15 07:11:12
deathmachine4888@gmail.com:Fartfart1 | Expiration = 2022-01-30 00:08:24
joel_chong84@hotmail.com:s9427833c | Expiration = 2019-10-01 18:27:04
Andersson.gustav@hotmail.com:Kattmat22 | Expiration = 2022-05-18 07:02:39
alisaydam46@hotmail.com:saydam46 | Expiration = 2020-05-01 09:33:21
kylef97@hotmail.co.uk:william22 | Expiration = 2021-04-19 08:41:15
qualm17@aol.com:Onimusha1 | Expiration = 2022-08-27 21:25:55
blue.kry@gmail.com:Stabilo1 | Expiration = 2022-05-13 18:03:13
Eirik.Aanstad@gmail.com:Kjf9w9er | Expiration = 2019-09-29 07:05:04
aman-parmar25@hotmail.com:Likeaboss1 | Expiration = 2022-02-24 10:37:06
hamed.mohamed.pro@gmail.com:Momox93120 | Expiration = 2022-01-08 02:08:52
eeva.valtokari@hotmail.com:Kiriquu1 | Expiration = 2019-09-27 20:24:08
gtonsei101@gmail.com:angelwing7 | Expiration = 2020-06-14 21:45:47
randysesariojr@gmail.com:ninja3221 | Expiration = 2020-08-02 13:59:15
pinkyshaffer@gmail.com:homer333 | Expiration = 2020-06-01 00:00:00
jenjenfear2@gmail.com:Pinkpink22 | Expiration = 2022-01-05 12:01:03
auglvig@msn.com:Viviogdan1 | Expiration = 2019-10-13 20:43:39
gaving@talktalk.net:trybe1745 | Expiration = 2022-03-16 12:08:18
dl_blr@hotmail.com:kimecW35 | Expiration = 2022-09-12 17:09:36
one4daniel@gmail.com:anthony33 | Expiration = 2019-09-29 20:50:11
reparaudio@laposte.net:michto288 | Expiration = 2020-04-09 14:18:05
phelo70@ntlworld.com:f2sidecars | Expiration = 2020-09-10 20:06:43
nschwitters@yahoo.com:nickrs11 | Expiration = 2022-06-03 13:20:44
liamodwyer85@gmail.com:kilteely619 | Expiration = 2021-11-01 19:40:33
mrecord25@gmail.com:Mcgwire25 | Expiration = 2020-06-06 22:24:39
marslevandreas@gmail.com:Gvd78mns1 | Expiration = 2022-06-15 12:47:36
dbrown1991@comcast.net:Ferrium2010 | Expiration = 2020-07-23 22:15:34
naif.s.k@msn.com:naif409409409 | Expiration = 2020-06-27 22:55:20
jakob.vestbjerg@hotmail.dk:Jalle123 | Expiration = 2022-07-10 12:27:17
milind892002@gmail.com:m3030351 | Expiration = 2022-05-21 03:01:01
anthony.n.1989@gmail.com:vegeta67 | Expiration = 2022-04-21 23:52:05
thanatoshan@gmail.com:wocaonima123 | Expiration = 2020-06-07 12:05:20
shaomengda@hotmail.com:123456qQ | Expiration = 2022-03-13 17:42:52
mathew.dimmock@gmail.com:Splatman18 | Expiration = 2020-06-08 06:30:50
mike@bommaritodesign.com:Sweatb22 | Expiration = 2021-11-16 02:55:03
quentonh234@gmail.com:Wordbla6 | Expiration = 2022-06-18 23:38:36
philyew@live.com:deion211 | Expiration = 2021-02-20 23:46:04
reverendphu@gmail.com:Phugod123 | Expiration = 2019-09-18 22:48:36