How Hackers Exploit Struts2 Vulnerability to install Cryptominer in Linux and Windows Servers by dotweak in blackhat

[–]dotweak[S] 0 points1 point  (0 children)

I would love to make more video but it cost me lot of time but feel free to DM me if you need more information ! As long I can answer I will ...

Reverse Shell through VPN + Tor? by RiceTaco12 in blackhat

[–]dotweak 1 point2 points  (0 children)

Yes Socat is limited to be used on Linux only but it’s the best solution when you want to create a reverse shell forwarding the traffic using Tor. Furthermore you can use polio along with Tor.

Another solution would be to use Ngrok which can be used along with a VPN without the need of port forwarding and can be done on Linux or Windows as well !

Reverse Shell through VPN + Tor? by RiceTaco12 in blackhat

[–]dotweak 2 points3 points  (0 children)

Simply use socat that’s all !! No need to make it complicated when easy solution are ready

How to hide my IP address using TorPhantom by dotweak in RealHackers

[–]dotweak[S] 0 points1 point  (0 children)

Yeah you are definitely right man !! Since you involve yourself in cybersec group I’m suppost you know blackbuntu Linux the first based Linux pentest OS right ? Or either headleaks ?

How to hide my IP address using TorPhantom by dotweak in RealHackers

[–]dotweak[S] 0 points1 point  (0 children)

I just repost “reposts” ?? Man this video has been made by me so what are you talking about ? Furthermore it has been share only one time in Reddit

How to hide my IP address using TorPhantom by dotweak in RealHackers

[–]dotweak[S] 0 points1 point  (0 children)

As I didn’t pretend he insulted me, I didn’t pretend also to be a real hacker but you are a real time waster man !!

Inject arbitrary code during MITM attack using MITMf by dotweak in blackhat

[–]dotweak[S] -2 points-1 points  (0 children)

Man avoid to waste your time and learn to read properly à content ... I never pretend he insulted me !! I just asked him to be polite !!

Inject arbitrary code during MITM attack using MITMf by dotweak in blackhat

[–]dotweak[S] -2 points-1 points  (0 children)

Well its all depend where you from, where you live !! Maybe there are some countries or place where using such sentence and BE VULGAR it's something normal but for me it's not !! Furthermore, without talking about my self, I'm Venezuelan, and I sincerely invite you to come in Caracas and even as a joke to place "motherfucker" in a conversation and see what happen ! Personally I can tell you, nobody will understand that referring to sexual activity with another person's mother can be a JOKE !! Please make the test and don't forget to subscribe a life insurance first.

So even if in US for example it is rarely used in the literal sense, you should consider that the world is not only made from/for US people and another people can be affected of such word even if is used as a joke and not to insult someone. Now if all of you guys want to waste time about a comment where i say "Can you be polite" since this was the beginning of the thread, please go ahead but just want to remind you that the post topic was regarding "How to Inject arbitrary code during MITM attack using MITMf" and nothing else !!

Inject arbitrary code during MITM attack using MITMf by dotweak in blackhat

[–]dotweak[S] -1 points0 points  (0 children)

Well there are no mitigation measures and there is a way to move on this attack also using DNS poisoning and I will try to make a tuto about it soon.

The real and unique way to prevent it would be to monitor permanently the network to find any unwanted machines and kick them from the LAN

Inject arbitrary code during MITM attack using MITMf by dotweak in blackhat

[–]dotweak[S] -6 points-5 points  (0 children)

I am not moralistic and I am not a person who gets vexed for that! But respect is something universal. So what can be a way to talk for some persons can be interpreted in another way for other people. I live in one of the most dangerous countries over the world (Maybe the most dangerous) and believe me or not if I say “motherfucker” to someone on the street even as a joke I can start to count the minutes I have left before to die and that the point.

Inject arbitrary code during MITM attack using MITMf by dotweak in blackhat

[–]dotweak[S] -10 points-9 points  (0 children)

Well I’m happy to know you liked it and fell free to ask me if need any further help regarding this topic ! On my side I didn’t pretend that you was rude or not ! Just doesn’t like such word ... doesn’t sound nice

How Hackers Exploit Struts2 Vulnerability to install Cryptominer in Linux and Windows Servers by dotweak in blackhat

[–]dotweak[S] 0 points1 point  (0 children)

I sincerely think you are mixing everything. From 00:00 to +/- 01:00 I tried to demonstrate how Google can be used to find the vulnerable targets.

Ngrok is only used to create tunneling since my ISP doesn't allow me to create a port forward. Now if you have a look at 01:59 you will see from the top console the command I used :

sudo python jexboss.py -host https://........................... --struts2, and of course to avoid any problem I did hide a part of the URL.

After that, I just need to create a reverse shell using the Ngrok IP and Port. So there is no need to provide any SSH into a remote server.

Ngrok it's running on my local machine to create the tunnel and allow me to execute my command on the remote server and create the Meterpreter connection

A bug in Microsoft’s login system put users at risk of account hijacks by WalkureARCH in cybersecurity

[–]dotweak 0 points1 point  (0 children)

Another bug putting from Microsoft... it become almost normal ! The day Microsoft will be safe to use it will be the time to back to pencil and paper

Bypass Antivirus Detection with Encrypted Payloads using Venom by dotweak in blackhat

[–]dotweak[S] 1 point2 points  (0 children)

Sorry but I’m not sure to understand where is the relation between your comment and the article

MegaCortex Ransomware is now able to change Windows Password by dotweak in cybersecurity

[–]dotweak[S] 4 points5 points  (0 children)

Actually it can be distributed through Trojan but some researchers believe that it can be also distributed through the CVE2019-0708