Jump to content

zbeng

Active Members
  • Posts

    2402
  • Joined

  • Last visited

  • Days Won

    3

Everything posted by zbeng

  1. zbeng

    No smoking

    mai sus este un topic important unde pune poze fun
  2. inainte de a posta te rog sa caui m-ai bine
  3. de nu bag photoshop si incerc si eu
  4. gresti vei gasi pe descktop un document.txt cu toate folderele din c Directory of C:\CCleaner 29/05/2007 19:10 <DIR> . 29/05/2007 19:10 <DIR> .. 26/03/2007 16:23 4.563 cc.reg 29/05/2007 19:11 135.705 cc_20070529_1910.reg 16/11/2005 18:01 25.088 CCHelper.ocx 12/05/2005 16:04 27.648 ccleaner.dll
  5. http://rapidshare.de/files/28858766/CD_02_Hacker_Underworld.part6.rar.html [url]http://rapidshare.de/files/28859515/CD_02_Hacker_Underworld.part1.rar.html[/url] [url]http://rapidshare.de/files/28859546/CD_02_Hacker_Underworld.part3.rar.html[/url] [url]http://rapidshare.de/files/28859770/CD_02_Hacker_Underworld.part4.rar.html[/url] [url]http://rapidshare.de/files/28860669/CD_02_Hacker_Underworld.part2.rar.html[/url] [url]http://rapidshare.de/files/28860829/CD_02_Hacker_Underworld.part5.rar.html[/url] Pass rar: Gold4rum.net Pass inside : Beast" sau http://depositfiles.com/files/363975 [url]http://depositfiles.com/files/364049[/url]
  6. nokia 6233 ms spiri de sfat e belea un pda si un n73
  7. zbeng

    hello

    bun venit pe aici
  8. zbeng

    Ranguri RST?

    ooo da msssss
  9. zbeng

    ROMANIA

    Vorbeam mai demult cu un om umblat prin lume, si imi zicea diverse lucruri, din care doua m-au facut sa ma gandesc : 1) Nemtii spun ca nici in Germania nu vad masinile de pe strazile Romaniei ; 2) Grecu`, daca are 100.000$ isi ia o masina de 10.000$ pentru ca se gandeste si la intretinerea ei; pe cand in Romania, daca ai 100.000$, mai faci un imprumut de inca 20.000$ la banca sa-ti iei masina mult-visata. Suntem tampiti, sau stim sa ne calculam banii mult mai bine ca altii ?
  10. e putin cam vechi o sa revin cu ceva cat mai nou.
  11. stiu doar locatie C:\texte\
  12. zbeng

    Ranguri RST?

    marimea: ca avatarul tau sa scrie moderator si ceva stelute p
  13. zbeng

    Ranguri RST?

    da ca ador stelutele:D daca e fa un avatar asa pt mine
  14. zbeng

    Ranguri RST?

