Home
Search results “Shadow broker smb”
Shadow Brokers, Who Leaked WannaCry SMB Exploit, Are Back With More 0 Days
 
05:03
In typically broken English, the Shadow Brokers (https://goo.gl/tQG5Yi) published a fresh statement (with full of frustration) a few hours ago, promising to release more zero-day bugs and exploits for various desktop and mobile platforms starting from June 2017. -------------------------------------- You can see the playlist: - Breaking news: https://goo.gl/wyqG6i - Life skills: https://goo.gl/UoRrct - SE Optimization: https://goo.gl/XDkc17 *Website: http://ictblogs.net/ *Facebook: http://facebook.com/vnwpages/ *Twitter: https://twitter.com/ictblogsnet
Views: 1736 ICT Blog's
Кибероружие АНБ теперь майнит на вашем компе | EternalBlue и WannaMine
 
10:08
Ссылка на антивирус - http://grizzly-pro.ru/ Кто хочет такие же футболки то вот вам Ali: 1) https://vk.cc/7Giscx 2) https://vk.cc/7GisYS Второй канал - https://goo.gl/K8TYky Паблик - overpublic1: https://vk.com/over_view Заказать рекламу вы можете здесь: https://vk.com/page-79759696_51614096 AliExpress в рамках закона [Bad AliExpress]: https://vk.com/public137607137 Некультурный AliExpress: https://vk.com/public146011210 Инстаграмчик здесь: https://www.instagram.com/overbafer1 Все благодарности присылайте сюда: http://www.donationalerts.ru/r/igorover Мои контакты: vk.com/overbafer1 WiFi радио/глушилка | WiFi Jammer https://vk.cc/6YxHJu https://vk.cc/6YxDUP https://vk.cc/6YxED2 https://vk.cc/6YxH57 https://vk.cc/6YxIP4 https://vk.cc/6YxKiF 1. USB killer - https://vk.cc/6Yw5Gk еще - https://vk.cc/6YwnNi САМОДЕЛЬНЫЙ USB Killer https://vk.com/page-79759696_55293376 2. Копирка домофонных ключей, карточек: мой RFID - https://vk.cc/6YwmPh дешевый RFID - https://vk.cc/6YwafJ 3. Сканер частот - https://vk.cc/6YweKk 4. Рация, довольно мощная, способна заглушить даже сигнализацию, универсальна для любой частоты - https://vk.cc/6YwgLB 5. Мини-камера - https://vk.cc/6YwwRE 6. Магнит для снятия клипс со шмоток в магазине - https://vk.cc/6YwxTz 7. Отмычки с замком - https://vk.cc/6YwyZZ 8. Мощные WiFi адаптеры: Alfa как у меня - https://vk.cc/6YwBmX еще - https://vk.cc/6YwIhh 9. USB tester - https://vk.cc/6YwM0W Нужная вещь, чтобы проверить батарейки и повербанки с AliExpress 11. Дубликатор сим-карт - https://vk.cc/6Yxbez 12. Карманные весы - https://vk.cc/6YxfV3 еще - https://vk.cc/6YxgGN 14. Моя экшн камера - https://vk.cc/6Yxory 15. Биткоин на удачу - https://vk.cc/6YxphN 16. Очки как у меня - https://vk.cc/6Yxwir 18. BAD USB | Rubber Duck | Malduino - https://vk.cc/72aFXm 19. Мини ПК Raspberry Pi 3 - https://vk.cc/72igQH В этом видео пойдет речь: ◘ Скрытый майнинг: найти и уничтожить ◘ Делаем скрытый майнер ◘ Майнинг в браузерах ◘ Проверить компьютер на наличие майнеров ◘ Как избавиться от майнера ◘ Скрытый майнинг и ботнеты ◘ exploit EternalBlue ◘ Новый вирус WannaCry - WannaMine ◘ Универсальный взлом любого компьютера ◘ Kali linux взлом windows Не успели опомниться после видео "Скрытый майнер для школьника и как его удалить" как тут второе видео про скрытый майнинг , так еще и с поддержкой Агентства Национальной Безопасности США , и хакерской группой The Shadow Brokers , и экслойтом EternalBlue. EternalBlue — кодовое имя эксплойта, эксплуатирующего компьютерную уязвимость в Windows-реализации протокола SMB. Абревиатура расшифровывается как Server Message Block - сетевой протокол прикладного уровня для удалённого доступа к файлам, принтерам и другим сетевым ресурсам. К разработке EternalBlue причастно Агентство национальной безопасности (США). Еще летом 2016 года группа хакеров, называющих себя The Shadow Brokers, сумела похитить хакерский инструментарий у специалистов АНБ. Долгое время хакеры тщетно пытались продать попавшее в их руки «кибероружие», но им не удалось провести аукцион или найти прямого покупателя, после чего, в апреле 2017 года, группировка опубликовала украденные данные совершенно бесплатно, в открытом доступе. Уязвимость была использована при распространении вредоносного ПО WannaCry в мае 2017 года, а также при распространении Petya в июне 2017 года. Сейчас данную уязвимость использует малварь WannaMine . Тачка заражается вирусом, который майнит криптовалюту Monero, и таких тачек уже свыше одного миллиона. Вернемся к эксплойту, как он работает? Злоумышленник, сформировав и передав на удалённый узел особым образом подготовленный пакет, способен получить удалённый доступ к системе и запустить на ней произвольный код. Microsoft подтвердила, что уязвимости подвержены все версии Windows, начиная с Windows XP то есть уязвимость оставалась неисправленной на протяжении по крайней мере 16 лет. Уязвимость была устранена в серии обновлений MS17-010. Как вы наверное поняли для использования эксплойта необходим Linux и ряд команд metasploit .
Views: 209183 overbafer1
EternalBlue-DoublePulsar-Metasploit by ElevenPaths (MS17-010) SMB Exploit
 
04:56
Eternal Exploit is an SMB Remote Code Execution, made by the NSA and then leaked by Shadow Broker. https://github.com/ElevenPaths/Eternalblue-Doublepulsar-Metasploit https://github.com/misterch0c/shadowbroker
Views: 8830 Anwar Bigfat
ShadowBroker SMB 0day? - Daily Security Byte
 
02:39
In this short, daily video post, Corey Nachreiner, CISSP and CTO for WatchGuard Technologies, shares the biggest InfoSec story from the day -- often sharing useful security tips where appropriate. Visit our blog post for full details: http://secplicity.org
Views: 645 Corey Nachreiner
Не опубликованный Shadow Brokers имплант DarkPulsar
 
