• XSS.stack #1 – первый литературный журнал от юзеров форума

Sale of various accesses

В этой теме можно использовать автоматический гарант!

Статус
Закрыто для дальнейших ответов.

dealfixer

CD-диск
Пользователь
Регистрация
01.02.2024
Сообщения
14
Реакции
0
I AM Looking for a team which can lock networks and not related to lockbit because they dont pay Requirments
1 You have OWN c2 Servers like cobalt strike or any rat and own team which can do lateral movement
2 you have fully undetected malware and can bypass edr
3 You have active team members who are ready to fight and win lets earn together
TOX @ 0E5C92254EF1DFDE0036CBA306A78E312B6B738DCBFAB41D164C48CE2F42782C0D3E043069B6

NO Scammers or Time wasters will be entertained only serious people must text who are willing to make money!
 
Последнее редактирование модератором:
AgentOS: linux
Hostname: vubiquity.com
OnlyFrom:
Found process list
(root,21444,1400,01:08:34/492-05:27:54,1) /sbin/init
(root,0,0,00:00:00/492-05:27:54,2) [kthreadd]
(root,0,0,00:00:51/492-05:27:54,3) [migration/0]
(root,0,0,00:00:00/492-05:27:53,113) [crypto/5]
(root,0,0,00:00:00/492-05:27:53,120) [kthrotld/0]
(root,0,0,00:00:00/492-05:27:53,121) [kthrotld/1]
(root,0,0,00:00:00/492-05:27:53,122) [kthrotld/2]
(root,0,0,00:00:00/492-05:27:53,123) [kthrotld/3]
(root,0,0,00:00:00/492-05:27:53,124) [kthrotld/4]
(root,0,0,00:00:00/492-05:27:53,125) [kthrotld/5]
(root,0,0,00:00:00/492-05:27:53,139) [pciehpd]
(root,0,0,00:00:00/492-05:27:52,143) [kpsmoused]
(root,0,0,00:00:00/492-05:27:52,144) [usbhid_resumer]
(root,0,0,00:00:00/492-05:27:52,145) [deferwq]
(root,0,0,00:00:00/492-05:27:52,177) [kdmremove]
(root,0,0,00:00:00/492-05:27:52,178) [kstriped]
(root,0,0,00:00:00/492-05:27:51,777) [scsi_eh_0]
(root,0,0,00:00:00/492-05:27:51,778) [scsi_eh_1]
(root,0,0,00:00:00/492-05:27:51,779) [scsi_eh_2]
(root,0,0,00:00:00/492-05:27:51,780) [scsi_eh_3]
(root,0,0,00:00:00/492-05:27:51,781) [scsi_eh_4]
(root,0,0,00:00:00/492-05:27:51,782) [scsi_eh_5]
(root,0,0,00:00:00/492-05:27:51,804) [scsi_eh_6]
(root,0,0,00:51:22/492-05:27:50,931) [jbd2/sda2-8]
(root,0,0,00:00:00/492-05:27:50,932) [ext4-dio-unwrit]
(root,0,0,04:47:43/492-05:27:49,941) [flush-8:0]
(root,11084,1132,00:00:02/492-05:27:46,1038) /sbin/udevd -d
(root,0,0,00:09:53/492-05:27:45,1184) [edac-poller]
(root,0,0,00:00:22/492-05:27:44,1206) [kipmi0]
(root,64344,1180,01:19:09/490-09:12:46,1295) /usr/sbin/sshd
(root,0,0,00:00:00/492-05:27:42,1755) [jbd2/sda1-8]
(root,0,0,00:00:00/492-05:27:42,1756) [ext4-dio-unwrit]
(root,0,0,00:28:15/492-05:27:41,1803) [kauditd]
(root,11080,1080,00:00:00/490-09:00:03,1939) /sbin/udevd -d
(root,11080,1080,00:00:00/490-09:00:03,1940) /sbin/udevd -d
(root,93156,860,01:45:19/492-05:27:26,2228) auditd
(root,249092,1604,23:50:44/492-05:27:25,2251) /sbin/rsyslogd -i /var/run/syslogd.pid -c 5
(root,18380,824,01:19:07/492-05:27:25,2285) irqbalance --pid=/var/run/irqbalance.pid
(dbus,33900,1160,00:00:13/492-05:27:25,2303) dbus-daemon --system
(root,4080,628,00:00:00/492-05:27:24,2342) /usr/sbin/acpid
(haldaemon,40608,2584,00:04:04/492-05:27:24,2354) hald
(root,20400,1036,00:00:00/492-05:27:24,2355) hald-runner
(root,22548,1120,00:00:00/492-05:27:23,2388) hald-addon-input: Listening on /dev/input/event4 /dev/input/event0 /dev/input/event1
(haldaemon,18008,1000,00:00:00/492-05:27:23,2402) hald-addon-acpi: listening on acpid socket /var/run/acpid.socket
(nscd,976416,1816,02:13:08/492-05:27:23,2418) /usr/sbin/nscd
(root,198608,6020,2-04:09:57/492-05:27:22,2546) /usr/sbin/snmpd -LS0-6d -Lf /dev/null -p /var/run/snmpd.pid
(root,21928,892,00:00:13/492-05:27:21,2574) xinetd -stayalive -pidfile /var/run/xinetd.pid
(ntp,32248,1976,00:05:39/492-05:27:21,2585) ntpd -u ntp:ntp -p /var/run/ntpd.pid -g
(root,80308,3300,00:14:45/492-05:27:20,2670) /usr/libexec/postfix/master
(postfix,79684,3468,00:24:44/492-05:27:20,2682) qmgr -l -t fifo -u
(nobody,151288,2072,00:11:33/492-05:27:20,2683) proftpd: (accepting connections)
