Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 04/02/11 in all areas

  1. winmine_patched.rar aici e minesweeper-ul tau patchuit. Ce am facut: in functia ce se apeleaza cand apesi pe un buton codul ce se executa cand apasam pe bomba e dupa 0100352D |. 74 66 JE SHORT winmine.01003595 Am suprascris ce era dupa acest jump cu : 0100352F 8B4424 18 MOV EAX,DWORD PTR SS:[ESP+18] 01003533 50 PUSH EAX 01003534 8B4424 18 MOV EAX,DWORD PTR SS:[ESP+18] 01003538 50 PUSH EAX 01003539 E8 11020000 CALL winmine.0100374F 0100353E EB 70 JMP SHORT winmine.010035B0 Adica am pus din nou pe stiva coordonatele x si y si am apelat functia MakeGuess care pune stegulet si am sarit la finalul functiei curente. Vad ca este totusi un bug si anume ca nu tot mereu imi apare la sfarsit ca am terminat jocu in functie de ultimele clickuri dar nu am timp sa mai stau pe el. P.S.: Nu mai mentionez aici cat de mare am pula si ca o puneam pe maica-mea sa copieze "mNmemoice" din cartea "totul despre microprocesorul Z80" pentru ca o aveam imprumutata doar 3 zile si eram disperat erau prea multe pagini. In alta ordine de idei e trist ca vedem tot felu de certuri intre detinatori de putza sau pula . In loc sa invatam impreuna, sa ne ajutam, sa schimbam o idee, un tool, o metoda etc. ne pierdem timpu sa ne agitam care e mai jmeker. Chiar daca esti tare, de unul singur avansezi mai greu si trebuie sa fi deschis la un schimb de informatii, sa iei dar si sa oferi ceva, altfel nu ai ce cauta pe un forum.
    1 point
  2. Hexjector Version 1.0.7.3SE (5/6/2010) Changes Made from previous release : -Special Edition -Disclaimer added. -Hexjector Official Documentation for Win32 released. -MySQL Injection v5 Full Database Enumeration (There was a few bugs in past releases that is fixed in this version and Data Retrieved is checked one by one.). -Persistent XSS is patched by filtering the $url2. (For the Patch, you can find it at Exploitdb or email me if it has still not posted at exploitdb) -Html Dump temporary removed due to 0day Vulnerablity found by me. -Video regarding 0day Exploit is made and uploaded at youtube. -Non-Persistent XSS is patched. -Another Non-persistent XSS is patched (Hexdumper). -Yet Another Non-persistent XSS is patched (Hexafind). -Every input is filtered to prevent XSS. -cURL is modified to reduce HTTP Request Time Usage. -Type of Injection(Numeric,String Based) added. -Changes in Query according to Numeric or String Based Detection is added. -Total Queries Generated for Information_schema,phpmyadmin and mysql is 359. -Error in Hexdumper fixed. (wafdetect($dumpstr)) -Filenames had been modifed to make it more professional. -Error in Column Count is patched. -Coalesce() is added. -Error on conditional matching is fixed. ($str_col=true) -Now I will focus on MySQL Injection v4. -MySQL Injection v4 is temporary disabled as I never refined the code since made and it is kind of buggy. -You may notice some performance slow down.(Reason is located at the below). -Problem on if there is too many columns ,only partial of the data will be extracted is patched. -Interface changed to aid users in finding the data wanted(Data are in bold). -SiXSS Added. -Custom Header is added. -Server Information is added. -Connect4.php editted to make it more error-proof. -Processes of Hexafind,Hexoutfile and Hexdumpfile has been changed to make it more real-time. -Hexoutfile(Into OutFile) added. -New File Created : hexoutfile.php -Hexdumpfile(Into DumpFile) added . -New File Created : hexdumpfile.php -Load_File added. -New File Created : hexloader.php -Custom Back Parameter added. -Update Check Module is added. -Version Comment added. -Operating System Detection added. -Operating System Architecture Detection added. -Temporary Directory Retrieval Added. -New File added : HexacURL.php -HexacURL is a cURL based webbrowser with Header Enumeration to ease Professional Pentesters to solve the sql query problems. -Non-persistent XSS is expected if the site has XSS.It is more or less like a browser so this is normal. -Testers can use it to find the unique parameter input it in Custom Parameter of Hexjector so Hexjector can execute. -Custom Whitespace added. -To Hexadecimal added. -Url_encode added. -Url_decode added. Download Link : Windows : https://sourceforge.net/projects/hexjector/files/Hexjector%20%28Win32%29/Hexjector%20v1.0.7.3SE.zip/download Unix : https://sourceforge.net/projects/hexjector/files/Hexjector%20%28Unix%29/Hexjector%20v1.0.7.3SE.tar/download Mac : https://sourceforge.net/projects/hexjector/files/Hexjector%20%28Mac%29/Hexjector%20v1.0.7.3SE.tar/download
    -1 points
×
×
  • Create New...