56:42
В 2017 году группа хакеров The Shadow Brokers опубликовала утечку Lost In Translation с фреймворками DanderSpritz и FuzzBunch и плагинами к ним. Одним из плагинов FuzzBunch является имплант DarkPulsar, работающий поверх протокола SMB. В утечку попала только управляющая имплантом утилита, но не сам бэкдор. Докладчики обнаружили недостающий компонент и на презентации раскроют детали внутренней работы DarkPulsar, а также продемонстрируют эксплуатацию зараженной машины (в том числе подключение через FuzzBunch, передачу управления в DanderSpritz и запуск плагинов на стороне жертвы). Любое использование данного материала без прямого разрешения АО «Позитив Текнолоджиз» запрещено.
Smb-Scanner Tool install in Termux (Android)
 
04:53
Assalamu-Alaikum Friends and welcome back to our channel Technical Mujeeb. Telegram group : https://za.gl/IOlE71 Telegram channel : https://za.gl/SZRZIK whatsapp group : https://za.gl/q3MTG0 git clone https://github.com/TechnicalMujeeb/smb-scanner what is Smb vulnerability ? smb - server message block is the transport protocol for sharing ,printer sharing purpose on TCP port number 139 and 445.in april 14 2017 shadow broker hackers group leaked this information named it eternal blue double pulsar.and hackers performs wanna cry attack using this vulnerability in 2017 mainly 445 port is used for attacking. ▶Download Termux Commands App:- http://bit.ly/2ow852E Termux basic to advance commands play list :- http://bit.ly/2AQAW50 Termux Tutorials playlist :- http://bit.ly/2mtBg5n ▶▶▶▶ ⏩CONTACT ME⏪ ON◀◀◀◀ ⏩ Termux tutorials blog:- http://bit.ly/2BNmWhx ⏩ Facebook page : https://goo.gl/QBfe9s ⏩ Twitter : @mujeeb4m ⏩ Google+ : https://goo.gl/HQuTWF ⏩ Technical Mujeeb Blog : https://goo.gl/55dtbm ⏩ YouTube : https://goo.gl/j2F1ih ********************************************** xxxxx[ Disclaimer ]xxxxxx ----------------------------------------- This video is only for #Educational purpose Dont miss use this tutuorial.use this tutorial on your own devices,Networks to check the vulnerabilities and fix it.if you are used this tutorial in any illegal Or Malicious activities i am not responsible for your action,so gays always #staylegal #dolegal. --------------------------------------------------------------------------- ▶ VISIT MY CHANNEL AND WATCH MY OTHER VIDEOS ◀ ⏩ Ngrok install and use (port forwarding without router [WAN] ) in Termux http://bit.ly/2j6N6AJ ⏩ Send READMORE.. message on Whats App http://bit.ly/2ALi4sB ⏩ hakku framework installation in termux http://bit.ly/2jgdjfu ⏩ 14 years old boy made RANSOMEWARE http://bit.ly/2j6l3Be ⏩ A-Rat installation video in Termux no - Root http://bit.ly/2hNa278 ⏩ watch A-Rat full video on Blog : https://goo.gl/1LxftZ ⏩ Ubuntu installation video in Termux no-root http://bit.ly/2Aqtqlz ⏩ sudo installation video in termux (ROOT) http://bit.ly/2Bg5O0j ⏩ netattack tool installation video in Termux http://bit.ly/2hZ1cH4 ⏩ Airgeddon installation in Termux no-root http://bit.ly/2jk92HE ⏩ ubuntu error fixed in Termux http://bit.ly/2zZzrom ⏩ Find valid email adress with Knock Mail in Termux http://bit.ly/2Bggj3B ⏩ create chat server in Termux using NetCat http://bit.ly/2B4TD5q ⏩ metasploit installation and iuseing on termux in hindi urdu https://youtu.be/rax6TxofZtk ⏩ metasploit installing and useing in termux(android)with full processing in (hindi/urdu)   https://youtu.be/FuVjPNzyAAQ ⏩ information gathering on termux angry fuzzer tool ... https://youtu.be/P7iMzsTKTug ⏩ create passwords list/dictionary on termux in hindi/urdu https://youtu.be/cF7651Ms6Kg ⏩ new 60 MB kali linux for android https://youtu.be/v3AsA4oVyFs ⏩ trace android phone using termux android in hindi/urdu https://youtu.be/c8E8pBFasZ8 ⏩ full details about jio hacker in hindi urdu https://youtu.be/KlUubpvdbnE 🔥🔥🔥🔥🔥🔥🔥🔥🔥🔥🔥🔥🔥🔥 NOTE :- All the pictures/Images/music shown / played in this videos belongs to the respected owner not me, And all videos tutorials in my channel is made only for educational Purpose to help others.the video on this channel is not made for harmful activities so friends always stay legal do legal. Thanks and love : #TechnicalMujeeb. ****************************************** thank You,
Views: 2674 Technical Mujeeb
Exploiting [MS17-010] Vulnerbaility using Shadow Broker, NSA Exploit
 
06:28
Exploiting [MS17-010] Vulnerbaility using Shadow Broker, NSA Exploit how to exploit: windows XP, Vista, 7, 8, 8.1, Server 2003 & 2008 R2 and get a Meterpreter Session as NT-System.
Views: 5056 L!ttl3b0y
Shadow Brokers warn more hacks coming
 
06:42
The hacker group that facilitated a worldwide cyberattack is threatening more to come. CNET news reporter Albert Ng joins CBSN with details. Subscribe to the "CBSN" Channel HERE: http://bit.ly/1Re2MgS Watch "CBSN" live HERE: http://cbsn.ws/1PlLpZ7 Follow "CBSN" on Instagram HERE: http://bit.ly/1PO0dkx Like "CBSN" on Facebook HERE: http://on.fb.me/1o3Deb4 Follow "CBSN" on Twitter HERE: http://bit.ly/1V4qhIu Get the latest news and best in original reporting from CBS News delivered to your inbox. Subscribe to newsletters HERE: http://cbsn.ws/1RqHw7T Get your news on the go! Download CBS News mobile apps HERE: http://cbsn.ws/1Xb1WC8 Get new episodes of shows you love across devices the next day, stream local news live, and watch full seasons of CBS fan favorites anytime, anywhere with CBS All Access. Try it free! http://bit.ly/1OQA29B --- CBSN is the first digital streaming news network that will allow Internet-connected consumers to watch live, anchored news coverage on their connected TV and other devices. At launch, the network is available 24/7 and makes all of the resources of CBS News available directly on digital platforms with live, anchored coverage 15 hours each weekday. CBSN. Always On.
Views: 6646 CBS News
Hacking windows pc using Auxiliary smb Login exploit
 