(root,181420,1752,00:00:00/492-05:27:19,2710) /usr/sbin/abrtd
(root,118664,7688,00:26:29/492-05:27:19,2726) /opt/aspera/sbin/asperacentral
(root,2125404,16420,06:19:03/492-05:27:19,2739) /opt/aspera/sbin/asperanoded
(root,128592,2392,10:44:04/492-05:27:18,2760) /opt/aspera/sbin/asperaredisd 127.0.0.1:31415
(root,358184,3676,02:42:06/492-05:27:18,2763) /opt/aspera/sbin/asperarund
(root,114988,1280,00:12:50/492-05:27:18,2781) crond
(root,19428,476,00:00:10/492-05:27:18,2796) /usr/sbin/atd
(root,100936,584,00:00:36/492-05:27:18,2808) rhnsd
(root,11388,76,00:00:00/492-05:26:47,2874) filebeat-god -r / -n -p /var/run/filebeat.pid -- /usr/bin/filebeat -c /etc/filebeat/filebeat.yml
(root,412796,14712,05:05:19/492-05:26:47,2875) /usr/bin/filebeat -c /etc/filebeat/filebeat.yml
(root,4064,528,00:00:00/492-05:26:47,2900) /sbin/mingetty /dev/tty2
(root,4064,528,00:00:00/492-05:26:47,2902) /sbin/mingetty /dev/tty3
(root,4064,528,00:00:00/492-05:26:47,2904) /sbin/mingetty /dev/tty4
(root,4064,528,00:00:00/492-05:26:47,2906) /sbin/mingetty /dev/tty5
(root,4064,528,00:00:00/492-05:26:47,2908) /sbin/mingetty /dev/tty6
(root,97116,2508,00:00:00/492-04:58:11,3269) login -- tvn_catcher
(root,3133644,2628,00:00:02/492-04:57:59,3280) /usr/sbin/console-kit-daemon --no-daemon
(tvn_catcher,106456,1524,00:00:00/492-04:57:59,3346) -bash
(root,178968,2320,00:00:00/492-04:57:55,3369) su
(root,106588,1676,00:00:00/492-04:57:52,3375) bash
(root,193700,6984,01:29:53/490-04:34:54,6572) /usr/bin/python /opt/fes/fes.py --debug --daemon
(postfix,79660,3488,00:00:00/42:55,17880) cleanup -z -t unix -u
(postfix,79824,4060,00:00:00/42:05,17906) local -t unix
(postfix,79824,4064,00:00:00/40:55,17949) local -t unix
(postfix,79660,3492,00:00:00/22:55,18516) cleanup -z -t unix -u
(postfix,79524,3340,00:00:00/22:05,18534) trivial-rewrite -n rewrite -t unix -u
(postfix,79516,3376,00:00:00/11:55,18789) pickup -l -t fifo -u
(root,115776,4264,00:00:00/07:43,18891) sshd: tvn_catcher [priv]
(tvn_catcher,115776,1912,00:00:00/07:42,18895) sshd: tvn_catcher@notty
(tvn_catcher,539160,75028,00:01:37/07:42,18896) ascp -S. -V1
(postfix,79556,3408,00:00:00/05:55,18955) bounce -z -t unix -u
(postfix,79556,3412,00:00:00/02:55,19025) bounce -z -t unix -u
(root,173936,2496,00:00:00/00:05,19098) CROND
(root,173936,2496,00:00:00/00:05,19099) CROND
(root,103256,728,00:00:00/00:05,19103) ping -c1 8.29.164.143
(root,103256,736,00:00:00/00:05,19104) ping -c1 10.4.99.89
(root,67792,3308,00:00:00/00:04,19115) sshd: [accepted]
(sshd,67792,1616,00:00:00/00:03,19116) sshd: [net]
(root,108388,1372,00:00:00/00:00,19174) /bin/bash /usr/bin/check_mk_agent
(root,11476,912,00:00:00/00:00,19193) ps ax -o user:32,vsz,rss,cputime,etime,pid,command --columns 10000
(root,8392,812,00:00:00/00:00,19194) sed -e 1d -e s/ *\([^ ]*\) *\([^ ]*\) *\([^ ]*\) *\([^ ]*\) *\([^ ]*\) *\([^ ]*\) */(\1,\2,\3,\4\/\5,\6) /

Found network interfaces through CheckMk:
[start_iplink]
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP qlen 1000
link/ether 0c:c4:7a:1d:40:80 brd ff:ff:ff:ff:ff:ff
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP qlen 1000
link/ether 0c:c4:7a:1d:40:81 brd ff:ff:ff:ff:ff:ff
4: eth2: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP qlen 1000
link/ether 0c:c4:7a:1d:40:82 brd ff:ff:ff:ff:ff:ff
5: eth3: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN qlen 1000
link/ether 0c:c4:7a:1d:40:83 brd ff:ff:ff:ff:ff:ff
6: eth4: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN qlen 1000
link/ether 0c:c4:7a:6b:6b:10 brd ff:ff:ff:ff:ff:ff
7: eth5: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN qlen 1000
link/ether 0c:c4:7a:6b:6b:11 brd ff:ff:ff:ff:ff:ff
[end_iplink]
 
I Deal Quality Network access and looking for long term partners who are willing to fight hard if you have own lockers / c2 servers / fud payloads to bypass edrs i can implant the malware to domain controllers!
 
Статус
Закрыто для дальнейших ответов.
Верх