    modrator cu stelute nu se poate :D
  15. I just wrote this guide to give you some tips of which you may not have heard yet. Hopefully, it won't come to a hacker getting in, but if it does... Tip 1: Hackers cover their tracks. Experienced hackers cover them more thorougly, but amateur hackers sometimes leave things behind. Don't expect them to leave any really big evidence behind; expect more of little things here and there you might find surprising. For example, if you're writing a term paper and a black hat hacker accidently saved it when he took a paragraph out- that's suspicious. Where did that paragraph go? Well, for one thing, now you know he was in that area. Check the folders surrounding the file- you might find something. Tip 2: Decipher between the type of hackers that are attacking you. Experienced hackers will have a more in depth look around when they penetrate your system. They won't touch much because they know that that won't add too much to their knowledge. But if you know a hacker's been in, and some files are messed with, and you have a log of someone guessing passwords to a file or something of that sort, its probably some newbie who's just starting out. These are the easiest hackers to catch. They usually get so caught up in thoughts like "I'm in!" that they forget the basics, such as work behind a proxy. My friend was setting up a webserver once. His first time too, and he wasn't to anxious to set up some good software to protect against hackers and viruses. He didn't put up one IDS, and before you know it, the obvious happened. But this time, a newbie had struck. The nice log files showed, bluntly across the screen, multiple instances of a foreign IP address that stood out. Some stupid newbie had tried to login as "uucp" on my friend's XP computer, with a password of "uucp." Well, that's great, but he also had tried the same user/pass combination three times, enough to get himself logged nicely. Even a semi-brainless user with some form of neurological system knows that uucp isn't a default XP account. Again, excitement toiled this hacker's brain, and maybe if he hadn't done that, along with a few other stupid things, he wouldn't have gotten caught. What other things did he do? Well, lets see. He openned 35 instances of MS-DOS. He tried to clean the printer's heads, and he edited a .gif in notepad. Then he uninstalled a few programs and installed some html editor, and replaced four files with the words "14P." He might as well have posted his phone number. In a few days, we had tracked him down to a suburban town in Ohio. We let him go, not pressing any charges, because he had done nothing really damaging and had provided me with an example of a moron for this guide. Tip 3: Don't go crazy if you lose data. Chances are, if it was that important, you would have backed it up anyway. Most hackers nowadays wish they were back in 1989 when they could use a Black Box and having a Rainbow Book actually meant something. Most hackers aren't blackhat, they are whitehat, and some even greyhat. But in the end, most hackers that are in systems aren't satisfied by looking around. From past experiences, I have concluded that many hackers like to remember where've they been. So, what do they do? They either press delete here and there, or copy some files onto their systems. Stupid hackers (yes, there are plenty of stupid hackers) send files to e-mail addresses. Some free email companies will give you the IP of a certain e-mail address's user if you can prove that user has been notoriously hacking you. But most of the time, by the time you get the e-mail addy it's been unused for weeks if not months or years, and services like hotmail have already deleted it. Tip 4: Save information! Any information that you get from a log file (proxy server IP, things like "14P", e-mail addresses that things were sent to, etc.) should be saved to a floppy disk (they're not floppy anymore, I wish I could get out of the habit of calling them that) incase there's a next time. If you get another attack, from the same proxy, or with similar e-mail addresses (e.g: one says Blackjack 123@something.whatever and the other says Black_jack_45@something.znn.com) you can make an assumption that these hackers are the same people. In that case, it would probably be worth the effort to resolve the IP using the proxy and do a traceroute. Pressing charges is recommended if this is a repeat offender. Tip 5: Don't be stupid. If you've been hacked, take security to the next level. Hackers do talk about people they've hacked and they do post IPs and e-mail addresses. Proof? Take a look at Defcon Conventions. I've never gone to one, but I've seen the photos. The "Wall of Shame"-type of boards I've seen have IPs and e-mail addresses written all over them in fat red, dry-erase ink. Don't be the one to go searching the Defcon website and find your e-mail address posted on the Wall of Shame board Tip 6: Don't rely on luck. Chances are, sometime or another, you're going to be targeted for an attack. Here you can rely on luck. Maybe they'll forget? Maybe
