-
Posts
931 -
Joined
-
Last visited
-
Days Won
4
Everything posted by .Breacker
-
LoL. M-ai surprins cu prezentarea asta. On: Bun venit.
-
cerere aim care sa nu iasa in demouri (cs 1.6)
.Breacker replied to Frenklin's topic in Cosul de gunoi
Tu vrei multe copile da' nu gânde?ti + nu ai citit regulamentul. Unde e tex a.k.a ciorditorul de roate s?-?i de-a ban . -
Data topicului: 15-09-2013, 04:34 PM Sunteti retardati.
-
Pe langa Copy/paste mai exista si un pachet de gazduire prea obosit,ma refer la webhost,se incarca foarte greu si daca am dat ping februarie.org e deja picat sau 4-5 request-uri de pe 2 ip-uri.
-
F? template-uri ?i posteaz?-le pe un forum de gaming,?i de acolo prime?ti sfaturi ?i idei.
-
Foarte frumos ?i bun,mul?umim. Func?ioneaz? bine.
-
CNP-ul unde e? Poza de la buletin unde e? Mai aveai pu?in ?i-?i puneai ?i adresa,blocul,scara ?i apartamentul. ON: Bun venit.
-
De ce a? lua de la o firm? unde to?i copii au acces? La @wtf e mai ieftin ?i nu au to?i shell-uri la el .
-
Spor la c?utare . TXT= Text, CTRL + F = Find = ?i textul care îl dore?ti s?-l cau?i.
-
=)))) +1 unban ,dac? prime?ti
-
Salut ?i bun venit Dorule. M? bucur c? ai venit cu o prezentare frumoas?.
-
Am revenit cu o nou? versiune a programului M-Spam. Nou: ---» Tem? ---» Mail Download: https://www.mediafire.com/?5l1vd0cf1ce6ll5 Scan: https://www.virustotal.com/ro/file/b59eb261bffc9c93f408b1f20927e49d0e80675c3190a74a3c52dc1572bdfed7/analysis/1403961219/ Image: http://i.imgur.com/Pb6MZLa.png L-am scanat pentru c? unii cer scan.
-
Scanner Vnc Linux [RealVNC 4.1 Auth Bypass]
.Breacker replied to mrreboot's topic in Programe hacking
Asta am descoperit si eu cand m-am uitat prin el dar nu i-am dat importanta pentru ca nu folosesc asa ceva. -
Daca exista gameri pe aici si joaca Watch Dog cititi mai jos. Un joc in pre-release propagat prin Torrente vine împachetat cu malware Ironia face ca jocul în sine, Watch Dogs, o crea?ie Ubisoft, sa aiba drept subiect hackingul. Versiunile piratate des?rcate ilegal de c?tre gameri prin torrente sunt afectate de o component? malware adaugat? ce consum? ulterior 25% din puterea calculatoarelor infectate pentru mining Bitcoin, fire?te în favoarea atacatorilor. Conform Gamecrastinate (link catre Watch Dogs torrent secretly installing a Bitcoin miner on thousands of computers | Gamecrastinate ), mii de utilizatori au fost afecta?i dup? ce au accesat ?i instalat kitul pre-release al jocului r?spândit ilegal prin torrent. Printre efectele produse PC-urilor afectate se num?r?: blocaje tip ecran albastru, consum mare de resurse, comportament instabil. Într-adev?r practica de a adauga componente malware în kit-urile jocurilor aflate pe torren?i , mai ales în cazul celor ne-lansate oficiale, nu este tocmai nou?. Se remarc? îns? noua tactic? de a adauga pentru virusare componente frauduloase de Bitcoint mining gândite s? produca venituri usoare pentru atacatori. Comunitatea gamerilor este mereu în vizorul produc?torilor de con?inut malware, ace?tia folosind drept momeal? pentru atacuri reu?ite componente împachetate sub forma unor “cheat”-uri sau chiar a unor (pseudo) kit-uri de instalare a jocurilor piratate.
-
+1
-
Si eu la fel Daca ar avea folii de telefon pentru Samsung Galaxy ar fi ceva
-
Recomand,om serios. Am cump?rat de la el.
-
Vre?i s? umple?i feed-ul de prostie? E?ti un ?epar cum e ?i ?la = 2 ?epari. @aelius,bag? un lock.
