Clicky

 
Not a member yet? Why not Sign up today
Create an account  

Welcome, Guest
You have to register before you can post on our site.

Username
  

Password
  





Search Forums

(Advanced Search)

Latest Threads
C directory on web server
Forum: Beginner Hacking for newbies
Last Post: UnknownKind
04-02-2017, 10:03 PM
» Replies: 1
» Views: 2,094
hypen keywords
Forum: Python
Last Post: breathehacker
03-26-2017, 11:41 AM
» Replies: 0
» Views: 1,979
Exploit Porn
Forum: General Discussion
Last Post: Bilal Qureshi
03-17-2017, 10:39 AM
» Replies: 0
» Views: 2,729
urgent attention
Forum: Hello World!
Last Post: sameersifar
02-18-2017, 02:11 PM
» Replies: 0
» Views: 2,693
Pakistan Zindabad
Forum: Hello World!
Last Post: UnknownKind
02-05-2017, 10:11 PM
» Replies: 3
» Views: 183
Metasploitable3: Vulnerab...
Forum: Metasploit
Last Post: Third_Eye
01-18-2017, 12:52 AM
» Replies: 1
» Views: 2,199
Where to Begin With Hacki...
Forum: Beginner Hacking for newbies
Last Post: KHANHAXOR
01-14-2017, 10:02 AM
» Replies: 5
» Views: 235
Wondershare Filmora
Forum: GFX Tutorials
Last Post: ZeroCer
01-11-2017, 01:44 AM
» Replies: 1
» Views: 2,103
[Ransomware ] Windows Cry...
Forum: Go Programming Language
Last Post: lutuseaside
01-04-2017, 08:04 PM
» Replies: 8
» Views: 2,413
Epic Underground Wi Fi Ha...
Forum: Video Tutorials
Last Post: UnknownKind
12-20-2016, 12:12 AM
» Replies: 0
» Views: 2,162

 
  hypen keywords
Posted by: breathehacker - 03-26-2017, 11:41 AM - Forum: Python - No Replies

Hi!
I hope you are fine.
Can anyone explain about the hyphenated keywords in google(python based). In the google search if we enter a normal keyword then it shows the results but when we enter it with hyphen or minus symbol then it doesn't show the results.
Try out --->'GOOGLE' and '-GOOGLE' or 'FACEBOOK LOGIN' and '-FACEBOOK -LOGIN'. Google ignores these keywords.(You can try out other words as well with different combinations).
And on entering (29-9 or -9+8) google shows the calculator with asnwer but on entering(-9-9 or whatever values but with '-' sign)google shows the google map with zero result.
Similar thing i saw in the reddit search bar on entering 'microsoft'(https://www.reddit.com/search?q=Microsoft) reddit displays the results but on entering '-microsoft'(https://www.reddit.com/search?q=-Microsoft) it fails with error message. 
Anyone explain it please.
Thanks in advance..

Print this item

  C directory on web server
Posted by: breathehacker - 03-26-2017, 11:22 AM - Forum: Beginner Hacking for newbies - Replies (1)

Hello!
I hope you all are fine.
Well I wanna know that if there is any way to get access to the 'C' directory on web server that contains the backdoor. After uploading the backdoor it is going into the C directory where only server can edit or delete data.. Confused Confused Confused Confused Confused Confused Confused Confused Confused Confused

Print this item

  Exploit Porn
Posted by: Bilal Qureshi - 03-17-2017, 10:39 AM - Forum: General Discussion - No Replies

Why Cyber Army is not switching to exploit the Porn sites..
I found vulnerabilities in adult sites but why i haven't seen by cyber army to exploit those..

Print this item

  urgent attention
Posted by: sameersifar - 02-18-2017, 02:11 PM - Forum: Hello World! - No Replies

i need help urgently please pm me

Print this item

Video Epic Underground Wi Fi Hacking for Web Pentesters
Posted by: UnknownKind - 12-20-2016, 12:12 AM - Forum: Video Tutorials - No Replies




Epic Underground Wi Fi Hacking for Web Pentesters


The talk will cover the many gaping insecurities of wireless hotspots and dive in to how these can be leveraged to attack clients, gain free Internet access, hijack accounts, steal sensitive information, and more. This will progress into how web penetration testers can leverage their existing skill-sets to design, build, and deploy malicious targeted access points. All of the attacks that will be demonstrated live during the talk can be deployed on various platforms, making it easy for the audience to reproduce regardless of hardware available.

Print this item

Video Remotely Hack - Unaltered Jeep Cherokee
Posted by: UnknownKind - 12-19-2016, 10:25 PM - Forum: Video Tutorials - No Replies






Remotely Hack -  Unaltered Jeep Cherokee
Charlie Miller Security engineer
Chris Valasek Director of Vehicle Security Research at IOActive


Hacking of automobiles is a subject often discussed, details regarding successful attacks, if ever made public, are non-comprehensive at best. The ambiguous nature of automotive security leads to narratives that are polar opposites: either we’re all going to die or our cars are perfectly safe. In this talk, we will show the reality of car hacking by demonstrating exactly how a remote attack works against an unaltered, factory vehicle. Starting with remote exploitation, we will show how to pivot through different pieces of the vehicle’s hardware in order to be able to send messages on the CAN bus to critical electronic control units. We will conclude by showing several CAN messages that affect physical systems of the vehicle. By chaining these elements together, we will demonstrate the reality and limitations of remote car attacks.


