Jump to content

hozarares

Active Members
  • Posts

    381
  • Joined

  • Last visited

  • Days Won

    1

Everything posted by hozarares

  1. Da cine ti`o zis ? Spune`ne si nou ca sa ne ferim de acei indivizi malefici
  2. Ho ma .... de unde sa stiu ca RST si ISR is in conflict ? Stau sa vad amu care pe care....? Io am capatat programu` de la cineva ...
  3. Poate a mai fost pus, poate nu; nu am stat sa`l caut. Asta este versiunea 02 al Stealer`ului celor de la ISR, made by BUNNN. No`...l`am pus iara` linku` Descarca http://www.megaupload.com/?d=T3UDEPXZ
  4. PuzlBox is a PHP fuzz tool that scans for several different vulnerabilities by performing dynamic program analysis. It can detect arbitrary command execution, local file inclusion, arbitrary upload, and several other types of vulnerabilities. In all, it can detect the following: Arbitrary Command Execution Arbitrary PHP Execution Local File Inclusion Arbitrary File Read/Write/Change/Rename/DeleteSQL Injection Reflected Cross-site Scripting Usage:PuzlBox must be run as administrator! puzlbox [-s Server (default localhost)] [-m Scan Modes (default CFLPSX)] [Absolute Web Root] [-n No Unhook] [Application Paths (comma delimited)] Modes:C – Arbitrary Command ExecutionF – Arbitrary File Read/Write/Change/Rename/DeleteL – Local File InclusionP – Arbitrary PHP ExecutionS – SQL InjectionX – Reflected Cross-site Scripting Exemples: 1 puzlbox c:\xampp\htdocs MyApp Runs all scans on MyApp, located in web root c:\xampp\htdocsview sourceprint? 1 puzlbox -m CX c:\xampp\htdocs MyApp1,MyApp2 1 puzlbox -m CX c:\xampp\htdocs MyApp1,MyApp2 Runs Arbitrary Command Execution and Reflected Cross-site Scripting scans on MyApp1and MyApp2 located in web root c:\xampp\htdocs Sursa: PenTestIT
  5. da` "minunile" astea is puse si pe ISR .... si ce naiba sa faci cu ele ? @w1tch3r...esti sigur 100% ca nu`s "umblate" la ele ?
  6. Doriti sa monitorizati propriul webcam de la distanta, cu ajutorul telefonului mobil? Nimic mai simplu! Nu aveti decat sa instalati pe orice mobil J2ME software-ul J2MEWebCam 1.2. Aceasta aplicatie va permite legatura prin internet dintre telefonul dv. si webcamul instalat in locuinta sau biroul d-voastra. Stiu, gandul zboara la accesarea altor webcam-uri, instalate in alte spatii decat cele ale caror proprietar sunteti... Daca ignorati partea legala, tehnic este posibil. Va trebui doar sa aveti posibilitatea de a accesa fizic respectivul pc, pentru a seta configuratia "remote control". Iata si link-ul pentru dowload gratuit: Download J2MEWebCam 1.2 for Java Free - Monitor your WebCam from your mobile phone. - Softpedia Un link util pentru verificarea compatibilitatii telefoanelor J2ME: Java ME - the Most Ubiquitous Application Platform for Mobile Devices
  7. MA....unde naiba le gasesti ? Te intreb din curiozitate, nu ca esti tu rupt din stele...
  8. CryptoSMS.org - provides encrypted short messaging services for mobile phones De pe acest site se poate downloada gratuit un mic program scris in Java care se poate instala pe telefoanele mobile care au platforma Java. Rolul programului este sa cripteze mesajele text(SMS-urile) - ATENTIE: nu si MMS-urile - care sunt trimite de pe un telefon mobil folosind acest program. Bineinteles ca destinatarul mesajelor criptate trebuie sa aiba si el instalat acest program iar in prealabil trebuie sa se efectueze un schimb de chei de criptare - sub forma unui mesaj SMS - intre expeditor si destinatar pentru ca destinatarul mesajului criptat sa poata decripta si lectura mesajele criptate pe care le primeste. Personal am testat acest program folosind 2 telefoane conectate la retele diferite, si dupa 5 minute de butonari si teste am reusit sa trimit un mesaj criptat de pe un telefon si sa-l decriptez/citesc pe celalalt telefon. Trebuie sa mentionez ca la prima impresie + la ce am citit in mod fugitiv de pe site-ul producatorului, fara a studia in detaliu, am constatat ca metoda de criptate a acestui program se bazeaza pe un schimb de chei publice. Cheile de criptare folosite de program se protejeaza printr-o parola acces pe care utilizatorul programului o seteaza. Teoretic si de multe ori demonstrat practic, orice mesaj criptat se poate decripta daca se investesc suficiente resurse(tehnice/financiare/umane) si timp. Dar mergand pe ideea ca in lipsa de altceva mai bun e perfect ceea ce ai la indemana, pentru cei care doresc sa-si protejeze SMS-urile de priviri indiscrete, pot folosi acest program simplu de utilizat si in acelasi timp foarte util in ceea ce priveste securizarea comunicatiilor mobile la nivel de amatori. Cei care le aveti cu programarea Java bine de tot ati putea sa aruncati o privire pe sursa si sa realizati un astfel de program ( free sau contra-cost ) marca RST !!!
  9. hozarares

