• XSS.stack #1 – первый литературный журнал от юзеров форума

is Ransomware really profitable?

Its not easy to filter and target your targets not all people have the skills in social engineering And iam on those who dont have this skill , but i have the skills to create my Own tool .. so yes these are two different issues !☹️
Before social Engineering recon is needed ... if you know your target well nothing can stop you from getting all the Needed access
 
Python/Golang coding (exploit writing)
CVE experience about understanding and writing global fuzzing tools for vulns.
*nix system experience.
Msf/CS experience.
Experience on public pentest frameworks such as codiac, PowershellEmpire etc.
.LNK/XLSX/.BAT/.ISO extensions crypting and creating experience. (Can work with office win32 macros).
Windows internal experience, DomainAdmin, CredentialHarvest etc.
Have qualified experience operational security (OPSEC).

I can work any team with good income :)
PM for requests.
 
Python/Golang coding (exploit writing)
CVE experience about understanding and writing global fuzzing tools for vulns.
*nix system experience.
Msf/CS experience.
Experience on public pentest frameworks such as codiac, PowershellEmpire etc.
.LNK/XLSX/.BAT/.ISO extensions crypting and creating experience. (Can work with office win32 macros).
Windows internal experience, DomainAdmin, CredentialHarvest etc.
Have qualified experience operational security (OPSEC).

I can work any team with good income :)
PM for requests.
Bro if you have all those SKILLS why LOOKING FOR EMPLOYEMNT...??? YOU can have a TEAM on your own ..

Have same minded people and work on your GOALS
 
Super talented ... LETS WORK if possible boss
Do u know how to work with AD?
Do u know how to use msf and cobalt?
Do u know how to up from LU/LA to DC?
Do u have active exploits for VPN and Rdp?
If yes i can provide materials to work with. Maybe with lab also :)
 
Последнее редактирование:
Пожалуйста, обратите внимание, что пользователь заблокирован
Почитай посты pentesterMaster) Он даже гуглить не умеет, какой там пентест...

Read pentesterMaster posts. He even can't google things, what pentest are you talking about :D
 
Почитай посты pentesterMaster) Он даже гуглить не умеет, какой там пентест...

Read pentesterMaster posts. He even can't google things, what pentest are you talking about :D
Da znayu prosta xochu uslishat ot yevo, Balabolli on ili net. Pust dakajut shto on the real mega ultra super sonic pentester =)
 
Последнее редактирование:
hey bros, I has began coding my own Ransomware and I was wondering if this business model is profitable. In your experience, what you guys think about that? I see two ways to make profit coding ransomware.... 1) Selling them to ransomware groups or 2) using them to promoting our own attacks. Is that really profitable? What do you think about?
In my opinion it's profitable only if you have a Big team and the company you hit with you're ransomware Have confidence in you. Also you need to be really good at social engineering, and coding. And you need budget if you want to skip thé social engineering part, exploit known vuln or 0day that require a lot of money or good skill AT reverse engineering
 
In my opinion it's profitable only if you have a Big team and the company you hit with you're ransomware Have confidence in you. Also you need to be really good at social engineering, and coding. And you need budget if you want to skip thé social engineering part, exploit known vuln or 0day that require a lot of money or good skill AT reverse engineering
Сколько не читал интервью с рансомщиками все они как один пишут что ломают корпы эксплоитами с гитхаба.
 
In my opinion it's profitable only if you have a Big team and the company you hit with you're ransomware Have confidence in you. Also you need to be really good at social engineering, and coding. And you need budget if you want to skip thé social engineering part, exploit known vuln or 0day that require a lot of money or good skill AT reverse engineering
This is wholly untrue. I have found several large businesses/corporations exposing their entire infrastructure with no host isolation, virtualization, or otherwise... off-site NAS creds on desktops, everything. Not sure where experience with RE would be necessary, unless that, too, was a reference to exploit development.
 
Do u know how to work with AD?
Do u know how to use msf and cobalt?
Do u know how to up from LU/LA to DC?
Do u have active exploits for VPN and Rdp?
If yes i can provide materials to work with. Maybe with lab also :)
Bro ..those are CHILDISH stuffs... a lot of materials are out there for FREE
 
Bro ..those are CHILDISH stuffs... a lot of materials are out there for FREE
What childish stuff u mean from my side exactly? I am offering u partnership not asking ur stuff. U got those knowledges and things or not? I need answer for that question!
 
Bro ..those are CHILDISH stuffs... a lot of materials are out there for FREE
How is demonstrative proficiency with server edt environments childish at all? Regardless, your interpretation of skill maturity don't really make a difference with regards to requisition
 
Do u know how to work with AD?
Do u know how to use msf and cobalt?
Do u know how to up from LU/LA to DC?
Do u have active exploits for VPN and Rdp?
If yes i can provide materials to work with. Maybe with lab also :)
You asked what is AD... who does not know about AD and want to have a ransomware ops...??

Local account to AD ACCOUNT ..use bloodhound will help you to get all the paths necessary
 
1702241518840.png
 
Сколько не читал интервью с рансомщиками все они как один пишут что ломают корпы эксплоитами с гитхаба.
еще сегодня в паблике это вчерашние пиздюки которые в чатах тг лизали очки вайтам и говорили что ранс х#йня для даунов
 
Последнее редактирование:
hey bros, I has began coding my own Ransomware and I was wondering if this business model is profitable. In your experience, what you guys think about that? I see two ways to make profit coding ransomware.... 1) Selling them to ransomware groups or 2) using them to promoting our own attacks. Is that really profitable? What do you think about?
Согласно гражданскому иску о конфискации имущества, поданному офисом ФБР в Далласе, это, по-видимому, очень выгодно. Я не могу вспомнить, какая сумма была возвращена, но она составляла где-то от 4 до 200 миллионов долларов. Я не могу вспомнить ни группу, ни имя пользователя партнера, но я помню, что проходил мимо обсуждений год назад.
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх