What's new

S·T·S New Working CF ACCOUNT,locked ko muna

Status
Not open for further replies.
boss baka pwede ko bilhin isa sa mga bug host mo name your price money first ako if you want lang naman idolo
boss baka mamaya ma ban na naman account ko ha,hehe ayaw ko na mag pa ban ulit dahil sa pagbebenta ng mga prohibited,,baka isipin nila nagbebeta ako ng bughost,,,haha,,di ko po ito iintertainin,,wala po ako plano ibenta ,,pagsikapan nalang makuha bughost,,may ilan nga dito nakuha naman nila di nga yun spoonfeed haha😅😅😅

umaasa ako mag reply ka idol its ok agree or not i ll respect po
haha pasensya na po
 
boss baka mamaya ma ban na naman account ko ha,hehe ayaw ko na mag pa ban ulit dahil sa pagbebenta ng mga prohibited,,baka isipin nila nagbebeta ako ng bughost,,,haha,,di ko po ito iintertainin,,wala po ako plano ibenta ,,pagsikapan nalang makuha bughost,,may ilan nga dito nakuha naman nila di nga yun spoonfeed haha😅😅😅


haha pasensya na po
ok po idolo no problem
 
PYThon app i install?
yess!
kapag successful ka na nakahunt ng amazon based server,,i sscan pa kc yung ip range nun,,kc hindi lahat na naka paloob sa ip range gumagana sa sts noload,,kaya need pa din yun i scan gamit ang sslscan through termux,,dapat naka enable sya sa SSL port 443 yun ang gumagana..

Bukas ulit mga ka PHC,,pag may tyaga may bughost....
 
yess!
kapag successful ka na nakahunt ng amazon based server,,i sscan pa kc yung ip range nun,,kc hindi lahat na naka paloob sa ip range gumagana sa sts noload,,kaya need pa din yun i scan gamit ang sslscan through termux,,dapat naka enable sya sa SSL port 443 yun ang gumagana..

Bukas ulit mga ka PHC,,pag may tyaga may bughost....
****api.paymaya.com tama ba idol ?
 
yess!
kapag successful ka na nakahunt ng amazon based server,,i sscan pa kc yung ip range nun,,kc hindi lahat na naka paloob sa ip range gumagana sa sts noload,,kaya need pa din yun i scan gamit ang sslscan through termux,,dapat naka enable sya sa SSL port 443 yun ang gumagana..

Bukas ulit mga ka PHC,,pag may tyaga may bughost....
Dami mo alam.. port scanner lng malalaman na kung open ang 443 port

Hindi lahat open sa 443 working sa sts😂😂😂
 
yess!
kapag successful ka na nakahunt ng amazon based server,,i sscan pa kc yung ip range nun,,kc hindi lahat na naka paloob sa ip range gumagana sa sts noload,,kaya need pa din yun i scan gamit ang sslscan through termux,,dapat naka enable sya sa SSL port 443 yun ang gumagana..

Bukas ulit mga ka PHC,,pag may tyaga may bughost....
Dapat may script sa python kung e install sa termux
 
Dapat may script sa python kung e install sa termux
no need script i mag cocommand lang tayo haha..

Dami mo alam.. port scanner lng malalaman na kung open ang 443 port

Hindi lahat open sa 443 working sa sts😂😂😂
weh ituro mo full method ng sinasabi mo haha

eto sakin ilatag ko na ,,ikaw yata ang hambog dito...


First, open termux app
type:
1. apt update && apt upgrade
2 .pkg install python (skip this if python is already installed)
3. python -m pip install -U pip

4. pkg install nmap
5. pkg install sslscan


now, we will use 18.?.?2/24 as an example, type:
6. nmap -sL -n 18.?.?.2/24 | awk '/Nmap scan report for /{print $NF}' > FILENAME.txt

it will generate a .txt file that contains the list of IP address within the scanned route.

optional: to confirm if the command was successful, type ls and you will see the FILENAME.txt

next step; type:
7. sslscan, there you will see a list of arguments for sslscan.

we will be using the --tls12 argument since most of the working bughosts are TLS1.2 enabled.

let's proceed; type:
8. sslscan --no-check-certificate --no-cipher-details --no-ciphersuites --no-compression --no-fallback --no-groups --no-heartbleed --no-renegotiation --no-sigs --tls12 --timeout=3 --targets=FILENAME.txt | awk '/Connected/ || /enabled/{print}' > FILENAMEres.txt

change the FILENAME of the targeted file— the one we created in step 6.

optional: change the timeout value with any value you want. i suggest you use 3.

also change the FILENAMEres, make sure you add 'res' which means 'result' to not make it complicated after.

after executing the step 8, it will generate a list of IPs with the ones with TLS1.2 enabled (but you have to wait until it finishes scanning). those that are TLS1.2 enabled are working with noload.

optional: for those who want to monitor the output. type:
sslscan --no-check-certificate --no-cipher-details --no-ciphersuites --no-compression --no-fallback --no-groups --no-heartbleed --no-renegotiation --no-sigs --tls12 --timeout=3 --targets=FILENAME.txt --xml=FILENAMEres.xml

to search for working bughosts from the .xml file, type:
cat FILENAMEres.xml | awk '/sniname/ || /"1"/{print}'

those IP addresses with the word 'enabled' below it are working bughosts.

screenshot ko na ba yyng na scan kong bughost na gumagana ,,haha😅😅😅😅
para tumahan ka na bossing..
 