    va salut

    Salutare, wellcome and relax: Ronin33dan are dreptate.Si i`os unu` dintre expiratii aia....
  10. Vechi dar poate ca folosete cuiva.Eu nu am auzit de acest script. ########################################### #!/usr/bin/env python # mod_negotiation file bruteforce #Author: DiabloHorn import string import sys import getopt import httplib import re def txthelp(): print "[*] DiabloHorn http://diablohorn.wordpress.com" print "[*] Mod Negotiate File Brute Force" print "[*] " + sys.argv[0] + " -t <target> -d <dir list> -f <file list> [-v]" print "[*] -t target to scan" print "[*] -d directories which will be scanned" print "[*] -f files which will be scanned" print "[*] -v verbose" print "[*] -h this help" #dirty regex way to parse response items in the alternates header def parsehdrdata(hdr,rl): if hdr == None: return foundfiles = dict() m = re.findall('"(.+?)"',hdr) for a in m: if a not in foundfiles: foundfiles[a] = rl if verbose: for k,v in foundfiles.iteritems(): print string.join([v,k],'') return foundfiles #main if __name__ == "__main__": if len(sys.argv) <=1: txthelp() sys.exit(0) verbose = False dirfile = None filefile = None targetscan = None try: opts, args = getopt.getopt(sys.argv[1:],"t:d:f:vh") except getopt.GetoptError, err: print str(err) sys.exit(0) for o,a in opts: if o == "-h": txthelp() sys.exit(0) elif o == "-v": verbose = True elif o == "-t": targetscan = a elif o == "-d": dirfile = a elif o == "-f": filefile = a else: txthelp() sys.exit(0) #read all dirs into memory, yeah this will hog your computer if it's a large list. bdir = [] df = open(dirfile) try: for line in df: line = line.rstrip() if line.endswith("/"): bdir.append(line) else: bdir.append(line + "/") finally: df.close() httpheaders = {"Host":targetscan,"Accept":"a/b","User-Agent":"Googlebot-Image/1.0"} conn = httplib.HTTPConnection(targetscan) print "[*] Target set to: " + targetscan ff = open(filefile) try: for d in bdir: print "[*] Scanning: " + d ebresults = [] ff.seek(0) for line in ff: line = line.rstrip() reqline = d + line if verbose: print "[*] Testing: " + reqline conn.request("GET",reqline,headers=httpheaders) r2 = conn.getresponse() r2.read() tempparseresult = parsehdrdata(r2.getheader("Alternates"),d) if None != tempparseresult: ebresults.append(tempparseresult) r2 = None for ebresult in ebresults: for k,v in ebresult.iteritems(): print string.join([v,k],'') finally: ff.close() conn.close() ##################################################### [*] Mod Negotiate File Brute Force [*] mfbrute.py -t <target> -d <dir list> -f <file list> [*] -t target to scan [*] -d directories which will be scanned [*] -f files which will be scanned [*] -v verbose [*] -h this help ##################################################### Sursa: http://diablohorn.wordpress.com
  11. If you think that vulnerability research is only for computer geeks or hackers, you are wrong! Simple but effective “grep dorks” will be just fine to discover dirty pieces of code in, for example, PHP open source software. Let’s focus on Cacti and use it as our case study as we’ve recently found its latest vulnerabilities using this technique. The next steps were followed to identify and exploit the latest Cacti OS commanding vulnerability found by our research team: ?Download Cacti 0.8.7e ?Uncompress Cacti ?Under Cacti’s directory, find Operating System Function calls, such as “system”, “exec”, “shell_exec” or “popen” ?$ grep –i –r “shell_exec(” * Citeste mai departe: http://www.bonsai-sec.com
  12. Tu ce astepti ? Sa testeze cineva pt tine ? Baga mare ...linuxule....
  13. 01 from PIL import Image 02 03 img = Image.open('input.gif') 04 img = img.convert("RGBA") 05 06 pixdata = img.load() 07 08 # Clean the background noise, if color != black, then set to white. 09 for y in xrange(img.size[1]): 10 for x in xrange(img.size[0]): 11 if pixdata[x, y] != (0, 0, 0, 255): 12 pixdata[x, y] = (255, 255, 255, 255) 13 14 img.save("input-black.gif", "GIF") 15 16 # Make the image bigger (needed for OCR) 17 im_orig = Image.open('input-black.gif') 18 big = im_orig.resize((116, 56), Image.NEAREST) 19 20 ext = ".tif" 21 big.save("input-NEAREST" + ext) 22 23 # Perform OCR using pytesser library 24 from pytesser import * 25 image = Image.open('input-NEAREST.tif') 26 print image_to_string(image) Sursa http://www.bonsai-sec.com
  14. Nu exista si nu a existat niciodata o entitate administrativa, culturala, etnica sau istorica cu denumirea “Tinutul Secuiesc”; - sintagma “Tinutul Secuiesc” este o constructie lingvistica creata in urma cu cativa ani de UDMR, ca instrument politic; - singura certitudine cu privire la aceasta sintagma este potentialul sau conflictual pentru relatiile dintre romani, secui si unguri, si aduc ca exemplu scandalul generat de panourile continand aceasta sintagma instalate la intrarea in judetul Covasna; In consecinta, nici voi sa nu folositi vreodata termenul de "tinut secuiesc, indiferent in ce contexta verbal va veti afla ci sa folositi EXPRESIILE, judetul Harghita si/sau judetul Covasna
  15. De cacat e ma`ta aia naspa de la benzinarie care te`a avortat pe un teren viran.Daca taceai, filozof ramaneai.
  16. Caut Programatori ASP.NET MCV ( ASP.NET MVC: The Official Microsoft ASP.NET Site ) Cei care stiu bine sau sunt dispusi sa se perfectioneze, sa ne caute;chiar si daca nu e super profi, da e dispus sa invete e ok. MCV`ul e doar de 1 an aparut.Exista proiecte "pe rol" care trebuie terminate. Pentru mai multe detalii in privinta proiectelor si a platilor : serviciiweb.cluj@gmail.com
  17. Mai lasa`l in CUC de matrics....tot ala e la baza ?
  18. hozarares

