Jump to content

begood

Active Members
  • Posts

    3972
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by begood

  1. da, mai ai de spart acea parola bravo ! dupa ce ai spart parola, ai trecut partea intai. hint 2: MEGAUPLOAD - The leading online storage and file delivery service o sa va ajute MIRROR: http://www.2shared.com/file/12239541/680f30ea/english_custom_begood.html http://fisierulmeu.ro/30NPNWSIT5KA/english-custom-begood-dic.html
  2. un mic hint : salvati intai imaginea pe computer.
  3. adica la ce te referi?...explica acolo in topic mai exact trebuie sa gasesti ceva in acea poza. apoi trebuie sa spargi acel ceva. cand ai reusit asta, ai trecut primul pas. @devianc3 focus man, focus !
  4. Hinturi imi cereti doar cu dovada ca ati trecut partea intai prin mesaj privat. nu inainte.
  5. http://img297.imageshack.us/img297/3557/dsc06579l.jpg backup : 2shared - download dsc06579.jpg Primul meu challenge. Este structurat în 2 parti. Prima parte e destul de u?oar?, un fel de anti-noob. În a doua parte ve?i avea nevoie de cuno?tiin?e de baz? despre criptografie, steganografie ?i putin? r?bdare având în vedere platforma prin care se va face transferul de informa?ii. Când trece?i de prima parte, posta?i aici, iar în caz ca nu v? descurca?i veti primi hint-uri. Free the net ! go anonymous. -begood Hinturi date pana acum : 1. salvati intai imaginea pe computer. 2. o sa va ajute asta 3. archive. 4. partea a doua : Free the net ! 5. partea a doua : doar bruteforce mask;loweralpha-numeric;starts with the 8th letter of the us alphabet;length 7. 6. *e**o**s 7. drum, eroare, slujba LE1: Felicitari lui iulian_ionut88, a fost primul care a trecut cu bine de prima parte a challenge-ului. Mult succes in continuare. [21.03.2010;04:36 PM] Felicitari kNigHt - prima parte [21.03.2010;8:48 PM] ovi113[at]hackpedia.info - prima parte [22.03.2010;7:30 AM] Usr6 - prima parte [22.03.2010;9:56 AM] Cosmin. - prima parte [22.03.2010;10:44 AM] Cheater - prima parte [23.03.2010;10:05 AM] Usr6 - GAME OVER. [08.04.2010; 09:34 AM] - first one. respect. @restu : bagati mare !
  6. own tah planet.
  7. If you are aware, we posted about XSSPloit almost a year ago. Since then, we have bought to you tools like that and more every single month. Today, we bring to you XSSer! Now, XSSer excites us as it is under active development. Also, it has more than 60 different XSS injections! In addition to that, like a true ninja tool, it also has encoders to bypass protection filters! It is an open source penetration testing tool that automates the process of detecting and exploiting XSS injections against different applications. It contains several options to evade certain filters and various special techniques of code injection. It has been programmed in Python and so you can use it on any machine that supports Python. We have tried to list the features of XSSer as under: * Supports HTTP POST * Support for Custom HTTP User-Agent header * Cookie support * HTTP Referer support * HTTP Authentication type – Basic/Digest * Proxy Support * Different evasion techniques * Custom XSS Payloads * Other features such as default time out, connect re-tries, delay, etc. It tries to evade security features by making use of the following: * Using method String.FromCharCode() * Using function Unescape() * Using Hexadecimal encoding * Using Hexadecimal encoding, with semicolons * Using Decimal encoding * Encodes fuzzing IP addresses in DWORD format * Mix String.FromCharCode() and Unescape() * Try Character Encoding mutations * Try different custom XSS fuzzing vectors * Try custom XSS Payloads In addition to all of that, it supports code injection by means of Data Control Protocol injection, Document Object Model Cross-Site Scripting, Cross Site Agent Scripting, Cross Site Referer Scripting, Cross Frame Scripting! Also, you can set different different payloads, emulating all popular browsers like IE7, FireFox 2, etc. A sample usage: $ python XSSer.py -u "http://host.com" --proxy "http://127.0.0.1:8118" --Fuzz --Hex --verbose -w This uses tor proxy, injecting payloads on character encoding in "Hexadecimal", with verbose output and saving results to file (XSSlist.dat), with fuzzing. All in all a very good cross platform tool! Download XSSer or Cross Site Scripter version 0.3a here. XSSer: Automate your XSS Injections! ? PenTestIT
  8. aici iti va raspunde temp.
  9. "In Roman mythology, Laverna was a goddess of Thieves, Cheats and the underworld. She was propitiated by libations poured with the left hand. The poet Horace and the playwright Plautus call her a goddess of thieves." Laverna's Brute: An open source hash auditor leveraging the power of heterogeneous computing systems to provide a portable, flexible, and high performance application with the goal of reversing the largest percentage of hashed text strings feasible. [colo=green]Laverna's Brute has been created from the ground up to be the worker application for a distributed auditing network named Laverna. Future plans are to create such a network that will be free for use, provided users donate the required amount of processing time per target to be cracked. For a complete summary, visit Description - lavernasbrute - Project Description and Goals - Project Hosting on Google Code deocamdata poate sparge doar hashuri NTLM (vista) voi posta updates imediat ce apar.
