-
Posts
473 -
Joined
-
Last visited
-
Days Won
6
Everything posted by Sandu
-
PayClick.com : obține plăți Garantate pentru traficul tău [OFICIAL]
Sandu replied to cristina_L1's topic in Cosul de gunoi
Pentru traficul din romania, ce cpm/cpc e? -
Scoti ssl-ul A fost doar un exemplu
-
Ping-ul poate avea orice port Depinde la ce vrei sa ii dai ping. Exemplu: Daca vrei sa dai ping unui site se v-a folosi de portul 80 sau 8080. Iar pentru ping-ul tcp, udp intre echipamente, se foloseste portul 0.
-
Pot sterge reclamele din aplicatiile de pe telefon?
Sandu replied to cristina_L1's topic in Mobile security
https://github.com/appium/sign -
Pot sterge reclamele din aplicatiile de pe telefon?
Sandu replied to cristina_L1's topic in Mobile security
Sau poti modifica fisierul apk si sa scoti bucata de cod care afiseaza reclama. Vezi ca trebuie semnat inainte sa il faci inapoi apk. -
Cere paypal gift, sa nu ai surpriza unui refund.
-
Mai face coana floricica site-uri pe ro
-
Cu ce crezi ca ne-ar ajuta ceva gratuit?
-
DT38N0XRM SVX9M7GN2 M01J3QEQW RVZ0MHRG6 2JJRIXY3Y ZE3VBAL3N RJILD5XYP VJ9CXRTXT 45KAB1OWQ
-
https://sharewareonsale.com/s/bitdefender-total-security-giveaway-sale
-
Daca este technicolor-ul de la upc cu parola default, poti incerca site-urile de mai jos. https://upc.michalspacek.cz/ http://haxx.in/upc-wifi/
-
AlphaBay, possibly the largest active dark web marketplace at the moment, has paid a hacker after he successfully exploited vulnerabilities in the internal mailing system of the website and hijacked over 200,000 private unencrypted messages from several users. The hacker, using the pseudonym Cipher0007, disclosed two "high-risk bugs" two days ago on Reddit that allowed him to gain access to troves of private messages belonging to buyers and sellers on the dark website, AlphaBay admins announced on Tuesday. It turns out that the messages were not encrypted by default, which gave the hacker ability to view all messages between vendors and buyers selling and purchasing everything from illicit drugs to exploits, malware, and stolen data. Over 218,000 Private Messages of Anonymous Dealers Exposed To prove he had successfully compromised the AlphaBay website, the hacker posted five screenshots of random user private conversations, showing that AlphaBay users had openly exchanged their names, personal addresses and tracking numbers without encryption. "We have been made aware of the bug that allowed an outsider to view marketplace private messages, reads a statement from the AlphaBay administrators on Pastebin, and "we believe that the community has the right to be made aware of what information was obtained." A first vulnerability allowed the hacker to obtain more than 218,000 personal messages sent between their users within the last 30 days, while the second bug allowed him to obtain a list of all usernames and their respective user IDs. However, the AlphaBay admins assured that those users who did not receive any message in their inboxes in the last 30 days were not affected. They also claimed the bugs were only exploited by one single hacker. AlphaBay Fixes the Bugs and Pays the Hacker The admins also assured their users that AlphaBay forum messages, order data, and Bitcoin addresses of users are all safe, and the issue was fixed just within four hours after the Reddit user went public. "The attacker was paid for his findings, and agreed to tell us the methods used to extract such information," AlphaBay admins said. "Our developers immediately closed the loophole in order to protect the security of our users." Meanwhile, they advised AlphaBay users to make use of a PGP key and always encrypt their sensitive data, including delivery addresses, Bitcoin wallet IDs, tracking numbers, and others. Since AlphaBay is a Dark Web marketplace, which is only accessible via the Tor Browser, the bug could have been exploited by law enforcement to unmask users real identities who deal in drugs and other illegal activities. But, AlphaBay members using the PGP key and encrypting their account details would be on a safer side. This is not the very first time when a hacker discovered a flaw in the AlphaBay dark website. AlphaBay faced a similar vulnerability in April last year when its users' private messages were left exposed due to a flaw in its newly-launched API, allowing an attacker to obtain 13,500 private messages. via @HackerNews
-
In order to keep users safe from cyberattacks, several major websites have implemented bug bounty programs to give novice programmers, white hat hackers and security researchers an opportunity to discover and resolve bugs before the general public is aware of them, thereby preventing incidents of widespread abuse. One such website is Google that invites researchers worldwide to find out flaws in its newest or existing applications, extensions, software and operating system that are available at Google Play, Chrome Web Store and/or iTunes and awards prizes to anyone who finds a legitimate bug which could be exploited. The main objective of these programs is to make Google’s applications and systems more secure and protected. Recently, Ahmed Mehtab, a Pakistani student and CEO at Security Fuss, was listed in Google’s Hall of Fame for his contribution in Google’s Vulnerability Reward Program (VRP). In order for Ahmed