milo2012.wordpress.com
Milo2012's Security Blog | Security BlogSecurity Blog
http://milo2012.wordpress.com/
Security Blog
http://milo2012.wordpress.com/
TODAY'S RATING
>1,000,000
Date Range
HIGHEST TRAFFIC ON
Friday
LOAD TIME
0.2 seconds
16x16
32x32
PAGES IN
THIS WEBSITE
7
SSL
EXTERNAL LINKS
10
SITE IP
192.0.78.12
LOAD TIME
0.234 sec
SCORE
6.2
Milo2012's Security Blog | Security Blog | milo2012.wordpress.com Reviews
https://milo2012.wordpress.com
Security Blog
Proxy Tester Script | Milo2012's Security Blog
https://milo2012.wordpress.com/2015/01/08/proxy-tester-script
Milo2012's Security Blog. January 8, 2015. I wrote a script to tests and sorts proxy servers (socks4, socks5, http, https). There are readily available scripts out there on the Internet that does the same. I just want to write my own. Sometimes, during a web application test, your IP address might get flagged and blocked by the target’s WAF. If you are doing anything malicious, do not access the proxy servers directly as the ISP might be able to pinpoint the end point of the attack easily. You can use th...
Test AS/400 for default credentials | Milo2012's Security Blog
https://milo2012.wordpress.com/2014/12/07/test-as400-for-default-credentials
Milo2012's Security Blog. Test AS/400 for default credentials. Test AS/400 for default credentials. December 7, 2014. I wrote a simple script to test default credentials in AS/400. I made use of the library and sample code from http:/ tn5250py.cvs.sourceforge.net/. It currently only works with IBM AS/400 telnet servers for now. You can pull the code from https:/ github.com/milo2012/pentest scripts/tree/master/as400. You will have to supply the ip and port of the AS400 server in the command line. PacSec r...
Automating Man-in-the-Middle SSHv2 attacks | Milo2012's Security Blog
https://milo2012.wordpress.com/2014/11/12/automating-man-in-the-middle-sshv2-attacks
Milo2012's Security Blog. Automating Man-in-the-Middle SSHv2 attacks. Automating Man-in-the-Middle SSHv2 attacks. November 12, 2014. Recently during an internal penetration test, I was performing ARP spoofing and i discovered a SSH connection from the administrator computer to another box. That sounds like the correct way to access remote hosts securely. However, the problem was that the company was using a network switch that was vulnerable to ARP spoofing. Below is the link to the original article.
Web Application Testing – Parsing Directory and File Listing | Milo2012's Security Blog
https://milo2012.wordpress.com/2014/09/09/web-application-testing-parsing-directory-and-file-listing
Milo2012's Security Blog. Web Application Testing – Parsing Directory and File Listing. Web Application Testing – Parsing Directory and File Listing. September 9, 2014. During web application testing, it is useful to get the directory and file listing of the root of the web application that you are testing so as to ensure complete coverage of the application. You can use the below command to get a files and directories listing of the web application root. Ls laR /var/www cd filelist.txt. Sit back and enj...
metasploitHelper and nmap2nessus released at Blackhat Asia Arsenal 2015 | Milo2012's Security Blog
https://milo2012.wordpress.com/2015/03/30/metasploithelper-and-nmap2nessus-released-at-blackhat-asia-arsenal-2015
Milo2012's Security Blog. MetasploitHelper and nmap2nessus released at Blackhat Asia Arsenal 2015. MetasploitHelper and nmap2nessus released at Blackhat Asia Arsenal 2015. March 30, 2015. Mgianarakis and me (@keith55) presented two new tools (metasploitHelper and nmap2nessus) at Blackhat Asia Arsenal in Singapore on 26th and 27th of March, 2015. The tools were developed to help guys like us during vulnerability assessments and penetration tests. Slides: http:/ bit.ly/1D62PWB. Leave a Reply Cancel reply.