  10. When we previewed Internet Explorer's new rendering engine this week we noted that the same features that made IE9's hardware-acceleration possible probably aren't compatible with Windows XP. Microsoft initially dodged giving a straight answer to the question of XP support but has since admitted that the new browser won't be XP-compatible when it launches. This has created a small tempest of protest from those users still using XP, but this is less of an arbitrary decision than some appear to think. It's literally impossible to port Windows Vista/Win 7-style hardware acceleration backwards into XP. Microsoft would have to either develop a workaround from scratch or create a CPU-driven "software mode." Using such a mode could easily max out a CPU and negatively impact system speed and battery life. //smaller == better So, yeah, that's what we call an improvement, particularly when compared against IE8. We also don't think much of the argument that Microsoft is abandoning XP lovers. IE8 is much more secure than IE6 by any comparison and while XP is still humming along on an awful lot of netbooks, consistent sales data has shown that netbooks are almost always secondary systems, not primary ones. XP and IE8 are fine for a netbook, especially since it could be 6-12 months before we even see IE9 ship. After nearly 10 years it's time to let XP totter off and die with dignity. Microsoft Confirms IE9 Won't Come to XP - HotHardware
  11. This video will show you how to analyze a malware with free tools that are available on the internet. The tools that are used are sysinternals, regshot and wireshark. This video was created by netinfinity (net.infinitum [] gmail [] com). Simple Malware Analyzing Tutorial
  12. Oamenii de stiinta au observat ca un medicat sigur si ieftin, care este folosit din 1970 pentru tratarea acneei, tinteste cu o eficacitate ridicata celulele infectate cu virusul HIV, acelasi virus ce cauzeaza SIDA, inhibandu-l, acesta pierzand capacitatea de a se activa. Acne drug prevents HIV breakout (w/ Video)
  13. Live View is a Java-based graphical forensics tool that creates a VMware virtual machine out of a raw (dd-style) disk image or physical disk. This allows the forensic examiner to "boot up" the image or disk and gain an interactive, user-level perspective of the environment, all without modifying the underlying image or disk. Because all changes made to the disk are written to a separate file, the examiner can instantly revert all of his or her changes back to the original pristine state of the disk. The end result is that one need not create extra "throw away" copies of the disk or image to create the virtual machine. Live View is capable of booting * Full disk raw images * Bootable partition raw images * Physical Disks (attached via a USB or Firewire bridge) * Specialized and closed image formats (using 3rd party image mounting software) Containing the following operating systems * Windows 2008, Vista, 2003, XP, 2000, NT, Me, 98 * Linux (limited support) Behind the scenes, Live View automates a wide array of technical tasks. Some of these include: resolving hardware conflicts resulting from booting on hardware other than that on which the OS was originally installed; creating a customized MBR for partition-only images; and correctly specifying a virtual disk to match the original image or physical disk. Live View
  14. 1+e^(i*pi)
  15. e trojan in .net na kkt, neme mi-ai luat-o. ( 1 imports ) > mscoree.dll: _CorExeMain //ma Krisler12, ma, tu imi ceri banul permanent.
  16. What is Imposter? Imposter is a flexible framework to perform Browser Phishing attacks. Once the system running Imposter is configured as the DNS server to the victims, the internal DNS server of Imposter resolves all DNS queries to itself. When the victim tries to access any website the domain resolves to the system running Imposter and Imposter’s internal web server serves content to the victim. Depending on the configuration appropriate payloads are sent to the victim. Data stolen from the victim is sent back to Imposter and this is stored in a SQLite database in a folder created with its name based on the date and time of the attack. Capabilities: Imposter can perform the following attacks: 1. Steal cookies 2. Set cookies 3. Steal Local Shared Objects 4. Steal stored passwords from FireFox 5. Steal cached files 6. Poison browser cache 7. Steal files from the victim’s local file system through Internet Explorer 8. Run SQL queries on the victim’s Google Gears database and transfer the results 9. Create ResourceStore and Managed ResourceStore on the victim’s Google Gears LocalServer For the attacks related to Google Gears, the payload generated by Imposter automatically checks if the victim has installed and permitted Gears. This prevents any pop-up alerts to the user. General Requirements: 1. Administrative Rights: Reasons: * Imposter listens on ports 53/UDP and 80/TCP * The 'File Stealer' module runs an internal sniffer 2. System running Imposter should have the IP address 192.168.1.3 Reasons: * Internal DNS server resolves all domains to 192.168.1.3 3. WinPcap must be installed on the system Special requirements for the File Stealer module: 1. Linux Virtual Machine with IP address 192.168.1.2 configured in 'bridged' networking mode. 2. A samba network share named 'imp' with anonymous read access on the Linux VM. 3. This network share should a smbmount of the 'imp' folder that comes along with Imposter. 