Powerful encryption, every hacker, pentestER, researchers must know (bypass all antivirus)

Powerful encryption, every hacker, pentestER, researchers must know (bypass all antivirus)

Thefreedom

JF-Expert Member
Joined
Jan 27, 2019
Posts
319
Reaction score
316
Kama ilivyo pendekezwa thread itakuwa updated
 

Attachments

  • InGodWeTrust-exploit.txt
    InGodWeTrust-exploit.txt
    1.7 KB · Views: 24
  • Hacker-stock.jpg
    Hacker-stock.jpg
    85.1 KB · Views: 18
Sawa mkuu hila haya makitu kuyafanya lazima muwe group tofauti na kapo unapata eye strain & brain cancer
 
Thanks for sharing hii exploit , will surely try it out. Will it work kwel latest version of Kaspersky internet security maan there are major updates kwny AV database ya hawa jamaa ambz zina uwez wa ku detect lots of virus signatures..! Much appreciated broh.
 
Kaspersky wamedetect juz baada ya uyo jamaaa niliyemuonesha kupeleka final encrypted backdoor virus total ila nitaweka njia ingine ambayo unatumia dll injection kuhide backdoor.exe
Thanks for sharing hii exploit , will surely try it out. Will it work kwel latest version of Kaspersky internet security maan there are major updates kwny AV database ya hawa jamaa ambz zina uwez wa ku detect lots of virus signatures..! Much appreciated broh.
 
Aisee sijawahi ona mtu anayejifanya anajua kumbe hajui chochote kama wewe duh. Yaani umeandika ujinga mtupu hadi nimetikisa kichwa. Ushauri tu, anza kujifunza programming from scratch, alafu soma concepts mbalimbali za operating systems, anza kujua how memory works na imetengenezwaje, networking, cpu, kuna mambo kibao ya kusoma hapo utakutana nayo, jipanue akili kwanza alafu urudi miaka ya mbele ukiwa umeiva utaona ulichoandika hapa ni total rubbish.

Kwanza kuna tofauti kubwa sana kati ya encryption na hashing, encryption algorithms zinachofanya ni kuchukua data flani, zinabadilisha hiyo data isiweze kutambulika kwa kutumia key flani, na kwa kutumia the same key unaweza decrypt kurecover data yako in original form. Zipo encryption algorithms kibao sitoingia in details zinafanyeje kazi unaweza jisomea mwenyewe, popular ni kama RSA inayotumika kuficha data yako isionekane wakati inapita kwenda na kutoka kwenye server.

Hashing algorithms zenyewe zinavyofanya kazi ni unachukua data flani alafu inaproduce hash, hata kama una seed huwezi kupata original data kutoka kwenye hash hiyo isingekua hashing tena tungeiita tu encryption algorithm. Hizi zinatumika sehemu ambazo huna haja ya kua na the original data, mfano kwenye kutunza password za wateja kwenye database badala ya kutunza password ya mtu in clear text, unaichukua unaihash alafu unatunza hash, mteja akihitaji kulogin unachukua password yake unajaribu kuproduce hash ili uone kama ni same hash then unajua password ni sahihi, ili hata mtu akifanikiwa kuhack database akiona password hazitomsaidia kulogin coz hawezi pata the original password hata afanyeje.

Sasa turudi kwenye mambo uliyoandika wewe, in short umekosea kila kitu ulichoandika.

Ila sio kesi unaweza badilisha encryption algorithm from md5 to Gzip still ikawa 100% fud. Just test it.

MD5 sio encryption algorithm, MD5 ni hashing algorithm, huwezi chukua md5 hash ukapata the original information, na MD5 siku hizi haitumiki sana kwa sababu ina flaw moja kubwa, ni rahisi kutumia information tofauti na zika-collide kuproduce the same hash, sifa ya hashing function nzuri ni kuproduce unique hashes kwa kila input unayoweka.

Gzip sio encryption algorithm pia, Gzip ni compression algorithm, inachofanya ni kuchukua data yako ikacompress into smaller size, haihitaji password wala nini, mtu yeyote anaweza ku-unzip na kupata original data, so sio encryption pia coz haihitaji key.

Sasa kama umeshindwa kujua vitu simple namna hii ambavyo ni commonly used kila siku, mfano gzip inatumika kwenye browser zote unazotumia, website nyingi karibia zote siku hizi zinatumia gzip kucompress data, kama hujui kitu simple namna hiyo kuna haja yoyote ya mtu kuamini unachokiandika? hujui unachokiandika umecopy na kupaste ulivyoelewa kumbe ulivyoelewa ni uongo mtupu.

