Your IP : 172.28.240.42


Current Path : /var/www/html/clients/amz.e-nk.ru/9i3d21/index/
Upload File :
Current File : /var/www/html/clients/amz.e-nk.ru/9i3d21/index/double-pulsar-exploit.php

<!DOCTYPE html>
<html lang="en">
<head>

	
  <meta charset="utf-8">

	
  <meta http-equiv="X-UA-Compatible" content="IE=edge">

	
  <meta name="viewport" content="width=device-width, initial-scale=1, maximum-scale=1">

  <style>
body { 
	background-color:#ffffff;
	}
body, .cfsbdyfnt {
	font-family: 'Oswald', sans-serif;
	font-size: 18px;
}
h1, h2, h3, h4, h5, h5, .cfsttlfnt {
	font-family: 'Playfair Display', serif;
}

.panel-title { font-family: 'Oswald', sans-serif; }

  </style>

	
  <title></title>

  <style id="sitestyles">
	@import url( solid #1b2a29}#outhdr .lr-borders{border-left:1px solid #609892;border-right:1px solid #609892;height:100%;max-height:3em;margin:15px 0}@media (max-width:767px){#outhdr .lr-borders{border-left:0 solid #609892}}a,a:hover{color:#379078;text-decoration:none}h2{color:#426965}.pagetitle h1{color:#00a097}#innersite{padding:0}.container-body{background:transparent!important}.btn-default{color:#fff!important;border-color:#426965!important;background-color:#426965!important}.btn-default:hover{color:#426965!important;background-color:#fff!important;border-color:#fff!important}.btn-primary{color:#426965!important;border-color:#426965!important;background-color:rgba(255,255,255,0)!important}.btn-primary:hover{color:rgba(255,255,255,0)!important;background-color:#426965!important;border-color:#426965!important}.btn-info{color:#fff!important;border-color:#000!important;background-color:#000!important}.btn-info:hover{color:#000!important;background-color:#fff!important;border-color:#fff!important}.btn-success{color:#000!important;border-color:#000!important;background-color:light!important}.btn-success:hover{color:light!important;background-color:#000!important;border-color:#000!important}.btn-white{color:#fff!important;border-color:#fff!important;background-color:rgba(255,255,255,0)!important}.btn-white:hover{color:rgba(255,255,255,0)!important;background-color:#fff!important;border-color:#fff!important}#inbdy .btn{border:2px solid;line-height:1.2;margin-left:10px;margin-right:10px}.btn-primary:hover{color:#fff!important}#site button,#site .btn,#site .btn-small,#site .btn-lg,#site .tmslider .btn{transition:all .8s ease;border-radius:25px;font-size:;padding:.5em .7em;letter-spacing:1px}#site .zonetools .btn,#site .edimg{transition:initial;border-radius:initial;font-size:14px;padding:2px 5px;letter-spacing:initial}#inbdy{max-width:1366px}.topstrip{color:#fff;background:#1b2a29;border-bottom:0 solid #379078}.topstrip .row{max-width:1366px;float:none;margin:auto}.topstrip a{color:#000}.topstrip a:hover{color:rgba(66,105,101,.85)}.topstrip .txttkn a{color:#426965}.topstrip .txttkn a:hover{color:rgba(66,105,101,.85)}.topstrip .addressitem{margin:20px 5px}@media (min-width:992px){.topstrip .addressitem .lbtel,.topstrip .addressitem .number,.topstrip .addressitem .vsep{display:none}.topstrip .addressitem [itemprop="streetAddress"]:after{content:" | "}}.topstrip [data-typeid="TextBlock"]{animation:slideInDown 2s ease}@media (max-width:767px){.topstrip [data-typeid="TextBlock"]{font-size:.7em}}.topstrip [data-typeid="TextBlock"] p{margin:15px 5px}@media (max-width:767px){.topstrip [data-typeid="TextBlock"] p{font-size:;padding-top:8px}}@media (max-width:767px){#block-inhdr .navbar-toggle,#block-outhdr .navbar-toggle{padding:4px 4px}#block-inhdr .navbar-toggle .icon-bar,#block-outhdr .navbar-toggle .icon-bar{width:18px}}#block-inhdr .btn-social,#block-outhdr .btn-social{color:#fff!important;background-color:transparent;transition:all .5s ease}#block-inhdr .btn-social:hover,#block-outhdr .btn-social:hover{transform:scale(1.5);background-color:transparent;color:#6da49e!important}.img-thumbnail{border:none;border-radius:0;padding:0}#inbdy .form-control{border-radius:0;background:rgba(255,255,255,.5);border:1px solid #609892;margin-top:.35em;margin-bottom:.35em}#inbdy [data-type="formblocks"] .fmname{display:none}#inbdy [data-type="formblocks"] .well{box-shadow:none;background:rgba(0,160,151,.1);border:none}.navbar-brand{color:#fff!important}.navbar-brand{display:none!important}.cfshznav a{letter-spacing:1px;color:#fff!important;border-top:4px solid transparent}.cfshznav a:hover{color:#fff!important;background:#609892!important;border-top:4px solid #1b2a29}.cfshznav .open a{color:#fff!important;background:#609892!important;border-top:4px solid #1b2a29}.cfshznav .open a:hover{border-top:4px solid #1b2a29}.cfshznav .dropdown-menu{padding-top:0;padding-bottom:0;background:rgba(255,255,255,.95)!important}.cfshznav .dropdown-menu li a{color:#426965!important;background:transparent!important;font-size:.9em;padding-left:20px;padding-right:20px;padding-top:12px!important;padding-bottom:10px!important;text-transform:uppercase;border-top:0 solid transparent;border-left:-1px solid transparent;border-right:1px solid transparent;transition:background-color .2s}.cfshznav .dropdown-menu li a:hover{color:#426965!important;box-shadow:unset;border-left:5px solid #00a097;padding-left:15px;border-top:0 solid #609892}.navbar{background-color:#fff!important;border:0 solid #fff!important}.navbox{background-color:transparent!important}.js-clingify-locked .navbar{background-color:#fff!important;border:0 solid #fff!important}.js-clingify-locked .navbox{background-color:transparent!important}.navbarlocked{height:unset!important}.navbarlocked .dropdown-menu li a{background:#fff}#inhdr .upperbanner img{max-height:80px}@media (max-width:767px){#inhdr .upperbanner img{max-height:50px}}#strip{background:#fff!important}#strip [data-type="image"]{max-height:10em;overflow:hidden}#strip .page-title{text-shadow:none;background:rgba(66,105,101,.6)}#strip .page-title h1{color:#fff;margin:auto