Print this item

Video Exploiting the Top 10 OWASP in-depth explanation
Posted by: UnknownKind - 12-19-2016, 03:35 AM - Forum: Video Tutorials - No Replies





 Exploiting the Top 10 OWASP in-depth explanation

The OWASP Top 10 never changes for a reason; these attacks can be used against nearly every web app on the Internet, private intranet, or mobile networks. In this talk we will go over most of the Top 10 with in-depth explanation and lots of demo time.  This will include several helpful tools that speed up the testing process.  Getting to know these attacks and tools will prepare you for an exciting life of filling out bug reports.

Print this item

Star Turn Your Android into PwnPhone with Kali operating system
Posted by: UnknownKind - 12-19-2016, 02:29 AM - Forum: Hacking Tutorials - No Replies

[Image: qw00qShg.jpg]

Crack your android and build a PwnPhone for Penetration test,PwnPhone Dream Device for hackers which is also shown in Mr.Robots series.
We’ll attempt to show you how to build your own Pwn Phone running the Kali operating system and our AOPP (Android Open Pwn Project) image.


Let’s start cracking…

Flashing the Phone
  •     Download the Recovery image for your device:
  •     https://twrp.me/Devices
  •     Connect the device to the host machine via USB cable.
  •     Power off the device and boot into the Bootloader:
  •     Press and hold the Power & Volume-Down buttons
  •     Confirm the device is recognized by the host machine:
  •     (a device should be listed when the command returns)
  •     $ fastboot devices
  •     Unlock the device:$ fastboot oem unlock
  •     Once unlocked, flash the Recovery image:$ fastboot flash recovery <name-of-recovery-image>.img
  •     Once the Recovery image has been flashed, boot into Recovery from the Bootloader:
  •     Use the Volume-Down/Up buttons to cycle through the Bootloader options and then the Power button to select
  •     If prompted, swipe “Swipe to Allow Modifications”.
  •     Once in Recovery, wipe the device:
  •     Tap Wipe > Advanced Wipe > tap: Dalvik/ART cache, System, Cache, Data > swipe “Swipe to Wipe”
  •     Once wiped, do NOT boot into System (You don’t have one; you just wiped it). Tap the Home button to return to the Recovery home screen.
  •     Confirm again the device is recognized by the host machine:
  •     (a device should be listed when the command returns)$ adb devices
  •     From the host machine, push the downloaded AOPP ROM zip to the device sdcard:
  •     $ adb push <name-of-rom-zip>.zip /sdcard/
  •     On device, tap Install and then select the AOPP ROM zip from /sdcard.
  •     Swipe “Swipe to Confirm Flash”
  •     Once installed, tap “Reboot System”
 
OK Now Let’s Build the Phone

Downloading the Source

  Refer to “Downloading and Building Requirements” before proceeding:
   
Quote:https://source.android.com/source/requirements.html

    Refer to “Downloading the Source” before proceeding:
   
Quote:https://source.android.com/source/downloading.html

    Create a directory for the build system to live in and cd into that directory:
   
Quote:$ mkdir <WORKING_DIR>$ cd <WORKING_DIR>

    Initialize a local repository using this source tree, use the command:

   
Quote:$ repo init -u git@github.com:aopp/android_platform.git -b px-0.1

    Sync the repository, use:

   
Quote:$ repo sync


Building

Devices are referred to by codename (e.g. hammerhead). Make sure to use this when substituting <device-codename> in the following instruction set.

    Refer to “Building the System” before proceeding:

Quote:    https://source.android.com/source/building.html

    To initialize the build environment, use the following command:

Quote:$ . build/envsetup.sh

    Prepare the build environment (download device-tree and dependencies) for your specific device:

Quote:$ breakfast <device-codename>

    Connect the device running a working AOPP/AOSP ROM to the host machine via USB.
    Make sure it is booted into system and confirm the device is recognized by the host machine:
    (a device should be listed when the command returns)

Quote:$ adb devices

    Enter the device directory:

Quote:$ cd <WORKING_DIR>/device/<vendor>/<device-codename>/

    Extract the proprietary binaries from your device:

Quote:$ ./extract-files.sh

    Return to the root of the build system

Quote::$ croot

    Start a build run for your device:
   
Quote:$ brunch <device-name>

    Once complete, the ROM zip can be found in the out/ directory:
 
Quote:$ cd /out/target/product/<device-codename>

    The flashable ROM zip (product of the build run) will be located in the out/ directory as:
   