NITAONESHA HOW TO ENCRYPT VIRUS AU BACKDOOR YYTE kwa kutumia algorithm converter

Algorithm converter ndo kiumbe gani hicho? we jamaa unakuja na vitu ambavyo havipo, hakuna kitu kinaitwa algorithm converter, naomba usiweke post nyingine tena kuhusu haya mambo aisee, nenda kasome miaka 5 rudi tena ukiwa umeelimika. Kama una post nyingine za hivi naomba ufute zote usipotoshe watu.

Na hiyo code uliyoandika kutokua detected na antivirus sio accomplishment, hiyo code sio virus, toka lini code ya kuhash data ikawa virus seriously?
 
Ulivyo fala et hakuna algorithm converter Graph: mzeee wewe sijui ni programmer ambaye hujui chchte kuhusiana na hacking

Soma hapo chini......

Am done talkingView attachment 1256104

We tukana ila ukweli unabaki palepale tu. Siwezi fungua pdf kusoma huku common mistakes unazo kibao hujui hata kuandika.
Sihitaji kukupa credentials zangu kuprove level yangu.

Alafu unavyosema MD5 zinakua reversed we kijana umekunywa gongo la wapi? huwezi reverse hash function, hata MD5 ambayo sio secure haiwezi kua reversed, yenyewe kwa kua inatoa the same output all the time ndiyo maana watu wameweza kucrack common passwords, sio reversing, wanachofanya ni brute forcing text kupata hash zake wanasave nyingi kwenye database, wakipata md5 wanachofanya ni kuangalia kama ipo kwenye db yao au la then wanaweza kupata corresponding original text. Hiyo sio reverse kwa hiyo usilete upumbavu hata kua unaweza reverse a hash function.

Umekuja na matusi ya kijinga so ngoja nije kwenye level yako, you are a damn p***y, umekuja kutuambia hapa MD5 na GZIP ni encryption algorithm alafu unataka tukuchukulie serious tufungue pdf za kipuuzi? Hujui Gzip inatumika kufanya compression hadi mwaka huu alafu unajiita hacker? wtf hata mtu aliyeanza kusoma kidogo kuhusu programming anajua gzip ni only for compression, hata ambaye hajasoma ila anatumia sana web kama ni curious atajua gzip inatumika kwenye compression in all browsers, fala we mwenyewe.

Algorithm converter ukimaanisha nini hasa? kuconvert one algorithm to another unaita algorithm converter? Hata maana ya algorithm hujui you must be so stupid hii sector acha tu maana kama unarekebishwa bado unaleta ubishi hutofika popote utaishia kujifanya unajua kila kitu kumbe you are just stupid. There's no such thing as alg converter, there's just algorithm.

Na ndiyo code sio virus, hata ukicompile it doesn't make it a virus, tafuta definition ya virus uelewe. Kufanya virus isiwe detectable kwenye antivirus sio smart, any new virus sio detectable kwenye antivirus hadi reseraches waidake wapate hash yake alafu waiinclude kwenye update yao. Kwa hiyo kubadilisha hadh unajihisi smart kumbe ni just stupid hash ni kitu hata mwenye original software anaweza badili kwa kuchange just a single line of code akicompile anapata a different hash. Antivirus ni more complex kuliko unavyofikiria, sio kucompare hash tu ya software, kuna nyingine zinaangalia how a program operate, kama inajaribu kuaccess memory space ambayo haitakiwi e.t.c.

Sasa naishia hapa, sina muda wa kubishana na newbies wanaojifanya wanajua kila kitu, hata mi nilikua na ujinga kama wako wa kujihisi god kwenye haya mambo nikakutana na smarter guys nikabadilika nikajifunza ku-listen.
Nenda huko na gzip encryption algorithm yako hehehe! we umelewa kweli
 
.
 

Attachments

  • Screenshot_2019-11-07-07-16-55-146_com.google.android.apps.docs.jpeg
    Screenshot_2019-11-07-07-16-55-146_com.google.android.apps.docs.jpeg
    14.7 KB · Views: 16
hahahaha siwez bishana na wewe nimekupa like utulieBelow hio ndo process ilivyofanyika ....virus.exe to md5

Yani akija mtu akisoma pdf atakuona wewe ni mama wa kinondon . Blah blah nyingi View attachment 1256128

That PDF is shit, unajua maana ya binary? unajua na maana ya algorithm?
Acha unyoko sina muda wa kubishana na wewe hii ndiyo message naandika kwako aisee.

