- 12
- 30 195
Andrea Purificato
Registrace 6. 12. 2009
Christone KINGFISH Ingram LIVE @ Casa del Jazz, Roma | Empty Promises | 11 july 2024
Christone KINGFISH Ingram LIVE @ Casa del Jazz, Roma | Empty Promises | 11 july 2024
zhlédnutí: 505
Video
Irascibile Frank - Betta Splendens Half Moon
zhlédnutí 103Před 4 lety
Frank, il mio Betta Splendens, quando diventa irascibile :)
Apistogramma Agassizii Fry day 2 of free swimming
zhlédnutí 45Před 4 lety
Apistogramma Agassizii Fry day 2 of free swimming
Aquarium Relax - Apistogramma Agassizii Double Red - dwarf cichlids
zhlédnutí 148Před 4 lety
My Aquarium with Apistogramma Agassizii Double Red and Hyphessobrycon Amandae
Hyphessobrycon Amandae (ember tetra) vs wild nematode
zhlédnutí 119Před 6 lety
One or my Amandae eats a nematode
Fix SSL Certificate Error with BURP on Kali Linux
zhlédnutí 10KPřed 7 lety
Installing Burp's CA Certificate in Kali Linux (firefox) Fix SSL Invalid Security Certificate Error in BURP
Fuzzbunch + Empire on kali - exploiting Win7 x86 target
zhlédnutí 4,7KPřed 7 lety
Take control of windows 7 x86 machine with FuzzBunch - EternalBlue - DoublePulsar on WinXP machine and Empire on Kali linux (Empire launcher DLL) 0:10 - preparing Listener 1:25 - preparing 'launcher.dll' 3:00 - attacking target with Fuzzbunch - EternalBlue 4:24 - implant DLL with Fuzzbunch - DoublePulsar 5:00 - waiting for agent and interact Generate launcher.dll to connect back on Empire Liste...
FuzzBunch and Eternalromance - smbtouch
zhlédnutí 5KPřed 7 lety
Fuzzbunch: Eternalromance / smbtouch - how to check if target system is vulnerable / not vulnerable to 'eternal' exploits
Fuzzbunch and Eternalblue (0day?) - Exploiting Windows in lab
zhlédnutí 6KPřed 7 lety
testing Fuzzbunch - Eternalblue
Tutorial Hacking Nodejs Serialize Unserialize - RCE remote command execution
zhlédnutí 3KPřed 7 lety
In questo video vedremo come sfruttare la vulnerabilità relativa al CVE-2017-5941 di NodeJS, in particolare vedremo come arrivare ad eseguire del codice remoto attraverso lo sfruttamento di una applicazione NodeJS vulnerabile. Qui trovate i dettagli del codice utilizzato: ethicalhacker.it/2017/04/14/tutorial-hacking-nodejs-remote-command-execution-attraverso-serialize-unserialize/ Qui il link a...
U R the best man you helped me a lot tnx.
u saved me tnk u
But now again problem..the proxy server is refusing connection
Thanq so much bro..i just give up and u r awesome bro..i m so happy only b'cuz of u
www.exploit-db.com/docs/english/41289-exploiting-node.js-deserialization-bug-for-remote-code-execution.pdf
Thank you soo much!! It worked!!!
Hi with the RunShellcode what is the command for msfvenom in order to create a bin for 64bit thanks
how to download fb.py
Ar 2.01, in the Empire window a reverse-i-search cp command appeared
alex soto got it! it's a normal shell (not Empire) where i recall the cp command from history (ctrl-r) used to copy DLL into mounted VM shared folder (so I can easily move the file to winXP - fuzzbunch machine)
how did u generate the reverse copy cmd?
what do you mean when you say 'reverse copy cmd'? You can create a malicious DDL with the Empire 'stager/dll' module. The code hidden into the DLL connects to our listener when injected into the victim via DoublePulsar. Then you have complete control of the target 'cause you're able to interact with it via Empire modules (sysinfo, shell cmds, etc...)
Nice, but tried this on an XP always crashing and the payload in the bin file was just the normal messagebox
I guess that the test.bin is generated with doublepulsar ? every time I try a meterpreter generated payload I finish with the famous screen of death !! any one succeeded to run eternal romance with meterpreter shellcode file without using doublepulsar ? P.S : I can not trust double pulsar at all for the moment !
