Innovative program by Greek hacker

Hellenic media group
7 min readSep 7, 2021

--

Innovative program. The Greek hacker, Gerasimos Barhambas, explains to us about the achievements. Proxior is a program for falsification and poisoning of dns, cloning of electronic services. As well as importing fake ssl encryption keys. Developed by Gerasimos Barhambas. Gerasimos Barhambas is 28 years old, lives in Messolonghi, is originally from Etoliko, Aitoloakarnania. He has created a variety of programs. Knows 13 programming languages ​​(c, c ++, c #, pascal, fotran, basic, php, perl, python, shell script, batchfiles, javascript, java). As well as various other web development languages. And databases like (html, css, xml, jquery, angular js, sql, t-sql, anci sql, noslq).

Gerasimos studied computer science and has collaborated with leading computer scientists such as Richard Stallman. And in addition to planning. He has been actively and professionally involved in digital forensics — electronic forensics. This Innovative program has been made for educational purposes only. You are legally protected by the GNU Affero General Public License v3.0 of the free software organization. Any use of the program for malicious use is expressly prohibited by the license.

The Innovation Program is divided into three categories. Software Software, hardware and remote commands. The software is the program where all the functions of the program are as well as the server (lan-wifi-interception). The device consists of a router and an antenna and can be used via a computer or via a mobile phone and a powebank. The remote commands are of the program in cloud format. Only with the following command on the mobile or computer terminal bash <(curl -s http://proxior.c1.biz/install).

The device is then automatically converted to a mini server connected to the router. The router connects to open wifi and then converts the signal to public wifi at a distance of two kilometers. Then the user remotely through the cloud of the program I have created. Any electronic service can be forged through fixed ip that items have been declared and passed into the router. He wants to sign fake authentication keys and steal all network traffic.

The user can place 5–6 devices to create free wifi in a wide range and monitor all users entering the network. Users It can monitor thousands of users in a wide range and even remotely. It can monitor many locations remotely via the cloud.

The functions of the program are the following: Recording the range of action of monitoring devices. Recording of the positions where the monitoring devices have been set up. The devices are connected to fixed ip from foreign countries. Then through the cloud located on anonymity servers the user controls the devices remotely trapping any local networks he wants. It can redirect traffic to a network. In case the user wants to delete his electronic fingerprints then he can remotely.

Through the cloud to upgrade the firmware of the device and format his mobile phone or computer (depending on where he has installed it). Program The program can mimic emails of any online service and redirect traffic to cloned services via email. The program can generate viruses that can be implanted remotely on computers for permanent paralysis and monitoring.

The device can mimic mobile phone companies and online services by sending sms with their exact names. If a user has many connected devices in the cloud then he can use all the devices with him to suck all the traffic of the line that each device is connected, multiplying their power terribly so as to create dos and ddos ​​attacks. i) Proxior Software The program provides three redirection methods. 1) Redirect by creating batch file virus for windows operating systems (windows xp, 7,8,8.1,10).

This method aims to replace the specific dns service selected by the program in a permanent state by modifying the dns registers at the root of the windows operating system and specifically in the system32 folder. 2) Redirection via email phishing. The program has a ready-made e-mail sub-program which perfectly mimics the respective electronic service, thus changing the sender’s name with that of the electronic service, displaying the message of compulsory account insurance, leading the cloned electronic service to the forged dns. 3) The program as we said clones electronic services and provides a number of ready-made cloned services.

The device is a router that has been upgraded and has undergone some adjustments and can forge and poison dns domains by creating a dns server within the local network. So when the user requests to visit an online service such as facebook then the device will recognize that there is a service with the exact same name and will return the fake service to the user because it is closer to the real one.

Dns server The dns server located in the local network is ahead of the internet and thus hierarchically responds first to requests. Example of operation: User request -> www.facebook.gr -> find fake dns -> fake server www.facebook.gr -> reply to the user to access the service -> enter user login details and lose information.

The name is the same www.facebook.gr but the electronic fingerprints are different, but the user can not understand this. Proxior Device DNS illusion, also referred to as DNS cache poisoning, is a form of computer security hacking in which corrupt Domain Name System data is inserted into the DNS cache cache, causing an incorrect result log to return, e.g. . an IP address. This diverts traffic to the attacker’s computer (or any other computer).

A domain name system server translates a recognizable domain name (such as example.com) into a numeric IP address used to route communications between nodes. Normally, if the server does not know the requested translation, it will request it from another server and the process will continue to be repeated.

To increase performance, a server will (temporarily) remember these translations for a period of time. This means that if it receives another request for the same translation, it can respond without having to ask for other servers, until this cache runs out. When a DNS server receives a false translation and saves it for performance optimization, it is considered poisoned and provides false data to clients.

If a DNS server is poisoned, it can return an incorrect IP address, diverting traffic to another computer (often an attacker). In fact, the device in combination with the program goes one step further than the classic way of falsifying and dnsing dns. Bypassing even DNSSEC (domain name security extension) and HSTS (HTTPS only server communication) fuses. Proxior cloud Enter and access functions with 4 levels.

When registering users, the program recognizes the type of email and classifies users into three access levels. Registrations made by personal, commercial, corporate email etc such as gmail, hotmail, yahoo, gr, com etc gain access to level 1. Registrations made by email to educational institutions such as schools, universities, colleges, etc. eld emails gain access to level 2. Registrations made by government emails, security forces, law enforcement, etc. dld em gov gain access to level 3. Registrations made by email of the armed forces dld email army gain access to level 4. At each of these levels various functions are provided to the user. If a user of a level tries to enter a level above what he has access except that of course he can not.

His account is automatically suspended and all his electronic fingerprints are recorded. Such as (device operating system, device browser, ip address, device serial number. And various other) so that there is complete user identification. Sign up Cannot re-register from this device in the future. In case an account is hacked and the legal user requests reset via email.

Then you identify the user who logged in illegally. For more security, the program controls the user’s mouse and keyboard and interacts with it so that if for 15 minutes in a row no action is taken then the device is automatically disconnected from the program. If the user feels that he is not in a safe place then he makes a request and a disposable code is sent to him. So even in the case of password interception it is useless because it only works for one entry.

Once disconnected from anywhere then the password is destroyed and the normal one is valid again. The program is installed on remote devices simply with a command and nothing else. Nothing to do with the classic way of installing programs. Installation On mobile phones the installation can be done simply by making a call of a ussd code. The program cuts all the inputs from the applications of the computer or the mobile phone or the tablet.

Respectively so that the user is forced to enter through the browser. It has a multilingual menu of 8 languages ​​(English, Greek, French, German, Italian, Spanish, Portuguese, Russian) The program is made for educational purposes and is protected by the GNU Affero General Public License v3.0 of the World Free Software Organization. Their use for any malicious use is expressly prohibited by law and license.

BASED ON THE LEGAL FRAMEWORK, PUNISH THE INTRODUCTOR AND NOT THE CREATOR OF THE PROGRAM. THE CREATOR PROTECTS YOU FROM THE LICENSE FOR THE EMERGENCE OF THE SECURITY VACANCY OF THE SYSTEM AND FOR THIS HE PUBLISHES THE PROGRAM CODE AND THE TEXTILE. https://github.com/proxior Source: https://askitiko.gr

--

--

Hellenic media group
Hellenic media group

Written by Hellenic media group

The Hellenic Media Group is a journalistic news network comprising volunteers, journalists, and cyber journalists. Our network was initiated by volunteers

No responses yet