    ziaristi

    E cool ... mare domn !!!
  19. La "brandul bancar" domina ING. La cel auto, aici e cam ambigua treaba si pute a peste stricat.In domeniul sanitar.....In domeniul IT avem Gecad si BitDefender.In domeniul comunicatiilor, primul loc il ocupa Orange iar ultimul loc este ocupat de Digi ( telefonie (?) la superlativ ).In domeniul asigurarilor domina nenea Tiriac cu a lui Alianta.In domeniul FMCG domina Pepsi si Silva ( bere ). Nu stim sa promovam nimic ce este ROMANESC.Cum adica, va intrebati? Deoarece NU AVEM ! Totul este importat...ati vazut vreo reclama la lapte romanesc in ultimul an ? Io nu, dar la Tnuva vad in fiecare zi ....
  20. Pentru cei care nu ati "trait dincolo", sa stiti ca romanii sunt putini care fac asa ceva. @Krisler12 ROMANII sunt BANDITI MARI indiferent in ce tara se afla dar majoritatea lucreaza ( legal sau ilegal, aici nu conteaza. Nu se coboara la nivelul asta, de`a spala parbrize sau de a cersi (evident exista si cazuri in care romanu` lucreaza cot la cot cu cioara din cauza anturajului ) ..... CIORILE sunt cei care, daca sunt luati de "militie" prin Germania, Suedia, Spania, Italia, vor declara ca sunt romani... @N-W-A astfel e normal sa fie asociata astfel imaginea Romaniei cu cersitul si tiganeala. In Spania s`a dus o astfel de campanie timp de 10-12 ani pana cand toti cei care citeau articolele de genul asta s`au convins cum sta treaba.... @Fitty ... e bine sa constientizezi, ca in jurul tau, se intampla ceva grav. Atitudinea poate fi luata ignorand personajele dar nu si problema.
  21. Sisteme de copiat cu microcasti (wireless) E la moda....nu functioneaza la Universitatile de Stat si nici la "liceele simandicoase" ( aici depinde de oras ) ; nu stiu daca functioneaza la Testele Auto... dar inca se poate copia foarte bine. Un sistem bun, de inchiriat, costa 30 lei ( si iti dicteaza ala care ti`l inchiriaza/vinde, banu`l dai dupa examen daca functioneaza sistemu` ) sau de cumparat intre 50 si 120 lei in functie de estetica, bla bla bla bla.... P.S. Daca altii isi iau permisu`si diplome "pe naspa" ,tu de ce naiba sa nu copiezi indiferent de test? Daca esti iute la creier nu are sens sa copiezi ( in cazu` asta esti cel mai mare TAMPIT )
  22. Ofer invitatii pentru Demonoid.com . Vrea cineva ? Le expun aici, deci primul venit, primul servit.
  23. Legea anti-pirateria si tot ceea ce tine de internet este destul de ambigua.In consecinta, legea poate fi interpretata asa: "poti sa faci download dar nu ai voie sa distribui (share) .... :)"
  24. All tutorilas about hacking wifi. From basic to advanced. It took only 2 hours, We can use wifi free everywhere, everywhen Include Pack:Hacking Videos-Part1 / videos_pt1 / 128 Bit Wep Cracking With Injection!.swf 13 MBHacking Videos-Part1 / videos_pt1 / Adding Modules to a Slax or Backtrack Live CD from Windows.swf 4.2 MBHacking Videos-Part1 / videos_pt1 / Basic Nmap Usage!.swf 8.3 MBHacking Videos-Part1 / videos_pt1 / BufferOverflowPart2-Shellcoding ByIDEspinner.avi 12.7 MBHacking Videos-Part1 / videos_pt1 / BufferOverflowPart3ExploitsByIDEspinner.avi 15.2 MBHacking Videos-Part1 / videos_pt1 / How to decrypt SSL encrypted traffic using a man in the middle attack (Auditor).swf 32.2 MBHacking Videos-Part1 / videos_pt1 / Sniffing Remote Router Traffic via GRE Tunnels (Hi-Res).avi 121.5 MBHacking Videos-Part2 / A Quick and Dirty Intro to