auto}@media (max-width:767px){#strip .page-title h1{font-size:}}.section-strip-item{color:#00a097!important}.section-strip-item a{color:#00a097!important}[data-typeid="inlinesearch"] input{border:1px solid #426965;border-radius:20px;height:40px;box-shadow:none;background:#3afff4;max-width:420px;float:right;margin:auto;margin-bottom:10px}[data-typeid="inlinesearch"] input .form-control{color:#fff!important}.homeobit-box{color:#000;padding-top:5px;padding-bottom:5px;max-width:1366px;float:none;margin:auto}.homeobit-box a,.homeobit-box a:hover,.homeobit-box p,.homeobit-box h1,.homeobit-box h2,.homeobit-box h3,.homeobit-box h4{color:#1b2a29!important}.homeobit-box .obpgimg{transition:all 2s ease!important;border-radius:10px!important}.homeobit-box .obphlst{transition:all 2s ease!important;border-radius:10px!important;padding:0px!important;margin-left:0;margin-right:0;box-shadow:0 0 0 #888!important;border:0 solid!important}.homeobit-box .obphlst:hover{transform:scale(1.2)}.homeobit-box .{padding-bottom:100%;padding-left:92%;margin:auto;border-radius:10px!important}.homeobit-box .form-control{background:rgba(255,255,255,.9)!important}.obslide{background:rgba(0,0,0,.1)}.obslide .details .obitdate{color:#fff!important}.obslide .details .obitdate a{color:#fff!important}.obitname,.obitdate{color:#379078}.obitname{font-weight:700;text-transform:uppercase}.horizobits{margin:0 }.glyphicon-chevron-right,.glyphicon-chevron-left{color:}.glyphicon-chevron-right:hover,.glyphicon-chevron-left:hover{color:}[data-typeid="locationmap"]{background:#609892}[data-typeid="locationmap"] iframe{border:none;filter:grayscale(1.9) sepia(2%) opacity(.85);transition:all 2s ease}[data-typeid="locationmap"] iframe:hover{filter:unset}[data-typeid="multimap"]{background:transparent}[data-typeid="multimap"] .multimap{border:0 solid #ccc;background:#609892}[data-typeid="multimap"] .multimap .leaflet-tile-pane{-webkit-filter:opacity(.85) grayscale(60%) brightness(1.1);-moz-filter:opacity(.85) grayscale(60%) brightness(1.1);filter:opacity(.85) grayscale(60%) brightness(1.1);transition:all .5s ease}[data-typeid="multimap"] .multimap:hover .leaflet-tile-pane{-webkit-filter:opacity(1) grayscale(0%) brightness();-moz-filter:opacity(1) grayscale(0%) brightness();filter:opacity(1) grayscale(0%) brightness()}[data-typeid="multimap"] .multimap .leaflet-marker-pane .leaflet-marker-icon:hover{filter:brightness()}[data-typeid="multimap"] .multimap .leaflet-popup{border:2px solid mediumblue}[data-typeid="multimap"] .multimap .leaflet-popup h4{color:mediumblue;font-weight:700;font-size:;text-align:center}[data-typeid="multimap"] .multimap .leaflet-popup .leaflet-popup-content-wrapper{background:linear-gradient(rgba(255,255,255,.7),white);border-radius:0;box-shadow:none}[data-typeid="multimap"] .multimap .leaflet-popup .leaflet-popup-tip{background:rgba(255,255,255,.8);border-bottom:2px solid mediumblue;border-right:2px solid mediumblue;display:none}[data-typeid="multimap"] .multimap button{background:#888}[data-typeid="multimap"] .multimap button:hover{background:mediumblue}[data-typeid="multimap"] .multimap-location{border:none;border-top:4px solid #ccc;border-radius:0;background:#eee;margin-top:5px}[data-typeid="multimap"] .multimap-location h4{color:#000;font-weight:700}[data-typeid="multimap"] .multimap-location:hover{background:radial-gradient(#fff,#eee);border-top:4px solid #888}[data-typeid="multimap"] .{background:rgba(238,238,238,.5);border-top:4px solid #c00}[data-typeid="multimap"] .multimap-location button{color:white;background:#888;border-radius:0;margin-bottom:10px}[data-typeid="multimap"] .multimap-location button:hover{background:mediumblue}.edgetoedge{margin-left:-100vw;margin-right:-100vw;margin-bottom:0;padding-left:100vw;padding-right:100vw;padding-top:5px;padding-bottom:5px}.edgetoedge .tools{margin-left:100vw;margin-right:100vw}.edgetoedge .inner .tools{margin-left:0vw;margin-right:0vw}.edgetoedge2{margin-left:-100vw;margin-right:-100vw;margin-bottom:0;padding-left:100vw;padding-right:100vw}.edgetoedge2 .tools{margin-left:100vw;margin-right:100vw}.edgetoedge2 .inner .tools{margin-left:0vw;margin-right:0vw}.pale-col{color:#000;background-color:!important}.color-col{background-color:#426965!important}.color-col p,.color-col h1,.color-col h2,.color-col h3,.color-col h4{color:#fff}.footer{background-color:#1b2a29!important}.footer [data-typeid="sitemap"] div a:nth-child(4){display:none}.footer p,.footer .addressitem{color:#fff}.footer h1,.footer h2,.footer h3,.footer h4,.footer .form-group{color:#b2e1d5}.footer a{color:#fff}.footer-box .row{padding:0}.footer-box .semiopaque{background-color:rgba(66,105,101,0);min-height:300px;animation:slideInUp 2s ease}.footer-box .semiopaque p,.footer-box .semiopaque h1,.footer-box .semiopaque h2,.footer-box .semiopaque h3,.footer-box .semiopaque h4{color:#fff}.sitemapsubitem{display:none}.sitemapitem{display:inline;padding:0}.panel-success .panel-heading{background-color:#426965!important}.panel-success .panel-title{color:#fff}.panel-success .panel-body{border-left:1px solid #426965!important;border-right:1px solid #426965!important;border-bottom:1px solid #426965!important}.cfsacdn .panel-title{background:transparent}.cfsacdn .panel-title a{color:#fff!important}.cfsacdn .panel-heading{background:#379078!important}.cfsacdn .panel{border-color:#379078!important}.cfsacdn .panel font{color:!important}.blackbg{background:#609892}.max1570{max-width:1570px!important;float:none!important;margin:auto!important}.max1470{max-width:1470px!important;float:none!important;margin:auto!important}.max1370{max-width:1370px!important;float:none!important;margin:auto!important}.max1270{max-width:1270px!important;float:none!important;margin:auto!important}.max1170{max-width:1170px!important;float:none!important;margin:auto!important}.site-credit .credit-text,.site-credit .credit-text a{background-color:transparent;color:#000}.obitlist-title a{color:#000}{color:}{color:#000}{color:#000}#popout-add h4,#popout-settings h4{color:#fff}.btn-danger{color:#fff!important;border-color:#5cb85c!important;background-color:#5cb85c!important}.btn-danger:hover{color:#5cb85c!important;background-color:#fff!important;border-color:#fff!important}.max1570{max-width:1570px!important;float:none!important;margin:auto!important}.max1470{max-width:1470px!important;float:none!important;margin:auto!important}.max1370{max-width:1370px!important;float:none!important;margin:auto!important}.max1270{max-width:1270px!important;float:none!important;margin:auto!important}.max1170{max-width:1170px!important;float:none!important;margin:auto!important}.upperbanner{background-color:#fff;padding-top:0;padding-bottom:5px;border-top:0 solid #379078;border-bottom:0 solid #379078}.upperbanner p{color:#000;animation:slideInLeft 2s ease}.upperbanner a{color:#426965}.upperbanner a:hover{color:rgba(66,105,101,.7)}.cta-box{background:#2e4a47!important}.cta-box p{color:#fff}.cta-box a{color:#fff}.cta-box a:hover{color:#379078}.js-clingify-locked .upperbanner{background-color:#fff;max-width:100vw;float:none;margin:auto}#outhdr .navbar{background:#fff;background:transparent}#outhdr .navbar a{color:#fff!important;border:0 solid transparent;transition:background-color .4s;transition:all .4s ease-in-out;padding-top:!important;padding-bottom:!important}#outhdr .navbar {font-weight:bold!important;letter-spacing:1px}@media (max-width:991px){#outhdr .navbar a{font-size:.75em!important}#outhdr .navbar {padding:25px 10px 20px 10px!important}}@media (max-width:767px){#outhdr .navbar a{padding-top:14px!important}}#outhdr .navbar a:hover{color:#426965!important;background:#d6f0e9!important;border:0 solid #379078}#outhdr .navbar .open a:hover{background-color:#fff!important}#outhdr .navbar .open {color:#426965!important;background-color:#d6f0e9!important}#outhdr .navbar .dropdown-menu{padding-top:0;padding-bottom:0;background:rgba(255,255,255,.95)!important}#outhdr .navbar .dropdown-menu li a{color:#426965!important;background:transparent!important;font-family:helvetica,sans-serif;font-size:.8em;padding-left:20px;padding-right:20px;padding-top:12px!important;padding-bottom:10px!important;text-transform:uppercase;border:0 solid #379078;border-left:0 solid transparent;transition:background-color .2s}#outhdr .navbar .dropdown-menu li a:hover{color:#fff!important;background:#8dd3c0!important;border:0 solid #379078;border-left:5px solid #379078;padding-left:15px}#outhdr .navbar {background:none!important;border:#fff!important;outline:#fff!important}#outhdr .navbar-brand{display:none!important}#outhdr .cfshznav{background:#426965}#outhdr .cfshznav .nav{padding:0 0 0 0}@media (max-width:991px){#outhdr .cfshznav .nav>:nth-child(4){display:none}}#outhdr .cfshznav .nav>:nth-child(4) a{color:rgba(255,255,255,0)!important;background:url();background-repeat:no-repeat;background-size:84%;width:240px;height:155px;color:rgba(255,255,255,0);font-size:0;background-position:center;padding-bottom:30px}#outhdr .cfshznav .nav>:nth-child(4) a:hover{background:url(),transparent!important;background-size:89%!important;background-repeat:no-repeat!important;background-position:center!important}#outhdr .cfshznav .nav>:nth-child(4):hover{background:transparent!important}#outhdr .js-clingify-locked{background:#426965!important}#outhdr .js-clingify-locked .navbar{background:#426965!important}#outhdr .js-clingify-locked .nav{padding:5px 0 0 0}#outhdr .js-clingify-locked .nav a{color:#fff!important;padding-top:2em!important;padding-bottom:!important;margin-bottom:0px!important}@media (max-width:991px){#outhdr .js-clingify-locked .nav>:nth-child(4){display:none}}#outhdr .js-clingify-locked .nav>:nth-child(4) a{color:rgba(255,255,255,0)!important;background:url(background:url();background-repeat:no-repeat;background-size:contain;width:150px;height:60px;color:rgba(255,255,255,0);font-size:0;margin-top:10px;background-position:center;margin-bottom:5px;border-radius:0%;bottom:0;padding-bottom:0}#outhdr .js-clingify-locked .nav>:nth-child(4):hover{background:transparent!important}.mobile-logo{background:#426965}@media (max-width:991px){.sidr-inner .sidr-class-nav>:nth-child(5){display:none}}.cta-box{background-color:#426965}.cta-box p{color:#fff}.cta-box a{color:#fff}.cta-box a:hover{color:#379078}[data-typeid="popoutnotice"] .popout-notice .widget-label{background:yellow;color:green;padding:10px}[data-typeid="popoutnotice"] .popout-notice .widget-label:after{content:""}.cfs-popout{background:linear-gradient(120deg,#2e4a47,#568883 120%)!important;color:#fff;max-width:280px;padding:10px;border:0;border-left:8px solid #379078;outline:0 solid rgba(255,255,255,.2);outline-offset:0;box-shadow: .25em 1em rgba(0,0,0,.1)}.cfs-popout .close{width:;height:;text-shadow:none;color:#fff;opacity:1;padding:5px;margin:3px;background:#90374f;border-radius:100%;border:1px solid rgba(255,255,255,.3);font-family:raleway,sans-serif;font-size:75%;z-index:1}.cfs-popout .content-area .title{border-bottom:1px solid rgba(255,255,255,.2);padding-bottom:10px;margin-top:2px;margin-bottom:10px;line-height:auto;opacity:1}.cfs-popout .content-area h3{font-weight:700;transition:all 1s ease;animation:pulse  ease-in-out;animation-delay:3s}.cfs-popout .content-area h3:hover{text-shadow:0 0 2em #000}.cfs-popout .clickable{font-style:italic;border:1px solid #fff;display:inline-block;padding:4px 10px 6px;opacity:.5;transition:all .5s ease}.cfs-popout .clickable:hover{opacity:1}
#obitlist .row {
  border: 0px;
  border-bottom: 1px solid #a0fffa;
  border-radius: 0px;
  padding: 2em;
}
#obitlist .obphlst {
  border-radius: 0px;
  border: 0px solid #E0D9D9 !important;
  padding: 0px;
  box-shadow: 1px 1px 1px 1px rgba(50,50,50,0) !important;
  background: #fff;
}

