Jump to content

backdoor

Active Members
  • Posts

    92
  • Joined

  • Last visited

Everything posted by backdoor

  1. Exista in php , pentru cei pasionati clasa Dom Document care stie sa parseze un fisier HTML exact cum o face javascript , doar ca nu executa cod . The DOMDocument class
  2. Acelasi lucru se poate face si cu openssl library . Mai ales daca aplicatia ruleaza sub linux deoarece nu stiu vreo distributie de linux care sa nu aiba openssl in afara de versiunile facute pt procesoare RISC care folosesc Matrix SSL. Exemplu: /** AES encryption/decryption demo program using OpenSSL EVP apis gcc -Wall openssl_aes.c -lcrypto this is public domain code. Saju Pillai (saju.pillai@gmail.com) **/ #include <string.h> #include <stdio.h> #include <stdlib.h> #include <openssl/evp.h> /** * Create an 256 bit key and IV using the supplied key_data. salt can be added for taste. * Fills in the encryption and decryption ctx objects and returns 0 on success **/ int aes_init(unsigned char *key_data, int key_data_len, unsigned char *salt, EVP_CIPHER_CTX *e_ctx, EVP_CIPHER_CTX *d_ctx) { int i, nrounds = 5; unsigned char key[32], iv[32]; /* * Gen key & IV for AES 256 CBC mode. A SHA1 digest is used to hash the supplied key material. * nrounds is the number of times the we hash the material. More rounds are more secure but * slower. */ i = EVP_BytesToKey(EVP_aes_256_cbc(), EVP_sha1(), salt, key_data, key_data_len, nrounds, key, iv); if (i != 32) { printf("Key size is %d bits - should be 256 bits\n", i); return -1; } EVP_CIPHER_CTX_init(e_ctx); EVP_EncryptInit_ex(e_ctx, EVP_aes_256_cbc(), NULL, key, iv); EVP_CIPHER_CTX_init(d_ctx); EVP_DecryptInit_ex(d_ctx, EVP_aes_256_cbc(), NULL, key, iv); return 0; } /* * Encrypt *len bytes of data * All data going in & out is considered binary (unsigned char[]) */ unsigned char *aes_encrypt(EVP_CIPHER_CTX *e, unsigned char *plaintext, int *len) { /* max ciphertext len for a n bytes of plaintext is n + AES_BLOCK_SIZE -1 bytes */ int c_len = *len + AES_BLOCK_SIZE, f_len = 0; unsigned char *ciphertext = malloc(c_len); /* allows reusing of 'e' for multiple encryption cycles */ EVP_EncryptInit_ex(e, NULL, NULL, NULL, NULL); /* update ciphertext, c_len is filled with the length of ciphertext generated, *len is the size of plaintext in bytes */ EVP_EncryptUpdate(e, ciphertext, &c_len, plaintext, *len); /* update ciphertext with the final remaining bytes */ EVP_EncryptFinal_ex(e, ciphertext+c_len, &f_len); *len = c_len + f_len; return ciphertext; } /* * Decrypt *len bytes of ciphertext */ unsigned char *aes_decrypt(EVP_CIPHER_CTX *e, unsigned char *ciphertext, int *len) { /* plaintext will always be equal to or lesser than length of ciphertext*/ int p_len = *len, f_len = 0; unsigned char *plaintext = malloc(p_len); EVP_DecryptInit_ex(e, NULL, NULL, NULL, NULL); EVP_DecryptUpdate(e, plaintext, &p_len, ciphertext, *len); EVP_DecryptFinal_ex(e, plaintext+p_len, &f_len); *len = p_len + f_len; return plaintext; } int main(int argc, char **argv) { /* "opaque" encryption, decryption ctx structures that libcrypto uses to record status of enc/dec operations */ EVP_CIPHER_CTX en, de; /* 8 bytes to salt the key_data during key generation. This is an example of compiled in salt. We just read the bit pattern created by these two 4 byte integers on the stack as 64 bits of contigous salt material - ofcourse this only works if sizeof(int) >= 4 */ unsigned int salt[] = {12345, 54321}; unsigned char *key_data; int key_data_len, i; char *input[] = {"a", "abcd", "this is a test", "this is a bigger test", "\nWho are you ?\nI am the 'Doctor'.\n'Doctor' who ?