-
Posts
2099 -
Joined
-
Last visited
-
Days Won
17
Everything posted by pyth0n3
-
Pe lîng? _Nephthys_ poate î?i mai spune John ,Johnny sau Johndoe si nu vrei sa ne spui
-
Ma refeream poate ai mai f?cut ?i alte conturi cu nume de MASCUL pe aici asa ca sa î?i readuc aminte Nu o considera ca un atac O spun ?i eu asa poate conteaz? pentru al?ii ,mie mi-e indiferent de apartenenta ?i orientarea sexuala Se întîmpla rar dar cînd o fata deschide un topic se umple ?i la sfîr?it persoana î?i schimba automat ?i sexul Adica din devine Nu vreau sa fac iluzii pentru unii b?ie?i din echipa
-
Setting up RAID (Redundant Array of Independent Disks)
pyth0n3 replied to pyth0n3's topic in Tutoriale video
Sincer eu foloseam ?i înc? mai folosesc LVM Logical Volume Manager In unele cazuri encrypted lvm folosind cryptsetup/ Fiecare nivel raid are pro ?i contro Eu am prezentat raid1 si raid5 Raid-1 ofer? o flexibilitate foarte mare poate fi sigur deoarece ofer? doua unit??i dedicate pentru backup reciproc Dezavantajul este ca se pierde 50% din spa?iul de pe harddisk Raid-5 face cea mai buna utilizare a harddisk-ului , necesita calcule matematice complicate iar dac? se pierde mai mult de o unitate e jale. Presupun ca sistemul RAID în general vine creat pe mai multe hard disk-uri dar ofer? oricum o metoda rapida de a crea un nou spa?iu intrun sistem în care se cere creare unui nou director (EX.Linux /home1 /home2 /home3 ) -
The verb form cum is a slang term for the act of ejaculation, or for having an orgasm
-
Uneori intru aici , e un Meta Tag Analyzer Îmi fac cate un scan la blog Astazi îmi da un fel de warn The web page contain adult words. The word(s) "cum" are adult words and can activate adult filters on search engines. Chestia e ca nu stiam care e problema deoarece eu nu am nici un fel de treaba cu vreun site porno Am creat un blogroll ?i am pus ?i un link c?tre hackersblog Coincidenta ultimul topic din hackersblog se numeste "Cum" sa iti protejezi adresa e-mail si datele confidentiale din aceasta
-
Watch online video YouTube - Setting up RAID (Redundant Array of Independent Disks) Download video: http://tinyurl.com/6yjo3wt md5sum 3d1c5d4564e1f991f50083e9cd4f0e5e raid_volume.tar.gz sha256sum b98f77909c2e2fdde6e70bcfc82d407cb2f888bfb0fe433cd7c47a9a298f4378 raid_volume.tar.bz Raid-1 level configuration Raid-5 level configuration More about raid RAID - Wikipedia, the free encyclopedia
-
@Mosad Din p?cate nu am nici o placa grafica compatibila , am f?cut un video în alte calculatoare pe care nu le de?in Voi încerca sa îmi construiesc pe viitor ceva
-
Welcome To Jamrock (AOL Sessions)
-
Challenge-ul sa terminat , nimeni nu a a luat nici un premiu N0net road challenge online video ____________________________________________ Statistics updated Mon Apr 4 2011 RST members : Flubber -> last level (sa oprit aici) Hertz -> leve6 Florin91 ->level6 Others: Edotassi -> level6 Ghebbo_HCk (Varsta: 14 ani programator C++ ) -> level6
-
@cristykid Fixed!