09:44
Hello Friends In this video I will talk about Hacking windows pc using Auxiliary smb Login exploit. ------------------------------------------------------------------------------------- Start Your Hacking Career with my video courses ! ------------------------------------------------------------------------------------- Do Leave A Like And Subscribe For More Awesome Videos Like This Daily ! -------------------------------------------------------------------------------------------------- Support Us :- https://www.paypal.me/AkashChugh Follow us on Website - http://www.techtrick.in Follow us on facebook- https://www.facebook.com/ByAkashChugh/ Follow us on twitter- https://twitter.com/ByAkashChugh Follow us on google+- https://plus.google.com/108843834041933059587 Follow us on Linkedin - https://www.linkedin.com/in/akash-chugh-712045124/ ------------------------------------------------------------------------------------------------ Disclaimer All the tricks and tips that TechTrick provides only for educational purpose. If you choose to use the information in TechTrick to break into computer systems maliciously and without authorization, you are on your own. Neither I (TechTrick Admin) nor anyone else associated with TechTrick shall be liable. We are not responsibe for any issues that caused due to informations provided here. So, Try yourself and see the results. You are not losing anything by trying... We are humans, Mistakes are quite natural. Here on TechTrick also have many mistakes.. ------------------------------------------------------------------------------------------------ Thanks and Love TechTrick! LIKE | COMMENT | SHARE | SUBSCRIBE #AuxiliarySmb #Auxiliarysmblogin #smsloginexploit
Views: 1636 TechTrick
Группировка The Shadow Brokers рассылает новые эксплоиты и угрожает бывшему сотруднику АНБ
 
04:01
Еще в мае 2017 года группа #хакеры The Shadow Brokers, ранее опубликовавшая в открытом доступе хакерский инструментарий АНБ, заявила, что в ее распоряжении имеется еще немало ценной информации и эксплоитов. После шумихи, поднятой WannaCry, злоумышленники вновь попытались монетизировать попавшие в их руки данные и предложили всем желающим подписаться на новый сервис «Ежемесячный дамп The Shadow Brokers», чье название говорит само за себя. Для оформления «подписки» нужно было перевести 100 Zcash (около 22 000 долларов на тот момент) на определенный кошелек и указав email-адрес для доставки контента. Группировка обещала, что каждый месяц будет публиковать новые эксплоиты для своих подписчиков, в том числе эксплоиты для роутеров, браузеров, мобильных устройств, Windows 10, а также скомпрометированные данные из сетей провайдеров SWIFT и банков и скомпрометированные данные о ядерных и ракетных программах России, Китая, Ирана и Северной Кореи. Теперь, в свете массовых атак Petya, группировка сообщила, что с июньской «рассылкой» все прошло отлично, и набралось «много-много подписчиков», но в июле цены вырастут до 200 ZEC (Zcash) или 1000 XMR (Monero), то есть 46 000 — 64 000 долларов по текущему курсу. Также злоумышленники сообщили, что постараются предоставить своим «клиентам» VIP-сервис: эксплоит для любой специфической уязвимости на заказ за 400 ZEC (в настоящий момент это примерно 130 000 долларов). По информации The Shadow Brokers, их VIP-сервисом уже кто-то воспользовался, однако никаких гарантий группировка не дает. Ведь в распоряжении хакеров может попросту не оказаться нужного эксплоита. Также в своем новом послании группа обращается к человеку, которого называет doctor. Хакеры верят, что этот человек является бывшим сотрудником Equation Group (группа, которую обокрали The Shadow Brokers, чья связь с АНБ давно доказана). The Shadow Brokers пишут, что некогда doctor создал множество хакерских инструментов, взламывал компании в Китае, а теперь стал главой собственной ИБ-компании, привлекшей хорошие инвестиции. Судя по всему, в твиттере Doctor писал крайне нелестные послания в адрес The Shadow Brokers, после чего удалял их. Теперь злоумышленники угрожают раскрыть его настоящую личность, если он не «оформит подписку» на июльский дамп группы с адреса [email protected]имя-компании.com. С журналистами издания Bleeping Computer связался пользователь, известный в твиттере как Drwolfff. Он сообщил, что под именем doctor хакеры подразумевают именно его. Drwolfff рассказал, что никогда не был сотрудником Equation Group и не имеет собственного ИБ-стартапа, однако ранее он действительно разрабатывал различные решения для АНБ. Также он признал, что потешался над фальшивым «акцентом» The Shadow Brokers (все послания группы написаны на нарочито ломанном английском языке). Drwolfff пишет, что он не опасается за себя и свои данные, и не собирается подписываться на сервис злоумышленников, однако он подозревает, что хакеры ошиблись и могли связать с его аккаунтом какого-то другого, совершенно постороннего человека. Drwolfff пишет, что теперь ему, возможно, придется устроить доксинг самому себе, чтобы защитить невинных людей. Учитывая, что в данный момент в профиле Drwolfff появилось настоящее имя (Daniel R. Wolfford) и страна проживания (Абу-Даби), свое обещание он уже выполнил.
Views: 266 Шодан
Mass Effect 2 Español Lair of the Shadow Broker
 
01:25:41
Comenten y si les gusto suscribanse
Views: 2 The Witcher
Fuzzbunch and Powershell Empire | Windows SMB PWNED
 
10:50
ทดสอบ Fuzzbunch + PowerShell Empire [NSA Tools] ยึด SMB https://haxtivitiez.wordpress.com/
Views: 1847 Darkbrainix SlickerTH
how to protect my computer from Wannacry ransomware| disable SMB | techturfy
 
