Home
Forums
New posts
Search forums
What's new
New posts
New profile posts
Latest activity
Members
Current visitors
New profile posts
Search profile posts
Log in
Register
What's new
Search
Search
Search titles only
By:
New posts
Search forums
Menu
Log in
Register
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Home
Forums
CARDING & HACKING
HOSTING & BOTNET
Steal other people's logs from the stealer
Message
<blockquote data-quote="Ghosthunter" data-source="post: 602" data-attributes="member: 6"><p>Hello hackers, today I will tell you about the method that I have been using for a long time.</p><p></p><p><img src="http://bm.img.com.ua/berlin/storage/orig/6/33/3f5188c2bdd775b9969a00d74790d336.jpg" alt="3f5188c2bdd775b9969a00d74790d336.jpg" class="fr-fic fr-dii fr-draggable " style="" /></p><p>So, let's copy a couple of logs step by step, and then analyze what has been written and think about how to avoid such unpleasant incidents.</p><p></p><p><strong>Step 1 - Go to the tracker</strong></p><p></p><p>We go to any gate tracker known to us, whether it's VT or a more specialized resource</p><p></p><p>In my case, it will be the good old CyberCrime Tracker</p><p></p><p>We drive "<strong>azor</strong>" into the search by the name of the software , or something like that</p><p></p><p>We often get a rather extensive list of such</p><p></p><p><img src="https://i.imgur.com/AtTpiMH.png" alt="AtTpiMH.png" class="fr-fic fr-dii fr-draggable " style="" /></p><p><strong>Step 2 - removing the logs</strong></p><p></p><p>We go to any address from the list, and if he is a worker should see some kind of picture</p><p></p><p><img src="https://i.imgur.com/hKVOI52.png" alt="hKVOI52.png" class="fr-fic fr-dii fr-draggable " style="" /></p><p></p><p>By default, the gate stores logs in the form of archives in the files folder, the index of which is VERY often not covered by the default settings of the web server (yes, the cybercriminal mamma loves the default)</p><p></p><p>You can use this, just go to <strong>http: // gateway address / files</strong>, and we see the following amusing picture:</p><p></p><p><img src="https://i.imgur.com/P6i2Dq3.png" alt="P6i2Dq3.png" class="fr-fic fr-dii fr-draggable " style="" /></p><p>Download any log and make sure that we are on the right track</p><p></p><p><img src="https://i.imgur.com/MzsTjEh.png" alt="MzsTjEh.png" class="fr-fic fr-dii fr-draggable " style="" /></p><p></p><p><strong>Instead of a conclusion</strong></p><p></p><p>This feature is not new, Azor admins are easily googled and this method of log removal is known to many. Also, to be fair - in about a third of the gates, the index is still closed.</p><p></p><p>How to protect yourself?</p><p></p><p>Place an empty index.html in the files folder in the standard admin distribution.</p><p></p><p>P.S. In new versions of azor, it seems to be fixed, look for old panels.</p></blockquote><p></p>
[QUOTE="Ghosthunter, post: 602, member: 6"] Hello hackers, today I will tell you about the method that I have been using for a long time. [IMG alt="3f5188c2bdd775b9969a00d74790d336.jpg"]http://bm.img.com.ua/berlin/storage/orig/6/33/3f5188c2bdd775b9969a00d74790d336.jpg[/IMG] So, let's copy a couple of logs step by step, and then analyze what has been written and think about how to avoid such unpleasant incidents. [B]Step 1 - Go to the tracker[/B] We go to any gate tracker known to us, whether it's VT or a more specialized resource In my case, it will be the good old CyberCrime Tracker We drive "[B]azor[/B]" into the search by the name of the software , or something like that We often get a rather extensive list of such [IMG alt="AtTpiMH.png"]https://i.imgur.com/AtTpiMH.png[/IMG] [B]Step 2 - removing the logs[/B] We go to any address from the list, and if he is a worker should see some kind of picture [IMG alt="hKVOI52.png"]https://i.imgur.com/hKVOI52.png[/IMG] By default, the gate stores logs in the form of archives in the files folder, the index of which is VERY often not covered by the default settings of the web server (yes, the cybercriminal mamma loves the default) You can use this, just go to [B]http: // gateway address / files[/B], and we see the following amusing picture: [IMG alt="P6i2Dq3.png"]https://i.imgur.com/P6i2Dq3.png[/IMG] Download any log and make sure that we are on the right track [IMG alt="MzsTjEh.png"]https://i.imgur.com/MzsTjEh.png[/IMG] [B]Instead of a conclusion[/B] This feature is not new, Azor admins are easily googled and this method of log removal is known to many. Also, to be fair - in about a third of the gates, the index is still closed. How to protect yourself? Place an empty index.html in the files folder in the standard admin distribution. P.S. In new versions of azor, it seems to be fixed, look for old panels. [/QUOTE]
Name
Verification
Post reply
Home
Forums
CARDING & HACKING
HOSTING & BOTNET
Steal other people's logs from the stealer
Top