• XSS.stack #1 – первый литературный журнал от юзеров форума

my first successful malware attack with stealer

Str0ng

(L3) cache
Забанен
Регистрация
28.04.2024
Сообщения
201
Реакции
46
Гарант сделки
4
Пожалуйста, обратите внимание, что пользователь заблокирован
Hello everyone, I want to share with you a screenshot of an email I accessed after my first, successful malware attack,
to start with all this, I got user and password of the mail of the police of a country that I can not name at least for now, after that I prepared my stealer and an office document that downloaded and executed the stealer, including other malware but apparently the backdoor was detected, although even so the stealer was executed successfully, and I managed to get mail credentials of the same company to which I had access, but in this case another user and password, plus access to another web platform that is not the mail.

police.png
 
mail of the police of a country that I can not name at least for now
Thank you for sharing with us that you have access to Policia national del Peru employee mail.
And I also admire your level of paint
Congratulations!
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Thank you for sharing with us that you have access to Policia national del Peru employee mail.
And I also admire your level of paint
Congratulations!
thanks for the sarcasm my friend, I'm a novice at painting xaxaxa
;)
 
Hello everyone, I want to share with you a screenshot of an email I accessed after my first, successful malware attack,
to start with all this, I got user and password of the mail of the police of a country that I can not name at least for now, after that I prepared my stealer and an office document that downloaded and executed the stealer, including other malware but apparently the backdoor was detected, although even so the stealer was executed successfully, and I managed to get mail credentials of the same company to which I had access, but in this case another user and password, plus access to another web platform that is not the mail.

Посмотреть вложение 86493
Why would you want to expose the proxy service you use? This is a fatal vulnerability
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Why would you want to expose the proxy service you use? This is a fatal vulnerability
proxy service?
you mean my vpn maybe ?
 
Пожалуйста, обратите внимание, что пользователь заблокирован
congratulations, although don't be so eager to share such things. might come back to bite you :))
It is prohibited to publish this type of things ?
 
It is prohibited to publish this type of things ?
No but it could be used a evidence against you if you ever get arrested for any reason (if they link you to your xss account). You're fine just stay safe.:smile10:
 
Hi everyone, I'm a beginner in the field of phishing, I would like to have your opinion and your advice! I have access through my friend to a large company of a billionaire, I would like to have the log of the secretary who has a .live email address in order to have access to his account, what is the best way to go about it, I found on GitHub a phishing kit outlook write in php, should I attack this person through a scamepage outlook?

thanks
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх