Jump to content

Nytro

Administrators
  • Posts

    18725
  • Joined

  • Last visited

  • Days Won

    706

Everything posted by Nytro

  1. Nytro

    O chestie

    Sitting is Killing You - Medical Billing and Coding Certification
  2. Versiunea inceputa 4.0 si neterminata e pe la Programare, codul sursa, comentat. Nu mai am timp si chef de astfel de prostioare. Edit: https://rstcenter.com/forum/23850-vb6-digital-keylogger-v4-0-proiect-inceput.rst
  3. Avea ban si datele de contact sterse.
  4. Nytro

    Pagina mea!

    Ma pis pe corectarile voastre gramaticale. Ho.
  5. Daca are user si pass nu are nevoie de vreo aplicatie ca sa posteze. Pur si simplu "simuleaza" postarea (dupa logare).
  6. Geniala ideea
  7. Info: TinKode Gets 2-Year Suspended Jail Term, Ordered to Pay $120,000 (€93,000) - Softpedia Reopened. Continuati aici.
  8. Nu ai nevoie de API, doar trimite request-urile HTTP necesare ca si cum utilizatorul in sine ar posta. 1. Logare 2. Postare Pastrezi cookie dupa logare, si ai grija sa trimiti datele corecte, sunt niste campuri dubioase pe acolo.
  9. Aia e o porcarie. Cu experimenteul Philadelphia e altceva, acei oameni au fost supusi la doze extrem de mari de unde electro-magnetice (asta era experimentul) si multi au murit, unora li s-a facut rau si au inceput sa vada tot felul de prostii, halucinatii.
  10. Eu, logic. Firefox, Internet Explorer, Word, Excel, PowerPoint, Yahoo! Messenger, Winamp, Adobe Reader, Flash Player... Cam tot ce se poate.
  11. // keccak.c // 19-Nov-11 Markku-Juhani O. Saarinen <mjos@iki.fi> // A baseline Keccak (3rd round) implementation. #include "keccak.h" const uint64_t keccakf_rndc[24] = { 0x0000000000000001, 0x0000000000008082, 0x800000000000808a, 0x8000000080008000, 0x000000000000808b, 0x0000000080000001, 0x8000000080008081, 0x8000000000008009, 0x000000000000008a, 0x0000000000000088, 0x0000000080008009, 0x000000008000000a, 0x000000008000808b, 0x800000000000008b, 0x8000000000008089, 0x8000000000008003, 0x8000000000008002, 0x8000000000000080, 0x000000000000800a, 0x800000008000000a, 0x8000000080008081, 0x8000000000008080, 0x0000000080000001, 0x8000000080008008 }; const int keccakf_rotc[24] = { 1, 3, 6, 10, 15, 21, 28, 36, 45, 55, 2, 14, 27, 41, 56, 8, 25, 43, 62, 18, 39, 61, 20, 44 }; const int keccakf_piln[24] = { 10, 7, 11, 17, 18, 3, 5, 16, 8, 21, 24, 4, 15, 23, 19, 13, 12, 2, 20, 14, 22, 9, 6, 1 }; // update the state with given number of rounds void keccakf(uint64_t st[25], int rounds) { int i, j, round; uint64_t t, bc[5]; for (round = 0; round < rounds; round++) { // Theta for (i = 0; i < 5; i++) bc[i] = st[i] ^ st[i + 5] ^ st[i + 10] ^ st[i + 15] ^ st[i + 20]; for (i = 0; i < 5; i++) { t = bc[(i + 4) % 5] ^ ROTL64(bc[(i + 1) % 5], 1); for (j = 0; j < 25; j += 5) st[j + i] ^= t; } // Rho Pi t = st[1]; for (i = 0; i < 24; i++) { j = keccakf_piln[i]; bc[0] = st[j]; st[j] = ROTL64(t, keccakf_rotc[i]); t = bc[0]; } // Chi for (j = 0; j < 25; j += 5) { for (i = 0; i < 5; i++) bc[i] = st[j + i]; for (i = 0; i < 5; i++) st[j + i] ^= (~bc[(i + 1) % 5]) & bc[(i + 2) % 5]; } // Iota st[0] ^= keccakf_rndc[round]; } } // compute a keccak hash (md) of given byte length from "in" int keccak(const uint8_t *in, int inlen, uint8_t *md, int mdlen) { uint64_t st[25]; uint8_t temp[144]; int i, rsiz, rsizw; rsiz = 200 - 2 * mdlen; rsizw = rsiz / 8; memset(st, 0, sizeof(st)); for ( ; inlen >= rsiz; inlen -= rsiz, in += rsiz) { for (i = 0; i < rsizw; i++) st[i] ^= ((uint64_t *) in)[i]; keccakf(st, KECCAK_ROUNDS); } // last block and padding memcpy(temp, in, inlen); temp[inlen++] = 1; memset(temp + inlen, 0, rsiz - inlen); temp[rsiz - 1] |= 0x80; for (i = 0; i < rsizw; i++) st[i] ^= ((uint64_t *) temp)[i]; keccakf(st, KECCAK_ROUNDS); memcpy(md, st, mdlen); return 0; } Via: [h=3]27 February 2012 — Readable C code for Keccak[/h] Markku-Juhani O. Saarinen posted an implementation of Keccak in C aimed at readability and clarity, as an alternative to our specifications summary. We appreciate Markku's support.
  12. E de preferat hartia igienica, e mai moale si nu te doare curul.
  13. Da, daca e facut de tine, felicitari. Hmm, nu cred ca am mai vazut asa ceva in AutoIT. Iar ideea de a folosi AutoIT pentru indetectabilitate e foarte buna.
  14. Nytro

    Fun stuff

    Mi-am scris singur numele de cateva zeci de ori pe aici. Nu am de ce/cine sa ma ascund.
  15. [h=1]Remote buffer overflow tutorial[/h] by Amit Malik 2 years ago exploit: exploit-db.com/exploits/10973 paper: scribd.com/doc/24863209/Remote-Buffer-overflow-exploits or exploit-db.com/papers/11042.pdf or packetstormsecurity.org/filedesc/RemoteExploits2.pdf.html Enjoy... DZZ
  16. Are dreptate si omul. Aveti incredere in el? Cumparati. Nu aveti? Taceti in pula mea, nu mai comentati aiurea. Cu urmatoarea ocazie, ban in serie, pentru toate posturile fara rost. Muie.
  17. Defcon 20 - Owned In 60 Seconds: From Network Guest To Windows Domain Admin Description: Their systems were fully patched, their security team watching, and the amateur pentesters just delivered their "compliant" report. They thought their Windows domain was secure. They thought wrong. Zack Fasel (played by none other than Angelina Jolie) brings a New Tool along with New methods to obtain Windows Integrated Authentication network requests and perform NTLM relaying both internally and externally. The Goal? Start off as a nobody and get domain admin (or sensitive data/access) in 60 seconds or less on a fully patched and typically secured windows environment. The Grand Finale? Zack demonstrates the ability to *externally* gain access to a Windows domain user's exchange account simply by sending them an email along with tips on how to prevent yourself from these attacks. In just one click of a link, one view of an email, or one wrong web request, this new toolset steals the identity of targeted users and leverages their access. Call your domain admins, hide your road warriors, and warn your internal users. Zack will change the way you think about Windows Active Directory Security and trust relationships driving you to further harden your systems and help you sleep at night. Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying. Original Source: Sursa: Defcon 20 - Owned In 60 Seconds: From Network Guest To Windows Domain Admin
  18. How To Defend Against The Owasp Top Ten Web Security Threats Description: In this video Ken Sipe talking about OWASP Top Ten, for making your Web Application Secure. Ken Sipe : - Ken Sipe is a Technology Director with Perficient, Inc. (PRFT) in St. Louis, MO, USA, where he leads multiple teams in the development of enterprise solutions on both the Java and .Net platforms. Ken was the founder of CodeMentor, where he was the Chief Architect and Mentor, leading clients in the execution of RUP and Agile methodologies in the delivery of software solutions. Ken is passionate about technology and regular speaks on topics of architecture and software development. He is a core speaker with NFJS and won the Rock Star award in 2009 at JavaOne, JavaZone and The Strange Loop. When it comes to cross cutting software concerns, we expect to have or build a common framework or utility to solve this problem. This concept is represented well in the Java world with the log4j framework, which abstracts the concern of logging, where it logs and the management of logging. The one cross cutting software concern that seems for most applications to be piecemeal is that of security. Security concerns include certification generation, SSL, protection from SQL Injection, protection from XSS, user authorization and authentication. Each of these separate concerns tend to have there own standards and libraries and leaves it as an exercise for the development team to cobble together a solution which includes multiple needs.... until now... Enterprise Security API toolkit from OWASP. This session will look at a number of security concerns and how the ESAPI library provides a unified solution for security. This includes authorization, authentication of services, encoding, encrypting, and validation. This session will discuss a number of issues that can be solved through standardizing on the open source Enterprise Security API. Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying. Original Source: How to Defend Against the OWASP Top Ten Web Security Threats on Vimeo Sursa: How To Defend Against The Owasp Top Ten Web Security Threats
  19. Ipv4 -To- Ipv6 Service Providers Challenges Description: A discussion of IPv6 and the world of ISP's, the myriad challenges the Service Provider industry faces to make an effective transition to the next iteration of the Internet Protocol. Jeremy is currently a Network Engineer, with a focus on DOCSIS cable plant environments. Experience implementing DOCSIS 3 functionality on CMTS's for various customers in various regions. He has over 7 years of Engineering experience and obtained many Cisco Certifications CCNA - CCNP and is currently working on his CCIE. Brian Is a Principal DOCSIS Engineer and has over 16 years of Network engineering under his belt. Has has worked with most of the major Cable ISP's world wide and has assisted in deploying DOCSIS 3.0 solutions in hundreds of North American markets. Both Jeremy and Brian are US Military veterans and work at IBBS (www.IBBS.com) supporting hundreds of Cable ISP's supporting over a 1.4 million broadband CPE devices. Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying. Original Source: Sursa: Ipv4 -To- Ipv6 Service Providers Challenges
  20. Exploiting Stack Overflows in the Linux Kernel In this post, I’ll introduce an exploitation technique for kernel stack overflows in the Linux kernel. Keep in mind this does not refer to buffer overflows on the kernel stack (whose exploitability is well understood), but rather the improper expansion of the kernel stack causing it to overlap with critical structures which may be subsequently corrupted. This is a vulnerability class in the Linux kernel that I do not believe have been exploited publicly in the past, but is relevant due to a recent vulnerability in the Econet packet family ©2010 Job Oberheide (jon.oberheide.org) Download: http://www.exploit-db.com/wp-content/themes/exploit/docs/15634.pdf
  21. Nytro

    Polonic is back

    Polonica era amuzanta la inceput. Acum nu mai e. Haide Polonica, poti mai mult, incearca! Vreau sa vad daca mai esti in stare de ceva.
  22. Nytro

    Polonic is back

    Ba, NU ii mai dati ban. Vreau sa am cu cine purta o discutie de cacat.
  23. Nytro

    Polonic is back

    Mai trist e ca doar tu razi la glumele tale. Inainte ne faceai sa radem, acum esti plictisitoare...
×
×
  • Create New...