\nPrecisely!", NULL}; /* the key_data is read from the argument list */ key_data = (unsigned char *)argv[1]; key_data_len = strlen(argv[1]); /* gen key and iv. init the cipher ctx object */ if (aes_init(key_data, key_data_len, (unsigned char *)&salt, &en, &de)) { printf("Couldn't initialize AES cipher\n"); return -1; } /* encrypt and decrypt each input string and compare with the original */ for (i = 0; input[i]; i++) { char *plaintext; unsigned char *ciphertext; int olen, len; /* The enc/dec functions deal with binary data and not C strings. strlen() will return length of the string without counting the '\0' string marker. We always pass in the marker byte to the encrypt/decrypt functions so that after decryption we end up with a legal C string */ olen = len = strlen(input[i])+1; ciphertext = aes_encrypt(&en, (unsigned char *)input[i], &len); plaintext = (char *)aes_decrypt(&de, ciphertext, &len); if (strncmp(plaintext, input[i], olen)) printf("FAIL: enc/dec failed for \"%s\"\n", input[i]); else printf("OK: enc/dec ok for \"%s\"\n", plaintext); free(ciphertext); free(plaintext); } EVP_CIPHER_CTX_cleanup(&en); EVP_CIPHER_CTX_cleanup(&de); return 0; }
  3. sebyku , in principiu orice modem e bun. Numai ca ar trebui sa intelegi ca daca schimbi modemul sigur scriptul care ti la dat tex nu va mai functiona si o sa spui "ce mizerie de tutorial" . Daca folosesti un modem digi (care este un ZTE) si vrei sa pui o cartela orange sau vodafone pe el o sa trebuiasca sa il deblochezi/decodezi. si iti faci mai multa treaba. Daca chiar vrei sa iti faci asa ceva vezi ca pe okazii vand bajetii modemuri huavwei la preturi accesibile. Spor.
  4. Duty^ , un arduino uno e 20 USD pe ebay cu free shipping . Daca cauti un pic poti sa gasesti si cu pret mai mic si cu shipping ca sa scapi de taxele vamale. In minunata Romanie se vinde la un pret prohibitiv... PS: cu arduino nu poti sa faci mai mult decat sa aprinzi niste leduri in prima faza. Daca vrei sa comanzi motorase sau chestii mai avansate trebuie sa cumperi shield-uri care costa 10-20 USD fiecare.
  5. Chiar functioneaza. Super Tare !!! Nytro , nota 10! Foarte util daca vrei sa instalezi ceva ce in mod normal nu ai putea fara UAC dezactivat, exemplu un key logger sau sa ii dezinstalezi avastu
  6. Ar trebuie facuta o mica modificare si anume sa nu testeze mai mult de 3 parole per ip intr-un interval mai scurt de 10 minute. Multe hosting-uri sunt bazate pe cPanel (care vin cu broute force protection : cPHulkD).
  7. 1. normal ca au nevoie si de cineva mai bun decat administratorul lor puturos care manaca shaorma in fiecare zi 2. numarul lor ar trebui sa fie secret. chiar daca ar sti cati lucreaza pentru FBI , de unde stiu cati sunt restul ??? 3. Nu stiu exact care sunt legile in SUA dar sigur stau mult mai prost la securitate ca noi.
  8. Dragut subiect. Eu zic ca presa a exagerat un pic , ca de obicei ...
  9. Cred ca ai gresit titlul, vroiai sa spui "Linux commands by example" , nu ? In adara de linkuri , ne-ai dus cu vorba. Cel mai tare e "Google".
  10. 1. Da se poate . 2. Depinde ce program fol , de ex la putty : a. inainte sa te conectezi la al doilea nologin , te duci la proxy si setezi local cu 127.0.0.1 si portul pe care l-ai setat la tuneling in primul. b. conectezi al doilea nologin c. iti setezi in browser portul si ip-ul de la al doilea nologin PS: Tocmai ce am realizat ca nu e complet tutorialul ) SFAT: decat sa te ascunzi mai bine nu te tii de prostii. Amu treaba ta.... NOTA: daca faci nologin in nologin o sa rupi banda de net si o sa iti mearga mai mult nu.
  11. Interesant tutorial , dar de unde stii tu ce aplicatie foloseste marletele caruia ii trimiti tu fisierul (wav, mp3 , jpg) si ce versiune e ? In alta ordine de ideii din cate stiu eu Windows are DEP (Data execution provention) care nu prea permite chestia asta ... dar banuies ca in anumite circumstante functioneaza.
  12. 1. Da si eu va recomand o distributie bazata pe RedHat , in mode deosebit CentOS / Fedora pt ca nu are librariile tinute la zi si sunt o groaza de exploituri care merg. Acelasi lucru si cu Ubuntu... 2. Mysql are optiunea --skip-networking, si merge doar cu mysql.sock (mult mai sigur) . 3. Apache, sunt o sumedenie de module care nu sunt folosite niciodata gen : mod_imap , mod_imagemap, mod_dav, mod_proxy .... 4,5,6 - Sa zicem .. 7. Dale si config.inc.php... In fine cel mai simplu este sa portniti toate serviciile , sa nu puneti firewall , sa nu faceti nici o setare speciala ci doar sa asteptati ca noi sa il testam.
×
×
  • Create New...