4. ‘imp’ folder containing ‘imposter.swf’ must be in the same directory as the Imposter binary Steps by step set-up instructions: 1. Share the 'imp' folder in the Imposter directory with name 'imp_win'. 2. In the Linux VM create a folder '/imp' and map it to the 'imp_win' share with this command: mount -t smbfs -o username=<win user name> //192.168.1.3/imp_win /imp 3. Add the following lines to the ‘smb.conf’ file: [imp] path = /imp read only = yes public = yes 4. Restart the smb service. more : Attack and Defense Labs - User Guide | Imposter, Browser Phishing Tool download : http://andlabs.org/tools/imposter/imposter_v0.9.zip videos : Attack and Defense Labs - Videos | Security Tools and Techniques
  17. This is the video of the presentation titled "Polymorphic Virus Analysis" given by Nicolas Brulez at Recon 2008. Nicolas takes a through a case study of W32.Bayan, a polymorphic virus. The talk is very detailed and is highly recommended for those who want to learn more about viruses. You can download a high resolution version of the video here. The slides for the presentation are here. http://www.archive.org/download/RECON2008/RECON2008-T10-Nicolas_Brulez-Polymorphic_Virus_Analysis.avi http://recon.cx/2008/a/nicolas_brulez/improvised_talk.pdf video : Polymorphic Virus Analysis (Recon 2008) Tutorial
  18. Google has announced a new open source project designed to facilitate the use of WebGL, the browser-based 3D graphics standard floated by Mozilla and the Khronos Group. Known as the Almost Native Graphics Layer Engine - ANGLE, for short - the project will allow the still-gestating WebGL to work in tandem with Microsoft's DirectX APIs, bringing WebGL to Windows machines otherwise unequipped for it. WebGL - a means to providing hardware-accelerated 3D inside the browser - is designed to make graphics calls via the OpenGL desktop graphics interface. But as Google product manager Henry Bridge points out in a blog post, Windows machines aren't all that likely to include OpenGL graphics cards. "On Windows," he says, "most graphics-intensive apps use Microsoft Direct3D APIs instead of OpenGL, so OpenGL drivers are not always available. "Unfortunately, this situation means that even if they have powerful graphics hardware, many Windows machines can't render WebGL content because they don't have the necessary OpenGL drivers installed." ANGLE will allow Windows users to run WebGL without installing OpenGL drivers. It's meant to layer WebGL's portion of the OpenGL ES 2.0 API over DirectX 9.0c API calls. ANGLE has been released under the BSD license "as an early work in progress," and you can visit the code here. According to Bridge, the project will implement almost the entire Open ES 2.0 API - not just the WebGL subset - so it may also be a handy tool for developers looking to build mobile and embedded applications. "ANGLE should make it simpler to prototype these applications on Windows," he says, "and also gives developers new options for deploying production versions of their code to the desktop." WebGL is the brainchild of Mozilla and open standards consortium the Khronos Group, the organization that standardized OpenGL. A WebGL draft was released late last year. As it champions WebGL, Google is also developing its own hardware-accelerated web 3D setup known as O3D. Whereas WebGL exposes OpenGL calls to JavaScript, O3D operates as a plug-in. Google despises browser plug-ins except when it doesn't. ® Google ratchets interweb 3D on Windows ? The Register
  19. Virus Effect Remover is a tool for removing the effect of viruses from the windows registry and file system. It also detects registry errors caused by the virus and enables Blocked content like task manager, registry editor, folder option etc. With it you can also terminate the virus process and remove it permanently. Download Virus Effect Remover
  20. copy paste notepad tot care ajunge mai sus ? http://i43.tinypic.com/14wt6xt.png
  21. You reached 251 points, so you achieved position 505 of 2204 on the ranking list You type 738 characters per minute You have 67 correct words and you have 0 wrong words You reached 259 points, so you achieved position 468 of 2209 on the ranking list You type 797 characters per minute You have 78 correct words and you have 0 wrong words il haxorim ?
  22. exista. dar nu pentru intelectul tau.
  23. ma doare deja mana. ban.
  24. begood

    Fun stuff

    HappyFish.ro .: Salvati gropile! :. HappyFish.ro .: Avatarul dupa Oscar :. n-am mai ras cu asa pofta de un an !!! ))))))))))))
×
×
  • Create New...