-
Dupa ce am dat date gre?ite în email-ul precedent ast?zi am primit un alt email Ma gîndeam ca s-au prins, am pus ca password "igotyou" __________________________________________________________________________ Email 3 Sat 2 Apr 4:11 PM __________________________________________________________________________ from Gteam Alert <gteamalert@in.com> reply-to Gteam Alert <gteamalert@in.com> to Pyth0n3 date Sat, Apr 2, 2011 at 4:11 PM subject Re: Re: Gmail! Alert .. mailed-by in.com signed-by in.com ************************************************************************************ This footnote confirms that this email message has been scanned by New Google Mail-SeCure for the presence of malicious code, vandals & computer viruses. ************************************************************************************ We Require the Full Information so has to be Able to Keep Your Account Active and Avoiding Erasing it from out Database... We Need the Listed Full Correct Information within 48hrs...Reply Back with the Info Regards, The Google Team ©2011 Google - Google Home - Privacy Policy - Terms of Service __________________________________________________________________________ TODO 1. Sign in to Gmail. 2. Open the message you'd like to report. 3. Click the down arrow next to 'Reply', at the top-right of the message pane. 4. Select 'Report Phishing'.
-
@Flubber Problema e ca nu a venit în rubrica SPAM , a venit direct în Inbox Am r?spuns la primul , am primit al doilea dup? 4 ore
-
As întreba ce face?i la pc în toate aceste ore ? La ce proiecte mai lucra?i pe lîng? proiectul messenger ?
-
Am Primit urm?toarele email-uri __________________________________________________________________________ Email 1 __________________________________________________________________________ from Gmail Team <gteamalert@in.com> to pyth0n3 date Fri, Apr 1, 2011 at 4:50 AM subject Gmail! Alert .. We know it can be a pain to switch email accounts, and we hope this makes the transition to Gmail a bit easier. Please Confirm your being the owner of this email and let us know if you want to continue using this our service . By replying saying am active ASAP. Upon receiving the above information, we await your further reply and expect an Auto Response back to you as soon as possible so has to have your account being Fully Active. - The Gmail Team®. Gmail Registration Services®. la care am r?spuns cu ceea ce au cerut dup? care a venit urmatorul __________________________________________________________________________ Email 2 __________________________________________________________________________ from Gteam Alert <gteamalert@in.com> reply-to gteamalert@in.com to pyth0n3 date Fri, Apr 1, 2011 at 8:44 PM subject Google Customer Care mailed-by in.com signed-by in.com At Google, we take your privacy and security seriously. Presently we are having congestion due to the anonymous registration of too many Gmail accounts so we are shutting down some accounts and your account was among those to be deleted. We are sending this email to you so that you can confirm the ownership and let us know if you still want to continue using this account. Gmail need you to verify your account details ASAP . Do you use Gmail with this account ?* Yes No Do you use orkut with this Google Account ?* Yes No Do you use Blogger with this Google Account ?* Yes No Most Importantly The Details below is needed : * Full Name * : * Email ID * : * Password * : * Year Registered * : * Country * : Account Owners who refuse to Participate in the Verification process after receiving this message will lose his/her Account within 48hours Automatically. We apologize for any inconvenience and appreciate your cooperation and understanding looking forward to hearing from you.. Sincerely, The Google Account Verification Team La care am r?spuns cu ceea ce au cerut , acum nu ?tiu dac? vor fi mul?umi?i de r?spunsurile pe care le-am dat A mai primit careva?
-
Cu începutul , înve?i orice vrei tu cum func?ioneaz? (bazele) dup? care încerci sa modifici modul în care func?ioneaz? ?i analizezi ceea ce iese
-
As vrea sa ?tiu p?rerile voastre în leg?tura cu aceste doua sisteme operative Am pus în confrunt versiunea 5 din ambele de?i RedHat a ajuns la versiunea 6 iar Cent0S înc? nu P?rerea mea o voi spune pe parcurs , deocamdat? ambele distribu?ii sunt în faza de testing la mine Pana acum diferen?ele sunt urm?toarele Centos5 -> free RedHat5-> not free Centos5 are un logo divers RedHat5 are un logo divers RedHat are personal care face asistenta prin telefon CentOS are un forum , un mailinglist, ?i un canal irc Deocamdat? ambele sisteme func?ioneaz? la fel , au acela?i kernel ?i aceea?i structura Ambele sisteme au acela?i source code, cel putin CentOS foloseste codul sursa de la RedHat care vine publicat
-
Pasul 1 TSgrinder sau Tscrack tsgrinder.exe [options] server Options: -w dictionary file (default 'dict') -l 'leet' translation file -d domain name -u username (default 'administrator' -b banner flag -n number of simultaneous threads -D debug level (default 9, lower number is more output) tscrack [switch] [switch [arg]] ... <Host or IP[:port]> Switches: -h : Print usage help and exit -V : Print version info and exit -s : Print chipher strenght info and exit -b : Enable failed password beep -t : Use two simultaneous connections -N : Prevent System Log entries on targeted serv -U : Uninstall tscrack and remove components -f <number> : Wordlist entry to start cracking with -F <delay> : Sampling Frequency (Delay between samples in ms) -l <user> : Account name to use, defaults to Administrator -w <wordlist> : Wordlist to use; tscrack tries blank passes if omitted -p <password> : Use <password> to logon instead of wordlist/blank pass -D <domain> : Specify domain to attempt logon to Pasul 1 terminat Succes!
