Jump to content

florin_darck

Active Members
  • Posts

    712
  • Joined

  • Last visited

  • Days Won

    4

Everything posted by florin_darck

  1. L-am terminat de mult dar nu ma interesa scriptul asa ca am asteptat sa il faca cineva ! Iar avand in vedere ca sunt incepator as prefere un tutorial:)
  2. Se vede ca sigur e bun! Nicii nu ai scris bine numele programului! Cred ca ar trebui sa iei ban!
  3. Bine ai venit printre noi !
  4. Ce buguri ai gasit? Sunt doar curios.
  5. Eu mi-am dat seama inainte sa vad threadul de bun venit:) Oricum bine ai venit! PS: Sunt tare curios cum stii atatea si le-ai invatat dintr-o intamplare!
  6. Dupa ce Challenge-ul e solved ! Puteti posta sintaxa? Ca nu am reusit ..si sunt curios care e !
  7. Exact !
  8. Daca a facut asta ...e clar:))
  9. Merge sa downloadezi ....Adica cel putin eu am descarcat astazi si a mers ! LE : Cu link direct pe Nasa.gov nu merge..daca dai search pe google "nasa.gov" si accesezi de acolo merge! LE2: Mie imi merge https !
  10. Image Is your iCloud account secured by a good password? Please Don’t rely on the cloud. Here's a terrifying tale of modern hacking. Mat Honan, a reporter at tech site Gizmodo, was playing with his daughter when his phone went dead. Thinking it was a software glitch, he rebooted, and went to log in to his iCloud. But his password wouldn't work. He was "irritated, but not alarmed", and connected his iPhone to his MacBook Air to restore from backup. On opening his laptop, an iCal message popped up telling him his Gmail account information was wrong. The screen went grey, and he was asked for a four-digit pin, which he didn't have. By now he knew something was up, but had no idea just how much damage the hacker had done. After presumably brute-forcing his way into iCloud, the hacker was able change the password of and gain access to Mat’s Google account, remote wipe his Macbook Air, iPhone, and iPad, get into his Twitter and then use that to get access to the Gizmodo US account. Apparently, the hackers were able to call up AppleCare support, and reset Honan’s password: I know how it was done now. Confirmed with both the hacker and Apple. It wasn’t password related. They got in via Apple tech support and some clever social engineering that let them bypass security questions. Apple has my Macbook and is trying to recover the data. I’m back in all my accounts that I know I was locked out of. Still trying to figure out where else they were. The hackers, once inside were able to wipe out all the data on his iPhone, iPad and then they remote wiped out everything on his MacBook computer and at last word he still could not get into his Gmail account. “Social engineering” he says is a fancy word for tricking the person on the other end to do what you want by making them believe that they are you. Sursa : THN
  11. WAppEx, which is an integrated, multi-platform framework for performing penetration testing and exploiting of web applications on Windows or Linux. It can automatically check for all type of security vulnerabilities in the given target and then let you to run various payloads to exploit and take advantages of the vulnerability. WAppEx can exploit the following web application vulnerabilities: SQL Injection: One of the most dangerous vulnerabilities in web applications. WAppEx uses the strong Havij engine to detect and exploit this vulnerability. Remote File Inclusion: RFI’s allow an attacker to include a remote file and execute arbitrary code. WAppEx can check for this vulnerability and run various payloads to execute commands on web server. Local File Inclusion: LFI’s allow an attacker to include a local file to execute arbitrary code. Just like RFI, WAppEx tests and exploits this vulnerability. OS Commands: This vulnerability allows an attacker to execute OS commands on the targeted server. WAppEx tests and exploits this vulnerability to execute custom commands to get a reverse shell. Script injection: Script injections can be used by an attacker to introduce (or “inject”) script into a web application. WAppEx automatically tests and exploits this vulnerability to escalate access to web server and tries to get a reverse shell. Local File Disclosure: Just as the name depicts, this vulnerability discloses the contents of local files on a targeted web server. WAppEx can exploit this vulnerability to read sensitive files on the server. Additionally, WAppEx also contains the following tools to help you in penetration testing and exploiting web applications: Online Hash Cracker: A tool for cracking hashes using the reverse lookup in online sites. Encoder/Decoder: An encoder/decoder with a complete encryption algorithms. Find Login Page: It looks for login pages on a target. Browser: A small browser you can use to view source code and HTTP headers. Download WAppExSursa :WAppEx : The Web Application Exploiter
  12. Problem! Youtube app L-am lasat sa se incarce si 5 minute.. dar nu se intampla nimic !
  13. Fern Cookie Hijacker is a new feature add in Fern Wifi Cracker 1.45 ,it is a wifi based session hijacking tool able to clone remote online web sessions by sniffing and capturing wireless cookie packets from remote hosts by intercepting reachable wireless signals. It is capable of decrypting WEP encrypted packets on the fly to process session cookies transmitted over the air. Fern cookie Hijacker comes with smart intergrated code to detect and intercept cookie packets, unlike some cookie detection engines fern cookie hijacker does not wait to collect complete cookie acknowledgement during the initial authentication process, but pulls cookies and associate them with their hosts as they are transmitted over the wireless connection, its also forges to correctness values that are not captured e.g (exipry,isSecure). Download Fern Wifi Cracker 1.45t Sursa: Fern Wifi Cracker 1.45 Released with Cookie Hijacker LE : Am vazut dupa ca a mai fost postat ! DELETE !
  14. Bine ai venit !
  15. ^^ V-am trimis ! ^^
  16. @caramea De acord cu tine !
  17. Deci cine vrea invitatie sa-mi dea pm cu email sau sa posteze email-ul aici ! Bitsense
  18. Postul suna mai mult a "[Cerere]Vulnerabilitate" In fine...Din ce stiu eu nu cred ca este vulnerabil!Dar prin 2009 XSSED.com!
  19. Tutoriale video ! + others Link : TheNewBoston.org
  20. Din titlu am zis ca vrei sa cumperi o vulnerabilitate din rst...
  21. Bine ai venit !
  22. Paramore - For A Pessimist I'm Pretty Optimistic
  23. Eu folosesc TorBrowser sa intru pe hackforums!
×
×
  • Create New...