-
Posts
18772 -
Joined
-
Last visited
-
Days Won
729
Everything posted by Nytro
-
#1 Pastrati un limbaj decent si nu va injurati. Initial v-am lasat sa vorbiti cum ati vrut, sa vad pana unde se ajunge, dar deja intreceti masura. Nu sunteti in stare sa vorbiti decent? Nu sunteti mai "smecheri" si mai periculosi daca va bagati pula. #2 Terminati cu corectarea greselilor gramaticale! Nu i-ti conyne k nu scrie cneva corekt gramatical, te da-i q curu d pamant. M-am saturat sa vad zeci de posturi in care va dati experti ai gramaticii si corectati o simpla lipsa de cratima sau mai stiu eu ce. Nu ajutati cu nimic asa. #3 Primiti ban daca nu respectati #1 si #2. Adica nu va mai iert cu un simplu avertisment. Nu e valabil numai pentru ultimele posturi.
-
@protectedbyavira: Celalalt post al tau este: "cum pornesc bai fratilor scanneru' asta ? ", asadar nu esti tocmai zeul calculatoarelor. Observ ca nu stii prea multe despre Nemessis, de ce comentezi atunci? Cate ziare au scris despre tine, la cate ziare ai dat interviu, ce ai realizat tu sa il poti injura? Si cati ani ai tu de te legi de maturitatea sa? @Sicko: Nici pe mine nu ma intereseaza ca pe tine nu te intereseaza de acest comflict. Cel putin acest conflict are legatura cu subiectul. @Bebee: E problema ta ca nu iti place, ca nu ai o parere pozitiva despre el, insa asta nu iti da dreptul sa il injuri. Da, nu trebuie sa il respecti pentru ca e admin, dar el a facut ceva pentru renumele Romaniei, spre deosebire de tine care doar dai din gura. Tinkode nu iti va da ban (probabil vei primi cu mult inainte de la mine) pentru ca nu esti fanul lui, dar daca cel putin nu pastrezi un limbaj adecvat sigur vei primi ban. Da, unii dintre voi vor parasi acest forum, cei care doar comenteaza inutil. Nu veti primi ban de la Tinkode pentru ca nu ii sunteti fani, dar daca va manifestati ca Bebe sigur o sa dispareti de aici.
-
Ce Distributie Linux va place mai mult ?
Nytro replied to BGS's topic in Sisteme de operare si discutii hardware
Slackware mi-a placut cel mai mult, dar e mare consumatoare de timp. Ce vremuri, cand stateam 4 ore sa imi compilez Qt, imi modificam scripturile de startup de pornea sistemul de operare in 10 secunde, asta dupa alte multe incercari in care nu mai pornea, sau nu mergea cine stie ce: Internet-ul, audio... O sa trec din nou la el cand voi avea mult timp liber, imi compilez tot ce pot din surse, si vad ce iese. Sau de ce nu: Linux from scratch. -
O sa iti simtim lipsa. In fine, nu mai dramatizez si eu ca cei care au postat inaintea mea. Legat de Tinkode, nu va fi de capul lui, suntem o echipa si totul se va decide in echipa. Cred ca intre timp vor interveni si niste schimbari pe aici. Timpul va decide totul... Si nu, in niciun caz RST nu o sa cada!
-
A specificat atat autorul cat si sursa. Nu vad unde ar fi problema. In plus, un astfel de tutorial se scrie in 5 minute, nu e tocmai munca de o viata...
-
Cu placere. Cred ca buba e la "ReplaceIcoInExe". Am verificat valorile datelor din celelalte functii si nu am gasit probleme. Codul original in VB6 foloseste dimensiuni fixe pentru structuri ca 6, 16... Si: aux = 6 + 14 * Exe.IcoDir.idCount; Cred ca e de fapt: aux = 6 + 16 * Exe.IcoDir.idCount; Deoarece acea structura cred ca e de sizeof() == 16. Problema e probabil sa fie la ret = UpdateResource(hWrite, RT_GROUP_ICON, MAKEINTRESOURCE(1), 0, D, aux); sau la celalalt apel al acestei functii. Am avut probleme, in VB6 erau declarate cu parametrii de tip Long 2 dintre parametrii, si sunt de fapt LPTCSTR. Ma mai uit peste el, poate gasesc problema... Ciudat e ca imi facea executabilul mult mai mic.
-
Portiunea de cod detectabila... Nu mai stiu care e, probabil Loader-ul inca nu e, e control ActiveX. Vezi partea de "dropping" unde stub-ul se citeste singur incarca executabilul in memorie.
-
Nu stiu de ce nu merge. De fapt schimba iconita, dar STRICA executabilul. Poate te ajuta cu ceva: /* Nume: Icon Changer portat din Visual Basic 6 Autor: Gheorghe Vasile Status: Functionare partiala */ #include <stdio.h> #include <stdlib.h> #include <windows.h> typedef struct ICONDIR { short idReserved; short idType; short idCount; } ICONDIR; typedef struct ICONDIRENTRY { unsigned char bWidth; unsigned char bHeight; unsigned char bColorCount; unsigned char bReserved; short wPlanes; short wBitCount; int dwBytesInRes; int dwImageOffset; } ICONDIRENTRY; typedef struct GRPICONDIR { short idReserved; short idType; short idCount; } GRPICONDIR; typedef struct GRPICONDIRENTRY { unsigned char bWidth; unsigned char bHeight; unsigned char bColorCount; unsigned char bReserved; short wPlanes; short wBitCount; long dwBytesInRes; long dwIconID; } GRPICONDIRENTRY; typedef struct Dat { unsigned char *Data; } Dat; typedef struct Ico { ICONDIR IcoDir; ICONDIRENTRY *Entries; Dat *IcoData; } Ico; typedef struct IcoExe { GRPICONDIR IcoDir; GRPICONDIRENTRY *Entries; } IcoExe; Ico OpenIconFile(const char *Filename) { Ico t; FILE *fisier; int i; fisier = fopen(Filename, "rb"); fread(&t.IcoDir, sizeof(ICONDIR), 1, fisier); t.Entries = (ICONDIRENTRY *)malloc(sizeof(ICONDIRENTRY) * t.IcoDir.idCount); t.IcoData = (Dat *)malloc(sizeof(Dat) * t.IcoDir.idCount); for(i = 0; i <= t.IcoDir.idCount - 1; i++) { fseek(fisier, 6 + (16 * i), SEEK_SET); fread(&t.Entries[i], sizeof(ICONDIRENTRY), 1, fisier); t.IcoData[i].Data = (unsigned char *)malloc(t.Entries[i].dwBytesInRes); fseek(fisier, t.Entries[i].dwImageOffset, SEEK_SET); t.IcoData[i].Data = (unsigned char *)malloc(t.Entries[i].dwBytesInRes); fread(t.IcoData[i].Data, t.Entries[i].dwBytesInRes, 1, fisier); } fclose(fisier); return t; } IcoExe MakeIcoExe(Ico IconFile) { IcoExe t; long i; t.IcoDir.idCount = IconFile.IcoDir.idCount; t.IcoDir.idType = 1; t.IcoDir.idReserved = 0; t.Entries = (GRPICONDIRENTRY *)malloc(sizeof(GRPICONDIRENTRY) * t.IcoDir.idCount); for(i = 0; i <= t.IcoDir.idCount - 1; i++) { t.Entries[i].bColorCount = IconFile.Entries[i].bColorCount; t.Entries[i].bHeight = IconFile.Entries[i].bHeight; t.Entries[i].bReserved = IconFile.Entries[i].bReserved; t.Entries[i].bWidth = IconFile.Entries[i].bWidth; t.Entries[i].dwBytesInRes = IconFile.Entries[i].dwBytesInRes; t.Entries[i].dwIconID = i + 1; t.Entries[i].wBitCount = IconFile.Entries[i].wBitCount; t.Entries[i].wPlanes = IconFile.Entries[i].wPlanes; } return t; } int ReplaceIcoInExe(const char *FileName, Ico IcoFile) { int ret, i, aux; HANDLE hWrite; IcoExe Exe; unsigned char *D; hWrite = BeginUpdateResource(FileName, 0); Exe = MakeIcoExe(IcoFile); aux = 6 + 14 * Exe.IcoDir.idCount; D = (unsigned char *)malloc(aux); CopyMemory(D, &Exe.IcoDir, 6); for(i = 0; i <= Exe.IcoDir.idCount - 1; i++) { CopyMemory(&D[6 + 14 * i], &Exe.Entries[i], 14); } ret = UpdateResource(hWrite, RT_GROUP_ICON, MAKEINTRESOURCE(1), 0, D, aux); if(ret == 0) { EndUpdateResource(hWrite, 1); return 0; } for(i = 0; i <= Exe.IcoDir.idCount - 1; i++) { ret = UpdateResource(hWrite, RT_ICON, MAKEINTRESOURCE(Exe.Entries[i].dwIconID), 0, IcoFile.IcoData[i].Data, Exe.Entries[i].dwBytesInRes); } ret = EndUpdateResource(hWrite, 0); if(ret == 0) return 0; else return 1; } int main() { printf("Rezultat: %d\n\n", ReplaceIcoInExe("F:\\x.exe", OpenIconFile("F:\\g.ico"))); return 0; }