-
Right click on Notepad and pick Run as administrator first File then Open then browse to \windows\system32\drivers\etc\hosts
-
Probabil pe viitor se va cere un retina scanner + amprente si 3 fotografii din pozi?ii diverse ca sa ai acces la internet In unele tari au si un soldat armat în fata unui internetcaffe , î?i vin luate datele , î?i vine f?cuta o fotografie dup? care te po?i acomoda în fata calculatorului iar cînd deschizi site-ul de la NewYork Times te treze?ti cu un error 404 page not found
-
How to secure your server from PHP shells!
pyth0n3 replied to Skream Example's topic in Tutoriale in engleza
Using some modules like mod_evasive , mod_security will also increase the security Note: In mod_security you can customize the rules or write new rules Read documentation , it also provide a web based admin panel It was developed by OWASP WeBekci Project Note: Having the safe_mode set to ON in php configuration file will not permit to open the panel page in webekci Note: After installation don't forget to change the default htpasswd credentials “webekci” and password “1234", you can also raname the default directory "webekci/" Example of htaccess with limit set AuthType Basic <Limit GET POST> - This will set limits on GET's and POST's. require valid-user . </Limit> An IDS-IPS system will provide real time prevention , logging analysis and mail notification Will also block the remote ip address based on rules using iptables or pf packet filter -
How to secure your server from PHP shells!
pyth0n3 replied to Skream Example's topic in Tutoriale in engleza
The first step Chroot the server After that He can only see and interact with his own mini-environment About chroot environment A malicious client visits user X's site and uploads files and executes them, he is running as user X, and he may be able to damage user X's files User Y will still be save safe_mode = On PHP scripts are able to access files only when their owner is the owner of the PHP scripts Effectively counteracts unauthorized attempts to access system files For example /etc/passwd allow_url_include = Off It is turned off by default under php5 safe_mode_gid = Off When safe_mode is turned on and safe_mode_gid is turned off, PHP scripts are able to access files not only when UIDs are the same, but also when the group of the owner of the PHP script is the same as the group of the owner of the file open_basedir = directory[:...] When the open_basedir parameter is enabled, PHP will be able to access only those files, which are placed in the specified directories (and subdirectories). expose_php = Off it is important ,PHP will not disclose information about itself in HTTP headers register_globals = Off It is turned off from php4 by default If register-global is turned on, the (Environment, GET, POST, Cookie and Server) variables are automatically registered as global variables display_errors = Off errors, warnings are not being displayed Final note: Using an IDS system Even if you try to make 2 or 3 queries of SQLI or maybe to upload a file the admin will get an email in real time Your ip will be automatically blocked -