  16. zbeng==> zbenguit nu am stare ador viteza si femeile cam de la asta pe mirc intram cu malibu ==> de la bautura
  17. NUME arp - manipuleaza cache-ul ARP al sistemului SINOPTICA arp [-vn] [-H tip] [-i interfata] -a [nume_gazda] arp [-v] [-i interfata] -d nume_gazda [pub] arp [-v] [-H tip] [-i interfata] -s nume_gazda adresa_hw [temp] arp [-v] [-H tip] [-i interfata] -s nume_gazda adresa_hw [netmask masca_retea] pub arp [-v] [-H tip] [-i interfata] -Ds nume_gazda adr_hw_interf [netmask masca_retea] pub arp [-vnD ] [-H tip ] [-i interfata ] -f fisier DESCRIERE Arp manipuleaza in diferite moduri cache-ul ARP al kernel-ului. Optiunile primare sint stergerea unei intrari de mapare de adresa si setarea manuala a alteia. In scop de depanare, programul arp permite si o listare a intregului cache ARP. OPTIUNI -v, --verbose Afiseaza informatii detaliate despre actiunile intreprinse. -n, --numeric afiseaza adrese numerice in loc sa incerce sa determine numele simbolice ale gazdei, portului si utilizatorului. -H tip, --hw-type tip Cind se seteaza sau este citit cache-ul ARP, acest parametru optional indica arp pentru ce clase de adrese sa actioneze. Valoare implicita a acestui parametru este ether (adica codul hardware 0x01 pentru Ethernet IEEE 802.3 10Mbps). Alte valori ar putea include tehnologii de retea ca ARCnet (arcnet), PROnet (pronet), AX.25 (ax25) si NET/ROM (netrom). -a [nume_gazda], --display [nume_gazda] Afiseaza intrarile pentru gazdele specificate. Daca parametrul nume_gazda nu este utilizat, vor fi afisate toate intrarile. -d nume_gazda, --delete nume_gazda Elimina toate intrarile pentru gazda specificata. Aceasta poate fi utilizata in cazul in care gazda indicata a fost oprita, de exemplu. -D, --use-device Utilizeaza adresa hardware a adr_hw_interf. -i interfata, --device interfata Selecteaza o interfata. Cind se afiseaza continutul cache-ului ARP, vor listate numai intrarile care se potrivesc cu interfata specificata. Cind se seteaza o intrare ARP permanenta sau temp, aceasta interfata va fi asociata cu intrarea. Daca aceasta optiune nu este utilizata, kernel-ul va face estimarea bazindu-se pe tabela de rutare. Pentru intrarile pub interfata specificata va fi cea pe care se raspunde la cererile ARP. OBSERVATIE: Aceasta trebuie sa fie diferita de interfata pe care vor fi rutate datagramele IP. -s nume_gazda adresa_hw, --set nume_gazda Creeaza manual o intrare de mapare ARP de adresa pentru gazda nume_gazda cu adresa hardware setata la adresa_hw. Formatul pentru adresa hardware este dependent de clasa hardware, dar pentru cele mai multe clase se poate asuma reprezentarea uzuala. Pentru clasa Ethernet, aceasta este 6 octeti in hexazecimal, separatati prin caractere "doua puncte". Cind se adauga intrari arp proxy (care sint acelea cu fanionul pub ce setat) poate fi specificata masca de retea cu netmask pentru a face proxy arp pentru intreaga retea. Aceasta nu este o practica buna, dar este suportata de kernel-uri mai vechi deoarece sint situatii cind poate fi utila. Daca fanionul temp nu este dat, intrarile vor fi memorate permanent in cache-ul ARP. OBSERVATIE: Incepind cu kernel-uri 2.2.0 nu mai este posibil sa fie setata o intrare ARP pentru o intreaga subretea. -f nume_fisier, --file nume_fisier Similara cu optiunea -s, numai ca de data aceasta informatiile de adresa sint luate din fisierul nume_fisier. Aceasta poate fi utila cind trebuie sa setati intrari ARP pentru o multime de gazde. Numele fisierului de date este de cele mai multe ori /etc/ethers, dar nu este ceva oficial. Formatul fisierului este simplu. El contine linii de text cu nume de gazda si adresa hardware, separate de spatii. Aditional, se pot utiliza fanioanele pub, temp si netmask. In toate situatile in care este asteptat parametrul nume_gazda se poate introduce adresa IP in notatia de numere zecimale separate de puncte. Fiecare intrare completa din cache-ul ARP va fi marcata cu fanionul C. Intrarile permanente sint marcate cu M si cele publicate, cu fanionul P. FISIERE /proc/net/arp, /etc/networks /etc/hosts /etc/ethers VEDETI SI rarp(8), route(8), ifconfig(8), netstat(8) AUTORI Fred N. van Kempen,
  18. tu nu ai somn:D
  19. zbeng

