Dump LAPS passwords with ldapsearch.pdf
113.8 KB
Dump LAPS passwords with ldapsearch
#requested
#requested
Forwarded from Backup Legal Mega
π¦SEO Nexus Bundle Full 2020 : β-14,6 gbβ
https://mega.nz/folder/V2ICxSZB#4dQEo0rsmZJHy9lQ0gop-w
https://mega.nz/folder/V2ICxSZB#4dQEo0rsmZJHy9lQ0gop-w
mega.nz
14.58 GB folder on MEGA
68 files and 5 subfolders
Detecting and Tracking the Red-Team.pdf
1.5 MB
Detecting and Tracking #Tips
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Terms related to ss/encrypt/OpenSSL that we will use:
genpkey (replaces genrsa , gendh and gendsa ) - generates private keys
req - utility for creating certificate signing requests and for generating self-signed PKCS # 10 certificates
x509 - utility for signing certificates and for showing properties of certificates
rsa - utility for working with RSA keys, for example, for converting
keys to various formats
enc - various actions with symmetric ciphers
pkcs12 - Create and parse PKCS # 12 files
crl2pkcs7 - program for converting CRL to PKCS # 7
pkcs7 - Performs operations on PKCS # 7 files in DER or PEM format
verify - program for verifying certificate chains
s_client - This command implements an SSL / TLS client that connects to a remote host using SSL / TLS. This is a very useful diagnostic tool for SSL servers
ca - is a minimal CA application. It can be used to sign various forms of certificate requests and generate CRLs. It also maintains a text database of issued certificates and their status
rand - This command generates the specified number of random bytes using a cryptographically secure pseudo-random number generator (CSPRNG)
rsautl - command can be used to sign, verify, encrypt and decrypt data using the RSA algorithm
smime - the command processes S / MIME mail. It can encrypt, decrypt, sign and verify S / MIME messages
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Terms related to ss/encrypt/OpenSSL that we will use:
genpkey (replaces genrsa , gendh and gendsa ) - generates private keys
req - utility for creating certificate signing requests and for generating self-signed PKCS # 10 certificates
x509 - utility for signing certificates and for showing properties of certificates
rsa - utility for working with RSA keys, for example, for converting
keys to various formats
enc - various actions with symmetric ciphers
pkcs12 - Create and parse PKCS # 12 files
crl2pkcs7 - program for converting CRL to PKCS # 7
pkcs7 - Performs operations on PKCS # 7 files in DER or PEM format
verify - program for verifying certificate chains
s_client - This command implements an SSL / TLS client that connects to a remote host using SSL / TLS. This is a very useful diagnostic tool for SSL servers
ca - is a minimal CA application. It can be used to sign various forms of certificate requests and generate CRLs. It also maintains a text database of issued certificates and their status
rand - This command generates the specified number of random bytes using a cryptographically secure pseudo-random number generator (CSPRNG)
rsautl - command can be used to sign, verify, encrypt and decrypt data using the RSA algorithm
smime - the command processes S / MIME mail. It can encrypt, decrypt, sign and verify S / MIME messages
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
β
SOME VERIFIED BINS :
β BIN DISNEY PLUS:
> BINγ6501592675x45x77
> BINγ6501592675x3xx50
> FECHAγRND
> ZIP CODEγ10080
USA πΊπΈ
β BIN VRYVPN VIA PAYPAL
BINγ657368xxxxxxxxxx
BINγ657368xx44xx3x23
BINγ657368x7x64x0x83
FECHAγRND
CCVγRND
USA πΊπ²
ANDDRESS : Street 123
STATE: New York
CITY: NEW YORK
ZIP CODE: 10080
Ph No : (213) 212 xxxx
ONLY VERIFIED BY US
πββοΈBest Cc generators : https://t.me/UNDERCODEHACKING/2150
Enjoy β€οΈππ»
β BIN DISNEY PLUS:
> BINγ6501592675x45x77
> BINγ6501592675x3xx50
> FECHAγRND
> ZIP CODEγ10080
USA πΊπΈ
β BIN VRYVPN VIA PAYPAL
BINγ657368xxxxxxxxxx
BINγ657368xx44xx3x23
BINγ657368x7x64x0x83
FECHAγRND
CCVγRND
USA πΊπ²
ANDDRESS : Street 123
STATE: New York
CITY: NEW YORK
ZIP CODE: 10080
Ph No : (213) 212 xxxx
ONLY VERIFIED BY US
πββοΈBest Cc generators : https://t.me/UNDERCODEHACKING/2150
Enjoy β€οΈππ»
Telegram
UNDERCODE HACKING
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦57 New cc generator list
1) https://namso-gen.com
2) http://namso.ezyro.com/?i=1
3) http://archive.li/gvfdN
4) https://ia1000.com
6) http://sourcebinccgen.ml/CCGENSBC1/
7) http://sourcebinccgen.ml/CCGENSBC2/
8) https://obtainβ¦
π¦57 New cc generator list
1) https://namso-gen.com
2) http://namso.ezyro.com/?i=1
3) http://archive.li/gvfdN
4) https://ia1000.com
6) http://sourcebinccgen.ml/CCGENSBC1/
7) http://sourcebinccgen.ml/CCGENSBC2/
8) https://obtainβ¦
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦COMMUN METHODES HACK NETFLIX FOR BEGINERS
#fASTtIPS
> Unfortunately, password theft is very common within cyber security, especially for Netflix accounts.