TOTAL PAGES IN THIS WEBSITE
7
The zerial killer Gnu/Linux: Python Http Shell
http://zerialkiller.blogspot.com/2015/03/python-http-shell.html
Download: http:/ sourceforge.net/projects/pyhttpshell/. Https:/ www.youtube.com/watch? Publicar un comentario en la entrada. Suscribirse a: Enviar comentarios (Atom). E-X-P-L-O-R-E- -C-R-E-W- w3 4r3 th3 4nk3r t34m. Comunidad Underground de México - Índice. Análisis Forense en profundidad 2.0 - Nuevo Curso -. Darknet - The Darkside. HexorBase – Administer and Audit Multiple Database Servers. Devilzc0de Forum - All Forums. ELearnSecurity : IT Security Training. Exploit-ID Exploit Information Disclosure.
The zerial killer Gnu/Linux: CMSMAP
http://zerialkiller.blogspot.com/2015/08/cmsmap.html
CMSmap es un escaneador open source escrito en python, esta diseñado para detectar posibles vulnerabilidades y brechas de seguridad en los CMS mas populares como WordPress, Joomla y Drupal. La intalacion es Sencilla:. Git clone https:/ github.com/Dionach/CMSmap.git. CMSmap tool v0.6 - Simple CMS Scanner Author: Mike Manzotti mike.manzotti@dionach.com Usage: cmsmap.py -t. Publicar un comentario en la entrada. Suscribirse a: Enviar comentarios (Atom). E-X-P-L-O-R-E- -C-R-E-W- w3 4r3 th3 4nk3r t34m. Hull Su...
The zerial killer Gnu/Linux: Herramienta para recuperar los archivos cifrados por el ransomware TeslaCrypt, una variante de CryptoLocker
http://zerialkiller.blogspot.com/2015/08/herramienta-para-recuperar-los-archivos.html
Herramienta para recuperar los archivos cifrados por el ransomware TeslaCrypt, una variante de CryptoLocker. Toda la info completa en este excelente blog: HACKPLAYERS. Http:/ www.hackplayers.com/2015/04/recuperar-los-archivos-cifrados-con-teslacrypt.html. Publicar un comentario en la entrada. Suscribirse a: Enviar comentarios (Atom). E-X-P-L-O-R-E- -C-R-E-W- w3 4r3 th3 4nk3r t34m. Comunidad Underground de México - Índice. Análisis Forense en profundidad 2.0 - Nuevo Curso -. Darknet - The Darkside. Exploi...
The zerial killer Gnu/Linux: Github Dork
http://zerialkiller.blogspot.com/2015/08/github-dork.html
Excelente Github Dork para users y passwords. P=1&q=filename%3Asftp-config.json host user password&ref=searchresults&type=Code&utf8=%E2%9C%93. Publicar un comentario en la entrada. Suscribirse a: Enviar comentarios (Atom). E-X-P-L-O-R-E- -C-R-E-W- w3 4r3 th3 4nk3r t34m. Comunidad Underground de México - Índice. Análisis Forense en profundidad 2.0 - Nuevo Curso -. Darknet - The Darkside. HexorBase – Administer and Audit Multiple Database Servers. Devilzc0de Forum - All Forums. Hack 4 Life Mx. The Ethical ...
The zerial killer Gnu/Linux: CVE-2015-5477 BIND9 TKEY remote assert DoS PoC
http://zerialkiller.blogspot.com/2015/08/cve-2015-5477-bind9-tkey-remote-assert.html
CVE-2015-5477 BIND9 TKEY remote assert DoS PoC. Https:/ www.youtube.com/watch? PoC for BIND9 TKEY assert Dos (CVE-2015-5477). First sends a "version" query to see if the server is up. Regardless of the version response, it then sends the DoS packet. Then it waits 5 seconds for a response. If the server crashes,. There will be no response. Multiple hostnames can be specified on the command-line. IP addresses can be specified instead of hostnames. Supports IPv4 and IPv6. Changing the data on the network.