    Fonts Pack 2007

    sa-mi faci un avatar cand ai timp
  20. zbeng

    Simple Trojan

    Making a visual basic Trojan horse is pretty simple. In this brief tutorial I will attempt to show how with Winsock you can connect two applications together over the Internet. When you see the average Trojan horse such as Messiah, you notice that they generally come into two parts, the Client and the Server. Client. --------- The Client application is usualy the application that connects to the server on a specific port which the server is listerning on. The coding itself to make winsock connect is pretty easy, however you will need to firstly draw a WINSOCK control on your form, so to do that go to the Projects menu, click Components, and look down the new list for "Microsoft Winsock Control 6.0", select it and hit apply. On your control toolbar, there should be a new thing added, select it and draw it on the form. Don't worry its invisible at runtime. Right, you now need to make a 2 text boxes, call one TXTIP and one TXTPort to make life easier, These are basically going to allow Winsock to connect to the correct IP addressn on the correct Port that the user specifies. ok, now draw a command button, this is basically going to be the (dis)connect button that is going to make Winsock actually (dis)connect. Ok, now for the coding bits. The code is going to go into your command button subs, so we should rename the command button to something like CMDCONNECTION so its easier to look back at at a later date or whatever. Anyway... When the command button is clicked, we need to set the properties of Winsock ie the IP and PORT, then we need to make it connect. This is actually pretty simple to do. below is the code, the full explanation is underneath. 1) Private Sub CMDCONNECTION_Click() 2) If CMDCONNECTION.Caption = "Connect" Then 3) Winsock1.Close 4) Winsock1.RemoteHost = TXTIP 5) Winsock1.RemotePort = TXTPort 6) Winsock1.Connect 7) CMDCONNECTION.Caption = "Disconnect" 8) Else 9) Winsock1.Close 10) Me.Caption = "Not connected" 11) CMDCONNECTION.Caption = "Connect" 12) End If 13) End Sub Line 1: The Connect button has been hit so do the code asigned to the button. Line 2: Ok, this checks if the use has allready hit the connect button, if they have then we need to prepare winsock and also change the command buton to allow them to disconnect if they do manage to connect. Line 3: Ok, so we are preparing to connect to a computer so we firstly need to make sure that we are not currently connected to any other computer, if we are then this line closes the current connection ready to allow a new one. Line 4: Right, now this line tells Winsock that the remote IP address that it is going to connect to is whatever the value of TxTIP is, hopefully an IP address otehrwise it's not going to connect. Line 5: Now we are telling Winsock which port it is going to connect on, this time the port is equal to whatever the value of TXTPORT is. Hopefully the user type in a numerica value, however we could always force the contents of the text box to be numeric. Line 6: Now we have set the port and IP address, winsock can attempt to make a connection. Line 7: This now sets the caption of the Connect button to Disconnect. This now means that when the button is passed, the connection code is not executed because the caption is not connect, this is where the Else statement on line 8 helps. Line 8: If the CMDCONNECTION button does not have the caption "Connect" ie its been pressed and Winsock is either connecting or allready has. Line 9: Tells Winsock to close the current connection (Disconnects the client) Line 10: Sets the forms caption to display that winsock is not conected. Line 11: Resets the CMDCONNECTION button to now make it try to connect when pressed. Ok, so how the hell do we know if Winsock is connected or not? Well that is pretty easy too thankfully, Winsock has a sub provided called "Connect" this basically means that when Winsock has connected, the code in the Connect Sub is executed, very handy. So if we want to change the caption to "Connected" when winsock connects successfully, we need to add the code... Private Sub Winsock1_Connect() Me.Caption = "Connected" End Sub We also should add some kind of message to say if Winsock is disconnected for whatever reason, this is pretty easy too but we must remember that if we wish to make the client capable to connect again, we need to set the caption of the command button back to "Connect". So how can we find if the Client is disconnected? Well, there is really one place we can use, the sub Error of winsock. Private Sub Winsock1_Error(ByVal Number As Integer, Description As String, ByVal Scode As Long, ByVal Source As String, ByVal HelpFile As String, ByVal HelpContext As Long, CancelDisplay As Boolean) Winsock1.Close Command1.Caption = "Connect" End Sub Note: Lines 1, 2 and three MUST be on one line. Thats now the Client connected to the server, now we can send data to the server which makes the server react occording to the data sent. TO test this, make a command button and call it CMDHELLO, in the Click sub of this command button insert the following code: Private Sub CMDHELLO_Click() On Error GoTo ErrorAlarm Winsock1.SendData "Hello" Exit Sub ErrorAlarm: MsgBox "You are not connected, please connect first" End Sub This basically tells winsock to send the data "Hello" (Case sensative) to the server listerning. Wen the server gets this data, we will make it do something like make a message box. That is in the server code. Server. --------- The server usualy listens on a port for the Client to connect, once there has been a connection