-
Option Explicit Public Type ICONDIR idReserved As Integer ' Reserved (must be 0) idType As Integer ' Resource Type (1 for icons) idCount As Integer ' How many images? 'ICONDIRENTRY idEntries[1]; // An entry for each image (idCount of 'em) End Type Public Type ICONDIRENTRY bWidth As Byte ' Width, in pixels, of the image bHeight As Byte ' Height, in pixels, of the image bColorCount As Byte ' Number of colors in image (0 if >=8bpp) bReserved As Byte ' Reserved ( must be 0) wPlanes As Integer ' Color Planes wBitCount As Integer ' Bits per pixel dwBytesInRes As Long ' How many bytes in this resource? dwImageOffset As Long ' Where in the file is this image? End Type Public Type GRPICONDIR idReserved As Integer ' Reserved (must be 0) idType As Integer ' Resource Type (1 for icons) idCount As Integer ' How many images? 'ICONDIRENTRY idEntries[1]; // An entry for each image (idCount of 'em) End Type Public Type GRPICONDIRENTRY bWidth As Byte ' Width, in pixels, of the image bHeight As Byte ' Height, in pixels, of the image bColorCount As Byte ' Number of colors in image (0 if >=8bpp) bReserved As Byte ' Reserved ( must be 0) wPlanes As Integer ' Color Planes wBitCount As Integer ' Bits per pixel dwBytesInRes As Long ' How many bytes in this resource? dwIconID As Integer ' Where in the file is this image? End Type Public Type Dat Data() As Byte End Type Public Type Ico IcoDir As ICONDIR Entries() As ICONDIRENTRY IcoData() As Dat End Type Public Type IcoExe IcoDir As GRPICONDIR Entries() As GRPICONDIRENTRY End Type Private Declare Function BeginUpdateResource Lib "kernel32.dll" Alias "BeginUpdateResourceA" (ByVal pFileName As String, ByVal bDeleteExistingResources As Long) As Long Private Declare Function UpdateResource Lib "kernel32.dll" Alias "UpdateResourceA" (ByVal hUpdate As Long, ByVal lpType As Long, ByVal lpName As Long, ByVal wLanguage As Long, lpData As Any, ByVal cbData As Long) As Long Private Declare Function EndUpdateResource Lib "kernel32.dll" Alias "EndUpdateResourceA" (ByVal hUpdate As Long, ByVal fDiscard As Long) As Long Private Declare Sub CopyMemory Lib "kernel32.dll" Alias "RtlMoveMemory" (Destination As Any, Source As Any, ByVal Length As Long) Private Const RT_ICON As Long = 3& Private Const DIFFERENCE As Long = 11 Private Const RT_GROUP_ICON As Long = (RT_ICON + DIFFERENCE) '// ReplaceIcoInExe "C:\EXEtoReplace.exe", OpenIconFile("C:\NewIcon.ico") Public Function OpenIconFile(FileName As String) As Ico Dim t As Ico 'structure temporaire Dim X As Long 'compteur 'on ouvre le fichier Open FileName For Binary As #1 'on récup?re l'entete du fichier Get #1, , t.IcoDir 'redimensionne au nombre d'icones ReDim t.Entries(0 To t.IcoDir.idCount - 1) ReDim t.IcoData(0 To t.IcoDir.idCount - 1) 'pour chaque icones For X = 0 To t.IcoDir.idCount - 1 'récup?re l'entete de l'icone Get #1, 6 + 16 * X + 1, t.Entries(X) 'redimensionne ? la taille des données ReDim t.IcoData(X).Data(t.Entries(X).dwBytesInRes - 1) 'récup?re les données Get #1, t.Entries(X).dwImageOffset + 1, t.IcoData(X).Data Next 'ferme le fichier Close #1 'renvoie les données OpenIconFile = t End Function Private Function MakeIcoExe(IconFile As Ico) As IcoExe Dim t As IcoExe 'structure temporaire Dim X As Long 'compteur 'nombre d'icones t.IcoDir.idCount = IconFile.IcoDir.idCount 'type : Icone = 1 t.IcoDir.idType = 1 'chaque entrée ReDim t.Entries(IconFile.IcoDir.idCount - 1) 'pour chaque entrée For X = 0 To t.IcoDir.idCount - 1 'entete d'icones t.Entries(X).bColorCount = IconFile.Entries(X).bColorCount t.Entries(X).bHeight = IconFile.Entries(X).bHeight