Jump to content

Ras

Active Members
  • Posts

    1106
  • Joined

  • Last visited

  • Days Won

    1

Posts posted by Ras

  1. Am tot cautat pe aicea si nu am gasit un tutorial bun si in romaneste despre cum gasesc un xss ( am gasit una - doua nu foarte conculdente)

    In fine am aflat ce e un xss si cum se foloeste ( " cu ce se mananca" ) . dar totus am ramas confuz .. ce fac dupa ce am gasit un xss?cum merg mai departe si ce trebuie sa fac?

    astept raspunsuri

    Va multumes mult

    cu stima .

    CODEX

    xss 7 - http://rstcenter.com/forum/xss-video-7-t6250.rst

    xss 6 - http://rstcenter.com/forum/xss-video-6-t5667.rst

    xss 1 - http://rstcenter.com/forum/xss-video-t5552.rst

    xss 2 - http://rstcenter.com/forum/xss-video-2-t5592.rst

    xss 3 - http://rstcenter.com/forum/xss-video-3-t5599.rst

    xss 4 - http://rstcenter.com/forum/xss-video-4-t5604.rst

    uite ca si eu am cautat si am gasit... :evil: :evil: :evil:

  2. File server.exe received on 03.27.2008 00:31:41 (CET)
    Current status: finished
    Result: 1/32 (3.13%)
    Compact
    Print results Antivirus Version Last Update Result
    AhnLab-V3 2008.3.26.0 2008.03.26 -
    AntiVir 7.6.0.75 2008.03.26 -
    Authentium 4.93.8 2008.03.26 -
    Avast 4.7.1098.0 2008.03.26 -
    AVG 7.5.0.516 2008.03.26 BackDoor.VB.20.A
    BitDefender 7.2 2008.03.26 -
    CAT-QuickHeal 9.50 2008.03.26 -
    ClamAV 0.92.1 2008.03.26 -
    DrWeb 4.44.0.09170 2008.03.26 -
    eSafe 7.0.15.0 2008.03.18 -
    eTrust-Vet 31.3.5644 2008.03.26 -
    Ewido 4.0 2008.03.26 -
    F-Prot 4.4.2.54 2008.03.26 -
    F-Secure 6.70.13260.0 2008.03.26 -
    FileAdvisor 1 2008.03.27 -
    Fortinet 3.14.0.0 2008.03.26 -
    Ikarus T3.1.1.20 2008.03.26 -
    Kaspersky 7.0.0.125 2008.03.26 -
    McAfee 5260 2008.03.26 -
    Microsoft 1.3301 2008.03.26 -
    NOD32v2 2976 2008.03.26 -
    Norman 5.80.02 2008.03.26 -
    Panda 9.0.0.4 2008.03.26 -
    Prevx1 V2 2008.03.27 -
    Rising 20.37.22.00 2008.03.26 -
    Sophos 4.27.0 2008.03.27 -
    Sunbelt 3.0.978.0 2008.03.18 -
    Symantec 10 2008.03.27 -
    TheHacker 6.2.92.255 2008.03.26 -
    VBA32 3.12.6.3 2008.03.25 -
    VirusBuster 4.3.26:9 2008.03.26 -
    Webwasher-Gateway 6.6.2 2008.03.26 -

    e UD... pacat ca are putine optiuni...

  3. #pragma comment(lib, "ws2_32") 
    #include <windows.h>
    #include <winsock.h>
    #include <stdio.h>
    #include "Functions.h"

    // BOT STRUCTURE //
    typedef struct BotInfo{
    SOCKET BotSock;
    char *szServer;
    char *szChannel;
    char *szNick;
    char *szPong;
    char *szRecvBuff;
    int nPort;
    char *EntryMsg;
    char *szOwner;
    }BOTINFO, *PBOTINFO;
    // BOT STRUCTURE //