> With over 75 million subscribers, Netflix passwords grant cyber criminals to both access user accounts without paying for a subscription, or even worseβ¦
> sell the userβs password details and payment information on the Deep Web.
π¦How do they do it? β Some examples
1) Phishing
Hackers often use phishing campaigns to obtain access to userβs device. They accomplish this by tricking users (often via a malicious email link that leads the user to a fake Netflix login page).
Once the user clicks on the link, the malware steals their account information.
2) Keyloggers
Keylogging is a password-theft tactic that resides in a deviceβs system memory, runs every time you startup your PC, and logs all your keystrokes. The logs are then sent to the hacker.
3) Trojan Horse Viruses
Trojan horses are sent to victims via malicious links or file attachments that trick users into downloading malicious software onto their device. Once downloaded this malware can take full control of the computer. Its main goal is to damage, disrupt, steal or damage your data or network.
> Once installed, it can extract user logins of any website or software that the infected computer uses, way more than just Netflix accounts; Skype, Facebook, Emails, and more.
> Unfortunately, computer passwords arenβt really a safety measure against hackers who access your device remotely, as they access the system through other tactics.
> Computer passwords are more of a protection against physical theft so that somebody whose obtained physical possession of your PC cannot login to the device.
ENJOYβ€οΈππ»
deepwiki
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦COMMUN METHODES HACK NETFLIX FOR BEGINERS
#fASTtIPS
> Unfortunately, password theft is very common within cyber security, especially for Netflix accounts.
> With over 75 million subscribers, Netflix passwords grant cyber criminals to both access user accounts without paying for a subscription, or even worseβ¦
> sell the userβs password details and payment information on the Deep Web.
π¦How do they do it? β Some examples
1) Phishing
Hackers often use phishing campaigns to obtain access to userβs device. They accomplish this by tricking users (often via a malicious email link that leads the user to a fake Netflix login page).
Once the user clicks on the link, the malware steals their account information.
2) Keyloggers
Keylogging is a password-theft tactic that resides in a deviceβs system memory, runs every time you startup your PC, and logs all your keystrokes. The logs are then sent to the hacker.
3) Trojan Horse Viruses
Trojan horses are sent to victims via malicious links or file attachments that trick users into downloading malicious software onto their device. Once downloaded this malware can take full control of the computer. Its main goal is to damage, disrupt, steal or damage your data or network.
> Once installed, it can extract user logins of any website or software that the infected computer uses, way more than just Netflix accounts; Skype, Facebook, Emails, and more.
> Unfortunately, computer passwords arenβt really a safety measure against hackers who access your device remotely, as they access the system through other tactics.
> Computer passwords are more of a protection against physical theft so that somebody whose obtained physical possession of your PC cannot login to the device.
