escalation666
Active Members-
Posts
567 -
Joined
-
Last visited
-
Days Won
3
Everything posted by escalation666
-
Sunt sigur ca ai cele mai bune intentii vladiii, dar o tema "Noi iubim RST" sau o "antiteza intre viata sau moarte" :shock: nu mi se pare cam potrivit, ci mai degraba ceva dedicat hackingului (ca doar acest forum este un sanctuar al "hackerilor etici"). Cat despre banner....e cam sissy
-
e din operation takedown
-
so...un wc public e mai curat decat biroul sau frigiderul meu? :roll:
-
Va prezint prog. secrete ale FBI [AIO]
escalation666 replied to Bufnitza_49's topic in Programe hacking
E mult spus "secrete ale FBI " -
!~666.1/2 ani si #0,45.734! la papucu' stang
-
Pentesterii de exemplu au aprobare sau alt caz este unul personal in care am gasit o vulnerabilitate intamplator intr-o platforma, am trimis un email webmaster-ului cu ceea ce-am gasit si i-am cerut aprobarea sa fac si alte teste mai amanuntite. E adevarat ca intr-o prima faza n-am avut aprobarea...dar am dobandit-o
-
Mie cel putin nu-mi trebuie contul tau de pe arabicshells.org, cat despre vulnerabilitati e FreeBSD totusi, si nu e chiar inactiv cum spui tu, serverul ruland vreo 9 daemoni de psybnc pe el plus si alte servicii.. Nu mi se pare o idee buna sa ceri sau sa propui pe un forum de ethical hacking altor oameni sa compromita securitatea unor servere care nu-ti apartin sau pentru care nu ai o aprobare pentru asa ceva. //Anyway...unele denumiri de vhosts are funny 208.98.44.194 PShells.net 208.98.44.197 Gent00.info 208.98.44.198 Download.Gent00.info 208.98.44.199 aslab.zalameh.catninja.info 208.98.44.200 catninja.info 208.98.44.201 using.BitchX.on.Gent00.info 208.98.44.202 kharouf.info 208.98.44.203 operat0r.info 208.98.44.204 best.operat0r.info 208.98.44.205 keis.3ara2.w.mechwe.la7em.kharouf.info 208.98.44.206 IRCOP.info 208.98.44.207 kellon.badoun.IRCOP.info 208.98.44.208 7elmak.tsir.IRCOP.info 208.98.44.209 Drinking.Pizza.Eating.Poizon.net 208.98.44.210 kill.with.poizon.net 208.98.44.211 inject.your.life.with.poizon.net 208.98.44.212 Dont.mess.with.LIBANON.operat0r.info 208.98.44.213 Sexy.operat0r.info 208.98.44.214 poiZon.net 208.98.44.215 Tonyozo.info 208.98.44.216 WINDOWZ-VISTA.info 208.98.44.217 per-year.info 208.98.44.218 AngelZghire.info 208.98.44.219 robot.operat0r.info 208.98.44.221 and.then.there.was.gent00.info 208.98.44.222 buy.some.drugs.and.pay.me.per-year.info 208.98.44.223 hacked.your.BOX.785678465294.times.per-year.info 208.98.44.224 back.from.the.dead.2.times.per-year.info 208.98.44.225 massban.operat0r.info 208.98.44.226 ayrak.bi.kil.chi.esmo.ircop.info 208.98.44.227 drop.some.poizon.net 208.98.44.228 FreeBSD.or.cracked.windowz-vista.info 208.98.44.229 microsoft.windowz-vista.info 208.98.44.230 format.and.install.windowz-vista.info 208.98.44.231 xLeb.operat0r.info 208.98.44.232 Linux.Gent00.info 208.98.44.233 Suicide.with.poizon.net 208.98.44.234 7lob.el.kharouf.info 208.98.44.235 idiot.operat0r.info 208.98.44.236 einstein.was.an.IRCOP.info 208.98.44.237 I.know.all.your.operat0r.info 208.98.44.238 I.am.an.IRCOP.info 208.98.44.239 lebanese.operat0r.info 208.98.44.240 resolved.IP.192.168.1.22.Gent00.info 208.98.44.241 psyBNC.pshells.net 208.98.44.242 G.M.Aoun.president.of.Leban0n.info 208.98.44.243 10452.Leban0n.info 208.98.44.244 LebForces.leban0n.info 208.98.44.245 mou3arada.leban0n.info 208.98.44.246 Beirut.leban0n.info 208.98.44.247 proud.to.live.in.leban0n.info 208.98.44.248 whois-me.wchouf.ya.kharouf.info 208.98.44.249 damir.3anze.bezz.kharouf.info 208.98.44.250 r0cky.info 208.98.44.251 irc.poizon.net 208.98.44.252 blood.flesh.bones.fight.for.honor.and.glory.pshells.net 208.98.44.253 Leban0n.info
-
Few days ago, the website Microsoft IEAK was victim of a defacement. The website promotes the “Internet Explorer Administration Kit”, a toolkit that allows to “deploy and manage Web-based solutions,” and to “learn how to tailor a custom browser to meet customers' needs,” the website says. The attacker is known by the handle Cyber-Attacker (cyb3rt), he is from Saudi Arabia, and he is not new to such activities. He is the one who carried out to a XSS attack against one of Zone-H staff members, stole his administrator password and by this mean defaced Zone-h English website. As reported by the attacker, the page contains a SQL Injection flaw in the Login field, by which he got to execute arbitrary sql commands and inject the html content that altered the page of Microsoft IEAK web site.... Flaws of SQL Injection are in general as common as ' OR ' =', and thanks to the improvements in technology and in web coders’ skills, cyber attackers could learn lots of things on SQL , and subsequently they perfected their ability to provoke headaches to web admins… Image of the defacement to http://ieak.microsoft.com Many people think that such attacks can be led just for pages based on ASP, and for log-in forms. Actually, this kind of attack can be carried out against any page/source type, be it ASP, HTML, PHP or CFM: the only difference is the method. Whenever there is a mistake in SQL queries, there could be an exploitable flaw for cyber criminals. The only solution for admins is to work hard in collaboration with coders, revising the source code to patch any visible mistake that could generate problems in the future. But since the possibility to perform a “complete revision” of the source code is infrequent, due to a huge amount of web pages source code to revise, another solution is needed: for instance, the adoption of modules for Apache as mod_security and of .ht access to restrict the execution of SQL strings into URL and activating magic_quotes in the PHP configuration. In Windows Servers, administrators can use filters directly on their we pages. Such filters can check users input and help, this way, administrators to prevent digital attacks. One prevention-method used by these filters, is based on disabling of warnings messages, because the apparition of similar warnings are a sort of signal that helps the attacker to get to the website’s database or to the table/column where he is going to make the attack. aici e articolul original: http://www.zone-h.org/index.php?option=com_content&task=view&id=14734&Itemid=31&msgid=2217#akotext si aici un mirror al deface-ului: http://www.zone-h.org/index2.php?option=com_mirrorwrp&Itemid=43&id=6202670
-
During some research, I found an intersting "feature" on my Nokia mobile phone; I was able to retrieve any apparently deleted sms/mms. Letting aside some paranoid thoughts about WHY this sms are not deleted, I think that, while this represents an high risk for our privacy, this discover could give some hint into mobile phone forensics and anti-forensics field. First, I would like to tell you that I tested this on my Nokia N-gage and on a Nokia 6600 but I am quiete sure that this procedure works on every Nokia Symbian S60 (maybe other vendors). So I strongly incite you to test it on your mobile phone and share the results. Tested products: Nokia N-gage, firmware version: V 4.03 26-11-2003 NEM-4 Nokia 6600 Maybe the whole S60 series. Procedure: Download the Nokia PC Suite for your mobile phone and make a backup on your local hd. I used PC Suite for Nokia N-Gage Version 1.0.0 http://www.nokia.com/pcsuite It will create a huge number of ".dat" files in a specified directory. Download, install and start Cygwin. This is not required but suggested, you could use an hexadecimal editor and a bit of patience but using Cygwin is surely faster. http://www.cygwin.com Move into the backup directory. $ ls -al | less total 6016 drwx------+ 2 Administrator Nessuno 0 Feb 6 01:35 . drwx------+ 7 Administrator Nessuno 0 Feb 5 23:00 .. -rwx------+ 1 Administrator Nessuno 2972 Nov 27 2003 1.dat -rwx------+ 1 Administrator Nessuno 22913 Nov 27 2003 10.dat -rwx------+ 1 Administrator Nessuno 1062 Feb 16 2005 100.dat -rwx------+ 1 Administrator Nessuno 3912 Aug 9 2005 1000.dat -rwx------+ 1 Administrator Nessuno 2750 Aug 25 2005 1001.dat -rwx------+ 1 Administrator Nessuno 8741 Dec 15 2005 1002.dat -rwx------+ 1 Administrator Nessuno 9926 Dec 20 2005 1003.dat -rwx------+ 1 Administrator Nessuno 63 Dec 30 2005 1004.dat -rwx------+ 1 Administrator Nessuno 23988 Jan 13 2006 1005.dat -rwx------+ 1 Administrator Nessuno 18 Jan 23 2006 1006.dat ... ... etc etc (files created by the nokia pc suite). Choose a file to examine. $ ls -al 3102.dat -rwx------+ 1 Administrator Nessuno 666569 Feb 5 23:59 3102.dat Use the command "strings" to find printable characters. $ strings 3102.dat | less Ciao! Auguro a te ed alla tua fa@Enrica Farlonesi ... ... etc etc This is part of an sms I deleted and that I don't see on my phone. So, just grep every file in the directory to find the complete sms: $ grep -i "Auguro a te ed alla" * Binary file 1770.dat matches Binary file 3102.dat matches The sms has been found in 1770.dat file, let's see what's inside it: $ strings 1770.dat Ciao! Auguro a te ed alla tua famiglia un felice anno nuovo! E. 4+393915253350 4+393922378986 Got it! The complete sms, with the phone number of the sender (phone numbers have been changed). In earlier versions of Nokia PC Suite it just creates a ".nbu" file and you can just edit it with an hexadecimal editor. I mailed the Nokia support and they told me they didn't know about this bug and would like to know more informations about impacted models but they don't have any intention to release some kind of patch. I contacted Symbian too, they told me that Symbian sources are distributed to mobile phone vendors and so they cannot release any final-user patch. This description is also avaiable here: http://www.alighieri.org/advisories/retrieving_deleted_sms.txt (ENG) http://www.alighieri.org/advisories/recuperare_sms_cancellati.txt (ITA) Credits: Davide Del Vecchio
-
"Do any of you know how to do this?" Yeah. But you now how-how (miau-miau) in romanian?
