Jump to content
Under Attack Mode

we are under attack,
For 2 days we have been the target of DDOS attack by small ScriptKiddies.
We are deploying a solution to solve the problem
Please stay tunned !


If you encounter problems with the new theme please inform the staff

@AdminSec   @mister     @SC_z     @Naylor

Search In
  • More options...
Find results that contain...
Find results in...

Microsoft Releases Patch for Wormable Bug That Threatens Corporate LANs

Microsoft Releases Patch for Wormable Bug That Threatens Corporate LANs
Read more...

Beware of 'Coronavirus Maps' – It's a malware infecting PCs to steal passwords

Beware of 'Coronavirus Maps' – It's a malware infecting PCs to steal passwords
Read more...

Try challenges

Register & Join The Game

Break It

CEH V10

Proposal Name : Document Version
Document Release Date :
: CEH v10: EC-Council Certified Ethical
Hacker Complete Training Guide with
Practice Labs
1.0
14-May-18
Reference : Certified Ethical Hacking Workbook
View file...

Welcome to Exploit Zone

Become a ninja in the shadow !

News
  • Welcome To Exploit Zone
  • The kingdom of knowledge sharing in hacking
  • New Updates ! Stay Tunned !
  • Share your knowledge here !
  • unlash your power on our challenges !
  • Become a ninja in the Shadow !

AdminSec

Administrators 
  • Content Count

    243
  • Joined

  • Last visited

  • Days Won

    47
  • Points

    183,811 [ Donate ]

Profile Song

AdminSec last won the day on March 27

AdminSec had the most liked content!

Community Reputation

91 Excellent

8 Followers

About AdminSec

  • Rank
    Developer by day, Ninja by night

Register Information

  • Birth date
    11/15/85
  • Experience in years
    10
  • Your ambitions
    Create the perfect community
  • Your Favorite domains
    Pentest

Recent Profile Visitors

5462 profile views
  1. AdminSec

  2. AdminSec

  3. AdminSec

  4. AdminSec

  5. AdminSec

  6. Introduction SNMP - Simple Network Management Protocol The goal is to enumerate the user and peripheral accounts in a system using SNMP SNMP consists of two elements: 1. The manager 2. The agent SNMP contains two elements that interest us: 1. Read Community String 2. Read / Write Community String Operating : On each machine have installed an agent that stoic information in a nome MIB database The managers are responsible for questioning the agents and Manages the hatches Browser MIB / Platform Administration tools Requests / Responses / Alerts Management Information Base (MIB) [Hidden Content] Exploitation [Hidden Content] Enumeration [Hidden Content]
  7. The enumeration will allow an attacker to: • Identify valid user accounts • Shared resources • Networks Applications Methodology 1. Find the Ips address range 2. Calculate the network mask 3. Discovery of active hosts 4. Port Scanning 5. NetBIOS enumeration 6. SNMP enumeration 7. LDAP listing 8. SMTP enumeration 9. DNS enumeration 10. Reporting Port to List : [Hidden Content] More informations will be update later
  8. Hello, This time i will share with you some tehcnique to delete your tracks When you gain access to a systeme, before leave you need to delete all logs for avoid recon So, some person want to delete all logs for the system, but it's really working ? No, When you delete a log file, it's not really deleted. Because when you delete a file it's not really deleted but only the way to find him in the disk, A system administrator for example linux can determine which files have been deleted and it is possible to recover, with for example the command sudo above all -w -i / dev / sda1 -o / Recup So, How i can really delete this ? A good technique to avoid recovery of the log file is to shred the file ! How to use it ? Simply use $ shred /path/of/file shred is a unix command that allows you to permanently delete the content of a file (or partition) without the possibility of recovery. To get there, there are repetitive and random writes in the file. Why it's better than the old rm ? As I said above, it is more efficient to do this than to delete the data, because even when it is deleted from the index it is still possible to find this information. The safe and effective way is to rewrite data over that to erase
×
×
  • Create New...