Nessus using the Auditor Boot CD!.swf 2.8 MBHacking Videos-Part2 / Breaking WEP in 10 minutes.avi 27.6 MBHacking Videos-Part2 / Complete Hacking Video using Metasploit - Meterpreter.swf 12.5 MBHacking Videos-Part2 / Cracking a 128 bit WEP key (Auditor).swf 50.6 MBHacking Videos-Part2 / Cracking a 128 Bit Wep key + entering the cridentials.swf 22.1 MBHacking Videos-Part2 / Cracking Syskey and the SAM on Windows Using Samdump2 and John!.swf 2.5 MBHacking Videos-Part2 / Cracking Windows Passwords with BackTrack and the Online Rainbow Tables at Plain-Text!.swf 4.3 MBHacking Videos-Part2 / Cracking WPA Networks (Auditor).swf 14.8 MBHacking Videos-Part2 / DoS attack against Windows FTP Server - DoS.avi 10 MBHacking Videos-Part2 / Droop s Box Simple Pen-test Using Nmap, Nikto, Bugtraq, Nslookup and Other Tools!.swf 6.6 MBHacking Videos-Part2 / Exploiting some bugs of tools used in Windows.swf.swf 16 MBHacking Videos-Part2 / Exploiting weaknesses of PPTP VPN (Auditor).swf 5.5 MBHacking Videos-Part2 / Finding Rogue SMB File Shares On Your Network!.swf 5.5 MBHacking Videos-Part2 / Fun with Ettercap Filters!.swf 2.4 MBHacking Videos-Part2 / How to crack the local windows passwords in the SAM database .swf 6.8 MBHacking Videos-Part2 / How to sniff around switches using Arpspoof and Ngrep!.avi 3.2 MBHacking Videos-Part3 / Anonym.OS LiveCD with build in Tor Onion routing and Privoxy.swf 3.3 MBHacking Videos-Part3 / BackTrack LiveCD to HD Installation Instruction Video .swf 7.1 MBHacking Videos-Part3 / Basic Tools for Wardriving!.swf 2.7 MBHacking Videos-Part3 / Bluesnarfer attack tool demonstration.swf 9.8 MBHacking Videos-Part3 / IDEspinner Buffer Overflows pt1.avi 2.5 MBHacking Videos-Part3 / IDEspinner Feature Addition pt2.avi 11.3 MBHacking Videos-Part3 / IDEspinnerDNS-PoisonRouting.avi 5 MBHacking Videos-Part3 / Install VNC Remotely!.avi 2.9 MBHacking Videos-Part3 / Internet Explorer Remote Command Execution Exploit (CMDExe) Client Side Attack (Hi-Res).avi 25.7 MBHacking Videos-Part3 / Internet Explorer Remote Command Execution Exploit (CMDExe) Client Side Attack (Lo-Res).avi 19.9 MBHacking Videos-Part3 / John The Ripper 1.7 password cracker Installation Instruction Video .swf 2.6 MBHacking Videos-Part3 / Local Password Cracking Presentation for the Indiana Higher Education Cybersecurity Summit 2005!.swf 5.7 MBHacking Videos-Part3 / MAC Bridging with Windows XP and Sniffing!.swf 1.4 MBHacking Videos-Part3 / Mass De-Authentication using void11 (Auditor).swf 16.5 MBHacking Videos-Part3 / Metasploit Flash Tutorial!.swf 3.2 MBHacking Videos-Part3 / MITM Hijacking.wmv 52.3 MBHacking Videos-Part3 / Nmap Video Tutorial 2 Port Scan Boogaloo!.swf 13.4 MBHacking Videos-Part3 / Sniffing logins and passwords.avi 7.1 MBHacking Videos-Part4 / A Penetration Attack Reconstructed.avi 40.2 MBHacking Videos-Part4 / Bluesnarfing a Nokia 6310i hand set.avi 11.5 MBHacking Videos-Part4 / Cain to ARP poison and sniff passwords!.avi 1.7 MBHacking Videos-Part4 / Sniffing Remote Router Traffic via GRE Tunnels (Lo-Res).avi 71 MBHacking Videos-Part4 / Sniffing VoIP Using Cain!.swf 1.7 MBHacking Videos-Part4 / Snort Instruction video - howto install into backtrack.swf 10.6 MBHacking Videos-Part4 / SSH Dynamic Port Forwarding!.swf 3 MBHacking Videos-Part4 / Start a session and get interactive commandline access to a remote Windows box!.avi 5 MBHacking