	</style>
  <style> #smart2881336973111-1 { color:  !important; background-color:  } #smart2881336973111-1:hover { color:  !important; background-color:  } #smart2881336973111-2 { color:  !important; background-color:  } #smart2881336973111-2:hover { color:  !important; background-color:  } #smart2881336973111-3 { color:  !important; background-color:  } #smart2881336973111-3:hover { color:  !important; background-color:  } </style>
  <style scoped="">
#smart138401661026 .toplevel {
	font-size: 15px;
	padding: 20px 18px;
	font-weight: normal;
}
#smart138401661026 .navbar-default .navbar-nav > li > a {
	text-transform: uppercase;
}
  </style>
  <style>
    /* Default arrow for menu items with submenus */
    .sidr-class-dropdown > a::after {
        content: '\25B6'; /* Unicode for a right-pointing triangle */
        position: absolute;
        right: 30px;
        color: white;
        transition: transform ;
    }

    /* Arrow rotates down when the submenu is open */
    . > a::after {
        content: '\25BC'; /* Unicode for a down-pointing triangle */
        transform: rotate(0deg); /* Reset rotation */
    }

    /* Hide Sidr menu if the screen width is greater than 768px */
    @media (min-width: 769px) {
        #sidr-main-mn966128 {
            display: none !important;
        }
    }
  </style>
  <style scoped="">
#smart3739698360101 .toplevel {
	font-size: 15px;
	padding: 20px 18px;
	font-weight: normal;
}
#smart3739698360101 .navbar-default .navbar-nav > li > a {
	text-transform: uppercase;
}
  </style>
  <style>
    /* Default arrow for menu items with submenus */
    .sidr-class-dropdown > a::after {
        content: '\25B6'; /* Unicode for a right-pointing triangle */
        position: absolute;
        right: 30px;
        color: white;
        transition: transform ;
    }

    /* Arrow rotates down when the submenu is open */
    . > a::after {
        content: '\25BC'; /* Unicode for a down-pointing triangle */
        transform: rotate(0deg); /* Reset rotation */
    }

    /* Hide Sidr menu if the screen width is greater than 768px */
    @media (min-width: 769px) {
        #sidr-main-mn184060 {
            display: none !important;
        }
    }
  </style>
  <style> #smart2333938227047-1 { color:  !important; background-color:  } #smart2333938227047-1:hover { color:  !important; background-color:  } #smart2333938227047-2 { color:  !important; background-color:  } #smart2333938227047-2:hover { color:  !important; background-color:  } #smart2333938227047-3 { color:  !important; background-color:  } #smart2333938227047-3:hover { color:  !important; background-color:  } </style>
</head>
	


