Forwarded from VorTech Softwares
MsOffice2019_ProPlus_v1808_b10730_x86x64.part2.rar
1.2 GB
Microsoft Office 2019 Profesional Plus v1808 b10730.20102 Retail x86x64.
Contains both 32bit and 64bit. Download all parts.
Part 2 of 3.
@vortechpc
Contains both 32bit and 64bit. Download all parts.
Part 2 of 3.
@vortechpc
Forwarded from VorTech Softwares
MsOffice2019_ProPlus_v1808_b10730_x86x64.part3.rar
926.3 MB
Microsoft Office 2019 Profesional Plus v1808 b10730.20102 Retail x86x64.
Contains both 32bit and 64bit. Download all parts.
Part 3 of 3.
@vortechpc
Contains both 32bit and 64bit. Download all parts.
Part 3 of 3.
@vortechpc
Amazon accounts are with only E-MAIL access! Do a password reset to enter Amazon account. Balance = last order price. We always care for customers and because of amazon's security updates, please check account details after a purchase (you will get detailed instructions, how to avoid account locks and etc).
Refund time: 5 mins (because accounts are fresh and checking every day)
inbox @anonyguy
All email - valid, need use only good and clear socks or rdp!
Refund time: 5 mins (because accounts are fresh and checking every day)
inbox @anonyguy
All email - valid, need use only good and clear socks or rdp!
Example of how a philosophy dialogue can be used to develop ideas
how do i gain access to a company server
you can start with a port scan to find open ports you can use to enter the network
what if i find a port open
log into the port using default usernames and passwords
try a dictionary attack
what if a port is not open
you can use psexec or social engineering
ok now that i am in what do i do
check if you are root or admin
what if i am
congratulation
what if i am not
use privilege escalating techniques to become root
how?
search for it on google
ok, now that i am root what do i do
why did you hack? if for fun then mission accomplished
if you are looking for a file to steal use the locate command on linux or dir c: /os /d in windows
after that?
delete your logs
you can use the locate command to search for it and delete it using rm *
wow thanks
its a good idea to backdoor the server so that you don go through hell next time you want to hack the same machine
thanks
~halozorayo
how do i gain access to a company server
you can start with a port scan to find open ports you can use to enter the network
what if i find a port open
log into the port using default usernames and passwords
try a dictionary attack
what if a port is not open
you can use psexec or social engineering
ok now that i am in what do i do
check if you are root or admin
what if i am
congratulation
what if i am not
use privilege escalating techniques to become root
how?
search for it on google
ok, now that i am root what do i do
why did you hack? if for fun then mission accomplished
if you are looking for a file to steal use the locate command on linux or dir c: /os /d in windows
after that?
delete your logs
you can use the locate command to search for it and delete it using rm *
wow thanks
its a good idea to backdoor the server so that you don go through hell next time you want to hack the same machine
thanks
~halozorayo
Stickers have finally arrived on WhatsApp! We bring you a fantastic application with which you can share stickers with your WhatsApp friends. We offer you assorted sticker packs so you can choose the one you like best. Video games, pets, celebrities, TV series, emojis and much more. What are you waiting for?
You are one step away from downloading one of the best stickers apps for WhatsApp in the market. Creativity and 100% security. You will have at your disposal an app that is constantly evolving and that will offer you more stickers in the future.
You can use packs of so many sets of Emoji Faces to express your mood with your WhatsApp contacts, among others. We use themes that are recognized worldwide. If you have any requirement or you miss something, do not hesitate to leave us a comment.
Download it, we are waiting for you!
Compatible with the new WhatsApp
https://play.google.com/store/apps/details?id=com.gigabytedevelopersinc.apps.whatsapp.stickers
You are one step away from downloading one of the best stickers apps for WhatsApp in the market. Creativity and 100% security. You will have at your disposal an app that is constantly evolving and that will offer you more stickers in the future.
You can use packs of so many sets of Emoji Faces to express your mood with your WhatsApp contacts, among others. We use themes that are recognized worldwide. If you have any requirement or you miss something, do not hesitate to leave us a comment.
Download it, we are waiting for you!
Compatible with the new WhatsApp
https://play.google.com/store/apps/details?id=com.gigabytedevelopersinc.apps.whatsapp.stickers
Google Play
Emoji WAStickers - Face Mood WhatsApp Stickers app - Apps on Google Play
Make your WhatsApp conversations a lot more lively with our collection of emojis
EASTER EGG
If you search "Excelsior" on Netflix, all Marvel TV shows and movies show up.
This is in tribute to the late Stan "The Man" Lee.
@techBYTE
If you search "Excelsior" on Netflix, all Marvel TV shows and movies show up.
This is in tribute to the late Stan "The Man" Lee.
@techBYTE
if anyone have USA or Canada Verified Paypal Account Then Inbox me For. A Great Deal.
@anonyguy
@anonyguy
HACKING THE WEB
method: using google to find sensitive information
, this is for the rest of you who were patient enough to wait
lets imagine we are hacking a site called whitehats.com
go to google.com and type these in the search box (this is called google dorks)
to find the sites admin panel
site:whitehats.com allinurl:"admin login panel"
to find databases
site:whitehats.com ext:db
to find passwords
site:whitehats.com ext:pwd
to find logs
site:whitehats.com ext:log
today i learnt that log files are very important
after hacking a system, you should look for log files because they contain the passwords of all the people who log into the site
just click on search after you type the codes
if it doesnt work on one site, try it on another
#occupy_the_web
~halozorayo @Techbyte
method: using google to find sensitive information
, this is for the rest of you who were patient enough to wait
lets imagine we are hacking a site called whitehats.com
go to google.com and type these in the search box (this is called google dorks)
to find the sites admin panel
site:whitehats.com allinurl:"admin login panel"
to find databases
site:whitehats.com ext:db
to find passwords
site:whitehats.com ext:pwd
to find logs
site:whitehats.com ext:log
today i learnt that log files are very important
after hacking a system, you should look for log files because they contain the passwords of all the people who log into the site
just click on search after you type the codes
if it doesnt work on one site, try it on another
#occupy_the_web
~halozorayo @Techbyte
WHAT IS A USER AGENT
when you are on the web, your browser needs to tell the sites you visit whether you are using a phone or a pc
thats why facebook web is different from facebook mobile
lets have a look at an example of a user agent your browser sends to all the sites you visit
Mozilla/5.0(Linux i686Fedora/3.0.1)
this shows that i am using firefox on fedora linux
you see, my user agent has told the site that i am using fedora linux. so when the cops start investigating who hacked the site, they will be looking for someone using fedora linux [even though i changed my ip with a vpn]
busted!
if i change it to something else for example to say that i am using windows8 then it will fool them into thinking that someone else committed the crime
if you changed the user agent of your pc to a phone the sites you visit will think that you are using a phone to browse
there are a lot of extensions for your browser which can help you change your user agent
so google them
keep learning!
~halozorayo
when you are on the web, your browser needs to tell the sites you visit whether you are using a phone or a pc
thats why facebook web is different from facebook mobile
lets have a look at an example of a user agent your browser sends to all the sites you visit
Mozilla/5.0(Linux i686Fedora/3.0.1)
this shows that i am using firefox on fedora linux
you see, my user agent has told the site that i am using fedora linux. so when the cops start investigating who hacked the site, they will be looking for someone using fedora linux [even though i changed my ip with a vpn]
busted!
if i change it to something else for example to say that i am using windows8 then it will fool them into thinking that someone else committed the crime
if you changed the user agent of your pc to a phone the sites you visit will think that you are using a phone to browse
there are a lot of extensions for your browser which can help you change your user agent
so google them
keep learning!
