-
Posts
1140 -
Joined
-
Last visited
-
Days Won
3
Everything posted by qbert
-
Va mananca nea pricop.
-
Un pinger inclus ar fi binevenit.
-
ZZ Top - Blue Jeans Blues
-
Pica-mi-ar in gradina!
-
Era misto wap unlimited:)In orice caz,am un sim orange de vreo 6-7 ani,de cand era dialog,mereu am fost multumit.
-
Imperva's Hacker Intelligence Initiative has put out a 4th report. This time, our focus is SQL injection. The report is available here (no registration required). As we have written before, SQL injection is the most pernicious vulnerability in human computer history. From 2005 through today, SQLinjection has been responsible for 83% of successful hacking-related data breaches. Using data from Privacyrights.org, we checked the data breaches from 2005 to today. There were 312,437,487 data records lost due to hacking with about 262 million records from various breaches including TJMax, RockYou and Heartland, all of which were SQL injection attacks. We found, since July, the observed Web applications suffered on average 71 SQLi attempts an hour. Specific applications were occasionally under aggressive attacks and at their peak, were attacked 800-1300 times per hour. We also found: Attackers increasingly bypass simple defenses. Hackers are using new SQLi attack variants which allow the evasion of simple signature-based defense mechanisms. Hackers use readily available automated hacking tools. While the attack techniques are constantly evolving, carrying out the attack does not necessarily require any particular hacking knowledge. Common attack tools include Sqlmap and Havij. Attackers use compromised machines to disguise their identity as well as increase their attack power via automation. To automate the process of attack, attackers use a distributed network of compromised hosts. These “zombies” are used in an interchangeable manner in order to defeat black-listing defense mechanisms. About 41% of all SQLi attacks originated from just 10 hosts. Again, we see a pattern where a small number ofsources are responsible for a majority of attacks. Sursa: http://blog.imperva.com/2011/09/sql-injection-by-the-numbers.html
-
Da-ne adresa si venim cu echipa peste el.
-
+ Si pe pisi pe el de kent:)Ah,si eventual+
- 15 replies
-
- kent 8
- kent 8 hd lung
-
(and 1 more)
Tagged with:
-
Vezi ca sunt niste teme portofolio misto pe wp.Gen Best Portfolio / Photo Gallery WordPress Themes sau 21 Free Photo Gallery And Portfolio WordPress Themes | DeMilked
-
BWhahahhahahhaHHAH,inchideti in pula mea topicu.
-
Eu cred ca tu ai nevoie de niste atentie.Daca ai venit pe forum,probabil ai venit sa acumulezi niste cunostinte,nu sa purtam discutii in legatura cu moralitatea misoginismului sau sa schimbam regulamentul,in sfarsit,ceea ce voiam sa spun este ca daca intradevar doreai sa inveti ceva,nici macar nu spuneai ca esti fata,stiai ce te asteapta.
-
DefCamp 2011 - prima conferinta de securitate din Romania
qbert replied to Andrei's topic in Anunturi importante
Se pare ca ne vedem acolo. -
Acum cativa ani(cand avea orange wap unlimited) erau pe telefoane chiar si streamuri tv,insa acum au restrictionat accesul la ele daca nu ai 3g.
-
Esti un fel de mitnick.
-
Ofer MuzicaHi5.com | Introdu muzica cu autoplay pe hi5 ,domeniul expira pe 2011-10-19 17:20:04 ,adica peste vre-o luna si e luat de la ipvhost.Site-ul e pus pe 000webhost si e bazat pe wp,are in jur de 200/300/400 unici/day.Domeniul are page rank 2.Daca vreti si credeti ca puteti sa faceti ceva cu el,adica sa prelungiti domeniul si sa va mai ocupati de el,vi-l dau.Eu nu mai am timpul si cheful necesar sa ma ocup de el. [EDIT:] S-a dat.
-
Nu am mai jucat de ani de zile,de cand rupeam brood si h3 in net cafe.Cum zicea si demon,un link pentru versiunea online.
-
Nu cred in conceptul de patriotism,ba dimpotriva,cred ca conduce daca nu la razboi(asta pana ajunge prodil la presedentie),cu siguranta la drame.
-
Pixies - Where is my Mind (Fight Club Soundtrack)
-
The 1 Flash Gallery WordPress plugin is vulnerable to an arbitrary file upload vulnerability. This vulnerability is present from version 1.30 until version 1.5.7. It is possible to plant a remote shell and thereby execute arbitrary code on the remote host by simply submitting a PHP file via POST request to the following URI on a vulnerable installation: /wp-content/plugins/1-flash-gallery/upload.php?action=uploadify&fileext=php This works because the upload.php script a.) performs no authentication checks, b.) trusts a user-supplied request variable to provide allowed filetypes, and c.) does not actually validate that the file is a well-formed image file. I have only tested the vulnerability on an installation that does not perform watermarking, the default setting; it may or may not work on installations that do otherwise. I have created a proof-of-concept Metasploit module demonstrating the vulnerability, which interested persons can download here: http://spareclockcycles.org/downloads/code/fgallery_file_upload.rb Hosts can be found with the following Google search: inurl:"wp-content/plugins/1-flash-gallery" Sursa: 1 Flash Gallery: Arbitrary File Upload « Spare Clock Cycles
-
Nu cred ca se baga sa hosteze chestii nasoale.Poate ceva books.rstcenter.com?
-
Voi le faceti vedete prin faptul ca le ascultati/injurati/criticati.