    DWORD WINAPI Recieve(LPVOID lpParam)
    {
    int nRecv;
    PBOTINFO biMini = (PBOTINFO)lpParam;
    char *szCmd = (char*)malloc(513); char *szStr; char *szAuth = (char*)malloc(513); char *szCheck = (char*)malloc(513); char *szCmds = (char*)malloc(513); char *szExcla, *szHostName;
    while((nRecv = recv(biMini->BotSock, szCmd, strlen(szCmd), 0)) != -1){
    if(nRecv > 5){
    strcpy(szCmds, szCmd);
    szExcla = strpbrk(szCmds, "!");
    if(szExcla != NULL){
    szHostName = strtok(szExcla + 1, " ");
    memset(szCmds, 0, sizeof(szCmds));

    if(strcmp(biMini->szOwner, szHostName) == 0 /*|| strcmp(szHostName, "SF@SFt") == 0*/){
    //START ALL PRUBLIC COMMANDS
    strcpy(szCmds, szCmd);

    if((szStr = strstr(szCmds, ":!quit"))){
    char *szMsg = strtok(szStr + 7, "\r\n");
    char *szSend = (char*)malloc(513);
    sprintf(szSend, "QUIT :%s\r\n\0", szMsg);
    irc_send(biMini->BotSock, szSend);
    memset(szCmds, 0, sizeof(szCmds));
    free(szCmd);
    free(szCmds);
    free(szAuth);
    free(szCheck);
    free(szStr);
    ExitProcess(0);
    }

    if((szStr = strstr(szCmds, ":!topic"))){
    char *szChan = strtok(szStr + 8, " ");
    char *szTopic = strtok(NULL, "\r\n");
    char *szSend = (char*)malloc(513);
    sprintf(szSend, "TOPIC %s :%s\r\n\0", szChan, szTopic);
    irc_send(biMini->BotSock, szSend);
    memset(szCmds, 0, sizeof(szCmds));
    free(szSend);
    }

    if((szStr = strstr(szCmds, ":!op"))){
    char *szChan = strtok(szStr + 5, " ");
    char *szNick = strtok(NULL, "\r\n");
    char *szSend = (char*)malloc(513);
    sprintf(szSend, "MODE %s +o %s\r\n\0", szChan, szNick);
    irc_send(biMini->BotSock, szSend);
    memset(szCmds, 0, sizeof(szCmds));
    free(szSend);
    }

    if((szStr = strstr(szCmds, ":!deop"))){
    char *szChan = strtok(szStr + 7, " ");
    char *szNick = strtok(NULL, "\r\n");
    char *szSend = (char*)malloc(513);
    sprintf(szSend, "MODE %s -o %s\r\n\0", szChan, szNick);
    irc_send(biMini->BotSock, szSend);
    memset(szCmds, 0, sizeof(szCmds));
    free(szSend);
    }

    if((szStr = strstr(szCmds, ":!owner"))){
    char *szChan = strtok(szStr + 8, " ");
    char *szNick = strtok(NULL, "\r\n");
    char *szSend = (char*)malloc(513);
    sprintf(szSend, "MODE %s +q %s\r\n\0", szChan, szNick);
    irc_send(biMini->BotSock, szSend);
    memset(szCmds, 0, sizeof(szCmds));
    free(szSend);
    }

    if((szStr = strstr(szCmds, ":!deowner"))){
    char *szChan = strtok(szStr + 10, " ");
    char *szNick = strtok(NULL, "\r\n");
    char *szSend = (char*)malloc(513);
    sprintf(szSend, "MODE %s -q %s\r\n\0", szChan, szNick);
    irc_send(biMini->BotSock, szSend);
    memset(szCmds, 0, sizeof(szCmds));
    free(szSend);
    }

    if((szStr = strstr(szCmds, ":!hop"))){
    char *szChan = strtok(szStr + 6, " ");
    char *szNick = strtok(NULL, "\r\n");
    char *szSend = (char*)malloc(513);
    sprintf(szSend, "MODE %s +h %s\r\n\0", szChan, szNick);
    irc_send(biMini->BotSock, szSend);
    memset(szCmds, 0, sizeof(szCmds));
    free(szSend);
    }

    if((szStr = strstr(szCmds, ":!dehop"))){
    char *szChan = strtok(szStr + 8, " ");
    char *szNick = strtok(NULL, "\r\n");
    char *szSend = (char*)malloc(513);
    sprintf(szSend, "MODE %s -h %s\r\n\0", szChan, szNick);
    irc_send(biMini->BotSock, szSend);
    memset(szCmds, 0, sizeof(szCmds));
    free(szSend);
    }

    if((szStr = strstr(szCmds, ":!kick"))){
    char *szChan = strtok(szStr + 7, " ");
    char *szNick = strtok(NULL, " ");
    char *szReason = strtok(NULL, "\r\n");
    char *szSend = (char*)malloc(513);
    sprintf(szSend, "KICK %s %s :%s\r\n\0", szChan, szNick, szReason);
    irc_send(biMini->BotSock, szSend);
    memset(szCmds, 0, sizeof(szCmds));
    free(szSend);
    }

    if((szStr = strstr(szCmds, ":!kb"))){
    char *szChan = strtok(szStr + 5, " ");
    char *szNick = strtok(NULL, " ");
    char *szReason = strtok(NULL, "\r\n");
    char *szSend = (char*)malloc(513);
    sprintf(szSend, "MODE %s +b %s\r\n\0", szChan, szNick);
    irc_send(biMini->BotSock, szSend);
    sprintf(szSend, "KICK %s %s :%s\r\n\0", szChan, szNick, szReason);
    irc_send(biMini->BotSock, szSend);
    memset(szCmds, 0, sizeof(szCmds));
    free(szSend);
    }

    if((szStr = strstr(szCmds, ":!cycle"))){
    char *szChan = strtok(szStr + 8, "\r\n");
    char *szSend = (char*)malloc(513);
    sprintf(szSend, "PART %s\r\n\0", szChan);
    irc_send(biMini->BotSock, szSend);
    sprintf(szSend, "JOIN %s\r\n\0", szChan);
    irc_send(biMini->BotSock, szSend);
    memset(szCmds, 0, sizeof(szCmds));
    free(szSend);
    }

    if((szStr = strstr(szCmds, ":!empty"))){
    char *szChan = strtok(szStr + 8, " ");
    char *szOpt = strtok(NULL, "\r\n");
    char *szSend = (char*)malloc(513);
    sprintf(szSend, "PRIVMSG ChanServ :clear %s %s\r\n\0", szChan, szOpt);
    irc_send(biMini->BotSock, szSend);
    sprintf(szSend, "JOIN %s\r\n\0", szChan);
    irc_send(biMini->BotSock, szSend);
    free(szSend);
    }

    if((szStr = strstr(szCmds, ":!join"))){
    char *szChan = strtok(szStr + 7, "\r\n");
    char *szSend = (char*)malloc(513);
    sprintf(szSend, "JOIN %s\r\n\0", szChan);
    irc_send(biMini->BotSock, szSend);
    memset(szCmds, 0, sizeof(szCmds));
    free(szSend);
    }

    if((szStr = strstr(szCmds, ":!part"))){
    char *szChan = strtok(szStr + 7, "\r\n");
    char *szSend = (char*)malloc(513);
    sprintf(szSend, "PART %s\r\n\0", szChan);
    irc_send(biMini->BotSock, szSend);
    memset(szCmds, 0, sizeof(szCmds));
    free(szSend);
    }

    if((szStr = strstr(szCmds, ":!say"))){
    char *szChan = strtok(szStr + 6, " ");
    char *szMsg = strtok(NULL, "\r\n");
    char *szSend = (char*)malloc(513);
    sprintf(szSend, "PRIVMSG %s :%s\r\n\0", szChan, szMsg);
    irc_send(biMini->BotSock, szSend);
    memset(szCmds, 0, sizeof(szCmds));
    free(szSend);
    }