~halozorayo
some of us here are not using our common sense at all
yes, we are all noobs
children in pentesting
but that does not mean we should behave like children
have you ever taken the time to study how a url is formed?
take a look at this
pentest.io/books/
the /books means that there is a folder named books on that server
just add /files/
if you want to see all the groups on fb just add /groups to fb.com
this is how i solved two of the real levels on hackthis
i needed the username and password so i just added /members/ to the url and bingo! all the logins appeared
in the other i just added members.js to the url and i saw all the passwords because thats where they are stored
you want to hack a site
have you tried adding /pass/ or /users/ or /members/ to the url to see if you can get the credentials easily?
lets all grow up and tamper with urls
~halozorayo
yes, we are all noobs
children in pentesting
but that does not mean we should behave like children
have you ever taken the time to study how a url is formed?
take a look at this
pentest.io/books/
the /books means that there is a folder named books on that server
just add /files/
if you want to see all the groups on fb just add /groups to fb.com
this is how i solved two of the real levels on hackthis
i needed the username and password so i just added /members/ to the url and bingo! all the logins appeared
in the other i just added members.js to the url and i saw all the passwords because thats where they are stored
you want to hack a site
have you tried adding /pass/ or /users/ or /members/ to the url to see if you can get the credentials easily?
lets all grow up and tamper with urls
~halozorayo
Local On-line Payment System
=========================
My Dear Friends,
I am really intrigued why we don't have on-line payment system in Ethiopia. The ATM cards of different banks are getting integrated. So what is holding back our IT experts from setting up an on-line payment system for local transactions?
In the other world, it takes only some minutes to fix Paypal button to their marketing websites. And the Paypal system works the background operation once the debit (ATM) card is registered with Paypal. Alipay of China works in similar fashion. I am not asking to use Paypal or Alipay. But, why not setup our own #Ethiopay?
So here is the challenge፦
If anyone comes with the possible executable business plan (with solutions to all legal, business and technical challenges), lets get hands together to make it a realty. I am sure we don't need Elon Musk, Peter Thiel, Tony Hsieh or Jack Ma to do it in Ethiopia. We just need to copy the code and deal with the respective authorities, I think.
Kindly inform all who have the interest and the capability.
Kind Regards,
Getu K.
#Challenge_for_Ethiopay
(Local version of Paypal or Alipay) On-line payment system. Get Kebede
=========================
My Dear Friends,
I am really intrigued why we don't have on-line payment system in Ethiopia. The ATM cards of different banks are getting integrated. So what is holding back our IT experts from setting up an on-line payment system for local transactions?
In the other world, it takes only some minutes to fix Paypal button to their marketing websites. And the Paypal system works the background operation once the debit (ATM) card is registered with Paypal. Alipay of China works in similar fashion. I am not asking to use Paypal or Alipay. But, why not setup our own #Ethiopay?
So here is the challenge፦
If anyone comes with the possible executable business plan (with solutions to all legal, business and technical challenges), lets get hands together to make it a realty. I am sure we don't need Elon Musk, Peter Thiel, Tony Hsieh or Jack Ma to do it in Ethiopia. We just need to copy the code and deal with the respective authorities, I think.
Kindly inform all who have the interest and the capability.
Kind Regards,
Getu K.
#Challenge_for_Ethiopay
(Local version of Paypal or Alipay) On-line payment system. Get Kebede
Hello ;I am back sorry For Belated Topic.
I was facing a connection problem on my DSL connection.-------------------EXCLUSIVE REAL LIFE BANK HACK
You guys know I have been taking some of my experience and adding some stuff to it to give you stories.
Well, this time it's the undiluted truth of a bank hack.
One morning in August when some noobs were busy asking how to hack wifi, I thought to myself. , how about hacking a bank?
