Jump to content

Fatal1ty

Active Members
  • Posts

    858
  • Joined

  • Last visited

Everything posted by Fatal1ty

  1. pai eu am inteles ca o luna -doua si vine colet la posta si u primesti nushtu ce hartie(nuj cum ii zice) pt ca u sa stii ca a venit coletu si cu biletu ala te duci la posta si iti ridici coletul asai de oricei
  2. What you need : - mIRC - http://www.mirc.com - a server you want to test it on - a chanel you can test it on - MultiProxy 1.2a (or current version) - http://www.multiproxy.org/ - Proxy List - http://www.multiproxy.org/ (SKIP THIS PART IF YOU DONT WANT TO USE MultiProxy) Ok, so what you need to do right now is start up MultiProxy. You should have got the proxy list off http://www.multiproxy.org/ , just save the list as a .txt file. In MultiProxy go to "Options", select the "Proxy servers list" tab, click "Menu" and select "Files > Import Proxy List", select the .txt you made earlier. Now click the "Check all Proxies" button and wait for it to finish. Once its done just minimize the program... (-==========-------=================------------========--) I sugest using MultiProxy, as it will rotate the Proxy servers every 10 seconds or as u choose, so u will use either localhost or 127.0.0.1 (as that is set to localhost in hosts.ini...) Ok now start up mIRC. Click the Options button, and go to the "Connect > Firewall" section.. Fill in the information as follows: -Check the "Server" & "Dcc" -For protocol select "Proxy" -Hostname: (if you use MultiProxy then:) 127.0.0.1 (If you dont want to use multiproxy then just type the proxy servers ip here!) -User ID: -Password: -Port: (if you use MultiProxy then:) 8088 (If you dont want to use multiproxy then just type the server's port here.) Click OK.. Now just connect, some proxy servers dont suport irc, and some will be denied by the server/chan, but on average they should work... So basicly u can spam and stuff and not be able to be banned... (-==========-------=================------------========--) **************** Oher Solutions **************** There are other ways of bypassing the ban: 1) Get a shell account from a place like strategical.net, its 5 bucks a month.. and will keep u unbanned Smile 2) Get a friend to run WinBNC for you, u cant run it your self, as that will not mask your ip. 3) Renew your ip, this is lame and only works like 0.1% of the time and only with non static ip's.. Ok, well enjoy not being bannable and causing all sorts of stuff on irc...
  3. Denial of Services Attack A Denial of Service, or DoS as it is often abbreviated, is a malicious attack on a network. This type of attack is essentially designed to bring a network to it,s knees by flooding it with heavy useless traffic. Many DoS attacks work by exploiting limitations in the TCP/IP protocols. Hackers use DoS attacks to prevent legitimate uses of computer network resources. DoS attacks are characterised as an attempts to flood a network, attempts to disrupt connections between two computers, attempts to prevent an individual from accessing a service or attempts to disrupt service to a specific system or person. Those on the receiving end of a DoS attack may lose valuable resources, such as their e-mail services, Internet access or their Web server. Some DoS attacks may take up all your bandwidth or even use up all the system resource, such as server memory, etc. Some of the worst-case scenarios we've seen over the past couple of years is a Web site, used by millions of people being forced to cease operation because of a successful DoS attack. A DoS attack may very well appear to be legitimate traffic on the system or network, but differs in that the volume and frequency of the traffic will increase to unmanageable levels. An attack on a Web server, for example, would not be normal spurts of visitors, but rather a large number of hits in close proximity so the server cannot keep up with the sheer volume of page requests. On a mail server, hundreds of thousands of messages can be sent to the server in a short period of time where the server would normally only handle under a thousand messages in that same time period. The targeted server would most likely be brought to a halt from a DoS attack because it runs out of swap space or process space or network connections. While DoS attacks do not usually result in information theft or any security loss for a company, they can cost an organization both time and money while their network services are down. For the hacker (or the script kiddies who often use DoS attacks), a DoS attack is usually committed for "ego boosting" purposes. Early DoS attacks consisted of simple tools generating packets from a single source, which was then aimed at a single destination. The evolution of the DoS attack however now sees single source attacks against multiple targets, multiple source attacks against single targets, and multiple source attacks against multiple targets. Common Denial of Service Attacks Buffer Overflow The condition wherein the data transferred to a buffer exceeds the storage capacity of the buffer and some of the data overflows into another buffer, one that the data was not intended to go into. Since buffers can only hold a specific amount of data space provided, when that capacity has been reached the data has to flow somewhere else, typically into another buffer, which can corrupt data that is already contained in that buffer. Malicious hackers can launch buffer overflow attacks wherein data with instructions to corrupt a system are purposely written into a file in full knowledge that the data will overflow a buffer and release the instructions into the computer’s instructions. Ping of Death A type of DoS attack in which the attacker sends a ping request that is larger than 65,536 bytes, which is the maximum size that IP allows. While a ping larger than 65,536 bytes is too large to fit in one packet that can be transmitted, TCP/IP allows a packet to be fragmented, essentially splitting the packet into smaller segments that are eventually re-assembled. Attacks took advantage of this flaw by fragmenting packets that when received would total more than the allowed number of bytes and would effectively cause a buffer overload on the operating system at the receiving end, crashing the system. Smurf Attack A type of network security breach in which a network connected to the Internet is swamped with replies to ICMP echo (PING) requests. A smurf attacker sends PING requests to an Internet broadcast address. These are special addresses that broadcast all received messages to the hosts connected to the subnet. Each broadcast address can support up to 255 hosts, so a single PING request can be multiplied 255 times. The return address of the request itself is spoofed to be the address of the attacker's victim. All the hosts receiving the PING request reply to this victim's address instead of the real sender's address. A single attacker sending hundreds or thousands of these PING messages per second can fill the victim's T-1 (or even T-3) line with ping replies, bring the entire Internet service to its knees. TCP SYN Attack In a SYN attack, a sender transmits a volume of connections that cannot be completed. This causes the connection queues to fill up, thereby denying service to legitimate TCP users. Teardrop A Teardrop is a type of DoS attack where fragmented packets are forged to overlap each other when the receiving host tries to reassemble them. Distributed Denial of Service Attack (DDoS) In and around early 2001 a new type of DoS attack became rampant, called a Distributed Denial of Service attack or DDoS. In this case multiple comprised systems are used to attack a single target. The flood of incoming traffic to the target will usually force it to shut down. Like a DoS attack in a DDoS attack the legitimate requests to the affected system are denied. Since a DDoS attack it launched from multiple sources, it is often more difficult to detect and block than a DoS attack. Preventative Measures To prevent your system and network from becoming a victim of DoS attacks, implement these preventive measures: Implement router filters. This will lessen your exposure to certain denial-of-service attacks. If they are available for your system, install patches to guard against TCP SYN flooding. Disable any unused or unneeded network services. This can limit the ability of an intruder to take advantage of those services to execute a denial-of-service attack. Enable quota systems on your operating system if they are available. Observe your system performance and establish baselines for ordinary activity. Use the baseline to gauge unusual levels of disk activity, CPU usage, or network traffic. Routinely examine your physical security with respect to your current needs. Use Tripwire or a similar tool to detect changes in configuration information or other files. Invest in and maintain "hot spares" - machines that can be placed into service quickly in the event that a similar machine is disabled. Invest in redundant and fault-tolerant network configurations. Establish and maintain regular backup schedules and policies, particularly for important configuration information. Establish and maintain appropriate password policies, especially access to highly privileged accounts such as UNIX root or Microsoft Windows NT Administrator. Source:www.cert.org
  4. Inca un tutorial ffff bun il puteti downloada de aici extensia txt desigur...eu am puso dar vad ca dak downloadez fisierul nu are nicio extensie
  5. Over at WinCustomize, someone thought they'd found an Easter Egg in the Windows Notepad application. If you: 1. Open Notepad 2. Type the text "this app can break" (without quotes) 3. Save the file 4. Re-open the file in Notepad Notepad displays seemingly-random Chinese characters, or boxes if your default Notepad font doesn't support those characters. It's not an Easter egg (even though it seems like a funny one), and as it turns out, Notepad writes the file correctly. It's only when Notepad reads the file back in that it seems to lose its mind. But we can't even blame Notepad: it's a limitation of Windows itself, specifically the Windows function that Notepad uses to figure out if a text file is Unicode or not. You see, text files containing Unicode (more correctly, UTF-16-encoded Unicode) are supposed to start with a "Byte-Order Mark" (BOM), which is a two-byte flag that tells a reader how the following UTF-16 data is encoded. Given that these two bytes are exceedingly unlikely to occur at the beginning of an ASCII text file, it's commonly used to tell whether a text file is encoded in UTF-16. But plenty of applications don't bother writing this marker at the beginning of a UTF-16-encoded file. So what's an app like Notepad to do? Windows helpfully provides a function called IsTextUnicode()--you pass it some data, and it tells you whether it's UTF-16-encoded or not. Sorta. It actually runs a couple of heuristics over the first 256 bytes of the data and provides its best guess. As it turns out, these tests aren't terribly reliable for very short ASCII strings that contain an even number of lower-case letters, like "this app can break", or more appropriately, "this api can break". The documentation for IsTextUnicode says: These tests are not foolproof. The statistical tests assume certain amounts of variation between low and high bytes in a string, and some ASCII strings can slip through. For example, if lpBuffer points to the ASCII string 0x41, 0x0A, 0x0D, 0x1D (Anr^Z), the string passes the IS_TEXT_UNICODE_STATISTICS test, though failure would be preferable.
  6. Este un tutorial dupa parerea mea foarte bun dar din pacate nu am reusit sa il postez pe forum ... ca de obicei --- securitatea este mai importanta ! Insa il puteti downloada de aici ! Desigur tutorialul nu este scris de mine dar m-am gandit ca va poate ajuta !
  7. cu jocuri ? :@ neah.... eu cre ca forumu e perfect asa cum e
  8. LOL asta sigur nui o prostie LOL :@ :@ :@ :@ :@
  9. am mai facut eu niste tutoriale video despre asta )
  10. Fatal1ty

    eu

    lol bun venit J0K3R
  11. Fatal1ty

    Hello

    welcome friend enjoy your stay
  12. thx zbeng ff bun tut poate uit parola :@
  13. Fatal1ty

    Salut !!!

    hy man enjoy your stay
  14. hai sa votam toti sa facem 800 si ceva de voturi
×
×
  • Create New...