t.Entries(X).bReserved = IconFile.Entries(X).bReserved t.Entries(X).bWidth = IconFile.Entries(X).bWidth t.Entries(X).dwBytesInRes = IconFile.Entries(X).dwBytesInRes t.Entries(X).dwIconID = X + 1 t.Entries(X).wBitCount = IconFile.Entries(X).wBitCount t.Entries(X).wPlanes = IconFile.Entries(X).wPlanes Next 'renvoie la structure MakeIcoExe = t End Function Public Function ReplaceIcoInExe(FileName As String, IcoFile As Ico) As Boolean Dim hWrite As Long 'handle de modification Dim Exe As IcoExe 'structure de ressource icone Dim ret As Long 'valeur de retour Dim X As Long 'compteur Dim D() As Byte 'buffer 'obtient un handle de modification hWrite = BeginUpdateResource(FileName, 0) 'si échec, on quitte If hWrite = 0 Then ReplaceIcoInExe = False: Exit Function 'sinon, on lit l'icone Exe = MakeIcoExe(IcoFile) 'on redimmensionne le buffer ReDim D(6 + 14 * Exe.IcoDir.idCount) 'on copie les données dans le buffer CopyMemory ByVal VarPtr(D(0)), ByVal VarPtr(Exe.IcoDir), 6 'pour chaque icone For X = 0 To Exe.IcoDir.idCount - 1 'on copie les données CopyMemory ByVal VarPtr(D(6 + 14 * X)), ByVal VarPtr(Exe.Entries(X).bWidth), 14& Next 'on met ? jour la ressource groupe icone ret = UpdateResource(hWrite, RT_GROUP_ICON, 1, 0, ByVal VarPtr(D(0)), UBound(D)) 'si échec, on quitte If ret = 0 Then ReplaceIcoInExe = False: EndUpdateResource hWrite, 1: Exit Function 'on met ? jour chaque ressource icone For X = 0 To Exe.IcoDir.idCount - 1 ret = UpdateResource(hWrite, RT_ICON, Exe.Entries(X).dwIconID, 0, ByVal VarPtr(IcoFile.IcoData(X).Data(0)), Exe.Entries(X).dwBytesInRes) Next 'on enregsitre dans le fichier executable ret = EndUpdateResource(hWrite, 0) 'si échec, on quitte If ret = 0 Then ReplaceIcoInExe = False: Exit Function 'sinon succ?s ReplaceIcoInExe = True End Function Maine, daca stau pe acasa, il portez eu in C/C++. Adica azi, ca e aproape 4... Sau asta: Option Explicit Type DIB_HEADER Size As Long Width As Long Height As Long Planes As Integer Bitcount As Integer Reserved As Long ImageSize As Long End Type Type ICON_DIR_ENTRY bWidth As Byte bHeight As Byte bColorCount As Byte bReserved As Byte wPlanes As Integer wBitCount As Integer dwBytesInRes As Long dwImageOffset As Long End Type Type ICON_DIR Reserved As Integer Type As Integer Count As Integer End Type Type DIB_BITS Bits() As Byte End Type Public Enum Errors FILE_CREATE_FAILED = 1000 FILE_READ_FAILED INVALID_PE_SIGNATURE INVALID_ICO NO_RESOURCE_TREE NO_ICON_BRANCH CANT_HACK_HEADERS End Enum Public Function ReplaceIcons(Source As String, Dest As String, Error As String) As Long Dim IcoDir As ICON_DIR Dim IcoDirEntry As ICON_DIR_ENTRY Dim tBits As DIB_BITS Dim Icons() As IconDescriptor Dim lngRet As Long Dim BytesRead As Long Dim hSource As Long Dim hDest As Long Dim ResTree As Long hSource = CreateFile(Source, ByVal &H80000000, 0, ByVal 0&, 3, 0, ByVal 0) If hSource >= 0 Then If Valid_ICO(hSource) Then SetFilePointer hSource, 0, 0, 0 ReadFile hSource, IcoDir, 6, BytesRead, ByVal 0& ReadFile hSource, IcoDirEntry, 16, BytesRead, ByVal 0& SetFilePointer hSource, IcoDirEntry.dwImageOffset, 0, 0 ReDim tBits.Bits(IcoDirEntry.dwBytesInRes) As Byte ReadFile hSource, tBits.Bits(0), IcoDirEntry.dwBytesInRes, BytesRead, ByVal 0& CloseHandle hSource hDest = CreateFile(Dest, ByVal (&H80000000 Or &H40000000), 0, ByVal 0&, 3, 0, ByVal 0) If hDest >= 0 Then If Valid_PE(hDest) Then ResTree = GetResTreeOffset(hDest) If ResTree > 308 Then ' Sanity check lngRet = GetIconOffsets(hDest, ResTree, Icons) SetFilePointer hDest, Icons(1).Offset, 0, 0 WriteFile