Jump to content

SirGod

Moderators
  • Posts

    784
  • Joined

  • Last visited

  • Days Won

    27

Everything posted by SirGod

  1. La multi ani, ba!
  2. Mai documenteaza-te inainte sa aberezi. O fi mai sigur, dar nu de nepatruns.
  3. Mai baga o conditie in IF. Vezi daca utilizatorul curent e cel pe care il "vrei". how to get current username in .net using c#? - Stack Overflow Sau: How do you kill a process for a particular user in .NET (C#)? - Stack Overflow
  4. Si cu ce compromite siguranta site-ului sau a vizitatorilor exemplul oferit de tine? Puteai sa ii dai un exemplu mai putin penibil decat un marquee cu hacked.
  5. Security researchers estimate that 50% of worldwide spam has been killed off by the Grum strike. NEW YORK (CNNMoney) -- Good news for your email inbox: You'll be seeing less spam in it now, thanks to a global takedown effort that knocked one of the world's biggest spammers offline this week."About 50% of the worldwide spam is gone," says FireEye senior scientist Atif Mushtaq, who participated in the demolition. The dramatic decrease is the result of a coordinated attack by security firms and Internet service providers around the globe that took down a network of infected computers known as "the Grum botnet." Grum, one of the world's most prolific spammers, generated around 18 billion emails a day, by FireEye's estimates.A botnet is a collective of computers infected with malware -- typically without the computer owner's knowledge -- and taken over by an outside attacker. Criminals who gain control of botnets use them for malicious activities like pumping out massive volumes of spam or launching denial-of-service attacks on targeted websites. The bigger the botnet, the more firepower the cybercrimal has at their fingertips.Grum was an especially vast and nasty spammer. First detected in early 2008, its malware infected several hundred thousand computers around the world and churned out huge amounts of pharmaceutical spam advertising cheap drugs.At its peak, Grum was the world's most prolific spam machine, though researchers recently dropped it to the number three spot on their ever-changing list of the world's largest botnets.The tale of its demise reads like a high-tech thriller.The brain of a botnet is what's known as a "command and control" server. Grum had several of those servers scattered around the globe in countries including Russia, Panama, and the Netherlands. But it also had a fatal weakness: The network had no recovery mechanism if all of its command servers were simultaneously knocked offline.A Dutch Internet service provider yanked the plug Tuesday on two of Grum's primary command servers. A Panamanian server went down next, leaving just one main server -- in Russia -- coordinating the entire Grum swarm.But when the botnet's operators realized their network was under attack, they launched their evasive actions, shifting their traffic to a fresh set of backup servers in Ukraine."Right in front of my eyes, the bot herders started pointing their botnet to new destinations," Mushtaq wrote in a blog post about the takedown. "For a moment, I was stunned."Mushtaq alerted collaborators around the global, including a cybersecurity team in Russia that quickly went after the new servers' Internet providers. Within a few hours, they persuaded key providers to cut the connection. By 2 p.m. ET on Wednesday, the entire system was dead."We are confident that it can't recover," Mushtaq told CNNMoney on Thursday morning. "I've been monitoring Grum for four years. Right from the start we knew that it doesn't have any fallback mechanism."Grum was responsible for 35% of the Internet's spam volume last week, according to monitoring statistics from security firm Trustwave.Tracking botnet spam is tricky, and other firms have different estimates. Spam tracker Spamhaus estimates that 15% to 17% of the world's spam was coming from Grum as of early this week.Its demise is having ripple effects. The spam volume from another major botnet, Lethic, plunged overnight, Mushtaq said. He thinks the operators of that botnet have "gone underground."Cumulatively, killing Grum and wounding Lethic has instantly cut the worldwide spam volume in half, FireEye estimates.Grum recently averaged 120,000 infected computers a day generating spam, but immediately after the takedown, that number dropped to 21,505, Spamhaus reported.On Thursday, Spamhaus's latest data showed zero infected machines sending messages.Spam had already declined dramatically in recent years thanks to coordinated global efforts. Mushtaq thinks the goal of a junk-free inbox is in reach."One last final blow and I think we can make a rapid and permanent decline in worldwide spam," he said. Sursa: Grum takedown: '50% of worldwide spam is gone' - Jul. 19, 2012
  6. Ce fisiere ai incercat sa citesti? Poti citi doar ce poate apache/www citi. De obicei toate fisierele din directorul htdocs/www + cateodata si altele (depinde de permisiunile setate de catre sysadmin si din moment ce citesti etc/passwd probabil poti citi si alte fisiere de sistem).
  7. E doar un PoC. Modifica-l si citeste ce fisier vrei si ai permisiuni sa citesti (e.g. config.php). E un Local File Disclosure.
  8. Nu sunt sigur dar cred ca o companie de telefonie poate localiza un telefon dupa IMEI. Daca codul IMEI a fost schimbat nu cred ca mai sunt sanse de recuperare atata timp cand nu ai nimic instalat pentru asemenea situatii. Suna la operator si vezi ce poti face. Poate o sa fie si o invatare de minte ca sa nu oferi unui copil de 12 ani un telefon de 20 de milioane fiindca nu este responsabil si nu stie sa aiba grija de el pentru ca sunt aproape sigur ca nu si l-a cumparat din banii castigati de el.
  9. Eu l-am mai jucat (si altele) cu VirtualNES.
  10. Missile tank. Missile Tank - Play the Nintendo game Missile Tank online (rulat/emulat cu Java)
  11. Dupa cate vad la demo poti uploada fisiere PHTML. Din cate stiu eu serverul trebuie configurat ca sa le poata "rula". Majoritatea nu sunt (probabil nu iti va merge in niciunul dintre cazuri - le vei putea uploada, dar nu vor fi 'rulate', probabil o sa iti tranteasca un dialog de download sau sa iti afiseze continutul direct in browser).
  12. SirGod report: Nume utilizator: LoseControL@Failed.To.Check.Date Acum serios, e postat de mai bine de 3 ani, la ce te asteptai?
  13. Redaxscript iti recomand si eu. E foarte rapid. Redaxscript - Home - Ultra lightweight website engine
  14. http://www.backtrack-linux.org/forums/showthread.php?t=49411 Cititi ce zice muts.
  15. SirGod

    Cauta XSS

    Paginile alea "HTML" sunt defapt PHP-uri (URL Rewrite). In pagini HTML poti gasi doar DOM XSS, in cazul in care contin cod JavaScript vulnerabil.
  16. SirGod

    Fun stuff

    Ce inseamna ACTA pentru un ploiestean - YouTube
  17. S-au mai f?cut topicuri de genul acesta. S-au mai f?cut propuneri de genul acesta. Ciudat este c? nu îmi aduc aminte ca vreun user cu o oarecare reputa?ie sau vechime s? fi propus asta, numai oameni care ?i-au f?cut cont de 2-3 luni au venit cu ideea splendid? de a pune teste nefolositoare la înregistrare.
  18. Înregistrat în 2008, acum suntem în 2012. Exit. Go figure.
  19. Se pare ca full-time study este un termen foarte folosit (siteuri facultati straine, corpus). Cred ca e OK daca il folosesti.
  20. Bine ai venit, amigo!
  21. Typo3 e un script foarte folosit. Problema este ca pentru a exploata vulnerabilitatea e nevoie de register_globals ON (sanse mici spre foarte mici).
  22. Dupa cum spune si titlul, este un ghid de securitate pentru Windows. Este facut pentru cei care nu sunt chiar experti in domeniu, cu explicatii naturale (scris pentru blogul meu). Doar cateva sfaturi si programe recomandate.
  23. Nu inteleg de ce toata lumea sare in sus ca e facatura. Sunteti toti experti in domeniu si stiti ca acest lucru nu poate fi realizat? Tehnologia evolueaza exponential, iar cum motion detection nu e un subiect tocmai de ultima ora, nu vad de ce nu ar fi posibil.
  24. Il testezi pe un site propriu. Creezi o pagina care PHP care salveaza IP-ul si testezi Havij pe pagina respectiva. Apoi vezi daca IP-ul salvat coincide cu proxy-ul utilizat de tine. http://en.wikipedia.org/wiki/Virtual_machine http://en.wikipedia.org/wiki/Sandbox_(computer_security)
  25. Trei produse anti-virus. Foarte ineficient si inutil. Cred ca nu stii ce e ala un sandbox atata timp cat zici ca BackTrack 5, CentOS etc. sunt sandboxes. Vrei sa zici in virtual machine.
×
×
  • Create New...