The zerial killer Gnu/Linux: CVE-2015-0235 AKA GHOST
http://zerialkiller.blogspot.com/2015/01/cve-2015-0235-aka-ghost.html
Glibc gethostbyname buffer overflow (aka GHOST). Para saber si somos vulnerables a ghost, en una terminal ponemos lo siguiente:. User@ora-19 ]$ cat GHOST.c EOF. Define CANARY "in the coal mine". Temp = { "buffer", CANARY };. Struct hostent resbuf;. Struct hostent *result;. Strlen (name) = size needed - sizeof (*host addr) - sizeof (*h addr ptrs) - 1; * */. Size t len = sizeof(temp.buffer) - 16*sizeof(unsigned char) - 2*sizeof(char *) - 1;. Char name[sizeof(temp.buffer)];. Memset(name, '0', len);. ELearnS...
The zerial killer Gnu/Linux: Gcat, un backdoor escrito en Python que utiliza Gmail como C&C
http://zerialkiller.blogspot.com/2015/08/gcat-un-backdoor-escrito-en-python-que.html
Gcat, un backdoor escrito en Python que utiliza Gmail como C&C. Lei un excelente post sobre gcat, que como el nombre del titulo lo dice, es un backdoor escrito en python que utiliza a gmail como servidor de comando y control. Entonces me di a la tarea de hacer un PoC sobre esta herramienta. Https:/ www.google.com/settings/security/lesssecureapps. Posteriormente clonamos los archivos del github:. Git clone https:/ github.com/byt3bl33d3r/gcat.git. Bien ahora, en ambos .py modificamos las variables:. Una ve...
TOTAL LINKS TO THIS WEBSITE
10
Dreamers Cove
Our dreams become reality and sometimes our realities become dreams, we are the dreamers of dreams" - Willy Wonka. Tuesday, April 10, 2012. Monday, February 13, 2012. Sunday, January 29, 2012. Wednesday, November 16, 2011. Monday, October 24, 2011. Look into my eyes. Tuesday, August 09, 2011. Thursday, July 28, 2011. Finally a shot of a male and female Minivet. Subscribe to: Posts (Atom). View my complete profile. Andy Paul Nature Photography. Do You See What I See. Life as a Pickle.
milo2 (AJM) | DeviantArt
Window.devicePixelRatio*screen.width 'x' window.devicePixelRatio*screen.height) :(screen.width 'x' screen.height) ; this.removeAttribute('onclick')". DO YOU FOLKS LIKE COFFEE 8C. Deviant for 13 Years. This deviant's full pageview. DO YOU FOLKS LIKE COFFEE 8C. This is the place where you can personalize your profile! By moving, adding and personalizing widgets. You can drag and drop to rearrange. You can edit widgets to customize them. The bottom has widgets you can add! We've split the page into zones!
Hurtownia milo2000
Logowanie do panelu hurtowego. Zmieniamy się dla Was! Otwarte od poniedziałku do piątku. Od 7:00 do 15:00. Tel 12 260 79 02. W związku ze zmianą modelu funkcjonowania. Oraz wprowadzeniem nowego sposobu zamawiania,. Prosimy o korzystanie z panelu hurtowego:. Logowanie do panelu hurtowego. Nowe konta są już dla Państwa przygotowane. Dane dostępowe otrzymacie Państwo od naszych przedstawicieli handlowych oraz w hurtowni pod numerem 12 260 79 02. Zachęcamy do kontaktu z naszymi przedstawicielami:.
PLASMANDO COLORES
Friday, June 16, 2006. TOTAL EXITO EN EL MUSEO DE MEDIOS! SE REALIZO CON TOTAL EXITO LA MUESTRA DE MILO EL PASADO 15 DE JUNIO EN EL MUSEO DE MEDIOS DE LA CIUDAD DE RESISTENCIA, DONDE SE APROVECHO PARA HOMENAJEARLO POR SU MAS QUE DESTACADA LABOR EN ARTEBA 2006, NOS MOSTRO UNA VEZ MAS LA VARIEDAD Y FUERZA DE SUS DIBUJOS. Posted by MILO LOCKET at 3:57 AM. Friday, June 02, 2006. FABULOSA PINTURA EN EDIFICIO DE RESISTENCIA, MARCO TENDENCIAS EN LA REGION Y DEFINIO UN CONCEPTO POR VENIR. Thursday, June 01, 2006.