hDest, tBits.Bits(0), UBound(tBits.Bits), BytesRead, ByVal 0& If Not HackDirectories(hDest, ResTree, Icons(1).Offset, IcoDirEntry) Then Err.Raise CANT_HACK_HEADERS, App.EXEName, "Unable to modify directories in target executable. File may not contain any icon resources." End If Else Err.Raise NO_RESOURCE_TREE, App.EXEName, Dest & " does not contain a valid resource tree. File may be corrupt." CloseHandle hDest End If Else Err.Raise INVALID_PE_SIGNATURE, App.EXEName, Dest & " is not a valid Win32 executable." CloseHandle hDest End If CloseHandle hDest Else Err.Raise FILE_CREATE_FAILED, App.EXEName, "Failed to open " & Dest & ". Make sure file is not in use by another program." End If Else Err.Raise INVALID_ICO, App.EXEName, Source & " is not a valid icon resource file." CloseHandle hSource End If Else Err.Raise FILE_CREATE_FAILED, App.EXEName, "Failed to open " & Source & ". Make sure file is not in use by another program." End If ReplaceIcons = 0 Exit Function ErrHandler: ReplaceIcons = Err.Number Error = Err.Description End Function Public Function Valid_ICO(hFile As Long) As Boolean Dim tDir As ICON_DIR Dim BytesRead As Long If (hFile > 0) Then ReadFile hFile, tDir, Len(tDir), BytesRead, ByVal 0& If (tDir.Reserved = 0) And (tDir.Type = 1) And (tDir.Count > 0) Then Valid_ICO = True Else Valid_ICO = False End If Else Valid_ICO = False End If End Function Am niste probleme stupide, pe o structura din C. "Imi sare" peste un cam din structura, ca si cum nu ar fi. Sa vad daca reusesc sa scap de problema.
-
Fimap The local and remote file inclusion auditing and exploitation v0.9 fimap is a little python tool which can find, prepare, audit, exploit and even google automaticly for local and remote file inclusion bugs in webapps. fimap should be something like sqlmap just for LFI/RFI bugs instead of sql injection. It’s currently under heavy development but it’s usable. Changelog Cookie scanning and attacking. New ‘AutoAwesome‘ operating mode. Dot-Truncation mode for breaking suffixes on windows servers. New –force-os switch which lets you define in advance which OS to assume. Better logfile kickstarter injection. Dynamic RFI encoder for webservers which interpret your (PHP) code (–rfi_encode=php_b64). Tons of bugfixes. Lots of stuff I forgot to mention. Features Check a Single URL, List of URLs, or Google results fully automaticly. Can identify and exploit file inclusion bugs. Relative\Absolute Path Handling. Tries automaticly to eleminate suffixes with Nullbyte and other methods like Dot-Truncation. Remotefile Injection. Logfile Injection. (FimapLogInjection) Test and exploit multiple bugs: include() include_once() require() require_once() You always define absolute pathnames in the configs. No monkey like pathes like: ../etc/passwd ../../etc/passwd ../../../etc/passwd But in cases where the server doesn’t print messages you can enable the monkey-like checking with --enable-blind! Has an interactive exploit mode which… …can spawn a shell on vulnerable systems. …can spawn a reverse shell on vulnerable systems. …can do everything you have added in your payload-dict inside the config.py Add your own payloads and pathes to the config.py file. Has a Harvest mode which can collect URLs from a given domain for later pentesting. Goto FimapHelpPage for all features. Works also on windows. Can handle directories in RFI mode like: <? include ($_GET["inc"] . "/content/index.html"); ?> <? include ($_GET["inc"] . "_lang/index.html"); ?> where Null-Byte is not possible. Can use proxys. Scans GET and POST variables. Has a very small footprint. Can attack also windows servers! (WindowsAttack) Has a tiny plugin interface for writing exploitmode plugins (PluginDevelopment) Cookie and Header scanning and exploiting. Download: http://code.google.com/p/fimap/ Sursa: Fimap The local and remote file inclusion auditing and exploitation v0.9 released « IT Vulnerability & ToolsWatch
