Best Blackhat Forum

Full Version: [GET] WP Freshstart 5 Pro v5.12
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Pages: 1 2
[Image: wpfs5cover.png]


WP Freshstart 5.0 - $97 Value
That will do 30 menial WP tasks in just 2 minutes flat!

Add All Required GDPR Pages, Forms and Actions to your Site
GDPR Page Creator Tools for Terms of Use, Privacy and Cookie Policy
Automatically Make Money from your sites using Automatic Affiliate Links and Amazon Product Links
Clean up all the default posts, pages and comments
Configure must have Wordpress generate settings.
Make your Site Google SEO Friendly
Create must have pages like about us, contact us etc.
Adding important pages such as affiliate, amazon and earnings disclaimers.
Adding pages like Anti Spam, DMCA and Copyright Notice.
Install multiple PLUGINS at once that every site needs.
Create unlimited blank pages, posts and categories.
PLUS ALL THE NEW 5.0 FEATURES listed above.



Sales Page: http://wpfreshstart5.com/v5/sales/

Download: https://www70.zippyshare.com/v/wi8m90HY/file.html

BBHF password
password does not work

password is: bestblackhatforum
Need purchase email to activate the plugin.
Thanks for the share my friend, +max reps added :)

For the future uploads, Original forum password is:
Code:
bestblackhatforum.com

Thanks
Silly PW. No VT info shared in OP.
Sent to VT, results = NOT 100% CLEAN:
Code:
https://www.virustotal.com/#/file/0cec885d9fd542ddbabbbbe355f63246ec5f8046d2d44f1468fbdaad6c6a6e67/detection

One engine detected this file
SHA-256    0cec885d9fd542ddbabbbbe355f63246ec5f8046d2d44f1468fbdaad6c6a6e67
File name    512pro.rar
File size    995.79 KB
Last analysis    2018-09-15

Bkav - VEX.Webshell
(Webshell is a serious threat to WP sites no matter what AV detects it.)

It will be great when someone shares a 100% clean upload of this very useful plugin !!
Thanks
This is untouched from original source!! just repacked to rar and added password
but i let it run through VirusTotal too and 1 possible found..

you can compare files ..i didn't touch the source since it needed not to be nulled

http://wpfreshstart.s3.amazonaws.com/v5/...t5-pro.zip
Thanks for replying Ramonski.
I have read at least several times how either by design or by accident that plugin devs have included Webshell in their products.
That is a very bad thing to either do, or allow as everything about Webshell indicates it opens unauthorized accesses to WP sites.

This malware inside their product may also be related with their having a 100% wide open bucket ??

I do very much hope that it is possible for someone here who is really skilled in such matters to show the rest of us how to get rid of Webshell infestations sometime soon !!
(09-16-2018 10:40 AM)smithnowt Wrote: [ -> ]Thanks for replying Ramonski.
I have read at least several times how either by design or by accident that plugin devs have included Webshell in their products.
That is a very bad thing to either do, or allow as everything about Webshell indicates it opens unauthorized accesses to WP sites.

This malware inside their product may also be related with their having a 100% wide open bucket ??

I do very much hope that it is possible for someone here who is really skilled in such matters to show the rest of us how to get rid of Webshell infestations sometime soon !!

Thank you very much!!
Very good information! thank you and keep the eyes open! That sucks if the developers put that them own inside .. or is it a false positive ? maybe someone has time to look into
Thanks for the thanks Berlinerin and Ramonski.

I must confess that I've become very careful to always check WP addons either via the provided VT or doing it myself.
This was pushed rather hard to my attention when several folks shared infected stuff here that had VT URLs that were made by telling it to scan the filesharing site INSTEAD of the actual file - which is 100% useless and meaningless.
Good thing it is easy to figure out with just a glance though - if/when it says URL intead of a filename, it is exactly that BS and can make for covering bad stuff for anyone not careful enough to notice.

Not all devs are either careful or kosher either and with so many sites depending upon WP now, it must be easy to exploit backdoors when users know no better.

Another trick that some users do here is to grab infested stuff from the site code...x...in...h, re-upload it as a new share, as-is, then share it here - even going so far as to use the marked photos from their source, a dead giveaway of their carelessness.

I strongly suggest that folks be on the lookout for Webshell and other backdoors if there is any desire to keep their hard works safe from malware and exploits.
Pages: 1 2
Reference URL's