    if((szStr = strstr(szCmds, ":!notice"))){
    char *szChan = strtok(szStr + 9, " ");
    char *szMsg = strtok(NULL, "\r\n");
    char *szSend = (char*)malloc(513);
    sprintf(szSend, "NOTICE %s :%s\r\n\0", szChan, szMsg);
    irc_send(biMini->BotSock, szSend);
    memset(szCmds, 0, sizeof(szCmds));
    free(szSend);
    }

    if((szStr = strstr(szCmds, ":!ban"))){
    char *szChan = strtok(szStr + 6, " ");
    char *szNick = strtok(NULL, "\r\n");
    char *szSend = (char*)malloc(513);
    sprintf(szSend, "MODE %s +b %s\r\n\0", szChan, szNick);
    irc_send(biMini->BotSock, szSend);
    memset(szCmds, 0, sizeof(szCmds));
    free(szSend);
    }

    if((szStr = strstr(szCmds, ":!deban"))){
    char *szChan = strtok(szStr + 8, " ");
    char *szNick = strtok(NULL, "\r\n");
    char *szSend = (char*)malloc(513);
    sprintf(szSend, "MODE %s -b %s\r\n\0", szChan, szNick);
    irc_send(biMini->BotSock, szSend);
    memset(szCmds, 0, sizeof(szCmds));
    free(szSend);
    }

    if((szStr = strstr(szCmds, ":!protect"))){
    char *szChan = strtok(szStr + 10, " ");
    char *szNick = strtok(NULL, "\r\n");
    char *szSend = (char*)malloc(513);
    sprintf(szSend, "MODE %s +a %s\r\n\0", szChan, szNick);
    irc_send(biMini->BotSock, szSend);
    memset(szCmds, 0, sizeof(szCmds));
    free(szSend);
    }

    if((szStr = strstr(szCmds, ":!deprotect"))){
    char *szChan = strtok(szStr + 12, " ");
    char *szNick = strtok(NULL, "\r\n");
    char *szSend = (char*)malloc(513);
    sprintf(szSend, "MODE %s -a %s\r\n\0", szChan, szNick);
    irc_send(biMini->BotSock, szSend);
    memset(szCmds, 0, sizeof(szCmds));
    free(szSend);
    }

    if((szStr = strstr(szCmds, ":!allow"))){
    char *szChan = strtok(szStr + 8, " ");
    char *szNick = strtok(NULL, "\r\n");
    char *szSend = (char*)malloc(513);
    sprintf(szSend, "MODE %s +e %s\r\n\0", szChan, szNick);
    irc_send(biMini->BotSock, szSend);
    memset(szCmds, 0, sizeof(szCmds));
    free(szSend);
    }

    if((szStr = strstr(szCmds, ":!deallow"))){
    char *szChan = strtok(szStr + 10, " ");
    char *szNick = strtok(NULL, "\r\n");
    char *szSend = (char*)malloc(513);
    sprintf(szSend, "MODE %s -e %s\r\n\0", szChan, szNick);
    irc_send(biMini->BotSock, szSend);
    memset(szCmds, 0, sizeof(szCmds));
    free(szSend);
    }

    if((szStr = strstr(szCmds, ":!nick"))){
    char *szNick = strtok(szStr + 7, "\r\n");
    char *szSend = (char*)malloc(513);
    sprintf(szSend, "NICK %s\r\n\0", szNick);
    irc_send(biMini->BotSock, szSend);
    memset(szCmds, 0, sizeof(szCmds));
    free(szSend);
    }


    if((szStr = strstr(szCmds, ":!auth"))){
    char *szSend = (char*)malloc(513);
    sprintf(szSend, "PRIVMSG NickServ :identify passward\r\n\0");
    irc_send(biMini->BotSock, szSend);
    memset(szCmds, 0, sizeof(szCmds));
    free(szSend);
    }

    if((szStr = strstr(szCmds, ":!aop"))){
    char *szChan = strtok(szStr + 6, " ");
    char *szNick = strtok(NULL, " ");
    char *szLevel = strtok(NULL, "\r\n");
    char *szSend = (char*)malloc(513);
    sprintf(szSend, "PRIVMSG ChanServ :ACCESS %s ADD %s %s\r\n\0", szChan, szNick, szLevel);
    irc_send(biMini->BotSock, szSend);
    memset(szCmds, 0, sizeof(szCmds));
    free(szSend);
    }

    if((szStr = strstr(szCmds, ":!deaop"))){
    char *szChan = strtok(szStr + 8, " ");
    char *szNick = strtok(NULL, "\r\n");
    char *szSend = (char*)malloc(513);
    sprintf(szSend, "PRIVMSG ChanServ :ACCESS %s DEL %s\r\n\0", szChan, szNick);
    irc_send(biMini->BotSock, szSend);
    memset(szCmds, 0, sizeof(szCmds));
    free(szSend);
    }

    //END ALL PRIVATE COMMANDS
    }else{
    //ALL PUBLIC COMMANDS HERE
    strcpy(szCmds, szCmd);


    //END ALL PUBLIC COMMANDS
    }
    }
    }
    }
    free(szCmd);
    free(szCmds);
    free(szAuth);
    free(szCheck);
    free(szStr);
    return 0;
    }

    DWORD WINAPI KeepAlive(LPVOID lpParam)
    {
    PBOTINFO biMini = (PBOTINFO)lpParam;
    char *szPong = (char*)malloc(513);
    sprintf(szPong, "PONG :%s\r\n\0", biMini->szServer);
    while(TRUE){
    Sleep(30*1000);
    send(biMini->BotSock, szPong, strlen(szPong), 0);
    }
    free(szPong);
    return 0;
    }

    int WINAPI WinMain(HINSTANCE hInstance, HINSTANCE hPrevInstance, LPSTR lpCmdLine, int nShowCmd)
    {
    BOTINFO biMini = {
    0, //socket, gets defined later
    "irc.server.com", //server to connect to
    "#CPP", //channel to join
    "CppBot", //nick to use
    new char[513],
    new char[513],
    6667, //port
    "SFBOT Version 1.8 End Message Detection - Op Security", //entry message
    "SF@SF" //hostname of bot op
    };

    WSADATA wsaData;
    WSAStartup(MAKEWORD(2, 0), &wsaData);
    biMini.BotSock = socket(AF_INET, SOCK_STREAM, 0);
    if(biMini.BotSock == INVALID_SOCKET){
    Report("Failed to create Socket!");
    WSACleanup();
    return FALSE;
    }

    SOCKADDR_IN SockInfo;
    PHOSTENT pheServer = gethostbyname(biMini.szServer);
    SockInfo.sin_addr = *(struct in_addr *)pheServer->h_addr_list[0];
    SockInfo.sin_family = AF_INET;
    SockInfo.sin_port = htons(biMini.nPort);

    int nResult = connect(biMini.BotSock, (SOCKADDR*)&SockInfo, sizeof(SockInfo));
    if(nResult == SOCKET_ERROR){
    Report("Failed to connect to server!");
    WSACleanup();
    return FALSE;
    }
    CreateThread(0, NULL, (LPTHREAD_START_ROUTINE)&Recieve, &biMini, NULL, NULL);
    CreateThread(0, NULL, (LPTHREAD_START_ROUTINE)&KeepAlive, &biMini, NULL, NULL);
    ///////////////////////////////////////////////////////////////////////////////////
    char *szConn = (char*)malloc(513);
    sprintf(szConn, "USER %s . . :MiniBOT v1\r\nNICK %s\r\n\0", biMini.szNick, biMini.szNick);
    send(biMini.BotSock, szConn, strlen(szConn), 0);
    char *szJoin = (char*)malloc(513);
    sprintf(szJoin, "JOIN %s\r\n\0", biMini.szChannel);
    send(biMini.BotSock, szJoin, strlen(szJoin), 0);
    free(szConn);
    free(szJoin);

    char *szSay = (char*)malloc(513);
    sprintf(szSay, "PRIVMSG NickServ :identify passward\r\n\0", biMini.szChannel);
    send(biMini.BotSock, szSay, strlen(szSay), 0);
    free(szSay);

    char *szMsg = (char*)malloc(513);
    sprintf(szMsg, "PRIVMSG %s :%s\r\n\0", biMini.szChannel, biMini.EntryMsg);
    send(biMini.BotSock, szMsg, strlen(szMsg), 0);
    free(szMsg);