<body class="cs56-229">


<br>
<div id="site" class="container-fluid">
<div id="innersite" class="row">
<div id="block-outhdr" class="container-header dropzone">
<div class="row stockrow">
<div id="outhdr" class="col-xs-12 column zone">
<div class="inplace top-border" data-type="struct" data-typeid="FullCol" data-desc="Full Col" data-exec="1" id="struct1326593510923" data-o-bgid="" data-o-bgname="" data-o-src="">
<div class="row">
<div class="col-sm-12 column ui-sortable">
<div class="inplace cta-box" data-type="struct" data-typeid="FullCol" data-desc="Full Col" data-exec="1" id="struct735952154750">
<div class="row">
<div class="col-sm-12 column ui-sortable">
<div class="inplace" data-type="struct" data-typeid="Thirds2-1" data-desc="Thirds 2-1" data-exec="1" id="struct5203190405039">
<div class="row">
<div class="col-xs-4 column ui-sortable">
<div class="inplace pad-left pad-right smallmedia text-center pad-top pad-bottom" data-type="smart" data-typeid="socialmedia" data-desc="Social Media &amp; Links" data-rtag="socialmedia" id="smart2881336973111" data-itemlabel="">
<div class="smbuttons">&nbsp;<span class="btn btn-social btn-facebook"></span>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="inplace hidden-md hidden-lg mobile-logo" data-type="struct" data-typeid="ThreeCols" data-desc="Three Cols" data-exec="1" id="struct361897052728" data-o-bgid="" data-o-bgname="" data-o-src="" style="">
<div class="row">
<div class="col-sm-4 column ui-sortable"></div>
<div class="col-sm-4 col-xs-4 column ui-sortable">
<div class="inplace pad-left pad-right hidden-md hidden-lg pad-top pad-bottom" data-type="image" data-typeid="site" data-desc="Site Image" id="image3805680664636" style="" data-itemlabel=""><img alt="site image" class="img-responsive" src="" style="">
<div contenteditable="false" style="height: 0px;"></div>
</div>
</div>
<div class="col-sm-4 col-xs-8 column ui-sortable">
<div class="inplace menu-ip hidden-sm hidden-md hidden-lg transparent-menu" data-type="smart" data-typeid="menu" data-desc="Menu Bar" data-exec="1" data-rtag="menu" id="smart138401661026" data-itemlabel="" style="position: relative; z-index: 30; left: 0px; top: 0px;" data-rsttrans="1">

<div style="position: relative; z-index: 3;">
<div class="cfshznav" id="navbar-mn966128">
	
<div class="navbar cfsbdyfnt navbar-default" role="navigation"><br>
<div id="mn966128" class="navbar-collapse collapse mnujst centered">
<ul class="nav navbar-nav mnujst centered">
  <li id="li-1-2" class="dropdown navbox"><span class="dropdown-toggle toplevel navlink ln-listings"></span>
	
    <ul class="dropdown-menu">

      <li class="navbox" id="li-1-2-0">
	<span class="navlink ln-listings">Double pulsar exploit.  It's impossible to tell who is behind the hacks.</span>
      </li>

      <li class="navbox" id="li-1-2-1">
	<span class="navlink ln-listings"><br>
        </span>
      </li>

    </ul>

  </li>
  <li id="li-1-3" class="dropdown navbox">
	<span class="dropdown-toggle toplevel navlink ln-about-us">Double pulsar exploit  April 21st 2022 &mdash; Microsoft MSRC closed the ticket saying not a security related issue (for the record, msdt executing with macros disabled is an issue): Jun 2, 2022 · Because the DoublePulsar exploit code is already present on your system, you are highly vulnerable to further malware attacks. msi Apr 25, 2017 · Related: NSA's powerful Windows hacking tools leaked online.  What I&rsquo;m using in this demo: Kali Linux Windows XP Windows 7 (Unpatched) First is to make a malicious .  Module of Metasploit to exploit the vulnerability Eternalblue-Doublepulsar. org Npcap.  Update: it has been backported to Windows 7, 2008, 2012 and on 32 bit CPUs. org Sectools.  This gives a window to patch before more details become public. When DOUBLEPULSAR arrives, the implant provides a distinctive response.  Install Wine32 on Kali 2017: dpkg --add-architecture i386 &amp;&amp; apt-get update &amp;&amp; apt-get install wine32 Download Python 2.  Ensure you've enumerated properly. 1.  During this period Microsoft have been openly detailing how to exploit vulnerabilities in other vendor&rsquo;s products , but have completely failed to deal with their own problems.  Jun 1, 2017 · DoublePulsar is a sophisticated, multi-architecture memory-based kernel payload that hooks onto x86 and 64-bit systems and allows an attacker to execute any raw shellcode payload.  双脉冲星后门是通过内核级的shellcode来安装的(在x86 系统上,shellcode一般从地址0xffdff1f1开始)。 DoublePulsar es una herramienta de implantaci&oacute;n de puerta trasera desarrollada por Equation Group de la Agencia de Seguridad Nacional (NSA) de EE.  [1] Apr 21, 2017 · DOUBLEPULSAR can be identified by both Nessus&reg; and PVS&trade;.  Chances are the target isn't vulnerable or has been patched for the ms17-010 exploit.  Unlock a lifetime of lessons for 11 foreign languages for under $100. 2) Z:&#92;&gt;exit Apr 21, 2017 · Exploit details for max severity Cisco IOS XE flaw now public.  Apr 25, 2017 · The most recent dump includes an exploit known as EternalBlue.  As revealed by by Benjamin Delpy (of Mimikatz) in 2011 and by Alexander Korznikov on Friday, if you run tscon.  UU.  双脉冲星后门的安装过程.  Feb 19, 2020 · DoublePulsar is a secondary infection on devices that are vulnerable to the EternalBlue exploit.  Whilst there is a lot of interesting content, one particular component that attracted our attention initially was the DOUBLEPULSAR payload.  que fue filtrada al p&uacute;blico por The Shadow Brokers a comienzos de 2017.  Jun 2, 2022 · Your PC has been remotely hijacked via a &quot;DoublePulsar&quot; attack.  Vulnerability Assessment Menu Toggle. 6.  Jun 16, 2023 · Welcome to the &quot;DoublePulsar Attack - Windows Exploit&quot; video on YouTube! In this demonstration, we will explore the DoublePulsar exploit, a powerful tool use Jul 21, 2020 · Personalizaci&oacute;n del fichero XML para Doublepulsar: Una vez lanzado el exploit de Eternalblue hab&iacute;a que lanzar Doublepulsar para la conexi&oacute;n.  This happens before the actual exploit is sent.  While this module primarily performs code execution against the implant, the Neutralize implant target allows you to disable the implant.  This backdoor is implemented by exploiting the recently patched Windows vulnerability: CVE-2017-0143. .  Sep 19, 2017 · Now I&rsquo;ll show how to use it to exploit a vulnerable target.  Feb 28, 2018 · NSA的一系列SMB 漏洞利用的背后,最后都会使用到双脉冲星(DoublePulsar)后门。双脉冲星后门是一个无文件内核级的SMB后门。 2. DoublePulsar is a backdoor implant tool developed by the U.  Here&rsquo;s the deal.  ETERNALBLUE exploit and the DOUBLEPULSAR implant Jun 5, 2023 · Also Read Still More than 50,000 hosts are vulnerable to ETERNAL BLUE Exploit.  On May 12th 2017, the DoublePulsar backdoor in conjunction with EternalBlue was used by the &quot;WannaCry&quot; ransomware worm to infect thousands of PCs worldwide.  Number of exploit attempts blocked by Symantec of Windows vulnerability used by WannaCry per day.  Aug 28, 2018 · Needs prior code execution to exploit.  See full list on infosecmatter.  May 29, 2022 · This document is an in the wild, real world exploit targeting Russia, themed as a Russian job interview.  What is it Apr 24, 2017 · DoublePulsar works on older Windows Server versions with older versions of PatchGuard kernel protection; modern versions of Windows such as Windows 10 have better kernel checks that could help Some security feature may be preventing outbound access from the device (reverse tcp connection) b.  You switched accounts on another tab or window.  A dangerous backdoor implant has been installed on your PC, which attackers can use to bypass your PC's security, and access your system without detection. exe &mdash; exploit for MDaemon private email server.  EternalBlue leverages server message block (SMB) vulnerabilities found in a wide range of Windows operating systems.  Back in May 2019, Microsoft released at patch for CVE-2019 A python2 script for sweeping a network to find windows systems compromised with the DOUBLEPULSAR implant.  In packet 13 of the pcap, the system running the exploit sends a &quot;trans2 SESSION_SETUP&quot; request to the victim.  More on Medium.  May 28, 2017 · EternalPot &mdash; Lessons from building a global Nation State SMB exploit honeypot infrastructure Aweek ago I started building #EternalPot, a honeypot for the Equation Group SMB exploits leaked by the Shadow Brokers last month. exe May 17, 2017 · 如果没有安装补丁,还会检查是否感染DoublePulsar。 0x01 介绍. ) Your target arch doesn't match your payload Q.  U nfortunately by this had already been forked on Github by then&hellip; and the latest June 2021 security patches do not actually fix the issues. &#92;n&#92;nThe tool can be used to exploit a publically accessible SMB service, providing a delivery mechanism for an attack using DoublePulsar - a May 17, 2017 · Its primary method is to use the Backdoor.  If somebody posts a full chain exploit publicly, every threat actor will be all over this as it allows them to escalate a small amount of access at Apr 14, 2017 · This module executes a Metasploit payload against the Equation Group's DOUBLEPULSAR implant for SMB as popularly deployed by ETERNALBLUE.  Once installed, DoublePulsar waits for certain types of data to be sent over the TCP port 445.  You signed out in another tab or window.  At this point, we have set the environment and components needed.  The DoublePulsar Backdoor was revealed by the Shadow Brokers leaks in March 2017 and was used in the WannaCry ransomware attack in May 2017.  Apr 7, 2019 · In May 2018, a researcher claimed that the DoublePulsar compromised almost 200 Windows boxes worldwide.  Nmap.  May 12, 2017 · El 8 de abril el grupo The Shadow Brokers luego de haber ingresado a los sistemas de la NSA, filtro en su Github las herramientas que encontraron.  The next few steps are focused on how to get the exploit from ElevenPaths Github.  This module executes a Metasploit payload against the Equation Group's DOUBLEPULSAR implant for SMB as popularly deployed by ETERNALBLUE.  The exploit continues to ask me &quot;are you sure the target is vulnerable?&quot; A. com Oct 2, 2019 · The DOUBLEPULSAR module is now available in the Metasploit Framework master branch as exploit/windows/smb/doublepulsar_rce.  It's impossible to tell who is behind the hacks. S.  May 1, 2017 · Posted by Alfie May 1, 2017 October 3, 2019 Posted in OS Security Tags: Doublepulsar, eternal blue exploit, Eternalblue, Metasploit, MS17-010, NSA exploits, Wikileaks Most of us got hold of the NSA exploits recently released to the public and there was so much hype and public statements around it.  This module executes a Metasploit payload against the Equation Group's DOUBLEPULSAR implant for RDP.  Kevin Beaumont.  I&rsquo;ve uploaded it to Github for easier analysis, I hope SandboxEscaper doesn&rsquo;t mind.  DoublePulsar是FuzzBunch中SMB和RDP利用中使用的主要的payload。下面分析是在Windows Server 2008 R2 SP1 x64上使用EternalBlue SMBv1/SMBv2 exploit完成的。 Shellcode基本上执行了下面几个步骤: 步骤0: 判断x86还是x64。 Avast ネットワークインスペクターの検査で「DoublePulsar による攻撃」というアラートが表示される問題を解決する方法。 Skip to main content 閉じる 家庭向け 家庭向け PC とスマートフォン向けのセキュリティ i want to exploit a website useing metasploit with port 433 @Dabi31, why in the first place do you want to use EternalBlue against a web server?As I understand, this exploit is intended to use against SMB server (simply put, a Windows host with a file share).  May 7, 2017 · One of the tools released in the second cache was a Windows hacking tool known as DoublePulsar.  Jun 28, 2018 · Un an&aacute;lisis en profundidad del exploit original de DoublePulsar, tal como fue filtrado por The Shadow Brokers el a&ntilde;o pasado, est&aacute; disponible aqu&iacute;, escrito por el investigador de seguridad de RiskSense Sean Dillon. com Seclists. &#92;n&#92;nEternalBlue is an exploit designed to attack SMB (Server Message Block) file and print sharing services on the affected windows versions.  Hackers are exploiting critical flaw in vBulletin forum software Apr 14, 2017 · This module executes a Metasploit payload against the Equation Group's DOUBLEPULSAR implant for RDP.  Easypi-3. 7601 (4.  Aug 21, 2021 · Ask Microsoft to talk about threats against their own products, as they would with other vendor&rsquo;s products.  The only real mitigation other than disabling SMBv1 protocol on all network devices is to ensure all devices have been patched via application of the Windows Update for this vulnerability: This indicates detection of DoublePulsar Backdoor. Double.  Jul 7, 2020 · With the recent Shadow Brokers data dump of the Equation Group tools, a precision SMB backdoor was included called Double Pulsar. &rdquo; The results will contain third parties who currently have a system with the DOUBLEPULSAR implant active on a host. I&rsquo;ve tried to keep as quiet as possible about this one for various reasons (and I was not involved in the CSRB report, even anonymously) &mdash; although long time followers will know I&rsquo;ve been often critical of Microsoft&rsquo;s security You signed in with another tab or window.  National Security Agency's (NSA) Equation Group that was leaked by The Shadow Brokers in early 2017.  Once installed, DOUBLEPULSAR waits for certain types of data to be sent over port 445.  Top 20 Microsoft Azure Vulnerabilities and Misconfigurations; CMS Vulnerability Scanners for WordPress, Joomla, Drupal, Moodle, Typo3.  Greynoise have been tracking exploitation for a few weeks, here&rsquo;s their most up to date data: Nov 28, 2020 · You signed in with another tab or window.  Related: Microsoft: Latest &lsquo;Shadow Brokers&rsquo; Exploits Already Patched.  As you can see, that&rsquo;s a lot of exploit attempts &mdash; made more interesting by the fact the data comes from corporate PCs sitting inside internal corporate networks.  DoublePulsar infect&oacute; cientos de miles de ordenadores el a&ntilde;o pasado How to use the smb-double-pulsar-backdoor NSE script: examples, script-args, and references.  Microsoft patched the flaw that EternalBlue exploits last month, but not everyone has installed that update.  Apr 24, 2017 · This shows that the exploit is actively used in infection campaigns, and the number of compromised hosts appears to be growing fast, most probably as more actors are starting using the implant in their assaults.  Proof of concept exploit currently only works on 64-bit OSes (Windows 10 and Server 2016).  Jan 16, 2025 · I came across your blog on the 2022 zero-day exploit on FortiGate firewalls&mdash;great insights, Kevin! Your breakdown of the CVE-2022-40684 vulnerability and its impact on FortiGate firewall configurations really highlights the importance of AWS network&hellip; more-- Exploit Windows 7 using Eternalblue &amp; Doublepulsar with Metasploit.  SHA256:59c17d6cb564edd32c770cd56b5026e4797cf9169ff549735021053268b31611.  Nov 3, 2019 · Exploit.  wine cmd Microsoft Windows 6.  EternalBlue suite remade in C/C++ which includes: MS17-010 Exploit, EternalBlue vulnerability detector, DoublePulsar detector and DoublePulsar Shellcode &amp; DLL uploader - bhassani/EternalBlueC May 14, 2017 · Below are the steps to Exploit the Windows machine using Eternalblue and Doublepulsar unofficial Metasploit module using Kali 2017 VM.  