Videos-Part4 / Telnet Bruteforce.avi 18.9 MBHacking Videos-Part4 / Tunneling Exploits through SSH.avi 18.1 MBHacking Videos-Part4 / Use Brutus to crack a box running telnet!.avi 1.7 MBHacking Videos-Part4 / Using NetworkActiv to sniff webpages on a Wi-Fi network!.swf 1.3 MBHacking Videos-Part4 / WEP Cracking using Aireplay v2.2 Beta 7 (Whax 3.0).swf 5.2 MBHacking Videos-Part4 / WMF File Code Execution Vulnerability With Metasploit!.swf 3.7 MBHacking Videos-Part4 / WPA Cracking using Aireplay v2.2 Beta 7 (Whax 3.0).swf 5.2 MBHacking Videos-Part5 / BackTrack LiveCD to HD Installation Instruction Video .swf 7.1 MBHacking Videos-Part5 / Basic Nmap Usage!.swf 8.3 MBHacking Videos-Part5 / Basic Tools for Wardriving!.swf 2.7 MBHacking Videos-Part5 / Bluesnarfer attack tool demonstration.swf 9.8 MBHacking Videos-Part5 / Bluesnarfing a Nokia 6310i hand set.avi 11.5 MBHacking Videos-Part5 / Breaking WEP in 10 minutes.avi 27.6 MBHacking Videos-Part5 / Complete Hacking Video using Metasploit - Meterpreter.swf 12.5 MBHacking Videos-Part5 / Cracking Syskey and the SAM on Windows Using Samdump2 and John!.swf 2.5 MBHacking Videos-Part5 / Cracking Windows Passwords with BackTrack and the Online Rainbow Tables at Plain-Text!.swf 4.3 MBHacking Videos-Part5 / Cracking WPA Networks (Auditor).swf 14.8 MBHacking Videos-Part5 / DoS attack against Windows FTP Server - DoS.avi 10 MBHacking Videos-Part5 / Exploiting some bugs of tools used in Windows.swf.swf 16 MBHacking Videos-Part5 / How to crack the local windows passwords in the SAM database .swf 6.8 MBHacking Videos-Part5 / How to decrypt SSL encrypted traffic using a man in the middle attack (Auditor).swf 32.2 MBHacking Videos-Part5 / Install VNC Remotely!.avi 2.9 MBHacking Videos-Part5 / John The Ripper 1.7 password cracker Installation Instruction Video .swf 2.6 MBHacking Videos-Part5 / Local Password Cracking Presentation for the Indiana Higher Education Cybersecurity Summit 2005!.swf 5.7 MBHacking Videos-Part5 / MAC Bridging with Windows XP and Sniffing!.swf 1.4 MBHacking Videos-Part5 / Metasploit Flash Tutorial!.swf 3.2 MBHacking Videos-Part5 / SSH Dynamic Port Forwarding!.swf 3 MBHacking Videos-Part5 / Start a session and get interactive commandline access to a remote Windows box!.avi 5 MB #################################################### [url=http://sharingmatrix.com/file/6551593/WIFIhackingpack.part01.rarhttp://sharingmatrix.com/file/6551597/WIFIhackingpack.part02.rarhttp://sharingmatrix.com/file/6551591/WIFIhackingpack.part03.rarhttp://sharingmatrix.com/file/6551611/WIFIhackingpack.part04.rarhttp://sharingmatrix.com/file/6551599/WIFIhackingpack.part05.rarhttp://sharingmatrix.com/file/6551601/WIFIhackingpack.part06.rarhttp://sharingmatrix.com/file/6551603/WIFIhackingpack.part07.rarhttp://sharingmatrix.com/file/6551605/WIFIhackingpack.part08.rarhttp://sharingmatrix.com/file/6551607/WIFIhackingpack.part09.rarhttp://sharingmatrix.com/file/6551609/WIFIhackingpack.part10.rar #################################################### P.S.: pentru a descarca, folositi programul MiPony ( mypony.net)
  25. 8 pirati informatici? Valeu de ei jurnalisti de "carton".... baietii aia nu au nicio legatura cu informatica....SUNT HOTI !!! Asa ar trebui catalogati nu altfel.Dar din dorinta de a lua 20-35 ron pe articol, faci pe dracu`n`patru sa sa scrii aberatii si sa iei banii
×
×
  • Create New...