Jump to content

begood

Active Members
  • Posts

    3972
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by begood

  1. The DN_BOFinder (DotNet Buffer Overflow Finder) is a semi-inteligent tool designed to find Buffer Overflows type vulnerabilities in COM objects used by .NET Assemblies (and mistakes in unsafe .Net code blocks). Features Here are some of its features: Supports fuzzing of individual methods, *.dll files and entire directories Works by using Reflection to create 'live instances' of classes and then fuzzing each of the exposed methods there are currently 16 different payloads for basic types (int, unint, char) and strings Fully automated use of cdb to find issues (i.e. you can start the fuzzer and go for lunch) use of an 'FuzzedMethods' list for each fuzzed dll to avoid re-fuzzing the same methods stored of exception information in an 'ExceptionData' file (per dll) use of an 'ExcludeList'to list the classes/methods that should be further analyzed auto detection of methods that consume large amounts of memory (currently set to 20M) and auto-detection of methods that 'hang' (some callbacks or windows pop-ups have this behaviour).The methods identified are automatically added to the 'ExcludeList' The results are current quite conservative (i.e. only the realy bad exeptions are shown). this means that there might be several exploitable vulnerabilies that are currenly reported as 'Normal CLR exception' A big blind spot at the moment is that the current version does not fuzz certain static methods (which can be invoked without need of a constructor (i.e. a live instance)) When it finds an interface it tries to find who implements that interface and tries to create an instance of them (supports caching of objects for performance reasons). The problem here is that the class created is not documented, and ideally we should be fuzzing each of those implementations (especially in the cases where that Interface is used as a parameter) When in auto mode, it auto-restarts fuzzing session after a predefined number of seconds (this also helps in long fuzzing sessions since the process is refreshed regularly, which of course might also introduce some blind spots) sursa : https://www.owasp.org/index.php/DN_BOFinder
  2. begood

    Hey all!

    have phun here
  3. care site ii ala ? daca se poate ...
  4. smf ce manelar mai e si ala ? )))
  5. lol nu io am facut programu :roll: edit : nu-i de hacking, ci ii un bruteforcer (folosit la testarea complexitatii hashurilor (parolelor) personale) astia au facut programu : ElcomSoft.com daca e mana-n mana cu microsoft io ma indoiesc ca e de "hacing"
  6. ai instalat CUDA ? AI NVIDIA ? greu ... greu...
  7. ai instalat CUDA ? AI NVIDIA ?
  8. http://rstcenter.com/forum/postati-aici-hashuri-t12508-15.rst baga aci
  9. mah .. nush ce faceti voi cu mailu vostru pe unde il puneti ca io primesc cate un mail spam (sau cum ii zice) o data pe luna si am mailu asta ... de vreo 2 ani
  10. Kenpachi, cred ca mai ai putin de lucru in notepad [scz de dublu post]
  11. frumos
  12. uite un hash .. dai google si downloadezi torrentu iti dau eu seed cu peste 1 mb/s 473e111b38ad60b8a3882c34966b80e34d8e098d ai akolo EFS data recovery daca nu te descurci cu torrentu uite link rapidshare http://rapidshare.com/files/127854403/Advanced.EFS.Data.Recovery.v3.0.rar.html iti dau pe pm serialu
  13. auuu...io cred k am gresit cand am spus aia ... acum imi amintesc ... cred folderul : administrator imi era blocat ... iar eu acum mi-am amintit ca nu erau "inverzite" fisierele => nu erau cryptate ... stai asa am un program pt decryptare de la elcomsoft ... iti dau un pm in 10 min sa gasesc programul miii de scuze ... imi pare rau ca te-am incurcat numa...iti dau programu dupa ce ma intorc pe la 22:30 sper sa ajung...
  14. ceeeee naiba ? io am facut aceeashi chestie si nu zicea nik
  15. cut apoi paste in folderele tale noi
  16. de aia incerc aku sa fac o optiune sa copieze cd-ul in rami tre sa lucrez putin la imaginea de boot ... cam greu ... cred k las pe sapt viitoare cand am chef si timp oriq ma intorc cu un nou liveCD care sa-l poti pune si pe usb => liveUSB mai bag cateva spargatoare ... etc etc poate si un metasploit vedem poate ma ajutati cu sugestii
  17. de aia incerc aku sa fac o optiune sa copieze cd-ul in rami
  18. oh io folosesc aproape nonstop windows live'ul pt ca ma joc frumos cu virusii
  19. nup nu are nic cu CPU-ul 1% usage testat aku 10 min oh am inteles gresit ...mda...daca as reusi sa fac o optiune sa copieze in rami stati asa sa vad ce pot face
  20. begood

    Broken links

    postati aici linkurile care nu mai merg am si eu de la pagina asta : http://rstcenter.com/%22http://rapidshare.com/files/98709362/Tutorial.txt/%22, linkurile http://rapidshare.com/files/98709362/Tutorial.txt http://www.speedyshare.com/750653951.html http://uploaded.to/?id=1kxqxh http://www.netdrive.ws/62551.html mercy
  21. frumos tutorial da...ai un accent din z a l a u ?
  22. pai cd-ul asta poate fi folosit la mai multe chestii ... de ex daca ti se mute compu` cu asta poti repara foarte ushor/ face un backup la toate fisierele din comp in 10 min poate fi folosit la devirusat poate fi folosit la facut benchmarkuri poti rula aproape orice program ce rulezi in windowsu normal, deci un open office portabil, azi m-am pus sa modific iso-ul sa suporte si niste spargatoare de parole (rar, hashuri, pt windows ) si frumusetea consta in faptul ca poti modifica / adauga programe (util daca il foloseshti de pe usb ) ah si nu lasa urme pe comp cand intrii pe el deci poti face orice cu drepturi full de ADMINISTRATOR
  23. am dat un exemplu yahoo. nu era vorba de yahoo ci o firma de anvergura lor. daca ai reusi, ce s-ar intampla cu firma ? (firma de marketing) cam ce procentaj din clienti ar pierde, actiunile ar cadea vertiginos? ...
  24. da, flo, deoarece daca dai move la subdirectoarele (care au fost blocate) in alt loc pe comp acestea vor ramane blocate, deci nu vei putea atinge nici un fisier din ele
×
×
  • Create New...