-
Posts
387 -
Joined
-
Last visited
-
Days Won
4
Everything posted by Ne0h
-
As vrea daca se poate un magazin real,nu online shop deoarece nu am incredere in comenzi online.
-
Buna ziua tuturor. Am decis de curand sa cumpar un Samsung Omnia Hd. Dar am o problema,nu il gasesc pe nicaieri. Are cineva idee daca este in romania si daca da unde se poate cumpara? Multumesc frumos.
-
Se pare ca acest personaj a fost iar hackuit vedeti mai multe pe site Untitled
-
Blog-ul este din nou deschis. Au fost probleme cu host-ul dar le-am rezolvat. Va astept pe Center World Security - Welcome to CW-Security cu comentarii legat de XSS-ul din Kiss Fm.
-
Ba da,el este.
-
In primul rand vreau sa il felicit pe TinKode. In al 2 lea rand,multa lume spune ca este fals,acesta este opinia mea ca nu este: 1.Se stie de mult timp NASA a fost spart de multe ori de catre romani,deci nu este ceva imposibil. 2. SQLi in nasa a gasit si Unu,deci iar este adevarat ca NASA sunt slabi in fata Hackerilor romani. 3. Multe din subdomeniile nasa au XSS,Iframe si acum au si SQLi. Aceasta este parerea mea.
-
TinKode,mai mare dreptate nu puteam sa iti zic,daca acelei persoane ii spui ca nu exista Mos Craciun o sa il vedem la stirile ProTV de la ora 5,cu titlul "Inca un copil EMO sa sinucis".
-
L-am facut,pui fisierul AirCrack-PSP in fisierul Game105 sau ceva de genul,oricum este un fisier deja facut in psp si atata tot.Mie unu imi functioneaza foarte bine pe PSP.
-
Ok.Multumesc frumos pentru ajutor.
-
Multumesc frumos,o intrebar as mai avea daca nu sunt nesimtit,cum se instealaeaza pe PSP?Se pune ca la jocuri in fisierul ISO?
-
Pai prin post-ul acesta nu era o versiune si pentru PSP?Acela m-ar interesa.
-
Salut,acest link http://filetransfer.ro/uploads/326780_AirCrack_PSP_0.573980.rar nu mai functioneaza,poti sa ii faci upload iar?Mersi frumos.
-
Nu este nimic mister,din moment ce nu cunosc deloc PS si normal ca te-ai exprimat asa. @ TinKode foarte frumos domnule lucrarea in PS.
-
Sincer sa fiu,nu mai am sa mai invat PS si apoi am sa mai postez.Sper sa ma iertati domnule demon_zone pentru acest Wallpaper.
-
Dupa cum am spus,accept orice fel de comentariu si sa iti explic ce ar fi trebuit sa insemne "opera" aceasta,acea palarie ar fi trebuit sa reprezinte white hacking-ul,cel etic cat despre text chiar si mie mi sa parut ca nu se potriveste sincer sa fiu .Dar nimeni nu este perfect si pana am sa mai invat asta e.
-
Inteleg,multumesc pentru sfat tot ajutorul dumneavoastra sper sa imi intre in cap ca sa nu mai fac astfel de imagini "horror".
-
Dupa cum am spus,sunt incepator,foarte incepator asa ca nu ma astept la comentarii ok,dar un sfat puteti sa imi dati asta daca nu deranjez prea mult.
-
Sincer sa fiu,chiar nu vreau sa fac reclama,dar din moment ce nu fac parte din Staff-ul RST nu imi permit sa fac wallpaper cu el.
-
Buna seara. In primul rand vreau sa va salut pe toti. Dupa cum vedeti,astazi am incercat si eu pentru prima oara Photoshop,deoarece nu sunt un expert ca altii de pe RST doresc niste comentarii si rele si bune. Sper sa nu va speriati chiar asa de rau.
-
A security researcher has exposed a vulnerable Yahoo Web service that has been abused by spammers to enumerate valid Yahoo! IDs or brute-force login credentials for years. The attacks are possible because the company failed to apply the same security checks to the API as it did to the webmail interface. Ryan Barnett, the director of application security research at Breach Security, has detected the intriguing brute force during his work as leader of the Web Application Security Consortium’s (WASC) Distributed Open Proxy Honeypot Project. This project allows researchers to monitor attacks that make use of open proxies by deploying a few rogue ones under their control. Using a single one of these sensors, the “WASC DOPHP has identified a large scale distributed brute force attack against what seems to be a web services authentication systems aimed at ISP or partner web applications,” Barnett warns. The targeted authentication system is deployed across many Yahoo! servers and can be located by doing a special Google search. According to the researcher, there are a few components that make these attacks possible and/or successful. First of all, this system doesn’t seem to count or limit the number of retries, but, even if it did, the attackers are using methods to bypass detection anyway. These techniques involve distributing requests through multiple open proxies, targeting the vulnerable API hosted on multiple Yahoo! servers, as well as submitting different user/password combinations on every attempt in order to thwart tracking attempts. Furthermore, unlike the webmail authentication page that, on a failed login attempt, responds by saying that the username or password were incorrect, this service reveals exactly which of them was bogus. Using this design flaw, attackers are able to enumerate valid usernames by trying strings from huge lists and watching how the API responds. The collected usernames can be sold to spammers or used for password brute-forcing, which is apparently not hard to do via this system either. The regular webmail interface will introduce a CAPCTHA validation after a preset number of failed login attempts is reached, a security mechanism that the API lacks. Compromised Yahoo! accounts can be a gold mine for spammers, because e-mail traffic originating from Yahoo’s webmail is generally not filtered by ISPs. According to Barnett, this flaw is not new and has been reported to Yahoo! since at least one year ago. Other security researchers note that Yahoo! is not alone in this mess and that other websites providing APIs, such as most social networks, are exposed to similar attacks. “We are investigating the situation and will take appropriate action,” a Yahoo! spokesperson told The Register. Source: Free Downloads Encyclopedia - Softpedia
-
Cel mai inteligent (1337) user: Nemessis,Kw3rln,Fitty,unu_1234567
-
Ok,daca am gresit imi cer scuze din nou. Nu am vrut sa supar pe nimeni.