Blog de milo2006 - XX-Rebbee-XX - Skyrock.com
Mot de passe :. J'ai oublié mon mot de passe. Bon ben salue sa sais mon blog je mapelle Rébecca jsuis trés energique jai besion dbougé pis skia sur mon blog ben sais a vous dle voire. Mise à jour :. Abonne-toi à mon blog! Sa sais simon un gars vrm mais vrm génial yé vrm cool kan on lconnais. Saiis lfun déconner avec toi on peut pas se passer dtoi. Té sex mais toi tu dis le contraire mais bon jvas pas te casser un bras pour ke tu dise le contraire de ton opinion. Jveut pas te perdre de vue :). Té vrm une ...
Milo2012's Security Blog | Security Blog
Milo2012's Security Blog. Enumerating Domains of Specific Organisations. December 21, 2017. My friend Paul wrote a tweet about a useful tip on how to enumerate the domains of a specific organization using curl. Do follow him at @PaulWebSec if you haven’t. I decided to expand on his tip. It might be sometimes hard to find out the full organization name but you do know the domain name that they use (or maybe I am just lazy). Python test.py -h. Usage: test.py [options]. H, –help. Found the below domains.
Blog de milo2014 - Blog de milo2014 - Skyrock.com
Mot de passe :. J'ai oublié mon mot de passe. Je mapéll melissa et jé 10 ans et jémme tou dans la vie. Mise à jour :. Abonne-toi à mon blog! L'auteur de ce blog n'accepte que les commentaires de ses amis. Tu n'es pas identifié. Clique ici pour poster un commentaire en étant identifié avec ton compte Skyrock. Et un lien vers ton blog ainsi que ta photo seront automatiquement ajoutés à ton commentaire. Posté le dimanche 05 décembre 2010 14:00. L'auteur de ce blog n'accepte que les commentaires de ses amis.
Life.
milo24-in-miloland.blogspot.com
no one's perfect
This is me.i am elaine.my egg crack was on 24/10/1996.remember to buy presents for me! I love dogs and HATE stalkers. best friends are:VALERIE from chinese tuition,INEZ and AMANDA that used to be from HAIG GIRLS. and many more! DON'T DON'T try to mess with them or. watch your back! Wednesday, May 6, 2009. I've got MEP test and chinese history test today! For sure going to fail history test :(. Posted by Elaine @ 5:01 AM. Friday, May 1, 2009. Okto's 1 minute of fame. If you wanna join,tell me! Sunday, Mar...
milo24.com - Projektowanie stron internetowych - 505-122-704 - Agencja Interaktywna, Agencja Reklamowa Płock - tworzenie stron www, Strona główna Milo24com
Pokaż klientom że Twoja Firma istnieje. Zdobywaj nowych klientów, i komunikuj się z nimi. Informuj o swoich osiągnięciach i zbieraj referencje. Musisz wiedzieć o jednym,. NAWET JEŻELI BĘDZIESZ POSIADAŁ NAJLEPSZY PRODUKT NA RYNKU, NIE SPRZEDASZ GO JEŻELI NIKT SIĘ O TYM NIE DOWIE I NIE ZAPRAGNIE GO KUPIĆ. Kluczem do wszystkiego jest właśnie IDENTYFIKACJA WIZUALNA. OK, klienci Cię znaleźli, ubiłeś interes (albo nie),. BUDOWANIE MARKI I WIARYGODNOŚCI. Pamiętaj, klient wybierze Twoją Firmę jeżeli będzie widzi...
milo24.ru
Зарегистрирован в REG.RU. Вход в личный кабинет на сайте REG.RU. Создайте свой сайт при помощи наших сервисов:. Готовые сайты на популярных CMS. Конструкторы корпоративных и сайтов визиток: REG.RU, Wix, Ecwid. Выберите хостинг в соответствии с требованиями по нагрузке для вашего проекта:. Хостинг сайтов для Linux и Windows. На @ milo24.ru. Подключите фамильную или корпоративную почту на вашем домене:. Яндекс.Почта для домена. Gmail, GoogleApps для домена. Выставить домен на продажу.
SOCIAL ENGAGEMENT