-
Download F-Secure AntiVirus for Mac F-Secure, one of the top security firms for PC, have released F-Secure AntiVirus for Mac with fast, real-time protection for home users and businesses. The software was in beta till recently, and we guess the recent malware attacks have hurried them to come out of beta and release the final version. For many Apple fanboys, “antivirus for Mac” is like an oxymoron. Apple has always boasted about how safe and secure the Mac ecosystem is. But the recent malware attacks have tarnished their image a great deal. As Brian X. Chen points out, There’s nothing about the Mac that makes it inherently more secure than Windows– indeed, the Mac platform has been easily penetrated in the Pwn2Own hacking contest in years past. But Windows has always been a juicier target for malicious hackers because it has much larger market share than the Mac. So, an antivirus security suite is now a necessity for your Mac more than ever. With gradual increase in sales of Macbooks, Macbook Airs, Macbook Pros and iMacs, we can surely expect many more malware and trojans cropping up on Mac. Though there are other options present, F-Secure antivirus for Mac is worth considering. F-Secure Anti-virus for Mac F-Secure Anti-virus for Mac is your key to be safe and tension-free. It will protect you from viruses and configure your firewall to help you to make sure your precious data stays where it should be. Since F-Secure Anti Virus for Mac is constantly updated, you’ll always be protected from the latest threats. The installable is less than 22 MB and it needs around 65 MB space on your hard drive. Installation is simple, straight-forward and a breeze to deal with. Once installed, it runs in the background, without taking too much memory and protects your Mac from various threats in real time. As you expect, the service is not free. It costs around €32 (~$45) per year for 1 Mac device. You can download and try F-Secure antivirus for Mac for Free (1 month) by using the campaign code “AVMAGL“. Download: http://www.f-secure.com/en/web/home_global/keys-in-the-cloud Sursa: Download F-Secure AntiVirus for Mac - Anti-Virus Mac, AntiVirus for Mac, Download F-secure antivirus Mac, f-secure, F-secure antivirus for Mac, Mac Antivirus, mac malware - Technically Personal!
-
Puteti folosi si asta: http://www.roaringpenguin.com/products/pppoe Trebuie compilata sursa, dar ar trebui sa va descurcati. Eu il foloseam pe Slackware, dar cred ca l-am folosit si pe Backtrack. Pentru configurare parca era pppoe-setup, iar ca sa te conectezi - pppoe-start (dar dupa configurare era recomandat un pppoe-connect, apoi Ctrl + C dupa conectare) . Pentru cei cu net prin USB, doar la RDS stiu cum e. Aveti ZTE_LinuxUI, il instalati si rulati. Eu cred ca am avut niste probleme, nu mai stiu cu ce distributie, cand in fisierul de configurare trebuia specificat portul USB in care era bagat. Dar na, aveti Network Manager, 2 click-uri si gata conexiunea. Si lumea zice ca Linux-ul e greu de folosit...
-
NU TRIMIT EU MAIL BA. Nu am eu acel mail.
-
Cred ca numele spune totul. Eu l-am gasit extrem de util, am cautat ceva si am gasit mult mai multe lucruri interesante. Link: http://findpdf.net/
-
Nu ne dezvalui si noua cunostintele tale?