How to solve this error: --[ Version 3.5.1 [*] Loading Plugins [!] Failed to load ._Easybee - XML Error [!] Failed to load ._Easypi - XML Error [!] Failed to load ._Eclipsedwing - XML Error [!] Failed to load ._Educatedscholar - XML Error [!] Failed to load ._Emeraldthread - XML Error [!] Failed to load ._Emphasismine - XML Error [!] Failed to load ._Englishmansdentist - XML Error [!] Failed to load ._Erraticgopher - XML Error [!] Failed to load ._Eskimoroll - XML Error [!] Failed to load ._Esteemaudit - XML Error [!] Failed to load ._Eternalromance - XML Error [!] Failed to load ._Eternalromance - XML Error [!] Failed to load ._Eternalsynergy - XML Error [!] Failed to load ._Ewokfrenzy - XML Error [!] Failed to load ._Explodingcan - XML Error [!] Failed to load ._Zippybeer - XML Error [!] Failed to load ._Doublepulsar - XML Error [!] Failed to load ._Jobadd - XML Error [!] Failed to load ._Jobdelete - XML Error [!] Failed to load ._Joblist - XML Error [!] Failed to load ._Pcdlllauncher - XML Error [!] Failed to load ._Processlist - XML Error [!] Failed to load ._Regdelete - XML Error [!] Failed to load ._Regenum - XML Error [!] Failed to load ._Regread - XML Error [!] Failed to load ._Regwrite - XML Error [!] Failed to load ._Rpcproxy - XML Error [!] Failed to load ._Smbdelete - XML Error [!] Failed to load ._Smblist - XML Error [!] Failed to load ._Smbread - XML Error [!] Failed to load ._Smbwrite - XML Error [!] Failed to load ._Architouch - XML Error [!] Failed to load ._Domaintouch - XML Error [!] Failed to load ._Eclipsedwingtouch - XML Error [!] Failed to load ._Educatedscholartouch - XML Error [!] Failed to load ._Emeraldthreadtouch - XML Error [!] Failed to load ._Erraticgophertouch - XML Error [!] Failed to load ._Esteemaudittouch - XML Error [!] Failed to load ._Explodingcantouch - XML Error [!] Failed to load ._Iistouch - XML Error [!] Failed to load ._Namedpipetouch - XML Error [!] Failed to load ._Printjobdelete - XML Error [!] Failed to load ._Printjoblist - XML Error [!] Failed to load ._Rpctouch - XML Error [!] Failed to load ._Smbtouch - XML Error [!] Failed to load ._Webadmintouch - XML Error [!] Failed to load ._Worldclienttouch - XML Error [!] Failed to load ._Darkpulsar - XML Error [!] Failed to load ._Mofconfig - XML Error [!] Failed to load ._Eternalblue - XML Error [!] Failed to load ._Eternalchampion - XML Error
[?] Execute Plugin? [Yes] : [*] Executing Plugin [*] Running Exploit [*] Initializing Parameters [-] Error - Unsupported pipe name [-] Error 45 (processParams) [!] Plugin failed [-] Error: Eternalromance Failed fb Exploit (Eternalromance) >
Tengo entre problemita al momento de ejecutar el fb.py me pueden ayudar prntscr.com/exevky
me too facing the same.... help me if you can figure out !!
also on Mac?
if you have skype plz send to me
now this exploit he work in server windows 2012 or no
how to get the file 'd:\test.bin' ?
林峰 just an example payload, right?
i wonder what's is the test.bin in video.the DOPU shellcode.what's that.i have Google about it a lot of times.but not found useful information.could u tell me what's that?
i am also wonder test.bin,do you have?
generate test.bin with msfvenom
Руслан Мухаматнуров with -f hex or -f raw?i have tested all of that.but always cause the target Blue screen。could you give me your telegram account?maybe we can talk about it
yes me too always same BSOD the target. i created raw c file then used hexedit to put it in an existing binary file
Adetutu Ogunsowo that's wrong.i have known the dopu actually is doublepulsar
hi bro.you made this video?i have some question about it.could u teach me?
cls
did you was able to run a shellcode?
I'm trying to figure out the correct way