Penetration testing and hacking to gain website access DDOS
8.45K subscribers
150 photos
2 links
Penetration testing and hacking to gain website access DDOS
Download Telegram
The DIE scan revealed a Flutter-based APK, so I'm considering decompiling it using Blutter.

I previously configured it successfully on Ubuntu, but the virtual machine crashed and everything was deleted. When reconfiguring on Kali and Ubuntu:

Network issues (global proxy required), missing compilation environment.

CMake-related errors indicate missing environment; be sure to check if the Visual Studio module is installed.

After successfully configuring the environment, I happily started the application.

I got the output, and used the files to restore the symbol table. I then ran the addName script.
MS-SQL server passwords are simple and easily accessible, making them a primary attack vector for Windows systems. The strategy involves locating a poorly managed MS-SQL server, scanning it, and then performing a brute-force or dictionary attack to gain administrator privileges. Malware is then installed to take control of the infected system.


We offer professional hacking services, including penetration testing, website privilege escalation, password cracking, and data breach investigations. Inquiries are welcome. @PipiShrimp
After the cloud control module is invoked, it first obtains the cloud control configuration distribution address from the cloud control module resources. Then, based on the cloud control configuration content, the cloud control module collects information such as the user's browser history links, startup process information, and installed software information. It may even use the QQ local login credentials to obtain information such as the gender, age, and birthday of the currently logged-in QQ owner from QQ Space.


We offer professional hacking services, including penetration testing, website privilege escalation, password cracking, and data breach investigations. Inquiries are welcome. @PipiShrimp
Locating directories to frequently used folders and files in the system administration system (S&P) is often surprisingly effective in finding sensitive information. S&P personnel often like to keep a small notebook of passwords for each machine for easier management, as it's common for one person to manage dozens of machines. Remembering so many passwords is not always possible, so most S&P personnel choose to record machine passwords in files like .txt or .xls.


We offer professional hacking services, including penetration testing, website privilege escalation, password cracking, and data breach investigations. Inquiries are welcome. @PipiShrimp
Brute-force website login: To log in to a web server, you need to know the username, password, or both. You can use Hydra to break into a POST form and find the username and password fields along with their id/name attributes in the HTTP source.



We offer professional hacking services, including penetration testing, website privilege escalation, password cracking, and data breach investigations. Inquiries are welcome. @PipiShrimp
MS-SQL server passwords are simple and easily accessible, making them a primary attack vector for Windows systems. The strategy involves locating a poorly managed MS-SQL server, scanning it, and then performing a brute-force or dictionary attack to gain administrator privileges. Malware is then installed to take control of the infected system.



We offer professional hacking services, including penetration testing, website privilege escalation, password cracking, and data breach investigations. Inquiries are welcome. @PipiShrimp
As we can see from inotify, Nginx almost always deletes files immediately after creation. However, we can be fairly certain that Nginx does generate temporary files, but they are deleted immediately after creation, making it impossible for us to determine the content of the files.
Kernel privilege escalation refers to the process of gaining privileges by exploiting weaknesses in many kernel entry points that interact with the kernel. User operations such as reading from the file system, opening device files, issuing system calls, or sending data packets through network interfaces all require interaction with the kernel.
@PipiShrimp
Feroxbuster Forced Browsing Tool | Predicts Resource Locations | File Directory Resource Enumeration. Forced browsing is an attack aimed at enumerating and accessing resources that are not referenced by a web application but are still accessible to the attacker, such as source code, credentials, internal network addresses, etc. This can be done via proxy traffic through SOCKS proxies (including DNS lookups) or proxy traffic through Burp.


We offer professional hacking services, including penetration testing, website privilege escalation, password cracking, and data breach investigations. Inquiries are welcome. @PipiShrimp
Windows Privilege Escalation (PEA) knowledge: permission division, basic commands, system vulnerability privilege escalation, querying patch information, database privilege escalation, UDF privilege escalation, MOF privilege escalation, boot item privilege escalation, MSF privilege escalation, kernel privilege escalation, token manipulation, and Bypass UAC.


We offer professional hacking services, including penetration testing, website privilege escalation, password cracking, and data breach investigations. Inquiries are welcome. @PipiShrimp
Chinese company Socialarks leaked data from Facebook, Instagram, and LinkedIn, affecting 208 gigabytes of users and containing over 318 million records. The database contained personally identifiable information from approximately 214 million social media users worldwide. The leak was attributed to the Elasticsearch database not using strong passwords or encryption for protection.


We offer professional hacking services, including penetration testing, website privilege escalation, password cracking, and data breach investigations. Inquiries are welcome. @PipiShrimp
LadonGo is an intranet penetration testing and vulnerability scanning framework that can easily detect live hosts in C, B, and A segments with a single click. It also features fingerprinting, port scanning, password brute-force, remote execution, and high-risk vulnerability detection. Version 3.2 includes 24 modules, high-risk vulnerability detection (MS17010, SmbGhost), remote execution (SshCmd, WinrmCmd), and password brute-force (SmbScan).



We offer professional hacking services, including penetration testing, website privilege escalation, password cracking, and data breach investigations. Inquiries are welcome. @PipiShrimp
Fawkes is a tool that uses the Google search engine to find targets vulnerable to SQL injection attacks. It's written in Python 3 and uses 49 random user agents. An example of its usage is: python3 fawkes.py --query ‘noticias.php?id=10’ --timeout 3 --verbose.


We offer professional hacking services, including penetration testing, website privilege escalation, password cracking, and data breach investigations. Inquiries are welcome. @PipiShrimp
Social-analyzer analyzes and finds profiles on over 300 social media websites. It includes APIs and web applications for analyzing and finding profiles on over 300 social media websites. It comprises various string analysis and detection modules. The detection modules utilize a rating mechanism based on different detection technologies to generate a ratio value from 0 to 100.


We offer professional hacking services, including penetration testing, website privilege escalation, password cracking, and data breach investigations. Inquiries are welcome. @PipiShrimp