Time to put my skills to the test
I don't want to mention the name of the bank cos "I am still in there"
;)
But let's assume it's bank.com
The first thing I did was to get the IP address
root@ubuntu$> ping bank.com
And I got 147.6.23.1
Then I thought to myself, hmm I am sure they are using a wifi router
So let me find it and login using a backdoor
I open Firefox on my PC and go to shodan.io, login and scan the netblock using shodan dorks
netblock:147.6.23.1
Yep I found the router and searched for the default pass again. Turns out admin, admin.
So I telnet to the router and Login to get a shell
I saw
root@router$>
Which means I was root
The next thing to do was to find the machines on the network
I used a ping sweep
root@router$> for i in {0..255} do
I got a list of about 80 hosts (I know they were running Windows)
And this was where it gets interesting...
~halozorayo
I was facing a connection problem on my DSL connection.-------------------EXCLUSIVE REAL LIFE BANK HACK
You guys know I have been taking some of my experience and adding some stuff to it to give you stories.
Well, this time it's the undiluted truth of a bank hack.
One morning in August when some noobs were busy asking how to hack wifi, I thought to myself. , how about hacking a bank?
Time to put my skills to the test
I don't want to mention the name of the bank cos "I am still in there"
;)
But let's assume it's bank.com
The first thing I did was to get the IP address
root@ubuntu$> ping bank.com
And I got 147.6.23.1
Then I thought to myself, hmm I am sure they are using a wifi router
So let me find it and login using a backdoor
I open Firefox on my PC and go to shodan.io, login and scan the netblock using shodan dorks
netblock:147.6.23.1
Yep I found the router and searched for the default pass again. Turns out admin, admin.
So I telnet to the router and Login to get a shell
I saw
root@router$>
Which means I was root
The next thing to do was to find the machines on the network
I used a ping sweep
root@router$> for i in {0..255} do
ping 192.168.1.$x | grep succeI got a list of about 80 hosts (I know they were running Windows)
And this was where it gets interesting...
~halozorayo
Google dork of the week
Finding and downloading mp3 music easily
Go to Google.com
intext:index.of mp3 meskerem getu
Will give you thousands of sites with direct download links to meskerem getu songs
Have fun
~halo
Finding and downloading mp3 music easily
Go to Google.com
intext:index.of mp3 meskerem getu
Will give you thousands of sites with direct download links to meskerem getu songs
Have fun
~halo
SECURITY IS BASED ON TRUST
You guys know me to be the lulz guy.
Laughing at your security
Today let's talk about one of jacks topics: Hacking NASA with HTML
No, I am just kidding. No HTML
But seriously hacking NASA the lulz way.
Security is based on trust.
This is the very foundation of both pentesting and social engineering
Imagine this
NASA is a company that people work for. The staff is very comfortable to work behind their windows10 machines to help them send a man to Mars.
Now I am only interested in the windows 10 part. Win10 is made by Microsoft. So naturally it means that NASA trusts Microsoft
They don't expect Microsoft to stab them in the back.
So, what if we hack Microsoft and send a Windows 10 update to all win10 machines with our malware?
The machines at NASA will download as install it as part of the OS and ...
Let the lulz begin
If we hack Google all chrome users are owned
If we hack WhatsApp, we can get anyone's messages
It's all based on trust
You trust Microsoft to protect you
That's how you'll get hacked!
#for_the_lulz
~halozorayo
You guys know me to be the lulz guy.
Laughing at your security
Today let's talk about one of jacks topics: Hacking NASA with HTML
No, I am just kidding. No HTML
But seriously hacking NASA the lulz way.
Security is based on trust.
This is the very foundation of both pentesting and social engineering
Imagine this
NASA is a company that people work for. The staff is very comfortable to work behind their windows10 machines to help them send a man to Mars.
Now I am only interested in the windows 10 part. Win10 is made by Microsoft. So naturally it means that NASA trusts Microsoft
They don't expect Microsoft to stab them in the back.
So, what if we hack Microsoft and send a Windows 10 update to all win10 machines with our malware?
The machines at NASA will download as install it as part of the OS and ...