ASLR - Address space layout randomization este o tehnica de securitate care implica aranjarea în mod cazual a adreselor de memorie folosite de un anumit task In acest tutorial nu voi intra în multe am?nunte în leg?tura cu ASLR ,voi explica doar lucrurile de baza ASLR aduce cîteva beneficii Spre exemplu în cazul în care vine executat un atac ?i este nevoie sa se cunoasc? anumite adrese cum ar adresa actuala a unui stack pointer acestea vor trebui ghicite înainte deoarece vin generate în mod cazual Majoritatea sistemelor Unix/Linux/Windows folosesc ASLR Pt a verifica dac? ASLR este activat de default se poate folosi urm?torul exemplu de cod: #include <stdio.h> unsigned int stackp() { __asm__("movl %esp, %eax"); } int main() { printf("0x%x\n", stackp()); } Executand codul vom avea adresa de baza (esp) a unui stack pointer In cazul în care ASLR este activat adresa va fi diversa de fiecare data cînd codul vine executat Exemplu: pyth0n3@mc:~/work$ gcc -o getesp getesp.c pyth0n3@mc:~/work$ ./getesp 0xbff69388 pyth0n3@mc:~/work$ ./getesp 0xbfcd5898 pyth0n3@mc:~/work$ ./getesp 0xbfaaf138 pyth0n3@mc:~/work$ ./getesp 0xbfd78ea8 pyth0n3@mc:~/work$ ./getesp 0xbff4f288 In cazul meu este activat Majoritatea sistemelor Linux il au activat de default începînd cu versiunea 2.6.12 de kernel Cum se poate dezactiva ASLR in linux ? O simpla metoda ar fi modificarea parametrilor în /proc/sys/kernel/ Depinde de distribu?ia care vine folosita deoarece pot fi diverse tipuri de fi?iere randomize_va_space exec-shield exec-shield-randomize echo "0" > /proc/sys/kernel/randomize_va_space In acest caz ASLR vine dezactivat Un exemplu pt a dovedi acest lucru: pyth0n3@mc:~/work$ ./getesp 0xbffff568 pyth0n3@mc:~/work$ ./getesp 0xbffff568 pyth0n3@mc:~/work$ ./getesp 0xbffff568 pyth0n3@mc:~/work$ ./getesp 0xbffff568 pyth0n3@mc:~/work$ ./getesp 0xbffff568 Vom vedea în detaliu cum vine modificat fi?ierul randomize_va_space sysctl - vine folosit pentru a modifica diver?i parametri de kernel în timpul rul?rii a acestuia Fiecare parametru disponibil care poate fi modificat vine enumerat în /proc/sys randomize_va_space este un fi?ier care se afla în /proc/sys/kernel/ ?i poate fi modificat folosind sysctl Pt a modifica fi?ierul randomize_va_space pot fi folosite diverse op?iuni In baza a acestor op?iuni (valori) ASLR poate fi activat sau dezactivat Exemplu: sysctl -w kernel.randomize_va_space=0 Vine chemat sysctl cu parametrul -w care va permite sa fie modificate diverse op?iuni , în acest caz vom ad?uga valoarea o in fisierul randomize_va_space Diverse atribu?ii pt fiecare valoare 0 -Va dezactiva ASLR In cazul sistemelor care nu suporta ASLR fi?ierul va avea valoarea 0 de default 1 -Va activa ASLR , adresa (esp) a unui stack pointer va fi generata în mod cazual 2 -Va activa ASLR iar în plus va permite randomizare în heap Pt avea mai multe informatii despre ASLR http://pax.grsecurity.net/docs/aslr.txt Shellcode pt a dezactiva ASLR in sistemele Linux X86-64 Linux/x86-64 - Disable ASLR Security - 143 bytes Bypassing PaX ASLR protection .:: Phrack Magazine ::. Download paper: wget http://sprunge.us/dfbc -O aslr.txt
-
Pentru cei interesa?i de Linux dar care nu vor sa renun?e la windows Overview andLinux is a complete Ubuntu Linux system running seamlessly in Windows 2000 based systems (2000, XP, 2003, Vista, 7; 32-bit versions only). This project was started for Dynamism for the GP2X community, but its userbase far exceeds its original design. andLinux is free and will remain so, but donations are greatly needed. andLinux.org -- Run Linux natively inside Windows
-
P?rerea mea , ii po?i investi în ni?te cursuri iar cuno?tin?ele acumulate î?i vor fi de folos