You just downloaded a free php logger, conveniently put at your disposal by a trustful member ?
- You just bought a stealer, a crypter or a booter from someone who seems to have a lot of reputation ?
- You just downloaded random programs supposed to help you hack your way into a website, a game, a computer ?
Chances are that you'll end up getting infected. Loggers, booters, stealers, crypters, or whatever shit you enjoy downloading, usually have a builder that you use to construct your little virus.
Most people trust others way too easily, and I can tell you that half of the guys in the marketplace who sell products and have Uber/Leet membership and high reputation are most likely selling builders that are infected.
This is because they have advanced crypters that allow them to infect their customers who are too trusting, or because they are selling a program for someone else and they have no knowledge and no control of what they're selling to others.
And sometimes you'll go and test your programs on antivirus detecting websites such as virustotal or viruscan, etc. You'll be happy because the program is 100% FUD, chances are that this FUD also applies to your system and you will never know if you're infected.
Some of you use virtual machines, some of you use sandboxie.
This is all very nice, but a VM is still on your machine and there are bypasses to that, sandboxie is also on your machine and again there are bypasses to that.
After this little introduction, I present to you this awesome website that everyone should know, everyone should bookmark it and everyone should pass it around :
http://www.threatexpert.com/
This is not a new website but unfortunately so few people only know it.
This is not something secret, but again ... it's ignored by too many people.
This website allows you to upload an executable or even a script to their servers. On their servers, virtual machines will execute the file and will give you a FULL diagnostic of EVERY action taken by the file. Every new file it creates in every directory, every single key it modifies in the registry.
It will also give you advice on what each file behavior means.
I urge everyone to use this website. Stop with all the bullshit antivirus services that go around. And stop thinking that because someone is Uber or Leet and has 200 rep, you can trust them.
Anyone in a position where they are distributing executables to 500 people a week, on a hacking website and with FUD abilities, will be tempted to capitalize more on this at one point. Especially if he has access to a good enough worm to infect the 4000 targets of each of his 500 primary targets. I'll let you do the maths.
Remember :
http://www.threatexpert.com/
Saturday, May 4, 2013
9:05 PM
SL4ID3R
No comments
Related Posts:
How To be Real Anonymous - Anti Forensic Guide -- Hello, today I am going to be teaching you anti-forensics. Anti-forensics is the art of leaving no trace on your computer, it is combating common forensic tools in preventing any penetration for forensic tests on your… Read More
How to Bypass Windows Authentication Guys you must be knowing how to break the password of Windows by using some Live OS. But using Live OS is bit complicated and sometimes they take a lot of time to crack a password. So in this tutorial you will see how to… Read More
XSS Tutorial Complete[ultimate] Today I Am Going To Introduce You To The Main Common Code Injection Cross Site Scripting So Let's Have Some Talks About XSS Stands For Cross Site Scripting It's The Main Code Injection Through Which An Attacker Can Gain … Read More
Lock/Unlock Computer With Pendrive First, what is “syskey”? SYSKEY is a utility that encrypts the hashed password information in a SAM database in a Windows system using a 128-bit encryption key. SYSKEY wa… Read More
Burp Suite 5: Sequencer | Comparer | Decoder Burp Sequencer The Burp Sequencer tool is used to check for the extent of randomness in the session tokens generated by the Web application. Brute force attacks enumerate every possible combination for gaining … Read More
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment