Project Neptune

01/27/2012 17:20 raduelvis1#16
Quote:
Originally Posted by Hapomen22 View Post
I'm sorry but you have no idea what you are talking about when it comes to blackhat activities. I've been in the ''hacking'' (Noobs call them hackers... but in reality they're mostly Skids) scene since a year... I don't actually use my knowledge to get Archlord accounts anymore... because I know people put real money in this game. (Me included)


Project Neptune is a Trojan with reverse connection. You build a server, and you send the server to a victim, when he executes it links a connection between your client and the victim server and you can remotly control his whole computer. ;)

Also, Anti-viruses (Even pro active) is no problem for advanced ''hackers'' like me. Actually... I could infect anybody via a website I hosted and the trojan is fully undectable scantime and runtime and it drops itself into %temp% then hides itself and it's subfolder in C:/APPD. This thing is called a JDB.

I'm NOT helping anyone with this, so no PMs. Use google.

Also, I've been banned here before... because I tried infecting members with my half detected server (I still was learning back then). Yeah I was Finastar... some people might remember me.

As for real security : Antivuses is a scam, they only detect old viruses or the ones that aren't cyphered.

To help everybody feel more secure and never get ''hacked'' again : Look up Key Scrambler PRO, Use a Sanbox/Virtual Machine if you think file is suspicious.
so,soultions are?
-idk but a wipe driver will work?
-best one till now reinstal the windows with a bootable cd/dvd :XD
01/27/2012 19:49 Apnean#17
Quote:
Originally Posted by billclinton View Post
Me raging at you ? your the one that come in here telling me I have no clue what I am talking about , your what a self taught script kiddie ?
I have had college education and taught how to detect such things and the only way to understand it is to learn how to do it.
I know what I am talking about you obviously don't because the SERVER simply hosts the worm , trojan etc gives it a space to reside in and a way to spread easier. you can create that stuff with out a server , the server can also serve as a host to many other things
EG a gaming site , a college , a business , a library. and your so called Remote Access Trojan depends on many factors mainly users being stupid enough to download and open a false program or file.

I will take your bet that your trojan don't even get past my antivirus.


I am not stupid enough to even open any file with that crap in it or go to any unsecured site. You can send the 1000 dollars to [Only registered and activated users can see links. Click Here To Register...] please and thanks. Can I be expecting the money by next week?

BTW anything you try and send me gets sent through a secure DNS first which has a sand box on one end and a massive firewall on the other. Not to mention my sandboxed machine and firewall with all the proper closed ports with no way of accessing my remote.
So, the bet is on now that Bill has formally accepted your bet :)

First, set a time frame and then state what you are gonna do to Bill, then post the results if you can prove you managed to infiltrate his PC. You could maybe post a screenshot of Bill's Desktop, or something irrefutabally that which is Bill's stuff.

Timer ON (tick tock) :) :) :)


PS: Just a thought Bill. Do you have a media camera on your monitor?

If so, then he can just take a movie of YOU at your PC as proof maybe.
01/27/2012 19:51 Hapomen22#18
Quote:
Originally Posted by billclinton View Post
I will take your bet that your trojan don't even get past my antivirus.

Ok add my yahoo ([Only registered and activated users can see links. Click Here To Register...]), if you don't chicken out.

I just want to show you nothing is ''unbypassable'', and that everything has flaws in it.

Btw, my server bypasses Viper, Kapersky proactive, Norton SONAR, Avast, NOD32 and all firewalls because it's a reverse connection, the server will open the port that I choosed and client which is listening to that port will pick up the new connection. :)

Edit : I will record the inflitration and upload it to youtube. As a proof, I'll login my epvpers account... I swear I will do this if you give me the chance.
01/27/2012 20:19 billclinton#19
Quote:
Originally Posted by Hapomen22 View Post
Ok add my yahoo ([Only registered and activated users can see links. Click Here To Register...]), if you don't chicken out.

I just want to show you nothing is ''unbypassable'', and that everything has flaws in it.

Btw, my server bypasses Viper, Kapersky proactive, Norton SONAR, Avast, NOD32 and all firewalls because it's a reverse connection, the server will open the port that I choosed and client which is listening to that port will pick up the new connection. :)

Edit : I will record the inflitration and upload it to youtube. As a proof, I'll login my epvpers account... I swear I will do this if you give me the chance.
I am not adding you to my msn dude you said you could infiltrate me so do it. I am not gonna give you part access to do it , your the pro here.

and how are you to even open ports when my ports are clos3ed through the admin tools and you need admin access to it ? and my admin password is long. PS I am also not using crap ass WEP encryption either.

yup there is a webcam there but the port it is on has restrictions I am not retarded I know how to restrict ports etc , he is assuming I am the stupid average user who does not know how to set up their firewall in their modem and software firewalls. Right this second he prob could as I am on my laptop which is secured poorly but if I was to go home and (let) him try he would have a hell of a time. The key word is (LET)

He said he could infiltrate me so I accepted the challenge I am not giving him anything to access me. he has to do it on his own.

like I said you can send the 1000$ to [Only registered and activated users can see links. Click Here To Register...] through paypal.

what would be really funny is me giving you my MSN I use only for work and actually seeing if you can infiltrate the college server ROFL. That's where I am half the time anyways is at work.


PS everyone of the antivirus you have named don't have a built in sandbox or run through a secure DNS.
01/27/2012 21:08 botpet#20
Kaspersky has.
01/27/2012 21:28 Apnean#21
You both have to agree on an end date for this bet. Else it might go forever without money being paid up. I suggest this time next week. 7 days exactly from the time stamp on this post. Go NOW>
01/27/2012 22:38 botpet#22
Quote:
Originally Posted by billclinton View Post
Must be something they just added in the last few years then. The AV I use has had it for well over 5 years.
This function is for experienced users. And it is in the las 3 versions :p
01/27/2012 22:53 Badkat#23
close ur doors, close ur windows, dont forget bout the ventilation system :o
Lee Harvey Oswald has escaped and he`s coming for uuuu!!!!
01/27/2012 22:58 DjMom#24
@billclinton
first of all , its kinda shiit that u are tring to ban Hapomen22 since he said he isnt a bad boy anymore , also he said that his "program" can pass ur anti-virus or whatever u have , that means u give him just access to send u something , he never said that he will hack ur pc so he can run his "program" at ur pc.
01/27/2012 23:16 DjMom#25
Quote:
Originally Posted by billclinton View Post
who said anything about trying to get him banned ? I didn't , I said I hope he gets banned now, there is a difference. If someone was banned from this site for giving users viruses etc why should they be allowed back in the first place.

He can send me a file a lot more ways then through msn , I know exactly why he wants to use msn and I wont do it.
ok , then lets say he will upload it somewhere and u download it from there .
and then u will report him to epvpers for such a file he send u xD ^^
01/27/2012 23:58 Hapomen22#26
Ok, no msn invovled... just give me the time to set up my site...

I never said I'll try to hack you, that's out of my range. You would need an exploitpack and a rootkit to do that. The deal was about trying to infect your computer by bypassing your firewall/sandbox and AV... Obviously if you don't accept the file/execute nothing will happen, any half-retard could do that and that's called chicken out. Although you won't have to download any file, you have my word. :)

Since my hoster deleted my hosted files, just give me a few mins to get this back up.

I'm not going to send the link in public since I do not want to infect other members.

Edit : Give me a day or so, need to reFUD.
01/28/2012 00:23 Hapomen22#27
If it goes through, that's not my problem... I'lll be glad to give you a lesson. To lazy tonight, I'll do this stuff tomorrow when I'm more awake. Didn't touch this since 3 months, so obviously my server is now detected... (took 6 months for AVs to detect it I even got proof of the scans) Need to fix that first.
01/28/2012 23:38 Hapomen22#28
Quote:
Originally Posted by billclinton View Post
[Only registered and activated users can see links. Click Here To Register...]

TESTRESULT
1. RootkitInstallation: MissingDriverLoad Protected
2. RootkitInstallation: LoadAndCallImage Protected
3. RootkitInstallation: DriverSupersede Protected
4. RootkitInstallation: ChangeDrvPath Protected
5. Invasion: Runner Protected
6. Invasion: RawDisk Protected
7. Invasion: PhysicalMemory Protected
8. Invasion: FileDrop Protected
9. Invasion: DebugControl Protected
10. Injection: SetWinEventHook Protected
11. Injection: SetWindowsHookEx Protected
12. Injection: SetThreadContext Protected
13. Injection: Services Protected
14. Injection: ProcessInject Protected
15. Injection: KnownDlls Protected
16. Injection: DupHandles Protected
17. Injection: CreateRemoteThread Protected
18. Injection: APC dll injection Protected
19. Injection: AdvancedProcessTermination Protected
20. InfoSend: ICMP Test Protected
21. InfoSend: DNS Test Protected
22. Impersonation: OLE automation Protected
23. Impersonation: ExplorerAsParent Protected
24. Impersonation: DDE Protected
25. Impersonation: Coat Protected
26. Impersonation: BITS Protected
27. Hijacking: WinlogonNotify Protected
28. Hijacking: Userinit Protected
29. Hijacking: UIHost Protected
30. Hijacking: SupersedeServiceDll Protected
31. Hijacking: StartupPrograms Protected
32. Hijacking: ChangeDebuggerPath Protected
33. Hijacking: AppinitDlls Protected
34. Hijacking: ActiveDesktop Protected

All test results are with out my secure DNS and ESM and sandbox enabled. Still think your program will bypass my firewall ? The firewall I use is renowned to be the best especially for HIPS protection.
Not to mention me actually changing my ports and closing ones that don't need to be open in my router/modem.
Lol comdo ^^ It's best firewall I agree, but you'll be surprised. ;)
01/29/2012 00:37 DjMom#29
Quote:
Originally Posted by Hapomen22 View Post
Lol comdo ^^ It's best firewall I agree, but you'll be surprised. ;)
i would like to see u to pass that comodo ^^
02/02/2012 02:45 Hapomen22#30
I sended you a PM, check it. Obviously if your firewall blocks the site, let it run, otherwise I would've just sended you the file directly...