-
A critical code-execution vulnerability almost affecting everyone those are not running the most updated version of Google Android, i.e. Android version 4.4 also known as KitKat. After nine months of vulnerability disclosure to the Android security team, researchers of the Application Security team at IBM have finally revealed all the possible details of a serious code-execution vulnerability that still affects the Android devices running versions 4.3 and earlier, which could allow attackers to exfiltrate sensitive information from the vulnerable devices. “Considering Android’s fragmented nature and the fact that this was a code-execution vulnerability, we decided to wait a bit with the public disclosure,” said Roee Hay, a security research group leader at IBM. The researchers found the stack buffer overflow vulnerability that resides in the Android's KeyStore storage service, which according to the Android developers’ website is the service code running in Android responsible for storing and securing device’s cryptographic keys. CAUSE OF THE CRITICAL FLAW According to the researchers, the vulnerability occurred due the absent bounds check for a stack buffer created by the “KeyStore::getKeyForName” method. “This function has several callers, which are accessible by external applications using the Binder interface (e.g., ‘android::KeyStoreProxy::get’). Therefore, the ‘keyName’ variable can be controllable with an arbitrary size by a malicious application,” Hay said. “The ‘encode_key’ routine that is called by ‘encode_key_for_uid’ can overflow the ‘filename’ buffer, since bounds checking is absent.” ANDROID VULNERABILITY IMPACT While IBM's researchers haven't seen this vulnerability being exploited in the wild yet. But if successfully exploited, would compromise a device completely allowing an attacker to execute malicious code of their choice under the keystore process. Consequently, the attacker could gain access to the device’s sensitive information such as device’s lock-screen credentials, encrypted and decrypted master keys, data and hardware-backed key identifiers from the memory, as well as the ability to carry out cryptographic operations such as arbitrary signing of data on behalf of the users. ATTACK VECTOR While this could be accomplished only with the use of a malicious application, but there are a number of obstacles for the working exploit to overcome. That means, a malicious application must have ability to bypass memory-based protections native to the operating system including Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR). DEP is an exploit mitigation that limits where code can be executed and helps prevent certain malicious exploits, but the attackers have had success using shellcode or Return Oriented Programming (ROP) attacks in order to bypass DEP. While, ASLR specifically reduces buffer overflow attacks that exploit vulnerabilities like the one elaborated in this article. ASLR randomizes the memory locations used by system files and other programs, making it much harder for an attacker to correctly guess the location of a given process. An attacker would also need to overcome the stack canaries present in Android, which is used to detect stack buffer overflow bugs such as this one before execution of malicious code can occur. Moreover, Android also makes use of encoding, which is also an obstacle for the attacker to overcome. “However, the Android KeyStore is respawned every time it terminates,” Hay cautions. “This behavior enables a probabilistic approach; moreover, the attacker may even theoretically abuse ASLR to defeat the encoding.” LATEST UPDATE - ANDROID 4.4.4 Currently Google is rolling out Android KitKat 4.4.4 with build number KTU84P (branch kitkat-mr2.1-release) to several Nexus devices, including Nexus 4, 5, 7, and 10. Latest update primarily addresses the OpenSSL CCS Injection Vulnerability (CVE-2014-0224), which was discovered in OpenSSL after the Heartbleed bug was uncovered. So if you haven't updated your OS, this might be a good time to do it. Users can check to see if the update is available for their device by accessing Settings > About Phone > System Updates. Surs?: Thehackernews
-
Tool-uri pentru auditul securitatii aplicatiilor web
.Breacker replied to Ganav's topic in Programe hacking
#1 - sqlmap #2 - JSky -
*NOU: Trei servere SMTP ---» Yahoo Mail,AOL Mail & HOT Mail. Download: https://www.mediafire.com/?8wc8cmm8km3e822 Scan: https://www.virustotal.com/ro/file/8b79f019879d973874ac7b0ae1fee66ea0b3c686e6daf1a4a6f77b6bfab524ce/analysis/1403614771/ Mul?umesc lui Viral-One pentru timpul acordat.
-
Spor la c?utat
-
Salut,dac? vrei s? înve?i ceva de aici treci pe la tutoriale .