-
Scuza-ma te rog. Ban. Topicuri create de el: http://rstcenter.com/forum/search.php?do=finduser&u=42523&starteronly=1 Total: 16 - 7 la RST Market - 3 la Offtopic - 2 la Cereri - 2 la Pranks - 1 la Ajutor - 1 topic util la "Conturi trackere" Deci nu prea a contribuit la forum si se gaseste el sa comenteze. Motive pentru al II-lea ban: - offtopic - postul sau nu are legatura cu subiectul discutiei - poola mea - limbaj de IRC - poola mea - limbaj inadecvat - cont dublu - post la Cereri desi nu are 10 postui (na) Da, jumatate ar trebui sa fie banati, dar ei sunt multi, eu sunt unul singur. Si incep cu cei care comenteaza. Si nu ti-am dat ban pe primul cont, ai primit doar un avertisment. Si vor fi banati! Multi! Cand va veni ziua cea mare, negura banului se va abate asupra conturilor neispravitilor care sunt in plus pe acest "Pamant". Da, eu sunt Dumnezeu. Desigur, banurile o sa apara cand voi avea mai mult timp liber.
-
vBulletin 4.0.x => 4.1.2 (search.php) SQL Injection Vulnerability
Nytro replied to Nytro's topic in Exploituri
Da, si eu tot de el stiu, si stiu de destul timp de acel post. O fi cine stie ce plagiator ratat, sau o fi aceeasi persoana... -
http://rstcenter.com/forum/search.php?do=finduser&u=42523&starteronly=1 Ai un singur topic util creat: http://rstcenter.com/forum/34259-%60%60free%60%60-invitatii-filelist.rst De te legi de altii? Vezi si asta: http://rstcenter.com/forum/35322-off-topic.rst#post239664 Oricum: avertisment pentru Offtopic, nu l-ai ajutat cu nimic. Cum mai aveai 2 avertismente, ai primit ban automat. Si e treaba noastra, a administratorilor si a moderatorilor, sa decidem ce se intampla cand cineva nu are cele 10 posturi pentru a face o cerere.
-
Asa ca idee, ripoff, cel care a deschis aceasta problema: Total: 49 topicuri create - 15 la Offtopic - 10 la Ajutor - 3 la Cereri Adica 28 de topicuri... Topicuri utile: tutoriale, programe... - Cam 12 - 15 (cele de la Market nu le contorizez niciunde) Si pune problema ca se face prea mult ofttopic. Asta nu imi place. PS: Cand voi avea timp, cu aceasta metodologie voi decide cine paraseste forumul. Un membru ca ripoff nu stiu daca ar ramane sau nu, dar sunt multi care stau mult mai prost cu diferenta intre topicuri utile si tampenii postate la offtopic. Dar nu doar topicurile create conteaza. Conteaza mult si posturile la Cereri si Ajutor, dar posturile in care un membru ajuta pe cineva, nu cele in care cere ajutorul. Oricum inca nu stiu exact cum voi proceda, dar daca veti avea Ban reason: "Membru inutil" sau ceva asemanator inseamna ca am dat o raita pe la posturile voastre si am decis ca sunteti in plus. Alt exemplu: nedo: Total topicuri create - 17: - 8 la Cereri - 6 la Ajutor Topicuri "utile": 3 Restul de 600 de posturi nu stiu pe unde sunt. Nu imi purtati (inca) pica, voi decide ce voi face cand voi avea mult timp liber. Si nu am spus ca voi doi, pe care v-am dat exemplu, ati primi ban, probabil voi nu ati primi, dar astfel voi gandi situatia la momentul oportun.
-
Lasand asta... Da, ce-i drept se posteaza mult mai mult aici. Motivul e simplu: e mult mai usor sa discuti despre Coca-Cola vs Pepsi decat despre compilarea kernelului de exemplu. Si lumea nu se chinuie sa invete cate ceva... Vreau sa fac ceva legat de membrii stupizi si inutili ai forumului care posteaza doar aici, CERERI si Ajutor, insa nu am timp momentan. Oricum, categoria asta nu strica. Se invata multe de aici, doar ca multe lucruri care nu au legatura cu IT-ul.