Let the lulz begin
If we hack Google all chrome users are owned
If we hack WhatsApp, we can get anyone's messages
It's all based on trust
You trust Microsoft to protect you
That's how you'll get hacked!
#for_the_lulz
~halozorayo
JUST THINKING
I know the security of iot devices are very low, then use of dfault passwords make them so.
So what if I create php bots with facial recognition that will always search the world using the iot cameras.
It will infect routers and then use exploits like eternal blue to install the bots on Windows to spy on your webcam
So the bots will come to my server for a picture then they will use facial recognition to find people from webcams and other public cameras
Then once a person is found it reports back to me with longitude and latitude
Now let's say this device is made, the CIA guys will want to get it
I will get onto their wanted list and I might even be killed
Well anyways there is no harm in trying
~halozorayo
I know the security of iot devices are very low, then use of dfault passwords make them so.
So what if I create php bots with facial recognition that will always search the world using the iot cameras.
It will infect routers and then use exploits like eternal blue to install the bots on Windows to spy on your webcam
So the bots will come to my server for a picture then they will use facial recognition to find people from webcams and other public cameras
Then once a person is found it reports back to me with longitude and latitude
Now let's say this device is made, the CIA guys will want to get it
I will get onto their wanted list and I might even be killed
Well anyways there is no harm in trying
~halozorayo
PayPal ChargeBack Ultimate Solution.👉WHAT TO DO
Create two PayPal account, always use one to transact with your clients..then store your funds in the second account.
Eg.
Buy the funds with account 1 which is your business account,then transfer it to your private / personal account immediately. Dont keep funds in your business account, always empty the account after every succesful transactions..so when a chargeback is made by these rippers, there will be no fund to be reversed
Create two PayPal account, always use one to transact with your clients..then store your funds in the second account.
Eg.
Buy the funds with account 1 which is your business account,then transfer it to your private / personal account immediately. Dont keep funds in your business account, always empty the account after every succesful transactions..so when a chargeback is made by these rippers, there will be no fund to be reversed
Special edition
Some quick ports very important to hackers
FTP - port #20
Used for upload and download of files
Imagine if you could gain access to the sites FTP
You can upload your virus or shell!
SSH - port #22 a secure shell, mostly bash which you can use to manipulate a Linux box
Telnet - An less secure port. Can be used to connect to sites and grab banners if you don't have netcat
SMTP - simple mail transmission protocol port #25
This is evidence of email service on the victim
Anyone ready for anonymous phishing?
If you do a scan with nmap and find these ports open, connect to them with the right tools and login using default accounts
You can even write a script to log in until it finds the right password for you!
~halozorayo
Some quick ports very important to hackers
FTP - port #20
Used for upload and download of files
Imagine if you could gain access to the sites FTP
You can upload your virus or shell!
SSH - port #22 a secure shell, mostly bash which you can use to manipulate a Linux box
Telnet - An less secure port. Can be used to connect to sites and grab banners if you don't have netcat
SMTP - simple mail transmission protocol port #25
This is evidence of email service on the victim
Anyone ready for anonymous phishing?
If you do a scan with nmap and find these ports open, connect to them with the right tools and login using default accounts
You can even write a script to log in until it finds the right password for you!
~halozorayo
THE MOST AWAITED AND COMPLEX QUESTION IS SOLVED
here is a christmas present for you guys
free internet but limited internet:
its just that you have to use the port which is open in your area which could be checked using incloak .com.
Examples.
DROID VPN
Hammer VPN
TROID VPN
BUT they do offer limited internet about 2.5 GB per month…
(It can be used as emergency data when your data pack has exhausted)
note-account balance must be zero
here is a christmas present for you guys
free internet but limited internet:
its just that you have to use the port which is open in your area which could be checked using incloak .com.
Examples.
DROID VPN
Hammer VPN
TROID VPN
BUT they do offer limited internet about 2.5 GB per month…
(It can be used as emergency data when your data pack has exhausted)
note-account balance must be zero