Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 04/11/21 in Posts

  1. Adevaratul umar vaccinat al lui Nytro
    1 point
  2. deobice cand am nevoie de vreun api dau un ochi aici https://rapidapi.com/ e un fel de director de api-uri Nu stiu de unde isi iau ei datele sincer uitate pe site.
    1 point
  3. asta e js care se ocupa de api https://www.flashscore.com/x/js/core_2_1912000000.js din ce vad eu foloseste constantele din js-ul asta https://www.flashscore.com/res/_fs/build/constants.87bb9d4.js deci daca ai chef ai putea sa stai sa iti bati capul
    1 point
  4. https://apifootball.com/ iti da 180 de requesturi la ora
    1 point
  5. The researchers who discovered the bug have earned themselves $200,000. A zero-day vulnerability in Zoom which can be used to launch remote code execution (RCE) attacks has been disclosed by researchers. Pwn2Own, organized by the Zero Day Initiative, is a contest for white-hat cybersecurity professionals and teams to compete in the discovery of bugs in popular software and services. The latest competition included 23 entries, competing in different categories including web browsers, virtualization software, servers, enterprise communication, and local escalation of privilege. For successful entrants, the financial rewards can be high -- and in this case, Daan Keuper and Thijs Alkemade earned themselves $200,000 for their Zoom discovery. The researchers from Computest demonstrated a three-bug attack chain that caused an RCE on a target machine, and all without any form of user interaction. As Zoom has not yet had time to patch the critical security issue, the specific technical details of the vulnerability are being kept under wraps. However, an animation of the attack in action demonstrates how an attacker was able to open the calculator program of a machine running Zoom following its exploit. As noted by Malwarebytes, the attack works on both Windows and Mac versions of Zoom, but it has not -- yet -- been tested on iOS or Android. The browser version of the videoconferencing software is not impacted. In a statement to Tom's Guide, Zoom thanked the Computest researchers and said the company was "working to mitigate this issue with respect to Zoom Chat." In-session Zoom Meetings and Zoom Video Webinars are not affected. Vendors have a 90-day window, which is standard practice in vulnerability disclosure programs, to resolve the security issues found. End-users just need to wait for a patch to be issued -- but if worried, they can use the browser version in the meantime. Other successful attacks of note during the content include: Apple Safari: Jack Dates, kernel-level code execution, $100,000 Microsoft Exchange: DEVCORE, complete server takeover, $200,000 Microsoft Teams: OV, code execution, $200,000 Ubuntu Desktop: Ryota Shiga, standard user to root, $30,000 Via zdnet.com
    1 point
  6. ai incercat si binar hex? uneori conversia este binara "as byte"
    1 point
  7. 1, eu zic sa te uiti la js-ul de pagina care citeste chestia asta. 2. daca ai nevoie de un feed de un feed live de scores api de ce nu cauti unul open source 3. la ce lucrezi ca incepe sa devina interesant . faci ceva director cu gen de toate in unul ?
    1 point
  8. Daca ai luat din response, posteaza si response.headers ca sa vedem daca se poate face ceva
    1 point
  9. Salut, nu poti sa il decriptezi pentru ca nu e criptat. E probabil un format binar, acei bytes in hex au ceva insemnatate. E dificil sa faci "reversing" pe un astfel de text, poti sa deduci anumite lucruri, dar complet e foarte greu. O solutie ar fi sa stii ce program in genereaza si reverse engineering pe el ar trebui sa spuna cam ce contine fisierul.
    1 point
×
×
  • Create New...