Jump to content

Byte-ul

Active Members
  • Posts

    2175
  • Joined

  • Last visited

  • Days Won

    30

Everything posted by Byte-ul

  1. Eu am raportat unul in octombrie anul trecut si inca nu au raspuns
  2. A exagerat, insa chiar si salarii de 30 milioane sunt foarte mici fata de alte tari. Deci tot se aplica ce a zis.
  3. Byte-ul

    Ilegal shit.

    Esti ilegal de prost. Vreau dreptate. // Angajeaza un avocat si da-i in judecata daca nu iti convine ceva. Ti-a explicat toata lumea dar tot batut in cap ramai.
  4. ai spus ca ai cumparat niste servere de la el parca. poate de acolo are datele tale sau nu era adevarat?
  5. Pai tu vrei sa-ti faci site dar nu stii ce fel de continut pui pe el? Fa-ti un site unde intrebi utilizatoru ce site sa iti faci. o.O
  6. It is working with signos.sqlite and logins.json. Both versions are supported. Make sure firefox doesn't have a master password set.
  7. Romanian: La revedere 2007, bine ai venit 2008 French: Au revoir 2007, bienvenue 2008 Spanish: Adios 2007, bienvenido 2008 German: Auf Wiedersehen 2007, Willkommen 2008
  8. Byte-ul

    RST Bashed

    Am I doing it right?
  9. "ia" este scris corect in propozitia ta
  10. sunt eu la facultate de electronica si telecomunicatii, acum trec anul 4 si pot sa iti spun ca nu mai stiu absolut nimic din ce am facut anii anteriori. nu am facut nimic practic inafara de a masura cacaturi pe niste placute jegoase si a seta osciloscoape futute pentru a vedea nush ce chestii la un semnal. vei rezolva circuite peste circuite cu rezistoare, condensatoare, bobine, diode, n tipuri de tranzistoare, amplificatoare operationale, alte chestii pe care le-am uitat. ah, am uitat sa precizez, nu am lipit niciodata ceva pe placuta, nici macar nu stiu cum se foloseste/numeste chestia de lipit.
  11. nimeni?
  12. https://rstforums.com/forum/rst-market.rst
  13. Romanul ala a descoperit un XSS. Nu are nicio treaba cu vulnerabilitatile in Flash Player. https://wikileaks.org/hackingteam/emails/emailid/316611 Cam ratat cel care a scris stirea, eh.
  14. The use-after-free vulnerability exists inside the built-in ByteArray class ByteArray - Adobe ActionScript® 3 (AS3 ) API Reference Let's create a simple ByteArray object: var ba:ByteArray = new ByteArray(); ba.length = 8; ba[1] = 1; Now we can access ba[] items and write numeric byte values into ba[]. Also we are allowed to write objects into ByteArray. For example: var obj = new MyClass(); ba[0] = obj; AS3 will try to implicitly convert the MyClass object into numeric value by calling the MyClass.valueOf() method. This method can be easily redefined within the user's code: class MyClass { prototype.valueOf = function() { ba.length = 88; // reallocate ba[] storage return 0; // return byte for ba[offset] } } Let's see how that implicit conversion occurs inside the native code: push esi mov eax, [esp+8] // the offset value from "ba[offset] = obj" push eax add ecx, 0x18 // ecx = this = "ba" object pointer call ByteArray.getStorage() // gets ba[offset] storage pointer and mov esi, eax // saves it in esi mov ecx, [esp+0xC] // "obj" pointer push ecx call AvmCore.toInteger() // call MyClass.valueOf() add esp,4 mov [esi], al // writes returned byte into array pop esi ret 8 On high-level language this will look like: void ByteArray.setObjInternal(int offset, obj) { byte* dest = this.getStorage(offset); dest* = toInteger(obj); } So the array storage pointer is saved in local variable, then AS3 valueOf() is invoked from the native code and returned byte is written into destination pointer at the end. If valueOf() changes the length of byte array (see above) and reallocates its internal storage, then local destination pointer becomes obsolete and further usage of that pointer can lead to UaF memory corruption. Using this vulnerability, it's very easy to control what byte will be written and at which offset this corruption will occur. Affected: Adobe Flash Player 9 and higher Testing: Open the test "calc.htm" file in your browser and press the button. on Windows: Calc.exe should be popped on desktop IE. Calc.exe should be run as a non-GUI child process in metro IE. Payload returns 0 from CreateProcessA("calc.exe") inside Chrome/FF sandbox. on OS X: Calculator is launched in FF or standalone Flash Player projector. Payload returns 1 from vfork() in Safari sandbox. Download: Adobe exp 2.rar Pass: 123456789
  15. The UaF memory coruption exists inside the AS3 "opaqueBackground" property setter of the flash.display.DisplayObject class. DisplayObject - Adobe ActionScript® 3 (AS3 ) API Reference The DisplayObject source code is not published like the core AS3 classes, so you have to view opaqueBackground setter in your disassembler. Affected: Adobe Flash Player 9+ 32/64-bit (since Jun 2006) Testing: Open the test "calc.htm" file in your browser and press the button. on Windows: Calc.exe should be popped on desktop IE. Calc.exe should be run as a non-GUI child process in metro IE. Payload returns 0 from CreateProcessA("calc.exe") inside Chrome/FF sandbox. You can run Chrome with the --no-sandbox switch to pop the calc. on OS X: Calculator is launched in FF or standalone Flash Player projector. Payload returns 1 from vfork() in Safari/Chrome sandbox (see console logs). Download: Adobe exp 1.rar Pass: 123456789
      • 1
      • Upvote
  16. Fisierul era .txt
  17. Gigel crede ca a gasit un cod mega secret ascuns intr-un mic fisier text. Continutul fisierului este urmatorul: 1147 7 780 629 1035 82 1003 791 277 548 562 Solutia pe PM. Postez hinturi pe parcurs. Hint 1: Gigel si-a dat seama ca fisierul era corupt atunci cand l-a copiat si lipsesc cateva caractere. A folosit un soft slabut de recuperare si a ajuns la urmatorul text: N=1147 7 780 629 1035 82 1003 791 277 548 562 Hint 2: Gigel a apelat la o firma specializata in recuperare date. Recuperarea nu a avut prea mult succes, insa s-a reusit gasirea a inca 2 caractere. N=1147 e=7 780 629 1035 82 1003 791 277 548 562 Au rezolvat: @theeternalwanderer
  18. Most probably. Test it.
  19. C# e exact acelasi cacat cu VB, doar ca difera sintaxa. VB-ul e mai user-friendly. Iti recomand C#.
  20. Presupun ca ai primit o scrisoare sau ceva de la ISP, nu? Posteaz-o aici.
  21. Get ebola and die.
  22. MyBB este cel mai bun Exista sute de pluginuri si teme, fiind foarte usor customizabil.
×
×
  • Create New...