Does anyone know where i can buy a FUD good crypter that last FUD for 1 to 2 week i am looking to purchase one but everyone that i have purchased so isnt fud or it only last one to 2 days please if you know of a good place let me know asap thank you
About John Medel
- Location: Los Angeles, California
John Medel's Latest Posts
Hi I just purchase a Windows 2008 server and add a new administrator user and I have also disable the main administrator....and I have a firewall and everything but the ports opened that are open on my server are of concern to me...when I first did a nmap scan there were only ...more
Hi I have recently bought a window vps that needs a vnc client in order to login into and I have been have the hardest time finding a good vnc client for Ubuntu I have tried remmina, but I have absolutely no control over the mouse its like an extend mouse and it is very hard t ...more
hi I am having a really hard time finding a tutorial or a guide explaining how to encrypt my drives on dual boot I will be using window 10 and arch Linux but I don't know if I need to encrypt windows first and than after encrypt Linux??? or do I have encrypt windows and than ...more
I heard that its is possible to use a vps server as a vpn and use it to get connect backs from a payload if so can somenone explain how to do so please??
I put kaiten.c on my home router as a a test and it ran fine and everything but like 20 mins later it timed out and the bot quit.... could this be cause of the routers firewall? and if so is it possible to cyrpt kaiten.c to make it undetectable and cross compile it??
Hi The below code is a c bot that connect to an irc channel however the irc server is password protected, I am exceptionally ok at python , but when I come to C I have a little bit of trouble I just need to no where I have to change the code in order for the bot to connect to ...more
Hi, I have been all over google looking for a good tutorial or a guide explaining how to build a mip cross compiler so I can cross compile a C program and use it on mips, this is for( ok, I always get this mixed up) I think mips is little endian and mispel is big endian, but ...more
OK, so I understand that router are linux embedded devices, but the commands are different cause they use mips, mipsel, arm, etc.....and I have been on google trying to research if I could learn the command line for theses different types of routers....I guess more specifical ...more
when writing custom shells say like in python is there still a need to port forward when using these shells over the WAN or is there a way around this like say using no-ip??
does anyone one no how to root a router a home router that runs busybox with read only privileges?? how do I go from read only to root?? i no you would have to get root exploit on there, but I don't understand how? i mean wget but than i would have to compile it which seems li ...more
Hi the title kind of explains my question? I don't really understand and I haven't been able to find good info if any at all on google about from going to a compromise home router to compormising all systems on the network.....what are the steps in making this possible? I know ...more
if i have a portforwarding vpn can I use it for metasploit over wan or anything else over like connecting to a php shell??? or do I still need a router to portforward????
Does anyone know of a good mass ssh scanner/bruteforcer I have looked all over google and even downloaded a few off of github but can't get any of them to work... ...more
Hi, I am running Kali Linux and I am having trouble install the third party module pywin32: root@computer:~# cd Desktop root@computer:~/Desktop# cd pywin32-216 root@computer:~/Desktop/pywin32-216# ls adodbapi MANIFEST.in pywin32postinstall.py setup3.py AutoDuck PKG-INFO pywin3 ...more
If I write a keylogger in python and it is meant to run on a windows computer will it still run on a imac computer....I am stuck between almost being positive that it won't but I am not sure....and if not what modules will I need to make it run on a mac computer??? thank you
Does anyone know of a webpage where I can get a free virtual machine image of an Imac computer??? I know that modern.ie gives you a free virtual machines of windows (all windows)....But I don't know where I can get an image of a Imac virtual machine....any help is appreciated ...more
If I where to program a bot in python and I make a installer or executable will it still run on a windows computer that doesn't have python installed on it??
