Jump to content

robyyxx2

Active Members
  • Posts

    166
  • Joined

  • Last visited

Everything posted by robyyxx2

  1. ai pus tu windows 7 sau a venit cu e? Daca l-ai pus tu verifica sa ai toate driverele instalate. Incepe cu chipsetul dupa chestiile alea de la intel cu rapid storage, engine si ce mai este. Driverele le gasesti pe site la dell si ala video iti recomand sa il descarci de la nvidia sau amd dupa caz.
  2. Daca te referi ca imaginea se intoarce adica trebuie sa intorci telefonul ca sa vezi iara atunci calibreaza giroscopul sau opreste screen orentation din setari Calibrarea giroscopului daca nu ma insel o faci din setari la motion and gestures
  3. Nu am timp acuma sa explic cum se face. Nu ai experienta necesara. Cauta clipuri pe youtube si rezolva problema singur ai tot ce iti trebuie.
  4. Si pe telefon ce se intampla?
  5. Dezarhivezi firmware-ul si dll-ul in acelasi folder cu odin. Deschizi odin si bagi telefonu in download mode. Trebuie sa ai drivere instalate daca e tot inregula, in odin o sa iti vada telefonu. Dai click pe PDA si selectezi softu dupa flash.
  6. Incearca asta Samsung I5500 Galaxy 5 Android hard reset Edit: Metoda 2 Faci cont aici Register at SamMobile Cauti modelul exact aici: Firmware for Samsung GT-I5500 - SamMobile Descarci Odin de aici Odin Multi Downloader v4.28 ii dai flash Download mega pt firmware
  7. Se trimite dupa ce logul are "x" kb, unde x il setezi tu cand faci installerul
  8. E tarziu si nu am avut timp sa testez dar e probabil sa functioneze. Cauti un film video clip whatever il deschizi in hex editor copiez continutul, deschizi fisierul criptat in hex si dai paste inaintea continutul criptat si le delimitezi pe cele 2 printr-un semn care il stii tu si salvezi. Asa cand il vede cineva si il deschide chiar va fi un video iar cand vrei sa il decriptezi deschizi scoti tot continutul pana la semnul lasat de tine si apoi decriptezi.
  9. Exploit DOC prin care se executa o bucata mica de cod care se numeste payload, acest payload iti poate permite sa executi comenzi de aici posibilitatiile sunt nelimitate.
  10. As dori o invitatie pe IPT Proof: Speedtest.net by Ookla - My Results Speedtest.net by Ookla - My Results Mail pe PM
  11. Probabil in Anglia sunt blocate trackerele dupa IP. Filelist are tracker privat si nu probabil necunoscut in anglia asa ca nu e blocat. Foloseste tutorialul lui @Terra.
  12. Millions of routers and other embedded devices are affected by a serious vulnerability that could allow hackers to compromise them. The vulnerability is located in a service called NetUSB, which lets devices connected over USB to a computer be shared with other machines on a local network or the Internet via IP (Internet Protocol). The shared devices can be printers, webcams, thumb drives, external hard disks and more. NetUSB is implemented in Linux-based embedded systems, such as routers, as a kernel driver. The driver is developed by Taiwan-based KCodes Technology. Once enabled, it opens a server that listens on TCP port 20005 for connecting clients. Security researchers from a company called Sec Consult found that if a connecting computer has a name longer than 64 characters, a stack buffer overflow is triggered in the NetUSB service. If exploited, this kind of vulnerability can result in remote code execution or denial of service. Since the NetUSB service code runs in kernel mode, attackers who exploit the flaw could gain the ability to execute malicious code on the affected devices with the highest possible privilege, the Sec Consult researchers said in a blog post Tuesday. Many vendors integrate NetUSB into their products, but have different names for it. For example, Netgear calls the feature ReadySHARE, while others simply call it print sharing or USB share port. Sec Consult has confirmed the vulnerability in the TP-Link TL-WDR4300 V1, TP-Link WR1043ND v2 and Netgear WNDR4500 routers. However, after scanning firmware images from different manufacturers for the presence of the NetUSB.ko driver, they believe that 92 other products from D-Link, Netgear, TP-Link, Trendnet and ZyXEL Communications are likely vulnerable. The researchers also found references to 26 vendors in the NetUSB.inf client driver for Windows, so they believe