ENJOYβ€οΈππ»
deepwiki
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from Backup Legal Mega
mega.nz
478.33 MB folder on MEGA
41 files and 6 subfolders
π¦Some NordVpn accounts
halldor0gudmundsson@gmail.com:awesome123
lacaveafromage@sfr.fr:Velaux1391
federicomariani215@gmail.com:Camilla78
halldor0gudmundsson@gmail.com:awesome123
lacaveafromage@sfr.fr:Velaux1391
joyceanne@gmail.com:j0yceanne
vja2001@gmail.com:bigboy101
jwg553@gmail.com:Patriots8281
jacksonchetty73@gmail.com:Lemonade20
bombardouglas@gmail.com:Hotdogs10
imaveryscaryghost@gmail.com:w4rr10rme
yasmeend22@gmail.com:mileycyrus
imaveryscaryghost@gmail.com:w4rr10rme
bethany@bcsmallbiz.com:3bluebears
trond.magnuus@hotmail.com:Passord10
kendallcox@gate.net:cupcake234
adrianxhahnemi@gmail.com:gjakova93
philweschen@gmail.com:wesley88
fangjin_1981@163.com:19811209
michalis13@gmail.com:99488451m
brendan.grosse@gmail.com:05161990Bg
ryantupa20@gmail.com:punx1977
diegoto77@gmail.com:benzema9
nicholas.aviles@gmail.com:N1cholas
r.malette@yahoo.com:Basketball18
jwg553@gmail.com:Patriots8281
tsuntat1995@hotmail.com:tattat11
halldor0gudmundsson@gmail.com:awesome123
sellyourcell@hotmail.com:russ1979
joyceanne@gmail.com:j0yceanne
siri.wallin@hotmail.de:bYT0zuA5
389727104@qq.com:james199639
km.skazka@gmail.com:shust0517
imaveryscaryghost@gmail.com:w4rr10rme
obren1977@yahoo.com:dragoon777
lacaveafromage@sfr.fr:Velaux1391
cartwrightayres@gmail.com:Kipper12
diegoto77@gmail.com:benzema9
halldor0gudmundsson@gmail.com:awesome123
lacaveafromage@sfr.fr:Velaux1391
federicomariani215@gmail.com:Camilla78
halldor0gudmundsson@gmail.com:awesome123
lacaveafromage@sfr.fr:Velaux1391
joyceanne@gmail.com:j0yceanne
vja2001@gmail.com:bigboy101
jwg553@gmail.com:Patriots8281
jacksonchetty73@gmail.com:Lemonade20
bombardouglas@gmail.com:Hotdogs10
imaveryscaryghost@gmail.com:w4rr10rme
yasmeend22@gmail.com:mileycyrus
imaveryscaryghost@gmail.com:w4rr10rme
bethany@bcsmallbiz.com:3bluebears
trond.magnuus@hotmail.com:Passord10
kendallcox@gate.net:cupcake234
adrianxhahnemi@gmail.com:gjakova93
philweschen@gmail.com:wesley88
fangjin_1981@163.com:19811209
michalis13@gmail.com:99488451m
brendan.grosse@gmail.com:05161990Bg
ryantupa20@gmail.com:punx1977
diegoto77@gmail.com:benzema9
nicholas.aviles@gmail.com:N1cholas
r.malette@yahoo.com:Basketball18
jwg553@gmail.com:Patriots8281
tsuntat1995@hotmail.com:tattat11
halldor0gudmundsson@gmail.com:awesome123
sellyourcell@hotmail.com:russ1979
joyceanne@gmail.com:j0yceanne
siri.wallin@hotmail.de:bYT0zuA5
389727104@qq.com:james199639
km.skazka@gmail.com:shust0517
imaveryscaryghost@gmail.com:w4rr10rme
obren1977@yahoo.com:dragoon777
lacaveafromage@sfr.fr:Velaux1391
cartwrightayres@gmail.com:Kipper12
diegoto77@gmail.com:benzema9
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦NMAP USEFUL COMMANDS :
Scan network for live hosts
(nmap/zenmap)
For NMAP β
nmap -vv -sP 192.168.0.1-254 -oG hosts_up.txt
cat hosts_up.txt | grep -i βupβ
nmap -PN 192.168.9.200-254
(this will also show open ports for each host)
Identify OS
(nmap/zenmap)
For NMAP β
nmap -O 192.168.0.100 (just OS fingerprint)
nmap -A 192.168.9.201 (runs an βaggressiveβ scan β scan,OS fingerprint, version scan, scripts and traceroute)
Check hosts for services
(nmap/zenmap)
For NMAP
- nmap -sS 192.168.9.254 (TCP)
- nmap -sU 192.168.9.254 (UDP)
(Could be better to do this in zenmap and group servers by services)
FOR SNMP
- snmpwalk -c public -v1 192.168.9.254 1 |grep hrSWRunName|cut -dβ β -f
For a known port
- nmap β p 139 192.168.9.254
DNS Lookups/Hostnames
host -l <domain> <dns server>