-
Impassioned Framework Download - Another Crimeware Available for Free ! : The Hacker News Russo is the creator of Impassioned Framework - Browser Exploitation Kit, a subscription-based software vulnerability exploit service. He is 23 year old the young hacker, This toolkits designed to be stitched into a Web site and probe visitor PCs for security holes that can be used to surreptitiously install malicious software. Impassioned Framework Recent Attack : Security weaknesses in the hugely popular file-sharing Web site thepiratebay.org have exposed the user names, e-mail and Internet addresses of more than 4 million Pirate Bay users using this Kit. Browsers Affected : - Chrome - Firefox - Msie 6 - Msie 7 - Msie 8 - Opera - Safari Os Affected : - Windows x - Unix and OS X NON AFFECTED Best exploits currently available: - MS09_002 - MS09_043 - MS Dshow - iepeers.dll - Firefox escape - Firefox CompareTo - Java Calendar - Adobe Reader Lib - Adobe Reader newPlayer - Adobe Flash 9 - Adobe Flash 10 Black Market Prices: $1,399 EURO / 1 MONTHS LICENSE. $2,999 EURO / 6 MONTHS LICENSE. $3,999 EURO / 12 MONTHS LICENSE. But Now Impassioned Framework is Available for Free Here !! Download ,1.14 MB - Multiupload.com - upload your files to multiple file hosting sites! Purpose Of Public Release: All Most wanted Crimeware kits are now available for free everywhere, this gives more chance to every Security pro to do more Research on them and also Antivirus Companies should now cover all these security holes/Exploits as soon as possible in their Next Update. Download: http://www.multiupload.com/9ELC2CART6 Sursa: Impassioned Framework Download - Another Crimeware Available for Free ! ~ THN : The Hackers News
-
Hacking Exposed VoIP/SIP - SIPVicious What is SIPVicious tool suite? SIPVicious suite is a set of tools that can be used to audit SIP based VoIP systems. It currently consists of four tools: * svmap - this is a sip scanner. Lists SIP devices found on an IP range * svwar - identifies active extensions on a PBX * svcrack - an online password cracker for SIP PBX * svreport - manages sessions and exports reports to various formats * svcrash - attempts to stop unauthorized svwar and svcrack scans Requirements Python SIPVicious works on any system that supports python 2.4 or greater. Operating System It was tested on the following systems: * Linux * Mac OS X * Windows * FreeBSD 6.2 * Jailbroken iPhone with python installed If you use it on systems that are not mentioned here please let me know goes it goes. Hacking Exposed VoIP/SIP VoIP systems becoming increasingly popular, attracted people are not only legitimate users that are looking to use it in their business but those who would like to make free calls at other people’s expense. SIP devices are often attacked, with the intent of finding the username/password of accounts on that device. VoIP attacks are found over misconfiguration or problems while implementing the PBX system. For testing these vulnerabilities we can use SIPVicious which is a set of tools that can be used to audit SIP based VoIP systems. It consists of five tools: * svmap – this is a sip scanner. Lists SIP devices found on an IP range * svwar – identifies active extensions on a PBX * svcrack – an online password cracker for SIP PBX * svreport – manages sessions and exports reports to various formats * svcrash – attempts to stop unauthorized svwar and svcrack scans This set of tools is written in Python and can be used on different operating systems. To better understand the way it works we can use the following scenarios: – Running svmap to look for SIP phones: box $ ./svmap.py 192.168.1.1/24 | SIP Device | User Agent | —————————————————— | 192.168.1.111:5868 | Asterisk PBX | | 192.168.1.112:5060 | unknown | box $ Here we can find an Asterisk PBX server detected on 192.168.1.111. - Running svwar with default options on the target Asterisk PBX, these accounts can be used for calling: box $ ./svwar.py 192.168.1.111 | Extension | Authentication | —————————— | 202 | reqauth | | 203 | reqauth | | 200 | reqauth | | 201 | noauth | box $ There are 4 extensions located, from 200 through 203 and 201 does not require authorization while the rest requires authorization. - Using svcrack with the optimization enabled can help in discovering number based password as it just tries three-digit number combinations in order until it finds the password. box $ ./svcrack.py 192.168.1.111 –u 201 | Extension | Password | ———————— | 201 | 201 | box $ Password for extension 201 is 201, as shown above. To see how the attack works we can use –vv as follows: ]svcrack.py 192.168.1.111 –u 201 –vv ].and the screen will display what combination it is trying. - The cracker can also use a dictionary file full of possible passwords. box $ ./svcrack.py 192.168.1.111 –u 203 \ -d dictionary.txt | Extension | Password | ———————— | 203 | ascript | box $ If you want to secure your VoIP/SIP, you need to start by setting the Firewall level to allow access for only a specific IP group and add the list of static IP addresses that are going to use the VoIP. If you are working remotely it will be also important to enable VPN for authenticating and encrypting your connection. Sursa: Hacking Exposed VoIP/SIP | SecTechno SIPVicious: http://code.google.com/p/sipvicious/