Welcome, Guest
You have to register before you can post on our site.

Username
  

Password
  





Search Forums

(Advanced Search)

Forum Statistics
» Members: 344
» Latest member: Waltermefly
» Forum threads: 100
» Forum posts: 125

Full Statistics

Online Users
There are currently 23 online users.
» 0 Member(s) | 22 Guest(s)
Google

Latest Threads
Waltermefly
Навігатор перевіреними но...

Forum: Announcement
Last Post: Waltermefly
9 hours ago
» Replies: 0
» Views: 2
RobertBoype
Актуальні українські меді...

Forum: Announcement
Last Post: RobertBoype
Yesterday, 01:50 PM
» Replies: 0
» Views: 4
CesarclorO
Напишите отзыв о проекте,...

Forum: Announcement
Last Post: CesarclorO
05-13-2026, 08:23 AM
» Replies: 0
» Views: 10
CesarclorO
Оставьте впечатления о са...

Forum: Announcement
Last Post: CesarclorO
05-13-2026, 07:22 AM
» Replies: 0
» Views: 6
Vincenthom
Теми яких ви не крутять в...

Forum: Announcement
Last Post: Vincenthom
05-11-2026, 10:47 AM
» Replies: 0
» Views: 14
Vincentsek
Теми яку ти обходить стор...

Forum: Announcement
Last Post: Vincentsek
05-11-2026, 07:30 AM
» Replies: 0
» Views: 12
WalterDob
Сюжети яку ти не покажуть...

Forum: Announcement
Last Post: WalterDob
05-10-2026, 04:13 PM
» Replies: 0
» Views: 10
MatthewLew
Напишите отзыв о портале,...

Forum: Announcement
Last Post: MatthewLew
05-10-2026, 12:16 PM
» Replies: 0
» Views: 11
MatthewLew
Поделитесь мнением о порт...

Forum: Announcement
Last Post: MatthewLew
05-10-2026, 11:50 AM
» Replies: 0
» Views: 8
Rodolhaf
унікальні матеріали з тем...

Forum: Announcement
Last Post: Rodolhaf
05-08-2026, 06:49 PM
» Replies: 0
» Views: 10

 
  Poveste: "Mâinile virtuale în spatele ecranului real"
Posted by: Unix_Root - 06-14-2025, 03:41 PM - Forum: Hot Topics - No Replies

Real Screen"
(How a Screen Sharing Tool Became a Hacker's Window)

[Image: 1f4cd.png]Chapter 1 - Missing Contract
A technology company specializing in software development for a major banking company in the ASEAN region. On the day of the project submission, the client's feedback:
"Unfortunately, your opponent came up with a better pricing package - and, strangely enough, understands the entire architecture you proposed."
This company never shared the architecture with anyone except internally.
I was invited to investigate.

[Image: 1f50e.png] Chapter 2 - No Poison Code, No Attack
Scan the entire system endpoint, server, email - no ransomware detection, no strange VPN access, no manipulation of suspicious printing or sending files.
But while testing a PM’s (Project Manager) device, I noticed the “ScreenShare Pro” app – a free screen sharing software, manually installed 2 months ago.
“I use it for demo calls with foreign vendors. They say this software is easier to use than Zoom.” – The PM replied.

[Image: 1f9e0.png] Chapter 3 - Deep Investigation Analysis
I threw away the event logs and found:
• ScreenShare Pro opens the session without warning, lasts 45 minutes
• Meanwhile, the user opens files: Project_Proposal_V4. pptx, DB_Design_Confidential. vsdx
• This app doesn't save meeting logs and doesn't show the red frame to warn about sharing
I teamed up with Wireshark and found:
• It's connecting strange TLS to an unknown address server (running on anonymous VPS)
• The protocol used is proprietary - it can't be decoded, but the traffic is quite large, suitable for visual television

[Image: 1f575.png] [Image: 2642.png] Chapter 4 - The user is exploited
I reset my timeline:
1. The seller asks the PM to install screen sharing software "easier than Z"
2. Download PM from external link (not official website)
3. Every time the demo calls, the seller asks "turn on screen sharing of the entire desktop to easily monitor the operation"
4. One of those times - the moment when the PM opens technical documents to copy paste architectural demo

[Image: 1f4cc.png] Investigation conclusion
• Vector intrusion: Use of trust, forcing victims to install unwanted software
• Behavior: Use screen sharing to record the screen without the need for unique codes or machine hacking.
• Impact level: Leak product architecture, suggest competitors, and convince customers.

[Image: 26a0.png] Lesson learned
It’s not the file you send that’s dangerous – it’s what you display.
Modern hackers don’t have to pick locks – they’re waiting for you… Enable sharing at the right time.

Print this item

  Awesome resource of free courses
Posted by: Kael - 06-14-2025, 02:19 PM - Forum: Hot Topics - No Replies

Do you want to learn ethical hacking, pentesting, OSINT, or digital forensics without spending a dime? Here's an awesome resource:

XXXXX(Violation of Forum rules)

You'll find premium courses completely free, from beginner intros to certification prep like CEH, OSCP, CompTIA, and more.

? Perfect for those just starting out or looking to level up without financial barriers.