hi, I have been reading tutorials on programming in C most of the website I have found have been from google (tutorialspoint.com) and some other however I'm so confused on everything I am reading about everything so far I mean I understand a few things....I guess my question i ...more
can someone clear this up for me I don't understand when I scan my site with wpscan and it say a certain plugin is vulnerable I dunno say for example woocommerce - v2.3.13 how would you use this vulnerability if you don't actually have access to to it say for example http://si ...more
is there anyone out there that can direct me in some really good tutorials on coding botnets in c++ i am learning to code in c++ and i want to learn how to code a botnet for learn purposes i know of the san intitute build your own botnet but what i dont understand is all the c ...more
ok so i have 3 hashes here let me show you $P$Brl/kCcFav3Qc07nQcrOkMBwI3QG4k1 $P$B6Fzblw/uq3gIS6hQ.ymn1qxCmmbHn/ $P$B32lixL4Rr5/hovSOczIabkKfJYu1X0 all are wordpress/joomla at least i think/kind of sure..... i tried to run them though hashcat with the following command hashca ...more
OK so I have the source code to setup up the Zeus Botnet, but when setting up the C & C server I think its missing php-mbstring which I have no idea how to code a php-mbstring, from what I have read and please correct me if I am wrong the php-mbstring, but I think it is for wh ...more
when setting up a rat to hack over the internet so WAN is it still necessary to port forward if the victim downloads a client that is sent to them..I was always under the impression that if a client to them and they download it portforwarding isn't necessary... Question # 2 i ...more
hi how it going everyone I just bought a linksys n300 AE1200 wireless network adapter but I am having a very difficult time installing it on kali linux please if you have any suggestions please help thank you
can someone please direct me in a good place to identify hashes beside hash-identifier that comes with kali linux I have been coming across a couple of hashes that I can't identify examples: yWQkrXllVmb7xKcWvXBOAZsU0mu5NQzJlvJjbEklsYo= ftzO7ZQYQBXvJZVDDU0wUMsRLD1xTzvqz7PaQzY/ ...more
Ah.... I keep trying to upload a picture but it won't let me anyway I guess I will have to try to explain this in the best way possible I am trying to upload a php shell.....I have found the place to do so /fckeditor/editor/filemanager/browser/default/frmupload.html .......but ...more
when uploading a php shell to a website to gain root access do I first need to set my shell up on a free web hosting page before I can upload the file to a website??? does this make sense??? sorry still trying to figure it out my self
HI everyone I have a mysql username and password everytime I try to connect I get this why ?? ERROR 1130 (HY000): Host '126.96.36.199' is not allowed to connect to this MySQL server and is there another way around this??
can someone please explain how to perform a mitm attack on a terminal server I know how to perform a MITM attack, but not on a terminal server
Can someone please tell me what I am doing wrong I have been messing with this for a little bit now and for some reason I can't figure it out hash-identifier say its a MySQL 160bit - SHA-1(SHA-1($pass))....the hash has a star in it and without the star it says SHA-1MySQL5 - SH ...more
ok, so I finally purchased a vpn with torguard.com and set it up on my kali linux. Eveything works great!!! By the way (student2014) give you 30% off for a quarterly vpn I paid $12.99 and the original price was $20.00 plus I have a month free of 200 + proxies....anyways back t ...more
if i buy a vpn and use it on kali linux does all of kali linux traffic scans and what not go through that vpn??? i will be using torguard
I just spent the las couple of hours trying to install codeblocks IDE for kali linux 2.0 when I didn't know was how much trouble it would be anyway for those of you who are wondering the same thing heres a link I know its in spanish but all you have to do is add the repositori ...more
Does anyone no how to port forward on a mobile hotspot so I can get a successful meterpreter session????
hi again, Ok, so I usually use my mobile phones hot spot for internet connection, since I can't afford internet, but so far I haven't been a been able to get a successful meterpreter session is it possible that I some how have to port forward some how or may be connect my cell ...more
ok so im trying to run the simple hello world! In kali linux, but when I try to open it, it say that the program is a directory heres a few picture so i can know what i am doing wrong...... Theres the file so you can see it on my desktop a.out now this is the file thats insid ...more
hi im trying to learn how to hack i no alot of ppl get on here and say this and arent dedicated or just have a very hard time picking this stuff up im a very fast learner i have kali linux install on my laptop i have already accomplished a few hacks and i read and study and tr ...more
ok im using my phones hotspot for internet i connect my laptop to my hotspot and i when i try to use metaploit i keep getting an exploit was complete but no session so it has to be the way i have my lhost set up and its fustrating as hell cause i have very vulnerable victims b ...more
ok so i have a couple of computers that have there rdp port open but they have a sonicwall so every time i try to crack the login passwords i get locked out and when i try to send a shell it gets denied can someone plz guide me in the right direction on cracking or getting a s ...more