Get Mystery Box with random crypto!

🎩BLACK HAT🎩

Logo of telegram channel data_brokers — 🎩BLACK HAT🎩 B
Logo of telegram channel data_brokers — 🎩BLACK HAT🎩
Channel address: @data_brokers
Categories: Education
Language: English
Subscribers: 5.36K
Description from channel

SINCE 2019
Official Handel : @queen_inc
Backup : https://t.me/ 2pBKAJt5TqZjNDU1
preferred
yalelodge.cm - cc shop
allworld.cards -cc shop
orderswq6q7kqghs.onion - rdp/servers
orders.bz

Ratings & Reviews

3.00

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

0

4 stars

1

3 stars

1

2 stars

1

1 stars

0


The latest Messages 11

2021-11-21 21:11:06
201 views18:11
Open / Comment
2021-11-17 20:00:31
Automatic scanning for SSL vulnerability

HeartBleed, CCS Injection, SSLv3 POODLE, FREAK ... etc

Support vulnerability:
- CVE-2007-1858] Anonymous Cipher
- CVE-2012-4929] CRIME (SPDY)
- CVE-2014-0160] CCS Injection
- CVE-2014-0224] HeartBleed
- CVE-2014-3566] SSLv3 POODLE
- CVE-2015-0204] FREAK Attack
- CVE-2015-4000] LOGJAM Attack
- CVE-2016-0800] SSLv2 DROWN

Installation:
apt-get install openssl
git clone https://github.com/hahwul/a2sv.git
cd a2sv
pip2 install argparse
pip2 install netaddr

Usage:
python2 a2sv.py -h

@data_brokers
474 views17:00
Open / Comment
2021-11-13 08:06:13
1.1K views05:06
Open / Comment
2021-11-05 07:14:45 Background information:

The files we have received were used scripts by group TeamTNT in their Chimaera campaign. This campaign has been discussed multiple times by various security vendors and researchers.

1. TrendMicro discussed it here: https://www.trendmicro.com/en_us/research/21/c/teamtnt-continues-attack-on-the-cloud--targets-aws-credentials.html

2. PaloAlto Unit42 discussed it here: https://unit42.paloaltonetworks.com/hildegard-malware-teamtnt/

The password: infected
468 views04:14
Open / Comment
2021-10-16 19:37:03 OSEP Exam Leak

Electrician (Scada), ACBank, Betapharma, Labs
1.1K views16:37
Open / Comment
2021-10-15 21:42:39 Active Directory Attacks.



• It has been 22 years since the creation of the Active Directory directory service. During this time, the service has acquired functionality, protocols, and various clients. But the need to maintain compatibility with a number of legacy clients forces you to have compatibility-oriented default settings. Administrators often do not change them, and this creates a big risk.

* Today I am sharing with you an excellent repository, which contains a huge amount of information, ranging from audit tools, ending with methods and examples for obtaining information, attacks and fixing in #AD.

https://github.com/swisskyrepo/PayloadsAllTheThings
372 views18:42
Open / Comment
2021-10-14 05:40:53 Hacking Kubernetes: Threat-Driven Analysis and Defense.
686 views02:40
Open / Comment
2021-10-14 05:37:16
685 views02:37
Open / Comment