Sunday, April 28, 2019

hacking firefox kereberos

Suppose someone worked for a company that put up an HTTP proxy preventing internet access without password authentication (NTLM, I think). Also suppose that this password rotated on a daily basis, which added very little security, but mostly served to annoy the employees. How would one get started writing a Firefox add-on that automatically entered these rotating passwords?
To clarify: This add-on would not just submit the password; the add-on would programmatically generate it with some knowledge of the password rotation scheme.
This is built into Firefox. Open up about:config, search for 'ntlm'
The setting you're looking for is called network.automatic-ntlm-auth.trusted-uris and accepts a comma-space delimited list of your proxy server uris.
This will make FireFox automatically send hashed copies of your windows password to the proxy, which is disabled by default for obvious reasons. IE can do this automatically because it can use security zones to figure out whether a proxy server is trusted or not.
STACKOVERFLOW.COM
Suppose someone worked for a company that put up an HTTP proxy preventing internet access without password authentication (NTLM, I think). Also…

Learn Cybersecurity: Firefox Hacking Addons

Saturday, April 27, 2019

snowden hipotesis my folder

if wireless clients and wireless distribution systems cache PMKs between clients and APs, the PMKID can be used when a client roams "back" to an AP that it had been authenticated to previously. This would speed up roaming "back" to an old AP, since the full EAP authentication would not need to take place; the PMK already exists. Just the 4-way handshake would be necessary to generate the PTK
http://giantsnerdwifi.blogspot.com/2016/

robbering folder...hacking

Get-WinEvent with non-administrative user

This gives our support people instant access to the latest history without any elevated privileges....

$event = Get-WinEvent -FilterHashtable @{LogName='Security';Id=4740} -MaxEvents 1



...you could see. the hashpi file offline..between a period of time...
Get-WinEvent -path "C:\temp\*Security*.evtx" -max 10 -FilterHashtable @{Providername="Microsoft-Windows-Security-Auditing"; id=4740; StartTime=1/7/2013; EndTime=1/8/2013}
But powershell return error:
Get-WinEvent : Parameter set cannot be resolved using the specified named parameters.
answer was :" put quotes around them or explicitly define them as DateTime."

robbering folder...ARP attack inside the network

talking about DMZ...and back to Snowden...
To display the contents of the ARP cache, enter the following command ----------at any-------- CLI level.
explanation for previouse understanding where do I want to go:
If Computer A wants to contact Computer B (((( INSIDE THE SAME NETWORK))))within the same network, it must first determine the appropriate MAC address for its IP address. This uses the Address Resolution Protocol (ARP), a network protocol that operates according to the request response scheme.
After searching for the appropriate MAC address, Computer A sends a broadcast request (or ARP request) to all devices on the network. This request contains the following information:
A computer with the MAC address xx-xx-xx-xx-xx-xx and the IP address yyy.yyy.yyy.yyy would like to get in contact with a computer with the IP address zzz.zzz.zzz.zzz and requires the appropriate MAC address.
The ARP request is received by all computers in the LAN. In order to prevent an ARP request from being submitted prior to the sending of each data packet, every computer in the network performs a local table, called the ARP cache. In these tables, all known MAC addresses are temporarily stored along with their matching IP addresses.
DOCS.RUCKUSWIRELESS.COM
JavaScript must be enabled in order to use this site.Please enable JavaScript in your browser and refresh the page. Displaying ARP entries You can display the ARP cache and the static ARP table. The ARP cache contains entries for devices attached to the Layer 3 switch. The static ARP table contains....

(robbering folder)

ASKUBUNTU.COM
As far as I know the following command is supposed to make me root: su -i Nevertheless, when I type it in Ubuntu 17.04 Zesty Zapus, I get…

Friday, April 26, 2019

Thursday, April 25, 2019

voilá...(ATM's)

So...next is..."we" actually know that ATM's DCI network are based on DSL connection, are based on a specific mac address, called VCI. Let's imagine, we "splitter" the fiber cable, and use this very special...app...meet

TAMPERMONKEY.PT.DOWNLOADASTRO.COM
Soft Page Meta Description Tampermonkey for Chrome Genericom Gerenciar, editar, ativar e desativar userscripts em navegadores baseados em Blink 3.9

ATM's (robbering folder)

let's digg here the KDIAG tool, on a USB GPRS modem...karpersky call its "black box" ...it looks so stupid access, that why don't "we" do it all the time?....well, you get this master ATM connectors...we are in...you don't ...and the cable plug is highly protected...
BMOTORSPORTS.COM
Ballenger Motorsports Deutsch DTM / ATM Master Connector Kit w/ Steel Case (CONN-100944) for only $249.99!

Wednesday, April 24, 2019

access trought another location...(robbering folder)

About this website
EBAY.COM
9/125um Singlemode 1310/1550nm 50/50 coupling ratio 2mm FC/UPC Fiber Optic FBT Splitter/Coupler. 1 Pcs Fiber Optic Wire Stripper Ftth Fiber Tools Fixed-length Cutter New. Fiber Optic Stripper Stripping Tool FTTH Cable Piler Wire Cut Tool.

Portugal Spain France Switerzland Energy Outage Blackout 2025 ( Clear a Sabotage, right here in this interconnector subsea cable, its was not a physical cble cut, definetly a CYBER ATTACK)

  https://indianexpress.com/article/business/spain-portugal-power-outage-interconnector-reasons-grid-operators-india-9971636/lite/