Hackers ๐Ÿ‘น intrusion ๐Ÿ‘น penetration ๐Ÿ‘นdomain ๐Ÿ‘น
7.33K subscribers
145 photos
4 links
Hackers ๐Ÿ‘น intrusion ๐Ÿ‘น penetration ๐Ÿ‘นdomain ๐Ÿ‘น

@Rolllli
Download Telegram
Security defenses in information systems primarily focus on technical controls, i.e., implementing security in physical devices and software. These controls are often bypassed when humans themselves are vulnerable to social engineering attacks. Social engineering involves compromising the individuals using these systems. Attackers aim to exploit human weaknesses and coerce people into actions that benefit them.
Once a distributed denial-of-service (DDoS) attack is launched, the attacking network packets flood the victim host, overwhelming legitimate users and preventing them from accessing the server's network resources. Therefore, DDoS attacks are also known as "flood attacks." Common DDoS attack methods include TCP-SYN Flood, ACK Flood, UDP Flood, ICMP Flood, and Proxy Flood.
@Rolllli
zVPN Service: Virtual Private Network, commonly known as a VPN, establishes a private network over a public network for encrypted communication. It's widely used in corporate networks, allowing secure access to internal resources even when you're away from home. However, they are also frequently used to circumvent government censorship or block location blocking on movie streaming websites. Through VPNs, hackers can easily clean up their MAC addresses, system fingerprints, and other access traces, and they also achieve network isolation. Direct network connections would likely expose their IP address, making it a crucial technique for hackers.
We create programs to search for unprotected paths into network systems and computers. Hackers use Trojan programs to infect computers or systems, thereby gaining backdoor access. Trojan programs created by hackers can steal important data without the victim's knowledge.
Simple, versatile scripting languages

Common security issues can be addressed with tools found online, but with scripting languages, you can write your own (or edit existing) tools when you need to solve a specific problem. Fast, simple scripting languages โ€‹โ€‹can test, discover, and even fix system vulnerabilities. CPAN is full of program modules similar to Net::RawIP and execution protocols that can make your work easier.
This file is the download module for the mining component, developed in Golang. After running, it will access the attacker's server to download various mining components.
There are two files under the msdtc directory: "86.png" and "64.png". They correspond to 32-bit and 64-bit environments respectively. The two samples are completely identical in code structure, differing only in the target system bit selected during compilation. This file is only responsible for re-downloading "get.png" from the attacker's server and executing it for self-updating.
This script is actually a compressed and BASE64 encoded PowerShell script, which decrypts multiple layers of payloads and finally injects a piece of shellcode into the powershell.exe process.
The function of the initall file is to check whether the .configrc7 directory exists in the main directory. If it does not exist, the init2 file is executed; if it exists, it exits.
Afterwards, the DBatLoader loader will select the program injection method based on the configuration file. If the APC injection feature is enabled, the DBatLoader loader will inject into the target process via APC injection.
The XLoader loader unhooks specific functions, making the function export table point back to the manually loaded ntdll to ensure that specific functions are not hooked during execution.
If the system is 32-bit, the XLoader loader will also set the SystemCallStub to KiFastSystemCall to further prevent syscalls from being hooked.
If the environment does not meet the requirements, the XLoader loader will destroy them to prevent the program from running further. This behavior not only increases the difficulty of bypassing environment detection during dynamic debugging but also prevents directly obtaining key information by decrypting hash tables and string tables during static analysis.
During initialization, the XLoader loader manually loads ntdll to prevent some critical APIs from being hooked. To achieve this, the XLoader loader reads ntdll from the hard disk and manually performs redirection operations.
The XLoader loader will check its own process name, and if the process name matches a specific hash value, or if its length is greater than 31 and does not contain spaces, it will stop running.
The XLoader loader will determine if it is running in a sandbox by checking the username.
The XLoader loader looks for whether sbiedll.dll is loaded to determine if it is running inside the Sandboxie sandbox.
The XLoader loader checks the DLL path to determine if it is running inside sandboxes like Cuckoo and SandCastle.
The XLoader loader uses double RC4 key encryption. To increase the difficulty of reverse engineering, the XLoader loader disperses the two decryptions across different parts of the program. To make it harder to extract the keys and encrypted code blocks, the XLoader loader dynamically calculates the start and end feature values and keys of the encrypted code blocks at runtime to prevent automated extraction.
To prevent memory dumps, the XLoader loader re-encrypts the code after the function usage ends.
The detection content includes: DLL name, DLL path, debug port, kernel debug information, whether WOW32Reserved is hooked, running process names, own image name, and username.
The XLoader loader uses NtQueryInformationProcess to detect if it is being debugged.
The XLoader loader uses NtQuerySystemInformation to detect kernel debuggers.
The XLoader loader checks whether the Wow64cpu.dll where WOW32Reserved is located is 64-bit; if it is 64-bit, it indicates that the current environment may have API hooks, and XLoader will stop running.
๐Ÿ”ฅWithdrawal records, freshly released๐Ÿ”ฅ
Take it step by step and do it gradually

Friends with old accounts in cash games, welcome to inquire about cooperation
@Rolllli