Last edited:
no need script i mag cocommand lang tayo haha..


weh ituro mo full method ng sinasabi mo haha

eto sakin ilatag ko na ,,ikaw yata ang hambog dito...


First, open termux app
type:
1. apt update && apt upgrade
2 .pkg install python (skip this if python is already installed)
3. python -m pip install -U pip

4. pkg install nmap
5. pkg install sslscan


now, we will use 18.?.?2/24 as an example, type:
6. nmap -sL -n 18.?.?.2/24 | awk '/Nmap scan report for /{print $NF}' > FILENAME.txt

it will generate a .txt file that contains the list of IP address within the scanned route.

optional: to confirm if the command was successful, type ls and you will see the FILENAME.txt

next step; type:
7. sslscan, there you will see a list of arguments for sslscan.

we will be using the --tls12 argument since most of the working bughosts are TLS1.2 enabled.

let's proceed; type:
8. sslscan --no-check-certificate --no-cipher-details --no-ciphersuites --no-compression --no-fallback --no-groups --no-heartbleed --no-renegotiation --no-sigs --tls12 --timeout=3 --targets=FILENAME.txt | awk '/Connected/ || /enabled/{print}' > FILENAMEres.txt

change the FILENAME of the targeted file— the one we created in step 6.

optional: change the timeout value with any value you want. i suggest you use 3.

also change the FILENAMEres, make sure you add 'res' which means 'result' to not make it complicated after.

after executing the step 8, it will generate a list of IPs with the ones with TLS1.2 enabled (but you have to wait until it finishes scanning). those that are TLS1.2 enabled are working with noload.

optional: for those who want to monitor the output. type:
sslscan --no-check-certificate --no-cipher-details --no-ciphersuites --no-compression --no-fallback --no-groups --no-heartbleed --no-renegotiation --no-sigs --tls12 --timeout=3 --targets=FILENAME.txt --xml=FILENAMEres.xml

to search for working bughosts from the .xml file, type:
cat FILENAMEres.xml | awk '/sniname/ || /"1"/{print}'

those IP addresses with the word 'enabled' below it are working bughosts.

screenshot ko na ba yyng na scan kong bughost na gumagana ,,haha😅😅😅😅
para tumahan ka na bossing..
láρág mo na daw idol hehe
 
no need script i mag cocommand lang tayo haha..


weh ituro mo full method ng sinasabi mo haha

eto sakin ilatag ko na ,,ikaw yata ang hambog dito...


First, open termux app
type:
1. apt update && apt upgrade
2 .pkg install python (skip this if python is already installed)
3. python -m pip install -U pip

4. pkg install nmap
5. pkg install sslscan


now, we will use 18.?.?2/24 as an example, type:
6. nmap -sL -n 18.?.?.2/24 | awk '/Nmap scan report for /{print $NF}' > FILENAME.txt

it will generate a .txt file that contains the list of IP address within the scanned route.

optional: to confirm if the command was successful, type ls and you will see the FILENAME.txt

next step; type:
7. sslscan, there you will see a list of arguments for sslscan.

we will be using the --tls12 argument since most of the working bughosts are TLS1.2 enabled.

let's proceed; type:
8. sslscan --no-check-certificate --no-cipher-details --no-ciphersuites --no-compression --no-fallback --no-groups --no-heartbleed --no-renegotiation --no-sigs --tls12 --timeout=3 --targets=FILENAME.txt | awk '/Connected/ || /enabled/{print}' > FILENAMEres.txt

change the FILENAME of the targeted file— the one we created in step 6.

optional: change the timeout value with any value you want. i suggest you use 3.

also change the FILENAMEres, make sure you add 'res' which means 'result' to not make it complicated after.

after executing the step 8, it will generate a list of IPs with the ones with TLS1.2 enabled (but you have to wait until it finishes scanning). those that are TLS1.2 enabled are working with noload.

optional: for those who want to monitor the output. type:
sslscan --no-check-certificate --no-cipher-details --no-ciphersuites --no-compression --no-fallback --no-groups --no-heartbleed --no-renegotiation --no-sigs --tls12 --timeout=3 --targets=FILENAME.txt --xml=FILENAMEres.xml

to search for working bughosts from the .xml file, type:
cat FILENAMEres.xml | awk '/sniname/ || /"1"/{print}'

those IP addresses with the word 'enabled' below it are working bughosts.

screenshot ko na ba yyng na scan kong bughost na gumagana ,,haha😅😅😅😅
para tumahan ka na bossing..
Screenshot mo idol tas delete agad ahaha
 
Status
Not open for further replies.
Back
Top