-
[ - Copyright © 2009 Ne0h & Rashid - ] [ - Acest script creat de Rashid - ] [ - www.CW-Security.Ro -] Acesta este un readme, citiste-l, baga-l la cap dupa care inchide fisierul si script-ul o ia automat. Se executa in terminal cu comanda "sh verlihub.sh" Script-ul contine: - Verlihub http://www.verlihub-project.org/download/verlihub-0.9.8e-r2.tar.bz2 - GeoIP-1.4.3 http://geolite.maxmind.com/download/geoip/api/c/GeoIP-1.4.3.tar.gz - Lua 1.8.1 http://www.verlihub-project.org/download/lua-1.8.1.tar.gz - Forbid 1.3 Download VerliHub from SourceForge.net Script-ul este proiectat sa va compileze si sa va instaleze tot ce aveti nevoie INSA la MySQL trebuie setata manual parola, doar nu stiu eu ce e in capul tuturor Dupa ce script-ul isi va termina "misiunea" scrieti in terminal asa: mysqladmin -u root password NOUAPAROLA Doar atat trebuie sa faceti la MySQL.. La verlihub insa mai trebuie sa va instalati manual configuratia hub-ului, evident executata prin comanda "vh_install" in terminal.. Mai jos e un model: [root@fast-link anthraxr]# vh_install -------------------------------- Your name ? (anthraxr) Hello anthraxr, let's start with configuration of database access.. -------------------------------- mysql database for verlihub will be called? (verlihub) verlihub mysql user to access verlihub gonna be? (verlihub) verlihub password to access verlihub be? (1253569397) mysql server will run where? (localhost) -------------------------------- user = verlihub password = 1253569397 host = localhost database = verlihub -------------------------------- This database account cannot be accessed -------------------------------- Is this info correct ? (Y/N)y Do you want to create database now? (Y/N)y -------------------------------- Ok preparing mysql.. You probably need administrator access to mysql database mysql administrator username? (root) -------------------------------- You'll be now promted by mysql client for password of root@localhost Enter password: -------------------------------- This database account exists -------------------------------- -------------------------------- anthraxr, you need to choos a place for the configuration files -------------------------------- The order of folder that verlihub is looking for is following: 1 - variable $VERLIHUB_CFG - -inexisting- 2 - ./.verlihub - /home/anthraxr/.verlihub -inexisting- 3 - /root/.verlihub - /root/.verlihub -inexisting- 4 - /usr/local/etc/verlihub - /usr/local/etc/verlihub -inexisting- 5 - /etc/verlihub - /etc/verlihub drwxr-xr-x. if two or more of these exist, lower number has priority -------------------------------- -------------------------------- what is will be the configuration folder ? (/etc/verlihub) /etc/verlihub The config folder /etc/verlihub does not exist and would be created -------------------------------- Do you want to continue with these settings (if not then select another folder) ? (Y/N)y -------------------------------- Written: /etc/verlihub/dbconfig -------------------------------- Wait few seconds.. /usr/local/bin/vh_install: line 87: 24758 Aborted VERLIHUB_CFG=$cfg_dir $bindir/verlihub 22 &>$cfg_dir/install_log -------------------------------- anthraxr, now I will ask you few more questions about your future hub, if you permit.. -------------------------------- Try to not put many special characters, you'll be able to put some later Give me your DC hub master nickname.. ([sU]anthraxr) Choose your password.. (1253570803) Which will be default ONE hub port number? (411) What will be your hub hostname? (fast-link) Give me the name of your hub (hub of anthraxr) -------------------------------- Hub: 'hub of anthraxr' url: 'dchub://fast-link:4111' Master user: '[sU]anthraxr' Master's password: '1253570803' -------------------------------- Is this info correct ? (Y/N)y FYI: settings are going to be created or updated /etc/verlihub /etc/verlihub /etc/verlihub will invoke the command class is 10 nick is [sU]anthraxr password is 1253570803 done [root@fast-link anthraxr]# De aici poti descarca script-ul: RapidShare: 1-CLICK Web hosting - Easy Filehosting