Jump to content

kw3rln

Active Members
  • Posts

    1019
  • Joined

  • Last visited

Everything posted by kw3rln

  1. encoded mi la aratat pe asta: http://demo.phpbb3styles.net/Melankolia
  2. si puneti si ceva theme pt 3 care va plac
  3. ce forum preferati? phpbb2 sau 3? ma tot gandesc de ceva vreme sa pun 3-u ... care aveti experienta cu el spuneti aici parerile.... si va astept sa votati in poll ma astept la ceva detasament pt phpbb3 daca ii sa-l schimb....ca trebuie schimbat TOT CMS-ul sa fie compatibil cu 3-u UPDATE: si puneti si ceva theme pt 3 care va plac
  4. najpa... dupa cum vezi click4trick ne sunt parteneri..
  5. wtf nytro? topic inchis!
  6. nunu .. ca atunci nu mai include $show .. nu mai respecta conditia new=old
  7. nice find cam copaci programatorii aia else { [RFI FILTER $oldshow = $show; $oldsize = strlen($show); $show = str_replace("http://", "" , $show); $show = str_replace("www", "" , $show); $show = str_replace("ftp://", "" , $show); $show = str_replace("https://", "" , $show); $newsize = strlen($show); if($oldsize == $newsize) { [NO LFI FILTER ]
  8. kw3rln

    35/zi

    zi si mie de unde ai luat statisticile alea?
  9. kw3rln

    Un ratat ne da ddos

    am vb cu el putin pe mess ghiciti ce? flood frate... e la mode la cocalarii hackeri romani
  10. bug-ul merge doar pe wingoz bug-ul e in server.cpp void clientHandle(int connfd, httpquery_t *query, int tid) ... if(strstr(str,"../")) // hack attempt, display index page { str[0]='\0'; } are protectie pt ../ dar la wingoz merge si ..\
  11. Nu esti in directorul in care se afla programul. Vezi comanda cd. adica ? sunt mai n00b nu inteleg :roll: mai incearca sa vezi cum ii..daca tot nu intelegi da-mi mie pm te rog ca te ajut eu
  12. da..noua mea achizitie pe langa X5
  13. kw3rln

    Un ratat ne da ddos

    ip: 89.36.138.110 (si altele..da nu-i pb ca ai ip dinamic sau furi net) user: best_bunnn site: http://www.freewebs.com/bunnn/ cersetor: http://www.hellsoft.eu/forum/viewthread.php?forum_id=6&thread_id=1583&rowstart=0 si PENAL ! ai mai dat si sapt trecuta.... nu te saturi? email sent to abuse@ilink.ro
  14. pt serverele cu webmod: http://rstcenter.com/index.php?pagina=cs_rcon_dos
  15. daca mai tineti minte ) obisnuiam sa-mi pun inele de la tuborg pe deget sa vad dimineata cat am beut
  16. kw3rln

    LA MULTI ANI SYS^_^

    la multi ani baiete...sa ne traiesti mult si bine coae...grija cu alcoolu
  17. nu..dar in schimb primesti ban
  18. ah nici mie... maine il fac
  19. Zilele astea ma ocup de BUG REPORTS! astept idei aici
  20. Cred ca FOARTE multe site-uri sunt vulnerabile... o aparut in New York Times: http://www.nytimes.com/2008/08/09/technology/09flaw.html?_r=1&oref=slogin Successfully poisoned the latest BIND with fully randomized ports! Exploit required to send more than 130 thousand of requests for the fake records like 131737-4795-15081.blah.com to be able to match port and ID and insert poisoned entry for the poisoned_dns.blah.com. # dig @localhost www.blah.com +norecurse ; <<>> DiG 9.5.0-P2 <<>> @localhost www.blah.com +norecurse ; (1 server found) ;; global options: printcmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 6950 ;; flags: qr ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1 ;; QUESTION SECTION: ;www.blah.com. IN A ;; AUTHORITY SECTION: www.blah.com. 73557 IN NS poisoned_dns.blah.com. ;; ADDITIONAL SECTION: poisoned_dns.blah.com. 73557 IN A 1.2.3.4 # named -v BIND 9.5.0-P2 BIND used fully randomized source port range, i.e. around 64000 ports. Two attacking servers, connected to the attacked one via GigE link, were used, each one attacked 1-2 ports with full ID range. Usually attacking server is able to send about 40-50 thousands fake replies before remote server returns the correct one, so if port was matched probability of the successful poisoning is more than 60%. Attack took about half of the day, i.e. a bit less than 10 hours. So, if you have a GigE lan, any trojaned machine can poison your DNS during one night... original source: http://tservice.net.ru/~s0mbre/blog/2008/08/08/ http://milw0rm.com/sploits/2008-dns-bind.tgz
  21. nu ma... configureaza-ti routeru mai intai
×
×
  • Create New...