00:39
this video is ""protect my computer from wannacry ransomware "" #1 Backup! It is highly advised, in order to protect yourself from being held hostage to data thieves, to create secure backups of important data on a regular basis. Simply backing up is not enough though, as physically disconnecting the storage device is required to avoid it being infected with ransomware as well. Cloud storage is another option to use, but it makes your data vulnerable to all other kinds of attacks. - #2 Update your Operating System "OS" It’s Highly Recommended to use the final update Windows 10 from Microsoft #3 Close ports 135 and 445 According to the reports of antivirus companies, wcrypt penetrates computers through SMB "Server Message Block" ports. To prevent penetration, we block the ports 135 and 445 through which the virus penetrates "in most cases they are not used by ordinary users". To do this, open the console with administrator rights "cmd.exe — run as administrator". And we execute in turn 2 commands "after each command there should be status OK". netsh advfirewall firewall add rule dir=in action=block protocol=TCP localport=135 name="Block_TCP-135" netsh advfirewall firewall add rule dir=in action=block protocol=TCP localport=445 name="Block_TCP-445" #4 Disabling SMBv1 support The vulnerability can also be closed by completely disabling SMBv1 support. Run this command in cmd "run as administrator". dism -online -norestart -disable-feature -featurename:SMB1Protocol #5 Install antivirus "at least a trial version"! Make use of your antivirus software’s ransomware removal tool, which should scan for and wipe out any ransomware attempts found on your computer. Most paid subscriptions use real-time protection to keep their clients. Even if ransomware gets past your antivirus, chances are good that within a short while an automatic antivirus update will clear the intruder from your system. Most antivirus companies offer trial versions free of charge to test before subscribing for a paid service, which should be enough if one needs to urgently remove a stray malware. SEO --------------------------------------------------------------------------- how to save my computer from wanna cry analysis wanna cry attack wanna cry ransomware wanna cry ransomware mcafee wanna decryptor ransomware wannacrypt protect my computer just disable smb how to protect my computer protect computer wannacry ransomware protect my computer from protect my computer from wannacry #wcry #shadow brokers #wannacry virus #malware seo: wanna cry virus, wanna cry ransomware, wannacry, ransomware, , techturfy , how to protect my computer from wannacry ransomware, how to protect my computer from wannacry ransomware i made this hacking video( tutorial ) to show how to protect my computer from wannacry ransomware , every one believed that shadow brokers hacker is behind this hacking , even atm machine closed because of this wannacry ransomware . you can either disable smb or use wanna cry ransomware mcafee #wannacry #wannacrypt #wannadecryptor #cyberattack -~-~~-~~~-~~-~- Please watch: "How To Hack known WiFi Password Using Command Prompt (CMD) [NEW 2017]" https://www.youtube.com/watch?v=8h7ZAxi2xMM -~-~~-~~~-~~-~-
Views: 1975 Tech Turfy
‘Shadow Brokers’ auctioning off NSA hacking tools
 
02:57
The US government’s top spying agency may have itself been victim to a hack. A mysterious online group known as the “Shadow Brokers” is auctioning off malware and hacking tools that it says come from the National Security Agency (NSA). RT America’s Simone Del Rosario speaks with Tom Parker, the chief technology officer at cybersecurity firm FusionX, who says attributing the hack to a specific person or government is tricky, and the information may have been leaked by the NSA itself to “show its military power in the domain of cyber.” Find RT America in your area: http://rt.com/where-to-watch/ Or watch us online: http://rt.com/on-air/rt-america-air/ Like us on Facebook http://www.facebook.com/RTAmerica Follow us on Twitter http://twitter.com/RT_America
Views: 17100 RT America
How to Detect and remove EternalRocks (a.k.a. MicroBotMassiveNet)
 
11:05
EternalRocks is a network worm (i.e. self-replicating), emerged in first half of May 2017, with oldest known sample fc75410aa8f76154f5ae8fe035b9a13c76f6e132077346101a0d673ed9f3a0dd dating to 2017-05-03. It spreads through public (The Shadow Brokers NSA dump) SMB exploits: ETERNALBLUE, ETERNALCHAMPION, ETERNALROMANCE and ETERNALSYNERGY, along with related programs: DOUBLEPULSAR, ARCHITOUCH and SMBTOUCH. https://github.com/stamparm/EternalRocks/ https://twitter.com/stamparm http://thehackernews.com/2017/05/smb-windows-hacking-tools.html
Views: 1097 Defango TV
Hacker un Windows 7 avec son IP Local - EternalBlue  / Exploit volé de la NSA
 
10:43
EternalBlue est un exploit volé de la NSA par le groupe The Shadow Brokers, il utilise une faille dans le protocole SMB v1. Il permet de prendre contrôle d'un Windows 7, Windows XP ou d'un Windows Vista à distance dans un réseau local (si les ports 445 ne sont pas ouverts) si le bulletin de sécurité MS17-010 n'a pas été installé. Il a été utilisé par le ransomware WannaCry pour se propager dans un réseau local, la plus grosse cyberattaque de 2017. L̵̡͖̟͈̜̘̺͎̟̤͒̾͐͑̂̄̃̑͐͝é̶̢̢̢̛͎̫̰̫̩͉́̄͗͑̇̽͆͝ͅs̵̡̱͓̥̠̹͇͕̠͉̓́̈̔̀̊̍̅̾͋ ̵̧̹̪̜̘̯̫̪̲̋̾̊̏̒̾͊́̇̕͜L̶̜̟̫̬̻̯̬͉̝͓̅̒̉̊̓̀̈̈́̕͠ì̶̯̗͚̟̮͓͙̙̭͍̓̌̈́̂͌̈́͊̍̒é̵̝͈̣̹͇̜̟̀͆̀̉̓̈̍͘͘͜ͅͅn̸̢̺̰̙̤̘̗̳̜̥̓͌͐̎̃̍̆͆̽͝s̴̡̛̛͓̪̹̦̞̠̬͉̿̃͆̇̃̈̆̈́ͅ Scanner MS17-010 = https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/smb/smb_ms17_010.rb EternalBlue-Doublepulsar pour Metasploit : https://github.com/ElevenPaths/Eternalblue-Doublepulsar-Metasploit Musique : Aloma Steele - Baestration Merci d'avoir regarder ! MrAshitaka.
Views: 1087 MrAshitaka - Hacking
Shadow Brokers selling NSA hacking tools on zeronet.io
 
05:29
Remember The Shadow Brokers? The hacker group that's believed to be behind the high-profile cyber theft of NSA hacking tools and exploits that sparked a larger debate on the Internet concerning abilities of US intelligence agencies and their own security The group put the stolen cyber weapons on auction but received not much response and gone quiet for some time. However, The Shadow Brokers has now appeared to have put up the NSA's hacking tools and exploits for direct sale on an underground website. https://zeronet.io/ http://thehackernews.com/2016/12/nsa-hack-shadow-brokers.html http://thehackernews.com/2016/10/nsa-shadow-brokers-hacking.html http://thehackernews.com/2016/10/nsa-contractor-hacking.html http://thehackernews.com/2016/08/nsa-hacking-tools.html http://motherboard.vice.com/read/newly-uncovered-site-suggests-nsa-exploits-for-direct-sale https://motherboard.vice.com/read/what-we-know-about-the-exploits-dumped-in-nsa-linked-shadow-brokers-hack https://twitter.com/CleetusBocefus/with_replies https://medium.com/@CleetusBocefus/are-the-shadow-brokers-selling-nsa-tools-on-zeronet-6c335891d62a#.lalag9wpp
Views: 903 Defango TV
Adm R, 'Q', NSA, SHADOW BROKERS, CROWDSTRIKE, FireEye, VAULT 7-8 & T.A.O.
 
25:11
https://mobile.nytimes.com/2017/11/12/us/nsa-shadow-brokers.html?referer=https://t.co/p3NQnOfMDF?amp=1 DON'T YOU JUST LOVE MY SUPER AWESOME CHANNEL? THIS IS THE ONLY PLACE ON THE ENTIRE INTERNET YOU CAN SEE MY MASTERPIECES OF DIVINATION! 🤓 🐇SPONSOR MY INSPECTIONS OF THE MASTERMIND MAINSTREAM MEDIA & TOGETHER, WE WILL TRAVEL THROUGH THE RABBITHOLE INTO OZ, UNMASK THE VILLAINS IN OUR MAGICAL MYSTERY MACHINE & STRlKE WHEN THEY LEAST EXPECT US— LIKE A PACK OF FURIOUS VELOCIRAPTORS! WE ARE THOSE MEDDLING KIDS THAT WON'T LET YOU GET AWAY WITH IT! ! 👷👦👱👧🐕🐿 Support My Channel & Work Here: https://www.patreon/JamesMunder
Views: 38535 James Munder
Equation Group (NSA) Hack by The Shadow Broker
 
06:16
Equation Group Cyberweapons Auction : http://pastebin.com/NDTU5kJQ
Views: 611 rustcity
exploit windows 7 using ip address only with eternalblue doublepulsar
 
16:49
====FlyingWing Tech=== EternalBlue DoublePulsar is an exploitation module that was leaked by the NSA National Security Agency, by a group of hackers called shadow broker. It uses the smb vulnerability in windows to hack windows 8.1 ,windows 7 ,windows xp and lower verison of windows just using by their ip address only in the same network. so It was a painic attack to all users connected on a same network. but the patches of this attack has been released . So if you don't want to get affected with this attack, please UPDATE your windows .. Download link is given below: download eternalblue doublepulsar : https://github.com/ElevenPaths/Eternalblue-Doublepulsar-Metasploit download smb_ms17_010 module : https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/smb/smb_ms17_010.rb WARNING: This vedio is only for educational purpose . if you do any illegal use of this knowledge . I will not be responsible It can put you into jail, so do penetration testing in your network. Thanks you guys, PLEASE DON'T FORGET TO SUBSCRIBE MY CHANNEL
Views: 2555 FlyingWing Tech
MS17 010 EternalBlue & DoublePulsar NSA Exploit
 
26:24
As the EternalBlue Exploit belongs to NSA of US, it is leaked by Shadow Brokers Hacker group on 14th April 2017. EternalBlue exploits a vulnerability in the Microsoft implementation of the SMB protocol. DoublePulsar is a backdoor implant tool developed by National Security Agency located in the United States and leaked by Shadow Brokers in early 2017. The capacity of this device is to infect about 2,00,000 Microsoft Computer in few days. The DoublePulsar is used along with EternalBlue in 2017 for WannaCry Ransomware Attack. DoublePulsar is a powerful one which runs in a Kernel mode. So it allows a higher level of access for the attackers to control the System. Once DoublePulsar is installed, it will have three commands in it. They are ping, kill and exec, through which, malware loaded onto the system. This is Metasploit Live Exploitation Video ONLY for security or pentest purposes ! Dont use this to harm or hack computers in networks outside yours. Its Ilegal !!
Hack Windows 7 Remotely Using DOUBLEPULSAR — NSA Hacking Tool
 
10:31
DOUBLEPULSAR is a backdoor that was leaked from the NSA by a group of hackers called Shadow Brokers. It is makes use of an exploit called ETERNALBLUE, based on a vulnerability in SMB. This works with Windows 8.1, Windows 7, Windows Server 2008 and all versions of Windows older than Windows 7, including Vista and XP. This video demonstrates how DOUBLEPULSAR is used to hack Windows 7 computers remotely using Metasploit with just an IP address. ---------------------------------------------- DOUBLEPULSAR — https://github.com/ElevenPaths/Eternalblue-Doublepulsar-Metasploit SMB_MS17_010 Scanner — https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/smb/smb_ms17_010.rb ---------------------------------------------- Instrumental produced by Chuki (http://www.youtube.com/user/CHUKImusic) ---------------------------------------------- This video is meant for educational purposes only, do not attempt this on devices that you don't own or have explicit permission to try this on. I cannot be held responsible for your actions. Arcanecfg
Views: 100868 ArcaneHacks
Testing ETERNALBLUE from "Equation Group" Dump by "Shadow Brokers"
 
01:41
Here is a video showing ETERNALBLUE being used to compromise a Windows 7 Machine.. This SMB flaw is fixed with MS17-010 .This video is only for Educational Purpose.Don't try this outside of your controlled lab :) Twitter : @princechaddha
[#How_To] exploit SMB vulnerability like WannaCry Attacks!
 
06:47
This video shows how the smb vulnerable is so dangerous and how the NSA was use it without any detection .. and how the biggest ransomware attack in history WannaCry exploits that vulnerability and infected millions of windows devices around the world. Hope you enjoyed the video and don't forget to subscribe for more ;)
Views: 3075 system crashers
Exploiting Windows With MS17-010 EternalBlue SMB Vulnerability
 
17:40
Hi, in this demonstration I will be showing you how to exploit windows machines that are vulnerable to the ExternalBlue SMB vulnerability which was leaked by The Shadow Brokers and was used by the Wanna Cry Ransomware. Resources: https://www.rapid7.com/db/modules/exploit/windows/smb/ms17_010_eternalblue Website: www.hackingplayground.com Patreon Page: https://patreon.com/krypt0mux
Views: 87 krypt0mux
How To Exploit MS17-010 SMB
 
08:15
This video for education purpose how to exploit MS17-010 SMB in Windows XP from Kali Linux ( Metasploit)
Views: 168 DeadUnix
Shadow Brokers hack the NSA
 
04:44
Follow us on Facebook www.facebook.com/MetaInfoMedia
Views: 371 Meta-Info Media
Live Demo of Wana Cry/WanaCrypt v2 Ransomware propagation on Windows Client PCs
 
02:20
I decided to install the latest #WanaCry worm intentionally on my system. Just see how quickly it encrypts files and changes the wallpaper and demands a ransom!! The worm infects Windows Mail clients as a way of propagation. If you receive an attachment even from a trusted contact with a suspicious/random document file name, do not open! It also affects systems connected in a network using the ETERNALBLUE exploit (with love, from the NSA) from the Shadow Brokers's Release, exploiting SMB Protocol. This vulnerability only affects Windows versions lower than Windows 10 (Creators Update) and lower editions, including Windows Server editions. Make sure to patch your systems asap via Windows Update (MS17-010 advisory). Currently the worm has been sinkholed, which means it won't work on new systems which are connected to the internet and aren't patched and are not infected before; but however this is not necessarily the case. I discovered another strain which ignores the "kill switch" and encrypts files. Update: Newer strains ignore the kill switch and some even spread without a kill switch. Patching up or disabling SMB is the only way. Also, keeping all your software up-to-date is the best way to prevent such infections. Add me on Twitter to get security related stuff on your feeds: https://twitter.com/aksh_cs P.S: Never mess with a live malware in a live environment! --- If you like this video, don't forget to drop a like. Also, subscribe to channel for more interesting videos like these!
Views: 89546 Akshay
[CVE-2017-0143 - MS17-010] - EternalBlue SMB Remote Windows Exploitation
 
