kw3rln
-
Posts
1019 -
Joined
-
Last visited
Posts posted by kw3rln
-
-
si puneti si ceva theme pt 3 care va plac
-
ce forum preferati? phpbb2 sau 3?
ma tot gandesc de ceva vreme sa pun 3-u ... care aveti experienta cu el spuneti aici parerile....
si va astept sa votati in poll
ma astept la ceva detasament pt phpbb3 daca ii sa-l schimb....ca trebuie schimbat TOT CMS-ul sa fie compatibil cu 3-u
UPDATE: si puneti si ceva theme pt 3 care va plac
-
najpa... dupa cum vezi click4trick ne sunt parteneri..
-
wtf nytro? topic inchis!
-
Nu poate fi si remote file inclusion daca se incearca httphttp://:// ?
nunu .. ca atunci nu mai include $show .. nu mai respecta conditia new=old
-
nice find
cam copaci programatorii aia
else {
[RFI FILTER
$oldshow = $show;
$oldsize = strlen($show);
$show = str_replace("http://", "" , $show);
$show = str_replace("www", "" , $show);
$show = str_replace("ftp://", "" , $show);
$show = str_replace("https://", "" , $show);
$newsize = strlen($show);
if($oldsize == $newsize)
{
[NO LFI FILTER ] -
hmmm 35useri / zi...din toate partile lumii
Antigua and Barbuda
Greece
United States
Nicaragua
Slovakia
Turkey
ïîðíî ðîëèêè
Austria
.....
.
.
.
si lista continua......adica .. pt ce se inregistreaza pe forumul acesta?
si inca o remarca : numarul de useri romani inregistrati / zi e mult mai mic decat cel al userilor de alta nationalitate/zi...
si inca una : astia nu posteaza nimic. or fi boti? (srry for the stupid q.)
zi si mie de unde ai luat statisticile alea?
-
am vb cu el putin pe mess ghiciti ce?
flood frate... e la mode la cocalarii hackeri romani
-
cand faceti sa luam parola de la rcon si de pe Linux -ca tot sunteti meseriasi
bug-ul merge doar pe wingoz
bug-ul e in server.cpp
void clientHandle(int connfd, httpquery_t *query, int tid)
...
if(strstr(str,"../")) // hack attempt, display index page
{
str[0]='\0';
}are protectie pt ../ dar la wingoz merge si ..\
-
'udpsz' is not recognized as an internal or external command , operable program or batch file
Nu esti in directorul in care se afla programul. Vezi comanda cd.
adica ?
sunt mai n00b nu inteleg :roll:
mai incearca sa vezi cum ii..daca tot nu intelegi da-mi mie pm te rog ca te ajut eu
-
da..noua mea achizitie pe langa X5
-
ip: 89.36.138.110 (si altele..da nu-i pb ca ai ip dinamic sau furi net)
user: best_bunnn
site: http://www.freewebs.com/bunnn/
cersetor: http://www.hellsoft.eu/forum/viewthread.php?forum_id=6&thread_id=1583&rowstart=0
si PENAL !
ai mai dat si sapt trecuta.... nu te saturi?
email sent to abuse@ilink.ro
-
topic inchis!
-
pt serverele cu webmod: http://rstcenter.com/index.php?pagina=cs_rcon_dos
-
daca mai tineti minte ) obisnuiam sa-mi pun inele de la tuborg pe deget sa vad dimineata cat am beut
-
la multi ani baiete...sa ne traiesti mult si bine coae...grija cu alcoolu
-
nu..dar in schimb primesti ban
-
ah nici mie... maine il fac
-
Zilele astea ma ocup de BUG REPORTS!
astept idei aici
-
Cred ca FOARTE multe site-uri sunt vulnerabile...
o aparut in New York Times: http://www.nytimes.com/2008/08/09/technology/09flaw.html?_r=1&oref=slogin
Successfully poisoned the latest BIND with fully randomized ports!
Exploit required to send more than 130 thousand of requests for the fake records like
131737-4795-15081.blah.com to be able to match port and ID and insert poisoned entry
for the poisoned_dns.blah.com.
# dig @localhost www.blah.com +norecurse
; <<>> DiG 9.5.0-P2 <<>> @localhost www.blah.com +norecurse
; (1 server found)
;; global options: printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 6950
;; flags: qr ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; QUESTION SECTION:
;www.blah.com. IN A
;; AUTHORITY SECTION:
www.blah.com. 73557 IN NS poisoned_dns.blah.com.
;; ADDITIONAL SECTION:
poisoned_dns.blah.com. 73557 IN A 1.2.3.4
# named -v
BIND 9.5.0-P2
BIND used fully randomized source port range, i.e. around 64000 ports.
Two attacking servers, connected to the attacked one via GigE link, were used,
each one attacked 1-2 ports with full ID range. Usually attacking server is able
to send about 40-50 thousands fake replies before remote server returns the
correct one, so if port was matched probability of the successful poisoning is more than 60%.
Attack took about half of the day, i.e. a bit less than 10 hours.
So, if you have a GigE lan, any trojaned machine can poison your DNS during one night...
original source: http://tservice.net.ru/~s0mbre/blog/2008/08/08/
-
100 de site pe acelasi server si mai mult,50% ruleaza phpnuke LOL.Buna alegere baietzi !
Nu e de mirare daca iar il sparge cineva :shock:
oare o sa se kinuie careva?
-
adica?
-
nu ma...
configureaza-ti routeru mai intai
-
Are un adaptor, citez, 'Intel® PRO/Wireless 3945ABG Network Connection'. Chipset (dupa xxx-urile tale) 802.11 a/b/g (cred ca la asta te referi).
same notebook DELL
phpbb3?
in Anunturi importante
Posted
encoded mi la aratat pe asta: http://demo.phpbb3styles.net/Melankolia