e.g. host -l acme.local 192.168.0.220
Banner grab/Version services
(nmap/zenmap/SNMP)
Check versions of software/services against milw0rm and security focus)
For NMAP
- nmap -sV 192.168.9.254
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦NMAP USEFUL COMMANDS :
Scan network for live hosts
(nmap/zenmap)
For NMAP β
nmap -vv -sP 192.168.0.1-254 -oG hosts_up.txt
cat hosts_up.txt | grep -i βupβ
nmap -PN 192.168.9.200-254
(this will also show open ports for each host)
Identify OS
(nmap/zenmap)
For NMAP β
nmap -O 192.168.0.100 (just OS fingerprint)
nmap -A 192.168.9.201 (runs an βaggressiveβ scan β scan,OS fingerprint, version scan, scripts and traceroute)
Check hosts for services
(nmap/zenmap)
For NMAP
- nmap -sS 192.168.9.254 (TCP)
- nmap -sU 192.168.9.254 (UDP)
(Could be better to do this in zenmap and group servers by services)
FOR SNMP
- snmpwalk -c public -v1 192.168.9.254 1 |grep hrSWRunName|cut -dβ β -f
For a known port
- nmap β p 139 192.168.9.254
DNS Lookups/Hostnames
host -l <domain> <dns server>
e.g. host -l acme.local 192.168.0.220
Banner grab/Version services
(nmap/zenmap/SNMP)
Check versions of software/services against milw0rm and security focus)
For NMAP
- nmap -sV 192.168.9.254
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE HACKING
3 Billiar combo.rar
15.4 MB
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BEST 2020 SITES FOR CRACKED APK
β https://acmarket.net/
β https://www.apkwhale.com/
β https://apkmb.com/
β https://ihackedit.com/
β https://apk4free.net/
β https://rexdl.com/
β https://www.revdl.com
β https://aptoide.com
β https://www.apk4fun.com/
β https://apkpure.com
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BEST 2020 SITES FOR CRACKED APK
β https://acmarket.net/
β https://www.apkwhale.com/
β https://apkmb.com/
β https://ihackedit.com/
β https://apk4free.net/
β https://rexdl.com/
β https://www.revdl.com
β https://aptoide.com
β https://www.apk4fun.com/
β https://apkpure.com
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
www.acmarket.net
ACMarket - Cracked Apps, Games, Mods for Android
Forwarded from Backup Legal Mega
π¦ Setup your own web hosting full guide for beginers β769.47 MBβ
https://mega.nz/folder/IqRAnSib#mSKVpXDrqibkCwW0gN9cLg
https://mega.nz/folder/IqRAnSib#mSKVpXDrqibkCwW0gN9cLg
mega.nz
769.47 MB folder on MEGA
43 files
How to bypass AMSI and execute ANY malicious Powershell code.pdf
398 KB
the most #requested tutorial
How to bypass AMSI and execute ANY malicious Powershell code
How to bypass AMSI and execute ANY malicious Powershell code
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦METASPLOIT MODULES & HACKING :
Http://www.indepthdefense.com/2009/02/reverse-pivots-with-metasploit-how-not.html
http://code.google.com/p/msf-hack/wiki/WmapNikto
Http://www.indepthdefense.com/2009/01/metasploit-visual-basic-payloads-in.html
Http://seclists.org/metasploit/
Http://pauldotcom.com/2010/03/nessus-scanning-through-
a-meta.html
Http://meterpreter.illegalguy.hostzi.com/
Http://blog.metasploit.com/2010/03/automating-metasploit-console.html
Http://www.workrobot.com/sansfire2009/561.html
Http://www.securitytube.net/video/711
http://en.wikibooks.org/wiki/Metasploit/
MeterpreterClient#download
Http://vimeo.com/16852783
Http://milo2012.wordpress.com/2009/09/27/xlsinjector/
Http://www.fastandeasyhacking.com/
Http://trac.happypacket.net/
http://www.blackhat.com/presentations/bh-dc-10/Ames_Colin/BlackHat-DC-2010-colin-david-neurosurgery-with-meterpreter-wp.pdf
http://www.blackhat.com/presentations/bh-dc-10/Egypt/BlackHat-DC-2010-Egypt-UAV-slides.pdf