Quote:aopp-0.1-<build-date>-UNOFFICIAL-<device-codename>.zip


 
 Flashing

  1.     Download and install the command line tools for your OS: https://developer.android.com/studio/ind...#downloads
  2.     Download the AOPP ROM for your device:
  3.     https://wiki.pwnieexpress.com/index.php/Official_devices
  4.     Download the Recovery image for your device:
  5.     https://twrp.me/Devices
  6.     Connect the device to the host machine via USB cable.
  7.     Power off the device and boot into the Bootloader:
  8.     Press and hold the Power & Volume-Down buttons
  9.     Confirm the device is recognized by the host machine:
  10.     (a device should be listed when the command returns)
  11.     $ fastboot devices
  12.     Unlock the device:
  13.     $ fastboot oem unlock
  14.     Once unlocked, flash the Recovery image:$ fastboot flash recovery <name-of-recovery-image>.img
  15.     Once the Recovery image has been flashed, boot into Recovery from the Bootloader:
  16.     Use the Volume-Down/Up buttons to cycle through the Bootloader options and then the Power button to select
  17.     If prompted, swipe “Swipe to Allow Modifications”.
  18.     Once in Recovery, wipe the device:
  19.     Tap Wipe > Advanced Wipe > tap: Dalvik/ART cache, System, Cache, Data > swipe “Swipe to Wipe”
  20.     Once wiped, do NOT boot into System (You don’t have one; you just wiped it). Tap the Home button to return to the Recovery home screen.
  21.     Confirm again the device is recognized by the host machine:
  22.     (a device should be listed when the command returns)$ adb devices
  23.     From the host machine, push the downloaded AOPP ROM zip to the device sdcard:$ adb push <name-of-rom-zip>.zip /sdcard/
  24.     On device, tap Install and then select the AOPP ROM zip from /sdcard.
  25.     Swipe “Swipe to Confirm Flash
  26.     Download SuperSU from Chainfire here:
  27.     https://download.chainfire.eu/969/SuperSU/UPDATE-SuperSU-v2.76-20160630161323.zip
  28.     Push the SuperSU zip to /sdcard/:
  29.     $ adb push <SuperSU-zip-name>.zip /sdcard/
  30.     Once installed, tap “Reboot System
  31.     Hack the Gibson…and remember…hugs are worth more than handshakes
  32.     Done.


Print this item

  New Here
Posted by: Harriss - 12-18-2016, 12:40 AM - Forum: Hello World! - Replies (4)

Hello everyone, iam new here.
Nice to see PCA back again.

Print this item

Heart Metasploit remote console: Remotely access Metasploit with msf-remote-console
Posted by: UnknownKind - 12-17-2016, 01:14 PM - Forum: Hackers Equipment - No Replies

[Image: ySJZXiP.jpg]

Metasploit remote console msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules permanently as daemon on your server like autopwn2. Although it gives you the ability to remotely use the msfrpcd server it is recommended to use it locally with a ssh or mosh shell because certificate validation is not enabled.


Features
  •     Optimized delivery & execution of commands.
  •     Has all msf commands implemented even future ones. This is possible through the structure of the rpc api.
  •     Browse through your command history with the up and down arrow key.
  •     Tab completion for system paths.
  •     It feels like the normal msfconsole!

How does it look like ?



Quote:Connecting to server:
 Host => myDomain.com,
 Port => 55553,
 User => msf,
 Pwd => ***,
 SSL => True

[+] Successfully connected
 Console id: 19
     ,           ,
    /             \
   ((__---,,,---__))
      (_) O O (_)_________
         \ _ /            |\
          o_o \   M S F   | \
               \   _____  |  *
                |||   WW|||
                |||     |||


       =[ metasploit v4.12.22-dev-52b81f3                 ]
+ -- --=[ 1577 exploits - 906 auxiliary - 272 post        ]
+ -- --=[ 455 payloads - 39 encoders - 8 nops             ]
+ -- --=[ Free Metasploit Pro trial: hxxp://r-7.co/trymsp ]


msf >


How do I use it ?


Quote:Usage: Main.py [options]

Options:
  -h, --help                show this help message and exit
  -r RESOURCE,         --resource=RESOURCE
                                Path to resource file
  -u USERNAME,       --user=USERNAME
                                Username specified on msfrpcd
  -p PASSWORD,      --pass=PASSWORD
                                  Password specified on msfrpcd
  -s, --ssl                    Enable ssl
  -P PORT,                 --port=PORT  Port to connect to
  -H HOST,                 --host=HOST  Server ip
  -c, --credentials        Use hardcoded credentials
  -e, --exit                  Exit after executing resource script


With the -c option you can use the credentials hard coded into Main.py feel free to change them so that you don’t have to use the credential parameters all the time.
With the -r option you specify a resource script to load from your computer into the console.

 
Example:

This will load a resource script and use the hardcoded credentials:


Quote:python Main.py -c -r /root/resource/handler/allHandlers.rc


This will log in to the msfrpcd server through command line arguments:


Quote:python Main.py --ssl --port 55553 --host 127.0.0.1 --user msf --pass msf





Print this item