Print this item

  WPProbe is a lightweight, fast and reliable tool to discover WordPress.
Posted by: Unix_Root - 06-14-2025, 10:44 AM - Forum: Popular tools - Replies (2)

Especially useful for cybersecurity professionals looking for maximum coverage with minimal detection. ‚
? Operation modes
1️⃣ Stealthy (stealth) - Default method:
- Check for exposed routes, such as? rest_route=/plugins/...
- Compare discovered routes with known patterns
- Get the module version (when available) and compare it to known vulnerabilities (CVE)
2️⃣ Brute Force
- Try to access the plugin directory directly (p. EJ. : /wp-content/plugins/name)
- Detect modules whose route does not throw a 404 error
- Get versions and CVE maps
3️⃣ Hybrid
- Start in stealth mode.
- Then brute force it into what was not initially detected
- Provides maximum range while maintaining discretion
?️ https://github.com/Chocapikk/wpprobe



Attached Files Thumbnail(s)
   
Print this item

  A curated list of awesome search engines useful during Penetration testing.
Posted by: Unix_Root - 06-14-2025, 10:33 AM - Forum: Red Teaming - Replies (1)

https://awesome-hacker-search-engines.com

Print this item

  NEWBIE HERE!
Posted by: zyphyrus - 06-14-2025, 09:23 AM - Forum: General discussion - Replies (1)

Good Day, I am just a newbie here. I would like to thank the administrators for accepting me here. Thank you!

Print this item

  ?️ OSINT Tools for gathering information and actions forensics ?️
Posted by: Unix_Root - 06-13-2025, 10:10 PM - Forum: Hot Topics - Replies (1)

https://github.com/danieldurnea/FBI-tools

Print this item

  ZigStrike
Posted by: Mr.Z - 06-13-2025, 07:35 PM - Forum: Popular tools - No Replies

I have released ZigStrike toolkit last year and it is still under heavy development. I decided to code in Zig which I believe the next C successor. ZigStrike is designed to assist Offsec in their operations, converting a shellcode into portable extension(DLL/XLL/CPL) which can be used to leveraged to execute the shellcode, ZigStrike offers several features and powerful options with frequent updates. 

Features ( release 2.0 )

  • Multiple Injection Techniques:
    • Local Thread
    • Local Mapping
    • Remote Mapping
    • Remote Thread hijacking
    • EarlyCascade injection
  • Anti-Sandbox Protection:
    • TPM Presence Check.
    • Domain Join Check.
    • Run-Time protection.
  • Output Formats:
    • XLL (Excel Add-in)
    • DLL
    • CPL
  • Advanced Features:
    • Shellcode advanced allocation.
    • Payload Runtime protection; preventing emulation and sandbox dynamic anaylsis.
    • Bypass common detection rules.
  • Front-end enhancement:
    • Added new page to view generated payloads.
    • Detailed information for each created payload.
    • Fix flask issue to support uploading large shellcode.
Prerequisites
  • Zig 0.14.0
  • Ubuntu / Debian
  • Python 3.x (for the web interface) with Flask 

Link : https://github.com/0xsp-SRD/zigStrike/

Print this item

Wink Hello!
Posted by: cre/on - 06-13-2025, 06:05 PM - Forum: General discussion - Replies (9)

As there is no post yet, I just want be the first to say HELLO!

Print this item

  Rating System
Posted by: Mr.Z - 06-12-2025, 08:45 PM - Forum: Announcement - Replies (1)

Hello everyone,
We’re excited to announce the introduction of a new profile rating system for participants in the Ired DEV forums. As with many thriving communities, we believe this system will help recognize contributions, encourage engagement, and build a more connected experience for everyone.
To start, we’ve outlined the ranking system based on the number of posts a member has made:

Code:
| **Rank**        | **Minimum Posts** |
| --------------- | ----------------- |
| Ghost Signal    | 0                 |
| Packet Phantom  | 20                |
| Hacker          | 100               |
| System Intruder | 260               |
| Master          | 750               |


These ranks will be displayed on user profiles and may evolve over time as we expand the forum. We're also considering adding more features like badges, achievements, and other reputation metrics to make your forum experience even more rewarding.
Stay tuned for updates, and thank you for being part of the Ired DEV community!

Print this item

  Welcome to IRed Dev Forums – Now Open
Posted by: Mr.Z - 06-09-2025, 03:50 PM - Forum: Announcement - Replies (1)

Hey everyone!

We're excited to officially launch the IRed Dev Forums — your new go-to hub for everything cybersecurity, ethical hacking, open-source tools, and the latest in security news, vulnerabilities, and all things related to the infosec world.
Our mission is to build a focused and active community where professionals, enthusiasts, and learners can share hot topics, discuss techniques, and stay updated with the pulse of the cybersecurity world.

Whether you're into pen-testing, malware analysis, red/blue teaming, or just exploring the newest open-source utilities — this is the place for you!


Forum Rules & Code of Conduct?

To keep this a safe, professional, and legally compliant space, we have zero tolerance for the following:
No cracked software/tools
No sharing of private or unknown exploits
No illegal content of any kind
No pornography, political debates, or off-topic drama
No copyrighted material distribution
This forum is strictly for educational, research, and discussion purposes within the boundaries of the law. We're here to learn and grow — not to cross ethical or legal lines.


✅ What You Can Share ?

✅ Cybersecurity news and trends
✅ Ethical hacking techniques & write-ups
✅ Public/open-source tools & resources
✅ Vulnerability disclosures (public & responsible)
✅ Tips, guides, and constructive questions/discussions

We’re looking forward to building something great together. Let’s keep the discussions clean, sharp, and high-signal.
? Start posting, introduce yourself, and let’s kick things off!
Welcome to IRed Dev.


— The IRed.Dev Team

Print this item