08:23
Today i will penetration test on windows 7 service pack 3 with the vulnerability of the SMB. ## MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption This module is a port of the Equation Group ETERNALBLUE exploit, part of the FuzzBunch toolkit released by Shadow Brokers. There is a buffer overflow memmove operation in Srv!SrvOs2FeaToNt. The size is calculated in Srv!SrvOs2FeaListSizeToNt, with mathematical error where a DWORD is subtracted into a WORD. The kernel pool is groomed so that overflow is well laid-out to overwrite an SMBv1 buffer. Actual RIP hijack is later completed in srvnet!SrvNetWskReceiveComplete. This exploit, like the original may not trigger 100% of the time, and should be run continuously until triggered. It seems like the pool will get hot streaks and need a cool down period before the shells rain in again. The module will attempt to use Anonymous login, by default, to authenticate to perform the exploit. If the user supplies credentials in the SMBUser,SMBPass, and SMBDomain options it will use those instead. On some systems, this module may cause system instability and crashes, such as a BSOD or a reboot. This may be more likely with some payloads. ## Module Name exploit/windows/smb/ms17_010_eternalblue ## Targets Windows 7 and Server 2008 R2 (x64) All Service Packs ✪ Credit to: Th1k404 ✪ Greetz to: Baykdang, Kolab, JekJean Hashtags: #CVE_2017_0143 #MS17_010 #EternalBlue #Windows_Exploitation
Views: 7562 Th1k404
Exploit MS17-010 SMB vulnerability using Metasploit
 
04:19
nmap -d -sC -p445 --open --max-hostgroup 3 --script smb-vuln-ms17-010.nse "target" https://github.com/claudioviviani/ms17-010-m4ss-sc4nn3r/blob/master/ms17-010-m4ss-sc4nn3r.py ms17-010-m4ss-sc4nn3r - MS17-010 Scanner multithreading | python. Features: 1) Multithreading 2) Subnet scan 3) CIDR newtrok scan
Views: 7228 Diego Souza
Eternal Blue  -Double Pulsar Metasploit Module Demo - NSA Hacking tool - Vault 7
 
01:45
*This video is for Education Purposes only. I will not take any responsibility for your action with this knowledge.* This Video shows you how easy it is to hack into a Remote Machine using the recently exposed Windows SMB Vulnerability. A hacking tool leaked by Shadow Brokers several weeks ago has already been used to infect tens of thousands of computers with malware. Known as DoublePulsar, the malware targets computers running Windows and is a backdoor through which other malware can be loaded onto infected computers. The infected machines can be used to distribute malware, send spam, and launch attacks on other computers. DoublePulsar is installed with the EternalBlue exploit. Download Link - https://github.com/ElevenPaths/Eternalblue-Doublepulsar-Metasploit.git How to Install Eternal Blue - Double Pulsar Module for Metasploit
EternalBlue SMB Remote Windows Kernel Pool Corruption | Kali Linux 2017.1
 
01:22
MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption | Kali Linux 2017.1 This module is a port of the Equation Group ETERNALBLUE exploit, part of the FuzzBunch toolkit released by Shadow Brokers. There is a buffer overflow memmove operation in Srv!SrvOs2FeaToNt. The size is calculated in Srv!SrvOs2FeaListSizeToNt, with mathematical error where a DWORD is subtracted into a WORD. The kernel pool is groomed so that overflow is well laid-out to overwrite an SMBv1 buffer. Actual RIP hijack is later completed in srvnet!SrvNetWskReceiveComplete. This exploit, like the original may not trigger 100% of the time, and should be run continuously until triggered. It seems like the pool will get hot streaks and need a cool down period before the shells rain in again. The module will attempt to use Anonymous login, by default, to authenticate to perform the exploit. If the user supplies credentials in the SMBUser,SMBPass, and SMBDomain options it will use those instead. https://www.rapid7.com/db/modules/exploit/windows/smb/ms17_010_eternalblue Facebook Page: https://www.facebook.com/kaliforensics Pinterest: https://www.pinterest.com/penetrationtesting/ Instagram: https://www.instagram.com/penetrationtesting9 Thanks For Watching.... Like Share & Subscribe.....
Views: 1532 Penetration Testing
SMB Exploit
 
03:54
Views: 602 Huang Andrew
Shadow Brokers' NSA Docs
 
03:22
The Shadow Brokers have released a trove of hacking tools from the NSA. After failing to find a bidder willing to buy the information, the hacking group have given the password to unlock the tools for free. For the full episode, visit twit.tv/twit/609
Views: 2237 TWiT Netcast Network
Mass Effect 2 Cutscenes | Lair of the Shadow Broker DLC
 
34:39
[Expand description for timestamps.] Cerberus has acquired some intel possibly alluding to the Shadow Broker's location. With this intel in hand, Shepard teams up with Liara to take down the Shadow Broker. About my Shepard: Blake's a Renegon (mixed morality, favoring Renegade) with the Earthborn/Sole Survivor background. He's what you might call a jerk with a heart of gold. Although most of his dialogue responses are Renegade, he makes Paragon plot decisions about 50% of the time. Full Playlist of ME2 Cutscenes: https://www.youtube.com/playlist?list=PLi3ZH6Zn8jgVyfDYE4qscw5YTM4i-SshL - TIMESTAMPS - 0:00 - Sharing the Cerberus Intel With Liara 1:54 - Calling a Cab to Liara's Apartment 2:04 - Liara's Apartment: Arriving at Liara's Apartment 4:09 - Liara's Apartment: Examining the Photo Frame 4:33 - Liara's Apartment: Interacting With the Prothean Artifact 5:28 - Dracon Trade Center: Arriving at the Dracon Trade Center 6:24 - Dracon Trade Center: Discovering Vasir's True Allegiance 8:44 - Dracon Trade Center: Catching Up With Vasir and Liara Outside 9:28 - Skycar Chase with Vasir 10:32 - Azure Hotel: Start of Vasir's Boss Battle 12:40 - Azure Hotel: After Defeating Vasir 14:53 - Arriving at the Shadow Broker's Base 16:23 - Shadow Broker's Base Exterior: Retracting a Lightning Rod 16:29 - Shadow Broker's Base Exterior: Lowering the Panels 16:35 - Shadow Broker's Base Exterior: Retracting Another Lightning Rod 16:45 - Shadow Broker's Base Exterior: Arriving at the Door 17:04 - Shadow Broker's Base Exterior: Unlocking the Door 17:16 - Shadow Broker's Base Interior: Entering the Base 17:45 - Shadow Broker's Base Interior: Finding Feron 19:27 - Shadow Broker's Base Interior: Meeting the Shadow Broker 21:53 - Shadow Broker's Base Interior: End of Shadow Broker Fight Stage 1 22:36 - Shadow Broker's Base Interior: End of Shadow Broker Fight Stage 2 23:05 - Shadow Broker's Base Interior: Defeating the Shadow Broker 27:43 - Aftermath: First Post-Mission Visit to the Shadow Broker's Base 28:20 - Aftermath: Talking With Liara in the Shadow Broker's Base 31:42 - Aftermath: Liara's Visit to the Normandy
Views: 60 Sighawke
NSA FUZZBENCH TESTİ-NSA EXPLOİTLERİ
 
