Jump to content

Sweby

Active Members
  • Posts

    447
  • Joined

  • Last visited

  • Days Won

    1

Everything posted by Sweby

  1. Sweby

    Fun stuff

    Timesnewroman.ro - Cotidian independent de umor voluntar - Scandal sexual f?r? precedent la Politehnic?! Student la Calculatoare, b?nuit c? ar fi f?cut sex
  2. Speciali?tii Bitdefender au urm?rit virusul ICEPOL, cunoscut sub denumirea de Poli?ia Român?, ?i au descoperit c? acesta a fost instalat cu succes pe mai mult de un sfert de milioane de calculatoare, dintre care 8.881 erau localizate în România. Serverul localizat în Bucure?ti a fost identificat ?i dezafectat de Inspectoratul General al Poli?iei Române, iar informa?iile extrase au fost incluse într-un program de colaborare tehnic? la care au participat echipe din Poli?ie ?i Bitdefender. Investiga?ia, derulat? între 1 mai ?i 26 septembrie 2013 arat? c? virusul ICEPOL a fost instalat cu succes pe 267.786 de calculatoare, se arat? în comunicatul remis „Adev?rul“. Suma total? ob?inut? de escroci în perioada studiat? se ridic? la 158.376 de unit??i monetare – cel mai probabil dolari americani. Cei mai mul?i bani au provenit din Statele Unite ale Americii – 32.176 de dolari, iar din România câ?tigurile s-au ridicat la aproximativ 2.500 de dolari. „Investiga?ia privind serverul de comand? ?i control, localizat în Bucure?ti, este una complex?. Activit??ile investigative vizeaz? identificarea ?i înl?turarea unor astfel de servere folosite pentru distribuirea de viru?i informatici, precum cel intitulat ICEPOL/RANSOMWARE“, a declarat ?eful Serviciului de Combatere a Criminalit??ii Informatice din cadrul Inspectoratului General al Poli?iei Române. Mecanismul de generare de venituri: Serverul de comand? ?i control (C&C) localizat în România face parte dintr-o re?ea mai ampl? de servere ce distribuie virusul ICEPOL ?i care poate ajunge la câteva zeci de astfel de centre de C&C la nivel global. Cel din România comunica ini?ial cu un server localizat în Olanda, închis în vara trecut? de autorit??ile olandeze. Ulterior locul acestuia a fost luat de un altul, aflat în Germania. Banii erau genera?i prin dou? mecanisme: Prin livrarea soft-ului periculos pe calculatoarele utilizatorilor ?i solicitarea unei recompense în schimbul debloc?rii sistemelor Prin campanii de tipul pay per click prin care hackerii generau în mod automat trafic pentru anumite site-uri „Lumea criminalit??ii informatice pare a fi dezvoltat re?ele de distribu?ie a viru?ilor care func?ioneaz? la fel ca re?elele legitime de livrare de con?inut, inclusiv la nivelul schemelor de distribu?ie ?i de producere a banilor“, a declarat C?t?lin Co?oi, Chief Security Strategist, Bitdefender. Componenta responsabil? de înregistrare a domeniilor de distribu?ie a soft-ului periculos, numit? xstats, genera nume de domeniu la cerere, prin înl?n?uirea a patru cuvinte dintr-un dic?ionar care con?inea 551 de cuvinte cu semnifica?ie pornografic?. Adresa IP a noii gazde a fost aleas? dintr-o list? de 45 de adrese de IP-uri unice. Noul nume de domeniu a fost înregistrat automat de un script. Metoda distribu?iei de malware sugereaz? o schem? de tip piramidal, întrucât serverul analizat de noi desc?rca fi?iere cu malware dintr-un alt domeniu, dar func?iona în sine ca un domeniu de download de viru?i pentru un num?r de sub-afilia?i. Odat? desc?rcat de c?tre ace?tia, virusul era publicat pentru download pe un site pornografic fals, pe o pagin? fals? de actualizare a Flash Player sau pe o pagin? de antivirus fals?. Aceasta din urm? afi?a un mesaj care pretindea c? pe calculatorul victimei s-ar fi g?sit un num?r mare de fi?iere infectate, toate g?zduite pe domeniile vizitate anterior de utilizator. Paginile puteau fi accesate de oriunde de pe internet, iar în perioada analizat? serverul a înregistrat 267.786 de instal?ri încheiate cu succes a virusului ICEPOL. Distribu?ia geografic? a desc?rc?rilor indic? faptul c? cele mai multe dintre ele au avut loc în SUA: Modulul de tip pay per click, denumit tds, direc?ioneaz? traficul c?tre o list? de domenii – cel mai probabil cump?r?tori de reclame pl?tite - sau c?tre alte site-uri de distribu?ie a virusului. Traficul este redirectat în conformitate cu o list? definit? de administrator ?i în func?ie de un set de reguli de filtrare, printre care ?ara de origine, sistemul de operare, tipul de browser sau num?rul maxim de click-uri permis. Sumele furate prin cele dou? mecanisme de lucru sunt, de asemenea, listate în func?ie de ?ar? pe serverul capturat, iar suma total? pentru perioada studiat? se ridic? la 158.376 unit??i monetare – cel mai probabil dolari americani. Cei mai mul?i bani proveneau din Statele Unite – 32.176 de dolari. Sursa: http://adevarul.ro/tech/internet/virusul-politia-romana-gazduit-bucuresti-le-a-adus-hackerilor-150000-dolari-intreaga-lume-1_52e77517c7b855ff56dd9f92/index.html
  3. A mai fost: https://rstforums.com/forum/39816-sql-primaria-bucuresti.rst https://rstforums.com/forum/71934-sqli-pmb-ro.rst
  4. Daca incerci sa te loghezi de pe index si iti gresesti numele/parola, te redirectioneaza pe o pagina unde ai sus optiunea de a te loga, dar nu functioneaza: Parola se afiseaza in plain + nu merge chiar daca introduci datele corecte. Not a big deal, but...
  5. Daca iar ti-ai propus sa umpli indexul cu topicul tau, sa stii ca-ti merge bine...
  6. -http://campion.edu.ro/arhiva/ -http://www.infoarena.ro/ Intri pe astea 2 si rezolvi multe probleme. Gasesti pe acolo si informatii folositoare despre anumiti algoritmi si etc. Pe langa astea, bineinteles, si cartile te pot ajuta.
  7. The official website of the Nationalist Movement, a white supremacist organization based in Mississippi, was defaced by “Anonymous” hackers on Friday afternoon. The home page of the website, nationalist.org, was replaced with a message condemning facism and white power groups. The rest of the website appeared to be functioning normally. “Greetings, fellow Anons and Citizens of the world. It has come to our attention that Fascists and white power groups across the world are causing the spread of hate and ignorance,” the message read. “A spectre is haunting the Earth, the spectre of Facism [sic]. “For long, we have seen the damage caused by the ideology of white supremacy. We have seen, and participated in, many decades of resistance to white supremacy. We, and others, will never stop fighting fascism and racism wherever it rears its head.” The Nationalist Movement has held multiple marches on Martin Luther King Jr. Day throughout the years to protest the federal holiday honoring the slain civil rights leader. The group won a legal battle in 1992 when the Supreme Court ruled local governments could not impose fees to prevent them from holding demonstrations on public property. Source: ‘Anonymous’ hackers deface Mississippi-based white pride website with anti-fascist message | The Raw Story Indexul inca nu a fost restaurat: http://nationalist.org/
  8. Sweby

    Fun stuff

    Andrew Frey: Oregon man high on meth fights 15 police officers 'while masturbating in bar' | Metro News
  9. WikiLeaks founder Julian Assange addressed a major gathering of computer experts Monday at the Chaos Communication Congress in Hamburg, Germany, calling on them to join forces in resisting government intrusions on Internet freedom and privacy. We play highlights from Assange’s speech, as well as the one given by Sarah Harrison, the WikiLeaks member who accompanied Edward Snowden to Russia. We also hear from independent journalist and security expert Jacob Appelbaum, who reveals a spying tool used by the National Security Agency known as a "portable continuous wave generator." The remote-controlled device works in tandem with tiny electronic implants to bounce invisible waves of energy off keyboards and monitors to see what is being typed. It works even if the target computer is not connected to the Internet. TRANSCRIPT This is a rush transcript. Copy may not be in its final form. AMY GOODMAN: We turn now to the Chaos Communication Congress, or CCC, in Hamburg, Germany. One of the speakers at the conference was WikiLeaks’ Sarah Harrison, who accompanied Edward Snowden to Russia and spent four months with him. Harrison addressed the audience after receiving a long standing ovation. SARAH HARRISON: Together with the Center for Constitutional Rights, we filed a suit against the U.S. military, against the unprecedented secrecy applied to Chelsea Manning’s trial. Yet through these attacks, we have continued our publishing work. In April of this year, we launched the Public Library of US Diplomacy, the largest and most comprehensive searchable database of U.S. diplomatic cables in the world. This coincided with our release of 1.7 million U.S. cables from the Kissinger period. We launched our third Spy Files, 249 documents from 92 global intelligence contractors, exposing their technology, methods and contracts. We completed releasing the Global Intelligence Files, over five million emails from U.S. intelligence firm Stratfor, the revelations from which included documenting their spying on activists around the globe. We published the primary negotiating positions for 14 countries of the Trans-Pacific Partnership, a new international legal regime that would control 40 percent of the world’s GDP. As well as getting Snowden asylum, we set up Mr. Snowden’s defense fund, part of a broader endeavor, the Journalistic Source Protection Defence Fund, which aims to protect and fund sources in trouble. This will be an important fund for future sources, especially when we look at the U.S. crackdown on whistleblowers like Snowden and alleged WikiLeaks source Chelsea Manning, who was sentenced this year to 35 years in prison, and another alleged WikiLeaks source, Jeremy Hammond, who was sentenced to 10 years in prison this November. These men, Snowden, Manning and Hammond, are prime examples of a politicized youth who have grown up with a free Internet and want to keep it that way. It is this class of people that we are here to discuss this evening, the powers they and we all have and can have. AMY GOODMAN: WikiLeaks founder Julian Assange also addressed the Chaos Communication Congress via video. Speaking from the Ecuadorean embassy in London, Assange urged information technology specialists to join forces to resist government encroachments on Internet freedom. JULIAN ASSANGE: Those high-tech workers, we are a particular class, and it’s time that we recognized that we are a class and looked back in history and understood that the great gains in human rights and education and so on that were gained through powerful industrial work as we formed the backbone of the economy of the 20th century, I think we have that same ability, but even more so, because of the greater interconnection that exists now, economically and politically, which is all underpinned by system administrators. And we should understand that system administrators are not just those people who administer one unique system or another; they are the people who administer systems. And the system that exists globally now is created by the interconnection of many individual systems. And we are all, or many of us, are part of administering that system, and have extraordinary power, in a way that is really an order of magnitude different to the power industrial workers had back in the 20th century. And we can see that in the cases of the famous leaks that WikiLeaks has done or the recent Edward Snowden revelations, that it’s possible now for even a single system administrator to have a very significant change to the—or rather, apply a very significant constraint, a constructive constraint, to the behavior of these organizations, not merely wrecking or disabling them, not merely going out on strikes to change policy, but rather shifting information from an information apartheid system, which we’re developing, from those with extraordinary power and extraordinary information, into the knowledge commons, where it can be used to—not only as a disciplining force, but it can be used to construct and understand the new world that we’re entering into. Now, Hayden, the former director of the CIA and NSA, is terrified of this. In Cypherpunks, we called for this directly last year. But to give you an interesting quote from Hayden, possibly following up on those words of mine and others: "We need to recruit from Snowden’s generation," says Hayden. "We need to recruit from this group because they have the skills that we require. So the challenge is how to recruit this talent while also protecting ourselves from the small fraction of the population that has this romantic attachment to absolute transparency at all costs." And that’s us, right? So, what we need to do is spread that message and go into all those organizations—in fact, deal with them. I’m not saying don’t join the CIA. No, go and join the CIA. Go in there. Go into the ballpark and get the ball and bring it out—with the understanding, with the paranoia, that all those organizations will be infiltrated by this generation, by an ideology that is spread across the Internet. And every young person is educated on the Internet. There will be no person that has not been exposed to this ideology of transparency and understanding of wanting to keep the Internet, which we were born into, free. This is the last free generation. The coming together of the systems of governments, the new information apartheid across the world, the linking together, is such that none of us will be able to escape it in just a decade. Our identities will be coupled to it, the information sharing such that none of us will be able to escape it. We are all becoming part of the state, whether we like it or not, so our only hope is to determine what sort of state it is that we are going to become part of. And we can do that by looking and being inspired by some of the actions that produced human rights and free education and so on, by people recognizing that they were part of the state, recognizing their own power, and taking concrete and robust action to make sure they lived in the sort of society that they wanted to, and not in a hellhole dystopia. AMY GOODMAN: WikiLeaks founder Julian Assange addressing the Chaos Communication Congress that’s taking place in Hamburg, Germany. He, of course, was speaking from the Ecuadorean embassy in London. He fears if he steps foot outside that embassy, where he’s been for a year, that he will be arrested by British authorities, that he would be extradited to Sweden, and he most fears being extradited to the United States. Another key speaker Monday was independent journalist and security expert Jacob Appelbaum, who has been on Democracy Now! In this clip, he shows a slide with a futuristic-sounding device described as a portable continuous wave generator. It’s a remote-controlled device that works in tandem with tiny electronic implants to bounce invisible waves of energy off keyboards and monitors to see what’s being typed. It works even if the target device isn’t connected to the Internet. JACOB APPELBAUM: This is a continuous wave generator or continuous wave radar unit. You can detect its use because it’s used between one and two gigahertz, and its bandwidth is up to 45 megahertz, user-adjustable, two watts. Using an internal amplifier, external amplifier, makes it possible to go up to one kilowatt. I’m just going to let you take that in for a moment. Who’s crazy now? Now, I’m being told I only have one minute, so I’m going to have to go a little bit quicker. I’m sorry. Here’s why they do it. This is an implant called RAGEMASTER, part of the angry neighbor family of tools, where they have a small device that they put in line with a cable in your monitor, and then they use this radar system to bounce a signal—this is not unlike the Great Seal bug that [Léon] Theremin designed for the KGB—so it’s good to know we’ve finally caught up with the KGB—but now with computers. They send the microwave transmission, the continuous wave. It reflects off of this chip, and then they use this device to see your monitor. Yep. So there’s the full life cycle. First they radiate you, then you die from cancer, then you win? OK, so, here’s the same thing, but this time for keyboards, USB and PS/2 keyboards. So, the idea is that it’s a data retro-reflector. Here’s another thing, but this one, the TAWDRYYARD program, is a little bit different. It’s a beacon. So this is where, probably, then they kill you with a drone. That’s pretty scary stuff. They also have this for microphones to gather room bugs, for room audio. Notice the bottom. It says all components are common off the shelf and are so non-attributable to the NSA—unless you have this photograph and the product sheet. AMY GOODMAN: That was independent journalist and security expert Jacob Appelbaum speaking in Hamburg, Germany, at the Chaos Communication Congress. We will link to his full speech at democracynow.org. This is Democracy Now! And an update right now on the story in Egypt: One of the four Al Jazeera reporters has been released. Al Jazeera cameraman Mohamed Fawzy was released from detention. The three other journalists remain detained—correspondent Peter Greste and producers Mohamed Fahmy and Baher Mohamed. This is Democracy Now! When we come back, what’s some of the good news of 2013? Stay with us. Sursa: WikiLeaks’ Julian Assange Calls on Computer Hackers to Unite Against NSA Surveillance | Democracy Now!
  10. Functioneaza si pe versiunea in engleza. Ty, nice share!
  11. 1. Sa am acces la sectiunea vip (duhh). 2. C++/Jquery/PHP/Javascript medii. 3. 17... Aproape
  12. Da-i asta: Tricouri - funny Tricouri personalizate , AM FACUT 18 ABIA ASTEPT SA FAC 69 Daca o sa primeasca un 69 iti va ramane recunoscator .
  13. Sweby

    [xss] ibm

    Am raportat si eu acum vreo 6 luni un xss la ei. Am si uitat de el. Azi vad ca e reparat desi nu mi-au raspuns la mail. Bulangii .
  14. Am observat ca pentru afisare folositi printf. M-am lovit si eu de multe ori de acest printf cand citeam tutoriale pe net, insa am ales sa raman la cout<< pentru ca asa m-am obisnuit de la scoala. Din cate am citit pe net, diferenta ar fi ca cout e mai sigur insa se misca putin mai greu ca printf. Voi ce folositi de obicei? De ce? De ce nu folositi cealalta metoda?
  15. Pamantul de unde a rezultat?
  16. Ceva imi spune ca retii toti vectorii pe care ii folosim .
×
×
  • Create New...