ALERT!
Click here to register with a few steps and explore all our cool stuff we have to offer!

Jump to content



Photo

CVE 2017-8570 to CVE 2017-11882 RE-BRANDED


  • Please log in to reply
CVE 2017-8570 to CVE 2017-11882 RE-BRANDED

#101

soldierhoodnigg
soldierhoodnigg
    Offline
    0
    Rep
    0
    Likes

    Lurker

Posts: 5
Threads: 0
Joined: Feb 16, 2020
Credits: 0
Four years registered
#101

its not lavioSAR its laviaohSAH


  • 0

#102

hkiller
hkiller
    Offline
    0
    Rep
    0
    Likes

    Lurker

Posts: 7
Threads: 0
Joined: Apr 16, 2019
Credits: 0
Five years registered
#102

thanxs bro  :wub:


  • 0

#103

saviour50
saviour50
    Offline
    0
    Rep
    0
    Likes

    New Member

Posts: 22
Threads: 0
Joined: Apr 23, 2020
Credits: 0
Four years registered
#103
I have a word exploit which is mostly detectable by most Antivirus engines. It is written in Python so I need you to refud it for me. Please can you do it and for how much?

I shared my experience days ago about my team and i working to REFUD custom CVE some cluelessly said all manners of rubbish.
This is link to my thread https://www.nulled.t...loit-by-my-team
 
Now am going to show you a sample of a custom CVE

 
This is a file given to my group which is 21/32
 
Now after playing around we could clean it up to 6/32

 
Also some people said 2017-11882 is patched
Answer is "YES" but 11882 executes when the memory allocated is corrupted then it has 4.523 secs to execute command line.
But when you drop it from another RTF it has 8.193 secs to execute. Since microsoft words opens a WBK file. We just rename extension to plugin.wbk as seen below.

 
Here comes the trick to bypass Microsoft Patch. This was sold on the dark web for 4000 AED.
Everyone is now unto CVE 2018-0802, CVE 2018-8414, CVE 2018-8714 but the secret is that non works as much as CVE 11882. All you have to do is embed into CVE 2017-8570
 
CVE 2017-8570 is fully silent and FUD/UD in some cases. All attachable via any mail server, any email client and any chat forum.
CVE 2017-8570 
This link above proves that it works on an updated PC as of 09/14/2018
app.any.run PC are always updated and patch installed.
 
Now i will explain deeper. CVE 2017-8570 downloads CVE 2017-11882 as plugins.wbk and executes a HTA command which is asked to download a crypted LOKI bot and executed silently. 
 
 
This technique got me closely 200 bots in 2 days via email spreading
My Bot Chart: 
My Total Bots in 2days: 
 
So please for those saying exploits sellers are all SCAMS and FAKE. This is prove that FUD/UD exploits still exists. Just do the right research
 
 
My team is looking forward to more customers from nulled. 
 
Got an issue with SMTP? Get my PMTA guide here
 
https://www.nulled.t...0-inbox-rate/  Unlimited SMTP until the VPS is shutdown by its administrator.

i

  • 0

#104

XploitBypass
XploitBypass
    Offline
    0
    Rep
    0
    Likes

    New Member

Posts: 13
Threads: 0
Joined: May 02, 2019
Credits: 0
Four years registered
#104

Thanks for this!


  • 0

#105

turkcoderz
turkcoderz
    Offline
    0
    Rep
    0
    Likes

    Member

  • PipPipPip
Posts: 30
Threads: 1
Joined: May 21, 2020
Credits: 0
Three years registered
#105

denemek la?m


  • 0

#106

MadYT
MadYT
    Offline
    0
    Rep
    -1
    Likes

    Member

  • PipPipPip
Posts: 34
Threads: 0
Joined: Mar 20, 2020
Credits: 0

Four years registered
#106

actual mad lad


  • 0

#107

mcryoto0
mcryoto0
    Offline
    0
    Rep
    0
    Likes

    New Member

Posts: 10
Threads: 0
Joined: May 15, 2020
Credits: 0
Three years registered
#107

thankss


  • 0

#108

2136326829
2136326829
    Offline
    0
    Rep
    0
    Likes

    New Member

Posts: 12
Threads: 0
Joined: Oct 21, 2020
Credits: 0
Three years registered
#108

Nice one


  • 0


 Users browsing this thread: