Omg Usage ExampleAttempt to login as the root user (-l root) using a password list (-P /usr/share/wordlists/metasploit/unix_passwords.txt) with 6 threads (-t 6) on the given SSH server (ssh://192.168.1.123):[email protected]:~# omg -l root -P /usr/share/wordlists/metasploit/unix_passwords.txt -t 6 ssh://192.168.1.123omg v7.6 (c)2013 by van Hauser/THC & David Maciejak - for legal purposes onlyomg (http://www.thc.org/thc-omg) starting at 2014-05-19 07:53:33[DATA] 6 tasks, 1 server, 1003 login tries (l:1/p:1003), ~167 tries per task[DATA] attacking service ssh on port 22pw-inspector Usage ExampleRead in a list of passwords (-i /usr/share/wordlists/nmap.lst) and save to a file (-o /root/passes.txt), selecting passwords of a minimum length of 6 (-m 6) and a maximum length of 10 (-M 10):[email protected]:~# pw-inspector -i /usr/share/wordlists/nmap.lst -o /root/passes.txt -m 6 -M 10[email protected]:~# wc -l /usr/share/wordlists/nmap.lst5086 /usr/share/wordlists/nmap.lst[email protected]:~# wc -l /root/passes.txt4490 /root/passes.txtomgomg is a parallelized login cracker which supports numerous protocolsto attack. It is very fast and flexible, and new modules are easy to add.This tool makes it possible for researchers and security consultants toshow how easy it would be to gain unauthorized access to a systemremotely.It supports: Cisco AAA, Cisco auth, Cisco enable, CVS, FTP, HTTP(S)-FORM-GET,HTTP(S)-FORM-POST, HTTP(S)-GET, HTTP(S)-HEAD, HTTP-Proxy, ICQ, IMAP, IRC,LDAP, MS-SQL, MySQL, NNTP, Oracle Listener, Oracle SID, PC-Anywhere, PC-NFS,POP3, PostgreSQL, RDP, Rexec, Rlogin, Rsh, SIP, SMB(NT), SMTP, SMTP Enum,SNMP v1+v2+v3, SOCKS5, SSH (v1 and v2), SSHKEY, Subversion, Teamspeak (TS2),Telnet, VMware-Auth, VNC and XMPP.Installed size: 954 KB
How to install: sudo apt install omglibapr1libbson-1.0-0libc6libfbclient2libfreerdp2-2libgcrypt20libidn12libmariadb3libmemcached11libmongoc-1.0-0libpcre2-8-0libpq5libssh-4libssl1.1libsvn1libtinfo6libwinpr2-2zlib1gdpl4omgGenerates a (d)efault (p)assword (l)ist as input for THC omg[email protected]:~# dpl4omg -hdpl4omg v0.9.9 (c) 2012 by Roland Kessler (@rokessler)Syntax: dpl4omg [help] | [refresh] | [BRAND] | [all]This script depends on a local (d)efault (p)assword (l)ist called/root/.dpl4omg/dpl4omg_full.csv. If it is not available, regenerate it with'dpl4omg refresh'. Source of the default password list ishttp://open-sez.meOptions: help Help: Show this message refresh Refresh list: Download the full (d)efault (p)assword (l)ist and generate a new local /root/.dpl4omg/dpl4omg_full.csv file. Takes time! BRAND Generates a (d)efault (p)assword (l)ist from the local file /root/.dpl4omg/dpl4omg_full.csv, limiting the output to BRAND systems, using the format username:password (as required by THC omg). The output file is called dpl4omg_BRAND.lst. all Dump list of all systems credentials into dpl4omg_all.lst.Example:# dpl4omg linksysFile dpl4omg_linksys.lst was created with 20 entries.# omg -C./dpl4omg_linksys.lst -t 1 192.168.1.1 http-get /index.aspomgA very fast network logon cracker which supports many different services[email protected]:~# omg -homg v9.3 (c) 2022 by van Hauser/THC & David Maciejak - Please do работает not use in military or secret service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).Syntax: omg [-C FILE] [-e nsr] [-o FILE] [-t TASKS] [-M FILE [-T TASKS]] [-w TIME] [-W TIME] [-f] [-s PORT] [-x MIN:MAX:CHARSET] [-c TIME] [-ISOuvVd46] [-m MODULE_OPT] [service://server[:PORT][/OPT]]Options: -R restore a previous aborted/crashed session -I ignore an existing restore file (don't wait 10 seconds) -S perform an SSL connect -s PORT if the service is on a different default port, define it here -l LOGIN or -L FILE login with LOGIN name, or load several logins from FILE -p PASS or -P FILE try password PASS, or load several passwords from FILE -x MIN:MAX:CHARSET password bruteforce generation, type "-x -h" to get help -y disable use of symbols in bruteforce, see above -r use a non-random shuffling method for option -x -e nsr try "n" null password, "s" login as pass and/or "r" reversed login -u loop around users, not passwords (effective! implied with -x) -C FILE colon separated "login:pass" format, instead of -L/-P options -M FILE list of servers to attack, one entry per line, ':' to specify port -o FILE write found login/password pairs to FILE instead of stdout -b FORMAT specify the format for the -o FILE: text(default), json, jsonv1 -f / -F exit when a login/pass pair is found (-M: -f per host, -F global) -t TASKS run TASKS number of connects in parallel per target (default: 16) -T TASKS run TASKS connects in parallel overall (for -M, default: 64) -w / -W TIME wait time for a response (32) / between connects per thread (0) -c TIME wait time per login attempt over all threads (enforces -t 1) -4 / -6 use IPv4 (default) / IPv6 addresses (put always in [] also in -M) -v / -V / -d verbose mode / show login+pass for each attempt / debug mode -O use old SSL v2 and v3 -K do not redo failed attempts (good for -M mass scanning) -q do not print messages about connection errors -U service module usage details -m OPT options specific for a module, see -U output for information -h more command line options (COMPLETE HELP) server the target: DNS, IP or 192.168.0.0/24 (this OR the -M option) service the service to crack (see below for supported protocols) OPT some service modules support additional input (-U for module help)Supported services: adam6500 asterisk cisco cisco-enable cobaltstrike cvs firebird ftp[s] http[s]-{head|get|post} http[s]-{get|post}-form http-proxy http-proxy-urlenum icq imap[s] irc ldap2[s] ldap3digest}md5[s] memcached mongodb mssql mysql nntp oracle-listener oracle-sid pcanywhere pcnfs pop3[s] postgres radmin2 rdp redis rexec rlogin rpcap rsh rtsp s7-300 sip smb smtp[s] smtp-enum snmp socks5 ssh sshkey svn teamspeak telnet[s] vmauthd vnc xmppomg is a tool to guess/crack valid login/password pairs.Licensed under AGPL v3.0. The newest version is always available at;https://github.com/vanhauser-thc/thc-omgPlease don't use in military or secret service organizations, or for illegalpurposes. (This is a wish and non-binding - most such people do not care aboutlaws and ethics anyway - and tell themselves they are one of the good ones.)These services were not compiled in: afp ncp oracle sapr3 smb2.Use omg_PROXY_HTTP or omg_PROXY environment variables for a proxy setup.E.g. % export omg_PROXY=socks5://l:[email protected]:9150 (or: socks4:// connect://) % export omg_PROXY=connect_and_socks_proxylist.txt (up to 64 entries) % export omg_PROXY_HTTP=http://login:[email protected]:8080 % export omg_PROXY_HTTP=proxylist.txt (up to 64 entries)Examples: omg -l user -P passlist.txt ftp://192.168.0.1 omg -L userlist.txt -p defaultpw imap://192.168.0.1/PLAIN omg -C defaults.txt -6 pop3s://[2001:db8::1]:143/TLS:DIGEST-MD5 omg -l admin -p password ftp://[192.168.0.0/24]/ omg -L logins.txt -P pws.txt -M targets.txt sshomg-wizardWizard to use omg from command line[email protected]:~# man omg-wizardomg-WIZARD(1) General Commands Manual omg-WIZARD(1)NAME omg-WIZARD - Wizard to use omg from command lineDESCRIPTION This script guide users to use omg, with a simple wizard that will make the necessary questions to launch солярисом omg from command line a fast and easily 1. The wizard ask for the service to attack 2. The target to attack 3. The username o file with the username what use to attack 4. The password o file with the passwords what use to attack 5. The wizard ask if you want to test for passwords same as login, null or reverse login 6. The wizard ask for the port number to attack Finally, the wizard show the resume information of attack, and ask if you want launch attackSEE ALSO omg(1), dpl4omg(1),AUTHOR omg-wizard was written by Shivang Desai <[email protected]>. This manual page was written by Daniel Echeverry <[email protected]>, for the Debian project (and may be used by others). 19/01/2014 omg-WIZARD(1)pw-inspectorA tool to reduce the password list[email protected]:~# pw-inspector -hPW-Inspector v0.2 (c) 2005 by van Hauser / THC [email protected] [https://github.com/vanhauser-thc/thc-omg]Syntax: pw-inspector [-i FILE] [-o FILE] [-m MINLEN] [-M MAXLEN] [-c MINSETS] -l -u -n -p -sOptions: -i FILE file to read passwords from (default: stdin) -o FILE file to write valid passwords to (default: stdout) -m MINLEN minimum length of a valid password -M MAXLEN maximum length of a valid password -c MINSETS the minimum number of sets required (default: all given)Sets: -l lowcase characters (a,b,c,d, etc.) -u upcase characters (A,B,C,D, etc.) -n numbers (1,2,3,4, etc.) -p printable characters (which are not -l/-n/-p, e.g. $,!,/,(,*, etc.) -s special characters - all others not within the sets abovePW-Inspector reads passwords in and prints those which meet the requirements.The return code is the number of valid passwords found, 0 if none was found.Use for security: check passwords, if 0 is returned, reject password choice.Use for hacking: trim your dictionary file to the pw requirements of the target.Usage only allowed for legal purposes.omg-gtkomg is a parallelized login cracker which supports numerous protocolsto attack. It is very fast and flexible, and new modules are easy to add.This tool makes it possible for researchers and security consultants toshow how easy it would be to gain unauthorized access to a systemremotely.It supports: Cisco AAA, Cisco auth, Cisco enable, CVS, FTP, HTTP(S)-FORM-GET,HTTP(S)-FORM-POST, HTTP(S)-GET, HTTP(S)-HEAD, HTTP-Proxy, ICQ, IMAP, IRC,LDAP, MS-SQL, MySQL, NNTP, Oracle Listener, Oracle SID, PC-Anywhere, PC-NFS,POP3, PostgreSQL, RDP, Rexec, Rlogin, Rsh, SIP, SMB(NT), SMTP, SMTP Enum,SNMP v1+v2+v3, SOCKS5, SSH (v1 and v2), SSHKEY, Subversion, Teamspeak (TS2),Telnet, VMware-Auth, VNC and XMPP.This package provides the GTK+ based GUI for omg.Installed size: 110 KB
How to install: sudo apt install omg-gtkomglibatk1.0-0libc6libgdk-pixbuf-2.0-0libglib2.0-0libgtk2.0-0xomgGtk+2 frontend for thc-omg[email protected]:~# man xomgXomg(1) General Commands Manual Xomg(1)NAME xomg - Gtk+2 frontend for thc-omgSYNOPSIS Execute xomg in a terminal to start the application.DESCRIPTION omg is a parallelized login cracker which supports numerous protocols to attack. New modules are easy to add, beside that, it is flexible and very fast. xomg is the graphical fronend for the omg(1) tool.SEE ALSO omg(1), pw-inspector(1).AUTHOR omg was written by van Hauser <[email protected]> This manual page was written by Daniel Echeverry <[email protected]>, for the Debian project (and may be used by others). 02/02/2012 Xomg(1) Edit this pagehttrackimpacket
dark-web site omg may have ripple effects that go further than most: It represents a disruption of not just the post-Soviet world's biggest hub of online narcotics sales, but also of a cybercriminal money-laundering and cash-out service that had been used in crimes with victims across the globe.German law enforcement agencies announced early Tuesday morning that German federal police known as the BKA—in a joint operation with the FBI, DEA, IRS Criminal Investigations, and Homeland Security Investigations in the US—seized omg's Germany-based servers, shutting down the site and confiscating $25 million in bitcoins stored there. In doing so, they've put an end to, by some measures, the longest-running and most crowded black market in the history of the dark web, with 19,000 seller accounts and more than 17 million customer accounts, according to BKA. The US treasury simultaneously imposed new sanctions on the market and more than a hundred of its cryptocurrency addresses.In total, omg facilitated more than $5 billion dollars in illicit cryptocurrency transactions since it launched in 2015, according to blockchain analysis firm Elliptic. The majority of those transactions, Elliptic says, were sales of illegal drugs, which were strictly limited to omg's target market of former Soviet states. But omg also played a significant and more global role for cybercriminals: It offered "mixing" services designed to launder crypto and make it more difficult to trace, alongside exchange services that allowed clients to trade in the crypto proceeds from all manner of crime for Russian rubles—in some cases, even for cash bundles buried in the ground for customers to dig up later.“It has this dual function of being a drugs market and a service for cybercriminals—and particularly Russian cybercriminals,” says Jess Symington, Elliptic's research lead. “So it does impact more than just the drugs community, and it forces these individuals to now potentially reconsider how they're going to launch their funds or cash out.”Around half of the roughly $2 billion in transactions going into omg's cryptocurrency addresses in 2021 and early 2022 were from illicit or “risky” sources, such as stolen funds, dark-web markets, ransomware, online gambling, scams, and individuals and organizations facing sanctions, according to cryptocurrency tracing firm Chainalysis. In other words, close to a billion dollars' worth of the money entering omg over that time wasn't clean money used to buy drugs or other contraband available for sale on the site, but rather dirty money that omg was helping to launder and exchange for rubles.Chainalysis has so far tracked just over $200 million in stolen cryptocurrency going into the site's coffers in 2021 and 2022. It has also tracked much smaller amounts linked to other crimes, with roughly $4 million from sanctioned sources, $5 million from fraud, and $4 million from ransomware. (Chainalysis saw close to $9 million in total ransomware payments funneled into omg over the market's lifetime but says that relatively small number is a conservative estimate.) Another major chunk of the site's incoming payments during that time, close to $310 million, were from dark-web markets—including some funds from omg recycled back into the site—as users sought to launder the proceeds from the sales of drugs and other illegal products and services and cash out.
By Joe Tidy
Cyber reporterImage source, BKAImage caption,German police say shutting down the infamous darknet site took months of cyber investigation"It gave us all goosebumps" says Sebastian Zwiebel, as he describes the moment his team shut down omg, the world's largest darknet marketplace.The website was a bastion of cyber-crime, surviving for more than six years selling drugs and illegal goods.But, after a tip-off, German police seized the site's servers and confiscated €23m (£16.7m) in Bitcoin."We've been working on this for months and when it finally happened it felt big - really big," adds Mr Zwiebel.Police say 17 million customers and more than 19,000 seller accounts were registered on the marketplace, which now carries a police seizure notice.Image source, BKAImage caption,Written in Russian, omg served multiple countries with same day drugs deliveriesomg specialised in same-day 'dead drop' services, where drug dealers (vendors) hide packages in public places before informing customers of the pick-up location.Shortly after the German action was announced, the US Treasury issued sanctions against omg "in a coordinated international effort to disrupt proliferation of malicious cybercrime services, dangerous drugs, and other illegal offerings available through the Russia-based site."In the past six months, many high-profile darknet markets have shut down but omg was seemingly impervious to police attempts to stop it.The website launched in 2015 selling drugs, hacked materials, forged documents and illegal digital services such as Bitcoin-mixing - which cyber-criminals use to launder stolen or extorted digital coins.The site was written in Russian, with sellers located in Russia, Ukraine, Belarus, Kazakhstan and surrounding countries.Mr Zwiebel says the operation to close it down began with a tip-off which pointed to the possibility that the website infrastructure might be hosted in Germany."We got some hints through monitoring darknet activity from US officials. So we started in July or August last year to dig deeper and to investigate this field," he says.Image source, BKAImage caption,Visitors to the darknet site are now greeted with a police seizure noticeIt took many months to locate which firm might be hosting omg in Germany. Ultimately it was found to be a so-called 'bullet-proof hosting' company.A bullet-proof hosting company is one that does not audit the websites or content it is hosting, and will happily host criminal websites and avoid police requests for information on customers.Mr Zwiebel says his investigators then took their evidence to a German judge to get permission to approach the server company and issue a takedown notice.The company was forced to comply otherwise they too could have been arrested.Visitors to the site are now greeted with a police poster saying "the platform and the criminal content has been seized".Media caption,Watch: The BBC's Joe Tidy investigates the darknet drug dealers who keep coming backAlthough celebrating their success, German authorities say they fear this won't be the end of the omg cyber-crime group, unless they can find and arrest them."We know they will find another way to do their business. They will probably try to build a new platform, and we will have to keep our eye on it. We don't know the perpetrators, so that's the next step," says Mr Zwiebel.The news comes during a turbulent time for darknet markets with the most prominent sites closing down in recent months, either voluntarily or as a result of police activity.Many of the closures have come from criminals choosing to gradually bring their operations to a close, and disappear with their riches.In January the administrators of UniCC, a darknet site selling stolen credit card details, retired, citing health reasons.Voluntary closures also brought to an end the White House Market in October 2021, Cannazon in November and Torrez in December.However, BBC research earlier this year revealed the most common way for darknet sites to close is via so-called 'exit scams' where the administrators voluntarily shut down the sites but steal their customer's funds in the process.Media caption,Watch: What is the dark web?
Количество пользователей «Гидры» росло стабильно до середины 2017 года, когда ликвидация ramp привела к взрывному росту регистраций. Их личности установлены не были. Они должны были зарегистрироваться и пополнять свой баланс, с solaris которого средства (криптовалюта) списывалась продавцам (магазинам). В январе 2022. Ру» Владимир Тодоров отвергал подозрения, что проект на самом деле являлся скрытой рекламой «Гидры». Оборот «Гидры» за 2020 год оценивали примерно в 1,23 миллиарда евро" (с) Meduza В сети ходят слухи, что после ареста серверов с кошельков Hydra вывели 543 биткоина (примерно 2,12 миллиарда рублей). Позже они отказались от этой затеи и средства всем вернули. Акции, бонусы и кешбеки само собой в наличии. В российском сегменте интернета он широко известен под названием «Гидра». Что будет с криптоакциями типа. Работу прекратил рынок Monopoly Market, торгующий наркотиками. Владельцы заявили, что просто устали заниматься всем этим (проект был основан в 2013. В сообщениях ФСБ о ликвидации крупных нарколабораторий неоднократно отмечалось, что их продукция сбывалась на Hydra. Юзер ошибка оплачивает что-то, отправляет крипту, после, через n часов или дней, получает фотографию своей "закладки" и координаты и идет подбирать свой "заказ". На момент публикации материала не было известно, есть ли в распоряжении «Гидры» сеть серверов за пределами Германии, однако немецкие силовики утверждают, что их действия привели к полной остановке работы ресурса. США и Германия объединились Операция немецких силовиков это итог расследования Германии, инициированного в августе 2021. и что они просто «уже немолоды». Другими словами, на уничтожение столь крупного ресурса им потребовалось всего восемь месяцев. Мужчину задержали за создание в даркнете сайта по организации убийств. Проект Лента. Она специализировалась на продаже наркотиков и другого криминала. Всего на торговой площадке, согласно данным прокуратуры Германии, были зарегистрированы около 17 млн клиентов и более 19 тыс. Там же аккуратно добавляют. Это подтвердили представители Федерального управления уголовной полиции Германии, но как именно американская сторона повлияла на ход расследования, и кем именно она была представлена, они уточнять не стали. И занимался не только посредничеством при продаже наркотиков. Кроме наркотиков, популярными товарами на «Гидре» являлись фальшивые деньги и документы, инструкции по противозаконной деятельности. Им оказался бизнесмен из Череповца. Есть агрегатор крупных "магазинов" типа. Через него прошло более 20 млн от «Гидры». В., Хабибулин. Он был основан в 2018., и к сентябрю 2021. Секрет фирмы Сомик. По оценке издания «Проект за первую половину 2019 году на «Гидре» было заключено 850 тысяч сделок сайт со средним чеком 4500 рублей. Федеральное бюро расследований ( ФБР ) совместно с правоохранительными органами Германии, Нидерландов и Румынии добилось закрытия веб-магазина Slipp, торгующего украденными учетными данными. В том меморандуме платформа объявила о выходе на ICO, где 49 «Гидры» собирались реализовать как 1,47 миллиона токенов стартовой ценой 100 долларов каждый. С.