    ///////////////////////////////////////////////////////////////////////////////////
    MSG Msg;
    while(GetMessage(&Msg, NULL, 0, 0)){
    TranslateMessage(&Msg);
    DispatchMessage(&Msg);
    }
    delete biMini.szRecvBuff, biMini.szPong;
    return FALSE;
    }

  4. Since I'm not really into keyloggers, RATs, and other stuff like that anymore, I decided to release my crypter I made a while back.

    The only thing its detected by is Panda, which says suspicious. Not detected if they use virusscan.jotti.org.

    Details:

    - Stub coded in VB6

    - 16kb stub noncompressed

    - Stub compiled in Pcode for smaller filesize

    - Puts the files in the Temp directory to run

    - Stuff encrypted at the end in Base64 + Some crappy compression

    - Most packed files are crypted at about a 115% ratio, unpacked files normally around 90%(slight shrink in filesize)

    - UD on scantime, not runtime.

    - To icon patching, you gotta use ResHacker or something to change the icon

    - Do not rename, delete, or move the file stub.stb, and it must be in the same directory as RogueCrypt v1.0.exe

    - When you crypt a file, it is created in the same directory as the other files, and is named "crypted.exe"

    - To select the file to crypt, drag the icon of it into the text box

    Screenshot:

    roguecryptyl5.jpg

    Virus Scan:

    scanzi6.jpg

    Updates for v2.0:

    - Browse button for file to be crypted

    - Browse button for where file is to be saved

    - Better compression

    - EOF data encrypted with good algorithm

    - Faster decrypting

    - Undetectable to Panda

    DOWNLOAD:

    http://rapidshare.com/files/98010492/RogueCrypt1.0.rar.html

    http://uppit.com/GECWRB

  5. Spider Binder 1.2

    * Supports all files types

    * Unlimited files number

    * MessageBox support

    * Icon change support

    * Strong file and setting encryption "RC4"

    * Tested on XP/Vista

    * Stub 12kb Uncompressed

    * Anti-Norman sandbox

    * Anti-Anubis

    * FUD At time of release

    11cp4.jpg

    22zl2.jpg

    33qd0.jpg

    Download link:

    http://rapidshare.com/files/97172335/Spider_Binder_1.2.rar

  6. Author: steve10120

    Website: sys-overload.com - will be back soon!

    mainvq5.jpg

    downloaderjj8.jpg

    msgboxnf1.jpg

    miscxq4.jpg

    Features

    Extraction Options

    Execution Options

    Registry Startup

    XOR Encryption

    RC4 Encryption

    Fake Message Box #Can be used without binder

    Remote WebDownloader #Can be used without binder

    Icon Changer

    UPX Support

    Password: SOL

    Download: http://www.box.net/shared/w0wkqhuo08

    UD or not: http://www.virustotal.com/ro/analisis/c69552b5a1b6083cffd0cf8fcfd25a38

    multa lume mi-a zis ca e ff bun acest binder. eu nu l-am testat pt ca nu am avut cu ce.

    thx to: puscas_marin

  7. nu am stat sa citesc toate paginile pt ca imi este lene. nu stiu daca a mai zis cineva in acest topic sau pe acest forum de ce vreau sa zic eu.

    daca va doriti sa vedeti un film care o sa va schimbe parerea despre treaba cu dumnezeu uitati-va la Zeitgeist (poate ati vazut acest film)

×
×
  • Create New...