Skip to main content

Posts

Showing posts from June, 2017

Server Rooting With NGROK(Web Hacking) Best Tutorial

SUBSCRIBE LULZSEC INDIA New Security Comes with New vulnerability SERVER ROOTING WITH NGROK 2017 Hie  very welcome to Lulzsec blog  Today we will talk about ROOTING of server using NGROK   ============================================ Dedicated to my indian friends who has problem with rooting the server  Many friends has requested me to make this tutorial :) so today we are here .. Most welcome to Hexking,  jama7 , R00t Destroyer , gaurav , Red Hex , Dreagon , vampire kid and all the supporters of lulzsec india  Lets start ... =========================================== * SEE MY LAST POST ABOUT NGROK THEN CONTINUE WITH THIS POST * Link here    .. For that few things are required  ______________________ | 1) Ngrok                           |  | 2) Netcat                           | | 3) webshell on server     | | 4) Root exploit                 | --------------------------------- We can use any shell , if you dont have one download it from Github , I suggest you t

Backconnect Without Port forwarding With NG-ROCK for Hacking and Cracking:)

LULZSEC INDIA New Security Comes with New vulnerability - LulzSec india MORE… June 27, 2017 BACKCONNECT WITHOUT PORT FORWADING USING NGROK Hie.. very welcome to Lulzsec blog  Today we will talk about back connect using ngrok  ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Dedicated to my indian friends who has problem with there back connect to the server  all port forwarding solution is ngrok Many friends has requested me to make this tutorial :) so today we are here .. Most welcome to Hexking,  jama7 , R00t Destroyer , gaurav , Red Hex , Dreagon and all the supporters of lulzsec india  Lets start ... _________________________________________________________________________________ First of all you need to register on the site (  https://dashboard.ngrok.com/user/login  )  using Gmail or github account it is very easy ... 😄 Then after that go to the main page you can download the tool according to your system requirement  (  https://ngrok.com/

Petya New Ransomware like Wannacry(Sensitive)

Petya/Petwrap ransomware Affected countries: UK, Ukraine, India, the Netherlands, Spain, Denmark, and others ransomware, Petya does not encrypt files on a targeted system one by one. Affected Businesses: Maersk, an international logistics company, has also confined on Twitter that the latest Petya attacks have shut down its IT systems at multiple locations and business units. "We can confirm that Maersk IT systems are down across multiple sites and business units. We are currently asserting the situation. The safety of our employees, our operations and customers' business is our top priority. We will update when we have more information," the company said. The ransomware also impacts multiple workstations at Ukrainian branch's mining company Evraz. The most severe damages reported by Ukranian businesses also include compromised systems at Ukraine's local metro, and Kiev's Boryspil Airport. Affected Telecommunication Industry: Three Ukrainian telecommunicatio

Speed-up Your PC(remove all malward and junks)

Use following command to speed up your windows PC In run type: 1) tree 2) %temp% Delete the temporary file from it 3)prefetch Press continue Select all and delete file from it 4)cleanmgr >>>>>go to start type msconfig hit enter disable the unwanted start up item

RAT VULNERABILITIES(Hackers got Hacked)

RAT Vulnerabilities Turn Hackers into Victims A small number of Remote Administration Tools have vulnerabilities which can enable attack targets to turn the tables on threat actors. Threat actors using certain Remote Administration Tools (RATs) may find themselves on the receiving end of malware. Newly discovered vulnerabilities in these tools may enable cybercriminals' targets to turn the tables on their attackers and deliver malware. Targeted cyberattacks hit thousands of businesses each year. Oftentimes victims label these threats as "advanced and persistent" to suggest they were inevitable, as though attackers are too sophisticated for defenders to protect themselves. In many cases this is far from the truth, argues Waylon Grange, senior threat researcher at Symantec. Vulnerabilities in multiple hacker tools can be used against threat actors. In looking at APT reports over the years, he says, there is a pattern of common RATS used in multiple campaigns. Frequentl