0xploit.com

Search results

  1. 1R0N

    Infoblox Discovers Decoy Dog: The Latest Enterprise Malware

    After another check for abnormal DNS traffic that differs from normal Internet activity, Infoblox experts have discovered a new set of enterprise malware called "Decoy Dog." Decoy Dog helps attackers bypass standard detection methods through strategic "domain aging" and DNS query cloning to...
  2. 1R0N

    Exploring the Dark Web: A Beginner's Guide

    Hello everyone, You may have heard of the "Dark Web" or "Deep Web". It's a place where illegal activities like hacking and drug dealing take place. Here are some interesting facts about the Deep Web: The Deep Web is 400 to 550 times larger than the World Wide Web. It contains 7,500 terabytes...
  3. 1R0N

    How to portforward correctly

    Hidden content
  4. 1R0N

    How to Access Unprotected Webcams Online with a Simple Google Dork

    I will show you how to use a simple Google Dork to access unprotected webcams online. There are thousands of unprotected webcams available online. Since many webcams use known protocols to transmit live video streams over the web, it's often very easy to search for publicly accessible webcams...
  5. 1R0N

    Using Volatility. Memory analysis.

    Today we will analyze the basic analysis of RAM containing a malicious program. This post is for beginner forensics or people who want to learn forensics. In this quick tutorial, we will be using one of the most popular software volatile memory analyzers: Volatility . This tool will help us...
  6. 1R0N

    OPSEC / Anonymity Create your own VPN server without logging for $1

    Double (and more) VPN will give you a head start (only for a couple of days) to hide. This article will describe the tools for the cheapest vpn without logging. We take any server (with access to ssh), or we buy it. The cost is valated from 50 rubles (in the Russian Federation), foreign ones...
  7. 1R0N

    Means used by experts in conducting examinations

    Hidden content
  8. 1R0N

    OPSEC / Anonymity Cleaning Bash Logs and History on Hacked Linux Systems

    This article is based on '' If you hacked a system so how you can fully erase every log and history and make it hard to do forensics for cyber sectors " Hidden content
  9. 1R0N

    OPSEC / Anonymity Private Fox

    Hidden content
  10. 1R0N

    Forensic. Extract password from memory dump with Volatility and GIMP

    Forensics (criminology) tasks in Capture The Flag competitions are divided into several large types: analysis of RAM, hard disk, and traffic dumps. In this article, we will analyze the Remote Password Manager memory analysis task from the JustCTF 2021 competition, and at the same time we will...
  11. 1R0N

    Privilege escalation automated script Windows & Linux

    When an attacker attacks a Windows Operating System most of the time they will get a base shell or meterpreter session. This shell is limited in the actions it can perform. So, to elevate privileges, we need to enumerate different files, directories, permissions, logs and SAM files. The number...
  12. 1R0N

    OPSEC / Anonymity Security in CloudFlare

    Hidden content
  13. 1R0N

    OPSEC / Anonymity Anonymous virtual router

    Hidden content
  14. 1R0N

    OPSEC / Anonymity Create your own anonymous Socks5, or a personal non-public node in Tor

    We create our own anonymous Socks5, or a private non-public node in Tor! Benefits: - Traffic encryption - Socks Powered by Nat Hidden content
Top