03:25
Bu videoda NSA in olduğu söylenen Shadow brokers tarafından yayınlanan exploitleri inceledim. Wİndows xp-7-server 2008-8 sistemlerinde çalışıyor. Sadece smb istismarını kullanan eternalblue adlı payloadu kullandım.
Views: 268 doğukan uçak
How to Hack Windows Using NSA Exploit Eternal Blue
 
10:38
This video demonstrates how to hack windows using NSA Exploit Eternal Blue .DOUBLEPULSAR is a backdoor that was leaked from NSA by a group of hackers called Shadow Brokers. This backdoor uses an exploit called ETERNALBLUE, based on a vulnerability in SMB. This works with Windows 8.1, Windows 7, Windows Server 2008 and all versions of Windows older than Windows 7, including Vista and XP. This Video Is meant purely for Educational Purposes only. I am not responsible for whatever Viewer do after watching This.
Views: 12971 Hack3rSp0t
EternalBlue DoublePulsar SMB Exploit | NSA Hacking Tool | Kali Linux | Metasploit
 
16:36
Namaskaar Dosto, is video mein maine aapseEternalBlue-DoublePulsar SMB Exploit ke bare main baat k hai. Microsoft ke critical update ke accordingly ye critical update, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, Windows 10 Version 1607 and Windows Server 2016, and Important for Windows Vista, Windows 7, Windows 8.1, Windows RT 8.1, Windows 10, and Windows 10 Version 1511 ko affect kr rhi hai. Maine is video main Kali Linux Use kiya hai aur mera victim Window 7 Machine par hai.Isme maine metasploit tool use kiya hai. Eternalblue exploit ke barain NSA ka hacking tool hai jise shadow brokers hackers ne leak kr diya the. Isse Tool k help se ransomware spread hua the. Ye attack sirf SMBv1 Par hi ho skta hai. Agar apke machine main SMBv1 Enable hai to isse disable kre. Mujhe umeed hai ki aapko yeh video pasand aayega.. Is vedio main maine kuch problem solve ki hai jaise: [Solved]- Error No file or Directory /root/.wine/drive_c/eternal11.dll Use Below Command: #mkdir -p /root/.wine/drive_c/ Install Wine Command: #apt-get install wine #apt-get install wine32 ####### Microsoft Security Bulletin MS17-010 - Critical https://technet.microsoft.com/en-us/library/security/ms17-010.aspx SMB_MS17_010 ####### ####### Github Eternalblue-Doublepulsar-Metasploit https://github.com/ElevenPaths/Eternalblue-Doublepulsar-Metasploit ####### #######Metasploit-framework https://github.com/rapid7/metasploit-framework/tree/master/modules/auxiliary/scanner/smb ####### Related Link: MUST WATCH SMB Attack on windows 10 | Denial of Service Vulnerability | CVE-2017-0016 https://youtu.be/WTxX2oNQAXs How to Install VMware Workstation Player on Kali Linux 2.0 in HINDI | Fix Kernel Headers Problem https://www.youtube.com/watch?v=RZKbkBTScqw How to hack WPA/WPA2 Wi-Fi Password using KALI Linux in HINDI https://youtu.be/wQCzlnwe_bM Kali Linux Introduction in Hindi. Most Advanced Penetration Testing Distribution https://youtu.be/4gmF-jaSp-s How To Hack Wireless (Wi-Fi) Signal in Hindi [Wifi Jammer] [WEP. WPA. WPA2] https://youtu.be/XgR2AJ0T_nc ################################################ Everything shown is to be used for educational purpose only. All information exposed in this video has the goal to teach you the techniques used by HACKERS in order to avoid their attacks. Please make sure before analyzing application, website or any network that you have an approval of the Owner/ Author. The misuse of the information in this video can result in criminal charges brought against the persons in question. Hacking Begins will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law. ################################################ Share, Support, Subscribe!!! Youtube: http://youtube.com/hackingbegins Twitter: http://www.twitter.com/hackingbegins_ Facebook: http://www.facebook.com/hackingbegins Instagram: http://instagram.com/hackingbegins Google Plus: https://plus.google.com/110030085807050141654
Views: 3115 HACKING BEGINS
Shadow Brokers: Hackers Release NSA Hacking Tools to Punish Trump for 'Abandoning' His Base
 
12:18
www.undergroundworldnews.com Hacking group Shadow Brokers has released the password to a trove of NSA exploits in what they say is a form of protest against President Donald Trump for going back on his campaign promises, and warning the president, “Don’t forget your base.” The shadowy group first emerged last August and released hacking exploits used by the NSA’s Equation Group, which included vulnerabilities in firewall products, and a list of IP addresses the NSA had exploited, which the group released at a later date. Learn More: https://www.rt.com/usa/384082-shadow-brokers-nsa-password-trump/
Views: 15472 DAHBOO777
Hacking Windows Remotely Using NSA Eternalblue & Doublepulsar Used in WannaCry Ransomware
 
17:57
*This Video is Solely for Educational Purpose* *The intentions are not to harm any SYSTEM* _________________________________________________________________ EternalBlue is an exploit developed by NSA (National Security Agency) which was leaked by the Shadow Brokers hacker group on April 14, 2017. EternalBlue exploits a vulnerability in SMB (Server Message Block) protocol. As you all know that we can easily hack any windows machine with meterpreter and a backdoor then why is there so much hype around this leaked NSA exploit? It is because with this exploit there’s no need of any backdoor, the only thing an hacked requires here is the IP address of the victim and that’s all game over. _________________________________________________________________ 1- smb_ms17_010.rb (Vulnerability Scanner) https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/smb/smb_ms17_010.rb Location to Paste: /usr/share/metasploit-framework/modules/auxiliary/scanner/smb/ 2- Eternalblue-Doublepulsar-Metasploit https://github.com/ElevenPaths/Eternalblue-Doublepulsar-Metasploit Location to Paste: /usr/share/metasploit-framework/modules/exploits/windows/smb/ _________________________________________________________________ Subscribe and keep Supporting..... Facebook-https://www.facebook.com/rastogitejaswa Instagram- @tejas_rastogi
Views: 12553 Razzor Sharp
EternalBlue-DoublePulsar-Metasploit without using FuzzBunch
 
