Search results

  1. Ghosthunter

    RedLine Stealer distributed via NPM — a new threat for developers?

    Greetings, friends. Not so long ago, attackers started placing malicious packages in the PyPI repository, disguising various malicious programs as legal components. This campaign has not yet been stopped, and the number of affected developers is currently unknown for sure. This was not the end...
  2. Ghosthunter

    Pirated software and its consequences: an analysis of the oldest and simplest viral foothold on the Internet

    6. Installing additional malware This step is mandatory and is always performed. The following line in the configuration file is responsible for this process: ldr_1:http://93.184.220.29/9/U4N7B56F5K5A0L4L4T5/8465766547424604901.bin|%TEMP%\|exe The choice of payload loaded by the malware is...
  3. Ghosthunter

    Pirated software and its consequences: an analysis of the oldest and simplest viral foothold on the Internet

    mozglue.dll msvcp140.dll nss3.dll softokn3.dll vcruntime140.dll msvcp140.dll It is also noteworthy that the downloaded DLL files will be saved in a separate folder created by the malware. It is located at the following path: C:\ProgramData\local\dekddss\hyper\v\ As you can see, the file is...
  4. Ghosthunter

    Pirated software and its consequences: an analysis of the oldest and simplest viral foothold on the Internet

    And the information here is just identical to what we saw when analyzing Raccoon, so much so that the specified compile time is the same. (This leads me to believe that the author/authors of Raccoon and Vidar are either collaborating or the same people.) In addition, the sample is a PE file, and...
  5. Ghosthunter

    Pirated software and its consequences: an analysis of the oldest and simplest viral foothold on the Internet

    For dynamic analysis, we already have the following setup of utilities (all of them are publicly available): ProcessHacker — simple and tasteful, let's watch how the virus interacts with другими.dll and the system. TCPView is a utility that tracks outgoing TCP connections. Regshot is a very...
  6. Ghosthunter

    Pirated software and its consequences: an analysis of the oldest and simplest viral foothold on the Internet

    2. Deobfuscate values and check communication with the command server Then the malware starts deobfuscating (decrypting) the strings used to configure communication with the C&C host. At first glance, the incomprehensible character sets are strings encrypted using the RC4 stream cipher, which...
  7. Ghosthunter

    Pirated software and its consequences: an analysis of the oldest and simplest viral foothold on the Internet

    The spread of virus software on the network is becoming more and more sophisticated every year, which only attackers will not come up with to "infect" your device: they use vulnerabilities, phishing, USB-jacking. What I've listed is just a small part of what you should be wary of. What is worth...
  8. Ghosthunter

    Venator Red

    Venator Red 1.0 - Browser for OSINT on the DarkNet It's been getting more and more relevant lately. For many, the DarkNet was and remains something mystical and closed, many people think that it is something complex and incomprehensible. Venator Red allows you to get acquainted with the most...
  9. Ghosthunter

    HOW TO REFUND AMAZON FOR BEGINNERS [EASY]

    Before Starting the Social Engineering : 1. Log in to Amazon 2. Click 'Help' 3. Scroll down to 'Need more Help?' 4. Click 'What can we Help you with' and select the Order you want refunded 5. Click Start Chatting. An Amazon Rep will ask you to confirm the name or Order number and after...
  10. Ghosthunter

    Steps to withdraw money from stealth PayPal account

    Steps to withdraw money from stealth PayPal account There are basically 2 ways to withdraw money from your stealth PayPal—(a) send the money to someone with a working PayPal account or (b) verify your PayPal account and use a freelancing website to send the money. a) Create freelancer accounts...
  11. Ghosthunter

    7 top hacking tools and software's 2023

    1) Ettercap: Ettercap is an ethical hacking tool. It supports active and passive dissection includes features for network and host analysis. Features: It is one of the best hacker tools that supports active and passive dissection of many protocols Feature of ARP poisoning to sniff on a...
  12. Ghosthunter

    5 Best Ethical Hacking Tools & Software for Hackers

    What are Hacking Tools? Hacking Tools are computer programs and scripts that help you find and exploit weaknesses in computer systems, web applications, servers and networks. There are a variety of such tools available in the market. Users can easily download hack tools for ethical hacking. Some...
  13. Ghosthunter

    How to HACK a Credit Card!!!

    Here will be explained all methods used to hack credit cards and bank accounts with lots of $$ in it. Now I'm sure most of you think that this is fake or scam, but I want to just tell you that this is real and the only working method (in my opinion) to hack a credit card and make your wish come...
  14. Ghosthunter

    Tutorial Western Union & MoneyGram enjoy!

    I DECIDED TO SHARE WESTERN UNION , MONEY GRAM TUTORIAL !! Difference b/w Western union & Money gram Both are same as they are payment processor site in short you can send money and received money with those 2 website which are listed here 1) westernunion.com 2) moneygram.com Now start with...
  15. Ghosthunter

    How to build and establish credit: The full breakdown

    At a glance: What you need to build credit for the first time How to apply for your first credit card Tips for building your credit score Getting a personal loan if you have no credit history Summary of establishing credit Establishing credit can seem like a catch-22: If you don't already...
  16. Ghosthunter

    How to bypass authentication on Windows Server 2008 R2

    In this article we will be looking at how easy it is to bypass authentication and reset the administrator password on a Windows Server 2008 R2 installation. This technique requires us to have physical access to the machine that is running the Windows server or have access to the management...
  17. Ghosthunter

    Best websites for carding gift cards,amazon 2023

    Website for carding In this article, however, I will expose ONLY the best CC sites for carding. The sections below cover the best carding websites. A cardable website is a site that does not use the MasterCard or Visa card One-Time-Password (OTP) technology to authenticate transactions. It also...
  18. Ghosthunter

    Tutorial Carding with DUMPS

    Get into The Correct Frame Of Mind: Remember you are the Cardholder this is your card and you will treat it as such. Repeat 50 times then say back words 25 times, lol, Just kidding but you are who you say you are. This is your card don’t be scared this is your card. Who’s Your Card? Also a good...
  19. Ghosthunter

    Tutorial Carding with DUMPS

    What do I need for real carding? This is a very good question you will need some cash. And the following will be helpful but not required at first. You should get these items at some point, but you don’t need them right away. And I will tell you why in next section. Computer/laptop is best, as...
  20. Ghosthunter

    Intercepting Android SSL Tutorial

    One of the most important things in android application penetration testing is “Capturing Android application’s HTTPS traffic”. Reading HTTP traffic generated by android apps is some what easier than reading HTTPS traffic. Recently some people asked me about “how to get Facebook for Android...
Top