β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦list 2 - Some legit .onion links
Supplier! β Buy cocaine, speed, xtc, mdma, heroin and more at peoples drug store, pay with Bitcoin http://newpdsuslmzqazvr.onion/ online
Runion http://lwplxqzvmgu43uff.onion/ online
fb2 http://fb2lib3argrtulnw.onion/ online
Daniel β Home http://tt3j2x4k5ycaa5zt.onion/ online
SpiceForum http://spicerckk3nrowry.onion/ offline
Hello β Hansa Market http://hansamktkykr5yt4.onion/ offline
BRCHAN http://brchanansdnhvvnm.onion/ online
Neboard http://neboardo3svhysmd.onion/ online
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦list 2 - Some legit .onion links
Supplier! β Buy cocaine, speed, xtc, mdma, heroin and more at peoples drug store, pay with Bitcoin http://newpdsuslmzqazvr.onion/ online
Runion http://lwplxqzvmgu43uff.onion/ online
fb2 http://fb2lib3argrtulnw.onion/ online
Daniel β Home http://tt3j2x4k5ycaa5zt.onion/ online
SpiceForum http://spicerckk3nrowry.onion/ offline
Hello β Hansa Market http://hansamktkykr5yt4.onion/ offline
BRCHAN http://brchanansdnhvvnm.onion/ online
Neboard http://neboardo3svhysmd.onion/ online
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦FREE SNIFFING TOOLS :
postgres-mitm
Test whether your Postgres connections are vulnerable to MitM attacks
tiny-mitm-proxy
Probably one of the smallest SSL MITM proxies you can make
Seth
Perform a MitM attack and extract clear text credentials from RDP connections
ssh-mitm
SSH man-in-the-middle tool
sslsniff
A tool for automated MITM attacks on SSL connections
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦FREE SNIFFING TOOLS :
postgres-mitm
Test whether your Postgres connections are vulnerable to MitM attacks
tiny-mitm-proxy
Probably one of the smallest SSL MITM proxies you can make
Seth
Perform a MitM attack and extract clear text credentials from RDP connections
ssh-mitm
SSH man-in-the-middle tool
sslsniff
A tool for automated MITM attacks on SSL connections
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - thusoy/postgres-mitm: Test whether your Postgres connections are vulnerable to MitM attacks
Test whether your Postgres connections are vulnerable to MitM attacks - thusoy/postgres-mitm
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Reduce radio wave interference and management load, the key points of wireless LAN construction to remember.
#Updates #Technologies
#Updates #Technologies
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to crack Windows 10, 8 and 7 password with John the Ripper:
1) Extract the hash from Windows
User Account Manager (SAM) is a database file in Windows 10/8/7 / XP that stores user passwords in an encrypted form, which in turn is located in the following directory:
C: \ Windows \ system32 \ config
The first thing we need to do is grab the password hashes from the SAM file.
Just download the free PwDump7 software and unzip it on your local PC.
Open a command prompt.
Navigate to the folder where you extracted the PwDump7 application and then enter the following command:
# PwDump7.exe> ββd: \ hash.txt
As soon as you press [Enter] PwDump7 will retrieve hashes of system passwords and save them to d: \ hash.txt file.
2) Cracking password with John the Ripper
Since you can see that the password hashes are still unreadable - we have to crack them using John the Ripper.
John the Ripper is one of the most popular password cracking tools that can run on Windows, Linux and Mac OS x.
Just download the John the Ripper Windows binaries and unzip the contents.
Open a command prompt and change the directory where you unpacked John the Ripper and then run:
# john --format = LM d: \ hash.txt
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to crack Windows 10, 8 and 7 password with John the Ripper:
1) Extract the hash from Windows
User Account Manager (SAM) is a database file in Windows 10/8/7 / XP that stores user passwords in an encrypted form, which in turn is located in the following directory:
C: \ Windows \ system32 \ config
The first thing we need to do is grab the password hashes from the SAM file.
Just download the free PwDump7 software and unzip it on your local PC.
Open a command prompt.
Navigate to the folder where you extracted the PwDump7 application and then enter the following command:
# PwDump7.exe> ββd: \ hash.txt
As soon as you press [Enter] PwDump7 will retrieve hashes of system passwords and save them to d: \ hash.txt file.
2) Cracking password with John the Ripper
Since you can see that the password hashes are still unreadable - we have to crack them using John the Ripper.
John the Ripper is one of the most popular password cracking tools that can run on Windows, Linux and Mac OS x.
Just download the John the Ripper Windows binaries and unzip the contents.
Open a command prompt and change the directory where you unpacked John the Ripper and then run:
# john --format = LM d: \ hash.txt
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
The authorities have exacerbated the βremoteβ draft law and robbed the Russians of the βright to offlineβ
#international
#international
Forwarded from UNDERCODE NEWS