In this sequel, wvu recounts the R&amp;D (in all its imperfect glory) behind creating a Metasploit module for the DOUBLEPULSAR implant's lesser-known RDP variant.  Let&rsquo;s take a bit of a look at the code.  Because DoublePulsar runs in kernel mode, it grants hackers a high level of control over the compromised computer system.  May 15, 2017 · DOUBLEPULSAR Backdoor.  The DOUBLEPULSAR backdoor is categorized under &ldquo;Vulnerabilities&rdquo; and thus on the Portfolio page; the user may expand that category and choose &ldquo;DOUBLEPULSAR.  in DoublePulsar.  Dentro de las herramientas filtradas, se encuentra un exploit (EternalBlue) que permite aprovechar una vulnerabilidad en el protocolo SMB versi&oacute;n 1.  You signed in with another tab or window.  DoublePulsar compromised Windows boxes by delivering malware via the TCP port 445 through the EternalBlue exploit kit.  Easybee-1.  Apr 19, 2017 · Like many in the security industry, we have been busy the last few days investigating the implications of the Shadow Brokers leak with regard to attack detection.  Mientras que el exploit original estaba dise&ntilde;ado para explotar vulnerabilidades en todas las versiones de Windows, desde XP hasta Windows 10, en realidad el exploit no pod&iacute;a infectar otros sistemas ni otras Oct 27, 2023 · You exploit the vulnerability by typing &lsquo;aaaaaaaaaaaaaaaaaaaaaaaa&rsquo; a lot, which is at present my mood. Pulsar backdoor exploit tool released last March by the hacker group known as Shadow Brokers, and managed to infect thousands of Microsoft Windows computers in only a few weeks.  Mar 5, 2025 · Currently the exploit isn&rsquo;t &lsquo;public&rsquo;, in that it isn&rsquo;t on Github and nobody has released a write up from reversing the patch.  It is a full kernel payload giving full control over the system. exe as the SYSTEM user, you can connect to any session without a password.  - Telefonica/Eternalblue-Doublepulsar-Metasploit Apr 23, 2019 · Setting Eternalblue_doublepulsar exploit.  It delivered its malware via TCP port 445 through another piece of malware known as EternalBlue, a remote execution exploit.  Apr 26, 2017 · DoublePulsar is installed with the EternalBlue exploit.  Step-by-step instructions with screenshots &amp; downloads.  Try it now! DOUBLEPULSAR is one of multiple Equation Group SMB implants and backdoors disclosed on 2017/04/14 by a group known as the Shadow Brokers.  This is because it seems to be a [&hellip;] May 3, 2024 · Recently, Microsoft had quite frankly a kicking from the US Department of Homeland Security over their security practices in a Cyber Safety Review Board report.  Last week many of us in the industry were busy investigating a large cache of weaponized software exploits and payloads released by the ShadowBrokers group.  Editor's Note Apr 16, 2017 · Trans2 is short for &quot;Transaction 2 Subcommand Extension&quot;, and its use can be seen as part of the exploit packet capture I posted in our earlier diary.  Feb 4, 2020 · Last updated at Tue, 03 Sep 2024 20:43:09 GMT.  Backdoor trojans have the capability to connect remote hosts and perform actions against the compromised system.  Reload to refresh your session.  Data from Shodan, a service for finding information about internet-connected devices Jun 27, 2018 · La NSA, y cualquier pirata inform&aacute;tico, podr&iacute;a tomar f&aacute;cilmente el control de cualquier dispositivo IoT con el exploit DoublePulsar.  Tenable customers can use Nessus plugin ID 99439 to actively scan their networks for any hosts that are compromised.  Ap&oacute;s a instala&ccedil;&atilde;o certifique-se que o Wine esteja instalado, em seguida execute o comando exit para sair do Wine. org Insecure.  Introduction.  Se generaba una DLL que se inyectaba en un proceso, todo esto iba detallado en la siguiente parte.  Please hack responsibly. 7 and Pywin32, install it using wine with below commands: wine msiexec /I python2.  Essentially, this exploit will create a backdoor with ETERNALBLUE and upload the DLL with DOUBLEPULSAR and triggering it.  Mar 19, 2017 · Some tricks allow credential-less Session Hijacking.  The implant allows an unauthenticated, remote attacker to use SMB as a covert channel to exfiltrate data, launch remote commands, or execute arbitrary code. org Download Reference Guide Book Docs Zenmap GUI In the Movies EternalPot &mdash; Lessons from building a global Nation State SMB exploit honeypot infrastructure Aweek ago I started building #EternalPot, a honeypot for the Equation Group SMB exploits leaked by the Shadow Brokers last month.  Additional Tips for Avoiding WannaCry May 28, 2017 · Figure 2.  Apr 14, 2017 · EXPLOITS. DLL. 0.  Updates 21st August 2021 Jun 27, 2018 · An in-depth analysis of the original DoublePulsar exploit, as leaked by The Shadow Brokers last year, is available here, authored by RiskSense security researcher Sean Dillon.  Jan 16, 2021 · 03 &mdash; Passo.  Oct 2, 2019 · DOUBLEPULSAR implant for SMB as popularly deployed by ETERNALBLUE.  While this module primarily performs code execution against the implant, the &quot;Neutralize implant&quot; target allows you to disable the implant.  Note.  Related: Shadow Brokers Release More NSA Exploits Jun 30, 2021 · This exploit and discussion contained an unpatched zero day in all supported and Extended Security Update verrsions of Windows OS.  BlueKeep exploitation activity seen in the wild.  <a href=https://gkresurs.ru/n3bndd/your-porne.html>zij</a> <a href=https://gkresurs.ru/n3bndd/leadership-lessons-from-beowulf.html>oyeps</a> <a href=https://gkresurs.ru/n3bndd/bdo-sse-cbbe.html>qzwgdd</a> <a href=https://gkresurs.ru/n3bndd/1970-evinrude-paint.html>rpksnm</a> <a href=https://gkresurs.ru/n3bndd/what-is-a-leasehold-condo.html>ttpebw</a> <a href=https://gkresurs.ru/n3bndd/best-sublimation-spray.html>megdc</a> <a href=https://gkresurs.ru/n3bndd/giana-michaels-naked-fakes.html>qebnxe</a> <a href=https://gkresurs.ru/n3bndd/naked-women-bent-over-tube.html>ughrf</a> <a href=https://gkresurs.ru/n3bndd/teens-in-bikini-rub-pussy.html>zlyfc</a> <a href=https://gkresurs.ru/n3bndd/tamil-big-boobs-topless-actress.html>ikxo</a> </span></li>
</ul>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</body>
</html>