02:23
Follow me on Twitter - @hardw00t We can use Metasploit to check if the host is vulnerable to MS17-010 and if found to be vulnerable, the same can be exploited. You can add the scanner module from: https://packetstormsecurity.com/files/142181/Microsoft-Windows-MS17-010-SMB-Remote-Code-Execution.html You can add the exploitation module of EternalBlue and DoublePulsar from: https://github.com/ElevenPaths/Eternalblue-Doublepulsar-Metasploit Follow me/DM me on Twitter for more - @hardw00t Disclaimer: This video is only for educational and research purpose.
Views: 18863 Hardik Mehta
Exploit Samba, Crack Linux Password & Bruteforce w/ Hydra
 
03:24
Kali - linux Environment is a home brewed virtual LAB. All exploitation is within my internal network. Enjoy. Facebook: https://www.facebook.com/rynetinfo Blog: http://www.rynet.info Twitter: http://www.twitter.com/rynet_info
Views: 1260 John Ryan
Man In The Middle Framework | MITMf | Kali Linux 2018.1 | series #1 📡
 
03:34
Man In The Middle Framework | MITMf | Kali Linux 2018.1 MITMf aims to provide a one-stop-shop for Man-In-The-Middle and network attacks while updating and improving existing attacks and techniques. Originally built to address the significant shortcomings of other tools (e.g Ettercap, Mallory), it's been almost completely re-written from scratch to provide a modular and easily extendible framework that anyone can use to implement their own MITM attack. Features: The framework contains a built-in SMB, HTTP and DNS server that can be controlled and used by the various plugins, it also contains a modified version of the SSLStrip proxy that allows for HTTP modification and a partial HSTS bypass. As of version 0.9.8, MITMf supports active packet filtering and manipulation (basically what etterfilters did, only better), allowing users to modify any type of traffic or protocol. The configuration file can be edited on-the-fly while MITMf is running, the changes will be passed down through the framework: this allows you to tweak settings of plugins and servers while performing an attack. MITMf will capture FTP, IRC, POP, IMAP, Telnet, SMTP, SNMP (community strings), NTLMv1/v2 (all supported protocols like HTTP, SMB, LDAP etc.) and Kerberos credentials by using Net-Creds, which is run on startup. Responder integration allows for LLMNR, NBT-NS and MDNS poisoning and WPAD rogue server support. Download:https://github.com/byt3bl33d3r/MITMf series #1 ----------------------------------------------------------------------------------------------- ☑️Subscribe for More Videos: https://goo.gl/MrTQ5r Education Purpose Only !! 🌍Get More Tutorials Here: https://www.patreon.com/theshadowbrokers Follow Me: Face-book: https://goo.gl/ScNuSH Twitter: https://goo.gl/TTYpMR Stumble-upon: https://goo.gl/M5DnF6 Tumber: https://goo.gl/dzuhE9 -The NSA Hackers Thanks !
Views: 34030 The Shadow Brokers
What is DOUBLEPULSAR? What does DOUBLEPULSAR mean? DOUBLEPULSAR meaning & explanation
 
01:24
What is DOUBLEPULSAR? What does DOUBLEPULSAR mean? DOUBLEPULSAR meaning - DOUBLEPULSAR definition - DOUBLEPULSAR explanation. Source: Wikipedia.org article, adapted under https://creativecommons.org/licenses/by-sa/3.0/ license. SUBSCRIBE to our Google Earth flights channel - https://www.youtube.com/channel/UC6UuCPh7GrXznZi0Hz2YQnQ DoublePulsar is a backdoor implant tool supposedly developed by the U.S. National Security Agency's (NSA) Equation Group that was leaked by The Shadow Brokers in early 2017. The tool was able to infect over 200,000 Microsoft Windows computers in only a few weeks, and was used alongside EternalBlue in the 2017 WannaCry ransomware attack. Sean Dillon is a senior analyst of security company RiskSense Inc. who first dissected and inspected DoublePulsar. He said that the NSA exploits are "10 times worse" than the Heartbleed security bug, and use DoublePulsar as the primary payload. DoublePulsar runs in kernel mode which grants hackers a high level of control over the computer system. Once installed, it has 3 commands: ping, kill, and exec, the latter of which can be used to load malware onto the system.
Views: 1134 The Audiopedia
Eternal Check 1.0
 
03:27
Eternal Check verifies if a specific ip is vulnerable to Eternal Blue , Eternal Romance , Eternal Champion & Eternal Synergy exploits . Eternal Check uses the original executable files from Shadow brokers leak package to verify the targets , it requires wine 32 bit installed , wine 64 does not do the job . Eternal Check also check witch Smb pipes are vulnerable on the target machine to be exploited . Eternal Check can be downloaded in : https://github.com/peterpt/eternal_check Only works with linux
Views: 819 peter pt
FuzzBunch & MSF ShadowBrokers
 
04:14
Using #FuzzBunch to exploit MS17-010 on #Windows2k8 system. #FuzzBunch framework was leaked by ShadowBrokers. Repository can be download from: https://github.com/fuzzbunch/fuzzbunch Following lab setup was used to perform this scenario: 1) Windows XP 2) Python 2.6 3) Pywin32 @Hardw00t - twitter Disclaimer: This video is only for educational and research purpose.
Views: 3128 Hardik Mehta
EternalBlue Exploit Against Windows 7 (MS17-010)
 
04:38
In this video, we will use the EternalBlue exploit to bypass the security of a Windows 7 machine and show the same type of exploit used by the WannaCry ransomware in targeting the SMB vulnerability of MS17_010. Visit https://www.JasonDion.com for more certification exam prep courses.
Views: 4240 Jason Dion
NSA Password Released - Who are the Shadow Brokers?
 
07:19
Dear President Trump, Respectfully, what the @!#$ are you doing? TheShadowBrokers voted for you. TheShadowBrokers supports you. TheShadowBrokers is losing faith in you... Learn more: http://www.zerohedge.com/news/2017-04-08/hacker-group-releases-password-nsas-top-secret-arsenal-protest-trump-betrayal https://medium.com/@shadowbrokerss/dont-forget-your-base-867d304a94b1 PLUGS: My books: http://www.amazon.com/Jim-Yackel/e/B004ZRCZL6 A sampling of music: https://soundcloud.com/jim_yackel
Views: 544 Jim Yackel