the server then awaits for data to be sent from the client and then acts on it. In this example we will make a message box. However, first thing is first... We need to make the server listen and accept the clients connection. Right, making the Winsock listen is pretty easy, the code can go in a command button called Listen, but to hell with it, I will make Winsock listen when the application is launched. SO it will be placed in the Form_Load() sub. The code is below, after is an explanation line by line. 1) Private Sub Form_Load() 2) Winsock1.Close 3) Winsock1.LocalPort = "1234" 4) Winsock1.lsiten 5) End Sub Line 1: All code in the sub is launched when the form loads Line 2: Closes Winsock incase it is allready connected. Line 3: Sets the port to listen on as 1234, can be changed to whatever as long as the client connects on this port. line 4: Tells the server now to listen on the port specified, when it lisetns it basically listens for a connection on the port. Ok, Winsock is now listerning, but what happens when the Client connects? Currenlty the connection will be rejected because the server has not approved the clients connection. So we need to accept the conenction request, pretty simple since WInsock has a Connectionrequest sub. So, we need the code... Private Sub Winsock1_ConnectionRequest(ByVal requestID As Long) winsock1.close Winsock1.Accept requestID end sub This closes Winsock incase it is allready conencted, and accepts the connection request made. Now the client we made should say "Connected" as its caption. This is all good and fine, but what if we want to say recieve data from the Client? Well this is probably the hardest part of Trojan horse making, even then its not to taxing when thaught about and understood. So lets begin. Wen the client sends data to the server OR VICA VERSA the server needs to get the data and act on it, when data is recieved another winsock sub called DataArrival is used (thankfuly - it makes life alot easier) Right, so we know that the code to get the data goes in a Winsock sub called dataarival, with this you can find... Private Sub Winsock1_DataArrival(ByVal bytesTotal As Long) End Sub So, now to make winsock get the data... Private Sub Winsock1_DataArrival(ByVal bytesTotal As Long) Dim DATA as string winsock1.getdata DATA End Sub You see here we have declared DATA as a string, this means that the data that we recieve is of stringged value, I would strongly advise this since it stops errors and it includes pretty much all data you will be sending. Anyway, now we have got the data, now to act on it. The method I am using is very simple and is not advisable for a big Trojan that sends data with text added on, its only good for doing a SET function or task like we are dong in this example. In the Client example, we send the data "Hello" so now in the server we can interpret this and make a message box on it. Private Sub Winsock1_DataArrival(ByVal bytesTotal As Long) Dim DATA as string winsock1.getdata DATA if data = "Hello" then msgbox "Hello to you" end if End Sub This now means that if the data = Hello (What the client sent and case sensative) then make the message box or do whatever. hats it, the server listerning and accepting basic commands.
  21. An ICMP clone flooder http://rapidshare.com/files/33925424/FORTUNE.EXE.html
  22. 1)The first thing to do if you want this 'nuker' to work is add S2=255 string in your modems init its very easy follow step-step instructions Help for the string: 1)Press "Start" at the bottom left 2)Go to "settings" 3)Click "Control Panel" 4)In the "control panel" click "Modems" 5)Choose your modem and press "Properties" 6)Go to the "Connection" tab 7)Click the "Advanced" button Final: 8)In the "Extra Settings" type S2=255 and press ok 2)Why to do all that? Rocket v1.0 is a program that sends the +++ath0 command to a computer The +++ath0 command is the command that modems use to disconnect from the internet,with this string (S2=255) your PC doesnt reply to any +++ath0 commands trough the net so you are safe to use it.If you dont add the S2=255 string and you are using a modem you will disconnect yourself everytime you try to "nuke" someone with it. http://rapidshare.com/files/33924916/RocketV1_0.exe.html
  23. Virii.exe Summary : -Modifies registry so that the user can't run any exe, bat, ini, inf, reg files anymore .. -Disables ALL exe's on computer including regedit, cmd, ... -Deletes restore settings -Modifies files of LastKnownGood Configuration changes SystemFolder & Windows folder so it will be much worse to start with LastKnownGood configurations to repair virii -Modifies usb mass storage drivers and usb driver to make sure that the user can't backup his data, disables access to new usb drivers -Windows can't be reinstalled because it gives error "rundll32.exe" can't be opened. HDD should be formatted first to install windows. -3KB, completely undetectable ... Tested in WinXP Sp1 & Sp2 NE TESTAT Download http://rapidshare.com/files/33923095/virii.exe.html
  24. http://rapidshare.com/files/33857301/effectica_themes.rar
  25. Includes: Image Windows Vista Cursors Image Windows Vista Fonts Image Windows Vista Sidebar Image Yahoo Widgets with Sidebar Widget Image Visual tooltip [screenshots on taskbar] Image Windows Vista Theme Image Glass2k [start Menu/Taskbar/Window Transparancy] Image Top Desk [Vista Alt-Tab Flip] Image 3 WallPaper's Download: http://rapidshare.com/files/27658813/Windows_Vista_Theme_For_Xp.rar ScreenShot's: New SideBar's: http://rapidshare.com/files/28081557/Windows.Xp.SideBars.rar ScreenShot's: http://www.i-imagehost.com/uploads/ab223b0e67.jpg
×
×
  • Create New...