Kuconvert binary to algorithm ni sawa na kusema nabadilisha computer iwe maharage, vitu viwili tofauti kabisa. Labda uniambie aliyeandika hajui kiingereza kiasi kwamba kaishia kuandika ugoro tu.

I'm done aisee, endelea kuhack we hacker, ninakuadd kwenye ignore list tu coz sina muda wa kupoteza na watu wanaojifanya wajuaji huku hakuna chochote wanachojua zaidi ya kucopy na kupaste.
 
ila babu wewe mbishi, arguments za jamaa hapo ziko valid kabisa, inaonekana hutaki kujifunza kwa njia ya kukosolewa.

Ungeweza hata ku google tu kuhusu hash kuwa reversible na ungepata jibu kama hili.

The definition of a cryptographic hash function includes resistance to preimages: given h(x), it should be infeasible to recover x. A hash function being "reversible" is the exact opposite of that property. Therefore, you can have no more a "reversible hash function" than you can have a fish allergic to water.

Acha ubishi, jifunze.
Kwahiyo hao smart guys ndo wamekudanganya md5 hazirud kwnye state yake ya mwanzo ??? Kama hujui uliza ...hio exploit inafanya kazi bila shida alafu unasema huna mda wa kusoma wakati umeingia umesoma tyr hio pdf, Hahaha wewe embu ngja nikuteme tu ...
 
ila babu wewe mbishi, arguments za jamaa hapo ziko valid kabisa, inaonekana hutaki kujifunza kwa njia ya kukosolewa.

ungeweza hata ku google tu kuhusu hash kuwa reversible na ungepata jibu kama hili

The definition of a cryptographic hash function includes resistance to preimages: given h(x), it should be infeasible to recover x. A hash function being "reversible" is the exact opposite of that property. Therefore, you can have no more a "reversible hash function" than you can have a fish allergic to water.

Acha ubishi, jifunze.
sio kujifunzaaaa ..siwez jiita niko perfect than others ....mbna wewe umekuja juu pale umeongea vzr nikarespond , huyu jmaaa kaja na lugha ya kejeri na dharau na inshort niko namuangalia tu hapa ...pengine lugha na uandishi sio mzur maana hio nakubali siko vzr kwnye undishiii ...ila hii exploit iko tested na 100% inafanyakaz ...sasa yeye anakuja anongea sijui zio codes juu hapo sio virus wakati nimeongea kabisa naitoa virus.exe to bs64 lengo tu ku paplz isiwe detected .....anyway naona hakuna sabbu ya kubishana kama nimeeeka uzi wa kipuuuzi ni sawa .
 
Na pia ukianglia yeye sijui ni programmer i don knw me ethcal hacker na nimebase kwenye penetration testing , lugha ya computer yangu huwaga na base kupita kwenye kizuizi chchte kwa njia yyte hata kama ni non sense....kwasabab haya mambo ukifanya kwa njia ambazo ziko public huwez chomoa . so samahanni kwa wote ambao hamjaeelewa mada ila ukianza jifunza misingi ya hacking utajua nachmaaanisha mfano katoa yeye mwenyewe kwamba md5 hashes haziwez rud kwenye normal state ...sasa hio ni kweli ukisoma kishule na wote tumefunzwa hivooo ILA UKIJA KWENYE HACKING MD5 NI MCHUMBA TU NA UNARUDISHA KWENYE NORMAL STATE IN 5 SEC. thats why dbs zinakuwa hacked sana hasa zenye kutumia hizo type za hashz (both salt na non salted) ....we r forcing shit to happen(always)
 
You have point there, nimekuelewa.
Na pia ukianglia yeye sijui ni programmer i don knw me ethcal hacker na nimebase kwenye penetration testing , lugha ya computer yangu huwaga na base kupita kwenye kizuizi chchte kwa njia yyte hata kama ni non sense....kwasabab haya mambo ukifanya kwa njia ambazo ziko public huwez chomoa . so samahanni kwa wote ambao hamjaeelewa mada ila ukianza jifunza misingi ya hacking utajua nachmaaanisha mfano katoa yeye mwenyewe kwamba md5 hashes haziwez rud kwenye normal state ...sasa hio ni kweli ukisoma kishule na wote tumefunzwa hivooo ILA UKIJA KWENYE HACKING MD5 NI MCHUMBA TU NA UNARUDISHA KWENYE NORMAL STATE IN 5 SEC. thats why dbs zinakuwa hacked sana hasa zenye kutumia hizo type za hashz (both salt na non salted) ....we r forcing shit to happen(always)
 
Back
Top Bottom