many other vendors might also have vulnerable products. They’ve alerted the CERT Coordination Center (CERT/CC), the German CERT-Bund and Austrian CERT, who are working to notify the vendors. On some devices it’s possible for users to disable the feature from the Web-based administration interface or to block access to the port using the firewall feature. However, on some devices, like those made by Netgear, this is not possible, the researchers said. Many devices likely expose the NetUSB service to the local area network only, but there might be implementations that expose it to the Internet as well. Even when restricted to the local network only, the vulnerability still poses a high risk, because attackers can potentially exploit it if they compromise any computer from the local network or if they gain access to the network in some other way—for example, due to weak or no wireless password. As far as the Sec Consult researchers know, only TP-Link has released fixes so far. It has a release schedule for around 40 products. TP-Link, Netgear, D-Link and ZyXEL did not immediately respond to a request for comment. This vulnerability is just the latest in a long stream of basic security flaws found in consumer routers in recent years. “It is safe to say that vulnerability reports like these will continue to appear until a paradigm shift is enacted at the manufacturer level,” said Jacob Holcomb, a security analyst at Baltimore-based Independent Security Evaluators, via email. Holcomb has found many vulnerabilities in routers and other embedded devices over the past several years. Security Evaluators organized a router hacking contest at the DefCon security conference last year. The way in which vendors have implemented NetUSB in their products is egregious, Holcomb said. “For instance, hardcoded AES keys, the processing of unvalidated and untrusted data, and kernel integration are all red flags that should have been identified during the early stages of SDLC [software development lifecycle].” Source
  13. Bine zis. Treaba lor daca atata stiu. O sa vada mai incolo.
  14. S-a inteles gresit, nu toti! O cunostinta care a dat examenul cu inca 2 persoane, cele 2 persoane au condus 5 minute in parcare si gata admis si l-a picat pe prietenul meu ca a refuzat sa dea mita si l-a mai facut si prost. Ce corupere e in Valcea nu se poate
  15. In RM Valcea sefu politiei nu te trece numai pe mita stiu din surse sigure, cam 700 de lei pana la 1200 se invarte.
  16. d64f396930663eeba7d81dbe6913f55a:jimbo
  17. Se vede ca e mare foamea la tine ai mancat un cuvant intreg (nevoie) din propozitie. Ui aici chiar azi s-a postat tutorialul "minunat" si foarte educativ https://rstforums.com/forum/101394-root-flood-perl.rst. Pune ma mana si invata ceva lasa prostiile ca nu ajungi nicaieri asa. Poti incepe cu asta perlsyn - perldoc.perl.org, sintaxe pentru perl. Edit: Te doare sa vezi unde s-a ajuns cu forumul asta, mai de mult invatai ceva educativ se posta un proiect una alta. Azi numai rooturi si flooduri sititi.
  18. Este o aplicatie .Net care din pacate a fost obfuscata cu https://confuser.codeplex.com/ si este mult de lucru sa poti vedea ce face programul (cica e anti debugger). avand in vedere ca este bine criptat, mai mult ca sigur este un virus. Pune un VM si executa acolo. Edit: Compileaza proiectul asta https://github.com/UbbeLoL/ConfuserDeobfuscator cu visual basic (cu 12 ar trebuii sa functioneze) si ai program pentru deobfuscat programul "dubios" apoi descarca https://www.jetbrains.com/decompiler/ ca sa sa poti decompila si sa vezi sursa.
  19. Primul care rezolva primeste cheia. Trimiteti raspunsul pe PM. Hint: 128 Bit
  20. eu folosesc asta ajuta si la xss function xsssql($dirty){ if (get_magic_quotes_gpc()) { $clean = mysql_real_escape_string(stripslashes($dirty)); }else{ $clean = mysql_real_escape_string($dirty); } return htmlentities($clean); } ex: $var=xsssql($var);
  21. Pare interesant forumul are dar iti trebuie un invitation code ca sa te inregistrezi sa vezi anumite threaduri. Va rog frumos pe cei care aveti cont sa ma ajutati cu o invitatie
  22. https://kickass.to/bandicam-v2-0-2-655-ml-incl-crack-tordigger-t9320252.html Filmeaza HD si se misca bine, umbla si pe la setari!
×
×
  • Create New...