to qualify for Google’s VRP, it was important that the identified bug or vulnerability falls in any one of the categories mentioned below. If the vulnerability is identified as a valid one, the hacker can expect to receive up to $20,000 by Google as a reward. ⊙ Cross-site scripting ⊙ Cross-site request forgery ⊙ Mixed-content scripts ⊙ Authentication or authorization flaws Server-side code execution bugs If a user has more than one email address, Google allows the facility to associate or link all of the addresses and also allows forwarding addresses, to which emails of the primary account can be forwarded to. Ahmed found a way to prove that these methods adopted by Google were actually vulnerable to authentication or verification bypass, which leads to the hijacking of the email IDs. However, it is possible only if one of the following cases is true: Recipient of the SMTP is offline. If recipient has deactivated his email. Recipient doesn’t exist or invalid email ID. The recipient exists but has blocked the sender. Further, here is how hijacking is carried out: Attacker tries to confirm ownership of an email address by emailing Google. Google sends an email to that address for confirmation. The email address is not capable to receive email and hence, email is bounced back to the actual sender. The bounced email will contain the verification code. Attacker takes that verification code and confirms his ownership to that particular address. This is not the first time when a Pakistani hacker has reported such serious security flaws. Earlier, security researcher Rafay Baloch was paid $5000 as a bug bounty for reporting dangerous flaws in Chrome and FireFox along with $10,000 for revealing a Code Execution/Command Execution vulnerability in PayPal that allowed hackers to execute any command on the server. Via @Techworm
-
Codul problema este format dintr-un emoticon cu un steag alb cifra zero si un emoticon curcubeu. Dispozitivele cu iOS 10 confunda caracterele atunci cand încarcă asa le combine intr-un steag curcubeu. Cand codul de mai sus este primit software-ul iphone-ului încarcă sa le combine, dar esuează, cea ce duce la blocarea dispozitivului pentru cateva momemente pana restartarea lui. Destinatarul nu poate citi mesajul primit. Bug-ul afecteaza utilizatorii de iOS 10.1 in jos. POC video:
-
Fa root, apoi foloseste aplicatia titanium backup, este foarte buna, poti face backup la toate aplicatiile telefonului. (Necesita root ca sa o poti folosi.)
-
E hacker, culege date, social engineering Am auzit ca tinta lui este sa puna shemale pe index
-
Descarca opera, are vpn integrat.
-
Ce trebuie sa faceti? 1. Trebuie sa aveti cont pe stream pentru a putea folosi key-ul si a conecta contul de steam cu cel de pe humblebundle.com 2. Intrati aici click pe butonul verde "Get it Free!" 3. Va conectati cu contul de humblebundle sau daca nu aveti va faceti unul (daca iti faci cont nou va trebui sa conectezi si contul de steam). 4. Dupa conectare dati pe butonul verde "Check out" 5. In continuare veti fi redirectionat pe o pagina unde va trebui sa dati rendee on steam 6. Dupa ce ati facut rost de key intrati pe steam si il activati.
-
1. Master Adobe Photoshop Elements 15 the Easy Way https://www.udemy.com/master-adobe-photoshop-elements-15-course/?couponCode=PSEBUNDLE 2. NLP: Life Coach Principles for Success in Life & Coaching https://www.udemy.com/nlp-how-to-ap...coach-think-essentials/?couponCode=DISCOUNTED 3. Android Development Working With Databases Using Mysql & PHP https://www.udemy.com/android-development-course/?couponCode=PHPSQLFREE 4. OpenStack: An Introduction to Cloud Computing and OpenStack https://www.udemy.com/openstack-an-...mputing-and-openstack/?couponCode=NEWYEARGIFT
-
Both Facebook and Messenger Apps draining user smartphone batteries due to server side bug. If you were using either Facebook or the Messenger App on your Android smartphone, you might have noticed that your smartphone battery was draining faster than usual. It was due to a nasty bug in its servers according to Facebook that was draining some users’ batteries incredibly fast and making their phones get too hot. The problem was universal and many users took to Twitter to express their shock at the sudden draining of their smartphone battery. David Marcus, the VP of messaging products at the social network, confirmed on Twitter that this problem had arisen due to a bug, and that it should now be solved. “Issue was isolated and fixed server side,” he wrote on Tuesday. “If you restart Messenger the problem should be gone now. Very sorry.” Though Marcus refused to divulge how many Facebook or Messenger App users were affected by this strange battery draining bug, only Android smartphone users seemed to effected by the bug. Marcus also refused to divulge details of the bug or how it was identified and fixed. One Reddit user said he even deleted the Facebook and Messenger apps as a result: “It was draining my battery really bad and smartphone was getting hot. Had to delete them.” If you are using Facebook or Facebook messenger App on your Android smartphone and your battery is draining fast or your smartphone feels hot, restart both the Apps and if possible the smartphone. If that doesn’t solve the problem, delete both the Apps and reinstall them again. via @techworm
-
- 1