-
:roll: Foloseste biolocatia Luke! Pasul 1: iei o ramurica ; Pasul 2: intri pe internet si incepi sa surfezi (navighezi); Pasul 3: folosind biolocatia vei gasi apa...pardon...XSS.
-
dizzy da-ne un exemplu de tutorial complet si profesionist realizat de tine . orice argument trebuie sustinut si de exemple concrete nu?
-
Funny Unix csh/sh commands: --------------------------- % cat "food in cans" cat: can't open food in cans % nice man woman No manual entry for woman. % rm God rm: God nonexistent % ar t God ar: God does not exist % ar r God ar: creating God % "How would you rate Quayle's incompetence? Unmatched ". % [Where is Jimmy Hoffa? Missing ]. % ^How did the sex change operation go? ^ Modifier failed. % If I had a ( for every $ the Congress spent, what would I have? Too many ('s. % make love Make: Don't know how to make love. Stop. % got a light? No match. % man: why did you get a divorce? man:: Too many arguments. % !:say, what is saccharine? Bad substitute. /* not csh but sh */ $ PATH=pretending!/usr/ucb/which sense no sense in pretending! $ drink bottle: cannot open opener: not found -------------------------------------------------------------------------------- From: "Aditya, The Hindu Skeptic" (a018967t@BCFREENET.SEFLIN.LIB.FL.US) Date: Tue, 31 Jan 1995 12:24:37 -0500
-
felicitari, tine-o tot asa
-
O mica corectare si completare: Tu ai scris ca:"In acest exemplu, parola este x" ceea ce este gresit pentru ca este un exemplu de fisier in care parola este shadowed, si se afla de fapt in /etc/shadow, si intr-adevar /etc/passwd poate sa-l citeasca oricine, dar pentru a vedea continutul din /etc/shadow iti trebuie drepturi de root, si doar in cazul in care web serverul ruleaza cu drepturi de root vei vedea continutul lui prin lfi! In rest, este un tutorial foarte interesant. Thx d3fcrash & vladiii
-
Este o discrepantza intre ceea ce sunteti voi acuma, ethical hackers, si sectiunea de scamuri. Este doar o sugestie.
-
nu l-am folosit, dar se vede clar din imagine ca e folosit la gasirea de vulnerabilitati din scripturi, si nu sa scanezi site-uri /* scripturi locale, stocate pe hard disk bineinteles, poate unii inteleg altceva */
-
puteai sa-l pui in sectiunea de tutoriale in engleza
-
incearca www.antifrauda.evonet.ro/scam.swf daca asta o fi filmuletul
-
SQL injection2 Dificultate:medie http://wargames.ifastnet.com/sql2/ Daca sunteti very very close dar tot nu va da raspunsul corect,...dati-mi un pm si va lamuresc. Nu dati pm aiurea.
-
Bazele sql injection... Dificultate:easy http://wargames.ifastnet.com/sql1/
-
Si niste criptografie Dificultate:easy http://wargames.ifastnet.com/crypto1/
-
Inca un site vulnerabil...vulnerabil la un mod de atac diferit fata de primul wargame realizat de mine.. Regula este sa nu scanati&bruteforce&sau ce va mai vine in cap... Dificultate: easy Acestea fiind spuse...enjoy! http://softwareaudit.ifastnet.com
-
Neavand ce face, m-am hotarat sa creez un site vulnerabil, si sa va provoc sa-i faceti deface. Ganditi-va la aceasta provocare drept un wargame, un joc de genul celor de pe hackthisiste... Nu are cine stie ce grad de dificultate. Rugamintea mea este ca cei care fac re-deface, sa lase deface-ul celor de dinaintea lor, sa se stie cine sunt cei care au rezolvat acest mic wargame...un simplu hacked by...e de ajuns http://aeon666.ifastnet.com/index.php acesta este targetul. (era sa uit....fara scannere...pentru ca nu are rost sa scanati) Se pare ca astia de la ifastnet, te redirectionau cand cautai ceea ce trebuie.. dar am redenumit...acuma e cu .html Is putin cam criptic, dar asa si trebuie...no spoilers
-
Este o versiune imbunatatita, cu imagini, cu noi informatii si noi metode de atac, dar si metode de aparare. Enjoy. http://escalation666.homelinux.org/tutoriale/websecurity.v2.0.pdf Diferite sugestii/reclamatii, pareri etc le puteti posta aici, prin pm, sau una din adresele mele de email.