http://www.offensive-security.com/metasploit-unleashed/Metasploit_Unleashed_Information_Security_Training
Http://www.irongeek.com/i.php?page=videos/metasploit-class
Http://www.ethicalhacker.net/component/option,com_smf/Itemid,54/topic,6158.0/
Http://vimeo.com/16925188
Http://www.ustream.tv/recorded/13396511
Http://www.ustream.tv/recorded/13397426
Http://www.ustream.tv/recorded/13398740
enjoyβ€οΈππ»
β GIT 2020
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦METASPLOIT MODULES & HACKING :
Http://www.indepthdefense.com/2009/02/reverse-pivots-with-metasploit-how-not.html
http://code.google.com/p/msf-hack/wiki/WmapNikto
Http://www.indepthdefense.com/2009/01/metasploit-visual-basic-payloads-in.html
Http://seclists.org/metasploit/
Http://pauldotcom.com/2010/03/nessus-scanning-through-
a-meta.html
Http://meterpreter.illegalguy.hostzi.com/
Http://blog.metasploit.com/2010/03/automating-metasploit-console.html
Http://www.workrobot.com/sansfire2009/561.html
Http://www.securitytube.net/video/711
http://en.wikibooks.org/wiki/Metasploit/
MeterpreterClient#download
Http://vimeo.com/16852783
Http://milo2012.wordpress.com/2009/09/27/xlsinjector/
Http://www.fastandeasyhacking.com/
Http://trac.happypacket.net/
http://www.blackhat.com/presentations/bh-dc-10/Ames_Colin/BlackHat-DC-2010-colin-david-neurosurgery-with-meterpreter-wp.pdf
http://www.blackhat.com/presentations/bh-dc-10/Egypt/BlackHat-DC-2010-Egypt-UAV-slides.pdf
http://www.offensive-security.com/metasploit-unleashed/Metasploit_Unleashed_Information_Security_Training
Http://www.irongeek.com/i.php?page=videos/metasploit-class
Http://www.ethicalhacker.net/component/option,com_smf/Itemid,54/topic,6158.0/
Http://vimeo.com/16925188
Http://www.ustream.tv/recorded/13396511
Http://www.ustream.tv/recorded/13397426
Http://www.ustream.tv/recorded/13398740
enjoyβ€οΈππ»
β GIT 2020
β β β Uππ»βΊπ«Δπ¬πβ β β β
Markbaggett
Mark Baggett - In Depth Defense
A collection of articles, python tools, interviews and talk about information security, hacking, forensics, and defense using python coding
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦FREE NEW COURSES :
Http://pentest.cryptocity.net/
Http://www.irongeek.com/i.php?page=videos/network-sniffers-class
http://samsclass.info/124/124_Sum09.shtml
Http://www.cs.ucsb.edu/~vigna/courses/cs279/
Http://crypto.stanford.edu/cs142/
Http://crypto.stanford.edu/cs155/
Http://cseweb.ucsd.edu/classes/wi09/cse227/
Http://www-inst.eecs.berkeley.edu/~cs161/sp11/
http://security.ucla.edu/pages/Security_Talks
Http://www.cs.rpi.edu/academics/courses/spring10/
csci4971/
Http://cr.yp.to/2004-494.html
Http://www.ece.cmu.edu/~dbrumley/courses/18732-f09/
Https://noppa.tkk.fi/noppa/kurssi/t-110.6220/luennot
Http://stuff.mit.edu/iap/2009/#websecurity
enjoyβ€οΈππ»
β GIT 2020
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦FREE NEW COURSES :
Http://pentest.cryptocity.net/
Http://www.irongeek.com/i.php?page=videos/network-sniffers-class
http://samsclass.info/124/124_Sum09.shtml
Http://www.cs.ucsb.edu/~vigna/courses/cs279/
Http://crypto.stanford.edu/cs142/
Http://crypto.stanford.edu/cs155/
Http://cseweb.ucsd.edu/classes/wi09/cse227/
Http://www-inst.eecs.berkeley.edu/~cs161/sp11/
http://security.ucla.edu/pages/Security_Talks
Http://www.cs.rpi.edu/academics/courses/spring10/
csci4971/
Http://cr.yp.to/2004-494.html
Http://www.ece.cmu.edu/~dbrumley/courses/18732-f09/
Https://noppa.tkk.fi/noppa/kurssi/t-110.6220/luennot
Http://stuff.mit.edu/iap/2009/#websecurity
enjoyβ€οΈππ»
β GIT 2020
β β β Uππ»βΊπ«Δπ¬πβ β β β
trailofbits.github.io
Introduction Β· CTF Field Guide